You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1980 lines
59 KiB
1980 lines
59 KiB
/* |
|
* Copyright (c)2019 ZeroTier, Inc. |
|
* |
|
* Use of this software is governed by the Business Source License included |
|
* in the LICENSE.TXT file in the project's root directory. |
|
* |
|
* Change Date: 2025-01-01 |
|
* |
|
* On the date above, in accordance with the Business Source License, use |
|
* of this software will be governed by version 2.0 of the Apache License. |
|
*/ |
|
/****/ |
|
|
|
#include "PostgreSQL.hpp" |
|
|
|
#ifdef ZT_CONTROLLER_USE_LIBPQ |
|
|
|
#include "../node/Constants.hpp" |
|
#include "../node/SHA512.hpp" |
|
#include "EmbeddedNetworkController.hpp" |
|
#include "../version.h" |
|
#include "Redis.hpp" |
|
|
|
#include <libpq-fe.h> |
|
#include <sstream> |
|
#include <climits> |
|
|
|
|
|
using json = nlohmann::json; |
|
|
|
namespace { |
|
|
|
static const int DB_MINIMUM_VERSION = 5; |
|
|
|
static const char *_timestr() |
|
{ |
|
time_t t = time(0); |
|
char *ts = ctime(&t); |
|
char *p = ts; |
|
if (!p) |
|
return ""; |
|
while (*p) { |
|
if (*p == '\n') { |
|
*p = (char)0; |
|
break; |
|
} |
|
++p; |
|
} |
|
return ts; |
|
} |
|
|
|
/* |
|
std::string join(const std::vector<std::string> &elements, const char * const separator) |
|
{ |
|
switch(elements.size()) { |
|
case 0: |
|
return ""; |
|
case 1: |
|
return elements[0]; |
|
default: |
|
std::ostringstream os; |
|
std::copy(elements.begin(), elements.end()-1, std::ostream_iterator<std::string>(os, separator)); |
|
os << *elements.rbegin(); |
|
return os.str(); |
|
} |
|
} |
|
*/ |
|
|
|
} // anonymous namespace |
|
|
|
using namespace ZeroTier; |
|
|
|
using Attrs = std::vector<std::pair<std::string, std::string>>; |
|
using Item = std::pair<std::string, Attrs>; |
|
using ItemStream = std::vector<Item>; |
|
|
|
PostgreSQL::PostgreSQL(const Identity &myId, const char *path, int listenPort, RedisConfig *rc) |
|
: DB() |
|
, _myId(myId) |
|
, _myAddress(myId.address()) |
|
, _ready(0) |
|
, _connected(1) |
|
, _run(1) |
|
, _waitNoticePrinted(false) |
|
, _listenPort(listenPort) |
|
, _rc(rc) |
|
, _redis(NULL) |
|
, _cluster(NULL) |
|
{ |
|
char myAddress[64]; |
|
_myAddressStr = myId.address().toString(myAddress); |
|
_connString = std::string(path) + " application_name=controller_" + _myAddressStr; |
|
|
|
memset(_ssoPsk, 0, sizeof(_ssoPsk)); |
|
char *const ssoPskHex = getenv("ZT_SSO_PSK"); |
|
if (ssoPskHex) { |
|
// SECURITY: note that ssoPskHex will always be null-terminated if libc acatually |
|
// returns something non-NULL. If the hex encodes something shorter than 48 bytes, |
|
// it will be padded at the end with zeroes. If longer, it'll be truncated. |
|
Utils::unhex(ssoPskHex, _ssoPsk, sizeof(_ssoPsk)); |
|
} |
|
|
|
// Database Schema Version Check |
|
PGconn *conn = getPgConn(); |
|
if (PQstatus(conn) != CONNECTION_OK) { |
|
fprintf(stderr, "Bad Database Connection: %s", PQerrorMessage(conn)); |
|
exit(1); |
|
} |
|
|
|
PGresult *res = PQexec(conn, "SELECT version FROM ztc_database"); |
|
if (PQresultStatus(res) != PGRES_TUPLES_OK) { |
|
fprintf(stderr, "Error determining database version"); |
|
exit(1); |
|
} |
|
|
|
if (PQntuples(res) != 1) { |
|
fprintf(stderr, "Invalid number of db version tuples returned."); |
|
exit(1); |
|
} |
|
|
|
int dbVersion = std::stoi(PQgetvalue(res, 0, 0)); |
|
|
|
if (dbVersion < DB_MINIMUM_VERSION) { |
|
fprintf(stderr, "Central database schema version too low. This controller version requires a minimum schema version of %d. Please upgrade your Central instance", DB_MINIMUM_VERSION); |
|
exit(1); |
|
} |
|
PQclear(res); |
|
res = NULL; |
|
|
|
if (_rc != NULL) { |
|
sw::redis::ConnectionOptions opts; |
|
sw::redis::ConnectionPoolOptions poolOpts; |
|
opts.host = _rc->hostname; |
|
opts.port = _rc->port; |
|
opts.password = _rc->password; |
|
opts.db = 0; |
|
poolOpts.size = 10; |
|
if (_rc->clusterMode) { |
|
fprintf(stderr, "Using Redis in Cluster Mode\n"); |
|
_cluster = std::make_shared<sw::redis::RedisCluster>(opts, poolOpts); |
|
} else { |
|
fprintf(stderr, "Using Redis in Standalone Mode\n"); |
|
_redis = std::make_shared<sw::redis::Redis>(opts, poolOpts); |
|
} |
|
} |
|
|
|
_readyLock.lock(); |
|
|
|
fprintf(stderr, "[%s] NOTICE: %.10llx controller PostgreSQL waiting for initial data download..." ZT_EOL_S, ::_timestr(), (unsigned long long)_myAddress.toInt()); |
|
_waitNoticePrinted = true; |
|
|
|
initializeNetworks(conn); |
|
initializeMembers(conn); |
|
|
|
PQfinish(conn); |
|
conn = NULL; |
|
|
|
_heartbeatThread = std::thread(&PostgreSQL::heartbeat, this); |
|
_membersDbWatcher = std::thread(&PostgreSQL::membersDbWatcher, this); |
|
_networksDbWatcher = std::thread(&PostgreSQL::networksDbWatcher, this); |
|
for (int i = 0; i < ZT_CENTRAL_CONTROLLER_COMMIT_THREADS; ++i) { |
|
_commitThread[i] = std::thread(&PostgreSQL::commitThread, this); |
|
} |
|
_onlineNotificationThread = std::thread(&PostgreSQL::onlineNotificationThread, this); |
|
} |
|
|
|
PostgreSQL::~PostgreSQL() |
|
{ |
|
_run = 0; |
|
std::this_thread::sleep_for(std::chrono::milliseconds(100)); |
|
|
|
_heartbeatThread.join(); |
|
_membersDbWatcher.join(); |
|
_networksDbWatcher.join(); |
|
_commitQueue.stop(); |
|
for (int i = 0; i < ZT_CENTRAL_CONTROLLER_COMMIT_THREADS; ++i) { |
|
_commitThread[i].join(); |
|
} |
|
_onlineNotificationThread.join(); |
|
} |
|
|
|
|
|
bool PostgreSQL::waitForReady() |
|
{ |
|
while (_ready < 2) { |
|
_readyLock.lock(); |
|
_readyLock.unlock(); |
|
} |
|
return true; |
|
} |
|
|
|
bool PostgreSQL::isReady() |
|
{ |
|
return ((_ready == 2)&&(_connected)); |
|
} |
|
|
|
bool PostgreSQL::save(nlohmann::json &record,bool notifyListeners) |
|
{ |
|
bool modified = false; |
|
try { |
|
if (!record.is_object()) |
|
return false; |
|
const std::string objtype = record["objtype"]; |
|
if (objtype == "network") { |
|
const uint64_t nwid = OSUtils::jsonIntHex(record["id"],0ULL); |
|
if (nwid) { |
|
nlohmann::json old; |
|
get(nwid,old); |
|
if ((!old.is_object())||(!_compareRecords(old,record))) { |
|
record["revision"] = OSUtils::jsonInt(record["revision"],0ULL) + 1ULL; |
|
_commitQueue.post(std::pair<nlohmann::json,bool>(record,notifyListeners)); |
|
modified = true; |
|
} |
|
} |
|
} else if (objtype == "member") { |
|
const uint64_t nwid = OSUtils::jsonIntHex(record["nwid"],0ULL); |
|
const uint64_t id = OSUtils::jsonIntHex(record["id"],0ULL); |
|
if ((id)&&(nwid)) { |
|
nlohmann::json network,old; |
|
get(nwid,network,id,old); |
|
if ((!old.is_object())||(!_compareRecords(old,record))) { |
|
record["revision"] = OSUtils::jsonInt(record["revision"],0ULL) + 1ULL; |
|
_commitQueue.post(std::pair<nlohmann::json,bool>(record,notifyListeners)); |
|
modified = true; |
|
} |
|
} |
|
} |
|
} catch (std::exception &e) { |
|
fprintf(stderr, "Error on PostgreSQL::save: %s\n", e.what()); |
|
} catch (...) { |
|
fprintf(stderr, "Unknown error on PostgreSQL::save\n"); |
|
} |
|
return modified; |
|
} |
|
|
|
void PostgreSQL::eraseNetwork(const uint64_t networkId) |
|
{ |
|
char tmp2[24]; |
|
waitForReady(); |
|
Utils::hex(networkId, tmp2); |
|
std::pair<nlohmann::json,bool> tmp; |
|
tmp.first["id"] = tmp2; |
|
tmp.first["objtype"] = "_delete_network"; |
|
tmp.second = true; |
|
_commitQueue.post(tmp); |
|
nlohmann::json nullJson; |
|
_networkChanged(tmp.first, nullJson, true); |
|
} |
|
|
|
void PostgreSQL::eraseMember(const uint64_t networkId, const uint64_t memberId) |
|
{ |
|
char tmp2[24]; |
|
waitForReady(); |
|
std::pair<nlohmann::json,bool> tmp, nw; |
|
Utils::hex(networkId, tmp2); |
|
tmp.first["nwid"] = tmp2; |
|
Utils::hex(memberId, tmp2); |
|
tmp.first["id"] = tmp2; |
