mirror of
https://github.com/openai/codex.git
synced 2026-04-24 22:54:54 +00:00
379 lines
12 KiB
Rust
379 lines
12 KiB
Rust
use std::collections::HashMap;
|
|
use std::os::fd::AsRawFd;
|
|
use std::path::Path;
|
|
use std::path::PathBuf;
|
|
use std::process::Stdio;
|
|
use std::sync::Arc;
|
|
use std::time::Duration;
|
|
|
|
use anyhow::Context as _;
|
|
use codex_execpolicy::Policy;
|
|
use codex_protocol::protocol::SandboxPolicy;
|
|
use path_absolutize::Absolutize as _;
|
|
use tokio::process::Command;
|
|
use tokio::sync::RwLock;
|
|
use tokio_util::sync::CancellationToken;
|
|
|
|
use crate::unix::escalate_protocol::ESCALATE_SOCKET_ENV_VAR;
|
|
use crate::unix::escalate_protocol::EXEC_WRAPPER_ENV_VAR;
|
|
use crate::unix::escalate_protocol::EscalateAction;
|
|
use crate::unix::escalate_protocol::EscalateRequest;
|
|
use crate::unix::escalate_protocol::EscalateResponse;
|
|
use crate::unix::escalate_protocol::LEGACY_BASH_EXEC_WRAPPER_ENV_VAR;
|
|
use crate::unix::escalate_protocol::SuperExecMessage;
|
|
use crate::unix::escalate_protocol::SuperExecResult;
|
|
use crate::unix::escalation_policy::EscalationPolicy;
|
|
use crate::unix::socket::AsyncDatagramSocket;
|
|
use crate::unix::socket::AsyncSocket;
|
|
use crate::unix::stopwatch::Stopwatch;
|
|
|
|
#[derive(Debug, Clone)]
|
|
pub struct SandboxState {
|
|
pub sandbox_policy: SandboxPolicy,
|
|
pub codex_linux_sandbox_exe: Option<PathBuf>,
|
|
pub sandbox_cwd: PathBuf,
|
|
pub use_linux_sandbox_bwrap: bool,
|
|
}
|
|
|
|
#[async_trait::async_trait]
|
|
pub trait ShellCommandExecutor: Send + Sync {
|
|
async fn run(
|
|
&self,
|
|
command: Vec<String>,
|
|
cwd: PathBuf,
|
|
env: HashMap<String, String>,
|
|
cancel_rx: CancellationToken,
|
|
sandbox_state: &SandboxState,
|
|
) -> anyhow::Result<ExecResult>;
|
|
}
|
|
|
|
#[derive(Debug, serde::Deserialize, serde::Serialize)]
|
|
pub struct ExecParams {
|
|
/// The bash string to execute.
|
|
pub command: String,
|
|
/// The working directory to execute the command in. Must be an absolute path.
|
|
pub workdir: String,
|
|
/// The timeout for the command in milliseconds.
|
|
pub timeout_ms: Option<u64>,
|
|
/// Launch Bash with -lc instead of -c: defaults to true.
|
|
pub login: Option<bool>,
|
|
}
|
|
|
|
#[derive(Debug, serde::Serialize, serde::Deserialize)]
|
|
pub struct ExecResult {
|
|
pub exit_code: i32,
|
|
pub output: String,
|
|
pub duration: Duration,
|
|
pub timed_out: bool,
|
|
}
|
|
|
|
#[allow(clippy::module_name_repetitions)]
|
|
pub struct EscalateServer {
|
|
bash_path: PathBuf,
|
|
execve_wrapper: PathBuf,
|
|
policy: Arc<dyn EscalationPolicy>,
|
|
}
|
|
|
|
impl EscalateServer {
|
|
pub fn new<P>(bash_path: PathBuf, execve_wrapper: PathBuf, policy: P) -> Self
|
|
where
|
|
P: EscalationPolicy + Send + Sync + 'static,
|
|
{
|
|
Self {
|
|
bash_path,
|
|
execve_wrapper,
|
|
policy: Arc::new(policy),
|
|
}
|
|
}
|
|
|
|
pub async fn exec(
|
|
&self,
|
|
params: ExecParams,
|
|
cancel_rx: CancellationToken,
|
|
sandbox_state: &SandboxState,
|
|
command_executor: &dyn ShellCommandExecutor,
|
|
) -> anyhow::Result<ExecResult> {
|
|
let (escalate_server, escalate_client) = AsyncDatagramSocket::pair()?;
|
|
let client_socket = escalate_client.into_inner();
|
|
let escalate_task = tokio::spawn(escalate_task(escalate_server, self.policy.clone()));
|
|
let mut env = std::env::vars().collect::<HashMap<String, String>>();
|
|
env.insert(
|
|
ESCALATE_SOCKET_ENV_VAR.to_string(),
|
|
client_socket.as_raw_fd().to_string(),
|
|
);
|
|
env.insert(
|
|
EXEC_WRAPPER_ENV_VAR.to_string(),
|
|
self.execve_wrapper.to_string_lossy().to_string(),
|
|
);
|
|
env.insert(
|
|
LEGACY_BASH_EXEC_WRAPPER_ENV_VAR.to_string(),
|
|
self.execve_wrapper.to_string_lossy().to_string(),
|
|
);
|
|
|
|
let command = vec![
|
|
self.bash_path.to_string_lossy().to_string(),
|
|
if params.login == Some(false) {
|
|
"-c".to_string()
|
|
} else {
|
|
"-lc".to_string()
|
|
},
|
|
params.command,
|
|
];
|
|
let result = command_executor
|
|
.run(
|
|
command,
|
|
PathBuf::from(¶ms.workdir),
|
|
env,
|
|
cancel_rx,
|
|
sandbox_state,
|
|
)
|
|
.await?;
|
|
escalate_task.abort();
|
|
|
|
Ok(result)
|
|
}
|
|
}
|
|
|
|
/// Factory for creating escalation policy instances for a single shell run.
