Use NOTREACHED_IN_MIGRATION() in the rest of src/
This was generated by replacing " NOTREACHED()" with " NOTREACHED_IN_MIGRATION()" and running git cl format. This prepares for making NOTREACHED() [[noreturn]] alongside NotReachedIsFatal migration of existing inventory. third_party/crashpad is still excluded, needs to be changed upstream. Bug: 40580068 Change-Id: Ia5dbaddf53dba2fedefb67f1d428e8b24e9edffe Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/5545021 Commit-Queue: Peter Boström <pbos@chromium.org> Auto-Submit: Peter Boström <pbos@chromium.org> Commit-Queue: Lei Zhang <thestig@chromium.org> Reviewed-by: Lei Zhang <thestig@chromium.org> Owners-Override: Lei Zhang <thestig@chromium.org> Cr-Commit-Position: refs/heads/main@{#1302314}
This commit is contained in:

committed by
Chromium LUCI CQ

parent
47dc17dc2e
commit
7843eba214
android_webview
browser
aw_browser_context.ccaw_browser_main_parts.ccaw_browser_terminator.ccaw_content_browser_client.ccaw_contents.ccaw_contents_client_bridge.ccaw_field_trials.ccaw_permission_manager.ccaw_permission_manager_unittest.ccaw_print_manager.ccaw_quota_manager_bridge.ccaw_web_contents_view_delegate.cccookie_manager.ccfind_helper.cc
gfx
aw_draw_fn_impl.ccdisplay_scheduler_webview.ccskia_output_surface_dependency_webview.cctask_forwarding_sequence.cc
icon_helper.ccmetrics
network_service
renderer_host
safe_browsing
common
crash_reporter
lib
nonembedded
component_updater
test
shell
src
draw_fn
apps
chrome/browser/ash/policy/core
chromeos/ash/components/wifi_p2p
codelabs/mojo_examples/01-multi-process
courgette
adjustment_method.ccadjustment_method_2.cccourgette_flow.ccdisassembler_win32.cclabel_manager_unittest.ccrel32_finder_unittest.cc
crypto
dbus
docs/security
extensions/browser/api/storage
fuchsia_web
runners
webengine
gin
google_apis
common
drive
gaia
gaia_auth_fetcher.ccgaia_oauth_client.ccgoogle_service_auth_error.ccoauth2_access_token_fetcher_impl.ccoauth2_access_token_fetcher_impl_unittest.ccoauth_request_signer.cc
gcm
headless
ipc
handle_win.ccipc_channel_mojo.ccipc_channel_mojo_unittest.ccipc_channel_nacl.ccipc_channel_proxy.ccipc_message_attachment.ccipc_message_pipe_reader.ccipc_message_templates.hipc_message_utils.ccipc_sync_channel_unittest.ccipc_sync_message.ccmach_port_mac.ccmessage_router.ccnative_handle_type_converters.cc
media/gpu
mojo
core
channel.ccchannel_linux.ccchannel_mac.cccore_ipcz.ccentrypoints.cchandle_table.cc
ipcz_driver
message_pipe_dispatcher.ccmessage_unittest.ccnode_controller.ccports
shared_buffer_dispatcher.cctest
trap_unittest.ccpublic
cpp
base
application_state_mojom_traits.ccbig_buffer.ccbig_buffer_mojom_traits.ccfile_error_mojom_traits.hmemory_pressure_level_mojom_traits.ccmessage_pump_type_mojom_traits.cctext_direction_mojom_traits.ccthread_type_mojom_traits.ccvalues_mojom_traits.h
bindings
lib
tests
platform
system
tools
bindings
generators
pdf
ppapi
host
nacl_irt
proxy
dispatch_reply_message.hdispatcher.ccenter_proxy.hfile_io_resource.ccfile_ref_resource.ccfile_system_resource.cchost_dispatcher.cchost_resolver_resource.ccnetwork_proxy_resource.ccplugin_dispatcher.ccplugin_var_tracker.ccppapi_command_buffer_proxy.ccppapi_proxy_test.ccppb_buffer_proxy.ccppb_graphics_3d_proxy.ccppb_image_data_proxy.ccppb_instance_proxy.ccppb_var_deprecated_proxy.ccppp_input_event_proxy.ccppp_instance_proxy.ccppp_instance_proxy_unittest.ccppp_messaging_proxy.ccppp_mouse_lock_proxy.ccppp_text_input_proxy.ccraw_var_data.ccserialized_handle.cctcp_socket_private_resource.cctcp_socket_resource_base.ccudp_socket_filter.ccudp_socket_private_resource.ccudp_socket_resource_base.ccurl_loader_resource.ccvideo_capture_resource.ccvideo_decoder_resource.ccvpn_provider_resource.cc
shared_impl
file_system_util.ccppb_audio_shared.ccppb_tcp_socket_shared.ccresource.cctest_utils.cctracked_callback.ccvar_tracker.ccvpn_provider_util.cc
thunk
printing
backend
cups_ipp_helper_unittest.cccups_jobs.cc
mojom
print_backend_chromeos.ccprint_backend_win.ccwin_helper.cccommon
emf_win.ccmetafile_skia.ccnup_parameters.ccpdf_metafile_cg_mac.ccprint_settings.ccprinting_context.ccprinting_context_chromeos.ccprinting_context_linux.ccrlz
sandbox
linux
integration_tests
seccomp-bpf-helpers
seccomp-bpf
services
syscall_broker
mac
policy
win
skia
ext
public
sql
database.ccerror_delegate_util.ccrecovery.ccsandboxed_vfs.ccsandboxed_vfs_file.ccsqlite_result_code.cc
storage
browser
blob
blob_builder_from_stream_unittest.ccblob_data_item.ccblob_reader.ccblob_storage_context.ccblob_transport_strategy.ccblob_transport_strategy_unittest.ccblob_url_loader.ccmojo_blob_reader.ccview_blob_internals_job.ccwrite_blob_to_file.cc
database
file_system
copy_or_move_operation_delegate.ccfile_system_context.ccfile_system_quota_client.ccfile_system_url.ccfile_system_usage_cache.ccfile_writer_delegate.ccisolated_context.ccisolated_file_system_backend.ccobfuscated_file_util.ccsandbox_directory_database.ccsandbox_file_system_backend_delegate.ccsandbox_origin_database.cc
quota
test
common
file_system
styleguide/c++
testing
third_party/blink/renderer
tools
android
common
disable_tests
imagediff
style_variable_generator
ui/ozone/platform/wayland/test
url
@ -158,7 +158,8 @@ void MigrateProfileData(base::FilePath cache_path,
|
||||
base::FilePath BuildCachePath(const base::FilePath& relative_path) {
|
||||
FilePath cache_path;
|
||||
if (!base::PathService::Get(base::DIR_CACHE, &cache_path)) {
|
||||
NOTREACHED() << "Failed to get app cache directory for Android WebView";
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "Failed to get app cache directory for Android WebView";
|
||||
}
|
||||
return cache_path.Append(relative_path);
|
||||
}
|
||||
@ -686,7 +687,8 @@ base::FilePath AwBrowserContext::BuildStoragePath(
|
||||
const base::FilePath& relative_path) {
|
