diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-28 14:29:10 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-28 14:29:10 +0000 |
commit | 2aa4a82499d4becd2284cdb482213d541b8804dd (patch) | |
tree | b80bf8bf13c3766139fbacc530efd0dd9d54394c /security/sandbox/win/src/sandboxpermissions/sandboxPermissions.cpp | |
parent | Initial commit. (diff) | |
download | firefox-upstream.tar.xz firefox-upstream.zip |
Adding upstream version 86.0.1.upstream/86.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'security/sandbox/win/src/sandboxpermissions/sandboxPermissions.cpp')
-rw-r--r-- | security/sandbox/win/src/sandboxpermissions/sandboxPermissions.cpp | 37 |
1 files changed, 37 insertions, 0 deletions
diff --git a/security/sandbox/win/src/sandboxpermissions/sandboxPermissions.cpp b/security/sandbox/win/src/sandboxpermissions/sandboxPermissions.cpp new file mode 100644 index 0000000000..723d6a5a5e --- /dev/null +++ b/security/sandbox/win/src/sandboxpermissions/sandboxPermissions.cpp @@ -0,0 +1,37 @@ +/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim: set ts=2 et sw=2 tw=80: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "sandboxPermissions.h" +#include "mozilla/Assertions.h" +#include "mozilla/sandboxing/permissionsService.h" + +namespace mozilla { + +sandboxing::PermissionsService* SandboxPermissions::sPermissionsService = + nullptr; + +void SandboxPermissions::Initialize( + sandboxing::PermissionsService* aPermissionsService, + FileAccessViolationFunc aFileAccessViolationFunc) { + sPermissionsService = aPermissionsService; + sPermissionsService->SetFileAccessViolationFunc(aFileAccessViolationFunc); +} + +void SandboxPermissions::GrantFileAccess(uint32_t aProcessId, + const wchar_t* aFilename, + bool aPermitWrite) { + MOZ_ASSERT(sPermissionsService, "Must initialize sandbox PermissionsService"); + sPermissionsService->GrantFileAccess(aProcessId, aFilename, aPermitWrite); +} + +void SandboxPermissions::RemovePermissionsForProcess(uint32_t aProcessId) { + if (!sPermissionsService) { + return; // No permissions service was initialized + } + sPermissionsService->RemovePermissionsForProcess(aProcessId); +} + +} // namespace mozilla |