Migrate TODOs referencing old crbug IDs to the new issue tracker IDs
The canonical bug format is TODO(crbug.com/<id>). TODOs of the
following forms will all be migrated to the new format:
- TODO(crbug.com/<old id>)
- TODO(https://crbug.com/<old id>)
- TODO(crbug/<old id>)
- TODO(crbug/monorail/<old id>)
- TODO(<old id>)
- TODO(issues.chromium.org/<old id>)
- TODO(https://issues.chromium.org/<old id>)
- TODO(https://issues.chromium.org/u/1/issues/<old id>)
- TODO(bugs.chromium.org/<old id>)
Bug id mapping is sourced from go/chrome-on-buganizer-prod-issues.
See go/crbug-todo-migration for details.
#crbug-todo-migration
Bug: b/321899722
Change-Id: Ib028de8bb63c99e5a81d90e24e422cf88061ad05
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/5469583
Owners-Override: Alison Gale <[email protected]>
Reviewed-by: Darryl James <[email protected]>
Commit-Queue: Alison Gale <[email protected]>
Cr-Commit-Position: refs/heads/main@{#1290952}
diff --git a/net/base/features.h b/net/base/features.h
index 4650a15..a4b9d06c 100644
--- a/net/base/features.h
+++ b/net/base/features.h
@@ -533,7 +533,7 @@
// Treat HTTP header `Expires: "0"` as expired value according section 5.3 on
// RFC 9111.
-// TODO(https://crbug.com/853508): Remove after the bug fix will go well for a
+// TODO(crbug.com/41395025): Remove after the bug fix will go well for a
// while on stable channels.
NET_EXPORT BASE_DECLARE_FEATURE(kTreatHTTPExpiresHeaderValueZeroAsExpired);
diff --git a/net/base/file_stream_unittest.cc b/net/base/file_stream_unittest.cc
index d598eed9..f8adab0 100644
--- a/net/base/file_stream_unittest.cc
+++ b/net/base/file_stream_unittest.cc
@@ -845,7 +845,7 @@
#endif
#if BUILDFLAG(IS_ANDROID)
-// TODO(https://crbug.com/894599): flaky on both android and cronet bots.
+// TODO(crbug.com/41420277): flaky on both android and cronet bots.
TEST_F(FileStreamTest, DISABLED_ContentUriRead) {
base::FilePath test_dir;
base::PathService::Get(base::DIR_SRC_TEST_DATA_ROOT, &test_dir);
diff --git a/net/disk_cache/backend_unittest.cc b/net/disk_cache/backend_unittest.cc
index 48266da..d088d44 100644
--- a/net/disk_cache/backend_unittest.cc
+++ b/net/disk_cache/backend_unittest.cc
@@ -78,7 +78,7 @@
#include "base/win/scoped_handle.h"
#endif
-// TODO(crbug.com/949811): Fix memory leaks in tests and re-enable on LSAN.
+// TODO(crbug.com/41451310): Fix memory leaks in tests and re-enable on LSAN.
#ifdef LEAK_SANITIZER
#define MAYBE_BlockFileOpenOrCreateEntry DISABLED_BlockFileOpenOrCreateEntry
#define MAYBE_NonEmptyCorruptSimpleCacheDoesNotRecover \
diff --git a/net/dns/host_resolver_manager_job.h b/net/dns/host_resolver_manager_job.h
index 860ad90..d4ba4ca1 100644
--- a/net/dns/host_resolver_manager_job.h
+++ b/net/dns/host_resolver_manager_job.h
@@ -288,7 +288,7 @@
const JobKey key_;
const ResolveHostParameters::CacheUsage cache_usage_;
- // TODO(crbug.com/969847): Consider allowing requests within a single Job to
+ // TODO(crbug.com/41462480): Consider allowing requests within a single Job to
// have different HostCaches.
const raw_ptr<HostCache> host_cache_;
diff --git a/net/dns/mdns_cache.cc b/net/dns/mdns_cache.cc
index cd46160..8a01b61 100644
--- a/net/dns/mdns_cache.cc
+++ b/net/dns/mdns_cache.cc
@@ -106,8 +106,8 @@
const RecordRemovedCallback& record_removed_callback) {
base::Time next_expiration;
- // TODO(crbug.com/946688): Make overfill pruning more intelligent than a bulk
- // clearing of everything.
