registry.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "daemon/common.h"
  3. #include "registry_internals.h"
  4. #define REGISTRY_STATUS_OK "ok"
  5. #define REGISTRY_STATUS_REDIRECT "redirect"
  6. #define REGISTRY_STATUS_FAILED "failed"
  7. #define REGISTRY_STATUS_DISABLED "disabled"
  8. bool registry_is_valid_url(const char *url) {
  9. return url && (*url == 'h' || *url == '*');
  10. }
  11. // ----------------------------------------------------------------------------
  12. // REGISTRY concurrency locking
  13. static inline void registry_lock(void) {
  14. netdata_mutex_lock(&registry.lock);
  15. }
  16. static inline void registry_unlock(void) {
  17. netdata_mutex_unlock(&registry.lock);
  18. }
  19. // ----------------------------------------------------------------------------
  20. // COOKIES
  21. static void registry_set_cookie(struct web_client *w, const char *guid) {
  22. char e_date[100];
  23. time_t et = now_realtime_sec() + registry.persons_expiration;
  24. struct tm e_tm_buf, *etm = gmtime_r(&et, &e_tm_buf);
  25. strftime(e_date, sizeof(e_date), "%a, %d %b %Y %H:%M:%S %Z", etm);
  26. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s\r\n", guid, e_date);
  27. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; SameSite=Strict; Expires=%s\r\n", guid, e_date);
  28. if(registry.enable_cookies_samesite_secure)
  29. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; SameSite=None; Secure\r\n", guid, e_date);
  30. if(registry.registry_domain && *registry.registry_domain) {
  31. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; Domain=%s\r\n", guid, e_date, registry.registry_domain);
  32. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; Domain=%s; SameSite=Strict\r\n", guid, e_date, registry.registry_domain);
  33. if(registry.enable_cookies_samesite_secure)
  34. buffer_sprintf(w->response.header, "Set-Cookie: " NETDATA_REGISTRY_COOKIE_NAME "=%s; Expires=%s; Domain=%s; SameSite=None; Secure\r\n", guid, e_date, registry.registry_domain);
  35. }
  36. w->response.has_cookies = true;
  37. }
  38. static inline void registry_set_person_cookie(struct web_client *w, REGISTRY_PERSON *p) {
  39. registry_set_cookie(w, p->guid);
  40. }
  41. // ----------------------------------------------------------------------------
  42. // JSON GENERATION
  43. static inline void registry_json_header(RRDHOST *host, struct web_client *w, const char *action, const char *status) {
  44. buffer_flush(w->response.data);
  45. w->response.data->content_type = CT_APPLICATION_JSON;
  46. buffer_json_initialize(w->response.data, "\"", "\"", 0, true, true);
  47. buffer_json_member_add_string(w->response.data, "action", action);
  48. buffer_json_member_add_string(w->response.data, "status", status);
  49. buffer_json_member_add_string(w->response.data, "hostname", rrdhost_registry_hostname(host));
  50. buffer_json_member_add_string(w->response.data, "machine_guid", host->machine_guid);
  51. }
  52. static inline void registry_json_footer(struct web_client *w) {
  53. buffer_json_finalize(w->response.data);
  54. }
  55. static inline int registry_json_disabled(RRDHOST *host, struct web_client *w, const char *action) {
  56. registry_json_header(host, w, action, REGISTRY_STATUS_DISABLED);
  57. buffer_json_member_add_string(w->response.data, "registry", registry.registry_to_announce);
  58. registry_json_footer(w);
  59. return HTTP_RESP_OK;
  60. }
  61. // ----------------------------------------------------------------------------
  62. // CALLBACKS FOR WALKING THROUGH REGISTRY OBJECTS
  63. // structure used be the callbacks below
  64. struct registry_json_walk_person_urls_callback {
  65. REGISTRY_PERSON *p;
  66. REGISTRY_MACHINE *m;
  67. struct web_client *w;
  68. int count;
  69. };
  70. static STRING *asterisks = NULL;
  71. // callback for rendering PERSON_URLs
  72. static int registry_json_person_url_callback(REGISTRY_PERSON_URL *pu, struct registry_json_walk_person_urls_callback *c) {
  73. if(unlikely(!asterisks))
  74. asterisks = string_strdupz("***");
  75. struct web_client *w = c->w;
  76. if (pu->url == asterisks) return 0;
