2015-01-06 21:45:10 +00:00
/*
2015-02-17 21:11:34 +00:00
* ZeroTier One - Network Virtualization Everywhere
2017-04-27 07:59:36 +00:00
* Copyright ( C ) 2011 - 2015 ZeroTier , Inc - >
2015-01-06 21:45:10 +00:00
*
* This program is free software : you can redistribute it and / or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation , either version 3 of the License , or
* ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
*
* You should have received a copy of the GNU General Public License
* along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
# include <stdint.h>
# include <stdio.h>
# include <stdlib.h>
# include <string.h>
# include <time.h>
2016-11-03 19:10:50 +00:00
# ifndef _WIN32
2015-01-06 21:45:10 +00:00
# include <sys/time.h>
2016-11-03 19:10:50 +00:00
# endif
2015-01-06 21:45:10 +00:00
# include <sys/types.h>
2015-01-08 22:27:55 +00:00
# include <algorithm>
# include <utility>
2015-02-24 22:17:57 +00:00
# include <stdexcept>
2016-08-12 18:30:27 +00:00
# include <map>
2017-04-25 02:16:36 +00:00
# include <thread>
2017-04-27 07:59:36 +00:00
# include <memory>
2015-01-08 22:27:55 +00:00
2015-04-17 22:21:53 +00:00
# include "../include/ZeroTierOne.h"
# include "../node/Constants.hpp"
2016-08-17 17:42:32 +00:00
# include "EmbeddedNetworkController.hpp"
2015-10-06 22:56:18 +00:00
# include "../node/Node.hpp"
2015-02-24 22:17:57 +00:00
# include "../node/Utils.hpp"
# include "../node/CertificateOfMembership.hpp"
# include "../node/NetworkConfig.hpp"
2016-06-16 23:05:57 +00:00
# include "../node/Dictionary.hpp"
2015-04-21 23:41:35 +00:00
# include "../node/InetAddress.hpp"
# include "../node/MAC.hpp"
# include "../node/Address.hpp"
2015-10-06 22:56:18 +00:00
2016-08-12 18:30:27 +00:00
using json = nlohmann : : json ;
2015-03-17 21:54:13 +00:00
2015-05-15 16:41:45 +00:00
// API version reported via JSON control plane
2016-08-12 18:30:27 +00:00
# define ZT_NETCONF_CONTROLLER_API_VERSION 3
2015-05-15 16:41:45 +00:00
2016-06-28 19:44:47 +00:00
// Number of requests to remember in member history
2017-03-13 20:58:29 +00:00
# define ZT_NETCONF_DB_MEMBER_HISTORY_LENGTH 2
2016-06-28 19:44:47 +00:00
2016-02-04 22:39:43 +00:00
// Min duration between requests for an address/nwid combo to prevent floods
# define ZT_NETCONF_MIN_REQUEST_PERIOD 1000
2015-07-23 17:10:17 +00:00
2015-01-06 21:45:10 +00:00
namespace ZeroTier {
2016-08-16 21:05:17 +00:00
static json _renderRule ( ZT_VirtualNetworkRule & rule )
2016-08-16 01:49:50 +00:00
{
char tmp [ 128 ] ;
2016-08-16 21:05:17 +00:00
json r = json : : object ( ) ;
2016-10-11 19:00:16 +00:00
const ZT_VirtualNetworkRuleType rt = ( ZT_VirtualNetworkRuleType ) ( rule . t & 0x3f ) ;
switch ( rt ) {
2016-08-16 01:49:50 +00:00
case ZT_NETWORK_RULE_ACTION_DROP :
r [ " type " ] = " ACTION_DROP " ;
break ;
case ZT_NETWORK_RULE_ACTION_ACCEPT :
r [ " type " ] = " ACTION_ACCEPT " ;
break ;
case ZT_NETWORK_RULE_ACTION_TEE :
r [ " type " ] = " ACTION_TEE " ;
2016-08-24 20:37:57 +00:00
r [ " address " ] = Address ( rule . v . fwd . address ) . toString ( ) ;
2016-08-30 00:48:36 +00:00
r [ " flags " ] = ( unsigned int ) rule . v . fwd . flags ;
r [ " length " ] = ( unsigned int ) rule . v . fwd . length ;
2016-08-16 01:49:50 +00:00
break ;
2016-09-23 23:08:38 +00:00
case ZT_NETWORK_RULE_ACTION_WATCH :
r [ " type " ] = " ACTION_WATCH " ;
r [ " address " ] = Address ( rule . v . fwd . address ) . toString ( ) ;
r [ " flags " ] = ( unsigned int ) rule . v . fwd . flags ;
r [ " length " ] = ( unsigned int ) rule . v . fwd . length ;
break ;
2016-08-16 01:49:50 +00:00
case ZT_NETWORK_RULE_ACTION_REDIRECT :
r [ " type " ] = " ACTION_REDIRECT " ;
2016-08-24 20:37:57 +00:00
r [ " address " ] = Address ( rule . v . fwd . address ) . toString ( ) ;
2016-08-30 00:48:36 +00:00
r [ " flags " ] = ( unsigned int ) rule . v . fwd . flags ;
2016-08-16 01:49:50 +00:00
break ;
2017-02-06 22:07:30 +00:00
case ZT_NETWORK_RULE_ACTION_BREAK :
r [ " type " ] = " ACTION_BREAK " ;
2016-08-25 20:31:23 +00:00
break ;
2016-10-11 19:00:16 +00:00
default :
2016-08-16 01:49:50 +00:00
break ;
2016-10-11 19:00:16 +00:00
}
if ( r . size ( ) = = 0 ) {
switch ( rt ) {
case ZT_NETWORK_RULE_MATCH_SOURCE_ZEROTIER_ADDRESS :
r [ " type " ] = " MATCH_SOURCE_ZEROTIER_ADDRESS " ;
r [ " zt " ] = Address ( rule . v . zt ) . toString ( ) ;
break ;
case ZT_NETWORK_RULE_MATCH_DEST_ZEROTIER_ADDRESS :
r [ " type " ] = " MATCH_DEST_ZEROTIER_ADDRESS " ;
r [ " zt " ] = Address ( rule . v . zt ) . toString ( ) ;
break ;
case ZT_NETWORK_RULE_MATCH_VLAN_ID :
r [ " type " ] = " MATCH_VLAN_ID " ;
r [ " vlanId " ] = ( unsigned int ) rule . v . vlanId ;
break ;
case ZT_NETWORK_RULE_MATCH_VLAN_PCP :
r [ " type " ] = " MATCH_VLAN_PCP " ;
r [ " vlanPcp " ] = ( unsigned int ) rule . v . vlanPcp ;
break ;
case ZT_NETWORK_RULE_MATCH_VLAN_DEI :
r [ " type " ] = " MATCH_VLAN_DEI " ;
r [ " vlanDei " ] = ( unsigned int ) rule . v . vlanDei ;
break ;
case ZT_NETWORK_RULE_MATCH_MAC_SOURCE :
r [ " type " ] = " MATCH_MAC_SOURCE " ;
Utils : : snprintf ( tmp , sizeof ( tmp ) , " %.2x:%.2x:%.2x:%.2x:%.2x:%.2x " , ( unsigned int ) rule . v . mac [ 0 ] , ( unsigned int ) rule . v . mac [ 1 ] , ( unsigned int ) rule . v . mac [ 2 ] , ( unsigned int ) rule . v . mac [ 3 ] , ( unsigned int ) rule . v . mac [ 4 ] , ( unsigned int ) rule . v . mac [ 5 ] ) ;
r [ " mac " ] = tmp ;
break ;
case ZT_NETWORK_RULE_MATCH_MAC_DEST :
r [ " type " ] = " MATCH_MAC_DEST " ;
Utils : : snprintf ( tmp , sizeof ( tmp ) , " %.2x:%.2x:%.2x:%.2x:%.2x:%.2x " , ( unsigned int ) rule . v . mac [ 0 ] , ( unsigned int ) rule . v . mac [ 1 ] , ( unsigned int ) rule . v . mac [ 2 ] , ( unsigned int ) rule . v . mac [ 3 ] , ( unsigned int ) rule . v . mac [ 4 ] , ( unsigned int ) rule . v . mac [ 5 ] ) ;
r [ " mac " ] = tmp ;
break ;
case ZT_NETWORK_RULE_MATCH_IPV4_SOURCE :
r [ " type " ] = " MATCH_IPV4_SOURCE " ;
r [ " ip " ] = InetAddress ( & ( rule . v . ipv4 . ip ) , 4 , ( unsigned int ) rule . v . ipv4 . mask ) . toString ( ) ;
break ;
case ZT_NETWORK_RULE_MATCH_IPV4_DEST :
r [ " type " ] = " MATCH_IPV4_DEST " ;
r [ " ip " ] = InetAddress ( & ( rule . v . ipv4 . ip ) , 4 , ( unsigned int ) rule . v . ipv4 . mask ) . toString ( ) ;
break ;
case ZT_NETWORK_RULE_MATCH_IPV6_SOURCE :
r [ " type " ] = " MATCH_IPV6_SOURCE " ;
r [ " ip " ] = InetAddress ( rule . v . ipv6 . ip , 16 , ( unsigned int ) rule . v . ipv6 . mask ) . toString ( ) ;
break ;
case ZT_NETWORK_RULE_MATCH_IPV6_DEST :
r [ " type " ] = " MATCH_IPV6_DEST " ;
r [ " ip " ] = InetAddress ( rule . v . ipv6 . ip , 16 , ( unsigned int ) rule . v . ipv6 . mask ) . toString ( ) ;
break ;
case ZT_NETWORK_RULE_MATCH_IP_TOS :
r [ " type " ] = " MATCH_IP_TOS " ;
2017-02-07 17:33:39 +00:00
r [ " mask " ] = ( unsigned int ) rule . v . ipTos . mask ;
r [ " start " ] = ( unsigned int ) rule . v . ipTos . value [ 0 ] ;
r [ " end " ] = ( unsigned int ) rule . v . ipTos . value [ 1 ] ;
2016-10-11 19:00:16 +00:00
break ;
case ZT_NETWORK_RULE_MATCH_IP_PROTOCOL :
r [ " type " ] = " MATCH_IP_PROTOCOL " ;
r [ " ipProtocol " ] = ( unsigned int ) rule . v . ipProtocol ;
break ;
case ZT_NETWORK_RULE_MATCH_ETHERTYPE :
r [ " type " ] = " MATCH_ETHERTYPE " ;
r [ " etherType " ] = ( unsigned int ) rule . v . etherType ;
break ;
case ZT_NETWORK_RULE_MATCH_ICMP :
r [ " type " ] = " MATCH_ICMP " ;
2016-10-13 21:14:46 +00:00
r [ " icmpType " ] = ( unsigned int ) rule . v . icmp . type ;
2016-10-11 19:00:16 +00:00
if ( ( rule . v . icmp . flags & 0x01 ) ! = 0 )
2016-10-13 21:14:46 +00:00
r [ " icmpCode " ] = ( unsigned int ) rule . v . icmp . code ;
else r [ " icmpCode " ] = json ( ) ;
2016-10-11 19:00:16 +00:00
break ;
case ZT_NETWORK_RULE_MATCH_IP_SOURCE_PORT_RANGE :
r [ " type " ] = " MATCH_IP_SOURCE_PORT_RANGE " ;
r [ " start " ] = ( unsigned int ) rule . v . port [ 0 ] ;
r [ " end " ] = ( unsigned int ) rule . v . port [ 1 ] ;
break ;
case ZT_NETWORK_RULE_MATCH_IP_DEST_PORT_RANGE :
r [ " type " ] = " MATCH_IP_DEST_PORT_RANGE " ;
r [ " start " ] = ( unsigned int ) rule . v . port [ 0 ] ;
r [ " end " ] = ( unsigned int ) rule . v . port [ 1 ] ;
break ;
case ZT_NETWORK_RULE_MATCH_CHARACTERISTICS :
r [ " type " ] = " MATCH_CHARACTERISTICS " ;
Utils : : snprintf ( tmp , sizeof ( tmp ) , " %.16llx " , rule . v . characteristics ) ;
r [ " mask " ] = tmp ;
break ;
case ZT_NETWORK_RULE_MATCH_FRAME_SIZE_RANGE :
r [ " type " ] = " MATCH_FRAME_SIZE_RANGE " ;
r [ " start " ] = ( unsigned int ) rule . v . frameSize [ 0 ] ;
r [ " end " ] = ( unsigned int ) rule . v . frameSize [ 1 ] ;
break ;
case ZT_NETWORK_RULE_MATCH_RANDOM :
r [ " type " ] = " MATCH_RANDOM " ;
r [ " probability " ] = ( unsigned long ) rule . v . randomProbability ;
break ;
case ZT_NETWORK_RULE_MATCH_TAGS_DIFFERENCE :
r [ " type " ] = " MATCH_TAGS_DIFFERENCE " ;
r [ " id " ] = rule . v . tag . id ;
r [ " value " ] = rule . v . tag . value ;
break ;
case ZT_NETWORK_RULE_MATCH_TAGS_BITWISE_AND :
r [ " type " ] = " MATCH_TAGS_BITWISE_AND " ;
r [ " id " ] = rule . v . tag . id ;
r [ " value " ] = rule . v . tag . value ;
break ;
case ZT_NETWORK_RULE_MATCH_TAGS_BITWISE_OR :
r [ " type " ] = " MATCH_TAGS_BITWISE_OR " ;
r [ " id " ] = rule . v . tag . id ;
r [ " value " ] = rule . v . tag . value ;
break ;
case ZT_NETWORK_RULE_MATCH_TAGS_BITWISE_XOR :
r [ " type " ] = " MATCH_TAGS_BITWISE_XOR " ;
r [ " id " ] = rule . v . tag . id ;
r [ " value " ] = rule . v . tag . value ;
break ;
case ZT_NETWORK_RULE_MATCH_TAGS_EQUAL :
r [ " type " ] = " MATCH_TAGS_EQUAL " ;
r [ " id " ] = rule . v . tag . id ;
r [ " value " ] = rule . v . tag . value ;
break ;
2017-02-28 17:22:10 +00:00
case ZT_NETWORK_RULE_MATCH_TAG_SENDER :
r [ " type " ] = " MATCH_TAG_SENDER " ;
r [ " id " ] = rule . v . tag . id ;
r [ " value " ] = rule . v . tag . value ;
break ;
case ZT_NETWORK_RULE_MATCH_TAG_RECEIVER :
r [ " type " ] = " MATCH_TAG_RECEIVER " ;
r [ " id " ] = rule . v . tag . id ;
r [ " value " ] = rule . v . tag . value ;
break ;
2016-10-11 19:00:16 +00:00
default :
break ;
}
if ( r . size ( ) > 0 ) {
2016-10-05 23:38:42 +00:00
r [ " not " ] = ( ( rule . t & 0x80 ) ! = 0 ) ;
2016-10-11 19:00:16 +00:00
r [ " or " ] = ( ( rule . t & 0x40 ) ! = 0 ) ;
}
2016-08-16 01:49:50 +00:00
}
2016-10-11 19:00:16 +00:00
2016-08-16 01:49:50 +00:00
return r ;
}
2016-08-25 23:08:40 +00:00
static bool _parseRule ( json & r , ZT_VirtualNetworkRule & rule )
2016-08-16 01:49:50 +00:00
{
2016-08-25 23:08:40 +00:00
if ( ! r . is_object ( ) )
2016-08-16 21:05:17 +00:00
return false ;
2016-10-11 19:00:16 +00:00
2017-01-10 21:51:10 +00:00
const std : : string t ( OSUtils : : jsonString ( r [ " type " ] , " " ) ) ;
2016-08-16 01:49:50 +00:00
memset ( & rule , 0 , sizeof ( ZT_VirtualNetworkRule ) ) ;
2016-10-11 19:00:16 +00:00
2017-01-10 21:51:10 +00:00
if ( OSUtils : : jsonBool ( r [ " not " ] , false ) )
2016-08-16 01:49:50 +00:00
rule . t = 0x80 ;
else rule . t = 0x00 ;
2017-01-10 21:51:10 +00:00
if ( OSUtils : : jsonBool ( r [ " or " ] , false ) )
