| Index: net/proxy/proxy_service.cc
|
| diff --git a/net/proxy/proxy_service.cc b/net/proxy/proxy_service.cc
|
| index b2fcc0e401c953cae4c38089582d667b3f46650f..8411d30b2a0c06baf231555b6821e2e4f36f318c 100644
|
| --- a/net/proxy/proxy_service.cc
|
| +++ b/net/proxy/proxy_service.cc
|
| @@ -129,7 +129,7 @@ class DefaultPollPolicy : public ProxyService::PacPollPolicy {
|
| // Re-try policy for failures.
|
| const int kDelay1Seconds = 8;
|
| const int kDelay2Seconds = 32;
|
| - const int kDelay3Seconds = 2 * 60; // 2 minutes
|
| + const int kDelay3Seconds = 2 * 60; // 2 minutes
|
| const int kDelay4Seconds = 4 * 60 * 60; // 4 Hours
|
|
|
| // Initial poll.
|
| @@ -165,8 +165,8 @@ class ProxyConfigServiceDirect : public ProxyConfigService {
|
| // ProxyConfigService implementation:
|
| virtual void AddObserver(Observer* observer) OVERRIDE {}
|
| virtual void RemoveObserver(Observer* observer) OVERRIDE {}
|
| - virtual ConfigAvailability GetLatestProxyConfig(ProxyConfig* config)
|
| - OVERRIDE {
|
| + virtual ConfigAvailability GetLatestProxyConfig(
|
| + ProxyConfig* config) OVERRIDE {
|
| *config = ProxyConfig::CreateDirect();
|
| config->set_source(PROXY_CONFIG_SOURCE_UNKNOWN);
|
| return CONFIG_VALID;
|
| @@ -187,18 +187,14 @@ class ProxyResolverNull : public ProxyResolver {
|
| return ERR_NOT_IMPLEMENTED;
|
| }
|
|
|
| - virtual void CancelRequest(RequestHandle request) OVERRIDE {
|
| - NOTREACHED();
|
| - }
|
| + virtual void CancelRequest(RequestHandle request) OVERRIDE { NOTREACHED(); }
|
|
|
| virtual LoadState GetLoadState(RequestHandle request) const OVERRIDE {
|
| NOTREACHED();
|
| return LOAD_STATE_IDLE;
|
| }
|
|
|
| - virtual void CancelSetPacScript() OVERRIDE {
|
| - NOTREACHED();
|
| - }
|
| + virtual void CancelSetPacScript() OVERRIDE { NOTREACHED(); }
|
|
|
| virtual int SetPacScript(
|
| const scoped_refptr<ProxyResolverScriptData>& /*script_data*/,
|
| @@ -212,8 +208,7 @@ class ProxyResolverNull : public ProxyResolver {
|
| class ProxyResolverFromPacString : public ProxyResolver {
|
| public:
|
| explicit ProxyResolverFromPacString(const std::string& pac_string)
|
| - : ProxyResolver(false /*expects_pac_bytes*/),
|
| - pac_string_(pac_string) {}
|
| + : ProxyResolver(false /*expects_pac_bytes*/), pac_string_(pac_string) {}
|
|
|
| virtual int GetProxyForURL(const GURL& url,
|
| ProxyInfo* results,
|
| @@ -224,18 +219,14 @@ class ProxyResolverFromPacString : public ProxyResolver {
|
| return OK;
|
| }
|
|
|
| - virtual void CancelRequest(RequestHandle request) OVERRIDE {
|
| - NOTREACHED();
|
| - }
|
| + virtual void CancelRequest(RequestHandle request) OVERRIDE { NOTREACHED(); }
|
|
|
| virtual LoadState GetLoadState(RequestHandle request) const OVERRIDE {
|
| NOTREACHED();
|
| return LOAD_STATE_IDLE;
|
| }
|
|
|
| - virtual void CancelSetPacScript() OVERRIDE {
|
| - NOTREACHED();
|
| - }
|
| + virtual void CancelSetPacScript() OVERRIDE { NOTREACHED(); }
|
|
|
| virtual int SetPacScript(
|
| const scoped_refptr<ProxyResolverScriptData>& pac_script,
|
| @@ -294,7 +285,8 @@ base::Value* NetLogBadProxyListCallback(const ProxyRetryInfoMap* retry_info,
|
| base::ListValue* list = new base::ListValue();
|
|
|
| for (ProxyRetryInfoMap::const_iterator iter = retry_info->begin();
|
| - iter != retry_info->end(); ++iter) {
|
