Index: chrome/common/extensions/docs/extensions/contentSecurityPolicy.html |
diff --git a/chrome/common/extensions/docs/extensions/contentSecurityPolicy.html b/chrome/common/extensions/docs/extensions/contentSecurityPolicy.html |
index d069689528dec625ba52e47c7c8c33db5c091705..38be33802df67c2f74189df6c07358bb2e765560 100644 |
--- a/chrome/common/extensions/docs/extensions/contentSecurityPolicy.html |
+++ b/chrome/common/extensions/docs/extensions/contentSecurityPolicy.html |
@@ -405,13 +405,14 @@ popup.html: |
<p> |
If, on the other hand, you have a need for some external JavaScript or object |
resources, you can relax the policy to a limited extent by whitelisting |
- specific HTTPS origins from which scripts should be accepted. Whitelisting |
- insecure HTTP resources will have no effect. This is intentional, because |
- we want to ensure that executable resources loaded with an extension's |
- elevated permissions is exactly the resource you expect, and hasn't been |
- replaced by an active network attacker. As <a href="http://en.wikipedia.org/wiki/Man-in-the-middle_attack">man-in-the-middle |
- attacks</a> are both trivial and undetectable over HTTP, only HTTPS origins |
- will be accepted. |
+ secure origins from which scripts should be accepted. We want to ensure that |
+ executable resources loaded with an extension's elevated permissions are |
+ exactly the resources you expect, and haven't been replaced by an active |
+ network attacker. As <a href="http://en.wikipedia.org/wiki/Man-in-the-middle_attack">man-in-the-middle |
+ attacks</a> are both trivial and undetectable over HTTP, those origins will |
+ not be accepted. Currently, we allow whitelisting origins with the following |
+ schemes: <code>HTTPS</code>, <code>chrome-extension</code>, and |
+ <code>chrome-extension-resource</code>. |
</p> |
<p> |
A relaxed policy definition which allows script resources to be loaded from |