mirror of
https://github.com/zerotier/ZeroTierOne.git
synced 2025-04-26 00:47:31 +02:00
Locator creation.
This commit is contained in:
parent
37ef33caa0
commit
a0a79fa1b7
8 changed files with 181 additions and 69 deletions
4
.gitignore
vendored
4
.gitignore
vendored
|
@ -39,5 +39,5 @@ node_modules
|
|||
/*.opendb
|
||||
/rust-zerotier-core/src/capi.rs
|
||||
/rust-zerotier-core/target
|
||||
/rust-zerotier-service/target
|
||||
/rust-zerotier-service/src/osdep.rs
|
||||
/service/target
|
||||
/service/src/osdep.rs
|
||||
|
|
|
@ -36,7 +36,7 @@ pub enum EndpointType {
|
|||
|
||||
pub struct Endpoint {
|
||||
pub type_: EndpointType,
|
||||
capi: ztcore::ZT_Endpoint
|
||||
pub(crate) capi: ztcore::ZT_Endpoint
|
||||
}
|
||||
|
||||
impl Endpoint {
|
||||
|
|
|
@ -16,6 +16,7 @@ use std::os::raw::{c_char, c_int, c_uint};
|
|||
|
||||
use crate::*;
|
||||
use crate::capi as ztcore;
|
||||
use std::ptr::null;
|
||||
|
||||
pub struct Locator {
|
||||
pub(crate) capi: *const ztcore::ZT_Locator,
|
||||
|
@ -23,6 +24,22 @@ pub struct Locator {
|
|||
}
|
||||
|
||||
impl Locator {
|
||||
/// Create and sign a new locator.
|
||||
/// The signer must include its secret key.
|
||||
pub fn new(signer: &Identity, timestamp: i64, endpoints: &Vec<Endpoint>) -> Result<Locator, ResultCode> {
|
||||
let mut capi_endpoints: Vec<ztcore::ZT_Endpoint> = Vec::new();
|
||||
capi_endpoints.reserve(endpoints.len());
|
||||
for ep in endpoints.iter() {
|
||||
capi_endpoints.push(ep.capi);
|
||||
}
|
||||
let loc = unsafe { ztcore::ZT_Locator_create(timestamp, capi_endpoints.as_ptr(), null(), capi_endpoints.len() as c_uint, signer.capi) };
|
||||
if loc.is_null() {
|
||||
Err(ResultCode::ErrorBadParameter)
|
||||
} else {
|
||||
Ok(Locator::new_from_capi(loc, true))
|
||||
}
|
||||
}
|
||||
|
||||
#[inline(always)]
|
||||
pub(crate) fn new_from_capi(l: *const ztcore::ZT_Locator, requires_delete: bool) -> Locator {
|
||||
Locator{
|
||||
|
@ -89,7 +106,7 @@ impl Clone for Locator {
|
|||
|
||||
impl ToString for Locator {
|
||||
fn to_string(&self) -> String {
|
||||
let mut buf: [u8; 4096] = [0; 4096];
|
||||
let mut buf = [0_u8; 16384];
|
||||
unsafe {
|
||||
if ztcore::ZT_Locator_toString(self.capi, buf.as_mut_ptr() as *mut c_char, buf.len() as c_int).is_null() {
|
||||
return String::from("(invalid)");
|
||||
|
|
|
@ -20,89 +20,91 @@ fn make_help() -> String {
|
|||
(c)2013-2021 ZeroTier, Inc.
|
||||
Licensed under the ZeroTier BSL (see LICENSE.txt)
|
||||
|
||||
Usage: zerotier [-global options] <command> [command args]
|
||||
Usage: zerotier [-...] <command> [command args]
|
||||
|
||||
Global Options:
|
||||
|
||||
-j Output raw JSON where applicable
|
||||
-p <path> Use alternate base path
|
||||
-t <path> Load secret auth token from a file
|
||||
-T <token> Set secret auth token on command line
|
||||
-j Output raw JSON where applicable
|
||||
-p <path> Use alternate base path
|
||||
-t <path> Load secret auth token from a file
|
||||
-T <token> Set secret token on command line
|
||||
|
||||
Common Operations:
|
||||
|
||||
help Show this help
|
||||
version Print version
|
||||
help Show this help
|
||||
version Print version
|
||||
|
||||
· status Show node status and configuration
|
||||
· status Show node status and configuration
|
||||
|
||||
· set [setting] [value] List all settings (with no args)
|
||||
· port <port> Primary P2P port
|
||||
· secondaryport <port/0> Secondary P2P port (0 to disable)
|
||||
· blacklist cidr <IP/bits> <boolean> Toggle physical path blacklisting
|
||||
· blacklist if <prefix> <boolean> [Un]blacklist interface prefix
|
||||
· portmap <boolean> Toggle use of uPnP and NAT-PMP
|
||||
· set [setting] [value] List all settings (with no args)
|
||||
· port <port> Primary P2P port
|
||||
· secondaryport <port/0> Secondary P2P port (0 to disable)
|
||||
· blacklist cidr <IP/bits> <boolean> Toggle physical path blacklisting
|
||||
· blacklist if <prefix> <boolean> [Un]blacklist interface prefix
|
||||
· portmap <boolean> Toggle use of uPnP and NAT-PMP
|
||||
|
||||
· peer <command> [option]
|
||||
· show <address> Show detailed peer information
|
||||
· list List peers
|
||||
· listroots List root peers
|
||||
· try <address> <endpoint> [...] Try peer at explicit endpoint
|
||||
· show <address> Show detailed peer information
|
||||
· list List peers
|
||||
· listroots List root peers
|
||||
· try <address> <endpoint> [...] Try peer at explicit endpoint
|
||||
|
||||
· network <command> [option]
|
||||
· show <network ID> Show detailed network information
|
||||
· list List networks
|
||||
· set <network ID> [option] [value] Get or set network options
|
||||
· manageips <boolean> Is IP management allowed?
