| Index: net/tools/quic/quic_server_session_test.cc
|
| diff --git a/net/tools/quic/quic_server_session_test.cc b/net/tools/quic/quic_server_session_test.cc
|
| index 1df0dc672976ba811f2dd6ccf1d2b44fbf3a5250..a7ec9feaf00367966f7831dbdaedc34a511aa889 100644
|
| --- a/net/tools/quic/quic_server_session_test.cc
|
| +++ b/net/tools/quic/quic_server_session_test.cc
|
| @@ -16,6 +16,7 @@
|
| #include "net/quic/test_tools/quic_data_stream_peer.h"
|
| #include "net/quic/test_tools/quic_sent_packet_manager_peer.h"
|
| #include "net/quic/test_tools/quic_session_peer.h"
|
| +#include "net/quic/test_tools/quic_spdy_session_peer.h"
|
| #include "net/quic/test_tools/quic_sustained_bandwidth_recorder_peer.h"
|
| #include "net/quic/test_tools/quic_test_utils.h"
|
| #include "net/test/gtest_util.h"
|
| @@ -31,6 +32,7 @@ using net::test::QuicConnectionPeer;
|
| using net::test::QuicDataStreamPeer;
|
| using net::test::QuicSentPacketManagerPeer;
|
| using net::test::QuicSessionPeer;
|
| +using net::test::QuicSpdySessionPeer;
|
| using net::test::QuicSustainedBandwidthRecorderPeer;
|
| using net::test::SupportedVersions;
|
| using net::test::ValueRestore;
|
| @@ -47,13 +49,14 @@ namespace test {
|
|
|
| class QuicServerSessionPeer {
|
| public:
|
| - static QuicDataStream* GetIncomingDataStream(
|
| - QuicServerSession* s, QuicStreamId id) {
|
| - return s->GetIncomingDataStream(id);
|
| + static ReliableQuicStream* GetIncomingDynamicStream(QuicServerSession* s,
|
| + QuicStreamId id) {
|
| + return s->GetIncomingDynamicStream(id);
|
| }
|
| static void SetCryptoStream(QuicServerSession* s,
|
| QuicCryptoServerStream* crypto_stream) {
|
| s->crypto_stream_.reset(crypto_stream);
|
| + s->static_streams()[kCryptoStreamId] = crypto_stream;
|
| }
|
| static bool IsBandwidthResumptionEnabled(QuicServerSession* s) {
|
| return s->bandwidth_resumption_enabled_;
|
| @@ -207,23 +210,23 @@ TEST_P(QuicServerSessionTest, MaxOpenStreams) {
|
| QuicStreamId stream_id = kClientDataStreamId1;
|
| // Open the max configured number of streams, should be no problem.
|
| for (size_t i = 0; i < kMaxStreamsForTest; ++i) {
|
| - EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDataStream(session_.get(),
|
| - stream_id));
|
| + EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDynamicStream(session_.get(),
|
| + stream_id));
|
| stream_id += 2;
|
| }
|
|
|
| // Open more streams: server should accept slightly more than the limit.
|
| for (size_t i = 0; i < kMaxStreamsMinimumIncrement; ++i) {
|
| - EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDataStream(session_.get(),
|
| - stream_id));
|
| + EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDynamicStream(session_.get(),
|
| + stream_id));
|
| stream_id += 2;
|
| }
|
|
|
| // Now violate the server's internal stream limit.
|
| EXPECT_CALL(*connection_, SendConnectionClose(QUIC_TOO_MANY_OPEN_STREAMS));
|
| stream_id += 2;
|
| - EXPECT_FALSE(
|
| - QuicServerSessionPeer::GetIncomingDataStream(session_.get(), stream_id));
|
| + EXPECT_FALSE(QuicServerSessionPeer::GetIncomingDynamicStream(session_.get(),
|
| + stream_id));
|
| }
|
|
|
| TEST_P(QuicServerSessionTest, MaxOpenStreamsImplicit) {
|
| @@ -241,19 +244,19 @@ TEST_P(QuicServerSessionTest, MaxOpenStreamsImplicit) {
|
| session_->get_max_open_streams());
|
|
|
| EXPECT_EQ(0u, session_->GetNumOpenStreams());
|
| - EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDataStream(
|
| + EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDynamicStream(
|
| session_.get(), kClientDataStreamId1));
|
| // Implicitly open streams up to the server's limit.
|
| const int kActualMaxStreams =
|
| kMaxStreamsForTest + kMaxStreamsMinimumIncrement;
|
| const int kMaxValidStreamId =
|
| kClientDataStreamId1 + (kActualMaxStreams - 1) * 2;
|
| - EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDataStream(
|
| + EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDynamicStream(
|
| session_.get(), kMaxValidStreamId));
|
|
|
| // Opening a further stream will result in connection close.
|
| EXPECT_CALL(*connection_, SendConnectionClose(QUIC_TOO_MANY_OPEN_STREAMS));
|
| - EXPECT_FALSE(QuicServerSessionPeer::GetIncomingDataStream(
|
| + EXPECT_FALSE(QuicServerSessionPeer::GetIncomingDynamicStream(
|
| session_.get(), kMaxValidStreamId + 2));
|
| }
|
|
|
| @@ -261,14 +264,15 @@ TEST_P(QuicServerSessionTest, GetEvenIncomingError) {
|
| // Incoming streams on the server session must be odd.
|
| EXPECT_CALL(*connection_, SendConnectionClose(QUIC_INVALID_STREAM_ID));
|
| EXPECT_EQ(nullptr,
|
| - QuicServerSessionPeer::GetIncomingDataStream(session_.get(), 4));
|
| + QuicServerSessionPeer::GetIncomingDynamicStream(session_.get(), 4));
|
| }
|
|
|
| TEST_P(QuicServerSessionTest, GetStreamDisconnected) {
|
| // Don't create new streams if the connection is disconnected.
|
| QuicConnectionPeer::CloseConnection(connection_);
|
| - EXPECT_DFATAL(QuicServerSessionPeer::GetIncomingDataStream(session_.get(), 5),
|
| - "ShouldCreateIncomingDataStream called when disconnected");
|
| + EXPECT_DFATAL(
|
| + QuicServerSessionPeer::GetIncomingDynamicStream(session_.get(), 5),
|
| + "ShouldCreateIncomingDynamicStream called when disconnected");
|
| }
|
|
|
| TEST_P(QuicServerSessionTest, SetFecProtectionFromConfig) {
|
| @@ -282,9 +286,9 @@ TEST_P(QuicServerSessionTest, SetFecProtectionFromConfig) {
|
|
|
| // Verify that headers stream is always protected and data streams are
|
| // optionally protected.
|
| - EXPECT_EQ(FEC_PROTECT_ALWAYS,
|
| - QuicSessionPeer::GetHeadersStream(session_.get())->fec_policy());
|
| - QuicDataStream* stream = QuicServerSessionPeer::GetIncomingDataStream(
|
| + EXPECT_EQ(FEC_PROTECT_ALWAYS, QuicSpdySessionPeer::GetHeadersStream(
|
| + session_.get())->fec_policy());
|
| + ReliableQuicStream* stream = QuicServerSessionPeer::GetIncomingDynamicStream(
|
| session_.get(), kClientDataStreamId1);
|
| ASSERT_TRUE(stream);
|
| EXPECT_EQ(FEC_PROTECT_OPTIONAL, stream->fec_policy());
|
|
|