Cleanup version helper functions in QuicSimpleServerSessionTest() and QuicServerSessionBaseTest().

PiperOrigin-RevId: 370481237
Change-Id: Ia8fc1fded65116069c863342b57be4e5e0772b9f
diff --git a/quic/core/http/quic_server_session_base_test.cc b/quic/core/http/quic_server_session_base_test.cc
index 29750f2..c8f12e9 100644
--- a/quic/core/http/quic_server_session_base_test.cc
+++ b/quic/core/http/quic_server_session_base_test.cc
@@ -148,7 +148,7 @@
     config_.SetInitialSessionFlowControlWindowToSend(
         kInitialSessionFlowControlWindowForTest);
 
-    ParsedQuicVersionVector supported_versions = SupportedVersions(GetParam());
+    ParsedQuicVersionVector supported_versions = SupportedVersions(version());
     connection_ = new StrictMock<MockQuicConnection>(
         &helper_, &alarm_factory_, Perspective::IS_SERVER, supported_versions);
     connection_->AdvanceTime(QuicTime::Delta::FromSeconds(1));
@@ -166,23 +166,24 @@
     QuicConfigPeer::SetReceivedInitialSessionFlowControlWindow(
         session_->config(), kMinimumFlowControlSendWindow);
     session_->OnConfigNegotiated();
-    if (connection_->version().SupportsAntiAmplificationLimit()) {
+    if (version().SupportsAntiAmplificationLimit()) {
       QuicConnectionPeer::SetAddressValidated(connection_);
     }
   }
 
   QuicStreamId GetNthClientInitiatedBidirectionalId(int n) {
-    return GetNthClientInitiatedBidirectionalStreamId(
-        connection_->transport_version(), n);
+    return GetNthClientInitiatedBidirectionalStreamId(transport_version(), n);
   }
 
   QuicStreamId GetNthServerInitiatedUnidirectionalId(int n) {
     return quic::test::GetNthServerInitiatedUnidirectionalStreamId(
-        connection_->transport_version(), n);
+        transport_version(), n);
   }
 
+  ParsedQuicVersion version() const { return GetParam(); }
+
   QuicTransportVersion transport_version() const {
-    return connection_->transport_version();
+    return version().transport_version;
   }
 
   // Create and inject a STOP_SENDING frame. In GOOGLE QUIC, receiving a
@@ -373,7 +374,7 @@
   for (size_t i = 0; i < kMaxStreamsForTest; ++i) {
     EXPECT_TRUE(QuicServerSessionBasePeer::GetOrCreateStream(session_.get(),
                                                              stream_id));
-    stream_id += QuicUtils::StreamIdDelta(connection_->transport_version());
+    stream_id += QuicUtils::StreamIdDelta(transport_version());
   }
 
   if (!VersionHasIetfQuicFrames(transport_version())) {
@@ -382,11 +383,11 @@
     for (size_t i = 0; i < kMaxStreamsMinimumIncrement; ++i) {
       EXPECT_TRUE(QuicServerSessionBasePeer::GetOrCreateStream(session_.get(),
                                                                stream_id));
-      stream_id += QuicUtils::StreamIdDelta(connection_->transport_version());
+      stream_id += QuicUtils::StreamIdDelta(transport_version());
     }
   }
   // Now violate the server's internal stream limit.
-  stream_id += QuicUtils::StreamIdDelta(connection_->transport_version());
+  stream_id += QuicUtils::StreamIdDelta(transport_version());
 
   if (!VersionHasIetfQuicFrames(transport_version())) {
     // For non-version 99, QUIC responds to an attempt to exceed the stream
@@ -418,8 +419,7 @@
       session_.get(), GetNthClientInitiatedBidirectionalId(0)));
 
   // Establish available streams up to the server's limit.
-  QuicStreamId next_id =
-      QuicUtils::StreamIdDelta(connection_->transport_version());
+  QuicStreamId next_id = QuicUtils::StreamIdDelta(transport_version());
   const int kLimitingStreamId =
       GetNthClientInitiatedBidirectionalId(kAvailableStreamLimit + 1);
   if (!VersionHasIetfQuicFrames(transport_version())) {
@@ -456,7 +456,7 @@
 
