mirror of
https://github.com/zerotier/ZeroTierOne.git
synced 2025-04-27 09:23:51 +02:00
955 lines
32 KiB
C++
955 lines
32 KiB
C++
/*
|
|
* ZeroTier One - Network Virtualization Everywhere
|
|
* Copyright (C) 2011-2018 ZeroTier, Inc.
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#ifdef ZT_CONTROLLER_USE_LIBPQ
|
|
|
|
#include "PostgreSQL.hpp"
|
|
#include "EmbeddedNetworkController.hpp"
|
|
#include "../version.h"
|
|
|
|
#include <pqxx/pqxx>
|
|
#include <sstream>
|
|
|
|
using json = nlohmann::json;
|
|
namespace {
|
|
|
|
static const char *_timestr()
|
|
{
|
|
time_t t = time(0);
|
|
char *ts = ctime(&t);
|
|
char *p = ts;
|
|
if (!p)
|
|
return "";
|
|
while (*p) {
|
|
if (*p == '\n') {
|
|
*p = (char)0;
|
|
break;
|
|
}
|
|
++p;
|
|
}
|
|
return ts;
|
|
}
|
|
|
|
std::string join(const std::vector<std::string> &elements, const char * const separator)
|
|
{
|
|
switch(elements.size()) {
|
|
case 0:
|
|
return "";
|
|
case 1:
|
|
return elements[0];
|
|
default:
|
|
std::ostringstream os;
|
|
std::copy(elements.begin(), elements.end()-1, std::ostream_iterator<std::string>(os, separator));
|
|
os << *elements.rbegin();
|
|
return os.str();
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
namespace ZeroTier {
|
|
|
|
class _MemberNotificationReceiver : public pqxx::notification_receiver
|
|
{
|
|
private:
|
|
ZeroTier::PostgreSQL *_pgsql;
|
|
|
|
public:
|
|
_MemberNotificationReceiver(pqxx::connection_base &c, const std::string &channel, ZeroTier::PostgreSQL *pgsql)
|
|
: pqxx::notification_receiver(c, channel)
|
|
, _pgsql(pgsql)
|
|
{}
|
|
|
|
virtual void operator()(const std::string &payload, int backend_pid)
|
|
{
|
|
try {
|
|
json tmp(json::parse(payload));
|
|
json &ov = tmp["old_val"];
|
|
json &nv = tmp["new_val"];
|
|
json oldConfig, newConfig;
|
|
if (ov.is_object()) oldConfig = ov;
|
|
if (nv.is_object()) newConfig = nv;
|
|
if (oldConfig.is_object() || newConfig.is_object()) {
|
|
_pgsql->_memberChanged(oldConfig,newConfig,_pgsql->isReady());
|
|
}
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "Exception parsing member notification: %s\n", e.what());
|
|
}
|
|
}
|
|
};
|
|
|
|
class _NetworkNotificationReceiver : public pqxx::notification_receiver
|
|
{
|
|
private:
|
|
ZeroTier::PostgreSQL *_pgsql;
|
|
public:
|
|
_NetworkNotificationReceiver(pqxx::connection_base &c, const std::string &channel, ZeroTier::PostgreSQL *pgsql)
|
|
: pqxx::notification_receiver(c, channel)
|
|
, _pgsql(pgsql)
|
|
{}
|
|
|
|
virtual void operator()(const std::string &payload, int backend_pid)
|
|
{
|
|
try {
|
|
json tmp(json::parse(payload));
|
|
json &ov = tmp["old_val"];
|
|
json &nv = tmp["new_val"];
|
|
json oldConfig, newConfig;
|
|
if (ov.is_object()) oldConfig = ov;
|
|
if (nv.is_object()) newConfig = nv;
|
|
if (oldConfig.is_object()||newConfig.is_object()) {
|
|
_pgsql->_networkChanged(oldConfig,newConfig,_pgsql->isReady());
|
|
}
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "Exception parsing member notification: %s\n", e.what());
|
|
} // ignore bad records
|
|
}
|
|
};
|
|
|
|
} // namespace ZeroTier
|
|
|
|
using namespace ZeroTier;
|
|
|
|
PostgreSQL::PostgreSQL(EmbeddedNetworkController *const nc, const Identity &myId, const char *path)
|
|
: DB(nc, myId, path)
|
|
, _ready(0)
|
|
, _connected(1)
|
|
, _run(1)
|
|
, _waitNoticePrinted(false)
|
|
{
|
|
fprintf(stderr, "PostgreSQL Constructed");
|
|
_connString = std::string(path);
|
|
|
|
_readyLock.lock();
|
|
_heartbeatThread = std::thread(&PostgreSQL::heartbeat, this);
|
|
_membersDbWatcher = std::thread(&PostgreSQL::membersDbWatcher, this);
|
|
_networksDbWatcher = std::thread(&PostgreSQL::networksDbWatcher, this);
|
|
for (int i = 0; i < ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS; ++i) {
|
|
_commitThread[i] = std::thread(&PostgreSQL::commitThread, this);
|
|
}
|
|
_onlineNotificationThread = std::thread(&PostgreSQL::onlineNotificationThread, this);
|
|
}
|
|
|
|
PostgreSQL::~PostgreSQL()
|
|
{
|
|
_run = 0;
|
|
std::this_thread::sleep_for(std::chrono::milliseconds(100));
|
|
|
|
_heartbeatThread.join();
|
|
_membersDbWatcher.join();
|
|
_networksDbWatcher.join();
