QUIC
History
The 'node:quic' module provides an implementation of the QUIC protocol.
To access it, start Node.js with the --experimental-quic option and:
import quic from 'node:quic';The module is only available under the node: scheme.
The quic module provides APIs for creating QUIC clients and servers.
The QUIC and HTTP/3 protocols are defined by a collection of RFCs produced primarily by the IETF QUIC Working Group. A familiarity with these documents is strongly recommended for users of this module.
Core QUIC transport:
- RFC 8999 — Version-Independent Properties of QUIC
- RFC 9000 — QUIC: A UDP-Based Multiplexed and Secure Transport
- RFC 9001 — Using TLS to Secure QUIC
- RFC 9002 — QUIC Loss Detection and Congestion Control
Core HTTP/3:
QUIC extensions:
- RFC 9221 — An Unreliable Datagram Extension to QUIC
- RFC 9287 — Greasing the QUIC Bit
- RFC 9368 — Compatible Version Negotiation for QUIC
- RFC 9369 — QUIC Version 2
- RFC 9443 — Multiplexing Scheme Updates for QUIC
HTTP/3 extensions:
- RFC 9218 — Extensible Prioritization Scheme for HTTP
- RFC 9220 — Bootstrapping WebSockets with HTTP/3
- RFC 9297 — HTTP Datagrams and the Capsule Protocol
- RFC 9412 — The ORIGIN Extension in HTTP/3
Operational and informational:
- RFC 9308 — Applicability of the QUIC Transport Protocol
- RFC 9312 — Manageability of the QUIC Transport Protocol
The quic module is built around three core abstractions:
-
QuicEndpoint: represents the local UDP socket binding for QUIC. It is used to send and receive QUIC packets and can be shared across multiple sessions. A single endpoint can be used as both a client and a server simultaneously. -
QuicSession: represents a QUIC connection between the local endpoint and a remote peer. A session is created either by initiating a connection to a remote peer usingquic.connect()or by accepting an incoming connection from a remote peer viaquic.listen(). -
QuicStream: represents a QUIC stream within a session. Streams are created by either local or remote peers and can be bidirectional or unidirectional.
Unlike traditional TCP-based protocols, QUIC "connections" are not inherently tied to a specific local port / remote port pair. A session is initiated via a QUIC endpoint but may be migrated to a different local or remote address over its lifetime, outlive the endpoint that created it, and may even be associated with multiple endpoints simultaneously. This flexibility allows for advanced use cases such as connection migration, multi-homing, and load balancing. Most often, however, a simple one-to-one relationship between endpoint and session is sufficient.
The QUIC protocol integrates TLS 1.3 directly into the protocol for connection
establishment and security. The quic module's API reflects this integration
by exposing TLS-related information and configuration options. It is currently
not possible to use QUIC without TLS or to use a different version of TLS.
Every QUIC session starts with the client and server performing a TLS handshake to negotiate the application protocol (via ALPN), authenticate the server (and optionally the client), exchange transport parameters, and establish shared keys for encryption.
Every QuicSession is associated with a single application protocol, negotiated
via ALPN during the TLS handshake. The quic module is designed to be
application-agnostic in general but includes built-in support for HTTP/3 as a
specific application protocol. When using HTTP/3, the quic module provides
additional APIs for handling HTTP/3-specific features such as headers, trailers,
and prioritization. For other application protocols, users can implement their
own message framing and multiplexing on top of the core QUIC transport features.
When initiating a TLS handshake, the client will include a list of supported
ALPN protocols in the ClientHello. The server selects one of these protocols
(if any) and includes it in the ServerHello. The negotiated protocol determines
how the QuicSession and QuicStream APIs behave. For example, when the h3
protocol is negotiated for HTTP/3, the QuicSession and QuicStream will support
HTTP/3-specific features.
Currently, the quic module only supports HTTP/3 as a built-in application protocol.
All other protocols must be implemented by the user on top of the provided JavaScript
API.
The QUIC API is designed to be flexible and highly configurable to support a wide
range of use cases. Users can configure various aspects of the QUIC transport,
TLS handshake, and application behavior via options passed to the quic.connect()
and quic.listen() functions, as well as dynamically on QuicEndpoint and
QuicSession instances. The API also provides access to detailed statistics and
events for monitoring and debugging.
QUIC transport parameters are exchanged during the TLS handshake to negotiate
various transport-level settings such as maximum stream counts, idle timeouts,
and datagram support. The quic module allows users to configure the transport
parameters their endpoint advertises to peers, as well as access the transport
parameters advertised by peers. These configure the capabilities and limits of
the QUIC connection in coordination with the peer.
A rich set of local settings is also available for configuring the behavior of the local endpoint and sessions. These include settings for connection limits, congestion control, stream prioritization, and more.
The quic module uses a combination of callbacks and promises for asynchronous
operations. For example, initiating a connection with quic.connect() returns
a promise for the established session, while incoming sessions on the server
side are handled via a callback passed to quic.listen(). Within a session,
events such as incoming streams, datagrams, and session state changes are handled
via callbacks on the QuicSession instance. Promises are used for operations
that have a clear completion point, such as completion of the TLS handshake or
graceful closure of a session.
All callbacks are invoked synchronously and may either return synchronously or
return a promise. If a callback returns a promise that rejects, or throws an error,
the object will be destroyed with the error as the reason if an onerror callback
is not specified.
Streams are the primary data-carrying abstraction in QUIC. A stream can be initiated by either the local endpoint or the remote peer once a session is established.
Streams can be either bidirectional (data flows in both directions) or
unidirectional (data flows in only one direction). The quic module provides
separate APIs for creating each kind:
session.createBidirectionalStream() and
session.createUnidirectionalStream(). Streams initiated by a remote
peer are delivered via the session.onstream callback.
There are two ways to write data to a stream:
- Body source — pass a
bodyoption when creating the stream (or callstream.setBody()). The body can be a string,ArrayBuffer,ArrayBufferView,Blob,FileHandle,AsyncIterable, syncIterable, orPromiseresolving to any of these. Anullbody closes the writable side immediately. This is the simplest approach when the data is available up front or can be expressed as an iterable. - Writer — access
stream.writerto push data incrementally. The writer exposes synchronous methods (writeSync(),writevSync(),endSync()) that return immediately, as well as async equivalents (write(),writev(),end()) that wait for drain when backpressured.writeSync()returnsfalsewhen the write buffer is full; the caller should wait for drain before retrying.
These two approaches are mutually exclusive for a given stream.
Reading is done by iterating the stream as an async iterable. Each iteration
yields a batch of Uint8Array chunks:
for await (const chunks of stream) {
for (const chunk of chunks) {
// Process each Uint8Array chunk
}
}Only one async iterator can be obtained per stream. The stream is also
compatible with node:stream/iter utilities such as Stream.bytes(),
Stream.text(), and Stream.pipeTo().
In addition to streams, QUIC supports unreliable datagrams (RFC 9221) for use cases that require low-latency, best-effort messaging.
Datagram support is enabled at two levels. At the QUIC transport level, both
peers must advertise a non-zero maxDatagramFrameSize transport parameter
during the handshake. For HTTP/3 sessions, both peers must additionally set
application.enableDatagrams to true, which exchanges the
SETTINGS_H3_DATAGRAM setting on the HTTP/3 control stream.
A datagram is sent with a single call to session.sendDatagram(). Each
datagram must fit within a single QUIC packet — datagrams cannot be
fragmented. The maximum payload size is determined by the peer's
maxDatagramFrameSize and the path MTU. If a datagram is too large or the
peer does not support datagrams, sendDatagram() returns 0n rather than
throwing an error.
There is no guarantee of delivery. Datagrams may be lost, duplicated, or
delivered out of order. The session.ondatagramstatus callback reports
whether each sent datagram was 'acknowledged', 'lost', or 'abandoned'
(never sent on the wire).
QUIC supports 0-RTT early data, allowing a client that has previously connected to a server to send application data with its very first packet, without waiting for the handshake to complete. This can eliminate a full round-trip of latency on reconnection.
Two pieces of state from a prior connection make this possible:
- A session ticket, received via the
session.onsessionticketcallback, enables TLS session resumption and 0-RTT encryption. Pass it as thesessionOptions.sessionTicketoption on a subsequent connection to the same server. - An address validation token, received via the
session.onnewtokencallback, allows the client to skip the server's address validation step (avoiding a Retry round-trip). Pass it as thesessionOptions.tokenoption.
