registry.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "daemon/common.h"
  3. #include "registry_internals.h"
  4. #define REGISTRY_STATUS_OK "ok"
  5. #define REGISTRY_STATUS_REDIRECT "redirect"
  6. #define REGISTRY_STATUS_FAILED "failed"
  7. #define REGISTRY_STATUS_DISABLED "disabled"
  8. bool registry_is_valid_url(const char *url) {
  9. return url && (*url == 'h' || *url == '*');
  10. }
  11. // ----------------------------------------------------------------------------
  12. // REGISTRY concurrency locking
  13. static inline void registry_lock(void) {
  14. netdata_mutex_lock(&registry.lock);
  15. }
  16. static inline void registry_unlock(void) {
  17. netdata_mutex_unlock(&registry.lock);
  18. }
  19. // ----------------------------------------------------------------------------
  20. // COOKIES
  21. static void registry_set_cookie(struct web_client *w, const char *guid) {
  22. char rfc7231_expires[RFC7231_MAX_LENGTH];
  23. rfc7231_datetime(rfc7231_expires, sizeof(rfc7231_expires), now_realtime_sec() + registry.persons_expiration);
  24. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s\r\n", guid, rfc7231_expires);
  25. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; SameSite=Strict; Expires=%s\r\n", guid, rfc7231_expires);
  26. if(registry.enable_cookies_samesite_secure)
  27. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; SameSite=None; Secure\r\n", guid, rfc7231_expires);
  28. if(registry.registry_domain && *registry.registry_domain) {
  29. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; Domain=%s\r\n", guid, rfc7231_expires, registry.registry_domain);
  30. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; Domain=%s; SameSite=Strict\r\n", guid, rfc7231_expires, registry.registry_domain);
  31. if(registry.enable_cookies_samesite_secure)
  32. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; Domain=%s; SameSite=None; Secure\r\n", guid, rfc7231_expires, registry.registry_domain);
  33. }
  34. w->response.has_cookies = true;
  35. }
  36. static inline void registry_set_person_cookie(struct web_client *w, REGISTRY_PERSON *p) {
  37. registry_set_cookie(w, p->guid);
  38. }
  39. // ----------------------------------------------------------------------------
  40. // JSON GENERATION
  41. static inline void registry_json_header(RRDHOST *host, struct web_client *w, const char *action, const char *status) {
  42. buffer_flush(w->response.data);
  43. w->response.data->content_type = CT_APPLICATION_JSON;
  44. buffer_json_initialize(w->response.data, "\"", "\"", 0, true, BUFFER_JSON_OPTIONS_DEFAULT);
  45. buffer_json_member_add_string(w->response.data, "action", action);
  46. buffer_json_member_add_string(w->response.data, "status", status);
  47. buffer_json_member_add_string(w->response.data, "hostname", rrdhost_registry_hostname(host));
  48. buffer_json_member_add_string(w->response.data, "machine_guid", host->machine_guid);
  49. }
  50. static inline void registry_json_footer(struct web_client *w) {
  51. buffer_json_finalize(w->response.data);
  52. }
  53. static inline int registry_json_disabled(RRDHOST *host, struct web_client *w, const char *action) {
  54. registry_json_header(host, w, action, REGISTRY_STATUS_DISABLED);
  55. buffer_json_member_add_string(w->response.data, "registry", registry.registry_to_announce);
  56. registry_json_footer(w);
  57. return HTTP_RESP_OK;
  58. }
  59. // ----------------------------------------------------------------------------
  60. // CALLBACKS FOR WALKING THROUGH REGISTRY OBJECTS
  61. // structure used be the callbacks below
  62. struct registry_json_walk_person_urls_callback {
  63. REGISTRY_PERSON *p;
  64. REGISTRY_MACHINE *m;
  65. struct web_client *w;
  66. int count;
  67. };
  68. static STRING *asterisks = NULL;
  69. // callback for rendering PERSON_URLs
  70. static int registry_json_person_url_callback(REGISTRY_PERSON_URL *pu, struct registry_json_walk_person_urls_callback *c) {
  71. if(unlikely(!asterisks))
  72. asterisks = string_strdupz("***");
  73. struct web_client *w = c->w;
  74. if (pu->url == asterisks) return 0;
  75. buffer_json_add_array_item_array(w->response.data);