|
tmp.first["objtype"] = "_delete_member"; |
|
tmp.second = true; |
|
_commitQueue.post(tmp); |
|
nlohmann::json nullJson; |
|
_memberChanged(tmp.first, nullJson, true); |
|
} |
|
|
|
void PostgreSQL::nodeIsOnline(const uint64_t networkId, const uint64_t memberId, const InetAddress &physicalAddress) |
|
{ |
|
std::lock_guard<std::mutex> l(_lastOnline_l); |
|
std::pair<int64_t, InetAddress> &i = _lastOnline[std::pair<uint64_t,uint64_t>(networkId, memberId)]; |
|
i.first = OSUtils::now(); |
|
if (physicalAddress) { |
|
i.second = physicalAddress; |
|
} |
|
} |
|
|
|
void PostgreSQL::updateMemberOnLoad(const uint64_t networkId, const uint64_t memberId, nlohmann::json &member) |
|
{ |
|
const uint64_t nwid = OSUtils::jsonIntHex(member["nwid"],0ULL); |
|
const uint64_t id = OSUtils::jsonIntHex(member["id"],0ULL); |
|
char nwids[24],ids[24]; |
|
OSUtils::ztsnprintf(nwids, sizeof(nwids), "%.16llx", nwid); |
|
OSUtils::ztsnprintf(ids, sizeof(ids), "%.10llx", id); |
|
|
|
bool have_auth = false; |
|
try { |
|
PGconn *conn = getPgConn(); |
|
if (PQstatus(conn) != CONNECTION_OK) { |
|
fprintf(stderr, "Bad Database Connection: %s", PQerrorMessage(conn)); |
|
exit(1); |
|
} |
|
|
|
const char *params[1] = { nwids }; |
|
PGresult *res = PQexecParams(conn, "SELECT org.client_id, org.authorization_endpoint " |
|
"FROM ztc_network AS nw, ztc_org AS org " |
|
"WHERE nw.id = $1 AND nw.sso_enabled = true AND org.owner_id = nw.owner_id", |
|
1, |
|
NULL, |
|
params, |
|
NULL, |
|
NULL, |
|
0); |
|
if (PQresultStatus(res) != PGRES_TUPLES_OK) { |
|
fprintf(stderr, "Org client_id and authorization_endpoint lookup failed: %s", PQerrorMessage(conn)); |
|
PQclear(res); |
|
exit(1); |
|
} |
|
|
|
if (PQntuples(res) >= 1) { |
|
std::string client_id = PQgetvalue(res, 0, 0); |
|
std::string authorization_endpoint = PQgetvalue(res, 0, 1); |
|
PQclear(res); |
|
if ((!client_id.empty())&&(!authorization_endpoint.empty())) { |
|
const char *params2[2] = { nwids, ids }; |
|
res = PQexecParams(conn, "SELECT e.nonce, e.authentication_expiry_time " |
|
"FROM ztc_sso_expiry AS e " |
|
"WHERE e.network_id = $1 AND e.member_id = $2 " |
|
"ORDER BY n.authentication_expiry_time DESC LIMIT 1", |
|
1, |
|
NULL, |
|
params2, |
|
NULL, |
|
NULL, |
|
0); |
|
if (PQntuples(res) >= 1) { |
|
std::string nonce = PQgetvalue(res, 0, 0); |
|
int64_t authentication_expiry_time = std::stoll(PQgetvalue(res, 0, 1)); |
|
if ((authentication_expiry_time >= 0)&&(!nonce.empty())) { |
|
have_auth = true; |
|
|
|
uint8_t state[48]; |
|
HMACSHA384(_ssoPsk, nonce.data(), (unsigned int)nonce.length(), state); |
|
char state_hex[256]; |
|
Utils::hex(state, 48, state_hex); |
|
char authenticationURL[4096]; |
|
const char *redirect_url = "redirect_uri=http%3A%2F%2Fmy.zerotier.com%2Fapi%2Fnetwork%2Fsso-auth"; // TODO: this should be configurable |
|
OSUtils::ztsnprintf(authenticationURL, sizeof(authenticationURL), |
|
"%s?response_type=id_token&response_mode=form_post&scope=openid+email+profile&redriect_uri=%s&nonce=%s&state=%s&client_id=%s", |
|
authorization_endpoint.c_str(), |
|
redirect_url, |
|
nonce.c_str(), |
|
state_hex, // NOTE: should these be URL escaped? Don't think there's a risk as they are not user definable. |
|
client_id.c_str()); |
|
|
|
member["authenticationExpiryTime"] = authentication_expiry_time; |
|
member["authenticationURL"] = authenticationURL; |
|
} |
|
} |
|
PQclear(res); |
|
} |
|
} else { |
|
PQclear(res); |
|
} |
|
|
|
} catch (sw::redis::Error &e) { |
|
fprintf(stderr, "ERROR: Error updating member on load, in Redis: %s\n", e.what()); |
|
exit(-1); |
|
} catch (std::exception &e) { |
|
fprintf(stderr, "ERROR: Error updating member on load: %s\n", e.what()); |
|
exit(-1); |
|
} |
|
} |
|
|
|
void PostgreSQL::initializeNetworks(PGconn *conn) |
|
{ |
|
try { |
|
if (PQstatus(conn) != CONNECTION_OK) { |
|
fprintf(stderr, "Bad Database Connection: %s", PQerrorMessage(conn)); |
|
exit(1); |
|
} |
|
|
|
std::string setKey = "networks:{" + _myAddressStr + "}"; |
|
|
|
// if (_rc != NULL) { |
|
// try { |
|
// if (_rc->clusterMode) { |
|
// _cluster->del(setKey); |
|
// } else { |
|
// _redis->del(setKey); |
|
// } |
|
// } catch (sw::redis::Error &e) { |
|
// // del can throw an error if the key doesn't exist |
|
// // swallow it and move along |
|
// } |
|
// } |
|
|
|
std::unordered_set<std::string> networkSet; |
|
|
|
const char *params[1] = { |
|
_myAddressStr.c_str() |
|
}; |
|
|
|
fprintf(stderr, "Initializing Networks...\n"); |
|
|
|
PGresult *res = PQexecParams(conn, "SELECT id, EXTRACT(EPOCH FROM creation_time AT TIME ZONE 'UTC')*1000, capabilities, " |
|
"enable_broadcast, EXTRACT(EPOCH FROM last_modified AT TIME ZONE 'UTC')*1000, mtu, multicast_limit, name, private, remote_trace_level, " |
|
"remote_trace_target, revision, rules, tags, v4_assign_mode, v6_assign_mode FROM ztc_network " |
|
"WHERE deleted = false AND controller_id = $1", |
|
1, |
|
NULL, |
|
params, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(res) != PGRES_TUPLES_OK) { |
|
fprintf(stderr, "Networks Initialization Failed: %s", PQerrorMessage(conn)); |
|
PQclear(res); |
|
exit(1); |
|
} |
|
|
|
int numRows = PQntuples(res); |
|
for (int i = 0; i < numRows; ++i) { |
|
json empty; |
|
json config; |
|
|
|
const char *nwidparam[1] = { |
|
PQgetvalue(res, i, 0) |
|
}; |
|
std::string nwid = PQgetvalue(res, i, 0); |
|
|
|
networkSet.insert(nwid); |
|
|
|
config["id"] = nwid; |
|
config["nwid"] = nwid; |
|
try { |
|
config["creationTime"] = std::stoull(PQgetvalue(res, i, 1)); |
|
} catch (std::exception &e) { |
|
config["creationTime"] = 0ULL; |
|
//fprintf(stderr, "Error converting creation time: %s\n", PQgetvalue(res, i, 1)); |
|
} |
|
config["capabilities"] = json::parse(PQgetvalue(res, i, 2)); |
|
config["enableBroadcast"] = (strcmp(PQgetvalue(res, i, 3),"t")==0); |
|
try { |
|
config["lastModified"] = std::stoull(PQgetvalue(res, i, 4)); |
|
} catch (std::exception &e) { |
|
config["lastModified"] = 0ULL; |
|
//fprintf(stderr, "Error converting last modified: %s\n", PQgetvalue(res, i, 4)); |
|
} |
|
try { |
|
config["mtu"] = std::stoi(PQgetvalue(res, i, 5)); |
|
} catch (std::exception &e) { |
|
config["mtu"] = 2800; |
|
} |
|
try { |
|
config["multicastLimit"] = std::stoi(PQgetvalue(res, i, 6)); |
|
} catch (std::exception &e) { |
|
config["multicastLimit"] = 64; |
|
} |
|
config["name"] = PQgetvalue(res, i, 7); |
|
config["private"] = (strcmp(PQgetvalue(res, i, 8),"t")==0); |
|
try { |
|
config["remoteTraceLevel"] = std::stoi(PQgetvalue(res, i, 9)); |
|
} catch (std::exception &e) { |
|
config["remoteTraceLevel"] = 0; |
|
} |
|
config["remoteTraceTarget"] = PQgetvalue(res, i, 10); |
|
try { |
|
config["revision"] = std::stoull(PQgetvalue(res, i, 11)); |
|
} catch (std::exception &e) { |
|
config["revision"] = 0ULL; |
|
//fprintf(stderr, "Error converting revision: %s\n", PQgetvalue(res, i, 11)); |
|
} |
|
config["rules"] = json::parse(PQgetvalue(res, i, 12)); |
|
config["tags"] = json::parse(PQgetvalue(res, i, 13)); |
|
config["v4AssignMode"] = json::parse(PQgetvalue(res, i, 14)); |
|
config["v6AssignMode"] = json::parse(PQgetvalue(res, i, 15)); |
|
config["objtype"] = "network"; |
|
config["ipAssignmentPools"] = json::array(); |
|
config["routes"] = json::array(); |
|
|
|
PGresult *r2 = PQexecParams(conn, |
|
"SELECT host(ip_range_start), host(ip_range_end) FROM ztc_network_assignment_pool WHERE network_id = $1", |
|
1, |
|
NULL, |
|
nwidparam, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(r2) != PGRES_TUPLES_OK) { |
|
fprintf(stderr, "ERROR: Error retreiving IP pools for network: %s\n", PQresultErrorMessage(r2)); |
|
PQclear(r2); |
|
