summaryrefslogtreecommitdiffstats
path: root/security/sandbox/win/src/sandboxtarget/sandboxTarget.h
diff options
context:
space:
mode:
Diffstat (limited to 'security/sandbox/win/src/sandboxtarget/sandboxTarget.h')
-rw-r--r--security/sandbox/win/src/sandboxtarget/sandboxTarget.h83
1 files changed, 83 insertions, 0 deletions
diff --git a/security/sandbox/win/src/sandboxtarget/sandboxTarget.h b/security/sandbox/win/src/sandboxtarget/sandboxTarget.h
new file mode 100644
index 000000000..f46a2ce70
--- /dev/null
+++ b/security/sandbox/win/src/sandboxtarget/sandboxTarget.h
@@ -0,0 +1,83 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#ifndef __SECURITY_SANDBOX_SANDBOXTARGET_H__
+#define __SECURITY_SANDBOX_SANDBOXTARGET_H__
+
+#include <windows.h>
+
+#include "mozilla/Assertions.h"
+#include "base/MissingBasicTypes.h"
+#include "sandbox/win/src/sandbox.h"
+
+namespace mozilla {
+
+class SandboxTarget
+{
+public:
+ /**
+ * Obtains a pointer to the singleton instance
+ */
+ static SandboxTarget* Instance();
+
+ /**
+ * Used by the application to pass in the target services that provide certain
+ * functions to the sandboxed code.
+ * The target services must already be initialized.
+ *
+ * @param aTargetServices The target services that will be used
+ */
+ void SetTargetServices(sandbox::TargetServices* aTargetServices)
+ {
+ MOZ_ASSERT(aTargetServices);
+ MOZ_ASSERT(!mTargetServices,
+ "Sandbox TargetServices must only be set once.");
+
+ mTargetServices = aTargetServices;
+ }
+
+ /**
+ * Called by the library that wants to "start" the sandbox, i.e. change to the
+ * more secure delayed / lockdown policy.
+ */
+ void StartSandbox()
+ {
+ if (mTargetServices) {
+ mTargetServices->LowerToken();
+ }
+ }
+
+ /**
+ * Used to duplicate handles via the broker process. The permission for the
+ * handle type and target process has to have been set on the sandbox policy.
+ */
+ bool BrokerDuplicateHandle(HANDLE aSourceHandle, DWORD aTargetProcessId,
+ HANDLE* aTargetHandle, DWORD aDesiredAccess,
+ DWORD aOptions)
+ {
+ if (!mTargetServices) {
+ return false;
+ }
+
+ sandbox::ResultCode result =
+ mTargetServices->DuplicateHandle(aSourceHandle, aTargetProcessId,
+ aTargetHandle, aDesiredAccess, aOptions);
+ return (sandbox::SBOX_ALL_OK == result);
+ }
+
+protected:
+ SandboxTarget() :
+ mTargetServices(nullptr)
+ {
+ }
+
+ sandbox::TargetServices* mTargetServices;
+};
+
+
+} // mozilla
+
+#endif