Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2869)

Unified Diff: sandbox/mac/seatbelt_exec.h

Issue 2869203003: Add the SeatbeltExec classes to facilitate the V2 sandbox. (Closed)
Patch Set: Cleanup per review Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « sandbox/mac/seatbelt.proto ('k') | sandbox/mac/seatbelt_exec.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: sandbox/mac/seatbelt_exec.h
diff --git a/sandbox/mac/seatbelt_exec.h b/sandbox/mac/seatbelt_exec.h
new file mode 100644
index 0000000000000000000000000000000000000000..44c15051b05df5df3b533130a07b954757e44190
--- /dev/null
+++ b/sandbox/mac/seatbelt_exec.h
@@ -0,0 +1,88 @@
+// Copyright 2016 The Chromium Authors. All rights reserved.
Robert Sesek 2017/05/17 18:35:26 2017
Greg K 2017/05/17 21:40:07 Done.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef SANDBOX_MAC_SEATBELT_EXEC_H_
+#define SANDBOX_MAC_SEATBELT_EXEC_H_
+
+#include <string>
+#include <unordered_map>
Robert Sesek 2017/05/17 18:35:26 unused
Greg K 2017/05/17 21:40:07 Done.
+
+#include "base/compiler_specific.h"
+#include "base/files/scoped_file.h"
+#include "base/strings/string_piece.h"
+#include "sandbox/mac/seatbelt.pb.h"
+#include "sandbox/mac/seatbelt_export.h"
+
+namespace sandbox {
+
+// SeatbeltExecClient is used by the process that is launching another sandboxed
+// process. The API allows the launcher process to supply a sandbox profile and
+// parameters, which will be communicated to the sandboxed process over IPC.
+class SEATBELT_EXPORT SeatbeltExecClient {
+ public:
+ SeatbeltExecClient();
+ ~SeatbeltExecClient();
+
+ // The Set*Parameter functions return true if the parameter was successfully
+ // inserted. Check the return value, which indicates if the parameter was
+ // added successfully.
+
+ // Set a boolean parameter in the sandbox profile.
+ bool SetBooleanParameter(const base::StringPiece key,
+ bool value) WARN_UNUSED_RESULT;
+
+ // Set a string parameter in the sandbox profile.
+ bool SetParameter(const base::StringPiece key,
+ const base::StringPiece value) WARN_UNUSED_RESULT;
+
+ // Set the actual sandbox profile, using the scheme-like SBPL.
+ void SetProfile(const base::StringPiece policy);
+
+ // Sends the policy to the SeatbeltExecServer and returns the communication
+ // FD. The FD should be mapped into the sandboxed child process.
+ int SendProfileAndGetFD();
+
+ // Returns the underlying protobuf for testing purposes.
+ const mac::SandboxPolicy& GetPolicyForTesting() { return policy_; }
+
+ private:
+ // This writes a string (the serialized protobuf) to the |pipe_|.
+ bool WriteString(std::string* str);
+
+ // This is the protobuf which contains the sandbox profile and parameters,
+ // and is serialized and sent to the other process.
+ mac::SandboxPolicy policy_;
+
+ // A file descriptor pair used for interprocess communication.
+ int pipe_[2];
+};
+
+// SeatbeltExecServer is used by the process that will be sandboxed to receive
+// the profile and parameters from the launcher process. It can then initialize
+// the profile, sandboxing the process.
+class SEATBELT_EXPORT SeatbeltExecServer {
+ public:
+ explicit SeatbeltExecServer(int sandbox_fd);
Robert Sesek 2017/05/17 18:35:26 Comment that |sandbox_fd| should the result of Sen
Greg K 2017/05/17 21:40:07 Done.
+ ~SeatbeltExecServer();
+
+ // Reads the policy from the client, applies the profile, and returns whether
+ // or not the operation succeeds.
+ bool InitializeSandbox();
+
+ // Applies the given sandbox policy, and returns whether or not the operation
+ // succeeds.
+ bool ApplySandboxProfile(const mac::SandboxPolicy& sandbox_policy);
+
+ private:
+ // Reads from the |fd_| and stores the data into a string. This does
+ // not append a NUL terminator as protobuf does not expect one.
+ bool ReadString(std::string* string);
+
+ // The file descriptor used to communicate with the launcher process.
+ base::ScopedFD fd_;
+};
+
+} // namespace sandbox
+
+#endif // SANDBOX_MAC_SEATBELT_EXEC_H_
« no previous file with comments | « sandbox/mac/seatbelt.proto ('k') | sandbox/mac/seatbelt_exec.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698