mirror of
https://github.com/google/sandboxed-api.git
synced 2024-03-22 13:11:30 +08:00
Improve and extend examples
This commit is contained in:
parent
cea046d3e2
commit
cf23888b88
|
@ -18,6 +18,7 @@
|
||||||
# Example 1: simple.c
|
# Example 1: simple.c
|
||||||
add_executable(example1
|
add_executable(example1
|
||||||
example1.cc
|
example1.cc
|
||||||
|
../sandbox.h
|
||||||
)
|
)
|
||||||
target_link_libraries(example1 PRIVATE
|
target_link_libraries(example1 PRIVATE
|
||||||
curl_sapi
|
curl_sapi
|
||||||
|
@ -27,6 +28,7 @@ target_link_libraries(example1 PRIVATE
|
||||||
# Example 2: getinmemory.c
|
# Example 2: getinmemory.c
|
||||||
add_executable(example2
|
add_executable(example2
|
||||||
example2.cc
|
example2.cc
|
||||||
|
../sandbox.h
|
||||||
)
|
)
|
||||||
target_link_libraries(example2 PRIVATE
|
target_link_libraries(example2 PRIVATE
|
||||||
curl_sapi
|
curl_sapi
|
||||||
|
@ -36,6 +38,7 @@ target_link_libraries(example2 PRIVATE
|
||||||
# Example 3: simplessl.c
|
# Example 3: simplessl.c
|
||||||
add_executable(example3
|
add_executable(example3
|
||||||
example3.cc
|
example3.cc
|
||||||
|
../sandbox.h
|
||||||
)
|
)
|
||||||
target_link_libraries(example3 PRIVATE
|
target_link_libraries(example3 PRIVATE
|
||||||
curl_sapi
|
curl_sapi
|
||||||
|
@ -45,6 +48,7 @@ target_link_libraries(example3 PRIVATE
|
||||||
# Example 4: multi-poll.c
|
# Example 4: multi-poll.c
|
||||||
add_executable(example4
|
add_executable(example4
|
||||||
example4.cc
|
example4.cc
|
||||||
|
../sandbox.h
|
||||||
)
|
)
|
||||||
target_link_libraries(example4 PRIVATE
|
target_link_libraries(example4 PRIVATE
|
||||||
curl_sapi
|
curl_sapi
|
||||||
|
@ -54,8 +58,19 @@ target_link_libraries(example4 PRIVATE
|
||||||
# Example 5: multithread.c
|
# Example 5: multithread.c
|
||||||
add_executable(example5
|
add_executable(example5
|
||||||
example5.cc
|
example5.cc
|
||||||
|
../sandbox.h
|
||||||
)
|
)
|
||||||
target_link_libraries(example5 PRIVATE
|
target_link_libraries(example5 PRIVATE
|
||||||
curl_sapi
|
curl_sapi
|
||||||
sapi::sapi
|
sapi::sapi
|
||||||
)
|
)
|
||||||
|
|
||||||
|
# Example 6: simple.c (using transactions)
|
||||||
|
add_executable(example6
|
||||||
|
example6.cc
|
||||||
|
../sandbox.h
|
||||||
|
)
|
||||||
|
target_link_libraries(example6 PRIVATE
|
||||||
|
curl_sapi
|
||||||
|
sapi::sapi
|
||||||
|
)
|
||||||
|
|
|
@ -9,3 +9,4 @@ This is the list of the examples:
|
||||||
- **example3**: sandboxed version of [simplessl.c](https://curl.haxx.se/libcurl/c/simplessl.html). HTTPS request of the [example.com](https://example.com) page, using SSL authentication. This script takes 4 arguments (SSL certificates file, SSL keys file, SSL keys password and CA certificates files), and prints out the page.
|
- **example3**: sandboxed version of [simplessl.c](https://curl.haxx.se/libcurl/c/simplessl.html). HTTPS request of the [example.com](https://example.com) page, using SSL authentication. This script takes 4 arguments (SSL certificates file, SSL keys file, SSL keys password and CA certificates files), and prints out the page.
|
||||||
- **example4**: sandboxed version of [multi-poll.c](https://curl.haxx.se/libcurl/c/multi-poll.html). Same HTTP request as example1, with the addition of a polling method that can be used to track the status of the request. The page is printed out after it is downloaded.
|
- **example4**: sandboxed version of [multi-poll.c](https://curl.haxx.se/libcurl/c/multi-poll.html). Same HTTP request as example1, with the addition of a polling method that can be used to track the status of the request. The page is printed out after it is downloaded.
|
||||||
- **example5**: sandboxed version of [multithread.c](https://curl.haxx.se/libcurl/c/multithread.html). Four HTTP request of the pages [example.com](http://example.com), [example.edu](http://example.edu), [example.net](http://example.net) and [example.org](http://example.org), performed at the same time using libcurl's multithreading methods. The threads' status and the pages are printed out.
