// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/tools/quic/quic_dispatcher.h" #include #include "base/strings/string_piece.h" #include "net/quic/crypto/crypto_handshake.h" #include "net/quic/crypto/quic_crypto_server_config.h" #include "net/quic/crypto/quic_random.h" #include "net/quic/quic_crypto_stream.h" #include "net/quic/quic_utils.h" #include "net/quic/test_tools/quic_test_utils.h" #include "net/tools/epoll_server/epoll_server.h" #include "net/tools/quic/quic_packet_writer_wrapper.h" #include "net/tools/quic/quic_time_wait_list_manager.h" #include "net/tools/quic/test_tools/quic_dispatcher_peer.h" #include "net/tools/quic/test_tools/quic_test_utils.h" #include "testing/gmock/include/gmock/gmock.h" #include "testing/gtest/include/gtest/gtest.h" using base::StringPiece; using net::EpollServer; using net::test::MockSession; using net::test::ConstructEncryptedPacket; using net::tools::test::MockConnection; using std::make_pair; using testing::_; using testing::DoAll; using testing::Invoke; using testing::InSequence; using testing::WithoutArgs; namespace net { namespace tools { namespace test { namespace { class TestDispatcher : public QuicDispatcher { public: explicit TestDispatcher(const QuicConfig& config, const QuicCryptoServerConfig& crypto_config, EpollServer* eps) : QuicDispatcher(config, crypto_config, QuicSupportedVersions(), eps) { } MOCK_METHOD3(CreateQuicSession, QuicSession*( QuicConnectionId connection_id, const IPEndPoint& server_address, const IPEndPoint& client_address)); using QuicDispatcher::write_blocked_list; }; // A Connection class which unregisters the session from the dispatcher // when sending connection close. // It'd be slightly more realistic to do this from the Session but it would // involve a lot more mocking. class MockServerConnection : public MockConnection { public: MockServerConnection(QuicConnectionId connection_id, QuicDispatcher* dispatcher) : MockConnection(connection_id, true), dispatcher_(dispatcher) {} void UnregisterOnConnectionClosed() { LOG(ERROR) << "Unregistering " << connection_id(); dispatcher_->OnConnectionClosed(connection_id(), QUIC_NO_ERROR); } private: QuicDispatcher* dispatcher_; }; QuicSession* CreateSession(QuicDispatcher* dispatcher, QuicConnectionId connection_id, const IPEndPoint& addr, MockSession** session) { MockServerConnection* connection = new MockServerConnection(connection_id, dispatcher); *session = new MockSession(connection); ON_CALL(*connection, SendConnectionClose(_)).WillByDefault( WithoutArgs(Invoke( connection, &MockServerConnection::UnregisterOnConnectionClosed))); EXPECT_CALL(*reinterpret_cast((*session)->connection()), ProcessUdpPacket(_, addr, _)); return *session; } class QuicDispatcherTest : public ::testing::Test { public: QuicDispatcherTest() : crypto_config_(QuicCryptoServerConfig::TESTING, QuicRandom::GetInstance()), dispatcher_(config_, crypto_config_, &eps_), session1_(NULL), session2_(NULL) { dispatcher_.Initialize(1); } virtual ~QuicDispatcherTest() {} MockConnection* connection1() { return reinterpret_cast(session1_->connection()); } MockConnection* connection2() { return reinterpret_cast(session2_->connection()); } void ProcessPacket(IPEndPoint addr, QuicConnectionId connection_id, bool has_version_flag, const string& data) { scoped_ptr packet(ConstructEncryptedPacket( connection_id, has_version_flag, false, 1, data)); data_ = string(packet->data(), packet->length()); dispatcher_.ProcessPacket(IPEndPoint(), addr, *packet.get()); } void