registry.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "daemon/common.h"
  3. #include "registry_internals.h"
  4. #define REGISTRY_STATUS_OK "ok"
  5. #define REGISTRY_STATUS_REDIRECT "redirect"
  6. #define REGISTRY_STATUS_FAILED "failed"
  7. #define REGISTRY_STATUS_DISABLED "disabled"
  8. bool registry_is_valid_url(const char *url) {
  9. return url && (*url == 'h' || *url == '*');
  10. }
  11. // ----------------------------------------------------------------------------
  12. // REGISTRY concurrency locking
  13. static inline void registry_lock(void) {
  14. netdata_mutex_lock(&registry.lock);
  15. }
  16. static inline void registry_unlock(void) {
  17. netdata_mutex_unlock(&registry.lock);
  18. }
  19. // ----------------------------------------------------------------------------
  20. // COOKIES
  21. static void registry_set_cookie(struct web_client *w, const char *guid) {
  22. char e_date[100];
  23. time_t et = now_realtime_sec() + registry.persons_expiration;
  24. struct tm e_tm_buf, *etm = gmtime_r(&et, &e_tm_buf);
  25. strftime(e_date, sizeof(e_date), "%a, %d %b %Y %H:%M:%S %Z", etm);
  26. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s\r\n", guid, e_date);
  27. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; SameSite=Strict; Expires=%s\r\n", guid, e_date);
  28. if(registry.enable_cookies_samesite_secure)
  29. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; SameSite=None; Secure\r\n", guid, e_date);
  30. if(registry.registry_domain && *registry.registry_domain) {
  31. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; Domain=%s\r\n", guid, e_date, registry.registry_domain);
  32. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; Domain=%s; SameSite=Strict\r\n", guid, e_date, registry.registry_domain);
  33. if(registry.enable_cookies_samesite_secure)
  34. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; Domain=%s; SameSite=None; Secure\r\n", guid, e_date, registry.registry_domain);
  35. }
  36. w->response.has_cookies = true;
  37. }
  38. static inline void registry_set_person_cookie(struct web_client *w, REGISTRY_PERSON *p) {
  39. registry_set_cookie(w, p->guid);
  40. }
  41. // ----------------------------------------------------------------------------
  42. // JSON GENERATION
  43. static inline void registry_json_header(RRDHOST *host, struct web_client *w, const char *action, const char *status) {
  44. buffer_flush(w->response.data);
  45. w->response.data->content_type = CT_APPLICATION_JSON;
  46. buffer_json_initialize(w->response.data, "\"", "\"", 0, true, BUFFER_JSON_OPTIONS_DEFAULT);
  47. buffer_json_member_add_string(w->response.data, "action", action);
  48. buffer_json_member_add_string(w->response.data, "status", status);
  49. buffer_json_member_add_string(w->response.data, "hostname", rrdhost_registry_hostname(host));
  50. buffer_json_member_add_string(w->response.data, "machine_guid", host->machine_guid);
  51. }
  52. static inline void registry_json_footer(struct web_client *w) {
  53. buffer_json_finalize(w->response.data);
  54. }
  55. static inline int registry_json_disabled(RRDHOST *host, struct web_client *w, const char *action) {
  56. registry_json_header(host, w, action, REGISTRY_STATUS_DISABLED);
  57. buffer_json_member_add_string(w->response.data, "registry", registry.registry_to_announce);
  58. registry_json_footer(w);
  59. return HTTP_RESP_OK;
  60. }
  61. // ----------------------------------------------------------------------------
  62. // CALLBACKS FOR WALKING THROUGH REGISTRY OBJECTS
  63. // structure used be the callbacks below
  64. struct registry_json_walk_person_urls_callback {
  65. REGISTRY_PERSON *p;
  66. REGISTRY_MACHINE *m;
  67. struct web_client *w;
  68. int count;
  69. };
  70. static STRING *asterisks = NULL;
  71. // callback for rendering PERSON_URLs
  72. static int registry_json_person_url_callback(REGISTRY_PERSON_URL *pu, struct registry_json_walk_person_urls_callback *c) {
  73. if(unlikely(!asterisks))
  74. asterisks = string_strdupz("***");
  75. struct web_client *w = c->w;
  76. if (pu->url == asterisks) return 0;
  77. buffer_json_add_array_item_array(w->response.data);
