Deployment Guide

Documentation for Cockpit 356.

Latest version available here.

Manual pages

cockpit(1)

Name

cockpit - Cockpit

Description

Cockpit is a web accessible interactive admin interface for Linux machines. Cockpit can usually be accessed on port 9090 of the machine it’s installed on. Cockpit starts on demand. Use your system credentials to log in.

Components

The cockpit-ws web service listens on port 9090 and is started on demand by systemd. The Cockpit web service authenticates the user, loads Cockpit into the browser, and starts cockpit-bridge in a Linux user session.

The cockpit-bridge provides Cockpit in the web browser with access to the system APIs. It does this over its standard in and standard out. The bridge is started like a shell once per Linux user session.

Bugs

Please send bug reports to either the distribution bug tracker or the upstream bug tracker.

Author

Cockpit has been written by many contributors.

See also

cockpit-tls(8) , cockpit.bridge(1) , systemd(1), Cockpit guide

cockpit.conf(5)

Name

cockpit.conf - Cockpit configuration file

Description

Cockpit can be configured via /etc/cockpit/cockpit.conf. If $XDG_CONFIG_DIRS is set, then the first path containing a ../cockpit/cockpit.conf is used instead. Other configuration files and directories are searched for in the same way.

This file is not required and may need to be created manually. The file has a INI file syntax and thus contains key / value pairs, grouped into topical groups. See the examples below for details.

Note: The port that cockpit listens on cannot be changed in this file. To change the port change the systemd cockpit.socket file.

WebService
Origins

By default cockpit will not accept crossdomain websocket connections. Use this setting to allow access from alternate domains. Origins should include scheme, host and port, if necessary. Wildcards and glob expressions are permitted. IPv6 addresses must have their brackets escaped with backslashes (e.g. \[::1\]) as they are matched using fnmatch().

[WebService]
Origins = https://somedomain1.com https://somedomain2.com:9090 https://*.somedomain3.com https://\[::1\]:9090
ProtocolHeader

Configure cockpit to look at the contents of this header to determine if a connection is using tls. This should only be used when cockpit is behind a reverse proxy, and care should be taken to make sure that incoming requests cannot set this header.

[WebService]
ProtocolHeader = X-Forwarded-Proto
ForwardedForHeader

Configure cockpit to look at the contents of this header to determine the real origin of a connection. This should only be used when cockpit is behind a reverse proxy, and care should be taken to make sure that incoming requests cannot set this header.

[WebService]
ForwardedForHeader = X-Forwarded-For
LoginTitle

Set the browser title for the login screen.

LoginTo

When set to true the Connect to option on the login screen is visible and allows logging into another server. When set to false, direct remote logins are disallowed. If this option is not specified then it will be automatically detected based on whether the cockpit-bridge package is installed and the ssh program is available.

If cockpit-ws is exposed to the public internet, and also has access to a private internal network, it is recommended to explicitly set LoginTo=false. This prevents unauthenticated remote attackers from scanning the internal network for existing machines and open ports.

RequireHost

When set to true cockpit will require users to use the Connect to option to specify the host to log into.

AllowMultiHost

When set to true, cockpit will allow users to connect to multiple hosts in one session. The default is OS specific.

When connecting to multiple servers, JavaScript runs without isolation. All systems will be vulnerable to potential attacks from other connected hosts. Enable this option only when all hosts are trusted.

MaxStartups

Same as the sshd configuration option by the same name. Specifies the maximum number of concurrent login attempts allowed. Additional connections will be dropped until authentication succeeds or the connections are closed. Defaults to 10.

Alternatively, random early drop can be enabled by specifying the three colon separated values start:rate:full (e.g. "10:30:60"). Cockpit will start refusing authentication attempts with a probability of rate/100 (30%) if there are currently start (10) unauthenticated connections. The probability increases linearly and all connection attempts are refused if the number of unauthenticated connections reaches full (60).

AllowUnencrypted

If true, cockpit will accept unencrypted HTTP connections. Otherwise, it redirects all HTTP connections to HTTPS. Exceptions are connections from localhost and for certain URLs (like /ping). Defaults to false.

UrlRoot

The root URL where you will be serving cockpit. When provided cockpit will expect all requests to be prefixed with the given url. This is mostly useful when you are using cockpit behind a reverse proxy, such as nginx. /cockpit/ and /cockpit+ are reserved and should not be used. For example /cockpit-new/ is ok. /cockpit/ and /cockpit+new/ are not.

ClientCertAuthentication

If true, enable TLS client certificates for authenticating users. Commonly these are provided by a smart card, but it’s equally possible to import certificates directly into the web browser. Please see the Certificate/smart card authentication section in the Cockpit guide for details.

Shell

The relative URL to top level component to display in Cockpit once logged in. Defaults to /shell/index.html

Log
Fatal

The kind of log messages in the bridge to treat as fatal. Separate multiple values with spaces. Relevant values are: criticals and warnings.

OAuth

Cockpit can be configured to support the implicit grant OAuth authorization flow. When successful the resulting oauth token will be passed to cockpit-ws using the Bearer auth-scheme. For a login to be successful, cockpit will also need a to be configured to verify and allow Bearer tokens.

URL

This is the url that cockpit will redirect the users browser to when it needs to obtain an oauth token. Cockpit will add a redirect_uri parameter to the url with the location of where the oauth provider should redirect to once a token has been obtained.

ErrorParam

When a oauth provider redirects a user back to cockpit, look for this parameter in the querystring or fragment portion of the url to find a error message. When not provided it will default to error_description

TokenParam

When a oauth provider redirects a user back to cockpit, look for this parameter in the querystring or fragment portion of the url to find the access token. When not provided it will default to access_token

Session
Banner

The contents of the specified file (commonly /etc/issue) are shown on the login page. By default, no banner is displayed.

IdleTimeout

Time in minutes after which session expires and user is logged out if no user action has been performed in the given time. This idle timeout only applies to interactive password logins. With non-interactive authentication methods like Kerberos, OAuth, or certificate login, the browser cannot forget credentials, and thus automatic logouts are not useful for protecting credentials of forgotten sessions. Set to 0 to disable session timeout.

[Session]
IdleTimeout=15

When not specified, there is no idle timeout by default.

WarnBeforeConnecting

Whether to warn before connecting to remote hosts from the Shell. Defaults to true.

[Session]
WarnBeforeConnecting=false
Bugs

Please send bug reports to either the distribution bug tracker or the upstream bug tracker.

Author

Cockpit has been written by many contributors.

See also

cockpit-ws(8), cockpit-tls(8)

cockpit-ws(8)

Name

cockpit-ws - Cockpit web service

Synopsis

cockpit-ws [--help] [--port PORT] [--address ADDRESS] [--no-tls] [--for-tls-proxy] [--local-ssh] [--local-session BRIDGE]

Description

The cockpit-ws program is the web service component used for communication between the browser application and various configuration tools and services like cockpit-bridge(1).

Users or administrators should never need to start this program as it automatically started by systemd(1) on bootup, through cockpit-tls(8).

Transport security

cockpit-ws is normally run behind the cockpit-tls TLS terminating proxy, and only deals with unencrypted HTTP by itself. But for backwards compatibility it can also handle TLS connections by itself when being run directly. For details how to configure certificates, please refer to the cockpit-tls(8) documentation.

Timeout

When started via systemd(1) then cockpit-ws will exit after 90 seconds if nobody logs in, or after the last user is disconnected.

Options
--help

Show help options.

--port PORT

Serve HTTP requests PORT instead of port 9090. Usually Cockpit is started on demand by systemd socket activation, and this option has no effect. Update the ListenStream directive cockpit.socket file in the usual systemd manner.

--address ADDRESS

Bind to address ADDRESS instead of binding to all available addresses. Usually Cockpit is started on demand by systemd socket activation, and this option has no effect. In that case, update the ListenStream directive in the cockpit.socket file in the usual systemd manner.

--no-tls

Disable http to https redirection.

--for-tls-proxy

Tell cockpit-ws that it is running behind a local reverse proxy that does the TLS termination. Then Cockpit puts https:// URLs into the default Content-Security-Policy, and accepts only https:// origins, instead of http: ones by default. However, if Origins is set in the cockpit.conf(5) configuration file, it will override this default.

--local-ssh

Normally cockpit-ws uses cockpit-session and PAM to authenticate the user and start a user session. With this option enabled, it will instead authenticate via SSH at 127.0.0.1 port 22.

--local-session BRIDGE

Skip all authentication and cockpit-session, and launch the cockpit-bridge specified in BRIDGE in the local session. If the BRIDGE is specified as - then expect an already running bridge that is connected to stdin and stdout of this cockpit-ws process. This allows the web server to run as any unprivileged user in an already running session.

This mode implies --no-tls, thus you need to use http:// URLs with this.

Warning

With --local-session BRIDGE, you have to isolate the opened TCP port somehow (for example in a network namespace), otherwise all other users (or even remote machines if the port is not just listening on localhost) can access the session!

Environment

The cockpit-ws process will use the XDG_CONFIG_DIRS environment variable from the XDG basedir spec to find its cockpit.conf(5) configuration file.

In addition the XDG_DATA_DIRS environment variable from the XDG basedir spec can be used to override the location to serve static files from. These are the files that are served to a non-logged in user.

Bugs

Please send bug reports to either the distribution bug tracker or the upstream bug tracker.

Author

Cockpit has been written by many contributors.

See also

cockpit-tls(8) , cockpit.conf(5) , systemd(1)

cockpit-tls(8)

Name

cockpit-tls - TLS proxy for Cockpit web service

Synopsis

cockpit-tls [--help] [--port PORT] [--no-tls] [--idle-timeout SECONDS]

Description

The cockpit-tls program is a TLS terminating HTTP proxy for cockpit-ws(8). It manages a set of isolated cockpit-ws instances, one per TLS client certificate, plus one for TLS without a client certificate, and one for unencrypted HTTP. With that, one session cannot tamper with another one through possible security vulnerability exploits.

Users or administrators should never need to start this program as it automatically started by systemd(1) via socket activation.

Transport security

To specify the TLS certificate the web service should use, simply drop a file with the extension .cert in the /etc/cockpit/ws-certs.d directory, or below $XDG_CONFIG_DIRS if set (see cockpit.conf). If there are multiple files in this directory, then the highest priority one is chosen after sorting.

The .cert file should contain at least two OpenSSL style PEM blocks. First one or more BEGIN CERTIFICATE blocks for the server certificate and intermediate certificate authorities and a second one containing a BEGIN PRIVATE KEY or similar. The key must not be encrypted.

If there is no TLS certificate, a self-signed certificate is automatically generated using sscg (if available) or openssl and stored in the 0-self-signed.cert file.

When enrolling into a FreeIPA domain, an SSL certificate is requested from the IPA server and stored in 10-ipa.cert.

To check which certificate cockpit-ws will use, run the following command.

$ sudo /usr/libexec/cockpit-certificate-ensure --check

Or, on Debian-based systems:

$ sudo /usr/lib/cockpit/cockpit-certificate-ensure --check

If using certmonger to manage certificates, following command can be used to generate a certificate/key pair:

CERT_FILE=/etc/cockpit/ws-certs.d/50-certmonger.crt
KEY_FILE=/etc/cockpit/ws-certs.d/50-certmonger.key

getcert request -f ${CERT_FILE} -k ${KEY_FILE} -D $(hostname --fqdn)
Options
--help

Show help options.

--port PORT

Serve HTTP requests on PORT instead of port 9090. Usually Cockpit is started on demand by systemd socket activation, and this option has no effect. Update the ListenStream directive cockpit.socket file in the usual systemd manner.

--no-tls

Don’t use TLS. Certificates will not be read, and https connections denied. Then cockpit-tls will only manage a single cockpit-ws instance, and thus not do anything different than running cockpit-ws --no-tls directly. Only use this for debugging or testing.

--idle-timeout SECONDS

If greater than 0, exit if no connections have happened for the given number of seconds, i. e. the server is idle. If not given, the default is 90.

Environment

The cockpit-tls program expects the RUNTIME_DIRECTORY environment variable to be set to an empty directory (preferably in /run/) that is only accessible by the system user under which it is running. This contains the Unix sockets for communicating with the cockpit-ws instances, and in the future, state information about client certificates. This variable is normally set by the cockpit.service systemd unit.

In addition, cockpit-tls will use the XDG_CONFIG_DIRS environment variable from the XDG basedir spec to find its certificates and the cockpit.conf(5) configuration file.

Bugs

Please send bug reports to either the distribution bug tracker or the upstream bug tracker.

Author

Cockpit has been written by many contributors.

See also

cockpit-ws(8) , cockpit.conf(5) , systemd(1)

cockpit-desktop(1)

Name

cockpit-desktop - Cockpit Desktop integration

Synopsis

cockpit-desktop URLPATH [SSH_HOST]

Description

The cockpit-desktop program provides secure access to Cockpit pages in an already running desktop session. It starts a web server (cockpit-ws) and a web browser in an isolated network namespace, and a cockpit-bridge(8) in the running user session.

This avoids having to log into Cockpit, and having to enable cockpit.socket system-wide. The network isolation ensures that no other user, and not even other processes in the user’s session, can access this local web server.

URLPATH is the Cockpit page to open, i. e. the path component of Cockpit URLs. It is highly recommended to only open a particular page frame, not the entire Cockpit navigation and menu. For example, the path /cockpit/@localhost/storage/index.html will open the Storage page. It is also possible to give abbreviated forms of urls, such as “/storage” or “/network/firewall”.

SSH_HOST is an optional SSH remote host specification (hostname or username@hostname). If given, cockpit-bridge will be started on the remote host through ssh(1) instead, i. e. the Cockpit web browser will show that remote host. Note that this is more of an experimental/demo feature.

Environment

The BROWSER environment variable specifies the browser command (and possibly options) that will be used to open the requested Cockpit page. If not set, cockpit-desktop attempts to use an internal minimalistic WebKit browser, and failing that, will attempt to detect some reasonable alternatives.

Bugs

Please send bug reports to either the distribution bug tracker or the upstream bug tracker.

Author

Cockpit has been written by many contributors.

See also

cockpit-ws(8), cockpit-bridge(1)

cockpit-bridge(1)

Name

cockpit-bridge - Cockpit Host Bridge

Synopsis

cockpit-bridge [--help] [--packages]

Description

The cockpit-bridge program is used by Cockpit to relay messages and commands from the Web front end to the server. Among other things it relays DBus, and spawns processes on behalf of the Web user interface.

This program is not routinely run by users or administrators. It is in the $PATH so that Cockpit can find it when connecting between hosts. However there are some diagnostics available when running from the command line.

Options
--help

Show help options.

--interact=boundary

Interact with the raw cockpit1 protocol. Useful for debugging and testing. Specify a boundary which should be on an empty line between messages.

--packages

List all available Cockpit packages and exit. Note this includes packages available to the user running this command.

--version

Show Cockpit version information.

Bugs

Please send bug reports to either the distribution bug tracker or the upstream bug tracker.

Author

Cockpit has been written by many contributors.

See also

cockpit-ws(8)

pam_ssh_add(8)

Name

pam_ssh_add - PAM module to auto load ssh keys into an agent

Description

pam_ssh_add provides authentication and session modules that allow users to start their session with a running ssh-agent with as many ssh keys loaded as possible.

If used, the authentication module simply stores the authentication token for later use by the session module. Because this module performs no actual authentication it returns PAM_CRED_INSUFFICIENT on success and should always be accompanied by an actual authentication module in your pam configuration.

By default the session module will start a new ssh-agent and run ssh-add, loading any keys that exist in the default path for the newly logged in user. If any keys prompt for a password, and a authentication token was successfully stored, that token will be provided as the password.

Options
debug

This option will turn on debug logging to syslog.

Examples
        auth     required  pam_unix.so
        auth     optional  pam_ssh_add.so
        session  optional  pam_ssh_add.so
Bugs

Please send bug reports to either the distribution bug tracker or the upstream bug tracker.

Author

Cockpit has been written by many contributors.

SSL/TLS Usage

Cockpit usually requires that web browsers communicate with it using HTTPS, for security reasons.

HTTPS Requirement

Cockpit listens for both HTTP and HTTPS connections on the same port, by default 9090. If an HTTP connection is made, Cockpit will redirect that connection to HTTPS. There are some exceptions:

  • If an HTTP connection comes from localhost (127.0.0.1 or ::1, then Cockpit will allow communication without redirecting to HTTPS.