ValidatePacket(const QuicEncryptedPacket& packet) { EXPECT_EQ(data_.length(), packet.AsStringPiece().length()); EXPECT_EQ(data_, packet.AsStringPiece()); } EpollServer eps_; QuicConfig config_; QuicCryptoServerConfig crypto_config_; TestDispatcher dispatcher_; MockSession* session1_; MockSession* session2_; string data_; }; TEST_F(QuicDispatcherTest, ProcessPackets) { IPEndPoint addr(net::test::Loopback4(), 1); EXPECT_CALL(dispatcher_, CreateQuicSession(1, _, addr)) .WillOnce(testing::Return(CreateSession( &dispatcher_, 1, addr, &session1_))); ProcessPacket(addr, 1, true, "foo"); EXPECT_CALL(dispatcher_, CreateQuicSession(2, _, addr)) .WillOnce(testing::Return(CreateSession( &dispatcher_, 2, addr, &session2_))); ProcessPacket(addr, 2, true, "bar"); EXPECT_CALL(*reinterpret_cast(session1_->connection()), ProcessUdpPacket(_, _, _)).Times(1). WillOnce(testing::WithArgs<2>(Invoke( this, &QuicDispatcherTest::ValidatePacket))); ProcessPacket(addr, 1, false, "eep"); } TEST_F(QuicDispatcherTest, Shutdown) { IPEndPoint addr(net::test::Loopback4(), 1); EXPECT_CALL(dispatcher_, CreateQuicSession(_, _, addr)) .WillOnce(testing::Return(CreateSession( &dispatcher_, 1, addr, &session1_))); ProcessPacket(addr, 1, true, "foo"); EXPECT_CALL(*reinterpret_cast(session1_->connection()), SendConnectionClose(QUIC_PEER_GOING_AWAY)); dispatcher_.Shutdown(); } class MockTimeWaitListManager : public QuicTimeWaitListManager { public: MockTimeWaitListManager(QuicPacketWriter* writer, QuicServerSessionVisitor* visitor, EpollServer* eps) : QuicTimeWaitListManager(writer, visitor, eps, QuicSupportedVersions()) { } MOCK_METHOD4(ProcessPacket, void(const IPEndPoint& server_address, const IPEndPoint& client_address, QuicConnectionId connection_id, QuicPacketSequenceNumber sequence_number)); }; TEST_F(QuicDispatcherTest, TimeWaitListManager) { MockTimeWaitListManager* time_wait_list_manager = new MockTimeWaitListManager( QuicDispatcherPeer::GetWriter(&dispatcher_), &dispatcher_, &eps_); // dispatcher takes the ownership of time_wait_list_manager. QuicDispatcherPeer::SetTimeWaitListManager(&dispatcher_, time_wait_list_manager); // Create a new session. IPEndPoint addr(net::test::Loopback4(), 1); QuicConnectionId connection_id = 1; EXPECT_CALL(dispatcher_, CreateQuicSession(connection_id, _, addr)) .WillOnce(testing::Return(CreateSession( &dispatcher_, connection_id, addr, &session1_))); ProcessPacket(addr, connection_id, true, "foo"); // Close the connection by sending public reset packet. QuicPublicResetPacket packet; packet.public_header.connection_id = connection_id; packet.public_header.reset_flag = true; packet.public_header.version_flag = false; packet.rejected_sequence_number = 19191; packet.nonce_proof = 132232; scoped_ptr encrypted( QuicFramer::BuildPublicResetPacket(packet)); EXPECT_CALL(*session1_, OnConnectionClosed(QUIC_PUBLIC_RESET, true)).Times(1) .WillOnce(WithoutArgs(Invoke( reinterpret_cast(session1_->connection()), &MockServerConnection::UnregisterOnConnectionClosed))); EXPECT_CALL(*reinterpret_cast(session1_->connection()), ProcessUdpPacket(_, _, _)) .WillOnce(Invoke( reinterpret_cast(session1_->connection()), &MockConnection::ReallyProcessUdpPacket)); dispatcher_.ProcessPacket(IPEndPoint(), addr, *encrypted); EXPECT_TRUE(time_wait_list_manager->IsConnectionIdInTimeWait(connection_id)); // Dispatcher forwards subsequent packets for this connection_id to the time // wait list