Log RPC parameters (arguments) if -debug=rpcparams #16365

pull LarryRuane wants to merge 1 commits into bitcoin:master from LarryRuane:log-rpc-args changing 4 files +199 −0
  1. LarryRuane commented at 8:58 pm on July 9, 2019: contributor
    When a developer is examining debug.log (or client terminal output), it’s often useful to know which RPCs have been submitted to the client; this can be enabled with the -debug=rpc configuration option. But this prints only the method name. This PR adds -debug=rpcparams to enable the logging of each RPC’s parameters (arguments). The parameters of certain RPCs are keys or passwords; these should not be logged.
  2. in src/rpc/server.cpp:374 in 7e412ceb67 outdated
    369+    // Log arguments unless sensitive.
    370+    static const std::set<std::string> blacklist = {
    371+        "encryptwallet",
    372+        "walletpassphrase",
    373+        "walletpassphrasechange",
    374+    };
    


    maflcko commented at 9:03 pm on July 9, 2019:
    Looks like this list is incomplete. Would be nice if it can be deduplicated with the existing QStringList historyFilter

    fqlx commented at 0:02 am on July 10, 2019:
    This blacklist should be pulled out of a config rather than buried in the code.

    LarryRuane commented at 5:52 pm on July 10, 2019:
    What do you mean by “config”? Are you referring to ~/.bitcoin/bitcoin.conf?

    maflcko commented at 6:03 pm on July 10, 2019:
    I mean that it should go into a common module, probably ./src/util/ or similar.
  3. DrahtBot commented at 10:34 pm on July 9, 2019: contributor

    The following sections might be updated with supplementary metadata relevant to reviewers and maintainers.

    Conflicts

    Reviewers, this pull request conflicts with the following ones:

    • #22736 (log, sync: change lock contention from preprocessor directive to log category by jonatack)
    • #20487 (Add syscall sandboxing using seccomp-bpf (Linux secure computing mode) by practicalswift)

    If you consider this pull request important, please also help to review the conflicting pull requests. Ideally, start with the one that should be merged first.

  4. DrahtBot added the label Needs rebase on Jul 9, 2019
  5. fanquake added the label RPC/REST/ZMQ on Jul 10, 2019
  6. fanquake added the label Utils/log/libs on Jul 10, 2019
  7. promag commented at 9:48 pm on July 10, 2019: member
    How about private keys?
  8. LarryRuane force-pushed on Jul 11, 2019
  9. in src/logging.h:57 in 91ee96bd93 outdated
    53@@ -54,6 +54,7 @@ namespace BCLog {
    54         COINDB      = (1 << 18),
    55         QT          = (1 << 19),
    56         LEVELDB     = (1 << 20),
    57+        RPCPARAMS   = (1 << 21),
    


    LarryRuane commented at 5:04 am on July 11, 2019:
    I’m undecided if a new category is needed, or just enable this additional logging with rpc. We don’t have many of the 32 category bits remaining (although we could easily change to use a uint64_t).
  10. in src/rpc/request.cpp:193 in 91ee96bd93 outdated
    188+        for (size_t i = 0; i < params.size(); ++i) {
    189+            if (i > 0)
    190+                LogPrint(BCLog::RPCPARAMS, ",");
    191+            LogPrint(BCLog::RPCPARAMS, "%s", SanitizeString(params[i].getValStr()));
    192+        }
    193+        LogPrint(BCLog::RPCPARAMS, "]\n");
    


    LarryRuane commented at 5:05 am on July 11, 2019:
    Could print each param on a separate line.
  11. LarryRuane commented at 5:12 am on July 11, 2019: contributor
    Rebased, addressed review comments, force-pushed.
  12. DrahtBot removed the label Needs rebase on Jul 11, 2019
  13. promag commented at 0:56 am on July 12, 2019: member

    IMO the blacklist doesn’t look a great option.

    How about disallow -debug=rpcparams in mainnet and drop the blacklist?