||||
base::FilePath user_data_dir;
|
||||
if (!base::PathService::Get(base::DIR_ANDROID_APP_DATA, &user_data_dir)) {
|
||||
NOTREACHED() << "Failed to get app data directory for Android WebView";
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "Failed to get app data directory for Android WebView";
|
||||
}
|
||||
return user_data_dir.Append(relative_path);
|
||||
}
|
||||
|
@ -324,7 +324,7 @@ int AwBrowserMainParts::PreMainMessageLoopRun() {
|
||||
|
||||
void AwBrowserMainParts::WillRunMainMessageLoop(
|
||||
std::unique_ptr<base::RunLoop>& run_loop) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
void AwBrowserMainParts::PostCreateThreads() {
|
||||
|
@ -112,7 +112,7 @@ void OnRenderProcessGone(
|
||||
<< " killing application.";
|
||||
kill(getpid(), SIGKILL);
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
break;
|
||||
case AwRenderProcessGoneDelegate::RenderProcessGoneResult::kHandled:
|
||||
// Don't log UMA yet. This WebView may be handled, but we need to wait
|
||||
|
@ -518,7 +518,8 @@ base::FilePath AwContentBrowserClient::GetDefaultDownloadDirectory() {
|
||||
}
|
||||
|
||||
std::string AwContentBrowserClient::GetDefaultDownloadName() {
|
||||
NOTREACHED() << "Android WebView does not use chromium downloads";
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "Android WebView does not use chromium downloads";
|
||||
return std::string();
|
||||
}
|
||||
|
||||
@ -535,7 +536,7 @@ AwContentBrowserClient::GetLocalTracesDirectory() {
|
||||
|
||||
void AwContentBrowserClient::DidCreatePpapiPlugin(
|
||||
content::BrowserPpapiHost* browser_host) {
|
||||
NOTREACHED() << "Android WebView does not support plugins";
|
||||
NOTREACHED_IN_MIGRATION() << "Android WebView does not support plugins";
|
||||
}
|
||||
|
||||
bool AwContentBrowserClient::AllowPepperSocketAPI(
|
||||
@ -543,14 +544,14 @@ bool AwContentBrowserClient::AllowPepperSocketAPI(
|
||||
const GURL& url,
|
||||
bool private_api,
|
||||
const content::SocketPermissionRequest* params) {
|
||||
NOTREACHED() << "Android WebView does not support plugins";
|
||||
NOTREACHED_IN_MIGRATION() << "Android WebView does not support plugins";
|
||||
return false;
|
||||
}
|
||||
|
||||
bool AwContentBrowserClient::IsPepperVpnProviderAPIAllowed(
|
||||
content::BrowserContext* browser_context,
|
||||
const GURL& url) {
|
||||
NOTREACHED() << "Android WebView does not support plugins";
|
||||
NOTREACHED_IN_MIGRATION() << "Android WebView does not support plugins";
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@ -1295,7 +1295,7 @@ jint AwContents::GetEffectivePriority(JNIEnv* env) {
|
||||
case content::ChildProcessImportance::IMPORTANT:
|
||||
return static_cast<jint>(RendererPriority::HIGH);
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@ -306,7 +306,7 @@ void AwContentsClientBridge::RunJavaScriptDialog(
|
||||
break;
|
||||
}
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -66,7 +66,7 @@ void AwFieldTrials::OnVariationsSetupComplete() {
|
||||
if (base::PathService::Get(base::DIR_ANDROID_APP_DATA, &metrics_dir)) {
|
||||
InstantiatePersistentHistogramsWithFeaturesAndCleanup(metrics_dir);
|
||||
} else {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -53,11 +53,11 @@ class LastRequestResultCache {
|
||||
}
|
||||
|
||||
if (!requesting_origin.is_valid()) {
|
||||
NOTREACHED() << requesting_origin.possibly_invalid_spec();
|
||||
NOTREACHED_IN_MIGRATION() << requesting_origin.possibly_invalid_spec();
|
||||
return;
|
||||
}
|
||||
if (!embedding_origin.is_valid()) {
|
||||
NOTREACHED() << embedding_origin.possibly_invalid_spec();
|
||||
NOTREACHED_IN_MIGRATION() << embedding_origin.possibly_invalid_spec();
|
||||
return;
|
||||
}
|
||||
|
||||
@ -68,7 +68,7 @@ class LastRequestResultCache {
|
||||
|
||||
std::string key = GetCacheKey(requesting_origin, embedding_origin);
|
||||
if (key.empty()) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
// Never store an empty key because it could inadvertently be used for
|
||||
// another combination.
|
||||
return;
|
||||
@ -90,7 +90,8 @@ class LastRequestResultCache {
|
||||
<< embedding_origin.possibly_invalid_spec();
|
||||
|
||||
if (permission != PermissionType::PROTECTED_MEDIA_IDENTIFIER) {
|
||||
NOTREACHED() << "Results are only cached for PROTECTED_MEDIA_IDENTIFIER";
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "Results are only cached for PROTECTED_MEDIA_IDENTIFIER";
|
||||
return PermissionStatus::ASK;
|
||||
}
|
||||
|
||||
@ -169,7 +170,7 @@ class AwPermissionManager::PendingRequest {
|
||||
void SetPermissionStatus(PermissionType type, PermissionStatus status) {
|
||||
auto result = permission_index_map_.find(type);
|
||||
if (result == permission_index_map_.end()) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return;
|
||||
}
|
||||
DCHECK(!IsCompleted());
|
||||
@ -191,7 +192,7 @@ class AwPermissionManager::PendingRequest {
|
||||
PermissionStatus GetPermissionStatus(PermissionType type) {
|
||||
auto result = permission_index_map_.find(type);
|
||||
if (result == permission_index_map_.end()) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return PermissionStatus::DENIED;
|
||||
}
|
||||
return results[result->second];
|
||||
@ -369,7 +370,8 @@ void AwPermissionManager::RequestPermissions(
|
||||
PermissionStatus::DENIED);
|
||||
break;
|
||||
case PermissionType::NUM:
|
||||
NOTREACHED() << "PermissionType::NUM was not expected here.";
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "PermissionType::NUM was not expected here.";
|
||||
pending_request_raw->SetPermissionStatus(permissions[i],
|
||||
PermissionStatus::DENIED);
|
||||
break;
|
||||
@ -612,7 +614,8 @@ void AwPermissionManager::CancelPermissionRequest(int request_id) {
|
||||
// There is nothing to cancel so this is simply ignored.