PQclear(res); |
|
exit(1); |
|
} |
|
|
|
int n = PQntuples(r2); |
|
for (int j = 0; j < n; ++j) { |
|
json ip; |
|
ip["ipRangeStart"] = PQgetvalue(r2, j, 0); |
|
ip["ipRangeEnd"] = PQgetvalue(r2, j, 1); |
|
|
|
config["ipAssignmentPools"].push_back(ip); |
|
} |
|
|
|
PQclear(r2); |
|
|
|
r2 = PQexecParams(conn, |
|
"SELECT host(address), bits, host(via) FROM ztc_network_route WHERE network_id = $1", |
|
1, |
|
NULL, |
|
nwidparam, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(r2) != PGRES_TUPLES_OK) { |
|
fprintf(stderr, "ERROR: Error retreiving routes for network: %s\n", PQresultErrorMessage(r2)); |
|
PQclear(r2); |
|
PQclear(res); |
|
exit(1); |
|
} |
|
|
|
n = PQntuples(r2); |
|
for (int j = 0; j < n; ++j) { |
|
std::string addr = PQgetvalue(r2, j, 0); |
|
std::string bits = PQgetvalue(r2, j, 1); |
|
std::string via = PQgetvalue(r2, j, 2); |
|
json route; |
|
route["target"] = addr + "/" + bits; |
|
|
|
if (via == "NULL") { |
|
route["via"] = nullptr; |
|
} else { |
|
route["via"] = via; |
|
} |
|
config["routes"].push_back(route); |
|
} |
|
|
|
r2 = PQexecParams(conn, |
|
"SELECT domain, servers FROM ztc_network_dns WHERE network_id = $1", |
|
1, |
|
NULL, |
|
nwidparam, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(r2) != PGRES_TUPLES_OK) { |
|
fprintf(stderr, "ERROR: Error retrieving DNS settings for network: %s\n", PQresultErrorMessage(r2)); |
|
PQclear(r2); |
|
PQclear(res); |
|
exit(1); |
|
} |
|
|
|
n = PQntuples(r2); |
|
if (n > 1) { |
|
fprintf(stderr, "ERROR: invalid number of DNS configurations for network %s. Must be 0 or 1\n", nwid.c_str()); |
|
} else if (n == 1) { |
|
json obj; |
|
std::string domain = PQgetvalue(r2, 0, 0); |
|
std::string serverList = PQgetvalue(r2, 0, 1); |
|
auto servers = json::array(); |
|
if (serverList.rfind("{",0) != std::string::npos) { |
|
serverList = serverList.substr(1, serverList.size()-2); |
|
std::stringstream ss(serverList); |
|
while(ss.good()) { |
|
std::string server; |
|
std::getline(ss, server, ','); |
|
servers.push_back(server); |
|
} |
|
} |
|
obj["domain"] = domain; |
|
obj["servers"] = servers; |
|
config["dns"] = obj; |
|
} |
|
|
|
PQclear(r2); |
|
|
|
_networkChanged(empty, config, false); |
|
} |
|
|
|
PQclear(res); |
|
|
|
// if(!networkSet.empty()) { |
|
// if (_rc && _rc->clusterMode) { |
|
// auto tx = _cluster->transaction(_myAddressStr, true); |
|
// tx.sadd(setKey, networkSet.begin(), networkSet.end()); |
|
// tx.exec(); |
|
// } else if (_rc && !_rc->clusterMode) { |
|
// auto tx = _redis->transaction(true); |
|
// tx.sadd(setKey, networkSet.begin(), networkSet.end()); |
|
// tx.exec(); |
|
// } |
|
// } |
|
|
|
if (++this->_ready == 2) { |
|
if (_waitNoticePrinted) { |
|
fprintf(stderr,"[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt()); |
|
} |
|
_readyLock.unlock(); |
|
} |
|
} catch (sw::redis::Error &e) { |
|
fprintf(stderr, "ERROR: Error initializing networks in Redis: %s\n", e.what()); |
|
exit(-1); |
|
} catch (std::exception &e) { |
|
fprintf(stderr, "ERROR: Error initializing networks: %s\n", e.what()); |
|
exit(-1); |
|
} |
|
} |
|
|
|
void PostgreSQL::initializeMembers(PGconn *conn) |
|
{ |
|
try { |
|
if (PQstatus(conn) != CONNECTION_OK) { |
|
fprintf(stderr, "Bad Database Connection: %s", PQerrorMessage(conn)); |
|
exit(1); |
|
} |
|
// std::string setKeyBase = "network-nodes-all:{" + _myAddressStr + "}:"; |
|
|
|
// if (_rc != NULL) { |
|
// std::lock_guard<std::mutex> l(_networks_l); |
|
// std::unordered_set<std::string> deletes; |
|
// for ( auto it : _networks) { |
|
// uint64_t nwid_i = it.first; |
|
// char nwidTmp[64] = {0}; |
|
// OSUtils::ztsnprintf(nwidTmp, sizeof(nwidTmp), "%.16llx", nwid_i); |
|
// std::string nwid(nwidTmp); |
|
// std::string key = setKeyBase + nwid; |
|
// deletes.insert(key); |
|
// } |
|
|
|
// if (!deletes.empty()) { |
|
// if (_rc->clusterMode) { |
|
// auto tx = _cluster->transaction(_myAddressStr, true); |
|
// for (std::string k : deletes) { |
|
// tx.del(k); |
|
// } |
|
// tx.exec(); |
|
// } else { |
|
// auto tx = _redis->transaction(true); |
|
// for (std::string k : deletes) { |
|
// tx.del(k); |
|
// } |
|
// tx.exec(); |
|
// } |
|
// } |
|
// } |
|
|
|
const char *params[1] = { |
|
_myAddressStr.c_str() |
|
}; |
|
|
|
std::unordered_map<std::string, std::string> networkMembers; |
|
|
|
fprintf(stderr, "Initializing Members...\n"); |
|
PGresult *res = PQexecParams(conn, |
|
"SELECT m.id, m.network_id, m.active_bridge, m.authorized, m.capabilities, EXTRACT(EPOCH FROM m.creation_time AT TIME ZONE 'UTC')*1000, m.identity, " |
|
" EXTRACT(EPOCH FROM m.last_authorized_time AT TIME ZONE 'UTC')*1000, " |
|
" EXTRACT(EPOCH FROM m.last_deauthorized_time AT TIME ZONE 'UTC')*1000, " |
|
" m.remote_trace_level, m.remote_trace_target, m.tags, m.v_major, m.v_minor, m.v_rev, m.v_proto, " |
|
" m.no_auto_assign_ips, m.revision " |
|
"FROM ztc_member m " |
|
"INNER JOIN ztc_network n " |
|
" ON n.id = m.network_id " |
|
"WHERE n.controller_id = $1 AND m.deleted = false", |
|
1, |
|
NULL, |
|
params, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(res) != PGRES_TUPLES_OK) { |
|
fprintf(stderr, "Member Initialization Failed: %s", PQerrorMessage(conn)); |
|
PQclear(res); |
|
exit(1); |
|
} |
|
|
|
int numRows = PQntuples(res); |
|
for (int i = 0; i < numRows; ++i) { |
|
json empty; |
|
json config; |
|
|
|
std::string memberId(PQgetvalue(res, i, 0)); |
|
std::string networkId(PQgetvalue(res, i, 1)); |
|
|
|
// networkMembers.insert(std::pair<std::string, std::string>(setKeyBase+networkId, memberId)); |
|
|
|
std::string ctime = PQgetvalue(res, i, 5); |
|
config["id"] = memberId; |
|
config["nwid"] = networkId; |
|
config["activeBridge"] = (strcmp(PQgetvalue(res, i, 2), "t") == 0); |
|
config["authorized"] = (strcmp(PQgetvalue(res, i, 3), "t") == 0); |
|
try { |
|
config["capabilities"] = json::parse(PQgetvalue(res, i, 4)); |
|
} catch (std::exception &e) { |
|
config["capabilities"] = json::array(); |
|
} |
|
try { |
|
config["creationTime"] = std::stoull(PQgetvalue(res, i, 5)); |
|
} catch (std::exception &e) { |
|
config["creationTime"] = 0ULL; |
|
//fprintf(stderr, "Error upding creation time (member): %s\n", PQgetvalue(res, i, 5)); |
|
} |
|
config["identity"] = PQgetvalue(res, i, 6); |
|
try { |
|
config["lastAuthorizedTime"] = std::stoull(PQgetvalue(res, i, 7)); |
|
} catch(std::exception &e) { |
|
config["lastAuthorizedTime"] = 0ULL; |
|
//fprintf(stderr, "Error updating last auth time (member): %s\n", PQgetvalue(res, i, 7)); |
|
} |
|
try { |
|
config["lastDeauthorizedTime"] = std::stoull(PQgetvalue(res, i, 8)); |
|
} catch( std::exception &e) { |
|
config["lastDeauthorizedTime"] = 0ULL; |
|
//fprintf(stderr, "Error updating last deauth time (member): %s\n", PQgetvalue(res, i, 8)); |
|
} |
|
try { |
|
config["remoteTraceLevel"] = std::stoi(PQgetvalue(res, i, 9)); |
|
} catch (std::exception &e) { |
|
config["remoteTraceLevel"] = 0; |
|
} |
|
config["remoteTraceTarget"] = PQgetvalue(res, i, 10); |
|
try { |
|
config["tags"] = json::parse(PQgetvalue(res, i, 11)); |
|
} catch (std::exception &e) { |
|
config["tags"] = json::array(); |
|
} |
|
try { |
|
config["vMajor"] = std::stoi(PQgetvalue(res, i, 12)); |
|
} catch(std::exception &e) { |
|
config["vMajor"] = -1; |
|
} |
|
try { |
|
config["vMinor"] = std::stoi(PQgetvalue(res, i, 13)); |
|
} catch (std::exception &e) { |
|
config["vMinor"] = -1; |
|
} |
|
try { |
|
config["vRev"] = std::stoi(PQgetvalue(res, i, 14)); |
|
} catch (std::exception &e) { |
|
config["vRev"] = -1; |
|
} |
|
try { |
|
config["vProto"] = std::stoi(PQgetvalue(res, i, 15)); |
|
} catch (std::exception &e) { |
|
config["vProto"] = -1; |