|
||||
· manageroutes <boolean> Is route management allowed?
|
||||
· managedns <boolean> Allow network to push DNS config
|
||||
· globalips <boolean> Allow assignment of global IPs?
|
||||
· globalroutes <boolean> Can global IP space routes be set?
|
||||
· defaultroute <boolean> Can default route be overridden?
|
||||
· show <network ID> Show detailed network information
|
||||
· list List networks
|
||||
· set <network ID> [option] [value] Get or set network options
|
||||
· manageips <boolean> Is IP management allowed?
|
||||
· manageroutes <boolean> Is route management allowed?
|
||||
· managedns <boolean> Allow network to push DNS config
|
||||
· globalips <boolean> Allow assignment of global IPs?
|
||||
· globalroutes <boolean> Can global IP routes be set?
|
||||
· defaultroute <boolean> Can default route be overridden?
|
||||
|
||||
· join [-options] <network> Join a virtual network
|
||||
-c <identity | fingerprint> Controller identity or fingerprint
|
||||
· leave <network> Leave a virtual network
|
||||
· join [-...] <network> Join a virtual network
|
||||
-c <identity | fingerprint> Controller identity / fingerprint
|
||||
· leave <network> Leave a virtual network
|
||||
|
||||
Advanced Operations:
|
||||
|
||||
service Start this node (runs until stopped)
|
||||
service Start this node
|
||||
(usually not run directly)
|
||||
|
||||
controller <command> [option]
|
||||
· list List networks on controller
|
||||
· new Create a new network
|
||||
· set <network> [setting] [value] Show or modify network settings
|
||||
· show <network> [<address>] Show network or member status
|
||||
· auth <address> Authorize a peer
|
||||
· deauth <address> Deauthorize a peer
|
||||
· list List networks on controller
|
||||
· new Create a new network
|
||||
· set <network> [setting] [value] Show or modify network settings
|
||||
· show <network> [<address>] Show network or member status
|
||||
· auth <address> Authorize a peer
|
||||
· deauth <address> Deauthorize a peer
|
||||
|
||||
identity <command> [args]
|
||||
new [c25519 | p384] Create identity (default: c25519)
|
||||
getpublic <identity> Extract only public part of identity
|
||||
fingerprint <identity> Get an identity's fingerprint
|
||||
validate <identity> Locally validate an identity
|
||||
sign <identity> <file> Sign a file with an identity's key
|
||||
verify <identity> <file> <sig> Verify a signature
|
||||
new [c25519 | p384] Create identity (default: c25519)
|
||||
getpublic <identity> Extract public part of identity
|
||||
fingerprint <identity> Get an identity's fingerprint
|
||||
validate <identity> Locally validate an identity
|
||||
sign <identity> <file> Sign a file with an identity's key
|
||||
verify <identity> <file> <sig> Verify a signature
|
||||
|
||||
locator <command> [args]
|
||||
new <identity> <endpoint> [...] Create new signed locator
|
||||
verify <identity> <locator> Verify locator signature
|
||||
show <locator> Show contents of a locator
|
||||
new [-...] <identity> <endpoint> [...] Create new signed locator
|
||||
-t <timestamp> Timestamp (default: system time)
|
||||
verify <identity> <locator> Verify locator signature
|
||||
show <locator> Show contents of a locator
|
||||
|
||||
cert <command> [args]
|
||||
· list List certificates at local node
|
||||
· show <serial> Show certificate details
|
||||
newsid [sid secret out] Create a new subject unique ID
|
||||
newcsr <csr output path> Create a subject CSR (interactive)
|
||||
sign <csr> <identity> [cert out] Sign a CSR to create a certificate
|
||||
verify <cert> Verify certificate (not chain)
|
||||
dump <cert> Verify and print certificate
|
||||
· import <cert> [trust,trust,...] Import certificate into this node
|
||||
