registry.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "daemon/common.h"
  3. #include "registry_internals.h"
  4. #define REGISTRY_STATUS_OK "ok"
  5. #define REGISTRY_STATUS_FAILED "failed"
  6. #define REGISTRY_STATUS_DISABLED "disabled"
  7. // ----------------------------------------------------------------------------
  8. // REGISTRY concurrency locking
  9. static inline void registry_lock(void) {
  10. netdata_mutex_lock(&registry.lock);
  11. }
  12. static inline void registry_unlock(void) {
  13. netdata_mutex_unlock(&registry.lock);
  14. }
  15. // ----------------------------------------------------------------------------
  16. // COOKIES
  17. static void registry_set_cookie(struct web_client *w, const char *guid) {
  18. char edate[100], domain[512];
  19. time_t et = now_realtime_sec() + registry.persons_expiration;
  20. struct tm etmbuf, *etm = gmtime_r(&et, &etmbuf);
  21. strftime(edate, sizeof(edate), "%a, %d %b %Y %H:%M:%S %Z", etm);
  22. snprintfz(w->cookie1, NETDATA_WEB_REQUEST_COOKIE_SIZE, NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s", guid, edate);
  23. if(registry.registry_domain && registry.registry_domain[0])
  24. snprintfz(domain, 511, "Domain=%s", registry.registry_domain);
  25. else
  26. domain[0]='\0';
  27. int length = snprintfz(w->cookie2, NETDATA_WEB_REQUEST_COOKIE_SIZE,
  28. NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; %s",
  29. guid, edate, domain);
  30. size_t remaining_length = NETDATA_WEB_REQUEST_COOKIE_SIZE - length;
  31. // 25 is the necessary length to add new cookies
  32. if (registry.enable_cookies_samesite_secure) {
  33. if (length > 0 && remaining_length > 25)
  34. snprintfz(&w->cookie2[length], remaining_length, "; SameSite=None; Secure");
  35. else
  36. error("Netdata does not have enough space to store cookies SameSite and Secure");
  37. }
  38. }
  39. static inline void registry_set_person_cookie(struct web_client *w, REGISTRY_PERSON *p) {
  40. registry_set_cookie(w, p->guid);
  41. }
  42. // ----------------------------------------------------------------------------
  43. // JSON GENERATION
  44. static inline void registry_json_header(RRDHOST *host, struct web_client *w, const char *action, const char *status) {
  45. buffer_flush(w->response.data);
  46. w->response.data->contenttype = CT_APPLICATION_JSON;
  47. buffer_sprintf(w->response.data, "{\n\t\"action\": \"%s\",\n\t\"status\": \"%s\",\n\t\"hostname\": \"%s\",\n\t\"machine_guid\": \"%s\"",
  48. action, status, host->registry_hostname, host->machine_guid);
  49. }
  50. static inline void registry_json_footer(struct web_client *w) {
  51. buffer_strcat(w->response.data, "\n}\n");
  52. }
  53. static inline int registry_json_disabled(RRDHOST *host, struct web_client *w, const char *action) {
  54. registry_json_header(host, w, action, REGISTRY_STATUS_DISABLED);
  55. buffer_sprintf(w->response.data, ",\n\t\"registry\": \"%s\"",
  56. registry.registry_to_announce);
  57. registry_json_footer(w);
  58. return 200;
  59. }
  60. // ----------------------------------------------------------------------------
  61. // CALLBACKS FOR WALKING THROUGH REGISTRY OBJECTS
  62. // structure used be the callbacks below
  63. struct registry_json_walk_person_urls_callback {
  64. REGISTRY_PERSON *p;
  65. REGISTRY_MACHINE *m;
  66. struct web_client *w;
  67. int count;
  68. };
  69. // callback for rendering PERSON_URLs
  70. static int registry_json_person_url_callback(void *entry, void *data) {
  71. REGISTRY_PERSON_URL *pu = (REGISTRY_PERSON_URL *)entry;
  72. struct registry_json_walk_person_urls_callback *c = (struct registry_json_walk_person_urls_callback *)data;
  73. struct web_client *w = c->w;
  74. if (!strcmp(pu->url->url,"***")) return 0;
  75. if(unlikely(c->count++))
  76. buffer_strcat(w->response.data, ",");
  77. buffer_sprintf(w->response.data, "\n\t\t[ \"%s\", \"%s\", %u000, %u, \"%s\" ]",
  78. pu->machine->guid, pu->url->url, pu->last_t, pu->usages, pu->machine_name);
  79. return 0;
  80. }
  81. // callback for rendering MACHINE_URLs
  82. static int registry_json_machine_url_callback(void *entry, void *data) {