manager. EXPECT_CALL(*time_wait_list_manager, ProcessPacket(_, _, connection_id, _)).Times(1); ProcessPacket(addr, connection_id, true, "foo"); } TEST_F(QuicDispatcherTest, StrayPacketToTimeWaitListManager) { MockTimeWaitListManager* time_wait_list_manager = new MockTimeWaitListManager( QuicDispatcherPeer::GetWriter(&dispatcher_), &dispatcher_, &eps_); // dispatcher takes the ownership of time_wait_list_manager. QuicDispatcherPeer::SetTimeWaitListManager(&dispatcher_, time_wait_list_manager); IPEndPoint addr(net::test::Loopback4(), 1); QuicConnectionId connection_id = 1; // Dispatcher forwards all packets for this connection_id to the time wait // list manager. EXPECT_CALL(dispatcher_, CreateQuicSession(_, _, _)).Times(0); EXPECT_CALL(*time_wait_list_manager, ProcessPacket(_, _, connection_id, _)).Times(1); string data = "foo"; ProcessPacket(addr, connection_id, false, "foo"); } class BlockingWriter : public QuicPacketWriterWrapper { public: BlockingWriter() : write_blocked_(false) {} virtual bool IsWriteBlocked() const OVERRIDE { return write_blocked_; } virtual void SetWritable() OVERRIDE { write_blocked_ = false; } virtual WriteResult WritePacket( const char* buffer, size_t buf_len, const IPAddressNumber& self_address, const IPEndPoint& peer_address) OVERRIDE { if (write_blocked_) { return WriteResult(WRITE_STATUS_BLOCKED, EAGAIN); } else { return QuicPacketWriterWrapper::WritePacket( buffer, buf_len, self_address, peer_address); } } bool write_blocked_; }; class QuicDispatcherWriteBlockedListTest : public QuicDispatcherTest { public: virtual void SetUp() { writer_ = new BlockingWriter; QuicDispatcherPeer::UseWriter(&dispatcher_, writer_); IPEndPoint addr(net::test::Loopback4(), 1); EXPECT_CALL(dispatcher_, CreateQuicSession(_, _, addr)) .WillOnce(testing::Return(CreateSession( &dispatcher_, 1, addr, &session1_))); ProcessPacket(addr, 1, true, "foo"); EXPECT_CALL(dispatcher_, CreateQuicSession(_, _, addr)) .WillOnce(testing::Return(CreateSession( &dispatcher_, 2, addr, &session2_))); ProcessPacket(addr, 2, true, "bar"); blocked_list_ = dispatcher_.write_blocked_list(); } virtual void TearDown() { EXPECT_CALL(*connection1(), SendConnectionClose(QUIC_PEER_GOING_AWAY)); EXPECT_CALL(*connection2(), SendConnectionClose(QUIC_PEER_GOING_AWAY)); dispatcher_.Shutdown(); } void SetBlocked() { writer_->write_blocked_ = true; } void BlockConnection2() { writer_->write_blocked_ = true; dispatcher_.OnWriteBlocked(connection2()); } protected: BlockingWriter* writer_; QuicDispatcher::WriteBlockedList* blocked_list_; }; TEST_F(QuicDispatcherWriteBlockedListTest, BasicOnCanWrite) { // No OnCanWrite calls because no connections are blocked. dispatcher_.OnCanWrite(); // Register connection 1 for events, and make sure it's notified. SetBlocked(); dispatcher_.OnWriteBlocked(connection1()); EXPECT_CALL(*connection1(), OnCanWrite()); dispatcher_.OnCanWrite(); // It should get only one notification. EXPECT_CALL(*connection1(), OnCanWrite()).Times(0); dispatcher_.OnCanWrite(); EXPECT_FALSE(dispatcher_.HasPendingWrites()); } TEST_F(QuicDispatcherWriteBlockedListTest, OnCanWriteOrder) { // Make sure we handle events in order. InSequence s; SetBlocked(); dispatcher_.OnWriteBlocked(connection1()); dispatcher_.OnWriteBlocked(connection2()); EXPECT_CALL(*connection1(), OnCanWrite()); EXPECT_CALL(*connection2(), OnCanWrite()); dispatcher_.OnCanWrite(); // Check the other ordering. SetBlocked(); dispatcher_.OnWriteBlocked(connection2()); dispatcher_.OnWriteBlocked(connection1()); EXPECT_CALL(*connection2(), OnCanWrite()); EXPECT_CALL(*connection1(), OnCanWrite()); dispatcher_.OnCanWrite(); } TEST_F(QuicDispatcherWriteBlockedListTest, OnCanWriteRemove) { // Add