diff options
| author | Olcan <[email protected]> | 2025-06-10 08:58:37 -0700 |
|---|---|---|
| committer | GitHub <[email protected]> | 2025-06-10 08:58:37 -0700 |
| commit | e38d2078cc70b0453ef70523a8ad38279941aca2 (patch) | |
| tree | b5a4024d1c006a2d116631ac7a51bb5b0eaf34a6 /packages/cli/src | |
| parent | 895c1f132f9d1cc88bd56584e461fd22a5f23394 (diff) | |
restricted networking for all sandboxing methods, new seatbelt profiles, updated docs, fixes to sandbox build, debugging through sandbox (#891)
Diffstat (limited to 'packages/cli/src')
| -rw-r--r-- | packages/cli/src/utils/sandbox-macos-permissive-closed.sb | 26 | ||||
| -rw-r--r-- | packages/cli/src/utils/sandbox-macos-permissive-open.sb (renamed from packages/cli/src/utils/sandbox-macos-minimal.sb) | 0 | ||||
| -rw-r--r-- | packages/cli/src/utils/sandbox-macos-permissive-proxied.sb | 31 | ||||
| -rw-r--r-- | packages/cli/src/utils/sandbox-macos-restrictive-closed.sb | 87 | ||||
| -rw-r--r-- | packages/cli/src/utils/sandbox-macos-restrictive-open.sb (renamed from packages/cli/src/utils/sandbox-macos-strict.sb) | 12 | ||||
| -rw-r--r-- | packages/cli/src/utils/sandbox-macos-restrictive-proxied.sb | 92 | ||||
| -rw-r--r-- | packages/cli/src/utils/sandbox.ts | 185 |
7 files changed, 397 insertions, 36 deletions
diff --git a/packages/cli/src/utils/sandbox-macos-permissive-closed.sb b/packages/cli/src/utils/sandbox-macos-permissive-closed.sb new file mode 100644 index 00000000..36d88995 --- /dev/null +++ b/packages/cli/src/utils/sandbox-macos-permissive-closed.sb @@ -0,0 +1,26 @@ +(version 1) + +;; allow everything by default +(allow default) + +;; deny all writes EXCEPT under specific paths +(deny file-write*) +(allow file-write* + (subpath (param "TARGET_DIR")) + (subpath (param "TMP_DIR")) + (subpath (param "CACHE_DIR")) + (subpath (string-append (param "HOME_DIR") "/.gemini")) + (subpath (string-append (param "HOME_DIR") "/.npm")) + (subpath (string-append (param "HOME_DIR") "/.cache")) + (subpath (string-append (param "HOME_DIR") "/.gitconfig")) + (literal "/dev/stdout") + (literal "/dev/stderr") + (literal "/dev/null") +) + +;; deny all inbound network traffic EXCEPT on debugger port +(deny network-inbound) +(allow network-inbound (local ip "localhost:9229")) + +;; deny all outbound network traffic +(deny network-outbound) diff --git a/packages/cli/src/utils/sandbox-macos-minimal.sb b/packages/cli/src/utils/sandbox-macos-permissive-open.sb index 552efcd4..552efcd4 100644 --- a/packages/cli/src/utils/sandbox-macos-minimal.sb +++ b/packages/cli/src/utils/sandbox-macos-permissive-open.sb diff --git a/packages/cli/src/utils/sandbox-macos-permissive-proxied.sb b/packages/cli/src/utils/sandbox-macos-permissive-proxied.sb new file mode 100644 index 00000000..861e503d --- /dev/null +++ b/packages/cli/src/utils/sandbox-macos-permissive-proxied.sb @@ -0,0 +1,31 @@ +(version 1) + +;; allow everything by default +(allow default) + +;; deny all writes EXCEPT under specific paths +(deny file-write*) +(allow file-write* + (subpath (param "TARGET_DIR")) + (subpath (param "TMP_DIR")) + (subpath (param "CACHE_DIR")) + (subpath (string-append (param "HOME_DIR") "/.gemini")) + (subpath (string-append (param "HOME_DIR") "/.npm")) + (subpath (string-append (param "HOME_DIR") "/.cache")) + (subpath (string-append (param "HOME_DIR") "/.gitconfig")) + (literal "/dev/stdout") + (literal "/dev/stderr") + (literal "/dev/null") +) + +;; deny all inbound network traffic EXCEPT on debugger port +(deny network-inbound) +(allow network-inbound (local ip "localhost:9229")) + +;; deny all outbound network traffic EXCEPT through proxy on localhost:8877 +;; set `GEMINI_SANDBOX_PROXY_COMMAND=<command>` to run proxy alongside sandbox +;; proxy must listen on 0.0.0.0:8877 (see scripts/example-proxy.js) +(deny network-outbound) +(allow network-outbound (remote tcp "localhost:8877")) + +(allow network-bind (local ip "*:*")) diff --git a/packages/cli/src/utils/sandbox-macos-restrictive-closed.sb b/packages/cli/src/utils/sandbox-macos-restrictive-closed.sb new file mode 100644 index 00000000..9ce68e9d --- /dev/null +++ b/packages/cli/src/utils/sandbox-macos-restrictive-closed.sb @@ -0,0 +1,87 @@ +(version 1) + +;; deny everything by default +(deny default) + +;; allow reading files from anywhere on host +(allow file-read*) + +;; allow exec/fork (children inherit policy) +(allow process-exec) +(allow process-fork) + +;; allow signals to self, e.g. SIGPIPE on write to closed pipe +(allow signal (target self)) + +;; allow read access to specific information about system +;; from https://source.chromium.org/chromium/chromium/src/+/main:sandbox/policy/mac/common.sb;l=273-319;drc=7b3962fe2e5fc9e2ee58000dc8fbf3429d84d3bd +(allow sysctl-read + (sysctl-name "hw.activecpu") + (sysctl-name "hw.busfrequency_compat") + (sysctl-name "hw.byteorder") + (sysctl-name "hw.cacheconfig") + (sysctl-name "hw.cachelinesize_compat") + (sysctl-name "hw.cpufamily") + (sysctl-name "hw.cpufrequency_compat") + (sysctl-name "hw.cputype") + (sysctl-name "hw.l1dcachesize_compat") + (sysctl-name "hw.l1icachesize_compat") + (sysctl-name "hw.l2cachesize_compat") + (sysctl-name "hw.l3cachesize_compat") + (sysctl-name "hw.logicalcpu_max") + (sysctl-name "hw.machine") + (sysctl-name "hw.ncpu") + (sysctl-name "hw.nperflevels") + (sysctl-name "hw.optional.arm.FEAT_BF16") + (sysctl-name "hw.optional.arm.FEAT_DotProd") + (sysctl-name "hw.optional.arm.FEAT_FCMA") + (sysctl-name "hw.optional.arm.FEAT_FHM") + (sysctl-name "hw.optional.arm.FEAT_FP16") + (sysctl-name "hw.optional.arm.FEAT_I8MM") + (sysctl-name "hw.optional.arm.FEAT_JSCVT") + (sysctl-name "hw.optional.arm.FEAT_LSE") + (sysctl-name "hw.optional.arm.FEAT_RDM") + (sysctl-name "hw.optional.arm.FEAT_SHA512") + (sysctl-name "hw.optional.armv8_2_sha512") + (sysctl-name "hw.packages") + (sysctl-name "hw.pagesize_compat") + (sysctl-name "hw.physicalcpu_max") + (sysctl-name "hw.tbfrequency_compat") + (sysctl-name "hw.vectorunit") + (sysctl-name "kern.hostname") + (sysctl-name "kern.maxfilesperproc") + (sysctl-name "kern.osproductversion") + (sysctl-name "kern.osrelease") + (sysctl-name "kern.ostype") + (sysctl-name "kern.osvariant_status") + (sysctl-name "kern.osversion") + (sysctl-name "kern.secure_kernel") + (sysctl-name "kern.usrstack64") + (sysctl-name "kern.version") + (sysctl-name "sysctl.proc_cputype") + (sysctl-name-prefix "hw.perflevel") +) + +;; allow writes to specific paths +(allow file-write* + (subpath (param "TARGET_DIR")) + (subpath (param "TMP_DIR")) + (subpath (param "CACHE_DIR")) + (subpath (string-append (param "HOME_DIR") "/.gemini")) + (subpath (string-append (param "HOME_DIR") "/.npm")) + (subpath (string-append (param "HOME_DIR") "/.cache")) + (subpath (string-append (param "HOME_DIR") "/.gitconfig")) + (literal "/dev/stdout") + (literal "/dev/stderr") + (literal "/dev/null") +) + +;; allow communication with sysmond for process listing (e.g. for pgrep) +(allow mach-lookup (global-name "com.apple.sysmond")) + +;; enable terminal access required by ink +;; fixes setRawMode EPERM failure (at node:tty:81:24) +(allow file-ioctl (regex #"^/dev/tty.*")) + +;; allow inbound network traffic on debugger port +(allow network-inbound (local ip "localhost:9229"))
