| Index: chrome/common/extensions/csp_validator.h
|
| ===================================================================
|
| --- chrome/common/extensions/csp_validator.h (revision 0)
|
| +++ chrome/common/extensions/csp_validator.h (revision 0)
|
| @@ -0,0 +1,33 @@
|
| +// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#ifndef CHROME_COMMON_EXTENSIONS_CSP_VALIDATOR_H_
|
| +#define CHROME_COMMON_EXTENSIONS_CSP_VALIDATOR_H_
|
| +#pragma once
|
| +
|
| +#include <string>
|
| +
|
| +namespace extensions {
|
| +
|
| +namespace csp_validator {
|
| +
|
| +// Checks whether the given |policy| is legal for use in the extension system.
|
| +// This check just ensures that the policy doesn't contain any characters that
|
| +// will cause problems when we transmit the policy in an HTTP header.
|
| +bool ContentSecurityPolicyIsLegal(const std::string& policy);
|
| +
|
| +// Checks whether the given |policy| meets the minimum security requirements
|
| +// for use in the extension system. The philosophy behind our minimum
|
| +// requirements is that an XSS vulnerability in the extension should not be
|
| +// able to execute script, even in the precense of an active network attacker.
|
| +// Specifically, 'unsafe-inline' and 'unsafe-eval' are forbidden, as is
|
| +// script or object inclusion from insecure schemes. Also, the use of * is
|
| +// forbidden for scripts and objects.
|
| +bool ContentSecurityPolicyIsSecure(const std::string& policy);
|
| +
|
| +} // namespace csp_validator
|
| +
|
| +} // namespace extensions
|
| +
|
| +#endif // CHROME_COMMON_EXTENSIONS_CSP_VALIDATOR_H_
|
|
|