|
||||
break;
|
||||
case PermissionType::NUM:
|
||||
NOTREACHED() << "PermissionType::NUM was not expected here.";
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "PermissionType::NUM was not expected here.";
|
||||
break;
|
||||
}
|
||||
pending_request->SetPermissionStatus(permission, PermissionStatus::DENIED);
|
||||
|
@ -96,7 +96,7 @@ class AwBrowserPermissionRequestDelegateForTesting final
|
||||
request_.erase(it);
|
||||
return;
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
private:
|
||||
|
@ -136,7 +136,7 @@ void AwPrintManager::DidPrintDocument(
|
||||
|
||||
const printing::mojom::DidPrintContentParams& content = *params->content;
|
||||
if (!content.metafile_data_region.IsValid()) {
|
||||
NOTREACHED() << "invalid memory handle";
|
||||
NOTREACHED_IN_MIGRATION() << "invalid memory handle";
|
||||
web_contents()->Stop();
|
||||
PdfWritingDone(0);
|
||||
std::move(callback).Run(false);
|
||||
@ -146,7 +146,7 @@ void AwPrintManager::DidPrintDocument(
|
||||
auto data = base::RefCountedSharedMemoryMapping::CreateFromWholeRegion(
|
||||
content.metafile_data_region);
|
||||
if (!data) {
|
||||
NOTREACHED() << "couldn't map";
|
||||
NOTREACHED_IN_MIGRATION() << "couldn't map";
|
||||
web_contents()->Stop();
|
||||
PdfWritingDone(0);
|
||||
std::move(callback).Run(false);
|
||||
|
@ -138,7 +138,7 @@ void GetStorageKeysTask::CheckDone() {
|
||||
content::GetUIThreadTaskRunner({})->PostTask(
|
||||
FROM_HERE, base::BindOnce(&GetStorageKeysTask::DoneOnUIThread, this));
|
||||
} else if (num_callbacks_received_ > num_callbacks_to_wait_) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -22,7 +22,7 @@ AwWebContentsViewDelegate::~AwWebContentsViewDelegate() {}
|
||||
content::WebDragDestDelegate* AwWebContentsViewDelegate::GetDragDestDelegate() {
|
||||
// GetDragDestDelegate is a pure virtual method from WebContentsViewDelegate
|
||||
// and must have an implementation although android doesn't use it.
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
@ -190,7 +190,8 @@ namespace {
|
||||
base::FilePath GetPathInAppDirectory(std::string path) {
|
||||
base::FilePath result;
|
||||
if (!base::PathService::Get(base::DIR_ANDROID_APP_DATA, &result)) {
|
||||
NOTREACHED() << "Failed to get app data directory for Android WebView";
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "Failed to get app data directory for Android WebView";
|
||||
}
|
||||
result = result.Append(FILE_PATH_LITERAL(path));
|
||||
return result;
|
||||
|
@ -117,12 +117,12 @@ void FindHelper::NotifyResults(int active_ordinal,
|
||||
|
||||
// Safeguard in case of errors to prevent reporting -1 to the API listeners.
|
||||
if (match_count == -1) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
match_count = 0;
|
||||
}
|
||||
|
||||
if (active_ordinal == -1) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
active_ordinal = 0;
|
||||
}
|
||||
|
||||
|
@ -127,7 +127,7 @@ OverlaysParams::Mode GetOverlaysMode(AwDrawFnOverlaysMode mode) {
|
||||
case AW_DRAW_FN_OVERLAYS_MODE_ENABLED:
|
||||
return OverlaysParams::Mode::Enabled;
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return OverlaysParams::Mode::Disabled;
|
||||
}
|
||||
}
|
||||
|
@ -31,10 +31,10 @@ DisplaySchedulerWebView::~DisplaySchedulerWebView() {
|
||||
|
||||
void DisplaySchedulerWebView::ForceImmediateSwapIfPossible() {
|
||||
// We can't swap immediately
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
void DisplaySchedulerWebView::SetNeedsOneBeginFrame(bool needs_draw) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
void DisplaySchedulerWebView::DidSwapBuffers() {
|
||||
DCHECK_CALLED_ON_VALID_THREAD(thread_checker_);
|
||||
|
@ -117,13 +117,13 @@ SkiaOutputSurfaceDependencyWebView::CreateGLSurface(
|
||||
|
||||
base::ScopedClosureRunner SkiaOutputSurfaceDependencyWebView::CachePresenter(
|
||||
gl::Presenter* presenter) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return base::ScopedClosureRunner();
|
||||
}
|
||||
|
||||
base::ScopedClosureRunner SkiaOutputSurfaceDependencyWebView::CacheGLSurface(
|
||||
gl::GLSurface* surface) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return base::ScopedClosureRunner();
|
||||
}
|
||||
|
||||
|
@ -68,7 +68,7 @@ void TaskForwardingSequence::ScheduleOrRetainTask(
|
||||
// Should not be called because tasks aren't reposted to wait for sync tokens,
|
||||
// or for yielding execution since ShouldYield() returns false.
|
||||
void TaskForwardingSequence::ContinueTask(base::OnceClosure task) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
// Method to wrap scheduled task with the order number processing required for
|
||||
|
@ -109,7 +109,7 @@ void IconHelper::DidUpdateFaviconURL(
|
||||
// Silently ignore it. Only trigger a callback on valid icons.
|
||||
break;
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
@ -48,7 +48,7 @@ const char* SchemeEnumToString(VisibilityMetricsLogger::Scheme scheme) {
|
||||
case VisibilityMetricsLogger::Scheme::kIntent:
|
||||
return "intent";
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
return "";
|
||||
}
|
||||
|
@ -119,7 +119,7 @@ void AwProxyConfigMonitor::OnProxyConfigChanged(
|
||||
net::ProxyConfigWithAnnotation::CreateDirect());
|
||||
break;
|
||||
case net::ProxyConfigService::CONFIG_PENDING:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
@ -552,7 +552,7 @@ void InterceptedRequest::InterceptResponseReceived(
|
||||
committed_mode = CommittedRequestedWithHeaderMode::kConstantWebview;
|
||||
break;
|
||||
default:
|
||||
NOTREACHED()
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "Invalid enum value for AwSettings:RequestedWithHeaderMode: "
|
||||
<< requested_with_header_mode;
|
||||
}
|
||||
|
@ -22,7 +22,7 @@ bool MatchRealm(const std::string& realm, RealmRestriction restriction) {
|
||||
case ALLOW_ANY_REALM:
|
||||
return true;
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
@ -96,7 +96,7 @@ void AwUrlCheckerDelegateImpl::
|
||||
StartObservingInteractionsForDelayedBlockingPageHelper(
|
||||
const security_interstitials::UnsafeResource& resource,
|
||||
bool is_main_frame) {
|
||||
NOTREACHED() << "Delayed warnings not implemented for WebView";
|
||||
NOTREACHED_IN_MIGRATION() << "Delayed warnings not implemented for WebView";
|
||||
}
|
||||
|
||||
bool AwUrlCheckerDelegateImpl::IsUrlAllowlisted(const GURL& url) {
|
||||
@ -274,7 +274,7 @@ void AwUrlCheckerDelegateImpl::DoApplicationResponse(
|
||||
proceed = false;
|
||||
break;
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
if (!proceed) {
|
||||
|
@ -115,7 +115,7 @@ bool g_enabled;
|
||||
|
||||
void EnableCrashReporter(const std::string& process_type) {
|
||||
if (g_enabled) {
|
||||
NOTREACHED() << "EnableCrashReporter called more than once";
|
||||
NOTREACHED_IN_MIGRATION() << "EnableCrashReporter called more than once";
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -25,7 +25,7 @@ bool NativeInit(base::android::LibraryProcessType library_process_type) {
|
||||
LOG(FATAL) << "WebView cannot be started with a browser process type.";
|
||||
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
@ -41,7 +41,7 @@ AwComponentInstallerPolicy::AwComponentInstallerPolicy() = default;
|
||||
|
||||
void AwComponentInstallerPolicy::OnCustomUninstall() {
|
||||
// Uninstallation isn't supported in WebView.
