add_seccomp.go 2.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120
  1. package nodejs
  2. import (
  3. "bytes"
  4. "encoding/binary"
  5. "fmt"
  6. "os"
  7. "strconv"
  8. "syscall"
  9. "unsafe"
  10. "github.com/langgenius/dify-sandbox/internal/static/nodejs_syscall"
  11. sg "github.com/seccomp/libseccomp-golang"
  12. )
  13. // var allow_syscalls = []int{}
  14. func InitSeccomp(uid int, gid int, enable_network bool) error {
  15. err := syscall.Chroot(".")
  16. if err != nil {
  17. return err
  18. }
  19. err = syscall.Chdir("/")
  20. if err != nil {
  21. return err
  22. }
  23. disabled_syscall, err := strconv.Atoi(os.Getenv("DISABLE_SYSCALL"))
  24. if err != nil {
  25. disabled_syscall = -1
  26. }
  27. ctx, err := sg.NewFilter(sg.ActKillProcess)
  28. if err != nil {
  29. return err
  30. }
  31. defer ctx.Release()
  32. // for i := 0; i < 400; i++ {
  33. // allow_syscalls = append(allow_syscalls, i)
  34. // }
  35. for _, syscall := range nodejs_syscall.ALLOW_SYSCALLS {
  36. if syscall == disabled_syscall {
  37. continue
  38. }
  39. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActAllow)
  40. if err != nil {
  41. return err
  42. }
  43. }
  44. for _, syscall := range nodejs_syscall.ERROR_CODE_SYSCALLS {
  45. if syscall == disabled_syscall {
  46. continue
  47. }
  48. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActErrno)
  49. if err != nil {
  50. return err
  51. }
  52. }
  53. if enable_network {
  54. for _, syscall := range nodejs_syscall.ALLOW_NETWORK_SYSCALLS {
  55. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActAllow)
  56. if err != nil {
  57. return err
  58. }
  59. }
  60. }
  61. reader, writer, err := os.Pipe()
  62. if err != nil {
  63. return err
  64. }
  65. defer reader.Close()
  66. defer writer.Close()
  67. file := os.NewFile(uintptr(writer.Fd()), "pipe")
  68. ctx.ExportBPF(file)
  69. // read from pipe
  70. data := make([]byte, 4096)
  71. n, err := reader.Read(data)
  72. if err != nil {
  73. return err
  74. }
  75. // load bpf
  76. sock_filters := make([]syscall.SockFilter, n/8)
  77. bytesBuffer := bytes.NewBuffer(data)
  78. err = binary.Read(bytesBuffer, binary.LittleEndian, &sock_filters)
  79. if err != nil {
  80. return err
  81. }
  82. bpf := syscall.SockFprog{
  83. Len: uint16(len(sock_filters)),
  84. Filter: &sock_filters[0],
  85. }
  86. _, _, err2 := syscall.RawSyscall6(syscall.SYS_PRCTL, syscall.PR_SET_SECCOMP, 2, uintptr(unsafe.Pointer(&bpf)), 0, 0, 0)
  87. if err2 != 0 {
  88. return fmt.Errorf("prctl failed: %v", err2)
  89. }
  90. // setuid
  91. err = syscall.Setuid(uid)
  92. if err != nil {
  93. return err
  94. }
  95. // setgid
  96. err = syscall.Setgid(gid)
  97. if err != nil {
  98. return err
  99. }
  100. return nil
  101. }