blob: 19dfe8e9e1729e912731d77b4166efa61ec9eed8 [file] [log] [blame] [edit]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "quiche/quic/core/http/quic_spdy_client_session.h"
#include <memory>
#include <string>
#include <utility>
#include "absl/memory/memory.h"
#include "quiche/quic/core/crypto/crypto_protocol.h"
#include "quiche/quic/core/http/quic_server_initiated_spdy_stream.h"
#include "quiche/quic/core/http/quic_spdy_client_stream.h"
#include "quiche/quic/core/http/spdy_utils.h"
#include "quiche/quic/core/quic_server_id.h"
#include "quiche/quic/core/quic_utils.h"
#include "quiche/quic/platform/api/quic_bug_tracker.h"
#include "quiche/quic/platform/api/quic_flag_utils.h"
#include "quiche/quic/platform/api/quic_flags.h"
#include "quiche/quic/platform/api/quic_logging.h"
namespace quic {
QuicSpdyClientSession::QuicSpdyClientSession(
const QuicConfig& config, const ParsedQuicVersionVector& supported_versions,
QuicConnection* connection, const QuicServerId& server_id,
QuicCryptoClientConfig* crypto_config, QuicPriorityType priority_type)
: QuicSpdyClientSession(config, supported_versions, connection, nullptr,
server_id, crypto_config, priority_type) {}
QuicSpdyClientSession::QuicSpdyClientSession(
const QuicConfig& config, const ParsedQuicVersionVector& supported_versions,
QuicConnection* connection, QuicSession::Visitor* visitor,
const QuicServerId& server_id, QuicCryptoClientConfig* crypto_config,
QuicPriorityType priority_type)
: QuicSpdyClientSession(config, supported_versions, connection, visitor,
/*writer=*/nullptr, /*migration_helper=*/nullptr,
QuicConnectionMigrationConfig{
.allow_server_preferred_address = false},
server_id, crypto_config, priority_type) {}
QuicSpdyClientSession::QuicSpdyClientSession(
const QuicConfig& config, const ParsedQuicVersionVector& supported_versions,
QuicConnection* connection, QuicSession::Visitor* visitor,
QuicForceBlockablePacketWriter* absl_nullable writer,
QuicMigrationHelper* absl_nullable migration_helper,
const QuicConnectionMigrationConfig& migration_config,
const QuicServerId& server_id, QuicCryptoClientConfig* crypto_config,
QuicPriorityType priority_type)
: QuicSpdyClientSessionWithMigration(
connection, writer, visitor, config, supported_versions,
(migration_helper == nullptr ? kInvalidNetworkHandle
: migration_helper->GetDefaultNetwork()),
(migration_helper == nullptr ? kInvalidNetworkHandle
: migration_helper->GetCurrentNetwork()),
(migration_helper == nullptr
? nullptr
: migration_helper->CreateQuicPathContextFactory()),
migration_config, priority_type),
server_id_(server_id),
crypto_config_(crypto_config),
migration_helper_(migration_helper),
respect_goaway_(true) {}
QuicSpdyClientSession::~QuicSpdyClientSession() = default;
void QuicSpdyClientSession::Initialize() {
crypto_stream_ = CreateQuicCryptoStream();
QuicSpdyClientSessionWithMigration::Initialize();
}
void QuicSpdyClientSession::OnProofValid(
const QuicCryptoClientConfig::CachedState& /*cached*/) {}
void QuicSpdyClientSession::OnProofVerifyDetailsAvailable(
const ProofVerifyDetails& /*verify_details*/) {}
bool QuicSpdyClientSession::ShouldCreateOutgoingBidirectionalStream() {
if (!crypto_stream_->encryption_established()) {
QUIC_DLOG(INFO) << "Encryption not active so no outgoing stream created.";
QUIC_CODE_COUNT(
quic_client_fails_to_create_stream_encryption_not_established);
return false;
}
if (goaway_received() && respect_goaway_) {
QUIC_DLOG(INFO) << "Failed to create a new outgoing stream. "
<< "Already received goaway.";
QUIC_CODE_COUNT(quic_client_fails_to_create_stream_goaway_received);
return false;
}
return CanOpenNextOutgoingBidirectionalStream();
}
QuicSpdyClientStream*
QuicSpdyClientSession::CreateOutgoingBidirectionalStream() {
if (!ShouldCreateOutgoingBidirectionalStream()) {
return nullptr;
}
std::unique_ptr<QuicSpdyClientStream> stream = CreateClientStream();
QuicSpdyClientStream* stream_ptr = stream.get();
ActivateStream(std::move(stream));
return stream_ptr;
}
std::unique_ptr<QuicSpdyClientStream>
QuicSpdyClientSession::CreateClientStream() {
return std::make_unique<QuicSpdyClientStream>(
GetNextOutgoingBidirectionalStreamId(), this, BIDIRECTIONAL);
