Replace per-decky sniffer containers with a single host-side sniffer that monitors all traffic on the MACVLAN interface. Runs as a background task in the FastAPI lifespan alongside the collector, fully fault-isolated so failures never crash the API. - Add fleet_singleton flag to BaseService; sniffer marked as singleton - Composer skips fleet_singleton services in compose generation - Fleet builder excludes singletons from random service assignment - Extract TLS fingerprinting engine from templates/sniffer/server.py into decnet/sniffer/ package (parameterized for fleet-wide use) - Sniffer worker maps packets to deckies via IP→name state mapping - Original templates/sniffer/server.py preserved for future use
42 lines
1.2 KiB
Python
42 lines
1.2 KiB
Python
from pathlib import Path
|
|
from decnet.services.base import BaseService
|
|
|
|
TEMPLATES_DIR = Path(__file__).parent.parent.parent / "templates" / "sniffer"
|
|
|
|
|
|
class SnifferService(BaseService):
|
|
"""
|
|
Passive network sniffer deployed alongside deckies on the MACVLAN.
|
|
|
|
Captures TLS handshakes in promiscuous mode and extracts JA3/JA3S hashes
|
|
plus connection metadata. Requires NET_RAW + NET_ADMIN capabilities.
|
|
No inbound ports — purely passive.
|
|
"""
|
|
|
|
name = "sniffer"
|
|
ports: list[int] = []
|
|
default_image = "build"
|
|
fleet_singleton = True
|
|
|
|
def compose_fragment(
|
|
self,
|
|
decky_name: str,
|
|
log_target: str | None = None,
|
|
service_cfg: dict | None = None,
|
|
) -> dict:
|
|
fragment: dict = {
|
|
"build": {"context": str(TEMPLATES_DIR)},
|
|
"container_name": f"{decky_name}-sniffer",
|
|
"restart": "unless-stopped",
|
|
"cap_add": ["NET_RAW", "NET_ADMIN"],
|
|
"environment": {
|
|
"NODE_NAME": decky_name,
|
|
},
|
|
}
|
|
if log_target:
|
|
fragment["environment"]["LOG_TARGET"] = log_target
|
|
return fragment
|
|
|
|
def dockerfile_context(self) -> Path | None:
|
|
return TEMPLATES_DIR
|