summaryrefslogtreecommitdiffstats
path: root/net
Commit message (Collapse)AuthorAgeFilesLines
* Convert a bunch of uses of the wstring net::FormatUrl() to the new string16 one.viettrungluu@chromium.org2010-08-301-0/+5
| | | | | | | | | BUG=23581 TEST=builds and passes tests Review URL: http://codereview.chromium.org/3287002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57829 0039d316-1c4b-4281-b951-d872f2087c98
* Fix ChromeFrame HTTPs net tests which started failing with the change to ↵ananta@chromium.org2010-08-291-0/+4
| | | | | | | | | | | | | | | validate the certificate info in the HTTPs tests. ChromeFrame's host network stack implementation returns a fake certificate as we don't have access to the real certificate info from IE. Fix is to bypass this check for ChromeFrame. TBR=wtc Review URL: http://codereview.chromium.org/3229008 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57814 0039d316-1c4b-4281-b951-d872f2087c98
* https: add support for DNS exclusion and switch to TXT records.agl@chromium.org2010-08-2811-42/+492
| | | | | | | | | | | | | | | | | | | | | | | | | | | | (This code has no effect unless --enable-dnssec-certs is given.) The existing DNSSEC code will process embeded chains in certificates and validate CERT records there in. The format of the CERT record was just something made up as a proof of concept. This change switches that code to using TXT records which are at least used by some other code. Additionally, when --enable-dnssec-certs is given. TXT record lookups are triggered for each HTTPS connection. If DNSSEC secure, these lookups can validate a HTTPS certificate. Even without DNSSEC, they can by used for exclusion: if TLS fingerprints are given, but the certificate doesn't match any of them, then the certificate is rejected. The next step in this series will be to perform the TXT lookup for some percentage of dev channel users in order to measure the latency impact. For this experiment, all behavioural changes will be disabled. BUG=none TEST=net_unittests http://codereview.chromium.org/3148037/show git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57787 0039d316-1c4b-4281-b951-d872f2087c98
* Display the "effective" proxy settings in about:net-internals.eroman@chromium.org2010-08-286-38/+92
| | | | | | | | | | | | The "effective" settings is what you get after applying the various fallbacks between automatic and manual settings. This display makes it easier to notice whether "auto-detect" actually took effect, and if so what was the PAC URL it used. BUG=53549 TEST=On windows change your proxy settings to include both auto-detect, a custom pac script, and some manually configured proxy servers. Now run chrome and go to the proxy tab on about:net-internals. Check that the "original" settings is what you entered in the dialog box, however the "effective" settings will only be a subset of them. Review URL: http://codereview.chromium.org/3241002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57767 0039d316-1c4b-4281-b951-d872f2087c98
* Add regression tests for issue 53366. Check that thewtc@chromium.org2010-08-281-4/+21
| | | | | | | | | | | | | security_bits and connection_status members of a URLRequest's SSLInfo should have valid values when the SSL connection is set up successfully. R=agl BUG=53366 TEST=net_unittests --gtest_filter=HTTPSRequestTest.HTTPS*Test Review URL: http://codereview.chromium.org/3280002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57765 0039d316-1c4b-4281-b951-d872f2087c98
* Remove an obsolete TODO comment. Support for the Netscape SSLwtc@chromium.org2010-08-271-4/+0
| | | | | | | | | | | | server name certificate extension was removed in NSS 3.12.7. R=rsleevi BUG=none TEST=Verify this with https://bugzilla.mozilla.org/show_bug.cgi?id=554425 Review URL: http://codereview.chromium.org/3223005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57742 0039d316-1c4b-4281-b951-d872f2087c98
* Rename the following SSLClientSocket methods to match the style guide:rch@chromium.org2010-08-277-17/+17
| | | | | | | | | | | | | | wasNpnNegotiated() -> was_npn_negotiated() setWasNpnNegotiated() -> set_was_npn_negotiated() wasSpdyNegotiated() -> was_spdy_negotiated() setWasSpdyNegotiated() -> set_was_spdy_negotiated() BUG=none TEST=none Review URL: http://codereview.chromium.org/3229004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57741 0039d316-1c4b-4281-b951-d872f2087c98