2016-10-11 19:00:16 +00:00
rule . t | = 0x40 ;
2017-02-28 17:22:10 +00:00
bool tag = false ;
2016-08-16 01:49:50 +00:00
if ( t = = " ACTION_DROP " ) {
rule . t | = ZT_NETWORK_RULE_ACTION_DROP ;
return true ;
} else if ( t = = " ACTION_ACCEPT " ) {
rule . t | = ZT_NETWORK_RULE_ACTION_ACCEPT ;
return true ;
} else if ( t = = " ACTION_TEE " ) {
rule . t | = ZT_NETWORK_RULE_ACTION_TEE ;
2017-01-10 21:51:10 +00:00
rule . v . fwd . address = Utils : : hexStrToU64 ( OSUtils : : jsonString ( r [ " address " ] , " 0 " ) . c_str ( ) ) & 0xffffffffffULL ;
rule . v . fwd . flags = ( uint32_t ) ( OSUtils : : jsonInt ( r [ " flags " ] , 0ULL ) & 0xffffffffULL ) ;
rule . v . fwd . length = ( uint16_t ) ( OSUtils : : jsonInt ( r [ " length " ] , 0ULL ) & 0xffffULL ) ;
2016-08-16 01:49:50 +00:00
return true ;
2016-09-23 23:08:38 +00:00
} else if ( t = = " ACTION_WATCH " ) {
rule . t | = ZT_NETWORK_RULE_ACTION_WATCH ;
2017-01-10 21:51:10 +00:00
rule . v . fwd . address = Utils : : hexStrToU64 ( OSUtils : : jsonString ( r [ " address " ] , " 0 " ) . c_str ( ) ) & 0xffffffffffULL ;
rule . v . fwd . flags = ( uint32_t ) ( OSUtils : : jsonInt ( r [ " flags " ] , 0ULL ) & 0xffffffffULL ) ;
rule . v . fwd . length = ( uint16_t ) ( OSUtils : : jsonInt ( r [ " length " ] , 0ULL ) & 0xffffULL ) ;
2016-09-23 23:08:38 +00:00
return true ;
2016-08-16 01:49:50 +00:00
} else if ( t = = " ACTION_REDIRECT " ) {
rule . t | = ZT_NETWORK_RULE_ACTION_REDIRECT ;
2017-01-10 21:51:10 +00:00
rule . v . fwd . address = Utils : : hexStrToU64 ( OSUtils : : jsonString ( r [ " address " ] , " 0 " ) . c_str ( ) ) & 0xffffffffffULL ;
rule . v . fwd . flags = ( uint32_t ) ( OSUtils : : jsonInt ( r [ " flags " ] , 0ULL ) & 0xffffffffULL ) ;
2016-08-16 01:49:50 +00:00
return true ;
2017-02-06 22:07:30 +00:00
} else if ( t = = " ACTION_BREAK " ) {
rule . t | = ZT_NETWORK_RULE_ACTION_BREAK ;
2016-08-25 20:31:23 +00:00
return true ;
2016-08-16 01:49:50 +00:00
} else if ( t = = " MATCH_SOURCE_ZEROTIER_ADDRESS " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_SOURCE_ZEROTIER_ADDRESS ;
2017-01-10 21:51:10 +00:00
rule . v . zt = Utils : : hexStrToU64 ( OSUtils : : jsonString ( r [ " zt " ] , " 0 " ) . c_str ( ) ) & 0xffffffffffULL ;
2016-08-16 01:49:50 +00:00
return true ;
} else if ( t = = " MATCH_DEST_ZEROTIER_ADDRESS " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_DEST_ZEROTIER_ADDRESS ;
2017-01-10 21:51:10 +00:00
rule . v . zt = Utils : : hexStrToU64 ( OSUtils : : jsonString ( r [ " zt " ] , " 0 " ) . c_str ( ) ) & 0xffffffffffULL ;
2016-08-16 01:49:50 +00:00
return true ;
} else if ( t = = " MATCH_VLAN_ID " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_VLAN_ID ;
2017-01-10 21:51:10 +00:00
rule . v . vlanId = ( uint16_t ) ( OSUtils : : jsonInt ( r [ " vlanId " ] , 0ULL ) & 0xffffULL ) ;
2016-08-16 01:49:50 +00:00
return true ;
} else if ( t = = " MATCH_VLAN_PCP " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_VLAN_PCP ;
2017-01-10 21:51:10 +00:00
rule . v . vlanPcp = ( uint8_t ) ( OSUtils : : jsonInt ( r [ " vlanPcp " ] , 0ULL ) & 0xffULL ) ;
2016-08-16 01:49:50 +00:00
return true ;
} else if ( t = = " MATCH_VLAN_DEI " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_VLAN_DEI ;
2017-01-10 21:51:10 +00:00
rule . v . vlanDei = ( uint8_t ) ( OSUtils : : jsonInt ( r [ " vlanDei " ] , 0ULL ) & 0xffULL ) ;
2016-08-16 01:49:50 +00:00
return true ;
} else if ( t = = " MATCH_MAC_SOURCE " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_MAC_SOURCE ;
2017-01-10 21:51:10 +00:00
const std : : string mac ( OSUtils : : jsonString ( r [ " mac " ] , " 0 " ) ) ;
2016-08-16 01:49:50 +00:00
Utils : : unhex ( mac . c_str ( ) , ( unsigned int ) mac . length ( ) , rule . v . mac , 6 ) ;
return true ;
} else if ( t = = " MATCH_MAC_DEST " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_MAC_DEST ;
2017-01-10 21:51:10 +00:00
const std : : string mac ( OSUtils : : jsonString ( r [ " mac " ] , " 0 " ) ) ;
2016-08-16 01:49:50 +00:00
Utils : : unhex ( mac . c_str ( ) , ( unsigned int ) mac . length ( ) , rule . v . mac , 6 ) ;
return true ;
} else if ( t = = " MATCH_IPV4_SOURCE " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_IPV4_SOURCE ;
2017-01-10 21:51:10 +00:00
InetAddress ip ( OSUtils : : jsonString ( r [ " ip " ] , " 0.0.0.0 " ) ) ;
2016-08-16 01:49:50 +00:00
rule . v . ipv4 . ip = reinterpret_cast < struct sockaddr_in * > ( & ip ) - > sin_addr . s_addr ;
rule . v . ipv4 . mask = Utils : : ntoh ( reinterpret_cast < struct sockaddr_in * > ( & ip ) - > sin_port ) & 0xff ;
if ( rule . v . ipv4 . mask > 32 ) rule . v . ipv4 . mask = 32 ;
return true ;
} else if ( t = = " MATCH_IPV4_DEST " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_IPV4_DEST ;
2017-01-10 21:51:10 +00:00
InetAddress ip ( OSUtils : : jsonString ( r [ " ip " ] , " 0.0.0.0 " ) ) ;
2016-08-16 01:49:50 +00:00
rule . v . ipv4 . ip = reinterpret_cast < struct sockaddr_in * > ( & ip ) - > sin_addr . s_addr ;
rule . v . ipv4 . mask = Utils : : ntoh ( reinterpret_cast < struct sockaddr_in * > ( & ip ) - > sin_port ) & 0xff ;
if ( rule . v . ipv4 . mask > 32 ) rule . v . ipv4 . mask = 32 ;
return true ;
} else if ( t = = " MATCH_IPV6_SOURCE " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_IPV6_SOURCE ;
2017-01-10 21:51:10 +00:00
InetAddress ip ( OSUtils : : jsonString ( r [ " ip " ] , " ::0 " ) ) ;
2016-08-16 01:49:50 +00:00
memcpy ( rule . v . ipv6 . ip , reinterpret_cast < struct sockaddr_in6 * > ( & ip ) - > sin6_addr . s6_addr , 16 ) ;
rule . v . ipv6 . mask = Utils : : ntoh ( reinterpret_cast < struct sockaddr_in6 * > ( & ip ) - > sin6_port ) & 0xff ;
if ( rule . v . ipv6 . mask > 128 ) rule . v . ipv6 . mask = 128 ;
return true ;
} else if ( t = = " MATCH_IPV6_DEST " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_IPV6_DEST ;
2017-01-10 21:51:10 +00:00
InetAddress ip ( OSUtils : : jsonString ( r [ " ip " ] , " ::0 " ) ) ;
2016-08-16 01:49:50 +00:00
memcpy ( rule . v . ipv6 . ip , reinterpret_cast < struct sockaddr_in6 * > ( & ip ) - > sin6_addr . s6_addr , 16 ) ;
rule . v . ipv6 . mask = Utils : : ntoh ( reinterpret_cast < struct sockaddr_in6 * > ( & ip ) - > sin6_port ) & 0xff ;
if ( rule . v . ipv6 . mask > 128 ) rule . v . ipv6 . mask = 128 ;
return true ;
} else if ( t = = " MATCH_IP_TOS " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_IP_TOS ;
2017-02-07 17:33:39 +00:00
rule . v . ipTos . mask = ( uint8_t ) ( OSUtils : : jsonInt ( r [ " mask " ] , 0ULL ) & 0xffULL ) ;
rule . v . ipTos . value [ 0 ] = ( uint8_t ) ( OSUtils : : jsonInt ( r [ " start " ] , 0ULL ) & 0xffULL ) ;
rule . v . ipTos . value [ 1 ] = ( uint8_t ) ( OSUtils : : jsonInt ( r [ " end " ] , 0ULL ) & 0xffULL ) ;
2016-08-16 01:49:50 +00:00
return true ;
} else if ( t = = " MATCH_IP_PROTOCOL " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_IP_PROTOCOL ;
2017-01-10 21:51:10 +00:00
rule . v . ipProtocol = ( uint8_t ) ( OSUtils : : jsonInt ( r [ " ipProtocol " ] , 0ULL ) & 0xffULL ) ;
2016-08-16 01:49:50 +00:00
return true ;
2016-10-11 19:00:16 +00:00
} else if ( t = = " MATCH_ETHERTYPE " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_ETHERTYPE ;
2017-01-10 21:51:10 +00:00
rule . v . etherType = ( uint16_t ) ( OSUtils : : jsonInt ( r [ " etherType " ] , 0ULL ) & 0xffffULL ) ;
2016-10-11 19:00:16 +00:00
return true ;
2016-08-31 21:01:15 +00:00
} else if ( t = = " MATCH_ICMP " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_ICMP ;
2017-01-10 21:51:10 +00:00
rule . v . icmp . type = ( uint8_t ) ( OSUtils : : jsonInt ( r [ " icmpType " ] , 0ULL ) & 0xffULL ) ;
2016-10-13 21:14:46 +00:00
json & code = r [ " icmpCode " ] ;
2016-08-31 21:01:15 +00:00
if ( code . is_null ( ) ) {
rule . v . icmp . code = 0 ;
rule . v . icmp . flags = 0x00 ;
} else {
2017-01-10 21:51:10 +00:00
rule . v . icmp . code = ( uint8_t ) ( OSUtils : : jsonInt ( code , 0ULL ) & 0xffULL ) ;
2016-08-31 21:01:15 +00:00
rule . v . icmp . flags = 0x01 ;
}
return true ;
2016-08-16 01:49:50 +00:00
} else if ( t = = " MATCH_IP_SOURCE_PORT_RANGE " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_IP_SOURCE_PORT_RANGE ;
2017-01-10 21:51:10 +00:00
rule . v . port [ 0 ] = ( uint16_t ) ( OSUtils : : jsonInt ( r [ " start " ] , 0ULL ) & 0xffffULL ) ;
rule . v . port [ 1 ] = ( uint16_t ) ( OSUtils : : jsonInt ( r [ " end " ] , ( uint64_t ) rule . v . port [ 0 ] ) & 0xffffULL ) ;
2016-08-16 01:49:50 +00:00
return true ;
} else if ( t = = " MATCH_IP_DEST_PORT_RANGE " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_IP_DEST_PORT_RANGE ;
2017-01-10 21:51:10 +00:00
rule . v . port [ 0 ] = ( uint16_t ) ( OSUtils : : jsonInt ( r [ " start " ] , 0ULL ) & 0xffffULL ) ;
rule . v . port [ 1 ] = ( uint16_t ) ( OSUtils : : jsonInt ( r [ " end " ] , ( uint64_t ) rule . v . port [ 0 ] ) & 0xffffULL ) ;
2016-08-16 01:49:50 +00:00
return true ;
} else if ( t = = " MATCH_CHARACTERISTICS " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_CHARACTERISTICS ;
if ( r . count ( " mask " ) ) {
2016-10-05 19:54:46 +00:00
json & v = r [ " mask " ] ;
2016-08-16 21:05:17 +00:00
if ( v . is_number ( ) ) {
2016-10-05 19:54:46 +00:00
rule . v . characteristics = v ;
2016-08-16 21:05:17 +00:00
} else {
std : : string tmp = v ;
2016-10-05 19:54:46 +00:00
rule . v . characteristics = Utils : : hexStrToU64 ( tmp . c_str ( ) ) ;
2016-08-16 21:05:17 +00:00
}
2016-08-16 01:49:50 +00:00
}
return true ;
} else if ( t = = " MATCH_FRAME_SIZE_RANGE " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_FRAME_SIZE_RANGE ;
2017-01-10 21:51:10 +00:00
rule . v . frameSize [ 0 ] = ( uint16_t ) ( OSUtils : : jsonInt ( r [ " start " ] , 0ULL ) & 0xffffULL ) ;
rule . v . frameSize [ 1 ] = ( uint16_t ) ( OSUtils : : jsonInt ( r [ " end " ] , ( uint64_t ) rule . v . frameSize [ 0 ] ) & 0xffffULL ) ;
2016-08-16 01:49:50 +00:00
return true ;
2016-09-30 21:07:00 +00:00
} else if ( t = = " MATCH_RANDOM " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_RANDOM ;
2017-01-10 21:51:10 +00:00
rule . v . randomProbability = ( uint32_t ) ( OSUtils : : jsonInt ( r [ " probability " ] , 0ULL ) & 0xffffffffULL ) ;
2016-12-23 00:57:45 +00:00
return true ;
2016-08-31 21:14:58 +00:00
} else if ( t = = " MATCH_TAGS_DIFFERENCE " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_TAGS_DIFFERENCE ;
2017-02-28 17:22:10 +00:00
tag = true ;
2016-08-16 01:49:50 +00:00
} else if ( t = = " MATCH_TAGS_BITWISE_AND " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_TAGS_BITWISE_AND ;
2017-02-28 17:22:10 +00:00
tag = true ;
2016-08-16 01:49:50 +00:00
} else if ( t = = " MATCH_TAGS_BITWISE_OR " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_TAGS_BITWISE_OR ;
2017-02-28 17:22:10 +00:00
tag = true ;
2016-08-16 01:49:50 +00:00
} else if ( t = = " MATCH_TAGS_BITWISE_XOR " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_TAGS_BITWISE_XOR ;
2017-02-28 17:22:10 +00:00
tag = true ;
2016-10-05 23:38:42 +00:00
} else if ( t = = " MATCH_TAGS_EQUAL " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_TAGS_EQUAL ;