If the server accepts the session ticket, any data sent before the handshake
completes is 0-RTT early data. On the server side, stream.early is true
for streams carrying early data. The server can reject the 0-RTT attempt
(for example, if its configuration has changed since the ticket was issued).
When this happens, all streams opened during the 0-RTT phase are destroyed and
the client's session.onearlyrejected callback fires. The connection
falls back to a normal 1-RTT handshake and the application can reopen streams.
Early data is less secure than data sent after the handshake completes — it can potentially be replayed by an attacker. Applications should treat 0-RTT data with appropriate caution and avoid performing non-idempotent operations during the early data phase.
A typical client session progresses through these stages:
- Call
quic.connect()with a server address and options. This returns aQuicSession. - The TLS handshake runs automatically.
session.openedresolves when the handshake completes, providing the negotiated ALPN, cipher, and certificate validation results. - Open streams, send datagrams, and exchange data.
- Call
session.close()to initiate a graceful shutdown. Existing streams are allowed to finish, then the session is destroyed. The returned promise (also available assession.closed) resolves when teardown is complete.
On the server side, call quic.listen() with a callback. The callback
fires for each incoming session after the TLS handshake begins. Incoming
streams arrive via the session.onstream callback.
session.destroy() is available for immediate teardown — all open streams
are destroyed and the session is closed without waiting for them to finish.
QuicEndpoint and QuicSession support Symbol.asyncDispose, so they can
be used with await using for automatic cleanup.
Errors in the quic module are communicated through two complementary
mechanisms: the onerror callback and the closed promise.
Both QuicSession and QuicStream expose an optional onerror callback.
When a session or stream is destroyed with an error — including errors thrown
by other user callbacks — the onerror callback is invoked with the error
before the object is torn down. Setting onerror also marks the closed
promise as handled, preventing unhandled rejection warnings. If onerror
is not set, the error is delivered solely through the rejection of the
closed promise.
The QuicError class carries an explicit numeric QUIC error code
(error.errorCode) alongside the usual message and code properties.
When a QuicError is passed to stream.destroy() or
writer.fail(), its errorCode is used in the RESET_STREAM or
STOP_SENDING frame sent to the peer. Any other error type falls back to
the negotiated protocol's generic internal error code.
When using the Permission Model, the --allow-net flag must be passed to
allow QUIC network operations. Without it, calling quic.connect() or
quic.listen() will throw an ERR_ACCESS_DENIED error.
$ node --permission --allow-fs-read=* --experimental-quic index.mjs
Error: Access to this API has been restricted. Use --allow-net to manage permissions.
code: 'ERR_ACCESS_DENIED',
permission: 'Net',
}Creating a QuicEndpoint instance without connecting or listening
is permitted even without --allow-net, since no network I/O occurs until
quic.connect() or quic.listen() is called.
quic.connect(address, options?): Promise<string>
|
<net.SocketAddress><quic.SessionOptions><Promise><quic.QuicSession>Initiate a new client-side session.
import { connect } from 'node:quic';
import { Buffer } from 'node:buffer';
const enc = new TextEncoder();
const alpn = 'foo';
const client = await connect('123.123.123.123:8888', { alpn });
await client.createUnidirectionalStream({
body: enc.encode('hello world'),
});By default, every call to connect(...) will create a new local
QuicEndpoint instance bound to a new random local IP port. To
specify the exact local address to use, or to multiplex multiple
QUIC sessions over a single local port, pass the endpoint option
with either a QuicEndpoint or EndpointOptions as the argument.
import { QuicEndpoint, connect } from 'node:quic';
const endpoint = new QuicEndpoint({
address: '127.0.0.1:1234',
});
const client = await connect('123.123.123.123:8888', { endpoint });quic.listen(onsession, options?): Promise<quic.OnSessionCallback><quic.SessionOptions><Promise><quic.QuicEndpoint>Configures the endpoint to listen as a server. When a new session is initiated by
a remote peer, the given onsession callback will be invoked with the created
session.
import { listen } from 'node:quic';
const endpoint = await listen((session) => {
// ... handle the session
});
// Closing the endpoint allows any sessions open when close is called
// to complete naturally while preventing new sessions from being
// initiated. Once all existing sessions have finished, the endpoint
// will be destroyed. The call returns a promise that is resolved once
// the endpoint is destroyed.
await endpoint.close();By default, every call to listen(...) will create a new local
QuicEndpoint instance bound to a new random local IP port. To
specify the exact local address to use, or to multiplex multiple
QUIC sessions over a single local port, pass the endpoint option
with either a QuicEndpoint or EndpointOptions as the argument.
At most, any single QuicEndpoint can only be configured to listen as
a server once.
An object containing commonly used constants for QUIC configuration.
Congestion control algorithm identifiers, for use with the
sessionOptions.cc option:
quic.constants.cc.RENO— Reno congestion control.quic.constants.cc.CUBIC— CUBIC congestion control.quic.constants.cc.BBR— BBR congestion control.
The default TLS 1.3 cipher suite list used when sessionOptions.ciphers
is not specified.
The default TLS 1.3 key-exchange group list used when
sessionOptions.groups is not specified.
A QuicEndpoint encapsulates the local UDP-port binding for QUIC. It can be
used as both a client and a server.
new QuicEndpoint(options?): void<quic.EndpointOptions><net.SocketAddress>
|
<undefined>The local UDP socket address to which the endpoint is bound, if any.
If the endpoint is not currently bound then the value will be undefined. Read only.
<boolean>When endpoint.busy is set to true, the endpoint will temporarily reject
new sessions from being created. Read/write.
// Mark the endpoint busy. New sessions will be prevented.
endpoint.busy = true;
// Mark the endpoint free. New session will be allowed.
endpoint.busy = false;The busy property is useful when the endpoint is under heavy load and needs to
temporarily reject new sessions while it catches up.
endpoint.close(): Promise<Promise>Gracefully close the endpoint. The endpoint will close and destroy itself when all currently open sessions close. Once called, new sessions will be rejected.
Returns a promise that is fulfilled when the endpoint is destroyed.
<Promise>A promise that is fulfilled when the endpoint is destroyed. This will be the same promise that is
returned by the endpoint.close() function. Read only.
<boolean>True if endpoint.close() has been called and closing the endpoint has not yet completed.
Read only.
endpoint.destroy(error?): void<any>Forcefully closes the endpoint by forcing all open sessions to be immediately closed.
<boolean>True if endpoint.destroy() has been called. Read only.
<boolean>True if the endpoint is actively listening for incoming connections. Read only.
<number>The maximum number of concurrent connections allowed per remote IP address.
0 means unlimited (default). Can be set at construction time via the
maxConnectionsPerHost option and changed dynamically at any time.
The valid range is 0 to 65535.
<number>The maximum total number of concurrent connections across all remote
addresses. 0 means unlimited (default). Can be set at construction time via
the maxConnectionsTotal option and changed dynamically at any time.
The valid range is 0 to 65535.
endpoint.setSNIContexts(entries, options?): voidReplaces or updates the SNI TLS contexts for this endpoint. This allows changing the TLS identity (key/certificate) used for specific host names without restarting the endpoint. Existing sessions are unaffected — only new sessions will use the updated contexts.
endpoint.setSNIContexts({
'api.example.com': { keys: [newApiKey], certs: [newApiCert] },
});
// Replace the entire SNI map
endpoint.setSNIContexts({
'api.example.com': { keys: [newApiKey], certs: [newApiCert] },
}, { replace: true });The statistics collected for an active endpoint. Read only.
endpoint[Symbol.asyncDispose](): voidCalls endpoint.close() and returns a promise that fulfills when the
endpoint has closed.
A view of the collected statistics for an endpoint.
<bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint>A QuicSession represents the local side of a QUIC connection.
session.close(options?): Promise<Object>CONNECTION_CLOSE
frame sent to the peer.
Default:
0
(no error).<string>'transport'
or
'application'
. Determines the
error code namespace used in the
CONNECTION_CLOSE
frame. When
'transport'
(the default), the frame type is
0x1c
and the code is interpreted as a QUIC
transport error. When
'application'
, the frame type is
0x1d
and the code
is application-specific.
