diff options
Diffstat (limited to 'src/libs/zbxdbwrap/proxy.c')
-rw-r--r-- | src/libs/zbxdbwrap/proxy.c | 3334 |
1 files changed, 3334 insertions, 0 deletions
diff --git a/src/libs/zbxdbwrap/proxy.c b/src/libs/zbxdbwrap/proxy.c new file mode 100644 index 00000000000..6a731bad5d4 --- /dev/null +++ b/src/libs/zbxdbwrap/proxy.c @@ -0,0 +1,3334 @@ +/* +** Zabbix +** Copyright (C) 2001-2022 Zabbix SIA +** +** This program is free software; you can redistribute it and/or modify +** it under the terms of the GNU General Public License as published by +** the Free Software Foundation; either version 2 of the License, or +** (at your option) any later version. +** +** This program is distributed in the hope that it will be useful, +** but WITHOUT ANY WARRANTY; without even the implied warranty of +** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +** GNU General Public License for more details. +** +** You should have received a copy of the GNU General Public License +** along with this program; if not, write to the Free Software +** Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. +**/ + +#include "zbxdbwrap.h" + +#include "zbxdbhigh.h" +#include "log.h" +#include "zbxsysinfo.h" +#include "zbxserver.h" +#include "zbxtasks.h" +#include "zbxdiscovery.h" +#include "zbxalgo.h" +#include "preproc.h" +#include "zbxcrypto.h" +#include "zbxlld.h" +#include "events.h" +#include "zbxavailability.h" +#include "zbxcommshigh.h" +#include "zbxnum.h" +#include "zbxtime.h" +#include "zbxip.h" +#include "version.h" +#include "zbxversion.h" + +extern char *CONFIG_SERVER; + +/* the space reserved in json buffer to hold at least one record plus service data */ +#define ZBX_DATA_JSON_RESERVED (ZBX_HISTORY_TEXT_VALUE_LEN * 4 + ZBX_KIBIBYTE * 4) + +#define ZBX_DATA_JSON_RECORD_LIMIT (ZBX_MAX_RECV_DATA_SIZE - ZBX_DATA_JSON_RESERVED) +#define ZBX_DATA_JSON_BATCH_LIMIT ((ZBX_MAX_RECV_DATA_SIZE - ZBX_DATA_JSON_RESERVED) / 2) + +/* the maximum number of values processed in one batch */ +#define ZBX_HISTORY_VALUES_MAX 256 + +typedef struct +{ + zbx_uint64_t druleid; + zbx_vector_uint64_t dcheckids; + zbx_vector_ptr_t ips; +} +zbx_drule_t; + +typedef struct +{ + char ip[ZBX_INTERFACE_IP_LEN_MAX]; + zbx_vector_ptr_t services; +} +zbx_drule_ip_t; + +typedef struct +{ + const char *field; + const char *tag; + zbx_json_type_t jt; + const char *default_value; +} +zbx_history_field_t; + +typedef struct +{ + const char *table, *lastidfield; + zbx_history_field_t fields[ZBX_MAX_FIELDS]; +} +zbx_history_table_t; + +typedef int (*zbx_client_item_validator_t)(DC_ITEM *item, zbx_socket_t *sock, void *args, char **error); + +typedef struct +{ + zbx_uint64_t hostid; + int value; +} +zbx_host_rights_t; + +static zbx_history_table_t dht = { + "proxy_dhistory", "dhistory_lastid", + { + {"clock", ZBX_PROTO_TAG_CLOCK, ZBX_JSON_TYPE_INT, NULL}, + {"druleid", ZBX_PROTO_TAG_DRULE, ZBX_JSON_TYPE_INT, NULL}, + {"dcheckid", ZBX_PROTO_TAG_DCHECK, ZBX_JSON_TYPE_INT, NULL}, + {"ip", ZBX_PROTO_TAG_IP, ZBX_JSON_TYPE_STRING, NULL}, + {"dns", ZBX_PROTO_TAG_DNS, ZBX_JSON_TYPE_STRING, NULL}, + {"port", ZBX_PROTO_TAG_PORT, ZBX_JSON_TYPE_INT, "0"}, + {"value", ZBX_PROTO_TAG_VALUE, ZBX_JSON_TYPE_STRING, ""}, + {"status", ZBX_PROTO_TAG_STATUS, ZBX_JSON_TYPE_INT, "0"}, + {NULL} + } +}; + +static zbx_history_table_t areg = { + "proxy_autoreg_host", "autoreg_host_lastid", + { + {"clock", ZBX_PROTO_TAG_CLOCK, ZBX_JSON_TYPE_INT, NULL}, + {"host", ZBX_PROTO_TAG_HOST, ZBX_JSON_TYPE_STRING, NULL}, + {"listen_ip", ZBX_PROTO_TAG_IP, ZBX_JSON_TYPE_STRING, ""}, + {"listen_dns", ZBX_PROTO_TAG_DNS, ZBX_JSON_TYPE_STRING, ""}, + {"listen_port", ZBX_PROTO_TAG_PORT, ZBX_JSON_TYPE_STRING, "0"}, + {"host_metadata", ZBX_PROTO_TAG_HOST_METADATA, ZBX_JSON_TYPE_STRING, ""}, + {"flags", ZBX_PROTO_TAG_FLAGS, ZBX_JSON_TYPE_STRING, "0"}, + {"tls_accepted", ZBX_PROTO_TAG_TLS_ACCEPTED, ZBX_JSON_TYPE_INT, "0"}, + {NULL} + } +}; + +/****************************************************************************** + * * + * Purpose: check proxy connection permissions (encryption configuration and * + * if peer proxy address is allowed) * + * * + * Parameters: * + * proxy - [IN] the proxy data * + * sock - [IN] connection socket context * + * error - [OUT] error message * + * * + * Return value: * + * SUCCEED - connection permission check was successful * + * FAIL - otherwise * + * * + ******************************************************************************/ +int zbx_proxy_check_permissions(const DC_PROXY *proxy, const zbx_socket_t *sock, char **error) +{ +#if defined(HAVE_GNUTLS) || defined(HAVE_OPENSSL) + zbx_tls_conn_attr_t attr; +#endif + if ('\0' != *proxy->proxy_address && FAIL == zbx_tcp_check_allowed_peers(sock, proxy->proxy_address)) + { + *error = zbx_strdup(*error, "connection is not allowed"); + return FAIL; + } + +#if defined(HAVE_GNUTLS) || defined(HAVE_OPENSSL) + if (ZBX_TCP_SEC_TLS_CERT == sock->connection_type) + { + if (SUCCEED != zbx_tls_get_attr_cert(sock, &attr)) + { + *error = zbx_strdup(*error, "internal error: cannot get connection attributes"); + THIS_SHOULD_NEVER_HAPPEN; + return FAIL; + } + } +#if defined(HAVE_GNUTLS) || (defined(HAVE_OPENSSL) && defined(HAVE_OPENSSL_WITH_PSK)) + else if (ZBX_TCP_SEC_TLS_PSK == sock->connection_type) + { + if (SUCCEED != zbx_tls_get_attr_psk(sock, &attr)) + { + *error = zbx_strdup(*error, "internal error: cannot get connection attributes"); + THIS_SHOULD_NEVER_HAPPEN; + return FAIL; + } + } +#endif + else if (ZBX_TCP_SEC_UNENCRYPTED != sock->connection_type) + { + *error = zbx_strdup(*error, "internal error: invalid connection type"); + THIS_SHOULD_NEVER_HAPPEN; + return FAIL; + } +#endif + if (0 == ((unsigned int)proxy->tls_accept & sock->connection_type)) + { + *error = zbx_dsprintf(NULL, "connection of type \"%s\" is not allowed for proxy \"%s\"", + zbx_tcp_connection_type_name(sock->connection_type), proxy->host); + return FAIL; + } + +#if defined(HAVE_GNUTLS) || defined(HAVE_OPENSSL) + if (ZBX_TCP_SEC_TLS_CERT == sock->connection_type) + { + /* simplified match, not compliant with RFC 4517, 4518 */ + if ('\0' != *proxy->tls_issuer && 0 != strcmp(proxy->tls_issuer, attr.issuer)) + { + *error = zbx_dsprintf(*error, "proxy \"%s\" certificate issuer does not match", proxy->host); + return FAIL; + } + + /* simplified match, not compliant with RFC 4517, 4518 */ + if ('\0' != *proxy->tls_subject && 0 != strcmp(proxy->tls_subject, attr.subject)) + { + *error = zbx_dsprintf(*error, "proxy \"%s\" certificate subject does not match", proxy->host); + return FAIL; + } + } +#if defined(HAVE_GNUTLS) || (defined(HAVE_OPENSSL) && defined(HAVE_OPENSSL_WITH_PSK)) + else if (ZBX_TCP_SEC_TLS_PSK == sock->connection_type) + { + if (strlen(proxy->tls_psk_identity) != attr.psk_identity_len || + 0 != memcmp(proxy->tls_psk_identity, attr.psk_identity, attr.psk_identity_len)) + { + *error = zbx_dsprintf(*error, "proxy \"%s\" is using false PSK identity", proxy->host); + return FAIL; + } + } +#endif +#endif + return SUCCEED; +} + +/****************************************************************************** + * * + * Purpose: checks host connection permissions (encryption configuration) * + * * + * Parameters: * + * host - [IN] the host data * + * sock - [IN] connection socket context * + * error - [OUT] error message * + * * + * Return value: * + * SUCCEED - connection permission check was successful * + * FAIL - otherwise * + * * + ******************************************************************************/ +static int zbx_host_check_permissions(const DC_HOST *host, const zbx_socket_t *sock, char **error) +{ +#if defined(HAVE_GNUTLS) || defined(HAVE_OPENSSL) + zbx_tls_conn_attr_t attr; + + if (ZBX_TCP_SEC_TLS_CERT == sock->connection_type) + { + if (SUCCEED != zbx_tls_get_attr_cert(sock, &attr)) + { + *error = zbx_strdup(*error, "internal error: cannot get connection attributes"); + THIS_SHOULD_NEVER_HAPPEN; + return FAIL; + } + } +#if defined(HAVE_GNUTLS) || (defined(HAVE_OPENSSL) && defined(HAVE_OPENSSL_WITH_PSK)) + else if (ZBX_TCP_SEC_TLS_PSK == sock->connection_type) + { + if (SUCCEED != zbx_tls_get_attr_psk(sock, &attr)) + { + *error = zbx_strdup(*error, "internal error: cannot get connection attributes"); + THIS_SHOULD_NEVER_HAPPEN; + return FAIL; + } + } +#endif + else if (ZBX_TCP_SEC_UNENCRYPTED != sock->connection_type) + { + *error = zbx_strdup(*error, "internal error: invalid connection type"); + THIS_SHOULD_NEVER_HAPPEN; + return FAIL; + } +#endif + if (0 == ((unsigned int)host->tls_accept & sock->connection_type)) + { + *error = zbx_dsprintf(NULL, "connection of type \"%s\" is not allowed for host \"%s\"", + zbx_tcp_connection_type_name(sock->connection_type), host->host); + return FAIL; + } + +#if defined(HAVE_GNUTLS) || defined(HAVE_OPENSSL) + if (ZBX_TCP_SEC_TLS_CERT == sock->connection_type) + { + /* simplified match, not compliant with RFC 4517, 4518 */ + if ('\0' != *host->tls_issuer && 0 != strcmp(host->tls_issuer, attr.issuer)) + { + *error = zbx_dsprintf(*error, "host \"%s\" certificate issuer does not match", host->host); + return FAIL; + } + + /* simplified match, not compliant with RFC 4517, 4518 */ + if ('\0' != *host->tls_subject && 0 != strcmp(host->tls_subject, attr.subject)) + { + *error = zbx_dsprintf(*error, "host \"%s\" certificate subject does not match", host->host); + return FAIL; + } + } +#if defined(HAVE_GNUTLS) || (defined(HAVE_OPENSSL) && defined(HAVE_OPENSSL_WITH_PSK)) + else if (ZBX_TCP_SEC_TLS_PSK == sock->connection_type) + { + if (strlen(host->tls_psk_identity) != attr.psk_identity_len || + 0 != memcmp(host->tls_psk_identity, attr.psk_identity, attr.psk_identity_len)) + { + *error = zbx_dsprintf(*error, "host \"%s\" is using false PSK identity", host->host); + return FAIL; + } + } +#endif +#endif + return SUCCEED; +} + +/****************************************************************************** + * * + * Purpose: * + * Extract a proxy name from JSON and find the proxy ID in configuration * + * cache, and check access rights. The proxy must be configured in active * + * mode. * + * * + * Parameters: * + * jp - [IN] JSON with the proxy name * + * proxy - [OUT] the proxy data * + * error - [OUT] error message * + * * + * Return value: * + * SUCCEED - proxy ID was found in database * + * FAIL - an error occurred (e.g. an unknown proxy, the proxy is * + * configured in passive mode or access denied) * + * * + ******************************************************************************/ +int get_active_proxy_from_request(const struct zbx_json_parse *jp, DC_PROXY *proxy, char **error) +{ + char *ch_error, host[ZBX_HOSTNAME_BUF_LEN]; + + if (SUCCEED != zbx_json_value_by_name(jp, ZBX_PROTO_TAG_HOST, host, sizeof(host), NULL)) + { + *error = zbx_strdup(*error, "missing name of proxy"); + return FAIL; + } + + if (SUCCEED != zbx_check_hostname(host, &ch_error)) + { + *error = zbx_dsprintf(*error, "invalid proxy name \"%s\": %s", host, ch_error); + zbx_free(ch_error); + return FAIL; + } + + return zbx_dc_get_active_proxy_by_name(host, proxy, error); +} + +/****************************************************************************** + * * + * Purpose: * + * Check access rights to a passive proxy for the given connection and * + * send a response if denied. * + * * + * Parameters: * + * sock - [IN] connection socket context * + * send_response - [IN] to send or not to send a response to server. * + * Value: ZBX_SEND_RESPONSE or * + * ZBX_DO_NOT_SEND_RESPONSE * + * req - [IN] request, included into error message * + * zbx_config_tls - [IN] configured requirements to allow access * + * * + * Return value: * + * SUCCEED - access is allowed * + * FAIL - access is denied * + * * + ******************************************************************************/ +int check_access_passive_proxy(zbx_socket_t *sock, int send_response, const char *req, + const zbx_config_tls_t *zbx_config_tls) +{ + char *msg = NULL; + + if (FAIL == zbx_tcp_check_allowed_peers(sock, CONFIG_SERVER)) + { + zabbix_log(LOG_LEVEL_WARNING, "%s from server \"%s\" is not allowed: %s", req, sock->peer, + zbx_socket_strerror()); + + if (ZBX_SEND_RESPONSE == send_response) + zbx_send_proxy_response(sock, FAIL, "connection is not allowed", CONFIG_TIMEOUT); + + return FAIL; + } + + if (0 == (zbx_config_tls->accept_modes & sock->connection_type)) + { + msg = zbx_dsprintf(NULL, "%s over connection of type \"%s\" is not allowed", req, + zbx_tcp_connection_type_name(sock->connection_type)); + + zabbix_log(LOG_LEVEL_WARNING, "%s from server \"%s\" by proxy configuration parameter \"TLSAccept\"", + msg, sock->peer); + + if (ZBX_SEND_RESPONSE == send_response) + zbx_send_proxy_response(sock, FAIL, msg, CONFIG_TIMEOUT); + + zbx_free(msg); + return FAIL; + } + +#if defined(HAVE_GNUTLS) || defined(HAVE_OPENSSL) + if (ZBX_TCP_SEC_TLS_CERT == sock->connection_type) + { + if (SUCCEED == zbx_check_server_issuer_subject(sock, zbx_config_tls->server_cert_issuer, + zbx_config_tls->server_cert_subject, &msg)) + { + return SUCCEED; + } + + zabbix_log(LOG_LEVEL_WARNING, "%s from server \"%s\" is not allowed: %s", req, sock->peer, msg); + + if (ZBX_SEND_RESPONSE == send_response) + zbx_send_proxy_response(sock, FAIL, "certificate issuer or subject mismatch", CONFIG_TIMEOUT); + + zbx_free(msg); + return FAIL; + } + else if (ZBX_TCP_SEC_TLS_PSK == sock->connection_type) + { + if (0 != (ZBX_PSK_FOR_PROXY & zbx_tls_get_psk_usage())) + return SUCCEED; + + zabbix_log(LOG_LEVEL_WARNING, "%s from server \"%s\" is not allowed: it used PSK which is not" + " configured for proxy communication with server", req, sock->peer); + + if (ZBX_SEND_RESPONSE == send_response) + zbx_send_proxy_response(sock, FAIL, "wrong PSK used", CONFIG_TIMEOUT); + + return FAIL; + } +#endif + return SUCCEED; +} + +/****************************************************************************** + * * + * Return value: SUCCEED - processed successfully * + * FAIL - no interface availability has been changed * + * * + ******************************************************************************/ +int get_interface_availability_data(struct zbx_json *json, int *ts) +{ + int i, ret = FAIL; + zbx_vector_ptr_t interfaces; + zbx_interface_availability_t *ia; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__); + + zbx_vector_ptr_create(&interfaces); + + if (SUCCEED != DCget_interfaces_availability(&interfaces, ts)) + goto out; + + zbx_json_addarray(json, ZBX_PROTO_TAG_INTERFACE_AVAILABILITY); + + for (i = 0; i < interfaces.values_num; i++) + { + ia = (zbx_interface_availability_t *)interfaces.values[i]; + + zbx_json_addobject(json, NULL); + zbx_json_adduint64(json, ZBX_PROTO_TAG_INTERFACE_ID, ia->interfaceid); + + zbx_json_adduint64(json, ZBX_PROTO_TAG_AVAILABLE, ia->agent.available); + zbx_json_addstring(json, ZBX_PROTO_TAG_ERROR, ia->agent.error, ZBX_JSON_TYPE_STRING); + + zbx_json_close(json); + } + + zbx_json_close(json); + + ret = SUCCEED; +out: + zbx_vector_ptr_clear_ext(&interfaces, (zbx_mem_free_func_t)zbx_interface_availability_free); + zbx_vector_ptr_destroy(&interfaces); + + zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret)); + + return ret; +} + +/****************************************************************************** + * * + * Purpose: parses interfaces availability data contents and processes it * + * * + * Return value: SUCCEED - processed successfully * + * FAIL - an error occurred * + * * + ******************************************************************************/ +static int process_interfaces_availability_contents(struct zbx_json_parse *jp_data, char **error) +{ + zbx_uint64_t interfaceid; + struct zbx_json_parse jp_row; + const char *p = NULL; + char *tmp; + size_t tmp_alloc = 129; + zbx_interface_availability_t *ia = NULL; + zbx_vector_availability_ptr_t interfaces; + int ret; + + tmp = (char *)zbx_malloc(NULL, tmp_alloc); + + zbx_vector_availability_ptr_create(&interfaces); + + while (NULL != (p = zbx_json_next(jp_data, p))) /* iterate the interface entries */ + { + if (SUCCEED != (ret = zbx_json_brackets_open(p, &jp_row))) + { + *error = zbx_strdup(*error, zbx_json_strerror()); + goto out; + } + + if (SUCCEED != (ret = zbx_json_value_by_name_dyn(&jp_row, ZBX_PROTO_TAG_INTERFACE_ID, &tmp, &tmp_alloc, + NULL))) + { + *error = zbx_strdup(*error, zbx_json_strerror()); + goto out; + } + + if (SUCCEED != (ret = zbx_is_uint64(tmp, &interfaceid))) + { + *error = zbx_strdup(*error, "interfaceid is not a valid numeric"); + goto out; + } + + ia = (zbx_interface_availability_t *)zbx_malloc(NULL, sizeof(zbx_interface_availability_t)); + zbx_interface_availability_init(ia, interfaceid); + + if (SUCCEED == zbx_json_value_by_name_dyn(&jp_row, ZBX_PROTO_TAG_AVAILABLE, &tmp, &tmp_alloc, NULL)) + { + ia->agent.available = atoi(tmp); + ia->agent.flags |= ZBX_FLAGS_AGENT_STATUS_AVAILABLE; + } + + if (SUCCEED == zbx_json_value_by_name_dyn(&jp_row, ZBX_PROTO_TAG_ERROR, &tmp, &tmp_alloc, NULL)) + { + ia->agent.error = zbx_strdup(NULL, tmp); + ia->agent.flags |= ZBX_FLAGS_AGENT_STATUS_ERROR; + } + + if (SUCCEED != (ret = zbx_interface_availability_is_set(ia))) + { + zbx_free(ia); + *error = zbx_dsprintf(*error, "no availability data for \"interfaceid\":" ZBX_FS_UI64, + interfaceid); + goto out; + } + + zbx_vector_availability_ptr_append(&interfaces, ia); + } + + if (0 < interfaces.values_num && SUCCEED == DCset_interfaces_availability(&interfaces)) + zbx_availabilities_flush(&interfaces); + + ret = SUCCEED; +out: + zbx_vector_availability_ptr_clear_ext(&interfaces, zbx_interface_availability_free); + zbx_vector_availability_ptr_destroy(&interfaces); + + zbx_free(tmp); + + return ret; +} + +static void proxy_get_lastid(const char *table_name, const char *lastidfield, zbx_uint64_t *lastid) +{ + DB_RESULT result; + DB_ROW row; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s() field:'%s.%s'", __func__, table_name, lastidfield); + + result = DBselect("select nextid from ids where table_name='%s' and field_name='%s'", + table_name, lastidfield); + + if (NULL == (row = DBfetch(result))) + *lastid = 0; + else + ZBX_STR2UINT64(*lastid, row[0]); + DBfree_result(result); + + zabbix_log(LOG_LEVEL_DEBUG, "End of %s():" ZBX_FS_UI64, __func__, *lastid); +} + +static void proxy_set_lastid(const char *table_name, const char *lastidfield, const zbx_uint64_t lastid) +{ + DB_RESULT result; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s() [%s.%s:" ZBX_FS_UI64 "]", __func__, table_name, lastidfield, lastid); + + result = DBselect("select 1 from ids where table_name='%s' and field_name='%s'", + table_name, lastidfield); + + if (NULL == DBfetch(result)) + { + DBexecute("insert into ids (table_name,field_name,nextid) values ('%s','%s'," ZBX_FS_UI64 ")", + table_name, lastidfield, lastid); + } + else + { + DBexecute("update ids set nextid=" ZBX_FS_UI64 " where table_name='%s' and field_name='%s'", + lastid, table_name, lastidfield); + } + DBfree_result(result); + + zabbix_log(LOG_LEVEL_DEBUG, "End of %s()", __func__); +} + +void proxy_set_hist_lastid(const zbx_uint64_t lastid) +{ + proxy_set_lastid("proxy_history", "history_lastid", lastid); +} + +void proxy_set_dhis_lastid(const zbx_uint64_t lastid) +{ + proxy_set_lastid(dht.table, dht.lastidfield, lastid); +} + +void proxy_set_areg_lastid(const zbx_uint64_t lastid) +{ + proxy_set_lastid(areg.table, areg.lastidfield, lastid); +} + +int proxy_get_delay(const zbx_uint64_t lastid) +{ + DB_RESULT result; + DB_ROW row; + char *sql = NULL; + int ts = 0; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s() [lastid=" ZBX_FS_UI64 "]", __func__, lastid); + + sql = zbx_dsprintf(sql, "select write_clock from proxy_history where id>" ZBX_FS_UI64 " order by id asc", + lastid); + + result = DBselectN(sql, 1); + zbx_free(sql); + + if (NULL != (row = DBfetch(result))) + ts = (int)time(NULL) - atoi(row[0]); + + DBfree_result(result); + + zabbix_log(LOG_LEVEL_DEBUG, "End of %s()", __func__); + + return ts; +} + +/****************************************************************************** + * * + * Purpose: Get history data from the database. * + * * + ******************************************************************************/ +static void proxy_get_history_data_simple(struct zbx_json *j, const char *proto_tag, const zbx_history_table_t *ht, + zbx_uint64_t *lastid, zbx_uint64_t *id, int *records_num, int *more) +{ + size_t offset = 0; + int f, records_num_last = *records_num, retries = 1; + char sql[MAX_STRING_LEN]; + DB_RESULT result; + DB_ROW row; + struct timespec t_sleep = { 0, 100000000L }, t_rem; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s() table:'%s'", __func__, ht->table); + + *more = ZBX_PROXY_DATA_DONE; + + offset += zbx_snprintf(sql + offset, sizeof(sql) - offset, "select id"); + + for (f = 0; NULL != ht->fields[f].field; f++) + offset += zbx_snprintf(sql + offset, sizeof(sql) - offset, ",%s", ht->fields[f].field); +try_again: + zbx_snprintf(sql + offset, sizeof(sql) - offset, " from %s where id>" ZBX_FS_UI64 " order by id", + ht->table, *id); + + result = DBselectN(sql, ZBX_MAX_HRECORDS); + + while (NULL != (row = DBfetch(result))) + { + ZBX_STR2UINT64(*lastid, row[0]); + + if (1 < *lastid - *id) + { + /* At least one record is missing. It can happen if some DB syncer process has */ + /* started but not yet committed a transaction or a rollback occurred in a DB syncer. */ + if (0 < retries--) + { + DBfree_result(result); + zabbix_log(LOG_LEVEL_DEBUG, "%s() " ZBX_FS_UI64 " record(s) missing." + " Waiting " ZBX_FS_DBL " sec, retrying.", + __func__, *lastid - *id - 1, + t_sleep.tv_sec + t_sleep.tv_nsec / 1e9); + nanosleep(&t_sleep, &t_rem); + goto try_again; + } + else + { + zabbix_log(LOG_LEVEL_DEBUG, "%s() " ZBX_FS_UI64 " record(s) missing. No more retries.", + __func__, *lastid - *id - 1); + } + } + + if (0 == *records_num) + zbx_json_addarray(j, proto_tag); + + zbx_json_addobject(j, NULL); + + for (f = 0; NULL != ht->fields[f].field; f++) + { + if (NULL != ht->fields[f].default_value && 0 == strcmp(row[f + 1], ht->fields[f].default_value)) + continue; + + zbx_json_addstring(j, ht->fields[f].tag, row[f + 1], ht->fields[f].jt); + } + + (*records_num)++; + + zbx_json_close(j); + + /* stop gathering data to avoid exceeding the maximum packet size */ + if (ZBX_DATA_JSON_RECORD_LIMIT < j->buffer_offset) + { + *more = ZBX_PROXY_DATA_MORE; + break; + } + + *id = *lastid; + } + DBfree_result(result); + + if (ZBX_MAX_HRECORDS == *records_num - records_num_last) + *more = ZBX_PROXY_DATA_MORE; + + zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%d lastid:" ZBX_FS_UI64 " more:%d size:" ZBX_FS_SIZE_T, + __func__, *records_num - records_num_last, *lastid, *more, + (zbx_fs_size_t)j->buffer_offset); +} + +typedef struct +{ + zbx_uint64_t id; + zbx_uint64_t itemid; + zbx_uint64_t lastlogsize; + size_t source_offset; + size_t value_offset; + int clock; + int ns; + int timestamp; + int severity; + int logeventid; + int mtime; + unsigned char state; + unsigned char flags; +} +zbx_history_data_t; + +/****************************************************************************** + * * + * Purpose: read proxy history data from the database * + * * + * Parameters: lastid - [IN] the id of last processed proxy * + * history record * + * data - [IN/OUT] the proxy history data buffer * + * data_alloc - [IN/OUT] the size of proxy history data * + * buffer * + * string_buffer - [IN/OUT] the string buffer * + * string_buffer_size - [IN/OUT] the size of string buffer * + * more - [OUT] set to ZBX_PROXY_DATA_MORE if there * + * might be more data to read * + * * + * Return value: The number of records read. * + * * + ******************************************************************************/ +static int proxy_get_history_data(zbx_uint64_t lastid, zbx_history_data_t **data, size_t *data_alloc, + char **string_buffer, size_t *string_buffer_alloc, int *more) +{ + DB_RESULT result; + DB_ROW row; + char *sql = NULL; + size_t sql_alloc = 0, sql_offset = 0, data_num = 0; + size_t string_buffer_offset = 0; + zbx_uint64_t id; + int retries = 1, total_retries = 10; + struct timespec t_sleep = { 0, 100000000L }, t_rem; + zbx_history_data_t *hd; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s() lastid:" ZBX_FS_UI64, __func__, lastid); + +try_again: + zbx_snprintf_alloc(&sql, &sql_alloc, &sql_offset, + "select id,itemid,clock,ns,timestamp,source,severity," + "value,logeventid,state,lastlogsize,mtime,flags" + " from proxy_history" + " where id>" ZBX_FS_UI64 + " order by id", + lastid); + + result = DBselectN(sql, ZBX_MAX_HRECORDS - data_num); + + zbx_free(sql); + + while (NULL != (row = DBfetch(result))) + { + ZBX_STR2UINT64(id, row[0]); + + if (1 < id - lastid) + { + /* At least one record is missing. It can happen if some DB syncer process has */ + /* started but not yet committed a transaction or a rollback occurred in a DB syncer. */ + if (0 < retries--) + { + /* limit the number of total retries to avoid being stuck */ + /* in history full of 'holes' for a long time */ + if (0 >= total_retries--) + break; + + DBfree_result(result); + zabbix_log(LOG_LEVEL_DEBUG, "%s() " ZBX_FS_UI64 " record(s) missing." + " Waiting " ZBX_FS_DBL " sec, retrying.", + __func__, id - lastid - 1, + t_sleep.tv_sec + t_sleep.tv_nsec / 1e9); + nanosleep(&t_sleep, &t_rem); + goto try_again; + } + else + { + zabbix_log(LOG_LEVEL_DEBUG, "%s() " ZBX_FS_UI64 " record(s) missing. No more retries.", + __func__, id - lastid - 1); + } + } + + retries = 1; + + if (*data_alloc == data_num) + { + *data_alloc *= 2; + *data = (zbx_history_data_t *)zbx_realloc(*data, sizeof(zbx_history_data_t) * *data_alloc); + } + + hd = *data + data_num++; + hd->id = id; + ZBX_STR2UINT64(hd->itemid, row[1]); + ZBX_STR2UCHAR(hd->flags, row[12]); + hd->clock = atoi(row[2]); + hd->ns = atoi(row[3]); + + if (PROXY_HISTORY_FLAG_NOVALUE != (hd->flags & PROXY_HISTORY_MASK_NOVALUE)) + { + ZBX_STR2UCHAR(hd->state, row[9]); + + if (0 == (hd->flags & PROXY_HISTORY_FLAG_NOVALUE)) + { + size_t len1, len2; + + hd->timestamp = atoi(row[4]); + hd->severity = atoi(row[6]); + hd->logeventid = atoi(row[8]); + + len1 = strlen(row[5]) + 1; + len2 = strlen(row[7]) + 1; + + if (*string_buffer_alloc < string_buffer_offset + len1 + len2) + { + while (*string_buffer_alloc < string_buffer_offset + len1 + len2) + *string_buffer_alloc += ZBX_KIBIBYTE; + + *string_buffer = (char *)zbx_realloc(*string_buffer, *string_buffer_alloc); + } + + hd->source_offset = string_buffer_offset; + memcpy(*string_buffer + hd->source_offset, row[5], len1); + string_buffer_offset += len1; + + hd->value_offset = string_buffer_offset; + memcpy(*string_buffer + hd->value_offset, row[7], len2); + string_buffer_offset += len2; + } + + if (0 != (hd->flags & PROXY_HISTORY_FLAG_META)) + { + ZBX_STR2UINT64(hd->lastlogsize, row[10]); + hd->mtime = atoi(row[11]); + } + } + + lastid = id; + } + DBfree_result(result); + + if (ZBX_MAX_HRECORDS != data_num && 1 == retries) + *more = ZBX_PROXY_DATA_DONE; + + zabbix_log(LOG_LEVEL_DEBUG, "End of %s() data_num:" ZBX_FS_SIZE_T, __func__, data_num); + + return data_num; +} + +/****************************************************************************** + * * + * Purpose: add history records to output json * + * * + * Parameters: j - [IN] the json output buffer * + * records_num - [IN] the total number of records added * + * dc_items - [IN] the item configuration data * + * errcodes - [IN] the item configuration status codes * + * records - [IN] the records to add * + * string_buffer - [IN] the string buffer holding string values * + * lastid - [OUT] the id of last added record * + * * + * Return value: The total number of records added. * + * * + ******************************************************************************/ +static int proxy_add_hist_data(struct zbx_json *j, int records_num, const DC_ITEM *dc_items, const int *errcodes, + const zbx_vector_ptr_t *records, const char *string_buffer, zbx_uint64_t *lastid) +{ + int i; + const zbx_history_data_t *hd; + + for (i = records->values_num - 1; i >= 0; i--) + { + hd = (const zbx_history_data_t *)records->values[i]; + *lastid = hd->id; + + if (SUCCEED != errcodes[i]) + continue; + + if (ITEM_STATUS_ACTIVE != dc_items[i].status) + continue; + + if (HOST_STATUS_MONITORED != dc_items[i].host.status) + continue; + + if (PROXY_HISTORY_FLAG_NOVALUE == (hd->flags & PROXY_HISTORY_MASK_NOVALUE)) + { + if (SUCCEED != zbx_is_counted_in_item_queue(dc_items[i].type, dc_items[i].key_orig)) + continue; + } + + if (0 == records_num) + zbx_json_addarray(j, ZBX_PROTO_TAG_HISTORY_DATA); + + zbx_json_addobject(j, NULL); + zbx_json_adduint64(j, ZBX_PROTO_TAG_ID, hd->id); + zbx_json_adduint64(j, ZBX_PROTO_TAG_ITEMID, hd->itemid); + zbx_json_adduint64(j, ZBX_PROTO_TAG_CLOCK, hd->clock); + zbx_json_adduint64(j, ZBX_PROTO_TAG_NS, hd->ns); + + if (PROXY_HISTORY_FLAG_NOVALUE != (hd->flags & PROXY_HISTORY_MASK_NOVALUE)) + { + if (ITEM_STATE_NORMAL != hd->state) + zbx_json_adduint64(j, ZBX_PROTO_TAG_STATE, hd->state); + + if (0 == (hd->flags & PROXY_HISTORY_FLAG_NOVALUE)) + { + if (0 != hd->timestamp) + zbx_json_adduint64(j, ZBX_PROTO_TAG_LOGTIMESTAMP, hd->timestamp); + + if ('\0' != string_buffer[hd->source_offset]) + { + zbx_json_addstring(j, ZBX_PROTO_TAG_LOGSOURCE, + string_buffer + hd->source_offset, ZBX_JSON_TYPE_STRING); + } + + if (0 != hd->severity) + zbx_json_adduint64(j, ZBX_PROTO_TAG_LOGSEVERITY, hd->severity); + + if (0 != hd->logeventid) + zbx_json_adduint64(j, ZBX_PROTO_TAG_LOGEVENTID, hd->logeventid); + + zbx_json_addstring(j, ZBX_PROTO_TAG_VALUE, string_buffer + hd->value_offset, + ZBX_JSON_TYPE_STRING); + } + + if (0 != (hd->flags & PROXY_HISTORY_FLAG_META)) + { + zbx_json_adduint64(j, ZBX_PROTO_TAG_LASTLOGSIZE, hd->lastlogsize); + zbx_json_adduint64(j, ZBX_PROTO_TAG_MTIME, hd->mtime); + } + } + + zbx_json_close(j); + records_num++; + + /* stop gathering data to avoid exceeding the maximum packet size */ + if (ZBX_DATA_JSON_RECORD_LIMIT < j->buffer_offset) + break; + } + + return records_num; +} + +int proxy_get_hist_data(struct zbx_json *j, zbx_uint64_t *lastid, int *more) +{ + int records_num = 0, data_num, i, *errcodes = NULL, items_alloc = 0; + zbx_uint64_t id; + zbx_hashset_t itemids_added; + zbx_history_data_t *data; + char *string_buffer; + size_t data_alloc = 16, string_buffer_alloc = ZBX_KIBIBYTE; + zbx_vector_uint64_t itemids; + zbx_vector_ptr_t records; + DC_ITEM *dc_items = 0; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__); + + zbx_vector_uint64_create(&itemids); + zbx_vector_ptr_create(&records); + data = (zbx_history_data_t *)zbx_malloc(NULL, data_alloc * sizeof(zbx_history_data_t)); + string_buffer = (char *)zbx_malloc(NULL, string_buffer_alloc); + + *more = ZBX_PROXY_DATA_MORE; + proxy_get_lastid("proxy_history", "history_lastid", &id); + + zbx_hashset_create(&itemids_added, data_alloc, ZBX_DEFAULT_UINT64_HASH_FUNC, ZBX_DEFAULT_UINT64_COMPARE_FUNC); + + /* get history data in batches by ZBX_MAX_HRECORDS records and stop if: */ + /* 1) there are no more data to read */ + /* 2) we have retrieved more than the total maximum number of records */ + /* 3) we have gathered more than half of the maximum packet size */ + while (ZBX_DATA_JSON_BATCH_LIMIT > j->buffer_offset && ZBX_MAX_HRECORDS_TOTAL > records_num && + 0 != (data_num = proxy_get_history_data(id, &data, &data_alloc, &string_buffer, + &string_buffer_alloc, more))) + { + zbx_vector_uint64_reserve(&itemids, data_num); + zbx_vector_ptr_reserve(&records, data_num); + + /* filter out duplicate novalue updates */ + for (i = data_num - 1; i >= 0; i--) + { + if (PROXY_HISTORY_FLAG_NOVALUE == (data[i].flags & PROXY_HISTORY_MASK_NOVALUE)) + { + if (NULL != zbx_hashset_search(&itemids_added, &data[i].itemid)) + continue; + + zbx_hashset_insert(&itemids_added, &data[i].itemid, sizeof(data[i].itemid)); + } + + zbx_vector_ptr_append(&records, &data[i]); + zbx_vector_uint64_append(&itemids, data[i].itemid); + } + + /* append history records to json */ + + if (itemids.values_num > items_alloc) + { + items_alloc = itemids.values_num; + dc_items = (DC_ITEM *)zbx_realloc(dc_items, items_alloc * sizeof(DC_ITEM)); + errcodes = (int *)zbx_realloc(errcodes, items_alloc * sizeof(int)); + } + + DCconfig_get_items_by_itemids(dc_items, itemids.values, errcodes, itemids.values_num); + + records_num = proxy_add_hist_data(j, records_num, dc_items, errcodes, &records, string_buffer, lastid); + DCconfig_clean_items(dc_items, errcodes, itemids.values_num); + + /* got less data than requested - either no more data to read or the history is full of */ + /* holes. In this case send retrieved data before attempting to read/wait for more data */ + if (ZBX_MAX_HRECORDS > data_num) + break; + + zbx_vector_uint64_clear(&itemids); + zbx_vector_ptr_clear(&records); + zbx_hashset_clear(&itemids_added); + id = *lastid; + } + + if (0 != records_num) + zbx_json_close(j); + + zbx_hashset_destroy(&itemids_added); + + zbx_free(dc_items); + zbx_free(errcodes); + zbx_free(data); + zbx_free(string_buffer); + zbx_vector_ptr_destroy(&records); + zbx_vector_uint64_destroy(&itemids); + + zabbix_log(LOG_LEVEL_DEBUG, "End of %s() lastid:" ZBX_FS_UI64 " records_num:%d size:~" ZBX_FS_SIZE_T " more:%d", + __func__, *lastid, records_num, j->buffer_offset, *more); + + return records_num; +} + +int proxy_get_dhis_data(struct zbx_json *j, zbx_uint64_t *lastid, int *more) +{ + int records_num = 0; + zbx_uint64_t id; + + proxy_get_lastid(dht.table, dht.lastidfield, &id); + + /* get history data in batches by ZBX_MAX_HRECORDS records and stop if: */ + /* 1) there are no more data to read */ + /* 2) we have retrieved more than the total maximum number of records */ + /* 3) we have gathered more than half of the maximum packet size */ + while (ZBX_DATA_JSON_BATCH_LIMIT > j->buffer_offset) + { + proxy_get_history_data_simple(j, ZBX_PROTO_TAG_DISCOVERY_DATA, &dht, lastid, &id, &records_num, more); + + if (ZBX_PROXY_DATA_DONE == *more || ZBX_MAX_HRECORDS_TOTAL <= records_num) + break; + } + + if (0 != records_num) + zbx_json_close(j); + + return records_num; +} + +int proxy_get_areg_data(struct zbx_json *j, zbx_uint64_t *lastid, int *more) +{ + int records_num = 0; + zbx_uint64_t id; + + proxy_get_lastid(areg.table, areg.lastidfield, &id); + + /* get history data in batches by ZBX_MAX_HRECORDS records and stop if: */ + /* 1) there are no more data to read */ + /* 2) we have retrieved more than the total maximum number of records */ + /* 3) we have gathered more than half of the maximum packet size */ + while (ZBX_DATA_JSON_BATCH_LIMIT > j->buffer_offset) + { + proxy_get_history_data_simple(j, ZBX_PROTO_TAG_AUTOREGISTRATION, &areg, lastid, &id, &records_num, + more); + + if (ZBX_PROXY_DATA_DONE == *more || ZBX_MAX_HRECORDS_TOTAL <= records_num) + break; + } + + if (0 != records_num) + zbx_json_close(j); + + return records_num; +} + +int proxy_get_host_active_availability(struct zbx_json *j) +{ + zbx_ipc_message_t response; + int records_num = 0; + + zbx_ipc_message_init(&response); + zbx_availability_send(ZBX_IPC_AVAILMAN_ACTIVE_HOSTDATA, 0, 0, &response); + + if (0 != response.size) + { + zbx_vector_proxy_hostdata_ptr_t hostdata; + + zbx_vector_proxy_hostdata_ptr_create(&hostdata); + zbx_availability_deserialize_hostdata(response.data, &hostdata); + zbx_availability_serialize_json_hostdata(&hostdata, j); + + records_num = hostdata.values_num; + + zbx_vector_proxy_hostdata_ptr_clear_ext(&hostdata, (zbx_proxy_hostdata_ptr_free_func_t)zbx_ptr_free); + zbx_vector_proxy_hostdata_ptr_destroy(&hostdata); + } + + zbx_ipc_message_clean(&response); + + return records_num; +} + +/****************************************************************************** + * * + * Purpose: processes item value depending on proxy/flags settings * + * * + * Parameters: item - [IN] the item to process * + * result - [IN] the item result * + * * + * Comments: Values gathered by server are sent to the preprocessing manager, * + * while values received from proxy are already preprocessed and * + * must be either directly stored to history cache or sent to lld * + * manager. * + * * + ******************************************************************************/ +static void process_item_value(const DC_ITEM *item, AGENT_RESULT *result, zbx_timespec_t *ts, int *h_num, + char *error) +{ + if (0 == item->host.proxy_hostid) + { + zbx_preprocess_item_value(item->itemid, item->host.hostid, item->value_type, item->flags, result, ts, + item->state, error); + *h_num = 0; + } + else + { + if (0 != (ZBX_FLAG_DISCOVERY_RULE & item->flags)) + { + zbx_lld_process_agent_result(item->itemid, item->host.hostid, result, ts, error); + *h_num = 0; + } + else + { + dc_add_history(item->itemid, item->value_type, item->flags, result, ts, item->state, error); + *h_num = 1; + } + } +} + +/****************************************************************************** + * * + * Purpose: process single value from incoming history data * + * * + * Parameters: item - [IN] the item to process * + * value - [IN] the value to process * + * hval - [OUT] indication that value was added to history * + * * + * Return value: SUCCEED - the value was processed successfully * + * FAIL - otherwise * + * * + ******************************************************************************/ +static int process_history_data_value(DC_ITEM *item, zbx_agent_value_t *value, int *h_num) +{ + if (ITEM_STATUS_ACTIVE != item->status) + return FAIL; + + if (HOST_STATUS_MONITORED != item->host.status) + return FAIL; + + /* update item nextcheck during maintenance */ + if (SUCCEED == in_maintenance_without_data_collection(item->host.maintenance_status, + item->host.maintenance_type, item->type) && + item->host.maintenance_from <= value->ts.sec) + { + return SUCCEED; + } + + if (NULL == value->value && ITEM_STATE_NOTSUPPORTED == value->state) + { + THIS_SHOULD_NEVER_HAPPEN; + return FAIL; + } + + if (ITEM_STATE_NOTSUPPORTED == value->state || + (NULL != value->value && 0 == strcmp(value->value, ZBX_NOTSUPPORTED))) + { + zabbix_log(LOG_LEVEL_DEBUG, "item [%s:%s] error: %s", item->host.host, item->key_orig, value->value); + + item->state = ITEM_STATE_NOTSUPPORTED; + process_item_value(item, NULL, &value->ts, h_num, value->value); + } + else + { + AGENT_RESULT result; + + zbx_init_agent_result(&result); + + if (NULL != value->value) + { + if (ITEM_VALUE_TYPE_LOG == item->value_type) + { + zbx_log_t *log; + + log = (zbx_log_t *)zbx_malloc(NULL, sizeof(zbx_log_t)); + log->value = zbx_strdup(NULL, value->value); + zbx_replace_invalid_utf8(log->value); + + if (0 == value->timestamp) + { + log->timestamp = 0; + calc_timestamp(log->value, &log->timestamp, item->logtimefmt); + } + else + log->timestamp = value->timestamp; + + log->logeventid = value->logeventid; + log->severity = value->severity; + + if (NULL != value->source) + { + log->source = zbx_strdup(NULL, value->source); + zbx_replace_invalid_utf8(log->source); + } + else + log->source = NULL; + + SET_LOG_RESULT(&result, log); + } + else + zbx_set_agent_result_type(&result, ITEM_VALUE_TYPE_TEXT, value->value); + } + + if (0 != value->meta) + zbx_set_agent_result_meta(&result, value->lastlogsize, value->mtime); + + if (0 != ZBX_ISSET_VALUE(&result) || 0 != ZBX_ISSET_META(&result)) + { + item->state = ITEM_STATE_NORMAL; + process_item_value(item, &result, &value->ts, h_num, NULL); + } + + zbx_free_agent_result(&result); + } + + return SUCCEED; +} + +/****************************************************************************** + * * + * Purpose: process new item values * + * * + * Parameters: items - [IN] the items to process * + * values - [IN] the item values value to process * + * errcodes - [IN/OUT] in - item configuration error code * + * (FAIL - item/host was not found) * + * out - value processing result * + * (SUCCEED - processed, FAIL - error) * + * values_num - [IN] the number of items/values to process * + * nodata_win - [IN/OUT] proxy communication delay info * + * * + * Return value: the number of processed values * + * * + ******************************************************************************/ +int process_history_data(DC_ITEM *items, zbx_agent_value_t *values, int *errcodes, size_t values_num, + zbx_proxy_suppress_t *nodata_win) +{ + size_t i; + int processed_num = 0, history_num; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__); + + for (i = 0; i < values_num; i++) + { + if (SUCCEED != errcodes[i]) + continue; + + history_num = 0; + + if (SUCCEED != process_history_data_value(&items[i], &values[i], &history_num)) + { + /* clean failed items to avoid updating their runtime data */ + DCconfig_clean_items(&items[i], &errcodes[i], 1); + errcodes[i] = FAIL; + continue; + } + + if (0 != items[i].host.proxy_hostid && NULL != nodata_win && + 0 != (nodata_win->flags & ZBX_PROXY_SUPPRESS_ACTIVE) && 0 < history_num) + { + if (values[i].ts.sec <= nodata_win->period_end) + { + nodata_win->values_num++; + } + else + { + nodata_win->flags &= (~ZBX_PROXY_SUPPRESS_MORE); + } + + zabbix_log(LOG_LEVEL_TRACE, "%s() flags:%d values_num:%d value_time:%d period_end:%d", + __func__, nodata_win->flags, nodata_win->values_num, values[i].ts.sec, + nodata_win->period_end); + } + + processed_num++; + } + + if (0 < processed_num) + zbx_dc_items_update_nextcheck(items, values, errcodes, values_num); + + zbx_preprocessor_flush(); + dc_flush_history(); + + zabbix_log(LOG_LEVEL_DEBUG, "End of %s() processed:%d", __func__, processed_num); + + return processed_num; +} + +/****************************************************************************** + * * + * Purpose: frees resources allocated to store agent values * + * * + * Parameters: values - [IN] the values to clean * + * values_num - [IN] the number of items in values array * + * * + ******************************************************************************/ +static void zbx_agent_values_clean(zbx_agent_value_t *values, size_t values_num) +{ + size_t i; + + for (i = 0; i < values_num; i++) + { + zbx_free(values[i].value); + zbx_free(values[i].source); + } +} + +/****************************************************************************** + * * + * Purpose: calculates difference between server and client (proxy, active * + * agent or sender) time and log it * + * * + * Parameters: level - [IN] log level * + * jp - [IN] JSON with clock, [ns] fields * + * ts_recv - [IN] the connection timestamp * + * * + ******************************************************************************/ +static void log_client_timediff(int level, struct zbx_json_parse *jp, const zbx_timespec_t *ts_recv) +{ + char tmp[32]; + zbx_timespec_t client_timediff; + int sec, ns; + + if (SUCCEED != ZBX_CHECK_LOG_LEVEL(level)) + return; + + if (SUCCEED == zbx_json_value_by_name(jp, ZBX_PROTO_TAG_CLOCK, tmp, sizeof(tmp), NULL)) + { + sec = atoi(tmp); + client_timediff.sec = ts_recv->sec - sec; + + if (SUCCEED == zbx_json_value_by_name(jp, ZBX_PROTO_TAG_NS, tmp, sizeof(tmp), NULL)) + { + ns = atoi(tmp); + client_timediff.ns = ts_recv->ns - ns; + + if (client_timediff.sec > 0 && client_timediff.ns < 0) + { + client_timediff.sec--; + client_timediff.ns += 1000000000; + } + else if (client_timediff.sec < 0 && client_timediff.ns > 0) + { + client_timediff.sec++; + client_timediff.ns -= 1000000000; + } + + zabbix_log(level, "%s(): timestamp from json %d seconds and %d nanosecond, " + "delta time from json %d seconds and %d nanosecond", + __func__, sec, ns, client_timediff.sec, client_timediff.ns); + } + else + { + zabbix_log(level, "%s(): timestamp from json %d seconds, " + "delta time from json %d seconds", __func__, sec, client_timediff.sec); + } + } +} + +/****************************************************************************** + * * + * Purpose: parses agent value from history data json row * + * * + * Parameters: jp_row - [IN] JSON with history data row * + * unique_shift - [IN/OUT] auto increment nanoseconds to ensure * + * unique value of timestamps * + * av - [OUT] the agent value * + * * + * Return value: SUCCEED - the value was parsed successfully * + * FAIL - otherwise * + * * + ******************************************************************************/ +static int parse_history_data_row_value(const struct zbx_json_parse *jp_row, zbx_timespec_t *unique_shift, + zbx_agent_value_t *av) +{ + char *tmp = NULL; + size_t tmp_alloc = 0; + int ret = FAIL; + + memset(av, 0, sizeof(zbx_agent_value_t)); + + if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_CLOCK, &tmp, &tmp_alloc, NULL)) + { + if (FAIL == zbx_is_uint31(tmp, &av->ts.sec)) + goto out; + + if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_NS, &tmp, &tmp_alloc, NULL)) + { + if (FAIL == zbx_is_uint_n_range(tmp, tmp_alloc, &av->ts.ns, sizeof(av->ts.ns), + 0LL, 999999999LL)) + { + goto out; + } + } + else + { + /* ensure unique value timestamp (clock, ns) if only clock is available */ + + av->ts.sec += unique_shift->sec; + av->ts.ns = unique_shift->ns++; + + if (unique_shift->ns > 999999999) + { + unique_shift->sec++; + unique_shift->ns = 0; + } + } + } + else + zbx_timespec(&av->ts); + + if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_STATE, &tmp, &tmp_alloc, NULL)) + av->state = (unsigned char)atoi(tmp); + + /* Unsupported item meta information must be ignored for backwards compatibility. */ + /* New agents will not send meta information for items in unsupported state. */ + if (ITEM_STATE_NOTSUPPORTED != av->state) + { + if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_LASTLOGSIZE, &tmp, &tmp_alloc, NULL)) + { + av->meta = 1; /* contains meta information */ + + zbx_is_uint64(tmp, &av->lastlogsize); + + if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_MTIME, &tmp, &tmp_alloc, NULL)) + av->mtime = atoi(tmp); + } + } + + if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_VALUE, &tmp, &tmp_alloc, NULL)) + av->value = zbx_strdup(av->value, tmp); + + if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_LOGTIMESTAMP, &tmp, &tmp_alloc, NULL)) + av->timestamp = atoi(tmp); + + if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_LOGSOURCE, &tmp, &tmp_alloc, NULL)) + av->source = zbx_strdup(av->source, tmp); + + if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_LOGSEVERITY, &tmp, &tmp_alloc, NULL)) + av->severity = atoi(tmp); + + if (SUCCEED == zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_LOGEVENTID, &tmp, &tmp_alloc, NULL)) + av->logeventid = atoi(tmp); + + if (SUCCEED != zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_ID, &tmp, &tmp_alloc, NULL) || + SUCCEED != zbx_is_uint64(tmp, &av->id)) + { + av->id = 0; + } + + zbx_free(tmp); + + ret = SUCCEED; +out: + return ret; +} + +/****************************************************************************** + * * + * Purpose: parses item identifier from history data json row * + * * + * Parameters: jp_row - [IN] JSON with history data row * + * itemid - [OUT] the item identifier * + * * + * Return value: SUCCEED - the item identifier was parsed successfully * + * FAIL - otherwise * + * * + ******************************************************************************/ +static int parse_history_data_row_itemid(const struct zbx_json_parse *jp_row, zbx_uint64_t *itemid) +{ + char buffer[MAX_ID_LEN + 1]; + + if (SUCCEED != zbx_json_value_by_name(jp_row, ZBX_PROTO_TAG_ITEMID, buffer, sizeof(buffer), NULL)) + return FAIL; + + if (SUCCEED != zbx_is_uint64(buffer, itemid)) + return FAIL; + + return SUCCEED; +} +/****************************************************************************** + * * + * Purpose: parses host,key pair from history data json row * + * * + * Parameters: jp_row - [IN] JSON with history data row * + * hk - [OUT] the host,key pair * + * * + * Return value: SUCCEED - the host,key pair was parsed successfully * + * FAIL - otherwise * + * * + ******************************************************************************/ +static int parse_history_data_row_hostkey(const struct zbx_json_parse *jp_row, zbx_host_key_t *hk) +{ + size_t str_alloc; + + str_alloc = 0; + zbx_free(hk->host); + + if (SUCCEED != zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_HOST, &hk->host, &str_alloc, NULL)) + return FAIL; + + str_alloc = 0; + zbx_free(hk->key); + + if (SUCCEED != zbx_json_value_by_name_dyn(jp_row, ZBX_PROTO_TAG_KEY, &hk->key, &str_alloc, NULL)) + { + zbx_free(hk->host); + return FAIL; + } + + return SUCCEED; +} + +/****************************************************************************** + * * + * Purpose: parses up to ZBX_HISTORY_VALUES_MAX item values and host,key * + * pairs from history data json * + * * + * Parameters: jp_data - [IN] JSON with history data array * + * pnext - [IN/OUT] the pointer to the next item in json, * + * NULL - no more data left * + * values - [OUT] the item values * + * hostkeys - [OUT] the corresponding host,key pairs * + * values_num - [OUT] number of elements in values and hostkeys * + * arrays * + * parsed_num - [OUT] the number of values parsed * + * unique_shift - [IN/OUT] auto increment nanoseconds to ensure * + * unique value of timestamps * + * * + * Return value: SUCCEED - values were parsed successfully * + * FAIL - an error occurred * + * * + ******************************************************************************/ +static int parse_history_data(struct zbx_json_parse *jp_data, const char **pnext, zbx_agent_value_t *values, + zbx_host_key_t *hostkeys, int *values_num, int *parsed_num, zbx_timespec_t *unique_shift) +{ + struct zbx_json_parse jp_row; + int ret = FAIL; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__); + + *values_num = 0; + *parsed_num = 0; + + if (NULL == *pnext) + { + if (NULL == (*pnext = zbx_json_next(jp_data, *pnext)) && *values_num < ZBX_HISTORY_VALUES_MAX) + { + ret = SUCCEED; + goto out; + } + } + + /* iterate the history data rows */ + do + { + if (FAIL == zbx_json_brackets_open(*pnext, &jp_row)) + { + zabbix_log(LOG_LEVEL_WARNING, "%s", zbx_json_strerror()); + goto out; + } + + (*parsed_num)++; + + if (SUCCEED != parse_history_data_row_hostkey(&jp_row, &hostkeys[*values_num])) + continue; + + if (SUCCEED != parse_history_data_row_value(&jp_row, unique_shift, &values[*values_num])) + continue; + + (*values_num)++; + } + while (NULL != (*pnext = zbx_json_next(jp_data, *pnext)) && *values_num < ZBX_HISTORY_VALUES_MAX); + + ret = SUCCEED; +out: + zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s processed:%d/%d", __func__, zbx_result_string(ret), + *values_num, *parsed_num); + + return ret; +} + +/****************************************************************************** + * * + * Purpose: parses up to ZBX_HISTORY_VALUES_MAX item values and item * + * identifiers from history data json * + * * + * Parameters: jp_data - [IN] JSON with history data array * + * pnext - [IN/OUT] the pointer to the next item in * + * json, NULL - no more data left * + * values - [OUT] the item values * + * itemids - [OUT] the corresponding item identifiers * + * values_num - [OUT] number of elements in values and itemids * + * arrays * + * parsed_num - [OUT] the number of values parsed * + * unique_shift - [IN/OUT] auto increment nanoseconds to ensure * + * unique value of timestamps * + * info - [OUT] address of a pointer to the info string * + * (should be freed by the caller) * + * * + * Return value: SUCCEED - values were parsed successfully * + * FAIL - an error occurred * + * * + * Comments: This function is used to parse the new proxy history data * + * protocol introduced in Zabbix v3.3. * + * * + ******************************************************************************/ +static int parse_history_data_by_itemids(struct zbx_json_parse *jp_data, const