Index: net/spdy/spdy_network_transaction_unittest.cc |
diff --git a/net/spdy/spdy_network_transaction_unittest.cc b/net/spdy/spdy_network_transaction_unittest.cc |
index de58732685047dde64844ed7a6cb3c6ed75ed8b8..1c41254df860030bdbc8f1838d93e1e5e981630b 100644 |
--- a/net/spdy/spdy_network_transaction_unittest.cc |
+++ b/net/spdy/spdy_network_transaction_unittest.cc |
@@ -3,6 +3,7 @@ |
// found in the LICENSE file. |
#include <string> |
+#include <utility> |
#include <vector> |
#include "base/bind.h" |
@@ -123,8 +124,8 @@ scoped_ptr<SpdySessionDependencies> CreateSpdySessionDependencies( |
scoped_ptr<SpdySessionDependencies> CreateSpdySessionDependencies( |
SpdyNetworkTransactionTestParams test_params, |
scoped_ptr<ProxyService> proxy_service) { |
- scoped_ptr<SpdySessionDependencies> session_deps( |
- new SpdySessionDependencies(test_params.protocol, proxy_service.Pass())); |
+ scoped_ptr<SpdySessionDependencies> session_deps(new SpdySessionDependencies( |
+ test_params.protocol, std::move(proxy_service))); |
UpdateSpdySessionDependencies(test_params, session_deps.get()); |
return session_deps; |
} |
@@ -176,7 +177,7 @@ class SpdyNetworkTransactionTest |
priority_(priority), |
session_deps_(session_deps.get() == NULL |
? CreateSpdySessionDependencies(test_params) |
- : session_deps.Pass()), |
+ : std::move(session_deps)), |
session_( |
SpdySessionDependencies::SpdyCreateSession(session_deps_.get())), |
log_(log), |
@@ -306,7 +307,7 @@ class SpdyNetworkTransactionTest |
SocketDataProvider* data, |
scoped_ptr<SSLSocketDataProvider> ssl_provider) { |
RunPreTestSetup(); |
- AddDataWithSSLSocketDataProvider(data, ssl_provider.Pass()); |
+ AddDataWithSSLSocketDataProvider(data, std::move(ssl_provider)); |
RunDefaultTest(); |
VerifyDataConsumed(); |
} |
@@ -316,7 +317,7 @@ class SpdyNetworkTransactionTest |
new SSLSocketDataProvider(ASYNC, OK)); |
ssl_provider->cert = |
ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
- AddDataWithSSLSocketDataProvider(data, ssl_provider.Pass()); |
+ AddDataWithSSLSocketDataProvider(data, std::move(ssl_provider)); |
} |
void AddDataWithSSLSocketDataProvider( |
@@ -345,7 +346,7 @@ class SpdyNetworkTransactionTest |
} |
void SetSession(scoped_ptr<HttpNetworkSession> session) { |
- session_ = session.Pass(); |
+ session_ = std::move(session); |
} |
HttpNetworkTransaction* trans() { return trans_.get(); } |
void ResetTrans() { trans_.reset(); } |
@@ -2976,7 +2977,7 @@ TEST_P(SpdyNetworkTransactionTest, ServerPushNoURL) { |
(*incomplete_headers)[spdy_util_.GetVersionKey()] = "HTTP/1.1"; |
(*incomplete_headers)["hello"] = "bye"; |
scoped_ptr<SpdyFrame> stream2_syn(spdy_util_.ConstructInitialSpdyPushFrame( |
- incomplete_headers.Pass(), 2, 1)); |
+ std::move(incomplete_headers), 2, 1)); |
MockRead reads[] = { |
CreateMockRead(*stream1_reply, 1), |
CreateMockRead(*stream2_syn, 2), |
@@ -3487,7 +3488,7 @@ TEST_P(SpdyNetworkTransactionTest, DecompressFailureOnSynReply) { |
