Index: net/http/proxy_client_socket.cc |
diff --git a/net/http/proxy_client_socket.cc b/net/http/proxy_client_socket.cc |
index dcfae037ce721c92bd95dfa3aeded77bd2f6bf62..d4af8e37747641ef4c5e01d37c840fcb726dc0d8 100644 |
--- a/net/http/proxy_client_socket.cc |
+++ b/net/http/proxy_client_socket.cc |
@@ -72,19 +72,25 @@ void ProxyClientSocket::LogBlockedTunnelResponse(int http_status_code, |
} |
// static |
-bool ProxyClientSocket::SanitizeProxyRedirect(HttpResponseInfo* response, |
- const GURL& url) { |
+bool ProxyClientSocket::SanitizeProxyAuth(HttpResponseInfo* response) { |
+ DCHECK(response && response->headers.get()); |
+ response->headers->RemoveHeader("set-cookie"); |
+ return true; |
Ryan Sleevi
2014/12/01 21:28:49
I have trouble convincing myself a blacklist is th
Ryan Hamilton
2014/12/02 01:50:52
Sounds reasonable! You probably want Proxy-Authent
Deprecated (see juliatuttle)
2014/12/02 20:10:21
Yeah, agreed.
Is there a way that is more efficie
Ryan Hamilton
2014/12/02 20:14:25
As far as kludges go, the "assemble new fake raw h
|
+} |
+ |
+// static |
+bool ProxyClientSocket::SanitizeProxyRedirect(HttpResponseInfo* response) { |
DCHECK(response && response->headers.get()); |
std::string location; |
if (!response->headers->IsRedirect(&location)) |
return false; |
- // Return minimal headers; set "Content-length: 0" to ignore response body. |
+ // Return minimal headers; set "Content-Length: 0" to ignore response body. |
std::string fake_response_headers = |
- base::StringPrintf("HTTP/1.0 302 Found\n" |
+ base::StringPrintf("HTTP/1.1 302 Found\n" |
"Location: %s\n" |
- "Content-length: 0\n" |
+ "Content-Length: 0\n" |
"Connection: close\n" |
"\n", |
location.c_str()); |