ZeroTierOne/controller/PostgreSQL.cpp
2018-11-13 16:19:55 -08:00

955 lines
32 KiB
C++

/*
* ZeroTier One - Network Virtualization Everywhere
* Copyright (C) 2011-2018 ZeroTier, Inc.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#ifdef ZT_CONTROLLER_USE_LIBPQ
#include "PostgreSQL.hpp"
#include "EmbeddedNetworkController.hpp"
#include "../version.h"
#include <pqxx/pqxx>
#include <sstream>
using json = nlohmann::json;
namespace {
static const char *_timestr()
{
time_t t = time(0);
char *ts = ctime(&t);
char *p = ts;
if (!p)
return "";
while (*p) {
if (*p == '\n') {
*p = (char)0;
break;
}
++p;
}
return ts;
}
std::string join(const std::vector<std::string> &elements, const char * const separator)
{
switch(elements.size()) {
case 0:
return "";
case 1:
return elements[0];
default:
std::ostringstream os;
std::copy(elements.begin(), elements.end()-1, std::ostream_iterator<std::string>(os, separator));
os << *elements.rbegin();
return os.str();
}
}
}
namespace ZeroTier {
class _MemberNotificationReceiver : public pqxx::notification_receiver
{
private:
ZeroTier::PostgreSQL *_pgsql;
public:
_MemberNotificationReceiver(pqxx::connection_base &c, const std::string &channel, ZeroTier::PostgreSQL *pgsql)
: pqxx::notification_receiver(c, channel)
, _pgsql(pgsql)
{}
virtual void operator()(const std::string &payload, int backend_pid)
{
try {
json tmp(json::parse(payload));
json &ov = tmp["old_val"];
json &nv = tmp["new_val"];
json oldConfig, newConfig;
if (ov.is_object()) oldConfig = ov;
if (nv.is_object()) newConfig = nv;
if (oldConfig.is_object() || newConfig.is_object()) {
_pgsql->_memberChanged(oldConfig,newConfig,_pgsql->isReady());
}
} catch (std::exception &e) {
fprintf(stderr, "Exception parsing member notification: %s\n", e.what());
}
}
};
class _NetworkNotificationReceiver : public pqxx::notification_receiver
{
private:
ZeroTier::PostgreSQL *_pgsql;
public:
_NetworkNotificationReceiver(pqxx::connection_base &c, const std::string &channel, ZeroTier::PostgreSQL *pgsql)
: pqxx::notification_receiver(c, channel)
, _pgsql(pgsql)
{}
virtual void operator()(const std::string &payload, int backend_pid)
{
try {
json tmp(json::parse(payload));
json &ov = tmp["old_val"];
json &nv = tmp["new_val"];
json oldConfig, newConfig;
if (ov.is_object()) oldConfig = ov;
if (nv.is_object()) newConfig = nv;
if (oldConfig.is_object()||newConfig.is_object()) {
_pgsql->_networkChanged(oldConfig,newConfig,_pgsql->isReady());
}
} catch (std::exception &e) {
fprintf(stderr, "Exception parsing member notification: %s\n", e.what());
} // ignore bad records
}
};
} // namespace ZeroTier
using namespace ZeroTier;
PostgreSQL::PostgreSQL(EmbeddedNetworkController *const nc, const Identity &myId, const char *path)
: DB(nc, myId, path)
, _ready(0)
, _connected(1)
, _run(1)
, _waitNoticePrinted(false)
{
fprintf(stderr, "PostgreSQL Constructed");
_connString = std::string(path);
_readyLock.lock();
_heartbeatThread = std::thread(&PostgreSQL::heartbeat, this);
_membersDbWatcher = std::thread(&PostgreSQL::membersDbWatcher, this);
_networksDbWatcher = std::thread(&PostgreSQL::networksDbWatcher, this);
for (int i = 0; i < ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS; ++i) {
_commitThread[i] = std::thread(&PostgreSQL::commitThread, this);
}
_onlineNotificationThread = std::thread(&PostgreSQL::onlineNotificationThread, this);
}
PostgreSQL::~PostgreSQL()
{
_run = 0;
std::this_thread::sleep_for(std::chrono::milliseconds(100));
_heartbeatThread.join();
_membersDbWatcher.join();
_networksDbWatcher.join();
for (int i = 0; i < ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS; ++i) {
_commitThread[i].join();
}
