mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-05 21:27:35 +03:00
don't negotiate the idle timeout
The idle timeout doesn't need to be negotiated, simply announcing it to the peer is sufficient. We now close the session if there's no incoming network activity for the duration of the local idle timeout, and we send a PING frame after half the remote idle timeout (if keep alives are enabled).
This commit is contained in:
parent
52ed5579f7
commit
a8b603b7bf
7 changed files with 53 additions and 90 deletions
|
@ -62,8 +62,7 @@ func (h *paramsNegotiator) SetFromTransportParameters(params []transportParamete
|
||||||
if len(p.Value) != 2 {
|
if len(p.Value) != 2 {
|
||||||
return fmt.Errorf("wrong length for idle_timeout: %d (expected 2)", len(p.Value))
|
return fmt.Errorf("wrong length for idle_timeout: %d (expected 2)", len(p.Value))
|
||||||
}
|
}
|
||||||
val := time.Duration(binary.BigEndian.Uint16(p.Value)) * time.Second
|
h.remoteIdleTimeout = time.Duration(binary.BigEndian.Uint16(p.Value)) * time.Second
|
||||||
h.idleConnectionStateLifetime = h.negotiateIdleConnectionStateLifetime(val)
|
|
||||||
case omitConnectionIDParameterID:
|
case omitConnectionIDParameterID:
|
||||||
if len(p.Value) != 0 {
|
if len(p.Value) != 0 {
|
||||||
return fmt.Errorf("wrong length for omit_connection_id: %d (expected empty)", len(p.Value))
|
return fmt.Errorf("wrong length for omit_connection_id: %d (expected empty)", len(p.Value))
|
||||||
|
@ -87,7 +86,7 @@ func (h *paramsNegotiator) GetTransportParameters() []transportParameter {
|
||||||
// TODO: use a reasonable value here
|
// TODO: use a reasonable value here
|
||||||
binary.BigEndian.PutUint32(initialMaxStreamID, math.MaxUint32)
|
binary.BigEndian.PutUint32(initialMaxStreamID, math.MaxUint32)
|
||||||
idleTimeout := make([]byte, 2)
|
idleTimeout := make([]byte, 2)
|
||||||
binary.BigEndian.PutUint16(idleTimeout, uint16(h.GetIdleConnectionStateLifetime().Seconds()))
|
binary.BigEndian.PutUint16(idleTimeout, uint16(h.idleTimeout))
|
||||||
maxPacketSize := make([]byte, 2)
|
maxPacketSize := make([]byte, 2)
|
||||||
binary.BigEndian.PutUint16(maxPacketSize, uint16(protocol.MaxReceivePacketSize))
|
binary.BigEndian.PutUint16(maxPacketSize, uint16(protocol.MaxReceivePacketSize))
|
||||||
params := []transportParameter{
|
params := []transportParameter{
|
||||||
|
|
|
@ -19,6 +19,7 @@ type ParamsNegotiator interface {
|
||||||
GetMaxReceiveConnectionFlowControlWindow() protocol.ByteCount
|
GetMaxReceiveConnectionFlowControlWindow() protocol.ByteCount
|
||||||
GetMaxOutgoingStreams() uint32
|
GetMaxOutgoingStreams() uint32
|
||||||
GetMaxIncomingStreams() uint32
|
GetMaxIncomingStreams() uint32
|
||||||
|
// get the idle timeout that was sent by the peer
|
||||||
GetIdleConnectionStateLifetime() time.Duration
|
GetIdleConnectionStateLifetime() time.Duration
|
||||||
// determines if the client requests omission of connection IDs.
|
// determines if the client requests omission of connection IDs.
