Prevent IETF QUIC Frame transmission prior to config
A number of IETF QUIC fames, including MAX_STREAMS and STREAMS_BLOCKED, should not be sent prior to having the session configured.
gfe-relnote: N/A IETF QUIC, protected via V99 flag.
PiperOrigin-RevId: 269611696
Change-Id: Ibed580f9bff8f716f3f78481022b5c929f5634ef
diff --git a/quic/core/quic_stream_id_manager_test.cc b/quic/core/quic_stream_id_manager_test.cc
index 06eb141..67f20f4 100644
--- a/quic/core/quic_stream_id_manager_test.cc
+++ b/quic/core/quic_stream_id_manager_test.cc
@@ -56,6 +56,9 @@
public:
TestQuicSession(QuicConnection* connection)
: MockQuicSession(connection, /*create_mock_crypto_stream=*/true) {
+ // Initialize to an invalid frame type to detect cases where the frame type
+ // is not set subsequently.
+ save_frame_.type = static_cast<QuicFrameType>(-1);
Initialize();
}
@@ -277,6 +280,10 @@
QuicStreamCount stream_count =
stream_id_manager_->incoming_initial_max_open_streams() - 1;
QuicStreamsBlockedFrame frame(0, stream_count, /*unidirectional=*/false);
+
+ // Simulate being configured so that the MAX_STREAMS is transmitted.
+ session_->OnConfigNegotiated();
+
session_->OnStreamsBlockedFrame(frame);
// We should see a MAX_STREAMS frame.
@@ -395,6 +402,9 @@
// Get the current maximum allowed incoming stream count.
QuicStreamCount advertised_stream_count =
stream_id_manager_->incoming_advertised_max_streams();
+ // Simulate receiving a config to allow frame transmission
+ session_->OnConfigNegotiated();
+
QuicStreamsBlockedFrame frame;
frame.unidirectional = IsUnidi();
@@ -457,6 +467,15 @@
// Number of streams we can open and the first one we should get when
// opening...
size_t number_of_streams = kDefaultMaxStreamsPerConnection;
+
+ // Set up config to allow the default stream limit and then
+ // simulate receiving a config to allow frame transmission
+ QuicConfigPeer::SetReceivedMaxIncomingUnidirectionalStreams(
+ session_->config(), kDefaultMaxStreamsPerConnection);
+ QuicConfigPeer::SetReceivedMaxIncomingBidirectionalStreams(
+ session_->config(), kDefaultMaxStreamsPerConnection);
+ session_->OnConfigNegotiated();
+
QuicStreamId stream_id =
IsUnidi() ? session_->next_outgoing_unidirectional_stream_id()
: session_->next_outgoing_bidirectional_stream_id();
@@ -510,6 +529,9 @@
// Test the MAX STREAMS Window functionality.
TEST_P(QuicStreamIdManagerTestClient, StreamIdManagerServerMaxStreams) {
+ // Simulate completed config to allow frame transmission
+ session_->OnConfigNegotiated();
+
// Test that a MAX_STREAMS frame is generated when the peer has less than
// |max_streams_window_| streams left that it can initiate.
@@ -585,6 +607,9 @@
// Check that edge conditions of the stream count in a STREAMS_BLOCKED frame
// are. properly handled.
TEST_P(QuicStreamIdManagerTestClient, StreamsBlockedEdgeConditions) {
+ // Simulate completed config to allow frame transmission
+ session_->OnConfigNegotiated();
+
QuicStreamsBlockedFrame frame;
frame.unidirectional = IsUnidi();
@@ -607,6 +632,28 @@
EXPECT_EQ(123u, session_->save_frame().max_streams_frame.stream_count);
}
+TEST_P(QuicStreamIdManagerTestClient, HoldMaxStreamsFrame) {
+ if (!VersionHasIetfQuicFrames(transport_version())) {
+ return;
+ }
+
+ // The session has not been configured so frame transmission will not be
+ // allowed.
+ EXPECT_CALL(*connection_, SendControlFrame(_)).Times(0);
+
+ QuicStreamsBlockedFrame frame(
+ 1u, 0u, QuicStreamIdManagerPeer::get_unidirectional(stream_id_manager_));
+ // Should cause change in pending_max_streams.
+ stream_id_manager_->OnStreamsBlockedFrame(frame);
+ // Will do OnConfig. We should see a control frame pop out now.
