Network.hpp 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395
  1. /*
  2. * ZeroTier One - Network Virtualization Everywhere
  3. * Copyright (C) 2011-2015 ZeroTier, Inc.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. * --
  19. *
  20. * ZeroTier may be used and distributed under the terms of the GPLv3, which
  21. * are available at: http://www.gnu.org/licenses/gpl-3.0.html
  22. *
  23. * If you would like to embed ZeroTier into a commercial application or
  24. * redistribute it in a modified binary form, please contact ZeroTier Networks
  25. * LLC. Start here: http://www.zerotier.com/
  26. */
  27. #ifndef ZT_NETWORK_HPP
  28. #define ZT_NETWORK_HPP
  29. #include <stdint.h>
  30. #include "../include/ZeroTierOne.h"
  31. #include <string>
  32. #include <map>
  33. #include <vector>
  34. #include <algorithm>
  35. #include <stdexcept>
  36. #include "Constants.hpp"
  37. #include "NonCopyable.hpp"
  38. #include "Hashtable.hpp"
  39. #include "Address.hpp"
  40. #include "Mutex.hpp"
  41. #include "SharedPtr.hpp"
  42. #include "AtomicCounter.hpp"
  43. #include "MulticastGroup.hpp"
  44. #include "MAC.hpp"
  45. #include "Dictionary.hpp"
  46. #include "Multicaster.hpp"
  47. #include "NetworkConfig.hpp"
  48. #include "CertificateOfMembership.hpp"
  49. namespace ZeroTier {
  50. class RuntimeEnvironment;
  51. class _AnnounceMulticastGroupsToPeersWithActiveDirectPaths;
  52. /**
  53. * A virtual LAN
  54. */
  55. class Network : NonCopyable
  56. {
  57. friend class SharedPtr<Network>;
  58. friend class _AnnounceMulticastGroupsToPeersWithActiveDirectPaths;
  59. public:
  60. /**
  61. * Broadcast multicast group: ff:ff:ff:ff:ff:ff / 0
  62. */
  63. static const MulticastGroup BROADCAST;
  64. /**
  65. * Construct a new network
  66. *
  67. * Note that init() should be called immediately after the network is
  68. * constructed to actually configure the port.
  69. *
  70. * @param renv Runtime environment
  71. * @param nwid Network ID
  72. */
  73. Network(const RuntimeEnvironment *renv,uint64_t nwid);
  74. ~Network();
  75. /**
  76. * @return Network ID
  77. */
  78. inline uint64_t id() const throw() { return _id; }
  79. /**
  80. * @return Address of network's controller (most significant 40 bits of ID)
  81. */
  82. inline Address controller() throw() { return Address(_id >> 24); }
  83. /**
  84. * @return Multicast group memberships for this network's port (local, not learned via bridging)
  85. */
  86. inline std::vector<MulticastGroup> multicastGroups() const
  87. {
  88. Mutex::Lock _l(_lock);
  89. return _myMulticastGroups;
  90. }
  91. /**
  92. * @return All multicast groups including learned groups that are behind any bridges we're attached to
  93. */
  94. inline std::vector<MulticastGroup> allMulticastGroups() const
  95. {
  96. Mutex::Lock _l(_lock);
  97. return _allMulticastGroups();
  98. }
  99. /**
  100. * @param mg Multicast group
  101. * @param includeBridgedGroups If true, also include any groups we've learned via bridging
  102. * @return True if this network endpoint / peer is a member
  103. */
  104. bool subscribedToMulticastGroup(const MulticastGroup &mg,bool includeBridgedGroups) const;
  105. /**
  106. * Subscribe to a multicast group
  107. *
  108. * @param mg New multicast group
  109. */
  110. void multicastSubscribe(const MulticastGroup &mg);
  111. /**
  112. * Unsubscribe from a multicast group
  113. *
  114. * @param mg Multicast group
  115. */
  116. void multicastUnsubscribe(const MulticastGroup &mg);
  117. /**
  118. * Apply a NetworkConfig to this network
  119. *
  120. * @param conf Configuration in NetworkConfig form
  121. * @return True if configuration was accepted
  122. */
  123. bool applyConfiguration(const SharedPtr<NetworkConfig> &conf);
  124. /**
  125. * Set or update this network's configuration
  126. *
  127. * This decodes a network configuration in key=value dictionary form,
  128. * applies it if valid, and persists it to disk if saveToDisk is true.
