| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
| |
This CL renames the existing API to GetURLRTTEstimate(). In
the next CL, another API GetTransportRTTEstimate() will
be added that computes RTT at the transport layer.
BUG=502428
Review URL: https://codereview.chromium.org/1815503002
Cr-Commit-Position: refs/heads/master@{#383320}
|
|
|
|
|
|
|
|
| |
BUG=548423
Review URL: https://codereview.chromium.org/1833803002
Cr-Commit-Position: refs/heads/master@{#383207}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Start using tls-server-end-point channel bindings for HTTP
authentication if a certificate is available. The current implementation
should work on Windows and Posix. Currently only SHA-256, SHA-384, and
SHA-512 are supported for generating channel bindings.
BUG=270219
R=rsleevi@chromium.org,davidben@chromium.org
Review URL: https://codereview.chromium.org/1408433006
Cr-Commit-Position: refs/heads/master@{#382858}
|
|
|
|
|
|
|
|
|
|
| |
accounts.google.com
BUG=548423
Review URL: https://codereview.chromium.org/1818023003
Cr-Commit-Position: refs/heads/master@{#382665}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This patch brings our "SameSite" implementation into line with
https://tools.ietf.org/html/draft-west-first-party-cookies-06 by teaching
CookieOptions about strict and lax request modes, and teaching URLRequestHttpJob
about the registrable-domain behaviors of both.
BUG=459154
CQ_INCLUDE_TRYBOTS=tryserver.chromium.linux:linux_site_isolation
Review URL: https://codereview.chromium.org/1783813002
Cr-Commit-Position: refs/heads/master@{#382277}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Move quic_process_packet_interface.h from epoll_quic_tools to simple_quic_tools. This abstract interface is used in both places, and the dependency goes in the opposite direction as it was used before.
Added some "nogncheck" annotations on headers conditionally included where the conditional dependencies correctly match the conditional includes.
Add some websockets headers to the shared net sources target. As explained in the comment I added there, the these headers are used but there are no link-time dependencies so the websockets implementation can still be conditionally excluded. I prefer this method rather than a nogncheck annotation when there's no clear conditional include.
Removed an unused FTP include from url_request_context_storage.cc
Review URL: https://codereview.chromium.org/1812243002
Cr-Commit-Position: refs/heads/master@{#382119}
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This CL adds an option to disable
net::BidirectionalStreamQuicImpl in net::HttpNetworkSession.
When the flag is set to true, alternative service job will
not be negotiated.
BUG=584338
Review URL: https://codereview.chromium.org/1796253002
Cr-Commit-Position: refs/heads/master@{#382084}
|
|
|
|
|
|
|
|
|
|
|
| |
This changes the macro used to be USE_NSS_VERIFIER and modifies build
files to no longer assume iOS is using NSS.
BUG=591545
Review URL: https://codereview.chromium.org/1808963004
Cr-Commit-Position: refs/heads/master@{#382077}
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Nothing is currently using it, and currently HttpNetworkSessions
can be shared by URLRequestContexts with different NetworkDelegates,
so best to remove the field.
TBR=zea@chromium.org, mkwst@chromium.org
BUG=none
Review URL: https://codereview.chromium.org/1811283004
Cr-Commit-Position: refs/heads/master@{#382031}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
https://tools.ietf.org/html/draft-west-first-party-cookies-06 introduced
the notion of "Strict" or "Lax" enforcement of the "SameSite" attribute.
This patch implements the infrastructure changes necessary to support
that distinction, but does not yet implement the behavioral change
(that is, after this patch, `SameSite` will be rejected, while
`SameSite=Strict` and `SameSite=Lax` will have the same behavior that
`SameSite` alone has today).
Most of this patch is occupied with the fairly mechanical process of
swapping out a new 'CookieSameSite' enum for the existing boolean in
various constructors and setters. The most interesting piece is the
change to the storage backend, which now stores 0, 1, or 2 in the
database to represent the possible values, rather than 0 or 1 to
represent the boolean.