* FBTF: Remove unneeded headers from base/ (part 7)thestig@chromium.org2010-08-2710-15/+7
| | | | | | | | BUG=none TEST=none Review URL: http://codereview.chromium.org/3176026 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57737 0039d316-1c4b-4281-b951-d872f2087c98
* Support sending BlobData to browser process. Also support sending UploadDatajianli@chromium.org2010-08-272-1/+20
| | | | | | | | | | | with the blob info to browser process. BUG=none TEST=none Review URL: http://codereview.chromium.org/3108042 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57707 0039d316-1c4b-4281-b951-d872f2087c98
* Disk cache: For an AppCache, now we only update thervargas@google.com2010-08-2711-33/+189
| | | | | | | | | | | | | | | | | | | | | | | | LRU list when an entry is created. This means that we don't update the list anymore when an entry is accessed, even if we are writing to the entry. The general idea is that now we should be able to open an AppCache and read from it without modifying the contents of the cache, so that if the browser crashes, we won't find "dirty" entries to discard. By minimizing writes to the LRU list, we reduce the chances that the list will get corrupt beyond the point where we cannot trust it anymore if the whole system crashes (and not just the browser). BUG=51870 TEST=net_unittests Review URL: http://codereview.chromium.org/3186032 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57697 0039d316-1c4b-4281-b951-d872f2087c98
* Add support for delegated kerberos tickets to Negotiate authentication.cbentzel@chromium.org2010-08-2714-57/+157
| | | | | | | | | | | This is controlled by the --auth-negotiate-delegate-whitelist command line. By default no servers are delegated to. BUG=50076 TEST=net_unittests, go to an IIS server specified in --auth-negotiate-delegate-whitelist and see if this works correctly. Review URL: http://codereview.chromium.org/3155046 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57695 0039d316-1c4b-4281-b951-d872f2087c98
* Change, unify, and specify ordering of cookies from CookieMonster.rdsmith@chromium.org2010-08-273-2/+64
| | | | | | | | | | | | | | Affected interfaces: * GetCookiesWithOptions (used by HTTP requests) * GetAllCookiesForURL (used by extensions and Cookies UI) * GetAllCookies (used by Cookies UI). BUG=8850 (indirectly) TEST=Standard cookie monster tests, unit_tests::CookiesTreeModelTest.OriginOrdering, browser_tests::ExtensionApiTest.Cookies Review URL: http://codereview.chromium.org/3170034 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57694 0039d316-1c4b-4281-b951-d872f2087c98
* Allow SSL_SecurityStatus, SSL_GetChannelInfo, andwtc@chromium.org2010-08-275-3/+178
| | | | | | | | | | | | | | SSL_HandshakeNegotiatedExtension to be called as soon as a false start handshake is done. R=agl BUG=53366 TEST=Visit any HTTPS sites, especially sites with certificate errors. The SSL InfoBubble should not say "your connection to www.example.com is not encrypted." Review URL: http://codereview.chromium.org/3233001 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57691 0039d316-1c4b-4281-b951-d872f2087c98
* Remove exe perms from text files to fix checkprops failuredmazzoni@chromium.org2010-08-271-0/+0
| | | | | | | | BUG=none TEST=none git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57679 0039d316-1c4b-4281-b951-d872f2087c98
* Update --gtest-filter files and suppressions for Dr. Memorytimurrrr@chromium.org2010-08-271-0/+12
| | | | | | | TBR=glider Review URL: http://codereview.chromium.org/3267001 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57676 0039d316-1c4b-4281-b951-d872f2087c98
* Add a new SSLClientSocket::wasSpdyNegotiated method,rch@chromium.org2010-08-273-14/+14
| | | | | | | | | | | | and modify HttpStreamRequest::DoInitConnectionComplete to call it. BUG=none TEST=none Review URL: http://codereview.chromium.org/3173053 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57633 0039d316-1c4b-4281-b951-d872f2087c98
* Disk cache: Add a new uma histogram for the total internalrvargas@google.com2010-08-272-1/+4
| | | | | | | | | | | | buffers size. BUG=none TEST=none Review URL: http://codereview.chromium.org/3211003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57615 0039d316-1c4b-4281-b951-d872f2087c98
* Added missing MS PAC extensions for IPv6:ziadh@chromium.org2010-08-264-28/+263
| | | | | | | | | | | | + sortIpAddressList() + isInNetEx() BUG=25407 r=eroman Review URL: http://codereview.chromium.org/2818006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57606 0039d316-1c4b-4281-b951-d872f2087c98
