[quiche] Clean up single-arg `testing::Invoke()`s
Deprecated by cl/795969677. This CL should be a no-op.
PiperOrigin-RevId: 803179570
diff --git a/quiche/blind_sign_auth/blind_sign_auth_test.cc b/quiche/blind_sign_auth/blind_sign_auth_test.cc
index d024cc4..8322e37 100644
--- a/quiche/blind_sign_auth/blind_sign_auth_test.cc
+++ b/quiche/blind_sign_auth/blind_sign_auth_test.cc
@@ -40,7 +40,6 @@
using ::testing::_;
using ::testing::Eq;
using ::testing::InSequence;
-using ::testing::Invoke;
using ::testing::Unused;
class MockBlindSignTracingHooks : public BlindSignTracingHooks {
@@ -407,15 +406,15 @@
DoRequest(Eq(BlindSignMessageRequestType::kAuthAndSign),
Eq(oauth_token_), _, _))
.Times(1)
- .WillOnce(Invoke([this](Unused, Unused, const std::string& body,
- BlindSignMessageCallback callback) {
+ .WillOnce([this](Unused, Unused, const std::string& body,
+ BlindSignMessageCallback callback) {
CreateSignResponse(body, false);
// Add an invalid signature that can't be Base64 decoded.
sign_response_.add_blinded_token_signature("invalid_signature%");
BlindSignMessageResponse response(absl::StatusCode::kOk,
sign_response_.SerializeAsString());
std::move(callback)(response);
- }));
+ });
}
int num_tokens = 1;
@@ -456,13 +455,13 @@
DoRequest(Eq(BlindSignMessageRequestType::kAuthAndSign),
Eq(oauth_token_), _, _))
.Times(1)
- .WillOnce(Invoke([this](Unused, Unused, const std::string& body,
- BlindSignMessageCallback callback) {
+ .WillOnce([this](Unused, Unused, const std::string& body,
+ BlindSignMessageCallback callback) {
CreateSignResponse(body, /*use_privacy_pass=*/true);
BlindSignMessageResponse response(absl::StatusCode::kOk,
sign_response_.SerializeAsString());
std::move(callback)(response);
- }));
+ });
EXPECT_CALL(*mock_tracing_hooks, OnAuthAndSignEnd);
EXPECT_CALL(*mock_tracing_hooks, OnUnblindTokensStart);
EXPECT_CALL(*mock_tracing_hooks, OnUnblindTokensEnd);
@@ -544,8 +543,8 @@
DoRequest(Eq(BlindSignMessageRequestType::kAuthAndSign),
Eq(oauth_token_), _, _))
.Times(1)
- .WillOnce(Invoke([this](Unused, Unused, const std::string& body,
- BlindSignMessageCallback callback) {
+ .WillOnce([this](Unused, Unused, const std::string& body,
+ BlindSignMessageCallback callback) {
// Create response for the requested number of tokens (1).
CreateSignResponse(body, /*use_privacy_pass=*/true);
ASSERT_EQ(sign_response_.blinded_token_signature_size(), 1);
@@ -557,7 +556,7 @@
BlindSignMessageResponse response(absl::StatusCode::kOk,
sign_response_.SerializeAsString());
std::move(callback)(response);
- }));
+ });
}
int num_tokens_requested = 1;
@@ -600,8 +599,8 @@
DoRequest(Eq(BlindSignMessageRequestType::kAuthAndSign),
Eq(oauth_token_), _, _))
.Times(1)
- .WillOnce(Invoke([this](Unused, Unused, const std::string& body,
- BlindSignMessageCallback callback) {
+ .WillOnce([this](Unused, Unused, const std::string& body,
+ BlindSignMessageCallback callback) {
// Create response for the requested number of tokens (2).
CreateSignResponse(body, /*use_privacy_pass=*/true);
// Modify the response to only contain 1 signature.
@@ -612,7 +611,7 @@
BlindSignMessageResponse response(absl::StatusCode::kOk,
sign_response_.SerializeAsString());
std::move(callback)(response);
- }));
+ });
}
int num_tokens_requested = 2;
@@ -657,14 +656,14 @@
mock_message_interface_,
DoRequest(Eq(BlindSignMessageRequestType::kAttestAndSign), _, _, _))
.Times(1)
- .WillOnce(Invoke([this](Unused, Unused, const std::string& body,
- BlindSignMessageCallback attest_callback) {
+ .WillOnce([this](Unused, Unused, const std::string& body,
+ BlindSignMessageCallback attest_callback) {
CreateAttestAndSignResponse(body);
BlindSignMessageResponse response(
absl::StatusCode::kOk,
attest_and_sign_response_.SerializeAsString());
std::move(attest_callback)(response);
- }));
+ });
}
AttestationDataCallback attestation_callback =