| Index: chrome/browser/renderer_host/renderer_security_policy.cc
|
| ===================================================================
|
| --- chrome/browser/renderer_host/renderer_security_policy.cc (revision 16195)
|
| +++ chrome/browser/renderer_host/renderer_security_policy.cc (working copy)
|
| @@ -1,292 +0,0 @@
|
| -// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/browser/renderer_host/renderer_security_policy.h"
|
| -
|
| -#include "base/file_path.h"
|
| -#include "base/logging.h"
|
| -#include "base/stl_util-inl.h"
|
| -#include "base/string_util.h"
|
| -#include "chrome/common/url_constants.h"
|
| -#include "googleurl/src/gurl.h"
|
| -#include "net/url_request/url_request.h"
|
| -
|
| -// The SecurityState class is used to maintain per-renderer security state
|
| -// information.
|
| -class RendererSecurityPolicy::SecurityState {
|
| - public:
|
| - SecurityState() : has_dom_ui_bindings_(false) { }
|
| - ~SecurityState() {
|
| - scheme_policy_.clear();
|
| - }
|
| -
|
| - // Grant permission to request URLs with the specified scheme.
|
| - void GrantScheme(const std::string& scheme) {
|
| - scheme_policy_[scheme] = true;
|
| - }
|
| -
|
| - // Revoke permission to request URLs with the specified scheme.
|
| - void RevokeScheme(const std::string& scheme) {
|
| - scheme_policy_[scheme] = false;
|
| - }
|
| -
|
| - // Grant permission to upload the specified file to the web.
|
| - void GrantUploadFile(const FilePath& file) {
|
| - uploadable_files_.insert(file);
|
| - }
|
| -
|
| - void GrantDOMUIBindings() {
|
| - has_dom_ui_bindings_ = true;
|
| - }
|
| -
|
| - // Determine whether permission has been granted to request url.
|
| - // Schemes that have not been granted default to being denied.
|
| - bool CanRequestURL(const GURL& url) {
|
| - SchemeMap::const_iterator judgment(scheme_policy_.find(url.scheme()));
|
| -
|
| - if (judgment == scheme_policy_.end())
|
| - return false; // Unmentioned schemes are disallowed.
|
| -
|
| - return judgment->second;
|
| - }
|
| -
|
| - // Determine whether permission has been granted to upload file.
|
| - // Files that have not been granted default to being denied.
|
| - bool CanUploadFile(const FilePath& file) {
|
| - return uploadable_files_.find(file) != uploadable_files_.end();
|
| - }
|
| -
|
| - bool has_dom_ui_bindings() const { return has_dom_ui_bindings_; }
|
| -
|
| - private:
|
| - typedef std::map<std::string, bool> SchemeMap;
|
| - typedef std::set<FilePath> FileSet;
|
| -
|
| - // Maps URL schemes to whether permission has been granted or revoked:
|
| - // |true| means the scheme has been granted.
|
| - // |false| means the scheme has been revoked.
|
| - // If a scheme is not present in the map, then it has never been granted
|
| - // or revoked.
|
| - SchemeMap scheme_policy_;
|
| -
|
| - // The set of files the renderer is permited to upload to the web.
|
| - FileSet uploadable_files_;
|
| -
|
| - bool has_dom_ui_bindings_;
|
| -
|
| - DISALLOW_COPY_AND_ASSIGN(SecurityState);
|
| -};
|
| -
|
| -RendererSecurityPolicy::RendererSecurityPolicy() {
|
| - // We know about these schemes and believe them to be safe.
|
| - RegisterWebSafeScheme(chrome::kHttpScheme);
|
| - RegisterWebSafeScheme(chrome::kHttpsScheme);
|
| - RegisterWebSafeScheme(chrome::kFtpScheme);
|
| - RegisterWebSafeScheme(chrome::kDataScheme);
|
| - RegisterWebSafeScheme("feed");
|
| - RegisterWebSafeScheme("chrome-extension");
|
| -
|
| - // We know about the following psuedo schemes and treat them specially.
