1/*
2 * Copyright (C) 2018 Igalia S.L.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 *
13 * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
14 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
15 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
16 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
17 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
18 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
19 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
20 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
21 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
22 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
23 * THE POSSIBILITY OF SUCH DAMAGE.
24 */
25
26#include "config.h"
27#include "FlatpakLauncher.h"
28
29#if OS(LINUX)
30
31#include <gio/gio.h>
32#include <wtf/glib/GUniquePtr.h>
33
34namespace WebKit {
35
36GRefPtr<GSubprocess> flatpakSpawn(GSubprocessLauncher* launcher, const WebKit::ProcessLauncher::LaunchOptions& launchOptions, char** argv, int childProcessSocket, GError** error)
37{
38 ASSERT(launcher);
39
40 // When we are running inside of flatpak's sandbox we do not have permissions to
41 // use the same sandbox we do outside but flatpak offers to create new sandboxes
42 // for us using flatpak-spawn.
43 //
44 // This is just a stub implementation atm though as the Spawn interface does not expose
45 // much outside of `--sandbox` (no permissions) and `--no-network`. We need to
46 // add some permissions in between those for this to provide meaningful security.
47
48 GUniquePtr<gchar> childProcessSocketArg(g_strdup_printf("--forward-fd=%d", childProcessSocket));
49 Vector<const char*> flatpakArgs = {
50 "/usr/bin/flatpak-spawn",
51 childProcessSocketArg.get(),
52 };
53
54 if (launchOptions.processType == ProcessLauncher::ProcessType::Web)
55 flatpakArgs.append("--no-network");
56
57 char** newArgv = g_newa(char*, g_strv_length(argv) + flatpakArgs.size() + 1);
58 size_t i = 0;
59
60 for (const auto& arg : flatpakArgs)
61 newArgv[i++] = const_cast<char*>(arg);
62 for (size_t x = 0; argv[x]; x++)
63 newArgv[i++] = argv[x];
64 newArgv[i++] = nullptr;
65
66 return adoptGRef(g_subprocess_launcher_spawnv(launcher, newArgv, error));
67}
68
69};
70
71#endif // OS(LINUX)
72