Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(539)

Side by Side Diff: net/tools/quic/quic_dispatcher_test.cc

Issue 1421853006: Landing Recent QUIC changes until: Fri Oct 30 22:23:58 2015 +0000 (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: fix comments Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/tools/quic/quic_dispatcher.cc ('k') | net/tools/quic/quic_epoll_clock.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/tools/quic/quic_dispatcher.h" 5 #include "net/tools/quic/quic_dispatcher.h"
6 6
7 #include <ostream> 7 #include <ostream>
8 #include <string> 8 #include <string>
9 9
10 #include "base/strings/string_piece.h" 10 #include "base/strings/string_piece.h"
(...skipping 13 matching lines...) Expand all
24 #include "net/tools/quic/test_tools/mock_quic_time_wait_list_manager.h" 24 #include "net/tools/quic/test_tools/mock_quic_time_wait_list_manager.h"
25 #include "net/tools/quic/test_tools/quic_dispatcher_peer.h" 25 #include "net/tools/quic/test_tools/quic_dispatcher_peer.h"
26 #include "testing/gmock/include/gmock/gmock.h" 26 #include "testing/gmock/include/gmock/gmock.h"
27 #include "testing/gtest/include/gtest/gtest.h" 27 #include "testing/gtest/include/gtest/gtest.h"
28 28
29 using base::StringPiece; 29 using base::StringPiece;
30 using net::EpollServer; 30 using net::EpollServer;
31 using net::test::ConstructEncryptedPacket; 31 using net::test::ConstructEncryptedPacket;
32 using net::test::CryptoTestUtils; 32 using net::test::CryptoTestUtils;
33 using net::test::MockConnection; 33 using net::test::MockConnection;
34 using net::test::MockHelper; 34 using net::test::MockConnectionHelper;
35 using net::test::ValueRestore; 35 using net::test::ValueRestore;
36 using net::test::TestWriterFactory; 36 using net::test::TestWriterFactory;
37 using std::string; 37 using std::string;
38 using std::vector; 38 using std::vector;
39 using testing::DoAll; 39 using testing::DoAll;
40 using testing::InSequence; 40 using testing::InSequence;
41 using testing::Invoke; 41 using testing::Invoke;
42 using testing::WithoutArgs; 42 using testing::WithoutArgs;
43 using testing::_; 43 using testing::_;
44 44
(...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after
91 using QuicDispatcher::current_client_address; 91 using QuicDispatcher::current_client_address;
92 }; 92 };
93 93
94 // A Connection class which unregisters the session from the dispatcher when 94 // A Connection class which unregisters the session from the dispatcher when
95 // sending connection close. 95 // sending connection close.
96 // It'd be slightly more realistic to do this from the Session but it would 96 // It'd be slightly more realistic to do this from the Session but it would
97 // involve a lot more mocking. 97 // involve a lot more mocking.
