mirror of
https://github.com/safing/portmaster
synced 2025-04-20 10:59:10 +00:00
* Move portbase into monorepo * Add new simple module mgr * [WIP] Switch to new simple module mgr * Add StateMgr and more worker variants * [WIP] Switch more modules * [WIP] Switch more modules * [WIP] swtich more modules * [WIP] switch all SPN modules * [WIP] switch all service modules * [WIP] Convert all workers to the new module system * [WIP] add new task system to module manager * [WIP] Add second take for scheduling workers * [WIP] Add FIXME for bugs in new scheduler * [WIP] Add minor improvements to scheduler * [WIP] Add new worker scheduler * [WIP] Fix more bug related to new module system * [WIP] Fix start handing of the new module system * [WIP] Improve startup process * [WIP] Fix minor issues * [WIP] Fix missing subsystem in settings * [WIP] Initialize managers in constructor * [WIP] Move module event initialization to constrictors * [WIP] Fix setting for enabling and disabling the SPN module * [WIP] Move API registeration into module construction * [WIP] Update states mgr for all modules * [WIP] Add CmdLine operation support * Add state helper methods to module group and instance * Add notification and module status handling to status package * Fix starting issues * Remove pilot widget and update security lock to new status data * Remove debug logs * Improve http server shutdown * Add workaround for cleanly shutting down firewall+netquery * Improve logging * Add syncing states with notifications for new module system * Improve starting, stopping, shutdown; resolve FIXMEs/TODOs * [WIP] Fix most unit tests * Review new module system and fix minor issues * Push shutdown and restart events again via API * Set sleep mode via interface * Update example/template module * [WIP] Fix spn/cabin unit test * Remove deprecated UI elements * Make log output more similar for the logging transition phase * Switch spn hub and observer cmds to new module system * Fix log sources * Make worker mgr less error prone * Fix tests and minor issues * Fix observation hub * Improve shutdown and restart handling * Split up big connection.go source file * Move varint and dsd packages to structures repo * Improve expansion test * Fix linter warnings * Fix interception module on windows * Fix linter errors --------- Co-authored-by: Vladimir Stoilov <vladimir@safing.io>
172 lines
3.6 KiB
Go
172 lines
3.6 KiB
Go
package network
|
|
|
|
import (
|
|
"github.com/safing/portmaster/base/api"
|
|
"github.com/safing/portmaster/base/config"
|
|
"github.com/safing/portmaster/base/metrics"
|
|
"github.com/safing/portmaster/service/process"
|
|
)
|
|
|
|
var (
|
|
packetHandlingHistogram *metrics.Histogram
|
|
blockedOutConnCounter *metrics.Counter
|
|
encryptedAndTunneledOutConnCounter *metrics.Counter
|
|
encryptedOutConnCounter *metrics.Counter
|
|
tunneledOutConnCounter *metrics.Counter
|
|
outConnCounter *metrics.Counter
|
|
)
|
|
|
|
func registerMetrics() (err error) {
|
|
// This needed to be moved here, because every packet is now handled by the
|
|
// connection handler worker.
|
|
packetHandlingHistogram, err = metrics.NewHistogram(
|
|
"firewall/handling/duration/seconds",
|
|
nil,
|
|
&metrics.Options{
|
|
Permission: api.PermitUser,
|
|
ExpertiseLevel: config.ExpertiseLevelExpert,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
_, err = metrics.NewGauge(
|
|
"network/connections/active/total",
|
|
nil,
|
|
func() float64 {
|
|
return float64(conns.active())
|
|
},
|
|
&metrics.Options{
|
|
InternalID: "active_connections",
|
|
Permission: api.PermitUser,
|
|
ExpertiseLevel: config.ExpertiseLevelUser,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
connCounterID := "network/connections/total"
|
|
connCounterOpts := &metrics.Options{
|
|
Name: "Connections",
|
|
Permission: api.PermitUser,
|
|
ExpertiseLevel: config.ExpertiseLevelUser,
|
|
Persist: true,
|
|
}
|
|
|
|
blockedOutConnCounter, err = metrics.NewCounter(
|
|
connCounterID,
|
|
map[string]string{
|
|
"direction": "out",
|
|
"blocked": "true",
|
|
},
|
|
&metrics.Options{
|
|
Name: "Connections",
|
|
InternalID: "blocked_outgoing_connections",
|
|
Permission: api.PermitUser,
|
|
ExpertiseLevel: config.ExpertiseLevelUser,
|
|
Persist: true,
|
|
},
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
encryptedAndTunneledOutConnCounter, err = metrics.NewCounter(
|
|
connCounterID,
|
|
map[string]string{
|
|
"direction": "out",
|
|
"encrypted": "true",
|
|
"tunneled": "true",
|
|
},
|
|
connCounterOpts,
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
encryptedOutConnCounter, err = metrics.NewCounter(
|
|
connCounterID,
|
|
map[string]string{
|
|
"direction": "out",
|
|
"encrypted": "true",
|
|
},
|
|
connCounterOpts,
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
tunneledOutConnCounter, err = metrics.NewCounter(
|
|
connCounterID,
|
|
map[string]string{
|
|
"direction": "out",
|
|
"tunneled": "true",
|
|
},
|
|
connCounterOpts,
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
outConnCounter, err = metrics.NewCounter(
|
|
connCounterID,
|
|
map[string]string{
|
|
"direction": "out",
|
|
},
|
|
connCounterOpts,
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (conn *Connection) addToMetrics() {
|
|
if conn.addedToMetrics {
|
|
return
|
|
}
|
|
|
|
// Don't count requests serviced to the network,
|
|
// as we have an incomplete view here.
|
|
if conn.Process() != nil &&
|
|
conn.Process().Pid == process.NetworkHostProcessID {
|
|
return
|
|
}
|
|
|
|
// Only count outgoing connections for now.
|
|
if conn.Inbound {
|
|
return
|
|
}
|
|
|
|
// Check the verdict.
|
|
switch conn.Verdict { //nolint:exhaustive // Not critical.
|
|
case VerdictBlock, VerdictDrop:
|
|
blockedOutConnCounter.Inc()
|
|
conn.addedToMetrics = true
|
|
return
|
|
case VerdictAccept, VerdictRerouteToTunnel:
|
|
// Continue to next section.
|
|
default:
|
|
// Connection is not counted.
|
|
return
|
|
}
|
|
|
|
// Only count successful connections, not DNS requests.
|
|
if conn.Type == DNSRequest {
|
|
return
|
|
}
|
|
|
|
// Select counter based on attributes.
|
|
switch {
|
|
case conn.Encrypted && conn.Tunneled:
|
|
encryptedAndTunneledOutConnCounter.Inc()
|
|
case conn.Encrypted:
|
|
encryptedOutConnCounter.Inc()
|
|
case conn.Tunneled:
|
|
tunneledOutConnCounter.Inc()
|
|
default:
|
|
outConnCounter.Inc()
|
|
}
|
|
conn.addedToMetrics = true
|
|
}
|