Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h |
diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h |
index 01a1cbdb8af34e576922d8e06e9fc31c11821e5f..5d0c7bfbefe330c0e72ffccf82066662ef06b67c 100644 |
--- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h |
+++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h |
@@ -412,7 +412,6 @@ class CORE_EXPORT ContentSecurityPolicy |
SchemeRegistry::PolicyAreas = SchemeRegistry::kPolicyAreaAll); |
static bool IsNonceableElement(const Element*); |
- static const char* GetNonceReplacementString() { return "[Replaced]"; } |
// This method checks whether the request should be allowed for an |
// experimental EmbeddingCSP feature |
@@ -431,6 +430,8 @@ class CORE_EXPORT ContentSecurityPolicy |
Document* GetDocument() const; |
+ bool HasHeaderDeliveredPolicy() const { return header_delivered_; } |
+ |
private: |
FRIEND_TEST_ALL_PREFIXES(ContentSecurityPolicyTest, NonceInline); |
FRIEND_TEST_ALL_PREFIXES(ContentSecurityPolicyTest, NonceSinglePolicy); |
@@ -466,6 +467,7 @@ class CORE_EXPORT ContentSecurityPolicy |
bool override_inline_style_allowed_; |
CSPDirectiveListVector policies_; |
ConsoleMessageVector console_messages_; |
+ bool header_delivered_{false}; |
HashSet<unsigned, AlreadyHashed> violation_reports_sent_; |