mirror of
https://github.com/google/sandboxed-api.git
synced 2024-03-22 13:11:30 +08:00
Copybara import of the project:
Including changes for GitHub -> internal migration --b5d7e43dde
by Federico Stazi <34340238+FedericoStazi@users.noreply.github.com>: Initial curl commit --24786c44d8
by Federico Stazi <fstazi@google.com>: Added gitignore and curl submodule --6d5cfd575a
by Federico Stazi <fstazi@google.com>: Added new line at the end of files --c7423c5f8a
by Federico Stazi <fstazi@google.com>: Remove SHARED from add_sapi_library --05c0a4b004
by Federico Stazi <fstazi@google.com>: Fix includes --5be51fabbe
by Federico Stazi <fstazi@google.com>: Improve comments --34338411b8
by Federico Stazi <fstazi@google.com>: Improve style --8c68ac221f
by Federico Stazi <fstazi@google.com>: Address review comments --ac1112ae4d
by Federico Stazi <fstazi@google.com>: Minor fix --f47e1cc6ac
by Federico Stazi <fstazi@google.com>: Implement all curl methods --9291231275
by Federico Stazi <fstazi@google.com>: Address reviews and improve code style --1b0a8edfd4
by Federico Stazi <fstazi@google.com>: Minor fix --cea046d3e2
by Federico Stazi <fstazi@google.com>: Implement stricter policy --cf23888b88
by Federico Stazi <fstazi@google.com>: Improve and extend examples --6167cafbde
by Federico Stazi <fstazi@google.com>: Implement tests --9fed2ec097
by Federico Stazi <fstazi@google.com>: Improved error handling --e446ec81a1
by Federico Stazi <fstazi@google.com>: Address review comments --cf41ec4701
by Federico Stazi <34340238+FedericoStazi@users.noreply.github.com>: Fix project name --9a4293a3cf
by Federico Stazi <fstazi@google.com>: Fix project name --bbebeee1a6
by Federico Stazi <fstazi@google.com>: Fix test mock server --eb783de3f5
by Federico Stazi <fstazi@google.com>: Address review comments --cf6cb89bca
by Federico Stazi <fstazi@google.com>: Minor mock server fix --b52d9e6e4f
by Federico Stazi <fstazi@google.com>: Address review comments PiperOrigin-RevId: 333292204 Change-Id: I9ff27348028d9f22486492dc92c0859ff8f44d68
This commit is contained in:
parent
00e724fb8a
commit
9331eabd7e
3
.gitmodules
vendored
3
.gitmodules
vendored
|
@ -4,3 +4,6 @@
|
|||
[submodule "oss-internship-2020/pffft/master"]
|
||||
path = oss-internship-2020/pffft/master
|
||||
url = https://bitbucket.org/jpommier/pffft/src/master/
|
||||
[submodule "oss-internship-2020/curl/curl_wrapper/curl"]
|
||||
path = oss-internship-2020/curl/curl_wrapper/curl
|
||||
url = https://github.com/curl/curl
|
||||
|
|
1
oss-internship-2020/curl/.gitignore
vendored
Normal file
1
oss-internship-2020/curl/.gitignore
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
build/
|
144
oss-internship-2020/curl/CMakeLists.txt
Normal file
144
oss-internship-2020/curl/CMakeLists.txt
Normal file
|
@ -0,0 +1,144 @@
|
|||
# Copyright 2020 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
cmake_minimum_required(VERSION 3.16)
|
||||
|
||||
project(libcurl_sandbox)
|
||||
|
||||
set(CMAKE_CXX_STANDARD 17)
|
||||
set(CMAKE_CXX_STANDARD_REQUIRED True)
|
||||
|
||||
option(CURL_SAPI_ENABLE_EXAMPLES "" ON)
|
||||
option(CURL_SAPI_ENABLE_TESTS "" ON)
|
||||
|
||||
# Add callbacks used by examples and tests
|
||||
if (CURL_SAPI_ENABLE_EXAMPLES OR CURL_SAPI_ENABLE_TESTS)
|
||||
list(APPEND CURL_SAPI_CALLBACKS
|
||||
"${CMAKE_CURRENT_SOURCE_DIR}/callbacks/callbacks.h"
|
||||
"${CMAKE_CURRENT_SOURCE_DIR}/callbacks/callbacks.cc"
|
||||
)
|
||||
endif()
|
||||
|
||||
# Add folder containing the non-sandboxed custom curl library
|
||||
add_subdirectory(curl_wrapper)
|
||||
|
||||
# Setup Sandboxed API
|
||||
set(SAPI_ROOT "" CACHE PATH "Path to the Sandboxed API source tree")
|
||||
set(SAPI_ENABLE_EXAMPLES ${CURL_SAPI_ENABLE_EXAMPLES} CACHE BOOL "" FORCE)
|
||||
set(SAPI_ENABLE_TESTS ${CURL_SAPI_ENABLE_TESTS} CACHE BOOL "" FORCE)
|
||||
add_subdirectory(
|
||||
"${SAPI_ROOT}"
|
||||
"${CMAKE_BINARY_DIR}/sandboxed-api-build"
|
||||
EXCLUDE_FROM_ALL
|
||||
)
|
||||
|
||||
# Generate SAPI header
|
||||
add_sapi_library(curl_sapi
|
||||
|
||||
# List of all the methods in https://curl.haxx.se/libcurl/c/allfuncs.html
|
||||
# Some are added or modified because the original ones are not supported
|
||||
# by Sandboxed API (details can be found in curl_wrapper.h)
|
||||
FUNCTIONS curl_easy_cleanup
|
||||
curl_easy_duphandle
|
||||
curl_easy_escape
|
||||
curl_easy_getinfo
|
||||
curl_easy_getinfo_ptr
|
||||
curl_easy_init
|
||||
curl_easy_pause
|
||||
curl_easy_perform
|
||||
curl_easy_recv
|
||||
curl_easy_reset
|
||||
curl_easy_send
|
||||
curl_easy_setopt
|
||||
curl_easy_setopt_ptr
|
||||
curl_easy_setopt_long
|
||||
curl_easy_setopt_curl_off_t
|
||||
curl_easy_strerror
|
||||
curl_easy_unescape
|
||||
curl_easy_upkeep
|
||||
curl_free
|
||||
curl_getdate_sapi
|
||||
curl_global_cleanup
|
||||
curl_global_init
|
||||
curl_global_init_mem
|
||||
curl_global_sslset
|
||||
curl_mime_addpart
|
||||
curl_mime_data
|
||||
curl_mime_data_cb
|
||||
curl_mime_encoder
|
||||
curl_mime_filedata
|
||||
curl_mime_filename
|
||||
curl_mime_free
|
||||
curl_mime_headers
|
||||
curl_mime_init
|
||||
curl_mime_name
|
||||
curl_mime_subparts
|
||||
curl_mime_type
|
||||
curl_multi_add_handle
|
||||
curl_multi_assign
|
||||
curl_multi_cleanup
|
||||
curl_multi_fdset_sapi
|
||||
curl_multi_info_read
|
||||
curl_multi_init
|
||||
curl_multi_perform
|
||||
curl_multi_remove_handle
|
||||
curl_multi_setopt
|
||||
curl_multi_setopt_ptr
|
||||
curl_multi_setopt_long
|
||||
curl_multi_setopt_curl_off_t
|
||||
curl_multi_socket_action
|
||||
curl_multi_strerror
|
||||
curl_multi_timeout
|
||||
curl_multi_poll_sapi
|
||||
curl_multi_wait_sapi
|
||||
curl_multi_wakeup
|
||||
curl_share_init
|
||||
curl_share_setopt
|
||||
curl_share_setopt_ptr
|
||||
curl_share_setopt_long
|
||||
curl_share_strerror
|
||||
curl_slist_append
|
||||
curl_slist_free_all
|
||||
curl_url
|
||||
curl_url_cleanup
|
||||
curl_url_dup
|
||||
curl_url_get
|
||||
curl_url_set
|
||||
curl_version
|
||||
curl_version_info
|
||||
|
||||
INPUTS curl_wrapper/curl/include/curl/curl.h
|
||||
curl_wrapper/curl_wrapper.h
|
||||
|
||||
LIBRARY curl_wrapper_and_callbacks
|
||||
|
||||
LIBRARY_NAME Curl
|
||||
|
||||
NAMESPACE ""
|
||||
)
|
||||
|
||||
# Include generated SAPI header
|
||||
target_include_directories(curl_sapi INTERFACE
|
||||
"${PROJECT_BINARY_DIR}"
|
||||
)
|
||||
|
||||
# Add examples
|
||||
if (CURL_SAPI_ENABLE_EXAMPLES)
|
||||
add_subdirectory(examples)
|
||||
endif()
|
||||
|
||||
# Add tests
|
||||
if (CURL_SAPI_ENABLE_TESTS)
|
||||
add_subdirectory(tests)
|
||||
endif()
|
112
oss-internship-2020/curl/README.md
Normal file
112
oss-internship-2020/curl/README.md
Normal file
|
@ -0,0 +1,112 @@
|
|||
# LibCurl Sandbox
|
||||
|
||||
This library is a sandboxed version of curl's C API,
|
||||
[libcurl](https://curl.haxx.se/libcurl/c/), implemented using Sandboxed API.
|
||||
|
||||
## Setup
|
||||
|
||||
The repository can be cloned using: `git clone --recursive [URL to this repo]`
|
||||
The `--recursive` flag ensures that submodules are also cloned.
