| // Copyright 2014 The Bazel Authors. All rights reserved. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| package com.google.devtools.build.lib.sandbox; |
| |
| import com.google.common.annotations.VisibleForTesting; |
| import com.google.common.base.Predicates; |
| import com.google.common.collect.ImmutableList; |
| import com.google.common.collect.ImmutableMap; |
| import com.google.common.collect.ImmutableSet; |
| import com.google.common.io.Files; |
| import com.google.devtools.build.lib.actions.ActionExecutionContext; |
| import com.google.devtools.build.lib.actions.ActionInput; |
| import com.google.devtools.build.lib.actions.ActionInputHelper; |
| import com.google.devtools.build.lib.actions.ActionStatusMessage; |
| import com.google.devtools.build.lib.actions.Artifact; |
| import com.google.devtools.build.lib.actions.EnvironmentalExecException; |
| import com.google.devtools.build.lib.actions.ExecException; |
| import com.google.devtools.build.lib.actions.ExecutionStrategy; |
| import com.google.devtools.build.lib.actions.Executor; |
| import com.google.devtools.build.lib.actions.Spawn; |
| import com.google.devtools.build.lib.actions.SpawnActionContext; |
| import com.google.devtools.build.lib.actions.UserExecException; |
| import com.google.devtools.build.lib.analysis.AnalysisUtils; |
| import com.google.devtools.build.lib.analysis.BlazeDirectories; |
| import com.google.devtools.build.lib.analysis.config.RunUnder; |
| import com.google.devtools.build.lib.cmdline.Label; |
| import com.google.devtools.build.lib.rules.cpp.CppCompileAction; |
| import com.google.devtools.build.lib.rules.fileset.FilesetActionContext; |
| import com.google.devtools.build.lib.rules.test.TestRunnerAction; |
| import com.google.devtools.build.lib.standalone.StandaloneSpawnStrategy; |
| import com.google.devtools.build.lib.unix.NativePosixFiles; |
| import com.google.devtools.build.lib.util.Preconditions; |
| import com.google.devtools.build.lib.util.io.FileOutErr; |
| import com.google.devtools.build.lib.vfs.FileStatus; |
| import com.google.devtools.build.lib.vfs.FileSystem; |
| import com.google.devtools.build.lib.vfs.FileSystemUtils; |
| import com.google.devtools.build.lib.vfs.Path; |
| import com.google.devtools.build.lib.vfs.PathFragment; |
| import com.google.devtools.build.lib.vfs.SearchPath; |
| import com.google.devtools.build.lib.vfs.Symlinks; |
| |
| import java.io.File; |
| import java.io.IOException; |
| import java.nio.charset.StandardCharsets; |
| import java.util.List; |
| import java.util.Map; |
| import java.util.Map.Entry; |
| import java.util.UUID; |
| import java.util.concurrent.ExecutorService; |
| import java.util.concurrent.atomic.AtomicInteger; |
| |
| /** |
| * Strategy that uses sandboxing to execute a process. |
| */ |
| @ExecutionStrategy( |
| name = {"sandboxed"}, |
| contextType = SpawnActionContext.class |
| ) |
| public class LinuxSandboxedStrategy implements SpawnActionContext { |
| private final ExecutorService backgroundWorkers; |
| |
| private final SandboxOptions sandboxOptions; |
| private final ImmutableMap<String, String> clientEnv; |
| private final BlazeDirectories blazeDirs; |
| private final Path execRoot; |
| private final boolean verboseFailures; |
| private final boolean unblockNetwork; |
| private final UUID uuid = UUID.randomUUID(); |
| private final AtomicInteger execCounter = new AtomicInteger(); |
| private final String productName; |
| |
| public LinuxSandboxedStrategy( |
| SandboxOptions options, |
| Map<String, String> clientEnv, |
| BlazeDirectories blazeDirs, |
| ExecutorService backgroundWorkers, |
| boolean verboseFailures, |
| boolean unblockNetwork, |
| String productName) { |
