Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/zabbix/zabbix.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'src/libs/zbxdbwrap/proxy.c')
-rw-r--r--src/libs/zbxdbwrap/proxy.c3334
1 files changed, 3334 insertions, 0 deletions
diff --git a/src/libs/zbxdbwrap/proxy.c b/src/libs/zbxdbwrap/proxy.c
new file mode 100644
index 00000000000..6a731bad5d4
--- /dev/null
+++ b/src/libs/zbxdbwrap/proxy.c
@@ -0,0 +1,3334 @@
+/*
+** Zabbix
+** Copyright (C) 2001-2022 Zabbix SIA
+**
+** This program is free software; you can redistribute it and/or modify
+** it under the terms of the GNU General Public License as published by
+** the Free Software Foundation; either version 2 of the License, or
+** (at your option) any later version.
+**
+** This program is distributed in the hope that it will be useful,
+** but WITHOUT ANY WARRANTY; without even the implied warranty of
+** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+** GNU General Public License for more details.
+**
+** You should have received a copy of the GNU General Public License
+** along with this program; if not, write to the Free Software
+** Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+**/
+
+#include "zbxdbwrap.h"
+
+#include "zbxdbhigh.h"
+#include "log.h"
+#include "zbxsysinfo.h"
+#include "zbxserver.h"
+#include "zbxtasks.h"
+#include "zbxdiscovery.h"
+#include "zbxalgo.h"
+#include "preproc.h"
+#include "zbxcrypto.h"
+#include "zbxlld.h"
+#include "events.h"
+#include "zbxavailability.h"
+#include "zbxcommshigh.h"
+#include "zbxnum.h"
+#include "zbxtime.h"
+#include "zbxip.h"
+#include "version.h"
+#include "zbxversion.h"
+
+extern char *CONFIG_SERVER;
+
+/* the space reserved in json buffer to hold at least one record plus service data */
+#define ZBX_DATA_JSON_RESERVED (ZBX_HISTORY_TEXT_VALUE_LEN * 4 + ZBX_KIBIBYTE * 4)
+
+#define ZBX_DATA_JSON_RECORD_LIMIT (ZBX_MAX_RECV_DATA_SIZE - ZBX_DATA_JSON_RESERVED)
+#define ZBX_DATA_JSON_BATCH_LIMIT ((ZBX_MAX_RECV_DATA_SIZE - ZBX_DATA_JSON_RESERVED) / 2)
+
+/* the maximum number of values processed in one batch */
+#define ZBX_HISTORY_VALUES_MAX 256
+
+typedef struct
+{
+ zbx_uint64_t druleid;
+ zbx_vector_uint64_t dcheckids;
+ zbx_vector_ptr_t ips;
+}
+zbx_drule_t;
+
+typedef struct
+{
+ char ip[ZBX_INTERFACE_IP_LEN_MAX];
+ zbx_vector_ptr_t services;
+}
+zbx_drule_ip_t;
+
+typedef struct
+{
+ const char *field;
+ const char *tag;
+ zbx_json_type_t jt;
+ const char *default_value;
+}
+zbx_history_field_t;
+
+typedef struct
+{
+ const char *table, *lastidfield;
+ zbx_history_field_t fields[ZBX_MAX_FIELDS];
+}
+zbx_history_table_t;
+
+typedef int (*zbx_client_item_validator_t)(DC_ITEM *item, zbx_socket_t *sock, void *args, char **error);
+
+typedef struct
+{
+ zbx_uint64_t hostid;
+ int value;
+}
+zbx_host_rights_t;
+
+static zbx_history_table_t dht = {
+ "proxy_dhistory", "dhistory_lastid",
+ {
+ {"clock", ZBX_PROTO_TAG_CLOCK, ZBX_JSON_TYPE_INT, NULL},
+ {"druleid", ZBX_PROTO_TAG_DRULE, ZBX_JSON_TYPE_INT, NULL},
+ {"dcheckid", ZBX_PROTO_TAG_DCHECK, ZBX_JSON_TYPE_INT, NULL},
+ {"ip", ZBX_PROTO_TAG_IP, ZBX_JSON_TYPE_STRING, NULL},
+ {"dns", ZBX_PROTO_TAG_DNS, ZBX_JSON_TYPE_STRING, NULL},
+ {"port", ZBX_PROTO_TAG_PORT, ZBX_JSON_TYPE_INT, "0"},
+ {"value", ZBX_PROTO_TAG_VALUE, ZBX_JSON_TYPE_STRING, ""},
+ {"status", ZBX_PROTO_TAG_STATUS, ZBX_JSON_TYPE_INT, "0"},
+ {NULL}
+ }
+};
+
+static zbx_history_table_t areg = {
+ "proxy_autoreg_host", "autoreg_host_lastid",
+ {
+ {"clock", ZBX_PROTO_TAG_CLOCK, ZBX_JSON_TYPE_INT, NULL},
+ {"host", ZBX_PROTO_TAG_HOST, ZBX_JSON_TYPE_STRING, NULL},
+ {"listen_ip", ZBX_PROTO_TAG_IP, ZBX_JSON_TYPE_STRING, ""},
+ {"listen_dns", ZBX_PROTO_TAG_DNS, ZBX_JSON_TYPE_STRING, ""},
+ {"listen_port", ZBX_PROTO_TAG_PORT, ZBX_JSON_TYPE_STRING, "0"},
+ {"host_metadata", ZBX_PROTO_TAG_HOST_METADATA, ZBX_JSON_TYPE_STRING, ""},
+ {"flags", ZBX_PROTO_TAG_FLAGS, ZBX_JSON_TYPE_STRING, "0"},
+ {"tls_accepted", ZBX_PROTO_TAG_TLS_ACCEPTED, ZBX_JSON_TYPE_INT, "0"},
+ {NULL}
+ }
+};
+
+/******************************************************************************
+ * *
+ * Purpose: check proxy connection permissions (encryption configuration and *
+ * if peer proxy address is allowed) *
+ * *
+ * Parameters: *
+ * proxy - [IN] the proxy data *
+ * sock - [IN] connection socket context *
+ * error - [OUT] error message *
+ * *
+ * Return value: *
+ * SUCCEED - connection permission check was successful *
+ * FAIL - otherwise *
+ * *
+ ******************************************************************************/
+int zbx_proxy_check_permissions(const DC_PROXY *proxy, const zbx_socket_t *sock, char **error)
+{
+#if defined(HAVE_GNUTLS) || defined(HAVE_OPENSSL)
+ zbx_tls_conn_attr_t attr;
+#endif
+ if ('\0' != *proxy->proxy_address && FAIL == zbx_tcp_check_allowed_peers(sock, proxy->proxy_address))
+ {
+ *error = zbx_strdup(*error, "connection is not allowed");
+ return FAIL;
+ }
+
+#if defined(HAVE_GNUTLS) || defined(HAVE_OPENSSL)
+ if (ZBX_TCP_SEC_TLS_CERT == sock->connection_type)
+ {
+ if (SUCCEED != zbx_tls_get_attr_cert(sock, &attr))
+ {
+ *error = zbx_strdup(*error, "internal error: cannot get connection attributes");
+ THIS_SHOULD_NEVER_HAPPEN;
+ return FAIL;
+ }
+ }
+#if defined(HAVE_GNUTLS) || (defined(HAVE_OPENSSL) && defined(HAVE_OPENSSL_WITH_PSK))
+ else if (ZBX_TCP_SEC_TLS_PSK == sock->connection_type)
+ {
+ if (SUCCEED != zbx_tls_get_attr_psk(sock, &attr))
+ {
+ *error = zbx_strdup(*error, "internal error: cannot get connection attributes");
+ THIS_SHOULD_NEVER_HAPPEN;
+ return FAIL;
+ }
+ }
+#endif
+ else if (ZBX_TCP_SEC_UNENCRYPTED != sock->connection_type)
+ {
+ *error = zbx_strdup(*error, "internal error: invalid connection type");
+ THIS_SHOULD_NEVER_HAPPEN;
+ return FAIL;
+ }
+#endif
+ if (0 == ((unsigned int)proxy->tls_accept & sock->connection_type))
+ {
+ *error = zbx_dsprintf(NULL, "connection of type \"%s\" is not allowed for proxy \"%s\"",
+ zbx_tcp_connection_type_name(sock->connection_type), proxy->host);
+ return FAIL;
+ }
+
+#if defined(HAVE_GNUTLS) || defined(HAVE_OPENSSL)
+ if (ZBX_TCP_SEC_TLS_CERT == sock->connection_type)
+ {
+ /* simplified match, not compliant with RFC 4517, 4518 */
+ if ('\0' != *proxy->tls_issuer && 0 != strcmp(proxy->tls_issuer, attr.issuer))
+ {
+ *error = zbx_dsprintf(*error, "proxy \"%s\" certificate issuer does not match", proxy->host);
+ return FAIL;
+ }
+
+ /* simplified match, not compliant with RFC 4517, 4518 */
+ if ('\0' != *proxy->tls_subject && 0 != strcmp(proxy->tls_subject, attr.subject))
+ {
+ *error = zbx_dsprintf(*error, "proxy \"%s\" certificate subject does not match", proxy->host);
+ return FAIL;
+ }
+ }
+#if defined(HAVE_GNUTLS) || (defined(HAVE_OPENSSL) && defined(HAVE_OPENSSL_WITH_PSK))
+ else if (ZBX_TCP_SEC_TLS_PSK == sock->connection_type)
+ {
+ if (strlen(proxy->tls_psk_identity) != attr.psk_identity_len ||
+ 0 != memcmp(proxy->tls_psk_identity, attr.psk_identity, attr.psk_identity_len))
+ {
+ *error = zbx_dsprintf(*error, "proxy \"%s\" is using false PSK identity", proxy->host);
+ return FAIL;
+ }
+ }
+#endif
+#endif
+ return SUCCEED;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: checks host connection permissions (encryption configuration) *
+ * *
+ * Parameters: *
+ * host - [IN] the host data *
+ * sock - [IN] connection socket context *
+ * error - [OUT] error message *
+ * *
+ * Return value: *
+ * SUCCEED - connection permission check was successful *
+ * FAIL - otherwise *
+ * *
+ ******************************************************************************/
+static int zbx_host_check_permissions(const DC_HOST *host, const zbx_socket_t *sock, char **error)
+{
+#if defined(HAVE_GNUTLS) || defined(HAVE_OPENSSL)
+ zbx_tls_conn_attr_t attr;
+
+ if (ZBX_TCP_SEC_TLS_CERT == sock->connection_type)
+ {
+ if (SUCCEED != zbx_tls_get_attr_cert(sock, &attr))
+ {
+ *error = zbx_strdup(*error, "internal error: cannot get connection attributes");
+ THIS_SHOULD_NEVER_HAPPEN;
+ return FAIL;
+ }
+ }
+#if defined(HAVE_GNUTLS) || (defined(HAVE_OPENSSL) && defined(HAVE_OPENSSL_WITH_PSK))
+ else if (ZBX_TCP_SEC_TLS_PSK == sock->connection_type)
+ {
+ if (SUCCEED != zbx_tls_get_attr_psk(sock, &attr))
+ {
+ *error = zbx_strdup(*error, "internal error: cannot get connection attributes");
+ THIS_SHOULD_NEVER_HAPPEN;
+ return FAIL;
+ }
+ }
+#endif
+ else if (ZBX_TCP_SEC_UNENCRYPTED != sock->connection_type)
+ {
+ *error = zbx_strdup(*error, "internal error: invalid connection type");
+ THIS_SHOULD_NEVER_HAPPEN;
+ return FAIL;
+ }
+#endif
+ if (0 == ((unsigned int)host->tls_accept & sock->connection_type))
+ {
+ *error = zbx_dsprintf(NULL, "connection of type \"%s\" is not allowed for host \"%s\"",
+ zbx_tcp_connection_type_name(sock->connection_type), host->host);
+ return FAIL;
+ }
+
+#if defined(HAVE_GNUTLS) || defined(HAVE_OPENSSL)
+ if (ZBX_TCP_SEC_TLS_CERT == sock->connection_type)
+ {
+ /* simplified match, not compliant with RFC 4517, 4518 */
+ if ('\0' != *host->tls_issuer && 0 != strcmp(host->tls_issuer, attr.issuer))
+ {
+ *error = zbx_dsprintf(*error, "host \"%s\" certificate issuer does not match", host->host);
+ return FAIL;
+ }
+
+ /* simplified match, not compliant with RFC 4517, 4518 */
+ if ('\0' != *host->tls_subject && 0 != strcmp(host->tls_subject, attr.subject))
+ {
+ *error = zbx_dsprintf(*error, "host \"%s\" certificate subject does not match", host->host);
+ return FAIL;
+ }
+ }
+#if defined(HAVE_GNUTLS) || (defined(HAVE_OPENSSL) && defined(HAVE_OPENSSL_WITH_PSK))
+ else if (ZBX_TCP_SEC_TLS_PSK == sock->connection_type)
+ {
+ if (strlen(host->tls_psk_identity) != attr.psk_identity_len ||
+ 0 != memcmp(host->tls_psk_identity, attr.psk_identity, attr.psk_identity_len))
+ {
+ *error = zbx_dsprintf(*error, "host \"%s\" is using false PSK identity", host->host);
+ return FAIL;
+ }
+ }
+#endif
+#endif
+ return SUCCEED;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: *
+ * Extract a proxy name from JSON and find the proxy ID in configuration *
+ * cache, and check access rights. The proxy must be configured in active *
+ * mode. *
+ * *
+ * Parameters: *
+ * jp - [IN] JSON with the proxy name *
+ * proxy - [OUT] the proxy data *
+ * error - [OUT] error message *
+ * *
+ * Return value: *
+ * SUCCEED - proxy ID was found in database *
+ * FAIL - an error occurred (e.g. an unknown proxy, the proxy is *
+ * configured in passive mode or access denied) *
+ * *
+ ******************************************************************************/
+int get_active_proxy_from_request(const struct zbx_json_parse *jp, DC_PROXY *proxy, char **error)
+{
+ char *ch_error, host[ZBX_HOSTNAME_BUF_LEN];
+
+ if (SUCCEED != zbx_json_value_by_name(jp, ZBX_PROTO_TAG_HOST, host, sizeof(host), NULL))
+ {
+ *error = zbx_strdup(*error, "missing name of proxy");
+ return FAIL;
+ }
+
+ if (SUCCEED != zbx_check_hostname(host, &ch_error))
+ {
+ *error = zbx_dsprintf(*error, "invalid proxy name \"%s\": %s", host, ch_error);
+ zbx_free(ch_error);
+ return FAIL;
+ }
+
+ return zbx_dc_get_active_proxy_by_name(host, proxy, error);
+}
+
+/******************************************************************************
+ * *
+ * Purpose: *
+ * Check access rights to a passive proxy for the given connection and *
+ * send a response if denied. *
+ * *
+ * Parameters: *
+ * sock - [IN] connection socket context *
+ * send_response - [IN] to send or not to send a response to server. *
+ * Value: ZBX_SEND_RESPONSE or *
+ * ZBX_DO_NOT_SEND_RESPONSE *
+ * req - [IN] request, included into error message *
+ * zbx_config_tls - [IN] configured requirements to allow access *
+ * *
+ * Return value: *
+ * SUCCEED - access is allowed *
+ * FAIL - access is denied *
+ * *
+ ******************************************************************************/
+int check_access_passive_proxy(zbx_socket_t *sock, int send_response, const char *req,
+ const zbx_config_tls_t *zbx_config_tls)
+{
+ char *msg = NULL;
+
+ if (FAIL == zbx_tcp_check_allowed_peers(sock, CONFIG_SERVER))
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "%s from server \"%s\" is not allowed: %s", req, sock->peer,
+ zbx_socket_strerror());
+
+ if (ZBX_SEND_RESPONSE == send_response)
+ zbx_send_proxy_response(sock, FAIL, "connection is not allowed", CONFIG_TIMEOUT);
+
+ return FAIL;
+ }
+
+ if (0 == (zbx_config_tls->accept_modes & sock->connection_type))
+ {
+ msg = zbx_dsprintf(NULL, "%s over connection of type \"%s\" is not allowed", req,
+ zbx_tcp_connection_type_name(sock->connection_type));
+
+ zabbix_log(LOG_LEVEL_WARNING, "%s from server \"%s\" by proxy configuration parameter \"TLSAccept\"",