98 class MockServerConnection : public MockConnection { 98 class MockServerConnection : public MockConnection {
99 public: 99 public:
100 MockServerConnection(QuicConnectionId connection_id, 100 MockServerConnection(QuicConnectionId connection_id,
101 MockHelper* helper, 101 MockConnectionHelper* helper,
102 QuicDispatcher* dispatcher) 102 QuicDispatcher* dispatcher)
103 : MockConnection(connection_id, helper, Perspective::IS_SERVER), 103 : MockConnection(connection_id, helper, Perspective::IS_SERVER),
104 dispatcher_(dispatcher) {} 104 dispatcher_(dispatcher) {}
105 105
106 void UnregisterOnConnectionClosed() { 106 void UnregisterOnConnectionClosed() {
107 LOG(ERROR) << "Unregistering " << connection_id(); 107 LOG(ERROR) << "Unregistering " << connection_id();
108 dispatcher_->OnConnectionClosed(connection_id(), QUIC_NO_ERROR); 108 dispatcher_->OnConnectionClosed(connection_id(), QUIC_NO_ERROR);
109 } 109 }
110 110
111 private: 111 private:
112 QuicDispatcher* dispatcher_; 112 QuicDispatcher* dispatcher_;
113 }; 113 };
114 114
115 QuicServerSession* CreateSession(QuicDispatcher* dispatcher, 115 QuicServerSession* CreateSession(QuicDispatcher* dispatcher,
116 const QuicConfig& config, 116 const QuicConfig& config,
117 QuicConnectionId connection_id, 117 QuicConnectionId connection_id,
118 const IPEndPoint& client_address, 118 const IPEndPoint& client_address,
119 MockHelper* helper, 119 MockConnectionHelper* helper,
120 const QuicCryptoServerConfig* crypto_config, 120 const QuicCryptoServerConfig* crypto_config,
121 TestQuicSpdyServerSession** session) { 121 TestQuicSpdyServerSession** session) {
122 MockServerConnection* connection = 122 MockServerConnection* connection =
123 new MockServerConnection(connection_id, helper, dispatcher); 123 new MockServerConnection(connection_id, helper, dispatcher);
124 *session = new TestQuicSpdyServerSession(config, connection, crypto_config); 124 *session = new TestQuicSpdyServerSession(config, connection, crypto_config);
125 connection->set_visitor(*session); 125 connection->set_visitor(*session);
126 ON_CALL(*connection, SendConnectionClose(_)).WillByDefault( 126 ON_CALL(*connection, SendConnectionClose(_)).WillByDefault(
127 WithoutArgs(Invoke( 127 WithoutArgs(Invoke(
128 connection, &MockServerConnection::UnregisterOnConnectionClosed))); 128 connection, &MockServerConnection::UnregisterOnConnectionClosed)));
129 EXPECT_CALL(*reinterpret_cast<MockConnection*>((*session)->connection()), 129 EXPECT_CALL(*reinterpret_cast<MockConnection*>((*session)->connection()),
(...skipping 66 matching lines...) Expand 10 before | Expand all | Expand 10 after
196 void CreateTimeWaitListManager() { 196 void CreateTimeWaitListManager() {
197 time_wait_list_manager_ = new MockTimeWaitListManager( 197 time_wait_list_manager_ = new MockTimeWaitListManager(
198 QuicDispatcherPeer::GetWriter(&dispatcher_), &dispatcher_, &helper_); 198 QuicDispatcherPeer::GetWriter(&dispatcher_), &dispatcher_, &helper_);
199 // dispatcher_ takes the ownership of time_wait_list_manager_. 199 // dispatcher_ takes the ownership of time_wait_list_manager_.
200 QuicDispatcherPeer::SetTimeWaitListManager(&dispatcher_, 200 QuicDispatcherPeer::SetTimeWaitListManager(&dispatcher_,
201 time_wait_list_manager_); 201 time_wait_list_manager_);
202 } 202 }
203 203
204 EpollServer eps_; 204 EpollServer eps_;
205 QuicEpollConnectionHelper helper_; 205 QuicEpollConnectionHelper helper_;
206 MockHelper mock_helper_; 206 MockConnectionHelper mock_helper_;
207 QuicConfig config_; 207 QuicConfig config_;
208 QuicCryptoServerConfig crypto_config_; 208 QuicCryptoServerConfig crypto_config_;
209 IPEndPoint server_address_; 209 IPEndPoint server_address_;
210 TestDispatcher dispatcher_; 210 TestDispatcher dispatcher_;
211 MockTimeWaitListManager* time_wait_list_manager_; 211 MockTimeWaitListManager* time_wait_list_manager_;