\ No newline at end of file diff --git a/packages/cli/src/utils/sandbox-macos-strict.sb b/packages/cli/src/utils/sandbox-macos-restrictive-open.sb index 010fee00..e89b8090 100644 --- a/packages/cli/src/utils/sandbox-macos-strict.sb +++ b/packages/cli/src/utils/sandbox-macos-restrictive-open.sb @@ -76,15 +76,15 @@ (literal "/dev/null") ) -;; allow outbound network connections -(allow network-outbound) - -;; allow inbound network connections to debugging port -(allow network-inbound (local ip (string-append "*:" "9229"))) - ;; allow communication with sysmond for process listing (e.g. for pgrep) (allow mach-lookup (global-name "com.apple.sysmond")) ;; enable terminal access required by ink ;; fixes setRawMode EPERM failure (at node:tty:81:24) (allow file-ioctl (regex #"^/dev/tty.*")) + +;; allow inbound network traffic on debugger port +(allow network-inbound (local ip "localhost:9229")) + +;; allow all outbound network traffic +(allow network-outbound)
\ No newline at end of file diff --git a/packages/cli/src/utils/sandbox-macos-restrictive-proxied.sb b/packages/cli/src/utils/sandbox-macos-restrictive-proxied.sb new file mode 100644 index 00000000..cc4c1e5e --- /dev/null +++ b/packages/cli/src/utils/sandbox-macos-restrictive-proxied.sb @@ -0,0 +1,92 @@ +(version 1) + +;; deny everything by default +(deny default) + +;; allow reading files from anywhere on host +(allow file-read*) + +;; allow exec/fork (children inherit policy) +(allow process-exec) +(allow process-fork) + +;; allow signals to self, e.g. SIGPIPE on write to closed pipe +(allow signal (target self)) + +;; allow read access to specific information about system +;; from https://source.chromium.org/chromium/chromium/src/+/main:sandbox/policy/mac/common.sb;l=273-319;drc=7b3962fe2e5fc9e2ee58000dc8fbf3429d84d3bd +(allow sysctl-read + (sysctl-name "hw.activecpu") + (sysctl-name "hw.busfrequency_compat") + (sysctl-name "hw.byteorder") + (sysctl-name "hw.cacheconfig") + (sysctl-name "hw.cachelinesize_compat") + (sysctl-name "hw.cpufamily") + (sysctl-name "hw.cpufrequency_compat") + (sysctl-name "hw.cputype") + (sysctl-name "hw.l1dcachesize_compat") + (sysctl-name "hw.l1icachesize_compat") + (sysctl-name "hw.l2cachesize_compat") + (sysctl-name "hw.l3cachesize_compat") + (sysctl-name "hw.logicalcpu_max") + (sysctl-name "hw.machine") + (sysctl-name "hw.ncpu") + (sysctl-name "hw.nperflevels") + (sysctl-name "hw.optional.arm.FEAT_BF16") + (sysctl-name "hw.optional.arm.FEAT_DotProd") + (sysctl-name "hw.optional.arm.FEAT_FCMA") + (sysctl-name "hw.optional.arm.FEAT_FHM") + (sysctl-name "hw.optional.arm.FEAT_FP16") + (sysctl-name "hw.optional.arm.FEAT_I8MM") + (sysctl-name "hw.optional.arm.FEAT_JSCVT") + (sysctl-name "hw.optional.arm.FEAT_LSE") + (sysctl-name "hw.optional.arm.FEAT_RDM") + (sysctl-name "hw.optional.arm.FEAT_SHA512") + (sysctl-name "hw.optional.armv8_2_sha512") + (sysctl-name "hw.packages") + (sysctl-name "hw.pagesize_compat") + (sysctl-name "hw.physicalcpu_max") + (sysctl-name "hw.tbfrequency_compat") + (sysctl-name "hw.vectorunit") + (sysctl-name "kern.hostname") + (sysctl-name "kern.maxfilesperproc") + (sysctl-name "kern.osproductversion") + (sysctl-name "kern.osrelease") + (sysctl-name "kern.ostype") + (sysctl-name "kern.osvariant_status") + (sysctl-name "kern.osversion") + (sysctl-name "kern.secure_kernel") + (sysctl-name "kern.usrstack64") + (sysctl-name "kern.version") + (sysctl-name "sysctl.proc_cputype") + (sysctl-name-prefix "hw.perflevel") +) + +;; allow writes to specific paths +(allow file-write* + (subpath (param "TARGET_DIR")) + (subpath (param "TMP_DIR")) + (subpath (param "CACHE_DIR")) + (subpath (string-append (param "HOME_DIR") "/.gemini")) + (subpath (string-append (param "HOME_DIR") "/.npm")) + (subpath (string-append (param "HOME_DIR") "/.cache")) + (subpath (string-append (param "HOME_DIR") "/.gitconfig")) + (literal "/dev/stdout") + (literal "/dev/stderr") + (literal "/dev/null") +) + +;; allow communication with sysmond for process listing (e.g. for pgrep) +(allow mach-lookup (global-name "com.apple.sysmond")) + +;; enable terminal access required by ink +;; fixes setRawMode EPERM failure (at node:tty:81:24) +(allow file-ioctl (regex #"^/dev/tty.*")) + +;; allow inbound network traffic on debugger port +(allow network-inbound (local ip "localhost:9229")) + +;; allow outbound network traffic through proxy on localhost:8877 +;; set `GEMINI_SANDBOX_PROXY_COMMAND=<command>` to run proxy alongside sandbox +;; proxy must listen on 0.0.0.0:8877 (see scripts/example-proxy.js) +(allow network-outbound (remote tcp "localhost:8877")) diff --git a/packages/cli/src/utils/sandbox.ts b/packages/cli/src/utils/sandbox.ts index c75bd544..b91fd5bf 100644 --- a/packages/cli/src/utils/sandbox.ts +++ b/packages/cli/src/utils/sandbox.ts @@ -4,7 +4,7 @@ * SPDX-License-Identifier: Apache-2.0 */ -import { execSync, spawnSync, spawn } from 'node:child_process'; +import { execSync, spawn, type ChildProcess } from 'node:child_process'; import os from 'node:os'; import path from 'node:path'; import fs from 'node:fs'; @@ -30,6 +30,16 @@ function getContainerPath(hostPath: string): string { } const LOCAL_DEV_SANDBOX_IMAGE_NAME = 'gemini-cli-sandbox'; +const SANDBOX_NETWORK_NAME = 'gemini-cli-sandbox'; +const SANDBOX_PROXY_NAME = 'gemini-cli-sandbox-proxy'; +const BUILTIN_SEATBELT_PROFILES = [ + 'permissive-open', + 'permissive-closed', + 'permissive-proxied', + 'restrictive-open', + 'restrictive-closed', + 'restrictive-proxied', +]; /** * Determines whether the sandbox container should be run with the current user's UID and GID. @@ -230,14 +240,14 @@ export async function start_sandbox(sandbox: string) { if (sandbox === 'sandbox-exec') { // disallow BUILD_SANDBOX if (process.env.BUILD_SANDBOX) { - console.error('ERROR: cannot BUILD_SANDBOX when using MacOC Seatbelt'); + console.error('ERROR: cannot BUILD_SANDBOX when using MacOS Seatbelt'); process.exit(1); } - const profile = (process.env.SEATBELT_PROFILE ??= 'minimal'); + const profile = (process.env.SEATBELT_PROFILE ??= 'permissive-open'); let profileFile = new URL(`sandbox-macos-${profile}.sb`, import.meta.url) .pathname; - // if profile is anything other than 'minimal' or 'strict', then look for the profile file under the project settings directory - if (profile !== 'minimal' && profile !