gfe-relnote: n/a, test-only change.
In quic/core/http/end_to_end_test.cc, rename EndToEndTest to
EndToEndTestWithoutTls and rename EndToEndTestWithTls to EndToEndTest to make it
clear that testing with TLS is the default.
PiperOrigin-RevId: 308165111
Change-Id: Ib4fdd5dca7bda4d09bedfe9986b577b0e294187c
diff --git a/quic/core/http/end_to_end_test.cc b/quic/core/http/end_to_end_test.cc
index 4d02c80..5513a7f 100644
--- a/quic/core/http/end_to_end_test.cc
+++ b/quic/core/http/end_to_end_test.cc
@@ -603,17 +603,19 @@
// Run all end to end tests with all supported versions.
INSTANTIATE_TEST_SUITE_P(EndToEndTests,
EndToEndTest,
- ::testing::ValuesIn(GetTestParams(false)),
- ::testing::PrintToStringParamName());
-
-class EndToEndTestWithTls : public EndToEndTest {};
-
-INSTANTIATE_TEST_SUITE_P(EndToEndTestsWithTls,
- EndToEndTestWithTls,
::testing::ValuesIn(GetTestParams(true)),
::testing::PrintToStringParamName());
-TEST_P(EndToEndTestWithTls, HandshakeSuccessful) {
+// These tests are only run with QUIC versions that do not use TLS.
+// TODO(b/154151800): Run all tests with TLS as well as QUIC crypto.
+class EndToEndTestWithoutTls : public EndToEndTest {};
+
+INSTANTIATE_TEST_SUITE_P(EndToEndTestsWithoutTls,
+ EndToEndTestWithoutTls,
+ ::testing::ValuesIn(GetTestParams(false)),
+ ::testing::PrintToStringParamName());
+
+TEST_P(EndToEndTest, HandshakeSuccessful) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
server_thread_->WaitForCryptoHandshakeConfirmed();
@@ -634,7 +636,7 @@
EXPECT_FALSE(QuicStreamSequencerPeer::IsUnderlyingBufferAllocated(sequencer));
}
-TEST_P(EndToEndTest, SimpleRequestResponse) {
+TEST_P(EndToEndTestWithoutTls, SimpleRequestResponse) {
ASSERT_TRUE(Initialize());
EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
@@ -651,13 +653,13 @@
}
}
-TEST_P(EndToEndTestWithTls, SimpleRequestResponse) {
+TEST_P(EndToEndTest, SimpleRequestResponse) {
ASSERT_TRUE(Initialize());
EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTestWithTls, HandshakeConfirmed) {
+TEST_P(EndToEndTest, HandshakeConfirmed) {
ASSERT_TRUE(Initialize());
if (!GetParam().negotiated_version.HasHandshakeDone()) {
return;
@@ -672,7 +674,7 @@
client_->Disconnect();
}
-TEST_P(EndToEndTestWithTls, SendAndReceiveCoalescedPackets) {
+TEST_P(EndToEndTest, SendAndReceiveCoalescedPackets) {
ASSERT_TRUE(Initialize());
if (!GetClientConnection()->version().CanSendCoalescedPackets()) {
return;
@@ -689,7 +691,7 @@
// Simple transaction, but set a non-default ack delay at the client
// and ensure it gets to the server.
-TEST_P(EndToEndTest, SimpleRequestResponseWithAckDelayChange) {
+TEST_P(EndToEndTestWithoutTls, SimpleRequestResponseWithAckDelayChange) {
// Force the ACK delay to be something other than the default.
// Note that it is sent only if doing IETF QUIC.
client_config_.SetMaxAckDelayToSendMs(kDefaultDelayedAckTimeMs + 100u);
@@ -714,7 +716,7 @@
// Simple transaction, but set a non-default ack exponent at the client
// and ensure it gets to the server.
-TEST_P(EndToEndTest, SimpleRequestResponseWithAckExponentChange) {
+TEST_P(EndToEndTestWithoutTls, SimpleRequestResponseWithAckExponentChange) {
const uint32_t kClientAckDelayExponent = kDefaultAckDelayExponent + 100u;
// Force the ACK exponent to be something other than the default.
// Note that it is sent only if doing IETF QUIC.
@@ -741,7 +743,7 @@
GetServerConnection()->framer().local_ack_delay_exponent());
}
-TEST_P(EndToEndTest, SimpleRequestResponseForcedVersionNegotiation) {
+TEST_P(EndToEndTestWithoutTls, SimpleRequestResponseForcedVersionNegotiation) {
client_supported_versions_.insert(client_supported_versions_.begin(),
QuicVersionReservedForNegotiation());
testing::NiceMock<MockQuicConnectionDebugVisitor> visitor;
@@ -757,7 +759,7 @@
EXPECT_FALSE(client_->client()->ReceivedInchoateReject());
}
-TEST_P(EndToEndTestWithTls, ForcedVersionNegotiation) {
+TEST_P(EndToEndTest, ForcedVersionNegotiation) {
client_supported_versions_.insert(client_supported_versions_.begin(),
QuicVersionReservedForNegotiation());
ASSERT_TRUE(Initialize());
@@ -767,7 +769,7 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTest, SimpleRequestResponseZeroConnectionID) {
+TEST_P(EndToEndTestWithoutTls, SimpleRequestResponseZeroConnectionID) {
if (!GetParam().negotiated_version.AllowsVariableLengthConnectionIds()) {
ASSERT_TRUE(Initialize());
return;
@@ -785,7 +787,7 @@
GetParam().negotiated_version.transport_version));
}
-TEST_P(EndToEndTestWithTls, ZeroConnectionID) {
+TEST_P(EndToEndTest, ZeroConnectionID) {
if (!GetParam().negotiated_version.AllowsVariableLengthConnectionIds()) {
ASSERT_TRUE(Initialize());
return;
@@ -801,7 +803,7 @@
GetParam().negotiated_version.transport_version));
}
-TEST_P(EndToEndTestWithTls, BadConnectionIdLength) {
+TEST_P(EndToEndTest, BadConnectionIdLength) {
if (!GetParam().negotiated_version.AllowsVariableLengthConnectionIds()) {
ASSERT_TRUE(Initialize());
return;
@@ -819,7 +821,7 @@
// Tests a very long (16-byte) initial destination connection ID to make
// sure the dispatcher properly replaces it with an 8-byte one.
