2546252d31
Signed-off-by: Caolán McNamara <caolan.mcnamara@collabora.com> Change-Id: I5358ec0df536c4b3c302011869b42db3491ce73e
1251 lines
42 KiB
C++
1251 lines
42 KiB
C++
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4; fill-column: 100 -*- */
|
|
/*
|
|
* Copyright the Collabora Online contributors.
|
|
*
|
|
* SPDX-License-Identifier: MPL-2.0
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include <chrono>
|
|
#include <iomanip>
|
|
#include <sys/poll.h>
|
|
#include <unistd.h>
|
|
|
|
#include <Poco/Net/HTTPRequest.h>
|
|
#include <Poco/Net/HTTPResponse.h>
|
|
|
|
#include "Admin.hpp"
|
|
#include "AdminModel.hpp"
|
|
#include "Auth.hpp"
|
|
#include <Common.hpp>
|
|
#include <Log.hpp>
|
|
#include <Protocol.hpp>
|
|
#include <StringVector.hpp>
|
|
#include <Unit.hpp>
|
|
#include <Util.hpp>
|
|
#include <common/JsonUtil.hpp>
|
|
|
|
|
|
#include <net/Socket.hpp>
|
|
#if ENABLE_SSL
|
|
#include <SslSocket.hpp>
|
|
#endif
|
|
#include <net/WebSocketHandler.hpp>
|
|
|
|
#include <common/SigUtil.hpp>
|
|
|
|
using namespace COOLProtocol;
|
|
|
|
using Poco::Net::HTTPResponse;
|
|
using Poco::Util::Application;
|
|
|
|
const int Admin::MinStatsIntervalMs = 50;
|
|
const int Admin::DefStatsIntervalMs = 1000;
|
|
|
|
/// Process incoming websocket messages
|
|
void AdminSocketHandler::handleMessage(const std::vector<char> &payload)
|
|
{
|
|
// FIXME: check fin, code etc.
|
|
const std::string firstLine = getFirstLine(payload.data(), payload.size());
|
|
StringVector tokens(StringVector::tokenize(firstLine, ' '));
|
|
LOG_TRC("Recv: " << firstLine << " tokens " << tokens.size());
|
|
|
|
if (tokens.empty())
|
|
{
|
|
LOG_TRC("too few tokens");
|
|
return;
|
|
}
|
|
|
|
AdminModel& model = _admin->getModel();
|
|
|
|
if (tokens.equals(0, "auth"))
|
|
{
|
|
if (tokens.size() < 2)
|
|
{
|
|
LOG_DBG("Auth command without any token");
|
|
sendMessage("InvalidAuthToken");
|
|
shutdown();
|
|
ignoreInput();
|
|
return;
|
|
}
|
|
std::string jwtToken;
|
|
COOLProtocol::getTokenString(tokens[1], "jwt", jwtToken);
|
|
|
|
bool decoded = true;
|
|
try
|
|
{
|
|
jwtToken = Util::decodeURIComponent(jwtToken);
|
|
}
|
|
catch (const Poco::URISyntaxException&)
|
|
{
|
|
decoded = false;
|
|
}
|
|
LOG_INF("Verifying JWT token: " << jwtToken);
|
|
JWTAuth authAgent("admin", "admin", "admin");
|
|
if (decoded && authAgent.verify(jwtToken))
|
|
{
|
|
LOG_TRC("JWT token is valid");
|
|
_isAuthenticated = true;
|
|
return;
|
|
}
|
|
else
|
|
{
|
|
LOG_DBG("Invalid auth token");
|
|
sendMessage("InvalidAuthToken");
|
|
shutdown();
|
|
ignoreInput();
|
|
return;
|
|
}
|
|
}
|
|
|
|
if (!_isAuthenticated)
|
|
{
|
|
LOG_DBG("Not authenticated - message is '" << firstLine << "' " <<
|
|
tokens.size() << " first: '" << tokens[0] << '\'');
|
|
sendMessage("NotAuthenticated");
|
|
shutdown();
|
|
ignoreInput();
|
|
return;
|
|
}
|
|
else if (tokens.equals(0, "documents") ||
|
|
tokens.equals(0, "active_users_count") ||
|
|
tokens.equals(0, "active_docs_count") ||
|
|
tokens.equals(0, "mem_stats") ||
|
|
tokens.equals(0, "cpu_stats") ||
|
|
tokens.equals(0, "sent_activity") ||
|
|
tokens.equals(0, "recv_activity"))
|
|
{
|
|
const std::string result = model.query(tokens[0]);
|
|
if (!result.empty())
|
|
sendTextFrame(tokens[0] + ' ' + result);
|
|
}
|
|
else if (tokens.equals(0, "history"))
|
|
{
|
|
sendTextFrame("{ \"History\": " + model.getAllHistory() + '}');
|
|
}
|
|
else if (tokens.equals(0, "version"))
|
|
{
|
|
// Send COOL version information
|
|
sendTextFrame("coolserver " + Util::getVersionJSON(EnableExperimental));
|
|
// Send LOKit version information
|
|
sendTextFrame("lokitversion " + COOLWSD::LOKitVersion);
|
|
}
|
|
else if (tokens.equals(0, "subscribe") && tokens.size() > 1)
|
|
{
|
|
for (std::size_t i = 0; i < tokens.size() - 1; i++)
|
|
{
|
|
model.subscribe(_sessionId, tokens[i + 1]);
|
|
}
|
|
}
|
|
else if (tokens.equals(0, "unsubscribe") && tokens.size() > 1)
|
|
{
|
|
for (std::size_t i = 0; i < tokens.size() - 1; i++)
|
|
{
|
|
model.unsubscribe(_sessionId, tokens[i + 1]);
|
|
}
|
|
}
|
|
else if (tokens.equals(0, "mem_consumed"))
|
|
sendTextFrame("mem_consumed " + std::to_string(_admin->getTotalMemoryUsage()));
|
|
|
|
else if (tokens.equals(0, "total_avail_mem"))
|
|
sendTextFrame("total_avail_mem " + std::to_string(_admin->getTotalAvailableMemory()));
|
|
|
|
else if (tokens.equals(0, "sent_bytes"))
|
|
sendTextFrame("sent_bytes " + std::to_string(model.getSentBytesTotal() / 1024));
|
|
|
|
else if (tokens.equals(0, "recv_bytes"))
|
|
sendTextFrame("recv_bytes " + std::to_string(model.getRecvBytesTotal() / 1024));
|
|
|
|
else if (tokens.equals(0, "uptime"))
|
|
sendTextFrame("uptime " + std::to_string(model.getServerUptimeSecs()));
|
|
|
|
else if (tokens.equals(0, "log_lines"))
|
|
sendTextFrame("log_lines " + _admin->getLogLines());
|
|
|
|
else if (tokens.equals(0, "kill") && tokens.size() == 2)
|
|
{
|
|
