)]}'
{
  "commit": "66fc0242cc2e51fc74a9f989c261b13a709e10f0",
  "tree": "a1f7e1382c2bd6792ef25a86beff7058292f88c5",
  "parents": [
    "87cd7de615aaa6de72930a6cbe2932404b7726f1"
  ],
  "author": {
    "name": "dschinazi",
    "email": "dschinazi@google.com",
    "time": "Fri Aug 16 10:00:25 2019 -0700"
  },
  "committer": {
    "name": "Copybara-Service",
    "email": "copybara-worker@google.com",
    "time": "Mon Aug 19 18:06:05 2019 -0700"
  },
  "message": "Flush queued frames when processing coalesced packets\n\nThis fix mimics the code in QuicConnection:: MaybeProcessUndecryptablePackets, thanks rch@ and fayang@ for the analysis!\n\nThis issue was found by Chromium Clusterfuzz:\nhttps://bugs.chromium.org/p/chromium/issues/detail?id\u003d992831\nI\u0027ve confirmed that clusterfuzz test case 5646143163072512 no longer reproduces with the fix.\n\nThe new test fails without the fix and passes with it. More generally, increased test coverage for this area of code is tracked by b/139422067.\n\ngfe-relnote: flush queued frames when processing coalesced packets, protected by disabled quic v99 flag\nPiperOrigin-RevId: 263791562\nChange-Id: I52da7342f33608488785ff646cc5faf9c9195fa6\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "864f65281268c5905c6873c7d02f644ccda1eb4b",
      "old_mode": 33188,
      "old_path": "quic/core/quic_connection.cc",
      "new_id": "31c778cc7db909e4f7a1df4ade0a952043944a76",
      "new_mode": 33188,
      "new_path": "quic/core/quic_connection.cc"
    },
    {
      "type": "modify",
      "old_id": "554641969c0f76c13edb29b11e44361c5982b5f7",
      "old_mode": 33188,
      "old_path": "quic/core/quic_connection_test.cc",
      "new_id": "836f09f43db75941b4322ff073f2bedd9fa12176",
      "new_mode": 33188,
      "new_path": "quic/core/quic_connection_test.cc"
    }
  ]
}
