add_seccomp.go 2.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118
  1. package python
  2. import (
  3. "bytes"
  4. "encoding/binary"
  5. "fmt"
  6. "os"
  7. "syscall"
  8. "unsafe"
  9. "github.com/langgenius/dify-sandbox/internal/static/python_syscall"
  10. sg "github.com/seccomp/libseccomp-golang"
  11. )
  12. //var allow_syscalls = []int{}
  13. func InitSeccomp(uid int, gid int, enable_network bool) error {
  14. err := syscall.Chroot(".")
  15. if err != nil {
  16. return err
  17. }
  18. err = syscall.Chdir("/")
  19. if err != nil {
  20. return err
  21. }
  22. // disabled_syscall, err := strconv.Atoi(os.Getenv("DISABLE_SYSCALL"))
  23. // if err != nil {
  24. // disabled_syscall = -1
  25. // }
  26. ctx, err := sg.NewFilter(sg.ActKillProcess)
  27. if err != nil {
  28. return err
  29. }
  30. defer ctx.Release()
  31. // for i := 0; i < 400; i++ {
  32. // allow_syscalls = append(allow_syscalls, i)
  33. // }
  34. for _, syscall := range python_syscall.ALLOW_SYSCALLS {
  35. // if syscall == disabled_syscall {
  36. // continue
  37. // }
  38. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActAllow)
  39. if err != nil {
  40. return err
  41. }
  42. }
  43. for _, syscall := range python_syscall.ERROR_CODE_SYSCALLS {
  44. // if syscall == disabled_syscall {
  45. // continue
  46. // }
  47. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActErrno)
  48. if err != nil {
  49. return err
  50. }
  51. }
  52. if enable_network {
  53. for _, syscall := range python_syscall.ALLOW_NETWORK_SYSCALLS {
  54. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActAllow)
  55. if err != nil {
  56. return err
  57. }
  58. }
  59. }
  60. reader, writer, err := os.Pipe()
  61. if err != nil {
  62. return err
  63. }
  64. defer reader.Close()
  65. defer writer.Close()
  66. file := os.NewFile(uintptr(writer.Fd()), "pipe")
  67. ctx.ExportBPF(file)
  68. // read from pipe
  69. data := make([]byte, 4096)
  70. n, err := reader.Read(data)
  71. if err != nil {
  72. return err
  73. }
  74. // load bpf
  75. sock_filters := make([]syscall.SockFilter, n/8)
  76. bytesBuffer := bytes.NewBuffer(data)
  77. err = binary.Read(bytesBuffer, binary.LittleEndian, &sock_filters)
  78. if err != nil {
  79. return err
  80. }
  81. bpf := syscall.SockFprog{
  82. Len: uint16(len(sock_filters)),
  83. Filter: &sock_filters[0],
  84. }
  85. _, _, err2 := syscall.RawSyscall6(syscall.SYS_PRCTL, syscall.PR_SET_SECCOMP, 2, uintptr(unsafe.Pointer(&bpf)), 0, 0, 0)
  86. if err2 != 0 {
  87. return fmt.Errorf("prctl failed: %v", err2)
  88. }
  89. // setuid
  90. err = syscall.Setuid(uid)
  91. if err != nil {
  92. return err
  93. }
  94. // setgid
  95. err = syscall.Setgid(gid)
  96. if err != nil {
  97. return err
  98. }
  99. return nil
  100. }