  129. *
  130. * @param conf Configuration in key/value dictionary form
  131. * @param saveToDisk IF true (default), write config to disk
  132. * @return 0 -- rejected, 1 -- accepted but not new, 2 -- accepted new config
  133. */
  134. int setConfiguration(const Dictionary &conf,bool saveToDisk = true);
  135. /**
  136. * Set netconf failure to 'access denied' -- called in IncomingPacket when controller reports this
  137. */
  138. inline void setAccessDenied()
  139. {
  140. Mutex::Lock _l(_lock);
  141. _netconfFailure = NETCONF_FAILURE_ACCESS_DENIED;
  142. }
  143. /**
  144. * Set netconf failure to 'not found' -- called by PacketDecider when controller reports this
  145. */
  146. inline void setNotFound()
  147. {
  148. Mutex::Lock _l(_lock);
  149. _netconfFailure = NETCONF_FAILURE_NOT_FOUND;
  150. }
  151. /**
  152. * Causes this network to request an updated configuration from its master node now
  153. */
  154. void requestConfiguration();
  155. /**
  156. * Add or update a membership certificate
  157. *
  158. * @param cert Certificate of membership
  159. * @return True if certificate was accepted as valid
  160. */
  161. bool validateAndAddMembershipCertificate(const CertificateOfMembership &cert);
  162. /**
  163. * Check if we should push membership certificate to a peer, AND update last pushed
  164. *
  165. * If we haven't pushed a cert to this peer in a long enough time, this returns
  166. * true and updates the last pushed time. Otherwise it returns false.
  167. *
  168. * This doesn't actually send anything, since COMs can hitch a ride with several
  169. * different kinds of packets.
  170. *
  171. * @param to Destination peer
  172. * @param now Current time
  173. * @return True if we should include a COM with whatever we're currently sending
  174. */
  175. bool peerNeedsOurMembershipCertificate(const Address &to,uint64_t now);
  176. /**
  177. * @param peer Peer address to check
  178. * @return True if peer is allowed to communicate on this network
  179. */
  180. inline bool isAllowed(const Address &peer) const
  181. {
  182. Mutex::Lock _l(_lock);
  183. return _isAllowed(peer);
  184. }
  185. /**
  186. * Perform cleanup and possibly save state
  187. */
  188. void clean();
  189. /**
  190. * @return Time of last updated configuration or 0 if none
  191. */
  192. inline uint64_t lastConfigUpdate() const throw() { return _lastConfigUpdate; }
  193. /**
  194. * @return Status of this network
  195. */
  196. inline ZT1_VirtualNetworkStatus status() const
  197. {
  198. Mutex::Lock _l(_lock);
  199. return _status();
  200. }
  201. /**
  202. * @param ec Buffer to fill with externally-visible network configuration
  203. */
  204. inline void externalConfig(ZT1_VirtualNetworkConfig *ec) const
  205. {
  206. Mutex::Lock _l(_lock);
  207. _externalConfig(ec);
  208. }
  209. /**
  210. * Get current network config or throw exception
  211. *
  212. * This version never returns null. Instead it throws a runtime error if
  213. * there is no current configuration. Callers should check isUp() first or
  214. * use config2() to get with the potential for null.
  215. *
  216. * Since it never returns null, it's safe to config()->whatever() inside
  217. * a try/catch block.
