registry.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "daemon/common.h"
  3. #include "registry_internals.h"
  4. #define REGISTRY_STATUS_OK "ok"
  5. #define REGISTRY_STATUS_FAILED "failed"
  6. #define REGISTRY_STATUS_DISABLED "disabled"
  7. // ----------------------------------------------------------------------------
  8. // REGISTRY concurrency locking
  9. static inline void registry_lock(void) {
  10. netdata_mutex_lock(&registry.lock);
  11. }
  12. static inline void registry_unlock(void) {
  13. netdata_mutex_unlock(&registry.lock);
  14. }
  15. // ----------------------------------------------------------------------------
  16. // COOKIES
  17. static void registry_set_cookie(struct web_client *w, const char *guid) {
  18. char edate[100], domain[512];
  19. time_t et = now_realtime_sec() + registry.persons_expiration;
  20. struct tm etmbuf, *etm = gmtime_r(&et, &etmbuf);
  21. strftime(edate, sizeof(edate), "%a, %d %b %Y %H:%M:%S %Z", etm);
  22. snprintfz(w->cookie1, NETDATA_WEB_REQUEST_COOKIE_SIZE, NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s", guid, edate);
  23. if(registry.registry_domain && registry.registry_domain[0])
  24. snprintfz(domain, 511, "Domain=%s", registry.registry_domain);
  25. else
  26. domain[0]='\0';
  27. int length = snprintfz(w->cookie2, NETDATA_WEB_REQUEST_COOKIE_SIZE,
  28. NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; %s",
  29. guid, edate, domain);
  30. size_t remaining_length = NETDATA_WEB_REQUEST_COOKIE_SIZE - length;
  31. // 25 is the necessary length to add new cookies
  32. if (registry.enable_cookies_samesite_secure) {
  33. if (length > 0 && remaining_length > 25)
  34. snprintfz(&w->cookie2[length], remaining_length, "; SameSite=None; Secure");
  35. else
  36. error("Netdata does not have enough space to store cookies SameSite and Secure");
  37. }
  38. }
  39. static inline void registry_set_person_cookie(struct web_client *w, REGISTRY_PERSON *p) {
  40. registry_set_cookie(w, p->guid);
  41. }
  42. // ----------------------------------------------------------------------------
  43. // JSON GENERATION
  44. static inline void registry_json_header(RRDHOST *host, struct web_client *w, const char *action, const char *status) {
  45. buffer_flush(w->response.data);
  46. w->response.data->contenttype = CT_APPLICATION_JSON;
  47. buffer_sprintf(w->response.data, "{\n\t\"action\": \"%s\",\n\t\"status\": \"%s\",\n\t\"hostname\": \"%s\",\n\t\"machine_guid\": \"%s\"",
  48. action, status, host->registry_hostname, host->machine_guid);
  49. }
  50. static inline void registry_json_footer(struct web_client *w) {
  51. buffer_strcat(w->response.data, "\n}\n");
  52. }
  53. static inline int registry_json_disabled(RRDHOST *host, struct web_client *w, const char *action) {
  54. registry_json_header(host, w, action, REGISTRY_STATUS_DISABLED);
  55. buffer_sprintf(w->response.data, ",\n\t\"registry\": \"%s\"",
  56. registry.registry_to_announce);
  57. registry_json_footer(w);
  58. return 200;
  59. }
  60. // ----------------------------------------------------------------------------
  61. // CALLBACKS FOR WALKING THROUGH REGISTRY OBJECTS
  62. // structure used be the callbacks below
  63. struct registry_json_walk_person_urls_callback {
  64. REGISTRY_PERSON *p;
  65. REGISTRY_MACHINE *m;
  66. struct web_client *w;
  67. int count;
  68. };
  69. // callback for rendering PERSON_URLs
  70. static int registry_json_person_url_callback(void *entry, void *data) {
  71. REGISTRY_PERSON_URL *pu = (REGISTRY_PERSON_URL *)entry;
  72. struct registry_json_walk_person_urls_callback *c = (struct registry_json_walk_person_urls_callback *)data;
  73. struct web_client *w = c->w;
  74. if (!strcmp(pu->url->url,"***")) return 0;
  75. if(unlikely(c->count++))
  76. buffer_strcat(w->response.data, ",");
  77. buffer_sprintf(w->response.data, "\n\t\t[ \"%s\", \"%s\", %u000, %u, \"%s\" ]",
  78. pu->machine->guid, pu->url->url, pu->last_t, pu->usages, pu->machine_name);
  79. return 0;
  80. }
  81. // callback for rendering MACHINE_URLs
