| Index: chrome/browser/ssl/chrome_ssl_host_state_delegate.cc
|
| diff --git a/chrome/browser/ssl/chrome_ssl_host_state_delegate.cc b/chrome/browser/ssl/chrome_ssl_host_state_delegate.cc
|
| index c8fed6e90058b1fbcdf38aad26bbcb187ebaf181..8eb0bacb4361c362d44b42a54602d358d1663528 100644
|
| --- a/chrome/browser/ssl/chrome_ssl_host_state_delegate.cc
|
| +++ b/chrome/browser/ssl/chrome_ssl_host_state_delegate.cc
|
| @@ -145,7 +145,8 @@ void MigrateOldSettings(HostContentSettingsMap* map) {
|
| bool HostFilterToPatternFilter(
|
| const base::Callback<bool(const std::string&)>& host_filter,
|
| const ContentSettingsPattern& primary_pattern,
|
| - const ContentSettingsPattern& secondary_pattern) {
|
| + const ContentSettingsPattern& secondary_pattern,
|
| + base::Time last_modified) {
|
| // We only ever set origin-scoped exceptions which are of the form
|
| // "https://<host>:443". That is a valid URL, so we can compare |host_filter|
|
| // against its host.
|
| @@ -334,7 +335,8 @@ void ChromeSSLHostStateDelegate::Clear(
|
| // settings deletion is done synchronously on the UI thread, so we can use
|
| // |host_filter| by reference.
|
| base::Callback<bool(const ContentSettingsPattern& primary_pattern,
|
| - const ContentSettingsPattern& secondary_pattern)>
|
| + const ContentSettingsPattern& secondary_pattern,
|
| + base::Time last_modified)>
|
| pattern_filter;
|
| if (!host_filter.is_null()) {
|
| pattern_filter =
|
|
|