xref: /openbmc/bmcweb/features/redfish/include/redfish_aggregator.hpp (revision 4a7fbefdff330f06d5698a1e60ce893225cd389e)
17fb33566SCarson Labrado #pragma once
27fb33566SCarson Labrado 
33ccb3adbSEd Tanous #include "aggregation_utils.hpp"
43ccb3adbSEd Tanous #include "dbus_utility.hpp"
53ccb3adbSEd Tanous #include "error_messages.hpp"
63ccb3adbSEd Tanous #include "http_client.hpp"
73ccb3adbSEd Tanous #include "http_connection.hpp"
818f8f608SEd Tanous #include "parsing.hpp"
97fb33566SCarson Labrado 
107e8890c5SCarson Labrado #include <array>
113544d2a7SEd Tanous #include <ranges>
123544d2a7SEd Tanous #include <string_view>
137e8890c5SCarson Labrado 
147fb33566SCarson Labrado namespace redfish
157fb33566SCarson Labrado {
167fb33566SCarson Labrado 
17d14a48ffSCarson Labrado constexpr unsigned int aggregatorReadBodyLimit = 50 * 1024 * 1024; // 50MB
18d14a48ffSCarson Labrado 
1905916cefSCarson Labrado enum class Result
2005916cefSCarson Labrado {
2105916cefSCarson Labrado     LocalHandle,
2205916cefSCarson Labrado     NoLocalHandle
2305916cefSCarson Labrado };
2405916cefSCarson Labrado 
258fd333d6SCarson Labrado enum class SearchType
268fd333d6SCarson Labrado {
278fd333d6SCarson Labrado     Collection,
288fd333d6SCarson Labrado     CollOrCon,
298fd333d6SCarson Labrado     ContainsSubordinate,
308fd333d6SCarson Labrado     Resource
318fd333d6SCarson Labrado };
328fd333d6SCarson Labrado 
337e8890c5SCarson Labrado // clang-format off
347e8890c5SCarson Labrado // These are all of the properties as of version 2022.2 of the Redfish Resource
357e8890c5SCarson Labrado // and Schema Guide whose Type is "string (URI)" and the name does not end in a
367e8890c5SCarson Labrado // case-insensitive form of "uri".  That version of the schema is associated
377e8890c5SCarson Labrado // with version 1.16.0 of the Redfish Specification.  Going forward, new URI
387e8890c5SCarson Labrado // properties should end in URI so this list should not need to be maintained as
397e8890c5SCarson Labrado // the spec is updated.  NOTE: These have been pre-sorted in order to be
407e8890c5SCarson Labrado // compatible with binary search
417e8890c5SCarson Labrado constexpr std::array nonUriProperties{
427e8890c5SCarson Labrado     "@Redfish.ActionInfo",
437e8890c5SCarson Labrado     // "@odata.context", // We can't fix /redfish/v1/$metadata URIs
447e8890c5SCarson Labrado     "@odata.id",
457e8890c5SCarson Labrado     // "Destination", // Only used by EventService and won't be a Redfish URI
467e8890c5SCarson Labrado     // "HostName", // Isn't actually a Redfish URI
477e8890c5SCarson Labrado     "Image",
487e8890c5SCarson Labrado     "MetricProperty",
4932d7d8ebSCarson Labrado     // "OriginOfCondition", // Is URI when in request, but is object in response
507e8890c5SCarson Labrado     "TaskMonitor",
517e8890c5SCarson Labrado     "target", // normal string, but target URI for POST to invoke an action
527e8890c5SCarson Labrado };
537e8890c5SCarson Labrado // clang-format on
547e8890c5SCarson Labrado 
558fd333d6SCarson Labrado // Search the top collection array to determine if the passed URI is of a
568fd333d6SCarson Labrado // desired type
578fd333d6SCarson Labrado inline bool searchCollectionsArray(std::string_view uri,
588fd333d6SCarson Labrado                                    const SearchType searchType)
598fd333d6SCarson Labrado {
608fd333d6SCarson Labrado     constexpr std::string_view serviceRootUri = "/redfish/v1";
618fd333d6SCarson Labrado 
628fd333d6SCarson Labrado     // The passed URI must begin with "/redfish/v1", but we have to strip it
638fd333d6SCarson Labrado     // from the URI since topCollections does not include it in its URIs
648fd333d6SCarson Labrado     if (!uri.starts_with(serviceRootUri))
658fd333d6SCarson Labrado     {
668fd333d6SCarson Labrado         return false;
678fd333d6SCarson Labrado     }
688fd333d6SCarson Labrado 
698fd333d6SCarson Labrado     // Catch empty final segments such as "/redfish/v1/Chassis//"
708fd333d6SCarson Labrado     if (uri.ends_with("//"))
718fd333d6SCarson Labrado     {
728fd333d6SCarson Labrado         return false;
738fd333d6SCarson Labrado     }
748fd333d6SCarson Labrado 
758fd333d6SCarson Labrado     std::size_t parseCount = uri.size() - serviceRootUri.size();
768fd333d6SCarson Labrado     // Don't include the trailing "/" if it exists such as in "/redfish/v1/"
778fd333d6SCarson Labrado     if (uri.ends_with("/"))
788fd333d6SCarson Labrado     {
798fd333d6SCarson Labrado         parseCount--;
808fd333d6SCarson Labrado     }
818fd333d6SCarson Labrado 
826fd29553SEd Tanous     boost::system::result<boost::urls::url_view> parsedUrl =
838fd333d6SCarson Labrado         boost::urls::parse_relative_ref(
848fd333d6SCarson Labrado             uri.substr(serviceRootUri.size(), parseCount));
858fd333d6SCarson Labrado     if (!parsedUrl)
868fd333d6SCarson Labrado     {
8762598e31SEd Tanous         BMCWEB_LOG_ERROR("Failed to get target URI from {}",
8862598e31SEd Tanous                          uri.substr(serviceRootUri.size()));
898fd333d6SCarson Labrado         return false;
908fd333d6SCarson Labrado     }
918fd333d6SCarson Labrado 
928fd333d6SCarson Labrado     if (!parsedUrl->segments().is_absolute() && !parsedUrl->segments().empty())
938fd333d6SCarson Labrado     {
948fd333d6SCarson Labrado         return false;
958fd333d6SCarson Labrado     }
968fd333d6SCarson Labrado 
978fd333d6SCarson Labrado     // If no segments() then the passed URI was either "/redfish/v1" or
988fd333d6SCarson Labrado     // "/redfish/v1/".
998fd333d6SCarson Labrado     if (parsedUrl->segments().empty())
1008fd333d6SCarson Labrado     {
1018fd333d6SCarson Labrado         return (searchType == SearchType::ContainsSubordinate) ||
1028fd333d6SCarson Labrado                (searchType == SearchType::CollOrCon);
1038fd333d6SCarson Labrado     }
1043544d2a7SEd Tanous     std::string_view url = parsedUrl->buffer();
1053544d2a7SEd Tanous     const auto* it = std::ranges::lower_bound(topCollections, url);
1068fd333d6SCarson Labrado     if (it == topCollections.end())
1078fd333d6SCarson Labrado     {
1088fd333d6SCarson Labrado         // parsedUrl is alphabetically after the last entry in the array so it
1098fd333d6SCarson Labrado         // can't be a top collection or up tree from a top collection
1108fd333d6SCarson Labrado         return false;
1118fd333d6SCarson Labrado     }
1128fd333d6SCarson Labrado 
1138fd333d6SCarson Labrado     boost::urls::url collectionUrl(*it);
1148fd333d6SCarson Labrado     boost::urls::segments_view collectionSegments = collectionUrl.segments();
1158fd333d6SCarson Labrado     boost::urls::segments_view::iterator itCollection =
1168fd333d6SCarson Labrado         collectionSegments.begin();
1178fd333d6SCarson Labrado     const boost::urls::segments_view::const_iterator endCollection =
1188fd333d6SCarson Labrado         collectionSegments.end();
1198fd333d6SCarson Labrado 
1208fd333d6SCarson Labrado     // Each segment in the passed URI should match the found collection
1218fd333d6SCarson Labrado     for (const auto& segment : parsedUrl->segments())
1228fd333d6SCarson Labrado     {
1238fd333d6SCarson Labrado         if (itCollection == endCollection)
1248fd333d6SCarson Labrado         {
1258fd333d6SCarson Labrado             // Leftover segments means the target is for an aggregation
1268fd333d6SCarson Labrado             // supported resource
1278fd333d6SCarson Labrado             return searchType == SearchType::Resource;
1288fd333d6SCarson Labrado         }
1298fd333d6SCarson Labrado 
1308fd333d6SCarson Labrado         if (segment != (*itCollection))
1318fd333d6SCarson Labrado         {
1328fd333d6SCarson Labrado             return false;
1338fd333d6SCarson Labrado         }
1348fd333d6SCarson Labrado         itCollection++;
1358fd333d6SCarson Labrado     }
1368fd333d6SCarson Labrado 
1378fd333d6SCarson Labrado     // No remaining segments means the passed URI was a top level collection
1388fd333d6SCarson Labrado     if (searchType == SearchType::Collection)
1398fd333d6SCarson Labrado     {
1408fd333d6SCarson Labrado         return itCollection == endCollection;
1418fd333d6SCarson Labrado     }
1428fd333d6SCarson Labrado     if (searchType == SearchType::ContainsSubordinate)
1438fd333d6SCarson Labrado     {
1448fd333d6SCarson Labrado         return itCollection != endCollection;
1458fd333d6SCarson Labrado     }
1468fd333d6SCarson Labrado 
1478fd333d6SCarson Labrado     // Return this check instead of "true" in case other SearchTypes get added
1488fd333d6SCarson Labrado     return searchType == SearchType::CollOrCon;
1498fd333d6SCarson Labrado }
1508fd333d6SCarson Labrado 
1517e8890c5SCarson Labrado // Determines if the passed property contains a URI.  Those property names
1527e8890c5SCarson Labrado // either end with a case-insensitive version of "uri" or are specifically
1537e8890c5SCarson Labrado // defined in the above array.
15426ccae32SEd Tanous inline bool isPropertyUri(std::string_view propertyName)
1557e8890c5SCarson Labrado {
15618f8f608SEd Tanous     if (propertyName.ends_with("uri") || propertyName.ends_with("Uri") ||
15718f8f608SEd Tanous         propertyName.ends_with("URI"))
15818f8f608SEd Tanous     {
15918f8f608SEd Tanous         return true;
16018f8f608SEd Tanous     }
16118f8f608SEd Tanous     return std::binary_search(nonUriProperties.begin(), nonUriProperties.end(),
1627e8890c5SCarson Labrado                               propertyName);
1637e8890c5SCarson Labrado }
1647e8890c5SCarson Labrado 
1650af78d5aSKhang Kieu static inline void addPrefixToStringItem(std::string& strValue,
1660af78d5aSKhang Kieu                                          std::string_view prefix)
1671c0bb5c6SCarson Labrado {
1681c0bb5c6SCarson Labrado     // Make sure the value is a properly formatted URI
1690af78d5aSKhang Kieu     auto parsed = boost::urls::parse_relative_ref(strValue);
1701c0bb5c6SCarson Labrado     if (!parsed)
1711c0bb5c6SCarson Labrado     {
172bf2ddedeSCarson Labrado         // Note that DMTF URIs such as
173bf2ddedeSCarson Labrado         // https://redfish.dmtf.org/registries/Base.1.15.0.json will fail this
174bf2ddedeSCarson Labrado         // check and that's okay
175bf2ddedeSCarson Labrado         BMCWEB_LOG_DEBUG("Couldn't parse URI from resource {}", strValue);
1761c0bb5c6SCarson Labrado         return;
1771c0bb5c6SCarson Labrado     }
1781c0bb5c6SCarson Labrado 
1791c0bb5c6SCarson Labrado     boost::urls::url_view thisUrl = *parsed;
1801c0bb5c6SCarson Labrado 
181411e6a11SCarson Labrado     // We don't need to aggregate JsonSchemas due to potential issues such as
182411e6a11SCarson Labrado     // version mismatches between aggregator and satellite BMCs.  For now
183411e6a11SCarson Labrado     // assume that the aggregator has all the schemas and versions that the
184411e6a11SCarson Labrado     // aggregated server has.
185411e6a11SCarson Labrado     if (crow::utility::readUrlSegments(thisUrl, "redfish", "v1", "JsonSchemas",
186411e6a11SCarson Labrado                                        crow::utility::OrMorePaths()))
187411e6a11SCarson Labrado     {
18862598e31SEd Tanous         BMCWEB_LOG_DEBUG("Skipping JsonSchemas URI prefix fixing");
189411e6a11SCarson Labrado         return;
190411e6a11SCarson Labrado     }
191411e6a11SCarson Labrado 
19211987af6SCarson Labrado     // The first two segments should be "/redfish/v1".  We need to check that
19311987af6SCarson Labrado     // before we can search topCollections
19411987af6SCarson Labrado     if (!crow::utility::readUrlSegments(thisUrl, "redfish", "v1",
19511987af6SCarson Labrado                                         crow::utility::OrMorePaths()))
1961c0bb5c6SCarson Labrado     {
1971c0bb5c6SCarson Labrado         return;
1981c0bb5c6SCarson Labrado     }
1991c0bb5c6SCarson Labrado 
20011987af6SCarson Labrado     // Check array adding a segment each time until collection is identified
20111987af6SCarson Labrado     // Add prefix to segment after the collection
20211987af6SCarson Labrado     const boost::urls::segments_view urlSegments = thisUrl.segments();
20311987af6SCarson Labrado     bool addedPrefix = false;
20411987af6SCarson Labrado     boost::urls::url url("/");
205*4a7fbefdSEd Tanous     boost::urls::segments_view::const_iterator it = urlSegments.begin();
20611987af6SCarson Labrado     const boost::urls::segments_view::const_iterator end = urlSegments.end();
20711987af6SCarson Labrado 
20811987af6SCarson Labrado     // Skip past the leading "/redfish/v1"
20911987af6SCarson Labrado     it++;
21011987af6SCarson Labrado     it++;
21111987af6SCarson Labrado     for (; it != end; it++)
2121c0bb5c6SCarson Labrado     {
21311987af6SCarson Labrado         // Trailing "/" will result in an empty segment.  In that case we need
21411987af6SCarson Labrado         // to return so we don't apply a prefix to top level collections such
21511987af6SCarson Labrado         // as "/redfish/v1/Chassis/"
21611987af6SCarson Labrado         if ((*it).empty())
21711987af6SCarson Labrado         {
218411e6a11SCarson Labrado             return;
2191c0bb5c6SCarson Labrado         }
2201c0bb5c6SCarson Labrado 
22111987af6SCarson Labrado         if (std::binary_search(topCollections.begin(), topCollections.end(),
22211987af6SCarson Labrado                                url.buffer()))
2231c0bb5c6SCarson Labrado         {
22411987af6SCarson Labrado             std::string collectionItem(prefix);
22511987af6SCarson Labrado             collectionItem += "_" + (*it);
22611987af6SCarson Labrado             url.segments().push_back(collectionItem);
22711987af6SCarson Labrado             it++;
22811987af6SCarson Labrado             addedPrefix = true;
22911987af6SCarson Labrado             break;
23011987af6SCarson Labrado         }
23111987af6SCarson Labrado 
23211987af6SCarson Labrado         url.segments().push_back(*it);
23311987af6SCarson Labrado     }
23411987af6SCarson Labrado 
23511987af6SCarson Labrado     // Finish constructing the URL here (if needed) to avoid additional checks
23611987af6SCarson Labrado     for (; it != end; it++)
23711987af6SCarson Labrado     {
23811987af6SCarson Labrado         url.segments().push_back(*it);
23911987af6SCarson Labrado     }
24011987af6SCarson Labrado 
24111987af6SCarson Labrado     if (addedPrefix)
24211987af6SCarson Labrado     {
24311987af6SCarson Labrado         url.segments().insert(url.segments().begin(), {"redfish", "v1"});
2440af78d5aSKhang Kieu         strValue = url.buffer();
2451c0bb5c6SCarson Labrado     }
2461c0bb5c6SCarson Labrado }
2471c0bb5c6SCarson Labrado 
2480af78d5aSKhang Kieu static inline void addPrefixToItem(nlohmann::json& item,
2490af78d5aSKhang Kieu                                    std::string_view prefix)
2500af78d5aSKhang Kieu {
2510af78d5aSKhang Kieu     std::string* strValue = item.get_ptr<std::string*>();
2520af78d5aSKhang Kieu     if (strValue == nullptr)
2530af78d5aSKhang Kieu     {
254bf2ddedeSCarson Labrado         // Values for properties like "InvalidURI" and "ResourceMissingAtURI"
255bf2ddedeSCarson Labrado         // from within the Base Registry are objects instead of strings and will
256bf2ddedeSCarson Labrado         // fall into this check
257bf2ddedeSCarson Labrado         BMCWEB_LOG_DEBUG("Field was not a string");
2580af78d5aSKhang Kieu         return;
2590af78d5aSKhang Kieu     }
2600af78d5aSKhang Kieu     addPrefixToStringItem(*strValue, prefix);
2610af78d5aSKhang Kieu     item = *strValue;
2620af78d5aSKhang Kieu }
2630af78d5aSKhang Kieu 
2640af78d5aSKhang Kieu static inline void addAggregatedHeaders(crow::Response& asyncResp,
26524dadc88SCarson Labrado                                         const crow::Response& resp,
2660af78d5aSKhang Kieu                                         std::string_view prefix)
2670af78d5aSKhang Kieu {
2680af78d5aSKhang Kieu     if (!resp.getHeaderValue("Content-Type").empty())
2690af78d5aSKhang Kieu     {
2700af78d5aSKhang Kieu         asyncResp.addHeader(boost::beast::http::field::content_type,
2710af78d5aSKhang Kieu                             resp.getHeaderValue("Content-Type"));
2720af78d5aSKhang Kieu     }
2730af78d5aSKhang Kieu     if (!resp.getHeaderValue("Allow").empty())
2740af78d5aSKhang Kieu     {
2750af78d5aSKhang Kieu         asyncResp.addHeader(boost::beast::http::field::allow,
2760af78d5aSKhang Kieu                             resp.getHeaderValue("Allow"));
2770af78d5aSKhang Kieu     }
2780af78d5aSKhang Kieu     std::string_view header = resp.getHeaderValue("Location");
2790af78d5aSKhang Kieu     if (!header.empty())
2800af78d5aSKhang Kieu     {
2810af78d5aSKhang Kieu         std::string location(header);
2820af78d5aSKhang Kieu         addPrefixToStringItem(location, prefix);
2830af78d5aSKhang Kieu         asyncResp.addHeader(boost::beast::http::field::location, location);
2840af78d5aSKhang Kieu     }
2850af78d5aSKhang Kieu     if (!resp.getHeaderValue("Retry-After").empty())
2860af78d5aSKhang Kieu     {
2870af78d5aSKhang Kieu         asyncResp.addHeader(boost::beast::http::field::retry_after,
2880af78d5aSKhang Kieu                             resp.getHeaderValue("Retry-After"));
2890af78d5aSKhang Kieu     }
2900af78d5aSKhang Kieu     // TODO: we need special handling for Link Header Value
2910af78d5aSKhang Kieu }
2920af78d5aSKhang Kieu 
293b27e1cbeSCarson Labrado // Fix HTTP headers which appear in responses from Task resources among others
294b27e1cbeSCarson Labrado static inline void addPrefixToHeadersInResp(nlohmann::json& json,
295b27e1cbeSCarson Labrado                                             std::string_view prefix)
296b27e1cbeSCarson Labrado {
297b27e1cbeSCarson Labrado     // The passed in "HttpHeaders" should be an array of headers
298b27e1cbeSCarson Labrado     nlohmann::json::array_t* array = json.get_ptr<nlohmann::json::array_t*>();
299b27e1cbeSCarson Labrado     if (array == nullptr)
300b27e1cbeSCarson Labrado     {
30162598e31SEd Tanous         BMCWEB_LOG_ERROR("Field wasn't an array_t????");
302b27e1cbeSCarson Labrado         return;
303b27e1cbeSCarson Labrado     }
304b27e1cbeSCarson Labrado 
305b27e1cbeSCarson Labrado     for (nlohmann::json& item : *array)
306b27e1cbeSCarson Labrado     {
307b27e1cbeSCarson Labrado         // Each header is a single string with the form "<Field>: <Value>"
308b27e1cbeSCarson Labrado         std::string* strHeader = item.get_ptr<std::string*>();
309b27e1cbeSCarson Labrado         if (strHeader == nullptr)
310b27e1cbeSCarson Labrado         {
31162598e31SEd Tanous             BMCWEB_LOG_CRITICAL("Field wasn't a string????");
312b27e1cbeSCarson Labrado             continue;
313b27e1cbeSCarson Labrado         }
314b27e1cbeSCarson Labrado 
315b27e1cbeSCarson Labrado         constexpr std::string_view location = "Location: ";
316b27e1cbeSCarson Labrado         if (strHeader->starts_with(location))
317b27e1cbeSCarson Labrado         {
318b27e1cbeSCarson Labrado             std::string header = strHeader->substr(location.size());
319b27e1cbeSCarson Labrado             addPrefixToStringItem(header, prefix);
320b27e1cbeSCarson Labrado             *strHeader = std::string(location) + header;
321b27e1cbeSCarson Labrado         }
322b27e1cbeSCarson Labrado     }
323b27e1cbeSCarson Labrado }
324b27e1cbeSCarson Labrado 
3251c0bb5c6SCarson Labrado // Search the json for all URIs and add the supplied prefix if the URI is for
3267e8890c5SCarson Labrado // an aggregated resource.