-TEST_P(EndToEndTestWithTls, LongBadConnectionIdLength) {
+TEST_P(EndToEndTest, LongBadConnectionIdLength) {
if (!GetParam().negotiated_version.AllowsVariableLengthConnectionIds()) {
ASSERT_TRUE(Initialize());
return;
@@ -835,7 +837,7 @@
.length());
}
-TEST_P(EndToEndTestWithTls, ClientConnectionId) {
+TEST_P(EndToEndTest, ClientConnectionId) {
if (!GetParam().negotiated_version.SupportsClientConnectionIds()) {
ASSERT_TRUE(Initialize());
return;
@@ -851,7 +853,7 @@
.length());
}
-TEST_P(EndToEndTestWithTls, ForcedVersionNegotiationAndClientConnectionId) {
+TEST_P(EndToEndTest, ForcedVersionNegotiationAndClientConnectionId) {
if (!GetParam().negotiated_version.SupportsClientConnectionIds()) {
ASSERT_TRUE(Initialize());
return;
@@ -870,7 +872,7 @@
.length());
}
-TEST_P(EndToEndTestWithTls, ForcedVersionNegotiationAndBadConnectionIdLength) {
+TEST_P(EndToEndTest, ForcedVersionNegotiationAndBadConnectionIdLength) {
if (!GetParam().negotiated_version.AllowsVariableLengthConnectionIds()) {
ASSERT_TRUE(Initialize());
return;
@@ -891,7 +893,7 @@
// Forced Version Negotiation with a client connection ID and a long
// connection ID.
-TEST_P(EndToEndTestWithTls, ForcedVersNegoAndClientCIDAndLongCID) {
+TEST_P(EndToEndTest, ForcedVersNegoAndClientCIDAndLongCID) {
if (!GetParam().negotiated_version.SupportsClientConnectionIds() ||
!GetParam().negotiated_version.AllowsVariableLengthConnectionIds()) {
ASSERT_TRUE(Initialize());
@@ -917,7 +919,7 @@
.length());
}
-TEST_P(EndToEndTest, MixGoodAndBadConnectionIdLengths) {
+TEST_P(EndToEndTestWithoutTls, MixGoodAndBadConnectionIdLengths) {
if (!GetParam().negotiated_version.AllowsVariableLengthConnectionIds()) {
ASSERT_TRUE(Initialize());
return;
@@ -957,7 +959,7 @@
.length());
}
-TEST_P(EndToEndTestWithTls, SimpleRequestResponseWithIetfDraftSupport) {
+TEST_P(EndToEndTest, SimpleRequestResponseWithIetfDraftSupport) {
if (!GetParam().negotiated_version.HasIetfQuicFrames()) {
ASSERT_TRUE(Initialize());
return;
@@ -969,7 +971,7 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTest, SimpleRequestResponseWithLargeReject) {
+TEST_P(EndToEndTestWithoutTls, SimpleRequestResponseWithLargeReject) {
chlo_multiplier_ = 1;
ASSERT_TRUE(Initialize());
@@ -979,7 +981,7 @@
EXPECT_TRUE(client_->client()->ReceivedInchoateReject());
}
-TEST_P(EndToEndTestWithTls, SimpleRequestResponsev6) {
+TEST_P(EndToEndTest, SimpleRequestResponsev6) {
server_address_ =
QuicSocketAddress(QuicIpAddress::Loopback6(), server_address_.port());
ASSERT_TRUE(Initialize());
@@ -988,7 +990,7 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTestWithTls,
+TEST_P(EndToEndTest,
ClientDoesNotAllowServerDataOnServerInitiatedBidirectionalStreams) {
set_client_initial_max_stream_data_incoming_bidirectional(0);
ASSERT_TRUE(Initialize());
@@ -996,7 +998,7 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTestWithTls,
+TEST_P(EndToEndTest,
ServerDoesNotAllowClientDataOnServerInitiatedBidirectionalStreams) {
set_server_initial_max_stream_data_outgoing_bidirectional(0);
ASSERT_TRUE(Initialize());
@@ -1004,7 +1006,7 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTestWithTls,
+TEST_P(EndToEndTest,
BothEndpointsDisallowDataOnServerInitiatedBidirectionalStreams) {
set_client_initial_max_stream_data_incoming_bidirectional(0);
set_server_initial_max_stream_data_outgoing_bidirectional(0);
@@ -1017,7 +1019,7 @@
// initial packet. Undecryptable packets can be seen after the handshake
// is complete due to dropping the initial keys at that point, so we only test
// for undecryptable packets before then.
