mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-05 21:27:35 +03:00
send keep alive PINGs at least every 20 seconds
This commit is contained in:
parent
a50b174703
commit
bd94f21ab0
3 changed files with 49 additions and 31 deletions
|
@ -99,6 +99,10 @@ const DefaultIdleTimeout = 30 * time.Second
|
||||||
// DefaultHandshakeTimeout is the default timeout for a connection until the crypto handshake succeeds.
|
// DefaultHandshakeTimeout is the default timeout for a connection until the crypto handshake succeeds.
|
||||||
const DefaultHandshakeTimeout = 10 * time.Second
|
const DefaultHandshakeTimeout = 10 * time.Second
|
||||||
|
|
||||||
|
// MaxKeepAliveInterval is the maximum time until we send a packet to keep a connection alive.
|
||||||
|
// It should be shorter than the time that NATs clear their mapping.
|
||||||
|
const MaxKeepAliveInterval = 20 * time.Second
|
||||||
|
|
||||||
// RetiredConnectionIDDeleteTimeout is the time we keep closed sessions around in order to retransmit the CONNECTION_CLOSE.
|
// RetiredConnectionIDDeleteTimeout is the time we keep closed sessions around in order to retransmit the CONNECTION_CLOSE.
|
||||||
// after this time all information about the old connection will be deleted
|
// after this time all information about the old connection will be deleted
|
||||||
const RetiredConnectionIDDeleteTimeout = 5 * time.Second
|
const RetiredConnectionIDDeleteTimeout = 5 * time.Second
|
||||||
|
|
10
session.go
10
session.go
|
@ -170,9 +170,10 @@ type session struct {
|
||||||
peerParams *handshake.TransportParameters
|
peerParams *handshake.TransportParameters
|
||||||
|
|
||||||
timer *utils.Timer
|
timer *utils.Timer
|
||||||
// keepAlivePingSent stores whether a Ping frame was sent to the peer or not
|
// keepAlivePingSent stores whether a keep alive PING is in flight.
|
||||||
// it is reset as soon as we receive a packet from the peer
|
// It is reset as soon as we receive a packet from the peer.
|
||||||
keepAlivePingSent bool
|
keepAlivePingSent bool
|
||||||
|
keepAliveInterval time.Duration
|
||||||
|
|
||||||
traceCallback func(quictrace.Event)
|
traceCallback func(quictrace.Event)
|
||||||
|
|
||||||
|
@ -504,7 +505,7 @@ runLoop:
|
||||||
if s.pacingDeadline.IsZero() { // the timer didn't have a pacing deadline set
|
if s.pacingDeadline.IsZero() { // the timer didn't have a pacing deadline set
|
||||||
pacingDeadline = s.sentPacketHandler.TimeUntilSend()
|
pacingDeadline = s.sentPacketHandler.TimeUntilSend()
|
||||||
}
|
}
|
||||||
if s.config.KeepAlive && !s.keepAlivePingSent && s.handshakeComplete && s.firstAckElicitingPacketAfterIdleSentTime.IsZero() && time.Since(s.lastPacketReceivedTime) >= s.peerParams.IdleTimeout/2 {
|
if s.config.KeepAlive && !s.keepAlivePingSent && s.handshakeComplete && s.firstAckElicitingPacketAfterIdleSentTime.IsZero() && time.Since(s.lastPacketReceivedTime) >= s.keepAliveInterval/2 {
|
||||||
// send a PING frame since there is no activity in the session
|
// send a PING frame since there is no activity in the session
|
||||||
s.logger.Debugf("Sending a keep-alive ping to keep the connection alive.")
|
s.logger.Debugf("Sending a keep-alive ping to keep the connection alive.")
|
||||||
s.framer.QueueControlFrame(&wire.PingFrame{})
|
s.framer.QueueControlFrame(&wire.PingFrame{})
|
||||||
|
@ -558,7 +559,7 @@ func (s *session) ConnectionState() tls.ConnectionState {
|
||||||
func (s *session) maybeResetTimer() {
|
func (s *session) maybeResetTimer() {
|
||||||
var deadline time.Time
|
var deadline time.Time
|
||||||
if s.config.KeepAlive && s.handshakeComplete && !s.keepAlivePingSent {
|
if s.config.KeepAlive && s.handshakeComplete && !s.keepAlivePingSent {
|
||||||
deadline = s.idleTimeoutStartTime().Add(s.peerParams.IdleTimeout / 2)
|
deadline = s.idleTimeoutStartTime().Add(s.keepAliveInterval / 2)
|
||||||
} else {
|
} else {
|
||||||
deadline = s.idleTimeoutStartTime().Add(s.config.IdleTimeout)
|
deadline = s.idleTimeoutStartTime().Add(s.config.IdleTimeout)
|
||||||
}
|
}
|
||||||
|
@ -1079,6 +1080,7 @@ func (s *session) processTransportParameters(data []byte) {
|
||||||
}
|
}
|
||||||
s.logger.Debugf("Received Transport Parameters: %s", params)
|
s.logger.Debugf("Received Transport Parameters: %s", params)
|
||||||
s.peerParams = params
|
s.peerParams = params
|
||||||
|
s.keepAliveInterval = utils.MinDuration(params.IdleTimeout/2, protocol.MaxKeepAliveInterval)
|
||||||
if err := s.streamsMap.UpdateLimits(params); err != nil {
|
if err := s.streamsMap.UpdateLimits(params); err != nil {