  77. buffer_json_add_array_item_array(w->response.data);
  78. buffer_json_add_array_item_string(w->response.data, pu->machine->guid);
  79. buffer_json_add_array_item_string(w->response.data, string2str(pu->url));
  80. buffer_json_add_array_item_uint64(w->response.data, pu->last_t * (uint64_t) 1000);
  81. buffer_json_add_array_item_uint64(w->response.data, pu->usages);
  82. buffer_json_add_array_item_string(w->response.data, string2str(pu->machine_name));
  83. buffer_json_array_close(w->response.data);
  84. return 1;
  85. }
  86. // callback for rendering MACHINE_URLs
  87. static int registry_json_machine_url_callback(REGISTRY_MACHINE_URL *mu, struct registry_json_walk_person_urls_callback *c, STRING *hostname) {
  88. if(unlikely(!asterisks))
  89. asterisks = string_strdupz("***");
  90. struct web_client *w = c->w;
  91. REGISTRY_MACHINE *m = c->m;
  92. if (mu->url == asterisks) return 0;
  93. buffer_json_add_array_item_array(w->response.data);
  94. buffer_json_add_array_item_string(w->response.data, m->guid);
  95. buffer_json_add_array_item_string(w->response.data, string2str(mu->url));
  96. buffer_json_add_array_item_uint64(w->response.data, mu->last_t * (uint64_t) 1000);
  97. buffer_json_add_array_item_uint64(w->response.data, mu->usages);
  98. buffer_json_add_array_item_string(w->response.data, string2str(hostname));
  99. buffer_json_array_close(w->response.data);
  100. return 1;
  101. }
  102. // ----------------------------------------------------------------------------
  103. // structure used be the callbacks below
  104. struct registry_person_url_callback_verify_machine_exists_data {
  105. REGISTRY_MACHINE *m;
  106. int count;
  107. };
  108. static inline int registry_person_url_callback_verify_machine_exists(REGISTRY_PERSON_URL *pu, struct registry_person_url_callback_verify_machine_exists_data *d) {
  109. REGISTRY_MACHINE *m = d->m;
  110. if(pu->machine == m)
  111. d->count++;
  112. return 0;
  113. }
  114. // ----------------------------------------------------------------------------
  115. // dynamic update of the configuration
  116. // The registry does not seem to be designed to support this and I cannot see any concurrency protection
  117. // that could make this safe, so try to be as atomic as possible.
  118. void registry_update_cloud_base_url() {
  119. registry.cloud_base_url = appconfig_get(&cloud_config, CONFIG_SECTION_GLOBAL, "cloud base url", DEFAULT_CLOUD_BASE_URL);
  120. setenv("NETDATA_REGISTRY_CLOUD_BASE_URL", registry.cloud_base_url, 1);
  121. }
  122. // ----------------------------------------------------------------------------
  123. // public HELLO request
  124. int registry_request_hello_json(RRDHOST *host, struct web_client *w) {
  125. registry_json_header(host, w, "hello", REGISTRY_STATUS_OK);
  126. if(host->node_id)
  127. buffer_json_member_add_uuid(w->response.data, "node_id", host->node_id);
  128. buffer_json_member_add_object(w->response.data, "agent");
  129. {
  130. buffer_json_member_add_string(w->response.data, "machine_guid", localhost->machine_guid);
  131. if(localhost->node_id)
  132. buffer_json_member_add_uuid(w->response.data, "node_id", localhost->node_id);
  133. char *claim_id = get_agent_claimid();
  134. if (claim_id) {
  135. buffer_json_member_add_string(w->response.data, "claim_id", claim_id);
  136. freez(claim_id);
  137. }
  138. buffer_json_member_add_boolean(w->response.data, "bearer_protection", netdata_is_protected_by_bearer);
  139. }
  140. buffer_json_object_close(w->response.data);
  141. buffer_json_member_add_string(w->response.data, "registry", registry.registry_to_announce);
  142. buffer_json_member_add_string(w->response.data, "cloud_base_url", registry.cloud_base_url);
  143. buffer_json_member_add_boolean(w->response.data, "anonymous_statistics", netdata_anonymous_statistics_enabled);
  144. buffer_json_member_add_array(w->response.data, "nodes");
  145. RRDHOST *h;
  146. dfe_start_read(rrdhost_root_index, h) {
  147. buffer_json_add_array_item_object(w->response.data);
  148. buffer_json_member_add_string(w->response.data, "machine_guid", h->machine_guid);
  149. if(h->node_id)
