Index: chrome/common/extensions/csp_validator.h |
diff --git a/chrome/common/extensions/csp_validator.h b/chrome/common/extensions/csp_validator.h |
deleted file mode 100644 |
index d6d4a2fe8b93cc9112734ab44585694b7ed6a9fb..0000000000000000000000000000000000000000 |
--- a/chrome/common/extensions/csp_validator.h |
+++ /dev/null |
@@ -1,47 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#ifndef CHROME_COMMON_EXTENSIONS_CSP_VALIDATOR_H_ |
-#define CHROME_COMMON_EXTENSIONS_CSP_VALIDATOR_H_ |
- |
-#include <string> |
- |
-#include "extensions/common/manifest.h" |
- |
-namespace extensions { |
- |
-namespace csp_validator { |
- |
-// Checks whether the given |policy| is legal for use in the extension system. |
-// This check just ensures that the policy doesn't contain any characters that |
-// will cause problems when we transmit the policy in an HTTP header. |
-bool ContentSecurityPolicyIsLegal(const std::string& policy); |
- |
-// Checks whether the given |policy| meets the minimum security requirements |
-// for use in the extension system. |
-// |
-// Ideally, we would like to say that an XSS vulnerability in the extension |
-// should not be able to execute script, even in the precense of an active |
-// network attacker. |
-// |
-// However, we found that it broke too many deployed extensions to limit |
-// 'unsafe-eval' in the script-src directive, so that is allowed as a special |
-// case for extensions. Platform apps disallow it. |
-bool ContentSecurityPolicyIsSecure( |
- const std::string& policy, Manifest::Type type); |
- |
-// Checks whether the given |policy| enforces a unique origin sandbox as |
-// defined by http://www.whatwg.org/specs/web-apps/current-work/multipage/ |
-// the-iframe-element.html#attr-iframe-sandbox. The policy must have the |
-// "sandbox" directive, and the sandbox tokens must not include |
-// "allow-same-origin". Additional restrictions may be imposed depending on |
-// |type|. |
-bool ContentSecurityPolicyIsSandboxed( |
- const std::string& policy, Manifest::Type type); |
- |
-} // namespace csp_validator |
- |
-} // namespace extensions |
- |
-#endif // CHROME_COMMON_EXTENSIONS_CSP_VALIDATOR_H_ |