all: use better names than "blacklist", and docs (#206)

The three transformer map fields are now very well documented, which was
badly needed for anyone trying to understand the source code.

ignoreObjects is also a better field name than blacklist, as it says
what the map is indexed by (types.Object) and what we do with those:
ignore them when we obfuscate code.

The rewriting of go:linkname directives is moved to a separate func, so
that we can name that func from the docs.

Finally, the docs are overall improved a bit, as I was re-tracing all
the pieces of code that used the ambiguous "blacklist" terminology.

Fixes #169.
pull/207/head
Daniel Martí 4 years ago committed by GitHub
parent ff3d62f9c3
commit f667a7ad31
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -473,8 +473,7 @@ func garbleSymbols(am *goobj2.ArchiveMember, privImports privateImports, garbled
continue continue
} }
// skip local asm symbols. For some reason garbling these breaks things // Skip local asm symbols. For some reason garbling these breaks things.
// add the symbol name to a blacklist, so we don't garble related symbols
// TODO: don't add duplicates // TODO: don't add duplicates
if s.Kind == goobj2.SABIALIAS { if s.Kind == goobj2.SABIALIAS {
if parts := strings.SplitN(s.Name, ".", 2); parts[0] == "main" { if parts := strings.SplitN(s.Name, ".", 2); parts[0] == "main" {

@ -34,7 +34,7 @@ func randObfuscator() obfuscator {
} }
// Obfuscate replace literals with obfuscated lambda functions // Obfuscate replace literals with obfuscated lambda functions
func Obfuscate(files []*ast.File, info *types.Info, fset *token.FileSet, blacklist map[types.Object]bool) []*ast.File { func Obfuscate(files []*ast.File, info *types.Info, fset *token.FileSet, ignoreObj map[types.Object]bool) []*ast.File {
pre := func(cursor *astutil.Cursor) bool { pre := func(cursor *astutil.Cursor) bool {
switch x := cursor.Node().(type) { switch x := cursor.Node().(type) {
case *ast.GenDecl: case *ast.GenDecl:
@ -61,8 +61,8 @@ func Obfuscate(files []*ast.File, info *types.Info, fset *token.FileSet, blackli
return false return false
} }
// The object itself is blacklisted, e.g. a value that needs to be constant // The object cannot be obfuscated, e.g. a value that needs to be constant
if blacklist[obj] { if ignoreObj[obj] {
return false return false
} }
} }
@ -230,16 +230,16 @@ func obfuscateByteArray(data []byte, length int64) *ast.CallExpr {
return ah.LambdaCall(arrayType, block) return ah.LambdaCall(arrayType, block)
} }
// ConstBlacklist blacklist identifieres used in constant expressions // RecordUsedAsConstants records identifieres used in constant expressions.
func ConstBlacklist(node ast.Node, info *types.Info, blacklist map[types.Object]bool) { func RecordUsedAsConstants(node ast.Node, info *types.Info, ignoreObj map[types.Object]bool) {
blacklistObjects := func(node ast.Node) bool { visit := func(node ast.Node) bool {
ident, ok := node.(*ast.Ident) ident, ok := node.(*ast.Ident)
if !ok { if !ok {
return true return true
} }
obj := info.ObjectOf(ident) obj := info.ObjectOf(ident)
blacklist[obj] = true ignoreObj[obj] = true
return true return true
} }
@ -252,13 +252,13 @@ func ConstBlacklist(node ast.Node, info *types.Info, blacklist map[types.Object]
} }
for _, elt := range x.Elts { for _, elt := range x.Elts {
if kv, ok := elt.(*ast.KeyValueExpr); ok { if kv, ok := elt.(*ast.KeyValueExpr); ok {
ast.Inspect(kv.Key, blacklistObjects) ast.Inspect(kv.Key, visit)
} }
} }
// in an array type the length must be a constant representable // in an array type the length must be a constant representable
case *ast.ArrayType: case *ast.ArrayType:
if x.Len != nil { if x.Len != nil {
ast.Inspect(x.Len, blacklistObjects) ast.Inspect(x.Len, visit)
} }
// in a const declaration all values must be constant representable // in a const declaration all values must be constant representable
case *ast.GenDecl: case *ast.GenDecl:
@ -269,7 +269,7 @@ func ConstBlacklist(node ast.Node, info *types.Info, blacklist map[types.Object]
spec := spec.(*ast.ValueSpec) spec := spec.(*ast.ValueSpec)
for _, val := range spec.Values { for _, val := range spec.Values {
ast.Inspect(val, blacklistObjects) ast.Inspect(val, visit)
} }
} }
} }