|
||||
|
||||
Alternatively, if the repository has already been cloned but the submodules have
|
||||
not, these can be cloned using: `git submodule update --init --recursive`
|
||||
|
||||
The full list of Sandboxed API dependencies can be found on
|
||||
[Sandboxed API Getting Started page](https://developers.google.com/sandboxed-api/docs/getting-started).
|
||||
|
||||
The following commands, used from the current `curl/` directory, build the
|
||||
library: `mkdir -p build cd build cmake .. -G Ninja -D SAPI_ROOT=[path to
|
||||
sandboxed-api] cmake --build .`
|
||||
|
||||
## Implementation details
|
||||
|
||||
All of libcurl's methods are supported by the library. However, a few of these
|
||||
have different signatures defined in the sandboxed header `custom_curl.h`, which
|
||||
wraps and extends libcurl.
|
||||
|
||||
This is necessary because Sandboxed API sandboxes most of libcurl correctly, but
|
||||
encounters some issues when sandboxing a few methods. The simplest solution is
|
||||
wrapping these methods into wrapper methods that accomplish the same tasks but
|
||||
can also be sandboxed.
|
||||
|
||||
The next sections describe the issues encountered and contain some information
|
||||
on the signatures of the wrapper methods solving these issues.
|
||||
|
||||
#### Variadic methods
|
||||
|
||||
Variadic methods are currently not supported by Sandboxed API. To solve this,
|
||||
these methods are defined with an additional explicit parameter in
|
||||
`custom_curl.h`.
|
||||
|
||||
The methods are: - `curl_easy_setopt`. Use `curl_easy_setopt_ptr`,
|
||||
`curl_easy_setopt_long` or `curl_easy_setopt_curl_off_t` instead. -
|
||||
`curl_easy_getinfo`. Use `curl_easy_getinfo_ptr` instead. - `curl_multi_setopt`.
|
||||
Use `curl_multi_setopt_ptr`, `curl_multi_setopt_long` or
|
||||
`curl_multi_setopt_curl_off_t` instead. - `curl_share_setopt`. Use
|
||||
`curl_share_setopt_ptr` or `curl_share_setopt_long` instead
|
||||
|
||||
#### Methods with incomplete array arguments
|
||||
|
||||
Incomplete array arguments are currently not supported by Sandboxed API. To
|
||||
solve this, methods taking an incomplete array argument have a wrapper in
|
||||
`custom_curl.h`, and take a pointer as the argument.
|
||||
|
||||
The methods are: - `curl_multi_poll`. Use `curl_multi_poll_sapi` instead. -
|
||||
`curl_multi_wait`. Use `curl_multi_wait_sapi` instead.
|
||||
|
||||
#### Methods with conflicts on the generated header
|
||||
|
||||
Some methods create conflicts on the generated header because of redefined
|
||||
`#define` directives from files included by the header. To solve this, the
|
||||
conflicting types and methods are redefined in `custom_curl.h`.
|
||||
|
||||
The types are: - `time_t`. Use `time_t_sapi` instead. - `fd_set`. Use
|
||||
`fd_set_sapi` instead.
|
||||
|
||||
The methods are: - `curl_getdate`. Use `curl_getdate_sapi` instead. -
|
||||
`curl_multi_fdset`. Use `curl_multi_fdset_sapi` instead.
|
||||
|
||||
#### Function pointers
|
||||
|
||||
The functions whose pointers will be passed to the library's methods
|
||||
(*callbacks*) can't be implemented in the files making use of the library, but
|
||||
must be in other files. These files must be compiled together with the library,
|
||||
and this is done by adding their absolute path to the cmake variable
|
||||
`CURL_SAPI_CALLBACKS`.
|
||||
|
||||
The pointers can then be obtained using an `RPCChannel` object, as shown in
|
||||
`example2.cc`.
|
||||
|
||||
## Examples
|
||||
|
||||
The `examples` directory contains the sandboxed versions of example source codes
|
||||
taken from [this page](https://curl.haxx.se/libcurl/c/example.html) on curl's
|
||||
website. More information about each example can be found in the examples'
|
||||
[README](examples/README.md).
|
||||
|
||||
To build these examples when building the library, the cmake variable
|
||||
`CURL_SAPI_ENABLE_EXAMPLES` must be set to `ON`. This enables Sandboxed API
|
||||
examples as well.
|
||||
|
||||
## Policy
|
||||
|
||||
The `sandbox.h` file contains a policy allowing all is necessary for libcurl to
|
||||
perform simple requests. It is used by all the examples, except by example3.
|
||||
This example needs some additional policies and files in its namespace (since it
|
||||
uses HTTPS), and the file `example3.cc` shows how to easily extend an existing
|
||||
policy.
|
||||
|
||||
## Testing
|
||||
|
||||
The `tests` folder contains some test cases created using Google Test. The class
|
||||
`CurlTestUtils` is used to facilitate some tasks that all test cases need,
|
||||
including the setup of a mock local server on which test requests are performed.
|
||||
|
||||
To build these tests when building the library, the cmake variable
|
||||
`CURL_SAPI_ENABLE_TESTS` must be set to `ON`. This enables Sandboxed API tests
|
||||
as well.
|
||||
|
||||
## Callbacks
|
||||
|
||||
The `callbacks.h` and `callbacks.cc` files implement all the callbacks used by
|
||||
examples and tests.
|
37
oss-internship-2020/curl/callbacks/callbacks.cc
Normal file
37
oss-internship-2020/curl/callbacks/callbacks.cc
Normal file
|
@ -0,0 +1,37 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#include "callbacks.h" // NOLINT(build/include)
|
||||
|
||||
#include <cstdlib>
|
||||
#include <cstring>
|
||||
|
||||
#include "sandboxed_api/vars.h"
|
||||
|
||||
size_t WriteToMemory(char* contents, size_t size, size_t num_bytes,
|
||||
void* userp) {
|
||||
size_t real_size = size * num_bytes;
|
||||
auto* mem = static_cast<sapi::LenValStruct*>(userp);
|
||||
|
||||
char* ptr = static_cast<char*>(realloc(mem->data, mem->size + real_size + 1));
|
||||
if (ptr == nullptr) return 0;
|
||||
|
||||
mem->data = ptr;
|
||||
auto data = static_cast<char*>(mem->data);
|
||||
memcpy(&(data[mem->size]), contents, real_size);
|
||||
mem->size += real_size;
|
||||
data[mem->size] = 0;
|
||||
|
||||
return real_size;
|
||||
}
|
24
oss-internship-2020/curl/callbacks/callbacks.h
Normal file
24
oss-internship-2020/curl/callbacks/callbacks.h
Normal file
|
@ -0,0 +1,24 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#ifndef TESTS_CALLBACKS_H
|
||||
#define TESTS_CALLBACKS_H
|
||||
|
||||
#include <curl/curl.h>
|
||||
|
||||
// Append contents to the string stored by userp, which is a sapi::LenValStruct*
|
||||
extern "C" size_t WriteToMemory(char* contents, size_t size, size_t num_bytes,
|
||||
void* userp);
|
||||
|
||||
#endif // TESTS_CALLBACKS_H
|
37
oss-internship-2020/curl/curl_wrapper/CMakeLists.txt
Normal file
37
oss-internship-2020/curl/curl_wrapper/CMakeLists.txt
Normal file
|
@ -0,0 +1,37 @@
|
|||
# Copyright 2020 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
# Wrapper library including curl, wrappers for some methods and callbacks
|
||||
# The CURL_SAPI_CALLBACKS variable should contain the absolute paths of
|
||||
# all the files implementing the callbacks
|
||||
add_library(curl_wrapper_and_callbacks OBJECT
|
||||
curl_wrapper.h
|
||||
curl_wrapper.cc
|
||||
"${CURL_SAPI_CALLBACKS}"
|
||||
)
|
||||
set_target_properties(curl_wrapper_and_callbacks
|
||||
PROPERTIES LINKER_LANGUAGE C
|
||||
)
|
||||
|
||||
# Flags needed to build curl statically
|
||||
set(CURL_HIDDEN_SYMBOLS OFF)
|
||||
set(BUILD_SHARED_LIBS OFF)
|
||||
|
||||
# Link the wrapper to the original curl library (testing is disabled in curl)
|
||||
set(BUILD_TESTING OFF)
|
||||
add_subdirectory(curl)
|
||||
target_link_libraries(curl_wrapper_and_callbacks
|
||||
CURL::libcurl
|
||||
sapi::sapi
|
||||
)
|
86
oss-internship-2020/curl/curl_wrapper/curl_wrapper.cc
Normal file
86
oss-internship-2020/curl/curl_wrapper/curl_wrapper.cc
Normal file
|
@ -0,0 +1,86 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#include "curl_wrapper.h" // NOLINT(build/include)
|
||||
|
||||
CURLcode curl_easy_setopt_ptr(CURL* handle, CURLoption option,
