mirror of
https://github.com/rsyslog/rsyslog.git
synced 2025-12-17 11:40:42 +01:00
at least on CentOS 6 package build we see errors: https://build.opensuse.org/package/live_build_log/home:jgerhards:branches:home:rgerhards/rsyslog/CentOS_6/i586 see also https://github.com/rsyslog/rsyslog/issues/3302
1821 lines
53 KiB
C
1821 lines
53 KiB
C
/* omhttp.c
|
|
* This is an http output module based on omelasticsearch
|
|
*
|
|
* NOTE: read comments in module-template.h for more specifics!
|
|
*
|
|
* Copyright 2011 Nathan Scott.
|
|
* Copyright 2009-2018 Rainer Gerhards and Adiscon GmbH.
|
|
* Copyright 2018 Christian Tramnitz
|
|
*
|
|
* This file is part of rsyslog.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
* -or-
|
|
* see COPYING.ASL20 in the source distribution
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
#include "config.h"
|
|
#include "rsyslog.h"
|
|
#include <stdio.h>
|
|
#include <stdarg.h>
|
|
#include <stdlib.h>
|
|
#include <memory.h>
|
|
#include <string.h>
|
|
#include <curl/curl.h>
|
|
#include <curl/easy.h>
|
|
#include <assert.h>
|
|
#include <signal.h>
|
|
#include <errno.h>
|
|
#include <time.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <fcntl.h>
|
|
#if defined(__FreeBSD__)
|
|
#include <unistd.h>
|
|
#endif
|
|
#include <json.h>
|
|
#include "conf.h"
|
|
#include "syslogd-types.h"
|
|
#include "srUtils.h"
|
|
#include "template.h"
|
|
#include "module-template.h"
|
|
#include "errmsg.h"
|
|
#include "cfsysline.h"
|
|
#include "unicode-helper.h"
|
|
#include "obj-types.h"
|
|
#include "ratelimit.h"
|
|
#include "ruleset.h"
|
|
|
|
#ifndef O_LARGEFILE
|
|
# define O_LARGEFILE 0
|
|
#endif
|
|
|
|
MODULE_TYPE_OUTPUT
|
|
MODULE_TYPE_NOKEEP
|
|
MODULE_CNFNAME("omhttp")
|
|
|
|
/* internal structures */
|
|
DEF_OMOD_STATIC_DATA
|
|
DEFobjCurrIf(prop)
|
|
DEFobjCurrIf(ruleset)
|
|
|
|
static prop_t *pInputName = NULL;
|
|
|
|
#define WRKR_DATA_TYPE_ES 0xBADF0001
|
|
|
|
/* REST API uses this URL:
|
|
* https://<hostName>:<restPort>/restPath
|
|
*/
|
|
typedef struct curl_slist HEADER;
|
|
typedef struct instanceConf_s {
|
|
int defaultPort;
|
|
int fdErrFile; /* error file fd or -1 if not open */
|
|
pthread_mutex_t mutErrFile;
|
|
uchar **serverBaseUrls;
|
|
int numServers;
|
|
long healthCheckTimeout;
|
|
uchar *uid;
|
|
uchar *pwd;
|
|
uchar *authBuf;
|
|
uchar *httpheaderkey;
|
|
uchar *httpheadervalue;
|
|
uchar *headerBuf;
|
|
uchar *restPath;
|
|
uchar *checkPath;
|
|
uchar *tplName;
|
|
uchar *errorFile;
|
|
sbool errorOnly;
|
|
sbool bulkmode;
|
|
sbool interleaved;
|
|
sbool dynRestPath;
|
|
size_t maxbytes;
|
|
sbool useHttps;
|
|
sbool allowUnsignedCerts;
|
|
uchar *caCertFile;
|
|
uchar *myCertFile;
|
|
uchar *myPrivKeyFile;
|
|
sbool retryFailures;
|
|
int ratelimitInterval;
|
|
int ratelimitBurst;
|
|
/* for retries */
|
|
ratelimit_t *ratelimiter;
|
|
uchar *retryRulesetName;
|
|
ruleset_t *retryRuleset;
|
|
struct instanceConf_s *next;
|
|
} instanceData;
|
|
|
|
|
|
struct modConfData_s {
|
|
rsconf_t *pConf; /* our overall config object */
|
|
instanceConf_t *root, *tail;
|
|
};
|
|
static modConfData_t *loadModConf = NULL; /* modConf ptr to use for the current load process */
|
|
|
|
typedef struct wrkrInstanceData {
|
|
PTR_ASSERT_DEF
|
|
instanceData *pData;
|
|
int serverIndex;
|
|
int replyLen;
|
|
char *reply;
|
|
CURL *curlCheckConnHandle; /* libcurl session handle for checking the server connection */
|
|
CURL *curlPostHandle; /* libcurl session handle for posting data to the server */
|
|
HEADER *curlHeader; /* json POST request info */
|
|
uchar *restURL; /* last used URL for error reporting */
|
|
struct {
|
|
es_str_t *data;
|
|
int nmemb; /* number of messages in batch (for statistics counting) */
|
|
uchar *currTpl1;
|
|
uchar *currTpl2;
|
|
} batch;
|
|
} wrkrInstanceData_t;
|
|
|
|
/* tables for interfacing with the v6 config system */
|
|
/* action (instance) parameters */
|
|
static struct cnfparamdescr actpdescr[] = {
|
|
{ "server", eCmdHdlrArray, 0 },
|
|
{ "serverport", eCmdHdlrInt, 0 },
|
|
{ "healthchecktimeout", eCmdHdlrInt, 0 },
|
|
{ "httpheaderkey", eCmdHdlrGetWord, 0 },
|
|
{ "httpheadervalue", eCmdHdlrGetWord, 0 },
|
|
{ "uid", eCmdHdlrGetWord, 0 },
|
|
{ "pwd", eCmdHdlrGetWord, 0 },
|
|
{ "restpath", eCmdHdlrGetWord, 0 },
|
|
{ "dynrestpath", eCmdHdlrBinary, 0 },
|
|
{ "bulkmode", eCmdHdlrBinary, 0 },
|
|
{ "maxbytes", eCmdHdlrSize, 0 },
|
|
{ "usehttps", eCmdHdlrBinary, 0 },
|
|
{ "errorfile", eCmdHdlrGetWord, 0 },
|
|
{ "erroronly", eCmdHdlrBinary, 0 },
|
|
{ "interleaved", eCmdHdlrBinary, 0 },
|
|
{ "template", eCmdHdlrGetWord, 0 },
|
|
{ "allowunsignedcerts", eCmdHdlrBinary, 0 },
|
|
{ "tls.cacert", eCmdHdlrString, 0 },
|
|
{ "tls.mycert", eCmdHdlrString, 0 },
|
|
{ "tls.myprivkey", eCmdHdlrString, 0 },
|
|
{ "retryfailures", eCmdHdlrBinary, 0 },
|
|
{ "ratelimit.interval", eCmdHdlrInt, 0 },
|
|
{ "ratelimit.burst", eCmdHdlrInt, 0 },
|
|
{ "retryruleset", eCmdHdlrString, 0 }
|
|
};
|
|
static struct cnfparamblk actpblk =
|
|
{ CNFPARAMBLK_VERSION,
|
|
sizeof(actpdescr)/sizeof(struct cnfparamdescr),
|
|
actpdescr
|
|
};
|
|
|
|
static rsRetVal curlSetup(wrkrInstanceData_t *pWrkrData);
|
|
|
|
BEGINcreateInstance
|
|
CODESTARTcreateInstance
|
|
pData->fdErrFile = -1;
|
|
pthread_mutex_init(&pData->mutErrFile, NULL);
|
|
pData->caCertFile = NULL;
|
|
pData->myCertFile = NULL;
|
|
pData->myPrivKeyFile = NULL;
|
|
pData->ratelimiter = NULL;
|
|
pData->retryRulesetName = NULL;
|
|
pData->retryRuleset = NULL;
|
|
ENDcreateInstance
|
|
|
|
BEGINcreateWrkrInstance
|
|
CODESTARTcreateWrkrInstance
|
|
PTR_ASSERT_SET_TYPE(pWrkrData, WRKR_DATA_TYPE_ES);
|
|
pWrkrData->curlHeader = NULL;
|
|
pWrkrData->curlPostHandle = NULL;
|
|
pWrkrData->curlCheckConnHandle = NULL;
|
|
pWrkrData->serverIndex = 0;
|
|
pWrkrData->restURL = NULL;
|
|
if(pData->bulkmode) {
|
|
pWrkrData->batch.currTpl1 = NULL;
|
|
pWrkrData->batch.currTpl2 = NULL;
|
|
if((pWrkrData->batch.data = es_newStr(1024)) == NULL) {
|
|
LogError(0, RS_RET_OUT_OF_MEMORY,
|
|
"omhttp: error creating batch string "
|
|
"turned off bulk mode\n");
|
|
pData->bulkmode = 0; /* at least it works */
|
|
}
|
|
}
|
|
iRet = curlSetup(pWrkrData);
|
|
ENDcreateWrkrInstance
|
|
|
|
BEGINisCompatibleWithFeature
|
|
CODESTARTisCompatibleWithFeature
|
|
if(eFeat == sFEATURERepeatedMsgReduction)
|
|
iRet = RS_RET_OK;
|
|
ENDisCompatibleWithFeature
|
|
|
|
BEGINfreeInstance
|
|
int i;
|
|
CODESTARTfreeInstance
|
|
if(pData->fdErrFile != -1)
|
|
close(pData->fdErrFile);
|
|
pthread_mutex_destroy(&pData->mutErrFile);
|
|
for(i = 0 ; i < pData->numServers ; ++i)
|
|
free(pData->serverBaseUrls[i]);
|
|
free(pData->serverBaseUrls);
|
|
free(pData->uid);
|
|
free(pData->httpheaderkey);
|
|
free(pData->httpheadervalue);
|
|
free(pData->pwd);
|
|
if (pData->authBuf != NULL)
|
|
free(pData->authBuf);
|
|
if (pData->headerBuf != NULL)
|
|
free(pData->headerBuf);
|
|
free(pData->restPath);
|
|
free(pData->checkPath);
|
|
free(pData->tplName);
|
|
free(pData->errorFile);
|
|
free(pData->caCertFile);
|
|
free(pData->myCertFile);
|
|
free(pData->myPrivKeyFile);
|
|
free(pData->retryRulesetName);
|
|
if (pData->ratelimiter != NULL)
|
|
ratelimitDestruct(pData->ratelimiter);
|
|
ENDfreeInstance
|
|
|
|
BEGINfreeWrkrInstance
|
|
CODESTARTfreeWrkrInstance
|
|
if(pWrkrData->curlHeader != NULL) {
|
|
curl_slist_free_all(pWrkrData->curlHeader);
|
|
pWrkrData->curlHeader = NULL;
|
|
}
|
|
if(pWrkrData->curlCheckConnHandle != NULL) {
|
|
curl_easy_cleanup(pWrkrData->curlCheckConnHandle);
|
|
pWrkrData->curlCheckConnHandle = NULL;
|
|
}
|
|
if(pWrkrData->curlPostHandle != NULL) {
|
|
curl_easy_cleanup(pWrkrData->curlPostHandle);
|
|
pWrkrData->curlPostHandle = NULL;
|
|
}
|
|
if (pWrkrData->restURL != NULL) {
|
|
free(pWrkrData->restURL);
|
|
pWrkrData->restURL = NULL;
|
|
}
|
|
es_deleteStr(pWrkrData->batch.data);
|
|
ENDfreeWrkrInstance
|
|
|
|
BEGINdbgPrintInstInfo
|
|
int i;
|
|
CODESTARTdbgPrintInstInfo
|
|
dbgprintf("omhttp\n");
|
|
dbgprintf("\ttemplate='%s'\n", pData->tplName);
|
|
dbgprintf("\tnumServers=%d\n", pData->numServers);
|
|
dbgprintf("\thealthCheckTimeout=%lu\n", pData->healthCheckTimeout);
|
|
dbgprintf("\tserverBaseUrls=");
|
|
for(i = 0 ; i < pData->numServers ; ++i)
|
|
dbgprintf("%c'%s'", i == 0 ? '[' : ' ', pData->serverBaseUrls[i]);
|
|
dbgprintf("]\n");
|
|
dbgprintf("\tdefaultPort=%d\n", pData->defaultPort);
|
|
dbgprintf("\tuid='%s'\n", pData->uid == NULL ? (uchar*)"(not configured)" : pData->uid);
|
|
dbgprintf("\thttpheaderkey='%s'\n", pData->httpheaderkey == NULL ?
