Index: net/socket/client_socket_pool_manager.cc |
diff --git a/net/socket/client_socket_pool_manager.cc b/net/socket/client_socket_pool_manager.cc |
index 7820cf9d9ab3d964ddc25a90a9b9d6059bc10fee..d527472dc400a476381bdebcf3dae744dd3644a9 100644 |
--- a/net/socket/client_socket_pool_manager.cc |
+++ b/net/socket/client_socket_pool_manager.cc |
@@ -215,8 +215,15 @@ int InitSocketPoolHelper(ClientSocketPoolManager::SocketGroupType group_type, |
} |
} |
+ // Turn on privacy mode if it was enabled, or if the load flags indicate |
+ // that credentials cannot be sent. |
+ bool enable_privacy_mode = (load_flags & LOAD_DO_NOT_SEND_COOKIES) || |
+ (load_flags & LOAD_DO_NOT_SAVE_COOKIES) || |
+ (load_flags & LOAD_DO_NOT_SEND_AUTH_DATA) || |
+ (privacy_mode == PRIVACY_MODE_ENABLED); |
mmenke
2015/07/14 16:32:03
I guess this is supposed to mirror the logic in UR
Ryan Sleevi
2015/07/14 18:41:02
No, it's to mirror https://code.google.com/p/chrom
mmenke
2015/07/14 18:52:12
So then why doesn't https://code.google.com/p/chro
Ryan Sleevi
2015/07/14 18:55:32
Oof, yeah, good catch on the bug.
Basically, the
mmenke
2015/07/14 19:10:52
I'm skeptical of the idea of sharing a URLRequestC
|
+ |
mmenke
2015/07/14 16:32:03
The existing test for privacy mode socket use is H
|
// Change group name if privacy mode is enabled. |
- if (privacy_mode == PRIVACY_MODE_ENABLED) |
+ if (enable_privacy_mode) |
connection_group = "pm/" + connection_group; |
// Deal with SSL - which layers on top of any given proxy. |