Index: net/http/http_log_util.cc |
diff --git a/net/http/http_log_util.cc b/net/http/http_log_util.cc |
index 570232fc3e75be5e049372094825c68b7de51bce..603eef4beab6c97417f1db1ef93bba3c0fbae238 100644 |
--- a/net/http/http_log_util.cc |
+++ b/net/http/http_log_util.cc |
@@ -34,7 +34,6 @@ bool ShouldRedactChallenge(HttpAuthChallengeTokenizer* challenge) { |
} // namespace |
-#if defined(SPDY_PROXY_AUTH_ORIGIN) |
void ElideChromeProxyDirective(const std::string& header_value, |
Ryan Sleevi
2014/07/22 01:56:31
Absolutely cannot support moving this out of the #
Ryan Sleevi
2014/07/22 08:22:25
This is one aspect we've talked about in the past.
bengr
2014/07/22 19:57:15
mmenke@ was the reviewer on this CL (see: https://
|
const std::string& directive, |
std::string::const_iterator* redact_begin, |
@@ -50,18 +49,15 @@ void ElideChromeProxyDirective(const std::string& header_value, |
} |
} |
} |
-#endif |
std::string ElideHeaderValueForNetLog(NetLog::LogLevel log_level, |
const std::string& header, |
const std::string& value) { |
std::string::const_iterator redact_begin = value.begin(); |
std::string::const_iterator redact_end = value.begin(); |
-#if defined(SPDY_PROXY_AUTH_ORIGIN) |
if (!base::strcasecmp(header.c_str(), "chrome-proxy")) { |
Ryan Sleevi
2014/07/22 01:56:31
Nor this.
Ryan Sleevi
2014/07/22 08:22:25
1) //net knowing about chrome-proxy
2) Introducing
bengr
2014/07/22 19:57:15
We can file a bug to wrap NetLog, but this shouldn
|
ElideChromeProxyDirective(value, "sid=", &redact_begin, &redact_end); |
} |
-#endif |
if (redact_begin == redact_end && |
log_level >= NetLog::LOG_STRIP_PRIVATE_DATA) { |