Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(197)

Side by Side Diff: extensions/common/api/_permission_features.json

Issue 2860203002: MediaPerceptionPrivate IDL and skeleton. (Closed)
Patch Set: Addressing comments on IDL. Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This features file defines permissions for extension APIs implemented 5 // This features file defines permissions for extension APIs implemented
6 // under src/extensions. 6 // under src/extensions.
7 // See chrome/common/extensions/api/_features.md to understand this file, as 7 // See chrome/common/extensions/api/_features.md to understand this file, as
8 // well as feature.h, simple_feature.h, and feature_provider.h. 8 // well as feature.h, simple_feature.h, and feature_provider.h.
9 9
10 // If you add a new platform_app permission please update the "stubs_app" test: 10 // If you add a new platform_app permission please update the "stubs_app" test:
(...skipping 231 matching lines...) Expand 10 before | Expand all | Expand 10 after
242 "D4EFCCC0CC612380762758BB96C7997224BD6395", // http://crbug.com/710541 242 "D4EFCCC0CC612380762758BB96C7997224BD6395", // http://crbug.com/710541
243 "4839A26B29CD1BD021B2E126EF6D28C9CB84018B", // http://crbug.com/710541 243 "4839A26B29CD1BD021B2E126EF6D28C9CB84018B", // http://crbug.com/710541
244 "8F44FBB4474CCDF23450B166C9E83E85BD03AE24" // http://crbug.com/710541 244 "8F44FBB4474CCDF23450B166C9E83E85BD03AE24" // http://crbug.com/710541
245 ] 245 ]
246 } 246 }
247 ], 247 ],
248 "idle": { 248 "idle": {
249 "channel": "stable", 249 "channel": "stable",
250 "extension_types": ["extension", "legacy_packaged_app", "platform_app"] 250 "extension_types": ["extension", "legacy_packaged_app", "platform_app"]
251 }, 251 },
252 "mediaPerceptionPrivate": {
253 "channel": "trunk",
254 "extension_types": ["extension", "legacy_packaged_app", "platform_app"]
255 // TODO(lasoren): Uncomment whitelist and make browser_tests work with white list.
tbarzic 2017/05/08 22:21:07 can you uncomment these and link a bug for whiteli
Luke Sorenson 2017/05/09 17:41:04 Uncommented. So you're saying I should create a cr
tbarzic 2017/05/09 21:03:11 yes (and you can make the bug restrictview-google)
Luke Sorenson 2017/05/10 17:33:26 Done.
256 // "whitelist": [
257 // "E703483CEF33DEC18B4B6DD84B5C776FB9182BDB", // Stable external hotrod a pp
258 // "A3BC37E2148AC4E99BE4B16AF9D42DD1E592BBBE", // Beta external hotrod app
259 // "1C93BD3CF875F4A73C0B2A163BB8FBDA8B8B3D80", // Alpha external hotrod ap p
260 // "307E96539209F95A1A8740C713E6998A73657D96", // Dev external hotrod app
261 // "4F25792AF1AA7483936DE29C07806F203C7170A0", // Stable internal hotrod a pp
262 // "BD8781D757D830FC2E85470A1B6E8A718B7EE0D9", // Beta internal hotrod app
263 // "4AC2B6C63C6480D150DFDA13E4A5956EB1D0DDBB", // Alpha internal hotrod ap p
264 // "81986D4F846CEDDDB962643FA501D1780DD441BB" // Dev internal hotrod app
265 // ]
266 },
252 "metricsPrivate": { 267 "metricsPrivate": {
253 "channel": "stable", 268 "channel": "stable",
254 "extension_types": ["extension", "legacy_packaged_app", "platform_app"], 269 "extension_types": ["extension", "legacy_packaged_app", "platform_app"],
255 "whitelist": [ 270 "whitelist": [
256 // The file manager and Google Now are component extensions, and they can 271 // The file manager and Google Now are component extensions, and they can
257 // currently use whitelisted interfaces without being on the corresponding 272 // currently use whitelisted interfaces without being on the corresponding
258 // whitelist. 273 // whitelist.
259 // Adding it to this whitelist documents their dependency, however, and 274 // Adding it to this whitelist documents their dependency, however, and
260 // also doesn't hurt anything. 275 // also doesn't hurt anything.
