Index: net/tools/quic/quic_server_session_test.cc |
diff --git a/net/tools/quic/quic_server_session_test.cc b/net/tools/quic/quic_server_session_test.cc |
index 57058276e5d07f1da1d81fc207cdebaa4c380a7f..2b1b9610d80827eaed3aa0f46712e3589a980f3f 100644 |
--- a/net/tools/quic/quic_server_session_test.cc |
+++ b/net/tools/quic/quic_server_session_test.cc |
@@ -54,9 +54,9 @@ namespace test { |
class QuicServerSessionPeer { |
public: |
- static ReliableQuicStream* GetIncomingDynamicStream(QuicServerSession* s, |
+ static ReliableQuicStream* GetOrCreateDynamicStream(QuicServerSession* s, |
QuicStreamId id) { |
- return s->GetIncomingDynamicStream(id); |
+ return s->GetOrCreateDynamicStream(id); |
} |
static void SetCryptoStream(QuicServerSession* s, |
QuicCryptoServerStream* crypto_stream) { |
@@ -213,14 +213,14 @@ TEST_P(QuicServerSessionTest, MaxOpenStreams) { |
QuicStreamId stream_id = kClientDataStreamId1; |
// Open the max configured number of streams, should be no problem. |
for (size_t i = 0; i < kMaxStreamsForTest; ++i) { |
- EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDynamicStream(session_.get(), |
+ EXPECT_TRUE(QuicServerSessionPeer::GetOrCreateDynamicStream(session_.get(), |
stream_id)); |
stream_id += 2; |
} |
// Open more streams: server should accept slightly more than the limit. |
for (size_t i = 0; i < kMaxStreamsMinimumIncrement; ++i) { |
- EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDynamicStream(session_.get(), |
+ EXPECT_TRUE(QuicServerSessionPeer::GetOrCreateDynamicStream(session_.get(), |
stream_id)); |
stream_id += 2; |
} |
@@ -235,7 +235,7 @@ TEST_P(QuicServerSessionTest, MaxOpenStreams) { |
EXPECT_CALL(*connection_, SendRstStream(stream_id, QUIC_REFUSED_STREAM, 0)); |
} |
// Even if the connection remains open, the stream creation should fail. |
- EXPECT_FALSE(QuicServerSessionPeer::GetIncomingDynamicStream(session_.get(), |
+ EXPECT_FALSE(QuicServerSessionPeer::GetOrCreateDynamicStream(session_.get(), |
stream_id)); |
} |
@@ -255,7 +255,7 @@ TEST_P(QuicServerSessionTest, MaxAvailableStreams) { |
EXPECT_LE(10 * kMaxStreamsForTest, kAvailableStreamLimit); |
EXPECT_EQ(0u, session_->GetNumOpenStreams()); |
- EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDynamicStream( |
+ EXPECT_TRUE(QuicServerSessionPeer::GetOrCreateDynamicStream( |
session_.get(), kClientDataStreamId1)); |
// Establish available streams up to the server's limit. |
@@ -263,7 +263,7 @@ TEST_P(QuicServerSessionTest, MaxAvailableStreams) { |
FLAGS_allow_many_available_streams |
? kClientDataStreamId1 + (kAvailableStreamLimit)*2 + 2 |
: kClientDataStreamId1 + (session_->get_max_open_streams() - 1) * 2; |
- EXPECT_TRUE(QuicServerSessionPeer::GetIncomingDynamicStream( |
+ EXPECT_TRUE(QuicServerSessionPeer::GetOrCreateDynamicStream( |
session_.get(), kLimitingStreamId)); |
// A further available stream will result in connection close. |
@@ -275,7 +275,7 @@ TEST_P(QuicServerSessionTest, MaxAvailableStreams) { |
} |
// This forces stream kLimitingStreamId + 2 to become available, which |
// violates the quota. |
- EXPECT_FALSE(QuicServerSessionPeer::GetIncomingDynamicStream( |
+ EXPECT_FALSE(QuicServerSessionPeer::GetOrCreateDynamicStream( |
session_.get(), kLimitingStreamId + 4)); |
} |
@@ -283,14 +283,14 @@ TEST_P(QuicServerSessionTest, GetEvenIncomingError) { |
// Incoming streams on the server session must be odd. |
EXPECT_CALL(*connection_, SendConnectionClose(QUIC_INVALID_STREAM_ID)); |
EXPECT_EQ(nullptr, |
- QuicServerSessionPeer::GetIncomingDynamicStream(session_.get(), 4)); |
+ QuicServerSessionPeer::GetOrCreateDynamicStream(session_.get(), 4)); |
} |
TEST_P(QuicServerSessionTest, GetStreamDisconnected) { |
// Don't create new streams if the connection is disconnected. |
QuicConnectionPeer::CloseConnection(connection_); |
EXPECT_DFATAL( |
- QuicServerSessionPeer::GetIncomingDynamicStream(session_.get(), 5), |
+ QuicServerSessionPeer::GetOrCreateDynamicStream(session_.get(), 5), |
"ShouldCreateIncomingDynamicStream called when disconnected"); |
} |
@@ -307,7 +307,7 @@ TEST_P(QuicServerSessionTest, SetFecProtectionFromConfig) { |
// optionally protected. |
EXPECT_EQ(FEC_PROTECT_ALWAYS, QuicSpdySessionPeer::GetHeadersStream( |
session_.get())->fec_policy()); |
- ReliableQuicStream* stream = QuicServerSessionPeer::GetIncomingDynamicStream( |
+ ReliableQuicStream* stream = QuicServerSessionPeer::GetOrCreateDynamicStream( |
session_.get(), kClientDataStreamId1); |
ASSERT_TRUE(stream); |
EXPECT_EQ(FEC_PROTECT_OPTIONAL, stream->fec_policy()); |