Index: net/http/http_auth_controller.cc |
diff --git a/net/http/http_auth_controller.cc b/net/http/http_auth_controller.cc |
index 6eaf02cad0b43bc7b2ff86f82366a60c78a95dd1..09a8dd8aa238ac339d79698d665f6b948a2319e6 100644 |
--- a/net/http/http_auth_controller.cc |
+++ b/net/http/http_auth_controller.cc |
@@ -138,14 +138,14 @@ HttpAuthController::HttpAuthController( |
} |
HttpAuthController::~HttpAuthController() { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
} |
int HttpAuthController::MaybeGenerateAuthToken( |
const HttpRequestInfo* request, |
const CompletionCallback& callback, |
const NetLogWithSource& net_log) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
DCHECK(!auth_info_); |
bool needs_auth = HaveAuth() || SelectPreemptiveAuth(net_log); |
if (!needs_auth) |
@@ -170,7 +170,7 @@ int HttpAuthController::MaybeGenerateAuthToken( |
} |
bool HttpAuthController::SelectPreemptiveAuth(const NetLogWithSource& net_log) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
DCHECK(!HaveAuth()); |
DCHECK(identity_.invalid); |
@@ -208,7 +208,7 @@ bool HttpAuthController::SelectPreemptiveAuth(const NetLogWithSource& net_log) { |
void HttpAuthController::AddAuthorizationHeader( |
HttpRequestHeaders* authorization_headers) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
DCHECK(HaveAuth()); |
// auth_token_ can be empty if we encountered a permanent error with |
// the auth scheme and want to retry. |
@@ -225,7 +225,7 @@ int HttpAuthController::HandleAuthChallenge( |
bool do_not_send_server_auth, |
bool establishing_tunnel, |
const NetLogWithSource& net_log) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
DCHECK(headers.get()); |
DCHECK(auth_origin_.is_valid()); |
DCHECK(!auth_info_); |
@@ -339,7 +339,7 @@ int HttpAuthController::HandleAuthChallenge( |
} |
void HttpAuthController::ResetAuth(const AuthCredentials& credentials) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
DCHECK(identity_.invalid || credentials.Empty()); |
if (identity_.invalid) { |
@@ -390,7 +390,7 @@ bool HttpAuthController::HaveAuth() const { |
void HttpAuthController::InvalidateCurrentHandler( |
InvalidateHandlerAction action) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
DCHECK(handler_.get()); |
if (action == INVALIDATE_HANDLER_AND_CACHED_CREDENTIALS) |
@@ -402,7 +402,7 @@ void HttpAuthController::InvalidateCurrentHandler( |
} |
void HttpAuthController::InvalidateRejectedAuthFromCache() { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
DCHECK(HaveAuth()); |
// Clear the cache entry for the identity we just failed on. |
@@ -413,7 +413,7 @@ void HttpAuthController::InvalidateRejectedAuthFromCache() { |
} |
bool HttpAuthController::SelectNextAuthIdentityToTry() { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
DCHECK(handler_.get()); |
DCHECK(identity_.invalid); |
@@ -462,7 +462,7 @@ bool HttpAuthController::SelectNextAuthIdentityToTry() { |
} |
void HttpAuthController::PopulateAuthChallenge() { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
// Populates response_.auth_challenge with the authentication challenge info. |
// This info is consumed by URLRequestHttpJob::GetAuthChallengeInfo(). |
@@ -475,7 +475,7 @@ void HttpAuthController::PopulateAuthChallenge() { |
} |
int HttpAuthController::HandleGenerateTokenResult(int result) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
switch (result) { |
// Occurs if the credential handle is found to be invalid at the point it is |
// exercised (i.e. GenerateAuthToken stage). We are going to consider this |
@@ -524,7 +524,7 @@ int HttpAuthController::HandleGenerateTokenResult(int result) { |
} |
void HttpAuthController::OnGenerateAuthTokenDone(int result) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
result = HandleGenerateTokenResult(result); |
if (!callback_.is_null()) { |
CompletionCallback c = callback_; |
@@ -534,27 +534,27 @@ void HttpAuthController::OnGenerateAuthTokenDone(int result) { |
} |
scoped_refptr<AuthChallengeInfo> HttpAuthController::auth_info() { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
return auth_info_; |
} |
bool HttpAuthController::IsAuthSchemeDisabled(HttpAuth::Scheme scheme) const { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
return disabled_schemes_.find(scheme) != disabled_schemes_.end(); |
} |
void HttpAuthController::DisableAuthScheme(HttpAuth::Scheme scheme) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
disabled_schemes_.insert(scheme); |
} |
void HttpAuthController::DisableEmbeddedIdentity() { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
embedded_identity_used_ = true; |
} |
void HttpAuthController::OnConnectionClosed() { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
InvalidateCurrentHandler(INVALIDATE_HANDLER); |
} |