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
// Copy the components file from `install_dir` to the serving directory of the
|
||||
|
@ -21,7 +21,7 @@ AwDrawFnRenderMode QueryRenderMode() {
|
||||
}
|
||||
|
||||
int CreateFunctor(void* data, AwDrawFnFunctorCallbacks* functor_callbacks) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@ -398,7 +398,7 @@ void LaunchPlatformAppWithCommandLineAndLaunchId(
|
||||
if (!in_kiosk_mode) {
|
||||
LOG(ERROR) << "App with 'kiosk_only' attribute must be run in "
|
||||
<< " ChromeOS kiosk mode.";
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
@ -111,7 +111,7 @@ std::optional<PolicyLevel> GetPolicyLevel(
|
||||
case em::PolicyOptions::UNSET:
|
||||
return std::nullopt;
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return std::nullopt;
|
||||
}
|
||||
|
||||
|
@ -57,7 +57,7 @@ void WifiP2PMetricsLogger::RecordWifiP2POperationResult(
|
||||
base::UmaHistogramEnumeration(kDisconnectP2PGroupHistogram, result);
|
||||
return;
|
||||
}
|
||||
NOTREACHED() << "Unknown WiFi P2P operation type: " << type;
|
||||
NOTREACHED_IN_MIGRATION() << "Unknown WiFi P2P operation type: " << type;
|
||||
}
|
||||
|
||||
// static
|
||||
|
@ -27,7 +27,7 @@ class ProcessImpl : public codelabs::mojom::Process {
|
||||
const std::string&,
|
||||
mojo::PendingAssociatedReceiver<codelabs::mojom::GenericInterface>)
|
||||
override {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
void SayHello() override { LOG(INFO) << "Hello!"; }
|
||||
|
||||
|
@ -633,7 +633,7 @@ class GraphAdjuster : public AdjustmentMethod {
|
||||
prev = curr;
|
||||
|
||||
if (curr->positions_.size() != curr->refs_)
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -464,7 +464,7 @@ bool Shingle::InterningLess::operator()(
|
||||
if (info_a->is_model_ > info_b->is_model_)
|
||||
return false;
|
||||
if (info_a != info_b) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
return false;
|
||||
@ -1000,7 +1000,7 @@ class AssignmentProblem {
|
||||
LOG_ASSERT(n == 1);
|
||||
} else if (pattern->program_histogram_.empty() &&
|
||||
pattern->model_histogram_.empty()) {
|
||||
NOTREACHED(); // Should not come back to life.
|
||||
NOTREACHED_IN_MIGRATION(); // Should not come back to life.
|
||||
} else if (pattern->program_histogram_.empty()) {
|
||||
// Useless pattern.
|
||||
} else {
|
||||
|
@ -42,7 +42,7 @@ const char* CourgetteFlow::name(Group group) {
|
||||
case NEW:
|
||||
return "'new' input";
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
break;
|
||||
}
|
||||
return nullptr;
|
||||
@ -57,7 +57,7 @@ CourgetteFlow::Data* CourgetteFlow::data(Group group) {
|
||||
case NEW:
|
||||
return &data_new_;
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
break;
|
||||
}
|
||||
return nullptr;
|
||||
|
@ -31,7 +31,7 @@ RVA DisassemblerWin32::FileOffsetToRVA(FileOffset file_offset) const {
|
||||
}
|
||||
}
|
||||
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return kNoRVA;
|
||||
}
|
||||
|
||||
@ -55,7 +55,7 @@ FileOffset DisassemblerWin32::RVAToFileOffset(RVA rva) const {
|
||||
if (rva == 0 || rva == 2)
|
||||
return static_cast<FileOffset>(rva);
|
||||
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return kNoFileOffset;
|
||||
}
|
||||
|
||||
@ -161,7 +161,7 @@ bool DisassemblerWin32::ParseHeader() {
|
||||
break;
|
||||
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
if (size_of_image_ >= 0x80000000U)
|
||||
|
@ -68,7 +68,7 @@ LabelVector CreateLabelVectorWithIndexes(const std::string& encoded_index) {
|
||||
if (ch != '.') {
|
||||
// Sanity check for test case.
|
||||
if (ch < 'A' || ch > 'Z' || used_ch.find(ch) != used_ch.end())
|
||||
NOTREACHED() << "Malformed test case: " << encoded_index;
|
||||
NOTREACHED_IN_MIGRATION() << "Malformed test case: " << encoded_index;
|
||||
used_ch.insert(ch);
|
||||
index = ch - 'A';
|
||||
}
|
||||
@ -89,7 +89,7 @@ std::string EncodeLabelIndexes(const LabelVector& labels) {
|
||||
else if (label.index_ >= 0 && label.index_ <= 'Z' - 'A')
|
||||
encoded += static_cast<char>(label.index_ + 'A');
|
||||
else
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
return encoded;
|
||||
}
|
||||
|
@ -51,7 +51,7 @@ class Rel32FinderTestCase {
|
||||
finder_ = std::unique_ptr<Rel32Finder>(
|
||||
new Rel32FinderX86(relocs_start_rva_, relocs_end_rva_));
|
||||
} else {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -38,7 +38,7 @@ size_t HMAC::DigestLength() const {
|
||||
case SHA256:
|
||||
return 32;
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
@ -31,7 +31,7 @@ bool CheckDerivationParameters(SymmetricKey::Algorithm algorithm,
|
||||
return key_size_in_bits % 8 == 0 && key_size_in_bits != 0;
|
||||
}
|
||||
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@ -67,7 +67,7 @@ class SoftwareECDSA : public UnexportableSigningKey {
|
||||
|
||||
#if BUILDFLAG(IS_MAC)
|
||||
SecKeyRef GetSecKeyRef() const override {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return nullptr;
|
||||
}
|
||||
#endif // BUILDFLAG(IS_MAC)
|
||||
|
@ -80,7 +80,7 @@ class DBusStatistics {
|
||||
else if (type == TYPE_SENT_BLOCKING_METHOD_CALLS)
|
||||
++stat->sent_blocking_method_calls;
|
||||
else
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
// Look up the Stat entry in |stats_|. If |add_stat| is true, add a new entry
|
||||
|
@ -80,7 +80,7 @@ std::string Message::GetMessageTypeAsString() {
|
||||
case MESSAGE_ERROR:
|
||||
return "MESSAGE_ERROR";
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return std::string();
|
||||
}
|
||||
|
||||
|
@ -174,7 +174,7 @@ base::Value PopDataAsValue(MessageReader* reader) {
|
||||
}
|
||||
case Message::UNIX_FD: {
|
||||
// Cannot distinguish a file descriptor from an int
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
break;
|
||||
}
|
||||
case Message::ARRAY: {
|
||||
@ -206,7 +206,7 @@ base::Value PopDataAsValue(MessageReader* reader) {
|
||||
}
|
||||
case Message::DICT_ENTRY:
|
||||
// DICT_ENTRY must be popped as an element of an array.
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
break;
|
||||
case Message::VARIANT: {
|
||||
MessageReader sub_reader(nullptr);
|
||||
|
@ -277,7 +277,7 @@ class View : public mojom::View {
|
||||
#else
|
||||
void UpdateBrowserControlsState(bool enable_hiding, bool enable_showing,
|
||||
bool animate) override {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
#endif
|
||||
};
|
||||
|
@ -222,14 +222,14 @@ ExtensionFunction::ResponseValue SettingsFunction::RunWithStorage(
|
||||
ValueStore* storage) {
|
||||
// TODO(crbug.com/40963428): Remove this when RunWithStorage has been removed
|
||||
// from all functions.