|
|
(uchar*)"(not configured)" : pData->httpheaderkey);
|
|
dbgprintf("\thttpheadervalue='%s'\n", pData->httpheadervalue == NULL ?
|
|
(uchar*)"(not configured)" : pData->httpheadervalue);
|
|
dbgprintf("\tpwd=(%sconfigured)\n", pData->pwd == NULL ? "not " : "");
|
|
dbgprintf("\trest path='%s'\n", pData->restPath);
|
|
dbgprintf("\tcheck path='%s'\n", pData->checkPath);
|
|
dbgprintf("\tdynamic rest path=%d\n", pData->dynRestPath);
|
|
dbgprintf("\tuse https=%d\n", pData->useHttps);
|
|
dbgprintf("\tmaxbytes=%zu\n", pData->maxbytes);
|
|
dbgprintf("\tallowUnsignedCerts=%d\n", pData->allowUnsignedCerts);
|
|
dbgprintf("\terrorfile='%s'\n", pData->errorFile == NULL ?
|
|
(uchar*)"(not configured)" : pData->errorFile);
|
|
dbgprintf("\terroronly=%d\n", pData->errorOnly);
|
|
dbgprintf("\tinterleaved=%d\n", pData->interleaved);
|
|
dbgprintf("\ttls.cacert='%s'\n", pData->caCertFile);
|
|
dbgprintf("\ttls.mycert='%s'\n", pData->myCertFile);
|
|
dbgprintf("\ttls.myprivkey='%s'\n", pData->myPrivKeyFile);
|
|
dbgprintf("\tretryfailures='%d'\n", pData->retryFailures);
|
|
dbgprintf("\tratelimit.interval='%d'\n", pData->ratelimitInterval);
|
|
dbgprintf("\tratelimit.burst='%d'\n", pData->ratelimitBurst);
|
|
ENDdbgPrintInstInfo
|
|
|
|
|
|
/* http POST result string ... useful for debugging */
|
|
static size_t
|
|
curlResult(void *ptr, size_t size, size_t nmemb, void *userdata)
|
|
{
|
|
char *p = (char *)ptr;
|
|
wrkrInstanceData_t *pWrkrData = (wrkrInstanceData_t*) userdata;
|
|
char *buf;
|
|
size_t newlen;
|
|
PTR_ASSERT_CHK(pWrkrData, WRKR_DATA_TYPE_ES);
|
|
newlen = pWrkrData->replyLen + size*nmemb;
|
|
if((buf = realloc(pWrkrData->reply, newlen + 1)) == NULL) {
|
|
LogError(errno, RS_RET_ERR, "omhttp: realloc failed in curlResult");
|
|
return 0; /* abort due to failure */
|
|
}
|
|
memcpy(buf+pWrkrData->replyLen, p, size*nmemb);
|
|
pWrkrData->replyLen = newlen;
|
|
pWrkrData->reply = buf;
|
|
return size*nmemb;
|
|
}
|
|
|
|
/* Build basic URL part, which includes hostname and port as follows:
|
|
* http://hostname:port/ based on a server param
|
|
* Newly creates a cstr for this purpose.
|
|
* Note: serverParam MUST NOT end in '/' (caller must strip if it exists)
|
|
*/
|
|
static rsRetVal
|
|
computeBaseUrl(const char*const serverParam,
|
|
const int defaultPort,
|
|
const sbool useHttps,
|
|
uchar **baseUrl)
|
|
{
|
|
# define SCHEME_HTTPS "https://"
|
|
# define SCHEME_HTTP "http://"
|
|
|
|
char portBuf[64];
|
|
int r = 0;
|
|
const char *host = serverParam;
|
|
DEFiRet;
|
|
|
|
assert(serverParam[strlen(serverParam)-1] != '/');
|
|
|
|
es_str_t *urlBuf = es_newStr(256);
|
|
if (urlBuf == NULL) {
|
|
LogError(0, RS_RET_OUT_OF_MEMORY,
|
|
"omhttp: failed to allocate es_str urlBuf in computeBaseUrl");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
/* Find where the hostname/ip of the server starts. If the scheme is not specified
|
|
in the uri, start the buffer with a scheme corresponding to the useHttps parameter.
|
|
*/
|
|
if (strcasestr(serverParam, SCHEME_HTTP))
|
|
host = serverParam + strlen(SCHEME_HTTP);
|
|
else if (strcasestr(serverParam, SCHEME_HTTPS))
|
|
host = serverParam + strlen(SCHEME_HTTPS);
|
|
else
|
|
r = useHttps ? es_addBuf(&urlBuf, SCHEME_HTTPS, sizeof(SCHEME_HTTPS)-1) :
|
|
es_addBuf(&urlBuf, SCHEME_HTTP, sizeof(SCHEME_HTTP)-1);
|
|
|
|
if (r == 0) r = es_addBuf(&urlBuf, (char *)serverParam, strlen(serverParam));
|
|
if (r == 0 && !strchr(host, ':')) {
|
|
snprintf(portBuf, sizeof(portBuf), ":%d", defaultPort);
|
|
r = es_addBuf(&urlBuf, portBuf, strlen(portBuf));
|
|
}
|
|
if (r == 0) r = es_addChar(&urlBuf, '/');
|
|
if (r == 0) *baseUrl = (uchar*) es_str2cstr(urlBuf, NULL);
|
|
|
|
if (r != 0 || baseUrl == NULL) {
|
|
LogError(0, RS_RET_ERR,
|
|
"omhttp: error occurred computing baseUrl from server %s", serverParam);
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
finalize_it:
|
|
if (urlBuf) {
|
|
es_deleteStr(urlBuf);
|
|
}
|
|
RETiRet;
|
|
}
|
|
|
|
static inline void
|
|
incrementServerIndex(wrkrInstanceData_t *pWrkrData)
|
|
{
|
|
pWrkrData->serverIndex = (pWrkrData->serverIndex + 1) % pWrkrData->pData->numServers;
|
|
}
|
|
|
|
|
|
/* checks if connection to ES can be established; also iterates over
|
|
* potential servers to support high availability (HA) feature. If it
|
|
* needs to switch server, will record new one in curl handle.