212 TestQuicSpdyServerSession* session1_; 212 TestQuicSpdyServerSession* session1_;
213 TestQuicSpdyServerSession* session2_; 213 TestQuicSpdyServerSession* session2_;
214 string data_; 214 string data_;
215 }; 215 };
216 216
(...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after
321 void set_handshake_confirmed_for_testing(bool handshake_confirmed) { 321 void set_handshake_confirmed_for_testing(bool handshake_confirmed) {
322 handshake_confirmed_ = handshake_confirmed; 322 handshake_confirmed_ = handshake_confirmed;
323 } 323 }
324 324
325 private: 325 private:
326 DISALLOW_COPY_AND_ASSIGN(MockQuicCryptoServerStream); 326 DISALLOW_COPY_AND_ASSIGN(MockQuicCryptoServerStream);
327 }; 327 };
328 328
329 struct StatelessRejectTestParams { 329 struct StatelessRejectTestParams {
330 StatelessRejectTestParams(bool enable_stateless_rejects_via_flag, 330 StatelessRejectTestParams(bool enable_stateless_rejects_via_flag,
331 bool use_stateless_rejects_if_peer_supported,
332 bool client_supports_statelesss_rejects, 331 bool client_supports_statelesss_rejects,
333 bool crypto_handshake_successful) 332 bool crypto_handshake_successful)
334 : enable_stateless_rejects_via_flag(enable_stateless_rejects_via_flag), 333 : enable_stateless_rejects_via_flag(enable_stateless_rejects_via_flag),
335 use_stateless_rejects_if_peer_supported(
336 use_stateless_rejects_if_peer_supported),
337 client_supports_statelesss_rejects(client_supports_statelesss_rejects), 334 client_supports_statelesss_rejects(client_supports_statelesss_rejects),
338 crypto_handshake_successful(crypto_handshake_successful) {} 335 crypto_handshake_successful(crypto_handshake_successful) {}
339 336
340 friend std::ostream& operator<<(std::ostream& os, 337 friend std::ostream& operator<<(std::ostream& os,
341 const StatelessRejectTestParams& p) { 338 const StatelessRejectTestParams& p) {
342 os << " enable_stateless_rejects_via_flag: " 339 os << " enable_stateless_rejects_via_flag: "
343 << p.enable_stateless_rejects_via_flag << std::endl; 340 << p.enable_stateless_rejects_via_flag << std::endl;
344 os << "{ use_stateless_rejects_if_peer_supported: "
345 << p.use_stateless_rejects_if_peer_supported << std::endl;
346 os << "{ client_supports_statelesss_rejects: " 341 os << "{ client_supports_statelesss_rejects: "
347 << p.client_supports_statelesss_rejects << std::endl; 342 << p.client_supports_statelesss_rejects << std::endl;
348 os << " crypto_handshake_successful: " << p.crypto_handshake_successful 343 os << " crypto_handshake_successful: " << p.crypto_handshake_successful
349 << " }"; 344 << " }";
350 return os; 345 return os;
351 } 346 }
352 347
353 // This only enables the stateless reject feature via the feature-flag. 348 // This only enables the stateless reject feature via the feature-flag.
354 // It does not force the crypto server to emit stateless rejects. 349 // This should be a no-op if the peer does not support them.
355 bool enable_stateless_rejects_via_flag; 350 bool enable_stateless_rejects_via_flag;
356 // If true, this forces the server to send a stateless reject when rejecting
357 // messages. This should be a no-op if enable_stateless_rejects_via_flag is
358 // false or the peer does not support them.
359 bool use_stateless_rejects_if_peer_supported;
360 // Whether or not the client supports stateless rejects. 351 // Whether or not the client supports stateless rejects.
361 bool client_supports_statelesss_rejects; 352 bool client_supports_statelesss_rejects;
362 // Should the initial crypto handshake succeed or not. 353 // Should the initial crypto handshake succeed or not.
363 bool crypto_handshake_successful; 354 bool crypto_handshake_successful;
364 }; 355 };
365 356
366 // Constructs various test permutations for stateless rejects. 357 // Constructs various test permutations for stateless rejects.