  78. buffer_json_add_array_item_string(w->response.data, pu->machine->guid);
  79. buffer_json_add_array_item_string(w->response.data, string2str(pu->url));
  80. buffer_json_add_array_item_uint64(w->response.data, pu->last_t * (uint64_t) 1000);
  81. buffer_json_add_array_item_uint64(w->response.data, pu->usages);
  82. buffer_json_add_array_item_string(w->response.data, string2str(pu->machine_name));
  83. buffer_json_array_close(w->response.data);
  84. return 1;
  85. }
  86. // callback for rendering MACHINE_URLs
  87. static int registry_json_machine_url_callback(REGISTRY_MACHINE_URL *mu, struct registry_json_walk_person_urls_callback *c, STRING *hostname) {
  88. if(unlikely(!asterisks))
  89. asterisks = string_strdupz("***");
  90. struct web_client *w = c->w;
  91. REGISTRY_MACHINE *m = c->m;
  92. if (mu->url == asterisks) return 0;
  93. buffer_json_add_array_item_array(w->response.data);
  94. buffer_json_add_array_item_string(w->response.data, m->guid);
  95. buffer_json_add_array_item_string(w->response.data, string2str(mu->url));
  96. buffer_json_add_array_item_uint64(w->response.data, mu->last_t * (uint64_t) 1000);
  97. buffer_json_add_array_item_uint64(w->response.data, mu->usages);
  98. buffer_json_add_array_item_string(w->response.data, string2str(hostname));
  99. buffer_json_array_close(w->response.data);
  100. return 1;
  101. }
  102. // ----------------------------------------------------------------------------
  103. // structure used be the callbacks below
  104. struct registry_person_url_callback_verify_machine_exists_data {
  105. REGISTRY_MACHINE *m;
  106. int count;
  107. };
  108. static inline int registry_person_url_callback_verify_machine_exists(REGISTRY_PERSON_URL *pu, struct registry_person_url_callback_verify_machine_exists_data *d) {
  109. REGISTRY_MACHINE *m = d->m;
  110. if(pu->machine == m)
  111. d->count++;
  112. return 0;
  113. }
  114. // ----------------------------------------------------------------------------
  115. // dynamic update of the configuration
  116. // The registry does not seem to be designed to support this and I cannot see any concurrency protection
  117. // that could make this safe, so try to be as atomic as possible.
  118. void registry_update_cloud_base_url() {
  119. registry.cloud_base_url = appconfig_get(&cloud_config, CONFIG_SECTION_GLOBAL, "cloud base url", DEFAULT_CLOUD_BASE_URL);
  120. setenv("NETDATA_REGISTRY_CLOUD_BASE_URL", registry.cloud_base_url, 1);
  121. }
  122. // ----------------------------------------------------------------------------
  123. // public HELLO request
  124. int registry_request_hello_json(RRDHOST *host, struct web_client *w) {
  125. registry_json_header(host, w, "hello", REGISTRY_STATUS_OK);
  126. if(host->node_id)
  127. buffer_json_member_add_uuid(w->response.data, "node_id", host->node_id);
  128. buffer_json_member_add_object(w->response.data, "agent");
  129. {
  130. buffer_json_member_add_string(w->response.data, "machine_guid", localhost->machine_guid);
  131. if(localhost->node_id)
  132. buffer_json_member_add_uuid(w->response.data, "node_id", localhost->node_id);
  133. char *claim_id = get_agent_claimid();
  134. if (claim_id) {
  135. buffer_json_member_add_string(w->response.data, "claim_id", claim_id);
  136. freez(claim_id);
  137. }
  138. buffer_json_member_add_boolean(w->response.data, "bearer_protection", netdata_is_protected_by_bearer);
  139. }
  140. buffer_json_object_close(w->response.data);
  141. CLOUD_STATUS status = cloud_status();
  142. buffer_json_member_add_string(w->response.data, "cloud_status", cloud_status_to_string(status));
  143. buffer_json_member_add_string(w->response.data, "cloud_base_url", registry.cloud_base_url);
  144. buffer_json_member_add_string(w->response.data, "registry", registry.registry_to_announce);
  145. buffer_json_member_add_boolean(w->response.data, "anonymous_statistics", netdata_anonymous_statistics_enabled);
  146. buffer_json_member_add_boolean(w->response.data, "X-Netdata-Auth", true);
  147. buffer_json_member_add_array(w->response.data, "nodes");
  148. RRDHOST *h;
  149. dfe_start_read(rrdhost_root_index, h) {