session_deps->enable_compression = true; |
NormalSpdyTransactionHelper helper(CreateGetRequest(), DEFAULT_PRIORITY, |
BoundNetLog(), GetParam(), |
- session_deps.Pass()); |
+ std::move(session_deps)); |
helper.RunToCompletion(&data); |
TransactionHelperResult out = helper.output(); |
EXPECT_EQ(ERR_SPDY_COMPRESSION_ERROR, out.rv); |
@@ -4056,7 +4057,7 @@ TEST_P(SpdyNetworkTransactionTest, SettingsSaved) { |
(*reply_headers)[spdy_util_.GetStatusKey()] = "200"; |
(*reply_headers)[spdy_util_.GetVersionKey()] = "HTTP/1.1"; |
scoped_ptr<SpdyFrame> reply( |
- spdy_util_.ConstructSpdyFrame(kSynReplyInfo, reply_headers.Pass())); |
+ spdy_util_.ConstructSpdyFrame(kSynReplyInfo, std::move(reply_headers))); |
const SpdySettingsIds kSampleId1 = SETTINGS_UPLOAD_BANDWIDTH; |
unsigned int kSampleValue1 = 0x0a0a0a0a; |
@@ -4207,7 +4208,7 @@ TEST_P(SpdyNetworkTransactionTest, SettingsPlayback) { |
(*reply_headers)[spdy_util_.GetStatusKey()] = "200"; |
(*reply_headers)[spdy_util_.GetVersionKey()] = "HTTP/1.1"; |
scoped_ptr<SpdyFrame> reply( |
- spdy_util_.ConstructSpdyFrame(kSynReplyInfo, reply_headers.Pass())); |
+ spdy_util_.ConstructSpdyFrame(kSynReplyInfo, std::move(reply_headers))); |
scoped_ptr<SpdyFrame> body(spdy_util_.ConstructSpdyBodyFrame(1, true)); |
MockRead reads[] = { |
@@ -4344,7 +4345,7 @@ TEST_P(SpdyNetworkTransactionTest, HTTP11RequiredRetry) { |
// Do not force SPDY so that second socket can negotiate HTTP/1.1. |
session_deps->next_protos = SpdyNextProtos(); |
NormalSpdyTransactionHelper helper(request, DEFAULT_PRIORITY, BoundNetLog(), |
- GetParam(), session_deps.Pass()); |
+ GetParam(), std::move(session_deps)); |
// First socket: HTTP/2 request rejected with HTTP_1_1_REQUIRED. |
const char* url = request.url.spec().c_str(); |
@@ -4366,7 +4367,7 @@ TEST_P(SpdyNetworkTransactionTest, HTTP11RequiredRetry) { |
ssl_provider0->next_protos_expected_in_ssl_config.push_back(kProtoHTTP2); |
// Force SPDY. |
ssl_provider0->SetNextProto(GetParam().protocol); |
- helper.AddDataWithSSLSocketDataProvider(&data0, ssl_provider0.Pass()); |
+ helper.AddDataWithSSLSocketDataProvider(&data0, std::move(ssl_provider0)); |
// Second socket: falling back to HTTP/1.1. |
MockWrite writes1[] = {MockWrite(ASYNC, 0, |
@@ -4386,7 +4387,7 @@ TEST_P(SpdyNetworkTransactionTest, HTTP11RequiredRetry) { |
ssl_provider1->next_protos_expected_in_ssl_config.push_back(kProtoHTTP11); |
// Force HTTP/1.1. |
ssl_provider1->SetNextProto(kProtoHTTP11); |
- helper.AddDataWithSSLSocketDataProvider(&data1, ssl_provider1.Pass()); |
+ helper.AddDataWithSSLSocketDataProvider(&data1, std::move(ssl_provider1)); |
base::WeakPtr<HttpServerProperties> http_server_properties = |
helper.session()->spdy_session_pool()->http_server_properties(); |
@@ -4436,7 +4437,7 @@ TEST_P(SpdyNetworkTransactionTest, HTTP11RequiredProxyRetry) { |
// Do not force SPDY so that second socket can negotiate HTTP/1.1. |