  • Certain URLs, like /ping are not required to use HTTPS.

This behavior can be overridden by setting the AllowUnencrypted option in cockpit.conf.

Certificates

Cockpit will load a certificate from the /etc/cockpit/ws-certs.d, directory, or below $XDG_CONFIG_DIRS if set (see cockpit.conf). It will use the last file with a .cert or .crt extension in alphabetical order. The file should contain one or more OpenSSL style BEGIN CERTIFICATE blocks for the server certificate and the intermediate certificate authorities.

The private key must be contained in a separate file with the same name as the certificate, but with a .key suffix instead. The key must not be encrypted.

If no certificate is found, a self-signed certificate is created and stored in the 0-self-signed.cert file. On some platforms, Cockpit will also generate a ca.crt in that directory, which may be safely imported into client browsers.

Cockpit will read the files as root, so they can have tight permissions.

To check which certificate cockpit-ws will use run the following command.

$ sudo /usr/libexec/cockpit-certificate-ensure --check

Or, on Debian-based systems:

$ sudo /usr/lib/cockpit/cockpit-certificate-ensure --check

If using certmonger to manage certificates, following command can be used to automatically prepare a certificate/key file pair:

getcert request -f /etc/cockpit/ws-certs.d/50-certmonger.cert \
                -k /etc/cockpit/ws-certs.d/50-certmonger.key \
                -D myhostname.example.com \
                [--ca=...]

This will not work on Red Hat Enterprise Linux 8 by default. Adjust the SELinux type of the certificate directory to cert_t to allow certmonger to write its certificates there:

semanage fcontext -a -t cert_t '/etc/cockpit/ws-certs\.d(/.*)?'
restorecon -v /etc/cockpit/ws-certs.d

TCP Port and Address

Cockpit’s cockpit-ws component is configured by default to accept connections on port 9090. This is the port that is documented for a "Web-based System Manager" to listen on. It is also relatively memorable.

However there are many reasons you may wish to change the default port. For example other software may use port 9090 or you may wish to setup Cockpit to listen on 443 instead. It is also possible to have Cockpit only listen on one specific IP address.

Note that it is only required to have Cockpit listening on a TCP port on the server that you access with your web browser. If you add multiple servers with host switcher, Cockpit will connect to those servers via ssh.

The systems that Cockpit runs on are typically locked down with firewalls, SELinux, so changing the default port is not as easy as editing a configuration file.

Cockpit systemd Socket

On servers with systemd Cockpit starts on demand via socket activation. To change its port and/or address you should place the following content in the /etc/systemd/system/cockpit.socket.d/listen.conf file. Create the file and directories in that path which not already exist. The ListenStream option specifies the desired address and TCP port.

[Socket]
ListenStream=
ListenStream=443
[Socket]
ListenStream=
ListenStream=7777
ListenStream=192.168.1.1:443
FreeBind=yes
Note
The first line with an empty value is intentional. systemd allows multiple Listen directives to be declared in a single socket unit; an empty value in a drop-in file resets the list and thus disables the default port 9090 from the original unit.

The FreeBind option is highly recommended when defining specific IP addresses. See the systemd.socket manpage for details.

In order for the changes to take effect, run the following commands:

$ sudo systemctl daemon-reload
$ sudo systemctl restart cockpit.socket

SELinux Port

If SELinux is protecting your server, then you will need to tell it to allow Cockpit to listen on the new port. Run the following command to do so. The last argument specifies the desired TCP port.

$ sudo semanage port -a -t websm_port_t -p tcp 9999

If the port is already defined by some other part of the SELinux policy, then you will need to use the -m argument to modify the definition. That’s the case with the 443 SSL port, which is typically defined as an http_port_t port.

$ sudo semanage port -m -t websm_port_t -p tcp 443

The changes should take effect immediately.

Firewalld Port

If Firewalld is configured as your firewall, then you will need to tell it to allow Cockpit to receive connections on the new port. Run the following commands to do so. The last options specify the desired TCP port.

$ sudo firewall-cmd [--zone=ZONE] --add-port=443/tcp
$ sudo firewall-cmd --permanent [--zone=ZONE] --add-port=443/tcp

Start up

Cockpit’s cockpit-ws component is what the browser connects to and it typically starts on demand via systemd socket activation.

The actual cockpit.service and cockpit-ws process will start on demand when a browser accesses the cockpit.socket, usually on port 9090. Once a user logs in then a cockpit-bridge process will be started in a Linux user login session.

Only systems that you connect to with your browser need to have the cockpit.socket enabled. For systems that you add through host switcher the bridge is started via SSH on demand.

Process exit

The cockpit-bridge process will exit when the user logs out. In addition, after 10 minutes of inactivity, the cockpit-ws process will exit on its own. The browser will automatically disconnect if it fails to hear from the cockpit-ws process for 30 seconds.

Boot start up

To make Cockpit available by default after system boot the cockpit.socket needs to be enabled:

$ sudo systemctl enable cockpit.socket

If you wish to not have Cockpit available by default via a browser, then the cockpit.socket should be disabled:

$ sudo systemctl disable cockpit.socket

Managing multiple hosts at the same time

Warning

This feature is deprecated as of Cockpit 322.

Cockpit allows you to access multiple hosts in a single session, by establishing SSH connections to other hosts. This is quite similar to logging into these other hosts using the ssh command on the command line, with one very important difference:

Code from the local host and all the remote hosts run at the same time, in the same browser context. They are not isolated from each other in the browser. All code effectively has the same privileges as the primary session on the local host.

Thus, you should only only connect to remote hosts that you trust. You must be sure that none of the hosts that you connect to will cause Cockpit to load malicious JavaScript code into your browser.

Therefore, Cockpit will warn you before connecting to more than one host. It is also possible to disable multiple hosts entirely, and some operating systems do this already by default.

You can prevent loading of JavaScript, HTML, etc from more than one host by adding this to cockpit.conf:

    [WebService]
    AllowMultiHost=false

When you allow multiple hosts in a single Cockpit session by setting AllowMultiHost to true, then the user will be warned once per session, before connecting to the second host. If that is still too much, you can switch the warning off completely by adding the following to cockpit.conf:

    [Session]
    WarnBeforeConnecting=false

Cockpit Authentication

While cockpit allows you to monitor and administer several servers at the same time, there is always a primary server your browser connects to that runs the Cockpit web service (cockpit-ws) through which connections to additional servers are established. See this diagram for how it works.

Normally, a session is established on the primary server, and you use the Shell UI of that session to connect to secondary servers.

However, it is also possible to instruct the cockpit-ws process on the primary server to directly connect to a secondary server, without opening a session on the primary server at all. This is done on the main login page of Cockpit, by filling out the "Connect to" field.

Directly logging into the primary server

The most common way to use Cockpit is to just log directly into the server that you want to access. This can be done if you have direct network access to port 9090 on that server.

By default the cockpit web service is installed on the base system and socket activated by systemd. In this setup access is controlled by a cockpit specific pam stack, generally located at /etc/pam.d/cockpit. By default this is configured to allow you to login with the username and password of any local account on the system. You can also setup a Kerberos based SSO solution or certificate/smart card authentication.

You can also disable authentication schemes to enforce authentication policies, or to suppress undesired browser GSSAPI authentication dialogs.

The web server can also be run from the cockpit/ws container. If you are running cockpit on a container host operating system like Fedora CoreOS this will be the only supported mode. In this setup, cockpit establishes an SSH connection from the container to the underlying host, meaning that it is up to your SSH server to grant access. To login with a local account, sshd will need to be configured to allow password based authentication. Alternatively you can setup a Kerberos based SSO solution.

Like sshd, cockpit can be configured to limit the number of concurrent login attempts allowed. This is done by adding a MaxStartups option to the WebService section of your cockpit.conf. Additional connections will be dropped until authentication succeeds or the connections are closed.

Directly logging into a secondary server without a primary session

It is also possible to log into a secondary server without opening a session on the primary server. This is useful if you are not actually interested in the primary server and would only use it because you do not have direct network access to the secondary server.

In this case, cockpit-ws still runs on the primary server, but the credentials from the login screen are directly used with SSH to log into the secondary server given in the "Connect To" field of the login screen.

Thus, the PAM configuration and accounts on the primary server don’t matter at all. Often, the only purpose of the primary server is to sit on the boundary of your network and forward connections to internal machines.

In this case, the login page will prompt you to verify unknown SSH keys. Accepted keys will be remembered in the local storage of your browser.

Logging into a secondary server from the primary session

Once you have a session on the primary server, it is possible connect to additional servers by using the host switching UI of the Cockpit Shell. This is useful if you have direct network access to the primary server, but not to the secondary server.

On the command line, you would log into the primary server and then use SSH to log into the secondary one. Cockpit does just the same, and uses SSH to log into the secondary server. Instead of running a interactive shell there, however, it starts a cockpit-bridge process.

Warning: Unlike with SSH on the command line though, this will also load and use the Cockpit pages (i.e. JavaScript) from the remote machine, which means that the remote machine can execute arbitrary code on your primary and all other connected secondary machines. Hence, only connect to machines which you trust.

Due to this security risk, this host switcher functionality is disabled by default, except on long-term stable Linux distributions (Red Hat Enterprise Linux 9, Debian 12, and Ubuntu 22.04/24.04 LTS). If you are comfortable with the security implications, you can enable it manually with the AllowMultiHost option in cockpit.conf.

These servers will need to be running an SSH server and be configured to support one of the following authentication methods.

Password

The target server will need to have password based authentication enabled in sshd.

Kerberos

The target server will need to be a member of the same domain as the primary server and your domain must be whitelisted in your browser. See the SSO documentation for how to set this up.

Public key

When you successfully log into the primary server, a ssh-agent is started and keys are loaded into it by running ssh-add without any arguments. Any passphrase prompt is answered with the password used to log into the primary server.

Cockpit provides a user interface for loading other keys into the agent that could not be automatically loaded.

The target server will need to have public key authentication enabled in sshd, and the public key you wish to use must be present in ~/.ssh/authorized_keys. Cockpit has a user interface for creating SSH keys and for authorizing them.

SSH host keys

Cockpit will prompt the user to verify unknown SSH host keys, and will write accepted host keys into ~/.ssh/known_hosts.

Single Sign On

Cockpit can use Kerberos for Single Sign On authentication, where users are automatically authenticated if they have a valid Kerberos ticket.

Server Requirements

To authenticate users, the server that Cockpit is running on must be joined to a domain. This can usually be accomplished using the realm join example.com command.

The domain must be resolvable by DNS. For instance, the SRV records of the kerberos server should be resolvable:

$ host -t SRV  _kerberos._udp.example.com
_kerberos._udp.example.com has SRV record 0 100 88 dc.example.com

The server running Cockpit should have a fully qualified name that ends with the domain name.

There must be a valid Kerberos host key for the server in the /etc/krb5.keytab file. Alternatively, if you would like to use a different keytab, you can do so by placing it in /etc/cockpit/krb5.keytab, or below $XDG_CONFIG_DIRS if set (see cockpit.conf). It may be necessary to create a kerberos service principal and update the keytab if it is not present. Depending on your domain type different service names are required:

Active Directory

HOST/server.example.com@EXAMPLE.COM

IPA and MIT

HTTP/server.example.com@EXAMPLE.COM

When joining an IPA domain with Cockpit and the ipa command line tool is available, both the service principal name and a /etc/cockpit/krb5.keytab get created automatically, so that Kerberos based single sign on into Cockpit works out of the box. If you want/need to do this by hand or in a script, first create or modify the HTTP/ service principal:

$ sudo ipa service-add --ok-as-delegate=true --ok-to-auth-as-delegate=true \
    HTTP/server.example.com@EXAMPLE.COM
# or, if it already exists, just enable delegation:
$ sudo ipa service-mod --ok-as-delegate=true --ok-to-auth-as-delegate=true \
    HTTP/server.example.com@EXAMPLE.COM

Then generate a key for that principal:

$ sudo ipa-getkeytab -p HTTP/server.example.com@EXAMPLE.COM -k /etc/cockpit/krb5.keytab

The following command can be used to list the /etc/cockpit/krb5.keytab:

$ sudo klist -k /etc/cockpit/krb5.keytab

Lastly accounts from the domain must be resolvable to unix accounts on the server running Cockpit. For example:

$ getent passwd user@example.com
user@example.com:*:381001109:381000513:User Name:/home/user:/bin/sh

If you wish to delegate your kerberos credentials to Cockpit, and allow Cockpit to then connect to other machines using those credentials, you should enable delegation for the hosts running Cockpit, and in some cases the HTTP service as well. When joining an IPA domain, this is enabled by default.

Domain admins (usually the admins@example.com group) should normally also be able to administer any joined machine. Enable sudo access for that group with the following command on the IPA server, for version 4.7.1 and later:

ipa-advise enable-admins-sudo | sh -ex

On earlier FreeIPA versions, run these commands instead, as a domain admin on any joined machine:

ipa sudorule-add --hostcat=all --cmdcat=all All
ipa sudorule-add-user --groups=admins All

Note that this does not change security properties; domain admins can give this privilege to themselves, so it is safe to enable by default.

Client Requirements

The client side, where your web browser is running, should have a valid kerberos ticket in the current user session. A command like this will get one:

$ kinit user@EXAMPLE.COM
Password for user@EXAMPLE.COM:

In addition your browser must be usually be configured to allow kerberos authentication for the domain.

Mozilla Firefox

Go to about:config and set the network.negotiate-auth.trusted-uris setting to your domain name preceded by a dot, ie: .example.com

Google Chrome

On Linux: create the file /etc/opt/chrome/policies/managed/example-com.json with the contents:

{
  "AuthServerWhitelist": "*example.com"
}

and restart the browser. On other platforms, exit your browser completely, and start it with a command line like this: google-chrome --auth-server-whitelist=*example.com

Use a fully qualified server name (with the domain name at the end) to access Cockpit in your web browser.

If you wish to connect from one server to another in Cockpit using kerberos SSO, then you have to explicitly enable all sorts of things. For starters, make sure that delegated credentials are allowed by your domain (see above). Next when requesting your kerberos ticket make sure that forwardable tickets are requested:

$ kinit -f user@EXAMPLE.COM
Password for user@EXAMPLE.COM:

Make sure that the forwardable flag F is present in your ticket:

$ klist -f
Ticket cache: KEYRING:persistent:1000:1000
Default principal: user@EXAMPLE.COM

Valid starting       Expires              Service principal
18.03.2017 05:39:23  19.03.2017 05:39:20  krbtgt/EXAMPLE.COM@EXAMPLE.COM
    Flags: FIA

Lastly configure your browser to allow delegated, forwardable kerberos credentials to be sent to Cockpit:

Mozilla Firefox

Go to about:config and set the network.negotiate-auth.delegation-uris setting to your domain name preceded by a dot, ie: .example.com

Google Chrome

On Linux: create the file /etc/opt/chrome/policies/managed/example-com.json with the contents:

{
  "AuthServerWhitelist": "*example.com",
  "AuthNegotiateDelegateWhitelist": "*example.com"
}

and restart the browser. On other platforms, exit your browser completely, and start it with a command line like this: google-chrome --auth-server-whitelist=*example.com --auth-negotiate-delegate-whitelist=*example.com

Certificate/smart card authentication

Cockpit can use TLS client certificates for authenticating users. Commonly these are provided by a smart card, but it’s equally possible to import certificates directly into the web browser.

This requires the host to be in an Identity Management domain like FreeIPA or Active Directory, which can associate certificates to users.

To authenticate users from a Identity Management domain, the server that Cockpit is running on must be joined to that domain. See the SSO server requirements for details.

