| Index: content/browser/loader/resource_dispatcher_host_impl.cc
|
| diff --git a/content/browser/loader/resource_dispatcher_host_impl.cc b/content/browser/loader/resource_dispatcher_host_impl.cc
|
| index b132d953bb919bd126d1f52aa5e0a89e4a83ba11..b72e96a24852a7b0015eaf1b8e14e3a74a2e0689 100644
|
| --- a/content/browser/loader/resource_dispatcher_host_impl.cc
|
| +++ b/content/browser/loader/resource_dispatcher_host_impl.cc
|
| @@ -136,10 +136,10 @@ const double kMaxRequestsPerProcessRatio = 0.45;
|
| // same resource (see bugs 46104 and 31014).
|
| const int kDefaultDetachableCancelDelayMs = 30000;
|
|
|
| -bool IsDetachableResourceType(ResourceType::Type type) {
|
| +bool IsDetachableResourceType(ResourceType type) {
|
| switch (type) {
|
| - case ResourceType::PREFETCH:
|
| - case ResourceType::PING:
|
| + case RESOURCE_TYPE_PREFETCH:
|
| + case RESOURCE_TYPE_PING:
|
| return true;
|
| default:
|
| return false;
|
| @@ -677,7 +677,7 @@ bool ResourceDispatcherHostImpl::HandleExternalProtocol(ResourceLoader* loader,
|
|
|
| ResourceRequestInfoImpl* info = loader->GetRequestInfo();
|
|
|
| - if (!ResourceType::IsFrame(info->GetResourceType()))
|
| + if (!IsResourceTypeFrame(info->GetResourceType()))
|
| return false;
|
|
|
| const net::URLRequestJobFactory* job_factory =
|
| @@ -747,7 +747,7 @@ void ResourceDispatcherHostImpl::DidFinishLoading(ResourceLoader* loader) {
|
| ResourceRequestInfo* info = loader->GetRequestInfo();
|
|
|
| // Record final result of all resource loads.
|
| - if (info->GetResourceType() == ResourceType::MAIN_FRAME) {
|
| + if (info->GetResourceType() == RESOURCE_TYPE_MAIN_FRAME) {
|
| // This enumeration has "3" appended to its name to distinguish it from
|
| // older versions.
|
| UMA_HISTOGRAM_SPARSE_SLOWLY(
|
| @@ -768,7 +768,7 @@ void ResourceDispatcherHostImpl::DidFinishLoading(ResourceLoader* loader) {
|
| "Net.CertificateTransparency.MainFrameValidSCTCount", num_valid_scts);
|
| }
|
| } else {
|
| - if (info->GetResourceType() == ResourceType::IMAGE) {
|
| + if (info->GetResourceType() == RESOURCE_TYPE_IMAGE) {
|
| UMA_HISTOGRAM_SPARSE_SLOWLY(
|
| "Net.ErrorCodesForImages",
|
| -loader->request()->status().error());
|
| @@ -1064,7 +1064,7 @@ void ResourceDispatcherHostImpl::BeginRequest(
|
| }
|
|
|
| bool allow_download = request_data.allow_download &&
|
| - ResourceType::IsFrame(request_data.resource_type);
|
| + IsResourceTypeFrame(request_data.resource_type);
|
|
|
| // Make extra info and read footer (contains request ID).
|
| ResourceRequestInfoImpl* extra_info =
|
| @@ -1167,12 +1167,12 @@ scoped_ptr<ResourceHandler> ResourceDispatcherHostImpl::CreateResourceHandler(
|
| // let us check whether a transfer is required and pause for the unload
|
| // handler either if so or if a cross-process navigation is already under way.
|
| bool is_swappable_navigation =
|
| - request_data.resource_type == ResourceType::MAIN_FRAME;
|
| + request_data.resource_type == RESOURCE_TYPE_MAIN_FRAME;
|
| // If we are using --site-per-process, install it for subframes as well.
|
| if (!is_swappable_navigation &&
|
| CommandLine::ForCurrentProcess()->HasSwitch(switches::kSitePerProcess)) {
|
| is_swappable_navigation =
|
| - request_data.resource_type == ResourceType::SUB_FRAME;
|
| + request_data.resource_type == RESOURCE_TYPE_SUB_FRAME;
|
| }
|
| if (is_swappable_navigation && process_type == PROCESS_TYPE_RENDERER)
|
| handler.reset(new CrossSiteResourceHandler(handler.Pass(), request));
|
| @@ -1298,7 +1298,7 @@ ResourceRequestInfoImpl* ResourceDispatcherHostImpl::CreateRequestInfo(
|
| false, // is_main_frame
|
| false, // parent_is_main_frame
|
| -1, // parent_render_frame_id
|
| - ResourceType::SUB_RESOURCE,
|
| + RESOURCE_TYPE_SUB_RESOURCE,
|
| PAGE_TRANSITION_LINK,
|
| false, // should_replace_current_entry
|
| download, // is_download
|
| @@ -1942,15 +1942,15 @@ int ResourceDispatcherHostImpl::BuildLoadFlagsForRequest(
|
| // keep-alive connection created to load a sub-frame or a sub-resource could
|
| // be reused to load a main frame.
|
| load_flags |= net::LOAD_VERIFY_EV_CERT;
|
| - if (request_data.resource_type == ResourceType::MAIN_FRAME) {
|
| + if (request_data.resource_type == RESOURCE_TYPE_MAIN_FRAME) {
|
| load_flags |= net::LOAD_MAIN_FRAME;
|
| - } else if (request_data.resource_type == ResourceType::SUB_FRAME) {
|
| + } else if (request_data.resource_type == RESOURCE_TYPE_SUB_FRAME) {
|
| load_flags |= net::LOAD_SUB_FRAME;
|
| - } else if (request_data.resource_type == ResourceType::PREFETCH) {
|
| + } else if (request_data.resource_type == RESOURCE_TYPE_PREFETCH) {
|
| load_flags |= (net::LOAD_PREFETCH | net::LOAD_DO_NOT_PROMPT_FOR_LOGIN);
|
| - } else if (request_data.resource_type == ResourceType::FAVICON) {
|
| + } else if (request_data.resource_type == RESOURCE_TYPE_FAVICON) {
|
| load_flags |= net::LOAD_DO_NOT_PROMPT_FOR_LOGIN;
|
| - } else if (request_data.resource_type == ResourceType::IMAGE) {
|
| + } else if (request_data.resource_type == RESOURCE_TYPE_IMAGE) {
|
| // Prevent third-party image content from prompting for login, as this
|
| // is often a scam to extract credentials for another domain from the user.
|
| // Only block image loads, as the attack applies largely to the "src"
|
| @@ -1988,7 +1988,7 @@ int ResourceDispatcherHostImpl::BuildLoadFlagsForRequest(
|
|
|
| // Add a flag to selectively bypass the data reduction proxy if the resource
|
| // type is not an image.
|
| - if (request_data.resource_type != ResourceType::IMAGE)
|
| + if (request_data.resource_type != RESOURCE_TYPE_IMAGE)
|
| load_flags |= net::LOAD_BYPASS_DATA_REDUCTION_PROXY;
|
|
|
| return load_flags;
|
|
|