+ EXPECT_CALL(*connection_, SendControlFrame(_)).Times(1);
+
+ // Now allow frame transmission -- which happens when the QuicSession
+ // receives the configuration and calls
+ // QuicStreamIdManager::OnConfigNegotiated()
+ session_->OnConfigNegotiated();
+}
+
// Following tests all are server-specific. They depend, in some way, on
// server-specific attributes, such as the initial stream ID.
@@ -616,6 +663,64 @@
: QuicStreamIdManagerTestBase(Perspective::IS_SERVER) {}
};
+TEST_P(QuicStreamIdManagerTestClient, HoldStreamsBlockedFrameXmit) {
+ if (!VersionHasIetfQuicFrames(transport_version())) {
+ return;
+ }
+
+ // set outgoing limit to 0, will cause the CanOpenNext... to fail
+ // leading to a STREAMS_BLOCKED.
+ QuicStreamIdManagerPeer::set_outgoing_max_streams(stream_id_manager_, 0);
+
+ // We should not see a STREAMS-BLOCKED frame because we're not configured..
+ EXPECT_CALL(*connection_, SendControlFrame(_)).Times(0);
+
+ // Since the stream limit is 0 and no sreams can be created this should return
+ // false and have forced a streams-blocked to be queued up, with the
+ // blocked stream id == 0.
+ EXPECT_FALSE(stream_id_manager_->CanOpenNextOutgoingStream());
+
+ // Simulate receipt of the configuration; This case does not update the
+ // outgoing stream limit, so the on-config should result in a streams-blocked
+ // being sent.
+ EXPECT_CALL(*connection_, SendControlFrame(_)).Times(1);
+ QuicConfigPeer::SetReceivedMaxIncomingUnidirectionalStreams(
+ session_->config(), 0);
+ QuicConfigPeer::SetReceivedMaxIncomingBidirectionalStreams(session_->config(),
+ 0);
+ session_->OnConfigNegotiated();
+}
+
+TEST_P(QuicStreamIdManagerTestClient, HoldStreamsBlockedFrameNoXmit) {
+ if (!VersionHasIetfQuicFrames(transport_version())) {
+ return;
+ }
+ // Set outgoing limit to 0, will cause the CanOpenNext... to fail
+ // leading to a STREAMS_BLOCKED.
+ QuicStreamIdManagerPeer::set_outgoing_max_streams(stream_id_manager_, 0);
+
+ // We should not see a STREAMS-BLOCKED frame because we're not configured..
+ EXPECT_CALL(*connection_, SendControlFrame(_)).Times(0);
+
+ // Since the stream limit is 0 and no sreams can be created this should return
+ // false and have forced a streams-blocked to be queued up, with the
+ // blocked stream id == 0.
+ EXPECT_FALSE(stream_id_manager_->CanOpenNextOutgoingStream());
+
+ // Since the config gives some streams to create, we should not see
+ // a STREAMS-BLOCKED frame.
+ EXPECT_CALL(*connection_, SendControlFrame(_)).Times(0);
+
+ // Do the configuration. The stream limits are increased, allowing this
+ // node to create more streams, so we should not see the pending
+ // STREAMS-BLOCKED frame get transmitted.
+ QuicConfigPeer::SetReceivedMaxIncomingUnidirectionalStreams(
+ session_->config(), 10);
+ QuicConfigPeer::SetReceivedMaxIncomingBidirectionalStreams(session_->config(),
+ 10);
+ session_->OnConfigNegotiated();
+}
+
INSTANTIATE_TEST_SUITE_P(Tests, QuicStreamIdManagerTestServer, testing::Bool());
// This test checks that the initialization for the maximum allowed outgoing
@@ -677,6 +782,13 @@
// Tast that an attempt to create an outgoing stream does not exceed the limit
// and that it generates an appropriate STREAMS_BLOCKED frame.
TEST_P(QuicStreamIdManagerTestServer, NewStreamDoesNotExceedLimit) {
+ // Configure with some number of streams, and allow frame transmission
+ QuicConfigPeer::SetReceivedMaxIncomingUnidirectionalStreams(
+ session_->config(), 100);
+ QuicConfigPeer::SetReceivedMaxIncomingBidirectionalStreams(session_->config(),
+ 100);
+ session_->OnConfigNegotiated();
+
size_t stream_count = stream_id_manager_->outgoing_max_streams();
EXPECT_NE(0u, stream_count);
TestQuicStream* stream;