You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
165 lines
5.0 KiB
165 lines
5.0 KiB
/* |
|
* ZeroTier One - Network Virtualization Everywhere |
|
* Copyright (C) 2011-2015 ZeroTier, Inc. |
|
* |
|
* This program is free software: you can redistribute it and/or modify |
|
* it under the terms of the GNU General Public License as published by |
|
* the Free Software Foundation, either version 3 of the License, or |
|
* (at your option) any later version. |
|
* |
|
* This program is distributed in the hope that it will be useful, |
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
* GNU General Public License for more details. |
|
* |
|
* You should have received a copy of the GNU General Public License |
|
* along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
* |
|
* -- |
|
* |
|
* ZeroTier may be used and distributed under the terms of the GPLv3, which |
|
* are available at: http://www.gnu.org/licenses/gpl-3.0.html |
|
* |
|
* If you would like to embed ZeroTier into a commercial application or |
|
* redistribute it in a modified binary form, please contact ZeroTier Networks |
|
* LLC. Start here: http://www.zerotier.com/ |
|
*/ |
|
|
|
#ifndef ZT_PATH_HPP |
|
#define ZT_PATH_HPP |
|
|
|
#include "Constants.hpp" |
|
#include "InetAddress.hpp" |
|
#include "Utils.hpp" |
|
|
|
namespace ZeroTier { |
|
|
|
/** |
|
* Base class for paths |
|
* |
|
* The base Path class is an immutable value. |
|
*/ |
|
class Path |
|
{ |
|
public: |
|
/** |
|
* Path trust category |
|
* |
|
* Note that this is NOT peer trust and has nothing to do with root server |
|
* designations or other trust metrics. This indicates how much we trust |
|
* this path to be secure and/or private. A trust level of normal means |
|
* encrypt and authenticate all traffic. Privacy trust means we can send |
|
* traffic in the clear. Ultimate trust means we don't even need |
|
* authentication. Generally a private path would be a hard-wired local |
|
* LAN, while an ultimate trust path would be a physically isolated private |
|
* server backplane. |
|
* |
|
* Nearly all paths will be normal trust. The other levels are for high |
|
* performance local SDN use only. |
|
* |
|
* These values MUST match ZT1_LocalInterfaceAddressTrust in ZeroTierOne.h |
|
*/ |
|
enum Trust |
|
{ |
|
TRUST_NORMAL = 0, |
|
TRUST_PRIVACY = 1, |
|
TRUST_ULTIMATE = 2 |
|
}; |
|
|
|
Path() : |
|
_addr(), |
|
_ipScope(InetAddress::IP_SCOPE_NONE), |
|
_trust(TRUST_NORMAL) |
|
{ |
|
} |
|
|
|
Path(const InetAddress &addr,int metric,Trust trust) : |
|
_addr(addr), |
|
_ipScope(addr.ipScope()), |
|
_trust(trust) |
|
{ |
|
} |
|
|
|
/** |
|
* @return Physical address |
|
*/ |
|
inline const InetAddress &address() const throw() { return _addr; } |
|
|
|
/** |
|
* @return IP scope -- faster shortcut for address().ipScope() |
|
*/ |
|
inline InetAddress::IpScope ipScope() const throw() { return _ipScope; } |
|
|
|
/** |
|
* @return Preference rank, higher == better |
|
*/ |
|
inline int preferenceRank() const throw() { return (int)_ipScope; } // IP scopes are in ascending rank order in InetAddress.hpp |
|
|
|
/** |
|
* @return Path trust level |
|
*/ |
|
inline Trust trust() const throw() { return _trust; } |
|
|
|
/** |
|
* @return True if path is considered reliable (no NAT keepalives etc. are needed) |
|
*/ |
|
inline bool reliable() const throw() |
|
{ |
|
return ((_ipScope != InetAddress::IP_SCOPE_GLOBAL)&&(_ipScope != InetAddress::IP_SCOPE_PSEUDOPRIVATE)); |
|
} |
|
|
|
/** |
|
* @return True if address is non-NULL |
|
*/ |
|
inline operator bool() const throw() { return (_addr); } |
|
|
|
// Comparisons are by address only |
|
inline bool operator==(const Path &p) const throw() { return (_addr == p._addr); } |
|
inline bool operator!=(const Path &p) const throw() { return (_addr != p._addr); } |
|
inline bool operator<(const Path &p) const throw() { return (_addr < p._addr); } |
|
inline bool operator>(const Path &p) const throw() { return (_addr > p._addr); } |
|
inline bool operator<=(const Path &p) const throw() { return (_addr <= p._addr); } |
|
inline bool operator>=(const Path &p) const throw() { return (_addr >= p._addr); } |
|
|
|
/** |
|
* Check whether this address is valid for a ZeroTier path |
|
* |
|
* This checks the address type and scope against address types and scopes |
|
* that we currently support for ZeroTier communication. |
|
* |
|
* @param a Address to check |
|
* @return True if address is good for ZeroTier path use |
|
*/ |
|
static inline bool isAddressValidForPath(const InetAddress &a) |
|
throw() |
|
{ |
|
if ((a.ss_family == AF_INET)||(a.ss_family == AF_INET6)) { |
|
switch(a.ipScope()) { |
|
/* Note: we don't do link-local at the moment. Unfortunately these |
|
* cause several issues. The first is that they usually require a |
|
* device qualifier, which we don't handle yet and can't portably |
|
* push in PUSH_DIRECT_PATHS. The second is that some OSes assign |
|
* these very ephemerally or otherwise strangely. So we'll use |
|
* private, pseudo-private, shared (e.g. carrier grade NAT), or |
|
* global IP addresses. */ |
|
case InetAddress::IP_SCOPE_PRIVATE: |
|
case InetAddress::IP_SCOPE_PSEUDOPRIVATE: |
|
case InetAddress::IP_SCOPE_SHARED: |
|
case InetAddress::IP_SCOPE_GLOBAL: |
|
return true; |
|
default: |
|
return false; |
|
} |
|
} |
|
return false; |
|
} |
|
|
|
private: |
|
InetAddress _addr; |
|
InetAddress::IpScope _ipScope; // memoize this since it's a computed value checked often |
|
Trust _trust; |
|
}; |
|
|
|
} // namespace ZeroTier |
|
|
|
#endif
|
|
|