| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/browser/child_process_security_policy_impl.h" | 5 #include "content/browser/child_process_security_policy_impl.h" |
| 6 | 6 |
| 7 #include <algorithm> |
| 7 #include <utility> | 8 #include <utility> |
| 8 | 9 |
| 9 #include "base/command_line.h" | 10 #include "base/command_line.h" |
| 10 #include "base/files/file_path.h" | 11 #include "base/files/file_path.h" |
| 11 #include "base/logging.h" | 12 #include "base/logging.h" |
| 12 #include "base/macros.h" | 13 #include "base/macros.h" |
| 13 #include "base/metrics/histogram.h" | 14 #include "base/metrics/histogram.h" |
| 14 #include "base/stl_util.h" | 15 #include "base/stl_util.h" |
| 15 #include "base/strings/string_util.h" | 16 #include "base/strings/string_util.h" |
| 16 #include "build/build_config.h" | 17 #include "build/build_config.h" |
| (...skipping 604 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 621 // allowed to commit the URL. | 622 // allowed to commit the URL. |
| 622 return state->second->CanCommitURL(url); | 623 return state->second->CanCommitURL(url); |
| 623 } | 624 } |
| 624 } | 625 } |
| 625 | 626 |
| 626 bool ChildProcessSecurityPolicyImpl::CanReadFile(int child_id, | 627 bool ChildProcessSecurityPolicyImpl::CanReadFile(int child_id, |
| 627 const base::FilePath& file) { | 628 const base::FilePath& file) { |
| 628 return HasPermissionsForFile(child_id, file, READ_FILE_GRANT); | 629 return HasPermissionsForFile(child_id, file, READ_FILE_GRANT); |
| 629 } | 630 } |
| 630 | 631 |
| 632 bool ChildProcessSecurityPolicyImpl::CanReadAllFiles( |
| 633 int child_id, |
| 634 const std::vector<base::FilePath>& files) { |
| 635 return std::all_of(files.begin(), files.end(), |
| 636 [this, child_id](const base::FilePath& file) { |
| 637 return CanReadFile(child_id, file); |
| 638 }); |
| 639 } |
| 640 |
| 631 bool ChildProcessSecurityPolicyImpl::CanCreateReadWriteFile( | 641 bool ChildProcessSecurityPolicyImpl::CanCreateReadWriteFile( |
| 632 int child_id, | 642 int child_id, |
| 633 const base::FilePath& file) { | 643 const base::FilePath& file) { |
| 634 return HasPermissionsForFile(child_id, file, CREATE_READ_WRITE_FILE_GRANT); | 644 return HasPermissionsForFile(child_id, file, CREATE_READ_WRITE_FILE_GRANT); |
| 635 } | 645 } |
| 636 | 646 |
| 637 bool ChildProcessSecurityPolicyImpl::CanReadFileSystem( | 647 bool ChildProcessSecurityPolicyImpl::CanReadFileSystem( |
| 638 int child_id, const std::string& filesystem_id) { | 648 int child_id, const std::string& filesystem_id) { |
| 639 return HasPermissionsForFileSystem(child_id, filesystem_id, READ_FILE_GRANT); | 649 return HasPermissionsForFileSystem(child_id, filesystem_id, READ_FILE_GRANT); |
| 640 } | 650 } |
| (...skipping 207 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 848 base::AutoLock lock(lock_); | 858 base::AutoLock lock(lock_); |
| 849 | 859 |
| 850 SecurityStateMap::iterator state = security_state_.find(child_id); | 860 SecurityStateMap::iterator state = security_state_.find(child_id); |
| 851 if (state == security_state_.end()) | 861 if (state == security_state_.end()) |
| 852 return false; | 862 return false; |
| 853 | 863 |
| 854 return state->second->can_send_midi_sysex(); | 864 return state->second->can_send_midi_sysex(); |
| 855 } | 865 } |
| 856 | 866 |
| 857 } // namespace content | 867 } // namespace content |
| OLD | NEW |