|
||||||
OmitConnectionID() bool
|
OmitConnectionID() bool
|
||||||
|
@ -43,7 +44,8 @@ type paramsNegotiatorBase struct {
|
||||||
|
|
||||||
maxStreamsPerConnection uint32
|
maxStreamsPerConnection uint32
|
||||||
maxIncomingDynamicStreamsPerConnection uint32
|
maxIncomingDynamicStreamsPerConnection uint32
|
||||||
idleConnectionStateLifetime time.Duration
|
idleTimeout time.Duration
|
||||||
|
remoteIdleTimeout time.Duration
|
||||||
sendStreamFlowControlWindow protocol.ByteCount
|
sendStreamFlowControlWindow protocol.ByteCount
|
||||||
sendConnectionFlowControlWindow protocol.ByteCount
|
sendConnectionFlowControlWindow protocol.ByteCount
|
||||||
receiveStreamFlowControlWindow protocol.ByteCount
|
receiveStreamFlowControlWindow protocol.ByteCount
|
||||||
|
@ -61,7 +63,7 @@ func (h *paramsNegotiatorBase) init(params *TransportParameters) {
|
||||||
h.maxReceiveConnectionFlowControlWindow = params.MaxReceiveConnectionFlowControlWindow
|
h.maxReceiveConnectionFlowControlWindow = params.MaxReceiveConnectionFlowControlWindow
|
||||||
h.requestConnectionIDOmission = params.RequestConnectionIDOmission
|
h.requestConnectionIDOmission = params.RequestConnectionIDOmission
|
||||||
|
|
||||||
h.idleConnectionStateLifetime = params.IdleTimeout
|
h.idleTimeout = params.IdleTimeout
|
||||||
if h.perspective == protocol.PerspectiveServer {
|
if h.perspective == protocol.PerspectiveServer {
|
||||||
h.maxStreamsPerConnection = protocol.MaxStreamsPerConnection // this is the value negotiated based on what the client sent
|
h.maxStreamsPerConnection = protocol.MaxStreamsPerConnection // this is the value negotiated based on what the client sent
|
||||||
h.maxIncomingDynamicStreamsPerConnection = protocol.MaxStreamsPerConnection // "incoming" seen from the client's perspective
|
h.maxIncomingDynamicStreamsPerConnection = protocol.MaxStreamsPerConnection // "incoming" seen from the client's perspective
|
||||||
|
@ -79,10 +81,6 @@ func (h *paramsNegotiatorBase) negotiateMaxIncomingDynamicStreamsPerConnection(c
|
||||||
return utils.MinUint32(clientValue, protocol.MaxIncomingDynamicStreamsPerConnection)
|
return utils.MinUint32(clientValue, protocol.MaxIncomingDynamicStreamsPerConnection)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (h *paramsNegotiatorBase) negotiateIdleConnectionStateLifetime(clientValue time.Duration) time.Duration {
|
|
||||||
return utils.MinDuration(clientValue, h.idleConnectionStateLifetime)
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetSendStreamFlowControlWindow gets the size of the stream-level flow control window for sending data
|
// GetSendStreamFlowControlWindow gets the size of the stream-level flow control window for sending data
|
||||||
func (h *paramsNegotiatorBase) GetSendStreamFlowControlWindow() protocol.ByteCount {
|
func (h *paramsNegotiatorBase) GetSendStreamFlowControlWindow() protocol.ByteCount {
|
||||||
h.mutex.RLock()
|
h.mutex.RLock()
|
||||||
|
@ -137,5 +135,5 @@ func (h *paramsNegotiatorBase) GetMaxIncomingStreams() uint32 {
|
||||||
func (h *paramsNegotiatorBase) GetIdleConnectionStateLifetime() time.Duration {
|
func (h *paramsNegotiatorBase) GetIdleConnectionStateLifetime() time.Duration {
|
||||||
h.mutex.RLock()
|
h.mutex.RLock()
|
||||||
defer h.mutex.RUnlock()
|
defer h.mutex.RUnlock()
|
||||||
return h.idleConnectionStateLifetime
|
return h.remoteIdleTimeout
|
||||||
}
|
}
|
||||||
|
|
|
@ -61,7 +61,7 @@ func (h *paramsNegotiatorGQUIC) SetFromMap(params map[Tag][]byte) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errMalformedTag
