Index: content/browser/child_process_security_policy_impl.h |
diff --git a/content/browser/child_process_security_policy_impl.h b/content/browser/child_process_security_policy_impl.h |
deleted file mode 100644 |
index 271e69c0acd110ed0e3d74f7b1d0c8512300973f..0000000000000000000000000000000000000000 |
--- a/content/browser/child_process_security_policy_impl.h |
+++ /dev/null |
@@ -1,259 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#ifndef CONTENT_BROWSER_CHILD_PROCESS_SECURITY_POLICY_IMPL_H_ |
-#define CONTENT_BROWSER_CHILD_PROCESS_SECURITY_POLICY_IMPL_H_ |
- |
-#include <map> |
-#include <set> |
-#include <string> |
-#include <vector> |
- |
-#include "base/compiler_specific.h" |
-#include "base/gtest_prod_util.h" |
-#include "base/macros.h" |
-#include "base/memory/singleton.h" |
-#include "base/synchronization/lock.h" |
-#include "content/public/browser/child_process_security_policy.h" |
-#include "content/public/common/resource_type.h" |
-#include "storage/common/fileapi/file_system_types.h" |
- |
-class GURL; |
- |
-namespace base { |
-class FilePath; |
-} |
- |
-namespace storage { |
-class FileSystemURL; |
-} |
- |
-namespace content { |
- |
-class CONTENT_EXPORT ChildProcessSecurityPolicyImpl |
- : NON_EXPORTED_BASE(public ChildProcessSecurityPolicy) { |
- public: |
- // Object can only be created through GetInstance() so the constructor is |
- // private. |
- ~ChildProcessSecurityPolicyImpl() override; |
- |
- static ChildProcessSecurityPolicyImpl* GetInstance(); |
- |
- // ChildProcessSecurityPolicy implementation. |
- void RegisterWebSafeScheme(const std::string& scheme) override; |
- bool IsWebSafeScheme(const std::string& scheme) override; |
- void GrantReadFile(int child_id, const base::FilePath& file) override; |
- void GrantCreateReadWriteFile(int child_id, |
- const base::FilePath& file) override; |
- void GrantCopyInto(int child_id, const base::FilePath& dir) override; |
- void GrantDeleteFrom(int child_id, const base::FilePath& dir) override; |
- void GrantReadFileSystem(int child_id, |
- const std::string& filesystem_id) override; |
- void GrantWriteFileSystem(int child_id, |
- const std::string& filesystem_id) override; |
- void GrantCreateFileForFileSystem(int child_id, |
- const std::string& filesystem_id) override; |
- void GrantCreateReadWriteFileSystem( |
- int child_id, |
- const std::string& filesystem_id) override; |
- void GrantCopyIntoFileSystem(int child_id, |
- const std::string& filesystem_id) override; |
- void GrantDeleteFromFileSystem(int child_id, |
- const std::string& filesystem_id) override; |
- void GrantOrigin(int child_id, const url::Origin& origin) override; |
- void GrantScheme(int child_id, const std::string& scheme) override; |
- bool CanReadFile(int child_id, const base::FilePath& file) override; |
- bool CanCreateReadWriteFile(int child_id, |
- const base::FilePath& file) override; |
- bool CanReadFileSystem(int child_id, |
- const std::string& filesystem_id) override; |
- bool CanReadWriteFileSystem(int child_id, |
- const std::string& filesystem_id) override; |
- bool CanCopyIntoFileSystem(int child_id, |
- const std::string& filesystem_id) override; |
- bool CanDeleteFromFileSystem(int child_id, |
- const std::string& filesystem_id) override; |
- bool HasWebUIBindings(int child_id) override; |
- void GrantSendMidiSysExMessage(int child_id) override; |
- bool CanAccessDataForOrigin(int child_id, const GURL& url) override; |
- |
- // Returns if |child_id| can read all of the |files|. |
- bool CanReadAllFiles(int child_id, const std::vector<base::FilePath>& files); |
- |
- // Pseudo schemes are treated differently than other schemes because they |
- // cannot be requested like normal URLs. There is no mechanism for revoking |
- // pseudo schemes. |
