| OLD | NEW |
| 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/url_request/url_request_http_job.h" | 5 #include "net/url_request/url_request_http_job.h" |
| 6 | 6 |
| 7 #include "base/base_switches.h" | 7 #include "base/base_switches.h" |
| 8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
| 9 #include "base/compiler_specific.h" | 9 #include "base/compiler_specific.h" |
| 10 #include "base/file_util.h" | 10 #include "base/file_util.h" |
| (...skipping 275 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 286 | 286 |
| 287 // Even if encoding types are empty, there is a chance that we need to add | 287 // Even if encoding types are empty, there is a chance that we need to add |
| 288 // some decoding, as some proxies strip encoding completely. In such cases, | 288 // some decoding, as some proxies strip encoding completely. In such cases, |
| 289 // we may need to add (for example) SDCH filtering (when the context suggests | 289 // we may need to add (for example) SDCH filtering (when the context suggests |
| 290 // it is appropriate). | 290 // it is appropriate). |
| 291 Filter::FixupEncodingTypes(*this, encoding_types); | 291 Filter::FixupEncodingTypes(*this, encoding_types); |
| 292 | 292 |
| 293 return !encoding_types->empty(); | 293 return !encoding_types->empty(); |
| 294 } | 294 } |
| 295 | 295 |
| 296 bool URLRequestHttpJob::IsCachedContent() const { |
| 297 return is_cached_content_; |
| 298 } |
| 299 |
| 296 bool URLRequestHttpJob::IsSdchResponse() const { | 300 bool URLRequestHttpJob::IsSdchResponse() const { |
| 297 return sdch_dictionary_advertised_; | 301 return sdch_dictionary_advertised_; |
| 298 } | 302 } |
| 299 | 303 |
| 300 bool URLRequestHttpJob::IsSafeRedirect(const GURL& location) { | 304 bool URLRequestHttpJob::IsSafeRedirect(const GURL& location) { |
| 301 // We only allow redirects to certain "safe" protocols. This does not | 305 // We only allow redirects to certain "safe" protocols. This does not |
| 302 // restrict redirects to externally handled protocols. Our consumer would | 306 // restrict redirects to externally handled protocols. Our consumer would |
| 303 // need to take care of those. | 307 // need to take care of those. |
| 304 | 308 |
| 305 if (!URLRequest::IsHandledURL(location)) | 309 if (!URLRequest::IsHandledURL(location)) |
| (...skipping 648 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 954 include_subdomains, | 958 include_subdomains, |
| 955 ctx->transport_security_state()); | 959 ctx->transport_security_state()); |
| 956 if (!prober->ProbeHost(request_info_.url.host(), request()->context(), | 960 if (!prober->ProbeHost(request_info_.url.host(), request()->context(), |
| 957 delegate)) { | 961 delegate)) { |
| 958 delete delegate; | 962 delete delegate; |
| 959 } | 963 } |
| 960 } | 964 } |
| 961 } | 965 } |
| 962 | 966 |
| 963 } // namespace net | 967 } // namespace net |
| OLD | NEW |