|
} |
|
config["noAutoAssignIps"] = (strcmp(PQgetvalue(res, i, 16), "t") == 0); |
|
try { |
|
config["revision"] = std::stoull(PQgetvalue(res, i, 17)); |
|
} catch (std::exception &e) { |
|
config["revision"] = 0ULL; |
|
//fprintf(stderr, "Error updating revision (member): %s\n", PQgetvalue(res, i, 17)); |
|
} |
|
config["objtype"] = "member"; |
|
config["ipAssignments"] = json::array(); |
|
const char *p2[2] = { |
|
memberId.c_str(), |
|
networkId.c_str() |
|
}; |
|
|
|
PGresult *r2 = PQexecParams(conn, |
|
"SELECT DISTINCT address FROM ztc_member_ip_assignment WHERE member_id = $1 AND network_id = $2", |
|
2, |
|
NULL, |
|
p2, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(r2) != PGRES_TUPLES_OK) { |
|
fprintf(stderr, "Member Initialization Failed: %s", PQerrorMessage(conn)); |
|
PQclear(r2); |
|
PQclear(res); |
|
exit(1); |
|
} |
|
|
|
int n = PQntuples(r2); |
|
for (int j = 0; j < n; ++j) { |
|
std::string ipaddr = PQgetvalue(r2, j, 0); |
|
std::size_t pos = ipaddr.find('/'); |
|
if (pos != std::string::npos) { |
|
ipaddr = ipaddr.substr(0, pos); |
|
} |
|
config["ipAssignments"].push_back(ipaddr); |
|
} |
|
|
|
_memberChanged(empty, config, false); |
|
} |
|
|
|
PQclear(res); |
|
|
|
// if (!networkMembers.empty()) { |
|
// if (_rc != NULL) { |
|
// if (_rc->clusterMode) { |
|
// auto tx = _cluster->transaction(_myAddressStr, true); |
|
// for (auto it : networkMembers) { |
|
// tx.sadd(it.first, it.second); |
|
// } |
|
// tx.exec(); |
|
// } else { |
|
// auto tx = _redis->transaction(true); |
|
// for (auto it : networkMembers) { |
|
// tx.sadd(it.first, it.second); |
|
// } |
|
// tx.exec(); |
|
// } |
|
// } |
|
// } |
|
if (++this->_ready == 2) { |
|
if (_waitNoticePrinted) { |
|
fprintf(stderr,"[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt()); |
|
} |
|
_readyLock.unlock(); |
|
} |
|
} catch (sw::redis::Error &e) { |
|
fprintf(stderr, "ERROR: Error initializing members (redis): %s\n", e.what()); |
|
} catch (std::exception &e) { |
|
fprintf(stderr, "ERROR: Error initializing members: %s\n", e.what()); |
|
exit(-1); |
|
} |
|
} |
|
|
|
void PostgreSQL::heartbeat() |
|
{ |
|
char publicId[1024]; |
|
char hostnameTmp[1024]; |
|
_myId.toString(false,publicId); |
|
if (gethostname(hostnameTmp, sizeof(hostnameTmp))!= 0) { |
|
hostnameTmp[0] = (char)0; |
|
} else { |
|
for (int i = 0; i < (int)sizeof(hostnameTmp); ++i) { |
|
if ((hostnameTmp[i] == '.')||(hostnameTmp[i] == 0)) { |
|
hostnameTmp[i] = (char)0; |
|
break; |
|
} |
|
} |
|
} |
|
const char *controllerId = _myAddressStr.c_str(); |
|
const char *publicIdentity = publicId; |
|
const char *hostname = hostnameTmp; |
|
|
|
PGconn *conn = getPgConn(); |
|
if (PQstatus(conn) == CONNECTION_BAD) { |
|
fprintf(stderr, "Connection to database failed: %s\n", PQerrorMessage(conn)); |
|
PQfinish(conn); |
|
exit(1); |
|
} |
|
while (_run == 1) { |
|
if(PQstatus(conn) != CONNECTION_OK) { |
|
fprintf(stderr, "%s heartbeat thread lost connection to Database\n", _myAddressStr.c_str()); |
|
PQfinish(conn); |
|
exit(6); |
|
} |
|
int64_t ts = OSUtils::now(); |
|
if (conn) { |
|
std::string major = std::to_string(ZEROTIER_ONE_VERSION_MAJOR); |
|
std::string minor = std::to_string(ZEROTIER_ONE_VERSION_MINOR); |
|
std::string rev = std::to_string(ZEROTIER_ONE_VERSION_REVISION); |
|
std::string build = std::to_string(ZEROTIER_ONE_VERSION_BUILD); |
|
std::string now = std::to_string(ts); |
|
std::string host_port = std::to_string(_listenPort); |
|
std::string use_redis = "false"; // (_rc != NULL) ? "true" : "false"; |
|
const char *values[10] = { |
|
controllerId, |
|
hostname, |
|
now.c_str(), |
|
publicIdentity, |
|
major.c_str(), |
|
minor.c_str(), |
|
rev.c_str(), |
|
build.c_str(), |
|
host_port.c_str(), |
|
use_redis.c_str() |
|
}; |
|
|
|
PGresult *res = PQexecParams(conn, |
|
"INSERT INTO ztc_controller (id, cluster_host, last_alive, public_identity, v_major, v_minor, v_rev, v_build, host_port, use_redis) " |
|
"VALUES ($1, $2, TO_TIMESTAMP($3::double precision/1000), $4, $5, $6, $7, $8, $9, $10) " |
|
"ON CONFLICT (id) DO UPDATE SET cluster_host = EXCLUDED.cluster_host, last_alive = EXCLUDED.last_alive, " |
|
"public_identity = EXCLUDED.public_identity, v_major = EXCLUDED.v_major, v_minor = EXCLUDED.v_minor, " |
|
"v_rev = EXCLUDED.v_rev, v_build = EXCLUDED.v_rev, host_port = EXCLUDED.host_port, " |
|
"use_redis = EXCLUDED.use_redis", |
|
10, // number of parameters |
|
NULL, // oid field. ignore |
|
values, // values for substitution |
|
NULL, // lengths in bytes of each value |
|
NULL, // binary? |
|
0); |
|
|
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "Heartbeat Update Failed: %s\n", PQresultErrorMessage(res)); |
|
} |
|
PQclear(res); |
|
} |
|
// if (_rc != NULL) { |
|
// if (_rc->clusterMode) { |
|
// _cluster->zadd("controllers", controllerId, ts); |
|
// } else { |
|
// _redis->zadd("controllers", controllerId, ts); |
|
// } |
|
// } |
|
|
|
std::this_thread::sleep_for(std::chrono::milliseconds(1000)); |
|
} |
|
|
|
PQfinish(conn); |
|
conn = NULL; |
|
fprintf(stderr, "Exited heartbeat thread\n"); |
|
} |
|
|
|
void PostgreSQL::membersDbWatcher() |
|
{ |
|
PGconn *conn = getPgConn(NO_OVERRIDE); |
|
if (PQstatus(conn) == CONNECTION_BAD) { |
|
fprintf(stderr, "Connection to database failed: %s\n", PQerrorMessage(conn)); |
|
PQfinish(conn); |
|
exit(1); |
|
} |
|
|
|
if (_rc) { |
|
PQfinish(conn); |
|
conn = NULL; |
|
_membersWatcher_Redis(); |
|
} else { |
|
_membersWatcher_Postgres(conn); |
|
PQfinish(conn); |
|
conn = NULL; |
|
} |
|
|
|
if (_run == 1) { |
|
fprintf(stderr, "ERROR: %s membersDbWatcher should still be running! Exiting Controller.\n", _myAddressStr.c_str()); |
|
exit(9); |
|
} |
|
fprintf(stderr, "Exited membersDbWatcher\n"); |
|
} |
|
|
|
void PostgreSQL::_membersWatcher_Postgres(PGconn *conn) { |
|
char buf[11] = {0}; |
|
std::string cmd = "LISTEN member_" + std::string(_myAddress.toString(buf)); |
|
fprintf(stderr, "Listening to member stream: %s\n", cmd.c_str()); |
|
PGresult *res = PQexec(conn, cmd.c_str()); |
|
if (!res || PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "LISTEN command failed: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
PQfinish(conn); |
|
exit(1); |
|
} |
|
|
|
PQclear(res); res = NULL; |
|
|
|
while(_run == 1) { |
|
if (PQstatus(conn) != CONNECTION_OK) { |
|
fprintf(stderr, "ERROR: Member Watcher lost connection to Postgres."); |
|
exit(-1); |
|
} |
|
PGnotify *notify = NULL; |
|
PQconsumeInput(conn); |
|
while ((notify = PQnotifies(conn)) != NULL) { |
|
//fprintf(stderr, "ASYNC NOTIFY of '%s' id:%s received\n", notify->relname, notify->extra); |
|
|
|
try { |
|
json tmp(json::parse(notify->extra)); |
|
json &ov = tmp["old_val"]; |
|
json &nv = tmp["new_val"]; |
|
json oldConfig, newConfig; |
|
if (ov.is_object()) oldConfig = ov; |
|
if (nv.is_object()) newConfig = nv; |
|
if (oldConfig.is_object() || newConfig.is_object()) { |
|
_memberChanged(oldConfig,newConfig,(this->_ready>=2)); |
|
} |
|
} catch (...) {} // ignore bad records |
|
|
|
free(notify); |
|
} |
|
std::this_thread::sleep_for(std::chrono::milliseconds(10)); |
|
} |
|
} |
|
|
|
void PostgreSQL::_membersWatcher_Redis() { |
|
char buf[11] = {0}; |
|
std::string key = "member-stream:{" + std::string(_myAddress.toString(buf)) + "}"; |
|
fprintf(stderr, "Listening to member stream: %s\n", key.c_str()); |
|
while (_run == 1) { |
|
try { |
|
json tmp; |
|
std::unordered_map<std::string, ItemStream> result; |
|
if (_rc->clusterMode) { |
|
_cluster->xread(key, "$", std::chrono::seconds(1), 0, std::inserter(result, result.end())); |
|
} else { |
|
_redis->xread(key, "$", std::chrono::seconds(1), 0, std::inserter(result, result.end())); |
