mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-04 12:47:36 +03:00
ackhandler: fix ack of packet number ranges in sent packet handler tests (#4897)
The packet number generator for the application data packet number space randomly skips packet numbers. We need to be careful to not acknowledge a skipped packet when acknowledging a range of packets in the sent packet handler tests.
This commit is contained in:
parent
bf3ccd1fb3
commit
33fd4d1d16
1 changed files with 52 additions and 51 deletions
|
@ -2,6 +2,7 @@ package ackhandler
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"slices"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
@ -52,6 +53,36 @@ func (h *sentPacketHandler) getBytesInFlight() protocol.ByteCount {
|
||||||
return h.bytesInFlight
|
return h.bytesInFlight
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func ackRanges(pns ...protocol.PacketNumber) []wire.AckRange {
|
||||||
|
if len(pns) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
slices.Sort(pns)
|
||||||
|
slices.Reverse(pns)
|
||||||
|
|
||||||
|
var ranges []wire.AckRange
|
||||||
|
start := pns[0]
|
||||||
|
for i := 1; i < len(pns); i++ {
|
||||||
|
if pns[i-1]-pns[i] > 1 {
|
||||||
|
ranges = append(ranges, wire.AckRange{Smallest: pns[i-1], Largest: start})
|
||||||
|
start = pns[i]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return append(ranges, wire.AckRange{Smallest: pns[len(pns)-1], Largest: start})
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAckRanges(t *testing.T) {
|
||||||
|
require.Equal(t, []wire.AckRange{{Smallest: 1, Largest: 1}}, ackRanges(1))
|
||||||
|
require.Equal(t, []wire.AckRange{{Smallest: 1, Largest: 2}}, ackRanges(1, 2))
|
||||||
|
require.Equal(t, []wire.AckRange{{Smallest: 1, Largest: 3}}, ackRanges(1, 2, 3))
|
||||||
|
require.Equal(t, []wire.AckRange{{Smallest: 1, Largest: 3}}, ackRanges(3, 2, 1))
|
||||||
|
require.Equal(t, []wire.AckRange{{Smallest: 1, Largest: 3}}, ackRanges(1, 3, 2))
|
||||||
|
|
||||||
|
require.Equal(t, []wire.AckRange{{Smallest: 3, Largest: 3}, {Smallest: 1, Largest: 1}}, ackRanges(1, 3))
|
||||||
|
require.Equal(t, []wire.AckRange{{Smallest: 3, Largest: 4}, {Smallest: 1, Largest: 1}}, ackRanges(1, 3, 4))
|
||||||
|
require.Equal(t, []wire.AckRange{{Smallest: 5, Largest: 6}, {Smallest: 0, Largest: 2}}, ackRanges(0, 1, 2, 5, 6))
|
||||||
|
}
|
||||||
|
|
||||||
func TestSentPacketHandlerSendAndAcknowledge(t *testing.T) {
|
func TestSentPacketHandlerSendAndAcknowledge(t *testing.T) {
|
||||||
t.Run("Initial", func(t *testing.T) {
|
t.Run("Initial", func(t *testing.T) {
|
||||||
testSentPacketHandlerSendAndAcknowledge(t, protocol.EncryptionInitial)
|
testSentPacketHandlerSendAndAcknowledge(t, protocol.EncryptionInitial)
|
||||||
|
@ -91,12 +122,7 @@ func testSentPacketHandlerSendAndAcknowledge(t *testing.T, encLevel protocol.Enc
|
||||||
}
|
}
|
||||||
|
|
||||||
_, err := sph.ReceivedAck(
|
_, err := sph.ReceivedAck(
|
||||||
&wire.AckFrame{
|
&wire.AckFrame{AckRanges: ackRanges(pns[0], pns[1], pns[2], pns[3], pns[4], pns[7], pns[8], pns[9])},
|
||||||
AckRanges: []wire.AckRange{
|
|
||||||
{Smallest: pns[7], Largest: pns[9]},
|
|
||||||
{Smallest: pns[0], Largest: pns[4]},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
encLevel,
|
encLevel,
|
||||||
time.Now(),
|
time.Now(),
|
||||||
)
|
)
|
||||||
|
@ -105,7 +131,7 @@ func testSentPacketHandlerSendAndAcknowledge(t *testing.T, encLevel protocol.Enc
|
||||||
|
|
||||||
// ACKs that don't acknowledge new packets are ok
|
// ACKs that don't acknowledge new packets are ok
|
||||||
_, err = sph.ReceivedAck(
|
_, err = sph.ReceivedAck(
|
||||||