| + iter != retry_info->end();
|
| + ++iter) {
|
| list->Append(new base::StringValue(iter->first));
|
| }
|
| dict->Set("bad_proxy_list", list);
|
| @@ -344,8 +336,7 @@ class ProxyService::InitProxyResolver {
|
| InitProxyResolver()
|
| : proxy_resolver_(NULL),
|
| next_state_(STATE_NONE),
|
| - quick_check_enabled_(true) {
|
| - }
|
| + quick_check_enabled_(true) {}
|
|
|
| ~InitProxyResolver() {
|
| // Note that the destruction of ProxyScriptDecider will automatically cancel
|
| @@ -468,7 +459,9 @@ class ProxyService::InitProxyResolver {
|
| next_state_ = STATE_DECIDE_PROXY_SCRIPT_COMPLETE;
|
|
|
| return decider_->Start(
|
| - config_, wait_delay_, proxy_resolver_->expects_pac_bytes(),
|
| + config_,
|
| + wait_delay_,
|
| + proxy_resolver_->expects_pac_bytes(),
|
| base::Bind(&InitProxyResolver::OnIOCompletion, base::Unretained(this)));
|
| }
|
|
|
| @@ -492,9 +485,7 @@ class ProxyService::InitProxyResolver {
|
| base::Bind(&InitProxyResolver::OnIOCompletion, base::Unretained(this)));
|
| }
|
|
|
| - int DoSetPacScriptComplete(int result) {
|
| - return result;
|
| - }
|
| + int DoSetPacScriptComplete(int result) { return result; }
|
|
|
| void OnIOCompletion(int result) {
|
| DCHECK_NE(STATE_NONE, next_state_);
|
| @@ -529,8 +520,8 @@ class ProxyService::InitProxyResolver {
|
| // the ChangeCallback.
|
| class ProxyService::ProxyScriptDeciderPoller {
|
| public:
|
| - typedef base::Callback<void(int, ProxyResolverScriptData*,
|
| - const ProxyConfig&)> ChangeCallback;
|
| + typedef base::Callback<
|
| + void(int, ProxyResolverScriptData*, const ProxyConfig&)> ChangeCallback;
|
|
|
| // Builds a poller helper, and starts polling for updates. Whenever a change
|
| // is observed, |callback| will be invoked with the details.
|
| @@ -635,7 +626,9 @@ class ProxyService::ProxyScriptDeciderPoller {
|
| proxy_script_fetcher_, dhcp_proxy_script_fetcher_, NULL));
|
| decider_->set_quick_check_enabled(quick_check_enabled_);
|
| int result = decider_->Start(
|
| - config_, TimeDelta(), proxy_resolver_expects_pac_bytes_,
|
| + config_,
|
| + TimeDelta(),
|
| + proxy_resolver_expects_pac_bytes_,
|
| base::Bind(&ProxyScriptDeciderPoller::OnProxyScriptDeciderCompleted,
|
| base::Unretained(this)));
|
|
|
| @@ -734,11 +727,11 @@ const ProxyService::PacPollPolicy*
|
| class ProxyService::PacRequest
|
| : public base::RefCounted<ProxyService::PacRequest> {
|
| public:
|
| - PacRequest(ProxyService* service,
|
| - const GURL& url,
|
| - ProxyInfo* results,
|
| - const net::CompletionCallback& user_callback,
|
| - const BoundNetLog& net_log)
|
| + PacRequest(ProxyService* service,
|
| + const GURL& url,
|
| + ProxyInfo* results,
|
| + const net::CompletionCallback& user_callback,
|
| + const BoundNetLog& net_log)
|
| : service_(service),
|
| user_callback_(user_callback),
|
| results_(results),
|
| @@ -762,9 +755,11 @@ class ProxyService::PacRequest
|
| proxy_resolve_start_time_ = TimeTicks::Now();
|
|
|
| return resolver()->GetProxyForURL(
|
| - url_, results_,
|
| + url_,
|
| + results_,
|
| base::Bind(&PacRequest::QueryComplete, base::Unretained(this)),
|
| - &resolve_job_, net_log_);
|
| + &resolve_job_,
|
| + net_log_);
|
| }
|
|
|
| bool is_started() const {
|
| @@ -803,9 +798,7 @@ class ProxyService::PacRequest
|
| }
|
|
|
| // Returns true if Cancel() has been called.
