)]}'
{
  "commit": "6e1b79c86bf53285e407bf6f2a58a980bffdb2de",
  "tree": "c115038230f1f65c29b34fb51acb50a4b658c60c",
  "parents": [
    "2fcf23d66971be9407c6f5f90f715304a681f7db"
  ],
  "author": {
    "name": "dmcardle",
    "email": "dmcardle@google.com",
    "time": "Fri Dec 12 15:45:37 2025 -0800"
  },
  "committer": {
    "name": "Copybara-Service",
    "email": "copybara-worker@google.com",
    "time": "Fri Dec 12 15:46:24 2025 -0800"
  },
  "message": "Speed up the slow e2e test TestInvalidAckBeforeHandshakeClosesConnection\n\nIt turns out that this test was trying to make a connection after setting packet loss to 100%, which meant we waited the full 30-second timeout.\n\nNow, we just let it create a dummy connection so we can steal its writer, which we use to write the invalid ACK frame. The test succeeds in 5 seconds on my machine instead of \u003e30.\n\nPiperOrigin-RevId: 843859547\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "51ef42f6efa032455360ee9c731f7786eaae14d9",
      "old_mode": 33188,
      "old_path": "quiche/quic/core/http/end_to_end_test.cc",
      "new_id": "eac0da8576e6c02a3a4464870f13fbe220f87428",
      "new_mode": 33188,
      "new_path": "quiche/quic/core/http/end_to_end_test.cc"
    }
  ]
}