try
|
|
{
|
|
const int pid = std::stoi(tokens[1]);
|
|
LOG_INF("Admin request to kill PID: " << pid);
|
|
|
|
std::set<pid_t> pids = model.getDocumentPids();
|
|
if (pids.find(pid) != pids.end())
|
|
{
|
|
if (Admin::instance().logAdminAction())
|
|
{
|
|
LOG_ANY("Admin request to kill document ["
|
|
<< COOLWSD::anonymizeUrl(model.getFilename(pid)) << "] with pid ["
|
|
<< pid << "] and source IPAddress [" << _clientIPAdress << ']');
|
|
}
|
|
SigUtil::killChild(pid, SIGKILL);
|
|
}
|
|
else
|
|
{
|
|
LOG_ERR("Invalid PID to kill (not a document pid)");
|
|
}
|
|
}
|
|
catch (std::invalid_argument& exc)
|
|
{
|
|
LOG_ERR("Invalid PID to kill (invalid argument): " << tokens[1]);
|
|
}
|
|
catch (std::out_of_range& exc)
|
|
{
|
|
LOG_ERR("Invalid PID to kill (out of range): " << tokens[1]);
|
|
}
|
|
}
|
|
else if (tokens.equals(0, "settings"))
|
|
{
|
|
// for now, we have only these settings
|
|
std::ostringstream oss;
|
|
oss << "settings "
|
|
<< "mem_stats_size=" << model.query("mem_stats_size") << ' '
|
|
<< "mem_stats_interval=" << std::to_string(_admin->getMemStatsInterval()) << ' '
|
|
<< "cpu_stats_size=" << model.query("cpu_stats_size") << ' '
|
|
<< "cpu_stats_interval=" << std::to_string(_admin->getCpuStatsInterval()) << ' '
|
|
<< "net_stats_size=" << model.query("net_stats_size") << ' '
|
|
<< "net_stats_interval=" << std::to_string(_admin->getNetStatsInterval()) << ' ';
|
|
|
|
const DocProcSettings& docProcSettings = _admin->getDefDocProcSettings();
|
|
oss << "limit_virt_mem_mb=" << docProcSettings.getLimitVirtMemMb() << ' '
|
|
<< "limit_stack_mem_kb=" << docProcSettings.getLimitStackMemKb() << ' '
|
|
<< "limit_file_size_mb=" << docProcSettings.getLimitFileSizeMb() << ' '
|
|
<< "limit_num_open_files=" << docProcSettings.getLimitNumberOpenFiles() << ' ';
|
|
|
|
sendTextFrame(oss.str());
|
|
}
|
|
else if (tokens.equals(0, "channel_list"))
|
|
{
|
|
sendTextFrame("channel_list " + _admin->getChannelLogLevels());
|
|
}
|
|
else if (tokens.equals(0, "shutdown"))
|
|
{
|
|
LOG_INF("Setting ShutdownRequestFlag: Shutdown requested by admin.");
|
|
if (Admin::instance().logAdminAction())
|
|
{
|
|
LOG_ANY("Shutdown requested by admin with source IPAddress [" << _clientIPAdress
|
|
<< ']');
|
|
}
|
|
SigUtil::requestShutdown();
|
|
return;
|
|
}
|
|
else if (tokens.equals(0, "set") && tokens.size() > 1)
|
|
{
|
|
for (size_t i = 1; i < tokens.size(); i++)
|
|
{
|
|
StringVector setting(StringVector::tokenize(tokens[i], '='));
|
|
int settingVal = 0;
|
|
try
|
|
{
|
|
settingVal = std::stoi(setting[1]);
|
|
}
|
|
catch (const std::exception& exc)
|
|
{
|
|
LOG_ERR("Invalid setting value: " << setting[1] <<
|
|
" for " << setting[0]);
|
|
return;
|
|
}
|
|
|
|
const std::string settingName = setting[0];
|
|
if (settingName == "mem_stats_size")
|
|
{
|
|
if (settingVal != std::stol(model.query(settingName)))
|
|
{
|
|
model.setMemStatsSize(settingVal);
|
|
}
|
|
}
|
|
else if (settingName == "mem_stats_interval")
|
|
{
|
|
if (settingVal != static_cast<int>(_admin->getMemStatsInterval()))
|
|
{
|
|
_admin->rescheduleMemTimer(settingVal);
|
|
model.clearMemStats();
|
|
model.notify("settings mem_stats_interval=" + std::to_string(_admin->getMemStatsInterval()));
|
|
}
|
|
}
|
|
else if (settingName == "cpu_stats_size")
|
|
{
|
|
if (settingVal != std::stol(model.query(settingName)))
|
|
{
|
|
model.setCpuStatsSize(settingVal);
|
|
}
|
|
}
|
|
else if (settingName == "cpu_stats_interval")
|
|
{
|
|
if (settingVal != static_cast<int>(_admin->getCpuStatsInterval()))
|
|
{
|
|
_admin->rescheduleCpuTimer(settingVal);
|
|
model.clearCpuStats();
|
|
model.notify("settings cpu_stats_interval=" + std::to_string(_admin->getCpuStatsInterval()));
|
|
}
|
|
}
|
|
else if (COOLProtocol::matchPrefix("limit_", settingName))
|
|
{
|
|
DocProcSettings docProcSettings = _admin->getDefDocProcSettings();
|
|
if (settingName == "limit_virt_mem_mb")
|
|
docProcSettings.setLimitVirtMemMb(settingVal);
|
|
else if (settingName == "limit_stack_mem_kb")
|
|
docProcSettings.setLimitStackMemKb(settingVal);
|
|
else if (settingName == "limit_file_size_mb")
|
|
docProcSettings.setLimitFileSizeMb(settingVal);
|
|
else if (settingName == "limit_num_open_files")
|
|
docProcSettings.setLimitNumberOpenFiles(settingVal);
|
|
else
|
|
LOG_ERR("Unknown limit: " << settingName);
|
|
|
|
model.notify("settings " + settingName + '=' + std::to_string(settingVal));
|
|
_admin->setDefDocProcSettings(docProcSettings, true);
|
|
}
|
|
}
|
|
}
|
|
else if (tokens.equals(0, "update-log-levels") && tokens.size() > 1)
|
|
{
|
|
for (size_t i = 1; i < tokens.size(); i++)
|
|
{
|
|
StringVector _channel(StringVector::tokenize(tokens[i], '='));
|
|
if (_channel.size() == 2)
|
|
{
|
|
_admin->setChannelLogLevel((_channel[0] != "?" ? _channel[0]: ""), _channel[1]);
|
|
}
|
|
}
|
|
// Let's send back the current log levels in return. So the user can be sure of the values.