* Ignore certificate errors when connecting to an HTTPS Proxyrch@chromium.org2010-08-261-0/+4
| | | | | | | | | | | | if LOAD_IGNORE_ALL_CERT_ERRORS is set. This happens when the --ignore_certificate_errors command line flag is present. BUG=none TEST=none Review URL: http://codereview.chromium.org/3124044 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57585 0039d316-1c4b-4281-b951-d872f2087c98
* Disable request logging in test HTTP server to declutter log output.phajdan.jr@chromium.org2010-08-261-0/+4
| | | | | | | | | TEST=none BUG=52645 Review URL: http://codereview.chromium.org/3163041 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57530 0039d316-1c4b-4281-b951-d872f2087c98
* ClientSocketPoolBaseHelper crash fix: add a self-reference.willchan@chromium.org2010-08-261-0/+6
| | | | | | | | BUG=49254 Review URL: http://codereview.chromium.org/3127035 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57529 0039d316-1c4b-4281-b951-d872f2087c98
* Reland r57100. Only create the backup ConnectJob when it is needed.willchan@chromium.org2010-08-262-188/+216
| | | | | | | | Includes a fix. I forgot that the iterator is invalidated after std::map::erase(). Review URL: http://codereview.chromium.org/3135047 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57515 0039d316-1c4b-4281-b951-d872f2087c98
* Introduce an artificial 2 second delay after network IP address changes ↵eroman@chromium.org2010-08-267-13/+213
| | | | | | | | | | | | | | | before re-running proxy auto-config. During this time network requests will be stalled. This is to work around a problem where DNS gives transient failures shortly after IP address changes. BUG=50779 TEST=On a linux laptop switch between wireless networks while using auto-detect. When you switch to a network that contains the host 'wpad' verify that when InitProxyResolver runs it does not get a DNS error resolving 'wpad'. (Use about:net-internals to view this information). Review URL: http://codereview.chromium.org/3151040 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57471 0039d316-1c4b-4281-b951-d872f2087c98
* SPDY flow control: add support for receive window sizeagayev@chromium.org2010-08-269-13/+179
| | | | | | | | | BUG=48100 TEST=net_unittests Review URL: http://codereview.chromium.org/3137014 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57453 0039d316-1c4b-4281-b951-d872f2087c98
* Disk cache: Remove the check for no open entries at destructionrvargas@google.com2010-08-251-1/+4
| | | | | | | | | | | | | | | if we are not running a net_unittest. We have no way to enforce that the browser closes all backend entries (HttpCacheTransactions) before deleting the cache. BUG=52366 TEST=none Review URL: http://codereview.chromium.org/3119039 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57422 0039d316-1c4b-4281-b951-d872f2087c98
* Add the apps datatype to the python sync server.rsimha@chromium.org2010-08-251-1/+6
| | | | | | | | | BUG=53370 TEST=sync_integration_tests Review URL: http://codereview.chromium.org/3207004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57419 0039d316-1c4b-4281-b951-d872f2087c98
* Remove the reused_socket_ member because we don't really need it.mbelshe@chromium.org2010-08-252-8/+4
| | | | | | | | | BUG=none TEST=none Review URL: http://codereview.chromium.org/3120032 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57418 0039d316-1c4b-4281-b951-d872f2087c98
* Keep push streams open until they are claimed. The previous change I didmbelshe@chromium.org2010-08-251-8/+14
| | | | | | | | | | | | | | changed this (so that streams are closed when they get EOF, even though the unclaimed stream is active), but it breaks the invariants for spdy_http_stream and checking when a stream is closed. Both models have advantages, going back to the original mechanism. BUG=none TEST=Working on the unittest Review URL: http://codereview.chromium.org/3198012 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57398 0039d316-1c4b-4281-b951-d872f2087c98
* Gather preconnection use vs waste statisticsjar@chromium.org2010-08-2523-82/+265
