thorsoapcall.cpp 82 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241
  1. /*##############################################################################
  2. HPCC SYSTEMS software Copyright (C) 2012 HPCC Systems®.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. ############################################################################## */
  13. #include "jliball.hpp"
  14. #include "jqueue.tpp"
  15. #include "jisem.hpp"
  16. #include "rtlformat.hpp"
  17. #include "thorxmlread.hpp"
  18. #include "thorxmlwrite.hpp"
  19. #include "thorcommon.ipp"
  20. #include "thorsoapcall.hpp"
  21. #include "securesocket.hpp"
  22. #include "eclrtl.hpp"
  23. #include "roxiemem.hpp"
  24. #include "zcrypt.hpp"
  25. using roxiemem::OwnedRoxieString;
  26. #ifndef _WIN32
  27. #include <stdexcept>
  28. #endif
  29. #include <new>
  30. #define CONTENT_LENGTH "Content-Length: "
  31. #define CONTENT_ENCODING "Content-Encoding"
  32. #define ACCEPT_ENCODING "Accept-Encoding"
  33. unsigned soapTraceLevel = 1;
  34. #define WSCBUFFERSIZE 0x10000
  35. #define MAXWSCTHREADS 50 //Max Web Service Call Threads
  36. void multiLog(const IContextLogger &logger, const char *format, ...) __attribute__((format(printf, 2, 3)));
  37. void multiLog(const IContextLogger &logger, const char *format, ...)
  38. {
  39. va_list args;
  40. va_start(args, format);
  41. StringBuffer log;
  42. log.limited_valist_appendf(1024*1024, format, args);
  43. va_end(args);
  44. StringArray loglines;
  45. log.replace('\r', ' ');
  46. loglines.appendList(log, "\n", false);
  47. ForEachItemIn(idx, loglines)
  48. {
  49. logger.CTXLOG("%s", loglines.item(idx));
  50. }
  51. }
  52. interface DECL_EXCEPTION IReceivedRoxieException : extends IException
  53. {
  54. public:
  55. virtual const void *errorRow() = 0;
  56. };
  57. #define EXCEPTION_PREFIX "ReceivedRoxieException:"
  58. class DECL_EXCEPTION ReceivedRoxieException: public IReceivedRoxieException, public CInterface
  59. {
  60. public:
  61. IMPLEMENT_IINTERFACE;
  62. ReceivedRoxieException(int code, const char *_msg, const void *_row=NULL) : errcode(code), msg(_msg), row(_row) { };
  63. int errorCode() const { return (errcode); };
  64. StringBuffer & errorMessage(StringBuffer &str) const
  65. {
  66. if (strncmp(str.str(), EXCEPTION_PREFIX, strlen(EXCEPTION_PREFIX)) == 0)
  67. str.append(msg);
  68. else
  69. str.append(EXCEPTION_PREFIX).append(" (").append(msg).append(")");
  70. return str;
  71. };
  72. MessageAudience errorAudience() const { return (MSGAUD_user); };
  73. const void *errorRow() { return (row); };
  74. private:
  75. int errcode;
  76. StringAttr msg;
  77. const void *row;
  78. };
  79. //=================================================================================================
  80. class Url : public CInterface, implements IInterface
  81. {
  82. public:
  83. IMPLEMENT_IINTERFACE;
  84. StringAttr method;
  85. StringAttr host;
  86. unsigned port;
  87. StringBuffer path;
  88. StringBuffer userPasswordPair;
  89. StringBuffer &getUrlString(StringBuffer &url) const
  90. {
  91. return url.append(method).append("://").append(host).append(":").append(port).append(path);
  92. }
  93. IException *getUrlException(IException *e) const
  94. {
  95. StringBuffer url;
  96. StringBuffer text;
  97. e->errorMessage(text);
  98. rtlAddExceptionTag(text, "url", getUrlString(url).str());
  99. if (text.length() <= 1024)
  100. return MakeStringException(e->errorCode(), "%s", text.str());
  101. else
  102. return MakeStringExceptionDirect(e->errorCode(), text.str());
  103. }
  104. Url() : port(0)
  105. {
  106. }
  107. private:
  108. char translateHex(char hex) {
  109. if(hex >= 'A')
  110. return (hex & 0xdf) - 'A' + 10;
  111. else
  112. return hex - '0';
  113. }
  114. void userPassword_decode(const char* userpass, StringBuffer& result)
  115. {
  116. if(!userpass || !*userpass)
  117. return;
  118. const char *finger = userpass;
  119. while (*finger)
  120. {
  121. char c = *finger++;
  122. if (c == '%')
  123. {
  124. if(*finger != '\0')
  125. {
  126. c = translateHex(*finger);
  127. finger++;
  128. }
  129. if(*finger != '\0')
  130. {
  131. c = (char)(c*16 + translateHex(*finger));
  132. finger++;
  133. }
  134. }
  135. result.append(c);
  136. }
  137. return;
  138. }
  139. void cleanPath(const char *src, StringBuffer &output)
  140. {
  141. const char *srcPtr = src;
  142. char *dst = output.reserveTruncate(strlen(src));
  143. char *dstPtr = dst;
  144. while (*srcPtr)
  145. {
  146. *dstPtr++ = *srcPtr;
  147. if ('/' == *srcPtr++)
  148. {
  149. while ('/' == *srcPtr)
  150. ++srcPtr;
  151. }
  152. }
  153. *dstPtr = '\0';
  154. output.setLength(dstPtr-dst);
  155. }
  156. public:
  157. Url(char *urltext)
  158. {
  159. char *p;
  160. if ((p = strstr(urltext, "://")) != NULL)
  161. {
  162. *p = 0;
  163. p += 3; // skip past the colon-slash-slash
  164. method.set(urltext);
  165. urltext = p;
  166. }
  167. else
  168. throw MakeStringException(-1, "Malformed URL");
  169. if ((p = strchr(urltext, '@')) != NULL)
  170. {
  171. // extract username & password
  172. *p = 0;
  173. p++;
  174. userPassword_decode(urltext, userPasswordPair);
  175. urltext = p;
  176. }
  177. if ((p = strchr(urltext, ':')) != NULL)
  178. {
  179. // extract the port
  180. *p = 0;
  181. p++;
  182. port = atoi(p);
  183. host.set(urltext);
  184. if ((p = strchr(p, '/')) != NULL)
  185. cleanPath(p, path);
  186. else
  187. path.append("/");
  188. }
  189. else
  190. {
  191. // no port - look at method for port
  192. if (stricmp(method.str(), "https") == 0)
  193. port = 443;
  194. else if (stricmp(method.str(), "http") == 0)
  195. port = 80;
  196. else
  197. throw MakeStringException(-1, "Unsupported access method");
  198. if ((p = strchr(urltext, '/')) != NULL)
  199. {
  200. *p = 0;
  201. host.set(urltext);
  202. *p = '/';
  203. cleanPath(p, path);
  204. }
  205. else
  206. {
  207. host.set(urltext);
  208. path.append("/");
  209. }
  210. }
  211. // While the code below would make some sense, there is code that relies on being able to use invalid IP addresses and catching the
  212. // errors that result via ONFAIL.
  213. #if 0
  214. IpAddress ipaddr(host);
  215. if ( ipaddr.isNull())
  216. throw MakeStringException(-1, "Invalid IP address %s", host.str());
  217. #endif
  218. }
  219. };
  220. typedef IArrayOf<Url> UrlArray;
  221. //=================================================================================================
  222. //MORE: This whole class should really be replaced with a single function, avoiding at least one string clone.
  223. class UrlListParser
  224. {
  225. public:
  226. UrlListParser(const char * text)
  227. {
  228. fullText = text ? strdup(text) : NULL;
  229. }
  230. ~UrlListParser()
  231. {
  232. free(fullText);
  233. }
  234. unsigned getUrls(UrlArray &array)
  235. {
  236. if (fullText)
  237. {
  238. char *copyFullText = strdup(fullText);
  239. char *saveptr;
  240. char *url = strtok_r(copyFullText, "|", &saveptr);
  241. while (url != NULL)
  242. {
  243. array.append(*new Url(url));
  244. url = strtok_r(NULL, "|", &saveptr);
  245. }
  246. free(copyFullText);
  247. }
  248. return array.ordinality();
  249. }
  250. private:
  251. char *fullText;
  252. };
  253. //=================================================================================================
  254. #define BLACKLIST_RETRIES 10
  255. #define ROXIE_ABORT_EVENT 1407
  256. #define TIMELIMIT_EXCEEDED 1408
  257. class BlackLister : public CInterface, implements IThreadFactory
  258. {
  259. SocketEndpointArray list;
  260. Owned<IThreadPool> pool;
  261. CriticalSection crit;
  262. private:
  263. inline void checkRoxieAbortMonitor(IRoxieAbortMonitor * roxieAbortMonitor)
  264. {
  265. if (roxieAbortMonitor)
  266. {
  267. try
  268. {
  269. roxieAbortMonitor->checkForAbort();//throws
  270. }
  271. catch (IException *e)
  272. {
  273. StringBuffer s;
  274. e->errorMessage(s);
  275. e->Release();
  276. throw MakeStringException(ROXIE_ABORT_EVENT, "%s", s.str());
  277. }
  278. }
  279. }
  280. public:
  281. bool lookup(SocketEndpoint &ep, const IContextLogger &logctx)
  282. {
  283. CriticalBlock b(crit);
  284. if (list.find(ep)!=NotFound)
  285. {
  286. if (soapTraceLevel > 3)
  287. {
  288. StringBuffer s;
  289. logctx.CTXLOG("socket %s is blacklisted", ep.getUrlStr(s).str());
  290. }
  291. return true;
  292. }
  293. return false;
  294. }
  295. void blacklist(SocketEndpoint &ep, const IContextLogger &logctx)
  296. {
  297. CriticalBlock b(crit);
  298. if (list.find(ep)==NotFound)
  299. {
  300. if (soapTraceLevel > 0)
  301. {
  302. StringBuffer s;
  303. logctx.CTXLOG("Blacklisting socket %s", ep.getUrlStr(s).str());
  304. }
  305. list.append(ep);
  306. pool->start(&ep);
  307. }
  308. }
  309. void deblacklist(SocketEndpoint &ep)
  310. {
  311. CriticalBlock b(crit);
  312. unsigned idx = list.find(ep);
  313. if (idx!=NotFound)
  314. {
  315. if (soapTraceLevel > 0)
  316. {
  317. StringBuffer s;
  318. DBGLOG("De-blacklisting socket %s", ep.getUrlStr(s).str());
  319. }
  320. list.remove(idx);
  321. }