&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 3}}},
|
&wire.AckFrame{AckRanges: ackRanges(pns[1], pns[2], pns[3])},
|
||||||
encLevel,
|
encLevel,
|
||||||
time.Now(),
|
time.Now(),
|
||||||
)
|
)
|
||||||
|
@ -114,7 +140,7 @@ func testSentPacketHandlerSendAndAcknowledge(t *testing.T, encLevel protocol.Enc
|
||||||
|
|
||||||
// ACKs that don't acknowledge packets that we didn't send are not ok
|
// ACKs that don't acknowledge packets that we didn't send are not ok
|
||||||
_, err = sph.ReceivedAck(
|
_, err = sph.ReceivedAck(
|
||||||
&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pns[7], Largest: pns[9] + 1}}},
|
&wire.AckFrame{AckRanges: ackRanges(pns[7], pns[8], pns[9], pns[9]+1)},
|
||||||
encLevel,
|
encLevel,
|
||||||
time.Now(),
|
time.Now(),
|
||||||
)
|
)
|
||||||
|
@ -194,13 +220,9 @@ func testSentPacketHandlerRTTs(t *testing.T, encLevel protocol.EncryptionLevel,
|
||||||
return pn
|
return pn
|
||||||
}
|
}
|
||||||
|
|
||||||
ackPacket := func(pn protocol.PacketNumber, ti time.Time, ackDelay time.Duration) {
|
ackPacket := func(pn protocol.PacketNumber, ti time.Time, d time.Duration) {
|
||||||
t.Helper()
|
t.Helper()
|
||||||
_, err := sph.ReceivedAck(
|
_, err := sph.ReceivedAck(&wire.AckFrame{DelayTime: d, AckRanges: ackRanges(pn)}, encLevel, ti)
|
||||||
&wire.AckFrame{DelayTime: ackDelay, AckRanges: []wire.AckRange{{Smallest: pn, Largest: pn}}},
|
|
||||||
encLevel,
|
|
||||||
ti,
|
|
||||||
)
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -356,7 +378,7 @@ func testSentPacketHandlerAmplificationLimitClient(t *testing.T, dropHandshake b
|
||||||
require.NotZero(t, sph.GetLossDetectionTimeout())
|
require.NotZero(t, sph.GetLossDetectionTimeout())
|
||||||
// ... but it's still set after receiving an ACK for this packet,
|
// ... but it's still set after receiving an ACK for this packet,
|
||||||
// since we might need to unblock the server's amplification limit
|
// since we might need to unblock the server's amplification limit
|
||||||
_, err := sph.ReceivedAck(&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pn, Largest: pn}}}, protocol.EncryptionInitial, time.Now())
|
_, err := sph.ReceivedAck(&wire.AckFrame{AckRanges: ackRanges(pn)}, protocol.EncryptionInitial, time.Now())
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.NotZero(t, sph.GetLossDetectionTimeout())
|
require.NotZero(t, sph.GetLossDetectionTimeout())
|
||||||
require.Equal(t, SendAny, sph.SendMode(time.Now()))
|
require.Equal(t, SendAny, sph.SendMode(time.Now()))
|
||||||
|
@ -385,7 +407,7 @@ func testSentPacketHandlerAmplificationLimitClient(t *testing.T, dropHandshake b
|
||||||
pn = sph.PopPacketNumber(protocol.EncryptionHandshake)
|
pn = sph.PopPacketNumber(protocol.EncryptionHandshake)
|
||||||
sph.SentPacket(time.Now(), pn, protocol.InvalidPacketNumber, nil, []Frame{{Frame: &wire.PingFrame{}}}, protocol.EncryptionHandshake, protocol.ECNNon, 999, false)
|
sph.SentPacket(time.Now(), pn, protocol.InvalidPacketNumber, nil, []Frame{{Frame: &wire.PingFrame{}}}, protocol.EncryptionHandshake, protocol.ECNNon, 999, false)
|
||||||
require.NotZero(t, sph.GetLossDetectionTimeout())
|
require.NotZero(t, sph.GetLossDetectionTimeout())
|
||||||
_, err = sph.ReceivedAck(&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pn, Largest: pn}}}, protocol.EncryptionHandshake, time.Now())
|
_, err = sph.ReceivedAck(&wire.AckFrame{AckRanges: ackRanges(pn)}, protocol.EncryptionHandshake, time.Now())
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.Zero(t, sph.GetLossDetectionTimeout())
|
require.Zero(t, sph.GetLossDetectionTimeout())
|
||||||
}
|
}
|
||||||
|
