OLD | NEW |
1 // Copyright (c) 2006-2009 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2009 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/sandbox_policy.h" | 5 #include "chrome/browser/sandbox_policy.h" |
6 | 6 |
7 #include "app/win_util.h" | 7 #include "app/win_util.h" |
8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
9 #include "base/debug_util.h" | 9 #include "base/debug_util.h" |
10 #include "base/file_util.h" | 10 #include "base/file_util.h" |
(...skipping 261 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
272 if (!AddDirectoryAndChildren(base::DIR_LOCAL_APP_DATA_LOW, NULL, | 272 if (!AddDirectoryAndChildren(base::DIR_LOCAL_APP_DATA_LOW, NULL, |
273 sandbox::TargetPolicy::FILES_ALLOW_ANY, | 273 sandbox::TargetPolicy::FILES_ALLOW_ANY, |
274 policy)) | 274 policy)) |
275 return false; | 275 return false; |
276 } | 276 } |
277 | 277 |
278 return true; | 278 return true; |
279 } | 279 } |
280 | 280 |
281 // Adds the custom policy rules for a given plugin. |trusted_plugins| contains | 281 // Adds the custom policy rules for a given plugin. |trusted_plugins| contains |
282 // the comma separate list of plugins that should not be sandboxed. The plugin | 282 // the comma separate list of plugin dll names that should not be sandboxed. |
283 // in the list can be either the plugin dll name of the class id if it's an | |
284 // ActiveX. | |
285 bool AddPolicyForPlugin(const CommandLine* cmd_line, | 283 bool AddPolicyForPlugin(const CommandLine* cmd_line, |
286 sandbox::TargetPolicy* policy) { | 284 sandbox::TargetPolicy* policy) { |
287 std::wstring plugin_dll = cmd_line-> | 285 std::wstring plugin_dll = cmd_line-> |
288 GetSwitchValue(switches::kPluginPath); | 286 GetSwitchValue(switches::kPluginPath); |
289 std::wstring trusted_plugins = CommandLine::ForCurrentProcess()-> | 287 std::wstring trusted_plugins = CommandLine::ForCurrentProcess()-> |
290 GetSwitchValue(switches::kTrustedPlugins); | 288 GetSwitchValue(switches::kTrustedPlugins); |
291 // Add the policy for the pipes. | 289 // Add the policy for the pipes. |
292 sandbox::ResultCode result = sandbox::SBOX_ALL_OK; | 290 sandbox::ResultCode result = sandbox::SBOX_ALL_OK; |
293 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_NAMED_PIPES, | 291 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_NAMED_PIPES, |
294 sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY, | 292 sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY, |
(...skipping 150 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
445 | 443 |
446 // Help the process a little. It can't start the debugger by itself if | 444 // Help the process a little. It can't start the debugger by itself if |
447 // the process is in a sandbox. | 445 // the process is in a sandbox. |
448 if (child_needs_help) | 446 if (child_needs_help) |
449 DebugUtil::SpawnDebuggerOnProcess(target.dwProcessId); | 447 DebugUtil::SpawnDebuggerOnProcess(target.dwProcessId); |
450 | 448 |
451 return process; | 449 return process; |
452 } | 450 } |
453 | 451 |
454 } // namespace sandbox | 452 } // namespace sandbox |
OLD | NEW |