Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(671)

Unified Diff: sandbox/mac/seatbelt_exec.h

Issue 2869203003: Add the SeatbeltExec classes to facilitate the V2 sandbox. (Closed)
Patch Set: Fix the last few nits. Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « sandbox/mac/seatbelt.proto ('k') | sandbox/mac/seatbelt_exec.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: sandbox/mac/seatbelt_exec.h
diff --git a/sandbox/mac/seatbelt_exec.h b/sandbox/mac/seatbelt_exec.h
new file mode 100644
index 0000000000000000000000000000000000000000..57096ccdefc7d9287168c4484f0c61b0b7695d54
--- /dev/null
+++ b/sandbox/mac/seatbelt_exec.h
@@ -0,0 +1,88 @@
+// Copyright 2017 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef SANDBOX_MAC_SEATBELT_EXEC_H_
+#define SANDBOX_MAC_SEATBELT_EXEC_H_
+
+#include <string>
+
+#include "base/compiler_specific.h"
+#include "base/files/scoped_file.h"
+#include "base/strings/string_piece.h"
+#include "sandbox/mac/seatbelt.pb.h"
+#include "sandbox/mac/seatbelt_export.h"
+
+namespace sandbox {
+
+// SeatbeltExecClient is used by the process that is launching another sandboxed
+// process. The API allows the launcher process to supply a sandbox profile and
+// parameters, which will be communicated to the sandboxed process over IPC.
+class SEATBELT_EXPORT SeatbeltExecClient {
+ public:
+ SeatbeltExecClient();
+ ~SeatbeltExecClient();
+
+ // The Set*Parameter functions return true if the parameter was successfully
+ // inserted. Check the return value, which indicates if the parameter was
+ // added successfully.
+
+ // Set a boolean parameter in the sandbox profile.
+ bool SetBooleanParameter(const base::StringPiece key,
+ bool value) WARN_UNUSED_RESULT;
+
+ // Set a string parameter in the sandbox profile.
+ bool SetParameter(const base::StringPiece key,
+ const base::StringPiece value) WARN_UNUSED_RESULT;
+
+ // Set the actual sandbox profile, using the scheme-like SBPL.
+ void SetProfile(const base::StringPiece policy);
+
+ // Sends the policy to the SeatbeltExecServer and returns the communication
+ // FD. The FD should be mapped into the sandboxed child process.
+ int SendProfileAndGetFD();
+
+ // Returns the underlying protobuf for testing purposes.
+ const mac::SandboxPolicy& GetPolicyForTesting() { return policy_; }
+
+ private:
+ // This writes a string (the serialized protobuf) to the |pipe_|.
+ bool WriteString(std::string* str);
+
+ // This is the protobuf which contains the sandbox profile and parameters,
+ // and is serialized and sent to the other process.
+ mac::SandboxPolicy policy_;
+
+ // A file descriptor pair used for interprocess communication.
+ int pipe_[2];
+};
+
+// SeatbeltExecServer is used by the process that will be sandboxed to receive
+// the profile and parameters from the launcher process. It can then initialize
+// the profile, sandboxing the process.
+class SEATBELT_EXPORT SeatbeltExecServer {
+ public:
+ // |sandbox_fd| should be the result of SendProfileAndGetFD().
+ explicit SeatbeltExecServer(int sandbox_fd);
+ ~SeatbeltExecServer();
+
+ // Reads the policy from the client, applies the profile, and returns whether
+ // or not the operation succeeds.
+ bool InitializeSandbox();
+
+ // Applies the given sandbox policy, and returns whether or not the operation
+ // succeeds.
+ bool ApplySandboxProfile(const mac::SandboxPolicy& sandbox_policy);
+
+ private:
+ // Reads from the |fd_| and stores the data into a string. This does
+ // not append a NUL terminator as protobuf does not expect one.
+ bool ReadString(std::string* string);
+
+ // The file descriptor used to communicate with the launcher process.
+ base::ScopedFD fd_;
+};
+
+} // namespace sandbox
+
+#endif // SANDBOX_MAC_SEATBELT_EXEC_H_
« no previous file with comments | « sandbox/mac/seatbelt.proto ('k') | sandbox/mac/seatbelt_exec.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698