Deprecate gfe2_reloadable_flag_quic_extend_idle_time_on_decryptable_packets.
PiperOrigin-RevId: 318089626
Change-Id: I11047925e25ae08f038a4822c0f836fa554471ee
diff --git a/quic/core/quic_connection.cc b/quic/core/quic_connection.cc
index 1272359..4a21277 100644
--- a/quic/core/quic_connection.cc
+++ b/quic/core/quic_connection.cc
@@ -1034,13 +1034,10 @@
// Address is validated by successfully processing a HANDSHAKE packet.
address_validated_ = true;
}
- if (extend_idle_time_on_decryptable_packets_) {
- QUIC_RELOADABLE_FLAG_COUNT(quic_extend_idle_time_on_decryptable_packets);
- if (use_idle_network_detector_) {
- idle_network_detector_.OnPacketReceived(time_of_last_received_packet_);
- } else {
- time_of_last_decryptable_packet_ = time_of_last_received_packet_;
- }
+ if (use_idle_network_detector_) {
+ idle_network_detector_.OnPacketReceived(time_of_last_received_packet_);
+ } else {
+ time_of_last_decryptable_packet_ = time_of_last_received_packet_;
}
visitor_->OnPacketDecrypted(level);
@@ -2135,14 +2132,9 @@
<< " too far from current time:"
<< clock_->ApproximateNow().ToDebuggingValue();
}
- if (!extend_idle_time_on_decryptable_packets_ && use_idle_network_detector_) {
- QUIC_RELOADABLE_FLAG_COUNT_N(quic_use_idle_network_detector, 1, 6);
- idle_network_detector_.OnPacketReceived(packet.receipt_time());
- } else {
- time_of_last_received_packet_ = packet.receipt_time();
- QUIC_DVLOG(1) << ENDPOINT << "time of last received packet: "
- << packet.receipt_time().ToDebuggingValue();
- }
+ time_of_last_received_packet_ = packet.receipt_time();
+ QUIC_DVLOG(1) << ENDPOINT << "time of last received packet: "
+ << packet.receipt_time().ToDebuggingValue();
ScopedPacketFlusher flusher(this);
if (!framer_.ProcessPacket(packet)) {
@@ -4816,12 +4808,9 @@
if (use_idle_network_detector_) {
return idle_network_detector_.time_of_last_received_packet();
}
- if (extend_idle_time_on_decryptable_packets_) {
- DCHECK(time_of_last_decryptable_packet_ == time_of_last_received_packet_ ||
- !last_packet_decrypted_);
- return time_of_last_decryptable_packet_;
- }
- return time_of_last_received_packet_;
+ DCHECK(time_of_last_decryptable_packet_ == time_of_last_received_packet_ ||
+ !last_packet_decrypted_);
+ return time_of_last_decryptable_packet_;
}
#undef ENDPOINT // undef for jumbo builds
diff --git a/quic/core/quic_connection.h b/quic/core/quic_connection.h
index deb5ed2..c0f722d 100644
--- a/quic/core/quic_connection.h
+++ b/quic/core/quic_connection.h
@@ -1709,9 +1709,6 @@
const bool use_idle_network_detector_ =
GetQuicReloadableFlag(quic_use_idle_network_detector);
- const bool extend_idle_time_on_decryptable_packets_ =
- GetQuicReloadableFlag(quic_extend_idle_time_on_decryptable_packets);
-
const bool update_ack_alarm_in_send_all_pending_acks_ =
GetQuicReloadableFlag(quic_update_ack_alarm_in_send_all_pending_acks);
diff --git a/quic/core/quic_connection_test.cc b/quic/core/quic_connection_test.cc
index 600c28a..7fc45ca 100644
--- a/quic/core/quic_connection_test.cc
+++ b/quic/core/quic_connection_test.cc
@@ -10943,28 +10943,14 @@
peer_framer_.SetEncrypter(ENCRYPTION_FORWARD_SECURE,
std::make_unique<TaggingEncrypter>(tag));
ProcessDataPacketAtLevel(1, !kHasStopWaiting, ENCRYPTION_FORWARD_SECURE);
- if (GetQuicReloadableFlag(quic_extend_idle_time_on_decryptable_packets)) {
- // Verify deadline does not get extended.
- EXPECT_EQ(initial_deadline, connection_.GetTimeoutAlarm()->deadline());
- }
- if (GetQuicReloadableFlag(quic_extend_idle_time_on_decryptable_packets)) {
- EXPECT_CALL(visitor_, OnConnectionClosed(_, _)).Times(1);
- } else {
- EXPECT_CALL(visitor_, OnConnectionClosed(_, _)).Times(0);
- }
+ // Verify deadline does not get extended.
+ EXPECT_EQ(initial_deadline, connection_.GetTimeoutAlarm()->deadline());
+ EXPECT_CALL(visitor_, OnConnectionClosed(_, _)).Times(1);
QuicTime::Delta delay = initial_deadline - clock_.ApproximateNow();
clock_.AdvanceTime(delay);
- if (GetQuicReloadableFlag(quic_extend_idle_time_on_decryptable_packets)) {
- connection_.GetTimeoutAlarm()->Fire();
- }
- if (GetQuicReloadableFlag(quic_extend_idle_time_on_decryptable_packets)) {
- // Verify connection gets closed.
- EXPECT_FALSE(connection_.connected());
- } else {
- // Verify the timeout alarm deadline is updated.
- EXPECT_TRUE(connection_.connected());
- EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
- }
+ connection_.GetTimeoutAlarm()->Fire();
+ // Verify connection gets closed.
+ EXPECT_FALSE(connection_.connected());
}
TEST_P(QuicConnectionTest, BundleAckWithImmediateResponse) {