mirror of
https://github.com/safing/portmaster
synced 2025-09-01 18:19:12 +00:00
51 lines
999 B
Go
51 lines
999 B
Go
package interception
|
|
|
|
import (
|
|
"flag"
|
|
|
|
"github.com/safing/portbase/log"
|
|
"github.com/safing/portmaster/network/packet"
|
|
)
|
|
|
|
var (
|
|
// Packets channel for feeding the firewall.
|
|
Packets = make(chan packet.Packet, 1000)
|
|
|
|
disableInterception bool
|
|
)
|
|
|
|
func init() {
|
|
flag.BoolVar(&disableInterception, "disable-interception", false, "disable packet interception; this breaks a lot of functionality")
|
|
}
|
|
|
|
// Start starts the interception.
|
|
func Start() error {
|
|
if disableInterception {
|
|
log.Warning("interception: packet interception is disabled via flag - this breaks a lot of functionality")
|
|
return nil
|
|
}
|
|
|
|
var inputPackets = Packets
|
|
if packetMetricsDestination != "" {
|
|
go metrics.writeMetrics()
|
|
inputPackets = make(chan packet.Packet)
|
|
go func() {
|
|
for p := range inputPackets {
|
|
Packets <- tracePacket(p)
|
|
}
|
|
}()
|
|
}
|
|
|
|
return start(inputPackets)
|
|
}
|
|
|
|
// Stop starts the interception.
|
|
func Stop() error {
|
|
if disableInterception {
|
|
return nil
|
|
}
|
|
|
|
close(metrics.done)
|
|
|
|
return stop()
|
|
}
|