session_deps->next_protos = SpdyNextProtos(); |
NormalSpdyTransactionHelper helper(request, DEFAULT_PRIORITY, BoundNetLog(), |
- GetParam(), session_deps.Pass()); |
+ GetParam(), std::move(session_deps)); |
// First socket: HTTP/2 CONNECT rejected with HTTP_1_1_REQUIRED. |
scoped_ptr<SpdyFrame> req(spdy_util_.ConstructSpdyConnect( |
@@ -4456,7 +4457,7 @@ TEST_P(SpdyNetworkTransactionTest, HTTP11RequiredProxyRetry) { |
ssl_provider0->next_protos_expected_in_ssl_config.push_back(kProtoHTTP2); |
// Force SPDY. |
ssl_provider0->SetNextProto(GetParam().protocol); |
- helper.AddDataWithSSLSocketDataProvider(&data0, ssl_provider0.Pass()); |
+ helper.AddDataWithSSLSocketDataProvider(&data0, std::move(ssl_provider0)); |
// Second socket: retry using HTTP/1.1. |
MockWrite writes1[] = { |
@@ -4486,7 +4487,7 @@ TEST_P(SpdyNetworkTransactionTest, HTTP11RequiredProxyRetry) { |
ssl_provider1->next_protos_expected_in_ssl_config.push_back(kProtoHTTP11); |
// Force HTTP/1.1. |
ssl_provider1->SetNextProto(kProtoHTTP11); |
- helper.AddDataWithSSLSocketDataProvider(&data1, ssl_provider1.Pass()); |
+ helper.AddDataWithSSLSocketDataProvider(&data1, std::move(ssl_provider1)); |
// A third socket is needed for the tunnelled connection. |
scoped_ptr<SSLSocketDataProvider> ssl_provider2( |
@@ -4691,7 +4692,7 @@ TEST_P(SpdyNetworkTransactionTest, DirectConnectProxyReconnect) { |
ProxyService::CreateFixedFromPacResult("PROXY myproxy:70")); |
session_peer.SetProxyService(proxy_service.get()); |
helper_proxy.session_deps().swap(ssd_proxy); |
- helper_proxy.SetSession(session_proxy.Pass()); |
+ helper_proxy.SetSession(std::move(session_proxy)); |
helper_proxy.RunPreTestSetup(); |
helper_proxy.AddData(data_proxy.get()); |
@@ -4963,21 +4964,16 @@ TEST_P(SpdyNetworkTransactionTest, ServerPushWithHeaders) { |
scoped_ptr<SpdyHeaderBlock> initial_headers(new SpdyHeaderBlock()); |
spdy_util_.AddUrlToHeaderBlock(GetDefaultUrlWithPath("/foo.dat"), |
initial_headers.get()); |
- scoped_ptr<SpdyFrame> stream2_syn( |
- spdy_util_.ConstructInitialSpdyPushFrame(initial_headers.Pass(), 2, 1)); |
+ scoped_ptr<SpdyFrame> stream2_syn(spdy_util_.ConstructInitialSpdyPushFrame( |
+ std::move(initial_headers), 2, 1)); |
scoped_ptr<SpdyHeaderBlock> late_headers(new SpdyHeaderBlock()); |
(*late_headers)[spdy_util_.GetStatusKey()] = "200"; |
(*late_headers)[spdy_util_.GetVersionKey()] = "HTTP/1.1"; |
(*late_headers)["hello"] = "bye"; |
- scoped_ptr<SpdyFrame> stream2_headers( |
- spdy_util_.ConstructSpdyControlFrame(late_headers.Pass(), |
- false, |
- 2, |
- LOWEST, |
- HEADERS, |
- CONTROL_FLAG_NONE, |
- 0)); |
+ scoped_ptr<SpdyFrame> stream2_headers(spdy_util_.ConstructSpdyControlFrame( |
+ std::move(late_headers), false, 2, LOWEST, HEADERS, CONTROL_FLAG_NONE, |
+ 0)); |
scoped_ptr<SpdyFrame> |
stream1_reply(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
@@ -5025,21 +5021,16 @@ TEST_P(SpdyNetworkTransactionTest, ServerPushClaimBeforeHeaders) { |