|
} |
|
if (!result.empty()) { |
|
for (auto element : result) { |
|
#ifdef ZT_TRACE |
|
fprintf(stdout, "Received notification from: %s\n", element.first.c_str()); |
|
#endif |
|
for (auto rec : element.second) { |
|
std::string id = rec.first; |
|
auto attrs = rec.second; |
|
#ifdef ZT_TRACE |
|
fprintf(stdout, "Record ID: %s\n", id.c_str()); |
|
fprintf(stdout, "attrs len: %lu\n", attrs.size()); |
|
#endif |
|
for (auto a : attrs) { |
|
#ifdef ZT_TRACE |
|
fprintf(stdout, "key: %s\nvalue: %s\n", a.first.c_str(), a.second.c_str()); |
|
#endif |
|
try { |
|
tmp = json::parse(a.second); |
|
json &ov = tmp["old_val"]; |
|
json &nv = tmp["new_val"]; |
|
json oldConfig, newConfig; |
|
if (ov.is_object()) oldConfig = ov; |
|
if (nv.is_object()) newConfig = nv; |
|
if (oldConfig.is_object()||newConfig.is_object()) { |
|
_memberChanged(oldConfig,newConfig,(this->_ready >= 2)); |
|
} |
|
} catch (...) { |
|
fprintf(stderr, "json parse error in networkWatcher_Redis\n"); |
|
} |
|
} |
|
if (_rc->clusterMode) { |
|
_cluster->xdel(key, id); |
|
} else { |
|
_redis->xdel(key, id); |
|
} |
|
} |
|
} |
|
} |
|
} catch (sw::redis::Error &e) { |
|
fprintf(stderr, "Error in Redis members watcher: %s\n", e.what()); |
|
} |
|
} |
|
fprintf(stderr, "membersWatcher ended\n"); |
|
} |
|
|
|
void PostgreSQL::networksDbWatcher() |
|
{ |
|
PGconn *conn = getPgConn(NO_OVERRIDE); |
|
if (PQstatus(conn) == CONNECTION_BAD) { |
|
fprintf(stderr, "Connection to database failed: %s\n", PQerrorMessage(conn)); |
|
PQfinish(conn); |
|
exit(1); |
|
} |
|
|
|
if (_rc) { |
|
PQfinish(conn); |
|
conn = NULL; |
|
_networksWatcher_Redis(); |
|
} else { |
|
_networksWatcher_Postgres(conn); |
|
PQfinish(conn); |
|
conn = NULL; |
|
} |
|
|
|
if (_run == 1) { |
|
fprintf(stderr, "ERROR: %s networksDbWatcher should still be running! Exiting Controller.\n", _myAddressStr.c_str()); |
|
exit(8); |
|
} |
|
fprintf(stderr, "Exited networksDbWatcher\n"); |
|
} |
|
|
|
void PostgreSQL::_networksWatcher_Postgres(PGconn *conn) { |
|
char buf[11] = {0}; |
|
std::string cmd = "LISTEN network_" + std::string(_myAddress.toString(buf)); |
|
PGresult *res = PQexec(conn, cmd.c_str()); |
|
if (!res || PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "LISTEN command failed: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
PQfinish(conn); |
|
exit(1); |
|
} |
|
|
|
PQclear(res); res = NULL; |
|
|
|
while(_run == 1) { |
|
if (PQstatus(conn) != CONNECTION_OK) { |
|
fprintf(stderr, "ERROR: Network Watcher lost connection to Postgres."); |
|
exit(-1); |
|
} |
|
PGnotify *notify = NULL; |
|
PQconsumeInput(conn); |
|
while ((notify = PQnotifies(conn)) != NULL) { |
|
//fprintf(stderr, "ASYNC NOTIFY of '%s' id:%s received\n", notify->relname, notify->extra); |
|
try { |
|
json tmp(json::parse(notify->extra)); |
|
json &ov = tmp["old_val"]; |
|
json &nv = tmp["new_val"]; |
|
json oldConfig, newConfig; |
|
if (ov.is_object()) oldConfig = ov; |
|
if (nv.is_object()) newConfig = nv; |
|
if (oldConfig.is_object()||newConfig.is_object()) { |
|
_networkChanged(oldConfig,newConfig,(this->_ready >= 2)); |
|
} |
|
} catch (...) {} // ignore bad records |
|
free(notify); |
|
} |
|
std::this_thread::sleep_for(std::chrono::milliseconds(10)); |
|
} |
|
} |
|
|
|
void PostgreSQL::_networksWatcher_Redis() { |
|
char buf[11] = {0}; |
|
std::string key = "network-stream:{" + std::string(_myAddress.toString(buf)) + "}"; |
|
|
|
while (_run == 1) { |
|
try { |
|
json tmp; |
|
std::unordered_map<std::string, ItemStream> result; |
|
if (_rc->clusterMode) { |
|
_cluster->xread(key, "$", std::chrono::seconds(1), 0, std::inserter(result, result.end())); |
|
} else { |
|
_redis->xread(key, "$", std::chrono::seconds(1), 0, std::inserter(result, result.end())); |
|
} |
|
|
|
if (!result.empty()) { |
|
for (auto element : result) { |
|
#ifdef ZT_TRACE |
|
fprintf(stdout, "Received notification from: %s\n", element.first.c_str()); |
|
#endif |
|
for (auto rec : element.second) { |
|
std::string id = rec.first; |
|
auto attrs = rec.second; |
|
#ifdef ZT_TRACE |
|
fprintf(stdout, "Record ID: %s\n", id.c_str()); |
|
fprintf(stdout, "attrs len: %lu\n", attrs.size()); |
|
#endif |
|
for (auto a : attrs) { |
|
#ifdef ZT_TRACE |
|
fprintf(stdout, "key: %s\nvalue: %s\n", a.first.c_str(), a.second.c_str()); |
|
#endif |
|
try { |
|
tmp = json::parse(a.second); |
|
json &ov = tmp["old_val"]; |
|
json &nv = tmp["new_val"]; |
|
json oldConfig, newConfig; |
|
if (ov.is_object()) oldConfig = ov; |
|
if (nv.is_object()) newConfig = nv; |
|
if (oldConfig.is_object()||newConfig.is_object()) { |
|
_networkChanged(oldConfig,newConfig,(this->_ready >= 2)); |
|
} |
|
} catch (...) { |
|
fprintf(stderr, "json parse error in networkWatcher_Redis\n"); |
|
} |
|
} |
|
if (_rc->clusterMode) { |
|
_cluster->xdel(key, id); |
|
} else { |
|
_redis->xdel(key, id); |
|
} |
|
} |
|
} |
|
} |
|
} catch (sw::redis::Error &e) { |
|
fprintf(stderr, "Error in Redis networks watcher: %s\n", e.what()); |
|
} |
|
} |
|
fprintf(stderr, "networksWatcher ended\n"); |
|
} |
|
|
|
void PostgreSQL::commitThread() |
|
{ |
|
PGconn *conn = getPgConn(); |
|
if (PQstatus(conn) == CONNECTION_BAD) { |
|
fprintf(stderr, "ERROR: Connection to database failed: %s\n", PQerrorMessage(conn)); |
|
PQfinish(conn); |
|
exit(1); |
|
} |
|
|
|
std::pair<nlohmann::json,bool> qitem; |
|
while(_commitQueue.get(qitem)&(_run == 1)) { |
|
if (!qitem.first.is_object()) { |
|
continue; |
|
} |
|
if (PQstatus(conn) == CONNECTION_BAD) { |
|
fprintf(stderr, "ERROR: Connection to database failed: %s\n", PQerrorMessage(conn)); |
|
PQfinish(conn); |
|
exit(1); |
|
} |
|
try { |
|
nlohmann::json *config = &(qitem.first); |
|
const std::string objtype = (*config)["objtype"]; |
|
if (objtype == "member") { |
|
try { |
|
std::string memberId = (*config)["id"]; |
|
std::string networkId = (*config)["nwid"]; |
|
std::string identity = (*config)["identity"]; |
|
std::string target = "NULL"; |
|
|
|
if (!(*config)["remoteTraceTarget"].is_null()) { |
|
target = (*config)["remoteTraceTarget"]; |
|
} |
|
|
|
std::string caps = OSUtils::jsonDump((*config)["capabilities"], -1); |
|
std::string lastAuthTime = std::to_string((long long)(*config)["lastAuthorizedTime"]); |
|
std::string lastDeauthTime = std::to_string((long long)(*config)["lastDeauthorizedTime"]); |
|
std::string rtraceLevel = std::to_string((int)(*config)["remoteTraceLevel"]); |
|
std::string rev = std::to_string((unsigned long long)(*config)["revision"]); |
|
std::string tags = OSUtils::jsonDump((*config)["tags"], -1); |
|
std::string vmajor = std::to_string((int)(*config)["vMajor"]); |
|
std::string vminor = std::to_string((int)(*config)["vMinor"]); |
|
std::string vrev = std::to_string((int)(*config)["vRev"]); |
|
std::string vproto = std::to_string((int)(*config)["vProto"]); |
|
const char *values[19] = { |
|
memberId.c_str(), |
|
networkId.c_str(), |
|
((*config)["activeBridge"] ? "true" : "false"), |
|
((*config)["authorized"] ? "true" : "false"), |
|
caps.c_str(), |
|
identity.c_str(), |
|
lastAuthTime.c_str(), |
|
lastDeauthTime.c_str(), |
|
((*config)["noAutoAssignIps"] ? "true" : "false"), |
|
rtraceLevel.c_str(), |
|
(target == "NULL") ? NULL : target.c_str(), |
|
rev.c_str(), |
|
tags.c_str(), |
|
vmajor.c_str(), |
|
vminor.c_str(), |
|
vrev.c_str(), |
|
vproto.c_str() |
|
}; |
|
|
|
PGresult *res = PQexec(conn, "BEGIN"); |
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error beginning update transaction: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
delete config; |
|
config = nullptr; |
|
continue; |
|
} |
|
|
|
|
|
res = PQexecParams(conn, |
|
