Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(449)

Side by Side Diff: extensions/common/api/_permission_features.json

Issue 2860203002: MediaPerceptionPrivate IDL and skeleton. (Closed)
Patch Set: Addressing more comments. Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This features file defines permissions for extension APIs implemented 5 // This features file defines permissions for extension APIs implemented
6 // under src/extensions. 6 // under src/extensions.
7 // See chrome/common/extensions/api/_features.md to understand this file, as 7 // See chrome/common/extensions/api/_features.md to understand this file, as
8 // well as feature.h, simple_feature.h, and feature_provider.h. 8 // well as feature.h, simple_feature.h, and feature_provider.h.
9 9
10 // If you add a new platform_app permission please update the "stubs_app" test: 10 // If you add a new platform_app permission please update the "stubs_app" test:
(...skipping 231 matching lines...) Expand 10 before | Expand all | Expand 10 after
242 "D4EFCCC0CC612380762758BB96C7997224BD6395", // http://crbug.com/710541 242 "D4EFCCC0CC612380762758BB96C7997224BD6395", // http://crbug.com/710541
243 "4839A26B29CD1BD021B2E126EF6D28C9CB84018B", // http://crbug.com/710541 243 "4839A26B29CD1BD021B2E126EF6D28C9CB84018B", // http://crbug.com/710541
244 "8F44FBB4474CCDF23450B166C9E83E85BD03AE24" // http://crbug.com/710541 244 "8F44FBB4474CCDF23450B166C9E83E85BD03AE24" // http://crbug.com/710541
245 ] 245 ]
246 } 246 }
247 ], 247 ],
248 "idle": { 248 "idle": {
249 "channel": "stable", 249 "channel": "stable",
250 "extension_types": ["extension", "legacy_packaged_app", "platform_app"] 250 "extension_types": ["extension", "legacy_packaged_app", "platform_app"]
251 }, 251 },
252 "mediaPerceptionPrivate": {
253 "channel": "trunk",
254 "extension_types": ["extension", "legacy_packaged_app", "platform_app"],
tbarzic 2017/05/09 21:03:11 restrict this to platform apps and add "platforms"
Luke Sorenson 2017/05/10 17:33:26 Done on platforms. However, we want to be able to
tbarzic 2017/05/10 23:45:53 Looking at the screen shot, it looks like a platfo
Luke Sorenson 2017/05/11 16:18:21 Done.
255 "whitelist": [
256 "E703483CEF33DEC18B4B6DD84B5C776FB9182BDB", // Stable external hotrod app
257 "A3BC37E2148AC4E99BE4B16AF9D42DD1E592BBBE", // Beta external hotrod app
258 "1C93BD3CF875F4A73C0B2A163BB8FBDA8B8B3D80", // Alpha external hotrod app
259 "307E96539209F95A1A8740C713E6998A73657D96", // Dev external hotrod app
260 "4F25792AF1AA7483936DE29C07806F203C7170A0", // Stable internal hotrod app
261 "BD8781D757D830FC2E85470A1B6E8A718B7EE0D9", // Beta internal hotrod app
262 "4AC2B6C63C6480D150DFDA13E4A5956EB1D0DDBB", // Alpha internal hotrod app
263 "81986D4F846CEDDDB962643FA501D1780DD441BB" // Dev internal hotrod app
264 ]
265 },
252 "metricsPrivate": { 266 "metricsPrivate": {
253 "channel": "stable", 267 "channel": "stable",
254 "extension_types": ["extension", "legacy_packaged_app", "platform_app"], 268 "extension_types": ["extension", "legacy_packaged_app", "platform_app"],
255 "whitelist": [ 269 "whitelist": [
256 // The file manager and Google Now are component extensions, and they can 270 // The file manager and Google Now are component extensions, and they can
257 // currently use whitelisted interfaces without being on the corresponding 271 // currently use whitelisted interfaces without being on the corresponding
258 // whitelist. 272 // whitelist.
259 // Adding it to this whitelist documents their dependency, however, and 273 // Adding it to this whitelist documents their dependency, however, and
260 // also doesn't hurt anything. 274 // also doesn't hurt anything.