|
|
sendTextFrame("channel_list " + _admin->getChannelLogLevels());
|
|
}
|
|
else if (tokens.equals(0, "updateroutetoken") && tokens.size() > 1)
|
|
{
|
|
// parse the json object of serverId to routeToken
|
|
Poco::JSON::Object::Ptr object;
|
|
if (JsonUtil::parseJSON(tokens[1], object))
|
|
{
|
|
const std::string routeToken =
|
|
JsonUtil::getJSONValue<std::string>(object, Util::getProcessIdentifier());
|
|
if (!routeToken.empty())
|
|
{
|
|
COOLWSD::alertAllUsersInternal("updateroutetoken " + routeToken);
|
|
COOLWSD::RouteToken = routeToken;
|
|
}
|
|
else
|
|
{
|
|
LOG_ERR("Failed to update the route token, invalid serverId to routeToken json : "
|
|
<< tokens[1]);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
LOG_ERR("Failed to update the route token, invalid JSON parsing: " << tokens[1]);
|
|
}
|
|
}
|
|
else if (tokens.equals(0, "migrate") && tokens.size() > 1)
|
|
{
|
|
const std::string& docStatus = tokens[1];
|
|
const std::string& dockey = tokens[2];
|
|
const std::string& routeToken = tokens[3];
|
|
const std::string& serverId = tokens[4];
|
|
if (!dockey.empty() && !routeToken.empty() && !serverId.empty())
|
|
{
|
|
model.setMigratingInfo(dockey, routeToken, serverId);
|
|
std::ostringstream oss;
|
|
oss << "migrate: {";
|
|
oss << "\"afterSave\"" << ":false,";
|
|
if (docStatus == "unsaved" && !model.isDocSaved(dockey))
|
|
{
|
|
COOLWSD::autoSave(dockey);
|
|
oss << "\"saved\"" << ":false,";
|
|
}
|
|
else if ((docStatus == "readonly" && model.isDocReadOnly(dockey)) ||
|
|
(docStatus == "saved" && model.isDocSaved(dockey)))
|
|
{
|
|
oss << "\"saved\"" << ":true,";
|
|
}
|
|
oss << "\"routeToken\"" << ':' << '"' << routeToken << '"' << ',';
|
|
oss << "\"serverId\"" << ':' << '"' << serverId << '"' << '}';
|
|
COOLWSD::alertUserInternal(dockey, oss.str());
|
|
}
|
|
else
|
|
{
|
|
LOG_WRN("Document migration failed for dockey:" + dockey +
|
|
", reason has been changed");
|
|
}
|
|
}
|
|
else if (tokens.equals(0, "wopiSrcMap"))
|
|
{
|
|
sendTextFrame(model.getWopiSrcMap());
|
|
}
|
|
else if(tokens.equals(0, "verifyauth"))
|
|
{
|
|
if (tokens.size() < 2)
|
|
{
|
|
LOG_DBG("Auth command without any token");
|
|
sendTextFrame("InvalidAuthToken");
|
|
}
|
|
std::string jwtToken, id;
|
|
COOLProtocol::getTokenString(tokens[1], "jwt", jwtToken);
|
|
COOLProtocol::getTokenString(tokens[2], "id", id);
|
|
|
|
try
|
|
{
|
|
jwtToken = Util::decodeURIComponent(jwtToken);
|
|
}
|
|
catch (const Poco::URISyntaxException& exception)
|
|
{
|
|
LOG_DBG("Invalid URI syntax: " << exception.what());
|
|
}
|
|
|
|
LOG_INF("Verifying JWT token: " << jwtToken);
|
|
JWTAuth authAgent("admin", "admin", "admin");
|
|
if (authAgent.verify(jwtToken))
|
|
{
|
|
LOG_TRC("JWT token is valid");
|
|
sendTextFrame("ValidAuthToken " + id);
|
|
}
|
|
else
|
|
{
|
|
LOG_DBG("Invalid auth token");
|
|
sendTextFrame("InvalidAuthToken " + id);
|
|
}
|
|
}
|
|
}
|
|
|
|
AdminSocketHandler::AdminSocketHandler(Admin* adminManager,
|
|
const std::weak_ptr<StreamSocket>& socket,
|
|
const Poco::Net::HTTPRequest& request)
|
|
: WebSocketHandler(socket.lock(), request)
|
|
, _admin(adminManager)
|
|
, _isAuthenticated(false)
|
|
{
|
|
// Different session id pool for admin sessions (?)
|
|
_sessionId = Util::decodeId(COOLWSD::GetConnectionId());
|
|
_clientIPAdress = socket.lock()->clientAddress();
|
|
}
|
|
|
|
AdminSocketHandler::AdminSocketHandler(Admin* adminManager)
|
|
: WebSocketHandler(/* isClient = */ true, /* isMasking = */ true),
|
|
_admin(adminManager),
|
|
_isAuthenticated(true)
|
|
{
|
|
_sessionId = Util::decodeId(COOLWSD::GetConnectionId());
|
|
}
|
|
|
|
void AdminSocketHandler::sendTextFrame(const std::string& message)
|
|
{
|
|
if (!Util::isFuzzing())
|
|
{
|
|
UnitWSD::get().onAdminQueryMessage(message);
|
|
}
|
|
|
|
if (_isAuthenticated)
|
|
{
|
|
LOG_TRC("send admin text frame '" << message << '\'');
|
|
sendMessage(message);
|
|
}
|
|
else
|
|
LOG_TRC("Skip sending message to non-authenticated client: '" << message << '\'');
|
|
}
|
|
|
|
void AdminSocketHandler::subscribeAsync(const std::shared_ptr<AdminSocketHandler>& handler)
|
|
{
|
|
Admin &admin = Admin::instance();
|
|
|
|
admin.addCallback([handler]
|
|
{
|
|
Admin &adminIn = Admin::instance();
|
|
adminIn.getModel().subscribe(handler->_sessionId, handler);
|
|
});
|
|
}
|
|
|
|
bool AdminSocketHandler::handleInitialRequest(
|
|
const std::weak_ptr<StreamSocket> &socketWeak,
|
|
const Poco::Net::HTTPRequest& request)
|
|
{
|
|
if (!COOLWSD::AdminEnabled)
|
|
{
|
|
LOG_ERR_S("Request for disabled admin console");
|
|
return false;
|
|
}
|
|
|
|
std::shared_ptr<StreamSocket> socket = socketWeak.lock();
|
|
if (!socket)
|
|
{
|
|
LOG_ERR_S("Invalid socket while reading initial request");
|
|
return false;
|
|
}
|
|
|
|
const std::string& requestURI = request.getURI();
|
|
StringVector pathTokens(StringVector::tokenize(requestURI, '/'));
|
|
|
|
if (request.has("Upgrade") && Util::iequal(request["Upgrade"], "websocket"))
|
|
{
|
|
Admin &admin = Admin::instance();
|
|
auto handler = std::make_shared<AdminSocketHandler>(&admin, socketWeak, request);
|
|
socket->setHandler(handler);
|
|
|
|
AdminSocketHandler::subscribeAsync(handler);
|
|
|
|
return true;
|
|
}
|
|
|
|
http::Response response(http::StatusCode::BadRequest);
|
|
response.setContentLength(0);
|
|
LOG_INF_S("Admin::handleInitialRequest bad request");
|
|
socket->send(response);
|
|
|
|
return false;
|
|
}
|
|
|
|
/// An admin command processor.
