add_seccomp.go 2.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134
  1. package nodejs
  2. import (
  3. "bytes"
  4. "encoding/binary"
  5. "errors"
  6. "os"
  7. "strconv"
  8. "strings"
  9. "syscall"
  10. "unsafe"
  11. "github.com/langgenius/dify-sandbox/internal/core/lib"
  12. "github.com/langgenius/dify-sandbox/internal/static/nodejs_syscall"
  13. sg "github.com/seccomp/libseccomp-golang"
  14. )
  15. const (
  16. seccompSetModeFilter = 0x1
  17. seccompFilterFlagTSYNC = 0x1
  18. )
  19. //var allow_syscalls = []int{}
  20. func InitSeccomp(uid int, gid int, enable_network bool) error {
  21. err := syscall.Chroot(".")
  22. if err != nil {
  23. return err
  24. }
  25. err = syscall.Chdir("/")
  26. if err != nil {
  27. return err
  28. }
  29. lib.SetNoNewPrivs()
  30. ctx, err := sg.NewFilter(sg.ActKillProcess)
  31. if err != nil {
  32. return err
  33. }
  34. allowed_syscall := os.Getenv("ALLOWED_SYSCALLS")
  35. if allowed_syscall != "" {
  36. nums := strings.Split(allowed_syscall, ",")
  37. for num := range nums {
  38. syscall, err := strconv.Atoi(nums[num])
  39. if err != nil {
  40. return err
  41. }
  42. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActAllow)
  43. if err != nil {
  44. return err
  45. }
  46. }
  47. } else {
  48. for _, syscall := range nodejs_syscall.ALLOW_SYSCALLS {
  49. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActAllow)
  50. if err != nil {
  51. return err
  52. }
  53. }
  54. for _, syscall := range nodejs_syscall.ALLOW_ERROR_SYSCALLS {
  55. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActErrno)
  56. if err != nil {
  57. return err
  58. }
  59. }
  60. if enable_network {
  61. for _, syscall := range nodejs_syscall.ALLOW_NETWORK_SYSCALLS {
  62. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActAllow)
  63. if err != nil {
  64. return err
  65. }
  66. }
  67. }
  68. }
  69. reader, writer, err := os.Pipe()
  70. if err != nil {
  71. return err
  72. }
  73. defer reader.Close()
  74. defer writer.Close()
  75. file := os.NewFile(uintptr(writer.Fd()), "pipe")
  76. ctx.ExportBPF(file)
  77. // read from pipe
  78. data := make([]byte, 4096)
  79. n, err := reader.Read(data)
  80. if err != nil {
  81. return err
  82. }
  83. // load bpf
  84. sock_filters := make([]syscall.SockFilter, n/8)
  85. bytesBuffer := bytes.NewBuffer(data)
  86. err = binary.Read(bytesBuffer, binary.LittleEndian, &sock_filters)
  87. if err != nil {
  88. return err
  89. }
  90. bpf := syscall.SockFprog{
  91. Len: uint16(len(sock_filters)),
  92. Filter: &sock_filters[0],
  93. }
  94. _, _, err2 := syscall.Syscall(
  95. syscall.SYS_SECCOMP,
  96. uintptr(seccompSetModeFilter),
  97. uintptr(seccompFilterFlagTSYNC),
  98. uintptr(unsafe.Pointer(&bpf)),
  99. )
  100. if err2 != 0 {
  101. return errors.New("seccomp error")
  102. }
  103. // setuid
  104. err = syscall.Setuid(uid)
  105. if err != nil {
  106. return err
  107. }
  108. // setgid
  109. err = syscall.Setgid(gid)
  110. if err != nil {
  111. return err
  112. }
  113. return nil
  114. }