|
- **example5**: sandboxed version of [multithread.c](https://curl.haxx.se/libcurl/c/multithread.html). Four HTTP request of the pages [example.com](http://example.com), [example.edu](http://example.edu), [example.net](http://example.net) and [example.org](http://example.org), performed at the same time using libcurl's multithreading methods. The threads' status and the pages are printed out.
|
||||||
|
- **example6**: sandboxed version of [simple.c](https://curl.haxx.se/libcurl/c/simple.html). Performs the same tasks as example1, but Sandbox API Transactions are used to show how they can be used to perform a simple request.
|
|
@ -16,23 +16,8 @@
|
||||||
// Simple HTTP GET request
|
// Simple HTTP GET request
|
||||||
|
|
||||||
#include <cstdlib>
|
#include <cstdlib>
|
||||||
#include <iostream>
|
|
||||||
|
|
||||||
#include "curl_sapi.sapi.h"
|
#include "../sandbox.h"
|
||||||
#include "sandboxed_api/util/flag.h"
|
|
||||||
|
|
||||||
class CurlApiSandboxEx1 : public CurlSandbox {
|
|
||||||
private:
|
|
||||||
std::unique_ptr<sandbox2::Policy> ModifyPolicy(
|
|
||||||
sandbox2::PolicyBuilder*) override {
|
|
||||||
// Return a new policy
|
|
||||||
return sandbox2::PolicyBuilder()
|
|
||||||
.DangerDefaultAllowAll()
|
|
||||||
.AllowUnrestrictedNetworking()
|
|
||||||
.AddDirectory("/lib")
|
|
||||||
.BuildOrDie();
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
int main(int argc, char* argv[]) {
|
int main(int argc, char* argv[]) {
|
||||||
absl::Status status;
|
absl::Status status;
|
||||||
|
@ -40,41 +25,61 @@ int main(int argc, char* argv[]) {
|
||||||
sapi::StatusOr<int> status_or_int;
|
sapi::StatusOr<int> status_or_int;
|
||||||
|
|
||||||
// Initialize sandbox2 and sapi
|
// Initialize sandbox2 and sapi
|
||||||
CurlApiSandboxEx1 sandbox;
|
CurlSapiSandbox sandbox;
|
||||||
status = sandbox.Init();
|
status = sandbox.Init();
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in sandbox Init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
CurlApi api(&sandbox);
|
CurlApi api(&sandbox);
|
||||||
|
|
||||||
// Initialize the curl session
|
// Initialize the curl session
|
||||||
status_or_curl = api.curl_easy_init();
|
status_or_curl = api.curl_easy_init();
|
||||||
assert(status_or_curl.ok());
|
if (!status_or_curl.ok()) {
|
||||||
|
std::cerr << "error in curl_easy_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
sapi::v::RemotePtr curl(status_or_curl.value());
|
sapi::v::RemotePtr curl(status_or_curl.value());
|
||||||
assert(curl.GetValue()); // Checking curl != nullptr
|
if (!curl.GetValue()) {
|
||||||
|
std::cerr << "error in curl_easy_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Specify URL to get
|
// Specify URL to get
|
||||||
sapi::v::ConstCStr url("http://example.com");
|
sapi::v::ConstCStr url("http://example.com");
|
||||||
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, url.PtrBefore());
|
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, url.PtrBefore());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Set the library to follow a redirection
|
// Set the library to follow a redirection
|
||||||
status_or_int = api.curl_easy_setopt_long(&curl, CURLOPT_FOLLOWLOCATION, 1l);
|
status_or_int = api.curl_easy_setopt_long(&curl, CURLOPT_FOLLOWLOCATION, 1l);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_long" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, FALSE);
|
// curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, FALSE);
|
||||||
status_or_int = api.curl_easy_setopt_long(&curl, CURLOPT_SSL_VERIFYPEER, 0l);
|
status_or_int = api.curl_easy_setopt_long(&curl, CURLOPT_SSL_VERIFYPEER, 0l);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_long" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Perform the request
|
// Perform the request
|
||||||
status_or_int = api.curl_easy_perform(&curl);
|
status_or_int = api.curl_easy_perform(&curl);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_perform" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Cleanup curl
|
// Cleanup curl
|
||||||
status = api.curl_easy_cleanup(&curl);
|
status = api.curl_easy_cleanup(&curl);
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in curl_easy_cleanup" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
return EXIT_SUCCESS;
|
return EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
|
@ -18,92 +18,106 @@
|
||||||
#include <cstdlib>
|
#include <cstdlib>
|
||||||
#include <iostream>
|
#include <iostream>
|
||||||
|
|
||||||
#include "curl_sapi.sapi.h"
|
#include "../sandbox.h"
|