scoped_ptr<SpdyHeaderBlock> initial_headers(new SpdyHeaderBlock()); |
spdy_util_.AddUrlToHeaderBlock(GetDefaultUrlWithPath("/foo.dat"), |
initial_headers.get()); |
- scoped_ptr<SpdyFrame> stream2_syn( |
- spdy_util_.ConstructInitialSpdyPushFrame(initial_headers.Pass(), 2, 1)); |
+ scoped_ptr<SpdyFrame> stream2_syn(spdy_util_.ConstructInitialSpdyPushFrame( |
+ std::move(initial_headers), 2, 1)); |
scoped_ptr<SpdyHeaderBlock> late_headers(new SpdyHeaderBlock()); |
(*late_headers)[spdy_util_.GetStatusKey()] = "200"; |
(*late_headers)[spdy_util_.GetVersionKey()] = "HTTP/1.1"; |
(*late_headers)["hello"] = "bye"; |
- scoped_ptr<SpdyFrame> stream2_headers( |
- spdy_util_.ConstructSpdyControlFrame(late_headers.Pass(), |
- false, |
- 2, |
- LOWEST, |
- HEADERS, |
- CONTROL_FLAG_NONE, |
- 0)); |
+ scoped_ptr<SpdyFrame> stream2_headers(spdy_util_.ConstructSpdyControlFrame( |
+ std::move(late_headers), false, 2, LOWEST, HEADERS, CONTROL_FLAG_NONE, |
+ 0)); |
scoped_ptr<SpdyFrame> |
stream1_reply(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
@@ -5144,19 +5135,14 @@ TEST_P(SpdyNetworkTransactionTest, ServerPushWithTwoHeaderFrames) { |
} |
spdy_util_.AddUrlToHeaderBlock(GetDefaultUrlWithPath("/foo.dat"), |
initial_headers.get()); |
- scoped_ptr<SpdyFrame> stream2_syn( |
- spdy_util_.ConstructInitialSpdyPushFrame(initial_headers.Pass(), 2, 1)); |
+ scoped_ptr<SpdyFrame> stream2_syn(spdy_util_.ConstructInitialSpdyPushFrame( |
+ std::move(initial_headers), 2, 1)); |
scoped_ptr<SpdyHeaderBlock> middle_headers(new SpdyHeaderBlock()); |
(*middle_headers)["hello"] = "bye"; |
- scoped_ptr<SpdyFrame> stream2_headers1( |
- spdy_util_.ConstructSpdyControlFrame(middle_headers.Pass(), |
- false, |
- 2, |
- LOWEST, |
- HEADERS, |
- CONTROL_FLAG_NONE, |
- 0)); |
+ scoped_ptr<SpdyFrame> stream2_headers1(spdy_util_.ConstructSpdyControlFrame( |
+ std::move(middle_headers), false, 2, LOWEST, HEADERS, CONTROL_FLAG_NONE, |
+ 0)); |
scoped_ptr<SpdyHeaderBlock> late_headers(new SpdyHeaderBlock()); |
(*late_headers)[spdy_util_.GetStatusKey()] = "200"; |
@@ -5164,14 +5150,9 @@ TEST_P(SpdyNetworkTransactionTest, ServerPushWithTwoHeaderFrames) { |
// HTTP/2 eliminates use of the :version header. |
(*late_headers)[spdy_util_.GetVersionKey()] = "HTTP/1.1"; |
} |
- scoped_ptr<SpdyFrame> stream2_headers2( |
- spdy_util_.ConstructSpdyControlFrame(late_headers.Pass(), |
- false, |
- 2, |
- LOWEST, |
- HEADERS, |
- CONTROL_FLAG_NONE, |
- 0)); |
+ scoped_ptr<SpdyFrame> stream2_headers2(spdy_util_.ConstructSpdyControlFrame( |
+ std::move(late_headers), false, 2, LOWEST, HEADERS, CONTROL_FLAG_NONE, |
+ 0)); |
scoped_ptr<SpdyFrame> |
stream1_reply(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
@@ -5280,19 +5261,14 @@ TEST_P(SpdyNetworkTransactionTest, ServerPushWithNoStatusHeaderFrames) { |
scoped_ptr<SpdyHeaderBlock> initial_headers(new SpdyHeaderBlock()); |
spdy_util_.AddUrlToHeaderBlock(GetDefaultUrlWithPath("/foo.dat"), |