Default:
'transport'
.<string>CONNECTION_CLOSE
frame. Per RFC 9000, this is for diagnostic purposes
only and should not be used for machine-readable error descriptions.<Promise>Initiate a graceful close of the session. Existing streams will be allowed
to complete but no new streams will be opened. Once all streams have closed,
the session will be destroyed. The returned promise will be fulfilled once
the session has been destroyed. If a non-zero code is specified, the
promise will reject with an ERR_QUIC_TRANSPORT_ERROR or
ERR_QUIC_APPLICATION_ERROR depending on the type.
<Promise><Object><net.SocketAddress><net.SocketAddress><string><string><string><string>'TLSv1.3'
).<string><number>0
if validation succeeded.<boolean><boolean>A promise that is fulfilled once the TLS handshake completes successfully. The resolved value contains information about the established session including the negotiated protocol, cipher suite, certificate validation status, and 0-RTT early data status.
If the handshake fails or the session is destroyed before the handshake completes, the promise will be rejected.
<Promise>A promise that is fulfilled once the session is destroyed.
<boolean>True if session.close() has been called and the session has not yet
been destroyed. Read only.
session.destroy(error?, options?): void<any>Immediately destroy the session. All streams will be destroyed and the
session will be closed. If error is provided and session.onerror is
set, the onerror callback is invoked before destruction. The
session.closed promise will reject with the error. If options is
provided, the CONNECTION_CLOSE frame sent to the peer will include the
specified error code, type, and reason.
<boolean>True if session.destroy() has been called. Read only.
<quic.QuicEndpoint>
|
<null>The endpoint that created this session. Returns null if the session
has been destroyed. Read only.
<Function>
|
<undefined>An optional callback invoked when the session is destroyed with an error.
This includes errors caused by user callbacks that throw or reject (see
Callback error handling). The callback receives a single argument: the
error that triggered the destruction. If the onerror callback itself throws
or returns a promise that rejects, the error is surfaced as an uncaught
exception. Read/write.
Can also be set via the onerror option in quic.connect() or
quic.listen().
The callback to invoke when a new stream is initiated by a remote peer. Read/write.
The callback to invoke when a new datagram is received from a remote peer. Read/write.
The callback to invoke when the status of a datagram is updated. Read/write.
<Function>
|
<undefined>The callback to invoke when the server rejects 0-RTT early data. When this fires, all streams that were opened during the 0-RTT phase have been destroyed. The application should re-open streams if needed. Read/write.
This callback only fires on the client side when the server rejects the client's 0-RTT attempt. The connection falls back to 1-RTT and continues normally.
The callback to invoke when the path validation is updated. Read/write.
The callback to invoke when a new session ticket is received. Read/write.
The callback to invoke when a version negotiation is initiated. Read/write.
The callback to invoke when the TLS handshake is completed. Read/write.
The callback to invoke when a NEW_TOKEN token is received from the server.
The token can be passed as the token option on a future connection to
the same server to skip address validation. Read/write.
The callback to invoke when an ORIGIN frame (RFC 9412) is received from the server, indicating which origins the server is authoritative for. Read/write.
<Function>The callback to invoke when the peer sends an HTTP/3 GOAWAY frame,
indicating it is initiating a graceful shutdown. The callback receives
(lastStreamId) where lastStreamId is a {bigint}:
- When
lastStreamIdis-1n, the peer sent a shutdown notice (intent to close) without specifying a stream boundary. All existing streams may still be processed. - When
lastStreamIdis>= 0n, it is the highest stream ID the peer may have processed. Streams with IDs above this value were NOT processed and can be safely retried on a new connection.
After GOAWAY is received, session.createBidirectionalStream() will
throw ERR_INVALID_STATE. Existing streams continue until they
complete or the session closes.
This callback is only relevant for HTTP/3 sessions. Read/write.
The callback to invoke when TLS key material is available. Requires
sessionOptions.keylog to be true. Each invocation receives a single
line of NSS Key Log Format text (including a trailing newline). This is
useful for decrypting packet captures with tools like Wireshark. Read/write.
Can also be set via the onkeylog option in quic.connect() or
quic.listen().
The callback to invoke when qlog data is available. Requires
sessionOptions.qlog to be true. The callback receives a string
chunk of JSON-SEQ formatted qlog data and a boolean fin flag. When
fin is true, the chunk is the final qlog output for this session and
the concatenated chunks form a complete qlog trace. Read/write.
Qlog data arrives during the connection lifecycle. The first chunk contains
the qlog header with format metadata. Subsequent chunks contain trace
events. The final chunk (with fin set to true) is emitted during
session destruction and completes the JSON-SEQ output.
Can also be set via the onqlog option in quic.connect() or
quic.listen().
session.createBidirectionalStream(options?): Promise<Object><string>
|
<ArrayBuffer>
|
<SharedArrayBuffer>
|
<Blob>
|
<FileHandle>
|
<AsyncIterable>
|
<Promise>
|
<null>stream.setBody()
for details on
supported types. When omitted, the stream starts half-closed (writable
side open, no body queued).<Object>body
is not
specified and
headers
is provided, the stream is treated as
headers-only (terminal).<string>'high'
,
'default'
, or
'low'
.
Default:
'default'
.<boolean>true
, data from this stream may be
interleaved with data from other streams of the same priority level.
When
false
, the stream should be completed before same-priority peers.
Default:
false
.<number>writeSync()
returns
false
. When the buffered
data exceeds this limit, the caller should wait for drain before
writing more.
Default:
65536
(64 KB).<Function>(headers)
.<Function>(trailers)
.<Function>(headers)
.<Function>stream.sendTrailers()
within the
callback.<Promise><quic.QuicStream>Open a new bidirectional stream. If the body option is not specified,
the outgoing stream will be half-closed. The priority and incremental
options are only used when the session supports priority (e.g. HTTP/3).
The headers, onheaders, ontrailers, oninfo, and onwanttrailers
options are only used when the session supports headers (e.g. HTTP/3).
session.createUnidirectionalStream(options?): Promise<Object><string>
|
<ArrayBuffer>
|
<SharedArrayBuffer>
|
<Blob>
|
<FileHandle>
|
<AsyncIterable>
|
<Promise>
|
<null>stream.setBody()
for details on
supported types. When omitted, the stream is closed immediately.<Object><string>'high'
,
'default'
, or
'low'
.
Default:
'default'
.<boolean>true
, data from this stream may be
interleaved with data from other streams of the same priority level.
When
false
, the stream should be completed before same-priority peers.
Default:
false
.<number>writeSync()
returns
false
. When the buffered
data exceeds this limit, the caller should wait for drain before
writing more.
Default:
65536
(64 KB).<Function>(headers)
.<Function>(trailers)
.<Function>(headers)
.<Function><Promise><quic.QuicStream>Open a new unidirectional stream. If the body option is not specified,
the outgoing stream will be closed. The priority and incremental
options are only used when the session supports priority (e.g. HTTP/3).
<Object>
|
<undefined><net.SocketAddress><net.SocketAddress>The local and remote socket addresses associated with the session. Read only.
session.sendDatagram(datagram, encoding?): PromiseSends an unreliable datagram to the remote peer, returning a promise for the datagram ID.
If datagram is a string, it will be encoded using the specified encoding.
If datagram is an ArrayBufferView, the bytes are copied into an
internal buffer; the caller's source buffer is unchanged and may be reused
or mutated immediately after the call returns. Callers that want to ensure
their source cannot be mutated after the call (for example, when handing
the buffer off to another async consumer) can call
ArrayBuffer.prototype.transfer() themselves before passing the buffer.
If datagram is a Promise, it will be awaited before sending. If the
session closes while awaiting, 0n is returned silently (datagrams are
inherently unreliable).
If the datagram payload is zero-length (empty string after encoding, detached
buffer, or zero-length view), 0n is returned and no datagram is sent.
For HTTP/3 sessions, the peer must advertise SETTINGS_H3_DATAGRAM=1
(via application: { enableDatagrams: true }) for datagrams to be sent.
If the peer's setting is 0, sendDatagram() returns 0n (per RFC 9297
§3, an endpoint MUST NOT send HTTP Datagrams unless the peer indicated
support).
Datagrams cannot be fragmented — each must fit within a single QUIC packet.
