| Index: sandbox/src/security_level.h
|
| diff --git a/sandbox/src/security_level.h b/sandbox/src/security_level.h
|
| deleted file mode 100644
|
| index 467f96f94215cc05f0b18e3c46aad2146882f323..0000000000000000000000000000000000000000
|
| --- a/sandbox/src/security_level.h
|
| +++ /dev/null
|
| @@ -1,127 +0,0 @@
|
| -// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#ifndef SANDBOX_SRC_SECURITY_LEVEL_H_
|
| -#define SANDBOX_SRC_SECURITY_LEVEL_H_
|
| -
|
| -namespace sandbox {
|
| -
|
| -// List of all the integrity levels supported in the sandbox. This is used
|
| -// only on Windows Vista. You can't set the integrity level of the process
|
| -// in the sandbox to a level higher than yours.
|
| -enum IntegrityLevel {
|
| - INTEGRITY_LEVEL_SYSTEM,
|
| - INTEGRITY_LEVEL_HIGH,
|
| - INTEGRITY_LEVEL_MEDIUM,
|
| - INTEGRITY_LEVEL_MEDIUM_LOW,
|
| - INTEGRITY_LEVEL_LOW,
|
| - INTEGRITY_LEVEL_BELOW_LOW,
|
| - INTEGRITY_LEVEL_UNTRUSTED,
|
| - INTEGRITY_LEVEL_LAST
|
| -};
|
| -
|
| -// The Token level specifies a set of security profiles designed to
|
| -// provide the bulk of the security of sandbox.
|
| -//
|
| -// TokenLevel |Restricting |Deny Only |Privileges|
|
| -// |Sids |Sids | |
|
| -// ----------------------------|--------------|----------------|----------|
|
| -// USER_LOCKDOWN | Null Sid | All | None |
|
| -// ----------------------------|--------------|----------------|----------|
|
| -// USER_RESTRICTED | RESTRICTED | All | Traverse |
|
| -// ----------------------------|--------------|----------------|----------|
|
| -// USER_LIMITED | Users | All except: | Traverse |
|
| -// | Everyone | Users | |
|
| -// | RESTRICTED | Everyone | |
|
| -// | | Interactive | |
|
| -// ----------------------------|--------------|----------------|----------|
|
| -// USER_INTERACTIVE | Users | All except: | Traverse |
|
| -// | Everyone | Users | |
|
| -// | RESTRICTED | Everyone | |
|
| -// | Owner | Interactive | |
|
| -// | | Local | |
|
| -// | | Authent-users | |
|
| -// | | User | |
|
| -// ----------------------------|--------------|----------------|----------|
|
| -// USER_NON_ADMIN | None | All except: | Traverse |
|
| -// | | Users | |
|
| -// | | Everyone | |
|
| -// | | Interactive | |
|
| -// | | Local | |
|
| -// | | Authent-users | |
|
| -// | | User | |
|
| -// ----------------------------|--------------|----------------|----------|
|
| -// USER_RESTRICTED_SAME_ACCESS | All | None | All |
|
| -// ----------------------------|--------------|----------------|----------|
|
| -// USER_UNPROTECTED | None | None | All |
|
| -// ----------------------------|--------------|----------------|----------|
|
| -//
|
| -// The above restrictions are actually a transformation that is applied to
|
| -// the existing broker process token. The resulting token that will be
|
| -// applied to the target process depends both on the token level selected
|
| -// and on the broker token itself.
|
| -//
|
| -// The LOCKDOWN and RESTRICTED are designed to allow access to almost
|
| -// nothing that has security associated with and they are the recommended
|
| -// levels to run sandboxed code specially if there is a chance that the
|
| -// broker is process might be started by a user that belongs to the Admins
|
| -// or power users groups.
|
| -enum TokenLevel {
|
| - USER_LOCKDOWN = 0,
|
| - USER_RESTRICTED,
|
| - USER_LIMITED,
|
| - USER_INTERACTIVE,
|
| - USER_NON_ADMIN,
|
| - USER_RESTRICTED_SAME_ACCESS,
|
| - USER_UNPROTECTED
|
| -};
|
| -
|
| -// The Job level specifies a set of decreasing security profiles for the
|
| -// Job object that the target process will be placed into.
|
| -// This table summarizes the security associated with each level:
|
| -//
|
| -// JobLevel |General |Quota |
|
| -// |restrictions |restrictions |
|
| -// -----------------|---------------------------------- |--------------------|
|
| -// JOB_UNPROTECTED | None | *Kill on Job close.|
|
| -// -----------------|---------------------------------- |--------------------|
|
| -// JOB_INTERACTIVE | *Forbid system-wide changes using | |
|
| -// | SystemParametersInfo(). | *Kill on Job close.|
|
| -// | *Forbid the creation/switch of | |
|
| -// | Desktops. | |
|
| -// | *Forbids calls to ExitWindows(). | |
|
| -// -----------------|---------------------------------- |--------------------|
|
| -// JOB_LIMITED_USER | Same as INTERACTIVE_USER plus: | *One active process|
|
| -// | *Forbid changes to the display | limit. |
|
| -// | settings. | *Kill on Job close.|
|
| -// -----------------|---------------------------------- |--------------------|
|
| -// JOB_RESTRICTED | Same as LIMITED_USER plus: | *One active process|
|
| -// | * No read/write to the clipboard. | limit. |
|
| -// | * No access to User Handles that | *Kill on Job close.|
|
| -// | belong to other processes. | |
|
| -// | * Forbid message broadcasts. | |
|
| -// | * Forbid setting global hooks. | |
|
| -// | * No access to the global atoms | |
|
| -// | table. | |
|
| -// -----------------|-----------------------------------|--------------------|
|
| -// JOB_LOCKDOWN | Same as RESTRICTED | *One active process|
|
| -// | | limit. |
|
| -// | | *Kill on Job close.|
|
| -// | | *Kill on unhandled |
|
| -// | | exception. |
|
| -// | | |
|
| -// In the context of the above table, 'user handles' refers to the handles of
|
| -// windows, bitmaps, menus, etc. Files, treads and registry handles are kernel
|
| -// handles and are not affected by the job level settings.
|
| -enum JobLevel {
|
| - JOB_LOCKDOWN = 0,
|
| - JOB_RESTRICTED,
|
| - JOB_LIMITED_USER,
|
| - JOB_INTERACTIVE,
|
| - JOB_UNPROTECTED
|
| -};
|
| -
|
| -} // namespace sandbox
|
| -
|
| -#endif // SANDBOX_SRC_SECURITY_LEVEL_H_
|
|
|