| Index: net/tools/quic/end_to_end_test.cc
|
| diff --git a/net/tools/quic/end_to_end_test.cc b/net/tools/quic/end_to_end_test.cc
|
| index b9385d5085db24991baaaa4dd53aeca44b8d2c37..a8f09094b2722aac1d9b71d4a0199d53997efee9 100644
|
| --- a/net/tools/quic/end_to_end_test.cc
|
| +++ b/net/tools/quic/end_to_end_test.cc
|
| @@ -581,7 +581,7 @@ INSTANTIATE_TEST_CASE_P(EndToEndTests,
|
|
|
| TEST_P(EndToEndTest, HandshakeSuccessful) {
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| QuicCryptoStream* crypto_stream =
|
| QuicSessionPeer::GetCryptoStream(client_->client()->session());
|
| QuicStreamSequencer* sequencer = QuicStreamPeer::sequencer(crypto_stream);
|
| @@ -729,7 +729,7 @@ TEST_P(EndToEndTest, PostMissingBytes) {
|
| TEST_P(EndToEndTest, LargePostNoPacketLoss) {
|
| ASSERT_TRUE(Initialize());
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // 1 MB body.
|
| string body(1024 * 1024, 'a');
|
| @@ -750,7 +750,7 @@ TEST_P(EndToEndTest, LargePostNoPacketLoss1sRTT) {
|
| ASSERT_TRUE(Initialize());
|
| SetPacketSendDelay(QuicTime::Delta::FromMilliseconds(1000));
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // 100 KB body.
|
| string body(100 * 1024, 'a');
|
| @@ -777,7 +777,7 @@ TEST_P(EndToEndTest, LargePostWithPacketLoss) {
|
| ASSERT_TRUE(Initialize());
|
|
|
| // Wait for the server SHLO before upping the packet loss.
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| SetPacketLossPercentage(30);
|
|
|
| // 10 KB body.
|
| @@ -804,7 +804,7 @@ TEST_P(EndToEndTest, LargePostWithPacketLossAndBlockedSocket) {
|
| ASSERT_TRUE(Initialize());
|
|
|
| // Wait for the server SHLO before upping the packet loss.
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| SetPacketLossPercentage(10);
|
| client_writer_->set_fake_blocked_socket_percentage(10);
|
|
|
| @@ -823,7 +823,7 @@ TEST_P(EndToEndTest, LargePostWithPacketLossAndBlockedSocket) {
|
| TEST_P(EndToEndTest, LargePostNoPacketLossWithDelayAndReordering) {
|
| ASSERT_TRUE(Initialize());
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| // Both of these must be called when the writer is not actively used.
|
| SetPacketSendDelay(QuicTime::Delta::FromMilliseconds(2));
|
| SetReorderPercentage(30);
|
| @@ -1027,7 +1027,7 @@ TEST_P(EndToEndTest, SetInitialReceivedConnectionOptions) {
|
| initial_received_options));
|
|
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| server_thread_->WaitForCryptoHandshakeConfirmed();
|
|
|
| EXPECT_FALSE(server_config_.SetInitialReceivedConnectionOptions(
|
| @@ -1052,7 +1052,7 @@ TEST_P(EndToEndTest, LargePostSmallBandwidthLargeBuffer) {
|
| server_writer_->set_max_bandwidth_and_buffer_size(
|
| QuicBandwidth::FromBytesPerSecond(256 * 1024), 256 * 1024);
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // 1 MB body.
|
| string body(1024 * 1024, 'a');
|
| @@ -1076,7 +1076,7 @@ TEST_P(EndToEndTest, DoNotSetResumeWriteAlarmIfConnectionFlowControlBlocked) {
|
| // an infinite loop in the EpollServer, as the alarm fires and is immediately
|
| // rescheduled.
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // Ensure both stream and connection level are flow control blocked by setting
|
| // the send window offset to 0.
|
| @@ -1111,7 +1111,7 @@ TEST_P(EndToEndTest, DoNotSetResumeWriteAlarmIfConnectionFlowControlBlocked) {
|
|
|
| TEST_P(EndToEndTest, InvalidStream) {
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| string body(kMaxPacketSize, 'a');
|
| SpdyHeaderBlock headers;
|
| @@ -1133,7 +1133,7 @@ TEST_P(EndToEndTest, InvalidStream) {
|
| // to send a request with overly large headers.