The maximum datagram size is determined by the peer's
maxDatagramFrameSize transport parameter (which the peer advertises during
the handshake). If the peer sets this to 0, datagrams are not supported
and 0n will be returned. If the datagram exceeds the peer's limit, it
will be silently dropped and 0n returned. The local
maxDatagramFrameSize transport parameter (default: 1200 bytes) controls
what this endpoint advertises to the peer as its own maximum.
<Object>
|
<undefined>The local certificate as an object with properties such as subject,
issuer, valid_from, valid_to, fingerprint, etc. Returns undefined
if the session is destroyed or no certificate is available.
<Object>
|
<undefined>The peer's certificate as an object with properties such as subject,
issuer, valid_from, valid_to, fingerprint, etc. Returns undefined
if the session is destroyed or the peer did not present a certificate.
<Object>
|
<undefined>The ephemeral key information for the session, with properties such as
type, name, and size. Only available on client sessions. Returns
undefined for server sessions or if the session is destroyed.
<number>The maximum datagram payload size in bytes that the peer will accept.
This is derived from the peer's maxDatagramFrameSize transport
parameter minus the DATAGRAM frame overhead (type byte and variable-length
integer encoding). Returns 0 if the peer does not support datagrams or
if the handshake has not yet completed. Datagrams larger than this value
will not be sent.
<number>128The maximum number of datagrams that can be queued for sending. Datagrams
are queued when sendDatagram() is called and sent opportunistically
alongside stream data by the packet serialization loop. When the queue
is full, the sessionOptions.datagramDropPolicy determines whether
the oldest or newest datagram is dropped. Dropped datagrams are reported
as lost via the ondatagramstatus callback.
This property can be changed dynamically to adjust queue capacity
based on application activity or memory pressure. The valid range
is 0 to 65535.
Return the current statistics for the session. Read only.
session.updateKey(): voidInitiate a key update for the session.
session[Symbol.asyncDispose](): voidCalls session.close() and returns a promise that fulfills when the
session has closed.
<bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint>A QuicError is an Error subclass that carries an explicit numeric
QUIC error code. Use it to abort a QUIC stream or session with a
specific application-protocol-defined error code rather than letting
the implementation pick a generic fallback.
The class is exported from node:quic:
import { QuicError } from 'node:quic';When a QuicError is supplied to APIs that emit a wire frame
(writer.fail(), stream.destroy()), the QUIC stack uses
error.errorCode as the wire code for the resulting frame.
When any other value is supplied (for example a plain Error), the
implementation falls back to the negotiated application protocol's
"internal error" code (H3_INTERNAL_ERROR (0x102) for HTTP/3, or
the QUIC transport-layer INTERNAL_ERROR (0x1) for raw QUIC).
The Node.js error code (error.code) defaults to
'ERR_QUIC_STREAM_ABORTED'. Callers who need a more specific code
string can override it via options.code — the numeric QUIC code
is unaffected.
The Node.js error code is fixed at 'ERR_QUIC_STREAM_ABORTED' so that
catch blocks can distinguish a QuicError from other Node.js errors
without checking the prototype chain. The numeric QUIC code lives on
the separate error.errorCode property to avoid colliding with
the Node.js convention that error.code is a string.
new QuicError(message, options): void<string><Object>BigInt
. Must be a non-negative 62-bit unsigned
varint (
0n <= errorCode <= 2n ** 62n - 1n
).<string>error.code
. Defaults to
'ERR_QUIC_STREAM_ABORTED'
.<string>'application'
(default) or
'transport'
.
Indicates whether the code is defined by the negotiated
application protocol (e.g. RFC 9114 for HTTP/3) or by the QUIC
transport layer (RFC 9000). Stream resets always carry application
codes, so the default is
'application'
.import { QuicError } from 'node:quic';
const err = new QuicError('rejecting stream', { errorCode: 0x10cn });
console.log(err.code); // 'ERR_QUIC_STREAM_ABORTED'
console.log(err.errorCode); // 268n
console.log(err.type); // 'application'
const custom = new QuicError('custom failure', {
errorCode: 0x10cn,
code: 'ERR_MY_QUIC_FAILURE',
});
console.log(custom.code); // 'ERR_MY_QUIC_FAILURE'<bigint>The numeric QUIC error code carried by this error.
<string>Either 'application' or 'transport'. Indicates the namespace of
error.errorCode.
<Promise>A promise that is fulfilled when the stream is fully closed. It resolves
when the stream closes cleanly (including idle timeout). It rejects with
an ERR_QUIC_APPLICATION_ERROR or ERR_QUIC_TRANSPORT_ERROR when the
stream is closed due to a QUIC error (e.g., stream reset by the peer,
CONNECTION_CLOSE with a non-zero error code).
stream.destroy
History
Added the options parameter accepting code and reason.
stream.destroy(error?, options?): void<any><Object>RESET_STREAM
and
STOP_SENDING
frames sent to the peer. Numbers are
coerced to
BigInt
. When omitted, the wire code is derived from
error
(see below).<string>session.close()
and
session.destroy()
, but
not transmitted on the wire
— neither
RESET_STREAM
nor
STOP_SENDING
carry a reason field. Provided for application logging
and for use by the
stream.onerror
callback.Immediately and abruptly destroys the stream. If error is provided and
stream.onerror is set, the onerror callback is invoked before
destruction. The stream.closed promise rejects with the error.
When the stream is destroyed with an error (or with an explicit
options.code), the QUIC stack signals the abort to the peer:
- If the writable side is still open, a
RESET_STREAMframe is sent. - If the readable side is still open (a bidirectional stream, or a
remote-initiated unidirectional stream), a
STOP_SENDINGframe is sent.
Both frames carry the same wire code, resolved with the following precedence:
options.code, when explicitly provided.error.errorCode, whenerroris aQuicError.- The negotiated application protocol's "internal error" code
(
H3_INTERNAL_ERROR(0x102) for HTTP/3, or the QUIC transport-layerINTERNAL_ERROR(0x1) for raw QUIC).
A clean destroy — no error and no options.code — does not emit
RESET_STREAM or STOP_SENDING; the stream's existing close machinery
handles teardown.
See Aborting a stream for an overview of the available stream-abort APIs.
<boolean>True if stream.destroy() has been called.
A QuicStream can be aborted in three ways, each producing different wire-frame side effects:
writer.fail(reason)— Aborts only the writable side. SendsRESET_STREAMto the peer. The readable side is unaffected; any data already buffered for read remains available.stream.destroy()with anerrorargument — Tears the stream down completely. SendsRESET_STREAMon any still-open writable side andSTOP_SENDINGon any still-open readable side. The wire code is derived fromerror(seestream.destroy()for the precedence rules).stream.destroy()with an explicitoptions.code— Same as the previous form but with a caller-supplied wire code, which takes precedence over any code carried byerror.
When error is a QuicError, its error.errorCode is used as
the wire code for both writer.fail() and stream.destroy(). Otherwise
the implementation falls back to the negotiated application protocol's
"internal error" code (see QuicError).
<boolean>True if any data on this stream was received as 0-RTT (early data) before the TLS handshake completed. Early data is less secure and could potentially be replayed by an attacker. Applications should treat early data with appropriate caution.
This property is only meaningful on the server side. On the client
side, it is always false.
The directionality of the stream, or null if the stream has been destroyed
or is still pending. Read only.
<number>The maximum number of bytes that the writer will buffer before
writeSync() returns false. When the buffered data exceeds this limit,
the caller should wait for drain before writing more.
The value can be changed dynamically at any time. This is particularly
useful for streams received via the onstream callback, where the
default (65536) may need to be adjusted based on application needs.
The valid range is 0 to 4294967295.
The stream ID, or null if the stream has been destroyed or is still
pending. Read only.
<Function>
|
<undefined>An optional callback invoked when the stream is destroyed with an error.
This includes errors caused by user callbacks that throw or reject (see
Callback error handling). The callback receives a single argument: the
error that triggered the destruction. If the onerror callback itself throws
or returns a promise that rejects, the error is surfaced as an uncaught
exception. Read/write.
The callback to invoke when the stream is blocked. Read/write.
The callback to invoke when the peer aborts a direction of the stream by
sending a RESET_STREAM frame (the peer abandons their writable side, so
no further data will arrive on our readable side) or a STOP_SENDING
frame (the peer asks us to stop writing on our writable side).
The callback receives a Node.js error whose errorCode (bigint)
property carries the application error code from the wire frame.
