Index: chrome/common/extensions/extension_messages.h |
diff --git a/chrome/common/extensions/extension_messages.h b/chrome/common/extensions/extension_messages.h |
index c3eb6fd14eaedb5ecd6ba7822f45651e3d05e85b..431b2a1927c883bf0a36371d0d8f869d51c73a9d 100644 |
--- a/chrome/common/extensions/extension_messages.h |
+++ b/chrome/common/extensions/extension_messages.h |
@@ -30,6 +30,18 @@ |
IPC_ENUM_TRAITS(chrome::ViewType) |
+// Parameters structure for ExtensionHostMsg_AddAPIActionToActivityLog. |
+IPC_STRUCT_BEGIN(ExtensionHostMsg_APIAction_Params) |
palmer
2013/03/18 20:58:10
This is a rich API; taking a DeepCopy of the argum
felt
2013/03/18 21:01:33
What are your concerns? Perhaps I can address the
palmer
2013/03/18 21:22:13
I don't see an obvious, immediate vulnerability, b
felt
2013/03/18 23:34:19
OK, I added an additional check in chrome/browser/
|
+ // API name. |
+ IPC_STRUCT_MEMBER(std::string, api_call) |
+ |
+ // List of arguments. |
+ IPC_STRUCT_MEMBER(ListValue, arguments) |
+ |
+ // Extra logging information. |
+ IPC_STRUCT_MEMBER(std::string, extra) |
+IPC_STRUCT_END() |
+ |
// Parameters structure for ExtensionHostMsg_AddDOMActionToActivityLog. |
IPC_STRUCT_BEGIN(ExtensionHostMsg_DOMAction_Params) |
// URL of the page. |
@@ -588,7 +600,12 @@ IPC_MESSAGE_CONTROL1(ExtensionHostMsg_ResumeRequests, int /* route_id */) |
IPC_MESSAGE_ROUTED1(ExtensionHostMsg_UpdateDraggableRegions, |
std::vector<extensions::DraggableRegion> /* regions */) |
-// Sent by the renderer to log a DOM action on the extension activity log. |
+// Sent by the renderer to log an API action to the extension activity log. |
+IPC_MESSAGE_CONTROL2(ExtensionHostMsg_AddAPIActionToActivityLog, |
+ std::string /* extension_id */, |
+ ExtensionHostMsg_APIAction_Params) |
+ |
+// Sent by the renderer to log a DOM action to the extension activity log. |
IPC_MESSAGE_CONTROL2(ExtensionHostMsg_AddDOMActionToActivityLog, |
std::string /* extension_id */, |
ExtensionHostMsg_DOMAction_Params) |