initial_headers.get()); |
- scoped_ptr<SpdyFrame> stream2_syn( |
- spdy_util_.ConstructInitialSpdyPushFrame(initial_headers.Pass(), 2, 1)); |
+ scoped_ptr<SpdyFrame> stream2_syn(spdy_util_.ConstructInitialSpdyPushFrame( |
+ std::move(initial_headers), 2, 1)); |
scoped_ptr<SpdyHeaderBlock> middle_headers(new SpdyHeaderBlock()); |
(*middle_headers)["hello"] = "bye"; |
- scoped_ptr<SpdyFrame> stream2_headers1( |
- spdy_util_.ConstructSpdyControlFrame(middle_headers.Pass(), |
- false, |
- 2, |
- LOWEST, |
- HEADERS, |
- CONTROL_FLAG_NONE, |
- 0)); |
+ scoped_ptr<SpdyFrame> stream2_headers1(spdy_util_.ConstructSpdyControlFrame( |
+ std::move(middle_headers), false, 2, LOWEST, HEADERS, CONTROL_FLAG_NONE, |
+ 0)); |
scoped_ptr<SpdyFrame> |
stream1_reply(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
@@ -5382,14 +5358,9 @@ TEST_P(SpdyNetworkTransactionTest, SynReplyWithHeaders) { |
scoped_ptr<SpdyHeaderBlock> late_headers(new SpdyHeaderBlock()); |
(*late_headers)["hello"] = "bye"; |
- scoped_ptr<SpdyFrame> stream1_headers( |
- spdy_util_.ConstructSpdyControlFrame(late_headers.Pass(), |
- false, |
- 1, |
- LOWEST, |
- HEADERS, |
- CONTROL_FLAG_NONE, |
- 0)); |
+ scoped_ptr<SpdyFrame> stream1_headers(spdy_util_.ConstructSpdyControlFrame( |
+ std::move(late_headers), false, 1, LOWEST, HEADERS, CONTROL_FLAG_NONE, |
+ 0)); |
scoped_ptr<SpdyFrame> stream1_body( |
spdy_util_.ConstructSpdyBodyFrame(1, true)); |
MockRead reads[] = { |
@@ -5424,14 +5395,9 @@ TEST_P(SpdyNetworkTransactionTest, SyncReplyDataAfterTrailers) { |
scoped_ptr<SpdyHeaderBlock> late_headers(new SpdyHeaderBlock()); |
(*late_headers)["hello"] = "bye"; |
- scoped_ptr<SpdyFrame> stream1_headers( |
- spdy_util_.ConstructSpdyControlFrame(late_headers.Pass(), |
- false, |
- 1, |
- LOWEST, |
- HEADERS, |
- CONTROL_FLAG_NONE, |
- 0)); |
+ scoped_ptr<SpdyFrame> stream1_headers(spdy_util_.ConstructSpdyControlFrame( |
+ std::move(late_headers), false, 1, LOWEST, HEADERS, CONTROL_FLAG_NONE, |
+ 0)); |
scoped_ptr<SpdyFrame> stream1_body( |
spdy_util_.ConstructSpdyBodyFrame(1, false)); |
scoped_ptr<SpdyFrame> stream1_body2( |
@@ -5532,7 +5498,7 @@ TEST_P(SpdyNetworkTransactionTest, ServerPushCrossOriginCorrectness) { |
CreateSpdySessionDependencies(GetParam())); |
session_deps->trusted_spdy_proxy = "123.45.67.89:8080"; |
NormalSpdyTransactionHelper helper(request, DEFAULT_PRIORITY, BoundNetLog(), |
- GetParam(), session_deps.Pass()); |
+ GetParam(), std::move(session_deps)); |
helper.RunPreTestSetup(); |
helper.AddData(&data); |
@@ -6390,7 +6356,7 @@ TEST_P(SpdyNetworkTransactionTest, GoAwayOnOddPushStreamId) { |
spdy_util_.AddUrlToHeaderBlock("http://www.example.org/a.dat", |
push_headers.get()); |
scoped_ptr<SpdyFrame> push( |
- spdy_util_.ConstructInitialSpdyPushFrame(push_headers.Pass(), 3, 1)); |
+ spdy_util_.ConstructInitialSpdyPushFrame(std::move(push_headers), 3, 1)); |
MockRead reads[] = {CreateMockRead(*push, 1)}; |