261 "A948368FC53BE437A55FEB414106E207925482F5", // File manager 275 "A948368FC53BE437A55FEB414106E207925482F5", // File manager
(...skipping 285 matching lines...) Expand 10 before | Expand all | Expand 10 after
547 "06BE211D5F014BAB34BC22D9DDA09C63A81D828E", // Official XKB virtual kbd 561 "06BE211D5F014BAB34BC22D9DDA09C63A81D828E", // Official XKB virtual kbd
548 "CFBF7EE448FA48960FFDA7CEB30F7A21B26AA981", // Official m17n virtual kbd 562 "CFBF7EE448FA48960FFDA7CEB30F7A21B26AA981", // Official m17n virtual kbd
549 "F94EE6AB36D6C6588670B2B01EB65212D9C64E33", // Public XKB virtual kbd 563 "F94EE6AB36D6C6588670B2B01EB65212D9C64E33", // Public XKB virtual kbd
550 "3E03D9B67FDD31B2438D1CF5070573415DCB3CBA", // Public m17n virtual kbd 564 "3E03D9B67FDD31B2438D1CF5070573415DCB3CBA", // Public m17n virtual kbd
551 "E703483CEF33DEC18B4B6DD84B5C776FB9182BDB", // Stable external hotrod app 565 "E703483CEF33DEC18B4B6DD84B5C776FB9182BDB", // Stable external hotrod app
552 "A3BC37E2148AC4E99BE4B16AF9D42DD1E592BBBE", // Beta external hotrod app 566 "A3BC37E2148AC4E99BE4B16AF9D42DD1E592BBBE", // Beta external hotrod app
553 "1C93BD3CF875F4A73C0B2A163BB8FBDA8B8B3D80", // Alpha external hotrod app 567 "1C93BD3CF875F4A73C0B2A163BB8FBDA8B8B3D80", // Alpha external hotrod app
554 "307E96539209F95A1A8740C713E6998A73657D96", // Dev external hotrod app 568 "307E96539209F95A1A8740C713E6998A73657D96", // Dev external hotrod app
555 "4F25792AF1AA7483936DE29C07806F203C7170A0", // Stable internal hotrod app 569 "4F25792AF1AA7483936DE29C07806F203C7170A0", // Stable internal hotrod app
556 "BD8781D757D830FC2E85470A1B6E8A718B7EE0D9", // Beta internal hotrod app 570 "BD8781D757D830FC2E85470A1B6E8A718B7EE0D9", // Beta internal hotrod app
557 "4AC2B6C63C6480D150DFDA13E4A5956EB1D0DDBB", // Alpha external hotrod app 571 "4AC2B6C63C6480D150DFDA13E4A5956EB1D0DDBB", // Alpha internal hotrod app
558 "81986D4F846CEDDDB962643FA501D1780DD441BB" // Dev external hotrod app 572 "81986D4F846CEDDDB962643FA501D1780DD441BB" // Dev internal hotrod app
559 ] 573 ]
560 }, 574 },
561 "vpnProvider": { 575 "vpnProvider": {
562 "channel": "stable", 576 "channel": "stable",
563 "extension_types": ["extension", "platform_app"], 577 "extension_types": ["extension", "platform_app"],
564 "platforms": ["chromeos"] 578 "platforms": ["chromeos"]
565 }, 579 },
566 "webview": [{ 580 "webview": [{
567 "channel": "stable", 581 "channel": "stable",
568 "extension_types": ["platform_app"] 582 "extension_types": ["platform_app"]
569 }, { 583 }, {
570 "channel": "stable", 584 "channel": "stable",
571 "extension_types": ["extension"], 585 "extension_types": ["extension"],
572 "whitelist": [ 586 "whitelist": [
573 "63ED55E43214C211F82122ED56407FF1A807F2A3", // http://crbug.com/500075 587 "63ED55E43214C211F82122ED56407FF1A807F2A3", // http://crbug.com/500075
574 "226CF815E39A363090A1E547D53063472B8279FA" // http://crbug.com/500075 588 "226CF815E39A363090A1E547D53063472B8279FA" // http://crbug.com/500075
575 ] 589 ]
576 }], 590 }],
577 "webRequest": { 591 "webRequest": {
578 "channel": "stable", 592 "channel": "stable",
579 "extension_types": ["extension", "legacy_packaged_app"] 593 "extension_types": ["extension", "legacy_packaged_app"]
580 }, 594 },
581 "webRequestBlocking": { 595 "webRequestBlocking": {
582 "channel": "stable", 596 "channel": "stable",
583 "extension_types": ["extension", "legacy_packaged_app"] 597 "extension_types": ["extension", "legacy_packaged_app"]
584 } 598 }
585 } 599 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698