|
|
*/
|
|
static rsRetVal ATTR_NONNULL()
|
|
checkConn(wrkrInstanceData_t *const pWrkrData)
|
|
{
|
|
CURL *curl;
|
|
CURLcode res;
|
|
es_str_t *urlBuf;
|
|
char* healthUrl;
|
|
char* serverUrl;
|
|
char* checkPath;
|
|
int i;
|
|
int r;
|
|
DEFiRet;
|
|
|
|
pWrkrData->reply = NULL;
|
|
pWrkrData->replyLen = 0;
|
|
curl = pWrkrData->curlCheckConnHandle;
|
|
urlBuf = es_newStr(256);
|
|
if (urlBuf == NULL) {
|
|
LogError(0, RS_RET_OUT_OF_MEMORY,
|
|
"omhttp: unable to allocate buffer for health check uri.");
|
|
ABORT_FINALIZE(RS_RET_SUSPENDED);
|
|
}
|
|
|
|
for(i = 0; i < pWrkrData->pData->numServers; ++i) {
|
|
serverUrl = (char*) pWrkrData->pData->serverBaseUrls[pWrkrData->serverIndex];
|
|
checkPath = (char*) pWrkrData->pData->checkPath;
|
|
|
|
es_emptyStr(urlBuf);
|
|
r = es_addBuf(&urlBuf, serverUrl, strlen(serverUrl));
|
|
if(r == 0)
|
|
r = es_addBuf(&urlBuf, checkPath, sizeof(checkPath)-1);
|
|
if(r == 0)
|
|
healthUrl = es_str2cstr(urlBuf, NULL);
|
|
if(r != 0 || healthUrl == NULL) {
|
|
LogError(0, RS_RET_OUT_OF_MEMORY,
|
|
"omhttp: unable to allocate buffer for health check uri.");
|
|
ABORT_FINALIZE(RS_RET_SUSPENDED);
|
|
}
|
|
|
|
curl_easy_setopt(curl, CURLOPT_URL, healthUrl);
|
|
curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, curlResult);
|
|
res = curl_easy_perform(curl);
|
|
free(healthUrl);
|
|
|
|
if (res == CURLE_OK) {
|
|
DBGPRINTF("omhttp: checkConn %s completed with success "
|
|
"on attempt %d\n", serverUrl, i);
|
|
ABORT_FINALIZE(RS_RET_OK);
|
|
}
|
|
|
|
DBGPRINTF("omhttp: checkConn %s failed on attempt %d: %s\n",
|
|
serverUrl, i, curl_easy_strerror(res));
|
|
incrementServerIndex(pWrkrData);
|
|
}
|
|
|
|
LogMsg(0, RS_RET_SUSPENDED, LOG_WARNING,
|
|
"omhttp: checkConn failed after %d attempts.", i);
|
|
ABORT_FINALIZE(RS_RET_SUSPENDED);
|
|
|
|
finalize_it:
|
|
if(urlBuf != NULL)
|
|
es_deleteStr(urlBuf);
|
|
free(pWrkrData->reply);
|
|
pWrkrData->reply = NULL; /* don't leave dangling pointer */
|
|
RETiRet;
|
|
}
|
|
|
|
|
|
BEGINtryResume
|
|
CODESTARTtryResume
|
|
DBGPRINTF("omhttp: tryResume called\n");
|
|
iRet = checkConn(pWrkrData);
|
|
ENDtryResume
|
|
|
|
|
|
/* get the current index and type for this message */
|
|
static void ATTR_NONNULL(1)
|
|
getRestPath(const instanceData *const pData, uchar **const tpls,
|
|
uchar **const restPath)
|
|
{
|
|
*restPath = pData->restPath;
|
|
if(tpls == NULL) {
|
|
goto done;
|
|
}
|
|
|
|
int iNumTpls = 1;
|
|
if(pData->dynRestPath) {
|
|
*restPath = tpls[iNumTpls];
|
|
++iNumTpls;
|
|
}
|
|
|
|
done:
|
|
assert(restPath != NULL);
|
|
return;
|
|
}
|
|
|
|
|
|
static rsRetVal ATTR_NONNULL(1)
|
|
setPostURL(wrkrInstanceData_t *const pWrkrData, uchar **const tpls)
|
|
{
|
|
uchar *restPath;
|
|
char* baseUrl;
|
|
es_str_t *url;
|
|
int r;
|
|
DEFiRet;
|
|
instanceData *const pData = pWrkrData->pData;
|
|
|
|
baseUrl = (char*)pData->serverBaseUrls[pWrkrData->serverIndex];
|
|
url = es_newStrFromCStr(baseUrl, strlen(baseUrl));
|
|
if (url == NULL) {
|
|
LogError(0, RS_RET_OUT_OF_MEMORY,
|
|
"omhttp: error allocating new estr for POST url.");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
getRestPath(pData, tpls, &restPath);
|
|
r = es_addBuf(&url, (char*)restPath, ustrlen(restPath));
|
|
if(r != 0) {
|
|
LogError(0, RS_RET_ERR, "omhttp: failure in creating restURL, "
|
|
"error code: %d", r);
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
if(pWrkrData->restURL != NULL)
|
|
free(pWrkrData->restURL);
|
|
|
|
pWrkrData->restURL = (uchar*)es_str2cstr(url, NULL);
|
|
curl_easy_setopt(pWrkrData->curlPostHandle, CURLOPT_URL, pWrkrData->restURL);
|
|
DBGPRINTF("omhttp: using REST URL: '%s'\n", pWrkrData->restURL);
|
|
|
|
finalize_it:
|
|
if (url != NULL)
|
|
es_deleteStr(url);
|
|
RETiRet;
|
|
}
|
|
|
|
|
|
/* this method does not directly submit but builds a batch instead. It
|
|
* may submit, if we have dynamic restPath and the current restPath changes.
|
|
*/
|
|
static rsRetVal
|
|
buildBatch(wrkrInstanceData_t *pWrkrData, uchar *message)
|
|
{
|
|
int length = strlen((char *)message);
|
|
int r=0;
|
|
DEFiRet;
|
|
|
|
if(r == 0) r = es_addBuf(&pWrkrData->batch.data, (char*)message, length);
|
|
if(r == 0) r = es_addBuf(&pWrkrData->batch.data, "\n", sizeof("\n")-1);
|
|
if(r != 0) {
|
|
LogError(0, RS_RET_ERR,
|
|
"omhttp: growing batch failed with code %d", r);
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
++pWrkrData->batch.nmemb;
|
|
iRet = RS_RET_OK;
|
|
|
|
finalize_it:
|
|
RETiRet;
|
|
}
|
|
|
|
/*
|
|
* Dumps entire bulk request and response in error log
|
|
*/
|
|
static rsRetVal
|
|
getDataErrorDefault(wrkrInstanceData_t *pWrkrData,fjson_object **pReplyRoot,uchar *reqmsg,char **rendered)
|
|
{
|
|
DEFiRet;
|
|
fjson_object *req=NULL;
|
|
fjson_object *errRoot=NULL;
|
|
fjson_object *replyRoot = *pReplyRoot;
|
|
|
|
if((req=fjson_object_new_object()) == NULL) ABORT_FINALIZE(RS_RET_ERR);
|
|
fjson_object_object_add(req, "url", fjson_object_new_string((char*)pWrkrData->restURL));
|
|
fjson_object_object_add(req, "postdata", fjson_object_new_string((char*)reqmsg));
|
|
|
|
if((errRoot=fjson_object_new_object()) == NULL) ABORT_FINALIZE(RS_RET_ERR);
|
|
fjson_object_object_add(errRoot, "request", req);
|
|
fjson_object_object_add(errRoot, "reply", replyRoot);
|
|
*rendered = strdup((char*)fjson_object_to_json_string(errRoot));
|
|
|
|
req=NULL;
|
|
fjson_object_put(errRoot);
|
|
|
|
*pReplyRoot = NULL; /* tell caller not to delete once again! */
|
|
|
|
finalize_it:
|
|
fjson_object_put(req);
|
|
RETiRet;
|
|
}
|
|
|
|
/*
|
|
* Sets bulkRequestNextSectionStart pointer to next sections start in the buffer pointed by bulkRequest.
|
|
* Sections are marked by { and }
|
|
*/
|
|
static rsRetVal
|
|
getSection(const char* bulkRequest, const char **bulkRequestNextSectionStart )
|
|
{
|
|
DEFiRet;
|
|
char* idx =0;
|
|
if( (idx = strchr(bulkRequest,'\n')) != 0)/*intermediate section*/
|
|
{
|
|
*bulkRequestNextSectionStart = ++idx;
|
|
}
|
|
else
|
|
{
|
|
*bulkRequestNextSectionStart=0;
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
finalize_it:
|
|
RETiRet;
|
|
}
|
|
|
|
/*
|
|
* Sets the new string in singleRequest for one request in bulkRequest
|
|
* and sets lastLocation pointer to the location till which bulkrequest has been parsed.
|
|
* (used as input to make function thread safe.)
|
|
*/
|
|
static rsRetVal
|
|
getSingleRequest(const char* bulkRequest, char** singleRequest, const char **lastLocation)
|
|
{
|
|
DEFiRet;
|
|
const char *req = bulkRequest;
|
|
const char *start = bulkRequest;
|
|
if (getSection(req,&req)!=RS_RET_OK)
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
|
|
if (getSection(req,&req)!=RS_RET_OK)
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
|
|
CHKmalloc(*singleRequest = (char*) calloc (req - start+ 1 + 1,1));
|
|
/* (req - start+ 1 == length of data + 1 for terminal char)*/
|
|
memcpy(*singleRequest,start,req - start);
|
|
*lastLocation=req;
|
|
|
|
finalize_it:
|
|
RETiRet;
|
|
}
|
|
|
|
/*
|
|
* check the status of response from API
|
|
*/
|
|
static int checkReplyStatus(fjson_object* ok) {
|
|
return (ok == NULL || !fjson_object_is_type(ok, fjson_type_int) || fjson_object_get_int(ok) < 0 ||
|
|
fjson_object_get_int(ok) > 299);
|
|
}
|
|
|
|
/*
|
|
* Context object for error file content creation or status check
|
|
* response_item - the full {"create":{"_index":"idxname",.....}}
|
|
* response_body - the inner hash of the response_item - {"_index":"idxname",...}
|
|
* status - the "status" field from the inner hash - "status":500
|
|
* should be able to use fjson_object_get_int(status) to get the http result code
|
|
*/
|
|
typedef struct exeContext{
|
|
int statusCheckOnly;
|
|
fjson_object *errRoot;
|
|
rsRetVal (*prepareErrorFileContent)(struct exeContext *ctx,int itemStatus,char *request,char *response,
|
|
fjson_object *response_item, fjson_object *response_body, fjson_object *status);
|
|
ratelimit_t *ratelimiter;
|
|
ruleset_t *retryRuleset;
|
|
struct json_tokener *jTokener;
|
|
} context;
|
|
|
|
/*
|
|
* get content to be written in error file using context passed
|
|
*/
|
|
static rsRetVal
|
|
parseRequestAndResponseForContext(wrkrInstanceData_t *pWrkrData,fjson_object **pReplyRoot,uchar *reqmsg,context *ctx)
|
|
{
|
|
DEFiRet;
|
|
fjson_object *replyRoot = *pReplyRoot;
|
|
int i;
|
|
int numitems = 0;
|
|
fjson_object *items=NULL, *jo_errors = NULL;
|
|
int errors = 0;
|
|
|
|
if(fjson_object_object_get_ex(replyRoot, "errors", &jo_errors)) {
|
|
errors = fjson_object_get_boolean(jo_errors);
|
|
if (!errors && pWrkrData->pData->retryFailures) {
|
|
return RS_RET_OK;
|
|
}
|
|
}
|
|
/*iterate over items*/
|
|
