| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/browser/child_process_security_policy_impl.h" | 5 #include "content/browser/child_process_security_policy_impl.h" |
| 6 | 6 |
| 7 #include "base/file_path.h" | 7 #include "base/file_path.h" |
| 8 #include "base/logging.h" | 8 #include "base/logging.h" |
| 9 #include "base/metrics/histogram.h" | 9 #include "base/metrics/histogram.h" |
| 10 #include "base/platform_file.h" | 10 #include "base/platform_file.h" |
| 11 #include "base/stl_util.h" | 11 #include "base/stl_util.h" |
| 12 #include "base/string_util.h" | 12 #include "base/string_util.h" |
| 13 #include "content/browser/site_instance_impl.h" | 13 #include "content/browser/site_instance_impl.h" |
| 14 #include "content/public/browser/content_browser_client.h" | 14 #include "content/public/browser/content_browser_client.h" |
| 15 #include "content/public/common/bindings_policy.h" | 15 #include "content/public/common/bindings_policy.h" |
| 16 #include "content/public/common/url_constants.h" | 16 #include "content/public/common/url_constants.h" |
| 17 #include "googleurl/src/gurl.h" | 17 #include "googleurl/src/gurl.h" |
| 18 #include "net/base/net_util.h" | 18 #include "net/base/net_util.h" |
| 19 #include "net/url_request/url_request.h" | 19 #include "net/url_request/url_request.h" |
| 20 #include "webkit/fileapi/isolated_context.h" | 20 #include "webkit/fileapi/isolated_context.h" |
| 21 | 21 |
| 22 namespace content { | 22 using content::ChildProcessSecurityPolicy; |
| 23 using content::SiteInstance; |
| 23 | 24 |
| 24 namespace { | 25 namespace { |
| 25 | 26 |
| 26 const int kReadFilePermissions = | 27 const int kReadFilePermissions = |
| 27 base::PLATFORM_FILE_OPEN | | 28 base::PLATFORM_FILE_OPEN | |
| 28 base::PLATFORM_FILE_READ | | 29 base::PLATFORM_FILE_READ | |
| 29 base::PLATFORM_FILE_EXCLUSIVE_READ | | 30 base::PLATFORM_FILE_EXCLUSIVE_READ | |
| 30 base::PLATFORM_FILE_ASYNC; | 31 base::PLATFORM_FILE_ASYNC; |
| 31 | 32 |
| 32 const int kWriteFilePermissions = | 33 const int kWriteFilePermissions = |
| (...skipping 127 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 160 return true; | 161 return true; |
| 161 GURL site_gurl = SiteInstanceImpl::GetSiteForURL(NULL, gurl); | 162 GURL site_gurl = SiteInstanceImpl::GetSiteForURL(NULL, gurl); |
| 162 return origin_lock_ == site_gurl; | 163 return origin_lock_ == site_gurl; |
| 163 } | 164 } |
| 164 | 165 |
| 165 void LockToOrigin(const GURL& gurl) { | 166 void LockToOrigin(const GURL& gurl) { |
| 166 origin_lock_ = gurl; | 167 origin_lock_ = gurl; |
| 167 } | 168 } |
| 168 | 169 |
| 169 bool has_web_ui_bindings() const { | 170 bool has_web_ui_bindings() const { |
| 170 return enabled_bindings_ & BINDINGS_POLICY_WEB_UI; | 171 return enabled_bindings_ & content::BINDINGS_POLICY_WEB_UI; |
| 171 } | 172 } |
| 172 | 173 |
| 173 bool can_read_raw_cookies() const { | 174 bool can_read_raw_cookies() const { |
| 174 return can_read_raw_cookies_; | 175 return can_read_raw_cookies_; |
| 175 } | 176 } |
| 176 | 177 |
| 177 private: | 178 private: |
| 178 typedef std::map<std::string, bool> SchemeMap; | 179 typedef std::map<std::string, bool> SchemeMap; |
| 179 | 180 |
| 180 typedef int FilePermissionFlags; // bit-set of PlatformFileFlags | 181 typedef int FilePermissionFlags; // bit-set of PlatformFileFlags |
| (...skipping 236 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 417 state->second->GrantScheme(scheme); | 418 state->second->GrantScheme(scheme); |
| 418 } | 419 } |
| 419 | 420 |
| 420 void ChildProcessSecurityPolicyImpl::GrantWebUIBindings(int child_id) { | 421 void ChildProcessSecurityPolicyImpl::GrantWebUIBindings(int child_id) { |
| 421 base::AutoLock lock(lock_); | 422 base::AutoLock lock(lock_); |
