1*ec63e07aSXin Li // Copyright 2022 Google LLC 2*ec63e07aSXin Li // 3*ec63e07aSXin Li // Licensed under the Apache License, Version 2.0 (the "License"); 4*ec63e07aSXin Li // you may not use this file except in compliance with the License. 5*ec63e07aSXin Li // You may obtain a copy of the License at 6*ec63e07aSXin Li // 7*ec63e07aSXin Li // https://www.apache.org/licenses/LICENSE-2.0 8*ec63e07aSXin Li // 9*ec63e07aSXin Li // Unless required by applicable law or agreed to in writing, software 10*ec63e07aSXin Li // distributed under the License is distributed on an "AS IS" BASIS, 11*ec63e07aSXin Li // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12*ec63e07aSXin Li // See the License for the specific language governing permissions and 13*ec63e07aSXin Li // limitations under the License. 14*ec63e07aSXin Li 15*ec63e07aSXin Li #ifndef CONTRIB_HUNSPELL_SANDBOXED_H_ 16*ec63e07aSXin Li #define CONTRIB_HUNSPELL_SANDBOXED_H_ 17*ec63e07aSXin Li 18*ec63e07aSXin Li #include <libgen.h> 19*ec63e07aSXin Li #include <syscall.h> 20*ec63e07aSXin Li 21*ec63e07aSXin Li #include "sapi_hunspell.sapi.h" // NOLINT(build/include) 22*ec63e07aSXin Li 23*ec63e07aSXin Li class HunspellSapiSandbox : public HunspellSandbox { 24*ec63e07aSXin Li public: HunspellSapiSandbox(std::string affix_file_name,std::string dictionary_file_name)25*ec63e07aSXin Li explicit HunspellSapiSandbox(std::string affix_file_name, 26*ec63e07aSXin Li std::string dictionary_file_name) 27*ec63e07aSXin Li : affix_file_name_(std::move(affix_file_name)), 28*ec63e07aSXin Li dictionary_file_name_(std::move(dictionary_file_name)) {} 29*ec63e07aSXin Li 30*ec63e07aSXin Li private: ModifyPolicy(sandbox2::PolicyBuilder *)31*ec63e07aSXin Li std::unique_ptr<sandbox2::Policy> ModifyPolicy( 32*ec63e07aSXin Li sandbox2::PolicyBuilder*) override { 33*ec63e07aSXin Li return sandbox2::PolicyBuilder() 34*ec63e07aSXin Li .AllowStaticStartup() 35*ec63e07aSXin Li .AllowOpen() 36*ec63e07aSXin Li .AllowRead() 37*ec63e07aSXin Li .AllowWrite() 38*ec63e07aSXin Li .AllowGetPIDs() 39*ec63e07aSXin Li .AllowSystemMalloc() 40*ec63e07aSXin Li .AllowExit() 41*ec63e07aSXin Li .AllowSyscalls({ 42*ec63e07aSXin Li __NR_clock_gettime, 43*ec63e07aSXin Li __NR_close, 44*ec63e07aSXin Li }) 45*ec63e07aSXin Li .AddFile(affix_file_name_, /*is_ro=*/true) 46*ec63e07aSXin Li .AddFile(dictionary_file_name_, /*is_ro=*/true) 47*ec63e07aSXin Li .AllowRestartableSequencesWithProcFiles( 48*ec63e07aSXin Li sandbox2::PolicyBuilder::kAllowSlowFences) // hangs without it 49*ec63e07aSXin Li .BuildOrDie(); 50*ec63e07aSXin Li } 51*ec63e07aSXin Li 52*ec63e07aSXin Li std::string affix_file_name_; 53*ec63e07aSXin Li std::string dictionary_file_name_; 54*ec63e07aSXin Li }; 55*ec63e07aSXin Li 56*ec63e07aSXin Li #endif // CONTRIB_HUNSPELL_SANDBOXED_H_ 57