Index: Source/core/frame/csp/ContentSecurityPolicy.cpp |
diff --git a/Source/core/frame/csp/ContentSecurityPolicy.cpp b/Source/core/frame/csp/ContentSecurityPolicy.cpp |
index 80af84f042786d4b885d3329b8afde7e1ac9fc02..0ab6270c3c035677ce84db640178711eabcb970d 100644 |
--- a/Source/core/frame/csp/ContentSecurityPolicy.cpp |
+++ b/Source/core/frame/csp/ContentSecurityPolicy.cpp |
@@ -151,7 +151,7 @@ |
{ |
ASSERT(m_executionContext); |
// Ensure that 'self' processes correctly. |
- m_selfSource = adoptPtr(new CSPSource(this, securityOrigin()->protocol(), securityOrigin()->host(), securityOrigin()->port(), String(), CSPSource::NoWildcard, CSPSource::NoWildcard)); |
+ m_selfSource = adoptPtr(new CSPSource(this, securityOrigin()->protocol(), securityOrigin()->host(), securityOrigin()->port(), String(), false, false)); |
// If we're in a Document, set the referrer policy and sandbox flags, then dump all the |
// parsing error messages, then poke at histograms. |
@@ -262,7 +262,7 @@ |
// an execution context (for 'frame-ancestor' resolution, for example). This CSPSource will |
// be overwritten when we bind this object to an execution context. |
RefPtr<SecurityOrigin> origin = SecurityOrigin::create(url); |
- m_selfSource = adoptPtr(new CSPSource(this, origin->protocol(), origin->host(), origin->port(), String(), CSPSource::NoWildcard, CSPSource::NoWildcard)); |
+ m_selfSource = adoptPtr(new CSPSource(this, origin->protocol(), origin->host(), origin->port(), String(), false, false)); |
} |
const String& ContentSecurityPolicy::deprecatedHeader() const |