Index: net/socket/socket_bio_adapter_unittest.cc |
diff --git a/net/socket/socket_bio_adapter_unittest.cc b/net/socket/socket_bio_adapter_unittest.cc |
index 09d9a97091f65c75b6a39eee524b7aeb439c9093..8bd6549670df7d6f9c7e7bf72ad92d0973d0adff 100644 |
--- a/net/socket/socket_bio_adapter_unittest.cc |
+++ b/net/socket/socket_bio_adapter_unittest.cc |
@@ -13,6 +13,7 @@ |
#include "base/macros.h" |
#include "base/memory/ptr_util.h" |
#include "base/run_loop.h" |
+#include "base/test/scoped_feature_list.h" |
#include "crypto/openssl_util.h" |
#include "net/base/address_list.h" |
#include "net/base/net_errors.h" |
@@ -27,9 +28,25 @@ |
namespace net { |
-class SocketBIOAdapterTest : public testing::Test, |
+enum ReadIfReadySupport { |
+ // ReadIfReady() field trial is enabled, and ReadyIfReady() is implemented. |
+ READ_IF_READY_ENABLED_SUPPORTED, |
+ // ReadIfReady() field trial is enabled, but ReadyIfReady() is unimplemented. |
+ READ_IF_READY_ENABLED_NOT_SUPPORTED, |
+ // ReadIfReady() field trial is disabled. |
+ READ_IF_READY_DISABLED, |
+}; |
+ |
+class SocketBIOAdapterTest : public testing::TestWithParam<ReadIfReadySupport>, |
public SocketBIOAdapter::Delegate { |
protected: |
+ void SetUp() override { |
+ if (GetParam() != READ_IF_READY_DISABLED) |
+ scoped_feature_list_.InitAndEnableFeature(Socket::kReadIfReadyExperiment); |
+ if (GetParam() == READ_IF_READY_ENABLED_SUPPORTED) |
+ factory_.set_enable_read_if_ready(true); |
+ } |
+ |
std::unique_ptr<StreamSocket> MakeTestSocket(SocketDataProvider* data) { |
data->set_connect_data(MockConnect(SYNCHRONOUS, OK)); |
factory_.AddSocketDataProvider(data); |
@@ -139,10 +156,17 @@ class SocketBIOAdapterTest : public testing::Test, |
bool expect_write_ready_ = false; |
MockClientSocketFactory factory_; |
std::unique_ptr<SocketBIOAdapter>* reset_on_write_ready_ = nullptr; |
+ base::test::ScopedFeatureList scoped_feature_list_; |
}; |
+INSTANTIATE_TEST_CASE_P(/* no prefix */, |
+ SocketBIOAdapterTest, |
+ testing::Values(READ_IF_READY_ENABLED_SUPPORTED, |
+ READ_IF_READY_ENABLED_NOT_SUPPORTED, |
+ READ_IF_READY_DISABLED)); |
+ |
// Test that data can be read synchronously. |
-TEST_F(SocketBIOAdapterTest, ReadSync) { |
+TEST_P(SocketBIOAdapterTest, ReadSync) { |
crypto::OpenSSLErrStackTracer tracer(FROM_HERE); |
MockRead reads[] = { |
@@ -183,7 +207,7 @@ TEST_F(SocketBIOAdapterTest, ReadSync) { |
} |
// Test that data can be read asynchronously. |
-TEST_F(SocketBIOAdapterTest, ReadAsync) { |
+TEST_P(SocketBIOAdapterTest, ReadAsync) { |
crypto::OpenSSLErrStackTracer tracer(FROM_HERE); |
MockRead reads[] = { |
@@ -203,9 +227,13 @@ TEST_F(SocketBIOAdapterTest, ReadAsync) { |
ExpectBlockingRead(bio, buf, sizeof(buf)); |
EXPECT_FALSE(adapter->HasPendingReadData()); |
- // After waiting, the data is available. |
+ // After waiting, the data is available if Read() is used. |
WaitForReadReady(); |
- EXPECT_TRUE(adapter->HasPendingReadData()); |
+ if (GetParam() == READ_IF_READY_ENABLED_SUPPORTED) { |
+ EXPECT_FALSE(adapter->HasPendingReadData()); |
+ } else { |
+ EXPECT_TRUE(adapter->HasPendingReadData()); |
+ } |
// The first read is now available synchronously. |
EXPECT_EQ(5, BIO_read(bio, buf, sizeof(buf))); |
@@ -220,8 +248,14 @@ TEST_F(SocketBIOAdapterTest, ReadAsync) { |
// amount. |
ExpectBlockingRead(bio, buf, 1); |
EXPECT_FALSE(adapter->HasPendingReadData()); |
+ |
+ // After waiting, the data is available if Read() is used. |
WaitForReadReady(); |
- EXPECT_TRUE(adapter->HasPendingReadData()); |
+ if (GetParam() == READ_IF_READY_ENABLED_SUPPORTED) { |
+ EXPECT_FALSE(adapter->HasPendingReadData()); |
+ } else { |
