Remove ChannelIDService from the socket and HTTP layers.

This gets it out of the way of SSL state cleanup work.

Bug: 875053
Change-Id: If56c7857c3c82bbb379e15bfd36e55e11a26f5ed
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1530118
Commit-Queue: David Benjamin <[email protected]>
Reviewed-by: Sean Topping <[email protected]>
Reviewed-by: Nick Harper <[email protected]>
Reviewed-by: Matt Menke <[email protected]>
Reviewed-by: Rohit Rao <[email protected]>
Cr-Commit-Position: refs/heads/master@{#643077}
diff --git a/net/http/http_network_session.cc b/net/http/http_network_session.cc
index 4a953ac..226b22a 100644
--- a/net/http/http_network_session.cc
+++ b/net/http/http_network_session.cc
@@ -45,9 +45,9 @@
     const HttpNetworkSession::Context& context,
     SSLClientSessionCache* ssl_client_session_cache) {
   return SSLClientSocketContext(
-      context.cert_verifier, context.channel_id_service,
-      context.transport_security_state, context.cert_transparency_verifier,
-      context.ct_policy_enforcer, ssl_client_session_cache);
+      context.cert_verifier, context.transport_security_state,
+      context.cert_transparency_verifier, context.ct_policy_enforcer,
+      ssl_client_session_cache);
 }
 
 }  // unnamed namespace
@@ -146,7 +146,6 @@
     : client_socket_factory(nullptr),
       host_resolver(nullptr),
       cert_verifier(nullptr),
-      channel_id_service(nullptr),
       transport_security_state(nullptr),
       cert_transparency_verifier(nullptr),
       ct_policy_enforcer(nullptr),