xref: /openbmc/bmcweb/features/redfish/include/redfish_aggregator.hpp (revision 62598e31d0988d589506d5091bd38f72d61faf5e)
17fb33566SCarson Labrado #pragma once
27fb33566SCarson Labrado 
33ccb3adbSEd Tanous #include "aggregation_utils.hpp"
43ccb3adbSEd Tanous #include "dbus_utility.hpp"
53ccb3adbSEd Tanous #include "error_messages.hpp"
63ccb3adbSEd Tanous #include "http_client.hpp"
73ccb3adbSEd Tanous #include "http_connection.hpp"
83ccb3adbSEd Tanous 
9411e6a11SCarson Labrado #include <boost/algorithm/string/predicate.hpp>
107fb33566SCarson Labrado 
117e8890c5SCarson Labrado #include <array>
127e8890c5SCarson Labrado 
137fb33566SCarson Labrado namespace redfish
147fb33566SCarson Labrado {
157fb33566SCarson Labrado 
16d14a48ffSCarson Labrado constexpr unsigned int aggregatorReadBodyLimit = 50 * 1024 * 1024; // 50MB
17d14a48ffSCarson Labrado 
1805916cefSCarson Labrado enum class Result
1905916cefSCarson Labrado {
2005916cefSCarson Labrado     LocalHandle,
2105916cefSCarson Labrado     NoLocalHandle
2205916cefSCarson Labrado };
2305916cefSCarson Labrado 
248fd333d6SCarson Labrado enum class SearchType
258fd333d6SCarson Labrado {
268fd333d6SCarson Labrado     Collection,
278fd333d6SCarson Labrado     CollOrCon,
288fd333d6SCarson Labrado     ContainsSubordinate,
298fd333d6SCarson Labrado     Resource
308fd333d6SCarson Labrado };
318fd333d6SCarson Labrado 
327e8890c5SCarson Labrado // clang-format off
337e8890c5SCarson Labrado // These are all of the properties as of version 2022.2 of the Redfish Resource
347e8890c5SCarson Labrado // and Schema Guide whose Type is "string (URI)" and the name does not end in a
357e8890c5SCarson Labrado // case-insensitive form of "uri".  That version of the schema is associated
367e8890c5SCarson Labrado // with version 1.16.0 of the Redfish Specification.  Going forward, new URI
377e8890c5SCarson Labrado // properties should end in URI so this list should not need to be maintained as
387e8890c5SCarson Labrado // the spec is updated.  NOTE: These have been pre-sorted in order to be
397e8890c5SCarson Labrado // compatible with binary search
407e8890c5SCarson Labrado constexpr std::array nonUriProperties{
417e8890c5SCarson Labrado     "@Redfish.ActionInfo",
427e8890c5SCarson Labrado     // "@odata.context", // We can't fix /redfish/v1/$metadata URIs
437e8890c5SCarson Labrado     "@odata.id",
447e8890c5SCarson Labrado     // "Destination", // Only used by EventService and won't be a Redfish URI
457e8890c5SCarson Labrado     // "HostName", // Isn't actually a Redfish URI
467e8890c5SCarson Labrado     "Image",
477e8890c5SCarson Labrado     "MetricProperty",
4832d7d8ebSCarson Labrado     // "OriginOfCondition", // Is URI when in request, but is object in response
497e8890c5SCarson Labrado     "TaskMonitor",
507e8890c5SCarson Labrado     "target", // normal string, but target URI for POST to invoke an action
517e8890c5SCarson Labrado };
527e8890c5SCarson Labrado // clang-format on
537e8890c5SCarson Labrado 
548fd333d6SCarson Labrado // Search the top collection array to determine if the passed URI is of a
558fd333d6SCarson Labrado // desired type
568fd333d6SCarson Labrado inline bool searchCollectionsArray(std::string_view uri,
578fd333d6SCarson Labrado                                    const SearchType searchType)
588fd333d6SCarson Labrado {
598fd333d6SCarson Labrado     constexpr std::string_view serviceRootUri = "/redfish/v1";
608fd333d6SCarson Labrado 
618fd333d6SCarson Labrado     // The passed URI must begin with "/redfish/v1", but we have to strip it
628fd333d6SCarson Labrado     // from the URI since topCollections does not include it in its URIs
638fd333d6SCarson Labrado     if (!uri.starts_with(serviceRootUri))
648fd333d6SCarson Labrado     {
658fd333d6SCarson Labrado         return false;
668fd333d6SCarson Labrado     }
678fd333d6SCarson Labrado 
688fd333d6SCarson Labrado     // Catch empty final segments such as "/redfish/v1/Chassis//"
698fd333d6SCarson Labrado     if (uri.ends_with("//"))
708fd333d6SCarson Labrado     {
718fd333d6SCarson Labrado         return false;
728fd333d6SCarson Labrado     }
738fd333d6SCarson Labrado 
748fd333d6SCarson Labrado     std::size_t parseCount = uri.size() - serviceRootUri.size();
758fd333d6SCarson Labrado     // Don't include the trailing "/" if it exists such as in "/redfish/v1/"
768fd333d6SCarson Labrado     if (uri.ends_with("/"))
778fd333d6SCarson Labrado     {
788fd333d6SCarson Labrado         parseCount--;
798fd333d6SCarson Labrado     }
808fd333d6SCarson Labrado 
818fd333d6SCarson Labrado     boost::urls::result<boost::urls::url_view> parsedUrl =
828fd333d6SCarson Labrado         boost::urls::parse_relative_ref(
838fd333d6SCarson Labrado             uri.substr(serviceRootUri.size(), parseCount));
848fd333d6SCarson Labrado     if (!parsedUrl)
858fd333d6SCarson Labrado     {
86*62598e31SEd Tanous         BMCWEB_LOG_ERROR("Failed to get target URI from {}",
87*62598e31SEd Tanous                          uri.substr(serviceRootUri.size()));
888fd333d6SCarson Labrado         return false;
898fd333d6SCarson Labrado     }
908fd333d6SCarson Labrado 
918fd333d6SCarson Labrado     if (!parsedUrl->segments().is_absolute() && !parsedUrl->segments().empty())
928fd333d6SCarson Labrado     {
938fd333d6SCarson Labrado         return false;
948fd333d6SCarson Labrado     }
958fd333d6SCarson Labrado 
968fd333d6SCarson Labrado     // If no segments() then the passed URI was either "/redfish/v1" or
978fd333d6SCarson Labrado     // "/redfish/v1/".
988fd333d6SCarson Labrado     if (parsedUrl->segments().empty())
998fd333d6SCarson Labrado     {
1008fd333d6SCarson Labrado         return (searchType == SearchType::ContainsSubordinate) ||
1018fd333d6SCarson Labrado                (searchType == SearchType::CollOrCon);
1028fd333d6SCarson Labrado     }
1038fd333d6SCarson Labrado 
1048fd333d6SCarson Labrado     const auto* it = std::lower_bound(
1058fd333d6SCarson Labrado         topCollections.begin(), topCollections.end(), parsedUrl->buffer());
1068fd333d6SCarson Labrado     if (it == topCollections.end())
1078fd333d6SCarson Labrado     {
1088fd333d6SCarson Labrado         // parsedUrl is alphabetically after the last entry in the array so it
1098fd333d6SCarson Labrado         // can't be a top collection or up tree from a top collection
1108fd333d6SCarson Labrado         return false;
1118fd333d6SCarson Labrado     }
1128fd333d6SCarson Labrado 
1138fd333d6SCarson Labrado     boost::urls::url collectionUrl(*it);
1148fd333d6SCarson Labrado     boost::urls::segments_view collectionSegments = collectionUrl.segments();
1158fd333d6SCarson Labrado     boost::urls::segments_view::iterator itCollection =
1168fd333d6SCarson Labrado         collectionSegments.begin();
1178fd333d6SCarson Labrado     const boost::urls::segments_view::const_iterator endCollection =
1188fd333d6SCarson Labrado         collectionSegments.end();
1198fd333d6SCarson Labrado 
1208fd333d6SCarson Labrado     // Each segment in the passed URI should match the found collection
1218fd333d6SCarson Labrado     for (const auto& segment : parsedUrl->segments())
1228fd333d6SCarson Labrado     {
1238fd333d6SCarson Labrado         if (itCollection == endCollection)
1248fd333d6SCarson Labrado         {
1258fd333d6SCarson Labrado             // Leftover segments means the target is for an aggregation
1268fd333d6SCarson Labrado             // supported resource
1278fd333d6SCarson Labrado             return searchType == SearchType::Resource;
1288fd333d6SCarson Labrado         }
1298fd333d6SCarson Labrado 
1308fd333d6SCarson Labrado         if (segment != (*itCollection))
1318fd333d6SCarson Labrado         {
1328fd333d6SCarson Labrado             return false;
1338fd333d6SCarson Labrado         }
1348fd333d6SCarson Labrado         itCollection++;
1358fd333d6SCarson Labrado     }
1368fd333d6SCarson Labrado 
1378fd333d6SCarson Labrado     // No remaining segments means the passed URI was a top level collection
1388fd333d6SCarson Labrado     if (searchType == SearchType::Collection)
1398fd333d6SCarson Labrado     {
1408fd333d6SCarson Labrado         return itCollection == endCollection;
1418fd333d6SCarson Labrado     }
1428fd333d6SCarson Labrado     if (searchType == SearchType::ContainsSubordinate)
1438fd333d6SCarson Labrado     {
1448fd333d6SCarson Labrado         return itCollection != endCollection;
1458fd333d6SCarson Labrado     }
1468fd333d6SCarson Labrado 
1478fd333d6SCarson Labrado     // Return this check instead of "true" in case other SearchTypes get added
1488fd333d6SCarson Labrado     return searchType == SearchType::CollOrCon;
1498fd333d6SCarson Labrado }
1508fd333d6SCarson Labrado 
1517e8890c5SCarson Labrado // Determines if the passed property contains a URI.  Those property names
1527e8890c5SCarson Labrado // either end with a case-insensitive version of "uri" or are specifically
1537e8890c5SCarson Labrado // defined in the above array.
