Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp |
diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp |
index eed17d89adcbe826f96954be797130ce9708d41e..7b24fa6ab24a77fbbbd6afa9e07329e4dc7777b2 100644 |
--- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp |
+++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicyTest.cpp |
@@ -58,8 +58,8 @@ TEST_F(ContentSecurityPolicyTest, ParseInsecureRequestPolicy) { |
// Enforced |
for (const auto& test : cases) { |
- SCOPED_TRACE(testing::Message() << "[Enforce] Header: `" << test.header |
- << "`"); |
+ SCOPED_TRACE(testing::Message() |
+ << "[Enforce] Header: `" << test.header << "`"); |
csp = ContentSecurityPolicy::Create(); |
csp->DidReceiveHeader(test.header, kContentSecurityPolicyHeaderTypeEnforce, |
kContentSecurityPolicyHeaderSourceHTTP); |
@@ -79,8 +79,8 @@ TEST_F(ContentSecurityPolicyTest, ParseInsecureRequestPolicy) { |
// Report-Only |
for (const auto& test : cases) { |
- SCOPED_TRACE(testing::Message() << "[Report-Only] Header: `" << test.header |
- << "`"); |
+ SCOPED_TRACE(testing::Message() |
+ << "[Report-Only] Header: `" << test.header << "`"); |
csp = ContentSecurityPolicy::Create(); |
csp->DidReceiveHeader(test.header, kContentSecurityPolicyHeaderTypeReport, |
kContentSecurityPolicyHeaderSourceHTTP); |
@@ -665,9 +665,9 @@ TEST_F(ContentSecurityPolicyTest, NonceSinglePolicy) { |
}; |
for (const auto& test : cases) { |
- SCOPED_TRACE(testing::Message() << "Policy: `" << test.policy << "`, URL: `" |
- << test.url << "`, Nonce: `" << test.nonce |
- << "`"); |
+ SCOPED_TRACE(testing::Message() |
+ << "Policy: `" << test.policy << "`, URL: `" << test.url |
+ << "`, Nonce: `" << test.nonce << "`"); |
KURL resource = KURL(KURL(), test.url); |
unsigned expected_reports = test.allowed ? 0u : 1u; |