  322. }
  323. public:
  324. IMPLEMENT_IINTERFACE;
  325. BlackLister()
  326. {
  327. pool.setown(createThreadPool("SocketBlacklistPool", this, NULL, 0, 0));
  328. }
  329. ISocket* connect(SocketEndpoint &ep,
  330. const IContextLogger &logctx,
  331. unsigned retries,
  332. unsigned timeoutMS,
  333. IRoxieAbortMonitor * roxieAbortMonitor)
  334. {
  335. if (lookup(ep, logctx))
  336. {
  337. StringBuffer s;
  338. ep.getUrlStr(s);
  339. throw MakeStringException(-1, "blacklisted socket %s", s.str());
  340. }
  341. Owned<IException> exc;
  342. try
  343. {
  344. checkRoxieAbortMonitor(roxieAbortMonitor);
  345. Owned<ISocket> sock;
  346. Owned<ISocketConnectWait> scw = nonBlockingConnect(ep, timeoutMS == WAIT_FOREVER ? 60000 : timeoutMS*(retries+1));
  347. for (;;)
  348. {
  349. sock.setown(scw->wait(1000));//throws if connect fails or timeoutMS
  350. checkRoxieAbortMonitor(roxieAbortMonitor);
  351. if (sock)
  352. return sock.getLink();
  353. }
  354. }
  355. catch (IJSOCK_Exception *e)
  356. {
  357. EXCLOG(e,"BlackLister::connect");
  358. if (exc)
  359. e->Release();
  360. else
  361. exc.setown(e);
  362. }
  363. blacklist(ep, logctx);
  364. if (exc->errorCode()==JSOCKERR_connection_failed) {
  365. StringBuffer s;
  366. ep.getUrlStr(s);
  367. throw MakeStringException(JSOCKERR_connection_failed, "connection failed %s", s.str());
  368. }
  369. throw exc.getClear();
  370. return NULL;
  371. }
  372. bool blacklisted (unsigned short port, char const* host)
  373. {
  374. SocketEndpoint ep(host, port);
  375. return (list.find(ep)!=NotFound);
  376. }
  377. ISocket* connect(unsigned short port,
  378. char const* host,
  379. const IContextLogger &logctx,
  380. unsigned retries,
  381. unsigned timeoutMS,
  382. IRoxieAbortMonitor * roxieAbortMonitor )
  383. {
  384. SocketEndpoint ep(host, port);
  385. return connect(ep, logctx, retries, timeoutMS, roxieAbortMonitor);
  386. }
  387. virtual IPooledThread *createNew()
  388. {
  389. class SocketDeblacklister : public CInterface, implements IPooledThread
  390. {
  391. SocketEndpoint ep;
  392. BlackLister &parent;
  393. Semaphore stopped;
  394. public:
  395. IMPLEMENT_IINTERFACE;
  396. SocketDeblacklister(BlackLister &_parent): parent(_parent)
  397. {
  398. }
  399. ~SocketDeblacklister()
  400. {
  401. }
  402. virtual void init(void *param) override
  403. {
  404. ep.set(*(SocketEndpoint *) param);
  405. }
  406. virtual void threadmain() override
  407. {
  408. unsigned delay = 5000;
  409. for (unsigned i = 0; i < BLACKLIST_RETRIES; i++)
  410. {
  411. try
  412. {
  413. Owned<ISocket> s = ISocket::connect_timeout(ep, 10000);
  414. s->close();
  415. break;
  416. }
  417. catch (IJSOCK_Exception *E)
  418. {
  419. // EXCLOG(E, "While updating socket blacklist"); // MORE - may need to downgrade if this fires traps
  420. E->Release();
  421. if (stopped.wait(delay))
  422. return;
  423. delay += delay;
  424. }
  425. }
  426. parent.deblacklist(ep);
  427. }
  428. virtual bool stop() override
  429. {
  430. stopped.signal();
  431. return true;
  432. }
  433. virtual bool canReuse() const override { return true; }
  434. };
  435. return new SocketDeblacklister(*this);
  436. }
  437. void stop()
  438. {
  439. pool->stopAll();
  440. }
  441. } *blacklist;
  442. MODULE_INIT(INIT_PRIORITY_STANDARD)
  443. {
  444. blacklist = new BlackLister;
  445. return true;
  446. }
  447. MODULE_EXIT()
  448. {
  449. blacklist->stop();
  450. delete blacklist;
  451. }
  452. //=================================================================================================
  453. class ColumnProvider : public IColumnProvider, public CInterface
  454. {
  455. public:
  456. ColumnProvider(unsigned _callLatencyMs) : callLatencyMs(_callLatencyMs), base(NULL) {}
  457. IMPLEMENT_IINTERFACE;
  458. virtual bool getBool(const char * path) { return base->getBool(path); }
  459. virtual void getData(size32_t len, void * text, const char * path) { base->getData(len, text, path); }
  460. virtual void getDataX(size32_t & len, void * & text, const char * path) { base->getDataX(len, text, path); }
  461. virtual __int64 getInt(const char * path)
  462. {
  463. __int64 ret = base->getInt(path);
  464. if((ret==0) && path && *path=='_')
  465. {
  466. if (stricmp(path, "_call_latency_ms")==0)
  467. ret = callLatencyMs;
  468. else if (stricmp(path, "_call_latency")==0)
  469. ret = (callLatencyMs + 500) / 1000;
  470. }
  471. return ret;
  472. }
  473. virtual __uint64 getUInt(const char * path)
  474. {
  475. __uint64 ret = base->getUInt(path);
  476. if((ret==0) && path && *path=='_')
  477. {
  478. if (stricmp(path, "_call_latency_ms")==0)
  479. ret = callLatencyMs;
  480. else if (stricmp(path, "_call_latency")==0)
  481. ret = (callLatencyMs + 500) / 1000;
  482. }
  483. return ret;
  484. }
  485. virtual void getQString(size32_t len, char * text, const char * path) { base->getQString(len, text, path); }
  486. virtual void getString(size32_t len, char * text, const char * path) { base->getString(len, text, path); }
  487. virtual void getStringX(size32_t & len, char * & text, const char * path) { base->getStringX(len, text, path); }
  488. virtual void getUnicodeX(size32_t & len, UChar * & text, const char * path) { base->getUnicodeX(len, text, path); }
  489. virtual bool getIsSetAll(const char * path) { return base->getIsSetAll(path); }
  490. virtual IColumnProviderIterator * getChildIterator(const char * path) { return base->getChildIterator(path); }
  491. virtual void getUtf8X(size32_t & len, char * & text, const char * path) { base->getUtf8X(len, text, path); }
  492. virtual bool readBool(const char * path, bool _default) { return base->readBool(path, _default); }
  493. virtual void readData(size32_t len, void * text, const char * path, size32_t _lenDefault, const void * _default) { base->readData(len, text, path, _lenDefault, _default); }
  494. virtual void readDataX(size32_t & len, void * & text, const char * path, size32_t _lenDefault, const void * _default) { base->readDataX(len, text, path, _lenDefault, _default); }
  495. virtual __int64 readInt(const char * path, __int64 _default)
  496. {
  497. if(path && *path=='_')
  498. {
  499. if (stricmp(path, "_call_latency_ms")==0)
  500. return callLatencyMs;
  501. else if (stricmp(path, "_call_latency")==0)
  502. return (callLatencyMs + 500) / 1000;
  503. }
  504. return base->readInt(path, _default);
  505. }
  506. virtual __uint64 readUInt(const char * path, __uint64 _default)
  507. {
  508. if(path && *path=='_')
  509. {
  510. if (stricmp(path, "_call_latency_ms")==0)
  511. return callLatencyMs;
  512. else if (stricmp(path, "_call_latency")==0)
  513. return (callLatencyMs + 500) / 1000;
  514. }
  515. return base->readUInt(path, _default);
  516. }
  517. virtual void readQString(size32_t len, char * text, const char * path, size32_t _lenDefault, const char * _default) { base->readQString(len, text, path, _lenDefault, _default); }
  518. virtual void readString(size32_t len, char * text, const char * path, size32_t _lenDefault, const char * _default) { base->readString(len, text, path, _lenDefault, _default); }
  519. virtual void readStringX(size32_t & len, char * & text, const char * path, size32_t _lenDefault, const char * _default) { base->readStringX(len, text, path, _lenDefault, _default); }
  520. virtual void readUnicodeX(size32_t & len, UChar * & text, const char * path, size32_t _lenDefault, const UChar * _default) { base->readUnicodeX(len, text, path, _lenDefault, _default); }
  521. virtual bool readIsSetAll(const char * path, bool _default) { return base->readIsSetAll(path, _default); }
  522. virtual void readUtf8X(size32_t & len, char * & text, const char * path, size32_t _lenDefault, const char * _default) { base->readUtf8X(len, text, path, _lenDefault, _default); }
  523. void setBase(IColumnProvider * _base) { base = _base; }
  524. virtual void getDataRaw(size32_t len, void * text, const char * path) { base->getDataRaw(len, text, path); }
  525. virtual void getDataRawX(size32_t & len, void * & text, const char * path) { base->getDataRawX(len, text, path); }
  526. virtual void readDataRaw(size32_t len, void * text, const char * path, size32_t _lenDefault, const void * _default) { base->readDataRaw(len, text, path, _lenDefault, _default); }
  527. virtual void readDataRawX(size32_t & len, void * & text, const char * path, size32_t _lenDefault, const void * _default) { base->readDataRawX(len, text, path, _lenDefault, _default); }
  528. protected:
  529. IColumnProvider * base;
  530. private:
  531. unsigned callLatencyMs;
  532. };
  533. //=================================================================================================
  534. //Same as ColumnProvider, except returns data as hex64Binary instead of 16 bit hex
  535. class ColumnProviderData64 : public ColumnProvider
  536. {
  537. public:
  538. ColumnProviderData64(unsigned _callLatencyMs) : ColumnProvider(_callLatencyMs) {}
  539. virtual void getData(size32_t len, void * text, const char * path) { ColumnProvider::getDataRaw(len, text, path); }
  540. virtual void getDataX(size32_t & len, void * & text, const char * path) { ColumnProvider::getDataRawX(len, text, path); }