if(!fjson_object_object_get_ex(replyRoot, "items", &items)) {
|
|
DBGPRINTF("omhttp: no items found in response\n");
|
|
} else {
|
|
numitems = fjson_object_array_length(items);
|
|
}
|
|
|
|
if (reqmsg) {
|
|
DBGPRINTF("omhttp: Entire request %s\n", reqmsg);
|
|
} else {
|
|
DBGPRINTF("omhttp: Empty request\n");
|
|
}
|
|
const char *lastReqRead= (char*)reqmsg;
|
|
|
|
DBGPRINTF("omhttp: %d items in reply\n", numitems);
|
|
for(i = 0 ; i < numitems ; ++i) {
|
|
|
|
fjson_object *item=NULL;
|
|
fjson_object *result=NULL;
|
|
fjson_object *ok=NULL;
|
|
int itemStatus=0;
|
|
item = fjson_object_array_get_idx(items, i);
|
|
if(item == NULL) {
|
|
LogError(0, RS_RET_DATAFAIL,
|
|
"omhttp: error in http reply: "
|
|
"cannot obtain reply array item %d", i);
|
|
ABORT_FINALIZE(RS_RET_DATAFAIL);
|
|
}
|
|
|
|
fjson_object_object_get_ex(result, "status", &ok);
|
|
if(ok == NULL) {
|
|
DBGPRINTF("omhttp: no status response received\n");
|
|
} else {
|
|
itemStatus = checkReplyStatus(ok);
|
|
}
|
|
|
|
char *request =0;
|
|
char *response =0;
|
|
if(ctx->statusCheckOnly || (NULL == lastReqRead)) {
|
|
if(itemStatus) {
|
|
DBGPRINTF("omhttp: error in http reply: item %d, "
|
|
"status is %d\n", i, fjson_object_get_int(ok));
|
|
DBGPRINTF("omhttp: status check found error.\n");
|
|
ABORT_FINALIZE(RS_RET_DATAFAIL);
|
|
}
|
|
|
|
} else {
|
|
if(getSingleRequest(lastReqRead,&request,&lastReqRead) != RS_RET_OK) {
|
|
DBGPRINTF("omhttp: Couldn't get post request\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
response = (char*)fjson_object_to_json_string_ext(result, FJSON_TO_STRING_PLAIN);
|
|
|
|
if(response==NULL) {
|
|
free(request);/*as its has been assigned.*/
|
|
DBGPRINTF("omhttp: Error getting fjson_object_to_string_ext. Cannot "
|
|
"continue\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
/*call the context*/
|
|
rsRetVal ret = ctx->prepareErrorFileContent(ctx, itemStatus, request,
|
|
response, item, result, ok);
|
|
|
|
/*free memory in any case*/
|
|
free(request);
|
|
|
|
if(ret != RS_RET_OK) {
|
|
DBGPRINTF("omhttp: Error in preparing errorfileContent. Cannot continue\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
}
|
|
}
|
|
|
|
finalize_it:
|
|
RETiRet;
|
|
}
|
|
|
|
/*
|
|
* Dumps only failed requests of bulk insert
|
|
*/
|
|
static rsRetVal
|
|
getDataErrorOnly(context *ctx,int itemStatus,char *request,char *response,
|
|
fjson_object *response_item, fjson_object *response_body, fjson_object *status)
|
|
{
|
|
DEFiRet;
|
|
(void)response_item; /* unused */
|
|
(void)response_body; /* unused */
|
|
(void)status; /* unused */
|
|
if(itemStatus) {
|
|
fjson_object *onlyErrorResponses =NULL;
|
|
fjson_object *onlyErrorRequests=NULL;
|
|
|
|
if(!fjson_object_object_get_ex(ctx->errRoot, "reply", &onlyErrorResponses)) {
|
|
DBGPRINTF("omhttp: Failed to get reply json array. Invalid context. Cannot "
|
|
"continue\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
fjson_object_array_add(onlyErrorResponses, fjson_object_new_string(response));
|
|
|
|
if(!fjson_object_object_get_ex(ctx->errRoot, "request", &onlyErrorRequests)) {
|
|
DBGPRINTF("omhttp: Failed to get request json array. Invalid context. Cannot "
|
|
"continue\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
fjson_object_array_add(onlyErrorRequests, fjson_object_new_string(request));
|
|
|
|
}
|
|
|
|
finalize_it:
|
|
RETiRet;
|
|
}
|
|
|
|
/*
|
|
* Dumps all requests of bulk insert interleaved with request and response
|
|
*/
|
|
|
|
static rsRetVal
|
|
getDataInterleaved(context *ctx,
|
|
int __attribute__((unused)) itemStatus,
|
|
char *request,
|
|
char *response,
|
|
fjson_object *response_item,
|
|
fjson_object *response_body,
|
|
fjson_object *status
|
|
)
|
|
{
|
|
DEFiRet;
|
|
(void)response_item; /* unused */
|
|
(void)response_body; /* unused */
|
|
(void)status; /* unused */
|
|
fjson_object *interleaved =NULL;
|
|
if(!fjson_object_object_get_ex(ctx->errRoot, "response", &interleaved)) {
|
|
DBGPRINTF("omhttp: Failed to get response json array. Invalid context. Cannot continue\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
fjson_object *interleavedNode=NULL;
|
|
/*create interleaved node that has req and response json data*/
|
|
if((interleavedNode=fjson_object_new_object()) == NULL)
|
|
{
|
|
DBGPRINTF("omhttp: Failed to create interleaved node. Cann't continue\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
fjson_object_object_add(interleavedNode,"request", fjson_object_new_string(request));
|
|
fjson_object_object_add(interleavedNode,"reply", fjson_object_new_string(response));
|
|
|
|
fjson_object_array_add(interleaved, interleavedNode);
|
|
|
|
|
|
|
|
finalize_it:
|
|
RETiRet;
|
|
}
|
|
|
|
|
|
/*
|
|
* Dumps only failed requests of bulk insert interleaved with request and response
|
|
*/
|
|
|
|
static rsRetVal
|
|
getDataErrorOnlyInterleaved(context *ctx,int itemStatus,char *request,char *response,
|
|
fjson_object *response_item, fjson_object *response_body, fjson_object *status)
|
|
{
|
|
DEFiRet;
|
|
if (itemStatus) {
|
|
if(getDataInterleaved(ctx, itemStatus,request,response,
|
|
response_item, response_body, status)!= RS_RET_OK) {
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
}
|
|
|
|
finalize_it:
|
|
RETiRet;
|
|
}
|
|
|
|
/* request string looks like this:
|
|
* "{\"create\":{\"_index\": \"rsyslog_testbench\",\"_type\":\"test-type\",
|
|
* \"_id\":\"FAEAFC0D17C847DA8BD6F47BC5B3800A\"}}\n
|
|
* {\"msgnum\":\"x00000000\",\"viaq_msg_id\":\"FAEAFC0D17C847DA8BD6F47BC5B3800A\"}\n"
|
|
* we don't want the meta header, only the data part
|
|
* start = first \n + 1
|
|
* end = last \n
|
|
*/
|
|
static rsRetVal
|
|
createMsgFromRequest(const char *request, context *ctx, smsg_t **msg)
|
|
{
|
|
DEFiRet;
|
|
fjson_object *jo_msg = NULL;
|
|
const char *datastart, *dataend;
|
|
size_t datalen;
|
|
enum json_tokener_error json_error;
|
|
|
|
*msg = NULL;
|
|
if (!(datastart = strchr(request, '\n')) || (datastart[1] != '{')) {
|
|
LogError(0, RS_RET_ERR,
|
|
"omhttp: malformed original request - "
|
|
"could not find start of original data [%s]",
|
|
request);
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
datastart++; /* advance to { */
|
|
if (!(dataend = strchr(datastart, '\n')) || (dataend[1] != '\0')) {
|
|
LogError(0, RS_RET_ERR,
|
|
"omhttp: malformed original request - "
|
|
"could not find end of original data [%s]",
|
|
request);
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
datalen = dataend - datastart;
|
|
json_tokener_reset(ctx->jTokener);
|
|
fjson_object *jo_request = json_tokener_parse_ex(ctx->jTokener, datastart, datalen);
|
|
json_error = fjson_tokener_get_error(ctx->jTokener);
|
|
if (!jo_request || (json_error != fjson_tokener_success)) {
|
|
LogError(0, RS_RET_ERR,
|
|
"omhttp: parse error [%s] - could not convert original "
|
|
"request JSON back into JSON object [%s]",
|
|
fjson_tokener_error_desc(json_error), request);
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
CHKiRet(msgConstruct(msg));
|
|
MsgSetFlowControlType(*msg, eFLOWCTL_FULL_DELAY);
|
|
MsgSetInputName(*msg, pInputName);
|
|
if (fjson_object_object_get_ex(jo_request, "message", &jo_msg)) {
|
|
const char *rawmsg = json_object_get_string(jo_msg);
|
|
const size_t msgLen = (size_t)json_object_get_string_len(jo_msg);
|
|
MsgSetRawMsg(*msg, rawmsg, msgLen);
|
|
} else {
|
|
MsgSetRawMsg(*msg, request, strlen(request));
|
|
}
|
|
MsgSetMSGoffs(*msg, 0); /* we do not have a header... */
|
|
CHKiRet(msgAddJSON(*msg, (uchar*)"!", jo_request, 0, 0));
|
|
|
|
finalize_it:
|
|
RETiRet;
|
|
|
|
}
|
|
|
|
|
|
static rsRetVal
|
|
getDataRetryFailures(context *ctx,int itemStatus,char *request,char *response,
|
|
fjson_object *response_item, fjson_object *response_body,
|
|
fjson_object *status __attribute__((unused)))
|
|
{
|
|
DEFiRet;
|
|
fjson_object *omes = NULL;
|
|
struct json_object_iterator it = json_object_iter_begin(response_item);
|
|
struct json_object_iterator itEnd = json_object_iter_end(response_item);
|
|
smsg_t *msg = NULL;
|
|
|
|
(void)response;
|
|
(void)itemStatus;
|
|
CHKiRet(createMsgFromRequest(request, ctx, &msg));
|
|
CHKmalloc(msg);
|
|
/* add status as local variables */
|
|
omes = json_object_new_object();
|
|
|
|
/* add response_body fields to local var omes */
|
|
it = json_object_iter_begin(response_body);
|
|
itEnd = json_object_iter_end(response_body);
|
|
while (!json_object_iter_equal(&it, &itEnd)) {
|
|
json_object_object_add(omes, json_object_iter_peek_name(&it),
|
|
json_object_get(json_object_iter_peek_value(&it)));
|
|
json_object_iter_next(&it);
|
|
}
|
|
CHKiRet(msgAddJSON(msg, (uchar*)".omes", omes, 0, 0));
|
|
omes = NULL;
|
|
