icinga2/lib/remoting/endpointmanager.cpp

441 lines
12 KiB
C++
Raw Normal View History

/******************************************************************************
* Icinga 2 *
* Copyright (C) 2012 Icinga Development Team (http://www.icinga.org/) *
* *
* This program is free software; you can redistribute it and/or *
* modify it under the terms of the GNU General Public License *
* as published by the Free Software Foundation; either version 2 *
* of the License, or (at your option) any later version. *
* *
* This program is distributed in the hope that it will be useful, *
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
* GNU General Public License for more details. *
* *
* You should have received a copy of the GNU General Public License *
* along with this program; if not, write to the Free Software Foundation *
2012-05-11 13:33:57 +02:00
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA. *
******************************************************************************/
2012-09-10 14:07:32 +02:00
#include "i2-remoting.h"
using namespace icinga;
2012-06-21 12:51:50 +02:00
/**
* Constructor for the EndpointManager class.
*/
EndpointManager::EndpointManager(void)
: m_NextMessageID(0)
{
m_RequestTimer = boost::make_shared<Timer>();
m_RequestTimer->OnTimerExpired.connect(boost::bind(&EndpointManager::RequestTimerHandler, this));
m_RequestTimer->SetInterval(5);
m_RequestTimer->Start();
m_SubscriptionTimer = boost::make_shared<Timer>();
m_SubscriptionTimer->OnTimerExpired.connect(boost::bind(&EndpointManager::SubscriptionTimerHandler, this));
m_SubscriptionTimer->SetInterval(5);
m_SubscriptionTimer->Start();
m_ReconnectTimer = boost::make_shared<Timer>();
m_ReconnectTimer->OnTimerExpired.connect(boost::bind(&EndpointManager::ReconnectTimerHandler, this));
m_ReconnectTimer->SetInterval(5);
m_ReconnectTimer->Start();
2012-06-21 12:51:50 +02:00
}
2012-09-10 14:07:32 +02:00
/**
* Sets the SSL context.
*
* @param sslContext The new SSL context.
*/
void EndpointManager::SetSSLContext(const shared_ptr<SSL_CTX>& sslContext)
{
2013-03-02 09:07:47 +01:00
ObjectLock olock(this);
2012-09-10 14:07:32 +02:00
m_SSLContext = sslContext;
}
/**
* Retrieves the SSL context.
*
* @returns The SSL context.
*/
shared_ptr<SSL_CTX> EndpointManager::GetSSLContext(void) const
{
2013-03-02 09:07:47 +01:00
ObjectLock olock(this);
2012-09-10 14:07:32 +02:00
return m_SSLContext;
}
/**
* Sets the identity of the endpoint manager. This identity is used when
* connecting to remote peers.
*
* @param identity The new identity.
*/
void EndpointManager::SetIdentity(const String& identity)
2012-04-24 14:02:15 +02:00
{
2013-03-02 09:07:47 +01:00
ObjectLock olock(this);
m_Identity = identity;
if (m_Endpoint)
m_Endpoint->Unregister();
DynamicObject::Ptr object = DynamicObject::GetObject("Endpoint", identity);
if (object)
m_Endpoint = dynamic_pointer_cast<Endpoint>(object);
else
m_Endpoint = Endpoint::MakeEndpoint(identity, true, true);
2012-04-24 14:02:15 +02:00
}
/**
* Retrieves the identity for the endpoint manager.
*
* @returns The identity.
*/
String EndpointManager::GetIdentity(void) const
{
2013-03-02 09:07:47 +01:00
ObjectLock olock(this);
return m_Identity;
}
/**
* Creates a new JSON-RPC listener on the specified port.
*
2012-05-18 23:25:06 +02:00
* @param service The port to listen on.