char **pnext, + zbx_agent_value_t *values, zbx_uint64_t *itemids, int *values_num, int *parsed_num, + zbx_timespec_t *unique_shift, char **error) +{ + struct zbx_json_parse jp_row; + int ret = FAIL; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__); + + *values_num = 0; + *parsed_num = 0; + + if (NULL == *pnext) + { + if (NULL == (*pnext = zbx_json_next(jp_data, *pnext)) && *values_num < ZBX_HISTORY_VALUES_MAX) + { + ret = SUCCEED; + goto out; + } + } + + /* iterate the history data rows */ + do + { + if (FAIL == zbx_json_brackets_open(*pnext, &jp_row)) + { + *error = zbx_strdup(*error, zbx_json_strerror()); + goto out; + } + + (*parsed_num)++; + + if (SUCCEED != parse_history_data_row_itemid(&jp_row, &itemids[*values_num])) + continue; + + if (SUCCEED != parse_history_data_row_value(&jp_row, unique_shift, &values[*values_num])) + continue; + + (*values_num)++; + } + while (NULL != (*pnext = zbx_json_next(jp_data, *pnext)) && *values_num < ZBX_HISTORY_VALUES_MAX); + + ret = SUCCEED; +out: + zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s processed:%d/%d", __func__, zbx_result_string(ret), + *values_num, *parsed_num); + + return ret; +} + +/****************************************************************************** + * * + * Purpose: validates item received from proxy * + * * + * Parameters: item - [IN/OUT] the item data * + * sock - [IN] the connection socket * + * args - [IN] the validator arguments * + * error - unused * + * * + * Return value: SUCCEED - the validation was successful * + * FAIL - otherwise * + * * + ******************************************************************************/ +static int proxy_item_validator(DC_ITEM *item, zbx_socket_t *sock, void *args, char **error) +{ + zbx_uint64_t *proxyid = (zbx_uint64_t *)args; + + ZBX_UNUSED(sock); + ZBX_UNUSED(error); + + /* don't process item if its host was assigned to another proxy */ + if (item->host.proxy_hostid != *proxyid) + return FAIL; + + /* don't process aggregate/calculated items coming from proxy */ + if (ITEM_TYPE_CALCULATED == item->type) + return FAIL; + + return SUCCEED; +} + +/****************************************************************************** + * * + * Purpose: parses history data array and process the data * + * * + * * + * Parameters: sock - [IN] socket for host permission validation * + * validator_func - [IN] function to validate item permission * + * validator_args - [IN] validator function arguments * + * jp_data - [IN] JSON with history data array * + * session - [IN] the data session * + * nodata_win - [OUT] counter of delayed values * + * info - [OUT] address of a pointer to the info * + * string (should be freed by the caller) * + * mode - [IN] item retrieve mode is used to retrieve * + * only necessary data to reduce time * + * spent holding read lock * + * * + * Return value: SUCCEED - processed successfully * + * FAIL - an error occurred * + * * + * Comments: This function is used to parse the new proxy history data * + * protocol introduced in Zabbix v3.3. * + * * + ******************************************************************************/ +static int process_history_data_by_itemids(zbx_socket_t *sock, zbx_client_item_validator_t validator_func, + void *validator_args, struct zbx_json_parse *jp_data, zbx_session_t *session, + zbx_proxy_suppress_t *nodata_win, char **info, unsigned int mode) +{ + const char *pnext = NULL; + int ret = SUCCEED, processed_num = 0, total_num = 0, values_num, read_num, i, *errcodes; + double sec; + DC_ITEM *items; + char *error = NULL; + zbx_uint64_t itemids[ZBX_HISTORY_VALUES_MAX], last_valueid = 0; + zbx_agent_value_t values[ZBX_HISTORY_VALUES_MAX]; + zbx_timespec_t unique_shift = {0, 0}; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__); + + items = (DC_ITEM *)zbx_malloc(NULL, sizeof(DC_ITEM) * ZBX_HISTORY_VALUES_MAX); + errcodes = (int *)zbx_malloc(NULL, sizeof(int) * ZBX_HISTORY_VALUES_MAX); + + sec = zbx_time(); + + while (SUCCEED == parse_history_data_by_itemids(jp_data, &pnext, values, itemids, &values_num, &read_num, + &unique_shift, &error) && 0 != values_num) + { + DCconfig_get_items_by_itemids_partial(items, itemids, errcodes, values_num, mode); + + for (i = 0; i < values_num; i++) + { + if (SUCCEED != errcodes[i]) + continue; + + /* check and discard if duplicate data */ + if (NULL != session && 0 != values[i].id && values[i].id <= session->last_id) + { + DCconfig_clean_items(&items[i], &errcodes[i], 1); + errcodes[i] = FAIL; + continue; + } + + if (SUCCEED != validator_func(&items[i], sock, validator_args, &error)) + { + if (NULL != error) + { + zabbix_log(LOG_LEVEL_WARNING, "%s", error); + zbx_free(error); + } + + DCconfig_clean_items(&items[i], &errcodes[i], 1); + errcodes[i] = FAIL; + } + } + + processed_num += process_history_data(items, values, errcodes, values_num, nodata_win); + + total_num += read_num; + + last_valueid = values[values_num - 1].id; + + DCconfig_clean_items(items, errcodes, values_num); + zbx_agent_values_clean(values, values_num); + + if (NULL == pnext) + break; + } + + if (NULL != session && 0 != last_valueid) + { + if (session->last_id > last_valueid) + { + zabbix_log(LOG_LEVEL_WARNING, "received id:" ZBX_FS_UI64 " is less than last id:" + ZBX_FS_UI64, last_valueid, session->last_id); + } + else + session->last_id = last_valueid; + } + + zbx_free(errcodes); + zbx_free(items); + + if (NULL == error) + { + ret = SUCCEED; + *info = zbx_dsprintf(*info, "processed: %d; failed: %d; total: %d; seconds spent: " ZBX_FS_DBL, + processed_num, total_num - processed_num, total_num, zbx_time() - sec); + } + else + { + zbx_free(*info); + *info = error; + } + + zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret)); + + return ret; +} + +/****************************************************************************** + * * + * Purpose: validates item received from active agent * + * * + * Parameters: item - [IN] the item data * + * sock - [IN] the connection socket * + * args - [IN] the validator arguments * + * error - [OUT] the error message * + * * + * Return value: SUCCEED - the validation was successful * + * FAIL - otherwise * + * * + ******************************************************************************/ +static int agent_item_validator(DC_ITEM *item, zbx_socket_t *sock, void *args, char **error) +{ + zbx_host_rights_t *rights = (zbx_host_rights_t *)args; + + if (0 != item->host.proxy_hostid) + return FAIL; + + if (ITEM_TYPE_ZABBIX_ACTIVE != item->type) + return FAIL; + + if (rights->hostid != item->host.hostid) + { + rights->hostid = item->host.hostid; + rights->value = zbx_host_check_permissions(&item->host, sock, error); + } + + return rights->value; +} + +/****************************************************************************** + * * + * Purpose: validates item received from sender * + * * + * Parameters: item - [IN] the item data * + * sock - [IN] the connection socket * + * args - [IN] the validator arguments * + * error - [OUT] the error message * + * * + * Return value: SUCCEED - the validation was successful * + * FAIL - otherwise * + * * + ******************************************************************************/ +static int sender_item_validator(DC_ITEM *item, zbx_socket_t *sock, void *args, char **error) +{ + zbx_host_rights_t *rights; + char key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1]; + + if (0 != item->host.proxy_hostid) + return FAIL; + + switch(item->type) + { + case ITEM_TYPE_HTTPAGENT: + if (0 == item->allow_traps) + { + *error = zbx_dsprintf(*error, "cannot process HTTP agent item \"%s\" trap:" + " trapping is not enabled", zbx_truncate_itemkey(item->key_orig, + VALUE_ERRMSG_MAX, key_short, sizeof(key_short))); + return FAIL; + } + break; + case ITEM_TYPE_TRAPPER: + break; + default: + *error = zbx_dsprintf(*error, "cannot process item \"%s\" trap:" + " item type \"%d\" cannot be used with traps", + zbx_truncate_itemkey(item->key_orig, VALUE_ERRMSG_MAX, key_short, + sizeof(key_short)), item->type); + return FAIL; + } + + if ('\0' != *item->trapper_hosts) /* list of allowed hosts not empty */ + { + char *allowed_peers; + int ret; + + allowed_peers = zbx_strdup(NULL, item->trapper_hosts); + zbx_substitute_simple_macros(NULL, NULL, NULL, NULL, NULL, NULL, item, NULL, NULL, NULL, NULL, NULL, + &allowed_peers, MACRO_TYPE_ALLOWED_HOSTS, NULL, 0); + ret = zbx_tcp_check_allowed_peers(sock, allowed_peers); + zbx_free(allowed_peers); + + if (FAIL == ret) + { + *error = zbx_dsprintf(*error, "cannot process item \"%s\" trap: %s", + zbx_truncate_itemkey(item->key_orig, VALUE_ERRMSG_MAX, key_short, + sizeof(key_short)), zbx_socket_strerror()); + return FAIL; + } + } + + rights = (zbx_host_rights_t *)args; + + if (rights->hostid != item->host.hostid) + { + rights->hostid = item->host.hostid; + rights->value = zbx_host_check_permissions(&item->host, sock, error); + } + + return rights->value; +} + +static void process_history_data_by_keys(zbx_socket_t *sock, zbx_client_item_validator_t validator_func, + void *validator_args, char **info, struct zbx_json_parse *jp_data, const char *token) +{ + int values_num, read_num, processed_num = 0, total_num = 0, i; + zbx_timespec_t unique_shift = {0, 0}; + const char *pnext = NULL; + char *error = NULL; + zbx_host_key_t *hostkeys; + DC_ITEM *items; + zbx_session_t *session = NULL; + zbx_uint64_t last_hostid = 0; + zbx_agent_value_t values[ZBX_HISTORY_VALUES_MAX]; + int errcodes[ZBX_HISTORY_VALUES_MAX]; + double sec; + + sec = zbx_time(); + + items = (DC_ITEM *)zbx_malloc(NULL, sizeof(DC_ITEM) * ZBX_HISTORY_VALUES_MAX); + hostkeys = (zbx_host_key_t *)zbx_malloc(NULL, sizeof(zbx_host_key_t) * ZBX_HISTORY_VALUES_MAX); + memset(hostkeys, 0, sizeof(zbx_host_key_t) * ZBX_HISTORY_VALUES_MAX); + + while (SUCCEED == parse_history_data(jp_data, &pnext, values, hostkeys, &values_num, &read_num, + &unique_shift) && 0 != values_num) + { + DCconfig_get_items_by_keys(items, hostkeys, errcodes, values_num); + + for (i = 0; i < values_num; i++) + { + if (SUCCEED != errcodes[i]) + { + zabbix_log(LOG_LEVEL_DEBUG, "cannot retrieve key \"%s\" on host \"%s\" from " + "configuration cache", hostkeys[i].key, hostkeys[i].host); + continue; + } + + if (last_hostid != items[i].host.hostid) + { + last_hostid = items[i].host.hostid; + + if (NULL != token) + { + session = zbx_dc_get_or_create_session(last_hostid, token, + ZBX_SESSION_TYPE_DATA); + } + } + + /* check and discard if duplicate data */ + if (NULL != session && 0 != values[i].id && values[i].id <= session->last_id) + { + DCconfig_clean_items(&items[i], &errcodes[i], 1); + errcodes[i] = FAIL; + continue; + } + + if (SUCCEED != validator_func(&items[i], sock, validator_args, &error)) + { + if (NULL != error) + { + zabbix_log(LOG_LEVEL_WARNING, "%s", error); + zbx_free(error); + } + else + { + zabbix_log(LOG_LEVEL_DEBUG, "unknown validation error for item \"%s\"", + (NULL == items[i].key) ? items[i].key_orig : items[i].key); + } + + DCconfig_clean_items(&items[i], &errcodes[i], 1); + errcodes[i] = FAIL; + } + + if (NULL != session) + session->last_id = values[i].id; + } + + processed_num += process_history_data(items, values, errcodes, values_num, NULL); + total_num += read_num; + + DCconfig_clean_items(items, errcodes, values_num); + zbx_agent_values_clean(values, values_num); + + if (NULL == pnext) + break; + } + + for (i = 0; i < ZBX_HISTORY_VALUES_MAX; i++) + { + zbx_free(hostkeys[i].host); + zbx_free(hostkeys[i].key); + } + + zbx_free(hostkeys); + zbx_free(items); + + *info = zbx_dsprintf(*info, "processed: %d; failed: %d; total: %d; seconds spent: " ZBX_FS_DBL, + processed_num, total_num - processed_num, total_num, zbx_time() - sec); +} + +/****************************************************************************** + * * + * Purpose: process history data sent by proxy/agent/sender * + * * + * Parameters: sock - [IN] the connection socket * + * jp - [IN] JSON with historical data * + * ts - [IN] the client connection timestamp * + * validator_func - [IN] the item validator callback function * + * validator_args - [IN] the user arguments passed to validator * + * function * + * info - [OUT] address of a pointer to the info string * + * (should be freed by the caller) * + * * + * Return value: SUCCEED - processed successfully * + * FAIL - an error occurred * + * * + ******************************************************************************/ +static int process_client_history_data(zbx_socket_t *sock, struct zbx_json_parse *jp, zbx_timespec_t *ts, + zbx_client_item_validator_t validator_func, void *validator_args, char **info) +{ + int ret; + char *token = NULL; + size_t token_alloc = 0; + struct zbx_json_parse jp_data; + char tmp[MAX_STRING_LEN]; + int version; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__); + + log_client_timediff(LOG_LEVEL_DEBUG, jp, ts); + + if (SUCCEED != (ret = zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_DATA, &jp_data))) + { + *info = zbx_strdup(*info, zbx_json_strerror()); + goto out; + } + + if (SUCCEED == zbx_json_value_by_name_dyn(jp, ZBX_PROTO_TAG_SESSION, &token, &token_alloc, NULL)) + { + size_t token_len; + + if (ZBX_SESSION_TOKEN_SIZE != (token_len = strlen(token))) + { + *info = zbx_dsprintf(*info, "invalid session token length %d", (int)token_len); + ret = FAIL; + goto out; + } + } + + if (SUCCEED != zbx_json_value_by_name(jp, ZBX_PROTO_TAG_VERSION, tmp, sizeof(tmp), NULL) || + FAIL == (version = zbx_get_component_version_without_patch(tmp))) + { + version = ZBX_COMPONENT_VERSION(4, 2, 0); + } + + if (ZBX_COMPONENT_VERSION(4, 4, 0) <= version && + SUCCEED == zbx_json_value_by_name(jp, ZBX_PROTO_TAG_HOST, tmp, sizeof(tmp), NULL)) + { + zbx_session_t *session; + zbx_uint64_t hostid; + + if (SUCCEED != DCconfig_get_hostid_by_name(tmp, &hostid)) + { + *info = zbx_dsprintf(*info, "unknown host '%s'", tmp); + ret = SUCCEED; + goto out; + } + + if (NULL == token) + session = NULL; + else + session = zbx_dc_get_or_create_session(hostid, token, ZBX_SESSION_TYPE_DATA); + + if (SUCCEED != (ret = process_history_data_by_itemids(sock, validator_func, validator_args, &jp_data, + session, NULL, info, ZBX_ITEM_GET_DEFAULT))) + { + goto out; + } + } + else + process_history_data_by_keys(sock, validator_func, validator_args, info, &jp_data, token); +out: + zbx_free(token); + + zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret)); + + return ret; +} + +/****************************************************************************** + * * + * Purpose: process history data received from Zabbix active agent * + * * + * Parameters: sock - [IN] the connection socket * + * jp - [IN] the JSON with history data * + * ts - [IN] the connection timestamp * + * info - [OUT] address of a pointer to the info string * + * (should be freed by the caller) * + * * + * Return value: SUCCEED - processed successfully * + * FAIL - an error occurred * + * * + ******************************************************************************/ +int process_agent_history_data(zbx_socket_t *sock, struct zbx_json_parse *jp, zbx_timespec_t *ts, char **info) +{ + zbx_host_rights_t rights = {0}; + + return process_client_history_data(sock, jp, ts, agent_item_validator, &rights, info); +} + +/****************************************************************************** + * * + * Purpose: process history data received from Zabbix sender * + * * + * Parameters: sock - [IN] the connection socket * + * jp - [IN] the JSON with history data * + * ts - [IN] the connection timestamp * + * info - [OUT] address of a pointer to the info string * + * (should be freed by the caller) * + * * + * Return value: SUCCEED - processed successfully * + * FAIL - an error occurred * + * * + ******************************************************************************/ +int process_sender_history_data(zbx_socket_t *sock, struct zbx_json_parse *jp, zbx_timespec_t *ts, char **info) +{ + zbx_host_rights_t rights = {0}; + int ret; + zbx_dc_um_handle_t *um_handle; + + um_handle = zbx_dc_open_user_macros(); + + ret = process_client_history_data(sock, jp, ts, sender_item_validator, &rights, info); + + zbx_dc_close_user_macros(um_handle); + + return ret; +} + +static void zbx_drule_ip_free(zbx_drule_ip_t *ip) +{ + zbx_vector_ptr_clear_ext(&ip->services, zbx_ptr_free); + zbx_vector_ptr_destroy(&ip->services); + zbx_free(ip); +} + +static void zbx_drule_free(zbx_drule_t *drule) +{ + zbx_vector_ptr_clear_ext(&drule->ips, (zbx_clean_func_t)zbx_drule_ip_free); + zbx_vector_ptr_destroy(&drule->ips); + zbx_vector_uint64_destroy(&drule->dcheckids); + zbx_free(drule); +} + +/****************************************************************************** + * * + * Purpose: process services discovered on IP address * + * * + * Parameters: drule_ptr - [IN] discovery rule structure * + * ip_discovered_ptr - [IN] vector of ip addresses * + * * + ******************************************************************************/ +static int process_services(const zbx_vector_ptr_t *services, const char *ip, zbx_uint64_t druleid, + zbx_vector_uint64_t *dcheckids, zbx_uint64_t unique_dcheckid, int *processed_num, int ip_idx) +{ + ZBX_DB_DHOST dhost; + zbx_service_t *service; + int services_num, ret = FAIL, i, dchecks = 0; + zbx_vector_ptr_t services_old; + ZBX_DB_DRULE drule = {.druleid = druleid, .unique_dcheckid = unique_dcheckid}; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__); + + memset(&dhost, 0, sizeof(dhost)); + + zbx_vector_ptr_create(&services_old); + + /* find host update */ + for (i = *processed_num; i < services->values_num; i++) + { + service = (zbx_service_t *)services->values[i]; + + zabbix_log(LOG_LEVEL_DEBUG, "%s() druleid:" ZBX_FS_UI64 " dcheckid:" ZBX_FS_UI64 " unique_dcheckid:" + ZBX_FS_UI64 " time:'%s %s' ip:'%s' dns:'%s' port:%hu status:%d value:'%s'", + __func__, drule.druleid, service->dcheckid, drule.unique_dcheckid, + zbx_date2str(service->itemtime, NULL), zbx_time2str(service->itemtime, NULL), ip, service->dns, + service->port, service->status, service->value); + + if (0 == service->dcheckid) + break; + + dchecks++; + } + + /* stop processing current discovery rule and save proxy history until host update is available */ + if (i == services->values_num) + { + for (i = *processed_num; i < services->values_num; i++) + { + char *ip_esc, *dns_esc, *value_esc; + + service = (zbx_service_t *)services->values[i]; + + ip_esc = DBdyn_escape_field("proxy_dhistory", "ip", ip); + dns_esc = DBdyn_escape_field("proxy_dhistory", "dns", service->dns); + value_esc = DBdyn_escape_field("proxy_dhistory", "value", service->value); + + DBexecute("insert into proxy_dhistory (clock,druleid,ip,port,value,status,dcheckid,dns)" + " values (%d," ZBX_FS_UI64 ",'%s',%d,'%s',%d," ZBX_FS_UI64 ",'%s')", + (int)service->itemtime, drule.druleid, ip_esc, service->port, + value_esc, service->status, service->dcheckid, dns_esc); + zbx_free(value_esc); + zbx_free(dns_esc); + zbx_free(ip_esc); + } + + goto fail; + } + + services_num = i; + + if (0 == *processed_num && 0 == ip_idx) + { + DB_RESULT result; + DB_ROW row; + zbx_uint64_t dcheckid; + + result = DBselect( + "select dcheckid,clock,port,value,status,dns,ip" + " from proxy_dhistory" + " where druleid=" ZBX_FS_UI64 + " order by id", + drule.druleid); + + for (i = 0; NULL != (row = DBfetch(result)); i++) + { + if (SUCCEED == DBis_null(row[0])) + continue; + + ZBX_STR2UINT64(dcheckid, row[0]); + + if (0 == strcmp(ip, row[6])) + { + service = (zbx_service_t *)zbx_malloc(NULL, sizeof(zbx_service_t)); + service->dcheckid = dcheckid; + service->itemtime = (time_t)atoi(row[1]); + service->port = atoi(row[2]); + zbx_strlcpy_utf8(service->value, row[3], ZBX_MAX_DISCOVERED_VALUE_SIZE); + service->status = atoi(row[4]); + zbx_strlcpy(service->dns, row[5], ZBX_INTERFACE_DNS_LEN_MAX); + zbx_vector_ptr_append(&services_old, service); + zbx_vector_uint64_append(dcheckids, service->dcheckid); + dchecks++; + } + } + DBfree_result(result); + + if (0 != i) + { + DBexecute("delete from proxy_dhistory" + " where druleid=" ZBX_FS_UI64, + drule.druleid); + } + + zbx_vector_uint64_sort(dcheckids, ZBX_DEFAULT_UINT64_COMPARE_FUNC); + zbx_vector_uint64_uniq(dcheckids, ZBX_DEFAULT_UINT64_COMPARE_FUNC); + + if (SUCCEED != DBlock_druleid(drule.druleid)) + { + zabbix_log(LOG_LEVEL_DEBUG, "druleid:" ZBX_FS_UI64 " does not exist", drule.druleid); + goto fail; + } + + if (SUCCEED != DBlock_ids("dchecks", "dcheckid", dcheckids)) + { + zabbix_log(LOG_LEVEL_DEBUG, "checks are not available for druleid:" ZBX_FS_UI64, drule.druleid); + goto fail; + } + } + + if (0 == dchecks) + { + zabbix_log(LOG_LEVEL_DEBUG, "cannot process host update without services"); + goto fail; + } + + for (i = 0; i < services_old.values_num; i++) + { + service = (zbx_service_t *)services_old.values[i]; + + if (FAIL == zbx_vector_uint64_bsearch(dcheckids, service->dcheckid, ZBX_DEFAULT_UINT64_COMPARE_FUNC)) + { + zabbix_log(LOG_LEVEL_DEBUG, "dcheckid:" ZBX_FS_UI64 " does not exist", service->dcheckid); + continue; + } + + zbx_discovery_update_service(&drule, service->dcheckid, &dhost, ip, service->dns, service->port, + service->status, service->value, service->itemtime); + } + + for (;*processed_num < services_num; (*processed_num)++) + { + service = (zbx_service_t *)services->values[*processed_num]; + + if (FAIL == zbx_vector_uint64_bsearch(dcheckids, service->dcheckid, ZBX_DEFAULT_UINT64_COMPARE_FUNC)) + { + zabbix_log(LOG_LEVEL_DEBUG, "dcheckid:" ZBX_FS_UI64 " does not exist", service->dcheckid); + continue; + } + + zbx_discovery_update_service(&drule, service->dcheckid, &dhost, ip, service->dns, service->port, + service->status, service->value, service->itemtime); + } + + service = (zbx_service_t *)services->values[(*processed_num)++]; + zbx_discovery_update_host(&dhost, service->status, service->itemtime); + + ret = SUCCEED; +fail: + zbx_vector_ptr_clear_ext(&services_old, zbx_ptr_free); + zbx_vector_ptr_destroy(&services_old); + + zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret)); + + return ret; +} + +/****************************************************************************** + * * + * Purpose: parse discovery data contents and process it * + * * + * Parameters: jp_data - [IN] JSON with discovery data * + * error - [OUT] address of a pointer to the info * + * string (should be freed by the caller) * + * * + * Return value: SUCCEED - processed successfully * + * FAIL - an error occurred * + * * + ******************************************************************************/ +static int process_discovery_data_contents(struct zbx_json_parse *jp_data, char **error) +{ + DB_RESULT result; + DB_ROW row; + zbx_uint64_t dcheckid, druleid; + struct zbx_json_parse jp_row; + int status, ret = SUCCEED, i, j; + unsigned short port; + const char *p = NULL; + char ip[ZBX_INTERFACE_IP_LEN_MAX], tmp[MAX_STRING_LEN], + dns[ZBX_INTERFACE_DNS_LEN_MAX], *value = NULL; + time_t itemtime; + size_t value_alloc = ZBX_MAX_DISCOVERED_VALUE_SIZE; + zbx_vector_ptr_t drules; + zbx_drule_t *drule; + zbx_drule_ip_t *drule_ip; + zbx_service_t *service; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__); + + value = (char *)zbx_malloc(value, value_alloc); + + zbx_vector_ptr_create(&drules); + + while (NULL != (p = zbx_json_next(jp_data, p))) + { + if (FAIL == zbx_json_brackets_open(p, &jp_row)) + goto json_parse_error; + + if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_CLOCK, tmp, sizeof(tmp), NULL)) + goto json_parse_error; + + itemtime = atoi(tmp); + + if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_DRULE, tmp, sizeof(tmp), NULL)) + goto json_parse_error; + + ZBX_STR2UINT64(druleid, tmp); + + if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_DCHECK, tmp, sizeof(tmp), NULL)) + goto json_parse_error; + + if ('\0' != *tmp) + ZBX_STR2UINT64(dcheckid, tmp); + else + dcheckid = 0; + + if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_IP, ip, sizeof(ip), NULL)) + goto json_parse_error; + + if (SUCCEED != zbx_is_ip(ip)) + { + zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid IP address", __func__, ip); + continue; + } + + if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_PORT, tmp, sizeof(tmp), NULL)) + { + port = 0; + } + else if (FAIL == zbx_is_ushort(tmp, &port)) + { + zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid port", __func__, tmp); + continue; + } + + if (SUCCEED != zbx_json_value_by_name_dyn(&jp_row, ZBX_PROTO_TAG_VALUE, &value, &value_alloc, NULL)) + *value = '\0'; + + if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_DNS, dns, sizeof(dns), NULL)) + { + *dns = '\0'; + } + else if ('\0' != *dns && FAIL == zbx_validate_hostname(dns)) + { + zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid hostname", __func__, dns); + continue; + } + + if (SUCCEED == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_STATUS, tmp, sizeof(tmp), NULL)) + status = atoi(tmp); + else + status = 0; + + if (FAIL == (i = zbx_vector_ptr_search(&drules, &druleid, ZBX_DEFAULT_UINT64_PTR_COMPARE_FUNC))) + { + drule = (zbx_drule_t *)zbx_malloc(NULL, sizeof(zbx_drule_t)); + drule->druleid = druleid; + zbx_vector_ptr_create(&drule->ips); + zbx_vector_uint64_create(&drule->dcheckids); + zbx_vector_ptr_append(&drules, drule); + } + else + drule = drules.values[i]; + + if (FAIL == (i = zbx_vector_ptr_search(&drule->ips, ip, ZBX_DEFAULT_STR_COMPARE_FUNC))) + { + drule_ip = (zbx_drule_ip_t *)zbx_malloc(NULL, sizeof(zbx_drule_ip_t)); + zbx_strlcpy(drule_ip->ip, ip, ZBX_INTERFACE_IP_LEN_MAX); + zbx_vector_ptr_create(&drule_ip->services); + zbx_vector_ptr_append(&drule->ips, drule_ip); + } + else + drule_ip = drule->ips.values[i]; + + service = (zbx_service_t *)zbx_malloc(NULL, sizeof(zbx_service_t)); + if (0 != (service->dcheckid = dcheckid)) + zbx_vector_uint64_append(&drule->dcheckids, service->dcheckid); + service->port = port; + service->status = status; + zbx_strlcpy_utf8(service->value, value, ZBX_MAX_DISCOVERED_VALUE_SIZE); + zbx_strlcpy(service->dns, dns, ZBX_INTERFACE_DNS_LEN_MAX); + service->itemtime = itemtime; + zbx_vector_ptr_append(&drule_ip->services, service); + + continue; +json_parse_error: + *error = zbx_strdup(*error, zbx_json_strerror()); + ret = FAIL; + goto json_parse_return; + } + + for (i = 0; i < drules.values_num; i++) + { + zbx_uint64_t unique_dcheckid; + int ret2 = SUCCEED; + + drule = (zbx_drule_t *)drules.values[i]; + + DBbegin(); + result = DBselect( + "select dcheckid" + " from dchecks" + " where druleid=" ZBX_FS_UI64 + " and uniq=1", + drule->druleid); + + if (NULL != (row = DBfetch(result))) + ZBX_STR2UINT64(unique_dcheckid, row[0]); + else + unique_dcheckid = 0; + DBfree_result(result); + for (j = 0; j < drule->ips.values_num && SUCCEED == ret2; j++) + { + int processed_num = 0; + + drule_ip = (zbx_drule_ip_t *)drule->ips.values[j]; + + while (processed_num != drule_ip->services.values_num) + { + if (FAIL == (ret2 = process_services(&drule_ip->services, drule_ip->ip, drule->druleid, + &drule->dcheckids, unique_dcheckid, &processed_num, j))) + { + break; + } + } + } + + zbx_process_events(NULL, NULL); + zbx_clean_events(); + DBcommit(); + } +json_parse_return: + zbx_free(value); + + zbx_vector_ptr_clear_ext(&drules, (zbx_clean_func_t)zbx_drule_free); + zbx_vector_ptr_destroy(&drules); + + zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret)); + + return ret; +} + +/****************************************************************************** + * * + * Purpose: parse autoregistration data contents and process it * + * * + * Parameters: jp_data - [IN] JSON with autoregistration data * + * proxy_hostid - [IN] proxy identifier from database * + * error - [OUT] address of a pointer to the info * + * string (should be freed by the caller) * + * * + * Return value: SUCCEED - processed successfully * + * FAIL - an error occurred * + * * + ******************************************************************************/ +static int process_autoregistration_contents(struct zbx_json_parse *jp_data, zbx_uint64_t proxy_hostid, + char **error) +{ + struct zbx_json_parse jp_row; + int ret = SUCCEED; + const char *p = NULL; + time_t itemtime; + char host[ZBX_HOSTNAME_BUF_LEN], ip[ZBX_INTERFACE_IP_LEN_MAX], + dns[ZBX_INTERFACE_DNS_LEN_MAX], tmp[MAX_STRING_LEN], *host_metadata = NULL; + unsigned short port; + size_t host_metadata_alloc = 1; /* for at least NUL-terminating string */ + zbx_vector_ptr_t autoreg_hosts; + zbx_conn_flags_t flags = ZBX_CONN_DEFAULT; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__); + + if (0 == DCget_auto_registration_action_count()) + { + zabbix_log(LOG_LEVEL_DEBUG, "cannot process auto registration contents, all autoregistration actions" + " are disabled"); + goto out; + } + + zbx_vector_ptr_create(&autoreg_hosts); + host_metadata = (char *)zbx_malloc(host_metadata, host_metadata_alloc); + + while (NULL != (p = zbx_json_next(jp_data, p))) + { + unsigned int connection_type; + + if (FAIL == (ret = zbx_json_brackets_open(p, &jp_row))) + break; + + if (FAIL == (ret = zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_CLOCK, tmp, sizeof(tmp), NULL))) + break; + + itemtime = atoi(tmp); + + if (FAIL == (ret = zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_HOST, host, sizeof(host), NULL))) + break; + + if (FAIL == zbx_check_hostname(host, NULL)) + { + zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid Zabbix host name", __func__, host); + continue; + } + + if (FAIL == zbx_json_value_by_name_dyn(&jp_row, ZBX_PROTO_TAG_HOST_METADATA, + &host_metadata, &host_metadata_alloc, NULL)) + { + *host_metadata = '\0'; + } + + if (FAIL != zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_FLAGS, tmp, sizeof(tmp), NULL)) + { + int flags_int; + + flags_int = atoi(tmp); + + switch (flags_int) + { + case ZBX_CONN_DEFAULT: + case ZBX_CONN_IP: + case ZBX_CONN_DNS: + flags = (zbx_conn_flags_t)flags_int; + break; + default: + flags = ZBX_CONN_DEFAULT; + zabbix_log(LOG_LEVEL_WARNING, "wrong flags value: %d for host \"%s\":", + flags_int, host); + } + } + + if (FAIL == (ret = zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_IP, ip, sizeof(ip), NULL))) + { + if (ZBX_CONN_DNS == flags) + { + *ip = '\0'; + ret = SUCCEED; + } + else + break; + } + else if (SUCCEED != zbx_is_ip(ip)) + { + zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid IP address", __func__, ip); + continue; + } + + if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_DNS, dns, sizeof(dns), NULL)) + { + *dns = '\0'; + } + else if ('\0' != *dns && FAIL == zbx_validate_hostname(dns)) + { + zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid hostname", __func__, dns); + continue; + } + + if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_PORT, tmp, sizeof(tmp), NULL)) + { + port = ZBX_DEFAULT_AGENT_PORT; + } + else if (FAIL == zbx_is_ushort(tmp, &port)) + { + zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid port", __func__, tmp); + continue; + } + + if (FAIL == zbx_json_value_by_name(&jp_row, ZBX_PROTO_TAG_TLS_ACCEPTED, tmp, sizeof(tmp), NULL)) + { + connection_type = ZBX_TCP_SEC_UNENCRYPTED; + } + else if (FAIL == zbx_is_uint32(tmp, &connection_type) || (ZBX_TCP_SEC_UNENCRYPTED != connection_type && + ZBX_TCP_SEC_TLS_PSK != connection_type && ZBX_TCP_SEC_TLS_CERT != connection_type)) + { + zabbix_log(LOG_LEVEL_WARNING, "%s(): \"%s\" is not a valid value for \"" + ZBX_PROTO_TAG_TLS_ACCEPTED "\"", __func__, tmp); + continue; + } + + DBregister_host_prepare(&autoreg_hosts, host, ip, dns, port, connection_type, host_metadata, flags, + itemtime); + } + + if (0 != autoreg_hosts.values_num) + { + DBbegin(); + DBregister_host_flush(&autoreg_hosts, proxy_hostid); + DBcommit(); + DCconfig_delete_autoreg_host(&autoreg_hosts); + } + + zbx_free(host_metadata); + DBregister_host_clean(&autoreg_hosts); + zbx_vector_ptr_destroy(&autoreg_hosts); + + if (SUCCEED != ret) + *error = zbx_strdup(*error, zbx_json_strerror()); +out: + zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret)); + + return ret; +} + +/****************************************************************************** + * * + * Purpose: get the number of values waiting to be sent to the server * + * * + * Return value: the number of history values * + * * + ******************************************************************************/ +int proxy_get_history_count(void) +{ + DB_RESULT result; + DB_ROW row; + zbx_uint64_t id; + int count = 0; + + DBconnect(ZBX_DB_CONNECT_NORMAL); + + proxy_get_lastid("proxy_history", "history_lastid", &id); + + result = DBselect( + "select count(*)" + " from proxy_history" + " where id>" ZBX_FS_UI64, + id); + + if (NULL != (row = DBfetch(result))) + count = atoi(row[0]); + + DBfree_result(result); + + DBclose(); + + return count; +} + +/****************************************************************************** + * * + * Purpose: parse tasks contents and saves the received tasks * + * * + * Parameters: jp_tasks - [IN] JSON with tasks data * + * * + ******************************************************************************/ +static void process_tasks_contents(struct zbx_json_parse *jp_tasks) +{ + zbx_vector_ptr_t tasks; + + zbx_vector_ptr_create(&tasks); + + zbx_tm_json_deserialize_tasks(jp_tasks, &tasks); + + DBbegin(); + zbx_tm_save_tasks(&tasks); + DBcommit(); + + zbx_vector_ptr_clear_ext(&tasks, (zbx_clean_func_t)zbx_tm_task_free); + zbx_vector_ptr_destroy(&tasks); +} + +/****************************************************************************** + * * + * Purpose: appends text to the string on a new line * + * * + ******************************************************************************/ +static void zbx_strcatnl_alloc(char **info, size_t *info_alloc, size_t *info_offset, const char *text) +{ + if (0 != *info_offset) + zbx_chrcpy_alloc(info, info_alloc, info_offset, '\n'); + + zbx_strcpy_alloc(info, info_alloc, info_offset, text); +} + +/****************************************************************************** + * * + * Purpose: detect lost connection with proxy and calculate suppression * + * window if possible * + * * + * Parameters: ts - [IN] timestamp when the proxy connection was * + * established * + * proxy_staus - [IN] - active or passive proxy * + * diff - [IN/OUT] the properties to update * + * * + ******************************************************************************/ +static void check_proxy_nodata(zbx_timespec_t *ts, unsigned char proxy_status, zbx_proxy_diff_t *diff) +{ + int delay; + + if (0 != (diff->nodata_win.flags & ZBX_PROXY_SUPPRESS_ACTIVE)) + { + diff->nodata_win.values_num = 0; /* reset counter of new suppress values received from proxy */ + return; /* only for current packet */ + } + + delay = ts->sec - diff->lastaccess; + + if ((HOST_STATUS_PROXY_PASSIVE == proxy_status && + (2 * CONFIG_PROXYDATA_FREQUENCY) < delay && NET_DELAY_MAX < delay) || + (HOST_STATUS_PROXY_ACTIVE == proxy_status && NET_DELAY_MAX < delay)) + { + diff->nodata_win.values_num = 0; + diff->nodata_win.period_end = ts->sec; + diff->flags |= ZBX_FLAGS_PROXY_DIFF_UPDATE_SUPPRESS_WIN; + diff->nodata_win.flags |= ZBX_PROXY_SUPPRESS_ENABLE; + } +} + +/****************************************************************************** + * * + * Purpose: detect lack of data during lost connectivity * + * * + * Parameters: ts - [IN] timestamp when the proxy connection was * + * established * + * proxy_staus - [IN] - active or passive proxy * + * diff - [IN/OUT] the properties to update * + * * + ******************************************************************************/ +static void check_proxy_nodata_empty(zbx_timespec_t *ts, unsigned char proxy_status, zbx_proxy_diff_t *diff) +{ + int delay_empty; + + if (0 != (diff->nodata_win.flags & ZBX_PROXY_SUPPRESS_EMPTY) && 0 != diff->nodata_win.values_num) + diff->nodata_win.flags &= (~ZBX_PROXY_SUPPRESS_EMPTY); + + if (0 == (diff->nodata_win.flags & ZBX_PROXY_SUPPRESS_EMPTY) || 0 != diff->nodata_win.values_num) + return; + + delay_empty = ts->sec - diff->nodata_win.period_end; + + if (HOST_STATUS_PROXY_PASSIVE == proxy_status || + (HOST_STATUS_PROXY_ACTIVE == proxy_status && NET_DELAY_MAX < delay_empty)) + { + diff->nodata_win.period_end = 0; + diff->nodata_win.flags = ZBX_PROXY_SUPPRESS_DISABLE; + } +} + +/****************************************************************************** + * * + * Purpose: process 'proxy data' request * + * * + * Parameters: proxy - [IN] the source proxy * + * jp - [IN] JSON with proxy data * + * proxy_hostid - [IN] proxy identifier from database * + * ts - [IN] timestamp when the proxy connection was * + * established * + * proxy_status - [IN] active or passive proxy mode * + * more - [OUT] available data flag * + * error - [OUT] address of a pointer to the info string * + * (should be freed by the caller) * + * * + * Return value: SUCCEED - processed successfully * + * FAIL - an error occurred * + * * + ******************************************************************************/ +int process_proxy_data(const DC_PROXY *proxy, struct zbx_json_parse *jp, zbx_timespec_t *ts, + unsigned char proxy_status, int *more, char **error) +{ + struct zbx_json_parse jp_data; + int ret = SUCCEED, flags_old; + char *error_step = NULL, value[MAX_STRING_LEN]; + size_t error_alloc = 0, error_offset = 0; + zbx_proxy_diff_t proxy_diff; + + zabbix_log(LOG_LEVEL_DEBUG, "In %s()", __func__); + + proxy_diff.flags = ZBX_FLAGS_PROXY_DIFF_UNSET; + proxy_diff.hostid = proxy->hostid; + + if (SUCCEED != (ret = DCget_proxy_nodata_win(proxy_diff.hostid, &proxy_diff.nodata_win, + &proxy_diff.lastaccess))) + { + zabbix_log(LOG_LEVEL_WARNING, "cannot get proxy communication delay"); + ret = FAIL; + goto out; + } + + if (SUCCEED == zbx_json_value_by_name(jp, ZBX_PROTO_TAG_MORE, value, sizeof(value), NULL)) + proxy_diff.more_data = atoi(value); + else + proxy_diff.more_data = ZBX_PROXY_DATA_DONE; + + if (NULL != more) + *more = proxy_diff.more_data; + + if (SUCCEED == zbx_json_value_by_name(jp, ZBX_PROTO_TAG_PROXY_DELAY, value, sizeof(value), NULL)) + proxy_diff.proxy_delay = atoi(value); + else + proxy_diff.proxy_delay = 0; + + proxy_diff.flags |= ZBX_FLAGS_PROXY_DIFF_UPDATE_PROXYDELAY; + flags_old = proxy_diff.nodata_win.flags; + check_proxy_nodata(ts, proxy_status, &proxy_diff); /* first packet can be empty for active proxy */ + + zabbix_log(LOG_LEVEL_DEBUG, "%s() flag_win:%d/%d flag:%d proxy_status:%d period_end:%d delay:%d" + " timestamp:%d lastaccess:%d proxy_delay:%d more:%d", __func__, proxy_diff.nodata_win.flags, + flags_old, (int)proxy_diff.flags, proxy_status, proxy_diff.nodata_win.period_end, + ts->sec - proxy_diff.lastaccess, ts->sec, proxy_diff.lastaccess, proxy_diff.proxy_delay, + proxy_diff.more_data); + + if (ZBX_FLAGS_PROXY_DIFF_UNSET != proxy_diff.flags) + zbx_dc_update_proxy(&proxy_diff); + + if (SUCCEED == zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_INTERFACE_AVAILABILITY, &jp_data)) + { + if (SUCCEED != (ret = process_interfaces_availability_contents(&jp_data, &error_step))) + zbx_strcatnl_alloc(error, &error_alloc, &error_offset, error_step); + } + + flags_old = proxy_diff.nodata_win.flags; + + if (SUCCEED == zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_HISTORY_DATA, &jp_data)) + { + zbx_session_t *session = NULL; + + if (SUCCEED == zbx_json_value_by_name(jp, ZBX_PROTO_TAG_SESSION, value, sizeof(value), NULL)) + { + size_t token_len; + + if (ZBX_SESSION_TOKEN_SIZE != (token_len = strlen(value))) + { + *error = zbx_dsprintf(*error, "invalid session token length %d", (int)token_len); + ret = FAIL; + goto out; + } + + session = zbx_dc_get_or_create_session(proxy->hostid, value, ZBX_SESSION_TYPE_DATA); + } + + if (SUCCEED != (ret = process_history_data_by_itemids(NULL, proxy_item_validator, + (void *)&proxy->hostid, &jp_data, session, &proxy_diff.nodata_win, &error_step, + ZBX_ITEM_GET_PROCESS))) + { + zbx_strcatnl_alloc(error, &error_alloc, &error_offset, error_step); + } + } + + if (0 != (proxy_diff.nodata_win.flags & ZBX_PROXY_SUPPRESS_ACTIVE)) + { + check_proxy_nodata_empty(ts, proxy_status, &proxy_diff); + + if (0 < proxy_diff.nodata_win.values_num || flags_old != proxy_diff.nodata_win.flags) + proxy_diff.flags |= ZBX_FLAGS_PROXY_DIFF_UPDATE_SUPPRESS_WIN; + + zabbix_log(LOG_LEVEL_DEBUG, "Result of %s() flag_win:%d/%d flag:%d values_num:%d", + __func__, proxy_diff.nodata_win.flags, flags_old, (int)proxy_diff.flags, + proxy_diff.nodata_win.values_num); + } + + if (ZBX_FLAGS_PROXY_DIFF_UNSET != proxy_diff.flags) + zbx_dc_update_proxy(&proxy_diff); + + if (SUCCEED == zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_DISCOVERY_DATA, &jp_data)) + { + if (SUCCEED != (ret = process_discovery_data_contents(&jp_data, &error_step))) + zbx_strcatnl_alloc(error, &error_alloc, &error_offset, error_step); + } + + if (SUCCEED == zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_AUTOREGISTRATION, &jp_data)) + { + if (SUCCEED != (ret = process_autoregistration_contents(&jp_data, proxy->hostid, &error_step))) + zbx_strcatnl_alloc(error, &error_alloc, &error_offset, error_step); + } + + if (SUCCEED == zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_TASKS, &jp_data)) + process_tasks_contents(&jp_data); + + if (SUCCEED == zbx_json_brackets_by_name(jp, ZBX_PROTO_TAG_PROXY_ACTIVE_AVAIL_DATA, &jp_data)) + { + const char *ptr; + zbx_vector_proxy_hostdata_ptr_t host_avails; + struct zbx_json_parse jp_host; + char buffer[ZBX_KIBIBYTE]; + + zbx_vector_proxy_hostdata_ptr_create(&host_avails); + + for (ptr = NULL; NULL != (ptr = zbx_json_next(&jp_data, ptr));) + { + zbx_proxy_hostdata_t *host; + + if (SUCCEED != zbx_json_brackets_open(ptr, &jp_host)) + continue; + + if (SUCCEED == zbx_json_value_by_name(&jp_host, ZBX_PROTO_TAG_HOSTID, buffer, sizeof(buffer), NULL)) + { + host = (zbx_proxy_hostdata_t *)zbx_malloc(NULL, sizeof(zbx_proxy_hostdata_t)); + host->hostid = atoi(buffer); + } + else + continue; + + if (FAIL == zbx_json_value_by_name(&jp_host, ZBX_PROTO_TAG_ACTIVE_STATUS, buffer, sizeof(buffer), NULL)) + { + zbx_free(host); + continue; + } + + host->status = atoi(buffer); + + zbx_vector_proxy_hostdata_ptr_append(&host_avails, host); + } + + if (0 != host_avails.values_num) + { + unsigned char *data = NULL; + zbx_uint32_t data_len; + DC_HOST *hosts; + int i, *errcodes; + zbx_vector_uint64_t hostids; + zbx_vector_proxy_hostdata_ptr_t proxy_host_avails; + + zbx_vector_uint64_create(&hostids); + + for (i = 0; i < host_avails.values_num; i++) + zbx_vector_uint64_append(&hostids, host_avails.values[i]->hostid); + + hosts = (DC_HOST *)zbx_malloc(NULL, sizeof(DC_HOST) * host_avails.values_num); + errcodes = (int *)zbx_malloc(NULL, sizeof(int) * host_avails.values_num); + DCconfig_get_hosts_by_hostids(hosts, hostids.values, errcodes, hostids.values_num); + + zbx_vector_uint64_destroy(&hostids); + + zbx_vector_proxy_hostdata_ptr_create(&proxy_host_avails); + + for (i = 0; i < host_avails.values_num; i++) + { + if (SUCCEED == errcodes[i] && hosts[i].proxy_hostid == proxy->hostid) + zbx_vector_proxy_hostdata_ptr_append(&proxy_host_avails, host_avails.values[i]); + } + + zbx_free(errcodes); + zbx_free(hosts); + + data_len = zbx_availability_serialize_proxy_hostdata(&data, &proxy_host_avails, proxy->hostid); + zbx_availability_send(ZBX_IPC_AVAILMAN_PROCESS_PROXY_HOSTDATA, data, data_len, NULL); + + zbx_vector_proxy_hostdata_ptr_destroy(&proxy_host_avails); + zbx_vector_proxy_hostdata_ptr_clear_ext(&host_avails, (zbx_proxy_hostdata_ptr_free_func_t)zbx_ptr_free); + zbx_free(data); + } + + zbx_vector_proxy_hostdata_ptr_destroy(&host_avails); + } + +out: + zbx_free(error_step); + zabbix_log(LOG_LEVEL_DEBUG, "End of %s():%s", __func__, zbx_result_string(ret)); + + return ret; +} + +/****************************************************************************** + * * + * Purpose: flushes lastaccess changes for proxies every * + * ZBX_PROXY_LASTACCESS_UPDATE_FREQUENCY seconds * + * * + ******************************************************************************/ +static void zbx_db_flush_proxy_lastaccess(void) +{ + zbx_vector_uint64_pair_t lastaccess; + + zbx_vector_uint64_pair_create(&lastaccess); + + zbx_dc_get_proxy_lastaccess(&lastaccess); + + if (0 != lastaccess.values_num) + { + char *sql; + size_t sql_alloc = 256, sql_offset = 0; + int i; + + sql = (char *)zbx_malloc(NULL, sql_alloc); + + DBbegin(); + zbx_DBbegin_multiple_update(&sql, &sql_alloc, &sql_offset); + + for (i = 0; i < lastaccess.values_num; i++) + { + zbx_uint64_pair_t *pair = &lastaccess.values[i]; + + zbx_snprintf_alloc(&sql, &sql_alloc, &sql_offset, "update host_rtdata" + " set lastaccess=%d" + " where hostid=" ZBX_FS_UI64 ";\n", + (int)pair->second, pair->first); + + DBexecute_overflowed_sql(&sql, &sql_alloc, &sql_offset); + } + + zbx_DBend_multiple_update(&sql, &sql_alloc, &sql_offset); + + if (16 < sql_offset) /* in ORACLE always present begin..end; */ + DBexecute("%s", sql); + + DBcommit(); + + zbx_free(sql); + } + + zbx_vector_uint64_pair_destroy(&lastaccess); +} + +/****************************************************************************** + * * + * Purpose: updates proxy version and compatibility with server in database * + * * + * Parameters: proxy - [IN] the proxy to update version for * + * diff - [IN] indicates changes to the proxy * + * * + ******************************************************************************/ +static void db_update_proxy_version(DC_PROXY *proxy, zbx_proxy_diff_t *diff) +{ + if (0 != (diff->flags & ZBX_FLAGS_PROXY_DIFF_UPDATE_VERSION)) + { + if (0 != proxy->version_int) + { + zabbix_log(LOG_LEVEL_DEBUG, "proxy \"%s\" protocol version updated from %u.%u to %u.%u", + proxy->host, + ZBX_COMPONENT_VERSION_MAJOR(proxy->version_int), + ZBX_COMPONENT_VERSION_MINOR(proxy->version_int), + ZBX_COMPONENT_VERSION_MAJOR(diff->version_int), + ZBX_COMPONENT_VERSION_MINOR(diff->version_int)); + } + + if (ZBX_DB_OK > DBexecute( + "update host_rtdata" + " set version=%u,compatibility=%u" + " where hostid=" ZBX_FS_UI64, + ZBX_COMPONENT_VERSION_TO_DEC_FORMAT(diff->version_int), diff->compatibility, + diff->hostid)) + { + zabbix_log(LOG_LEVEL_WARNING, "Failed to update proxy version and compatibility with server for" + " proxy '%s'.", proxy->host); + } + } +} + +/****************************************************************************** + * * + * Purpose: gets proxy version compatibility with server version * + * * + * Parameters: proxy_version - [IN] proxy_version * + * * + * Return value: proxy version compatibility with server version * + * * + ******************************************************************************/ +static zbx_proxy_compatibility_t zbx_get_proxy_compatibility(int proxy_version) +{ +#define SERVER_VERSION ZBX_COMPONENT_VERSION(ZABBIX_VERSION_MAJOR, ZABBIX_VERSION_MINOR, 0) + + if (0 == proxy_version) + return ZBX_PROXY_VERSION_UNDEFINED; + + proxy_version = ZBX_COMPONENT_VERSION_WITHOUT_PATCH(proxy_version); + + if (SERVER_VERSION == proxy_version) + return ZBX_PROXY_VERSION_CURRENT; + + if (SERVER_VERSION < proxy_version) + return ZBX_PROXY_VERSION_UNSUPPORTED; +#if (ZABBIX_VERSION_MINOR == 0) + if (ZABBIX_VERSION_MAJOR == 1 + ZBX_COMPONENT_VERSION_MAJOR(proxy_version)) + return ZBX_PROXY_VERSION_STATUS_OUTDATED; +#elif (ZABBIX_VERSION_MINOR > 0) + if (ZABBIX_VERSION_MAJOR == ZBX_COMPONENT_VERSION_MAJOR(proxy_version)) + return ZBX_PROXY_VERSION_OUTDATED; +#endif + return ZBX_PROXY_VERSION_UNSUPPORTED; + +#undef SERVER_VERSION +} + +/****************************************************************************** + * * + * Purpose: updates proxy runtime properties in cache and database. * + * * + * Parameters: proxy - [IN/OUT] the proxy * + * version_str - [IN] the proxy version as string * + * version_int - [IN] the proxy version in numeric representation * + * lastaccess - [IN] the last proxy access time * + * compress - [IN] 1 if proxy is using data compression, * + * 0 otherwise * + * flags_add - [IN] additional flags for update proxy * + * * + * Comments: The proxy parameter properties are also updated. * + * * + ******************************************************************************/ +void zbx_update_proxy_data(DC_PROXY *proxy, char *version_str, int version_int, int lastaccess, int compress, + zbx_uint64_t flags_add) +{ + zbx_proxy_diff_t diff; + zbx_proxy_compatibility_t compatibility; + + compatibility = zbx_get_proxy_compatibility(version_int); + + diff.hostid = proxy->hostid; + diff.flags = ZBX_FLAGS_PROXY_DIFF_UPDATE | flags_add; + diff.version_str = version_str; + diff.version_int = version_int; + diff.compatibility = compatibility; + diff.lastaccess = lastaccess; + diff.compress = compress; + + zbx_dc_update_proxy(&diff); + + db_update_proxy_version(proxy, &diff); + + zbx_strlcpy(proxy->version_str, version_str, sizeof(proxy->version_str)); + proxy->version_int = version_int; + proxy->compatibility = compatibility; + proxy->auto_compress = compress; + proxy->lastaccess = lastaccess; + + if (0 != (diff.flags & ZBX_FLAGS_PROXY_DIFF_UPDATE_COMPRESS)) + DBexecute("update hosts set auto_compress=%d where hostid=" ZBX_FS_UI64, diff.compress, diff.hostid); + + zbx_db_flush_proxy_lastaccess(); +} +/****************************************************************************** + * * + * Purpose: flushes last_version_error_time changes runtime * + * variable for proxies structures * + * * + ******************************************************************************/ +static void zbx_update_proxy_lasterror(DC_PROXY *proxy) +{ + zbx_proxy_diff_t diff; + + diff.hostid = proxy->hostid; + diff.flags = ZBX_FLAGS_PROXY_DIFF_UPDATE_LASTERROR; + diff.lastaccess = time(NULL); + diff.last_version_error_time = proxy->last_version_error_time; + + zbx_dc_update_proxy(&diff); +} +/****************************************************************************** + * * + * Purpose: check server and proxy versions and compatibility rules * + * * + * Parameters: * + * proxy - [IN] the source proxy * + * version - [IN] the version of proxy * + * * + * Return value: * + * SUCCEED - no compatibility issue * + * FAIL - compatibility check fault * + * * + ******************************************************************************/ +int zbx_check_protocol_version(DC_PROXY *proxy, int version) +{ + zbx_proxy_compatibility_t compatibility; + + compatibility = zbx_get_proxy_compatibility(version); + + /* warn if another proxy version is used and proceed with compatibility rules*/ + if (ZBX_PROXY_VERSION_CURRENT != compatibility) + { + int now = zbx_time(), print_log = 0; + + if (proxy->last_version_error_time <= now) + { + print_log = 1; + proxy->last_version_error_time = now + 5 * SEC_PER_MIN; + zbx_update_proxy_lasterror(proxy); + } + + if (ZBX_PROXY_VERSION_UNSUPPORTED == compatibility) + { + if (1 == print_log) + { + zabbix_log(LOG_LEVEL_WARNING, "Proxy \"%s\" version %u.%u.%u is not supported by server" + " version %d.%d.%d.", proxy->host, + ZBX_COMPONENT_VERSION_MAJOR(version), + ZBX_COMPONENT_VERSION_MINOR(version), + ZBX_COMPONENT_VERSION_PATCH(version), ZABBIX_VERSION_MAJOR, + ZABBIX_VERSION_MINOR, ZABBIX_VERSION_PATCH); + } + return FAIL; + } + else if (ZBX_PROXY_VERSION_OUTDATED == compatibility && 1 == print_log) + { + zabbix_log(LOG_LEVEL_WARNING, "Proxy \"%s\" version %u.%u.%u is outdated, only data collection" + " and remote execution is available with server version %d.%d.%d.", proxy->host, + ZBX_COMPONENT_VERSION_MAJOR(version), ZBX_COMPONENT_VERSION_MINOR(version), + ZBX_COMPONENT_VERSION_PATCH(version), ZABBIX_VERSION_MAJOR, + ZABBIX_VERSION_MINOR, ZABBIX_VERSION_PATCH); + } + else if (ZBX_PROXY_VERSION_UNDEFINED == compatibility) + return FAIL; + } + + return SUCCEED; +} + |