-TEST_P(EndToEndTestWithTls, NoUndecryptablePacketsBeforeHandshakeComplete) {
+TEST_P(EndToEndTest, NoUndecryptablePacketsBeforeHandshakeComplete) {
ASSERT_TRUE(Initialize());
EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
@@ -1036,7 +1038,7 @@
server_thread_->Resume();
}
-TEST_P(EndToEndTestWithTls, SeparateFinPacket) {
+TEST_P(EndToEndTest, SeparateFinPacket) {
ASSERT_TRUE(Initialize());
// Send a request in two parts: the request and then an empty packet with FIN.
@@ -1060,7 +1062,7 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTestWithTls, MultipleRequestResponse) {
+TEST_P(EndToEndTest, MultipleRequestResponse) {
ASSERT_TRUE(Initialize());
EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
@@ -1069,7 +1071,7 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTest, MultipleRequestResponseZeroConnectionID) {
+TEST_P(EndToEndTestWithoutTls, MultipleRequestResponseZeroConnectionID) {
if (!GetParam().negotiated_version.AllowsVariableLengthConnectionIds()) {
ASSERT_TRUE(Initialize());
return;
@@ -1084,7 +1086,7 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTestWithTls, MultipleStreams) {
+TEST_P(EndToEndTest, MultipleStreams) {
// Verifies quic_test_client can track responses of all active streams.
ASSERT_TRUE(Initialize());
@@ -1109,7 +1111,7 @@
}
}
-TEST_P(EndToEndTestWithTls, MultipleClients) {
+TEST_P(EndToEndTest, MultipleClients) {
ASSERT_TRUE(Initialize());
std::unique_ptr<QuicTestClient> client2(CreateQuicClient(nullptr));
@@ -1134,7 +1136,7 @@
EXPECT_EQ("200", client2->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTestWithTls, RequestOverMultiplePackets) {
+TEST_P(EndToEndTest, RequestOverMultiplePackets) {
// Send a large enough request to guarantee fragmentation.
std::string huge_request =
"/some/path?query=" + std::string(kMaxOutgoingPacketSize, '.');
@@ -1146,7 +1148,7 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTestWithTls, MultiplePacketsRandomOrder) {
+TEST_P(EndToEndTest, MultiplePacketsRandomOrder) {
// Send a large enough request to guarantee fragmentation.
std::string huge_request =
"/some/path?query=" + std::string(kMaxOutgoingPacketSize, '.');
@@ -1160,7 +1162,7 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTestWithTls, PostMissingBytes) {
+TEST_P(EndToEndTest, PostMissingBytes) {
ASSERT_TRUE(Initialize());
// Add a content length header with no body.
@@ -1179,7 +1181,7 @@
EXPECT_EQ("500", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTest, LargePostNoPacketLoss) {
+TEST_P(EndToEndTestWithoutTls, LargePostNoPacketLoss) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
@@ -1199,7 +1201,7 @@
VerifyCleanConnection(true);
}
-TEST_P(EndToEndTest, LargePostNoPacketLoss1sRTT) {
+TEST_P(EndToEndTestWithoutTls, LargePostNoPacketLoss1sRTT) {
ASSERT_TRUE(Initialize());
SetPacketSendDelay(QuicTime::Delta::FromMilliseconds(1000));
@@ -1218,7 +1220,7 @@
VerifyCleanConnection(false);
}
-TEST_P(EndToEndTest, LargePostWithPacketLoss) {
+TEST_P(EndToEndTestWithoutTls, LargePostWithPacketLoss) {
// Connect with lower fake packet loss than we'd like to test.
// Until b/10126687 is fixed, losing handshake packets is pretty
// brutal.
@@ -1243,7 +1245,8 @@
}
// Regression test for b/80090281.
-TEST_P(EndToEndTest, LargePostWithPacketLossAndAlwaysBundleWindowUpdates) {
+TEST_P(EndToEndTestWithoutTls,
+ LargePostWithPacketLossAndAlwaysBundleWindowUpdates) {
ASSERT_TRUE(Initialize());
// Wait for the server SHLO before upping the packet loss.
@@ -1273,7 +1276,7 @@
VerifyCleanConnection(true);
}
-TEST_P(EndToEndTest, LargePostWithPacketLossAndBlockedSocket) {
+TEST_P(EndToEndTestWithoutTls, LargePostWithPacketLossAndBlockedSocket) {
// Connect with lower fake packet loss than we'd like to test. Until
// b/10126687 is fixed, losing handshake packets is pretty brutal.
SetPacketLossPercentage(5);
@@ -1296,7 +1299,7 @@
client_->SendCustomSynchronousRequest(headers, body));
}
-TEST_P(EndToEndTest, LargePostNoPacketLossWithDelayAndReordering) {
+TEST_P(EndToEndTestWithoutTls, LargePostNoPacketLossWithDelayAndReordering) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
@@ -1316,7 +1319,7 @@
client_->SendCustomSynchronousRequest(headers, body));
}
-TEST_P(EndToEndTest, LargePostZeroRTTFailure) {
+TEST_P(EndToEndTestWithoutTls, LargePostZeroRTTFailure) {
// Send a request and then disconnect. This prepares the client to attempt
// a 0-RTT handshake for the next request.
ASSERT_TRUE(Initialize());
@@ -1367,7 +1370,7 @@
VerifyCleanConnection(false);
}
-TEST_P(EndToEndTest, SynchronousRequestZeroRTTFailure) {
+TEST_P(EndToEndTestWithoutTls, SynchronousRequestZeroRTTFailure) {
// Send a request and then disconnect. This prepares the client to attempt
// a 0-RTT handshake for the next request.