|
|
for (int i = 0; i < ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS; ++i) {
|
|
_commitThread[i].join();
|
|
}
|
|
_onlineNotificationThread.join();
|
|
|
|
}
|
|
|
|
|
|
bool PostgreSQL::waitForReady()
|
|
{
|
|
while (_ready < 2) {
|
|
if (!_waitNoticePrinted) {
|
|
_waitNoticePrinted = true;
|
|
fprintf(stderr, "[%s] NOTICE: %.10llx controller PostgreSQL waiting for initial data download..." ZT_EOL_S, ::_timestr(), (unsigned long long)_myAddress.toInt());
|
|
}
|
|
_readyLock.lock();
|
|
_readyLock.unlock();
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool PostgreSQL::isReady()
|
|
{
|
|
return ((_ready == 2)&&(_connected));
|
|
}
|
|
|
|
void PostgreSQL::save(nlohmann::json *orig, nlohmann::json &record)
|
|
{
|
|
try {
|
|
if (!record.is_object()) {
|
|
return;
|
|
}
|
|
waitForReady();
|
|
if (orig) {
|
|
if (*orig != record) {
|
|
record["revision"] = OSUtils::jsonInt(record["revision"],0ULL) + 1;
|
|
_commitQueue.post(new nlohmann::json(record));
|
|
}
|
|
} else {
|
|
record["revision"] = 1;
|
|
_commitQueue.post(new nlohmann::json(record));
|
|
}
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "Error on PostgreSQL::save: %s\n", e.what());
|
|
} catch (...) {
|
|
fprintf(stderr, "Unknown error on PostgreSQL::save\n");
|
|
}
|
|
}
|
|
|
|
void PostgreSQL::eraseNetwork(const uint64_t networkId)
|
|
{
|
|
char tmp2[24];
|
|
waitForReady();
|
|
Utils::hex(networkId, tmp2);
|
|
json *tmp = new json();
|
|
(*tmp)["id"] = tmp2;
|
|
(*tmp)["objtype"] = "_delete_network";
|
|
_commitQueue.post(tmp);
|
|
}
|
|
|
|
void PostgreSQL::eraseMember(const uint64_t networkId, const uint64_t memberId)
|
|
{
|
|
char tmp2[24];
|
|
json *tmp = new json();
|
|
Utils::hex(networkId, tmp2);
|
|
(*tmp)["nwid"] = tmp2;
|
|
Utils::hex(memberId, tmp2);
|
|
(*tmp)["id"] = tmp2;
|
|
(*tmp)["objtype"] = "_delete_member";
|
|
_commitQueue.post(tmp);
|
|
}
|
|
|
|
void PostgreSQL::nodeIsOnline(const uint64_t networkId, const uint64_t memberId, const InetAddress &physicalAddress)
|
|
{
|
|
std::lock_guard<std::mutex> l(_lastOnline_l);
|
|
std::pair<int64_t, InetAddress> &i = _lastOnline[std::pair<uint64_t,uint64_t>(networkId, memberId)];
|
|
i.first = OSUtils::now();
|
|
if (physicalAddress) {
|
|
i.second = physicalAddress;
|
|
}
|
|
}
|
|
|
|
void PostgreSQL::initializeNetworks(pqxx::connection &conn)
|
|
{
|
|
try {
|
|
if (!conn.is_open()) {
|
|
fprintf(stderr, "Bad Database Connection in initializeNetworks\n");
|
|
exit(1);
|
|
}
|
|
|
|
pqxx::work w(conn);
|
|
|
|
pqxx::result r = w.exec("SELECT id, EXTRACT(EPOCH FROM creation_time AT TIME ZONE 'UTC')*1000 AS creation_time, capabilities, "
|
|
"enable_broadcast, EXTRACT(EPOCH FROM last_modified AT TIME ZONE 'UTC')*1000 AS last_modified, mtu, multicast_limit, name, private, remote_trace_level, "
|
|
"remote_trace_target, revision, rules, tags, v4_assign_mode, v6_assign_mode FROM ztc_network "
|
|
"WHERE deleted = false AND controller_id = '" + w.esc(_myAddressStr) + "'");
|
|
|
|
|
|
for (pqxx::result::const_iterator row = r.begin(); row != r.end(); ++row) {
|
|
json empty;
|
|
json config;
|
|
|
|
std::string nwid = row["id"].as<std::string>();
|
|
config["id"] = nwid;
|
|
config["nwid"] = nwid;
|
|
try {
|
|
config["creationTime"] = row["creation_time"].as<uint64_t>();
|
|
} catch(std::exception &e) {
|
|
config["creationTime"] = 0ULL;
|
|
}
|
|
config["capabilities"] = json::parse(row["capabilities"].as<std::string>());
|
|
config["enableBroadcast"] = row["enable_broadcast"].as<bool>();
|
|
try {
|
|
config["lastModified"] = row["last_modified"].as<uint64_t>();
|
|
} catch (std::exception &e) {
|
|
config["lastModified"] = 0ULL;
|
|
}
|
|
try {
|
|
config["mtu"] = row["mtu"].as<int>();
|
|
} catch (std::exception &e) {
|
|
config["mtu"] = 2800;
|
|
}
|
|
try {
|
|
config["multicastLimit"] = row["multicast_limit"].as<int>();
|
|
} catch (std::exception &e) {
|
|
config["multicastLimit"] = 64;
|
|
}
|
|
config["name"] = row["name"].as<std::string>();
|
|
config["private"] = row["private"].as<bool>();
|
|
try {
|
|
config["remoteTraceLevel"] = row["remote_trace_level"].as<int>();
|
|