@ -423,7 +445,7 @@ func TestSentPacketHandlerDelayBasedLossDetection(t *testing.T) {
|
||||||
pn4 := sendPacket(now, false)
|
pn4 := sendPacket(now, false)
|
||||||
|
|
||||||
_, err := sph.ReceivedAck(
|
_, err := sph.ReceivedAck(
|
||||||
&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pn4, Largest: pn4}}},
|
&wire.AckFrame{AckRanges: ackRanges(pn4)},
|
||||||
protocol.EncryptionInitial,
|
protocol.EncryptionInitial,
|
||||||
now.Add(time.Second),
|
now.Add(time.Second),
|
||||||
)
|
)
|
||||||
|
@ -465,7 +487,7 @@ func TestSentPacketHandlerPacketBasedLossDetection(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
_, err := sph.ReceivedAck(
|
_, err := sph.ReceivedAck(
|
||||||
&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pns[3], Largest: pns[3]}}},
|
&wire.AckFrame{AckRanges: ackRanges(pns[3])},
|
||||||
protocol.EncryptionInitial,
|
protocol.EncryptionInitial,
|
||||||
now.Add(time.Second),
|
now.Add(time.Second),
|
||||||
)
|
)
|
||||||
|
@ -474,7 +496,7 @@ func TestSentPacketHandlerPacketBasedLossDetection(t *testing.T) {
|
||||||
require.Equal(t, []protocol.PacketNumber{pns[0]}, packets.Lost)
|
require.Equal(t, []protocol.PacketNumber{pns[0]}, packets.Lost)
|
||||||
|
|
||||||
_, err = sph.ReceivedAck(
|
_, err = sph.ReceivedAck(
|
||||||
&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pns[4], Largest: pns[4]}}},
|
&wire.AckFrame{AckRanges: ackRanges(pns[4])},
|
||||||
protocol.EncryptionInitial,
|
protocol.EncryptionInitial,
|
||||||
now.Add(time.Second),
|
now.Add(time.Second),
|
||||||
)
|
)
|
||||||
|
@ -630,7 +652,7 @@ func testSentPacketHandlerPTO(t *testing.T, encLevel protocol.EncryptionLevel, p
|
||||||
tr.EXPECT().SetLossTimer(logging.TimerTypePTO, encLevel, gomock.Any()),
|
tr.EXPECT().SetLossTimer(logging.TimerTypePTO, encLevel, gomock.Any()),
|
||||||
)
|
)
|
||||||
_, err := sph.ReceivedAck(
|
_, err := sph.ReceivedAck(
|
||||||
&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pns[7], Largest: pns[7]}}},
|
&wire.AckFrame{AckRanges: ackRanges(pns[7])},
|
||||||
encLevel,
|
encLevel,
|
||||||
sendTimes[7].Add(time.Microsecond),
|
sendTimes[7].Add(time.Microsecond),
|
||||||
)
|
)
|
||||||
|
@ -847,22 +869,14 @@ func TestSentPacketHandlerCongestion(t *testing.T) {
|
||||||
cong.EXPECT().OnPacketAcked(pns[2], protocol.ByteCount(1000), protocol.ByteCount(5000), ackTime),
|
cong.EXPECT().OnPacketAcked(pns[2], protocol.ByteCount(1000), protocol.ByteCount(5000), ackTime),
|
||||||
cong.EXPECT().OnPacketAcked(pns[3], protocol.ByteCount(1000), protocol.ByteCount(5000), ackTime),
|
cong.EXPECT().OnPacketAcked(pns[3], protocol.ByteCount(1000), protocol.ByteCount(5000), ackTime),
|
||||||
)
|
)
|
||||||
_, err := sph.ReceivedAck(
|
_, err := sph.ReceivedAck(&wire.AckFrame{AckRanges: ackRanges(pns[2], pns[3])}, protocol.EncryptionInitial, ackTime)
|
||||||
&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pns[2], Largest: pns[3]}}},
|
|
||||||
protocol.EncryptionInitial,
|
|
||||||
ackTime,
|
|
||||||
)
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.Equal(t, []protocol.PacketNumber{pns[2], pns[3]}, packets.Acked)
|
require.Equal(t, []protocol.PacketNumber{pns[2], pns[3]}, packets.Acked)
|
||||||
require.Equal(t, []protocol.PacketNumber{pns[0], pns[1]}, packets.Lost)
|
require.Equal(t, []protocol.PacketNumber{pns[0], pns[1]}, packets.Lost)
|
||||||
|
|
||||||
// Now receive a (delayed) ACK for the 1st packet.
|
// Now receive a (delayed) ACK for the 1st packet.
|
||||||
// Since this packet was already lost, we don't expect any calls to the congestion controller.
|
// Since this packet was already lost, we don't expect any calls to the congestion controller.