BUG=459154
Review URL: https://codereview.chromium.org/1773133002
Cr-Commit-Position: refs/heads/master@{#381201}
|
|
|
|
|
|
|
|
|
|
|
| |
This annotation will silence warnings from LSan.
BUG=594130
TBR=cbentzel@chromium.org
Review URL: https://codereview.chromium.org/1792563003
Cr-Commit-Position: refs/heads/master@{#380856}
|
|
|
|
|
|
|
|
|
|
|
|
| |
net::TestURLRequestContext::ct_policy_enforcer_.
r380368 was not enough, as there are two ctors.
TBR=estark@chromium.org
Review URL: https://codereview.chromium.org/1772343006
Cr-Commit-Position: refs/heads/master@{#380396}
|
|
|
|
|
|
|
|
|
|
| |
This got left out of r380322.
TBR=estark@chromium.org
Review URL: https://codereview.chromium.org/1781663005
Cr-Commit-Position: refs/heads/master@{#380368}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This CL implements the skeleton of Expect CT reporting, which will
eventually send reports when an opted-in site fails to conform to CT
policy as determined by CertPolicyEnforcer. Introduces a new
TransportSecurityState interface called ExpectCTReporter
for observing CT policy violations that pass through
URLRequestHTTPJob. There is a skeleton implementation called
ChromeExpectCTReporter in chrome/browser/ssl which will eventually
use a net::CertificateReportSender to send reports.
BUG=568806
Review URL: https://codereview.chromium.org/1579063002
Cr-Commit-Position: refs/heads/master@{#380322}
|
|
|
|
|
|
|
|
|
|
| |
URLRequestHttpJob logging
BUG=548423
Review URL: https://codereview.chromium.org/1770983002
Cr-Commit-Position: refs/heads/master@{#380299}
|
|
|
|
|
|
|
|
| |
BUG=548423
Review URL: https://codereview.chromium.org/1745373002
Cr-Commit-Position: refs/heads/master@{#380165}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This adds a new LinkHeaderResourceThrottle resource throttle which inspects
responses for Link headers, and tries to install a service worker when a
header with rel=serviceworker is encountered.
This implements the HTTP header part of the spec change discussed at
https://github.com/slightlyoff/ServiceWorker/issues/685
Even though this code doesn't live in blink, the feature is still guarded
by the experimental web platform features flag.
BUG=582310
Review URL: https://codereview.chromium.org/1736143002
Cr-Commit-Position: refs/heads/master@{#380035}
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This has caused a number of issues in the past, and having
defined lifecycles for objects makes code easier to reason
about and maintain.
BUG=472744
TBR=alexclarke@chromium.org, creis@chromium.org
Review URL: https://codereview.chromium.org/1701063002
Cr-Commit-Position: refs/heads/master@{#379588}
|
|
|
|
|
|
|
|
|
|
|
| |
Also fix some comments that refer to the old Pass() helper.
BUG=557422
TBR=darin@chromium.org
Review URL: https://codereview.chromium.org/1759223002
Cr-Commit-Position: refs/heads/master@{#379162}
|
|
|
|
|
|
|
|
|
|
| |
POST requests are non-dempotent, so clients using the Data Reduction Proxy (DRP) can often end up at an error page due to the fact that if the DRP has any problems connecting to the origin, DRP and the client will not be safely able to determine if the post successfully made it to the server. The impact of this change on data compression should be very limited, and it will improve the client's experience.
BUG=581750
Review URL: https://codereview.chromium.org/1684123004
Cr-Commit-Position: refs/heads/master@{#379137}
|
|
|
|
|
|
|
|
|
|
| |
URLRequestContext.
