Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:124808 X-Original-To: internals@lists.php.net Delivered-To: internals@lists.php.net Received: from php-smtp4.php.net (php-smtp4.php.net [45.112.84.5]) by qa.php.net (Postfix) with ESMTPS id B01AB1A00B7 for ; Tue, 6 Aug 2024 17:28:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=php.net; s=mail; t=1722965393; bh=G6z6Mnuq1znkNalvmi2pJhoF/y/KhvA7jSraPqNUWTE=; h=Subject:From:To:Date:In-Reply-To:References:From; b=IJm9zqrmcAmdXqKPhZQfxwiw2lIjx4UFf41Jj/FjnppPsyGpNUmO0fuxBEISaIl8V sSdUgQAcsrJIQOOMn1hqkzLO2a7EIY9Zk/ksqeg0BcBCQ1VoN8oTgXJiwOSs6CHH29 DbRaSc2FGjQ34aFzNB6SR+Y0qGFczocI7TpnK2r6Afy9Ow8f+CD3sqJMFB3N7LCqtj d+zTZ5B8X0IMeKMFjnULkq7TyrsSDfDZVo1t5ab8+FhDluInWFXP37+SXeXLhDDXXW ABsc9hYrZ9tSVK1nXemHyhpo0aBuuZ82+dFrRj8KMNFGw1/To2meOgH/chXWz5YBJ0 bedRgJHX4u5nw== Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 70E7F18005C for ; Tue, 6 Aug 2024 17:29:52 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=0.6 required=5.0 tests=BAYES_50,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,DMARC_PASS,SPF_HELO_PASS, SPF_PASS autolearn=no autolearn_force=no version=4.0.0 X-Spam-Virus: No X-Envelope-From: Received: from ageofdream.com (ageofdream.com [45.33.21.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Tue, 6 Aug 2024 17:29:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ageofdream.com; s=ageofdream; t=1722965289; bh=G6z6Mnuq1znkNalvmi2pJhoF/y/KhvA7jSraPqNUWTE=; h=Subject:From:To:Date:In-Reply-To:References:From; b=WetwipaESeC5Z84Pm4PxJN9DyNw+yJwLZpz3S0PaXbTvCCRRdSeUnRqHe4eXTTCw2 x5OZIF61IjSuO56TjzqLa6P6uaLfJzMKc+Sx2wknszdyACNm/gC9OeRXMsjMSyreBF gpAgCKTdxxFJCrk0Cqq5BninLgRxmRTLZ5/YZbEt3LT3P/akF+5oumzz9gQPd3gAlH Z7hyOXxr5HMKRT+t+uk4w1p45/gxJQL62XNKGa/fxW0dum5tF1Kj/VynxyfjmEitfR QQw6w7+f/0zrb5ZW8iEOQ5EWrn1fEiRFyS0GG4u1jR1qWlzu5wyaTVKiRk4Hc61TFy z/kXMGEx0I2ew== Received: from [192.168.1.7] (unknown [72.255.193.122]) by ageofdream.com (Postfix) with ESMTPSA id 2AC4425086 for ; Tue, 6 Aug 2024 13:28:09 -0400 (EDT) Message-ID: <70ea158f8c37b9d3acfb7a6ab0f2e76adfb63cdd.camel@ageofdream.com> Subject: Re: [PHP-DEV] [Discussion] Sandbox API To: internals@lists.php.net Date: Tue, 06 Aug 2024 13:28:08 -0400 In-Reply-To: <32236410-e4ad-4c63-b7e7-cdbd3832bbc1@app.fastmail.com> References: <32236410-e4ad-4c63-b7e7-cdbd3832bbc1@app.fastmail.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.46.4-2 Precedence: bulk list-help: list-post: List-Id: internals.lists.php.net x-ms-reactions: disallow MIME-Version: 1.0 From: lists@ageofdream.com (Nick Lockheart) >=20 > This looks quite valuable, and I assume auto loading would work just > like normal? Register an autoloader that will eventually require the > file and call this function? >=20 > It would be nice to provide a simplified api as well, maybe > =E2=80=9CCopyCurrentEnvironment()=E2=80=9D or something? =C2=A0In most ca= ses, it is > easier/faster to find things to remove vs. adding everything on every > plugin/request every time.=C2=A0 >=20 > In saying that, it would be great if there was an api for =E2=80=9Csharin= g=E2=80=9D a > base-sandbox pool via shm (or similar to a pool) so that the base vm > doesn=E2=80=99t need to be recreated potentially hundreds of times per > request.=C2=A0 >=20 I didn't want to be too overwhelming on the first post, but since it seems the feedback is positive, here's a more complete list of what I think should be included: // Passthroughs: // Make all user and built-in global functions // available inside the sandbox: SPLSandBox::PassGlobalFunctions(); // Make all built-in (but not user) functions // available inside the sandbox: SPLSandBox::PassBuiltInFunctions(); // Make all built-in (but not user) functions // available inside the sandbox, EXCEPT blacklisted functions: SPLSandBox::PassBuiltInFunctionsExcept(['eval','exit']); (assuming exit becomes a function). // Allow only specific functions to be called (whitelist method): $aWhiteList =3D ['array_key_exists','in_array']; SPLSandBox::PassFunctions($aWhiteList); // Allow specific classes to be used by sandbox code: $aClassList =3D ['\MyAPP\PluginAPI']; SPLSandBox::PassClasses($aClassList); // Allow specific constants to be seen by sandbox code: SPLSandBox::PassConstants(['\DB_USERNAME','\DB_PASSWORD']); // Language Construct Callbacks: The callbacks allow the outer code to control and monitor certain language features of the sandboxed code during execution. // Called when the sandbox code tries to include or require something: SPLSandBox::RegisterIncludeHandler(); // Includes a file into the sandbox: SPLSandBox::Include('path/to/file.php'); // Your sandbox autoloader logic could be incorporated here: SPLSandBox::RegisterAutoLoadHandler(); // But, for unit testing with mocks and stubs, // it might be better to use: SPLSandBox::RegisterNewHandler(); The NewHandler callback is called every time sandboxed code tries to instantiate an object with `new`. // Example: Override what `new` returns to code running in the sandbox: function MyNewHandler(string $ClassName, array $aConstructorArgs){ if($ClassName =3D=3D=3D '\DateTime'){ return new FakeDate(); } return new $ClassName($aConstructorArgs); } // Every time a sandboxed class calls a method, call this first: SPLSandBox::RegisterMethodCallHandler(); Useful for unit testing to monitor if the tested class is calling the methods it should be calling. Ignores visibility rules. Could also allow for infinite recursion detection from the outside. // The companion for static method calls, gets called // every time a method is called on a class statically: SPLSandBox::RegisterStaticMethodCallHandler(); // Each time a sandboxed loop iterates, call this first: // Allows the outer code to put limit breaks on the sandboxed code. SPLSandBox::RegisterLoopHandler(); The callback takes the type of loop, and the variables that make up the loop ($i for for(), $Key =3D> $value for foreach(), etc) // If the sandboxed code calls echo, print, or // causes any output to occur (ie outside of tag. // If the sandbox code tries to use `exit` or `die`, // call this function instead: SPLSandBox::RegisterExitHandler(); You'll probably want to destroy the sandbox from the outside (see below), rather than letting sandboxed code halt the test framework or main application. // If sandboxed code throws, it should *not* // be a throw in the outer application space. // Every exception throw triggers this callback, // even if there is a catch block: SPLSandBox::RegisterExceptionHandler(); // When a catch block runs, invoke this callback first: SPLSandBox::RegisterCatchHandler(); Allows unit tests to make sure that exceptions are handled correctly. // For non-Exceptions (warning, notice, deprecated, fatal, // and yes, maybe even parse because we're in a sandbox): SPLSandBox::RegisterErrorHandler(); // Inside your Handlers, you may want to know the file and line // that triggered the callback.=20 SPLSandBox::GetCurrentLine(); SPLSandBox::GetFileName(); SPLSandBox::GetClassName(); SPLSandBox::GetFunctionName(); For example, if you want to catch any echo left behind from debugging, you might also want to find the line and file where the statement is located to remove it. The above methods would be usable inside any of the callbacks. // Inside your Handlers, abort execution: SPLSandBox::Stop(); // Resource Limits, hopefully self explanatory: SPLSandBox::SetMemoryLimit(); SPLSandBox::SetExecutionTimeLimit(); // Mocks, Stubs: // Put a function from the outer application // into the sandbox as the specified name: SPLSandBox::MockFunction('\mocks\fopen','\fopen'); // Put a class from the outer application // into the sandbox as the specified name: SPLSandBox::MockClass('\Mocks\FakeTime','\DateTime'); // Set global variables (and super globals) inside the sandbox: SPLSandBox::MockGlobal('$_GET',$aGetVars);=20 // Set global constants inside the sandbox: SPLSandBox::MockConstant('MY_CONSTANT',$Value);=20 // Invocation // You can run procedural code to setup your test environment. // Runs the array of code lines in the sandbox context: $aProceduralCode =3D [ "$a =3D 1;", "$b =3D 2;", "$c =3D DoSomething($a, $b);" ]; SPLSandBox::Procedure($aProceduralCode); // You can get a pointer to an object instantiated in the sandbox: $oClass =3D SPLSandBox::GetInstance('ClassName'); // And use it like you normally would: $oClass->DoSomething(); This class runs entirely in the sandbox. // You cleanup the resource with: SPLSandBox::Destroy();