User certificate generation

Generating the certificates for users is usually done with a certificate management system like certmonger or FreeIPA, which are not documented here. This command generates a simple key and certificate request for the "alice" user:

openssl req -new -newkey rsa:2048 -days 365 \
    -keyout alice.key -out alice.csr -subj "/CN=alice"

Now get this certificate request signed by the Certificate Authority of your Identity Management domain, to get a PEM certificate. Browsers and smart cart utilities accept PKCS#12 format for importing/transfer, so convert the certificate/key pair; it will ask for and protect it with a transfer password:

openssl pkcs12 -export -in alice.pem -inkey alice.key -out alice.p12

Don’t forget to clean up the key file when you do not need it any more:

shred -u alice.key

You can now import alice.p12 directly into your browser, with giving the transfer password set above. Or put the certificate onto a smart card:

pkcs15-init --store-private-key alice.p12 --format pkcs12 --auth-id 01

Certificate mapping with FreeIPA

The recommended method to sign a user certificate request and associate it to a user is ipa cert-request:

ipa cert-request alice.csr --principal=alice --certificate-out=alice.pem

Alternatively, if you are using a different CA, you can use ipa user-add-cert to associate the signed certificate to the user. This expects PEM format, but without the -----BEGIN/-----END markers:

ipa user-add-cert alice --certificate="$(grep -v ^---- alice.pem)"

Certificate mapping with Microsoft Active Directory

The domain user certificates get imported into the userCertificate;binary LDAP attribute. The following commands convert the PEM certificate into binary DER form, create an LDIF file and apply it to the LDAP server running on the domain controller "dc.example.com":

openssl x509 -outform der -in alice.pem -out alice.der

cat <<EOF > alice.ldif
version: 1
dn: cn=alice,ou=users,ou=YOUR_NETBIOS_NAME,dc=example,dc=com
changetype: modify
add: userCertificate;binary
userCertificate;binary:< file://$(pwd)/alice.der
EOF

ldapmodify -H ldap://dc.example.com -f alice.ldif

Certificate mapping with Samba Active Directory

At least some versions of Samba do not support the userCertificate;binary LDAP attribute, so the import has to happen in base64 PEM form into the textual userCertificate attribute instead. Also, Samba uses a slightly different user hierarchy:

cat <<EOF > alice.ldif
version: 1
dn: cn=alice,cn=users,dc=example,dc=com
changetype: modify
add: userCertificate
userCertificate: $(grep -v ^---- alice.pem | tr -d '\n')
EOF

ldapmodify -H ldap://dc.example.com  -f alice.ldif

As userCertificate is a text instead of binary field, you need to set up a certificate mapping rule in sssd.conf(5) in a [certmap/domain/rulename] section, for example:

[certmap/example.com/adcerts]
# we match full certificates, so it is not important to check anything here
matchrule = <KU>digitalSignature
maprule = LDAP:(userCertificate={cert!base64})

Cockpit web server configuration

Set the trusted Certificate Authority of your user certificates in sssd, either by copying the CA PEM file to /etc/sssd/pki/sssd_auth_ca_db.pem or setting the pam_cert_db_path configuration option to the path of the CA. If you use FreeIPA and its CA:

cp /etc/ipa/ca.crt /etc/sssd/pki/sssd_auth_ca_db.pem

Certificate authentication needs to be enabled in cockpit.conf explicitly:

[WebService]
ClientCertAuthentication = yes

When enabling this mode, other authentication types commonly get disabled, so that only client certificate authentication will be accepted. By default, after a failed certificate authentication attempt, Cockpit’s normal login page will appear and permit other login types such as basic (passwords) or negotiate (Kerberos). For example, password authentication gets disabled with:

[basic]
action = none

Cockpit web server resource limits

When using certificate authentication, all requests with a particular certificate will be handled by a separate and isolated instance of the cockpit-ws web server. This protects against possible vulnerabilities in the web server and prevents an attacker from impersonating another user. However, this introduces a potential Denial of Service: Some remote attacker could create a large number of certificates and send a large number of http requests to Cockpit with these.

To mitigate that, all cockpit-ws instances run in a system-cockpithttps.slice systemd slice unit which limits the collective resources of these web server instances: by default, this slice sets a limit of 200 threads (roughly 100 instances of cockpit-ws — in other words, a maximum of 100 parallel user sessions with different certificates) and a 75% (soft)/90% (hard) memory limit.

You are welcome to adjust these limits to your need through a drop-in. For example:

# systemctl edit system-cockpithttps.slice

[Slice]
# change existing value
TasksMax=100
# add new restriction
CPUQuota=30%

Authentication to other services like sudo and ssh

Once you logged into Cockpit with a certificate, you likely need to switch to administrative mode (root privileges through sudo), or connect to remote machines through SSH. If your user account has a password, that can be used for authenticating to sudo or ssh as usual.

Supported with FreeIPA only: As an alternative to password authentication, you can also declare the initial Cockpit certificate authentication as trusted for authenticating to SSH, sudo, or other services. For that purpose, Cockpit automatically creates an S4U2Proxy Kerberos ticket in the user session:

$ klist
Ticket cache: FILE:/run/user/1894000001/cockpit-session-3692.ccache
Default principal: user@EXAMPLE.COM

Valid starting     Expires            Service principal
07/30/21 09:19:06  07/31/21 09:19:06  HTTP/myhost.example.com@EXAMPLE.COM
07/30/21 09:19:06  07/31/21 09:19:06  krbtgt/EXAMPLE.COM@EXAMPLE.COM
    for client HTTP/myhost.example.com@EXAMPLE.COM

You can set up constrained delegation rules to enumerate which hosts (including its own) that ticket is trusted to access. For example, if the cockpit session runs on host myhost.example.com and should be trusted to access its own host (through sudo) and another host remote.example.com (through ssh), create a delegation like this:

# a list of target machines which can be accessed by a particular rule
ipa servicedelegationtarget-add cockpit-target
ipa servicedelegationtarget-add-member cockpit-target \
  --principals=host/myhost.example.com@EXAMPLE.COM \
  --principals=host/remote.example.com@EXAMPLE.COM

# allow cockpit sessions (HTTP/ principal) to access that host list
ipa servicedelegationrule-add cockpit-delegation
ipa servicedelegationrule-add-member cockpit-delegation \
  --principals=HTTP/myhost.example.com@EXAMPLE.COM
ipa servicedelegationrule-add-target cockpit-delegation \
  --servicedelegationtargets=cockpit-target

In addition, you need to enable GSS (Kerberos) authentication in the corresponding services.

  • For SSH, enable GSSAPIAuthentication yes in /etc/ssh/sshd_config.

  • For sudo, enable pam_sss_gss as described in the manpage: In /etc/sssd/sssd.conf: Add an entry for your domain:

    [domain/example.com]
    pam_gssapi_services = sudo, sudo-i

    In /etc/pam.d/sudo, enable the module in the first line:

    auth sufficient pam_sss_gss.so

Caveat: The delegated S4U ticket is not yet forwarded to remote SSH hosts when connecting to them from Cockpit, so authenticating to sudo on the remote host with that ticket does not work. This will be provided in a future version.

Privileges and Permissions

When a user is logged into Cockpit, they are logged into a normal session that has exactly the same privileges as if they logged in via SSH or on the console.

However, Cockpit will usually try to escalate the privileges of the user using Policy Kit or sudo. If the user is able to escalate privileges from the command line by typing in their password again (or without typing in any password), then Cockpit will be able to escalate the privileges of the session to "root" immediately upon login.

The user can change the privileges of a session from within that session, via the "Administrative access" indicator in the top bar. From that indicator, the user can drop "root" privileges and regain them. On the next login, Cockpit will give the session the same privileges.

Usually a user needs to be in the wheel Unix user group for the user to be able to escalate privileges in this way. However both Policy Kit and sudo may be configured to use other criteria.

Customizing Polkit Privileges

Services like systemd and NetworkManager use Polkit to validate and escalate privileges. It is possible to customize these rules with files in /etc/polkit-1/rules.d.

Polkit rules files are javascript with specific methods and objects. For example, placing the following polkit rule to /etc/polkit-1/rules.d/10-operators.rule allows all users in the operators group to start, stop, restart and otherwise manage systemd services:

polkit.addRule(function(action, subject) {
    if (action.id == "org.freedesktop.systemd1.manage-units") {
        if (subject.isInGroup("operators")) {
            return polkit.Result.YES;
        }
    }
});

In order to allow a certain group to perform any administrative action you could add a rule like this:

polkit.addAdminRule(function(action, subject) {
    return ["unix-group:operators"];
});

Feature Internals

systemd

Cockpit uses systemd and the DBus APIs it provides to configure and monitor core aspects of the system. Use of alternate system APIs are not currently implemented.

For non root users, systemd controls access to its APIs via Policy Kit and a user logged into Cockpit will have the same permissions as they do from the command line.

Cockpit retrieves information about the host and changes the hostname via the hostnamed daemon. To perform similar tasks from the command line use the hostnamectl command:

$ hostnamectl
   Static hostname: pink.example.com
   Pretty hostname: Pink
         Icon name: computer-desktop
           Chassis: desktop
        Machine ID: ef00b79be229463cbb844c3e715de96c
           Boot ID: 934983d64d34465cb5a8383b5a89ad8c
  Operating System: Fedora 22 (Twenty Two)
       CPE OS Name: cpe:/o:fedoraproject:fedora:22
            Kernel: Linux 4.0.4-301.fc22.x86_64
      Architecture: x86-64

Cockpit configures the system time and time zone via the timedated daemon. To perform similar tasks from the command line use the timedatectl command:

$ timedatectl list-timezones
Africa/Abidjan
Africa/Accra
Africa/Addis_Ababa
Africa/Algiers
...

Cockpit can manage the list of NTP servers used by systemd-timesyncd by putting its own file into /etc/systemd/timesyncd.conf.d/. Note that systemd-timesyncd is not always enabled, depending on the configuration of the machine. In that case, Cockpit disabled the UI for managing the list of NTP servers. In some cases use of ntpd can cause the timedated daemon to behave inconsistently with regards to time synchronization.

Cockpit reboots or powers down the machine by using the shutdown command. To perform similar tasks from the command line, run it directly:

$ sudo shutdown +15
Shutdown scheduled for Sa 2015-09-26 15:49:40 CEST, use 'shutdown -c' to cancel.

Cockpit manages system services and sockets via systemd. To perform similar tasks from the command line use the systemctl command:

$ systemctl status cockpit
● cockpit.service - Cockpit Web Service
   Loaded: loaded (/usr/lib/systemd/system/cockpit.service; static; vendor preset: disabled)
  Drop-In: /etc/systemd/system/cockpit.service.d
           └─debug.conf
   Active: active (running) since Sa 2015-09-26 13:28:02 CEST; 2h 7min ago
     Docs: man:cockpit-ws(8)
 Main PID: 6957 (cockpit-ws)
   Memory: 1.8M
   CGroup: /system.slice/cockpit.service
           ├─ 6957 /usr/libexec/cockpit-ws
           └─29598 /usr/bin/ssh-agent

In order to customize who can perform various actions in system, create polkit rules with the following actions and details:

org.freedesktop.systemd1.manage-units

Permission to manage system services or other units. Details available: unit, verb

org.freedesktop.systemd1.manage-unit-files

Permission to manage system services or other unit files.

org.freedesktop.systemd1.reload-daemon

Permission to reload the systemd state.

For example, placing the following polkit rule to /etc/polkit-1/rules.d/10-http.rule allows all users in the operators group start, stop, and restart the Apache HTTP service:

polkit.addRule(function(action, subject) {
    if (action.id == "org.freedesktop.systemd1.manage-units") {
        if (subject.isInGroup("operators") && action.lookup("unit") == "httpd.service") {
            var verb = action.lookup("verb");
            if (verb == "start" || verb == "stop" || verb == "restart") {
                return polkit.Result.YES;
            }
        }
    }
});

Journal

The systemd journal provides Cockpit with indexed log data. This log data is found on the Journal page, as well as in various other places when configuring services, storage, networking etc.

Cockpit accesses Journal data via the journalctl command. Similar tasks can be performed at the command line:

$ sudo journalctl -f -u docker
...

NetworkManager

If available on the system, Cockpit uses NetworkManager and the DBus APIs it provides to interact with the system’s network configuration.

For non root users, NetworkManager controls access to its APIs via Policy Kit and a user logged into Cockpit will have the same permissions as they do from the command line.

To perform similar tasks from the command line, use the nmcli command:

$ nmcli general status
STATE      CONNECTIVITY  WIFI-HW  WIFI     WWAN-HW  WWAN
connected  full          enabled  enabled  enabled  enabled

Devices marked as "not managed" with the NM_CONTROLLED=no setting will not be displayed in the interface.

Firewall

Cockpit uses firewalld to interact with the system’s firewall. No firewall configuration UI will be shown if firewalld is not installed.

Firewalld controls access to its APIs via PolicyKit. The user logged into Cockpit needs to have the appropriate permissions to view or modify the settings.

Cockpit can currently only show, add, and remove predefined firewalld services in the default zone.

To perform similar tasks from the command line, use firewall-cmd. For example, to get the same list of allowed services that Cockpit displays:

$ sudo firewall-cmd --list-services
dhcpv6-client samba-client mdns ssh cockpit

To enable an additional service, use:

$ firewall-cmd --add-service pop3
success

storaged

If available on the system, Cockpit uses storaged to configure and monitor storage, disks, mounts etc. on the system. This functionality is present in the Cockpit storaged package.

The storaged project is originally based on a project called udisks and added support for many more features such as LVM, iSCSI, Multipath, and BTRFS. The same tools and backwards compatible API are available between storaged and udisks the projects. Cockpit can use udisks but disables many of it’s storage related features, including updating /etc/fstab and /etc/crypttab for stability reasons.

For non root users, storaged controls access to its APIs via Policy Kit and a user logged into Cockpit will have the same permissions as they do from the command line.

To perform similar tasks from the command line, use the storagedctl command:

$ udisksctl dump
...

To perform LVM tasks, you may use the various LVM commands, such as vgcreate, lvresize and so on. Cockpit will detect such changes made at the command line.

Cockpit recognizes devices with multiple paths and can start the multipathd service in case it is not running. On the command line, you can control multipath features with the mpathconf, multipathd, and multipath commands.

To manage iSCSI initiators from the command line, you can use iscsiadm and related tools.

User Tools

Cockpit uses the usual tools to create and modify local user accounts. Examples are useradd, usermod and passwd. These same tools are available for use on the command line.

realmd

If available on the system, Cockpit uses realmd and the DBus APIs it provides to configure the system’s Active Directory or IPA domain membership.

Not all systems can join all kinds of domains. This depends on the availability of the necessary client software.

For non root users, realmd controls access to its APIs via Policy Kit and a user logged into Cockpit will have the same permissions as they do from the command line.

To perform similar tasks from the command line, use the realm command:

$ realm join example.com
Password for Administrator:

realmd sets up domain-qualified user names by default, i. e. login user names look like “user@example.com”. For using unqualified names (just “user”), set the fully-qualified-names option in /etc/realmd.conf before joining a domain.

Cockpit requests an SSL certificate from the IPA server for cockpit-ws with the ipa-getcert command.

Terminal

Cockpit provides a standard shell in a terminal. This shell and the processes running in it have the same privileges as if the user had logged in via SSH.

PCP Metrics

If available, Cockpit uses the Performance Co-Pilot framework to gather metrics data about the system. This data is used to display the history graphs on the "Metrics and history" page. Cockpit can use the PCP logging feature to display archived data about the system from a different point in time. If PCP is not available, then Cockpit gathers the metrics data itself, but archival features are not available.

Whether or not metrics are archived depends on whether the pmlogger.service systemd unit is running or not. The "Enable PCP metrics collector" button on the Metrics page will enable and start this service.

To see similar metrics data from the command line, you can use tools like pmstat or pminfo:

$ pmstat
@ Sat Sep 26 15:30:10 2015
 loadavg                      memory      swap        io    system         cpu
   1 min   swpd   free   buff  cache   pi   po   bi   bo   in   cs  us  sy  id
    4.19      0 20710m 605148  6450m    0    0    0 2548 5688  14K  19   3  76
...

These metrics can also be exposed to other machines on a TCP port with pmproxy and Redis or Valkey:

systemctl enable --now redis pmproxy
# if you use firewalld, open port 44322:
firewall-cmd --permanent --add-service pmproxy
firewall-cmd --reload

This allows you to gather and visualize PCP metrics from multiple machines with Grafana and the PCP Grafana plugin.

Multiple Machines

Warning

This feature is deprecated as of Cockpit 322.

Cockpit can connect to multiple machines from a single Cockpit session. These are listed in the host switcher.

These additional machines are accessed via SSH from the machine that the first machine connected to, and are authenticated with the logged in user’s password and/or SSH keys.

SSH host keys are stored in /etc/ssh/ssh_known_hosts.

