8000 feat: add support for workspace app audit by mafredri · Pull Request #16801 · coder/coder · GitHub
[go: up one dir, main page]

Skip to content

feat: add support for workspace app audit #16801

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 40 commits into from
Mar 18, 2025
Merged
Changes from 1 commit
Commits
Show all changes
40 commits
Select commit Hold shift + click to select a range
d235001
add migrations
mafredri Mar 3, 2025
b18740c
add queries
mafredri Mar 3, 2025
4dfb4fb
make gen
mafredri Mar 3, 2025
7d7922c
add user-agent support to background audit
mafredri Mar 4, 2025
19ca904
add done func support for tracing response writer
mafredri Mar 4, 2025
30bb732
wip auditor
mafredri Mar 3, 2025
94ddbbe
linttt
mafredri Mar 4, 2025
bef7614
dbmem impl
mafredri Mar 4, 2025
d13d3c0
resolve request with middleware
mafredri Mar 4, 2025
9a3a4c8
refactor tracing status writer done func
mafredri Mar 5, 2025
1f4e95b
fix audit mock check
mafredri Mar 5, 2025
bda2d12
mimic http response writer default status 200
mafredri Mar 5, 2025
93784b9
update db tests
mafredri Mar 5, 2025
e38ba0f
dbauthz
mafredri Mar 5, 2025
5f0c141
add app audit session timeout to dbtokenprovider
mafredri Mar 5, 2025
ae06fe4
remove log spam
mafredri Mar 5, 2025
cf1180e
verify audit log
mafredri Mar 5, 2025
623ad6f
add specific test for audit
mafredri Mar 5, 2025
c91024e
cleanup request context hack
mafredri Mar 5, 2025
9608da1
nonlint
mafredri Mar 5, 2025
5bb42c2
add slug or port to support separation of terminal and ports
mafredri Mar 6, 2025
14a1740
make gen
mafredri Mar 6, 2025
4426bcf
improve and reduce boilerplate in tests
mafredri Mar 6, 2025
2c1536e
fixup! add slug or port to support separation of terminal and ports
mafredri Mar 6, 2025
c070d74
move RandomIPv6 to testutil
mafredri Mar 10, 2025
8a61541
commit audit in Issue, revert tracing status writer changes
mafredri Mar 10, 2025
7279b9a
return if tx failed
mafredri Mar 10, 2025
4ff41d4
add fields to audit logger
mafredri Mar 10, 2025
c723b95
comment on WorkspaceAppAuditSessionTimeout use-case
mafredri Mar 17, 2025
217a0d3
update migrations, add status and ua, unique entries
mafredri Mar 17, 2025
336c7b8
rewrite queries, single upsert
mafredri Mar 17, 2025
8d7a763
make gen for db
mafredri Mar 17, 2025
0f162b1
simplify auditInitRequest in workspaceapps
mafredri Mar 17, 2025
22ea58c
update tests
mafredri Mar 17, 2025
119cf03
fix fixtures
mafredri Mar 17, 2025
16ae577
fix dbauthz
mafredri Mar 17, 2025
9003ae0
Merge branch 'main' into mafredri/app-audit
mafredri Mar 17, 2025
c1ae295
fix ip nullability
mafredri Mar 17, 2025
1ee8441
add exception for redirect in audit log
mafredri Mar 17, 2025
5b3b122
unused arg
mafredri Mar 17, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
simplify auditInitRequest in workspaceapps
  • Loading branch information
mafredri committed Mar 17, 2025
commit 0f162b1c8a1dde0a1d02177920f65420c515dc7a
110 changes: 39 additions & 71 deletions coderd/workspaceapps/db.go
Original file line number Diff line number Diff line change
Expand Up @@ -401,27 +401,22 @@ func (p *DBTokenProvider) auditInitRequest(ctx context.Context, w http.ResponseW
}
committed = true

if sw.Status == http.StatusSeeOther {
// Redirects aren't interesting as we will capture the audit
// log after the redirect.
//
// There's a case where we call httpmw.RedirectToLogin for
// path-based apps the user doesn't have access to, in which
// case the dashboard login redirect is used and we end up
// not hitting the workspaceapps API again due to dashboard
// showing 404. (Bug?)
return
}

if aReq.dbReq == nil {
// App doesn't exist, there's information in the Request
// struct but we need UUIDs for audit logging.
return
}

userID := uuid.NullUUID{}
userID := uuid.Nil
if aReq.apiKey != nil {
userID = uuid.NullUUID{Valid: true, UUID: aReq.apiKey.UserID}
userID = aReq.apiKey.UserID
}
userAgent := r.UserAgent()

// Approximation of the status code.
statusCode := sw.Status
if statusCode == 0 {
statusCode = http.StatusOK
}

type additionalFields struct {
Expand All @@ -443,50 +438,34 @@ func (p *DBTokenProvider) auditInitRequest(ctx context.Context, w http.ResponseW
appInfo.SlugOrPort = aReq.dbReq.AppSlugOrPort
}

