| Index: net/tools/quic/quic_time_wait_list_manager_test.cc
|
| diff --git a/net/tools/quic/quic_time_wait_list_manager_test.cc b/net/tools/quic/quic_time_wait_list_manager_test.cc
|
| deleted file mode 100644
|
| index bddcc176ea5c2b67d87e6da66eca0c8d1c1027d1..0000000000000000000000000000000000000000
|
| --- a/net/tools/quic/quic_time_wait_list_manager_test.cc
|
| +++ /dev/null
|
| @@ -1,530 +0,0 @@
|
| -// Copyright 2013 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/tools/quic/quic_time_wait_list_manager.h"
|
| -
|
| -#include <errno.h>
|
| -
|
| -#include "net/quic/crypto/crypto_protocol.h"
|
| -#include "net/quic/crypto/null_encrypter.h"
|
| -#include "net/quic/crypto/quic_decrypter.h"
|
| -#include "net/quic/crypto/quic_encrypter.h"
|
| -#include "net/quic/quic_data_reader.h"
|
| -#include "net/quic/quic_flags.h"
|
| -#include "net/quic/quic_framer.h"
|
| -#include "net/quic/quic_packet_writer.h"
|
| -#include "net/quic/quic_protocol.h"
|
| -#include "net/quic/quic_utils.h"
|
| -#include "net/quic/test_tools/quic_test_utils.h"
|
| -#include "net/tools/quic/test_tools/mock_epoll_server.h"
|
| -#include "net/tools/quic/test_tools/quic_test_utils.h"
|
| -#include "testing/gmock/include/gmock/gmock.h"
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -
|
| -using net::test::BuildUnsizedDataPacket;
|
| -using net::test::NoOpFramerVisitor;
|
| -using net::test::QuicVersionMax;
|
| -using net::test::QuicVersionMin;
|
| -using net::test::ValueRestore;
|
| -using testing::Args;
|
| -using testing::Assign;
|
| -using testing::DoAll;
|
| -using testing::Matcher;
|
| -using testing::MatcherInterface;
|
| -using testing::NiceMock;
|
| -using testing::Return;
|
| -using testing::ReturnPointee;
|
| -using testing::SetArgPointee;
|
| -using testing::StrictMock;
|
| -using testing::Truly;
|
| -using testing::_;
|
| -
|
| -namespace net {
|
| -namespace tools {
|
| -namespace test {
|
| -
|
| -class FramerVisitorCapturingPublicReset : public NoOpFramerVisitor {
|
| - public:
|
| - FramerVisitorCapturingPublicReset() {}
|
| - ~FramerVisitorCapturingPublicReset() override {}
|
| -
|
| - void OnPublicResetPacket(const QuicPublicResetPacket& public_reset) override {
|
| - public_reset_packet_ = public_reset;
|
| - }
|
| -
|
| - const QuicPublicResetPacket public_reset_packet() {
|
| - return public_reset_packet_;
|
| - }
|
| -
|
| - private:
|
| - QuicPublicResetPacket public_reset_packet_;
|
| -};
|
| -
|
| -class QuicTimeWaitListManagerPeer {
|
| - public:
|
| - static bool ShouldSendResponse(QuicTimeWaitListManager* manager,
|
| - int received_packet_count) {
|
| - return manager->ShouldSendResponse(received_packet_count);
|
| - }
|
| -
|
| - static QuicTime::Delta time_wait_period(QuicTimeWaitListManager* manager) {
|
| - return manager->kTimeWaitPeriod_;
|
| - }
|
| -
|
| - static QuicVersion GetQuicVersionFromConnectionId(
|
| - QuicTimeWaitListManager* manager,
|
| - QuicConnectionId connection_id) {
|
| - return manager->GetQuicVersionFromConnectionId(connection_id);
|
| - }
|
| -};
|
| -
|
| -namespace {
|
| -
|
| -class MockFakeTimeEpollServer : public FakeTimeEpollServer {
|
| - public:
|
| - MOCK_METHOD2(RegisterAlarm, void(int64 timeout_in_us,
|
| - EpollAlarmCallbackInterface* alarm));
|
| -};
|
| -
|
| -class QuicTimeWaitListManagerTest : public ::testing::Test {
|
| - protected:
|
| - QuicTimeWaitListManagerTest()
|
| - : time_wait_list_manager_(&writer_, &visitor_,
|
| - &epoll_server_, QuicSupportedVersions()),