|
|
pub trait EscalationPolicyFactory {
|
|
type Policy: EscalationPolicy + Send + Sync + 'static;
|
|
|
|
fn create_policy(&self, policy: Arc<RwLock<Policy>>, stopwatch: Stopwatch) -> Self::Policy;
|
|
}
|
|
|
|
#[allow(clippy::too_many_arguments)]
|
|
pub async fn run_escalate_server(
|
|
exec_params: ExecParams,
|
|
sandbox_state: &SandboxState,
|
|
shell_program: impl AsRef<Path>,
|
|
execve_wrapper: impl AsRef<Path>,
|
|
policy: Arc<RwLock<Policy>>,
|
|
escalation_policy_factory: impl EscalationPolicyFactory,
|
|
effective_timeout: Duration,
|
|
command_executor: &dyn ShellCommandExecutor,
|
|
) -> anyhow::Result<ExecResult> {
|
|
let stopwatch = Stopwatch::new(effective_timeout);
|
|
let cancel_token = stopwatch.cancellation_token();
|
|
let escalate_server = EscalateServer::new(
|
|
shell_program.as_ref().to_path_buf(),
|
|
execve_wrapper.as_ref().to_path_buf(),
|
|
escalation_policy_factory.create_policy(policy, stopwatch),
|
|
);
|
|
|
|
escalate_server
|
|
.exec(exec_params, cancel_token, sandbox_state, command_executor)
|
|
.await
|
|
}
|
|
|
|
async fn escalate_task(
|
|
socket: AsyncDatagramSocket,
|
|
policy: Arc<dyn EscalationPolicy>,
|
|
) -> anyhow::Result<()> {
|
|
loop {
|
|
let (_, mut fds) = socket.receive_with_fds().await?;
|
|
if fds.len() != 1 {
|
|
tracing::error!("expected 1 fd in datagram handshake, got {}", fds.len());
|
|
continue;
|
|
}
|
|
let stream_socket = AsyncSocket::from_fd(fds.remove(0))?;
|
|
let policy = policy.clone();
|
|
tokio::spawn(async move {
|
|
if let Err(err) = handle_escalate_session_with_policy(stream_socket, policy).await {
|
|
tracing::error!("escalate session failed: {err:?}");
|
|
}
|
|
});
|
|
}
|
|
}
|
|
|
|
async fn handle_escalate_session_with_policy(
|
|
socket: AsyncSocket,
|
|
policy: Arc<dyn EscalationPolicy>,
|
|
) -> anyhow::Result<()> {
|
|
let EscalateRequest {
|
|
file,
|
|
argv,
|
|
workdir,
|
|
env,
|
|
} = socket.receive::<EscalateRequest>().await?;
|
|
let file = PathBuf::from(&file).absolutize()?.into_owned();
|
|
let workdir = PathBuf::from(&workdir).absolutize()?.into_owned();
|
|
let action = policy
|
|
.determine_action(file.as_path(), &argv, &workdir)
|
|
.await
|
|
.context("failed to determine escalation action")?;
|
|
|
|
tracing::debug!("decided {action:?} for {file:?} {argv:?} {workdir:?}");
|
|
|
|
match action {
|
|
EscalateAction::Run => {
|
|
socket
|
|
.send(EscalateResponse {
|
|
action: EscalateAction::Run,
|
|
})
|
|
.await?;
|
|
}
|
|
EscalateAction::Escalate => {
|
|
socket
|
|
.send(EscalateResponse {
|
|
action: EscalateAction::Escalate,
|
|
})
|
|
.await?;
|
|
let (msg, fds) = socket
|
|
.receive_with_fds::<SuperExecMessage>()
|
|
.await
|
|
.context("failed to receive SuperExecMessage")?;
|
|
if fds.len() != msg.fds.len() {
|
|
return Err(anyhow::anyhow!(
|
|
"mismatched number of fds in SuperExecMessage: {} in the message, {} from the control message",
|
|
msg.fds.len(),
|
|
fds.len()
|
|
));
|
|
}
|
|
|
|
if msg
|
|
.fds
|
|
.iter()
|
|
.any(|src_fd| fds.iter().any(|dst_fd| dst_fd.as_raw_fd() == *src_fd))
|
|
{
|
|
return Err(anyhow::anyhow!(
|
|
"overlapping fds not yet supported in SuperExecMessage"
|
|
));
|
|
}
|
|
|
|
let mut command = Command::new(file);
|
|
command
|
|
.args(&argv[1..])