The machine data is stored in /etc/cockpit/machines.d/*.json, or below $XDG_CONFIG_DIRS if set (see cockpit.conf). Settings in lexicographically later files amend or override settings in earlier ones. Cockpit itself writes into 99-webui.json; packages or admins who want to pre-configure machines should ship files like 05-mymachine.json so that changes from the web interface override the pre-configured files.

Each JSON file contains an object that maps machine IDs to objects that define the properties of that machine. The ID can be a human readable name or an IP address or any other unique value, and is shown in the web interface until conneting to it the first time, at which point the web interface will show the machine’s host name.

The following properties are recognized:

"address"

(string, mandatory) IP address or DNS name of the machine

"visible"

(boolean, optional) If true, the machine will be displayed and available for managing with Cockpit. If false (the default), it will not be displayed, but still taken into account for type-ahead search when adding new machines in the web interface.

"user"

(string, optional) User name on the remote machine. When not given, Cockpit will default to the user name that was being used to log into Cockpit itself.

"port"

(integer, optional) ssh port of the remote machine. When not given, the default port 22 is used.

"color"

(string, optional) Color to assign to the machine label in the web interface. This can be either given as rgb(r_value, g_value, b_value) with each value being an integer between 0 and 255, or as a color name like yellow. When not given, Cockpit will assign an unused color automatically.

Example:

{
    "web server": {
        "address": "192.168.2.4",
        "visible": true,
        "color": "rgb(100, 200, 0)",
        "user": "admin"
    },
    "192.168.2.1": {
        "address": "192.168.2.1",
        "port": 2222,
        "visible": true,
        "color": "green"
    }
}

SELinux Policy

If present on the system Cockpit can set the SELinux mode to enforcing or permissive. It can also use setroubleshootd to show audit issues and apply suggested fixes.

To perform similar tasks from the command line use the setenforce and sealert tools.

To clear out all the information that setroubleshootd tracks, you can use a commands like:

$ sudo killall setroubleshootd
$ sudo rm -rf /var/lib/setroubleshoot/*

Tuned Profiles

If present on the system Cockpit can use Tuned and the DBUS API it provides to set system performance profiles. To perform similar tasks from the command line, use the tuned-adm command.

SOS Report

If present on the system Cockpit can use sosreport to collect system configuration and diagnostic information.

To perform similar tasks from the command line, use the sosreport command.

Package Updates

Cockpit uses the PackageKit D-Bus API to get information about available package updates and to apply them, in an Operating System independent manner.

To perform similar tasks from the command line, use the pkcon command:

$ pkcon refresh

$ pkcon get-updates
Available  sudo-1.8.20p2-1.fc26.x86_64 (updates-testing)
    Allows restricted root access for specified users
Available  vim-filesystem-2:8.0.617-1.fc26.x86_64 (updates-testing)
    VIM filesystem layout
Available  vim-minimal-2:8.0.617-1.fc26.x86_64 (updates-testing)
    A minimal version of the VIM editor

$ pkcon get-update-detail sudo
Details about the update:6.x86_64 [fedora]
 Package: sudo-1.8.20p2-1.fc26.x86_64
 Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1452941
 Update text: - update to 1.8.20p2
    - added sudo package to dnf/yum protected packages

$ pkcon update
The following packages have to be updated:
 sudo-1.8.20p2-1.fc26.x86_64    Allows restricted root access for specified users
 vim-filesystem-2:8.0.617-1.fc26.x86_64 VIM filesystem layout
 vim-minimal-2:8.0.617-1.fc26.x86_64    A minimal version of the VIM editor
Proceed with changes? [N/y] y
[...]

Of course you can also use your Operating System specific commands for that, such as dnf updateinfo info on Fedora or sudo apt upgrade on Debian.

Developer Guide

Embedding and Integrating Cockpit

Cockpit can be embedded in other web applications either as a whole or specific Cockpit components can be integrated. Due to frame security policy restrictions, this only works if Cockpit and the web application have the same origin; this is commonly achieved by running both from a common reverse proxy.

Embedding the Cockpit Interface

Cockpit can be embedded into a larger web page as a frame. To embed the entire Cockpit Window use the URI: https://server.example.com:9090/

<html>
  <head>
    <title>Embedded Cockpit</title>
  </head>
  <body>
    This is Cockpit.
    <br/>
    <iframe width="800px" height="600px"
            src="https://server.example.com:9090/"/>
  </body>
</html>

Integrating Cockpit Components into Web Applications

Instead of embedding the entirety of Cockpit, you can integrate specific components. Only those components explicitly documented as API should be integrated. Other components can and will change regularly.

The component will load from the server in question and a WebSocket connection will be established with the server to relay the component’s message stream.

Cockpit components are HTML files contained in packages. These can be placed in an iframe or web browser window. Each documented and stable component has a well-known URL and these are documented in the API reference. Each component URL begins with the string /cockpit/@localhost/ followed a package name, and then the component itself.

For example the terminal.html in the system package, has this URL: /cockpit/@localhost/system/terminal.html

<html>
  <head>
    <title>Embedded Terminal</title>
  </head>
  <body>
    This is a terminal.
    <br/>
    <iframe width="800px" height="600px"
      src="https://server.example.com:9090/cockpit/@localhost/system/terminal.html"/>
  </body>
</html>

Deep Integration

Most often simple integration will be used to bring Cockpit components into web applications. However it is also possible to do deep integration for embedders who wish to perform non-standard authentication with the server, and relay the component’s message stream to the server themselves.

Warning

Deep integration capability is in heavy flux and is not yet documented.

Pinging Cockpit

When embedding Cockpit or integrating Cockpit components, it may be necessary to check whether Cockpit is available on a server before proceeding.

To do this perform a /ping request to Cockpit. This is a simple HTTP GET request. It returns the following:

GET: https://server.example.com:9090/ping
200 OK: { "service": "cockpit" }

The /ping request allows Cross Origin Resource Sharing headers and as such can be performed from Javascript code with any origin. The request can also be made via plain HTTP without SSL. It is by design that no further information is present in the response.

A complete example of using /ping is available in the Cockpit sources in the /examples/ping-server/ directory.

Cockpit Packages

Cockpit is separated into various packages, each of which brings specific features and/or code.

Warning

In addition, any APIs or behavior not explicitly documented here is an internal API and can be changed at any time.

Layout of Package Files

A package consists of one or more files placed in a directory or its subdirectories. It must have a manifest.json file and follow certain naming conventions.

The name of a package is the name of the directory.

The name of the package must be ASCII alphanumeric, and may contain an underscore. Names of directories and files in the package must consist of ASCII alphanumeric along with dash, underscore, dot, and comma. No spaces are allowed.

Cockpit uses the data directories from the XDG Base Directory Specification to locate packages. The $XDG_DATA_DIRS represents a colon separate list of system data directories, and $XDG_DATA_HOME is a user specific data directory. If the environment variables are not set, defaults are used, according to the spec. If cockpit has been built with an alternate --prefix=/path then the $prefix/share/cockpit is used by default.

A cockpit/ subdirectories in any of these data directories is the location where packages are loaded by Cockpit. If Cockpit finds a package with the same name, in multiple data directories, then the first one wins. According to the spec the first data directory is $XDG_DATA_HOME and then $XDG_DATA_DIRS in order.

This means that, by default the following directories are searched for cockpit packages, and in this order:

  • ~/.local/share/cockpit/

  • /usr/local/share/cockpit/

  • /usr/share/cockpit/

Packages placed in $XDG_DATA_HOME are not cached by Cockpit or the web browser. Other packages are cached aggressively, and are accessed using a checksum of the files in the packages and their names.

You can use the following command to list the packages installed on a server. You’ll note that it’s output may change when you run the command as different users, if there are packages installed in the user’s home directory.

$ cockpit-bridge --packages
...

To further clarify things, here is an example package called "my-package" and its file layout:

/usr/share/cockpit/
    my-package/
        manifest.json
        file.html
        some.js

Place or symlink packages in your ~/.local/share/cockpit directory (or appropriate $XDG_DATA_HOME location) that you would like to modify and develop. System installed packages should not change while Cockpit is running.

Package Manifest

Each package has a manifest.json file. It is a JSON object. The following fields may be present in the manifest:

content-security-policy

By default Cockpit serves packages using a strict Content Security Policy, which among other things does not allow inline styles or scripts. This can be overridden on a per-package basis, with this setting. + If the overridden content security policy does not contain a default-src, connect-src, base-uri, form-action, object-src, or block-all-mixed-content then these will be added to the policy from the manifest.

name

An optional string that changes the name of the package. Normally packages derive their name from the directory that they are located in. This field overrides that name.

priority

An optional number that specifies which package is preferred in cases where there are conflicts. For example given two packages with the same name a package is chosen based on its priority.

conditions

An optional list of {"predicate": "value"} objects. Cockpit will only consider the package if all conditions are met. This is preferable to using priority.

Currently supported predicates are path-exists and path-not-exists (since Cockpit 286) and any (since Cockpit 348). any accepts a list of conditions and evaluates to true if at least one of the nested conditions is met. Unknown predicates are ignored.

requires

An optional JSON object that contains a "cockpit" string version number. The package will only be usable if the Cockpit bridge and javascript base are equal or newer than the given version number.

version

An informational version number for the package.

preload

A list of identifiers of the components that should be preloaded. Normally, the files of a component are loaded when the user navigates to it for the first time. The files of a preloaded component are loaded immediately after the user logs in, and the initialization code of the component is invoked. + The value of this field is an array of strings, where each string is one of the keys used in the dashboard, menu, or tool fields that are explained below.

parent

This option is used when module does not have its own menu item but is a part of a different module. This is described by JSON object with properties component which takes name of the superordinate component and docs with list of documentation URLs for the given page. See below for structure of docs property.

In addition, the following keys contain information about where components of the package should appear in Cockpit’s user interface. Each of these keys is optional and contains an object mapping unique identifiers to menu items, which are described below. (The naming of these fields doesn’t perfectly match the current user interface for historical reasons.)

dashboard

Dashboard items appear in the menu under the section Apps.

menu

These items appear in the menu under the section System. This section is roughly ordered into these categories (with their order in parentheses): +

  • System Information (10)

  • Logs (20)

  • Configuring major subsystems (30-40)

  • Things running on the machine (VMs, Containers - 50-60)

  • Implementation Details (Accounts, Services - 70-100)

tools

These items appear in the menu under the section Tools.

Menu items and tools are registered using JSON objects that have the following properties:

label

The label for the menu item or tool.

order

An optional order number to place this menu item or tool. Lower numbers are listed first.

path

The relative path to the HTML file within the package that implements the menu item or tool.

docs

List of documentation URLs for the given page. Each item is an object containing label and url.

keywords

Keywords that describe the page and which are used for searching. These keywords should be lowercase. Keywords is a list containing keyword items as described below. Page label is prepended as first keyword in the first keyword item.

Keyword items are registered using JSON objects that have the following properties:

matches

List of keywords to be matched.

goto

Optional path that is used for all keywords in this item. When this argument starts with slash, then it is used as pathname, otherwise it is used as hash. Defining goto:"page_hash" in page with path:"/page_path" would redirect to /page_path#page_hash, while goto:"/page_path" would redirect to /page_path ignoring default page path.

weight

How much keywords are prioritized over others. Default is 3.

translate

false when keywords should not be localized. Default is true.

An example manifest.json with some optional properties set:

{
  "version": 0,
  "require": {
      "cockpit": "120"
  },
  "tools": {
     "mytool": {
        "label": "My Tool",
        "path": "tool.html"
     }
  }
}
{
  "version": 0,
  "require": {
    "cockpit": "120"
  },
  "conditions": [
    {"path-exists": "/usr/bin/mytool"},
    {"path-exists": "/etc/mytool.conf"},
    {"path-not-exist": "/etc/incompatible-tool"}
  ],
  "tools": {
     "mytool": {
        "label": "My Tool",
        "path": "tool.html"
     }
  }
}

The following example shows how to use disjunctive conditions with any to specify alternative requirements (available since Cockpit 348). This package will be available if either /usr/bin/alt1 or /usr/bin/alt2 exists. In any case, /etc/incompatible-tool must not exist.

"conditions": [
  {"any": [{"path-exists": "/usr/bin/alt1"}, {"path-exists": "/usr/bin/alt2"}]},
  {"path-not-exists": "/etc/incompatible-tool"}
]

Manifest overrides

To change a manifest system-wide, a file <package-directory-name>.override.json may be placed into /etc/cockpit/, or below $XDG_CONFIG_DIRS if set (see cockpit.conf). To change it for a particular user only, put the override into ~/.config/cockpit.

These override the information in the manifest in the simple JSON Merge Patch format.

This can be used to hide or modify menu items of an existing package. For example /etc/cockpit/systemd.override.json or ~/.config/cockpit/systemd.override.json could hide the Logs menu item and move the Services menu item to the top of the menu.

{
  "menu": {
    "logs": null,
    "services": {
      "order": -1
    }
  }
}

When referring to files in your package, such as in a hyperlink or a <style> tag or <script> tag, simply use a relative path, and refer to the files in the same directory. When you need to refer to files in another package use a relative link.

For example here’s how to include the base cockpit.js script in your HTML from the latest package:

<script src="../base1/cockpit.js"></script>

Do not assume you can link to any file in any other package. Refer to the list of API packages for those that are available for use.

Content Negotiation

In order to support gzipped and/or minified data, the files in a package are loaded using content negotiation logic. A HTTP request for the file test.js in the package named mypackage will return mypackage/test.js or mypackage/test.js.gz (in undefined preference). If neither exists, then it returns mypackage/test.js.min or mypackage/test.js.min.gz (again in undefined preference).

When packages are loaded from a system directory, Cockpit optimizes the file system lookups above, by pre-listing the files. This is one of the reasons that you should never change packages installed to a system directory while Cockpit is running.

Using Cockpit API

Cockpit has API available for writing packages. There is no API available for external callers to invoke via HTTP, REST or otherwise.

API from various packages can be used to implement Cockpit packages. Each package listed here has some API available for use. Only the API explicitly documented should be used.

To include javascript from the API, simply load it into your HTML using a script tag. Alternatively you can use an javascript loader.

Bridges for specific tasks

On the server side the cockpit-bridge connects to various system APIs that the front end UI requests it to. There are additional bridges for specific tasks that the main cockpit-bridge cannot handle, such as using the PCP C library API.

These additional bridges can be registered in a "bridges" section of a package’s manifest.json file. Building such a bridge is a complex tasks, and we will skip over that here. However it is useful to adjust how these additional bridges are called, and so we’ll look at how they are registered.

An example manifest.json with a bridges section:

{
    "bridges": [
        {
            "match": { "payload": "metrics1" },
            "spawn": [ "/usr/libexec/cockpit-pcp" ]
        }
    ]
}

The bridges are considered in the order they are listed in the array. Use the manifest.json`"priority"` field to control order between packages. The bridges are registered using JSON objects that have the following properties:

environ

Optional, additional environment variables to pass to the bridge command.

match

The "match" object describes which channel open command options need to match for a given channel to be handed over to this bridge.

privileged

If set to true, this marks the bridge as a superuser bridge. Cockpit will start one of these explicitly when trying to escalate the privileges of a session. A privileged bridge can not have a "match" property.

label

Setting this enables selection of privileged bridges in the UI. When no privileged bridge has a label, then Cockpit will start the bridge that runs sudo. This is the case in a default Cockpit installation. When at least one privileged bridge has a label then the user can select one of them when escalating privileges. As a special case, if only one bridge has a label, then the step of selecting a bridge is omitted in the UI and that one bridge is always started. + Thus, if you add a privileged bridge with a label in a new manifest, Cockpit will use that bridge the next time a user opens the "Administrative access" dialog. If you want the user to choose between the sudo method and your new one, you need to duplicate the sudo bridge definition in your manifest and give it a label.

problem

If a problem is specified, and this bridge fails to start up then channels will be closed with this problem code. Otherwise later bridges or internal handlers for the channel will be invoked.

spawn

The command and arguments to invoke.

