aclk_tx_msgs.c 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "aclk_tx_msgs.h"
  3. #include "daemon/common.h"
  4. #include "aclk_util.h"
  5. #include "aclk_stats.h"
  6. #include "aclk.h"
  7. #include "aclk_capas.h"
  8. #include "schema-wrappers/proto_2_json.h"
  9. #ifndef __GNUC__
  10. #pragma region aclk_tx_msgs helper functions
  11. #endif
  12. // version for aclk legacy (old cloud arch)
  13. #define ACLK_VERSION 2
  14. static void freez_aclk_publish5a(void *ptr) {
  15. freez(ptr);
  16. }
  17. static void freez_aclk_publish5b(void *ptr) {
  18. freez(ptr);
  19. }
  20. uint16_t aclk_send_bin_message_subtopic_pid(mqtt_wss_client client, char *msg, size_t msg_len, enum aclk_topics subtopic, const char *msgname)
  21. {
  22. #ifndef ACLK_LOG_CONVERSATION_DIR
  23. UNUSED(msgname);
  24. #endif
  25. uint16_t packet_id;
  26. const char *topic = aclk_get_topic(subtopic);
  27. if (unlikely(!topic)) {
  28. error("Couldn't get topic. Aborting message send.");
  29. return 0;
  30. }
  31. mqtt_wss_publish5(client, (char*)topic, NULL, msg, &freez_aclk_publish5a, msg_len, MQTT_WSS_PUB_QOS1, &packet_id);
  32. #ifdef NETDATA_INTERNAL_CHECKS
  33. aclk_stats_msg_published(packet_id);
  34. #endif
  35. if (aclklog_enabled) {
  36. char *json = protomsg_to_json(msg, msg_len, msgname);
  37. log_aclk_message_bin(json, strlen(json), 1, topic, msgname);
  38. freez(json);
  39. }
  40. return packet_id;
  41. }
  42. #define TOPIC_MAX_LEN 512
  43. #define V2_BIN_PAYLOAD_SEPARATOR "\x0D\x0A\x0D\x0A"
  44. static int aclk_send_message_with_bin_payload(mqtt_wss_client client, json_object *msg, const char *topic, const void *payload, size_t payload_len)
  45. {
  46. uint16_t packet_id;
  47. const char *str;
  48. char *full_msg = NULL;
  49. int len;
  50. if (unlikely(!topic || topic[0] != '/')) {
  51. error ("Full topic required!");
  52. json_object_put(msg);
  53. return HTTP_RESP_INTERNAL_SERVER_ERROR;
  54. }
  55. str = json_object_to_json_string_ext(msg, JSON_C_TO_STRING_PLAIN);
  56. len = strlen(str);
  57. size_t full_msg_len = len;
  58. if (payload_len)
  59. full_msg_len += strlen(V2_BIN_PAYLOAD_SEPARATOR) + payload_len;
  60. full_msg = mallocz(full_msg_len);
  61. memcpy(full_msg, str, len);
  62. json_object_put(msg);
  63. if (payload_len) {
  64. memcpy(&full_msg[len], V2_BIN_PAYLOAD_SEPARATOR, strlen(V2_BIN_PAYLOAD_SEPARATOR));
  65. len += strlen(V2_BIN_PAYLOAD_SEPARATOR);
  66. memcpy(&full_msg[len], payload, payload_len);
  67. }
  68. int rc = mqtt_wss_publish5(client, (char*)topic, NULL, full_msg, &freez_aclk_publish5b, full_msg_len, MQTT_WSS_PUB_QOS1, &packet_id);
  69. if (rc == MQTT_WSS_ERR_TOO_BIG_FOR_SERVER)
  70. return HTTP_RESP_FORBIDDEN;
  71. #ifdef NETDATA_INTERNAL_CHECKS
  72. aclk_stats_msg_published(packet_id);
  73. #endif
  74. return 0;
  75. }
  76. /*
  77. * Creates universal header common for all ACLK messages. User gets ownership of json object created.
  78. * Usually this is freed by send function after message has been sent.
