OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CONTENT_BROWSER_CHILD_PROCESS_SECURITY_POLICY_IMPL_H_ | 5 #ifndef CONTENT_BROWSER_CHILD_PROCESS_SECURITY_POLICY_IMPL_H_ |
6 #define CONTENT_BROWSER_CHILD_PROCESS_SECURITY_POLICY_IMPL_H_ | 6 #define CONTENT_BROWSER_CHILD_PROCESS_SECURITY_POLICY_IMPL_H_ |
7 | 7 |
8 #include <map> | 8 #include <map> |
9 #include <memory> | 9 #include <memory> |
10 #include <set> | 10 #include <set> |
(...skipping 158 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
169 bool CanCopyIntoFileSystemFile(int child_id, | 169 bool CanCopyIntoFileSystemFile(int child_id, |
170 const storage::FileSystemURL& filesystem_url); | 170 const storage::FileSystemURL& filesystem_url); |
171 bool CanDeleteFileSystemFile(int child_id, | 171 bool CanDeleteFileSystemFile(int child_id, |
172 const storage::FileSystemURL& filesystem_url); | 172 const storage::FileSystemURL& filesystem_url); |
173 | 173 |
174 // Returns true if the specified child_id has been granted ReadRawCookies. | 174 // Returns true if the specified child_id has been granted ReadRawCookies. |
175 bool CanReadRawCookies(int child_id); | 175 bool CanReadRawCookies(int child_id); |
176 | 176 |
177 // Sets the process as only permitted to use and see the cookies for the | 177 // Sets the process as only permitted to use and see the cookies for the |
178 // given origin. | 178 // given origin. |
179 // Origin lock is applied only if the --site-per-process flag is used. | |
180 void LockToOrigin(int child_id, const GURL& gurl); | 179 void LockToOrigin(int child_id, const GURL& gurl); |
181 | 180 |
| 181 // Check if the process specified by |child_id| has a non-empty origin lock. |
| 182 bool HasOriginLock(int child_id); |
| 183 |
| 184 // Check if the process specified by |child_id| is dedicated to the provided |
| 185 // site URL. This returns true if LockToOrigin was previously called on the |
| 186 // same process and on a url with a site that matches |site_url|. |
| 187 bool IsLockedToOrigin(int child_id, const GURL& site_url); |
| 188 |
182 // Register FileSystem type and permission policy which should be used | 189 // Register FileSystem type and permission policy which should be used |
183 // for the type. The |policy| must be a bitwise-or'd value of | 190 // for the type. The |policy| must be a bitwise-or'd value of |
184 // storage::FilePermissionPolicy. | 191 // storage::FilePermissionPolicy. |
185 void RegisterFileSystemPermissionPolicy(storage::FileSystemType type, | 192 void RegisterFileSystemPermissionPolicy(storage::FileSystemType type, |
186 int policy); | 193 int policy); |
187 | 194 |
188 // Returns true if sending system exclusive messages is allowed. | 195 // Returns true if sending system exclusive messages is allowed. |
189 bool CanSendMidiSysExMessage(int child_id); | 196 bool CanSendMidiSysExMessage(int child_id); |
190 | 197 |
191 // Add an origin to the list of origins that require process isolation. | 198 // Add an origin to the list of origins that require process isolation. |
(...skipping 120 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
312 // eTLD+1. Each of these origins requires a dedicated process. This set is | 319 // eTLD+1. Each of these origins requires a dedicated process. This set is |
313 // protected by |lock_|. | 320 // protected by |lock_|. |
314 std::set<url::Origin> isolated_origins_; | 321 std::set<url::Origin> isolated_origins_; |
315 | 322 |
316 DISALLOW_COPY_AND_ASSIGN(ChildProcessSecurityPolicyImpl); | 323 DISALLOW_COPY_AND_ASSIGN(ChildProcessSecurityPolicyImpl); |
317 }; | 324 }; |
318 | 325 |
319 } // namespace content | 326 } // namespace content |
320 | 327 |
321 #endif // CONTENT_BROWSER_CHILD_PROCESS_SECURITY_POLICY_IMPL_H_ | 328 #endif // CONTENT_BROWSER_CHILD_PROCESS_SECURITY_POLICY_IMPL_H_ |
OLD | NEW |