ZeroTierOne/node/Updater.cpp

415 lines
14 KiB
C++
Raw Normal View History

2013-11-01 16:38:38 +00:00
/*
* ZeroTier One - Global Peer to Peer Ethernet
* Copyright (C) 2012-2013 ZeroTier Networks LLC
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
* --
*
* ZeroTier may be used and distributed under the terms of the GPLv3, which
* are available at: http://www.gnu.org/licenses/gpl-3.0.html
*
* If you would like to embed ZeroTier into a commercial application or
* redistribute it in a modified binary form, please contact ZeroTier Networks
* LLC. Start here: http://www.zerotier.com/
*/
#include "Updater.hpp"
#include "RuntimeEnvironment.hpp"
#include "Logger.hpp"
#include "Defaults.hpp"
2013-11-02 00:39:31 +00:00
#include "Utils.hpp"
#include "Topology.hpp"
#include "Switch.hpp"
#include "SHA512.hpp"
2013-11-02 00:39:31 +00:00
#include "../version.h"
2013-11-01 16:38:38 +00:00
namespace ZeroTier {
Updater::Updater(const RuntimeEnvironment *renv) :
_r(renv),
_download((_Download *)0)
{
refreshShared();
}
Updater::~Updater()
{
Mutex::Lock _l(_lock);
delete _download;
}
void Updater::refreshShared()
{
std::string updatesPath(_r->homePath + ZT_PATH_SEPARATOR_S + "updates.d");
std::map<std::string,bool> ud(Utils::listDirectory(updatesPath.c_str()));
Mutex::Lock _l(_lock);
_sharedUpdates.clear();
for(std::map<std::string,bool>::iterator u(ud.begin());u!=ud.end();++u) {
if (u->second)
continue; // skip directories
if ((u->first.length() >= 4)&&(!strcasecmp(u->first.substr(u->first.length() - 4).c_str(),".nfo")))
continue; // skip .nfo companion files
std::string fullPath(updatesPath + ZT_PATH_SEPARATOR_S + u->first);
std::string nfoPath(fullPath + ".nfo");
std::string buf;
if (Utils::readFile(nfoPath.c_str(),buf)) {
Dictionary nfo(buf);
SharedUpdate shared;
shared.fullPath = fullPath;
shared.filename = u->first;
2013-11-01 16:38:38 +00:00
std::string sha512(Utils::unhex(nfo.get("sha512",std::string())));
if (sha512.length() < sizeof(shared.sha512)) {
TRACE("skipped shareable update due to missing fields in companion .nfo: %s",fullPath.c_str());
continue;
}
memcpy(shared.sha512,sha512.data(),sizeof(shared.sha512));
std::string sig(Utils::unhex(nfo.get("sha512sig_ed25519",std::string())));
if (sig.length() < shared.sig.size()) {
TRACE("skipped shareable update due to missing fields in companion .nfo: %s",fullPath.c_str());
continue;
}
memcpy(shared.sig.data,sig.data(),shared.sig.size());
// Check signature to guard against updates.d being used as a data
// exfiltration mechanism. We will only share properly signed updates,
// nothing else.
