| Index: chrome/common/extensions/csp_validator.cc
|
| diff --git a/chrome/common/extensions/csp_validator.cc b/chrome/common/extensions/csp_validator.cc
|
| index 3ce619290a51497d003b9537190705ab6d2aa339..814026ca4d79ff0cf101045b25e03d6a4bb028ca 100644
|
| --- a/chrome/common/extensions/csp_validator.cc
|
| +++ b/chrome/common/extensions/csp_validator.cc
|
| @@ -35,7 +35,7 @@ struct DirectiveStatus {
|
| bool is_secure;
|
| };
|
|
|
| -bool HasOnlySecureTokens(StringTokenizer& tokenizer, Extension::Type type) {
|
| +bool HasOnlySecureTokens(StringTokenizer& tokenizer, Manifest::Type type) {
|
| while (tokenizer.GetNext()) {
|
| std::string source = tokenizer.token();
|
| StringToLowerASCII(&source);
|
| @@ -75,8 +75,8 @@ bool HasOnlySecureTokens(StringTokenizer& tokenizer, Extension::Type type) {
|
| }
|
|
|
| // crbug.com/146487
|
| - if (type == Extension::TYPE_EXTENSION ||
|
| - type == Extension::TYPE_LEGACY_PACKAGED_APP) {
|
| + if (type == Manifest::TYPE_EXTENSION ||
|
| + type == Manifest::TYPE_LEGACY_PACKAGED_APP) {
|
| if (source == "'unsafe-eval'")
|
| continue;
|
| }
|
| @@ -91,7 +91,7 @@ bool HasOnlySecureTokens(StringTokenizer& tokenizer, Extension::Type type) {
|
| bool UpdateStatus(const std::string& directive_name,
|
| StringTokenizer& tokenizer,
|
| DirectiveStatus* status,
|
| - Extension::Type type) {
|
| + Manifest::Type type) {
|
| if (status->seen_in_policy)
|
| return false;
|
| if (directive_name != status->directive_name)
|
| @@ -113,7 +113,7 @@ bool ContentSecurityPolicyIsLegal(const std::string& policy) {
|
| }
|
|
|
| bool ContentSecurityPolicyIsSecure(const std::string& policy,
|
| - Extension::Type type) {
|
| + Manifest::Type type) {
|
| // See http://www.w3.org/TR/CSP/#parse-a-csp-policy for parsing algorithm.
|
| std::vector<std::string> directives;
|
| base::SplitString(policy, ';', &directives);
|
| @@ -155,7 +155,7 @@ bool ContentSecurityPolicyIsSecure(const std::string& policy,
|
| }
|
|
|
| bool ContentSecurityPolicyIsSandboxed(
|
| - const std::string& policy, Extension::Type type) {
|
| + const std::string& policy, Manifest::Type type) {
|
| // See http://www.w3.org/TR/CSP/#parse-a-csp-policy for parsing algorithm.
|
| std::vector<std::string> directives;
|
| base::SplitString(policy, ';', &directives);
|
| @@ -185,7 +185,7 @@ bool ContentSecurityPolicyIsSandboxed(
|
| return false;
|
|
|
| // Platform apps don't allow navigation.
|
| - if (type == Extension::TYPE_PLATFORM_APP) {
|
| + if (type == Manifest::TYPE_PLATFORM_APP) {
|
| if (token == kAllowTopNavigation)
|
| return false;
|
| }
|
|
|