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | I now gather statistics only in the transport socket classes TcpClientSocket*. All other socket classes forward significant data (that they are used in a speculation) to their transport class, where this data is stored, and then dumped when the TCP socket is closed. This CL also repaired a slight miscount in bytes read and written on Windows, as error codes were mistakenly accumulated as byte counts. This CL repaired a significant undercounting in linux/mac via StatsCounter (the logging counter appears correct). Libjingle support is minimal (NOTREACHED), but I don't know that there are subresources that will be speculatively preconnected from that class (and it is less obvious how the class uses underlying sockets, if at all). BUG=42694 r=willchan Review URL: http://codereview.chromium.org/3163033 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57377 0039d316-1c4b-4281-b951-d872f2087c98
* Attempting to re-land CL 3110006 which turned out to have rch@chromium.org2010-08-2513-105/+740
| | | | | | | | | | | | | | | | | | | | | a memory leak. Add support for speaking SSL to an HTTP Proxy, to HttpProxyClientSocketPool (and friends) More information about an HTTPS Proxy can be found here: http://dev.chromium.org/spdy/spdy-proxy This implementation supports both http:// and https:// requests, as well as support for both Proxy and Server auth. BUG=29625 TEST=none Review URL: http://codereview.chromium.org/3112034 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57371 0039d316-1c4b-4281-b951-d872f2087c98
* Fix a crash in ClientSocketPoolBaseHelper where we double erase a Group from ↵willchan@chromium.org2010-08-253-4/+54
| | | | | | | | | | the GroupMap. BUG=49254 Review URL: http://codereview.chromium.org/3104026 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57346 0039d316-1c4b-4281-b951-d872f2087c98
* Move the stream initialization out of the HttpStreamRequest and backmbelshe@chromium.org2010-08-2510-61/+138
| | | | | | | | | | | | | | into the HttpNetworkTransaction. The reason is because the stream factory should get the stream connected, but not actually initialize the stream; stream initialization should only happen when the stream uses it. BUG=none TEST=none Review URL: http://codereview.chromium.org/3137034 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57342 0039d316-1c4b-4281-b951-d872f2087c98
* In about:net-internals, each SOCKET created by a CONNECT_JOB holds a ↵mmenke@chromium.org2010-08-2516-38/+80
| | | | | | | | | | | reference to the CONNECT_JOB that spawned it. BUG=47082 TEST=manual Review URL: http://codereview.chromium.org/3164005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57339 0039d316-1c4b-4281-b951-d872f2087c98
* Provide a wstring-free version of FormatUrl(), part 1.viettrungluu@chromium.org2010-08-253-0/+210
| | | | | | | | | | | | | I haven't converted the code yet -- the new version just calls the old (wstring) version and does conversions. But I converted the unit test, so that when I do convert the code I'll know it works correctly. BUG=23581 TEST=unit test Review URL: http://codereview.chromium.org/3152048 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57336 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 57333 - Add support for speaking SSL to an HTTP Proxy, todhollowa@chromium.org2010-08-2513-738/+104
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | HttpProxyClientSocketPool (and friends) Reverting due to heapcheck issues: http://build.chromium.org/buildbot/memory/builders/Linux%20Heapcheck/builds/7039/steps/heapcheck%20test:%20net/logs/stdio Suppression: { <insert_a_suppression_name_here> Heapcheck:Leak fun:RefCountedBase fun:RefCounted fun:TCPSocketParams fun:net::HttpStreamRequest::DoInitConnection fun:net::HttpStreamRequest::DoLoop fun:net::HttpStreamRequest::RunLoop fun:net::HttpStreamRequest::Start fun:net::HttpStreamFactory::RequestStream fun:net::HttpNetworkTransaction::DoInitStream fun:net::HttpNetworkTransaction::DoLoop fun:net::HttpNetworkTransaction::RestartIgnoringLastError fun:net::HttpNetworkTransactionTest_HTTPSBadCertificateViaHttpsProxy_Test::TestBody fun:testing::Test::Run fun:testing::internal::TestInfoImpl::Run fun:testing::TestCase::Run fun:testing::internal::UnitTestImpl::RunAllTests fun:testing::UnitTest::Run fun:base::TestSuite::Run fun:main fun:__libc_start_main } More information about an HTTPS Proxy can be found here: http://dev.chromium.org/spdy/spdy-proxy This implementation supports both http:// and https:// requests, as well as support for both Proxy and Server auth. BUG=29625 TEST=none Review URL: http://codereview.chromium.org/3110006 TBR=rch@chromium.org Review URL: http://codereview.chromium.org/3134034 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57335 0039d316-1c4b-4281-b951-d872f2087c98