|
return errMalformedTag
|
||||||
}
|
}
|
||||||
h.idleConnectionStateLifetime = h.negotiateIdleConnectionStateLifetime(time.Duration(clientValue) * time.Second)
|
h.remoteIdleTimeout = time.Duration(clientValue) * time.Second
|
||||||
}
|
}
|
||||||
if value, ok := params[TagSFCW]; ok {
|
if value, ok := params[TagSFCW]; ok {
|
||||||
if h.flowControlNegotiated {
|
if h.flowControlNegotiated {
|
||||||
|
@ -104,7 +104,7 @@ func (h *paramsNegotiatorGQUIC) GetHelloMap() (map[Tag][]byte, error) {
|
||||||
mids := bytes.NewBuffer([]byte{})
|
mids := bytes.NewBuffer([]byte{})
|
||||||
utils.LittleEndian.WriteUint32(mids, protocol.MaxIncomingDynamicStreamsPerConnection)
|
utils.LittleEndian.WriteUint32(mids, protocol.MaxIncomingDynamicStreamsPerConnection)
|
||||||
icsl := bytes.NewBuffer([]byte{})
|
icsl := bytes.NewBuffer([]byte{})
|
||||||
utils.LittleEndian.WriteUint32(icsl, uint32(h.GetIdleConnectionStateLifetime()/time.Second))
|
utils.LittleEndian.WriteUint32(icsl, uint32(h.idleTimeout/time.Second))
|
||||||
|
|
||||||
return map[Tag][]byte{
|
return map[Tag][]byte{
|
||||||
TagICSL: icsl.Bytes(),
|
TagICSL: icsl.Bytes(),
|
||||||
|
|
|
@ -71,11 +71,11 @@ var _ = Describe("Params Negotiator (for gQUIC)", func() {
|
||||||
})
|
})
|
||||||
|
|
||||||
It("sets the connection-level flow control windows in SHLO", func() {
|
It("sets the connection-level flow control windows in SHLO", func() {
|
||||||
pn.idleConnectionStateLifetime = 0xDECAFBAD * time.Second
|
pn.idleTimeout = 0xdecafbad * time.Second
|
||||||
entryMap, err := pn.GetHelloMap()
|
entryMap, err := pn.GetHelloMap()
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(entryMap).To(HaveKey(TagICSL))
|
Expect(entryMap).To(HaveKey(TagICSL))
|
||||||
Expect(entryMap[TagICSL]).To(Equal([]byte{0xAD, 0xFB, 0xCA, 0xDE}))
|
Expect(entryMap[TagICSL]).To(Equal([]byte{0xad, 0xfb, 0xca, 0xde}))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("sets the negotiated value for maximum streams in the SHLO", func() {
|
It("sets the negotiated value for maximum streams in the SHLO", func() {
|
||||||
|
@ -211,21 +211,8 @@ var _ = Describe("Params Negotiator (for gQUIC)", func() {
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("idle connection state lifetime", func() {
|
Context("idle timeout", func() {
|
||||||
It("has initial idle connection state lifetime", func() {
|
|
||||||
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(idleTimeout))
|
|
||||||
})
|
|
||||||
|
|
||||||
It("negotiates correctly when the peer wants a longer lifetime", func() {
|
|
||||||
Expect(pn.negotiateIdleConnectionStateLifetime(idleTimeout + 10*time.Second)).To(Equal(idleTimeout))
|
|
||||||
})
|
|
||||||
|
|
||||||
It("negotiates correctly when the peer wants a shorter lifetime", func() {
|
|
||||||
Expect(pn.negotiateIdleConnectionStateLifetime(idleTimeout - 3*time.Second)).To(Equal(idleTimeout - 3*time.Second))
|
|
||||||
})
|
|
||||||
|
|
||||||
It("sets the negotiated lifetime", func() {
|
It("sets the negotiated lifetime", func() {
|
||||||
// this test only works if the value given here is smaller than protocol.MaxIdleConnectionStateLifetime
|
|
||||||
values := map[Tag][]byte{
|
values := map[Tag][]byte{
|
||||||
TagICSL: {10, 0, 0, 0},
|
TagICSL: {10, 0, 0, 0},
|
||||||
}
|
}
|
||||||
|
@ -234,21 +221,6 @@ var _ = Describe("Params Negotiator (for gQUIC)", func() {
|
||||||
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(10 * time.Second))
|