@ -423,12 +423,12 @@ func transformCompile(args []string) ([]string, error) {
} }
tf.privateNameMap = make(map[string]string) tf.privateNameMap = make(map[string]string)
tf.existingNames = collectNames(files) tf.existingNames = collectExistingNames(files)
tf.buildBlacklist(files) tf.recordReflectArgs(files)
if opts.GarbleLiterals { if opts.GarbleLiterals {
// TODO: use transformer here? // TODO: use transformer here?
files = literals.Obfuscate(files, tf.info, fset, tf.blacklist) files = literals.Obfuscate(files, tf.info, fset, tf.ignoreObjects)
} }
tempDir, err := ioutil.TempDir("", "garble-build") tempDir, err := ioutil.TempDir("", "garble-build")
@ -450,53 +450,11 @@ func transformCompile(args []string) ([]string, error) {
for i, file := range files { for i, file := range files {
name := filepath.Base(filepath.Clean(paths[i])) name := filepath.Base(filepath.Clean(paths[i]))
cgoFile := strings.HasPrefix(name, "_cgo_") cgoFile := strings.HasPrefix(name, "_cgo_")
comments, file := transformLineInfo(file, cgoFile)
for i, comment := range comments {
if !strings.HasPrefix(comment, "//go:linkname ") {
continue
}
fields := strings.Fields(comment)
if len(fields) != 3 {
continue
}
// This directive has two arguments: "go:linkname localName newName"
localName := fields[1]
// The local name must not be obfuscated.
obj := tf.pkg.Scope().Lookup(localName)
if obj != nil {
tf.blacklist[obj] = true
}
// If the new name is of the form "pkgpath.Name", and comments, file := transformLineInfo(file, cgoFile)
// we've obfuscated "Name" in that package, rewrite the tf.handleDirectives(comments)
// directive to use the obfuscated name.
newName := strings.Split(fields[2], ".")
if len(newName) != 2 {
continue
}
pkg, name := newName[0], newName[1]
if pkg == "runtime" && strings.HasPrefix(name, "cgo") {
continue // ignore cgo-generated linknames
}
listedPkg, ok := buildInfo.imports[pkg]
if !ok {
continue // probably a made up symbol name
}
garbledPkg, _ := garbledImport(pkg)
if garbledPkg != nil && garbledPkg.Scope().Lookup(name) != nil {
continue // the name exists and was not garbled
}
// The name exists and was obfuscated; replace the
// comment with the obfuscated name.
obfName := hashWith(listedPkg.actionID, name)
fields[2] = pkg + "." + obfName
comments[i] = strings.Join(fields, " ")
}
detachedComments[i], files[i] = comments, file detachedComments[i], files[i] = comments, file
} }
obfSrcArchive := &bytes.Buffer{} obfSrcArchive := &bytes.Buffer{}
@ -617,6 +575,57 @@ func transformCompile(args []string) ([]string, error) {
return append(flags, newPaths...), nil return append(flags, newPaths...), nil
} }
// handleDirectives looks at all the comments in a file containing build
// directives, and does the necessary for the obfuscation process to work.
//
// Right now, this means recording what local names are used with go:linkname,
// and rewriting those directives to use obfuscated name from other packages.
func (tf *transformer) handleDirectives(comments []string) {
for i, comment := range comments {
if !strings.HasPrefix(comment, "//go:linkname ") {
continue
}
fields := strings.Fields(comment)
if len(fields) != 3 {
continue
}
// This directive has two arguments: "go:linkname localName newName"
localName := fields[1]
// The local name must not be obfuscated.
obj := tf.pkg.Scope().Lookup(localName)
if obj != nil {
tf.ignoreObjects[obj] = true
}
// If the new name is of the form "pkgpath.Name", and
// we've obfuscated "Name" in that package, rewrite the
// directive to use the obfuscated name.
newName := strings.Split(fields[2], ".")
if len(newName) != 2 {
continue
}
pkg, name := newName[0], newName[1]
if pkg == "runtime" && strings.HasPrefix(name, "cgo") {
continue // ignore cgo-generated linknames
}
listedPkg, ok := buildInfo.imports[pkg]
if !ok {
continue // probably a made up symbol name
}
garbledPkg, _ := garbledImport(pkg)
if garbledPkg != nil && garbledPkg.Scope().Lookup(name) != nil {
continue // the name exists and was not garbled
}
// The name exists and was obfuscated; replace the
// comment with the obfuscated name.
