| Index: content/common/content_security_policy/content_security_policy_unittest.cc | 
| diff --git a/content/common/content_security_policy/content_security_policy_unittest.cc b/content/common/content_security_policy/content_security_policy_unittest.cc | 
| index 6a6c02c995f11e0e3aa2de1c2fd1ad20e2954a0b..773d475453ecd9093a72fbbee17f314c7d43da69 100644 | 
| --- a/content/common/content_security_policy/content_security_policy_unittest.cc | 
| +++ b/content/common/content_security_policy/content_security_policy_unittest.cc | 
| @@ -20,15 +20,19 @@ class CSPContextTest : public CSPContext { | 
| std::string console_message_; | 
| }; | 
|  | 
| +ContentSecurityPolicyHeader EmptyCspHeader() { | 
| +  return ContentSecurityPolicyHeader(std::string(), | 
| +                                     blink::WebContentSecurityPolicyTypeEnforce, | 
| +                                     blink::WebContentSecurityPolicySourceHTTP); | 
| +} | 
| + | 
| }  // namespace | 
|  | 
| TEST(ContentSecurityPolicy, NoDirective) { | 
| CSPContextTest context; | 
| std::vector<std::string> report_end_points;  // empty | 
| -  ContentSecurityPolicy policy(blink::WebContentSecurityPolicyTypeEnforce, | 
| -                               blink::WebContentSecurityPolicySourceHTTP, | 
| -                               std::vector<CSPDirective>(), report_end_points, | 
| -                               "" /* header */); | 
| +  ContentSecurityPolicy policy(EmptyCspHeader(), std::vector<CSPDirective>(), | 
| +                               report_end_points); | 
|  | 
| EXPECT_TRUE(ContentSecurityPolicy::Allow(policy, CSPDirective::FormAction, | 
| GURL("http://www.example.com"), | 
| @@ -45,9 +49,8 @@ TEST(ContentSecurityPolicy, ReportViolation) { | 
| CSPSourceList source_list(false, false, {source}); | 
| CSPDirective directive(CSPDirective::FormAction, source_list); | 
| std::vector<std::string> report_end_points;  // empty | 
| -  ContentSecurityPolicy policy(blink::WebContentSecurityPolicyTypeEnforce, | 
| -                               blink::WebContentSecurityPolicySourceHTTP, | 
| -                               {directive}, report_end_points, "" /* header */); | 
| +  ContentSecurityPolicy policy(EmptyCspHeader(), {directive}, | 
| +                               report_end_points); | 
|  | 
| EXPECT_FALSE(ContentSecurityPolicy::Allow(policy, CSPDirective::FormAction, | 
| GURL("http://www.not-example.com"), | 
| @@ -71,10 +74,9 @@ TEST(ContentSecurityPolicy, DirectiveFallback) { | 
| { | 
| CSPContextTest context; | 
| ContentSecurityPolicy policy( | 
| -        blink::WebContentSecurityPolicyTypeEnforce, | 
| -        blink::WebContentSecurityPolicySourceHTTP, | 
| +        EmptyCspHeader(), | 
| {CSPDirective(CSPDirective::DefaultSrc, source_list_a)}, | 
| -        report_end_points, "" /* header */); | 
| +        report_end_points); | 
| EXPECT_FALSE(ContentSecurityPolicy::Allow(policy, CSPDirective::FrameSrc, | 
| GURL("http://b.com"), &context)); | 
| const char console_message[] = | 
| @@ -89,10 +91,8 @@ TEST(ContentSecurityPolicy, DirectiveFallback) { | 
| { | 
| CSPContextTest context; | 
| ContentSecurityPolicy policy( | 
| -        blink::WebContentSecurityPolicyTypeEnforce, | 
| -        blink::WebContentSecurityPolicySourceHTTP, | 
| -        {CSPDirective(CSPDirective::ChildSrc, source_list_a)}, | 
| -        report_end_points, "" /* header */); | 
| +        EmptyCspHeader(), {CSPDirective(CSPDirective::ChildSrc, source_list_a)}, | 
| +        report_end_points); | 
| EXPECT_FALSE(ContentSecurityPolicy::Allow(policy, CSPDirective::FrameSrc, | 
| GURL("http://b.com"), &context)); | 
| const char console_message[] = | 
| @@ -108,11 +108,10 @@ TEST(ContentSecurityPolicy, DirectiveFallback) { | 
| CSPContextTest context; | 
| CSPSourceList source_list(false, false, {source_a, source_b}); | 
| ContentSecurityPolicy policy( | 
| -        blink::WebContentSecurityPolicyTypeEnforce, | 
| -        blink::WebContentSecurityPolicySourceHTTP, | 
| +        EmptyCspHeader(), | 
| {CSPDirective(CSPDirective::FrameSrc, {source_list_a}), | 
| CSPDirective(CSPDirective::ChildSrc, {source_list_b})}, | 
| -        report_end_points, "" /* header */); | 
| +        report_end_points); | 
| EXPECT_TRUE(ContentSecurityPolicy::Allow(policy, CSPDirective::FrameSrc, | 
| GURL("http://a.com"), &context)); | 
| EXPECT_FALSE(ContentSecurityPolicy::Allow(policy, CSPDirective::FrameSrc, | 
|  |