Collect env, tags and and matching path for processes

This commit is contained in:
Daniel
2022-10-03 22:11:40 +02:00
parent 59f776ce2f
commit d60329e130
3 changed files with 175 additions and 32 deletions

View File

@@ -42,14 +42,18 @@ type Process struct {
Cwd string Cwd string
CmdLine string CmdLine string
FirstArg string FirstArg string
Env map[string]string
// SpecialDetail holds special information, the meaning of which can change
// based on any of the previous attributes.
SpecialDetail string
// Profile attributes. // Profile attributes.
// Once set, these don't change; safe for concurrent access. // Once set, these don't change; safe for concurrent access.
// Tags holds extended information about the (virtual) process, which is used
// to find a profile.
Tags []profile.Tag
// MatchingPath holds an alternative binary path that can be used to find a
// profile.
MatchingPath string
// PrimaryProfileID holds the scoped ID of the primary profile. // PrimaryProfileID holds the scoped ID of the primary profile.
PrimaryProfileID string PrimaryProfileID string
// profile holds the layered profile based on the primary profile. // profile holds the layered profile based on the primary profile.
@@ -177,7 +181,7 @@ func loadProcess(ctx context.Context, pid int) (*Process, error) {
} }
// Get process information from the system. // Get process information from the system.
pInfo, err := processInfo.NewProcess(int32(pid)) pInfo, err := processInfo.NewProcessWithContext(ctx, int32(pid))
if err != nil { if err != nil {
return nil, err return nil, err
} }
@@ -186,7 +190,7 @@ func loadProcess(ctx context.Context, pid int) (*Process, error) {
// net yet implemented for windows // net yet implemented for windows
if onLinux { if onLinux {
var uids []int32 var uids []int32
uids, err = pInfo.Uids() uids, err = pInfo.UidsWithContext(ctx)
if err != nil { if err != nil {
return nil, fmt.Errorf("failed to get UID for p%d: %w", pid, err) return nil, fmt.Errorf("failed to get UID for p%d: %w", pid, err)
} }
@@ -194,7 +198,7 @@ func loadProcess(ctx context.Context, pid int) (*Process, error) {
} }
// Username // Username
process.UserName, err = pInfo.Username() process.UserName, err = pInfo.UsernameWithContext(ctx)
if err != nil { if err != nil {
return nil, fmt.Errorf("process: failed to get Username for p%d: %w", pid, err) return nil, fmt.Errorf("process: failed to get Username for p%d: %w", pid, err)
} }
@@ -203,14 +207,14 @@ func loadProcess(ctx context.Context, pid int) (*Process, error) {
// new.UserHome, err = // new.UserHome, err =
// PPID // PPID
ppid, err := pInfo.Ppid() ppid, err := pInfo.PpidWithContext(ctx)
if err != nil { if err != nil {
return nil, fmt.Errorf("failed to get PPID for p%d: %w", pid, err) return nil, fmt.Errorf("failed to get PPID for p%d: %w", pid, err)
} }
process.ParentPid = int(ppid) process.ParentPid = int(ppid)
// Path // Path
process.Path, err = pInfo.Exe() process.Path, err = pInfo.ExeWithContext(ctx)
if err != nil { if err != nil {
return nil, fmt.Errorf("failed to get Path for p%d: %w", pid, err) return nil, fmt.Errorf("failed to get Path for p%d: %w", pid, err)
} }
@@ -229,13 +233,13 @@ func loadProcess(ctx context.Context, pid int) (*Process, error) {
// } // }
// Command line arguments // Command line arguments
process.CmdLine, err = pInfo.Cmdline() process.CmdLine, err = pInfo.CmdlineWithContext(ctx)
if err != nil { if err != nil {
return nil, fmt.Errorf("failed to get Cmdline for p%d: %w", pid, err) return nil, fmt.Errorf("failed to get Cmdline for p%d: %w", pid, err)
} }
// Name // Name
process.Name, err = pInfo.Name() process.Name, err = pInfo.NameWithContext(ctx)
if err != nil { if err != nil {
return nil, fmt.Errorf("failed to get Name for p%d: %w", pid, err) return nil, fmt.Errorf("failed to get Name for p%d: %w", pid, err)
} }
@@ -243,9 +247,48 @@ func loadProcess(ctx context.Context, pid int) (*Process, error) {
process.Name = process.ExecName process.Name = process.ExecName
} }
// OS specifics // Get all environment variables
process.specialOSInit() env, err := pInfo.EnvironWithContext(ctx)
if err != nil {
return nil, fmt.Errorf("failed to get the environment for p%d: %w", pid, err)
}
// Split env variables in key and value.
process.Env = make(map[string]string, len(env))
for _, entry := range env {
splitted := strings.SplitN(entry, "=", 2)
if len(splitted) == 2 {
process.Env[strings.Trim(splitted[0], `'"`)] = strings.Trim(splitted[1], `'"`)
}
}
// Add process tags.
process.addTags()
if len(process.Tags) > 0 {
log.Tracer(ctx).Debugf("profile: added tags: %+v", process.Tags)
}
process.Save() process.Save()
return process, nil return process, nil
} }
// MatchingData returns the matching data for the process.
func (p *Process) MatchingData() *MatchingData {
return &MatchingData{p}
}
// MatchingData provides a interface compatible view on the process for profile matching.
type MatchingData struct {
p *Process
}
// Tags returns process.Tags.
func (md *MatchingData) Tags() []profile.Tag { return md.p.Tags }
// Env returns process.Env.
func (md *MatchingData) Env() map[string]string { return md.p.Env }
// Path returns process.Path.
func (md *MatchingData) Path() string { return md.p.Path }
// MatchingPath returns process.MatchingPath.
func (md *MatchingData) MatchingPath() string { return md.p.MatchingPath }