ASSERT_TRUE(Initialize());
@@ -1409,7 +1412,7 @@
VerifyCleanConnection(false);
}
-TEST_P(EndToEndTest, LargePostSynchronousRequest) {
+TEST_P(EndToEndTestWithoutTls, LargePostSynchronousRequest) {
// Send a request and then disconnect. This prepares the client to attempt
// a 0-RTT handshake for the next request.
ASSERT_TRUE(Initialize());
@@ -1461,7 +1464,7 @@
VerifyCleanConnection(false);
}
-TEST_P(EndToEndTest, RejectWithPacketLoss) {
+TEST_P(EndToEndTestWithoutTls, RejectWithPacketLoss) {
// In this test, we intentionally drop the first packet from the
// server, which corresponds with the initial REJ response from
// the server.
@@ -1469,7 +1472,7 @@
ASSERT_TRUE(Initialize());
}
-TEST_P(EndToEndTest, SetInitialReceivedConnectionOptions) {
+TEST_P(EndToEndTestWithoutTls, SetInitialReceivedConnectionOptions) {
QuicTagVector initial_received_options;
initial_received_options.push_back(kTBBR);
initial_received_options.push_back(kIW10);
@@ -1495,7 +1498,7 @@
ContainsQuicTag(server_config_.ReceivedConnectionOptions(), kPRST));
}
-TEST_P(EndToEndTest, LargePostSmallBandwidthLargeBuffer) {
+TEST_P(EndToEndTestWithoutTls, LargePostSmallBandwidthLargeBuffer) {
ASSERT_TRUE(Initialize());
SetPacketSendDelay(QuicTime::Delta::FromMicroseconds(1));
// 256KB per second with a 256KB buffer from server to client. Wireless
@@ -1520,7 +1523,7 @@
VerifyCleanConnection(true);
}
-TEST_P(EndToEndTestWithTls, DoNotSetSendAlarmIfConnectionFlowControlBlocked) {
+TEST_P(EndToEndTest, DoNotSetSendAlarmIfConnectionFlowControlBlocked) {
// Regression test for b/14677858.
// Test that the resume write alarm is not set in QuicConnection::OnCanWrite
// if currently connection level flow control blocked. If set, this results in
@@ -1561,9 +1564,9 @@
EXPECT_FALSE(send_alarm->IsSet());
}
-// TODO(nharper): Needs to get turned back to EndToEndTestWithTls
-// when we figure out why the test doesn't work on chrome.
-TEST_P(EndToEndTest, InvalidStream) {
+// TODO(b/154151800): Needs to get turned back to EndToEndTest when we figure
+// out why the test doesn't work on chrome.
+TEST_P(EndToEndTestWithoutTls, InvalidStream) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
@@ -1588,7 +1591,7 @@
// Test that if the server will close the connection if the client attempts
// to send a request with overly large headers.
-TEST_P(EndToEndTest, LargeHeaders) {
+TEST_P(EndToEndTestWithoutTls, LargeHeaders) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
@@ -1616,7 +1619,7 @@
}
}
-TEST_P(EndToEndTest, EarlyResponseWithQuicStreamNoError) {
+TEST_P(EndToEndTestWithoutTls, EarlyResponseWithQuicStreamNoError) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
@@ -1638,7 +1641,7 @@
}
// TODO(rch): this test seems to cause net_unittests timeouts :|
-TEST_P(EndToEndTestWithTls, QUIC_TEST_DISABLED_IN_CHROME(MultipleTermination)) {
+TEST_P(EndToEndTest, QUIC_TEST_DISABLED_IN_CHROME(MultipleTermination)) {
ASSERT_TRUE(Initialize());
// Set the offset so we won't frame. Otherwise when we pick up termination
@@ -1658,9 +1661,9 @@
EXPECT_QUIC_BUG(client_->SendData("eep", true), "Fin already buffered");
}
-// TODO(nharper): Needs to get turned back to EndToEndTestWithTls
-// when we figure out why the test doesn't work on chrome.
-TEST_P(EndToEndTest, Timeout) {
+// TODO(b/154151800): Needs to get turned back to EndToEndTest when we figure
+// out why the test doesn't work on chrome.
+TEST_P(EndToEndTestWithoutTls, Timeout) {
client_config_.SetIdleNetworkTimeout(QuicTime::Delta::FromMicroseconds(500),
QuicTime::Delta::FromMicroseconds(500));
// Note: we do NOT ASSERT_TRUE: we may time out during initial handshake:
@@ -1671,7 +1674,7 @@
}
}
-TEST_P(EndToEndTestWithTls, MaxDynamicStreamsLimitRespected) {
+TEST_P(EndToEndTest, MaxDynamicStreamsLimitRespected) {
// Set a limit on maximum number of incoming dynamic streams.
// Make sure the limit is respected by the peer.
const uint32_t kServerMaxDynamicStreams = 1;
@@ -1714,7 +1717,7 @@
EXPECT_THAT(client_->connection_error(), IsQuicNoError());
}
-TEST_P(EndToEndTest, SetIndependentMaxDynamicStreamsLimits) {
+TEST_P(EndToEndTestWithoutTls, SetIndependentMaxDynamicStreamsLimits) {
// Each endpoint can set max dynamic streams independently.
const uint32_t kClientMaxDynamicStreams = 4;
const uint32_t kServerMaxDynamicStreams = 3;
@@ -1778,7 +1781,7 @@
server_thread_->Resume();
}
-TEST_P(EndToEndTest, NegotiateCongestionControl) {
+TEST_P(EndToEndTestWithoutTls, NegotiateCongestionControl) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
@@ -1809,7 +1812,7 @@
server_thread_->Resume();
}
-TEST_P(EndToEndTest, ClientSuggestsRTT) {
+TEST_P(EndToEndTestWithoutTls, ClientSuggestsRTT) {
// Client suggests initial RTT, verify it is used.
