2020-01-17 21:05:03 +08:00
|
|
|
# Copyright 2019 Google LLC
|
2019-03-19 00:21:48 +08:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
2022-01-28 17:38:27 +08:00
|
|
|
# https://www.apache.org/licenses/LICENSE-2.0
|
2019-03-19 00:21:48 +08:00
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
# The 'tool' example demonstrates:
|
|
|
|
# - a sandbox executor, sandboxee would be another program
|
|
|
|
# - sandboxee sandboxed before execve
|
|
|
|
# - very lax, separate sandbox policy written with BPFDSL
|
|
|
|
# - expose file descriptors to executor with ReceiveFd
|
|
|
|
# - set limits, wall time, filesystem checks, asynchronous run
|
|
|
|
# - test to ensure sandbox executor runs sandboxee without issue
|
|
|
|
|
2019-05-09 20:21:11 +08:00
|
|
|
load("//sandboxed_api/bazel:build_defs.bzl", "sapi_platform_copts")
|
|
|
|
|
2023-06-07 17:22:31 +08:00
|
|
|
package(default_visibility = [
|
|
|
|
"//sandboxed_api/sandbox2:__subpackages__",
|
|
|
|
])
|
|
|
|
|
2021-01-14 01:25:25 +08:00
|
|
|
licenses(["notice"])
|
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
# Executor
|
|
|
|
cc_binary(
|
|
|
|
name = "sandbox2tool",
|
|
|
|
srcs = ["sandbox2tool.cc"],
|
2019-05-09 20:21:11 +08:00
|
|
|
copts = sapi_platform_copts(),
|
2019-03-19 00:21:48 +08:00
|
|
|
deps = [
|
|
|
|
"//sandboxed_api/sandbox2",
|
2023-03-01 21:35:51 +08:00
|
|
|
"//sandboxed_api/sandbox2:allow_all_syscalls",
|
2019-03-19 00:21:48 +08:00
|
|
|
"//sandboxed_api/sandbox2:util",
|
|
|
|
"//sandboxed_api/sandbox2/util:bpf_helper",
|
2021-01-14 01:25:25 +08:00
|
|
|
"//sandboxed_api/util:fileops",
|
2023-08-24 21:23:03 +08:00
|
|
|
"@com_google_absl//absl/base:log_severity",
|
2022-10-20 21:48:06 +08:00
|
|
|
"@com_google_absl//absl/flags:flag",
|
|
|
|
"@com_google_absl//absl/flags:parse",
|
2022-10-25 23:04:50 +08:00
|
|
|
"@com_google_absl//absl/flags:usage",
|
2022-10-20 21:48:06 +08:00
|
|
|
"@com_google_absl//absl/log",
|
2023-08-24 21:23:03 +08:00
|
|
|
"@com_google_absl//absl/log:check",
|
2022-10-20 21:48:06 +08:00
|
|
|
"@com_google_absl//absl/log:globals",
|
|
|
|
"@com_google_absl//absl/log:initialize",
|
2019-03-19 00:21:48 +08:00
|
|
|
"@com_google_absl//absl/strings",
|
|
|
|
"@com_google_absl//absl/strings:str_format",
|
2022-03-09 17:01:16 +08:00
|
|
|
"@com_google_absl//absl/time",
|
2019-03-19 00:21:48 +08:00
|
|
|
],
|
|
|
|
)
|
2021-10-04 22:17:36 +08:00
|
|
|
|
|
|
|
# Test
|
|
|
|
sh_test(
|
|
|
|
name = "sandbox2tool_test",
|
|
|
|
srcs = ["sandbox2tool_test.sh"],
|
|
|
|
data = [":sandbox2tool"],
|
2021-11-29 21:19:36 +08:00
|
|
|
tags = ["no_qemu_user_mode"],
|
2021-10-04 22:17:36 +08:00
|
|
|
)
|