diff options
author | skerner@chromium.org <skerner@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-07-01 20:24:09 +0000 |
---|---|---|
committer | skerner@chromium.org <skerner@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-07-01 20:24:09 +0000 |
commit | 4cd2d520d95db38a157fd2f86161ea457eab7af2 (patch) | |
tree | 5e9f69b9eb22b9e4db9853080a3b5c6500b5922a /base/file_util_win.cc | |
parent | 8bc2f4747ecc9ac8522e109440dba9a0e1fabff3 (diff) | |
download | chromium_src-4cd2d520d95db38a157fd2f86161ea457eab7af2.zip chromium_src-4cd2d520d95db38a157fd2f86161ea457eab7af2.tar.gz chromium_src-4cd2d520d95db38a157fd2f86161ea457eab7af2.tar.bz2 |
Loosen permission on extension temp dir when a flag is used.
Issue 35198 can not be reproduced locally. To enable users to do experiments, three command line flags are added to chrome:
--issue35198-crxdir-browser: Have the browser process create the directory in which the extension will be unzipped.
--issue35198-logging: Enable log messages from directory creation in the utility process to be moved to the browser process.
--issue35198-permission: Use the most permissive file permissions possible on the extension unpack directory.
BUG=35198
TEST=manual
Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=51231
Review URL: http://codereview.chromium.org/2802018
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@51416 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'base/file_util_win.cc')
-rw-r--r-- | base/file_util_win.cc | 71 |
1 files changed, 69 insertions, 2 deletions
diff --git a/base/file_util_win.cc b/base/file_util_win.cc index 8a15370..74b9406 100644 --- a/base/file_util_win.cc +++ b/base/file_util_win.cc @@ -63,6 +63,56 @@ bool DevicePathToDriveLetterPath(const FilePath& device_path, return true; } +// Build a security descriptor with the weakest possible file permissions. +bool InitLooseSecurityDescriptor(SECURITY_ATTRIBUTES *sa, + SECURITY_DESCRIPTOR *sd) { + DWORD last_error; + + if (!InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION)) { + last_error = GetLastError(); + LOG(ERROR) << "InitializeSecurityDescriptor failed: GetLastError() = " + << last_error; + return false; + } + + if (!SetSecurityDescriptorDacl(sd, + TRUE, // bDaclPresent: Add one to |sd|. + NULL, // pDacl: NULL means allow all access. + FALSE // bDaclDefaulted: Not defaulted. + )) { + last_error = GetLastError(); + LOG(ERROR) << "SetSecurityDescriptorDacl() failed: GetLastError() = " + << last_error; + return false; + } + + if (!SetSecurityDescriptorGroup(sd, + NULL, // pGroup: No no primary group. + FALSE // bGroupDefaulted: Not defaulted. + )) { + last_error = GetLastError(); + LOG(ERROR) << "SetSecurityDescriptorGroup() failed: GetLastError() = " + << last_error; + return false; + } + + if (!SetSecurityDescriptorSacl(sd, + FALSE, // bSaclPresent: No SACL. + NULL, + FALSE + )) { + last_error = GetLastError(); + LOG(ERROR) << "SetSecurityDescriptorSacl() failed: GetLastError() = " + << last_error; + return false; + } + + sa->nLength = sizeof(SECURITY_ATTRIBUTES); + sa->lpSecurityDescriptor = sd; + sa->bInheritHandle = TRUE; + return true; +} + } // namespace std::wstring GetDirectoryFromPath(const std::wstring& path) { @@ -550,7 +600,19 @@ bool CreateTemporaryFileInDir(const FilePath& dir, bool CreateTemporaryDirInDir(const FilePath& base_dir, const FilePath::StringType& prefix, + bool loosen_permissions, FilePath* new_dir) { + SECURITY_ATTRIBUTES sa; + SECURITY_DESCRIPTOR sd; + + LPSECURITY_ATTRIBUTES directory_security_attributes = NULL; + if (loosen_permissions) { + if (InitLooseSecurityDescriptor(&sa, &sd)) + directory_security_attributes = &sa; + else + LOG(ERROR) << "Failed to init security attributes, fall back to NULL."; + } + FilePath path_to_create; srand(static_cast<uint32>(time(NULL))); @@ -565,7 +627,8 @@ bool CreateTemporaryDirInDir(const FilePath& base_dir, new_dir_name.append(IntToWString(rand() % kint16max)); path_to_create = path_to_create.Append(new_dir_name); - if (::CreateDirectory(path_to_create.value().c_str(), NULL)) + if (::CreateDirectory(path_to_create.value().c_str(), + directory_security_attributes)) break; count++; } @@ -575,6 +638,7 @@ bool CreateTemporaryDirInDir(const FilePath& base_dir, } *new_dir = path_to_create; + return true; } @@ -584,7 +648,10 @@ bool CreateNewTempDirectory(const FilePath::StringType& prefix, if (!GetTempDir(&system_temp_dir)) return false; - return CreateTemporaryDirInDir(system_temp_dir, prefix, new_temp_path); + return CreateTemporaryDirInDir(system_temp_dir, + prefix, + false, + new_temp_path); } bool CreateDirectory(const FilePath& full_path) { |