OLD | NEW |
1 per-file chrome_features.cc=* | 1 per-file chrome_features.cc=* |
2 per-file chrome_features.h=* | 2 per-file chrome_features.h=* |
3 per-file chrome_switches.cc=* | 3 per-file chrome_switches.cc=* |
4 per-file chrome_switches.h=* | 4 per-file chrome_switches.h=* |
5 per-file pref_names.cc=* | 5 per-file pref_names.cc=* |
6 per-file pref_names.h=* | 6 per-file pref_names.h=* |
7 per-file url_constants.cc=* | 7 per-file url_constants.cc=* |
8 per-file url_constants.h=* | 8 per-file url_constants.h=* |
9 | 9 |
10 # This is for the common case of adding or renaming files. If you're doing | 10 # This is for the common case of adding or renaming files. If you're doing |
11 # structural changes, use usual OWNERS rules. | 11 # structural changes, use usual OWNERS rules. |
12 per-file BUILD.gn=* | 12 per-file BUILD.gn=* |
13 | 13 |
14 # Mac Sandbox profiles. | 14 # Mac Sandbox profiles. |
15 per-file nacl_loader.sb=set noparent | 15 per-file nacl_loader.sb=set noparent |
16 per-file nacl_loader.sb=rsesek@chromium.org | 16 per-file nacl_loader.sb=rsesek@chromium.org |
17 | 17 |
18 per-file *_messages*.h=set noparent | 18 per-file *_messages*.h=set noparent |
19 per-file *_messages*.h=file://ipc/SECURITY_OWNERS | 19 per-file *_messages*.h=file://ipc/SECURITY_OWNERS |
20 | 20 |
21 per-file *_param_traits*.*=set noparent | 21 per-file *_param_traits*.*=set noparent |
22 per-file *_param_traits*.*=file://ipc/SECURITY_OWNERS | 22 per-file *_param_traits*.*=file://ipc/SECURITY_OWNERS |
23 | 23 |
24 per-file *_type_converter*.*=set noparent | 24 per-file *_type_converter*.*=set noparent |
25 per-file *_type_converter*.*=file://ipc/SECURITY_OWNERS | 25 per-file *_type_converter*.*=file://ipc/SECURITY_OWNERS |
26 | 26 |
| 27 per-file *_struct_traits*.*=set noparent |
| 28 per-file *_struct_traits*.*=file://ipc/SECURITY_OWNERS |
| 29 |
| 30 per-file *.typemap=set noparent |
| 31 per-file *.typemap=file://ipc/SECURITY_OWNERS |
| 32 |
27 # Changes to Mojo interfaces require a security review to avoid | 33 # Changes to Mojo interfaces require a security review to avoid |
28 # introducing new sandbox escapes. | 34 # introducing new sandbox escapes. |
29 per-file *.mojom=set noparent | 35 per-file *.mojom=set noparent |
30 per-file *.mojom=file://ipc/SECURITY_OWNERS | 36 per-file *.mojom=file://ipc/SECURITY_OWNERS |
31 | 37 |
32 #Content settings | 38 #Content settings |
33 per-file content_settings*=markusheintz@chromium.org | 39 per-file content_settings*=markusheintz@chromium.org |
34 | 40 |
35 # Pepper files. | 41 # Pepper files. |
36 per-file pepper_*=bbudge@chromium.org | 42 per-file pepper_*=bbudge@chromium.org |
37 per-file pepper_*=raymes@chromium.org | 43 per-file pepper_*=raymes@chromium.org |
38 | 44 |
39 # Other stuff. | 45 # Other stuff. |
40 per-file autocomplete_match_type.*=mpearson@chromium.org | 46 per-file autocomplete_match_type.*=mpearson@chromium.org |
41 per-file autocomplete_match_type.*=pkasting@chromium.org | 47 per-file autocomplete_match_type.*=pkasting@chromium.org |
42 per-file autocomplete_match_type.*=sky@chromium.org | 48 per-file autocomplete_match_type.*=sky@chromium.org |
43 per-file crash_keys*=rsesek@chromium.org | 49 per-file crash_keys*=rsesek@chromium.org |
44 | 50 |
45 # Tracing | 51 # Tracing |
46 per-file trace_event_args_whitelist*=nduca@chromium.org | 52 per-file trace_event_args_whitelist*=nduca@chromium.org |
47 per-file trace_event_args_whitelist*=dsinclair@chromium.org | 53 per-file trace_event_args_whitelist*=dsinclair@chromium.org |
48 per-file trace_event_args_whitelist*=oysteine@chromium.org | 54 per-file trace_event_args_whitelist*=oysteine@chromium.org |
OLD | NEW |