|
| - framer_(QuicSupportedVersions(), QuicTime::Zero(), true),
|
| - connection_id_(45),
|
| - client_address_(net::test::TestPeerIPAddress(), kTestPort),
|
| - writer_is_blocked_(false) {}
|
| -
|
| - ~QuicTimeWaitListManagerTest() override {}
|
| -
|
| - void SetUp() override {
|
| - EXPECT_CALL(writer_, IsWriteBlocked())
|
| - .WillRepeatedly(ReturnPointee(&writer_is_blocked_));
|
| - EXPECT_CALL(writer_, IsWriteBlockedDataBuffered())
|
| - .WillRepeatedly(Return(false));
|
| - }
|
| -
|
| - void AddConnectionId(QuicConnectionId connection_id) {
|
| - AddConnectionId(connection_id, QuicVersionMax(), nullptr);
|
| - }
|
| -
|
| - void AddConnectionId(QuicConnectionId connection_id,
|
| - QuicVersion version,
|
| - QuicEncryptedPacket* packet) {
|
| - time_wait_list_manager_.AddConnectionIdToTimeWait(
|
| - connection_id, version, packet);
|
| - }
|
| -
|
| - bool IsConnectionIdInTimeWait(QuicConnectionId connection_id) {
|
| - return time_wait_list_manager_.IsConnectionIdInTimeWait(connection_id);
|
| - }
|
| -
|
| - void ProcessPacket(QuicConnectionId connection_id,
|
| - QuicPacketSequenceNumber sequence_number) {
|
| - QuicEncryptedPacket packet(nullptr, 0);
|
| - time_wait_list_manager_.ProcessPacket(server_address_,
|
| - client_address_,
|
| - connection_id,
|
| - sequence_number,
|
| - packet);
|
| - }
|
| -
|
| - QuicEncryptedPacket* ConstructEncryptedPacket(
|
| - EncryptionLevel level,
|
| - QuicConnectionId connection_id,
|
| - QuicPacketSequenceNumber sequence_number) {
|
| - QuicPacketHeader header;
|
| - header.public_header.connection_id = connection_id;
|
| - header.public_header.connection_id_length = PACKET_8BYTE_CONNECTION_ID;
|
| - header.public_header.version_flag = false;
|
| - header.public_header.reset_flag = false;
|
| - header.public_header.sequence_number_length = PACKET_6BYTE_SEQUENCE_NUMBER;
|
| - header.packet_sequence_number = sequence_number;
|
| - header.entropy_flag = false;
|
| - header.entropy_hash = 0;
|
| - header.fec_flag = false;
|
| - header.is_in_fec_group = NOT_IN_FEC_GROUP;
|
| - header.fec_group = 0;
|
| - QuicStreamFrame stream_frame(1, false, 0, MakeIOVector("data"));
|
| - QuicFrame frame(&stream_frame);
|
| - QuicFrames frames;
|
| - frames.push_back(frame);
|
| - scoped_ptr<QuicPacket> packet(
|
| - BuildUnsizedDataPacket(&framer_, header, frames));
|
| - EXPECT_TRUE(packet != nullptr);
|
| - QuicEncryptedPacket* encrypted = framer_.EncryptPacket(ENCRYPTION_NONE,
|
| - sequence_number,
|
| - *packet);
|
| - EXPECT_TRUE(encrypted != nullptr);
|
| - return encrypted;
|
| - }
|
| -
|
| - NiceMock<MockFakeTimeEpollServer> epoll_server_;
|
| - StrictMock<MockPacketWriter> writer_;
|
| - StrictMock<MockQuicServerSessionVisitor> visitor_;
|
| - QuicTimeWaitListManager time_wait_list_manager_;
|
| - QuicFramer framer_;
|
| - QuicConnectionId connection_id_;
|
| - IPEndPoint server_address_;
|
| - IPEndPoint client_address_;
|
| - bool writer_is_blocked_;
|
| -};
|
| -
|
| -class ValidatePublicResetPacketPredicate
|
| - : public MatcherInterface<const std::tr1::tuple<const char*, int> > {
|
| - public:
|
| - explicit ValidatePublicResetPacketPredicate(QuicConnectionId connection_id,
|
| - QuicPacketSequenceNumber number)
|
| - : connection_id_(connection_id), sequence_number_(number) {
|
| - }
|
| -
|
| - virtual bool MatchAndExplain(
|
| - const std::tr1::tuple<const char*, int> packet_buffer,
|
| - testing::MatchResultListener* /* listener */) const override {
|
