| Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h
|
| diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h
|
| index 07ef517a48f7c1317d2cd9ca1ede2443cfec73ec..1004828c8aa0da2dadab14894a53ad644176cb3d 100644
|
| --- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h
|
| +++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h
|
| @@ -134,6 +134,7 @@ class CORE_EXPORT ContentSecurityPolicy
|
| // as those checks happen in the middle of the navigation algorithm,
|
| // and we generally don't have access to the responsible element.
|
| bool allowJavaScriptURLs(Element*,
|
| + const String& source,
|
| const String& contextURL,
|
| const WTF::OrdinalNumber& contextLine,
|
| SecurityViolationReportingPolicy =
|
| @@ -339,7 +340,8 @@ class CORE_EXPORT ContentSecurityPolicy
|
| LocalFrame* = nullptr,
|
| RedirectStatus = RedirectStatus::FollowedRedirect,
|
| int contextLine = 0,
|
| - Element* = nullptr);
|
| + Element* = nullptr,
|
| + const String& source = emptyString);
|
|
|
| // Called when mixed content is detected on a page; will trigger a violation
|
| // report if the 'block-all-mixed-content' directive is specified for a
|
|
|