1 #pragma once 2 3 #include "aggregation_utils.hpp" 4 #include "dbus_utility.hpp" 5 #include "error_messages.hpp" 6 #include "http_client.hpp" 7 #include "http_connection.hpp" 8 #include "parsing.hpp" 9 10 #include <array> 11 #include <ranges> 12 #include <string_view> 13 14 namespace redfish 15 { 16 17 constexpr unsigned int aggregatorReadBodyLimit = 50 * 1024 * 1024; // 50MB 18 19 enum class Result 20 { 21 LocalHandle, 22 NoLocalHandle 23 }; 24 25 enum class SearchType 26 { 27 Collection, 28 CollOrCon, 29 ContainsSubordinate, 30 Resource 31 }; 32 33 // clang-format off 34 // These are all of the properties as of version 2022.2 of the Redfish Resource 35 // and Schema Guide whose Type is "string (URI)" and the name does not end in a 36 // case-insensitive form of "uri". That version of the schema is associated 37 // with version 1.16.0 of the Redfish Specification. Going forward, new URI 38 // properties should end in URI so this list should not need to be maintained as 39 // the spec is updated. NOTE: These have been pre-sorted in order to be 40 // compatible with binary search 41 constexpr std::array nonUriProperties{ 42 "@Redfish.ActionInfo", 43 // "@odata.context", // We can't fix /redfish/v1/$metadata URIs 44 "@odata.id", 45 // "Destination", // Only used by EventService and won't be a Redfish URI 46 // "HostName", // Isn't actually a Redfish URI 47 "Image", 48 "MetricProperty", 49 // "OriginOfCondition", // Is URI when in request, but is object in response 50 "TaskMonitor", 51 "target", // normal string, but target URI for POST to invoke an action 52 }; 53 // clang-format on 54 55 // Search the top collection array to determine if the passed URI is of a 56 // desired type 57 inline bool searchCollectionsArray(std::string_view uri, 58 const SearchType searchType) 59 { 60 constexpr std::string_view serviceRootUri = "/redfish/v1"; 61 62 // The passed URI must begin with "/redfish/v1", but we have to strip it 63 // from the URI since topCollections does not include it in its URIs 64 if (!uri.starts_with(serviceRootUri)) 65 { 66 return false; 67 } 68 69 // Catch empty final segments such as "/redfish/v1/Chassis//" 70 if (uri.ends_with("//")) 71 { 72 return false; 73 } 74 75 std::size_t parseCount = uri.size() - serviceRootUri.size(); 76 // Don't include the trailing "/" if it exists such as in "/redfish/v1/" 77 if (uri.ends_with("/")) 78 { 79 parseCount--; 80 } 81 82 boost::system::result<boost::urls::url_view> parsedUrl = 83 boost::urls::parse_relative_ref( 84 uri.substr(serviceRootUri.size(), parseCount)); 85 if (!parsedUrl) 86 { 87 BMCWEB_LOG_ERROR("Failed to get target URI from {}", 88 uri.substr(serviceRootUri.size())); 89 return false; 90 } 91 92 if (!parsedUrl->segments().is_absolute() && !parsedUrl->segments().empty()) 93 { 94 return false; 95 } 96 97 // If no segments() then the passed URI was either "/redfish/v1" or 98 // "/redfish/v1/". 99 if (parsedUrl->segments().empty()) 100 { 101 return (searchType == SearchType::ContainsSubordinate) || 102 (searchType == SearchType::CollOrCon); 103 } 104 std::string_view url = parsedUrl->buffer(); 105 const auto* it = std::ranges::lower_bound(topCollections, url); 106 if (it == topCollections.end()) 107 { 108 // parsedUrl is alphabetically after the last entry in the array so it 109 // can't be a top collection or up tree from a top collection 110 return false; 111 } 112 113 boost::urls::url collectionUrl(*it); 114 boost::urls::segments_view collectionSegments = collectionUrl.segments(); 115 boost::urls::segments_view::iterator itCollection = 116 collectionSegments.begin(); 117 const boost::urls::segments_view::const_iterator endCollection = 118 collectionSegments.end(); 119 120 // Each segment in the passed URI should match the found collection 121 for (const auto& segment : parsedUrl->segments()) 122 { 123 if (itCollection == endCollection) 124 { 125 // Leftover segments means the target is for an aggregation 126 // supported resource 127 return searchType == SearchType::Resource; 128 } 129 130 if (segment != (*itCollection)) 131 { 132 return false; 133 } 134 itCollection++; 135 } 136 137 // No remaining segments means the passed URI was a top level collection 138 if (searchType == SearchType::Collection) 139 { 140 return itCollection == endCollection; 141 } 142 if (searchType == SearchType::ContainsSubordinate) 143 { 144 return itCollection != endCollection; 145 } 146 147 // Return this check instead of "true" in case other SearchTypes get added 148 return searchType == SearchType::CollOrCon; 149 } 150 151 // Determines if the passed property contains a URI. Those property names 152 // either end with a case-insensitive version of "uri" or are specifically 153 // defined in the above array. 