  541. virtual void readData(size32_t len, void * text, const char * path, size32_t _lenDefault, const void * _default) { ColumnProvider::readDataRaw(len, text, path, _lenDefault, _default); }
  542. virtual void readDataX(size32_t len, void * text, const char * path, size32_t _lenDefault, const void * _default) { ColumnProvider::readDataRawX(len, text, path, _lenDefault, _default); }
  543. };
  544. //=================================================================================================
  545. IColumnProvider * CreateColumnProvider(unsigned _callLatencyMs, bool _encoding)
  546. {
  547. if (!_encoding)
  548. return new ColumnProvider(_callLatencyMs);
  549. else
  550. return new ColumnProviderData64(_callLatencyMs);
  551. }
  552. //=================================================================================================
  553. enum WSCType{STsoap, SThttp} ; //web service call type
  554. //Web Services Call Asynchronous For
  555. interface IWSCAsyncFor: public IInterface
  556. {
  557. virtual void processException(const Url &url, const void *row, IException *e) = 0;
  558. virtual void processException(const Url &url, ConstPointerArray &inputRows, IException *e) = 0;
  559. virtual void checkTimeLimitExceeded(unsigned * _remainingMS) = 0;
  560. virtual void createHttpRequest(Url &url, StringBuffer &request) = 0;
  561. virtual int readHttpResponse(StringBuffer &response, ISocket *socket) = 0;
  562. virtual void processResponse(Url &url, StringBuffer &response, ColumnProvider * meta) = 0;
  563. virtual const char *getResponsePath() = 0;
  564. virtual ConstPointerArray & getInputRows() = 0;
  565. virtual IWSCHelper * getMaster() = 0;
  566. virtual IEngineRowAllocator * getOutputAllocator() = 0;
  567. virtual void For(unsigned num,unsigned maxatonce,bool abortFollowingException=false,bool shuffled=false) = 0;
  568. virtual void Do(unsigned idx=0)=0;
  569. };
  570. class CWSCHelper;
  571. IWSCAsyncFor * createWSCAsyncFor(CWSCHelper * _master, IXmlWriterExt &_xmlWriter, ConstPointerArray &_inputRows, PTreeReaderOptions _options);
  572. //=================================================================================================
  573. #define CBExceptionPathExc 0x0001
  574. #define CBExceptionPathExcsExc 0x0002
  575. #define CBExceptionPathExcs 0x0004
  576. class CMatchCB : implements IXMLSelect, public CInterface
  577. {
  578. IWSCAsyncFor &parent;
  579. const Url &url;
  580. StringAttr tail;
  581. ColumnProvider * meta;
  582. StringAttr excPath;
  583. unsigned excFlags = 0;
  584. public:
  585. IMPLEMENT_IINTERFACE;
  586. CMatchCB(IWSCAsyncFor &_parent, const Url &_url, const char *_tail, ColumnProvider * _meta, const char *_excPath, unsigned _excFlags) : parent(_parent), url(_url), tail(_tail), meta(_meta), excFlags(_excFlags), excPath(_excPath)
  587. {
  588. }
  589. bool checkGetExceptionEntry(bool check, Owned<IColumnProviderIterator> &excIter, IColumnProvider &parent, IColumnProvider *&excEntry, const char *path)
  590. {
  591. if (!check)
  592. return false;
  593. excIter.setown(parent.getChildIterator(path));
  594. excEntry = excIter->first();
  595. return excEntry != nullptr;
  596. }
  597. IColumnProvider *getExceptionEntry(Owned<IColumnProviderIterator> &excIter, IColumnProvider &parent)
  598. {
  599. IColumnProvider *excEntry = nullptr;
  600. if (excPath.length())
  601. {
  602. checkGetExceptionEntry(true, excIter, parent, excEntry, excPath.str()); //set by user so don't try others
  603. return excEntry;
  604. }
  605. if (checkGetExceptionEntry((excFlags & CBExceptionPathExc)!=0, excIter, parent, excEntry, "Exception"))
  606. return excEntry;
  607. if (checkGetExceptionEntry((excFlags & CBExceptionPathExcsExc)!=0, excIter, parent, excEntry, "Exceptions/Exception")) //ESP xml array
  608. return excEntry;
  609. checkGetExceptionEntry((excFlags & CBExceptionPathExcs)!=0, excIter, parent, excEntry, "Exceptions"); //json array
  610. return excEntry;
  611. }
  612. virtual void match(IColumnProvider &entry, offset_t startOffset, offset_t endOffset)
  613. {
  614. Owned<IException> e;
  615. if (tail.length()||excPath.length())
  616. {
  617. StringBuffer path(parent.getResponsePath());
  618. unsigned idx = (unsigned)entry.getInt(path.append("/@sequence").str());
  619. Owned<IColumnProviderIterator> excIter;
  620. IColumnProvider *excptEntry = getExceptionEntry(excIter, entry);
  621. if (excptEntry)
  622. {
  623. int code = (int)excptEntry->getInt("Code");
  624. size32_t len;
  625. char *message;
  626. excptEntry->getStringX(len, message, "Message");
  627. StringBuffer mstr(len, message);
  628. rtlFree(message);
  629. DBGLOG("Roxie exception: %s", mstr.str());
  630. e.setown(new ReceivedRoxieException(code, mstr.str()));
  631. parent.processException(url, parent.getInputRows().item(idx), e.getLink());
  632. }
  633. }
  634. if (parent.getMaster()->getRowTransformer() && !e)
  635. {
  636. IEngineRowAllocator * outputAllocator = parent.getOutputAllocator();
  637. Owned<IColumnProviderIterator> iter = entry.getChildIterator(tail);
  638. IColumnProvider *rowEntry = iter->first();
  639. while (rowEntry)
  640. {
  641. RtlDynamicRowBuilder rowBuilder(outputAllocator);
  642. size32_t sizeGot;
  643. if(meta)
  644. {
  645. meta->setBase(rowEntry);
  646. sizeGot = parent.getMaster()->transformRow(rowBuilder, meta);
  647. }
  648. else
  649. {
  650. sizeGot = parent.getMaster()->transformRow(rowBuilder, rowEntry);
  651. }
  652. if (sizeGot > 0)
  653. parent.getMaster()->putRow(rowBuilder.finalizeRowClear(sizeGot));
  654. rowEntry = iter->next();
  655. }
  656. }
  657. }
  658. };
  659. //=================================================================================================
  660. bool isValidHttpValue(char const * in)
  661. {
  662. for (const byte * ptr = (byte*)in; *ptr; ++ptr)
  663. if (((*ptr <= '\x1F') && (*ptr != '\x09')) || (*ptr == '\x7F'))
  664. return false;
  665. return true;
  666. }
  667. //=================================================================================================
  668. //Web Service Call helper thread
  669. class CWSCHelperThread : public Thread
  670. {
  671. private:
  672. CWSCHelper * master;
  673. virtual void outputRows(IXmlWriterExt &xmlWriter, ConstPointerArray &inputRows, const char *itemtag=NULL, bool encode_off=false, char const * itemns = NULL);
  674. virtual void createESPQuery(IXmlWriterExt &xmlWriter, ConstPointerArray &inputRows);
  675. virtual void createSOAPliteralOrEncodedQuery(IXmlWriterExt &xmlWriter, ConstPointerArray &inputRows);
  676. virtual void createXmlSoapQuery(IXmlWriterExt &xmlWriter, ConstPointerArray &inputRows);
  677. virtual void createHttpPostQuery(IXmlWriterExt &xmlWriter, ConstPointerArray &inputRows, bool appendRequestToName, bool appendEncodeFlag);
  678. virtual void processQuery(ConstPointerArray &inputRows);
  679. //Thread
  680. virtual int run();
  681. public:
  682. CWSCHelperThread(CWSCHelper * _master) : Thread("CWSCHelperThread")
  683. {
  684. master = _master;
  685. }
  686. ~CWSCHelperThread()
  687. {
  688. }
  689. };
  690. //=================================================================================================
  691. class CWSCHelper : implements IWSCHelper, public CInterface
  692. {
  693. private:
  694. SimpleInterThreadQueueOf<const void, true> outputQ;
  695. SpinLock outputQLock;
  696. CriticalSection toXmlCrit, transformCrit, onfailCrit, timeoutCrit;
  697. unsigned done;
  698. Owned<IPropertyTree> xpathHints;
  699. Linked<ClientCertificate> clientCert;
  700. static CriticalSection secureContextCrit;
  701. static Owned<ISecureSocketContext> secureContext;
  702. CTimeMon timeLimitMon;
  703. bool complete, timeLimitExceeded;
  704. IRoxieAbortMonitor * roxieAbortMonitor;
  705. protected:
  706. CIArrayOf<CWSCHelperThread> threads;
  707. WSCType wscType;
  708. public:
  709. IMPLEMENT_IINTERFACE;
  710. CWSCHelper(IWSCRowProvider *_rowProvider, IEngineRowAllocator * _outputAllocator, const char *_authToken, WSCMode _wscMode, ClientCertificate *_clientCert, const IContextLogger &_logctx, IRoxieAbortMonitor *_roxieAbortMonitor, WSCType _wscType)
  711. : logctx(_logctx), outputAllocator(_outputAllocator), clientCert(_clientCert), roxieAbortMonitor(_roxieAbortMonitor)
  712. {
  713. wscMode = _wscMode;
  714. wscType = _wscType;
  715. done = 0;
  716. complete = aborted = timeLimitExceeded = false;
  717. rowProvider = _rowProvider;
  718. helper = rowProvider->queryActionHelper();
  719. callHelper = rowProvider->queryCallHelper();
  720. flags = helper->getFlags();
  721. OwnedRoxieString s;
  722. authToken.append(_authToken);
  723. if (helper->numRetries() < 0)
  724. maxRetries = 3; // default to 3 retries
  725. else
  726. maxRetries = helper->numRetries();
  727. //Allow all of these options to be specified separately. Possibly useful, and the code is cleaner.
  728. logMin = (flags & SOAPFlogmin) != 0;
  729. logXML = (flags & SOAPFlog) != 0;
  730. logUserMsg = (flags & SOAPFlogusermsg) != 0;
  731. double dval = helper->getTimeout(); // In seconds, but may include fractions of a second...
