Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(733)

Side by Side Diff: content/browser/child_process_security_policy_impl.cc

Issue 23112033: content: Move kHttpsScheme constant into content namespace. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 7 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/browser/child_process_security_policy_impl.h" 5 #include "content/browser/child_process_security_policy_impl.h"
6 6
7 #include "base/command_line.h" 7 #include "base/command_line.h"
8 #include "base/files/file_path.h" 8 #include "base/files/file_path.h"
9 #include "base/logging.h" 9 #include "base/logging.h"
10 #include "base/metrics/histogram.h" 10 #include "base/metrics/histogram.h"
(...skipping 262 matching lines...) Expand 10 before | Expand all | Expand 10 after
273 273
274 // The set of isolated filesystems the child process is permitted to access. 274 // The set of isolated filesystems the child process is permitted to access.
275 FileSystemMap filesystem_permissions_; 275 FileSystemMap filesystem_permissions_;
276 276
277 DISALLOW_COPY_AND_ASSIGN(SecurityState); 277 DISALLOW_COPY_AND_ASSIGN(SecurityState);
278 }; 278 };
279 279
280 ChildProcessSecurityPolicyImpl::ChildProcessSecurityPolicyImpl() { 280 ChildProcessSecurityPolicyImpl::ChildProcessSecurityPolicyImpl() {
281 // We know about these schemes and believe them to be safe. 281 // We know about these schemes and believe them to be safe.
282 RegisterWebSafeScheme(chrome::kHttpScheme); 282 RegisterWebSafeScheme(chrome::kHttpScheme);
283 RegisterWebSafeScheme(chrome::kHttpsScheme); 283 RegisterWebSafeScheme(kHttpsScheme);
284 RegisterWebSafeScheme(chrome::kFtpScheme); 284 RegisterWebSafeScheme(chrome::kFtpScheme);
285 RegisterWebSafeScheme(chrome::kDataScheme); 285 RegisterWebSafeScheme(chrome::kDataScheme);
286 RegisterWebSafeScheme("feed"); 286 RegisterWebSafeScheme("feed");
287 RegisterWebSafeScheme(chrome::kBlobScheme); 287 RegisterWebSafeScheme(chrome::kBlobScheme);
288 RegisterWebSafeScheme(chrome::kFileSystemScheme); 288 RegisterWebSafeScheme(chrome::kFileSystemScheme);
289 289
290 // We know about the following pseudo schemes and treat them specially. 290 // We know about the following pseudo schemes and treat them specially.
291 RegisterPseudoScheme(chrome::kAboutScheme); 291 RegisterPseudoScheme(chrome::kAboutScheme);
292 RegisterPseudoScheme(kJavaScriptScheme); 292 RegisterPseudoScheme(kJavaScriptScheme);
293 RegisterPseudoScheme(kViewSourceScheme); 293 RegisterPseudoScheme(kViewSourceScheme);
(...skipping 528 matching lines...) Expand 10 before | Expand all | Expand 10 after
822 } 822 }
823 823
824 void ChildProcessSecurityPolicyImpl::RegisterFileSystemPermissionPolicy( 824 void ChildProcessSecurityPolicyImpl::RegisterFileSystemPermissionPolicy(
825 fileapi::FileSystemType type, 825 fileapi::FileSystemType type,
826 int policy) { 826 int policy) {
827 base::AutoLock lock(lock_); 827 base::AutoLock lock(lock_);
828 file_system_policy_map_[type] = policy; 828 file_system_policy_map_[type] = policy;
829 } 829 }
830 830
831 } // namespace content 831 } // namespace content
OLDNEW
« no previous file with comments | « content/browser/browser_url_handler_impl.cc ('k') | content/browser/child_process_security_policy_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698