OLD | NEW |
| (Empty) |
1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "sandbox/src/restricted_token_utils.h" | |
6 | |
7 // launcher.exe is an application used to launch another application with a | |
8 // restricted token. This is to be used for testing only. | |
9 // The parameters are the level of security of the primary token, the | |
10 // impersonation token and the job object along with the command line to | |
11 // execute. | |
12 // See the usage (launcher.exe without parameters) for the correct format. | |
13 | |
14 #define PARAM_IS(y) (argc > i) && (_wcsicmp(argv[i], y) == 0) | |
15 | |
16 void PrintUsage(const wchar_t *application_name) { | |
17 wprintf(L"\n\nUsage: \n %ls --main level --init level --job level cmd_line ", | |
18 application_name); | |
19 wprintf(L"\n\n Levels : \n\tLOCKDOWN \n\tRESTRICTED " | |
20 L"\n\tLIMITED_USER \n\tINTERACTIVE_USER \n\tNON_ADMIN \n\tUNPROTECTED"); | |
21 wprintf(L"\n\n main: Security level of the main token"); | |
22 wprintf(L"\n init: Security level of the impersonation token"); | |
23 wprintf(L"\n job: Security level of the job object"); | |
24 } | |
25 | |
26 bool GetTokenLevelFromString(const wchar_t *param, | |
27 sandbox::TokenLevel* level) { | |
28 if (_wcsicmp(param, L"LOCKDOWN") == 0) { | |
29 *level = sandbox::USER_LOCKDOWN; | |
30 } else if (_wcsicmp(param, L"RESTRICTED") == 0) { | |
31 *level = sandbox::USER_RESTRICTED; | |
32 } else if (_wcsicmp(param, L"LIMITED_USER") == 0) { | |
33 *level = sandbox::USER_LIMITED; | |
34 } else if (_wcsicmp(param, L"INTERACTIVE_USER") == 0) { | |
35 *level = sandbox::USER_INTERACTIVE; | |
36 } else if (_wcsicmp(param, L"NON_ADMIN") == 0) { | |
37 *level = sandbox::USER_NON_ADMIN; | |
38 } else if (_wcsicmp(param, L"USER_RESTRICTED_SAME_ACCESS") == 0) { | |
39 *level = sandbox::USER_RESTRICTED_SAME_ACCESS; | |
40 } else if (_wcsicmp(param, L"UNPROTECTED") == 0) { | |
41 *level = sandbox::USER_UNPROTECTED; | |
42 } else { | |
43 return false; | |
44 } | |
45 | |
46 return true; | |
47 } | |
48 | |
49 bool GetJobLevelFromString(const wchar_t *param, sandbox::JobLevel* level) { | |
50 if (_wcsicmp(param, L"LOCKDOWN") == 0) { | |
51 *level = sandbox::JOB_LOCKDOWN; | |
52 } else if (_wcsicmp(param, L"RESTRICTED") == 0) { | |
53 *level = sandbox::JOB_RESTRICTED; | |
54 } else if (_wcsicmp(param, L"LIMITED_USER") == 0) { | |
55 *level = sandbox::JOB_LIMITED_USER; | |
56 } else if (_wcsicmp(param, L"INTERACTIVE_USER") == 0) { | |
57 *level = sandbox::JOB_INTERACTIVE; | |
58 } else if (_wcsicmp(param, L"NON_ADMIN") == 0) { | |
59 wprintf(L"\nNON_ADMIN is not a supported job type"); | |
60 return false; | |
61 } else if (_wcsicmp(param, L"UNPROTECTED") == 0) { | |
62 *level = sandbox::JOB_UNPROTECTED; | |
63 } else { | |
64 return false; | |
65 } | |
66 | |
67 return true; | |
68 } | |
69 | |
70 int wmain(int argc, wchar_t *argv[]) { | |
71 // Extract the filename from the path. | |
72 wchar_t *app_name = wcsrchr(argv[0], L'\\'); | |
73 if (!app_name) { | |
74 app_name = argv[0]; | |
75 } else { | |
76 app_name++; | |
77 } | |
78 | |
79 // no argument | |
80 if (argc == 1) { | |
81 PrintUsage(app_name); | |
82 return -1; | |
83 } | |
84 | |
85 sandbox::TokenLevel primary_level = sandbox::USER_LOCKDOWN; | |
86 sandbox::TokenLevel impersonation_level = | |
87 sandbox::USER_RESTRICTED_SAME_ACCESS; | |
88 sandbox::JobLevel job_level = sandbox::JOB_LOCKDOWN; | |
89 ATL::CString command_line; | |
90 | |
91 // parse command line. | |
92 for (int i = 1; i < argc; ++i) { | |
93 if (PARAM_IS(L"--main")) { | |
94 i++; | |
95 if (argc > i) { | |
96 if (!GetTokenLevelFromString(argv[i], &primary_level)) { | |
97 wprintf(L"\nAbord, Unrecognized main token level \"%ls\"", argv[i]); | |
98 PrintUsage(app_name); | |
99 return -1; | |
100 } | |
101 } | |
102 } else if (PARAM_IS(L"--init")) { | |
103 i++; | |
104 if (argc > i) { | |
105 if (!GetTokenLevelFromString(argv[i], &impersonation_level)) { | |
106 wprintf(L"\nAbord, Unrecognized init token level \"%ls\"", argv[i]); | |
107 PrintUsage(app_name); | |
108 return -1; | |
109 } | |
110 } | |
111 } else if (PARAM_IS(L"--job")) { | |
112 i++; | |
113 if (argc > i) { | |
114 if (!GetJobLevelFromString(argv[i], &job_level)) { | |
115 wprintf(L"\nAbord, Unrecognized job security level \"%ls\"", argv[i]); | |
116 PrintUsage(app_name); | |
117 return -1; | |
118 } | |
119 } | |
120 } else { | |
121 if (command_line.GetLength()) { | |
122 command_line += L' '; | |
123 } | |
124 command_line += argv[i]; | |
125 } | |
126 } | |
127 | |
128 if (!command_line.GetLength()) { | |
129 wprintf(L"\nAbord, No command line specified"); | |
130 PrintUsage(app_name); | |
131 return -1; | |
132 } | |
133 | |
134 wprintf(L"\nLaunching command line: \"%ls\"\n", command_line.GetBuffer()); | |
135 | |
136 HANDLE job_handle; | |
137 DWORD err_code = sandbox::StartRestrictedProcessInJob( | |
138 command_line.GetBuffer(), | |
139 primary_level, | |
140 impersonation_level, | |
141 job_level, | |
142 &job_handle); | |
143 if (ERROR_SUCCESS != err_code) { | |
144 wprintf(L"\nAbord, Error %d while launching command line.", err_code); | |
145 return -1; | |
146 } | |
147 | |
148 wprintf(L"\nPress any key to continue."); | |
149 while(!_kbhit()) { | |
150 Sleep(100); | |
151 } | |
152 | |
153 ::CloseHandle(job_handle); | |
154 | |
155 return 0; | |
156 } | |
OLD | NEW |