  732. if (dval < 0.0) //not provided, or out of range
  733. timeoutMS = 300*1000; // 300 second default
  734. else if (dval == 0)
  735. timeoutMS = WAIT_FOREVER;
  736. else
  737. timeoutMS = (unsigned)(dval * 1000);
  738. dval = helper->getTimeLimit();
  739. if (dval <= 0.0)
  740. timeLimitMS = WAIT_FOREVER;
  741. else
  742. timeLimitMS = (unsigned)(dval * 1000);
  743. if (flags & SOAPFhttpheaders)
  744. httpHeaders.set(s.setown(helper->getHttpHeaders()));
  745. if (flags & SOAPFxpathhints)
  746. {
  747. s.setown(helper->getXpathHintsXml());
  748. xpathHints.setown(createPTreeFromXMLString(s.get()));
  749. }
  750. StringAttr proxyAddress;
  751. proxyAddress.set(s.setown(helper->getProxyAddress()));
  752. if (!proxyAddress.isEmpty())
  753. {
  754. UrlListParser proxyUrlListParser(proxyAddress);
  755. if (0 == proxyUrlListParser.getUrls(proxyUrlArray))
  756. throw MakeStringException(0, "SOAPCALL PROXYADDRESS specified no URLs");
  757. }
  758. if (wscType == STsoap)
  759. {
  760. soapaction.set(s.setown(helper->getSoapAction()));
  761. if(soapaction.get() && !isValidHttpValue(soapaction.get()))
  762. throw MakeStringException(-1, "SOAPAction value contained illegal characters: %s", soapaction.get());
  763. httpHeaderName.set(s.setown(helper->getHttpHeaderName()));
  764. if(httpHeaderName.get() && !isValidHttpValue(httpHeaderName.get()))
  765. throw MakeStringException(-1, "HTTPHEADER name contained illegal characters: %s", httpHeaderName.get());
  766. httpHeaderValue.set(s.setown(helper->getHttpHeaderValue()));
  767. if(httpHeaderValue.get() && !isValidHttpValue(httpHeaderValue.get()))
  768. throw MakeStringException(-1, "HTTPHEADER value contained illegal characters: %s", httpHeaderValue.get());
  769. if ((flags & SOAPFliteral) && (flags & SOAPFencoding))
  770. throw MakeStringException(0, "SOAPCALL 'LITERAL' and 'ENCODING' options are mutually exclusive");
  771. rowHeader.set(s.setown(helper->getHeader()));
  772. rowFooter.set(s.setown(helper->getFooter()));
  773. if (flags & SOAPFmarkupinfo)
  774. {
  775. rootHeader.set(s.setown(helper->getRequestHeader()));
  776. rootFooter.set(s.setown(helper->getRequestFooter()));
  777. }
  778. if(flags & SOAPFnamespace)
  779. {
  780. OwnedRoxieString ns = helper->getNamespaceName();
  781. if(ns && *ns)
  782. xmlnamespace.set(ns);
  783. }
  784. }
  785. if (wscType == SThttp)
  786. {
  787. //Check for unsupported flags
  788. if ((flags & SOAPFliteral) || (flags & SOAPFencoding))
  789. throw MakeStringException(0, "HTTPCALL 'LITERAL' and 'ENCODINGD' options not supported");
  790. }
  791. if (callHelper)
  792. {
  793. OwnedRoxieString iteratorPath(callHelper->getInputIteratorPath());
  794. char const * ipath = iteratorPath;
  795. if(ipath && (*ipath == '/'))
  796. ++ipath;
  797. inputpath.set(ipath);
  798. }
  799. service.set(s.setown(helper->getService()));
  800. service.trim();
  801. if (wscType == SThttp)
  802. {
  803. service.toUpperCase(); //GET/PUT/POST
  804. if (strcmp(service.str(), "GET") != 0)
  805. throw MakeStringException(0, "HTTPCALL Only 'GET' http method currently supported");
  806. OwnedRoxieString acceptTypeSupplied(helper->getAcceptType()); // text/html, text/xml, etc
  807. acceptType.set(acceptTypeSupplied);
  808. acceptType.trim();
  809. acceptType.toLowerCase();
  810. }
  811. if (callHelper)
  812. rowTransformer = callHelper->queryInputTransformer();
  813. else
  814. rowTransformer = NULL;
  815. OwnedRoxieString hosts(helper->getHosts());
  816. UrlListParser urlListParser(hosts);
  817. if ((numUrls = urlListParser.getUrls(urlArray)) > 0)
  818. {
  819. if (wscMode == SCrow)
  820. {
  821. numRowThreads = 1;
  822. numUrlThreads = helper->numParallelThreads();
  823. if (numUrlThreads == 0)
  824. numUrlThreads = 1;
  825. else if (numUrlThreads > MAXWSCTHREADS)
  826. numUrlThreads = MAXWSCTHREADS;
  827. numRecordsPerBatch = 1;
  828. }
  829. else
  830. {
  831. unsigned totThreads = helper->numParallelThreads();
  832. if (totThreads < 1)
  833. totThreads = 2; // default to 2 threads
  834. else if (totThreads > MAXWSCTHREADS)
  835. totThreads = MAXWSCTHREADS;
  836. numUrlThreads = (numUrls < totThreads)? numUrls: totThreads;
  837. numRowThreads = totThreads / numUrlThreads;
  838. if (numRowThreads < 1)
  839. numRowThreads = 1;
  840. else if (numRowThreads > MAXWSCTHREADS)
  841. numRowThreads = MAXWSCTHREADS;
  842. numRecordsPerBatch = helper->numRecordsPerBatch();
  843. if (numRecordsPerBatch < 1)
  844. numRecordsPerBatch = 1;
  845. }
  846. }
  847. else
  848. throw MakeStringException(0, "%sCALL specified no URLs",wscType == STsoap ? "SOAP" : "HTTP");
  849. for (unsigned i=0; i<numRowThreads; i++)
  850. threads.append(*new CWSCHelperThread(this));
  851. }
  852. ~CWSCHelper()
  853. {
  854. complete = true;
  855. waitUntilDone();
  856. threads.kill();
  857. }
  858. void waitUntilDone()
  859. {
  860. ForEachItemIn(i,threads)
  861. threads.item(i).join();
  862. for (;;)
  863. {
  864. const void *row = outputQ.dequeueNow();
  865. if (!row)
  866. break;
  867. outputAllocator->releaseRow(row);
  868. }
  869. outputQ.reset();
  870. }
  871. void start()
  872. {
  873. if (timeLimitMS != WAIT_FOREVER)
  874. timeLimitMon.reset(timeLimitMS);
  875. done = 0;
  876. complete = aborted = timeLimitExceeded = false;
  877. ForEachItemIn(i,threads)
  878. threads.item(i).start();
  879. }
  880. void abort()
  881. {
  882. aborted = true;
  883. complete = true;
  884. outputQ.stop();
  885. }
  886. const void * getRow()
  887. {
  888. if (complete)
  889. return NULL;
  890. for (;;)
  891. {
  892. const void *row = outputQ.dequeue();
  893. if (aborted)
  894. break;
  895. if (row)
  896. return row;
  897. // should only be here if setDone() triggered
  898. complete = true;
  899. Owned<IException> e = getError();
  900. if (e)
  901. throw e.getClear();
  902. break;
  903. }
  904. return NULL;
  905. }
  906. IException * getError()
  907. {
  908. SpinBlock sb(outputQLock);
  909. return error.getLink();
  910. }
  911. inline IEngineRowAllocator * queryOutputAllocator() const { return outputAllocator; }
  912. #ifdef _USE_OPENSSL
  913. ISecureSocket *createSecureSocket(ISocket *sock)
  914. {
  915. {
  916. CriticalBlock b(secureContextCrit);
  917. if (!secureContext)
  918. {
  919. if (clientCert != NULL)
  920. secureContext.setown(createSecureSocketContextEx(clientCert->certificate, clientCert->privateKey, clientCert->passphrase, ClientSocket));
  921. else
  922. secureContext.setown(createSecureSocketContext(ClientSocket));
  923. }
  924. }
  925. return secureContext->createSecureSocket(sock);
  926. }
  927. #endif
  928. bool isTimeLimitExceeded(unsigned *_remainingMS)
  929. {
  930. if (timeLimitMS != WAIT_FOREVER)
  931. {
  932. CriticalBlock block(timeoutCrit);
  933. if (timeLimitExceeded || timeLimitMon.timedout(_remainingMS))
  934. {
  935. timeLimitExceeded = true;
  936. return true;
  937. }
  938. }
  939. else
  940. *_remainingMS = (unsigned)-1;
  941. return false;
  942. }
  943. void addUserLogMsg(const byte * row)
  944. {
  945. if (logUserMsg)
  946. {
  947. size32_t lenText;
  948. rtlDataAttr text;
  949. helper->getLogText(lenText, text.refstr(), row);
  950. logctx.CTXLOG("%s: %.*s", wscCallTypeText(), lenText, text.getstr());
  951. }
  952. }
  953. inline IXmlToRowTransformer * getRowTransformer() { return rowTransformer; }
  954. inline const char * wscCallTypeText() const { return wscType == STsoap ? "SOAPCALL" : "HTTPCALL"; }
  955. protected:
  956. friend class CWSCHelperThread;
  957. friend class CWSCAsyncFor;
  958. void putRow(const void * row)
  959. {
  960. assertex(row);
  961. outputQ.enqueue(row);
  962. }
  963. void setDone()
  964. {
  965. bool doStop;
  966. {
  967. SpinBlock sb(outputQLock);
  968. done++;
  969. doStop = (done == numRowThreads);
  970. }
  971. if (doStop)
  972. {
  973. // Note - Don't stop the queue - that effectively discards what's already on there,
  974. // which is not what we want.
  975. // Instead, push a NULL to indicate the end of the output.
  976. outputQ.enqueue(NULL);
  977. }
  978. }
  979. void setErrorOwn(IException * e)
  980. {
  981. SpinBlock sb(outputQLock);
  982. if (error)
  983. ::Release(e);
  984. else
  985. error.setown(e);
  986. }
  987. void toXML(const byte * self, IXmlWriterExt & out) { CriticalBlock block(toXmlCrit); helper->toXML(self, out); }
  988. size32_t transformRow(ARowBuilder & rowBuilder, IColumnProvider * row)
  989. {
  990. CriticalBlock block(transformCrit);
  991. NullDiskCallback callback;
  992. return rowTransformer->transform(rowBuilder, row, &callback);
  993. }
  994. unsigned onFailTransform(ARowBuilder & rowBuilder, const void * left, IException * e) { CriticalBlock block(onfailCrit); return callHelper->onFailTransform(rowBuilder, left, e); }
  995. StringBuffer authToken;
  996. WSCMode wscMode;
  997. IWSCRowProvider * rowProvider;
  998. IHThorWebServiceCallActionArg * helper;
  999. IHThorWebServiceCallArg * callHelper;
  1000. Linked<IEngineRowAllocator> outputAllocator;
  1001. Owned<IException> error;
  1002. UrlArray urlArray;
  1003. UrlArray proxyUrlArray;
  1004. unsigned numRecordsPerBatch;
  1005. unsigned numUrls;
  1006. unsigned numRowThreads;
  1007. unsigned numUrlThreads;
  1008. unsigned maxRetries;
  1009. unsigned timeoutMS;
  1010. unsigned timeLimitMS;
  1011. bool logXML;
  1012. bool logMin;
  1013. bool logUserMsg;
  1014. bool aborted;
  1015. const IContextLogger &logctx;
  1016. unsigned flags;
  1017. StringAttr soapaction;
  1018. StringAttr httpHeaderName;
  1019. StringAttr httpHeaderValue;
  1020. StringAttr httpHeaders;
  1021. StringAttr inputpath;
