async_profiler_agent/reporter/
s3.rs

1// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
2// SPDX-License-Identifier: Apache-2.0
3
4//! A reporter that uploads reports to an S3 bucket
5
6use async_trait::async_trait;
7use aws_config::SdkConfig;
8use chrono::SecondsFormat;
9use serde::Serialize;
10use std::io::Write;
11use std::time::SystemTime;
12use std::{fmt, io::Cursor};
13use thiserror::Error;
14use zip::result::ZipError;
15use zip::{ZipWriter, write::SimpleFileOptions};
16
17use crate::metadata::{AgentMetadata, ReportMetadata};
18
19use super::Reporter;
20
21/// Error reporting to S3
22#[derive(Error, Debug)]
23pub enum S3ReporterError {
24    /// I/O error creating zip file
25    #[error("io error creating zip file: {0}")]
26    ZipIoError(std::io::Error),
27    /// Error creating zip file
28    #[error("creating zip file: {0}")]
29    ZipError(#[from] ZipError),
30    /// Error sending data to S3
31    #[error("failed to send profile data directly to S3: {0}")]
32    SendProfileS3Data(Box<aws_sdk_s3::Error>),
33    /// Error joining Tokio task
34    #[error("tokio task: {0}")]
35    JoinError(#[from] tokio::task::JoinError),
36}
37
38/// This is the format of the metadata JSON uploaded to S3.
39#[derive(Debug, Serialize)]
40#[non_exhaustive]
41pub struct MetadataJson {
42    start: u64,
43    end: u64,
44    reporting_interval: u64,
45}
46
47/// Mandatory parameters in order to configure an S3 reporter
48pub struct S3ReporterConfig<'a> {
49    /// The SDK config to get credentials from
50    pub sdk_config: &'a SdkConfig,
51    /// The expected bucket owner account
52    pub bucket_owner: String,
53    /// The bucket name
54    pub bucket_name: String,
55    /// The profiling group name, used in the file names within the bucket
56    pub profiling_group_name: String,
57}
58
59/// A reporter that uploads reports to an S3 bucket
60pub struct S3Reporter {
61    s3_client: aws_sdk_s3::Client,
62    bucket_owner: String,
63    bucket_name: String,
64    profiling_group_name: String,
65}
66
67impl S3Reporter {
68    /// Create a new S3Reporter
69    pub fn new(config: S3ReporterConfig<'_>) -> Self {
70        let S3ReporterConfig {
71            sdk_config,
72            bucket_owner,
73            bucket_name,
74            profiling_group_name,
75        } = config;
76        let s3_client_config = aws_sdk_s3::config::Builder::from(sdk_config).build();
77        let s3_client = aws_sdk_s3::Client::from_conf(s3_client_config);
78
79        S3Reporter {
80            s3_client,
81            bucket_owner,
82            bucket_name,
83            profiling_group_name,
84        }
85    }
86
87    /// Makes a zip file, then uploads it.
88    pub async fn report_profiling_data(
89        &self,
90        jfr: Vec<u8>,
91        metadata_obj: &ReportMetadata<'_>,
92    ) -> Result<(), S3ReporterError> {
93        tracing::debug!("sending file to backend");
94
95        let metadata_json = MetadataJson {
96            start: metadata_obj.start.as_millis() as u64,
97            end: metadata_obj.end.as_millis() as u64,
98            reporting_interval: metadata_obj.reporting_interval.as_millis() as u64,
99        };
100
101        // Create a zip file.
102        let zip = tokio::task::spawn_blocking(move || {
103            add_files_to_zip("async_profiler_dump_0.jfr", &jfr, metadata_json)
104        })
105        .await??;
106
107        // Send zip file to the S3 pre-signed URL.
108        send_profile_data(
109            &self.s3_client,
110            self.bucket_owner.clone(),
111            self.bucket_name.clone(),
112            make_s3_file_name(
113                metadata_obj.instance,
114                &self.profiling_group_name,
115                SystemTime::now(),
116            ),
117            zip,
118        )
119        .await?;
120
121        Ok(())
122    }
123}
124
125fn make_s3_file_name(
126    metadata_obj: &AgentMetadata,
127    profiling_group_name: &str,
128    time: SystemTime,
129) -> String {
130    let machine = match metadata_obj {
131        AgentMetadata::Ec2AgentMetadata {
132            aws_account_id: _,
133            aws_region_id: _,
134            ec2_instance_id,
135            ..