|
||||
void* parameter) {
|
||||
return curl_easy_setopt(handle, option, parameter);
|
||||
}
|
||||
|
||||
CURLcode curl_easy_setopt_long(CURL* handle, CURLoption option,
|
||||
long parameter) {
|
||||
return curl_easy_setopt(handle, option, parameter);
|
||||
}
|
||||
|
||||
CURLcode curl_easy_setopt_curl_off_t(CURL* handle, CURLoption option,
|
||||
curl_off_t parameter) {
|
||||
return curl_easy_setopt(handle, option, parameter);
|
||||
}
|
||||
|
||||
CURLcode curl_easy_getinfo_ptr(CURL* handle, CURLINFO option, void* parameter) {
|
||||
return curl_easy_getinfo(handle, option, parameter);
|
||||
}
|
||||
|
||||
time_t_sapi curl_getdate_sapi(char* datestring, time_t_sapi* now) {
|
||||
return curl_getdate(datestring, now);
|
||||
}
|
||||
|
||||
CURLMcode curl_multi_fdset_sapi(CURLM* multi_handle, fd_set_sapi* read_fd_set,
|
||||
fd_set_sapi* write_fd_set,
|
||||
fd_set_sapi* exc_fd_set, int* max_fd) {
|
||||
return curl_multi_fdset(multi_handle, read_fd_set, write_fd_set, exc_fd_set,
|
||||
max_fd);
|
||||
}
|
||||
|
||||
CURLMcode curl_multi_setopt_ptr(CURLM* handle, CURLMoption option,
|
||||
void* parameter) {
|
||||
return curl_multi_setopt(handle, option, parameter);
|
||||
}
|
||||
|
||||
CURLMcode curl_multi_setopt_long(CURLM* handle, CURLMoption option,
|
||||
long parameter) {
|
||||
return curl_multi_setopt(handle, option, parameter);
|
||||
}
|
||||
|
||||
CURLMcode curl_multi_setopt_curl_off_t(CURLM* handle, CURLMoption option,
|
||||
curl_off_t parameter) {
|
||||
return curl_multi_setopt(handle, option, parameter);
|
||||
}
|
||||
|
||||
CURLMcode curl_multi_poll_sapi(CURLM* multi_handle,
|
||||
struct curl_waitfd* extra_fds,
|
||||
unsigned int extra_nfds, int timeout_ms,
|
||||
int* numfds) {
|
||||
return curl_multi_poll(multi_handle, extra_fds, extra_nfds, timeout_ms,
|
||||
numfds);
|
||||
}
|
||||
|
||||
CURLMcode curl_multi_wait_sapi(CURLM* multi_handle,
|
||||
struct curl_waitfd* extra_fds,
|
||||
unsigned int extra_nfds, int timeout_ms,
|
||||
int* numfds) {
|
||||
return curl_multi_wait(multi_handle, extra_fds, extra_nfds, timeout_ms,
|
||||
numfds);
|
||||
}
|
||||
|
||||
CURLSHcode curl_share_setopt_ptr(CURLSH* handle, CURLSHoption option,
|
||||
void* parameter) {
|
||||
return curl_share_setopt(handle, option, parameter);
|
||||
}
|
||||
|
||||
CURLSHcode curl_share_setopt_long(CURLSH* handle, CURLSHoption option,
|
||||
long parameter) {
|
||||
return curl_share_setopt(handle, option, parameter);
|
||||
}
|
82
oss-internship-2020/curl/curl_wrapper/curl_wrapper.h
Normal file
82
oss-internship-2020/curl/curl_wrapper/curl_wrapper.h
Normal file
|
@ -0,0 +1,82 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
// Wrapper for curl library
|
||||
|
||||
#ifndef CURL_WRAPPER_H
|
||||
#define CURL_WRAPPER_H
|
||||
|
||||
#include <curl/curl.h>
|
||||
|
||||
extern "C" {
|
||||
|
||||
// The wrapper method is needed to make the variadic argument explicit
|
||||
CURLcode curl_easy_setopt_ptr(CURL* handle, CURLoption option, void* parameter);
|
||||
|
||||
// The wrapper method is needed to make the variadic argument explicit
|
||||
CURLcode curl_easy_setopt_long(CURL* handle, CURLoption option, long parameter);
|
||||
|
||||
// The wrapper method is needed to make the variadic argument explicit
|
||||
CURLcode curl_easy_setopt_curl_off_t(CURL* handle, CURLoption option,
|
||||
curl_off_t parameter);
|
||||
|
||||
// The wrapper method is needed to make the variadic argument explicit
|
||||
CURLcode curl_easy_getinfo_ptr(CURL* handle, CURLINFO option, void* parameter);
|
||||
|
||||
// The typedef and wrapper method are needed because the original method has
|
||||
// some conflicts in curl_sapi.sapi.h
|
||||
typedef time_t time_t_sapi;
|
||||
time_t_sapi curl_getdate_sapi(char* datestring, time_t_sapi* now);
|
||||
|
||||
// The typedef and wrapper method are needed because the original method has
|
||||
// some conflicts in curl_sapi.sapi.h
|
||||
typedef fd_set fd_set_sapi;
|
||||
CURLMcode curl_multi_fdset_sapi(CURLM* multi_handle, fd_set_sapi* read_fd_set,
|
||||
fd_set_sapi* write_fd_set,
|
||||
fd_set_sapi* exc_fd_set, int* max_fd);
|
||||
|
||||
// The wrapper method is needed to make the variadic argument explicit
|
||||
CURLMcode curl_multi_setopt_ptr(CURLM* handle, CURLMoption option,
|
||||
void* parameter);
|
||||
|
||||
// The wrapper method is needed to make the variadic argument explicit
|
||||
CURLMcode curl_multi_setopt_long(CURLM* handle, CURLMoption option,
|
||||
long parameter);
|
||||
|
||||
// The wrapper method is needed to make the variadic argument explicit
|
||||
CURLMcode curl_multi_setopt_curl_off_t(CURLM* handle, CURLMoption option,
|
||||
curl_off_t parameter);
|
||||
|
||||
// The wrapper method is needed because incomplete array type is not supported
|
||||
CURLMcode curl_multi_poll_sapi(CURLM* multi_handle,
|
||||
struct curl_waitfd* extra_fds,
|
||||
unsigned int extra_nfds, int timeout_ms,
|
||||
int* numfds);
|
||||
|
||||
// The wrapper method is needed because incomplete array type is not supported
|
||||
CURLMcode curl_multi_wait_sapi(CURLM* multi_handle,
|
||||
struct curl_waitfd* extra_fds,
|
||||
unsigned int extra_nfds, int timeout_ms,
|
||||
int* numfds);
|
||||
|
||||
// The wrapper method is needed to make the variadic argument explicit
|
||||
CURLSHcode curl_share_setopt_ptr(CURLSH* handle, CURLSHoption option,
|
||||
void* parameter);
|
||||
|
||||
// The wrapper method is needed to make the variadic argument explicit
|
||||
CURLSHcode curl_share_setopt_long(CURLSH* handle, CURLSHoption option,
|
||||
long parameter);
|
||||
}
|
||||
|
||||
#endif // CURL_WRAPPER_H
|
76
oss-internship-2020/curl/examples/CMakeLists.txt
Normal file
76
oss-internship-2020/curl/examples/CMakeLists.txt
Normal file
|
@ -0,0 +1,76 @@
|
|||
# Copyright 2020 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
# All the examples are sandboxed versions of curl's examples
|
||||
# (https://curl.haxx.se/libcurl/c/example.html)
|
||||
|
||||
# Example 1: simple.c
|
||||
add_executable(example1
|
||||
example1.cc
|
||||
../sandbox.h
|
||||
)
|
||||
target_link_libraries(example1 PRIVATE
|
||||
curl_sapi
|
||||
sapi::sapi
|
||||
)
|
||||
|
||||
# Example 2: getinmemory.c
|
||||
add_executable(example2
|
||||
example2.cc
|
||||
../sandbox.h
|
||||
)
|
||||
target_link_libraries(example2 PRIVATE
|
||||
curl_sapi
|
||||
sapi::sapi
|
||||
)
|
||||
|
||||
# Example 3: simplessl.c
|
||||
add_executable(example3
|
||||
example3.cc
|
||||
../sandbox.h
|
||||
)
|
||||
target_link_libraries(example3 PRIVATE
|
||||
curl_sapi
|
||||
sapi::sapi
|
||||
)
|
||||
|
||||
# Example 4: multi-poll.c
|
||||
add_executable(example4
|
||||
example4.cc
|
||||
../sandbox.h
|
||||
)
|
||||
target_link_libraries(example4 PRIVATE
|
||||
curl_sapi
|
||||
sapi::sapi
|
||||
)
|
||||
|
||||
# Example 5: multithread.c
|
||||
add_executable(example5
|
||||
example5.cc
|
||||
../sandbox.h
|
||||
)
|
||||
target_link_libraries(example5 PRIVATE
|
||||
curl_sapi
|
||||
sapi::sapi
|
||||
)
|
||||
|
||||
# Example 6: simple.c (using transactions)
|
||||
add_executable(example6
|
||||
example6.cc
|
||||
../sandbox.h
|
||||
)
|
||||
target_link_libraries(example6 PRIVATE
|
||||
curl_sapi
|
||||
sapi::sapi
|
||||
)
|
38
oss-internship-2020/curl/examples/README.md
Normal file
38
oss-internship-2020/curl/examples/README.md
Normal file
|
@ -0,0 +1,38 @@
|
|||
# LibCurl Sandbox Examples
|
||||
|
||||
Each example in this folder is the sandboxed version of a code snippet from
|
||||
[this page](https://curl.haxx.se/libcurl/c/example.html) on curl's website.
|
||||
These examples perform some basic tasks using libcurl, and can be useful both to
|
||||
understand how to use LibCurl Sandbox, but also to get an idea of how regular
|
||||
and sandboxed code compare to each other.