|
|
Admin::Admin()
|
|
: SocketPoll("admin")
|
|
, _totalSysMemKb(Util::getTotalSystemMemoryKb())
|
|
, _totalAvailMemKb(_totalSysMemKb)
|
|
, _forKitPid(-1)
|
|
, _lastTotalMemory(0)
|
|
, _lastJiffies(0)
|
|
, _lastSentCount(0)
|
|
, _lastRecvCount(0)
|
|
, _cpuStatsTaskIntervalMs(DefStatsIntervalMs)
|
|
, _memStatsTaskIntervalMs(DefStatsIntervalMs * 2)
|
|
, _netStatsTaskIntervalMs(DefStatsIntervalMs * 2)
|
|
, _cleanupIntervalMs(DefStatsIntervalMs * 10)
|
|
{
|
|
LOG_INF("Admin ctor");
|
|
|
|
LOG_TRC("Total system memory: " << _totalSysMemKb << " KB");
|
|
|
|
// If there is a cgroup limit that is smaller still, apply it.
|
|
const std::size_t cgroupMemLimitKb = Util::getCGroupMemLimit() / 1024;
|
|
if (cgroupMemLimitKb > 0 && cgroupMemLimitKb < _totalAvailMemKb)
|
|
{
|
|
LOG_TRC("cgroup memory limit: " << cgroupMemLimitKb << " KB");
|
|
_totalAvailMemKb = cgroupMemLimitKb;
|
|
}
|
|
else
|
|
LOG_TRC("no cgroup memory limit");
|
|
|
|
// If there is a cgroup soft-limit that is smaller still, apply that.
|
|
const std::size_t cgroupMemSoftLimitKb = Util::getCGroupMemSoftLimit() / 1024;
|
|
if (cgroupMemSoftLimitKb > 0 && cgroupMemSoftLimitKb < _totalAvailMemKb)
|
|
{
|
|
LOG_TRC("cgroup memory soft limit: " << cgroupMemSoftLimitKb << " KB");
|
|
_totalAvailMemKb = cgroupMemSoftLimitKb;
|
|
}
|
|
else
|
|
LOG_TRC("no cgroup memory soft limit");
|
|
|
|
// Reserve some minimum memory (1 MB, arbitrarily)
|
|
// as headroom. Otherwise, coolwsd might fail to
|
|
// clean-up Kits when we run out, and by then we die.
|
|
// This should be enough to update DocBroker containers,
|
|
// take locks, print logs, etc. during cleaning up.
|
|
std::size_t minHeadroomKb = 1024;
|
|
|
|
// If we have a manual percentage cap, apply it.
|
|
const double memLimit = COOLWSD::getConfigValue<double>("memproportion", 0.0);
|
|
if (memLimit > 0.0)
|
|
{
|
|
const double headroom = _totalAvailMemKb * (100. - memLimit) / 100.;
|
|
if (minHeadroomKb < headroom)
|
|
minHeadroomKb = static_cast<std::size_t>(headroom);
|
|
}
|
|
|
|
if (_totalAvailMemKb > minHeadroomKb)
|
|
{
|
|
_totalAvailMemKb -= minHeadroomKb;
|
|
}
|
|
|
|
const size_t totalUsedMemKb = getTotalMemoryUsage();
|
|
_model.addMemStats(totalUsedMemKb);
|
|
|
|
LOG_INF(
|
|
std::setprecision(2)
|
|
<< "Total available memory: " << _totalAvailMemKb << " KB ("
|
|
<< _totalAvailMemKb / (1024 * 1024.) << " GB), System memory: " << _totalSysMemKb << " KB ("
|
|
<< _totalSysMemKb / (1024 * 1024.) << " GB), cgroup limit: " << cgroupMemLimitKb
|
|
<< " KB, cgroup soft-limit: " << cgroupMemSoftLimitKb
|
|
<< " KB, configured memproportion: " << memLimit << "%, actual percentage of system total: "
|
|
<< (_totalSysMemKb ? (_totalAvailMemKb * 100. / _totalSysMemKb) : 100)
|
|
<< "%, current usage: " << totalUsedMemKb << " KB ("
|
|
<< (_totalAvailMemKb ? (totalUsedMemKb * 100. / _totalAvailMemKb) : 100) << "% of limit)");
|
|
|
|
if (_totalAvailMemKb < 1000 * 1024)
|
|
LOG_WRN("Low memory condition detected: only " << _totalAvailMemKb / 1024
|
|
<< " MB of RAM available");
|
|
|
|
LOG_INF("hardware threads: " << std::thread::hardware_concurrency());
|
|
}
|
|
|
|
Admin::~Admin()
|
|
{
|
|
LOG_INF("~Admin dtor.");
|
|
}
|
|
|
|
void Admin::pollingThread()
|
|
{
|
|
_model.setThreadOwner(std::this_thread::get_id());
|
|
|
|
std::chrono::steady_clock::time_point lastCPU = std::chrono::steady_clock::now();
|
|
std::chrono::steady_clock::time_point lastMem = lastCPU;
|
|
std::chrono::steady_clock::time_point lastNet = lastCPU;
|
|
std::chrono::steady_clock::time_point lastCleanup = lastCPU;
|
|
|
|
while (!isStop() && !SigUtil::getShutdownRequestFlag())
|
|
{
|
|
const std::chrono::steady_clock::time_point now = std::chrono::steady_clock::now();
|
|
|
|
int cpuWait = _cpuStatsTaskIntervalMs -
|
|
std::chrono::duration_cast<std::chrono::milliseconds>(now - lastCPU).count();
|
|
if (cpuWait <= MinStatsIntervalMs / 2) // Close enough
|
|
{
|
|
const size_t currentJiffies = getTotalCpuUsage();
|
|
const size_t cpuPercent = 100 * 1000 * currentJiffies / (sysconf (_SC_CLK_TCK) * _cpuStatsTaskIntervalMs);
|
|
_model.addCpuStats(cpuPercent);
|
|
|
|
cpuWait += _cpuStatsTaskIntervalMs;
|
|
lastCPU = now;
|
|
}
|
|
|
|
int memWait = _memStatsTaskIntervalMs -
|
|
std::chrono::duration_cast<std::chrono::milliseconds>(now - lastMem).count();
|
|
if (memWait <= MinStatsIntervalMs / 2) // Close enough
|
|
{
|
|
// disable watchdog to avoid Document::updateMemoryDirty noise
|
|
disableWatchdog();
|
|