+ msg, sock->peer);
+
+ if (ZBX_SEND_RESPONSE == send_response)
+ zbx_send_proxy_response(sock, FAIL, msg, CONFIG_TIMEOUT);
+
+ zbx_free(msg);
+ return FAIL;
+ }
+
+#if defined(HAVE_GNUTLS) || defined(HAVE_OPENSSL)
+ if (ZBX_TCP_SEC_TLS_CERT == sock->connection_type)
+ {
+ if (SUCCEED == zbx_check_server_issuer_subject(sock, zbx_config_tls->server_cert_issuer,
+ zbx_config_tls->server_cert_subject, &msg))
+ {
+ return SUCCEED;
+ }
+
+ zabbix_log(LOG_LEVEL_WARNING, "%s from server \"%s\" is not allowed: %s", req, sock->peer, msg);
+
+ if (ZBX_SEND_RESPONSE == send_response)
+ zbx_send_proxy_response(sock, FAIL, "certificate issuer or subject mismatch", CONFIG_TIMEOUT);
+
+ zbx_free(msg);
+ return FAIL;
+ }
+ else if (ZBX_TCP_SEC_TLS_PSK == sock->connection_type)
+ {
+ if (0 != (ZBX_PSK_FOR_PROXY & zbx_tls_get_psk_usage()))
+ return SUCCEED;
+
+ zabbix_log(LOG_LEVEL_WARNING, "%s from server \"%s\" is not allowed: it used PSK which is not"
+ " configured for proxy communication with server", req, sock->peer);
+
+ if (ZBX_SEND_RESPONSE == send_response)
+ zbx_send_proxy_response(sock, FAIL, "wrong PSK used", CONFIG_TIMEOUT);
+
+ return FAIL;
+ }
+#endif
+ return SUCCEED;
+}
+
+/******************************************************************************
+ * *
+ * Return value: SUCCEED - processed successfully *
+ * FAIL - no interface availability has been changed *
+ * *
+ ******************************************************************************/
+int get_interface_availability_data(struct zbx_json *json, int *ts)
+{
+ int i, ret = FAIL;
+ zbx_vector_ptr_t interfaces;
+ zbx_interface_availability_t *ia;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__);
+
+ zbx_vector_ptr_create(&interfaces);
+
+ if (SUCCEED != DCget_interfaces_availability(&interfaces, ts))
+ goto out;
+
+ zbx_json_addarray(json, ZBX_PROTO_TAG_INTERFACE_AVAILABILITY);
+
+ for (i = 0; i < interfaces.values_num; i++)
+ {
+ ia = (zbx_interface_availability_t *)interfaces.values[i];
+
+ zbx_json_addobject(json, NULL);
+ zbx_json_adduint64(json, ZBX_PROTO_TAG_INTERFACE_ID, ia->interfaceid);
+
+ zbx_json_adduint64(json, ZBX_PROTO_TAG_AVAILABLE, ia->agent.available);
+ zbx_json_addstring(json, ZBX_PROTO_TAG_ERROR, ia->agent.error, ZBX_JSON_TYPE_STRING);
+
+ zbx_json_close(json);
+ }
+
+ zbx_json_close(json);
+
+ ret = SUCCEED;
+out:
+ zbx_vector_ptr_clear_ext(&interfaces, (zbx_mem_free_func_t)zbx_interface_availability_free);
+ zbx_vector_ptr_destroy(&interfaces);
+
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret));
+
+ return ret;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: parses interfaces availability data contents and processes it *
+ * *
+ * Return value: SUCCEED - processed successfully *
+ * FAIL - an error occurred *
+ * *
+ ******************************************************************************/
+static int process_interfaces_availability_contents(struct zbx_json_parse *jp_data, char **error)
+{
+ zbx_uint64_t interfaceid;
+ struct zbx_json_parse jp_row;
+ const char *p = NULL;
+ char *tmp;
+ size_t tmp_alloc = 129;
+ zbx_interface_availability_t *ia = NULL;
+ zbx_vector_availability_ptr_t interfaces;
+ int ret;
+
+ tmp = (char *)zbx_malloc(NULL, tmp_alloc);
+
+ zbx_vector_availability_ptr_create(&interfaces);
+
+ while (NULL != (p = zbx_json_next(jp_data, p))) /* iterate the interface entries */
+ {
+ if (SUCCEED != (ret = zbx_json_brackets_open(p, &jp_row)))
+ {
+ *error = zbx_strdup(*error, zbx_json_strerror());
+ goto out;
+ }
+
+ if (SUCCEED != (ret = zbx_json_value_by_name_dyn(&jp_row, ZBX_PROTO_TAG_INTERFACE_ID, &tmp, &tmp_alloc,
+ NULL)))
+ {
+ *error = zbx_strdup(*error, zbx_json_strerror());
+ goto out;
+ }
+
+ if (SUCCEED != (ret = zbx_is_uint64(tmp, &interfaceid)))
+ {
+ *error = zbx_strdup(*error, "interfaceid is not a valid numeric");
+ goto out;
+ }
+
+ ia = (zbx_interface_availability_t *)zbx_malloc(NULL, sizeof(zbx_interface_availability_t));
+ zbx_interface_availability_init(ia, interfaceid);
+
+ if (SUCCEED == zbx_json_value_by_name_dyn(&jp_row, ZBX_PROTO_TAG_AVAILABLE, &tmp, &tmp_alloc, NULL))
+ {
+ ia->agent.available = atoi(tmp);
+ ia->agent.flags |= ZBX_FLAGS_AGENT_STATUS_AVAILABLE;
+ }
+
+ if (SUCCEED == zbx_json_value_by_name_dyn(&jp_row, ZBX_PROTO_TAG_ERROR, &tmp, &tmp_alloc, NULL))
+ {
+ ia->agent.error = zbx_strdup(NULL, tmp);
+ ia->agent.flags |= ZBX_FLAGS_AGENT_STATUS_ERROR;
+ }
+
+ if (SUCCEED != (ret = zbx_interface_availability_is_set(ia)))
+ {
+ zbx_free(ia);
+ *error = zbx_dsprintf(*error, "no availability data for \"interfaceid\":" ZBX_FS_UI64,
+ interfaceid);
+ goto out;
+ }
+
+ zbx_vector_availability_ptr_append(&interfaces, ia);
+ }
+
+ if (0 < interfaces.values_num && SUCCEED == DCset_interfaces_availability(&interfaces))
+ zbx_availabilities_flush(&interfaces);
+
+ ret = SUCCEED;
+out:
+ zbx_vector_availability_ptr_clear_ext(&interfaces, zbx_interface_availability_free);
+ zbx_vector_availability_ptr_destroy(&interfaces);
+
+ zbx_free(tmp);
+
+ return ret;
+}
+
+static void proxy_get_lastid(const char *table_name, const char *lastidfield, zbx_uint64_t *lastid)
+{
+ DB_RESULT result;
+ DB_ROW row;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s() field:'%s.%s'", __func__, table_name, lastidfield);
+
+ result = DBselect("select nextid from ids where table_name='%s' and field_name='%s'",
+ table_name, lastidfield);
+
+ if (NULL == (row = DBfetch(result)))
+ *lastid = 0;
+ else
+ ZBX_STR2UINT64(*lastid, row[0]);
+ DBfree_result(result);
+
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s():" ZBX_FS_UI64, __func__, *lastid);
+}
+
+static void proxy_set_lastid(const char *table_name, const char *lastidfield, const zbx_uint64_t lastid)
+{
+ DB_RESULT result;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s() [%s.%s:" ZBX_FS_UI64 "]", __func__, table_name, lastidfield, lastid);
+
+ result = DBselect("select 1 from ids where table_name='%s' and field_name='%s'",
+ table_name, lastidfield);
+
+ if (NULL == DBfetch(result))
+ {
+ DBexecute("insert into ids (table_name,field_name,nextid) values ('%s','%s'," ZBX_FS_UI64 ")",
+ table_name, lastidfield, lastid);
+ }
+ else
+ {
+ DBexecute("update ids set nextid=" ZBX_FS_UI64 " where table_name='%s' and field_name='%s'",
+ lastid, table_name, lastidfield);
+ }
+ DBfree_result(result);
+
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s()", __func__);
+}
+
+void proxy_set_hist_lastid(const zbx_uint64_t lastid)
+{
+ proxy_set_lastid("proxy_history", "history_lastid", lastid);
+}
+
+void proxy_set_dhis_lastid(const zbx_uint64_t lastid)
+{
+ proxy_set_lastid(dht.table, dht.lastidfield, lastid);
+}
+
+void proxy_set_areg_lastid(const zbx_uint64_t lastid)
+{
+ proxy_set_lastid(areg.table, areg.lastidfield, lastid);
+}
+
+int proxy_get_delay(const zbx_uint64_t lastid)
+{
+ DB_RESULT result;
+ DB_ROW row;
+ char *sql = NULL;
+ int ts = 0;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s() [lastid=" ZBX_FS_UI64 "]", __func__, lastid);
+
+ sql = zbx_dsprintf(sql, "select write_clock from proxy_history where id>" ZBX_FS_UI64 " order by id asc",
+ lastid);
+
+ result = DBselectN(sql, 1);
+ zbx_free(sql);
+
+ if (NULL != (row = DBfetch(result)))
+ ts = (int)time(NULL) - atoi(row[0]);
+
+ DBfree_result(result);
+
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s()", __func__);
+
+ return ts;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: Get history data from the database. *
+ * *
+ ******************************************************************************/
+static void proxy_get_history_data_simple(struct zbx_json *j, const char *proto_tag, const zbx_history_table_t *ht,
+ zbx_uint64_t *lastid, zbx_uint64_t *id, int *records_num, int *more)
+{
+ size_t offset = 0;
+ int f, records_num_last = *records_num, retries = 1;
+ char sql[MAX_STRING_LEN];
+ DB_RESULT result;
+ DB_ROW row;
+ struct timespec t_sleep = { 0, 100000000L }, t_rem;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s() table:'%s'", __func__, ht->table);
+
+ *more = ZBX_PROXY_DATA_DONE;
+
+ offset += zbx_snprintf(sql + offset, sizeof(sql) - offset, "select id");
+
+ for (f = 0; NULL != ht->fields[f].field; f++)
+ offset += zbx_snprintf(sql + offset, sizeof(sql) - offset, ",%s", ht->fields[f].field);
+try_again:
+ zbx_snprintf(sql + offset, sizeof(sql) - offset, " from %s where id>" ZBX_FS_UI64 " order by id",
+ ht->table, *id);
+
+ result = DBselectN(sql, ZBX_MAX_HRECORDS);
+
+ while (NULL != (row = DBfetch(result)))
+ {
+ ZBX_STR2UINT64(*lastid, row[0]);
+
+ if (1 < *lastid - *id)
+ {
+ /* At least one record is missing. It can happen if some DB syncer process has */
+ /* started but not yet committed a transaction or a rollback occurred in a DB syncer. */
+ if (0 < retries--)
+ {
+ DBfree_result(result);
+ zabbix_log(LOG_LEVEL_DEBUG, "%s() " ZBX_FS_UI64 " record(s) missing."
+ " Waiting " ZBX_FS_DBL " sec, retrying.",
+ __func__, *lastid - *id - 1,
+ t_sleep.tv_sec + t_sleep.tv_nsec / 1e9);
+ nanosleep(&t_sleep, &t_rem);
+ goto try_again;
+ }
+ else
+ {
+ zabbix_log(LOG_LEVEL_DEBUG, "%s() " ZBX_FS_UI64 " record(s) missing. No more retries.",
+ __func__, *lastid - *id - 1);
+ }
+ }
+
+ if (0 == *records_num)
+ zbx_json_addarray(j, proto_tag);
+
+ zbx_json_addobject(j, NULL);
+
+ for (f = 0; NULL != ht->fields[f].field; f++)
+ {
+ if (NULL != ht->fields[f].default_value && 0 == strcmp(row[f + 1], ht->fields[f].default_value))
+ continue;
+
+ zbx_json_addstring(j, ht->fields[f].tag, row[f + 1], ht->fields[f].jt);
+ }
+
+ (*records_num)++;
+
+ zbx_json_close(j);
+
+ /* stop gathering data to avoid exceeding the maximum packet size */
+ if (ZBX_DATA_JSON_RECORD_LIMIT < j->buffer_offset)
+ {
+ *more = ZBX_PROXY_DATA_MORE;
+ break;
+ }
+
+ *id = *lastid;
+ }
+ DBfree_result(result);
+
+ if (ZBX_MAX_HRECORDS == *records_num - records_num_last)
+ *more = ZBX_PROXY_DATA_MORE;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%d lastid:" ZBX_FS_UI64 " more:%d size:" ZBX_FS_SIZE_T,
+ __func__, *records_num - records_num_last, *lastid, *more,
+ (zbx_fs_size_t)j->buffer_offset);
+}
+
+typedef struct
+{
+ zbx_uint64_t id;
+ zbx_uint64_t itemid;
+ zbx_uint64_t lastlogsize;
+ size_t source_offset;
+ size_t value_offset;
+ int clock;
+ int ns;
+ int timestamp;
+ int severity;
+ int logeventid;
+ int mtime;
+ unsigned char state;
+ unsigned char flags;
+}
+zbx_history_data_t;
+
+/******************************************************************************
+ * *
+ * Purpose: read proxy history data from the database *
+ * *
+ * Parameters: lastid - [IN] the id of last processed proxy *
+ * history record *
+ * data - [IN/OUT] the proxy history data buffer *
+ * data_alloc - [IN/OUT] the size of proxy history data *
+ * buffer *
+ * string_buffer - [IN/OUT] the string buffer *
+ * string_buffer_size - [IN/OUT] the size of string buffer *
+ * more - [OUT] set to ZBX_PROXY_DATA_MORE if there *
+ * might be more data to read *
+ * *
+ * Return value: The number of records read. *
+ * *
+ ******************************************************************************/
+static int proxy_get_history_data(zbx_uint64_t lastid, zbx_history_data_t **data, size_t *data_alloc,
+ char **string_buffer, size_t *string_buffer_alloc, int *more)
+{
+ DB_RESULT result;
+ DB_ROW row;
+ char *sql = NULL;
+ size_t sql_alloc = 0, sql_offset = 0, data_num = 0;
+ size_t string_buffer_offset = 0;
+ zbx_uint64_t id;
+ int retries = 1, total_retries = 10;
+ struct timespec t_sleep = { 0, 100000000L }, t_rem;
+ zbx_history_data_t *hd;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s() lastid:" ZBX_FS_UI64, __func__, lastid);
+
+try_again:
+ zbx_snprintf_alloc(&sql, &sql_alloc, &sql_offset,
+ "select id,itemid,clock,ns,timestamp,source,severity,"
+ "value,logeventid,state,lastlogsize,mtime,flags"
+ " from proxy_history"
+ " where id>" ZBX_FS_UI64
+ " order by id",
+ lastid);
+
+ result = DBselectN(sql, ZBX_MAX_HRECORDS - data_num);
+
+ zbx_free(sql);
+
+ while (NULL != (row = DBfetch(result)))
+ {
+ ZBX_STR2UINT64(id, row[0]);
+
+ if (1 < id - lastid)
+ {
+ /* At least one record is missing. It can happen if some DB syncer process has */
+ /* started but not yet committed a transaction or a rollback occurred in a DB syncer. */
+ if (0 < retries--)
+ {
+ /* limit the number of total retries to avoid being stuck */
+ /* in history full of 'holes' for a long time */
+ if (0 >= total_retries--)
+ break;
+
+ DBfree_result(result);
+ zabbix_log(LOG_LEVEL_DEBUG, "%s() " ZBX_FS_UI64 " record(s) missing."
