| Index: content/common/content_security_policy/csp_context.cc
|
| diff --git a/content/common/content_security_policy/csp_context.cc b/content/common/content_security_policy/csp_context.cc
|
| index ab249dd3f25840268f907498e737c57f4e1f32eb..0ba1e1830b7ce900a79afab51894e4cdd8aed08f 100644
|
| --- a/content/common/content_security_policy/csp_context.cc
|
| +++ b/content/common/content_security_policy/csp_context.cc
|
| @@ -66,6 +66,14 @@ bool CSPContext::SchemeShouldBypassCSP(const base::StringPiece& scheme) {
|
| return false;
|
| }
|
|
|
| +void CSPContext::SanitizeDataForUseInCspViolation(
|
| + bool is_redirect,
|
| + CSPDirective::Name directive,
|
| + GURL* blocked_url,
|
| + SourceLocation* source_location) const {
|
| + return;
|
| +}
|
| +
|
| bool CSPContext::SelfSchemeShouldBypassCsp() {
|
| if (!has_self_)
|
| return false;
|
|
|