| Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h
|
| diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h
|
| index 7e972cc62c636e6730ba9a671235ea76d5825b09..3b2b5c9d3359400dfa5e5c2561f5fea2ec31c434 100644
|
| --- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h
|
| +++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h
|
| @@ -134,6 +134,7 @@ class CORE_EXPORT ContentSecurityPolicy
|
| // as those checks happen in the middle of the navigation algorithm,
|
| // and we generally don't have access to the responsible element.
|
| bool allowJavaScriptURLs(Element*,
|
| + const String& source,
|
| const String& contextURL,
|
| const WTF::OrdinalNumber& contextLine,
|
| ReportingStatus = SendReport) const;
|
| @@ -310,7 +311,8 @@ class CORE_EXPORT ContentSecurityPolicy
|
| LocalFrame* = nullptr,
|
| RedirectStatus = RedirectStatus::FollowedRedirect,
|
| int contextLine = 0,
|
| - Element* = nullptr);
|
| + Element* = nullptr,
|
| + const String& source = emptyString);
|
|
|
| // Called when mixed content is detected on a page; will trigger a violation
|
| // report if the 'block-all-mixed-content' directive is specified for a
|
|
|