"INSERT INTO ztc_member (id, network_id, active_bridge, authorized, capabilities, " |
|
"identity, last_authorized_time, last_deauthorized_time, no_auto_assign_ips, " |
|
"remote_trace_level, remote_trace_target, revision, tags, v_major, v_minor, v_rev, v_proto) " |
|
"VALUES ($1, $2, $3, $4, $5, $6, " |
|
"TO_TIMESTAMP($7::double precision/1000), TO_TIMESTAMP($8::double precision/1000), " |
|
"$9, $10, $11, $12, $13, $14, $15, $16, $17) ON CONFLICT (network_id, id) DO UPDATE SET " |
|
"active_bridge = EXCLUDED.active_bridge, authorized = EXCLUDED.authorized, capabilities = EXCLUDED.capabilities, " |
|
"identity = EXCLUDED.identity, last_authorized_time = EXCLUDED.last_authorized_time, " |
|
"last_deauthorized_time = EXCLUDED.last_deauthorized_time, no_auto_assign_ips = EXCLUDED.no_auto_assign_ips, " |
|
"remote_trace_level = EXCLUDED.remote_trace_level, remote_trace_target = EXCLUDED.remote_trace_target, " |
|
"revision = EXCLUDED.revision+1, tags = EXCLUDED.tags, v_major = EXCLUDED.v_major, " |
|
"v_minor = EXCLUDED.v_minor, v_rev = EXCLUDED.v_rev, v_proto = EXCLUDED.v_proto", |
|
17, |
|
NULL, |
|
values, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error updating member: %s\n", PQresultErrorMessage(res)); |
|
fprintf(stderr, "%s", OSUtils::jsonDump(*config, 2).c_str()); |
|
PQclear(res); |
|
PQclear(PQexec(conn, "ROLLBACK")); |
|
delete config; |
|
config = nullptr; |
|
continue; |
|
} |
|
|
|
PQclear(res); |
|
|
|
const char *v2[2] = { |
|
memberId.c_str(), |
|
networkId.c_str() |
|
}; |
|
|
|
res = PQexecParams(conn, |
|
"DELETE FROM ztc_member_ip_assignment WHERE member_id = $1 AND network_id = $2", |
|
2, |
|
NULL, |
|
v2, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error updating IP address assignments: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
PQclear(PQexec(conn, "ROLLBACK"));; |
|
delete config; |
|
config = nullptr; |
|
continue; |
|
} |
|
|
|
PQclear(res); |
|
|
|
std::vector<std::string> assignments; |
|
bool ipAssignError = false; |
|
for (auto i = (*config)["ipAssignments"].begin(); i != (*config)["ipAssignments"].end(); ++i) { |
|
std::string addr = *i; |
|
|
|
if (std::find(assignments.begin(), assignments.end(), addr) != assignments.end()) { |
|
continue; |
|
} |
|
|
|
const char *v3[3] = { |
|
memberId.c_str(), |
|
networkId.c_str(), |
|
addr.c_str() |
|
}; |
|
|
|
res = PQexecParams(conn, |
|
"INSERT INTO ztc_member_ip_assignment (member_id, network_id, address) VALUES ($1, $2, $3) ON CONFLICT (network_id, member_id, address) DO NOTHING", |
|
3, |
|
NULL, |
|
v3, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error setting IP addresses for member: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
PQclear(PQexec(conn, "ROLLBACK")); |
|
ipAssignError = true; |
|
break; |
|
} |
|
PQclear(res); |
|
assignments.push_back(addr); |
|
} |
|
if (ipAssignError) { |
|
delete config; |
|
config = nullptr; |
|
continue; |
|
} |
|
|
|
res = PQexec(conn, "COMMIT"); |
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error committing member transaction: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
PQclear(PQexec(conn, "ROLLBACK")); |
|
delete config; |
|
config = nullptr; |
|
continue; |
|
} |
|
|
|
const uint64_t nwidInt = OSUtils::jsonIntHex((*config)["nwid"], 0ULL); |
|
const uint64_t memberidInt = OSUtils::jsonIntHex((*config)["id"], 0ULL); |
|
if (nwidInt && memberidInt) { |
|
nlohmann::json nwOrig; |
|
nlohmann::json memOrig; |
|
|
|
nlohmann::json memNew(*config); |
|
|
|
get(nwidInt, nwOrig, memberidInt, memOrig); |
|
|
|
_memberChanged(memOrig, memNew, qitem.second); |
|
} else { |
|
fprintf(stderr, "Can't notify of change. Error parsing nwid or memberid: %llu-%llu\n", (unsigned long long)nwidInt, (unsigned long long)memberidInt); |
|
} |
|
|
|
} catch (std::exception &e) { |
|
fprintf(stderr, "ERROR: Error updating member: %s\n", e.what()); |
|
} |
|
} else if (objtype == "network") { |
|
try { |
|
std::string id = (*config)["id"]; |
|
std::string controllerId = _myAddressStr.c_str(); |
|
std::string name = (*config)["name"]; |
|
std::string remoteTraceTarget("NULL"); |
|
if (!(*config)["remoteTraceTarget"].is_null()) { |
|
remoteTraceTarget = (*config)["remoteTraceTarget"]; |
|
} |
|
std::string rulesSource; |
|
if ((*config)["rulesSource"].is_string()) { |
|
rulesSource = (*config)["rulesSource"]; |
|
} |
|
std::string caps = OSUtils::jsonDump((*config)["capabilitles"], -1); |
|
std::string now = std::to_string(OSUtils::now()); |
|
std::string mtu = std::to_string((int)(*config)["mtu"]); |
|
std::string mcastLimit = std::to_string((int)(*config)["multicastLimit"]); |
|
std::string rtraceLevel = std::to_string((int)(*config)["remoteTraceLevel"]); |
|
std::string rules = OSUtils::jsonDump((*config)["rules"], -1); |
|
std::string tags = OSUtils::jsonDump((*config)["tags"], -1); |
|
std::string v4mode = OSUtils::jsonDump((*config)["v4AssignMode"],-1); |
|
std::string v6mode = OSUtils::jsonDump((*config)["v6AssignMode"], -1); |
|
bool enableBroadcast = (*config)["enableBroadcast"]; |
|
bool isPrivate = (*config)["private"]; |
|
|
|
const char *values[16] = { |
|
id.c_str(), |
|
controllerId.c_str(), |
|
caps.c_str(), |
|
enableBroadcast ? "true" : "false", |
|
now.c_str(), |
|
mtu.c_str(), |
|
mcastLimit.c_str(), |
|
name.c_str(), |
|
isPrivate ? "true" : "false", |
|
rtraceLevel.c_str(), |
|
(remoteTraceTarget == "NULL" ? NULL : remoteTraceTarget.c_str()), |
|
rules.c_str(), |
|
rulesSource.c_str(), |
|
tags.c_str(), |
|
v4mode.c_str(), |
|
v6mode.c_str(), |
|
}; |
|
|
|
PGresult *res = PQexec(conn, "BEGIN"); |
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error beginnning transaction: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
delete config; |
|
config = nullptr; |
|
continue; |
|
} |
|
|
|
PQclear(res); |
|
|
|
// This ugly query exists because when we want to mirror networks to/from |
|
// another data store (e.g. FileDB or LFDB) it is possible to get a network |
|
// that doesn't exist in Central's database. This does an upsert and sets |
|
// the owner_id to the "first" global admin in the user DB if the record |
|
// did not previously exist. If the record already exists owner_id is left |
|
// unchanged, so owner_id should be left out of the update clause. |
|
res = PQexecParams(conn, |
|
"INSERT INTO ztc_network (id, creation_time, owner_id, controller_id, capabilities, enable_broadcast, " |
|
"last_modified, mtu, multicast_limit, name, private, " |
|
"remote_trace_level, remote_trace_target, rules, rules_source, " |
|
"tags, v4_assign_mode, v6_assign_mode) VALUES (" |
|
"$1, TO_TIMESTAMP($5::double precision/1000), " |
|
"(SELECT user_id AS owner_id FROM ztc_global_permissions WHERE authorize = true AND del = true AND modify = true AND read = true LIMIT 1)," |
|
"$2, $3, $4, TO_TIMESTAMP($5::double precision/1000), " |
|
"$6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16) " |
|
"ON CONFLICT (id) DO UPDATE set controller_id = EXCLUDED.controller_id, " |
|
"capabilities = EXCLUDED.capabilities, enable_broadcast = EXCLUDED.enable_broadcast, " |
|
"last_modified = EXCLUDED.last_modified, mtu = EXCLUDED.mtu, " |
|
"multicast_limit = EXCLUDED.multicast_limit, name = EXCLUDED.name, " |
|
"private = EXCLUDED.private, remote_trace_level = EXCLUDED.remote_trace_level, " |
|
"remote_trace_target = EXCLUDED.remote_trace_target, rules = EXCLUDED.rules, " |
|
"rules_source = EXCLUDED.rules_source, tags = EXCLUDED.tags, " |
|
"v4_assign_mode = EXCLUDED.v4_assign_mode, v6_assign_mode = EXCLUDED.v6_assign_mode", |
|
16, |
|
NULL, |
|
values, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error updating network record: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
PQclear(PQexec(conn, "ROLLBACK")); |
|
delete config; |
|
config = nullptr; |
|
continue; |
|
} |
|
|
|
PQclear(res); |
|
|
|
const char *params[1] = { |
|
id.c_str() |
|
}; |
|
res = PQexecParams(conn, |
|
"DELETE FROM ztc_network_assignment_pool WHERE network_id = $1", |
|
1, |
|
NULL, |
|
params, |
|
NULL, |
|
NULL, |
|
0); |
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error updating assignment pool: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
PQclear(PQexec(conn, "ROLLBACK")); |
|
delete config; |
|
config = nullptr; |
|
continue; |
|
} |
|
|
|
PQclear(res); |
|
|
|
auto pool = (*config)["ipAssignmentPools"]; |
|
bool err = false; |
|
for (auto i = pool.begin(); i != pool.end(); ++i) { |
|
std::string start = (*i)["ipRangeStart"]; |
|
std::string end = (*i)["ipRangeEnd"]; |
|
const char *p[3] = { |
|
id.c_str(), |
|
start.c_str(), |
|
end.c_str() |
|
}; |
|
|
|
res = PQexecParams(conn, |
|
"INSERT INTO ztc_network_assignment_pool (network_id, ip_range_start, ip_range_end) " |
|
"VALUES ($1, $2, $3)", |
|
3, |
|
NULL, |
|
p, |
|
NULL, |
|
NULL, |
|
0); |
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error updating assignment pool: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
err = true; |
|
break; |
|
} |
|
PQclear(res); |
|
} |
|
if (err) { |
|
PQclear(res); |
|
PQclear(PQexec(conn, "ROLLBACK")); |
|
delete config; |
|
config = nullptr; |
|
continue; |
|
} |
|
|
|
res = PQexecParams(conn, |
|
"DELETE FROM ztc_network_route WHERE network_id = $1", |
|
1, |
|
NULL, |
|
params, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error updating routes: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
PQclear(PQexec(conn, "ROLLBACK")); |
|
delete config; |
|
config = nullptr; |
|
continue; |
|
} |
|
|
|
|
|
auto routes = (*config)["routes"]; |
|
err = false; |
|
for (auto i = routes.begin(); i != routes.end(); ++i) { |
|
std::string t = (*i)["target"]; |
|
std::vector<std::string> target; |
|
std::istringstream f(t); |
|
std::string s; |
|
while(std::getline(f, s, '/')) { |
|
target.push_back(s); |
|
} |
|
if (target.empty() || target.size() != 2) { |
|
continue; |
|
} |
|
std::string targetAddr = target[0]; |
|
std::string targetBits = target[1]; |
|
std::string via = "NULL"; |
|
if (!(*i)["via"].is_null()) { |
|
via = (*i)["via"]; |
|
} |
|
|
|
const char *p[4] = { |
|
id.c_str(), |
|
targetAddr.c_str(), |
|
targetBits.c_str(), |
|
(via == "NULL" ? NULL : via.c_str()), |
|
}; |
|
|
|
res = PQexecParams(conn, |
|
"INSERT INTO ztc_network_route (network_id, address, bits, via) VALUES ($1, $2, $3, $4)", |
|
4, |
|
NULL, |
|
p, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error updating routes: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
err = true; |
|
break; |
|
} |
|
PQclear(res); |
|
} |
|
if (err) { |
|
PQclear(PQexec(conn, "ROLLBACK")); |
|
delete config; |
|
config = nullptr; |
|
continue; |
|
} |
|
auto dns = (*config)["dns"]; |
|
std::string domain = dns["domain"]; |
|
std::stringstream servers; |
|
servers << "{"; |
|
for (auto j = dns["servers"].begin(); j < dns["servers"].end(); ++j) { |
|
servers << *j; |
|
if ( (j+1) != dns["servers"].end()) { |
|
servers << ","; |
|
} |
|
} |
|
servers << "}"; |
|
|
|
const char *p[3] = { |
|
id.c_str(), |
|
domain.c_str(), |
|
servers.str().c_str() |
|
}; |
|
|
|
res = PQexecParams(conn, "INSERT INTO ztc_network_dns (network_id, domain, servers) VALUES ($1, $2, $3) ON CONFLICT (network_id) DO UPDATE SET domain = EXCLUDED.domain, servers = EXCLUDED.servers", |
|
3, |
|
NULL, |
|
p, |
|
NULL, |
|
NULL, |
|
0); |
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error updating DNS: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
PQclear(PQexec(conn, "ROLLBACK")); |
|
err = true; |
|
break; |
|
} |
|
PQclear(res); |
|
|
|
res = PQexec(conn, "COMMIT"); |
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error committing network update: %s\n", PQresultErrorMessage(res)); |
|
PQclear(res); |
|
PQclear(PQexec(conn, "ROLLBACK")); |
|
delete config; |
|
config = nullptr; |
|
continue; |
|
} |
|
PQclear(res); |
|
|
|
const uint64_t nwidInt = OSUtils::jsonIntHex((*config)["nwid"], 0ULL); |
|
if (nwidInt) { |
|
nlohmann::json nwOrig; |
|
nlohmann::json nwNew(*config); |
|
|
|
get(nwidInt, nwOrig); |
|
|
|
_networkChanged(nwOrig, nwNew, qitem.second); |
|
} else { |
|
fprintf(stderr, "Can't notify network changed: %llu\n", (unsigned long long)nwidInt); |
|
} |
|
|
|
} catch (std::exception &e) { |
|
fprintf(stderr, "ERROR: Error updating member: %s\n", e.what()); |
|
} |
|
// if (_rc != NULL) { |
|
// try { |
|
// std::string id = (*config)["id"]; |
|
// std::string controllerId = _myAddressStr.c_str(); |
|
// std::string key = "networks:{" + controllerId + "}"; |
|
// if (_rc->clusterMode) { |
|
// _cluster->sadd(key, id); |
|
// } else { |
|
// _redis->sadd(key, id); |
|
// } |
|
// } catch (sw::redis::Error &e) { |
|
// fprintf(stderr, "ERROR: Error adding network to Redis: %s\n", e.what()); |
|
// } |
|
// } |
|
} else if (objtype == "_delete_network") { |
|
try { |
|
std::string networkId = (*config)["nwid"]; |
|
const char *values[1] = { |
|
networkId.c_str() |
|
}; |
|
PGresult * res = PQexecParams(conn, |
|
"UPDATE ztc_network SET deleted = true WHERE id = $1", |
|
1, |
|
NULL, |
|
values, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error deleting network: %s\n", PQresultErrorMessage(res)); |
|
} |
|
|
|
PQclear(res); |
|
} catch (std::exception &e) { |
|
fprintf(stderr, "ERROR: Error deleting network: %s\n", e.what()); |
|
} |
|
// if (_rc != NULL) { |
|
// try { |
|
// std::string id = (*config)["id"]; |
|
// std::string controllerId = _myAddressStr.c_str(); |
|
// std::string key = "networks:{" + controllerId + "}"; |
|
// if (_rc->clusterMode) { |
|
// _cluster->srem(key, id); |
|
// _cluster->del("network-nodes-online:{"+controllerId+"}:"+id); |
|
// } else { |
|
// _redis->srem(key, id); |
|
// _redis->del("network-nodes-online:{"+controllerId+"}:"+id); |
|
// } |
|
// } catch (sw::redis::Error &e) { |
|
// fprintf(stderr, "ERROR: Error adding network to Redis: %s\n", e.what()); |
|
// } |
|
// } |
|
} else if (objtype == "_delete_member") { |
|
try { |
|
std::string memberId = (*config)["id"]; |
|
std::string networkId = (*config)["nwid"]; |
|
|
|
const char *values[2] = { |
|
memberId.c_str(), |
|
networkId.c_str() |
|
}; |
|
|
|
PGresult *res = PQexecParams(conn, |
|
"UPDATE ztc_member SET hidden = true, deleted = true WHERE id = $1 AND network_id = $2", |
|
2, |
|
NULL, |
|
values, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "ERROR: Error deleting member: %s\n", PQresultErrorMessage(res)); |
|
} |
|
|
|
PQclear(res); |
|
} catch (std::exception &e) { |
|
fprintf(stderr, "ERROR: Error deleting member: %s\n", e.what()); |
|
} |
|
// if (_rc != NULL) { |
|
// try { |
|
// std::string memberId = (*config)["id"]; |
|
// std::string networkId = (*config)["nwid"]; |
|
// std::string controllerId = _myAddressStr.c_str(); |
|
// std::string key = "network-nodes-all:{" + controllerId + "}:" + networkId; |
|
// if (_rc->clusterMode) { |
|
// _cluster->srem(key, memberId); |
|
// _cluster->del("member:{"+controllerId+"}:"+networkId+":"+memberId); |
|
// } else { |
|
// _redis->srem(key, memberId); |
|
// _redis->del("member:{"+controllerId+"}:"+networkId+":"+memberId); |
|
// } |
|
// } catch (sw::redis::Error &e) { |
|
// fprintf(stderr, "ERROR: Error deleting member from Redis: %s\n", e.what()); |
|
// } |
|
// } |
|
} else { |
|
fprintf(stderr, "ERROR: unknown objtype"); |
|
} |
|
} catch (std::exception &e) { |
|