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return BadMessage();
|
||||
}
|
||||
|
||||
ExtensionFunction::ResponseValue SettingsFunction::RunInSession() {
|
||||
// TODO(crbug.com/40963428): Remove this when RunWithStorage has been removed
|
||||
// from all functions.
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return BadMessage();
|
||||
}
|
||||
|
||||
|
@ -72,7 +72,7 @@ class ApplicationControllerImplTest
|
||||
|
||||
// chromium_cast::ApplicationContext implementation.
|
||||
void GetMediaSessionId(GetMediaSessionIdCompleter::Sync& completer) override {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
completer.Reply({});
|
||||
}
|
||||
void SetApplicationController(
|
||||
|
@ -131,11 +131,11 @@ bool EventFilter::IsEventAllowed(ui::EventType type) {
|
||||
return true;
|
||||
|
||||
case ui::ET_UMA_DATA:
|
||||
NOTREACHED(); // ChromeOS only.
|
||||
NOTREACHED_IN_MIGRATION(); // ChromeOS only.
|
||||
break;
|
||||
|
||||
case ui::ET_LAST:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
[[fallthrough]];
|
||||
|
||||
case ui::ET_UNKNOWN:
|
||||
|
@ -1532,7 +1532,7 @@ bool FrameImpl::CheckMediaAccessPermission(
|
||||
permission = blink::PermissionType::VIDEO_CAPTURE;
|
||||
break;
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@ -117,7 +117,8 @@ base::Value::List FuchsiaModifiersToWebModifiers(
|
||||
} else if (modifier == fuchsia_ui_input3::Modifiers::kShift) {
|
||||
web_modifiers.Append("Shift");
|
||||
} else {
|
||||
NOTREACHED() << static_cast<uint64_t>(modifier) << " has no web mapping";
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< static_cast<uint64_t>(modifier) << " has no web mapping";
|
||||
}
|
||||
}
|
||||
return web_modifiers;
|
||||
|
@ -74,7 +74,7 @@ void NavigationPolicyThrottle::OnRequestedNavigationEvaluated(
|
||||
// NavigationHandle that owns this NavigationThrottle.
|
||||
break;
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -27,7 +27,7 @@ PreferredColorScheme ThemeTypeToBlinkScheme(ThemeType type) {
|
||||
case ThemeType::DARK:
|
||||
return PreferredColorScheme::kDark;
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return kFallbackColorScheme;
|
||||
}
|
||||
}
|
||||
|
@ -104,7 +104,7 @@ class ThemeManagerTest : public WebEngineBrowserTest,
|
||||
return scheme;
|
||||
}
|
||||
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return "";
|
||||
}
|
||||
|
||||
|
@ -41,7 +41,7 @@ WebEngineAudioDeviceFactory::NewAudioRendererSink(
|
||||
switch (source_type) {
|
||||
case blink::WebAudioDeviceSourceType::kMediaElement:
|
||||
// MediaElement uses NewMixableSink().
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return nullptr;
|
||||
|
||||
case blink::WebAudioDeviceSourceType::kWebRtc:
|
||||
|
@ -412,7 +412,7 @@ void WebEngineAudioRenderer::StopTicking() {
|
||||
switch (GetPlaybackState()) {
|
||||
case PlaybackState::kStopped:
|
||||
case PlaybackState::kPaused:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
break;
|
||||
|
||||
case PlaybackState::kStartPending: {
|
||||
|
@ -74,7 +74,7 @@ class TestDemuxerStream : public media::DemuxerStream {
|
||||
}
|
||||
media::AudioDecoderConfig audio_decoder_config() override { return config_; }
|
||||
media::VideoDecoderConfig video_decoder_config() override {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return media::VideoDecoderConfig();
|
||||
}
|
||||
Type type() const override { return AUDIO; }
|
||||
|
@ -27,7 +27,7 @@ WebEngineRenderFrameObserver::~WebEngineRenderFrameObserver() = default;
|
||||
void WebEngineRenderFrameObserver::OnDestruct() {
|
||||
// We should never hit this since we will have destroyed this observer
|
||||
// in WillDetach.
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
void WebEngineRenderFrameObserver::WillDetach(
|
||||
|
@ -226,7 +226,8 @@ struct Converter<std::vector<T> > {
|
||||
if (!result->CreateDataProperty(context, i, element)
|
||||
.To(&property_created) ||
|
||||
!property_created) {
|
||||
NOTREACHED() << "CreateDataProperty should always succeed here.";
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "CreateDataProperty should always succeed here.";
|
||||
}
|
||||
}
|
||||
return result;
|
||||
@ -276,7 +277,8 @@ struct Converter<v8::LocalVector<T>> {
|
||||
if (!result->CreateDataProperty(context, i, element)
|
||||
.To(&property_created) ||
|
||||
!property_created) {
|
||||
NOTREACHED() << "CreateDataProperty should always succeed here.";
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "CreateDataProperty should always succeed here.";
|
||||
}
|
||||
}
|
||||
return result;
|
||||
|
@ -108,7 +108,7 @@ void PerIsolateData::ClearIndexedPropertyInterceptor(
|
||||
if (it != indexed_interceptors_.end())
|
||||
indexed_interceptors_.erase(it);
|
||||
else
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
void PerIsolateData::ClearNamedPropertyInterceptor(
|
||||
@ -118,7 +118,7 @@ void PerIsolateData::ClearNamedPropertyInterceptor(
|
||||
if (it != named_interceptors_.end())
|
||||
named_interceptors_.erase(it);
|
||||
else
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
IndexedPropertyInterceptor* PerIsolateData::GetIndexedPropertyInterceptor(
|
||||
|
@ -117,11 +117,11 @@ const char* GetSnapshotFileName(const V8SnapshotFileType file_type) {
|
||||
#if BUILDFLAG(USE_V8_CONTEXT_SNAPSHOT)
|
||||
return kV8ContextSnapshotFileName;
|
||||
#else
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return nullptr;
|
||||
#endif
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
|
@ -241,7 +241,7 @@ std::shared_ptr<v8::TaskRunner> V8Platform::GetForegroundTaskRunner(
|
||||
// blink::scheduler::TaskPriority::kLowPriority
|
||||
return data->low_priority_task_runner();
|
||||
default:
|
||||
NOTREACHED() << "Unsupported TaskPriority.";
|
||||
NOTREACHED_IN_MIGRATION() << "Unsupported TaskPriority.";
|
||||
return data->task_runner();
|
||||
}
|
||||
}
|
||||
|
@ -406,7 +406,7 @@ void UrlFetchRequestBase::OnOutputFileClosed(bool success) {
|
||||
}
|
||||
|
||||
void UrlFetchRequestBase::OnRetry(base::OnceClosure start_retry) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
HttpRequestMethod UrlFetchRequestBase::GetRequestType() const {
|
||||
|
@ -64,7 +64,7 @@ const char* GetCorporaString(FilesListCorpora corpora) {
|
||||
case FilesListCorpora::ALL_TEAM_DRIVES:
|
||||
return kCorporaAllTeamDrives;
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return kCorporaDefault;
|
||||
}
|
||||
|
||||
|
@ -752,7 +752,7 @@ void GaiaAuthFetcher::OnOAuth2RevokeTokenFetched(const std::string& data,
|
||||
GetTokenRevocationStatusFromResponseData(data, response_code);