Address signedBy(nfo.get("signedBy",std::string()));
std::map< Address,Identity >::const_iterator authority(ZT_DEFAULTS.updateAuthorities.find(signedBy));
if ((authority == ZT_DEFAULTS.updateAuthorities.end())||(!authority->second.verify(shared.sha512,64,shared.sig))) {
TRACE("skipped shareable update: not signed by valid authority or signature invalid: %s",fullPath.c_str());
continue;
}
shared.signedBy = signedBy;
int64_t fs = Utils::getFileSize(fullPath.c_str());
if (fs <= 0) {
TRACE("skipped shareable update due to unreadable, invalid, or 0-byte file: %s",fullPath.c_str());
continue;
}
shared.size = (unsigned long)fs;
_sharedUpdates.push_back(shared);
2013-11-01 16:38:38 +00:00
} else {
TRACE("skipped shareable update due to missing companion .nfo: %s",fullPath.c_str());
continue;
}
}
}
void Updater::getUpdateIfThisIsNewer(unsigned int vMajor,unsigned int vMinor,unsigned int revision)
{
2013-11-02 00:39:31 +00:00
if (vMajor < ZEROTIER_ONE_VERSION_MAJOR)
return;
else if (vMajor == ZEROTIER_ONE_VERSION_MAJOR) {
if (vMinor < ZEROTIER_ONE_VERSION_MINOR)
return;
else if (vMinor == ZEROTIER_ONE_VERSION_MINOR) {
if (revision <= ZEROTIER_ONE_VERSION_REVISION)
return;
}
}
std::string updateFilename(generateUpdateFilename(vMajor,vMinor,revision));
2013-11-02 00:39:31 +00:00
if (!updateFilename.length()) {
TRACE("an update to %u.%u.%u is available, but this platform or build doesn't support auto-update",vMajor,vMinor,revision);
2013-11-02 00:39:31 +00:00
return;
}
std::vector< SharedPtr<Peer> > peers;
_r->topology->eachPeer(Topology::CollectPeersWithActiveDirectPath(peers,Utils::now()));
TRACE("new update available to %u.%u.%u, looking for %s from %u peers",vMajor,vMinor,revision,updateFilename.c_str(),(unsigned int)peers.size());
for(std::vector< SharedPtr<Peer> >::iterator p(peers.begin());p!=peers.end();++p) {
Packet outp((*p)->address(),_r->identity.address(),Packet::VERB_FILE_INFO_REQUEST);
2013-11-02 00:39:31 +00:00
outp.append((unsigned char)0);
outp.append((uint16_t)updateFilename.length());
outp.append(updateFilename.data(),updateFilename.length());
_r->sw->send(outp,true);
}
2013-11-01 16:38:38 +00:00
}
void Updater::retryIfNeeded()
{
Mutex::Lock _l(_lock);
if (_download) {
uint64_t elapsed = Utils::now() - _download->lastChunkReceivedAt;
if ((elapsed >= ZT_UPDATER_PEER_TIMEOUT)||(!_download->currentlyReceivingFrom)) {
if (_download->peersThatHave.empty()) {
// Search for more sources if we have no more possibilities queued
_download->currentlyReceivingFrom.zero();
std::vector< SharedPtr<Peer> > peers;
_r->topology->eachPeer(Topology::CollectPeersWithActiveDirectPath(peers,Utils::now()));
for(std::vector< SharedPtr<Peer> >::iterator p(peers.begin());p!=peers.end();++p) {
Packet outp((*p)->address(),_r->identity.address(),Packet::VERB_FILE_INFO_REQUEST);
outp.append((unsigned char)0);
outp.append((uint16_t)_download->filename.length());
outp.append(_download->filename.data(),_download->filename.length());
_r->sw->send(outp,true);
}
} else {
// If that peer isn't answering, try the next queued source
_download->currentlyReceivingFrom = _download->peersThatHave.front();
_download->peersThatHave.pop_front();
}
} else if (elapsed >= ZT_UPDATER_RETRY_TIMEOUT) {
// Re-request next chunk we don't have from current source
_requestNextChunk();
}
}
2013-11-01 16:38:38 +00:00
}
void Updater::handleChunk(const Address &from,const void *sha512,unsigned int shalen,unsigned long at,const void *chunk,unsigned long len)
2013-11-02 00:39:31 +00:00
{
Mutex::Lock _l(_lock);
if (!_download) {
TRACE("got chunk from %s while no download is in progress, ignored",from.toString().c_str());
return;
}
if (memcmp(_download->sha512,sha512,(shalen > 64) ? 64 : shalen)) {