  83. REGISTRY_MACHINE_URL *mu = (REGISTRY_MACHINE_URL *)entry;
  84. struct registry_json_walk_person_urls_callback *c = (struct registry_json_walk_person_urls_callback *)data;
  85. struct web_client *w = c->w;
  86. REGISTRY_MACHINE *m = c->m;
  87. if (!strcmp(mu->url->url,"***")) return 1;
  88. if(unlikely(c->count++))
  89. buffer_strcat(w->response.data, ",");
  90. buffer_sprintf(w->response.data, "\n\t\t[ \"%s\", \"%s\", %u000, %u ]",
  91. m->guid, mu->url->url, mu->last_t, mu->usages);
  92. return 1;
  93. }
  94. // ----------------------------------------------------------------------------
  95. // structure used be the callbacks below
  96. struct registry_person_url_callback_verify_machine_exists_data {
  97. REGISTRY_MACHINE *m;
  98. int count;
  99. };
  100. static inline int registry_person_url_callback_verify_machine_exists(void *entry, void *data) {
  101. struct registry_person_url_callback_verify_machine_exists_data *d = (struct registry_person_url_callback_verify_machine_exists_data *)data;
  102. REGISTRY_PERSON_URL *pu = (REGISTRY_PERSON_URL *)entry;
  103. REGISTRY_MACHINE *m = d->m;
  104. if(pu->machine == m)
  105. d->count++;
  106. return 0;
  107. }
  108. // ----------------------------------------------------------------------------
  109. // dynamic update of the configuration
  110. // The registry does not seem to be designed to support this and I cannot see any concurrency protection
  111. // that could make this safe, so try to be as atomic as possible.
  112. void registry_update_cloud_base_url()
  113. {
  114. // This is guaranteed to be set early in main via post_conf_load()
  115. registry.cloud_base_url = appconfig_get(&cloud_config, CONFIG_SECTION_GLOBAL, "cloud base url", NULL);
  116. if (registry.cloud_base_url == NULL)
  117. fatal("Do not move the cloud base url out of post_conf_load!!");
  118. setenv("NETDATA_REGISTRY_CLOUD_BASE_URL", registry.cloud_base_url, 1);
  119. }
  120. // ----------------------------------------------------------------------------
  121. // public HELLO request
  122. int registry_request_hello_json(RRDHOST *host, struct web_client *w) {
  123. registry_json_header(host, w, "hello", REGISTRY_STATUS_OK);
  124. buffer_sprintf(w->response.data,
  125. ",\n\t\"registry\": \"%s\",\n\t\"cloud_base_url\": \"%s\",\n\t\"anonymous_statistics\": %s",
  126. registry.registry_to_announce,
  127. registry.cloud_base_url, netdata_anonymous_statistics_enabled?"true":"false");
  128. registry_json_footer(w);
  129. return 200;
  130. }
  131. // ----------------------------------------------------------------------------
  132. //public ACCESS request
  133. #define REGISTRY_VERIFY_COOKIES_GUID "give-me-back-this-cookie-now--please"
  134. // the main method for registering an access
  135. int registry_request_access_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *name, time_t when) {
  136. if(unlikely(!registry.enabled))
  137. return registry_json_disabled(host, w, "access");
  138. // ------------------------------------------------------------------------
  139. // verify the browser supports cookies
  140. if(registry.verify_cookies_redirects > 0 && !person_guid[0]) {
  141. buffer_flush(w->response.data);
  142. registry_set_cookie(w, REGISTRY_VERIFY_COOKIES_GUID);
  143. w->response.data->contenttype = CT_APPLICATION_JSON;
  144. buffer_sprintf(w->response.data, "{ \"status\": \"redirect\", \"registry\": \"%s\" }", registry.registry_to_announce);
  145. return 200;
  146. }
  147. if(unlikely(person_guid[0] && !strcmp(person_guid, REGISTRY_VERIFY_COOKIES_GUID)))
  148. person_guid[0] = '\0';
  149. // ------------------------------------------------------------------------
  150. registry_lock();
  151. REGISTRY_PERSON *p = registry_request_access(person_guid, machine_guid, url, name, when);
  152. if(!p) {
  153. registry_json_header(host, w, "access", REGISTRY_STATUS_FAILED);
  154. registry_json_footer(w);
  155. registry_unlock();
  156. return 412;
  157. }
  158. // set the cookie
  159. registry_set_person_cookie(w, p);