15426ccae32SEd Tanous inline bool isPropertyUri(std::string_view propertyName)
1557e8890c5SCarson Labrado {
1567e8890c5SCarson Labrado     return boost::iends_with(propertyName, "uri") ||
1577e8890c5SCarson Labrado            std::binary_search(nonUriProperties.begin(), nonUriProperties.end(),
1587e8890c5SCarson Labrado                               propertyName);
1597e8890c5SCarson Labrado }
1607e8890c5SCarson Labrado 
1610af78d5aSKhang Kieu static inline void addPrefixToStringItem(std::string& strValue,
1620af78d5aSKhang Kieu                                          std::string_view prefix)
1631c0bb5c6SCarson Labrado {
1641c0bb5c6SCarson Labrado     // Make sure the value is a properly formatted URI
1650af78d5aSKhang Kieu     auto parsed = boost::urls::parse_relative_ref(strValue);
1661c0bb5c6SCarson Labrado     if (!parsed)
1671c0bb5c6SCarson Labrado     {
168*62598e31SEd Tanous         BMCWEB_LOG_CRITICAL("Couldn't parse URI from resource {}", strValue);
1691c0bb5c6SCarson Labrado         return;
1701c0bb5c6SCarson Labrado     }
1711c0bb5c6SCarson Labrado 
1721c0bb5c6SCarson Labrado     boost::urls::url_view thisUrl = *parsed;
1731c0bb5c6SCarson Labrado 
174411e6a11SCarson Labrado     // We don't need to aggregate JsonSchemas due to potential issues such as
175411e6a11SCarson Labrado     // version mismatches between aggregator and satellite BMCs.  For now
176411e6a11SCarson Labrado     // assume that the aggregator has all the schemas and versions that the
177411e6a11SCarson Labrado     // aggregated server has.
178411e6a11SCarson Labrado     if (crow::utility::readUrlSegments(thisUrl, "redfish", "v1", "JsonSchemas",
179411e6a11SCarson Labrado                                        crow::utility::OrMorePaths()))
180411e6a11SCarson Labrado     {
181*62598e31SEd Tanous         BMCWEB_LOG_DEBUG("Skipping JsonSchemas URI prefix fixing");
182411e6a11SCarson Labrado         return;
183411e6a11SCarson Labrado     }
184411e6a11SCarson Labrado 
18511987af6SCarson Labrado     // The first two segments should be "/redfish/v1".  We need to check that
18611987af6SCarson Labrado     // before we can search topCollections
18711987af6SCarson Labrado     if (!crow::utility::readUrlSegments(thisUrl, "redfish", "v1",
18811987af6SCarson Labrado                                         crow::utility::OrMorePaths()))
1891c0bb5c6SCarson Labrado     {
1901c0bb5c6SCarson Labrado         return;
1911c0bb5c6SCarson Labrado     }
1921c0bb5c6SCarson Labrado 
19311987af6SCarson Labrado     // Check array adding a segment each time until collection is identified
19411987af6SCarson Labrado     // Add prefix to segment after the collection
19511987af6SCarson Labrado     const boost::urls::segments_view urlSegments = thisUrl.segments();
19611987af6SCarson Labrado     bool addedPrefix = false;
19711987af6SCarson Labrado     boost::urls::url url("/");
19811987af6SCarson Labrado     boost::urls::segments_view::iterator it = urlSegments.begin();
19911987af6SCarson Labrado     const boost::urls::segments_view::const_iterator end = urlSegments.end();
20011987af6SCarson Labrado 
20111987af6SCarson Labrado     // Skip past the leading "/redfish/v1"
20211987af6SCarson Labrado     it++;
20311987af6SCarson Labrado     it++;
20411987af6SCarson Labrado     for (; it != end; it++)
2051c0bb5c6SCarson Labrado     {
20611987af6SCarson Labrado         // Trailing "/" will result in an empty segment.  In that case we need
20711987af6SCarson Labrado         // to return so we don't apply a prefix to top level collections such
20811987af6SCarson Labrado         // as "/redfish/v1/Chassis/"
20911987af6SCarson Labrado         if ((*it).empty())
21011987af6SCarson Labrado         {
211411e6a11SCarson Labrado             return;
2121c0bb5c6SCarson Labrado         }
2131c0bb5c6SCarson Labrado 
21411987af6SCarson Labrado         if (std::binary_search(topCollections.begin(), topCollections.end(),
21511987af6SCarson Labrado                                url.buffer()))
2161c0bb5c6SCarson Labrado         {
21711987af6SCarson Labrado             std::string collectionItem(prefix);
21811987af6SCarson Labrado             collectionItem += "_" + (*it);
21911987af6SCarson Labrado             url.segments().push_back(collectionItem);
22011987af6SCarson Labrado             it++;
22111987af6SCarson Labrado             addedPrefix = true;
22211987af6SCarson Labrado             break;
22311987af6SCarson Labrado         }
22411987af6SCarson Labrado 
22511987af6SCarson Labrado         url.segments().push_back(*it);
22611987af6SCarson Labrado     }
22711987af6SCarson Labrado 
22811987af6SCarson Labrado     // Finish constructing the URL here (if needed) to avoid additional checks
22911987af6SCarson Labrado     for (; it != end; it++)
23011987af6SCarson Labrado     {
23111987af6SCarson Labrado         url.segments().push_back(*it);
23211987af6SCarson Labrado     }
23311987af6SCarson Labrado 
23411987af6SCarson Labrado     if (addedPrefix)
23511987af6SCarson Labrado     {
23611987af6SCarson Labrado         url.segments().insert(url.segments().begin(), {"redfish", "v1"});
2370af78d5aSKhang Kieu         strValue = url.buffer();
2381c0bb5c6SCarson Labrado     }
2391c0bb5c6SCarson Labrado }
2401c0bb5c6SCarson Labrado 
2410af78d5aSKhang Kieu static inline void addPrefixToItem(nlohmann::json& item,
2420af78d5aSKhang Kieu                                    std::string_view prefix)
2430af78d5aSKhang Kieu {
2440af78d5aSKhang Kieu     std::string* strValue = item.get_ptr<std::string*>();
2450af78d5aSKhang Kieu     if (strValue == nullptr)
2460af78d5aSKhang Kieu     {
247*62598e31SEd Tanous         BMCWEB_LOG_CRITICAL("Field wasn't a string????");
2480af78d5aSKhang Kieu         return;
2490af78d5aSKhang Kieu     }
2500af78d5aSKhang Kieu     addPrefixToStringItem(*strValue, prefix);
2510af78d5aSKhang Kieu     item = *strValue;
2520af78d5aSKhang Kieu }
2530af78d5aSKhang Kieu 
2540af78d5aSKhang Kieu static inline void addAggregatedHeaders(crow::Response& asyncResp,
25524dadc88SCarson Labrado                                         const crow::Response& resp,
2560af78d5aSKhang Kieu                                         std::string_view prefix)
2570af78d5aSKhang Kieu {
2580af78d5aSKhang Kieu     if (!resp.getHeaderValue("Content-Type").empty())
2590af78d5aSKhang Kieu     {
2600af78d5aSKhang Kieu         asyncResp.addHeader(boost::beast::http::field::content_type,
2610af78d5aSKhang Kieu                             resp.getHeaderValue("Content-Type"));
2620af78d5aSKhang Kieu     }
2630af78d5aSKhang Kieu     if (!resp.getHeaderValue("Allow").empty())
2640af78d5aSKhang Kieu     {
2650af78d5aSKhang Kieu         asyncResp.addHeader(boost::beast::http::field::allow,
2660af78d5aSKhang Kieu                             resp.getHeaderValue("Allow"));
2670af78d5aSKhang Kieu     }
2680af78d5aSKhang Kieu     std::string_view header = resp.getHeaderValue("Location");
2690af78d5aSKhang Kieu     if (!header.empty())
2700af78d5aSKhang Kieu     {
2710af78d5aSKhang Kieu         std::string location(header);
2720af78d5aSKhang Kieu         addPrefixToStringItem(location, prefix);
2730af78d5aSKhang Kieu         asyncResp.addHeader(boost::beast::http::field::location, location);
2740af78d5aSKhang Kieu     }
2750af78d5aSKhang Kieu     if (!resp.getHeaderValue("Retry-After").empty())
2760af78d5aSKhang Kieu     {
2770af78d5aSKhang Kieu         asyncResp.addHeader(boost::beast::http::field::retry_after,
2780af78d5aSKhang Kieu                             resp.getHeaderValue("Retry-After"));
2790af78d5aSKhang Kieu     }
2800af78d5aSKhang Kieu     // TODO: we need special handling for Link Header Value
2810af78d5aSKhang Kieu }
2820af78d5aSKhang Kieu 
283b27e1cbeSCarson Labrado // Fix HTTP headers which appear in responses from Task resources among others
284b27e1cbeSCarson Labrado static inline void addPrefixToHeadersInResp(nlohmann::json& json,
285b27e1cbeSCarson Labrado                                             std::string_view prefix)
286b27e1cbeSCarson Labrado {
287b27e1cbeSCarson Labrado     // The passed in "HttpHeaders" should be an array of headers
288b27e1cbeSCarson Labrado     nlohmann::json::array_t* array = json.get_ptr<nlohmann::json::array_t*>();
289b27e1cbeSCarson Labrado     if (array == nullptr)
290b27e1cbeSCarson Labrado     {
291*62598e31SEd Tanous         BMCWEB_LOG_ERROR("Field wasn't an array_t????");
292b27e1cbeSCarson Labrado         return;
293b27e1cbeSCarson Labrado     }
294b27e1cbeSCarson Labrado 
295b27e1cbeSCarson Labrado     for (nlohmann::json& item : *array)
296b27e1cbeSCarson Labrado     {
297b27e1cbeSCarson Labrado         // Each header is a single string with the form "<Field>: <Value>"
298b27e1cbeSCarson Labrado         std::string* strHeader = item.get_ptr<std::string*>();
299b27e1cbeSCarson Labrado         if (strHeader == nullptr)
300b27e1cbeSCarson Labrado         {
301*62598e31SEd Tanous             BMCWEB_LOG_CRITICAL("Field wasn't a string????");
302b27e1cbeSCarson Labrado             continue;
303b27e1cbeSCarson Labrado         }
304b27e1cbeSCarson Labrado 
305b27e1cbeSCarson Labrado         constexpr std::string_view location = "Location: ";
306b27e1cbeSCarson Labrado         if (strHeader->starts_with(location))
307b27e1cbeSCarson Labrado         {
308b27e1cbeSCarson Labrado             std::string header = strHeader->substr(location.size());
309b27e1cbeSCarson Labrado             addPrefixToStringItem(header, prefix);
310b27e1cbeSCarson Labrado             *strHeader = std::string(location) + header;
311b27e1cbeSCarson Labrado         }
312b27e1cbeSCarson Labrado     }
313b27e1cbeSCarson Labrado }
314b27e1cbeSCarson Labrado 
3151c0bb5c6SCarson Labrado // Search the json for all URIs and add the supplied prefix if the URI is for
3167e8890c5SCarson Labrado // an aggregated resource.
3170af78d5aSKhang Kieu static inline void addPrefixes(nlohmann::json& json, std::string_view prefix)
3181c0bb5c6SCarson Labrado {
3191c0bb5c6SCarson Labrado     nlohmann::json::object_t* object =
3201c0bb5c6SCarson Labrado         json.get_ptr<nlohmann::json::object_t*>();
3211c0bb5c6SCarson Labrado     if (object != nullptr)
3221c0bb5c6SCarson Labrado     {
3231c0bb5c6SCarson Labrado         for (std::pair<const std::string, nlohmann::json>& item : *object)
3241c0bb5c6SCarson Labrado         {
3257e8890c5SCarson Labrado             if (isPropertyUri(item.first))
3261c0bb5c6SCarson Labrado             {
3277e8890c5SCarson Labrado                 addPrefixToItem(item.second, prefix);
3281c0bb5c6SCarson Labrado                 continue;
3291c0bb5c6SCarson Labrado             }
3301c0bb5c6SCarson Labrado 
331b27e1cbeSCarson Labrado             // "HttpHeaders" contains HTTP headers.  Among those we need to
332b27e1cbeSCarson Labrado             // attempt to fix the "Location" header
333b27e1cbeSCarson Labrado             if (item.first == "HttpHeaders")
334b27e1cbeSCarson Labrado             {
335b27e1cbeSCarson Labrado                 addPrefixToHeadersInResp(item.second, prefix);
336b27e1cbeSCarson Labrado                 continue;
337b27e1cbeSCarson Labrado             }
338b27e1cbeSCarson Labrado 
3391c0bb5c6SCarson Labrado             // Recusively parse the rest of the json
3401c0bb5c6SCarson Labrado             addPrefixes(item.second, prefix);
3411c0bb5c6SCarson Labrado         }
3421c0bb5c6SCarson Labrado         return;
3431c0bb5c6SCarson Labrado     }
3441c0bb5c6SCarson Labrado     nlohmann::json::array_t* array = json.get_ptr<nlohmann::json::array_t*>();
3451c0bb5c6SCarson Labrado     if (array != nullptr)
3461c0bb5c6SCarson Labrado     {
3471c0bb5c6SCarson Labrado         for (nlohmann::json& item : *array)
3481c0bb5c6SCarson Labrado         {
3491c0bb5c6SCarson Labrado             addPrefixes(item, prefix);
3501c0bb5c6SCarson Labrado         }
3511c0bb5c6SCarson Labrado     }
3521c0bb5c6SCarson Labrado }
3531c0bb5c6SCarson Labrado 
354d14a48ffSCarson Labrado inline boost::system::error_code aggregationRetryHandler(unsigned int respCode)
355a7a80296SCarson Labrado {
35632d7d8ebSCarson Labrado     // Allow all response codes because we want to surface any satellite
35732d7d8ebSCarson Labrado     // issue to the client
358*62598e31SEd Tanous     BMCWEB_LOG_DEBUG("Received {} response from satellite", respCode);
359d14a48ffSCarson Labrado     return boost::system::errc::make_error_code(boost::system::errc::success);
360d14a48ffSCarson Labrado }
361d14a48ffSCarson Labrado 
362d14a48ffSCarson Labrado inline crow::ConnectionPolicy getAggregationPolicy()
363d14a48ffSCarson Labrado {
364d14a48ffSCarson Labrado     return {.maxRetryAttempts = 1,
365d14a48ffSCarson Labrado             .requestByteLimit = aggregatorReadBodyLimit,
366d14a48ffSCarson Labrado             .maxConnections = 20,
367d14a48ffSCarson Labrado             .retryPolicyAction = "TerminateAfterRetries",
368d14a48ffSCarson Labrado             .retryIntervalSecs = std::chrono::seconds(0),
369d14a48ffSCarson Labrado             .invalidResp = aggregationRetryHandler};
370d14a48ffSCarson Labrado }
371d14a48ffSCarson Labrado 
372d14a48ffSCarson Labrado class RedfishAggregator
373d14a48ffSCarson Labrado {
374d14a48ffSCarson Labrado   private:
375d14a48ffSCarson Labrado     crow::HttpClient client;
376d14a48ffSCarson Labrado 
3777fb33566SCarson Labrado     // Dummy callback used by the Constructor so that it can report the number
3787fb33566SCarson Labrado     // of satellite configs when the class is first created
3797fb33566SCarson Labrado     static void constructorCallback(
3808b2521a5SCarson Labrado         const boost::system::error_code& ec,
3817fb33566SCarson Labrado         const std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
3827fb33566SCarson Labrado     {
3837fb33566SCarson Labrado         if (ec)
3847fb33566SCarson Labrado         {
385*62598e31SEd Tanous             BMCWEB_LOG_ERROR("Something went wrong while querying dbus!");
3867fb33566SCarson Labrado             return;
3877fb33566SCarson Labrado         }
3887fb33566SCarson Labrado 
389*62598e31SEd Tanous         BMCWEB_LOG_DEBUG("There were {} satellite configs found at startup",
390*62598e31SEd Tanous                          std::to_string(satelliteInfo.size()));
3917fb33566SCarson Labrado     }
3927fb33566SCarson Labrado 
3937fb33566SCarson Labrado     // Search D-Bus objects for satellite config objects and add their
3947fb33566SCarson Labrado     // information if valid
3957fb33566SCarson Labrado     static void findSatelliteConfigs(
3967fb33566SCarson Labrado         const dbus::utility::ManagedObjectType& objects,
3977fb33566SCarson Labrado         std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
3987fb33566SCarson Labrado     {
3997fb33566SCarson Labrado         for (const auto& objectPath : objects)
4007fb33566SCarson Labrado         {
4017fb33566SCarson Labrado             for (const auto& interface : objectPath.second)
4027fb33566SCarson Labrado             {
4037fb33566SCarson Labrado                 if (interface.first ==
4047fb33566SCarson Labrado                     "xyz.openbmc_project.Configuration.SatelliteController")
4057fb33566SCarson Labrado                 {
406*62598e31SEd Tanous                     BMCWEB_LOG_DEBUG("Found Satellite Controller at {}",
407*62598e31SEd Tanous                                      objectPath.first.str);
4087fb33566SCarson Labrado 
40905916cefSCarson Labrado                     if (!satelliteInfo.empty())
41005916cefSCarson Labrado                     {
411*62598e31SEd Tanous                         BMCWEB_LOG_ERROR(
412*62598e31SEd Tanous                             "Redfish Aggregation only supports one satellite!");
413*62598e31SEd Tanous                         BMCWEB_LOG_DEBUG("Clearing all satellite data");
41405916cefSCarson Labrado                         satelliteInfo.clear();
41505916cefSCarson Labrado                         return;
41605916cefSCarson Labrado                     }
41705916cefSCarson Labrado 
41805916cefSCarson Labrado                     // For now assume there will only be one satellite config.
41905916cefSCarson Labrado                     // Assign it the name/prefix "5B247A"
42005916cefSCarson Labrado                     addSatelliteConfig("5B247A", interface.second,
42105916cefSCarson Labrado                                        satelliteInfo);
4227fb33566SCarson Labrado                 }
4237fb33566SCarson Labrado             }
4247fb33566SCarson Labrado         }
4257fb33566SCarson Labrado     }
4267fb33566SCarson Labrado 
4277fb33566SCarson Labrado     // Parse the properties of a satellite config object and add the
4287fb33566SCarson Labrado     // configuration if the properties are valid
4297fb33566SCarson Labrado     static void addSatelliteConfig(
43005916cefSCarson Labrado         const std::string& name,
4317fb33566SCarson Labrado         const dbus::utility::DBusPropertiesMap& properties,
4327fb33566SCarson Labrado         std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
4337fb33566SCarson Labrado     {
4347fb33566SCarson Labrado         boost::urls::url url;
4357fb33566SCarson Labrado 
4367fb33566SCarson Labrado         for (const auto& prop : properties)
4377fb33566SCarson Labrado         {
43805916cefSCarson Labrado             if (prop.first == "Hostname")
4397fb33566SCarson Labrado             {
4407fb33566SCarson Labrado                 const std::string* propVal =
4417fb33566SCarson Labrado                     std::get_if<std::string>(&prop.second);
4427fb33566SCarson Labrado                 if (propVal == nullptr)
4437fb33566SCarson Labrado                 {
444*62598e31SEd Tanous                     BMCWEB_LOG_ERROR("Invalid Hostname value");
4457fb33566SCarson Labrado                     return;
4467fb33566SCarson Labrado                 }
4477fb33566SCarson Labrado                 url.set_host(*propVal);
4487fb33566SCarson Labrado             }
4497fb33566SCarson Labrado 
4507fb33566SCarson Labrado             else if (prop.first == "Port")
4517fb33566SCarson Labrado             {
4527fb33566SCarson Labrado                 const uint64_t* propVal = std::get_if<uint64_t>(&prop.second);
4537fb33566SCarson Labrado                 if (propVal == nullptr)
4547fb33566SCarson Labrado                 {
455*62598e31SEd Tanous                     BMCWEB_LOG_ERROR("Invalid Port value");
4567fb33566SCarson Labrado                     return;
4577fb33566SCarson Labrado                 }
4587fb33566SCarson Labrado 
4597fb33566SCarson Labrado                 if (*propVal > std::numeric_limits<uint16_t>::max())
4607fb33566SCarson Labrado                 {
461*62598e31SEd Tanous                     BMCWEB_LOG_ERROR("Port value out of range");
4627fb33566SCarson Labrado                     return;
4637fb33566SCarson Labrado                 }
464079360aeSEd Tanous                 url.set_port(std::to_string(static_cast<uint16_t>(*propVal)));
4657fb33566SCarson Labrado             }
4667fb33566SCarson Labrado 
4677fb33566SCarson Labrado             else if (prop.first == "AuthType")
4687fb33566SCarson Labrado             {
4697fb33566SCarson Labrado                 const std::string* propVal =
4707fb33566SCarson Labrado                     std::get_if<std::string>(&prop.second);
4717fb33566SCarson Labrado                 if (propVal == nullptr)
4727fb33566SCarson Labrado                 {
473*62598e31SEd Tanous                     BMCWEB_LOG_ERROR("Invalid AuthType value");
4747fb33566SCarson Labrado                     return;
4757fb33566SCarson Labrado                 }
4767fb33566SCarson Labrado 
4777fb33566SCarson Labrado                 // For now assume authentication not required to communicate
4787fb33566SCarson Labrado                 // with the satellite BMC
4797fb33566SCarson Labrado                 if (*propVal != "None")
4807fb33566SCarson Labrado                 {
481*62598e31SEd Tanous                     BMCWEB_LOG_ERROR(
482*62598e31SEd Tanous                         "Unsupported AuthType value: {}, only \"none\" is supported",
483*62598e31SEd Tanous                         *propVal);
4847fb33566SCarson Labrado                     return;
4857fb33566SCarson Labrado                 }
4867fb33566SCarson Labrado                 url.set_scheme("http");
4877fb33566SCarson Labrado             }
4887fb33566SCarson Labrado         } // Finished reading properties
4897fb33566SCarson Labrado 
4907fb33566SCarson Labrado         // Make sure all required config information was made available
4917fb33566SCarson Labrado         if (url.host().empty())
4927fb33566SCarson Labrado         {
493*62598e31SEd Tanous             BMCWEB_LOG_ERROR("Satellite config {} missing Host", name);
4947fb33566SCarson Labrado             return;
4957fb33566SCarson Labrado         }
4967fb33566SCarson Labrado 
4977fb33566SCarson Labrado         if (!url.has_port())
4987fb33566SCarson Labrado         {
499*62598e31SEd Tanous             BMCWEB_LOG_ERROR("Satellite config {} missing Port", name);
5007fb33566SCarson Labrado             return;
5017fb33566SCarson Labrado         }
5027fb33566SCarson Labrado 
5037fb33566SCarson Labrado         if (!url.has_scheme())
5047fb33566SCarson Labrado         {
505*62598e31SEd Tanous             BMCWEB_LOG_ERROR("Satellite config {} missing AuthType", name);
5067fb33566SCarson Labrado             return;
5077fb33566SCarson Labrado         }
5087fb33566SCarson Labrado 
5097fb33566SCarson Labrado         std::string resultString;
5107fb33566SCarson Labrado         auto result = satelliteInfo.insert_or_assign(name, std::move(url));
5117fb33566SCarson Labrado         if (result.second)
5127fb33566SCarson Labrado         {
5137fb33566SCarson Labrado             resultString = "Added new satellite config ";
5147fb33566SCarson Labrado         }
5157fb33566SCarson Labrado         else
5167fb33566SCarson Labrado         {
5177fb33566SCarson Labrado             resultString = "Updated existing satellite config ";
5187fb33566SCarson Labrado         }
5197fb33566SCarson Labrado 
520*62598e31SEd Tanous         BMCWEB_LOG_DEBUG("{}{} at {}://{}", resultString, name,
521*62598e31SEd Tanous                          result.first->second.scheme(),
522*62598e31SEd Tanous                          result.first->second.encoded_host_and_port());
5237fb33566SCarson Labrado     }
5247fb33566SCarson Labrado 
52546a81465SCarson Labrado     enum AggregationType
52646a81465SCarson Labrado     {
52746a81465SCarson Labrado         Collection,
528e002dbc0SCarson Labrado         ContainsSubordinate,
52946a81465SCarson Labrado         Resource,
53046a81465SCarson Labrado     };
53146a81465SCarson Labrado 
53246a81465SCarson Labrado     static void
533e002dbc0SCarson Labrado         startAggregation(AggregationType aggType, const crow::Request& thisReq,
53446a81465SCarson Labrado                          const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
53546a81465SCarson Labrado     {
536e002dbc0SCarson Labrado         if (thisReq.method() != boost::beast::http::verb::get)
537e002dbc0SCarson Labrado         {
538e002dbc0SCarson Labrado             if (aggType == AggregationType::Collection)
539db18fc98SCarson Labrado             {
540*62598e31SEd Tanous                 BMCWEB_LOG_DEBUG(
541*62598e31SEd Tanous                     "Only aggregate GET requests to top level collections");
542db18fc98SCarson Labrado                 return;
543db18fc98SCarson Labrado             }
544db18fc98SCarson Labrado 
545e002dbc0SCarson Labrado             if (aggType == AggregationType::ContainsSubordinate)
546e002dbc0SCarson Labrado             {
547*62598e31SEd Tanous                 BMCWEB_LOG_DEBUG(
548*62598e31SEd Tanous                     "Only aggregate GET requests when uptree of a top level collection");
549e002dbc0SCarson Labrado                 return;
550e002dbc0SCarson Labrado             }
551e002dbc0SCarson Labrado         }
552e002dbc0SCarson Labrado 
55346a81465SCarson Labrado         // Create a copy of thisReq so we we can still locally process the req
55446a81465SCarson Labrado         std::error_code ec;
55546a81465SCarson Labrado         auto localReq = std::make_shared<crow::Request>(thisReq.req, ec);
55646a81465SCarson Labrado         if (ec)
55746a81465SCarson Labrado         {
558*62598e31SEd Tanous             BMCWEB_LOG_ERROR("Failed to create copy of request");
559e002dbc0SCarson Labrado             if (aggType == AggregationType::Resource)
56046a81465SCarson Labrado             {
56146a81465SCarson Labrado                 messages::internalError(asyncResp->res);
56246a81465SCarson Labrado             }
56346a81465SCarson Labrado             return;
56446a81465SCarson Labrado         }
56546a81465SCarson Labrado 
566e002dbc0SCarson Labrado         getSatelliteConfigs(
567e002dbc0SCarson Labrado             std::bind_front(aggregateAndHandle, aggType, localReq, asyncResp));
56846a81465SCarson Labrado     }
56946a81465SCarson Labrado 
570db18fc98SCarson Labrado     static void findSatellite(
57146a81465SCarson Labrado         const crow::Request& req,
57246a81465SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
57346a81465SCarson Labrado         const std::unordered_map<std::string, boost::urls::url>& satelliteInfo,
57446a81465SCarson Labrado         std::string_view memberName)
57546a81465SCarson Labrado     {
57646a81465SCarson Labrado         // Determine if the resource ID begins with a known prefix
57746a81465SCarson Labrado         for (const auto& satellite : satelliteInfo)
57846a81465SCarson Labrado         {
57946a81465SCarson Labrado             std::string targetPrefix = satellite.first;
58046a81465SCarson Labrado             targetPrefix += "_";
58146a81465SCarson Labrado             if (memberName.starts_with(targetPrefix))
58246a81465SCarson Labrado             {
583*62598e31SEd Tanous                 BMCWEB_LOG_DEBUG("\"{}\" is a known prefix", satellite.first);
58446a81465SCarson Labrado 
58546a81465SCarson Labrado                 // Remove the known prefix from the request's URI and
58646a81465SCarson Labrado                 // then forward to the associated satellite BMC
58746a81465SCarson Labrado                 getInstance().forwardRequest(req, asyncResp, satellite.first,
58846a81465SCarson Labrado                                              satelliteInfo);
58946a81465SCarson Labrado                 return;
59046a81465SCarson Labrado             }
59146a81465SCarson Labrado         }
592db18fc98SCarson Labrado 
593db18fc98SCarson Labrado         // We didn't recognize the prefix and need to return a 404
59439662a3bSEd Tanous         std::string nameStr = req.url().segments().back();
595db18fc98SCarson Labrado         messages::resourceNotFound(asyncResp->res, "", nameStr);
59646a81465SCarson Labrado     }
59746a81465SCarson Labrado 
59846a81465SCarson Labrado     // Intended to handle an incoming request based on if Redfish Aggregation
59946a81465SCarson Labrado     // is enabled.  Forwards request to satellite BMC if it exists.
60046a81465SCarson Labrado     static void aggregateAndHandle(
601e002dbc0SCarson Labrado         AggregationType aggType,
60246a81465SCarson Labrado         const std::shared_ptr<crow::Request>& sharedReq,
60346a81465SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
6048b2521a5SCarson Labrado         const boost::system::error_code& ec,
60546a81465SCarson Labrado         const std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
60646a81465SCarson Labrado     {
60746a81465SCarson Labrado         if (sharedReq == nullptr)
60846a81465SCarson Labrado         {
60946a81465SCarson Labrado             return;
61046a81465SCarson Labrado         }
6118b2521a5SCarson Labrado         // Something went wrong while querying dbus
6128b2521a5SCarson Labrado         if (ec)
6138b2521a5SCarson Labrado         {
6148b2521a5SCarson Labrado             messages::internalError(asyncResp->res);
6158b2521a5SCarson Labrado             return;
6168b2521a5SCarson Labrado         }
617db18fc98SCarson Labrado 
618db18fc98SCarson Labrado         // No satellite configs means we don't need to keep attempting to
619db18fc98SCarson Labrado         // aggregate
620db18fc98SCarson Labrado         if (satelliteInfo.empty())
621db18fc98SCarson Labrado         {
622e002dbc0SCarson Labrado             // For collections or resources that can contain a subordinate
623e002dbc0SCarson Labrado             // top level collection we'll also handle the request locally so we
624db18fc98SCarson Labrado             // don't need to write an error code
625e002dbc0SCarson Labrado             if (aggType == AggregationType::Resource)
626db18fc98SCarson Labrado             {
62739662a3bSEd Tanous                 std::string nameStr = sharedReq->url().segments().back();
628db18fc98SCarson Labrado                 messages::resourceNotFound(asyncResp->res, "", nameStr);
629db18fc98SCarson Labrado             }
630db18fc98SCarson Labrado             return;
631db18fc98SCarson Labrado         }
632db18fc98SCarson Labrado 
63346a81465SCarson Labrado         const crow::Request& thisReq = *sharedReq;
634*62598e31SEd Tanous         BMCWEB_LOG_DEBUG("Aggregation is enabled, begin processing of {}",
635*62598e31SEd Tanous                          thisReq.target());
63646a81465SCarson Labrado 
63746a81465SCarson Labrado         // We previously determined the request is for a collection.  No need to
63846a81465SCarson Labrado         // check again
639e002dbc0SCarson Labrado         if (aggType == AggregationType::Collection)
64046a81465SCarson Labrado         {
641*62598e31SEd Tanous             BMCWEB_LOG_DEBUG("Aggregating a collection");
6424c30e226SCarson Labrado             // We need to use a specific response handler and send the
6434c30e226SCarson Labrado             // request to all known satellites
6444c30e226SCarson Labrado             getInstance().forwardCollectionRequests(thisReq, asyncResp,
6454c30e226SCarson Labrado                                                     satelliteInfo);
64646a81465SCarson Labrado             return;
64746a81465SCarson Labrado         }
64846a81465SCarson Labrado 
649e002dbc0SCarson Labrado         // We previously determined the request may contain a subordinate
650e002dbc0SCarson Labrado         // collection.  No need to check again
651e002dbc0SCarson Labrado         if (aggType == AggregationType::ContainsSubordinate)
652e002dbc0SCarson Labrado         {
653*62598e31SEd Tanous             BMCWEB_LOG_DEBUG(
654*62598e31SEd Tanous                 "Aggregating what may have a subordinate collection");
655e002dbc0SCarson Labrado             // We need to use a specific response handler and send the
656e002dbc0SCarson Labrado             // request to all known satellites
657e002dbc0SCarson Labrado             getInstance().forwardContainsSubordinateRequests(thisReq, asyncResp,
658e002dbc0SCarson Labrado                                                              satelliteInfo);
659e002dbc0SCarson Labrado             return;
660e002dbc0SCarson Labrado         }
661e002dbc0SCarson Labrado 
66239662a3bSEd Tanous         const boost::urls::segments_view urlSegments = thisReq.url().segments();
6637c4c52cbSCarson Labrado         boost::urls::url currentUrl("/");
6647c4c52cbSCarson Labrado         boost::urls::segments_view::iterator it = urlSegments.begin();
6657c4c52cbSCarson Labrado         const boost::urls::segments_view::const_iterator end =
6667c4c52cbSCarson Labrado             urlSegments.end();
6677c4c52cbSCarson Labrado 
6687c4c52cbSCarson Labrado         // Skip past the leading "/redfish/v1"
6697c4c52cbSCarson Labrado         it++;
6707c4c52cbSCarson Labrado         it++;
6717c4c52cbSCarson Labrado         for (; it != end; it++)
67246a81465SCarson Labrado         {
6737c4c52cbSCarson Labrado             if (std::binary_search(topCollections.begin(), topCollections.end(),
6747c4c52cbSCarson Labrado                                    currentUrl.buffer()))
6757c4c52cbSCarson Labrado             {
6767c4c52cbSCarson Labrado                 // We've matched a resource collection so this current segment
6777c4c52cbSCarson Labrado                 // must contain an aggregation prefix
6787c4c52cbSCarson Labrado                 findSatellite(thisReq, asyncResp, satelliteInfo, *it);
67946a81465SCarson Labrado                 return;
68046a81465SCarson Labrado             }
68146a81465SCarson Labrado 
6827c4c52cbSCarson Labrado             currentUrl.segments().push_back(*it);
68346a81465SCarson Labrado         }
684db18fc98SCarson Labrado 
685db18fc98SCarson Labrado         // We shouldn't reach this point since we should've hit one of the
686db18fc98SCarson Labrado         // previous exits
687db18fc98SCarson Labrado         messages::internalError(asyncResp->res);
68846a81465SCarson Labrado     }
68946a81465SCarson Labrado 
69046a81465SCarson Labrado     // Attempt to forward a request to the satellite BMC associated with the
69146a81465SCarson Labrado     // prefix.
69246a81465SCarson Labrado     void forwardRequest(
69346a81465SCarson Labrado         const crow::Request& thisReq,
69446a81465SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
69546a81465SCarson Labrado         const std::string& prefix,
69646a81465SCarson Labrado         const std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
69746a81465SCarson Labrado     {
69846a81465SCarson Labrado         const auto& sat = satelliteInfo.find(prefix);
69946a81465SCarson Labrado         if (sat == satelliteInfo.end())
70046a81465SCarson Labrado         {
70146a81465SCarson Labrado             // Realistically this shouldn't get called since we perform an
70246a81465SCarson Labrado             // earlier check to make sure the prefix exists
703*62598e31SEd Tanous             BMCWEB_LOG_ERROR("Unrecognized satellite prefix \"{}\"", prefix);
70446a81465SCarson Labrado             return;
70546a81465SCarson Labrado         }
70646a81465SCarson Labrado 
70746a81465SCarson Labrado         // We need to strip the prefix from the request's path
70846a81465SCarson Labrado         std::string targetURI(thisReq.target());
70946a81465SCarson Labrado         size_t pos = targetURI.find(prefix + "_");
71046a81465SCarson Labrado         if (pos == std::string::npos)
71146a81465SCarson Labrado         {
71246a81465SCarson Labrado             // If this fails then something went wrong
713*62598e31SEd Tanous             BMCWEB_LOG_ERROR("Error removing prefix \"{}_\" from request URI",
714*62598e31SEd Tanous                              prefix);
71546a81465SCarson Labrado             messages::internalError(asyncResp->res);
71646a81465SCarson Labrado             return;
71746a81465SCarson Labrado         }
71846a81465SCarson Labrado         targetURI.erase(pos, prefix.size() + 1);
71946a81465SCarson Labrado 
72046a81465SCarson Labrado         std::function<void(crow::Response&)> cb =
7211c0bb5c6SCarson Labrado             std::bind_front(processResponse, prefix, asyncResp);
72246a81465SCarson Labrado 
72346a81465SCarson Labrado         std::string data = thisReq.req.body();
7245e44e3d8SAppaRao Puli         client.sendDataWithCallback(
7255e44e3d8SAppaRao Puli             std::move(data), std::string(sat->second.host()),
7265e44e3d8SAppaRao Puli             sat->second.port_number(), targetURI, false /*useSSL*/,
7275e44e3d8SAppaRao Puli             thisReq.fields(), thisReq.method(), cb);
72846a81465SCarson Labrado     }
72946a81465SCarson Labrado 
7304c30e226SCarson Labrado     // Forward a request for a collection URI to each known satellite BMC
7314c30e226SCarson Labrado     void forwardCollectionRequests(
7324c30e226SCarson Labrado         const crow::Request& thisReq,
7334c30e226SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
7344c30e226SCarson Labrado         const std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
7354c30e226SCarson Labrado     {
7364c30e226SCarson Labrado         for (const auto& sat : satelliteInfo)
7374c30e226SCarson Labrado         {
7384c30e226SCarson Labrado             std::function<void(crow::Response&)> cb = std::bind_front(
7394c30e226SCarson Labrado                 processCollectionResponse, sat.first, asyncResp);
7404c30e226SCarson Labrado 
7414c30e226SCarson Labrado             std::string targetURI(thisReq.target());
7424c30e226SCarson Labrado             std::string data = thisReq.req.body();
7435e44e3d8SAppaRao Puli             client.sendDataWithCallback(
7445e44e3d8SAppaRao Puli                 std::move(data), std::string(sat.second.host()),
7455e44e3d8SAppaRao Puli                 sat.second.port_number(), targetURI, false /*useSSL*/,
7465e44e3d8SAppaRao Puli                 thisReq.fields(), thisReq.method(), cb);
7474c30e226SCarson Labrado         }
7484c30e226SCarson Labrado     }
7494c30e226SCarson Labrado 
750e002dbc0SCarson Labrado     // Forward request for a URI that is uptree of a top level collection to
751e002dbc0SCarson Labrado     // each known satellite BMC
752e002dbc0SCarson Labrado     void forwardContainsSubordinateRequests(
753e002dbc0SCarson Labrado         const crow::Request& thisReq,
754e002dbc0SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
755e002dbc0SCarson Labrado         const std::unordered_map<std::string, boost::urls::url>& satelliteInfo)
756e002dbc0SCarson Labrado     {
757e002dbc0SCarson Labrado         for (const auto& sat : satelliteInfo)
758e002dbc0SCarson Labrado         {
759e002dbc0SCarson Labrado             std::function<void(crow::Response&)> cb = std::bind_front(
760e002dbc0SCarson Labrado                 processContainsSubordinateResponse, sat.first, asyncResp);
761e002dbc0SCarson Labrado 
762e002dbc0SCarson Labrado             // will ignore an expanded resource in the response if that resource
763e002dbc0SCarson Labrado             // is not already supported by the aggregating BMC
764e002dbc0SCarson Labrado             // TODO: Improve the processing so that we don't have to strip query
765e002dbc0SCarson Labrado             // params in this specific case
766e002dbc0SCarson Labrado             std::string targetURI(thisReq.url().path());
767e002dbc0SCarson Labrado             std::string data = thisReq.req.body();
768e002dbc0SCarson Labrado             client.sendDataWithCallback(
769e002dbc0SCarson Labrado                 std::move(data), std::string(sat.second.host()),
770e002dbc0SCarson Labrado                 sat.second.port_number(), targetURI, false /*useSSL*/,
771e002dbc0SCarson Labrado                 thisReq.fields(), thisReq.method(), cb);
772e002dbc0SCarson Labrado         }
773e002dbc0SCarson Labrado     }
774e002dbc0SCarson Labrado 
77532d7d8ebSCarson Labrado   public:
776f8ca6d79SEd Tanous     explicit RedfishAggregator(boost::asio::io_context& ioc) :
777f8ca6d79SEd Tanous         client(ioc,
778f8ca6d79SEd Tanous                std::make_shared<crow::ConnectionPolicy>(getAggregationPolicy()))
779f8ca6d79SEd Tanous     {
780f8ca6d79SEd Tanous         getSatelliteConfigs(constructorCallback);
781f8ca6d79SEd Tanous     }
78232d7d8ebSCarson Labrado     RedfishAggregator(const RedfishAggregator&) = delete;
78332d7d8ebSCarson Labrado     RedfishAggregator& operator=(const RedfishAggregator&) = delete;
78432d7d8ebSCarson Labrado     RedfishAggregator(RedfishAggregator&&) = delete;
78532d7d8ebSCarson Labrado     RedfishAggregator& operator=(RedfishAggregator&&) = delete;
78632d7d8ebSCarson Labrado     ~RedfishAggregator() = default;
78732d7d8ebSCarson Labrado 
788f8ca6d79SEd Tanous     static RedfishAggregator& getInstance(boost::asio::io_context* io = nullptr)
78932d7d8ebSCarson Labrado     {
790f8ca6d79SEd Tanous         static RedfishAggregator handler(*io);
79132d7d8ebSCarson Labrado         return handler;
79232d7d8ebSCarson Labrado     }
79332d7d8ebSCarson Labrado 
7948b2521a5SCarson Labrado     // Polls D-Bus to get all available satellite config information
7958b2521a5SCarson Labrado     // Expects a handler which interacts with the returned configs
7968b2521a5SCarson Labrado     static void getSatelliteConfigs(
7978b2521a5SCarson Labrado         std::function<
7988b2521a5SCarson Labrado             void(const boost::system::error_code&,
7998b2521a5SCarson Labrado                  const std::unordered_map<std::string, boost::urls::url>&)>
8008b2521a5SCarson Labrado             handler)
8018b2521a5SCarson Labrado     {
802*62598e31SEd Tanous         BMCWEB_LOG_DEBUG("Gathering satellite configs");
8035eb468daSGeorge Liu         sdbusplus::message::object_path path("/xyz/openbmc_project/inventory");
8045eb468daSGeorge Liu         dbus::utility::getManagedObjects(
8055eb468daSGeorge Liu             "xyz.openbmc_project.EntityManager", path,
8068b2521a5SCarson Labrado             [handler{std::move(handler)}](
8078b2521a5SCarson Labrado                 const boost::system::error_code& ec,
8088b2521a5SCarson Labrado                 const dbus::utility::ManagedObjectType& objects) {
8098b2521a5SCarson Labrado             std::unordered_map<std::string, boost::urls::url> satelliteInfo;
8108b2521a5SCarson Labrado             if (ec)
8118b2521a5SCarson Labrado             {
812*62598e31SEd Tanous                 BMCWEB_LOG_ERROR("DBUS response error {}, {}", ec.value(),
813*62598e31SEd Tanous                                  ec.message());
8148b2521a5SCarson Labrado                 handler(ec, satelliteInfo);
8158b2521a5SCarson Labrado                 return;
8168b2521a5SCarson Labrado             }
8178b2521a5SCarson Labrado 
8188b2521a5SCarson Labrado             // Maps a chosen alias representing a satellite BMC to a url
8198b2521a5SCarson Labrado             // containing the information required to create a http
8208b2521a5SCarson Labrado             // connection to the satellite
8218b2521a5SCarson Labrado             findSatelliteConfigs(objects, satelliteInfo);
8228b2521a5SCarson Labrado 
8238b2521a5SCarson Labrado             if (!satelliteInfo.empty())
8248b2521a5SCarson Labrado             {
825*62598e31SEd Tanous                 BMCWEB_LOG_DEBUG(
826*62598e31SEd Tanous                     "Redfish Aggregation enabled with {} satellite BMCs",
827*62598e31SEd Tanous                     std::to_string(satelliteInfo.size()));
8288b2521a5SCarson Labrado             }
8298b2521a5SCarson Labrado             else
8308b2521a5SCarson Labrado             {
831*62598e31SEd Tanous                 BMCWEB_LOG_DEBUG(
832*62598e31SEd Tanous                     "No satellite BMCs detected.  Redfish Aggregation not enabled");
8338b2521a5SCarson Labrado             }
8348b2521a5SCarson Labrado             handler(ec, satelliteInfo);
8355eb468daSGeorge Liu             });
8368b2521a5SCarson Labrado     }
8378b2521a5SCarson Labrado 
83846a81465SCarson Labrado     // Processes the response returned by a satellite BMC and loads its
83946a81465SCarson Labrado     // contents into asyncResp
84046a81465SCarson Labrado     static void
8411c0bb5c6SCarson Labrado         processResponse(std::string_view prefix,
8421c0bb5c6SCarson Labrado                         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
84346a81465SCarson Labrado                         crow::Response& resp)
84446a81465SCarson Labrado     {
84543e14d38SCarson Labrado         // 429 and 502 mean we didn't actually send the request so don't
84643e14d38SCarson Labrado         // overwrite the response headers in that case
84746b30283SCarson Labrado         if ((resp.result() == boost::beast::http::status::too_many_requests) ||
84846b30283SCarson Labrado             (resp.result() == boost::beast::http::status::bad_gateway))
84943e14d38SCarson Labrado         {
85043e14d38SCarson Labrado             asyncResp->res.result(resp.result());
85143e14d38SCarson Labrado             return;
85243e14d38SCarson Labrado         }
85343e14d38SCarson Labrado 
85432d7d8ebSCarson Labrado         // We want to attempt prefix fixing regardless of response code
85546a81465SCarson Labrado         // The resp will not have a json component
85646a81465SCarson Labrado         // We need to create a json from resp's stringResponse
85746b30283SCarson Labrado         std::string_view contentType = resp.getHeaderValue("Content-Type");
85846b30283SCarson Labrado         if (boost::iequals(contentType, "application/json") ||
85946b30283SCarson Labrado             boost::iequals(contentType, "application/json; charset=utf-8"))
86046a81465SCarson Labrado         {
86189492a15SPatrick Williams             nlohmann::json jsonVal = nlohmann::json::parse(resp.body(), nullptr,
86289492a15SPatrick Williams                                                            false);
86346a81465SCarson Labrado             if (jsonVal.is_discarded())
86446a81465SCarson Labrado             {
865*62598e31SEd Tanous                 BMCWEB_LOG_ERROR("Error parsing satellite response as JSON");
86646a81465SCarson Labrado                 messages::operationFailed(asyncResp->res);
86746a81465SCarson Labrado                 return;
86846a81465SCarson Labrado             }
86946a81465SCarson Labrado 
870*62598e31SEd Tanous             BMCWEB_LOG_DEBUG("Successfully parsed satellite response");
87146a81465SCarson Labrado 
8721c0bb5c6SCarson Labrado             addPrefixes(jsonVal, prefix);
8731c0bb5c6SCarson Labrado 
874*62598e31SEd Tanous             BMCWEB_LOG_DEBUG("Added prefix to parsed satellite response");
8751c0bb5c6SCarson Labrado 
87646a81465SCarson Labrado             asyncResp->res.result(resp.result());
87746a81465SCarson Labrado             asyncResp->res.jsonValue = std::move(jsonVal);
87846a81465SCarson Labrado 
879*62598e31SEd Tanous             BMCWEB_LOG_DEBUG("Finished writing asyncResp");
88046a81465SCarson Labrado         }
88146a81465SCarson Labrado         else
88246a81465SCarson Labrado         {
8830af78d5aSKhang Kieu             // We allow any Content-Type that is not "application/json" now
8840af78d5aSKhang Kieu             asyncResp->res.result(resp.result());
8850af78d5aSKhang Kieu             asyncResp->res.write(resp.body());
88646a81465SCarson Labrado         }
8870af78d5aSKhang Kieu         addAggregatedHeaders(asyncResp->res, resp, prefix);
88846a81465SCarson Labrado     }
88946a81465SCarson Labrado 
8904c30e226SCarson Labrado     // Processes the collection response returned by a satellite BMC and merges
8914c30e226SCarson Labrado     // its "@odata.id" values
8924c30e226SCarson Labrado     static void processCollectionResponse(
8934c30e226SCarson Labrado         const std::string& prefix,
8944c30e226SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
8954c30e226SCarson Labrado         crow::Response& resp)
8964c30e226SCarson Labrado     {
89743e14d38SCarson Labrado         // 429 and 502 mean we didn't actually send the request so don't
89843e14d38SCarson Labrado         // overwrite the response headers in that case
89946b30283SCarson Labrado         if ((resp.result() == boost::beast::http::status::too_many_requests) ||
90046b30283SCarson Labrado             (resp.result() == boost::beast::http::status::bad_gateway))
90143e14d38SCarson Labrado         {
90243e14d38SCarson Labrado             return;
90343e14d38SCarson Labrado         }
90443e14d38SCarson Labrado 
9054c30e226SCarson Labrado         if (resp.resultInt() != 200)
9064c30e226SCarson Labrado         {
907*62598e31SEd Tanous             BMCWEB_LOG_DEBUG(
908*62598e31SEd Tanous                 "Collection resource does not exist in satellite BMC \"{}\"",
909*62598e31SEd Tanous                 prefix);
9104c30e226SCarson Labrado             // Return the error if we haven't had any successes
9114c30e226SCarson Labrado             if (asyncResp->res.resultInt() != 200)
9124c30e226SCarson Labrado             {
91346b30283SCarson Labrado                 asyncResp->res.result(resp.result());
91446b30283SCarson Labrado                 asyncResp->res.write(resp.body());
9154c30e226SCarson Labrado             }
9164c30e226SCarson Labrado             return;
9174c30e226SCarson Labrado         }
9184c30e226SCarson Labrado 
9194c30e226SCarson Labrado         // The resp will not have a json component
9204c30e226SCarson Labrado         // We need to create a json from resp's stringResponse
92146b30283SCarson Labrado         std::string_view contentType = resp.getHeaderValue("Content-Type");
92246b30283SCarson Labrado         if (boost::iequals(contentType, "application/json") ||
92346b30283SCarson Labrado             boost::iequals(contentType, "application/json; charset=utf-8"))
9244c30e226SCarson Labrado         {
92589492a15SPatrick Williams             nlohmann::json jsonVal = nlohmann::json::parse(resp.body(), nullptr,
92689492a15SPatrick Williams                                                            false);
9274c30e226SCarson Labrado             if (jsonVal.is_discarded())
9284c30e226SCarson Labrado             {
929*62598e31SEd Tanous                 BMCWEB_LOG_ERROR("Error parsing satellite response as JSON");
9304c30e226SCarson Labrado 
9314c30e226SCarson Labrado                 // Notify the user if doing so won't overwrite a valid response
93246b30283SCarson Labrado                 if (asyncResp->res.resultInt() != 200)
9334c30e226SCarson Labrado                 {
9344c30e226SCarson Labrado                     messages::operationFailed(asyncResp->res);
9354c30e226SCarson Labrado                 }
9364c30e226SCarson Labrado                 return;
9374c30e226SCarson Labrado             }
9384c30e226SCarson Labrado 
939*62598e31SEd Tanous             BMCWEB_LOG_DEBUG("Successfully parsed satellite response");
9404c30e226SCarson Labrado 
9414c30e226SCarson Labrado             // Now we need to add the prefix to the URIs contained in the
9424c30e226SCarson Labrado             // response.
