Migrate TODOs referencing old crbug IDs to the new issue tracker IDs

The canonical bug format is TODO(crbug.com/<id>). TODOs of the
following forms will all be migrated to the new format:

- TODO(crbug.com/<old id>)
- TODO(https://crbug.com/<old id>)
- TODO(crbug/<old id>)
- TODO(crbug/monorail/<old id>)
- TODO(<old id>)
- TODO(issues.chromium.org/<old id>)
- TODO(https://issues.chromium.org/<old id>)
- TODO(https://issues.chromium.org/u/1/issues/<old id>)
- TODO(bugs.chromium.org/<old id>)

Bug id mapping is sourced from go/chrome-on-buganizer-prod-issues.
See go/crbug-todo-migration for details.

#crbug-todo-migration

Bug: b/321899722
Change-Id: Ib028de8bb63c99e5a81d90e24e422cf88061ad05
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/5469583
Owners-Override: Alison Gale <[email protected]>
Reviewed-by: Darryl James <[email protected]>
Commit-Queue: Alison Gale <[email protected]>
Cr-Commit-Position: refs/heads/main@{#1290952}
diff --git a/net/base/features.h b/net/base/features.h
index 4650a15..a4b9d06c 100644
--- a/net/base/features.h
+++ b/net/base/features.h
@@ -533,7 +533,7 @@
 
 // Treat HTTP header `Expires: "0"` as expired value according section 5.3 on
 // RFC 9111.
-// TODO(https://crbug.com/853508): Remove after the bug fix will go well for a
+// TODO(crbug.com/41395025): Remove after the bug fix will go well for a
 // while on stable channels.
 NET_EXPORT BASE_DECLARE_FEATURE(kTreatHTTPExpiresHeaderValueZeroAsExpired);
 
diff --git a/net/base/file_stream_unittest.cc b/net/base/file_stream_unittest.cc
index d598eed9..f8adab0 100644
--- a/net/base/file_stream_unittest.cc
+++ b/net/base/file_stream_unittest.cc
@@ -845,7 +845,7 @@
 #endif
 
 #if BUILDFLAG(IS_ANDROID)
-// TODO(https://crbug.com/894599): flaky on both android and cronet bots.
+// TODO(crbug.com/41420277): flaky on both android and cronet bots.
 TEST_F(FileStreamTest, DISABLED_ContentUriRead) {
   base::FilePath test_dir;
   base::PathService::Get(base::DIR_SRC_TEST_DATA_ROOT, &test_dir);
diff --git a/net/disk_cache/backend_unittest.cc b/net/disk_cache/backend_unittest.cc
index 48266da..d088d44 100644
--- a/net/disk_cache/backend_unittest.cc
+++ b/net/disk_cache/backend_unittest.cc
@@ -78,7 +78,7 @@
 #include "base/win/scoped_handle.h"
 #endif
 
-// TODO(crbug.com/949811): Fix memory leaks in tests and re-enable on LSAN.
+// TODO(crbug.com/41451310): Fix memory leaks in tests and re-enable on LSAN.
 #ifdef LEAK_SANITIZER
 #define MAYBE_BlockFileOpenOrCreateEntry DISABLED_BlockFileOpenOrCreateEntry
 #define MAYBE_NonEmptyCorruptSimpleCacheDoesNotRecover \
diff --git a/net/dns/host_resolver_manager_job.h b/net/dns/host_resolver_manager_job.h
index 860ad90..d4ba4ca1 100644
--- a/net/dns/host_resolver_manager_job.h
+++ b/net/dns/host_resolver_manager_job.h
@@ -288,7 +288,7 @@
 
   const JobKey key_;
   const ResolveHostParameters::CacheUsage cache_usage_;
-  // TODO(crbug.com/969847): Consider allowing requests within a single Job to
+  // TODO(crbug.com/41462480): Consider allowing requests within a single Job to
   // have different HostCaches.
   const raw_ptr<HostCache> host_cache_;
 
diff --git a/net/dns/mdns_cache.cc b/net/dns/mdns_cache.cc
index cd46160..8a01b61 100644
--- a/net/dns/mdns_cache.cc
+++ b/net/dns/mdns_cache.cc
@@ -106,8 +106,8 @@
     const RecordRemovedCallback& record_removed_callback) {
   base::Time next_expiration;
 
