2020-09-10 23:42:00 +08:00
|
|
|
// Copyright 2020 Google LLC
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
2022-01-28 17:38:27 +08:00
|
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
2020-09-10 23:42:00 +08:00
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
#include <libgen.h>
|
|
|
|
#include <syscall.h>
|
|
|
|
|
|
|
|
#include <cstdlib>
|
|
|
|
#include <iostream>
|
|
|
|
|
2020-10-02 21:47:41 +08:00
|
|
|
#include "jsonnet_sapi.sapi.h" // NOLINT(build/include)
|
2021-01-14 01:25:25 +08:00
|
|
|
#include "sandboxed_api/util/fileops.h"
|
2022-04-29 17:13:32 +08:00
|
|
|
#include "sandboxed_api/util/logging.h"
|
2021-01-14 01:25:25 +08:00
|
|
|
#include "sandboxed_api/util/path.h"
|
2020-09-10 23:42:00 +08:00
|
|
|
|
|
|
|
class JsonnetSapiSandbox : public JsonnetSandbox {
|
|
|
|
public:
|
|
|
|
explicit JsonnetSapiSandbox(std::string in_file, std::string out_file)
|
|
|
|
: in_file_(std::move(in_file)), out_file_(std::move(out_file)) {}
|
|
|
|
|
2020-09-15 21:22:47 +08:00
|
|
|
// We need only the input file here, not the whole input directory
|
2020-09-10 23:42:00 +08:00
|
|
|
std::unique_ptr<sandbox2::Policy> ModifyPolicy(
|
2020-09-26 00:03:06 +08:00
|
|
|
sandbox2::PolicyBuilder*) override {
|
2020-09-10 23:42:00 +08:00
|
|
|
return sandbox2::PolicyBuilder()
|
|
|
|
.AllowStaticStartup()
|
|
|
|
.AllowOpen()
|
|
|
|
.AllowRead()
|
|
|
|
.AllowWrite()
|
|
|
|
.AllowStat()
|
|
|
|
.AllowSystemMalloc()
|
|
|
|
.AllowExit()
|
|
|
|
.AllowSyscalls({
|
|
|
|
__NR_futex,
|
|
|
|
__NR_close,
|
|
|
|
})
|
|
|
|
.AddDirectoryAt(dirname(&out_file_[0]), "/output", /*is_ro=*/false)
|
|
|
|
.AddFile(in_file_, true)
|
|
|
|
.BuildOrDie();
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
std::string in_file_;
|
|
|
|
std::string out_file_;
|
|
|
|
};
|
|
|
|
|
2020-09-26 00:03:06 +08:00
|
|
|
absl::Status JsonnetMain(std::string in_file, std::string out_file) {
|
2021-01-14 01:25:25 +08:00
|
|
|
using sapi::file::JoinPath;
|
|
|
|
using sapi::file_util::fileops::Basename;
|
2020-10-02 21:47:41 +08:00
|
|
|
|
2020-09-10 23:42:00 +08:00
|
|
|
// Initialize sandbox.
|
|
|
|
JsonnetSapiSandbox sandbox(in_file, out_file);
|
2022-04-06 14:57:45 +08:00
|
|
|
SAPI_RETURN_IF_ERROR(sandbox.Init());
|
2020-09-10 23:42:00 +08:00
|
|
|
|
|
|
|
JsonnetApi api(&sandbox);
|
|
|
|
|
|
|
|
// Initialize library's main structure.
|
2020-09-26 00:03:06 +08:00
|
|
|
SAPI_ASSIGN_OR_RETURN(JsonnetVm * jsonnet_vm, api.c_jsonnet_make());
|
|
|
|
sapi::v::RemotePtr vm_pointer(jsonnet_vm);
|
2020-09-10 23:42:00 +08:00
|
|
|
|
|
|
|
// Read input file.
|
2020-10-02 21:47:41 +08:00
|
|
|
std::string in_file_in_sandboxee(JoinPath("/input", Basename(in_file)));
|
2020-09-26 00:03:06 +08:00
|
|
|
sapi::v::ConstCStr in_file_var(in_file_in_sandboxee.c_str());
|
|
|
|
SAPI_ASSIGN_OR_RETURN(char* input,
|
2021-01-22 22:01:05 +08:00
|
|
|
api.c_read_input(false, in_file_var.PtrBefore()));
|
2020-09-10 23:42:00 +08:00
|
|
|
|
|
|
|
// Process jsonnet data.