_onlineNotificationThread.join();
}
bool PostgreSQL::waitForReady()
{
while (_ready < 2) {
if (!_waitNoticePrinted) {
_waitNoticePrinted = true;
fprintf(stderr, "[%s] NOTICE: %.10llx controller PostgreSQL waiting for initial data download..." ZT_EOL_S, ::_timestr(), (unsigned long long)_myAddress.toInt());
}
_readyLock.lock();
_readyLock.unlock();
}
return true;
}
bool PostgreSQL::isReady()
{
return ((_ready == 2)&&(_connected));
}
void PostgreSQL::save(nlohmann::json *orig, nlohmann::json &record)
{
try {
if (!record.is_object()) {
return;
}
waitForReady();
if (orig) {
if (*orig != record) {
record["revision"] = OSUtils::jsonInt(record["revision"],0ULL) + 1;
_commitQueue.post(new nlohmann::json(record));
}
} else {
record["revision"] = 1;
_commitQueue.post(new nlohmann::json(record));
}
} catch (std::exception &e) {
fprintf(stderr, "Error on PostgreSQL::save: %s\n", e.what());
} catch (...) {
fprintf(stderr, "Unknown error on PostgreSQL::save\n");
}
}
void PostgreSQL::eraseNetwork(const uint64_t networkId)
{
char tmp2[24];
waitForReady();
Utils::hex(networkId, tmp2);
json *tmp = new json();
(*tmp)["id"] = tmp2;
(*tmp)["objtype"] = "_delete_network";
_commitQueue.post(tmp);
}
void PostgreSQL::eraseMember(const uint64_t networkId, const uint64_t memberId)
{
char tmp2[24];
json *tmp = new json();
Utils::hex(networkId, tmp2);
(*tmp)["nwid"] = tmp2;
Utils::hex(memberId, tmp2);
(*tmp)["id"] = tmp2;
(*tmp)["objtype"] = "_delete_member";
_commitQueue.post(tmp);
}
void PostgreSQL::nodeIsOnline(const uint64_t networkId, const uint64_t memberId, const InetAddress &physicalAddress)
{
std::lock_guard<std::mutex> l(_lastOnline_l);
std::pair<int64_t, InetAddress> &i = _lastOnline[std::pair<uint64_t,uint64_t>(networkId, memberId)];
i.first = OSUtils::now();
if (physicalAddress) {
i.second = physicalAddress;
}
}
void PostgreSQL::initializeNetworks(pqxx::connection &conn)
{
try {
if (!conn.is_open()) {
fprintf(stderr, "Bad Database Connection in initializeNetworks\n");
exit(1);
}
pqxx::work w(conn);
pqxx::result r = w.exec("SELECT id, EXTRACT(EPOCH FROM creation_time AT TIME ZONE 'UTC')*1000 AS creation_time, capabilities, "
"enable_broadcast, EXTRACT(EPOCH FROM last_modified AT TIME ZONE 'UTC')*1000 AS last_modified, mtu, multicast_limit, name, private, remote_trace_level, "
"remote_trace_target, revision, rules, tags, v4_assign_mode, v6_assign_mode FROM ztc_network "
"WHERE deleted = false AND controller_id = '" + w.esc(_myAddressStr) + "'");
for (pqxx::result::const_iterator row = r.begin(); row != r.end(); ++row) {
json empty;
json config;
std::string nwid = row["id"].as<std::string>();
config["id"] = nwid;
config["nwid"] = nwid;
try {
config["creationTime"] = row["creation_time"].as<uint64_t>();
} catch(std::exception &e) {
config["creationTime"] = 0ULL;
}
config["capabilities"] = json::parse(row["capabilities"].as<std::string>());
config["enableBroadcast"] = row["enable_broadcast"].as<bool>();
try {
config["lastModified"] = row["last_modified"].as<uint64_t>();
} catch (std::exception &e) {
config["lastModified"] = 0ULL;
}
try {
config["mtu"] = row["mtu"].as<int>();
} catch (std::exception &e) {
config["mtu"] = 2800;
}
try {
config["multicastLimit"] = row["multicast_limit"].as<int>();
} catch (std::exception &e) {
config["multicastLimit"] = 64;
}
config["name"] = row["name"].as<std::string>();
config["private"] = row["private"].as<bool>();
try {
config["remoteTraceLevel"] = row["remote_trace_level"].as<int>();
} catch (std::exception &e) {
config["remoteTraceLevel"] = 0;
}
config["remoteTraceTarget"] = (row["remote_trace_target"].is_null() ? nullptr : row["remote_trace_target"].as<std::string>());
try {