|
||||
break;
|
||||
case net::ERR_IO_PENDING:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
break;
|
||||
case net::ERR_ABORTED:
|
||||
revocation_status =
|
||||
@ -888,6 +888,6 @@ void GaiaAuthFetcher::DispatchFetchedRequest(const GURL& url,
|
||||
} else if (IsReAuthApiUrl(url)) {
|
||||
OnReAuthApiInfoFetched(data, net_error, response_code);
|
||||
} else {
|
||||
NOTREACHED() << "Unknown url: '" << url << "'";
|
||||
NOTREACHED_IN_MIGRATION() << "Unknown url: '" << url << "'";
|
||||
}
|
||||
}
|
||||
|
@ -614,7 +614,7 @@ void GaiaOAuthClient::Core::HandleResponse(std::unique_ptr<std::string> body,
|
||||
}
|
||||
|
||||
case NO_PENDING_REQUEST:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -28,7 +28,7 @@ const char* InvalidCredentialsReasonToString(
|
||||
case InvalidGaiaCredentialsReason::CREDENTIALS_MISSING:
|
||||
return "credentials missing";
|
||||
case InvalidGaiaCredentialsReason::NUM_REASONS:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return "";
|
||||
}
|
||||
}
|
||||
@ -194,7 +194,7 @@ std::string GoogleServiceAuthError::ToString() const {
|
||||
case CHALLENGE_RESPONSE_REQUIRED:
|
||||
return "Service responded with a token binding challenge.";
|
||||
case NUM_STATES:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return std::string();
|
||||
}
|
||||
}
|
||||
|
@ -249,7 +249,7 @@ void OAuth2AccessTokenFetcherImpl::EndGetAccessToken(
|
||||
switch (response) {
|
||||
case kOk:
|
||||
case kOkUnexpectedFormat:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
break;
|
||||
|
||||
case kRateLimitExceeded:
|
||||
@ -289,7 +289,7 @@ void OAuth2AccessTokenFetcherImpl::EndGetAccessToken(
|
||||
if (!error.has_value()) {
|
||||
// Fallback to http status code.
|
||||
if (response_code == net::HTTP_OK) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
} else if (response_code == net::HTTP_FORBIDDEN ||
|
||||
response_code == net::HTTP_PROXY_AUTHENTICATION_REQUIRED ||
|
||||
response_code >= net::HTTP_INTERNAL_SERVER_ERROR) {
|
||||
|
@ -384,7 +384,7 @@ class OAuth2ErrorCodesTest
|
||||
case GoogleServiceAuthError::REQUEST_CANCELED:
|
||||
case GoogleServiceAuthError::CHALLENGE_RESPONSE_REQUIRED:
|
||||
case GoogleServiceAuthError::NUM_STATES:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return GoogleServiceAuthError::AuthErrorNone();
|
||||
}
|
||||
}
|
||||
|
@ -57,7 +57,7 @@ const std::string HttpMethodName(OAuthRequestSigner::HttpMethod method) {
|
||||
case OAuthRequestSigner::POST_METHOD:
|
||||
return "POST";
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return std::string();
|
||||
}
|
||||
|
||||
@ -71,7 +71,7 @@ const std::string SignatureMethodName(
|
||||
case OAuthRequestSigner::PLAINTEXT_SIGNATURE:
|
||||
return "PLAINTEXT";
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return std::string();
|
||||
}
|
||||
|
||||
@ -190,7 +190,7 @@ bool ParseQuery(const std::string& query,
|
||||
parameters[keyword] = value;
|
||||
break;
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
*parameters_result = parameters;
|
||||
return true;
|
||||
@ -283,7 +283,7 @@ bool SignParameters(const GURL& request_base_url,
|
||||
is_signed = SignPlaintext(base, key, &signature);
|
||||
break;
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
if (is_signed)
|
||||
(*parameters)[kOAuthSignatureLabel] = signature;
|
||||
@ -413,7 +413,7 @@ bool OAuthRequestSigner::SignURL(
|
||||
signed_text += BuildBaseStringParameters(parameters);
|
||||
break;
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
*signed_text_return = signed_text;
|
||||
}
|
||||
|
@ -189,7 +189,7 @@ void SetPersistentId(const std::string& persistent_id,
|
||||
set_persistent_id(persistent_id);
|
||||
return;
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
uint32_t GetLastStreamIdReceived(
|
||||
@ -237,7 +237,7 @@ void SetLastStreamIdReceived(uint32_t val,
|
||||
set_last_stream_id_received(val);
|
||||
return;
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
bool HasTTLExpired(const google::protobuf::MessageLite& protobuf,
|
||||
|
@ -48,7 +48,7 @@ SocketInputStream::~SocketInputStream() {
|
||||
|
||||
bool SocketInputStream::Next(const void** data, int* size) {
|
||||
if (GetState() != EMPTY && GetState() != READY) {
|
||||
NOTREACHED() << "Invalid input stream read attempt.";
|
||||
NOTREACHED_IN_MIGRATION() << "Invalid input stream read attempt.";
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@ -39,7 +39,7 @@ std::string StatusToString(AccountMapping::MappingStatus status) {
|
||||
case AccountMapping::REMOVING:
|
||||
return kStatusRemoving;
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return std::string();
|
||||
}
|
||||
|
||||
|
@ -72,7 +72,7 @@ std::string GetCheckinRequestStatusString(CheckinRequestStatus status) {
|
||||
return "Failed: No headers";
|
||||
}
|
||||
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return "Failed: Unknown reason";
|
||||
}
|
||||
|
||||
|
@ -154,7 +154,7 @@ std::string MCSClient::GetStateString() const {
|
||||
case CONNECTED:
|
||||
return "CONNECTED";
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return std::string();
|
||||
}
|
||||
|
||||
|
@ -78,7 +78,7 @@ bool ShouldRetryWithStatus(UnregistrationRequest::Status status) {
|
||||
case UnregistrationRequest::REACHED_MAX_RETRIES:
|
||||
return false;
|
||||
case UnregistrationRequest::UNREGISTRATION_STATUS_COUNT:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
break;
|
||||
}
|
||||
return false;
|
||||
|
@ -254,7 +254,7 @@ int HeadlessShellMain(content::ContentMainParams params) {
|
||||
|
||||
if (!process_type.empty()) {
|
||||
HeadlessChildMain(std::move(params));
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
#if BUILDFLAG(IS_MAC)
|
||||
|
@ -156,7 +156,7 @@ class HeadlessProxyConfigMonitor
|
||||
net::ProxyConfigWithAnnotation::CreateDirect());
|
||||
break;
|
||||
case net::ProxyConfigService::CONFIG_PENDING:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
@ -24,7 +24,7 @@ void ParamTraits<HandleWin>::Write(base::Pickle* m, const param_type& p) {
|
||||
scoped_refptr<IPC::internal::HandleAttachmentWin> attachment(
|
||||
new IPC::internal::HandleAttachmentWin(p.get_handle()));
|
||||
if (!m->WriteAttachment(std::move(attachment)))
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
// static
|
||||
|
@ -92,7 +92,7 @@ class ThreadSafeChannelProxy : public mojo::ThreadSafeProxy {
|
||||
mojo::Message& message,
|
||||
std::unique_ptr<mojo::MessageReceiver> responder) override {
|
||||
// We don't bother supporting this because it's not used in practice.