View File

@@ -2,6 +2,7 @@ package process
import ( import (
"context" "context"
"fmt"
"os" "os"
"runtime" "runtime"
"strings" "strings"
@@ -29,25 +30,48 @@ func (p *Process) GetProfile(ctx context.Context) (changed bool, err error) {
// If not, continue with loading the profile. // If not, continue with loading the profile.
log.Tracer(ctx).Trace("process: loading profile") log.Tracer(ctx).Trace("process: loading profile")
// Check if there is a special profile for this process.
localProfile, err := p.loadSpecialProfile(ctx)
if err != nil {
return false, fmt.Errorf("failed to load special profile: %w", err)
}
// Otherwise, find a regular profile for the process.
if localProfile == nil {
localProfile, err = profile.GetLocalProfile("", p.MatchingData(), p.CreateProfileCallback)
if err != nil {
return false, fmt.Errorf("failed to find profile: %w", err)
}
}
// Assign profile to process.
p.PrimaryProfileID = localProfile.ScopedID()
p.profile = localProfile.LayeredProfile()
return true, nil
}
// loadSpecialProfile attempts to load a special profile.
func (p *Process) loadSpecialProfile(_ context.Context) (*profile.Profile, error) {
// Check if we need a special profile. // Check if we need a special profile.
profileID := "" var specialProfileID string
switch p.Pid { switch p.Pid {
case UnidentifiedProcessID: case UnidentifiedProcessID:
profileID = profile.UnidentifiedProfileID specialProfileID = profile.UnidentifiedProfileID
case UnsolicitedProcessID: case UnsolicitedProcessID:
profileID = profile.UnsolicitedProfileID specialProfileID = profile.UnsolicitedProfileID
case SystemProcessID: case SystemProcessID:
profileID = profile.SystemProfileID specialProfileID = profile.SystemProfileID
case ownPID: case ownPID:
profileID = profile.PortmasterProfileID specialProfileID = profile.PortmasterProfileID
default: default:
// Check if this is another Portmaster component. // Check if this is another Portmaster component.
if updatesPath != "" && strings.HasPrefix(p.Path, updatesPath) { if updatesPath != "" && strings.HasPrefix(p.Path, updatesPath) {
switch { switch {
case strings.Contains(p.Path, "portmaster-app"): case strings.Contains(p.Path, "portmaster-app"):
profileID = profile.PortmasterAppProfileID specialProfileID = profile.PortmasterAppProfileID
case strings.Contains(p.Path, "portmaster-notifier"): case strings.Contains(p.Path, "portmaster-notifier"):
profileID = profile.PortmasterNotifierProfileID specialProfileID = profile.PortmasterNotifierProfileID
default: default:
// Unexpected binary from within the Portmaster updates directpry. // Unexpected binary from within the Portmaster updates directpry.
log.Warningf("process: unexpected binary in the updates directory: %s", p.Path) log.Warningf("process: unexpected binary in the updates directory: %s", p.Path)
@@ -62,10 +86,10 @@ func (p *Process) GetProfile(ctx context.Context) (changed bool, err error) {
if (p.Path == `C:\Windows\System32\svchost.exe` || if (p.Path == `C:\Windows\System32\svchost.exe` ||
p.Path == `C:\Windows\system32\svchost.exe`) && p.Path == `C:\Windows\system32\svchost.exe`) &&
// This comes from the windows tasklist command and should be pretty consistent. // This comes from the windows tasklist command and should be pretty consistent.
(strings.Contains(p.SpecialDetail, "Dnscache") || (profile.KeyAndValueInTags(p.Tags, "svchost", "Dnscache") ||
// As an alternative in case of failure, we try to match the svchost.exe service parameter. // As an alternative in case of failure, we try to match the svchost.exe service parameter.
strings.Contains(p.CmdLine, "-s Dnscache")) { strings.Contains(p.CmdLine, "-s Dnscache")) {
profileID = profile.SystemResolverProfileID specialProfileID = profile.SystemResolverProfileID
} }
case "linux": case "linux":
switch p.Path { switch p.Path {
@@ -77,22 +101,18 @@ func (p *Process) GetProfile(ctx context.Context) (changed bool, err error) {
"/usr/sbin/nscd", "/usr/sbin/nscd",
"/usr/bin/dnsmasq", "/usr/bin/dnsmasq",
"/usr/sbin/dnsmasq": "/usr/sbin/dnsmasq":
profileID = profile.SystemResolverProfileID specialProfileID = profile.SystemResolverProfileID
} }
} }
} }
// Get the (linked) local profile. // Check if a special profile should be applied.
localProfile, err := profile.GetProfile(profile.SourceLocal, profileID, p.Path, false) if specialProfileID == "" {
if err != nil { return nil, nil
return false, err
} }
// Assign profile to process. // Return special profile.
p.PrimaryProfileID = localProfile.ScopedID() return profile.GetSpecialProfile(specialProfileID, p.Path)
p.profile = localProfile.LayeredProfile()
return true, nil
} }
// UpdateProfileMetadata updates the metadata of the local profile // UpdateProfileMetadata updates the metadata of the local profile