_model.UpdateMemoryDirty();
|
|
enableWatchdog();
|
|
|
|
const size_t totalMem = getTotalMemoryUsage();
|
|
_model.addMemStats(totalMem);
|
|
|
|
if (totalMem != _lastTotalMemory)
|
|
{
|
|
// If our total memory consumption is above limit, cleanup
|
|
triggerMemoryCleanup(totalMem);
|
|
|
|
_lastTotalMemory = totalMem;
|
|
}
|
|
|
|
notifyDocsMemDirtyChanged();
|
|
|
|
memWait += _memStatsTaskIntervalMs;
|
|
lastMem = now;
|
|
}
|
|
|
|
int netWait = _netStatsTaskIntervalMs -
|
|
std::chrono::duration_cast<std::chrono::milliseconds>(now - lastNet).count();
|
|
if (netWait <= MinStatsIntervalMs / 2) // Close enough
|
|
{
|
|
const uint64_t sentCount = _model.getSentBytesTotal();
|
|
const uint64_t recvCount = _model.getRecvBytesTotal();
|
|
|
|
_model.addSentStats(sentCount - _lastSentCount);
|
|
_model.addRecvStats(recvCount - _lastRecvCount);
|
|
|
|
if (_lastRecvCount != recvCount || _lastSentCount != sentCount)
|
|
{
|
|
LOG_TRC("Total Data sent: " << sentCount << ", recv: " << recvCount);
|
|
_lastRecvCount = recvCount;
|
|
_lastSentCount = sentCount;
|
|
}
|
|
|
|
netWait += _netStatsTaskIntervalMs;
|
|
lastNet = now;
|
|
}
|
|
|
|
int cleanupWait = _cleanupIntervalMs;
|
|
if (_defDocProcSettings.getCleanupSettings().getEnable())
|
|
{
|
|
cleanupWait
|
|
-= std::chrono::duration_cast<std::chrono::milliseconds>(now - lastCleanup).count();
|
|
if (cleanupWait <= MinStatsIntervalMs / 2) // Close enough
|
|
{
|
|
cleanupResourceConsumingDocs();
|
|
if (_defDocProcSettings.getCleanupSettings().getLostKitGracePeriod())
|
|
cleanupLostKits();
|
|
|
|
cleanupWait += _cleanupIntervalMs;
|
|
lastCleanup = now;
|
|
}
|
|
}
|
|
|
|
// (re)-connect (with sync. DNS - urk) to one monitor at a time
|
|
if (_pendingConnects.size())
|
|
{
|
|
MonitorConnectRecord rec = _pendingConnects[0];
|
|
if (rec.getWhen() < now)
|
|
{
|
|
_pendingConnects.erase(_pendingConnects.begin());
|
|
connectToMonitorSync(rec.getUri());
|
|
}
|
|
}
|
|
|
|
// Handle websockets & other work.
|
|
const auto timeout = std::chrono::milliseconds(capAndRoundInterval(
|
|
std::min(std::min(std::min(cpuWait, memWait), netWait), cleanupWait)));
|
|
LOG_TRC("Admin poll for " << timeout);
|
|
poll(timeout); // continue with ms for admin, settings etc.
|
|
}
|
|
}
|
|
|
|
void Admin::modificationAlert(const std::string& docKey, pid_t pid, bool value){
|
|
addCallback([this, docKey, pid, value] { _model.modificationAlert(docKey, pid, value); });
|
|
}
|
|
|
|
void Admin::uploadedAlert(const std::string& docKey, pid_t pid, bool value)
|
|
{
|
|
addCallback([this, docKey, pid, value] { _model.uploadedAlert(docKey, pid, value); });
|
|
}
|
|
|
|
void Admin::addDoc(const std::string& docKey, pid_t pid, const std::string& filename,
|
|
const std::string& sessionId, const std::string& userName, const std::string& userId,
|
|
const int smapsFD, const std::string& wopiSrc, bool readOnly)
|
|
{
|
|
addCallback([this, docKey, pid, filename, sessionId, userName, userId, smapsFD, wopiSrc, readOnly] {
|
|
_model.addDocument(docKey, pid, filename, sessionId, userName, userId, smapsFD, Poco::URI(wopiSrc), readOnly);
|
|
});
|
|
}
|
|
|
|
void Admin::rmDoc(const std::string& docKey, const std::string& sessionId)
|
|
{
|
|
addCallback([this, docKey, sessionId] { _model.removeDocument(docKey, sessionId); });
|
|
}
|
|
|
|
void Admin::rmDoc(const std::string& docKey)
|
|
{
|
|
LOG_INF("Removing complete doc [" << docKey << "] from Admin.");
|
|
addCallback([this, docKey]{ _model.removeDocument(docKey); });
|
|
}
|
|
|
|
void Admin::rescheduleMemTimer(unsigned interval)
|
|
{
|
|
_memStatsTaskIntervalMs = capAndRoundInterval(interval);
|
|
LOG_INF("Memory stats interval changed - New interval: " << _memStatsTaskIntervalMs);
|
|
_netStatsTaskIntervalMs = capAndRoundInterval(interval); // Until we support modifying this.
|
|
LOG_INF("Network stats interval changed - New interval: " << _netStatsTaskIntervalMs);
|
|
wakeup();
|
|
}
|
|
|
|
void Admin::rescheduleCpuTimer(unsigned interval)
|
|
{
|
|
_cpuStatsTaskIntervalMs = capAndRoundInterval(interval);
|
|
LOG_INF("CPU stats interval changed - New interval: " << _cpuStatsTaskIntervalMs);
|
|
wakeup();
|
|
}
|
|
|
|
size_t Admin::getTotalMemoryUsage()
|
|
{
|
|
// To simplify and clarify this; since load, link and pre-init all
|
|
// inside the forkit - we should account all of our fixed cost of
|
|
// memory to the forkit; and then count only dirty pages in the clients
|
|
// since we know that they share everything else with the forkit.
