| Index: net/url_request/url_request_context_builder_unittest.cc
|
| diff --git a/net/url_request/url_request_context_builder_unittest.cc b/net/url_request/url_request_context_builder_unittest.cc
|
| index a7a0fee75d61c7f0024271f978b4653069e09e76..746d9881b5229db93e8cb39e1386c57a91a63d51 100644
|
| --- a/net/url_request/url_request_context_builder_unittest.cc
|
| +++ b/net/url_request/url_request_context_builder_unittest.cc
|
| @@ -40,8 +40,8 @@ class LocalHttpTestServer : public SpawnedTestServer {
|
|
|
| class MockHttpAuthHandlerFactory : public HttpAuthHandlerFactory {
|
| public:
|
| - explicit MockHttpAuthHandlerFactory(int return_code) :
|
| - return_code_(return_code) {}
|
| + explicit MockHttpAuthHandlerFactory(int return_code)
|
| + : return_code_(return_code) {}
|
| virtual ~MockHttpAuthHandlerFactory() {}
|
|
|
| virtual int CreateAuthHandler(HttpAuthChallengeTokenizer* challenge,
|
| @@ -62,8 +62,8 @@ class MockHttpAuthHandlerFactory : public HttpAuthHandlerFactory {
|
| class URLRequestContextBuilderTest : public PlatformTest {
|
| protected:
|
| URLRequestContextBuilderTest()
|
| - : test_server_(
|
| - base::FilePath(FILE_PATH_LITERAL("net/data/url_request_unittest"))) {
|
| + : test_server_(base::FilePath(
|
| + FILE_PATH_LITERAL("net/data/url_request_unittest"))) {
|
| #if defined(OS_LINUX) || defined(OS_ANDROID)
|
| builder_.set_proxy_config_service(
|
| new ProxyConfigServiceFixed(ProxyConfig::CreateDirect()));
|
| @@ -115,13 +115,10 @@ TEST_F(URLRequestContextBuilderTest, ExtraHttpAuthHandlerFactory) {
|
| builder_.add_http_auth_handler_factory("ExtraScheme", mock_factory_basic);
|
| scoped_ptr<URLRequestContext> context(builder_.Build());
|
| // Verify that a handler is returned for and added scheme.
|
| - EXPECT_EQ(kBasicReturnCode,
|
| - context->http_auth_handler_factory()->CreateAuthHandlerFromString(
|
| - "ExtraScheme",
|
| - HttpAuth::AUTH_SERVER,
|
| - gurl,
|
| - BoundNetLog(),
|
| - &handler));
|
| + EXPECT_EQ(
|
| + kBasicReturnCode,
|
| + context->http_auth_handler_factory()->CreateAuthHandlerFromString(
|
| + "ExtraScheme", HttpAuth::AUTH_SERVER, gurl, BoundNetLog(), &handler));
|
| // Verify that a handler isn't returned for a bogus scheme.
|
| EXPECT_EQ(ERR_UNSUPPORTED_AUTH_SCHEME,
|
| context->http_auth_handler_factory()->CreateAuthHandlerFromString(
|
|
|