| OLD | NEW |
| (Empty) |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "net/quic/quic_server_session.h" | |
| 6 | |
| 7 #include "base/logging.h" | |
| 8 #include "net/quic/crypto/cached_network_parameters.h" | |
| 9 #include "net/quic/quic_connection.h" | |
| 10 #include "net/quic/quic_flags.h" | |
| 11 #include "net/quic/quic_spdy_server_stream.h" | |
| 12 #include "net/quic/reliable_quic_stream.h" | |
| 13 | |
| 14 namespace net { | |
| 15 | |
| 16 QuicServerSession::QuicServerSession(const QuicConfig& config, | |
| 17 QuicConnection* connection, | |
| 18 QuicServerSessionVisitor* visitor) | |
| 19 : QuicSession(connection, config), | |
| 20 visitor_(visitor), | |
| 21 bandwidth_estimate_sent_to_client_(QuicBandwidth::Zero()), | |
| 22 last_scup_time_(QuicTime::Zero()), | |
| 23 last_scup_sequence_number_(0) {} | |
| 24 | |
| 25 QuicServerSession::~QuicServerSession() {} | |
| 26 | |
| 27 void QuicServerSession::InitializeSession( | |
| 28 const QuicCryptoServerConfig* crypto_config) { | |
| 29 QuicSession::InitializeSession(); | |
| 30 crypto_stream_.reset(CreateQuicCryptoServerStream(crypto_config)); | |
| 31 } | |
| 32 | |
| 33 QuicCryptoServerStream* QuicServerSession::CreateQuicCryptoServerStream( | |
| 34 const QuicCryptoServerConfig* crypto_config) { | |
| 35 return new QuicCryptoServerStream(crypto_config, this); | |
| 36 } | |
| 37 | |
| 38 void QuicServerSession::OnConfigNegotiated() { | |
| 39 QuicSession::OnConfigNegotiated(); | |
| 40 | |
| 41 if (!config()->HasReceivedConnectionOptions()) { | |
| 42 return; | |
| 43 } | |
| 44 | |
| 45 // If the client has provided a bandwidth estimate from the same serving | |
| 46 // region, then pass it to the sent packet manager in preparation for possible | |
| 47 // bandwidth resumption. | |
| 48 const CachedNetworkParameters* cached_network_params = | |
| 49 crypto_stream_->previous_cached_network_params(); | |
| 50 const bool max_bandwidth_resumption = | |
| 51 ContainsQuicTag(config()->ReceivedConnectionOptions(), kBWMX); | |
| 52 if (cached_network_params != nullptr && | |
| 53 (ContainsQuicTag(config()->ReceivedConnectionOptions(), kBWRE) || | |
| 54 max_bandwidth_resumption) && | |
| 55 cached_network_params->serving_region() == serving_region_) { | |
| 56 connection()->ResumeConnectionState(*cached_network_params, | |
| 57 max_bandwidth_resumption); | |
| 58 } | |
| 59 | |
| 60 if (FLAGS_enable_quic_fec && | |
| 61 ContainsQuicTag(config()->ReceivedConnectionOptions(), kFHDR)) { | |
| 62 // kFHDR config maps to FEC protection always for headers stream. | |
| 63 // TODO(jri): Add crypto stream in addition to headers for kHDR. | |
| 64 headers_stream_->set_fec_policy(FEC_PROTECT_ALWAYS); | |
| 65 } | |
| 66 } | |
| 67 | |
| 68 void QuicServerSession::OnConnectionClosed(QuicErrorCode error, | |
| 69 bool from_peer) { | |
| 70 QuicSession::OnConnectionClosed(error, from_peer); | |
| 71 // In the unlikely event we get a connection close while doing an asynchronous | |
| 72 // crypto event, make sure we cancel the callback. | |
| 73 if (crypto_stream_.get() != nullptr) { | |
| 74 crypto_stream_->CancelOutstandingCallbacks(); | |
| 75 } | |
| 76 visitor_->OnConnectionClosed(connection()->connection_id(), error); | |
| 77 } | |
| 78 | |
| 79 void QuicServerSession::OnWriteBlocked() { | |
| 80 QuicSession::OnWriteBlocked(); | |
| 81 visitor_->OnWriteBlocked(connection()); | |
| 82 } | |
| 83 | |
| 84 void QuicServerSession::OnCongestionWindowChange(QuicTime now) { | |
| 85 // Only send updates when the application has no data to write. | |
| 86 if (HasDataToWrite()) { | |
| 87 return; | |
| 88 } | |
| 89 | |
| 90 // If not enough time has passed since the last time we sent an update to the | |
| 91 // client, or not enough packets have been sent, then return early. | |
| 92 const QuicSentPacketManager& sent_packet_manager = | |
| 93 connection()->sent_packet_manager(); | |
| 94 int64 srtt_ms = | |
| 95 sent_packet_manager.GetRttStats()->smoothed_rtt().ToMilliseconds(); | |
| 96 int64 now_ms = now.Subtract(last_scup_time_).ToMilliseconds(); | |
| 97 int64 packets_since_last_scup = | |
| 98 connection()->sequence_number_of_last_sent_packet() - | |
| 99 last_scup_sequence_number_; | |
| 100 if (now_ms < (kMinIntervalBetweenServerConfigUpdatesRTTs * srtt_ms) || | |
| 101 now_ms < kMinIntervalBetweenServerConfigUpdatesMs || | |
| 102 packets_since_last_scup < kMinPacketsBetweenServerConfigUpdates) { | |
