nsjail/config.proto

175 lines
7.2 KiB
Protocol Buffer
Raw Normal View History

2017-05-26 11:01:22 +08:00
syntax = "proto2";
2017-05-26 07:55:02 +08:00
package nsjail;
2017-05-26 10:37:50 +08:00
enum Mode {
2017-05-27 09:59:02 +08:00
LISTEN = 0; /* Listening on a TCP port */
ONCE = 1; /* Running the command once only */
RERUN = 2; /* Re-executing the command (forever) */
EXECVE = 3; /* Executing command w/o the supervisor */
2017-05-26 10:37:50 +08:00
}
2017-05-27 09:59:02 +08:00
/* Should be self explanatory */ enum LogLevel {
DEBUG = 0;
INFO = 1;
WARNING = 2;
ERROR = 3;
FATAL = 4;
2017-05-26 20:08:09 +08:00
}
2017-05-27 09:59:02 +08:00
message IdMap
{
/* Empty string means "current uid/gid" */
required string inside_id = 1 [ default = "" ];
required string outside_id = 2 [ default = "" ];
/* 'man user_namespaces' for the meaning of count */
required uint32 count = 3 [ default = 1 ];
/* Does this map use /usr/bin/new[u|g]idmap binary? */
required bool use_newidmap = 4 [ default = false ];
2017-05-26 23:50:28 +08:00
}
2017-05-27 09:59:02 +08:00
message MountPt
{
/* Can be skipped for filesystems like 'proc' */
optional string src = 1;
2017-05-27 09:59:02 +08:00
required string dst = 2;
/* Can be empty for mount --bind mounts */
optional string fstype = 3 [ default = "" ];
2017-05-27 09:59:02 +08:00
/* E.g. size=5000000 for 'tmpfs' */
required string options = 4 [ default = "" ];
/* Is it 'mount --bind src dst' type of mount */
required bool is_bind = 5 [ default = false ];
/* It it RO mount */
required bool is_ro = 6 [ default = false ];
/* Is it directory? If not specified an internal
2017-05-27 09:20:10 +08:00
* heuristics will be used to determine that */
2017-05-27 09:59:02 +08:00
optional bool is_dir = 7;
2017-05-27 21:17:11 +08:00
/* Should the sandboxing fail if we cannot mount this resource? */
required bool mandatory = 8 [default = true];
2017-05-27 07:16:12 +08:00
}
2017-05-27 09:59:02 +08:00
message Exe
{
/* This will be usef both for path and for argv[0] */
required string path = 1;
/* This will be argv[1] and so on.. */
repeated string arg = 2;
2017-05-27 08:24:41 +08:00
}
2017-05-27 09:59:02 +08:00
message NsJailConfig
{
/* Execution mode: see 'msg Mode' description for more */
required Mode mode = 1 [ default = ONCE ];
/* Equivalent to a bind mount with src='/', dst='/' */
2017-05-27 09:59:02 +08:00
optional string chroot_dir = 2;
/* Applies both to the chroot_dir and to /proc mounts */
required bool is_root_rw = 3 [ default = false ];
/* Hostname inside jail */
required string hostname = 6 [ default = "NSJAIL" ];
/* Initial current working directory for the binary */
required string cwd = 7 [ default = "/" ];
/* TCP port to listen to. Valid with mode=LISTEN only */
required uint32 port = 8 [ default = 0 ];
/* Host to bind to for mode=LISTEN. Must be in IPv6 format */
required string bindhost = 9 [ default = "::" ];
/* For mode=LISTEN, maximum number of connections from a single IP */
required uint32 max_conns_per_ip = 10 [ default = 0 ];
/* Wall-time time limit for commands */
required uint32 time_limit = 11 [ default = 600 ];
/* Should nsjail go into background? */
required bool daemon = 12 [ default = false ];
2017-05-27 10:06:28 +08:00
2017-05-27 09:59:02 +08:00
/* File to save lofs to */
optional string log_file = 13;
/* Minimum log level displayed.
2017-05-27 09:20:10 +08:00
See 'msg LogLevel' description for more */
2017-05-27 09:59:02 +08:00
optional LogLevel log_level = 14;
2017-05-27 10:06:28 +08:00
2017-05-27 09:59:02 +08:00
/* Should the current environment variables be kept
2017-05-27 09:23:08 +08:00
when executing the binary */
2017-05-27 09:59:02 +08:00
required bool keep_env = 15 [ default = false ];
2017-05-27 10:06:28 +08:00
/* EnvVars to be set before executing binaries */
repeated string envar = 16;
2017-05-27 09:59:02 +08:00
/* Should nsjail close FD=0,1,2 before executing the process */
2017-05-27 10:06:28 +08:00
required bool silent = 17 [ default = false ];
2017-05-27 09:59:02 +08:00
/* Should the child process have control over terminal?
Can be useful to allow /bin/sh to provide
job control / signals */
2017-05-27 10:06:28 +08:00
required bool skip_setsid = 18 [ default = false ];
2017-05-27 09:59:02 +08:00
/* Which FDs should be passed to the newly executed process
2017-05-27 09:23:08 +08:00
By default only FD=0,1,2 are passed */
2017-05-27 10:06:28 +08:00
repeated int32 pass_fd = 19;
2017-05-27 09:59:02 +08:00
/* Should pivot_root be used instead of chroot?
