OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/browser/child_process_security_policy_impl.h" | 5 #include "content/browser/child_process_security_policy_impl.h" |
6 | 6 |
7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
8 #include "base/files/file_path.h" | 8 #include "base/files/file_path.h" |
9 #include "base/logging.h" | 9 #include "base/logging.h" |
10 #include "base/metrics/histogram.h" | 10 #include "base/metrics/histogram.h" |
(...skipping 273 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
284 GURL origin_lock_; | 284 GURL origin_lock_; |
285 | 285 |
286 // The set of isolated filesystems the child process is permitted to access. | 286 // The set of isolated filesystems the child process is permitted to access. |
287 FileSystemMap filesystem_permissions_; | 287 FileSystemMap filesystem_permissions_; |
288 | 288 |
289 DISALLOW_COPY_AND_ASSIGN(SecurityState); | 289 DISALLOW_COPY_AND_ASSIGN(SecurityState); |
290 }; | 290 }; |
291 | 291 |
292 ChildProcessSecurityPolicyImpl::ChildProcessSecurityPolicyImpl() { | 292 ChildProcessSecurityPolicyImpl::ChildProcessSecurityPolicyImpl() { |
293 // We know about these schemes and believe them to be safe. | 293 // We know about these schemes and believe them to be safe. |
294 RegisterWebSafeScheme(chrome::kHttpScheme); | 294 RegisterWebSafeScheme(kHttpScheme); |
295 RegisterWebSafeScheme(kHttpsScheme); | 295 RegisterWebSafeScheme(kHttpsScheme); |
296 RegisterWebSafeScheme(chrome::kFtpScheme); | 296 RegisterWebSafeScheme(chrome::kFtpScheme); |
297 RegisterWebSafeScheme(chrome::kDataScheme); | 297 RegisterWebSafeScheme(chrome::kDataScheme); |
298 RegisterWebSafeScheme("feed"); | 298 RegisterWebSafeScheme("feed"); |
299 RegisterWebSafeScheme(chrome::kBlobScheme); | 299 RegisterWebSafeScheme(chrome::kBlobScheme); |
300 RegisterWebSafeScheme(chrome::kFileSystemScheme); | 300 RegisterWebSafeScheme(chrome::kFileSystemScheme); |
301 | 301 |
302 // We know about the following pseudo schemes and treat them specially. | 302 // We know about the following pseudo schemes and treat them specially. |
303 RegisterPseudoScheme(chrome::kAboutScheme); | 303 RegisterPseudoScheme(chrome::kAboutScheme); |
304 RegisterPseudoScheme(kJavaScriptScheme); | 304 RegisterPseudoScheme(kJavaScriptScheme); |
(...skipping 549 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
854 base::AutoLock lock(lock_); | 854 base::AutoLock lock(lock_); |
855 | 855 |
856 SecurityStateMap::iterator state = security_state_.find(child_id); | 856 SecurityStateMap::iterator state = security_state_.find(child_id); |
857 if (state == security_state_.end()) | 857 if (state == security_state_.end()) |
858 return false; | 858 return false; |
859 | 859 |
860 return state->second->can_send_midi_sysex(); | 860 return state->second->can_send_midi_sysex(); |
861 } | 861 } |
862 | 862 |
863 } // namespace content | 863 } // namespace content |
OLD | NEW |