} catch (std::exception &e) {
|
|
config["remoteTraceLevel"] = 0;
|
|
}
|
|
config["remoteTraceTarget"] = (row["remote_trace_target"].is_null() ? nullptr : row["remote_trace_target"].as<std::string>());
|
|
try {
|
|
config["revision"] = row["revision"].as<uint64_t>();
|
|
} catch (std::exception &e) {
|
|
config["revision"] = 0ULL;
|
|
//fprintf(stderr, "Error converting revision: %s\n", PQgetvalue(res, i, 11));
|
|
}
|
|
config["rules"] = json::parse(row["rules"].as<std::string>());
|
|
config["tags"] = json::parse(row["tags"].as<std::string>());
|
|
config["v4AssignMode"] = json::parse(row["v4_assign_mode"].as<std::string>());
|
|
config["v6AssignMode"] = json::parse(row["v6_assign_mode"].as<std::string>());
|
|
config["objtype"] = "network";
|
|
config["ipAssignmentPools"] = json::array();
|
|
config["routes"] = json::array();
|
|
|
|
pqxx::work w2(conn);
|
|
pqxx::result res2 = w2.exec("SELECT host(ip_range_start) AS ip_range_start, host(ip_range_end) AS ip_range_end FROM ztc_network_assignment_pool WHERE network_id = '" + w2.esc(nwid) + "'");
|
|
for(pqxx::result::const_iterator it = res2.begin(); it != res2.end(); ++it) {
|
|
json ip;
|
|
ip["ipRangeStart"] = it["ip_range_start"].as<std::string>();
|
|
ip["ipRangeEnd"] = it["ip_range_end"].as<std::string>();
|
|
config["ipAssignmentPools"].push_back(ip);
|
|
}
|
|
w2.commit();
|
|
|
|
pqxx::work w3(conn);
|
|
pqxx::result res3 = w3.exec("SELECT host(address) AS address, bits, host(via) AS via FROM ztc_network_route WHERE network_id = '" + w3.esc(nwid) + "'");
|
|
for(pqxx::result::const_iterator it = res3.begin(); it != res3.end(); ++it) {
|
|
json route;
|
|
route["target"] = it["address"].as<std::string>() + "/" + it["bits"].as<std::string>();
|
|
if (route["via"].is_null()) {
|
|
route["via"] = nullptr;
|
|
} else {
|
|
route["via"] = it["via"].as<std::string>();
|
|
}
|
|
config["routes"].push_back(route);
|
|
}
|
|
w3.commit();
|
|
|
|
_networkChanged(empty, config, false);
|
|
}
|
|
|
|
w.commit();
|
|
|
|
if (++this->_ready == 2) {
|
|
if (_waitNoticePrinted) {
|
|
fprintf(stderr,"[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
|
|
}
|
|
_readyLock.unlock();
|
|
}
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "ERROR: Error initializing networks: %s", e.what());
|
|
exit(-1);
|
|
}
|
|
}
|
|
|
|
void PostgreSQL::initializeMembers(pqxx::connection &conn)
|
|
{
|
|
try {
|
|
if (!conn.is_open()) {
|
|
fprintf(stderr, "Bad Database Connection in initializeMembers\n");
|
|
exit(1);
|
|
}
|
|
|
|
pqxx::work w(conn);
|
|
pqxx::result res = w.exec(
|
|
"SELECT m.id AS id, m.network_id AS network_id, m.active_bridge AS active_bridge, "
|
|
" m.authorized AS authorized, m.capabilities AS capabilities, "
|
|
" EXTRACT(EPOCH FROM m.creation_time AT TIME ZONE 'UTC')*1000 AS creation_time, m.identity AS identity, "
|
|
" EXTRACT(EPOCH FROM m.last_authorized_time AT TIME ZONE 'UTC')*1000 AS last_authorized_time, "
|
|
" EXTRACT(EPOCH FROM m.last_deauthorized_time AT TIME ZONE 'UTC')*1000 AS last_deauthorized_time, "
|
|
" m.remote_trace_level AS remote_trace_level, m.remote_trace_target AS remote_trace_target, "
|
|
" m.tags AS tags, m.v_major AS v_major, m.v_minor AS v_minor, m.v_rev AS v_rev, "
|
|
" m.v_proto AS v_proto, m.no_auto_assign_ips AS no_auto_assign_ips, m.revision AS revision "
|
|
"FROM ztc_member m "
|
|
"INNER JOIN ztc_network n "
|
|
" ON n.id = m.network_id "
|
|
"WHERE n.controller_id = '" + w.esc(_myAddressStr) + "' AND m.deleted = false"
|
|
);
|
|
|
|
for(pqxx::result::const_iterator row = res.begin(); row != res.end(); ++row) {
|
|
json empty;
|
|
json config;
|
|
|
|
std::string networkId = row["network_id"].as<std::string>();
|
|
std::string memberId = row["id"].as<std::string>();
|
|
|
|
config["id"] = memberId;
|
|
config["nwid"] = networkId;
|
|
config["activeBridge"] = row["active_bridge"].as<bool>();
|
|
config["authorized"] = row["authorized"].as<bool>();
|
|
try {
|
|
config["capabilities"] = json::parse(row["capabilities"].as<std::string>());
|
|
} catch(std::exception &e) {
|
|
config["capabilities"] = json::array();
|
|
}
|
|
try {
|
|
config["creationTime"] = row["creation_time"].as<uint64_t>();