|
| - bool was_cancelled() const {
|
| - return user_callback_.is_null();
|
| - }
|
| + bool was_cancelled() const { return user_callback_.is_null(); }
|
|
|
| // Helper to call after ProxyResolver completion (both synchronous and
|
| // asynchronous). Fixes up the result that is to be returned to user.
|
| @@ -882,10 +875,10 @@ ProxyService::ProxyService(ProxyConfigService* config_service,
|
| NetLog* net_log)
|
| : resolver_(resolver),
|
| next_config_id_(1),
|
| - current_state_(STATE_NONE) ,
|
| + current_state_(STATE_NONE),
|
| net_log_(net_log),
|
| - stall_proxy_auto_config_delay_(TimeDelta::FromMilliseconds(
|
| - kDelayAfterNetworkChangesMs)),
|
| + stall_proxy_auto_config_delay_(
|
| + TimeDelta::FromMilliseconds(kDelayAfterNetworkChangesMs)),
|
| quick_check_enabled_(true) {
|
| NetworkChangeNotifier::AddIPAddressObserver(this);
|
| NetworkChangeNotifier::AddDNSObserver(this);
|
| @@ -918,17 +911,16 @@ ProxyService* ProxyService::CreateUsingSystemProxyResolver(
|
| ProxyService* ProxyService::CreateWithoutProxyResolver(
|
| ProxyConfigService* proxy_config_service,
|
| NetLog* net_log) {
|
| - return new ProxyService(proxy_config_service,
|
| - new ProxyResolverNull(),
|
| - net_log);
|
| + return new ProxyService(
|
| + proxy_config_service, new ProxyResolverNull(), net_log);
|
| }
|
|
|
| // static
|
| ProxyService* ProxyService::CreateFixed(const ProxyConfig& pc) {
|
| // TODO(eroman): This isn't quite right, won't work if |pc| specifies
|
| // a PAC script.
|
| - return CreateUsingSystemProxyResolver(new ProxyConfigServiceFixed(pc),
|
| - 0, NULL);
|
| + return CreateUsingSystemProxyResolver(
|
| + new ProxyConfigServiceFixed(pc), 0, NULL);
|
| }
|
|
|
| // static
|
| @@ -945,14 +937,13 @@ ProxyService* ProxyService::CreateDirect() {
|
|
|
| ProxyService* ProxyService::CreateDirectWithNetLog(NetLog* net_log) {
|
| // Use direct connections.
|
| - return new ProxyService(new ProxyConfigServiceDirect, new ProxyResolverNull,
|
| - net_log);
|
| + return new ProxyService(
|
| + new ProxyConfigServiceDirect, new ProxyResolverNull, net_log);
|
| }
|
|
|
| // static
|
| ProxyService* ProxyService::CreateFixedFromPacResult(
|
| const std::string& pac_string) {
|
| -
|
| // We need the settings to contain an "automatic" setting, otherwise the
|
| // ProxyResolver dependency we give it will never be used.
|
| scoped_ptr<ProxyConfigService> proxy_config_service(
|
| @@ -961,9 +952,8 @@ ProxyService* ProxyService::CreateFixedFromPacResult(
|
| scoped_ptr<ProxyResolver> proxy_resolver(
|
| new ProxyResolverFromPacString(pac_string));
|
|
|
| - return new ProxyService(proxy_config_service.release(),
|
| - proxy_resolver.release(),
|
| - NULL);
|
| + return new ProxyService(
|
| + proxy_config_service.release(), proxy_resolver.release(), NULL);
|
| }
|
|
|
| int ProxyService::ResolveProxy(const GURL& raw_url,
|
| @@ -980,7 +970,7 @@ int ProxyService::ResolveProxy(const GURL& raw_url,
|
| // This way they can schedule their polls in response to network activity.
