0
0
Fork 0
mirror of https://github.com/netdata/netdata.git synced 2025-04-28 14:42:31 +00:00
netdata_netdata/aclk/aclk_util.c
2023-07-06 15:46:48 +00:00

480 lines
14 KiB
C

// SPDX-License-Identifier: GPL-3.0-or-later
#include "aclk_util.h"
#include "aclk_proxy.h"
#include "daemon/common.h"
usec_t aclk_session_newarch = 0;
aclk_env_t *aclk_env = NULL;
int chart_batch_id;
aclk_encoding_type_t aclk_encoding_type_t_from_str(const char *str) {
if (!strcmp(str, "json")) {
return ACLK_ENC_JSON;
}
if (!strcmp(str, "proto")) {
return ACLK_ENC_PROTO;
}
return ACLK_ENC_UNKNOWN;
}
aclk_transport_type_t aclk_transport_type_t_from_str(const char *str) {
if (!strcmp(str, "MQTTv3")) {
return ACLK_TRP_MQTT_3_1_1;
}
if (!strcmp(str, "MQTTv5")) {
return ACLK_TRP_MQTT_5;
}
return ACLK_TRP_UNKNOWN;
}
void aclk_transport_desc_t_destroy(aclk_transport_desc_t *trp_desc) {
freez(trp_desc->endpoint);
}
void aclk_env_t_destroy(aclk_env_t *env) {
freez(env->auth_endpoint);
if (env->transports) {
for (size_t i = 0; i < env->transport_count; i++) {
if(env->transports[i]) {
aclk_transport_desc_t_destroy(env->transports[i]);
freez(env->transports[i]);
env->transports[i] = NULL;
}
}
freez(env->transports);
}
if (env->capabilities) {
for (size_t i = 0; i < env->capability_count; i++)
freez(env->capabilities[i]);
freez(env->capabilities);
}
}
int aclk_env_has_capa(const char *capa)
{
for (int i = 0; i < (int) aclk_env->capability_count; i++) {
if (!strcasecmp(capa, aclk_env->capabilities[i]))
return 1;
}
return 0;
}
#ifdef ACLK_LOG_CONVERSATION_DIR
volatile int aclk_conversation_log_counter = 0;
#endif
#define ACLK_TOPIC_PREFIX "/agent/"
struct aclk_topic {
enum aclk_topics topic_id;
// as received from cloud - we keep this for
// eventual topic list update when claim_id changes
char *topic_recvd;
// constructed topic
char *topic;
};
// This helps to cache finalized topics (assembled with claim_id)
// to not have to alloc or create buffer and construct topic every
// time message is sent as in old ACLK
static struct aclk_topic **aclk_topic_cache = NULL;
static size_t aclk_topic_cache_items = 0;
void free_topic_cache(void)
{
if (aclk_topic_cache) {
for (size_t i = 0; i < aclk_topic_cache_items; i++) {
freez(aclk_topic_cache[i]->topic);
freez(aclk_topic_cache[i]->topic_recvd);
freez(aclk_topic_cache[i]);
}
freez(aclk_topic_cache);
aclk_topic_cache = NULL;
aclk_topic_cache_items = 0;
}
}
#define JSON_TOPIC_KEY_TOPIC "topic"
#define JSON_TOPIC_KEY_NAME "name"
struct topic_name {
enum aclk_topics id;
// cloud name - how is it called
// in answer to /password endpoint
const char *name;
} topic_names[] = {
{ .id = ACLK_TOPICID_CHART, .name = "chart" },
{ .id = ACLK_TOPICID_ALARMS, .name = "alarms" },
{ .id = ACLK_TOPICID_METADATA, .name = "meta" },
{ .id = ACLK_TOPICID_COMMAND, .name = "inbox-cmd" },
{ .id = ACLK_TOPICID_AGENT_CONN, .name = "agent-connection" },
{ .id = ACLK_TOPICID_CMD_NG_V1, .name = "inbox-cmd-v1" },
{ .id = ACLK_TOPICID_CREATE_NODE, .name = "create-node-instance" },
