@@ -857,6 +857,7 @@ bool Http2Session::CanAddStream() {
857
857
}
858
858
859
859
void Http2Session::AddStream (Http2Stream* stream) {
860
+ Debug (this , " Adding stream: %d" , stream->id ());
860
861
CHECK_GE (++statistics_.stream_count , 0 );
861
862
streams_[stream->id ()] = BaseObjectPtr<Http2Stream>(stream);
862
863
size_t size = streams_.size ();
@@ -867,6 +868,7 @@ void Http2Session::AddStream(Http2Stream* stream) {
867
868
868
869
869
870
BaseObjectPtr<Http2Stream> Http2Session::RemoveStream (int32_t id) {
871
+ Debug (this , " Removing stream: %d" , id);
870
872
BaseObjectPtr<Http2Stream> stream;
871
873
if (streams_.empty ())
872
874
return stream;
@@ -1043,6 +1045,7 @@ int Http2Session::OnHeaderCallback(nghttp2_session* handle,
1043
1045
if (!stream) [[unlikely]]
1044
1046
return NGHTTP2_ERR_TEMPORAL_CALLBACK_FAILURE;
1045
1047
1048
+ Debug (session, " handling header key/pair for stream %d" , id);
1046
1049
// If the stream has already been destroyed, ignore.
1047
1050
if (!stream->is_destroyed () && !stream->AddHeader (name, value, flags)) {
1048
1051
// This will only happen if the connected peer sends us more
@@ -1112,9 +1115,21 @@ int Http2Session::OnInvalidFrame(nghttp2_session* handle,
1112
1115
return 1 ;
1113
1116
}
1114
1117
1115
- // If the error is fatal or if error code is ERR_STREAM_CLOSED... emit error
1118
+ // If the error is fatal or if error code is one of the following
1119
+ // we emit and error:
1120
+ //
1121
+ // ERR_STREAM_CLOSED: An invalid frame has been received in a closed stream.
1122
+ //
1123
+ // ERR_PROTO: The RFC 7540 specifies:
1124
+ // "An endpoint that encounters a connection error SHOULD first send a GOAWAY
1125
+ // frame (Section 6.8) with the stream identifier of the last stream that it
1126
+ // successfully received from its peer.
1127
+ // The GOAWAY frame includes an error code that indicates the type of error"
1128
+ // The GOAWAY frame is already sent by nghttp2. We emit the error
1129
+ // to liberate the Http2Session to destroy.
1116
1130
if (nghttp2_is_fatal (lib_error_code) ||
1117
- lib_error_code == NGHTTP2_ERR_STREAM_CLOSED) {
1131
+ lib_error_code == NGHTTP2_ERR_STREAM_CLOSED ||
1132
+ lib_error_code == NGHTTP2_ERR_PROTO) {
1118
1133
Environment* env = session->env ();
1119
1134
Isolate* isolate = env->isolate ();
1120
1135
HandleScope scope (isolate);
@@ -1177,7 +1192,6 @@ int Http2Session::OnFrameNotSent(nghttp2_session* handle,
1177
1192
Debug (session, " frame type %d was not sent, code: %d" ,
1178
1193
frame->hd .type , error_code);
1179
1194
1180
- // Do not report if the frame was not sent due to the session closing
1181
1195
if (error_code == NGHTTP2_ERR_SESSION_CLOSING ||
1182
1196
error_code == NGHTTP2_ERR_STREAM_CLOSED ||
1183
1197
error_code == NGHTTP2_ERR_STREAM_CLOSING) {
@@ -1186,7 +1200,15 @@ int Http2Session::OnFrameNotSent(nghttp2_session* handle,
1186
1200
// to destroy the session completely.
1187
1201
// Further information see: https://github.com/nodejs/node/issues/35233
1188
1202
session->DecrefHeaders (frame);
1189
- return 0 ;
1203
+ // Currently, nghttp2 doesn't not inform us when is the best
1204
+ // time to call session.close(). It relies on a closing connection
1205
+ // from peer. If that doesn't happen, the nghttp2_session will be
1206
+ // closed but the Http2Session will still be up causing a memory leak.
1207
+ // Therefore, if the GOAWAY frame couldn't be send due to
1208
+ // ERR_SESSION_CLOSING we should force close from our side.
1209
+ if (frame->hd .type != 0x03 ) {
1210
+ return 0 ;
1211
+ }
1190
1212
}
1191
1213
1192
1214
Isolate* isolate = env->isolate ();
@@ -1252,12 +1274,15 @@ int Http2Session::OnStreamClose(nghttp2_session* handle,
1252
1274
// ignore these. If this callback was not provided, nghttp2 would handle
1253
1275
// invalid headers strictly and would shut down the stream. We are intentionally
1254
1276
// being more lenient here although we may want to revisit this choice later.
1255
- int Http2Session::OnInvalidHeader (nghttp2_session* session ,
1277
+ int Http2Session::OnInvalidHeader (nghttp2_session* handle ,
1256
1278
const nghttp2_frame* frame,
1257
1279
nghttp2_rcbuf* name,
1258
1280
nghttp2_rcbuf* value,
1259
1281
uint8_t flags,
1260
1282
void * user_data) {
1283
+ Http2Session* session = static_cast <Http2Session*>(user_data);
1284
+ int32_t id = GetFrameID (frame);
1285
+ Debug (session, " invalid header received for stream %d" , id);
1261
1286
// Ignore invalid header fields by default.
1262
1287
return 0 ;
1263
1288
}
@@ -1653,6 +1678,7 @@ void Http2Session::HandlePingFrame(const nghttp2_frame* frame) {
1653
1678
1654
1679
// Called by OnFrameReceived when a complete SETTINGS frame has been received.
1655
1680
void Http2Session::HandleSettingsFrame (const nghttp2_frame* frame) {
1681
+ Debug (this , " handling settings frame" );
1656
1682
bool ack = frame->hd .flags & NGHTTP2_FLAG_ACK;
1657
1683
if (!ack) {
1658
1684
js_fields_->bitfield &= ~(1 << kSessionRemoteSettingsIsUpToDate );
0 commit comments