-  // TODO(crbug.com/946688): Make overfill pruning more intelligent than a bulk
-  // clearing of everything.
+  // TODO(crbug.com/41449550): Make overfill pruning more intelligent than a
+  // bulk clearing of everything.
   bool clear_cache = IsCacheOverfilled();
 
   // We are guaranteed that |next_expiration_| will be at or before the next
diff --git a/net/http/http_auth_handler_digest.cc b/net/http/http_auth_handler_digest.cc
index 6a00a99d..b8aa6c6 100644
--- a/net/http/http_auth_handler_digest.cc
+++ b/net/http/http_auth_handler_digest.cc
@@ -277,7 +277,7 @@
     // Parse the comma separated list of qops.
     // auth is the only supported qop, and all other values are ignored.
     //
-    // TODO(https://crbug.com/820198): Remove this copy when
+    // TODO(crbug.com/41375521): Remove this copy when
     // HttpUtil::ValuesIterator can take a std::string_view.
     std::string value_str(value);
     HttpUtil::ValuesIterator qop_values(value_str.begin(), value_str.end(),
diff --git a/net/http/http_auth_sspi_win.cc b/net/http/http_auth_sspi_win.cc
index d8d6e3c5..43883e395 100644
--- a/net/http/http_auth_sspi_win.cc
+++ b/net/http/http_auth_sspi_win.cc
@@ -327,7 +327,7 @@
     ULONG ulAttribute,
     PVOID pBuffer,
     ULONG cbBuffer) {
-  // TODO(https://crbug.com/992779): QueryContextAttributesExW is not included
+  // TODO(crbug.com/41475489): QueryContextAttributesExW is not included
   // in Secur32.Lib in 10.0.18362.0 SDK. This symbol requires switching to using
   // Windows SDK API sets in mincore.lib or OneCore.Lib. Switch to using
   // QueryContextAttributesEx when the switch is made.
diff --git a/net/nqe/network_quality_estimator.h b/net/nqe/network_quality_estimator.h
index ae0bfe09..7a2fea60 100644
--- a/net/nqe/network_quality_estimator.h
+++ b/net/nqe/network_quality_estimator.h
@@ -258,7 +258,7 @@
   // GatherEstimatesForNextConnectionType(). This should always be called in
   // production, because getting the network id involves a blocking call to
   // recv() in AddressTrackerLinux, and the IO thread should never be blocked.
-  // TODO(https://crbug.com/821607): Remove after the bug is resolved.
+  // TODO(crbug.com/41376341): Remove after the bug is resolved.
   void EnableGetNetworkIdAsynchronously();
 #endif  // BUILDFLAG(IS_CHROMEOS_ASH)
 
diff --git a/net/proxy_resolution/configured_proxy_resolution_service.cc b/net/proxy_resolution/configured_proxy_resolution_service.cc
index 7d7ece2..6c4f0f8 100644
--- a/net/proxy_resolution/configured_proxy_resolution_service.cc
+++ b/net/proxy_resolution/configured_proxy_resolution_service.cc
@@ -380,7 +380,7 @@
 // for security (attacker can already route traffic through their HTTP proxy
 // and see the full URL for http:// requests).
 //
-// TODO(https://crbug.com/882536): Use the same stripping for insecure URL
+// TODO(crbug.com/41412888): Use the same stripping for insecure URL
 // schemes.
 GURL SanitizeUrl(const GURL& url) {
   DCHECK(url.is_valid());
diff --git a/net/proxy_resolution/proxy_config_service.cc b/net/proxy_resolution/proxy_config_service.cc
index 810f408..4235120 100644
--- a/net/proxy_resolution/proxy_config_service.cc
+++ b/net/proxy_resolution/proxy_config_service.cc
@@ -132,7 +132,7 @@
       std::move(main_task_runner),
       base::SingleThreadTaskRunner::GetCurrentDefault());
 #elif BUILDFLAG(IS_FUCHSIA)
-  // TODO(crbug.com/889195): Implement a system proxy service for Fuchsia.
+  // TODO(crbug.com/42050626): Implement a system proxy service for Fuchsia.
   return std::make_unique<ProxyConfigServiceDirect>();
 #else
   LOG(WARNING) << "Failed to choose a system proxy settings fetcher "
diff --git a/net/quic/quic_network_transaction_unittest.cc b/net/quic/quic_network_transaction_unittest.cc
index 48705dbf..c17472c4 100644
--- a/net/quic/quic_network_transaction_unittest.cc
+++ b/net/quic/quic_network_transaction_unittest.cc
@@ -120,7 +120,7 @@
 // Response data used for QUIC requests in multiple tests.
 constexpr std::string_view kQuicRespData = "hello!";
 // Response data used for HTTP requests in multiple tests.
-// TODO(https://crbug.com/1523631): Once MockReadWrite accepts a
+// TODO(crbug.com/41496581): Once MockReadWrite accepts a
 // std::string_view parameter, we can use "constexpr std::string_view" for this.
 const char kHttpRespData[] = "hello world";
 
