blob: aefb0219c2d592c4159227e3c86d7a2fc0ccd70e [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/quic/quic_server_session.h"
#include "base/logging.h"
#include "net/quic/crypto/source_address_token.h"
#include "net/quic/quic_connection.h"
#include "net/quic/quic_flags.h"
#include "net/quic/quic_spdy_server_stream.h"
#include "net/quic/reliable_quic_stream.h"
namespace net {
QuicServerSession::QuicServerSession(
const QuicConfig& config,
QuicConnection* connection,
QuicServerSessionVisitor* visitor)
: QuicSession(connection, config),
visitor_(visitor),
bandwidth_estimate_sent_to_client_(QuicBandwidth::Zero()),
last_server_config_update_time_(QuicTime::Zero()) {}
QuicServerSession::~QuicServerSession() {}
void QuicServerSession::InitializeSession(
const QuicCryptoServerConfig& crypto_config) {
QuicSession::InitializeSession();
crypto_stream_.reset(CreateQuicCryptoServerStream(crypto_config));
}
QuicCryptoServerStream* QuicServerSession::CreateQuicCryptoServerStream(
const QuicCryptoServerConfig& crypto_config) {
return new QuicCryptoServerStream(crypto_config, this);
}
void QuicServerSession::OnConfigNegotiated() {
QuicSession::OnConfigNegotiated();
if (!FLAGS_enable_quic_fec ||
!config()->HasReceivedConnectionOptions() ||
!ContainsQuicTag(config()->ReceivedConnectionOptions(), kFHDR)) {
return;
}
// kFHDR config maps to FEC protection always for headers stream.
// TODO(jri): Add crypto stream in addition to headers for kHDR.
headers_stream_->set_fec_policy(FEC_PROTECT_ALWAYS);
}
void QuicServerSession::OnConnectionClosed(QuicErrorCode error,
bool from_peer) {
QuicSession::OnConnectionClosed(error, from_peer);
// In the unlikely event we get a connection close while doing an asynchronous
// crypto event, make sure we cancel the callback.
if (crypto_stream_.get() != NULL) {
crypto_stream_->CancelOutstandingCallbacks();
}
visitor_->OnConnectionClosed(connection()->connection_id(), error);
}
void QuicServerSession::OnWriteBlocked() {
QuicSession::OnWriteBlocked();
visitor_->OnWriteBlocked(connection());
}
void QuicServerSession::OnCongestionWindowChange(QuicTime now) {
if (connection()->version() <= QUIC_VERSION_21) {
return;
}
// If not enough time has passed since the last time we sent an update to the
// client, then return early.
const QuicSentPacketManager& sent_packet_manager =
connection()->sent_packet_manager();
int64 srtt_ms =
sent_packet_manager.GetRttStats()->SmoothedRtt().ToMilliseconds();
int64 now_ms = now.Subtract(last_server_config_update_time_).ToMilliseconds();
if (now_ms < (kMinIntervalBetweenServerConfigUpdatesRTTs * srtt_ms) ||
now_ms < kMinIntervalBetweenServerConfigUpdatesMs) {
return;
}
// If the bandwidth recorder does not have a valid estimate, return early.
const QuicSustainedBandwidthRecorder& bandwidth_recorder =
sent_packet_manager.SustainedBandwidthRecorder();
if (!bandwidth_recorder.HasEstimate()) {
return;
}
// The bandwidth recorder has recorded at least one sustained bandwidth
// estimate. Check that it's substantially different from the last one that
// we sent to the client, and if so, send the new one.
QuicBandwidth new_bandwidth_estimate = bandwidth_recorder.BandwidthEstimate();
int64 bandwidth_delta =
std::abs(new_bandwidth_estimate.ToBitsPerSecond() -
bandwidth_estimate_sent_to_client_.ToBitsPerSecond());
// Define "substantial" difference as a 50% increase or decrease from the
// last estimate.
bool substantial_difference =
bandwidth_delta >
0.5 * bandwidth_estimate_sent_to_client_.ToBitsPerSecond();
if (!substantial_difference) {
return;
}
bandwidth_estimate_sent_to_client_ = new_bandwidth_estimate;
DVLOG(1) << "Server: sending new bandwidth estimate (KBytes/s): "
<< bandwidth_estimate_sent_to_client_.ToKBytesPerSecond();
// Include max bandwidth in the update.
QuicBandwidth max_bandwidth_estimate =
bandwidth_recorder.MaxBandwidthEstimate();
int32 max_bandwidth_timestamp = bandwidth_recorder.MaxBandwidthTimestamp();
// Fill the proto before passing it to the crypto stream to send.
CachedNetworkParameters cached_network_params;
cached_network_params.set_bandwidth_estimate_bytes_per_second(
bandwidth_estimate_sent_to_client_.ToBytesPerSecond());
cached_network_params.set_max_bandwidth_estimate_bytes_per_second(
max_bandwidth_estimate.ToBytesPerSecond());
cached_network_params.set_max_bandwidth_timestamp_seconds(
max_bandwidth_timestamp);
cached_network_params.set_min_rtt_ms(
sent_packet_manager.GetRttStats()->min_rtt().ToMilliseconds());
cached_network_params.set_previous_connection_state(
bandwidth_recorder.EstimateRecordedDuringSlowStart()
? CachedNetworkParameters::SLOW_START
: CachedNetworkParameters::CONGESTION_AVOIDANCE);
if (!serving_region_.empty()) {
cached_network_params.set_serving_region(serving_region_);
}
crypto_stream_->SendServerConfigUpdate(&cached_network_params);
last_server_config_update_time_ = now;
}
bool QuicServerSession::ShouldCreateIncomingDataStream(QuicStreamId id) {
if (id % 2 == 0) {
DVLOG(1) << "Invalid incoming even stream_id:" << id;
connection()->SendConnectionClose(QUIC_INVALID_STREAM_ID);
return false;
}
if (GetNumOpenStreams() >= get_max_open_streams()) {
DVLOG(1) << "Failed to create a new incoming stream with id:" << id
<< " Already " << GetNumOpenStreams() << " streams open (max "
<< get_max_open_streams() << ").";
connection()->SendConnectionClose(QUIC_TOO_MANY_OPEN_STREAMS);
return false;
}
return true;
}
QuicDataStream* QuicServerSession::CreateIncomingDataStream(
QuicStreamId id) {
if (!ShouldCreateIncomingDataStream(id)) {
return NULL;
}
return new QuicSpdyServerStream(id, this);
}
QuicDataStream* QuicServerSession::CreateOutgoingDataStream() {
DLOG(ERROR) << "Server push not yet supported";
return NULL;
}
QuicCryptoServerStream* QuicServerSession::GetCryptoStream() {
return crypto_stream_.get();
}
} // namespace net