  150. buffer_json_add_array_item_object(w->response.data);
  151. buffer_json_member_add_string(w->response.data, "machine_guid", h->machine_guid);
  152. if(h->node_id)
  153. buffer_json_member_add_uuid(w->response.data, "node_id", h->node_id);
  154. buffer_json_member_add_string(w->response.data, "hostname", rrdhost_registry_hostname(h));
  155. buffer_json_object_close(w->response.data);
  156. }
  157. dfe_done(h);
  158. buffer_json_array_close(w->response.data); // nodes
  159. registry_json_footer(w);
  160. return HTTP_RESP_OK;
  161. }
  162. // ----------------------------------------------------------------------------
  163. // public ACCESS request
  164. // the main method for registering an access
  165. int registry_request_access_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *name, time_t when) {
  166. if(unlikely(!registry.enabled))
  167. return registry_json_disabled(host, w, "access");
  168. if(!registry_is_valid_url(url)) {
  169. buffer_flush(w->response.data);
  170. buffer_strcat(w->response.data, "Invalid URL given in the request");
  171. return HTTP_RESP_BAD_REQUEST;
  172. }
  173. // ------------------------------------------------------------------------
  174. // verify the browser supports cookies or the bearer
  175. if(registry.verify_cookies_redirects > 0 && !person_guid[0]) {
  176. registry_lock();
  177. registry_request_access(REGISTRY_VERIFY_COOKIES_GUID, machine_guid, url, name, when);
  178. registry_unlock();
  179. buffer_flush(w->response.data);
  180. registry_set_cookie(w, REGISTRY_VERIFY_COOKIES_GUID);
  181. w->response.data->content_type = CT_APPLICATION_JSON;
  182. registry_json_header(host, w, "access", REGISTRY_STATUS_REDIRECT);
  183. buffer_json_member_add_string(w->response.data, "person_guid", REGISTRY_VERIFY_COOKIES_GUID);
  184. buffer_json_member_add_string(w->response.data, "registry", registry.registry_to_announce);
  185. registry_json_footer(w);
  186. return HTTP_RESP_OK;
  187. }
  188. if(unlikely(person_guid[0] && is_dummy_person(person_guid)))
  189. // it passed the check - they gave us a different person_guid
  190. // empty the dummy one, so that we will generate a new person_guid
  191. person_guid[0] = '\0';
  192. // ------------------------------------------------------------------------
  193. registry_lock();
  194. REGISTRY_PERSON *p = registry_request_access(person_guid, machine_guid, url, name, when);
  195. if(!p) {
  196. registry_json_header(host, w, "access", REGISTRY_STATUS_FAILED);
  197. registry_json_footer(w);
  198. registry_unlock();
  199. return HTTP_RESP_PRECOND_FAIL;
  200. }
  201. // set the cookie
  202. registry_set_person_cookie(w, p);
  203. // generate the response
  204. registry_json_header(host, w, "access", REGISTRY_STATUS_OK);
  205. buffer_json_member_add_string(w->response.data, "person_guid", p->guid);
  206. buffer_json_member_add_array(w->response.data, "urls");
  207. struct registry_json_walk_person_urls_callback c = { p, NULL, w, 0 };
  208. for(REGISTRY_PERSON_URL *pu = p->person_urls; pu ;pu = pu->next)
  209. registry_json_person_url_callback(pu, &c);
  210. buffer_json_array_close(w->response.data); // urls
  211. registry_json_footer(w);
  212. registry_unlock();
  213. return HTTP_RESP_OK;
  214. }
  215. // ----------------------------------------------------------------------------
  216. // public DELETE request
  217. // the main method for deleting a URL from a person
  218. int registry_request_delete_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *delete_url, time_t when) {
  219. if(!registry.enabled)
  220. return registry_json_disabled(host, w, "delete");
  221. if(!registry_is_valid_url(url)) {
  222. buffer_flush(w->response.data);
  223. buffer_strcat(w->response.data, "Invalid URL given in the request");
  224. return HTTP_RESP_BAD_REQUEST;
  225. }
  226. registry_lock();
  227. REGISTRY_PERSON *p = registry_request_delete(person_guid, machine_guid, url, delete_url, when);
  228. if(!p) {
  229. registry_json_header(host, w, "delete", REGISTRY_STATUS_FAILED);
  230. registry_json_footer(w);
  231. registry_unlock();
  232. return HTTP_RESP_PRECOND_FAIL;
  233. }
  234. // generate the response