MsgSetRuleset(msg, ctx->retryRuleset);
|
|
CHKiRet(ratelimitAddMsg(ctx->ratelimiter, NULL, msg));
|
|
finalize_it:
|
|
if (omes)
|
|
json_object_put(omes);
|
|
RETiRet;
|
|
}
|
|
|
|
/*
|
|
* get erroronly context
|
|
*/
|
|
static rsRetVal
|
|
initializeErrorOnlyConext(wrkrInstanceData_t *pWrkrData,context *ctx){
|
|
DEFiRet;
|
|
ctx->statusCheckOnly=0;
|
|
fjson_object *errRoot=NULL;
|
|
fjson_object *onlyErrorResponses =NULL;
|
|
fjson_object *onlyErrorRequests=NULL;
|
|
if((errRoot=fjson_object_new_object()) == NULL) ABORT_FINALIZE(RS_RET_ERR);
|
|
|
|
if((onlyErrorResponses=fjson_object_new_array()) == NULL) {
|
|
fjson_object_put(errRoot);
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
if((onlyErrorRequests=fjson_object_new_array()) == NULL) {
|
|
fjson_object_put(errRoot);
|
|
fjson_object_put(onlyErrorResponses);
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
fjson_object_object_add(errRoot, "url", fjson_object_new_string((char*)pWrkrData->restURL));
|
|
fjson_object_object_add(errRoot,"request",onlyErrorRequests);
|
|
fjson_object_object_add(errRoot, "reply", onlyErrorResponses);
|
|
ctx->errRoot = errRoot;
|
|
ctx->prepareErrorFileContent= &getDataErrorOnly;
|
|
finalize_it:
|
|
RETiRet;
|
|
}
|
|
|
|
/*
|
|
* get interleaved context
|
|
*/
|
|
static rsRetVal
|
|
initializeInterleavedConext(wrkrInstanceData_t *pWrkrData,context *ctx){
|
|
DEFiRet;
|
|
ctx->statusCheckOnly=0;
|
|
fjson_object *errRoot=NULL;
|
|
fjson_object *interleaved =NULL;
|
|
if((errRoot=fjson_object_new_object()) == NULL) ABORT_FINALIZE(RS_RET_ERR);
|
|
if((interleaved=fjson_object_new_array()) == NULL) {
|
|
fjson_object_put(errRoot);
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
|
|
fjson_object_object_add(errRoot, "url", fjson_object_new_string((char*)pWrkrData->restURL));
|
|
fjson_object_object_add(errRoot,"response",interleaved);
|
|
ctx->errRoot = errRoot;
|
|
ctx->prepareErrorFileContent= &getDataInterleaved;
|
|
finalize_it:
|
|
RETiRet;
|
|
}
|
|
|
|
/*get interleaved context*/
|
|
static rsRetVal
|
|
initializeErrorInterleavedConext(wrkrInstanceData_t *pWrkrData,context *ctx){
|
|
DEFiRet;
|
|
ctx->statusCheckOnly=0;
|
|
fjson_object *errRoot=NULL;
|
|
fjson_object *interleaved =NULL;
|
|
if((errRoot=fjson_object_new_object()) == NULL) ABORT_FINALIZE(RS_RET_ERR);
|
|
if((interleaved=fjson_object_new_array()) == NULL) {
|
|
fjson_object_put(errRoot);
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
|
|
fjson_object_object_add(errRoot, "url", fjson_object_new_string((char*)pWrkrData->restURL));
|
|
fjson_object_object_add(errRoot,"response",interleaved);
|
|
ctx->errRoot = errRoot;
|
|
ctx->prepareErrorFileContent= &getDataErrorOnlyInterleaved;
|
|
finalize_it:
|
|
RETiRet;
|
|
}
|
|
|
|
/*get retry failures context*/
|
|
static rsRetVal
|
|
initializeRetryFailuresContext(wrkrInstanceData_t *pWrkrData,context *ctx){
|
|
DEFiRet;
|
|
ctx->statusCheckOnly=0;
|
|
fjson_object *errRoot=NULL;
|
|
if((errRoot=fjson_object_new_object()) == NULL) ABORT_FINALIZE(RS_RET_ERR);
|
|
|
|
|
|
fjson_object_object_add(errRoot, "url", fjson_object_new_string((char*)pWrkrData->restURL));
|
|
ctx->errRoot = errRoot;
|
|
ctx->prepareErrorFileContent= &getDataRetryFailures;
|
|
CHKmalloc(ctx->jTokener = json_tokener_new());
|
|
finalize_it:
|
|
RETiRet;
|
|
}
|
|
|
|
|
|
/* write data error request/replies to separate error file
|
|
* Note: we open the file but never close it before exit. If it
|
|
* needs to be closed, HUP must be sent.
|
|
*/
|
|
static rsRetVal ATTR_NONNULL()
|
|
writeDataError(wrkrInstanceData_t *const pWrkrData,
|
|
instanceData *const pData, fjson_object **const pReplyRoot,
|
|
uchar *const reqmsg)
|
|
{
|
|
char *rendered = NULL;
|
|
size_t toWrite;
|
|
ssize_t wrRet;
|
|
sbool bMutLocked = 0;
|
|
context ctx;
|
|
ctx.errRoot=0;
|
|
ctx.ratelimiter = pWrkrData->pData->ratelimiter;
|
|
ctx.retryRuleset = pWrkrData->pData->retryRuleset;
|
|
ctx.jTokener = NULL;
|
|
DEFiRet;
|
|
|
|
if(pData->errorFile == NULL) {
|
|
DBGPRINTF("omhttp: no local error logger defined - "
|
|
"ignoring REST error information\n");
|
|
FINALIZE;
|
|
}
|
|
|
|
pthread_mutex_lock(&pData->mutErrFile);
|
|
bMutLocked = 1;
|
|
|
|
DBGPRINTF("omhttp: error file mode: erroronly='%d' errorInterleaved='%d'\n",
|
|
pData->errorOnly, pData->interleaved);
|
|
|
|
if(pData->interleaved ==0 && pData->errorOnly ==0)/*default write*/
|
|
{
|
|
if(getDataErrorDefault(pWrkrData,pReplyRoot, reqmsg, &rendered) != RS_RET_OK) {
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
} else {
|
|
/*get correct context.*/
|
|
if(pData->interleaved && pData->errorOnly)
|
|
{
|
|
if(initializeErrorInterleavedConext(pWrkrData, &ctx) != RS_RET_OK) {
|
|
DBGPRINTF("omhttp: error initializing error interleaved context.\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
} else if(pData->errorOnly) {
|
|
if(initializeErrorOnlyConext(pWrkrData, &ctx) != RS_RET_OK) {
|
|
|
|
DBGPRINTF("omhttp: error initializing error only context.\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
} else if(pData->interleaved) {
|
|
if(initializeInterleavedConext(pWrkrData, &ctx) != RS_RET_OK) {
|
|
DBGPRINTF("omhttp: error initializing error interleaved context.\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
} else if(pData->retryFailures) {
|
|
if(initializeRetryFailuresContext(pWrkrData, &ctx) != RS_RET_OK) {
|
|
DBGPRINTF("omhttp: error initializing retry failures context.\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
} else {
|
|
DBGPRINTF("omhttp: None of the modes match file write. No data to write.\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
/*execute context*/
|
|
if(parseRequestAndResponseForContext(pWrkrData, pReplyRoot, reqmsg, &ctx)!= RS_RET_OK) {
|
|
DBGPRINTF("omhttp: error creating file content.\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
CHKmalloc(rendered = strdup((char*)fjson_object_to_json_string(ctx.errRoot)));
|
|
}
|
|
|
|
|
|
if(pData->fdErrFile == -1) {
|
|
pData->fdErrFile = open((char*)pData->errorFile,
|
|
O_WRONLY|O_CREAT|O_APPEND|O_LARGEFILE|O_CLOEXEC,
|
|
S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP);
|
|
if(pData->fdErrFile == -1) {
|
|
LogError(errno, RS_RET_ERR, "omhttp: error opening error file %s",
|
|
pData->errorFile);
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
}
|
|
|
|
/* we do not do real error-handling on the err file, as this finally complicates
|
|
* things way to much.
|
|
*/
|
|
DBGPRINTF("omhttp: error record: '%s'\n", rendered);
|
|
toWrite = strlen(rendered) + 1;
|
|
/* Note: we overwrite the '\0' terminator with '\n' -- so we avoid
|
|
* caling malloc() -- write() does NOT need '\0'!
|
|
*/
|
|
rendered[toWrite-1] = '\n'; /* NO LONGER A STRING! */
|
|
wrRet = write(pData->fdErrFile, rendered, toWrite);
|
|
if(wrRet != (ssize_t) toWrite) {
|
|
LogError(errno, RS_RET_IO_ERROR,
|
|
"omhttp: error writing error file %s, write returned %lld",
|
|
pData->errorFile, (long long) wrRet);
|
|
}
|
|
|
|
finalize_it:
|
|
if(bMutLocked)
|
|
pthread_mutex_unlock(&pData->mutErrFile);
|
|
free(rendered);
|
|
fjson_object_put(ctx.errRoot);
|
|
if (ctx.jTokener)
|
|
json_tokener_free(ctx.jTokener);
|
|
RETiRet;
|
|
}
|
|
|
|
|
|
static rsRetVal
|
|
checkResultBulkmode(wrkrInstanceData_t *pWrkrData, fjson_object *root, uchar *reqmsg)
|
|
{
|
|
DEFiRet;
|
|
context ctx;
|
|
ctx.errRoot = 0;
|
|
ctx.ratelimiter = pWrkrData->pData->ratelimiter;
|
|
ctx.retryRuleset = pWrkrData->pData->retryRuleset;
|
|
ctx.statusCheckOnly=1;
|
|
ctx.jTokener = NULL;
|
|
if (pWrkrData->pData->retryFailures) {
|
|
ctx.statusCheckOnly=0;
|
|
CHKiRet(initializeRetryFailuresContext(pWrkrData, &ctx));
|
|
}
|
|
|
|
if(parseRequestAndResponseForContext(pWrkrData,&root,reqmsg,&ctx)!= RS_RET_OK) {
|
|
DBGPRINTF("omhttp: error found in http reply\n");
|
|
ABORT_FINALIZE(RS_RET_DATAFAIL);
|
|
}
|
|
|
|
finalize_it:
|
|
fjson_object_put(ctx.errRoot);
|
|
if (ctx.jTokener)
|
|
json_tokener_free(ctx.jTokener);
|
|
RETiRet;
|
|
}
|
|
|
|
|
|
static rsRetVal
|
|
checkResult(wrkrInstanceData_t *pWrkrData, uchar *reqmsg)
|
|
{
|
|
fjson_object *root;
|
|
fjson_object *status;
|
|
DEFiRet;
|
|
|
|
root = fjson_tokener_parse(pWrkrData->reply);
|
|
if(root == NULL) {
|
|
LogMsg(0, RS_RET_ERR, LOG_WARNING,
|
|
"omhttp: could not parse JSON result");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
if(pWrkrData->pData->bulkmode) {
|
|
iRet = checkResultBulkmode(pWrkrData, root, reqmsg);
|
|
} else {
|
|
if(fjson_object_object_get_ex(root, "status", &status)) {
|
|
iRet = RS_RET_DATAFAIL;
|
|
}
|
|
}
|
|
|
|
/* Note: we ignore errors writing the error file, as we cannot handle
|
|
* these in any case.