config["revision"] = row["revision"].as<uint64_t>();
} catch (std::exception &e) {
config["revision"] = 0ULL;
//fprintf(stderr, "Error converting revision: %s\n", PQgetvalue(res, i, 11));
}
config["rules"] = json::parse(row["rules"].as<std::string>());
config["tags"] = json::parse(row["tags"].as<std::string>());
config["v4AssignMode"] = json::parse(row["v4_assign_mode"].as<std::string>());
config["v6AssignMode"] = json::parse(row["v6_assign_mode"].as<std::string>());
config["objtype"] = "network";
config["ipAssignmentPools"] = json::array();
config["routes"] = json::array();
pqxx::work w2(conn);
pqxx::result res2 = w2.exec("SELECT host(ip_range_start) AS ip_range_start, host(ip_range_end) AS ip_range_end FROM ztc_network_assignment_pool WHERE network_id = '" + w2.esc(nwid) + "'");
for(pqxx::result::const_iterator it = res2.begin(); it != res2.end(); ++it) {
json ip;
ip["ipRangeStart"] = it["ip_range_start"].as<std::string>();
ip["ipRangeEnd"] = it["ip_range_end"].as<std::string>();
config["ipAssignmentPools"].push_back(ip);
}
w2.commit();
pqxx::work w3(conn);
pqxx::result res3 = w3.exec("SELECT host(address) AS address, bits, host(via) AS via FROM ztc_network_route WHERE network_id = '" + w3.esc(nwid) + "'");
for(pqxx::result::const_iterator it = res3.begin(); it != res3.end(); ++it) {
json route;
route["target"] = it["address"].as<std::string>() + "/" + it["bits"].as<std::string>();
if (route["via"].is_null()) {
route["via"] = nullptr;
} else {
route["via"] = it["via"].as<std::string>();
}
config["routes"].push_back(route);
}
w3.commit();
_networkChanged(empty, config, false);
}
w.commit();
if (++this->_ready == 2) {
if (_waitNoticePrinted) {
fprintf(stderr,"[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
}
_readyLock.unlock();
}
} catch (std::exception &e) {
fprintf(stderr, "ERROR: Error initializing networks: %s", e.what());
exit(-1);
}
}
void PostgreSQL::initializeMembers(pqxx::connection &conn)
{
try {
if (!conn.is_open()) {
fprintf(stderr, "Bad Database Connection in initializeMembers\n");
exit(1);
}
pqxx::work w(conn);
pqxx::result res = w.exec(
"SELECT m.id AS id, m.network_id AS network_id, m.active_bridge AS active_bridge, "
" m.authorized AS authorized, m.capabilities AS capabilities, "
" EXTRACT(EPOCH FROM m.creation_time AT TIME ZONE 'UTC')*1000 AS creation_time, m.identity AS identity, "
" EXTRACT(EPOCH FROM m.last_authorized_time AT TIME ZONE 'UTC')*1000 AS last_authorized_time, "
" EXTRACT(EPOCH FROM m.last_deauthorized_time AT TIME ZONE 'UTC')*1000 AS last_deauthorized_time, "
" m.remote_trace_level AS remote_trace_level, m.remote_trace_target AS remote_trace_target, "
" m.tags AS tags, m.v_major AS v_major, m.v_minor AS v_minor, m.v_rev AS v_rev, "
" m.v_proto AS v_proto, m.no_auto_assign_ips AS no_auto_assign_ips, m.revision AS revision "
"FROM ztc_member m "
"INNER JOIN ztc_network n "
" ON n.id = m.network_id "
"WHERE n.controller_id = '" + w.esc(_myAddressStr) + "' AND m.deleted = false"
);
for(pqxx::result::const_iterator row = res.begin(); row != res.end(); ++row) {
json empty;
json config;
std::string networkId = row["network_id"].as<std::string>();
std::string memberId = row["id"].as<std::string>();
config["id"] = memberId;
config["nwid"] = networkId;
config["activeBridge"] = row["active_bridge"].as<bool>();
config["authorized"] = row["authorized"].as<bool>();
try {
config["capabilities"] = json::parse(row["capabilities"].as<std::string>());
} catch(std::exception &e) {
config["capabilities"] = json::array();
}
try {
config["creationTime"] = row["creation_time"].as<uint64_t>();
} catch(std::exception &e) {
config["creationTime"] = 0ULL;
}