+ " Waiting " ZBX_FS_DBL " sec, retrying.",
+ __func__, id - lastid - 1,
+ t_sleep.tv_sec + t_sleep.tv_nsec / 1e9);
+ nanosleep(&t_sleep, &t_rem);
+ goto try_again;
+ }
+ else
+ {
+ zabbix_log(LOG_LEVEL_DEBUG, "%s() " ZBX_FS_UI64 " record(s) missing. No more retries.",
+ __func__, id - lastid - 1);
+ }
+ }
+
+ retries = 1;
+
+ if (*data_alloc == data_num)
+ {
+ *data_alloc *= 2;
+ *data = (zbx_history_data_t *)zbx_realloc(*data, sizeof(zbx_history_data_t) * *data_alloc);
+ }
+
+ hd = *data + data_num++;
+ hd->id = id;
+ ZBX_STR2UINT64(hd->itemid, row[1]);
+ ZBX_STR2UCHAR(hd->flags, row[12]);
+ hd->clock = atoi(row[2]);
+ hd->ns = atoi(row[3]);
+
+ if (PROXY_HISTORY_FLAG_NOVALUE != (hd->flags & PROXY_HISTORY_MASK_NOVALUE))
+ {
+ ZBX_STR2UCHAR(hd->state, row[9]);
+
+ if (0 == (hd->flags & PROXY_HISTORY_FLAG_NOVALUE))
+ {
+ size_t len1, len2;
+
+ hd->timestamp = atoi(row[4]);
+ hd->severity = atoi(row[6]);
+ hd->logeventid = atoi(row[8]);
+
+ len1 = strlen(row[5]) + 1;
+ len2 = strlen(row[7]) + 1;
+
+ if (*string_buffer_alloc < string_buffer_offset + len1 + len2)
+ {
+ while (*string_buffer_alloc < string_buffer_offset + len1 + len2)
+ *string_buffer_alloc += ZBX_KIBIBYTE;
+
+ *string_buffer = (char *)zbx_realloc(*string_buffer, *string_buffer_alloc);
+ }
+
+ hd->source_offset = string_buffer_offset;
+ memcpy(*string_buffer + hd->source_offset, row[5], len1);
+ string_buffer_offset += len1;
+
+ hd->value_offset = string_buffer_offset;
+ memcpy(*string_buffer + hd->value_offset, row[7], len2);
+ string_buffer_offset += len2;
+ }
+
+ if (0 != (hd->flags & PROXY_HISTORY_FLAG_META))
+ {
+ ZBX_STR2UINT64(hd->lastlogsize, row[10]);
+ hd->mtime = atoi(row[11]);
+ }
+ }
+
+ lastid = id;
+ }
+ DBfree_result(result);
+
+ if (ZBX_MAX_HRECORDS != data_num && 1 == retries)
+ *more = ZBX_PROXY_DATA_DONE;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s() data_num:" ZBX_FS_SIZE_T, __func__, data_num);
+
+ return data_num;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: add history records to output json *
+ * *
+ * Parameters: j - [IN] the json output buffer *
+ * records_num - [IN] the total number of records added *
+ * dc_items - [IN] the item configuration data *
+ * errcodes - [IN] the item configuration status codes *
+ * records - [IN] the records to add *
+ * string_buffer - [IN] the string buffer holding string values *
+ * lastid - [OUT] the id of last added record *
+ * *
+ * Return value: The total number of records added. *
+ * *
+ ******************************************************************************/
+static int proxy_add_hist_data(struct zbx_json *j, int records_num, const DC_ITEM *dc_items, const int *errcodes,
+ const zbx_vector_ptr_t *records, const char *string_buffer, zbx_uint64_t *lastid)
+{
+ int i;
+ const zbx_history_data_t *hd;
+
+ for (i = records->values_num - 1; i >= 0; i--)
+ {
+ hd = (const zbx_history_data_t *)records->values[i];
+ *lastid = hd->id;
+
+ if (SUCCEED != errcodes[i])
+ continue;
+
+ if (ITEM_STATUS_ACTIVE != dc_items[i].status)
+ continue;
+
+ if (HOST_STATUS_MONITORED != dc_items[i].host.status)
+ continue;
+
+ if (PROXY_HISTORY_FLAG_NOVALUE == (hd->flags & PROXY_HISTORY_MASK_NOVALUE))
+ {
+ if (SUCCEED != zbx_is_counted_in_item_queue(dc_items[i].type, dc_items[i].key_orig))
+ continue;
+ }
+
+ if (0 == records_num)
+ zbx_json_addarray(j, ZBX_PROTO_TAG_HISTORY_DATA);
+
+ zbx_json_addobject(j, NULL);
+ zbx_json_adduint64(j, ZBX_PROTO_TAG_ID, hd->id);
+ zbx_json_adduint64(j, ZBX_PROTO_TAG_ITEMID, hd->itemid);
+ zbx_json_adduint64(j, ZBX_PROTO_TAG_CLOCK, hd->clock);
+ zbx_json_adduint64(j, ZBX_PROTO_TAG_NS, hd->ns);
+
+ if (PROXY_HISTORY_FLAG_NOVALUE != (hd->flags & PROXY_HISTORY_MASK_NOVALUE))
+ {
+ if (ITEM_STATE_NORMAL != hd->state)
+ zbx_json_adduint64(j, ZBX_PROTO_TAG_STATE, hd->state);
+
+ if (0 == (hd->flags & PROXY_HISTORY_FLAG_NOVALUE))
+ {
+ if (0 != hd->timestamp)
+ zbx_json_adduint64(j, ZBX_PROTO_TAG_LOGTIMESTAMP, hd->timestamp);
+
+ if ('\0' != string_buffer[hd->source_offset])
+ {
+ zbx_json_addstring(j, ZBX_PROTO_TAG_LOGSOURCE,
+ string_buffer + hd->source_offset, ZBX_JSON_TYPE_STRING);
+ }
+
+ if (0 != hd->severity)
+ zbx_json_adduint64(j, ZBX_PROTO_TAG_LOGSEVERITY, hd->severity);
+
+ if (0 != hd->logeventid)
+ zbx_json_adduint64(j, ZBX_PROTO_TAG_LOGEVENTID, hd->logeventid);
+
+ zbx_json_addstring(j, ZBX_PROTO_TAG_VALUE, string_buffer + hd->value_offset,
+ ZBX_JSON_TYPE_STRING);
+ }
+
+ if (0 != (hd->flags & PROXY_HISTORY_FLAG_META))
+ {
+ zbx_json_adduint64(j, ZBX_PROTO_TAG_LASTLOGSIZE, hd->lastlogsize);
+ zbx_json_adduint64(j, ZBX_PROTO_TAG_MTIME, hd->mtime);
+ }
+ }
+
+ zbx_json_close(j);
+ records_num++;
+
+ /* stop gathering data to avoid exceeding the maximum packet size */
+ if (ZBX_DATA_JSON_RECORD_LIMIT < j->buffer_offset)
+ break;
+ }
+
+ return records_num;
+}
+
+int proxy_get_hist_data(struct zbx_json *j, zbx_uint64_t *lastid, int *more)
+{
+ int records_num = 0, data_num, i, *errcodes = NULL, items_alloc = 0;
+ zbx_uint64_t id;
+ zbx_hashset_t itemids_added;
+ zbx_history_data_t *data;
+ char *string_buffer;
+ size_t data_alloc = 16, string_buffer_alloc = ZBX_KIBIBYTE;
+ zbx_vector_uint64_t itemids;
+ zbx_vector_ptr_t records;
+ DC_ITEM *dc_items = 0;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__);
+
+ zbx_vector_uint64_create(&itemids);
+ zbx_vector_ptr_create(&records);
+ data = (zbx_history_data_t *)zbx_malloc(NULL, data_alloc * sizeof(zbx_history_data_t));
+ string_buffer = (char *)zbx_malloc(NULL, string_buffer_alloc);
+
+ *more = ZBX_PROXY_DATA_MORE;
+ proxy_get_lastid("proxy_history", "history_lastid", &id);
+
+ zbx_hashset_create(&itemids_added, data_alloc, ZBX_DEFAULT_UINT64_HASH_FUNC, ZBX_DEFAULT_UINT64_COMPARE_FUNC);
+
+ /* get history data in batches by ZBX_MAX_HRECORDS records and stop if: */
+ /* 1) there are no more data to read */
+ /* 2) we have retrieved more than the total maximum number of records */
+ /* 3) we have gathered more than half of the maximum packet size */
+ while (ZBX_DATA_JSON_BATCH_LIMIT > j->buffer_offset && ZBX_MAX_HRECORDS_TOTAL > records_num &&
+ 0 != (data_num = proxy_get_history_data(id, &data, &data_alloc, &string_buffer,
+ &string_buffer_alloc, more)))
+ {
+ zbx_vector_uint64_reserve(&itemids, data_num);
+ zbx_vector_ptr_reserve(&records, data_num);
+
+ /* filter out duplicate novalue updates */
+ for (i = data_num - 1; i >= 0; i--)
+ {
+ if (PROXY_HISTORY_FLAG_NOVALUE == (data[i].flags & PROXY_HISTORY_MASK_NOVALUE))
+ {
+ if (NULL != zbx_hashset_search(&itemids_added, &data[i].itemid))
+ continue;
+
+ zbx_hashset_insert(&itemids_added, &data[i].itemid, sizeof(data[i].itemid));
+ }
+
+ zbx_vector_ptr_append(&records, &data[i]);
+ zbx_vector_uint64_append(&itemids, data[i].itemid);
+ }
+
+ /* append history records to json */
+
+ if (itemids.values_num > items_alloc)
+ {
+ items_alloc = itemids.values_num;
+ dc_items = (DC_ITEM *)zbx_realloc(dc_items, items_alloc * sizeof(DC_ITEM));
+ errcodes = (int *)zbx_realloc(errcodes, items_alloc * sizeof(int));
+ }
+
+ DCconfig_get_items_by_itemids(dc_items, itemids.values, errcodes, itemids.values_num);
+
+ records_num = proxy_add_hist_data(j, records_num, dc_items, errcodes, &records, string_buffer, lastid);
+ DCconfig_clean_items(dc_items, errcodes, itemids.values_num);
+
+ /* got less data than requested - either no more data to read or the history is full of */
+ /* holes. In this case send retrieved data before attempting to read/wait for more data */
+ if (ZBX_MAX_HRECORDS > data_num)
+ break;
+
+ zbx_vector_uint64_clear(&itemids);
+ zbx_vector_ptr_clear(&records);
+ zbx_hashset_clear(&itemids_added);
+ id = *lastid;
+ }
+
+ if (0 != records_num)
+ zbx_json_close(j);
+
+ zbx_hashset_destroy(&itemids_added);
+
+ zbx_free(dc_items);
+ zbx_free(errcodes);
+ zbx_free(data);
+ zbx_free(string_buffer);
+ zbx_vector_ptr_destroy(&records);
+ zbx_vector_uint64_destroy(&itemids);
+
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s() lastid:" ZBX_FS_UI64 " records_num:%d size:~" ZBX_FS_SIZE_T " more:%d",
+ __func__, *lastid, records_num, j->buffer_offset, *more);
+
+ return records_num;
+}
+
+int proxy_get_dhis_data(struct zbx_json *j, zbx_uint64_t *lastid, int *more)
+{
+ int records_num = 0;
+ zbx_uint64_t id;
+
+ proxy_get_lastid(dht.table, dht.lastidfield, &id);
+
+ /* get history data in batches by ZBX_MAX_HRECORDS records and stop if: */
+ /* 1) there are no more data to read */
+ /* 2) we have retrieved more than the total maximum number of records */
+ /* 3) we have gathered more than half of the maximum packet size */
+ while (ZBX_DATA_JSON_BATCH_LIMIT > j->buffer_offset)
+ {
+ proxy_get_history_data_simple(j, ZBX_PROTO_TAG_DISCOVERY_DATA, &dht, lastid, &id, &records_num, more);
+
+ if (ZBX_PROXY_DATA_DONE == *more || ZBX_MAX_HRECORDS_TOTAL <= records_num)
+ break;
+ }
+
+ if (0 != records_num)
+ zbx_json_close(j);
+
+ return records_num;
+}
+
+int proxy_get_areg_data(struct zbx_json *j, zbx_uint64_t *lastid, int *more)
+{
+ int records_num = 0;
+ zbx_uint64_t id;
+
+ proxy_get_lastid(areg.table, areg.lastidfield, &id);
+
+ /* get history data in batches by ZBX_MAX_HRECORDS records and stop if: */
+ /* 1) there are no more data to read */
+ /* 2) we have retrieved more than the total maximum number of records */
+ /* 3) we have gathered more than half of the maximum packet size */
+ while (ZBX_DATA_JSON_BATCH_LIMIT > j->buffer_offset)
+ {
+ proxy_get_history_data_simple(j, ZBX_PROTO_TAG_AUTOREGISTRATION, &areg, lastid, &id, &records_num,
+ more);
+
+ if (ZBX_PROXY_DATA_DONE == *more || ZBX_MAX_HRECORDS_TOTAL <= records_num)
+ break;
+ }
+
+ if (0 != records_num)
+ zbx_json_close(j);
+
+ return records_num;
+}
+
+int proxy_get_host_active_availability(struct zbx_json *j)
+{
+ zbx_ipc_message_t response;
+ int records_num = 0;
+
+ zbx_ipc_message_init(&response);
+ zbx_availability_send(ZBX_IPC_AVAILMAN_ACTIVE_HOSTDATA, 0, 0, &response);
+
+ if (0 != response.size)
+ {
+ zbx_vector_proxy_hostdata_ptr_t hostdata;
+
+ zbx_vector_proxy_hostdata_ptr_create(&hostdata);
+ zbx_availability_deserialize_hostdata(response.data, &hostdata);
+ zbx_availability_serialize_json_hostdata(&hostdata, j);
+
+ records_num = hostdata.values_num;
+
+ zbx_vector_proxy_hostdata_ptr_clear_ext(&hostdata, (zbx_proxy_hostdata_ptr_free_func_t)zbx_ptr_free);
+ zbx_vector_proxy_hostdata_ptr_destroy(&hostdata);
+ }
+
+ zbx_ipc_message_clean(&response);
+
+ return records_num;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: processes item value depending on proxy/flags settings *
+ * *
+ * Parameters: item - [IN] the item to process *
+ * result - [IN] the item result *
+ * *
+ * Comments: Values gathered by server are sent to the preprocessing manager, *
+ * while values received from proxy are already preprocessed and *
+ * must be either directly stored to history cache or sent to lld *
+ * manager. *
+ * *
+ ******************************************************************************/
+static void process_item_value(const DC_ITEM *item, AGENT_RESULT *result, zbx_timespec_t *ts, int *h_num,
+ char *error)
+{
+ if (0 == item->host.proxy_hostid)
+ {
+ zbx_preprocess_item_value(item->itemid, item->host.hostid, item->value_type, item->flags, result, ts,
+ item->state, error);
+ *h_num = 0;
+ }
+ else
+ {
+ if (0 != (ZBX_FLAG_DISCOVERY_RULE & item->flags))
+ {
+ zbx_lld_process_agent_result(item->itemid, item->host.hostid, result, ts, error);
+ *h_num = 0;
+ }
+ else
+ {
+ dc_add_history(item->itemid, item->value_type, item->flags, result, ts, item->state, error);
+ *h_num = 1;
+ }
+ }
+}
+
+/******************************************************************************
+ * *
+ * Purpose: process single value from incoming history data *
+ * *
+ * Parameters: item - [IN] the item to process *
+ * value - [IN] the value to process *
+ * hval - [OUT] indication that value was added to history *
+ * *
+ * Return value: SUCCEED - the value was processed successfully *
+ * FAIL - otherwise *
+ * *
+ ******************************************************************************/
+static int process_history_data_value(DC_ITEM *item, zbx_agent_value_t *value, int *h_num)
+{
+ if (ITEM_STATUS_ACTIVE != item->status)
+ return FAIL;
+
+ if (HOST_STATUS_MONITORED != item->host.status)
+ return FAIL;
+
+ /* update item nextcheck during maintenance */
+ if (SUCCEED == in_maintenance_without_data_collection(item->host.maintenance_status,
+ item->host.maintenance_type, item->type) &&
+ item->host.maintenance_from <= value->ts.sec)
+ {
+ return SUCCEED;
+ }
+
+ if (NULL == value->value && ITEM_STATE_NOTSUPPORTED == value->state)
+ {
+ THIS_SHOULD_NEVER_HAPPEN;
+ return FAIL;
+ }
+
+ if (ITEM_STATE_NOTSUPPORTED == value->state ||
+ (NULL != value->value && 0 == strcmp(value->value, ZBX_NOTSUPPORTED)))
+ {
+ zabbix_log(LOG_LEVEL_DEBUG, "item [%s:%s] error: %s", item->host.host, item->key_orig, value->value);
+