BUG=590251
Review URL: https://codereview.chromium.org/1764493002
Cr-Commit-Position: refs/heads/master@{#379112}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Proxy Enabled
The Cronet test,
CronetUrlRequestContextTest#testDataReductionProxyEnabled
started to fail as a result of
https://codereview.chromium.org/1680893002
This fix creates a DataReductionProxyDelegate for Cronet
when built with the data_reduction build flag.
The test relied on having
DataReductionProxyNetworkDelegate handle the
proxy resolution before, but that work is now
handled by DataReductionProxyDelegate.
BUG=589600
Review URL: https://codereview.chromium.org/1725123005
Cr-Commit-Position: refs/heads/master@{#378337}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
scoped_ptr<Request>* rather than a RequestHandle* (patchset #11 id:200001 of https://codereview.chromium.org/1439053002/ )
Reason for revert:
Top crasher on Canary has PAC script cancellation on callstack. Very likely a bug or interaction with this CL.
Reverting until I have a chance to fully investigate.
Original issue's description:
> Change ProxyResolver::GetProxyForURL() to take a scoped_ptr<Request>* rather than a RequestHandle*
>
> * ProxyResolver::GetProxyForURL() fills a |scoped_pointer<Request>*|
> rather than a |void*|
> * ProxyResolver::CancelRequest(void*) has been removed. Requests
> are instead cancelled by resetting the scoped_ptr<Request>.
>
> This makes for less error prone code as cancellation of
> requests is automatic when the
> scoped_ptr<Request> goes out of scope.
> ProxyResolver::GetLoadState() is removed and replaced
> by Request::GetLoadState().
>
> Also made some renaming, as there were similar class
> named Job or Request. Now they are all Job and this new thing
> is Request.
>
> Referencing by address to object in vector was not wise in net/proxy/mojo_proxy_resolver_impl_unittest.cc which is now fixed by using scoped_ptrs in that vector.
>
> BUG=478934
>
> Committed: https://crrev.com/a750e126346aa42df1b0cbc2ae6a58abbe7a5069
> Cr-Commit-Position: refs/heads/master@{#377856}
TBR=davidben@chromium.org,olli.raula@intel.com
# Not skipping CQ checks because original CL landed more than 1 days ago.
BUG=478934
Review URL: https://codereview.chromium.org/1745133002
Cr-Commit-Position: refs/heads/master@{#378274}
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This patch adds out of line copy constructors for classes that our
clang-plugin considers heavy. This is an effort to enable copy
constructor checks by default.
BUG=436357
R=agl@chromium.org, dcheng@chromium.org, thakis@chromium.org
Review URL: https://codereview.chromium.org/1728333003
Cr-Commit-Position: refs/heads/master@{#377976}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
than a RequestHandle*
* ProxyResolver::GetProxyForURL() fills a |scoped_pointer<Request>*|
rather than a |void*|
* ProxyResolver::CancelRequest(void*) has been removed. Requests
are instead cancelled by resetting the scoped_ptr<Request>.
This makes for less error prone code as cancellation of
requests is automatic when the
scoped_ptr<Request> goes out of scope.
ProxyResolver::GetLoadState() is removed and replaced
by Request::GetLoadState().
Also made some renaming, as there were similar class
named Job or Request. Now they are all Job and this new thing
is Request.
Referencing by address to object in vector was not wise in net/proxy/mojo_proxy_resolver_impl_unittest.cc which is now fixed by using scoped_ptrs in that vector.
BUG=478934
Review URL: https://codereview.chromium.org/1439053002
Cr-Commit-Position: refs/heads/master@{#377856}
|
|
|
|
|
|
|
|
|
|
|
| |
BUG=586393
URLRequestFileDirJob::FillReadBuffer() to return bytes reads if it really reads data.
If list_complete, returns list_complete_result_, and otherwise ERR_IO_PENDING.
Review URL: https://codereview.chromium.org/1702713004
Cr-Commit-Position: refs/heads/master@{#377689}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This sets the default minimum TLS fallback version to TLS 1.2. The code is
retained for now to support a resurrected SSLVersionFallbackMin admin policy.