The spawn and environ values can be dynamically taken from a matching open command values. When a value in either the spawn or environ array contains a named variable wrapped in ${}, the variable will be replaced with the value contained in the matching open command. Only named variables are supported and name can only contain letters, numbers and the following symbols: ._-

For example a bridges section like:

{
  "bridges": [
    {
      "match": { "payload": "example" },
      "environ": [ "TAG=${tag}" ],
      "spawn: [ "/example-bridge", "--tag", "${tag}" ],
      "problem": "access-denied"
    }
  ]
}

when a open command is received with a payload of example with tag value of tag1. The following command will be spawned

TAG=tag1 /example-bridge --tag tag1

Processes that are reused so if another open command with a "tag" of tag1 is received. The open command will be passed to existing process, rather than spawning a new one. However a open command with an tag of tag2 will spawn a new command:

TAG=tag2 /example-bridge --tag tag2

If you need to include ${}, as an actual value in your arguments you can escape it by prefixing it with a \

Replacing an existing package

If the functionality in a package replaces that of another package then it can replace that package by claiming the same name and a higher priority.

For example, a package in the /usr/share/cockpit/disks directory could replace Cockpit’s storage package with a manifest.json like this:

{
  "version": 0,
  "name": "storage",
  "priority": 10,
  "menu": {
     "index": {
        "label": "Disk Storage",
        "order": 15
     }
  }
}

Cockpit URLs

Cockpit URLs follow a specific structure, related to the components they are loading. Various components are loaded in <iframe> tags. The URLs for these components are described first. Further down below you can find information about the top level bookmarkable Cockpit address URLs.

Component URLs

Cockpit components are HTML documents. They are organized into packages. Each package contains information about which HTML components are available in that package. Components should always use relative URLs to access resources, such as images, scripts or CSS files, even if they refer to a resource in another package.

The following are valid component URLs, each bit will be discussed below:

/cockpit/@localhost/package/component.html#/hash
/cockpit/$checksum/package/component.html#/hash
/cockpit/@server.example.com/package/component.html#/hash
/cockpit+embedder/@localhost/package/component.html#/hash

All resource URLs are under the /cockpit namespace. In cases where a Cockpit component is being embedded the /cockpit may be followed by a plus sign and another embedder specific identifier.

What follows is either a @host or $checksum which tells cockpit where to find the package. Checksums are used when more than one host has identical packages and the resources can be cached.

The package name is next, followed by the component HTML path inside that package. And lastly a hash allows for navigation within a single component. The hash should follow a URL path and/or query string form.

Warning

Never assume that the @host or $checksum portion is predictable. Only refer to resources in packages on the same host.

Visible URLs

The above Component URLs are usually not visible to the user. Instead the Cockpit Web Service wraps the components in a shell which allows navigation, and provides bookmarkable clean URLs to the component. These URLs do not affect embedders or components directly.

If no path is present then the Cockpit will redirect to the default page for the server.

If the first segment of the path begins with an @ sign, then the component is being shown from a non-local host.

The next segment of the path, (or first if the component is being shown on the local host) is the package name. The remainder of the path is a component file in the package. If no further path segments are present, a default index.html component in the package is loaded. An extension of .html is automatically appended.

The hash portion of the path is automatically transferred to the component as the hash of its resource URL.

API: base1

This package contains basic support API available to other packages.

cockpit.js

Basic cockpit API to interact with the system

Loading cockpit.js

cockpit.js should be loaded via a script tag.

<script src="../base1/cockpit.js">

cockpit.js: Object Caching

If the same information is displayed by multiple components in Cockpit, cockpit.cache() provides a way to share data between them. The shared data should be simple objects, arrays, and values, and not contain functions or other objects.

cockpit.cache()
cache = cockpit.cache(key, provider, consumer)

Create a new cache object. The key should be a globally unique string that describes the data being cached. This string must describe the data, across all machines and all versions of cockpit. It is customary to include a version number in the key string.

function provider(result, key) {
    result("myvalue");

    return {
        close: function() {
            /* closed */
        }
    };
}

The provider is a function that will be invoked to start retrieving data for the cache. It will be passed a result function as its first argument. The result should be invoked whenever new data is available. The key argument matches the key string the cache was created with.

The provider can return an object with a close method. This method will be invoked when the cache no longer needs data from the provider.

function consumer(value, key) {
    /* ... */
}

The consumer is a function that will be passed new values when they are available, whether they come from the provider or a source in a different component/frame.

cache.close()
cache.close()

Close a cache and stop calling its consumer. If the provider was invoked, then the close() method it returned will be invoked.

cockpit.js: Raw Channels

At a low level Cockpit communicates with the system via messages passed through various channels. These are usually exposed via higher level APIs, such as the cockpit.spawn() function. It is rare to use raw channels directly.

cockpit.channel()
channel = cockpit.channel(options)

This function creates a new channel for communication with the system. It returns a new channel object. The options argument is a plain object. At least the "payload" option is required, and based on the payload type, other options may be required.

"binary"

Set to true to transfer binary payloads. Both messages sent via channel.send() and those received via channel.onmessage should be arrays of bytes, either Uint8Array or Array depending on browser support.

"payload"

The payload type for the channel. Only specific payload types are supported.

"superuser"

Set to "require" to open this channel as root. If the currently logged in user is not permitted to become root (eg: via pkexec) then the channel will immediately be closed with a "access-denied" problem code. + Set to "try" to try to open the channel as root, but if that fails, then fall back to an unprivileged channel.

The channel object returned has the following fields and methods and events. You should call the channel.close() method when done with the channel.

A valid channel will always be returned and the is ready to channel.send(). The channel may close shortly afterword due to a failure.

channel.binary

Will be true for an binary channel. Will be set to false if the channel is textual.

channel.options

The options used to open this channel. This should not be changed.

channel.valid

Will be true for an open channel. Will be set to false if the channel closes.

channel.send()
channel.send(data)

Send a message over the channel. The contents of the message depends on the payload type of the channel. If a binary channel, then data is expected to be an Array of bytes or a Uint8Array. If not binary, then the data will be converted to a string if not already a string.

channel.control()
channel.control(options)

Notify the channel to tune certain parameters on the fly. The options is a plain javascript object, and the contents depend on the "payload" of the channel.

One common operation is to set "command" to "done" in the options field. To indicate that no further messages will be sent through the channel.

channel.wait()
promise = channel.wait([callback])

Returns a promise that is ready when the channel is ready, or fails if the client closes. If a callback is specified, it is attached to the promise. The promise will be rejected or resolved with the contents options passed to the channel.onready and channel.onclose events respectively.

In general it’s not necessary to wait for the channel before starting to use the channel.

channel.close()
channel.close([options])

Close the channel.

If options is present it can be a plain javascript object containing additional channel close options to send to the peer. If closing for because of a problem, set the "problem" field to a problem code. If options is not an object it will be treated as a "problem".

The close event will fire. A channel can also be closed by a peer or if the underlying transport closes.

channel.onmessage
channel.addEventListener("message", function(event, data) { ... })

An event triggered when the channel receives a message. The message is passed as a string to the handler in the data. In the case of binary channels data is an Uint8Array or an Array of bytes if the former is not supported by the browser. The contents of the message depends on the payload type of the channel.

channel.oncontrol
channel.addEventListener("control", function(event, options) { ... })

An event triggered when the channel receives an control message in the middle of the flow. One particular use is when the command is set to "done" then no further messages will be received in the channel. The exact form of these messages depend on the "payload" of the channel.

channel.onready
channel.addEventListener("ready", function(event, options) { ... })

An event triggered when the other end of the channel is ready to start processing messages. This indicates the channel is completely open. It is possible to start sending messages on the channel before this point.

channel.onclose
channel.addEventListener("close", function(event, options) { ... })

An event triggered when the channel closes. This can happen either because channel.close() function was called, or if the peer closed the channel, or the underlying transport closes.

The options will contain various close information, including a "problem" field which will be set if the channel was closed because of a problem.

cockpit.transport.origin
cockpit.transport.origin

The HTTP origin that is being used by the underlying channel transport. This is read-only, you should not assign a value. If the browser supports window.location.origin then this will be identical to that value.

cockpit.transport.host
cockpit.transport.host

The host that this transport is going to talk to by default. This is read-only, you should not assign a value. If the value is null that means that the transport has not been setup yet.

cockpit.transport.csrf_token
cockpit.transport.csrf_token

A cross site request forgery token for use with external channels. This becomes valid once the connection is properly established.

cockpit.transport.options
cockpit.transport.options

Initialization options received over the underlying channel transport. These will be empty until connection is properly established.

cockpit.transport.wait()
cockpit.transport.wait(callback)

Call the callback function once the underlying channel transport is initialized. This will start the initialization if not already in progress or completed. If the channel transport is already initialized, then callback will be called immediately.

In general it’s not necessary to wait for the transport before starting to open channels.

cockpit.transport.close()
cockpit.transport.close([problem])

Close the underlying channel transport. All channels open channels will close. The problem argument should be a problem code string. If not specified it will default to "disconnected".

cockpit.transport.filter()
cockpit.transport.filter((message, channelid, control) =>  { ... })

Add a filter to the underlying channel transport. All incoming messages will be passed to each of the filter callbacks that are registered.

This function is rarely used.

Filter callbacks are called in the order they are registered. If a filter callback returns false then the message will not be dispatched further, whether to other filters, or to channels, etc.

The message is the string or array with the raw message including, the framing. The channelid is the channel identifier or an empty string for control messages. If control is set then this is a control message,d and the control argument contains the parsed JSON object of the control message.

cockpit.transport.inject()
cockpit.transport.inject(message, [out])

Inject a message into the underlying channel transport. The message should be a string or an array of bytes, and should be valid according to the Cockpit message protocol. If the out argument is equal to false then the message will be injected as an incoming message as if it was received on the underlying channel transport.

This function is rarely used. In general you should only inject() messages you got from a filter().

cockpit.base64_encode()
string = cockpit.base64_encode(data)

Encode binary data into a string using the Base64 encoding. The data argument can either be a string, an Array, an ArrayBuffer or a Uint8Array. The return value is a string.

cockpit.base64_decode()
data = cockpit.base64_decode(string, [constructor])

Decode binary data from a Base64 encoded string. The string argument should be a javascript string. The returned data> will be an array of bytes.

You can pass Uint8Array, Array or String as an alternate constructor if you want the decoded data in an alternate form. The default is to return an Array. Note that if you use a String for the decoded data, then you must guarantee that the data does not contain bytes that would be invalid for a string.

cockpit.js: DBus Client

Cockpit allows access to DBus services via this API.

DBus Types

DBus values are represented as javascript values and objects as follows:

BYTE 'y'

Javascript number.

BOOLEAN 'b'

Javascript boolean.

INT16 'n'

Javascript number.

UINT16 'q'

Javascript number.

INT32 'i'

Javascript number.

UINT32 'u'

Javascript number.

INT64 'x'

Javascript number.

UINT64 't'

Javascript number.

DOUBLE 'd'

Javascript number.

STRING 's'

Javascript string.

OBJECT_PATH 'o'

Javascript string.

SIGNATURE 'g'

Javascript string.

ARRAY of BYTE 'ay'

A string containing base64 encoded data.

ARRAY of DICT_ENTRY with STRING keys 'a{s?}'

A javascript plain object with the keys as property names.

ARRAY of DICT_ENTRY with other keys 'a{??}'

A javascript plain object each key JSON encoded into a string property name.

ARRAY of other

A javascript array.

VARIANT

A javascript plain object with the "t" property set to a DBus type string, and the "v" property set to a value.

HANDLE 'h'

A javascript object that describes a cockpit channel which represents the passed file descriptor. The payload is always set to stream. Pass it to cockpit.channel() to create the channel and start reading or writing on it. Handles can only be received, not sent from within cockpit.

cockpit.dbus()
client = cockpit.dbus(name, [options])

Create a DBus client for the given bus name (eg: service name). Use the following functions to make DBus method calls, watch for events, etc. The optional options argument is a javascript plain object, and may include:

"bus"

The DBus bus to connect to. Specifying "session" will connect to the DBus user session bus, "user" will connect to the user bus (on some systems this is identical to the session bus), "system" will connect to the DBus system bus, and "none" to the non-standard bus specified with the address option. This defaults to "system" if not present.

"address"

The bus address to connect to in case bus is "none".

"superuser"

Set to "require" to talk to this service as root. The DBus service will see the DBus method calls and accesses as coming from root, rather than the logged in user. This is useful for talking to services that do not correctly use polkit to authorize administrative users. If the currently logged in user is not permitted to become root (eg: via pkexec) then the client will immediately be closed with a "access-denied" problem code. + Set to "try" to try to talk as root, but if that fails, fall back to unprivileged.

"track"

It is valid for a DBus service to exit, and be restarted in such a way that clients continue to talk to it across the restart. Some services are not written with this in mind. If the "track" option is set to true then the channel will close when the service exits and/or disconnects from the DBus bus.

If the name argument is null, and no options other than "bus" are specified, then a shared DBus client is created. When using such a client with a DBus bus, a "name" option must be specified on various other methods in order to specify which client to talk to.

client.wait()
promise = client.wait([callback])

Returns a promise that is ready when the client is ready, or fails if the client closes. If a callback is specified, it is attached to the promise.

client.close()
client.close([problem])

Close the DBus client. If problem is specified it should be a problem code string.

client.onclose
client.addEventListener("close", options => { ... })

An event triggered when the DBus client closes. This can happen either because client.close() function was called, or the DBus service went away, or some other problem or disconnection.

The options will contain various close information, including a "problem" field which will be set if the channel was closed because of a problem.

client.onowner
client.addEventListener("owner", (event, owner) => { ... })

An event triggered when the owner of the DBus name changes. The owner value will be the id of the name owner on the bus or null if the name is unowned. The absence of an owner should not be treated as a disconnection. However this makes it possible to take some action based on the actual status of the service, for example disconnecting a pending signal handler.

client.options

Set to the options used when creating the client. Will not change for the life of the client.

client.unique_name

The unique DBus name of the client. Initially null, and becomes valid once the the client is ready.

client.proxy()
proxy = client.proxy([interface, path], [options])

Create proxy javascript object for a DBus interface. At the specified DBus object path. The proxy will have properties, methods and signals from to the DBus interface, and allows for natural interaction. If no interface is specified then the DBus bus name of the client is used. If no path is specified, then the DBus name of the client is converted to a path.

If creating lots of proxies for a given interface it is more efficient to use the client.proxies() function.

The proxy is loaded when the proxy.valid field is true, and it is set to false if the underlying interface and/or path don’t or no longer exist, or the client has closed. You can wait for proxy to become valid by passing a callback to its proxy.wait() function. The proxy.onchanged event will also fire when the proxy becomes valid or invalid. DBus properties and methods on the proxy are not defined until the proxy becomes valid.

value = proxy.Prop1
proxy.WritableProp = value

All DBus properties on the interface that start with an upper case letter (as is convention) will be automatically defined on this proxy, and will update their values as the DBus property values change. In addition the proxy.onchanged event will fire every time the properties change.

If you assign a value to a writable property on the proxy, the proxy will try to set that property on the DBus interface at path. The actual proxy property value will not update until the DBus service has notified the proxy of the change. If setting a property fails a warning will be logged. In order to have more reliable setting of properties, or track when they have been set, or if setting fails, use the client.call() directly. It should be noted that DBus service implementations may also be inconsistent in their behavior when setting a property fails.

You can access the raw property data using the proxy.data field, including data for properties that do not start with an upper case letter.

proxy.Method(arg1, arg2)
    .then((retval1, retval2) => {
        ...
    })
    .catch(ex => {
        ...
    });

All DBus methods on the interface that start with an upper case letter (as is convention) will be automatically defined on this proxy. These methods are called with arguments as normal javascript arguments. A Promise that will complete successfully when the method returns, or fail if an error occurs. The return values from the DBus method will be passed to the then handler function directly.

Methods that do not start with an upper case letter can be invoked by using the usual proxy.call() directly.

proxy.addEventListener("signal", (event, arg1, arg2) => {
    ...
});

All DBus signals on the interface that start with an upper case letter (as is convention) will be automatically emit events on this proxy. These events will contain the signal arguments after the standard event argument.

Signals that do not start with an upper case letter can be subscribed to by using proxy.onsignal directly.

