/** * Copyright (C) 2015 MongoDB Inc. * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License, version 3, * as published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License * along with this program. If not, see . * * As a special exception, the copyright holders give permission to link the * code of portions of this program with the OpenSSL library under certain * conditions as described in each individual source file and distribute * linked combinations including the program with the OpenSSL library. You * must comply with the GNU Affero General Public License in all respects for * all of the code used other than as permitted herein. If you modify file(s) * with this exception, you may extend this exception to your version of the * file(s), but you are not obligated to do so. If you do not wish to do so, * delete this exception statement from your version. If you delete this * exception statement from all source files in the program, then also delete * it in the license file. */ #define MONGO_LOG_DEFAULT_COMPONENT ::mongo::logger::LogComponent::kCommand #include "mongo/platform/basic.h" #include #include "mongo/base/init.h" #include "mongo/base/status.h" #include "mongo/bson/util/bson_extract.h" #include "mongo/db/audit.h" #include "mongo/db/auth/authorization_session.h" #include "mongo/db/client.h" #include "mongo/db/commands.h" #include "mongo/db/operation_context.h" #include "mongo/db/service_context.h" #include "mongo/util/log.h" #include "mongo/util/mongoutils/str.h" namespace mongo { class KillOpCommand : public BasicCommand { public: KillOpCommand() : BasicCommand("killOp") {} virtual bool supportsWriteConcern(const BSONObj& cmd) const override { return false; } bool slaveOk() const final { return true; } bool adminOnly() const final { return true; } static long long parseOpId(const BSONObj& cmdObj) { long long op; uassertStatusOK(bsonExtractIntegerField(cmdObj, "op", &op)); // Internally opid is an unsigned 32-bit int, but as BSON only has signed integer types, // we wrap values exceeding 2,147,483,647 to negative numbers. The following undoes this // transformation, so users can use killOp on the (negative) opid they received. if (op >= std::numeric_limits::min() && op < 0) op += 1ull << 32; uassert(26823, str::stream() << "invalid op : " << op, (op >= 0) && (op <= std::numeric_limits::max())); return op; } static StatusWith, OperationContext*>> _findOp( Client* client, unsigned int opId) { AuthorizationSession* authzSession = AuthorizationSession::get(client); for (ServiceContext::LockedClientsCursor cursor(client->getServiceContext()); Client* opClient = cursor.next();) { stdx::unique_lock lk(*opClient); OperationContext* opCtx = opClient->getOperationContext(); if (opCtx && opCtx->getOpID() == opId) { if (authzSession->isAuthorizedForActionsOnResource( ResourcePattern::forClusterResource(), ActionType::killop) || authzSession->isCoauthorizedWithClient(opClient)) { return {std::make_tuple(std::move(lk), opCtx)}; } break; } } return Status(ErrorCodes::NoSuchKey, str::stream() << "Could not access opID: " << opId); } Status checkAuthForCommand(Client* client, const std::string& dbname, const BSONObj& cmdObj) final { AuthorizationSession* authzSession = AuthorizationSession::get(client); if (authzSession->isAuthorizedForActionsOnResource(ResourcePattern::forClusterResource(), ActionType::killop)) { // If we have administrative permission to run killop, we don't need to traverse the // Client list to figure out if we own the operation which will be terminated. return Status::OK(); } bool isAuthenticated = AuthorizationSession::get(client)->getAuthenticatedUserNames().more(); if (isAuthenticated) { long long opId = parseOpId(cmdObj); auto swLkAndOp = _findOp(client, opId); if (swLkAndOp.isOK()) { // We were able to find the Operation, and we were authorized to interact with it. return Status::OK(); } } return Status(ErrorCodes::Unauthorized, "Unauthorized"); } bool run(OperationContext* opCtx, const std::string& db, const BSONObj& cmdObj, std::string& errmsg, BSONObjBuilder& result) final { long long opId = parseOpId(cmdObj); log() << "going to kill op: " << opId; result.append("info", "attempting to kill op"); auto swLkAndOp = _findOp(opCtx->getClient(), opId); if (swLkAndOp.isOK()) { stdx::unique_lock lk; OperationContext* opCtxToKill; std::tie(lk, opCtxToKill) = std::move(swLkAndOp.getValue()); opCtx->getServiceContext()->killOperation(opCtxToKill); } return true; } } killOpCmd; } // namespace mongo