| Index: extensions/common/csp_validator.h
|
| diff --git a/extensions/common/csp_validator.h b/extensions/common/csp_validator.h
|
| index 93676b0b8e66dcbb6f5a7d82d9ba0e337323aaf5..e4d1cb922cd8948fddb581a748b040107a7a9f9b 100644
|
| --- a/extensions/common/csp_validator.h
|
| +++ b/extensions/common/csp_validator.h
|
| @@ -51,6 +51,18 @@ std::string SanitizeContentSecurityPolicy(
|
| int options,
|
| std::vector<InstallWarning>* warnings);
|
|
|
| +// Given the Content Security Policy of an app sandbox page, returns the
|
| +// effective CSP for that sandbox page.
|
| +//
|
| +// The effective policy restricts the page from loading external web content
|
| +// (frames and scripts) within the page. This is done through adding 'self'
|
| +// directive source to relevant CSP directive names.
|
| +//
|
| +// If |warnings| is not nullptr, any validation errors are appended to
|
| +// |warnings|.
|
| +std::string GetEffectiveSandoxedPageCSP(const std::string& policy,
|
| + std::vector<InstallWarning>* warnings);
|
| +
|
| // Checks whether the given |policy| enforces a unique origin sandbox as
|
| // defined by http://www.whatwg.org/specs/web-apps/current-work/multipage/
|
| // the-iframe-element.html#attr-iframe-sandbox. The policy must have the
|
|
|