| - FramerVisitorCapturingPublicReset visitor;
|
| - QuicFramer framer(QuicSupportedVersions(),
|
| - QuicTime::Zero(),
|
| - false);
|
| - framer.set_visitor(&visitor);
|
| - QuicEncryptedPacket encrypted(std::tr1::get<0>(packet_buffer),
|
| - std::tr1::get<1>(packet_buffer));
|
| - framer.ProcessPacket(encrypted);
|
| - QuicPublicResetPacket packet = visitor.public_reset_packet();
|
| - return connection_id_ == packet.public_header.connection_id &&
|
| - packet.public_header.reset_flag && !packet.public_header.version_flag &&
|
| - sequence_number_ == packet.rejected_sequence_number &&
|
| - net::test::TestPeerIPAddress() == packet.client_address.address() &&
|
| - kTestPort == packet.client_address.port();
|
| - }
|
| -
|
| - virtual void DescribeTo(::std::ostream* os) const override {}
|
| -
|
| - virtual void DescribeNegationTo(::std::ostream* os) const override {}
|
| -
|
| - private:
|
| - QuicConnectionId connection_id_;
|
| - QuicPacketSequenceNumber sequence_number_;
|
| -};
|
| -
|
| -
|
| -Matcher<const std::tr1::tuple<const char*, int> > PublicResetPacketEq(
|
| - QuicConnectionId connection_id,
|
| - QuicPacketSequenceNumber sequence_number) {
|
| - return MakeMatcher(new ValidatePublicResetPacketPredicate(connection_id,
|
| - sequence_number));
|
| -}
|
| -
|
| -TEST_F(QuicTimeWaitListManagerTest, CheckConnectionIdInTimeWait) {
|
| - EXPECT_FALSE(IsConnectionIdInTimeWait(connection_id_));
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(connection_id_));
|
| - AddConnectionId(connection_id_);
|
| - EXPECT_EQ(1u, time_wait_list_manager_.num_connections());
|
| - EXPECT_TRUE(IsConnectionIdInTimeWait(connection_id_));
|
| -}
|
| -
|
| -TEST_F(QuicTimeWaitListManagerTest, SendConnectionClose) {
|
| - size_t kConnectionCloseLength = 100;
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(connection_id_));
|
| - AddConnectionId(
|
| - connection_id_,
|
| - QuicVersionMax(),
|
| - new QuicEncryptedPacket(
|
| - new char[kConnectionCloseLength], kConnectionCloseLength, true));
|
| - const int kRandomSequenceNumber = 1;
|
| - EXPECT_CALL(writer_, WritePacket(_, kConnectionCloseLength,
|
| - server_address_.address(),
|
| - client_address_))
|
| - .WillOnce(Return(WriteResult(WRITE_STATUS_OK, 1)));
|
| -
|
| - ProcessPacket(connection_id_, kRandomSequenceNumber);
|
| -}
|
| -
|
| -TEST_F(QuicTimeWaitListManagerTest, SendPublicReset) {
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(connection_id_));
|
| - AddConnectionId(connection_id_);
|
| - const int kRandomSequenceNumber = 1;
|
| - EXPECT_CALL(writer_, WritePacket(_, _,
|
| - server_address_.address(),
|
| - client_address_))
|
| - .With(Args<0, 1>(PublicResetPacketEq(connection_id_,
|
| - kRandomSequenceNumber)))
|
| - .WillOnce(Return(WriteResult(WRITE_STATUS_OK, 0)));
|
| -
|
| - ProcessPacket(connection_id_, kRandomSequenceNumber);
|
| -}
|
| -
|
| -TEST_F(QuicTimeWaitListManagerTest, SendPublicResetWithExponentialBackOff) {
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(connection_id_));
|
| - AddConnectionId(connection_id_);
|
| - EXPECT_EQ(1u, time_wait_list_manager_.num_connections());
|
| - for (int sequence_number = 1; sequence_number < 101; ++sequence_number) {
|
| - if ((sequence_number & (sequence_number - 1)) == 0) {
|
| - EXPECT_CALL(writer_, WritePacket(_, _, _, _))
|
| - .WillOnce(Return(WriteResult(WRITE_STATUS_OK, 1)));
|
| - }
|
| - ProcessPacket(connection_id_, sequence_number);
|
| - // Send public reset with exponential back off.