|
|
} catch(std::exception &e) {
|
|
config["creationTime"] = 0ULL;
|
|
}
|
|
config["identity"] = row["identity"].as<std::string>();
|
|
try {
|
|
config["lastAuthorizedTime"] = row["last_authorized_time"].as<uint64_t>();
|
|
} catch(std::exception &e) {
|
|
config["lastAuthorizedTime"] = 0ULL;
|
|
}
|
|
try {
|
|
config["lastDeauthorizedTime"] = row["last_deauthorized_time"].as<uint64_t>();
|
|
} catch(std::exception &e) {
|
|
config["lastDeauthorizedTime"] = 0ULL;
|
|
}
|
|
try {
|
|
config["remoteTraceLevel"] = row["remote_trace_level"].as<int>();
|
|
} catch(std::exception &e) {
|
|
config["remoteTraceLevel"] = 0;
|
|
}
|
|
config["remoteTraceTarget"] = (row["remote_trace_target"].is_null() ? nullptr : row["remote_trace_target"].as<std::string>());
|
|
try {
|
|
config["tags"] = json::parse(row["tags"].as<std::string>());
|
|
} catch(std::exception &e) {
|
|
config["tags"] = json::array();
|
|
}
|
|
try {
|
|
config["vMajor"] = row["v_major"].as<int>();
|
|
} catch(std::exception &e) {
|
|
config["vMajor"] = -1;
|
|
}
|
|
try {
|
|
config["vMinor"] = row["v_minor"].as<int>();
|
|
} catch (std::exception &e) {
|
|
config["vMinor"] = -1;
|
|
}
|
|
try {
|
|
config["vRev"] = row["v_rev"].as<int>();
|
|
} catch (std::exception &e) {
|
|
config["vRev"] = -1;
|
|
}
|
|
try {
|
|
config["vProto"] = row["v_proto"].as<int>();
|
|
} catch (std::exception &e) {
|
|
config["vProto"] = -1;
|
|
}
|
|
config["noAutoAssignIps"] = row["no_auto_assign_ips"].as<bool>();
|
|
try {
|
|
config["revision"] = row["revision"].as<uint64_t>();
|
|
} catch (std::exception &e) {
|
|
config["revision"] = 0ULL;
|
|
//fprintf(stderr, "Error updating revision (member): %s\n", PQgetvalue(res, i, 17));
|
|
}
|
|
config["objtype"] = "member";
|
|
config["ipAssignments"] = json::array();
|
|
|
|
pqxx::work w2(conn);
|
|
pqxx::result r2 = w2.exec(
|
|
"SELECT address FROM ztc_member_ip_assignment WHERE member_id = '"+w2.esc(memberId)+"' AND network_id = '"+w2.esc(networkId)+"'"
|
|
);
|
|
for(pqxx::result::const_iterator it = r2.begin(); it != r2.end(); ++it) {
|
|
config["ipAssignments"].push_back(it["address"].as<std::string>());
|
|
}
|
|
w2.commit();
|
|
|
|
_memberChanged(empty, config, false);
|
|
}
|
|
w.commit();
|
|
|
|
if (++this->_ready == 2) {
|
|
if (_waitNoticePrinted) {
|
|
fprintf(stderr,"[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
|
|
}
|
|
_readyLock.unlock();
|
|
}
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "ERROR: Error initializing members: %s\n", e.what());
|
|
exit(-1);
|
|
}
|
|
}
|
|
|
|
void PostgreSQL::heartbeat()
|
|
{
|
|
char publicId[1024];
|
|
char hostnameTmp[1024];
|
|
_myId.toString(false,publicId);
|
|
if (gethostname(hostnameTmp, sizeof(hostnameTmp))!= 0) {
|
|
hostnameTmp[0] = (char)0;
|
|
} else {
|
|
for (int i = 0; i < sizeof(hostnameTmp); ++i) {
|
|
if ((hostnameTmp[i] == '.')||(hostnameTmp[i] == 0)) {
|
|
hostnameTmp[i] = (char)0;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
const char *controllerId = _myAddressStr.c_str();
|
|
const char *publicIdentity = publicId;
|
|
const char *hostname = hostnameTmp;
|
|
|
|
fprintf(stderr, "Heartbeat connection opening\n");
|
|
pqxx::connection conn(_connString);
|
|
if (!conn.is_open()) {
|
|
fprintf(stderr, "Connection to database failed: heartbeat\n");
|
|
exit(1);
|
|
}
|
|
fprintf(stderr, "Heartbeat connection opened\n");
|
|
conn.prepare("heartbeat",
|
|
"INSERT INTO ztc_controller (id, cluster_host, last_alive, public_identity, v_major, v_minor, v_rev, v_build) "
|
|
"VALUES ($1, $2, TO_TIMESTAMP($3::double precision/1000), $4, $5, $6, $7, $8) "
|
|
"ON CONFLICT (id) DO UPDATE SET cluster_host = EXCLUDED.cluster_host, last_alive = EXCLUDED.last_alive, "
|
|
"public_identity = EXCLUDED.public_identity, v_major = EXCLUDED.v_major, v_minor = EXCLUDED.v_minor, "
|
|
"v_rev = EXCLUDED.v_rev, v_build = EXCLUDED.v_rev"
|
|
);
|
|
|
|
while (_run == 1) {
|
|
try {
|
|
pqxx::work w(conn);
|
|
pqxx::result res = w.prepared("heartbeat")(controllerId)(hostname)
|
|
(OSUtils::now())(publicIdentity)(ZEROTIER_ONE_VERSION_MAJOR)
|
|
(ZEROTIER_ONE_VERSION_MINOR)(ZEROTIER_ONE_VERSION_REVISION)