9434c30e226SCarson Labrado             addPrefixes(jsonVal, prefix);
9444c30e226SCarson Labrado 
945*62598e31SEd Tanous             BMCWEB_LOG_DEBUG("Added prefix to parsed satellite response");
9464c30e226SCarson Labrado 
9474c30e226SCarson Labrado             // If this resource collection does not exist on the aggregating bmc
9484c30e226SCarson Labrado             // and has not already been added from processing the response from
9494c30e226SCarson Labrado             // a different satellite then we need to completely overwrite
9504c30e226SCarson Labrado             // asyncResp
9514c30e226SCarson Labrado             if (asyncResp->res.resultInt() != 200)
9524c30e226SCarson Labrado             {
9534c30e226SCarson Labrado                 // We only want to aggregate collections that contain a
9544c30e226SCarson Labrado                 // "Members" array
9554c30e226SCarson Labrado                 if ((!jsonVal.contains("Members")) &&
9564c30e226SCarson Labrado                     (!jsonVal["Members"].is_array()))
9574c30e226SCarson Labrado                 {
958*62598e31SEd Tanous                     BMCWEB_LOG_DEBUG(
959*62598e31SEd Tanous                         "Skipping aggregating unsupported resource");
9604c30e226SCarson Labrado                     return;
9614c30e226SCarson Labrado                 }
9624c30e226SCarson Labrado 
963*62598e31SEd Tanous                 BMCWEB_LOG_DEBUG(
964*62598e31SEd Tanous                     "Collection does not exist, overwriting asyncResp");
9654c30e226SCarson Labrado                 asyncResp->res.result(resp.result());
9664c30e226SCarson Labrado                 asyncResp->res.jsonValue = std::move(jsonVal);
96743e14d38SCarson Labrado                 asyncResp->res.addHeader("Content-Type", "application/json");
9684c30e226SCarson Labrado 
969*62598e31SEd Tanous                 BMCWEB_LOG_DEBUG("Finished overwriting asyncResp");
9704c30e226SCarson Labrado             }
9714c30e226SCarson Labrado             else
9724c30e226SCarson Labrado             {
9734c30e226SCarson Labrado                 // We only want to aggregate collections that contain a
9744c30e226SCarson Labrado                 // "Members" array
9754c30e226SCarson Labrado                 if ((!asyncResp->res.jsonValue.contains("Members")) &&
9764c30e226SCarson Labrado                     (!asyncResp->res.jsonValue["Members"].is_array()))
9774c30e226SCarson Labrado 
9784c30e226SCarson Labrado                 {
979*62598e31SEd Tanous                     BMCWEB_LOG_DEBUG(
980*62598e31SEd Tanous                         "Skipping aggregating unsupported resource");
9814c30e226SCarson Labrado                     return;
9824c30e226SCarson Labrado                 }
9834c30e226SCarson Labrado 
984*62598e31SEd Tanous                 BMCWEB_LOG_DEBUG(
985*62598e31SEd Tanous                     "Adding aggregated resources from \"{}\" to collection",
986*62598e31SEd Tanous                     prefix);
9874c30e226SCarson Labrado 
9884c30e226SCarson Labrado                 // TODO: This is a potential race condition with multiple
9894c30e226SCarson Labrado                 // satellites and the aggregating bmc attempting to write to
9904c30e226SCarson Labrado                 // update this array.  May need to cascade calls to the next
9914c30e226SCarson Labrado                 // satellite at the end of this function.
9924c30e226SCarson Labrado                 // This is presumably not a concern when there is only a single
9934c30e226SCarson Labrado                 // satellite since the aggregating bmc should have completed
9944c30e226SCarson Labrado                 // before the response is received from the satellite.
9954c30e226SCarson Labrado 
9964c30e226SCarson Labrado                 auto& members = asyncResp->res.jsonValue["Members"];
9974c30e226SCarson Labrado                 auto& satMembers = jsonVal["Members"];
9984c30e226SCarson Labrado                 for (auto& satMem : satMembers)
9994c30e226SCarson Labrado                 {
1000b2ba3072SPatrick Williams                     members.emplace_back(std::move(satMem));
10014c30e226SCarson Labrado                 }
10024c30e226SCarson Labrado                 asyncResp->res.jsonValue["Members@odata.count"] =
10034c30e226SCarson Labrado                     members.size();
10044c30e226SCarson Labrado 
10054c30e226SCarson Labrado                 // TODO: Do we need to sort() after updating the array?
10064c30e226SCarson Labrado             }
10074c30e226SCarson Labrado         }
10084c30e226SCarson Labrado         else
10094c30e226SCarson Labrado         {
1010*62598e31SEd Tanous             BMCWEB_LOG_ERROR("Received unparsable response from \"{}\"",
1011*62598e31SEd Tanous                              prefix);
101243e14d38SCarson Labrado             // We received a response that was not a json.
101346b30283SCarson Labrado             // Notify the user only if we did not receive any valid responses
101446b30283SCarson Labrado             // and if the resource collection does not already exist on the
101546b30283SCarson Labrado             // aggregating BMC
101646b30283SCarson Labrado             if (asyncResp->res.resultInt() != 200)
10174c30e226SCarson Labrado             {
10184c30e226SCarson Labrado                 messages::operationFailed(asyncResp->res);
10194c30e226SCarson Labrado             }
10204c30e226SCarson Labrado         }
10214c30e226SCarson Labrado     } // End processCollectionResponse()
10224c30e226SCarson Labrado 
102346b30283SCarson Labrado     // Processes the response returned by a satellite BMC and merges any
102446b30283SCarson Labrado     // properties whose "@odata.id" value is the URI or either a top level
102546b30283SCarson Labrado     // collection or is uptree from a top level collection
102646b30283SCarson Labrado     static void processContainsSubordinateResponse(
102746b30283SCarson Labrado         const std::string& prefix,
102846b30283SCarson Labrado         const std::shared_ptr<bmcweb::AsyncResp>& asyncResp,
102946b30283SCarson Labrado         crow::Response& resp)
103046b30283SCarson Labrado     {
103146b30283SCarson Labrado         // 429 and 502 mean we didn't actually send the request so don't
103246b30283SCarson Labrado         // overwrite the response headers in that case
103346b30283SCarson Labrado         if ((resp.result() == boost::beast::http::status::too_many_requests) ||
103446b30283SCarson Labrado             (resp.result() == boost::beast::http::status::bad_gateway))
103546b30283SCarson Labrado         {
103646b30283SCarson Labrado             return;
103746b30283SCarson Labrado         }
103846b30283SCarson Labrado 
103946b30283SCarson Labrado         if (resp.resultInt() != 200)
104046b30283SCarson Labrado         {
1041*62598e31SEd Tanous             BMCWEB_LOG_DEBUG(
1042*62598e31SEd Tanous                 "Resource uptree from Collection does not exist in satellite BMC \"{}\"",
1043*62598e31SEd Tanous                 prefix);
104446b30283SCarson Labrado             // Return the error if we haven't had any successes
104546b30283SCarson Labrado             if (asyncResp->res.resultInt() != 200)
104646b30283SCarson Labrado             {
104746b30283SCarson Labrado                 asyncResp->res.result(resp.result());
104846b30283SCarson Labrado                 asyncResp->res.write(resp.body());
104946b30283SCarson Labrado             }
105046b30283SCarson Labrado             return;
105146b30283SCarson Labrado         }
105246b30283SCarson Labrado 
105346b30283SCarson Labrado         // The resp will not have a json component
105446b30283SCarson Labrado         // We need to create a json from resp's stringResponse
105546b30283SCarson Labrado         std::string_view contentType = resp.getHeaderValue("Content-Type");
105646b30283SCarson Labrado         if (boost::iequals(contentType, "application/json") ||
105746b30283SCarson Labrado             boost::iequals(contentType, "application/json; charset=utf-8"))
105846b30283SCarson Labrado         {
105946b30283SCarson Labrado             bool addedLinks = false;
106089492a15SPatrick Williams             nlohmann::json jsonVal = nlohmann::json::parse(resp.body(), nullptr,
106189492a15SPatrick Williams                                                            false);
106246b30283SCarson Labrado             if (jsonVal.is_discarded())
106346b30283SCarson Labrado             {
1064*62598e31SEd Tanous                 BMCWEB_LOG_ERROR("Error parsing satellite response as JSON");
106546b30283SCarson Labrado 
106646b30283SCarson Labrado                 // Notify the user if doing so won't overwrite a valid response
106746b30283SCarson Labrado                 if (asyncResp->res.resultInt() != 200)
106846b30283SCarson Labrado                 {
106946b30283SCarson Labrado                     messages::operationFailed(asyncResp->res);
107046b30283SCarson Labrado                 }
107146b30283SCarson Labrado                 return;
107246b30283SCarson Labrado             }
107346b30283SCarson Labrado 
1074*62598e31SEd Tanous             BMCWEB_LOG_DEBUG("Successfully parsed satellite response");
107546b30283SCarson Labrado 
107646b30283SCarson Labrado             // Parse response and add properties missing from the AsyncResp
107746b30283SCarson Labrado             // Valid properties will be of the form <property>.@odata.id and
107846b30283SCarson Labrado             // @odata.id is a <URI>.  In other words, the json should contain
107946b30283SCarson Labrado             // multiple properties such that
108046b30283SCarson Labrado             // {"<property>":{"@odata.id": "<URI>"}}
108146b30283SCarson Labrado             nlohmann::json::object_t* object =
108246b30283SCarson Labrado                 jsonVal.get_ptr<nlohmann::json::object_t*>();
108346b30283SCarson Labrado             if (object == nullptr)
108446b30283SCarson Labrado             {
1085*62598e31SEd Tanous                 BMCWEB_LOG_ERROR("Parsed JSON was not an object?");
108646b30283SCarson Labrado                 return;
108746b30283SCarson Labrado             }
108846b30283SCarson Labrado 
108946b30283SCarson Labrado             for (std::pair<const std::string, nlohmann::json>& prop : *object)
109046b30283SCarson Labrado             {
109146b30283SCarson Labrado                 if (!prop.second.contains("@odata.id"))
109246b30283SCarson Labrado                 {
109346b30283SCarson Labrado                     continue;
109446b30283SCarson Labrado                 }
109546b30283SCarson Labrado 
109646b30283SCarson Labrado                 std::string* strValue =
109746b30283SCarson Labrado                     prop.second["@odata.id"].get_ptr<std::string*>();
109846b30283SCarson Labrado                 if (strValue == nullptr)
109946b30283SCarson Labrado                 {
1100*62598e31SEd Tanous                     BMCWEB_LOG_CRITICAL("Field wasn't a string????");
110146b30283SCarson Labrado                     continue;
110246b30283SCarson Labrado                 }
110346b30283SCarson Labrado                 if (!searchCollectionsArray(*strValue, SearchType::CollOrCon))
110446b30283SCarson Labrado                 {
110546b30283SCarson Labrado                     continue;
110646b30283SCarson Labrado                 }
110746b30283SCarson Labrado 
110846b30283SCarson Labrado                 addedLinks = true;
110946b30283SCarson Labrado                 if (!asyncResp->res.jsonValue.contains(prop.first))
111046b30283SCarson Labrado                 {
111146b30283SCarson Labrado                     // Only add the property if it did not already exist
1112*62598e31SEd Tanous                     BMCWEB_LOG_DEBUG("Adding link for {} from BMC {}",
1113*62598e31SEd Tanous                                      *strValue, prefix);
111446b30283SCarson Labrado                     asyncResp->res.jsonValue[prop.first]["@odata.id"] =
111546b30283SCarson Labrado                         *strValue;
111646b30283SCarson Labrado                     continue;
111746b30283SCarson Labrado                 }
111846b30283SCarson Labrado             }
111946b30283SCarson Labrado 
112046b30283SCarson Labrado             // If we added links to a previously unsuccessful (non-200) response
112146b30283SCarson Labrado             // then we need to make sure the response contains the bare minimum
112246b30283SCarson Labrado             // amount of additional information that we'd expect to have been
112346b30283SCarson Labrado             // populated.
