From 857163eb100b1275a61d6ffe991846c34a61668f Mon Sep 17 00:00:00 2001 From: "cevans@chromium.org" Date: Tue, 19 Apr 2011 05:06:55 +0000 Subject: Apply HSTS rules to also upgrade ws:// -> wss:// if appropriate. This avoids a minor issue whereby failure to set a cookie "Secure" can get leaked via a WebSocket when http itself is mitiagted. TEST=WebSocketJobTest.HSTSUpgrade Review URL: http://codereview.chromium.org/6873029 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@82069 0039d316-1c4b-4281-b951-d872f2087c98 --- webkit/tools/test_shell/simple_socket_stream_bridge.cc | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) (limited to 'webkit/tools') diff --git a/webkit/tools/test_shell/simple_socket_stream_bridge.cc b/webkit/tools/test_shell/simple_socket_stream_bridge.cc index 4420b26..a555b48 100644 --- a/webkit/tools/test_shell/simple_socket_stream_bridge.cc +++ b/webkit/tools/test_shell/simple_socket_stream_bridge.cc @@ -156,7 +156,8 @@ void WebSocketStreamHandleBridgeImpl::OnClose(net::SocketStream* socket) { void WebSocketStreamHandleBridgeImpl::DoConnect(const GURL& url) { DCHECK(MessageLoop::current() == g_io_thread); - socket_ = net::SocketStreamJob::CreateSocketStreamJob(url, this); + socket_ = net::SocketStreamJob::CreateSocketStreamJob( + url, this, *g_request_context); socket_->set_context(g_request_context); socket_->Connect(); } -- cgit v1.1