trust flag: rootca Certificate is a root CA
|
||||
trust flag: ztrootset ZeroTier root node set
|
||||
· factoryreset Re-import compiled-in default certs
|
||||
· export <serial> [path] Export a certificate from this node
|
||||
· delete <serial|ALL> Delete certificate from this node
|
||||
· list List certificates at local node
|
||||
· show <serial> Show certificate details
|
||||
newsid [sid secret out] Create a new subject unique ID
|
||||
newcsr <csr output path> Create a subject CSR (interactive)
|
||||
sign <csr> <identity> [cert out] Sign a CSR to create a certificate
|
||||
verify <cert> Verify certificate (not chain)
|
||||
dump <cert> Verify and print certificate
|
||||
· import <cert> [trust,trust,...] Import certificate into this node
|
||||
trust flag: rootca Certificate is a root CA
|
||||
trust flag: ztrootset ZeroTier root node set
|
||||
· factoryreset Re-import compiled-in default certs
|
||||
· export <serial> [path] Export a certificate from this node
|
||||
· delete <serial|ALL> Delete certificate from this node
|
||||
|
||||
· Command requires a running node and access to a local API token.
|
||||
|
||||
|
@ -144,6 +146,8 @@ fn is_valid_port(v: String) -> Result<(), String> {
|
|||
|
||||
/// Parses CLI arguments, prints error and exits on failure.
|
||||
pub(crate) fn parse_cli_args() -> ArgMatches<'static> {
|
||||
// NOTE: the names of these arguments must match the names used to look
|
||||
// them up in the various command demuxers under commands/.
|
||||
let help = make_help();
|
||||
let args = App::new("zerotier")
|
||||
.arg(Arg::with_name("json").short("j"))
|
||||
|
@ -219,6 +223,7 @@ pub(crate) fn parse_cli_args() -> ArgMatches<'static> {
|
|||
.arg(Arg::with_name("signature").index(3).required(true))))
|
||||
.subcommand(App::new("locator")
|
||||
.subcommand(App::new("new")
|
||||
.arg(Arg::with_name("timestamp").short("t").required(false))
|
||||
.arg(Arg::with_name("identity").index(1).required(true))
|
||||
.arg(Arg::with_name("endpoint").index(2).multiple(true).required(true)))
|
||||
.subcommand(App::new("verify")
|
||||
|
|
|
@ -16,8 +16,6 @@ use std::str::FromStr;
|
|||
|
||||
use clap::ArgMatches;
|
||||
use dialoguer::Input;
|
||||
use lazy_static::lazy_static;
|
||||
|
||||
use zerotier_core::*;
|
||||
|
||||
use crate::store::Store;
|
||||
|
@ -260,7 +258,7 @@ fn import<'a>(store: &Store, cli_args: &ArgMatches<'a>, auth_token: &Option<Stri
|
|||
0
|
||||
}
|
||||
|
||||
fn restore(store: &Store, auth_token: &Option<String>) -> i32 {
|
||||
fn factoryreset(store: &Store, auth_token: &Option<String>) -> i32 {
|
||||
0
|
||||
}
|
||||
|
||||
|
@ -282,7 +280,7 @@ pub(crate) fn run<'a>(store: &Store, cli_args: &ArgMatches<'a>, auth_token: &Opt
|
|||
("verify", Some(sub_cli_args)) => verify(store, sub_cli_args, auth_token),
|
||||
("dump", Some(sub_cli_args)) => dump(store, sub_cli_args, auth_token),
|
||||
("import", Some(sub_cli_args)) => import(store, sub_cli_args, auth_token),
|
||||
("factoryreset", None) => restore(store, auth_token),
|
||||
("factoryreset", None) => factoryreset(store, auth_token),
|
||||
("export", Some(sub_cli_args)) => export(store, sub_cli_args, auth_token),
|
||||
("delete", Some(sub_cli_args)) => delete(store, sub_cli_args, auth_token),
|
||||
_ => {
|
||||
|
|
|
@ -0,0 +1,90 @@
|
|||
/*
|
||||
* Copyright (c)2013-2021 ZeroTier, Inc.
|
||||
*
|
||||
* Use of this software is governed by the Business Source License included
|
||||
* in the LICENSE.TXT file in the project's root directory.
|
||||
*
|
||||
* Change Date: 2026-01-01
|
||||
*
|
||||
* On the date above, in accordance with the Business Source License, use
|
||||
* of this software will be governed by version 2.0 of the Apache License.
