New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
message_size_limit
should block incoming messages exceeding that limit
#265
Comments
it has to receive the message to drop it. The remote client is still sending that data, you've got to swallow it, or disconnect the client. |
I guess there isn't any option to make the broker to disconnect clients not respecting payload size, am I right? |
You are correct, but actually this should be possible in 1.5. |
I assume that currently messages that exceed message_size_limit will just be swallowed. Is this correct? If you're going to disconnect clients for exceeding message_size_limit, then you also need an option to prevent a bridge from sending messages that exceed the limit too, e.g. bridge_outgoing_message_size_limit. |
I'm bumping this to 1.6 as it got mised in 1.5, sorry for that. |
|
Start a broker with option
message_size_limit
set to 512Publish a message of 10MB
Expected:
Broker stop handling the message when 512 bytes of payload has arrived, then drop the message.
Actual:
Broker receives 10MB of data, then drop the message. Process' memory usage increase of at least 10MB.
The text was updated successfully, but these errors were encountered: