Topology.cpp 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469
  1. /*
  2. * ZeroTier One - Network Virtualization Everywhere
  3. * Copyright (C) 2011-2017 ZeroTier, Inc. https://www.zerotier.com/
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. * --
  19. *
  20. * You can be released from the requirements of the license by purchasing
  21. * a commercial license. Buying such a license is mandatory as soon as you
  22. * develop commercial closed-source software that incorporates or links
  23. * directly against ZeroTier software without disclosing the source code
  24. * of your own application.
  25. */
  26. #include "Constants.hpp"
  27. #include "Topology.hpp"
  28. #include "RuntimeEnvironment.hpp"
  29. #include "Node.hpp"
  30. #include "Network.hpp"
  31. #include "NetworkConfig.hpp"
  32. #include "Buffer.hpp"
  33. #include "Switch.hpp"
  34. namespace ZeroTier {
  35. /*
  36. * 2016-01-13 ZeroTier planet definition for the third planet of Sol:
  37. *
  38. * There are two roots, each of which is a cluster spread across multiple
  39. * continents and providers. They are named Alice and Bob after the
  40. * canonical example names used in cryptography.
  41. *
  42. * Alice:
  43. *
  44. * root-alice-ams-01: Amsterdam, Netherlands
  45. * root-alice-joh-01: Johannesburg, South Africa
  46. * root-alice-nyc-01: New York, New York, USA
  47. * root-alice-sao-01: Sao Paolo, Brazil
  48. * root-alice-sfo-01: San Francisco, California, USA
  49. * root-alice-sgp-01: Singapore
  50. *
  51. * Bob:
  52. *
  53. * root-bob-dfw-01: Dallas, Texas, USA
  54. * root-bob-fra-01: Frankfurt, Germany
  55. * root-bob-par-01: Paris, France
  56. * root-bob-syd-01: Sydney, Australia
  57. * root-bob-tok-01: Tokyo, Japan
  58. * root-bob-tor-01: Toronto, Canada
  59. */
  60. #define ZT_DEFAULT_WORLD_LENGTH 634
  61. static const unsigned char ZT_DEFAULT_WORLD[ZT_DEFAULT_WORLD_LENGTH] = {0x01,0x00,0x00,0x00,0x00,0x08,0xea,0xc9,0x0a,0x00,0x00,0x01,0x52,0x3c,0x32,0x50,0x1a,0xb8,0xb3,0x88,0xa4,0x69,0x22,0x14,0x91,0xaa,0x9a,0xcd,0x66,0xcc,0x76,0x4c,0xde,0xfd,0x56,0x03,0x9f,0x10,0x67,0xae,0x15,0xe6,0x9c,0x6f,0xb4,0x2d,0x7b,0x55,0x33,0x0e,0x3f,0xda,0xac,0x52,0x9c,0x07,0x92,0xfd,0x73,0x40,0xa6,0xaa,0x21,0xab,0xa8,0xa4,0x89,0xfd,0xae,0xa4,0x4a,0x39,0xbf,0x2d,0x00,0x65,0x9a,0xc9,0xc8,0x18,0xeb,0x4a,0xf7,0x86,0xa8,0x40,0xd6,0x52,0xea,0xae,0x9e,0x7a,0xbf,0x4c,0x97,0x66,0xab,0x2d,0x6f,0xaf,0xc9,0x2b,0x3a,0xff,0xed,0xd6,0x30,0x3e,0xc4,0x6a,0x65,0xf2,0xbd,0x83,0x52,0xf5,0x40,0xe9,0xcc,0x0d,0x6e,0x89,0x3f,0x9a,0xa0,0xb8,0xdf,0x42,0xd2,0x2f,0x84,0xe6,0x03,0x26,0x0f,0xa8,0xe3,0xcc,0x05,0x05,0x03,0xef,0x12,0x80,0x0d,0xce,0x3e,0xb6,0x58,0x3b,0x1f,0xa8,0xad,0xc7,0x25,0xf9,0x43,0x71,0xa7,0x5c,0x9a,0xc7,0xe1,0xa3,0xb8,0x88,0xd0,0x71,0x6c,0x94,0x99,0x73,0x41,0x0b,0x1b,0x48,0x84,0x02,0x9d,0x21,0x90,0x39,0xf3,0x00,0x01,0xf0,0x92,0x2a,0x98,0xe3,0xb3,0x4e,0xbc,0xbf,0xf3,0x33,0x26,0x9d,0xc2,0x65,0xd7,0xa0,0x20,0xaa,0xb6,0x9d,0x72,0xbe,0x4d,0x4a,0xcc,0x9c,0x8c,0x92,0x94,0x78,0x57,0x71,0x25,0x6c,0xd1,0xd9,0x42,0xa9,0x0d,0x1b,0xd1,0xd2,0xdc,0xa3,0xea,0x84,0xef,0x7d,0x85,0xaf,0xe6,0x61,0x1f,0xb4,0x3f,0xf0,0xb7,0x41,0x26,0xd9,0x0a,0x6e,0x00,0x0c,0x04,0xbc,0xa6,0x5e,0xb1,0x27,0x09,0x06