Usually a proxy asks the client to watch and notify it of changes to the relevant object or path. You can pass an options argument with the watch field set to false to prevent this.

proxy.client

Set to the DBus client of the proxy. Will not change for the life of the proxy.

proxy.path

Set to the DBus object path of the proxy. Will not change for the life of the proxy.

proxy.iface

Set to the DBus interface name of the proxy. Will not change for the life of the proxy.

proxy.valid

Set to true when the proxy’s DBus interface is present at its DBus path, and all information for the proxy has loaded. Is set to false while loading, and after the proxy no longer refers a DBus interface and path. Also set to false if the client closes.

Use the by proxy.wait() function to wait for a proxy to load. The proxy.onchanged event will also be emitted when the proxy becomes valid or invalid. DBus properties and methods on the proxy are not defined until the proxy becomes valid.

proxy.data

A plain javascript object containing all the raw property data that this proxy has loaded. This will be updated automatically as the proxy is notified of property changes from the DBus service. The proxy.onchanged event will be emitted when it changes.

proxy.call()
invocation = proxy.call(method, args, [options])

Make a DBus method call on this proxy.

For DBus methods that start with an upper case letter, is usually more convenient to call the method directly on the proxy. However if methods that do not follow the usual DBus convention, or specify additional options, or the caller cannot be sure that the method actually exists, you can use this method.

This function also works on proxies that have are still loading and have not become valid yet.

The method should be a DBus method name, and the args should be an array of arguments to pass to the method. The options are described elsewhere.

The returned value is identical to the one returned from client.call(). It is a Promise that will complete successfully when the method returns, or fail if an error occurs.

proxy.wait()
promise = proxy.wait()
proxy.wait(() => {
    ...
});

Wait for a proxy to finish loading. This function returns a promise. If a callback function is passed as an argument then that function will be invoked when the proxy is ready. If this method is called after a proxy has already loaded, then the promise will be resolved immediately, and any callback will be invoked immediately. Use the promise or proxy.valid to determine whether the proxy is valid.

proxy.onchanged
proxy.addEventListener("changed", (event, data) => {
    ...
});

This event is emitted when the proxy’s properties change.

The data has the following form, and will only include properties that have changed:

{
    "Prop1": "value",
    "Prop2": 5
}
proxy.onsignal
proxy.addEventListener("signal", (event, name, args) => {
    ...
});

This event is emitted when the proxy’s emits an event.

For most events, that have names which start with an upper case letter, you can just connect to that event as a signal directly. However if you wish to be notified when any signal is emitted, or for signals that do not follow the usual DBus convention, you can connect to this event.

The name is the DBus signal name, and the args is an array of arguments that were emitted with the signal.

client.proxies()
proxies = client.proxies([interface], [path_namespace], [options])

Create proxy javascript objects for a DBus interfaces. The proxies will have properties, methods and signals from the DBus interface, and allow for natural interaction. If no interface is specified then the DBus bus name of the client is used. If no path_namespace is provided then "/" will be used.

Proxies will be automatically created for instances of the interface available at the DBus service. The optional path_namespace argument can be used to restrict the proxies for instances that have DBus paths which have the namespace path prefix.

proxy1 = proxies["/dbus/path1"];
proxy2 = proxies["/dbus/path2"];
for (proxy in proxies) {
    ...
}

The returned proxies object will is used as a dictionary, and will have values containing proxies for DBus interface instances, with the keys being the DBus paths of those instances. It is possible to enumerate over the returned proxies.

Proxies will be automatically added and removed from the proxies object as they appear and disappear in the service. The proxies.onadded and proxies.onremoved events will be emitted. DBus services may not support notifications of paths disappearing.

Use the proxies.wait() function to be notified when the initial set of proxies has been populated.

Usually a proxies ask the client to watch and be notified of changes to the relevant object or path. You can pass an options argument with the watch field set to false to prevent this.

proxies.wait()
promise = proxies.wait()
proxies.wait(() => {
    ...
});

Wait for a proxies object to populate its initial set of proxies. This function returns a promise. If a callback function is passed as an argument then that function will be invoked when the proxies are ready. If this method is called after the proxies have populated, then the promise will be resolved immediately, and any callback will be invoked immediately.

proxies.client

Set to the DBus client of the proxies. Will not change.

proxies.iface

Set to the DBus interface name of the proxies. Will not change.

proxies.path_namespace

Set to the DBus path namespace used which the proxies must have as a DBus path prefix. Will not change.

proxies.onadded
proxies.addEventListener("added", (event, proxy) => {
    ...
})

This event is emitted when a proxy is added to the proxies object. The proxy will already have loaded.

proxies.onchanged
proxies.addEventListener("changed", (event, proxy) => {
    ...
})

This event is emitted when one of the proxy in the proxies object changes its properties.

proxies.onremoved
proxies.addEventListener("removed", (event, proxy) => {
    ...
})

This event is emitted when a proxy is removed to the proxies object.

client.call()
invocation = client.call(path, interface, method, args, [options])

Make a DBus method call.

The path is the DBus object path to make the call on, interface is the DBus interface for the method and method is the name of the method to call. The args is an array of arguments to pass to the method, each of which must be appropriate for the expected DBus type of that argument. The args may be null if no arguments are to be sent.

The returned value is a Promise that will complete successfully when the method returns, or fail if an error occurs.

If options is specified it should be a plain javascript object, which may contain the following properties:

flags

A string containing DBus message flags. The character "i" indicates to the dbus service that interactive authentication is allowed. If the entire flags field is missing, then "i" is set by default.

type

A valid DBus type signature to use when calling the method. In the absence of this, the DBus service will be introspected (and the result cached) to ask what the method type signature is.

timeout

The timeout of the call in milliseconds. The call will fail with the "timeout" problem code. If "timeout" is not given, the call will never time out.

invocation.then()
invocation.then((args, options) => { ... })

This is a standard Promise method. It sets up a handler to be called when the DBus method call finishes successfully.

The args argument is an array of return values from the DBus method. Each of them will be converted to an appropriate javascript type.

The options argument may contain additional information about the reply. If the type option was specified when performing the method call, then the options in the reply here will also contain a type field containing the DBus type signature of the output. If the flags option was specified when performing the call then the options in the reply here will contain message flags. Possible out message flags are:

>

A big endian message.

<

A little endian message.

invocation.catch()
invocation.catch(exception => { ... })

This is a standard Promise method. It sets up a handler to be called when the DBus method call fails.

The exception object passed to the handler can have the following properties:

problem

A problem code string when a problem occurred starting or communicating with the DBus service. This is null in the cases where an actual DBus error was occurred.

name

The DBus error name. This will be null in cases where the failure was not due to a DBus error.

message

A DBus error message. This will be null in cases where the failure was not due to a DBus error.

client.subscribe()
subscription = client.subscribe(match, (path, interface, signal, args) => { ... })

Subscribe to signals. The match argument is a javascript plain object which defines what signals to subscribe to. Each property in the match argument restricts signals subscribed to. If a property is not present then it is treated as a wildcard, matching anything. If an empty object is specified as match then all signals will be subscribed to. The match argument may contain the following properties:

interface

A DBus interface to match.

path

A DBus object path to match. May not be used together with the path_namespace property. It should be a valid DBus object path, that is, it should have no trailing slash.

path_namespace

A DBus object path prefix to match. Any paths in the hierarchy below this top path will match. May not be used together with the path property.

member

The DBus signal name to match.

arg0

Matches the first argument of a DBus message, which must be a string.

The handler passed as the second argument will be invoked when the signal is received. A subscription is returned which can be used to remove the subscription by calling its subscription.remove() method.

It is not a problem to subscribe to the same signals more than once, with identical or slightly different match arguments.

subscription.remove()
subscription.remove()

Unsubscribe from the DBus signal subscription.

client.watch()
watch = client.watch(path)
watch = client.watch({ "path_namespace": path_namespace, "interface": interface })

Watch for property and interface changes on the given DBus object path DBus path_namespace. If interface is specified only properties on that DBus interface will be watched.

The client.proxy() and client.proxies() functions and the objects they return are high level wrappers around client.watch().

The property and interface changes will be available in raw form on the client.onnotify event.

Property and interface changes that are caused by a method call or signal will show up before that method call reply is received, or signal event is triggered. It should be possible to rely on this guarantee, unless the DBus service in question behaves incorrectly. Internally these watches work well with code that implements the ObjectManager portion of the DBus specification. If no ObjectManager implementation is available, the watch falls back to using DBus Introspection along with the usual PropertiesChanged signal. If the DBus service implements none of these, or implements them in an inconsistent manner, then this function will provide inconsistent or unexpected results.

The parameter is either a DBus path or a plain javascript object with zero or more of the following fields. If an empty javascript object is used as an argument, then all paths, interfaces and properties will be watched.

interface

Watch properties on this DBus interface.

path

Watch interfaces and properties at this DBus path. May not be used together with the path_namespace property.

path_namespace

Watch interfaces and properties under this DBus path. It should be a valid DBus object path, that is, it should have no trailing slash. If an ObjectManager implementation is available at this interface, then it is used. May not be used together with the path property.

The returned value is a Promise that will complete successfully when the watch has populated its initial set of properties and interfaces, and these have been notified via client.onnotify.

A watch can be removed by calling the watch.remove() method on the returned value. If identical watches are added more than once, then they must also be removed the same number of times before the removal takes effect.

watch.then()
watch.then(() => { ... })

This is a standard Promise method. It sets up a handler to be called when the watch has populated its initial properties and interfaces.

watch.catch()
watch.catch(ex => { ... })

This is a standard Promise method. It sets up a handler to be called if the watch fails to populate its initial properties and interfaces. Note that a watch will only fail if the DBus client closes or is somehow disconnected. It does not fail in the case of missing interfaces or properties.

watch.remove()
watch.remove()

Remove the watch. This may not have any immediate effect if other watches are in place. In particular, if identical watches are added more than once, then they must also be removed the same number of times before the removal takes effect.

client.onnotify
client.addEventListener("notify", data => { ... })

An event triggered when watched properties or interfaces change.

The client.proxy() and client.proxies() functions and the objects they return are high level wrappers around the data provided by this event.

The data has the following form:

{
    "/path1": {
        "org.Interface1": {
            "Prop1": "value",
            "Prop2": 5
        },
        "org.Interface2": null
    }
}

Multiple paths may be present, each of which may have multiple interfaces, each of which may have multiple properties. The first time a given path and interface is emitted from this signal, it will have all its properties and interfaces. Thereafter only changes are noted. If an interface is set to null, then that interface has disappeared.

client.notify()
client.notify(data)

Emits a synthetic notify event. The data argument should follow the same layout as described for the notify event.

client.onmeta
client.onmeta = (ev, data) => { ... }

An event triggered when the meta data about watched interfaces is loaded.

The client.proxy() and client.proxies() functions and the objects they return are high level wrappers around the data provided by this event.

The data has the following form:

  {
      "org.Interface": {
          "methods": {
              "Method1": {
                  "in": [ "s", "v" ],
                  "out": [ "i" ]
              },
              "Method2": { }
          },
          "signals": {
              "Signal": {
                  "in": [ "b", "s" ]
              }
          },
          "properties": {
              "Prop1": {
                  "flags": "rw",
                  "type": "s"
              },
              "Prop2": {
                  "flags": "r",
                  "type": "b"
              }
          }
      }
  }

Multiple interfaces may be present, each of which may have methods and properties. This is emitted before the first client.onnotify event for the relevant interface.

cockpit.variant()
variant = cockpit.variant(type, value)

A DBus variant is represented as a plain javascript object with a "t" property represesting the full DBus type of the variant, and a "v" property containing the variant value.

This is a helper function for creating such a variant object.

cockpit.js: Errors

cockpit.js: Errors

Problem codes and messages

Problem Codes

Cockpit represents problems with standardized problem string codes.

"access-denied"

The user is not permitted to perform the action in question.

"authentication-failed"

User authentication failed.

"internal-error"

An unexpected internal error without further info. This should not happen during the normal course of operations.

"no-cockpit"

The system does not have a compatible version of Cockpit installed or installed properly.

"no-session"

Cockpit is not logged in.

"not-found"

Something specifically requested was not found, such as a file, executable etc.

"terminated"

Something was terminated forcibly, such as a connection, process session, etc.

"timeout"

Something timed out.

"unknown-hostkey"

The remote host had an unexpected or unknown key.

"no-forwarding"

Could not forward authentication credentials to the remote host.

cockpit.message()
message = cockpit.message(problem)
message = cockpit.message(exception)

Return a message for the exception or problem code passed as an argument. If the argument is an object with a "message" property, as is the case with most exceptions, that will be returned directly. If the argument is an object with a "problem" property, then it will be used as the problem code. An appropriate message will be returned for problem codes.

cockpit.js: File Access

The cockpit.file API lets you read, write, and watch regular files in their entirety. It cannot efficiently do random access in a big file or read non-regular files such as /dev/random.

file = cockpit.file(path,
                    { syntax: syntax_object,
                      binary: boolean,
                      max_read_size: int,
                      superuser: string,
                    })

promise = file.read()
promise
    .then((content, tag) => { ... })
    .catch(error => { ... })

promise = file.replace(content, [ expected_tag ])
promise
    .then(new_tag => { ... })
    .catch(error => { ... })

promise = file.modify(callback, [ initial_content, initial_tag ]
promise
    .then((new_content, new_tag) => { ... })
    .catch(error => { ... })

file.watch((content, tag, [error]) => { }, [ { read: boolean } ])

file.close()
Simple reading and writing

You can read a file with code like this:

cockpit.file("/path/to/file").read()
    .then((content, tag) => {
        ...
    })
    .catch(error => {
        ...
    });

It is recommended to use absolute paths. Relative paths are resolved against /. To work with the current user’s files cockpit.user() can be used to get the user’s home directory.

The read() method returns a Promise.

When successful, the promise will be resolved with the content of the file. Unless you specify options to change this (see below), the file is assumed to be text in the UTF-8 encoding, and content will be a string.

The tag that is passed to the then() callback is a short string that is associated with the file and changes whenever the content of the file changes. It is meant to be used with replace().

It is not an error when the file does not exist. In this case, the then() callback will be called with a null value for content and tag is "-".

The superuser option can be used the same way as described in the cockpit.channel() to provide a different access level to the file.

You can use the max_read_size option to limit the amount of data that is read. If the file is larger than the given number of bytes, no data is read and the channel is closed with problem code too-large. The default limit is 16 MiB. The limit can be completely removed by setting it to -1.

To write to a file, use code like this:

cockpit.file("/path/to/file").replace("my new content\n")
    .then(tag => {
        ...
    })
    .catch(error => {
        ...
    });

The replace() method returns a Promise.

When the promise is resolved, the file has been atomically replaced (via the rename() syscall) with the new content. As with read(), by default the new content is a string and will be written to the file as UTF-8. The returned tag corresponds to the new content of the file.

When the promise is rejected because of an error, the file or its meta data has not been changed in any way.

As a special case, passing the value null to replace() will remove the file.

The replace() method can also check for conflicting changes to a file. You can pass a tag (as returned by read() or replace()) to replace(), and the file will only be replaced if it still has the given tag. If the tag of the file has changed, replace() will fail with an error object that has error.problem == "change-conflict". See modify() below for a convenient way to achieve transactional updates to a file.

File format

By default, a file is assumed to be text encoded in UTF-8, and the read() and replace() functions use strings to represent the content.

By specifying the syntax.parser() and syntax.stringify() options, you can cause read() to parse the content before passing it back to you, and replace() to unparse it before writing.

The main idea is to be able to write { syntax: JSON }, of course, but you can easily pass in individual functions or make your own parser/unparser object:

cockpit.file("/path/to/file.json", { syntax: JSON })

var syntax_object = {
    parse:     my_parser,
    stringify: my_unparser
};

cockpit.file("/path/to/file", { syntax: syntax_object })

Any exceptions thrown by the parse() and stringify() functions are caught and reported as read or write errors.

The null value that is used to represent the content of a non-existing file (see "Simple reading and writing", above) is not passed through the parse() and stringify() functions.

Binary files

By default the content of the file is assumed to be text encoded as UTF-8 and it can not contain zero bytes. The content is represented as a JavaScript string with read(), replace(), etc. By setting the binary option to true when creating the proxy, no assumptions are placed on the content, and it is represented as a Uint8Array in JavaScript.

Atomic modifications

Use modify() to modify the content of the file safely. A call to modify() will read the content of the file, call callback on the content, and then replace the content of the file with the return value of the callback.

