1pub mod error;
2pub mod policy;
3pub mod profile;
4pub mod result;
5pub mod sandbox;
6pub(crate) mod arch;
7pub(crate) mod sys;
8pub mod landlock;
9pub mod seccomp;
10pub(crate) mod resource;
11pub(crate) mod network;
12pub mod context;
13pub(crate) mod vdso;
14pub(crate) mod random;
15pub(crate) mod time;
16pub(crate) mod cow;
17pub(crate) mod checkpoint;
18pub(crate) mod sibling_freeze;
19pub mod netlink;
20pub(crate) mod procfs;
21pub(crate) mod port_remap;
22pub mod pipeline;
23pub mod policy_fn;
24pub mod image;
25pub mod fork;
26pub(crate) mod chroot;
27pub mod dry_run;
28pub(crate) mod http_acl;
29
30pub use error::SandlockError;
31pub use checkpoint::Checkpoint;
32pub use policy::{Policy, PolicyBuilder};
33pub use result::{RunResult, ExitStatus};
34pub use sandbox::Sandbox;
35pub use pipeline::{Stage, Pipeline, Gather};
36pub use dry_run::{Change, ChangeKind, DryRunResult};
37
38pub fn landlock_abi_version() -> Result<u32, error::ConfinementError> {
40 landlock::abi_version()
41}
42
43pub const MIN_LANDLOCK_ABI: u32 = landlock::MIN_ABI;
45
46pub fn confine_current_process(policy: &Policy) -> Result<(), SandlockError> {
59 if unsafe { libc::prctl(libc::PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) } != 0 {
61 return Err(SandlockError::Sandbox(
62 error::SandboxError::Confinement(
63 error::ConfinementError::Landlock(format!(
64 "prctl(PR_SET_NO_NEW_PRIVS): {}",
65 std::io::Error::last_os_error()
66 ))
67 )
68 ));
69 }
70
71 let mut stripped = policy.clone();
75 stripped.net_bind.clear();
76 stripped.net_connect.clear();
77
78 landlock::confine(&stripped)
80}