Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h |
diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h |
index 24141d29371db6511ff6eafbe8e10ea13c26bf9b..6a44f286e7e7512575f55ec6b303c3a9edf6f1be 100644 |
--- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h |
+++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h |
@@ -251,7 +251,7 @@ public: |
// If a frame is passed in, the report will be sent using it as a context. If no frame is |
// passed in, the report will be sent via this object's |m_executionContext| (or dropped |
// on the floor if no such context is available). |
- void reportViolation(const String& directiveText, const String& effectiveDirective, const String& consoleMessage, const KURL& blockedURL, const Vector<String>& reportEndpoints, const String& header, ViolationType, LocalFrame* = nullptr, RedirectStatus = RedirectStatus::FollowedRedirect, int contextLine = 0); |
+ void reportViolation(const String& directiveText, const String& effectiveDirective, const String& consoleMessage, const KURL& blockedURL, const Vector<String>& reportEndpoints, const String& header, ContentSecurityPolicyHeaderType, ViolationType, LocalFrame* = nullptr, RedirectStatus = RedirectStatus::FollowedRedirect, int contextLine = 0); |
// Called when mixed content is detected on a page; will trigger a violation report if |
// the 'block-all-mixed-content' directive is specified for a policy. |