This repository has been archived on 2025-09-14. You can view files and clone it, but cannot push or open issues or pull requests.
Files
tango-kni/entry/src/kni_maat.cpp

293 lines
9.8 KiB
C++
Raw Normal View History

2019-05-17 17:04:50 +08:00
#include "kni_utils.h"
#include "kni_maat.h"
2019-06-04 13:25:44 +08:00
2019-06-04 19:50:34 +08:00
/* default action:
1. read kni.conf
2. compile_id = 0
2019-06-04 13:25:44 +08:00
*/
2019-06-04 16:37:42 +08:00
enum kni_action g_maat_default_action;
int g_maat_default_log_option=1;
struct kni_maat_handle{
Maat_feather_t feather;
int tableid_intercept_ip;
int tableid_intercept_domain;
void *logger;
};
2019-05-17 17:04:50 +08:00
void kni_maat_destroy(struct kni_maat_handle *handle){
if(handle != NULL){
if(handle->feather != NULL){
Maat_burn_feather(handle->feather);
}
}
FREE(&handle);
}
2019-05-19 17:23:18 +08:00
void compile_ex_param_new(int idx, const struct Maat_rule_t* rule, const char* srv_def_large, MAAT_RULE_EX_DATA* ad, long argl, void *argp){
2019-05-21 17:14:07 +08:00
void *logger = argp;
unsigned char tmp=0;
2019-06-17 20:52:22 +08:00
KNI_LOG_DEBUG(logger, "call compile_ex_param_new");
2019-05-19 17:23:18 +08:00
if(rule->config_id == 0){
tmp=(unsigned char)rule->action;
enum kni_action action = (enum kni_action)tmp;
if(action==KNI_ACTION_INTERCEPT)
{
g_maat_default_action = KNI_ACTION_INTERCEPT;
KNI_LOG_INFO(logger, "Set default intercept action to intercept.");
}
else
{
g_maat_default_action = KNI_ACTION_BYPASS;
KNI_LOG_INFO(logger, "Set default intercept action to bypass.");
}
g_maat_default_log_option=rule->do_log;
2019-05-19 17:23:18 +08:00
}
return;
}
void compile_ex_param_free(int idx, const struct Maat_rule_t* rule, const char* srv_def_large, MAAT_RULE_EX_DATA* ad, long argl, void *argp){
2019-05-21 17:14:07 +08:00
void *logger = argp;
2019-06-17 20:52:22 +08:00
KNI_LOG_DEBUG(logger, "call compile_ex_param_free");
2019-05-19 17:23:18 +08:00
return;
}
void compile_ex_param_dup(int idx, MAAT_RULE_EX_DATA *to, MAAT_RULE_EX_DATA *from, long argl, void *argp){
2019-05-21 17:14:07 +08:00
void *logger = argp;
2019-06-17 20:52:22 +08:00
KNI_LOG_DEBUG(logger, "call compile_ex_param_dup");
2019-05-19 17:23:18 +08:00
return;
}
struct kni_maat_handle* kni_maat_init(const char* profile, void *logger, int thread_count){
2019-05-17 17:04:50 +08:00
const char *section = "maat";
int readconf_mode;
char tableinfo_path[KNI_PATH_MAX];
2019-05-19 17:23:18 +08:00
char tablename_intercept_ip[KNI_SYMBOL_MAX];
char tablename_intercept_domain[KNI_SYMBOL_MAX];
char maatjson_path[KNI_PATH_MAX];
char redis_ip[INET_ADDRSTRLEN];
int redis_port;
int redis_index;
Maat_feather_t feather = NULL;
int effective_interval_ms=1000;//1s
int tableid_intercept_ip = -1;
int tableid_intercept_domain = -1;
struct kni_maat_handle *handle = NULL;
int ret = MESA_load_profile_int_nodef(profile, section, "readconf_mode", &readconf_mode);
if(ret < 0){
