Index: net/http/http_log_util.cc |
diff --git a/net/http/http_log_util.cc b/net/http/http_log_util.cc |
index 4d0e6e98ce81d1e44c73727a4094e5c5a8784943..97282dcd15a0e82422f68585608cc662feab68d3 100644 |
--- a/net/http/http_log_util.cc |
+++ b/net/http/http_log_util.cc |
@@ -34,7 +34,6 @@ bool ShouldRedactChallenge(HttpAuthChallengeTokenizer* challenge) { |
} // namespace |
-#if defined(SPDY_PROXY_AUTH_ORIGIN) |
void ElideChromeProxyDirective(const std::string& header_value, |
const std::string& directive, |
std::string::const_iterator* redact_begin, |
@@ -50,18 +49,15 @@ void ElideChromeProxyDirective(const std::string& header_value, |
} |
} |
} |
Ryan Sleevi
2014/08/28 17:21:01
You still haven't removed/resolved this, which is
Not at Google. Contact bengr
2014/08/28 18:59:28
This is the only remainging layer violation. I tho
Ryan Sleevi
2014/09/02 19:30:10
M-38 has shipped. This code is for M-39, that bug
Not at Google. Contact bengr
2014/09/04 22:45:40
I am in the process of finding an approach to this
|
-#endif |
std::string ElideHeaderValueForNetLog(NetLog::LogLevel log_level, |
const std::string& header, |
const std::string& value) { |
std::string::const_iterator redact_begin = value.begin(); |
std::string::const_iterator redact_end = value.begin(); |
-#if defined(SPDY_PROXY_AUTH_ORIGIN) |
if (!base::strcasecmp(header.c_str(), "chrome-proxy")) { |
Ryan Sleevi
2014/08/28 17:21:01
This is still a layering violation.
Not at Google. Contact bengr
2014/08/28 18:59:28
Same as above.
|
ElideChromeProxyDirective(value, "sid=", &redact_begin, &redact_end); |
} |
-#endif |
if (redact_begin == redact_end && |
log_level >= NetLog::LOG_STRIP_PRIVATE_DATA) { |