obfName := hashWith(listedPkg.actionID, name)
fields[2] = pkg + "." + obfName
comments[i] = strings.Join(fields, " ")
}
}
// runtimeRelated is a snapshot of all the packages runtime depends on, or // runtimeRelated is a snapshot of all the packages runtime depends on, or
// packages which the runtime points to via go:linkname. // packages which the runtime points to via go:linkname.
// //
@ -765,16 +774,16 @@ func fillBuildInfo(flags []string) error {
return nil return nil
} }
// buildBlacklist collects all the objects in a package which are known to be // recordReflectArgs collects all the objects in a package which are known to be
// used with reflect.TypeOf or reflect.ValueOf. Since we obfuscate one package // used as arguments to reflect.TypeOf or reflect.ValueOf. Since we obfuscate
// at a time, we only detect those if the type definition and the reflect usage // one package at a time, we only detect those if the type definition and the
// are both in the same package. // reflect usage are both in the same package.
// //
// The blacklist mainly contains named types and their field declarations. // The resulting map mainly contains named types and their field declarations.
func (tf *transformer) buildBlacklist(files []*ast.File) { func (tf *transformer) recordReflectArgs(files []*ast.File) {
tf.blacklist = make(map[types.Object]bool) tf.ignoreObjects = make(map[types.Object]bool)
reflectBlacklist := func(node ast.Node) bool { visitReflectArg := func(node ast.Node) bool {
expr, _ := node.(ast.Expr) // info.TypeOf(nil) will just return nil expr, _ := node.(ast.Expr) // info.TypeOf(nil) will just return nil
named := namedType(tf.info.TypeOf(expr)) named := namedType(tf.info.TypeOf(expr))
if named == nil { if named == nil {
@ -785,7 +794,7 @@ func (tf *transformer) buildBlacklist(files []*ast.File) {
if obj == nil || obj.Pkg() != tf.pkg { if obj == nil || obj.Pkg() != tf.pkg {
return true return true
} }
blacklistStruct(named, tf.blacklist) recordStruct(named, tf.ignoreObjects)
return true return true
} }
@ -793,7 +802,7 @@ func (tf *transformer) buildBlacklist(files []*ast.File) {
visit := func(node ast.Node) bool { visit := func(node ast.Node) bool {
if opts.GarbleLiterals { if opts.GarbleLiterals {
// TODO: use transformer here? // TODO: use transformer here?
literals.ConstBlacklist(node, tf.info, tf.blacklist) literals.RecordUsedAsConstants(node, tf.info, tf.ignoreObjects)
} }
call, ok := node.(*ast.CallExpr) call, ok := node.(*ast.CallExpr)
@ -812,7 +821,7 @@ func (tf *transformer) buildBlacklist(files []*ast.File) {
if fnType.Pkg().Path() == "reflect" && (fnType.Name() == "TypeOf" || fnType.Name() == "ValueOf") { if fnType.Pkg().Path() == "reflect" && (fnType.Name() == "TypeOf" || fnType.Name() == "ValueOf") {
for _, arg := range call.Args { for _, arg := range call.Args {
ast.Inspect(arg, reflectBlacklist) ast.Inspect(arg, visitReflectArg)
} }
} }
return true return true
@ -822,20 +831,20 @@ func (tf *transformer) buildBlacklist(files []*ast.File) {
} }
} }
// collectNames collects all names, including the names of local variables, // collectExistingNames collects all names, including the names of local
// functions, global fields, etc. // variables, functions, global fields, etc.
func collectNames(files []*ast.File) map[string]bool { func collectExistingNames(files []*ast.File) map[string]bool {
blacklist := make(map[string]bool) names := make(map[string]bool)
visit := func(node ast.Node) bool { visit := func(node ast.Node) bool {
if ident, ok := node.(*ast.Ident); ok { if ident, ok := node.(*ast.Ident); ok {
blacklist[ident.Name] = true names[ident.Name] = true
} }
return true return true
} }
for _, file := range files { for _, file := range files {
ast.Inspect(file, visit) ast.Inspect(file, visit)
} }
return blacklist return names
} }
// transformer holds all the information and state necessary to obfuscate a // transformer holds all the information and state necessary to obfuscate a
@ -845,12 +854,28 @@ type transformer struct {
pkg *types.Package pkg *types.Package
info *types.Info info *types.Info