154 inline bool isPropertyUri(std::string_view propertyName) 155 { 156 if (propertyName.ends_with("uri") || propertyName.ends_with("Uri") || 157 propertyName.ends_with("URI")) 158 { 159 return true; 160 } 161 return std::binary_search(nonUriProperties.begin(), nonUriProperties.end(), 162 propertyName); 163 } 164 165 static inline void addPrefixToStringItem(std::string& strValue, 166 std::string_view prefix) 167 { 168 // Make sure the value is a properly formatted URI 169 auto parsed = boost::urls::parse_relative_ref(strValue); 170 if (!parsed) 171 { 172 // Note that DMTF URIs such as 173 // https://redfish.dmtf.org/registries/Base.1.15.0.json will fail this 174 // check and that's okay 175 BMCWEB_LOG_DEBUG("Couldn't parse URI from resource {}", strValue); 176 return; 177 } 178 179 boost::urls::url_view thisUrl = *parsed; 180 181 // We don't need to aggregate JsonSchemas due to potential issues such as 182 // version mismatches between aggregator and satellite BMCs. For now 183 // assume that the aggregator has all the schemas and versions that the 184 // aggregated server has. 185 if (crow::utility::readUrlSegments(thisUrl, "redfish", "v1", "JsonSchemas", 186 crow::utility::OrMorePaths())) 187 { 188 BMCWEB_LOG_DEBUG("Skipping JsonSchemas URI prefix fixing"); 189 return; 190 } 191 192 // The first two segments should be "/redfish/v1". We need to check that 193 // before we can search topCollections 194 if (!crow::utility::readUrlSegments(thisUrl, "redfish", "v1", 195 crow::utility::OrMorePaths())) 196 { 197 return; 198 } 199 200 // Check array adding a segment each time until collection is identified 201 // Add prefix to segment after the collection 202 const boost::urls::segments_view urlSegments = thisUrl.segments(); 203 bool addedPrefix = false; 204 boost::urls::url url("/"); 205 boost::urls::segments_view::const_iterator it = urlSegments.begin(); 206 const boost::urls::segments_view::const_iterator end = urlSegments.end(); 207 208 // Skip past the leading "/redfish/v1" 209 it++; 210 it++; 211 for (; it != end; it++) 212 { 213 // Trailing "/" will result in an empty segment. In that case we need 214 // to return so we don't apply a prefix to top level collections such 215 // as "/redfish/v1/Chassis/" 216 if ((*it).empty()) 217 { 218 return; 219 } 220 221 if (std::binary_search(topCollections.begin(), topCollections.end(), 222 url.buffer())) 223 { 224 std::string collectionItem(prefix); 225 collectionItem += "_" + (*it); 226 url.segments().push_back(collectionItem); 227 it++; 228 addedPrefix = true; 229 break; 230 } 231 232 url.segments().push_back(*it); 233 } 234 235 // Finish constructing the URL here (if needed) to avoid additional checks 236 for (; it != end; it++) 237 { 238 url.segments().push_back(*it); 239 } 240 241 if (addedPrefix) 242 { 243 url.segments().insert(url.segments().begin(), {"redfish", "v1"}); 244 strValue = url.buffer(); 245 } 246 } 247 248 static inline void addPrefixToItem(nlohmann::json& item, 249 std::string_view prefix) 250 { 251 std::string* strValue = item.get_ptr<std::string*>(); 252 if (strValue == nullptr) 253 { 254 // Values for properties like "InvalidURI" and "ResourceMissingAtURI" 255 // from within the Base Registry are objects instead of strings and will 256 // fall into this check 257 BMCWEB_LOG_DEBUG("Field was not a string"); 258 return; 259 } 260 addPrefixToStringItem(*strValue, prefix); 261 item = *strValue; 262 } 263 264 static inline void addAggregatedHeaders(crow::Response& asyncResp, 265 const crow::Response& resp, 266 std::string_view prefix) 267 { 268 if (!resp.getHeaderValue("Content-Type").empty()) 269 { 270 asyncResp.addHeader(boost::beast::http::field::content_type, 271 resp.getHeaderValue("Content-Type")); 272 } 273 if (!resp.getHeaderValue("Allow").empty()) 274 { 275 asyncResp.addHeader(boost::beast::http::field::allow, 276 resp.getHeaderValue("Allow")); 277 } 278 std::string_view header = resp.getHeaderValue("Location"); 279 if (!header.empty()) 280 { 281 std::string location(header); 282 addPrefixToStringItem(location, prefix); 283 asyncResp.addHeader(boost::beast::http::field::location, location); 284 } 285 if (!resp.getHeaderValue("Retry-After").empty()) 286 { 287 asyncResp.addHeader(boost::beast::http::field::retry_after, 288 resp.getHeaderValue("Retry-After")); 289 } 290 // TODO: we need special handling for Link Header Value 291 } 292 293 // Fix HTTP headers which appear in responses from Task resources among others 294 static inline void addPrefixToHeadersInResp(nlohmann::json& json, 295 std::string_view prefix) 296 { 297 // The passed in "HttpHeaders" should be an array of headers 298 nlohmann::json::array_t* array = json.get_ptr<nlohmann::json::array_t*>(); 299 if (array == nullptr) 300 { 301 BMCWEB_LOG_ERROR("Field wasn't an array_t????"); 302 return; 303 } 304 305 for (nlohmann::json& item : *array) 306 { 307 // Each header is a single string with the form "<Field>: <Value>" 308 std::string* strHeader = item.get_ptr<std::string*>(); 309 if (strHeader == nullptr) 310 { 311 BMCWEB_LOG_CRITICAL("Field wasn't a string????"); 312 continue; 313 } 314 315 constexpr std::string_view location = "Location: "; 316 if (strHeader->starts_with(location)) 317 { 318 std::string header = strHeader->substr(location.size()); 319 addPrefixToStringItem(header, prefix); 320 *strHeader = std::string(location) + header; 321 } 322 } 323 } 324 325 // Search the json for all URIs and add the supplied prefix if the URI is for 326 // an aggregated resource. 