{ .id = ACLK_TOPICID_NODE_CONN, .name = "node-instance-connection" },
{ .id = ACLK_TOPICID_CHART_DIMS, .name = "chart-and-dims-updated" },
{ .id = ACLK_TOPICID_CHART_CONFIGS_UPDATED, .name = "chart-configs-updated" },
{ .id = ACLK_TOPICID_CHART_RESET, .name = "reset-charts" },
{ .id = ACLK_TOPICID_RETENTION_UPDATED, .name = "chart-retention-updated" },
{ .id = ACLK_TOPICID_NODE_INFO, .name = "node-instance-info" },
{ .id = ACLK_TOPICID_ALARM_LOG, .name = "alarm-log-v2" },
{ .id = ACLK_TOPICID_ALARM_CHECKPOINT, .name = "alarm-checkpoint" },
{ .id = ACLK_TOPICID_ALARM_CONFIG, .name = "alarm-config" },
{ .id = ACLK_TOPICID_ALARM_SNAPSHOT, .name = "alarm-snapshot-v2" },
{ .id = ACLK_TOPICID_NODE_COLLECTORS, .name = "node-instance-collectors" },
{ .id = ACLK_TOPICID_CTXS_SNAPSHOT, .name = "contexts-snapshot" },
{ .id = ACLK_TOPICID_CTXS_UPDATED, .name = "contexts-updated" },
{ .id = ACLK_TOPICID_UNKNOWN, .name = NULL }
};
enum aclk_topics compulsory_topics[] = {
// TODO remove old topics once not needed anymore
ACLK_TOPICID_CHART, //TODO from legacy
ACLK_TOPICID_ALARMS, //TODO from legacy
ACLK_TOPICID_METADATA, //TODO from legacy
ACLK_TOPICID_COMMAND,
ACLK_TOPICID_AGENT_CONN,
ACLK_TOPICID_CMD_NG_V1,
ACLK_TOPICID_CREATE_NODE,
ACLK_TOPICID_NODE_CONN,
ACLK_TOPICID_CHART_DIMS,
ACLK_TOPICID_CHART_CONFIGS_UPDATED,
ACLK_TOPICID_CHART_RESET,
ACLK_TOPICID_RETENTION_UPDATED,
ACLK_TOPICID_NODE_INFO,
ACLK_TOPICID_ALARM_LOG,
ACLK_TOPICID_ALARM_CHECKPOINT,
ACLK_TOPICID_ALARM_CONFIG,
ACLK_TOPICID_ALARM_SNAPSHOT,
ACLK_TOPICID_NODE_COLLECTORS,
ACLK_TOPICID_CTXS_SNAPSHOT,
ACLK_TOPICID_CTXS_UPDATED,
ACLK_TOPICID_UNKNOWN
};
static enum aclk_topics topic_name_to_id(const char *name) {
struct topic_name *topic = topic_names;
while (topic->name) {
if (!strcmp(topic->name, name)) {
return topic->id;
}
topic++;
}
return ACLK_TOPICID_UNKNOWN;
}
static const char *topic_id_to_name(enum aclk_topics tid) {
struct topic_name *topic = topic_names;
while (topic->name) {
if (topic->id == tid)
return topic->name;
topic++;
}
return "unknown";
}
#define CLAIM_ID_REPLACE_TAG "#{claim_id}"
static void topic_generate_final(struct aclk_topic *t) {
char *dest;
char *replace_tag = strstr(t->topic_recvd, CLAIM_ID_REPLACE_TAG);
if (!replace_tag)
return;
rrdhost_aclk_state_lock(localhost);
if (unlikely(!localhost->aclk_state.claimed_id)) {
netdata_log_error("This should never be called if agent not claimed");
rrdhost_aclk_state_unlock(localhost);
return;
}
t->topic = mallocz(strlen(t->topic_recvd) + 1 - strlen(CLAIM_ID_REPLACE_TAG) + strlen(localhost->aclk_state.claimed_id));
memcpy(t->topic, t->topic_recvd, replace_tag - t->topic_recvd);
dest = t->topic + (replace_tag - t->topic_recvd);
memcpy(dest, localhost->aclk_state.claimed_id, strlen(localhost->aclk_state.claimed_id));
dest += strlen(localhost->aclk_state.claimed_id);
rrdhost_aclk_state_unlock(localhost);
replace_tag += strlen(CLAIM_ID_REPLACE_TAG);
strcpy(dest, replace_tag);
dest += strlen(replace_tag);
*dest = 0;
}
static int topic_cache_add_topic(struct json_object *json, struct aclk_topic *topic)
