Deprecate gfe2_reloadable_flag_quic_move_amplification_limit. PiperOrigin-RevId: 319786100 Change-Id: I483c8dd4cf77206eed957509f9379ae9a6f2d4ac
diff --git a/quic/core/quic_connection.cc b/quic/core/quic_connection.cc index 6d6c93a..4cb08c5 100644 --- a/quic/core/quic_connection.cc +++ b/quic/core/quic_connection.cc
@@ -2393,17 +2393,6 @@ QuicVersionUsesCryptoFrames(transport_version())) << ENDPOINT << "Handshake in STREAM frames should not check ShouldGeneratePacket"; - // We should serialize handshake packets immediately to ensure that they - // end up sent at the right encryption level. - if (!move_amplification_limit_ && handshake == IS_HANDSHAKE) { - if (LimitedByAmplificationFactor()) { - // Server is constrained by the amplification restriction. - QUIC_DVLOG(1) << ENDPOINT << "Constrained by amplification restriction"; - return false; - } - return true; - } - return CanWrite(retransmittable); } @@ -2440,9 +2429,8 @@ return false; } - if (move_amplification_limit_ && LimitedByAmplificationFactor()) { + if (LimitedByAmplificationFactor()) { // Server is constrained by the amplification restriction. - QUIC_RELOADABLE_FLAG_COUNT(quic_move_amplification_limit); QUIC_CODE_COUNT(quic_throttled_by_amplification_limit); QUIC_DVLOG(1) << ENDPOINT << "Constrained by amplification restriction"; return false; @@ -4277,9 +4265,7 @@ const bool flushed = packet_creator_.FlushAckFrame(frames); if (!flushed) { // Connection is write blocked. - QUIC_BUG_IF( - !writer_->IsWriteBlocked() && - (!move_amplification_limit_ || !LimitedByAmplificationFactor())) + QUIC_BUG_IF(!writer_->IsWriteBlocked() && !LimitedByAmplificationFactor()) << "Writer not blocked and not throttled by amplification factor, " "but ACK not flushed for packet space:" << i; @@ -4479,7 +4465,7 @@ bool QuicConnection::LimitedByAmplificationFactor() const { return EnforceAntiAmplificationLimit() && bytes_sent_before_address_validation_ >= - anti_amplification_factor_ * + GetQuicFlag(FLAGS_quic_anti_amplification_factor) * bytes_received_before_address_validation_; }
diff --git a/quic/core/quic_connection.h b/quic/core/quic_connection.h index 573cc07..dc2a00f 100644 --- a/quic/core/quic_connection.h +++ b/quic/core/quic_connection.h
@@ -979,10 +979,6 @@ // Returns true if ack_alarm_ is set. bool HasPendingAcks() const; - size_t anti_amplification_factor() const { - return anti_amplification_factor_; - } - void OnUserAgentIdKnown() { sent_packet_manager_.OnUserAgentIdKnown(); } // Enables Legacy Version Encapsulation using |server_name| as SNI. @@ -1670,19 +1666,6 @@ // True if this connection supports handshake done frame. bool support_handshake_done_; - const bool move_amplification_limit_ = - GetQuicReloadableFlag(quic_move_amplification_limit); - - // TODO(fayang): Change the default value of quic_anti_amplification_factor to - // 5 when deprecating quic_move_amplification_limit. - // TODO(b/153892665): Change the default value of - // quic_anti_amplification_factor back to 3 when cert compression is - // supported. - const size_t anti_amplification_factor_ = - move_amplification_limit_ - ? 5 - : GetQuicFlag(FLAGS_quic_anti_amplification_factor); - const bool default_enable_5rto_blackhole_detection_ = GetQuicReloadableFlag(quic_default_enable_5rto_blackhole_detection2);
diff --git a/quic/core/quic_connection_test.cc b/quic/core/quic_connection_test.cc index b9f1fc5..f1ae21d 100644 --- a/quic/core/quic_connection_test.cc +++ b/quic/core/quic_connection_test.cc
@@ -7053,8 +7053,7 @@ ProcessPacket(1); BlockOnNextWrite(); writer_->set_is_write_blocked_data_buffered(true); - if (GetQuicReloadableFlag(quic_move_amplification_limit) && - QuicVersionUsesCryptoFrames(connection_.transport_version())) { + if (QuicVersionUsesCryptoFrames(connection_.transport_version())) { EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1); } else { EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2); @@ -7064,8 +7063,7 @@ EXPECT_FALSE(connection_.HasQueuedData()); connection_.SendCryptoDataWithString("bar", 3); EXPECT_TRUE(writer_->IsWriteBlocked()); - if (GetQuicReloadableFlag(quic_move_amplification_limit) && - QuicVersionUsesCryptoFrames(connection_.transport_version())) { + if (QuicVersionUsesCryptoFrames(connection_.transport_version())) { // CRYPTO frames are not flushed when writer is blocked. EXPECT_FALSE(connection_.HasQueuedData()); } else { @@ -10099,17 +10097,15 @@ // Verify no data can be sent at the beginning because bytes received is 0. EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0); connection_.SendCryptoDataWithString("foo", 0); - if (GetQuicReloadableFlag(quic_move_amplification_limit)) { - EXPECT_FALSE(connection_.CanWrite(HAS_RETRANSMITTABLE_DATA)); - EXPECT_FALSE(connection_.CanWrite(NO_RETRANSMITTABLE_DATA)); - } + EXPECT_FALSE(connection_.CanWrite(HAS_RETRANSMITTABLE_DATA)); + EXPECT_FALSE(connection_.CanWrite(NO_RETRANSMITTABLE_DATA)); EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet()); // Receives packet 1. ProcessCryptoPacketAtLevel(1, ENCRYPTION_INITIAL); const size_t anti_amplification_factor = - connection_.anti_amplification_factor(); + GetQuicFlag(FLAGS_quic_anti_amplification_factor); // Verify now packets can be sent. for (size_t i = 0; i < anti_amplification_factor; ++i) { EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1); @@ -10145,8 +10141,7 @@ } TEST_P(QuicConnectionTest, AckPendingWithAmplificationLimited) { - if (!connection_.version().SupportsAntiAmplificationLimit() || - !GetQuicReloadableFlag(quic_move_amplification_limit)) { + if (!connection_.version().SupportsAntiAmplificationLimit()) { return; } EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());