The modify() method uses the read() and replace() methods internally in the obvious way. Thus, the syntax.parse() and syntax.stringify() options work as expected, null represents a non-existing file, and the watch callbacks are fired.

It will do this one or more times, until no other conflicting changes have been made to the file between reading and replacing it.

The callback is called like this

new_content = callback (old_content)

The callback is allowed to mutate old_content, but note that this will also mutate the objects that are passed to the watch callbacks. Returning undefined from the proxy is the same as returning old_content.

The modify() method returns a Promise.

The promise will be resolved with the new content and its tag, like so

function shout(old_content) {
    return old_content.toUpperCase();
}

cockpit.file("/path/to/file").modify(shout)
    .then((content, tag) => {
        ...
    })
    .catch(error => {
        ...
    });

If you have cached the last content and tag results of the read() or modify() method, or the last values passed to a watch callback, you can pass them to modify() as the second and third argument. In this case, modify() will skip the initial read and start with the given values.

Change notifications

Calling watch() will start monitoring the file for external changes.

handle = file.watch(callback);

handle_no_read = file.watch(callback, { read: false });

Whenever a change occurs, the callback() is called with the new content and tag of the file. This might happen because of external changes, but also as part of calls to read(), replace(), and modify().

When a read error occurs, the callback() is called with an error as a third argument. Write errors are not reported via the watch callback.

Calling watch() will also automatically call read() to get the initial content of the file. Thus, you normally don’t need to call read() at all when using watch().

To disable the automatic reading, e.g. for large files or unreadable file system objects, set the read option to false. The first content argument of the callback will then always be null.

To free the resources used for monitoring, call handle.remove().

file.path

A string containing the path that was passed to the cockpit.file() method.

Closing

Call the close() method on a file proxy to cancel all ongoing operations, such as reading, writing, and monitoring. The proxy should not be used after closing it.

cockpit.js: HTTP Client

Cockpit allows access to local HTTP and REST services via this API.

cockpit.http()
http = cockpit.http(endpoint, [options])
http = cockpit.http(options)

Create a new HTTP client. The endpoint can be a file path starting with / to connect to a unix socket, or it can be a port number to connect to. The optional options argument is a javascript plain object, and may include:

"address"

Connect to an address other than localhost. Must be a valid host name or IP address. To use this option you also must provide a port number.

"port"

Port number to use with "address" option, when not given in endpoint.

"tls"

Object properties for an https connection. See http-stream2 TLS options.

"headers"

Additional HTTP headers to include with the HTTP request. This is a plain javascript object with each key as a header name, and each value as the header value.

"superuser"

Set to "require" to open this channel as root. If the currently logged in user is not permitted to become root (eg: via pkexec) then the channel will immediately be closed with a "access-denied" problem code. + Set to "try" to try to make the request as root, but if that fails, fall back to perform an unprivileged request.

"tls"

If set to a plain javascript object, then the connection will be an HTTPS connection and include TLS encryption. The fields of the tls object declare various TLS configuration and data. All fields are optional: +

  • "authority": Certificate authority(s) to expect as signers of the server’s TLS certificate, represented as a plain javascript object. It should have either a "file" field containing a readable PEM file on the system containing authorities, or a "data" with PEM encoded certificate data.

  • "certificate": A client certificate to use, represented as a plain javascript object. It should have either a "file" field containing a readable PEM file on the system to use as a certificate, or a "data" with PEM encoded certificate data.

  • "key": A client key to use, represented as a plain javascript object. It should have either a "file" field containing a readable PEM file on the system to use as a key, or a "data" with PEM encoded key data.

  • "validate": A boolean that describes whether to validate the server’s TLS certificate or not. By default local connections are not validated, and remote connections are validated.

Here is a somewhat complex example of using most of the above options when when calling cockpit.http():

http = cockpit.http({
    "address": "localhost",
    "headers": {
        "Authorization": "Basic dXNlcjpwYXNzd29yZA=="
    },
    "port": 443,
    "tls": {
        "validate": true,
        "authority": {
            "file": "/etc/pki/tls/certs/ca-bundle.crt",
        },
        "certificate": {
            "data": "-----BEGIN CERTIFICATE-----\nMIIDsDCCA..."
        },
        "key": {
            "data": "-----BEGIN RSA PRIVATE KEY-----\nMIIEogIBA..."
        }
    }
});
http.get()
request = http.get(path, [params, [headers]])

Perform an HTTP GET request for the given path. If the params is specified it should be a plain javascript object, which will be turned into a query string.

Optionally a plain javascript object containing headers can be included in the headers argument.

The return value is a Promise that will complete if the request happens successfully, or fail if there’s a problem.

http.post()
request = http.post(path, body, [headers])

Perform an HTTP POST request for the given path. The body can be a string, or a javascript plain object, which will be encoded as JSON data. If body is undefined or null then an empty HTTP body will be sent.

Optionally a plain javascript object containing headers can be included in the headers argument.

The return value is a Promise that will complete if the request happens successfully, or fail if there’s a problem.

http.request()
request = http.request(options)

Perform an HTTP request. The options can contain the following:

"body"

The HTTP request body. If you do not specify a body, then you must call request.input() to complete the body and allow the request to start.

"headers"

A javascript plain object containing HTTP headers.

"method"

The HTTP method. Defaults to "GET".

"params"

A javascript plain object containing query string parameters.

"path"

The HTTP path. Defaults to /.

The return value is a Promise that will complete if the request happens successfully, or fail if there’s a problem.

request.then()
request.then(data => { ... })

This is a standard Promise method. It sets up a handler to be called when the request finishes successfully.

The data argument contains the body result of the request. If it a string, unless the process was opened in binary mode, in which case the data is an array of bytes. If a request.stream() handler is set up, then any standard output data consumed by the handler will not be included in the data argument.

request.catch()
request.catch((exception[, data]) => { ... })

This is a standard Promise method. It sets up a handler to be called when the request fails, or returns an error code.

The exception object passed to the handler can have the following fields:

problem

A problem code string when a problem occurred starting or communicating with the server. This is null if the process exited or was terminated.

status

The numeric status of the response. This is null if no response was received.

reason

A string reason returned in the response. This is null if no response was received.

message

A string message returned in the response. This is null if no response was received.

If the request returned a response body, it will be available in the data argument. Otherwise this argument will be undefined.

request.response()
request.response((status, headers) => { ... })

This sets up a handler to be called when the HTTP request gets the initial response from the server. The status argument is the HTTP status integer, and the headers is a plain javascript object containing the headers of the response.

request.stream()
request.stream(data => { ... })

This sets up a handler to be called when the request returns output data. The handler will be called multiple times.

Only one handler may be registered at a time. Registering an additional handler replaces the previous one. The handler receives either string data or an array of binary bytes as its argument. A stream handler may return a number, which indicates the number of characters or bytes consumed from data. Any data not consumed will be included again the next time the handler is called.

If a request.stream() handler is set up, then the request.then() handlers will only get any remaining data not consumed by the stream handler.

request.input()
request.input(data, [stream])

This method writes data to the HTTP request body. It is only valid if no "body" has been specified in http.request() options. If stream is true then this function can be called again to provide further data.

request.close()
request.close([problem])

Cancel the request. If problem is specified it should be a standard problem code string.

http.close()
http.close([problem])

Cancel all outstanding requests with the given problem code. This is useful when you know that the server is going down soon.

cockpit.js: Localization

Cockpit provides a gettext() like API for easy translation of strings.

cockpit.language

The current locale language code. This is set based on the cockpit.locale() data loaded.

cockpit.locale()
cockpit.locale(po)

Load locale information for a given po data. The data should be JSON data in the po2json format. The data will be loaded globally. If po data has already been loaded, then this will extend that loaded data with additional strings. Any identical translations strings will be replaced with the new strings. A null argument clears all the locale information previously loaded.

Various methods such as cockpit.gettext() make use of the loaded data.

cockpit.gettext()
translated = cockpit.gettext([context], string)
var _ = cockpit.gettext
var C_ = cockpit.gettext
translated = _("string")
translated = C_("context", "string")

Lookup string for translation in the loaded locale data. The translated string will be returned, or string will be returned if no such translated string is present. The context argument is an optional string used to qualify the string.

This function can be assigned to a variable called _ (underscore) which will make your code work with the typical _("string") syntax.

cockpit.noop()
var N_ = cockpit.noop
var NC_ = cockpit.noop

A noop function suitable for assigning to N_ or NC_ so that gettext scanners will be able to find translatable strings. More specifically this function returns its last argument.

cockpit.ngettext()
translated = cockpit.ngettext([context], string1, stringN, number)

Lookup a string appropriate for a pluralization form of the number. Various languages have complex pluralization forms that go far between the singular and plural forms speakers of English are familiar with. If no such translated string is found then either one of string1 or stringN is returned according to simple pluralization rules.

The context argument is an optional string used to qualify the string.

cockpit.translate()
cockpit.translate()
cockpit.translate(element, ...)
cockpit.translate(selection)

The document will be scanned for translate tags and they will be translated according to the strings in loaded locale data. One or more element arguments may be specified. These are DOM elements for specific parts of the document to be translated. If no element is specified then the entire document is translated.

If an array or array-like object is passed as a selection then all DOM elements in the array will be treated as parts of the document to be translated.

cockpit.js: Page Location and Jumping

Page location and navigation between components

Page location
location = cockpit.location
cockpit.location = "/path"

Cockpit components often have different views, without changing the HTML file that is being viewed. These are known as pages. cockpit.location is an object that can be used to read the current page and to navigate to a different page location. It works by updating window.location.hash.

The cockpit.location looks like a HTTP path with a possible query string:

/path/sub/page?option=value,option2

The location.path and location.options contain a parsed form of the location. While the location cannot be modified in place, a new one can be created by assigning a string to cockpit.location or by calling the location.go() function.

cockpit.location is designed similarly to window.location in that the location object is preplaced whenever the current page location changes. To be aware of when the page location changes listen for the cockpit.onlocationchanged event.

Using the location object as a string will result in the location.href.

location.href

The string representation of this page location, including any options.

location.path

An array of path segments, parsed and decoded appropriately. An empty array denotes the root path.

location.options

A javascript object containing the various options present in the location.

If an option appears more than once, its value will be an array.

location.go()
location.go(path, [options])

Changes the current location to the given path and options. If the path argument is a string, it will be parsed into a path. If it is a relative path, then the result will be relative to the current location.path. If the path argument is an array of path segments, it will be treated as a full parsed absolute path.

Any options found in a path will be added to those in the optional options argument, and used in the result.

The location change will only take effect if the location has not changed in the meantime. This can be to good effect by saving a cockpit.location object and doing a conditional navigation, by calling the saved location.go() method later. This will only navigate if the user or other code has not navigated in the meantime.

location.replace()
location.replace(path, [options])

Similar to location.go() except the location change will not result in a navigation change in the browser’s history.

location.decode()
path = location.decode(href, [options])

Decode a cockpit href into its path array. If the options argument is specified, then it will be populated with options found in the href.

If href is a relative path it will be resolved relative to location.href.

location.encode()
href = location.encode(path, [options])

Encode the given path and options into a cockpit href. The path argument may be an array of path segments, or a string path. If a relative path is passed, it will be resolved relative to location.href.

cockpit.onlocationchanged
cockpit.addEventListener("locationchanged", function() { ... })

An event emitted when over the cockpit.location changes. Typically a component reacts to this event by updating its interface to reflect the new cockpit.location.path and cockpit.location.options.

This event is not triggered immediately during a location.go() or similar call. It will be triggered asynchronously at a later time.

Jumping between components
cockpit.jump("/system/log")

In Cockpit in there multiple components shown. In order to tell Cockpit to jump to and show another component and a certain location within that component, use the cockpit.jump() function. Stable component paths are documented. Don’t assume you can navigate into paths that are not stable API.

cockpit.jump()
cockpit.jump(path, [ host ])

Ask Cockpit to jump to another component. The location of the current component will not be affected. The path argument can be a string path, starting with / or an array containing the parts of a path that will be joined to create a path. If host is not specified, then the component on the same host as the caller will be displayed. If host is null, then the host portion of the path will be removed, displaying the component on the host that cockpit is connected directly to.

If the calling component is not running within Cockpit, or the calling component is not currently displayed, then the jump will not happen, and this function has no effect.

cockpit.hidden

A boolean property that indicates if the current component page is visible or hidden. When the code or user jumps to another component, the prior one remains loaded and initialized but is hidden. Use this property together with the cockpit.onvisibilitychange event to decide whether or not to perform expensive tasks to update the interface.

This property is analogous to the document.hidden page visibility API, but works with the document and frame implementation of Cockpit.

cockpit.onvisibilitychange
cockpit.onvisibilitychange = function() { ... }

This event is emitted when the cockpit.hidden property changes. This event is similar to the document.onvisibilitychange API, but works with the document and frame implementation of Cockpit.

cockpit.js: User Session

User information and login session state

cockpit.logout()
cockpit.logout([reload])

Logout of Cockpit. Unless reload is false this will also cause the page to be reloaded, so that the user can see the logged out state.

cockpit.user()
var promise = cockpit.user();
promise.then(user => { ... });

This object contains information about the user that’s currently logged into cockpit. The following fields are defined:

"id"

This is unix user id.

"gid"

This is unix user group id.

"name"

This is the unix user name like "root".

"full_name"

This is a readable name for the user.

"groups"

This is an array of group names to which the user belongs. Since version 318, the first item in this list is the primary group.

"home"

This is user’s home directory.

"shell"

This is unix user shell.

Returns a promise that completes once the user information is available.

Warning

cockpit.user() is soft-deprecated since Cockpit 336, if your page does not need to maintain compatibility with older Cockpit versions you can usecockpit.info to obtain the user information.

Permission lookup

Cockpit provides a mechanism for checking if the current user satisfies a given criteria. This is meant for updating UI elements based on what actions the user can perform. It is not an access control mechanism.

cockpit.permission()
permission = cockpit.permission([options])

Create a new permission object to check if the current user has a particular permission specified by options:

admin: true

True if the session has superuser privileges, i.e. can run channels as root with { superuser: "require" }.

group: name

True if the currently logged user is a member of group name.

The permission result is always true for the "root" user. When options is not given, check if the current user is root.

permission.allowed

A boolean value which indicates if the permission is allowed or not. This will be null if the permission is unknown, or there was an error checking the permission or the permission data has not yet loaded. This property will update asynchronously and if you wish to be notified of changes connect to the permission.onchanged event.

permission.onchanged
permission.addEventListener("changed", function() { ... })

This event is fired when the permission changes. In particular the permission.allowed property.

permission.close()
permission.close()

Closes the permission object and tears down any registered callbacks and dbus subscriptions.

cockpit.js: Manifests

Loading Manifests

For a convenient access to all page manifests, include <script src="../manifests.js"></script> into your page to register the manifests at the cockpit.manifests global variable.

You can also load ../manifests.json directly in your page, with fetch().

cockpit.js: Metrics

Metrics about the system can be retrieved from several sources using cockpit.metrics() metrics channels. The metrics are made available as series data, and can be used with the cockpit.series() and cockpit.grid() facilities.

cockpit.metrics()
metrics = cockpit.metrics(interval, options, cache)

Opens a new metrics channel. The data retrieved will be available in the metrics.series series sink, and can be used together with cockpit.grid() objects.

The interval is in milliseconds, and is the granularity of the series data retrieved. Any grids consuming the data must have the same interval.

The cache argument is a cache identifier. If specified, then this metrics channel will share data with other metrics channels of the same identifier. Make sure to use a globally unique string.

The options argument is either a javascript plain object, or an array of those. Each object can have the following fields.

"metrics"

An array of full metric descriptions, as javascript objects. The specifics of these, and how to determine which ones to use, can unfortunately only be found in the low-level protocol documentation. This option is required.

"source"

The source to use for real-time data. This is used by the follow method, see below. Set to "internal" to retrieve internal metrics read by the bridge. If set to "direct" or "pmcd" then data will be retrieved from PCPif it is available. The default is "internal".

"archive_source"

The source to use for retrieving historical data. This is used by the fetch method, see below. Set to "pcp-archive" to retrieve data from PCP archives. The default is not to try to retrieve historical data.

