You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
206 lines
6.9 KiB
206 lines
6.9 KiB
/* |
|
* ZeroTier One - Global Peer to Peer Ethernet |
|
* Copyright (C) 2012-2013 ZeroTier Networks LLC |
|
* |
|
* This program is free software: you can redistribute it and/or modify |
|
* it under the terms of the GNU General Public License as published by |
|
* the Free Software Foundation, either version 3 of the License, or |
|
* (at your option) any later version. |
|
* |
|
* This program is distributed in the hope that it will be useful, |
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
* GNU General Public License for more details. |
|
* |
|
* You should have received a copy of the GNU General Public License |
|
* along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
* |
|
* -- |
|
* |
|
* ZeroTier may be used and distributed under the terms of the GPLv3, which |
|
* are available at: http://www.gnu.org/licenses/gpl-3.0.html |
|
* |
|
* If you would like to embed ZeroTier into a commercial application or |
|
* redistribute it in a modified binary form, please contact ZeroTier Networks |
|
* LLC. Start here: http://www.zerotier.com/ |
|
*/ |
|
|
|
#include <stdio.h> |
|
#include <string.h> |
|
#include <memory> |
|
#include <string> |
|
|
|
#include <json/json.h> |
|
|
|
#include "NodeConfig.hpp" |
|
#include "RuntimeEnvironment.hpp" |
|
#include "Defaults.hpp" |
|
#include "Utils.hpp" |
|
#include "Logger.hpp" |
|
|
|
namespace ZeroTier { |
|
|
|
NodeConfig::NodeConfig(const RuntimeEnvironment *renv,const std::string &url) : |
|
_r(renv), |
|
_lastAutoconfigure(0), |
|
_lastAutoconfigureLastModified(), |
|
_url(url), |
|
_autoconfigureLock(), |
|
_networks(), |
|
_networks_m() |
|
{ |
|
} |
|
|
|
NodeConfig::~NodeConfig() |
|
{ |
|
_autoconfigureLock.lock(); // wait for any autoconfs to finish |
|
_autoconfigureLock.unlock(); |
|
} |
|
|
|
void NodeConfig::refreshConfiguration() |
|
{ |
|
_autoconfigureLock.lock(); // unlocked when handler gets called |
|
|
|
TRACE("refreshing autoconfigure URL %s (if modified since: '%s')",_url.c_str(),_lastAutoconfigureLastModified.c_str()); |
|
|
|
std::map<std::string,std::string> reqHeaders; |
|
reqHeaders["X-ZT-ID"] = _r->identity.toString(false); |
|
reqHeaders["X-ZT-OVSH"] = _r->ownershipVerificationSecretHash; |
|
if (_lastAutoconfigureLastModified.length()) |
|
reqHeaders["If-Modified-Since"] = _lastAutoconfigureLastModified; |
|
|
|
new Http::Request(Http::HTTP_METHOD_GET,_url,reqHeaders,std::string(),&NodeConfig::_CBautoconfHandler,this); |
|
} |
|
|
|
void NodeConfig::__CBautoconfHandler(const std::string &lastModified,const std::string &body) |
|
{ |
|
try { |
|
Json::Value root; |
|
Json::Reader reader; |
|
|
|
std::string dec(_r->identity.decrypt(_r->configAuthority,body.data(),body.length())); |
|
if (!dec.length()) { |
|
LOG("autoconfigure from %s failed: data did not decrypt as from config authority %s",_url.c_str(),_r->configAuthority.address().toString().c_str()); |
|
return; |
|
} |
|
TRACE("decrypted autoconf: %s",dec.c_str()); |
|
|
|
if (!reader.parse(dec,root,false)) { |
|
LOG("autoconfigure from %s failed: JSON parse error: %s",_url.c_str(),reader.getFormattedErrorMessages().c_str()); |
|
return; |
|
} |
|
|
|
if (!root.isObject()) { |
|
LOG("autoconfigure from %s failed: not a JSON object",_url.c_str()); |
|
return; |
|
} |
|
|
|
// Configure networks |
|
const Json::Value &networks = root["_networks"]; |
|
if (networks.isArray()) { |
|
Mutex::Lock _l(_networks_m); |
|
for(unsigned int ni=0;ni<networks.size();++ni) { |
|
if (networks[ni].isObject()) { |
|
const Json::Value &nwid_ = networks[ni]["id"]; |