327 static inline void addPrefixes(nlohmann::json& json, std::string_view prefix) 328 { 329 nlohmann::json::object_t* object = 330 json.get_ptr<nlohmann::json::object_t*>(); 331 if (object != nullptr) 332 { 333 for (std::pair<const std::string, nlohmann::json>& item : *object) 334 { 335 if (isPropertyUri(item.first)) 336 { 337 addPrefixToItem(item.second, prefix); 338 continue; 339 } 340 341 // "HttpHeaders" contains HTTP headers. Among those we need to 342 // attempt to fix the "Location" header 343 if (item.first == "HttpHeaders") 344 { 345 addPrefixToHeadersInResp(item.second, prefix); 346 continue; 347 } 348 349 // Recursively parse the rest of the json 350 addPrefixes(item.second, prefix); 351 } 352 return; 353 } 354 nlohmann::json::array_t* array = json.get_ptr<nlohmann::json::array_t*>(); 355 if (array != nullptr) 356 { 357 for (nlohmann::json& item : *array) 358 { 359 addPrefixes(item, prefix); 360 } 361 } 362 } 363 364 inline boost::system::error_code aggregationRetryHandler(unsigned int respCode) 365 { 366 // Allow all response codes because we want to surface any satellite 367 // issue to the client 368 BMCWEB_LOG_DEBUG("Received {} response from satellite", respCode); 369 return boost::system::errc::make_error_code(boost::system::errc::success); 370 } 371 372 inline crow::ConnectionPolicy getAggregationPolicy() 373 { 374 return {.maxRetryAttempts = 0, 375 .requestByteLimit = aggregatorReadBodyLimit, 376 .maxConnections = 20, 377 .retryPolicyAction = "TerminateAfterRetries", 378 .retryIntervalSecs = std::chrono::seconds(0), 379 .invalidResp = aggregationRetryHandler}; 380 } 381 382 class RedfishAggregator 383 { 384 private: 385 crow::HttpClient client; 386 387 // Dummy callback used by the Constructor so that it can report the number 388 // of satellite configs when the class is first created 389 static void constructorCallback( 390 const boost::system::error_code& ec, 391 const std::unordered_map<std::string, boost::urls::url>& satelliteInfo) 392 { 393 if (ec) 394 { 395 BMCWEB_LOG_ERROR("Something went wrong while querying dbus!"); 396 return; 397 } 398 399 BMCWEB_LOG_DEBUG("There were {} satellite configs found at startup", 400 std::to_string(satelliteInfo.size())); 401 } 402 403 // Search D-Bus objects for satellite config objects and add their 404 // information if valid 405 static void findSatelliteConfigs( 406 const dbus::utility::ManagedObjectType& objects, 407 std::unordered_map<std::string, boost::urls::url>& satelliteInfo) 408 { 409 for (const auto& objectPath : objects) 410 { 411 for (const auto& interface : objectPath.second) 412 { 413 if (interface.first == 414 "xyz.openbmc_project.Configuration.SatelliteController") 415 { 416 BMCWEB_LOG_DEBUG("Found Satellite Controller at {}", 417 objectPath.first.str); 418 419 if (!satelliteInfo.empty()) 420 { 421 BMCWEB_LOG_ERROR( 422 "Redfish Aggregation only supports one satellite!"); 423 BMCWEB_LOG_DEBUG("Clearing all satellite data"); 424 satelliteInfo.clear(); 425 return; 426 } 427 428 // For now assume there will only be one satellite config. 429 // Assign it the name/prefix "5B247A" 430 addSatelliteConfig("5B247A", interface.second, 431 satelliteInfo); 432 } 433 } 434 } 435 } 436 437 // Parse the properties of a satellite config object and add the 438 // configuration if the properties are valid 439 static void addSatelliteConfig( 440 const std::string& name, 441 const dbus::utility::DBusPropertiesMap& properties, 442 std::unordered_map<std::string, boost::urls::url>& satelliteInfo) 443 { 444 boost::urls::url url; 445 446 for (const auto& prop : properties) 447 { 448 if (prop.first == "Hostname") 449 { 450 const std::string* propVal = 451 std::get_if<std::string>(&prop.second); 452 if (propVal == nullptr) 453 { 454 BMCWEB_LOG_ERROR("Invalid Hostname value"); 455 return; 456 } 457 url.set_host(*propVal); 458 } 459 460 else if (prop.first == "Port") 461 { 462 const uint64_t* propVal = std::get_if<uint64_t>(&prop.second); 463 if (propVal == nullptr) 464 { 465 BMCWEB_LOG_ERROR("Invalid Port value"); 466 return; 467 } 468 469 if (*propVal > std::numeric_limits<uint16_t>::max()) 470 { 471 BMCWEB_LOG_ERROR("Port value out of range"); 472 return; 473 } 474 url.set_port(std::to_string(static_cast<uint16_t>(*propVal))); 475 } 476 477 else if (prop.first == "AuthType") 478 { 479 const std::string* propVal = 480 std::get_if<std::string>(&prop.second); 481 if (propVal == nullptr) 482 { 483 BMCWEB_LOG_ERROR("Invalid AuthType value"); 484 return; 485 } 486 487 // For now assume authentication not required to communicate 488 // with the satellite BMC 489 if (*propVal != "None") 490 { 491 BMCWEB_LOG_ERROR( 492 "Unsupported AuthType value: {}, only \"none\" is supported", 493 *propVal); 494 return; 495 } 496 url.set_scheme("http"); 497 } 498 } // Finished reading properties 499 500 // Make sure all required config information was made available 501 if (url.host().empty()) 502 { 503 BMCWEB_LOG_ERROR("Satellite config {} missing Host", name); 504 return; 505 } 506 507 if (!url.has_port()) 508 { 509 BMCWEB_LOG_ERROR("Satellite config {} missing Port", name); 510 return; 511 } 512 513 if (!url.has_scheme()) 