}
QuicCryptoClientStreamBase* QuicSpdyClientSession::GetMutableCryptoStream() {
return crypto_stream_.get();
}
const QuicCryptoClientStreamBase* QuicSpdyClientSession::GetCryptoStream()
const {
return crypto_stream_.get();
}
void QuicSpdyClientSession::CryptoConnect() {
QUICHE_DCHECK(flow_controller());
crypto_stream_->CryptoConnect();
}
int QuicSpdyClientSession::GetNumSentClientHellos() const {
return crypto_stream_->num_sent_client_hellos();
}
bool QuicSpdyClientSession::ResumptionAttempted() const {
return crypto_stream_->ResumptionAttempted();
}
bool QuicSpdyClientSession::IsResumption() const {
return crypto_stream_->IsResumption();
}
bool QuicSpdyClientSession::EarlyDataAccepted() const {
return crypto_stream_->EarlyDataAccepted();
}
bool QuicSpdyClientSession::ReceivedInchoateReject() const {
return crypto_stream_->ReceivedInchoateReject();
}
int QuicSpdyClientSession::GetNumReceivedServerConfigUpdates() const {
return crypto_stream_->num_scup_messages_received();
}
bool QuicSpdyClientSession::ShouldCreateIncomingStream(QuicStreamId id) {
if (!connection()->connected()) {
QUIC_BUG(quic_bug_10396_3)
<< "ShouldCreateIncomingStream called when disconnected";
return false;
}
if (goaway_received() && respect_goaway_) {
QUIC_DLOG(INFO) << "Failed to create a new outgoing stream. "
<< "Already received goaway.";
return false;
}
if (QuicUtils::IsClientInitiatedStreamId(transport_version(), id)) {
QUIC_BUG(quic_bug_10396_4)
<< "ShouldCreateIncomingStream called with client initiated "
"stream ID.";
return false;
}
if (QuicUtils::IsClientInitiatedStreamId(transport_version(), id)) {
QUIC_LOG(WARNING) << "Received invalid push stream id " << id;
connection()->CloseConnection(
QUIC_INVALID_STREAM_ID,
"Server created non write unidirectional stream",
ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
return false;
}
if (VersionIsIetfQuic(transport_version()) &&
QuicUtils::IsBidirectionalStreamId(id, version()) &&
!WillNegotiateWebTransport()) {
connection()->CloseConnection(
QUIC_HTTP_SERVER_INITIATED_BIDIRECTIONAL_STREAM,
"Server created bidirectional stream.",
ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
return false;
}
return true;
}
QuicSpdyStream* QuicSpdyClientSession::CreateIncomingStream(
PendingStream* pending) {
QuicSpdyStream* stream = new QuicSpdyClientStream(pending, this);
ActivateStream(absl::WrapUnique(stream));
return stream;
}
QuicSpdyStream* QuicSpdyClientSession::CreateIncomingStream(QuicStreamId id) {
if (!ShouldCreateIncomingStream(id)) {
return nullptr;
}
QuicSpdyStream* stream;
if (version().IsIetfQuic() &&
QuicUtils::IsBidirectionalStreamId(id, version())) {
QUIC_BUG_IF(QuicServerInitiatedSpdyStream but no WebTransport support,
!WillNegotiateWebTransport())
<< "QuicServerInitiatedSpdyStream created but no WebTransport support";
stream = new QuicServerInitiatedSpdyStream(id, this, BIDIRECTIONAL);
} else {
stream = new QuicSpdyClientStream(id, this, READ_UNIDIRECTIONAL);
}
ActivateStream(absl::WrapUnique(stream));
return stream;
}
std::unique_ptr<QuicCryptoClientStreamBase>
QuicSpdyClientSession::CreateQuicCryptoStream() {
return std::make_unique<QuicCryptoClientStream>(
server_id_, this,
crypto_config_->proof_verifier()->CreateDefaultContext(), crypto_config_,
this, /*has_application_state = */ version().IsIetfQuic());
}
QuicNetworkHandle QuicSpdyClientSession::FindAlternateNetwork(
QuicNetworkHandle network) {
QUICHE_BUG_IF(migration_helper_not_initialized1,
migration_helper_ == nullptr);
return migration_helper_->FindAlternateNetwork(network);
}
void QuicSpdyClientSession::PrepareForProbingOnPath(
QuicPathValidationContext& context) {
QUIC_DVLOG(1) << "About to probe path " << context;
}
bool QuicSpdyClientSession::PrepareForMigrationToPath(
QuicClientPathValidationContext& context) {
QUIC_DVLOG(1) << "About to migrate to path " << context;
return true;
}
void QuicSpdyClientSession::OnMigrationToPathDone(
std::unique_ptr<QuicClientPathValidationContext> context, bool success) {
QUICHE_BUG_IF(migration_helper_not_initialized2,
migration_helper_ == nullptr);
migration_helper_->OnMigrationToPathDone(std::move(context), success);
}
} // namespace quic