Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(45)

Side by Side Diff: chrome/browser/chromeos/extensions/device_local_account_management_policy_provider.cc

Issue 2686053003: Whitelisted mediaGalleries and usbDevices permission dicts (Closed)
Patch Set: Created 3 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/chromeos/extensions/device_local_account_management_pol icy_provider.h" 5 #include "chrome/browser/chromeos/extensions/device_local_account_management_pol icy_provider.h"
6 6
7 #include <stddef.h> 7 #include <stddef.h>
8 8
9 #include <cstddef> 9 #include <cstddef>
10 #include <string> 10 #include <string>
(...skipping 670 matching lines...) Expand 10 before | Expand all | Expand 10 after
681 // server-side or via chrome.socket. Finally, web security doesn't make a 681 // server-side or via chrome.socket. Finally, web security doesn't make a
682 // lot of sense when there's no URL bar or HTTPS padlock providing trusted 682 // lot of sense when there's no URL bar or HTTPS padlock providing trusted
683 // UI. Bottom line: Risks are mitigated, further restrictions don't make 683 // UI. Bottom line: Risks are mitigated, further restrictions don't make
684 // sense, so OK to allow. 684 // sense, so OK to allow.
685 "webview", 685 "webview",
686 }; 686 };
687 687
688 // Some permissions take the form of a dictionary. See |kSafePermissionStrings| 688 // Some permissions take the form of a dictionary. See |kSafePermissionStrings|
689 // for permission strings (and for more documentation). 689 // for permission strings (and for more documentation).
690 const char* const kSafePermissionDicts[] = { 690 const char* const kSafePermissionDicts[] = {
691 // Dictionary form of the above "fileSystem" permission string. 691 // Dictionary forms of the above permission strings.
692 "fileSystem", 692 "fileSystem",
693 693 "mediaGalleries",
694 // Just another type of connectivity.
695 "socket", 694 "socket",
695 "usbDevices",
696 }; 696 };
697 697
698 // List of safe entries for the "app" dict in manifest. 698 // List of safe entries for the "app" dict in manifest.
699 const char* const kSafeAppStrings[] = { 699 const char* const kSafeAppStrings[] = {
700 "background", 700 "background",
701 "content_security_policy", 701 "content_security_policy",
702 "icon_color", 702 "icon_color",
703 "isolation", 703 "isolation",
704 "launch", 704 "launch",
705 "linked_icons", 705 "linked_icons",
(...skipping 233 matching lines...) Expand 10 before | Expand all | Expand 10 after
939 if (error) { 939 if (error) {
940 *error = l10n_util::GetStringFUTF16( 940 *error = l10n_util::GetStringFUTF16(
941 IDS_EXTENSION_CANT_INSTALL_IN_DEVICE_LOCAL_ACCOUNT, 941 IDS_EXTENSION_CANT_INSTALL_IN_DEVICE_LOCAL_ACCOUNT,
942 base::UTF8ToUTF16(extension->name()), 942 base::UTF8ToUTF16(extension->name()),
943 base::UTF8ToUTF16(extension->id())); 943 base::UTF8ToUTF16(extension->id()));
944 } 944 }
945 return false; 945 return false;
946 } 946 }
947 947
948 } // namespace chromeos 948 } // namespace chromeos
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698