diff -r 000000000000 -r 6474c204b198 security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp Wed Dec 31 06:09:35 2014 +0100 @@ -0,0 +1,85 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim: set ts=2 et sw=2 tw=80: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "sandboxBroker.h" +#include "sandbox/win/src/sandbox.h" +#include "sandbox/win/src/sandbox_factory.h" + +namespace mozilla +{ + +sandbox::BrokerServices *SandboxBroker::sBrokerService = nullptr; + +SandboxBroker::SandboxBroker() +{ + if (!sBrokerService) { + sBrokerService = sandbox::SandboxFactory::GetBrokerServices(); + if (sBrokerService) { + sandbox::ResultCode result = sBrokerService->Init(); + if (result != sandbox::SBOX_ALL_OK) { + sBrokerService = nullptr; + } + } + } + + // We'll start to increase the restrictions over time. + mPolicy = sBrokerService->CreatePolicy(); +} + +bool +SandboxBroker::AllowPipe(const wchar_t *aPath) +{ + return mPolicy->AddRule(sandbox::TargetPolicy::SUBSYS_NAMED_PIPES, + sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY, aPath); +} + +bool +SandboxBroker::LaunchApp(const wchar_t *aPath, + const wchar_t *aArguments, + void **aProcessHandle) +{ + // If the broker service isn't already initialized, do it now + if (!sBrokerService || !mPolicy) { + return false; + } + + // Setup the sandbox policy, this is initially: + // Low integrity, unrestricted, in the same window station, within the + // same desktop, and has no job object. + // We'll start to increase the restrictions over time. + mPolicy->SetJobLevel(sandbox::JOB_NONE, 0); + mPolicy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS, + sandbox::USER_RESTRICTED_SAME_ACCESS); + mPolicy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW); + + // Set an alternate Desktop within a new window station + mPolicy->SetAlternateDesktop(false); + + // Ceate the sandboxed process + PROCESS_INFORMATION targetInfo; + sandbox::ResultCode result; + result = sBrokerService->SpawnTarget(aPath, aArguments, mPolicy, &targetInfo); + + // The sandboxed process is started in a suspended state, resumeit now that + // we'eve set things up. + ResumeThread(targetInfo.hThread); + CloseHandle(targetInfo.hThread); + + // Return the process handle to the caller + *aProcessHandle = targetInfo.hProcess; + + return true; +} + +SandboxBroker::~SandboxBroker() +{ + if (mPolicy) { + mPolicy->Release(); + mPolicy = nullptr; + } +} + +}