|
||||||
_, err = sph.ReceivedAck(
|
_, err = sph.ReceivedAck(&wire.AckFrame{AckRanges: ackRanges(pns[0])}, protocol.EncryptionInitial, ackTime)
|
||||||
&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pns[0], Largest: pns[0]}}},
|
|
||||||
protocol.EncryptionInitial,
|
|
||||||
ackTime,
|
|
||||||
)
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
// we should now have a PTO timer armed for the 4th packet
|
// we should now have a PTO timer armed for the 4th packet
|
||||||
|
@ -1031,7 +1045,7 @@ func TestSentPacketHandlerECN(t *testing.T) {
|
||||||
})
|
})
|
||||||
_, err := sph.ReceivedAck(
|
_, err := sph.ReceivedAck(
|
||||||
&wire.AckFrame{
|
&wire.AckFrame{
|
||||||
AckRanges: []wire.AckRange{{Smallest: pns[2], Largest: pns[3]}},
|
AckRanges: ackRanges(pns[2], pns[3]),
|
||||||
ECT0: 10,
|
ECT0: 10,
|
||||||
ECT1: 11,
|
ECT1: 11,
|
||||||
ECNCE: 12,
|
ECNCE: 12,
|
||||||
|
@ -1045,11 +1059,8 @@ func TestSentPacketHandlerECN(t *testing.T) {
|
||||||
// The second packet is still outstanding.
|
// The second packet is still outstanding.
|
||||||
// Receive a (delayed) ACK for it.
|
// Receive a (delayed) ACK for it.
|
||||||
// Since the new ECN counts were already reported, ECN marks on this ACK frame are ignored.
|
// Since the new ECN counts were already reported, ECN marks on this ACK frame are ignored.
|
||||||
_, err = sph.ReceivedAck(
|
now = now.Add(100 * time.Millisecond)
|
||||||
&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pns[1], Largest: pns[1]}}},
|
_, err = sph.ReceivedAck(&wire.AckFrame{AckRanges: ackRanges(pns[1])}, protocol.Encryption1RTT, now)
|
||||||
protocol.Encryption1RTT,
|
|
||||||
now.Add(100*time.Millisecond),
|
|
||||||
)
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
// Send two more packets, and receive an ACK for the second one.
|
// Send two more packets, and receive an ACK for the second one.
|
||||||
|
@ -1063,19 +1074,13 @@ func TestSentPacketHandlerECN(t *testing.T) {
|
||||||
return false
|
return false
|
||||||
},
|
},
|
||||||
)
|
)
|
||||||
_, err = sph.ReceivedAck(
|
now = now.Add(100 * time.Millisecond)
|
||||||
&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pns[1], Largest: pns[1]}}},
|
_, err = sph.ReceivedAck(&wire.AckFrame{AckRanges: ackRanges(pns[1])}, protocol.Encryption1RTT, now)
|
||||||
protocol.Encryption1RTT,
|
|
||||||
now.Add(100*time.Millisecond),
|
|
||||||
)
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
// Receiving an ACK that covers both packets doesn't cause the ECN marks to be reported,
|
// Receiving an ACK that covers both packets doesn't cause the ECN marks to be reported,
|
||||||
// since the largest acked didn't increase.
|
// since the largest acked didn't increase.
|
||||||
_, err = sph.ReceivedAck(
|
now = now.Add(100 * time.Millisecond)
|
||||||
&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pns[0], Largest: pns[1]}}},
|
_, err = sph.ReceivedAck(&wire.AckFrame{AckRanges: ackRanges(pns[0], pns[1])}, protocol.Encryption1RTT, now)
|
||||||
protocol.Encryption1RTT,
|
|
||||||
now.Add(100*time.Millisecond),
|
|
||||||
)
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
// Send another packet, and have the ECN handler report congestion.
|
// Send another packet, and have the ECN handler report congestion.
|
||||||
|
@ -1088,10 +1093,6 @@ func TestSentPacketHandlerECN(t *testing.T) {
|
||||||
ecnHandler.EXPECT().HandleNewlyAcked(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return(true),
|
ecnHandler.EXPECT().HandleNewlyAcked(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return(true),
|
||||||
cong.EXPECT().OnCongestionEvent(pns[0], protocol.ByteCount(0), gomock.Any()),
|
cong.EXPECT().OnCongestionEvent(pns[0], protocol.ByteCount(0), gomock.Any()),
|
||||||
)
|
)
|
||||||
_, err = sph.ReceivedAck(
|
_, err = sph.ReceivedAck(&wire.AckFrame{AckRanges: ackRanges(pns[0])}, protocol.Encryption1RTT, now.Add(100*time.Millisecond))
|
||||||
&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: pns[0], Largest: pns[0]}}},
|
|
||||||
protocol.Encryption1RTT,
|
|
||||||
now.Add(100*time.Millisecond),
|
|
||||||
)
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue