OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef EXTENSIONS_BROWSER_PROCESS_MAP_H_ | 5 #ifndef EXTENSIONS_BROWSER_PROCESS_MAP_H_ |
6 #define EXTENSIONS_BROWSER_PROCESS_MAP_H_ | 6 #define EXTENSIONS_BROWSER_PROCESS_MAP_H_ |
7 | 7 |
8 #include <set> | 8 #include <set> |
9 #include <string> | 9 #include <string> |
10 | 10 |
(...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
88 | 88 |
89 bool Remove(const std::string& extension_id, int process_id, | 89 bool Remove(const std::string& extension_id, int process_id, |
90 int site_instance_id); | 90 int site_instance_id); |
91 int RemoveAllFromProcess(int process_id); | 91 int RemoveAllFromProcess(int process_id); |
92 | 92 |
93 bool Contains(const std::string& extension_id, int process_id) const; | 93 bool Contains(const std::string& extension_id, int process_id) const; |
94 bool Contains(int process_id) const; | 94 bool Contains(int process_id) const; |
95 | 95 |
96 std::set<std::string> GetExtensionsInProcess(int process_id) const; | 96 std::set<std::string> GetExtensionsInProcess(int process_id) const; |
97 | 97 |
98 // Guesses the most permissive context type for the process with ID | 98 // Gets the most likely context type for the process with ID |process_id| |
99 // |process_id|. Context types are renderer (JavaScript) concepts but the | 99 // which hosts Extension |extension|, if any (may be NULL). Context types are |
100 // browser can do a decent job in guessing what the process hosts. | 100 // renderer (JavaScript) concepts but the browser can do a decent job in |
| 101 // guessing what the process hosts. |
101 // | 102 // |
| 103 // |extension| is the funky part - unfortunately we need to trust the |
| 104 // caller of this method to be correct that indeed the context does feature |
| 105 // an extension. This matters for iframes, where an extension could be |
| 106 // hosted in another extension's process (privilege level needs to be |
| 107 // downgraded) or in a web page's process (privilege level needs to be |
| 108 // upgraded). |
| 109 // |
| 110 // The latter of these is slightly problematic from a security perspective; |
| 111 // if a web page renderer gets owned it could try to pretend it's an |
| 112 // extension and get access to some unprivileged APIs. Luckly, when OOP |
| 113 // iframes lauch, it won't be an issue. |
| 114 // |
| 115 // Anyhow, the expected behaviour is: |
102 // - For hosted app processes, this will be blessed_web_page. | 116 // - For hosted app processes, this will be blessed_web_page. |
103 // - For other extension processes, this will be blessed_extension. | 117 // - For other extension processes, this will be blessed_extension. |
104 // - For WebUI processes, this will be a webui. | 118 // - For WebUI processes, this will be a webui. |
105 // - For anything else we have the choice of unblessed_extension or | 119 // - For any other extension we have the choice of unblessed_extension or |
106 // content_script. Since content scripts are more common, guess that. | 120 // content_script. Since content scripts are more common, guess that. |
107 // We *could* in theory track which web processes have extension frames | 121 // We *could* in theory track which web processes have extension frames |
108 // in them, and those would be unblessed_extension, but we don't at the | 122 // in them, and those would be unblessed_extension, but we don't at the |
109 // moment, and once OOP iframes exist then there won't even be such a | 123 // moment, and once OOP iframes exist then there won't even be such a |
110 // thing as an unblessed_extension context. | 124 // thing as an unblessed_extension context. |
111 // | 125 // - For anything else, web_page. |
112 // |extension| isn't used to upgrade the process trust level, but rather used | 126 Feature::Context GetMostLikelyContextType(const Extension* extension, |
113 // as a tiebreaker if a process is found to contain multiple extensions. | 127 int process_id) const; |
114 Feature::Context GuessContextType(const Extension* extension, | |
115 int process_id) const; | |
116 | 128 |
117 private: | 129 private: |
118 struct Item; | 130 struct Item; |
119 | 131 |
120 typedef std::set<Item> ItemSet; | 132 typedef std::set<Item> ItemSet; |
121 ItemSet items_; | 133 ItemSet items_; |
122 | 134 |
123 DISALLOW_COPY_AND_ASSIGN(ProcessMap); | 135 DISALLOW_COPY_AND_ASSIGN(ProcessMap); |
124 }; | 136 }; |
125 | 137 |
126 } // namespace extensions | 138 } // namespace extensions |
127 | 139 |
128 #endif // EXTENSIONS_BROWSER_PROCESS_MAP_H_ | 140 #endif // EXTENSIONS_BROWSER_PROCESS_MAP_H_ |
OLD | NEW |