| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/tools/quic/quic_server_session.h" | 5 #include "net/tools/quic/quic_server_session.h" |
| 6 | 6 |
| 7 #include "net/quic/crypto/quic_crypto_server_config.h" | 7 #include "net/quic/crypto/quic_crypto_server_config.h" |
| 8 #include "net/quic/crypto/quic_random.h" | 8 #include "net/quic/crypto/quic_random.h" |
| 9 #include "net/quic/crypto/source_address_token.h" | 9 #include "net/quic/crypto/source_address_token.h" |
| 10 #include "net/quic/quic_connection.h" | 10 #include "net/quic/quic_connection.h" |
| (...skipping 180 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 191 EXPECT_EQ(1u, session_->GetNumOpenStreams()); | 191 EXPECT_EQ(1u, session_->GetNumOpenStreams()); |
| 192 EXPECT_TRUE(connection_->connected()); | 192 EXPECT_TRUE(connection_->connected()); |
| 193 } | 193 } |
| 194 | 194 |
| 195 TEST_P(QuicServerSessionTest, MaxOpenStreams) { | 195 TEST_P(QuicServerSessionTest, MaxOpenStreams) { |
| 196 ValueRestore<bool> old_flag(&FLAGS_quic_allow_more_open_streams, true); | 196 ValueRestore<bool> old_flag(&FLAGS_quic_allow_more_open_streams, true); |
| 197 // Test that the server closes the connection if a client attempts to open too | 197 // Test that the server closes the connection if a client attempts to open too |
| 198 // many data streams. The server accepts slightly more than the negotiated | 198 // many data streams. The server accepts slightly more than the negotiated |
| 199 // stream limit to deal with rare cases where a client FIN/RST is lost. | 199 // stream limit to deal with rare cases where a client FIN/RST is lost. |
| 200 | 200 |
| 201 // The slightly increased stream limit is set during config negotiation. | 201 // The slightly increased stream limit is set during config negotiation. It |
| 202 // should be either an increase of 10 over negotiated limit, or a fixed |
| 203 // percentage scaling, whichever is larger. Test both before continuing. |
| 202 EXPECT_EQ(kMaxStreamsForTest, session_->get_max_open_streams()); | 204 EXPECT_EQ(kMaxStreamsForTest, session_->get_max_open_streams()); |
| 203 session_->OnConfigNegotiated(); | 205 session_->OnConfigNegotiated(); |
| 204 EXPECT_EQ(kMaxStreamsMultiplier * kMaxStreamsForTest, | 206 EXPECT_LT(kMaxStreamsMultiplier * kMaxStreamsForTest, |
| 207 kMaxStreamsForTest + kMaxStreamsMinimumIncrement); |
| 208 EXPECT_EQ(kMaxStreamsForTest + kMaxStreamsMinimumIncrement, |
| 205 session_->get_max_open_streams()); | 209 session_->get_max_open_streams()); |
| 206 | |
| 207 EXPECT_EQ(0u, session_->GetNumOpenStreams()); | 210 EXPECT_EQ(0u, session_->GetNumOpenStreams()); |
| 208 QuicStreamId stream_id = kClientDataStreamId1; | 211 QuicStreamId stream_id = kClientDataStreamId1; |
| 209 // Open the max configured number of streams, should be no problem. | 212 // Open the max configured number of streams, should be no problem. |
| 210 for (size_t i = 0; i < kMaxStreamsForTest; ++i) { | 213 for (size_t i = 0; i < kMaxStreamsForTest; ++i) { |
| 211 EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDataStream(session_.get(), | 214 EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDataStream(session_.get(), |
| 212 stream_id)); | 215 stream_id)); |
| 213 stream_id += 2; | 216 stream_id += 2; |
| 214 } | 217 } |
| 215 | 218 |
| 216 // Open one more stream: server should accept slightly more than the | 219 // Open more streams: server should accept slightly more than the limit. |
| 217 // configured limit. | 220 for (size_t i = 0; i < kMaxStreamsMinimumIncrement; ++i) { |
| 218 EXPECT_TRUE( | 221 EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDataStream(session_.get(), |
| 219 QuicServerSessionPeer::GetIncomingDataStream(session_.get(), stream_id)); | 222 stream_id)); |
| 223 stream_id += 2; |
| 224 } |
| 220 | 225 |
| 221 // Now violate the server's internal stream limit. | 226 // Now violate the server's internal stream limit. |
| 222 EXPECT_CALL(*connection_, SendConnectionClose(QUIC_TOO_MANY_OPEN_STREAMS)); | 227 EXPECT_CALL(*connection_, SendConnectionClose(QUIC_TOO_MANY_OPEN_STREAMS)); |
| 223 stream_id += 2; | 228 stream_id += 2; |