2017-02-28 17:22:10 +00:00
tag = true ;
} else if ( t = = " MATCH_TAG_SENDER " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_TAG_SENDER ;
tag = true ;
} else if ( t = = " MATCH_TAG_RECEIVER " ) {
rule . t | = ZT_NETWORK_RULE_MATCH_TAG_RECEIVER ;
tag = true ;
}
if ( tag ) {
2017-01-10 21:51:10 +00:00
rule . v . tag . id = ( uint32_t ) ( OSUtils : : jsonInt ( r [ " id " ] , 0ULL ) & 0xffffffffULL ) ;
rule . v . tag . value = ( uint32_t ) ( OSUtils : : jsonInt ( r [ " value " ] , 0ULL ) & 0xffffffffULL ) ;
2016-10-05 23:38:42 +00:00
return true ;
2016-08-16 01:49:50 +00:00
}
2016-10-11 19:00:16 +00:00
2016-08-16 01:49:50 +00:00
return false ;
}
2017-03-02 00:33:34 +00:00
EmbeddedNetworkController : : EmbeddedNetworkController ( Node * node , const char * dbPath ) :
2017-03-21 13:31:15 +00:00
_startTime ( OSUtils : : now ( ) ) ,
2017-04-25 03:51:02 +00:00
_running ( true ) ,
2017-03-02 00:33:34 +00:00
_db ( dbPath ) ,
2016-11-04 22:18:31 +00:00
_node ( node )
2015-01-06 21:45:10 +00:00
{
}
2016-08-17 17:42:32 +00:00
EmbeddedNetworkController : : ~ EmbeddedNetworkController ( )
2015-01-06 21:45:10 +00:00
{
2017-04-25 03:51:02 +00:00
_running = false ;
std : : vector < Thread > t ;
{
Mutex : : Lock _l ( _threads_m ) ;
t = _threads ;
}
if ( t . size ( ) > 0 ) {
for ( unsigned long i = 0 , j = ( unsigned long ) ( t . size ( ) * 4 ) ; i < j ; + + i )
2016-11-10 21:57:01 +00:00
_queue . post ( ( _RQEntry * ) 0 ) ;
2017-04-25 03:51:02 +00:00
/*
for ( std : : vector < Thread > : : iterator i ( t . begin ( ) ) ; i ! = t . end ( ) ; + + i )
2017-04-25 02:16:36 +00:00
Thread : : join ( * i ) ;
2017-04-25 03:51:02 +00:00
*/
2016-11-10 21:57:01 +00:00
}
2015-01-06 21:45:10 +00:00
}
2016-11-10 19:54:47 +00:00
void EmbeddedNetworkController : : init ( const Identity & signingId , Sender * sender )
2015-01-06 21:45:10 +00:00
{
2016-11-10 19:54:47 +00:00
this - > _sender = sender ;
this - > _signingId = signingId ;
}
void EmbeddedNetworkController : : request (
uint64_t nwid ,
const InetAddress & fromAddr ,
uint64_t requestPacketId ,
const Identity & identity ,
const Dictionary < ZT_NETWORKCONFIG_METADATA_DICT_CAPACITY > & metaData )
{
if ( ( ( ! _signingId ) | | ( ! _signingId . hasPrivate ( ) ) ) | | ( _signingId . address ( ) . toInt ( ) ! = ( nwid > > 24 ) ) | | ( ! _sender ) )
return ;
2016-06-28 00:14:47 +00:00
2016-11-04 22:18:31 +00:00
{
2016-11-10 21:57:01 +00:00
Mutex : : Lock _l ( _threads_m ) ;
2017-04-25 02:16:36 +00:00
if ( _threads . size ( ) = = 0 ) {
2017-04-26 13:48:08 +00:00
long hwc = ( long ) ( std : : thread : : hardware_concurrency ( ) / 2 ) ;
if ( hwc < 1 )
2017-04-25 02:16:36 +00:00
hwc = 1 ;
2017-04-26 13:48:08 +00:00
else if ( hwc > 16 )
hwc = 16 ;
2017-04-25 02:16:36 +00:00
for ( long i = 0 ; i < hwc ; + + i )
_threads . push_back ( Thread : : start ( this ) ) ;
2016-11-10 21:57:01 +00:00
}
2016-11-04 22:18:31 +00:00
}
2016-11-10 19:54:47 +00:00
2016-11-10 21:57:01 +00:00
_RQEntry * qe = new _RQEntry ;
qe - > nwid = nwid ;
qe - > requestPacketId = requestPacketId ;
qe - > fromAddr = fromAddr ;
qe - > identity = identity ;
qe - > metaData = metaData ;
_queue . post ( qe ) ;
}
2016-11-10 19:54:47 +00:00
2016-11-10 21:57:01 +00:00
unsigned int EmbeddedNetworkController : : handleControlPlaneHttpGET (
const std : : vector < std : : string > & path ,
const std : : map < std : : string , std : : string > & urlArgs ,
const std : : map < std : : string , std : : string > & headers ,
const std : : string & body ,
std : : string & responseBody ,
std : : string & responseContentType )
{
if ( ( path . size ( ) > 0 ) & & ( path [ 0 ] = = " network " ) ) {
2016-06-28 00:14:47 +00:00
2016-11-10 21:57:01 +00:00
if ( ( path . size ( ) > = 2 ) & & ( path [ 1 ] . length ( ) = = 16 ) ) {
const uint64_t nwid = Utils : : hexStrToU64 ( path [ 1 ] . c_str ( ) ) ;
char nwids [ 24 ] ;
Utils : : snprintf ( nwids , sizeof ( nwids ) , " %.16llx " , ( unsigned long long ) nwid ) ;
2017-04-26 13:48:08 +00:00
json network ;
if ( ! _db . getNetwork ( nwid , network ) )
2016-11-10 21:57:01 +00:00
return 404 ;
2016-06-28 00:14:47 +00:00
2016-11-10 21:57:01 +00:00
if ( path . size ( ) > = 3 ) {
2016-08-16 23:46:08 +00:00
2016-11-10 21:57:01 +00:00
if ( path [ 2 ] = = " member " ) {
2016-09-15 20:17:37 +00:00
2016-11-10 21:57:01 +00:00
if ( path . size ( ) > = 4 ) {
const uint64_t address = Utils : : hexStrToU64 ( path [ 3 ] . c_str ( ) ) ;
2017-04-26 13:48:08 +00:00
json member ;
if ( ! _db . getNetworkMember ( nwid , address , member ) )
2016-11-10 21:57:01 +00:00
return 404 ;
_addMemberNonPersistedFields ( member , OSUtils : : now ( ) ) ;
2017-01-10 21:51:10 +00:00
responseBody = OSUtils : : jsonDump ( member ) ;
2016-11-10 21:57:01 +00:00
responseContentType = " application/json " ;
} else {
responseBody = " { " ;
2017-04-26 13:48:08 +00:00
_db . eachMember ( nwid , [ & responseBody ] ( uint64_t networkId , uint64_t nodeId , const json & member ) {
2017-03-18 01:19:51 +00:00
if ( ( member . is_object ( ) ) & & ( member . size ( ) > 0 ) ) {
2016-11-10 21:57:01 +00:00
responseBody . append ( ( responseBody . length ( ) = = 1 ) ? " \" " : " , \" " ) ;
2017-03-18 01:19:51 +00:00
responseBody . append ( OSUtils : : jsonString ( member [ " id " ] , " 0 " ) ) ;
2016-11-10 21:57:01 +00:00
responseBody . append ( " \" : " ) ;
2017-01-10 21:51:10 +00:00
responseBody . append ( OSUtils : : jsonString ( member [ " revision " ] , " 0 " ) ) ;
2016-08-17 20:54:32 +00:00
}
2016-11-10 21:57:01 +00:00
} ) ;
responseBody . push_back ( ' } ' ) ;
responseContentType = " application/json " ;
2016-08-17 20:54:32 +00:00
}
2017-04-25 02:16:36 +00:00
return 200 ;
2016-08-17 20:54:32 +00:00
2016-11-10 21:57:01 +00:00
} // else 404
2016-08-18 19:59:48 +00:00
2016-11-10 21:57:01 +00:00
} else {
2016-08-23 20:02:59 +00:00
2016-11-10 21:57:01 +00:00
const uint64_t now = OSUtils : : now ( ) ;
2017-04-26 13:48:08 +00:00
JSONDB : : NetworkSummaryInfo ns ;
_db . getNetworkSummaryInfo ( nwid , ns ) ;
_addNetworkNonPersistedFields ( network , now , ns ) ;
2017-01-10 21:51:10 +00:00
responseBody = OSUtils : : jsonDump ( network ) ;
2016-11-10 21:57:01 +00:00
responseContentType = " application/json " ;
return 200 ;
2016-08-16 23:46:08 +00:00
2016-11-10 21:57:01 +00:00
}
} else if ( path . size ( ) = = 1 ) {
2016-06-28 00:14:47 +00:00
2017-04-26 13:48:08 +00:00
std : : vector < uint64_t > networkIds ( _db . networkIds ( ) ) ;
std : : sort ( networkIds . begin ( ) , networkIds . end ( ) ) ;
2016-08-19 01:18:50 +00:00
2017-04-26 13:48:08 +00:00
char tmp [ 64 ] ;
2016-11-10 21:57:01 +00:00
responseBody . push_back ( ' [ ' ) ;
2017-04-26 13:48:08 +00:00
for ( std : : vector < uint64_t > : : const_iterator i ( networkIds . begin ( ) ) ; i ! = networkIds . end ( ) ; + + i ) {
if ( responseBody . length ( ) > 1 )
responseBody . push_back ( ' , ' ) ;
Utils : : snprintf ( tmp , sizeof ( tmp ) , " \" %.16llx \" " , ( unsigned long long ) * i ) ;
responseBody . append ( tmp ) ;
2016-08-19 01:18:50 +00:00
}
2016-11-10 21:57:01 +00:00
responseBody . push_back ( ' ] ' ) ;
responseContentType = " application/json " ;
2017-04-26 13:48:08 +00:00
2016-11-10 21:57:01 +00:00
return 200 ;
2016-08-19 01:18:50 +00:00
2016-11-10 21:57:01 +00:00
} // else 404
2016-08-19 01:18:50 +00:00
2016-11-10 21:57:01 +00:00
} else {
2016-06-28 00:14:47 +00:00
2016-11-10 21:57:01 +00:00
char tmp [ 4096 ] ;
Utils : : snprintf ( tmp , sizeof ( tmp ) , " { \n \t \" controller \" : true, \n \t \" apiVersion \" : %d, \n \t \" clock \" : %llu \n } \n " , ZT_NETCONF_CONTROLLER_API_VERSION , ( unsigned long long ) OSUtils : : now ( ) ) ;
responseBody = tmp ;
responseContentType = " application/json " ;
return 200 ;
2016-08-25 23:08:40 +00:00
2016-08-18 19:59:48 +00:00
}
2016-11-10 21:57:01 +00:00
return 404 ;
}
2016-07-07 23:28:43 +00:00
2016-11-10 21:57:01 +00:00
unsigned int EmbeddedNetworkController : : handleControlPlaneHttpPOST (
const std : : vector < std : : string > & path ,
const std : : map < std : : string , std : : string > & urlArgs ,
const std : : map < std : : string , std : : string > & headers ,
const std : : string & body ,
std : : string & responseBody ,
std : : string & responseContentType )
{
if ( path . empty ( ) )
return 404 ;
2016-07-07 23:28:43 +00:00
2016-11-10 21:57:01 +00:00
json b ;
try {
2017-01-10 21:51:10 +00:00
b = OSUtils : : jsonParse ( body ) ;
2016-11-10 21:57:01 +00:00
if ( ! b . is_object ( ) ) {
responseBody = " { \" message \" : \" body is not a JSON object \" } " ;
responseContentType = " application/json " ;
return 400 ;
2016-07-07 22:42:10 +00:00
}
2016-11-10 21:57:01 +00:00
} catch ( . . . ) {
responseBody = " { \" message \" : \" body JSON is invalid \" } " ;
responseContentType = " application/json " ;
return 400 ;
2016-08-16 23:46:08 +00:00
}
2016-11-10 21:57:01 +00:00
const uint64_t now = OSUtils : : now ( ) ;
2016-06-28 00:14:47 +00:00
2016-11-10 21:57:01 +00:00
if ( path [ 0 ] = = " network " ) {
2016-08-16 23:46:08 +00:00
2016-11-10 21:57:01 +00:00
if ( ( path . size ( ) > = 2 ) & & ( path [ 1 ] . length ( ) = = 16 ) ) {
uint64_t nwid = Utils : : hexStrToU64 ( path [ 1 ] . c_str ( ) ) ;
char nwids [ 24 ] ;
Utils : : snprintf ( nwids , sizeof ( nwids ) , " %.16llx " , ( unsigned long long ) nwid ) ;
2016-07-07 22:42:10 +00:00
2016-11-10 21:57:01 +00:00
if ( path . size ( ) > = 3 ) {
2016-07-07 22:42:10 +00:00
2016-11-10 21:57:01 +00:00
if ( ( path . size ( ) = = 4 ) & & ( path [ 2 ] = = " member " ) & & ( path [ 3 ] . length ( ) = = 10 ) ) {
uint64_t address = Utils : : hexStrToU64 ( path [ 3 ] . c_str ( ) ) ;
char addrs [ 24 ] ;
Utils : : snprintf ( addrs , sizeof ( addrs ) , " %.10llx " , ( unsigned long long ) address ) ;
2016-07-07 22:42:10 +00:00
2017-04-26 13:48:08 +00:00
json member ;
_db . getNetworkMember ( nwid , address , member ) ;
2016-11-10 21:57:01 +00:00
json origMember ( member ) ; // for detecting changes
_initMember ( member ) ;
2016-08-16 23:46:08 +00:00
try {
2017-01-10 21:51:10 +00:00
if ( b . count ( " activeBridge " ) ) member [ " activeBridge " ] = OSUtils : : jsonBool ( b [ " activeBridge " ] , false ) ;
if ( b . count ( " noAutoAssignIps " ) ) member [ " noAutoAssignIps " ] = OSUtils : : jsonBool ( b [ " noAutoAssignIps " ] , false ) ;
2016-08-17 17:25:25 +00:00
2016-08-23 20:02:59 +00:00
if ( b . count ( " authorized " ) ) {
2017-01-10 21:51:10 +00:00
const bool newAuth = OSUtils : : jsonBool ( b [ " authorized " ] , false ) ;
if ( newAuth ! = OSUtils : : jsonBool ( member [ " authorized " ] , false ) ) {
2016-09-15 20:17:37 +00:00
member [ " authorized " ] = newAuth ;
2016-11-15 22:06:25 +00:00
member [ ( ( newAuth ) ? " lastAuthorizedTime " : " lastDeauthorizedTime " ) ] = now ;
2016-09-15 20:17:37 +00:00
json ah ;
ah [ " a " ] = newAuth ;
ah [ " by " ] = " api " ;
ah [ " ts " ] = now ;
ah [ " ct " ] = json ( ) ;
ah [ " c " ] = json ( ) ;
member [ " authHistory " ] . push_back ( ah ) ;