| this.sandboxOptions = options; |
| this.clientEnv = ImmutableMap.copyOf(clientEnv); |
| this.blazeDirs = blazeDirs; |
| this.execRoot = blazeDirs.getExecRoot(); |
| this.backgroundWorkers = Preconditions.checkNotNull(backgroundWorkers); |
| this.verboseFailures = verboseFailures; |
| this.unblockNetwork = unblockNetwork; |
| this.productName = productName; |
| } |
| |
| /** |
| * Executes the given {@code spawn}. |
| */ |
| @Override |
| public void exec(Spawn spawn, ActionExecutionContext actionExecutionContext) |
| throws ExecException { |
| Executor executor = actionExecutionContext.getExecutor(); |
| |
| // Certain actions can't run remotely or in a sandbox - pass them on to the standalone strategy. |
| if (!spawn.isRemotable()) { |
| StandaloneSpawnStrategy standaloneStrategy = |
| Preconditions.checkNotNull(executor.getContext(StandaloneSpawnStrategy.class)); |
| standaloneStrategy.exec(spawn, actionExecutionContext); |
| return; |
| } |
| |
| if (executor.reportsSubcommands()) { |
| executor.reportSubcommand( |
| Label.print(spawn.getOwner().getLabel()) + " [" + spawn.getResourceOwner().prettyPrint() |
| + "]", spawn.asShellCommand(executor.getExecRoot())); |
| } |
| |
| executor |
| .getEventBus() |
| .post(ActionStatusMessage.runningStrategy(spawn.getResourceOwner(), "sandbox")); |
| |
| FileOutErr outErr = actionExecutionContext.getFileOutErr(); |
| |
| // The execId is a unique ID just for this invocation of "exec". |
| String execId = uuid + "-" + execCounter.getAndIncrement(); |
| |
| // Each invocation of "exec" gets its own sandbox. |
| Path sandboxPath = |
| execRoot.getRelative(productName + "-sandbox").getRelative(execId); |
| |
| // Gather all necessary mounts for the sandbox. |
| ImmutableMap<Path, Path> mounts; |
| try { |
| mounts = getMounts(spawn, actionExecutionContext); |
| } catch (IllegalArgumentException | IOException e) { |
| throw new EnvironmentalExecException("Could not prepare mounts for sandbox execution", e); |
| } |
| |
| ImmutableSet<Path> createDirs = createImportantDirs(spawn.getEnvironment()); |
| |
| int timeout = getTimeout(spawn); |
| |
| ImmutableSet.Builder<PathFragment> outputFiles = ImmutableSet.builder(); |
| for (PathFragment optionalOutput : spawn.getOptionalOutputFiles()) { |
| Preconditions.checkArgument(!optionalOutput.isAbsolute()); |
| outputFiles.add(optionalOutput); |
| } |
| for (ActionInput output : spawn.getOutputFiles()) { |
| outputFiles.add(new PathFragment(output.getExecPathString())); |
| } |
| |
| try { |
| final NamespaceSandboxRunner runner = |
| new NamespaceSandboxRunner( |
| execRoot, |
| sandboxPath, |
| mounts, |
| createDirs, |
| verboseFailures, |
| sandboxOptions.sandboxDebug); |
| try { |
| runner.run( |
| spawn.getArguments(), |
| spawn.getEnvironment(), |
| execRoot.getPathFile(), |
| outErr, |
| outputFiles.build(), |
| timeout, |
| !this.unblockNetwork && !spawn.getExecutionInfo().containsKey("requires-network")); |
| } finally { |
| // Due to the Linux kernel behavior, if we try to remove the sandbox too quickly after the |
| // process has exited, we get "Device busy" errors because some of the mounts have not yet |
| // been undone. A second later it usually works. We will just clean the old sandboxes up |
| // using a background worker. |
| backgroundWorkers.execute( |
| new Runnable() { |
| @Override |
| public void run() { |
| try { |
| while (!Thread.currentThread().isInterrupted()) { |
| try { |
| runner.cleanup(); |
| return; |
| } catch (IOException e2) { |
| // Sleep & retry. |
| Thread.sleep(250); |
| } |
| } |
| } catch (InterruptedException e) { |
| // Exit. |
| } |
| } |
| }); |
| } |
| } catch (IOException e) { |
| throw new UserExecException("I/O error during sandboxed execution", e); |