// Maps to keep track of how, or whether not, we should obfuscate // existingNames contains all the existing names in the current package,
// certain parts of the package. // to avoid name collisions.
// TODO: document better and use better field names; see issue #169. existingNames map[string]bool
blacklist map[types.Object]bool
// privateNameMap records how unexported names were obfuscated. For
// example, "some/pkg.foo" could be mapped to "C" if it was one of the
// first private names to be obfuscated.
// TODO: why include the "some/pkg." prefix if it's always going to be
// the current package?
privateNameMap map[string]string privateNameMap map[string]string
existingNames map[string]bool
// ignoreObjects records all the objects we cannot obfuscate. An object
// is any named entity, such as a declared variable or type.
//
// So far, this map records:
//
// * Types which are used for reflection; see recordReflectArgs.
// * Identifiers used in constant expressions; see RecordUsedAsConstants.
// * Identifiers used in go:linkname directives; see handleDirectives.
// * Types or variables from external packages which were not
// obfuscated, for caching reasons; see transformGo.
ignoreObjects map[types.Object]bool
// nameCounter keeps track of how many unique identifier names we've // nameCounter keeps track of how many unique identifier names we've
// obfuscated, so that the obfuscated names get assigned incrementing // obfuscated, so that the obfuscated names get assigned incrementing
@ -918,8 +943,8 @@ func (tf *transformer) transformGo(file *ast.File) *ast.File {
return true // could be a Go plugin API return true // could be a Go plugin API
} }
// The object itself is blacklisted, e.g. a type definition. // We don't want to obfuscate this object.
if tf.blacklist[obj] { if tf.ignoreObjects[obj] {
return true return true
} }
@ -939,7 +964,7 @@ func (tf *transformer) transformGo(file *ast.File) *ast.File {
// if the struct of this field was not garbled, do not garble // if the struct of this field was not garbled, do not garble
// any of that struct's fields // any of that struct's fields
if (parentScope != tf.pkg.Scope()) && (x.IsField() && !x.Embedded()) { if parentScope != tf.pkg.Scope() && x.IsField() && !x.Embedded() {
parent, ok := cursor.Parent().(*ast.SelectorExpr) parent, ok := cursor.Parent().(*ast.SelectorExpr)
if !ok { if !ok {
break break
@ -959,7 +984,7 @@ func (tf *transformer) transformGo(file *ast.File) *ast.File {
} }
if garbledPkg, _ := garbledImport(path); garbledPkg != nil { if garbledPkg, _ := garbledImport(path); garbledPkg != nil {
if garbledPkg.Scope().Lookup(named.Obj().Name()) != nil { if garbledPkg.Scope().Lookup(named.Obj().Name()) != nil {
blacklistStruct(named, tf.blacklist) recordStruct(named, tf.ignoreObjects)
return true return true
} }
} }
@ -979,7 +1004,7 @@ func (tf *transformer) transformGo(file *ast.File) *ast.File {
} }
if garbledPkg, _ := garbledImport(path); garbledPkg != nil { if garbledPkg, _ := garbledImport(path); garbledPkg != nil {
if garbledPkg.Scope().Lookup(x.Name()) != nil { if garbledPkg.Scope().Lookup(x.Name()) != nil {
blacklistStruct(named, tf.blacklist) recordStruct(named, tf.ignoreObjects)
return true return true
} }
} }
@ -1111,14 +1136,17 @@ func (tf *transformer) transformGo(file *ast.File) *ast.File {
return astutil.Apply(file, pre, nil).(*ast.File) return astutil.Apply(file, pre, nil).(*ast.File)
} }
func blacklistStruct(named *types.Named, blacklist map[types.Object]bool) { // recordStruct adds the given named type to the map, plus all of its fields if
blacklist[named.Obj()] = true // it is a struct. This function is mainly used for types used via reflection,
// so we want to record their members too.
func recordStruct(named *types.Named, m map[types.Object]bool) {
m[named.Obj()] = true
strct, ok := named.Underlying().(*types.Struct) strct, ok := named.Underlying().(*types.Struct)
if !ok { if !ok {
return return
} }
for i := 0; i < strct.NumFields(); i++ { for i := 0; i < strct.NumFields(); i++ {
blacklist[strct.Field(i)] = true m[strct.Field(i)] = true
} }
} }

Loading…
Cancel
Save