forked from ravinet/mahimahi
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathreplayshell.cc
174 lines (142 loc) · 5.99 KB
/
replayshell.cc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
/* -*-mode:c++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
#include <memory>
#include <csignal>
#include <sys/socket.h>
#include <sys/ioctl.h>
#include <linux/if.h>
#include <net/route.h>
#include <iostream>
#include <vector>
#include <set>
#include "util.hh"
#include "get_address.hh"
#include "address.hh"
#include "signalfd.hh"
#include "netdevice.hh"
#include "web_server.hh"
#include "system_runner.hh"
#include "config.h"
#include "socket.hh"
#include "config.h"
#include "poller.hh"
#include "http_record.pb.h"
#include "temp_file.hh"
#include "http_header.hh"
using namespace std;
using namespace PollerShortNames;
int eventloop( vector<ChildProcess> && child_processes )
{
/* set up signal file descriptor */
SignalMask signals_to_listen_for = { SIGCHLD, SIGCONT, SIGHUP, SIGTERM };
signals_to_listen_for.block(); /* don't let them interrupt us */
SignalFD signal_fd( signals_to_listen_for );
Poller poller;
poller.add_action( Poller::Action( signal_fd.fd(), Direction::In,
[&] () {
return handle_signal( signal_fd.read_signal(),
child_processes );
} ) );
while ( true ) {
auto poll_result = poller.poll( 60000 );
if ( poll_result.result == Poller::Result::Type::Exit ) {
/* call destructor for each web server created */
return poll_result.exit_status;
}
}
}
void add_dummy_interface( const string & name, const Address & addr )
{
run( { IP, "link", "add", name.c_str(), "type", "dummy" } );
interface_ioctl( Socket( UDP ).fd(), SIOCSIFFLAGS, name.c_str(),
[] ( ifreq &ifr ) { ifr.ifr_flags = IFF_UP; } );
interface_ioctl( Socket( UDP ).fd(), SIOCSIFADDR, name.c_str(),
[&] ( ifreq &ifr )
{ ifr.ifr_addr = addr.raw_sockaddr(); } );
}
/* return hostname by iterating through headers */
string get_host( HTTP_Record::reqrespair & current_record )
{
for ( int i = 0; i < current_record.req().headers_size(); i++ ) {
HTTPHeader current_header( current_record.req().headers(i) );
if ( current_header.key() == "Host" ) {
return current_header.value().substr( 0, current_header.value().find( "\r\n" ) );
}
}
throw Exception( "replayshell", "No Host Header in Recorded File" );
}
int main( int argc, char *argv[] )
{
try {
string user( getenv( "USER" ) );
/* clear environment */
char **user_environment = environ;
environ = nullptr;
check_requirements( argc, argv );
if ( argc != 2 ) {
throw Exception( "Usage", string( argv[ 0 ] ) + " folder_with_recorded_content" );
}
/* check if user-specified storage folder exists */
string directory = argv[1];
/* make sure directory ends with '/' so we can prepend directory to file name for storage */
if ( directory.back() != '/' ) {
directory.append( "/" );
}
if ( not check_folder_existence( directory ) ) { /* folder does not exist */
throw Exception( "replayshell", "folder with recorded content does not exist" );
}
SystemCall( "unshare", unshare( CLONE_NEWNET ) );
/* bring up localhost */
interface_ioctl( Socket( UDP ).fd(), SIOCSIFFLAGS, "lo",
[] ( ifreq &ifr ) { ifr.ifr_flags = IFF_UP; } );
/* provide seed for random number generator used to create apache pid files */
srandom( time( NULL ) );
/* dnsmasq host mapping file */
TempFile dnsmasq_hosts( "hosts" );
vector< string > files;
list_files( directory, files );
set< Address > unique_addrs;
set< string > unique_ips;
vector< WebServer > servers;
unsigned int interface_counter = 0;
for ( unsigned int i = 0; i < files.size(); i++ ) {
FileDescriptor response( SystemCall( "open", open( files[i].c_str(), O_RDONLY ) ) );
HTTP_Record::reqrespair current_record;
current_record.ParseFromFileDescriptor( response.num() );
Address current_addr( current_record.ip(), current_record.port() );
auto result1 = unique_ips.emplace( current_addr.ip() );
if ( result1.second ) { /* new ip */
add_dummy_interface( "sharded" + to_string( interface_counter ), current_addr );
interface_counter++;
}
/* add entry to dnsmasq host mapping file */
string entry_host = get_host( current_record );
dnsmasq_hosts.write( current_addr.ip() + " " +entry_host + "\n" );
auto result2 = unique_addrs.emplace( current_addr );
if ( result2.second ) { /* new address */
servers.emplace_back( current_addr, directory, user );
}
}
/* start dnsmasq with created host mapping file */
vector<ChildProcess> child_processes;
child_processes.emplace_back( [&] () {
SystemCall( "execl", execl( DNSMASQ, "dnsmasq", "-k", "--interface=lo",
"--no-hosts", "-H", dnsmasq_hosts.name().c_str(),
static_cast<char *>( nullptr ) ) );
return EXIT_FAILURE;
}, false, SIGTERM );
child_processes.emplace_back( [&]() {
drop_privileges();
/* restore environment and tweak bash prompt */
environ = user_environment;
prepend_shell_prefix( "[replayshell] " );
const string shell = shell_path();
SystemCall( "execl", execl( shell.c_str(), shell.c_str(), static_cast<char *>( nullptr ) ) );
return EXIT_FAILURE;
} );
return eventloop( move( child_processes ) );
} catch ( const Exception & e ) {
e.perror();
return EXIT_FAILURE;
}
return EXIT_SUCCESS;
}