|
|
const size_t forkitRssKb = Util::getMemoryUsageRSS(_forKitPid);
|
|
const size_t wsdPssKb = Util::getMemoryUsagePSS(getpid());
|
|
const size_t kitsDirtyKb = _model.getKitsMemoryUsage();
|
|
const size_t totalMem = wsdPssKb + forkitRssKb + kitsDirtyKb;
|
|
|
|
return totalMem;
|
|
}
|
|
|
|
size_t Admin::getTotalCpuUsage()
|
|
{
|
|
const size_t forkitJ = Util::getCpuUsage(_forKitPid);
|
|
const size_t wsdJ = Util::getCpuUsage(getpid());
|
|
const size_t kitsJ = _model.getKitsJiffies();
|
|
|
|
if (_lastJiffies == 0)
|
|
{
|
|
_lastJiffies = forkitJ + wsdJ;
|
|
return 0;
|
|
}
|
|
|
|
const size_t totalJ = ((forkitJ + wsdJ) - _lastJiffies) + kitsJ;
|
|
_lastJiffies = forkitJ + wsdJ;
|
|
|
|
return totalJ;
|
|
}
|
|
|
|
unsigned Admin::getMemStatsInterval()
|
|
{
|
|
ASSERT_CORRECT_THREAD();
|
|
return _memStatsTaskIntervalMs;
|
|
}
|
|
|
|
unsigned Admin::getCpuStatsInterval()
|
|
{
|
|
ASSERT_CORRECT_THREAD();
|
|
return _cpuStatsTaskIntervalMs;
|
|
}
|
|
|
|
unsigned Admin::getNetStatsInterval()
|
|
{
|
|
ASSERT_CORRECT_THREAD();
|
|
return _netStatsTaskIntervalMs;
|
|
}
|
|
|
|
std::string Admin::getChannelLogLevels()
|
|
{
|
|
std::string result = "wsd=" + Log::getLogLevelName("wsd");
|
|
|
|
result += " kit=" + (_forkitLogLevel.empty() != true ? _forkitLogLevel: Log::getLogLevelName("wsd"));
|
|
|
|
return result;
|
|
}
|
|
|
|
void Admin::setChannelLogLevel(const std::string& channelName, std::string level)
|
|
{
|
|
ASSERT_CORRECT_THREAD();
|
|
|
|
if (channelName == "wsd")
|
|
Log::setLogLevelByName("wsd", level);
|
|
|
|
else if (channelName == "kit")
|
|
{
|
|
COOLWSD::setLogLevelsOfKits(level); // For current kits.
|
|
COOLWSD::sendMessageToForKit("setloglevel " + level); // For forkit and future kits.
|
|
_forkitLogLevel = level; // We will remember this setting rather than asking forkit its loglevel.
|
|
}
|
|
}
|
|
|
|
std::string Admin::getLogLines()
|
|
{
|
|
ASSERT_CORRECT_THREAD();
|
|
|
|
try
|
|
{
|
|
static const std::string fName = COOLWSD::getPathFromConfig("logging.file.property[0]");
|
|
std::ifstream infile(fName);
|
|
|
|
std::size_t lineCount = 500;
|
|
std::string line;
|
|
std::deque<std::string> lines;
|
|
|
|
while (std::getline(infile, line))
|
|
{
|
|
std::istringstream iss(line);
|
|
lines.push_back(line);
|
|
if (lines.size() > lineCount)
|
|
{
|
|
lines.pop_front();
|
|
}
|
|
}
|
|
|
|
infile.close();
|
|
|
|
if (lines.size() < lineCount)
|
|
{
|
|
lineCount = lines.size();
|
|
}
|
|
|
|
line.clear(); // Use the same variable to include result.
|
|
if (lineCount > 0)
|
|
{
|
|
line.reserve(lineCount * 128); // Avoid repeated resizing.
|
|
// Newest will be on top.
|
|
for (int i = static_cast<int>(lineCount) - 1; i >= 0; i--)
|
|
{
|
|
line += '\n';
|
|
line += lines[i];
|
|
}
|
|
}
|
|
|
|
return line;
|
|
}
|
|
catch (const std::exception& e) {
|
|
return "Could not read the log file.";
|
|
}
|
|
}
|
|
|
|
AdminModel& Admin::getModel()
|
|
{
|
|
return _model;
|
|
}
|
|
|
|
void Admin::updateLastActivityTime(const std::string& docKey)
|
|
{
|
|
addCallback([this, docKey]{ _model.updateLastActivityTime(docKey); });
|
|
}
|
|
|
|
|
|
void Admin::addBytes(const std::string& docKey, uint64_t sent, uint64_t recv)
|
|
{
|
|
addCallback([this, docKey, sent, recv] { _model.addBytes(docKey, sent, recv); });
|
|
}
|
|
|
|
void Admin::setViewLoadDuration(const std::string& docKey, const std::string& sessionId, std::chrono::milliseconds viewLoadDuration)
|
|
{
|
|
addCallback([this, docKey, sessionId, viewLoadDuration]{ _model.setViewLoadDuration(docKey, sessionId, viewLoadDuration); });
|
|
}
|
|
|
|
void Admin::setDocWopiDownloadDuration(const std::string& docKey, std::chrono::milliseconds wopiDownloadDuration)
|
|
{
|
|
addCallback([this, docKey, wopiDownloadDuration]{ _model.setDocWopiDownloadDuration(docKey, wopiDownloadDuration); });
|
|
}
|
|
|
|
void Admin::setDocWopiUploadDuration(const std::string& docKey, const std::chrono::milliseconds uploadDuration)
|
|
{
|
|
addCallback([this, docKey, uploadDuration]{ _model.setDocWopiUploadDuration(docKey, uploadDuration); });
|
|
}
|
|
|
|
void Admin::addSegFaultCount(unsigned segFaultCount)
|
|
{
|
|
addCallback([this, segFaultCount]{ _model.addSegFaultCount(segFaultCount); });
|
|
}
|
|
|
|
void Admin::addLostKitsTerminated(unsigned lostKitsTerminated)
|
|
{
|
|
addCallback([this, lostKitsTerminated]{ _model.addLostKitsTerminated(lostKitsTerminated); });
|
|
}
|
|
|
|
void Admin::routeTokenSanityCheck()
|
|
{
|
|
addCallback([this] { _model.routeTokenSanityCheck(); });
|
|
}
|
|
|
|
void Admin::notifyForkit()
|
|
{
|
|
std::ostringstream oss;
|
|
oss << "setconfig limit_virt_mem_mb " << _defDocProcSettings.getLimitVirtMemMb() << '\n'
|
|
<< "setconfig limit_stack_mem_kb " << _defDocProcSettings.getLimitStackMemKb() << '\n'
|
|
<< "setconfig limit_file_size_mb " << _defDocProcSettings.getLimitFileSizeMb() << '\n'
|
|
<< "setconfig limit_num_open_files " << _defDocProcSettings.getLimitNumberOpenFiles() << '\n';
|
|
|
|
COOLWSD::sendMessageToForKit(oss.str());
|
|
}
|
|
|
|
/// Similar to std::clamp(), old libstdc++ doesn't have it.
|
|
template <typename T> T clamp(const T& n, const T& lower, const T& upper)
|
|
{
|
|
return std::max(lower, std::min(n, upper));
|
|
}
|
|
|
|
void Admin::triggerMemoryCleanup(const size_t totalMem)
|
|
{
|
|
// Trigger mem cleanup when we are consuming too much memory (as configured by sysadmin)
|
|
static const double memLimit = COOLWSD::getConfigValue<double>("memproportion", 0.0);
|
|
if (memLimit == 0.0 || _totalSysMemKb == 0)
|
|
{
|
|
LOG_TRC("Total memory consumed: " << totalMem <<
|
|
" KB. Not configured to do memory cleanup. Skipping memory cleanup.");
|
|
return;
|
|
}
|
|
|
|
LOG_TRC("Total memory consumed: " << totalMem << " KB. Configured COOL memory proportion: " <<
|
|
memLimit << "% (" << static_cast<size_t>(_totalSysMemKb * memLimit / 100.) << " KB).");
|
|
|
|
const double memToFreePercentage = (totalMem / static_cast<double>(_totalSysMemKb)) - memLimit / 100.;
|
|
int memToFreeKb = clamp<double>(memToFreePercentage * _totalSysMemKb, 0, std::numeric_limits<int>::max());
|
|
// Don't kill documents to save a KB or two.
|
|
if (memToFreeKb > 1024)
|
|
{
|
|
// prepare document list sorted by most idle times
|
|
const std::vector<DocBasicInfo> docList = _model.getDocumentsSortedByIdle();
|
|
|
|
LOG_TRC("OOM: Memory to free: " << memToFreePercentage << "% (" <<
|
|
memToFreeKb << " KB) from " << docList.size() << " docs.");
|
|
|
|
for (const auto& doc : docList)
|
|
{
|
|
LOG_TRC("OOM Document: DocKey: [" << doc.getDocKey() << "], Idletime: [" << doc.getIdleTime() << "]," <<
|
|
" Saved: [" << doc.getSaved() << "], Mem: [" << doc.getMem() << "].");
|
|
if (doc.getSaved())
|
|
{
|
|
// Kill the saved documents first.
|
|
LOG_DBG("OOM: Killing saved document with DocKey [" << doc.getDocKey() << "] with " << doc.getMem() << " KB.");
|
|
COOLWSD::closeDocument(doc.getDocKey(), "oom");
|
|
memToFreeKb -= doc.getMem();
|
|
if (memToFreeKb <= 1024)
|
|
break;
|
|
}
|
|
else
|
|
{
|
|
// Save unsaved documents.
|
|
LOG_TRC("Saving document: DocKey [" << doc.getDocKey() << "].");
|
|
COOLWSD::autoSave(doc.getDocKey());
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
void Admin::notifyDocsMemDirtyChanged()
|
|
{
|
|
_model.notifyDocsMemDirtyChanged();
|
|
}
|
|
|
|
void Admin::cleanupResourceConsumingDocs()
|
|
{
|
|
_model.cleanupResourceConsumingDocs();
|
|
}
|
|
|
|
void Admin::cleanupLostKits()
|
|
{
|
|
if (Util::isKitInProcess())
|
|
return; // we might look lost ourselves.
|
|
|
|
static std::map<pid_t, std::time_t> mapKitsLost;
|
|
std::set<pid_t> internalKitPids;
|
|
std::vector<int> kitPids;
|
|
int pid;
|
|
unsigned lostKitsTerminated = 0;
|
|
size_t gracePeriod = _defDocProcSettings.getCleanupSettings().getLostKitGracePeriod();
|
|
|
|
internalKitPids = COOLWSD::getKitPids();
|
|
AdminModel::getKitPidsFromSystem(&kitPids);
|
|
|
|
for (auto itProc = kitPids.begin(); itProc != kitPids.end(); itProc ++)
|
|
{
|
|
pid = *itProc;
|
|
if (internalKitPids.find(pid) == internalKitPids.end())
|
|
{
|
|
// Check if this is our kit process (forked from our ForKit process)
|
|
if (Util::getStatFromPid(pid, 3) == (size_t)_forKitPid)
|
|
mapKitsLost.insert(std::pair<pid_t, std::time_t>(pid, std::time(nullptr)));
|
|
}
|
|
else
|
|
mapKitsLost.erase(pid);
|
|
}
|
|
|
|
for (auto itLost = mapKitsLost.begin(); itLost != mapKitsLost.end();)
|
|
{
|
|
if (std::time(nullptr) - itLost->second > (time_t)gracePeriod)
|
|
{
|
|
pid = itLost->first;
|
|
if (::kill(pid, 0) == 0)
|
|
{
|
|
if (::kill(pid, SIGKILL) == -1)
|
|
LOG_ERR("Detected lost kit [" << pid << "]. Failed to send SIGKILL.");
|
|
else
|
|
{
|
|
lostKitsTerminated ++;
|
|
LOG_ERR("Detected lost kit [" << pid << "]. Sent SIGKILL for termination.");
|
|
}
|
|
}
|
|
|
|
itLost = mapKitsLost.erase(itLost);
|
|
}
|
|
else
|
|
itLost ++;
|
|
}
|
|
|
|
if (lostKitsTerminated)
|
|
Admin::instance().addLostKitsTerminated(lostKitsTerminated);
|
|
}
|
|
|
|
void Admin::dumpState(std::ostream& os) const
|
|
{
|
|
// FIXME: be more helpful ...
