Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(892)

Side by Side Diff: content/public/browser/child_process_security_policy.h

Issue 2437753003: Tighten IO thread blob/filesystem URL checks for apps with webview permission. (Closed)
Patch Set: arraysize Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « content/browser/child_process_security_policy_impl.cc ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ 5 #ifndef CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_
6 #define CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ 6 #define CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_
7 7
8 #include <string> 8 #include <string>
9 9
10 #include "content/common/content_export.h" 10 #include "content/common/content_export.h"
(...skipping 181 matching lines...) Expand 10 before | Expand all | Expand 10 after
192 virtual bool HasWebUIBindings(int child_id) = 0; 192 virtual bool HasWebUIBindings(int child_id) = 0;
193 193
194 // Grants permission to send system exclusive message to any MIDI devices. 194 // Grants permission to send system exclusive message to any MIDI devices.
195 virtual void GrantSendMidiSysExMessage(int child_id) = 0; 195 virtual void GrantSendMidiSysExMessage(int child_id) = 0;
196 196
197 // Returns true if the process is permitted to read and modify the data for 197 // Returns true if the process is permitted to read and modify the data for
198 // the given origin. This is currently used for cookies and passwords. 198 // the given origin. This is currently used for cookies and passwords.
199 // Does not affect cookies attached to or set by network requests. 199 // Does not affect cookies attached to or set by network requests.
200 // Only might return false if the --site-per-process flag is used. 200 // Only might return false if the --site-per-process flag is used.
201 virtual bool CanAccessDataForOrigin(int child_id, const GURL& gurl) = 0; 201 virtual bool CanAccessDataForOrigin(int child_id, const GURL& gurl) = 0;
202
203 // Returns true if GrantOrigin was called earlier with the same parameters.
204 //
205 // TODO(alexmos): This currently exists to support checking whether a
206 // <webview> guest process has permission to request blob URLs in its
207 // embedder's origin on the IO thread. This should be removed once that
208 // check is superseded by a UI thread check. See https://crbug.com/656752.
209 virtual bool HasSpecificPermissionForOrigin(int child_id,
210 const url::Origin& origin) = 0;
202 }; 211 };
203 212
204 } // namespace content 213 } // namespace content
205 214
206 #endif // CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_ 215 #endif // CONTENT_PUBLIC_BROWSER_CHILD_PROCESS_SECURITY_POLICY_H_
OLDNEW
« no previous file with comments | « content/browser/child_process_security_policy_impl.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698