3270af78d5aSKhang Kieu static inline void addPrefixes(nlohmann::json& json, std::string_view prefix)
3281c0bb5c6SCarson Labrado {
3291c0bb5c6SCarson Labrado     nlohmann::json::object_t* object =
3301c0bb5c6SCarson Labrado         json.get_ptr<nlohmann::json::object_t*>();
3311c0bb5c6SCarson Labrado     if (object != nullptr)
3321c0bb5c6SCarson Labrado     {
3331c0bb5c6SCarson Labrado         for (std::pair<const std::string, nlohmann::json>& item : *object)
3341c0bb5c6SCarson Labrado         {
3357e8890c5SCarson Labrado             if (isPropertyUri(item.first))
3361c0bb5c6SCarson Labrado             {
3377e8890c5SCarson Labrado                 addPrefixToItem(item.second, prefix);
3381c0bb5c6SCarson Labrado                 continue;
3391c0bb5c6SCarson Labrado             }
3401c0bb5c6SCarson Labrado 
341b27e1cbeSCarson Labrado             // "HttpHeaders" contains HTTP headers.  Among those we need to
342b27e1cbeSCarson Labrado             // attempt to fix the "Location" header
343b27e1cbeSCarson Labrado             if (item.first == "HttpHeaders")
344b27e1cbeSCarson Labrado             {
345b27e1cbeSCarson Labrado                 addPrefixToHeadersInResp(item.second, prefix);
346b27e1cbeSCarson Labrado                 continue;
347b27e1cbeSCarson Labrado             }
348b27e1cbeSCarson Labrado 
3498ece0e45SEd Tanous             // Recursively parse the rest of the json
3501c0bb5c6SCarson Labrado             addPrefixes(item.second, prefix);
3511c0bb5c6SCarson Labrado         }
3521c0bb5c6SCarson Labrado         return;
3531c0bb5c6SCarson Labrado     }
3541c0bb5c6SCarson Labrado     nlohmann::json::array_t* array = json.get_ptr<nlohmann::json::array_t*>();
3551c0bb5c6SCarson Labrado     if (array != nullptr)
3561c0bb5c6SCarson Labrado     {
3571c0bb5c6SCarson Labrado         for (nlohmann::json& item : *array)
3581c0bb5c6SCarson Labrado         {
3591c0bb5c6SCarson Labrado             addPrefixes(item, prefix);
3601c0bb5c6SCarson Labrado         }
3611c0bb5c6SCarson Labrado     }
3621c0bb5c6SCarson Labrado }
3631c0bb5c6SCarson Labrado 
364d14a48ffSCarson Labrado inline boost::system::error_code aggregationRetryHandler(unsigned int respCode)
365a7a80296SCarson Labrado {
36632d7d8ebSCarson Labrado     // Allow all response codes because we want to surface any satellite
36732d7d8ebSCarson Labrado     // issue to the client
36862598e31SEd Tanous     BMCWEB_LOG_DEBUG("Received {} response from satellite", respCode);
369d14a48ffSCarson Labrado     return boost::system::errc::make_error_code(boost::system::errc::success);
370d14a48ffSCarson Labrado }
371d14a48ffSCarson Labrado 
372d14a48ffSCarson Labrado inline crow::ConnectionPolicy getAggregationPolicy()
373d14a48ffSCarson Labrado {
374d14a48ffSCarson Labrado     return {.maxRetryAttempts = 1,
375d14a48ffSCarson Labrado             .requestByteLimit = aggregatorReadBodyLimit,
376d14a48ffSCarson Labrado             .maxConnections = 20,
377d14a48ffSCarson Labrado             .retryPolicyAction = "TerminateAfterRetries",
378d14a48ffSCarson Labrado             .retryIntervalSecs = std::chrono::seconds(0),
379d14a48ffSCarson Labrado             .invalidResp = aggregationRetryHandler};
380d14a48ffSCarson Labrado }
381d14a48ffSCarson Labrado 
382d14a48ffSCarson Labrado class RedfishAggregator
383d14a48ffSCarson Labrado {
384d14a48ffSCarson Labrado   private:
385d14a48ffSCarson Labrado     crow::HttpClient client;
386d14a48ffSCarson Labrado 
3877fb33566SCarson Labrado     // Dummy callback used by the Constructor so that it can report the number
3887fb33566SCarson Labrado     // of satellite configs when the class is first created
3897fb33566SCarson Labrado     static void constructorCallback(
3908b2521a5SCarson Labrado         const boost::system::error_code& ec,
3917fb33566SCarson Labrado         const std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
3927fb33566SCarson Labrado     {
3937fb33566SCarson Labrado         if (ec)
3947fb33566SCarson Labrado         {
39562598e31SEd Tanous             BMCWEB_LOG_ERROR("Something went wrong while querying dbus!");
3967fb33566SCarson Labrado             return;
3977fb33566SCarson Labrado         }
3987fb33566SCarson Labrado 
39962598e31SEd Tanous         BMCWEB_LOG_DEBUG("There were {} satellite configs found at startup",
40062598e31SEd Tanous                          std::to_string(satelliteInfo.size()));
4017fb33566SCarson Labrado     }
4027fb33566SCarson Labrado 
4037fb33566SCarson Labrado     // Search D-Bus objects for satellite config objects and add their
4047fb33566SCarson Labrado     // information if valid
4057fb33566SCarson Labrado     static void findSatelliteConfigs(
4067fb33566SCarson Labrado         const dbus::utility::ManagedObjectType& objects,
4077fb33566SCarson Labrado         std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
4087fb33566SCarson Labrado     {
4097fb33566SCarson Labrado         for (const auto& objectPath : objects)
4107fb33566SCarson Labrado         {
4117fb33566SCarson Labrado             for (const auto& interface : objectPath.second)
4127fb33566SCarson Labrado             {
4137fb33566SCarson Labrado                 if (interface.first ==
4147fb33566SCarson Labrado                     "xyz.openbmc_project.Configuration.SatelliteController")
4157fb33566SCarson Labrado                 {
41662598e31SEd Tanous                     BMCWEB_LOG_DEBUG("Found Satellite Controller at {}",
41762598e31SEd Tanous                                      objectPath.first.str);
4187fb33566SCarson Labrado 
41905916cefSCarson Labrado                     if (!satelliteInfo.empty())
42005916cefSCarson Labrado                     {
42162598e31SEd Tanous                         BMCWEB_LOG_ERROR(
42262598e31SEd Tanous                             "Redfish Aggregation only supports one satellite!");
42362598e31SEd Tanous                         BMCWEB_LOG_DEBUG("Clearing all satellite data");
42405916cefSCarson Labrado                         satelliteInfo.clear();
42505916cefSCarson Labrado                         return;
42605916cefSCarson Labrado                     }
42705916cefSCarson Labrado 
42805916cefSCarson Labrado                     // For now assume there will only be one satellite config.
