| Index: extensions/common/csp_validator.h
 | 
| diff --git a/extensions/common/csp_validator.h b/extensions/common/csp_validator.h
 | 
| index 93676b0b8e66dcbb6f5a7d82d9ba0e337323aaf5..e4d1cb922cd8948fddb581a748b040107a7a9f9b 100644
 | 
| --- a/extensions/common/csp_validator.h
 | 
| +++ b/extensions/common/csp_validator.h
 | 
| @@ -51,6 +51,18 @@ std::string SanitizeContentSecurityPolicy(
 | 
|      int options,
 | 
|      std::vector<InstallWarning>* warnings);
 | 
|  
 | 
| +// Given the Content Security Policy of an app sandbox page, returns the
 | 
| +// effective CSP for that sandbox page.
 | 
| +//
 | 
| +// The effective policy restricts the page from loading external web content
 | 
| +// (frames and scripts) within the page. This is done through adding 'self'
 | 
| +// directive source to relevant CSP directive names.
 | 
| +//
 | 
| +// If |warnings| is not nullptr, any validation errors are appended to
 | 
| +// |warnings|.
 | 
| +std::string GetEffectiveSandoxedPageCSP(const std::string& policy,
 | 
| +                                        std::vector<InstallWarning>* warnings);
 | 
| +
 | 
|  // Checks whether the given |policy| enforces a unique origin sandbox as
 | 
|  // defined by http://www.whatwg.org/specs/web-apps/current-work/multipage/
 | 
|  // the-iframe-element.html#attr-iframe-sandbox. The policy must have the
 | 
| 
 |