  82. static int registry_json_machine_url_callback(const char *name, void *entry, void *data) {
  83. (void)name;
  84. REGISTRY_MACHINE_URL *mu = (REGISTRY_MACHINE_URL *)entry;
  85. struct registry_json_walk_person_urls_callback *c = (struct registry_json_walk_person_urls_callback *)data;
  86. struct web_client *w = c->w;
  87. REGISTRY_MACHINE *m = c->m;
  88. if (!strcmp(mu->url->url,"***")) return 1;
  89. if(unlikely(c->count++))
  90. buffer_strcat(w->response.data, ",");
  91. buffer_sprintf(w->response.data, "\n\t\t[ \"%s\", \"%s\", %u000, %u ]",
  92. m->guid, mu->url->url, mu->last_t, mu->usages);
  93. return 1;
  94. }
  95. // ----------------------------------------------------------------------------
  96. // structure used be the callbacks below
  97. struct registry_person_url_callback_verify_machine_exists_data {
  98. REGISTRY_MACHINE *m;
  99. int count;
  100. };
  101. static inline int registry_person_url_callback_verify_machine_exists(void *entry, void *data) {
  102. struct registry_person_url_callback_verify_machine_exists_data *d = (struct registry_person_url_callback_verify_machine_exists_data *)data;
  103. REGISTRY_PERSON_URL *pu = (REGISTRY_PERSON_URL *)entry;
  104. REGISTRY_MACHINE *m = d->m;
  105. if(pu->machine == m)
  106. d->count++;
  107. return 0;
  108. }
  109. // ----------------------------------------------------------------------------
  110. // dynamic update of the configuration
  111. // The registry does not seem to be designed to support this and I cannot see any concurrency protection
  112. // that could make this safe, so try to be as atomic as possible.
  113. void registry_update_cloud_base_url()
  114. {
  115. // This is guaranteed to be set early in main via post_conf_load()
  116. registry.cloud_base_url = appconfig_get(&cloud_config, CONFIG_SECTION_GLOBAL, "cloud base url", NULL);
  117. if (registry.cloud_base_url == NULL)
  118. fatal("Do not move the cloud base url out of post_conf_load!!");
  119. setenv("NETDATA_REGISTRY_CLOUD_BASE_URL", registry.cloud_base_url, 1);
  120. }
  121. // ----------------------------------------------------------------------------
  122. // public HELLO request
  123. int registry_request_hello_json(RRDHOST *host, struct web_client *w) {
  124. registry_json_header(host, w, "hello", REGISTRY_STATUS_OK);
  125. buffer_sprintf(w->response.data,
  126. ",\n\t\"registry\": \"%s\",\n\t\"cloud_base_url\": \"%s\",\n\t\"anonymous_statistics\": %s",
  127. registry.registry_to_announce,
  128. registry.cloud_base_url, netdata_anonymous_statistics_enabled?"true":"false");
  129. registry_json_footer(w);
  130. return 200;
  131. }
  132. // ----------------------------------------------------------------------------
  133. //public ACCESS request
  134. #define REGISTRY_VERIFY_COOKIES_GUID "give-me-back-this-cookie-now--please"
  135. // the main method for registering an access
  136. int registry_request_access_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *name, time_t when) {
  137. if(unlikely(!registry.enabled))
  138. return registry_json_disabled(host, w, "access");
  139. // ------------------------------------------------------------------------
  140. // verify the browser supports cookies
  141. if(registry.verify_cookies_redirects > 0 && !person_guid[0]) {
  142. buffer_flush(w->response.data);
  143. registry_set_cookie(w, REGISTRY_VERIFY_COOKIES_GUID);
  144. w->response.data->contenttype = CT_APPLICATION_JSON;
  145. buffer_sprintf(w->response.data, "{ \"status\": \"redirect\", \"registry\": \"%s\" }", registry.registry_to_announce);
  146. return 200;
  147. }
  148. if(unlikely(person_guid[0] && !strcmp(person_guid, REGISTRY_VERIFY_COOKIES_GUID)))
  149. person_guid[0] = '\0';
  150. // ------------------------------------------------------------------------
  151. registry_lock();
  152. REGISTRY_PERSON *p = registry_request_access(person_guid, machine_guid, url, name, when);
  153. if(!p) {
  154. registry_json_header(host, w, "access", REGISTRY_STATUS_FAILED);
  155. registry_json_footer(w);
  156. registry_unlock();
  157. return 412;
  158. }
