diff options
author | miletus@chromium.org <miletus@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-06-24 20:05:16 +0000 |
---|---|---|
committer | miletus@chromium.org <miletus@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-06-24 20:05:16 +0000 |
commit | 781458b63ec925dd71cabc4343c9f93517a5d6f2 (patch) | |
tree | 98451890e2a4912a55a81717242ee3133ab93b19 /jingle | |
parent | b9c5d7432e017c5f8837c3c06e716d45a9e372ac (diff) | |
download | chromium_src-781458b63ec925dd71cabc4343c9f93517a5d6f2.zip chromium_src-781458b63ec925dd71cabc4343c9f93517a5d6f2.tar.gz chromium_src-781458b63ec925dd71cabc4343c9f93517a5d6f2.tar.bz2 |
Revert "[Mac] Reland r276808 Use a native MessagePump instead of a MessagePumpDefault"
This reverts commit e82339d44d0dde725295785b9fea8c448d382621.
See if this fixes the perf regression.
BUG=388360
TBR=jeremy@chromium.org
NOTRY=true
Review URL: https://codereview.chromium.org/354673005
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@279474 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'jingle')
-rw-r--r-- | jingle/glue/chrome_async_socket_unittest.cc | 87 | ||||
-rw-r--r-- | jingle/notifier/base/xmpp_connection_unittest.cc | 23 |
2 files changed, 48 insertions, 62 deletions
diff --git a/jingle/glue/chrome_async_socket_unittest.cc b/jingle/glue/chrome_async_socket_unittest.cc index b3c81b1..db3d2b0 100644 --- a/jingle/glue/chrome_async_socket_unittest.cc +++ b/jingle/glue/chrome_async_socket_unittest.cc @@ -11,7 +11,6 @@ #include "base/logging.h" #include "base/memory/scoped_ptr.h" #include "base/message_loop/message_loop.h" -#include "base/message_loop/message_pump_default.h" #include "jingle/glue/resolving_client_socket_factory.h" #include "net/base/address_list.h" #include "net/base/net_errors.h" @@ -144,15 +143,7 @@ class ChromeAsyncSocketTest protected: ChromeAsyncSocketTest() : ssl_socket_data_provider_(net::ASYNC, net::OK), - addr_("localhost", 35) { - // GTest death tests execute in a fork()ed but not exec()ed process. - // On OS X a CoreFoundation-backed message loop will exit with a - // __THE_PROCESS_HAS_FORKED_AND_YOU_CANNOT_USE_THIS_COREFOUNDATION_FUNCTIONALITY___YOU_MUST_EXEC__ - // when called. - // Explicitly create a MessagePumpDefault which can run in this enivronment. - scoped_ptr<base::MessagePump> pump(new base::MessagePumpDefault()); - message_loop_.reset(new base::MessageLoop(pump.Pass())); - } + addr_("localhost", 35) {} virtual ~ChromeAsyncSocketTest() {} @@ -191,7 +182,7 @@ class ChromeAsyncSocketTest virtual void TearDown() { // Run any tasks that we forgot to pump. - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectClosed(); ExpectNoSignal(); chrome_async_socket_.reset(); @@ -351,7 +342,7 @@ class ChromeAsyncSocketTest EXPECT_TRUE(chrome_async_socket_->Connect(addr_)); ExpectNonErrorState(ChromeAsyncSocket::STATE_CONNECTING); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); // We may not necessarily be open; may have been other events // queued up. ExpectSignalSocketState( @@ -381,7 +372,7 @@ class ChromeAsyncSocketTest EXPECT_EQ(kDummyData, DrainRead(1)); EXPECT_TRUE(chrome_async_socket_->StartTls("fakedomain.com")); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectSSLConnectSignal(); ExpectNoSignal(); ExpectNonErrorState(ChromeAsyncSocket::STATE_TLS_OPEN); @@ -424,7 +415,7 @@ class ChromeAsyncSocketTest } // ChromeAsyncSocket expects a message loop. - scoped_ptr<base::MessageLoop> message_loop_; + base::MessageLoop message_loop_; AsyncSocketDataProvider async_socket_data_provider_; net::SSLSocketDataProvider ssl_socket_data_provider_; @@ -519,7 +510,7 @@ TEST_F(ChromeAsyncSocketTest, ImmediateConnectCloseBeforeRead) { SignalSocketState::NoError( SIGNAL_CLOSE, ChromeAsyncSocket::STATE_CLOSED)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); } TEST_F(ChromeAsyncSocketTest, HangingConnect) { @@ -541,14 +532,14 @@ TEST_F(ChromeAsyncSocketTest, PendingConnect) { ExpectNonErrorState(ChromeAsyncSocket::STATE_CONNECTING); ExpectNoSignal(); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectNonErrorState(ChromeAsyncSocket::STATE_OPEN); ExpectSignalSocketState( SignalSocketState::NoError( SIGNAL_CONNECT, ChromeAsyncSocket::STATE_OPEN)); ExpectNoSignal(); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); DoCloseOpenedNoError(); } @@ -561,14 +552,14 @@ TEST_F(ChromeAsyncSocketTest, PendingConnectCloseBeforeRead) { net::MockConnect(net::ASYNC, net::OK)); EXPECT_TRUE(chrome_async_socket_->Connect(addr_)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectSignalSocketState( SignalSocketState::NoError( SIGNAL_CONNECT, ChromeAsyncSocket::STATE_OPEN)); DoCloseOpenedNoError(); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); } TEST_F(ChromeAsyncSocketTest, PendingConnectError) { @@ -576,7 +567,7 @@ TEST_F(ChromeAsyncSocketTest, PendingConnectError) { net::MockConnect(net::ASYNC, net::ERR_TIMED_OUT)); EXPECT_TRUE(chrome_async_socket_->Connect(addr_)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectSignalSocketState( SignalSocketState( @@ -638,7 +629,7 @@ TEST_F(ChromeAsyncSocketTest, Read) { EXPECT_EQ(kReadData, DrainRead(1)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); DoCloseOpenedNoError(); } @@ -652,7 +643,7 @@ TEST_F(ChromeAsyncSocketTest, ReadTwice) { EXPECT_EQ(kReadData, DrainRead(1)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); const char kReadData2[] = "mydatatoread2"; async_socket_data_provider_.AddRead(net::MockRead(kReadData2)); @@ -674,7 +665,7 @@ TEST_F(ChromeAsyncSocketTest, ReadError) { EXPECT_EQ(kReadData, DrainRead(1)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); async_socket_data_provider_.AddRead( net::MockRead(net::SYNCHRONOUS, net::ERR_TIMED_OUT)); @@ -708,7 +699,7 @@ TEST_F(ChromeAsyncSocketTest, PendingRead) { EXPECT_EQ(kReadData, DrainRead(1)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); DoCloseOpenedNoError(); } @@ -764,12 +755,12 @@ TEST_F(ChromeAsyncSocketTest, SyncWrite) { DoOpenClosed(); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData, 3)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData + 3, 5)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData + 8, arraysize(kWriteData) - 8)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectNoSignal(); @@ -787,12 +778,12 @@ TEST_F(ChromeAsyncSocketTest, AsyncWrite) { net::MockWrite(net::ASYNC, kWriteData + 8, arraysize(kWriteData) - 8)); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData, 3)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData + 3, 5)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData + 8, arraysize(kWriteData) - 8)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectNoSignal(); @@ -810,12 +801,12 @@ TEST_F(ChromeAsyncSocketTest, AsyncWriteError) { net::MockWrite(net::ASYNC, net::ERR_TIMED_OUT)); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData, 3)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData + 3, 5)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData + 8, arraysize(kWriteData) - 8)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectSignalSocketState( SignalSocketState( @@ -883,7 +874,7 @@ TEST_F(ChromeAsyncSocketTest, ImmediateSSLConnect) { ExpectReadSignal(); EXPECT_TRUE(chrome_async_socket_->StartTls("fakedomain.com")); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectSSLConnectSignal(); ExpectNoSignal(); ExpectNonErrorState(ChromeAsyncSocket::STATE_TLS_OPEN); @@ -898,7 +889,7 @@ TEST_F(ChromeAsyncSocketTest, DoubleSSLConnect) { ExpectReadSignal(); EXPECT_TRUE(chrome_async_socket_->StartTls("fakedomain.com")); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectSSLConnectSignal(); ExpectNoSignal(); ExpectNonErrorState(ChromeAsyncSocket::STATE_TLS_OPEN); @@ -922,7 +913,7 @@ TEST_F(ChromeAsyncSocketTest, FailedSSLConnect) { ExpectReadSignal(); EXPECT_TRUE(chrome_async_socket_->StartTls("fakedomain.com")); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectSignalSocketState( SignalSocketState( SIGNAL_CLOSE, ChromeAsyncSocket::STATE_CLOSED, @@ -950,7 +941,7 @@ TEST_F(ChromeAsyncSocketTest, ReadDuringSSLConnecting) { EXPECT_TRUE(chrome_async_socket_->Read(buf, sizeof(buf), &len_read)); EXPECT_EQ(0U, len_read); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectSSLConnectSignal(); ExpectSSLReadSignal(); ExpectNoSignal(); @@ -981,11 +972,11 @@ TEST_F(ChromeAsyncSocketTest, WriteDuringSSLConnecting) { // TODO(akalin): Figure out how to test that the write happens // *after* the SSL connect. - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectSSLConnectSignal(); ExpectNoSignal(); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); DoSSLCloseOpenedNoError(); } @@ -1014,7 +1005,7 @@ TEST_F(ChromeAsyncSocketTest, SSLConnectDuringPostedWrite) { EXPECT_FALSE(chrome_async_socket_->StartTls("fakedomain.com")); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); DoCloseOpened( SignalSocketState(SIGNAL_CLOSE, @@ -1029,14 +1020,14 @@ TEST_F(ChromeAsyncSocketTest, SSLConnectDuringPostedWrite) { TEST_F(ChromeAsyncSocketTest, SSLRead) { DoSSLOpenClosed(); async_socket_data_provider_.AddRead(net::MockRead(kReadData)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectSSLReadSignal(); ExpectNoSignal(); EXPECT_EQ(kReadData, DrainRead(1)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); DoSSLCloseOpenedNoError(); } @@ -1052,12 +1043,12 @@ TEST_F(ChromeAsyncSocketTest, SSLSyncWrite) { DoSSLOpenClosed(); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData, 3)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData + 3, 5)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData + 8, arraysize(kWriteData) - 8)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectNoSignal(); @@ -1075,12 +1066,12 @@ TEST_F(ChromeAsyncSocketTest, SSLAsyncWrite) { net::MockWrite(net::ASYNC, kWriteData + 8, arraysize(kWriteData) - 8)); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData, 3)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData + 3, 5)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); EXPECT_TRUE(chrome_async_socket_->Write(kWriteData + 8, arraysize(kWriteData) - 8)); - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); ExpectNoSignal(); diff --git a/jingle/notifier/base/xmpp_connection_unittest.cc b/jingle/notifier/base/xmpp_connection_unittest.cc index 0573363c..3212abc 100644 --- a/jingle/notifier/base/xmpp_connection_unittest.cc +++ b/jingle/notifier/base/xmpp_connection_unittest.cc @@ -11,7 +11,6 @@ #include "base/memory/ref_counted.h" #include "base/memory/weak_ptr.h" #include "base/message_loop/message_loop.h" -#include "base/message_loop/message_pump_default.h" #include "jingle/glue/mock_task.h" #include "jingle/glue/task_pump.h" #include "jingle/notifier/base/weak_xmpp_client.h" @@ -75,23 +74,19 @@ class MockXmppConnectionDelegate : public XmppConnection::Delegate { class XmppConnectionTest : public testing::Test { protected: XmppConnectionTest() - : mock_pre_xmpp_auth_(new MockPreXmppAuth()) { - scoped_ptr<base::MessagePump> pump(new base::MessagePumpDefault()); - message_loop_.reset(new base::MessageLoop(pump.Pass())); - - url_request_context_getter_ = new net::TestURLRequestContextGetter( - message_loop_->message_loop_proxy()); - } + : mock_pre_xmpp_auth_(new MockPreXmppAuth()), + url_request_context_getter_(new net::TestURLRequestContextGetter( + message_loop_.message_loop_proxy())) {} virtual ~XmppConnectionTest() {} virtual void TearDown() { // Clear out any messages posted by XmppConnection's destructor. - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); } // Needed by XmppConnection. - scoped_ptr<base::MessageLoop> message_loop_; + base::MessageLoop message_loop_; MockXmppConnectionDelegate mock_xmpp_connection_delegate_; scoped_ptr<MockPreXmppAuth> mock_pre_xmpp_auth_; scoped_refptr<net::TestURLRequestContextGetter> url_request_context_getter_; @@ -117,7 +112,7 @@ TEST_F(XmppConnectionTest, ImmediateFailure) { // We need to do this *before* |xmpp_connection| gets destroyed or // our delegate won't be called. - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); } TEST_F(XmppConnectionTest, PreAuthFailure) { @@ -136,7 +131,7 @@ TEST_F(XmppConnectionTest, PreAuthFailure) { // We need to do this *before* |xmpp_connection| gets destroyed or // our delegate won't be called. - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); } TEST_F(XmppConnectionTest, FailureAfterPreAuth) { @@ -155,7 +150,7 @@ TEST_F(XmppConnectionTest, FailureAfterPreAuth) { // We need to do this *before* |xmpp_connection| gets destroyed or // our delegate won't be called. - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); } TEST_F(XmppConnectionTest, RaisedError) { @@ -252,7 +247,7 @@ TEST_F(XmppConnectionTest, TasksDontRunAfterXmppConnectionDestructor) { } // This should destroy |task_pump|, but |task| still shouldn't run. - message_loop_->RunUntilIdle(); + message_loop_.RunUntilIdle(); } } // namespace notifier |