Index: chrome/browser/DEPS |
diff --git a/chrome/browser/DEPS b/chrome/browser/DEPS |
index 05dc019bd0f245487c02fd57860130ef4d54cf49..30356174b7389ff41592c360e41b72c3671842c1 100644 |
--- a/chrome/browser/DEPS |
+++ b/chrome/browser/DEPS |
@@ -104,3 +104,11 @@ include_rules = [ |
"+third_party/WebKit/public/web/WebTextDirection.h", |
"+third_party/WebKit/public/web/WebWindowFeatures.h", |
] |
+ |
+specific_include_rules = { |
+ # Exploits don't abide by DEPS; so all IPC message definitions are fair game |
+ # in this type of test. |
+ 'chrome_security_exploit_browsertest\.cc' : [ |
+ '+content/common', |
jam
2016/10/04 23:28:54
we never allow includes from within content from o
ncarter (slow)
2016/10/05 18:22:09
Hi John -- can you respond to the argument made on
jam
2016/10/05 19:11:08
I don't really grep this sentence; it all depends
ncarter (slow)
2016/10/05 20:45:34
I'm saying that an attacker doesn't have to ask OW
|
+ ], |
+} |