summaryrefslogtreecommitdiffstats
path: root/content/browser/child_process_security_policy.h
diff options
context:
space:
mode:
authorjam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-02-22 22:58:22 +0000
committerjam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-02-22 22:58:22 +0000
commitdf8e899b92196a772511a165130f1fe08e199cb8 (patch)
tree893ca8821adc6165823f3c9a10dd0edfeb2e49e1 /content/browser/child_process_security_policy.h
parent5b77de94051020ca0aef549dee0cb33f7a737d88 (diff)
downloadchromium_src-df8e899b92196a772511a165130f1fe08e199cb8.zip
chromium_src-df8e899b92196a772511a165130f1fe08e199cb8.tar.gz
chromium_src-df8e899b92196a772511a165130f1fe08e199cb8.tar.bz2
Move core pieces of chrome\browser. I've only gone up to "g", will do the rest in another cl.
TBR=avi Review URL: http://codereview.chromium.org/6538100 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@75652 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'content/browser/child_process_security_policy.h')
-rw-r--r--content/browser/child_process_security_policy.h164
1 files changed, 164 insertions, 0 deletions
diff --git a/content/browser/child_process_security_policy.h b/content/browser/child_process_security_policy.h
new file mode 100644
index 0000000..2f2df5e
--- /dev/null
+++ b/content/browser/child_process_security_policy.h
@@ -0,0 +1,164 @@
+// Copyright (c) 2011 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef CONTENT_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_
+#define CONTENT_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_
+
+#pragma once
+
+#include <map>
+#include <set>
+#include <string>
+
+#include "base/basictypes.h"
+#include "base/gtest_prod_util.h"
+#include "base/singleton.h"
+#include "base/synchronization/lock.h"
+
+class FilePath;
+class GURL;
+
+// The ChildProcessSecurityPolicy class is used to grant and revoke security
+// capabilities for child porcesses. For example, it restricts whether a child
+// process is permmitted to loaded file:// URLs based on whether the process
+// has ever been commanded to load file:// URLs by the browser.
+//
+// ChildProcessSecurityPolicy is a singleton that may be used on any thread.
+//
+class ChildProcessSecurityPolicy {
+ public:
+ // Object can only be created through GetInstance() so the constructor is
+ // private.
+ ~ChildProcessSecurityPolicy();
+
+ // There is one global ChildProcessSecurityPolicy object for the entire
+ // browser process. The object returned by this method may be accessed on
+ // any thread.
+ static ChildProcessSecurityPolicy* GetInstance();
+
+ // Web-safe schemes can be requested by any child process. Once a web-safe
+ // scheme has been registered, any child process can request URLs with
+ // that scheme. There is no mechanism for revoking web-safe schemes.
+ void RegisterWebSafeScheme(const std::string& scheme);
+
+ // Returns true iff |scheme| has been registered as a web-safe scheme.
+ bool IsWebSafeScheme(const std::string& scheme);
+
+ // Pseudo schemes are treated differently than other schemes because they
+ // cannot be requested like normal URLs. There is no mechanism for revoking
+ // pseudo schemes.
+ void RegisterPseudoScheme(const std::string& scheme);
+
+ // Returns true iff |scheme| has been registered as pseudo scheme.
+ bool IsPseudoScheme(const std::string& scheme);
+
+ // Upon creation, child processes should register themselves by calling this
+ // this method exactly once.
+ void Add(int child_id);
+
+ // Upon destruction, child processess should unregister themselves by caling
+ // this method exactly once.
+ void Remove(int child_id);
+
+ // Whenever the browser processes commands the child process to request a URL,
+ // it should call this method to grant the child process the capability to
+ // request the URL.
+ void GrantRequestURL(int child_id, const GURL& url);
+
+ // Whenever the user picks a file from a <input type="file"> element, the
+ // browser should call this function to grant the child process the capability
+ // to upload the file to the web.
+ void GrantReadFile(int child_id, const FilePath& file);
+
+ // Grants certain permissions to a file. |permissions| must be a bit-set of
+ // base::PlatformFileFlags.
+ void GrantPermissionsForFile(int child_id,
+ const FilePath& file,
+ int permissions);
+
+ // Revokes all permissions granted to the given file.
+ void RevokeAllPermissionsForFile(int child_id, const FilePath& file);
+
+ // Grants the child process the capability to access URLs of the provided
+ // scheme.
+ void GrantScheme(int child_id, const std::string& scheme);
+
+ // Grant the child process the ability to use Web UI Bindings.
+ void GrantWebUIBindings(int child_id);
+
+ // Grant the child process the ability to use extension Bindings.
+ void GrantExtensionBindings(int child_id);
+
+ // Grant the child process the ability to read raw cookies.
+ void GrantReadRawCookies(int child_id);
+
+ // Revoke read raw cookies permission.
+ void RevokeReadRawCookies(int child_id);
+
+ // Before servicing a child process's request for a URL, the browser should
+ // call this method to determine whether the process has the capability to
+ // request the URL.
+ bool CanRequestURL(int child_id, const GURL& url);
+
+ // Before servicing a child process's request to upload a file to the web, the
+ // browser should call this method to determine whether the process has the
+ // capability to upload the requested file.
+ bool CanReadFile(int child_id, const FilePath& file);
+
+ // Determines if certain permissions were granted for a file. |permissions|
+ // must be a bit-set of base::PlatformFileFlags.
+ bool HasPermissionsForFile(int child_id,
+ const FilePath& file,
+ int permissions);
+
+ // Returns true if the specified child_id has been granted WebUIBindings.
+ // The browser should check this property before assuming the child process is
+ // allowed to use WebUIBindings.
+ bool HasWebUIBindings(int child_id);
+
+ // Returns true if the specified child_id has been granted WebUIBindings.
+ // The browser should check this property before assuming the child process is
+ // allowed to use extension bindings.
+ bool HasExtensionBindings(int child_id);
+
+ // Returns true if the specified child_id has been granted ReadRawCookies.
+ bool CanReadRawCookies(int child_id);
+
+ private:
+ friend class ChildProcessSecurityPolicyInProcessBrowserTest;
+ FRIEND_TEST_ALL_PREFIXES(ChildProcessSecurityPolicyInProcessBrowserTest,
+ NoLeak);
+
+ class SecurityState;
+
+ typedef std::set<std::string> SchemeSet;
+ typedef std::map<int, SecurityState*> SecurityStateMap;
+
+ // Obtain an instance of ChildProcessSecurityPolicy via GetInstance().
+ ChildProcessSecurityPolicy();
+ friend struct DefaultSingletonTraits<ChildProcessSecurityPolicy>;
+
+ // You must acquire this lock before reading or writing any members of this
+ // class. You must not block while holding this lock.
+ base::Lock lock_;
+
+ // These schemes are white-listed for all child processes. This set is
+ // protected by |lock_|.
+ SchemeSet web_safe_schemes_;
+
+ // These schemes do not actually represent retrievable URLs. For example,
+ // the the URLs in the "about" scheme are aliases to other URLs. This set is
+ // protected by |lock_|.
+ SchemeSet pseudo_schemes_;
+
+ // This map holds a SecurityState for each child process. The key for the
+ // map is the ID of the ChildProcessHost. The SecurityState objects are
+ // owned by this object and are protected by |lock_|. References to them must
+ // not escape this class.
+ SecurityStateMap security_state_;
+
+ DISALLOW_COPY_AND_ASSIGN(ChildProcessSecurityPolicy);
+};
+
+#endif // CONTENT_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_