diff options
author | jam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-05-15 20:49:52 +0000 |
---|---|---|
committer | jam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-05-15 20:49:52 +0000 |
commit | a471822a16e726a817c95c625d20ccada8da36e0 (patch) | |
tree | 1bbc559fa2525b29fc3a5d2a8480e52f88d9b2fc /chrome/browser/child_process_security_policy.h | |
parent | e445916dc8b2e7ea67c42f910316ed1964573c81 (diff) | |
download | chromium_src-a471822a16e726a817c95c625d20ccada8da36e0.zip chromium_src-a471822a16e726a817c95c625d20ccada8da36e0.tar.gz chromium_src-a471822a16e726a817c95c625d20ccada8da36e0.tar.bz2 |
Rename RendererSecurityPolicy and move it to browser\. No code change.
Review URL: http://codereview.chromium.org/113475
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@16181 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/child_process_security_policy.h')
-rw-r--r-- | chrome/browser/child_process_security_policy.h | 127 |
1 files changed, 127 insertions, 0 deletions
diff --git a/chrome/browser/child_process_security_policy.h b/chrome/browser/child_process_security_policy.h new file mode 100644 index 0000000..9b675cf --- /dev/null +++ b/chrome/browser/child_process_security_policy.h @@ -0,0 +1,127 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef CHROME_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ +#define CHROME_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ + +#include <string> +#include <map> +#include <set> + +#include "base/basictypes.h" +#include "base/file_path.h" +#include "base/lock.h" +#include "base/singleton.h" + +class FilePath; +class GURL; + +// The ChildProcessSecurityPolicy class is used to grant and revoke security +// capabilities for renderers. For example, it restricts whether a renderer +// is permmitted to loaded file:// URLs based on whether the renderer has ever +// been commanded to load file:// URLs by the browser. +// +// ChildProcessSecurityPolicy is a singleton that may be used on any thread. +// +class ChildProcessSecurityPolicy { + public: + // Object can only be created through GetInstance() so the constructor is + // private. + ~ChildProcessSecurityPolicy(); + + // There is one global ChildProcessSecurityPolicy object for the entire browser + // processes. The object returned by this method may be accessed on any + // thread. + static ChildProcessSecurityPolicy* GetInstance(); + + // Web-safe schemes can be requested by any renderer. Once a web-safe scheme + // has been registered, any renderer processes can request URLs with that + // scheme. There is no mechanism for revoking web-safe schemes. + void RegisterWebSafeScheme(const std::string& scheme); + + // Returns true iff |scheme| has been registered as a web-safe scheme. + bool IsWebSafeScheme(const std::string& scheme); + + // Pseudo schemes are treated differently than other schemes because they + // cannot be requested like normal URLs. There is no mechanism for revoking + // pseudo schemes. + void RegisterPseudoScheme(const std::string& scheme); + + // Returns true iff |scheme| has been registered as pseudo scheme. + bool IsPseudoScheme(const std::string& scheme); + + // Upon creation, render processes should register themselves by calling this + // this method exactly once. + void Add(int renderer_id); + + // Upon destruction, render processess should unregister themselves by caling + // this method exactly once. + void Remove(int renderer_id); + + // Whenever the browser processes commands the renderer to request a URL, it + // should call this method to grant the renderer process the capability to + // request the URL. + void GrantRequestURL(int renderer_id, const GURL& url); + + // Whenever the user picks a file from a <input type="file"> element, the + // browser should call this function to grant the renderer the capability to + // upload the file to the web. + void GrantUploadFile(int renderer_id, const FilePath& file); + + // Whenever the browser processes commands the renderer to run web inspector, + // it should call this method to grant the renderer process the capability to + // run the inspector. + void GrantInspectElement(int renderer_id); + + // Grant this renderer the ability to use DOM UI Bindings. + void GrantDOMUIBindings(int renderer_id); + + // Before servicing a renderer's request for a URL, the browser should call + // this method to determine whether the renderer has the capability to + // request the URL. + bool CanRequestURL(int renderer_id, const GURL& url); + + // Before servicing a renderer's request to upload a file to the web, the + // browser should call this method to determine whether the renderer has the + // capability to upload the requested file. + bool CanUploadFile(int renderer_id, const FilePath& file); + + // Returns true of the specified renderer_id has been granted DOMUIBindings. + // The browser should check this property before assuming the renderer is + // allowed to use DOMUIBindings. + bool HasDOMUIBindings(int renderer_id); + + private: + class SecurityState; + + typedef std::set<std::string> SchemeSet; + typedef std::map<int, SecurityState*> SecurityStateMap; + + // Obtain an instance of ChildProcessSecurityPolicy via GetInstance(). + ChildProcessSecurityPolicy(); + friend struct DefaultSingletonTraits<ChildProcessSecurityPolicy>; + + // You must acquire this lock before reading or writing any members of this + // class. You must not block while holding this lock. + Lock lock_; + + // These schemes are white-listed for all renderers. This set is protected + // by |lock_|. + SchemeSet web_safe_schemes_; + + // These schemes do not actually represent retrievable URLs. For example, + // the the URLs in the "about" scheme are aliases to other URLs. This set is + // protected by |lock_|. + SchemeSet pseudo_schemes_; + + // This map holds a SecurityState for each renderer process. The key for the + // map is the ID of the RenderProcessHost. The SecurityState objects are + // owned by this object and are protected by |lock_|. References to them must + // not escape this class. + SecurityStateMap security_state_; + + DISALLOW_COPY_AND_ASSIGN(ChildProcessSecurityPolicy); +}; + +#endif // CHROME_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ |