1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "FileSystemSecurity.h"
#include "FileSystemUtils.h"
#include "mozilla/ClearOnShutdown.h"
#include "mozilla/StaticPtr.h"
#include "mozilla/ipc/BackgroundParent.h"
using namespace mozilla::ipc;
namespace mozilla {
namespace dom {
namespace {
StaticRefPtr<FileSystemSecurity> gFileSystemSecurity;
} // anonymous
/* static */ already_AddRefed<FileSystemSecurity>
FileSystemSecurity::Get()
{
MOZ_ASSERT(NS_IsMainThread());
AssertIsInMainProcess();
RefPtr<FileSystemSecurity> service = gFileSystemSecurity.get();
return service.forget();
}
/* static */ already_AddRefed<FileSystemSecurity>
FileSystemSecurity::GetOrCreate()
{
MOZ_ASSERT(NS_IsMainThread());
AssertIsInMainProcess();
if (!gFileSystemSecurity) {
gFileSystemSecurity = new FileSystemSecurity();
ClearOnShutdown(&gFileSystemSecurity);
}
RefPtr<FileSystemSecurity> service = gFileSystemSecurity.get();
return service.forget();
}
FileSystemSecurity::FileSystemSecurity()
{
MOZ_ASSERT(NS_IsMainThread());
AssertIsInMainProcess();
}
FileSystemSecurity::~FileSystemSecurity()
{
MOZ_ASSERT(NS_IsMainThread());
AssertIsInMainProcess();
}
void
FileSystemSecurity::GrantAccessToContentProcess(ContentParentId aId,
const nsAString& aDirectoryPath)
{
MOZ_ASSERT(NS_IsMainThread());
AssertIsInMainProcess();
nsTArray<nsString>* paths;
if (!mPaths.Get(aId, &paths)) {
paths = new nsTArray<nsString>();
mPaths.Put(aId, paths);
} else if (paths->Contains(aDirectoryPath)) {
return;
}
paths->AppendElement(aDirectoryPath);
}
void
FileSystemSecurity::Forget(ContentParentId aId)
{
MOZ_ASSERT(NS_IsMainThread());
AssertIsInMainProcess();
mPaths.Remove(aId);
}
bool
FileSystemSecurity::ContentProcessHasAccessTo(ContentParentId aId,
const nsAString& aPath)
{
MOZ_ASSERT(NS_IsMainThread());
AssertIsInMainProcess();
#if defined(XP_WIN)
if (StringBeginsWith(aPath, NS_LITERAL_STRING("..\\")) ||
FindInReadable(NS_LITERAL_STRING("\\..\\"), aPath)) {
return false;
}
#elif defined(XP_UNIX)
if (StringBeginsWith(aPath, NS_LITERAL_STRING("../")) ||
FindInReadable(NS_LITERAL_STRING("/../"), aPath)) {
return false;
}
#endif
nsTArray<nsString>* paths;
if (!mPaths.Get(aId, &paths)) {
return false;
}
for (uint32_t i = 0, len = paths->Length(); i < len; ++i) {
if (FileSystemUtils::IsDescendantPath(paths->ElementAt(i), aPath)) {
return true;
}
}
return false;
}
} // dom namespace
} // mozilla namespace
|