The stream is not automatically destroyed when this callback fires —
the application chooses how to react. Common patterns are: ignore (and
continue using the still-active direction on a bidirectional stream),
abort the other direction with writer.fail(), or tear down the
whole stream with stream.destroy(). Read/write.
<Object>
|
<undefined>The buffered initial headers received on this stream, or undefined if the
application does not support headers or no headers have been received yet.
For server-side streams, this contains the request headers (e.g., :method,
:path, :scheme). For client-side streams, this contains the response
headers (e.g., :status).
Header names are lowercase strings. Multi-value headers are represented as
arrays. The object has __proto__: null.
<Function>The callback to invoke when initial headers are received on the stream. The
callback receives (headers) where headers is an object (same format as
stream.headers). For HTTP/3, this delivers request pseudo-headers on the
server side and response headers on the client side. Throws
ERR_INVALID_STATE if set on a session that does not support headers.
Read/write.
<Function>The callback to invoke when trailing headers are received from the peer.
The callback receives (trailers) where trailers is an object in the
same format as stream.headers. Throws ERR_INVALID_STATE if set on a
session that does not support headers. Read/write.
<Function>The callback to invoke when informational (1xx) headers are received from
the server. The callback receives (headers) where headers is an object
in the same format as stream.headers. Informational headers are sent
before the final response (e.g., 103 Early Hints). Throws
ERR_INVALID_STATE if set on a session that does not support headers.
Read/write.
<Function>The callback to invoke when the application is ready for trailing headers
to be sent. This is called synchronously — the user must call
stream.sendTrailers() within this callback. Throws
ERR_INVALID_STATE if set on a session that does not support headers.
Read/write.
<Object>
|
<undefined>Set trailing headers to be sent automatically when the application requests
them. This is an alternative to the stream.onwanttrailers callback
for cases where the trailers are known before the body completes. Throws
ERR_INVALID_STATE if set on a session that does not support headers.
Read/write.
stream.sendHeaders(headers, options?): boolean<boolean>Sends initial or response headers on the stream. For client-side streams,
this sends request headers. For server-side streams, this sends response
headers. Throws ERR_INVALID_STATE if the session does not support headers.
stream.sendInformationalHeaders(headers): boolean<Object>:status
with a 1xx
value (e.g.,
{ ':status': '103', 'link': '</style.css>; rel=preload' }
).<boolean>Sends informational (1xx) response headers. Server only. Throws
ERR_INVALID_STATE if the session does not support headers.
stream.sendTrailers(headers): boolean<Object><boolean>Sends trailing headers on the stream. Must be called synchronously during
the stream.onwanttrailers callback, or set ahead of time via
stream.pendingTrailers. Throws ERR_INVALID_STATE if the session
does not support headers.
The current priority of the stream. Returns null if the session does not
support priority (e.g. non-HTTP/3) or if the stream has been destroyed.
Read only. Use stream.setPriority() to change the priority.
On client-side HTTP/3 sessions, the value reflects what was set via
stream.setPriority(). On server-side HTTP/3 sessions, the value
reflects the peer's requested priority (e.g., from PRIORITY_UPDATE frames).
stream.setPriority(options?): voidSets the priority of the stream. Throws ERR_INVALID_STATE if the session
does not support priority (e.g. non-HTTP/3). Has no effect if the stream
has been destroyed.
stream[Symbol.asyncIterator](): AsyncIterableIterator<Uint8Array[]>The stream implements Symbol.asyncIterator, making it directly usable
in for await...of loops. Each iteration yields a batch of Uint8Array
chunks.
Only one async iterator can be obtained per stream. A second call throws
ERR_INVALID_STATE. Non-readable streams (outbound-only unidirectional
or closed) return an immediately-finished iterator.
for await (const chunks of stream) {
for (const chunk of chunks) {
// Process each Uint8Array chunk
}
}Compatible with stream/iter utilities:
import Stream from 'node:stream/iter';
const body = await Stream.bytes(stream);
const text = await Stream.text(stream);
await Stream.pipeTo(stream, someWriter);<Object>Returns a Writer object for pushing data to the stream incrementally. The Writer implements the stream/iter Writer interface with the try-sync-fallback-to-async pattern.
Only available when no body source was provided at creation time or via
stream.setBody(). Non-writable streams return an already-closed
Writer. Throws ERR_INVALID_STATE if the outbound is already configured.
The Writer has the following methods:
writeSync(chunk)— Synchronous write. Returnstrueif accepted,falseif flow-controlled. Data is NOT accepted onfalse.write(chunk[, options])— Async write with drain wait.options.signalis checked at entry but not observed during the write.writevSync(chunks)— Synchronous vectored write. All-or-nothing.writev(chunks[, options])— Async vectored write.endSync()— Synchronous close. Returns total bytes or-1.end([options])— Async close.fail(reason)— Errors the stream (sendsRESET_STREAMto peer). Whenreasonis aQuicError, itserror.errorCodeis used as the wire code on the resultingRESET_STREAMframe; otherwise the wire code falls back to the negotiated application protocol's "internal error" code (H3_INTERNAL_ERROR(0x102) for HTTP/3, or the QUIC transport-layerINTERNAL_ERROR(0x1) for raw QUIC). Seestream.destroy()for a full-stream abort that also resets the readable side viaSTOP_SENDING.desiredSize— Available capacity in bytes, ornullif closed/errored.
The bytes from each writeSync() / writevSync() / write() / writev()
input chunk are copied into an internal buffer, so the caller's source
buffer is unchanged and may be reused or mutated immediately after the
call returns. Callers that want to ensure a source buffer cannot be
mutated after handing it off can call ArrayBuffer.prototype.transfer()
themselves before passing the buffer.
stream.setBody(body): void<string>
|
<ArrayBuffer>
|
<SharedArrayBuffer>
|
<Blob>
|
<FileHandle>
|
<AsyncIterable>
|
<Promise>
|
<null>Sets the outbound body source for the stream. Can only be called once.
Mutually exclusive with stream.writer.
The following body source types are supported:
null— The writable side is closed immediately (FIN sent with no data).string— UTF-8 encoded and sent as a single chunk.ArrayBuffer,SharedArrayBuffer,ArrayBufferView— Sent as a single chunk. The bytes are copied into an internal buffer, so the caller's source buffer is unchanged and may be reused or mutated immediately after the call returns. Callers wanting to ensure their source cannot be mutated after handing it off can callArrayBuffer.prototype.transfer()themselves before passing the buffer.Blob— Sent from the Blob's underlying data queue.<FileHandle>— The file contents are read asynchronously via an fd-backed data source. TheFileHandlemust be opened for reading (e.g. viafs.promises.open(path, 'r')). Once passed as a body, theFileHandleis locked and cannot be used as a body for another stream. TheFileHandleis automatically closed when the stream finishes.AsyncIterable,Iterable— Each yielded chunk (string orUint8Array) is written incrementally in streaming mode.Promise— Awaited; the resolved value is used as the body (subject to the same type rules).
Throws ERR_INVALID_STATE if the outbound is already configured or if
the writer has been accessed.
<quic.QuicSession>
|
<null>The session that created this stream, or null if the stream has been
destroyed. Read only.
The current statistics for the stream. Read only.
<bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint><bigint>Type: EndpointOptions
History
<Object>The endpoint configuration options passed when constructing a new QuicEndpoint instance.
<net.SocketAddress>
|
<string>If not specified the endpoint will bind to IPv4 localhost on a random port.
The endpoint maintains an internal cache of validated socket addresses as a performance optimization. This option sets the maximum number of addresses that are cached. This is an advanced option that users typically won't have need to specify.
<boolean>When true, the endpoint will not send stateless reset packets in response
to packets from unknown connections. Stateless resets allow a peer to detect
that a connection has been lost even when the server has no state for it.
Disabling them may be useful in testing or when stateless resets are handled
at a different layer.
<number>0The number of seconds an endpoint will remain alive after all sessions have
closed and it is no longer listening. A value of 0 (default) means the
endpoint is only destroyed when explicitly closed via endpoint.close() or
endpoint.destroy(). A positive value starts an idle timer when the endpoint
becomes idle; if no new sessions are created before the timer fires, the
endpoint is automatically destroyed. This is useful for connection pooling
where endpoints should linger briefly for reuse by future connect() calls.
<boolean>When true, indicates that the endpoint should bind only to IPv6 addresses.
