Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h |
diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h |
index 7e972cc62c636e6730ba9a671235ea76d5825b09..3b2b5c9d3359400dfa5e5c2561f5fea2ec31c434 100644 |
--- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h |
+++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h |
@@ -134,6 +134,7 @@ class CORE_EXPORT ContentSecurityPolicy |
// as those checks happen in the middle of the navigation algorithm, |
// and we generally don't have access to the responsible element. |
bool allowJavaScriptURLs(Element*, |
+ const String& source, |
const String& contextURL, |
const WTF::OrdinalNumber& contextLine, |
ReportingStatus = SendReport) const; |
@@ -310,7 +311,8 @@ class CORE_EXPORT ContentSecurityPolicy |
LocalFrame* = nullptr, |
RedirectStatus = RedirectStatus::FollowedRedirect, |
int contextLine = 0, |
- Element* = nullptr); |
+ Element* = nullptr, |
+ const String& source = emptyString); |
// Called when mixed content is detected on a page; will trigger a violation |
// report if the 'block-all-mixed-content' directive is specified for a |