514 { 515 BMCWEB_LOG_ERROR("Satellite config {} missing AuthType", name); 516 return; 517 } 518 519 std::string resultString; 520 auto result = satelliteInfo.insert_or_assign(name, std::move(url)); 521 if (result.second) 522 { 523 resultString = "Added new satellite config "; 524 } 525 else 526 { 527 resultString = "Updated existing satellite config "; 528 } 529 530 BMCWEB_LOG_DEBUG("{}{} at {}://{}", resultString, name, 531 result.first->second.scheme(), 532 result.first->second.encoded_host_and_port()); 533 } 534 535 enum AggregationType 536 { 537 Collection, 538 ContainsSubordinate, 539 Resource, 540 }; 541 542 static void 543 startAggregation(AggregationType aggType, const crow::Request& thisReq, 544 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp) 545 { 546 if (thisReq.method() != boost::beast::http::verb::get) 547 { 548 if (aggType == AggregationType::Collection) 549 { 550 BMCWEB_LOG_DEBUG( 551 "Only aggregate GET requests to top level collections"); 552 return; 553 } 554 555 if (aggType == AggregationType::ContainsSubordinate) 556 { 557 BMCWEB_LOG_DEBUG( 558 "Only aggregate GET requests when uptree of a top level collection"); 559 return; 560 } 561 } 562 563 // Create a copy of thisReq so we we can still locally process the req 564 std::error_code ec; 565 auto localReq = std::make_shared<crow::Request>(thisReq.req, ec); 566 if (ec) 567 { 568 BMCWEB_LOG_ERROR("Failed to create copy of request"); 569 if (aggType == AggregationType::Resource) 570 { 571 messages::internalError(asyncResp->res); 572 } 573 return; 574 } 575 576 getSatelliteConfigs( 577 std::bind_front(aggregateAndHandle, aggType, localReq, asyncResp)); 578 } 579 580 static void findSatellite( 581 const crow::Request& req, 582 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp, 583 const std::unordered_map<std::string, boost::urls::url>& satelliteInfo, 584 std::string_view memberName) 585 { 586 // Determine if the resource ID begins with a known prefix 587 for (const auto& satellite : satelliteInfo) 588 { 589 std::string targetPrefix = satellite.first; 590 targetPrefix += "_"; 591 if (memberName.starts_with(targetPrefix)) 592 { 593 BMCWEB_LOG_DEBUG("\"{}\" is a known prefix", satellite.first); 594 595 // Remove the known prefix from the request's URI and 596 // then forward to the associated satellite BMC 597 getInstance().forwardRequest(req, asyncResp, satellite.first, 598 satelliteInfo); 599 return; 600 } 601 } 602 603 // We didn't recognize the prefix and need to return a 404 604 std::string nameStr = req.url().segments().back(); 605 messages::resourceNotFound(asyncResp->res, "", nameStr); 606 } 607 608 // Intended to handle an incoming request based on if Redfish Aggregation 609 // is enabled. Forwards request to satellite BMC if it exists. 610 static void aggregateAndHandle( 611 AggregationType aggType, 612 const std::shared_ptr<crow::Request>& sharedReq, 613 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp, 614 const boost::system::error_code& ec, 615 const std::unordered_map<std::string, boost::urls::url>& satelliteInfo) 616 { 617 if (sharedReq == nullptr) 618 { 619 return; 620 } 621 // Something went wrong while querying dbus 622 if (ec) 623 { 624 messages::internalError(asyncResp->res); 625 return; 626 } 627 628 // No satellite configs means we don't need to keep attempting to 629 // aggregate 630 if (satelliteInfo.empty()) 631 { 632 // For collections or resources that can contain a subordinate 633 // top level collection we'll also handle the request locally so we 634 // don't need to write an error code 635 if (aggType == AggregationType::Resource) 636 { 637 std::string nameStr = sharedReq->url().segments().back(); 638 messages::resourceNotFound(asyncResp->res, "", nameStr); 639 } 640 return; 641 } 642 643 const crow::Request& thisReq = *sharedReq; 644 BMCWEB_LOG_DEBUG("Aggregation is enabled, begin processing of {}", 645 thisReq.target()); 646 647 // We previously determined the request is for a collection. No need to 648 // check again 649 if (aggType == AggregationType::Collection) 650 { 651 BMCWEB_LOG_DEBUG("Aggregating a collection"); 652 // We need to use a specific response handler and send the 653 // request to all known satellites 654 getInstance().forwardCollectionRequests(thisReq, asyncResp, 655 satelliteInfo); 656 return; 657 } 658 659 // We previously determined the request may contain a subordinate 660 // collection. No need to check again 661 if (aggType == AggregationType::ContainsSubordinate) 662 { 663 BMCWEB_LOG_DEBUG( 664 "Aggregating what may have a subordinate collection"); 665 // We need to use a specific response handler and send the 666 // request to all known satellites 667 getInstance().forwardContainsSubordinateRequests(thisReq, asyncResp, 668 satelliteInfo); 669 return; 670 } 671 672 const boost::urls::segments_view urlSegments = thisReq.url().segments(); 673 boost::urls::url currentUrl("/"); 674 boost::urls::segments_view::const_iterator it = urlSegments.begin(); 675 boost::urls::segments_view::const_iterator end = urlSegments.end(); 676 677 // Skip past the leading "/redfish/v1" 678 it++; 679 it++; 680 for (; it != end; it++) 681 { 682 if (std::binary_search(topCollections.begin(), topCollections.end(), 683 currentUrl.buffer())) 684 { 685 // We've matched a resource collection so this current segment 686 // must contain an aggregation prefix 687 findSatellite(thisReq, asyncResp, satelliteInfo, *it); 688 return; 689 } 690 691 currentUrl.segments().push_back(*it); 692 } 693 694 // We shouldn't reach this point since we should've hit one of the 695 // previous exits 696 messages::internalError(asyncResp->res); 697 } 698 699 // Attempt to forward a request to the satellite BMC associated with the 700 // prefix. 