|
|
Created:
4 years, 7 months ago by maksims (do not use this acc) Modified:
4 years, 7 months ago CC:
chromium-reviews Base URL:
https://chromium.googlesource.com/chromium/src.git@master Target Ref:
refs/pending/heads/master Project:
chromium Visibility:
Public. |
DescriptionRestrict kDisableSpdy pref to only disable SPDY/3.1, not HTTP/2.
HTTP/2 is now published and officially supported by many browsers and
server. No need to disable it with SPDY/3.1.
BUG=585614
Committed: https://crrev.com/ea2b6531d5976cb7b6b9593a8c8e773e41eaf92d
Cr-Commit-Position: refs/heads/master@{#395612}
Patch Set 1 #Patch Set 2 : rebasing #Patch Set 3 : fixing unittest #Patch Set 4 : the same thing but in different files #
Messages
Total messages: 37 (15 generated)
Description was changed from ========== Restrict kDisableSpdy pref to only disable SPDY/3.1, not HTTP/2. HTTP/2 is now published and officially supported by many browsers and server. No need to disable it with SPDY/3.1. BUG=585614 ========== to ========== Restrict kDisableSpdy pref to only disable SPDY/3.1, not HTTP/2. HTTP/2 is now published and officially supported by many browsers and server. No need to disable it with SPDY/3.1. BUG=585614 ==========
maksim.sisov@intel.com changed reviewers: + mmenke@chromium.org
please take a look
mmenke@chromium.org changed reviewers: + bnc@chromium.org, rch@chromium.org
[+bnc, +rch]: Do we even still support SPDY? Not sure if we still want to continue to keep the policy to disable HTTP2 for enterprises with broken SSL MITM proxies or not.
On 2016/05/06 11:54:18, mmenke wrote: > [+bnc, +rch]: Do we even still support SPDY? > > Not sure if we still want to continue to keep the policy to disable HTTP2 for > enterprises with broken SSL MITM proxies or not. Glanced at the bug, and it does indicate this is what is intended. Want confirmation from people who know SPDY/H2 better that we shouldn't just be removing enable_spdy31 entirely (And maybe enable_http2 as well).
As much as I am in favor of this change, unfortunately we need approval from enterprise team. I'm very sorry but this is not LGTM for the time being.
maksim.sisov@intel.com changed reviewers: + cbentzel@chromium.org, saswat@chromium.org, sidv@chromium.org
gentle ping
On 2016/05/11 05:18:04, maksims wrote: > gentle ping Bence talked to the enterprise leads, and I think he got the approvals, though he's still out of office, so not sure when he'll be able to sign off on this.
On 2016/05/11 05:18:04, maksims wrote: > gentle ping Still not LGTM: enterprise leads requested that this change does not land until 53. Please feel free to ping me again after branch day. Thank you.
On 2016/05/11 19:47:05, Bence OOO until May 23 wrote: > On 2016/05/11 05:18:04, maksims wrote: > > gentle ping > > Still not LGTM: enterprise leads requested that this change does not land until > 53. Please feel free to ping me again after branch day. Thank you. And, for the record, branch point is next Thursday, the 19th.
LGTM
The CQ bit was checked by maksim.sisov@intel.com
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/1956573004/1 View timeline at https://chromium-cq-status.appspot.com/patch-timeline/1956573004/1
The CQ bit was unchecked by commit-bot@chromium.org
Try jobs failed on following builders: chromium_presubmit on tryserver.chromium.linux (JOB_FAILED, http://build.chromium.org/p/tryserver.chromium.linux/builders/chromium_presub...)
The CQ bit was checked by maksim.sisov@intel.com
The patchset sent to the CQ was uploaded after l-g-t-m from bnc@chromium.org Link to the patchset: https://codereview.chromium.org/1956573004/#ps20001 (title: "rebasing")
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/1956573004/20001 View timeline at https://chromium-cq-status.appspot.com/patch-timeline/1956573004/20001
The CQ bit was unchecked by commit-bot@chromium.org
Try jobs failed on following builders: chromium_presubmit on tryserver.chromium.linux (JOB_FAILED, http://build.chromium.org/p/tryserver.chromium.linux/builders/chromium_presub...)
Seems like we are missing lgtm from the owner of the file. cbentzel@, mmenke@, Ryan Hamilton, could somebody of you do that?
lgtm
The CQ bit was checked by maksim.sisov@intel.com
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/1956573004/20001 View timeline at https://chromium-cq-status.appspot.com/patch-timeline/1956573004/20001
The CQ bit was unchecked by commit-bot@chromium.org
Try jobs failed on following builders: mac_chromium_rel_ng on tryserver.chromium.mac (JOB_FAILED, http://build.chromium.org/p/tryserver.chromium.mac/builders/mac_chromium_rel_...)
I have recently landed https://crrev.com/1892123003, which would cause a merge conflict with this CL. You need to rebase, but since the code this CL is touching moved to components/network_session_configurator/network_session_configurator{.cc,_unittest.cc}, the easiest way to do so would be to revert your change in chrome/browser/io_thread{.cc,_unittest.cc}, then rebase your CL on tip of the tree, then do your changes manually. Sorry about the hassle.
On 2016/05/24 11:01:27, Bence wrote: > I have recently landed https://crrev.com/1892123003, which would cause a merge > conflict with this CL. You need to rebase, but since the code this CL is > touching moved to > components/network_session_configurator/network_session_configurator{.cc,_unittest.cc}, > the easiest way to do so would be to revert your change in > chrome/browser/io_thread{.cc,_unittest.cc}, then rebase your CL on tip of the > tree, then do your changes manually. Sorry about the hassle. Ok, thanks!
The CQ bit was checked by maksim.sisov@intel.com
The patchset sent to the CQ was uploaded after l-g-t-m from bnc@chromium.org, rch@chromium.org Link to the patchset: https://codereview.chromium.org/1956573004/#ps60001 (title: "the same thing but in different files")
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/1956573004/60001 View timeline at https://chromium-cq-status.appspot.com/patch-timeline/1956573004/60001
Message was sent while issue was closed.
Description was changed from ========== Restrict kDisableSpdy pref to only disable SPDY/3.1, not HTTP/2. HTTP/2 is now published and officially supported by many browsers and server. No need to disable it with SPDY/3.1. BUG=585614 ========== to ========== Restrict kDisableSpdy pref to only disable SPDY/3.1, not HTTP/2. HTTP/2 is now published and officially supported by many browsers and server. No need to disable it with SPDY/3.1. BUG=585614 ==========
Message was sent while issue was closed.
Committed patchset #4 (id:60001)
Message was sent while issue was closed.
Description was changed from ========== Restrict kDisableSpdy pref to only disable SPDY/3.1, not HTTP/2. HTTP/2 is now published and officially supported by many browsers and server. No need to disable it with SPDY/3.1. BUG=585614 ========== to ========== Restrict kDisableSpdy pref to only disable SPDY/3.1, not HTTP/2. HTTP/2 is now published and officially supported by many browsers and server. No need to disable it with SPDY/3.1. BUG=585614 Committed: https://crrev.com/ea2b6531d5976cb7b6b9593a8c8e773e41eaf92d Cr-Commit-Position: refs/heads/master@{#395612} ==========
Message was sent while issue was closed.
Patchset 4 (id:??) landed as https://crrev.com/ea2b6531d5976cb7b6b9593a8c8e773e41eaf92d Cr-Commit-Position: refs/heads/master@{#395612} |