| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "sandbox/src/restricted_token_utils.h" | |
| 6 | |
| 7 // launcher.exe is an application used to launch another application with a | |
| 8 // restricted token. This is to be used for testing only. | |
| 9 // The parameters are the level of security of the primary token, the | |
| 10 // impersonation token and the job object along with the command line to | |
| 11 // execute. | |
| 12 // See the usage (launcher.exe without parameters) for the correct format. | |
| 13 | |
| 14 #define PARAM_IS(y) (argc > i) && (_wcsicmp(argv[i], y) == 0) | |
| 15 | |
| 16 void PrintUsage(const wchar_t *application_name) { | |
| 17 wprintf(L"\n\nUsage: \n %ls --main level --init level --job level cmd_line ", | |
| 18 application_name); | |
| 19 wprintf(L"\n\n Levels : \n\tLOCKDOWN \n\tRESTRICTED " | |
| 20 L"\n\tLIMITED_USER \n\tINTERACTIVE_USER \n\tNON_ADMIN \n\tUNPROTECTED"); | |
| 21 wprintf(L"\n\n main: Security level of the main token"); | |
| 22 wprintf(L"\n init: Security level of the impersonation token"); | |
| 23 wprintf(L"\n job: Security level of the job object"); | |
| 24 } | |
| 25 | |
| 26 bool GetTokenLevelFromString(const wchar_t *param, | |
| 27 sandbox::TokenLevel* level) { | |
| 28 if (_wcsicmp(param, L"LOCKDOWN") == 0) { | |
| 29 *level = sandbox::USER_LOCKDOWN; | |
| 30 } else if (_wcsicmp(param, L"RESTRICTED") == 0) { | |
| 31 *level = sandbox::USER_RESTRICTED; | |
| 32 } else if (_wcsicmp(param, L"LIMITED_USER") == 0) { | |
| 33 *level = sandbox::USER_LIMITED; | |
| 34 } else if (_wcsicmp(param, L"INTERACTIVE_USER") == 0) { | |
| 35 *level = sandbox::USER_INTERACTIVE; | |
| 36 } else if (_wcsicmp(param, L"NON_ADMIN") == 0) { | |
| 37 *level = sandbox::USER_NON_ADMIN; | |
| 38 } else if (_wcsicmp(param, L"USER_RESTRICTED_SAME_ACCESS") == 0) { | |
| 39 *level = sandbox::USER_RESTRICTED_SAME_ACCESS; | |
| 40 } else if (_wcsicmp(param, L"UNPROTECTED") == 0) { | |
| 41 *level = sandbox::USER_UNPROTECTED; | |
| 42 } else { | |
| 43 return false; | |
| 44 } | |
| 45 | |
| 46 return true; | |
| 47 } | |
| 48 | |
| 49 bool GetJobLevelFromString(const wchar_t *param, sandbox::JobLevel* level) { | |
| 50 if (_wcsicmp(param, L"LOCKDOWN") == 0) { | |
| 51 *level = sandbox::JOB_LOCKDOWN; | |
| 52 } else if (_wcsicmp(param, L"RESTRICTED") == 0) { | |
| 53 *level = sandbox::JOB_RESTRICTED; | |
| 54 } else if (_wcsicmp(param, L"LIMITED_USER") == 0) { | |
| 55 *level = sandbox::JOB_LIMITED_USER; | |
| 56 } else if (_wcsicmp(param, L"INTERACTIVE_USER") == 0) { | |
| 57 *level = sandbox::JOB_INTERACTIVE; | |
| 58 } else if (_wcsicmp(param, L"NON_ADMIN") == 0) { | |
| 59 wprintf(L"\nNON_ADMIN is not a supported job type"); | |
| 60 return false; | |
| 61 } else if (_wcsicmp(param, L"UNPROTECTED") == 0) { | |
| 62 *level = sandbox::JOB_UNPROTECTED; | |