42905916cefSCarson Labrado                     // Assign it the name/prefix "5B247A"
43005916cefSCarson Labrado                     addSatelliteConfig("5B247A", interface.second,
43105916cefSCarson Labrado                                        satelliteInfo);
4327fb33566SCarson Labrado                 }
4337fb33566SCarson Labrado             }
4347fb33566SCarson Labrado         }
4357fb33566SCarson Labrado     }
4367fb33566SCarson Labrado 
4377fb33566SCarson Labrado     // Parse the properties of a satellite config object and add the
4387fb33566SCarson Labrado     // configuration if the properties are valid
4397fb33566SCarson Labrado     static void addSatelliteConfig(
44005916cefSCarson Labrado         const std::string& name,
4417fb33566SCarson Labrado         const dbus::utility::DBusPropertiesMap& properties,
4427fb33566SCarson Labrado         std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
4437fb33566SCarson Labrado     {
4447fb33566SCarson Labrado         boost::urls::url url;
4457fb33566SCarson Labrado 
4467fb33566SCarson Labrado         for (const auto& prop : properties)
4477fb33566SCarson Labrado         {
44805916cefSCarson Labrado             if (prop.first == "Hostname")
4497fb33566SCarson Labrado             {
4507fb33566SCarson Labrado                 const std::string* propVal =
4517fb33566SCarson Labrado                     std::get_if<std::string>(&prop.second);
4527fb33566SCarson Labrado                 if (propVal == nullptr)
4537fb33566SCarson Labrado                 {
45462598e31SEd Tanous                     BMCWEB_LOG_ERROR("Invalid Hostname value");
4557fb33566SCarson Labrado                     return;
4567fb33566SCarson Labrado                 }
4577fb33566SCarson Labrado                 url.set_host(*propVal);
4587fb33566SCarson Labrado             }
4597fb33566SCarson Labrado 
4607fb33566SCarson Labrado             else if (prop.first == "Port")
4617fb33566SCarson Labrado             {
4627fb33566SCarson Labrado                 const uint64_t* propVal = std::get_if<uint64_t>(&prop.second);
4637fb33566SCarson Labrado                 if (propVal == nullptr)
4647fb33566SCarson Labrado                 {
46562598e31SEd Tanous                     BMCWEB_LOG_ERROR("Invalid Port value");
4667fb33566SCarson Labrado                     return;
4677fb33566SCarson Labrado                 }
4687fb33566SCarson Labrado 
4697fb33566SCarson Labrado                 if (*propVal > std::numeric_limits<uint16_t>::max())
4707fb33566SCarson Labrado                 {
47162598e31SEd Tanous                     BMCWEB_LOG_ERROR("Port value out of range");
4727fb33566SCarson Labrado                     return;
4737fb33566SCarson Labrado                 }
474079360aeSEd Tanous                 url.set_port(std::to_string(static_cast<uint16_t>(*propVal)));
4757fb33566SCarson Labrado             }
4767fb33566SCarson Labrado 
4777fb33566SCarson Labrado             else if (prop.first == "AuthType")
4787fb33566SCarson Labrado             {
4797fb33566SCarson Labrado                 const std::string* propVal =
4807fb33566SCarson Labrado                     std::get_if<std::string>(&prop.second);
4817fb33566SCarson Labrado                 if (propVal == nullptr)
4827fb33566SCarson Labrado                 {
48362598e31SEd Tanous                     BMCWEB_LOG_ERROR("Invalid AuthType value");
4847fb33566SCarson Labrado                     return;
4857fb33566SCarson Labrado                 }
4867fb33566SCarson Labrado 
4877fb33566SCarson Labrado                 // For now assume authentication not required to communicate
4887fb33566SCarson Labrado                 // with the satellite BMC
4897fb33566SCarson Labrado                 if (*propVal != "None")
4907fb33566SCarson Labrado                 {
49162598e31SEd Tanous                     BMCWEB_LOG_ERROR(
49262598e31SEd Tanous                         "Unsupported AuthType value: {}, only \"none\" is supported",
49362598e31SEd Tanous                         *propVal);
4947fb33566SCarson Labrado                     return;
4957fb33566SCarson Labrado                 }
4967fb33566SCarson Labrado                 url.set_scheme("http");
4977fb33566SCarson Labrado             }
4987fb33566SCarson Labrado         } // Finished reading properties
4997fb33566SCarson Labrado 
5007fb33566SCarson Labrado         // Make sure all required config information was made available
5017fb33566SCarson Labrado         if (url.host().empty())
5027fb33566SCarson Labrado         {
50362598e31SEd Tanous             BMCWEB_LOG_ERROR("Satellite config {} missing Host", name);
5047fb33566SCarson Labrado             return;
5057fb33566SCarson Labrado         }
5067fb33566SCarson Labrado 
5077fb33566SCarson Labrado         if (!url.has_port())
5087fb33566SCarson Labrado         {
50962598e31SEd Tanous             BMCWEB_LOG_ERROR("Satellite config {} missing Port", name);
5107fb33566SCarson Labrado             return;
5117fb33566SCarson Labrado         }
5127fb33566SCarson Labrado 
5137fb33566SCarson Labrado         if (!url.has_scheme())
5147fb33566SCarson Labrado         {
51562598e31SEd Tanous             BMCWEB_LOG_ERROR("Satellite config {} missing AuthType", name);
5167fb33566SCarson Labrado             return;
5177fb33566SCarson Labrado         }
5187fb33566SCarson Labrado 
5197fb33566SCarson Labrado         std::string resultString;
5207fb33566SCarson Labrado         auto result = satelliteInfo.insert_or_assign(name, std::move(url));
5217fb33566SCarson Labrado         if (result.second)
5227fb33566SCarson Labrado         {
5237fb33566SCarson Labrado             resultString = "Added new satellite config ";
5247fb33566SCarson Labrado         }
5257fb33566SCarson Labrado         else
5267fb33566SCarson Labrado         {
5277fb33566SCarson Labrado             resultString = "Updated existing satellite config ";
5287fb33566SCarson Labrado         }
5297fb33566SCarson Labrado 
53062598e31SEd Tanous         BMCWEB_LOG_DEBUG("{}{} at {}://{}", resultString, name,
53162598e31SEd Tanous                          result.first->second.scheme(),
53262598e31SEd Tanous                          result.first->second.encoded_host_and_port());
5337fb33566SCarson Labrado     }
5347fb33566SCarson Labrado 
53546a81465SCarson Labrado     enum AggregationType
53646a81465SCarson Labrado     {
53746a81465SCarson Labrado         Collection,
538e002dbc0SCarson Labrado         ContainsSubordinate,
53946a81465SCarson Labrado         Resource,
54046a81465SCarson Labrado     };
54146a81465SCarson Labrado 
54246a81465SCarson Labrado     static void
543e002dbc0SCarson Labrado         startAggregation(AggregationType aggType, const crow::Request& thisReq,
54446a81465SCarson Labrado                          const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
54546a81465SCarson Labrado     {
546e002dbc0SCarson Labrado         if (thisReq.method() != boost::beast::http::verb::get)
547e002dbc0SCarson Labrado         {
548e002dbc0SCarson Labrado             if (aggType == AggregationType::Collection)
549db18fc98SCarson Labrado             {
55062598e31SEd Tanous                 BMCWEB_LOG_DEBUG(
55162598e31SEd Tanous                     "Only aggregate GET requests to top level collections");
552db18fc98SCarson Labrado                 return;
553db18fc98SCarson Labrado             }
554db18fc98SCarson Labrado 
555e002dbc0SCarson Labrado             if (aggType == AggregationType::ContainsSubordinate)
556e002dbc0SCarson Labrado             {
55762598e31SEd Tanous                 BMCWEB_LOG_DEBUG(
55862598e31SEd Tanous                     "Only aggregate GET requests when uptree of a top level collection");
559e002dbc0SCarson Labrado                 return;
560e002dbc0SCarson Labrado             }
561e002dbc0SCarson Labrado         }
562e002dbc0SCarson Labrado 
56346a81465SCarson Labrado         // Create a copy of thisReq so we we can still locally process the req
56446a81465SCarson Labrado         std::error_code ec;
56546a81465SCarson Labrado         auto localReq = std::make_shared<crow::Request>(thisReq.req, ec);
56646a81465SCarson Labrado         if (ec)
56746a81465SCarson Labrado         {
56862598e31SEd Tanous             BMCWEB_LOG_ERROR("Failed to create copy of request");
569e002dbc0SCarson Labrado             if (aggType == AggregationType::Resource)
57046a81465SCarson Labrado             {
57146a81465SCarson Labrado                 messages::internalError(asyncResp->res);
57246a81465SCarson Labrado             }
57346a81465SCarson Labrado             return;
57446a81465SCarson Labrado         }
57546a81465SCarson Labrado 
576e002dbc0SCarson Labrado         getSatelliteConfigs(
577e002dbc0SCarson Labrado             std::bind_front(aggregateAndHandle, aggType, localReq, asyncResp));
57846a81465SCarson Labrado     }
57946a81465SCarson Labrado 
580db18fc98SCarson Labrado     static void findSatellite(
58146a81465SCarson Labrado         const crow::Request& req,
58246a81465SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
58346a81465SCarson Labrado         const std::unordered_map<std::string, boost::urls::url>& satelliteInfo,
58446a81465SCarson Labrado         std::string_view memberName)
58546a81465SCarson Labrado     {
58646a81465SCarson Labrado         // Determine if the resource ID begins with a known prefix
58746a81465SCarson Labrado         for (const auto& satellite : satelliteInfo)
58846a81465SCarson Labrado         {
58946a81465SCarson Labrado             std::string targetPrefix = satellite.first;
59046a81465SCarson Labrado             targetPrefix += "_";
59146a81465SCarson Labrado             if (memberName.starts_with(targetPrefix))
59246a81465SCarson Labrado             {
59362598e31SEd Tanous                 BMCWEB_LOG_DEBUG("\"{}\" is a known prefix", satellite.first);
59446a81465SCarson Labrado 
59546a81465SCarson Labrado                 // Remove the known prefix from the request's URI and
59646a81465SCarson Labrado                 // then forward to the associated satellite BMC
59746a81465SCarson Labrado                 getInstance().forwardRequest(req, asyncResp, satellite.first,
59846a81465SCarson Labrado                                              satelliteInfo);
59946a81465SCarson Labrado                 return;
60046a81465SCarson Labrado             }
60146a81465SCarson Labrado         }
602db18fc98SCarson Labrado 
603db18fc98SCarson Labrado         // We didn't recognize the prefix and need to return a 404
60439662a3bSEd Tanous         std::string nameStr = req.url().segments().back();
605db18fc98SCarson Labrado         messages::resourceNotFound(asyncResp->res, "", nameStr);
60646a81465SCarson Labrado     }
60746a81465SCarson Labrado 
60846a81465SCarson Labrado     // Intended to handle an incoming request based on if Redfish Aggregation
60946a81465SCarson Labrado     // is enabled.  Forwards request to satellite BMC if it exists.