|
| - if ((sequence_number & (sequence_number - 1)) == 0) {
|
| - EXPECT_TRUE(QuicTimeWaitListManagerPeer::ShouldSendResponse(
|
| - &time_wait_list_manager_, sequence_number));
|
| - } else {
|
| - EXPECT_FALSE(QuicTimeWaitListManagerPeer::ShouldSendResponse(
|
| - &time_wait_list_manager_, sequence_number));
|
| - }
|
| - }
|
| -}
|
| -
|
| -TEST_F(QuicTimeWaitListManagerTest, CleanUpOldConnectionIds) {
|
| - const size_t kConnectionIdCount = 100;
|
| - const size_t kOldConnectionIdCount = 31;
|
| -
|
| - // Add connection_ids such that their expiry time is kTimeWaitPeriod_.
|
| - epoll_server_.set_now_in_usec(0);
|
| - for (size_t connection_id = 1; connection_id <= kOldConnectionIdCount;
|
| - ++connection_id) {
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(connection_id));
|
| - AddConnectionId(connection_id);
|
| - }
|
| - EXPECT_EQ(kOldConnectionIdCount, time_wait_list_manager_.num_connections());
|
| -
|
| - // Add remaining connection_ids such that their add time is
|
| - // 2 * kTimeWaitPeriod.
|
| - const QuicTime::Delta time_wait_period =
|
| - QuicTimeWaitListManagerPeer::time_wait_period(&time_wait_list_manager_);
|
| - epoll_server_.set_now_in_usec(time_wait_period.ToMicroseconds());
|
| - for (size_t connection_id = kOldConnectionIdCount + 1;
|
| - connection_id <= kConnectionIdCount; ++connection_id) {
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(connection_id));
|
| - AddConnectionId(connection_id);
|
| - }
|
| - EXPECT_EQ(kConnectionIdCount, time_wait_list_manager_.num_connections());
|
| -
|
| - QuicTime::Delta offset = QuicTime::Delta::FromMicroseconds(39);
|
| - // Now set the current time as time_wait_period + offset usecs.
|
| - epoll_server_.set_now_in_usec(time_wait_period.Add(offset).ToMicroseconds());
|
| - // After all the old connection_ids are cleaned up, check the next alarm
|
| - // interval.
|
| - int64 next_alarm_time = epoll_server_.ApproximateNowInUsec() +
|
| - time_wait_period.Subtract(offset).ToMicroseconds();
|
| - EXPECT_CALL(epoll_server_, RegisterAlarm(next_alarm_time, _));
|
| -
|
| - for (size_t connection_id = 1; connection_id <= kConnectionIdCount;
|
| - ++connection_id) {
|
| - if (connection_id <= kOldConnectionIdCount) {
|
| - EXPECT_CALL(visitor_, OnConnectionRemovedFromTimeWaitList(connection_id));
|
| - }
|
| - }
|
| - time_wait_list_manager_.CleanUpOldConnectionIds();
|
| - for (size_t connection_id = 1; connection_id <= kConnectionIdCount;
|
| - ++connection_id) {
|
| - EXPECT_EQ(connection_id > kOldConnectionIdCount,
|
| - IsConnectionIdInTimeWait(connection_id))
|
| - << "kOldConnectionIdCount: " << kOldConnectionIdCount
|
| - << " connection_id: " << connection_id;
|
| - }
|
| - EXPECT_EQ(kConnectionIdCount - kOldConnectionIdCount,
|
| - time_wait_list_manager_.num_connections());
|
| -}
|
| -
|
| -TEST_F(QuicTimeWaitListManagerTest, SendQueuedPackets) {
|
| - QuicConnectionId connection_id = 1;
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(connection_id));
|
| - AddConnectionId(connection_id);
|
| - QuicPacketSequenceNumber sequence_number = 234;
|
| - scoped_ptr<QuicEncryptedPacket> packet(ConstructEncryptedPacket(
|
| - ENCRYPTION_NONE, connection_id, sequence_number));
|
| - // Let first write through.
