| Index: chrome/browser/safe_browsing/malware_details_cache.cc
|
| ===================================================================
|
| --- chrome/browser/safe_browsing/malware_details_cache.cc (revision 107061)
|
| +++ chrome/browser/safe_browsing/malware_details_cache.cc (working copy)
|
| @@ -85,11 +85,11 @@
|
| GURL(resources_it_->first),
|
| URLFetcher::GET,
|
| this));
|
| - current_fetch_->set_request_context(request_context_getter_);
|
| + current_fetch_->SetRequestContext(request_context_getter_);
|
| // Only from cache, and don't save cookies.
|
| - current_fetch_->set_load_flags(net::LOAD_ONLY_FROM_CACHE |
|
| - net::LOAD_DO_NOT_SAVE_COOKIES);
|
| - current_fetch_->set_automatically_retry_on_5xx(false); // No retries.
|
| + current_fetch_->SetLoadFlags(net::LOAD_ONLY_FROM_CACHE |
|
| + net::LOAD_DO_NOT_SAVE_COOKIES);
|
| + current_fetch_->SetAutomaticallyRetryOn5xx(false); // No retries.
|
| current_fetch_->Start(); // OnURLFetchComplete will be called when done.
|
| }
|
|
|
| @@ -103,21 +103,21 @@
|
| }
|
|
|
| void MalwareDetailsCacheCollector::OnURLFetchComplete(
|
| - const URLFetcher* source) {
|
| + const content::URLFetcher* source) {
|
| DVLOG(1) << "OnUrlFetchComplete";
|
| DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
|
| DCHECK(current_fetch_.get());
|
| - if (source->status().status() != net::URLRequestStatus::SUCCESS &&
|
| - source->status().error() == net::ERR_CACHE_MISS) {
|
| + if (source->GetStatus().status() != net::URLRequestStatus::SUCCESS &&
|
| + source->GetStatus().error() == net::ERR_CACHE_MISS) {
|
| // Cache miss, skip this resource.
|
| - DVLOG(1) << "Cache miss for url: " << source->url();
|
| + DVLOG(1) << "Cache miss for url: " << source->GetUrl();
|
| AdvanceEntry();
|
| return;
|
| }
|
|
|
| - if (source->status().status() != net::URLRequestStatus::SUCCESS) {
|
| + if (source->GetStatus().status() != net::URLRequestStatus::SUCCESS) {
|
| // Some other error occurred, e.g. the request could have been cancelled.
|
| - DVLOG(1) << "Unsuccessful fetch: " << source->url();
|
| + DVLOG(1) << "Unsuccessful fetch: " << source->GetUrl();
|
| AdvanceEntry();
|
| return;
|
| }
|
| @@ -125,9 +125,10 @@
|
| // Set the response headers and body to the right resource, which
|
| // might not be the same as the one we asked for.
|
| // For redirects, resources_it_->first != url.spec().
|
| - ClientMalwareReportRequest::Resource* resource = GetResource(source->url());
|
| + ClientMalwareReportRequest::Resource* resource =
|
| + GetResource(source->GetUrl());
|
| if (!resource) {
|
| - DVLOG(1) << "Cannot find resource for url:" << source->url();
|
| + DVLOG(1) << "Cannot find resource for url:" << source->GetUrl();
|
| AdvanceEntry();
|
| return;
|
| }
|
| @@ -141,10 +142,10 @@
|
|
|
| void MalwareDetailsCacheCollector::ReadResponse(
|
| ClientMalwareReportRequest::Resource* pb_resource,
|
| - const URLFetcher* source) {
|
| + const content::URLFetcher* source) {
|
| DVLOG(1) << "ReadResponse";
|
| DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
|
| - net::HttpResponseHeaders* headers = source->response_headers();
|
| + net::HttpResponseHeaders* headers = source->GetResponseHeaders();
|
| if (!headers) {
|
| DVLOG(1) << "Missing response headers.";
|
| return;
|
| @@ -167,8 +168,8 @@
|
| }
|
| }
|
|
|
| - if (!source->was_fetched_via_proxy()) {
|
| - pb_response->set_remote_ip(source->socket_address().ToString());
|
| + if (!source->WasFetchedViaProxy()) {
|
| + pb_response->set_remote_ip(source->GetSocketAddress().ToString());
|
| }
|
| }
|
|
|
|
|