Index: third_party/WebKit/Source/core/frame/csp/CSPDirectiveListTest.cpp |
diff --git a/third_party/WebKit/Source/core/frame/csp/CSPDirectiveListTest.cpp b/third_party/WebKit/Source/core/frame/csp/CSPDirectiveListTest.cpp |
index 86f819efed137e93a3c26eb22bd2d840b3417a89..9aa80319cf87e81de3d94cd2e055a6731ca62a03 100644 |
--- a/third_party/WebKit/Source/core/frame/csp/CSPDirectiveListTest.cpp |
+++ b/third_party/WebKit/Source/core/frame/csp/CSPDirectiveListTest.cpp |
@@ -165,7 +165,7 @@ TEST_F(CSPDirectiveListTest, AllowScriptFromSourceNoNonce) { |
createList(test.list, ContentSecurityPolicyHeaderTypeReport); |
EXPECT_EQ(test.expected, |
directiveList->allowScriptFromSource( |
- scriptSrc, String(), ParserInserted, |
+ scriptSrc, String(), IntegrityMetadataSet(), ParserInserted, |
ResourceRequest::RedirectStatus::NoRedirect, |
SecurityViolationReportingPolicy::SuppressReporting)); |
@@ -174,7 +174,7 @@ TEST_F(CSPDirectiveListTest, AllowScriptFromSourceNoNonce) { |
createList(test.list, ContentSecurityPolicyHeaderTypeEnforce); |
EXPECT_EQ(test.expected, |
directiveList->allowScriptFromSource( |
- scriptSrc, String(), ParserInserted, |
+ scriptSrc, String(), IntegrityMetadataSet(), ParserInserted, |
ResourceRequest::RedirectStatus::NoRedirect, |
SecurityViolationReportingPolicy::SuppressReporting)); |
} |
@@ -222,8 +222,8 @@ TEST_F(CSPDirectiveListTest, AllowFromSourceWithNonce) { |
ContentSecurityPolicyHeaderTypeReport); |
EXPECT_EQ(test.expected, |
directiveList->allowScriptFromSource( |
- resource, String(test.nonce), ParserInserted, |
- ResourceRequest::RedirectStatus::NoRedirect, |
+ resource, String(test.nonce), IntegrityMetadataSet(), |
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect, |
SecurityViolationReportingPolicy::SuppressReporting)); |
// Enforce 'script-src' |
@@ -231,8 +231,8 @@ TEST_F(CSPDirectiveListTest, AllowFromSourceWithNonce) { |
ContentSecurityPolicyHeaderTypeEnforce); |
EXPECT_EQ(test.expected, |
directiveList->allowScriptFromSource( |
- resource, String(test.nonce), ParserInserted, |
- ResourceRequest::RedirectStatus::NoRedirect, |
+ resource, String(test.nonce), IntegrityMetadataSet(), |
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect, |
SecurityViolationReportingPolicy::SuppressReporting)); |
// Report-only 'style-src' |
@@ -258,8 +258,8 @@ TEST_F(CSPDirectiveListTest, AllowFromSourceWithNonce) { |
ContentSecurityPolicyHeaderTypeReport); |
EXPECT_EQ(test.expected, |
directiveList->allowScriptFromSource( |
- resource, String(test.nonce), ParserInserted, |
- ResourceRequest::RedirectStatus::NoRedirect, |
+ resource, String(test.nonce), IntegrityMetadataSet(), |
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect, |
SecurityViolationReportingPolicy::SuppressReporting)); |
EXPECT_EQ(test.expected, |
directiveList->allowStyleFromSource( |
@@ -272,8 +272,8 @@ TEST_F(CSPDirectiveListTest, AllowFromSourceWithNonce) { |
ContentSecurityPolicyHeaderTypeEnforce); |
EXPECT_EQ(test.expected, |
directiveList->allowScriptFromSource( |
- resource, String(test.nonce), ParserInserted, |
- ResourceRequest::RedirectStatus::NoRedirect, |
+ resource, String(test.nonce), IntegrityMetadataSet(), |
+ ParserInserted, ResourceRequest::RedirectStatus::NoRedirect, |
SecurityViolationReportingPolicy::SuppressReporting)); |
EXPECT_EQ(test.expected, |
directiveList->allowStyleFromSource( |