|
| - EXPECT_CALL(writer_, WritePacket(_, _,
|
| - server_address_.address(),
|
| - client_address_))
|
| - .With(Args<0, 1>(PublicResetPacketEq(connection_id,
|
| - sequence_number)))
|
| - .WillOnce(Return(WriteResult(WRITE_STATUS_OK, packet->length())));
|
| - ProcessPacket(connection_id, sequence_number);
|
| -
|
| - // write block for the next packet.
|
| - EXPECT_CALL(writer_, WritePacket(_, _,
|
| - server_address_.address(),
|
| - client_address_))
|
| - .With(Args<0, 1>(PublicResetPacketEq(connection_id,
|
| - sequence_number)))
|
| - .WillOnce(DoAll(
|
| - Assign(&writer_is_blocked_, true),
|
| - Return(WriteResult(WRITE_STATUS_BLOCKED, EAGAIN))));
|
| - EXPECT_CALL(visitor_, OnWriteBlocked(&time_wait_list_manager_));
|
| - ProcessPacket(connection_id, sequence_number);
|
| - // 3rd packet. No public reset should be sent;
|
| - ProcessPacket(connection_id, sequence_number);
|
| -
|
| - // write packet should not be called since we are write blocked but the
|
| - // should be queued.
|
| - QuicConnectionId other_connection_id = 2;
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(other_connection_id));
|
| - AddConnectionId(other_connection_id);
|
| - QuicPacketSequenceNumber other_sequence_number = 23423;
|
| - scoped_ptr<QuicEncryptedPacket> other_packet(
|
| - ConstructEncryptedPacket(
|
| - ENCRYPTION_NONE, other_connection_id, other_sequence_number));
|
| - EXPECT_CALL(writer_, WritePacket(_, _, _, _))
|
| - .Times(0);
|
| - EXPECT_CALL(visitor_, OnWriteBlocked(&time_wait_list_manager_));
|
| - ProcessPacket(other_connection_id, other_sequence_number);
|
| - EXPECT_EQ(2u, time_wait_list_manager_.num_connections());
|
| -
|
| - // Now expect all the write blocked public reset packets to be sent again.