  160. // generate the response
  161. registry_json_header(host, w, "access", REGISTRY_STATUS_OK);
  162. buffer_sprintf(w->response.data, ",\n\t\"person_guid\": \"%s\",\n\t\"urls\": [", p->guid);
  163. struct registry_json_walk_person_urls_callback c = { p, NULL, w, 0 };
  164. avl_traverse(&p->person_urls, registry_json_person_url_callback, &c);
  165. buffer_strcat(w->response.data, "\n\t]\n");
  166. registry_json_footer(w);
  167. registry_unlock();
  168. return 200;
  169. }
  170. // ----------------------------------------------------------------------------
  171. // public DELETE request
  172. // the main method for deleting a URL from a person
  173. int registry_request_delete_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *delete_url, time_t when) {
  174. if(!registry.enabled)
  175. return registry_json_disabled(host, w, "delete");
  176. registry_lock();
  177. REGISTRY_PERSON *p = registry_request_delete(person_guid, machine_guid, url, delete_url, when);
  178. if(!p) {
  179. registry_json_header(host, w, "delete", REGISTRY_STATUS_FAILED);
  180. registry_json_footer(w);
  181. registry_unlock();
  182. return 412;
  183. }
  184. // generate the response
  185. registry_json_header(host, w, "delete", REGISTRY_STATUS_OK);
  186. registry_json_footer(w);
  187. registry_unlock();
  188. return 200;
  189. }
  190. // ----------------------------------------------------------------------------
  191. // public SEARCH request
  192. // the main method for searching the URLs of a netdata
  193. int registry_request_search_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *request_machine, time_t when) {
  194. if(!registry.enabled)
  195. return registry_json_disabled(host, w, "search");
  196. registry_lock();
  197. REGISTRY_MACHINE *m = registry_request_machine(person_guid, machine_guid, url, request_machine, when);
  198. if(!m) {
  199. registry_json_header(host, w, "search", REGISTRY_STATUS_FAILED);
  200. registry_json_footer(w);
  201. registry_unlock();
  202. return 404;
  203. }
  204. registry_json_header(host, w, "search", REGISTRY_STATUS_OK);
  205. buffer_strcat(w->response.data, ",\n\t\"urls\": [");
  206. struct registry_json_walk_person_urls_callback c = { NULL, m, w, 0 };
  207. dictionary_get_all(m->machine_urls, registry_json_machine_url_callback, &c);
  208. buffer_strcat(w->response.data, "\n\t]\n");
  209. registry_json_footer(w);
  210. registry_unlock();
  211. return 200;
  212. }
  213. // ----------------------------------------------------------------------------
  214. // SWITCH REQUEST
  215. // the main method for switching user identity
  216. int registry_request_switch_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *new_person_guid, time_t when) {
  217. if(!registry.enabled)
  218. return registry_json_disabled(host, w, "switch");
  219. (void)url;
  220. (void)when;
  221. registry_lock();
  222. REGISTRY_PERSON *op = registry_person_find(person_guid);
  223. if(!op) {
  224. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  225. registry_json_footer(w);
  226. registry_unlock();
  227. return 430;
  228. }
  229. REGISTRY_PERSON *np = registry_person_find(new_person_guid);
  230. if(!np) {
  231. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  232. registry_json_footer(w);
  233. registry_unlock();
  234. return 431;
  235. }
  236. REGISTRY_MACHINE *m = registry_machine_find(machine_guid);
  237. if(!m) {
  238. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  239. registry_json_footer(w);
  240. registry_unlock();
  241. return 432;
  242. }
  243. struct registry_person_url_callback_verify_machine_exists_data data = { m, 0 };
  244. // verify the old person has access to this machine
  245. avl_traverse(&op->person_urls, registry_person_url_callback_verify_machine_exists, &data);
  246. if(!data.count) {
  247. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  248. registry_json_footer(w);
  249. registry_unlock();
  250. return 433;
  251. }
  252. // verify the new person has access to this machine
  253. data.count = 0;
  254. avl_traverse(&np->person_urls, registry_person_url_callback_verify_machine_exists, &data);