- void RegisterPseudoScheme(const std::string& scheme); |
- |
- // Returns true iff |scheme| has been registered as pseudo scheme. |
- bool IsPseudoScheme(const std::string& scheme); |
- |
- // Upon creation, child processes should register themselves by calling this |
- // this method exactly once. |
- void Add(int child_id); |
- |
- // Upon creation, worker thread child processes should register themselves by |
- // calling this this method exactly once. Workers that are not shared will |
- // inherit permissions from their parent renderer process identified with |
- // |main_render_process_id|. |
- void AddWorker(int worker_child_id, int main_render_process_id); |
- |
- // Upon destruction, child processess should unregister themselves by caling |
- // this method exactly once. |
- void Remove(int child_id); |
- |
- // Whenever the browser processes commands the child process to request a URL, |
- // it should call this method to grant the child process the capability to |
- // request the URL, along with permission to request all URLs of the same |
- // scheme. |
- void GrantRequestURL(int child_id, const GURL& url); |
- |
- // Whenever the browser process drops a file icon on a tab, it should call |
- // this method to grant the child process the capability to request this one |
- // file:// URL, but not all urls of the file:// scheme. |
- void GrantRequestSpecificFileURL(int child_id, const GURL& url); |
- |
- // Revokes all permissions granted to the given file. |
- void RevokeAllPermissionsForFile(int child_id, const base::FilePath& file); |
- |
- // Grant the child process the ability to use Web UI Bindings. |
- void GrantWebUIBindings(int child_id); |
- |
- // Grant the child process the ability to read raw cookies. |
- void GrantReadRawCookies(int child_id); |
- |
- // Revoke read raw cookies permission. |
- void RevokeReadRawCookies(int child_id); |
- |
- // Before servicing a child process's request for a URL, the browser should |
- // call this method to determine whether the process has the capability to |
- // request the URL. |
- bool CanRequestURL(int child_id, const GURL& url); |
- |
- // Whether the process is allowed to commit a document from the given URL. |
- // This is more restrictive than CanRequestURL, since CanRequestURL allows |
- // requests that might lead to cross-process navigations or external protocol |
- // handlers. |
- bool CanCommitURL(int child_id, const GURL& url); |
- |
- // Explicit permissions checks for FileSystemURL specified files. |
- bool CanReadFileSystemFile(int child_id, const storage::FileSystemURL& url); |
- bool CanWriteFileSystemFile(int child_id, const storage::FileSystemURL& url); |
- bool CanCreateFileSystemFile(int child_id, const storage::FileSystemURL& url); |
- bool CanCreateReadWriteFileSystemFile(int child_id, |
- const storage::FileSystemURL& url); |
- bool CanCopyIntoFileSystemFile(int child_id, |
- const storage::FileSystemURL& url); |
- bool CanDeleteFileSystemFile(int child_id, const storage::FileSystemURL& url); |
- |
- // Returns true if the specified child_id has been granted ReadRawCookies. |
- bool CanReadRawCookies(int child_id); |
- |
- // Sets the process as only permitted to use and see the cookies for the |
- // given origin. |
- // Origin lock is applied only if the --site-per-process flag is used. |
- void LockToOrigin(int child_id, const GURL& gurl); |
- |
- // Register FileSystem type and permission policy which should be used |
- // for the type. The |policy| must be a bitwise-or'd value of |
- // storage::FilePermissionPolicy. |
- void RegisterFileSystemPermissionPolicy(storage::FileSystemType type, |
- int policy); |
- |
- // Returns true if sending system exclusive messages is allowed. |
- bool CanSendMidiSysExMessage(int child_id); |