|
2020-09-26 00:03:06 +08:00
|
|
|
sapi::v::RemotePtr input_pointer(input);
|
2020-09-10 23:42:00 +08:00
|
|
|
sapi::v::Int error;
|
2020-09-26 00:03:06 +08:00
|
|
|
SAPI_ASSIGN_OR_RETURN(char* output, api.c_jsonnet_fmt_snippet(
|
2021-01-22 22:01:05 +08:00
|
|
|
&vm_pointer, in_file_var.PtrBefore(),
|
|
|
|
&input_pointer, error.PtrAfter()));
|
2020-09-26 00:03:06 +08:00
|
|
|
|
|
|
|
CHECK(!error.GetValue()) << "Jsonnet code evaluation failed: "
|
|
|
|
<< error.GetValue() << "\n";
|
2020-09-10 23:42:00 +08:00
|
|
|
|
|
|
|
// Write data to file.
|
2020-10-02 21:47:41 +08:00
|
|
|
std::string out_file_in_sandboxee(JoinPath("/output", Basename(out_file)));
|
2020-09-10 23:42:00 +08:00
|
|
|
sapi::v::ConstCStr out_file_var(out_file_in_sandboxee.c_str());
|
2020-09-26 00:03:06 +08:00
|
|
|
sapi::v::RemotePtr output_pointer(output);
|
2020-09-10 23:42:00 +08:00
|
|
|
|
2020-09-26 00:03:06 +08:00
|
|
|
SAPI_ASSIGN_OR_RETURN(
|
|
|
|
bool success,
|
|
|
|
api.c_write_output_file(&output_pointer, out_file_var.PtrBefore()));
|
|
|
|
CHECK(success) << "Writing to output file failed: " << success;
|
2020-09-10 23:42:00 +08:00
|
|
|
|
|
|
|
// Clean up.
|
2020-09-26 00:03:06 +08:00
|
|
|
SAPI_ASSIGN_OR_RETURN(char* result,
|
2021-01-22 22:01:05 +08:00
|
|
|
api.c_jsonnet_realloc(&vm_pointer, &output_pointer, 0));
|
2020-09-26 00:03:06 +08:00
|
|
|
SAPI_RETURN_IF_ERROR(api.c_jsonnet_destroy(&vm_pointer));
|
|
|
|
SAPI_RETURN_IF_ERROR(api.c_free_input(&input_pointer));
|
|
|
|
|
|
|
|
return absl::OkStatus();
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char* argv[]) {
|
2021-01-14 01:25:25 +08:00
|
|
|
using sapi::file_util::fileops::Basename;
|
2020-10-02 21:47:41 +08:00
|
|
|
|
2022-04-29 17:13:32 +08:00
|
|
|
sapi::InitLogging(argv[0]);
|
2020-09-26 00:03:06 +08:00
|
|
|
gflags::ParseCommandLineFlags(&argc, &argv, true);
|
|
|
|
|
|
|
|
if (!(argc == 3)) {
|
|
|
|
std::cerr << "Usage:\n"
|
2020-10-02 21:47:41 +08:00
|
|
|
<< Basename(argv[0])
|
|
|
|
<< " /absolute/path/to/INPUT.jsonnet /absolute/path/to/OUTPUT\n";
|
2020-09-26 00:03:06 +08:00
|
|
|
return EXIT_FAILURE;
|
|
|
|
}
|
2020-09-10 23:42:00 +08:00
|
|
|
|
2020-09-26 00:03:06 +08:00
|
|
|
std::string in_file(argv[1]);
|
|
|
|
std::string out_file(argv[2]);
|
2020-09-10 23:42:00 +08:00
|
|
|
|
2020-09-26 00:03:06 +08:00
|
|
|
absl::Status status = JsonnetMain(in_file, out_file);
|
|
|
|
if (!status.ok()) {
|
|
|
|
LOG(ERROR) << "Failed: " << status.ToString();
|
|
|
|
return EXIT_FAILURE;
|
|
|
|
}
|
2020-09-10 23:42:00 +08:00
|
|
|
|
|
|
|
return EXIT_SUCCESS;
|
|
|
|
}
|