| Index: chrome/common/extensions/csp_validator.h
|
| diff --git a/chrome/common/extensions/csp_validator.h b/chrome/common/extensions/csp_validator.h
|
| index 1934495542590864213d534efe64c21006e8eac7..dc9c57a3f6eef9f76af0aca42fd43a660adf818d 100644
|
| --- a/chrome/common/extensions/csp_validator.h
|
| +++ b/chrome/common/extensions/csp_validator.h
|
| @@ -7,7 +7,7 @@
|
|
|
| #include <string>
|
|
|
| -#include "chrome/common/extensions/extension.h"
|
| +#include "chrome/common/extensions/manifest.h"
|
|
|
| namespace extensions {
|
|
|
| @@ -29,7 +29,7 @@ bool ContentSecurityPolicyIsLegal(const std::string& policy);
|
| // 'unsafe-eval' in the script-src directive, so that is allowed as a special
|
| // case for extensions. Platform apps disallow it.
|
| bool ContentSecurityPolicyIsSecure(
|
| - const std::string& policy, Extension::Type type);
|
| + const std::string& policy, Manifest::Type type);
|
|
|
| // Checks whether the given |policy| enforces a unique origin sandbox as
|
| // defined by http://www.whatwg.org/specs/web-apps/current-work/multipage/
|
| @@ -38,7 +38,7 @@ bool ContentSecurityPolicyIsSecure(
|
| // "allow-same-origin". Additional restrictions may be imposed depending on
|
| // |type|.
|
| bool ContentSecurityPolicyIsSandboxed(
|
| - const std::string& policy, Extension::Type type);
|
| + const std::string& policy, Manifest::Type type);
|
|
|
| } // namespace csp_validator
|
|
|
|
|