+ item->state = ITEM_STATE_NOTSUPPORTED;
+ process_item_value(item, NULL, &value->ts, h_num, value->value);
+ }
+ else
+ {
+ AGENT_RESULT result;
+
+ zbx_init_agent_result(&result);
+
+ if (NULL != value->value)
+ {
+ if (ITEM_VALUE_TYPE_LOG == item->value_type)
+ {
+ zbx_log_t *log;
+
+ log = (zbx_log_t *)zbx_malloc(NULL, sizeof(zbx_log_t));
+ log->value = zbx_strdup(NULL, value->value);
+ zbx_replace_invalid_utf8(log->value);
+
+ if (0 == value->timestamp)
+ {
+ log->timestamp = 0;
+ calc_timestamp(log->value, &log->timestamp, item->logtimefmt);
+ }
+ else
+ log->timestamp = value->timestamp;
+
+ log->logeventid = value->logeventid;
+ log->severity = value->severity;
+
+ if (NULL != value->source)
+ {
+ log->source = zbx_strdup(NULL, value->source);
+ zbx_replace_invalid_utf8(log->source);
+ }
+ else
+ log->source = NULL;
+
+ SET_LOG_RESULT(&result, log);
+ }
+ else
+ zbx_set_agent_result_type(&result, ITEM_VALUE_TYPE_TEXT, value->value);
+ }
+
+ if (0 != value->meta)
+ zbx_set_agent_result_meta(&result, value->lastlogsize, value->mtime);
+
+ if (0 != ZBX_ISSET_VALUE(&result) || 0 != ZBX_ISSET_META(&result))
+ {
+ item->state = ITEM_STATE_NORMAL;
+ process_item_value(item, &result, &value->ts, h_num, NULL);
+ }
+
+ zbx_free_agent_result(&result);
+ }
+
+ return SUCCEED;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: process new item values *
+ * *
+ * Parameters: items - [IN] the items to process *
+ * values - [IN] the item values value to process *
+ * errcodes - [IN/OUT] in - item configuration error code *
+ * (FAIL - item/host was not found) *
+ * out - value processing result *
+ * (SUCCEED - processed, FAIL - error) *
+ * values_num - [IN] the number of items/values to process *
+ * nodata_win - [IN/OUT] proxy communication delay info *
+ * *
+ * Return value: the number of processed values *
+ * *
+ ******************************************************************************/
+int process_history_data(DC_ITEM *items, zbx_agent_value_t *values, int *errcodes, size_t values_num,
+ zbx_proxy_suppress_t *nodata_win)
+{
+ size_t i;
+ int processed_num = 0, history_num;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__);
+
+ for (i = 0; i < values_num; i++)
+ {
+ if (SUCCEED != errcodes[i])
+ continue;
+
+ history_num = 0;
+
+ if (SUCCEED != process_history_data_value(&items[i], &values[i], &history_num))
+ {
+ /* clean failed items to avoid updating their runtime data */
+ DCconfig_clean_items(&items[i], &errcodes[i], 1);
+ errcodes[i] = FAIL;
+ continue;
+ }
+
+ if (0 != items[i].host.proxy_hostid && NULL != nodata_win &&
+ 0 != (nodata_win->flags & ZBX_PROXY_SUPPRESS_ACTIVE) && 0 < history_num)
+ {
+ if (values[i].ts.sec <= nodata_win->period_end)
+ {
+ nodata_win->values_num++;
+ }
+ else
+ {
+ nodata_win->flags &= (~ZBX_PROXY_SUPPRESS_MORE);
+ }
+
+ zabbix_log(LOG_LEVEL_TRACE, "%s() flags:%d values_num:%d value_time:%d period_end:%d",
+ __func__, nodata_win->flags, nodata_win->values_num, values[i].ts.sec,
+ nodata_win->period_end);
+ }
+
+ processed_num++;
+ }
+
+ if (0 < processed_num)
+ zbx_dc_items_update_nextcheck(items, values, errcodes, values_num);
+
+ zbx_preprocessor_flush();
+ dc_flush_history();
+
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s() processed:%d", __func__, processed_num);
+
+ return processed_num;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: frees resources allocated to store agent values *
+ * *
+ * Parameters: values - [IN] the values to clean *
+ * values_num - [IN] the number of items in values array *
+ * *
+ ******************************************************************************/
+static void zbx_agent_values_clean(zbx_agent_value_t *values, size_t values_num)
+{
+ size_t i;
+
+ for (i = 0; i < values_num; i++)
+ {
+ zbx_free(values[i].value);
+ zbx_free(values[i].source);
+ }
+}
+
+/******************************************************************************
+ * *
+ * Purpose: calculates difference between server and client (proxy, active *
+ * agent or sender) time and log it *
+ * *
+ * Parameters: level - [IN] log level *
+ * jp - [IN] JSON with clock, [ns] fields *
+ * ts_recv - [IN] the connection timestamp *
+ * *
+ ******************************************************************************/
+static void log_client_timediff(int level, struct zbx_json_parse *jp, const zbx_timespec_t *ts_recv)
+{
+ char tmp[32];
+ zbx_timespec_t client_timediff;
+ int sec, ns;
+
+ if (SUCCEED != ZBX_CHECK_LOG_LEVEL(level))
+ return;
+
+ if (SUCCEED == zbx_json_value_by_name(jp, ZBX_PROTO_TAG_CLOCK, tmp, sizeof(tmp), NULL))
+ {
+ sec = atoi(tmp);
+ client_timediff.sec = ts_recv->sec - sec;
+
+ if (SUCCEED == zbx_json_value_by_name(jp, ZBX_PROTO_TAG_NS, tmp, sizeof(tmp), NULL))
+ {
+ ns = atoi(tmp);
+ client_timediff.ns = ts_recv->ns - ns;
+
+ if (client_timediff.sec > 0 && client_timediff.ns < 0)
+ {
+ client_timediff.sec--;
+ client_timediff.ns += 1000000000;
+ }
+ else if (client_timediff.sec < 0 && client_timediff.ns > 0)
+ {
+ client_timediff.sec++;
+ client_timediff.ns -= 1000000000;
+ }
+
+ zabbix_log(level, "%s(): timestamp from json %d seconds and %d nanosecond, "
+ "delta time from json %d seconds and %d nanosecond",
+ __func__, sec, ns, client_timediff.sec, client_timediff.ns);
+ }
+ else
+ {
+ zabbix_log(level, "%s(): timestamp from json %d seconds, "
+ "delta time from json %d seconds", __func__, sec, client_timediff.sec);
+ }
+ }
+}
+
+/******************************************************************************
+ * *
+ * Purpose: parses agent value from history data json row *
+ * *
+ * Parameters: jp_row - [IN] JSON with history data row *
+ * unique_shift - [IN/OUT] auto increment nanoseconds to ensure *
+ * unique value of timestamps *
+ * av - [OUT] the agent value *
+ * *
+ * Return value: SUCCEED - the value was parsed successfully *
+ * FAIL - otherwise *
+ * *
+ ******************************************************************************/
+static int parse_history_data_row_value(const struct zbx_json_parse *jp_row, zbx_timespec_t *unique_shift,
+ zbx_agent_value_t *av)
+{
+ char *tmp = NULL;
+ size_t tmp_alloc = 0;
+ int ret = FAIL;
+
+ memset(av, 0, sizeof(zbx_agent_value_t));
+
+ if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_CLOCK, &tmp, &tmp_alloc, NULL))
+ {
+ if (FAIL == zbx_is_uint31(tmp, &av->ts.sec))
+ goto out;
+
+ if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_NS, &tmp, &tmp_alloc, NULL))
+ {
+ if (FAIL == zbx_is_uint_n_range(tmp, tmp_alloc, &av->ts.ns, sizeof(av->ts.ns),
+ 0LL, 999999999LL))
+ {
+ goto out;
+ }
+ }
+ else
+ {
+ /* ensure unique value timestamp (clock, ns) if only clock is available */
+
+ av->ts.sec += unique_shift->sec;
+ av->ts.ns = unique_shift->ns++;
+
+ if (unique_shift->ns > 999999999)
+ {
+ unique_shift->sec++;
+ unique_shift->ns = 0;
+ }
+ }
+ }
+ else
+ zbx_timespec(&av->ts);
+
+ if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_STATE, &tmp, &tmp_alloc, NULL))
+ av->state = (unsigned char)atoi(tmp);
+
+ /* Unsupported item meta information must be ignored for backwards compatibility. */
+ /* New agents will not send meta information for items in unsupported state. */
+ if (ITEM_STATE_NOTSUPPORTED != av->state)
+ {
+ if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_LASTLOGSIZE, &tmp, &tmp_alloc, NULL))
+ {
+ av->meta = 1; /* contains meta information */
+
+ zbx_is_uint64(tmp, &av->lastlogsize);
+
+ if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_MTIME, &tmp, &tmp_alloc, NULL))
+ av->mtime = atoi(tmp);
+ }
+ }
+
+ if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_VALUE, &tmp, &tmp_alloc, NULL))
+ av->value = zbx_strdup(av->value, tmp);
+
+ if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_LOGTIMESTAMP, &tmp, &tmp_alloc, NULL))
+ av->timestamp = atoi(tmp);
+
+ if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_LOGSOURCE, &tmp, &tmp_alloc, NULL))
+ av->source = zbx_strdup(av->source, tmp);
+
+ if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_LOGSEVERITY, &tmp, &tmp_alloc, NULL))
+ av->severity = atoi(tmp);
+
+ if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_LOGEVENTID, &tmp, &tmp_alloc, NULL))
+ av->logeventid = atoi(tmp);
+
+ if (SUCCEED != zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_ID, &tmp, &tmp_alloc, NULL) ||
+ SUCCEED != zbx_is_uint64(tmp, &av->id))
+ {
+ av->id = 0;
+ }
+
+ zbx_free(tmp);
+
+ ret = SUCCEED;
+out:
+ return ret;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: parses item identifier from history data json row *
+ * *
+ * Parameters: jp_row - [IN] JSON with history data row *
+ * itemid - [OUT] the item identifier *
+ * *
+ * Return value: SUCCEED - the item identifier was parsed successfully *
+ * FAIL - otherwise *
+ * *
+ ******************************************************************************/
+static int parse_history_data_row_itemid(const struct zbx_json_parse *jp_row, zbx_uint64_t *itemid)
+{
+ char buffer[MAX_ID_LEN + 1];
+
+ if (SUCCEED != zbx_json_value_by_name(jp_row, ZBX_PROTO_TAG_ITEMID, buffer, sizeof(buffer), NULL))
+ return FAIL;
+
+ if (SUCCEED != zbx_is_uint64(buffer, itemid))
+ return FAIL;
+
+ return SUCCEED;
+}
+/******************************************************************************
+ * *
+ * Purpose: parses host,key pair from history data json row *
+ * *
+ * Parameters: jp_row - [IN] JSON with history data row *
+ * hk - [OUT] the host,key pair *
+ * *
+ * Return value: SUCCEED - the host,key pair was parsed successfully *
+ * FAIL - otherwise *
+ * *
+ ******************************************************************************/
+static int parse_history_data_row_hostkey(const struct zbx_json_parse *jp_row, zbx_host_key_t *hk)
+{
+ size_t str_alloc;
+
+ str_alloc = 0;
+ zbx_free(hk->host);
+
+ if (SUCCEED != zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_HOST, &hk->host, &str_alloc, NULL))
+ return FAIL;
+
+ str_alloc = 0;
+ zbx_free(hk->key);
+
+ if (SUCCEED != zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_KEY, &hk->key, &str_alloc, NULL))
+ {
+ zbx_free(hk->host);
+ return FAIL;
+ }
+
+ return SUCCEED;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: parses up to ZBX_HISTORY_VALUES_MAX item values and host,key *
+ * pairs from history data json *
+ * *
+ * Parameters: jp_data - [IN] JSON with history data array *
+ * pnext - [IN/OUT] the pointer to the next item in json, *
+ * NULL - no more data left *
+ * values - [OUT] the item values *
+ * hostkeys - [OUT] the corresponding host,key pairs *
+ * values_num - [OUT] number of elements in values and hostkeys *
+ * arrays *
+ * parsed_num - [OUT] the number of values parsed *
+ * unique_shift - [IN/OUT] auto increment nanoseconds to ensure *
+ * unique value of timestamps *
+ * *
+ * Return value: SUCCEED - values were parsed successfully *
+ * FAIL - an error occurred *
+ * *
+ ******************************************************************************/
+static int parse_history_data(struct zbx_json_parse *jp_data, const char **pnext, zbx_agent_value_t *values,
+ zbx_host_key_t *hostkeys, int *values_num, int *parsed_num, zbx_timespec_t *unique_shift)
+{
+ struct zbx_json_parse jp_row;
+ int ret = FAIL;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__);
+
+ *values_num = 0;
+ *parsed_num = 0;
+
+ if (NULL == *pnext)
+ {
+ if (NULL == (*pnext = zbx_json_next(jp_data, *pnext)) && *values_num < ZBX_HISTORY_VALUES_MAX)
+ {
+ ret = SUCCEED;
+ goto out;
+ }
+ }
+
+ /* iterate the history data rows */
+ do
+ {
+ if (FAIL == zbx_json_brackets_open(*pnext, &jp_row))
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "%s", zbx_json_strerror());
+ goto out;
+ }
+
+ (*parsed_num)++;
+
+ if (SUCCEED != parse_history_data_row_hostkey(&jp_row, &hostkeys[*values_num]))
+ continue;
+
+ if (SUCCEED != parse_history_data_row_value(&jp_row, unique_shift, &values[*values_num]))
+ continue;
+
+ (*values_num)++;
+ }
+ while (NULL != (*pnext = zbx_json_next(jp_data, *pnext)) && *values_num < ZBX_HISTORY_VALUES_MAX);
+
+ ret = SUCCEED;
+out:
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s processed:%d/%d", __func__, zbx_result_string(ret),
+ *values_num, *parsed_num);
+
+ return ret;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: parses up to ZBX_HISTORY_VALUES_MAX item values and item *
+ * identifiers from history data json *
+ * *
+ * Parameters: jp_data - [IN] JSON with history data array *
+ * pnext - [IN/OUT] the pointer to the next item in *
+ * json, NULL - no more data left *
+ * values - [OUT] the item values *
+ * itemids - [OUT] the corresponding item identifiers *
+ * values_num - [OUT] number of elements in values and itemids *
+ * arrays *
+ * parsed_num - [OUT] the number of values parsed *
+ * unique_shift - [IN/OUT] auto increment nanoseconds to ensure *
+ * unique value of timestamps *
+ * info - [OUT] address of a pointer to the info string *
+ * (should be freed by the caller) *