112446b30283SCarson Labrado             if (addedLinks && (asyncResp->res.resultInt() != 200))
112546b30283SCarson Labrado             {
112646b30283SCarson Labrado                 // This resource didn't locally exist or an error
112746b30283SCarson Labrado                 // occurred while generating the response.  Remove any
112846b30283SCarson Labrado                 // error messages and update the error code.
112946b30283SCarson Labrado                 asyncResp->res.jsonValue.erase(
113046b30283SCarson Labrado                     asyncResp->res.jsonValue.find("error"));
113146b30283SCarson Labrado                 asyncResp->res.result(resp.result());
113246b30283SCarson Labrado 
113346b30283SCarson Labrado                 const auto& it1 = object->find("@odata.id");
113446b30283SCarson Labrado                 if (it1 != object->end())
113546b30283SCarson Labrado                 {
113646b30283SCarson Labrado                     asyncResp->res.jsonValue["@odata.id"] = (it1->second);
113746b30283SCarson Labrado                 }
113846b30283SCarson Labrado                 const auto& it2 = object->find("@odata.type");
113946b30283SCarson Labrado                 if (it2 != object->end())
114046b30283SCarson Labrado                 {
114146b30283SCarson Labrado                     asyncResp->res.jsonValue["@odata.type"] = (it2->second);
114246b30283SCarson Labrado                 }
114346b30283SCarson Labrado                 const auto& it3 = object->find("Id");
114446b30283SCarson Labrado                 if (it3 != object->end())
114546b30283SCarson Labrado                 {
114646b30283SCarson Labrado                     asyncResp->res.jsonValue["Id"] = (it3->second);
114746b30283SCarson Labrado                 }
114846b30283SCarson Labrado                 const auto& it4 = object->find("Name");
114946b30283SCarson Labrado                 if (it4 != object->end())
115046b30283SCarson Labrado                 {
115146b30283SCarson Labrado                     asyncResp->res.jsonValue["Name"] = (it4->second);
115246b30283SCarson Labrado                 }
115346b30283SCarson Labrado             }
115446b30283SCarson Labrado         }
115546b30283SCarson Labrado         else
115646b30283SCarson Labrado         {
1157*62598e31SEd Tanous             BMCWEB_LOG_ERROR("Received unparsable response from \"{}\"",
1158*62598e31SEd Tanous                              prefix);
115946b30283SCarson Labrado             // We received as response that was not a json
116046b30283SCarson Labrado             // Notify the user only if we did not receive any valid responses,
116146b30283SCarson Labrado             // and if the resource does not already exist on the aggregating BMC
116246b30283SCarson Labrado             if (asyncResp->res.resultInt() != 200)
116346b30283SCarson Labrado             {
116446b30283SCarson Labrado                 messages::operationFailed(asyncResp->res);
116546b30283SCarson Labrado             }
116646b30283SCarson Labrado         }
116746b30283SCarson Labrado     }
116846b30283SCarson Labrado 
116905916cefSCarson Labrado     // Entry point to Redfish Aggregation
117005916cefSCarson Labrado     // Returns Result stating whether or not we still need to locally handle the
117105916cefSCarson Labrado     // request
117205916cefSCarson Labrado     static Result
117305916cefSCarson Labrado         beginAggregation(const crow::Request& thisReq,
117405916cefSCarson Labrado                          const std::shared_ptr<bmcweb::AsyncResp>& asyncResp)
117505916cefSCarson Labrado     {
117605916cefSCarson Labrado         using crow::utility::OrMorePaths;
117705916cefSCarson Labrado         using crow::utility::readUrlSegments;
117839662a3bSEd Tanous         const boost::urls::url_view url = thisReq.url();
1179411e6a11SCarson Labrado 
1180411e6a11SCarson Labrado         // We don't need to aggregate JsonSchemas due to potential issues such
1181411e6a11SCarson Labrado         // as version mismatches between aggregator and satellite BMCs.  For
1182411e6a11SCarson Labrado         // now assume that the aggregator has all the schemas and versions that
1183411e6a11SCarson Labrado         // the aggregated server has.
1184411e6a11SCarson Labrado         if (crow::utility::readUrlSegments(url, "redfish", "v1", "JsonSchemas",
1185411e6a11SCarson Labrado                                            crow::utility::OrMorePaths()))
1186411e6a11SCarson Labrado         {
1187411e6a11SCarson Labrado             return Result::LocalHandle;
1188411e6a11SCarson Labrado         }
1189411e6a11SCarson Labrado 
11907c4c52cbSCarson Labrado         // The first two segments should be "/redfish/v1".  We need to check
11917c4c52cbSCarson Labrado         // that before we can search topCollections
11927c4c52cbSCarson Labrado         if (!crow::utility::readUrlSegments(url, "redfish", "v1",
11937c4c52cbSCarson Labrado                                             crow::utility::OrMorePaths()))
119446a81465SCarson Labrado         {
119546a81465SCarson Labrado             return Result::LocalHandle;
119646a81465SCarson Labrado         }
119705916cefSCarson Labrado 
11987c4c52cbSCarson Labrado         // Parse the URI to see if it begins with a known top level collection
11997c4c52cbSCarson Labrado         // such as:
12007c4c52cbSCarson Labrado         // /redfish/v1/Chassis
12017c4c52cbSCarson Labrado         // /redfish/v1/UpdateService/FirmwareInventory
12027c4c52cbSCarson Labrado         const boost::urls::segments_view urlSegments = url.segments();
12037c4c52cbSCarson Labrado         boost::urls::url currentUrl("/");
12047c4c52cbSCarson Labrado         boost::urls::segments_view::iterator it = urlSegments.begin();
12057c4c52cbSCarson Labrado         const boost::urls::segments_view::const_iterator end =
12067c4c52cbSCarson Labrado             urlSegments.end();
120705916cefSCarson Labrado 
12087c4c52cbSCarson Labrado         // Skip past the leading "/redfish/v1"
12097c4c52cbSCarson Labrado         it++;
12107c4c52cbSCarson Labrado         it++;
12117c4c52cbSCarson Labrado         for (; it != end; it++)
121205916cefSCarson Labrado         {
1213d4413c5bSGeorge Liu             const std::string& collectionItem = *it;
12147c4c52cbSCarson Labrado             if (std::binary_search(topCollections.begin(), topCollections.end(),
12157c4c52cbSCarson Labrado                                    currentUrl.buffer()))
12167c4c52cbSCarson Labrado             {
12177c4c52cbSCarson Labrado                 // We've matched a resource collection so this current segment
12187c4c52cbSCarson Labrado                 // might contain an aggregation prefix
12198b2521a5SCarson Labrado                 // TODO: This needs to be rethought when we can support multiple
12208b2521a5SCarson Labrado                 // satellites due to
12218b2521a5SCarson Labrado                 // /redfish/v1/AggregationService/AggregationSources/5B247A
12228b2521a5SCarson Labrado                 // being a local resource describing the satellite
12238b2521a5SCarson Labrado                 if (collectionItem.starts_with("5B247A_"))
122405916cefSCarson Labrado                 {
1225*62598e31SEd Tanous                     BMCWEB_LOG_DEBUG("Need to forward a request");
122605916cefSCarson Labrado 
122746a81465SCarson Labrado                     // Extract the prefix from the request's URI, retrieve the
12287c4c52cbSCarson Labrado                     // associated satellite config information, and then forward
12297c4c52cbSCarson Labrado                     // the request to that satellite.
12307c4c52cbSCarson Labrado                     startAggregation(AggregationType::Resource, thisReq,
12317c4c52cbSCarson Labrado                                      asyncResp);
123205916cefSCarson Labrado                     return Result::NoLocalHandle;
123305916cefSCarson Labrado                 }
12347c4c52cbSCarson Labrado 
12357c4c52cbSCarson Labrado                 // Handle collection URI with a trailing backslash
12367c4c52cbSCarson Labrado                 // e.g. /redfish/v1/Chassis/
12377c4c52cbSCarson Labrado                 it++;
12387c4c52cbSCarson Labrado                 if ((it == end) && collectionItem.empty())
12397c4c52cbSCarson Labrado                 {
12407c4c52cbSCarson Labrado                     startAggregation(AggregationType::Collection, thisReq,
12417c4c52cbSCarson Labrado                                      asyncResp);
12427c4c52cbSCarson Labrado                 }
12437c4c52cbSCarson Labrado 
12447c4c52cbSCarson Labrado                 // We didn't recognize the prefix or it's a collection with a
12457c4c52cbSCarson Labrado                 // trailing "/".  In both cases we still want to locally handle
12467c4c52cbSCarson Labrado                 // the request
12477c4c52cbSCarson Labrado                 return Result::LocalHandle;
12487c4c52cbSCarson Labrado             }
12497c4c52cbSCarson Labrado 
12507c4c52cbSCarson Labrado             currentUrl.segments().push_back(collectionItem);
12517c4c52cbSCarson Labrado         }
12527c4c52cbSCarson Labrado 
12537c4c52cbSCarson Labrado         // If we made it here then currentUrl could contain a top level
12547c4c52cbSCarson Labrado         // collection URI without a trailing "/", e.g. /redfish/v1/Chassis
12557c4c52cbSCarson Labrado         if (std::binary_search(topCollections.begin(), topCollections.end(),
12567c4c52cbSCarson Labrado                                currentUrl.buffer()))
12577c4c52cbSCarson Labrado         {
12587c4c52cbSCarson Labrado             startAggregation(AggregationType::Collection, thisReq, asyncResp);
125905916cefSCarson Labrado             return Result::LocalHandle;
126005916cefSCarson Labrado         }
126105916cefSCarson Labrado 
1262e002dbc0SCarson Labrado         // If nothing else then the request could be for a resource which has a
1263e002dbc0SCarson Labrado         // top level collection as a subordinate
1264e002dbc0SCarson Labrado         if (searchCollectionsArray(url.path(), SearchType::ContainsSubordinate))
1265e002dbc0SCarson Labrado         {
1266e002dbc0SCarson Labrado             startAggregation(AggregationType::ContainsSubordinate, thisReq,
1267e002dbc0SCarson Labrado                              asyncResp);
1268e002dbc0SCarson Labrado             return Result::LocalHandle;
1269e002dbc0SCarson Labrado         }
1270e002dbc0SCarson Labrado 
1271*62598e31SEd Tanous         BMCWEB_LOG_DEBUG("Aggregation not required for {}", url.buffer());
127205916cefSCarson Labrado         return Result::LocalHandle;
127305916cefSCarson Labrado     }
12747fb33566SCarson Labrado };
12757fb33566SCarson Labrado 
12767fb33566SCarson Labrado } // namespace redfish
1277