|
| - writer_is_blocked_ = false;
|
| - EXPECT_CALL(writer_, WritePacket(_, _,
|
| - server_address_.address(),
|
| - client_address_))
|
| - .With(Args<0, 1>(PublicResetPacketEq(connection_id,
|
| - sequence_number)))
|
| - .WillOnce(Return(WriteResult(WRITE_STATUS_OK, packet->length())));
|
| - EXPECT_CALL(writer_, WritePacket(_, _,
|
| - server_address_.address(),
|
| - client_address_))
|
| - .With(Args<0, 1>(PublicResetPacketEq(other_connection_id,
|
| - other_sequence_number)))
|
| - .WillOnce(Return(WriteResult(WRITE_STATUS_OK,
|
| - other_packet->length())));
|
| - time_wait_list_manager_.OnCanWrite();
|
| -}
|
| -
|
| -TEST_F(QuicTimeWaitListManagerTest, GetQuicVersionFromMap) {
|
| - const int kConnectionId1 = 123;
|
| - const int kConnectionId2 = 456;
|
| - const int kConnectionId3 = 789;
|
| -
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(kConnectionId1));
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(kConnectionId2));
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(kConnectionId3));
|
| - AddConnectionId(kConnectionId1, QuicVersionMin(), nullptr);
|
| - AddConnectionId(kConnectionId2, QuicVersionMax(), nullptr);
|
| - AddConnectionId(kConnectionId3, QuicVersionMax(), nullptr);
|
| -
|
| - EXPECT_EQ(QuicVersionMin(),
|
| - QuicTimeWaitListManagerPeer::GetQuicVersionFromConnectionId(
|
| - &time_wait_list_manager_, kConnectionId1));
|
| - EXPECT_EQ(QuicVersionMax(),
|
| - QuicTimeWaitListManagerPeer::GetQuicVersionFromConnectionId(
|
| - &time_wait_list_manager_, kConnectionId2));
|
| - EXPECT_EQ(QuicVersionMax(),
|
| - QuicTimeWaitListManagerPeer::GetQuicVersionFromConnectionId(
|
| - &time_wait_list_manager_, kConnectionId3));
|
| -}
|
| -
|
| -TEST_F(QuicTimeWaitListManagerTest, AddConnectionIdTwice) {
|
| - // Add connection_ids such that their expiry time is kTimeWaitPeriod_.
|
| - epoll_server_.set_now_in_usec(0);
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(connection_id_));
|
| - AddConnectionId(connection_id_);
|
| - EXPECT_TRUE(IsConnectionIdInTimeWait(connection_id_));
|
| - size_t kConnectionCloseLength = 100;
|
| - AddConnectionId(
|
| - connection_id_,
|
| - QuicVersionMax(),
|
| - new QuicEncryptedPacket(
|
| - new char[kConnectionCloseLength], kConnectionCloseLength, true));
|
| - EXPECT_TRUE(IsConnectionIdInTimeWait(connection_id_));
|
| - EXPECT_EQ(1u, time_wait_list_manager_.num_connections());
|
| -
|
| - EXPECT_CALL(writer_, WritePacket(_,
|
| - kConnectionCloseLength,
|
| - server_address_.address(),
|
| - client_address_))
|
| - .WillOnce(Return(WriteResult(WRITE_STATUS_OK, 1)));
|
| -
|
| - const int kRandomSequenceNumber = 1;
|
| - ProcessPacket(connection_id_, kRandomSequenceNumber);
|
| -
|
| - const QuicTime::Delta time_wait_period =
|
| - QuicTimeWaitListManagerPeer::time_wait_period(&time_wait_list_manager_);
|
| -
|
| - QuicTime::Delta offset = QuicTime::Delta::FromMicroseconds(39);
|
| - // Now set the current time as time_wait_period + offset usecs.
|
| - epoll_server_.set_now_in_usec(time_wait_period.Add(offset).ToMicroseconds());
|
| - // After the connection_ids are cleaned up, check the next alarm interval.
|
| - int64 next_alarm_time = epoll_server_.ApproximateNowInUsec() +
|
| - time_wait_period.ToMicroseconds();
|
| -
|
| - EXPECT_CALL(epoll_server_, RegisterAlarm(next_alarm_time, _));
|
| - EXPECT_CALL(visitor_, OnConnectionRemovedFromTimeWaitList(connection_id_));
|
| - time_wait_list_manager_.CleanUpOldConnectionIds();
|
| - EXPECT_FALSE(IsConnectionIdInTimeWait(connection_id_));
|
| - EXPECT_EQ(0u, time_wait_list_manager_.num_connections());
|
| -}
|
| -
|
| -TEST_F(QuicTimeWaitListManagerTest, ConnectionIdsOrderedByTime) {
|
| - // Simple randomization: the values of connection_ids are swapped based on the
|
| - // current seconds on the clock. If the container is broken, the test will be
|
| - // 50% flaky.
|
| - int odd_second = static_cast<int>(epoll_server_.ApproximateNowInUsec()) % 2;
|
| - EXPECT_TRUE(odd_second == 0 || odd_second == 1);
|
| - const QuicConnectionId kConnectionId1 = odd_second;
|
| - const QuicConnectionId kConnectionId2 = 1 - odd_second;
|
| -
|
| - // 1 will hash lower than 2, but we add it later. They should come out in the
|
| - // add order, not hash order.
