aboutsummaryrefslogtreecommitdiff
path: root/sandbox.c
AgeCommit message (Collapse)Author
2021-07-09typoOmar Polo
2021-07-07style(9)-ifyOmar Polo
2021-07-03typoOmar Polo
2021-07-03fix seccomp filter for ppc64leOmar Polo
before we matched ppc64le as ppc64 (which is big ending I presume), so the seccomp filter would always kill gmid #4 related
2021-07-02configure: add --disable-sandboxOmar Polo
Calling `configure' with --disable-sandbox will disable the sandbox support *completely* at compile time. gmid will still complain at compile time and during the startup. Users shouldn't disable the sandbox if possible, but instead report problem upstream so they get fixed (hopefully.) #4 related
2021-07-02reworked seccomp filterOmar Polo
* SECCOMP_AUDIT_ARCH extended to support more architectures * relax fcntl policy: allow the syscall regardless of the flags * wrap every syscall in a ifdef, and add some (statx, fcntl64, ...) used in x86 Some bits were taken from dhcpcd[0], thanks! #4 related [0]: https://roy.marples.name/git/dhcpcd/blob/HEAD:/src/privsep-linux.c
2021-06-15allow sending fd to log on to the logger processOmar Polo
the logger process now can receive a file descriptor to write logs to. At the moment the logic is simple, if it receives a file it logs there, otherwise it logs to syslog. This will allow to log on custom log files.
2021-05-09fastcgi: a first implementationOmar Polo
Not production-ready yet, but it's a start. This adds a third ``backend'' for gmid: until now there it served local files or CGI scripts, now FastCGI applications too. FastCGI is meant to be an improvement over CGI: instead of exec'ing a script for every request, it allows to open a single connection to an ``application'' and send the requests/receive the responses over that socket using a simple binary protocol. At the moment gmid supports three different methods of opening a fastcgi connection: - local unix sockets, with: fastcgi "/path/to/sock" - network sockets, with: fastcgi tcp "host" [port] port defaults to 9000 and can be either a string or a number - subprocess, with: fastcgi spawn "/path/to/program" the fastcgi protocol is done over the executed program stdin of these, the last is only for testing and may be removed in the future. P.S.: the fastcgi rule is per-location of course :)
2021-04-30allow ``root'' rule to be specified per-location blockOmar Polo
2021-03-31list instead of fixed-size array for vhosts and locationsOmar Polo
saves some bytes of memory and removes the limit on the maximum number of vhosts and location blocks.
2021-03-20[seccomp] allow prlimit64Omar Polo
it's needed by getdtablesize, at least on glibc
2021-03-20move all sandbox-related code to sandbox.cOmar Polo
while there, add capsicum for the logger process
2021-02-23[seccomp] allow sendmsgOmar Polo
2021-02-23moving logging to its own processOmar Polo
2021-02-12accept4 -> acceptOmar Polo
accept4(2) isn't part of any standard (even though it'll be part in the future) and raises warnings on some linux distro. Moreover, we don't have thread that may fork at any time, so doing a mark_nonblock after isn't a big deal.
2021-02-11use fatal instead of err/fprintf+exitOmar Polo
fatal logs to the correct place, err only on stderr.
2021-02-11fix compilation on OSes without sandboxOmar Polo
2021-02-10[seccomp] allow newfstatat and gettimeofdayOmar Polo
these are required to run on arch linux (at least)
2021-02-10[seccomp] epoll_wait(2) isn't available on every archOmar Polo
2021-02-10allow epoll_waitOmar Polo
fedora 33 issue an epoll_wait instead of pwait.
2021-02-08allow sigreturn and sigaction on linuxOmar Polo
2021-02-08fix seccomp for the new event loopOmar Polo
add/remove syscalls from the BPF filter and move sandbox() after libevent initialisation
2021-01-28don't include err.h, gmid.h (via config.h) does thatOmar Polo
2021-01-25[seccomp] allow getrandomOmar Polo
2021-01-25we don't need unveil "x" in listenerOmar Polo
not a big deal, since the pledge prohibits us to exec, but nevertheless.
2021-01-24[seccomp] allow fcntl F_SETFDOmar Polo
musl does a F_SETFD in its fdopendir
2021-01-23fix dateOmar Polo
2021-01-23added missic copyright noticeOmar Polo
2021-01-21drop seccomp.h: not neededOmar Polo
2021-01-20fmtOmar Polo
2021-01-20allow clock_gettime and a bit of fmtOmar Polo
alpine on amd64 (under OpenBSD vmd) tries to do a clock_gettime. I don't know why, but it doesn't seem a problem to allow it.
2021-01-20fix BPFOmar Polo
2021-01-20tighten the rules for fcntlOmar Polo
allow only the F_GETFL and F_SETFL commands
2021-01-20explain the poll messOmar Polo
2021-01-18__NR_poll doesn't seem to be defined on aarch64Omar Polo
2021-01-17[seccomp] allow also pollOmar Polo
on the latest fedora we glibc uses poll. On the other linux distro I tried (void), musl is probably providing poll as a ppoll wrapper.
2021-01-17we don't need to check for CGI anymoreOmar Polo
2021-01-17initial seccomp supportOmar Polo
2021-01-16split into two processes: listener and executorOmar Polo
this way, we can sandbox the listener with seccomp (todo) or capsicum (already done) and still have CGI scripts. When we want to exec, we tell the executor what to do, the executor executes the scripts and send the fd backt to the listener.
2021-01-15sandbox also on FreeBSD with capsicumOmar Polo