OLD | NEW |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/url_request/url_request_http_job.h" | 5 #include "net/url_request/url_request_http_job.h" |
6 | 6 |
7 #include "base/base_switches.h" | 7 #include "base/base_switches.h" |
8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
9 #include "base/compiler_specific.h" | 9 #include "base/compiler_specific.h" |
10 #include "base/file_util.h" | 10 #include "base/file_util.h" |
(...skipping 275 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
286 | 286 |
287 // Even if encoding types are empty, there is a chance that we need to add | 287 // Even if encoding types are empty, there is a chance that we need to add |
288 // some decoding, as some proxies strip encoding completely. In such cases, | 288 // some decoding, as some proxies strip encoding completely. In such cases, |
289 // we may need to add (for example) SDCH filtering (when the context suggests | 289 // we may need to add (for example) SDCH filtering (when the context suggests |
290 // it is appropriate). | 290 // it is appropriate). |
291 Filter::FixupEncodingTypes(*this, encoding_types); | 291 Filter::FixupEncodingTypes(*this, encoding_types); |
292 | 292 |
293 return !encoding_types->empty(); | 293 return !encoding_types->empty(); |
294 } | 294 } |
295 | 295 |
| 296 bool URLRequestHttpJob::IsCachedContent() const { |
| 297 return is_cached_content_; |
| 298 } |
| 299 |
296 bool URLRequestHttpJob::IsSdchResponse() const { | 300 bool URLRequestHttpJob::IsSdchResponse() const { |
297 return sdch_dictionary_advertised_; | 301 return sdch_dictionary_advertised_; |
298 } | 302 } |
299 | 303 |
300 bool URLRequestHttpJob::IsSafeRedirect(const GURL& location) { | 304 bool URLRequestHttpJob::IsSafeRedirect(const GURL& location) { |
301 // We only allow redirects to certain "safe" protocols. This does not | 305 // We only allow redirects to certain "safe" protocols. This does not |
302 // restrict redirects to externally handled protocols. Our consumer would | 306 // restrict redirects to externally handled protocols. Our consumer would |
303 // need to take care of those. | 307 // need to take care of those. |
304 | 308 |
305 if (!URLRequest::IsHandledURL(location)) | 309 if (!URLRequest::IsHandledURL(location)) |
(...skipping 648 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
954 include_subdomains, | 958 include_subdomains, |
955 ctx->transport_security_state()); | 959 ctx->transport_security_state()); |
956 if (!prober->ProbeHost(request_info_.url.host(), request()->context(), | 960 if (!prober->ProbeHost(request_info_.url.host(), request()->context(), |
957 delegate)) { | 961 delegate)) { |
958 delete delegate; | 962 delete delegate; |
959 } | 963 } |
960 } | 964 } |
961 } | 965 } |
962 | 966 |
963 } // namespace net | 967 } // namespace net |
OLD | NEW |