config["identity"] = row["identity"].as<std::string>();
try {
config["lastAuthorizedTime"] = row["last_authorized_time"].as<uint64_t>();
} catch(std::exception &e) {
config["lastAuthorizedTime"] = 0ULL;
}
try {
config["lastDeauthorizedTime"] = row["last_deauthorized_time"].as<uint64_t>();
} catch(std::exception &e) {
config["lastDeauthorizedTime"] = 0ULL;
}
try {
config["remoteTraceLevel"] = row["remote_trace_level"].as<int>();
} catch(std::exception &e) {
config["remoteTraceLevel"] = 0;
}
config["remoteTraceTarget"] = (row["remote_trace_target"].is_null() ? nullptr : row["remote_trace_target"].as<std::string>());
try {
config["tags"] = json::parse(row["tags"].as<std::string>());
} catch(std::exception &e) {
config["tags"] = json::array();
}
try {
config["vMajor"] = row["v_major"].as<int>();
} catch(std::exception &e) {
config["vMajor"] = -1;
}
try {
config["vMinor"] = row["v_minor"].as<int>();
} catch (std::exception &e) {
config["vMinor"] = -1;
}
try {
config["vRev"] = row["v_rev"].as<int>();
} catch (std::exception &e) {
config["vRev"] = -1;
}
try {
config["vProto"] = row["v_proto"].as<int>();
} catch (std::exception &e) {
config["vProto"] = -1;
}
config["noAutoAssignIps"] = row["no_auto_assign_ips"].as<bool>();
try {
config["revision"] = row["revision"].as<uint64_t>();
} catch (std::exception &e) {
config["revision"] = 0ULL;
//fprintf(stderr, "Error updating revision (member): %s\n", PQgetvalue(res, i, 17));
}
config["objtype"] = "member";
config["ipAssignments"] = json::array();
pqxx::work w2(conn);
pqxx::result r2 = w2.exec(
"SELECT address FROM ztc_member_ip_assignment WHERE member_id = '"+w2.esc(memberId)+"' AND network_id = '"+w2.esc(networkId)+"'"
);
for(pqxx::result::const_iterator it = r2.begin(); it != r2.end(); ++it) {
config["ipAssignments"].push_back(it["address"].as<std::string>());
}
w2.commit();
_memberChanged(empty, config, false);
}
w.commit();
if (++this->_ready == 2) {
if (_waitNoticePrinted) {
fprintf(stderr,"[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
}
_readyLock.unlock();
}
} catch (std::exception &e) {
fprintf(stderr, "ERROR: Error initializing members: %s\n", e.what());
exit(-1);
}
}
void PostgreSQL::heartbeat()
{
char publicId[1024];
char hostnameTmp[1024];
_myId.toString(false,publicId);
if (gethostname(hostnameTmp, sizeof(hostnameTmp))!= 0) {
hostnameTmp[0] = (char)0;
} else {
for (int i = 0; i < sizeof(hostnameTmp); ++i) {
if ((hostnameTmp[i] == '.')||(hostnameTmp[i] == 0)) {
hostnameTmp[i] = (char)0;
break;
}
}
}
const char *controllerId = _myAddressStr.c_str();
const char *publicIdentity = publicId;
const char *hostname = hostnameTmp;
fprintf(stderr, "Heartbeat connection opening\n");
pqxx::connection conn(_connString);
if (!conn.is_open()) {
fprintf(stderr, "Connection to database failed: heartbeat\n");
exit(1);
}
fprintf(stderr, "Heartbeat connection opened\n");
conn.prepare("heartbeat",
"INSERT INTO ztc_controller (id, cluster_host, last_alive, public_identity, v_major, v_minor, v_rev, v_build) "
"VALUES ($1, $2, TO_TIMESTAMP($3::double precision/1000), $4, $5, $6, $7, $8) "
"ON CONFLICT (id) DO UPDATE SET cluster_host = EXCLUDED.cluster_host, last_alive = EXCLUDED.last_alive, "
"public_identity = EXCLUDED.public_identity, v_major = EXCLUDED.v_major, v_minor = EXCLUDED.v_minor, "
"v_rev = EXCLUDED.v_rev, v_build = EXCLUDED.v_rev"
);
while (_run == 1) {
try {
pqxx::work w(conn);
pqxx::result res = w.prepared("heartbeat")(controllerId)(hostname)
(OSUtils::now())(publicIdentity)(ZEROTIER_ONE_VERSION_MAJOR)
(ZEROTIER_ONE_VERSION_MINOR)(ZEROTIER_ONE_VERSION_REVISION)
(ZEROTIER_ONE_VERSION_BUILD).exec();
w.commit();
} catch (std::exception &e) {
