Turn on TLS1.3 for some QuicSpdyClientSessionTest.
gfe-relnote: test only. not protected.
PiperOrigin-RevId: 309332256
Change-Id: I6b4ef8aa6eaaf914256b0e8eaca9d9f294efc94a
diff --git a/quic/core/http/quic_spdy_client_session_test.cc b/quic/core/http/quic_spdy_client_session_test.cc
index 9ea6128..0394677 100644
--- a/quic/core/http/quic_spdy_client_session_test.cc
+++ b/quic/core/http/quic_spdy_client_session_test.cc
@@ -247,13 +247,6 @@
}
TEST_P(QuicSpdyClientSessionTest, MaxNumStreamsWithNoFinOrRst) {
- if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
- // This test relies on the MIDS transport parameter, which is not yet
- // supported in TLS 1.3.
- // TODO(nharper): Add support for Transport Parameters in the TLS handshake.
- return;
- }
-
uint32_t kServerMaxIncomingStreams = 1;
CompleteCryptoHandshake(kServerMaxIncomingStreams);
@@ -264,26 +257,13 @@
// Close the stream, but without having received a FIN or a RST_STREAM
// or MAX_STREAMS (V99) and check that a new one can not be created.
session_->CloseStream(stream->id());
- EXPECT_EQ(1u, session_->GetNumOpenOutgoingStreams());
+ EXPECT_EQ(1u, QuicSessionPeer::GetNumOpenDynamicStreams(session_.get()));
stream = session_->CreateOutgoingBidirectionalStream();
EXPECT_FALSE(stream);
-
- if (VersionHasIetfQuicFrames(GetParam().transport_version)) {
- EXPECT_EQ(1u,
- QuicSessionPeer::v99_bidirectional_stream_id_manager(&*session_)
- ->outgoing_stream_count());
- }
}
TEST_P(QuicSpdyClientSessionTest, MaxNumStreamsWithRst) {
- if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
- // This test relies on the MIDS transport parameter, which is not yet
- // supported in TLS 1.3.
- // TODO(nharper): Add support for Transport Parameters in the TLS handshake.
- return;
- }
-
uint32_t kServerMaxIncomingStreams = 1;
CompleteCryptoHandshake(kServerMaxIncomingStreams);
@@ -296,7 +276,7 @@
session_->OnRstStream(QuicRstStreamFrame(kInvalidControlFrameId, stream->id(),
QUIC_RST_ACKNOWLEDGEMENT, 0));
// Check that a new one can be created.
- EXPECT_EQ(0u, session_->GetNumOpenOutgoingStreams());
+ EXPECT_EQ(0u, QuicSessionPeer::GetNumOpenDynamicStreams(session_.get()));
if (VersionHasIetfQuicFrames(GetParam().transport_version)) {
// In V99 the stream limit increases only if we get a MAX_STREAMS
// frame; pretend we got one.
@@ -317,12 +297,6 @@
}
TEST_P(QuicSpdyClientSessionTest, ResetAndTrailers) {
- if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
- // This test relies on the MIDS transport parameter, which is not yet
- // supported in TLS 1.3.
- // TODO(nharper): Add support for Transport Parameters in the TLS handshake.
- return;
- }
// Tests the situation in which the client sends a RST at the same time that
// the server sends trailing headers (trailers). Receipt of the trailers by
// the client should result in all outstanding stream state being tidied up
@@ -362,7 +336,7 @@
// A new stream cannot be created as the reset stream still counts as an open
// outgoing stream until closed by the server.
- EXPECT_EQ(1u, session_->GetNumOpenOutgoingStreams());
+ EXPECT_EQ(1u, QuicSessionPeer::GetNumOpenDynamicStreams(session_.get()));
stream = session_->CreateOutgoingBidirectionalStream();
EXPECT_EQ(nullptr, stream);
@@ -377,7 +351,7 @@
// The stream is now complete from the client's perspective, and it should
// be able to create a new outgoing stream.
- EXPECT_EQ(0u, session_->GetNumOpenOutgoingStreams());
+ EXPECT_EQ(0u, QuicSessionPeer::GetNumOpenDynamicStreams(session_.get()));
if (VersionHasIetfQuicFrames(GetParam().transport_version)) {
QuicMaxStreamsFrame frame(0, 2,
/*unidirectional=*/false);
@@ -550,11 +524,6 @@
// A packet with invalid framing should cause a connection to be closed.
TEST_P(QuicSpdyClientSessionTest, InvalidFramedPacketReceived) {
const ParsedQuicVersion version = GetParam();
- if (version.handshake_protocol == PROTOCOL_TLS1_3) {
- // TODO(nharper, b/112643533): Figure out why this test fails when TLS is
- // enabled and fix it.
- return;
- }
QuicSocketAddress server_address(TestPeerIPAddress(), kTestPort);
QuicSocketAddress client_address(TestPeerIPAddress(), kTestPort);
if (version.KnowsWhichDecrypterToUse()) {