+ * *
+ * Return value: SUCCEED - values were parsed successfully *
+ * FAIL - an error occurred *
+ * *
+ * Comments: This function is used to parse the new proxy history data *
+ * protocol introduced in Zabbix v3.3. *
+ * *
+ ******************************************************************************/
+static int parse_history_data_by_itemids(struct zbx_json_parse *jp_data, const char **pnext,
+ zbx_agent_value_t *values, zbx_uint64_t *itemids, int *values_num, int *parsed_num,
+ zbx_timespec_t *unique_shift, char **error)
+{
+ struct zbx_json_parse jp_row;
+ int ret = FAIL;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__);
+
+ *values_num = 0;
+ *parsed_num = 0;
+
+ if (NULL == *pnext)
+ {
+ if (NULL == (*pnext = zbx_json_next(jp_data, *pnext)) && *values_num < ZBX_HISTORY_VALUES_MAX)
+ {
+ ret = SUCCEED;
+ goto out;
+ }
+ }
+
+ /* iterate the history data rows */
+ do
+ {
+ if (FAIL == zbx_json_brackets_open(*pnext, &jp_row))
+ {
+ *error = zbx_strdup(*error, zbx_json_strerror());
+ goto out;
+ }
+
+ (*parsed_num)++;
+
+ if (SUCCEED != parse_history_data_row_itemid(&jp_row, &itemids[*values_num]))
+ continue;
+
+ if (SUCCEED != parse_history_data_row_value(&jp_row, unique_shift, &values[*values_num]))
+ continue;
+
+ (*values_num)++;
+ }
+ while (NULL != (*pnext = zbx_json_next(jp_data, *pnext)) && *values_num < ZBX_HISTORY_VALUES_MAX);
+
+ ret = SUCCEED;
+out:
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s processed:%d/%d", __func__, zbx_result_string(ret),
+ *values_num, *parsed_num);
+
+ return ret;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: validates item received from proxy *
+ * *
+ * Parameters: item - [IN/OUT] the item data *
+ * sock - [IN] the connection socket *
+ * args - [IN] the validator arguments *
+ * error - unused *
+ * *
+ * Return value: SUCCEED - the validation was successful *
+ * FAIL - otherwise *
+ * *
+ ******************************************************************************/
+static int proxy_item_validator(DC_ITEM *item, zbx_socket_t *sock, void *args, char **error)
+{
+ zbx_uint64_t *proxyid = (zbx_uint64_t *)args;
+
+ ZBX_UNUSED(sock);
+ ZBX_UNUSED(error);
+
+ /* don't process item if its host was assigned to another proxy */
+ if (item->host.proxy_hostid != *proxyid)
+ return FAIL;
+
+ /* don't process aggregate/calculated items coming from proxy */
+ if (ITEM_TYPE_CALCULATED == item->type)
+ return FAIL;
+
+ return SUCCEED;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: parses history data array and process the data *
+ * *
+ * *
+ * Parameters: sock - [IN] socket for host permission validation *
+ * validator_func - [IN] function to validate item permission *
+ * validator_args - [IN] validator function arguments *
+ * jp_data - [IN] JSON with history data array *
+ * session - [IN] the data session *
+ * nodata_win - [OUT] counter of delayed values *
+ * info - [OUT] address of a pointer to the info *
+ * string (should be freed by the caller) *
+ * mode - [IN] item retrieve mode is used to retrieve *
+ * only necessary data to reduce time *
+ * spent holding read lock *
+ * *
+ * Return value: SUCCEED - processed successfully *
+ * FAIL - an error occurred *
+ * *
+ * Comments: This function is used to parse the new proxy history data *
+ * protocol introduced in Zabbix v3.3. *
+ * *
+ ******************************************************************************/
+static int process_history_data_by_itemids(zbx_socket_t *sock, zbx_client_item_validator_t validator_func,
+ void *validator_args, struct zbx_json_parse *jp_data, zbx_session_t *session,
+ zbx_proxy_suppress_t *nodata_win, char **info, unsigned int mode)
+{
+ const char *pnext = NULL;
+ int ret = SUCCEED, processed_num = 0, total_num = 0, values_num, read_num, i, *errcodes;
+ double sec;
+ DC_ITEM *items;
+ char *error = NULL;
+ zbx_uint64_t itemids[ZBX_HISTORY_VALUES_MAX], last_valueid = 0;
+ zbx_agent_value_t values[ZBX_HISTORY_VALUES_MAX];
+ zbx_timespec_t unique_shift = {0, 0};
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__);
+
+ items = (DC_ITEM *)zbx_malloc(NULL, sizeof(DC_ITEM) * ZBX_HISTORY_VALUES_MAX);
+ errcodes = (int *)zbx_malloc(NULL, sizeof(int) * ZBX_HISTORY_VALUES_MAX);
+
+ sec = zbx_time();
+
+ while (SUCCEED == parse_history_data_by_itemids(jp_data, &pnext, values, itemids, &values_num, &read_num,
+ &unique_shift, &error) && 0 != values_num)
+ {
+ DCconfig_get_items_by_itemids_partial(items, itemids, errcodes, values_num, mode);
+
+ for (i = 0; i < values_num; i++)
+ {
+ if (SUCCEED != errcodes[i])
+ continue;
+
+ /* check and discard if duplicate data */
+ if (NULL != session && 0 != values[i].id && values[i].id <= session->last_id)
+ {
+ DCconfig_clean_items(&items[i], &errcodes[i], 1);
+ errcodes[i] = FAIL;
+ continue;
+ }
+
+ if (SUCCEED != validator_func(&items[i], sock, validator_args, &error))
+ {
+ if (NULL != error)
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "%s", error);
+ zbx_free(error);
+ }
+
+ DCconfig_clean_items(&items[i], &errcodes[i], 1);
+ errcodes[i] = FAIL;
+ }
+ }
+
+ processed_num += process_history_data(items, values, errcodes, values_num, nodata_win);
+
+ total_num += read_num;
+
+ last_valueid = values[values_num - 1].id;
+
+ DCconfig_clean_items(items, errcodes, values_num);
+ zbx_agent_values_clean(values, values_num);
+
+ if (NULL == pnext)
+ break;
+ }
+
+ if (NULL != session && 0 != last_valueid)
+ {
+ if (session->last_id > last_valueid)
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "received id:" ZBX_FS_UI64 " is less than last id:"
+ ZBX_FS_UI64, last_valueid, session->last_id);
+ }
+ else
+ session->last_id = last_valueid;
+ }
+
+ zbx_free(errcodes);
+ zbx_free(items);
+
+ if (NULL == error)
+ {
+ ret = SUCCEED;
+ *info = zbx_dsprintf(*info, "processed: %d; failed: %d; total: %d; seconds spent: " ZBX_FS_DBL,
+ processed_num, total_num - processed_num, total_num, zbx_time() - sec);
+ }
+ else
+ {
+ zbx_free(*info);
+ *info = error;
+ }
+
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret));
+
+ return ret;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: validates item received from active agent *
+ * *
+ * Parameters: item - [IN] the item data *
+ * sock - [IN] the connection socket *
+ * args - [IN] the validator arguments *
+ * error - [OUT] the error message *
+ * *
+ * Return value: SUCCEED - the validation was successful *
+ * FAIL - otherwise *
+ * *
+ ******************************************************************************/
+static int agent_item_validator(DC_ITEM *item, zbx_socket_t *sock, void *args, char **error)
+{
+ zbx_host_rights_t *rights = (zbx_host_rights_t *)args;
+
+ if (0 != item->host.proxy_hostid)
+ return FAIL;
+
+ if (ITEM_TYPE_ZABBIX_ACTIVE != item->type)
+ return FAIL;
+
+ if (rights->hostid != item->host.hostid)
+ {
+ rights->hostid = item->host.hostid;
+ rights->value = zbx_host_check_permissions(&item->host, sock, error);
+ }
+
+ return rights->value;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: validates item received from sender *
+ * *
+ * Parameters: item - [IN] the item data *
+ * sock - [IN] the connection socket *
+ * args - [IN] the validator arguments *
+ * error - [OUT] the error message *
+ * *
+ * Return value: SUCCEED - the validation was successful *
+ * FAIL - otherwise *
+ * *
+ ******************************************************************************/
+static int sender_item_validator(DC_ITEM *item, zbx_socket_t *sock, void *args, char **error)
+{
+ zbx_host_rights_t *rights;
+ char key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1];
+
+ if (0 != item->host.proxy_hostid)
+ return FAIL;
+
+ switch(item->type)
+ {
+ case ITEM_TYPE_HTTPAGENT:
+ if (0 == item->allow_traps)
+ {
+ *error = zbx_dsprintf(*error, "cannot process HTTP agent item \"%s\" trap:"
+ " trapping is not enabled", zbx_truncate_itemkey(item->key_orig,
+ VALUE_ERRMSG_MAX, key_short, sizeof(key_short)));
+ return FAIL;
+ }
+ break;
+ case ITEM_TYPE_TRAPPER:
+ break;
+ default:
+ *error = zbx_dsprintf(*error, "cannot process item \"%s\" trap:"
+ " item type \"%d\" cannot be used with traps",
+ zbx_truncate_itemkey(item->key_orig, VALUE_ERRMSG_MAX, key_short,
+ sizeof(key_short)), item->type);
+ return FAIL;
+ }
+
+ if ('\0' != *item->trapper_hosts) /* list of allowed hosts not empty */
+ {
+ char *allowed_peers;
+ int ret;
+
+ allowed_peers = zbx_strdup(NULL, item->trapper_hosts);
+ zbx_substitute_simple_macros(NULL, NULL, NULL, NULL, NULL, NULL, item, NULL, NULL, NULL, NULL, NULL,
+ &allowed_peers, MACRO_TYPE_ALLOWED_HOSTS, NULL, 0);
+ ret = zbx_tcp_check_allowed_peers(sock, allowed_peers);
+ zbx_free(allowed_peers);
+
+ if (FAIL == ret)
+ {
+ *error = zbx_dsprintf(*error, "cannot process item \"%s\" trap: %s",
+ zbx_truncate_itemkey(item->key_orig, VALUE_ERRMSG_MAX, key_short,
+ sizeof(key_short)), zbx_socket_strerror());
+ return FAIL;
+ }
+ }
+
+ rights = (zbx_host_rights_t *)args;
+
+ if (rights->hostid != item->host.hostid)
+ {
+ rights->hostid = item->host.hostid;
+ rights->value = zbx_host_check_permissions(&item->host, sock, error);
+ }
+
+ return rights->value;
+}
+
+static void process_history_data_by_keys(zbx_socket_t *sock, zbx_client_item_validator_t validator_func,
+ void *validator_args, char **info, struct zbx_json_parse *jp_data, const char *token)
+{
+ int values_num, read_num, processed_num = 0, total_num = 0, i;
+ zbx_timespec_t unique_shift = {0, 0};
+ const char *pnext = NULL;
+ char *error = NULL;
+ zbx_host_key_t *hostkeys;
+ DC_ITEM *items;
+ zbx_session_t *session = NULL;
+ zbx_uint64_t last_hostid = 0;
+ zbx_agent_value_t values[ZBX_HISTORY_VALUES_MAX];
+ int errcodes[ZBX_HISTORY_VALUES_MAX];
+ double sec;
+
+ sec = zbx_time();
+
+ items = (DC_ITEM *)zbx_malloc(NULL, sizeof(DC_ITEM) * ZBX_HISTORY_VALUES_MAX);
+ hostkeys = (zbx_host_key_t *)zbx_malloc(NULL, sizeof(zbx_host_key_t) * ZBX_HISTORY_VALUES_MAX);
+ memset(hostkeys, 0, sizeof(zbx_host_key_t) * ZBX_HISTORY_VALUES_MAX);
+
+ while (SUCCEED == parse_history_data(jp_data, &pnext, values, hostkeys, &values_num, &read_num,
+ &unique_shift) && 0 != values_num)
+ {
+ DCconfig_get_items_by_keys(items, hostkeys, errcodes, values_num);
+
+ for (i = 0; i < values_num; i++)
+ {
+ if (SUCCEED != errcodes[i])
+ {
+ zabbix_log(LOG_LEVEL_DEBUG, "cannot retrieve key \"%s\" on host \"%s\" from "
+ "configuration cache", hostkeys[i].key, hostkeys[i].host);
+ continue;
+ }
+
+ if (last_hostid != items[i].host.hostid)
+ {
+ last_hostid = items[i].host.hostid;
+
+ if (NULL != token)
+ {
+ session = zbx_dc_get_or_create_session(last_hostid, token,
+ ZBX_SESSION_TYPE_DATA);
+ }
+ }
+
+ /* check and discard if duplicate data */
+ if (NULL != session && 0 != values[i].id && values[i].id <= session->last_id)
+ {
+ DCconfig_clean_items(&items[i], &errcodes[i], 1);
+ errcodes[i] = FAIL;
+ continue;
+ }
+
+ if (SUCCEED != validator_func(&items[i], sock, validator_args, &error))
+ {
+ if (NULL != error)
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "%s", error);
+ zbx_free(error);
+ }
+ else
+ {
+ zabbix_log(LOG_LEVEL_DEBUG, "unknown validation error for item \"%s\"",
+ (NULL == items[i].key) ? items[i].key_orig : items[i].key);
+ }
+
+ DCconfig_clean_items(&items[i], &errcodes[i], 1);
+ errcodes[i] = FAIL;
+ }
+
+ if (NULL != session)
+ session->last_id = values[i].id;
+ }
+
+ processed_num += process_history_data(items, values, errcodes, values_num, NULL);
+ total_num += read_num;
+
+ DCconfig_clean_items(items, errcodes, values_num);
+ zbx_agent_values_clean(values, values_num);
+
+ if (NULL == pnext)
+ break;
+ }
+
+ for (i = 0; i < ZBX_HISTORY_VALUES_MAX; i++)
+ {
+ zbx_free(hostkeys[i].host);
+ zbx_free(hostkeys[i].key);
+ }
+
+ zbx_free(hostkeys);
+ zbx_free(items);
+
+ *info = zbx_dsprintf(*info, "processed: %d; failed: %d; total: %d; seconds spent: " ZBX_FS_DBL,
+ processed_num, total_num - processed_num, total_num, zbx_time() - sec);
+}
+
+/******************************************************************************
+ * *
+ * Purpose: process history data sent by proxy/agent/sender *
+ * *
+ * Parameters: sock - [IN] the connection socket *
+ * jp - [IN] JSON with historical data *
+ * ts - [IN] the client connection timestamp *
+ * validator_func - [IN] the item validator callback function *
+ * validator_args - [IN] the user arguments passed to validator *
+ * function *
+ * info - [OUT] address of a pointer to the info string *
+ * (should be freed by the caller) *
+ * *
+ * Return value: SUCCEED - processed successfully *
+ * FAIL - an error occurred *
+ * *
+ ******************************************************************************/
+static int process_client_history_data(zbx_socket_t *sock, struct zbx_json_parse *jp, zbx_timespec_t *ts,
+ zbx_client_item_validator_t validator_func, void *validator_args, char **info)
+{
+ int ret;
+ char *token = NULL;
+ size_t token_alloc = 0;