fprintf(stderr, "Error inserting heartbeat: %s\n", e.what());
exit(1);
}
std::this_thread::sleep_for(std::chrono::milliseconds(1000));
}
}
void PostgreSQL::membersDbWatcher()
{
try {
pqxx::connection conn(_connString);
if (!conn.is_open()) {
fprintf(stderr, "Connection to database failed: membersDbWatcher\n");
exit(1);
}
initializeMembers(conn);
char buf[11] = {0};
std::string cmd = "member_" + std::string(_myAddress.toString(buf));
_MemberNotificationReceiver receiver(conn, cmd, this);
while(_run == 1) {
conn.await_notification(5, 0);
std::this_thread::sleep_for(std::chrono::milliseconds(10));
}
conn.disconnect();
} catch (std::exception &e) {
fprintf(stderr, "Exception in membersDbWatcher: %s\n", e.what());
exit(1);
}
}
void PostgreSQL::networksDbWatcher()
{
try {
pqxx::connection conn(_connString);
if (!conn.is_open()) {
fprintf(stderr, "Connection to database failed: networksDbWatcher\n");
exit(1);
}
initializeNetworks(conn);
char buf[11] = {0};
std::string cmd = "network_" + std::string(_myAddress.toString(buf));
_NetworkNotificationReceiver receiver(conn, cmd, this);
while(_run == 1) {
conn.await_notification(5, 0);
std::this_thread::sleep_for(std::chrono::milliseconds(10));
}
} catch(std::exception &e) {
fprintf(stderr, "Exception in networksDbWatcher: %s\n", e.what());
exit(1);
}
}
void PostgreSQL::commitThread()
{
pqxx::connection conn(_connString);
if (!conn.is_open()) {
fprintf(stderr, "ERROR: Connection to database failed: commitThread\n");
exit(1);
}
conn.prepare("insert_member",
"INSERT INTO ztc_member (id, network_id, active_bridge, authorized, capabilities, "
"identity, last_authorized_time, last_deauthorized_time, no_auto_assign_ips, "
"remote_trace_level, remote_trace_target, revision, tags, v_major, v_minor, v_rev, v_proto) "
"VALUES ($1, $2, $3, $4, $5, $6, "
"TO_TIMESTAMP($7::double precision/1000), TO_TIMESTAMP($8::double precision/1000), "
"$9, $10, (CASE WHEN $11='' THEN NULL ELSE $1 END), $12, $13, $14, $15, $16, $17) ON CONFLICT (network_id, id) DO UPDATE SET "
"active_bridge = EXCLUDED.active_bridge, authorized = EXCLUDED.authorized, capabilities = EXCLUDED.capabilities, "
"identity = EXCLUDED.identity, last_authorized_time = EXCLUDED.last_authorized_time, "
"last_deauthorized_time = EXCLUDED.last_deauthorized_time, no_auto_assign_ips = EXCLUDED.no_auto_assign_ips, "
"remote_trace_level = EXCLUDED.remote_trace_level, remote_trace_target = EXCLUDED.remote_trace_target, "
"revision = EXCLUDED.revision+1, tags = EXCLUDED.tags, v_major = EXCLUDED.v_major, "
"v_minor = EXCLUDED.v_minor, v_rev = EXCLUDED.v_rev, v_proto = EXCLUDED.v_proto");
conn.prepare("delete_ip_assignments",
"DELETE FROM ztc_member_ip_assignment WHERE member_id = $1 AND network_id = $2");
conn.prepare("insert_ip_assignments",
"INSERT INTO ztc_member_ip_assignment (member_id, network_id, address) VALUES ($1, $2, $3)");
conn.prepare("update_network",
"UPDATE ztc_network SET controller_id = $2, capabilities = $3, enable_broadcast = $4, "
"last_updated = $5, mtu = $6, multicast_limit = $7, name = $8, private = $9, "
"remote_trace_level = $10, remote_trace_target = $11, rules = $12, rules_source = $13, "
"tags = $14, v4_assign_mode = $15, v6_assign_mode = $16 "
"WHERE id = $1");
conn.prepare("delete_network_ip_pool",
"DELETE FROM ztc_network_assignment_pool WHERE network_id = $1");
conn.prepare("insert_network_ip_pool",
"INSERT INTO ztc_network_assignment_pool (network_id, ip_range_start, ip_range_end) VALUES ($1, $2, $3)");
conn.prepare("delete_network_route", "DELETE FROM ztc_network_route WHERE network_id = $1");
conn.prepare("insert_network_route", "INSERT INTO ztc_network_route (network_id, address, bits, via) VALUES ($1, $2, $3, $4)");
conn.prepare("delete_network", "UPDATE ztc_network SET deleted = true WHERE id = $1");
conn.prepare("delete_member", "UPDATE ztc_member SET hidden = true, deleted = true WHERE id = $1 AND network_id = $2");
json *config = nullptr;
while(_commitQueue.get(config)&(_run == 1)) {
if (!config) {
continue;
}
try {
const std::string objtype = (*config)["objtype"];
if (objtype == "member") {
std::string memberId = (*config)["id"];
std::string networkId = (*config)["nwid"];
std::string target("");
if (!(*config)["remoteTraceTarget"].is_null()) {
target = (*config)["remoteTraceTarget"];
}
std::string identity = (*config)["identity"];
try {
std::string caps = OSUtils::jsonDump((*config)["capabilities"], -1);
std::string tags = OSUtils::jsonDump((*config)["tags"], -1);
pqxx::work w(conn);
pqxx::result res = w.prepared("insert_member")(memberId)(networkId)
((bool)(*config)["activeBridge"])((bool)(*config)["authorized"])(caps)
(identity)((long long)(*config)["lastAuthorizedTime"])((long long)(*config)["lastDeauthorizedTime"])
((bool)(*config)["noAutoAssignIps"])((int)(*config)["remoteTraceLevel"])
(target, !target.empty())
((int)(*config)["revision"])(tags)((int)(*config)["vMajor"])((int)(*config)["vMinor"])
((int)(*config)["vRev"])((int)(*config)["vProto"]).exec();
w.commit();
} catch (std::exception &e) {
fprintf(stderr, "Exception upserting member: %s\n", e.what());
delete config;
config = nullptr;
continue;
}
try {
pqxx::work w(conn);
pqxx::result res = w.prepared("delete_ip_assignments")(memberId)(networkId).exec();
for (auto i = (*config)["ipAssignments"].begin(); i != (*config)["ipAssignments"].end(); ++i) {
std::string addr = *i;
pqxx::result res2 = w.prepared("insert_ip_assignments")(memberId)(networkId)(addr).exec();
}
w.commit();
} catch (std::exception &e) {
fprintf(stderr, "Error assigning member IP addresses: %s\n", e.what());
delete config;
config = nullptr;
}
const uint64_t nwidInt = OSUtils::jsonIntHex((*config)["nwid"], 0ULL);
const uint64_t memberidInt = OSUtils::jsonIntHex((*config)["id"], 0ULL);
if (nwidInt && memberidInt) {
nlohmann::json nwOrig;
nlohmann::json memOrig;
nlohmann::json memNew(*config);
get(nwidInt, nwOrig, memberidInt, memOrig);
_memberChanged(memOrig, memNew, (this->_ready>=2));
} else {
fprintf(stderr, "Can't notify of change. Error parsing nwid or memberid: %lu-%lu\n", nwidInt, memberidInt);
}
} else if (objtype == "network") {
std::string id = (*config)["id"];
std::string controllerId = _myAddressStr.c_str();
std::string name = (*config)["name"];
std::string rulesSource = (*config)["rulesSource"];
std::string caps = OSUtils::jsonDump((*config)["capabilitles"], -1);
std::string rtraceLevel = std::to_string((int)(*config)["remoteTraceLevel"]);
std::string rules = OSUtils::jsonDump((*config)["rules"], -1);
std::string tags = OSUtils::jsonDump((*config)["tags"], -1);
std::string v4mode = OSUtils::jsonDump((*config)["v4AssignMode"],-1);
std::string v6mode = OSUtils::jsonDump((*config)["v6AssignMode"], -1);
std::string target = "";
if (!(*config)["remoteTraceTarget"].is_null()) {
target = (*config)["remoteTraceTarget"];
}
try {
pqxx::work w(conn);
pqxx::result res = w.prepared("update_network")(id)(controllerId)(caps)((bool)(*config)["enableBroadcast"])
(OSUtils::now())((int)(*config)["mtu"])((int)(*config)["multicastLimit"])(name)((bool)(*config)["private"])
((int)(*config)["remoteTraceLevel"])(target, !target.empty())
(rules)(rulesSource)(tags)(v4mode)(v6mode).exec();
w.commit();
} catch (std::exception &e) {
fprintf(stderr, "Error updating network config: %s\n", e.what());
delete config;
config = nullptr;
continue;
}
try {
pqxx::work w(conn);
pqxx::result res = w.prepared("delete_network_ip_pool")(id).exec();
auto pool = (*config)["ipAssignmentPools"];
for (auto i = pool.begin(); i != pool.end(); ++i) {
std::string start = (*i)["ipRangeStart"];
std::string end = (*i)["ipRangeEnd"];
pqxx::result r2 = w.prepared("insert_nework_ip_pool")(id)(start)(end).exec();
}
pqxx::result res2 = w.prepared("delete_network_route")(id).exec();
auto routes = (*config)["routes"];
for (auto i = routes.begin(); i != routes.end(); ++i) {
std::string t = (*i)["target"];
std::vector<std::string> target;
std::istringstream f(t);
std::string s;
while(std::getline(f, s, '/')) {
target.push_back(s);
}
if (target.empty() || target.size() != 2) {
continue;
}
std::string targetAddr = target[0];
int targetBits = std::stoi(target[1]);
std::string via = "";
if (!(*i)["via"].is_null()) {
via = (*i)["via"];
}
pqxx::result res3 = w.prepared("insert_network_route")(id)(targetAddr)(targetBits)
(via, !via.empty()).exec();
}
w.commit();
} catch (std::exception &e) {
fprintf(stderr, "Error updating network IP pool: %s\n", e.what());
}
const uint64_t nwidInt = OSUtils::jsonIntHex((*config)["nwid"], 0ULL);
if (nwidInt) {
nlohmann::json nwOrig;
nlohmann::json nwNew(*config);
get(nwidInt, nwOrig);
_networkChanged(nwOrig, nwNew, true);
} else {
fprintf(stderr, "Can't notify network changed: %lu\n", nwidInt);
}
} else if (objtype == "trace") {
fprintf(stderr, "ERROR: Trace not yet implemented");
} else if (objtype == "_delete_network") {
try {
std::string networkId = (*config)["nwid"];
pqxx::work w(conn);
pqxx::result res = w.prepared("delete_network")(networkId).exec();
w.commit();
} catch (std::exception &e) {
fprintf(stderr, "ERROR: Error deleting network: %s\n", e.what());
}
} else if (objtype == "_delete_member") {
try {
std::string memberId = (*config)["id"];
std::string networkId = (*config)["nwid"];
pqxx::work w(conn);
pqxx::result res = w.prepared("delete_member")(memberId)(networkId).exec();
w.commit();
} catch (std::exception &e) {
fprintf(stderr, "ERROR: Error deleting member: %s\n", e.what());
}
} else {
fprintf(stderr, "ERROR: unknown objtype");
}
} catch (std::exception &e) {
fprintf(stderr, "ERROR: Error getting objtype: %s\n", e.what());
}
delete config;
config = nullptr;
std::this_thread::sleep_for(std::chrono::milliseconds(1));
}
}
void PostgreSQL::onlineNotificationThread()
{
pqxx::connection conn(_connString);
if(!conn.is_open()) {
fprintf(stderr, "Connection to database failed: onlineNotificationThread\n");
exit(1);
}
_connected = 1;
int64_t lastUpdatedNetworkStatus = 0;
std::unordered_map< std::pair<uint64_t,uint64_t>,int64_t,_PairHasher > lastOnlineCumulative;
while (_run == 1) {
// map used to send notifications to front end
std::unordered_map<std::string, std::vector<std::string>> updateMap;
std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > lastOnline;
{
std::lock_guard<std::mutex> l(_lastOnline_l);
lastOnline.swap(_lastOnline);
}
try {
pqxx::work w(conn);
pqxx::pipeline p(w, "Member Update Pipeline");
for (auto i=lastOnline.begin(); i != lastOnline.end(); ++i) {
uint64_t nwid_i = i->first.first;
char nwidTmp[64];
char memTmp[64];
char ipTmp[64];
OSUtils::ztsnprintf(nwidTmp,sizeof(nwidTmp), "%.16llx", nwid_i);
OSUtils::ztsnprintf(memTmp,sizeof(memTmp), "%.10llx", i->first.second);
auto found = _networks.find(nwid_i);
if (found == _networks.end()) {
continue; // skip members trying to join non-existant networks
}
lastOnlineCumulative[i->first] = i->second.first;
std::string networkId(nwidTmp);
std::string memberId(memTmp);
std::vector<std::string> &members = updateMap[networkId];
members.push_back(memberId);
