blob: 3dd0ae7242c29cd6607ba02429abe8c52c0fe6b7 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
|
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef EXTENSIONS_COMMON_MANIFEST_HANDLERS_SANDBOXED_PAGE_INFO_H_
#define EXTENSIONS_COMMON_MANIFEST_HANDLERS_SANDBOXED_PAGE_INFO_H_
#include <string>
#include "extensions/common/extension.h"
#include "extensions/common/manifest_handler.h"
#include "extensions/common/url_pattern_set.h"
namespace extensions {
struct SandboxedPageInfo : public Extension::ManifestData {
public:
SandboxedPageInfo();
~SandboxedPageInfo() override;
// Returns the extension's Content Security Policy for the sandboxed pages.
static const std::string& GetContentSecurityPolicy(
const Extension* extension);
// Returns the extension's sandboxed pages.
static const URLPatternSet& GetPages(const Extension* extension);
// Returns true if the specified page is sandboxed.
static bool IsSandboxedPage(const Extension* extension,
const std::string& relative_path);
// Optional list of extension pages that are sandboxed (served from a unique
// origin with a different Content Security Policy).
URLPatternSet pages;
// Content Security Policy that should be used to enforce the sandbox used
// by sandboxed pages (guaranteed to have the "sandbox" directive without the
// "allow-same-origin" token).
std::string content_security_policy;
};
class SandboxedPageHandler : public ManifestHandler {
public:
SandboxedPageHandler();
~SandboxedPageHandler() override;
bool Parse(Extension* extension, base::string16* error) override;
private:
const std::vector<std::string> Keys() const override;
};
} // namespace extensions
#endif // EXTENSIONS_COMMON_MANIFEST_HANDLERS_SANDBOXED_PAGE_INFO_H_
|