|
| TEST_P(EndToEndTest, LargeHeaders) {
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| string body(kMaxPacketSize, 'a');
|
| SpdyHeaderBlock headers;
|
| @@ -1158,7 +1158,7 @@ TEST_P(EndToEndTest, LargeHeaders) {
|
|
|
| TEST_P(EndToEndTest, EarlyResponseWithQuicStreamNoError) {
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| string large_body(1024 * 1024, 'a');
|
| SpdyHeaderBlock headers;
|
| @@ -1213,7 +1213,7 @@ TEST_P(EndToEndTest, NegotiateMaxOpenStreams) {
|
| // Negotiate 1 max open stream.
|
| client_config_.SetMaxStreamsPerConnection(1, 1);
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| if (negotiated_version_ > QUIC_VERSION_34) {
|
| // Newer versions use max incoming dynamic streams.
|
| @@ -1251,7 +1251,7 @@ TEST_P(EndToEndTest, MaxIncomingDynamicStreamsLimitRespected) {
|
| server_config_.SetMaxIncomingDynamicStreamsToSend(
|
| kServerMaxIncomingDynamicStreams);
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| if (negotiated_version_ <= QUIC_VERSION_34) {
|
| // Earlier versions negotiated max open streams.
|
| @@ -1292,7 +1292,7 @@ TEST_P(EndToEndTest, SetIndependentMaxIncomingDynamicStreamsLimits) {
|
| server_config_.SetMaxIncomingDynamicStreamsToSend(
|
| kServerMaxIncomingDynamicStreams);
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| if (negotiated_version_ <= QUIC_VERSION_34) {
|
| // Earlier versions negotiated max open streams.
|
| @@ -1317,7 +1317,7 @@ TEST_P(EndToEndTest, NegotiateCongestionControl) {
|
| // static_cast here does not work.
|
| FLAGS_quic_enable_multipath = false;
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| CongestionControlType expected_congestion_control_type = kReno;
|
| switch (GetParam().congestion_control_tag) {
|
| @@ -1351,7 +1351,7 @@ TEST_P(EndToEndTest, LimitMaxOpenStreams) {
|
| client_config_.SetMaxStreamsPerConnection(10, 5);
|
|
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| if (negotiated_version_ > QUIC_VERSION_34) {
|
| // No negotiated max streams beyond version 34.
|
| return;
|
| @@ -1366,7 +1366,7 @@ TEST_P(EndToEndTest, ClientSuggestsRTT) {
|
| client_config_.SetInitialRoundTripTimeUsToSend(kInitialRTT);
|
|
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| server_thread_->WaitForCryptoHandshakeConfirmed();
|
|
|
| // Pause the server so we can access the server's internals without races.
|
| @@ -1393,7 +1393,7 @@ TEST_P(EndToEndTest, MaxInitialRTT) {
|
| kMaxInitialRoundTripTimeUs);
|
|
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| server_thread_->WaitForCryptoHandshakeConfirmed();
|
|
|
| // Pause the server so we can access the server's internals without races.
|
| @@ -1423,7 +1423,7 @@ TEST_P(EndToEndTest, MinInitialRTT) {
|
| client_config_.SetInitialRoundTripTimeUsToSend(0);
|
|
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| server_thread_->WaitForCryptoHandshakeConfirmed();
|
|
|
| // Pause the server so we can access the server's internals without races.
|
| @@ -1512,7 +1512,7 @@ TEST_P(EndToEndTest, MaxStreamsUberTest) {
|
|
|
| AddToCache("/large_response", 200, large_body);
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| SetPacketLossPercentage(10);
|
|
|
| for (int i = 0; i < max_streams; ++i) {
|
| @@ -1531,7 +1531,7 @@ TEST_P(EndToEndTest, StreamCancelErrorTest) {
|
|
|
| AddToCache("/small_response", 200, small_body);
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| QuicSession* session = client_->client()->session();
|
| // Lose the request.
|
| @@ -1659,7 +1659,7 @@ TEST_P(EndToEndTest, DifferentFlowControlWindows) {
|
| ASSERT_TRUE(Initialize());
|
|
|
| // Values are exchanged during crypto handshake, so wait for that to finish.
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| server_thread_->WaitForCryptoHandshakeConfirmed();
|
|
|
| // Open a data stream to make sure the stream level flow control is updated.
|
| @@ -1712,7 +1712,7 @@ TEST_P(EndToEndTest, HeadersAndCryptoStreamsNoConnectionFlowControl) {
|
| // Wait for crypto handshake to finish. This should have contributed to the
|
| // crypto stream flow control window, but not affected the session flow
|
| // control window.