*/
void EndpointManager::AddListener(const String& service)
{
2013-03-02 09:07:47 +01:00
ObjectLock olock(this);
shared_ptr<SSL_CTX> sslContext = m_SSLContext;
if (!sslContext)
BOOST_THROW_EXCEPTION(logic_error("SSL context is required for AddListener()"));
2012-04-26 21:33:23 +02:00
stringstream s;
2012-05-07 13:48:17 +02:00
s << "Adding new listener: port " << service;
2012-07-10 12:21:19 +02:00
Logger::Write(LogInformation, "icinga", s.str());
2012-11-22 12:04:32 +01:00
TcpSocket::Ptr server = boost::make_shared<TcpSocket>();
m_Servers.insert(server);
server->OnNewClient.connect(boost::bind(&EndpointManager::NewClientHandler,
2012-11-22 12:04:32 +01:00
this, _2, TlsRoleServer));
2012-05-07 13:48:17 +02:00
server->Bind(service, AF_INET6);
server->Listen();
server->Start();
}
/**
* Creates a new JSON-RPC client and connects to the specified host and port.
*
2012-05-18 23:25:06 +02:00
* @param node The remote host.
* @param service The remote port.
*/
void EndpointManager::AddConnection(const String& node, const String& service) {
2013-03-02 09:07:47 +01:00
ObjectLock olock(this);
shared_ptr<SSL_CTX> sslContext = m_SSLContext;
2012-09-10 14:07:32 +02:00
if (!sslContext)
BOOST_THROW_EXCEPTION(logic_error("SSL context is required for AddConnection()"));
2012-09-10 14:07:32 +02:00
2012-11-22 12:04:32 +01:00
TcpSocket::Ptr client = boost::make_shared<TcpSocket>();
client->Connect(node, service);
2012-11-22 12:04:32 +01:00
NewClientHandler(client, TlsRoleClient);
}
/**
* Processes a new client connection.
*
* @param client The new client.
*/
2012-11-22 12:04:32 +01:00
void EndpointManager::NewClientHandler(const Socket::Ptr& client, TlsRole role)
{
2013-03-02 09:07:47 +01:00
ObjectLock olock(this);
2012-11-22 12:04:32 +01:00
String peerAddress = client->GetPeerAddress();
TlsStream::Ptr tlsStream = boost::make_shared<TlsStream>(client, role, m_SSLContext);
2012-11-22 12:04:32 +01:00
tlsStream->Start();
2012-11-22 12:04:32 +01:00
m_PendingClients.insert(tlsStream);
tlsStream->OnConnected.connect(boost::bind(&EndpointManager::ClientConnectedHandler, this, _1, peerAddress));
tlsStream->OnClosed.connect(boost::bind(&EndpointManager::ClientClosedHandler, this, _1));
2012-11-22 12:04:32 +01:00
client->Start();
}
2012-11-22 12:04:32 +01:00
void EndpointManager::ClientConnectedHandler(const Stream::Ptr& client, const String& peerAddress)
{
2013-03-02 09:07:47 +01:00
ObjectLock olock(this);
2012-11-22 12:04:32 +01:00
TlsStream::Ptr tlsStream = static_pointer_cast<TlsStream>(client);
JsonRpcConnection::Ptr jclient = boost::make_shared<JsonRpcConnection>(tlsStream);
2012-11-22 12:04:32 +01:00
m_PendingClients.erase(tlsStream);
2012-11-22 12:04:32 +01:00
shared_ptr<X509> cert = tlsStream->GetPeerCertificate();
String identity = Utility::GetCertificateCN(cert);
2012-11-22 12:04:32 +01:00
Logger::Write(LogInformation, "icinga", "New client connection at " + peerAddress + " for identity '" + identity + "'");
2013-02-27 15:23:25 +01:00
Endpoint::Ptr endpoint = Endpoint::GetByName(identity);
2013-02-27 15:23:25 +01:00
if (!endpoint)
endpoint = Endpoint::MakeEndpoint(identity, true);
endpoint->SetClient(jclient);
}
void EndpointManager::ClientClosedHandler(const Stream::Ptr& client)
{
2013-03-02 09:07:47 +01:00
ObjectLock olock(this);
TlsStream::Ptr tlsStream = static_pointer_cast<TlsStream>(client);
m_PendingClients.erase(tlsStream);
}
/**
* Sends an anonymous unicast message to the specified recipient.
*
* @param recipient The recipient of the message.
* @param message The message.