61046a81465SCarson Labrado     static void aggregateAndHandle(
611e002dbc0SCarson Labrado         AggregationType aggType,
61246a81465SCarson Labrado         const std::shared_ptr<crow::Request>& sharedReq,
61346a81465SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
6148b2521a5SCarson Labrado         const boost::system::error_code& ec,
61546a81465SCarson Labrado         const std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
61646a81465SCarson Labrado     {
61746a81465SCarson Labrado         if (sharedReq == nullptr)
61846a81465SCarson Labrado         {
61946a81465SCarson Labrado             return;
62046a81465SCarson Labrado         }
6218b2521a5SCarson Labrado         // Something went wrong while querying dbus
6228b2521a5SCarson Labrado         if (ec)
6238b2521a5SCarson Labrado         {
6248b2521a5SCarson Labrado             messages::internalError(asyncResp->res);
6258b2521a5SCarson Labrado             return;
6268b2521a5SCarson Labrado         }
627db18fc98SCarson Labrado 
628db18fc98SCarson Labrado         // No satellite configs means we don't need to keep attempting to
629db18fc98SCarson Labrado         // aggregate
630db18fc98SCarson Labrado         if (satelliteInfo.empty())
631db18fc98SCarson Labrado         {
632e002dbc0SCarson Labrado             // For collections or resources that can contain a subordinate
633e002dbc0SCarson Labrado             // top level collection we'll also handle the request locally so we
634db18fc98SCarson Labrado             // don't need to write an error code
635e002dbc0SCarson Labrado             if (aggType == AggregationType::Resource)
636db18fc98SCarson Labrado             {
63739662a3bSEd Tanous                 std::string nameStr = sharedReq->url().segments().back();
638db18fc98SCarson Labrado                 messages::resourceNotFound(asyncResp->res, "", nameStr);
639db18fc98SCarson Labrado             }
640db18fc98SCarson Labrado             return;
641db18fc98SCarson Labrado         }
642db18fc98SCarson Labrado 
64346a81465SCarson Labrado         const crow::Request& thisReq = *sharedReq;
64462598e31SEd Tanous         BMCWEB_LOG_DEBUG("Aggregation is enabled, begin processing of {}",
64562598e31SEd Tanous                          thisReq.target());
64646a81465SCarson Labrado 
64746a81465SCarson Labrado         // We previously determined the request is for a collection.  No need to
64846a81465SCarson Labrado         // check again
649e002dbc0SCarson Labrado         if (aggType == AggregationType::Collection)
65046a81465SCarson Labrado         {
65162598e31SEd Tanous             BMCWEB_LOG_DEBUG("Aggregating a collection");
6524c30e226SCarson Labrado             // We need to use a specific response handler and send the
6534c30e226SCarson Labrado             // request to all known satellites
6544c30e226SCarson Labrado             getInstance().forwardCollectionRequests(thisReq, asyncResp,
6554c30e226SCarson Labrado                                                     satelliteInfo);
65646a81465SCarson Labrado             return;
65746a81465SCarson Labrado         }
65846a81465SCarson Labrado 
659e002dbc0SCarson Labrado         // We previously determined the request may contain a subordinate
660e002dbc0SCarson Labrado         // collection.  No need to check again
661e002dbc0SCarson Labrado         if (aggType == AggregationType::ContainsSubordinate)
662e002dbc0SCarson Labrado         {
66362598e31SEd Tanous             BMCWEB_LOG_DEBUG(
66462598e31SEd Tanous                 "Aggregating what may have a subordinate collection");
665e002dbc0SCarson Labrado             // We need to use a specific response handler and send the
666e002dbc0SCarson Labrado             // request to all known satellites
667e002dbc0SCarson Labrado             getInstance().forwardContainsSubordinateRequests(thisReq, asyncResp,
668e002dbc0SCarson Labrado                                                              satelliteInfo);
669e002dbc0SCarson Labrado             return;
670e002dbc0SCarson Labrado         }
671e002dbc0SCarson Labrado 
67239662a3bSEd Tanous         const boost::urls::segments_view urlSegments = thisReq.url().segments();
6737c4c52cbSCarson Labrado         boost::urls::url currentUrl("/");
674*4a7fbefdSEd Tanous         boost::urls::segments_view::const_iterator it = urlSegments.begin();
675*4a7fbefdSEd Tanous         boost::urls::segments_view::const_iterator end = urlSegments.end();
6767c4c52cbSCarson Labrado 
6777c4c52cbSCarson Labrado         // Skip past the leading "/redfish/v1"
6787c4c52cbSCarson Labrado         it++;
6797c4c52cbSCarson Labrado         it++;
6807c4c52cbSCarson Labrado         for (; it != end; it++)
68146a81465SCarson Labrado         {
6827c4c52cbSCarson Labrado             if (std::binary_search(topCollections.begin(), topCollections.end(),
6837c4c52cbSCarson Labrado                                    currentUrl.buffer()))
6847c4c52cbSCarson Labrado             {
6857c4c52cbSCarson Labrado                 // We've matched a resource collection so this current segment
6867c4c52cbSCarson Labrado                 // must contain an aggregation prefix
6877c4c52cbSCarson Labrado                 findSatellite(thisReq, asyncResp, satelliteInfo, *it);
68846a81465SCarson Labrado                 return;
68946a81465SCarson Labrado             }
69046a81465SCarson Labrado 
6917c4c52cbSCarson Labrado             currentUrl.segments().push_back(*it);
69246a81465SCarson Labrado         }
693db18fc98SCarson Labrado 
694db18fc98SCarson Labrado         // We shouldn't reach this point since we should've hit one of the
695db18fc98SCarson Labrado         // previous exits
696db18fc98SCarson Labrado         messages::internalError(asyncResp->res);
69746a81465SCarson Labrado     }
69846a81465SCarson Labrado 
69946a81465SCarson Labrado     // Attempt to forward a request to the satellite BMC associated with the
70046a81465SCarson Labrado     // prefix.
70146a81465SCarson Labrado     void forwardRequest(
70246a81465SCarson Labrado         const crow::Request& thisReq,
70346a81465SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
70446a81465SCarson Labrado         const std::string& prefix,
70546a81465SCarson Labrado         const std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
70646a81465SCarson Labrado     {
70746a81465SCarson Labrado         const auto& sat = satelliteInfo.find(prefix);
70846a81465SCarson Labrado         if (sat == satelliteInfo.end())
70946a81465SCarson Labrado         {
71046a81465SCarson Labrado             // Realistically this shouldn't get called since we perform an
71146a81465SCarson Labrado             // earlier check to make sure the prefix exists
71262598e31SEd Tanous             BMCWEB_LOG_ERROR("Unrecognized satellite prefix \"{}\"", prefix);
71346a81465SCarson Labrado             return;
71446a81465SCarson Labrado         }
71546a81465SCarson Labrado 
71646a81465SCarson Labrado         // We need to strip the prefix from the request's path
717a716aa74SEd Tanous         boost::urls::url targetURI(thisReq.target());
718a716aa74SEd Tanous         std::string path = thisReq.url().path();
719a716aa74SEd Tanous         size_t pos = path.find(prefix + "_");
72046a81465SCarson Labrado         if (pos == std::string::npos)
72146a81465SCarson Labrado         {
72246a81465SCarson Labrado             // If this fails then something went wrong
72362598e31SEd Tanous             BMCWEB_LOG_ERROR("Error removing prefix \"{}_\" from request URI",
72462598e31SEd Tanous                              prefix);
72546a81465SCarson Labrado             messages::internalError(asyncResp->res);
72646a81465SCarson Labrado             return;
72746a81465SCarson Labrado         }
728a716aa74SEd Tanous         path.erase(pos, prefix.size() + 1);
72946a81465SCarson Labrado 
73046a81465SCarson Labrado         std::function<void(crow::Response&)> cb =
7311c0bb5c6SCarson Labrado             std::bind_front(processResponse, prefix, asyncResp);
73246a81465SCarson Labrado 
73327b0cf90SEd Tanous         std::string data = thisReq.body();
734a716aa74SEd Tanous         boost::urls::url url(sat->second);
735a716aa74SEd Tanous         url.set_path(path);
736a716aa74SEd Tanous         if (targetURI.has_query())
737a716aa74SEd Tanous         {
738a716aa74SEd Tanous             url.set_query(targetURI.query());
739a716aa74SEd Tanous         }
740a716aa74SEd Tanous         client.sendDataWithCallback(std::move(data), url, thisReq.fields(),
741a716aa74SEd Tanous                                     thisReq.method(), cb);
74246a81465SCarson Labrado     }
74346a81465SCarson Labrado 
7444c30e226SCarson Labrado     // Forward a request for a collection URI to each known satellite BMC
7454c30e226SCarson Labrado     void forwardCollectionRequests(
7464c30e226SCarson Labrado         const crow::Request& thisReq,
7474c30e226SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
7484c30e226SCarson Labrado         const std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
7494c30e226SCarson Labrado     {
7504c30e226SCarson Labrado         for (const auto& sat : satelliteInfo)
7514c30e226SCarson Labrado         {
7524c30e226SCarson Labrado             std::function<void(crow::Response&)> cb = std::bind_front(
7534c30e226SCarson Labrado                 processCollectionResponse, sat.first, asyncResp);
7544c30e226SCarson Labrado 
755a716aa74SEd Tanous             boost::urls::url url(sat.second);
756a716aa74SEd Tanous             url.set_path(thisReq.url().path());
757a716aa74SEd Tanous             if (thisReq.url().has_query())
758a716aa74SEd Tanous             {
759a716aa74SEd Tanous                 url.set_query(thisReq.url().query());
760a716aa74SEd Tanous             }
76127b0cf90SEd Tanous             std::string data = thisReq.body();
762a716aa74SEd Tanous             client.sendDataWithCallback(std::move(data), url, thisReq.fields(),
763a716aa74SEd Tanous                                         thisReq.method(), cb);
7644c30e226SCarson Labrado         }
7654c30e226SCarson Labrado     }
7664c30e226SCarson Labrado 
767e002dbc0SCarson Labrado     // Forward request for a URI that is uptree of a top level collection to
768e002dbc0SCarson Labrado     // each known satellite BMC
769e002dbc0SCarson Labrado     void forwardContainsSubordinateRequests(
770e002dbc0SCarson Labrado         const crow::Request& thisReq,
771e002dbc0SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
772e002dbc0SCarson Labrado         const std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
773e002dbc0SCarson Labrado     {
774e002dbc0SCarson Labrado         for (const auto& sat : satelliteInfo)
775e002dbc0SCarson Labrado         {
776e002dbc0SCarson Labrado             std::function<void(crow::Response&)> cb = std::bind_front(
777e002dbc0SCarson Labrado                 processContainsSubordinateResponse, sat.first, asyncResp);
778e002dbc0SCarson Labrado 
779e002dbc0SCarson Labrado             // will ignore an expanded resource in the response if that resource
780e002dbc0SCarson Labrado             // is not already supported by the aggregating BMC
781e002dbc0SCarson Labrado             // TODO: Improve the processing so that we don't have to strip query
