diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /dom/filesystem/FileSystemSecurity.cpp | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'dom/filesystem/FileSystemSecurity.cpp')
-rw-r--r-- | dom/filesystem/FileSystemSecurity.cpp | 119 |
1 files changed, 119 insertions, 0 deletions
diff --git a/dom/filesystem/FileSystemSecurity.cpp b/dom/filesystem/FileSystemSecurity.cpp new file mode 100644 index 000000000..b3d425817 --- /dev/null +++ b/dom/filesystem/FileSystemSecurity.cpp @@ -0,0 +1,119 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim: set ts=8 sts=2 et sw=2 tw=80: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "FileSystemSecurity.h" +#include "FileSystemUtils.h" +#include "mozilla/ClearOnShutdown.h" +#include "mozilla/StaticPtr.h" + +namespace mozilla { +namespace dom { + +namespace { + +StaticRefPtr<FileSystemSecurity> gFileSystemSecurity; + +} // anonymous + +/* static */ already_AddRefed<FileSystemSecurity> +FileSystemSecurity::Get() +{ + MOZ_ASSERT(NS_IsMainThread()); + AssertIsInMainProcess(); + + RefPtr<FileSystemSecurity> service = gFileSystemSecurity.get(); + return service.forget(); +} + +/* static */ already_AddRefed<FileSystemSecurity> +FileSystemSecurity::GetOrCreate() +{ + MOZ_ASSERT(NS_IsMainThread()); + AssertIsInMainProcess(); + + if (!gFileSystemSecurity) { + gFileSystemSecurity = new FileSystemSecurity(); + ClearOnShutdown(&gFileSystemSecurity); + } + + RefPtr<FileSystemSecurity> service = gFileSystemSecurity.get(); + return service.forget(); +} + +FileSystemSecurity::FileSystemSecurity() +{ + MOZ_ASSERT(NS_IsMainThread()); + AssertIsInMainProcess(); +} + +FileSystemSecurity::~FileSystemSecurity() +{ + MOZ_ASSERT(NS_IsMainThread()); + AssertIsInMainProcess(); +} + +void +FileSystemSecurity::GrantAccessToContentProcess(ContentParentId aId, + const nsAString& aDirectoryPath) +{ + MOZ_ASSERT(NS_IsMainThread()); + AssertIsInMainProcess(); + + nsTArray<nsString>* paths; + if (!mPaths.Get(aId, &paths)) { + paths = new nsTArray<nsString>(); + mPaths.Put(aId, paths); + } else if (paths->Contains(aDirectoryPath)) { + return; + } + + paths->AppendElement(aDirectoryPath); +} + +void +FileSystemSecurity::Forget(ContentParentId aId) +{ + MOZ_ASSERT(NS_IsMainThread()); + AssertIsInMainProcess(); + + mPaths.Remove(aId); +} + +bool +FileSystemSecurity::ContentProcessHasAccessTo(ContentParentId aId, + const nsAString& aPath) +{ + MOZ_ASSERT(NS_IsMainThread()); + AssertIsInMainProcess(); + +#if defined(XP_WIN) + if (StringBeginsWith(aPath, NS_LITERAL_STRING("..\\")) || + FindInReadable(NS_LITERAL_STRING("\\..\\"), aPath)) { + return false; + } +#elif defined(XP_UNIX) + if (StringBeginsWith(aPath, NS_LITERAL_STRING("../")) || + FindInReadable(NS_LITERAL_STRING("/../"), aPath)) { + return false; + } +#endif + + nsTArray<nsString>* paths; + if (!mPaths.Get(aId, &paths)) { + return false; + } + + for (uint32_t i = 0, len = paths->Length(); i < len; ++i) { + if (FileSystemUtils::IsDescendantPath(paths->ElementAt(i), aPath)) { + return true; + } + } + + return false; +} + +} // dom namespace +} // mozilla namespace |