*/
void EndpointManager::SendUnicastMessage(const Endpoint::Ptr& recipient,
const MessagePart& message)
{
SendUnicastMessage(Endpoint::Ptr(), recipient, message);
}
/**
* Sends a unicast message to the specified recipient.
*
* @param sender The sender of the message.
* @param recipient The recipient of the message.
* @param message The message.
*/
void EndpointManager::SendUnicastMessage(const Endpoint::Ptr& sender,
const Endpoint::Ptr& recipient, const MessagePart& message)
{
/* don't forward messages between non-local endpoints, assume that
* anonymous senders (sender == null) are local */
if ((sender && !sender->IsLocal()) && !recipient->IsLocal())
return;
if (ResponseMessage::IsResponseMessage(message))
recipient->ProcessResponse(sender, message);
else
recipient->ProcessRequest(sender, message);
}
/**
* Sends a message to exactly one recipient out of all recipients who have a
* subscription for the message's topic.
*
* @param sender The sender of the message.
* @param message The message.
*/
void EndpointManager::SendAnycastMessage(const Endpoint::Ptr& sender,
const RequestMessage& message)
{
String method;
if (!message.GetMethod(&method))
BOOST_THROW_EXCEPTION(invalid_argument("Message is missing the 'method' property."));
vector<Endpoint::Ptr> candidates;
2013-02-18 23:44:24 +01:00
BOOST_FOREACH(const DynamicObject::Ptr& object, DynamicType::GetObjects("Endpoint")) {
Endpoint::Ptr endpoint = dynamic_pointer_cast<Endpoint>(object);
2012-06-22 13:40:09 +02:00
/* don't forward messages between non-local endpoints */
if ((sender && !sender->IsLocal()) && !endpoint->IsLocal())
2012-06-22 13:40:09 +02:00
continue;
if (endpoint->HasSubscription(method))
candidates.push_back(endpoint);
}
2012-06-19 09:38:20 +02:00
if (candidates.empty())
return;
Endpoint::Ptr recipient = candidates[rand() % candidates.size()];
SendUnicastMessage(sender, recipient, message);
2012-04-16 16:27:41 +02:00
}
/**
* Sends an anonymous message to all recipients who have a subscription for the
* message#s topic.
*
* @param message The message.
*/
void EndpointManager::SendMulticastMessage(const RequestMessage& message)
{
SendMulticastMessage(Endpoint::Ptr(), message);
}
/**
* Sends a message to all recipients who have a subscription for the
* message's topic.
*
* @param sender The sender of the message.
* @param message The message.
*/
void EndpointManager::SendMulticastMessage(const Endpoint::Ptr& sender,
const RequestMessage& message)
2012-04-16 16:27:41 +02:00
{
String id;
if (message.GetID(&id))
BOOST_THROW_EXCEPTION(invalid_argument("Multicast requests must not have an ID."));
2012-04-16 16:27:41 +02:00
String method;
if (!message.GetMethod(&method))
BOOST_THROW_EXCEPTION(invalid_argument("Message is missing the 'method' property."));
2012-04-16 16:27:41 +02:00
2013-02-18 23:44:24 +01:00
BOOST_FOREACH(const DynamicObject::Ptr& object, DynamicType::GetObjects("Endpoint")) {
Endpoint::Ptr recipient = dynamic_pointer_cast<Endpoint>(object);
/* don't forward messages back to the sender */
if (sender == recipient)
continue;
if (recipient->HasSubscription(method))
SendUnicastMessage(sender, recipient, message);
2012-04-18 15:22:25 +02:00
}
}
2012-06-21 00:10:10 +02:00
void EndpointManager::SendAPIMessage(const Endpoint::Ptr& sender, const Endpoint::Ptr& recipient,
RequestMessage& message,
2012-09-21 09:43:06 +02:00
const EndpointManager::APICallback& callback, double timeout)