| } |
| } |
| |
| private int getTimeout(Spawn spawn) throws ExecException { |
| String timeoutStr = spawn.getExecutionInfo().get("timeout"); |
| if (timeoutStr != null) { |
| try { |
| return Integer.parseInt(timeoutStr); |
| } catch (NumberFormatException e) { |
| throw new UserExecException("Could not parse timeout", e); |
| } |
| } |
| return -1; |
| } |
| |
| /** |
| * Most programs expect certain directories to be present, e.g. /tmp. Make sure they are. |
| * |
| * <p>Note that $HOME is handled by namespace-sandbox.c, because it changes user to nobody and the |
| * home directory of that user is not known by us. |
| */ |
| private ImmutableSet<Path> createImportantDirs(Map<String, String> env) { |
| ImmutableSet.Builder<Path> dirs = ImmutableSet.builder(); |
| FileSystem fs = blazeDirs.getFileSystem(); |
| if (env.containsKey("TEST_TMPDIR")) { |
| PathFragment testTmpDir = new PathFragment(env.get("TEST_TMPDIR")); |
| if (testTmpDir.isAbsolute()) { |
| dirs.add(fs.getPath(testTmpDir)); |
| } else { |
| dirs.add(execRoot.getRelative(testTmpDir)); |
| } |
| } |
| dirs.add(fs.getPath("/tmp")); |
| return dirs.build(); |
| } |
| |
| private ImmutableMap<Path, Path> getMounts(Spawn spawn, ActionExecutionContext executionContext) |
| throws IOException, ExecException { |
| ImmutableMap.Builder<Path, Path> result = new ImmutableMap.Builder<>(); |
| result.putAll(mountUsualUnixDirs()); |
| result.putAll(mountUserDefinedPath()); |
| |
| MountMap mounts = new MountMap(); |
| mounts.putAll(setupBlazeUtils()); |
| mounts.putAll(mountRunfilesFromManifests(spawn)); |
| mounts.putAll(mountRunfilesFromSuppliers(spawn)); |
| mounts.putAll(mountFilesFromFilesetManifests(spawn, executionContext)); |
| mounts.putAll(mountInputs(spawn, executionContext)); |
| mounts.putAll(mountRunUnderCommand(spawn)); |
| result.putAll(finalizeMounts(mounts)); |
| return result.build(); |
| } |
| |
| /** |
| * Helper method of {@link #finalizeMounts}. This method handles adding a single path |
| * to the output map, including making sure it exists and adding the target of a |
| * symbolic link if necessary. |
| * |
| * @param finalizedMounts the map to add the mapping(s) to |
| * @param target the key to add to the map |
| * @param source the value to add to the map |
| * @param stat information about source (passed in to avoid fetching it twice) |
| */ |
| private static void finalizeMountPath( |
| MountMap finalizedMounts, Path target, Path source, FileStatus stat) throws IOException { |
| // The source must exist. |
| Preconditions.checkArgument(stat != null, "%s does not exist", source.toString()); |
| finalizedMounts.put(target, source); |
| |
| if (stat.isSymbolicLink()) { |
| Path symlinkTarget = source.resolveSymbolicLinks(); |
| Preconditions.checkArgument( |
| symlinkTarget.exists(), "%s does not exist", symlinkTarget.toString()); |
| finalizedMounts.put(symlinkTarget, symlinkTarget); |
| } |
| } |
| |
| /** |
| * Performs various checks on each mounted file which require stating each one. |
| * Contained in one function to allow minimizing the number of syscalls involved. |
| * |
| * Checks for each mount if the source refers to a symbolic link and if yes, adds another mount |
| * for the target of that symlink to ensure that it keeps working inside the sandbox. |
| * |
| * Checks for each mount if the source refers to a directory and if yes, replaces that mount with |
| * mounts of all files inside that directory. |
| * |
| * Validates all mounts against a set of criteria and throws an exception on error. |
| * |
| * @return a new mounts multimap with all mounts and the added mounts. |
| */ |
| @VisibleForTesting |