KNI_LOG_ERROR(logger, "MESA_prof_load: readconf_mode not set, profile is %s, section is %s", profile, section);
goto error_out;
}
ret = MESA_load_profile_string_nodef(profile, section, "tableinfo_path", tableinfo_path, sizeof(tableinfo_path));
if(ret < 0){
KNI_LOG_ERROR(logger, "MESA_prof_load: tableinfo_path not set, profile is %s, section is %s", profile, section);
goto error_out;
}
ret = MESA_load_profile_string_nodef(profile, section, "tablename_intercept_ip", tablename_intercept_ip, sizeof(tablename_intercept_ip));
if(ret < 0){
KNI_LOG_ERROR(logger, "MESA_prof_load: tablename_intercept_ip not set, profile is %s, section is %s", profile, section);
goto error_out;
}
ret = MESA_load_profile_string_nodef(profile, section, "tablename_intercept_domain", tablename_intercept_domain, sizeof(tablename_intercept_domain));
if(ret < 0){
KNI_LOG_ERROR(logger, "MESA_prof_load: tablename_intercept_domain not set, profile is %s, section is %s", profile, section);
goto error_out;
}
2019-06-04 16:37:42 +08:00
ret = MESA_load_profile_int_nodef(profile, section, "default_action", (int*)&g_maat_default_action);
2019-06-04 15:38:27 +08:00
if(ret < 0){
KNI_LOG_ERROR(logger, "MESA_prof_load: default_action not set, profile is %s, section is %s", profile, section);
goto error_out;
}
2019-06-17 20:52:22 +08:00
KNI_LOG_ERROR(logger, "MESA_prof_load, [%s]:\n readconf_mode: %d\n tableinfo_path: %s\n tablename_intercept_ip: %s\n tablename_intercept_domain: %s\n"
2019-06-21 18:55:08 +08:00
"default_action: %d", section, readconf_mode, tableinfo_path, tablename_intercept_ip,
tablename_intercept_domain, g_maat_default_action);
feather = Maat_feather(thread_count, tableinfo_path, logger);
handle = ALLOC(struct kni_maat_handle, 1);
handle->feather = feather;
2019-05-17 17:04:50 +08:00
if(feather == NULL){
KNI_LOG_ERROR(logger, "Failed at Maat_feather, max_thread_num is %d, tableinfo_path is %s", thread_count, tableinfo_path);
2019-05-17 17:04:50 +08:00
return NULL;
}
Maat_set_feather_opt(feather, MAAT_OPT_EFFECT_INVERVAL_MS, &effective_interval_ms, sizeof(effective_interval_ms));
switch(readconf_mode){
case KNI_MAAT_READCONF_JSON:
ret = MESA_load_profile_string_nodef(profile, section, "maatjson_path", maatjson_path, sizeof(maatjson_path));
if(ret < 0){
KNI_LOG_ERROR(logger, "MESA_prof_load: maatjson_path not set, profile is %s, section is %s", profile, section);
goto error_out;
}
2019-06-17 20:52:22 +08:00
KNI_LOG_ERROR(logger, "MESA_prof_load, [%s]:\n maatjson_path: %s", section, maatjson_path);
Maat_set_feather_opt(feather, MAAT_OPT_JSON_FILE_PATH, maatjson_path, strlen(maatjson_path));
break;
case KNI_MAAT_READCONF_IRIS:
break;
case KNI_MAAT_READCONF_REDIS:
ret = MESA_load_profile_string_nodef(profile, section, "redis_ip", redis_ip, sizeof(redis_ip));
if(ret < 0){
KNI_LOG_ERROR(logger, "MESA_prof_load: redis_ip not set, profile is %s, section is %s", profile, section);
goto error_out;
}
ret = MESA_load_profile_int_nodef(profile, section, "redis_port", &redis_port);
if(ret < 0){