2017-03-06 23:12:28 +00:00
// Member is being de-authorized, so spray Revocation objects to all online members
if ( ! newAuth ) {
2017-04-04 15:07:38 +00:00
Revocation rev ( ( uint32_t ) _node - > prng ( ) , nwid , 0 , now , ZT_REVOCATION_FLAG_FAST_PROPAGATE , Address ( address ) , Revocation : : CREDENTIAL_TYPE_COM ) ;
2017-03-06 23:12:28 +00:00
rev . sign ( _signingId ) ;
Mutex : : Lock _l ( _lastRequestTime_m ) ;
for ( std : : map < std : : pair < uint64_t , uint64_t > , uint64_t > : : iterator i ( _lastRequestTime . begin ( ) ) ; i ! = _lastRequestTime . end ( ) ; + + i ) {
if ( ( now - i - > second ) < ZT_NETWORK_AUTOCONF_DELAY )
_node - > ncSendRevocation ( Address ( i - > first . first ) , rev ) ;
}
}
2016-08-23 20:02:59 +00:00
}
}
2016-08-16 23:46:08 +00:00
if ( b . count ( " ipAssignments " ) ) {
2016-11-04 22:18:31 +00:00
json & ipa = b [ " ipAssignments " ] ;
2016-08-16 23:46:08 +00:00
if ( ipa . is_array ( ) ) {
json mipa ( json : : array ( ) ) ;
for ( unsigned long i = 0 ; i < ipa . size ( ) ; + + i ) {
std : : string ips = ipa [ i ] ;
InetAddress ip ( ips ) ;
if ( ( ip . ss_family = = AF_INET ) | | ( ip . ss_family = = AF_INET6 ) ) {
mipa . push_back ( ip . toIpString ( ) ) ;
2015-09-10 21:47:04 +00:00
}
}
2016-08-16 23:46:08 +00:00
member [ " ipAssignments " ] = mipa ;
2015-09-10 21:47:04 +00:00
}
}
2016-08-18 21:37:56 +00:00
if ( b . count ( " tags " ) ) {
2016-11-04 22:18:31 +00:00
json & tags = b [ " tags " ] ;
2016-08-18 21:37:56 +00:00
if ( tags . is_array ( ) ) {
std : : map < uint64_t , uint64_t > mtags ;
for ( unsigned long i = 0 ; i < tags . size ( ) ; + + i ) {
2016-11-04 23:23:41 +00:00
json & tag = tags [ i ] ;
2016-08-18 21:37:56 +00:00
if ( ( tag . is_array ( ) ) & & ( tag . size ( ) = = 2 ) )
2017-01-10 21:51:10 +00:00
mtags [ OSUtils : : jsonInt ( tag [ 0 ] , 0ULL ) & 0xffffffffULL ] = OSUtils : : jsonInt ( tag [ 1 ] , 0ULL ) & 0xffffffffULL ;
2016-08-18 21:37:56 +00:00
}
json mtagsa = json : : array ( ) ;
for ( std : : map < uint64_t , uint64_t > : : iterator t ( mtags . begin ( ) ) ; t ! = mtags . end ( ) ; + + t ) {
json ta = json : : array ( ) ;
ta . push_back ( t - > first ) ;
ta . push_back ( t - > second ) ;
mtagsa . push_back ( ta ) ;
}
member [ " tags " ] = mtagsa ;
}
}
if ( b . count ( " capabilities " ) ) {
2016-11-04 22:18:31 +00:00
json & capabilities = b [ " capabilities " ] ;
2016-08-18 21:37:56 +00:00
if ( capabilities . is_array ( ) ) {
json mcaps = json : : array ( ) ;
for ( unsigned long i = 0 ; i < capabilities . size ( ) ; + + i ) {
2017-01-10 21:51:10 +00:00
mcaps . push_back ( OSUtils : : jsonInt ( capabilities [ i ] , 0ULL ) ) ;
2016-08-18 21:37:56 +00:00
}
std : : sort ( mcaps . begin ( ) , mcaps . end ( ) ) ;
mcaps . erase ( std : : unique ( mcaps . begin ( ) , mcaps . end ( ) ) , mcaps . end ( ) ) ;
member [ " capabilities " ] = mcaps ;
}
}
2016-08-16 23:46:08 +00:00
} catch ( . . . ) {
2016-08-25 23:08:40 +00:00
responseBody = " { \" message \" : \" exception while processing parameters in JSON body \" } " ;
responseContentType = " application/json " ;
2016-08-16 23:46:08 +00:00
return 400 ;
2015-09-10 21:47:04 +00:00
}
2015-01-07 01:16:54 +00:00
2016-08-16 23:46:08 +00:00
member [ " id " ] = addrs ;
member [ " address " ] = addrs ; // legacy
member [ " nwid " ] = nwids ;
2015-01-07 01:16:54 +00:00
2017-04-29 02:58:21 +00:00
_removeMemberNonPersistedFields ( member ) ;
2016-11-10 20:54:43 +00:00
if ( member ! = origMember ) {
json & revj = member [ " revision " ] ;
member [ " revision " ] = ( revj . is_number ( ) ? ( ( uint64_t ) revj + 1ULL ) : 1ULL ) ;
2017-04-26 13:48:08 +00:00
_db . saveNetworkMember ( nwid , address , member ) ;
2016-11-10 20:54:43 +00:00
_pushMemberUpdate ( now , nwid , member ) ;
2016-08-25 18:26:45 +00:00
}
2017-04-29 02:58:21 +00:00
_addMemberNonPersistedFields ( member , now ) ;
2017-01-10 21:51:10 +00:00
responseBody = OSUtils : : jsonDump ( member ) ;
2016-08-16 23:46:08 +00:00
responseContentType = " application/json " ;
2017-04-29 02:58:21 +00:00
2016-08-16 23:46:08 +00:00
return 200 ;
2015-10-08 20:25:38 +00:00
} else if ( ( path . size ( ) = = 3 ) & & ( path [ 2 ] = = " test " ) ) {
2016-08-16 21:05:17 +00:00
2017-03-02 00:33:34 +00:00
Mutex : : Lock _l ( _tests_m ) ;
2016-08-16 21:05:17 +00:00
2017-03-02 00:33:34 +00:00
_tests . push_back ( ZT_CircuitTest ( ) ) ;
ZT_CircuitTest * const test = & ( _tests . back ( ) ) ;
2015-10-08 20:25:38 +00:00
memset ( test , 0 , sizeof ( ZT_CircuitTest ) ) ;
Utils : : getSecureRandom ( & ( test - > testId ) , sizeof ( test - > testId ) ) ;
test - > credentialNetworkId = nwid ;
test - > ptr = ( void * ) this ;
2016-08-16 23:46:08 +00:00
json hops = b [ " hops " ] ;
if ( hops . is_array ( ) ) {
for ( unsigned long i = 0 ; i < hops . size ( ) ; + + i ) {
2016-11-04 23:23:41 +00:00
json & hops2 = hops [ i ] ;
2016-08-16 23:46:08 +00:00
if ( hops2 . is_array ( ) ) {
for ( unsigned long j = 0 ; j < hops2 . size ( ) ; + + j ) {
2016-08-17 17:25:25 +00:00
std : : string s = hops2 [ j ] ;
test - > hops [ test - > hopCount ] . addresses [ test - > hops [ test - > hopCount ] . breadth + + ] = Utils : : hexStrToU64 ( s . c_str ( ) ) & 0xffffffffffULL ;
2015-10-08 20:25:38 +00:00
}
2017-03-06 19:23:46 +00:00
+ + test - > hopCount ;
2016-08-16 23:46:08 +00:00
} else if ( hops2 . is_string ( ) ) {
2016-08-17 17:25:25 +00:00
std : : string s = hops2 ;
test - > hops [ test - > hopCount ] . addresses [ test - > hops [ test - > hopCount ] . breadth + + ] = Utils : : hexStrToU64 ( s . c_str ( ) ) & 0xffffffffffULL ;
2017-03-06 19:23:46 +00:00
+ + test - > hopCount ;
2015-10-08 20:25:38 +00:00
}
}
}
2017-01-10 21:51:10 +00:00
test - > reportAtEveryHop = ( OSUtils : : jsonBool ( b [ " reportAtEveryHop " ] , true ) ? 1 : 0 ) ;
2015-10-08 20:25:38 +00:00
if ( ! test - > hopCount ) {
2017-03-02 00:33:34 +00:00
_tests . pop_back ( ) ;
2016-08-25 23:08:40 +00:00
responseBody = " { \" message \" : \" a test must contain at least one hop \" } " ;
responseContentType = " application/json " ;
2016-08-16 23:46:08 +00:00
return 400 ;
2015-10-08 20:25:38 +00:00
}
test - > timestamp = OSUtils : : now ( ) ;
2016-01-26 20:42:44 +00:00
2017-03-02 00:33:34 +00:00
if ( _node ) {
2017-03-28 00:03:17 +00:00
_node - > circuitTestBegin ( ( void * ) 0 , test , & ( EmbeddedNetworkController : : _circuitTestCallback ) ) ;
2017-03-02 00:33:34 +00:00
} else {
_tests . pop_back ( ) ;
return 500 ;
}
2015-10-08 20:25:38 +00:00
2017-03-02 22:35:38 +00:00
char json [ 512 ] ;
Utils : : snprintf ( json , sizeof ( json ) , " { \" testId \" : \" %.16llx \" , \" timestamp \" :%llu} " , test - > testId , test - > timestamp ) ;
2016-02-05 00:09:26 +00:00
responseBody = json ;
responseContentType = " application/json " ;
2017-03-02 00:33:34 +00:00
2015-10-08 20:25:38 +00:00
return 200 ;
2016-08-16 21:05:17 +00:00
2015-09-10 21:47:04 +00:00
} // else 404
2015-01-08 22:27:55 +00:00
2015-09-10 21:47:04 +00:00
} else {
2016-08-16 01:49:50 +00:00
// POST to network ID
2015-01-08 22:27:55 +00:00
2017-04-25 02:16:36 +00:00
// Magic ID ending with ______ picks a random unused network ID
if ( path [ 1 ] . substr ( 10 ) = = " ______ " ) {
nwid = 0 ;
uint64_t nwidPrefix = ( Utils : : hexStrToU64 ( path [ 1 ] . substr ( 0 , 10 ) . c_str ( ) ) < < 24 ) & 0xffffffffff000000ULL ;
uint64_t nwidPostfix = 0 ;
for ( unsigned long k = 0 ; k < 100000 ; + + k ) { // sanity limit on trials
Utils : : getSecureRandom ( & nwidPostfix , sizeof ( nwidPostfix ) ) ;
uint64_t tryNwid = nwidPrefix | ( nwidPostfix & 0xffffffULL ) ;
if ( ( tryNwid & 0xffffffULL ) = = 0ULL ) tryNwid | = 1ULL ;
2017-04-26 13:48:08 +00:00
if ( ! _db . hasNetwork ( tryNwid ) ) {
2017-04-25 02:16:36 +00:00
nwid = tryNwid ;
break ;
2016-08-16 01:49:50 +00:00
}
}
2017-04-25 02:16:36 +00:00
if ( ! nwid )
return 503 ;
2016-11-04 22:18:31 +00:00
}
2017-04-26 13:48:08 +00:00
Utils : : snprintf ( nwids , sizeof ( nwids ) , " %.16llx " , ( unsigned long long ) nwid ) ;
2017-04-25 02:16:36 +00:00
2017-04-26 13:48:08 +00:00
json network ;
_db . getNetwork ( nwid , network ) ;
2016-11-10 20:54:43 +00:00
json origNetwork ( network ) ; // for detecting changes
2016-08-18 21:37:56 +00:00
_initNetwork ( network ) ;
2016-08-16 01:49:50 +00:00
try {
2017-01-10 21:51:10 +00:00
if ( b . count ( " name " ) ) network [ " name " ] = OSUtils : : jsonString ( b [ " name " ] , " " ) ;
if ( b . count ( " private " ) ) network [ " private " ] = OSUtils : : jsonBool ( b [ " private " ] , true ) ;
if ( b . count ( " enableBroadcast " ) ) network [ " enableBroadcast " ] = OSUtils : : jsonBool ( b [ " enableBroadcast " ] , false ) ;
if ( b . count ( " allowPassiveBridging " ) ) network [ " allowPassiveBridging " ] = OSUtils : : jsonBool ( b [ " allowPassiveBridging " ] , false ) ;
if ( b . count ( " multicastLimit " ) ) network [ " multicastLimit " ] = OSUtils : : jsonInt ( b [ " multicastLimit " ] , 32ULL ) ;
2016-08-16 01:49:50 +00:00
if ( b . count ( " v4AssignMode " ) ) {
2016-09-30 20:04:26 +00:00
json nv4m ;
json & v4m = b [ " v4AssignMode " ] ;
if ( v4m . is_string ( ) ) { // backward compatibility
2017-01-10 21:51:10 +00:00
nv4m [ " zt " ] = ( OSUtils : : jsonString ( v4m , " " ) = = " zt " ) ;
2016-09-30 20:04:26 +00:00
} else if ( v4m . is_object ( ) ) {
2017-01-10 21:51:10 +00:00
nv4m [ " zt " ] = OSUtils : : jsonBool ( v4m [ " zt " ] , false ) ;
2016-09-30 20:04:26 +00:00
} else nv4m [ " zt " ] = false ;
network [ " v4AssignMode " ] = nv4m ;
2016-08-16 01:49:50 +00:00
}
if ( b . count ( " v6AssignMode " ) ) {
2016-09-30 20:04:26 +00:00
json nv6m ;
json & v6m = b [ " v6AssignMode " ] ;
2016-08-16 01:49:50 +00:00
if ( ! nv6m . is_object ( ) ) nv6m = json : : object ( ) ;
2016-09-30 20:04:26 +00:00
if ( v6m . is_string ( ) ) { // backward compatibility
2017-01-10 21:51:10 +00:00
std : : vector < std : : string > v6ms ( OSUtils : : split ( OSUtils : : jsonString ( v6m , " " ) . c_str ( ) , " , " , " " , " " ) ) ;
2016-09-30 20:04:26 +00:00
std : : sort ( v6ms . begin ( ) , v6ms . end ( ) ) ;
v6ms . erase ( std : : unique ( v6ms . begin ( ) , v6ms . end ( ) ) , v6ms . end ( ) ) ;
2016-08-26 21:16:55 +00:00
nv6m [ " rfc4193 " ] = false ;
nv6m [ " zt " ] = false ;
nv6m [ " 6plane " ] = false ;
2016-09-30 20:04:26 +00:00
for ( std : : vector < std : : string > : : iterator i ( v6ms . begin ( ) ) ; i ! = v6ms . end ( ) ; + + i ) {
2016-08-16 01:49:50 +00:00
if ( * i = = " rfc4193 " )
nv6m [ " rfc4193 " ] = true ;
else if ( * i = = " zt " )
nv6m [ " zt " ] = true ;
else if ( * i = = " 6plane " )
nv6m [ " 6plane " ] = true ;
2015-09-10 21:47:04 +00:00
}
2016-09-30 20:04:26 +00:00
} else if ( v6m . is_object ( ) ) {
2017-01-10 21:51:10 +00:00
if ( v6m . count ( " rfc4193 " ) ) nv6m [ " rfc4193 " ] = OSUtils : : jsonBool ( v6m [ " rfc4193 " ] , false ) ;
if ( v6m . count ( " zt " ) ) nv6m [ " zt " ] = OSUtils : : jsonBool ( v6m [ " zt " ] , false ) ;
if ( v6m . count ( " 6plane " ) ) nv6m [ " 6plane " ] = OSUtils : : jsonBool ( v6m [ " 6plane " ] , false ) ;