  79. */
  80. static struct json_object *create_hdr(const char *type, const char *msg_id, time_t ts_secs, usec_t ts_us, int version)
  81. {
  82. uuid_t uuid;
  83. char uuid_str[36 + 1];
  84. json_object *tmp;
  85. json_object *obj = json_object_new_object();
  86. tmp = json_object_new_string(type);
  87. json_object_object_add(obj, "type", tmp);
  88. if (unlikely(!msg_id)) {
  89. uuid_generate(uuid);
  90. uuid_unparse(uuid, uuid_str);
  91. msg_id = uuid_str;
  92. }
  93. if (ts_secs == 0) {
  94. ts_us = now_realtime_usec();
  95. ts_secs = ts_us / USEC_PER_SEC;
  96. ts_us = ts_us % USEC_PER_SEC;
  97. }
  98. tmp = json_object_new_string(msg_id);
  99. json_object_object_add(obj, "msg-id", tmp);
  100. tmp = json_object_new_int64(ts_secs);
  101. json_object_object_add(obj, "timestamp", tmp);
  102. // TODO handle this somehow on older json-c
  103. // tmp = json_object_new_uint64(ts_us);
  104. // probably jso->_to_json_string -> custom function
  105. // jso->o.c_uint64 -> map this with pointer to signed int
  106. // commit that implements json_object_new_uint64 is 3c3b592
  107. // between 0.14 and 0.15
  108. tmp = json_object_new_int64(ts_us);
  109. json_object_object_add(obj, "timestamp-offset-usec", tmp);
  110. tmp = json_object_new_int64(aclk_session_sec);
  111. json_object_object_add(obj, "connect", tmp);
  112. // TODO handle this somehow see above
  113. // tmp = json_object_new_uint64(0 /* TODO aclk_session_us */);
  114. tmp = json_object_new_int64(aclk_session_us);
  115. json_object_object_add(obj, "connect-offset-usec", tmp);
  116. tmp = json_object_new_int(version);
  117. json_object_object_add(obj, "version", tmp);
  118. return obj;
  119. }
  120. #ifndef __GNUC__
  121. #pragma endregion
  122. #endif
  123. #ifndef __GNUC__
  124. #pragma region aclk_tx_msgs message generators
  125. #endif
  126. void aclk_http_msg_v2_err(mqtt_wss_client client, const char *topic, const char *msg_id, int http_code, int ec, const char* emsg, const char *payload, size_t payload_len)
  127. {
  128. json_object *tmp, *msg;
  129. msg = create_hdr("http", msg_id, 0, 0, 2);
  130. tmp = json_object_new_int(http_code);
  131. json_object_object_add(msg, "http-code", tmp);
  132. tmp = json_object_new_int(ec);
  133. json_object_object_add(msg, "error-code", tmp);
  134. tmp = json_object_new_string(emsg);
  135. json_object_object_add(msg, "error-description", tmp);
  136. if (aclk_send_message_with_bin_payload(client, msg, topic, payload, payload_len)) {
  137. error("Failed to send cancellation message for http reply %zu %s", payload_len, payload);
  138. }
  139. }
  140. int aclk_http_msg_v2(mqtt_wss_client client, const char *topic, const char *msg_id, usec_t t_exec, usec_t created, int http_code, const char *payload, size_t payload_len)
  141. {
  142. json_object *tmp, *msg;
  143. msg = create_hdr("http", msg_id, 0, 0, 2);
  144. tmp = json_object_new_int64(t_exec);
  145. json_object_object_add(msg, "t-exec", tmp);
  146. tmp = json_object_new_int64(created);
  147. json_object_object_add(msg, "t-rx", tmp);
  148. tmp = json_object_new_int(http_code);
  149. json_object_object_add(msg, "http-code", tmp);
  150. int rc = aclk_send_message_with_bin_payload(client, msg, topic, payload, payload_len);
  151. switch (rc) {
  152. case HTTP_RESP_FORBIDDEN:
  153. aclk_http_msg_v2_err(client, topic, msg_id, rc, CLOUD_EC_REQ_REPLY_TOO_BIG, CLOUD_EMSG_REQ_REPLY_TOO_BIG, NULL, 0);
  154. break;
  155. case HTTP_RESP_INTERNAL_SERVER_ERROR:
  156. aclk_http_msg_v2_err(client, topic, msg_id, rc, CLOUD_EC_FAIL_TOPIC, CLOUD_EMSG_FAIL_TOPIC, payload, payload_len);
  157. break;
  158. case HTTP_RESP_BACKEND_FETCH_FAILED:
  159. aclk_http_msg_v2_err(client, topic, msg_id, rc, CLOUD_EC_SND_TIMEOUT, CLOUD_EMSG_SND_TIMEOUT, payload, payload_len);
  160. break;
  161. }
  162. return rc ? rc : http_code;
  163. }
  164. uint16_t aclk_send_agent_connection_update(mqtt_wss_client client, int reachable) {
  165. size_t len;
  166. uint16_t pid;
  167. update_agent_connection_t conn = {
  168. .reachable = (reachable ? 1 : 0),
  169. .lwt = 0,
  170. .session_id = aclk_session_newarch,
  171. .capabilities = aclk_get_agent_capas()
  172. };
  173. rrdhost_aclk_state_lock(localhost);
  174. if (unlikely(!localhost->aclk_state.claimed_id)) {
  175. error("Internal error. Should not come here if not claimed");
  176. rrdhost_aclk_state_unlock(localhost);
  177. return 0;
  178. }
  179. if (localhost->aclk_state.prev_claimed_id)
  180. conn.claim_id = localhost->aclk_state.prev_claimed_id;
  181. else
  182. conn.claim_id = localhost->aclk_state.claimed_id;
  183. char *msg = generate_update_agent_connection(&len, &conn);
  184. rrdhost_aclk_state_unlock(localhost);
  185. if (!msg) {
  186. error("Error generating agent::v1::UpdateAgentConnection payload");
  187. return 0;
  188. }
  189. pid = aclk_send_bin_message_subtopic_pid(client, msg, len, ACLK_TOPICID_AGENT_CONN, "UpdateAgentConnection");
  190. if (localhost->aclk_state.prev_claimed_id) {
  191. freez(localhost->aclk_state.prev_claimed_id);
  192. localhost->aclk_state.prev_claimed_id = NULL;
  193. }
  194. return pid;
  195. }
  196. char *aclk_generate_lwt(size_t *size) {
  197. update_agent_connection_t conn = {
  198. .reachable = 0,
  199. .lwt = 1,
  200. .session_id = aclk_session_newarch,
  201. .capabilities = NULL
  202. };
  203. rrdhost_aclk_state_lock(localhost);
  204. if (unlikely(!localhost->aclk_state.claimed_id)) {
  205. error("Internal error. Should not come here if not claimed");
  206. rrdhost_aclk_state_unlock(localhost);
  207. return NULL;
  208. }
  209. conn.claim_id = localhost->aclk_state.claimed_id;
  210. char *msg = generate_update_agent_connection(size, &conn);
  211. rrdhost_aclk_state_unlock(localhost);
  212. if (!msg)
  213. error("Error generating agent::v1::UpdateAgentConnection payload for LWT");
  214. return msg;
  215. }
  216. #ifndef __GNUC__
  217. #pragma endregion
  218. #endif