scoped_ptr<SpdyFrame> req( |
@@ -6419,8 +6385,8 @@ TEST_P(SpdyNetworkTransactionTest, |
scoped_ptr<SpdyHeaderBlock> push_b_headers(new SpdyHeaderBlock); |
spdy_util_.AddUrlToHeaderBlock(GetDefaultUrlWithPath("/b.dat"), |
push_b_headers.get()); |
- scoped_ptr<SpdyFrame> push_b( |
- spdy_util_.ConstructInitialSpdyPushFrame(push_b_headers.Pass(), 2, 1)); |
+ scoped_ptr<SpdyFrame> push_b(spdy_util_.ConstructInitialSpdyPushFrame( |
+ std::move(push_b_headers), 2, 1)); |
MockRead reads[] = { |
CreateMockRead(*push_a, 1), CreateMockRead(*push_b, 2), |
}; |
@@ -6507,7 +6473,7 @@ class SpdyNetworkTransactionNoTLSUsageCheckTest |
request.url = GURL("https://www.example.org/"); |
NormalSpdyTransactionHelper helper( |
request, DEFAULT_PRIORITY, BoundNetLog(), GetParam(), NULL); |
- helper.RunToCompletionWithSSLData(&data, ssl_provider.Pass()); |
+ helper.RunToCompletionWithSSLData(&data, std::move(ssl_provider)); |
TransactionHelperResult out = helper.output(); |
EXPECT_EQ(OK, out.rv); |
EXPECT_EQ("HTTP/1.1 200", out.status_line); |
@@ -6534,7 +6500,7 @@ TEST_P(SpdyNetworkTransactionNoTLSUsageCheckTest, TLSVersionTooOld) { |
SSLConnectionStatusSetVersion(SSL_CONNECTION_VERSION_SSL3, |
&ssl_provider->connection_status); |
- RunNoTLSUsageCheckTest(ssl_provider.Pass()); |
+ RunNoTLSUsageCheckTest(std::move(ssl_provider)); |
} |
TEST_P(SpdyNetworkTransactionNoTLSUsageCheckTest, TLSCipherSuiteSucky) { |
@@ -6543,7 +6509,7 @@ TEST_P(SpdyNetworkTransactionNoTLSUsageCheckTest, TLSCipherSuiteSucky) { |
// Set to TLS_RSA_WITH_NULL_MD5 |
SSLConnectionStatusSetCipherSuite(0x1, &ssl_provider->connection_status); |
- RunNoTLSUsageCheckTest(ssl_provider.Pass()); |
+ RunNoTLSUsageCheckTest(std::move(ssl_provider)); |
} |
class SpdyNetworkTransactionTLSUsageCheckTest |
@@ -6560,7 +6526,7 @@ class SpdyNetworkTransactionTLSUsageCheckTest |
request.url = GURL("https://www.example.org/"); |
NormalSpdyTransactionHelper helper( |
request, DEFAULT_PRIORITY, BoundNetLog(), GetParam(), NULL); |
- helper.RunToCompletionWithSSLData(&data, ssl_provider.Pass()); |
+ helper.RunToCompletionWithSSLData(&data, std::move(ssl_provider)); |
TransactionHelperResult out = helper.output(); |
EXPECT_EQ(ERR_SPDY_INADEQUATE_TRANSPORT_SECURITY, out.rv); |
} |
@@ -6582,7 +6548,7 @@ TEST_P(SpdyNetworkTransactionTLSUsageCheckTest, TLSVersionTooOld) { |
SSLConnectionStatusSetVersion(SSL_CONNECTION_VERSION_SSL3, |
&ssl_provider->connection_status); |
- RunTLSUsageCheckTest(ssl_provider.Pass()); |
+ RunTLSUsageCheckTest(std::move(ssl_provider)); |
} |
TEST_P(SpdyNetworkTransactionTLSUsageCheckTest, TLSCipherSuiteSucky) { |
@@ -6591,7 +6557,7 @@ TEST_P(SpdyNetworkTransactionTLSUsageCheckTest, TLSCipherSuiteSucky) { |
// Set to TLS_RSA_WITH_NULL_MD5 |
SSLConnectionStatusSetCipherSuite(0x1, &ssl_provider->connection_status); |
- RunTLSUsageCheckTest(ssl_provider.Pass()); |
+ RunTLSUsageCheckTest(std::move(ssl_provider)); |
} |
} // namespace net |