== 'strict') { + // if profile name is not recognized, then look for file under project settings directory + if (!BUILTIN_SEATBELT_PROFILES.includes(profile)) { profileFile = path.join( SETTINGS_DIRECTORY_NAME, `sandbox-macos-${profile}.sb`, @@ -251,10 +261,6 @@ export async function start_sandbox(sandbox: string) { } console.error(`using macos seatbelt (profile: ${profile}) ...`); // if DEBUG is set, convert to --inspect-brk in NODE_OPTIONS - if (process.env.DEBUG) { - process.env.NODE_OPTIONS ??= ''; - process.env.NODE_OPTIONS += ` --inspect-brk`; - } const args = [ '-D', `TARGET_DIR=${fs.realpathSync(process.cwd())}`, @@ -270,11 +276,67 @@ export async function start_sandbox(sandbox: string) { '-c', [ `SANDBOX=sandbox-exec`, - `NODE_OPTIONS="${process.env.NODE_OPTIONS}"`, + `NODE_OPTIONS="${process.env.DEBUG ? `--inspect-brk` : ''}"`, ...process.argv.map((arg) => quote([arg])), ].join(' '), ]; - spawnSync(sandbox, args, { stdio: 'inherit' }); + // start and set up proxy if GEMINI_SANDBOX_PROXY_COMMAND is set + const proxyCommand = process.env.GEMINI_SANDBOX_PROXY_COMMAND; + let proxyProcess: ChildProcess | undefined; + const sandboxEnv = { ...process.env }; + if (proxyCommand) { + const proxy = + process.env.HTTPS_PROXY || + process.env.https_proxy || + process.env.HTTP_PROXY || + process.env.http_proxy || + 'http://localhost:8877'; + sandboxEnv['HTTPS_PROXY'] = proxy; + sandboxEnv['https_proxy'] = proxy; // lower-case can be required, e.g. for curl + sandboxEnv['HTTP_PROXY'] = proxy; + sandboxEnv['http_proxy'] = proxy; + const noProxy = process.env.NO_PROXY || process.env.no_proxy; + if (noProxy) { + sandboxEnv['NO_PROXY'] = noProxy; + sandboxEnv['no_proxy'] = noProxy; + } + proxyProcess = spawn(proxyCommand, { + stdio: ['ignore', 'pipe', 'pipe'], + shell: true, + detached: true, + }); + // commented out as it disrupts ink rendering + // proxyProcess.stdout?.on('data', (data) => { + // console.info(data.toString()); + // }); + proxyProcess.stderr?.on('data', (data) => { + console.error(data.toString()); + }); + console.log('waiting for proxy to start ...'); + execSync(`until lsof -i :8877 | grep -q "LISTEN"; do sleep 0.1; done`); + } + try { + // spawn child and let it inherit stdio + const child = spawn(sandbox, args, { + stdio: 'inherit', + env: sandboxEnv, + }); + if (proxyProcess) { + proxyProcess.on('close', (code, signal) => { + console.error( + `ERROR: proxy command '${proxyCommand}' exited with code ${code}, signal ${signal}`, + ); + if (child.pid) { + process.kill(-child.pid, 'SIGTERM'); + } + }); + } + await new Promise((resolve) => child.on('close', resolve)); + } finally { + if (proxyProcess?.pid) { + process.kill(-proxyProcess.pid, 'SIGTERM'); + } + } return; } @@ -408,6 +470,45 @@ export async function start_sandbox(sandbox: string) { args.push(`--publish`, `${debugPort}:${debugPort}`); } + // copy proxy environment variables, replacing localhost with SANDBOX_PROXY_NAME + // copy as both upper-case and lower-case as is required by some utilities + // GEMINI_SANDBOX_PROXY_COMMAND implies HTTPS_PROXY unless HTTP_PROXY is set + const proxyCommand = process.env.GEMINI_SANDBOX_PROXY_COMMAND; + let proxy = + process.env.HTTPS_PROXY || + process.env.https_proxy || + process.env.HTTP_PROXY || + process.env.http_proxy || + 'http://localhost:8877'; + proxy = proxy.replace('localhost', SANDBOX_PROXY_NAME); + if (proxy) { + args.push('--env', `HTTPS_PROXY=${proxy}`); + args.push('--env', `https_proxy=${proxy}`); // lower-case can be required, e.g. for curl + args.push('--env', `HTTP_PROXY=${proxy}`); + args.push('--env', `http_proxy=${proxy}`); + } + const noProxy = process.env.NO_PROXY || process.env.no_proxy; + if (noProxy) { + args.push('--env', `NO_PROXY=${noProxy}`); + args.push('--env', `no_proxy=${noProxy}`); + } + + // if using proxy, switch to internal networking through proxy + if (proxy) { + execSync( + `${sandbox} network exists ${SANDBOX_NETWORK_NAME} || ${sandbox} network create --internal ${SANDBOX_NETWORK_NAME}`, + ); + args.push('--network', SANDBOX_NETWORK_NAME); + // if proxy command is set, create a separate network w/ host access (i.e. non-internal) + // we will run proxy in its own container connected to both host network and internal network + // this allows proxy to work even on rootless podman on macos with host<->vm<->container isolation + if (proxyCommand) { + execSync( + `${sandbox} network exists ${SANDBOX_PROXY_NAME} || ${sandbox} network create ${SANDBOX_PROXY_NAME}`, + ); + } + } + // name container after image, plus numeric suffix to avoid conflicts const imageName = parseImageName(image); let index = 0; @@ -510,28 +611,52 @@ export async function start_sandbox(sandbox: string) { // push container entrypoint (including args) args.push(...entrypoint(workdir)); - // spawn child and let it inherit stdio - const child = spawn(sandbox, args, { - stdio: 'inherit', - detached: os.platform() !== 'win32', - }); + // start and set up proxy if GEMINI_SANDBOX_PROXY_COMMAND is set + let proxyProcess: ChildProcess | undefined; + if (proxyCommand) { + // run proxyCommand in its own container + const proxyContainerCommand = `${sandbox} run --rm --init --name ${SANDBOX_PROXY_NAME} --network ${SANDBOX_PROXY_NAME} --network ${SANDBOX_NETWORK_NAME} -p 8877:8877 -v ${process.cwd()}:${workdir} --workdir ${workdir} ${image} ${proxyCommand}`; + proxyProcess = spawn(proxyContainerCommand, { + stdio: ['ignore', 'pipe', 'pipe'], + shell: true, + detached: true, + }); + // commented out as it disrupts ink rendering + // proxyProcess.stdout?.on('data', (data) => { + // console.info(data.toString()); + // }); + proxyProcess.stderr?.on('data', (data) => { + console.error(data.toString().trim()); + }); + console.log('waiting for proxy to start ...'); + execSync(`until lsof -i :8877 | grep -q "LISTEN"; do sleep 0.1; done`); + } - child.on('error', (err) => { - console.error('Sandbox process error:', err); - }); + try { + // spawn child and let it inherit stdio + const child = spawn(sandbox, args, { + stdio: 'inherit', + }); - // uncomment this line (and comment the await on following line) to let parent exit - // child.unref(); - await new Promise<void>((resolve) => { - child.on('close', (code, signal) => { - if (code !== 0) { - console.log( - `Sandbox process exited with code: ${code}, signal: ${signal}`, - ); - } - resolve(); + child.on('error', (err) => { + console.error('Sandbox process error:', err); }); - }); + + await new Promise<void>((resolve) => { + child.on('close', (code, signal) => { + if (code !== 0) { + console.log( + `Sandbox process exited with code: ${code}, signal: ${signal}`, + ); + } + resolve(); + }); + }); + } finally { + if (proxyProcess?.pid) { + process.kill(-proxyProcess.pid, 'SIGTERM'); + } + } } // Helper functions to ensure sandbox image is present |