  235. registry_json_header(host, w, "delete", REGISTRY_STATUS_OK);
  236. registry_json_footer(w);
  237. registry_unlock();
  238. return HTTP_RESP_OK;
  239. }
  240. // ----------------------------------------------------------------------------
  241. // public SEARCH request
  242. // the main method for searching the URLs of a netdata
  243. int registry_request_search_json(RRDHOST *host, struct web_client *w, char *person_guid, char *request_machine) {
  244. if(!registry.enabled)
  245. return registry_json_disabled(host, w, "search");
  246. if(!person_guid || !person_guid[0]) {
  247. registry_json_header(host, w, "search", REGISTRY_STATUS_FAILED);
  248. registry_json_footer(w);
  249. return HTTP_RESP_PRECOND_FAIL;
  250. }
  251. registry_lock();
  252. STRING *hostname = NULL;
  253. REGISTRY_MACHINE *m = registry_request_machine(person_guid, request_machine, &hostname);
  254. if(!m) {
  255. registry_json_header(host, w, "search", REGISTRY_STATUS_FAILED);
  256. registry_json_footer(w);
  257. registry_unlock();
  258. string_freez(hostname);
  259. return HTTP_RESP_NOT_FOUND;
  260. }
  261. registry_json_header(host, w, "search", REGISTRY_STATUS_OK);
  262. buffer_json_member_add_array(w->response.data, "urls");
  263. struct registry_json_walk_person_urls_callback c = { NULL, m, w, 0 };
  264. for(REGISTRY_MACHINE_URL *mu = m->machine_urls; mu ; mu = mu->next)
  265. registry_json_machine_url_callback(mu, &c, hostname);
  266. buffer_json_array_close(w->response.data);
  267. registry_json_footer(w);
  268. registry_unlock();
  269. string_freez(hostname);
  270. return HTTP_RESP_OK;
  271. }
  272. // ----------------------------------------------------------------------------
  273. // SWITCH REQUEST
  274. // the main method for switching user identity
  275. int registry_request_switch_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url __maybe_unused, char *new_person_guid, time_t when __maybe_unused) {
  276. if(!registry.enabled)
  277. return registry_json_disabled(host, w, "switch");
  278. if(!person_guid || !person_guid[0]) {
  279. buffer_flush(w->response.data);
  280. buffer_strcat(w->response.data, "Who are you? Person GUID is missing");
  281. return HTTP_RESP_PRECOND_FAIL;
  282. }
  283. if(!registry_is_valid_url(url)) {
  284. buffer_flush(w->response.data);
  285. buffer_strcat(w->response.data, "Invalid URL given in the request");
  286. return HTTP_RESP_BAD_REQUEST;
  287. }
  288. registry_lock();
  289. REGISTRY_PERSON *op = registry_person_find(person_guid);
  290. if(!op) {
  291. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  292. registry_json_footer(w);
  293. registry_unlock();
  294. return 430;
  295. }
  296. REGISTRY_PERSON *np = registry_person_find(new_person_guid);
  297. if(!np) {
  298. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  299. registry_json_footer(w);
  300. registry_unlock();
  301. return 431;
  302. }
  303. REGISTRY_MACHINE *m = registry_machine_find(machine_guid);
  304. if(!m) {
  305. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  306. registry_json_footer(w);
  307. registry_unlock();
  308. return 432;
  309. }
  310. struct registry_person_url_callback_verify_machine_exists_data data = { m, 0 };
  311. // verify the old person has access to this machine
  312. for(REGISTRY_PERSON_URL *pu = op->person_urls; pu ;pu = pu->next)
  313. registry_person_url_callback_verify_machine_exists(pu, &data);
  314. if(!data.count) {
  315. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  316. registry_json_footer(w);
  317. registry_unlock();
  318. return 433;
  319. }
  320. // verify the new person has access to this machine
  321. data.count = 0;
  322. for(REGISTRY_PERSON_URL *pu = np->person_urls; pu ;pu = pu->next)
  323. registry_person_url_callback_verify_machine_exists(pu, &data);
  324. if(!data.count) {
  325. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  326. registry_json_footer(w);
  327. registry_unlock();
  328. return 434;
  329. }
  330. // set the cookie of the new person
  331. // the user just switched identity
  332. registry_set_person_cookie(w, np);
  333. // generate the response
