add_seccomp.go 1.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105
  1. package python
  2. import (
  3. "bytes"
  4. "encoding/binary"
  5. "errors"
  6. "os"
  7. "syscall"
  8. "unsafe"
  9. "github.com/langgenius/dify-sandbox/internal/core/lib"
  10. "github.com/langgenius/dify-sandbox/internal/static/python_syscall"
  11. sg "github.com/seccomp/libseccomp-golang"
  12. )
  13. //var allow_syscalls = []int{}
  14. func InitSeccomp(uid int, gid int, enable_network bool) error {
  15. err := syscall.Chroot(".")
  16. if err != nil {
  17. return err
  18. }
  19. err = syscall.Chdir("/")
  20. if err != nil {
  21. return err
  22. }
  23. lib.SetNoNewPrivs()
  24. ctx, err := sg.NewFilter(sg.ActKillProcess)
  25. if err != nil {
  26. return err
  27. }
  28. for _, syscall := range python_syscall.ALLOW_SYSCALLS {
  29. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActAllow)
  30. if err != nil {
  31. return err
  32. }
  33. }
  34. if enable_network {
  35. for _, syscall := range python_syscall.ALLOW_NETWORK_SYSCALLS {
  36. err = ctx.AddRule(sg.ScmpSyscall(syscall), sg.ActAllow)
  37. if err != nil {
  38. return err
  39. }
  40. }
  41. }
  42. reader, writer, err := os.Pipe()
  43. if err != nil {
  44. return err
  45. }
  46. defer reader.Close()
  47. defer writer.Close()
  48. file := os.NewFile(uintptr(writer.Fd()), "pipe")
  49. ctx.ExportBPF(file)
  50. // read from pipe
  51. data := make([]byte, 4096)
  52. n, err := reader.Read(data)
  53. if err != nil {
  54. return err
  55. }
  56. // load bpf
  57. sock_filters := make([]syscall.SockFilter, n/8)
  58. bytesBuffer := bytes.NewBuffer(data)
  59. err = binary.Read(bytesBuffer, binary.LittleEndian, &sock_filters)
  60. if err != nil {
  61. return err
  62. }
  63. bpf := syscall.SockFprog{
  64. Len: uint16(len(sock_filters)),
  65. Filter: &sock_filters[0],
  66. }
  67. _, _, err2 := syscall.Syscall(
  68. syscall.SYS_SECCOMP,
  69. uintptr(lib.SeccompSetModeFilter),
  70. uintptr(lib.SeccompFilterFlagTSYNC),
  71. uintptr(unsafe.Pointer(&bpf)),
  72. )
  73. if err2 != 0 {
  74. return errors.New("seccomp error")
  75. }
  76. // setuid
  77. err = syscall.Setuid(uid)
  78. if err != nil {
  79. return err
  80. }
  81. // setgid
  82. err = syscall.Setgid(gid)
  83. if err != nil {
  84. return err
  85. }
  86. return nil
  87. }