Index: extensions/common/csp_validator.h |
diff --git a/extensions/common/csp_validator.h b/extensions/common/csp_validator.h |
index e7446f6d4fd885f0363d7002f9d780053e3ab7ba..2b6df2d3d2a0395357742d7372dab56cda8ec28b 100644 |
--- a/extensions/common/csp_validator.h |
+++ b/extensions/common/csp_validator.h |
@@ -28,8 +28,15 @@ bool ContentSecurityPolicyIsLegal(const std::string& policy); |
// However, we found that it broke too many deployed extensions to limit |
// 'unsafe-eval' in the script-src directive, so that is allowed as a special |
// case for extensions. Platform apps disallow it. |
-bool ContentSecurityPolicyIsSecure( |
- const std::string& policy, Manifest::Type type); |
+// |
+// If |sanitized_csp| is not NULL, |policy| minus the insecure values is stored |
+// in |sanitized_csp|. |
+// If |warnings| is not NULL, any validation errors are appended to |warnings|. |
+// Returns whether |policy| meets the minimum security requirements. |
+bool ContentSecurityPolicyIsSecure(const std::string& policy, |
+ Manifest::Type type, |
+ std::string* sanitized_csp, |
+ std::vector<InstallWarning>* warnings); |
// Checks whether the given |policy| enforces a unique origin sandbox as |
// defined by http://www.whatwg.org/specs/web-apps/current-work/multipage/ |