summaryrefslogtreecommitdiffstats
path: root/chrome/browser/extensions/api/webview
Commit message (Collapse)AuthorAgeFilesLines
* Add OWNERS for a bunch more extension APIs: alarms, bluetooth, context_menus,kalman@chromium.org2013-08-151-0/+2
| | | | | | | | | | | extension_action, messaging, missing, module, serial, session_restore, socket, storage, system_indicator, tab_capture, tabs, and webview. NOTRY=true Review URL: https://chromiumcodereview.appspot.com/23164010 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@217797 0039d316-1c4b-4281-b951-d872f2087c98
* <webview>: Refactor Permission API to chromefsamuel@chromium.org2013-08-122-8/+53
| | | | | | | | | | | BUG=166165 Test=WebViewTest.*, WebViewInteractiveTest.* TBR=cdn@chromium.org for removing IPCs in browser_plugin_messages.h NOTRY=true, previous patch worked, just merging. Review URL: https://chromiumcodereview.appspot.com/21297005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@217057 0039d316-1c4b-4281-b951-d872f2087c98
* <webview>: Move stop/reload/terminate to chromefsamuel@chromium.org2013-07-112-0/+105
| | | | | | | | | BUG=166165 Test=WebViewTest.Shim_* Review URL: https://chromiumcodereview.appspot.com/18176009 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@211020 0039d316-1c4b-4281-b951-d872f2087c98
* Refactor AdViewGuest/WebViewGuest to GuestViewfsamuel@chromium.org2013-06-271-1/+1
| | | | | | | | | | This enables more code reuse, and simpler lookup in subsequent CLs. BUG=166165 Review URL: https://chromiumcodereview.appspot.com/17611004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@209017 0039d316-1c4b-4281-b951-d872f2087c98
* <webview>: Move back, forward, canGoBack, canGoForward, go from content to ↵fsamuel@chromium.org2013-06-262-0/+58
| | | | | | | | | | | chrome BUG=166165 Test=WebViewTest.Navigation Review URL: https://chromiumcodereview.appspot.com/17447005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@208642 0039d316-1c4b-4281-b951-d872f2087c98
* <webview>: Partially migrate loadcommit event from content to chromefsamuel@chromium.org2013-06-251-1/+1
| | | | | | | | | | | | | All the pieces are now in place for upstreaming the big content->chrome <webview> refactor. This first patch puts in the first set of pieces in place for migrating loadcommit to chrome. BUG=166165 Test=WebViewTest.* Review URL: https://chromiumcodereview.appspot.com/17165004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@208542 0039d316-1c4b-4281-b951-d872f2087c98
* Convert most of extensions and some other random stuff to using the base ↵brettw@chromium.org2013-06-212-3/+3
| | | | | | | | | | namespace for Values. R=finnur@chromium.org Review URL: https://codereview.chromium.org/16915006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@207937 0039d316-1c4b-4281-b951-d872f2087c98
* <webview>: Key WebViewGuest on embedder_process_id instead of profile.fsamuel@chromium.org2013-06-081-2/+3
| | | | | | | | | | | | To ensure that one compromised embedder cannot access the <webview> of another embedder, we key WebViewGuest on the embedder_process_id, instead of the profile. BUG=247480 Review URL: https://chromiumcodereview.appspot.com/15848018 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@204988 0039d316-1c4b-4281-b951-d872f2087c98
* <webview> executeScript should use instance IDfsamuel@chromium.org2013-06-052-18/+10
| | | | | | | | | | | | | Currently we trust the embedder to give the browser process the routing ID and process ID of the guest it would like to inject script into. This is potentially unsafe. We should instead use the guest instance ID and verify that the given embedder can access the guest with the given instance ID. BUG=246652 Review URL: https://chromiumcodereview.appspot.com/16361007 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@204311 0039d316-1c4b-4281-b951-d872f2087c98
* <webview>: More UMA statsfsamuel@chromium.org2013-05-151-0/+2
| | | | | | | | | | Track usage of <webview> executeScript, permission requests, and New Window API. BUG=239802 Review URL: https://chromiumcodereview.appspot.com/14642026 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@200218 0039d316-1c4b-4281-b951-d872f2087c98
* <webview>: Implement insertCSSfsamuel@chromium.org2013-05-141-1/+0
| | | | | | | | | BUG=239971 Test=WebViewInteractiveTest.ExecuteCode Review URL: https://chromiumcodereview.appspot.com/14617021 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@199894 0039d316-1c4b-4281-b951-d872f2087c98
* Refactor chrome.(tabs | webview).executeScript to share more codefsamuel@chromium.org2013-05-132-72/+91
| | | | | | | | | | | | | This patch also trivially adds chrome.webview.insertCSS. webview.insertCSS will be exposed in a subsequent CL. BUG=239968, 239688 Test=ExecuteScriptApiTest.*, WebViewTest.Shim Review URL: https://chromiumcodereview.appspot.com/15007010 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@199653 0039d316-1c4b-4281-b951-d872f2087c98
* Clean up InjectDetails param of webview.executeScript json schema.lazyboy@chromium.org2013-03-251-0/+1
| | | | | | | | | | BUG=171726 TEST=WebViewTest.Shim.webViewExecuteScript still passes. Review URL: https://chromiumcodereview.appspot.com/12485012 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@190459 0039d316-1c4b-4281-b951-d872f2087c98
* Remove ImageLoadingTracker class, as it is not used anymore.rpaquay@chromium.org2013-02-121-0/+1
| | | | | | | | | | | | | * Remove related methods in Extension: Set/GetCachedImage * Remove related unit tests * Update all comments mentioning ImageLoadingTracker to mention ImageLoader instead BUG=163929 TBR=sky@chromium.org (for mechanical changes in chrome/.) Review URL: https://chromiumcodereview.appspot.com/12213093 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182039 0039d316-1c4b-4281-b951-d872f2087c98
* <webview>: Implement ExecuteScriptfsamuel@chromium.org2013-01-242-0/+119
This patch implements executeScript for <webview> by using extensions bindings for forwarding requests to the browser process from the app process. The <webview> shim passes the ProcessId and the RouteID of the guest process to the ExecuteScriptFunction object in the browser process. From there, ExecuteScriptFunction grabs the guest web contents, and creates a ScriptExecutor object attached to the guest WebContents. The callback is supported trivially through the extension bindings. When a new guest web contents is created, we inject the Chrome App's extension information into the guest process, so that executeScript knows to bypass permission requests when attempting to execute script within the guest (as suggested by mpcomplete@). BUG=153530 Test=WebViewTest.Shim, webViewExecuteScript Review URL: https://codereview.chromium.org/11968054 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@178520 0039d316-1c4b-4281-b951-d872f2087c98