TRACE("got chunk from %s for wrong download (SHA mismatch), ignored",from.toString().c_str());
return;
}
unsigned long whichChunk = at / ZT_UPDATER_CHUNK_SIZE;
if (at != (ZT_UPDATER_CHUNK_SIZE * whichChunk))
return; // not at chunk boundary
if (whichChunk >= _download->haveChunks.size())
return; // overflow
if ((whichChunk == (_download->haveChunks.size() - 1))&&(len != _download->lastChunkSize))
return; // last chunk, size wrong
else if (len != ZT_UPDATER_CHUNK_SIZE)
return; // chunk size wrong
for(unsigned long i=0;i<len;++i)
_download->data[at + i] = ((const char *)chunk)[i];
_download->haveChunks[whichChunk] = true;
_download->lastChunkReceivedAt = Utils::now();
_requestNextChunk();
}
void Updater::handleAvailable(const Address &from,const char *filename,const void *sha512,unsigned long filesize,const Address &signedBy,const void *signature,unsigned int siglen)
{
unsigned int vMajor = 0,vMinor = 0,revision = 0;
if (!parseUpdateFilename(filename,vMajor,vMinor,revision)) {
TRACE("rejected offer of %s from %s: could not parse version information",filename,from.toString().c_str());
return;
}
if (filesize > ZT_UPDATER_MAX_SUPPORTED_SIZE) {
TRACE("rejected offer of %s from %s: file too large (%u)",filename,from.toString().c_str(),(unsigned int)filesize);
return;
}
if (vMajor < ZEROTIER_ONE_VERSION_MAJOR)
return;
else if (vMajor == ZEROTIER_ONE_VERSION_MAJOR) {
if (vMinor < ZEROTIER_ONE_VERSION_MINOR)
return;
else if (vMinor == ZEROTIER_ONE_VERSION_MINOR) {
if (revision <= ZEROTIER_ONE_VERSION_REVISION)
return;
}
}
Mutex::Lock _l(_lock);
if (_download) {
// If a download is in progress, only accept this as another source if
// it matches the size, hash, and version. Also check if this is a newer
// version and if so replace download with this.
} else {
// If there is no download in progress, create one provided the signature
// for the SHA-512 hash verifies as being from a valid signer.
}
}
bool Updater::findSharedUpdate(const char *filename,SharedUpdate &update) const
{
Mutex::Lock _l(_lock);
for(std::list<SharedUpdate>::const_iterator u(_sharedUpdates.begin());u!=_sharedUpdates.end();++u) {
if (u->filename == filename) {
update = *u;
return true;
}
}
return false;
}
bool Updater::findSharedUpdate(const void *sha512,unsigned int shalen,SharedUpdate &update) const
{
if (!shalen)
return false;
Mutex::Lock _l(_lock);
for(std::list<SharedUpdate>::const_iterator u(_sharedUpdates.begin());u!=_sharedUpdates.end();++u) {
if (!memcmp(u->sha512,sha512,(shalen > 64) ? 64 : shalen)) {
update = *u;
return true;
}
}
return false;
}
bool Updater::getSharedChunk(const void *sha512,unsigned int shalen,unsigned long at,void *chunk,unsigned long chunklen) const
{
if (!chunklen)
return true;
if (!shalen)
return false;
Mutex::Lock _l(_lock);
for(std::list<SharedUpdate>::const_iterator u(_sharedUpdates.begin());u!=_sharedUpdates.end();++u) {
if (!memcmp(u->sha512,sha512,(shalen > 64) ? 64 : shalen)) {
FILE *f = fopen(u->fullPath.c_str(),"rb");
if (!f)
return false;
if (!fseek(f,(long)at,SEEK_SET)) {
fclose(f);
return false;
}
if (fread(chunk,chunklen,1,f) != 1) {
fclose(f);
return false;
}
fclose(f);
return true;
}
}
return false;
2013-11-02 00:39:31 +00:00
}
std::string Updater::generateUpdateFilename(unsigned int vMajor,unsigned int vMinor,unsigned int revision)
{
// Defining ZT_OFFICIAL_BUILD enables this cascade of macros, which will
// make your build auto-update itself if it's for an officially supported
// architecture. The signing identity for auto-updates is in Defaults.
#ifdef ZT_OFFICIAL_BUILD
2013-11-02 00:39:31 +00:00
// Not supported... yet? Get it first cause it might identify as Linux too.