|
| config_service_->OnLazyPoll();
|
| if (script_poller_.get())
|
| - script_poller_->OnLazyPoll();
|
| + script_poller_->OnLazyPoll();
|
|
|
| if (current_state_ == STATE_NONE)
|
| ApplyProxyConfigIfAvailable();
|
| @@ -1206,15 +1196,12 @@ int ProxyService::ReconsiderProxyAfterError(const GURL& url,
|
| return did_fallback ? OK : ERR_FAILED;
|
| }
|
|
|
| -bool ProxyService::MarkProxiesAsBadUntil(
|
| - const ProxyInfo& result,
|
| - base::TimeDelta retry_delay,
|
| - const ProxyServer& another_bad_proxy,
|
| - const BoundNetLog& net_log) {
|
| - result.proxy_list_.UpdateRetryInfoOnFallback(&proxy_retry_info_, retry_delay,
|
| - false,
|
| - another_bad_proxy,
|
| - net_log);
|
| +bool ProxyService::MarkProxiesAsBadUntil(const ProxyInfo& result,
|
| + base::TimeDelta retry_delay,
|
| + const ProxyServer& another_bad_proxy,
|
| + const BoundNetLog& net_log) {
|
| + result.proxy_list_.UpdateRetryInfoOnFallback(
|
| + &proxy_retry_info_, retry_delay, false, another_bad_proxy, net_log);
|
| if (another_bad_proxy.is_valid())
|
| return result.proxy_list_.size() > 2;
|
| else
|
| @@ -1229,7 +1216,8 @@ void ProxyService::ReportSuccess(const ProxyInfo& result) {
|
| return;
|
|
|
| for (ProxyRetryInfoMap::const_iterator iter = new_retry_info.begin();
|
| - iter != new_retry_info.end(); ++iter) {
|
| + iter != new_retry_info.end();
|
| + ++iter) {
|
| ProxyRetryInfoMap::iterator existing = proxy_retry_info_.find(iter->first);
|
| if (existing == proxy_retry_info_.end())
|
| proxy_retry_info_[iter->first] = iter->second;
|
| @@ -1258,15 +1246,15 @@ LoadState ProxyService::GetLoadState(const PacRequest* req) const {
|
| }
|
|
|
| bool ProxyService::ContainsPendingRequest(PacRequest* req) {
|
| - PendingRequests::iterator it = std::find(
|
| - pending_requests_.begin(), pending_requests_.end(), req);
|
| + PendingRequests::iterator it =
|
| + std::find(pending_requests_.begin(), pending_requests_.end(), req);
|
| return pending_requests_.end() != it;
|
| }
|
|
|
| void ProxyService::RemovePendingRequest(PacRequest* req) {
|
| DCHECK(ContainsPendingRequest(req));
|
| - PendingRequests::iterator it = std::find(
|
| - pending_requests_.begin(), pending_requests_.end(), req);
|
| + PendingRequests::iterator it =
|
| + std::find(pending_requests_.begin(), pending_requests_.end(), req);
|
| pending_requests_.erase(it);
|
| }
|
|
|
| @@ -1377,8 +1365,7 @@ ProxyConfigService* ProxyService::CreateSystemProxyConfigService(
|
| << "be used only for examples.";
|
| return new UnsetProxyConfigService;
|
| #elif defined(OS_LINUX)
|
| - ProxyConfigServiceLinux* linux_config_service =
|
| - new ProxyConfigServiceLinux();
|
| + ProxyConfigServiceLinux* linux_config_service = new ProxyConfigServiceLinux();
|
|
|
| // Assume we got called on the thread that runs the default glib
|
| // main loop, so the current thread is where we should be running
|
| @@ -1418,7 +1405,7 @@ const ProxyService::PacPollPolicy* ProxyService::set_pac_script_poll_policy(
|
|
|
| // static
|
| scoped_ptr<ProxyService::PacPollPolicy>
|
| - ProxyService::CreateDefaultPacPollPolicy() {
|
| +ProxyService::CreateDefaultPacPollPolicy() {
|
| return scoped_ptr<PacPollPolicy>(new DefaultPollPolicy());
|
| }
|
|
|
| @@ -1433,10 +1420,12 @@ void ProxyService::RecordDataReductionProxyBypassInfo(
|
|
|
| if (is_primary) {
|
| UMA_HISTOGRAM_ENUMERATION("DataReductionProxy.BypassInfoPrimary",
|
| - bypass_type, BYPASS_EVENT_TYPE_MAX);
|
| + bypass_type,
|
| + BYPASS_EVENT_TYPE_MAX);
|
| } else {
|
| UMA_HISTOGRAM_ENUMERATION("DataReductionProxy.BypassInfoFallback",
|
| - bypass_type, BYPASS_EVENT_TYPE_MAX);
|
| + bypass_type,
|
| + BYPASS_EVENT_TYPE_MAX);
|
| }
|
| }
|
| #endif // defined(SPDY_PROXY_AUTH_ORIGIN)
|
| @@ -1463,10 +1452,10 @@ void ProxyService::OnProxyConfigChanged(
|
|
|
| // Emit the proxy settings change to the NetLog stream.