  150. buffer_json_member_add_uuid(w->response.data, "node_id", h->node_id);
  151. buffer_json_member_add_string(w->response.data, "hostname", rrdhost_registry_hostname(h));
  152. buffer_json_object_close(w->response.data);
  153. }
  154. dfe_done(h);
  155. buffer_json_array_close(w->response.data); // nodes
  156. registry_json_footer(w);
  157. return HTTP_RESP_OK;
  158. }
  159. // ----------------------------------------------------------------------------
  160. // public ACCESS request
  161. // the main method for registering an access
  162. int registry_request_access_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *name, time_t when) {
  163. if(unlikely(!registry.enabled))
  164. return registry_json_disabled(host, w, "access");
  165. if(!registry_is_valid_url(url)) {
  166. buffer_flush(w->response.data);
  167. buffer_strcat(w->response.data, "Invalid URL given in the request");
  168. return HTTP_RESP_BAD_REQUEST;
  169. }
  170. // ------------------------------------------------------------------------
  171. // verify the browser supports cookies or the bearer
  172. if(registry.verify_cookies_redirects > 0 && !person_guid[0]) {
  173. registry_lock();
  174. registry_request_access(REGISTRY_VERIFY_COOKIES_GUID, machine_guid, url, name, when);
  175. registry_unlock();
  176. buffer_flush(w->response.data);
  177. registry_set_cookie(w, REGISTRY_VERIFY_COOKIES_GUID);
  178. w->response.data->content_type = CT_APPLICATION_JSON;
  179. registry_json_header(host, w, "access", REGISTRY_STATUS_REDIRECT);
  180. buffer_json_member_add_string(w->response.data, "person_guid", REGISTRY_VERIFY_COOKIES_GUID);
  181. buffer_json_member_add_string(w->response.data, "registry", registry.registry_to_announce);
  182. registry_json_footer(w);
  183. return HTTP_RESP_OK;
  184. }
  185. if(unlikely(person_guid[0] && is_dummy_person(person_guid)))
  186. // it passed the check - they gave us a different person_guid
  187. // empty the dummy one, so that we will generate a new person_guid
  188. person_guid[0] = '\0';
  189. // ------------------------------------------------------------------------
  190. registry_lock();
  191. REGISTRY_PERSON *p = registry_request_access(person_guid, machine_guid, url, name, when);
  192. if(!p) {
  193. registry_json_header(host, w, "access", REGISTRY_STATUS_FAILED);
  194. registry_json_footer(w);
  195. registry_unlock();
  196. return HTTP_RESP_PRECOND_FAIL;
  197. }
  198. // set the cookie
  199. registry_set_person_cookie(w, p);
  200. // generate the response
  201. registry_json_header(host, w, "access", REGISTRY_STATUS_OK);
  202. buffer_json_member_add_string(w->response.data, "person_guid", p->guid);
  203. buffer_json_member_add_array(w->response.data, "urls");
  204. struct registry_json_walk_person_urls_callback c = { p, NULL, w, 0 };
  205. for(REGISTRY_PERSON_URL *pu = p->person_urls; pu ;pu = pu->next)
  206. registry_json_person_url_callback(pu, &c);
  207. buffer_json_array_close(w->response.data); // urls
  208. registry_json_footer(w);
  209. registry_unlock();
  210. return HTTP_RESP_OK;
  211. }
  212. // ----------------------------------------------------------------------------
  213. // public DELETE request
  214. // the main method for deleting a URL from a person
  215. int registry_request_delete_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url, char *delete_url, time_t when) {
  216. if(!registry.enabled)
  217. return registry_json_disabled(host, w, "delete");
  218. if(!registry_is_valid_url(url)) {
  219. buffer_flush(w->response.data);
  220. buffer_strcat(w->response.data, "Invalid URL given in the request");
  221. return HTTP_RESP_BAD_REQUEST;
  222. }
  223. registry_lock();
  224. REGISTRY_PERSON *p = registry_request_delete(person_guid, machine_guid, url, delete_url, when);
  225. if(!p) {
  226. registry_json_header(host, w, "delete", REGISTRY_STATUS_FAILED);
  227. registry_json_footer(w);
  228. registry_unlock();
  229. return HTTP_RESP_PRECOND_FAIL;
  230. }
  231. // generate the response
  232. registry_json_header(host, w, "delete", REGISTRY_STATUS_OK);
  233. registry_json_footer(w);