|
||||
|
||||
This is the list of the examples:
|
||||
|
||||
- **example1**: sandboxed version of
|
||||
[simple.c](https://curl.haxx.se/libcurl/c/simple.html). Really simple HTTP
|
||||
request, downloads and prints out the page at
|
||||
[example.com](http://example.com).
|
||||
- **example2**: sandboxed version of
|
||||
[getinmemory.c](https://curl.haxx.se/libcurl/c/getinmemory.html). Same HTTP
|
||||
request as example1. The difference is that this example uses a callback to
|
||||
save the page directly in memory. Only the page size is printed out.
|
||||
- **example3**: sandboxed version of
|
||||
[simplessl.c](https://curl.haxx.se/libcurl/c/simplessl.html). HTTPS request
|
||||
of the [example.com](https://example.com) page, using SSL authentication.
|
||||
This script takes 4 arguments (SSL certificates file, SSL keys file, SSL
|
||||
keys password and CA certificates files), and prints out the page.
|
||||
- **example4**: sandboxed version of
|
||||
[multi-poll.c](https://curl.haxx.se/libcurl/c/multi-poll.html). Same HTTP
|
||||
request as example1, with the addition of a polling method that can be used
|
||||
to track the status of the request. The page is printed out after it is
|
||||
downloaded.
|
||||
- **example5**: sandboxed version of
|
||||
[multithread.c](https://curl.haxx.se/libcurl/c/multithread.html). Four HTTP
|
||||
request of the pages [example.com](http://example.com),
|
||||
[example.edu](http://example.edu), [example.net](http://example.net) and
|
||||
[example.org](http://example.org), performed at the same time using
|
||||
libcurl's multithreading methods. The pages are printed out.
|
||||
- **example6**: sandboxed version of
|
||||
[simple.c](https://curl.haxx.se/libcurl/c/simple.html). Performs the same
|
||||
tasks as example1, but Sandbox API Transactions are used to show how they
|
||||
can be used to perform a simple request.
|
78
oss-internship-2020/curl/examples/example1.cc
Normal file
78
oss-internship-2020/curl/examples/example1.cc
Normal file
|
@ -0,0 +1,78 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
// Sandboxed version of simple.c
|
||||
// Simple HTTP GET request
|
||||
|
||||
#include <cstdlib>
|
||||
|
||||
#include "../sandbox.h" // NOLINT(build/include)
|
||||
|
||||
int main(int argc, char* argv[]) {
|
||||
gflags::ParseCommandLineFlags(&argc, &argv, true);
|
||||
google::InitGoogleLogging(argv[0]);
|
||||
|
||||
absl::Status status;
|
||||
|
||||
// Initialize sandbox2 and sapi
|
||||
CurlSapiSandbox sandbox;
|
||||
status = sandbox.Init();
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "Couldn't initialize Sandboxed API: " << status;
|
||||
}
|
||||
CurlApi api(&sandbox);
|
||||
|
||||
// Initialize the curl session
|
||||
absl::StatusOr<CURL*> curl_handle = api.curl_easy_init();
|
||||
if (!curl_handle.ok()) {
|
||||
LOG(FATAL) << "curl_easy_init failed: " << curl_handle.status();
|
||||
}
|
||||
sapi::v::RemotePtr curl(curl_handle.value());
|
||||
if (!curl.GetValue()) LOG(FATAL) << "curl_easy_init failed: curl is NULL";
|
||||
|
||||
absl::StatusOr<int> curl_code;
|
||||
|
||||
// Specify URL to get
|
||||
sapi::v::ConstCStr url("http://example.com");
|
||||
curl_code = api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, url.PtrBefore());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Set the library to follow a redirection
|
||||
curl_code = api.curl_easy_setopt_long(&curl, CURLOPT_FOLLOWLOCATION, 1l);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_long failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Disable authentication of peer certificate
|
||||
curl_code = api.curl_easy_setopt_long(&curl, CURLOPT_SSL_VERIFYPEER, 0l);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_long failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Perform the request
|
||||
curl_code = api.curl_easy_perform(&curl);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_perform failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Cleanup curl
|
||||
status = api.curl_easy_cleanup(&curl);
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "curl_easy_cleanup failed: " << status;
|
||||
}
|
||||
|
||||
return EXIT_SUCCESS;
|
||||
}
|
107
oss-internship-2020/curl/examples/example2.cc
Normal file
107
oss-internship-2020/curl/examples/example2.cc
Normal file
|
@ -0,0 +1,107 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
// Sandboxed version of getinmemory.c
|
||||
// HTTP GET request using callbacks
|
||||
|
||||
#include <cstdlib>
|
||||
#include <iostream>
|
||||
|
||||
#include "../sandbox.h" // NOLINT(build/include)
|
||||
|
||||
int main(int argc, char* argv[]) {
|
||||
gflags::ParseCommandLineFlags(&argc, &argv, true);
|
||||
google::InitGoogleLogging(argv[0]);
|
||||
|
||||
absl::Status status;
|
||||
|
||||
// Initialize sandbox2 and sapi
|
||||
CurlSapiSandbox sandbox;
|
||||
status = sandbox.Init();
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "Couldn't initialize Sandboxed API: " << status;
|
||||
}
|
||||
CurlApi api(&sandbox);
|
||||
|
||||
// Generate pointer to WriteMemoryCallback function
|
||||
void* function_ptr;
|
||||
status = sandbox.rpc_channel()->Symbol("WriteToMemory", &function_ptr);
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "sapi::Sandbox::rpc_channel().Symbol failed: " << status;
|
||||
}
|
||||
sapi::v::RemotePtr remote_function_ptr(function_ptr);
|
||||
|
||||
// Initialize the curl session
|
||||
absl::StatusOr<CURL*> curl_handle = api.curl_easy_init();
|
||||
if (!curl_handle.ok()) {
|
||||
LOG(FATAL) << "curl_easy_init failed: " << curl_handle.status();
|
||||
}
|
||||
sapi::v::RemotePtr curl(curl_handle.value());
|
||||
if (!curl.GetValue()) {
|
||||
LOG(FATAL) << "curl_easy_init failed: curl is NULL";
|
||||
}
|
||||
|
||||
absl::StatusOr<int> curl_code;
|
||||
|
||||
// Specify URL to get
|
||||
sapi::v::ConstCStr url("http://example.com");
|
||||
curl_code = api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, url.PtrBefore());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Set WriteMemoryCallback as the write function
|
||||
curl_code = api.curl_easy_setopt_ptr(&curl, CURLOPT_WRITEFUNCTION,
|
||||
&remote_function_ptr);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Pass 'chunk' struct to the callback function
|
||||
sapi::v::LenVal chunk(0);
|
||||
curl_code =
|
||||
api.curl_easy_setopt_ptr(&curl, CURLOPT_WRITEDATA, chunk.PtrBoth());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Set a user agent
|
||||
sapi::v::ConstCStr user_agent("libcurl-agent/1.0");
|
||||
curl_code = api.curl_easy_setopt_ptr(&curl, CURLOPT_USERAGENT,
|
||||
user_agent.PtrBefore());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Perform the request
|
||||
curl_code = api.curl_easy_perform(&curl);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_perform failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Retrieve memory size
|
||||
status = sandbox.TransferFromSandboxee(&chunk);
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "sandbox.TransferFromSandboxee failed: " << status;
|
||||
}
|
||||
std::cout << "memory size: " << chunk.GetDataSize() << " bytes" << std::endl;
|
||||
|
||||
// Cleanup curl
|
||||
status = api.curl_easy_cleanup(&curl);
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "curl_easy_cleanup failed: " << status;
|
||||
}
|
||||
|
||||
return EXIT_SUCCESS;
|
||||
}
|
166
oss-internship-2020/curl/examples/example3.cc
Normal file
166
oss-internship-2020/curl/examples/example3.cc
Normal file
|
@ -0,0 +1,166 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
// Sandboxed version of simplessl.c
|
||||
// HTTPS GET request
|
||||
|
||||
#include <cstdlib>
|
||||
|
||||
#include "../sandbox.h" // NOLINT(build/include)
|
||||
|
||||
class CurlSapiSandboxEx3 : public CurlSapiSandbox {
|
||||
public:
|
||||
CurlSapiSandboxEx3(std::string ssl_certificate, std::string ssl_key,
|
||||
std::string ca_certificates)
|
||||