||||||
#include "sandboxed_api/util/flag.h"
|
|
||||||
|
|
||||||
struct MemoryStruct {
|
struct MemoryStruct {
|
||||||
char* memory;
|
char* memory;
|
||||||
size_t size;
|
size_t size;
|
||||||
};
|
};
|
||||||
|
|
||||||
class CurlApiSandboxEx2 : public CurlSandbox {
|
|
||||||
private:
|
|
||||||
std::unique_ptr<sandbox2::Policy> ModifyPolicy(
|
|
||||||
sandbox2::PolicyBuilder*) override {
|
|
||||||
// Return a new policy
|
|
||||||
return sandbox2::PolicyBuilder()
|
|
||||||
.DangerDefaultAllowAll()
|
|
||||||
.AllowUnrestrictedNetworking()
|
|
||||||
.AddDirectory("/lib")
|
|
||||||
.BuildOrDie();
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
int main() {
|
int main() {
|
||||||
absl::Status status;
|
absl::Status status;
|
||||||
sapi::StatusOr<CURL*> status_or_curl;
|
sapi::StatusOr<CURL*> status_or_curl;
|
||||||
sapi::StatusOr<int> status_or_int;
|
sapi::StatusOr<int> status_or_int;
|
||||||
|
|
||||||
// Initialize sandbox2 and sapi
|
// Initialize sandbox2 and sapi
|
||||||
CurlApiSandboxEx2 sandbox;
|
CurlSapiSandbox sandbox;
|
||||||
status = sandbox.Init();
|
status = sandbox.Init();
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in sandbox Init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
CurlApi api(&sandbox);
|
CurlApi api(&sandbox);
|
||||||
|
|
||||||
// Generate pointer to WriteMemoryCallback function
|
// Generate pointer to WriteMemoryCallback function
|
||||||
sapi::RPCChannel rpcc(sandbox.comms());
|
sapi::RPCChannel rpcc(sandbox.comms());
|
||||||
size_t (*_function_ptr)(void*, size_t, size_t, void*);
|
size_t (*_function_ptr)(void*, size_t, size_t, void*);
|
||||||
status = rpcc.Symbol("WriteMemoryCallback", (void**)&_function_ptr);
|
status = rpcc.Symbol("WriteMemoryCallback", (void**)&_function_ptr);
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in RPCChannel Symbol" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
sapi::v::RemotePtr remote_function_ptr((void*)_function_ptr);
|
sapi::v::RemotePtr remote_function_ptr((void*)_function_ptr);
|
||||||
|
|
||||||
// Initialize the curl session
|
// Initialize the curl session
|
||||||
status_or_curl = api.curl_easy_init();
|
status_or_curl = api.curl_easy_init();
|
||||||
assert(status_or_curl.ok());
|
if (!status_or_curl.ok()) {
|
||||||
|
std::cerr << "error in curl_easy_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
sapi::v::RemotePtr curl(status_or_curl.value());
|
sapi::v::RemotePtr curl(status_or_curl.value());
|
||||||
assert(curl.GetValue()); // Checking curl != nullptr
|
if (!curl.GetValue()) {
|
||||||
|
std::cerr << "error in curl_easy_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Specify URL to get
|
// Specify URL to get
|
||||||
sapi::v::ConstCStr url("http://example.com");
|
sapi::v::ConstCStr url("http://example.com");
|
||||||
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, url.PtrBefore());
|
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, url.PtrBefore());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Set WriteMemoryCallback as the write function
|
// Set WriteMemoryCallback as the write function
|
||||||
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_WRITEFUNCTION,
|
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_WRITEFUNCTION,
|
||||||
&remote_function_ptr);
|
&remote_function_ptr);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Pass 'chunk' struct to the callback function
|
// Pass 'chunk' struct to the callback function
|
||||||
sapi::v::Struct<MemoryStruct> chunk;
|
sapi::v::Struct<MemoryStruct> chunk;
|
||||||
status_or_int =
|
status_or_int =
|
||||||
api.curl_easy_setopt_ptr(&curl, CURLOPT_WRITEDATA, chunk.PtrBoth());
|
api.curl_easy_setopt_ptr(&curl, CURLOPT_WRITEDATA, chunk.PtrBoth());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Set a user agent
|
// Set a user agent
|
||||||
sapi::v::ConstCStr user_agent("libcurl-agent/1.0");
|
sapi::v::ConstCStr user_agent("libcurl-agent/1.0");
|
||||||
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_USERAGENT,
|
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_USERAGENT,
|
||||||
user_agent.PtrBefore());
|
user_agent.PtrBefore());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Perform the request
|
// Perform the request
|
||||||
status_or_int = api.curl_easy_perform(&curl);
|
status_or_int = api.curl_easy_perform(&curl);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_perform" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Retrieve memory size
|
// Retrieve memory size
|
||||||
sapi::v::Int size;
|