diff --git a/net/socket/tcp_socket_posix.cc b/net/socket/tcp_socket_posix.cc
index 4a7091cd..5c24977 100644
--- a/net/socket/tcp_socket_posix.cc
+++ b/net/socket/tcp_socket_posix.cc
@@ -54,7 +54,7 @@
 #endif
 
 // Fuchsia defines TCP_INFO, but it's not implemented.
-// TODO(crbug.com/758294): Enable TCP_INFO on Fuchsia once it's implemented
+// TODO(crbug.com/42050612): Enable TCP_INFO on Fuchsia once it's implemented
 // there (see NET-160).
 #if defined(TCP_INFO) && !BUILDFLAG(IS_FUCHSIA)
 #define HAVE_TCP_INFO
diff --git a/net/socket/transport_client_socket_pool.cc b/net/socket/transport_client_socket_pool.cc
index 76b3406..f00bc6c 100644
--- a/net/socket/transport_client_socket_pool.cc
+++ b/net/socket/transport_client_socket_pool.cc
@@ -1592,7 +1592,7 @@
   // connection - the timeout they used is tuned for that, and tests expect that
   // behavior.
   //
-  // TODO(https://crbug.com/929814): Replace both this and the
+  // TODO(crbug.com/41440018): Replace both this and the
   // LOAD_STATE_RESOLVING_HOST check with a callback. Use the
   // LOAD_STATE_RESOLVING_HOST callback to start the timer (And invoke the
   // OnHostResolved callback of any pending requests), and the
diff --git a/net/socket/udp_socket_posix.h b/net/socket/udp_socket_posix.h
index ff9d09e4..38ebe30 100644
--- a/net/socket/udp_socket_posix.h
+++ b/net/socket/udp_socket_posix.h
@@ -405,7 +405,7 @@
 
   // Hash of |socket_| to verify that it is not corrupted when calling close().
   // Used to debug https://crbug.com/906005.
-  // TODO(crbug.com/906005): Remove this once the bug is fixed.
+  // TODO(crbug.com/41426706): Remove this once the bug is fixed.
   int socket_hash_ = 0;
 
   int addr_family_ = 0;
diff --git a/net/tools/cert_verify_tool/cert_verify_tool.cc b/net/tools/cert_verify_tool/cert_verify_tool.cc
index 3c44af3..11ea55f 100644
--- a/net/tools/cert_verify_tool/cert_verify_tool.cc
+++ b/net/tools/cert_verify_tool/cert_verify_tool.cc
@@ -271,7 +271,7 @@
         "CertVerifyProcBuiltin",
         net::CreateCertVerifyProcBuiltin(
             std::move(cert_net_fetcher), std::move(crl_set),
-            // TODO(https://crbug.com/848277): support CT.
+            // TODO(crbug.com/41392053): support CT.
             std::make_unique<net::DoNothingCTVerifier>(),
             base::MakeRefCounted<net::DefaultCTPolicyEnforcer>(),
             CreateSystemTrustStore(impl_name, root_store_type), {}));