  14. instagibbs commented at 6:16 pm on July 12, 2019: member

    concept NACK, someone is going to forget when adding a new RPC and start logging secrets in production.

    I think @promag suggestion is better.

  15. LarryRuane force-pushed on Jul 13, 2019
  16. LarryRuane force-pushed on Jul 13, 2019
  17. DrahtBot added the label Needs rebase on Aug 5, 2019
  18. promag commented at 2:04 pm on August 5, 2019: member
    Another approach is to add a sensitive options/flag (false by default) to RPCHelpMan RPCArg.
  19. LarryRuane force-pushed on Aug 6, 2019
  20. LarryRuane commented at 6:19 am on August 6, 2019: contributor
    @promag, interesting idea, I like that it would allow specific arguments to be designated as sensitive, rather than the entire method. Also, it would be nice not to have to touch so many lines of code (as my latest commit does). But @instagibbs’s concern, #16365 (comment), which I was attempted to overcome with my latest commit, becomes live again.
  21. DrahtBot removed the label Needs rebase on Aug 6, 2019
  22. DrahtBot added the label Needs rebase on Aug 21, 2019
  23. LarryRuane force-pushed on Aug 22, 2019
  24. LarryRuane commented at 6:28 pm on August 22, 2019: contributor
    Rebased, replaced functional (python) test with a proper unit test.
  25. DrahtBot removed the label Needs rebase on Aug 22, 2019
  26. DrahtBot added the label Needs rebase on Sep 2, 2019
  27. LarryRuane force-pushed on Sep 2, 2019
  28. DrahtBot removed the label Needs rebase on Sep 2, 2019
  29. LarryRuane force-pushed on Sep 2, 2019
  30. LarryRuane commented at 8:35 pm on September 2, 2019: contributor

    I had an idea for what may be an improvement. It’s in a separate commit, “replace sensitive bool with more general flags”. Please let me know what you think; this commit is optional.

    Modifying all of the lines of the static const CRPCCommand commands[] tables is disruptive, and all that’s being done is to add a boolean value (to indicate whether to log the RPC’s params or not). As long as we’re touching all these lines anyway, why not implement a more general flags bitfield, of which DONTLOG is just the first bit. There may be other future attributes that would be useful to add to RPC methods. With this commit, adding them would touch only the lines corresponding to the affected RPCs, rather than all of them.

  31. DrahtBot added the label Needs rebase on Sep 5, 2019
  32. LarryRuane force-pushed on Sep 5, 2019
  33. DrahtBot removed the label Needs rebase on Sep 5, 2019
  34. DrahtBot added the label Needs rebase on Sep 14, 2019
  35. LarryRuane force-pushed on Sep 15, 2019
  36. DrahtBot removed the label Needs rebase on Sep 15, 2019
  37. laanwj added the label Feature on Sep 30, 2019
  38. DrahtBot added the label Needs rebase on Oct 30, 2019
  39. LarryRuane force-pushed on Nov 1, 2019
  40. DrahtBot removed the label Needs rebase on Nov 1, 2019
  41. DrahtBot added the label Needs rebase on Nov 5, 2019
  42. LarryRuane force-pushed on Nov 7, 2019
  43. LarryRuane commented at 9:08 pm on November 7, 2019: contributor
    Rebased to resolve conflicts.
  44. DrahtBot removed the label Needs rebase on Nov 7, 2019
  45. LarryRuane force-pushed on Nov 21, 2019
  46. LarryRuane commented at 4:46 pm on November 22, 2019: contributor
    I don’t know the cause of the Travis CI failure; feature_pruning.py succeeds on my machine. I would not think this PR has any particular connection to that test. Maybe it’s a transient failure?
  47. LarryRuane force-pushed on Dec 14, 2019
  48. DrahtBot added the label Needs rebase on Jan 9, 2020
  49. LarryRuane force-pushed on Jan 9, 2020
  50. DrahtBot removed the label Needs rebase on Jan 10, 2020
  51. LarryRuane closed this on Jan 10, 2020

  52. LarryRuane commented at 3:33 pm on January 10, 2020: contributor
    Sorry, I accidentally closed this PR, reopening now…
  53. LarryRuane reopened this on Jan 10, 2020

  54. LarryRuane force-pushed on Jan 11, 2020
  55. DrahtBot added the label Needs rebase on Feb 18, 2020
  56. promag commented at 11:24 pm on March 15, 2020: member

    Still not buying the approach.

