Revert "Flip FLAGS_quic_reloadable_flag_quic_close_all_encryptions_levels"
This reverts commit fe4a28df91574876c401101d27a5a6f4d9e24ebc.
Reason for revert:
Findit (https://goo.gl/kROfz5) identified CL at revision 716491 as the
culprit for failures in the build cycles as shown on:
https://analysis.chromium.org/waterfall/culprit?key=ag9zfmZpbmRpdC1mb3ItbWVyRAsSDVdmU3VzcGVjdGVkQ0wiMWNocm9taXVtL2ZlNGEyOGRmOTE1NzQ4NzZjNDAxMTAxZDI3YTVhNmY0ZDllMjRlYmMM
Sample Failed Build: https://ci.chromium.org/b/8896391819190311952
Sample Failed Step: net_unittests
Original change's description:
> Flip FLAGS_quic_reloadable_flag_quic_close_all_encryptions_levels
>
> Fix a bug in the test packet maker where the retry token fields
> were carried over from one packet to another.
>
> Change-Id: I1677f15eec976ecc0ba8afbd524a57916d0c3aa9
> Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1922550
> Commit-Queue: Zhongyi Shi <[email protected]>
> Reviewed-by: Zhongyi Shi <[email protected]>
> Cr-Commit-Position: refs/heads/master@{#716491}
Change-Id: Ie149714725e8f8fb410a2adae01729d453e746b5
No-Presubmit: true
No-Tree-Checks: true
No-Try: true
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1922736
Cr-Commit-Position: refs/heads/master@{#716506}
diff --git a/net/quic/quic_network_transaction_unittest.cc b/net/quic/quic_network_transaction_unittest.cc
index f2bcee5..a4e01513 100644
--- a/net/quic/quic_network_transaction_unittest.cc
+++ b/net/quic/quic_network_transaction_unittest.cc
@@ -3141,6 +3141,10 @@
quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeRetransmissionPacket(
2, packet_num++, true));
+ quic_data.AddWrite(SYNCHRONOUS,
+ client_maker_.MakeConnectionClosePacket(
+ packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT,
+ "No recent network activity."));
} else {
// Settings were sent in the request packet so there is only 1 packet to
// retransmit.
@@ -3159,10 +3163,7 @@
// RTO 3
quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeRetransmissionPacket(
1, packet_num++, true));
- }
- for (auto level :
- {quic::ENCRYPTION_ZERO_RTT, quic::ENCRYPTION_FORWARD_SECURE}) {
- client_maker_.SetEncryptionLevel(level);
+
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeConnectionClosePacket(
packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT,
@@ -3263,16 +3264,10 @@
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRetransmissionPacket(2, 12, true));
// RTO 5
- client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeConnectionClosePacket(
13, true, quic::QUIC_TOO_MANY_RTOS,
"5 consecutive retransmission timeouts"));
- client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
- quic_data.AddWrite(SYNCHRONOUS,
- client_maker_.MakeConnectionClosePacket(
- 14, true, quic::QUIC_TOO_MANY_RTOS,
- "5 consecutive retransmission timeouts"));
} else {
// TLP 1
quic_data.AddWrite(SYNCHRONOUS,
@@ -3293,16 +3288,10 @@
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRetransmissionPacket(1, 7, true));
// RTO 5
- client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeConnectionClosePacket(
8, true, quic::QUIC_TOO_MANY_RTOS,
"5 consecutive retransmission timeouts"));
- client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
- quic_data.AddWrite(SYNCHRONOUS,
- client_maker_.MakeConnectionClosePacket(
- 9, true, quic::QUIC_TOO_MANY_RTOS,
- "5 consecutive retransmission timeouts"));
}
quic_data.AddRead(ASYNC, OK);
@@ -3404,16 +3393,10 @@
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRetransmissionPacket(2, 12, true));
// RTO 5
- client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeConnectionClosePacket(
13, true, quic::QUIC_TOO_MANY_RTOS,
"5 consecutive retransmission timeouts"));
- client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
- quic_data.AddWrite(SYNCHRONOUS,
- client_maker_.MakeConnectionClosePacket(
- 14, true, quic::QUIC_TOO_MANY_RTOS,
- "5 consecutive retransmission timeouts"));
} else if (FLAGS_quic_allow_http3_priority) {
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeRstPacket(
@@ -3448,16 +3431,10 @@
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRetransmissionPacket(1, 13, true));
// RTO 5
- client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeConnectionClosePacket(
14, true, quic::QUIC_TOO_MANY_RTOS,
"5 consecutive retransmission timeouts"));
- client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
- quic_data.AddWrite(SYNCHRONOUS,
- client_maker_.MakeConnectionClosePacket(
- 15, true, quic::QUIC_TOO_MANY_RTOS,
- "5 consecutive retransmission timeouts"));
} else {
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeRstPacket(
@@ -3494,16 +3471,10 @@
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRetransmissionPacket(3, 13, true));
