Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(356)

Issue 2214793002: Remove unnecessary SSLRequestInfo class (Closed)

Created:
4 years, 4 months ago by estark
Modified:
4 years, 4 months ago
Reviewers:
jww, felt
CC:
chromium-reviews, jam, darin-cc_chromium.org
Base URL:
https://chromium.googlesource.com/chromium/src.git@master
Target Ref:
refs/pending/heads/master
Project:
chromium
Visibility:
Public.

Description

Remove unnecessary SSLRequestInfo class The SSLRequestInfo class was serving only to pass a few pieces of information into one function in SSLPolicy and does not seem at all necessary. (I'm guessing it used to serve some purpose, but no longer.) This CL removes SSLRequestInfo and changes the SSLPolicy::OnRequestStarted() signature to simply take the few details it needs about the request (URL, cert id, and cert status). BUG=558491 Committed: https://crrev.com/23f4b974f96fa3cd8abc0a5da1fc3ac3a3e2359d Cr-Commit-Position: refs/heads/master@{#409836}

Patch Set 1 #

Total comments: 5
Unified diffs Side-by-side diffs Delta from patch set Stats (+15 lines, -100 lines) Patch
M content/browser/ssl/ssl_manager.cc View 2 chunks +3 lines, -20 lines 5 comments Download
M content/browser/ssl/ssl_policy.h View 2 chunks +5 lines, -3 lines 0 comments Download
M content/browser/ssl/ssl_policy.cc View 3 chunks +7 lines, -6 lines 0 comments Download
D content/browser/ssl/ssl_request_info.h View 1 chunk +0 lines, -48 lines 0 comments Download
D content/browser/ssl/ssl_request_info.cc View 1 chunk +0 lines, -21 lines 0 comments Download
M content/content_browser.gypi View 1 chunk +0 lines, -2 lines 0 comments Download

