forked from chromium/chromium
-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathOWNERS
64 lines (52 loc) · 2.78 KB
/
OWNERS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
# For Android
boliu@chromium.org
# These are for the common case of adding or renaming files. If you're doing
# structural changes, please get a review from a reviewer in this file.
per-file BUILD.gn=*
# For security review.
per-file child_process_security_policy_impl.*=set noparent
per-file child_process_security_policy_impl.*=file://content/browser/SITE_ISOLATION_OWNERS
per-file child_process_security_policy_unittest.cc=set noparent
per-file child_process_security_policy_unittest.cc=file://content/browser/SITE_ISOLATION_OWNERS
per-file browser_interface_binders.*=set noparent
per-file browser_interface_binders.*=file://ipc/SECURITY_OWNERS
per-file mojo_binder_policy_map_impl.*=set noparent
per-file mojo_binder_policy_map_impl.*=file://ipc/SECURITY_OWNERS
per-file ppapi_plugin_process_host_receiver_bindings.*=set noparent
per-file ppapi_plugin_process_host_receiver_bindings.*=file://ipc/SECURITY_OWNERS
per-file browser_child_process_host_impl_receiver_bindings.*=set noparent
per-file browser_child_process_host_impl_receiver_bindings.*=file://ipc/SECURITY_OWNERS
per-file utility_process_host_receiver_bindings.*=set noparent
per-file utility_process_host_receiver_bindings.*=file://ipc/SECURITY_OWNERS
per-file host_zoom_*=wjmaclean@chromium.org
per-file site_per_process_*=kenrb@chromium.org
# Mac Sandbox parameters and unit tests.
per-file sandbox_parameters_mac.*=file://sandbox/mac/OWNERS
per-file sandbox_mac_unittest.*=file://sandbox/mac/OWNERS
# Linux sandboxing.
per-file sandbox_host_linux.*=file://sandbox/linux/OWNERS
per-file sandbox_ipc_linux.*=file://sandbox/linux/OWNERS
per-file utility_process_sandbox_browsertest.cc=file://sandbox/linux/OWNERS
# Utility sandbox delegate requires security review.
per-file utility_sandbox_delegate.*=set noparent
per-file utility_sandbox_delegate.*=file://ipc/SECURITY_OWNERS
per-file utility_sandbox_delegate_win.*=set noparent
per-file utility_sandbox_delegate_win.*=file://sandbox/win/OWNERS
# BackForwardCache
per-file back_forward_cache_browsertest.cc=arthursonzogni@chromium.org
per-file back_forward_cache_browsertest.cc=altimin@chromium.org
per-file back_forward_cache_browsertest.cc=rakina@chromium.org
# Storage API dependencies.
per-file storage_partition*=file://storage/OWNERS
per-file storage_service*=file://components/services/storage/OWNERS
# Variations.
per-file field_trial_synchronizer.*=file://base/metrics/OWNERS
# Cross origin opener policy.
per-file cross_origin_opener_policy*=ahemery@chromium.org
per-file cross_origin_opener_policy*=pmeuleman@chromium.org
# Network Service.
per-file network_service_*=file://services/network/OWNERS
per-file network_context_*=file://services/network/OWNERS
# For threading (BrowserThread, BrowserMainLoop, etc.)
per-file *browser_main_loop*=gab@chromium.org
per-file *browser_thread*=gab@chromium.org