2016-09-30 20:04:26 +00:00
} else {
nv6m [ " rfc4193 " ] = false ;
nv6m [ " zt " ] = false ;
nv6m [ " 6plane " ] = false ;
2016-08-16 01:49:50 +00:00
}
2016-09-30 20:04:26 +00:00
network [ " v6AssignMode " ] = nv6m ;
2016-08-16 01:49:50 +00:00
}
2015-06-13 09:34:31 +00:00
2016-08-16 01:49:50 +00:00
if ( b . count ( " routes " ) ) {
2016-08-25 23:08:40 +00:00
json & rts = b [ " routes " ] ;
2016-08-16 01:49:50 +00:00
if ( rts . is_array ( ) ) {
2016-08-25 23:08:40 +00:00
json nrts = json : : array ( ) ;
2016-08-16 01:49:50 +00:00
for ( unsigned long i = 0 ; i < rts . size ( ) ; + + i ) {
2016-08-25 23:08:40 +00:00
json & rt = rts [ i ] ;
if ( rt . is_object ( ) ) {
json & target = rt [ " target " ] ;
json & via = rt [ " via " ] ;
if ( target . is_string ( ) ) {
InetAddress t ( target . get < std : : string > ( ) ) ;
InetAddress v ;
if ( via . is_string ( ) ) v . fromString ( via . get < std : : string > ( ) ) ;
if ( ( ( t . ss_family = = AF_INET ) | | ( t . ss_family = = AF_INET6 ) ) & & ( t . netmaskBitsValid ( ) ) ) {
json tmp ;
tmp [ " target " ] = t . toString ( ) ;
if ( v . ss_family = = t . ss_family )
tmp [ " via " ] = v . toIpString ( ) ;
else tmp [ " via " ] = json ( ) ;
nrts . push_back ( tmp ) ;
}
2016-08-16 01:49:50 +00:00
}
}
}
2016-08-25 23:08:40 +00:00
network [ " routes " ] = nrts ;
2016-08-16 01:49:50 +00:00
}
}
2015-03-18 23:10:48 +00:00
2016-08-16 01:49:50 +00:00
if ( b . count ( " ipAssignmentPools " ) ) {
2016-08-25 23:08:40 +00:00
json & ipp = b [ " ipAssignmentPools " ] ;
2016-08-16 01:49:50 +00:00
if ( ipp . is_array ( ) ) {
2016-08-25 23:08:40 +00:00
json nipp = json : : array ( ) ;
2016-08-16 01:49:50 +00:00
for ( unsigned long i = 0 ; i < ipp . size ( ) ; + + i ) {
2016-11-04 23:14:58 +00:00
json & ip = ipp [ i ] ;
2016-08-16 01:49:50 +00:00
if ( ( ip . is_object ( ) ) & & ( ip . count ( " ipRangeStart " ) ) & & ( ip . count ( " ipRangeEnd " ) ) ) {
2017-01-10 21:51:10 +00:00
InetAddress f ( OSUtils : : jsonString ( ip [ " ipRangeStart " ] , " " ) ) ;
InetAddress t ( OSUtils : : jsonString ( ip [ " ipRangeEnd " ] , " " ) ) ;
2016-08-16 01:49:50 +00:00
if ( ( ( f . ss_family = = AF_INET ) | | ( f . ss_family = = AF_INET6 ) ) & & ( f . ss_family = = t . ss_family ) ) {
2016-08-25 23:08:40 +00:00
json tmp = json : : object ( ) ;
2016-08-16 01:49:50 +00:00
tmp [ " ipRangeStart " ] = f . toIpString ( ) ;
tmp [ " ipRangeEnd " ] = t . toIpString ( ) ;
nipp . push_back ( tmp ) ;
}
}
}
2016-08-25 23:08:40 +00:00
network [ " ipAssignmentPools " ] = nipp ;
2016-08-16 01:49:50 +00:00
}
2015-09-10 21:47:04 +00:00
}
2015-06-29 21:52:09 +00:00
2016-08-16 01:49:50 +00:00
if ( b . count ( " rules " ) ) {
2016-08-25 23:08:40 +00:00
json & rules = b [ " rules " ] ;
2016-08-16 01:49:50 +00:00
if ( rules . is_array ( ) ) {
2016-08-17 17:25:25 +00:00
json nrules = json : : array ( ) ;
2016-08-16 01:49:50 +00:00
for ( unsigned long i = 0 ; i < rules . size ( ) ; + + i ) {
2016-08-25 23:08:40 +00:00
json & rule = rules [ i ] ;
2016-08-16 01:49:50 +00:00
if ( rule . is_object ( ) ) {
2016-08-17 17:25:25 +00:00
ZT_VirtualNetworkRule ztr ;
2016-08-25 23:08:40 +00:00
if ( _parseRule ( rule , ztr ) )
nrules . push_back ( _renderRule ( ztr ) ) ;
2016-08-16 01:49:50 +00:00
}
}
2016-08-17 17:25:25 +00:00
network [ " rules " ] = nrules ;
2016-08-16 01:49:50 +00:00
}
}
2016-08-17 20:41:45 +00:00
if ( b . count ( " authTokens " ) ) {
2016-08-25 23:08:40 +00:00
json & authTokens = b [ " authTokens " ] ;
2016-08-17 20:41:45 +00:00
if ( authTokens . is_array ( ) ) {
json nat = json : : array ( ) ;
for ( unsigned long i = 0 ; i < authTokens . size ( ) ; + + i ) {
2016-09-15 20:17:37 +00:00
json & token = authTokens [ i ] ;
2016-08-17 20:41:45 +00:00
if ( token . is_object ( ) ) {
std : : string tstr = token [ " token " ] ;
if ( tstr . length ( ) > 0 ) {
json t = json : : object ( ) ;
t [ " token " ] = tstr ;
2017-01-10 21:51:10 +00:00
t [ " expires " ] = OSUtils : : jsonInt ( token [ " expires " ] , 0ULL ) ;
t [ " maxUsesPerMember " ] = OSUtils : : jsonInt ( token [ " maxUsesPerMember " ] , 0ULL ) ;
2016-08-17 20:41:45 +00:00
nat . push_back ( t ) ;
}
}
}
network [ " authTokens " ] = nat ;
}
}
2016-08-18 21:37:56 +00:00
if ( b . count ( " capabilities " ) ) {
2016-08-25 23:08:40 +00:00
json & capabilities = b [ " capabilities " ] ;
2016-08-18 21:37:56 +00:00
if ( capabilities . is_array ( ) ) {
std : : map < uint64_t , json > ncaps ;
for ( unsigned long i = 0 ; i < capabilities . size ( ) ; + + i ) {
2016-08-25 23:08:40 +00:00
json & cap = capabilities [ i ] ;
2016-08-18 21:37:56 +00:00
if ( cap . is_object ( ) ) {
json ncap = json : : object ( ) ;
2017-01-10 21:51:10 +00:00
const uint64_t capId = OSUtils : : jsonInt ( cap [ " id " ] , 0ULL ) ;
2016-08-18 21:37:56 +00:00
ncap [ " id " ] = capId ;
2017-02-21 21:27:20 +00:00
ncap [ " default " ] = OSUtils : : jsonBool ( cap [ " default " ] , false ) ;
2016-08-18 21:37:56 +00:00
2016-08-25 23:08:40 +00:00
json & rules = cap [ " rules " ] ;
2016-08-18 21:37:56 +00:00
json nrules = json : : array ( ) ;
if ( rules . is_array ( ) ) {
for ( unsigned long i = 0 ; i < rules . size ( ) ; + + i ) {
2016-11-04 23:14:58 +00:00
json & rule = rules [ i ] ;
2016-08-18 21:37:56 +00:00
if ( rule . is_object ( ) ) {
ZT_VirtualNetworkRule ztr ;
2016-08-25 23:08:40 +00:00
if ( _parseRule ( rule , ztr ) )
nrules . push_back ( _renderRule ( ztr ) ) ;
2016-08-18 21:37:56 +00:00
}
}
}
ncap [ " rules " ] = nrules ;
ncaps [ capId ] = ncap ;
}
}
json ncapsa = json : : array ( ) ;
for ( std : : map < uint64_t , json > : : iterator c ( ncaps . begin ( ) ) ; c ! = ncaps . end ( ) ; + + c )
ncapsa . push_back ( c - > second ) ;
network [ " capabilities " ] = ncapsa ;
}
}
2017-02-21 21:27:20 +00:00
if ( b . count ( " tags " ) ) {
json & tags = b [ " tags " ] ;
if ( tags . is_array ( ) ) {
std : : map < uint64_t , json > ntags ;
for ( unsigned long i = 0 ; i < tags . size ( ) ; + + i ) {
json & tag = tags [ i ] ;
if ( tag . is_object ( ) ) {
json ntag = json : : object ( ) ;
const uint64_t tagId = OSUtils : : jsonInt ( tag [ " id " ] , 0ULL ) ;
ntag [ " id " ] = tagId ;
2017-03-29 19:32:59 +00:00
json & dfl = tag [ " default " ] ;
if ( dfl . is_null ( ) )
ntag [ " default " ] = dfl ;
else ntag [ " default " ] = OSUtils : : jsonInt ( dfl , 0ULL ) ;
2017-02-21 21:27:20 +00:00
ntags [ tagId ] = ntag ;
}
}
json ntagsa = json : : array ( ) ;
for ( std : : map < uint64_t , json > : : iterator t ( ntags . begin ( ) ) ; t ! = ntags . end ( ) ; + + t )
ntagsa . push_back ( t - > second ) ;
network [ " tags " ] = ntagsa ;
}
}
2016-08-16 01:49:50 +00:00
} catch ( . . . ) {
2016-08-25 23:08:40 +00:00
responseBody = " { \" message \" : \" exception occurred while parsing body variables \" } " ;
responseContentType = " application/json " ;
2016-08-16 23:46:08 +00:00
return 400 ;
2016-08-16 01:49:50 +00:00
}
2016-08-16 23:46:08 +00:00
network [ " id " ] = nwids ;
network [ " nwid " ] = nwids ; // legacy
2015-09-10 21:47:04 +00:00
2017-04-29 02:58:21 +00:00
_removeNetworkNonPersistedFields ( network ) ;
2017-04-28 02:36:03 +00:00
if ( network ! = origNetwork ) {
2016-11-10 20:54:43 +00:00
json & revj = network [ " revision " ] ;
network [ " revision " ] = ( revj . is_number ( ) ? ( ( uint64_t ) revj + 1ULL ) : 1ULL ) ;
2017-04-26 13:48:08 +00:00
_db . saveNetwork ( nwid , network ) ;
2017-03-06 23:12:28 +00:00
// Send an update to all members of the network
2017-04-26 13:48:08 +00:00
_db . eachMember ( nwid , [ this , & now , & nwid ] ( uint64_t networkId , uint64_t nodeId , const json & obj ) {
this - > _pushMemberUpdate ( now , nwid , obj ) ;
2016-11-10 20:54:43 +00:00
} ) ;
2016-11-04 22:18:31 +00:00
}
2015-01-07 01:16:54 +00:00
2017-04-26 13:48:08 +00:00
JSONDB : : NetworkSummaryInfo ns ;
_db . getNetworkSummaryInfo ( nwid , ns ) ;
_addNetworkNonPersistedFields ( network , now , ns ) ;
2016-08-18 19:59:48 +00:00
2017-01-10 21:51:10 +00:00
responseBody = OSUtils : : jsonDump ( network ) ;
2016-08-16 21:05:17 +00:00
responseContentType = " application/json " ;
return 200 ;
} // else 404
2015-01-07 01:16:54 +00:00
2015-09-10 21:47:04 +00:00
} // else 404
2015-01-07 01:16:54 +00:00
2017-03-30 16:54:04 +00:00
} else if ( path [ 0 ] = = " ping " ) {
2017-03-21 13:31:15 +00:00
json testRec ;
const uint64_t now = OSUtils : : now ( ) ;
testRec [ " clock " ] = now ;
testRec [ " uptime " ] = ( now - _startTime ) ;
2017-03-30 16:54:04 +00:00
testRec [ " content " ] = b ;
responseBody = OSUtils : : jsonDump ( testRec ) ;
2017-04-04 15:39:19 +00:00
_db . writeRaw ( " pong " , responseBody ) ;
2017-03-30 16:54:04 +00:00
responseContentType = " application/json " ;
return 200 ;
2017-03-21 13:31:15 +00:00
}
2015-01-07 01:16:54 +00:00
2015-09-10 21:47:04 +00:00
return 404 ;
2015-05-17 00:12:29 +00:00
}
2015-04-21 23:41:35 +00:00
2016-08-17 17:42:32 +00:00
unsigned int EmbeddedNetworkController : : handleControlPlaneHttpDELETE (
2015-05-17 00:12:29 +00:00
const std : : vector < std : : string > & path ,
const std : : map < std : : string , std : : string > & urlArgs ,
const std : : map < std : : string , std : : string > & headers ,
const std : : string & body ,
std : : string & responseBody ,
std : : string & responseContentType )
{
if ( path . empty ( ) )
return 404 ;
if ( path [ 0 ] = = " network " ) {
2015-04-21 23:41:35 +00:00
if ( ( path . size ( ) > = 2 ) & & ( path [ 1 ] . length ( ) = = 16 ) ) {
2016-08-12 22:32:45 +00:00
const uint64_t nwid = Utils : : hexStrToU64 ( path [ 1 ] . c_str ( ) ) ;
2016-11-10 21:57:01 +00:00
if ( path . size ( ) > = 3 ) {
if ( ( path . size ( ) = = 4 ) & & ( path [ 2 ] = = " member " ) & & ( path [ 3 ] . length ( ) = = 10 ) ) {
const uint64_t address = Utils : : hexStrToU64 ( path [ 3 ] . c_str ( ) ) ;
2017-04-26 13:48:08 +00:00
json member = _db . eraseNetworkMember ( nwid , address ) ;
2016-11-10 21:57:01 +00:00
if ( ! member . size ( ) )
return 404 ;
2017-01-10 21:51:10 +00:00
responseBody = OSUtils : : jsonDump ( member ) ;
2016-11-10 21:57:01 +00:00
responseContentType = " application/json " ;
return 200 ;
}
} else {
2017-04-26 13:48:08 +00:00
json network = _db . eraseNetwork ( nwid ) ;
if ( ! network . size ( ) )
return 404 ;
2017-01-10 21:51:10 +00:00
responseBody = OSUtils : : jsonDump ( network ) ;
2016-11-10 21:57:01 +00:00
responseContentType = " application/json " ;
return 200 ;
}
} // else 404
} // else 404
return 404 ;
}
void EmbeddedNetworkController : : threadMain ( )
throw ( )
{
2017-03-02 00:33:34 +00:00
uint64_t lastCircuitTestCheck = 0 ;
2017-04-25 03:51:02 +00:00
_RQEntry * qe = ( _RQEntry * ) 0 ;
while ( ( _running ) & & ( ( qe = _queue . get ( ) ) ) ) {
2016-11-10 21:57:01 +00:00
try {
_request ( qe - > nwid , qe - > fromAddr , qe - > requestPacketId , qe - > identity , qe - > metaData ) ;
} catch ( . . . ) { }
delete qe ;
2017-04-25 03:51:02 +00:00
if ( _running ) {
uint64_t now = OSUtils : : now ( ) ;
if ( ( now - lastCircuitTestCheck ) > ZT_EMBEDDEDNETWORKCONTROLLER_CIRCUIT_TEST_EXPIRATION ) {
lastCircuitTestCheck = now ;
Mutex : : Lock _l ( _tests_m ) ;
for ( std : : list < ZT_CircuitTest > : : iterator i ( _tests . begin ( ) ) ; i ! = _tests . end ( ) ; ) {
if ( ( now - i - > timestamp ) > ZT_EMBEDDEDNETWORKCONTROLLER_CIRCUIT_TEST_EXPIRATION ) {
_node - > circuitTestEnd ( & ( * i ) ) ;
_tests . erase ( i + + ) ;
} else + + i ;
}
2017-03-02 00:33:34 +00:00
}
}
2016-11-10 21:57:01 +00:00
}
}
void EmbeddedNetworkController : : _circuitTestCallback ( ZT_Node * node , ZT_CircuitTest * test , const ZT_CircuitTestReport * report )
{
2017-04-26 13:48:08 +00:00
char tmp [ 2048 ] , id [ 128 ] ;
2016-11-10 21:57:01 +00:00
EmbeddedNetworkController * const self = reinterpret_cast < EmbeddedNetworkController * > ( test - > ptr ) ;
2017-03-02 00:33:34 +00:00
if ( ( ! test ) | | ( ! report ) | | ( ! test - > credentialNetworkId ) ) return ; // sanity check
2016-11-10 21:57:01 +00:00
2017-03-02 00:33:34 +00:00
const uint64_t now = OSUtils : : now ( ) ;
Utils : : snprintf ( id , sizeof ( id ) , " network/%.16llx/test/%.16llx-%.16llx-%.10llx-%.10llx " , test - > credentialNetworkId , test - > testId , now , report - > upstream , report - > current ) ;
2016-11-10 21:57:01 +00:00
Utils : : snprintf ( tmp , sizeof ( tmp ) ,
2017-03-02 00:33:34 +00:00
" { \" id \" : \" %s \" , "
2017-04-26 13:48:08 +00:00
" \" objtype \" : \" circuit_test \" , "
2017-03-02 00:33:34 +00:00
" \" timestamp \" : %llu, "
" \" networkId \" : \" %.16llx \" , "
" \" testId \" : \" %.16llx \" , "
" \" upstream \" : \" %.10llx \" , "
" \" current \" : \" %.10llx \" , "
" \" receivedTimestamp \" : %llu, "
" \" sourcePacketId \" : \" %.16llx \" , "
" \" flags \" : %llu, "
" \" sourcePacketHopCount \" : %u, "
" \" errorCode \" : %u, "
" \" vendor \" : %d, "
" \" protocolVersion \" : %u, "
" \" majorVersion \" : %u, "
" \" minorVersion \" : %u, "
" \" revision \" : %u, "
" \" platform \" : %d, "
" \" architecture \" : %d, "
" \" receivedOnLocalAddress \" : \" %s \" , "
" \" receivedFromRemoteAddress \" : \" %s \" , "
" \" receivedFromLinkQuality \" : %f} " ,
id + 30 , // last bit only, not leading path
( unsigned long long ) test - > timestamp ,
( unsigned long long ) test - > credentialNetworkId ,
2016-11-10 21:57:01 +00:00
( unsigned long long ) test - > testId ,
( unsigned long long ) report - > upstream ,
( unsigned long long ) report - > current ,
2017-03-02 00:33:34 +00:00
( unsigned long long ) now ,
2016-11-10 21:57:01 +00:00
( unsigned long long ) report - > sourcePacketId ,
( unsigned long long ) report - > flags ,
report - > sourcePacketHopCount ,
report - > errorCode ,
( int ) report - > vendor ,
report - > protocolVersion ,
report - > majorVersion ,
report - > minorVersion ,
report - > revision ,
( int ) report - > platform ,
( int ) report - > architecture ,
reinterpret_cast < const InetAddress * > ( & ( report - > receivedOnLocalAddress ) ) - > toString ( ) . c_str ( ) ,
2017-03-02 00:33:34 +00:00
reinterpret_cast < const InetAddress * > ( & ( report - > receivedFromRemoteAddress ) ) - > toString ( ) . c_str ( ) ,
( ( double ) report - > receivedFromLinkQuality / ( double ) ZT_PATH_LINK_QUALITY_MAX ) ) ;
2016-11-10 21:57:01 +00:00
2017-03-02 00:33:34 +00:00
self - > _db . writeRaw ( id , std : : string ( tmp ) ) ;
2016-11-10 21:57:01 +00:00
}
void EmbeddedNetworkController : : _request (
uint64_t nwid ,
const InetAddress & fromAddr ,
uint64_t requestPacketId ,
const Identity & identity ,
const Dictionary < ZT_NETWORKCONFIG_METADATA_DICT_CAPACITY > & metaData )
{
2017-04-28 02:36:03 +00:00
char nwids [ 24 ] ;
JSONDB : : NetworkSummaryInfo ns ;
json network , member , origMember ;
2016-11-10 21:57:01 +00:00
if ( ( ( ! _signingId ) | | ( ! _signingId . hasPrivate ( ) ) ) | | ( _signingId . address ( ) . toInt ( ) ! = ( nwid > > 24 ) ) | | ( ! _sender ) )
return ;
const uint64_t now = OSUtils : : now ( ) ;
if ( requestPacketId ) {
Mutex : : Lock _l ( _lastRequestTime_m ) ;
uint64_t & lrt = _lastRequestTime [ std : : pair < uint64_t , uint64_t > ( identity . address ( ) . toInt ( ) , nwid ) ] ;
if ( ( now - lrt ) < = ZT_NETCONF_MIN_REQUEST_PERIOD )
return ;
lrt = now ;
}
Utils : : snprintf ( nwids , sizeof ( nwids ) , " %.16llx " , nwid ) ;
2017-04-26 13:48:08 +00:00
if ( ! _db . getNetworkAndMember ( nwid , identity . address ( ) . toInt ( ) , network , member , ns ) ) {
2016-11-10 21:57:01 +00:00
_sender - > ncSendError ( nwid , requestPacketId , identity . address ( ) , NetworkController : : NC_ERROR_OBJECT_NOT_FOUND ) ;
return ;
}
2017-04-28 02:36:03 +00:00
origMember = member ;
const bool newMember = ( ( ! member . is_object ( ) ) | | ( member . size ( ) = = 0 ) ) ;
2016-11-10 21:57:01 +00:00
_initMember ( member ) ;
{
2017-01-10 21:51:10 +00:00
std : : string haveIdStr ( OSUtils : : jsonString ( member [ " identity " ] , " " ) ) ;
2016-11-10 21:57:01 +00:00
if ( haveIdStr . length ( ) > 0 ) {
// If we already know this member's identity perform a full compare. This prevents
// a "collision" from being able to auth onto our network in place of an already
// known member.
try {
if ( Identity ( haveIdStr . c_str ( ) ) ! = identity ) {
_sender - > ncSendError ( nwid , requestPacketId , identity . address ( ) , NetworkController : : NC_ERROR_ACCESS_DENIED ) ;
return ;
}
} catch ( . . . ) {
_sender - > ncSendError ( nwid , requestPacketId , identity . address ( ) , NetworkController : : NC_ERROR_ACCESS_DENIED ) ;
return ;
}
} else {
// If we do not yet know this member's identity, learn it.
member [ " identity " ] = identity . toString ( false ) ;
}
}
// These are always the same, but make sure they are set
2017-04-28 02:36:03 +00:00
{
const std : : string addrs ( identity . address ( ) . toString ( ) ) ;
member [ " id " ] = addrs ;
member [ " address " ] = addrs ;
member [ " nwid " ] = nwids ;
}
2016-11-10 21:57:01 +00:00
// Determine whether and how member is authorized
const char * authorizedBy = ( const char * ) 0 ;
2016-11-15 22:06:25 +00:00
bool autoAuthorized = false ;
json autoAuthCredentialType , autoAuthCredential ;
2017-01-10 21:51:10 +00:00
if ( OSUtils : : jsonBool ( member [ " authorized " ] , false ) ) {
2016-11-10 21:57:01 +00:00
authorizedBy = " memberIsAuthorized " ;
2017-01-10 21:51:10 +00:00
} else if ( ! OSUtils : : jsonBool ( network [ " private " ] , true ) ) {
2016-11-10 21:57:01 +00:00
authorizedBy = " networkIsPublic " ;
2016-12-23 02:52:34 +00:00
json & ahist = member [ " authHistory " ] ;
if ( ( ! ahist . is_array ( ) ) | | ( ahist . size ( ) = = 0 ) )
2016-11-15 22:06:25 +00:00
autoAuthorized = true ;
2016-11-10 21:57:01 +00:00
} else {
char presentedAuth [ 512 ] ;
if ( metaData . get ( ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_AUTH , presentedAuth , sizeof ( presentedAuth ) ) > 0 ) {
presentedAuth [ 511 ] = ( char ) 0 ; // sanity check
// Check for bearer token presented by member
if ( ( strlen ( presentedAuth ) > 6 ) & & ( ! strncmp ( presentedAuth , " token: " , 6 ) ) ) {
const char * const presentedToken = presentedAuth + 6 ;
json & authTokens = network [ " authTokens " ] ;
if ( authTokens . is_array ( ) ) {
for ( unsigned long i = 0 ; i < authTokens . size ( ) ; + + i ) {
json & token = authTokens [ i ] ;
if ( token . is_object ( ) ) {
2017-01-10 21:51:10 +00:00
const uint64_t expires = OSUtils : : jsonInt ( token [ " expires " ] , 0ULL ) ;
const uint64_t maxUses = OSUtils : : jsonInt ( token [ " maxUsesPerMember " ] , 0ULL ) ;
std : : string tstr = OSUtils : : jsonString ( token [ " token " ] , " " ) ;
2016-11-10 21:57:01 +00:00
if ( ( ( expires = = 0ULL ) | | ( expires > now ) ) & & ( tstr = = presentedToken ) ) {
bool usable = ( maxUses = = 0 ) ;
if ( ! usable ) {
uint64_t useCount = 0 ;
json & ahist = member [ " authHistory " ] ;
if ( ahist . is_array ( ) ) {
for ( unsigned long j = 0 ; j < ahist . size ( ) ; + + j ) {
json & ah = ahist [ j ] ;
2017-01-10 21:51:10 +00:00
if ( ( OSUtils : : jsonString ( ah [ " ct " ] , " " ) = = " token " ) & & ( OSUtils : : jsonString ( ah [ " c " ] , " " ) = = tstr ) & & ( OSUtils : : jsonBool ( ah [ " a " ] , false ) ) )
2016-11-10 21:57:01 +00:00
+ + useCount ;
}
}
usable = ( useCount < maxUses ) ;
}
if ( usable ) {
authorizedBy = " token " ;
2016-11-15 22:06:25 +00:00
autoAuthorized = true ;
autoAuthCredentialType = " token " ;
autoAuthCredential = tstr ;
2016-11-10 21:57:01 +00:00
}
}
}
}
}
}
}
}
2016-11-15 22:06:25 +00:00
// If we auto-authorized, update member record
if ( ( autoAuthorized ) & & ( authorizedBy ) ) {
member [ " authorized " ] = true ;
member [ " lastAuthorizedTime " ] = now ;
json ah ;
ah [ " a " ] = true ;
ah [ " by " ] = authorizedBy ;
ah [ " ts " ] = now ;
ah [ " ct " ] = autoAuthCredentialType ;
ah [ " c " ] = autoAuthCredential ;
member [ " authHistory " ] . push_back ( ah ) ;
json & revj = member [ " revision " ] ;
member [ " revision " ] = ( revj . is_number ( ) ? ( ( uint64_t ) revj + 1ULL ) : 1ULL ) ;
}
2016-11-10 21:57:01 +00:00
// Log this request
if ( requestPacketId ) { // only log if this is a request, not for generated pushes
json rlEntry = json : : object ( ) ;
rlEntry [ " ts " ] = now ;
2017-03-02 00:33:34 +00:00
rlEntry [ " auth " ] = ( authorizedBy ) ? true : false ;
rlEntry [ " authBy " ] = ( authorizedBy ) ? authorizedBy : " " ;
rlEntry [ " vMajor " ] = metaData . getUI ( ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_NODE_MAJOR_VERSION , 0 ) ;
rlEntry [ " vMinor " ] = metaData . getUI ( ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_NODE_MINOR_VERSION , 0 ) ;
rlEntry [ " vRev " ] = metaData . getUI ( ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_NODE_REVISION , 0 ) ;
rlEntry [ " vProto " ] = metaData . getUI ( ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_PROTOCOL_VERSION , 0 ) ;
2016-11-10 21:57:01 +00:00
if ( fromAddr )
rlEntry [ " fromAddr " ] = fromAddr . toString ( ) ;
json recentLog = json : : array ( ) ;
recentLog . push_back ( rlEntry ) ;
json & oldLog = member [ " recentLog " ] ;
if ( oldLog . is_array ( ) ) {
for ( unsigned long i = 0 ; i < oldLog . size ( ) ; + + i ) {
recentLog . push_back ( oldLog [ i ] ) ;
if ( recentLog . size ( ) > = ZT_NETCONF_DB_MEMBER_HISTORY_LENGTH )
break ;
}
}
member [ " recentLog " ] = recentLog ;
// Also only do this on real requests
member [ " lastRequestMetaData " ] = metaData . data ( ) ;
}
// If they are not authorized, STOP!
if ( ! authorizedBy ) {
2017-04-29 02:58:21 +00:00
_removeMemberNonPersistedFields ( member ) ;
if ( origMember ! = member )
2017-04-26 13:48:08 +00:00
_db . saveNetworkMember ( nwid , identity . address ( ) . toInt ( ) , member ) ;
2016-11-10 21:57:01 +00:00
_sender - > ncSendError ( nwid , requestPacketId , identity . address ( ) , NetworkController : : NC_ERROR_ACCESS_DENIED ) ;
return ;
}
// -------------------------------------------------------------------------
// If we made it this far, they are authorized.
// -------------------------------------------------------------------------
2016-11-15 22:26:05 +00:00
uint64_t credentialtmd = ZT_NETWORKCONFIG_DEFAULT_CREDENTIAL_TIME_MAX_MAX_DELTA ;
2017-04-26 13:48:08 +00:00
if ( now > ns . mostRecentDeauthTime ) {
2016-11-15 22:26:05 +00:00
// If we recently de-authorized a member, shrink credential TTL/max delta to
// be below the threshold required to exclude it. Cap this to a min/max to
// prevent jitter or absurdly large values.
2017-04-26 13:48:08 +00:00
const uint64_t deauthWindow = now - ns . mostRecentDeauthTime ;
2016-11-15 22:26:05 +00:00
if ( deauthWindow < ZT_NETWORKCONFIG_DEFAULT_CREDENTIAL_TIME_MIN_MAX_DELTA ) {
credentialtmd = ZT_NETWORKCONFIG_DEFAULT_CREDENTIAL_TIME_MIN_MAX_DELTA ;
} else if ( deauthWindow < ( ZT_NETWORKCONFIG_DEFAULT_CREDENTIAL_TIME_MAX_MAX_DELTA + 5000ULL ) ) {
credentialtmd = deauthWindow - 5000ULL ;
}
}
2016-11-10 21:57:01 +00:00
2017-04-27 07:59:36 +00:00
std : : auto_ptr < NetworkConfig > nc ( new NetworkConfig ( ) ) ;
nc - > networkId = nwid ;
nc - > type = OSUtils : : jsonBool ( network [ " private " ] , true ) ? ZT_NETWORK_TYPE_PRIVATE : ZT_NETWORK_TYPE_PUBLIC ;
nc - > timestamp = now ;
nc - > credentialTimeMaxDelta = credentialtmd ;
nc - > revision = OSUtils : : jsonInt ( network [ " revision " ] , 0ULL ) ;
nc - > issuedTo = identity . address ( ) ;
if ( OSUtils : : jsonBool ( network [ " enableBroadcast " ] , true ) ) nc - > flags | = ZT_NETWORKCONFIG_FLAG_ENABLE_BROADCAST ;
if ( OSUtils : : jsonBool ( network [ " allowPassiveBridging " ] , false ) ) nc - > flags | = ZT_NETWORKCONFIG_FLAG_ALLOW_PASSIVE_BRIDGING ;
Utils : : scopy ( nc - > name , sizeof ( nc - > name ) , OSUtils : : jsonString ( network [ " name " ] , " " ) . c_str ( ) ) ;
nc - > multicastLimit = ( unsigned int ) OSUtils : : jsonInt ( network [ " multicastLimit " ] , 32ULL ) ;
2016-11-10 21:57:01 +00:00
2017-04-26 13:48:08 +00:00
for ( std : : vector < Address > : : const_iterator ab ( ns . activeBridges . begin ( ) ) ; ab ! = ns . activeBridges . end ( ) ; + + ab )
2017-04-27 07:59:36 +00:00
nc - > addSpecialist ( * ab , ZT_NETWORKCONFIG_SPECIALIST_TYPE_ACTIVE_BRIDGE ) ;
2016-11-10 21:57:01 +00:00
json & v4AssignMode = network [ " v4AssignMode " ] ;
json & v6AssignMode = network [ " v6AssignMode " ] ;
json & ipAssignmentPools = network [ " ipAssignmentPools " ] ;
json & routes = network [ " routes " ] ;
json & rules = network [ " rules " ] ;
json & capabilities = network [ " capabilities " ] ;
2017-02-21 21:27:20 +00:00
json & tags = network [ " tags " ] ;
2016-11-10 21:57:01 +00:00
json & memberCapabilities = member [ " capabilities " ] ;
json & memberTags = member [ " tags " ] ;
if ( metaData . getUI ( ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_RULES_ENGINE_REV , 0 ) < = 0 ) {
// Old versions with no rules engine support get an allow everything rule.
// Since rules are enforced bidirectionally, newer versions *will* still
// enforce rules on the inbound side.
2017-04-27 07:59:36 +00:00
nc - > ruleCount = 1 ;
nc - > rules [ 0 ] . t = ZT_NETWORK_RULE_ACTION_ACCEPT ;
2016-11-10 21:57:01 +00:00
} else {
if ( rules . is_array ( ) ) {
for ( unsigned long i = 0 ; i < rules . size ( ) ; + + i ) {
2017-04-27 07:59:36 +00:00
if ( nc - > ruleCount > = ZT_MAX_NETWORK_RULES )
2016-11-10 21:57:01 +00:00
break ;
2017-04-27 07:59:36 +00:00
if ( _parseRule ( rules [ i ] , nc - > rules [ nc - > ruleCount ] ) )
+ + nc - > ruleCount ;
2016-11-10 21:57:01 +00:00
}
}
2017-02-21 21:27:20 +00:00
std : : map < uint64_t , json * > capsById ;
if ( ! memberCapabilities . is_array ( ) )
memberCapabilities = json : : array ( ) ;
if ( capabilities . is_array ( ) ) {
2016-11-10 21:57:01 +00:00
for ( unsigned long i = 0 ; i < capabilities . size ( ) ; + + i ) {
json & cap = capabilities [ i ] ;
2017-02-21 21:27:20 +00:00
if ( cap . is_object ( ) ) {
const uint64_t id = OSUtils : : jsonInt ( cap [ " id " ] , 0ULL ) & 0xffffffffULL ;
capsById [ id ] = & cap ;
if ( ( newMember ) & & ( OSUtils : : jsonBool ( cap [ " default " ] , false ) ) ) {
bool have = false ;
for ( unsigned long i = 0 ; i < memberCapabilities . size ( ) ; + + i ) {
if ( id = = ( OSUtils : : jsonInt ( memberCapabilities [ i ] , 0ULL ) & 0xffffffffULL ) ) {
have = true ;
2016-11-10 21:57:01 +00:00
break ;
2017-02-21 21:27:20 +00:00
}
2016-11-10 21:57:01 +00:00
}
2017-02-21 21:27:20 +00:00
if ( ! have )
memberCapabilities . push_back ( id ) ;
2016-11-10 21:57:01 +00:00
}
}
}
}
2017-02-21 21:27:20 +00:00
for ( unsigned long i = 0 ; i < memberCapabilities . size ( ) ; + + i ) {
const uint64_t capId = OSUtils : : jsonInt ( memberCapabilities [ i ] , 0ULL ) & 0xffffffffULL ;
2017-02-21 21:48:29 +00:00
std : : map < uint64_t , json * > : : const_iterator ctmp = capsById . find ( capId ) ;
if ( ctmp ! = capsById . end ( ) ) {
json * cap = ctmp - > second ;
if ( ( cap ) & & ( cap - > is_object ( ) ) & & ( cap - > size ( ) > 0 ) ) {
ZT_VirtualNetworkRule capr [ ZT_MAX_CAPABILITY_RULES ] ;
unsigned int caprc = 0 ;
json & caprj = ( * cap ) [ " rules " ] ;
if ( ( caprj . is_array ( ) ) & & ( caprj . size ( ) > 0 ) ) {
for ( unsigned long j = 0 ; j < caprj . size ( ) ; + + j ) {
if ( caprc > = ZT_MAX_CAPABILITY_RULES )
break ;
if ( _parseRule ( caprj [ j ] , capr [ caprc ] ) )
+ + caprc ;
}
2017-02-21 21:27:20 +00:00
}
2017-04-27 07:59:36 +00:00
nc - > capabilities [ nc - > capabilityCount ] = Capability ( ( uint32_t ) capId , nwid , now , 1 , capr , caprc ) ;
if ( nc - > capabilities [ nc - > capabilityCount ] . sign ( _signingId , identity . address ( ) ) )
+ + nc - > capabilityCount ;
if ( nc - > capabilityCount > = ZT_MAX_NETWORK_CAPABILITIES )
2017-02-21 21:48:29 +00:00
break ;
2017-02-21 21:27:20 +00:00
}
}
}
2016-11-10 21:57:01 +00:00
2017-02-21 21:27:20 +00:00
std : : map < uint32_t , uint32_t > memberTagsById ;
2016-11-10 21:57:01 +00:00
if ( memberTags . is_array ( ) ) {
for ( unsigned long i = 0 ; i < memberTags . size ( ) ; + + i ) {
json & t = memberTags [ i ] ;
if ( ( t . is_array ( ) ) & & ( t . size ( ) = = 2 ) )
2017-02-21 21:27:20 +00:00
memberTagsById [ ( uint32_t ) ( OSUtils : : jsonInt ( t [ 0 ] , 0ULL ) & 0xffffffffULL ) ] = ( uint32_t ) ( OSUtils : : jsonInt ( t [ 1 ] , 0ULL ) & 0xffffffffULL ) ;
2016-11-10 21:57:01 +00:00
}
2017-02-21 21:27:20 +00:00
}
if ( tags . is_array ( ) ) { // check network tags array for defaults that are not present in member tags
for ( unsigned long i = 0 ; i < tags . size ( ) ; + + i ) {
json & t = tags [ i ] ;
if ( t . is_object ( ) ) {
const uint32_t id = ( uint32_t ) ( OSUtils : : jsonInt ( t [ " id " ] , 0 ) & 0xffffffffULL ) ;
json & dfl = t [ " default " ] ;
if ( ( dfl . is_number ( ) ) & & ( memberTagsById . find ( id ) = = memberTagsById . end ( ) ) ) {
memberTagsById [ id ] = ( uint32_t ) ( OSUtils : : jsonInt ( dfl , 0 ) & 0xffffffffULL ) ;
json mt = json : : array ( ) ;
mt . push_back ( id ) ;
mt . push_back ( dfl ) ;
memberTags . push_back ( mt ) ; // add default to member tags if not present
}
}
2016-11-10 21:57:01 +00:00
}
}
2017-02-21 21:27:20 +00:00
for ( std : : map < uint32_t , uint32_t > : : const_iterator t ( memberTagsById . begin ( ) ) ; t ! = memberTagsById . end ( ) ; + + t ) {
2017-04-27 07:59:36 +00:00
if ( nc - > tagCount > = ZT_MAX_NETWORK_TAGS )
2017-02-21 21:27:20 +00:00
break ;
2017-04-27 07:59:36 +00:00
nc - > tags [ nc - > tagCount ] = Tag ( nwid , now , identity . address ( ) , t - > first , t - > second ) ;
if ( nc - > tags [ nc - > tagCount ] . sign ( _signingId ) )
+ + nc - > tagCount ;
2017-02-21 21:27:20 +00:00
}
2016-11-10 21:57:01 +00:00
}
if ( routes . is_array ( ) ) {
for ( unsigned long i = 0 ; i < routes . size ( ) ; + + i ) {
2017-04-27 07:59:36 +00:00
if ( nc - > routeCount > = ZT_MAX_NETWORK_ROUTES )
2016-11-10 21:57:01 +00:00
break ;
json & route = routes [ i ] ;
json & target = route [ " target " ] ;
json & via = route [ " via " ] ;
if ( target . is_string ( ) ) {
const InetAddress t ( target . get < std : : string > ( ) ) ;
InetAddress v ;
if ( via . is_string ( ) ) v . fromString ( via . get < std : : string > ( ) ) ;
if ( ( t . ss_family = = AF_INET ) | | ( t . ss_family = = AF_INET6 ) ) {
2017-04-27 07:59:36 +00:00
ZT_VirtualNetworkRoute * r = & ( nc - > routes [ nc - > routeCount ] ) ;
2016-11-10 21:57:01 +00:00
* ( reinterpret_cast < InetAddress * > ( & ( r - > target ) ) ) = t ;
if ( v . ss_family = = t . ss_family )
* ( reinterpret_cast < InetAddress * > ( & ( r - > via ) ) ) = v ;
2017-04-27 07:59:36 +00:00
+ + nc - > routeCount ;
2016-11-10 21:57:01 +00:00
}
}
}
}
2015-05-17 00:12:29 +00:00
2017-01-10 21:51:10 +00:00
const bool noAutoAssignIps = OSUtils : : jsonBool ( member [ " noAutoAssignIps " ] , false ) ;
2015-04-21 23:41:35 +00:00
2016-11-10 21:57:01 +00:00
if ( ( v6AssignMode . is_object ( ) ) & & ( ! noAutoAssignIps ) ) {
2017-04-27 07:59:36 +00:00
if ( ( OSUtils : : jsonBool ( v6AssignMode [ " rfc4193 " ] , false ) ) & & ( nc - > staticIpCount < ZT_MAX_ZT_ASSIGNED_ADDRESSES ) ) {
nc - > staticIps [ nc - > staticIpCount + + ] = InetAddress : : makeIpv6rfc4193 ( nwid , identity . address ( ) . toInt ( ) ) ;
nc - > flags | = ZT_NETWORKCONFIG_FLAG_ENABLE_IPV6_NDP_EMULATION ;
2016-11-10 21:57:01 +00:00
}
2017-04-27 07:59:36 +00:00
if ( ( OSUtils : : jsonBool ( v6AssignMode [ " 6plane " ] , false ) ) & & ( nc - > staticIpCount < ZT_MAX_ZT_ASSIGNED_ADDRESSES ) ) {
nc - > staticIps [ nc - > staticIpCount + + ] = InetAddress : : makeIpv66plane ( nwid , identity . address ( ) . toInt ( ) ) ;
nc - > flags | = ZT_NETWORKCONFIG_FLAG_ENABLE_IPV6_NDP_EMULATION ;
2016-11-10 21:57:01 +00:00
}
}
2016-11-04 22:18:31 +00:00
2016-11-10 21:57:01 +00:00
bool haveManagedIpv4AutoAssignment = false ;
bool haveManagedIpv6AutoAssignment = false ; // "special" NDP-emulated address types do not count
json ipAssignments = member [ " ipAssignments " ] ; // we want to make a copy
if ( ipAssignments . is_array ( ) ) {
for ( unsigned long i = 0 ; i < ipAssignments . size ( ) ; + + i ) {
if ( ! ipAssignments [ i ] . is_string ( ) )
continue ;
std : : string ips = ipAssignments [ i ] ;
InetAddress ip ( ips ) ;
2016-08-16 21:05:17 +00:00
2016-11-10 21:57:01 +00:00
// IP assignments are only pushed if there is a corresponding local route. We also now get the netmask bits from
// this route, ignoring the netmask bits field of the assigned IP itself. Using that was worthless and a source
// of user error / poor UX.
