summaryrefslogtreecommitdiffstats
path: root/chrome/browser/sandbox_policy.h
blob: 3beafdd3aec73be64a0370b9f4f31c2f17410eb0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#ifndef CHROME_BROWSER_SANDBOX_POLICY_H_
#define CHROME_BROWSER_SANDBOX_POLICY_H_

#include <string>
#include "sandbox/src/sandbox.h"
#include "webkit/activex_shim/activex_shared.h"

// Adds the generic policy rules to a sandbox TargetPolicy.
bool AddGenericPolicy(sandbox::TargetPolicy* policy);

// Adds policy rules for unloaded the known dlls that cause chrome to crash.
bool AddDllEvictionPolicy(sandbox::TargetPolicy* policy);

// Adds policy rules for running Gears in the renderer process.
bool AddPolicyForGearsInRenderer(sandbox::TargetPolicy* policy);

// Adds the custom policy rules for a given plugin. If dll is activex-shim,
// then clsid is the clsid of ActiveX control. Otherwise clsid is ignored.
// |trusted_plugins| contains the comma separate list of plugins that should
// not be sandboxed. The plugin in the list can be either the plugin dll name
// of the class id if it's an ActiveX.
bool AddPolicyForPlugin(const std::wstring &plugin_dll,
                        const std::string &activex_clsid,
                        const std::wstring &trusted_plugins,
                        sandbox::TargetPolicy* policy);

enum PluginPolicyCategory {
  PLUGIN_GROUP_TRUSTED,
  PLUGIN_GROUP_UNTRUSTED,
};

// Returns the policy category for the plugin dll.
PluginPolicyCategory GetPolicyCategoryForPlugin(
    const std::wstring& plugin_dll,
    const std::wstring& activex_clsid,
    const std::wstring& trusted_plugins);

// Creates a sandbox without any restriction.
bool ApplyPolicyForTrustedPlugin(sandbox::TargetPolicy* policy);

// Creates a sandbox with the plugin running in a restricted environment.
// Only the "Users" and "Everyone" groups are enabled in the token. The User SID
// is disabled.
bool ApplyPolicyForUntrustedPlugin(sandbox::TargetPolicy* policy);

#endif  // CHROME_BROWSER_SANDBOX_POLICY_H_