sandboxed-api/oss-internship-2020/curl/examples/example3.cc

148 lines
5.9 KiB
C++
Raw Normal View History

2020-08-13 00:33:45 +08:00
// Copyright 2020 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// Sandboxed version of simplessl.c
// HTTPS GET request
#include <cstdlib>
2020-08-21 01:47:08 +08:00
#include "../sandbox.h"
2020-08-13 00:33:45 +08:00
2020-08-21 01:47:08 +08:00
class CurlSapiSandboxEx3 : public CurlSapiSandbox {
2020-08-18 18:44:53 +08:00
public:
2020-08-21 01:47:08 +08:00
CurlSapiSandboxEx3(std::string ssl_certificate, std::string ssl_key,
std::string ca_certificates)
2020-08-18 18:44:53 +08:00
: ssl_certificate(ssl_certificate),
ssl_key(ssl_key),
ca_certificates(ca_certificates) {}
private:
std::unique_ptr<sandbox2::Policy> ModifyPolicy(
sandbox2::PolicyBuilder*) override {
2020-08-21 01:47:08 +08:00
// Add the syscalls and files missing in CurlSandbox to a new PolicyBuilder
auto policy_builder = std::make_unique<sandbox2::PolicyBuilder>();
(*policy_builder)
2020-08-22 00:08:10 +08:00
.AllowFutexOp(FUTEX_WAIT_PRIVATE)
2020-08-21 01:47:08 +08:00
.AllowGetPIDs()
.AllowGetRandom()
2020-08-22 00:08:10 +08:00
.AllowHandleSignals()
2020-08-21 01:47:08 +08:00
.AllowSyscall(__NR_sysinfo)
2020-08-18 18:44:53 +08:00
.AddFile(ssl_certificate)
.AddFile(ssl_key)
2020-08-21 01:47:08 +08:00
.AddFile(ca_certificates);
// Provide the new PolicyBuilder to ModifyPolicy in CurlSandbox
return CurlSapiSandbox::ModifyPolicy(policy_builder.get());
2020-08-18 18:44:53 +08:00
}
std::string ssl_certificate;
std::string ssl_key;
std::string ca_certificates;
2020-08-13 00:33:45 +08:00
};
int main(int argc, char* argv[]) {
2020-08-22 00:08:10 +08:00
gflags::ParseCommandLineFlags(&argc, &argv, true);
google::InitGoogleLogging(argv[0]);
2020-08-13 00:33:45 +08:00
absl::Status status;
sapi::StatusOr<int> status_or_int;
sapi::StatusOr<CURL*> status_or_curl;
// Get input parameters (should be absolute paths)
2020-08-22 00:08:10 +08:00
if (argc != 5) LOG(FATAL) << "wrong number of arguments (4 expected)";
2020-08-13 00:33:45 +08:00
std::string ssl_certificate = argv[1];
std::string ssl_key = argv[2];
std::string ssl_key_password = argv[3];
std::string ca_certificates = argv[4];
// Initialize sandbox2 and sapi
2020-08-21 01:47:08 +08:00
CurlSapiSandboxEx3 sandbox(ssl_certificate, ssl_key, ca_certificates);
2020-08-13 00:33:45 +08:00
status = sandbox.Init();
2020-08-22 00:08:10 +08:00
if (!status.ok())
LOG(FATAL) << "Couldn't initialize Sandboxed API: " << status;
2020-08-13 00:33:45 +08:00
CurlApi api(&sandbox);
2020-08-18 18:44:53 +08:00
2020-08-13 00:33:45 +08:00
// Initialize curl (CURL_GLOBAL_DEFAULT = 3)
status_or_int = api.curl_global_init(3l);
2020-08-22 00:08:10 +08:00
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK)
LOG(FATAL) << "curl_global_init failed: " << status_or_int.status();
2020-08-13 00:33:45 +08:00
// Initialize curl easy handle
status_or_curl = api.curl_easy_init();
2020-08-22 00:08:10 +08:00
if (!status_or_curl.ok())
LOG(FATAL) << "curl_easy_init failed: " << status_or_curl.status();
2020-08-13 00:33:45 +08:00
sapi::v::RemotePtr curl(status_or_curl.value());
2020-08-22 00:08:10 +08:00
if (!curl.GetValue()) LOG(FATAL) << "curl_easy_init failed: curl is NULL";
2020-08-13 00:33:45 +08:00
// Specify URL to get (using HTTPS)
sapi::v::ConstCStr url("https://example.com");
2020-08-18 18:44:53 +08:00