| 103 return; | |
| 104 } | |
| 105 | |
| 106 // If the bandwidth recorder does not have a valid estimate, return early. | |
| 107 const QuicSustainedBandwidthRecorder& bandwidth_recorder = | |
| 108 sent_packet_manager.SustainedBandwidthRecorder(); | |
| 109 if (!bandwidth_recorder.HasEstimate()) { | |
| 110 return; | |
| 111 } | |
| 112 | |
| 113 // The bandwidth recorder has recorded at least one sustained bandwidth | |
| 114 // estimate. Check that it's substantially different from the last one that | |
| 115 // we sent to the client, and if so, send the new one. | |
| 116 QuicBandwidth new_bandwidth_estimate = bandwidth_recorder.BandwidthEstimate(); | |
| 117 | |
| 118 int64 bandwidth_delta = | |
| 119 std::abs(new_bandwidth_estimate.ToBitsPerSecond() - | |
| 120 bandwidth_estimate_sent_to_client_.ToBitsPerSecond()); | |
| 121 | |
| 122 // Define "substantial" difference as a 50% increase or decrease from the | |
| 123 // last estimate. | |
| 124 bool substantial_difference = | |
| 125 bandwidth_delta > | |
| 126 0.5 * bandwidth_estimate_sent_to_client_.ToBitsPerSecond(); | |
| 127 if (!substantial_difference) { | |
| 128 return; | |
| 129 } | |
| 130 | |
| 131 bandwidth_estimate_sent_to_client_ = new_bandwidth_estimate; | |
| 132 DVLOG(1) << "Server: sending new bandwidth estimate (KBytes/s): " | |
| 133 << bandwidth_estimate_sent_to_client_.ToKBytesPerSecond(); | |
| 134 | |
| 135 // Include max bandwidth in the update. | |
| 136 QuicBandwidth max_bandwidth_estimate = | |
| 137 bandwidth_recorder.MaxBandwidthEstimate(); | |
| 138 int32 max_bandwidth_timestamp = bandwidth_recorder.MaxBandwidthTimestamp(); | |
| 139 | |
| 140 // Fill the proto before passing it to the crypto stream to send. | |
| 141 CachedNetworkParameters cached_network_params; | |
| 142 cached_network_params.set_bandwidth_estimate_bytes_per_second( | |
| 143 bandwidth_estimate_sent_to_client_.ToBytesPerSecond()); | |
| 144 cached_network_params.set_max_bandwidth_estimate_bytes_per_second( | |
| 145 max_bandwidth_estimate.ToBytesPerSecond()); | |
| 146 cached_network_params.set_max_bandwidth_timestamp_seconds( | |
| 147 max_bandwidth_timestamp); | |
| 148 cached_network_params.set_min_rtt_ms( | |
| 149 sent_packet_manager.GetRttStats()->min_rtt().ToMilliseconds()); | |
| 150 cached_network_params.set_previous_connection_state( | |
| 151 bandwidth_recorder.EstimateRecordedDuringSlowStart() | |
| 152 ? CachedNetworkParameters::SLOW_START | |
| 153 : CachedNetworkParameters::CONGESTION_AVOIDANCE); | |
| 154 cached_network_params.set_timestamp( | |
| 155 connection()->clock()->WallNow().ToUNIXSeconds()); | |
| 156 if (!serving_region_.empty()) { | |
| 157 cached_network_params.set_serving_region(serving_region_); | |
| 158 } | |
| 159 | |
| 160 crypto_stream_->SendServerConfigUpdate(&cached_network_params); | |
| 161 | |
| 162 connection()->OnSendConnectionState(cached_network_params); | |
| 163 | |
| 164 last_scup_time_ = now; | |
| 165 last_scup_sequence_number_ = | |
| 166 connection()->sequence_number_of_last_sent_packet(); | |
| 167 } | |
| 168 | |
| 169 bool QuicServerSession::ShouldCreateIncomingDataStream(QuicStreamId id) { | |
| 170 if (id % 2 == 0) { | |
| 171 DVLOG(1) << "Invalid incoming even stream_id:" << id; | |
| 172 connection()->SendConnectionClose(QUIC_INVALID_STREAM_ID); | |
| 173 return false; | |
| 174 } | |
| 175 if (GetNumOpenStreams() >= get_max_open_streams()) { | |
| 176 DVLOG(1) << "Failed to create a new incoming stream with id:" << id | |
| 177 << " Already " << GetNumOpenStreams() << " streams open (max " | |
| 178 << get_max_open_streams() << ")."; | |
| 179 connection()->SendConnectionClose(QUIC_TOO_MANY_OPEN_STREAMS); | |
| 180 return false; | |
| 181 } | |
| 182 return true; | |
| 183 } | |
| 184 | |
| 185 QuicDataStream* QuicServerSession::CreateIncomingDataStream( | |
| 186 QuicStreamId id) { | |
| 187 if (!ShouldCreateIncomingDataStream(id)) { | |
| 188 return nullptr; | |
| 189 } | |
| 190 | |
| 191 return new QuicSpdyServerStream(id, this); | |
| 192 } | |
| 193 | |
| 194 QuicDataStream* QuicServerSession::CreateOutgoingDataStream() { | |
| 195 DLOG(ERROR) << "Server push not yet supported"; | |
| 196 return nullptr; | |
| 197 } | |
| 198 | |
| 199 QuicCryptoServerStream* QuicServerSession::GetCryptoStream() { | |
| 200 return crypto_stream_.get(); | |
| 201 } | |
| 202 | |
| 203 } // namespace net | |
| OLD | NEW |