sapi::v::Int size;
|
||||||
size.SetRemote(&((MemoryStruct*)chunk.GetRemote())->size);
|
size.SetRemote(&((MemoryStruct*)chunk.GetRemote())->size);
|
||||||
status = sandbox.TransferFromSandboxee(&size);
|
status = sandbox.TransferFromSandboxee(&size);
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in sandbox TransferFromSandboxee" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
std::cout << "memory size: " << size.GetValue() << " bytes" << std::endl;
|
std::cout << "memory size: " << size.GetValue() << " bytes" << std::endl;
|
||||||
|
|
||||||
// Cleanup curl
|
// Cleanup curl
|
||||||
status = api.curl_easy_cleanup(&curl);
|
status = api.curl_easy_cleanup(&curl);
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in curl_easy_cleanup" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
return EXIT_SUCCESS;
|
return EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
|
@ -16,15 +16,13 @@
|
||||||
// HTTPS GET request
|
// HTTPS GET request
|
||||||
|
|
||||||
#include <cstdlib>
|
#include <cstdlib>
|
||||||
#include <iostream>
|
|
||||||
|
|
||||||
#include "curl_sapi.sapi.h"
|
#include "../sandbox.h"
|
||||||
#include "sandboxed_api/util/flag.h"
|
|
||||||
|
|
||||||
class CurlApiSandboxEx3 : public CurlSandbox {
|
class CurlSapiSandboxEx3 : public CurlSapiSandbox {
|
||||||
public:
|
public:
|
||||||
CurlApiSandboxEx3(std::string ssl_certificate, std::string ssl_key,
|
CurlSapiSandboxEx3(std::string ssl_certificate, std::string ssl_key,
|
||||||
std::string ca_certificates)
|
std::string ca_certificates)
|
||||||
: ssl_certificate(ssl_certificate),
|
: ssl_certificate(ssl_certificate),
|
||||||
ssl_key(ssl_key),
|
ssl_key(ssl_key),
|
||||||
ca_certificates(ca_certificates) {}
|
ca_certificates(ca_certificates) {}
|
||||||
|
@ -32,15 +30,17 @@ class CurlApiSandboxEx3 : public CurlSandbox {
|
||||||
private:
|
private:
|
||||||
std::unique_ptr<sandbox2::Policy> ModifyPolicy(
|
std::unique_ptr<sandbox2::Policy> ModifyPolicy(
|
||||||
sandbox2::PolicyBuilder*) override {
|
sandbox2::PolicyBuilder*) override {
|
||||||
// Return a new policy
|
// Add the syscalls and files missing in CurlSandbox to a new PolicyBuilder
|
||||||
return sandbox2::PolicyBuilder()
|
auto policy_builder = std::make_unique<sandbox2::PolicyBuilder>();
|
||||||
.DangerDefaultAllowAll()
|
(*policy_builder)
|
||||||
.AllowUnrestrictedNetworking()
|
.AllowGetPIDs()
|
||||||
.AddDirectory("/lib")
|
.AllowGetRandom()
|
||||||
|
.AllowSyscall(__NR_sysinfo)
|
||||||
.AddFile(ssl_certificate)
|
.AddFile(ssl_certificate)
|
||||||
.AddFile(ssl_key)
|
.AddFile(ssl_key)
|
||||||
.AddFile(ca_certificates)
|
.AddFile(ca_certificates);
|
||||||
.BuildOrDie();
|
// Provide the new PolicyBuilder to ModifyPolicy in CurlSandbox
|
||||||
|
return CurlSapiSandbox::ModifyPolicy(policy_builder.get());
|
||||||
}
|
}
|
||||||
|
|
||||||
std::string ssl_certificate;
|
std::string ssl_certificate;
|
||||||
|
@ -54,87 +54,123 @@ int main(int argc, char* argv[]) {
|
||||||
sapi::StatusOr<CURL*> status_or_curl;
|
sapi::StatusOr<CURL*> status_or_curl;
|
||||||
|
|
||||||
// Get input parameters (should be absolute paths)
|
// Get input parameters (should be absolute paths)
|
||||||
assert(argc == 5);
|
if (argc != 5) {
|
||||||
|
std::cerr << "wrong number of arguments (4 expected)" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
std::string ssl_certificate = argv[1];
|
std::string ssl_certificate = argv[1];
|
||||||
std::string ssl_key = argv[2];
|
std::string ssl_key = argv[2];
|
||||||
std::string ssl_key_password = argv[3];
|
std::string ssl_key_password = argv[3];
|
||||||
std::string ca_certificates = argv[4];
|
std::string ca_certificates = argv[4];
|
||||||
|
|
||||||
// Initialize sandbox2 and sapi
|
// Initialize sandbox2 and sapi
|
||||||
CurlApiSandboxEx3 sandbox(ssl_certificate, ssl_key, ca_certificates);
|
CurlSapiSandboxEx3 sandbox(ssl_certificate, ssl_key, ca_certificates);
|
||||||
status = sandbox.Init();
|
status = sandbox.Init();
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in sandbox Init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
CurlApi api(&sandbox);
|
CurlApi api(&sandbox);
|
||||||
|
|
||||||
// Initialize curl (CURL_GLOBAL_DEFAULT = 3)
|
// Initialize curl (CURL_GLOBAL_DEFAULT = 3)
|
||||||
status_or_int = api.curl_global_init(3l);
|
status_or_int = api.curl_global_init(3l);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_global_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Initialize curl easy handle
|
// Initialize curl easy handle
|