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(10 * time.Second))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("does not change the idle connection state lifetime when given an invalid value", func() {
|
|
||||||
values := map[Tag][]byte{
|
|
||||||
TagSFCW: {0xDE, 0xAD, 0xBE}, // 1 byte too short
|
|
||||||
}
|
|
||||||
err := pn.SetFromMap(values)
|
|
||||||
Expect(err).To(MatchError(errMalformedTag))
|
|
||||||
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(idleTimeout))
|
|
||||||
})
|
|
||||||
|
|
||||||
It("gets idle connection state lifetime", func() {
|
|
||||||
value := 0xDECAFBAD * time.Second
|
|
||||||
pn.idleConnectionStateLifetime = value
|
|
||||||
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(value))
|
|
||||||
})
|
|
||||||
|
|
||||||
It("errors when given an invalid value", func() {
|
It("errors when given an invalid value", func() {
|
||||||
values := map[Tag][]byte{TagICSL: {2, 0, 0}} // 1 byte too short
|
values := map[Tag][]byte{TagICSL: {2, 0, 0}} // 1 byte too short
|
||||||
err := pn.SetFromMap(values)
|
err := pn.SetFromMap(values)
|
||||||
|
|
|
@ -33,9 +33,7 @@ var _ = Describe("Params Negotiator (for TLS)", func() {
|
||||||
pn = newParamsNegotiator(
|
pn = newParamsNegotiator(
|
||||||
protocol.PerspectiveServer,
|
protocol.PerspectiveServer,
|
||||||
protocol.VersionWhatever,
|
protocol.VersionWhatever,
|
||||||
&TransportParameters{
|
&TransportParameters{},
|
||||||
IdleTimeout: 0x5000 * time.Second,
|
|
||||||
},
|
|
||||||
)
|
)
|
||||||
params = map[transportParameterID][]byte{
|
params = map[transportParameterID][]byte{
|
||||||
initialMaxStreamDataParameterID: []byte{0x11, 0x22, 0x33, 0x44},
|
initialMaxStreamDataParameterID: []byte{0x11, 0x22, 0x33, 0x44},
|
||||||
|
@ -47,6 +45,7 @@ var _ = Describe("Params Negotiator (for TLS)", func() {
|
||||||
|
|
||||||
Context("getting", func() {
|
Context("getting", func() {
|
||||||
It("creates the parameters list", func() {
|
It("creates the parameters list", func() {
|
||||||
|
pn.idleTimeout = 0xcafe
|
||||||
buf := make([]byte, 4)
|
buf := make([]byte, 4)
|
||||||
values := paramsListToMap(pn.GetTransportParameters())
|
values := paramsListToMap(pn.GetTransportParameters())
|
||||||
Expect(values).To(HaveLen(5))
|
Expect(values).To(HaveLen(5))
|
||||||
|
@ -55,7 +54,7 @@ var _ = Describe("Params Negotiator (for TLS)", func() {
|
||||||
binary.BigEndian.PutUint32(buf, uint32(protocol.ReceiveConnectionFlowControlWindow))
|
binary.BigEndian.PutUint32(buf, uint32(protocol.ReceiveConnectionFlowControlWindow))
|
||||||
Expect(values).To(HaveKeyWithValue(initialMaxDataParameterID, buf))
|
Expect(values).To(HaveKeyWithValue(initialMaxDataParameterID, buf))
|
||||||
Expect(values).To(HaveKeyWithValue(initialMaxStreamIDParameterID, []byte{0xff, 0xff, 0xff, 0xff}))
|
Expect(values).To(HaveKeyWithValue(initialMaxStreamIDParameterID, []byte{0xff, 0xff, 0xff, 0xff}))
|
||||||
Expect(values).To(HaveKeyWithValue(idleTimeoutParameterID, []byte{0x50, 0x0}))
|
Expect(values).To(HaveKeyWithValue(idleTimeoutParameterID, []byte{0xca, 0xfe}))
|
||||||
Expect(values).To(HaveKeyWithValue(maxPacketSizeParameterID, []byte{0x5, 0xac})) // 1452 = 0x5ac
|
Expect(values).To(HaveKeyWithValue(maxPacketSizeParameterID, []byte{0x5, 0xac})) // 1452 = 0x5ac
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -76,13 +75,6 @@ var _ = Describe("Params Negotiator (for TLS)", func() {
|
||||||
Expect(pn.OmitConnectionID()).To(BeFalse())
|
Expect(pn.OmitConnectionID()).To(BeFalse())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("negotiates a smaller idle timeout, if the peer suggest a higher value than configured", func() {
