Chromium Code Reviews| Index: chrome/browser/chromeos/extensions/device_local_account_management_policy_provider.cc |
| diff --git a/chrome/browser/chromeos/extensions/device_local_account_management_policy_provider.cc b/chrome/browser/chromeos/extensions/device_local_account_management_policy_provider.cc |
| index ec4db9cd464dfba754cae40fd8a4cdd8b1906930..8ada0f4ebfd202438bff5c7df93514f413979936 100644 |
| --- a/chrome/browser/chromeos/extensions/device_local_account_management_policy_provider.cc |
| +++ b/chrome/browser/chromeos/extensions/device_local_account_management_policy_provider.cc |
| @@ -451,9 +451,10 @@ const char* const kSafePermissionStrings[] = { |
| // access to page content, which we can't allow. |
| // "declarativeContent", |
| - // Allow, but either (1) ask user for confirmation or (2) return blank |
| - // capture. |
| - // "desktopCapture", |
| + // User is prompted when an extension requests desktopCapture whether they |
| + // want to allow it. The request is made through |
| + // chrome.desktopCapture.chooseDesktopMedia call. |
| + "desktopCapture", |
| // Haven't checked in detail what this does, but messing with devtools |
| // usually comes with the ability to access page content. |
| @@ -626,9 +627,9 @@ const char* const kSafePermissionStrings[] = { |
| // Enumerates removable storage. |
| "system.storage", |
| - // Provides access to screen contents, so block. Alternatively, (1) prompt |
| - // for user consent or (2) return blank capture. |
| - // "tabCapture", |
| + // User is prompted (allow/deny) when an extension requests tabCapture. The |
| + // request is made via chrome.tabCapture.capture call. |
| + "tabCapture", |
|
miu
2016/12/08 21:18:18
This should be "tabCapture.capture" since the capt
Ivan Šandrk
2016/12/09 15:30:17
This is actually fine, this whitelists all tabCapt
miu
2016/12/10 00:47:20
Same code paths, IIRC. The way you'd tell the diff
|
| // Privacy sensitive URL access. |
| // "tabs", |