summaryrefslogtreecommitdiffstats
path: root/chrome/browser/sandbox_policy.h
diff options
context:
space:
mode:
Diffstat (limited to 'chrome/browser/sandbox_policy.h')
-rw-r--r--chrome/browser/sandbox_policy.h69
1 files changed, 69 insertions, 0 deletions
diff --git a/chrome/browser/sandbox_policy.h b/chrome/browser/sandbox_policy.h
new file mode 100644
index 0000000..67c9159
--- /dev/null
+++ b/chrome/browser/sandbox_policy.h
@@ -0,0 +1,69 @@
+// Copyright 2008, Google Inc.
+// All rights reserved.
+//
+// Redistribution and use in source and binary forms, with or without
+// modification, are permitted provided that the following conditions are
+// met:
+//
+// * Redistributions of source code must retain the above copyright
+// notice, this list of conditions and the following disclaimer.
+// * Redistributions in binary form must reproduce the above
+// copyright notice, this list of conditions and the following disclaimer
+// in the documentation and/or other materials provided with the
+// distribution.
+// * Neither the name of Google Inc. nor the names of its
+// contributors may be used to endorse or promote products derived from
+// this software without specific prior written permission.
+//
+// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+#ifndef CHROME_BROWSER_SANDBOX_POLICY_H__
+#define CHROME_BROWSER_SANDBOX_POLICY_H__
+
+#include <string>
+#include "sandbox/src/sandbox.h"
+#include "webkit/activex_shim/activex_shared.h"
+
+// Adds the generic policy rules to a sandbox TargetPolicy.
+bool AddGenericPolicy(sandbox::TargetPolicy* policy);
+
+// Adds the custom policy rules for a given plugin. If dll is activex-shim,
+// then clsid is the clsid of ActiveX control. Otherwise clsid is ignored.
+// |trusted_plugins| contains the comma separate list of plugins that should
+// not be sandboxed. The plugin in the list can be either the plugin dll name
+// of the class id if it's an ActiveX.
+bool AddPolicyForPlugin(const std::wstring &plugin_dll,
+ const std::string &activex_clsid,
+ const std::wstring &trusted_plugins,
+ sandbox::TargetPolicy* policy);
+
+enum PluginPolicyCategory {
+ PLUGIN_GROUP_TRUSTED,
+ PLUGIN_GROUP_UNTRUSTED,
+};
+
+// Returns the policy category for the plugin dll.
+PluginPolicyCategory GetPolicyCategoryForPlugin(
+ const std::wstring& plugin_dll,
+ const std::wstring& activex_clsid,
+ const std::wstring& trusted_plugins);
+
+// Creates a sandbox without any restriction.
+bool ApplyPolicyForTrustedPlugin(sandbox::TargetPolicy* policy);
+
+// Creates a sandbox with the plugin running in a restricted environment.
+// Only the "Users" and "Everyone" groups are enabled in the token. The User SID
+// is disabled.
+bool ApplyPolicyForUntrustedPlugin(sandbox::TargetPolicy* policy);
+
+#endif // CHROME_BROWSER_SANDBOX_POLICY_H__