  1022. StringBuffer service;
  1023. StringBuffer acceptType;//for httpcall, text/plain, text/html, text/xml, etc
  1024. StringAttr rowHeader;
  1025. StringAttr rowFooter;
  1026. StringAttr rootHeader;
  1027. StringAttr rootFooter;
  1028. StringAttr xmlnamespace;
  1029. IXmlToRowTransformer * rowTransformer;
  1030. };
  1031. CriticalSection CWSCHelper::secureContextCrit;
  1032. Owned<ISecureSocketContext> CWSCHelper::secureContext; // created on first use
  1033. //=================================================================================================
  1034. void CWSCHelperThread::outputRows(IXmlWriterExt &xmlWriter, ConstPointerArray &inputRows, const char *itemtag, bool encode_off, char const * itemns)
  1035. {
  1036. ForEachItemIn(idx, inputRows)
  1037. {
  1038. if (idx!=0)
  1039. xmlWriter.checkDelimiter();
  1040. if (itemtag && *itemtag) //TAG
  1041. {
  1042. xmlWriter.outputBeginNested(itemtag, true);
  1043. if(itemns)
  1044. xmlWriter.outputXmlns("xmlns", itemns);
  1045. }
  1046. if (master->rowHeader.get()) //OPTIONAL HEADER (specified by "HEADING" option)
  1047. xmlWriter.outputInline(master->rowHeader.get());
  1048. //XML ROW CONTENT
  1049. master->toXML((const byte *)inputRows.item(idx), xmlWriter);
  1050. if (master->rowFooter.get()) //OPTION FOOTER
  1051. xmlWriter.outputInline(master->rowFooter.get());
  1052. if (encode_off) //ENCODING
  1053. xmlWriter.outputInt(0, 1, "encode_");
  1054. if (itemtag && *itemtag) //TAG
  1055. xmlWriter.outputEndNested(itemtag);
  1056. master->addUserLogMsg((const byte *)inputRows.item(idx));
  1057. }
  1058. }
  1059. void CWSCHelperThread::createHttpPostQuery(IXmlWriterExt &xmlWriter, ConstPointerArray &inputRows, bool appendRequestToName, bool appendEncodeFlag)
  1060. {
  1061. StringBuffer method_tag;
  1062. method_tag.append(master->service);
  1063. if (method_tag.length() && appendRequestToName)
  1064. method_tag.append("Request");
  1065. StringBuffer array_tag;
  1066. StringAttr method_ns;
  1067. if (master->rootHeader.get()) //OPTIONAL ROOT REQUEST HEADER
  1068. xmlWriter.outputInline(master->rootHeader.get());
  1069. if (inputRows.ordinality() > 1)
  1070. {
  1071. if (!(master->flags & SOAPFnoroot))
  1072. {
  1073. if (method_tag.length())
  1074. {
  1075. array_tag.append(method_tag).append("Array");
  1076. xmlWriter.outputBeginNested(array_tag, true);
  1077. if (master->xmlnamespace.get())
  1078. xmlWriter.outputXmlns("xmlns", master->xmlnamespace);
  1079. }
  1080. }
  1081. xmlWriter.outputBeginArray(method_tag);
  1082. }
  1083. else
  1084. {
  1085. if(master->xmlnamespace.get())
  1086. method_ns.set(master->xmlnamespace.get());
  1087. }
  1088. outputRows(xmlWriter, inputRows, method_tag.str(), appendEncodeFlag ? (inputRows.ordinality() == 1) : false, method_ns.get());
  1089. if (inputRows.ordinality() > 1)
  1090. {
  1091. xmlWriter.outputEndArray(method_tag);
  1092. if (appendEncodeFlag)
  1093. xmlWriter.outputInt(0, 1, "encode_");
  1094. if (!(master->flags & SOAPFnoroot))
  1095. {
  1096. if (method_tag.length())
  1097. xmlWriter.outputEndNested(array_tag);
  1098. }
  1099. }
  1100. if (master->rootFooter.get()) //OPTIONAL ROOT REQUEST FOOTER
  1101. xmlWriter.outputInline(master->rootFooter.get());
  1102. }
  1103. void CWSCHelperThread::createESPQuery(IXmlWriterExt &xmlWriter, ConstPointerArray &inputRows)
  1104. {
  1105. createHttpPostQuery(xmlWriter, inputRows, true, true);
  1106. }
  1107. //Create servce xml request body, with binding usage of either Literal or Encoded
  1108. //Note that Encoded usage requires type encoding for data fields
  1109. void CWSCHelperThread::createSOAPliteralOrEncodedQuery(IXmlWriterExt &xmlWriter, ConstPointerArray &inputRows)
  1110. {
  1111. xmlWriter.outputBeginNested(master->service, true);
  1112. if (master->flags & SOAPFencoding)
  1113. xmlWriter.outputCString("http://schemas.xmlsoap.org/soap/encoding/", "@soapenv:encodingStyle");
  1114. if (master->xmlnamespace.get())
  1115. xmlWriter.outputXmlns("xmlns", master->xmlnamespace.get());
  1116. outputRows(xmlWriter, inputRows);
  1117. xmlWriter.outputEndNested(master->service);
  1118. }
  1119. //Create SOAP body of http request
  1120. void CWSCHelperThread::createXmlSoapQuery(IXmlWriterExt &xmlWriter, ConstPointerArray &inputRows)
  1121. {
  1122. xmlWriter.outputQuoted("<?xml version=\"1.0\" encoding=\"UTF-8\"?>");
  1123. xmlWriter.outputBeginNested("soap:Envelope", true);
  1124. xmlWriter.outputXmlns("soap", "http://schemas.xmlsoap.org/soap/envelope/");
  1125. if (master->flags & SOAPFencoding)
  1126. { //SOAP RPC/encoded. 'Encoded' usage includes type encoding
  1127. xmlWriter.outputXmlns("xsd", "http://www.w3.org/2001/XMLSchema");
  1128. xmlWriter.outputXmlns("xsi", "http://www.w3.org/2001/XMLSchema-instance");
  1129. }
  1130. xmlWriter.outputBeginNested("soap:Body", true);
  1131. if (master->flags & SOAPFliteral || master->flags & SOAPFencoding)
  1132. createSOAPliteralOrEncodedQuery(xmlWriter, inputRows);
  1133. else
  1134. createESPQuery(xmlWriter, inputRows);
  1135. xmlWriter.outputEndNested("soap:Body");
  1136. xmlWriter.outputEndNested("soap:Envelope");
  1137. }
  1138. void CWSCHelperThread::processQuery(ConstPointerArray &inputRows)
  1139. {
  1140. unsigned xmlWriteFlags = 0;
  1141. unsigned xmlReadFlags = ptr_ignoreNameSpaces;
  1142. if (master->flags & SOAPFtrim)
  1143. xmlWriteFlags |= XWFtrim;
  1144. if ((master->flags & SOAPFpreserveSpace) == 0)
  1145. xmlReadFlags |= ptr_ignoreWhiteSpace;
  1146. bool useMarkup = (master->flags & SOAPFmarkupinfo);
  1147. XMLWriterType xmlType = WTStandard;
  1148. if (useMarkup && (master->flags & SOAPFjson))
  1149. xmlType = (master->flags & SOAPFnoroot) ? WTJSONRootless : WTJSONObject;
  1150. else if (master->flags & SOAPFencoding)
  1151. xmlType = WTEncodingData64;
  1152. Owned<IXmlWriterExt> xmlWriter = createIXmlWriterExt(xmlWriteFlags, 0, nullptr, xmlType);
  1153. if (useMarkup)
  1154. createHttpPostQuery(*xmlWriter, inputRows, false, false);
  1155. else if (master->wscType == STsoap )
  1156. createXmlSoapQuery(*xmlWriter, inputRows);
  1157. xmlWriter->finalize();
  1158. Owned<IWSCAsyncFor> casyncfor = createWSCAsyncFor(master, *xmlWriter, inputRows, (PTreeReaderOptions) xmlReadFlags);
  1159. casyncfor->For(master->numUrls, master->numUrlThreads,false,true); // shuffle URLS for poormans load balance
  1160. }
  1161. int CWSCHelperThread::run()
  1162. {
  1163. ConstPointerArray inputRows;
  1164. if (master->wscMode == SCrow)
  1165. {
  1166. inputRows.append(NULL);
  1167. try
  1168. {
  1169. processQuery(inputRows);
  1170. }
  1171. catch (IException *e)
  1172. {
  1173. master->setErrorOwn(e);
  1174. }
  1175. inputRows.pop();
  1176. }
  1177. else
  1178. {
  1179. // following a bit odd but preserving previous semantics (except fixing abort leak)
  1180. for (;;)
  1181. {
  1182. try
  1183. {
  1184. while (!master->complete && !master->error.get())
  1185. {
  1186. if (master->aborted) {
  1187. while (inputRows.ordinality() > 0)
  1188. master->rowProvider->releaseRow(inputRows.popGet());
  1189. return 0;
  1190. }
  1191. const void *r = master->rowProvider->getNextRow();
  1192. if (!r)
  1193. break;
  1194. inputRows.append(r);
  1195. if (inputRows.ordinality() >= master->numRecordsPerBatch)
  1196. break;
  1197. }
  1198. if (inputRows.ordinality() == 0)
  1199. break;
  1200. processQuery(inputRows);
  1201. }
  1202. catch (IException *e)
  1203. {
  1204. master->setErrorOwn(e); // going to exit next time round
  1205. }
  1206. while (inputRows.ordinality() > 0)
  1207. master->rowProvider->releaseRow(inputRows.popGet());
  1208. }
  1209. }
  1210. master->setDone();
  1211. return 0;
  1212. }
  1213. //=================================================================================================
  1214. IWSCHelper * createSoapCallHelper(IWSCRowProvider *r, IEngineRowAllocator * outputAllocator, const char *authToken, WSCMode wscMode, ClientCertificate *clientCert, const IContextLogger &logctx, IRoxieAbortMonitor * roxieAbortMonitor)
  1215. {
  1216. return new CWSCHelper(r, outputAllocator, authToken, wscMode, clientCert, logctx, roxieAbortMonitor, STsoap);
  1217. }
  1218. IWSCHelper * createHttpCallHelper(IWSCRowProvider *r, IEngineRowAllocator * outputAllocator, const char *authToken, WSCMode wscMode, ClientCertificate *clientCert, const IContextLogger &logctx, IRoxieAbortMonitor * roxieAbortMonitor)
  1219. {
  1220. return new CWSCHelper(r, outputAllocator, authToken, wscMode, clientCert, logctx, roxieAbortMonitor, SThttp);
  1221. }
  1222. //=================================================================================================
  1223. bool httpHeaderBlockContainsHeader(const char *httpheaders, const char *header)
  1224. {
  1225. if (!httpheaders || !*httpheaders)
  1226. return false;
  1227. VStringBuffer match("\n%s:", header);
  1228. const char *matchStart = match.str()+1;
  1229. if (!strncmp(httpheaders, matchStart, strlen(matchStart)))
  1230. return true;
  1231. if (strstr(httpheaders, match))
  1232. return true;
  1233. return false;
  1234. }
  1235. bool getHTTPHeader(const char *httpheaders, const char *header, StringBuffer& value)
  1236. {
  1237. if (!httpheaders || !*httpheaders || !header || !*header)
  1238. return false;
  1239. const char* pHeader = strstr(httpheaders, header);
  1240. if (!pHeader)
  1241. return false;
  1242. pHeader += strlen(header);
  1243. if (*pHeader != ':')
  1244. return getHTTPHeader(pHeader, header, value);
  1245. pHeader++;
  1246. const char* ppHeader = strchr(pHeader, '\n');
  1247. if (!ppHeader)
  1248. value.append(pHeader);
  1249. else
  1250. value.append(pHeader, 0, ppHeader - pHeader);
