Gildas Chabot be8a531fde Add Malifious filter лет назад: 8
base64Encode be8a531fde Add Malifious filter лет назад: 8
pluginSrc be8a531fde Add Malifious filter лет назад: 8
README.md be8a531fde Add Malifious filter лет назад: 8
buildAndRun.sh c741deca92 Websockets for auto-reloading of the image лет назад: 8
index.html c741deca92 Websockets for auto-reloading of the image лет назад: 8
lca.jpg 6677a9a322 Move to image transform plugins + web server лет назад: 8
main.go c741deca92 Websockets for auto-reloading of the image лет назад: 8

README.md

Run

Run with:

./buildAndRun.sh

To activate the plugins, move the .so files from the plugins.available directory to the plugins directory.

Todo

  • Malicious plugin -> read a folder and write to image
    • Check source code?
  • Panic in plugin?
  • In presentation
    • Add background about the solutions before the plugins: see the presentation from the dotGo.

Presentation

  • Add Go code at runtime
  • Works only on linux for now
  • Based on dlfcn.h (dynamic linking) with cgo

  • Only two functions: Open(path string) (*Plugin, error) and (p *Plugin) Lookup(symName string) (Symbol, error)

  • Two types: Plugin, Symbol

  • Nothing special on the code of the plugin, only the -buildmode=plugin build option

Example (from the doc):

p, err := plugin.Open("plugin_name.so")
if err != nil {
	panic(err)
}
v, err := p.Lookup("V")
if err != nil {
	panic(err)
}
f, err := p.Lookup("F")
if err != nil {
	panic(err)
}
*v.(*int) = 7
f.(func())() // prints "Hello, number 7"