  234. registry_unlock();
  235. return HTTP_RESP_OK;
  236. }
  237. // ----------------------------------------------------------------------------
  238. // public SEARCH request
  239. // the main method for searching the URLs of a netdata
  240. int registry_request_search_json(RRDHOST *host, struct web_client *w, char *person_guid, char *request_machine) {
  241. if(!registry.enabled)
  242. return registry_json_disabled(host, w, "search");
  243. if(!person_guid || !person_guid[0]) {
  244. registry_json_header(host, w, "search", REGISTRY_STATUS_FAILED);
  245. registry_json_footer(w);
  246. return HTTP_RESP_PRECOND_FAIL;
  247. }
  248. registry_lock();
  249. STRING *hostname = NULL;
  250. REGISTRY_MACHINE *m = registry_request_machine(person_guid, request_machine, &hostname);
  251. if(!m) {
  252. registry_json_header(host, w, "search", REGISTRY_STATUS_FAILED);
  253. registry_json_footer(w);
  254. registry_unlock();
  255. string_freez(hostname);
  256. return HTTP_RESP_NOT_FOUND;
  257. }
  258. registry_json_header(host, w, "search", REGISTRY_STATUS_OK);
  259. buffer_json_member_add_array(w->response.data, "urls");
  260. struct registry_json_walk_person_urls_callback c = { NULL, m, w, 0 };
  261. for(REGISTRY_MACHINE_URL *mu = m->machine_urls; mu ; mu = mu->next)
  262. registry_json_machine_url_callback(mu, &c, hostname);
  263. buffer_json_array_close(w->response.data);
  264. registry_json_footer(w);
  265. registry_unlock();
  266. string_freez(hostname);
  267. return HTTP_RESP_OK;
  268. }
  269. // ----------------------------------------------------------------------------
  270. // SWITCH REQUEST
  271. // the main method for switching user identity
  272. int registry_request_switch_json(RRDHOST *host, struct web_client *w, char *person_guid, char *machine_guid, char *url __maybe_unused, char *new_person_guid, time_t when __maybe_unused) {
  273. if(!registry.enabled)
  274. return registry_json_disabled(host, w, "switch");
  275. if(!person_guid || !person_guid[0]) {
  276. buffer_flush(w->response.data);
  277. buffer_strcat(w->response.data, "Who are you? Person GUID is missing");
  278. return HTTP_RESP_PRECOND_FAIL;
  279. }
  280. if(!registry_is_valid_url(url)) {
  281. buffer_flush(w->response.data);
  282. buffer_strcat(w->response.data, "Invalid URL given in the request");
  283. return HTTP_RESP_BAD_REQUEST;
  284. }
  285. registry_lock();
  286. REGISTRY_PERSON *op = registry_person_find(person_guid);
  287. if(!op) {
  288. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  289. registry_json_footer(w);
  290. registry_unlock();
  291. return 430;
  292. }
  293. REGISTRY_PERSON *np = registry_person_find(new_person_guid);
  294. if(!np) {
  295. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  296. registry_json_footer(w);
  297. registry_unlock();
  298. return 431;
  299. }
  300. REGISTRY_MACHINE *m = registry_machine_find(machine_guid);
  301. if(!m) {
  302. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  303. registry_json_footer(w);
  304. registry_unlock();
  305. return 432;
  306. }
  307. struct registry_person_url_callback_verify_machine_exists_data data = { m, 0 };
  308. // verify the old person has access to this machine
  309. for(REGISTRY_PERSON_URL *pu = op->person_urls; pu ;pu = pu->next)
  310. registry_person_url_callback_verify_machine_exists(pu, &data);
  311. if(!data.count) {
  312. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  313. registry_json_footer(w);
  314. registry_unlock();
  315. return 433;
  316. }
  317. // verify the new person has access to this machine
  318. data.count = 0;
  319. for(REGISTRY_PERSON_URL *pu = np->person_urls; pu ;pu = pu->next)
  320. registry_person_url_callback_verify_machine_exists(pu, &data);
  321. if(!data.count) {
  322. registry_json_header(host, w, "switch", REGISTRY_STATUS_FAILED);
  323. registry_json_footer(w);
  324. registry_unlock();
  325. return 434;
  326. }
  327. // set the cookie of the new person
  328. // the user just switched identity
  329. registry_set_person_cookie(w, np);
  330. // generate the response