|
| - RegisterPseudoScheme(chrome::kAboutScheme);
|
| - RegisterPseudoScheme(chrome::kJavaScriptScheme);
|
| - RegisterPseudoScheme(chrome::kViewSourceScheme);
|
| -}
|
| -
|
| -RendererSecurityPolicy::~RendererSecurityPolicy() {
|
| - web_safe_schemes_.clear();
|
| - pseudo_schemes_.clear();
|
| - STLDeleteContainerPairSecondPointers(security_state_.begin(),
|
| - security_state_.end());
|
| - security_state_.clear();
|
| -}
|
| -
|
| -// static
|
| -RendererSecurityPolicy* RendererSecurityPolicy::GetInstance() {
|
| - return Singleton<RendererSecurityPolicy>::get();
|
| -}
|
| -
|
| -void RendererSecurityPolicy::Add(int renderer_id) {
|
| - AutoLock lock(lock_);
|
| - if (security_state_.count(renderer_id) != 0) {
|
| - NOTREACHED() << "Add renderers at most once.";
|
| - return;
|
| - }
|
| -
|
| - security_state_[renderer_id] = new SecurityState();
|
| -}
|
| -
|
| -void RendererSecurityPolicy::Remove(int renderer_id) {
|
| - AutoLock lock(lock_);
|
| - if (security_state_.count(renderer_id) != 1) {
|
| - NOTREACHED() << "Remove renderers at most once.";
|
| - return;
|
| - }
|
| -
|
| - delete security_state_[renderer_id];
|
| - security_state_.erase(renderer_id);
|
| -}
|
| -
|
| -void RendererSecurityPolicy::RegisterWebSafeScheme(const std::string& scheme) {
|
| - AutoLock lock(lock_);
|
| - DCHECK(web_safe_schemes_.count(scheme) == 0) << "Add schemes at most once.";
|
| - DCHECK(pseudo_schemes_.count(scheme) == 0) << "Web-safe implies not psuedo.";
|
| -
|
| - web_safe_schemes_.insert(scheme);
|
| -}
|
| -
|
| -bool RendererSecurityPolicy::IsWebSafeScheme(const std::string& scheme) {
|
| - AutoLock lock(lock_);
|
| -
|
| - return (web_safe_schemes_.find(scheme) != web_safe_schemes_.end());
|
| -}
|
| -
|
| -void RendererSecurityPolicy::RegisterPseudoScheme(const std::string& scheme) {
|
| - AutoLock lock(lock_);
|
| - DCHECK(pseudo_schemes_.count(scheme) == 0) << "Add schemes at most once.";
|
| - DCHECK(web_safe_schemes_.count(scheme) == 0) <<
|
| - "Psuedo implies not web-safe.";
|
| -
|
| - pseudo_schemes_.insert(scheme);
|
| -}
|
| -
|
| -bool RendererSecurityPolicy::IsPseudoScheme(const std::string& scheme) {
|
| - AutoLock lock(lock_);
|
| -
|
| - return (pseudo_schemes_.find(scheme) != pseudo_schemes_.end());
|
| -}
|
| -
|
| -void RendererSecurityPolicy::GrantRequestURL(int renderer_id, const GURL& url) {
|
| -
|
| - if (!url.is_valid())
|
| - return; // Can't grant the capability to request invalid URLs.
|
| -
|
| - if (IsWebSafeScheme(url.scheme()))
|
| - return; // The scheme has already been white-listed for every renderer.
|
| -
|
| - if (IsPseudoScheme(url.scheme())) {
|
| - // The view-source scheme is a special case of a pseudo URL that eventually
|
| - // results in requesting its embedded URL.
|
| - if (url.SchemeIs(chrome::kViewSourceScheme)) {
|
| - // URLs with the view-source scheme typically look like:
|
| - // view-source:http://www.google.com/a
|
| - // In order to request these URLs, the renderer needs to be able to
|
| - // request the embedded URL.
|
| - GrantRequestURL(renderer_id, GURL(url.path()));
|
| - }
|
| -
|
| - return; // Can't grant the capability to request pseudo schemes.
|
| - }
|
| -
|
| - {
|
| - AutoLock lock(lock_);
|
| - SecurityStateMap::iterator state = security_state_.find(renderer_id);
|
| - if (state == security_state_.end())
|
| - return;
|
| -
|
| - // If the renderer has been commanded to request a scheme, then we grant
|
| - // it the capability to request URLs of that scheme.
