You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
380 lines
11 KiB
380 lines
11 KiB
/* |
|
* ZeroTier One - Network Virtualization Everywhere |
|
* Copyright (C) 2011-2015 ZeroTier, Inc. |
|
* |
|
* This program is free software: you can redistribute it and/or modify |
|
* it under the terms of the GNU General Public License as published by |
|
* the Free Software Foundation, either version 3 of the License, or |
|
* (at your option) any later version. |
|
* |
|
* This program is distributed in the hope that it will be useful, |
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
* GNU General Public License for more details. |
|
* |
|
* You should have received a copy of the GNU General Public License |
|
* along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
* |
|
* -- |
|
* |
|
* ZeroTier may be used and distributed under the terms of the GPLv3, which |
|
* are available at: http://www.gnu.org/licenses/gpl-3.0.html |
|
* |
|
* If you would like to embed ZeroTier into a commercial application or |
|
* redistribute it in a modified binary form, please contact ZeroTier Networks |
|
* LLC. Start here: http://www.zerotier.com/ |
|
*/ |
|
|
|
#ifndef ZT_NETWORK_HPP |
|
#define ZT_NETWORK_HPP |
|
|
|
#include <stdint.h> |
|
|
|
#include "../include/ZeroTierOne.h" |
|
|
|
#include <string> |
|
#include <map> |
|
#include <vector> |
|
#include <algorithm> |
|
#include <stdexcept> |
|
|
|
#include "Constants.hpp" |
|
#include "NonCopyable.hpp" |
|
#include "Hashtable.hpp" |
|
#include "Address.hpp" |
|
#include "Mutex.hpp" |
|
#include "SharedPtr.hpp" |
|
#include "AtomicCounter.hpp" |
|
#include "MulticastGroup.hpp" |
|
#include "MAC.hpp" |
|
#include "Dictionary.hpp" |
|
#include "Multicaster.hpp" |
|
#include "NetworkConfig.hpp" |
|
#include "CertificateOfMembership.hpp" |
|
|
|
namespace ZeroTier { |
|
|
|
class RuntimeEnvironment; |
|
class Peer; |
|
class _GetPeersThatNeedMulticastAnnouncement; |
|
|
|
/** |
|
* A virtual LAN |
|
*/ |
|
class Network : NonCopyable |
|
{ |
|
friend class SharedPtr<Network>; |
|
friend class _GetPeersThatNeedMulticastAnnouncement; // internal function object |
|
|
|
public: |
|
/** |
|
* Broadcast multicast group: ff:ff:ff:ff:ff:ff / 0 |
|
*/ |
|
static const MulticastGroup BROADCAST; |
|
|
|
/** |
|
* Construct a new network |
|
* |
|
* Note that init() should be called immediately after the network is |
|
* constructed to actually configure the port. |
|
* |
|
* @param renv Runtime environment |
|
* @param nwid Network ID |
|
*/ |
|
Network(const RuntimeEnvironment *renv,uint64_t nwid); |
|
|
|
~Network(); |
|
|
|
/** |
|
* @return Network ID |
|
*/ |
|
inline uint64_t id() const throw() { return _id; } |
|
|
|
/** |
|
* @return Address of network's controller (most significant 40 bits of ID) |
|
*/ |
|
inline Address controller() const throw() { return Address(_id >> 24); } |
|
|
|
/** |
|
* @param nwid Network ID |
|
* @return Address of network's controller |
|
*/ |
|
static inline Address controllerFor(uint64_t nwid) throw() { return Address(nwid >> 24); } |
|
|
|
/** |
|
* @return Multicast group memberships for this network's port (local, not learned via bridging) |
|
*/ |
|
inline std::vector<MulticastGroup> multicastGroups() const |
|
{ |
|
Mutex::Lock _l(_lock); |
|
return _myMulticastGroups; |
|
} |
|
|
|
/** |
|
* @return All multicast groups including learned groups that are behind any bridges we're attached to |
|
*/ |
|
inline std::vector<MulticastGroup> allMulticastGroups() const |
|
{ |
|
Mutex::Lock _l(_lock); |
|
return _allMulticastGroups(); |
|
} |
|
|
|
/** |
|
* @param mg Multicast group |
|
* @param includeBridgedGroups If true, also include any groups we've learned via bridging |
|
* @return True if this network endpoint / peer is a member |
|
*/ |
|
bool subscribedToMulticastGroup(const MulticastGroup &mg,bool includeBridgedGroups) const; |
|
|
|
/** |
|
* Subscribe to a multicast group |
|
* |
|
* @param mg New multicast group |