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
private:
|
||||
|
@ -1174,7 +1174,7 @@ class SimpleTestClientImpl : public IPC::mojom::SimpleTestClient,
|
||||
void BindSync(
|
||||
mojo::PendingAssociatedReceiver<IPC::mojom::SimpleTestClient> receiver,
|
||||
BindSyncCallback callback) override {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
void GetReceiverWithQueuedSyncMessage(
|
||||
@ -1813,7 +1813,7 @@ class ListenerThatVerifiesPeerPid : public TestListenerBase {
|
||||
}
|
||||
|
||||
bool OnMessageReceived(const IPC::Message& message) override {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return true;
|
||||
}
|
||||
};
|
||||
|
@ -382,7 +382,7 @@ bool ChannelNacl::DidEmptyInputBuffers() {
|
||||
void ChannelNacl::HandleInternalMessage(const Message& msg) {
|
||||
// The trusted side IPC::Channel should handle the "hello" handshake; we
|
||||
// should not receive the "Hello" message.
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
// Channel's methods
|
||||
|
@ -291,7 +291,7 @@ void ChannelProxy::Context::OnRemoveFilter(MessageFilter* filter) {
|
||||
}
|
||||
}
|
||||
|
||||
NOTREACHED() << "filter to be removed not found";
|
||||
NOTREACHED_IN_MIGRATION() << "filter to be removed not found";
|
||||
}
|
||||
|
||||
// Called on the listener's thread
|
||||
|
@ -103,7 +103,7 @@ mojo::ScopedHandle MessageAttachment::TakeMojoHandle() {
|
||||
default:
|
||||
break;
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return mojo::ScopedHandle();
|
||||
}
|
||||
|
||||
@ -155,7 +155,7 @@ scoped_refptr<MessageAttachment> MessageAttachment::CreateFromMojoHandle(
|
||||
platform_file, internal::HandleAttachmentWin::FROM_WIRE);
|
||||
}
|
||||
#endif
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
|
@ -48,7 +48,7 @@ class ThreadSafeProxy : public mojo::ThreadSafeProxy {
|
||||
mojo::Message& message,
|
||||
std::unique_ptr<mojo::MessageReceiver> responder) override {
|
||||
// We don't bother supporting this because it's not used in practice.
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
private:
|
||||
|
@ -189,7 +189,8 @@ class MessageT<Meta, std::tuple<Ins...>, std::tuple<Outs...>>
|
||||
bool ok = ReadSendParam(msg, &send_params);
|
||||
Message* reply = SyncMessage::GenerateReply(msg);
|
||||
if (!ok) {
|
||||
NOTREACHED() << "Error deserializing message " << msg->type();
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "Error deserializing message " << msg->type();
|
||||
reply->set_reply_error();
|
||||
sender->Send(reply);
|
||||
return false;
|
||||
@ -213,7 +214,8 @@ class MessageT<Meta, std::tuple<Ins...>, std::tuple<Outs...>>
|
||||
bool ok = ReadSendParam(msg, &send_params);
|
||||
Message* reply = SyncMessage::GenerateReply(msg);
|
||||
if (!ok) {
|
||||
NOTREACHED() << "Error deserializing message " << msg->type();
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "Error deserializing message " << msg->type();
|
||||
reply->set_reply_error();
|
||||
obj->Send(reply);
|
||||
return false;
|
||||
@ -235,7 +237,8 @@ class MessageT<Meta, std::tuple<Ins...>, std::tuple<Outs...>>
|
||||
bool ok = ReadSendParam(msg, &send_params);
|
||||
Message* reply = SyncMessage::GenerateReply(msg);
|
||||
if (!ok) {
|
||||
NOTREACHED() << "Error deserializing message " << msg->type();
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "Error deserializing message " << msg->type();
|
||||
reply->set_reply_error();
|
||||
obj->Send(reply);
|
||||
return false;
|
||||
|
@ -305,7 +305,7 @@ bool ReadValue(const base::Pickle* pickle,
|
||||
break;
|
||||
}
|
||||
default:
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return false;
|
||||
}
|
||||
|
||||
@ -427,7 +427,7 @@ bool ParamTraits<double>::Read(const base::Pickle* m,
|
||||
param_type* r) {
|
||||
const char *data;
|
||||
if (!iter->ReadBytes(&data, sizeof(*r))) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return false;
|
||||
}
|
||||
memcpy(r, data, sizeof(param_type));
|
||||
@ -560,10 +560,10 @@ void ParamTraits<base::FileDescriptor>::Write(base::Pickle* m,
|
||||
if (p.auto_close) {
|
||||
if (!m->WriteAttachment(
|
||||
new internal::PlatformFileAttachment(base::ScopedFD(p.fd))))
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
} else {
|
||||
if (!m->WriteAttachment(new internal::PlatformFileAttachment(p.fd)))
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
@ -615,7 +615,7 @@ void ParamTraits<base::ScopedFD>::Write(base::Pickle* m, const param_type& p) {
|
||||
|
||||
if (!m->WriteAttachment(new internal::PlatformFileAttachment(
|
||||
std::move(const_cast<param_type&>(p))))) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
@ -700,7 +700,7 @@ void ParamTraits<zx::vmo>::Write(base::Pickle* m, const param_type& p) {
|
||||
|
||||
if (!m->WriteAttachment(new internal::HandleAttachmentFuchsia(
|
||||
std::move(const_cast<param_type&>(p))))) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
@ -745,7 +745,7 @@ void ParamTraits<zx::channel>::Write(base::Pickle* m, const param_type& p) {
|
||||
|
||||
if (!m->WriteAttachment(new internal::HandleAttachmentFuchsia(
|
||||
std::move(const_cast<param_type&>(p))))) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
@ -1481,7 +1481,7 @@ bool ParamTraits<MSG>::Read(const base::Pickle* m,
|
||||
memcpy(r, data, sizeof(MSG));
|
||||
} else {
|
||||
result = false;
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
return result;
|
||||
|
@ -168,7 +168,7 @@ class Worker : public Listener, public Sender {
|
||||
}
|
||||
|
||||
virtual void OnNestedTestMsg(Message* reply_msg) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
virtual SyncChannel* CreateChannel() {
|
||||
|
@ -92,7 +92,7 @@ bool SyncMessage::ReadSyncHeader(const Message& msg, SyncHeader* header) {
|
||||
base::PickleIterator iter(msg);
|
||||
bool result = iter.ReadInt(&header->message_id);
|
||||
if (!result) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@ -16,7 +16,7 @@ namespace IPC {
|
||||
void ParamTraits<MachPortMac>::Write(base::Pickle* m, const param_type& p) {
|
||||
if (!m->WriteAttachment(
|
||||
new IPC::internal::MachPortAttachmentMac(p.get_mach_port()))) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -14,13 +14,13 @@ MessageRouter::MessageRouter() = default;
|
||||
MessageRouter::~MessageRouter() = default;
|
||||
|
||||
bool MessageRouter::OnControlMessageReceived(const IPC::Message& msg) {
