mirror of
https://github.com/google/sandboxed-api.git
synced 2024-03-22 13:11:30 +08:00
2f64d3d925
Libunwind sandbox no longer needs to join sandboxee's userns. This cleans up a lot of special handling for the libunwind sandbox. PiperOrigin-RevId: 503140778 Change-Id: I020ea3adda05ae6ff74137b668a5fa7509c138f8
77 lines
2.4 KiB
C++
77 lines
2.4 KiB
C++
// Copyright 2019 Google LLC
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
// The sandbox2::Namespace class defines ways of inserting the sandboxed process
|
|
// into Linux namespaces.
|
|
|
|
#ifndef SANDBOXED_API_SANDBOX2_NAMESPACE_H_
|
|
#define SANDBOXED_API_SANDBOX2_NAMESPACE_H_
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <cstdint>
|
|
#include <memory>
|
|
#include <string>
|
|
|
|
#include "absl/base/macros.h"
|
|
#include "sandboxed_api/sandbox2/mounts.h"
|
|
#include "sandboxed_api/sandbox2/violation.pb.h"
|
|
|
|
namespace sandbox2 {
|
|
|
|
class Namespace final {
|
|
public:
|
|
// Performs the namespace setup (mounts, write the uid_map, etc.).
|
|
static void InitializeNamespaces(uid_t uid, gid_t gid, int32_t clone_flags,
|
|
const Mounts& mounts,
|
|
const std::string& hostname,
|
|
bool avoid_pivot_root,
|
|
bool allow_mount_propagation);
|
|
static void InitializeInitialNamespaces(uid_t uid, gid_t gid);
|
|
|
|
Namespace() = delete;
|
|
Namespace(const Namespace&) = delete;
|
|
Namespace& operator=(const Namespace&) = delete;
|
|
|
|
Namespace(bool allow_unrestricted_networking, Mounts mounts,
|
|
std::string hostname, bool allow_mount_propagation);
|
|
|
|
void DisableUserNamespace();
|
|
|
|
// Returns all needed CLONE_NEW* flags.
|
|
int32_t GetCloneFlags() const;
|
|
|
|
// Stores information about this namespace in the protobuf structure.
|
|
void GetNamespaceDescription(NamespaceDescription* pb_description);
|
|
|
|
Mounts& mounts() { return mounts_; }
|
|
const Mounts& mounts() const { return mounts_; }
|
|
|
|
const std::string& hostname() const { return hostname_; }
|
|
|
|
bool allow_mount_propagation() const { return allow_mount_propagation_; }
|
|
|
|
private:
|
|
friend class StackTracePeer;
|
|
|
|
int32_t clone_flags_;
|
|
Mounts mounts_;
|
|
std::string hostname_;
|
|
bool allow_mount_propagation_;
|
|
};
|
|
|
|
} // namespace sandbox2
|
|
|
|
#endif // SANDBOXED_API_SANDBOX2_NAMESPACE_H_
|