  218. *
  219. * @return Network configuration (never null)
  220. * @throws std::runtime_error Network configuration unavailable
  221. */
  222. inline SharedPtr<NetworkConfig> config() const
  223. {
  224. Mutex::Lock _l(_lock);
  225. if (_config)
  226. return _config;
  227. throw std::runtime_error("no configuration");
  228. }
  229. /**
  230. * Get current network config or return NULL
  231. *
  232. * @return Network configuration -- may be NULL
  233. */
  234. inline SharedPtr<NetworkConfig> config2() const
  235. throw()
  236. {
  237. Mutex::Lock _l(_lock);
  238. return _config;
  239. }
  240. /**
  241. * @return Ethernet MAC address for this network's local interface
  242. */
  243. inline const MAC &mac() const throw() { return _mac; }
  244. /**
  245. * Shortcut for config()->permitsBridging(), returns false if no config
  246. *
  247. * @param peer Peer address to check
  248. * @return True if peer can bridge other Ethernet nodes into this network or network is in permissive bridging mode
  249. */
  250. inline bool permitsBridging(const Address &peer) const
  251. {
  252. Mutex::Lock _l(_lock);
  253. if (_config)
  254. return _config->permitsBridging(peer);
  255. return false;
  256. }
  257. /**
  258. * Find the node on this network that has this MAC behind it (if any)
  259. *
  260. * @param mac MAC address
  261. * @return ZeroTier address of bridge to this MAC
  262. */
  263. inline Address findBridgeTo(const MAC &mac) const
  264. {
  265. Mutex::Lock _l(_lock);
  266. const Address *const br = _remoteBridgeRoutes.get(mac);
  267. if (br)
  268. return *br;
  269. return Address();
  270. }
  271. /**
  272. * Set a bridge route
  273. *
  274. * @param mac MAC address of destination
  275. * @param addr Bridge this MAC is reachable behind
  276. */
  277. void learnBridgeRoute(const MAC &mac,const Address &addr);
  278. /**
  279. * Learn a multicast group that is bridged to our tap device
  280. *
  281. * @param mg Multicast group
  282. * @param now Current time
  283. */
  284. void learnBridgedMulticastGroup(const MulticastGroup &mg,uint64_t now);
  285. /**
  286. * @return True if traffic on this network's tap is enabled
  287. */
  288. inline bool enabled() const throw() { return _enabled; }
  289. /**
  290. * @param enabled Should traffic be allowed on this network?
  291. */
  292. void setEnabled(bool enabled);
  293. /**
  294. * Destroy this network
  295. *
  296. * This causes the network to disable itself, destroy its tap device, and on
  297. * delete to delete all trace of itself on disk and remove any persistent tap
  298. * device instances. Call this when a network is being removed from the system.
  299. */
  300. void destroy();
  301. inline bool operator==(const Network &n) const throw() { return (_id == n._id); }
  302. inline bool operator!=(const Network &n) const throw() { return (_id != n._id); }
  303. inline bool operator<(const Network &n) const throw() { return (_id < n._id); }
  304. inline bool operator>(const Network &n) const throw() { return (_id > n._id); }
  305. inline bool operator<=(const Network &n) const throw() { return (_id <= n._id); }
  306. inline bool operator>=(const Network &n) const throw() { return (_id >= n._id); }
  307. private:
  308. struct _RemoteMemberCertificateInfo
  309. {
  310. _RemoteMemberCertificateInfo() : com(),lastPushed(0) {}
  311. CertificateOfMembership com; // remote member's COM
  312. uint64_t lastPushed; // when did we last push ours to them?
  313. };
  314. ZT1_VirtualNetworkStatus _status() const;
  315. void _externalConfig(ZT1_VirtualNetworkConfig *ec) const; // assumes _lock is locked
  316. bool _isAllowed(const Address &peer) const;
  317. void _announceMulticastGroups();
  318. std::vector<MulticastGroup> _allMulticastGroups() const;
  319. const RuntimeEnvironment *RR;
  320. uint64_t _id;
  321. MAC _mac; // local MAC address
  322. volatile bool _enabled;
  323. volatile bool _portInitialized;
  324. std::vector< MulticastGroup > _myMulticastGroups; // multicast groups that we belong to (according to tap)
  325. Hashtable< MulticastGroup,uint64_t > _multicastGroupsBehindMe; // multicast groups that seem to be behind us and when we last saw them (if we are a bridge)
  326. Hashtable< MAC,Address > _remoteBridgeRoutes; // remote addresses where given MACs are reachable (for tracking devices behind remote bridges)
  327. Hashtable< Address,_RemoteMemberCertificateInfo > _certInfo;
  328. SharedPtr<NetworkConfig> _config; // Most recent network configuration, which is an immutable value-object
  329. volatile uint64_t _lastConfigUpdate;
  330. volatile bool _destroyed;
  331. enum {
  332. NETCONF_FAILURE_NONE,
  333. NETCONF_FAILURE_ACCESS_DENIED,
  334. NETCONF_FAILURE_NOT_FOUND,
  335. NETCONF_FAILURE_INIT_FAILED
  336. } _netconfFailure;
  337. volatile int _portError; // return value from port config callback
  338. Mutex _lock;
  339. AtomicCounter __refCount;
  340. };
  341. } // naemspace ZeroTier
  342. #endif