#freebsd #sandbox

sys casper-sys

FFI bindings for FreeBSD's libcasper

3 releases

0.1.2 Oct 14, 2024
0.1.1 Aug 7, 2023
0.1.0 Feb 16, 2023

#20 in #freebsd

Download history 4/week @ 2024-07-19 5/week @ 2024-07-26 6/week @ 2024-08-02 8/week @ 2024-08-09 9/week @ 2024-08-16 12/week @ 2024-08-23 12/week @ 2024-08-30 11/week @ 2024-09-06 9/week @ 2024-09-13 15/week @ 2024-09-20 8/week @ 2024-09-27 10/week @ 2024-10-04 201/week @ 2024-10-11 50/week @ 2024-10-18 19/week @ 2024-10-25 26/week @ 2024-11-01

298 downloads per month
Used in 4 crates (2 directly)

MPL-2.0 license

9KB
110 lines

capsicum

Current Version

Contain the awesome!

Rust bindings for the FreeBSD capsicum framework for OS capability and sandboxing

Prerequisites

Rust, Cargo, and FreeBSD.

Note: This currently only compiles on FreeBSD

Getting Started

Get the code

git clone https://github.com/danlrobertson/capsicum-rs
cd capsicum-rs
cargo build

Writing code using capsicum-rs

Entering capability mode

    use capsicum::{enter, sandboxed};
    use std::fs::File;
    use std::io::Read;

    let mut ok_file = File::open("/tmp/foo").unwrap();
    let mut s = String::new();

    enter().expect("enter failed!");
    assert!(sandboxed(), "application is not sandboxed!");

    match File::create("/tmp/cant_touch_this") {
        Ok(_) => panic!("application is not properly sandboxed!"),
        Err(e) => println!("properly sandboxed: {:?}", e)
    }

    match ok_file.read_to_string(&mut s) {
        Ok(_) => println!("This is okay since we opened the descriptor before sandboxing"),
        Err(_) => panic!("application is not properly sandboxed!")
    }

Limit capability rights to files

    use capsicum::{CapRights, Right, RightsBuilder};
    use std::fs::File;
    use std::io::Read;

    let x = rand::random::<bool>();
    
    let mut ok_file = File::open("/tmp/foo").unwrap();
    let mut s = String::new();
    
    let mut builder = RightsBuilder::new(Right::Seek);
    
    if x {
        builder.add(Right::Read);
    }

    let rights = builder.finalize().unwrap();

    rights.limit(&ok_file).unwrap();
    
    match ok_file.read_to_string(&mut s) {
        Ok(_) if x => println!("Allowed reading: x = {} ", x),
        Err(_) if !x => println!("Did not allow reading: x = {}", x),
        _ => panic!("Not properly sandboxed"),
    }

Dependencies

~0–1.9MB
~37K SLoC