Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ | 5 #ifndef CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ |
| 6 #define CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ | 6 #define CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ |
| 7 | 7 |
| 8 #include <string> | 8 #include <string> |
| 9 | 9 |
| 10 #include "base/basictypes.h" | 10 #include "base/basictypes.h" |
| (...skipping 22 matching lines...) Expand all Loading... | |
| 33 static CONTENT_EXPORT ChildProcessSecurityPolicy* GetInstance(); | 33 static CONTENT_EXPORT ChildProcessSecurityPolicy* GetInstance(); |
| 34 | 34 |
| 35 // Web-safe schemes can be requested by any child process. Once a web-safe | 35 // Web-safe schemes can be requested by any child process. Once a web-safe |
| 36 // scheme has been registered, any child process can request URLs with | 36 // scheme has been registered, any child process can request URLs with |
| 37 // that scheme. There is no mechanism for revoking web-safe schemes. | 37 // that scheme. There is no mechanism for revoking web-safe schemes. |
| 38 virtual void RegisterWebSafeScheme(const std::string& scheme) = 0; | 38 virtual void RegisterWebSafeScheme(const std::string& scheme) = 0; |
| 39 | 39 |
| 40 // Returns true iff |scheme| has been registered as a web-safe scheme. | 40 // Returns true iff |scheme| has been registered as a web-safe scheme. |
| 41 virtual bool IsWebSafeScheme(const std::string& scheme) = 0; | 41 virtual bool IsWebSafeScheme(const std::string& scheme) = 0; |
| 42 | 42 |
| 43 // Before servicing a child process's request to upload a file to the web, the | 43 // This permission grants only read access to a file. |
|
vandebo (ex-Chrome)
2013/07/18 15:16:59
Seems like the explicit guidance in these comments
tommycli
2013/07/18 15:56:47
Done.
| |
| 44 // browser should call this method to determine whether the process has the | |
| 45 // capability to upload the requested file. | |
| 46 virtual bool CanReadFile(int child_id, const base::FilePath& file) = 0; | |
| 47 | |
| 48 // Whenever the user picks a file from a <input type="file"> element, the | |
| 49 // browser should call this function to grant the child process the capability | |
| 50 // to upload the file to the web. Grants FILE_PERMISSION_READ_ONLY. | |
| 51 virtual void GrantReadFile(int child_id, const base::FilePath& file) = 0; | 44 virtual void GrantReadFile(int child_id, const base::FilePath& file) = 0; |
| 52 | 45 |
| 53 // This permission grants creation, read, and full write access to a file, | 46 // This permission grants creation, read, and full write access to a file, |
| 54 // including attributes. | 47 // including attributes. |
| 55 virtual void GrantCreateReadWriteFile(int child_id, | 48 virtual void GrantCreateReadWriteFile(int child_id, |
| 56 const base::FilePath& file) = 0; | 49 const base::FilePath& file) = 0; |
| 57 | 50 |
| 58 // This permission grants creation and write access to a file. | 51 // This permission grants creation and write access to a file. |
| 59 virtual void GrantCreateWriteFile(int child_id, | 52 virtual void GrantCreateWriteFile(int child_id, |
| 60 const base::FilePath& file) = 0; | 53 const base::FilePath& file) = 0; |
| 61 | 54 |
| 55 // These methods verify whether or not the child process has been granted | |
| 56 // permissions perform these functions on |file|. | |
| 57 virtual bool CanReadFile(int child_id, const base::FilePath& file) = 0; | |
| 58 virtual bool CanWriteFile(int child_id, const base::FilePath& file) = 0; | |
| 59 virtual bool CanCreateFile(int child_id, const base::FilePath& file) = 0; | |
| 60 virtual bool CanCreateReadWriteFile(int child_id, | |
| 61 const base::FilePath& file) = 0; | |
| 62 | |
| 62 // Grants read access permission to the given isolated file system | 63 // Grants read access permission to the given isolated file system |
| 63 // identified by |filesystem_id|. An isolated file system can be | 64 // identified by |filesystem_id|. An isolated file system can be |
| 64 // created for a set of native files/directories (like dropped files) | 65 // created for a set of native files/directories (like dropped files) |
| 65 // using fileapi::IsolatedContext. A child process needs to be granted | 66 // using fileapi::IsolatedContext. A child process needs to be granted |
| 66 // permission to the file system to access the files in it using | 67 // permission to the file system to access the files in it using |
| 67 // file system URL. | 68 // file system URL. |
| 68 // | 69 // |
| 69 // Note: to grant read access to the content of files you also need | 70 // Note: to grant read access to the content of files you also need |
| 70 // to give permission directly to the file paths using GrantReadFile. | 71 // to give permission directly to the file paths using GrantReadFile. |
| 71 // TODO(kinuko): We should unify this file-level and file-system-level | 72 // TODO(kinuko): We should unify this file-level and file-system-level |
| (...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 110 | 111 |
| 111 // Returns true iff read and write access has been granted to the filesystem | 112 // Returns true iff read and write access has been granted to the filesystem |
| 112 // with |filesystem_id|. | 113 // with |filesystem_id|. |
| 113 virtual bool CanReadWriteFileSystem(int child_id, | 114 virtual bool CanReadWriteFileSystem(int child_id, |
| 114 const std::string& filesystem_id) = 0; | 115 const std::string& filesystem_id) = 0; |
| 115 }; | 116 }; |
| 116 | 117 |
| 117 }; // namespace content | 118 }; // namespace content |
| 118 | 119 |
| 119 #endif // CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ | 120 #endif // CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ |
| OLD | NEW |