The policy is set to expire in Chrome 53, matching the timeline for the
previous fallback removal. As an escape hatch (but I don't expect to need it),
it's also connected to a field trial.
This also tweaks the fallback code. The TLS 1.0 fallback leg is now completely
gone (the admin policy expired) and ERR_SSL_FALLBACK_BEYOND_MINIMUM_VERSION
hits have leveled off (see Net.ErrorCodesForMainFrame3), cap the fallback code
to TLS 1.1. We will no longer even try TLS 1.0 ClientHellos for the purposes of
showing the error code. This will decrease the amount of time it takes to show
an error page in some cases.
The ssl_version_fallback_min toggle is also tweaked to reject all values below
TLS 1.1, so that the resurrected admin policy cannot be used to set the value
at TLS 1.0 again. (Though it would be moot due to the above change.)
We'll also want to add a link to some to-be-written Help Center article on the
error page, but that'll be done separately after chatting with UI folks.
BUG=536200,583787
Review URL: https://codereview.chromium.org/1682623002
Cr-Commit-Position: refs/heads/master@{#377352}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This patch moves the last function in net_util.h into url_util.h. We are
moving it there because it also operates on a URL part (host).
BUG=488531
TEST=net_unittests --gtest_filter=UrlUtilTest.IsLocalhost
R=eroman@chromium.org
TBR=darin@chromium.org
Review URL: https://codereview.chromium.org/1726693002
Cr-Commit-Position: refs/heads/master@{#377115}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This refactors URLRequestHttpJob's cookie retrieval code to grab cookies
once for a request, rather than requesting it once, checking cookie
permissions, then throwing the data away and requesting it again.
BUG=581650
R=mmenke@chromium.org,rdsmith@chromium.org
CQ_INCLUDE_TRYBOTS=tryserver.chromium.linux:linux_site_isolation
Review URL: https://codereview.chromium.org/1638343002
Cr-Commit-Position: refs/heads/master@{#377015}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
for DataReductionProxy
This involves removing two methods off the NetworkDelegate interface (and four off LayeredNetworkDelegate). DataReductionProxy's logic for these two methods will be moved to the DataReductionProxyDelegate from the DataReductionProxyNetworkDelegate. This also involved cleaning up some unit tests and moving calls to use ProxyDelegate instead of NetworkDelegate where relevant.
Refactoring proxy related calls from NetworkDelegate to ProxyDelegate
BUG=583369
Review URL: https://codereview.chromium.org/1680893002
Cr-Commit-Position: refs/heads/master@{#376860}
|
|
|
|
|
|
|
|
|
|
| |
Update comments according to changes in URLFetcher, no behavior change.
BUG=none
Review URL: https://codereview.chromium.org/1697053002
Cr-Commit-Position: refs/heads/master@{#376657}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Following android's documentation, native apps can set a referrer with
the format android-app://com.foo.bar. This is supported by the Java
side, but not the native code.
TBR=alokp@chromium.org,asargent@chromium.org # Adding a parameter in chromecast/ and extensions/
TESTED=adb shell am start -n com.google.android.apps.chrome/.Main -a "android.intent.action.VIEW" -d 'http://www.whatismyreferer.com/' --eu "android.intent.extra.REFERRER" "android-app://com.foo.bar"
BUG=537863
Review URL: https://codereview.chromium.org/1416863004
Cr-Commit-Position: refs/heads/master@{#376423}
|
|
|
|
|
|
|
|
|
|
|
| |
Allows SSL server sockets (openssl only) to support requesting and
receiving/verifying client auth certificates.
BUG=415663
Review URL: https://codereview.chromium.org/1474983003
Cr-Commit-Position: refs/heads/master@{#376292}
|
|
|
|
|
|
|
|
|
|
|
| |
The new code is simpler, and results in fewer roundtrips if the
CookieStore often completes tasks asynchronously.
