mirror of
https://git.haproxy.org/git/haproxy.git/
synced 2026-03-02 21:51:12 +01:00
Emit STREAM_LIMIT_ERROR if a client tries to open an unidirectional stream with an ID greater than the value specified by our flow-control limit. The code is similar to the bidirectional stream opening. MAX_STREAMS_UNI emission is not implement for the moment and is left as a TODO. This should not be too urgent for the moment : in HTTP/3, a client has only a limited use for unidirectional streams (H3 control stream + 2 QPACK streams). This is covered by the value provided by haproxy in transport parameters. This patch has been tagged with BUG as it should have prevented last crash reported on github issue #1808 when opening a new unidirectional streams with an invalid ID. However, it is probably not the main cause of the bug contrary to the patch commit 11a6f4007b908b49ecd3abd5cd10fba177f07c11 BUG/MINOR: quic: Wrong status returned by qc_pkt_decrypt() This must be backported up to 2.6.