    How about disallow -debug=rpcparams in mainnet and drop the blacklist?

    Couldn’t we use this approach for now?

  57. LarryRuane commented at 4:58 am on March 16, 2020: contributor

    Couldn’t we use this approach for now?

    Just so I’m sure I understand, you’re suggesting not adding the flags member to CRPCCommand (here, which causes many lines to be touched, and that’s clearly undesirable), and instead just don’t censor anything (no black or white list), but restrict this to testnet only?

    I like that idea, would make this PR much simpler. If it proves useful on testnet, then we can try to find an acceptable way to bring it to mainnet – maybe there’s a less intrusive way that’s still very safe. I always appreciate your comments.

  58. sipa commented at 5:46 pm on March 17, 2020: member

    So it seems everything depends on whether this is considered useful for mainnet. I can imagine that for production logging it is. If not, @promag’s approach is fine. If it is, the safest approach seems something like the current approach.

    There is perhaps a less disruptive approach:

    • Make it possible to have an optional argument to the CRPCCommand constructors, which defaults to DONT_LOG, and not explicitly change it initially for any commands.
    • Then incrementally introduce DO_LOG flags, which can be done separately without needing to keep the whole PR up to date here.

    One unrelated nit: I think it would be a bit cleaner to log the RPC command and arguments in the same log line (the logic would be something like if (debug_rpcparams && command.do_log) { log_rpc_with_params(); } else if (debug_rpc || debug_rpcparams) { log_rpc_without_params(); }

  59. LarryRuane force-pushed on Mar 18, 2020
  60. in src/rpc/server.cpp:242 in 0f92dff5f0 outdated
    238@@ -238,7 +239,7 @@ static const CRPCCommand vRPCCommands[] =
    239   //  --------------------- ------------------------  -----------------------  ----------
    240     /* Overall control/query calls */
    241     { "control",            "getrpcinfo",             &getrpcinfo,             {}  },
    242-    { "control",            "help",                   &help,                   {"command"}  },
    243+    { "control",            "help",                   &help,                   {"command"}, CRPCCommand::LOG_OK,  },
    


    LarryRuane commented at 1:56 am on March 18, 2020:
    This is to show how to enable logging, an example.
  61. in src/rpc/server.cpp:454 in 0f92dff5f0 outdated
    449+            if (i > 0) {
    450+                param += ",";
    451+            }
    452+            param += request.params[i].getValStr();
    453+        }
    454+        LogPrintf("RPC method=%s params=[%s]\n", SanitizeString(request.strMethod), SanitizeString(param));
    


    LarryRuane commented at 1:56 am on March 18, 2020:
    This has changed to also print the method string.
  62. in src/zmq/zmqrpc.cpp:57 in 0f92dff5f0 outdated
    47@@ -48,7 +48,7 @@ UniValue getzmqnotifications(const JSONRPCRequest& request)
    48     return result;
    49 }
    50 
    51-const CRPCCommand commands[] =
    52+static const CRPCCommand commands[] =
    53 { //  category              name                                actor (function)                argNames
    54   //  -----------------     ------------------------            -----------------------         ----------
    55     { "zmq",                "getzmqnotifications",              &getzmqnotifications,           {} },
    


