Index: chrome/browser/renderer_host/safe_browsing_resource_throttle.cc |
diff --git a/chrome/browser/renderer_host/safe_browsing_resource_throttle.cc b/chrome/browser/renderer_host/safe_browsing_resource_throttle.cc |
index 935338405a26b25558b01b940f304b1ef97f048c..5eb2f6a577a23d59706cf1e7d63c9266fb739c83 100644 |
--- a/chrome/browser/renderer_host/safe_browsing_resource_throttle.cc |
+++ b/chrome/browser/renderer_host/safe_browsing_resource_throttle.cc |
@@ -14,6 +14,7 @@ |
#include "content/public/browser/resource_request_info.h" |
#include "content/public/browser/web_contents.h" |
#include "net/base/load_flags.h" |
+#include "net/url_request/redirect_info.h" |
#include "net/url_request/url_request.h" |
// Maximum time in milliseconds to wait for the safe browsing service to |
@@ -54,16 +55,17 @@ void SafeBrowsingResourceThrottle::WillStartRequest(bool* defer) { |
*defer = true; |
} |
-void SafeBrowsingResourceThrottle::WillRedirectRequest(const GURL& new_url, |
- bool* defer) { |
+void SafeBrowsingResourceThrottle::WillRedirectRequest( |
+ const net::RedirectInfo& redirect_info, |
+ bool* defer) { |
CHECK(state_ == STATE_NONE); |
CHECK(defer_state_ == DEFERRED_NONE); |
// Save the redirect urls for possible malware detail reporting later. |
- redirect_urls_.push_back(new_url); |
+ redirect_urls_.push_back(redirect_info.new_url); |
// We need to check the new URL before following the redirect. |
- if (CheckUrl(new_url)) |
+ if (CheckUrl(redirect_info.new_url)) |
return; |
// If the URL couldn't be verified synchronously, defer following the |