+ EXPECT_TRUE(adapter->HasPendingReadData()); |
+ } |
// The next read is now available synchronously. |
EXPECT_EQ(5, BIO_read(bio, buf, sizeof(buf))); |
@@ -237,7 +271,7 @@ TEST_F(SocketBIOAdapterTest, ReadAsync) { |
} |
// Test that synchronous EOF is mapped to ERR_CONNECTION_CLOSED. |
-TEST_F(SocketBIOAdapterTest, ReadEOFSync) { |
+TEST_P(SocketBIOAdapterTest, ReadEOFSync) { |
crypto::OpenSSLErrStackTracer tracer(FROM_HERE); |
MockRead reads[] = { |
@@ -253,7 +287,7 @@ TEST_F(SocketBIOAdapterTest, ReadEOFSync) { |
} |
// Test that asynchronous EOF is mapped to ERR_CONNECTION_CLOSED. |
-TEST_F(SocketBIOAdapterTest, ReadEOFAsync) { |
+TEST_P(SocketBIOAdapterTest, ReadEOFAsync) { |
crypto::OpenSSLErrStackTracer tracer(FROM_HERE); |
MockRead reads[] = { |
@@ -272,7 +306,7 @@ TEST_F(SocketBIOAdapterTest, ReadEOFAsync) { |
} |
// Test that data can be written synchronously. |
-TEST_F(SocketBIOAdapterTest, WriteSync) { |
+TEST_P(SocketBIOAdapterTest, WriteSync) { |
crypto::OpenSSLErrStackTracer tracer(FROM_HERE); |
MockWrite writes[] = { |
@@ -307,7 +341,7 @@ TEST_F(SocketBIOAdapterTest, WriteSync) { |
} |
// Test that data can be written asynchronously. |
-TEST_F(SocketBIOAdapterTest, WriteAsync) { |
+TEST_P(SocketBIOAdapterTest, WriteAsync) { |
crypto::OpenSSLErrStackTracer tracer(FROM_HERE); |
MockWrite writes[] = { |
@@ -436,7 +470,7 @@ TEST_F(SocketBIOAdapterTest, WriteAsync) { |
// Test that a failed socket write is reported through BIO_read and prevents it |
// from scheduling a socket read. See https://crbug.com/249848. |
-TEST_F(SocketBIOAdapterTest, WriteStopsRead) { |
+TEST_P(SocketBIOAdapterTest, WriteStopsRead) { |
crypto::OpenSSLErrStackTracer tracer(FROM_HERE); |
MockWrite writes[] = { |
@@ -459,7 +493,7 @@ TEST_F(SocketBIOAdapterTest, WriteStopsRead) { |
// Test that a synchronous failed socket write interrupts a blocked |
// BIO_read. See https://crbug.com/249848. |
-TEST_F(SocketBIOAdapterTest, SyncWriteInterruptsRead) { |
+TEST_P(SocketBIOAdapterTest, SyncWriteInterruptsRead) { |
crypto::OpenSSLErrStackTracer tracer(FROM_HERE); |
MockRead reads[] = { |
@@ -492,7 +526,7 @@ TEST_F(SocketBIOAdapterTest, SyncWriteInterruptsRead) { |
// Test that an asynchronous failed socket write interrupts a blocked |
// BIO_read. See https://crbug.com/249848. |
-TEST_F(SocketBIOAdapterTest, AsyncWriteInterruptsRead) { |
+TEST_P(SocketBIOAdapterTest, AsyncWriteInterruptsRead) { |
crypto::OpenSSLErrStackTracer tracer(FROM_HERE); |
MockRead reads[] = { |
@@ -527,7 +561,7 @@ TEST_F(SocketBIOAdapterTest, AsyncWriteInterruptsRead) { |
// Test that an asynchronous failed socket write interrupts a blocked BIO_read, |
// signaling both if the buffer was full. See https://crbug.com/249848. |
-TEST_F(SocketBIOAdapterTest, AsyncWriteInterruptsBoth) { |
+TEST_P(SocketBIOAdapterTest, AsyncWriteInterruptsBoth) { |
crypto::OpenSSLErrStackTracer tracer(FROM_HERE); |
MockRead reads[] = { |
@@ -562,7 +596,7 @@ TEST_F(SocketBIOAdapterTest, AsyncWriteInterruptsBoth) { |
// Test that SocketBIOAdapter handles OnWriteReady deleting itself when both |
// need to be signaled. |
-TEST_F(SocketBIOAdapterTest, DeleteOnWriteReady) { |
+TEST_P(SocketBIOAdapterTest, DeleteOnWriteReady) { |
crypto::OpenSSLErrStackTracer tracer(FROM_HERE); |
MockRead reads[] = { |
@@ -595,7 +629,7 @@ TEST_F(SocketBIOAdapterTest, DeleteOnWriteReady) { |
// Test that using a BIO after the underlying adapter is destroyed fails |
// gracefully. |
-TEST_F(SocketBIOAdapterTest, Detached) { |
+TEST_P(SocketBIOAdapterTest, Detached) { |
crypto::OpenSSLErrStackTracer tracer(FROM_HERE); |
SequencedSocketData data(nullptr, 0, nullptr, 0); |