| static MountMap finalizeMounts(Map<Path, Path> mounts) throws IOException { |
| MountMap finalizedMounts = new MountMap(); |
| for (Entry<Path, Path> mount : mounts.entrySet()) { |
| Path target = mount.getKey(); |
| Path source = mount.getValue(); |
| |
| FileStatus stat = source.statNullable(Symlinks.NOFOLLOW); |
| |
| if (stat != null && stat.isDirectory()) { |
| for (Path subSource : FileSystemUtils.traverseTree(source, Predicates.alwaysTrue())) { |
| Path subTarget = target.getRelative(subSource.relativeTo(source)); |
| finalizeMountPath( |
| finalizedMounts, subTarget, subSource, subSource.statNullable(Symlinks.NOFOLLOW)); |
| } |
| } else { |
| finalizeMountPath(finalizedMounts, target, source, stat); |
| } |
| } |
| return finalizedMounts; |
| } |
| |
| /** |
| * Mount a certain set of unix directories to make the usual tools and libraries available to the |
| * spawn that runs. |
| * |
| * Throws an exception if any of them do not exist. |
| */ |
| private MountMap mountUsualUnixDirs() throws IOException { |
| MountMap mounts = new MountMap(); |
| FileSystem fs = blazeDirs.getFileSystem(); |
| mounts.put(fs.getPath("/bin"), fs.getPath("/bin")); |
| mounts.put(fs.getPath("/sbin"), fs.getPath("/sbin")); |
| mounts.put(fs.getPath("/etc"), fs.getPath("/etc")); |
| |
| // Check if /etc/resolv.conf is a symlink and mount its target |
| // Fix #738 |
| Path resolv = fs.getPath("/etc/resolv.conf"); |
| if (resolv.exists() && resolv.isSymbolicLink()) { |
| mounts.put(resolv.resolveSymbolicLinks(), resolv.resolveSymbolicLinks()); |
| } |
| |
| for (String entry : NativePosixFiles.readdir("/")) { |
| if (entry.startsWith("lib")) { |
| Path libDir = fs.getRootDirectory().getRelative(entry); |
| mounts.put(libDir, libDir); |
| } |
| } |
| for (String entry : NativePosixFiles.readdir("/usr")) { |
| if (!entry.equals("local")) { |
| Path usrDir = fs.getPath("/usr").getRelative(entry); |
| mounts.put(usrDir, usrDir); |
| } |
| } |
| for (Path path : mounts.values()) { |
| Preconditions.checkArgument(path.exists(), "%s does not exist", path.toString()); |
| } |
| return mounts; |
| } |
| |
| /** |
| * Mount the embedded tools. |
| */ |
| private MountMap setupBlazeUtils() { |
| MountMap mounts = new MountMap(); |
| Path mount = blazeDirs.getEmbeddedBinariesRoot().getRelative("build-runfiles"); |
| mounts.put(mount, mount); |
| return mounts; |
| } |
| |
| /** |
| * Mount all runfiles that the spawn needs as specified in its runfiles manifests. |
| */ |
| private MountMap mountRunfilesFromManifests(Spawn spawn) throws IOException, ExecException { |
| MountMap mounts = new MountMap(); |
| for (Entry<PathFragment, Artifact> manifest : spawn.getRunfilesManifests().entrySet()) { |
| String manifestFilePath = manifest.getValue().getPath().getPathString(); |
| Preconditions.checkState(!manifest.getKey().isAbsolute()); |
| Path targetDirectory = execRoot.getRelative(manifest.getKey()); |
| |
| mounts.putAll(parseManifestFile(targetDirectory, new File(manifestFilePath), false, "")); |
| } |
| return mounts; |
| } |
| |
| /** |
| * Mount all files that the spawn needs as specified in its fileset manifests. |
| */ |
| private MountMap mountFilesFromFilesetManifests( |
| Spawn spawn, ActionExecutionContext executionContext) throws IOException, ExecException { |
| final FilesetActionContext filesetContext = |
| executionContext.getExecutor().getContext(FilesetActionContext.class); |
| MountMap mounts = new MountMap(); |
| for (Artifact fileset : spawn.getFilesetManifests()) { |
| Path manifest = |
| execRoot.getRelative(AnalysisUtils.getManifestPathFromFilesetPath(fileset.getExecPath())); |
| Path targetDirectory = execRoot.getRelative(fileset.getExecPathString()); |
| |