||||||
status_or_curl = api.curl_easy_init();
|
status_or_curl = api.curl_easy_init();
|
||||||
assert(status_or_curl.ok());
|
if (!status_or_curl.ok()) {
|
||||||
|
std::cerr << "error in curl_easy_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
sapi::v::RemotePtr curl(status_or_curl.value());
|
sapi::v::RemotePtr curl(status_or_curl.value());
|
||||||
assert(curl.GetValue()); // Checking curl != nullptr
|
if (!curl.GetValue()) {
|
||||||
|
std::cerr << "error in curl_easy_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Specify URL to get (using HTTPS)
|
// Specify URL to get (using HTTPS)
|
||||||
sapi::v::ConstCStr url("https://example.com");
|
sapi::v::ConstCStr url("https://example.com");
|
||||||
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, url.PtrBefore());
|
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, url.PtrBefore());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Set the SSL certificate type to "PEM"
|
// Set the SSL certificate type to "PEM"
|
||||||
sapi::v::ConstCStr ssl_cert_type("PEM");
|
sapi::v::ConstCStr ssl_cert_type("PEM");
|
||||||
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_SSLCERTTYPE,
|
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_SSLCERTTYPE,
|
||||||
ssl_cert_type.PtrBefore());
|
ssl_cert_type.PtrBefore());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Set the certificate for client authentication
|
// Set the certificate for client authentication
|
||||||
sapi::v::ConstCStr sapi_ssl_certificate(ssl_certificate.c_str());
|
sapi::v::ConstCStr sapi_ssl_certificate(ssl_certificate.c_str());
|
||||||
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_SSLCERT,
|
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_SSLCERT,
|
||||||
sapi_ssl_certificate.PtrBefore());
|
sapi_ssl_certificate.PtrBefore());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Set the private key for client authentication
|
// Set the private key for client authentication
|
||||||
sapi::v::ConstCStr sapi_ssl_key(ssl_key.c_str());
|
sapi::v::ConstCStr sapi_ssl_key(ssl_key.c_str());
|
||||||
status_or_int =
|
status_or_int =
|
||||||
api.curl_easy_setopt_ptr(&curl, CURLOPT_SSLKEY, sapi_ssl_key.PtrBefore());
|
api.curl_easy_setopt_ptr(&curl, CURLOPT_SSLKEY, sapi_ssl_key.PtrBefore());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Set the password used to protect the private key
|
// Set the password used to protect the private key
|
||||||
sapi::v::ConstCStr sapi_ssl_key_password(ssl_key_password.c_str());
|
sapi::v::ConstCStr sapi_ssl_key_password(ssl_key_password.c_str());
|
||||||
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_KEYPASSWD,
|
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_KEYPASSWD,
|
||||||
sapi_ssl_key_password.PtrBefore());
|
sapi_ssl_key_password.PtrBefore());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Set the file with the certificates vaildating the server
|
// Set the file with the certificates vaildating the server
|
||||||
sapi::v::ConstCStr sapi_ca_certificates(ca_certificates.c_str());
|
sapi::v::ConstCStr sapi_ca_certificates(ca_certificates.c_str());
|
||||||
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_CAINFO,
|
status_or_int = api.curl_easy_setopt_ptr(&curl, CURLOPT_CAINFO,
|
||||||
sapi_ca_certificates.PtrBefore());
|
sapi_ca_certificates.PtrBefore());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Verify the authenticity of the server
|
// Verify the authenticity of the server
|
||||||
status_or_int = api.curl_easy_setopt_long(&curl, CURLOPT_SSL_VERIFYPEER, 1L);
|
status_or_int = api.curl_easy_setopt_long(&curl, CURLOPT_SSL_VERIFYPEER, 1L);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_long" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Perform the request
|
// Perform the request
|
||||||
status_or_int = api.curl_easy_perform(&curl);
|
status_or_int = api.curl_easy_perform(&curl);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_perform" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Cleanup curl easy handle
|
// Cleanup curl easy handle
|
||||||
status = api.curl_easy_cleanup(&curl);
|
status = api.curl_easy_cleanup(&curl);
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in curl_easy_cleanup" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Cleanup curl
|
// Cleanup curl
|
||||||
status = api.curl_global_cleanup();
|
status = api.curl_global_cleanup();
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in curl_global_cleanup" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
return EXIT_SUCCESS;
