| Index: net/proxy/proxy_bypass_rules.cc
|
| diff --git a/net/proxy/proxy_bypass_rules.cc b/net/proxy/proxy_bypass_rules.cc
|
| index 67b147abeb1b5ade4f5a59c1806ae9d031beaab1..d80e6f177c8ab8198fc4910d6aad4e61f06b9c75 100644
|
| --- a/net/proxy/proxy_bypass_rules.cc
|
| +++ b/net/proxy/proxy_bypass_rules.cc
|
| @@ -171,14 +171,14 @@ bool ProxyBypassRules::AddRuleForHostname(const std::string& optional_scheme,
|
| if (hostname_pattern.empty())
|
| return false;
|
|
|
| - rules_.push_back(new HostnamePatternRule(optional_scheme,
|
| - hostname_pattern,
|
| - optional_port));
|
| + rules_.push_back(make_scoped_refptr(new HostnamePatternRule(optional_scheme,
|
| + hostname_pattern,
|
| + optional_port)));
|
| return true;
|
| }
|
|
|
| void ProxyBypassRules::AddRuleToBypassLocal() {
|
| - rules_.push_back(new BypassLocalRule);
|
| + rules_.push_back(make_scoped_refptr(new BypassLocalRule));
|
| }
|
|
|
| bool ProxyBypassRules::AddRuleFromString(const std::string& raw) {
|
| @@ -241,8 +241,8 @@ bool ProxyBypassRules::AddRuleFromStringInternal(
|
| if (!ParseCIDRBlock(raw, &ip_prefix, &prefix_length_in_bits))
|
| return false;
|
|
|
| - rules_.push_back(
|
| - new BypassIPBlockRule(raw, scheme, ip_prefix, prefix_length_in_bits));
|
| + rules_.push_back(make_scoped_refptr(
|
| + new BypassIPBlockRule(raw, scheme, ip_prefix, prefix_length_in_bits)));
|
|
|
| return true;
|
| }
|
|
|