| Index: net/url_request/url_request_http_job.cc
|
| diff --git a/net/url_request/url_request_http_job.cc b/net/url_request/url_request_http_job.cc
|
| index 871f99eb734c9258e7a9898c2c0dcf34379ccf81..2b8988b6c410dbfee89cf53334801bc68a1e27cf 100644
|
| --- a/net/url_request/url_request_http_job.cc
|
| +++ b/net/url_request/url_request_http_job.cc
|
| @@ -320,7 +320,13 @@ void URLRequestHttpJob::StartTransactionInternal() {
|
| rv = request_->context()->http_transaction_factory()->CreateTransaction(
|
| &transaction_);
|
| if (rv == OK) {
|
| + // TODO(joi): The hard-coded check for "chrome-extension" is
|
| + // temporary (as of 2012/3/21), intended only to make sure this
|
| + // change (to throttle only requests originating from
|
| + // extensions) gets into M19. Right after the M19 branch point,
|
| + // I will sort this out in a more architecturally-sound way.
|
| if (!URLRequestThrottlerManager::GetInstance()->enforce_throttling() ||
|
| + request_->first_party_for_cookies().scheme() != "chrome-extension" ||
|
| !throttling_entry_->ShouldRejectRequest(request_info_.load_flags)) {
|
| rv = transaction_->Start(
|
| &request_info_, start_callback_, request_->net_log());
|
|
|