|
||||||
s.closeLocal(err)
|
s.closeLocal(err)
|
||||||
return
|
return
|
||||||
|
|
|
@ -1295,12 +1295,24 @@ var _ = Describe("Session", func() {
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("keep-alives", func() {
|
Context("keep-alives", func() {
|
||||||
// should be shorter than the local timeout for these tests
|
setRemoteIdleTimeout := func(t time.Duration) {
|
||||||
// otherwise we'd send a CONNECTION_CLOSE in the tests where we're testing that no PING is sent
|
tp := &handshake.TransportParameters{IdleTimeout: t}
|
||||||
remoteIdleTimeout := 20 * time.Second
|
streamManager.EXPECT().UpdateLimits(gomock.Any())
|
||||||
|
packer.EXPECT().HandleTransportParameters(gomock.Any())
|
||||||
|
sess.processTransportParameters(tp.Marshal())
|
||||||
|
}
|
||||||
|
|
||||||
|
runSession := func() {
|
||||||
|
go func() {
|
||||||
|
defer GinkgoRecover()
|
||||||
|
cryptoSetup.EXPECT().RunHandshake().MaxTimes(1)
|
||||||
|
sess.run()
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
sess.peerParams = &handshake.TransportParameters{IdleTimeout: remoteIdleTimeout}
|
sess.config.KeepAlive = true
|
||||||
|
sess.handshakeComplete = true
|
||||||
})
|
})
|
||||||
|
|
||||||
AfterEach(func() {
|
AfterEach(func() {
|
||||||
|
@ -1313,44 +1325,44 @@ var _ = Describe("Session", func() {
|
||||||
Eventually(sess.Context().Done()).Should(BeClosed())
|
Eventually(sess.Context().Done()).Should(BeClosed())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("sends a PING as a keep-alive", func() {
|
It("sends a PING as a keep-alive after half the idle timeout", func() {
|
||||||
sess.handshakeComplete = true
|
setRemoteIdleTimeout(5 * time.Second)
|
||||||
sess.config.KeepAlive = true
|
sess.lastPacketReceivedTime = time.Now().Add(-protocol.MaxKeepAliveInterval)
|
||||||
sess.lastPacketReceivedTime = time.Now().Add(-remoteIdleTimeout / 2)
|
|
||||||
sent := make(chan struct{})
|
sent := make(chan struct{})
|
||||||
packer.EXPECT().PackPacket().Do(func() (*packedPacket, error) {
|
packer.EXPECT().PackPacket().Do(func() (*packedPacket, error) {
|
||||||
close(sent)
|
close(sent)
|
||||||
return nil, nil
|
return nil, nil
|
||||||
})
|
})
|
||||||
go func() {
|
runSession()
|
||||||
defer GinkgoRecover()
|
Eventually(sent).Should(BeClosed())
|
||||||
cryptoSetup.EXPECT().RunHandshake().MaxTimes(1)
|
})
|
||||||
sess.run()
|
|
||||||
}()
|
It("sends a PING after a maximum of protocol.MaxKeepAliveInterval", func() {
|
||||||
|
setRemoteIdleTimeout(time.Hour)
|
||||||
|
sess.lastPacketReceivedTime = time.Now().Add(-protocol.MaxKeepAliveInterval).Add(-time.Millisecond)
|
||||||
|
sent := make(chan struct{})
|
||||||
|
packer.EXPECT().PackPacket().Do(func() (*packedPacket, error) {
|
||||||
|
close(sent)
|
||||||
|
return nil, nil
|
||||||
|
})
|
||||||
|
runSession()
|
||||||
Eventually(sent).Should(BeClosed())
|
Eventually(sent).Should(BeClosed())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("doesn't send a PING packet if keep-alive is disabled", func() {
|
It("doesn't send a PING packet if keep-alive is disabled", func() {
|
||||||
sess.handshakeComplete = true
|
setRemoteIdleTimeout(5 * time.Second)
|
||||||
sess.config.KeepAlive = false
|
sess.config.KeepAlive = false
|
||||||
sess.lastPacketReceivedTime = time.Now().Add(-remoteIdleTimeout / 2)
|
sess.lastPacketReceivedTime = time.Now().Add(-time.Second * 5 / 2)
|
||||||
go func() {
|
runSession()
|
||||||
defer GinkgoRecover()
|
|
||||||
cryptoSetup.EXPECT().RunHandshake().MaxTimes(1)
|
|
||||||
sess.run()
|
|
||||||
}()
|
|
||||||
Consistently(mconn.written).ShouldNot(Receive())
|
Consistently(mconn.written).ShouldNot(Receive())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("doesn't send a PING if the handshake isn't completed yet", func() {
|
It("doesn't send a PING if the handshake isn't completed yet", func() {
|
||||||
sess.handshakeComplete = false
|
sess.handshakeComplete = false
|
||||||
sess.config.KeepAlive = true
|
// Needs to be shorter than our idle timeout.
|
||||||
sess.lastPacketReceivedTime = time.Now().Add(-remoteIdleTimeout / 2)
|
// Otherwise we'll try to send a CONNECTION_CLOSE.
|
||||||
go func() {
|
sess.lastPacketReceivedTime = time.Now().Add(-20 * time.Second)
|
||||||
defer GinkgoRecover()
|
runSession()
|
||||||
cryptoSetup.EXPECT().RunHandshake().MaxTimes(1)
|
|
||||||
sess.run()
|
|
||||||
}()
|
|
||||||
Consistently(mconn.written).ShouldNot(Receive())
|
Consistently(mconn.written).ShouldNot(Receive())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue