|
|
|
|
@ -31,12 +31,6 @@
|
|
|
|
|
#include "../version.h" |
|
|
|
|
#include "../include/ZeroTierOne.h" |
|
|
|
|
|
|
|
|
|
#ifdef ZT_USE_SYSTEM_HTTP_PARSER |
|
|
|
|
#include <http_parser.h> |
|
|
|
|
#else |
|
|
|
|
#include "../ext/http-parser/http_parser.h" |
|
|
|
|
#endif |
|
|
|
|
|
|
|
|
|
#include "../node/Constants.hpp" |
|
|
|
|
#include "../node/Mutex.hpp" |
|
|
|
|
#include "../node/Node.hpp" |
|
|
|
|
@ -59,6 +53,16 @@
|
|
|
|
|
#include "ClusterGeoIpService.hpp" |
|
|
|
|
#include "ClusterDefinition.hpp" |
|
|
|
|
|
|
|
|
|
#ifdef ZT_USE_SYSTEM_HTTP_PARSER |
|
|
|
|
#include <http_parser.h> |
|
|
|
|
#else |
|
|
|
|
#include "../ext/http-parser/http_parser.h" |
|
|
|
|
#endif |
|
|
|
|
|
|
|
|
|
#include "../ext/json/json.hpp" |
|
|
|
|
|
|
|
|
|
using json = nlohmann::json; |
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Uncomment to enable UDP breakage switch |
|
|
|
|
* |
|
|
|
|
@ -144,6 +148,54 @@ namespace ZeroTier {
|
|
|
|
|
|
|
|
|
|
namespace { |
|
|
|
|
|
|
|
|
|
static uint64_t _jI(const json &jv,const uint64_t dfl) |
|
|
|
|
{ |
|
|
|
|
if (jv.is_number()) { |
|
|
|
|
return (uint64_t)jv; |
|
|
|
|
} else if (jv.is_string()) { |
|
|
|
|
std::string s = jv; |
|
|
|
|
return Utils::strToU64(s.c_str()); |
|
|
|
|
} else if (jv.is_boolean()) { |
|
|
|
|
return ((bool)jv ? 1ULL : 0ULL); |
|
|
|
|
} |
|
|
|
|
return dfl; |
|
|
|
|
} |
|
|
|
|
/*
|
|
|
|
|
static bool _jB(const json &jv,const bool dfl) |
|
|
|
|
{ |
|
|
|
|
if (jv.is_boolean()) { |
|
|
|
|
return (bool)jv; |
|
|
|
|
} else if (jv.is_number()) { |
|
|
|
|
return ((uint64_t)jv > 0ULL); |
|
|
|
|
} else if (jv.is_string()) { |
|
|
|
|
std::string s = jv; |
|
|
|
|
if (s.length() > 0) { |
|
|
|
|
switch(s[0]) { |
|
|
|
|
case 't': |
|
|
|
|
case 'T': |
|
|
|
|
case '1': |
|
|
|
|
return true; |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
return false; |
|
|
|
|
} |
|
|
|
|
return dfl; |
|
|
|
|
} |
|
|
|
|
*/ |
|
|
|
|
static std::string _jS(const json &jv,const char *dfl) |
|
|
|
|
{ |
|
|
|
|
if (jv.is_string()) { |
|
|
|
|
return jv; |
|
|
|
|
} else if (jv.is_number()) { |
|
|
|
|
char tmp[64]; |
|
|
|
|
Utils::snprintf(tmp,sizeof(tmp),"%llu",(uint64_t)jv); |
|
|
|
|
return tmp; |
|
|
|
|
} else if (jv.is_boolean()) { |
|
|
|
|
return ((bool)jv ? std::string("1") : std::string("0")); |
|
|
|
|
} |
|
|
|
|
return std::string((dfl) ? dfl : ""); |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
#ifdef ZT_AUTO_UPDATE |
|
|
|
|
#define ZT_AUTO_UPDATE_MAX_HTTP_RESPONSE_SIZE (1024 * 1024 * 64) |
|
|
|
|
#define ZT_AUTO_UPDATE_CHECK_PERIOD 21600000 |
|
|
|
|
@ -484,6 +536,7 @@ public:
|
|
|
|
|
const std::string _homePath; |
|
|
|
|
BackgroundResolver _tcpFallbackResolver; |
|
|
|
|
InetAddress _allowManagementFrom; |
|
|
|
|
json _localConfig; |
|
|
|
|
EmbeddedNetworkController *_controller; |
|
|
|
|
Phy<OneServiceImpl *> _phy; |
|
|
|
|
Node *_node; |
|
|
|
|
@ -758,13 +811,15 @@ public:
|
|
|
|
|
_portsBE[i] = Utils::hton((uint16_t)_ports[i]); |
|
|
|
|
|
|
|
|
|
{ |
|
|
|
|
uint64_t trustedPathIds[ZT_MAX_TRUSTED_PATHS]; |
|
|
|
|
InetAddress trustedPathNetworks[ZT_MAX_TRUSTED_PATHS]; |
|
|
|
|
unsigned int trustedPathCount = 0; |
|
|
|
|
|
|
|
|
|
// Old style "trustedpaths" flat file -- will eventually go away
|
|
|
|
|
FILE *trustpaths = fopen((_homePath + ZT_PATH_SEPARATOR_S + "trustedpaths").c_str(),"r"); |
|
|
|
|
uint64_t ids[ZT_MAX_TRUSTED_PATHS]; |
|
|
|
|
InetAddress addresses[ZT_MAX_TRUSTED_PATHS]; |
|
|
|
|
if (trustpaths) { |
|
|
|
|
char buf[1024]; |
|
|
|
|
unsigned int count = 0; |
|
|
|
|
while ((fgets(buf,sizeof(buf),trustpaths))&&(count < ZT_MAX_TRUSTED_PATHS)) { |
|
|
|
|
while ((fgets(buf,sizeof(buf),trustpaths))&&(trustedPathCount < ZT_MAX_TRUSTED_PATHS)) { |
|
|
|
|
int fno = 0; |
|
|
|
|
char *saveptr = (char *)0; |
|
|
|
|
uint64_t trustedPathId = 0; |
|
|
|
|
@ -778,14 +833,69 @@ public:
|
|
|
|
|
++fno; |
|
|
|
|
} |
|
|
|
|
if ( (trustedPathId != 0) && ((trustedPathNetwork.ss_family == AF_INET)||(trustedPathNetwork.ss_family == AF_INET6)) && (trustedPathNetwork.ipScope() != InetAddress::IP_SCOPE_GLOBAL) && (trustedPathNetwork.netmaskBits() > 0) ) { |
|
|
|
|
ids[count] = trustedPathId; |
|
|
|
|
addresses[count] = trustedPathNetwork; |
|
|
|
|
++count; |
|
|
|
|
trustedPathIds[trustedPathCount] = trustedPathId; |
|
|
|
|
trustedPathNetworks[trustedPathCount] = trustedPathNetwork; |
|
|
|
|
++trustedPathCount; |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
fclose(trustpaths); |
|
|
|
|
if (count) |
|
|
|
|
_node->setTrustedPaths(reinterpret_cast<const struct sockaddr_storage *>(addresses),ids,count); |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// Read local config file
|
|
|
|
|
std::string lcbuf; |
|
|
|
|
if (OSUtils::readFile((_homePath + ZT_PATH_SEPARATOR_S + "local.conf").c_str(),lcbuf)) { |
|
|
|
|
try { |
|
|
|
|
_localConfig = json::parse(lcbuf); |
|
|
|
|
if (!_localConfig.is_object()) { |
|
|
|
|
Mutex::Lock _l(_termReason_m); |
|
|
|
|
_termReason = ONE_UNRECOVERABLE_ERROR; |
|
|
|
|
_fatalErrorMessage = "invalid local.conf (content is not JSON object)"; |
|
|
|
|
return _termReason; |
|
|
|
|
} |
|
|
|
|
} catch ( ... ) { |
|
|
|
|
Mutex::Lock _l(_termReason_m); |
|
|
|
|
_termReason = ONE_UNRECOVERABLE_ERROR; |
|
|
|
|
_fatalErrorMessage = "invalid local.conf (JSON parse error)"; |
|
|
|
|
return _termReason; |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// Get any trusted paths in local.conf
|
|
|
|
|
json &physical = _localConfig["physical"]; |
|
|
|
|
if (physical.is_object()) { |
|
|
|
|
for(json::iterator phy(physical.begin());phy!=physical.end();++phy) { |
|
|
|
|
std::string nstr = phy.key(); |
|
|
|
|
if (nstr.length()) { |
|
|
|
|
if (phy.value().is_object()) { |
|
|
|
|
uint64_t tpid = 0; |
|
|
|
|
if ((tpid = _jI(phy.value()["trustedPathId"],0ULL))) { |
|
|
|
|
InetAddress trustedPathNetwork(nstr); |
|
|
|
|
if ( ((trustedPathNetwork.ss_family == AF_INET)||(trustedPathNetwork.ss_family == AF_INET6)) && (trustedPathCount < ZT_MAX_TRUSTED_PATHS) && (trustedPathNetwork.ipScope() != InetAddress::IP_SCOPE_GLOBAL) && (trustedPathNetwork.netmaskBits() > 0) ) { |
|
|
|
|
trustedPathIds[trustedPathCount] = tpid; |
|
|
|
|
trustedPathNetworks[trustedPathCount] = trustedPathNetwork; |
|
|
|
|
++trustedPathCount; |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// Set trusted paths if there are any
|
|
|
|
|
if (trustedPathCount) |
|
|
|
|
_node->setTrustedPaths(reinterpret_cast<const struct sockaddr_storage *>(trustedPathNetworks),trustedPathIds,trustedPathCount); |
|
|
|
|
|
|
|
|
|
// Set any roles (upstream/federation)
|
|
|
|
|
json &virt = _localConfig["virtual"]; |
|
|
|
|
if (virt.is_object()) { |
|
|
|
|
for(json::iterator v(virt.begin());v!=virt.end();++v) { |
|
|
|
|
std::string nstr = v.key(); |
|
|
|
|
if ((nstr.length() == ZT_ADDRESS_LENGTH_HEX)&&(v.value().is_object())) { |
|
|
|
|
const Address ztaddr(nstr.c_str()); |
|
|
|
|
if (ztaddr) |
|
|
|
|
_node->setRole(ztaddr.toInt(),(_jS(v.value()["role"],"") == "upstream") ? ZT_PEER_ROLE_UPSTREAM : ZT_PEER_ROLE_LEAF); |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
@ -806,7 +916,7 @@ public:
|
|
|
|
|
|
|
|
|
|
Mutex::Lock _l(_termReason_m); |
|
|
|
|
_termReason = ONE_UNRECOVERABLE_ERROR; |
|
|
|
|
_fatalErrorMessage = "Cluster: can't determine my cluster member ID: able to bind more than one cluster message socket IP/port!"; |
|
|
|
|
_fatalErrorMessage = "cluster: can't determine my cluster member ID: able to bind more than one cluster message socket IP/port!"; |
|
|
|
|
return _termReason; |
|
|
|
|
} |
|
|
|
|
_clusterMessageSocket = cs; |
|
|
|
|
@ -817,7 +927,7 @@ public:
|
|
|
|
|
if (!_clusterMessageSocket) { |
|
|
|
|
Mutex::Lock _l(_termReason_m); |
|
|
|
|
_termReason = ONE_UNRECOVERABLE_ERROR; |
|
|
|
|
_fatalErrorMessage = "Cluster: can't determine my cluster member ID: unable to bind to any cluster message socket IP/port."; |
|
|
|
|
_fatalErrorMessage = "cluster: can't determine my cluster member ID: unable to bind to any cluster message socket IP/port."; |
|
|
|
|
return _termReason; |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|