* Add support for speaking SSL to an HTTP Proxy, torch@chromium.org2010-08-2513-104/+738
| | | | | | | | | | | | | | | | | | HttpProxyClientSocketPool (and friends) More information about an HTTPS Proxy can be found here: http://dev.chromium.org/spdy/spdy-proxy This implementation supports both http:// and https:// requests, as well as support for both Proxy and Server auth. BUG=29625 TEST=none Review URL: http://codereview.chromium.org/3110006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57333 0039d316-1c4b-4281-b951-d872f2087c98
* NSS: Add Snap Start supportagl@chromium.org2010-08-2510-15/+1299
| | | | | | | | | | | This patch adds NSS support for Snap Start, an experimental TLS extension for zero round trip handshakes. This change does not enable Snap Start. BUG=none TEST=External unittests (not in tree) git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57325 0039d316-1c4b-4281-b951-d872f2087c98
* Don't run URLRequestTest under ThreadSanitizer on Windowstimurrrr@chromium.org2010-08-251-0/+3
| | | | | | | | BUG=53304 TBR=glider Review URL: http://codereview.chromium.org/3122040 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57318 0039d316-1c4b-4281-b951-d872f2087c98
* Remove dead log entries for SPDY_TRANSACTION_*mbelshe@chromium.org2010-08-251-16/+0
| | | | | | | | | BUG=none TEST=none Review URL: http://codereview.chromium.org/3205003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57300 0039d316-1c4b-4281-b951-d872f2087c98
* Refactor: change the spdy session pool key to take a ProxyServer instead of ↵eroman@chromium.org2010-08-2510-22/+109
| | | | | | | | | a string representation of the proxy server. BUG=52668 Review URL: http://codereview.chromium.org/3197018 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57297 0039d316-1c4b-4281-b951-d872f2087c98
* Fix a crash where we are checking IsConnected(). If you look into the mbelshe@chromium.org2010-08-258-6/+326
| | | | | | | | | | | | | | | | | | | | | | | | | | implementation of IsConnected() on windows, you'll find that it can synchronously check if the socket is connected. This makes it so that a CHECK (or DCHECK) on this attribute is dependent on the peer. The peer could send us a TCP-FIN at any time - even 1 nanosecond before our call to IsConnected(). We can only use CHECK(!IsConnected()) to check before we connect, we simply can't use it at runtime. I searched the code and found 4 other instances of this broken check. Most were DCHECKs, which is good, but I've removed them just the same. Turns out our MockSockets have a mechanism for simulating this error, but it wasn't tested nor plumbed through the MockSSLClientSocket. In the process I added a couple of basic proxy test cases, which may be slightly redundant with other test cases that are more advanced. But they seem like a good idea to cover anyway. Added 6 tests in total. BUG=53099 TEST=ProxyTunnelGetHangup, RecycleDeadSSLSocket Review URL: http://codereview.chromium.org/3107036 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57295 0039d316-1c4b-4281-b951-d872f2087c98
* Cleanup: rename ProxyRules::socks_proxy --> ProxyRules::fallback_proxy.eroman@chromium.org2010-08-256-36/+44
| | | | | | | | BUG=None TEST=Compiles Review URL: http://codereview.chromium.org/3146029 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57294 0039d316-1c4b-4281-b951-d872f2087c98
* A/B experiment for re-establishing TCP connections.ziadh@chromium.org2010-08-255-25/+50
| | | | | | | | | | | | | We would like to test the impact of automatic retries when a TCP connection exceeds a certain threshold before it gets back an ACK. We are observing a fair number of sockets where the connection had been established, but the sockets were not used thereafter. r=mbelche Review URL: http://codereview.chromium.org/3191019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57276 0039d316-1c4b-4281-b951-d872f2087c98
* Make sure the key into the spdy session pool identifies the actual proxy ↵eroman@chromium.org2010-08-257-22/+77
| | | | | | | | | | used, and not the full list of possible proxies for the URL. BUG=52668 TEST=SpdyNetworkTransactionTest.DirectConnectProxyReconnect Review URL: http://codereview.chromium.org/3192011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57274 0039d316-1c4b-4281-b951-d872f2087c98
