summaryrefslogtreecommitdiffstats
path: root/net
diff options
context:
space:
mode:
authorwillchan@chromium.org <willchan@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-05-04 23:47:02 +0000
committerwillchan@chromium.org <willchan@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-05-04 23:47:02 +0000
commit0e88ad60a68c0be910d458564e1121877e85ee7e (patch)
treec56dd813a143f6eda8608fae75737bbd60c3b9d8 /net
parent6ef414fef2fc84004a3a7da1b1e513700fb24018 (diff)
downloadchromium_src-0e88ad60a68c0be910d458564e1121877e85ee7e.zip
chromium_src-0e88ad60a68c0be910d458564e1121877e85ee7e.tar.gz
chromium_src-0e88ad60a68c0be910d458564e1121877e85ee7e.tar.bz2
Add ssl into the key for ClientSocketPools.
I chose to use "ssl" instead of "http" and "https" in the connection group string so as not to confuse terminology with spdy which will be over ssl. BUG=43218 TEST=gutschke.com:8888 shouldn't crash Review URL: http://codereview.chromium.org/1951005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@46414 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net')
-rw-r--r--net/http/http_network_transaction.cc3
-rw-r--r--net/http/http_network_transaction_unittest.cc16
2 files changed, 11 insertions, 8 deletions
diff --git a/net/http/http_network_transaction.cc b/net/http/http_network_transaction.cc
index 9a65d13..b0a6ac9 100644
--- a/net/http/http_network_transaction.cc
+++ b/net/http/http_network_transaction.cc
@@ -755,6 +755,9 @@ int HttpNetworkTransaction::DoInitConnection() {
connection_group = endpoint_.ToString();
DCHECK(!connection_group.empty());
+ if (using_ssl_)
+ connection_group = StringPrintf("ssl/%s", connection_group.c_str());
+
// If the user is refreshing the page, bypass the host cache.
bool disable_resolver_cache = request_->load_flags & LOAD_BYPASS_CACHE ||
request_->load_flags & LOAD_DISABLE_CACHE;
diff --git a/net/http/http_network_transaction_unittest.cc b/net/http/http_network_transaction_unittest.cc
index e0b1bfc..8f0528a 100644
--- a/net/http/http_network_transaction_unittest.cc
+++ b/net/http/http_network_transaction_unittest.cc
@@ -3759,17 +3759,17 @@ TEST_F(HttpNetworkTransactionTest, GroupNameForDirectConnections) {
{
"", // unused
"https://www.google.com/direct_ssl",
- "www.google.com:443",
+ "ssl/www.google.com:443",
},
{
"", // unused
"https://[2001:1418:13:1::25]/direct",
- "[2001:1418:13:1::25]:443",
+ "ssl/[2001:1418:13:1::25]:443",
},
{
"", // unused
"http://host.with.alternate/direct",
- "host.with.alternate:443",
+ "ssl/host.with.alternate:443",
},
};
@@ -3805,13 +3805,13 @@ TEST_F(HttpNetworkTransactionTest, GroupNameForHTTPProxyConnections) {
{
"http_proxy",
"https://www.google.com/http_connect_ssl",
- "www.google.com:443",
+ "ssl/www.google.com:443",
},
{
"http_proxy",
"http://host.with.alternate/direct",
- "host.with.alternate:443",
+ "ssl/host.with.alternate:443",
},
};
@@ -3854,18 +3854,18 @@ TEST_F(HttpNetworkTransactionTest, GroupNameForSOCKSConnections) {
{
"socks4://socks_proxy:1080",
"https://www.google.com/socks4_ssl",
- "socks4/www.google.com:443",
+ "socks4/ssl/www.google.com:443",
},
{
"socks5://socks_proxy:1080",
"https://www.google.com/socks5_ssl",
- "socks5/www.google.com:443",
+ "socks5/ssl/www.google.com:443",
},
{
"socks4://socks_proxy:1080",
"http://host.with.alternate/direct",
- "socks4/host.with.alternate:443",
+ "socks4/ssl/host.with.alternate:443",
},
};