From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp11.migadu.com ([2001:41d0:2:bcc0::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms5.migadu.com with LMTPS id 4N9+L66DwWKxHwAAbAwnHQ (envelope-from ) for ; Sun, 03 Jul 2022 13:55:26 +0200 Received: from aspmx1.migadu.com ([2001:41d0:2:bcc0::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp11.migadu.com with LMTPS id kO1wL66DwWILvgAA9RJhRA (envelope-from ) for ; Sun, 03 Jul 2022 13:55:26 +0200 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id B829F8041 for ; Sun, 3 Jul 2022 13:55:25 +0200 (CEST) Received: from localhost ([::1]:45228 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1o7yCC-0004r2-FA for larch@yhetil.org; Sun, 03 Jul 2022 07:55:24 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:59260) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1o7yBq-0004qc-7K for guix-patches@gnu.org; Sun, 03 Jul 2022 07:55:02 -0400 Received: from debbugs.gnu.org ([209.51.188.43]:49559) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1o7yBp-0006XK-UX for guix-patches@gnu.org; Sun, 03 Jul 2022 07:55:01 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1o7yBp-0000h3-Rh for guix-patches@gnu.org; Sun, 03 Jul 2022 07:55:01 -0400 X-Loop: help-debbugs@gnu.org Subject: [bug#56330] [PATCH v3] services: Add anonip-service-type. References: <20220630231551.16188-1-rekado@elephly.net> In-Reply-To: <20220630231551.16188-1-rekado@elephly.net> Resent-From: Ricardo Wurmus Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Sun, 03 Jul 2022 11:55:01 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 56330 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: 56330@debbugs.gnu.org Cc: Ricardo Wurmus Received: via spool by 56330-submit@debbugs.gnu.org id=B56330.16568492582614 (code B ref 56330); Sun, 03 Jul 2022 11:55:01 +0000 Received: (at 56330) by debbugs.gnu.org; 3 Jul 2022 11:54:18 +0000 Received: from localhost ([127.0.0.1]:43456 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1o7yB3-0000g1-6X for submit@debbugs.gnu.org; Sun, 03 Jul 2022 07:54:18 -0400 Received: from sender4-of-o51.zoho.com ([136.143.188.51]:21139) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1o7yAy-0000fo-7S for 56330@debbugs.gnu.org; Sun, 03 Jul 2022 07:54:11 -0400 ARC-Seal: i=1; a=rsa-sha256; t=1656849245; cv=none; d=zohomail.com; s=zohoarc; b=hr3v4A/hn65t/ANHnIE0TZZozqrdCTy4na5FVbytHZIKNTH/xXz04gAWAX7K1YkiJ73jv3KWW9pjMStWKabDc8sfXQ/010X5dosvd/Ch5M9W0/fkP9QFv1G744rg8h2sPR8OJLQJFuLQQqpcV7soRqK0PIXSR4g9XmlXbZJm/W8= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1656849245; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:MIME-Version:Message-ID:Subject:To; bh=pbCL3VOxVUNoNgzIOoGEl9kWcoE5LKR/LqLO8mR/xjs=; b=hCq00uVKFdskq9L/AZS0N3l0angEfEwqTUkMMQkIK65cYEBzxcqNxAbpeFwurWnESPDigxIZDoA42eXNPmtrxzClx9nf7e4QyvTdl+hk6ken4X1+PcW5JTpJfuj788dAlmkXYkg7AdqVQLlnmPqVNnhLrhuD+TKObyXswDhDLfM= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass header.i=elephly.net; spf=pass smtp.mailfrom=rekado@elephly.net; dmarc=pass header.from= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1656849245; s=zoho; d=elephly.net; i=rekado@elephly.net; h=From:From:To:To:Cc:Cc:Subject:Subject:Date:Date:Message-Id:Message-Id:MIME-Version:Content-Type:Content-Transfer-Encoding:Reply-To; bh=pbCL3VOxVUNoNgzIOoGEl9kWcoE5LKR/LqLO8mR/xjs=; b=WgDbzXiRNrTYP7SwhTuo9P7ncZQ7azLZExnlz3l5w5wBzRBcopB4EKGOVnrrb2bj honkAZej9rbAAlQOjo89GSQN5sT/3Xvlq5nPtXqLgEkq6hpAZMzNG31wTGWqjrALQDV f2tPw3SSbbfTWsmK30Ro7FUwN1Wt6ZqpMBbT+GvQ= Received: from localhost (104-110-142-46.pool.kielnet.net [46.142.110.104]) by mx.zohomail.com with SMTPS id 1656849242987880.6441678963376; Sun, 3 Jul 2022 04:54:02 -0700 (PDT) From: Ricardo Wurmus Date: Sun, 3 Jul 2022 13:53:57 +0200 Message-Id: <20220703115357.20195-1-rekado@elephly.net> X-Mailer: git-send-email 2.36.