1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
|
/**
* Copyright (C) 2018-present MongoDB, Inc.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the Server Side Public License, version 1,
* as published by MongoDB, Inc.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* Server Side Public License for more details.
*
* You should have received a copy of the Server Side Public License
* along with this program. If not, see
* <http://www.mongodb.com/licensing/server-side-public-license>.
*
* As a special exception, the copyright holders give permission to link the
* code of portions of this program with the OpenSSL library under certain
* conditions as described in each individual source file and distribute
* linked combinations including the program with the OpenSSL library. You
* must comply with the Server Side Public License in all respects for
* all of the code used other than as permitted herein. If you modify file(s)
* with this exception, you may extend this exception to your version of the
* file(s), but you are not obligated to do so. If you do not wish to do so,
* delete this exception statement from your version. If you delete this
* exception statement from all source files in the program, then also delete
* it in the license file.
*/
#include "mongo/db/auth/authorization_session.h"
#define MONGO_LOGV2_DEFAULT_COMPONENT ::mongo::logv2::LogComponent::kCommand
#include "mongo/platform/basic.h"
#include "mongo/db/commands/kill_op_cmd_base.h"
#include "mongo/bson/util/bson_extract.h"
#include "mongo/db/auth/authentication_session.h"
#include "mongo/db/operation_killer.h"
#include "mongo/logv2/log.h"
#include "mongo/rpc/metadata/client_metadata.h"
#include "mongo/util/str.h"
namespace mongo {
void KillOpCmdBase::reportSuccessfulCompletion(OperationContext* opCtx,
const std::string& db,
const BSONObj& cmdObj) {
logv2::DynamicAttributes attr;
auto client = opCtx->getClient();
if (client) {
if (AuthorizationManager::get(client->getServiceContext())->isAuthEnabled()) {
auto user = AuthorizationSession::get(client)->getAuthenticatedUserNames();
attr.add("user", user->toBSON());
}
if (client->session()) {
attr.add("remote", client->session()->remote());
}
if (auto metadata = ClientMetadata::get(client)) {
attr.add("metadata", metadata->getDocument());
}
}
attr.add("db", db);
attr.add("command", cmdObj);
LOGV2(558700, "Successful killOp", attr);
}
Status KillOpCmdBase::checkAuthForCommand(Client* worker,
const std::string& dbname,
const BSONObj& cmdObj) const {
auto opKiller = OperationKiller(worker);
if (opKiller.isGenerallyAuthorizedToKill()) {
return Status::OK();
}
if (isKillingLocalOp(cmdObj.getField("op"))) {
// Look up the OperationContext and see if we have permission to kill it. This is done once
// here and again in the command body. The check here in the checkAuthForCommand() function
// is necessary because if the check fails, it will be picked up by the auditing system.
long long opId = parseOpId(cmdObj);
auto target = worker->getServiceContext()->getLockedClient(opId);
if (OperationKiller(worker).isAuthorizedToKill(target)) {
// We were authorized to interact with the target Client
return Status::OK();
}
}
return Status(ErrorCodes::Unauthorized, "Unauthorized");
}
void KillOpCmdBase::killLocalOperation(OperationContext* opCtx, OperationId opToKill) {
OperationKiller(opCtx->getClient()).killOperation(opToKill);
}
bool KillOpCmdBase::isKillingLocalOp(const BSONElement& opElem) {
return opElem.isNumber();
}
unsigned int KillOpCmdBase::parseOpId(const BSONObj& cmdObj) {
long long op;
uassertStatusOK(bsonExtractIntegerField(cmdObj, "op", &op));
uassert(26823,
str::stream() << "invalid op : " << op << ". Op ID cannot be represented with 32 bits",
(op >= std::numeric_limits<int>::min()) && (op <= std::numeric_limits<int>::max()));
return static_cast<unsigned int>(op);
}
} // namespace mongo
|