// If we end up logging, ensure relevant fields are set.
logger := p.Logger.With(
slog.F("workspace_id", aReq.dbReq.Workspace.ID),
slog.F("agent_id", aReq.dbReq.Agent.ID),
slog.F("app_id", aReq.dbReq.App.ID),
slog.F("user_id", userID.UUID),
slog.F("user_id", userID),
slog.F("user_agent", userAgent),
slog.F("app_slug_or_port", appInfo.SlugOrPort),
slog.F("status_code", statusCode),
)

appInfoBytes, err := json.Marshal(appInfo)
if err != nil {
logger.Error(ctx, "marshal additional fields failed", slog.Error(err))
}

var (
updatedIDs []uuid.UUID
sessionID = uuid.Nil
)
err = p.Database.InTx(func(tx database.Store) error {
var startedAt time.Time
err := p.Database.InTx(func(tx database.Store) (err error) {
// nolint:gocritic // System context is needed to write audit sessions.
dangerousSystemCtx := dbauthz.AsSystemRestricted(ctx)

updatedIDs, err = tx.UpdateWorkspaceAppAuditSession(dangerousSystemCtx, database.UpdateWorkspaceAppAuditSessionParams{
AgentID: aReq.dbReq.Agent.ID,
AppID: uuid.NullUUID{Valid: aReq.dbReq.App.ID != uuid.Nil, UUID: aReq.dbReq.App.ID},
UserID: userID,
Ip: aReq.ip,
SlugOrPort: appInfo.SlugOrPort,
UpdatedAt: aReq.time,
startedAt, err = tx.UpsertWorkspaceAppAuditSession(dangerousSystemCtx, database.UpsertWorkspaceAppAuditSessionParams{
// Config.
StaleIntervalMS: p.WorkspaceAppAuditSessionTimeout.Milliseconds(),
})
if err != nil {
return xerrors.Errorf("update workspace app audit session: %w", err)
}
if len(updatedIDs) > 0 {
// Session is valid and got updated, no need to create a new audit log.
return nil
}

sessionID, err = tx.InsertWorkspaceAppAuditSession(dangerousSystemCtx, database.InsertWorkspaceAppAuditSessionParams{
// Data.
AgentID: aReq.dbReq.Agent.ID,
AppID: uuid.NullUUID{Valid: aReq.dbReq.App.ID != uuid.Nil, UUID: aReq.dbReq.App.ID},
UserID: userID,
AppID: aReq.dbReq.App.ID, // Can be unset, in which case uuid.Nil is fine.
UserID: userID, // Can be unset, in which case uuid.Nil is fine.
Ip: aReq.ip,
UserAgent: userAgent,
SlugOrPort: appInfo.SlugOrPort,
StatusCode: int32(statusCode),
StartedAt: aReq.time,
UpdatedAt: aReq.time,
})
Expand All @@ -504,34 +483,23 @@ func (p *DBTokenProvider) auditInitRequest(ctx context.Context, w http.ResponseW
return
}

if sessionID == uuid.Nil {
if sw.Status < 400 {
// Session was updated and no error occurred, no need to
// create a new audit log.
return
}
if len(updatedIDs) > 0 {
// Session was updated but an error occurred, we need to
// create a new audit log.
sessionID = updatedIDs[0]
} else {
// This shouldn't happen, but fall-back to request so it
// can be correlated to _something_.
sessionID = httpmw.RequestID(r)
}
if !startedAt.Equal(aReq.time) {
// If the unique session wasn't renewed, we don't want to log a new
// audit event for it.
return
}

// Mimic the behavior of a HTTP status writer
// by defaulting to 200 if the status is 0.
status := sw.Status
if status == 0 {
status = http.StatusOK
// Marshal additional fields only if we're writing an audit log entry.
appInfoBytes, err := json.Marshal(appInfo)
if err != nil {
logger.Error(ctx, "marshal additional fields failed", slog.Error(err))
}

// We use the background audit function instead of init request
// here because we don't know the resource type ahead of time.
// This also allows us to log unauthenticated access.
auditor := *p.Auditor.Load()
requestID := httpmw.RequestID(r)
switch {
case aReq.dbReq.App.ID != uuid.Nil:
audit.BackgroundAudit(ctx, &audit.BackgroundAuditParams[database.WorkspaceApp]{
Expand All @@ -540,12 +508,12 @@ func (p *DBTokenProvider) auditInitRequest(ctx context.Context, w http.ResponseW

Action: database.AuditActionOpen,
OrganizationID: aReq.dbReq.Workspace.OrganizationID,
UserID: userID.UUID,
RequestID: sessionID,
UserID: userID,
RequestID: requestID,
Time: aReq.time,
Status: status,
Status: statusCode,
IP: aReq.ip.IPNet.IP.String(),
UserAgent: r.UserAgent(),
UserAgent: userAgent,
New: aReq.dbReq.App,
AdditionalFields: appInfoBytes,
})
Expand All @@ -557,12 +525,12 @@ func (p *DBTokenProvider) auditInitRequest(ctx context.Context, w http.ResponseW

Action: database.AuditActionOpen,
OrganizationID: aReq.dbReq.Workspace.OrganizationID,
UserID: userID.UUID,
RequestID: sessionID,
UserID: userID,
RequestID: requestID,
Time: aReq.time,
Status: status,
Status: statusCode,
IP: aReq.ip.IPNet.IP.String(),
UserAgent: r.UserAgent(),
UserAgent: userAgent,
New: aReq.dbReq.Agent,
AdditionalFields: appInfoBytes,
})
Expand Down
0