<number>0
(unlimited)Specifies the maximum number of concurrent sessions allowed per remote IP
address (ignoring port). When the limit is reached, new connections from the
same IP are refused with CONNECTION_REFUSED. A value of 0 disables the
limit. The maximum value is 65535.
This limit can also be changed dynamically after construction via
endpoint.maxConnectionsPerHost.
<number>0
(unlimited)Specifies the maximum total number of concurrent sessions across all remote
addresses. When the limit is reached, new connections are refused with
CONNECTION_REFUSED. A value of 0 disables the limit. The maximum value is
65535.
This limit can also be changed dynamically after construction via
endpoint.maxConnectionsTotal.
Specifies the maximum number of QUIC retry attempts allowed per remote peer address.
Specifies the maximum number of stateless resets that are allowed per remote peer address.
Specifies the length of time a QUIC retry token is considered valid.
Specifies the 16-byte secret used to generate QUIC retry tokens.
Specifies the length of time a QUIC token is considered valid.
Specifies the 16-byte secret used to generate QUIC tokens.
<number><number><number><boolean>When true, requires that the endpoint validate peer addresses using retry packets
while establishing a new connection.
Type: SessionOptions
History
<string><string[]>
(server)The ALPN (Application-Layer Protocol Negotiation) identifier(s).
For client sessions, this is a single string specifying the protocol
the client wants to use (e.g. 'h3').
For server sessions, this is an array of protocol names in preference
order that the server supports (e.g. ['h3', 'h3-29']). During the TLS
handshake, the server selects the first protocol from its list that the
client also supports.
The negotiated ALPN determines which Application implementation is used
for the session. 'h3' and 'h3-*' variants select the HTTP/3
application; all other values select the default application.
Default: 'h3'
<Object>HTTP/3 application-specific options. These only apply when the negotiated
ALPN selects the HTTP/3 application ('h3').
<number>128<number>8192<number>0
means unlimited.
Default:
0<number>0
to disable the dynamic table.
Default:
4096<number>4096<number>100<boolean>false<boolean>falseconst { listen } = await import('node:quic');
await listen((session) => { /* ... */ }, {
application: {
maxHeaderPairs: 64,
qpackMaxDTableCapacity: 8192,
enableDatagrams: true,
},
// ... other session options
});sessionOptions.ca (client only)
History
<ArrayBuffer>
|
<ArrayBuffer[]>The CA certificates to use for client sessions. For server sessions, CA
certificates are specified per-identity in the sessionOptions.sni map.
<string>Specifies the congestion control algorithm that will be used.
Must be set to one of either 'reno', 'cubic', or 'bbr'.
This is an advanced option that users typically won't have need to specify.
sessionOptions.certs (client only)
History
<ArrayBuffer>
|
<ArrayBuffer[]>The TLS certificates to use for client sessions. For server sessions,
certificates are specified per-identity in the sessionOptions.sni map.
<string>The list of supported TLS 1.3 cipher algorithms.
sessionOptions.crl (client only)
History
<ArrayBuffer>
|
<ArrayBuffer[]>The CRL to use for client sessions. For server sessions, CRLs are specified
per-identity in the sessionOptions.sni map.
<boolean>trueWhen true, enables TLS 0-RTT early data for this session. Early data
allows the client to send application data before the TLS handshake
completes, reducing latency on reconnection when a valid session ticket
is available. Set to false to disable early data support.
<string>The list of supported TLS 1.3 cipher groups.
<boolean>When true, enables TLS key logging for the session. Key material is
delivered to the session.onkeylog callback in NSS Key Log Format.
Each callback invocation receives a single line of key material. The output
can be used with tools such as Wireshark to decrypt captured QUIC traffic.
sessionOptions.keys (client only)
History
CryptoKey is no longer accepted.
<KeyObject>
|
<KeyObject[]>The TLS crypto keys to use for client sessions. For server sessions,
keys are specified per-identity in the sessionOptions.sni map.
Specifies the maximum UDP packet payload size.
Specifies the maximum stream flow-control window size.
Specifies the maximum session flow-control window size.
<number>The minimum QUIC version number to allow. This is an advanced option that users typically won't have need to specify.
<string>'use'
,
'ignore'
, or
'default'
.When the remote peer advertises a preferred address, this option specifies whether to use it or ignore it.
<boolean>When true, enables qlog diagnostic output for the session. Qlog data
is delivered to the session.onqlog callback as chunks of JSON-SEQ
formatted text. The output can be analyzed with qlog visualization tools
such as qvis.
<string>'drop-oldest'Controls which datagram to drop when the pending datagram queue
(sized by session.maxPendingDatagrams) is full. Must be one of
'drop-oldest' (discard the oldest queued datagram to make room) or
'drop-newest' (reject the incoming datagram). Dropped datagrams are
reported as lost via the ondatagramstatus callback.
This option is immutable after session creation.
<number>5The maximum number of SendPendingData cycles a datagram can survive
without being sent before it is abandoned. When a datagram cannot be
sent due to congestion control or packet size constraints, it remains
in the queue and the attempt counter increments. Once the limit is
reached, the datagram is dropped and reported as 'abandoned' via the
ondatagramstatus callback. Valid range: 1 to 255.
<number>3A multiplier applied to the Probe Timeout (PTO) to compute the draining
period duration after receiving a CONNECTION_CLOSE frame from the peer.
RFC 9000 Section 10.2 requires the draining period to persist for at least
three times the current PTO. The valid range is 3 to 255. Values below
3 are clamped to 3.
Specifies the maximum number of milliseconds a TLS handshake is permitted to take to complete before timing out.
Specifies the keep-alive timeout in milliseconds. When set to a non-zero
value, PING frames will be sent automatically to keep the connection alive
before the idle timeout fires. The value should be less than the effective
idle timeout (maxIdleTimeout transport parameter) to be useful.
sessionOptions.servername (client only)
History
<string>The peer server name to target (SNI). Defaults to 'localhost'.
sessionOptions.sni (server only)
History
<Object>An object mapping host names to TLS identity options for Server Name
Indication (SNI) support. This is required for server sessions and must
contain at least one entry. The special key '*' specifies the optional
default/fallback identity used when no other host name matches. If no
wildcard entry is provided, connections with unrecognized server names
will be rejected with a TLS unrecognized_name alert. Each entry may
contain:
<KeyObject>
|
<KeyObject[]><ArrayBuffer>
|
<ArrayBuffer[]><boolean>false
.<number>443
. Only used for HTTP/3 sessions.<boolean>true
. Set to
false
to exclude a host name
from ORIGIN advertisements. Wildcard (
'*'
) entries are always
excluded regardless of this setting.const endpoint = await listen(callback, {
sni: {
'*': { keys: [defaultKey], certs: [defaultCert] },
'api.example.com': { keys: [apiKey], certs: [apiCert], port: 8443 },
'www.example.com': { keys: [wwwKey], certs: [wwwCert], ca: [customCA] },
'internal.example.com': { keys: [intKey], certs: [intCert], authoritative: false },
},
});Shared TLS options (such as ciphers, groups, keylog, and verifyClient)
are specified at the top level of the session options and apply to all
identities. Each SNI entry overrides only the per-identity certificate
fields.
The SNI map can be replaced at runtime using endpoint.setSNIContexts(),
which atomically swaps the map for new sessions while existing sessions
continue to use their original identity.
<boolean>True to enable TLS tracing output.
sessionOptions.token (client only)
History
An opaque address validation token previously received from the server
via the session.onnewtoken callback. Providing a valid token on
reconnection allows the client to skip the server's address validation,
reducing handshake latency.
The QUIC transport parameters to use for the session.
Specifies the maximum number of unacknowledged packets a session should allow.
<boolean>trueIf true, the peer certificate is verified against the list of supplied CAs.
An error is emitted if verification fails; the error can be inspected via
the validationErrorReason and validationErrorCode fields in the
handshake callback. If false, peer certificate verification errors are
ignored.
<boolean>trueWhen true (the default), connect() will attempt to reuse an existing
endpoint rather than creating a new one for each session. This provides
connection pooling behavior — multiple sessions can share a single UDP
socket. The reuse logic will not return an endpoint that is listening on
the same address as the connect target (to prevent CID routing conflicts).
Set to false to force creation of a new endpoint for the session. This
is useful when endpoint isolation is required (e.g., testing stateless
reset behavior where source port identity matters).