KNI_LOG_ERROR(logger, "MESA_prof_load: redis_port not set, profile is %s, section is %s", profile, section);
goto error_out;
}
ret = MESA_load_profile_int_nodef(profile, section, "redis_index", &redis_index);
if(ret < 0){
KNI_LOG_ERROR(logger, "MESA_prof_load: redis_index not set, profile is %s, section is %s", profile, section);
goto error_out;
}
2019-06-17 20:52:22 +08:00
KNI_LOG_ERROR(logger, "MESA_prof_load, [%s]:\n redis_ip: %s\n redis_port: %d\n redis_index: %d",
section, redis_ip, redis_port, redis_index);
Maat_set_feather_opt(feather, MAAT_OPT_REDIS_IP, (void*)redis_ip, strlen(redis_ip) + 1);
Maat_set_feather_opt(feather, MAAT_OPT_REDIS_PORT, (void*)&redis_port, sizeof(redis_port));
Maat_set_feather_opt(feather, MAAT_OPT_REDIS_INDEX, (void*)&redis_index, sizeof(redis_index));
break;
default:
break;
}
ret = Maat_initiate_feather(feather);
2019-05-17 17:04:50 +08:00
if(ret < 0){
KNI_LOG_ERROR(logger, "Failed at Maat_initiate_feather");
goto error_out;
2019-05-17 17:04:50 +08:00
}
tableid_intercept_ip = Maat_table_register(feather, tablename_intercept_ip);
tableid_intercept_domain = Maat_table_register(feather, tablename_intercept_domain);
2019-05-19 17:23:18 +08:00
if(tableid_intercept_ip < 0){
KNI_LOG_ERROR(logger, "Failed at Maat_table_register, tablename is %d, ret is %d",
tablename_intercept_ip, tableid_intercept_ip);
goto error_out;
2019-05-19 17:23:18 +08:00
}
if(tableid_intercept_domain < 0){
2019-05-17 17:04:50 +08:00
KNI_LOG_ERROR(logger, "Failed at Maat_table_register, tablename is %d, ret is %d",
2019-05-19 17:23:18 +08:00
tablename_intercept_domain, tableid_intercept_domain);
goto error_out;
2019-05-17 17:04:50 +08:00
}
ret = Maat_rule_get_ex_new_index(feather, "PXY_INTERCEPT_COMPILE", compile_ex_param_new, compile_ex_param_free, compile_ex_param_dup, 0, logger);
2019-05-19 17:23:18 +08:00
if(ret < 0){
KNI_LOG_ERROR(logger, "Failed at Maat_rule_get_ex_new_index, ret is %d", ret);
kni_maat_destroy(handle);
goto error_out;
2019-05-19 17:23:18 +08:00
}
handle->tableid_intercept_ip = tableid_intercept_ip;
handle->tableid_intercept_domain = tableid_intercept_domain;
2019-05-17 17:04:50 +08:00
handle->logger = logger;
return handle;
error_out:
kni_maat_destroy(handle);
return NULL;
2019-05-17 17:04:50 +08:00
}
2019-06-04 16:37:42 +08:00
static int index_of_enforce_policy(struct Maat_rule_t* result, size_t size)
{
size_t i = 0;
int biggest_intercept_policy_id = -1, ret_intercept_idx = -1;
int biggest_bypass_policy_id = -1, ret_bypass_idx = -1;
for(i = 0; i < size; i++)
2019-06-04 16:37:42 +08:00
{
if((unsigned char)result[i].action == KNI_ACTION_BYPASS)
2019-06-04 16:37:42 +08:00
{
if(result[i].config_id > biggest_bypass_policy_id)
{
biggest_bypass_policy_id = result[i].config_id;
ret_bypass_idx = i;
}
2019-06-04 16:37:42 +08:00
}
else
{
if(result[i].config_id > biggest_intercept_policy_id)
2019-06-04 16:37:42 +08:00
{
biggest_intercept_policy_id = result[i].config_id;
ret_intercept_idx = i;
2019-06-04 16:37:42 +08:00
}
2019-05-17 17:04:50 +08:00
}
}
if(biggest_bypass_policy_id != -1)
{
return ret_bypass_idx;
}
else
{
return ret_intercept_idx;
}
2019-05-17 17:04:50 +08:00
}
2019-06-06 17:07:17 +08:00
enum kni_action intercept_policy_scan(struct kni_maat_handle* handle, struct ipaddr *addr, char *domain, int domain_len,
int thread_seq, int *policy_id, int *do_log, int *is_hit_policy){
2019-06-04 16:37:42 +08:00
//return KNI_ACTION_INTERCEPT;
Maat_feather_t maat_feather=handle->feather;
int table_intercept_ip=handle->tableid_intercept_ip;
int table_intercept_domain=handle->tableid_intercept_domain;
struct Maat_rule_t result[KNI_MAAT_RULE_NUM_MAX];
scan_status_t scan_mid = NULL;
int scan_ret=0, hit_policy_cnt=0, enforced_policy_idx=0;
2019-06-04 19:50:34 +08:00
//tcp: 6, udp: 17, can't be 0
scan_ret = Maat_scan_proto_addr(maat_feather, table_intercept_ip, addr, 6,
2019-06-04 16:37:42 +08:00
result+hit_policy_cnt, KNI_MAAT_RULE_NUM_MAX-hit_policy_cnt,
&scan_mid, thread_seq);
if(scan_ret>0)
{
hit_policy_cnt+=scan_ret;
2019-05-17 17:04:50 +08:00
}
2019-06-04 16:37:42 +08:00
scan_ret = Maat_full_scan_string(maat_feather, table_intercept_domain, CHARSET_UTF8,
domain, domain_len,
result+hit_policy_cnt, NULL, KNI_MAAT_RULE_NUM_MAX-hit_policy_cnt,
&scan_mid, thread_seq);
if(scan_ret>0)
{
hit_policy_cnt+=scan_ret;
2019-06-04 15:38:27 +08:00
}
2019-06-04 16:37:42 +08:00
Maat_clean_status(&scan_mid);
if(hit_policy_cnt>0)
{
enforced_policy_idx=index_of_enforce_policy(result, hit_policy_cnt);
*policy_id = result[enforced_policy_idx].config_id;
*do_log = result[enforced_policy_idx].do_log;
2019-06-04 16:37:42 +08:00
*is_hit_policy=1;
2019-06-06 17:07:17 +08:00
unsigned char action = (unsigned char)result[enforced_policy_idx].action;
return (enum kni_action)action;
2019-05-17 17:04:50 +08:00
}
2019-06-04 16:37:42 +08:00
else
{
*policy_id=0;
*do_log=g_maat_default_log_option;
2019-06-04 15:38:27 +08:00
return g_maat_default_action;
}
2019-05-17 17:04:50 +08:00
}
2019-06-04 15:38:27 +08:00
/* action
0x00: none
0x01: monitor
0x02: intercept
0x10: reject
0x30: Manipulate
0x60: steer
0x80: bypass
*/
2019-06-14 11:13:15 +08:00
char* kni_maat_action_trans(enum kni_action action){
2019-06-04 15:38:27 +08:00
switch(action){
case 0x00:
2019-06-14 11:13:15 +08:00
return (char*)"none";
2019-06-04 15:38:27 +08:00
case 0x01:
2019-06-14 11:13:15 +08:00
return (char*)"monitor";
2019-06-04 15:38:27 +08:00
case 0x02:
2019-06-14 11:13:15 +08:00
return (char*)"intercept";
2019-06-04 15:38:27 +08:00
case 0x10:
2019-06-14 11:13:15 +08:00
return (char*)"reject";
2019-06-04 15:38:27 +08:00
case 0x30:
2019-06-14 11:13:15 +08:00
return (char*)"manipulate";
2019-06-04 15:38:27 +08:00
case 0x60:
2019-06-14 11:13:15 +08:00
return (char*)"steer";
2019-06-04 15:38:27 +08:00
case 0x80:
2019-06-14 11:13:15 +08:00
return (char*)"bypass";
2019-06-04 15:38:27 +08:00
default:
2019-06-14 11:13:15 +08:00
return (char*)"unknown";
2019-06-04 15:38:27 +08:00
}
}