Change large header size in EndToEndTest.WayTooLongRequestHeaders.
Much smaller headers are enough to trigger the behavior this test is exercising.
Large headers are causing test timeouts under different scenarios:
* TLS + HPACK (b/157248143)
* QPACK only on tsan bots on Chromium (b/169262950)
PiperOrigin-RevId: 336935923
Change-Id: Idd76963a8e008b459111bd2245d02d446c097fe7
diff --git a/quic/core/http/end_to_end_test.cc b/quic/core/http/end_to_end_test.cc
index 6145a79..43d95a3 100644
--- a/quic/core/http/end_to_end_test.cc
+++ b/quic/core/http/end_to_end_test.cc
@@ -3920,21 +3920,17 @@
EXPECT_FALSE(QuicStreamSequencerPeer::IsUnderlyingBufferAllocated(sequencer));
}
+// A single large header value causes a different error than the total size of
+// headers exceeding a smaller limit, tested at EndToEndTest.LargeHeaders.
TEST_P(EndToEndTest, WayTooLongRequestHeaders) {
ASSERT_TRUE(Initialize());
- if (version_.UsesTls() && !version_.UsesHttp3()) {
- // In T050, it took relatively long time for HPACK to compress the header
- // while server will detect blackhole on NST message.
- // TODO(b/157248143): remove this when the HPACK compression issue is
- // understood.
- return;
- }
+
SpdyHeaderBlock headers;
headers[":method"] = "GET";
headers[":path"] = "/foo";
headers[":scheme"] = "https";
headers[":authority"] = server_hostname_;
- headers["key"] = std::string(64 * 1024 * 1024, 'a');
+ headers["key"] = std::string(2 * 1024 * 1024, 'a');
client_->SendMessage(headers, "");
client_->WaitForResponse();