#ifdef __ANDROID__
#define _updSupported 1
return std::string();
#endif
// Linux on x86 and possibly in the future ARM
#ifdef __LINUX__
#if defined(__i386) || defined(__i486) || defined(__i586) || defined(__i686) || defined(__amd64) || defined(__x86_64) || defined(i386)
#define _updSupported 1
char buf[128];
Utils::snprintf(buf,sizeof(buf),"zt1-%u_%u_%u-linux-%s-update",vMajor,vMinor,revision,(sizeof(void *) == 8) ? "x64" : "x86");
return std::string(buf);
#endif
/*
#if defined(__arm__) || defined(__arm) || defined(__aarch64__)
#define _updSupported 1
char buf[128];
Utils::snprintf(buf,sizeof(buf),"zt1-%u_%u_%u-linux-%s-update",vMajor,vMinor,revision,(sizeof(void *) == 8) ? "arm64" : "arm32");
return std::string(buf);
#endif
*/
#endif
// Apple stuff... only Macs so far...
#ifdef __APPLE__
#define _updSupported 1
#if defined(__powerpc) || defined(__powerpc__) || defined(__ppc__) || defined(__ppc64) || defined(__ppc64__) || defined(__powerpc64__)
return std::string();
#endif
#if defined(TARGET_IPHONE_SIMULATOR) || defined(TARGET_OS_IPHONE)
return std::string();
#endif
char buf[128];
Utils::snprintf(buf,sizeof(buf),"zt1-%u_%u_%u-mac-x86combined-update",vMajor,vMinor,revision);
return std::string(buf);
#endif
// ???
#ifndef _updSupported
return std::string();
#endif
#else
return std::string();
#endif // ZT_OFFICIAL_BUILD
2013-11-02 00:39:31 +00:00
}
bool Updater::parseUpdateFilename(const char *filename,unsigned int &vMajor,unsigned int &vMinor,unsigned int &revision)
{
std::vector<std::string> byDash(Utils::split(filename,"-","",""));
if (byDash.size() < 2)
return false;
std::vector<std::string> byUnderscore(Utils::split(byDash[1].c_str(),"_","",""));
if (byUnderscore.size() < 3)
return false;
vMajor = Utils::strToUInt(byUnderscore[0].c_str());
vMinor = Utils::strToUInt(byUnderscore[1].c_str());
revision = Utils::strToUInt(byUnderscore[2].c_str());
return true;
}
void Updater::_requestNextChunk()
{
// assumes _lock is locked
if (!_download)
return;
unsigned long whichChunk = 0;
std::vector<bool>::iterator ptr(std::find(_download->haveChunks.begin(),_download->haveChunks.end(),false));
if (ptr == _download->haveChunks.end()) {
unsigned char digest[64];
SHA512::hash(digest,_download->data.data(),_download->data.length());
if (memcmp(digest,_download->sha512,64)) {
LOG("retrying download of %s -- SHA-512 mismatch, file corrupt!",_download->filename.c_str());
std::fill(_download->haveChunks.begin(),_download->haveChunks.end(),false);
whichChunk = 0;
} else {
LOG("successfully downloaded and authenticated %s, launching update...",_download->filename.c_str());
delete _download;
_download = (_Download *)0;
return;
}
} else {
whichChunk = std::distance(_download->haveChunks.begin(),ptr);
}
TRACE("requesting chunk %u/%u of %s from %s",(unsigned int)whichChunk,(unsigned int)_download->haveChunks.size(),_download->filename.c_str()_download->currentlyReceivingFrom.toString().c_str());
Packet outp(_download->currentlyReceivingFrom,_r->identity.address(),Packet::VERB_FILE_BLOCK_REQUEST);
outp.append(_download->sha512,16);
outp.append((uint32_t)(whichChunk * ZT_UPDATER_CHUNK_SIZE));
if (whichChunk == (_download->haveChunks.size() - 1))
outp.append((uint16_t)_download->lastChunkSize);
else outp.append((uint16_t)ZT_UPDATER_CHUNK_SIZE);
_r->sw->send(outp,true);
}
2013-11-01 16:38:38 +00:00
} // namespace ZeroTier