const QuicTime::Delta kInitialRTT = QuicTime::Delta::FromMicroseconds(20000);
client_config_.SetInitialRoundTripTimeUsToSend(kInitialRTT.ToMicroseconds());
@@ -1835,7 +1838,7 @@
server_thread_->Resume();
}
-TEST_P(EndToEndTest, ClientSuggestsIgnoredRTT) {
+TEST_P(EndToEndTestWithoutTls, ClientSuggestsIgnoredRTT) {
// Client suggests initial RTT, but also specifies NRTT, so it's not used.
const QuicTime::Delta kInitialRTT = QuicTime::Delta::FromMicroseconds(20000);
client_config_.SetInitialRoundTripTimeUsToSend(kInitialRTT.ToMicroseconds());
@@ -1864,7 +1867,7 @@
server_thread_->Resume();
}
-TEST_P(EndToEndTest, MaxInitialRTT) {
+TEST_P(EndToEndTestWithoutTls, MaxInitialRTT) {
// Client tries to suggest twice the server's max initial rtt and the server
// uses the max.
client_config_.SetInitialRoundTripTimeUsToSend(2 *
@@ -1892,7 +1895,7 @@
server_thread_->Resume();
}
-TEST_P(EndToEndTest, MinInitialRTT) {
+TEST_P(EndToEndTestWithoutTls, MinInitialRTT) {
// Client tries to suggest 0 and the server uses the default.
client_config_.SetInitialRoundTripTimeUsToSend(0);
@@ -1920,7 +1923,7 @@
server_thread_->Resume();
}
-TEST_P(EndToEndTest, 0ByteConnectionId) {
+TEST_P(EndToEndTestWithoutTls, 0ByteConnectionId) {
if (VersionHasIetfInvariantHeader(
GetParam().negotiated_version.transport_version)) {
// SetBytesForConnectionIdToSend only applies to Google QUIC encoding.
@@ -1938,7 +1941,7 @@
EXPECT_EQ(CONNECTION_ID_ABSENT, header->source_connection_id_included);
}
-TEST_P(EndToEndTestWithTls, 8ByteConnectionId) {
+TEST_P(EndToEndTest, 8ByteConnectionId) {
if (VersionHasIetfInvariantHeader(
GetParam().negotiated_version.transport_version)) {
// SetBytesForConnectionIdToSend only applies to Google QUIC encoding.
@@ -1956,7 +1959,7 @@
EXPECT_EQ(CONNECTION_ID_PRESENT, header->destination_connection_id_included);
}
-TEST_P(EndToEndTestWithTls, 15ByteConnectionId) {
+TEST_P(EndToEndTest, 15ByteConnectionId) {
if (VersionHasIetfInvariantHeader(
GetParam().negotiated_version.transport_version)) {
// SetBytesForConnectionIdToSend only applies to Google QUIC encoding.
@@ -1975,7 +1978,7 @@
EXPECT_EQ(CONNECTION_ID_PRESENT, header->destination_connection_id_included);
}
-TEST_P(EndToEndTestWithTls, ResetConnection) {
+TEST_P(EndToEndTest, ResetConnection) {
ASSERT_TRUE(Initialize());
EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
@@ -1986,9 +1989,9 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-// TODO(nharper): Needs to get turned back to EndToEndTestWithTls
-// when we figure out why the test doesn't work on chrome.
-TEST_P(EndToEndTest, MaxStreamsUberTest) {
+// TODO(b/154151800): Needs to get turned back to EndToEndTest when we figure
+// out why the test doesn't work on chrome.
+TEST_P(EndToEndTestWithoutTls, MaxStreamsUberTest) {
// Connect with lower fake packet loss than we'd like to test. Until
// b/10126687 is fixed, losing handshake packets is pretty brutal.
SetPacketLossPercentage(1);
@@ -2011,7 +2014,7 @@
}
}
-TEST_P(EndToEndTestWithTls, StreamCancelErrorTest) {
+TEST_P(EndToEndTest, StreamCancelErrorTest) {
ASSERT_TRUE(Initialize());
std::string small_body(256, 'a');
@@ -2042,7 +2045,7 @@
EXPECT_THAT(client_->connection_error(), IsQuicNoError());
}
-TEST_P(EndToEndTest, ConnectionMigrationClientIPChanged) {
+TEST_P(EndToEndTestWithoutTls, ConnectionMigrationClientIPChanged) {
ASSERT_TRUE(Initialize());
EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
@@ -2061,7 +2064,7 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTest, ConnectionMigrationClientPortChanged) {
+TEST_P(EndToEndTestWithoutTls, ConnectionMigrationClientPortChanged) {
// Tests that the client's port can change during an established QUIC
// connection, and that doing so does not result in the connection being
// closed by the server.
@@ -2118,7 +2121,7 @@
EXPECT_NE(old_address.port(), new_address.port());
}
-TEST_P(EndToEndTest, NegotiatedInitialCongestionWindow) {
+TEST_P(EndToEndTestWithoutTls, NegotiatedInitialCongestionWindow) {
SetQuicReloadableFlag(quic_unified_iw_options, true);
client_extra_copts_.push_back(kIW03);
@@ -2134,7 +2137,7 @@
EXPECT_EQ(3u, cwnd);
}
-TEST_P(EndToEndTest, DifferentFlowControlWindows) {
+TEST_P(EndToEndTestWithoutTls, DifferentFlowControlWindows) {
// Client and server can set different initial flow control receive windows.