BUG=587127
Review URL: https://codereview.chromium.org/1704583002
Cr-Commit-Position: refs/heads/master@{#375697}
|
|
|
|
|
|
|
|
|
| |
R=mef@chromium.org, pauljensen@chromium.org
BUG=576998
Review URL: https://codereview.chromium.org/1685473002
Cr-Commit-Position: refs/heads/master@{#375268}
|
|
|
|
|
|
|
|
|
|
|
| |
BUG=574997
We defer all requests in the OOPIF-enabled modes. There was a conditional check
which makes resuming not working properly in the URLRequestFileDirJob.
Review URL: https://codereview.chromium.org/1580503007
Cr-Commit-Position: refs/heads/master@{#375050}
|
|
|
|
|
|
|
|
|
|
|
|
| |
- QUIC will soon require that user agent id field is non-empty, but normal User-Agent request header is too rich and verbose to be used for this purpose. The app can override default value using 'user_agent_id' quic experimental option.
- prefer_aes experimental option is needed to experiment with performance of using AES instead of ChaCha20.
BUG=575771
Review URL: https://codereview.chromium.org/1665503002
Cr-Commit-Position: refs/heads/master@{#374438}
|
|
|
|
|
|
|
|
|
|
|
|
| |
use_alternative_services| was split into two flags in
https://crrev.com/1639913002. It was incorrectly set to true before, and since
that CL aimed to preserving default behavior, the two new flags are still
incorrectly set to true. Right now, Alternative Services is still an
experimental feature, therefore it should be disabled by default.
Review URL: https://codereview.chromium.org/1676113002
Cr-Commit-Position: refs/heads/master@{#374367}
|
|
|
|
|
|
|
|
|
| |
BUG=584326
R=xunjieli@chromium.org
Review URL: https://codereview.chromium.org/1670643003
Cr-Commit-Position: refs/heads/master@{#373651}
|
|
|
|
|
|
|
|
|
|
|
| |
migrate_sessions_on_network_change flags to cronet users.
R=pauljensen@chromium.org, rch@chromium.org
BUG=
Review URL: https://codereview.chromium.org/1661443002
Cr-Commit-Position: refs/heads/master@{#373614}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
We were doing this at the end of URLReqestJob::Read. The problem
with that is that we could end up synchronously calling into code that
expects to only to be called when the status is ERR_IO_PENDING, which
resulted in a DCHECK failure. The failure was fairly benign, though it
did allow external observers to notice some weirdness around
URLRequest::Status if they really wanted to, in some uncommon cases.
The DCHECK itself was added in https://codereview.chromium.org/1563633002/.
BUG=582623
Review URL: https://codereview.chromium.org/1651253004
Cr-Commit-Position: refs/heads/master@{#373583}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Set trusted SPDY proxy on per-profile basis if the profile
has DRP enabled, and if Chrome is part of the field trial.
Prior to this CL, it was possible to set the trusted SPDY
proxy only from command line switch.
Setting it on per-profile ensures that it is set only if
DRP is enabled (which is per-profile).
Setting it dynamically ensures that if there is a change in
DataReductionProxy config (e.g., the API tells Chrome to
connect to a different DRP server), then the SPDY session
to the different server has the trusted SPDY proxy set
correctly to the new server. Prior to this CL, trusted
SPDY proxy was set once at the time of Chrome start, and it
was not possible to change it.
Link to design doc: https://code.google.com/p/chromium/issues/detail?id=558682#c11
BUG=558682
Review URL: https://codereview.chromium.org/1547273003
Cr-Commit-Position: refs/heads/master@{#373442}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Add Boolean members to IOThread::Globals and HttpNetworkSession::Params to
toggle HTTP/2 and SPDY/3.1 support instead of a NextProtoVector. This way
clients do not have to have a notion of NextProto, "next_proto.h" includes
can be removed from lots of files, and NextProto helper functions can be
removed. Also default values are easier to define.