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, url.PtrBefore());
2020-08-22 00:08:10 +08:00
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK)
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << status_or_int.status();
2020-08-13 00:33:45 +08:00
// Set the SSL certificate type to "PEM"
sapi::v::ConstCStr ssl_cert_type("PEM");
2020-08-18 18:44:53 +08:00
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_SSLCERTTYPE,
2020-08-13 00:33:45 +08:00
ssl_cert_type.PtrBefore());
2020-08-22 00:08:10 +08:00
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK)
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << status_or_int.status();
2020-08-13 00:33:45 +08:00
// Set the certificate for client authentication
sapi::v::ConstCStr sapi_ssl_certificate(ssl_certificate.c_str());
2020-08-18 18:44:53 +08:00
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_SSLCERT,
2020-08-13 00:33:45 +08:00
sapi_ssl_certificate.PtrBefore());
2020-08-22 00:08:10 +08:00
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK)
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << status_or_int.status();
2020-08-13 00:33:45 +08:00
// Set the private key for client authentication
sapi::v::ConstCStr sapi_ssl_key(ssl_key.c_str());
2020-08-18 18:44:53 +08:00
status_or_int =
api.curl_easy_setopt_ptr(&curl, CURLOPT_SSLKEY, sapi_ssl_key.PtrBefore());
2020-08-22 00:08:10 +08:00
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK)
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << status_or_int.status();
2020-08-13 00:33:45 +08:00
// Set the password used to protect the private key
sapi::v::ConstCStr sapi_ssl_key_password(ssl_key_password.c_str());
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_KEYPASSWD,
sapi_ssl_key_password.PtrBefore());
2020-08-22 00:08:10 +08:00
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK)
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << status_or_int.status();
2020-08-13 00:33:45 +08:00
// Set the file with the certificates vaildating the server
sapi::v::ConstCStr sapi_ca_certificates(ca_certificates.c_str());
2020-08-18 18:44:53 +08:00
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_CAINFO,
2020-08-13 00:33:45 +08:00
sapi_ca_certificates.PtrBefore());
2020-08-22 00:08:10 +08:00
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK)
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << status_or_int.status();
2020-08-13 00:33:45 +08:00
// Verify the authenticity of the server
status_or_int = api.curl_easy_setopt_long(&curl, CURLOPT_SSL_VERIFYPEER, 1L);
2020-08-22 00:08:10 +08:00
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK)
LOG(FATAL) << "curl_easy_setopt_long failed: " << status_or_int.status();
2020-08-13 00:33:45 +08:00
// Perform the request
status_or_int = api.curl_easy_perform(&curl);
2020-08-22 00:08:10 +08:00
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK)
LOG(FATAL) << "curl_easy_perform failed: " << status_or_int.status();
2020-08-13 00:33:45 +08:00
// Cleanup curl easy handle
status = api.curl_easy_cleanup(&curl);
2020-08-22 00:08:10 +08:00
if (!status.ok()) LOG(FATAL) << "curl_easy_cleanup failed: " << status;
2020-08-13 00:33:45 +08:00
// Cleanup curl
status = api.curl_global_cleanup();
2020-08-22 00:08:10 +08:00
if (!status.ok()) LOG(FATAL) << "curl_global_cleanup failed: " << status;
2020-08-13 00:33:45 +08:00
2020-08-18 18:44:53 +08:00
return EXIT_SUCCESS;
2020-08-21 01:47:08 +08:00
}