| // Copyright 2020 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef CONTENT_BROWSER_SERVICE_HOST_UTILITY_SANDBOX_DELEGATE_H_ |
| #define CONTENT_BROWSER_SERVICE_HOST_UTILITY_SANDBOX_DELEGATE_H_ |
| |
| #include <optional> |
| |
| #include "base/command_line.h" |
| #include "base/environment.h" |
| #include "base/files/file_path.h" |
| #include "build/build_config.h" |
| #include "content/common/content_export.h" |
| #include "content/public/common/sandboxed_process_launcher_delegate.h" |
| #include "content/public/common/zygote/zygote_buildflags.h" |
| #include "sandbox/policy/mojom/sandbox.mojom.h" |
| |
| #if BUILDFLAG(USE_ZYGOTE) |
| #include "content/public/common/zygote/zygote_handle.h" |
| #endif // BUILDFLAG(USE_ZYGOTE) |
| |
| #if BUILDFLAG(IS_WIN) |
| #include "base/synchronization/waitable_event.h" |
| #include "sandbox/win/src/sandbox_policy.h" |
| #endif // BUILDFLAG(IS_WIN) |
| |
| #if BUILDFLAG(IS_MAC) |
| #include "base/mac/process_requirement.h" |
| #endif // BUILDFLAG(IS_MAC) |
| |
| namespace content { |
| class CONTENT_EXPORT UtilitySandboxedProcessLauncherDelegate |
| : public SandboxedProcessLauncherDelegate { |
| public: |
| UtilitySandboxedProcessLauncherDelegate(sandbox::mojom::Sandbox sandbox_type, |
| const base::EnvironmentMap& env, |
| const base::CommandLine& cmd_line); |
| ~UtilitySandboxedProcessLauncherDelegate() override; |
| |
| sandbox::mojom::Sandbox GetSandboxType() override; |
| |
| #if BUILDFLAG(IS_WIN) |
| std::string GetSandboxTag() override; |
| bool GetAppContainerId(std::string* appcontainer_id) override; |
| bool DisableDefaultPolicy() override; |
| bool ShouldLaunchElevated() override; |
| bool InitializeConfig(sandbox::TargetConfig* config) override; |
| bool ShouldUnsandboxedRunInJob() override; |
| bool CetCompatible() override; |
| bool PreSpawnTarget(sandbox::TargetPolicy* policy) override; |
| // Set preload libraries to transfer as part of the sandbox delegate data, |
| // which will used in utility_main to preload these libraries before lockdown. |
| void SetPreloadLibraries(const std::vector<base::FilePath>& preloads) { |
| preload_libraries_ = preloads; |
| } |
| // Set the event used for bootstrap info. Only respected for sandboxed |
| // processes. This event must remain valid until the process launch and |
| // `PreSpawnTarget` is called by the sandbox. |
| void SetBootstrapStatusEvent(const base::WaitableEvent& event); |
| #endif // BUILDFLAG(IS_WIN) |
| |
| #if BUILDFLAG(USE_ZYGOTE) |
| ZygoteCommunication* GetZygote() override; |
| #endif // BUILDFLAG(USE_ZYGOTE) |
| |
| #if BUILDFLAG(IS_POSIX) |
| base::EnvironmentMap GetEnvironment() override; |
| #endif // BUILDFLAG(IS_POSIX) |
| |
| #if BUILDFLAG(USE_ZYGOTE) |
| void SetZygote(ZygoteCommunication* handle); |
| #endif // BUILDFLAG(USE_ZYGOTE_HANDLE) |
| |
| #if BUILDFLAG(IS_MAC) |
| std::optional<base::mac::ProcessRequirement> GetProcessRequirement() override; |
| #endif // BUILDFLAG(IS_MAC) |
| |
| private: |
| #if BUILDFLAG(IS_POSIX) |
| base::EnvironmentMap env_; |
| #endif // BUILDFLAG(IS_POSIX) |
| |
| #if BUILDFLAG(IS_WIN) |
| // Adds preload-libraries to the delegate blob for utility_main() to access |
| // before lockdown is initialized. |
| void AddDelegateData(sandbox::TargetPolicy* policy); |
| |
| std::vector<base::FilePath> preload_libraries_; |
| |
| std::optional<HANDLE> event_handle_to_inherit_; |
| #endif // BUILDFLAG(IS_WIN) |
| |
| #if BUILDFLAG(USE_ZYGOTE) |
| std::optional<raw_ptr<ZygoteCommunication>> zygote_; |
| #endif // BUILDFLAG(USE_ZYGOTE) |
| |
| const sandbox::mojom::Sandbox sandbox_type_; |
| #if BUILDFLAG(IS_WIN) |
| // If true then App Container will not be used for this utility process. |
| const bool app_container_disabled_; |
| #endif // BUILDFLAG(IS_WIN) |
| base::CommandLine cmd_line_; |
| }; |
| } // namespace content |
| |
| #endif // CONTENT_BROWSER_SERVICE_HOST_UTILITY_SANDBOX_DELEGATE_H_ |