filter->Send(sync_result);
} else {
// Tell the renderer that this request was disallowed.
+ ResourceMsg_RequestCompleteData request_complete_data;
+ request_complete_data.error_code = net::ERR_ABORTED;
+ request_complete_data.was_ignored_by_handler = false;
+ request_complete_data.exists_in_cache = false;
+ // No security info needed, connection not established.
+ request_complete_data.completion_time = base::TimeTicks();
+ request_complete_data.encoded_data_length = 0;
filter->Send(new ResourceMsg_RequestComplete(
- request_id,
- net::ERR_ABORTED,
- false,
- std::string(), // No security info needed, connection not established.
- base::TimeTicks()));
+ request_id, request_complete_data));
}
}
-loader->request()->status().error());
}
+ if (delegate_)
+ delegate_->RequestComplete(loader->request());
+
// Destroy the ResourceLoader.
RemovePendingRequest(info->GetChildID(), info->GetRequestID());
}
}
}
+ appcache::AppCacheInterceptor::CompleteCrossSiteTransfer(
+ loader->request(),
+ child_id,
+ request_data.appcache_host_id);
+
// We should have a CrossSiteResourceHandler to finish the transfer.
DCHECK(info->cross_site_handler());
}
GetLoader(id)->MarkAsTransferring();
}
+void ResourceDispatcherHostImpl::CancelTransferringNavigation(
+ const GlobalRequestID& id) {
+ // Request should still exist and be in the middle of a transfer.
+ DCHECK(IsTransferredNavigation(id));
+ RemovePendingRequest(id.child_id, id.request_id);
+}
+
void ResourceDispatcherHostImpl::ResumeDeferredNavigation(
const GlobalRequestID& id) {
ResourceLoader* loader = GetLoader(id);
if (net::registry_controlled_domains::SameDomainOrHost(
first_party, request_url,
- net::registry_controlled_domains::EXCLUDE_PRIVATE_REGISTRIES))
+ net::registry_controlled_domains::INCLUDE_PRIVATE_REGISTRIES))
return HTTP_AUTH_RELATION_SAME_DOMAIN;
if (allow_cross_origin_auth_prompt())