|
|
||||||
params[idleTimeoutParameterID] = []byte{0xff, 0xff}
|
|
||||||
err := pn.SetFromTransportParameters(paramsMapToList(params))
|
|
||||||
Expect(err).ToNot(HaveOccurred())
|
|
||||||
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(0x5000 * time.Second))
|
|
||||||
})
|
|
||||||
|
|
||||||
It("saves if it should omit the connection ID", func() {
|
It("saves if it should omit the connection ID", func() {
|
||||||
params[omitConnectionIDParameterID] = []byte{}
|
params[omitConnectionIDParameterID] = []byte{}
|
||||||
err := pn.SetFromTransportParameters(paramsMapToList(params))
|
err := pn.SetFromTransportParameters(paramsMapToList(params))
|
||||||
|
|
12
session.go
12
session.go
|
@ -329,7 +329,7 @@ runLoop:
|
||||||
s.sentPacketHandler.OnAlarm()
|
s.sentPacketHandler.OnAlarm()
|
||||||
}
|
}
|
||||||
|
|
||||||
if s.config.KeepAlive && s.handshakeComplete && time.Since(s.lastNetworkActivityTime) >= s.idleTimeout()/2 {
|
if s.config.KeepAlive && s.handshakeComplete && time.Since(s.lastNetworkActivityTime) >= s.connParams.GetIdleConnectionStateLifetime()/2 {
|
||||||
// send the PING frame since there is no activity in the session
|
// send the PING frame since there is no activity in the session
|
||||||
s.packer.QueueControlFrame(&wire.PingFrame{})
|
s.packer.QueueControlFrame(&wire.PingFrame{})
|
||||||
s.keepAlivePingSent = true
|
s.keepAlivePingSent = true
|
||||||
|
@ -344,7 +344,7 @@ runLoop:
|
||||||
if !s.handshakeComplete && now.Sub(s.sessionCreationTime) >= s.config.HandshakeTimeout {
|
if !s.handshakeComplete && now.Sub(s.sessionCreationTime) >= s.config.HandshakeTimeout {
|
||||||
s.closeLocal(qerr.Error(qerr.HandshakeTimeout, "Crypto handshake did not complete in time."))
|
s.closeLocal(qerr.Error(qerr.HandshakeTimeout, "Crypto handshake did not complete in time."))
|
||||||
}
|
}
|
||||||
if s.handshakeComplete && now.Sub(s.lastNetworkActivityTime) >= s.idleTimeout() {
|
if s.handshakeComplete && now.Sub(s.lastNetworkActivityTime) >= s.config.IdleTimeout {
|
||||||
s.closeLocal(qerr.Error(qerr.NetworkIdleTimeout, "No recent network activity."))
|
s.closeLocal(qerr.Error(qerr.NetworkIdleTimeout, "No recent network activity."))
|
||||||
}
|
}
|
||||||
s.garbageCollectStreams()
|
s.garbageCollectStreams()
|
||||||
|
@ -368,9 +368,9 @@ func (s *session) Context() context.Context {
|
||||||
func (s *session) maybeResetTimer() {
|
func (s *session) maybeResetTimer() {
|
||||||
var deadline time.Time
|
var deadline time.Time
|
||||||
if s.config.KeepAlive && s.handshakeComplete && !s.keepAlivePingSent {
|
if s.config.KeepAlive && s.handshakeComplete && !s.keepAlivePingSent {
|
||||||
deadline = s.lastNetworkActivityTime.Add(s.idleTimeout() / 2)
|
deadline = s.lastNetworkActivityTime.Add(s.connParams.GetIdleConnectionStateLifetime() / 2)
|
||||||
} else {
|
} else {
|
||||||
deadline = s.lastNetworkActivityTime.Add(s.idleTimeout())
|
deadline = s.lastNetworkActivityTime.Add(s.config.IdleTimeout)
|
||||||
}
|
}
|
||||||
|
|
||||||
if ackAlarm := s.receivedPacketHandler.GetAlarmTimeout(); !ackAlarm.IsZero() {
|
if ackAlarm := s.receivedPacketHandler.GetAlarmTimeout(); !ackAlarm.IsZero() {
|
||||||
|
@ -390,10 +390,6 @@ func (s *session) maybeResetTimer() {
|
||||||
s.timer.Reset(deadline)
|
s.timer.Reset(deadline)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *session) idleTimeout() time.Duration {
|
|
||||||
return s.connParams.GetIdleConnectionStateLifetime()