701 void forwardRequest( 702 const crow::Request& thisReq, 703 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp, 704 const std::string& prefix, 705 const std::unordered_map<std::string, boost::urls::url>& satelliteInfo) 706 { 707 const auto& sat = satelliteInfo.find(prefix); 708 if (sat == satelliteInfo.end()) 709 { 710 // Realistically this shouldn't get called since we perform an 711 // earlier check to make sure the prefix exists 712 BMCWEB_LOG_ERROR("Unrecognized satellite prefix \"{}\"", prefix); 713 return; 714 } 715 716 // We need to strip the prefix from the request's path 717 boost::urls::url targetURI(thisReq.target()); 718 std::string path = thisReq.url().path(); 719 size_t pos = path.find(prefix + "_"); 720 if (pos == std::string::npos) 721 { 722 // If this fails then something went wrong 723 BMCWEB_LOG_ERROR("Error removing prefix \"{}_\" from request URI", 724 prefix); 725 messages::internalError(asyncResp->res); 726 return; 727 } 728 path.erase(pos, prefix.size() + 1); 729 730 std::function<void(crow::Response&)> cb = 731 std::bind_front(processResponse, prefix, asyncResp); 732 733 std::string data = thisReq.body(); 734 boost::urls::url url(sat->second); 735 url.set_path(path); 736 if (targetURI.has_query()) 737 { 738 url.set_query(targetURI.query()); 739 } 740 client.sendDataWithCallback(std::move(data), url, 741 ensuressl::VerifyCertificate::Verify, 742 thisReq.fields(), thisReq.method(), cb); 743 } 744 745 // Forward a request for a collection URI to each known satellite BMC 746 void forwardCollectionRequests( 747 const crow::Request& thisReq, 748 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp, 749 const std::unordered_map<std::string, boost::urls::url>& satelliteInfo) 750 { 751 for (const auto& sat : satelliteInfo) 752 { 753 std::function<void(crow::Response&)> cb = std::bind_front( 754 processCollectionResponse, sat.first, asyncResp); 755 756 boost::urls::url url(sat.second); 757 url.set_path(thisReq.url().path()); 758 if (thisReq.url().has_query()) 759 { 760 url.set_query(thisReq.url().query()); 761 } 762 std::string data = thisReq.body(); 763 client.sendDataWithCallback(std::move(data), url, 764 ensuressl::VerifyCertificate::Verify, 765 thisReq.fields(), thisReq.method(), cb); 766 } 767 } 768 769 // Forward request for a URI that is uptree of a top level collection to 770 // each known satellite BMC 771 void forwardContainsSubordinateRequests( 772 const crow::Request& thisReq, 773 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp, 774 const std::unordered_map<std::string, boost::urls::url>& satelliteInfo) 775 { 776 for (const auto& sat : satelliteInfo) 777 { 778 std::function<void(crow::Response&)> cb = std::bind_front( 779 processContainsSubordinateResponse, sat.first, asyncResp); 780 781 // will ignore an expanded resource in the response if that resource 782 // is not already supported by the aggregating BMC 783 // TODO: Improve the processing so that we don't have to strip query 784 // params in this specific case 785 boost::urls::url url(sat.second); 786 url.set_path(thisReq.url().path()); 787 788 std::string data = thisReq.body(); 789 790 client.sendDataWithCallback(std::move(data), url, 791 ensuressl::VerifyCertificate::Verify, 792 thisReq.fields(), thisReq.method(), cb); 793 } 794 } 795 796 public: 797 explicit RedfishAggregator(boost::asio::io_context& ioc) : 798 client(ioc, 799 std::make_shared<crow::ConnectionPolicy>(getAggregationPolicy())) 800 { 801 getSatelliteConfigs(constructorCallback); 802 } 803 RedfishAggregator(const RedfishAggregator&) = delete; 804 RedfishAggregator& operator=(const RedfishAggregator&) = delete; 805 RedfishAggregator(RedfishAggregator&&) = delete; 806 RedfishAggregator& operator=(RedfishAggregator&&) = delete; 807 ~RedfishAggregator() = default; 808 809 static RedfishAggregator& getInstance(boost::asio::io_context* io = nullptr) 810 { 811 static RedfishAggregator handler(*io); 812 return handler; 813 } 814 815 // Polls D-Bus to get all available satellite config information 816 // Expects a handler which interacts with the returned configs 817 static void getSatelliteConfigs( 818 std::function< 819 void(const boost::system::error_code&, 820 const std::unordered_map<std::string, boost::urls::url>&)> 821 handler) 822 { 823 BMCWEB_LOG_DEBUG("Gathering satellite configs"); 824 sdbusplus::message::object_path path("/xyz/openbmc_project/inventory"); 825 dbus::utility::getManagedObjects( 826 "xyz.openbmc_project.EntityManager", path, 827 [handler{std::move(handler)}]( 828 const boost::system::error_code& ec, 829 const dbus::utility::ManagedObjectType& objects) { 830 std::unordered_map<std::string, boost::urls::url> satelliteInfo; 831 if (ec) 832 { 833 BMCWEB_LOG_ERROR("DBUS response error {}, {}", ec.value(), 834 ec.message()); 835 handler(ec, satelliteInfo); 836 return; 837 } 838 839 // Maps a chosen alias representing a satellite BMC to a url 840 // containing the information required to create a http 841 // connection to the satellite 842 findSatelliteConfigs(objects, satelliteInfo); 843 844 if (!satelliteInfo.empty()) 845 { 846 BMCWEB_LOG_DEBUG( 847 "Redfish Aggregation enabled with {} satellite BMCs", 848 std::to_string(satelliteInfo.size())); 849 } 850 else 851 { 852 BMCWEB_LOG_DEBUG( 853 "No satellite BMCs detected. Redfish Aggregation not enabled"); 854 } 855 handler(ec, satelliteInfo); 856 }); 857 } 858 859 // Processes the response returned by a satellite BMC and loads its 860 // contents into asyncResp 861 static void 862 processResponse(std::string_view prefix, 863 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp, 864 crow::Response& resp) 865 { 866 // 429 and 502 mean we didn't actually send the request so don't 867 // overwrite the response headers in that case 868 if ((resp.result() == boost::beast::http::status::too_many_requests) || 869 (resp.result() == boost::beast::http::status::bad_gateway)) 870 { 871 asyncResp->res.result(resp.result()); 872 return; 873 } 874 875 // We want to attempt prefix fixing regardless of response code 876 // The resp will not have a json component 877 // We need to create a json from resp's stringResponse 878 if (isJsonContentType(resp.getHeaderValue("Content-Type"))) 879 { 880 nlohmann::json jsonVal = nlohmann::json::parse(*resp.body(), 881 nullptr, false); 882 if (jsonVal.is_discarded()) 883 { 884 BMCWEB_LOG_ERROR("Error parsing satellite response as JSON"); 885 messages::operationFailed(asyncResp->res); 886 return; 887 } 888 889 BMCWEB_LOG_DEBUG("Successfully parsed satellite response"); 890 891 addPrefixes(jsonVal, prefix); 892 893 BMCWEB_LOG_DEBUG("Added prefix to parsed satellite response"); 894 895 asyncResp->res.result(resp.result()); 896 asyncResp->res.jsonValue = std::move(jsonVal); 897 898 BMCWEB_LOG_DEBUG("Finished writing asyncResp"); 899 } 900 else 901 { 902 // We allow any Content-Type that is not "application/json" now 903 asyncResp->res.result(resp.result()); 904 asyncResp->res.copyBody(resp); 905 } 906 addAggregatedHeaders(asyncResp->res, resp, prefix); 907 } 908 909 // Processes the collection response returned by a satellite BMC and merges 910 // its "@odata.id" values 911 static void processCollectionResponse( 912 const std::string& prefix, 913 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp, 914 crow::Response& resp) 915 { 916 // 429 and 502 mean we didn't actually send the request so don't 917 // overwrite the response headers in that case 918 if ((resp.result() == boost::beast::http::status::too_many_requests) || 919 (resp.result() == boost::beast::http::status::bad_gateway)) 920 { 921 return; 922 } 923 924 if (resp.resultInt() != 200) 925 { 926 BMCWEB_LOG_DEBUG( 927 "Collection resource does not exist in satellite BMC \"{}\"", 928 prefix); 929 // Return the error if we haven't had any successes 930 if (asyncResp->res.resultInt() != 200) 931 { 932 asyncResp->res.result(resp.result()); 933 asyncResp->res.copyBody(resp); 934 } 935 return; 936 } 937 938 // The resp will not have a json component 939 // We need to create a json from resp's stringResponse 940 if (isJsonContentType(resp.getHeaderValue("Content-Type"))) 941 { 942 nlohmann::json jsonVal = nlohmann::json::parse(*resp.body(), 943 nullptr, false); 944 if (jsonVal.is_discarded()) 945 { 946 BMCWEB_LOG_ERROR("Error parsing satellite response as JSON"); 947 948 // Notify the user if doing so won't overwrite a valid response 949 if (asyncResp->res.resultInt() != 200) 950 { 951 messages::operationFailed(asyncResp->res); 952 } 953 return; 954 } 955 956 BMCWEB_LOG_DEBUG("Successfully parsed satellite response"); 957 958 // Now we need to add the prefix to the URIs contained in the 959 // response. 960 addPrefixes(jsonVal, prefix); 961 962 BMCWEB_LOG_DEBUG("Added prefix to parsed satellite response"); 963 964 // If this resource collection does not exist on the aggregating bmc 965 // and has not already been added from processing the response from 966 // a different satellite then we need to completely overwrite 967 // asyncResp 968 if (asyncResp->res.resultInt() != 200) 969 { 970 // We only want to aggregate collections that contain a 971 // "Members" array 972 if ((!jsonVal.contains("Members")) && 973 (!jsonVal["Members"].is_array())) 974 { 975 BMCWEB_LOG_DEBUG( 976 "Skipping aggregating unsupported resource"); 977 return; 978 } 979 980 BMCWEB_LOG_DEBUG( 981 "Collection does not exist, overwriting asyncResp"); 982 asyncResp->res.result(resp.result()); 983 asyncResp->res.jsonValue = std::move(jsonVal); 984 asyncResp->res.addHeader("Content-Type", "application/json"); 985 986 BMCWEB_LOG_DEBUG("Finished overwriting asyncResp"); 987 } 988 else 989 { 990 // We only want to aggregate collections that contain a 991 // "Members" array 992 if ((!asyncResp->res.jsonValue.contains("Members")) && 993 (!asyncResp->res.jsonValue["Members"].is_array())) 994 995 { 996 BMCWEB_LOG_DEBUG( 997 "Skipping aggregating unsupported resource"); 998 return; 999 } 1000 1001 BMCWEB_LOG_DEBUG( 1002 "Adding aggregated resources from \"{}\" to collection", 1003 prefix); 1004 1005 // TODO: This is a potential race condition with multiple 1006 // satellites and the aggregating bmc attempting to write to 1007 // update this array. May need to cascade calls to the next 1008 // satellite at the end of this function. 1009 // This is presumably not a concern when there is only a single 1010 // satellite since the aggregating bmc should have completed 1011 // before the response is received from the satellite. 1012 1013 auto& members = asyncResp->res.jsonValue["Members"]; 1014 auto& satMembers = jsonVal["Members"]; 1015 for (auto& satMem : satMembers) 1016 { 1017 members.emplace_back(std::move(satMem)); 1018 } 1019 asyncResp->res.jsonValue["Members@odata.count"] = 1020 members.size(); 1021 1022 // TODO: Do we need to sort() after updating the array? 1023 } 1024 } 1025 else 1026 { 1027 BMCWEB_LOG_ERROR("Received unparsable response from \"{}\"", 1028 prefix); 1029 // We received a response that was not a json. 1030 // Notify the user only if we did not receive any valid responses 1031 // and if the resource collection does not already exist on the 1032 // aggregating BMC 1033 if (asyncResp->res.resultInt() != 200) 1034 { 1035 messages::operationFailed(asyncResp->res); 1036 } 1037 } 1038 } // End processCollectionResponse() 1039 1040 // Processes the response returned by a satellite BMC and merges any 1041 // properties whose "@odata.id" value is the URI or either a top level 1042 // collection or is uptree from a top level collection 1043 static void processContainsSubordinateResponse( 1044 const std::string& prefix, 1045 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp, 1046 crow::Response& resp) 1047 { 1048 // 429 and 502 mean we didn't actually send the request so don't 1049 // overwrite the response headers in that case 1050 if ((resp.result() == boost::beast::http::status::too_many_requests) || 1051 (resp.result() == boost::beast::http::status::bad_gateway)) 1052 { 1053 return; 1054 } 1055 1056 if (resp.resultInt() != 200) 1057 { 1058 BMCWEB_LOG_DEBUG( 1059 "Resource uptree from Collection does not exist in satellite BMC \"{}\"", 1060 prefix); 1061 // Return the error if we haven't had any successes 1062 if (asyncResp->res.resultInt() != 200) 1063 { 1064 asyncResp->res.result(resp.result()); 1065 asyncResp->res.copyBody(resp); 1066 } 1067 return; 1068 } 1069 1070 // The resp will not have a json component 1071 // We need to create a json from resp's stringResponse 1072 if (isJsonContentType(resp.getHeaderValue("Content-Type"))) 1073 { 1074 bool addedLinks = false; 1075 nlohmann::json jsonVal = nlohmann::json::parse(*resp.body(), 1076 nullptr, false); 1077 if (jsonVal.is_discarded()) 1078 { 1079 BMCWEB_LOG_ERROR("Error parsing satellite response as JSON"); 1080 1081 // Notify the user if doing so won't overwrite a valid response 1082 if (asyncResp->res.resultInt() != 200) 1083 { 1084 messages::operationFailed(asyncResp->res); 1085 } 1086 return; 1087 } 1088 1089 BMCWEB_LOG_DEBUG("Successfully parsed satellite response"); 1090 1091 // Parse response and add properties missing from the AsyncResp 1092 // Valid properties will be of the form <property>.@odata.id and 1093 // @odata.id is a <URI>. In other words, the json should contain 1094 // multiple properties such that 1095 // {"<property>":{"@odata.id": "<URI>"}} 1096 nlohmann::json::object_t* object = 1097 jsonVal.get_ptr<nlohmann::json::object_t*>(); 1098 if (object == nullptr) 1099 { 1100 BMCWEB_LOG_ERROR("Parsed JSON was not an object?"); 1101 return; 1102 } 1103 1104 for (std::pair<const std::string, nlohmann::json>& prop : *object) 1105 { 1106 if (!prop.second.contains("@odata.id")) 1107 { 1108 continue; 1109 } 1110 1111 std::string* strValue = 1112 prop.second["@odata.id"].get_ptr<std::string*>(); 1113 if (strValue == nullptr) 1114 { 1115 BMCWEB_LOG_CRITICAL("Field wasn't a string????"); 1116 continue; 1117 } 1118 if (!searchCollectionsArray(*strValue, SearchType::CollOrCon)) 1119 { 1120 continue; 1121 } 1122 1123 addedLinks = true; 1124 if (!asyncResp->res.jsonValue.contains(prop.first)) 1125 { 1126 // Only add the property if it did not already exist 1127 BMCWEB_LOG_DEBUG("Adding link for {} from BMC {}", 1128 *strValue, prefix); 1129 asyncResp->res.jsonValue[prop.first]["@odata.id"] = 1130 *strValue; 1131 continue; 1132 } 1133 } 1134 1135 // If we added links to a previously unsuccessful (non-200) response 1136 // then we need to make sure the response contains the bare minimum 1137 // amount of additional information that we'd expect to have been 1138 // populated. 