  255. if(!data.count) {
  256. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  257. registry_json_footer(w);
  258. registry_unlock();
  259. return 434;
  260. }
  261. // set the cookie of the new person
  262. // the user just switched identity
  263. registry_set_person_cookie(w, np);
  264. // generate the response
  265. registry_json_header(host, w, "switch", REGISTRY_STATUS_OK);
  266. buffer_sprintf(w->response.data, ",\n\t\"person_guid\": \"%s\"", np->guid);
  267. registry_json_footer(w);
  268. registry_unlock();
  269. return 200;
  270. }
  271. // ----------------------------------------------------------------------------
  272. // STATISTICS
  273. void registry_statistics(void) {
  274. if(!registry.enabled) return;
  275. static RRDSET *sts = NULL, *stc = NULL, *stm = NULL;
  276. if(unlikely(!sts)) {
  277. sts = rrdset_create_localhost(
  278. "netdata"
  279. , "registry_sessions"
  280. , NULL
  281. , "registry"
  282. , NULL
  283. , "Netdata Registry Sessions"
  284. , "sessions"
  285. , "registry"
  286. , "stats"
  287. , 131000
  288. , localhost->rrd_update_every
  289. , RRDSET_TYPE_LINE
  290. );
  291. rrddim_add(sts, "sessions", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  292. }
  293. else rrdset_next(sts);
  294. rrddim_set(sts, "sessions", registry.usages_count);
  295. rrdset_done(sts);
  296. // ------------------------------------------------------------------------
  297. if(unlikely(!stc)) {
  298. stc = rrdset_create_localhost(
  299. "netdata"
  300. , "registry_entries"
  301. , NULL
  302. , "registry"
  303. , NULL
  304. , "Netdata Registry Entries"
  305. , "entries"
  306. , "registry"
  307. , "stats"
  308. , 131100
  309. , localhost->rrd_update_every
  310. , RRDSET_TYPE_LINE
  311. );
  312. rrddim_add(stc, "persons", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  313. rrddim_add(stc, "machines", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  314. rrddim_add(stc, "urls", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  315. rrddim_add(stc, "persons_urls", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  316. rrddim_add(stc, "machines_urls", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  317. }
  318. else rrdset_next(stc);
  319. rrddim_set(stc, "persons", registry.persons_count);
  320. rrddim_set(stc, "machines", registry.machines_count);
  321. rrddim_set(stc, "urls", registry.urls_count);
  322. rrddim_set(stc, "persons_urls", registry.persons_urls_count);
  323. rrddim_set(stc, "machines_urls", registry.machines_urls_count);
  324. rrdset_done(stc);
  325. // ------------------------------------------------------------------------
  326. if(unlikely(!stm)) {
  327. stm = rrdset_create_localhost(
  328. "netdata"
  329. , "registry_mem"
  330. , NULL
  331. , "registry"
  332. , NULL
  333. , "Netdata Registry Memory"
  334. , "KiB"
  335. , "registry"
  336. , "stats"
  337. , 131300
  338. , localhost->rrd_update_every
  339. , RRDSET_TYPE_STACKED
  340. );
  341. rrddim_add(stm, "persons", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  342. rrddim_add(stm, "machines", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  343. rrddim_add(stm, "urls", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  344. rrddim_add(stm, "persons_urls", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  345. rrddim_add(stm, "machines_urls", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  346. }
  347. else rrdset_next(stm);
  348. rrddim_set(stm, "persons", registry.persons_memory + registry.persons_count * sizeof(NAME_VALUE) + sizeof(DICTIONARY));
  349. rrddim_set(stm, "machines", registry.machines_memory + registry.machines_count * sizeof(NAME_VALUE) + sizeof(DICTIONARY));
  350. rrddim_set(stm, "urls", registry.urls_memory);
  351. rrddim_set(stm, "persons_urls", registry.persons_urls_memory);
  352. rrddim_set(stm, "machines_urls", registry.machines_urls_memory + registry.machines_count * sizeof(DICTIONARY) + registry.machines_urls_count * sizeof(NAME_VALUE));
  353. rrdset_done(stm);
  354. }