 TEST_P(QuicServerSessionBaseTest, GetStreamDisconnected) {
   // EXPECT_QUIC_BUG tests are expensive so only run one instance of them.
-  if (GetParam() != AllSupportedVersions()[0]) {
+  if (version() != AllSupportedVersions()[0]) {
     return;
   }
 
@@ -527,14 +527,13 @@
 
   if (!VersionUsesHttp3(transport_version())) {
     session_->UnregisterStreamPriority(
-        QuicUtils::GetHeadersStreamId(connection_->transport_version()),
+        QuicUtils::GetHeadersStreamId(transport_version()),
         /*is_static=*/true);
   }
   QuicServerSessionBasePeer::SetCryptoStream(session_.get(), nullptr);
   MockQuicCryptoServerStream* quic_crypto_stream = nullptr;
   MockTlsServerHandshaker* tls_server_stream = nullptr;
-  if (session_->connection()->version().handshake_protocol ==
-      PROTOCOL_QUIC_CRYPTO) {
+  if (version().handshake_protocol == PROTOCOL_QUIC_CRYPTO) {
     quic_crypto_stream = new MockQuicCryptoServerStream(
         &crypto_config_, &compressed_certs_cache_, session_.get(),
         &stream_helper_);
@@ -548,7 +547,7 @@
   }
   if (!VersionUsesHttp3(transport_version())) {
     session_->RegisterStreamPriority(
-        QuicUtils::GetHeadersStreamId(connection_->transport_version()),
+        QuicUtils::GetHeadersStreamId(transport_version()),
         /*is_static=*/true,
         spdy::SpdyStreamPrecedence(QuicStream::kDefaultPriority));
   }
@@ -571,11 +570,11 @@
   // Queue up some pending data.
   if (!VersionUsesHttp3(transport_version())) {
     session_->MarkConnectionLevelWriteBlocked(
-        QuicUtils::GetHeadersStreamId(connection_->transport_version()));
+        QuicUtils::GetHeadersStreamId(transport_version()));
   } else {
     session_->MarkConnectionLevelWriteBlocked(
-        QuicUtils::GetFirstUnidirectionalStreamId(
-            connection_->transport_version(), Perspective::IS_SERVER));
+        QuicUtils::GetFirstUnidirectionalStreamId(transport_version(),
+                                                  Perspective::IS_SERVER));
   }
   EXPECT_TRUE(session_->HasDataToWrite());
 
@@ -643,7 +642,7 @@
 }
 
 TEST_P(QuicServerSessionBaseTest, BandwidthResumptionExperiment) {
-  if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
+  if (version().handshake_protocol == PROTOCOL_TLS1_3) {
     // This test relies on resumption, which is not currently supported by the
     // TLS handshake.
     // TODO(nharper): Add support for resumption to the TLS handshake.
@@ -721,7 +720,7 @@
 }
 
 TEST_P(QuicServerSessionBaseTest, TurnOffServerPush) {
-  if (session_->version().UsesHttp3()) {
+  if (VersionHasIetfQuicFrames(transport_version())) {
     return;
   }
 
@@ -762,7 +761,7 @@
 // ProofSource::GetProof.  Delay the completion of the operation until after the
 // stream has been destroyed, and verify that there are no memory bugs.
 TEST_P(StreamMemberLifetimeTest, Basic) {
-  if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
+  if (version().handshake_protocol == PROTOCOL_TLS1_3) {
     // This test depends on the QUIC crypto protocol, so it is disabled for the
     // TLS handshake.
     // TODO(nharper): Fix this test so it doesn't rely on QUIC crypto.
@@ -771,9 +770,9 @@
 
