summaryrefslogtreecommitdiffstats
path: root/content/browser/security_exploit_browsertest.cc
diff options
context:
space:
mode:
authorasargent <asargent@chromium.org>2014-12-04 15:26:22 -0800
committerCommit bot <commit-bot@chromium.org>2014-12-04 23:26:49 +0000
commit59246ff8886fe98b28405a8e358982a6dc0a585e (patch)
tree6491926e660c7fdad923c247d6b6f9b896ffbdb4 /content/browser/security_exploit_browsertest.cc
parent1dd7d968e3f77ec0c90a80c944cd1ec4da8aab11 (diff)
downloadchromium_src-59246ff8886fe98b28405a8e358982a6dc0a585e.zip
chromium_src-59246ff8886fe98b28405a8e358982a6dc0a585e.tar.gz
chromium_src-59246ff8886fe98b28405a8e358982a6dc0a585e.tar.bz2
Add experimental API for packaged apps to use webstore inline install
This adds a whitelist controlled api for initiating the same webstore inline install flow that we allow from web pages, but omits the domain verification check (since the origin is a chrome-extension:// url, not an http(s) one). See this url for how inline install works for web pages: https://developer.chrome.com/webstore/inline_installation We'd like to be able to make this API available publicly, but would like to get some more security team input and have an API review discussion to think through how we might also offer something like the chrome.app.isInstalled functionality for querying if items are already installed. FYI, test files for this patch were moved to https://codereview.chromium.org/771733002/ BUG=426912 Review URL: https://codereview.chromium.org/698373004 Cr-Commit-Position: refs/heads/master@{#306930}
Diffstat (limited to 'content/browser/security_exploit_browsertest.cc')
0 files changed, 0 insertions, 0 deletions