blob: 3beafdd3aec73be64a0370b9f4f31c2f17410eb0 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
|
// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CHROME_BROWSER_SANDBOX_POLICY_H_
#define CHROME_BROWSER_SANDBOX_POLICY_H_
#include <string>
#include "sandbox/src/sandbox.h"
#include "webkit/activex_shim/activex_shared.h"
// Adds the generic policy rules to a sandbox TargetPolicy.
bool AddGenericPolicy(sandbox::TargetPolicy* policy);
// Adds policy rules for unloaded the known dlls that cause chrome to crash.
bool AddDllEvictionPolicy(sandbox::TargetPolicy* policy);
// Adds policy rules for running Gears in the renderer process.
bool AddPolicyForGearsInRenderer(sandbox::TargetPolicy* policy);
// Adds the custom policy rules for a given plugin. If dll is activex-shim,
// then clsid is the clsid of ActiveX control. Otherwise clsid is ignored.
// |trusted_plugins| contains the comma separate list of plugins that should
// not be sandboxed. The plugin in the list can be either the plugin dll name
// of the class id if it's an ActiveX.
bool AddPolicyForPlugin(const std::wstring &plugin_dll,
const std::string &activex_clsid,
const std::wstring &trusted_plugins,
sandbox::TargetPolicy* policy);
enum PluginPolicyCategory {
PLUGIN_GROUP_TRUSTED,
PLUGIN_GROUP_UNTRUSTED,
};
// Returns the policy category for the plugin dll.
PluginPolicyCategory GetPolicyCategoryForPlugin(
const std::wstring& plugin_dll,
const std::wstring& activex_clsid,
const std::wstring& trusted_plugins);
// Creates a sandbox without any restriction.
bool ApplyPolicyForTrustedPlugin(sandbox::TargetPolicy* policy);
// Creates a sandbox with the plugin running in a restricted environment.
// Only the "Users" and "Everyone" groups are enabled in the token. The User SID
// is disabled.
bool ApplyPolicyForUntrustedPlugin(sandbox::TargetPolicy* policy);
#endif // CHROME_BROWSER_SANDBOX_POLICY_H_
|