|
| - epoll_server_.set_now_in_usec(0);
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(kConnectionId1));
|
| - AddConnectionId(kConnectionId1);
|
| - epoll_server_.set_now_in_usec(10);
|
| - EXPECT_CALL(visitor_, OnConnectionAddedToTimeWaitList(kConnectionId2));
|
| - AddConnectionId(kConnectionId2);
|
| - EXPECT_EQ(2u, time_wait_list_manager_.num_connections());
|
| -
|
| - const QuicTime::Delta time_wait_period =
|
| - QuicTimeWaitListManagerPeer::time_wait_period(&time_wait_list_manager_);
|
| - epoll_server_.set_now_in_usec(time_wait_period.ToMicroseconds() + 1);
|
| -
|
| - EXPECT_CALL(epoll_server_, RegisterAlarm(_, _));
|
| -
|
| - EXPECT_CALL(visitor_, OnConnectionRemovedFromTimeWaitList(kConnectionId1));
|
| - time_wait_list_manager_.CleanUpOldConnectionIds();
|
| - EXPECT_FALSE(IsConnectionIdInTimeWait(kConnectionId1));
|
| - EXPECT_TRUE(IsConnectionIdInTimeWait(kConnectionId2));
|
| - EXPECT_EQ(1u, time_wait_list_manager_.num_connections());
|
| -}
|
| -
|
| -TEST_F(QuicTimeWaitListManagerTest, MaxConnectionsTest) {
|
| - ValueRestore<bool> old_flag(&FLAGS_quic_limit_time_wait_list_size, true);
|
| - // Basically, shut off time-based eviction.
|
| - FLAGS_quic_time_wait_list_seconds = 10000000000;
|
| - FLAGS_quic_time_wait_list_max_connections = 5;
|
| -
|
| - QuicConnectionId current_connection_id = 0;
|
| - // Add exactly the maximum number of connections
|
| - for (int64 i = 0; i < FLAGS_quic_time_wait_list_max_connections; ++i) {
|
| - ++current_connection_id;
|
| - EXPECT_FALSE(IsConnectionIdInTimeWait(current_connection_id));
|
| - EXPECT_CALL(visitor_,
|
| - OnConnectionAddedToTimeWaitList(current_connection_id));
|
| - AddConnectionId(current_connection_id);
|
| - EXPECT_EQ(current_connection_id, time_wait_list_manager_.num_connections());
|
| - EXPECT_TRUE(IsConnectionIdInTimeWait(current_connection_id));
|
| - }
|
| -
|
| - // Now keep adding. Since we're already at the max, every new connection-id
|
| - // will evict the oldest one.
|
| - for (int64 i = 0; i < FLAGS_quic_time_wait_list_max_connections; ++i) {
|
| - ++current_connection_id;
|
| - const QuicConnectionId id_to_evict =
|
| - current_connection_id - FLAGS_quic_time_wait_list_max_connections;
|
| - EXPECT_TRUE(IsConnectionIdInTimeWait(id_to_evict));
|
| - EXPECT_FALSE(IsConnectionIdInTimeWait(current_connection_id));
|
| - EXPECT_CALL(visitor_, OnConnectionRemovedFromTimeWaitList(id_to_evict));
|
| - EXPECT_CALL(visitor_,
|
| - OnConnectionAddedToTimeWaitList(current_connection_id));
|
| - AddConnectionId(current_connection_id);
|
| - EXPECT_EQ(static_cast<size_t>(FLAGS_quic_time_wait_list_max_connections),
|
| - time_wait_list_manager_.num_connections());
|
| - EXPECT_FALSE(IsConnectionIdInTimeWait(id_to_evict));
|
| - EXPECT_TRUE(IsConnectionIdInTimeWait(current_connection_id));
|
| - }
|
| -}
|
| -
|
| -} // namespace
|
| -} // namespace test
|
| -} // namespace tools
|
| -} // namespace net
|
|
|