: ssl_certificate(ssl_certificate),
|
||||
ssl_key(ssl_key),
|
||||
ca_certificates(ca_certificates) {}
|
||||
|
||||
private:
|
||||
std::unique_ptr<sandbox2::Policy> ModifyPolicy(
|
||||
sandbox2::PolicyBuilder*) override {
|
||||
// Add the syscalls and files missing in CurlSandbox to a new PolicyBuilder
|
||||
auto policy_builder = std::make_unique<sandbox2::PolicyBuilder>();
|
||||
(*policy_builder)
|
||||
.AllowFutexOp(FUTEX_WAIT_PRIVATE)
|
||||
.AllowGetPIDs()
|
||||
.AllowGetRandom()
|
||||
.AllowHandleSignals()
|
||||
.AllowSyscall(__NR_sysinfo)
|
||||
.AddFile(ssl_certificate)
|
||||
.AddFile(ssl_key)
|
||||
.AddFile(ca_certificates);
|
||||
// Provide the new PolicyBuilder to ModifyPolicy in CurlSandbox
|
||||
return CurlSapiSandbox::ModifyPolicy(policy_builder.get());
|
||||
}
|
||||
|
||||
std::string ssl_certificate;
|
||||
std::string ssl_key;
|
||||
std::string ca_certificates;
|
||||
};
|
||||
|
||||
int main(int argc, char* argv[]) {
|
||||
gflags::ParseCommandLineFlags(&argc, &argv, true);
|
||||
google::InitGoogleLogging(argv[0]);
|
||||
|
||||
absl::Status status;
|
||||
|
||||
// Get input parameters (should be absolute paths)
|
||||
if (argc != 5) {
|
||||
LOG(FATAL) << "wrong number of arguments (4 expected)";
|
||||
}
|
||||
std::string ssl_certificate = argv[1];
|
||||
std::string ssl_key = argv[2];
|
||||
std::string ssl_key_password = argv[3];
|
||||
std::string ca_certificates = argv[4];
|
||||
|
||||
// Initialize sandbox2 and sapi
|
||||
CurlSapiSandboxEx3 sandbox(ssl_certificate, ssl_key, ca_certificates);
|
||||
status = sandbox.Init();
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "Couldn't initialize Sandboxed API: " << status;
|
||||
}
|
||||
CurlApi api(&sandbox);
|
||||
|
||||
absl::StatusOr<int> curl_code;
|
||||
|
||||
// Initialize curl (CURL_GLOBAL_DEFAULT = 3)
|
||||
curl_code = api.curl_global_init(3l);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_global_init failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Initialize curl easy handle
|
||||
absl::StatusOr<CURL*> curl_handle = api.curl_easy_init();
|
||||
if (!curl_handle.ok()) {
|
||||
LOG(FATAL) << "curl_easy_init failed: " << curl_handle.status();
|
||||
}
|
||||
sapi::v::RemotePtr curl(curl_handle.value());
|
||||
if (!curl.GetValue()) {
|
||||
LOG(FATAL) << "curl_easy_init failed: curl is NULL";
|
||||
}
|
||||
|
||||
// Specify URL to get (using HTTPS)
|
||||
sapi::v::ConstCStr url("https://example.com");
|
||||
curl_code = api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, url.PtrBefore());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Set the SSL certificate type to "PEM"
|
||||
sapi::v::ConstCStr ssl_cert_type("PEM");
|
||||
curl_code = api.curl_easy_setopt_ptr(&curl, CURLOPT_SSLCERTTYPE,
|
||||
ssl_cert_type.PtrBefore());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Set the certificate for client authentication
|
||||
sapi::v::ConstCStr sapi_ssl_certificate(ssl_certificate.c_str());
|
||||
curl_code = api.curl_easy_setopt_ptr(&curl, CURLOPT_SSLCERT,
|
||||
sapi_ssl_certificate.PtrBefore());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Set the private key for client authentication
|
||||
sapi::v::ConstCStr sapi_ssl_key(ssl_key.c_str());
|
||||
curl_code =
|
||||
api.curl_easy_setopt_ptr(&curl, CURLOPT_SSLKEY, sapi_ssl_key.PtrBefore());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Set the password used to protect the private key
|
||||
sapi::v::ConstCStr sapi_ssl_key_password(ssl_key_password.c_str());
|
||||
curl_code = api.curl_easy_setopt_ptr(&curl, CURLOPT_KEYPASSWD,
|
||||
sapi_ssl_key_password.PtrBefore());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Set the file with the certificates vaildating the server
|
||||
sapi::v::ConstCStr sapi_ca_certificates(ca_certificates.c_str());
|
||||
curl_code = api.curl_easy_setopt_ptr(&curl, CURLOPT_CAINFO,
|
||||
sapi_ca_certificates.PtrBefore());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Verify the authenticity of the server
|
||||
curl_code = api.curl_easy_setopt_long(&curl, CURLOPT_SSL_VERIFYPEER, 1L);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_long failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Perform the request
|
||||
curl_code = api.curl_easy_perform(&curl);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_perform failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Cleanup curl easy handle
|
||||
status = api.curl_easy_cleanup(&curl);
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "curl_easy_cleanup failed: " << status;
|
||||
}
|
||||
|
||||
// Cleanup curl
|
||||
status = api.curl_global_cleanup();
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "curl_global_cleanup failed: " << status;
|
||||
}
|
||||
|
||||
return EXIT_SUCCESS;
|
||||
}
|
128
oss-internship-2020/curl/examples/example4.cc
Normal file
128
oss-internship-2020/curl/examples/example4.cc
Normal file
|
@ -0,0 +1,128 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
// Sandboxed version of multi-poll.c
|
||||
// HTTP GET request with polling
|
||||
|
||||
#include <cstdlib>
|
||||
|
||||
#include "../sandbox.h" // NOLINT(build/include)
|
||||
#include "curl_sapi.sapi.h" // NOLINT(build/include)
|
||||
#include "sandboxed_api/util/flag.h"
|
||||
|
||||
int main(int argc, char* argv[]) {
|
||||
gflags::ParseCommandLineFlags(&argc, &argv, true);
|
||||
google::InitGoogleLogging(argv[0]);
|
||||
|
||||
absl::Status status;
|
||||
|
||||
// Initialize sandbox2 and sapi
|
||||
CurlSapiSandbox sandbox;
|
||||
status = sandbox.Init();
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "Couldn't initialize Sandboxed API: " << status;
|
||||
}
|
||||
CurlApi api(&sandbox);
|
||||
|
||||
// Number of running handles
|
||||
sapi::v::Int still_running(1);
|
||||
|
||||
absl::StatusOr<int> curl_code;
|
||||
|
||||
// Initialize curl (CURL_GLOBAL_DEFAULT = 3)
|
||||
curl_code = api.curl_global_init(3l);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_global_init failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Initialize http_handle
|
||||
absl::StatusOr<CURL*> curl_handle = api.curl_easy_init();
|
||||
if (!curl_handle.ok()) {
|
||||
LOG(FATAL) << "curl_easy_init failed: " << curl_handle.status();
|
||||
}
|
||||
sapi::v::RemotePtr http_handle(curl_handle.value());
|
||||
if (!http_handle.GetValue()) {
|
||||
LOG(FATAL) << "curl_easy_init failed: http_handle is NULL";
|
||||
}
|
||||
|
||||
// Specify URL to get
|
||||
sapi::v::ConstCStr url("http://example.com");
|
||||
curl_code =
|
||||
api.curl_easy_setopt_ptr(&http_handle, CURLOPT_URL, url.PtrBefore());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Initialize multi_handle
|
||||
absl::StatusOr<CURLM*> curlm_handle = api.curl_multi_init();
|
||||
if (!curlm_handle.ok()) {
|
||||
LOG(FATAL) << "curl_multi_init failed: " << curlm_handle.status();
|
||||
}
|
||||
sapi::v::RemotePtr multi_handle(curlm_handle.value());
|
||||
if (!multi_handle.GetValue()) {
|
||||
LOG(FATAL) << "curl_multi_init failed: multi_handle is NULL";
|
||||
}
|
||||
|
||||
// Add http_handle to the multi stack
|
||||
curl_code = api.curl_multi_add_handle(&multi_handle, &http_handle);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_multi_add_handle failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
while (still_running.GetValue()) {
|
||||
sapi::v::Int numfds(0);
|
||||
|
||||
// Perform the request
|
||||
curl_code = api.curl_multi_perform(&multi_handle, still_running.PtrBoth());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_mutli_perform failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
if (still_running.GetValue()) {
|
||||
// Wait for an event or timeout
|
||||
sapi::v::NullPtr null_ptr;
|
||||
curl_code = api.curl_multi_poll_sapi(&multi_handle, &null_ptr, 0, 1000,
|
||||
numfds.PtrBoth());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_multi_poll_sapi failed: " << curl_code.status();