This CL intends to preserve behavior and default values.
BUG=329681
Review URL: https://codereview.chromium.org/1651123002
Cr-Commit-Position: refs/heads/master@{#372951}
|
|
|
|
|
|
|
|
|
|
|
| |
As per https://tools.ietf.org/html/draft-west-first-party-cookies-05 and
https://lists.w3.org/Archives/Public/ietf-http-wg/2016JanMar/0134.html.
BUG=459154
Review URL: https://codereview.chromium.org/1615773005
Cr-Commit-Position: refs/heads/master@{#372630}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Before this CL:
* If "use_alternative_service" QUIC trial param was set, both same host and
different host Alt-Svc headers were parsed and used. If this param was not
set, no Alt-Svc headers were parsed, and in-memory entries (from
Alternate-protocol headers or loaded from disk) were only used if they
referred to the same host.
After this CL:
* AltSvc field trial controls whether Alt-Svc headers are parsed.
* "enable_alternative_service_with_different_host" QUIC trial param control
whether in-memory Alt-Svc entries with different host (parsed in current
session or loaded from disk) are used.
Default values are not changed by this CL.
This CL allows testing of same-host Alt-Svc header behavior. If no issues are
encountered, parsing Alt-Svc headers and using same-host entries can be enabled
by default, and Alternate-Protocols removed.
BUG=581331
Review URL: https://codereview.chromium.org/1639913002
Cr-Commit-Position: refs/heads/master@{#372348}
|
|
|
|
|
|
|
|
|
|
| |
we already have seen the header in SdchOwner. So just ignore it.
R=rdsmith@chromium.org
Review URL: https://codereview.chromium.org/1563163002
Cr-Commit-Position: refs/heads/master@{#372192}
|
|
|
|
|
|
|
|
|
|
| |
This patch removes a DumpWithoutCrashing call in DoCancel that wasn't particularly useful.
BUG=557430
Review URL: https://codereview.chromium.org/1645513003
Cr-Commit-Position: refs/heads/master@{#371887}
|
|
|
|
|
|
|
|
|
|
|
|
| |
Adds a new method to SSLClientSocket to get the Token Binding from an SSL
connection where Token Binding was negotiated, and uses that to add the
Set-Token-Binding HTTP header (only when Token Binding was negotiated).
BUG=467312
Review URL: https://codereview.chromium.org/1378613004
Cr-Commit-Position: refs/heads/master@{#371347}
|
|
|
|
|
|
|
|
|
|
|
| |
Remove use of of obaque void** and use instead
size_t* parameter. Logic inside is untouched.
TBR=jam@chromium.org
Review URL: https://codereview.chromium.org/1607773005
Cr-Commit-Position: refs/heads/master@{#371204}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Recent CLs have already made it so URLRequestJob itself calls the
method itself whenever necessary, except when URLRequestJob::Start is
being called, where subclasses were still expected to invoke it.
Most of them were failing to do so, but since nothing cares about the
state after start, and little distinguished between ERR_IO_PENDING and
SUCCESS, everything was still working. URLRequest now sets its status
itself before it starts a URLRequestJob.
This CL also makes the URLRequest consistently have a status of
ERR_IO_PENDING when it's doing something - there were a number of
paths where this wasn't previously the case.
The state machine changes also coincidentally fix issue 575213,
which regressed in https://codereview.chromium.org/1467603002, so this
CL includes a test for that fix.
In the future, I'd really like to get rid of URLRequestJob::SetStatus,
and have URLRequests manage their own status.
BUG=564250,575213
TBR=jianli@chromium.org, phajdan.jr@chromium.org
Review URL: https://codereview.chromium.org/1563633002
Cr-Commit-Position: refs/heads/master@{#371072}
|