  334. registry_json_header(host, w, "switch", REGISTRY_STATUS_OK);
  335. buffer_json_member_add_string(w->response.data, "person_guid", np->guid);
  336. registry_json_footer(w);
  337. registry_unlock();
  338. return HTTP_RESP_OK;
  339. }
  340. // ----------------------------------------------------------------------------
  341. // STATISTICS
  342. void registry_statistics(void) {
  343. if(!registry.enabled) return;
  344. static RRDSET *sts = NULL, *stc = NULL, *stm = NULL;
  345. if(unlikely(!sts)) {
  346. sts = rrdset_create_localhost(
  347. "netdata"
  348. , "registry_sessions"
  349. , NULL
  350. , "registry"
  351. , NULL
  352. , "Netdata Registry Sessions"
  353. , "sessions"
  354. , "registry"
  355. , "stats"
  356. , 131000
  357. , localhost->rrd_update_every
  358. , RRDSET_TYPE_LINE
  359. );
  360. rrddim_add(sts, "sessions", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  361. }
  362. rrddim_set(sts, "sessions", (collected_number)registry.usages_count);
  363. rrdset_done(sts);
  364. // ------------------------------------------------------------------------
  365. if(unlikely(!stc)) {
  366. stc = rrdset_create_localhost(
  367. "netdata"
  368. , "registry_entries"
  369. , NULL
  370. , "registry"
  371. , NULL
  372. , "Netdata Registry Entries"
  373. , "entries"
  374. , "registry"
  375. , "stats"
  376. , 131100
  377. , localhost->rrd_update_every
  378. , RRDSET_TYPE_LINE
  379. );
  380. rrddim_add(stc, "persons", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  381. rrddim_add(stc, "machines", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  382. rrddim_add(stc, "persons_urls", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  383. rrddim_add(stc, "machines_urls", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  384. }
  385. rrddim_set(stc, "persons", (collected_number)registry.persons_count);
  386. rrddim_set(stc, "machines", (collected_number)registry.machines_count);
  387. rrddim_set(stc, "persons_urls", (collected_number)registry.persons_urls_count);
  388. rrddim_set(stc, "machines_urls", (collected_number)registry.machines_urls_count);
  389. rrdset_done(stc);
  390. // ------------------------------------------------------------------------
  391. if(unlikely(!stm)) {
  392. stm = rrdset_create_localhost(
  393. "netdata"
  394. , "registry_mem"
  395. , NULL
  396. , "registry"
  397. , NULL
  398. , "Netdata Registry Memory"
  399. , "KiB"
  400. , "registry"
  401. , "stats"
  402. , 131300
  403. , localhost->rrd_update_every
  404. , RRDSET_TYPE_STACKED
  405. );
  406. rrddim_add(stm, "persons", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  407. rrddim_add(stm, "machines", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  408. rrddim_add(stm, "persons_urls", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  409. rrddim_add(stm, "machines_urls", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  410. }
  411. struct aral_statistics *p_aral_stats = aral_statistics(registry.persons_aral);
  412. rrddim_set(stm, "persons", (collected_number)p_aral_stats->structures.allocated_bytes + (collected_number)p_aral_stats->malloc.allocated_bytes + (collected_number)p_aral_stats->mmap.allocated_bytes);
  413. struct aral_statistics *m_aral_stats = aral_statistics(registry.machines_aral);
  414. rrddim_set(stm, "machines", (collected_number)m_aral_stats->structures.allocated_bytes + (collected_number)m_aral_stats->malloc.allocated_bytes + (collected_number)m_aral_stats->mmap.allocated_bytes);
  415. struct aral_statistics *pu_aral_stats = aral_statistics(registry.person_urls_aral);
  416. rrddim_set(stm, "persons_urls", (collected_number)pu_aral_stats->structures.allocated_bytes + (collected_number)pu_aral_stats->malloc.allocated_bytes + (collected_number)pu_aral_stats->mmap.allocated_bytes);
  417. struct aral_statistics *mu_aral_stats = aral_statistics(registry.machine_urls_aral);
  418. rrddim_set(stm, "machines_urls", (collected_number)mu_aral_stats->structures.allocated_bytes + (collected_number)mu_aral_stats->malloc.allocated_bytes + (collected_number)mu_aral_stats->mmap.allocated_bytes);
  419. rrdset_done(stm);
  420. }