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Remove http_handle from the multi stack
|
||||
curl_code = api.curl_multi_remove_handle(&multi_handle, &http_handle);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_multi_remove_handle failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Cleanup http_handle
|
||||
status = api.curl_easy_cleanup(&http_handle);
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "curl_easy_cleanup failed: " << status;
|
||||
}
|
||||
|
||||
// Cleanup multi_handle
|
||||
curl_code = api.curl_multi_cleanup(&multi_handle);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_multi_cleanup failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Cleanup curl
|
||||
status = api.curl_global_cleanup();
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "curl_global_cleanup failed: " << status;
|
||||
}
|
||||
|
||||
return EXIT_SUCCESS;
|
||||
}
|
102
oss-internship-2020/curl/examples/example5.cc
Normal file
102
oss-internship-2020/curl/examples/example5.cc
Normal file
|
@ -0,0 +1,102 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
// Sandboxed version of multithread.c
|
||||
// Multithreaded HTTP GET requests
|
||||
|
||||
#include <pthread.h>
|
||||
|
||||
#include <cstdlib>
|
||||
|
||||
#include "../sandbox.h" // NOLINT(build/include)
|
||||
|
||||
void pull_one_url(const std::string& url, CurlApi& api) {
|
||||
// Initialize the curl session
|
||||
absl::StatusOr<CURL*> curl_handle = api.curl_easy_init();
|
||||
if (!curl_handle.ok()) {
|
||||
LOG(FATAL) << "curl_easy_init failed: " << curl_handle.status();
|
||||
}
|
||||
sapi::v::RemotePtr curl(curl_handle.value());
|
||||
if (!curl.GetValue()) {
|
||||
LOG(FATAL) << "curl_easy_init failed: curl is NULL";
|
||||
}
|
||||
|
||||
absl::StatusOr<int> curl_code;
|
||||
|
||||
// Specify URL to get
|
||||
sapi::v::ConstCStr sapi_url(url.c_str());
|
||||
curl_code =
|
||||
api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, sapi_url.PtrBefore());
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_setopt_ptr failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Perform the request
|
||||
curl_code = api.curl_easy_perform(&curl);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_easy_perform failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Cleanup curl
|
||||
absl::Status status = api.curl_easy_cleanup(&curl);
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "curl_easy_cleanup failed: " << status;
|
||||
}
|
||||
}
|
||||
|
||||
const std::vector<std::string> urls = {
|
||||
"http://example.com", "http://example.edu", "http://example.net",
|
||||
"http://example.org"};
|
||||
|
||||
int main(int argc, char* argv[]) {
|
||||
gflags::ParseCommandLineFlags(&argc, &argv, true);
|
||||
google::InitGoogleLogging(argv[0]);
|
||||
|
||||
absl::Status status;
|
||||
|
||||
// Initialize sandbox2 and sapi
|
||||
CurlSapiSandbox sandbox;
|
||||
status = sandbox.Init();
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "Couldn't initialize Sandboxed API: " << status;
|
||||
}
|
||||
CurlApi api(&sandbox);
|
||||
|
||||
absl::StatusOr<int> curl_code;
|
||||
|
||||
// Initialize curl (CURL_GLOBAL_DEFAULT = 3)
|
||||
curl_code = api.curl_global_init(3l);
|
||||
if (!curl_code.ok() || curl_code.value() != CURLE_OK) {
|
||||
LOG(FATAL) << "curl_global_init failed: " << curl_code.status();
|
||||
}
|
||||
|
||||
// Create the threads
|
||||
std::vector<std::thread> threads;
|
||||
for (auto& url : urls) {
|
||||
threads.emplace_back(pull_one_url, std::ref(url), std::ref(api));
|
||||
}
|
||||
|
||||
// Join the threads
|
||||
for (auto& thread : threads) {
|
||||
thread.join();
|
||||
}
|
||||
|
||||
// Cleanup curl
|
||||
status = api.curl_global_cleanup();
|
||||
if (!status.ok()) {
|
||||
LOG(FATAL) << "curl_global_cleanup failed: " << status;
|
||||
}
|
||||
|
||||
return EXIT_SUCCESS;
|
||||
}
|
72
oss-internship-2020/curl/examples/example6.cc
Normal file
72
oss-internship-2020/curl/examples/example6.cc
Normal file
|
@ -0,0 +1,72 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
// Sandboxed version of simple.c using transactions
|
||||
// Simple HTTP GET request
|
||||
|
||||
#include <cstdlib>
|
||||
|
||||
#include "../sandbox.h" // NOLINT(build/include)
|
||||
#include "sandboxed_api/transaction.h"
|
||||
|
||||
class CurlTransaction : public sapi::Transaction {
|
||||
public:
|
||||
explicit CurlTransaction(std::unique_ptr<sapi::Sandbox> sandbox)
|
||||
: sapi::Transaction(std::move(sandbox)) {
|
||||
sapi::Transaction::SetTimeLimit(kTimeOutVal);
|
||||
}
|
||||
|
||||
private:
|
||||
// Default timeout value for each transaction run.
|
||||
static constexpr time_t kTimeOutVal = 2;
|
||||
|
||||
// The main processing function.
|
||||
absl::Status Main() override;
|
||||
};
|
||||
|
||||
absl::Status CurlTransaction::Main() {
|
||||
CurlApi api(sandbox());
|
||||
|
||||
// Initialize the curl session
|
||||
SAPI_ASSIGN_OR_RETURN(void* curl_remote, api.curl_easy_init());
|
||||
sapi::v::RemotePtr curl(curl_remote);
|
||||
TRANSACTION_FAIL_IF_NOT(curl.GetValue(), "curl_easy_init failed");
|
||||
|
||||
// Specify URL to get
|
||||
sapi::v::ConstCStr url("http://example.com");
|
||||
SAPI_ASSIGN_OR_RETURN(
|
||||
int setopt_url_code,
|
||||
api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, url.PtrBefore()));
|
||||
TRANSACTION_FAIL_IF_NOT(setopt_url_code == CURLE_OK,
|
||||
"curl_easy_setopt_ptr failed");
|
||||
|
||||
// Perform the request
|
||||
SAPI_ASSIGN_OR_RETURN(int perform_code, api.curl_easy_perform(&curl));
|
||||
TRANSACTION_FAIL_IF_NOT(setopt_url_code == CURLE_OK,
|
||||
"curl_easy_perform failed");
|
||||
|
||||
// Cleanup curl
|
||||
TRANSACTION_FAIL_IF_NOT(api.curl_easy_cleanup(&curl).ok(),
|
||||
"curl_easy_cleanup failed");
|
||||
|
||||
return absl::OkStatus();
|
||||
}
|
||||
|
||||
int main(int argc, char* argv[]) {
|
||||
CurlTransaction curl{std::make_unique<CurlSapiSandbox>()};
|
||||
absl::Status status = curl.Run();
|
||||
CHECK(status.ok()) << "CurlTransaction failed";
|
||||
|
||||
return EXIT_SUCCESS;
|
||||
}
|
67
oss-internship-2020/curl/sandbox.h
Normal file
67
oss-internship-2020/curl/sandbox.h
Normal file
|
@ -0,0 +1,67 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#ifndef SANDBOX_H_
|
||||
#define SANDBOX_H_
|
||||
|
||||
#include <linux/futex.h>
|
||||
#include <sys/mman.h> // For mmap arguments
|
||||
#include <syscall.h>
|
||||
|
||||
#include <cstdlib>
|
||||
|
||||
#include "curl_sapi.sapi.h" // NOLINT(build/include)
|
||||
#include "sandboxed_api/sandbox2/util/bpf_helper.h"
|
||||
|
||||
class CurlSapiSandbox : public CurlSandbox {
|
||||
protected:
|
||||
std::unique_ptr<sandbox2::Policy> ModifyPolicy(
|
||||
sandbox2::PolicyBuilder* policy_builder) override {
|
||||
// Return a new policy
|
||||
return (*policy_builder)
|
||||
.AllowDynamicStartup()
|
||||
.AllowExit()
|
||||
.AllowFork()
|
||||
.AllowFutexOp(FUTEX_WAKE_PRIVATE)
|
||||
.AllowMmap()
|
||||
.AllowOpen()
|
||||
.AllowRead()
|
||||
.AllowSafeFcntl()
|
||||
.AllowWrite()
|
||||
.AllowSyscalls({
|
||||
__NR_accept,
|
||||
__NR_access,
|
||||
__NR_bind,
|
||||
__NR_connect,
|
||||
__NR_getpeername,
|
||||
__NR_getsockname,
|
||||
__NR_getsockopt,
|
||||
__NR_ioctl,
|
||||
__NR_listen,
|
||||
__NR_madvise,
|
||||
__NR_poll,
|
||||
__NR_recvfrom,
|
||||
__NR_recvmsg,
|
||||
__NR_sendmmsg,
|
||||
__NR_sendto,
|
||||
__NR_setsockopt,
|
||||
__NR_socket,
|
||||
})
|
||||
.AllowUnrestrictedNetworking()
|
||||
.AddDirectory("/lib")
|
||||
.BuildOrDie();
|
||||
}
|
||||
};
|
||||
|
||||
#endif // SANDBOX_H_
|
28
oss-internship-2020/curl/tests/CMakeLists.txt
Normal file
28
oss-internship-2020/curl/tests/CMakeLists.txt
Normal file
|
@ -0,0 +1,28 @@
|
|||
# Copyright 2020 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
include(GoogleTest)
|
||||
|
||||
add_executable(tests
|
||||
test_utils.h
|
||||
test_utils.cc
|
||||
tests.cc
|
||||
)
|
||||
|
||||
target_link_libraries(tests