136        } => {
137            let ec2_instance_id = ec2_instance_id.replace("/", "-").replace("_", "-");
138            format!("ec2_{ec2_instance_id}_")
139        }
140        AgentMetadata::FargateAgentMetadata {
141            aws_account_id: _,
142            aws_region_id: _,
143            ecs_task_arn,
144            ecs_cluster_arn: _,
145            ..
146        } => {
147            let task_arn = ecs_task_arn.replace("/", "-").replace("_", "-");
148            format!("ecs_{task_arn}_")
149        }
150        #[allow(deprecated)]
151        AgentMetadata::Other => "onprem__".to_string(),
152        AgentMetadata::NoMetadata => "unknown__".to_string(),
153    };
154    let time: chrono::DateTime<chrono::Utc> = time.into();
155    let time = time
156        .to_rfc3339_opts(SecondsFormat::Secs, true)
157        .replace(":", "-");
158    let pid = std::process::id();
159    format!("profile_{profiling_group_name}_{machine}_{pid}_{time}.zip")
160}
161
162#[async_trait]
163impl Reporter for S3Reporter {
164    async fn report(
165        &self,
166        jfr: Vec<u8>,
167        metadata: &ReportMetadata,
168    ) -> Result<(), Box<dyn std::error::Error + Send>> {
169        self.report_profiling_data(jfr, metadata)
170            .await
171            .map_err(|e| Box::new(e) as _)
172    }
173}
174
175impl fmt::Debug for S3Reporter {
176    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
177        f.debug_struct("S3Reporter").finish()
178    }
179}
180
181fn add_files_to_zip(
182    jfr_filename: &str,
183    jfr_file: &[u8],
184    metadata_json: MetadataJson,
185) -> Result<Vec<u8>, S3ReporterError> {
186    tracing::debug!("creating zip file");
187
188    let file = Cursor::new(vec![]);
189    let mut zip = ZipWriter::new(file);
190    let metadata = serde_json::ser::to_string(&metadata_json).unwrap();
191    add_bytes_to_zip(&mut zip, jfr_filename, jfr_file).map_err(S3ReporterError::ZipIoError)?;
192    add_bytes_to_zip(&mut zip, "metadata.json", metadata.as_bytes())
193        .map_err(S3ReporterError::ZipIoError)?;
194    Ok(zip.finish()?.into_inner())
195}
196
197fn add_bytes_to_zip(
198    zip: &mut ZipWriter<Cursor<Vec<u8>>>,
199    filename: &str,
200    data: &[u8],
201) -> Result<(), std::io::Error> {
202    let options = SimpleFileOptions::default().compression_method(zip::CompressionMethod::Deflated);
203    zip.start_file(filename, options)?;
204    zip.write_all(data)?;
205
206    Ok(())
207}
208
209async fn send_profile_data(
210    s3_client: &aws_sdk_s3::Client,
211    bucket_owner: String,
212    bucket_name: String,
213    object_name: String,
214    zip: Vec<u8>,
215) -> Result<(), S3ReporterError> {
216    tracing::debug!(message="uploading to s3", bucket_name=?bucket_name, object_name=?object_name);
217    // Make http call to upload JFR to S3.
218    s3_client
219        .put_object()
220        .expected_bucket_owner(bucket_owner)
221        .bucket(bucket_name)
222        .key(object_name)
223        .body(zip.into())
224        .content_type("application/zip")
225        .send()
226        .await
227        .map_err(|x| S3ReporterError::SendProfileS3Data(Box::new(x.into())))?;
228    Ok(())
229}
230
231#[cfg(test)]
232mod test {
233    use std::{
234        io,
235        sync::{Arc, Mutex},
236        time::SystemTime,
237    };
238
239    use aws_sdk_s3::operation::put_object::PutObjectOutput;
240    use aws_smithy_mocks::{mock, mock_client};
241
242    use test_case::test_case;
243
244    use crate::{
245        metadata::{AgentMetadata, DUMMY_METADATA},
246        reporter::s3::S3Reporter,
247    };
248
249    fn assert_zip(zip_file: Vec<u8>) {
250        let zip = zip::ZipArchive::new(io::Cursor::new(&zip_file)).unwrap();
251        let mut file_names: Vec<_> = zip.file_names().collect();
252        file_names.sort();
253        assert_eq!(
254            file_names,
255            vec!["async_profiler_dump_0.jfr", "metadata.json"]
256        );
257    }
258
259    #[test_case(#[allow(deprecated)] { AgentMetadata::Other }, "profile_pg_onprem___<pid>_<time>.zip"; "other")]
260    #[test_case(AgentMetadata::NoMetadata, "profile_pg_unknown___<pid>_<time>.zip"; "no-metadata")]
261    #[test_case(AgentMetadata::ec2_agent_metadata(
262        "1".into(),
263        "us-east-1".into(),
264        "i-0".into()
265    ).build(), "profile_pg_ec2_i-0__<pid>_<time>.zip"; "ec2")]
266    #[test_case(AgentMetadata::fargate_agent_metadata(
267        "1".into(),
268        "us-east-1".into(),
269        "arn:aws:ecs:us-east-1:123456789012:task/profiler-metadata-cluster/5261e761e0e2a3d92da3f02c8e5bab1f".into(),
270        "arn:aws:ecs:us-east-1:123456789012:cluster/profiler-metadata-cluster".into(),
271    ).build(), "profile_pg_ecs_arn:aws:ecs:us-east-1:123456789012:task-profiler-metadata-cluster-5261e761e0e2a3d92da3f02c8e5bab1f__<pid>_<time>.zip"; "ecs")]
272    fn test_make_s3_file_name(metadata: AgentMetadata, expected: &str) {
273        let file_name = super::make_s3_file_name(&metadata, "pg", SystemTime::UNIX_EPOCH);
274        assert_eq!(
275            file_name,
276            expected
277                .replace("<pid>", &std::process::id().to_string())
278                .replace("<time>", "1970-01-01T00-00-00Z")
279        );
280    }
281
282    #[tokio::test]
283    async fn test_reporter() {
284        let uploaded_file = Arc::new(Mutex::new(None));
285        let uploaded_file_ = uploaded_file.clone();
286        let put_object_rule = mock!(aws_sdk_s3::Client::put_object)
287            .match_requests(move |req| {
288                *uploaded_file_.lock().unwrap() = Some(req.body().bytes().unwrap().to_vec());
289                true
290            })
291            .then_output(|| PutObjectOutput::builder().build());
292
293        // Create a mocked client with the rule
294        // Use the standard Builder instead of with_test_defaults
295        let reporter = S3Reporter {
296            s3_client: mock_client!(aws_sdk_s3, [&put_object_rule]),
297            bucket_owner: "123456789012".into(),
298            bucket_name: "123456789012-bucket".into(),
299            profiling_group_name: "test-profiling-group".into(),
300        };
301        reporter
302            .report_profiling_data(b"JFR".into(), &DUMMY_METADATA)
303            .await
304            .unwrap();
305        assert_zip(uploaded_file.lock().unwrap().take().unwrap());
306    }
307
308    #[tokio::test]
309    async fn test_reporter_error() {
310        let put_object_rule = mock!(aws_sdk_s3::Client::put_object).then_error(|| {
311            aws_sdk_s3::operation::put_object::PutObjectError::unhandled(io::Error::new(
312                io::ErrorKind::Other,
313                "oh no",
314            ))
315        });
316
317        // Create a mocked client with the rule
318        // Use the standard Builder instead of with_test_defaults
319        let reporter = S3Reporter {
320            s3_client: mock_client!(aws_sdk_s3, [&put_object_rule]),
321            bucket_owner: "123456789012".into(),
322            bucket_name: "123456789012-bucket".into(),
323            profiling_group_name: "test-profiling-group".into(),
324        };
325        reporter
326            .report_profiling_data(b"JFR".into(), &DUMMY_METADATA)
327            .await
328            .unwrap_err();
329    }
330}