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) handlePacketImpl(p *receivedPacket) error {
|
func (s *session) handlePacketImpl(p *receivedPacket) error {
|
||||||
if s.perspective == protocol.PerspectiveClient {
|
if s.perspective == protocol.PerspectiveClient {
|
||||||
diversificationNonce := p.publicHeader.DiversificationNonce
|
diversificationNonce := p.publicHeader.DiversificationNonce
|
||||||
|
|
|
@ -1501,36 +1501,45 @@ var _ = Describe("Session", func() {
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("keep-alives", func() {
|
Context("keep-alives", func() {
|
||||||
|
var mockPn *mocks.MockParamsNegotiator
|
||||||
|
// should be shorter than the local timeout for these tests
|
||||||
|
// otherwise we'd send a CONNECTION_CLOSE in the tests where we're testing that no PING is sent
|
||||||
|
remoteIdleTimeout := 20 * time.Second
|
||||||
|
|
||||||
|
BeforeEach(func() {
|
||||||
|
mockPn = mocks.NewMockParamsNegotiator(mockCtrl)
|
||||||
|
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(remoteIdleTimeout).AnyTimes()
|
||||||
|
sess.connParams = mockPn
|
||||||
|
})
|
||||||
|
|
||||||
It("sends a PING", func() {
|
It("sends a PING", func() {
|
||||||
sess.handshakeComplete = true
|
sess.handshakeComplete = true
|
||||||
sess.config.KeepAlive = true
|
sess.config.KeepAlive = true
|
||||||
sess.lastNetworkActivityTime = time.Now().Add(-(sess.idleTimeout() / 2))
|
sess.lastNetworkActivityTime = time.Now().Add(-remoteIdleTimeout / 2)
|
||||||
go sess.run()
|
go sess.run()
|
||||||
defer sess.Close(nil)
|
defer sess.Close(nil)
|
||||||
time.Sleep(60 * time.Millisecond)
|
var data []byte
|
||||||
Eventually(mconn.written).ShouldNot(BeEmpty())
|
Eventually(mconn.written).Should(Receive(&data))
|
||||||
Eventually(func() byte {
|
// -12 because of the crypto tag. This should be 7 (the frame id for a ping frame).
|
||||||
// -12 because of the crypto tag. This should be 7 (the frame id for a ping frame).
|
Expect(data[len(data)-12-1 : len(data)-12]).To(Equal([]byte{0x07}))
|
||||||
s := <-mconn.written
|
|
||||||
return s[len(s)-12-1]
|
|
||||||
}).Should(Equal(byte(0x07)))
|
|
||||||
})
|
})
|
||||||
|
|
||||||
It("doesn't send a PING packet if keep-alive is disabled", func() {
|
It("doesn't send a PING packet if keep-alive is disabled", func() {
|
||||||
sess.handshakeComplete = true
|
sess.handshakeComplete = true
|
||||||
sess.lastNetworkActivityTime = time.Now().Add(-(sess.idleTimeout() / 2))
|
sess.config.KeepAlive = false
|
||||||
|
sess.lastNetworkActivityTime = time.Now().Add(-remoteIdleTimeout / 2)
|
||||||
go sess.run()
|
go sess.run()
|
||||||
defer sess.Close(nil)
|
defer sess.Close(nil)
|
||||||
Consistently(mconn.written).Should(BeEmpty())
|
Consistently(mconn.written).ShouldNot(Receive())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("doesn't send a PING if the handshake isn't completed yet", func() {
|
It("doesn't send a PING if the handshake isn't completed yet", func() {
|
||||||
sess.handshakeComplete = false
|
sess.handshakeComplete = false
|
||||||
sess.config.KeepAlive = true
|
sess.config.KeepAlive = true
|
||||||
sess.lastNetworkActivityTime = time.Now().Add(-(sess.idleTimeout() / 2))
|
sess.lastNetworkActivityTime = time.Now().Add(-remoteIdleTimeout / 2)
|
||||||
go sess.run()
|
go sess.run()
|
||||||
defer sess.Close(nil)
|
defer sess.Close(nil)
|
||||||
Consistently(mconn.written).Should(BeEmpty())
|
Consistently(mconn.written).ShouldNot(Receive())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -1545,7 +1554,7 @@ var _ = Describe("Session", func() {