|
||||
curl_sapi sapi::sapi
|
||||
gtest gmock gtest_main
|
||||
)
|
||||
|
||||
gtest_discover_tests(tests)
|
301
oss-internship-2020/curl/tests/test_utils.cc
Normal file
301
oss-internship-2020/curl/tests/test_utils.cc
Normal file
|
@ -0,0 +1,301 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#include "test_utils.h" // NOLINT(build/include)
|
||||
|
||||
#include <absl/strings/match.h>
|
||||
#include <fcntl.h>
|
||||
#include <netdb.h>
|
||||
#include <netinet/in.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/types.h>
|
||||
#include <unistd.h>
|
||||
|
||||
#include <memory>
|
||||
#include <thread> // NOLINT(build/c++11)
|
||||
|
||||
int CurlTestUtils::port_;
|
||||
std::thread CurlTestUtils::server_thread_;
|
||||
|
||||
absl::Status CurlTestUtils::CurlTestSetUp() {
|
||||
// Initialize sandbox2 and sapi
|
||||
sandbox_ = std::make_unique<CurlSapiSandbox>();
|
||||
absl::Status init = sandbox_->Init();
|
||||
if (!init.ok()) {
|
||||
return init;
|
||||
}
|
||||
api_ = std::make_unique<CurlApi>(sandbox_.get());
|
||||
|
||||
// Initialize curl
|
||||
absl::StatusOr<CURL*> curl_handle = api_->curl_easy_init();
|
||||
if (!curl_handle.ok()) {
|
||||
return curl_handle.status();
|
||||
}
|
||||
if (!curl_handle.value()) {
|
||||
return absl::UnavailableError("curl_easy_init returned NULL ");
|
||||
}
|
||||
curl_ = std::make_unique<sapi::v::RemotePtr>(curl_handle.value());
|
||||
|
||||
absl::StatusOr<int> curl_code;
|
||||
|
||||
// Specify request URL
|
||||
sapi::v::ConstCStr sapi_url(kUrl.data());
|
||||
curl_code = api_->curl_easy_setopt_ptr(curl_.get(), CURLOPT_URL,
|
||||
sapi_url.PtrBefore());
|
||||
if (!curl_code.ok()) {
|
||||
return curl_code.status();
|
||||
}
|
||||
if (curl_code.value() != CURLE_OK) {
|
||||
return absl::UnavailableError(
|
||||
"curl_easy_setopt_ptr returned with the error code " +
|
||||
curl_code.value());
|
||||
}
|
||||
|
||||
// Set port
|
||||
curl_code = api_->curl_easy_setopt_long(curl_.get(), CURLOPT_PORT, port_);
|
||||
if (!curl_code.ok()) {
|
||||
return curl_code.status();
|
||||
}
|
||||
if (curl_code.value() != CURLE_OK) {
|
||||
return absl::UnavailableError(
|
||||
"curl_easy_setopt_long returned with the error code " +
|
||||
curl_code.value());
|
||||
}
|
||||
|
||||
// Generate pointer to the WriteToMemory callback
|
||||
void* function_ptr;
|
||||
absl::Status symbol =
|
||||
sandbox_->rpc_channel()->Symbol("WriteToMemory", &function_ptr);
|
||||
if (!symbol.ok()) {
|
||||
return symbol;
|
||||
}
|
||||
sapi::v::RemotePtr remote_function_ptr(function_ptr);
|
||||
|
||||
// Set WriteToMemory as the write function
|
||||
curl_code = api_->curl_easy_setopt_ptr(curl_.get(), CURLOPT_WRITEFUNCTION,
|
||||
&remote_function_ptr);
|
||||
if (!curl_code.ok()) {
|
||||
return curl_code.status();
|
||||
}
|
||||
if (curl_code.value() != CURLE_OK) {
|
||||
return absl::UnavailableError(
|
||||
"curl_easy_setopt_ptr returned with the error code " +
|
||||
curl_code.value());
|
||||
}
|
||||
|
||||
// Pass memory chunk object to the callback
|
||||
chunk_ = std::make_unique<sapi::v::LenVal>(0);
|
||||
curl_code = api_->curl_easy_setopt_ptr(curl_.get(), CURLOPT_WRITEDATA,
|
||||
chunk_->PtrBoth());
|
||||
if (!curl_code.ok()) {
|
||||
return curl_code.status();
|
||||
}
|
||||
if (curl_code.value() != CURLE_OK) {
|
||||
return absl::UnavailableError(
|
||||
"curl_easy_setopt_ptr returned with the error code " +
|
||||
curl_code.value());
|
||||
}
|
||||
|
||||
return absl::OkStatus();
|
||||
}
|
||||
|
||||
absl::Status CurlTestUtils::CurlTestTearDown() {
|
||||
// Cleanup curl
|
||||
return api_->curl_easy_cleanup(curl_.get());
|
||||
}
|
||||
|
||||
absl::StatusOr<std::string> CurlTestUtils::PerformRequest() {
|
||||
// Perform the request
|
||||
absl::StatusOr<int> curl_code = api_->curl_easy_perform(curl_.get());
|
||||
if (!curl_code.ok()) {
|
||||
return curl_code.status();
|
||||
}
|
||||
if (curl_code.value() != CURLE_OK) {
|
||||
return absl::UnavailableError(
|
||||
"curl_easy_perform returned with the error code " + curl_code.value());
|
||||
}
|
||||
|
||||
// Get pointer to the memory chunk
|
||||
absl::Status status = sandbox_->TransferFromSandboxee(chunk_.get());
|
||||
if (!status.ok()) {
|
||||
return status;
|
||||
}
|
||||
|
||||
return std::string{reinterpret_cast<char*>(chunk_->GetData())};
|
||||
}
|
||||
|
||||
namespace {
|
||||
|
||||
// Read the socket until str is completely read
|
||||
std::string ReadUntil(const int socket, const std::string& str,
|
||||
const size_t max_request_size) {
|
||||
std::string str_read;
|
||||
str_read.reserve(max_request_size);
|
||||
|
||||
// Read one char at a time until str is suffix of buf
|
||||
while (!absl::EndsWith(str_read, str)) {
|
||||
char next_char;
|
||||
if (str_read.size() >= max_request_size ||
|
||||
read(socket, &next_char, 1) < 1) {
|
||||
return "";
|
||||
}
|
||||
str_read += next_char;
|
||||
}
|
||||
|
||||
return str_read;
|
||||
}
|
||||
|
||||
// Parse HTTP headers to return the Content-Length
|
||||
ssize_t GetContentLength(const std::string& headers) {
|
||||
// Find the Content-Length header
|
||||
std::string::size_type length_header_start = headers.find("Content-Length: ");
|
||||
|
||||
// There is no Content-Length field
|
||||
if (length_header_start == std::string::npos) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Find Content-Length string
|
||||
std::string::size_type length_start =
|
||||
length_header_start + std::string{"Content-Length: "}.size();
|
||||
std::string::size_type length_bytes =
|
||||
headers.find("\r\n", length_start) - length_start;
|
||||
|
||||
// length_bytes exceeds maximum
|
||||
if (length_bytes >= 64) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
// Convert string to int and return
|
||||
return std::stoi(headers.substr(length_start, length_bytes));
|
||||
}
|
||||
|
||||
// Read exactly content_bytes from the socket
|
||||
std::string ReadExact(int socket, size_t content_bytes) {
|
||||
std::string str_read;
|
||||
str_read.reserve(content_bytes);
|
||||
|
||||
// Read one char at a time until all chars are read
|
||||
while (str_read.size() < content_bytes) {
|
||||
char next_char;
|
||||
if (read(socket, &next_char, 1) < 1) {
|
||||
return "";
|
||||
}
|
||||
str_read += next_char;
|
||||
}
|
||||
|
||||
return str_read;
|
||||
}
|
||||
|
||||
// Listen on the socket and answer back to requests
|
||||
void ServerLoop(int listening_socket, sockaddr_in socket_address) {
|
||||
socklen_t socket_address_size = sizeof(socket_address);
|
||||
|
||||
// Listen on the socket (maximum 1 connection)
|
||||
if (listen(listening_socket, 1) == -1) {
|
||||
return;
|
||||
}
|
||||
|
||||
// Keep accepting connections until the thread is terminated
|
||||
// (i.e. server_thread_ is assigned to a new thread or destroyed)
|
||||
for (;;) {
|
||||
// File descriptor to the connection socket
|
||||
// This blocks the thread until a connection is established
|
||||
int accepted_socket =
|
||||
accept(listening_socket, reinterpret_cast<sockaddr*>(&socket_address),
|
||||
reinterpret_cast<socklen_t*>(&socket_address_size));
|
||||
if (accepted_socket == -1) {
|
||||
return;
|
||||
}
|
||||
|
||||
constexpr int kMaxRequestSize = 4096;
|
||||
|
||||
// Read until the end of the headers
|
||||
std::string headers =
|
||||
ReadUntil(accepted_socket, "\r\n\r\n", kMaxRequestSize);
|
||||
|
||||
if (headers == "") {
|
||||
close(accepted_socket);
|
||||
return;
|
||||
}
|
||||
|
||||
// Get the length of the request content
|
||||
ssize_t content_length = GetContentLength(headers);
|
||||
if (content_length > kMaxRequestSize - headers.size() ||
|
||||
content_length < 0) {
|
||||
close(accepted_socket);
|
||||
return;
|
||||
}
|
||||
|
||||
// Read the request content
|
||||
std::string content = ReadExact(accepted_socket, content_length);
|
||||
|
||||
// Prepare a response for the request
|
||||
std::string http_response =
