gecko-dev/security/sandbox/mac/SandboxPolicyGMP.h

98 строки
3.1 KiB
C++

/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#ifndef mozilla_SandboxPolicyGMP_h
#define mozilla_SandboxPolicyGMP_h
#define MAX_GMP_TESTING_READ_PATHS 2
namespace mozilla {
static const char SandboxPolicyGMP[] = R"SANDBOX_LITERAL(
(version 1)
(define should-log (param "SHOULD_LOG"))
(define app-path (param "APP_PATH"))
(define plugin-path (param "PLUGIN_PATH"))
(define plugin-binary-path (param "PLUGIN_BINARY_PATH"))
(define crashPort (param "CRASH_PORT"))
(define hasWindowServer (param "HAS_WINDOW_SERVER"))
(define testingReadPath1 (param "TESTING_READ_PATH1"))
(define testingReadPath2 (param "TESTING_READ_PATH2"))
(define (moz-deny feature)
(if (string=? should-log "TRUE")
(deny feature)
(deny feature (with no-log))))
(moz-deny default)
; These are not included in (deny default)
(moz-deny process-info*)
(allow process-info-pidinfo (target self))
; This isn't available in some older macOS releases.
(if (defined? 'nvram*)
(moz-deny nvram*))
; This property requires macOS 10.10+
(if (defined? 'file-map-executable)
(moz-deny file-map-executable))
; Needed for things like getpriority()/setpriority()/pthread_setname()
(allow process-info-pidinfo process-info-setcontrol (target self))
(if (defined? 'file-map-executable)
(allow file-map-executable file-read*
(subpath "/System/Library")
(subpath "/usr/lib")
(subpath plugin-path)
(subpath app-path))
(allow file-read*
(subpath "/System/Library")
(subpath "/usr/lib")
(subpath plugin-path)
(subpath app-path)))
(if (defined? 'file-map-executable)
(begin
(when plugin-binary-path
(allow file-read* file-map-executable (subpath plugin-binary-path)))
(when testingReadPath1
(allow file-read* file-map-executable (subpath testingReadPath1)))
(when testingReadPath2
(allow file-read* file-map-executable (subpath testingReadPath2))))
(begin
(when plugin-binary-path
(allow file-read* (subpath plugin-binary-path)))
(when testingReadPath1
(allow file-read* (subpath testingReadPath1)))
(when testingReadPath2
(allow file-read* (subpath testingReadPath2)))))
(if (string? crashPort)
(allow mach-lookup (global-name crashPort)))
(allow signal (target self))
(allow sysctl-read)
(allow iokit-open (iokit-user-client-class "IOHIDParamUserClient"))
(allow file-read*
(literal "/etc")
(literal "/dev/random")
(literal "/dev/urandom")
(literal "/usr/share/icu/icudt51l.dat"))
; Timezone
(allow file-read*
(subpath "/private/var/db/timezone")
(subpath "/usr/share/zoneinfo")
(subpath "/usr/share/zoneinfo.default")
(literal "/private/etc/localtime"))
(if (string=? hasWindowServer "TRUE")
(allow mach-lookup (global-name "com.apple.windowserver.active")))
)SANDBOX_LITERAL";
} // namespace mozilla
#endif // mozilla_SandboxPolicyGMP_h