add_seccomp.go 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129
  1. package nodejs
  2. import (
  3. "bytes"
  4. "encoding/binary"
  5. "errors"
  6. "os"
  7. "strconv"
  8. "strings"
  9. "syscall"
  10. "unsafe"
  11. "github.com/langgenius/dify-sandbox/internal/core/lib"
  12. "github.com/langgenius/dify-sandbox/internal/static/nodejs_syscall"
  13. sg "github.com/seccomp/libseccomp-golang"
  14. )
  15. //var allow_syscalls = []int{}
  16. func InitSeccomp(uid int, gid int, enable_network bool) error {
  17. err := syscall.Chroot(".")
  18. if err != nil {
  19. return err
  20. }
  21. err = syscall.Chdir("/")
  22. if err != nil {
  23. return err
  24. }
  25. lib.SetNoNewPrivs()
  26. ctx, err := sg.NewFilter(sg.ActKillProcess)
  27. if err != nil {
  28. return err
  29. }
  30. allowed_syscall := os.Getenv("ALLOWED_SYSCALLS")
  31. if allowed_syscall != "" {
  32. nums := strings.Split(allowed_syscall, ",")
  33. for num := range nums {
  34. syscall, err := strconv.Atoi(nums[num])
  35. if err != nil {
  36. return err
  37. }
  38. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActAllow)
  39. if err != nil {
  40. return err
  41. }
  42. }
  43. } else {
  44. for _, syscall := range nodejs_syscall.ALLOW_SYSCALLS {
  45. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActAllow)
  46. if err != nil {
  47. return err
  48. }
  49. }
  50. for _, syscall := range nodejs_syscall.ALLOW_ERROR_SYSCALLS {
  51. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActErrno)
  52. if err != nil {
  53. return err
  54. }
  55. }
  56. if enable_network {
  57. for _, syscall := range nodejs_syscall.ALLOW_NETWORK_SYSCALLS {
  58. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActAllow)
  59. if err != nil {
  60. return err
  61. }
  62. }
  63. }
  64. }
  65. reader, writer, err := os.Pipe()
  66. if err != nil {
  67. return err
  68. }
  69. defer reader.Close()
  70. defer writer.Close()
  71. file := os.NewFile(uintptr(writer.Fd()), "pipe")
  72. ctx.ExportBPF(file)
  73. // read from pipe
  74. data := make([]byte, 4096)
  75. n, err := reader.Read(data)
  76. if err != nil {
  77. return err
  78. }
  79. // load bpf
  80. sock_filters := make([]syscall.SockFilter, n/8)
  81. bytesBuffer := bytes.NewBuffer(data)
  82. err = binary.Read(bytesBuffer, binary.LittleEndian, &sock_filters)
  83. if err != nil {
  84. return err
  85. }
  86. bpf := syscall.SockFprog{
  87. Len: uint16(len(sock_filters)),
  88. Filter: &sock_filters[0],
  89. }
  90. _, _, err2 := syscall.Syscall(
  91. syscall.SYS_SECCOMP,
  92. uintptr(lib.SeccompSetModeFilter),
  93. uintptr(lib.SeccompFilterFlagTSYNC),
  94. uintptr(unsafe.Pointer(&bpf)),
  95. )
  96. if err2 != 0 {
  97. return errors.New("seccomp error")
  98. }
  99. // setuid
  100. err = syscall.Setuid(uid)
  101. if err != nil {
  102. return err
  103. }
  104. // setgid
  105. err = syscall.Setgid(gid)
  106. if err != nil {
  107. return err
  108. }
  109. return nil
  110. }