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-ZohoMailClient: External X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+larch=yhetil.org@gnu.org Sender: "Guix-patches" X-Migadu-Flow: FLOW_IN X-Migadu-To: larch@yhetil.org X-Migadu-Country: US ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1656849326; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:resent-cc: resent-from:resent-sender:resent-message-id:in-reply-to:in-reply-to: references:references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:dkim-signature; bh=pbCL3VOxVUNoNgzIOoGEl9kWcoE5LKR/LqLO8mR/xjs=; b=sdqZuvp2xShekVErgcatanbt3HWSq+ONnFzlBvoHRiHYBjHkmj85xSgEmM0xOEB2gMpeBp IKBCbblHqNxVW9PQJtZTxTEbAJ0jIej0zcRLRMxZxKlI4KietONM5d94Tl0VBDG/VPCl9Z XKLyPHD7cmvgJK5+aKS0DKj2SlNCLmi5jAfb2n5XIPjJYnPFKAtQr0g3PifdMWQCC+7TB9 +t7M9XYKA3kWgFwImUapyaQ/mF0FMZ6MzbPtYUi7BhsWRMh2uhgsuagmdvjy/7X/umA5FB gWpeGUkv+yWcWX/fXMg2/vWxX064YtFqdLQ8trtOOA+pv5gWslK+6+RxlYWmPA== ARC-Seal: i=2; s=key1; d=yhetil.org; t=1656849326; a=rsa-sha256; cv=fail; b=rYJBlDElVW89NeqzheiJapBmaq0zPyLwijhzjsx8ICxBi9lXIOXAelub0Ei841pAEmPeoH 4mehqvvFpjLTy2kZnMMYB5M3vwKDMFXJIfFtr+STUdSeu6pFqdvqHNAmKGWWOGnQ7K+0X0 ahcx+UzxG/JmJCXmb6SEt130Dz0wdx2EFjV6U6klboXwfa//z7G+q1iNI2e5MDgZV+zK66 MQC9Or7r05bSsSI0dywkNt9uQGZWA2SafXE4DHqRdniMZTMqLWiS5zAZZ7CNkBDLst7Dg1 /rTw8gVV6f9/gV9W7DMIs1RpqepP646QhNrhOBZvucyapQfS+W7lS4WG1egfmg== ARC-Authentication-Results: i=2; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=elephly.net header.s=zoho header.b=WgDbzXiR; arc=reject ("signature check failed: fail, {[1] = sig:zohomail.com:reject}"); dmarc=none; spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org" X-Migadu-Spam-Score: 1.95 Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=elephly.net header.s=zoho header.b=WgDbzXiR; arc=reject ("signature check failed: fail, {[1] = sig:zohomail.com:reject}"); dmarc=none; spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org" X-Migadu-Queue-Id: B829F8041 X-Spam-Score: 1.95 X-Migadu-Scanner: scn0.migadu.com X-TUID: z16DYJqABhFK * gnu/services/web.scm (anonip-configuration): New record type. (anonip-configuration?, anonip-configuration-anonip, anonip-configuration-input, anonip-configuration-output, anonip-configuration-skip-private?, anonip-configuration-column, anonip-configuration-replacement, anonip-configuration-ipv4mask, anonip-configuration-ipv6mask, anonip-configuration-increment, anonip-configuration-delimiter, anonip-configuration-regex): New procedures. (anonip-service-type): New service type. * doc/guix.texi (Log Rotation): Add subheading for Anonip Service. --- doc/guix.texi | 71 +++++++++++++++++++++++++++- gnu/services/web.scm | 110 ++++++++++++++++++++++++++++++++++++++++++- 2 files changed, 179 insertions(+), 2 deletions(-) diff --git a/doc/guix.texi b/doc/guix.texi index cf373b6cbd..a22a7f59ec 100644 --- a/doc/guix.texi +++ b/doc/guix.texi @@ -30,7 +30,7 @@ Copyright @copyright{} 2015, 2016 Mathieu Lirzin@* Copyright @copyright{} 2014 Pierre-Antoine