    LarryRuane commented at 1:58 am on March 18, 2020:
    I could remove this, but this change allows test/lint/check-rpc-mappings.py to check this file also (was missing).
  63. in test/lint/check-rpc-mappings.py:23 in 0f92dff5f0 outdated
    17@@ -18,6 +18,9 @@
    18     "src/rpc/net.cpp",
    19     "src/rpc/rawtransaction.cpp",
    20     "src/wallet/rpcwallet.cpp",
    21+    "src/qt/test/rpcnestedtests.cpp",
    22+    "src/zmq/zmqrpc.cpp",
    23+    "src/test/rpc_tests.cpp",
    


    LarryRuane commented at 1:58 am on March 18, 2020:
    Added two missing files (besides my test).
  64. in src/rpc/server.cpp:445 in 0f92dff5f0 outdated
    439@@ -439,6 +440,19 @@ UniValue CRPCTable::execute(const JSONRPCRequest &request) const
    440 
    441 static bool ExecuteCommand(const CRPCCommand& command, const JSONRPCRequest& request, UniValue& result, bool last_handler)
    442 {
    443+    // Log arguments if requested, unless sensitive.
    444+    if (LogAcceptCategory(BCLog::RPCPARAMS) && request.params.size() > 0 &&
    445+            (Params().IsTestChain() || (command.flags & CRPCCommand::LOG_OK)))
    


    LarryRuane commented at 1:59 am on March 18, 2020:
    If testnet, always show the arguments.
  65. LarryRuane commented at 2:02 am on March 18, 2020: contributor
    Thanks, @sipa and @promag, I took both of your advice. The default now is to not log arguments on mainnet, and always log arguments on testnet. This change is now much less invasive.
  66. DrahtBot removed the label Needs rebase on Mar 18, 2020
  67. LarryRuane force-pushed on Jul 13, 2020
  68. DrahtBot added the label Needs rebase on Aug 12, 2020
  69. LarryRuane force-pushed on Aug 12, 2020
  70. DrahtBot removed the label Needs rebase on Aug 12, 2020
  71. DrahtBot added the label Needs rebase on Aug 13, 2020
  72. LarryRuane force-pushed on Sep 4, 2020
  73. DrahtBot removed the label Needs rebase on Sep 4, 2020
  74. DrahtBot added the label Needs rebase on Sep 15, 2020
  75. LarryRuane force-pushed on Sep 28, 2020
  76. DrahtBot removed the label Needs rebase on Sep 28, 2020
  77. LarryRuane renamed this:
    Log RPC parameters (arguments) if -debug=rpcparams
    [WIP] Log RPC parameters (arguments) if -debug=rpcparams
    on Sep 29, 2020
  78. LarryRuane force-pushed on Sep 29, 2020
  79. LarryRuane commented at 6:05 am on September 29, 2020: contributor

    Force-pushed (diff) a different approach that does not require changing each of the 149 per-rpc CRPCCommand initializers. This new way is much less invasive and more manageable. I finally decided it’s best to go with an “allow” list (hard to beat simplicity). If someone adds a new RPC later without being aware of this form of logging, its arguments will not be logged. That makes this approach very safe against accidentally leaking secret information to the log file. I incorporated some of the review comments as well.

    Here are some examples (without showing the RPC output):

    0$ bitcoin-cli getnetworkinfo
    1$ bitcoin-cli getblockhash 0
    2$ bitcoin-cli logging '["rpcparams"]' '["rpc","mempool"]'
    3$ bitcoin-cli encryptwallet WALLET-PASSWORD-SECRET
    

    Here’s what appears in debug.log:

    02020-09-29T05:58:50Z rpc=getnetworkinfo()
    12020-09-29T05:59:00Z rpc=getblockhash(0)
    22020-09-29T06:02:51Z rpc=logging([rpcparams],[rpc,mempool])
    32020-09-29T06:02:55Z rpc=encryptwallet(****)
    
