-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy pathonline.go
117 lines (100 loc) · 3.15 KB
/
online.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
package miner
import (
"time"
"github.com/google/gopacket"
)
// TODO: Maybe the support of PF_RING must be given up
// since it requires kernel modules. I would prefer a
// standalone binary first (full static with musl and libpcap)
// The support of PF_RING can be optional according to the
// user system.
// I should look at the AD_XDP socket.
// if iface {
// in case of network interface
// use PF_RING
// flag := pfring.FlagTimestamp
// if promiscuous {
// flag = flag | pfring.FlagPromisc
// }
// ringHandle, err = pfring.NewRing(device, uint32(snapshotLen), flag)
// if err != nil {
// return nil, err
// }
// PF_RING has a ton of optimizations and tweaks to
// make sure you get just the packets you want. For
// example, if you're only using pfring to read packets,
// consider running:
// ringHandle.SetSocketMode(pfring.ReadOnly)
// If you only care about packets received on your
// interface (not those transmitted by the interface),
// you can run:
// ringHandle.SetDirection(pfring.ReceiveOnly)
// if err = ringHandle.Enable(); err != nil { // Must do this!, or you get no packets!
// return nil, err
// }
// return gopacket.NewPacketSource(ringHandle, layers.LinkTypeEthernet), nil
// handle, err = pcap.OpenLive(device, snapshotLen, promiscuous, 1*time.Millisecond)
// if err != nil {
// minerLogger.Error().Msgf("Error while opening device: %v", err)
// return nil, err
// }
// return gopacket.NewPacketSource(handle, handle.LinkType()), nil
// }
// Otherwise use libpcap
// handle, err = pcap.OpenOffline(device)
// if err != nil {
// minerLogger.Error().Msgf("Error while opening device: %v", err)
// return nil, err
// }
// // init the packet source from the handler
// return gopacket.NewPacketSource(handle, handle.LinkType()), nil
// }
//TODO: In live case, if no packet arrives on the interface, the time
// is not updated, so sometimes no logs are flushed.
// sniffOnline opens an interface and starts to sniff.
// It sends counters snapshot at given period
func sniffOnline(packetChan chan gopacket.Packet,
period time.Duration,
data DataChannel) error {
// set the flush tick
tick := time.NewTicker(period)
// tick := time.Tick(period)
// now we are sniffing!
minerLogger.Debug().Msgf("Sniffing interface...")
sniffing.Begin()
// set running to false when exits
defer release()
// loop over the incoming packets
for {
select {
// periodic flush
case st := <-tick.C:
sourceTime.Set(st)
dispatcher.terminate()
data <- dispatcher.flushAll()
// manage events
case e := <-internalEventChannel:
switch e {
case STOP:
// the counters are stopped
minerLogger.Debug().Msg("Receiving STOP")
dispatcher.terminate()
return nil
default:
minerLogger.Debug().Msgf("Receiving unknown event (%v)", e)
}
// parse packet
case packet, ok := <-packetChan:
// check whether it is the last packet or not
// if there is no packet anymore, we stop it
if !ok {
minerLogger.Info().Msgf("No packets to parse anymore (%d parsed packets).",
dispatcher.receivedPackets)
dispatcher.terminate()
return nil
}
// in real packet case, dispatch the packet to the counters
dispatcher.dispatch(packet)
}
}
}