| 224 EXPECT_FALSE( | 229 EXPECT_FALSE( |
| 225 QuicServerSessionPeer::GetIncomingDataStream(session_.get(), stream_id)); | 230 QuicServerSessionPeer::GetIncomingDataStream(session_.get(), stream_id)); |
| 226 } | 231 } |
| 227 | 232 |
| 228 TEST_P(QuicServerSessionTest, MaxOpenStreamsImplicit) { | 233 TEST_P(QuicServerSessionTest, MaxOpenStreamsImplicit) { |
| 229 ValueRestore<bool> old_flag(&FLAGS_quic_allow_more_open_streams, true); | 234 ValueRestore<bool> old_flag(&FLAGS_quic_allow_more_open_streams, true); |
| 230 // Test that the server closes the connection if a client attempts to open too | 235 // Test that the server closes the connection if a client attempts to open too |
| 231 // many data streams implicitly. The server accepts slightly more than the | 236 // many data streams implicitly. The server accepts slightly more than the |
| 232 // negotiated stream limit to deal with rare cases where a client FIN/RST is | 237 // negotiated stream limit to deal with rare cases where a client FIN/RST is |
| 233 // lost. | 238 // lost. |
| 234 | 239 |
| 235 // The slightly increased stream limit is set during config negotiation. | 240 // The slightly increased stream limit is set during config negotiation. |
| 236 EXPECT_EQ(kMaxStreamsForTest, session_->get_max_open_streams()); | 241 EXPECT_EQ(kMaxStreamsForTest, session_->get_max_open_streams()); |
| 237 session_->OnConfigNegotiated(); | 242 session_->OnConfigNegotiated(); |
| 238 EXPECT_EQ(kMaxStreamsMultiplier * kMaxStreamsForTest, | 243 EXPECT_LT(kMaxStreamsMultiplier * kMaxStreamsForTest, |
| 244 kMaxStreamsForTest + kMaxStreamsMinimumIncrement); |
| 245 EXPECT_EQ(kMaxStreamsForTest + kMaxStreamsMinimumIncrement, |
| 239 session_->get_max_open_streams()); | 246 session_->get_max_open_streams()); |
| 240 | 247 |
| 241 EXPECT_EQ(0u, session_->GetNumOpenStreams()); | 248 EXPECT_EQ(0u, session_->GetNumOpenStreams()); |
| 242 EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDataStream( | 249 EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDataStream( |
| 243 session_.get(), kClientDataStreamId1)); | 250 session_.get(), kClientDataStreamId1)); |
| 244 // Implicitly open streams up to the server's limit. | 251 // Implicitly open streams up to the server's limit. |
| 245 const int kActualMaxStreams = kMaxStreamsMultiplier * kMaxStreamsForTest; | 252 const int kActualMaxStreams = |
| 253 kMaxStreamsForTest + kMaxStreamsMinimumIncrement; |
| 246 const int kMaxValidStreamId = | 254 const int kMaxValidStreamId = |
| 247 kClientDataStreamId1 + (kActualMaxStreams - 1) * 2; | 255 kClientDataStreamId1 + (kActualMaxStreams - 1) * 2; |
| 248 EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDataStream( | 256 EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDataStream( |
| 249 session_.get(), kMaxValidStreamId)); | 257 session_.get(), kMaxValidStreamId)); |
| 250 | 258 |
| 251 // Opening a further stream will result in connection close. | 259 // Opening a further stream will result in connection close. |
| 252 EXPECT_CALL(*connection_, SendConnectionClose(QUIC_TOO_MANY_OPEN_STREAMS)); | 260 EXPECT_CALL(*connection_, SendConnectionClose(QUIC_TOO_MANY_OPEN_STREAMS)); |
| 253 EXPECT_FALSE(QuicServerSessionPeer::GetIncomingDataStream( | 261 EXPECT_FALSE(QuicServerSessionPeer::GetIncomingDataStream( |
| 254 session_.get(), kMaxValidStreamId + 2)); | 262 session_.get(), kMaxValidStreamId + 2)); |
| 255 } | 263 } |
| (...skipping 103 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 359 EXPECT_CALL(*crypto_stream, | 367 EXPECT_CALL(*crypto_stream, |
| 360 SendServerConfigUpdate(EqualsProto(expected_network_params))) | 368 SendServerConfigUpdate(EqualsProto(expected_network_params))) |
| 361 .Times(1); | 369 .Times(1); |
| 362 session_->OnCongestionWindowChange(now); | 370 session_->OnCongestionWindowChange(now); |
| 363 } | 371 } |
| 364 | 372 |
| 365 } // namespace | 373 } // namespace |
| 366 } // namespace test | 374 } // namespace test |
| 367 } // namespace tools | 375 } // namespace tools |
| 368 } // namespace net | 376 } // namespace net |
| OLD | NEW |