|
|
SocketPoll::dumpState(os);
|
|
}
|
|
|
|
|
|
MonitorSocketHandler::MonitorSocketHandler(Admin *admin, const std::string &uri) :
|
|
AdminSocketHandler(admin),
|
|
_connecting(true),
|
|
_uri(uri)
|
|
{
|
|
}
|
|
|
|
int MonitorSocketHandler::getPollEvents(std::chrono::steady_clock::time_point now,
|
|
int64_t &timeoutMaxMicroS)
|
|
{
|
|
if (_connecting)
|
|
{
|
|
LOG_TRC("Waiting for outbound connection to complete");
|
|
return POLLOUT;
|
|
}
|
|
else
|
|
return AdminSocketHandler::getPollEvents(now, timeoutMaxMicroS);
|
|
}
|
|
|
|
void MonitorSocketHandler::performWrites(std::size_t capacity)
|
|
{
|
|
LOG_TRC("Outbound monitor - connected");
|
|
_connecting = false;
|
|
return AdminSocketHandler::performWrites(capacity);
|
|
}
|
|
|
|
void MonitorSocketHandler::onDisconnect()
|
|
{
|
|
bool reconnect = false;
|
|
// schedule monitor reconnect only if monitor uri exist in configuration
|
|
for (const auto& monitor : Admin::instance().getMonitorList())
|
|
{
|
|
const std::string uriWithoutParam = _uri.substr(0, _uri.find('?'));
|
|
if (Util::iequal(monitor.first, uriWithoutParam))
|
|
{
|
|
LOG_ERR("Monitor " << _uri << " dis-connected, re-trying in " << monitor.second << " seconds");
|
|
Admin::instance().scheduleMonitorConnect(
|
|
_uri, std::chrono::steady_clock::now() + std::chrono::seconds(monitor.second));
|
|
Admin::instance().deleteMonitorSocket(uriWithoutParam);
|
|
reconnect = true;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!reconnect)
|
|
LOG_TRC("Remove monitor " << _uri);
|
|
}
|
|
|
|
void Admin::connectToMonitorSync(const std::string &uri)
|
|
{
|
|
const std::string uriWithoutParam = uri.substr(0, uri.find('?'));
|
|
if (_monitorSockets.find(uriWithoutParam) != _monitorSockets.end())
|
|
{
|
|
LOG_TRC("Monitor connection with uri:" << uri << " already exist");
|
|
return;
|
|
}
|
|
|
|
LOG_TRC("Add monitor " << uri);
|
|
static const bool logMonitorConnect =
|
|
COOLWSD::getConfigValue<bool>("admin_console.logging.monitor_connect", true);
|
|
if (logMonitorConnect)
|
|
{
|
|
LOG_ANY("Connected to remote monitor with uri [" << uriWithoutParam << ']');
|
|
}
|
|
|
|
auto handler = std::make_shared<MonitorSocketHandler>(this, uri);
|
|
_monitorSockets.insert({uriWithoutParam, handler});
|
|
insertNewWebSocketSync(Poco::URI(uri), handler);
|
|
AdminSocketHandler::subscribeAsync(handler);
|
|
}
|
|
|
|
void Admin::scheduleMonitorConnect(const std::string &uri, std::chrono::steady_clock::time_point when)
|
|
{
|
|
ASSERT_CORRECT_THREAD();
|
|
|
|
MonitorConnectRecord todo;
|
|
todo.setWhen(when);
|
|
todo.setUri(uri);
|
|
_pendingConnects.push_back(todo);
|
|
}
|
|
|
|
void Admin::getMetrics(std::ostringstream &metrics)
|
|
{
|
|
size_t memAvail = getTotalAvailableMemory();
|
|
size_t memUsed = getTotalMemoryUsage();
|
|
|
|
metrics << "global_host_system_memory_bytes " << _totalSysMemKb * 1024 << std::endl;
|
|
metrics << "global_memory_available_bytes " << memAvail * 1024 << std::endl;
|
|
metrics << "global_memory_used_bytes " << memUsed * 1024 << std::endl;
|
|
metrics << "global_memory_free_bytes " << (memAvail - memUsed) * 1024 << std::endl;
|
|
metrics << std::endl;
|
|
|
|
_model.getMetrics(metrics);
|
|
}
|
|
|
|
void Admin::sendMetrics(const std::shared_ptr<StreamSocket>& socket,
|
|
const std::shared_ptr<http::Response>& response)
|
|
{
|
|
std::ostringstream oss;
|
|
getMetrics(oss);
|
|
|
|
response->add("Connection", "close");
|
|
response->setBody(oss.str(), "text/plain");
|
|
|
|
socket->send(*response);
|
|
socket->shutdown();
|
|
|
|
static bool skipAuthentication =
|
|
COOLWSD::getConfigValue<bool>("security.enable_metrics_unauthenticated", false);
|
|
static bool showLog =
|
|
COOLWSD::getConfigValue<bool>("admin_console.logging.metrics_fetch", true);
|
|
if (!skipAuthentication && showLog)
|
|
{
|
|
LOG_ANY("Metrics endpoint has been accessed by source IPAddress [" << socket->clientAddress() << ']');
|
|
}
|
|
}
|
|
|
|
void Admin::start()
|
|
{
|
|
startMonitors();
|
|
startThread();
|
|
}
|
|
|
|
std::vector<std::pair<std::string, int>> Admin::getMonitorList()
|
|
{
|
|
const auto& config = Application::instance().config();
|
|
std::vector<std::pair<std::string, int>> monitorList;
|
|
for (size_t i = 0;; ++i)
|
|
{
|
|
const std::string path = "monitors.monitor[" + std::to_string(i) + ']';
|
|
const std::string uri = config.getString(path, "");
|
|
const auto retryInterval = COOLWSD::getConfigValue<int>(path + "[@retryInterval]", 20);
|
|
if (!config.has(path))
|
|
break;
|
|
if (!uri.empty())
|
|
{
|
|
Poco::URI monitor(uri);
|
|
if (monitor.getScheme() == "wss" || monitor.getScheme() == "ws")
|
|
monitorList.push_back(std::make_pair(uri, retryInterval));
|
|
else
|
|
LOG_ERR("Unhandled monitor URI: '" << uri << "' should be \"wss://foo:1234/baa\"");
|
|
}
|
|
}
|
|
return monitorList;
|
|
}
|
|
|
|
void Admin::startMonitors()
|
|
{
|
|
bool haveMonitors = false;
|
|
for (const auto& monitor : getMonitorList())
|
|
{
|
|
addCallback(
|
|
[this, monitor]
|
|
{
|
|
scheduleMonitorConnect(monitor.first + "?ServerId=" + Util::getProcessIdentifier(),
|
|
std::chrono::steady_clock::now());
|
|
});
|
|
haveMonitors = true;
|
|
}
|
|
|
|
if (!haveMonitors)
|
|
LOG_TRC("No monitors configured.");
|
|
}
|
|
|
|
void Admin::updateMonitors(std::vector<std::pair<std::string,int>>& oldMonitors)
|
|
{
|
|
if (oldMonitors.empty())
|
|
{
|
|
startMonitors();
|
|
return;
|
|
}
|
|
|
|
std::unordered_map<std::string, bool> currentMonitorMap;
|
|
for (const auto& monitor : getMonitorList())
|
|
{
|
|
currentMonitorMap[monitor.first] = true;
|
|
}
|
|
|
|
// shutdown monitors which doesnot not exist in currentMonitorMap
|
|
for (const auto& monitor : oldMonitors)
|
|
{
|
|
if (!currentMonitorMap[monitor.first])
|
|
{
|
|
auto socketHandler = _monitorSockets[monitor.first];
|
|
if (socketHandler != nullptr)
|
|
{
|
|
socketHandler->shutdown();
|
|
_monitorSockets.erase(monitor.first);
|
|
}
|
|
}
|
|
}
|
|
|
|
startMonitors();
|
|
}
|
|
|
|
void Admin::deleteMonitorSocket(const std::string& uriWithoutParam)
|
|
{
|
|
if (_monitorSockets.find(uriWithoutParam) != _monitorSockets.end())
|
|
{
|
|
_monitorSockets.erase(uriWithoutParam);
|
|
}
|
|
}
|
|
|
|
void Admin::stop()
|
|
{
|
|
joinThread();
|
|
}
|
|
|
|
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */
|