| mounts.putAll( |
| parseManifestFile( |
| targetDirectory, manifest.getPathFile(), true, filesetContext.getWorkspaceName())); |
| } |
| return mounts; |
| } |
| |
| static MountMap parseManifestFile( |
| Path targetDirectory, File manifestFile, boolean isFilesetManifest, String workspaceName) |
| throws IOException, ExecException { |
| MountMap mounts = new MountMap(); |
| int lineNum = 0; |
| for (String line : Files.readLines(manifestFile, StandardCharsets.UTF_8)) { |
| if (isFilesetManifest && (++lineNum % 2 == 0)) { |
| continue; |
| } |
| if (line.isEmpty()) { |
| continue; |
| } |
| |
| String[] fields = line.trim().split(" "); |
| |
| Path targetPath; |
| if (isFilesetManifest) { |
| PathFragment targetPathFragment = new PathFragment(fields[0]); |
| if (!workspaceName.isEmpty()) { |
| if (!targetPathFragment.getSegment(0).equals(workspaceName)) { |
| throw new EnvironmentalExecException( |
| "Fileset manifest line must start with workspace name"); |
| } |
| targetPathFragment = targetPathFragment.subFragment(1, targetPathFragment.segmentCount()); |
| } |
| targetPath = targetDirectory.getRelative(targetPathFragment); |
| } else { |
| targetPath = targetDirectory.getRelative(fields[0]); |
| } |
| |
| Path source; |
| switch (fields.length) { |
| case 1: |
| source = targetDirectory.getFileSystem().getPath("/dev/null"); |
| break; |
| case 2: |
| source = targetDirectory.getFileSystem().getPath(fields[1]); |
| break; |
| default: |
| throw new IllegalStateException("'" + line + "' splits into more than 2 parts"); |
| } |
| |
| mounts.put(targetPath, source); |
| } |
| return mounts; |
| } |
| |
| /** |
| * Mount all runfiles that the spawn needs as specified via its runfiles suppliers. |
| */ |
| private MountMap mountRunfilesFromSuppliers(Spawn spawn) throws IOException { |
| MountMap mounts = new MountMap(); |
| FileSystem fs = blazeDirs.getFileSystem(); |
| Map<PathFragment, Map<PathFragment, Artifact>> rootsAndMappings = |
| spawn.getRunfilesSupplier().getMappings(); |
| for (Entry<PathFragment, Map<PathFragment, Artifact>> rootAndMappings : |
| rootsAndMappings.entrySet()) { |
| Path root = fs.getRootDirectory().getRelative(rootAndMappings.getKey()); |
| for (Entry<PathFragment, Artifact> mapping : rootAndMappings.getValue().entrySet()) { |
| Artifact sourceArtifact = mapping.getValue(); |
| Path source = (sourceArtifact != null) ? sourceArtifact.getPath() : fs.getPath("/dev/null"); |
| |
| Preconditions.checkArgument(!mapping.getKey().isAbsolute()); |
| Path target = root.getRelative(mapping.getKey()); |
| mounts.put(target, source); |
| } |
| } |
| return mounts; |
| } |
| |
| /** |
| * Mount all inputs of the spawn. |
| */ |
| private MountMap mountInputs(Spawn spawn, ActionExecutionContext actionExecutionContext) { |
| MountMap mounts = new MountMap(); |
| |
| List<ActionInput> inputs = |
| ActionInputHelper.expandArtifacts( |
| spawn.getInputFiles(), actionExecutionContext.getArtifactExpander()); |
| |
| if (spawn.getResourceOwner() instanceof CppCompileAction) { |
| CppCompileAction action = (CppCompileAction) spawn.getResourceOwner(); |
| if (action.shouldScanIncludes()) { |
| inputs.addAll(action.getAdditionalInputs()); |
| } |
| } |
| |
| for (ActionInput input : inputs) { |
| if (input.getExecPathString().contains("internal/_middlemen/")) { |
| continue; |
| } |
| Path mount = execRoot.getRelative(input.getExecPathString()); |
| mounts.put(mount, mount); |
| } |
| return mounts; |
| } |
| |
| /** |
| * If a --run_under= option is set and refers to a command via its path (as opposed to via its |
| * label), we have to mount this. Note that this is best effort and works fine for shell scripts |