- |
- private: |
- friend class ChildProcessSecurityPolicyInProcessBrowserTest; |
- friend class ChildProcessSecurityPolicyTest; |
- FRIEND_TEST_ALL_PREFIXES(ChildProcessSecurityPolicyInProcessBrowserTest, |
- NoLeak); |
- FRIEND_TEST_ALL_PREFIXES(ChildProcessSecurityPolicyTest, FilePermissions); |
- |
- class SecurityState; |
- |
- typedef std::set<std::string> SchemeSet; |
- typedef std::map<int, SecurityState*> SecurityStateMap; |
- typedef std::map<int, int> WorkerToMainProcessMap; |
- typedef std::map<storage::FileSystemType, int> FileSystemPermissionPolicyMap; |
- |
- // Obtain an instance of ChildProcessSecurityPolicyImpl via GetInstance(). |
- ChildProcessSecurityPolicyImpl(); |
- friend struct base::DefaultSingletonTraits<ChildProcessSecurityPolicyImpl>; |
- |
- // Adds child process during registration. |
- void AddChild(int child_id); |
- |
- // Determines if certain permissions were granted for a file to given child |
- // process. |permissions| is an internally defined bit-set. |
- bool ChildProcessHasPermissionsForFile(int child_id, |
- const base::FilePath& file, |
- int permissions); |
- |
- // Grant a particular permission set for a file. |permissions| is an |
- // internally defined bit-set. |
- void GrantPermissionsForFile(int child_id, |
- const base::FilePath& file, |
- int permissions); |
- |
- // Grants access permission to the given isolated file system |
- // identified by |filesystem_id|. See comments for |
- // ChildProcessSecurityPolicy::GrantReadFileSystem() for more details. |
- void GrantPermissionsForFileSystem( |
- int child_id, |
- const std::string& filesystem_id, |
- int permission); |
- |
- // Determines if certain permissions were granted for a file. |permissions| |
- // is an internally defined bit-set. If |child_id| is a worker process, |
- // this returns true if either the worker process or its parent renderer |
- // has permissions for the file. |
- bool HasPermissionsForFile(int child_id, |
- const base::FilePath& file, |
- int permissions); |
- |
- // Determines if certain permissions were granted for a file in FileSystem |
- // API. |permissions| is an internally defined bit-set. |
- bool HasPermissionsForFileSystemFile(int child_id, |
- const storage::FileSystemURL& url, |
- int permissions); |
- |
- // Determines if certain permissions were granted for a file system. |
- // |permissions| is an internally defined bit-set. |
- bool HasPermissionsForFileSystem( |
- int child_id, |
- const std::string& filesystem_id, |
- int permission); |
- |
- // You must acquire this lock before reading or writing any members of this |
- // class. You must not block while holding this lock. |
- base::Lock lock_; |
- |
- // These schemes are white-listed for all child processes. This set is |
- // protected by |lock_|. |
- SchemeSet web_safe_schemes_; |
- |
- // These schemes do not actually represent retrievable URLs. For example, |
- // the the URLs in the "about" scheme are aliases to other URLs. This set is |
- // protected by |lock_|. |
- SchemeSet pseudo_schemes_; |
- |
- // This map holds a SecurityState for each child process. The key for the |
- // map is the ID of the ChildProcessHost. The SecurityState objects are |
- // owned by this object and are protected by |lock_|. References to them must |
- // not escape this class. |
- SecurityStateMap security_state_; |
- |
- // This maps keeps the record of which js worker thread child process |
- // corresponds to which main js thread child process. |
- WorkerToMainProcessMap worker_map_; |
- |
- FileSystemPermissionPolicyMap file_system_policy_map_; |
- |
- DISALLOW_COPY_AND_ASSIGN(ChildProcessSecurityPolicyImpl); |
-}; |
- |
-} // namespace content |
- |
-#endif // CONTENT_BROWSER_CHILD_PROCESS_SECURITY_POLICY_IMPL_H_ |