2017-05-27 09:23:08 +08:00
Using pivot_root allows to have subnamespaces */
2017-05-27 10:06:28 +08:00
required bool pivot_root_only = 20 [ default = false ];
2017-05-27 09:59:02 +08:00
/* Setting it to true will allow to have set-uid binaries
inside the jail */
2017-05-27 10:06:28 +08:00
required bool disable_no_new_privs = 21 [ default = false ];
2017-05-27 09:59:02 +08:00
2017-05-27 10:06:28 +08:00
required uint64 rlimit_as = 22 [ default = 512 ]; /* In MiB */
required uint64 rlimit_core = 23 [ default = 0 ]; /* In MiB */
required uint64 rlimit_cpu = 24 [ default = 600 ]; /* In seconds */
required uint64 rlimit_fsize = 25 [ default = 1 ]; /* In MiB */
required uint64 rlimit_nofile = 26 [ default = 32 ];
optional uint64 rlimit_nproc = 27;
optional uint64 rlimit_stack = 28; /* In MiB */
2017-05-27 09:59:02 +08:00
/* See 'man personality' for more */
2017-05-27 10:06:28 +08:00
required bool persona_addr_compat_layout = 29 [ default = false ];
required bool persona_mmap_page_zero = 30 [ default = false ];
required bool persona_read_implies_exec = 31 [ default = false ];
required bool persona_addr_limit_3gb = 32 [ default = false ];
required bool persona_addr_no_randomize = 33 [ default = false ];
2017-05-27 09:59:02 +08:00
/* Which name-spaces should be used? */
2017-05-27 10:06:28 +08:00
required bool clone_newnet = 34 [ default = true ];
required bool clone_newuser = 35 [ default = true ];
required bool clone_newns = 36 [ default = true ];
required bool clone_newpid = 37 [ default = true ];
required bool clone_newipc = 38 [ default = true ];
required bool clone_newuts = 39 [ default = true ];
2017-05-27 09:59:02 +08:00
/* It's only supported in newer kernels, hence disabled by default */
2017-05-27 10:06:28 +08:00
required bool clone_newcgroup = 40 [ default = false ];
2017-05-27 09:59:02 +08:00
/* Mappings for UIDs and GIDs. See the description for 'msg IdMap'
2017-05-27 09:29:40 +08:00
for more */
2017-05-27 10:06:28 +08:00
repeated IdMap uidmap = 41;
repeated IdMap gidmap = 42;
2017-05-27 07:16:12 +08:00
2017-05-27 21:17:11 +08:00
/* Should /proc be mounted? One can also force this in the 'mount' */
required bool mount_proc = 43 [ default = true ];
2017-05-27 09:59:02 +08:00
/* Mount points inside the jail. See the description for 'msg MountPt'
2017-05-27 09:29:40 +08:00
for more */
2017-05-27 21:17:11 +08:00
repeated MountPt mount = 44;
2017-05-27 08:09:21 +08:00
2017-05-27 09:59:02 +08:00
/* Kafel seccomp policy file or string.
2017-05-27 09:23:08 +08:00
Homepage of the project: https://github.com/google/kafel */
2017-05-27 10:06:28 +08:00
optional string seccomp_policy_file = 45;
optional string seccomp_string = 46;
2017-05-27 09:59:02 +08:00
/* If > 0, maximum cumulative size of RAM used inside jail */
2017-05-27 10:06:28 +08:00
required uint64 cgroup_mem_max = 47 [ default = 0 ]; /* In MiB */
2017-05-27 09:59:02 +08:00
/* Mount point for cgroups-memory */
2017-05-27 10:06:28 +08:00
required string cgroup_mem_mount = 48 [ default = "/sys/fs/cgroup/memory" ];
2017-05-27 09:59:02 +08:00
/* Writeable directory (for the nsjail user) under cgroup_mem_mount */
2017-05-27 10:06:28 +08:00
required string cgroup_mem_parent = 49 [ default = "NSJAIL" ];
2017-05-27 09:59:02 +08:00
/* If > 0, maximum number of PIDs (threads/processes) inside jail */
2017-05-27 10:06:28 +08:00
required uint64 cgroup_pids_max = 50 [ default = 0 ];
2017-05-27 09:59:02 +08:00
/* Mount point for cgroups-memory */
2017-05-27 10:06:28 +08:00
required string cgroup_pids_mount = 51 [ default = "/sys/fs/cgroup/pids" ];
2017-05-27 09:59:02 +08:00
/* Writeable directory (for the nsjail user) under cgroup_pids_mount */
2017-05-27 10:06:28 +08:00
required string cgroup_pids_parent = 52 [ default = "NSJAIL" ];
2017-05-27 09:59:02 +08:00
/* Should the 'lo' interface be brought up inside jail? */
2017-05-27 10:06:28 +08:00
required bool iface_no_lo = 53 [ default = false ];
2017-05-27 09:59:02 +08:00
/* Parameters for the cloned MACVLAN interface inside jail */
2017-05-27 10:06:28 +08:00
optional string macvlan_iface = 54; /* Interface to be cloned, eg 'eth0' */
required string macvlan_vs_ip = 55 [ default = "192.168.0.2" ];
required string macvlan_vs_nm = 56 [ default = "255.255.255.0" ];
required string macvlan_vs_gw = 57 [ default = "192.168.0.1" ];
2017-05-27 09:59:02 +08:00
/* Binary with arguments to be executed. If not specified here, it can be
2017-05-27 09:29:06 +08:00
specified with the command-line as "-- /path/to/command arg1 arg2" */
2017-05-27 10:06:28 +08:00
optional Exe exec_bin = 58;
2017-05-26 07:55:02 +08:00
}