int64_t ts = i->second.first;
std::string ipAddr = i->second.second.toIpString(ipTmp);
std::string timestamp = std::to_string(ts);
std::stringstream ss;
ss << "INSERT INTO ztc_member_status (network_id, member_id, address, last_updated) VALUES ("
<< "'" << w.esc(networkId) << "', "
<< "'" << w.esc(memberId) << "', "
<< "'" << w.esc(ipAddr) << "', "
<< timestamp << ") "
<< "ON CONFLICT (network_id, member_id) DO UPDATE SET address = EXCLUDED.address, last_updated = EXCLUDED.last_updated";
p.insert(ss.str());
}
p.complete();
w.commit();
} catch (std::exception &e) {
fprintf(stderr, "Error updating member status: %s\n", e.what());
}
try {
const int64_t now = OSUtils::now();
if ((now - lastUpdatedNetworkStatus) > 10000) {
pqxx::work w(conn);
pqxx::pipeline p(w, "Network Update Pipeline");
lastUpdatedNetworkStatus = now;
std::vector<std::pair<uint64_t, std::shared_ptr<_Network>>> networks;
{
std::lock_guard<std::mutex> l(_networks_l);
for (auto i = _networks.begin(); i != _networks.end(); ++i) {
networks.push_back(*i);
}
}
for (auto i = networks.begin(); i != networks.end(); ++i) {
char tmp[64];
Utils::hex(i->first, tmp);
std::string networkId(tmp);
std::vector<std::string> &_notUsed = updateMap[networkId];
(void)_notUsed;
uint64_t authMemberCount = 0;
uint64_t totalMemberCount = 0;
uint64_t onlineMemberCount = 0;
uint64_t bridgeCount = 0;
uint64_t ts = now;
{
std::lock_guard<std::mutex> l2(i->second->lock);
authMemberCount = i->second->authorizedMembers.size();
totalMemberCount = i->second->members.size();
bridgeCount = i->second->activeBridgeMembers.size();
for (auto m=i->second->members.begin(); m != i->second->members.end(); ++m) {
auto lo = lastOnlineCumulative.find(std::pair<uint64_t,uint64_t>(i->first, m->first));
if (lo != lastOnlineCumulative.end()) {
if ((now - lo->second) <= (ZT_NETWORK_AUTOCONF_DELAY * 2)) {
++onlineMemberCount;
} else {
lastOnlineCumulative.erase(lo);
}
}
}
}
std::string bc = std::to_string(bridgeCount);
std::string amc = std::to_string(authMemberCount);
std::string omc = std::to_string(onlineMemberCount);
std::string tmc = std::to_string(totalMemberCount);
std::string timestamp = std::to_string(ts);
std::stringstream ss;
ss << "INSERT INTO ztc_network_status (network_id, bridge_count, authorized_member_count, "
<< "online_member_count, total_member_count, last_modified) VALUES ("
<< "'" << w.esc(networkId) << "', "
<< bridgeCount << ", "
<< authMemberCount << ", "
<< onlineMemberCount << ", "
<< totalMemberCount << ", "
<< "TO_TIMESTAMP(" << ts << "::double precision/1000)) "
<< "ON CONFLICT (network_id) DO UPDATE SET bridge_count = EXCLUDED.bridge_count, "
<< "authorized_member_count = EXCLUDED.authorized_member_count, online_member_count = EXCLUDED.online_member_count, "
<< "total_member_count = EXCLUDED.total_member_count, last_modified = EXCLUDED.last_modified";
p.insert(ss.str());
}
p.complete();
w.commit();
}
} catch (std::exception &e) {
fprintf(stderr, "Error updating network status: %s\n", e.what());
}
try {
pqxx::work w(conn);
pqxx::pipeline p(w, "Notification Sender");
for (auto it = updateMap.begin(); it != updateMap.end(); ++it) {
std::string networkId = it->first;
std::vector<std::string> members = it->second;
std::stringstream queryBuilder;
std::string membersStr = ::join(members, ",");
queryBuilder << "NOTIFY controller, '" << networkId << ":" << membersStr << "'";
std::string query = queryBuilder.str();
p.insert(query);
}
p.complete();
w.commit();
} catch (std::exception &e) {
fprintf(stderr, "Error notifying webapp: %s\n", e.what());
}
std::this_thread::sleep_for(std::chrono::milliseconds(1));
}
}
#endif //ZT_CONTROLLER_USE_LIBPQ