|
return EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
|
@ -16,24 +16,11 @@
|
||||||
// HTTP GET request with polling
|
// HTTP GET request with polling
|
||||||
|
|
||||||
#include <cstdlib>
|
#include <cstdlib>
|
||||||
#include <iostream>
|
|
||||||
|
|
||||||
|
#include "../sandbox.h"
|
||||||
#include "curl_sapi.sapi.h"
|
#include "curl_sapi.sapi.h"
|
||||||
#include "sandboxed_api/util/flag.h"
|
#include "sandboxed_api/util/flag.h"
|
||||||
|
|
||||||
class CurlApiSandboxEx4 : public CurlSandbox {
|
|
||||||
private:
|
|
||||||
std::unique_ptr<sandbox2::Policy> ModifyPolicy(
|
|
||||||
sandbox2::PolicyBuilder*) override {
|
|
||||||
// Return a new policy
|
|
||||||
return sandbox2::PolicyBuilder()
|
|
||||||
.DangerDefaultAllowAll()
|
|
||||||
.AllowUnrestrictedNetworking()
|
|
||||||
.AddDirectory("/lib")
|
|
||||||
.BuildOrDie();
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
int main() {
|
int main() {
|
||||||
absl::Status status;
|
absl::Status status;
|
||||||
sapi::StatusOr<int> status_or_int;
|
sapi::StatusOr<int> status_or_int;
|
||||||
|
@ -41,9 +28,12 @@ int main() {
|
||||||
sapi::StatusOr<CURLM*> status_or_curlm;
|
sapi::StatusOr<CURLM*> status_or_curlm;
|
||||||
|
|
||||||
// Initialize sandbox2 and sapi
|
// Initialize sandbox2 and sapi
|
||||||
CurlApiSandboxEx4 sandbox;
|
CurlSapiSandbox sandbox;
|
||||||
status = sandbox.Init();
|
status = sandbox.Init();
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in sandbox Init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
CurlApi api(&sandbox);
|
CurlApi api(&sandbox);
|
||||||
|
|
||||||
// Number of running handles
|
// Number of running handles
|
||||||
|
@ -51,32 +41,50 @@ int main() {
|
||||||
|
|
||||||
// Initialize curl (CURL_GLOBAL_DEFAULT = 3)
|
// Initialize curl (CURL_GLOBAL_DEFAULT = 3)
|
||||||
status_or_int = api.curl_global_init(3l);
|
status_or_int = api.curl_global_init(3l);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_global_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Initialize http_handle
|
// Initialize http_handle
|
||||||
status_or_curl = api.curl_easy_init();
|
status_or_curl = api.curl_easy_init();
|
||||||
assert(status_or_curl.ok());
|
if (!status_or_curl.ok()) {
|
||||||
|
std::cerr << "error in curl_easy_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
sapi::v::RemotePtr http_handle(status_or_curl.value());
|
sapi::v::RemotePtr http_handle(status_or_curl.value());
|
||||||
assert(http_handle.GetValue()); // Checking http_handle != nullptr
|
if (!http_handle.GetValue()) {
|
||||||
|
std::cerr << "error in curl_easy_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Specify URL to get
|
// Specify URL to get
|
||||||
sapi::v::ConstCStr url("http://example.com");
|
sapi::v::ConstCStr url("http://example.com");
|
||||||
status_or_int =
|
status_or_int =
|
||||||
api.curl_easy_setopt_ptr(&http_handle, CURLOPT_URL, url.PtrBefore());
|
api.curl_easy_setopt_ptr(&http_handle, CURLOPT_URL, url.PtrBefore());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Initialize multi_handle
|
// Initialize multi_handle
|
||||||
status_or_curlm = api.curl_multi_init();
|
status_or_curlm = api.curl_multi_init();
|
||||||
assert(status_or_curlm.ok());
|
if (!status_or_curl.ok()) {
|
||||||
|
std::cerr << "error in curl_multi_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
sapi::v::RemotePtr multi_handle(status_or_curlm.value());
|
sapi::v::RemotePtr multi_handle(status_or_curlm.value());
|
||||||
assert(multi_handle.GetValue()); // Checking multi_handle != nullptr
|
if (!multi_handle.GetValue()) {
|
||||||
|
std::cerr << "error in curl_multi_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Add http_handle to the multi stack
|
// Add http_handle to the multi stack
|
||||||
status_or_int = api.curl_multi_add_handle(&multi_handle, &http_handle);
|
status_or_int = api.curl_multi_add_handle(&multi_handle, &http_handle);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_multi_add_handle" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
while (still_running.GetValue()) {
|
while (still_running.GetValue()) {
|
||||||
sapi::v::Int numfds(0);
|
sapi::v::Int numfds(0);
|
||||||
|
@ -84,36 +92,50 @@ int main() {
|
||||||
// Perform the request
|
// Perform the request
|
||||||
status_or_int =
|
status_or_int =
|
||||||
api.curl_multi_perform(&multi_handle, still_running.PtrBoth());
|
api.curl_multi_perform(&multi_handle, still_running.PtrBoth());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_multi_perform" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
