Index: content/common/content_security_policy/content_security_policy.cc |
diff --git a/content/common/content_security_policy/content_security_policy.cc b/content/common/content_security_policy/content_security_policy.cc |
index 745cb1c2fb11f3c940a7c17e6fd4a29fd38c2594..b091744bd5ad703057af8dfc8ec52c5340ba6c85 100644 |
--- a/content/common/content_security_policy/content_security_policy.cc |
+++ b/content/common/content_security_policy/content_security_policy.cc |
@@ -41,8 +41,7 @@ |
const ContentSecurityPolicy& policy, |
const CSPDirective& directive, |
const CSPDirective::Name directive_name, |
- const GURL& url, |
- bool is_redirect) { |
+ const GURL& url) { |
// We should never have a violation against `child-src` or `default-src` |
// directly; the effective directive should always be one of the explicit |
// fetch directives. |
@@ -73,11 +72,10 @@ |
message << "\n"; |
context->LogToConsole(message.str()); |
- |
- context->ReportContentSecurityPolicyViolation(CSPViolationParams( |
- CSPDirective::NameToString(directive.name), |
- CSPDirective::NameToString(directive_name), message.str(), url, |
- policy.report_endpoints, policy.header, policy.disposition, is_redirect)); |
+ context->ReportViolation(CSPDirective::NameToString(directive.name), |
+ CSPDirective::NameToString(directive_name), |
+ message.str(), url, policy.report_endpoints, |
+ policy.header, policy.disposition); |
} |
bool AllowDirective(CSPContext* context, |
@@ -89,7 +87,7 @@ |
if (CSPSourceList::Allow(directive.source_list, url, context, is_redirect)) |
return true; |
- ReportViolation(context, policy, directive, directive_name, url, is_redirect); |
+ ReportViolation(context, policy, directive, directive_name, url); |
return false; |
} |