sandboxed-api/oss-internship-2020/libuv/examples/uvcat.cc

113 lines
3.3 KiB
C++
Raw Normal View History

2020-09-22 22:41:06 +08:00
// Copyright 2020 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
2020-09-22 22:41:06 +08:00
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <linux/futex.h>
#include <syscall.h>
#include <uv.h>
#include <iostream>
#include "sandboxed_api/util/flag.h"
#include "uv_sapi.sapi.h" // NOLINT(build/include)
2020-09-22 22:41:06 +08:00
2020-09-29 02:41:37 +08:00
namespace {
2020-09-25 23:06:24 +08:00
class UVSapiUVCatSandbox : public uv::UVSandbox {
2020-09-22 22:41:06 +08:00
public:
UVSapiUVCatSandbox(std::string filename) : filename(filename) {}
private:
std::unique_ptr<sandbox2::Policy> ModifyPolicy(
sandbox2::PolicyBuilder*) override {
return sandbox2::PolicyBuilder()
.AddFile(filename)
.AllowDynamicStartup()
.AllowExit()
.AllowFork()
.AllowFutexOp(FUTEX_WAKE_PRIVATE)
.AllowFutexOp(FUTEX_WAIT_PRIVATE)
.AllowMmap()
.AllowOpen()
.AllowSyscalls({__NR_epoll_create1, __NR_epoll_ctl, __NR_epoll_wait,
__NR_eventfd2, __NR_pipe2, __NR_prlimit64})
.AllowWrite()
.BuildOrDie();
}
std::string filename;
};
2020-09-25 23:06:24 +08:00
absl::Status UVCat(std::string filearg) {
2020-09-22 22:41:06 +08:00
// Initialize sandbox2 and sapi
2020-09-25 23:06:24 +08:00
UVSapiUVCatSandbox sandbox(filearg);
SAPI_RETURN_IF_ERROR(sandbox.Init());
uv::UVApi api(&sandbox);
2020-09-22 22:41:06 +08:00
// Get remote pointer to the OnOpen method
void* function_ptr;
2020-09-25 23:06:24 +08:00
SAPI_RETURN_IF_ERROR(sandbox.rpc_channel()->Symbol("OnOpen", &function_ptr));
2020-09-22 22:41:06 +08:00
sapi::v::RemotePtr on_open(function_ptr);
// Get remote pointer to the open_req variable
void* open_req_voidptr;
SAPI_RETURN_IF_ERROR(
sandbox.rpc_channel()->Symbol("open_req", &open_req_voidptr));
2020-09-22 22:41:06 +08:00
sapi::v::RemotePtr open_req(open_req_voidptr);
// Get default loop
2020-09-25 23:06:24 +08:00
SAPI_ASSIGN_OR_RETURN(void* loop_voidptr, api.sapi_uv_default_loop());
sapi::v::RemotePtr loop(loop_voidptr);
2020-09-22 22:41:06 +08:00
2020-09-25 23:06:24 +08:00
int return_code;
2020-09-22 22:41:06 +08:00
// Open file using the OnOpen callback (which will also read and print it)
2020-09-25 23:06:24 +08:00
sapi::v::ConstCStr filename(filearg.c_str());
SAPI_ASSIGN_OR_RETURN(
return_code, api.sapi_uv_fs_open(&loop, &open_req, filename.PtrBefore(),
2020-09-25 23:06:24 +08:00
O_RDONLY, 0, &on_open));
if (return_code != 0) {
return absl::UnavailableError("uv_fs_open returned error " + return_code);
2020-09-22 22:41:06 +08:00
}
// Run loop
2020-09-25 23:06:24 +08:00
SAPI_ASSIGN_OR_RETURN(return_code, api.sapi_uv_run(&loop, UV_RUN_DEFAULT));
if (return_code != 0) {
return absl::UnavailableError("uv_run returned error " + return_code);
2020-09-22 22:41:06 +08:00
}
// Cleanup the request
2020-09-25 23:06:24 +08:00
SAPI_RETURN_IF_ERROR(api.sapi_uv_fs_req_cleanup(&open_req));
return absl::OkStatus();
}
2020-09-29 02:41:37 +08:00
} // namespace
2020-09-25 23:06:24 +08:00
int main(int argc, char* argv[]) {
gflags::ParseCommandLineFlags(&argc, &argv, true);
sapi::InitLogging(argv[0]);
2020-09-25 23:06:24 +08:00
if (argc != 2) {
LOG(ERROR) << "wrong number of arguments (1 expected)";
return EXIT_FAILURE;
}
if (absl::Status status = UVCat(argv[1]); !status.ok()) {
LOG(ERROR) << "UVCat failed: " << status.ToString();
return EXIT_FAILURE;
2020-09-22 22:41:06 +08:00
}
return EXIT_SUCCESS;
}