  331. registry_json_header(host, w, "switch", REGISTRY_STATUS_OK);
  332. buffer_json_member_add_string(w->response.data, "person_guid", np->guid);
  333. registry_json_footer(w);
  334. registry_unlock();
  335. return HTTP_RESP_OK;
  336. }
  337. // ----------------------------------------------------------------------------
  338. // STATISTICS
  339. void registry_statistics(void) {
  340. if(!registry.enabled) return;
  341. static RRDSET *sts = NULL, *stc = NULL, *stm = NULL;
  342. if(unlikely(!sts)) {
  343. sts = rrdset_create_localhost(
  344. "netdata"
  345. , "registry_sessions"
  346. , NULL
  347. , "registry"
  348. , NULL
  349. , "Netdata Registry Sessions"
  350. , "sessions"
  351. , "registry"
  352. , "stats"
  353. , 131000
  354. , localhost->rrd_update_every
  355. , RRDSET_TYPE_LINE
  356. );
  357. rrddim_add(sts, "sessions", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  358. }
  359. rrddim_set(sts, "sessions", (collected_number)registry.usages_count);
  360. rrdset_done(sts);
  361. // ------------------------------------------------------------------------
  362. if(unlikely(!stc)) {
  363. stc = rrdset_create_localhost(
  364. "netdata"
  365. , "registry_entries"
  366. , NULL
  367. , "registry"
  368. , NULL
  369. , "Netdata Registry Entries"
  370. , "entries"
  371. , "registry"
  372. , "stats"
  373. , 131100
  374. , localhost->rrd_update_every
  375. , RRDSET_TYPE_LINE
  376. );
  377. rrddim_add(stc, "persons", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  378. rrddim_add(stc, "machines", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  379. rrddim_add(stc, "persons_urls", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  380. rrddim_add(stc, "machines_urls", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  381. }
  382. rrddim_set(stc, "persons", (collected_number)registry.persons_count);
  383. rrddim_set(stc, "machines", (collected_number)registry.machines_count);
  384. rrddim_set(stc, "persons_urls", (collected_number)registry.persons_urls_count);
  385. rrddim_set(stc, "machines_urls", (collected_number)registry.machines_urls_count);
  386. rrdset_done(stc);
  387. // ------------------------------------------------------------------------
  388. if(unlikely(!stm)) {
  389. stm = rrdset_create_localhost(
  390. "netdata"
  391. , "registry_mem"
  392. , NULL
  393. , "registry"
  394. , NULL
  395. , "Netdata Registry Memory"
  396. , "KiB"
  397. , "registry"
  398. , "stats"
  399. , 131300
  400. , localhost->rrd_update_every
  401. , RRDSET_TYPE_STACKED
  402. );
  403. rrddim_add(stm, "persons", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  404. rrddim_add(stm, "machines", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  405. rrddim_add(stm, "persons_urls", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  406. rrddim_add(stm, "machines_urls", NULL, 1, 1024, RRD_ALGORITHM_ABSOLUTE);
  407. }
  408. struct aral_statistics *p_aral_stats = aral_statistics(registry.persons_aral);
  409. rrddim_set(stm, "persons", (collected_number)p_aral_stats->structures.allocated_bytes + (collected_number)p_aral_stats->malloc.allocated_bytes + (collected_number)p_aral_stats->mmap.allocated_bytes);
  410. struct aral_statistics *m_aral_stats = aral_statistics(registry.machines_aral);
  411. rrddim_set(stm, "machines", (collected_number)m_aral_stats->structures.allocated_bytes + (collected_number)m_aral_stats->malloc.allocated_bytes + (collected_number)m_aral_stats->mmap.allocated_bytes);
  412. struct aral_statistics *pu_aral_stats = aral_statistics(registry.person_urls_aral);
  413. rrddim_set(stm, "persons_urls", (collected_number)pu_aral_stats->structures.allocated_bytes + (collected_number)pu_aral_stats->malloc.allocated_bytes + (collected_number)pu_aral_stats->mmap.allocated_bytes);
  414. struct aral_statistics *mu_aral_stats = aral_statistics(registry.machine_urls_aral);
  415. rrddim_set(stm, "machines_urls", (collected_number)mu_aral_stats->structures.allocated_bytes + (collected_number)mu_aral_stats->malloc.allocated_bytes + (collected_number)mu_aral_stats->mmap.allocated_bytes);
  416. rrdset_done(stm);
  417. }