+ // TODO(crbug.com/41449550): Make overfill pruning more intelligent than a
+ // bulk clearing of everything.
bool clear_cache = IsCacheOverfilled();
// We are guaranteed that |next_expiration_| will be at or before the next
diff --git a/net/http/http_auth_handler_digest.cc b/net/http/http_auth_handler_digest.cc
index 6a00a99d..b8aa6c6 100644
--- a/net/http/http_auth_handler_digest.cc
+++ b/net/http/http_auth_handler_digest.cc
@@ -277,7 +277,7 @@
// Parse the comma separated list of qops.
// auth is the only supported qop, and all other values are ignored.
//
- // TODO(https://crbug.com/820198): Remove this copy when
+ // TODO(crbug.com/41375521): Remove this copy when
// HttpUtil::ValuesIterator can take a std::string_view.
std::string value_str(value);
HttpUtil::ValuesIterator qop_values(value_str.begin(), value_str.end(),
diff --git a/net/http/http_auth_sspi_win.cc b/net/http/http_auth_sspi_win.cc
index d8d6e3c5..43883e395 100644
--- a/net/http/http_auth_sspi_win.cc
+++ b/net/http/http_auth_sspi_win.cc
@@ -327,7 +327,7 @@
ULONG ulAttribute,
PVOID pBuffer,
ULONG cbBuffer) {
- // TODO(https://crbug.com/992779): QueryContextAttributesExW is not included
+ // TODO(crbug.com/41475489): QueryContextAttributesExW is not included
// in Secur32.Lib in 10.0.18362.0 SDK. This symbol requires switching to using
// Windows SDK API sets in mincore.lib or OneCore.Lib. Switch to using
// QueryContextAttributesEx when the switch is made.
diff --git a/net/nqe/network_quality_estimator.h b/net/nqe/network_quality_estimator.h
index ae0bfe09..7a2fea60 100644
--- a/net/nqe/network_quality_estimator.h
+++ b/net/nqe/network_quality_estimator.h
@@ -258,7 +258,7 @@
// GatherEstimatesForNextConnectionType(). This should always be called in
// production, because getting the network id involves a blocking call to
// recv() in AddressTrackerLinux, and the IO thread should never be blocked.
- // TODO(https://crbug.com/821607): Remove after the bug is resolved.
+ // TODO(crbug.com/41376341): Remove after the bug is resolved.
void EnableGetNetworkIdAsynchronously();
#endif // BUILDFLAG(IS_CHROMEOS_ASH)
diff --git a/net/proxy_resolution/configured_proxy_resolution_service.cc b/net/proxy_resolution/configured_proxy_resolution_service.cc
index 7d7ece2..6c4f0f8 100644
--- a/net/proxy_resolution/configured_proxy_resolution_service.cc
+++ b/net/proxy_resolution/configured_proxy_resolution_service.cc
@@ -380,7 +380,7 @@
// for security (attacker can already route traffic through their HTTP proxy
// and see the full URL for http:// requests).
//
-// TODO(https://crbug.com/882536): Use the same stripping for insecure URL
+// TODO(crbug.com/41412888): Use the same stripping for insecure URL
// schemes.
GURL SanitizeUrl(const GURL& url) {
DCHECK(url.is_valid());
diff --git a/net/proxy_resolution/proxy_config_service.cc b/net/proxy_resolution/proxy_config_service.cc
index 810f408..4235120 100644
--- a/net/proxy_resolution/proxy_config_service.cc
+++ b/net/proxy_resolution/proxy_config_service.cc
@@ -132,7 +132,7 @@
std::move(main_task_runner),
base::SingleThreadTaskRunner::GetCurrentDefault());
#elif BUILDFLAG(IS_FUCHSIA)
- // TODO(crbug.com/889195): Implement a system proxy service for Fuchsia.