261 "A948368FC53BE437A55FEB414106E207925482F5", // File manager 276 "A948368FC53BE437A55FEB414106E207925482F5", // File manager
(...skipping 285 matching lines...) Expand 10 before | Expand all | Expand 10 after
547 "06BE211D5F014BAB34BC22D9DDA09C63A81D828E", // Official XKB virtual kbd 562 "06BE211D5F014BAB34BC22D9DDA09C63A81D828E", // Official XKB virtual kbd
548 "CFBF7EE448FA48960FFDA7CEB30F7A21B26AA981", // Official m17n virtual kbd 563 "CFBF7EE448FA48960FFDA7CEB30F7A21B26AA981", // Official m17n virtual kbd
549 "F94EE6AB36D6C6588670B2B01EB65212D9C64E33", // Public XKB virtual kbd 564 "F94EE6AB36D6C6588670B2B01EB65212D9C64E33", // Public XKB virtual kbd
550 "3E03D9B67FDD31B2438D1CF5070573415DCB3CBA", // Public m17n virtual kbd 565 "3E03D9B67FDD31B2438D1CF5070573415DCB3CBA", // Public m17n virtual kbd
551 "E703483CEF33DEC18B4B6DD84B5C776FB9182BDB", // Stable external hotrod app 566 "E703483CEF33DEC18B4B6DD84B5C776FB9182BDB", // Stable external hotrod app
552 "A3BC37E2148AC4E99BE4B16AF9D42DD1E592BBBE", // Beta external hotrod app 567 "A3BC37E2148AC4E99BE4B16AF9D42DD1E592BBBE", // Beta external hotrod app
553 "1C93BD3CF875F4A73C0B2A163BB8FBDA8B8B3D80", // Alpha external hotrod app 568 "1C93BD3CF875F4A73C0B2A163BB8FBDA8B8B3D80", // Alpha external hotrod app
554 "307E96539209F95A1A8740C713E6998A73657D96", // Dev external hotrod app 569 "307E96539209F95A1A8740C713E6998A73657D96", // Dev external hotrod app
555 "4F25792AF1AA7483936DE29C07806F203C7170A0", // Stable internal hotrod app 570 "4F25792AF1AA7483936DE29C07806F203C7170A0", // Stable internal hotrod app
556 "BD8781D757D830FC2E85470A1B6E8A718B7EE0D9", // Beta internal hotrod app 571 "BD8781D757D830FC2E85470A1B6E8A718B7EE0D9", // Beta internal hotrod app
557 "4AC2B6C63C6480D150DFDA13E4A5956EB1D0DDBB", // Alpha external hotrod app 572 "4AC2B6C63C6480D150DFDA13E4A5956EB1D0DDBB", // Alpha internal hotrod app
558 "81986D4F846CEDDDB962643FA501D1780DD441BB" // Dev external hotrod app 573 "81986D4F846CEDDDB962643FA501D1780DD441BB" // Dev internal hotrod app
559 ] 574 ]
560 }, 575 },
561 "vpnProvider": { 576 "vpnProvider": {
562 "channel": "stable", 577 "channel": "stable",
563 "extension_types": ["extension", "platform_app"], 578 "extension_types": ["extension", "platform_app"],
564 "platforms": ["chromeos"] 579 "platforms": ["chromeos"]
565 }, 580 },
566 "webview": [{ 581 "webview": [{
567 "channel": "stable", 582 "channel": "stable",
568 "extension_types": ["platform_app"] 583 "extension_types": ["platform_app"]
569 }, { 584 }, {
570 "channel": "stable", 585 "channel": "stable",
571 "extension_types": ["extension"], 586 "extension_types": ["extension"],
572 "whitelist": [ 587 "whitelist": [
573 "63ED55E43214C211F82122ED56407FF1A807F2A3", // http://crbug.com/500075 588 "63ED55E43214C211F82122ED56407FF1A807F2A3", // http://crbug.com/500075
574 "226CF815E39A363090A1E547D53063472B8279FA" // http://crbug.com/500075 589 "226CF815E39A363090A1E547D53063472B8279FA" // http://crbug.com/500075
575 ] 590 ]
576 }], 591 }],
577 "webRequest": { 592 "webRequest": {
578 "channel": "stable", 593 "channel": "stable",
579 "extension_types": ["extension", "legacy_packaged_app"] 594 "extension_types": ["extension", "legacy_packaged_app"]
580 }, 595 },
581 "webRequestBlocking": { 596 "webRequestBlocking": {
582 "channel": "stable", 597 "channel": "stable",
583 "extension_types": ["extension", "legacy_packaged_app"] 598 "extension_types": ["extension", "legacy_packaged_app"]
584 } 599 }
585 } 600 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698