{
2013-03-02 09:07:47 +01:00
ObjectLock olock(this);
m_NextMessageID++;
stringstream idstream;
idstream << m_NextMessageID;
String id = idstream.str();
message.SetID(id);
PendingRequest pr;
pr.Request = message;
pr.Callback = callback;
2012-08-03 18:17:47 +02:00
pr.Timeout = Utility::GetTime() + timeout;
m_Requests[id] = pr;
2012-06-21 00:10:10 +02:00
if (!recipient)
SendAnycastMessage(sender, message);
else
SendUnicastMessage(sender, recipient, message);
}
bool EndpointManager::RequestTimeoutLessComparer(const pair<String, PendingRequest>& a,
const pair<String, PendingRequest>& b)
{
return a.second.Timeout < b.second.Timeout;
}
void EndpointManager::SubscriptionTimerHandler(void)
{
Dictionary::Ptr subscriptions = boost::make_shared<Dictionary>();
2013-02-18 23:44:24 +01:00
BOOST_FOREACH(const DynamicObject::Ptr& object, DynamicType::GetObjects("Endpoint")) {
Endpoint::Ptr endpoint = dynamic_pointer_cast<Endpoint>(object);
/* don't copy subscriptions from non-local endpoints or the identity endpoint */
if (!endpoint->IsLocalEndpoint() || endpoint == m_Endpoint)
continue;
2013-03-01 12:07:52 +01:00
Dictionary::Ptr endpointSubscriptions = endpoint->GetSubscriptions();
if (endpointSubscriptions) {
ObjectLock olock(endpointSubscriptions);
String topic;
2013-03-02 09:07:47 +01:00
BOOST_FOREACH(tie(tuples::ignore, topic), endpointSubscriptions) {
subscriptions->Set(topic, topic);
}
}
}
2013-02-24 01:10:34 +01:00
subscriptions->Seal();
if (m_Endpoint)
m_Endpoint->SetSubscriptions(subscriptions);
}
void EndpointManager::ReconnectTimerHandler(void)
{
2013-02-18 23:44:24 +01:00
BOOST_FOREACH(const DynamicObject::Ptr& object, DynamicType::GetObjects("Endpoint")) {
Endpoint::Ptr endpoint = dynamic_pointer_cast<Endpoint>(object);
2012-09-03 12:20:04 +02:00
if (endpoint->IsConnected() || endpoint == m_Endpoint)
continue;
String node, service;
node = endpoint->GetNode();
service = endpoint->GetService();
2012-09-03 12:20:04 +02:00
if (node.IsEmpty() || service.IsEmpty()) {
Logger::Write(LogWarning, "icinga", "Can't reconnect "
"to endpoint '" + endpoint->GetName() + "': No "
"node/service information.");
continue;
2012-09-03 12:20:04 +02:00
}
AddConnection(node, service);
}
}
2012-06-15 19:32:41 +02:00
void EndpointManager::RequestTimerHandler(void)
{
2013-03-02 09:07:47 +01:00
ObjectLock olock(this);
map<String, PendingRequest>::iterator it;
2013-03-06 15:41:13 +01:00
for (it = m_Requests.begin(); it != m_Requests.end(); ++it) {
if (it->second.HasTimedOut()) {
2012-09-21 09:43:06 +02:00
it->second.Callback(GetSelf(), Endpoint::Ptr(),
it->second.Request, ResponseMessage(), true);
m_Requests.erase(it);
break;
}
}
}
2012-09-21 09:43:06 +02:00
void EndpointManager::ProcessResponseMessage(const Endpoint::Ptr& sender,
const ResponseMessage& message)
{
2013-03-02 09:07:47 +01:00
ObjectLock olock(this);
String id;
if (!message.GetID(&id))
BOOST_THROW_EXCEPTION(invalid_argument("Response message must have a message ID."));
map<String, PendingRequest>::iterator it;
it = m_Requests.find(id);
if (it == m_Requests.end())
return;
it->second.Callback(GetSelf(), sender, it->second.Request, message, false);
m_Requests.erase(it);
}
2012-06-20 16:52:56 +02:00
2012-06-27 18:43:34 +02:00
EndpointManager::Ptr EndpointManager::GetInstance(void)
{
static EndpointManager::Ptr instance;
if (!instance)
instance = boost::make_shared<EndpointManager>();
return instance;
}