/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef __SECURITY_SANDBOX_SANDBOXTARGET_H__ #define __SECURITY_SANDBOX_SANDBOXTARGET_H__ #include #include #include #include #include "mozilla/Assertions.h" namespace sandbox { class TargetServices; } namespace mozilla { class SandboxTarget { public: /** * Obtains a pointer to the singleton instance */ static SandboxTarget* Instance(); /** * Used by the application to pass in the target services that provide certain * functions to the sandboxed code. * The target services must already be initialized. * * @param aTargetServices The target services that will be used */ void SetTargetServices(sandbox::TargetServices* aTargetServices) { MOZ_ASSERT(aTargetServices); MOZ_ASSERT(!mTargetServices, "Sandbox TargetServices must only be set once."); mTargetServices = aTargetServices; } template void RegisterSandboxStartCallback(CallbackT&& aCallback) { mStartObservers.push_back(std::forward(aCallback)); } /** * Called by the library that wants to "start" the sandbox, i.e. change to the * more secure delayed / lockdown policy. */ void StartSandbox(); bool GetComplexLineBreaks(const WCHAR* text, uint32_t length, uint8_t* break_before); protected: SandboxTarget() : mTargetServices(nullptr) {} sandbox::TargetServices* mTargetServices; private: void NotifyStartObservers(); std::list> mStartObservers; }; } // namespace mozilla #endif