and remove one connction. SetBlocked(); dispatcher_.OnWriteBlocked(connection1()); blocked_list_->erase(connection1()); EXPECT_CALL(*connection1(), OnCanWrite()).Times(0); dispatcher_.OnCanWrite(); // Add and remove one connction and make sure it doesn't affect others. SetBlocked(); dispatcher_.OnWriteBlocked(connection1()); dispatcher_.OnWriteBlocked(connection2()); blocked_list_->erase(connection1()); EXPECT_CALL(*connection2(), OnCanWrite()); dispatcher_.OnCanWrite(); // Add it, remove it, and add it back and make sure things are OK. SetBlocked(); dispatcher_.OnWriteBlocked(connection1()); blocked_list_->erase(connection1()); dispatcher_.OnWriteBlocked(connection1()); EXPECT_CALL(*connection1(), OnCanWrite()).Times(1); dispatcher_.OnCanWrite(); } TEST_F(QuicDispatcherWriteBlockedListTest, DoubleAdd) { // Make sure a double add does not necessitate a double remove. SetBlocked(); dispatcher_.OnWriteBlocked(connection1()); dispatcher_.OnWriteBlocked(connection1()); blocked_list_->erase(connection1()); EXPECT_CALL(*connection1(), OnCanWrite()).Times(0); dispatcher_.OnCanWrite(); // Make sure a double add does not result in two OnCanWrite calls. SetBlocked(); dispatcher_.OnWriteBlocked(connection1()); dispatcher_.OnWriteBlocked(connection1()); EXPECT_CALL(*connection1(), OnCanWrite()).Times(1); dispatcher_.OnCanWrite(); } TEST_F(QuicDispatcherWriteBlockedListTest, OnCanWriteHandleBlock) { // Finally make sure if we write block on a write call, we stop calling. InSequence s; SetBlocked(); dispatcher_.OnWriteBlocked(connection1()); dispatcher_.OnWriteBlocked(connection2()); EXPECT_CALL(*connection1(), OnCanWrite()).WillOnce( Invoke(this, &QuicDispatcherWriteBlockedListTest::SetBlocked)); EXPECT_CALL(*connection2(), OnCanWrite()).Times(0); dispatcher_.OnCanWrite(); // And we'll resume where we left off when we get another call. EXPECT_CALL(*connection2(), OnCanWrite()); dispatcher_.OnCanWrite(); } TEST_F(QuicDispatcherWriteBlockedListTest, LimitedWrites) { // Make sure we call both writers. The first will register for more writing // but should not be immediately called due to limits. InSequence s; SetBlocked(); dispatcher_.OnWriteBlocked(connection1()); dispatcher_.OnWriteBlocked(connection2()); EXPECT_CALL(*connection1(), OnCanWrite()); EXPECT_CALL(*connection2(), OnCanWrite()).WillOnce( Invoke(this, &QuicDispatcherWriteBlockedListTest::BlockConnection2)); dispatcher_.OnCanWrite(); EXPECT_TRUE(dispatcher_.HasPendingWrites()); // Now call OnCanWrite again, and connection1 should get its second chance EXPECT_CALL(*connection2(), OnCanWrite()); dispatcher_.OnCanWrite(); EXPECT_FALSE(dispatcher_.HasPendingWrites()); } TEST_F(QuicDispatcherWriteBlockedListTest, TestWriteLimits) { // Finally make sure if we write block on a write call, we stop calling. InSequence s; SetBlocked(); dispatcher_.OnWriteBlocked(connection1()); dispatcher_.OnWriteBlocked(connection2()); EXPECT_CALL(*connection1(), OnCanWrite()).WillOnce( Invoke(this, &QuicDispatcherWriteBlockedListTest::SetBlocked)); EXPECT_CALL(*connection2(), OnCanWrite()).Times(0); dispatcher_.OnCanWrite(); EXPECT_TRUE(dispatcher_.HasPendingWrites()); // And we'll resume where we left off when we get another call. EXPECT_CALL(*connection2(), OnCanWrite()); dispatcher_.OnCanWrite(); EXPECT_FALSE(dispatcher_.HasPendingWrites()); } } // namespace } // namespace test } // namespace tools } // namespace net