|
||||
NOTREACHED()
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "should override in subclass if you care about control messages";
|
||||
return false;
|
||||
}
|
||||
|
||||
bool MessageRouter::Send(IPC::Message* msg) {
|
||||
NOTREACHED()
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "should override in subclass if you care about sending messages";
|
||||
return false;
|
||||
}
|
||||
|
@ -22,7 +22,7 @@ IPC::MessageAttachment::Type TypeConverter<
|
||||
case native::SerializedHandleType::FUCHSIA_HANDLE:
|
||||
return IPC::MessageAttachment::Type::FUCHSIA_HANDLE;
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return IPC::MessageAttachment::Type::MOJO_HANDLE;
|
||||
}
|
||||
|
||||
@ -42,7 +42,7 @@ native::SerializedHandleType TypeConverter<
|
||||
case IPC::MessageAttachment::Type::FUCHSIA_HANDLE:
|
||||
return native::SerializedHandleType::FUCHSIA_HANDLE;
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return native::SerializedHandleType::MOJO_HANDLE;
|
||||
}
|
||||
|
||||
|
@ -83,7 +83,7 @@ float Fps2MaxQP(float fps) {
|
||||
kFPS2QPTradeoffs[i].qp, kFPS2QPTradeoffs[i + 1].qp);
|
||||
}
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return 0.0f;
|
||||
}
|
||||
|
||||
@ -98,7 +98,7 @@ float MaxQP2Fps(int max_qp) {
|
||||
return kFPS2QPTradeoffs[i + 1].fps;
|
||||
}
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return 0.0f;
|
||||
}
|
||||
} // namespace
|
||||
|
@ -114,7 +114,7 @@ struct IpczMessage : public Channel::Message {
|
||||
// Channel::Message:
|
||||
void SetHandles(std::vector<PlatformHandle>) override { NOTREACHED(); }
|
||||
void SetHandles(std::vector<PlatformHandleInTransit>) override {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
std::vector<PlatformHandleInTransit> TakeHandles() override {
|
||||
return std::move(handles_);
|
||||
@ -123,13 +123,13 @@ struct IpczMessage : public Channel::Message {
|
||||
|
||||
const void* data() const override { return data_.get(); }
|
||||
void* mutable_data() const override {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return nullptr;
|
||||
}
|
||||
size_t capacity() const override { return size_; }
|
||||
|
||||
bool ExtendPayload(size_t) override {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return false;
|
||||
}
|
||||
|
||||
@ -1112,7 +1112,7 @@ MOJO_SYSTEM_IMPL_EXPORT bool Channel::SupportsChannelUpgrade() {
|
||||
}
|
||||
|
||||
MOJO_SYSTEM_IMPL_EXPORT void Channel::OfferChannelUpgrade() {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return;
|
||||
}
|
||||
#endif
|
||||
|
@ -61,7 +61,7 @@ void KernelVersionNumbers(int32_t* major_version,
|
||||
int32_t* bugfix_version) {
|
||||
struct utsname info;
|
||||
if (uname(&info) < 0) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
*major_version = 0;
|
||||
*minor_version = 0;
|
||||
*bugfix_version = 0;
|
||||
|
@ -62,7 +62,7 @@ class ChannelMac : public Channel,
|
||||
} else if (channel_handle.is_mach_receive()) {
|
||||
receive_port_ = channel_handle.TakeMachReceiveRight();
|
||||
} else {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
}
|
||||
|
||||
@ -212,7 +212,7 @@ class ChannelMac : public Channel,
|
||||
DCHECK(send_port_ == MACH_PORT_NULL);
|
||||
// Wait for the received message via the MessageLoop.
|
||||
} else {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
base::CurrentThread::Get()->AddDestructionObserver(this);
|
||||
@ -428,8 +428,8 @@ class ChannelMac : public Channel,
|
||||
break;
|
||||
}
|
||||
default:
|
||||
NOTREACHED() << "Unsupported handle type "
|
||||
<< static_cast<int>(handle.type());
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "Unsupported handle type " << static_cast<int>(handle.type());
|
||||
OnWriteErrorLocked(Error::kDisconnected);
|
||||
}
|
||||
}
|
||||
|
@ -104,7 +104,7 @@ MojoResult GetMojoWriteResultForIpczPut(IpczResult result) {
|
||||
extern "C" {
|
||||
|
||||
MojoResult MojoInitializeIpcz(const struct MojoInitializeOptions* options) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return MOJO_RESULT_OK;
|
||||
}
|
||||
|
||||
@ -729,7 +729,7 @@ MojoResult MojoUnwrapPlatformSharedMemoryRegionIpcz(
|
||||
break;
|
||||
default:
|
||||
*access_mode = MOJO_PLATFORM_SHARED_MEMORY_REGION_ACCESS_MODE_READ_ONLY;
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
}
|
||||
|
||||
std::ignore = ipcz_driver::SharedBuffer::Unbox(mojo_handle);
|
||||
@ -844,7 +844,7 @@ MojoResult MojoQueryQuotaIpcz(MojoHandle handle,
|
||||
}
|
||||
|
||||
MojoResult MojoShutdownIpcz(const MojoShutdownOptions* options) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return MOJO_RESULT_OK;
|
||||
}
|
||||
|
||||
|
@ -22,7 +22,8 @@ mojo::core::Core* g_core;
|
||||
extern "C" {
|
||||
|
||||
MojoResult MojoInitializeImpl(const struct MojoInitializeOptions* options) {
|
||||
NOTREACHED() << "Do not call MojoInitialize() as a Mojo Core embedder!";
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "Do not call MojoInitialize() as a Mojo Core embedder!";
|
||||
return MOJO_RESULT_UNIMPLEMENTED;
|
||||
}
|
||||
|
||||
@ -354,7 +355,8 @@ MojoResult MojoQueryQuotaImpl(MojoHandle handle,
|
||||
}
|
||||
|
||||
MojoResult MojoShutdownImpl(const MojoShutdownOptions* options) {
|
||||
NOTREACHED() << "Do not call MojoShutdown() as a Mojo Core embedder!";
|
||||
NOTREACHED_IN_MIGRATION()
|
||||
<< "Do not call MojoShutdown() as a Mojo Core embedder!";
|
||||
return MOJO_RESULT_UNIMPLEMENTED;
|
||||
}
|
||||
|
||||
|
@ -34,7 +34,7 @@ const char* GetNameForDispatcherType(Dispatcher::Type type) {
|
||||
case Dispatcher::Type::INVITATION:
|
||||
return "invitation";
|
||||
}
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return "unknown";
|
||||
}
|
||||
|
||||
|
@ -180,7 +180,7 @@ base::WritableSharedMemoryRegion BaseSharedMemoryService::CreateWritableRegion(
|
||||
#else
|
||||
// The shared memory service is not needed on other platforms, so this method
|
||||
// should never be called.
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return {};
|
||||
#endif
|
||||
}
|
||||
|
@ -343,7 +343,7 @@ MojoResult MojoTrap::Arm(MojoTrapEvent* blocking_events,
|
||||
}
|
||||
|
||||
if (result != IPCZ_RESULT_FAILED_PRECONDITION) {
|
||||
NOTREACHED();
|
||||
NOTREACHED_IN_MIGRATION();
|
||||
return result;
|
||||
}
|
||||
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user