|
uint64_t nwid = nwid_.isNumeric() ? (uint64_t)nwid_.asUInt64() : (uint64_t)strtoull(networks[ni]["id"].asString().c_str(),(char **)0,10); |
|
|
|
if (nwid) { |
|
SharedPtr<Network> nw; |
|
std::map< uint64_t,SharedPtr<Network> >::iterator nwent(_networks.find(nwid)); |
|
if (nwent != _networks.end()) |
|
nw = nwent->second; |
|
else { |
|
try { |
|
nw = SharedPtr<Network>(new Network(_r,nwid)); |
|
_networks[nwid] = nw; |
|
} catch (std::exception &exc) { |
|
LOG("unable to create network %llu: %s",nwid,exc.what()); |
|
} catch ( ... ) { |
|
LOG("unable to create network %llu: unknown exception",nwid); |
|
} |
|
} |
|
|
|
if (nw) { |
|
Mutex::Lock _l2(nw->_lock); |
|
nw->_open = networks[ni]["isOpen"].asBool(); |
|
|
|
// Ensure that TAP device has all the right IP addresses |
|
// TODO: IPv6 might work a tad differently |
|
std::set<InetAddress> allIps; |
|
const Json::Value &addresses = networks[ni]["_addresses"]; |
|
if (addresses.isArray()) { |
|
for(unsigned int ai=0;ai<addresses.size();++ai) { |
|
if (addresses[ai].isString()) { |
|
InetAddress addr(addresses[ai].asString()); |
|
if (addr) { |
|
TRACE("network %llu IP/netmask: %s",nwid,addr.toString().c_str()); |
|
allIps.insert(addr); |
|
} |
|
} |
|
} |
|
} |
|
nw->_tap.setIps(allIps); |
|
|
|
// NOTE: the _members field is optional for open networks, |
|
// since members of open nets do not need to check membership |
|
// of packet senders and mutlicasters. |
|
const Json::Value &members = networks[ni]["_members"]; |
|
nw->_members.clear(); |
|
if (members.isArray()) { |
|
for(unsigned int mi=0;mi<members.size();++mi) { |
|
std::string rawAddr(Utils::unhex(members[mi].asString())); |
|
if (rawAddr.length() == ZT_ADDRESS_LENGTH) { |
|
Address addr(rawAddr.data()); |
|
if ((addr)&&(!addr.isReserved())) { |
|
TRACE("network %llu member: %s",nwid,addr.toString().c_str()); |
|
nw->_members.insert(addr); |
|
} |
|
} |
|
} |
|
} |
|
} |
|
} else { |
|
TRACE("ignored networks[%u], 'id' field missing"); |
|
} |
|
} else { |
|
TRACE("ignored networks[%u], not a JSON object",ni); |
|
} |
|
} |
|
} |
|
|
|
_lastAutoconfigure = Utils::now(); |
|
_lastAutoconfigureLastModified = lastModified; |
|
} catch (std::exception &exc) { |
|
TRACE("exception parsing autoconf URL response: %s",exc.what()); |
|
} catch ( ... ) { |
|
TRACE("unexpected exception parsing autoconf URL response"); |
|
} |
|
} |
|
|
|
bool NodeConfig::_CBautoconfHandler(Http::Request *req,void *arg,const std::string &url,int code,const std::map<std::string,std::string> &headers,const std::string &body) |
|
{ |
|
#ifdef ZT_TRACE |
|
const RuntimeEnvironment *_r = ((NodeConfig *)arg)->_r; |
|
#endif |
|
|
|
if (code == 200) { |
|
TRACE("200 got autoconfigure response from %s: %u bytes",url.c_str(),(unsigned int)body.length()); |
|
|
|
std::map<std::string,std::string>::const_iterator lm(headers.find("Last-Modified")); |
|
if (lm != headers.end()) |
|
((NodeConfig *)arg)->__CBautoconfHandler(lm->second,body); |
|
else ((NodeConfig *)arg)->__CBautoconfHandler(std::string(),body); |
|
} else if (code == 304) { |
|
TRACE("304 autoconfigure deferred, remote URL %s not modified",url.c_str()); |
|
((NodeConfig *)arg)->_lastAutoconfigure = Utils::now(); // still considered a success |
|
} else if (code == 409) { // conflict, ID address in use by another ID |
|
TRACE("%d autoconfigure failed from %s",code,url.c_str()); |
|
} else { |
|
TRACE("%d autoconfigure failed from %s",code,url.c_str()); |
|
} |
|
|
|
((NodeConfig *)arg)->_autoconfigureLock.unlock(); |
|
return false; // causes Request to delete itself |
|
} |
|
|
|
} // namespace ZeroTier
|
|
|