  1251. value.trim();
  1252. return true;
  1253. }
  1254. class CWSCAsyncFor : implements IWSCAsyncFor, public CInterface, public CAsyncFor
  1255. {
  1256. class CSocketDataProvider : public CInterface
  1257. {
  1258. const char * buffer;
  1259. size32_t currLen;
  1260. size32_t curPosn;
  1261. ISocket * socket;
  1262. unsigned timeoutMS;
  1263. public:
  1264. CSocketDataProvider(const char * _buffer, size32_t _curPosn, size32_t _currLen, ISocket * _sock, unsigned _timeout )
  1265. : buffer(_buffer), currLen(_currLen), curPosn(_curPosn), socket(_sock), timeoutMS(_timeout)
  1266. {
  1267. }
  1268. size32_t getBytes(char * buf, size32_t len)
  1269. {
  1270. size32_t count;
  1271. if ( len <= (currLen-curPosn))
  1272. { //its already in the buffer
  1273. memcpy(buf, (buffer + curPosn), len);
  1274. curPosn += len;
  1275. count = len;
  1276. }
  1277. else if (curPosn >= currLen)
  1278. { //nothing in buffer, read from socket
  1279. size32_t bytesRead=0;
  1280. count = 0;
  1281. do
  1282. {
  1283. socket->readtms(buf + count, 0, len - count, bytesRead, timeoutMS);
  1284. count += bytesRead;
  1285. } while (count != len);
  1286. currLen = curPosn = 0;
  1287. }
  1288. else
  1289. { //only some is in buffer, read rest from socket
  1290. size32_t bytesRead=0;
  1291. size32_t avail = currLen - curPosn;
  1292. memcpy(buf, (buffer + curPosn), avail);
  1293. count = avail;
  1294. do
  1295. {
  1296. size32_t read;
  1297. socket->readtms(buf+avail+bytesRead, 0, len-avail-bytesRead, read, timeoutMS);
  1298. bytesRead += read;
  1299. } while (len != (bytesRead + avail));
  1300. count += bytesRead;
  1301. currLen = curPosn = 0;
  1302. }
  1303. return count;
  1304. }
  1305. };
  1306. private:
  1307. CWSCHelper * master;
  1308. ConstPointerArray &inputRows;
  1309. IXmlWriterExt &xmlWriter;
  1310. IEngineRowAllocator * outputAllocator;
  1311. CriticalSection processExceptionCrit;
  1312. StringBuffer responsePath;
  1313. Owned<CSocketDataProvider> dataProvider;
  1314. PTreeReaderOptions options;
  1315. unsigned remainingMS;
  1316. inline void checkRoxieAbortMonitor(IRoxieAbortMonitor * roxieAbortMonitor)
  1317. {
  1318. if (roxieAbortMonitor)
  1319. {
  1320. try
  1321. {
  1322. roxieAbortMonitor->checkForAbort();//throws
  1323. }
  1324. catch (IException *e)
  1325. {
  1326. StringBuffer s;
  1327. throw MakeStringException(ROXIE_ABORT_EVENT, "%s", e->errorMessage(s).str());
  1328. }
  1329. }
  1330. }
  1331. bool checkContentEncodingSupported(const char* encoding)
  1332. {
  1333. if (strieq(encoding, "gzip"))
  1334. return true;
  1335. if (strieq(encoding, "deflate"))
  1336. return true;
  1337. if (strieq(encoding, "x-deflate"))
  1338. return true;
  1339. return false;
  1340. }
  1341. bool checkContentDecoding(const StringBuffer& headers, StringBuffer& content, StringBuffer& contentEncoding)
  1342. {
  1343. if ((headers.length() == 0) || (content.length() == 0))
  1344. return false;
  1345. getHTTPHeader(headers.str(), CONTENT_ENCODING, contentEncoding);
  1346. if (contentEncoding.isEmpty())
  1347. return false;
  1348. if (!checkContentEncodingSupported(contentEncoding.str()))
  1349. throw MakeStringException(-1, "Content-Encoding:%s not supported", contentEncoding.str());
  1350. return true;
  1351. }
  1352. void decodeContent(const char* contentEncodingType, StringBuffer& content)
  1353. {
  1354. #ifdef _USE_ZLIB
  1355. unsigned contentLength = content.length();
  1356. StringBuffer contentDecoded;
  1357. httpInflate((const byte*)content.str(), contentLength, contentDecoded, strieq(contentEncodingType, "gzip"));
  1358. PROGLOG("Content decoded from %d bytes to %d bytes", contentLength, contentDecoded.length());
  1359. content = contentDecoded;
  1360. if (soapTraceLevel > 6 || master->logXML)
  1361. multiLog(master->logctx, "Content decoded. Original %s %d", CONTENT_LENGTH, contentLength);
  1362. #else
  1363. throw MakeStringException(-1, "_USE_ZLIB is required for Content-Encoding:%s", contentEncodingType);
  1364. #endif
  1365. }
  1366. bool checkContentEncoding(const char* httpheaders, StringBuffer& contentEncodingType)
  1367. {
  1368. if (xmlWriter.length() == 0)
  1369. return false;
  1370. getHTTPHeader(httpheaders, CONTENT_ENCODING, contentEncodingType);
  1371. if (contentEncodingType.isEmpty())
  1372. return false;
  1373. if (!checkContentEncodingSupported(contentEncodingType.str()))
  1374. throw MakeStringException(-1, "Content-Encoding:%s not supported", contentEncodingType.str());
  1375. return true;
  1376. }
  1377. ZlibCompressionType getEncodeFormat(const char *name)
  1378. {
  1379. if (strieq(name, "gzip"))
  1380. return ZlibCompressionType::GZIP;
  1381. if (strieq(name, "x-deflate"))
  1382. return ZlibCompressionType::ZLIB_DEFLATE;
  1383. if (strieq(name, "deflate"))
  1384. return ZlibCompressionType::DEFLATE;
  1385. return ZlibCompressionType::GZIP; //already checked above, shouldn't be here
  1386. }
  1387. void encodeContent(const char* contentEncodingType, MemoryBuffer& mb)
  1388. {
  1389. #ifdef _USE_ZLIB
  1390. zlib_deflate(mb, xmlWriter.str(), xmlWriter.length(), GZ_BEST_SPEED, getEncodeFormat(contentEncodingType));
  1391. PROGLOG("Content encoded from %d bytes to %d bytes", xmlWriter.length(), mb.length());
  1392. #else
  1393. throw MakeStringException(-1, "_USE_ZLIB is required for Content-Encoding:%s", contentEncodingType);
  1394. #endif
  1395. }
  1396. void logRequest(bool contentEncoded, StringBuffer& request)
  1397. {
  1398. if (soapTraceLevel > 6 || master->logXML)
  1399. {
  1400. if (!contentEncoded)
  1401. multiLog(master->logctx, "%s: request(%s)", master->wscCallTypeText(), request.str());
  1402. else
  1403. multiLog(master->logctx, "%s: request(%s), content encoded.", master->wscCallTypeText(), request.str());
  1404. }
  1405. }
  1406. void createHttpRequest(Url &url, StringBuffer &request)
  1407. {
  1408. // Create the HTTP POST request
  1409. if (master->wscType == STsoap)
  1410. request.clear().append("POST ").append(url.path).append(" HTTP/1.1\r\n");
  1411. else
  1412. request.clear().append(master->service).append(" ").append(url.path).append(" HTTP/1.1\r\n");
  1413. const char *httpheaders = master->httpHeaders.get();
  1414. if (httpheaders && *httpheaders)
  1415. {
  1416. if (soapTraceLevel > 6 || master->logXML)
  1417. multiLog(master->logctx, "%s: Adding HTTP Headers(%s)", master->wscCallTypeText(), httpheaders);
  1418. request.append(httpheaders);
  1419. }
  1420. if (!httpHeaderBlockContainsHeader(httpheaders, "Authorization"))
  1421. {
  1422. if (url.userPasswordPair.length() > 0)
  1423. {
  1424. StringBuffer authToken;
  1425. JBASE64_Encode(url.userPasswordPair.str(), url.userPasswordPair.length(), authToken, false);
  1426. request.append("Authorization: Basic ").append(authToken).append("\r\n");
  1427. }
  1428. else if (master->authToken.length() > 0)
  1429. {
  1430. request.append("Authorization: Basic ").append(master->authToken).append("\r\n");
  1431. }
  1432. }
  1433. #ifdef _USE_ZLIB
  1434. if (!httpHeaderBlockContainsHeader(httpheaders, ACCEPT_ENCODING))
  1435. request.appendf("%s: gzip, deflate\r\n", ACCEPT_ENCODING);
  1436. #endif
  1437. if (!isEmptyString(master->logctx.queryGlobalId()))
  1438. {
  1439. request.append(master->logctx.queryGlobalIdHttpHeader()).append(": ").append(master->logctx.queryGlobalId()).append("\r\n");
  1440. if (!isEmptyString(master->logctx.queryLocalId()))
  1441. request.append(master->logctx.queryCallerIdHttpHeader()).append(": ").append(master->logctx.queryLocalId()).append("\r\n"); //our localId is reciever's callerId
  1442. }
  1443. if (master->wscType == STsoap)
  1444. {
  1445. if (master->soapaction.get())
  1446. request.append("SOAPAction: ").append(master->soapaction.get()).append("\r\n");
  1447. if (master->httpHeaders.isEmpty() && master->httpHeaderName.get() && master->httpHeaderValue.get())
  1448. {
  1449. //backward compatibility
  1450. StringBuffer hdr(master->httpHeaderName.get());
  1451. hdr.append(": ").append(master->httpHeaderValue);
  1452. if (soapTraceLevel > 6 || master->logXML)
  1453. multiLog(master->logctx, "SOAPCALL: Adding HTTP Header(%s)", hdr.str());
  1454. request.append(hdr.append("\r\n"));
  1455. }
  1456. if (!httpHeaderBlockContainsHeader(httpheaders, "Content-Type"))
  1457. {
  1458. bool isJson = ((master->flags & SOAPFmarkupinfo) && (master->flags & SOAPFjson));
  1459. if (isJson)
  1460. request.append("Content-Type: application/json\r\n");
  1461. else
  1462. request.append("Content-Type: text/xml\r\n");
  1463. }
  1464. }
  1465. else if(master->wscType == SThttp)
  1466. request.append("Accept: ").append(master->acceptType).append("\r\n");
  1467. else
  1468. assertex(false);
  1469. if (master->wscType == STsoap)
  1470. {
  1471. request.append("Host: ").append(url.host).append(":").append(url.port).append("\r\n");//http 1.1
  1472. StringBuffer contentEncodingType;
  1473. if (!checkContentEncoding(httpheaders, contentEncodingType))
  1474. {
  1475. request.append(CONTENT_LENGTH).append(xmlWriter.length()).append("\r\n\r\n");
  1476. request.append(xmlWriter.str());//add SOAP xml content
  1477. logRequest(false, request);
  1478. }
  1479. else
  1480. {
  1481. logRequest(true, request);
  1482. MemoryBuffer encodedContentBuf;
  1483. encodeContent(contentEncodingType.str(), encodedContentBuf);
  1484. request.append(CONTENT_LENGTH).append(encodedContentBuf.length()).append("\r\n\r\n");
  1485. request.append(encodedContentBuf.length(), encodedContentBuf.toByteArray());
  1486. }
  1487. }
  1488. else
  1489. {
  1490. request.append("Host: ").append(url.host);//http 1.1
  1491. if (url.port != 80) //default port?
