net/cookie: Don't include excessive --v logging in release builds.
Change-Id: Ib9e73eba4c94c79ea88f565817665cc3e7c17ecb
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1572580
Reviewed-by: Matt Menke <[email protected]>
Commit-Queue: Maks Orlovich <[email protected]>
Cr-Commit-Position: refs/heads/master@{#652174}
diff --git a/net/cookies/cookie_monster.cc b/net/cookies/cookie_monster.cc
index e77e478..6fefab00 100644
--- a/net/cookies/cookie_monster.cc
+++ b/net/cookies/cookie_monster.cc
@@ -689,7 +689,7 @@
return;
}
- VLOG(net::cookie_util::kVlogSetCookies)
+ DVLOG(net::cookie_util::kVlogSetCookies)
<< "SetCookie() line: " << cookie_line;
CanonicalCookie::CookieInclusionStatus status;
@@ -699,7 +699,7 @@
if (status != CanonicalCookie::CookieInclusionStatus::INCLUDE) {
DCHECK(!cc);
- VLOG(net::cookie_util::kVlogSetCookies)
+ DVLOG(net::cookie_util::kVlogSetCookies)
<< "WARNING: Failed to allocate CanonicalCookie";
MaybeRunCookieCallback(std::move(callback), status);
return;
@@ -1228,12 +1228,12 @@
"SetCookie() not clobbering httponly cookie or secure cookie for "
"insecure scheme";
- VLOG(net::cookie_util::kVlogSetCookies) << error;
+ DVLOG(net::cookie_util::kVlogSetCookies) << error;
MaybeRunCookieCallback(std::move(callback), status);
return;
}
- VLOG(net::cookie_util::kVlogSetCookies)
+ DVLOG(net::cookie_util::kVlogSetCookies)
<< "SetCookie() key: " << key << " cc: " << cc->DebugString();
// Realize that we might be setting an expired cookie, and the only point
@@ -1266,7 +1266,7 @@
InternalInsertCookie(key, std::move(cc), true);
} else {
- VLOG(net::cookie_util::kVlogSetCookies)
+ DVLOG(net::cookie_util::kVlogSetCookies)
<< "SetCookie() not storing already expired cookie.";
}
@@ -1345,7 +1345,7 @@
"kChangeCauseMapping size should match DeletionCause size");
CanonicalCookie* cc = it->second.get();
- VLOG(net::cookie_util::kVlogSetCookies)
+ DVLOG(net::cookie_util::kVlogSetCookies)
<< "InternalDeleteCookie()"
<< ", cause:" << deletion_cause << ", cc: " << cc->DebugString();
@@ -1375,7 +1375,7 @@
// Collect garbage for this key, minding cookie priorities.
if (cookies_.count(key) > kDomainMaxCookies) {
- VLOG(net::cookie_util::kVlogGarbageCollection)
+ DVLOG(net::cookie_util::kVlogGarbageCollection)
<< "GarbageCollect() key: " << key;
CookieItVector* cookie_its;
@@ -1386,7 +1386,7 @@
GarbageCollectExpired(current, cookies_.equal_range(key), cookie_its);
if (cookie_its->size() > kDomainMaxCookies) {
- VLOG(net::cookie_util::kVlogGarbageCollection)
+ DVLOG(net::cookie_util::kVlogGarbageCollection)
<< "Deep Garbage Collect domain.";
size_t purge_goal =
cookie_its->size() - (kDomainMaxCookies - kDomainPurgeCookies);
@@ -1465,7 +1465,7 @@
// Collect garbage for everything. With firefox style we want to preserve
// cookies accessed in kSafeFromGlobalPurgeDays, otherwise evict.
if (cookies_.size() > kMaxCookies && earliest_access_time_ < safe_date) {
- VLOG(net::cookie_util::kVlogGarbageCollection)
+ DVLOG(net::cookie_util::kVlogGarbageCollection)
<< "GarbageCollect() everything";
CookieItVector cookie_its;
@@ -1474,7 +1474,7 @@
&cookie_its);
if (cookie_its.size() > kMaxCookies) {
- VLOG(net::cookie_util::kVlogGarbageCollection)
+ DVLOG(net::cookie_util::kVlogGarbageCollection)
<< "Deep Garbage Collect everything.";
size_t purge_goal = cookie_its.size() - (kMaxCookies - kPurgeCookies);
DCHECK(purge_goal > kPurgeCookies);
@@ -1691,7 +1691,7 @@
}
// The scheme didn't match any in our whitelist.
- VLOG(net::cookie_util::kVlogPerCookieMonster)
+ DVLOG(net::cookie_util::kVlogPerCookieMonster)
<< "WARNING: Unsupported cookie scheme: " << url.scheme();
return false;
}