icinga2/lib/remoting/endpointmanager.cpp

412 lines
12 KiB
C++

/******************************************************************************
* Icinga 2 *
* Copyright (C) 2012 Icinga Development Team (http://www.icinga.org/) *
* *
* This program is free software; you can redistribute it and/or *
* modify it under the terms of the GNU General Public License *
* as published by the Free Software Foundation; either version 2 *
* of the License, or (at your option) any later version. *
* *
* This program is distributed in the hope that it will be useful, *
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
* GNU General Public License for more details. *
* *
* You should have received a copy of the GNU General Public License *
* along with this program; if not, write to the Free Software Foundation *
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA. *
******************************************************************************/
#include "remoting/endpointmanager.h"
#include "base/dynamictype.h"
#include "base/objectlock.h"
#include "base/logger_fwd.h"
#include "base/convert.h"
#include "base/utility.h"
#include "base/tlsutility.h"
#include "base/networkstream.h"
#include <boost/tuple/tuple.hpp>
#include <boost/foreach.hpp>
using namespace icinga;
/**
* Constructor for the EndpointManager class.
*/
EndpointManager::EndpointManager(void)
{
m_ReconnectTimer = boost::make_shared<Timer>();
m_ReconnectTimer->OnTimerExpired.connect(boost::bind(&EndpointManager::ReconnectTimerHandler, this));
m_ReconnectTimer->SetInterval(5);
m_ReconnectTimer->Start();
}
/**
* Sets the SSL context.
*
* @param sslContext The new SSL context.
*/
void EndpointManager::SetSSLContext(const shared_ptr<SSL_CTX>& sslContext)
{
ObjectLock olock(this);
m_SSLContext = sslContext;
}
/**
* Retrieves the SSL context.
*
* @returns The SSL context.
*/
shared_ptr<SSL_CTX> EndpointManager::GetSSLContext(void) const
{
ObjectLock olock(this);
return m_SSLContext;
}
/**
* Sets the identity of the endpoint manager. This identity is used when
* connecting to remote peers.
*
* @param identity The new identity.
*/
void EndpointManager::SetIdentity(const String& identity)
{
ObjectLock olock(this);
m_Identity = identity;
}
/**
* Retrieves the identity for the endpoint manager.
*
* @returns The identity.
*/
String EndpointManager::GetIdentity(void) const
{
ObjectLock olock(this);
return m_Identity;
}
/**
* Creates a new JSON-RPC listener on the specified port.
*
* @param service The port to listen on.
*/
void EndpointManager::AddListener(const String& service)
{
ObjectLock olock(this);
shared_ptr<SSL_CTX> sslContext = m_SSLContext;
if (!sslContext)
BOOST_THROW_EXCEPTION(std::logic_error("SSL context is required for AddListener()"));
std::ostringstream s;
s << "Adding new listener: port " << service;
Log(LogInformation, "icinga", s.str());
TcpSocket::Ptr server = boost::make_shared<TcpSocket>();
server->Bind(service, AF_INET6);
boost::thread thread(boost::bind(&EndpointManager::ListenerThreadProc, this, server));
thread.detach();
m_Servers.insert(server);
}
void EndpointManager::ListenerThreadProc(const Socket::Ptr& server)
{
server->Listen();
for (;;) {
Socket::Ptr client = server->Accept();
try {
NewClientHandler(client, TlsRoleServer);
} catch (const std::exception& ex) {
std::stringstream message;
message << "Error for new JSON-RPC socket: " << boost::diagnostic_information(ex);
Log(LogInformation, "remoting", message.str());
}
}
}
/**
* Creates a new JSON-RPC client and connects to the specified host and port.
*
* @param node The remote host.
* @param service The remote port.
*/
void EndpointManager::AddConnection(const String& node, const String& service) {
{
ObjectLock olock(this);
shared_ptr<SSL_CTX> sslContext = m_SSLContext;
if (!sslContext)
BOOST_THROW_EXCEPTION(std::logic_error("SSL context is required for AddConnection()"));
}
TcpSocket::Ptr client = boost::make_shared<TcpSocket>();
try {
client->Connect(node, service);
NewClientHandler(client, TlsRoleClient);
} catch (const std::exception& ex) {
Log(LogInformation, "remoting", "Could not connect to " + node + ":" + service + ": " + ex.what());
}
}
/**
* Processes a new client connection.