<boolean>True to require verification of TLS client certificate.
sessionOptions.verifyPrivateKey (client only)
History
<boolean>True to require private key verification for client sessions. For server
sessions, this option is specified per-identity in the
sessionOptions.sni map.
<number>The QUIC version number to use. This is an advanced option that users typically won't have need to specify.
Type: TransportParams
History
<net.SocketAddress><net.SocketAddress>The maximum size in bytes of a DATAGRAM frame payload that this endpoint
is willing to receive. Set to 0 to disable datagram support. The peer
will not send datagrams larger than this value. The actual maximum size of
a datagram that can be sent is determined by the peer's
maxDatagramFrameSize, not this endpoint's value.
All session and stream callbacks may be synchronous functions or async functions. If a callback throws synchronously or returns a promise that rejects, the error is caught and the owning session or stream is destroyed with that error:
- Stream callbacks (
onblocked,onreset,onheaders,ontrailers,oninfo,onwanttrailers): the stream is destroyed. - Session callbacks (
onstream,ondatagram,ondatagramstatus,onpathvalidation,onsessionticket,onnewtoken,onversionnegotiation,onorigin,ongoaway,onhandshake,onkeylog,onqlog): the session is destroyed along with all of its streams.
Before destruction, the optional session.onerror or
stream.onerror callback is invoked (if set), giving the application a
chance to observe or log the error. The session.closed or stream.closed
promise will reject with the error.
If the onerror callback itself throws or returns a promise that rejects,
the error from onerror is surfaced as an uncaught exception.
Callback: OnSessionCallback
History
<quic.QuicEndpoint><quic.QuicSession>The callback function that is invoked when a new session is initiated by a remote peer.
Callback: OnStreamCallback
History
<quic.QuicSession><quic.QuicStream>Callback: OnDatagramCallback
History
Callback: OnDatagramStatusCallback
History
<quic.QuicSession><bigint><string>'acknowledged'
,
'lost'
, or
'abandoned'
.
'acknowledged'
means the peer confirmed receipt.
'lost'
means the
datagram was sent but the network lost it.
'abandoned'
means the
datagram was never sent on the wire (dropped due to queue overflow,
send attempt limit exceeded, or frame size rejection).Callback: OnPathValidationCallback
History
<quic.QuicSession><string>'success'
,
'failure'
, or
'aborted'
.<net.SocketAddress><net.SocketAddress><net.SocketAddress>
|
<null>null
if this is the first path validation (e.g., preferred address
migration from the client's perspective).<net.SocketAddress>
|
<null>null
.<boolean>true
if the path validation was triggered by
a preferred address migration on the client side.
undefined
on the server side.Callback: OnSessionTicketCallback
History
<quic.QuicSession><Object>Callback: OnVersionNegotiationCallback
History
<quic.QuicSession><number><number[]><number[]>[minVersion, maxVersion]
.Called when the server responds to the client's Initial packet with a Version Negotiation packet, indicating that the version used by the client is not supported. The session is always destroyed immediately after this callback returns.
Callback: OnHandshakeCallback
History
<quic.QuicSession><Object>session.opened
resolves with.<net.SocketAddress><net.SocketAddress><string><string><string><string><string><number>0
if validation succeeded.<boolean><boolean>Callback: OnNewTokenCallback
History
<quic.QuicSession><Buffer>Callback: OnOriginCallback
History
<quic.QuicSession><string[]>Callback: OnKeylogCallback
History
<quic.QuicSession><string>Called when TLS key material is available. Only fires when
sessionOptions.keylog is true. Multiple lines are emitted during the
TLS 1.3 handshake, each containing a secret label, the client random, and
the secret value.
Callback: OnQlogCallback
History
<quic.QuicSession><boolean>true
if this is the final qlog chunk for the session.Called when qlog diagnostic data is available. Only fires when
sessionOptions.qlog is true. The data chunks should be
concatenated in order to produce the complete qlog output. When fin is
true, no more chunks will be emitted and the concatenated result is a
complete JSON-SEQ document.
Callback: OnBlockedCallback
History
<quic.QuicStream>Callback: OnStreamErrorCallback
History
<quic.QuicStream><any>Callback: OnHeadersCallback
History
<quic.QuicStream><Object>Called when initial request or response headers are received. For HTTP/3, this delivers request pseudo-headers on the server and response headers on the client.
Callback: OnTrailersCallback
History
<quic.QuicStream><Object>Called when trailing headers are received from the peer.
Callback: OnInfoCallback
History
<quic.QuicStream><Object>Called when informational (1xx) headers are received from the server (e.g., 103 Early Hints).
HTTP/3 support
History
When the negotiated ALPN identifier is 'h3' (or one of the 'h3-*'
draft variants), the QUIC session runs the HTTP/3 application backed
by nghttp3. 'h3' is the default ALPN for quic.connect() and
quic.listen(), so HTTP/3 is what you get unless you select a
different ALPN explicitly.
Selecting the HTTP/3 application enables a number of stream- and session-level capabilities that are not available to non-HTTP/3 applications:
- Headers and trailers — request and response header blocks
(including pseudo-headers such as
:method,:path,:scheme,:authority, and:status), trailing headers, and informational (1xx) responses. Seestream.sendHeaders(),stream.sendTrailers(), andstream.sendInformationalHeaders(). - Stream priority (RFC 9218) — per-stream urgency and
incremental flags. See
stream.priorityandstream.setPriority(). - HTTP/3 datagrams (RFC 9297) — unreliable application-layer
datagrams. The peer must advertise
SETTINGS_H3_DATAGRAM=1, which is enabled by settingapplication.enableDatagramstotrueon both peers. Seesession.sendDatagram()andsession.ondatagram. - ORIGIN frame (RFC 9412) — servers automatically advertise the
hostnames in their
sessionOptions.snimap (entries withauthoritative: true); clients receive the list viasession.onorigin. - GOAWAY — graceful shutdown. The server emits
GOAWAYas part ofsession.close(); the client observes it viasession.ongoawayand stops opening new bidirectional streams. - Extended CONNECT settings (RFC 9220) — the
SETTINGS_ENABLE_CONNECT_PROTOCOLsetting can be enabled viaapplication.enableConnectProtocol. The setting is exchanged but the application is responsible for handling the:protocolpseudo-header and any payload framing on top. - QPACK tuning — dynamic-table size and blocked-streams limits
via
application.qpackMaxDTableCapacityand friends.
import { connect } from 'node:quic';
import process from 'node:process';
const session = await connect('example.com:443', {
// ALPN defaults to 'h3'.
servername: 'example.com',
});
await session.opened;
const stream = await session.createBidirectionalStream({
headers: {
':method': 'GET',
':path': '/',
':scheme': 'https',
':authority': 'example.com',
},
onheaders(headers) {
console.log('status:', headers[':status']);
},
});
const decoder = new TextDecoder();
for await (const chunks of stream) {
for (const chunk of chunks) {
process.stdout.write(decoder.decode(chunk, { stream: true }));
}
}
await session.close();A few things to note:
session.createBidirectionalStream({ headers })automatically marks the HEADERS frame as terminal when nobodyis provided — the request isHEADERSfollowed byEND_STREAM.- The
onheaderscallback receives the response pseudo-headers and regular headers in a single object with lowercase string keys. After the callback returns, the same object is also accessible viastream.headers. - Reading
for await (const chunks of stream)consumes the response body. Each iteration yields aUint8Array[]batch of chunks. - HTTP semantic helpers (URL parsing, method/status validation, redirects, content negotiation, and so on) are intentionally not built in. The caller is responsible for any HTTP-level handling beyond the wire framing.
import { listen } from 'node:quic';
const encoder = new TextEncoder();
const endpoint = await listen((session) => {
// The session.onstream callback fires for each new client-initiated stream.
}, {
sni: { '*': { keys: [defaultKey], certs: [defaultCert] } },
// ALPN defaults to 'h3'.
onheaders(headers) {
// `this` is the QuicStream. Pseudo-headers are available on the
// request header block (`:method`, `:path`, `:scheme`,
// `:authority`).
if (headers[':path'] === '/health') {
this.sendHeaders({ ':status': '200', 'content-type': 'text/plain' });
const w = this.writer;
w.writeSync(encoder.encode('ok\n'));
w.endSync();
} else {
this.sendHeaders({ ':status': '404' }, { terminal: true });
}
},
});
console.log('listening on', endpoint.address);Server-side notes:
- Setting
onheadersat thelisten()level applies it to every incoming stream (it is wired up beforeonstreamfires). Setting it insideonstreamis too late for HTTP/3, where the request HEADERS frame is the first thing that arrives on the stream. this.sendHeaders(headers, { terminal: true })marks the response HEADERS frame as terminal (no body follows).- For body responses, send headers first, then write to
this.writerand callendSync()to send the body and close the stream cleanly.