| 63 } else { | |
| 64 return false; | |
| 65 } | |
| 66 | |
| 67 return true; | |
| 68 } | |
| 69 | |
| 70 int wmain(int argc, wchar_t *argv[]) { | |
| 71 // Extract the filename from the path. | |
| 72 wchar_t *app_name = wcsrchr(argv[0], L'\\'); | |
| 73 if (!app_name) { | |
| 74 app_name = argv[0]; | |
| 75 } else { | |
| 76 app_name++; | |
| 77 } | |
| 78 | |
| 79 // no argument | |
| 80 if (argc == 1) { | |
| 81 PrintUsage(app_name); | |
| 82 return -1; | |
| 83 } | |
| 84 | |
| 85 sandbox::TokenLevel primary_level = sandbox::USER_LOCKDOWN; | |
| 86 sandbox::TokenLevel impersonation_level = | |
| 87 sandbox::USER_RESTRICTED_SAME_ACCESS; | |
| 88 sandbox::JobLevel job_level = sandbox::JOB_LOCKDOWN; | |
| 89 ATL::CString command_line; | |
| 90 | |
| 91 // parse command line. | |
| 92 for (int i = 1; i < argc; ++i) { | |
| 93 if (PARAM_IS(L"--main")) { | |
| 94 i++; | |
| 95 if (argc > i) { | |
| 96 if (!GetTokenLevelFromString(argv[i], &primary_level)) { | |
| 97 wprintf(L"\nAbord, Unrecognized main token level \"%ls\"", argv[i]); | |
| 98 PrintUsage(app_name); | |
| 99 return -1; | |
| 100 } | |
| 101 } | |
| 102 } else if (PARAM_IS(L"--init")) { | |
| 103 i++; | |
| 104 if (argc > i) { | |
| 105 if (!GetTokenLevelFromString(argv[i], &impersonation_level)) { | |
| 106 wprintf(L"\nAbord, Unrecognized init token level \"%ls\"", argv[i]); | |
| 107 PrintUsage(app_name); | |
| 108 return -1; | |
| 109 } | |
| 110 } | |
| 111 } else if (PARAM_IS(L"--job")) { | |
| 112 i++; | |
| 113 if (argc > i) { | |
| 114 if (!GetJobLevelFromString(argv[i], &job_level)) { | |
| 115 wprintf(L"\nAbord, Unrecognized job security level \"%ls\"", argv[i]); | |
| 116 PrintUsage(app_name); | |
| 117 return -1; | |
| 118 } | |
| 119 } | |
| 120 } else { | |
| 121 if (command_line.GetLength()) { | |
| 122 command_line += L' '; | |
| 123 } | |
| 124 command_line += argv[i]; | |
| 125 } | |
| 126 } | |
| 127 | |
| 128 if (!command_line.GetLength()) { | |
| 129 wprintf(L"\nAbord, No command line specified"); | |
| 130 PrintUsage(app_name); | |
| 131 return -1; | |
| 132 } | |
| 133 | |
| 134 wprintf(L"\nLaunching command line: \"%ls\"\n", command_line.GetBuffer()); | |
| 135 | |
| 136 HANDLE job_handle; | |
| 137 DWORD err_code = sandbox::StartRestrictedProcessInJob( | |
| 138 command_line.GetBuffer(), | |
| 139 primary_level, | |
| 140 impersonation_level, | |
| 141 job_level, | |
| 142 &job_handle); | |
| 143 if (ERROR_SUCCESS != err_code) { | |
| 144 wprintf(L"\nAbord, Error %d while launching command line.", err_code); | |
| 145 return -1; | |
| 146 } | |
| 147 | |
| 148 wprintf(L"\nPress any key to continue."); | |
| 149 while(!_kbhit()) { | |
| 150 Sleep(100); | |
| 151 } | |
| 152 | |
| 153 ::CloseHandle(job_handle); | |
| 154 | |
| 155 return 0; | |
| 156 } | |
| OLD | NEW |