782e002dbc0SCarson Labrado             // params in this specific case
783a716aa74SEd Tanous             boost::urls::url url(sat.second);
784a716aa74SEd Tanous             url.set_path(thisReq.url().path());
785a716aa74SEd Tanous 
78627b0cf90SEd Tanous             std::string data = thisReq.body();
787a716aa74SEd Tanous 
788a716aa74SEd Tanous             client.sendDataWithCallback(std::move(data), url, thisReq.fields(),
789a716aa74SEd Tanous                                         thisReq.method(), cb);
790e002dbc0SCarson Labrado         }
791e002dbc0SCarson Labrado     }
792e002dbc0SCarson Labrado 
79332d7d8ebSCarson Labrado   public:
794f8ca6d79SEd Tanous     explicit RedfishAggregator(boost::asio::io_context& ioc) :
795f8ca6d79SEd Tanous         client(ioc,
796f8ca6d79SEd Tanous                std::make_shared<crow::ConnectionPolicy>(getAggregationPolicy()))
797f8ca6d79SEd Tanous     {
798f8ca6d79SEd Tanous         getSatelliteConfigs(constructorCallback);
799f8ca6d79SEd Tanous     }
80032d7d8ebSCarson Labrado     RedfishAggregator(const RedfishAggregator&) = delete;
80132d7d8ebSCarson Labrado     RedfishAggregator& operator=(const RedfishAggregator&) = delete;
80232d7d8ebSCarson Labrado     RedfishAggregator(RedfishAggregator&&) = delete;
80332d7d8ebSCarson Labrado     RedfishAggregator& operator=(RedfishAggregator&&) = delete;
80432d7d8ebSCarson Labrado     ~RedfishAggregator() = default;
80532d7d8ebSCarson Labrado 
806f8ca6d79SEd Tanous     static RedfishAggregator& getInstance(boost::asio::io_context* io = nullptr)
80732d7d8ebSCarson Labrado     {
808f8ca6d79SEd Tanous         static RedfishAggregator handler(*io);
80932d7d8ebSCarson Labrado         return handler;
81032d7d8ebSCarson Labrado     }
81132d7d8ebSCarson Labrado 
8128b2521a5SCarson Labrado     // Polls D-Bus to get all available satellite config information
8138b2521a5SCarson Labrado     // Expects a handler which interacts with the returned configs
8148b2521a5SCarson Labrado     static void getSatelliteConfigs(
8158b2521a5SCarson Labrado         std::function<
8168b2521a5SCarson Labrado             void(const boost::system::error_code&,
8178b2521a5SCarson Labrado                  const std::unordered_map<std::string, boost::urls::url>&)>
8188b2521a5SCarson Labrado             handler)
8198b2521a5SCarson Labrado     {
82062598e31SEd Tanous         BMCWEB_LOG_DEBUG("Gathering satellite configs");
8215eb468daSGeorge Liu         sdbusplus::message::object_path path("/xyz/openbmc_project/inventory");
8225eb468daSGeorge Liu         dbus::utility::getManagedObjects(
8235eb468daSGeorge Liu             "xyz.openbmc_project.EntityManager", path,
8248b2521a5SCarson Labrado             [handler{std::move(handler)}](
8258b2521a5SCarson Labrado                 const boost::system::error_code& ec,
8268b2521a5SCarson Labrado                 const dbus::utility::ManagedObjectType& objects) {
8278b2521a5SCarson Labrado             std::unordered_map<std::string, boost::urls::url> satelliteInfo;
8288b2521a5SCarson Labrado             if (ec)
8298b2521a5SCarson Labrado             {
83062598e31SEd Tanous                 BMCWEB_LOG_ERROR("DBUS response error {}, {}", ec.value(),
83162598e31SEd Tanous                                  ec.message());
8328b2521a5SCarson Labrado                 handler(ec, satelliteInfo);
8338b2521a5SCarson Labrado                 return;
8348b2521a5SCarson Labrado             }
8358b2521a5SCarson Labrado 
8368b2521a5SCarson Labrado             // Maps a chosen alias representing a satellite BMC to a url
8378b2521a5SCarson Labrado             // containing the information required to create a http
8388b2521a5SCarson Labrado             // connection to the satellite
8398b2521a5SCarson Labrado             findSatelliteConfigs(objects, satelliteInfo);
8408b2521a5SCarson Labrado 
8418b2521a5SCarson Labrado             if (!satelliteInfo.empty())
8428b2521a5SCarson Labrado             {
84362598e31SEd Tanous                 BMCWEB_LOG_DEBUG(
84462598e31SEd Tanous                     "Redfish Aggregation enabled with {} satellite BMCs",
84562598e31SEd Tanous                     std::to_string(satelliteInfo.size()));
8468b2521a5SCarson Labrado             }
8478b2521a5SCarson Labrado             else
8488b2521a5SCarson Labrado             {
84962598e31SEd Tanous                 BMCWEB_LOG_DEBUG(
85062598e31SEd Tanous                     "No satellite BMCs detected.  Redfish Aggregation not enabled");
8518b2521a5SCarson Labrado             }
8528b2521a5SCarson Labrado             handler(ec, satelliteInfo);
8535eb468daSGeorge Liu         });
8548b2521a5SCarson Labrado     }
8558b2521a5SCarson Labrado 
85646a81465SCarson Labrado     // Processes the response returned by a satellite BMC and loads its
85746a81465SCarson Labrado     // contents into asyncResp
85846a81465SCarson Labrado     static void
8591c0bb5c6SCarson Labrado         processResponse(std::string_view prefix,
8601c0bb5c6SCarson Labrado                         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
86146a81465SCarson Labrado                         crow::Response& resp)
86246a81465SCarson Labrado     {
86343e14d38SCarson Labrado         // 429 and 502 mean we didn't actually send the request so don't
86443e14d38SCarson Labrado         // overwrite the response headers in that case
86546b30283SCarson Labrado         if ((resp.result() == boost::beast::http::status::too_many_requests) ||
86646b30283SCarson Labrado             (resp.result() == boost::beast::http::status::bad_gateway))
86743e14d38SCarson Labrado         {
86843e14d38SCarson Labrado             asyncResp->res.result(resp.result());
86943e14d38SCarson Labrado             return;
87043e14d38SCarson Labrado         }
87143e14d38SCarson Labrado 
87232d7d8ebSCarson Labrado         // We want to attempt prefix fixing regardless of response code
87346a81465SCarson Labrado         // The resp will not have a json component
87446a81465SCarson Labrado         // We need to create a json from resp's stringResponse
87518f8f608SEd Tanous         if (isJsonContentType(resp.getHeaderValue("Content-Type")))
87646a81465SCarson Labrado         {
87727b0cf90SEd Tanous             nlohmann::json jsonVal = nlohmann::json::parse(*resp.body(),
87827b0cf90SEd Tanous                                                            nullptr, false);
87946a81465SCarson Labrado             if (jsonVal.is_discarded())
88046a81465SCarson Labrado             {
88162598e31SEd Tanous                 BMCWEB_LOG_ERROR("Error parsing satellite response as JSON");
88246a81465SCarson Labrado                 messages::operationFailed(asyncResp->res);
88346a81465SCarson Labrado                 return;
88446a81465SCarson Labrado             }
88546a81465SCarson Labrado 
88662598e31SEd Tanous             BMCWEB_LOG_DEBUG("Successfully parsed satellite response");
88746a81465SCarson Labrado 
8881c0bb5c6SCarson Labrado             addPrefixes(jsonVal, prefix);
8891c0bb5c6SCarson Labrado 
89062598e31SEd Tanous             BMCWEB_LOG_DEBUG("Added prefix to parsed satellite response");
8911c0bb5c6SCarson Labrado 
89246a81465SCarson Labrado             asyncResp->res.result(resp.result());
89346a81465SCarson Labrado             asyncResp->res.jsonValue = std::move(jsonVal);
89446a81465SCarson Labrado 
89562598e31SEd Tanous             BMCWEB_LOG_DEBUG("Finished writing asyncResp");
89646a81465SCarson Labrado         }
89746a81465SCarson Labrado         else
89846a81465SCarson Labrado         {
8990af78d5aSKhang Kieu             // We allow any Content-Type that is not "application/json" now
9000af78d5aSKhang Kieu             asyncResp->res.result(resp.result());
90127b0cf90SEd Tanous             asyncResp->res.copyBody(resp);
90246a81465SCarson Labrado         }
9030af78d5aSKhang Kieu         addAggregatedHeaders(asyncResp->res, resp, prefix);
90446a81465SCarson Labrado     }
90546a81465SCarson Labrado 
9064c30e226SCarson Labrado     // Processes the collection response returned by a satellite BMC and merges
9074c30e226SCarson Labrado     // its "@odata.id" values
9084c30e226SCarson Labrado     static void processCollectionResponse(
9094c30e226SCarson Labrado         const std::string& prefix,
9104c30e226SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
9114c30e226SCarson Labrado         crow::Response& resp)
9124c30e226SCarson Labrado     {
91343e14d38SCarson Labrado         // 429 and 502 mean we didn't actually send the request so don't
91443e14d38SCarson Labrado         // overwrite the response headers in that case
91546b30283SCarson Labrado         if ((resp.result() == boost::beast::http::status::too_many_requests) ||
91646b30283SCarson Labrado             (resp.result() == boost::beast::http::status::bad_gateway))
91743e14d38SCarson Labrado         {
91843e14d38SCarson Labrado             return;
91943e14d38SCarson Labrado         }
92043e14d38SCarson Labrado 
9214c30e226SCarson Labrado         if (resp.resultInt() != 200)
9224c30e226SCarson Labrado         {
92362598e31SEd Tanous             BMCWEB_LOG_DEBUG(
92462598e31SEd Tanous                 "Collection resource does not exist in satellite BMC \"{}\"",
92562598e31SEd Tanous                 prefix);
9264c30e226SCarson Labrado             // Return the error if we haven't had any successes
9274c30e226SCarson Labrado             if (asyncResp->res.resultInt() != 200)
9284c30e226SCarson Labrado             {
92946b30283SCarson Labrado                 asyncResp->res.result(resp.result());
93027b0cf90SEd Tanous                 asyncResp->res.copyBody(resp);
9314c30e226SCarson Labrado             }
9324c30e226SCarson Labrado             return;
9334c30e226SCarson Labrado         }
9344c30e226SCarson Labrado 
9354c30e226SCarson Labrado         // The resp will not have a json component
9364c30e226SCarson Labrado         // We need to create a json from resp's stringResponse
93718f8f608SEd Tanous         if (isJsonContentType(resp.getHeaderValue("Content-Type")))
9384c30e226SCarson Labrado         {
93927b0cf90SEd Tanous             nlohmann::json jsonVal = nlohmann::json::parse(*resp.body(),
94027b0cf90SEd Tanous                                                            nullptr, false);
9414c30e226SCarson Labrado             if (jsonVal.is_discarded())
9424c30e226SCarson Labrado             {
94362598e31SEd Tanous                 BMCWEB_LOG_ERROR("Error parsing satellite response as JSON");
9444c30e226SCarson Labrado 
9454c30e226SCarson Labrado                 // Notify the user if doing so won't overwrite a valid response
94646b30283SCarson Labrado                 if (asyncResp->res.resultInt() != 200)
9474c30e226SCarson Labrado                 {
9484c30e226SCarson Labrado                     messages::operationFailed(asyncResp->res);
9494c30e226SCarson Labrado                 }
9504c30e226SCarson Labrado                 return;
9514c30e226SCarson Labrado             }
9524c30e226SCarson Labrado 
95362598e31SEd Tanous             BMCWEB_LOG_DEBUG("Successfully parsed satellite response");
9544c30e226SCarson Labrado 
9554c30e226SCarson Labrado             // Now we need to add the prefix to the URIs contained in the
9564c30e226SCarson Labrado             // response.
