OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ | 5 #ifndef CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ |
6 #define CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ | 6 #define CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #include "content/common/content_export.h" | 10 #include "content/common/content_export.h" |
(...skipping 181 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
192 virtual bool HasWebUIBindings(int child_id) = 0; | 192 virtual bool HasWebUIBindings(int child_id) = 0; |
193 | 193 |
194 // Grants permission to send system exclusive message to any MIDI devices. | 194 // Grants permission to send system exclusive message to any MIDI devices. |
195 virtual void GrantSendMidiSysExMessage(int child_id) = 0; | 195 virtual void GrantSendMidiSysExMessage(int child_id) = 0; |
196 | 196 |
197 // Returns true if the process is permitted to read and modify the data for | 197 // Returns true if the process is permitted to read and modify the data for |
198 // the given origin. This is currently used for cookies and passwords. | 198 // the given origin. This is currently used for cookies and passwords. |
199 // Does not affect cookies attached to or set by network requests. | 199 // Does not affect cookies attached to or set by network requests. |
200 // Only might return false if the --site-per-process flag is used. | 200 // Only might return false if the --site-per-process flag is used. |
201 virtual bool CanAccessDataForOrigin(int child_id, const GURL& gurl) = 0; | 201 virtual bool CanAccessDataForOrigin(int child_id, const GURL& gurl) = 0; |
| 202 |
| 203 // Returns true if GrantOrigin was called earlier with the same parameters. |
| 204 // |
| 205 // TODO(alexmos): This currently exists to support checking whether a |
| 206 // <webview> guest process has permission to request blob URLs in its |
| 207 // embedder's origin on the IO thread. This should be removed once that |
| 208 // check is superseded by a UI thread check. See https://crbug.com/656752. |
| 209 virtual bool HasSpecificPermissionForOrigin(int child_id, |
| 210 const url::Origin& origin) = 0; |
202 }; | 211 }; |
203 | 212 |
204 } // namespace content | 213 } // namespace content |
205 | 214 |
206 #endif // CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ | 215 #endif // CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ |
OLD | NEW |