// These are sent in CHLO/SHLO. Tests that these values are exchanged properly
// in the crypto handshake.
@@ -2188,7 +2191,7 @@
}
// Test negotiation of IFWA connection option.
-TEST_P(EndToEndTest, NegotiatedServerInitialFlowControlWindow) {
+TEST_P(EndToEndTestWithoutTls, NegotiatedServerInitialFlowControlWindow) {
const uint32_t kClientStreamIFCW = 123456;
const uint32_t kClientSessionIFCW = 234567;
set_client_initial_stream_flow_control_receive_window(kClientStreamIFCW);
@@ -2232,7 +2235,7 @@
GetClientSession()->flow_controller()));
}
-TEST_P(EndToEndTest, HeadersAndCryptoStreamsNoConnectionFlowControl) {
+TEST_P(EndToEndTestWithoutTls, HeadersAndCryptoStreamsNoConnectionFlowControl) {
// The special headers and crypto streams should be subject to per-stream flow
// control limits, but should not be subject to connection level flow control
const uint32_t kStreamIFCW = 32 * 1024;
@@ -2296,7 +2299,7 @@
server_thread_->Resume();
}
-TEST_P(EndToEndTest, FlowControlsSynced) {
+TEST_P(EndToEndTestWithoutTls, FlowControlsSynced) {
set_smaller_flow_control_receive_window();
ASSERT_TRUE(Initialize());
@@ -2399,7 +2402,7 @@
server_thread_->Resume();
}
-TEST_P(EndToEndTestWithTls, RequestWithNoBodyWillNeverSendStreamFrameWithFIN) {
+TEST_P(EndToEndTest, RequestWithNoBodyWillNeverSendStreamFrameWithFIN) {
// A stream created on receipt of a simple request with no body will never get
// a stream frame with a FIN. Verify that we don't keep track of the stream in
// the locally closed streams map: it will never be removed if so.
@@ -2453,7 +2456,7 @@
}
};
-TEST_P(EndToEndTest, AckNotifierWithPacketLossAndBlockedSocket) {
+TEST_P(EndToEndTestWithoutTls, AckNotifierWithPacketLossAndBlockedSocket) {
// Verify that even in the presence of packet loss and occasionally blocked
// socket, an AckNotifierDelegate will get informed that the data it is
// interested in has been ACKed. This tests end-to-end ACK notification, and
@@ -2520,7 +2523,7 @@
}
// Send a public reset from the server.
-TEST_P(EndToEndTestWithTls, ServerSendPublicReset) {
+TEST_P(EndToEndTest, ServerSendPublicReset) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
@@ -2558,7 +2561,7 @@
// Send a public reset from the server for a different connection ID.
// It should be ignored.
-TEST_P(EndToEndTestWithTls, ServerSendPublicResetWithDifferentConnectionId) {
+TEST_P(EndToEndTest, ServerSendPublicResetWithDifferentConnectionId) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
@@ -2611,7 +2614,7 @@
// Send a public reset from the client for a different connection ID.
// It should be ignored.
-TEST_P(EndToEndTestWithTls, ClientSendPublicResetWithDifferentConnectionId) {
+TEST_P(EndToEndTest, ClientSendPublicResetWithDifferentConnectionId) {
ASSERT_TRUE(Initialize());
// Send the public reset.
@@ -2635,8 +2638,7 @@
// Send a version negotiation packet from the server for a different
// connection ID. It should be ignored.
-TEST_P(EndToEndTestWithTls,
- ServerSendVersionNegotiationWithDifferentConnectionId) {
+TEST_P(EndToEndTest, ServerSendVersionNegotiationWithDifferentConnectionId) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
@@ -2672,7 +2674,7 @@
// A bad header shouldn't tear down the connection, because the receiver can't
// tell the connection ID.
-TEST_P(EndToEndTestWithTls, BadPacketHeaderTruncated) {
+TEST_P(EndToEndTest, BadPacketHeaderTruncated) {
ASSERT_TRUE(Initialize());
// Start the connection.
@@ -2703,7 +2705,7 @@
// A bad header shouldn't tear down the connection, because the receiver can't
// tell the connection ID.
-TEST_P(EndToEndTestWithTls, BadPacketHeaderFlags) {
+TEST_P(EndToEndTest, BadPacketHeaderFlags) {
ASSERT_TRUE(Initialize());
// Start the connection.
@@ -2753,7 +2755,7 @@
// Send a packet from the client with bad encrypted data. The server should not
// tear down the connection.
-TEST_P(EndToEndTestWithTls, BadEncryptedData) {
+TEST_P(EndToEndTest, BadEncryptedData) {
ASSERT_TRUE(Initialize());
// Start the connection.
@@ -2789,7 +2791,7 @@
EXPECT_EQ("200", client_->response_headers()->find(":status")->second);
}
-TEST_P(EndToEndTestWithTls, CanceledStreamDoesNotBecomeZombie) {
+TEST_P(EndToEndTest, CanceledStreamDoesNotBecomeZombie) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
// Lose the request.
@@ -2969,7 +2971,7 @@
int64_t body_bytes_;
};
-TEST_P(EndToEndTest, EarlyResponseFinRecording) {
+TEST_P(EndToEndTestWithoutTls, EarlyResponseFinRecording) {
set_smaller_flow_control_receive_window();
// Verify that an incoming FIN is recorded in a stream object even if the read
@@ -3037,7 +3039,7 @@
server_thread_->Resume();
}
-TEST_P(EndToEndTestWithTls, Trailers) {
+TEST_P(EndToEndTest, Trailers) {
// Test sending and receiving HTTP/2 Trailers (trailing HEADERS frames).