  76. buffer_json_add_array_item_string(w->response.data, pu->machine->guid);
  77. buffer_json_add_array_item_string(w->response.data, string2str(pu->url));
  78. buffer_json_add_array_item_uint64(w->response.data, pu->last_t * (uint64_t) 1000);
  79. buffer_json_add_array_item_uint64(w->response.data, pu->usages);
  80. buffer_json_add_array_item_string(w->response.data, string2str(pu->machine_name));
  81. buffer_json_array_close(w->response.data);
  82. return 1;
  83. }
  84. // callback for rendering MACHINE_URLs
  85. static int registry_json_machine_url_callback(REGISTRY_MACHINE_URL *mu, struct registry_json_walk_person_urls_callback *c, STRING *hostname) {
  86. if(unlikely(!asterisks))
  87. asterisks = string_strdupz("***");
  88. struct web_client *w = c->w;
  89. REGISTRY_MACHINE *m = c->m;
  90. if (mu->url == asterisks) return 0;
  91. buffer_json_add_array_item_array(w->response.data);
  92. buffer_json_add_array_item_string(w->response.data, m->guid);
  93. buffer_json_add_array_item_string(w->response.data, string2str(mu->url));
  94. buffer_json_add_array_item_uint64(w->response.data, mu->last_t * (uint64_t) 1000);
  95. buffer_json_add_array_item_uint64(w->response.data, mu->usages);
  96. buffer_json_add_array_item_string(w->response.data, string2str(hostname));
  97. buffer_json_array_close(w->response.data);
  98. return 1;
  99. }
  100. // ----------------------------------------------------------------------------
  101. // structure used be the callbacks below
  102. struct registry_person_url_callback_verify_machine_exists_data {
  103. REGISTRY_MACHINE *m;
  104. int count;
  105. };
  106. static inline int registry_person_url_callback_verify_machine_exists(REGISTRY_PERSON_URL *pu, struct registry_person_url_callback_verify_machine_exists_data *d) {
  107. REGISTRY_MACHINE *m = d->m;
  108. if(pu->machine == m)
  109. d->count++;
  110. return 0;
  111. }
  112. // ----------------------------------------------------------------------------
  113. // dynamic update of the configuration
  114. // The registry does not seem to be designed to support this and I cannot see any concurrency protection
  115. // that could make this safe, so try to be as atomic as possible.
  116. void registry_update_cloud_base_url() {
  117. registry.cloud_base_url = appconfig_get(&cloud_config, CONFIG_SECTION_GLOBAL, "cloud base url", DEFAULT_CLOUD_BASE_URL);
  118. setenv("NETDATA_REGISTRY_CLOUD_BASE_URL", registry.cloud_base_url, 1);
  119. }
  120. // ----------------------------------------------------------------------------
  121. // public HELLO request
  122. int registry_request_hello_json(RRDHOST *host, struct web_client *w, bool do_not_track) {
  123. registry_json_header(host, w, "hello", REGISTRY_STATUS_OK);
  124. if(host->node_id)
  125. buffer_json_member_add_uuid(w->response.data, "node_id", host->node_id);
  126. buffer_json_member_add_object(w->response.data, "agent");
  127. {
  128. buffer_json_member_add_string(w->response.data, "machine_guid", localhost->machine_guid);
  129. if(localhost->node_id)
  130. buffer_json_member_add_uuid(w->response.data, "node_id", localhost->node_id);
  131. char *claim_id = get_agent_claimid();
  132. if (claim_id) {
  133. buffer_json_member_add_string(w->response.data, "claim_id", claim_id);
  134. freez(claim_id);
  135. }
  136. buffer_json_member_add_boolean(w->response.data, "bearer_protection", netdata_is_protected_by_bearer);
  137. }
  138. buffer_json_object_close(w->response.data);
  139. CLOUD_STATUS status = cloud_status();
  140. buffer_json_member_add_string(w->response.data, "cloud_status", cloud_status_to_string(status));
  141. buffer_json_member_add_string(w->response.data, "cloud_base_url", registry.cloud_base_url);
  142. buffer_json_member_add_string(w->response.data, "registry", registry.registry_to_announce);
  143. buffer_json_member_add_boolean(w->response.data, "anonymous_statistics", do_not_track ? false : netdata_anonymous_statistics_enabled);
  144. buffer_json_member_add_boolean(w->response.data, "X-Netdata-Auth", true);
  145. buffer_json_member_add_array(w->response.data, "nodes");
  146. RRDHOST *h;
  147. dfe_start_read(rrdhost_root_index, h) {