|
|
*/
|
|
if(iRet == RS_RET_DATAFAIL) {
|
|
writeDataError(pWrkrData, pWrkrData->pData, &root, reqmsg);
|
|
iRet = RS_RET_OK; /* we have handled the problem! */
|
|
}
|
|
|
|
finalize_it:
|
|
if(root != NULL)
|
|
fjson_object_put(root);
|
|
RETiRet;
|
|
}
|
|
|
|
static void ATTR_NONNULL()
|
|
initializeBatch(wrkrInstanceData_t *pWrkrData)
|
|
{
|
|
es_emptyStr(pWrkrData->batch.data);
|
|
pWrkrData->batch.nmemb = 0;
|
|
}
|
|
|
|
static rsRetVal ATTR_NONNULL(1, 2)
|
|
curlPost(wrkrInstanceData_t *pWrkrData, uchar *message, int msglen, uchar **tpls,
|
|
const int nmsgs __attribute__((unused)))
|
|
{
|
|
CURLcode code;
|
|
CURL *const curl = pWrkrData->curlPostHandle;
|
|
char errbuf[CURL_ERROR_SIZE] = "";
|
|
DEFiRet;
|
|
|
|
PTR_ASSERT_SET_TYPE(pWrkrData, WRKR_DATA_TYPE_ES);
|
|
|
|
pWrkrData->reply = NULL;
|
|
pWrkrData->replyLen = 0;
|
|
|
|
if(pWrkrData->pData->numServers > 1) {
|
|
/* needs to be called to support ES HA feature */
|
|
CHKiRet(checkConn(pWrkrData));
|
|
}
|
|
CHKiRet(setPostURL(pWrkrData, tpls));
|
|
|
|
pWrkrData->reply = NULL;
|
|
pWrkrData->replyLen = 0;
|
|
|
|
curl_easy_setopt(curl, CURLOPT_POSTFIELDS, (char *)message);
|
|
curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, msglen);
|
|
curl_easy_setopt(curl, CURLOPT_ERRORBUFFER, errbuf);
|
|
code = curl_easy_perform(curl);
|
|
DBGPRINTF("curl returned %lld\n", (long long) code);
|
|
if (code != CURLE_OK && code != CURLE_HTTP_RETURNED_ERROR) {
|
|
LogError(0, RS_RET_SUSPENDED,
|
|
"omhttp: we are suspending ourselfs due "
|
|
"to server failure %lld: %s", (long long) code, errbuf);
|
|
ABORT_FINALIZE(RS_RET_SUSPENDED);
|
|
}
|
|
|
|
if(pWrkrData->reply == NULL) {
|
|
DBGPRINTF("omhttp: pWrkrData reply==NULL, replyLen = '%d'\n",
|
|
pWrkrData->replyLen);
|
|
} else {
|
|
DBGPRINTF("omhttp: pWrkrData replyLen = '%d'\n", pWrkrData->replyLen);
|
|
if(pWrkrData->replyLen > 0) {
|
|
pWrkrData->reply[pWrkrData->replyLen] = '\0';
|
|
/* Append 0 Byte if replyLen is above 0 - byte has been reserved in malloc */
|
|
}
|
|
//TODO: replyLen++? because 0 Byte is appended
|
|
DBGPRINTF("omhttp: pWrkrData reply: '%s'\n", pWrkrData->reply);
|
|
CHKiRet(checkResult(pWrkrData, message));
|
|
}
|
|
|
|
finalize_it:
|
|
incrementServerIndex(pWrkrData);
|
|
free(pWrkrData->reply);
|
|
pWrkrData->reply = NULL; /* don't leave dangling pointer */
|
|
RETiRet;
|
|
}
|
|
|
|
static rsRetVal
|
|
submitBatch(wrkrInstanceData_t *pWrkrData)
|
|
{
|
|
char *cstr = NULL;
|
|
DEFiRet;
|
|
|
|
cstr = es_str2cstr(pWrkrData->batch.data, NULL);
|
|
dbgprintf("omhttp: submitBatch, batch: '%s'\n", cstr);
|
|
|
|
CHKiRet(curlPost(pWrkrData, (uchar*) cstr, strlen(cstr), NULL, pWrkrData->batch.nmemb));
|
|
|
|
finalize_it:
|
|
free(cstr);
|
|
RETiRet;
|
|
}
|
|
|
|
BEGINbeginTransaction
|
|
CODESTARTbeginTransaction
|
|
if(!pWrkrData->pData->bulkmode) {
|
|
FINALIZE;
|
|
}
|
|
|
|
initializeBatch(pWrkrData);
|
|
finalize_it:
|
|
ENDbeginTransaction
|
|
|
|
BEGINdoAction
|
|
CODESTARTdoAction
|
|
|
|
if(pWrkrData->pData->bulkmode) {
|
|
const size_t nBytes = ustrlen((char *)ppString[0]) + sizeof("\n")-1 ;
|
|
|
|
/* If max bytes is set and this next message will put us over the limit,
|
|
* submit the current buffer and reset */
|
|
if(pWrkrData->pData->maxbytes > 0
|
|
&& es_strlen(pWrkrData->batch.data) + nBytes > pWrkrData->pData->maxbytes ) {
|
|
dbgprintf("omhttp: maxbytes limit reached, submitting partial "
|
|
"batch of %d elements.\n", pWrkrData->batch.nmemb);
|
|
CHKiRet(submitBatch(pWrkrData));
|
|
initializeBatch(pWrkrData);
|
|
}
|
|
CHKiRet(buildBatch(pWrkrData, ppString[0]));
|
|
|
|
/* If there is only one item in the batch, all previous items have been
|
|
* submitted or this is the first item for this transaction. Return previous
|
|
* committed so that all items leading up to the current (exclusive)
|
|
* are not replayed should a failure occur anywhere else in the transaction. */
|
|
iRet = pWrkrData->batch.nmemb == 1 ? RS_RET_PREVIOUS_COMMITTED : RS_RET_DEFER_COMMIT;
|
|
} else {
|
|
CHKiRet(curlPost(pWrkrData, ppString[0], strlen((char*)ppString[0]),
|
|
ppString, 1));
|
|
}
|
|
finalize_it:
|
|
ENDdoAction
|
|
|
|
|
|
BEGINendTransaction
|
|
CODESTARTendTransaction
|
|
/* End Transaction only if batch data is not empty */
|
|
if (pWrkrData->batch.data != NULL && pWrkrData->batch.nmemb > 0) {
|
|
CHKiRet(submitBatch(pWrkrData));
|
|
} else {
|
|
dbgprintf("omhttp: endTransaction, pWrkrData->batch.data is NULL, "
|
|
"nothing to send. \n");
|
|
}
|
|
finalize_it:
|
|
ENDendTransaction
|
|
|
|
/* Creates authentication header uid:pwd
|
|
*/
|
|
static rsRetVal
|
|
computeAuthHeader(char* uid, char* pwd, uchar** authBuf) {
|
|
int r;
|
|
DEFiRet;
|
|
|
|
es_str_t* auth = es_newStr(1024);
|
|
if (auth == NULL) {
|
|
LogError(0, RS_RET_OUT_OF_MEMORY,
|
|
"omhttp: failed to allocate es_str auth for auth header construction");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
r = es_addBuf(&auth, uid, strlen(uid));
|
|
if(r == 0) r = es_addChar(&auth, ':');
|
|
if(r == 0 && pwd != NULL) r = es_addBuf(&auth, pwd, strlen(pwd));
|
|
if(r == 0) *authBuf = (uchar*) es_str2cstr(auth, NULL);
|
|
|
|
if (r != 0 || *authBuf == NULL) {
|
|
LogError(0, RS_RET_ERR, "omhttp: failed to build auth header\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
finalize_it:
|
|
if (auth != NULL)
|
|
es_deleteStr(auth);
|
|
RETiRet;
|
|
}
|
|
|
|
static rsRetVal
|
|
computeApiHeader(char* key, char* value, uchar** headerBuf) {
|
|
int r;
|
|
DEFiRet;
|
|
|
|
es_str_t* header = es_newStr(10240);
|
|
if (header == NULL) {
|
|
LogError(0, RS_RET_OUT_OF_MEMORY,
|
|
"omhttp: failed to allocate es_str auth for api header construction");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
r = es_addBuf(&header, key, strlen(key));
|
|
if(r == 0) r = es_addChar(&header, ':');
|
|
if(r == 0) r = es_addChar(&header, ' ');
|
|
if(r == 0 && value != NULL) r = es_addBuf(&header, value, strlen(value));
|
|
if(r == 0) *headerBuf = (uchar*) es_str2cstr(header, NULL);
|
|
|
|
if (r != 0 || *headerBuf == NULL) {
|
|
LogError(0, RS_RET_ERR, "omhttp: failed to build http header\n");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
finalize_it:
|
|
if (header != NULL)
|
|
es_deleteStr(header);
|
|
RETiRet;
|
|
}
|
|
|
|
static void ATTR_NONNULL()
|
|
curlSetupCommon(wrkrInstanceData_t *const pWrkrData, CURL *const handle)
|
|
{
|
|
PTR_ASSERT_SET_TYPE(pWrkrData, WRKR_DATA_TYPE_ES);
|
|
curl_easy_setopt(handle, CURLOPT_HTTPHEADER, pWrkrData->curlHeader);
|
|
curl_easy_setopt(handle, CURLOPT_NOSIGNAL, TRUE);
|
|
curl_easy_setopt(handle, CURLOPT_WRITEFUNCTION, curlResult);
|
|
curl_easy_setopt(handle, CURLOPT_WRITEDATA, pWrkrData);
|
|
if(pWrkrData->pData->allowUnsignedCerts)
|
|
curl_easy_setopt(handle, CURLOPT_SSL_VERIFYPEER, FALSE);
|
|
if(pWrkrData->pData->authBuf != NULL) {
|
|
curl_easy_setopt(handle, CURLOPT_USERPWD, pWrkrData->pData->authBuf);
|
|
curl_easy_setopt(handle, CURLOPT_PROXYAUTH, CURLAUTH_ANY);
|
|
}
|
|
if(pWrkrData->pData->caCertFile)
|
|
curl_easy_setopt(handle, CURLOPT_CAINFO, pWrkrData->pData->caCertFile);
|
|
if(pWrkrData->pData->myCertFile)
|
|
curl_easy_setopt(handle, CURLOPT_SSLCERT, pWrkrData->pData->myCertFile);
|
|
if(pWrkrData->pData->myPrivKeyFile)
|
|
curl_easy_setopt(handle, CURLOPT_SSLKEY, pWrkrData->pData->myPrivKeyFile);
|
|
/* uncomment for in-dept debuggung:
|
|
curl_easy_setopt(handle, CURLOPT_VERBOSE, TRUE); */
|
|
}
|
|
|
|
static void ATTR_NONNULL()
|
|
curlCheckConnSetup(wrkrInstanceData_t *const pWrkrData)
|
|
{
|
|
PTR_ASSERT_SET_TYPE(pWrkrData, WRKR_DATA_TYPE_ES);
|
|
curlSetupCommon(pWrkrData, pWrkrData->curlCheckConnHandle);
|
|
curl_easy_setopt(pWrkrData->curlCheckConnHandle,
|
|
CURLOPT_TIMEOUT_MS, pWrkrData->pData->healthCheckTimeout);
|
|
}
|
|
|
|
static void ATTR_NONNULL(1)
|
|
curlPostSetup(wrkrInstanceData_t *const pWrkrData)
|
|
{
|
|