9574c30e226SCarson Labrado             addPrefixes(jsonVal, prefix);
9584c30e226SCarson Labrado 
95962598e31SEd Tanous             BMCWEB_LOG_DEBUG("Added prefix to parsed satellite response");
9604c30e226SCarson Labrado 
9614c30e226SCarson Labrado             // If this resource collection does not exist on the aggregating bmc
9624c30e226SCarson Labrado             // and has not already been added from processing the response from
9634c30e226SCarson Labrado             // a different satellite then we need to completely overwrite
9644c30e226SCarson Labrado             // asyncResp
9654c30e226SCarson Labrado             if (asyncResp->res.resultInt() != 200)
9664c30e226SCarson Labrado             {
9674c30e226SCarson Labrado                 // We only want to aggregate collections that contain a
9684c30e226SCarson Labrado                 // "Members" array
9694c30e226SCarson Labrado                 if ((!jsonVal.contains("Members")) &&
9704c30e226SCarson Labrado                     (!jsonVal["Members"].is_array()))
9714c30e226SCarson Labrado                 {
97262598e31SEd Tanous                     BMCWEB_LOG_DEBUG(
97362598e31SEd Tanous                         "Skipping aggregating unsupported resource");
9744c30e226SCarson Labrado                     return;
9754c30e226SCarson Labrado                 }
9764c30e226SCarson Labrado 
97762598e31SEd Tanous                 BMCWEB_LOG_DEBUG(
97862598e31SEd Tanous                     "Collection does not exist, overwriting asyncResp");
9794c30e226SCarson Labrado                 asyncResp->res.result(resp.result());
9804c30e226SCarson Labrado                 asyncResp->res.jsonValue = std::move(jsonVal);
98143e14d38SCarson Labrado                 asyncResp->res.addHeader("Content-Type", "application/json");
9824c30e226SCarson Labrado 
98362598e31SEd Tanous                 BMCWEB_LOG_DEBUG("Finished overwriting asyncResp");
9844c30e226SCarson Labrado             }
9854c30e226SCarson Labrado             else
9864c30e226SCarson Labrado             {
9874c30e226SCarson Labrado                 // We only want to aggregate collections that contain a
9884c30e226SCarson Labrado                 // "Members" array
9894c30e226SCarson Labrado                 if ((!asyncResp->res.jsonValue.contains("Members")) &&
9904c30e226SCarson Labrado                     (!asyncResp->res.jsonValue["Members"].is_array()))
9914c30e226SCarson Labrado 
9924c30e226SCarson Labrado                 {
99362598e31SEd Tanous                     BMCWEB_LOG_DEBUG(
99462598e31SEd Tanous                         "Skipping aggregating unsupported resource");
9954c30e226SCarson Labrado                     return;
9964c30e226SCarson Labrado                 }
9974c30e226SCarson Labrado 
99862598e31SEd Tanous                 BMCWEB_LOG_DEBUG(
99962598e31SEd Tanous                     "Adding aggregated resources from \"{}\" to collection",
100062598e31SEd Tanous                     prefix);
10014c30e226SCarson Labrado 
10024c30e226SCarson Labrado                 // TODO: This is a potential race condition with multiple
10034c30e226SCarson Labrado                 // satellites and the aggregating bmc attempting to write to
10044c30e226SCarson Labrado                 // update this array.  May need to cascade calls to the next
10054c30e226SCarson Labrado                 // satellite at the end of this function.
10064c30e226SCarson Labrado                 // This is presumably not a concern when there is only a single
10074c30e226SCarson Labrado                 // satellite since the aggregating bmc should have completed
10084c30e226SCarson Labrado                 // before the response is received from the satellite.
10094c30e226SCarson Labrado 
10104c30e226SCarson Labrado                 auto& members = asyncResp->res.jsonValue["Members"];
10114c30e226SCarson Labrado                 auto& satMembers = jsonVal["Members"];
10124c30e226SCarson Labrado                 for (auto& satMem : satMembers)
10134c30e226SCarson Labrado                 {
1014b2ba3072SPatrick Williams                     members.emplace_back(std::move(satMem));
10154c30e226SCarson Labrado                 }
10164c30e226SCarson Labrado                 asyncResp->res.jsonValue["Members@odata.count"] =
10174c30e226SCarson Labrado                     members.size();
10184c30e226SCarson Labrado 
10194c30e226SCarson Labrado                 // TODO: Do we need to sort() after updating the array?
10204c30e226SCarson Labrado             }
10214c30e226SCarson Labrado         }
10224c30e226SCarson Labrado         else
10234c30e226SCarson Labrado         {
102462598e31SEd Tanous             BMCWEB_LOG_ERROR("Received unparsable response from \"{}\"",
102562598e31SEd Tanous                              prefix);
102643e14d38SCarson Labrado             // We received a response that was not a json.
102746b30283SCarson Labrado             // Notify the user only if we did not receive any valid responses
102846b30283SCarson Labrado             // and if the resource collection does not already exist on the
102946b30283SCarson Labrado             // aggregating BMC
103046b30283SCarson Labrado             if (asyncResp->res.resultInt() != 200)
10314c30e226SCarson Labrado             {
10324c30e226SCarson Labrado                 messages::operationFailed(asyncResp->res);
10334c30e226SCarson Labrado             }
10344c30e226SCarson Labrado         }
10354c30e226SCarson Labrado     } // End processCollectionResponse()
10364c30e226SCarson Labrado 
103746b30283SCarson Labrado     // Processes the response returned by a satellite BMC and merges any
103846b30283SCarson Labrado     // properties whose "@odata.id" value is the URI or either a top level
103946b30283SCarson Labrado     // collection or is uptree from a top level collection
104046b30283SCarson Labrado     static void processContainsSubordinateResponse(
104146b30283SCarson Labrado         const std::string& prefix,
104246b30283SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
104346b30283SCarson Labrado         crow::Response& resp)
104446b30283SCarson Labrado     {
104546b30283SCarson Labrado         // 429 and 502 mean we didn't actually send the request so don't
104646b30283SCarson Labrado         // overwrite the response headers in that case
104746b30283SCarson Labrado         if ((resp.result() == boost::beast::http::status::too_many_requests) ||
104846b30283SCarson Labrado             (resp.result() == boost::beast::http::status::bad_gateway))
104946b30283SCarson Labrado         {
105046b30283SCarson Labrado             return;
105146b30283SCarson Labrado         }
105246b30283SCarson Labrado 
105346b30283SCarson Labrado         if (resp.resultInt() != 200)
105446b30283SCarson Labrado         {
105562598e31SEd Tanous             BMCWEB_LOG_DEBUG(
105662598e31SEd Tanous                 "Resource uptree from Collection does not exist in satellite BMC \"{}\"",
105762598e31SEd Tanous                 prefix);
105846b30283SCarson Labrado             // Return the error if we haven't had any successes
105946b30283SCarson Labrado             if (asyncResp->res.resultInt() != 200)
106046b30283SCarson Labrado             {
106146b30283SCarson Labrado                 asyncResp->res.result(resp.result());
106227b0cf90SEd Tanous                 asyncResp->res.copyBody(resp);
106346b30283SCarson Labrado             }
106446b30283SCarson Labrado             return;
106546b30283SCarson Labrado         }
106646b30283SCarson Labrado 
106746b30283SCarson Labrado         // The resp will not have a json component
106846b30283SCarson Labrado         // We need to create a json from resp's stringResponse
106918f8f608SEd Tanous         if (isJsonContentType(resp.getHeaderValue("Content-Type")))
107046b30283SCarson Labrado         {
107146b30283SCarson Labrado             bool addedLinks = false;
107227b0cf90SEd Tanous             nlohmann::json jsonVal = nlohmann::json::parse(*resp.body(),
107327b0cf90SEd Tanous                                                            nullptr, false);
107446b30283SCarson Labrado             if (jsonVal.is_discarded())
107546b30283SCarson Labrado             {
107662598e31SEd Tanous                 BMCWEB_LOG_ERROR("Error parsing satellite response as JSON");
107746b30283SCarson Labrado 
107846b30283SCarson Labrado                 // Notify the user if doing so won't overwrite a valid response
107946b30283SCarson Labrado                 if (asyncResp->res.resultInt() != 200)
108046b30283SCarson Labrado                 {
108146b30283SCarson Labrado                     messages::operationFailed(asyncResp->res);
108246b30283SCarson Labrado                 }
108346b30283SCarson Labrado                 return;
108446b30283SCarson Labrado             }
108546b30283SCarson Labrado 
108662598e31SEd Tanous             BMCWEB_LOG_DEBUG("Successfully parsed satellite response");
108746b30283SCarson Labrado 
108846b30283SCarson Labrado             // Parse response and add properties missing from the AsyncResp
108946b30283SCarson Labrado             // Valid properties will be of the form <property>.@odata.id and
109046b30283SCarson Labrado             // @odata.id is a <URI>.  In other words, the json should contain
109146b30283SCarson Labrado             // multiple properties such that
109246b30283SCarson Labrado             // {"<property>":{"@odata.id": "<URI>"}}
109346b30283SCarson Labrado             nlohmann::json::object_t* object =
109446b30283SCarson Labrado                 jsonVal.get_ptr<nlohmann::json::object_t*>();
109546b30283SCarson Labrado             if (object == nullptr)
109646b30283SCarson Labrado             {
109762598e31SEd Tanous                 BMCWEB_LOG_ERROR("Parsed JSON was not an object?");
109846b30283SCarson Labrado                 return;
109946b30283SCarson Labrado             }
110046b30283SCarson Labrado 
110146b30283SCarson Labrado             for (std::pair<const std::string, nlohmann::json>& prop : *object)
110246b30283SCarson Labrado             {
110346b30283SCarson Labrado                 if (!prop.second.contains("@odata.id"))
110446b30283SCarson Labrado                 {
110546b30283SCarson Labrado                     continue;
110646b30283SCarson Labrado                 }
110746b30283SCarson Labrado 
110846b30283SCarson Labrado                 std::string* strValue =
110946b30283SCarson Labrado                     prop.second["@odata.id"].get_ptr<std::string*>();
111046b30283SCarson Labrado                 if (strValue == nullptr)
111146b30283SCarson Labrado                 {
111262598e31SEd Tanous                     BMCWEB_LOG_CRITICAL("Field wasn't a string????");
111346b30283SCarson Labrado                     continue;
111446b30283SCarson Labrado                 }
111546b30283SCarson Labrado                 if (!searchCollectionsArray(*strValue, SearchType::CollOrCon))
111646b30283SCarson Labrado                 {
111746b30283SCarson Labrado                     continue;
111846b30283SCarson Labrado                 }
111946b30283SCarson Labrado 
112046b30283SCarson Labrado                 addedLinks = true;
112146b30283SCarson Labrado                 if (!asyncResp->res.jsonValue.contains(prop.first))
112246b30283SCarson Labrado                 {
112346b30283SCarson Labrado                     // Only add the property if it did not already exist
112462598e31SEd Tanous                     BMCWEB_LOG_DEBUG("Adding link for {} from BMC {}",
112562598e31SEd Tanous                                      *strValue, prefix);
112646b30283SCarson Labrado                     asyncResp->res.jsonValue[prop.first]["@odata.id"] =
112746b30283SCarson Labrado                         *strValue;
112846b30283SCarson Labrado                     continue;
112946b30283SCarson Labrado                 }
113046b30283SCarson Labrado             }
113146b30283SCarson Labrado 
113246b30283SCarson Labrado             // If we added links to a previously unsuccessful (non-200) response
113346b30283SCarson Labrado             // then we need to make sure the response contains the bare minimum
113446b30283SCarson Labrado             // amount of additional information that we'd expect to have been
113546b30283SCarson Labrado             // populated.