+ struct zbx_json_parse jp_data;
+ char tmp[MAX_STRING_LEN];
+ int version;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__);
+
+ log_client_timediff(LOG_LEVEL_DEBUG, jp, ts);
+
+ if (SUCCEED != (ret = zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_DATA, &jp_data)))
+ {
+ *info = zbx_strdup(*info, zbx_json_strerror());
+ goto out;
+ }
+
+ if (SUCCEED == zbx_json_value_by_name_dyn(jp, ZBX_PROTO_TAG_SESSION, &token, &token_alloc, NULL))
+ {
+ size_t token_len;
+
+ if (ZBX_SESSION_TOKEN_SIZE != (token_len = strlen(token)))
+ {
+ *info = zbx_dsprintf(*info, "invalid session token length %d", (int)token_len);
+ ret = FAIL;
+ goto out;
+ }
+ }
+
+ if (SUCCEED != zbx_json_value_by_name(jp, ZBX_PROTO_TAG_VERSION, tmp, sizeof(tmp), NULL) ||
+ FAIL == (version = zbx_get_component_version_without_patch(tmp)))
+ {
+ version = ZBX_COMPONENT_VERSION(4, 2, 0);
+ }
+
+ if (ZBX_COMPONENT_VERSION(4, 4, 0) <= version &&
+ SUCCEED == zbx_json_value_by_name(jp, ZBX_PROTO_TAG_HOST, tmp, sizeof(tmp), NULL))
+ {
+ zbx_session_t *session;
+ zbx_uint64_t hostid;
+
+ if (SUCCEED != DCconfig_get_hostid_by_name(tmp, &hostid))
+ {
+ *info = zbx_dsprintf(*info, "unknown host '%s'", tmp);
+ ret = SUCCEED;
+ goto out;
+ }
+
+ if (NULL == token)
+ session = NULL;
+ else
+ session = zbx_dc_get_or_create_session(hostid, token, ZBX_SESSION_TYPE_DATA);
+
+ if (SUCCEED != (ret = process_history_data_by_itemids(sock, validator_func, validator_args, &jp_data,
+ session, NULL, info, ZBX_ITEM_GET_DEFAULT)))
+ {
+ goto out;
+ }
+ }
+ else
+ process_history_data_by_keys(sock, validator_func, validator_args, info, &jp_data, token);
+out:
+ zbx_free(token);
+
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret));
+
+ return ret;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: process history data received from Zabbix active agent *
+ * *
+ * Parameters: sock - [IN] the connection socket *
+ * jp - [IN] the JSON with history data *
+ * ts - [IN] the connection timestamp *
+ * info - [OUT] address of a pointer to the info string *
+ * (should be freed by the caller) *
+ * *
+ * Return value: SUCCEED - processed successfully *
+ * FAIL - an error occurred *
+ * *
+ ******************************************************************************/
+int process_agent_history_data(zbx_socket_t *sock, struct zbx_json_parse *jp, zbx_timespec_t *ts, char **info)
+{
+ zbx_host_rights_t rights = {0};
+
+ return process_client_history_data(sock, jp, ts, agent_item_validator, &rights, info);
+}
+
+/******************************************************************************
+ * *
+ * Purpose: process history data received from Zabbix sender *
+ * *
+ * Parameters: sock - [IN] the connection socket *
+ * jp - [IN] the JSON with history data *
+ * ts - [IN] the connection timestamp *
+ * info - [OUT] address of a pointer to the info string *
+ * (should be freed by the caller) *
+ * *
+ * Return value: SUCCEED - processed successfully *
+ * FAIL - an error occurred *
+ * *
+ ******************************************************************************/
+int process_sender_history_data(zbx_socket_t *sock, struct zbx_json_parse *jp, zbx_timespec_t *ts, char **info)
+{
+ zbx_host_rights_t rights = {0};
+ int ret;
+ zbx_dc_um_handle_t *um_handle;
+
+ um_handle = zbx_dc_open_user_macros();
+
+ ret = process_client_history_data(sock, jp, ts, sender_item_validator, &rights, info);
+
+ zbx_dc_close_user_macros(um_handle);
+
+ return ret;
+}
+
+static void zbx_drule_ip_free(zbx_drule_ip_t *ip)
+{
+ zbx_vector_ptr_clear_ext(&ip->services, zbx_ptr_free);
+ zbx_vector_ptr_destroy(&ip->services);
+ zbx_free(ip);
+}
+
+static void zbx_drule_free(zbx_drule_t *drule)
+{
+ zbx_vector_ptr_clear_ext(&drule->ips, (zbx_clean_func_t)zbx_drule_ip_free);
+ zbx_vector_ptr_destroy(&drule->ips);
+ zbx_vector_uint64_destroy(&drule->dcheckids);
+ zbx_free(drule);
+}
+
+/******************************************************************************
+ * *
+ * Purpose: process services discovered on IP address *
+ * *
+ * Parameters: drule_ptr - [IN] discovery rule structure *
+ * ip_discovered_ptr - [IN] vector of ip addresses *
+ * *
+ ******************************************************************************/
+static int process_services(const zbx_vector_ptr_t *services, const char *ip, zbx_uint64_t druleid,
+ zbx_vector_uint64_t *dcheckids, zbx_uint64_t unique_dcheckid, int *processed_num, int ip_idx)
+{
+ ZBX_DB_DHOST dhost;
+ zbx_service_t *service;
+ int services_num, ret = FAIL, i, dchecks = 0;
+ zbx_vector_ptr_t services_old;
+ ZBX_DB_DRULE drule = {.druleid = druleid, .unique_dcheckid = unique_dcheckid};
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__);
+
+ memset(&dhost, 0, sizeof(dhost));
+
+ zbx_vector_ptr_create(&services_old);
+
+ /* find host update */
+ for (i = *processed_num; i < services->values_num; i++)
+ {
+ service = (zbx_service_t *)services->values[i];
+
+ zabbix_log(LOG_LEVEL_DEBUG, "%s() druleid:" ZBX_FS_UI64 " dcheckid:" ZBX_FS_UI64 " unique_dcheckid:"
+ ZBX_FS_UI64 " time:'%s %s' ip:'%s' dns:'%s' port:%hu status:%d value:'%s'",
+ __func__, drule.druleid, service->dcheckid, drule.unique_dcheckid,
+ zbx_date2str(service->itemtime, NULL), zbx_time2str(service->itemtime, NULL), ip, service->dns,
+ service->port, service->status, service->value);
+
+ if (0 == service->dcheckid)
+ break;
+
+ dchecks++;
+ }
+
+ /* stop processing current discovery rule and save proxy history until host update is available */
+ if (i == services->values_num)
+ {
+ for (i = *processed_num; i < services->values_num; i++)
+ {
+ char *ip_esc, *dns_esc, *value_esc;
+
+ service = (zbx_service_t *)services->values[i];
+
+ ip_esc = DBdyn_escape_field("proxy_dhistory", "ip", ip);
+ dns_esc = DBdyn_escape_field("proxy_dhistory", "dns", service->dns);
+ value_esc = DBdyn_escape_field("proxy_dhistory", "value", service->value);
+
+ DBexecute("insert into proxy_dhistory (clock,druleid,ip,port,value,status,dcheckid,dns)"
+ " values (%d," ZBX_FS_UI64 ",'%s',%d,'%s',%d," ZBX_FS_UI64 ",'%s')",
+ (int)service->itemtime, drule.druleid, ip_esc, service->port,
+ value_esc, service->status, service->dcheckid, dns_esc);
+ zbx_free(value_esc);
+ zbx_free(dns_esc);
+ zbx_free(ip_esc);
+ }
+
+ goto fail;
+ }
+
+ services_num = i;
+
+ if (0 == *processed_num && 0 == ip_idx)
+ {
+ DB_RESULT result;
+ DB_ROW row;
+ zbx_uint64_t dcheckid;
+
+ result = DBselect(
+ "select dcheckid,clock,port,value,status,dns,ip"
+ " from proxy_dhistory"
+ " where druleid=" ZBX_FS_UI64
+ " order by id",
+ drule.druleid);
+
+ for (i = 0; NULL != (row = DBfetch(result)); i++)
+ {
+ if (SUCCEED == DBis_null(row[0]))
+ continue;
+
+ ZBX_STR2UINT64(dcheckid, row[0]);
+
+ if (0 == strcmp(ip, row[6]))
+ {
+ service = (zbx_service_t *)zbx_malloc(NULL, sizeof(zbx_service_t));
+ service->dcheckid = dcheckid;
+ service->itemtime = (time_t)atoi(row[1]);
+ service->port = atoi(row[2]);
+ zbx_strlcpy_utf8(service->value, row[3], ZBX_MAX_DISCOVERED_VALUE_SIZE);
+ service->status = atoi(row[4]);
+ zbx_strlcpy(service->dns, row[5], ZBX_INTERFACE_DNS_LEN_MAX);
+ zbx_vector_ptr_append(&services_old, service);
+ zbx_vector_uint64_append(dcheckids, service->dcheckid);
+ dchecks++;
+ }
+ }
+ DBfree_result(result);
+
+ if (0 != i)
+ {
+ DBexecute("delete from proxy_dhistory"
+ " where druleid=" ZBX_FS_UI64,
+ drule.druleid);
+ }
+
+ zbx_vector_uint64_sort(dcheckids, ZBX_DEFAULT_UINT64_COMPARE_FUNC);
+ zbx_vector_uint64_uniq(dcheckids, ZBX_DEFAULT_UINT64_COMPARE_FUNC);
+
+ if (SUCCEED != DBlock_druleid(drule.druleid))
+ {
+ zabbix_log(LOG_LEVEL_DEBUG, "druleid:" ZBX_FS_UI64 " does not exist", drule.druleid);
+ goto fail;
+ }
+
+ if (SUCCEED != DBlock_ids("dchecks", "dcheckid", dcheckids))
+ {
+ zabbix_log(LOG_LEVEL_DEBUG, "checks are not available for druleid:" ZBX_FS_UI64, drule.druleid);
+ goto fail;
+ }
+ }
+
+ if (0 == dchecks)
+ {
+ zabbix_log(LOG_LEVEL_DEBUG, "cannot process host update without services");
+ goto fail;
+ }
+
+ for (i = 0; i < services_old.values_num; i++)
+ {
+ service = (zbx_service_t *)services_old.values[i];
+
+ if (FAIL == zbx_vector_uint64_bsearch(dcheckids, service->dcheckid, ZBX_DEFAULT_UINT64_COMPARE_FUNC))
+ {
+ zabbix_log(LOG_LEVEL_DEBUG, "dcheckid:" ZBX_FS_UI64 " does not exist", service->dcheckid);
+ continue;
+ }
+
+ zbx_discovery_update_service(&drule, service->dcheckid, &dhost, ip, service->dns, service->port,
+ service->status, service->value, service->itemtime);
+ }
+
+ for (;*processed_num < services_num; (*processed_num)++)
+ {
+ service = (zbx_service_t *)services->values[*processed_num];
+
+ if (FAIL == zbx_vector_uint64_bsearch(dcheckids, service->dcheckid, ZBX_DEFAULT_UINT64_COMPARE_FUNC))
+ {
+ zabbix_log(LOG_LEVEL_DEBUG, "dcheckid:" ZBX_FS_UI64 " does not exist", service->dcheckid);
+ continue;
+ }
+
+ zbx_discovery_update_service(&drule, service->dcheckid, &dhost, ip, service->dns, service->port,
+ service->status, service->value, service->itemtime);
+ }
+
+ service = (zbx_service_t *)services->values[(*processed_num)++];
+ zbx_discovery_update_host(&dhost, service->status, service->itemtime);
+
+ ret = SUCCEED;
+fail:
+ zbx_vector_ptr_clear_ext(&services_old, zbx_ptr_free);
+ zbx_vector_ptr_destroy(&services_old);
+
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret));
+
+ return ret;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: parse discovery data contents and process it *
+ * *
+ * Parameters: jp_data - [IN] JSON with discovery data *
+ * error - [OUT] address of a pointer to the info *
+ * string (should be freed by the caller) *
+ * *
+ * Return value: SUCCEED - processed successfully *
+ * FAIL - an error occurred *
+ * *
+ ******************************************************************************/
+static int process_discovery_data_contents(struct zbx_json_parse *jp_data, char **error)
+{
+ DB_RESULT result;
+ DB_ROW row;
+ zbx_uint64_t dcheckid, druleid;
+ struct zbx_json_parse jp_row;
+ int status, ret = SUCCEED, i, j;
+ unsigned short port;
+ const char *p = NULL;
+ char ip[ZBX_INTERFACE_IP_LEN_MAX], tmp[MAX_STRING_LEN],
+ dns[ZBX_INTERFACE_DNS_LEN_MAX], *value = NULL;
+ time_t itemtime;
+ size_t value_alloc = ZBX_MAX_DISCOVERED_VALUE_SIZE;
+ zbx_vector_ptr_t drules;
+ zbx_drule_t *drule;
+ zbx_drule_ip_t *drule_ip;
+ zbx_service_t *service;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__);
+
+ value = (char *)zbx_malloc(value, value_alloc);
+
+ zbx_vector_ptr_create(&drules);
+
+ while (NULL != (p = zbx_json_next(jp_data, p)))
+ {
+ if (FAIL == zbx_json_brackets_open(p, &jp_row))
+ goto json_parse_error;
+
+ if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_CLOCK, tmp, sizeof(tmp), NULL))
+ goto json_parse_error;
+
+ itemtime = atoi(tmp);
+
+ if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_DRULE, tmp, sizeof(tmp), NULL))
+ goto json_parse_error;
+
+ ZBX_STR2UINT64(druleid, tmp);
+
+ if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_DCHECK, tmp, sizeof(tmp), NULL))
+ goto json_parse_error;
+
+ if ('\0' != *tmp)
+ ZBX_STR2UINT64(dcheckid, tmp);
+ else
+ dcheckid = 0;
+
+ if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_IP, ip, sizeof(ip), NULL))
+ goto json_parse_error;
+
+ if (SUCCEED != zbx_is_ip(ip))
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid IP address", __func__, ip);
+ continue;
+ }
+
+ if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_PORT, tmp, sizeof(tmp), NULL))
+ {
+ port = 0;
+ }
+ else if (FAIL == zbx_is_ushort(tmp, &port))
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid port", __func__, tmp);
+ continue;
+ }
+
+ if (SUCCEED != zbx_json_value_by_name_dyn(&jp_row, ZBX_PROTO_TAG_VALUE, &value, &value_alloc, NULL))
+ *value = '\0';
+
+ if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_DNS, dns, sizeof(dns), NULL))
+ {
+ *dns = '\0';
+ }
+ else if ('\0' != *dns && FAIL == zbx_validate_hostname(dns))
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid hostname", __func__, dns);
+ continue;
+ }
+
+ if (SUCCEED == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_STATUS, tmp, sizeof(tmp), NULL))
+ status = atoi(tmp);
+ else
+ status = 0;
+
+ if (FAIL == (i = zbx_vector_ptr_search(&drules, &druleid, ZBX_DEFAULT_UINT64_PTR_COMPARE_FUNC)))
+ {
+ drule = (zbx_drule_t *)zbx_malloc(NULL, sizeof(zbx_drule_t));
+ drule->druleid = druleid;
+ zbx_vector_ptr_create(&drule->ips);
+ zbx_vector_uint64_create(&drule->dcheckids);
+ zbx_vector_ptr_append(&drules, drule);
+ }
+ else
+ drule = drules.values[i];
+
+ if (FAIL == (i = zbx_vector_ptr_search(&drule->ips, ip, ZBX_DEFAULT_STR_COMPARE_FUNC)))
+ {
+ drule_ip = (zbx_drule_ip_t *)zbx_malloc(NULL, sizeof(zbx_drule_ip_t));
+ zbx_strlcpy(drule_ip->ip, ip, ZBX_INTERFACE_IP_LEN_MAX);
+ zbx_vector_ptr_create(&drule_ip->services);
+ zbx_vector_ptr_append(&drule->ips, drule_ip);
+ }
+ else
+ drule_ip = drule->ips.values[i];
+
+ service = (zbx_service_t *)zbx_malloc(NULL, sizeof(zbx_service_t));