When the options argument is an array of javascript objects, then the metrics channel tries to use them in order until one succeeds. This way, you can prefer PCP as the source but fall back to internal metrics when PCP is not available, for example. The channel gives no indication which of the options has been used, and fetch and follow might use different entries from the list.

metrics.fetch()
metrics.fetch(beg, end)

Retrieve archived metrics data between beg and end. The arguments can either be numbers, in which case they are interval based offsets, or they can be javascript Date objects.

metrics.follow()
metrics.follow()

Start retrieving live metrics data as it become available.

metrics.close()
metrics.close()

Stop the retrieval of metrics and release resources.

metrics.series

The series sink where data retrieved data will be processed.

metrics.meta

The metrics meta data last received.

metrics.onchanged
metrics.onchanged = function() { }

An event triggered when one of the properties on this metrics object changes.

cockpit.js: Series Data

Series data consists of values along a continuous (usually time) axis. We can place these in grids which expose a distinct subset of these values. These are the underlying mechanism for displaying metrics data in graphs.

cockpit.grid()
grid = cockpit.grid(interval, [beg, end])

Creates a grid object to contain series data.

The interval is the granularity of the grid. Usually this is a number of milliseconds, when used with time series data. The beg and end are the bounds of the grid. If omitted they will be set to zero for an initially empty grid.

If beg and/or end are negative (including negative zero) then they are interpreted in number of intervals relative to the current time. Thus cockpit.grid(1000, -300, -0) will create a grid for the most recent 5 minutes.

grid.add()
row = grid.add(series, path)
row = grid.add(callback, [early])
row = grid.add()

Adds a row to the grid. The returned row is a Javascript array that will contain series data. The arguments control how the row is populated from the series data. The row is a sparse array. Its row.length will not match the expected size of the grid, unless and until the row has been completely filled in. The first index of the row will contain the data from the series data at the grid.beg offset.

When no arguments are passed, an empty row is added, and it is not populated with data.

When called with a series and path argument then the row will be populated directly with series data. The series can either be a series object or an object that has an obj.series property. The series interval must match the interval of this grid. If path is missing or empty, then the series data is placed into the row directly. Otherwise path indicates which part of the series data to place in the row. When path is an array, it is used as a set of property names or array indexes to follow into nested series data. When path is a dotted string, it is split and used the same way to locate the correct value in nested series data. The exact format of the series data depends on its producer, and relevant paths will be documented there.

If a callback function is specified, then it will be invoked to provide series data for the row. The function is invoked as callback(row, index, count), where the row is the row to fill in, the index is the index to start filling in and count is the number of items to fill in. The this variable will be set to the grid while invoking the callback. The callback is called after other data rows for a given series have been filled in. Callbacks are called in the order added, unless the early argument is set to true, in which case the callback is called earlier than callbacks without the early argument set.

To remove the row use the grid.remove() method.

The row will start being populated with data when the series produces data. To make this happen right away, use the grid.sync() method.

grid.remove()
grid.remove(row)

Remove a previously added row from the grid. The row will no longer be updated with series data.

grid.sync()
grid.sync()

Load or reload data from the series into the rows. This does not clear the rows before populating them. Some data may be populated immediately, others may have to wait until data can be loaded. Internally this function calls series.load() for each series.

All rows with callbacks will be invoked to regenerate all the data. The grid.onnotify event will be triggered. It is not necessary to call this function after a call of the grid.move() method.

grid.move()
grid.move(beg[, end])

Move the grid to new beg and end range. Data will be discarded from the rows and grid.sync() will be called to load or reload series data for the new range of offsets.

If end is not specified it will be set to beg. If beg and/or end are negative (including negative zero) then they will be set to the number of intervals prior to the current time taken as an interval.

If beg and/or end are negative (including negative zero) then they are interpreted in number of intervals relative to the current time. Thus cockpit.grid(1000, -300, -0) will create a grid for the most recent 5 minutes.

grid.walk()
grid.walk()

Move the grid forward every grid.interval milliseconds. To stop moving forward, call grid.move().

grid.notify()
grid.notify(index, count)

This function is called to have rows with callbacks recalculate their data. It is not normally necessary to call this function, as it will be invoked automatically when new series data is available or has been loaded. This function triggers the grid.onnotify event.

grid.onnotify
grid.addEventListener("notify", function(index, count) { ... });

An event that is triggered when some part of the series data in grid changes. The index is the row index where things changed, and the count is the length of the data that changed.

grid.close()
grid.close()

Close the grid, and stop updating the rows.

grid.interval

The granularity of the grid. For time series data this is an interval in milliseconds. In order to use a given grid and series together, their interval properties must match.

grid.beg

The beginning offset of the series data in the grid. Do not set this property directly. Use the grid.move() method instead.

grid.end

The ending offset of the series data in the grid. Do not set this property directly. Use the grid.move() method instead.

cockpit.series()
series = cockpit.series(interval, [cache, fetch])

Create a new sink of series data. This is usually done by producers of series data, and it is rare to invoke this function directly.

The interval is the granularity of the series data. For time series data this is an interval in milliseconds. If a cache string is specified, series data will be cached across frames for series with the same cache cache identifier to load and/or reload.

If a fetch callback is specified, then it will be invoked when grids request certain ranges of data. The fetch callback is invoked with function fetch(beg, end) { ... } range offsets. The series.input() should be called with data retrieved, either immediately or at a later time. The callback may be called multiple times for the same ranges of data. It is up to the callback to determine when or whether it should retrieve the data more than once.

A producer of series data, usually calls this function and creates itself a obj.series property containing this series object.

series.input()
series.input(beg, items[, mapping])

Send series data into the series sink. Any grids that have added rows based on this series, will have data filled in. The beg is the beginning offset of items. The items are an array one or more series data items.

Producers may wish to provide additional properties that can be used in lookup paths that rows can pull from. This is done in the mapping argument. If specified it is a tree of objects. Each sub object should have a property with the name "" empty string, which will be used as the property name or index in place of the one used in the lookup path.

series.load()
series.load(beg, end)

Load data from the series into any grids that have rows based on this series data. Any cached data will be filled in immediately. Any data not cached, will be requested from the producer, if possible, and may arrive at a later time.

The beg and end denote the range of data to load.

series.interval

The granularity of the series. For time series data this is an interval in milliseconds. In order to use a given grid and series together, their interval properties must match.

series.limit

The maximum number of items to cache for loading and/or reloading. You can change this value to a different number. Having a number close to zero will break certain usage of grids, such as grid.walk().

cockpit.js: Spawning Processes

This is the API for spawning a process and receiving its output, as well as exit codes.

cockpit.spawn()
process = cockpit.spawn(args, [options])

Spawns a process on the system.

The args should be an array starting with the executable and containing all the arguments to pass on the command line. If args is a string then it is interpreted as an executable name. The optional options argument is a javascript plain object and can contain any of the following fields:

"binary"

If set to true then handle the input and output of the process as arrays of binary bytes.

"directory"

The directory to spawn the process in.

"err"

Controls where the standard error is sent. By default it is logged to the journal. If set to "out" it is included in with the output data. If set to "ignore" then the error output is discarded. If set to "message", then it will be returned as the error message. When the "pty" field is set, this field has no effect.

"environ"

An optional array that contains strings to be used as additional environment variables for the new process. These are "NAME=VALUE" strings.

"pty"

Launch the process in its own PTY terminal, and send/receive terminal input and output.

"batch"

Batch data coming from the process in blocks of at least this size. This is not a guarantee. After a short timeout the data will be sent even if the data doesn’t match the batch size. Defaults to zero.

"latency"

The timeout for flushing any cached data in milliseconds.

"superuser"

Set to "require" to spawn the process as root instead of the logged in user. If the currently logged in user is not permitted to become root (eg: via pkexec) then the client will immediately be closed with a "access-denied" problem code. + Set to "try" to try to run the process as root, but if that fails, fall back to an unprivileged process.

The spawned process is a promise that will complete if the process exits successfully, or fail if there’s a problem. Some additional methods besides the standard promise methods are documented below.

The standard output of the process is made available via the spawned process object. Any non-UTF8 output from the process will be coerced into textual form. It is highly recommended that only textual output be produced by the command. The standard error is logged to the journal.

cockpit.script()
process = cockpit.script(script, [args], [options])

Run a shell script on the system.

This function spawns a Bourne shell script process. The full text of the /bin/sh shell script should be passed in as the first argument. The args can be an array of arguments, not including the executable, which are passed to the script as $1, $2 and so on. Shebang options are not used or respected.

The options is an optional javascript plain object and can include any of the fields listed for the cockpit.spawn() function.

The spawned process is a promise that will complete if the script exits successfully, or fail if there’s a problem. Some additional methods besides the standard promise methods are documented below.

The standard output of the process is made available via the spawned process object. Any non-UTF8 output from the process will be coerced into textual form. It is highly recommended that only textual output be produced by the command. The standard error is logged to the journal by default.

process.then()
process.then((data[, message]) => { ... })

This is a standard promise method. It sets up a handler to be called when the process finishes successfully.

The data argument contains the standard output of the process. If it a string, unless the process was opened in binary mode, in which case the data is an array of bytes. If a process.stream() handler is set up, then any standard output data consumed by the handler will not be included in the data argument.

If the process was spawned with the "err" option set to "message" then the second argument will contain the standard error output of the process.

process.catch()
process.catch((exception[, data]) => { ... })

This is a standard Promise method. It sets up a handler to be called when the process fails, terminates or exits.

The exception object passed to the handler can have the following fields:

message

A message describing the exception. If the process was spawned with the "err" option set to "message" then the second argument will contain the standard error output of the process.

problem

A problem code string when a problem occurred starting or communicating with the process. This is null if the process exited or was terminated.

exit_status

The numeric exit status of the process. This is null if the process did not exit.

exit_signal

A string representing a unix signal that caused the process to terminate. This is null if the process did not terminate because of a signal.

If the process actually ran and produced output before failing, it will be available in the data argument. Otherwise this argument will be undefined.

process.stream()
process.stream(data => { ... })

This sets up a handler to be called when the process has standard output. The handler will be called multiple times. The handler will be called regardless of whether the process ends up exiting successfully or not.

Only one handler may be registered at a time. Registering an additional handler replaces the previous one. The handler receives either string data or an array of binary bytes as its argument. A stream handler may return a number, which indicates the number of characters or bytes consumed from data. Any data not consumed will be included again the next time the handler is called.

If a process.stream() handler is set up, then the process.then() handlers will only get any remaining data not consumed by the stream handler.

process.input()
process.input(data, [stream])

This method writes data to the standard input of the process. If data is null or undefined it is not sent. The data should be a string or an array of bytes if the process was opened in binary mode.

If stream is set to true then this function may be called again with further input. Otherwise the standard input of the process is closed.

process.close()
process.close([problem])

Close the process by closing its standard input and output. If problem is specified it should be a standard problem code string. In this case the process will be terminated with a signal.

cockpit.js: Utilities

Various utility functions

cockpit.format()
string = cockpit.format(template, args)
string = cockpit.format(template, [arg, ...])

Format a string interpolating args into template using shell like syntax. The args may be either an array or javascript object. The template can contain fields that look like $name or ${name} or $0. Numeric fields are used with array args and start at zero.

In the second form, multiple arg arguments may be passed directly, and interpolated as as numeric fields in the template.

All falsy arguments except the numbers 0 and `0.0`are replaced by an empty string.

cockpit.format_number()
string = cockpit.format_number(number, [precision])

Formats number into a displayable string. If the number is not an integer, it is rounded to the given number of decimal places, defaulting to 3. If the number is near zero, but not quite zero it is rounded to the smallest non-zero value of the given precision; i.e. ±0.001 for default precision 3.

If number is null or undefined an empty string will be returned.

cockpit.format_bytes()
string = cockpit.format_bytes(number, [options])

Formats number into a displayable string with a suffix, such as kB or MB.

By default, SI units are used. IEC units (1024-based) can be requested by including base2: true in options.

By default, non-integer numbers will be formatted with 3 digits of precision. This can be changed with options.precision.

If number is null or undefined an empty string will be returned.

cockpit.format_bytes_per_sec()
string = cockpit.format_bytes_per_sec(number, [options])

Format number of bytes into a displayable speed string.

This function is mostly equivalent to cockpit.format_bytes() but the returned value contains a unit like kB/s or MB/s.

cockpit.format_bits_per_sec()
string = cockpit.format_bits_per_sec(number, [options])

Format number of bits into a displayable speed string.

This function is mostly equivalent to cockpit.format_bytes() but the returned value contains a unit like kbps or Mbps.

This function does not support IEC units. base2 may not be passed as part of options.

cockpit.init()
await cockpit.init();

cockpit.init().then(() => { ... });

Requests initialization of the Cockpit client library. This will ensure that the transport is connected and we are ready to create channels. It also populates the cockpit.info field.

This function returns a promise. Initialization isn’t complete until the promise has resolved. You can either await it or call .then() on it.

cockpit.info
cockpit.info.channels[payload]

cockpit.info.os_release[field]

cockpit.info.user

cockpit.info.ws.version

This object contains information about Cockpit itself. It is only available after cockpit.init() has been called and awaited.

channels

This is a mapping of channel payload types (keys, strings) supported by the bridge to capabilities advertised by those channels (values, lists of strings). Channels are listed even if they don’t advertise any capabilities, making this useful as a way to determine which channel types are supported by the bridge.

os_release

This is the data from the /etc/os-release or /usr/lib/os-release on the system that the bridge is running on. It is a mapping from the key names to their values. See the os-release Specification for information about the available keys.

user

Contains information about the user we’re logged in as.

uid

This is unix user id as an integer.

gid

This is unix user group id as an integer.

name

This is the unix user name like "root".

fullname

This is a readable name for the user, from the GECOS field.

group

This is the primary group name of the user.

groups

This is an array of group names to which the user belongs. The first item in this list is the primary group.

home

This is user’s home directory.

shell

This is unix user shell.

ws

Contains information about the webserver Cockpit is being served with.

version

The version of the webserver.

cockpit.event_target
cockpit.event_target(object, [handlers])

Adds an EventTarget implementation to the object. Optionally store the handlers in handlers if its specified.

API: shell

This package contains the shell that loads other components.

index.html

<iframe src="http://127.0.0.1:9090/cockpit+app/@localhost/shell/index.html"
    width="600" height="400"></iframe>

This is a Cockpit component that provides an interface to configure a single machine. It loads other components on demand to make that happen.

Component URL

/cockpit+app/@localhost/shell/index.html

API: system

This package contains general components for basic control of a system.

logs.html

System log component

Description
<iframe src="http://127.0.0.1:9090/cockpit+app/@localhost/system/logs.html"
    width="600" height="400"></iframe>

This is a Cockpit component that brings up system log viewer, with filtering capabilities. On systemd based systems this displays the entries from journal.

Component URL

/cockpit+app/@localhost/system/logs.html

Filter by priority

#?prio=notice

Filters the log to show entries below the specific priority, inclusive. These priorities are syslog level keywords. Specifying * as a priority will show all available entries. The default priority is err.

Filter by service

#?service=sshd.service

Filters the log to show entries related to the specific service. The format of the service is specific to the logging implementation. For journald these are systemd service unit names.

Filter by tag

#?tag=kernel

Filters the log to show entries related to the specific syslog identifier.

Filter by message

#?grep=

Filters the log to show entries where the MESSAGE= field matches the specified regular expression. PERL-compatible regular expressions are used. If the pattern is all lowercase, matching is case insensitive. Otherwise, matching is case sensitive.

Filter by any field

#?FIELD=VALUE

A field is referring to the components of a structured journal entry. The match must be exact. Value can be comma separated list in which case they are automatically matched as alternatives.

Start at point

#?start=boot

Filters the log to show entries after the specific point in time. Valid values are boot (since last boot), last-24h (last 24 hours), last-week (last seven days) and previous-boot (previous boot).

Follow the journal

#?follow=true

Keep listening on new entries. Valid values are true (follow) and false (do not follow).

Show log entry

#/6e272d82993c4e0d...

To show a specific log entry, put the log entry cursor in a path after the hash above. Note that cursors are logging system specific, and journal cursors are subject to change.

terminal.html

Server terminal component

Description
<iframe src="http://127.0.0.1:9090/cockpit+app/@localhost/system/terminal.html"
    width="600" height="400"></iframe>

This is a Cockpit component that brings up a web-based terminal for the logged in user.

Component URL

/cockpit+app/@localhost/system/terminal.html