   const QuicClock* clock = helper_.GetClock();
   CryptoHandshakeMessage chlo = crypto_test_utils::GenerateDefaultInchoateCHLO(
-      clock, GetParam().transport_version, &crypto_config_);
+      clock, transport_version(), &crypto_config_);
   chlo.SetVector(kCOPT, QuicTagVector{kREJ});
-  std::vector<ParsedQuicVersion> packet_version_list = {GetParam()};
+  std::vector<ParsedQuicVersion> packet_version_list = {version()};
   std::unique_ptr<QuicEncryptedPacket> packet(ConstructEncryptedPacket(
       TestConnectionId(1), EmptyQuicConnectionId(), true, false, 1,
       std::string(chlo.GetSerialized().AsStringPiece()), CONNECTION_ID_PRESENT,
diff --git a/quic/tools/quic_simple_server_session_test.cc b/quic/tools/quic_simple_server_session_test.cc
index 62bbae9..806cfd4 100644
--- a/quic/tools/quic_simple_server_session_test.cc
+++ b/quic/tools/quic_simple_server_session_test.cc
@@ -257,7 +257,7 @@
                                                           kMaxStreamsForTest);
     }
 
-    ParsedQuicVersionVector supported_versions = SupportedVersions(GetParam());
+    ParsedQuicVersionVector supported_versions = SupportedVersions(version());
     connection_ = new StrictMock<MockQuicConnectionWithSendStreamData>(
         &helper_, &alarm_factory_, Perspective::IS_SERVER, supported_versions);
     connection_->AdvanceTime(QuicTime::Delta::FromSeconds(1));
@@ -289,8 +289,10 @@
         transport_version(), n);
   }
 
+  ParsedQuicVersion version() const { return GetParam(); }
+
   QuicTransportVersion transport_version() const {
-    return GetParam().transport_version;
+    return version().transport_version;
   }
 
   void InjectStopSending(QuicStreamId stream_id,
@@ -443,7 +445,7 @@
 
 TEST_P(QuicSimpleServerSessionTest, CreateIncomingStreamDisconnected) {
   // EXPECT_QUIC_BUG tests are expensive so only run one instance of them.
-  if (GetParam() != AllSupportedVersions()[0]) {
+  if (version() != AllSupportedVersions()[0]) {
     return;
   }
 
@@ -467,7 +469,7 @@
 
 TEST_P(QuicSimpleServerSessionTest, CreateOutgoingDynamicStreamDisconnected) {
   // EXPECT_QUIC_BUG tests are expensive so only run one instance of them.
-  if (GetParam() != AllSupportedVersions()[0]) {
+  if (version() != AllSupportedVersions()[0]) {
     return;
   }
 
@@ -486,7 +488,7 @@
 
 TEST_P(QuicSimpleServerSessionTest, CreateOutgoingDynamicStreamUnencrypted) {
   // EXPECT_QUIC_BUG tests are expensive so only run one instance of them.
-  if (GetParam() != AllSupportedVersions()[0]) {
+  if (version() != AllSupportedVersions()[0]) {
     return;
   }
 
@@ -606,7 +608,7 @@
 
   QuicSimpleServerSessionServerPushTest() {
     // Reset stream level flow control window to be 32KB.
-    if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
+    if (version().handshake_protocol == PROTOCOL_TLS1_3) {
       if (VersionHasIetfQuicFrames(transport_version())) {
         QuicConfigPeer::SetReceivedInitialMaxStreamDataBytesUnidirectional(
             &config_, kStreamFlowControlWindowSize);
@@ -627,7 +629,7 @@
     QuicConfigPeer::SetReceivedInitialSessionFlowControlWindow(
         &config_, kInitialSessionFlowControlWindowForTest);
 
-    ParsedQuicVersionVector supported_versions = SupportedVersions(GetParam());
+    ParsedQuicVersionVector supported_versions = SupportedVersions(version());
     connection_ = new StrictMock<MockQuicConnectionWithSendStreamData>(
         &helper_, &alarm_factory_, Perspective::IS_SERVER, supported_versions);
     connection_->SetEncrypter(