Rault@* Copyright @copyright{} 2015 Taylan Ulrich Bayırlı/Kammer@* Copyright @copyright{} 2015, 2016, 2017, 2019, 2020, 2021 Leo Famulari@* -Copyright @copyright{} 2015, 2016, 2017, 2018, 2019, 2020, 2021 Ricardo Wurmus@* +Copyright @copyright{} 2015, 2016, 2017, 2018, 2019, 2020, 2021, 2022 Ricardo Wurmus@* Copyright @copyright{} 2016 Ben Woodcroft@* Copyright @copyright{} 2016, 2017, 2018, 2021 Chris Marusich@* Copyright @copyright{} 2016, 2017, 2018, 2019, 2020, 2021, 2022 Efraim Flashner@* @@ -18700,6 +18700,75 @@ String or gexp denoting the corresponding mcron job schedule @end table @end deftp +@cindex logging, anonymization +@subheading Anonip Service + +Anonip is a privacy filter that removes IP address from web server logs. +This service creates a FIFO and filters any written lines with anonip +before writing the filtered log to a target file. + +The following example sets up the FIFO +@file{/var/run/anonip/https.access.log} and writes the filtered log file +@file{/var/log/anonip/https.access.log}. + +@lisp +(service anonip-service-type + (anonip-configuration + (input "/var/run/anonip/https.access.log") + (output "/var/log/anonip/https.access.log"))) +@end lisp + +Configure your web server to write its logs to the FIFO at +@file{/var/run/anonip/https.access.log} and collect the anonymized log +file at @file{/var/web-logs/https.access.log}. + +@deftp {Data Type} anonip-configuration +This data type represents the configuration of anonip. +It has the following parameters: + +@table @asis +@item @code{anonip} (default: @code{anonip}) +The anonip package to use. + +@item @code{input} +The file name of the input log file to process. The service creates a +FIFO of this name. The web server should write its logs to this FIFO. + +@item @code{output} +The file name of the processed log file. +@end table + +The following optional settings may be provided: + +@table @asis +@item @code{skip-private?} +When @code{#true} do not mask addresses in private ranges. + +@item @code{column} +A 1-based indexed column number. Assume IP address is in the specified +column (default is 1). + +@item @code{replacement} +Replacement string in case address parsing fails, e.g. @code{"0.0.0.0"}. + +@item @code{ipv4mask} +Number of bits to mask in IPv4 addresses. + +@item @code{ipv6mask} +Number of bits to mask in IPv6 addresses. + +@item @code{increment} +Increment the IP address by the given number. By default this is zero. + +@item @code{delimiter} +Log delimiter string. + +@item @code{regex} +Regular expression for detecting IP addresses. Use this instead of @code{column}. +@end table +@end deftp + + @node Networking Setup @subsection Networking Setup diff --git a/gnu/services/web.scm b/gnu/services/web.scm index 4434fecf02..f0c7e90cbf 100644 --- a/gnu/services/web.scm +++ b/gnu/services/web.scm @@ -9,7 +9,7 @@ ;;; Copyright © 2018 Pierre-Antoine Rouby ;;; Copyright © 2018 Marius Bakke ;;; Copyright © 2019, 2020 Florian Pelz -;;; Copyright © 2020 Ricardo Wurmus +;;; Copyright © 2020, 2022 Ricardo Wurmus ;;; Copyright © 2020 Tobias Geerinckx-Rice ;;; Copyright © 2020 Arun Isaac ;;; Copyright © 2020 Oleg Pykhalov @@ -205,6 +205,21 @@ (define-module (gnu services web) tailon-service-type + anonip-configuration + anonip-configuration? + anonip-configuration-anonip + anonip-configuration-input + anonip-configuration-output + anonip-configuration-skip-private? + anonip-configuration-column + anonip-configuration-replacement + anonip-configuration-ipv4mask + anonip-configuration-ipv6mask + anonip-configuration-increment + anonip-configuration-delimiter + anonip-configuration-regex + anonip-service-type + varnish-configuration varnish-configuration? varnish-configuration-package @@ -1355,6 +1370,99 @@ (define tailon-service-type files)))))))) (default-value (tailon-configuration)))) + + +;;; +;;; Log anonymization +;;; + +(define-record-type* + anonip-configuration make-anonip-configuration + anonip-configuration? + (anonip anonip-configuration-anonip ;file-like + (default anonip)) + (input anonip-configuration-input) ;string + (output anonip-configuration-output) ;string + (skip-private? anonip-configuration-skip-private? ;boolean + (default #f)) + (column anonip-configuration-column ;number + (default #f)) + (replacement anonip-configuration-replacement ;string + (default #f)) + (ipv4mask anonip-configuration-ipv4mask ;number + (default #f)) + (ipv6mask anonip-configuration-ipv6mask ;number + (default #f)) + (increment anonip-configuration-increment ;number + (default #f)) + (delimiter anonip-configuration-delimiter ;string + (default #f)) + (regex anonip-configuration-regex ;string + (default #f))) + +(define (anonip-activation config) + (with-imported-modules '((guix build utils)) + #~(begin + (use-modules (guix build utils)) + (for-each + (lambda (directory) + (mkdir-p directory) + (chmod directory #o755)) + (list (dirname #$(anonip-configuration-input config)) + (dirname #$(anonip-configuration-output config))))))) + +(define (anonip-shepherd-service config) + (let ((input (anonip-configuration-input config)) + (output (anonip-configuration-output config)) + (optional + (lambda (accessor option) + (or (and=> (accessor config) + (lambda (value) + (list + (format #false "~a=~a" + option value)))) + (list))))) + (list (shepherd-service + (provision (list (symbol-append 'anonip- (string->symbol output)))) + (requirement '(user-processes)) + (documentation "Anonimyze the given log file location with anonip.") + (start #~(lambda _ + (unless (file-exists? #$input) + (mknod #$input 'fifo #o600 0)) + (let ((pid (fork+exec-command + (append + (list #$(file-append (anonip-configuration-anonip config) + "/bin/anonip") + (string-append "--input=" #$input) + (string-append "--output=" #$output)) + (if #$(anonip-configuration-skip-private? config) + '("--skip-private") (list)) + '#$(optional anonip-configuration-column "--column") + '#$(optional anonip-configuration-ipv4mask "--ipv4mask") + '#$(optional anonip-configuration-ipv6mask "--ipv6mask") + '#$(optional anonip-configuration-increment "--increment") + '#$(optional anonip-configuration-replacement "--replacement") + '#$(optional anonip-configuration-delimiter "--delimiter") + '#$(optional anonip-configuration-regex "--regex")) + ;; Run in a UTF-8 locale + #:environment-variables + (list (string-append "GUIX_LOCPATH=" #$glibc-utf8-locales + "/lib/locale") + "LC_ALL=en_US.utf8")))) + pid))) + (stop #~(make-kill-destructor)))))) + +(define anonip-service-type + (service-type + (name 'anonip) + (extensions + (list (service-extension shepherd-root-service-type + anonip-shepherd-service) + (service-extension activation-service-type + anonip-activation))) + (description + "Provide web server log anonymization with @command{anonip}."))) + ;;; ;;; Varnish -- 2.36.1