1139 if (addedLinks && (asyncResp->res.resultInt() != 200)) 1140 { 1141 // This resource didn't locally exist or an error 1142 // occurred while generating the response. Remove any 1143 // error messages and update the error code. 1144 asyncResp->res.jsonValue.erase( 1145 asyncResp->res.jsonValue.find("error")); 1146 asyncResp->res.result(resp.result()); 1147 1148 const auto& it1 = object->find("@odata.id"); 1149 if (it1 != object->end()) 1150 { 1151 asyncResp->res.jsonValue["@odata.id"] = (it1->second); 1152 } 1153 const auto& it2 = object->find("@odata.type"); 1154 if (it2 != object->end()) 1155 { 1156 asyncResp->res.jsonValue["@odata.type"] = (it2->second); 1157 } 1158 const auto& it3 = object->find("Id"); 1159 if (it3 != object->end()) 1160 { 1161 asyncResp->res.jsonValue["Id"] = (it3->second); 1162 } 1163 const auto& it4 = object->find("Name"); 1164 if (it4 != object->end()) 1165 { 1166 asyncResp->res.jsonValue["Name"] = (it4->second); 1167 } 1168 } 1169 } 1170 else 1171 { 1172 BMCWEB_LOG_ERROR("Received unparsable response from \"{}\"", 1173 prefix); 1174 // We received as response that was not a json 1175 // Notify the user only if we did not receive any valid responses, 1176 // and if the resource does not already exist on the aggregating BMC 1177 if (asyncResp->res.resultInt() != 200) 1178 { 1179 messages::operationFailed(asyncResp->res); 1180 } 1181 } 1182 } 1183 1184 // Entry point to Redfish Aggregation 1185 // Returns Result stating whether or not we still need to locally handle the 1186 // request 1187 static Result 1188 beginAggregation(const crow::Request& thisReq, 1189 const std::shared_ptr<bmcweb::AsyncResp>& asyncResp) 1190 { 1191 using crow::utility::OrMorePaths; 1192 using crow::utility::readUrlSegments; 1193 boost::urls::url_view url = thisReq.url(); 1194 1195 // We don't need to aggregate JsonSchemas due to potential issues such 1196 // as version mismatches between aggregator and satellite BMCs. For 1197 // now assume that the aggregator has all the schemas and versions that 1198 // the aggregated server has. 1199 if (crow::utility::readUrlSegments(url, "redfish", "v1", "JsonSchemas", 1200 crow::utility::OrMorePaths())) 1201 { 1202 return Result::LocalHandle; 1203 } 1204 1205 // The first two segments should be "/redfish/v1". We need to check 1206 // that before we can search topCollections 1207 if (!crow::utility::readUrlSegments(url, "redfish", "v1", 1208 crow::utility::OrMorePaths())) 1209 { 1210 return Result::LocalHandle; 1211 } 1212 1213 // Parse the URI to see if it begins with a known top level collection 1214 // such as: 1215 // /redfish/v1/Chassis 1216 // /redfish/v1/UpdateService/FirmwareInventory 1217 const boost::urls::segments_view urlSegments = url.segments(); 1218 boost::urls::url currentUrl("/"); 1219 boost::urls::segments_view::const_iterator it = urlSegments.begin(); 1220 boost::urls::segments_view::const_iterator end = urlSegments.end(); 1221 1222 // Skip past the leading "/redfish/v1" 1223 it++; 1224 it++; 1225 for (; it != end; it++) 1226 { 1227 const std::string& collectionItem = *it; 1228 if (std::binary_search(topCollections.begin(), topCollections.end(), 1229 currentUrl.buffer())) 1230 { 1231 // We've matched a resource collection so this current segment 1232 // might contain an aggregation prefix 1233 // TODO: This needs to be rethought when we can support multiple 1234 // satellites due to 1235 // /redfish/v1/AggregationService/AggregationSources/5B247A 1236 // being a local resource describing the satellite 1237 if (collectionItem.starts_with("5B247A_")) 1238 { 1239 BMCWEB_LOG_DEBUG("Need to forward a request"); 1240 1241 // Extract the prefix from the request's URI, retrieve the 1242 // associated satellite config information, and then forward 1243 // the request to that satellite. 1244 startAggregation(AggregationType::Resource, thisReq, 1245 asyncResp); 1246 return Result::NoLocalHandle; 1247 } 1248 1249 // Handle collection URI with a trailing backslash 1250 // e.g. /redfish/v1/Chassis/ 1251 it++; 1252 if ((it == end) && collectionItem.empty()) 1253 { 1254 startAggregation(AggregationType::Collection, thisReq, 1255 asyncResp); 1256 } 1257 1258 // We didn't recognize the prefix or it's a collection with a 1259 // trailing "/". In both cases we still want to locally handle 1260 // the request 1261 return Result::LocalHandle; 1262 } 1263 1264 currentUrl.segments().push_back(collectionItem); 1265 } 1266 1267 // If we made it here then currentUrl could contain a top level 1268 // collection URI without a trailing "/", e.g. /redfish/v1/Chassis 1269 if (std::binary_search(topCollections.begin(), topCollections.end(), 1270 currentUrl.buffer())) 1271 { 1272 startAggregation(AggregationType::Collection, thisReq, asyncResp); 1273 return Result::LocalHandle; 1274 } 1275 1276 // If nothing else then the request could be for a resource which has a 1277 // top level collection as a subordinate 1278 if (searchCollectionsArray(url.path(), SearchType::ContainsSubordinate)) 1279 { 1280 startAggregation(AggregationType::ContainsSubordinate, thisReq, 1281 asyncResp); 1282 return Result::LocalHandle; 1283 } 1284 1285 BMCWEB_LOG_DEBUG("Aggregation not required for {}", url.buffer()); 1286 return Result::LocalHandle; 1287 } 1288 }; 1289 1290 } // namespace redfish 1291