if (still_running.GetValue()) {
|
if (still_running.GetValue()) {
|
||||||
// Wait for an event or timeout
|
// Wait for an event or timeout
|
||||||
sapi::v::NullPtr null_ptr;
|
sapi::v::NullPtr null_ptr;
|
||||||
status_or_int = api.curl_multi_poll_sapi(&multi_handle, &null_ptr, 0,
|
status_or_int = api.curl_multi_poll_sapi(&multi_handle, &null_ptr, 0,
|
||||||
1000, numfds.PtrBoth());
|
1000, numfds.PtrBoth());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLM_OK);
|
std::cerr << "error in curl_multi_poll_sapi" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Remove http_handle from the multi stack
|
// Remove http_handle from the multi stack
|
||||||
status_or_int = api.curl_multi_remove_handle(&multi_handle, &http_handle);
|
status_or_int = api.curl_multi_remove_handle(&multi_handle, &http_handle);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_multi_remove_handle" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Cleanup http_handle
|
// Cleanup http_handle
|
||||||
status = api.curl_easy_cleanup(&http_handle);
|
status = api.curl_easy_cleanup(&http_handle);
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in curl_easy_cleanup" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Cleanup multi_handle
|
// Cleanup multi_handle
|
||||||
status_or_int = api.curl_multi_cleanup(&multi_handle);
|
status_or_int = api.curl_multi_cleanup(&multi_handle);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_multi_cleanup" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Cleanup curl
|
// Cleanup curl
|
||||||
status = api.curl_global_cleanup();
|
status = api.curl_global_cleanup();
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in curl_global_cleanup" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
return EXIT_SUCCESS;
|
return EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
|
@ -18,23 +18,8 @@
|
||||||
#include <pthread.h>
|
#include <pthread.h>
|
||||||
|
|
||||||
#include <cstdlib>
|
#include <cstdlib>
|
||||||
#include <iostream>
|
|
||||||
|
|
||||||
#include "curl_sapi.sapi.h"
|
#include "../sandbox.h"
|
||||||
#include "sandboxed_api/util/flag.h"
|
|
||||||
|
|
||||||
class CurlApiSandboxEx5 : public CurlSandbox {
|
|
||||||
private:
|
|
||||||
std::unique_ptr<sandbox2::Policy> ModifyPolicy(
|
|
||||||
sandbox2::PolicyBuilder*) override {
|
|
||||||
// Return a new policy
|
|
||||||
return sandbox2::PolicyBuilder()
|
|
||||||
.DangerDefaultAllowAll()
|
|
||||||
.AllowUnrestrictedNetworking()
|
|
||||||
.AddDirectory("/lib")
|
|
||||||
.BuildOrDie();
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
struct thread_args {
|
struct thread_args {
|
||||||
const char* url;
|
const char* url;
|
||||||
|
@ -52,25 +37,38 @@ void* pull_one_url(void* args) {
|
||||||
|
|
||||||
// Initialize the curl session
|
// Initialize the curl session
|
||||||
status_or_curl = api.curl_easy_init();
|
status_or_curl = api.curl_easy_init();
|
||||||
assert(status_or_curl.ok());
|
if (!status_or_curl.ok()) {
|
||||||
|
std::cerr << "error in curl_easy_init" << std::endl;
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
sapi::v::RemotePtr curl(status_or_curl.value());
|
sapi::v::RemotePtr curl(status_or_curl.value());
|
||||||
assert(curl.GetValue()); // Checking curl != nullptr
|
if (!curl.GetValue()) {
|
||||||
|
std::cerr << "error in curl_easy_init" << std::endl;
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
// Specify URL to get
|
// Specify URL to get
|
||||||
sapi::v::ConstCStr sapi_url(((thread_args*)args)->url);
|
sapi::v::ConstCStr sapi_url(((thread_args*)args)->url);
|
||||||
status_or_int =
|
status_or_int =
|
||||||
api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, sapi_url.PtrBefore());
|
api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, sapi_url.PtrBefore());
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_setopt_ptr" << std::endl;
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
// Perform the request
|
// Perform the request
|
||||||
status_or_int = api.curl_easy_perform(&curl);
|
status_or_int = api.curl_easy_perform(&curl);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_easy_perform" << std::endl;
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
// Cleanup curl
|
// Cleanup curl
|
||||||
status = api.curl_easy_cleanup(&curl);
|
status = api.curl_easy_cleanup(&curl);
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in curl_easy_cleanup" << std::endl;
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