|
||||
"HTTP/1.1 200 OK\nContent-Type: text/plain\nContent-Length: ";
|
||||
|
||||
if (headers.substr(0, 3) == "GET") {
|
||||
http_response += "2\r\n\r\nOK";
|
||||
|
||||
} else if (headers.substr(0, 4) == "POST") {
|
||||
http_response +=
|
||||
std::to_string(content.size()) + "\r\n\r\n" + std::string{content};
|
||||
|
||||
} else {
|
||||
close(accepted_socket);
|
||||
return;
|
||||
}
|
||||
|
||||
// Ignore any errors, the connection will be closed anyway
|
||||
write(accepted_socket, http_response.c_str(), http_response.size());
|
||||
|
||||
// Close the socket
|
||||
close(accepted_socket);
|
||||
}
|
||||
}
|
||||
|
||||
} // namespace
|
||||
|
||||
void CurlTestUtils::StartMockServer() {
|
||||
// Get the socket file descriptor
|
||||
int listening_socket = socket(AF_INET, SOCK_STREAM, 0);
|
||||
|
||||
// Create the socket address object
|
||||
// The port is set to 0, meaning that it will be auto assigned
|
||||
// Only local connections can access this socket
|
||||
sockaddr_in socket_address{AF_INET, 0, htonl(INADDR_LOOPBACK)};
|
||||
socklen_t socket_address_size = sizeof(socket_address);
|
||||
if (listening_socket == -1) {
|
||||
return;
|
||||
}
|
||||
|
||||
// Bind the file descriptor to the socket address object
|
||||
if (bind(listening_socket, reinterpret_cast<sockaddr*>(&socket_address),
|
||||
socket_address_size) == -1) {
|
||||
return;
|
||||
}
|
||||
|
||||
// Assign an available port to the socket address object
|
||||
if (getsockname(listening_socket,
|
||||
reinterpret_cast<sockaddr*>(&socket_address),
|
||||
&socket_address_size) == -1) {
|
||||
return;
|
||||
}
|
||||
|
||||
// Get the port number
|
||||
port_ = ntohs(socket_address.sin_port);
|
||||
|
||||
// Set server_thread_ operation to socket listening
|
||||
server_thread_ = std::thread(ServerLoop, listening_socket, socket_address);
|
||||
}
|
55
oss-internship-2020/curl/tests/test_utils.h
Normal file
55
oss-internship-2020/curl/tests/test_utils.h
Normal file
|
@ -0,0 +1,55 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#ifndef TESTS_H_
|
||||
#define TESTS_H_
|
||||
|
||||
#include "../sandbox.h" // NOLINT(build/include)
|
||||
#include "curl_sapi.sapi.h" // NOLINT(build/include)
|
||||
#include "gtest/gtest.h"
|
||||
#include "sandboxed_api/util/flag.h"
|
||||
#include "sandboxed_api/util/status_matchers.h"
|
||||
|
||||
// Helper class that can be used to test Curl Sandboxed
|
||||
class CurlTestUtils {
|
||||
protected:
|
||||
// Initialize and set up the curl handle
|
||||
absl::Status CurlTestSetUp();
|
||||
// Clean up the curl handle
|
||||
absl::Status CurlTestTearDown();
|
||||
|
||||
// Perform a request to the mock server, return the response
|
||||
absl::StatusOr<std::string> PerformRequest();
|
||||
|
||||
// Start a mock server (only once) that will manage connections for the tests
|
||||
// The server listens on a port asynchronously by creating a thread
|
||||
// The port number is stored in port_
|
||||
// Responds with "OK" to a GET request
|
||||
// Responds with the POST request fields to a POST request
|
||||
static void StartMockServer();
|
||||
|
||||
std::unique_ptr<CurlSapiSandbox> sandbox_;
|
||||
std::unique_ptr<CurlApi> api_;
|
||||
std::unique_ptr<sapi::v::RemotePtr> curl_;
|
||||
|
||||
static std::thread server_thread_;
|
||||
|
||||
static constexpr absl::string_view kUrl = "http://127.0.0.1/";
|
||||
static int port_;
|
||||
|
||||
private:
|
||||
std::unique_ptr<sapi::v::LenVal> chunk_;
|
||||
};
|
||||
|
||||
#endif // TESTS_H_
|
138
oss-internship-2020/curl/tests/tests.cc
Normal file
138
oss-internship-2020/curl/tests/tests.cc
Normal file
|
@ -0,0 +1,138 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#include "test_utils.h" // NOLINT(build/include)
|
||||
|
||||
class CurlTest : public CurlTestUtils, public ::testing::Test {
|
||||
protected:
|
||||
void SetUp() override {
|
||||
// Start mock server, get port number and check for any error
|
||||
StartMockServer();
|
||||
ASSERT_TRUE(server_thread_.joinable());
|
||||
ASSERT_TRUE(CurlTestSetUp().ok());
|
||||
}
|
||||
|
||||
void TearDown() override {
|
||||
ASSERT_TRUE(CurlTestTearDown().ok());
|
||||
// Detach the server thread
|
||||
server_thread_.detach();
|
||||
}
|
||||
};
|
||||
|
||||
TEST_F(CurlTest, EffectiveUrl) {
|
||||
sapi::v::RemotePtr effective_url_ptr(nullptr);
|
||||
|
||||
ASSERT_TRUE(PerformRequest().ok());
|
||||
|
||||
// Get effective URL
|
||||
SAPI_ASSERT_OK_AND_ASSIGN(
|
||||
int getinfo_code,
|
||||
api_->curl_easy_getinfo_ptr(curl_.get(), CURLINFO_EFFECTIVE_URL,
|
||||
effective_url_ptr.PtrBoth()));
|
||||
ASSERT_EQ(getinfo_code, CURLE_OK);
|
||||
|
||||
// Store effective URL in a string
|
||||
SAPI_ASSERT_OK_AND_ASSIGN(std::string effective_url,
|
||||
sandbox_->GetCString(sapi::v::RemotePtr(
|
||||
effective_url_ptr.GetPointedVar())));
|
||||
|
||||
// Compare effective URL with original URL
|
||||
ASSERT_EQ(effective_url, kUrl);
|
||||
}
|
||||
|
||||
TEST_F(CurlTest, EffectivePort) {
|
||||
sapi::v::Int effective_port;
|
||||
|
||||
ASSERT_TRUE(PerformRequest().ok());
|
||||
|
||||
// Get effective port
|
||||
SAPI_ASSERT_OK_AND_ASSIGN(int getinfo_code, api_->curl_easy_getinfo_ptr(
|
||||
curl_.get(), CURLINFO_PRIMARY_PORT,
|
||||
effective_port.PtrBoth()));
|
||||
ASSERT_EQ(getinfo_code, CURLE_OK);
|
||||
|
||||
// Compare effective port with port set by the mock server
|
||||
ASSERT_EQ(effective_port.GetValue(), port_);
|
||||
}
|
||||
|
||||
TEST_F(CurlTest, ResponseCode) {
|
||||
sapi::v::Int response_code;
|
||||
|
||||
ASSERT_TRUE(PerformRequest().ok());
|
||||
|
||||
// Get response code
|
||||
SAPI_ASSERT_OK_AND_ASSIGN(
|
||||
int getinfo_code,
|
||||
api_->curl_easy_getinfo_ptr(curl_.get(), CURLINFO_RESPONSE_CODE,
|
||||
response_code.PtrBoth()));
|
||||
ASSERT_EQ(getinfo_code, CURLE_OK);
|
||||
|
||||
// Check response code
|
||||
ASSERT_EQ(response_code.GetValue(), 200);
|
||||
}
|
||||
|
||||
TEST_F(CurlTest, ContentType) {
|
||||
sapi::v::RemotePtr content_type_ptr(nullptr);
|
||||
|
||||
ASSERT_TRUE(PerformRequest().ok());
|
||||
|
||||
// Get effective URL
|
||||
SAPI_ASSERT_OK_AND_ASSIGN(int getinfo_code, api_->curl_easy_getinfo_ptr(
|
||||
curl_.get(), CURLINFO_CONTENT_TYPE,
|
||||
content_type_ptr.PtrBoth()));
|
||||
ASSERT_EQ(getinfo_code, CURLE_OK);
|
||||
|
||||
// Store content type in a string
|
||||
SAPI_ASSERT_OK_AND_ASSIGN(std::string content_type,
|
||||
sandbox_->GetCString(sapi::v::RemotePtr(
|
||||
content_type_ptr.GetPointedVar())));
|
||||
|
||||
// Compare content type with "text/plain"
|
||||
ASSERT_EQ(content_type, "text/plain");
|
||||
}
|
||||
|
||||
TEST_F(CurlTest, GETResponse) {
|
||||
SAPI_ASSERT_OK_AND_ASSIGN(std::string response, PerformRequest());
|
||||
|
||||
// Compare response with expected response
|
||||
ASSERT_EQ(response, "OK");
|
||||
}
|
||||
|
||||
TEST_F(CurlTest, POSTResponse) {
|
||||
sapi::v::ConstCStr post_fields("postfields");
|
||||
|
||||
// Set request method to POST
|
||||
SAPI_ASSERT_OK_AND_ASSIGN(int setopt_post, api_->curl_easy_setopt_long(
|
||||
curl_.get(), CURLOPT_POST, 1l));
|
||||
ASSERT_EQ(setopt_post, CURLE_OK);
|
||||
|
||||
// Set the size of the POST fields
|
||||
SAPI_ASSERT_OK_AND_ASSIGN(
|
||||
int setopt_post_fields_size,
|
||||
api_->curl_easy_setopt_long(curl_.get(), CURLOPT_POSTFIELDSIZE,
|
||||
post_fields.GetSize()));
|
||||
ASSERT_EQ(setopt_post_fields_size, CURLE_OK);
|
||||
|
||||
// Set the POST fields
|
||||
SAPI_ASSERT_OK_AND_ASSIGN(
|
||||
int setopt_post_fields,
|
||||
api_->curl_easy_setopt_ptr(curl_.get(), CURLOPT_POSTFIELDS,
|
||||
post_fields.PtrBefore()));
|
||||
ASSERT_EQ(setopt_post_fields, CURLE_OK);
|
||||
|
||||
SAPI_ASSERT_OK_AND_ASSIGN(std::string response, PerformRequest());
|
||||
|
||||
// Compare response with expected response
|
||||
ASSERT_EQ(std::string(post_fields.GetData()), response);
|
||||
}
|
Loading…
Reference in New Issue
Block a user