  1492. request.append(":").append(url.port);
  1493. request.append("\r\n");//http 1.1
  1494. request.append("\r\n");//httpcall
  1495. logRequest(false, request);
  1496. }
  1497. if (master->logMin)
  1498. master->logctx.CTXLOG("%s: request(%s:%u)", master->wscCallTypeText(), url.host.str(), url.port);
  1499. }
  1500. int readHttpResponse(StringBuffer &response, ISocket *socket)
  1501. {
  1502. // Read the POST reply
  1503. // not doesn't *assume* is valid HTTP post format but if it is takes advantage of
  1504. response.clear();
  1505. unsigned bytesRead;
  1506. MemoryAttr buf;
  1507. char *buffer=(char *)buf.allocate(WSCBUFFERSIZE+1);
  1508. int rval = 200;
  1509. // first read header
  1510. size32_t payloadofs = 0;
  1511. size32_t payloadsize = 0;
  1512. StringBuffer dbgheader, contentEncoding;
  1513. bool chunked = false;
  1514. size32_t read = 0;
  1515. do {
  1516. checkTimeLimitExceeded(&remainingMS);
  1517. checkRoxieAbortMonitor(master->roxieAbortMonitor);
  1518. socket->readtms(buffer+read, 0, WSCBUFFERSIZE-read, bytesRead, MIN(master->timeoutMS,remainingMS));
  1519. checkTimeLimitExceeded(&remainingMS);
  1520. checkRoxieAbortMonitor(master->roxieAbortMonitor);
  1521. read += bytesRead;
  1522. buffer[read] = 0;
  1523. if (strncmp(buffer, "HTTP", 4) == 0) {
  1524. const char *s = strstr(buffer,"\r\n\r\n");
  1525. if (s) {
  1526. payloadofs = (size32_t)(s-buffer+4);
  1527. dbgheader.append(payloadofs,buffer);
  1528. s = strstr(buffer, " ");
  1529. if (s)
  1530. rval = atoi(s+1);
  1531. if (!strstr(buffer,"Transfer-Encoding: chunked"))
  1532. {
  1533. chunked = false;
  1534. s = strstr(buffer,CONTENT_LENGTH);
  1535. if (s) {
  1536. s += strlen(CONTENT_LENGTH);
  1537. if ((size32_t)(s-buffer) < payloadofs)
  1538. payloadsize = atoi(s);
  1539. }
  1540. }
  1541. else
  1542. {
  1543. chunked = true;
  1544. size32_t chunkSize = 0;
  1545. size32_t dataLen = 0;
  1546. char ch;
  1547. /*
  1548. //from http://www.w3.org/Protocols/rfc2616/rfc2616-sec19.html#sec19.4.4
  1549. "19.4.6 Introduction of Transfer-Encoding"
  1550. length := 0
  1551. read chunk-size, chunk-extension (if any) and CRLF
  1552. while (chunk-size > 0)
  1553. {
  1554. read chunk-data and CRLF
  1555. append chunk-data to entity-body
  1556. length := length + chunk-size
  1557. read chunk-size and CRLF
  1558. }
  1559. */
  1560. checkTimeLimitExceeded(&remainingMS);
  1561. dataProvider.setown(new CSocketDataProvider(buffer, payloadofs, read, socket, MIN(master->timeoutMS,remainingMS)));
  1562. dataProvider->getBytes(&ch, 1);
  1563. while (isalpha(ch) || isdigit(ch))
  1564. { //get chunk-size
  1565. if (isdigit(ch))
  1566. chunkSize = (chunkSize*16) + (ch - '0');
  1567. else
  1568. chunkSize = (chunkSize*16) + 10 + (toupper(ch) - 'A');
  1569. dataProvider->getBytes(&ch, 1);
  1570. }
  1571. while (chunkSize && ch != '\n')//consume chunk-extension and CRLF
  1572. dataProvider->getBytes(&ch, 1);
  1573. while (chunkSize)
  1574. {
  1575. if (chunkSize > WSCBUFFERSIZE)
  1576. DBGLOG("SOAPCALL chunk size %d", chunkSize);
  1577. //read chunk data directly into response
  1578. size32_t count = dataProvider->getBytes(response.reserve(dataLen + chunkSize), chunkSize);
  1579. assertex(count == chunkSize);
  1580. dataLen += count;
  1581. response.setLength(dataLen);
  1582. dataProvider->getBytes(&ch, 1);//consume CRLF at end of chunk
  1583. while (ch != '\n')
  1584. dataProvider->getBytes(&ch, 1);
  1585. chunkSize = 0;
  1586. dataProvider->getBytes(&ch, 1);
  1587. while (isalpha(ch) || isdigit(ch))
  1588. { //get next chunk size
  1589. if (isdigit(ch))
  1590. chunkSize = (chunkSize*16) + (ch - '0');
  1591. else
  1592. chunkSize = (chunkSize*16) + 10 + (toupper(ch) - 'A');
  1593. dataProvider->getBytes(&ch, 1);
  1594. }
  1595. while(chunkSize && ch != '\n')//consume chunk-extension and CRLF
  1596. dataProvider->getBytes(&ch, 1);
  1597. }
  1598. }
  1599. break;
  1600. }
  1601. }
  1602. if (bytesRead == 0) // socket closed
  1603. break;
  1604. } while (bytesRead&&(read<WSCBUFFERSIZE));
  1605. if (!chunked)
  1606. {
  1607. if (payloadsize)
  1608. response.ensureCapacity(payloadsize);
  1609. char *payload = buffer;
  1610. if (payloadofs) {
  1611. read -= payloadofs;
  1612. payload += payloadofs;
  1613. if (payloadsize&&(read>payloadsize))
  1614. read = payloadsize;
  1615. }
  1616. if (read)
  1617. response.append(read,payload);
  1618. if (payloadsize) { // read directly into response
  1619. while (read<payloadsize) {
  1620. checkTimeLimitExceeded(&remainingMS);
  1621. checkRoxieAbortMonitor(master->roxieAbortMonitor);
  1622. socket->readtms(response.reserve(payloadsize-read), 0, payloadsize-read, bytesRead, MIN(master->timeoutMS,remainingMS));
  1623. checkTimeLimitExceeded(&remainingMS);
  1624. checkRoxieAbortMonitor(master->roxieAbortMonitor);
  1625. read += bytesRead;
  1626. response.setLength(read);
  1627. if (bytesRead==0) {
  1628. master->logctx.CTXLOG("%sCALL: Warning %sHTTP response terminated prematurely",master->wscType == STsoap ? "SOAP" : "HTTP",chunked?"CHUNKED ":"");
  1629. break; // oops looks likesocket closed early
  1630. }
  1631. }
  1632. }
  1633. else {
  1634. for (;;) {
  1635. checkTimeLimitExceeded(&remainingMS);
  1636. checkRoxieAbortMonitor(master->roxieAbortMonitor);
  1637. socket->readtms(buffer, 0, WSCBUFFERSIZE, bytesRead, MIN(master->timeoutMS,remainingMS));
  1638. checkTimeLimitExceeded(&remainingMS);
  1639. checkRoxieAbortMonitor(master->roxieAbortMonitor);
  1640. if (bytesRead==0)
  1641. break; // rely on socket closing to terminate message
  1642. response.append(bytesRead,buffer);
  1643. }
  1644. }
  1645. }
  1646. if (checkContentDecoding(dbgheader, response, contentEncoding))
  1647. decodeContent(contentEncoding.str(), response);
  1648. if (soapTraceLevel > 6 || master->logXML)
  1649. multiLog(master->logctx, "%sCALL: LEN=%d %sresponse(%s%s)", master->wscType == STsoap ? "SOAP" : "HTTP",response.length(),chunked?"CHUNKED ":"", dbgheader.str(), response.str());
  1650. else if (soapTraceLevel > 8)
  1651. multiLog(master->logctx, "%sCALL: LEN=%d %sresponse(%s)", master->wscType == STsoap ? "SOAP" : "HTTP",response.length(),chunked?"CHUNKED ":"", response.str()); // not sure this is that useful but...
  1652. return rval;
  1653. }
  1654. inline const char *queryXpathHint(const char *name)
  1655. {
  1656. if (!master->xpathHints)
  1657. return nullptr;
  1658. return master->xpathHints->queryProp(name);
  1659. }
  1660. void processEspResponse(Url &url, StringBuffer &response, ColumnProvider * meta)
  1661. {
  1662. StringBuffer path(responsePath);
  1663. path.append("/Results/Result/");
  1664. const char *tail = nullptr;
  1665. const char *excPath = nullptr;
  1666. if (master->rowTransformer && master->inputpath.get())
  1667. {
  1668. StringBuffer ipath;
  1669. ipath.append("/Envelope/Body/").append(master->inputpath.get());
  1670. tail = queryXpathHint("rowpath");
  1671. if(!tail && (ipath.length() >= path.length()) && (0 == memcmp(ipath.str(), path.str(), path.length())))
  1672. tail = ipath.str() + path.length();
  1673. else
  1674. path.clear().append(ipath);
  1675. excPath = queryXpathHint("excpath");
  1676. }
  1677. else
  1678. tail = "Dataset/Row";
  1679. CMatchCB matchCB(*this, url, tail, meta, excPath, CBExceptionPathExc);
  1680. Owned<IXMLParse> xmlParser = createXMLParse((const void *)response.str(), (unsigned)response.length(), path.str(), matchCB, options, (master->flags&SOAPFusescontents)!=0);
  1681. while (xmlParser->next());
  1682. }
  1683. void processLiteralResponse(Url &url, StringBuffer &response, ColumnProvider * meta)
  1684. {
  1685. StringBuffer path("/Envelope/Body/");
  1686. const char *tail = nullptr;
  1687. const char *excPath = nullptr;
  1688. if(master->rowTransformer && master->inputpath.get())
  1689. {
  1690. path.append(master->inputpath.get());
  1691. tail = queryXpathHint("rowpath");
  1692. excPath = queryXpathHint("excpath");
  1693. }
  1694. CMatchCB matchCB(*this, url, tail, meta, excPath, CBExceptionPathExc);
  1695. Owned<IXMLParse> xmlParser = createXMLParse((const void *)response.str(), (unsigned)response.length(), path.str(), matchCB, options, (master->flags&SOAPFusescontents)!=0);
  1696. while (xmlParser->next());
  1697. }
  1698. void processHttpResponse(Url &url, StringBuffer &response, ColumnProvider * meta)
  1699. {
  1700. const char *path = nullptr;
  1701. const char *tail = nullptr;
  1702. const char *excPath = nullptr;
  1703. if(master->rowTransformer && master->inputpath.get())
  1704. {
  1705. path = master->inputpath.get();
  1706. tail = queryXpathHint("rowpath");
  1707. excPath = queryXpathHint("excpath");
  1708. }
  1709. CMatchCB matchCB(*this, url, tail, meta, excPath, CBExceptionPathExc | CBExceptionPathExcs | CBExceptionPathExcsExc);
  1710. Owned<IXMLParse> xmlParser;
  1711. if (strieq(master->acceptType.str(), "application/json") || (master->flags & SOAPFjson))
  1712. xmlParser.setown(createJSONParse((const void *)response.str(), (unsigned)response.length(), path, matchCB, options, (master->flags&SOAPFusescontents)!=0, true));
  1713. else
  1714. xmlParser.setown(createXMLParse((const void *)response.str(), (unsigned)response.length(), path, matchCB, options, (master->flags&SOAPFusescontents)!=0));
  1715. while (xmlParser->next());
  1716. }
  1717. void processResponse(Url &url, StringBuffer &response, ColumnProvider * meta)
  1718. {
  1719. if (master->wscType == SThttp || master->flags & SOAPFmarkupinfo)
  1720. processHttpResponse(url, response, meta);
  1721. else if (master->flags & SOAPFliteral)
  1722. processLiteralResponse(url, response, meta);
  1723. else if (master->flags & SOAPFencoding)
  1724. processLiteralResponse(url, response, meta);
  1725. else
  1726. processEspResponse(url, response, meta);
  1727. }
  1728. void processException(const Url &url, const void *row, IException *e)
  1729. {
  1730. CriticalBlock block(processExceptionCrit);
  1731. Owned<IException> ne = url.getUrlException(e);
  1732. e->Release();
  1733. if ((master->flags & SOAPFonfail) && master->callHelper)
  1734. {
  1735. try
  1736. {
  1737. RtlDynamicRowBuilder rowBuilder(outputAllocator);
  1738. size32_t sizeGot = master->onFailTransform(rowBuilder, row, ne);
  1739. if (sizeGot > 0)
  1740. master->putRow(rowBuilder.finalizeRowClear(sizeGot));
  1741. }
  1742. catch (IException *te)
  1743. {
  1744. master->setErrorOwn(te);
  1745. }
  1746. }
  1747. else
  1748. master->setErrorOwn(ne.getClear());
  1749. }
  1750. void processException(const Url &url, ConstPointerArray &inputRows, IException *e)
  1751. {
  1752. Owned<IException> ne = url.getUrlException(e);
  1753. e->Release();
  1754. if ((master->flags & SOAPFonfail) && master->callHelper)
  1755. {
  1756. ForEachItemIn(idx, inputRows)
  1757. {
  1758. try
  1759. {
  1760. RtlDynamicRowBuilder rowBuilder(outputAllocator);
  1761. size32_t sizeGot = master->onFailTransform(rowBuilder, inputRows.item(idx), ne);
  1762. if (sizeGot > 0)
  1763. master->putRow(rowBuilder.finalizeRowClear(sizeGot));
  1764. }
  1765. catch (IException *te)
  1766. {
  1767. master->setErrorOwn(te);
  1768. break;
  1769. }
  1770. }
  1771. }
  1772. else
  1773. master->setErrorOwn(ne.getClear());
  1774. }
  1775. inline void checkTimeLimitExceeded(unsigned * remainingMS)
  1776. {
  1777. if (master->isTimeLimitExceeded(remainingMS))
  1778. throw MakeStringException(TIMELIMIT_EXCEEDED, "%sCALL TIMELIMIT(%ums) exceeded", master->wscType == STsoap ? "SOAP" : "HTTP", master->timeLimitMS);
  1779. }
  1780. public:
  1781. CWSCAsyncFor(CWSCHelper * _master, IXmlWriterExt &_xmlWriter, ConstPointerArray &_inputRows, PTreeReaderOptions _options): xmlWriter(_xmlWriter), inputRows(_inputRows), options(_options)
  1782. {
  1783. master = _master;
  1784. outputAllocator = master->queryOutputAllocator();
  1785. responsePath.append("/Envelope/Body/");
  1786. if (inputRows.ordinality() > 1)
  1787. {
  1788. // can we receive a roxie exceptions for the whole RequestArray?