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| server_thread_->WaitForCryptoHandshakeConfirmed();
|
|
|
| QuicCryptoStream* crypto_stream =
|
| @@ -1755,7 +1755,7 @@ TEST_P(EndToEndTest, FlowControlsSynced) {
|
|
|
| ASSERT_TRUE(Initialize());
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| server_thread_->WaitForCryptoHandshakeConfirmed();
|
|
|
| server_thread_->Pause();
|
| @@ -1855,7 +1855,7 @@ TEST_P(EndToEndTest, AckNotifierWithPacketLossAndBlockedSocket) {
|
| ASSERT_TRUE(Initialize());
|
|
|
| // Wait for the server SHLO before upping the packet loss.
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| SetPacketLossPercentage(30);
|
| client_writer_->set_fake_blocked_socket_percentage(10);
|
|
|
| @@ -1927,7 +1927,7 @@ TEST_P(EndToEndTest, ServerSendPublicReset) {
|
| TEST_P(EndToEndTest, ServerSendPublicResetWithDifferentConnectionId) {
|
| ASSERT_TRUE(Initialize());
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // Send the public reset.
|
| QuicConnectionId incorrect_connection_id =
|
| @@ -1992,7 +1992,7 @@ TEST_P(EndToEndTest, ClientSendPublicResetWithDifferentConnectionId) {
|
| TEST_P(EndToEndTest, ServerSendVersionNegotiationWithDifferentConnectionId) {
|
| ASSERT_TRUE(Initialize());
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // Send the version negotiation packet.
|
| QuicConnectionId incorrect_connection_id =
|
| @@ -2383,7 +2383,7 @@ TEST_P(EndToEndTest, EarlyResponseFinRecording) {
|
|
|
| ASSERT_TRUE(Initialize());
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // A POST that gets an early error response, after the headers are received
|
| // and before the body is received, due to invalid content-length.
|
| @@ -2437,7 +2437,7 @@ TEST_P(EndToEndTest, LargePostEarlyResponse) {
|
|
|
| ASSERT_TRUE(Initialize());
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // POST to a URL that gets an early error response, after the headers are
|
| // received and before the body is received.
|
| @@ -2467,7 +2467,7 @@ TEST_P(EndToEndTest, LargePostEarlyResponse) {
|
| TEST_P(EndToEndTest, Trailers) {
|
| // Test sending and receiving HTTP/2 Trailers (trailing HEADERS frames).
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // Set reordering to ensure that Trailers arriving before body is ok.
|
| SetPacketSendDelay(QuicTime::Delta::FromMilliseconds(2));
|
| @@ -2549,7 +2549,7 @@ INSTANTIATE_TEST_CASE_P(EndToEndTestsServerPush,
|
|
|
| TEST_P(EndToEndTestServerPush, ServerPush) {
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // Set reordering to ensure that body arriving before PUSH_PROMISE is ok.
|
| SetPacketSendDelay(QuicTime::Delta::FromMilliseconds(2));
|
| @@ -2596,7 +2596,7 @@ TEST_P(EndToEndTestServerPush, ServerPushUnderLimit) {
|
| // them with requests later.
|
| ASSERT_TRUE(Initialize());
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // Set reordering to ensure that body arriving before PUSH_PROMISE is ok.
|
| SetPacketSendDelay(QuicTime::Delta::FromMilliseconds(2));
|
| @@ -2643,7 +2643,7 @@ TEST_P(EndToEndTestServerPush, ServerPushOverLimitNonBlocking) {
|
| // streams should still work because all response streams get closed
|
| // immediately after pushing resources.
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // Set reordering to ensure that body arriving before PUSH_PROMISE is ok.
|
| SetPacketSendDelay(QuicTime::Delta::FromMilliseconds(2));
|
| @@ -2701,7 +2701,7 @@ TEST_P(EndToEndTestServerPush, ServerPushOverLimitWithBlocking) {
|
| kBodySize * kNumMaxStreams + 1024);
|
|
|
| ASSERT_TRUE(Initialize());
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| // Set reordering to ensure that body arriving before PUSH_PROMISE is ok.
|
| SetPacketSendDelay(QuicTime::Delta::FromMilliseconds(2));
|
| @@ -2814,7 +2814,7 @@ TEST_P(EndToEndTest, DISABLED_TestHugePostWithPacketLoss) {
|
| // within a short time.
|
| client_->epoll_server()->set_timeout_in_us(0);
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| SetPacketLossPercentage(1);
|
| // To avoid storing the whole request body in memory, use a loop to repeatedly
|
| // send body size of kSizeBytes until the whole request body size is reached.
|
| @@ -2871,7 +2871,7 @@ TEST_P(EndToEndTest, DISABLED_TestHugeResponseWithPacketLoss) {
|
| initialized_ = true;
|
| ASSERT_TRUE(client_->client()->connected());
|
|
|
| - client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| SetPacketLossPercentage(1);
|
| client_->SendRequest("/huge_response");
|
| client_->WaitForResponse();
|
|
|