// Copyright 2020 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #ifndef LIBTIFF_SANDBOXED_H_ #define LIBTIFF_SANDBOXED_H_ #include #include #include #include "sandboxed_api/util/flag.h" #include "tiff_sapi.sapi.h" // NOLINT(build/include) ABSL_DECLARE_FLAG(string, sandbox2_danger_danger_permit_all); ABSL_DECLARE_FLAG(string, sandbox2_danger_danger_permit_all_and_log); class TiffSapiSandbox : public TiffSandbox { public: explicit TiffSapiSandbox(std::string dir = "", std::string file = "") : dir_(std::move(dir)), file_(std::move(file)) {} private: std::unique_ptr ModifyPolicy( sandbox2::PolicyBuilder*) override { auto builder = sandbox2::PolicyBuilder() .AllowRead() .AllowStaticStartup() .AllowWrite() .AllowOpen() .AllowExit() .AllowStat() .AllowSystemMalloc() .AllowSyscalls({ __NR_futex, __NR_close, __NR_lseek, __NR_gettid, __NR_sysinfo, __NR_mmap, __NR_munmap, }); if (!dir_.empty()) { builder.AddDirectory(dir_, /*is_ro=*/false); } if (!file_.empty()) { builder.AddFile(file_, /*is_ro=*/false); } return builder.BuildOrDie(); } std::string dir_; std::string file_; }; #endif // LIBTIFF_SANDBOXED_H_