Migration from GFE_BUG_V2 (and friends) to GFE_BUG

Per go/gfe-bug-improvements GFE_BUGs are getting stable IDs to allow for monitoring and alerting. To achieve that, a temporary set of V2 macros was added and the codebase was migrated to using the V2 macros. Now that migration is complete, the old-style (sans _V2) macros were changed to also take bug_id parameter, which makes the V2 set obsolete. To complete the transition, the codebase is being migrated back to GFE_BUG macros. Once done, V2 macros will be removed.

PiperOrigin-RevId: 363268989
Change-Id: Ib271e19ab2c85b6676920c551555688d99ec8526
diff --git a/quic/quic_transport/quic_transport_client_session.cc b/quic/quic_transport/quic_transport_client_session.cc
index 1d2ff4f..17f9194 100644
--- a/quic/quic_transport/quic_transport_client_session.cc
+++ b/quic/quic_transport/quic_transport_client_session.cc
@@ -46,8 +46,7 @@
       origin_(origin),
       visitor_(visitor) {
   for (const ParsedQuicVersion& version : supported_versions) {
-    QUIC_BUG_IF_V2(quic_bug_12035_1,
-                   version.handshake_protocol != PROTOCOL_TLS1_3)
+    QUIC_BUG_IF(quic_bug_12035_1, version.handshake_protocol != PROTOCOL_TLS1_3)
         << "QuicTransport requires TLS 1.3 handshake";
   }
   crypto_stream_ = std::make_unique<QuicCryptoClientStream>(
@@ -59,7 +58,7 @@
 void QuicTransportClientSession::OnAlpnSelected(absl::string_view alpn) {
   // Defense in-depth: ensure the ALPN selected is the desired one.
   if (alpn != QuicTransportAlpn()) {
-    QUIC_BUG_V2(quic_bug_10881_1)
+    QUIC_BUG(quic_bug_10881_1)
         << "QuicTransport negotiated non-QuicTransport ALPN: " << alpn;
     connection()->CloseConnection(
         QUIC_INTERNAL_ERROR, "QuicTransport negotiated non-QuicTransport ALPN",
@@ -119,7 +118,7 @@
 QuicTransportStream*
 QuicTransportClientSession::OpenOutgoingBidirectionalStream() {
   if (!CanOpenNextOutgoingBidirectionalStream()) {
-    QUIC_BUG_V2(quic_bug_10881_2)
+    QUIC_BUG(quic_bug_10881_2)
         << "Attempted to open a stream in violation of flow control";
     return nullptr;
   }
@@ -129,7 +128,7 @@
 QuicTransportStream*
 QuicTransportClientSession::OpenOutgoingUnidirectionalStream() {
   if (!CanOpenNextOutgoingUnidirectionalStream()) {
-    QUIC_BUG_V2(quic_bug_10881_3)
+    QUIC_BUG(quic_bug_10881_3)
         << "Attempted to open a stream in violation of flow control";
     return nullptr;
   }
@@ -146,7 +145,7 @@
 std::string QuicTransportClientSession::SerializeClientIndication() {
   std::string serialized_origin = origin_.Serialize();
   if (serialized_origin.size() > std::numeric_limits<uint16_t>::max()) {
-    QUIC_BUG_V2(quic_bug_10881_4) << "Client origin too long";
+    QUIC_BUG(quic_bug_10881_4) << "Client origin too long";
     connection()->CloseConnection(
         QUIC_INTERNAL_ERROR, "Client origin too long",
         ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
@@ -186,16 +185,16 @@
       writer.WriteUInt16(
           static_cast<uint16_t>(QuicTransportClientIndicationKeys::kPath)) &&
       writer.WriteUInt16(path.size()) && writer.WriteStringPiece(path);
-  QUIC_BUG_IF_V2(quic_bug_10881_5, !success)
+  QUIC_BUG_IF(quic_bug_10881_5, !success)
       << "Failed to serialize client indication";
-  QUIC_BUG_IF_V2(quic_bug_12035_2, writer.length() != buffer.length())
+  QUIC_BUG_IF(quic_bug_12035_2, writer.length() != buffer.length())
       << "Serialized client indication has length different from expected";
   return buffer;
 }
 
 void QuicTransportClientSession::SendClientIndication() {
   if (!crypto_stream_->encryption_established()) {
-    QUIC_BUG_V2(quic_bug_10881_6)
+    QUIC_BUG(quic_bug_10881_6)
         << "Client indication may only be sent once the encryption is "
            "established.";
     connection()->CloseConnection(
@@ -204,7 +203,7 @@
     return;
   }
   if (ready_) {
-    QUIC_BUG_V2(quic_bug_10881_7) << "Client indication may only be sent once.";
+    QUIC_BUG(quic_bug_10881_7) << "Client indication may only be sent once.";
     connection()->CloseConnection(
         QUIC_INTERNAL_ERROR, "Attempted to send client indication twice",
         ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
@@ -214,8 +213,8 @@
   auto client_indication_owned = std::make_unique<ClientIndication>(
       /*stream_id=*/GetNextOutgoingUnidirectionalStreamId(), this,
       /*is_static=*/false, WRITE_UNIDIRECTIONAL);
-  QUIC_BUG_IF_V2(quic_bug_12035_3,
-                 client_indication_owned->id() != ClientIndicationStream())
+  QUIC_BUG_IF(quic_bug_12035_3,
+              client_indication_owned->id() != ClientIndicationStream())
       << "Client indication stream is " << client_indication_owned->id()
       << " instead of expected " << ClientIndicationStream();
   ClientIndication* client_indication = client_indication_owned.get();
@@ -227,7 +226,7 @@
 
