mirror of
https://github.com/kubeshark/kubeshark.git
synced 2025-06-25 15:54:43 +00:00
* avoid chunks with invalid address * tls tapper should distict between pids * prettfy tls verbose log and tls key * support tls from multi threads + duplicate calls to the same target * introduce fdCache and user address pair as tls key * remove unused comment * fix merge conflicts * use lru for fdcache * pr fixes - renaming * fix conflict issue
176 lines
3.8 KiB
Go
176 lines
3.8 KiB
Go
package tlstapper
|
|
|
|
import (
|
|
"sync"
|
|
|
|
"github.com/cilium/ebpf/rlimit"
|
|
"github.com/go-errors/errors"
|
|
"github.com/up9inc/mizu/logger"
|
|
"github.com/up9inc/mizu/tap/api"
|
|
)
|
|
|
|
const GLOABL_TAP_PID = 0
|
|
|
|
//go:generate go run github.com/cilium/ebpf/cmd/bpf2go tlsTapper bpf/tls_tapper.c -- -O2 -g -D__TARGET_ARCH_x86
|
|
|
|
type TlsTapper struct {
|
|
bpfObjects tlsTapperObjects
|
|
syscallHooks syscallHooks
|
|
sslHooksStructs []sslHooks
|
|
poller *tlsPoller
|
|
bpfLogger *bpfLogger
|
|
registeredPids sync.Map
|
|
}
|
|
|
|
func (t *TlsTapper) Init(chunksBufferSize int, logBufferSize int, procfs string, extension *api.Extension) error {
|
|
logger.Log.Infof("Initializing tls tapper (chunksSize: %d) (logSize: %d)", chunksBufferSize, logBufferSize)
|
|
|
|
if err := setupRLimit(); err != nil {
|
|
return err
|
|
}
|
|
|
|
t.bpfObjects = tlsTapperObjects{}
|
|
if err := loadTlsTapperObjects(&t.bpfObjects, nil); err != nil {
|
|
return errors.Wrap(err, 0)
|
|
}
|
|
|
|
t.syscallHooks = syscallHooks{}
|
|
if err := t.syscallHooks.installSyscallHooks(&t.bpfObjects); err != nil {
|
|
return err
|
|
}
|
|
|
|
t.sslHooksStructs = make([]sslHooks, 0)
|
|
|
|
t.bpfLogger = newBpfLogger()
|
|
if err := t.bpfLogger.init(&t.bpfObjects, logBufferSize); err != nil {
|
|
return err
|
|
}
|
|
|
|
var err error
|
|
t.poller, err = newTlsPoller(t, extension, procfs)
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return t.poller.init(&t.bpfObjects, chunksBufferSize)
|
|
}
|
|
|
|
func (t *TlsTapper) Poll(emitter api.Emitter, options *api.TrafficFilteringOptions, streamsMap api.TcpStreamMap) {
|
|
t.poller.poll(emitter, options, streamsMap)
|
|
}
|
|
|
|
func (t *TlsTapper) PollForLogging() {
|
|
t.bpfLogger.poll()
|
|
}
|
|
|
|
func (t *TlsTapper) GlobalTap(sslLibrary string) error {
|
|
return t.tapPid(GLOABL_TAP_PID, sslLibrary, api.UNKNOWN_NAMESPACE)
|
|
}
|
|
|
|
func (t *TlsTapper) AddPid(procfs string, pid uint32, namespace string) error {
|
|
sslLibrary, err := findSsllib(procfs, pid)
|
|
|
|
if err != nil {
|
|
logger.Log.Infof("PID skipped no libssl.so found (pid: %d) %v", pid, err)
|
|
return nil // hide the error on purpose, its OK for a process to not use libssl.so
|
|
}
|
|
|
|
return t.tapPid(pid, sslLibrary, namespace)
|
|
}
|
|
|
|
func (t *TlsTapper) RemovePid(pid uint32) error {
|
|
logger.Log.Infof("Removing PID (pid: %v)", pid)
|
|
|
|
pids := t.bpfObjects.tlsTapperMaps.PidsMap
|
|
|
|
if err := pids.Delete(pid); err != nil {
|
|
return errors.Wrap(err, 0)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (t *TlsTapper) ClearPids() {
|
|
t.poller.clearPids()
|
|
t.registeredPids.Range(func(key, v interface{}) bool {
|
|
pid := key.(uint32)
|
|
if pid == GLOABL_TAP_PID {
|
|
return true
|
|
}
|
|
|
|
if err := t.RemovePid(pid); err != nil {
|
|
LogError(err)
|
|
}
|
|
t.registeredPids.Delete(key)
|
|
return true
|
|
})
|
|
}
|
|
|
|
func (t *TlsTapper) Close() []error {
|
|
errors := make([]error, 0)
|
|
|
|
if err := t.bpfObjects.Close(); err != nil {
|
|
errors = append(errors, err)
|
|
}
|
|
|
|
errors = append(errors, t.syscallHooks.close()...)
|
|
|
|
for _, sslHooks := range t.sslHooksStructs {
|
|
errors = append(errors, sslHooks.close()...)
|
|
}
|
|
|
|
if err := t.bpfLogger.close(); err != nil {
|
|
errors = append(errors, err)
|
|
}
|
|
|
|
if err := t.poller.close(); err != nil {
|
|
errors = append(errors, err)
|
|
}
|
|
|
|
return errors
|
|
}
|
|
|
|
func setupRLimit() error {
|
|
err := rlimit.RemoveMemlock()
|
|
|
|
if err != nil {
|
|
return errors.Wrap(err, 0)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (t *TlsTapper) tapPid(pid uint32, sslLibrary string, namespace string) error {
|
|
logger.Log.Infof("Tapping TLS (pid: %v) (sslLibrary: %v)", pid, sslLibrary)
|
|
|
|
newSsl := sslHooks{}
|
|
|
|
if err := newSsl.installUprobes(&t.bpfObjects, sslLibrary); err != nil {
|
|
return err
|
|
}
|
|
|
|
t.sslHooksStructs = append(t.sslHooksStructs, newSsl)
|
|
|
|
t.poller.addPid(pid, namespace)
|
|
|
|
pids := t.bpfObjects.tlsTapperMaps.PidsMap
|
|
|
|
if err := pids.Put(pid, uint32(1)); err != nil {
|
|
return errors.Wrap(err, 0)
|
|
}
|
|
|
|
t.registeredPids.Store(pid, true)
|
|
|
|
return nil
|
|
}
|
|
|
|
func LogError(err error) {
|
|
var e *errors.Error
|
|
if errors.As(err, &e) {
|
|
logger.Log.Errorf("Error: %v", e.ErrorStack())
|
|
} else {
|
|
logger.Log.Errorf("Error: %v", err)
|
|
}
|
|
}
|