  80. LarryRuane renamed this:
    [WIP] Log RPC parameters (arguments) if -debug=rpcparams
    Log RPC parameters (arguments) if -debug=rpcparams
    on Sep 29, 2020
  81. in src/rpc/server.cpp:616 in 45fb5d040e outdated
    597+            "waitforblockheight",
    598+            "waitfornewblock",
    599+            "walletcreatefundedpsbt",
    600+            "walletlock",
    601+            "walletprocesspsbt",
    602+        };
    


    LarryRuane commented at 2:58 pm on September 29, 2020:

    This allow list came from listing all the RPCs and then removing the following:

     0signmessagewithprivkey
     1signrawtransactionwithkey
     2signrawtransactionwithwallet
     3signmessage
     4createwallet
     5encryptwallet
     6importmulti
     7importprivkey
     8sethdseed
     9walletpassphrase
    10walletpassphrasechange
    

    As far as I can tell, these are the RPCs whose arguments shouldn’t be logged.


    jonatack commented at 11:10 am on August 19, 2021:
    Maintainence of this list seems like a drawback. It would be nice if a test fails somewhere when an RPC is added or removed without the allow list being updated, e.g. with a list of structs of all the RPCs with an associated safe/unsafe bool value, or something like CRPCConvertParam. Feel to ignore if unrealistic.
  82. DrahtBot added the label Needs rebase on Mar 2, 2021
  83. LarryRuane force-pushed on Mar 3, 2021
  84. DrahtBot removed the label Needs rebase on Mar 3, 2021
  85. DrahtBot added the label Needs rebase on Apr 5, 2021
  86. LarryRuane force-pushed on Apr 12, 2021
  87. DrahtBot removed the label Needs rebase on Apr 12, 2021
  88. DrahtBot added the label Needs rebase on Apr 27, 2021
  89. Log RPC parameters if -debug=rpcparams 7d22a6fad9
  90. LarryRuane force-pushed on Apr 29, 2021
  91. DrahtBot removed the label Needs rebase on Apr 29, 2021
  92. in src/logging.h:62 in 7d22a6fad9
    58@@ -59,6 +59,7 @@ namespace BCLog {
    59         VALIDATION  = (1 << 21),
    60         I2P         = (1 << 22),
    61         IPC         = (1 << 23),
    62+        RPCPARAMS   = (1 << 24),
    


    jonatack commented at 11:02 am on August 19, 2021:
    test/functional/rpc_misc.py::L60 needs to be updated: AssertionError: not(25 == 24)
  93. in src/rpc/server.cpp:586 in 7d22a6fad9
    581+            "prioritisetransaction",
    582+            "pruneblockchain",
    583+            "psbtbumpfee",
    584+            "reconsiderblock",
    585+            "removeprunedfunds",
    586+            "rescanblockchain",
    


    jonatack commented at 11:04 am on August 19, 2021:
    This list seems to need an update for new RPCS (restorewallet comes to mind, not sure if there are others)
  94. in src/rpc/server.cpp:626 in 7d22a6fad9
    621+            for (size_t i = 0; i < request.params.size(); ++i) {
    622+                if (i > 0) {
    623+                    params += ",";
    624+                }
    625+                params += request.params[i].write();
    626+            }
    


    jonatack commented at 11:11 am on August 19, 2021:
    Maybe replace this loop with a call to util/string.h::Join()
  95. in src/test/rpc_tests.cpp:513 in 7d22a6fad9
    508+
    509+    // All arguments replaced by **** (secret information)
    510+    BOOST_CHECK(str.find("rpc=signmessagewithprivkey(****)") != std::string::npos);
    511+    // Make sure these don't somehow appear
    512+    BOOST_CHECK(str.find("some-key") == std::string::npos);
    513+    BOOST_CHECK(str.find("some-message") == std::string::npos);
    


    jonatack commented at 11:37 am on August 19, 2021:

