Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(591)

Side by Side Diff: extensions/common/api/_manifest_features.json

Issue 265503003: Enable file_handlers and chrome.app.runtime for QuickOffice. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Hacky approach to get around component apps being auto whitelisted to everything Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This features file defines manifest keys implemented under src/extensions. 5 // This features file defines manifest keys implemented under src/extensions.
6 // See extensions/common/features/* to understand this file, in particular 6 // See extensions/common/features/* to understand this file, in particular
7 // feature.h, simple_feature.h, and base_feature_provider.h. 7 // feature.h, simple_feature.h, and base_feature_provider.h.
8 8
9 // To add a new whitelisted ID, SHA-1 it and force it to uppercase. In Bash:
10 //
11 // $ echo -n "aaaabbbbccccddddeeeeffffgggghhhh" | \
12 // sha1sum | tr '[:lower:]' '[:upper:]'
13 // 9A0417016F345C934A1A88F55CA17C05014EEEBA -
14 //
15 // Google employees: please update http://go/chrome-api-whitelist to map
16 // hashes back to ids.
17
9 { 18 {
10 // The default platform app CSP can only be overridden by whitelisted apps. 19 // The default platform app CSP can only be overridden by whitelisted apps.
11 // This is a separate key from the top-level content_security_policy one since 20 // This is a separate key from the top-level content_security_policy one since
12 // we can't combine type restrictions with whitelisted ID restrictions. If 21 // we can't combine type restrictions with whitelisted ID restrictions. If
13 // there is a need for additional whitelisted entries, the feature system 22 // there is a need for additional whitelisted entries, the feature system
14 // should instead be extended to support OR-ing of restrictions. 23 // should instead be extended to support OR-ing of restrictions.
15 "app.content_security_policy": { 24 "app.content_security_policy": {
16 "channel": "stable", 25 "channel": "stable",
17 "extension_types": ["platform_app"], 26 "extension_types": ["platform_app"],
18 "min_manifest_version": 2, 27 "min_manifest_version": 2,
(...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after
109 "extension_types": ["platform_app"], 118 "extension_types": ["platform_app"],
110 "location": "component" 119 "location": "component"
111 } 120 }
112 ], 121 ],
113 "webview": { 122 "webview": {
114 "channel": "stable", 123 "channel": "stable",
115 "extension_types": ["platform_app"], 124 "extension_types": ["platform_app"],
116 "min_manifest_version": 2 125 "min_manifest_version": 2
117 } 126 }
118 } 127 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698