| Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
|
| diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
|
| index b73cc92548883e539447b632fbf58ffd8e534537..da501589fa34525661ee8101606286f0e2db22a8 100644
|
| --- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
|
| +++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
|
| @@ -634,7 +634,8 @@ TEST_F(ContentSecurityPolicyTest, NonceSinglePolicy) {
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| EXPECT_EQ(test.allowed,
|
| policy->allowScriptFromSource(resource, String(test.nonce)));
|
| - // If this is expected to generate a violation, we should have sent a report.
|
| + // If this is expected to generate a violation, we should have sent a
|
| + // report.
|
| EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
|
|
|
| // Single report-mode policy should always be `true`:
|
| @@ -643,8 +644,8 @@ TEST_F(ContentSecurityPolicyTest, NonceSinglePolicy) {
|
| policy->didReceiveHeader(test.policy, ContentSecurityPolicyHeaderTypeReport,
|
| ContentSecurityPolicyHeaderSourceHTTP);
|
| EXPECT_TRUE(policy->allowScriptFromSource(resource, String(test.nonce)));
|
| - // If this is expected to generate a violation, we should have sent a report, even though
|
| - // we don't deny access in `allowScriptFromSource`:
|
| + // If this is expected to generate a violation, we should have sent a
|
| + // report, even though we don't deny access in `allowScriptFromSource`:
|
| EXPECT_EQ(expectedReports, policy->m_violationReportsSent.size());
|
| }
|
| }
|
|
|