|
|
(ZEROTIER_ONE_VERSION_BUILD).exec();
|
|
w.commit();
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "Error inserting heartbeat: %s\n", e.what());
|
|
exit(1);
|
|
}
|
|
std::this_thread::sleep_for(std::chrono::milliseconds(1000));
|
|
}
|
|
}
|
|
|
|
void PostgreSQL::membersDbWatcher()
|
|
{
|
|
try {
|
|
pqxx::connection conn(_connString);
|
|
if (!conn.is_open()) {
|
|
fprintf(stderr, "Connection to database failed: membersDbWatcher\n");
|
|
exit(1);
|
|
}
|
|
|
|
initializeMembers(conn);
|
|
|
|
char buf[11] = {0};
|
|
std::string cmd = "member_" + std::string(_myAddress.toString(buf));
|
|
_MemberNotificationReceiver receiver(conn, cmd, this);
|
|
while(_run == 1) {
|
|
conn.await_notification(5, 0);
|
|
std::this_thread::sleep_for(std::chrono::milliseconds(10));
|
|
}
|
|
conn.disconnect();
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "Exception in membersDbWatcher: %s\n", e.what());
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
void PostgreSQL::networksDbWatcher()
|
|
{
|
|
try {
|
|
pqxx::connection conn(_connString);
|
|
if (!conn.is_open()) {
|
|
fprintf(stderr, "Connection to database failed: networksDbWatcher\n");
|
|
exit(1);
|
|
}
|
|
|
|
initializeNetworks(conn);
|
|
|
|
char buf[11] = {0};
|
|
std::string cmd = "network_" + std::string(_myAddress.toString(buf));
|
|
_NetworkNotificationReceiver receiver(conn, cmd, this);
|
|
while(_run == 1) {
|
|
conn.await_notification(5, 0);
|
|
std::this_thread::sleep_for(std::chrono::milliseconds(10));
|
|
}
|
|
} catch(std::exception &e) {
|
|
fprintf(stderr, "Exception in networksDbWatcher: %s\n", e.what());
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
void PostgreSQL::commitThread()
|
|
{
|
|
pqxx::connection conn(_connString);
|
|
if (!conn.is_open()) {
|
|
fprintf(stderr, "ERROR: Connection to database failed: commitThread\n");
|
|
exit(1);
|
|
}
|
|
|
|
conn.prepare("insert_member",
|
|
"INSERT INTO ztc_member (id, network_id, active_bridge, authorized, capabilities, "
|
|
"identity, last_authorized_time, last_deauthorized_time, no_auto_assign_ips, "
|
|
"remote_trace_level, remote_trace_target, revision, tags, v_major, v_minor, v_rev, v_proto) "
|
|
"VALUES ($1, $2, $3, $4, $5, $6, "
|
|
"TO_TIMESTAMP($7::double precision/1000), TO_TIMESTAMP($8::double precision/1000), "
|
|
"$9, $10, (CASE WHEN $11='' THEN NULL ELSE $1 END), $12, $13, $14, $15, $16, $17) ON CONFLICT (network_id, id) DO UPDATE SET "
|
|
"active_bridge = EXCLUDED.active_bridge, authorized = EXCLUDED.authorized, capabilities = EXCLUDED.capabilities, "
|
|
"identity = EXCLUDED.identity, last_authorized_time = EXCLUDED.last_authorized_time, "
|
|
"last_deauthorized_time = EXCLUDED.last_deauthorized_time, no_auto_assign_ips = EXCLUDED.no_auto_assign_ips, "
|
|
"remote_trace_level = EXCLUDED.remote_trace_level, remote_trace_target = EXCLUDED.remote_trace_target, "
|
|
"revision = EXCLUDED.revision+1, tags = EXCLUDED.tags, v_major = EXCLUDED.v_major, "
|
|
"v_minor = EXCLUDED.v_minor, v_rev = EXCLUDED.v_rev, v_proto = EXCLUDED.v_proto");
|
|
conn.prepare("delete_ip_assignments",
|
|
"DELETE FROM ztc_member_ip_assignment WHERE member_id = $1 AND network_id = $2");
|
|
conn.prepare("insert_ip_assignments",
|
|
"INSERT INTO ztc_member_ip_assignment (member_id, network_id, address) VALUES ($1, $2, $3)");
|
|
|
|
conn.prepare("update_network",
|
|
"UPDATE ztc_network SET controller_id = $2, capabilities = $3, enable_broadcast = $4, "
|
|
"last_updated = $5, mtu = $6, multicast_limit = $7, name = $8, private = $9, "
|
|
"remote_trace_level = $10, remote_trace_target = $11, rules = $12, rules_source = $13, "
|
|
"tags = $14, v4_assign_mode = $15, v6_assign_mode = $16 "
|
|
"WHERE id = $1");
|
|
conn.prepare("delete_network_ip_pool",
|
|
"DELETE FROM ztc_network_assignment_pool WHERE network_id = $1");
|
|
conn.prepare("insert_network_ip_pool",
|
|
"INSERT INTO ztc_network_assignment_pool (network_id, ip_range_start, ip_range_end) VALUES ($1, $2, $3)");
|
|
conn.prepare("delete_network_route", "DELETE FROM ztc_network_route WHERE network_id = $1");
|
|