int routedNetmaskBits = 0 ;
2017-04-27 07:59:36 +00:00
for ( unsigned int rk = 0 ; rk < nc - > routeCount ; + + rk ) {
if ( ( ! nc - > routes [ rk ] . via . ss_family ) & & ( reinterpret_cast < const InetAddress * > ( & ( nc - > routes [ rk ] . target ) ) - > containsAddress ( ip ) ) )
routedNetmaskBits = reinterpret_cast < const InetAddress * > ( & ( nc - > routes [ rk ] . target ) ) - > netmaskBits ( ) ;
2016-11-10 21:57:01 +00:00
}
if ( routedNetmaskBits > 0 ) {
2017-04-27 07:59:36 +00:00
if ( nc - > staticIpCount < ZT_MAX_ZT_ASSIGNED_ADDRESSES ) {
2016-11-10 21:57:01 +00:00
ip . setPort ( routedNetmaskBits ) ;
2017-04-27 07:59:36 +00:00
nc - > staticIps [ nc - > staticIpCount + + ] = ip ;
2015-09-10 21:47:04 +00:00
}
2016-11-10 21:57:01 +00:00
if ( ip . ss_family = = AF_INET )
haveManagedIpv4AutoAssignment = true ;
else if ( ip . ss_family = = AF_INET6 )
haveManagedIpv6AutoAssignment = true ;
}
}
} else {
ipAssignments = json : : array ( ) ;
}
2016-11-08 00:05:18 +00:00
2017-01-10 21:51:10 +00:00
if ( ( ipAssignmentPools . is_array ( ) ) & & ( ( v6AssignMode . is_object ( ) ) & & ( OSUtils : : jsonBool ( v6AssignMode [ " zt " ] , false ) ) ) & & ( ! haveManagedIpv6AutoAssignment ) & & ( ! noAutoAssignIps ) ) {
2016-11-10 21:57:01 +00:00
for ( unsigned long p = 0 ; ( ( p < ipAssignmentPools . size ( ) ) & & ( ! haveManagedIpv6AutoAssignment ) ) ; + + p ) {
json & pool = ipAssignmentPools [ p ] ;
if ( pool . is_object ( ) ) {
2017-01-10 21:51:10 +00:00
InetAddress ipRangeStart ( OSUtils : : jsonString ( pool [ " ipRangeStart " ] , " " ) ) ;
InetAddress ipRangeEnd ( OSUtils : : jsonString ( pool [ " ipRangeEnd " ] , " " ) ) ;
2016-11-10 21:57:01 +00:00
if ( ( ipRangeStart . ss_family = = AF_INET6 ) & & ( ipRangeEnd . ss_family = = AF_INET6 ) ) {
uint64_t s [ 2 ] , e [ 2 ] , x [ 2 ] , xx [ 2 ] ;
memcpy ( s , ipRangeStart . rawIpData ( ) , 16 ) ;
memcpy ( e , ipRangeEnd . rawIpData ( ) , 16 ) ;
s [ 0 ] = Utils : : ntoh ( s [ 0 ] ) ;
s [ 1 ] = Utils : : ntoh ( s [ 1 ] ) ;
e [ 0 ] = Utils : : ntoh ( e [ 0 ] ) ;
e [ 1 ] = Utils : : ntoh ( e [ 1 ] ) ;
x [ 0 ] = s [ 0 ] ;
x [ 1 ] = s [ 1 ] ;
2016-11-08 00:05:18 +00:00
2016-11-10 21:57:01 +00:00
for ( unsigned int trialCount = 0 ; trialCount < 1000 ; + + trialCount ) {
if ( ( trialCount = = 0 ) & & ( e [ 1 ] > s [ 1 ] ) & & ( ( e [ 1 ] - s [ 1 ] ) > = 0xffffffffffULL ) ) {
// First see if we can just cram a ZeroTier ID into the higher 64 bits. If so do that.
xx [ 0 ] = Utils : : hton ( x [ 0 ] ) ;
xx [ 1 ] = Utils : : hton ( x [ 1 ] + identity . address ( ) . toInt ( ) ) ;
} else {
// Otherwise pick random addresses -- this technically doesn't explore the whole range if the lower 64 bit range is >= 1 but that won't matter since that would be huge anyway
Utils : : getSecureRandom ( ( void * ) xx , 16 ) ;
if ( ( e [ 0 ] > s [ 0 ] ) )
xx [ 0 ] % = ( e [ 0 ] - s [ 0 ] ) ;
else xx [ 0 ] = 0 ;
if ( ( e [ 1 ] > s [ 1 ] ) )
xx [ 1 ] % = ( e [ 1 ] - s [ 1 ] ) ;
else xx [ 1 ] = 0 ;
xx [ 0 ] = Utils : : hton ( x [ 0 ] + xx [ 0 ] ) ;
xx [ 1 ] = Utils : : hton ( x [ 1 ] + xx [ 1 ] ) ;
}
2016-11-09 20:34:20 +00:00
2016-11-10 21:57:01 +00:00
InetAddress ip6 ( ( const void * ) xx , 16 , 0 ) ;
// Check if this IP is within a local-to-Ethernet routed network
int routedNetmaskBits = 0 ;
2017-04-27 07:59:36 +00:00
for ( unsigned int rk = 0 ; rk < nc - > routeCount ; + + rk ) {
if ( ( ! nc - > routes [ rk ] . via . ss_family ) & & ( nc - > routes [ rk ] . target . ss_family = = AF_INET6 ) & & ( reinterpret_cast < const InetAddress * > ( & ( nc - > routes [ rk ] . target ) ) - > containsAddress ( ip6 ) ) )
routedNetmaskBits = reinterpret_cast < const InetAddress * > ( & ( nc - > routes [ rk ] . target ) ) - > netmaskBits ( ) ;
2016-11-10 21:57:01 +00:00
}
// If it's routed, then try to claim and assign it and if successful end loop
2017-04-26 13:48:08 +00:00
if ( ( routedNetmaskBits > 0 ) & & ( ! std : : binary_search ( ns . allocatedIps . begin ( ) , ns . allocatedIps . end ( ) , ip6 ) ) ) {
2016-11-10 21:57:01 +00:00
ipAssignments . push_back ( ip6 . toIpString ( ) ) ;
member [ " ipAssignments " ] = ipAssignments ;
ip6 . setPort ( ( unsigned int ) routedNetmaskBits ) ;
2017-04-27 07:59:36 +00:00
if ( nc - > staticIpCount < ZT_MAX_ZT_ASSIGNED_ADDRESSES )
nc - > staticIps [ nc - > staticIpCount + + ] = ip6 ;
2016-11-10 21:57:01 +00:00
haveManagedIpv6AutoAssignment = true ;
break ;
}
}
}
2015-09-10 21:47:04 +00:00
}
2016-11-10 21:57:01 +00:00
}
}
2015-07-17 00:34:03 +00:00
2017-01-10 21:51:10 +00:00
if ( ( ipAssignmentPools . is_array ( ) ) & & ( ( v4AssignMode . is_object ( ) ) & & ( OSUtils : : jsonBool ( v4AssignMode [ " zt " ] , false ) ) ) & & ( ! haveManagedIpv4AutoAssignment ) & & ( ! noAutoAssignIps ) ) {
2016-11-10 21:57:01 +00:00
for ( unsigned long p = 0 ; ( ( p < ipAssignmentPools . size ( ) ) & & ( ! haveManagedIpv4AutoAssignment ) ) ; + + p ) {
json & pool = ipAssignmentPools [ p ] ;
if ( pool . is_object ( ) ) {
2017-01-10 21:51:10 +00:00
InetAddress ipRangeStartIA ( OSUtils : : jsonString ( pool [ " ipRangeStart " ] , " " ) ) ;
InetAddress ipRangeEndIA ( OSUtils : : jsonString ( pool [ " ipRangeEnd " ] , " " ) ) ;
2016-11-10 21:57:01 +00:00
if ( ( ipRangeStartIA . ss_family = = AF_INET ) & & ( ipRangeEndIA . ss_family = = AF_INET ) ) {
uint32_t ipRangeStart = Utils : : ntoh ( ( uint32_t ) ( reinterpret_cast < struct sockaddr_in * > ( & ipRangeStartIA ) - > sin_addr . s_addr ) ) ;
uint32_t ipRangeEnd = Utils : : ntoh ( ( uint32_t ) ( reinterpret_cast < struct sockaddr_in * > ( & ipRangeEndIA ) - > sin_addr . s_addr ) ) ;
if ( ( ipRangeEnd < ipRangeStart ) | | ( ipRangeStart = = 0 ) )
continue ;
uint32_t ipRangeLen = ipRangeEnd - ipRangeStart ;
2015-09-10 21:37:34 +00:00
2016-11-10 21:57:01 +00:00
// Start with the LSB of the member's address
uint32_t ipTrialCounter = ( uint32_t ) ( identity . address ( ) . toInt ( ) & 0xffffffff ) ;
2015-09-10 21:37:34 +00:00
2016-11-10 21:57:01 +00:00
for ( uint32_t k = ipRangeStart , trialCount = 0 ; ( ( k < = ipRangeEnd ) & & ( trialCount < 1000 ) ) ; + + k , + + trialCount ) {
uint32_t ip = ( ipRangeLen > 0 ) ? ( ipRangeStart + ( ipTrialCounter % ipRangeLen ) ) : ipRangeStart ;
+ + ipTrialCounter ;
if ( ( ip & 0x000000ff ) = = 0x000000ff )
continue ; // don't allow addresses that end in .255
2015-10-08 22:44:06 +00:00
2016-11-10 21:57:01 +00:00
// Check if this IP is within a local-to-Ethernet routed network
int routedNetmaskBits = - 1 ;
2017-04-27 07:59:36 +00:00
for ( unsigned int rk = 0 ; rk < nc - > routeCount ; + + rk ) {
if ( nc - > routes [ rk ] . target . ss_family = = AF_INET ) {
uint32_t targetIp = Utils : : ntoh ( ( uint32_t ) ( reinterpret_cast < const struct sockaddr_in * > ( & ( nc - > routes [ rk ] . target ) ) - > sin_addr . s_addr ) ) ;
int targetBits = Utils : : ntoh ( ( uint16_t ) ( reinterpret_cast < const struct sockaddr_in * > ( & ( nc - > routes [ rk ] . target ) ) - > sin_port ) ) ;
2016-11-10 21:57:01 +00:00
if ( ( ip & ( 0xffffffff < < ( 32 - targetBits ) ) ) = = targetIp ) {
routedNetmaskBits = targetBits ;
break ;
}
}
}
2015-10-08 22:44:06 +00:00
2016-11-10 21:57:01 +00:00
// If it's routed, then try to claim and assign it and if successful end loop
const InetAddress ip4 ( Utils : : hton ( ip ) , 0 ) ;
2017-04-26 13:48:08 +00:00
if ( ( routedNetmaskBits > 0 ) & & ( ! std : : binary_search ( ns . allocatedIps . begin ( ) , ns . allocatedIps . end ( ) , ip4 ) ) ) {
2016-11-10 21:57:01 +00:00
ipAssignments . push_back ( ip4 . toIpString ( ) ) ;
member [ " ipAssignments " ] = ipAssignments ;
2017-04-27 07:59:36 +00:00
if ( nc - > staticIpCount < ZT_MAX_ZT_ASSIGNED_ADDRESSES ) {
struct sockaddr_in * const v4ip = reinterpret_cast < struct sockaddr_in * > ( & ( nc - > staticIps [ nc - > staticIpCount + + ] ) ) ;
2016-11-10 21:57:01 +00:00
v4ip - > sin_family = AF_INET ;
v4ip - > sin_port = Utils : : hton ( ( uint16_t ) routedNetmaskBits ) ;
v4ip - > sin_addr . s_addr = Utils : : hton ( ip ) ;
}
haveManagedIpv4AutoAssignment = true ;
break ;
}
}
}
}
}
}
2015-10-08 22:44:06 +00:00
2017-02-23 19:47:36 +00:00
// Issue a certificate of ownership for all static IPs
2017-04-27 07:59:36 +00:00
if ( nc - > staticIpCount ) {
nc - > certificatesOfOwnership [ 0 ] = CertificateOfOwnership ( nwid , now , identity . address ( ) , 1 ) ;
for ( unsigned int i = 0 ; i < nc - > staticIpCount ; + + i )
nc - > certificatesOfOwnership [ 0 ] . addThing ( nc - > staticIps [ i ] ) ;
nc - > certificatesOfOwnership [ 0 ] . sign ( _signingId ) ;
nc - > certificateOfOwnershipCount = 1 ;
2017-02-23 19:47:36 +00:00
}
2016-11-10 21:57:01 +00:00
CertificateOfMembership com ( now , credentialtmd , nwid , identity . address ( ) ) ;
if ( com . sign ( _signingId ) ) {
2017-04-27 07:59:36 +00:00
nc - > com = com ;
2016-11-10 21:57:01 +00:00
} else {
_sender - > ncSendError ( nwid , requestPacketId , identity . address ( ) , NetworkController : : NC_ERROR_INTERNAL_SERVER_ERROR ) ;
2016-01-26 20:42:44 +00:00
return ;
2015-10-08 22:44:06 +00:00
}
2016-01-26 20:42:44 +00:00
2017-04-29 02:58:21 +00:00
_removeMemberNonPersistedFields ( member ) ;
if ( member ! = origMember )
2017-04-26 13:48:08 +00:00
_db . saveNetworkMember ( nwid , identity . address ( ) . toInt ( ) , member ) ;
2016-01-26 20:42:44 +00:00
2017-04-27 07:59:36 +00:00
_sender - > ncSendConfig ( nwid , requestPacketId , identity . address ( ) , * ( nc . get ( ) ) , metaData . getUI ( ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_VERSION , 0 ) < 6 ) ;
2015-10-08 20:25:38 +00:00
}
2016-11-10 20:54:43 +00:00
void EmbeddedNetworkController : : _pushMemberUpdate ( uint64_t now , uint64_t nwid , const nlohmann : : json & member )
{
try {
const std : : string idstr = member [ " identity " ] ;
const std : : string mdstr = member [ " lastRequestMetaData " ] ;
if ( ( idstr . length ( ) > 0 ) & & ( mdstr . length ( ) > 0 ) ) {
const Identity id ( idstr ) ;
bool online ;
{
Mutex : : Lock _l ( _lastRequestTime_m ) ;
2017-03-02 22:35:38 +00:00
std : : map < std : : pair < uint64_t , uint64_t > , uint64_t > : : iterator lrt ( _lastRequestTime . find ( std : : pair < uint64_t , uint64_t > ( id . address ( ) . toInt ( ) , nwid ) ) ) ;
2016-11-10 20:54:43 +00:00
online = ( ( lrt ! = _lastRequestTime . end ( ) ) & & ( ( now - lrt - > second ) < ZT_NETWORK_AUTOCONF_DELAY ) ) ;
}
2016-11-18 21:01:45 +00:00
if ( online ) {
2017-04-27 07:59:36 +00:00
Dictionary < ZT_NETWORKCONFIG_METADATA_DICT_CAPACITY > metaData ( mdstr . c_str ( ) ) ;
2016-11-18 21:01:45 +00:00
try {
2017-04-27 07:59:36 +00:00
this - > request ( nwid , InetAddress ( ) , 0 , id , metaData ) ;
2016-11-18 21:01:45 +00:00
} catch ( . . . ) { }
}
2016-11-10 20:54:43 +00:00
}
} catch ( . . . ) { }
}
2015-01-06 21:45:10 +00:00
} // namespace ZeroTier