  148. buffer_json_add_array_item_object(w->response.data);
  149. buffer_json_member_add_string(w->response.data, "machine_guid", h->machine_guid);
  150. if(h->node_id)
  151. buffer_json_member_add_uuid(w->response.data, "node_id", h->node_id);
  152. buffer_json_member_add_string(w->response.data, "hostname", rrdhost_registry_hostname(h));
  153. buffer_json_object_close(w->response.data);
  154. }
  155. dfe_done(h);
  156. buffer_json_array_close(w->response.data); // nodes
  157. registry_json_footer(w);
  158. return HTTP_RESP_OK;
  159. }
  160. // ----------------------------------------------------------------------------
  161. // public ACCESS request
  162. // the main method for registering an access
  163. int registry_request_access_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *name, time_t when) {
  164. if(unlikely(!registry.enabled))
  165. return registry_json_disabled(host, w, "access");
  166. if(!registry_is_valid_url(url)) {
  167. buffer_flush(w->response.data);
  168. buffer_strcat(w->response.data, "Invalid URL given in the request");
  169. return HTTP_RESP_BAD_REQUEST;
  170. }
  171. // ------------------------------------------------------------------------
  172. // verify the browser supports cookies or the bearer
  173. if(registry.verify_cookies_redirects > 0 && !person_guid[0]) {
  174. registry_lock();
  175. registry_request_access(REGISTRY_VERIFY_COOKIES_GUID, machine_guid, url, name, when);
  176. registry_unlock();
  177. buffer_flush(w->response.data);
  178. registry_set_cookie(w, REGISTRY_VERIFY_COOKIES_GUID);
  179. w->response.data->content_type = CT_APPLICATION_JSON;
  180. registry_json_header(host, w, "access", REGISTRY_STATUS_REDIRECT);
  181. buffer_json_member_add_string(w->response.data, "person_guid", REGISTRY_VERIFY_COOKIES_GUID);
  182. buffer_json_member_add_string(w->response.data, "registry", registry.registry_to_announce);
  183. registry_json_footer(w);
  184. return HTTP_RESP_OK;
  185. }
  186. if(unlikely(person_guid[0] && is_dummy_person(person_guid)))
  187. // it passed the check - they gave us a different person_guid
  188. // empty the dummy one, so that we will generate a new person_guid
  189. person_guid[0] = '\0';
  190. // ------------------------------------------------------------------------
  191. registry_lock();
  192. REGISTRY_PERSON *p = registry_request_access(person_guid, machine_guid, url, name, when);
  193. if(!p) {
  194. registry_json_header(host, w, "access", REGISTRY_STATUS_FAILED);
  195. registry_json_footer(w);
  196. registry_unlock();
  197. return HTTP_RESP_PRECOND_FAIL;
  198. }
  199. // set the cookie
  200. registry_set_person_cookie(w, p);
  201. // generate the response
  202. registry_json_header(host, w, "access", REGISTRY_STATUS_OK);
  203. buffer_json_member_add_string(w->response.data, "person_guid", p->guid);
  204. buffer_json_member_add_array(w->response.data, "urls");
  205. struct registry_json_walk_person_urls_callback c = { p, NULL, w, 0 };
  206. for(REGISTRY_PERSON_URL *pu = p->person_urls; pu ;pu = pu->next)
  207. registry_json_person_url_callback(pu, &c);
  208. buffer_json_array_close(w->response.data); // urls
  209. registry_json_footer(w);
  210. registry_unlock();
  211. return HTTP_RESP_OK;
  212. }
  213. // ----------------------------------------------------------------------------
  214. // public DELETE request
  215. // the main method for deleting a URL from a person
  216. int registry_request_delete_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *delete_url, time_t when) {
  217. if(!registry.enabled)
  218. return registry_json_disabled(host, w, "delete");
  219. if(!registry_is_valid_url(url)) {
  220. buffer_flush(w->response.data);
  221. buffer_strcat(w->response.data, "Invalid URL given in the request");
  222. return HTTP_RESP_BAD_REQUEST;
  223. }
  224. registry_lock();
  225. REGISTRY_PERSON *p = registry_request_delete(person_guid, machine_guid, url, delete_url, when);
  226. if(!p) {
  227. registry_json_header(host, w, "delete", REGISTRY_STATUS_FAILED);
  228. registry_json_footer(w);
  229. registry_unlock();
  230. return HTTP_RESP_PRECOND_FAIL;
  231. }