  159. // set the cookie
  160. registry_set_person_cookie(w, p);
  161. // generate the response
  162. registry_json_header(host, w, "access", REGISTRY_STATUS_OK);
  163. buffer_sprintf(w->response.data, ",\n\t\"person_guid\": \"%s\",\n\t\"urls\": [", p->guid);
  164. struct registry_json_walk_person_urls_callback c = { p, NULL, w, 0 };
  165. avl_traverse(&p->person_urls, registry_json_person_url_callback, &c);
  166. buffer_strcat(w->response.data, "\n\t]\n");
  167. registry_json_footer(w);
  168. registry_unlock();
  169. return 200;
  170. }
  171. // ----------------------------------------------------------------------------
  172. // public DELETE request
  173. // the main method for deleting a URL from a person
  174. int registry_request_delete_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *delete_url, time_t when) {
  175. if(!registry.enabled)
  176. return registry_json_disabled(host, w, "delete");
  177. registry_lock();
  178. REGISTRY_PERSON *p = registry_request_delete(person_guid, machine_guid, url, delete_url, when);
  179. if(!p) {
  180. registry_json_header(host, w, "delete", REGISTRY_STATUS_FAILED);
  181. registry_json_footer(w);
  182. registry_unlock();
  183. return 412;
  184. }
  185. // generate the response
  186. registry_json_header(host, w, "delete", REGISTRY_STATUS_OK);
  187. registry_json_footer(w);
  188. registry_unlock();
  189. return 200;
  190. }
  191. // ----------------------------------------------------------------------------
  192. // public SEARCH request
  193. // the main method for searching the URLs of a netdata
  194. int registry_request_search_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *request_machine, time_t when) {
  195. if(!registry.enabled)
  196. return registry_json_disabled(host, w, "search");
  197. registry_lock();
  198. REGISTRY_MACHINE *m = registry_request_machine(person_guid, machine_guid, url, request_machine, when);
  199. if(!m) {
  200. registry_json_header(host, w, "search", REGISTRY_STATUS_FAILED);
  201. registry_json_footer(w);
  202. registry_unlock();
  203. return 404;
  204. }
  205. registry_json_header(host, w, "search", REGISTRY_STATUS_OK);
  206. buffer_strcat(w->response.data, ",\n\t\"urls\": [");
  207. struct registry_json_walk_person_urls_callback c = { NULL, m, w, 0 };
  208. dictionary_walkthrough_read(m->machine_urls, registry_json_machine_url_callback, &c);
  209. buffer_strcat(w->response.data, "\n\t]\n");
  210. registry_json_footer(w);
  211. registry_unlock();
  212. return 200;
  213. }
  214. // ----------------------------------------------------------------------------
  215. // SWITCH REQUEST
  216. // the main method for switching user identity
  217. int registry_request_switch_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *new_person_guid, time_t when) {
  218. if(!registry.enabled)
  219. return registry_json_disabled(host, w, "switch");
  220. (void)url;
  221. (void)when;
  222. registry_lock();
  223. REGISTRY_PERSON *op = registry_person_find(person_guid);
  224. if(!op) {
  225. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  226. registry_json_footer(w);
  227. registry_unlock();
  228. return 430;
  229. }
  230. REGISTRY_PERSON *np = registry_person_find(new_person_guid);
  231. if(!np) {
  232. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  233. registry_json_footer(w);
  234. registry_unlock();
  235. return 431;
  236. }
  237. REGISTRY_MACHINE *m = registry_machine_find(machine_guid);
  238. if(!m) {
  239. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  240. registry_json_footer(w);
  241. registry_unlock();
  242. return 432;
  243. }
  244. struct registry_person_url_callback_verify_machine_exists_data data = { m, 0 };
  245. // verify the old person has access to this machine
  246. avl_traverse(&op->person_urls, registry_person_url_callback_verify_machine_exists, &data);
  247. if(!data.count) {
  248. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  249. registry_json_footer(w);
  250. registry_unlock();
  251. return 433;
  252. }