367 vector<StatelessRejectTestParams> GetStatelessRejectTestParams() { 358 vector<StatelessRejectTestParams> GetStatelessRejectTestParams() {
368 vector<StatelessRejectTestParams> params; 359 vector<StatelessRejectTestParams> params;
369 for (bool enable_stateless_rejects_via_flag : {true, false}) { 360 for (bool enable_stateless_rejects_via_flag : {true, false}) {
370 for (bool use_stateless_rejects_if_peer_supported : {true, false}) { 361 for (bool client_supports_statelesss_rejects : {true, false}) {
371 for (bool client_supports_statelesss_rejects : {true, false}) { 362 for (bool crypto_handshake_successful : {true, false}) {
372 for (bool crypto_handshake_successful : {true, false}) { 363 params.push_back(StatelessRejectTestParams(
373 params.push_back(StatelessRejectTestParams( 364 enable_stateless_rejects_via_flag,
374 enable_stateless_rejects_via_flag, 365 client_supports_statelesss_rejects, crypto_handshake_successful));
375 use_stateless_rejects_if_peer_supported,
376 client_supports_statelesss_rejects, crypto_handshake_successful));
377 }
378 } 366 }
379 } 367 }
380 } 368 }
381 return params; 369 return params;
382 } 370 }
383 371
384 class QuicDispatcherStatelessRejectTest 372 class QuicDispatcherStatelessRejectTest
385 : public QuicDispatcherTest, 373 : public QuicDispatcherTest,
386 public ::testing::WithParamInterface<StatelessRejectTestParams> { 374 public ::testing::WithParamInterface<StatelessRejectTestParams> {
387 public: 375 public:
388 QuicDispatcherStatelessRejectTest() : crypto_stream1_(nullptr) {} 376 QuicDispatcherStatelessRejectTest() : crypto_stream1_(nullptr) {}
389 377
390 ~QuicDispatcherStatelessRejectTest() override { 378 ~QuicDispatcherStatelessRejectTest() override {
391 if (crypto_stream1_) { 379 if (crypto_stream1_) {
392 delete crypto_stream1_; 380 delete crypto_stream1_;
393 } 381 }
394 } 382 }
395 383
396 // This test setup assumes that all testing will be done using 384 // This test setup assumes that all testing will be done using
397 // crypto_stream1_. 385 // crypto_stream1_.
398 void SetUp() override { 386 void SetUp() override {
399 FLAGS_enable_quic_stateless_reject_support = 387 FLAGS_enable_quic_stateless_reject_support =
400 GetParam().enable_stateless_rejects_via_flag; 388 GetParam().enable_stateless_rejects_via_flag;
401 } 389 }
402 390
403 // Returns true or false, depending on whether the server will emit 391 // Returns true or false, depending on whether the server will emit
404 // a stateless reject, depending upon the parameters of the test. 392 // a stateless reject, depending upon the parameters of the test.
405 bool ExpectStatelessReject() { 393 bool ExpectStatelessReject() {
406 return GetParam().enable_stateless_rejects_via_flag && 394 return GetParam().enable_stateless_rejects_via_flag &&
407 GetParam().use_stateless_rejects_if_peer_supported &&
408 !GetParam().crypto_handshake_successful && 395 !GetParam().crypto_handshake_successful &&
409 GetParam().client_supports_statelesss_rejects; 396 GetParam().client_supports_statelesss_rejects;
410 } 397 }
411 398
412 // Sets up dispatcher_, sesession1_, and crypto_stream1_ based on 399 // Sets up dispatcher_, sesession1_, and crypto_stream1_ based on
413 // the test parameters. 400 // the test parameters.