| * and small binaries, but we can't track any further dependencies of this command. |
| * |
| * <p>If --run_under= refers to a label, it is automatically provided in the spawn's input files, |
| * so mountInputs() will catch that case. |
| */ |
| private MountMap mountRunUnderCommand(Spawn spawn) { |
| MountMap mounts = new MountMap(); |
| |
| if (spawn.getResourceOwner() instanceof TestRunnerAction) { |
| TestRunnerAction testRunnerAction = ((TestRunnerAction) spawn.getResourceOwner()); |
| RunUnder runUnder = testRunnerAction.getExecutionSettings().getRunUnder(); |
| if (runUnder != null && runUnder.getCommand() != null) { |
| PathFragment sourceFragment = new PathFragment(runUnder.getCommand()); |
| Path mount; |
| if (sourceFragment.isAbsolute()) { |
| mount = blazeDirs.getFileSystem().getPath(sourceFragment); |
| } else if (blazeDirs.getExecRoot().getRelative(sourceFragment).exists()) { |
| mount = blazeDirs.getExecRoot().getRelative(sourceFragment); |
| } else { |
| List<Path> searchPath = |
| SearchPath.parse(blazeDirs.getFileSystem(), clientEnv.get("PATH")); |
| mount = SearchPath.which(searchPath, runUnder.getCommand()); |
| } |
| if (mount != null) { |
| mounts.put(mount, mount); |
| } |
| } |
| } |
| return mounts; |
| } |
| |
| /** |
| * Mount all user defined path in --sandbox_add_path. |
| */ |
| private MountMap mountUserDefinedPath() throws IOException { |
| MountMap mounts = new MountMap(); |
| FileSystem fs = blazeDirs.getFileSystem(); |
| |
| ImmutableList<Path> exclude = |
| ImmutableList.of(blazeDirs.getWorkspace(), blazeDirs.getOutputBase()); |
| |
| for (String pathStr : sandboxOptions.sandboxAddPath) { |
| Path path = fs.getPath(pathStr); |
| |
| // Check if path is in {workspace, outputBase} |
| for (Path exc : exclude) { |
| if (path.startsWith(exc)) { |
| throw new IllegalArgumentException( |
| "Mounting subdirectory of WORKSPACE or OUTPUTBASE to sandbox is not allowed."); |
| } |
| } |
| |
| // Check if path is ancestor of {workspace, outputBase} |
| // Mount subdirectory of path except {workspace, outputBase} |
| mounts.putAll(mountChildDirExclude(path, exclude)); |
| } |
| |
| return mounts; |
| } |
| |
| /** |
| * Mount all subdirectories recursively except some paths |
| */ |
| private MountMap mountDirExclude(Path path, List<Path> exclude) throws IOException { |
| MountMap mounts = new MountMap(); |
| |
| if (!path.isDirectory(Symlinks.NOFOLLOW)) { |
| if (!exclude.contains(path)) { |
| mounts.put(path, path); |
| } |
| return mounts; |
| } |
| |
| try { |
| for (Path child : path.getDirectoryEntries()) { |
| // Ignore broken symlink |
| if (!child.exists()) { |
| continue; |
| } |
| |
| mounts.putAll(mountChildDirExclude(child, exclude)); |
| } |
| } catch (IOException e) { |
| throw new IOException("Illegal additional path for mount", e); |
| } |
| |
| return mounts; |
| } |
| |
| /** |
| * Helper function of mountDirExclude and mountUserDefinedPath |
| */ |
| private MountMap mountChildDirExclude(Path child, List<Path> exclude) throws IOException { |
| MountMap mounts = new MountMap(); |
| |
| boolean startsWithFlag = false; |
| for (Path exc : exclude) { |
| if (exc.startsWith(child)) { |
| startsWithFlag = true; |
| break; |
| } |
| } |
| if (!startsWithFlag) { |
| mounts.put(child, child); |
| } else if (!exclude.contains(child)) { |
| mounts.putAll(mountDirExclude(child, exclude)); |
| } |
| |
| return mounts; |
| } |
| |
| @Override |
| public boolean willExecuteRemotely(boolean remotable) { |
| return false; |
| } |
| |
| @Override |
| public String toString() { |
| return "sandboxed"; |
| } |
| |
| @Override |
| public boolean shouldPropagateExecException() { |
| return verboseFailures && sandboxOptions.sandboxDebug; |
| } |
| } |