Messages

Total messages: 23 (10 generated)
estark
felt, PTAL?
4 years, 4 months ago (2016-08-04 15:15:50 UTC) #5
felt
+jww with a BONUS QUESTION! https://codereview.chromium.org/2214793002/diff/1/content/browser/ssl/ssl_manager.cc File content/browser/ssl/ssl_manager.cc (left): https://codereview.chromium.org/2214793002/diff/1/content/browser/ssl/ssl_manager.cc#oldcode150 content/browser/ssl/ssl_manager.cc:150: // resouces aren't cachable. ...
4 years, 4 months ago (2016-08-04 17:16:09 UTC) #8
estark
https://codereview.chromium.org/2214793002/diff/1/content/browser/ssl/ssl_manager.cc File content/browser/ssl/ssl_manager.cc (left): https://codereview.chromium.org/2214793002/diff/1/content/browser/ssl/ssl_manager.cc#oldcode150 content/browser/ssl/ssl_manager.cc:150: // resouces aren't cachable. On 2016/08/04 17:16:09, felt wrote: ...
4 years, 4 months ago (2016-08-04 17:25:04 UTC) #9
felt
lgtm (although jww, can you still take a look at the question I left? it's ...
4 years, 4 months ago (2016-08-04 17:26:24 UTC) #10
estark
Thanks felt. I'm going to submit this now but will look out for jww's answer ...
4 years, 4 months ago (2016-08-04 18:04:07 UTC) #11
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/v2/patch-status/codereview.chromium.org/2214793002/1
4 years, 4 months ago (2016-08-04 18:04:31 UTC) #13
commit-bot: I haz the power
Committed patchset #1 (id:1)
4 years, 4 months ago (2016-08-04 18:11:48 UTC) #15
commit-bot: I haz the power
Patchset 1 (id:??) landed as https://crrev.com/23f4b974f96fa3cd8abc0a5da1fc3ac3a3e2359d Cr-Commit-Position: refs/heads/master@{#409836}
4 years, 4 months ago (2016-08-04 18:13:38 UTC) #17
jww
https://codereview.chromium.org/2214793002/diff/1/content/browser/ssl/ssl_manager.cc File content/browser/ssl/ssl_manager.cc (left): https://codereview.chromium.org/2214793002/diff/1/content/browser/ssl/ssl_manager.cc#oldcode158 content/browser/ssl/ssl_manager.cc:158: policy()->OnRequestStarted(info.get()); On 2016/08/04 17:16:09, felt wrote: > jww: Is ...
4 years, 4 months ago (2016-08-04 18:18:10 UTC) #19
estark
On 2016/08/04 18:18:10, jww wrote: > https://codereview.chromium.org/2214793002/diff/1/content/browser/ssl/ssl_manager.cc > File content/browser/ssl/ssl_manager.cc (left): > > https://codereview.chromium.org/2214793002/diff/1/content/browser/ssl/ssl_manager.cc#oldcode158 > ...
4 years, 4 months ago (2016-08-04 18:21:15 UTC) #20
jww
On 2016/08/04 18:21:15, estark wrote: > On 2016/08/04 18:18:10, jww wrote: > > > https://codereview.chromium.org/2214793002/diff/1/content/browser/ssl/ssl_manager.cc ...
4 years, 4 months ago (2016-08-04 19:00:42 UTC) #21
felt
On 2016/08/04 19:00:42, jww wrote: > On 2016/08/04 18:21:15, estark wrote: > > On 2016/08/04 ...
4 years, 4 months ago (2016-08-04 19:34:14 UTC) #22
estark
4 years, 4 months ago (2016-08-05 00:14:08 UTC) #23
Message was sent while issue was closed.
On 2016/08/04 19:34:14, felt wrote:
> On 2016/08/04 19:00:42, jww wrote:
> > On 2016/08/04 18:21:15, estark wrote:
> > > On 2016/08/04 18:18:10, jww wrote:
> > > >
> > >
> >
>
https://codereview.chromium.org/2214793002/diff/1/content/browser/ssl/ssl_man...
> > > > File content/browser/ssl/ssl_manager.cc (left):
> > > > 
> > > >
> > >
> >
>
https://codereview.chromium.org/2214793002/diff/1/content/browser/ssl/ssl_man...
> > > > content/browser/ssl/ssl_manager.cc:158:
> > > policy()->OnRequestStarted(info.get());
> > > > On 2016/08/04 17:16:09, felt wrote:
> > > > > jww: Is it correct that DidLoadFromMemoryCache is triggering the logic
> in
> > > > > OnRequestStarted? Let's say the following happens:
> > > > > 
> > > > > Monday: cert is valid. subresource is cached.
> > > > > Tuesday: cert expires. user sees and clicks through error.
> > > > > Wednesday: user goes to a page that loads the cached subresource.
> > > > > 
> > > > > That will remove the exception from Tuesday based on the cached
> > subresource,
> > > > > which seems kind of weird.
> > > > 
> > > > It seems very possible that this would happen. We should probably have a
> > > browser
> > > > test to verify? Not sure how to write it, though.
> > > > 
> > > > I think it would be totally reasonable to have an explicit exemption of
> the
> > > > "revoke on good cert seen" for memory cache loaded resources, since the
> > "good"
> > > > cert is old, and its not that we've seen the *server* issue a valid
cert.
> > > Maybe
> > > > we should add a "bool cached_" member to SSLRequestInfo to track this?
> > > 
> > > If we don't want to revoke decisions on good certs seen on memory cached
> > > resources, can we just delete SSLPolicy::DidLoadFromMemoryCache() all
> > together?
> > > It looks like the only purpose that method serves is to revoke the
decisions
> > if
> > > the resource loaded from the cache has a good cert.
> > 
> > Offhand, that makes sense to me.
> 
> Yes, that is what I was suggesting also (delete DidLoadFrommemoryCache if we
> don't actually want that behavior).

Ok cool. Filed https://crbug.com/634553 to track it.

Powered by Google App Engine
This is Rietveld 408576698