|
||||
*/
|
||||
/****/
|
||||
|
||||
use clap::ArgMatches;
|
||||
|
||||
use zerotier_core::*;
|
||||
|
||||
use crate::store::Store;
|
||||
|
||||
fn new_<'a>(store: &Store, cli_args: &ArgMatches<'a>) -> i32 {
|
||||
let timestamp = cli_args.value_of("timestamp").map_or(crate::utils::ms_since_epoch(), |ts| {
|
||||
if ts.is_empty() {
|
||||
0_i64
|
||||
} else {
|
||||
i64::from_str_radix(ts, 10).unwrap_or(0_i64) * 1000_i64 // internally uses ms since epoch
|
||||
}
|
||||
});
|
||||
if timestamp <= 0 {
|
||||
println!("ERROR: invalid or empty timestamp specified.");
|
||||
return 1;
|
||||
}
|
||||
|
||||
let identity = crate::utils::read_identity(cli_args.value_of("identity").unwrap(), true);
|
||||
if identity.is_err() {
|
||||
println!("ERROR: identity invalid: {}", identity.err().unwrap());
|
||||
return 1;
|
||||
}
|
||||
let identity = identity.unwrap();
|
||||
if !identity.has_private() {
|
||||
println!("ERROR: identity must include secret key to create and sign a locator.");
|
||||
return 1;
|
||||
}
|
||||
|
||||
let endpoints_cli = cli_args.values_of("endpoint");
|
||||
if endpoints_cli.is_none() {
|
||||
println!("ERROR: at least one endpoint required.");
|
||||
return 1;
|
||||
}
|
||||
let mut endpoints: Vec<Endpoint> = Vec::new();
|
||||
let mut endpoint_bad = false;
|
||||
endpoints_cli.unwrap().for_each(|ep_str| {
|
||||
Endpoint::new_from_string(ep_str).map_or_else(|e| {
|
||||
println!("ERROR: endpoint {} invalid: {}", ep_str, e.to_str());
|
||||
endpoint_bad = true;
|
||||
}, |ep| {
|
||||
endpoints.push(ep);
|
||||
});
|
||||
});
|
||||
if endpoint_bad {
|
||||
return 1;
|
||||
}
|
||||
|
||||
Locator::new(&identity, timestamp, &endpoints).map_or_else(|e| {
|
||||
println!("ERROR: failure creating locator: {}", e.to_str());
|
||||
1
|
||||
}, |loc| {
|
||||
println!("{}", loc.to_string());
|
||||
0
|
||||
})
|
||||
}
|
||||
|
||||
fn verify<'a>(store: &Store, cli_args: &ArgMatches<'a>) -> i32 {
|
||||
0
|
||||
}
|
||||
|
||||
fn show<'a>(store: &Store, cli_args: &ArgMatches<'a>) -> i32 {
|
||||
0
|
||||
}
|
||||
|
||||
pub(crate) fn run<'a>(store: &Store, cli_args: &ArgMatches<'a>, _: &Option<String>) -> i32 {
|
||||
match cli_args.subcommand() {
|
||||
("new", Some(sub_cli_args)) => new_(store, sub_cli_args),
|
||||
("verify", Some(sub_cli_args)) => verify(store, sub_cli_args),
|
||||
("show", Some(sub_cli_args)) => show(store, sub_cli_args),
|
||||
_ => {
|
||||
crate::cli::print_help();
|
||||
1
|
||||
}
|
||||
}
|
||||
}
|
|
@ -102,7 +102,9 @@ fn main() {
|
|||
}
|
||||
("controller", Some(sub_cli_args)) => {}
|
||||
("identity", Some(sub_cli_args)) => {}
|
||||
("locator", Some(sub_cli_args)) => {}
|
||||
("locator", Some(sub_cli_args)) => {
|
||||
process_exit_value = crate::commands::locator::run(&store, sub_cli_args, &auth_token);
|
||||
}
|
||||
("cert", Some(sub_cli_args)) => {
|
||||
process_exit_value = crate::commands::cert::run(&store, sub_cli_args, &auth_token);
|
||||
}
|
||||
|
|
|
@ -220,7 +220,7 @@ async fn run_async(store: &Arc<Store>, auth_token: String, log: &Arc<Log>, local
|
|||
let service = service; // make immutable after setting node
|
||||
|
||||
let mut local_config = service.local_config();
|
||||
store.write_port(local_config.settings.primary_port);
|
||||
let _ = store.write_port(local_config.settings.primary_port);
|
||||
|
||||
let mut now: i64 = ms_since_epoch();
|
||||
let mut loop_delay = zerotier_core::NODE_BACKGROUND_TASKS_MAX_INTERVAL;
|
||||
|
|
Loading…
Add table
Reference in a new issue