Index: Source/core/fetch/CrossOriginAccessControl.cpp |
diff --git a/Source/core/fetch/CrossOriginAccessControl.cpp b/Source/core/fetch/CrossOriginAccessControl.cpp |
index 349d498bb3f45d0c7d2fb6b59717d9b776ba368e..c129eecf9ae1a7deec61966277e27d0aeeffc511 100644 |
--- a/Source/core/fetch/CrossOriginAccessControl.cpp |
+++ b/Source/core/fetch/CrossOriginAccessControl.cpp |
@@ -218,7 +218,7 @@ bool CrossOriginAccessControl::isLegalRedirectLocation(const KURL& requestURL, S |
return true; |
} |
-bool CrossOriginAccessControl::handleRedirect(ExecutionContext* context, Resource* resource, SecurityOrigin* securityOrigin, ResourceRequest& request, const ResourceResponse& redirectResponse, ResourceLoaderOptions& options, String& errorMessage) |
+bool CrossOriginAccessControl::handleRedirect(ExecutionContext* context, SecurityOrigin* securityOrigin, ResourceRequest& request, const ResourceResponse& redirectResponse, StoredCredentials withCredentials, ResourceLoaderOptions& options, String& errorMessage) |
{ |
// http://www.w3.org/TR/cors/#redirect-steps terminology: |
const KURL& originalURL = redirectResponse.url(); |
@@ -235,7 +235,6 @@ bool CrossOriginAccessControl::handleRedirect(ExecutionContext* context, Resourc |
bool allowRedirect = isLegalRedirectLocation(requestURL, errorDescription); |
if (allowRedirect) { |
// Step 5: perform resource sharing access check. |
- StoredCredentials withCredentials = resource->lastResourceRequest().allowStoredCredentials() ? AllowStoredCredentials : DoNotAllowStoredCredentials; |
allowRedirect = passesAccessControlCheck(context, redirectResponse, withCredentials, securityOrigin, errorDescription); |
if (allowRedirect) { |
RefPtr<SecurityOrigin> originalOrigin = SecurityOrigin::create(originalURL); |