{
struct json_object_iterator it;
struct json_object_iterator itEnd;
it = json_object_iter_begin(json);
itEnd = json_object_iter_end(json);
while (!json_object_iter_equal(&it, &itEnd)) {
if (!strcmp(json_object_iter_peek_name(&it), JSON_TOPIC_KEY_NAME)) {
if (json_object_get_type(json_object_iter_peek_value(&it)) != json_type_string) {
netdata_log_error("topic dictionary key \"" JSON_TOPIC_KEY_NAME "\" is expected to be json_type_string");
return 1;
}
topic->topic_id = topic_name_to_id(json_object_get_string(json_object_iter_peek_value(&it)));
if (topic->topic_id == ACLK_TOPICID_UNKNOWN) {
debug(D_ACLK, "topic dictionary has unknown topic name \"%s\"", json_object_get_string(json_object_iter_peek_value(&it)));
}
json_object_iter_next(&it);
continue;
}
if (!strcmp(json_object_iter_peek_name(&it), JSON_TOPIC_KEY_TOPIC)) {
if (json_object_get_type(json_object_iter_peek_value(&it)) != json_type_string) {
netdata_log_error("topic dictionary key \"" JSON_TOPIC_KEY_TOPIC "\" is expected to be json_type_string");
return 1;
}
topic->topic_recvd = strdupz(json_object_get_string(json_object_iter_peek_value(&it)));
json_object_iter_next(&it);
continue;
}
netdata_log_error("topic dictionary has Unknown/Unexpected key \"%s\" in topic description. Ignoring!", json_object_iter_peek_name(&it));
json_object_iter_next(&it);
}
if (!topic->topic_recvd) {
netdata_log_error("topic dictionary Missig compulsory key %s", JSON_TOPIC_KEY_TOPIC);
return 1;
}
topic_generate_final(topic);
aclk_topic_cache_items++;
return 0;
}
int aclk_generate_topic_cache(struct json_object *json)
{
json_object *obj;
size_t array_size = json_object_array_length(json);
if (!array_size) {
netdata_log_error("Empty topic list!");
return 1;
}
if (aclk_topic_cache)
free_topic_cache();
aclk_topic_cache = callocz(array_size, sizeof(struct aclk_topic *));
for (size_t i = 0; i < array_size; i++) {
obj = json_object_array_get_idx(json, i);
if (json_object_get_type(obj) != json_type_object) {
netdata_log_error("expected json_type_object");
return 1;
}
aclk_topic_cache[i] = callocz(1, sizeof(struct aclk_topic));
if (topic_cache_add_topic(obj, aclk_topic_cache[i])) {
netdata_log_error("failed to parse topic @idx=%d", (int)i);
return 1;
}
}
for (int i = 0; compulsory_topics[i] != ACLK_TOPICID_UNKNOWN; i++) {
if (!aclk_get_topic(compulsory_topics[i])) {
netdata_log_error("missing compulsory topic \"%s\" in password response from cloud", topic_id_to_name(compulsory_topics[i]));
return 1;
}
}
return 0;
}
/*
* Build a topic based on sub_topic and final_topic
* if the sub topic starts with / assume that is an absolute topic
*
*/
const char *aclk_get_topic(enum aclk_topics topic)
{
if (!aclk_topic_cache) {
netdata_log_error("Topic cache not initialized");
return NULL;
}
for (size_t i = 0; i < aclk_topic_cache_items; i++) {
if (aclk_topic_cache[i]->topic_id == topic)
return aclk_topic_cache[i]->topic;
}
netdata_log_error("Unknown topic");
return NULL;
}
/*
* Allows iterating all topics in topic cache without
* having to resort to callbacks.