*
* @param client The new client.
*/
void EndpointManager::NewClientHandler(const Socket::Ptr& client, TlsRole role)
{
NetworkStream::Ptr netStream = boost::make_shared<NetworkStream>(client);
TlsStream::Ptr tlsStream = boost::make_shared<TlsStream>(netStream, role, m_SSLContext);
tlsStream->Handshake();
shared_ptr<X509> cert = tlsStream->GetPeerCertificate();
String identity = GetCertificateCN(cert);
Log(LogInformation, "icinga", "New client connection for identity '" + identity + "'");
Endpoint::Ptr endpoint = Endpoint::GetByName(identity);
if (!endpoint) {
Log(LogInformation, "remoting", "Closing endpoint '" + identity + "': No configuration available.");
return;
}
endpoint->SetClient(tlsStream);
}
///**
// * Sends an anonymous unicast message to the specified recipient.
// *
// * @param recipient The recipient of the message.
// * @param message The message.
// */
//void EndpointManager::SendUnicastMessage(const Endpoint::Ptr& recipient,
// const MessagePart& message)
//{
// SendUnicastMessage(Endpoint::Ptr(), recipient, message);
//}
///**
// * Sends a unicast message to the specified recipient.
// *
// * @param sender The sender of the message.
// * @param recipient The recipient of the message.
// * @param message The message.
// */
//void EndpointManager::SendUnicastMessage(const Endpoint::Ptr& sender,
// const Endpoint::Ptr& recipient, const MessagePart& message)
//{
// /* don't forward messages between non-local endpoints, assume that
// * anonymous senders (sender == null) are local */
//// if ((sender && !sender->IsLocal()) && !recipient->IsLocal())
//// return;
//
// if (ResponseMessage::IsResponseMessage(message))
// recipient->ProcessResponse(sender, message);
// else
// recipient->ProcessRequest(sender, message);
//}
///**
// * Sends a message to exactly one recipient out of all recipients who have a
// * subscription for the message's topic.
// *
// * @param sender The sender of the message.
// * @param message The message.
// */
//void EndpointManager::SendAnycastMessage(const Endpoint::Ptr& sender,
// const RequestMessage& message)
//{
// String method;
// if (!message.GetMethod(&method))
// BOOST_THROW_EXCEPTION(std::invalid_argument("Message is missing the 'method' property."));
//
// std::vector<Endpoint::Ptr> candidates;
//
// BOOST_FOREACH(const Endpoint::Ptr& endpoint, DynamicType::GetObjects<Endpoint>()) {
// /* don't forward messages between non-local endpoints */
//// if ((sender && !sender->IsLocal()) && !endpoint->IsLocal())
//// continue;
//
// if (endpoint->HasSubscription(method))
// candidates.push_back(endpoint);
// }
//
// if (candidates.empty())
// return;
//
// Endpoint::Ptr recipient = candidates[rand() % candidates.size()];
// SendUnicastMessage(sender, recipient, message);
//}
///**
// * Sends an anonymous message to all recipients who have a subscription for the
// * message's topic.
// *
// * @param message The message.
// */
//void EndpointManager::SendMulticastMessage(const RequestMessage& message)
//{
// SendMulticastMessage(Endpoint::Ptr(), message);
//}
///**
// * Sends a message to all recipients who have a subscription for the
// * message's topic.
// *
// * @param sender The sender of the message.
// * @param message The message.