+ // TODO(crbug.com/42050626): Implement a system proxy service for Fuchsia.
return std::make_unique<ProxyConfigServiceDirect>();
#else
LOG(WARNING) << "Failed to choose a system proxy settings fetcher "
diff --git a/net/quic/quic_network_transaction_unittest.cc b/net/quic/quic_network_transaction_unittest.cc
index 48705dbf..c17472c4 100644
--- a/net/quic/quic_network_transaction_unittest.cc
+++ b/net/quic/quic_network_transaction_unittest.cc
@@ -120,7 +120,7 @@
// Response data used for QUIC requests in multiple tests.
constexpr std::string_view kQuicRespData = "hello!";
// Response data used for HTTP requests in multiple tests.
-// TODO(https://crbug.com/1523631): Once MockReadWrite accepts a
+// TODO(crbug.com/41496581): Once MockReadWrite accepts a
// std::string_view parameter, we can use "constexpr std::string_view" for this.
const char kHttpRespData[] = "hello world";
diff --git a/net/socket/tcp_socket_posix.cc b/net/socket/tcp_socket_posix.cc
index 4a7091cd..5c24977 100644
--- a/net/socket/tcp_socket_posix.cc
+++ b/net/socket/tcp_socket_posix.cc
@@ -54,7 +54,7 @@
#endif
// Fuchsia defines TCP_INFO, but it's not implemented.
-// TODO(crbug.com/758294): Enable TCP_INFO on Fuchsia once it's implemented
+// TODO(crbug.com/42050612): Enable TCP_INFO on Fuchsia once it's implemented
// there (see NET-160).
#if defined(TCP_INFO) && !BUILDFLAG(IS_FUCHSIA)
#define HAVE_TCP_INFO
diff --git a/net/socket/transport_client_socket_pool.cc b/net/socket/transport_client_socket_pool.cc
index 76b3406..f00bc6c 100644
--- a/net/socket/transport_client_socket_pool.cc
+++ b/net/socket/transport_client_socket_pool.cc
@@ -1592,7 +1592,7 @@
// connection - the timeout they used is tuned for that, and tests expect that
// behavior.
//
- // TODO(https://crbug.com/929814): Replace both this and the
+ // TODO(crbug.com/41440018): Replace both this and the
// LOAD_STATE_RESOLVING_HOST check with a callback. Use the
// LOAD_STATE_RESOLVING_HOST callback to start the timer (And invoke the
// OnHostResolved callback of any pending requests), and the
diff --git a/net/socket/udp_socket_posix.h b/net/socket/udp_socket_posix.h
index ff9d09e4..38ebe30 100644
--- a/net/socket/udp_socket_posix.h
+++ b/net/socket/udp_socket_posix.h
@@ -405,7 +405,7 @@
// Hash of |socket_| to verify that it is not corrupted when calling close().
// Used to debug https://crbug.com/906005.
- // TODO(crbug.com/906005): Remove this once the bug is fixed.
+ // TODO(crbug.com/41426706): Remove this once the bug is fixed.
int socket_hash_ = 0;
int addr_family_ = 0;
diff --git a/net/tools/cert_verify_tool/cert_verify_tool.cc b/net/tools/cert_verify_tool/cert_verify_tool.cc
index 3c44af3..11ea55f 100644
--- a/net/tools/cert_verify_tool/cert_verify_tool.cc
+++ b/net/tools/cert_verify_tool/cert_verify_tool.cc
@@ -271,7 +271,7 @@
"CertVerifyProcBuiltin",
net::CreateCertVerifyProcBuiltin(
std::move(cert_net_fetcher), std::move(crl_set),
- // TODO(https://crbug.com/848277): support CT.
+ // TODO(crbug.com/41392053): support CT.
std::make_unique<net::DoNothingCTVerifier>(),
base::MakeRefCounted<net::DefaultCTPolicyEnforcer>(),
CreateSystemTrustStore(impl_name, root_store_type), {}));