|
|
.arg0(argv[0].clone())
|
|
.envs(&env)
|
|
.current_dir(&workdir)
|
|
.stdin(Stdio::null())
|
|
.stdout(Stdio::null())
|
|
.stderr(Stdio::null());
|
|
unsafe {
|
|
command.pre_exec(move || {
|
|
for (dst_fd, src_fd) in msg.fds.iter().zip(&fds) {
|
|
libc::dup2(src_fd.as_raw_fd(), *dst_fd);
|
|
}
|
|
Ok(())
|
|
});
|
|
}
|
|
let mut child = command.spawn()?;
|
|
let exit_status = child.wait().await?;
|
|
socket
|
|
.send(SuperExecResult {
|
|
exit_code: exit_status.code().unwrap_or(127),
|
|
})
|
|
.await?;
|
|
}
|
|
EscalateAction::Deny { reason } => {
|
|
socket
|
|
.send(EscalateResponse {
|
|
action: EscalateAction::Deny { reason },
|
|
})
|
|
.await?;
|
|
}
|
|
}
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
use pretty_assertions::assert_eq;
|
|
use std::path::Path;
|
|
use std::path::PathBuf;
|
|
|
|
struct DeterministicEscalationPolicy {
|
|
action: EscalateAction,
|
|
}
|
|
|
|
#[async_trait::async_trait]
|
|
impl EscalationPolicy for DeterministicEscalationPolicy {
|
|
async fn determine_action(
|
|
&self,
|
|
_file: &Path,
|
|
_argv: &[String],
|
|
_workdir: &Path,
|
|
) -> anyhow::Result<EscalateAction> {
|
|
Ok(self.action.clone())
|
|
}
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn handle_escalate_session_respects_run_in_sandbox_decision() -> anyhow::Result<()> {
|
|
let (server, client) = AsyncSocket::pair()?;
|
|
let server_task = tokio::spawn(handle_escalate_session_with_policy(
|
|
server,
|
|
Arc::new(DeterministicEscalationPolicy {
|
|
action: EscalateAction::Run,
|
|
}),
|
|
));
|
|
|
|
let mut env = HashMap::new();
|
|
for i in 0..10 {
|
|
let value = "A".repeat(1024);
|
|
env.insert(format!("CODEX_TEST_VAR{i}"), value);
|
|
}
|
|
|
|
client
|
|
.send(EscalateRequest {
|
|
file: PathBuf::from("/bin/echo"),
|
|
argv: vec!["echo".to_string()],
|
|
workdir: PathBuf::from("/tmp"),
|
|
env,
|
|
})
|
|
.await?;
|
|
|
|
let response = client.receive::<EscalateResponse>().await?;
|
|
assert_eq!(
|
|
EscalateResponse {
|
|
action: EscalateAction::Run,
|
|
},
|
|
response
|
|
);
|
|
server_task.await?
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn handle_escalate_session_executes_escalated_command() -> anyhow::Result<()> {
|
|
let (server, client) = AsyncSocket::pair()?;
|
|
let server_task = tokio::spawn(handle_escalate_session_with_policy(
|
|
server,
|
|
Arc::new(DeterministicEscalationPolicy {
|
|
action: EscalateAction::Escalate,
|
|
}),
|
|
));
|
|
|
|
client
|
|
.send(EscalateRequest {
|
|
file: PathBuf::from("/bin/sh"),
|
|
argv: vec![
|
|
"sh".to_string(),
|
|
"-c".to_string(),
|
|
r#"if [ "$KEY" = VALUE ]; then exit 42; else exit 1; fi"#.to_string(),
|
|
],
|
|
workdir: std::env::current_dir()?,
|
|
env: HashMap::from([("KEY".to_string(), "VALUE".to_string())]),
|
|
})
|
|
.await?;
|
|
|
|
let response = client.receive::<EscalateResponse>().await?;
|
|
assert_eq!(
|
|
EscalateResponse {
|
|
action: EscalateAction::Escalate,
|
|
},
|
|
response
|
|
);
|
|
|
|
client
|
|
.send_with_fds(SuperExecMessage { fds: Vec::new() }, &[])
|
|
.await?;
|
|
|
|
let result = client.receive::<SuperExecResult>().await?;
|
|
assert_eq!(42, result.exit_code);
|
|
|
|
server_task.await?
|
|
}
|
|
}
|