gecko-dev/ipc/glue/UtilityProcessSandboxing.cpp
Ray Kraesig 8cd437b72d Bug 1837079 - [4/10] Create WINDOWS_FILE_DIALOG utility process type r=gerard-majax,ipc-reviewers,fluent-reviewers,bobowen,handyman,nika
Create a new utility-process type for the sole use of out-of-process
instantiation of the Windows file dialog.

We do not sandbox this process type, as in certain test environments
sandboxing has been found to prevent the child process from interacting
with any other windows on the desktop -- including the parent process
window which it will need to assign as the parent of the file dialog.

Technically, no functional changes, as this commit adds no uses of this
type. (That will come later in the patchset.)

Differential Revision: https://phabricator.services.mozilla.com/D180341
2023-10-26 18:21:28 +00:00

71 lines
2.1 KiB
C++

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "UtilityProcessSandboxing.h"
#include <vector>
#include <string>
#include "prenv.h"
namespace mozilla::ipc {
std::vector<std::string> split(const std::string& str, char s) {
std::vector<std::string> rv;
size_t last = 0;
size_t i;
size_t c = str.size();
for (i = 0; i <= c; ++i) {
if (i == c || str[i] == s) {
rv.push_back(str.substr(last, i - last));
last = i + 1;
}
}
return rv;
}
bool IsUtilitySandboxEnabled(const char* envVar, SandboxingKind aKind) {
#ifdef XP_WIN
// Sandboxing the Windows file dialog is probably not useful.
//
// (Additionally, it causes failures in our test environments: when running
// tests on windows-11-2009-qr machines, sandboxed child processes can't see
// or interact with any other process's windows -- which means they can't
// select a window from the parent process as the file dialog's parent. This
// occurs regardless of the sandbox preferences, which is why we disable
// sandboxing entirely rather than use a maximally permissive preference-set.
// This behavior has not been seen in user-facing environments.)
if (aKind == SandboxingKind::WINDOWS_FILE_DIALOG) {
return false;
}
#endif
if (envVar == nullptr) {
return true;
}
const std::string disableUtility(envVar);
if (disableUtility == "1") {
return false;
}
std::vector<std::string> components = split(disableUtility, ',');
const std::string thisKind = "utility:" + std::to_string(aKind);
for (const std::string& thisOne : components) {
if (thisOne == thisKind) {
return false;
}
}
return true;
}
bool IsUtilitySandboxEnabled(SandboxingKind aKind) {
return IsUtilitySandboxEnabled(PR_GetEnv("MOZ_DISABLE_UTILITY_SANDBOX"),
aKind);
}
} // namespace mozilla::ipc