  232. // generate the response
  233. registry_json_header(host, w, "delete", REGISTRY_STATUS_OK);
  234. registry_json_footer(w);
  235. registry_unlock();
  236. return HTTP_RESP_OK;
  237. }
  238. // ----------------------------------------------------------------------------
  239. // public SEARCH request
  240. // the main method for searching the URLs of a netdata
  241. int registry_request_search_json(RRDHOST *host, struct web_client *w, char *person_guid, char *request_machine) {
  242. if(!registry.enabled)
  243. return registry_json_disabled(host, w, "search");
  244. if(!person_guid || !person_guid[0]) {
  245. registry_json_header(host, w, "search", REGISTRY_STATUS_FAILED);
  246. registry_json_footer(w);
  247. return HTTP_RESP_PRECOND_FAIL;
  248. }
  249. registry_lock();
  250. STRING *hostname = NULL;
  251. REGISTRY_MACHINE *m = registry_request_machine(person_guid, request_machine, &hostname);
  252. if(!m) {
  253. registry_json_header(host, w, "search", REGISTRY_STATUS_FAILED);
  254. registry_json_footer(w);
  255. registry_unlock();
  256. string_freez(hostname);
  257. return HTTP_RESP_NOT_FOUND;
  258. }
  259. registry_json_header(host, w, "search", REGISTRY_STATUS_OK);
  260. buffer_json_member_add_array(w->response.data, "urls");
  261. struct registry_json_walk_person_urls_callback c = { NULL, m, w, 0 };
  262. for(REGISTRY_MACHINE_URL *mu = m->machine_urls; mu ; mu = mu->next)
  263. registry_json_machine_url_callback(mu, &c, hostname);
  264. buffer_json_array_close(w->response.data);
  265. registry_json_footer(w);
  266. registry_unlock();
  267. string_freez(hostname);
  268. return HTTP_RESP_OK;
  269. }
  270. // ----------------------------------------------------------------------------
  271. // SWITCH REQUEST
  272. // the main method for switching user identity
  273. int registry_request_switch_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url __maybe_unused, char *new_person_guid, time_t when __maybe_unused) {
  274. if(!registry.enabled)
  275. return registry_json_disabled(host, w, "switch");
  276. if(!person_guid || !person_guid[0]) {
  277. buffer_flush(w->response.data);
  278. buffer_strcat(w->response.data, "Who are you? Person GUID is missing");
  279. return HTTP_RESP_PRECOND_FAIL;
  280. }
  281. if(!registry_is_valid_url(url)) {
  282. buffer_flush(w->response.data);
  283. buffer_strcat(w->response.data, "Invalid URL given in the request");
  284. return HTTP_RESP_BAD_REQUEST;
  285. }
  286. registry_lock();
  287. REGISTRY_PERSON *op = registry_person_find(person_guid);
  288. if(!op) {
  289. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  290. registry_json_footer(w);
  291. registry_unlock();
  292. return 430;
  293. }
  294. REGISTRY_PERSON *np = registry_person_find(new_person_guid);
  295. if(!np) {
  296. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  297. registry_json_footer(w);
  298. registry_unlock();
  299. return 431;
  300. }
  301. REGISTRY_MACHINE *m = registry_machine_find(machine_guid);
  302. if(!m) {
  303. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  304. registry_json_footer(w);
  305. registry_unlock();
  306. return 432;
  307. }
  308. struct registry_person_url_callback_verify_machine_exists_data data = { m, 0 };
  309. // verify the old person has access to this machine
  310. for(REGISTRY_PERSON_URL *pu = op->person_urls; pu ;pu = pu->next)
  311. registry_person_url_callback_verify_machine_exists(pu, &data);
  312. if(!data.count) {
  313. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  314. registry_json_footer(w);
  315. registry_unlock();
  316. return 433;
  317. }
  318. // verify the new person has access to this machine
  319. data.count = 0;
  320. for(REGISTRY_PERSON_URL *pu = np->person_urls; pu ;pu = pu->next)
  321. registry_person_url_callback_verify_machine_exists(pu, &data);
  322. if(!data.count) {
  323. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  324. registry_json_footer(w);
  325. registry_unlock();
  326. return 434;
  327. }
  328. // set the cookie of the new person
  329. // the user just switched identity
  330. registry_set_person_cookie(w, np);
  331. // generate the response