// */
//void EndpointManager::SendBroadcastMessage(const Endpoint::Ptr& sender,
// const RequestMessage& message)
//{
// String method;
// if (!message.GetMethod(&method))
// BOOST_THROW_EXCEPTION(std::invalid_argument("Message is missing the 'method' property."));
//
// BOOST_FOREACH(const Endpoint::Ptr& recipient, DynamicType::GetObjects<Endpoint>()) {
// /* don't forward messages back to the sender */
// if (sender == recipient)
// continue;
//
// Log(LogDebug, "remoting", "Send multicast message using method " + method);
// if (recipient->HasSubscription(method))
// SendUnicastMessage(sender, recipient, message);
// }
//}
//void EndpointManager::SendAPIMessage(const Endpoint::Ptr& sender, const Endpoint::Ptr& recipient,
// RequestMessage& message,
// const EndpointManager::APICallback& callback, double timeout)
//{
// ObjectLock olock(this);
//
// m_NextMessageID++;
//
// String id = Convert::ToString(m_NextMessageID);
// message.SetID(id);
//
// PendingRequest pr;
// pr.Request = message;
// pr.Callback = callback;
// pr.Timeout = Utility::GetTime() + timeout;
//
// m_Requests[id] = pr;
//
// if (!recipient)
// SendAnycastMessage(sender, message);
// else
// SendUnicastMessage(sender, recipient, message);
//}
//
//bool EndpointManager::RequestTimeoutLessComparer(const std::pair<String, PendingRequest>& a,
// const std::pair<String, PendingRequest>& b)
//{
// return a.second.Timeout < b.second.Timeout;
//}
//
//void EndpointManager::SubscriptionTimerHandler(void)
//{
// Dictionary::Ptr subscriptions = boost::make_shared<Dictionary>();
//
// BOOST_FOREACH(const Endpoint::Ptr& endpoint, DynamicType::GetObjects<Endpoint>()) {
// /* don't copy subscriptions from non-local endpoints or the identity endpoint */
//// if (!endpoint->IsLocalEndpoint() || endpoint == m_Endpoint)
//// continue;
//
// Dictionary::Ptr endpointSubscriptions = endpoint->GetSubscriptions();
//
// if (endpointSubscriptions) {
// ObjectLock olock(endpointSubscriptions);
//
// String topic;
// BOOST_FOREACH(boost::tie(boost::tuples::ignore, topic), endpointSubscriptions) {
// subscriptions->Set(topic, topic);
// }
// }
// }
//
// subscriptions->Seal();
//
// if (m_Endpoint) {
// ObjectLock olock(m_Endpoint);
// m_Endpoint->SetSubscriptions(subscriptions);
// }
//}
void EndpointManager::ReconnectTimerHandler(void)
{
BOOST_FOREACH(const Endpoint::Ptr& endpoint, DynamicType::GetObjects<Endpoint>()) {
if (endpoint->IsConnected() || endpoint == m_Endpoint)
continue;
String host, port;
host = endpoint->GetHost();
port = endpoint->GetPort();
if (host.IsEmpty() || port.IsEmpty()) {
Log(LogWarning, "icinga", "Can't reconnect "
"to endpoint '" + endpoint->GetName() + "': No "
"host/port information.");
continue;
}
AddConnection(host, port);
}
}
//void EndpointManager::RequestTimerHandler(void)
//{
// ObjectLock olock(this);
//
// std::map<String, PendingRequest>::iterator it;
// for (it = m_Requests.begin(); it != m_Requests.end(); ++it) {
// if (it->second.HasTimedOut()) {
// it->second.Callback(Endpoint::Ptr(), it->second.Request,
// ResponseMessage(), true);
//
// m_Requests.erase(it);
//
// break;
// }
// }
//}
//void EndpointManager::ProcessResponseMessage(const Endpoint::Ptr& sender,
// const ResponseMessage& message)
//{
// ObjectLock olock(this);
//
// String id;
// if (!message.GetID(&id))
// BOOST_THROW_EXCEPTION(std::invalid_argument("Response message must have a message ID."));
//
// std::map<String, PendingRequest>::iterator it;
// it = m_Requests.find(id);
//
// if (it == m_Requests.end())
// return;
//
// it->second.Callback(sender, it->second.Request, message, false);
//
// m_Requests.erase(it);
//}
EndpointManager *EndpointManager::GetInstance(void)
{
return Singleton<EndpointManager>::GetInstance();
}