* Remove two CHECKs that were added to help track down the crashwtc@chromium.org2010-08-242-7/+2
| | | | | | | | | | | | | in http://crbug.com/49862. That crash no longer occurs. Fix cpplint.py nit: add a "// namespace" comment. R=vandebo BUG=49862 TEST=none Review URL: http://codereview.chromium.org/3165057 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57250 0039d316-1c4b-4281-b951-d872f2087c98
* When asserting that an event object is not signaled,wtc@chromium.org2010-08-241-6/+19
| | | | | | | | | | | | | pass important values (the return value of WaitForSingleObject and the error code) as function arguments so that they are available in crash dumps. R=eroman BUG=51950,52008 TEST=none Review URL: http://codereview.chromium.org/3107032 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57247 0039d316-1c4b-4281-b951-d872f2087c98
* Fail rather than crash if username+password are unspecified for NTLM on ↵cbentzel@chromium.org2010-08-241-0/+5
| | | | | | | | | | | | | Linux+OSX. This will be yanked out, but is being used to triage a bug. BUG=50517 TEST=None Review URL: http://codereview.chromium.org/3150033 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57211 0039d316-1c4b-4281-b951-d872f2087c98
* Http cache: Make sure that the memory used to receive thervargas@google.com2010-08-243-11/+22
| | | | | | | | | | | | | pointer of the backend is valid until the callback fires, even after the http cache is deleted. BUG=52387 TEST=net_unittests Review URL: http://codereview.chromium.org/3195017 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57210 0039d316-1c4b-4281-b951-d872f2087c98
* Heapcheck: Don't run net_unittests that simulate crashes.rvargas@google.com2010-08-241-0/+14
| | | | | | | | | | BUG=53141 TEST=none Review URL: http://codereview.chromium.org/3159035 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57209 0039d316-1c4b-4281-b951-d872f2087c98
* chromeos: 1st draft of ProxyConfigService for chromeoskuan@chromium.org2010-08-242-1/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | what this cl is: - a REALLY bare skeleton implementation of ProxyConfigService for chromeos (lots of design details remain to be worked out on the chromeos side, but i needed to get something basic up) - focused on getting chrome part correct, extracting design flow and implementation from linux variant that are relevant to chromeos, e.g.: - provide access of ProxyConfigService interface on IO thread - provide methods on UI thread for UI to read/modify proxy config (like linux's GConf notifications on UI thread) - fetch initial config on UI thread (this is not absolutely necessary for chromeos, 'cos i don't use GConf, but i just follow linux for now) - however, the class is RefCountedThreadSafe (so that both net::ProxyService and DOMUI can access it), and the code resides in chrome/browser/chromeos dir instead of net/proxy. - design details are in .h files - initial config is hardcoded as pac script and loaded as owner (TODO: load this from cros settings persisted on chromeos device) - this should work like the current chromeos session manager which sets the auto-proxy environment variable in login script to the same pac script - implement an augmented analogue to net::ProxyConfig to hold actual proxy config and UI settings (e.g. source and readonly attributes) - backend uses this as the main proxy config, and only converts it to net:::ProxyConfig for network stack on the IO thread in net::ProxyService::GetLatestProxyConfig. - UI methods also use this structure - provide methods to get and set configs from UI thread - UI can use dom_ui->GetProfile()->GetChromeOSProxyConfigServiceImpl() to access these methods on the UI thread - these methods are by no means final - i only added them here to verify the design flow that modifications can be made from UI thread and picked up by IO thread. - david and i will improve or modify them to whatever works best for frontend and backend. - unittest that tests most functionalities: socks and bypass_rules will be enabled in a later cl. TODOs after this cl: - work with UI, load initial config as owner from cros settings - implement policy mechanism, merge it with owner during initial load and modifications - persist proxy settings - etc etc etc BUG=chromium-os:5127 TEST=nothing yet. Review URL: http://codereview.chromium.org/3047052 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57204 0039d316-1c4b-4281-b951-d872f2087c98