  253. // verify the new person has access to this machine
  254. data.count = 0;
  255. avl_traverse(&np->person_urls, registry_person_url_callback_verify_machine_exists, &data);
  256. if(!data.count) {
  257. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  258. registry_json_footer(w);
  259. registry_unlock();
  260. return 434;
  261. }
  262. // set the cookie of the new person
  263. // the user just switched identity
  264. registry_set_person_cookie(w, np);
  265. // generate the response
  266. registry_json_header(host, w, "switch", REGISTRY_STATUS_OK);
  267. buffer_sprintf(w->response.data, ",\n\t\"person_guid\": \"%s\"", np->guid);
  268. registry_json_footer(w);
  269. registry_unlock();
  270. return 200;
  271. }
  272. // ----------------------------------------------------------------------------
  273. // STATISTICS
  274. void registry_statistics(void) {
  275. if(!registry.enabled) return;
  276. static RRDSET *sts = NULL, *stc = NULL, *stm = NULL;
  277. if(unlikely(!sts)) {
  278. sts = rrdset_create_localhost(
  279. "netdata"
  280. , "registry_sessions"
  281. , NULL
  282. , "registry"
  283. , NULL
  284. , "Netdata Registry Sessions"
  285. , "sessions"
  286. , "registry"
  287. , "stats"
  288. , 131000
  289. , localhost->rrd_update_every
  290. , RRDSET_TYPE_LINE
  291. );
  292. rrddim_add(sts, "sessions", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  293. }
  294. else rrdset_next(sts);
  295. rrddim_set(sts, "sessions", registry.usages_count);
  296. rrdset_done(sts);
  297. // ------------------------------------------------------------------------
  298. if(unlikely(!stc)) {
  299. stc = rrdset_create_localhost(
  300. "netdata"
  301. , "registry_entries"
  302. , NULL
  303. , "registry"
  304. , NULL
  305. , "Netdata Registry Entries"
  306. , "entries"
  307. , "registry"
  308. , "stats"
  309. , 131100
  310. , localhost->rrd_update_every
  311. , RRDSET_TYPE_LINE
  312. );
  313. rrddim_add(stc, "persons", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  314. rrddim_add(stc, "machines", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  315. rrddim_add(stc, "urls", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  316. rrddim_add(stc, "persons_urls", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  317. rrddim_add(stc, "machines_urls", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  318. }
  319. else rrdset_next(stc);
  320. rrddim_set(stc, "persons", registry.persons_count);
  321. rrddim_set(stc, "machines", registry.machines_count);
  322. rrddim_set(stc, "urls", registry.urls_count);
  323. rrddim_set(stc, "persons_urls", registry.persons_urls_count);
  324. rrddim_set(stc, "machines_urls", registry.machines_urls_count);
  325. rrdset_done(stc);
  326. // ------------------------------------------------------------------------
  327. if(unlikely(!stm)) {
  328. stm = rrdset_create_localhost(
  329. "netdata"
  330. , "registry_mem"
  331. , NULL
  332. , "registry"
  333. , NULL
  334. , "Netdata Registry Memory"
  335. , "KiB"
  336. , "registry"
  337. , "stats"
  338. , 131300
  339. , localhost->rrd_update_every
  340. , RRDSET_TYPE_STACKED
  341. );
  342. rrddim_add(stm, "persons", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  343. rrddim_add(stm, "machines", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  344. rrddim_add(stm, "urls", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  345. rrddim_add(stm, "persons_urls", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  346. rrddim_add(stm, "machines_urls", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  347. }
  348. else rrdset_next(stm);
  349. rrddim_set(stm, "persons", registry.persons_memory + dictionary_stats_allocated_memory(registry.persons));
  350. rrddim_set(stm, "machines", registry.machines_memory + dictionary_stats_allocated_memory(registry.machines));
  351. rrddim_set(stm, "urls", registry.urls_memory);
  352. rrddim_set(stm, "persons_urls", registry.persons_urls_memory);
  353. rrddim_set(stm, "machines_urls", registry.machines_urls_memory);
  354. rrdset_done(stm);
  355. }