// RTO 5
- client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeConnectionClosePacket(
14, true, quic::QUIC_TOO_MANY_RTOS,
"5 consecutive retransmission timeouts"));
- client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
- quic_data.AddWrite(SYNCHRONOUS,
- client_maker_.MakeConnectionClosePacket(
- 15, true, quic::QUIC_TOO_MANY_RTOS,
- "5 consecutive retransmission timeouts"));
}
quic_data.AddRead(ASYNC, OK);
@@ -3576,15 +3547,11 @@
1, false, GetNthClientInitiatedBidirectionalStreamId(47),
quic::QUIC_STREAM_LAST_ERROR));
std::string quic_error_details = "Data for nonexistent stream";
- for (auto level :
- {quic::ENCRYPTION_ZERO_RTT, quic::ENCRYPTION_FORWARD_SECURE}) {
- client_maker_.SetEncryptionLevel(level);
- quic_data.AddWrite(SYNCHRONOUS,
- ConstructClientAckAndConnectionClosePacket(
- packet_num++, quic::QuicTime::Delta::Zero(), 1, 1, 1,
- quic::QUIC_INVALID_STREAM_ID, quic_error_details,
- quic::IETF_RST_STREAM));
- }
+ quic_data.AddWrite(SYNCHRONOUS,
+ ConstructClientAckAndConnectionClosePacket(
+ packet_num++, quic::QuicTime::Delta::Zero(), 1, 1, 1,
+ quic::QUIC_INVALID_STREAM_ID, quic_error_details,
+ quic::IETF_RST_STREAM));
quic_data.AddSocketDataToFactory(&socket_factory_);
// In order for a new QUIC session to be established via alternate-protocol
@@ -3672,6 +3639,11 @@
1, packet_num++, true));
quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeRetransmissionPacket(
2, packet_num++, true));
+
+ quic_data.AddWrite(SYNCHRONOUS,
+ client_maker_.MakeConnectionClosePacket(
+ packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT,
+ "No recent network activity."));
} else {
// TLP 1
quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeRetransmissionPacket(
@@ -3688,11 +3660,7 @@
// RTO 3
quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeRetransmissionPacket(
1, packet_num++, true));
- }
- for (auto level :
- {quic::ENCRYPTION_ZERO_RTT, quic::ENCRYPTION_FORWARD_SECURE}) {
- client_maker_.SetEncryptionLevel(level);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeConnectionClosePacket(
packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT,
@@ -3797,15 +3765,11 @@
1, false, GetNthClientInitiatedBidirectionalStreamId(47),
quic::QUIC_STREAM_LAST_ERROR));
std::string quic_error_details = "Data for nonexistent stream";
- for (auto level :
- {quic::ENCRYPTION_ZERO_RTT, quic::ENCRYPTION_FORWARD_SECURE}) {
- client_maker_.SetEncryptionLevel(level);
- quic_data.AddWrite(SYNCHRONOUS,
- ConstructClientAckAndConnectionClosePacket(
- packet_num++, quic::QuicTime::Delta::Zero(), 1, 1, 1,
- quic::QUIC_INVALID_STREAM_ID, quic_error_details,
- quic::IETF_RST_STREAM));
- }
+ quic_data.AddWrite(SYNCHRONOUS,
+ ConstructClientAckAndConnectionClosePacket(
+ packet_num++, quic::QuicTime::Delta::Zero(), 1, 1, 1,
+ quic::QUIC_INVALID_STREAM_ID, quic_error_details,
+ quic::IETF_RST_STREAM));
quic_data.AddSocketDataToFactory(&socket_factory_);
// After that fails, it will be resent via TCP.
@@ -3912,15 +3876,11 @@
1, false, GetNthClientInitiatedBidirectionalStreamId(47),
quic::QUIC_STREAM_LAST_ERROR));
std::string quic_error_details = "Data for nonexistent stream";
- for (auto level :
- {quic::ENCRYPTION_ZERO_RTT, quic::ENCRYPTION_FORWARD_SECURE}) {
- client_maker_.SetEncryptionLevel(level);
- quic_data.AddWrite(SYNCHRONOUS,
- ConstructClientAckAndConnectionClosePacket(
- packet_number++, quic::QuicTime::Delta::Zero(), 1, 1,
- 1, quic::QUIC_INVALID_STREAM_ID, quic_error_details,
- quic::IETF_RST_STREAM));
- }
+ quic_data.AddWrite(
+ SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(
+ packet_number++, quic::QuicTime::Delta::Zero(), 1, 1, 1,
+ quic::QUIC_INVALID_STREAM_ID, quic_error_details,
+ quic::IETF_RST_STREAM));
quic_data.AddSocketDataToFactory(&socket_factory_);
// After that fails, it will be resent via TCP.
@@ -5614,15 +5574,11 @@
1, false, GetNthClientInitiatedBidirectionalStreamId(47),
quic::QUIC_STREAM_LAST_ERROR));
std::string quic_error_details = "Data for nonexistent stream";
- for (auto level :
- {quic::ENCRYPTION_ZERO_RTT, quic::ENCRYPTION_FORWARD_SECURE}) {
- client_maker_.SetEncryptionLevel(level);
- mock_quic_data.AddWrite(
- SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(
- packet_num++, quic::QuicTime::Delta::Zero(), 1, 1, 1,
- quic::QUIC_INVALID_STREAM_ID, quic_error_details,
- quic::IETF_RST_STREAM));
- }
+ mock_quic_data.AddWrite(
+ SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(
+ packet_num++, quic::QuicTime::Delta::Zero(), 1, 1, 1,
+ quic::QUIC_INVALID_STREAM_ID, quic_error_details,
+ quic::IETF_RST_STREAM));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that