   // Defense in depth: never set the ready bit unless ALPN has been confirmed.
   if (!alpn_received_) {
-    QUIC_BUG_V2(quic_bug_10881_8)
+    QUIC_BUG(quic_bug_10881_8)
         << "ALPN confirmation missing after handshake complete";
     connection()->CloseConnection(
         QUIC_INTERNAL_ERROR,
diff --git a/quic/quic_transport/quic_transport_client_session.h b/quic/quic_transport/quic_transport_client_session.h
index 6406bd5..6f6d091 100644
--- a/quic/quic_transport/quic_transport_client_session.h
+++ b/quic/quic_transport/quic_transport_client_session.h
@@ -73,7 +73,7 @@
 
   QuicStream* CreateIncomingStream(QuicStreamId id) override;
   QuicStream* CreateIncomingStream(PendingStream* /*pending*/) override {
-    QUIC_BUG_V2(quic_bug_10890_1)
+    QUIC_BUG(quic_bug_10890_1)
         << "QuicTransportClientSession::CreateIncomingStream("
            "PendingStream) not implemented";
     return nullptr;
@@ -121,7 +121,7 @@
     // This method should never be called, since the stream is client-initiated
     // unidirectional.
     void OnDataAvailable() override {
-      QUIC_BUG_V2(quic_bug_10890_2) << "Received data on a write-only stream";
+      QUIC_BUG(quic_bug_10890_2) << "Received data on a write-only stream";
     }
   };
 
diff --git a/quic/quic_transport/quic_transport_server_session.cc b/quic/quic_transport/quic_transport_server_session.cc
index c945e12..f7c8c0f 100644
--- a/quic/quic_transport/quic_transport_server_session.cc
+++ b/quic/quic_transport/quic_transport_server_session.cc
@@ -50,8 +50,7 @@
                   /*num_expected_unidirectional_static_streams*/ 0),
       visitor_(visitor) {
   for (const ParsedQuicVersion& version : supported_versions) {
-    QUIC_BUG_IF_V2(quic_bug_12025_1,
-                   version.handshake_protocol != PROTOCOL_TLS1_3)
+    QUIC_BUG_IF(quic_bug_12025_1, version.handshake_protocol != PROTOCOL_TLS1_3)
         << "QuicTransport requires TLS 1.3 handshake";
   }
 
diff --git a/quic/quic_transport/quic_transport_server_session.h b/quic/quic_transport/quic_transport_server_session.h
index f7c725e..070cfdd 100644
--- a/quic/quic_transport/quic_transport_server_session.h
+++ b/quic/quic_transport/quic_transport_server_session.h
@@ -66,7 +66,7 @@
 
   QuicStream* CreateIncomingStream(QuicStreamId id) override;
   QuicStream* CreateIncomingStream(PendingStream* /*pending*/) override {
-    QUIC_BUG_V2(quic_bug_10884_1)
+    QUIC_BUG(quic_bug_10884_1)
         << "QuicTransportServerSession::CreateIncomingStream("
            "PendingStream) not implemented";
     return nullptr;
diff --git a/quic/quic_transport/quic_transport_stream.cc b/quic/quic_transport/quic_transport_stream.cc
index 9865555..5e66616 100644
--- a/quic/quic_transport/quic_transport_stream.cc
+++ b/quic/quic_transport/quic_transport_stream.cc
@@ -76,7 +76,7 @@
   // If WriteMemSlices() fails to provide that guarantee, we have no way to
   // communicate a partial write to the caller, and thus it's safer to just
   // close the connection.
-  QUIC_BUG_V2(quic_bug_10893_1)
+  QUIC_BUG(quic_bug_10893_1)
       << "WriteMemSlices() unexpectedly partially consumed the input "
          "data, provided: "
       << data.size() << ", written: " << consumed.bytes_consumed;
diff --git a/quic/quic_transport/web_transport_fingerprint_proof_verifier.cc b/quic/quic_transport/web_transport_fingerprint_proof_verifier.cc
index 42b6c19..cbe5545 100644
--- a/quic/quic_transport/web_transport_fingerprint_proof_verifier.cc
+++ b/quic/quic_transport/web_transport_fingerprint_proof_verifier.cc
@@ -125,7 +125,7 @@
   *error_details =
       "QUIC crypto certificate verification is not supported in "
       "WebTransportFingerprintProofVerifier";
-  QUIC_BUG_V2(quic_bug_10879_1) << *error_details;
+  QUIC_BUG(quic_bug_10879_1) << *error_details;
   *details = std::make_unique<Details>(Status::kInternalError);
   return QUIC_FAILURE;
 }
@@ -191,7 +191,7 @@
   const std::string fingerprint = ComputeSha256Fingerprint(der_certificate);
   for (const CertificateFingerprint& reference : fingerprints_) {
     if (reference.algorithm != CertificateFingerprint::kSha256) {
-      QUIC_BUG_V2(quic_bug_10879_2) << "Unexpected non-SHA-256 hash";
+      QUIC_BUG(quic_bug_10879_2) << "Unexpected non-SHA-256 hash";
       continue;
     }
     if (fingerprint == reference.fingerprint) {