*/
const char *aclk_topic_cache_iterate(aclk_topic_cache_iter_t *iter)
{
if (!aclk_topic_cache) {
netdata_log_error("Topic cache not initialized when %s was called.", __FUNCTION__);
return NULL;
}
if (*iter >= aclk_topic_cache_items)
return NULL;
return aclk_topic_cache[(*iter)++]->topic;
}
/*
* TBEB with randomness
*
* @param reset 1 - to reset the delay,
* 0 - to advance a step and calculate sleep time in ms
* @param min, max in seconds
* @returns delay in ms
*
*/
unsigned long int aclk_tbeb_delay(int reset, int base, unsigned long int min, unsigned long int max) {
static int attempt = -1;
if (reset) {
attempt = -1;
return 0;
}
attempt++;
if (attempt == 0) {
srandom(time(NULL));
return 0;
}
unsigned long int delay = pow(base, attempt - 1);
delay *= MSEC_PER_SEC;
delay += (random() % (MAX(1000, delay/2)));
if (delay <= min * MSEC_PER_SEC)
return min;
if (delay >= max * MSEC_PER_SEC)
return max;
return delay;
}
static inline int aclk_parse_pair(const char *src, const char c, char **a, char **b)
{
const char *ptr = strchr(src, c);
if (ptr == NULL)
return 1;
// allow empty string
/* if (!*(ptr+1))
return 1;*/
*a = callocz(1, ptr - src + 1);
memcpy (*a, src, ptr - src);
*b = strdupz(ptr+1);
return 0;
}
#define HTTP_PROXY_PREFIX "http://"
void aclk_set_proxy(char **ohost, int *port, char **uname, char **pwd, enum mqtt_wss_proxy_type *type)
{
ACLK_PROXY_TYPE pt;
const char *ptr = aclk_get_proxy(&pt);
char *tmp;
if (pt != PROXY_TYPE_HTTP)
return;
*uname = NULL;
*pwd = NULL;
*port = 0;
char *proxy = strdupz(ptr);
ptr = proxy;
if (!strncmp(ptr, HTTP_PROXY_PREFIX, strlen(HTTP_PROXY_PREFIX)))
ptr += strlen(HTTP_PROXY_PREFIX);
if ((tmp = strchr(ptr, '@'))) {
*tmp = 0;
if(aclk_parse_pair(ptr, ':', uname, pwd)) {
error_report("Failed to get username and password for proxy. Will attempt connection without authentication");
}
ptr = tmp+1;
}
if (!*ptr) {
freez(proxy);
freez(*uname);
freez(*pwd);
return;
}
if ((tmp = strchr(ptr, ':'))) {
*tmp = 0;
tmp++;
if(*tmp)
*port = atoi(tmp);
}
*ohost = strdupz(ptr);
if (*port <= 0 || *port > 65535)
*port = 8080;
if (type)
*type = MQTT_WSS_PROXY_HTTP;
else {
freez(*uname);
freez(*pwd);
}
freez(proxy);
}
#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER < OPENSSL_VERSION_110
static EVP_ENCODE_CTX *EVP_ENCODE_CTX_new(void)
{
EVP_ENCODE_CTX *ctx = OPENSSL_malloc(sizeof(*ctx));
if (ctx != NULL) {
memset(ctx, 0, sizeof(*ctx));
}
return ctx;
}
static void EVP_ENCODE_CTX_free(EVP_ENCODE_CTX *ctx)
{
OPENSSL_free(ctx);
return;
}
#endif
int base64_encode_helper(unsigned char *out, int *outl, const unsigned char *in, int in_len)
{
int len;
unsigned char *str = out;
EVP_ENCODE_CTX *ctx = EVP_ENCODE_CTX_new();
EVP_EncodeInit(ctx);
EVP_EncodeUpdate(ctx, str, outl, in, in_len);
str += *outl;
EVP_EncodeFinal(ctx, str, &len);
*outl += len;
str = out;
while(*str) {
if (*str != 0x0D && *str != 0x0A)
*out++ = *str++;
else
str++;
}
*out = 0;
EVP_ENCODE_CTX_free(ctx);
return 0;
}