|
||||||
close(done)
|
close(done)
|
||||||
})
|
})
|
||||||
|
|
||||||
It("times out due to non-completed crypto handshake", func(done Done) {
|
It("times out due to non-completed handshake", func(done Done) {
|
||||||
sess.sessionCreationTime = time.Now().Add(-protocol.DefaultHandshakeTimeout).Add(-time.Second)
|
sess.sessionCreationTime = time.Now().Add(-protocol.DefaultHandshakeTimeout).Add(-time.Second)
|
||||||
err := sess.run() // Would normally not return
|
err := sess.run() // Would normally not return
|
||||||
Expect(err.(*qerr.QuicError).ErrorCode).To(Equal(qerr.HandshakeTimeout))
|
Expect(err.(*qerr.QuicError).ErrorCode).To(Equal(qerr.HandshakeTimeout))
|
||||||
|
@ -1554,37 +1563,34 @@ var _ = Describe("Session", func() {
|
||||||
close(done)
|
close(done)
|
||||||
})
|
})
|
||||||
|
|
||||||
It("does not use ICSL before handshake", func() {
|
It("does not use the idle timeout before the handshake complete", func() {
|
||||||
|
sess.config.IdleTimeout = 9999 * time.Second
|
||||||
defer sess.Close(nil)
|
defer sess.Close(nil)
|
||||||
sess.lastNetworkActivityTime = time.Now().Add(-time.Minute)
|
sess.lastNetworkActivityTime = time.Now().Add(-time.Minute)
|
||||||
mockPn := mocks.NewMockParamsNegotiator(mockCtrl)
|
|
||||||
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(9999 * time.Second).AnyTimes()
|
|
||||||
mockPn.EXPECT().OmitConnectionID().Return(false).AnyTimes()
|
|
||||||
sess.connParams = mockPn
|
|
||||||
sess.packer.connParams = mockPn
|
|
||||||
// the handshake timeout is irrelevant here, since it depends on the time the session was created,
|
// the handshake timeout is irrelevant here, since it depends on the time the session was created,
|
||||||
// and not on the last network activity
|
// and not on the last network activity
|
||||||
done := make(chan struct{})
|
done := make(chan struct{})
|
||||||
go func() {
|
go func() {
|
||||||
|
defer GinkgoRecover()
|
||||||
_ = sess.run()
|
_ = sess.run()
|
||||||
close(done)
|
close(done)
|
||||||
}()
|
}()
|
||||||
Consistently(done).ShouldNot(BeClosed())
|
Consistently(done).ShouldNot(BeClosed())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("uses ICSL after handshake", func(done Done) {
|
It("closes the session due to the idle timeout after handshake", func() {
|
||||||
|
sess.config.IdleTimeout = 0
|
||||||
close(aeadChanged)
|
close(aeadChanged)
|
||||||
mockPn := mocks.NewMockParamsNegotiator(mockCtrl)
|
errChan := make(chan error)
|
||||||
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(0 * time.Second)
|
go func() {
|
||||||
mockPn.EXPECT().OmitConnectionID().Return(false).AnyTimes()
|
defer GinkgoRecover()
|
||||||
sess.connParams = mockPn
|
errChan <- sess.run() // Would normally not return
|
||||||
sess.packer.connParams = mockPn
|
}()
|
||||||
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(0 * time.Second).AnyTimes()
|
var err error
|
||||||
err := sess.run() // Would normally not return
|
Eventually(errChan).Should(Receive(&err))
|
||||||
Expect(err.(*qerr.QuicError).ErrorCode).To(Equal(qerr.NetworkIdleTimeout))
|
Expect(err.(*qerr.QuicError).ErrorCode).To(Equal(qerr.NetworkIdleTimeout))
|
||||||
Expect(mconn.written).To(Receive(ContainSubstring("No recent network activity.")))
|
Expect(mconn.written).To(Receive(ContainSubstring("No recent network activity.")))
|
||||||
Expect(sess.Context().Done()).To(BeClosed())
|
Expect(sess.Context().Done()).To(BeClosed())
|
||||||
close(done)
|
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue