2012-12-22 11:53:38 +00:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*-
|
|
|
|
* vim: sw=2 ts=8 et :
|
|
|
|
*/
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#ifndef mozilla_AppProcessChecker_h
|
|
|
|
#define mozilla_AppProcessChecker_h
|
|
|
|
|
2013-11-05 10:14:46 +00:00
|
|
|
#include <stdint.h>
|
|
|
|
|
|
|
|
class nsIPrincipal;
|
|
|
|
|
2012-12-22 11:53:38 +00:00
|
|
|
namespace mozilla {
|
|
|
|
|
|
|
|
namespace dom {
|
|
|
|
class PBrowserParent;
|
|
|
|
class PContentParent;
|
|
|
|
}
|
|
|
|
|
|
|
|
namespace hal_sandbox {
|
|
|
|
class PHalParent;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum AssertAppProcessType {
|
|
|
|
ASSERT_APP_PROCESS_PERMISSION,
|
2013-01-14 10:08:55 +00:00
|
|
|
ASSERT_APP_PROCESS_MANIFEST_URL,
|
|
|
|
ASSERT_APP_HAS_PERMISSION
|
2012-12-22 11:53:38 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
2013-12-05 23:12:23 +00:00
|
|
|
* Return true if the specified browser has the specified capability.
|
2012-12-22 11:53:38 +00:00
|
|
|
* If this returns false, the browser didn't have the capability and
|
|
|
|
* will be killed.
|
|
|
|
*/
|
|
|
|
bool
|
|
|
|
AssertAppProcess(mozilla::dom::PBrowserParent* aActor,
|
|
|
|
AssertAppProcessType aType,
|
|
|
|
const char* aCapability);
|
|
|
|
|
2013-12-05 23:12:23 +00:00
|
|
|
/**
|
|
|
|
* Return true if the specified app has the specified status.
|
|
|
|
* If this returns false, the browser will be killed.
|
|
|
|
*/
|
2013-06-29 10:52:16 +00:00
|
|
|
bool
|
|
|
|
AssertAppStatus(mozilla::dom::PBrowserParent* aActor,
|
|
|
|
unsigned short aStatus);
|
|
|
|
|
2012-12-22 11:53:38 +00:00
|
|
|
/**
|
2013-12-05 23:12:23 +00:00
|
|
|
* Return true if any of the PBrowsers loaded in this content process
|
2012-12-22 11:53:38 +00:00
|
|
|
* has the specified capability. If this returns false, the process
|
|
|
|
* didn't have the capability and will be killed.
|
|
|
|
*/
|
|
|
|
bool
|
|
|
|
AssertAppProcess(mozilla::dom::PContentParent* aActor,
|
|
|
|
AssertAppProcessType aType,
|
|
|
|
const char* aCapability);
|
|
|
|
|
2013-12-05 23:12:23 +00:00
|
|
|
/**
|
|
|
|
* Return true if any of the PBrowsers loaded in this content process
|
|
|
|
* has an app with the specified status. If this returns false, the process
|
|
|
|
* didn't have the status and will be killed.
|
|
|
|
*/
|
2013-06-29 10:52:16 +00:00
|
|
|
bool
|
|
|
|
AssertAppStatus(mozilla::dom::PContentParent* aActor,
|
|
|
|
unsigned short aStatus);
|
|
|
|
|
2012-12-22 11:53:38 +00:00
|
|
|
bool
|
|
|
|
AssertAppProcess(mozilla::hal_sandbox::PHalParent* aActor,
|
|
|
|
AssertAppProcessType aType,
|
|
|
|
const char* aCapability);
|
|
|
|
|
|
|
|
// NB: when adding capability checks for other IPDL actors, please add
|
|
|
|
// them to this file and have them delegate to the two functions above
|
|
|
|
// as appropriate. For example,
|
|
|
|
//
|
|
|
|
// bool AppProcessHasCapability(PNeckoParent* aActor, AssertAppProcessType aType) {
|
|
|
|
// return AssertAppProcess(aActor->Manager(), aType);
|
|
|
|
// }
|
|
|
|
|
2013-11-05 10:14:46 +00:00
|
|
|
bool
|
|
|
|
AssertAppPrincipal(mozilla::dom::PContentParent* aParent,
|
|
|
|
nsIPrincipal* aPrincipal);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if the specified principal is valid, and return the saved permission
|
|
|
|
* value for permission `aPermission' on that principal.
|
|
|
|
* See nsIPermissionManager.idl for possible return values.
|
|
|
|
*
|
|
|
|
* nsIPermissionManager::UNKNOWN_ACTION is retuned if the principal is invalid.
|
|
|
|
*/
|
|
|
|
uint32_t
|
|
|
|
CheckPermission(mozilla::dom::PContentParent* aParent,
|
|
|
|
nsIPrincipal* aPrincipal, const char* aPermission);
|
|
|
|
|
2012-12-22 11:53:38 +00:00
|
|
|
/**
|
|
|
|
* Inline function for asserting the process's permission.
|
|
|
|
*/
|
|
|
|
template<typename T>
|
|
|
|
inline bool
|
|
|
|
AssertAppProcessPermission(T* aActor,
|
|
|
|
const char* aPermission) {
|
|
|
|
return AssertAppProcess(aActor,
|
|
|
|
ASSERT_APP_PROCESS_PERMISSION,
|
|
|
|
aPermission);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Inline function for asserting the process's manifest URL.
|
|
|
|
*/
|
|
|
|
template<typename T>
|
|
|
|
inline bool
|
|
|
|
AssertAppProcessManifestURL(T* aActor,
|
|
|
|
const char* aManifestURL) {
|
|
|
|
return AssertAppProcess(aActor,
|
|
|
|
ASSERT_APP_PROCESS_MANIFEST_URL,
|
|
|
|
aManifestURL);
|
|
|
|
}
|
|
|
|
|
2013-01-14 10:08:55 +00:00
|
|
|
/**
|
|
|
|
* Inline function for asserting the process's manifest URL.
|
|
|
|
*/
|
|
|
|
template<typename T>
|
|
|
|
inline bool
|
|
|
|
AssertAppHasPermission(T* aActor,
|
|
|
|
const char* aPermission) {
|
|
|
|
return AssertAppProcess(aActor,
|
|
|
|
ASSERT_APP_HAS_PERMISSION,
|
|
|
|
aPermission);
|
|
|
|
}
|
|
|
|
|
2013-06-29 10:52:16 +00:00
|
|
|
template<typename T>
|
|
|
|
inline bool
|
|
|
|
AssertAppHasStatus(T* aActor,
|
|
|
|
unsigned short aStatus) {
|
|
|
|
return AssertAppStatus(aActor, aStatus);
|
|
|
|
}
|
|
|
|
|
2012-12-22 11:53:38 +00:00
|
|
|
} // namespace mozilla
|
|
|
|
|
|
|
|
#endif // mozilla_AppProcessChecker_h
|