|
*/ |
|
void multicastSubscribe(const MulticastGroup &mg); |
|
|
|
/** |
|
* Unsubscribe from a multicast group |
|
* |
|
* @param mg Multicast group |
|
*/ |
|
void multicastUnsubscribe(const MulticastGroup &mg); |
|
|
|
/** |
|
* Announce multicast groups to a peer if that peer is authorized on this network |
|
* |
|
* @param peer Peer to try to announce multicast groups to |
|
* @return True if peer was authorized and groups were announced |
|
*/ |
|
bool tryAnnounceMulticastGroupsTo(const SharedPtr<Peer> &peer); |
|
|
|
/** |
|
* Apply a NetworkConfig to this network |
|
* |
|
* @param conf Configuration in NetworkConfig form |
|
* @return True if configuration was accepted |
|
*/ |
|
bool applyConfiguration(const SharedPtr<NetworkConfig> &conf); |
|
|
|
/** |
|
* Set or update this network's configuration |
|
* |
|
* This decodes a network configuration in key=value dictionary form, |
|
* applies it if valid, and persists it to disk if saveToDisk is true. |
|
* |
|
* @param conf Configuration in key/value dictionary form |
|
* @param saveToDisk IF true (default), write config to disk |
|
* @return 0 -- rejected, 1 -- accepted but not new, 2 -- accepted new config |
|
*/ |
|
int setConfiguration(const Dictionary &conf,bool saveToDisk = true); |
|
|
|
/** |
|
* Set netconf failure to 'access denied' -- called in IncomingPacket when controller reports this |
|
*/ |
|
inline void setAccessDenied() |
|
{ |
|
Mutex::Lock _l(_lock); |
|
_netconfFailure = NETCONF_FAILURE_ACCESS_DENIED; |
|
} |
|
|
|
/** |
|
* Set netconf failure to 'not found' -- called by PacketDecider when controller reports this |
|
*/ |
|
inline void setNotFound() |
|
{ |
|
Mutex::Lock _l(_lock); |
|
_netconfFailure = NETCONF_FAILURE_NOT_FOUND; |
|
} |
|
|
|
/** |
|
* Causes this network to request an updated configuration from its master node now |
|
*/ |
|
void requestConfiguration(); |
|
|
|
/** |
|
* @param peer Peer to check |
|
* @return True if peer is allowed to communicate on this network |
|
*/ |
|
inline bool isAllowed(const SharedPtr<Peer> &peer) const |
|
{ |
|
Mutex::Lock _l(_lock); |
|
return _isAllowed(peer); |
|
} |
|
|
|
/** |
|
* Perform cleanup and possibly save state |
|
*/ |
|
void clean(); |
|
|
|
/** |
|
* @return Time of last updated configuration or 0 if none |
|
*/ |
|
inline uint64_t lastConfigUpdate() const throw() { return _lastConfigUpdate; } |
|
|
|
/** |
|
* @return Status of this network |
|
*/ |
|
inline ZT_VirtualNetworkStatus status() const |
|
{ |
|
Mutex::Lock _l(_lock); |
|
return _status(); |
|
} |
|
|
|
/** |
|
* @param ec Buffer to fill with externally-visible network configuration |
|
*/ |
|
inline void externalConfig(ZT_VirtualNetworkConfig *ec) const |
|
{ |
|
Mutex::Lock _l(_lock); |
|
_externalConfig(ec); |
|
} |
|
|
|
/** |
|
* Get current network config or throw exception |
|
* |
|
* This version never returns null. Instead it throws a runtime error if |
|
* there is no current configuration. Callers should check isUp() first or |
|
* use config2() to get with the potential for null. |
|
* |
|
* Since it never returns null, it's safe to config()->whatever() inside |
|
* a try/catch block. |
|
* |
|
* @return Network configuration (never null) |
|
* @throws std::runtime_error Network configuration unavailable |
|
*/ |
|
inline SharedPtr<NetworkConfig> config() const |
|
{ |
|
Mutex::Lock _l(_lock); |
|
if (_config) |
|
return _config; |
|
throw std::runtime_error("no configuration"); |
|
} |
|
|
|
/** |
|
* Get current network config or return NULL |
|
* |
|
* @return Network configuration -- may be NULL |
|
*/ |
|
inline SharedPtr<NetworkConfig> config2() const |
|
throw() |
|
{ |
|
Mutex::Lock _l(_lock); |
|
return _config; |
|
} |
|
|
|
/** |
|
* @return Ethernet MAC address for this network's local interface |
|
*/ |
|
inline const MAC &mac() const throw() { return _mac; } |
|
|
|
/** |
|
* Shortcut for config()->permitsBridging(), returns false if no config |
|
* |
|
* @param peer Peer address to check |
|
* @return True if peer can bridge other Ethernet nodes into this network or network is in permissive bridging mode |
|
*/ |
|
inline bool permitsBridging(const Address &peer) const |
|
{ |
|
Mutex::Lock _l(_lock); |
|
if (_config) |
|
return _config->permitsBridging(peer); |
|
return false; |
|
} |
|
|
|
/** |
|
* Find the node on this network that has this MAC behind it (if any) |
|
* |
|
* @param mac MAC address |
|
* @return ZeroTier address of bridge to this MAC |
|
*/ |
|
inline Address findBridgeTo(const MAC &mac) const |
|
{ |
|
Mutex::Lock _l(_lock); |
|
const Address *const br = _remoteBridgeRoutes.get(mac); |
|
if (br) |
|
return *br; |
|
return Address(); |
|
} |
|
|
|
/** |
|
* Set a bridge route |
|
* |
|
* @param mac MAC address of destination |
|
* @param addr Bridge this MAC is reachable behind |
|
*/ |
|
void learnBridgeRoute(const MAC &mac,const Address &addr); |
|
|
|
/** |
|
* Learn a multicast group that is bridged to our tap device |
|
* |
|
* @param mg Multicast group |
|
* @param now Current time |
|
*/ |
|
void learnBridgedMulticastGroup(const MulticastGroup &mg,uint64_t now); |
|
|
|
/** |
|
* @return True if traffic on this network's tap is enabled |
|
*/ |
|
inline bool enabled() const throw() { return _enabled; } |
|
|
|
/** |
|
* @param enabled Should traffic be allowed on this network? |
|
*/ |
|
void setEnabled(bool enabled); |
|
|
|
/** |
|
* Destroy this network |
|
* |
|
* This causes the network to disable itself, destroy its tap device, and on |
|
* delete to delete all trace of itself on disk and remove any persistent tap |
|
* device instances. Call this when a network is being removed from the system. |
|
*/ |
|
void destroy(); |
|
|
|
inline bool operator==(const Network &n) const throw() { return (_id == n._id); } |
|
inline bool operator!=(const Network &n) const throw() { return (_id != n._id); } |
|
inline bool operator<(const Network &n) const throw() { return (_id < n._id); } |
|
inline bool operator>(const Network &n) const throw() { return (_id > n._id); } |
|
inline bool operator<=(const Network &n) const throw() { return (_id <= n._id); } |
|
inline bool operator>=(const Network &n) const throw() { return (_id >= n._id); } |
|
|
|
private: |
|
ZT_VirtualNetworkStatus _status() const; |
|
void _externalConfig(ZT_VirtualNetworkConfig *ec) const; // assumes _lock is locked |
|
bool _isAllowed(const SharedPtr<Peer> &peer) const; |
|
bool _tryAnnounceMulticastGroupsTo(const std::vector<Address> &rootAddresses,const std::vector<MulticastGroup> &allMulticastGroups,const SharedPtr<Peer> &peer,uint64_t now) const; |
|
void _announceMulticastGroups(); |
|
void _announceMulticastGroupsTo(const Address &peerAddress,const std::vector<MulticastGroup> &allMulticastGroups) const; |
|
std::vector<MulticastGroup> _allMulticastGroups() const; |
|
|
|
const RuntimeEnvironment *RR; |
|
uint64_t _id; |
|
MAC _mac; // local MAC address |
|
volatile bool _enabled; |
|
volatile bool _portInitialized; |
|
|
|
std::vector< MulticastGroup > _myMulticastGroups; // multicast groups that we belong to (according to tap) |
|
Hashtable< MulticastGroup,uint64_t > _multicastGroupsBehindMe; // multicast groups that seem to be behind us and when we last saw them (if we are a bridge) |
|
Hashtable< MAC,Address > _remoteBridgeRoutes; // remote addresses where given MACs are reachable (for tracking devices behind remote bridges) |
|
|
|
SharedPtr<NetworkConfig> _config; // Most recent network configuration, which is an immutable value-object |
|
volatile uint64_t _lastConfigUpdate; |
|
|
|
volatile bool _destroyed; |
|
|
|
enum { |
|
NETCONF_FAILURE_NONE, |
|
NETCONF_FAILURE_ACCESS_DENIED, |
|
NETCONF_FAILURE_NOT_FOUND, |
|
NETCONF_FAILURE_INIT_FAILED |
|
} _netconfFailure; |
|
volatile int _portError; // return value from port config callback |
|
|
|
Mutex _lock; |
|
|
|
AtomicCounter __refCount; |
|
}; |
|
|
|
} // naemspace ZeroTier |
|
|
|
#endif
|
|
|