@ -86,21 +84,29 @@ int main(int argc, char** argv) {
|
||||||
sapi::StatusOr<int> status_or_int;
|
sapi::StatusOr<int> status_or_int;
|
||||||
|
|
||||||
// Initialize sandbox2 and sapi
|
// Initialize sandbox2 and sapi
|
||||||
CurlApiSandboxEx5 sandbox;
|
CurlSapiSandbox sandbox;
|
||||||
status = sandbox.Init();
|
status = sandbox.Init();
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in sandbox Init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
CurlApi api(&sandbox);
|
CurlApi api(&sandbox);
|
||||||
|
|
||||||
// Initialize curl (CURL_GLOBAL_DEFAULT = 3)
|
// Initialize curl (CURL_GLOBAL_DEFAULT = 3)
|
||||||
status_or_int = api.curl_global_init(3l);
|
status_or_int = api.curl_global_init(3l);
|
||||||
assert(status_or_int.ok());
|
if (!status_or_int.ok() or status_or_int.value() != CURLE_OK) {
|
||||||
assert(status_or_int.value() == CURLE_OK);
|
std::cerr << "error in curl_global_init" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
// Create the threads
|
// Create the threads
|
||||||
for (int i = 0; i < kThreadsnumber; ++i) {
|
for (int i = 0; i < kThreadsnumber; ++i) {
|
||||||
thread_args args = {urls[i], &api};
|
thread_args args = {urls[i], &api};
|
||||||
int error = pthread_create(&tid[i], NULL, pull_one_url, (void*)&args);
|
int error = pthread_create(&tid[i], NULL, pull_one_url, (void*)&args);
|
||||||
assert(!error);
|
if (error) {
|
||||||
|
std::cerr << "error in pthread_create" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
std::cout << "Thread " << i << " gets " << urls[i] << std::endl;
|
std::cout << "Thread " << i << " gets " << urls[i] << std::endl;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -112,7 +118,10 @@ int main(int argc, char** argv) {
|
||||||
|
|
||||||
// Cleanup curl
|
// Cleanup curl
|
||||||
status = api.curl_global_cleanup();
|
status = api.curl_global_cleanup();
|
||||||
assert(status.ok());
|
if (!status.ok()) {
|
||||||
|
std::cerr << "error in curl_global_cleanup" << std::endl;
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
return EXIT_SUCCESS;
|
return EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
72
oss-internship-2020/curl/examples/example6.cc
Normal file
72
oss-internship-2020/curl/examples/example6.cc
Normal file
|
@ -0,0 +1,72 @@
|
||||||
|
// Copyright 2020 Google LLC
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
// Sandboxed version of simple.c using transactions
|
||||||
|
// Simple HTTP GET request
|
||||||
|
|
||||||
|
#include <cstdlib>
|
||||||
|
|
||||||
|
#include "../sandbox.h"
|
||||||
|
#include "sandboxed_api/transaction.h"
|
||||||
|
|
||||||
|
class CurlTransaction : public sapi::Transaction {
|
||||||
|
public:
|
||||||
|
CurlTransaction(std::unique_ptr<sapi::Sandbox> sandbox)
|
||||||
|
: sapi::Transaction(std::move(sandbox)) {
|
||||||
|
sapi::Transaction::SetTimeLimit(kTimeOutVal);
|
||||||
|
}
|
||||||
|
|
||||||
|
private:
|
||||||
|
// Default timeout value for each transaction run.
|
||||||
|
const time_t kTimeOutVal = 2;
|
||||||
|
|
||||||
|
// The main processing function.
|
||||||
|
absl::Status Main() override;
|
||||||
|
};
|
||||||
|
|
||||||
|
absl::Status CurlTransaction::Main() {
|
||||||
|
CurlApi api(sandbox());
|
||||||
|
|
||||||
|
// Initialize the curl session
|
||||||
|
SAPI_ASSIGN_OR_RETURN(void* curl_remote, api.curl_easy_init())
|
||||||
|
sapi::v::RemotePtr curl(curl_remote);
|
||||||
|
TRANSACTION_FAIL_IF_NOT(curl.GetValue(), "error in curl_easy_init");
|
||||||
|
|
||||||
|
// Specify URL to get
|
||||||
|
sapi::v::ConstCStr url("http://example.com");
|
||||||
|
SAPI_ASSIGN_OR_RETURN(
|
||||||
|
int setopt_url_code,
|
||||||
|
api.curl_easy_setopt_ptr(&curl, CURLOPT_URL, url.PtrBefore()))
|
||||||
|
TRANSACTION_FAIL_IF_NOT(setopt_url_code == CURLE_OK,
|
||||||
|
"error in curl_easy_setopt_ptr");
|
||||||
|
|
||||||
|
// Perform the request
|
||||||
|
SAPI_ASSIGN_OR_RETURN(int perform_code, api.curl_easy_perform(&curl))
|
||||||
|
TRANSACTION_FAIL_IF_NOT(setopt_url_code == CURLE_OK,
|
||||||
|
"error in curl_easy_perform");
|
||||||
|
|
||||||
|
// Cleanup curl
|
||||||
|
TRANSACTION_FAIL_IF_NOT(api.curl_easy_cleanup(&curl).ok(),
|
||||||
|
"error in curl_easy_cleanup");
|
||||||
|
|
||||||
|
return absl::OkStatus();
|
||||||
|
}
|
||||||
|
|
||||||
|
int main(int argc, char* argv[]) {
|
||||||
|
CurlTransaction curl{std::make_unique<CurlSapiSandbox>()};
|
||||||
|
absl::Status status = curl.Run();
|
||||||
|
CHECK(status.ok());
|
||||||
|
|
||||||
|
return EXIT_SUCCESS;
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user