| 422 | 423 |
| 423 SecurityStateMap::iterator state = security_state_.find(child_id); | 424 SecurityStateMap::iterator state = security_state_.find(child_id); |
| 424 if (state == security_state_.end()) | 425 if (state == security_state_.end()) |
| 425 return; | 426 return; |
| 426 | 427 |
| 427 state->second->GrantBindings(BINDINGS_POLICY_WEB_UI); | 428 state->second->GrantBindings(content::BINDINGS_POLICY_WEB_UI); |
| 428 | 429 |
| 429 // Web UI bindings need the ability to request chrome: URLs. | 430 // Web UI bindings need the ability to request chrome: URLs. |
| 430 state->second->GrantScheme(chrome::kChromeUIScheme); | 431 state->second->GrantScheme(chrome::kChromeUIScheme); |
| 431 | 432 |
| 432 // Web UI pages can contain links to file:// URLs. | 433 // Web UI pages can contain links to file:// URLs. |
| 433 state->second->GrantScheme(chrome::kFileScheme); | 434 state->second->GrantScheme(chrome::kFileScheme); |
| 434 } | 435 } |
| 435 | 436 |
| 436 void ChildProcessSecurityPolicyImpl::GrantReadRawCookies(int child_id) { | 437 void ChildProcessSecurityPolicyImpl::GrantReadRawCookies(int child_id) { |
| 437 base::AutoLock lock(lock_); | 438 base::AutoLock lock(lock_); |
| (...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 480 | 481 |
| 481 if (LowerCaseEqualsASCII(url.spec(), chrome::kAboutBlankURL)) | 482 if (LowerCaseEqualsASCII(url.spec(), chrome::kAboutBlankURL)) |
| 482 return true; // Every child process can request <about:blank>. | 483 return true; // Every child process can request <about:blank>. |
| 483 | 484 |
| 484 // URLs like <about:memory> and <about:crash> shouldn't be requestable by | 485 // URLs like <about:memory> and <about:crash> shouldn't be requestable by |
| 485 // any child process. Also, this case covers <javascript:...>, which should | 486 // any child process. Also, this case covers <javascript:...>, which should |
| 486 // be handled internally by the process and not kicked up to the browser. | 487 // be handled internally by the process and not kicked up to the browser. |
| 487 return false; | 488 return false; |
| 488 } | 489 } |
| 489 | 490 |
| 490 if (!GetContentClient()->browser()->IsHandledURL(url) && | 491 if (!content::GetContentClient()->browser()->IsHandledURL(url) && |
| 491 !net::URLRequest::IsHandledURL(url)) { | 492 !net::URLRequest::IsHandledURL(url)) { |
| 492 return true; // This URL request is destined for ShellExecute. | 493 return true; // This URL request is destined for ShellExecute. |
| 493 } | 494 } |
| 494 | 495 |
| 495 { | 496 { |
| 496 base::AutoLock lock(lock_); | 497 base::AutoLock lock(lock_); |
| 497 | 498 |
| 498 SecurityStateMap::iterator state = security_state_.find(child_id); | 499 SecurityStateMap::iterator state = security_state_.find(child_id); |
| 499 if (state == security_state_.end()) | 500 if (state == security_state_.end()) |
| 500 return false; | 501 return false; |
| (...skipping 120 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 621 int child_id, | 622 int child_id, |
| 622 const std::string& filesystem_id, | 623 const std::string& filesystem_id, |
| 623 int permission) { | 624 int permission) { |
| 624 base::AutoLock lock(lock_); | 625 base::AutoLock lock(lock_); |
| 625 | 626 |
| 626 SecurityStateMap::iterator state = security_state_.find(child_id); | 627 SecurityStateMap::iterator state = security_state_.find(child_id); |
| 627 if (state == security_state_.end()) | 628 if (state == security_state_.end()) |
| 628 return false; | 629 return false; |
| 629 return state->second->HasPermissionsForFileSystem(filesystem_id, permission); | 630 return state->second->HasPermissionsForFileSystem(filesystem_id, permission); |
| 630 } | 631 } |
| 631 | |
| 632 } // namespace content | |
| OLD | NEW |