| Index: net/quic/quic_session_test.cc
|
| diff --git a/net/quic/quic_session_test.cc b/net/quic/quic_session_test.cc
|
| index 77a9e89e623666e2eb4d85318dc549d987f3b1ad..c248460522124797b55d75a34aac38b22c7a963d 100644
|
| --- a/net/quic/quic_session_test.cc
|
| +++ b/net/quic/quic_session_test.cc
|
| @@ -739,7 +739,7 @@ TEST_P(QuicSessionTest, HandshakeUnblocksFlowControlBlockedHeadersStream) {
|
| headers_stream->WriteHeaders(stream_id, headers, true, nullptr);
|
| stream_id += 2;
|
| }
|
| - // Write one more to ensure that the headers stream has buffered data. The
|
| + // Write once more to ensure that the headers stream has buffered data. The
|
| // random headers may have exactly filled the flow control window.
|
| headers_stream->WriteHeaders(stream_id, headers, true, nullptr);
|
| EXPECT_TRUE(headers_stream->HasBufferedData());
|
| @@ -998,9 +998,6 @@ TEST_P(QuicSessionTest, WindowUpdateUnblocksHeadersStream) {
|
| TEST_P(QuicSessionTest, TooManyUnfinishedStreamsCauseConnectionClose) {
|
| // If a buggy/malicious peer creates too many streams that are not ended with
|
| // a FIN or RST then we send a connection close.
|
| - ValueRestore<bool> old_flag(&FLAGS_close_quic_connection_unfinished_streams_2,
|
| - true);
|
| -
|
| EXPECT_CALL(*connection_,
|
| SendConnectionClose(QUIC_TOO_MANY_UNFINISHED_STREAMS)).Times(1);
|
|
|
|
|