Skip to content

Commit 223641f

Browse files
author
Stephane Landelle
committed
Minor clean up
1 parent 35c04ac commit 223641f

File tree

1 file changed

+13
-17
lines changed

1 file changed

+13
-17
lines changed

src/main/java/com/ning/http/client/providers/netty/NettyAsyncHttpProvider.java

Lines changed: 13 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,6 @@
152152
import static org.jboss.netty.channel.Channels.pipeline;
153153

154154
public class NettyAsyncHttpProvider extends SimpleChannelUpstreamHandler implements AsyncHttpProvider {
155-
private final static String WEBSOCKET_KEY = "Sec-WebSocket-Key";
156155
private final static String HTTP_HANDLER = "httpHandler";
157156
protected final static String SSL_HANDLER = "sslHandler";
158157
private final static String HTTPS = "https";
@@ -397,7 +396,7 @@ private Channel lookupInCache(URI uri, ConnectionPoolKeyStrategy connectionPoolK
397396

398397
try {
399398
// Always make sure the channel who got cached support the proper protocol. It could
400-
// only occurs when a HttpMethod.CONNECT is used agains a proxy that require upgrading from http to
399+
// only occurs when a HttpMethod.CONNECT is used against a proxy that require upgrading from http to
401400
// https.
402401
return verifyChannelPipeline(channel, uri.getScheme());
403402
} catch (Exception ex) {
@@ -637,7 +636,7 @@ else if (uri.getRawQuery() != null)
637636
nettyRequest.addHeader(HttpHeaders.Names.UPGRADE, HttpHeaders.Values.WEBSOCKET);
638637
nettyRequest.addHeader(HttpHeaders.Names.CONNECTION, HttpHeaders.Values.UPGRADE);
639638
nettyRequest.addHeader(HttpHeaders.Names.ORIGIN, "http://" + uri.getHost() + ":" + uri.getPort());
640-
nettyRequest.addHeader(WEBSOCKET_KEY, WebSocketUtil.getKey());
639+
nettyRequest.addHeader(HttpHeaders.Names.SEC_WEBSOCKET_KEY, WebSocketUtil.getKey());
641640
nettyRequest.addHeader(HttpHeaders.Names.SEC_WEBSOCKET_VERSION, "13");
642641
}
643642

@@ -817,10 +816,10 @@ else if (uri.getRawQuery() != null)
817816
}
818817

819818
} else if (request.getParts() != null) {
820-
int lenght = computeAndSetContentLength(request, nettyRequest);
819+
int length = computeAndSetContentLength(request, nettyRequest);
821820

822-
if (lenght == -1) {
823-
lenght = MAX_BUFFERED_BYTES;
821+
if (length == -1) {
822+
length = MAX_BUFFERED_BYTES;
824823
}
825824

826825
MultipartRequestEntity mre = AsyncHttpProviderUtils.createMultipartRequestEntity(request.getParts(), request.getHeaders());
@@ -833,18 +832,18 @@ else if (uri.getRawQuery() != null)
833832
*/
834833

835834
if (isSecure(uri)) {
836-
ChannelBuffer b = ChannelBuffers.dynamicBuffer(lenght);
835+
ChannelBuffer b = ChannelBuffers.dynamicBuffer(length);
837836
mre.writeRequest(new ChannelBufferOutputStream(b));
838837
nettyRequest.setContent(b);
839838
}
840839
} else if (request.getEntityWriter() != null) {
841-
int lenght = computeAndSetContentLength(request, nettyRequest);
840+
int length = computeAndSetContentLength(request, nettyRequest);
842841

843-
if (lenght == -1) {
844-
lenght = MAX_BUFFERED_BYTES;
842+
if (length == -1) {
843+
length = MAX_BUFFERED_BYTES;
845844
}
846845

847-
ChannelBuffer b = ChannelBuffers.dynamicBuffer(lenght);
846+
ChannelBuffer b = ChannelBuffers.dynamicBuffer(length);
848847
request.getEntityWriter().writeEntity(new ChannelBufferOutputStream(b));
849848
nettyRequest.setHeader(HttpHeaders.Names.CONTENT_LENGTH, b.writerIndex());
850849
nettyRequest.setContent(b);
@@ -1017,7 +1016,7 @@ private <T> ListenableFuture<T> doConnect(final Request request, final AsyncHand
10171016
bootstrap.setOption("connectTimeoutMillis", config.getConnectionTimeoutInMs());
10181017

10191018
// Do no enable this with win.
1020-
if (System.getProperty("os.name").toLowerCase().indexOf("win") == -1) {
1019+
if (!System.getProperty("os.name").toLowerCase().contains("win")) {
10211020
bootstrap.setOption("reuseAddress", asyncHttpProviderConfig.getProperty(REUSE_ADDRESS));
10221021
}
10231022

@@ -1045,10 +1044,7 @@ private <T> ListenableFuture<T> doConnect(final Request request, final AsyncHand
10451044
return c.future();
10461045
}
10471046

1048-
boolean directInvokation = true;
1049-
if (IN_IO_THREAD.get() && DefaultChannelFuture.isUseDeadLockChecker()) {
1050-
directInvokation = false;
1051-
}
1047+
boolean directInvokation = !(IN_IO_THREAD.get() && DefaultChannelFuture.isUseDeadLockChecker());
10521048

10531049
if (directInvokation && !asyncConnect && request.getFile() == null) {
10541050
int timeOut = config.getConnectionTimeoutInMs() > 0 ? config.getConnectionTimeoutInMs() : Integer.MAX_VALUE;
@@ -2338,7 +2334,7 @@ public void handle(ChannelHandlerContext ctx, MessageEvent e) throws Exception {
23382334
}
23392335

23402336
String accept = response.getHeader(HttpHeaders.Names.SEC_WEBSOCKET_ACCEPT);
2341-
String key = WebSocketUtil.getAcceptKey(future.getNettyRequest().getHeader(WEBSOCKET_KEY));
2337+
String key = WebSocketUtil.getAcceptKey(future.getNettyRequest().getHeader(HttpHeaders.Names.SEC_WEBSOCKET_KEY));
23422338
if (accept == null || !accept.equals(key)) {
23432339
throw new IOException(String.format("Invalid challenge. Actual: %s. Expected: %s", accept, key));
23442340
}

0 commit comments

Comments
 (0)