+ if (0 != (service->dcheckid = dcheckid))
+ zbx_vector_uint64_append(&drule->dcheckids, service->dcheckid);
+ service->port = port;
+ service->status = status;
+ zbx_strlcpy_utf8(service->value, value, ZBX_MAX_DISCOVERED_VALUE_SIZE);
+ zbx_strlcpy(service->dns, dns, ZBX_INTERFACE_DNS_LEN_MAX);
+ service->itemtime = itemtime;
+ zbx_vector_ptr_append(&drule_ip->services, service);
+
+ continue;
+json_parse_error:
+ *error = zbx_strdup(*error, zbx_json_strerror());
+ ret = FAIL;
+ goto json_parse_return;
+ }
+
+ for (i = 0; i < drules.values_num; i++)
+ {
+ zbx_uint64_t unique_dcheckid;
+ int ret2 = SUCCEED;
+
+ drule = (zbx_drule_t *)drules.values[i];
+
+ DBbegin();
+ result = DBselect(
+ "select dcheckid"
+ " from dchecks"
+ " where druleid=" ZBX_FS_UI64
+ " and uniq=1",
+ drule->druleid);
+
+ if (NULL != (row = DBfetch(result)))
+ ZBX_STR2UINT64(unique_dcheckid, row[0]);
+ else
+ unique_dcheckid = 0;
+ DBfree_result(result);
+ for (j = 0; j < drule->ips.values_num && SUCCEED == ret2; j++)
+ {
+ int processed_num = 0;
+
+ drule_ip = (zbx_drule_ip_t *)drule->ips.values[j];
+
+ while (processed_num != drule_ip->services.values_num)
+ {
+ if (FAIL == (ret2 = process_services(&drule_ip->services, drule_ip->ip, drule->druleid,
+ &drule->dcheckids, unique_dcheckid, &processed_num, j)))
+ {
+ break;
+ }
+ }
+ }
+
+ zbx_process_events(NULL, NULL);
+ zbx_clean_events();
+ DBcommit();
+ }
+json_parse_return:
+ zbx_free(value);
+
+ zbx_vector_ptr_clear_ext(&drules, (zbx_clean_func_t)zbx_drule_free);
+ zbx_vector_ptr_destroy(&drules);
+
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret));
+
+ return ret;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: parse autoregistration data contents and process it *
+ * *
+ * Parameters: jp_data - [IN] JSON with autoregistration data *
+ * proxy_hostid - [IN] proxy identifier from database *
+ * error - [OUT] address of a pointer to the info *
+ * string (should be freed by the caller) *
+ * *
+ * Return value: SUCCEED - processed successfully *
+ * FAIL - an error occurred *
+ * *
+ ******************************************************************************/
+static int process_autoregistration_contents(struct zbx_json_parse *jp_data, zbx_uint64_t proxy_hostid,
+ char **error)
+{
+ struct zbx_json_parse jp_row;
+ int ret = SUCCEED;
+ const char *p = NULL;
+ time_t itemtime;
+ char host[ZBX_HOSTNAME_BUF_LEN], ip[ZBX_INTERFACE_IP_LEN_MAX],
+ dns[ZBX_INTERFACE_DNS_LEN_MAX], tmp[MAX_STRING_LEN], *host_metadata = NULL;
+ unsigned short port;
+ size_t host_metadata_alloc = 1; /* for at least NUL-terminating string */
+ zbx_vector_ptr_t autoreg_hosts;
+ zbx_conn_flags_t flags = ZBX_CONN_DEFAULT;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__);
+
+ if (0 == DCget_auto_registration_action_count())
+ {
+ zabbix_log(LOG_LEVEL_DEBUG, "cannot process auto registration contents, all autoregistration actions"
+ " are disabled");
+ goto out;
+ }
+
+ zbx_vector_ptr_create(&autoreg_hosts);
+ host_metadata = (char *)zbx_malloc(host_metadata, host_metadata_alloc);
+
+ while (NULL != (p = zbx_json_next(jp_data, p)))
+ {
+ unsigned int connection_type;
+
+ if (FAIL == (ret = zbx_json_brackets_open(p, &jp_row)))
+ break;
+
+ if (FAIL == (ret = zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_CLOCK, tmp, sizeof(tmp), NULL)))
+ break;
+
+ itemtime = atoi(tmp);
+
+ if (FAIL == (ret = zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_HOST, host, sizeof(host), NULL)))
+ break;
+
+ if (FAIL == zbx_check_hostname(host, NULL))
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid Zabbix host name", __func__, host);
+ continue;
+ }
+
+ if (FAIL == zbx_json_value_by_name_dyn(&jp_row, ZBX_PROTO_TAG_HOST_METADATA,
+ &host_metadata, &host_metadata_alloc, NULL))
+ {
+ *host_metadata = '\0';
+ }
+
+ if (FAIL != zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_FLAGS, tmp, sizeof(tmp), NULL))
+ {
+ int flags_int;
+
+ flags_int = atoi(tmp);
+
+ switch (flags_int)
+ {
+ case ZBX_CONN_DEFAULT:
+ case ZBX_CONN_IP:
+ case ZBX_CONN_DNS:
+ flags = (zbx_conn_flags_t)flags_int;
+ break;
+ default:
+ flags = ZBX_CONN_DEFAULT;
+ zabbix_log(LOG_LEVEL_WARNING, "wrong flags value: %d for host \"%s\":",
+ flags_int, host);
+ }
+ }
+
+ if (FAIL == (ret = zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_IP, ip, sizeof(ip), NULL)))
+ {
+ if (ZBX_CONN_DNS == flags)
+ {
+ *ip = '\0';
+ ret = SUCCEED;
+ }
+ else
+ break;
+ }
+ else if (SUCCEED != zbx_is_ip(ip))
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid IP address", __func__, ip);
+ continue;
+ }
+
+ if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_DNS, dns, sizeof(dns), NULL))
+ {
+ *dns = '\0';
+ }
+ else if ('\0' != *dns && FAIL == zbx_validate_hostname(dns))
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid hostname", __func__, dns);
+ continue;
+ }
+
+ if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_PORT, tmp, sizeof(tmp), NULL))
+ {
+ port = ZBX_DEFAULT_AGENT_PORT;
+ }
+ else if (FAIL == zbx_is_ushort(tmp, &port))
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid port", __func__, tmp);
+ continue;
+ }
+
+ if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_TLS_ACCEPTED, tmp, sizeof(tmp), NULL))
+ {
+ connection_type = ZBX_TCP_SEC_UNENCRYPTED;
+ }
+ else if (FAIL == zbx_is_uint32(tmp, &connection_type) || (ZBX_TCP_SEC_UNENCRYPTED != connection_type &&
+ ZBX_TCP_SEC_TLS_PSK != connection_type && ZBX_TCP_SEC_TLS_CERT != connection_type))
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid value for \""
+ ZBX_PROTO_TAG_TLS_ACCEPTED "\"", __func__, tmp);
+ continue;
+ }
+
+ DBregister_host_prepare(&autoreg_hosts, host, ip, dns, port, connection_type, host_metadata, flags,
+ itemtime);
+ }
+
+ if (0 != autoreg_hosts.values_num)
+ {
+ DBbegin();
+ DBregister_host_flush(&autoreg_hosts, proxy_hostid);
+ DBcommit();
+ DCconfig_delete_autoreg_host(&autoreg_hosts);
+ }
+
+ zbx_free(host_metadata);
+ DBregister_host_clean(&autoreg_hosts);
+ zbx_vector_ptr_destroy(&autoreg_hosts);
+
+ if (SUCCEED != ret)
+ *error = zbx_strdup(*error, zbx_json_strerror());
+out:
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret));
+
+ return ret;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: get the number of values waiting to be sent to the server *
+ * *
+ * Return value: the number of history values *
+ * *
+ ******************************************************************************/
+int proxy_get_history_count(void)
+{
+ DB_RESULT result;
+ DB_ROW row;
+ zbx_uint64_t id;
+ int count = 0;
+
+ DBconnect(ZBX_DB_CONNECT_NORMAL);
+
+ proxy_get_lastid("proxy_history", "history_lastid", &id);
+
+ result = DBselect(
+ "select count(*)"
+ " from proxy_history"
+ " where id>" ZBX_FS_UI64,
+ id);
+
+ if (NULL != (row = DBfetch(result)))
+ count = atoi(row[0]);
+
+ DBfree_result(result);
+
+ DBclose();
+
+ return count;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: parse tasks contents and saves the received tasks *
+ * *
+ * Parameters: jp_tasks - [IN] JSON with tasks data *
+ * *
+ ******************************************************************************/
+static void process_tasks_contents(struct zbx_json_parse *jp_tasks)
+{
+ zbx_vector_ptr_t tasks;
+
+ zbx_vector_ptr_create(&tasks);
+
+ zbx_tm_json_deserialize_tasks(jp_tasks, &tasks);
+
+ DBbegin();
+ zbx_tm_save_tasks(&tasks);
+ DBcommit();
+
+ zbx_vector_ptr_clear_ext(&tasks, (zbx_clean_func_t)zbx_tm_task_free);
+ zbx_vector_ptr_destroy(&tasks);
+}
+
+/******************************************************************************
+ * *
+ * Purpose: appends text to the string on a new line *
+ * *
+ ******************************************************************************/
+static void zbx_strcatnl_alloc(char **info, size_t *info_alloc, size_t *info_offset, const char *text)
+{
+ if (0 != *info_offset)
+ zbx_chrcpy_alloc(info, info_alloc, info_offset, '\n');
+
+ zbx_strcpy_alloc(info, info_alloc, info_offset, text);
+}
+
+/******************************************************************************
+ * *
+ * Purpose: detect lost connection with proxy and calculate suppression *
+ * window if possible *
+ * *
+ * Parameters: ts - [IN] timestamp when the proxy connection was *
+ * established *
+ * proxy_staus - [IN] - active or passive proxy *
+ * diff - [IN/OUT] the properties to update *
+ * *
+ ******************************************************************************/
+static void check_proxy_nodata(zbx_timespec_t *ts, unsigned char proxy_status, zbx_proxy_diff_t *diff)
+{
+ int delay;
+
+ if (0 != (diff->nodata_win.flags & ZBX_PROXY_SUPPRESS_ACTIVE))
+ {
+ diff->nodata_win.values_num = 0; /* reset counter of new suppress values received from proxy */
+ return; /* only for current packet */
+ }
+
+ delay = ts->sec - diff->lastaccess;
+
+ if ((HOST_STATUS_PROXY_PASSIVE == proxy_status &&
+ (2 * CONFIG_PROXYDATA_FREQUENCY) < delay && NET_DELAY_MAX < delay) ||
+ (HOST_STATUS_PROXY_ACTIVE == proxy_status && NET_DELAY_MAX < delay))
+ {
+ diff->nodata_win.values_num = 0;
+ diff->nodata_win.period_end = ts->sec;
+ diff->flags |= ZBX_FLAGS_PROXY_DIFF_UPDATE_SUPPRESS_WIN;
+ diff->nodata_win.flags |= ZBX_PROXY_SUPPRESS_ENABLE;
+ }
+}
+
+/******************************************************************************
+ * *
+ * Purpose: detect lack of data during lost connectivity *
+ * *
+ * Parameters: ts - [IN] timestamp when the proxy connection was *
+ * established *
+ * proxy_staus - [IN] - active or passive proxy *
+ * diff - [IN/OUT] the properties to update *
+ * *
+ ******************************************************************************/
+static void check_proxy_nodata_empty(zbx_timespec_t *ts, unsigned char proxy_status, zbx_proxy_diff_t *diff)
+{
+ int delay_empty;
+
+ if (0 != (diff->nodata_win.flags & ZBX_PROXY_SUPPRESS_EMPTY) && 0 != diff->nodata_win.values_num)
+ diff->nodata_win.flags &= (~ZBX_PROXY_SUPPRESS_EMPTY);
+
+ if (0 == (diff->nodata_win.flags & ZBX_PROXY_SUPPRESS_EMPTY) || 0 != diff->nodata_win.values_num)
+ return;
+
+ delay_empty = ts->sec - diff->nodata_win.period_end;
+
+ if (HOST_STATUS_PROXY_PASSIVE == proxy_status ||
+ (HOST_STATUS_PROXY_ACTIVE == proxy_status && NET_DELAY_MAX < delay_empty))
+ {
+ diff->nodata_win.period_end = 0;
+ diff->nodata_win.flags = ZBX_PROXY_SUPPRESS_DISABLE;
+ }
+}
+
+/******************************************************************************
+ * *
+ * Purpose: process 'proxy data' request *
+ * *
+ * Parameters: proxy - [IN] the source proxy *
+ * jp - [IN] JSON with proxy data *
+ * proxy_hostid - [IN] proxy identifier from database *
+ * ts - [IN] timestamp when the proxy connection was *
+ * established *
+ * proxy_status - [IN] active or passive proxy mode *
+ * more - [OUT] available data flag *
+ * error - [OUT] address of a pointer to the info string *
+ * (should be freed by the caller) *
+ * *
+ * Return value: SUCCEED - processed successfully *
+ * FAIL - an error occurred *
+ * *
+ ******************************************************************************/
+int process_proxy_data(const DC_PROXY *proxy, struct zbx_json_parse *jp, zbx_timespec_t *ts,
+ unsigned char proxy_status, int *more, char **error)
+{
+ struct zbx_json_parse jp_data;
+ int ret = SUCCEED, flags_old;
+ char *error_step = NULL, value[MAX_STRING_LEN];
+ size_t error_alloc = 0, error_offset = 0;
+ zbx_proxy_diff_t proxy_diff;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__);
+
+ proxy_diff.flags = ZBX_FLAGS_PROXY_DIFF_UNSET;
+ proxy_diff.hostid = proxy->hostid;
+
+ if (SUCCEED != (ret = DCget_proxy_nodata_win(proxy_diff.hostid, &proxy_diff.nodata_win,
+ &proxy_diff.lastaccess)))
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "cannot get proxy communication delay");
+ ret = FAIL;
+ goto out;
+ }
+
+ if (SUCCEED == zbx_json_value_by_name(jp, ZBX_PROTO_TAG_MORE, value, sizeof(value), NULL))
+ proxy_diff.more_data = atoi(value);
+ else
+ proxy_diff.more_data = ZBX_PROXY_DATA_DONE;
+
+ if (NULL != more)
+ *more = proxy_diff.more_data;
+
+ if (SUCCEED == zbx_json_value_by_name(jp, ZBX_PROTO_TAG_PROXY_DELAY, value, sizeof(value), NULL))
+ proxy_diff.proxy_delay = atoi(value);
+ else
+ proxy_diff.proxy_delay = 0;
+
+ proxy_diff.flags |= ZBX_FLAGS_PROXY_DIFF_UPDATE_PROXYDELAY;
+ flags_old = proxy_diff.nodata_win.flags;
+ check_proxy_nodata(ts, proxy_status, &proxy_diff); /* first packet can be empty for active proxy */
+
+ zabbix_log(LOG_LEVEL_DEBUG, "%s() flag_win:%d/%d flag:%d proxy_status:%d period_end:%d delay:%d"
+ " timestamp:%d lastaccess:%d proxy_delay:%d more:%d", __func__, proxy_diff.nodata_win.flags,
+ flags_old, (int)proxy_diff.flags, proxy_status, proxy_diff.nodata_win.period_end,
+ ts->sec - proxy_diff.lastaccess, ts->sec, proxy_diff.lastaccess, proxy_diff.proxy_delay,
+ proxy_diff.more_data);
+
+ if (ZBX_FLAGS_PROXY_DIFF_UNSET != proxy_diff.flags)
+ zbx_dc_update_proxy(&proxy_diff);
