Index: chrome/common/extensions/docs/templates/articles/contentSecurityPolicy.html |
diff --git a/chrome/common/extensions/docs/templates/articles/contentSecurityPolicy.html b/chrome/common/extensions/docs/templates/articles/contentSecurityPolicy.html |
index 8ed936f6a145dd0bd4787b4e870c24f460eea04e..83b019466630a89c66084457729a6c09f9442485 100644 |
--- a/chrome/common/extensions/docs/templates/articles/contentSecurityPolicy.html |
+++ b/chrome/common/extensions/docs/templates/articles/contentSecurityPolicy.html |
@@ -273,9 +273,18 @@ function main() { |
network attacker. As <a |
href="http://en.wikipedia.org/wiki/Man-in-the-middle_attack">man-in-the-middle |
attacks</a> are both trivial and undetectable over HTTP, those origins will |
- not be accepted. Currently, we allow whitelisting origins with the following |
- schemes: <code>HTTPS</code>, <code>chrome-extension</code>, and |
- <code>chrome-extension-resource</code>. |
+ not be accepted. |
+</p> |
+ |
+<p> |
+ Currently, we allow whitelisting origins with the following schemes: |
+ <code>blob</code>, <code>filesystem</code>, <code>https</code>, |
+ <code>chrome-extension</code>, and <code>chrome-extension-resource</code>. |
+ The host part of the origin must explicitly be specified for the |
+ <code>https</code> and <code>chrome-extension</code> schemes. |
+ Generic wildcards such as <code>https:</code>, <code>https://*</code> and |
+ <code>https://*.com</code> are not allowed; subdomain wildcards such as |
+ <code>https://*.example.com</code> are allowed. |
</p> |
<p> |