  1789. // if so, we need to handle them here
  1790. responsePath.append(master->service).append("ResponseArray/");
  1791. }
  1792. responsePath.append(master->service).append("Response");
  1793. }
  1794. ~CWSCAsyncFor()
  1795. {
  1796. }
  1797. IMPLEMENT_IINTERFACE;
  1798. void For(unsigned num,unsigned maxatonce,bool abortFollowingException, bool shuffled)
  1799. {
  1800. CAsyncFor::For(num, maxatonce, abortFollowingException, shuffled);
  1801. }
  1802. void Do(unsigned idx)
  1803. {
  1804. StringBuffer request;
  1805. StringBuffer response;
  1806. unsigned numRetries = 0;
  1807. unsigned retryInterval = 0;
  1808. Url &url = master->urlArray.item(idx);
  1809. createHttpRequest(url, request);
  1810. unsigned startidx = idx;
  1811. while (!master->aborted)
  1812. {
  1813. Owned<ISocket> socket;
  1814. cycle_t startCycles, endCycles;
  1815. startCycles = get_cycles_now();
  1816. for (;;)
  1817. {
  1818. try
  1819. {
  1820. checkTimeLimitExceeded(&remainingMS);
  1821. Url &connUrl = master->proxyUrlArray.empty() ? url : master->proxyUrlArray.item(0);
  1822. socket.setown(blacklist->connect(connUrl.port, connUrl.host, master->logctx, (unsigned)master->maxRetries, master->timeoutMS, master->roxieAbortMonitor));
  1823. if (stricmp(url.method, "https") == 0)
  1824. {
  1825. #ifdef _USE_OPENSSL
  1826. Owned<ISecureSocket> ssock = master->createSecureSocket(socket.getClear());
  1827. if (ssock)
  1828. {
  1829. checkTimeLimitExceeded(&remainingMS);
  1830. int status = ssock->secure_connect();
  1831. if (status < 0)
  1832. {
  1833. StringBuffer err;
  1834. err.append("Failure to establish secure connection to ");
  1835. connUrl.getUrlString(err);
  1836. err.append(": returned ").append(status);
  1837. throw MakeStringExceptionDirect(0, err.str());
  1838. }
  1839. socket.setown(ssock.getLink());
  1840. }
  1841. #else
  1842. StringBuffer err;
  1843. err.append("Failure to establish secure connection to ");
  1844. connUrl.getUrlString(err);
  1845. err.append(": OpenSSL disabled in build");
  1846. throw MakeStringExceptionDirect(0, err.str());
  1847. #endif
  1848. }
  1849. break;
  1850. }
  1851. catch (IException *e)
  1852. {
  1853. if (master->timeLimitExceeded)
  1854. {
  1855. master->logctx.CTXLOG("%sCALL exiting: time limit (%ums) exceeded",master->wscType == STsoap ? "SOAP" : "HTTP", master->timeLimitMS);
  1856. processException(url, inputRows, e);
  1857. return;
  1858. }
  1859. if (e->errorCode() == ROXIE_ABORT_EVENT)
  1860. {
  1861. StringBuffer s;
  1862. master->logctx.CTXLOG("%sCALL exiting: Roxie Abort : %s",master->wscType == STsoap ? "SOAP" : "HTTP",e->errorMessage(s).str());
  1863. throw;
  1864. }
  1865. do
  1866. {
  1867. idx++; // try next socket not blacklisted
  1868. if (idx==master->urlArray.ordinality())
  1869. idx = 0;
  1870. if (idx==startidx)
  1871. {
  1872. StringBuffer s;
  1873. master->logctx.CTXLOG("Exception %s", e->errorMessage(s).str());
  1874. processException(url, inputRows, e);
  1875. return;
  1876. }
  1877. } while (blacklist->blacklisted(url.port, url.host));
  1878. }
  1879. }
  1880. try
  1881. {
  1882. checkTimeLimitExceeded(&remainingMS);
  1883. checkRoxieAbortMonitor(master->roxieAbortMonitor);
  1884. socket->write(request.str(), request.length());
  1885. if (soapTraceLevel > 4)
  1886. multiLog(master->logctx, "%sCALL: sent request (%s) to %s:%d", master->wscType == STsoap ? "SOAP" : "HTTP",master->service.str(), url.host.str(), url.port);
  1887. checkTimeLimitExceeded(&remainingMS);
  1888. checkRoxieAbortMonitor(master->roxieAbortMonitor);
  1889. int rval = readHttpResponse(response, socket);
  1890. if (soapTraceLevel > 4)
  1891. multiLog(master->logctx, "%sCALL: received response (%s) from %s:%d", master->wscType == STsoap ? "SOAP" : "HTTP",master->service.str(), url.host.str(), url.port);
  1892. if (rval != 200)
  1893. {
  1894. if (rval == 503)
  1895. throw new ReceivedRoxieException(1001, "Server Too Busy");
  1896. StringBuffer text;
  1897. text.appendf("HTTP error (%d) in processQuery",rval);
  1898. rtlAddExceptionTag(text, "soapresponse", response.str());
  1899. throw MakeStringExceptionDirect(-1, text.str());
  1900. }
  1901. if (response.length() == 0)
  1902. {
  1903. throw MakeStringException(-1, "Zero length response in processQuery");
  1904. }
  1905. endCycles = get_cycles_now();
  1906. __int64 elapsedNs = cycle_to_nanosec(endCycles-startCycles);
  1907. master->logctx.noteStatistic(StTimeSoapcall, elapsedNs);
  1908. checkTimeLimitExceeded(&remainingMS);
  1909. ColumnProvider * meta = (ColumnProvider*)CreateColumnProvider((unsigned)nanoToMilli(elapsedNs), master->flags&SOAPFencoding?true:false);
  1910. processResponse(url, response, meta);
  1911. delete meta;
  1912. break;
  1913. }
  1914. catch (IReceivedRoxieException *e)
  1915. {
  1916. // server busy ... Sleep and retry
  1917. if (e->errorCode() == 1001)
  1918. {
  1919. if (retryInterval)
  1920. {
  1921. int sleepTime = retryInterval + getRandom() % retryInterval;
  1922. master->logctx.CTXLOG("Server busy (1001), sleeping for %d milliseconds before retry", sleepTime);
  1923. Sleep(sleepTime);
  1924. retryInterval = (retryInterval*2 >= 10000)? 10000: retryInterval*2;
  1925. }
  1926. else
  1927. {
  1928. master->logctx.CTXLOG("Server busy (1001), retrying");
  1929. retryInterval = 10;
  1930. }
  1931. e->Release();
  1932. }
  1933. else
  1934. {
  1935. // other roxie exception ...
  1936. master->logctx.CTXLOG("Exiting: received Roxie exception");
  1937. if (e->errorRow())
  1938. processException(url, e->errorRow(), e);
  1939. else
  1940. processException(url, inputRows, e);
  1941. break;
  1942. }
  1943. }
  1944. catch (IException *e)
  1945. {
  1946. if (master->timeLimitExceeded)
  1947. {
  1948. processException(url, inputRows, e);
  1949. master->logctx.CTXLOG("%sCALL exiting: time limit (%ums) exceeded", master->wscType == STsoap ? "SOAP" : "HTTP", master->timeLimitMS);
  1950. break;
  1951. }
  1952. if (e->errorCode() == ROXIE_ABORT_EVENT)
  1953. {
  1954. StringBuffer s;
  1955. master->logctx.CTXLOG("%sCALL exiting: Roxie Abort : %s",master->wscType == STsoap ? "SOAP" : "HTTP",e->errorMessage(s).str());
  1956. throw;
  1957. }
  1958. // other IException ... retry up to maxRetries
  1959. StringBuffer s;
  1960. master->logctx.CTXLOG("Exception %s", e->errorMessage(s).str());
  1961. if (numRetries >= master->maxRetries)
  1962. {
  1963. // error affects all inputRows
  1964. master->logctx.CTXLOG("Exiting: maxRetries %d exceeded", master->maxRetries);
  1965. processException(url, inputRows, e);
  1966. break;
  1967. }
  1968. numRetries++;
  1969. master->logctx.CTXLOG("Retrying: attempt %d of %d", numRetries, master->maxRetries);
  1970. e->Release();
  1971. }
  1972. catch (std::exception & es)
  1973. {
  1974. if(dynamic_cast<std::bad_alloc *>(&es))
  1975. throw MakeStringException(-1, "std::exception: out of memory (std::bad_alloc) in CWSCAsyncFor processQuery");
  1976. throw MakeStringException(-1, "std::exception: standard library exception (%s) in CWSCAsyncFor processQuery",es.what());
  1977. }
  1978. catch (...)
  1979. {
  1980. throw MakeStringException(-1, "Unknown exception in processQuery");
  1981. }
  1982. }
  1983. }
  1984. inline virtual const char *getResponsePath() { return responsePath; }
  1985. inline virtual ConstPointerArray & getInputRows() { return inputRows; }
  1986. inline virtual CWSCHelper * getMaster() { return master; }
  1987. inline virtual IEngineRowAllocator * getOutputAllocator() { return outputAllocator; }
  1988. };
  1989. IWSCAsyncFor * createWSCAsyncFor(CWSCHelper * _master, IXmlWriterExt &_xmlWriter, ConstPointerArray &_inputRows, PTreeReaderOptions _options)
  1990. {
  1991. return new CWSCAsyncFor(_master, _xmlWriter, _inputRows, _options);
  1992. }