+
+ if (SUCCEED == zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_INTERFACE_AVAILABILITY, &jp_data))
+ {
+ if (SUCCEED != (ret = process_interfaces_availability_contents(&jp_data, &error_step)))
+ zbx_strcatnl_alloc(error, &error_alloc, &error_offset, error_step);
+ }
+
+ flags_old = proxy_diff.nodata_win.flags;
+
+ if (SUCCEED == zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_HISTORY_DATA, &jp_data))
+ {
+ zbx_session_t *session = NULL;
+
+ if (SUCCEED == zbx_json_value_by_name(jp, ZBX_PROTO_TAG_SESSION, value, sizeof(value), NULL))
+ {
+ size_t token_len;
+
+ if (ZBX_SESSION_TOKEN_SIZE != (token_len = strlen(value)))
+ {
+ *error = zbx_dsprintf(*error, "invalid session token length %d", (int)token_len);
+ ret = FAIL;
+ goto out;
+ }
+
+ session = zbx_dc_get_or_create_session(proxy->hostid, value, ZBX_SESSION_TYPE_DATA);
+ }
+
+ if (SUCCEED != (ret = process_history_data_by_itemids(NULL, proxy_item_validator,
+ (void *)&proxy->hostid, &jp_data, session, &proxy_diff.nodata_win, &error_step,
+ ZBX_ITEM_GET_PROCESS)))
+ {
+ zbx_strcatnl_alloc(error, &error_alloc, &error_offset, error_step);
+ }
+ }
+
+ if (0 != (proxy_diff.nodata_win.flags & ZBX_PROXY_SUPPRESS_ACTIVE))
+ {
+ check_proxy_nodata_empty(ts, proxy_status, &proxy_diff);
+
+ if (0 < proxy_diff.nodata_win.values_num || flags_old != proxy_diff.nodata_win.flags)
+ proxy_diff.flags |= ZBX_FLAGS_PROXY_DIFF_UPDATE_SUPPRESS_WIN;
+
+ zabbix_log(LOG_LEVEL_DEBUG, "Result of %s() flag_win:%d/%d flag:%d values_num:%d",
+ __func__, proxy_diff.nodata_win.flags, flags_old, (int)proxy_diff.flags,
+ proxy_diff.nodata_win.values_num);
+ }
+
+ if (ZBX_FLAGS_PROXY_DIFF_UNSET != proxy_diff.flags)
+ zbx_dc_update_proxy(&proxy_diff);
+
+ if (SUCCEED == zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_DISCOVERY_DATA, &jp_data))
+ {
+ if (SUCCEED != (ret = process_discovery_data_contents(&jp_data, &error_step)))
+ zbx_strcatnl_alloc(error, &error_alloc, &error_offset, error_step);
+ }
+
+ if (SUCCEED == zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_AUTOREGISTRATION, &jp_data))
+ {
+ if (SUCCEED != (ret = process_autoregistration_contents(&jp_data, proxy->hostid, &error_step)))
+ zbx_strcatnl_alloc(error, &error_alloc, &error_offset, error_step);
+ }
+
+ if (SUCCEED == zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_TASKS, &jp_data))
+ process_tasks_contents(&jp_data);
+
+ if (SUCCEED == zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_PROXY_ACTIVE_AVAIL_DATA, &jp_data))
+ {
+ const char *ptr;
+ zbx_vector_proxy_hostdata_ptr_t host_avails;
+ struct zbx_json_parse jp_host;
+ char buffer[ZBX_KIBIBYTE];
+
+ zbx_vector_proxy_hostdata_ptr_create(&host_avails);
+
+ for (ptr = NULL; NULL != (ptr = zbx_json_next(&jp_data, ptr));)
+ {
+ zbx_proxy_hostdata_t *host;
+
+ if (SUCCEED != zbx_json_brackets_open(ptr, &jp_host))
+ continue;
+
+ if (SUCCEED == zbx_json_value_by_name(&jp_host, ZBX_PROTO_TAG_HOSTID, buffer, sizeof(buffer), NULL))
+ {
+ host = (zbx_proxy_hostdata_t *)zbx_malloc(NULL, sizeof(zbx_proxy_hostdata_t));
+ host->hostid = atoi(buffer);
+ }
+ else
+ continue;
+
+ if (FAIL == zbx_json_value_by_name(&jp_host, ZBX_PROTO_TAG_ACTIVE_STATUS, buffer, sizeof(buffer), NULL))
+ {
+ zbx_free(host);
+ continue;
+ }
+
+ host->status = atoi(buffer);
+
+ zbx_vector_proxy_hostdata_ptr_append(&host_avails, host);
+ }
+
+ if (0 != host_avails.values_num)
+ {
+ unsigned char *data = NULL;
+ zbx_uint32_t data_len;
+ DC_HOST *hosts;
+ int i, *errcodes;
+ zbx_vector_uint64_t hostids;
+ zbx_vector_proxy_hostdata_ptr_t proxy_host_avails;
+
+ zbx_vector_uint64_create(&hostids);
+
+ for (i = 0; i < host_avails.values_num; i++)
+ zbx_vector_uint64_append(&hostids, host_avails.values[i]->hostid);
+
+ hosts = (DC_HOST *)zbx_malloc(NULL, sizeof(DC_HOST) * host_avails.values_num);
+ errcodes = (int *)zbx_malloc(NULL, sizeof(int) * host_avails.values_num);
+ DCconfig_get_hosts_by_hostids(hosts, hostids.values, errcodes, hostids.values_num);
+
+ zbx_vector_uint64_destroy(&hostids);
+
+ zbx_vector_proxy_hostdata_ptr_create(&proxy_host_avails);
+
+ for (i = 0; i < host_avails.values_num; i++)
+ {
+ if (SUCCEED == errcodes[i] && hosts[i].proxy_hostid == proxy->hostid)
+ zbx_vector_proxy_hostdata_ptr_append(&proxy_host_avails, host_avails.values[i]);
+ }
+
+ zbx_free(errcodes);
+ zbx_free(hosts);
+
+ data_len = zbx_availability_serialize_proxy_hostdata(&data, &proxy_host_avails, proxy->hostid);
+ zbx_availability_send(ZBX_IPC_AVAILMAN_PROCESS_PROXY_HOSTDATA, data, data_len, NULL);
+
+ zbx_vector_proxy_hostdata_ptr_destroy(&proxy_host_avails);
+ zbx_vector_proxy_hostdata_ptr_clear_ext(&host_avails, (zbx_proxy_hostdata_ptr_free_func_t)zbx_ptr_free);
+ zbx_free(data);
+ }
+
+ zbx_vector_proxy_hostdata_ptr_destroy(&host_avails);
+ }
+
+out:
+ zbx_free(error_step);
+ zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret));
+
+ return ret;
+}
+
+/******************************************************************************
+ * *
+ * Purpose: flushes lastaccess changes for proxies every *
+ * ZBX_PROXY_LASTACCESS_UPDATE_FREQUENCY seconds *
+ * *
+ ******************************************************************************/
+static void zbx_db_flush_proxy_lastaccess(void)
+{
+ zbx_vector_uint64_pair_t lastaccess;
+
+ zbx_vector_uint64_pair_create(&lastaccess);
+
+ zbx_dc_get_proxy_lastaccess(&lastaccess);
+
+ if (0 != lastaccess.values_num)
+ {
+ char *sql;
+ size_t sql_alloc = 256, sql_offset = 0;
+ int i;
+
+ sql = (char *)zbx_malloc(NULL, sql_alloc);
+
+ DBbegin();
+ zbx_DBbegin_multiple_update(&sql, &sql_alloc, &sql_offset);
+
+ for (i = 0; i < lastaccess.values_num; i++)
+ {
+ zbx_uint64_pair_t *pair = &lastaccess.values[i];
+
+ zbx_snprintf_alloc(&sql, &sql_alloc, &sql_offset, "update host_rtdata"
+ " set lastaccess=%d"
+ " where hostid=" ZBX_FS_UI64 ";\n",
+ (int)pair->second, pair->first);
+
+ DBexecute_overflowed_sql(&sql, &sql_alloc, &sql_offset);
+ }
+
+ zbx_DBend_multiple_update(&sql, &sql_alloc, &sql_offset);
+
+ if (16 < sql_offset) /* in ORACLE always present begin..end; */
+ DBexecute("%s", sql);
+
+ DBcommit();
+
+ zbx_free(sql);
+ }
+
+ zbx_vector_uint64_pair_destroy(&lastaccess);
+}
+
+/******************************************************************************
+ * *
+ * Purpose: updates proxy version and compatibility with server in database *
+ * *
+ * Parameters: proxy - [IN] the proxy to update version for *
+ * diff - [IN] indicates changes to the proxy *
+ * *
+ ******************************************************************************/
+static void db_update_proxy_version(DC_PROXY *proxy, zbx_proxy_diff_t *diff)
+{
+ if (0 != (diff->flags & ZBX_FLAGS_PROXY_DIFF_UPDATE_VERSION))
+ {
+ if (0 != proxy->version_int)
+ {
+ zabbix_log(LOG_LEVEL_DEBUG, "proxy \"%s\" protocol version updated from %u.%u to %u.%u",
+ proxy->host,
+ ZBX_COMPONENT_VERSION_MAJOR(proxy->version_int),
+ ZBX_COMPONENT_VERSION_MINOR(proxy->version_int),
+ ZBX_COMPONENT_VERSION_MAJOR(diff->version_int),
+ ZBX_COMPONENT_VERSION_MINOR(diff->version_int));
+ }
+
+ if (ZBX_DB_OK > DBexecute(
+ "update host_rtdata"
+ " set version=%u,compatibility=%u"
+ " where hostid=" ZBX_FS_UI64,
+ ZBX_COMPONENT_VERSION_TO_DEC_FORMAT(diff->version_int), diff->compatibility,
+ diff->hostid))
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "Failed to update proxy version and compatibility with server for"
+ " proxy '%s'.", proxy->host);
+ }
+ }
+}
+
+/******************************************************************************
+ * *
+ * Purpose: gets proxy version compatibility with server version *
+ * *
+ * Parameters: proxy_version - [IN] proxy_version *
+ * *
+ * Return value: proxy version compatibility with server version *
+ * *
+ ******************************************************************************/
+static zbx_proxy_compatibility_t zbx_get_proxy_compatibility(int proxy_version)
+{
+#define SERVER_VERSION ZBX_COMPONENT_VERSION(ZABBIX_VERSION_MAJOR, ZABBIX_VERSION_MINOR, 0)
+
+ if (0 == proxy_version)
+ return ZBX_PROXY_VERSION_UNDEFINED;
+
+ proxy_version = ZBX_COMPONENT_VERSION_WITHOUT_PATCH(proxy_version);
+
+ if (SERVER_VERSION == proxy_version)
+ return ZBX_PROXY_VERSION_CURRENT;
+
+ if (SERVER_VERSION < proxy_version)
+ return ZBX_PROXY_VERSION_UNSUPPORTED;
+#if (ZABBIX_VERSION_MINOR == 0)
+ if (ZABBIX_VERSION_MAJOR == 1 + ZBX_COMPONENT_VERSION_MAJOR(proxy_version))
+ return ZBX_PROXY_VERSION_STATUS_OUTDATED;
+#elif (ZABBIX_VERSION_MINOR > 0)
+ if (ZABBIX_VERSION_MAJOR == ZBX_COMPONENT_VERSION_MAJOR(proxy_version))
+ return ZBX_PROXY_VERSION_OUTDATED;
+#endif
+ return ZBX_PROXY_VERSION_UNSUPPORTED;
+
+#undef SERVER_VERSION
+}
+
+/******************************************************************************
+ * *
+ * Purpose: updates proxy runtime properties in cache and database. *
+ * *
+ * Parameters: proxy - [IN/OUT] the proxy *
+ * version_str - [IN] the proxy version as string *
+ * version_int - [IN] the proxy version in numeric representation *
+ * lastaccess - [IN] the last proxy access time *
+ * compress - [IN] 1 if proxy is using data compression, *
+ * 0 otherwise *
+ * flags_add - [IN] additional flags for update proxy *
+ * *
+ * Comments: The proxy parameter properties are also updated. *
+ * *
+ ******************************************************************************/
+void zbx_update_proxy_data(DC_PROXY *proxy, char *version_str, int version_int, int lastaccess, int compress,
+ zbx_uint64_t flags_add)
+{
+ zbx_proxy_diff_t diff;
+ zbx_proxy_compatibility_t compatibility;
+
+ compatibility = zbx_get_proxy_compatibility(version_int);
+
+ diff.hostid = proxy->hostid;
+ diff.flags = ZBX_FLAGS_PROXY_DIFF_UPDATE | flags_add;
+ diff.version_str = version_str;
+ diff.version_int = version_int;
+ diff.compatibility = compatibility;
+ diff.lastaccess = lastaccess;
+ diff.compress = compress;
+
+ zbx_dc_update_proxy(&diff);
+
+ db_update_proxy_version(proxy, &diff);
+
+ zbx_strlcpy(proxy->version_str, version_str, sizeof(proxy->version_str));
+ proxy->version_int = version_int;
+ proxy->compatibility = compatibility;
+ proxy->auto_compress = compress;
+ proxy->lastaccess = lastaccess;
+
+ if (0 != (diff.flags & ZBX_FLAGS_PROXY_DIFF_UPDATE_COMPRESS))
+ DBexecute("update hosts set auto_compress=%d where hostid=" ZBX_FS_UI64, diff.compress, diff.hostid);
+
+ zbx_db_flush_proxy_lastaccess();
+}
+/******************************************************************************
+ * *
+ * Purpose: flushes last_version_error_time changes runtime *
+ * variable for proxies structures *
+ * *
+ ******************************************************************************/
+static void zbx_update_proxy_lasterror(DC_PROXY *proxy)
+{
+ zbx_proxy_diff_t diff;
+
+ diff.hostid = proxy->hostid;
+ diff.flags = ZBX_FLAGS_PROXY_DIFF_UPDATE_LASTERROR;
+ diff.lastaccess = time(NULL);
+ diff.last_version_error_time = proxy->last_version_error_time;
+
+ zbx_dc_update_proxy(&diff);
+}
+/******************************************************************************
+ * *
+ * Purpose: check server and proxy versions and compatibility rules *
+ * *
+ * Parameters: *
+ * proxy - [IN] the source proxy *
+ * version - [IN] the version of proxy *
+ * *
+ * Return value: *
+ * SUCCEED - no compatibility issue *
+ * FAIL - compatibility check fault *
+ * *
+ ******************************************************************************/
+int zbx_check_protocol_version(DC_PROXY *proxy, int version)
+{
+ zbx_proxy_compatibility_t compatibility;
+
+ compatibility = zbx_get_proxy_compatibility(version);
+
+ /* warn if another proxy version is used and proceed with compatibility rules*/
+ if (ZBX_PROXY_VERSION_CURRENT != compatibility)
+ {
+ int now = zbx_time(), print_log = 0;
+
+ if (proxy->last_version_error_time <= now)
+ {
+ print_log = 1;
+ proxy->last_version_error_time = now + 5 * SEC_PER_MIN;
+ zbx_update_proxy_lasterror(proxy);
+ }
+
+ if (ZBX_PROXY_VERSION_UNSUPPORTED == compatibility)
+ {
+ if (1 == print_log)
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "Proxy \"%s\" version %u.%u.%u is not supported by server"
+ " version %d.%d.%d.", proxy->host,
+ ZBX_COMPONENT_VERSION_MAJOR(version),
+ ZBX_COMPONENT_VERSION_MINOR(version),
+ ZBX_COMPONENT_VERSION_PATCH(version), ZABBIX_VERSION_MAJOR,
+ ZABBIX_VERSION_MINOR, ZABBIX_VERSION_PATCH);
+ }
+ return FAIL;
+ }
+ else if (ZBX_PROXY_VERSION_OUTDATED == compatibility && 1 == print_log)
+ {
+ zabbix_log(LOG_LEVEL_WARNING, "Proxy \"%s\" version %u.%u.%u is outdated, only data collection"
+ " and remote execution is available with server version %d.%d.%d.", proxy->host,
+ ZBX_COMPONENT_VERSION_MAJOR(version), ZBX_COMPONENT_VERSION_MINOR(version),
+ ZBX_COMPONENT_VERSION_PATCH(version), ZABBIX_VERSION_MAJOR,
+ ZABBIX_VERSION_MINOR, ZABBIX_VERSION_PATCH);
+ }
+ else if (ZBX_PROXY_VERSION_UNDEFINED == compatibility)
+ return FAIL;
+ }
+
+ return SUCCEED;
+}
+