PTR_ASSERT_SET_TYPE(pWrkrData, WRKR_DATA_TYPE_ES);
|
|
curlSetupCommon(pWrkrData, pWrkrData->curlPostHandle);
|
|
curl_easy_setopt(pWrkrData->curlPostHandle, CURLOPT_POST, 1);
|
|
}
|
|
|
|
#define CONTENT_JSON "Content-Type: application/json; charset=utf-8"
|
|
|
|
static rsRetVal ATTR_NONNULL()
|
|
curlSetup(wrkrInstanceData_t *const pWrkrData)
|
|
{
|
|
struct curl_slist *slist=NULL;
|
|
|
|
DEFiRet;
|
|
slist = curl_slist_append(slist, CONTENT_JSON);
|
|
if (pWrkrData->pData->headerBuf != NULL) {
|
|
slist = curl_slist_append(slist, (char*) pWrkrData->pData->headerBuf);
|
|
}
|
|
pWrkrData->curlHeader = slist;
|
|
CHKmalloc(pWrkrData->curlPostHandle = curl_easy_init());;
|
|
curlPostSetup(pWrkrData);
|
|
|
|
CHKmalloc(pWrkrData->curlCheckConnHandle = curl_easy_init());
|
|
curlCheckConnSetup(pWrkrData);
|
|
|
|
finalize_it:
|
|
if(iRet != RS_RET_OK && pWrkrData->curlPostHandle != NULL) {
|
|
curl_easy_cleanup(pWrkrData->curlPostHandle);
|
|
pWrkrData->curlPostHandle = NULL;
|
|
}
|
|
RETiRet;
|
|
}
|
|
|
|
static void ATTR_NONNULL()
|
|
setInstParamDefaults(instanceData *const pData)
|
|
{
|
|
pData->serverBaseUrls = NULL;
|
|
pData->defaultPort = 443;
|
|
pData->healthCheckTimeout = 3500;
|
|
pData->uid = NULL;
|
|
pData->httpheaderkey = NULL;
|
|
pData->httpheadervalue = NULL;
|
|
pData->pwd = NULL;
|
|
pData->authBuf = NULL;
|
|
pData->restPath = NULL;
|
|
pData->checkPath = NULL;
|
|
pData->dynRestPath = 0;
|
|
pData->bulkmode = 1;
|
|
pData->useHttps = 1;
|
|
pData->maxbytes = 10485760; //i.e. 10 MB Is the default max message size for AWS API Gateway
|
|
pData->allowUnsignedCerts = 0;
|
|
pData->tplName = NULL;
|
|
pData->errorFile = NULL;
|
|
pData->errorOnly=0;
|
|
pData->interleaved=0;
|
|
pData->caCertFile = NULL;
|
|
pData->myCertFile = NULL;
|
|
pData->myPrivKeyFile = NULL;
|
|
pData->retryFailures = 0;
|
|
pData->ratelimitBurst = 20000;
|
|
pData->ratelimitInterval = 600;
|
|
pData->ratelimiter = NULL;
|
|
pData->retryRulesetName = NULL;
|
|
pData->retryRuleset = NULL;
|
|
}
|
|
|
|
BEGINnewActInst
|
|
struct cnfparamvals *pvals;
|
|
char* serverParam = NULL;
|
|
struct cnfarray* servers = NULL;
|
|
int i;
|
|
int iNumTpls;
|
|
FILE *fp;
|
|
char errStr[1024];
|
|
CODESTARTnewActInst
|
|
if((pvals = nvlstGetParams(lst, &actpblk, NULL)) == NULL) {
|
|
ABORT_FINALIZE(RS_RET_MISSING_CNFPARAMS);
|
|
}
|
|
|
|
CHKiRet(createInstance(&pData));
|
|
setInstParamDefaults(pData);
|
|
|
|
for(i = 0 ; i < actpblk.nParams ; ++i) {
|
|
if(!pvals[i].bUsed)
|
|
continue;
|
|
if(!strcmp(actpblk.descr[i].name, "server")) {
|
|
servers = pvals[i].val.d.ar;
|
|
} else if(!strcmp(actpblk.descr[i].name, "errorfile")) {
|
|
pData->errorFile = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
|
|
} else if(!strcmp(actpblk.descr[i].name, "erroronly")) {
|
|
pData->errorOnly = pvals[i].val.d.n;
|
|
} else if(!strcmp(actpblk.descr[i].name, "interleaved")) {
|
|
pData->interleaved = pvals[i].val.d.n;
|
|
} else if(!strcmp(actpblk.descr[i].name, "serverport")) {
|
|
pData->defaultPort = (int) pvals[i].val.d.n;
|
|
} else if(!strcmp(actpblk.descr[i].name, "healthchecktimeout")) {
|
|
pData->healthCheckTimeout = (long) pvals[i].val.d.n;
|
|
} else if(!strcmp(actpblk.descr[i].name, "uid")) {
|
|
pData->uid = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
|
|
} else if(!strcmp(actpblk.descr[i].name, "httpheaderkey")) {
|
|
pData->httpheaderkey = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
|
|
} else if(!strcmp(actpblk.descr[i].name, "httpheadervalue")) {
|
|
pData->httpheadervalue = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
|
|
} else if(!strcmp(actpblk.descr[i].name, "pwd")) {
|
|
pData->pwd = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
|
|
} else if(!strcmp(actpblk.descr[i].name, "restpath")) {
|
|
pData->restPath = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
|
|
} else if(!strcmp(actpblk.descr[i].name, "checkpath")) {
|
|
pData->checkPath = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
|
|
} else if(!strcmp(actpblk.descr[i].name, "dynrestpath")) {
|
|
pData->dynRestPath = pvals[i].val.d.n;
|
|
} else if(!strcmp(actpblk.descr[i].name, "bulkmode")) {
|
|
pData->bulkmode = pvals[i].val.d.n;
|
|
} else if(!strcmp(actpblk.descr[i].name, "maxbytes")) {
|
|
pData->maxbytes = (size_t) pvals[i].val.d.n;
|
|
} else if(!strcmp(actpblk.descr[i].name, "allowunsignedcerts")) {
|
|
pData->allowUnsignedCerts = pvals[i].val.d.n;
|
|
} else if(!strcmp(actpblk.descr[i].name, "usehttps")) {
|
|
pData->useHttps = pvals[i].val.d.n;
|
|
} else if(!strcmp(actpblk.descr[i].name, "template")) {
|
|
pData->tplName = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
|
|
} else if(!strcmp(actpblk.descr[i].name, "tls.cacert")) {
|
|
pData->caCertFile = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
|
|
fp = fopen((const char*)pData->caCertFile, "r");
|
|
if(fp == NULL) {
|
|
rs_strerror_r(errno, errStr, sizeof(errStr));
|
|
LogError(0, RS_RET_NO_FILE_ACCESS,
|
|
"error: 'tls.cacert' file %s couldn't be accessed: %s\n",
|
|
pData->caCertFile, errStr);
|
|
} else {
|
|
fclose(fp);
|
|
}
|
|
} else if(!strcmp(actpblk.descr[i].name, "tls.mycert")) {
|
|
pData->myCertFile = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
|
|
fp = fopen((const char*)pData->myCertFile, "r");
|
|
if(fp == NULL) {
|
|
rs_strerror_r(errno, errStr, sizeof(errStr));
|
|
LogError(0, RS_RET_NO_FILE_ACCESS,
|
|
"error: 'tls.mycert' file %s couldn't be accessed: %s\n",
|
|
pData->myCertFile, errStr);
|
|
} else {
|
|
fclose(fp);
|
|
}
|
|
} else if(!strcmp(actpblk.descr[i].name, "tls.myprivkey")) {
|
|
pData->myPrivKeyFile = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
|
|
fp = fopen((const char*)pData->myPrivKeyFile, "r");
|
|
if(fp == NULL) {
|
|
rs_strerror_r(errno, errStr, sizeof(errStr));
|
|
LogError(0, RS_RET_NO_FILE_ACCESS,
|
|
"error: 'tls.myprivkey' file %s couldn't be accessed: %s\n",
|
|
pData->myPrivKeyFile, errStr);
|
|
} else {
|
|
fclose(fp);
|
|
}
|
|
} else if(!strcmp(actpblk.descr[i].name, "retryfailures")) {
|
|
pData->retryFailures = pvals[i].val.d.n;
|
|
} else if(!strcmp(actpblk.descr[i].name, "ratelimit.burst")) {
|
|
pData->ratelimitBurst = (int) pvals[i].val.d.n;
|
|
} else if(!strcmp(actpblk.descr[i].name, "ratelimit.interval")) {
|
|
pData->ratelimitInterval = (int) pvals[i].val.d.n;
|
|
} else if(!strcmp(actpblk.descr[i].name, "retryruleset")) {
|
|
pData->retryRulesetName = (uchar*)es_str2cstr(pvals[i].val.d.estr, NULL);
|
|
} else {
|
|
LogError(0, RS_RET_INTERNAL_ERROR, "omhttp: program error, "
|
|
"non-handled param '%s'", actpblk.descr[i].name);
|
|
}
|
|
}
|
|
|
|
if(pData->pwd != NULL && pData->uid == NULL) {
|
|
LogError(0, RS_RET_UID_MISSING,
|
|
"omhttp: password is provided, but no uid "
|
|
"- action definition invalid");
|
|
ABORT_FINALIZE(RS_RET_UID_MISSING);
|
|
}
|
|
if(pData->httpheaderkey != NULL && pData->httpheadervalue == NULL) {
|
|
LogError(0, RS_RET_UID_MISSING,
|
|
"omhttp: http header key is provided, but no http header value "
|
|
"- action definition invalid");
|
|
ABORT_FINALIZE(RS_RET_UID_MISSING);
|
|
}
|
|
if(pData->dynRestPath && pData->restPath == NULL) {
|
|
LogError(0, RS_RET_CONFIG_ERROR,
|
|
"omhttp: requested dynamic rest path, but no name for rest "
|
|
"path template given - action definition invalid");
|
|
ABORT_FINALIZE(RS_RET_CONFIG_ERROR);
|
|
}
|
|
|
|
if (pData->uid != NULL)
|
|
CHKiRet(computeAuthHeader((char*) pData->uid, (char*) pData->pwd, &pData->authBuf));
|
|
if (pData->httpheaderkey != NULL)
|
|
CHKiRet(computeApiHeader((char*) pData->httpheaderkey,
|
|
(char*) pData->httpheadervalue, &pData->headerBuf));
|
|
|
|
iNumTpls = 1;
|
|
if(pData->dynRestPath) ++iNumTpls;
|
|
DBGPRINTF("omhttp: requesting %d templates\n", iNumTpls);
|
|
CODE_STD_STRING_REQUESTnewActInst(iNumTpls)
|
|
|
|
CHKiRet(OMSRsetEntry(*ppOMSR, 0, (uchar*)strdup((pData->tplName == NULL) ?
