Index: net/proxy/proxy_bypass_rules.cc |
diff --git a/net/proxy/proxy_bypass_rules.cc b/net/proxy/proxy_bypass_rules.cc |
index 67b147abeb1b5ade4f5a59c1806ae9d031beaab1..d80e6f177c8ab8198fc4910d6aad4e61f06b9c75 100644 |
--- a/net/proxy/proxy_bypass_rules.cc |
+++ b/net/proxy/proxy_bypass_rules.cc |
@@ -171,14 +171,14 @@ bool ProxyBypassRules::AddRuleForHostname(const std::string& optional_scheme, |
if (hostname_pattern.empty()) |
return false; |
- rules_.push_back(new HostnamePatternRule(optional_scheme, |
- hostname_pattern, |
- optional_port)); |
+ rules_.push_back(make_scoped_refptr(new HostnamePatternRule(optional_scheme, |
+ hostname_pattern, |
+ optional_port))); |
return true; |
} |
void ProxyBypassRules::AddRuleToBypassLocal() { |
- rules_.push_back(new BypassLocalRule); |
+ rules_.push_back(make_scoped_refptr(new BypassLocalRule)); |
} |
bool ProxyBypassRules::AddRuleFromString(const std::string& raw) { |
@@ -241,8 +241,8 @@ bool ProxyBypassRules::AddRuleFromStringInternal( |
if (!ParseCIDRBlock(raw, &ip_prefix, &prefix_length_in_bits)) |
return false; |
- rules_.push_back( |
- new BypassIPBlockRule(raw, scheme, ip_prefix, prefix_length_in_bits)); |
+ rules_.push_back(make_scoped_refptr( |
+ new BypassIPBlockRule(raw, scheme, ip_prefix, prefix_length_in_bits))); |
return true; |
} |