  332. registry_json_header(host, w, "switch", REGISTRY_STATUS_OK);
  333. buffer_json_member_add_string(w->response.data, "person_guid", np->guid);
  334. registry_json_footer(w);
  335. registry_unlock();
  336. return HTTP_RESP_OK;
  337. }
  338. // ----------------------------------------------------------------------------
  339. // STATISTICS
  340. void registry_statistics(void) {
  341. if(!registry.enabled) return;
  342. static RRDSET *sts = NULL, *stc = NULL, *stm = NULL;
  343. if(unlikely(!sts)) {
  344. sts = rrdset_create_localhost(
  345. "netdata"
  346. , "registry_sessions"
  347. , NULL
  348. , "registry"
  349. , NULL
  350. , "Netdata Registry Sessions"
  351. , "sessions"
  352. , "registry"
  353. , "stats"
  354. , 131000
  355. , localhost->rrd_update_every
  356. , RRDSET_TYPE_LINE
  357. );
  358. rrddim_add(sts, "sessions", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  359. }
  360. rrddim_set(sts, "sessions", (collected_number)registry.usages_count);
  361. rrdset_done(sts);
  362. // ------------------------------------------------------------------------
  363. if(unlikely(!stc)) {
  364. stc = rrdset_create_localhost(
  365. "netdata"
  366. , "registry_entries"
  367. , NULL
  368. , "registry"
  369. , NULL
  370. , "Netdata Registry Entries"
  371. , "entries"
  372. , "registry"
  373. , "stats"
  374. , 131100
  375. , localhost->rrd_update_every
  376. , RRDSET_TYPE_LINE
  377. );
  378. rrddim_add(stc, "persons", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  379. rrddim_add(stc, "machines", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  380. rrddim_add(stc, "persons_urls", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  381. rrddim_add(stc, "machines_urls", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  382. }
  383. rrddim_set(stc, "persons", (collected_number)registry.persons_count);
  384. rrddim_set(stc, "machines", (collected_number)registry.machines_count);
  385. rrddim_set(stc, "persons_urls", (collected_number)registry.persons_urls_count);
  386. rrddim_set(stc, "machines_urls", (collected_number)registry.machines_urls_count);
  387. rrdset_done(stc);
  388. // ------------------------------------------------------------------------
  389. if(unlikely(!stm)) {
  390. stm = rrdset_create_localhost(
  391. "netdata"
  392. , "registry_mem"
  393. , NULL
  394. , "registry"
  395. , NULL
  396. , "Netdata Registry Memory"
  397. , "KiB"
  398. , "registry"
  399. , "stats"
  400. , 131300
  401. , localhost->rrd_update_every
  402. , RRDSET_TYPE_STACKED
  403. );
  404. rrddim_add(stm, "persons", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  405. rrddim_add(stm, "machines", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  406. rrddim_add(stm, "persons_urls", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  407. rrddim_add(stm, "machines_urls", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  408. }
  409. struct aral_statistics *p_aral_stats = aral_statistics(registry.persons_aral);
  410. rrddim_set(stm, "persons", (collected_number)p_aral_stats->structures.allocated_bytes + (collected_number)p_aral_stats->malloc.allocated_bytes + (collected_number)p_aral_stats->mmap.allocated_bytes);
  411. struct aral_statistics *m_aral_stats = aral_statistics(registry.machines_aral);
  412. rrddim_set(stm, "machines", (collected_number)m_aral_stats->structures.allocated_bytes + (collected_number)m_aral_stats->malloc.allocated_bytes + (collected_number)m_aral_stats->mmap.allocated_bytes);
  413. struct aral_statistics *pu_aral_stats = aral_statistics(registry.person_urls_aral);
  414. rrddim_set(stm, "persons_urls", (collected_number)pu_aral_stats->structures.allocated_bytes + (collected_number)pu_aral_stats->malloc.allocated_bytes + (collected_number)pu_aral_stats->mmap.allocated_bytes);
  415. struct aral_statistics *mu_aral_stats = aral_statistics(registry.machine_urls_aral);
  416. rrddim_set(stm, "machines_urls", (collected_number)mu_aral_stats->structures.allocated_bytes + (collected_number)mu_aral_stats->malloc.allocated_bytes + (collected_number)mu_aral_stats->mmap.allocated_bytes);
  417. rrdset_done(stm);
  418. }