-
Notifications
You must be signed in to change notification settings - Fork 536
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Container issues at connection #20274
Comments
Thanks for reporting the issue. We have started the investigation and are treating this as high priority. |
The for the "AzureUser" errors, see https://github.com/microsoft/FluidFramework/releases/tag/client_v2.0.0-rc.2.0.1 : I believe that patch should fix it. Error We have an optional validator intended to be able to be opted into to assist with debugging cases like this (to check data is well-formed when output and when parsed), but sadly there is no easy way to opt into enabling it right now. I have authored #20332 to provide a way to enable it in your app. Combine that with import {
configuredSharedTree,
typeboxValidator,
// eslint-disable-next-line import/no-internal-modules
} from "@fluidframework/tree/internal";
const SharedTree = configuredSharedTree({
jsonValidator: typeboxValidator,
}); and it should ideally detect if malformed data was generated, or if the data its trying to decode isn't in the right format. Since that's not published yet, and I'd still like to try and root cause this, could you provide the data which is causing the issue? To do so in the browser, enable breaking on caught exception and when assert 0x739 is hit, inspect the failing location with the debugger (1 up the call stack from the assert throwing the 0x739 error) and you should find a stack frame for NestedArrayDecoder.decode. In that context, evaluate Alternatively, if your application or its source are somewhere public I can run and you have a way I could reproduce the exception, I could extra that information myself. |
I have created an internal bug to track this: https://dev.azure.com/fluidframework/internal/_workitems/edit/7582 to help ensure if gets fixed, but I'll attempt to keep all actual information about its status here where impacted users can see it. |
## Description Expose an `@internal` api, `configuredSharedTree` which can be used to opt into various internal/debug shared tree settings. This should help cases like #20274 root cause the bug.
I ran a pre-release build: 2.0.0-dev-rc.3.0.0.250606 (ex: https://www.npmjs.com/package/fluid-framework/v/2.0.0-dev-rc.3.0.0.250606) which includes #20332. Once you use that (or a newer build) in addition to opting into additional validation to help track down the source of this bug, its possible to disable the data compression with |
Hello, I tried to use the internal api for debugging but it seems that this is not accessible in the pre-release build 2.0.0-dev-rc.3.0.0.250606. Maybe I missed something. Then I caught the error
I also tried the fix for the "AzurUser" errors of the 2.0.0-rc.2.0.1 version. I don't have this error anymore, but it's replaced by another issue. It seems to occur instead of the "AzurUser" error. |
I made a mistake. I did not realize the separate "internal" entry point is only enabled without our repo and not in public packages. import {
TreeCompressionStrategy,
configuredSharedTree,
typeboxValidator,
} from "@fluidframework/tree";
const SharedTree = configuredSharedTree({
// Extra serialized data validation
jsonValidator: typeboxValidator,
// Disable tree compression
// treeEncodeType: TreeCompressionStrategy.Uncompressed,
}); Thanks for the failing data example. I'll run that through the decoder under a debugger and see what I can figure out. |
@amomo290 Looking at the data you provided, I've realized I need a bit more information to get to the bottom of this:
|
The version was the Deleting all old containers references and using the
|
@amomo290 the patch you are using includes a mitigation for the AzureUser error you encountered but doesn't fix the underlying issue which is, in fact, an issue in the service layer that results in missing user information. This issue only impacts the v2 Fluid Framework packages and we are working on a fix that should deploy shortly (by the end of this week - April 5, 2024) |
I believe this issue is resolved. |
Describe the bug
Following the closure of this bug: Issue at container connection : Provided user was not an "AzureUser", we upgraded the fluid framework to the release v2.0.0-rc.2.0.0.
We are now facing different issues :
When we are successfully connected and when there is data into the container, we often get this issue :
And finally, we still have the previous error but with a different wording when we tried to be connected to the same container with multi users.
We are still using the same way to connect the Fluid relay, see more details on the previous bug (Issue at container connection : Provided user was not an "AzureUser")
The text was updated successfully, but these errors were encountered: