2023-01-27 21:37:20 +00:00
|
|
|
// Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2021-08-19 00:17:41 +01:00
|
|
|
//go:build darwin && !ios
|
2020-02-05 22:16:58 +00:00
|
|
|
|
|
|
|
package portlist
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"bytes"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
2020-11-18 16:38:31 +00:00
|
|
|
"os/exec"
|
2020-02-05 22:16:58 +00:00
|
|
|
"strings"
|
2020-05-12 00:12:26 +01:00
|
|
|
"sync/atomic"
|
2020-03-14 03:53:58 +00:00
|
|
|
"time"
|
2022-11-04 13:41:36 +00:00
|
|
|
|
|
|
|
"go4.org/mem"
|
2020-02-05 22:16:58 +00:00
|
|
|
)
|
|
|
|
|
2022-11-04 13:41:36 +00:00
|
|
|
func init() {
|
|
|
|
newOSImpl = newMacOSImpl
|
|
|
|
|
|
|
|
// We have to run netstat, which is a bit expensive, so don't do it too often.
|
|
|
|
pollInterval = 5 * time.Second
|
|
|
|
}
|
|
|
|
|
|
|
|
type macOSImpl struct {
|
|
|
|
known map[protoPort]*portMeta // inode string => metadata
|
|
|
|
netstatPath string // lazily populated
|
|
|
|
|
2023-05-24 17:52:45 +01:00
|
|
|
br *bufio.Reader // reused
|
|
|
|
portsBuf []Port
|
|
|
|
includeLocalhost bool
|
2022-11-04 13:41:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type protoPort struct {
|
|
|
|
proto string
|
|
|
|
port uint16
|
|
|
|
}
|
|
|
|
|
|
|
|
type portMeta struct {
|
|
|
|
port Port
|
|
|
|
keep bool
|
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2023-05-24 17:52:45 +01:00
|
|
|
func newMacOSImpl(includeLocalhost bool) osImpl {
|
2022-11-04 13:41:36 +00:00
|
|
|
return &macOSImpl{
|
2023-05-24 17:52:45 +01:00
|
|
|
known: map[protoPort]*portMeta{},
|
|
|
|
br: bufio.NewReader(bytes.NewReader(nil)),
|
|
|
|
includeLocalhost: includeLocalhost,
|
2022-11-04 13:41:36 +00:00
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2022-11-04 13:41:36 +00:00
|
|
|
func (*macOSImpl) Close() error { return nil }
|
|
|
|
|
|
|
|
func (im *macOSImpl) AppendListeningPorts(base []Port) ([]Port, error) {
|
|
|
|
var err error
|
|
|
|
im.portsBuf, err = im.appendListeningPortsNetstat(im.portsBuf[:0])
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, pm := range im.known {
|
|
|
|
pm.keep = false
|
|
|
|
}
|
|
|
|
|
|
|
|
var needProcs bool
|
|
|
|
for _, p := range im.portsBuf {
|
|
|
|
fp := protoPort{
|
|
|
|
proto: p.Proto,
|
|
|
|
port: p.Port,
|
|
|
|
}
|
|
|
|
if pm, ok := im.known[fp]; ok {
|
|
|
|
pm.keep = true
|
|
|
|
} else {
|
|
|
|
needProcs = true
|
|
|
|
im.known[fp] = &portMeta{
|
|
|
|
port: p,
|
|
|
|
keep: true,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ret := base
|
|
|
|
for k, m := range im.known {
|
|
|
|
if !m.keep {
|
|
|
|
delete(im.known, k)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if needProcs {
|
|
|
|
im.addProcesses() // best effort
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, m := range im.known {
|
|
|
|
ret = append(ret, m.port)
|
|
|
|
}
|
|
|
|
return sortAndDedup(ret), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (im *macOSImpl) appendListeningPortsNetstat(base []Port) ([]Port, error) {
|
|
|
|
if im.netstatPath == "" {
|
|
|
|
var err error
|
|
|
|
im.netstatPath, err = exec.LookPath("netstat")
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("netstat: lookup: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd := exec.Command(im.netstatPath, "-na")
|
|
|
|
outPipe, err := cmd.StdoutPipe()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
im.br.Reset(outPipe)
|
|
|
|
|
|
|
|
if err := cmd.Start(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer cmd.Process.Wait()
|
|
|
|
defer cmd.Process.Kill()
|
|
|
|
|
2023-05-24 17:52:45 +01:00
|
|
|
return appendParsePortsNetstat(base, im.br, im.includeLocalhost)
|
2022-11-04 13:41:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var lsofFailed atomic.Bool
|
2020-05-12 00:12:26 +01:00
|
|
|
|
2020-02-05 22:16:58 +00:00
|
|
|
// In theory, lsof could replace the function of both listPorts() and
|
|
|
|
// addProcesses(), since it provides a superset of the netstat output.
|
|
|
|
// However, "netstat -na" runs ~100x faster than lsof on my machine, so
|
|
|
|
// we should do it only if the list of open ports has actually changed.
|
|
|
|
//
|
2021-04-09 15:49:50 +01:00
|
|
|
// This fails in a macOS sandbox (i.e. in the Mac App Store or System
|
|
|
|
// Extension GUI build), but does at least work in the
|
|
|
|
// tailscaled-on-macos mode.
|
2022-11-04 13:41:36 +00:00
|
|
|
func (im *macOSImpl) addProcesses() error {
|
|
|
|
if lsofFailed.Load() {
|
2020-05-12 00:12:26 +01:00
|
|
|
// This previously failed in the macOS sandbox, so don't try again.
|
2022-11-04 13:41:36 +00:00
|
|
|
return nil
|
2020-05-12 00:12:26 +01:00
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
exe, err := exec.LookPath("lsof")
|
|
|
|
if err != nil {
|
2022-11-04 13:41:36 +00:00
|
|
|
return fmt.Errorf("lsof: lookup: %v", err)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2022-11-04 13:41:36 +00:00
|
|
|
lsofCmd := exec.Command(exe, "-F", "-n", "-P", "-O", "-S2", "-T", "-i4", "-i6")
|
|
|
|
outPipe, err := lsofCmd.StdoutPipe()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = lsofCmd.Start()
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
2020-05-12 00:12:26 +01:00
|
|
|
var stderr []byte
|
|
|
|
if xe, ok := err.(*exec.ExitError); ok {
|
|
|
|
stderr = xe.Stderr
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
// fails when run in a macOS sandbox, so make this non-fatal.
|
2022-11-04 13:41:36 +00:00
|
|
|
if lsofFailed.CompareAndSwap(false, true) {
|
2020-05-12 00:12:26 +01:00
|
|
|
log.Printf("portlist: can't run lsof in Mac sandbox; omitting process names from service list. Error details: %v, %s", err, bytes.TrimSpace(stderr))
|
|
|
|
}
|
2022-11-04 13:41:36 +00:00
|
|
|
return nil
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2022-11-17 22:17:23 +00:00
|
|
|
defer func() {
|
|
|
|
ps, err := lsofCmd.Process.Wait()
|
|
|
|
if err != nil || ps.ExitCode() != 0 {
|
|
|
|
log.Printf("portlist: can't run lsof in Mac sandbox; omitting process names from service list. Error: %v, exit code %d", err, ps.ExitCode())
|
|
|
|
lsofFailed.Store(true)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
defer lsofCmd.Process.Kill()
|
|
|
|
|
2022-11-04 13:41:36 +00:00
|
|
|
im.br.Reset(outPipe)
|
2020-02-05 22:16:58 +00:00
|
|
|
|
|
|
|
var cmd, proto string
|
2023-05-24 17:52:45 +01:00
|
|
|
var pid int
|
2022-11-04 13:41:36 +00:00
|
|
|
for {
|
|
|
|
line, err := im.br.ReadBytes('\n')
|
|
|
|
if err != nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if len(line) < 1 {
|
2020-03-18 03:19:39 +00:00
|
|
|
continue
|
|
|
|
}
|
2022-11-04 13:41:36 +00:00
|
|
|
field, val := line[0], bytes.TrimSpace(line[1:])
|
2020-03-18 03:19:39 +00:00
|
|
|
switch field {
|
|
|
|
case 'p':
|
2020-02-05 22:16:58 +00:00
|
|
|
// starting a new process
|
|
|
|
cmd = ""
|
|
|
|
proto = ""
|
2023-05-24 17:52:45 +01:00
|
|
|
pid = 0
|
|
|
|
if p, err := mem.ParseInt(mem.B(val), 10, 0); err == nil {
|
|
|
|
pid = int(p)
|
|
|
|
}
|
2020-03-18 03:19:39 +00:00
|
|
|
case 'c':
|
2022-11-04 13:41:36 +00:00
|
|
|
cmd = string(val) // TODO(bradfitz): avoid garbage; cache process names between runs?
|
2020-03-18 03:19:39 +00:00
|
|
|
case 'P':
|
2022-11-04 13:41:36 +00:00
|
|
|
proto = lsofProtoLower(val)
|
2020-03-18 03:19:39 +00:00
|
|
|
case 'n':
|
2022-11-04 13:41:36 +00:00
|
|
|
if mem.Contains(mem.B(val), mem.S("->")) {
|
2020-03-18 03:19:39 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
// a listening port
|
2022-11-04 13:41:36 +00:00
|
|
|
port := parsePort(mem.B(val))
|
|
|
|
if port <= 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
pp := protoPort{proto, uint16(port)}
|
|
|
|
m := im.known[pp]
|
|
|
|
switch {
|
|
|
|
case m != nil:
|
|
|
|
m.port.Process = cmd
|
2023-05-24 17:52:45 +01:00
|
|
|
m.port.Pid = pid
|
2022-11-04 13:41:36 +00:00
|
|
|
default:
|
|
|
|
// ignore: processes and ports come and go
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-04 13:41:36 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func lsofProtoLower(p []byte) string {
|
|
|
|
if string(p) == "TCP" {
|
|
|
|
return "tcp"
|
|
|
|
}
|
|
|
|
if string(p) == "UDP" {
|
|
|
|
return "udp"
|
|
|
|
}
|
|
|
|
return strings.ToLower(string(p))
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|