- Server push —
PUSH_PROMISEand the related push-stream machinery are not implemented and are not on the near-term roadmap. Server push has limited deployment in practice, and most use cases are better served by Early Hints (103) or by direct fetches from the client. - WebTransport / extended-CONNECT helpers — the
SETTINGS_ENABLE_CONNECT_PROTOCOLsetting can be negotiated but there is no built-in support for the:protocolpseudo-header, WebTransport datagram demultiplexing, or capsule framing. - Higher-level HTTP semantics — there is no built-in
request/response router, URL parsing, content-encoding
negotiation, body-type coercion, redirect following, or
cookie handling. These are deliberately left to higher-level
libraries built on top of
node:quic.
Performance measurement
History
QUIC sessions, streams, and endpoints emit PerformanceEntry objects
with entryType set to 'quic'. These entries are only created when a
PerformanceObserver is observing the 'quic' entry type, ensuring
zero overhead when not in use.
Each entry provides:
<string>'QuicEndpoint'
,
'QuicSession'
, or
'QuicStream'
.<string>'quic'
.<number><number><Object>detail.stats{QuicEndpointStats} The endpoint's statistics object (frozen at destruction time).
detail.stats{QuicSessionStats} The session's statistics object (frozen at destruction time). Includes bytes sent/received, RTT measurements, congestion window, packet counts, and more.detail.handshake<Object>|<undefined>Timing-relevant handshake metadata, orundefinedif the handshake did not complete before destruction.Attributesdetail.path<Object>|<undefined>The session's network path, orundefinedif not yet established.Attributeslocal:<net.SocketAddress>remote:<net.SocketAddress>
detail.stats{QuicStreamStats} The stream's statistics object (frozen at destruction time). Includes bytes sent/received, timing timestamps, and offset tracking.detail.direction<string>Either'bidi'or'uni'.
import { PerformanceObserver } from 'node:perf_hooks';
const obs = new PerformanceObserver((list) => {
for (const entry of list.getEntries()) {
console.log(`${entry.name}: ${entry.duration.toFixed(1)}ms`);
if (entry.name === 'QuicSession') {
const { stats, handshake } = entry.detail;
console.log(` protocol: ${handshake?.protocol}`);
console.log(` bytes sent: ${stats.bytesSent}`);
console.log(` smoothed RTT: ${stats.smoothedRtt}ns`);
}
}
});
obs.observe({ entryTypes: ['quic'] });Channel: quic.endpoint.created
History
<quic.QuicEndpoint><quic.EndpointOptions>Published when a new endpoint is created.
Channel: quic.endpoint.listen
History
<quic.QuicEndpoint><quic.SessionOptions>Published when an endpoint begins listening for incoming connections.
Channel: quic.endpoint.connect
History
<quic.QuicEndpoint><net.SocketAddress><quic.SessionOptions>Published when quic.connect() is about to create a client session.
Fires before the ngtcp2 connection is established, allowing diagnostic
subscribers to observe the connection intent.
Channel: quic.endpoint.closing
History
<quic.QuicEndpoint><boolean>Published when an endpoint begins gracefully closing.
Channel: quic.endpoint.closed
History
<quic.QuicEndpoint>Published when an endpoint has finished closing and is destroyed.
Channel: quic.endpoint.error
History
<quic.QuicEndpoint><any>Published when an endpoint encounters an error that causes it to close.
Channel: quic.endpoint.busy.change
History
<quic.QuicEndpoint><boolean>Published when an endpoint's busy state changes.
Channel: quic.session.created.client
History
<quic.QuicEndpoint><quic.QuicSession><net.SocketAddress><quic.SessionOptions>Published when a client-initiated session is created.
Channel: quic.session.created.server
History
<quic.QuicEndpoint><quic.QuicSession><net.SocketAddress>
|
<undefined>Published when a server-side session is created for an incoming connection.
Channel: quic.session.open.stream
History
Published when a locally-initiated stream is opened.
Channel: quic.session.received.stream
History
Published when a remotely-initiated stream is received.
Channel: quic.session.send.datagram
History
<bigint><number><quic.QuicSession>Published when a datagram is queued for sending.
Channel: quic.session.update.key
History
<quic.QuicSession>Published when a TLS key update is initiated.
Channel: quic.session.closing
History
<quic.QuicSession>Published when a session begins gracefully closing (including when a GOAWAY frame is received from the peer).
Channel: quic.session.closed
History
<quic.QuicSession><any>undefined
if clean.<quic.QuicSession.Stats>Published when a session is destroyed. The stats object is a snapshot
of the final statistics at the time of destruction.
Channel: quic.session.error
History
<quic.QuicSession><any>Published when a session is destroyed due to an error. Fires before the
onerror callback and before streams are torn down. Unlike
quic.session.closed (which fires for both clean and error closes), this
channel fires only when an error is present, making it suitable for
error-only alerting.
Channel: quic.session.receive.datagram
History
<number><boolean><quic.QuicSession>Published when a datagram is received from the remote peer.
Channel: quic.session.receive.datagram.status
History
<bigint><string>'acknowledged'
,
'lost'
, or
'abandoned'
.<quic.QuicSession>Published when the delivery status of a sent datagram is updated.
Channel: quic.session.path.validation
History
<string>'success'
,
'failure'
, or
'aborted'
.<net.SocketAddress><net.SocketAddress><net.SocketAddress>
|
<null><net.SocketAddress>
|
<null><boolean><quic.QuicSession>Published when a path validation attempt completes.
Channel: quic.session.new.token
History
<Buffer><net.SocketAddress><quic.QuicSession>Published when a client session receives a NEW_TOKEN frame from the server.
Channel: quic.session.ticket
History
<Object><quic.QuicSession>Published when a new TLS session ticket is received.
Channel: quic.session.version.negotiation
History
<number><number[]><number[]><quic.QuicSession>Published when the client receives a Version Negotiation packet from the server. The session is always destroyed immediately after.
Channel: quic.session.receive.origin
History
<string[]><quic.QuicSession>Published when the session receives an ORIGIN frame (RFC 9412) from the peer.
Channel: quic.session.handshake
History
Published when the TLS handshake completes.
Channel: quic.session.goaway
History
<quic.QuicSession><bigint>Published when the peer sends an HTTP/3 GOAWAY frame. Streams with IDs
above lastStreamId were not processed and can be retried on a new
connection. A lastStreamId of -1n indicates a shutdown notice without
a stream boundary.
Channel: quic.session.early.rejected
History
<quic.QuicSession>Published when the server rejects 0-RTT early data. All streams that were opened during the 0-RTT phase have been destroyed. Useful for diagnosing latency regressions when 0-RTT is expected to succeed.
Channel: quic.stream.closed
History
<quic.QuicStream><quic.QuicSession><any>undefined
if clean.<quic.QuicStream.Stats>Published when a stream is destroyed. The stats object is a snapshot
of the final statistics at the time of destruction.
Channel: quic.stream.headers
History
<quic.QuicStream><quic.QuicSession><Object>Published when initial headers are received on a stream. For HTTP/3
server-side streams, this contains request pseudo-headers (:method,
:path, etc.). For client-side streams, this contains response headers
(:status, etc.).
Channel: quic.stream.trailers
History
Published when trailing headers are received on a stream.
Channel: quic.stream.info
History
Published when informational (1xx) headers are received on a stream (e.g., 103 Early Hints).
Channel: quic.stream.reset
History
<quic.QuicStream><quic.QuicSession><any>Published when a stream receives a STOP_SENDING or RESET_STREAM frame from the peer, indicating the peer has aborted the stream. This is a key signal for diagnosing application-level issues such as cancelled requests.
Channel: quic.stream.blocked
History
<quic.QuicStream><quic.QuicSession>Published when a stream is flow-control blocked and cannot send data until the peer increases the flow control window. Useful for diagnosing throughput issues caused by flow control.