gfe-relnote: Deprecate gfe2_reloadable_flag_quic_always_reset_short_header_packets. PiperOrigin-RevId: 244033394 Change-Id: I0c1a047a07264e6dd87e594c7a87fadcb71a2331
diff --git a/quic/core/quic_time_wait_list_manager.cc b/quic/core/quic_time_wait_list_manager.cc index 6fba2eb..fa62fc5 100644 --- a/quic/core/quic_time_wait_list_manager.cc +++ b/quic/core/quic_time_wait_list_manager.cc
@@ -161,18 +161,15 @@ if (connection_data->encryption_level == ENCRYPTION_INITIAL) { QUIC_CODE_COUNT( quic_encryption_none_termination_packets_for_short_header); - if (GetQuicReloadableFlag(quic_always_reset_short_header_packets)) { - QUIC_RELOADABLE_FLAG_COUNT( - quic_always_reset_short_header_packets); - // Send stateless reset in response to short header packets, - // because ENCRYPTION_INITIAL termination packets will not be - // processed by clients. - SendPublicReset(self_address, peer_address, connection_id, - connection_data->ietf_quic, - std::move(packet_context)); - return; - } - } else if (connection_data->encryption_level == ENCRYPTION_ZERO_RTT) { + // Send stateless reset in response to short header packets, + // because ENCRYPTION_INITIAL termination packets will not be + // processed by clients. + SendPublicReset(self_address, peer_address, connection_id, + connection_data->ietf_quic, + std::move(packet_context)); + return; + } + if (connection_data->encryption_level == ENCRYPTION_ZERO_RTT) { QUIC_CODE_COUNT(quic_zero_rtt_termination_packets_for_short_header); } break;
diff --git a/quic/core/quic_time_wait_list_manager_test.cc b/quic/core/quic_time_wait_list_manager_test.cc index aa0c911..a391390 100644 --- a/quic/core/quic_time_wait_list_manager_test.cc +++ b/quic/core/quic_time_wait_list_manager_test.cc
@@ -560,18 +560,11 @@ QuicTimeWaitListManager::SEND_TERMINATION_PACKETS, ENCRYPTION_INITIAL, &termination_packets); - if (GetQuicReloadableFlag(quic_always_reset_short_header_packets)) { - // Termination packet is not encrypted, instead, send stateless reset. - EXPECT_CALL(writer_, - WritePacket(_, _, self_address_.host(), peer_address_, _)) - .With(Args<0, 1>(PublicResetPacketEq(connection_id_))) - .WillOnce(Return(WriteResult(WRITE_STATUS_OK, 0))); - } else { - // An unprocessable connection close is sent to peer. - EXPECT_CALL(writer_, WritePacket(_, kConnectionCloseLength, - self_address_.host(), peer_address_, _)) - .WillOnce(Return(WriteResult(WRITE_STATUS_OK, 1))); - } + // Termination packet is not encrypted, instead, send stateless reset. + EXPECT_CALL(writer_, + WritePacket(_, _, self_address_.host(), peer_address_, _)) + .With(Args<0, 1>(PublicResetPacketEq(connection_id_))) + .WillOnce(Return(WriteResult(WRITE_STATUS_OK, 0))); // Processes IETF short header packet. time_wait_list_manager_.ProcessPacket( self_address_, peer_address_, connection_id_,