conn.prepare("insert_network_route", "INSERT INTO ztc_network_route (network_id, address, bits, via) VALUES ($1, $2, $3, $4)");
|
|
conn.prepare("delete_network", "UPDATE ztc_network SET deleted = true WHERE id = $1");
|
|
conn.prepare("delete_member", "UPDATE ztc_member SET hidden = true, deleted = true WHERE id = $1 AND network_id = $2");
|
|
|
|
json *config = nullptr;
|
|
while(_commitQueue.get(config)&(_run == 1)) {
|
|
if (!config) {
|
|
continue;
|
|
}
|
|
try {
|
|
const std::string objtype = (*config)["objtype"];
|
|
if (objtype == "member") {
|
|
std::string memberId = (*config)["id"];
|
|
std::string networkId = (*config)["nwid"];
|
|
std::string target("");
|
|
if (!(*config)["remoteTraceTarget"].is_null()) {
|
|
target = (*config)["remoteTraceTarget"];
|
|
}
|
|
std::string identity = (*config)["identity"];
|
|
|
|
try {
|
|
std::string caps = OSUtils::jsonDump((*config)["capabilities"], -1);
|
|
std::string tags = OSUtils::jsonDump((*config)["tags"], -1);
|
|
|
|
pqxx::work w(conn);
|
|
pqxx::result res = w.prepared("insert_member")(memberId)(networkId)
|
|
((bool)(*config)["activeBridge"])((bool)(*config)["authorized"])(caps)
|
|
(identity)((long long)(*config)["lastAuthorizedTime"])((long long)(*config)["lastDeauthorizedTime"])
|
|
((bool)(*config)["noAutoAssignIps"])((int)(*config)["remoteTraceLevel"])
|
|
(target, !target.empty())
|
|
((int)(*config)["revision"])(tags)((int)(*config)["vMajor"])((int)(*config)["vMinor"])
|
|
((int)(*config)["vRev"])((int)(*config)["vProto"]).exec();
|
|
w.commit();
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "Exception upserting member: %s\n", e.what());
|
|
delete config;
|
|
config = nullptr;
|
|
continue;
|
|
}
|
|
|
|
try {
|
|
pqxx::work w(conn);
|
|
pqxx::result res = w.prepared("delete_ip_assignments")(memberId)(networkId).exec();
|
|
|
|
for (auto i = (*config)["ipAssignments"].begin(); i != (*config)["ipAssignments"].end(); ++i) {
|
|
std::string addr = *i;
|
|
pqxx::result res2 = w.prepared("insert_ip_assignments")(memberId)(networkId)(addr).exec();
|
|
}
|
|
w.commit();
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "Error assigning member IP addresses: %s\n", e.what());
|
|
delete config;
|
|
config = nullptr;
|
|
}
|
|
|
|
const uint64_t nwidInt = OSUtils::jsonIntHex((*config)["nwid"], 0ULL);
|
|
const uint64_t memberidInt = OSUtils::jsonIntHex((*config)["id"], 0ULL);
|
|
if (nwidInt && memberidInt) {
|
|
nlohmann::json nwOrig;
|
|
nlohmann::json memOrig;
|
|
|
|
nlohmann::json memNew(*config);
|
|
|
|
get(nwidInt, nwOrig, memberidInt, memOrig);
|
|
|
|
_memberChanged(memOrig, memNew, (this->_ready>=2));
|
|
} else {
|
|
fprintf(stderr, "Can't notify of change. Error parsing nwid or memberid: %lu-%lu\n", nwidInt, memberidInt);
|
|
}
|
|
} else if (objtype == "network") {
|
|
std::string id = (*config)["id"];
|
|
std::string controllerId = _myAddressStr.c_str();
|
|
std::string name = (*config)["name"];
|
|
std::string rulesSource = (*config)["rulesSource"];
|
|
std::string caps = OSUtils::jsonDump((*config)["capabilitles"], -1);
|
|
std::string rtraceLevel = std::to_string((int)(*config)["remoteTraceLevel"]);
|
|
std::string rules = OSUtils::jsonDump((*config)["rules"], -1);
|
|
std::string tags = OSUtils::jsonDump((*config)["tags"], -1);
|
|
std::string v4mode = OSUtils::jsonDump((*config)["v4AssignMode"],-1);
|
|
std::string v6mode = OSUtils::jsonDump((*config)["v6AssignMode"], -1);
|
|
std::string target = "";
|
|
if (!(*config)["remoteTraceTarget"].is_null()) {
|
|
target = (*config)["remoteTraceTarget"];
|
|
}
|
|
try {
|
|
pqxx::work w(conn);
|
|
pqxx::result res = w.prepared("update_network")(id)(controllerId)(caps)((bool)(*config)["enableBroadcast"])
|
|
(OSUtils::now())((int)(*config)["mtu"])((int)(*config)["multicastLimit"])(name)((bool)(*config)["private"])
|
|
((int)(*config)["remoteTraceLevel"])(target, !target.empty())
|
|
(rules)(rulesSource)(tags)(v4mode)(v6mode).exec();
|
|
w.commit();
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "Error updating network config: %s\n", e.what());
|
|
delete config;
|
|
config = nullptr;
|
|
continue;
|
|
}
|
|
|
|
try {
|
|
pqxx::work w(conn);
|
|
pqxx::result res = w.prepared("delete_network_ip_pool")(id).exec();
|
|
|
|
auto pool = (*config)["ipAssignmentPools"];
|
|
for (auto i = pool.begin(); i != pool.end(); ++i) {
|
|
std::string start = (*i)["ipRangeStart"];
|
|
std::string end = (*i)["ipRangeEnd"];
|
|
|
|
pqxx::result r2 = w.prepared("insert_nework_ip_pool")(id)(start)(end).exec();
|
|
}
|
|
|
|
|
|
pqxx::result res2 = w.prepared("delete_network_route")(id).exec();
|
|
|
|
auto routes = (*config)["routes"];
|
|
for (auto i = routes.begin(); i != routes.end(); ++i) {
|
|
std::string t = (*i)["target"];
|
|
std::vector<std::string> target;
|
|
std::istringstream f(t);
|
|
std::string s;
|
|
while(std::getline(f, s, '/')) {
|
|
target.push_back(s);
|
|
}
|
|
if (target.empty() || target.size() != 2) {
|
|
continue;
|
|
}
|
|
std::string targetAddr = target[0];
|
|
int targetBits = std::stoi(target[1]);
|
|
std::string via = "";
|
|
if (!(*i)["via"].is_null()) {
|
|
via = (*i)["via"];
|
|
}
|
|
|
|
pqxx::result res3 = w.prepared("insert_network_route")(id)(targetAddr)(targetBits)
|
|
(via, !via.empty()).exec();
|
|
}
|
|
|
|
w.commit();
|
|
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "Error updating network IP pool: %s\n", e.what());
|
|
}
|
|
|
|
const uint64_t nwidInt = OSUtils::jsonIntHex((*config)["nwid"], 0ULL);
|
|
if (nwidInt) {
|
|
nlohmann::json nwOrig;
|
|
nlohmann::json nwNew(*config);
|
|
|
|
get(nwidInt, nwOrig);
|
|
|
|
_networkChanged(nwOrig, nwNew, true);
|
|
} else {
|
|
fprintf(stderr, "Can't notify network changed: %lu\n", nwidInt);
|
|
}
|
|
} else if (objtype == "trace") {
|
|
fprintf(stderr, "ERROR: Trace not yet implemented");
|
|
} else if (objtype == "_delete_network") {
|
|
try {
|
|
std::string networkId = (*config)["nwid"];
|
|
|
|
pqxx::work w(conn);
|
|
pqxx::result res = w.prepared("delete_network")(networkId).exec();
|
|
w.commit();
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "ERROR: Error deleting network: %s\n", e.what());
|
|
}
|
|
} else if (objtype == "_delete_member") {
|
|
try {
|
|
std::string memberId = (*config)["id"];
|
|
std::string networkId = (*config)["nwid"];
|
|
|
|
pqxx::work w(conn);
|
|
pqxx::result res = w.prepared("delete_member")(memberId)(networkId).exec();
|
|
w.commit();
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "ERROR: Error deleting member: %s\n", e.what());
|
|
}
|
|
} else {
|
|
fprintf(stderr, "ERROR: unknown objtype");
|
|
}
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "ERROR: Error getting objtype: %s\n", e.what());
|
|
}
|
|
delete config;
|
|
config = nullptr;
|
|
|
|
std::this_thread::sleep_for(std::chrono::milliseconds(1));
|
|
}
|
|
}
|
|
|
|
void PostgreSQL::onlineNotificationThread()
|
|
{
|
|
pqxx::connection conn(_connString);
|
|
if(!conn.is_open()) {
|
|
fprintf(stderr, "Connection to database failed: onlineNotificationThread\n");
|
|
exit(1);
|
|
}
|
|
_connected = 1;
|
|
|
|
int64_t lastUpdatedNetworkStatus = 0;
|
|
std::unordered_map< std::pair<uint64_t,uint64_t>,int64_t,_PairHasher > lastOnlineCumulative;
|
|
|
|
while (_run == 1) {
|
|
// map used to send notifications to front end
|
|
std::unordered_map<std::string, std::vector<std::string>> updateMap;
|
|
|
|
std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > lastOnline;
|
|
{
|
|
std::lock_guard<std::mutex> l(_lastOnline_l);
|
|
lastOnline.swap(_lastOnline);
|
|
}
|
|
|
|
try {
|
|
pqxx::work w(conn);
|
|
pqxx::pipeline p(w, "Member Update Pipeline");
|
|
for (auto i=lastOnline.begin(); i != lastOnline.end(); ++i) {
|
|
uint64_t nwid_i = i->first.first;
|
|
char nwidTmp[64];
|
|
char memTmp[64];
|
|
char ipTmp[64];
|
|
OSUtils::ztsnprintf(nwidTmp,sizeof(nwidTmp), "%.16llx", nwid_i);
|
|
OSUtils::ztsnprintf(memTmp,sizeof(memTmp), "%.10llx", i->first.second);
|
|
|
|
auto found = _networks.find(nwid_i);
|
|
if (found == _networks.end()) {
|
|
continue; // skip members trying to join non-existant networks
|
|
}
|
|
|
|
lastOnlineCumulative[i->first] = i->second.first;
|
|
|
|
|
|
std::string networkId(nwidTmp);
|
|
std::string memberId(memTmp);
|
|
|
|
std::vector<std::string> &members = updateMap[networkId];
|
|
members.push_back(memberId);
|
|
|
|
int64_t ts = i->second.first;
|
|
std::string ipAddr = i->second.second.toIpString(ipTmp);
|
|
std::string timestamp = std::to_string(ts);
|
|
|
|
std::stringstream ss;
|
|
ss << "INSERT INTO ztc_member_status (network_id, member_id, address, last_updated) VALUES ("
|
|
<< "'" << w.esc(networkId) << "', "
|
|
<< "'" << w.esc(memberId) << "', "
|
|
<< "'" << w.esc(ipAddr) << "', "
|
|
<< timestamp << ") "
|
|
<< "ON CONFLICT (network_id, member_id) DO UPDATE SET address = EXCLUDED.address, last_updated = EXCLUDED.last_updated";
|
|
p.insert(ss.str());
|
|
}
|
|
p.complete();
|
|
w.commit();
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "Error updating member status: %s\n", e.what());
|
|
}
|
|
|
|
try {
|
|
const int64_t now = OSUtils::now();
|
|
if ((now - lastUpdatedNetworkStatus) > 10000) {
|
|
pqxx::work w(conn);
|
|
pqxx::pipeline p(w, "Network Update Pipeline");
|
|
lastUpdatedNetworkStatus = now;
|
|
|
|
std::vector<std::pair<uint64_t, std::shared_ptr<_Network>>> networks;
|
|
{
|
|
std::lock_guard<std::mutex> l(_networks_l);
|
|
for (auto i = _networks.begin(); i != _networks.end(); ++i) {
|
|
networks.push_back(*i);
|
|
}
|
|
}
|
|
|
|
for (auto i = networks.begin(); i != networks.end(); ++i) {
|
|
char tmp[64];
|
|
Utils::hex(i->first, tmp);
|
|
|
|
std::string networkId(tmp);
|
|
|
|
std::vector<std::string> &_notUsed = updateMap[networkId];
|
|
(void)_notUsed;
|
|
|
|
uint64_t authMemberCount = 0;
|
|
uint64_t totalMemberCount = 0;
|
|
uint64_t onlineMemberCount = 0;
|
|
uint64_t bridgeCount = 0;
|
|
uint64_t ts = now;
|
|
{
|
|
std::lock_guard<std::mutex> l2(i->second->lock);
|
|
authMemberCount = i->second->authorizedMembers.size();
|
|
totalMemberCount = i->second->members.size();
|
|
bridgeCount = i->second->activeBridgeMembers.size();
|
|
for (auto m=i->second->members.begin(); m != i->second->members.end(); ++m) {
|
|
auto lo = lastOnlineCumulative.find(std::pair<uint64_t,uint64_t>(i->first, m->first));
|
|
if (lo != lastOnlineCumulative.end()) {
|
|
if ((now - lo->second) <= (ZT_NETWORK_AUTOCONF_DELAY * 2)) {
|
|
++onlineMemberCount;
|
|
} else {
|
|
lastOnlineCumulative.erase(lo);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
std::string bc = std::to_string(bridgeCount);
|
|
std::string amc = std::to_string(authMemberCount);
|
|
std::string omc = std::to_string(onlineMemberCount);
|
|
std::string tmc = std::to_string(totalMemberCount);
|
|
std::string timestamp = std::to_string(ts);
|
|
|
|
std::stringstream ss;
|
|
ss << "INSERT INTO ztc_network_status (network_id, bridge_count, authorized_member_count, "
|
|
<< "online_member_count, total_member_count, last_modified) VALUES ("
|
|
<< "'" << w.esc(networkId) << "', "
|
|
<< bridgeCount << ", "
|
|
<< authMemberCount << ", "
|
|
<< onlineMemberCount << ", "
|
|
<< totalMemberCount << ", "
|
|
<< "TO_TIMESTAMP(" << ts << "::double precision/1000)) "
|
|
<< "ON CONFLICT (network_id) DO UPDATE SET bridge_count = EXCLUDED.bridge_count, "
|
|
<< "authorized_member_count = EXCLUDED.authorized_member_count, online_member_count = EXCLUDED.online_member_count, "
|
|
<< "total_member_count = EXCLUDED.total_member_count, last_modified = EXCLUDED.last_modified";
|
|
p.insert(ss.str());
|
|
}
|
|
p.complete();
|
|
w.commit();
|
|
}
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "Error updating network status: %s\n", e.what());
|
|
}
|
|
|
|
try {
|
|
pqxx::work w(conn);
|
|
pqxx::pipeline p(w, "Notification Sender");
|
|
for (auto it = updateMap.begin(); it != updateMap.end(); ++it) {
|
|
std::string networkId = it->first;
|
|
std::vector<std::string> members = it->second;
|
|
std::stringstream queryBuilder;
|
|
|
|
std::string membersStr = ::join(members, ",");
|
|
|
|
queryBuilder << "NOTIFY controller, '" << networkId << ":" << membersStr << "'";
|
|
std::string query = queryBuilder.str();
|
|
|
|
p.insert(query);
|
|
}
|
|
p.complete();
|
|
w.commit();
|
|
} catch (std::exception &e) {
|
|
fprintf(stderr, "Error notifying webapp: %s\n", e.what());
|
|
}
|
|
std::this_thread::sleep_for(std::chrono::milliseconds(1));
|
|
}
|
|
}
|
|
#endif //ZT_CONTROLLER_USE_LIBPQ
|