    Some (tested) ideas, feel free to pick/choose/ignore

     0-    FILE* file = fsbridge::fopen(LogInstance().m_file_path, "rb");
     1+    FILE* file{fsbridge::fopen(LogInstance().m_file_path, "rb")};
     2     fseek(file, 0, SEEK_END);
     3     std::vector<char> vch(ftell(file), 0);
     4     fseek(file, 0, SEEK_SET);
     5-    size_t nbytes = fread(vch.data(), 1, vch.size(), file);
     6+    const size_t nbytes{fread(vch.data(), 1, vch.size(), file)};
     7     fclose(file);
     8 
     9     // This checks the test (not the code being tested).
    10     BOOST_CHECK_EQUAL(nbytes, vch.size());
    11 
    12     // Check that what should appear does, and what shouldn't doesn't.
    13-    std::string str(vch.begin(), vch.end());
    14+    const std::string str{vch.begin(), vch.end()};
    15@@ -512,8 +512,8 @@ BOOST_AUTO_TEST_CASE(rpc_logparams)
    16-    BOOST_CHECK(str.find("some-key") == std::string::npos);
    17-    BOOST_CHECK(str.find("some-message") == std::string::npos);
    18+    BOOST_CHECK_EQUAL(str.find("some-key"), std::string::npos);
    19+    BOOST_CHECK_EQUAL(str.find("some-message"), std::string::npos);
    
  96. in src/rpc/server.cpp:623 in 7d22a6fad9
    618+        if (logging_allow_list.find(request.strMethod) == logging_allow_list.end()) {
    619+            params = "****";
    620+        } else {
    621+            for (size_t i = 0; i < request.params.size(); ++i) {
    622+                if (i > 0) {
    623+                    params += ",";
    


    jonatack commented at 11:49 am on August 19, 2021:

    Not sure here, perhaps separate the params with ", " (comma + space)

    now

    02021-08-19T11:45:46Z rpc=getmempoolancestors(b6a5ed05bc71c8ccc5316,true)
    

    comma+space

    02021-08-19T11:45:46Z rpc=getmempoolancestors(b6a5ed05bc71c8ccc5316, true)
    
  97. jonatack commented at 11:55 am on August 19, 2021: contributor
    Tested almost-ACK 7d22a6fad9d855e9dbb0bca70857c9aadc55f188 rebased to current master, modulo the comments below
  98. LarryRuane commented at 3:37 pm on August 20, 2021: contributor

    Maintenance of this list seems like a drawback

    I agree, I’m going to convert this PR to draft because I think there’s a better way to do this that doesn’t require a separate list. I’ll also pick up your other suggestions. Thanks for taking the time to look it over!

  99. LarryRuane marked this as a draft on Aug 20, 2021
  100. DrahtBot commented at 11:19 pm on December 13, 2021: contributor

    🐙 This pull request conflicts with the target branch and needs rebase.

    Want to unsubscribe from rebase notifications on this pull request? Just convert this pull request to a “draft”.

  101. DrahtBot added the label Needs rebase on Dec 13, 2021
  102. DrahtBot commented at 1:07 pm on March 21, 2022: contributor
    • Is it still relevant? ➡️ Please solve the conflicts to make it ready for review and to ensure the CI passes.
    • Is it no longer relevant? ➡️ Please close.
    • Did the author lose interest or time to work on this? ➡️ Please close it and mark it ‘Up for grabs’ with the label, so that it can be picked up in the future.
  103. fanquake commented at 10:45 am on December 6, 2022: member

    I’m going to convert this PR to draft because I think there’s a better way to do this that doesn’t require a separate list. I’ll also pick up your other suggestions.

    Given it’s been 16 months this statement, I’m going to close this for now. Feel free to comment / ping if you’re going to work on this again and need the PR reopened.

  104. fanquake closed this on Dec 6, 2022

  105. bitcoin locked this on Dec 6, 2023

github-metadata-mirror

This is a metadata mirror of the GitHub repository bitcoin/bitcoin. This site is not affiliated with GitHub. Content is generated from a GitHub metadata backup.
generated: 2024-11-17 03:12 UTC

This site is hosted by @0xB10C
More mirrored repositories can be found on mirror.b10c.me