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
@@ -3366,7 +3368,7 @@
}
// TODO(fayang): this test seems to cause net_unittests timeouts :|
-TEST_P(EndToEndTest, DISABLED_TestHugePostWithPacketLoss) {
+TEST_P(EndToEndTestWithoutTls, DISABLED_TestHugePostWithPacketLoss) {
// This test tests a huge post with introduced packet loss from client to
// server and body size greater than 4GB, making sure QUIC code does not break
// for 32-bit builds.
@@ -3406,7 +3408,7 @@
}
// TODO(fayang): this test seems to cause net_unittests timeouts :|
-TEST_P(EndToEndTest, DISABLED_TestHugeResponseWithPacketLoss) {
+TEST_P(EndToEndTestWithoutTls, DISABLED_TestHugeResponseWithPacketLoss) {
// This test tests a huge response with introduced loss from server to client
// and body size greater than 4GB, making sure QUIC code does not break for
// 32-bit builds.
@@ -3443,7 +3445,7 @@
}
// Regression test for b/111515567
-TEST_P(EndToEndTest, AgreeOnStopWaiting) {
+TEST_P(EndToEndTestWithoutTls, AgreeOnStopWaiting) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
@@ -3458,7 +3460,7 @@
}
// Regression test for b/111515567
-TEST_P(EndToEndTest, AgreeOnStopWaitingWithNoStopWaitingOption) {
+TEST_P(EndToEndTestWithoutTls, AgreeOnStopWaitingWithNoStopWaitingOption) {
QuicTagVector options;
options.push_back(kNSTP);
client_config_.SetConnectionOptionsToSend(options);
@@ -3475,7 +3477,7 @@
server_thread_->Resume();
}
-TEST_P(EndToEndTest, ReleaseHeadersStreamBufferWhenIdle) {
+TEST_P(EndToEndTestWithoutTls, ReleaseHeadersStreamBufferWhenIdle) {
// Tests that when client side has no active request and no waiting
// PUSH_PROMISE, its headers stream's sequencer buffer should be released.
ASSERT_TRUE(Initialize());
@@ -3492,7 +3494,7 @@
EXPECT_FALSE(QuicStreamSequencerPeer::IsUnderlyingBufferAllocated(sequencer));
}
-TEST_P(EndToEndTest, WayTooLongRequestHeaders) {
+TEST_P(EndToEndTestWithoutTls, WayTooLongRequestHeaders) {
ASSERT_TRUE(Initialize());
SpdyHeaderBlock headers;
headers[":method"] = "GET";
@@ -3533,7 +3535,7 @@
size_t num_ping_frames_;
};
-TEST_P(EndToEndTest, WindowUpdateInAck) {
+TEST_P(EndToEndTestWithoutTls, WindowUpdateInAck) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
WindowUpdateObserver observer;
@@ -3554,7 +3556,7 @@
EXPECT_EQ(0u, observer.num_ping_frames());
}
-TEST_P(EndToEndTestWithTls, SendStatelessResetTokenInShlo) {
+TEST_P(EndToEndTest, SendStatelessResetTokenInShlo) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
QuicConfig* config = client_->client()->session()->config();
@@ -3566,7 +3568,7 @@
}
// Regression test for b/116200989.
-TEST_P(EndToEndTest,
+TEST_P(EndToEndTestWithoutTls,
SendStatelessResetIfServerConnectionClosedLocallyDuringHandshake) {
connect_to_server_on_initialize_ = false;
ASSERT_TRUE(Initialize());
@@ -3589,7 +3591,7 @@
}
// Regression test for b/116200989.
-TEST_P(EndToEndTest,
+TEST_P(EndToEndTestWithoutTls,
SendStatelessResetIfServerConnectionClosedLocallyAfterHandshake) {
// Prevent the connection from expiring in the time wait list.
SetQuicFlag(FLAGS_quic_time_wait_list_seconds, 10000);
@@ -3626,7 +3628,7 @@
}
// Regression test of b/70782529.
-TEST_P(EndToEndTest, DoNotCrashOnPacketWriteError) {
+TEST_P(EndToEndTestWithoutTls, DoNotCrashOnPacketWriteError) {
ASSERT_TRUE(Initialize());
BadPacketWriter* bad_writer =
new BadPacketWriter(/*packet_causing_write_error=*/5,
@@ -3647,7 +3649,7 @@
// Regression test for b/71711996. This test sends a connectivity probing packet
// as its last sent packet, and makes sure the server's ACK of that packet does
// not cause the client to fail.
-TEST_P(EndToEndTest, LastPacketSentIsConnectivityProbing) {
+TEST_P(EndToEndTestWithoutTls, LastPacketSentIsConnectivityProbing) {
ASSERT_TRUE(Initialize());
EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
@@ -3665,7 +3667,7 @@
client_->WaitForDelayedAcks();
}
-TEST_P(EndToEndTestWithTls, PreSharedKey) {
+TEST_P(EndToEndTest, PreSharedKey) {
client_config_.set_max_time_before_crypto_handshake(
QuicTime::Delta::FromSeconds(5));
client_config_.set_max_idle_time_before_crypto_handshake(
@@ -3689,8 +3691,7 @@
}
// TODO: reenable once we have a way to make this run faster.