80
process/tags.go Normal file
View File

@@ -0,0 +1,80 @@
package process
import (
"errors"
"sync"
"github.com/safing/portmaster/profile"
)
var (
tagRegistry []TagHandler
tagRegistryLock sync.RWMutex
)
// TagHandler is a collection of process tag related interfaces.
type TagHandler interface {
// Name returns the tag handler name.
Name() string
// TagDescriptions returns a list of all possible tags and their description
// of this handler.
TagDescriptions() []TagDescription
// AddTags adds tags to the given process.
AddTags(p *Process)
// CreateProfile creates a profile based on the tags of the process.
// Returns nil to skip.
CreateProfile(p *Process) *profile.Profile
}
// TagDescription describes a tag.
type TagDescription struct {
ID string
Name string
Description string
}
// RegisterTagHandler registers a tag handler.
func RegisterTagHandler(th TagHandler) error {
tagRegistryLock.Lock()
defer tagRegistryLock.Unlock()
// Check if the handler is already registered.
for _, existingTH := range tagRegistry {
if th.Name() == existingTH.Name() {
return errors.New("already registered")
}
}
tagRegistry = append(tagRegistry, th)
return nil
}
func (p *Process) addTags() {
tagRegistryLock.RLock()
defer tagRegistryLock.RUnlock()
for _, th := range tagRegistry {
th.AddTags(p)
}
}
// CreateProfileCallback attempts to create a profile on special attributes
// of the process.
func (p *Process) CreateProfileCallback() *profile.Profile {
tagRegistryLock.RLock()
defer tagRegistryLock.RUnlock()
// Go through handlers and see which one wants to create a profile.
for _, th := range tagRegistry {
newProfile := th.CreateProfile(p)
if newProfile != nil {
return newProfile
}
}
// No handler wanted to create a profile.
return nil
}