fprintf(stderr, "ERROR: Error getting objtype: %s\n", e.what()); |
|
} |
|
|
|
std::this_thread::sleep_for(std::chrono::milliseconds(100)); |
|
} |
|
|
|
PQfinish(conn); |
|
if (_run == 1) { |
|
fprintf(stderr, "ERROR: %s commitThread should still be running! Exiting Controller.\n", _myAddressStr.c_str()); |
|
exit(7); |
|
} |
|
fprintf(stderr, "commitThread finished\n"); |
|
} |
|
|
|
void PostgreSQL::onlineNotificationThread() |
|
{ |
|
waitForReady(); |
|
|
|
// if (_rc != NULL) { |
|
// onlineNotification_Redis(); |
|
// } else { |
|
onlineNotification_Postgres(); |
|
// } |
|
} |
|
|
|
void PostgreSQL::onlineNotification_Postgres() |
|
{ |
|
PGconn *conn = getPgConn(); |
|
if (PQstatus(conn) == CONNECTION_BAD) { |
|
fprintf(stderr, "Connection to database failed: %s\n", PQerrorMessage(conn)); |
|
PQfinish(conn); |
|
exit(1); |
|
} |
|
_connected = 1; |
|
|
|
nlohmann::json jtmp1, jtmp2; |
|
while (_run == 1) { |
|
if (PQstatus(conn) != CONNECTION_OK) { |
|
fprintf(stderr, "ERROR: Online Notification thread lost connection to Postgres."); |
|
PQfinish(conn); |
|
exit(5); |
|
} |
|
|
|
std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > lastOnline; |
|
{ |
|
std::lock_guard<std::mutex> l(_lastOnline_l); |
|
lastOnline.swap(_lastOnline); |
|
} |
|
|
|
PGresult *res = NULL; |
|
|
|
std::stringstream memberUpdate; |
|
memberUpdate << "INSERT INTO ztc_member_status (network_id, member_id, address, last_updated) VALUES "; |
|
bool firstRun = true; |
|
bool memberAdded = false; |
|
for (auto i=lastOnline.begin(); i != lastOnline.end(); ++i) { |
|
uint64_t nwid_i = i->first.first; |
|
char nwidTmp[64]; |
|
char memTmp[64]; |
|
char ipTmp[64]; |
|
OSUtils::ztsnprintf(nwidTmp,sizeof(nwidTmp), "%.16llx", nwid_i); |
|
OSUtils::ztsnprintf(memTmp,sizeof(memTmp), "%.10llx", i->first.second); |
|
|
|
if(!get(nwid_i, jtmp1, i->first.second, jtmp2)) { |
|
continue; // skip non existent networks/members |
|
} |
|
|
|
std::string networkId(nwidTmp); |
|
std::string memberId(memTmp); |
|
|
|
const char *qvals[2] = { |
|
networkId.c_str(), |
|
memberId.c_str() |
|
}; |
|
|
|
res = PQexecParams(conn, |
|
"SELECT id, network_id FROM ztc_member WHERE network_id = $1 AND id = $2", |
|
2, |
|
NULL, |
|
qvals, |
|
NULL, |
|
NULL, |
|
0); |
|
|
|
if (PQresultStatus(res) != PGRES_TUPLES_OK) { |
|
fprintf(stderr, "Member count failed: %s", PQerrorMessage(conn)); |
|
PQclear(res); |
|
continue; |
|
} |
|
|
|
int nrows = PQntuples(res); |
|
PQclear(res); |
|
|
|
if (nrows == 1) { |
|
int64_t ts = i->second.first; |
|
std::string ipAddr = i->second.second.toIpString(ipTmp); |
|
std::string timestamp = std::to_string(ts); |
|
|
|
if (firstRun) { |
|
firstRun = false; |
|
} else { |
|
memberUpdate << ", "; |
|
} |
|
|
|
memberUpdate << "('" << networkId << "', '" << memberId << "', "; |
|
if (ipAddr.empty()) { |
|
memberUpdate << "NULL, "; |
|
} else { |
|
memberUpdate << "'" << ipAddr << "', "; |
|
} |
|
memberUpdate << "TO_TIMESTAMP(" << timestamp << "::double precision/1000))"; |
|
memberAdded = true; |
|
} else if (nrows > 1) { |
|
fprintf(stderr, "nrows > 1?!?"); |
|
continue; |
|
} else { |
|
continue; |
|
} |
|
} |
|
memberUpdate << " ON CONFLICT (network_id, member_id) DO UPDATE SET address = EXCLUDED.address, last_updated = EXCLUDED.last_updated;"; |
|
|
|
if (memberAdded) { |
|
res = PQexec(conn, memberUpdate.str().c_str()); |
|
if (PQresultStatus(res) != PGRES_COMMAND_OK) { |
|
fprintf(stderr, "Multiple insert failed: %s", PQerrorMessage(conn)); |
|
} |
|
PQclear(res); |
|
} |
|
|
|
std::this_thread::sleep_for(std::chrono::seconds(10)); |
|
} |
|
fprintf(stderr, "%s: Fell out of run loop in onlineNotificationThread\n", _myAddressStr.c_str()); |
|
PQfinish(conn); |
|
if (_run == 1) { |
|
fprintf(stderr, "ERROR: %s onlineNotificationThread should still be running! Exiting Controller.\n", _myAddressStr.c_str()); |
|
exit(6); |
|
} |
|
} |
|
|
|
void PostgreSQL::onlineNotification_Redis() |
|
{ |
|
_connected = 1; |
|
|
|
char buf[11] = {0}; |
|
std::string controllerId = std::string(_myAddress.toString(buf)); |
|
|
|
while (_run == 1) { |
|
std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > lastOnline; |
|
{ |
|
std::lock_guard<std::mutex> l(_lastOnline_l); |
|
lastOnline.swap(_lastOnline); |
|
} |
|
try { |
|
if (!lastOnline.empty()) { |
|
if (_rc->clusterMode) { |
|
auto tx = _cluster->transaction(controllerId, true); |
|
_doRedisUpdate(tx, controllerId, lastOnline); |
|
} else { |
|
auto tx = _redis->transaction(true); |
|
_doRedisUpdate(tx, controllerId, lastOnline); |
|
} |
|
} |
|
} catch (sw::redis::Error &e) { |
|
#ifdef ZT_TRACE |
|
fprintf(stderr, "Error in online notification thread (redis): %s\n", e.what()); |
|
#endif |
|
} |
|
std::this_thread::sleep_for(std::chrono::seconds(10)); |
|
} |
|
} |
|
|
|
void PostgreSQL::_doRedisUpdate(sw::redis::Transaction &tx, std::string &controllerId, |
|
std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > &lastOnline) |
|
|
|
{ |
|
nlohmann::json jtmp1, jtmp2; |
|
for (auto i=lastOnline.begin(); i != lastOnline.end(); ++i) { |
|
uint64_t nwid_i = i->first.first; |
|
uint64_t memberid_i = i->first.second; |
|
char nwidTmp[64]; |
|
char memTmp[64]; |
|
char ipTmp[64]; |
|
OSUtils::ztsnprintf(nwidTmp,sizeof(nwidTmp), "%.16llx", nwid_i); |
|
OSUtils::ztsnprintf(memTmp,sizeof(memTmp), "%.10llx", memberid_i); |
|
|
|
if (!get(nwid_i, jtmp1, memberid_i, jtmp2)){ |
|
continue; // skip non existent members/networks |
|
} |
|
|
|
std::string networkId(nwidTmp); |
|
std::string memberId(memTmp); |
|
|
|
int64_t ts = i->second.first; |
|
std::string ipAddr = i->second.second.toIpString(ipTmp); |
|
std::string timestamp = std::to_string(ts); |
|
|
|
std::unordered_map<std::string, std::string> record = { |
|
{"id", memberId}, |
|
{"address", ipAddr}, |
|
{"last_updated", std::to_string(ts)} |
|
}; |
|
tx.zadd("nodes-online:{"+controllerId+"}", memberId, ts) |
|
.zadd("nodes-online2:{"+controllerId+"}", networkId+"-"+memberId, ts) |
|
.zadd("network-nodes-online:{"+controllerId+"}:"+networkId, memberId, ts) |
|
.zadd("active-networks:{"+controllerId+"}", networkId, ts) |
|
.sadd("network-nodes-all:{"+controllerId+"}:"+networkId, memberId) |
|
.hmset("member:{"+controllerId+"}:"+networkId+":"+memberId, record.begin(), record.end()); |
|
} |
|
|
|
// expire records from all-nodes and network-nodes member list |
|
uint64_t expireOld = OSUtils::now() - 300000; |
|
|
|
tx.zremrangebyscore("nodes-online:{"+controllerId+"}", sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN)); |
|
tx.zremrangebyscore("nodes-online2:{"+controllerId+"}", sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN)); |
|
tx.zremrangebyscore("active-networks:{"+controllerId+"}", sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN)); |
|
{ |
|
std::lock_guard<std::mutex> l(_networks_l); |
|
for (const auto &it : _networks) { |
|
uint64_t nwid_i = it.first; |
|
char nwidTmp[64]; |
|
OSUtils::ztsnprintf(nwidTmp,sizeof(nwidTmp), "%.16llx", nwid_i); |
|
tx.zremrangebyscore("network-nodes-online:{"+controllerId+"}:"+nwidTmp, |
|
sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN)); |
|
} |
|
} |
|
tx.exec(); |
|
} |
|
|
|
PGconn *PostgreSQL::getPgConn(OverrideMode m) |
|
{ |
|
if (m == ALLOW_PGBOUNCER_OVERRIDE) { |
|
char *connStr = getenv("PGBOUNCER_CONNSTR"); |
|
if (connStr != NULL) { |
|
fprintf(stderr, "PGBouncer Override\n"); |
|
std::string conn(connStr); |
|
conn += " application_name=controller-"; |
|
conn += _myAddressStr.c_str(); |
|
return PQconnectdb(conn.c_str()); |
|
} |
|
} |
|
|
|
return PQconnectdb(_connString.c_str()); |
|
} |
|
|
|
#endif //ZT_CONTROLLER_USE_LIBPQ
|
|
|