diff options
author | asargent <asargent@chromium.org> | 2014-12-04 15:26:22 -0800 |
---|---|---|
committer | Commit bot <commit-bot@chromium.org> | 2014-12-04 23:26:49 +0000 |
commit | 59246ff8886fe98b28405a8e358982a6dc0a585e (patch) | |
tree | 6491926e660c7fdad923c247d6b6f9b896ffbdb4 /content/browser/security_exploit_browsertest.cc | |
parent | 1dd7d968e3f77ec0c90a80c944cd1ec4da8aab11 (diff) | |
download | chromium_src-59246ff8886fe98b28405a8e358982a6dc0a585e.zip chromium_src-59246ff8886fe98b28405a8e358982a6dc0a585e.tar.gz chromium_src-59246ff8886fe98b28405a8e358982a6dc0a585e.tar.bz2 |
Add experimental API for packaged apps to use webstore inline install
This adds a whitelist controlled api for initiating the same webstore inline install flow that we allow from web pages, but omits the domain verification check (since the origin is a chrome-extension:// url, not an http(s) one). See this url for how inline install works for web pages: https://developer.chrome.com/webstore/inline_installation
We'd like to be able to make this API available publicly, but would like to get some more security team input and have an API review discussion to think through how we might also offer something like the chrome.app.isInstalled functionality for querying if items are already installed.
FYI, test files for this patch were moved to https://codereview.chromium.org/771733002/
BUG=426912
Review URL: https://codereview.chromium.org/698373004
Cr-Commit-Position: refs/heads/master@{#306930}
Diffstat (limited to 'content/browser/security_exploit_browsertest.cc')
0 files changed, 0 insertions, 0 deletions