-TEST_P(EndToEndTestWithTls,
- QUIC_TEST_DISABLED_IN_CHROME(PreSharedKeyMismatch)) {
+TEST_P(EndToEndTest, QUIC_TEST_DISABLED_IN_CHROME(PreSharedKeyMismatch)) {
client_config_.set_max_time_before_crypto_handshake(
QuicTime::Delta::FromSeconds(1));
client_config_.set_max_idle_time_before_crypto_handshake(
@@ -3719,8 +3720,7 @@
}
// TODO: reenable once we have a way to make this run faster.
-TEST_P(EndToEndTestWithTls,
- QUIC_TEST_DISABLED_IN_CHROME(PreSharedKeyNoClient)) {
+TEST_P(EndToEndTest, QUIC_TEST_DISABLED_IN_CHROME(PreSharedKeyNoClient)) {
client_config_.set_max_time_before_crypto_handshake(
QuicTime::Delta::FromSeconds(1));
client_config_.set_max_idle_time_before_crypto_handshake(
@@ -3742,8 +3742,7 @@
}
// TODO: reenable once we have a way to make this run faster.
-TEST_P(EndToEndTestWithTls,
- QUIC_TEST_DISABLED_IN_CHROME(PreSharedKeyNoServer)) {
+TEST_P(EndToEndTest, QUIC_TEST_DISABLED_IN_CHROME(PreSharedKeyNoServer)) {
client_config_.set_max_time_before_crypto_handshake(
QuicTime::Delta::FromSeconds(1));
client_config_.set_max_idle_time_before_crypto_handshake(
@@ -3764,7 +3763,7 @@
EXPECT_THAT(client_->connection_error(), IsError(QUIC_HANDSHAKE_TIMEOUT));
}
-TEST_P(EndToEndTest, RequestAndStreamRstInOnePacket) {
+TEST_P(EndToEndTestWithoutTls, RequestAndStreamRstInOnePacket) {
// Regression test for b/80234898.
ASSERT_TRUE(Initialize());
@@ -3799,7 +3798,7 @@
EXPECT_THAT(client_->connection_error(), IsQuicNoError());
}
-TEST_P(EndToEndTest, ResetStreamOnTtlExpires) {
+TEST_P(EndToEndTestWithoutTls, ResetStreamOnTtlExpires) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
SetPacketLossPercentage(30);
@@ -3816,7 +3815,7 @@
EXPECT_THAT(client_->stream_error(), IsStreamError(QUIC_STREAM_TTL_EXPIRED));
}
-TEST_P(EndToEndTest, SendMessages) {
+TEST_P(EndToEndTestWithoutTls, SendMessages) {
ASSERT_TRUE(Initialize());
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
QuicSession* client_session = GetClientSession();
@@ -3983,7 +3982,7 @@
// Test that STOP_SENDING makes it to the peer. Create a stream and send a
// STOP_SENDING. The receiver should get a call to QuicStream::OnStopSending.
-TEST_P(EndToEndTest, SimpleStopSendingTest) {
+TEST_P(EndToEndTestWithoutTls, SimpleStopSendingTest) {
const uint16_t kStopSendingTestCode = 123;
ASSERT_TRUE(Initialize());
if (!VersionHasIetfQuicFrames(negotiated_version_.transport_version)) {
@@ -4031,7 +4030,7 @@
static_cast<uint16_t>(client_stream->stream_error()));
}
-TEST_P(EndToEndTest, SimpleStopSendingRstStreamTest) {
+TEST_P(EndToEndTestWithoutTls, SimpleStopSendingRstStreamTest) {
ASSERT_TRUE(Initialize());
// Send a request without a fin, to keep the stream open
@@ -4082,7 +4081,7 @@
bool error_returned_;
};
-TEST_P(EndToEndTest, ZeroRttProtectedConnectionClose) {
+TEST_P(EndToEndTestWithoutTls, ZeroRttProtectedConnectionClose) {
// This test ensures ZERO_RTT_PROTECTED connection close could close a client
// which has switched to forward secure.
connect_to_server_on_initialize_ =
@@ -4143,7 +4142,7 @@
bool error_returned_;
};
-TEST_P(EndToEndTest, ForwardSecureConnectionClose) {
+TEST_P(EndToEndTestWithoutTls, ForwardSecureConnectionClose) {
// This test ensures ZERO_RTT_PROTECTED connection close is sent to a client
// which has ZERO_RTT_PROTECTED encryption level.
connect_to_server_on_initialize_ =
@@ -4174,7 +4173,7 @@
// Test that the stream id manager closes the connection if a stream
// in excess of the allowed maximum.
-TEST_P(EndToEndTest, TooBigStreamIdClosesConnection) {
+TEST_P(EndToEndTestWithoutTls, TooBigStreamIdClosesConnection) {
// Has to be before version test, see EndToEndTest::TearDown()
ASSERT_TRUE(Initialize());
if (!VersionHasIetfQuicFrames(negotiated_version_.transport_version)) {
@@ -4208,7 +4207,7 @@
IS_IETF_STREAM_FRAME(GetClientSession()->transport_close_frame_type()));
}
-TEST_P(EndToEndTest, TestMaxPushId) {
+TEST_P(EndToEndTestWithoutTls, TestMaxPushId) {
// Has to be before version test, see EndToEndTest::TearDown()
ASSERT_TRUE(Initialize());
if (!VersionHasIetfQuicFrames(negotiated_version_.transport_version)) {
@@ -4229,7 +4228,7 @@
->CanCreatePushStreamWithId(kMaxQuicStreamId));
}
-TEST_P(EndToEndTest, CustomTransportParameters) {
+TEST_P(EndToEndTestWithoutTls, CustomTransportParameters) {
if (GetParam().negotiated_version.handshake_protocol != PROTOCOL_TLS1_3) {
Initialize();
return;