|
| - state->second->GrantScheme(url.scheme());
|
| - }
|
| -}
|
| -
|
| -void RendererSecurityPolicy::GrantUploadFile(int renderer_id,
|
| - const FilePath& file) {
|
| - AutoLock lock(lock_);
|
| -
|
| - SecurityStateMap::iterator state = security_state_.find(renderer_id);
|
| - if (state == security_state_.end())
|
| - return;
|
| -
|
| - state->second->GrantUploadFile(file);
|
| -}
|
| -
|
| -void RendererSecurityPolicy::GrantInspectElement(int renderer_id) {
|
| - AutoLock lock(lock_);
|
| -
|
| - SecurityStateMap::iterator state = security_state_.find(renderer_id);
|
| - if (state == security_state_.end())
|
| - return;
|
| -
|
| - // The inspector is served from a chrome: URL. In order to run the
|
| - // inspector, the renderer needs to be able to load chrome: URLs.
|
| - state->second->GrantScheme(chrome::kChromeUIScheme);
|
| -}
|
| -
|
| -void RendererSecurityPolicy::GrantDOMUIBindings(int renderer_id) {
|
| - AutoLock lock(lock_);
|
| -
|
| - SecurityStateMap::iterator state = security_state_.find(renderer_id);
|
| - if (state == security_state_.end())
|
| - return;
|
| -
|
| - state->second->GrantDOMUIBindings();
|
| -
|
| - // DOM UI bindings need the ability to request chrome: URLs.
|
| - state->second->GrantScheme(chrome::kChromeUIScheme);
|
| -
|
| - // DOM UI pages can contain links to file:// URLs.
|
| - state->second->GrantScheme(chrome::kFileScheme);
|
| -}
|
| -
|
| -bool RendererSecurityPolicy::CanRequestURL(int renderer_id, const GURL& url) {
|
| - if (!url.is_valid())
|
| - return false; // Can't request invalid URLs.
|
| -
|
| - if (IsWebSafeScheme(url.scheme()))
|
| - return true; // The scheme has been white-listed for every renderer.
|
| -
|
| - if (IsPseudoScheme(url.scheme())) {
|
| - // There are a number of special cases for pseudo schemes.
|
| -
|
| - if (url.SchemeIs(chrome::kViewSourceScheme)) {
|
| - // A view-source URL is allowed if the renderer is permitted to request
|
| - // the embedded URL.
|
| - return CanRequestURL(renderer_id, GURL(url.path()));
|
| - }
|
| -
|
| - if (LowerCaseEqualsASCII(url.spec(), chrome::kAboutBlankURL))
|
| - return true; // Every renderer can request <about:blank>.
|
| -
|
| - // URLs like <about:memory> and <about:crash> shouldn't be requestable by
|
| - // any renderer. Also, this case covers <javascript:...>, which should be
|
| - // handled internally by the renderer and not kicked up to the browser.
|
| - return false;
|
| - }
|
| -
|
| - if (!URLRequest::IsHandledURL(url))
|
| - return true; // This URL request is destined for ShellExecute.
|
| -
|
| - {
|
| - AutoLock lock(lock_);
|
| -
|
| - SecurityStateMap::iterator state = security_state_.find(renderer_id);
|
| - if (state == security_state_.end())
|
| - return false;
|
| -
|
| - // Otherwise, we consult the renderer's security state to see if it is
|
| - // allowed to request the URL.
|
| - return state->second->CanRequestURL(url);
|
| - }
|
| -}
|
| -
|
| -bool RendererSecurityPolicy::CanUploadFile(int renderer_id,
|
| - const FilePath& file) {
|
| - AutoLock lock(lock_);
|
| -
|
| - SecurityStateMap::iterator state = security_state_.find(renderer_id);
|
| - if (state == security_state_.end())
|
| - return false;
|
| -
|
| - return state->second->CanUploadFile(file);
|
| -}
|
| -
|
| -bool RendererSecurityPolicy::HasDOMUIBindings(int renderer_id) {
|
| - AutoLock lock(lock_);
|
| -
|
| - SecurityStateMap::iterator state = security_state_.find(renderer_id);
|
| - if (state == security_state_.end())
|
| - return false;
|
| -
|
| - return state->second->has_dom_ui_bindings();
|
| -}
|
|
|