|
| if (net_log_) {
|
| - net_log_->AddGlobalEntry(
|
| - net::NetLog::TYPE_PROXY_CONFIG_CHANGED,
|
| - base::Bind(&NetLogProxyConfigChangedCallback,
|
| - &fetched_config_, &effective_config));
|
| + net_log_->AddGlobalEntry(net::NetLog::TYPE_PROXY_CONFIG_CHANGED,
|
| + base::Bind(&NetLogProxyConfigChangedCallback,
|
| + &fetched_config_,
|
| + &effective_config));
|
| }
|
|
|
| // Set the new configuration as the most recently fetched one.
|
| @@ -1494,8 +1483,7 @@ void ProxyService::InitializeUsingLastFetchedConfig() {
|
| current_state_ = STATE_WAITING_FOR_INIT_PROXY_RESOLVER;
|
|
|
| // If we changed networks recently, we should delay running proxy auto-config.
|
| - TimeDelta wait_delay =
|
| - stall_proxy_autoconfig_until_ - TimeTicks::Now();
|
| + TimeDelta wait_delay = stall_proxy_autoconfig_until_ - TimeTicks::Now();
|
|
|
| init_proxy_resolver_.reset(new InitProxyResolver());
|
| init_proxy_resolver_->set_quick_check_enabled(quick_check_enabled_);
|
| @@ -1569,8 +1557,8 @@ int SyncProxyServiceHelper::ResolveProxy(const GURL& url,
|
|
|
| io_message_loop_->PostTask(
|
| FROM_HERE,
|
| - base::Bind(&SyncProxyServiceHelper::StartAsyncResolve, this, url,
|
| - net_log));
|
| + base::Bind(
|
| + &SyncProxyServiceHelper::StartAsyncResolve, this, url, net_log));
|
|
|
| event_.Wait();
|
|
|
| @@ -1581,13 +1569,15 @@ int SyncProxyServiceHelper::ResolveProxy(const GURL& url,
|
| }
|
|
|
| int SyncProxyServiceHelper::ReconsiderProxyAfterError(
|
| - const GURL& url, ProxyInfo* proxy_info, const BoundNetLog& net_log) {
|
| + const GURL& url,
|
| + ProxyInfo* proxy_info,
|
| + const BoundNetLog& net_log) {
|
| DCHECK(io_message_loop_ != base::MessageLoop::current());
|
|
|
| io_message_loop_->PostTask(
|
| FROM_HERE,
|
| - base::Bind(&SyncProxyServiceHelper::StartAsyncReconsider, this, url,
|
| - net_log));
|
| + base::Bind(
|
| + &SyncProxyServiceHelper::StartAsyncReconsider, this, url, net_log));
|
|
|
| event_.Wait();
|
|
|
| @@ -1597,12 +1587,13 @@ int SyncProxyServiceHelper::ReconsiderProxyAfterError(
|
| return result_;
|
| }
|
|
|
| -SyncProxyServiceHelper::~SyncProxyServiceHelper() {}
|
| +SyncProxyServiceHelper::~SyncProxyServiceHelper() {
|
| +}
|
|
|
| void SyncProxyServiceHelper::StartAsyncResolve(const GURL& url,
|
| const BoundNetLog& net_log) {
|
| - result_ = proxy_service_->ResolveProxy(
|
| - url, &proxy_info_, callback_, NULL, net_log);
|
| + result_ =
|
| + proxy_service_->ResolveProxy(url, &proxy_info_, callback_, NULL, net_log);
|
| if (result_ != net::ERR_IO_PENDING) {
|
| OnCompletion(result_);
|
| }
|
|
|