package coderd import ( "context" "database/sql" "encoding/json" "fmt" "net" "net/http" "net/netip" "time" "github.com/google/uuid" "github.com/sqlc-dev/pqtype" "golang.org/x/xerrors" "cdr.dev/slog" "github.com/coder/coder/v2/coderd/audit" "github.com/coder/coder/v2/coderd/database" "github.com/coder/coder/v2/coderd/database/db2sdk" "github.com/coder/coder/v2/coderd/httpapi" "github.com/coder/coder/v2/coderd/httpmw" "github.com/coder/coder/v2/coderd/rbac" "github.com/coder/coder/v2/coderd/searchquery" "github.com/coder/coder/v2/codersdk" ) // @Summary Get audit logs // @ID get-audit-logs // @Security CoderSessionToken // @Produce json // @Tags Audit // @Param q query string false "Search query" // @Param limit query int true "Page limit" // @Param offset query int false "Page offset" // @Success 200 {object} codersdk.AuditLogResponse // @Router /audit [get] func (api *API) auditLogs(rw http.ResponseWriter, r *http.Request) { ctx := r.Context() apiKey := httpmw.APIKey(r) page, ok := parsePagination(rw, r) if !ok { return } queryStr := r.URL.Query().Get("q") filter, errs := searchquery.AuditLogs(queryStr) if len(errs) > 0 { httpapi.Write(ctx, rw, http.StatusBadRequest, codersdk.Response{ Message: "Invalid audit search query.", Validations: errs, }) return } filter.Offset = int32(page.Offset) filter.Limit = int32(page.Limit) if filter.Username == "me" { filter.UserID = apiKey.UserID filter.Username = "" } dblogs, err := api.Database.GetAuditLogsOffset(ctx, filter) if err != nil { httpapi.InternalServerError(rw, err) return } // GetAuditLogsOffset does not return ErrNoRows because it uses a window function to get the count. // So we need to check if the dblogs is empty and return an empty array if so. if len(dblogs) == 0 { httpapi.Write(ctx, rw, http.StatusOK, codersdk.AuditLogResponse{ AuditLogs: []codersdk.AuditLog{}, Count: 0, }) return } httpapi.Write(ctx, rw, http.StatusOK, codersdk.AuditLogResponse{ AuditLogs: api.convertAuditLogs(ctx, dblogs), Count: dblogs[0].Count, }) } // @Summary Generate fake audit log // @ID generate-fake-audit-log // @Security CoderSessionToken // @Accept json // @Tags Audit // @Param request body codersdk.CreateTestAuditLogRequest true "Audit log request" // @Success 204 // @Router /audit/testgenerate [post] // @x-apidocgen {"skip": true} func (api *API) generateFakeAuditLog(rw http.ResponseWriter, r *http.Request) { ctx := r.Context() key := httpmw.APIKey(r) user, err := api.Database.GetUserByID(ctx, key.UserID) if err != nil { httpapi.InternalServerError(rw, err) return } diff, err := json.Marshal(codersdk.AuditDiff{ "foo": codersdk.AuditDiffField{Old: "bar", New: "baz"}, }) if err != nil { httpapi.InternalServerError(rw, err) return } ip := net.ParseIP(r.RemoteAddr) ipNet := pqtype.Inet{} if ip != nil { ipNet = pqtype.Inet{ IPNet: net.IPNet{ IP: ip, Mask: net.CIDRMask(len(ip)*8, len(ip)*8), }, Valid: true, } } var params codersdk.CreateTestAuditLogRequest if !httpapi.Read(ctx, rw, r, ¶ms) { return } if params.Action == "" { params.Action = codersdk.AuditActionWrite } if params.ResourceType == "" { params.ResourceType = codersdk.ResourceTypeUser } if params.ResourceID == uuid.Nil { params.ResourceID = uuid.New() } if params.Time.IsZero() { params.Time = time.Now() } if len(params.AdditionalFields) == 0 { params.AdditionalFields = json.RawMessage("{}") } _, err = api.Database.InsertAuditLog(ctx, database.InsertAuditLogParams{ ID: uuid.New(), Time: params.Time, UserID: user.ID, Ip: ipNet, UserAgent: sql.NullString{String: r.UserAgent(), Valid: true}, ResourceType: database.ResourceType(params.ResourceType), ResourceID: params.ResourceID, ResourceTarget: user.Username, Action: database.AuditAction(params.Action), Diff: diff, StatusCode: http.StatusOK, AdditionalFields: params.AdditionalFields, RequestID: uuid.Nil, // no request ID to attach this to ResourceIcon: "", OrganizationID: uuid.New(), }) if err != nil { httpapi.InternalServerError(rw, err) return } rw.WriteHeader(http.StatusNoContent) } func (api *API) convertAuditLogs(ctx context.Context, dblogs []database.GetAuditLogsOffsetRow) []codersdk.AuditLog { alogs := make([]codersdk.AuditLog, 0, len(dblogs)) for _, dblog := range dblogs { alogs = append(alogs, api.convertAuditLog(ctx, dblog)) } return alogs } func (api *API) convertAuditLog(ctx context.Context, dblog database.GetAuditLogsOffsetRow) codersdk.AuditLog { ip, _ := netip.AddrFromSlice(dblog.Ip.IPNet.IP) diff := codersdk.AuditDiff{} _ = json.Unmarshal(dblog.Diff, &diff) var user *codersdk.User if dblog.UserUsername.Valid { user = &codersdk.User{ ReducedUser: codersdk.ReducedUser{ MinimalUser: codersdk.MinimalUser{ ID: dblog.UserID, Username: dblog.UserUsername.String, AvatarURL: dblog.UserAvatarUrl.String, }, Email: dblog.UserEmail.String, CreatedAt: dblog.UserCreatedAt.Time, Status: codersdk.UserStatus(dblog.UserStatus.UserStatus), }, Roles: []codersdk.Role{}, } for _, roleName := range dblog.UserRoles { rbacRole, _ := rbac.RoleByName(roleName) user.Roles = append(user.Roles, db2sdk.Role(rbacRole)) } } var ( additionalFieldsBytes = []byte(dblog.AdditionalFields) additionalFields audit.AdditionalFields err = json.Unmarshal(additionalFieldsBytes, &additionalFields) ) if err != nil { api.Logger.Error(ctx, "unmarshal additional fields", slog.Error(err)) resourceInfo := audit.AdditionalFields{ WorkspaceName: "unknown", BuildNumber: "unknown", BuildReason: "unknown", WorkspaceOwner: "unknown", } dblog.AdditionalFields, err = json.Marshal(resourceInfo) api.Logger.Error(ctx, "marshal additional fields", slog.Error(err)) } var ( isDeleted = api.auditLogIsResourceDeleted(ctx, dblog) resourceLink string ) if isDeleted { resourceLink = "" } else { resourceLink = api.auditLogResourceLink(ctx, dblog, additionalFields) } return codersdk.AuditLog{ ID: dblog.ID, RequestID: dblog.RequestID, Time: dblog.Time, OrganizationID: dblog.OrganizationID, IP: ip, UserAgent: dblog.UserAgent.String, ResourceType: codersdk.ResourceType(dblog.ResourceType), ResourceID: dblog.ResourceID, ResourceTarget: dblog.ResourceTarget, ResourceIcon: dblog.ResourceIcon, Action: codersdk.AuditAction(dblog.Action), Diff: diff, StatusCode: dblog.StatusCode, AdditionalFields: dblog.AdditionalFields, User: user, Description: auditLogDescription(dblog), ResourceLink: resourceLink, IsDeleted: isDeleted, } } func auditLogDescription(alog database.GetAuditLogsOffsetRow) string { str := fmt.Sprintf("{user} %s", codersdk.AuditAction(alog.Action).Friendly(), ) // API Key resources (used for authentication) do not have targets and follow the below format: // "User {logged in | logged out | registered}" if alog.ResourceType == database.ResourceTypeApiKey && (alog.Action == database.AuditActionLogin || alog.Action == database.AuditActionLogout || alog.Action == database.AuditActionRegister) { return str } // We don't display the name (target) for git ssh keys. It's fairly long and doesn't // make too much sense to display. if alog.ResourceType == database.ResourceTypeGitSshKey { str += fmt.Sprintf(" the %s", codersdk.ResourceType(alog.ResourceType).FriendlyString()) return str } str += fmt.Sprintf(" %s", codersdk.ResourceType(alog.ResourceType).FriendlyString()) if alog.ResourceType == database.ResourceTypeConvertLogin { str += " to" } str += " {target}" return str } func (api *API) auditLogIsResourceDeleted(ctx context.Context, alog database.GetAuditLogsOffsetRow) bool { switch alog.ResourceType { case database.ResourceTypeTemplate: template, err := api.Database.GetTemplateByID(ctx, alog.ResourceID) if err != nil { if xerrors.Is(err, sql.ErrNoRows) { return true } api.Logger.Error(ctx, "unable to fetch template", slog.Error(err)) } return template.Deleted case database.ResourceTypeUser: user, err := api.Database.GetUserByID(ctx, alog.ResourceID) if err != nil { if xerrors.Is(err, sql.ErrNoRows) { return true } api.Logger.Error(ctx, "unable to fetch user", slog.Error(err)) } return user.Deleted case database.ResourceTypeWorkspace: workspace, err := api.Database.GetWorkspaceByID(ctx, alog.ResourceID) if err != nil { if xerrors.Is(err, sql.ErrNoRows) { return true } api.Logger.Error(ctx, "unable to fetch workspace", slog.Error(err)) } return workspace.Deleted case database.ResourceTypeWorkspaceBuild: workspaceBuild, err := api.Database.GetWorkspaceBuildByID(ctx, alog.ResourceID) if err != nil { if xerrors.Is(err, sql.ErrNoRows) { return true } api.Logger.Error(ctx, "unable to fetch workspace build", slog.Error(err)) } // We use workspace as a proxy for workspace build here workspace, err := api.Database.GetWorkspaceByID(ctx, workspaceBuild.WorkspaceID) if err != nil { if xerrors.Is(err, sql.ErrNoRows) { return true } api.Logger.Error(ctx, "unable to fetch workspace", slog.Error(err)) } return workspace.Deleted case database.ResourceTypeOauth2ProviderApp: _, err := api.Database.GetOAuth2ProviderAppByID(ctx, alog.ResourceID) if xerrors.Is(err, sql.ErrNoRows) { return true } else if err != nil { api.Logger.Error(ctx, "unable to fetch oauth2 app", slog.Error(err)) } return false case database.ResourceTypeOauth2ProviderAppSecret: _, err := api.Database.GetOAuth2ProviderAppSecretByID(ctx, alog.ResourceID) if xerrors.Is(err, sql.ErrNoRows) { return true } else if err != nil { api.Logger.Error(ctx, "unable to fetch oauth2 app secret", slog.Error(err)) } return false default: return false } } func (api *API) auditLogResourceLink(ctx context.Context, alog database.GetAuditLogsOffsetRow, additionalFields audit.AdditionalFields) string { switch alog.ResourceType { case database.ResourceTypeTemplate: return fmt.Sprintf("/templates/%s", alog.ResourceTarget) case database.ResourceTypeUser: return fmt.Sprintf("/users?filter=%s", alog.ResourceTarget) case database.ResourceTypeWorkspace: workspace, getWorkspaceErr := api.Database.GetWorkspaceByID(ctx, alog.ResourceID) if getWorkspaceErr != nil { return "" } workspaceOwner, getWorkspaceOwnerErr := api.Database.GetUserByID(ctx, workspace.OwnerID) if getWorkspaceOwnerErr != nil { return "" } return fmt.Sprintf("/@%s/%s", workspaceOwner.Username, alog.ResourceTarget) case database.ResourceTypeWorkspaceBuild: if len(additionalFields.WorkspaceName) == 0 || len(additionalFields.BuildNumber) == 0 { return "" } workspaceBuild, getWorkspaceBuildErr := api.Database.GetWorkspaceBuildByID(ctx, alog.ResourceID) if getWorkspaceBuildErr != nil { return "" } workspace, getWorkspaceErr := api.Database.GetWorkspaceByID(ctx, workspaceBuild.WorkspaceID) if getWorkspaceErr != nil { return "" } workspaceOwner, getWorkspaceOwnerErr := api.Database.GetUserByID(ctx, workspace.OwnerID) if getWorkspaceOwnerErr != nil { return "" } return fmt.Sprintf("/@%s/%s/builds/%s", workspaceOwner.Username, additionalFields.WorkspaceName, additionalFields.BuildNumber) case database.ResourceTypeOauth2ProviderApp: return fmt.Sprintf("/deployment/oauth2-provider/apps/%s", alog.ResourceID) case database.ResourceTypeOauth2ProviderAppSecret: secret, err := api.Database.GetOAuth2ProviderAppSecretByID(ctx, alog.ResourceID) if err != nil { return "" } return fmt.Sprintf("/deployment/oauth2-provider/apps/%s", secret.AppID) default: return "" } }