|
|
" StdJSONFmt" : (char*)pData->tplName),
|
|
OMSR_NO_RQD_TPL_OPTS));
|
|
|
|
|
|
/* we need to request additional templates. If we have a dynamic search index,
|
|
* it will always be string 1. Type may be 1 or 2, depending on whether search
|
|
* index is dynamic as well. Rule needs to be followed throughout the module.
|
|
*/
|
|
iNumTpls = 1;
|
|
if(pData->dynRestPath) {
|
|
CHKiRet(OMSRsetEntry(*ppOMSR, iNumTpls, ustrdup(pData->restPath),
|
|
OMSR_NO_RQD_TPL_OPTS));
|
|
++iNumTpls;
|
|
}
|
|
|
|
if (servers != NULL) {
|
|
pData->numServers = servers->nmemb;
|
|
pData->serverBaseUrls = malloc(servers->nmemb * sizeof(uchar*));
|
|
if (pData->serverBaseUrls == NULL) {
|
|
LogError(0, RS_RET_ERR, "omhttp: unable to allocate buffer "
|
|
"for http server configuration.");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
|
|
for(i = 0 ; i < servers->nmemb ; ++i) {
|
|
serverParam = es_str2cstr(servers->arr[i], NULL);
|
|
if (serverParam == NULL) {
|
|
LogError(0, RS_RET_ERR, "omhttp: unable to allocate buffer "
|
|
"for http server configuration.");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
/* Remove a trailing slash if it exists */
|
|
const size_t serverParamLastChar = strlen(serverParam)-1;
|
|
if (serverParam[serverParamLastChar] == '/') {
|
|
serverParam[serverParamLastChar] = '\0';
|
|
}
|
|
CHKiRet(computeBaseUrl(serverParam, pData->defaultPort, pData->useHttps,
|
|
pData->serverBaseUrls + i));
|
|
free(serverParam);
|
|
serverParam = NULL;
|
|
}
|
|
} else {
|
|
LogMsg(0, RS_RET_OK, LOG_WARNING,
|
|
"omhttp: No servers specified, using localhost");
|
|
pData->numServers = 1;
|
|
pData->serverBaseUrls = malloc(sizeof(uchar*));
|
|
if (pData->serverBaseUrls == NULL) {
|
|
LogError(0, RS_RET_ERR, "omhttp: unable to allocate buffer "
|
|
"for http server configuration.");
|
|
ABORT_FINALIZE(RS_RET_ERR);
|
|
}
|
|
CHKiRet(computeBaseUrl("localhost", pData->defaultPort, pData->useHttps, pData->serverBaseUrls));
|
|
}
|
|
|
|
if (pData->retryFailures) {
|
|
CHKiRet(ratelimitNew(&pData->ratelimiter, "omhttp", NULL));
|
|
ratelimitSetLinuxLike(pData->ratelimiter, pData->ratelimitInterval, pData->ratelimitBurst);
|
|
ratelimitSetNoTimeCache(pData->ratelimiter);
|
|
}
|
|
|
|
/* node created, let's add to list of instance configs for the module */
|
|
if(loadModConf->tail == NULL) {
|
|
loadModConf->tail = loadModConf->root = pData;
|
|
} else {
|
|
loadModConf->tail->next = pData;
|
|
loadModConf->tail = pData;
|
|
}
|
|
|
|
CODE_STD_FINALIZERnewActInst
|
|
cnfparamvalsDestruct(pvals, &actpblk);
|
|
if (serverParam)
|
|
free(serverParam);
|
|
ENDnewActInst
|
|
|
|
|
|
BEGINbeginCnfLoad
|
|
CODESTARTbeginCnfLoad
|
|
loadModConf = pModConf;
|
|
pModConf->pConf = pConf;
|
|
pModConf->root = pModConf->tail = NULL;
|
|
ENDbeginCnfLoad
|
|
|
|
|
|
BEGINendCnfLoad
|
|
CODESTARTendCnfLoad
|
|
loadModConf = NULL; /* done loading */
|
|
ENDendCnfLoad
|
|
|
|
|
|
BEGINcheckCnf
|
|
instanceConf_t *inst;
|
|
CODESTARTcheckCnf
|
|
for(inst = pModConf->root ; inst != NULL ; inst = inst->next) {
|
|
ruleset_t *pRuleset;
|
|
rsRetVal localRet;
|
|
|
|
if (inst->retryRulesetName) {
|
|
localRet = ruleset.GetRuleset(pModConf->pConf, &pRuleset, inst->retryRulesetName);
|
|
if(localRet == RS_RET_NOT_FOUND) {
|
|
LogError(0, localRet, "omhttp: retryruleset '%s' not found - "
|
|
"no retry ruleset will be used", inst->retryRulesetName);
|
|
} else {
|
|
inst->retryRuleset = pRuleset;
|
|
}
|
|
}
|
|
}
|
|
ENDcheckCnf
|
|
|
|
|
|
BEGINactivateCnf
|
|
CODESTARTactivateCnf
|
|
ENDactivateCnf
|
|
|
|
|
|
BEGINfreeCnf
|
|
CODESTARTfreeCnf
|
|
ENDfreeCnf
|
|
|
|
|
|
BEGINdoHUP
|
|
CODESTARTdoHUP
|
|
if(pData->fdErrFile != -1) {
|
|
close(pData->fdErrFile);
|
|
pData->fdErrFile = -1;
|
|
}
|
|
ENDdoHUP
|
|
|
|
|
|
BEGINmodExit
|
|
CODESTARTmodExit
|
|
if(pInputName != NULL)
|
|
prop.Destruct(&pInputName);
|
|
curl_global_cleanup();
|
|
objRelease(prop, CORE_COMPONENT);
|
|
objRelease(ruleset, CORE_COMPONENT);
|
|
ENDmodExit
|
|
|
|
NO_LEGACY_CONF_parseSelectorAct
|
|
|
|
BEGINqueryEtryPt
|
|
CODESTARTqueryEtryPt
|
|
CODEqueryEtryPt_STD_OMOD_QUERIES
|
|
CODEqueryEtryPt_STD_OMOD8_QUERIES
|
|
CODEqueryEtryPt_IsCompatibleWithFeature_IF_OMOD_QUERIES
|
|
CODEqueryEtryPt_STD_CONF2_OMOD_QUERIES
|
|
CODEqueryEtryPt_doHUP
|
|
CODEqueryEtryPt_TXIF_OMOD_QUERIES /* we support the transactional interface! */
|
|
CODEqueryEtryPt_STD_CONF2_QUERIES
|
|
ENDqueryEtryPt
|
|
|
|
|
|
BEGINmodInit()
|
|
CODESTARTmodInit
|
|
*ipIFVersProvided = CURR_MOD_IF_VERSION; /* we only support the current interface specification */
|
|
CODEmodInit_QueryRegCFSLineHdlr
|
|
CHKiRet(objUse(prop, CORE_COMPONENT));
|
|
CHKiRet(objUse(ruleset, CORE_COMPONENT));
|
|
|
|
if (curl_global_init(CURL_GLOBAL_ALL) != 0) {
|
|
LogError(0, RS_RET_OBJ_CREATION_FAILED, "CURL fail. -http disabled");
|
|
ABORT_FINALIZE(RS_RET_OBJ_CREATION_FAILED);
|
|
}
|
|
|
|
CHKiRet(prop.Construct(&pInputName));
|
|
CHKiRet(prop.SetString(pInputName, UCHAR_CONSTANT("omhttp"), sizeof("omhttp") - 1));
|
|
CHKiRet(prop.ConstructFinalize(pInputName));
|
|
ENDmodInit
|
|
|
|
/* vi:set ai:
|
|
*/
|