Index: chrome/browser/extensions/api/web_request/web_request_api.cc |
=================================================================== |
--- chrome/browser/extensions/api/web_request/web_request_api.cc (revision 145167) |
+++ chrome/browser/extensions/api/web_request/web_request_api.cc (working copy) |
@@ -474,7 +474,7 @@ |
const net::CompletionCallback& callback, |
GURL* new_url) { |
// We hide events from the system context as well as sensitive requests. |
- if (!profile || helpers::HideRequest(request)) |
+ if (!profile || helpers::HideRequestForURL(request->url())) |
return net::OK; |
if (IsPageLoad(request)) |
@@ -532,7 +532,7 @@ |
const net::CompletionCallback& callback, |
net::HttpRequestHeaders* headers) { |
// We hide events from the system context as well as sensitive requests. |
- if (!profile || helpers::HideRequest(request)) |
+ if (!profile || helpers::HideRequestForURL(request->url())) |
return net::OK; |
bool initialize_blocked_requests = false; |
@@ -583,7 +583,7 @@ |
net::URLRequest* request, |
const net::HttpRequestHeaders& headers) { |
// We hide events from the system context as well as sensitive requests. |
- if (!profile || helpers::HideRequest(request)) |
+ if (!profile || helpers::HideRequestForURL(request->url())) |
return; |
if (GetAndSetSignaled(request->identifier(), kOnSendHeaders)) |
@@ -616,7 +616,7 @@ |
net::HttpResponseHeaders* original_response_headers, |
scoped_refptr<net::HttpResponseHeaders>* override_response_headers) { |
// We hide events from the system context as well as sensitive requests. |
- if (!profile || helpers::HideRequest(request)) |
+ if (!profile || helpers::HideRequestForURL(request->url())) |
return net::OK; |
bool initialize_blocked_requests = false; |
@@ -680,7 +680,7 @@ |
net::AuthCredentials* credentials) { |
// No profile means that this is for authentication challenges in the |
// system context. Skip in that case. Also skip sensitive requests. |
- if (!profile || helpers::HideRequest(request)) |
+ if (!profile || helpers::HideRequestForURL(request->url())) |
return net::NetworkDelegate::AUTH_REQUIRED_RESPONSE_NO_ACTION; |
int extra_info_spec = 0; |
@@ -725,7 +725,7 @@ |
net::URLRequest* request, |
const GURL& new_location) { |
// We hide events from the system context as well as sensitive requests. |
- if (!profile || helpers::HideRequest(request)) |
+ if (!profile || helpers::HideRequestForURL(request->url())) |
return; |
if (GetAndSetSignaled(request->identifier(), kOnBeforeRedirect)) |
@@ -770,7 +770,7 @@ |
ExtensionInfoMap* extension_info_map, |
net::URLRequest* request) { |
// We hide events from the system context as well as sensitive requests. |
- if (!profile || helpers::HideRequest(request)) |
+ if (!profile || helpers::HideRequestForURL(request->url())) |
return; |
// OnResponseStarted is even triggered, when the request was cancelled. |
@@ -813,7 +813,7 @@ |
ExtensionInfoMap* extension_info_map, |
net::URLRequest* request) { |
// We hide events from the system context as well as sensitive requests. |
- if (!profile || helpers::HideRequest(request)) |
+ if (!profile || helpers::HideRequestForURL(request->url())) |
return; |
request_time_tracker_->LogRequestEndTime(request->identifier(), |
@@ -862,7 +862,7 @@ |
net::URLRequest* request, |
bool started) { |
// We hide events from the system context as well as sensitive requests. |
- if (!profile || helpers::HideRequest(request)) |
+ if (!profile || helpers::HideRequestForURL(request->url())) |
return; |
request_time_tracker_->LogRequestEndTime(request->identifier(), |