Deprecate gfe2_reloadable_flag_quic_bundle_crypto_data_with_initial_ack.

PiperOrigin-RevId: 319781953
Change-Id: Iccb28774a778ab2b9c57be5c9b2e8e5ca65cb3ed
diff --git a/quic/core/quic_connection.cc b/quic/core/quic_connection.cc
index 3263eb9..6d6c93a 100644
--- a/quic/core/quic_connection.cc
+++ b/quic/core/quic_connection.cc
@@ -4234,19 +4234,15 @@
   QuicTime earliest_ack_timeout =
       uber_received_packet_manager_.GetEarliestAckTimeout();
   QUIC_BUG_IF(!earliest_ack_timeout.IsInitialized());
-  if (GetQuicReloadableFlag(quic_bundle_crypto_data_with_initial_ack)) {
-    // On the server side, sends INITIAL data with INITIAL ACK. On the client
-    // side, sends HANDSHAKE data (containing client Finished) with HANDSHAKE
-    // ACK.
-    PacketNumberSpace space =
-        perspective() == Perspective::IS_SERVER ? INITIAL_DATA : HANDSHAKE_DATA;
-    MaybeBundleCryptoDataWithAckOfSpace(space);
-    earliest_ack_timeout =
-        uber_received_packet_manager_.GetEarliestAckTimeout();
-    if (!earliest_ack_timeout.IsInitialized()) {
-      QUIC_RELOADABLE_FLAG_COUNT(quic_bundle_crypto_data_with_initial_ack);
-      return;
-    }
+  // On the server side, sends INITIAL data with INITIAL ACK. On the client
+  // side, sends HANDSHAKE data (containing client Finished) with HANDSHAKE
+  // ACK.
+  PacketNumberSpace space =
+      perspective() == Perspective::IS_SERVER ? INITIAL_DATA : HANDSHAKE_DATA;
+  MaybeBundleCryptoDataWithAckOfSpace(space);
+  earliest_ack_timeout = uber_received_packet_manager_.GetEarliestAckTimeout();
+  if (!earliest_ack_timeout.IsInitialized()) {
+    return;
   }
   // Latches current encryption level.
   const EncryptionLevel current_encryption_level = encryption_level_;
diff --git a/quic/core/quic_connection_test.cc b/quic/core/quic_connection_test.cc
index ace423a..b9f1fc5 100644
--- a/quic/core/quic_connection_test.cc
+++ b/quic/core/quic_connection_test.cc
@@ -11256,18 +11256,11 @@
   // Receives packet 1002 in initial data.
   ProcessCryptoPacketAtLevel(1002, ENCRYPTION_INITIAL);
   EXPECT_FALSE(writer_->ack_frames().empty());
-  if (GetQuicReloadableFlag(quic_bundle_crypto_data_with_initial_ack)) {
-    // Verify CRYPTO frame is bundled with INITIAL ACK.
-    EXPECT_FALSE(writer_->crypto_frames().empty());
-    // Verify PTO time changes.
-    EXPECT_NE(expected_pto_time,
-              connection_.sent_packet_manager().GetRetransmissionTime());
-  } else {
-    EXPECT_TRUE(writer_->crypto_frames().empty());
-    // Verify PTO time does not change.
-    EXPECT_EQ(expected_pto_time,
-              connection_.sent_packet_manager().GetRetransmissionTime());
-  }
+  // Verify CRYPTO frame is bundled with INITIAL ACK.
+  EXPECT_FALSE(writer_->crypto_frames().empty());
+  // Verify PTO time changes.
+  EXPECT_NE(expected_pto_time,
+            connection_.sent_packet_manager().GetRetransmissionTime());
 }
 
 TEST_P(QuicConnectionTest, ClientBundlesHandshakeDataWithHandshakeAck) {
@@ -11300,12 +11293,8 @@
   // Receives packet 1002 in handshake data.
   ProcessCryptoPacketAtLevel(1002, ENCRYPTION_HANDSHAKE);
   EXPECT_FALSE(writer_->ack_frames().empty());
-  if (GetQuicReloadableFlag(quic_bundle_crypto_data_with_initial_ack)) {
-    // Verify CRYPTO frame is bundled with HANDSHAKE ACK.
-    EXPECT_FALSE(writer_->crypto_frames().empty());
-  } else {
-    EXPECT_TRUE(writer_->crypto_frames().empty());
-  }
+  // Verify CRYPTO frame is bundled with HANDSHAKE ACK.
+  EXPECT_FALSE(writer_->crypto_frames().empty());
 }
 
 // Regresstion test for b/156232673.