414 QuicServerSession* CreateSessionBasedOnTestParams( 401 QuicServerSession* CreateSessionBasedOnTestParams(
415 QuicConnectionId connection_id, 402 QuicConnectionId connection_id,
416 const IPEndPoint& client_address) { 403 const IPEndPoint& client_address) {
417 CreateSession(&dispatcher_, config_, connection_id, client_address, 404 CreateSession(&dispatcher_, config_, connection_id, client_address,
418 &mock_helper_, &crypto_config_, &session1_); 405 &mock_helper_, &crypto_config_, &session1_);
419 406
420 crypto_stream1_ = new MockQuicCryptoServerStream(crypto_config_, session1_); 407 crypto_stream1_ = new MockQuicCryptoServerStream(crypto_config_, session1_);
421 session1_->SetCryptoStream(crypto_stream1_); 408 session1_->SetCryptoStream(crypto_stream1_);
422 crypto_stream1_->set_use_stateless_rejects_if_peer_supported(
423 GetParam().use_stateless_rejects_if_peer_supported);
424 crypto_stream1_->set_handshake_confirmed_for_testing( 409 crypto_stream1_->set_handshake_confirmed_for_testing(
425 GetParam().crypto_handshake_successful); 410 GetParam().crypto_handshake_successful);
426 crypto_stream1_->set_peer_supports_stateless_rejects( 411 crypto_stream1_->set_peer_supports_stateless_rejects(
427 GetParam().client_supports_statelesss_rejects); 412 GetParam().client_supports_statelesss_rejects);
428 return session1_; 413 return session1_;
429 } 414 }
430 415
431 MockQuicCryptoServerStream* crypto_stream1_; 416 MockQuicCryptoServerStream* crypto_stream1_;
432 }; 417 };
433 418
(...skipping 183 matching lines...) Expand 10 before | Expand all | Expand 10 after
617 void SetBlocked() { 602 void SetBlocked() {
618 writer_->write_blocked_ = true; 603 writer_->write_blocked_ = true;
619 } 604 }
620 605
621 void BlockConnection2() { 606 void BlockConnection2() {
622 writer_->write_blocked_ = true; 607 writer_->write_blocked_ = true;
623 dispatcher_.OnWriteBlocked(connection2()); 608 dispatcher_.OnWriteBlocked(connection2());
624 } 609 }
625 610
626 protected: 611 protected:
627 MockHelper helper_; 612 MockConnectionHelper helper_;
628 BlockingWriter* writer_; 613 BlockingWriter* writer_;
629 QuicDispatcher::WriteBlockedList* blocked_list_; 614 QuicDispatcher::WriteBlockedList* blocked_list_;
630 }; 615 };
631 616
632 TEST_F(QuicDispatcherWriteBlockedListTest, BasicOnCanWrite) { 617 TEST_F(QuicDispatcherWriteBlockedListTest, BasicOnCanWrite) {
633 // No OnCanWrite calls because no connections are blocked. 618 // No OnCanWrite calls because no connections are blocked.
634 dispatcher_.OnCanWrite(); 619 dispatcher_.OnCanWrite();
635 620
636 // Register connection 1 for events, and make sure it's notified. 621 // Register connection 1 for events, and make sure it's notified.
637 SetBlocked(); 622 SetBlocked();
(...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after
756 // And we'll resume where we left off when we get another call. 741 // And we'll resume where we left off when we get another call.
757 EXPECT_CALL(*connection2(), OnCanWrite()); 742 EXPECT_CALL(*connection2(), OnCanWrite());
758 dispatcher_.OnCanWrite(); 743 dispatcher_.OnCanWrite();
759 EXPECT_FALSE(dispatcher_.HasPendingWrites()); 744 EXPECT_FALSE(dispatcher_.HasPendingWrites());
760 } 745 }
761 746
762 } // namespace 747 } // namespace
763 } // namespace test 748 } // namespace test
764 } // namespace tools 749 } // namespace tools
765 } // namespace net 750 } // namespace net
OLDNEW
« no previous file with comments | « net/tools/quic/quic_dispatcher.cc ('k') | net/tools/quic/quic_epoll_clock.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698