113646b30283SCarson Labrado             if (addedLinks && (asyncResp->res.resultInt() != 200))
113746b30283SCarson Labrado             {
113846b30283SCarson Labrado                 // This resource didn't locally exist or an error
113946b30283SCarson Labrado                 // occurred while generating the response.  Remove any
114046b30283SCarson Labrado                 // error messages and update the error code.
114146b30283SCarson Labrado                 asyncResp->res.jsonValue.erase(
114246b30283SCarson Labrado                     asyncResp->res.jsonValue.find("error"));
114346b30283SCarson Labrado                 asyncResp->res.result(resp.result());
114446b30283SCarson Labrado 
114546b30283SCarson Labrado                 const auto& it1 = object->find("@odata.id");
114646b30283SCarson Labrado                 if (it1 != object->end())
114746b30283SCarson Labrado                 {
114846b30283SCarson Labrado                     asyncResp->res.jsonValue["@odata.id"] = (it1->second);
114946b30283SCarson Labrado                 }
115046b30283SCarson Labrado                 const auto& it2 = object->find("@odata.type");
115146b30283SCarson Labrado                 if (it2 != object->end())
115246b30283SCarson Labrado                 {
115346b30283SCarson Labrado                     asyncResp->res.jsonValue["@odata.type"] = (it2->second);
115446b30283SCarson Labrado                 }
115546b30283SCarson Labrado                 const auto& it3 = object->find("Id");
115646b30283SCarson Labrado                 if (it3 != object->end())
115746b30283SCarson Labrado                 {
115846b30283SCarson Labrado                     asyncResp->res.jsonValue["Id"] = (it3->second);
115946b30283SCarson Labrado                 }
116046b30283SCarson Labrado                 const auto& it4 = object->find("Name");
116146b30283SCarson Labrado                 if (it4 != object->end())
116246b30283SCarson Labrado                 {
116346b30283SCarson Labrado                     asyncResp->res.jsonValue["Name"] = (it4->second);
116446b30283SCarson Labrado                 }
116546b30283SCarson Labrado             }
116646b30283SCarson Labrado         }
116746b30283SCarson Labrado         else
116846b30283SCarson Labrado         {
116962598e31SEd Tanous             BMCWEB_LOG_ERROR("Received unparsable response from \"{}\"",
117062598e31SEd Tanous                              prefix);
117146b30283SCarson Labrado             // We received as response that was not a json
117246b30283SCarson Labrado             // Notify the user only if we did not receive any valid responses,
117346b30283SCarson Labrado             // and if the resource does not already exist on the aggregating BMC
117446b30283SCarson Labrado             if (asyncResp->res.resultInt() != 200)
117546b30283SCarson Labrado             {
117646b30283SCarson Labrado                 messages::operationFailed(asyncResp->res);
117746b30283SCarson Labrado             }
117846b30283SCarson Labrado         }
117946b30283SCarson Labrado     }
118046b30283SCarson Labrado 
118105916cefSCarson Labrado     // Entry point to Redfish Aggregation
118205916cefSCarson Labrado     // Returns Result stating whether or not we still need to locally handle the
118305916cefSCarson Labrado     // request
118405916cefSCarson Labrado     static Result
118505916cefSCarson Labrado         beginAggregation(const crow::Request& thisReq,
118605916cefSCarson Labrado                          const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
118705916cefSCarson Labrado     {
118805916cefSCarson Labrado         using crow::utility::OrMorePaths;
118905916cefSCarson Labrado         using crow::utility::readUrlSegments;
1190*4a7fbefdSEd Tanous         boost::urls::url_view url = thisReq.url();
1191411e6a11SCarson Labrado 
1192411e6a11SCarson Labrado         // We don't need to aggregate JsonSchemas due to potential issues such
1193411e6a11SCarson Labrado         // as version mismatches between aggregator and satellite BMCs.  For
1194411e6a11SCarson Labrado         // now assume that the aggregator has all the schemas and versions that
1195411e6a11SCarson Labrado         // the aggregated server has.
1196411e6a11SCarson Labrado         if (crow::utility::readUrlSegments(url, "redfish", "v1", "JsonSchemas",
1197411e6a11SCarson Labrado                                            crow::utility::OrMorePaths()))
1198411e6a11SCarson Labrado         {
1199411e6a11SCarson Labrado             return Result::LocalHandle;
1200411e6a11SCarson Labrado         }
1201411e6a11SCarson Labrado 
12027c4c52cbSCarson Labrado         // The first two segments should be "/redfish/v1".  We need to check
12037c4c52cbSCarson Labrado         // that before we can search topCollections
12047c4c52cbSCarson Labrado         if (!crow::utility::readUrlSegments(url, "redfish", "v1",
12057c4c52cbSCarson Labrado                                             crow::utility::OrMorePaths()))
120646a81465SCarson Labrado         {
120746a81465SCarson Labrado             return Result::LocalHandle;
120846a81465SCarson Labrado         }
120905916cefSCarson Labrado 
12107c4c52cbSCarson Labrado         // Parse the URI to see if it begins with a known top level collection
12117c4c52cbSCarson Labrado         // such as:
12127c4c52cbSCarson Labrado         // /redfish/v1/Chassis
12137c4c52cbSCarson Labrado         // /redfish/v1/UpdateService/FirmwareInventory
12147c4c52cbSCarson Labrado         const boost::urls::segments_view urlSegments = url.segments();
12157c4c52cbSCarson Labrado         boost::urls::url currentUrl("/");
1216*4a7fbefdSEd Tanous         boost::urls::segments_view::const_iterator it = urlSegments.begin();
1217*4a7fbefdSEd Tanous         boost::urls::segments_view::const_iterator end = urlSegments.end();
121805916cefSCarson Labrado 
12197c4c52cbSCarson Labrado         // Skip past the leading "/redfish/v1"
12207c4c52cbSCarson Labrado         it++;
12217c4c52cbSCarson Labrado         it++;
12227c4c52cbSCarson Labrado         for (; it != end; it++)
122305916cefSCarson Labrado         {
1224d4413c5bSGeorge Liu             const std::string& collectionItem = *it;
12257c4c52cbSCarson Labrado             if (std::binary_search(topCollections.begin(), topCollections.end(),
12267c4c52cbSCarson Labrado                                    currentUrl.buffer()))
12277c4c52cbSCarson Labrado             {
12287c4c52cbSCarson Labrado                 // We've matched a resource collection so this current segment
12297c4c52cbSCarson Labrado                 // might contain an aggregation prefix
12308b2521a5SCarson Labrado                 // TODO: This needs to be rethought when we can support multiple
12318b2521a5SCarson Labrado                 // satellites due to
12328b2521a5SCarson Labrado                 // /redfish/v1/AggregationService/AggregationSources/5B247A
12338b2521a5SCarson Labrado                 // being a local resource describing the satellite
12348b2521a5SCarson Labrado                 if (collectionItem.starts_with("5B247A_"))
123505916cefSCarson Labrado                 {
123662598e31SEd Tanous                     BMCWEB_LOG_DEBUG("Need to forward a request");
123705916cefSCarson Labrado 
123846a81465SCarson Labrado                     // Extract the prefix from the request's URI, retrieve the
12397c4c52cbSCarson Labrado                     // associated satellite config information, and then forward
12407c4c52cbSCarson Labrado                     // the request to that satellite.
12417c4c52cbSCarson Labrado                     startAggregation(AggregationType::Resource, thisReq,
12427c4c52cbSCarson Labrado                                      asyncResp);
124305916cefSCarson Labrado                     return Result::NoLocalHandle;
124405916cefSCarson Labrado                 }
12457c4c52cbSCarson Labrado 
12467c4c52cbSCarson Labrado                 // Handle collection URI with a trailing backslash
12477c4c52cbSCarson Labrado                 // e.g. /redfish/v1/Chassis/
12487c4c52cbSCarson Labrado                 it++;
12497c4c52cbSCarson Labrado                 if ((it == end) && collectionItem.empty())
12507c4c52cbSCarson Labrado                 {
12517c4c52cbSCarson Labrado                     startAggregation(AggregationType::Collection, thisReq,
12527c4c52cbSCarson Labrado                                      asyncResp);
12537c4c52cbSCarson Labrado                 }
12547c4c52cbSCarson Labrado 
12557c4c52cbSCarson Labrado                 // We didn't recognize the prefix or it's a collection with a
12567c4c52cbSCarson Labrado                 // trailing "/".  In both cases we still want to locally handle
12577c4c52cbSCarson Labrado                 // the request
12587c4c52cbSCarson Labrado                 return Result::LocalHandle;
12597c4c52cbSCarson Labrado             }
12607c4c52cbSCarson Labrado 
12617c4c52cbSCarson Labrado             currentUrl.segments().push_back(collectionItem);
12627c4c52cbSCarson Labrado         }
12637c4c52cbSCarson Labrado 
12647c4c52cbSCarson Labrado         // If we made it here then currentUrl could contain a top level
12657c4c52cbSCarson Labrado         // collection URI without a trailing "/", e.g. /redfish/v1/Chassis
12667c4c52cbSCarson Labrado         if (std::binary_search(topCollections.begin(), topCollections.end(),
12677c4c52cbSCarson Labrado                                currentUrl.buffer()))
12687c4c52cbSCarson Labrado         {
12697c4c52cbSCarson Labrado             startAggregation(AggregationType::Collection, thisReq, asyncResp);
127005916cefSCarson Labrado             return Result::LocalHandle;
127105916cefSCarson Labrado         }
127205916cefSCarson Labrado 
1273e002dbc0SCarson Labrado         // If nothing else then the request could be for a resource which has a
1274e002dbc0SCarson Labrado         // top level collection as a subordinate
1275e002dbc0SCarson Labrado         if (searchCollectionsArray(url.path(), SearchType::ContainsSubordinate))
1276e002dbc0SCarson Labrado         {
1277e002dbc0SCarson Labrado             startAggregation(AggregationType::ContainsSubordinate, thisReq,
1278e002dbc0SCarson Labrado                              asyncResp);
1279e002dbc0SCarson Labrado             return Result::LocalHandle;
1280e002dbc0SCarson Labrado         }
1281e002dbc0SCarson Labrado 
128262598e31SEd Tanous         BMCWEB_LOG_DEBUG("Aggregation not required for {}", url.buffer());
128305916cefSCarson Labrado         return Result::LocalHandle;
128405916cefSCarson Labrado     }
12857fb33566SCarson Labrado };
12867fb33566SCarson Labrado 
12877fb33566SCarson Labrado } // namespace redfish
1288