,0x2a,0x03,0xb0,0xc0,0x00,0x02,0x00,0xd0,0x00,0x00,0x00,0x00,0x00,0x7d,0x00,0x01,0x27,0x09,0x04,0x9a,0x42,0xc5,0x21,0x27,0x09,0x06,0x2c,0x0f,0xf8,0x50,0x01,0x54,0x01,0x97,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x33,0x27,0x09,0x04,0x9f,0xcb,0x61,0xab,0x27,0x09,0x06,0x26,0x04,0xa8,0x80,0x08,0x00,0x00,0xa1,0x00,0x00,0x00,0x00,0x00,0x54,0x60,0x01,0x27,0x09,0x04,0xa9,0x39,0x8f,0x68,0x27,0x09,0x06,0x26,0x07,0xf0,0xd0,0x1d,0x01,0x00,0x57,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x02,0x27,0x09,0x04,0x6b,0xaa,0xc5,0x0e,0x27,0x09,0x06,0x26,0x04,0xa8,0x80,0x00,0x01,0x00,0x20,0x00,0x00,0x00,0x00,0x02,0x00,0xe0,0x01,0x27,0x09,0x04,0x80,0xc7,0xc5,0xd9,0x27,0x09,0x06,0x24,0x00,0x61,0x80,0x00,0x00,0x00,0xd0,0x00,0x00,0x00,0x00,0x00,0xb7,0x40,0x01,0x27,0x09,0x88,0x41,0x40,0x8a,0x2e,0x00,0xbb,0x1d,0x31,0xf2,0xc3,0x23,0xe2,0x64,0xe9,0xe6,0x41,0x72,0xc1,0xa7,0x4f,0x77,0x89,0x95,0x55,0xed,0x10,0x75,0x1c,0xd5,0x6e,0x86,0x40,0x5c,0xde,0x11,0x8d,0x02,0xdf,0xfe,0x55,0x5d,0x46,0x2c,0xcf,0x6a,0x85,0xb5,0x63,0x1c,0x12,0x35,0x0c,0x8d,0x5d,0xc4,0x09,0xba,0x10,0xb9,0x02,0x5d,0x0f,0x44,0x5c,0xf4,0x49,0xd9,0x2b,0x1c,0x00,0x0c,0x04,0x2d,0x20,0xc6,0x82,0x27,0x09,0x06,0x20,0x01,0x19,0xf0,0x64,0x00,0x81,0xc3,0x54,0x00,0x00,0xff,0xfe,0x18,0x1d,0x61,0x27,0x09,0x04,0x2e,0x65,0xa0,0xf9,0x27,0x09,0x06,0x2a,0x03,0xb0,0xc0,0x00,0x03,0x00,0xd0,0x00,0x00,0x00,0x00,0x00,0x6a,0x30,0x01,0x27,0x09,0x04,0x6b,0xbf,0x2e,0xd2,0x27,0x09,0x06,0x20,0x01,0x19,0xf0,0x68,0x00,0x83,0xa4,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x64,0x27,0x09,0x04,0x2d,0x20,0xf6,0xb3,0x27,0x09,0x06,0x20,0x01,0x19,0xf0,0x58,0x00,0x8b,0xf8,0x54,0x00,0x00,0xff,0xfe,0x15,0xb3,0x9a,0x27,0x09,0x04,0x2d,0x20,0xf8,0x57,0x27,0x09,0x06,0x20,0x01,0x19,0xf0,0x70,0x00,0x9b,0xc9,0x54,0x00,0x00,0xff,0xfe,0x15,0xc4,0xf5,0x27,0x09,0x04,0x9f,0xcb,0x02,0x9a,0x27,0x09,0x06,0x26,0x04,0xa8,0x80,0x0c,0xad,0x00,0xd0,0x00,0x00,0x00,0x00,0x00,0x26,0x70,0x01,0x27,0x09};
  62. Topology::Topology(const RuntimeEnvironment *renv,void *tPtr) :
  63. RR(renv),
  64. _trustedPathCount(0),
  65. _amRoot(false)
  66. {
  67. uint8_t tmp[ZT_WORLD_MAX_SERIALIZED_LENGTH];
  68. int n = RR->node->stateObjectGet(tPtr,ZT_STATE_OBJECT_PLANET,0,tmp,sizeof(tmp));
  69. if (n > 0) {
  70. try {
  71. World cachedPlanet;
  72. cachedPlanet.deserialize(Buffer<ZT_WORLD_MAX_SERIALIZED_LENGTH>(tmp,(unsigned int)n),0);
  73. addWorld(tPtr,cachedPlanet,false);
  74. } catch ( ... ) {} // ignore invalid cached planets
  75. }
  76. World defaultPlanet;
  77. {
  78. Buffer<ZT_DEFAULT_WORLD_LENGTH> wtmp(ZT_DEFAULT_WORLD,ZT_DEFAULT_WORLD_LENGTH);
  79. defaultPlanet.deserialize(wtmp,0); // throws on error, which would indicate a bad static variable up top
  80. }
  81. addWorld(tPtr,defaultPlanet,false);
  82. }
  83. SharedPtr<Peer> Topology::addPeer(void *tPtr,const SharedPtr<Peer> &peer)
  84. {
  85. #ifdef ZT_TRACE
  86. if ((!peer)||(peer->address() == RR->identity.address())) {
  87. if (!peer)
  88. fprintf(stderr,"FATAL BUG: addPeer() caught attempt to add NULL peer" ZT_EOL_S);
  89. else fprintf(stderr,"FATAL BUG: addPeer() caught attempt to add peer for self" ZT_EOL_S);
  90. abort();
  91. }
  92. #endif
  93. SharedPtr<Peer> np;
  94. {
  95. Mutex::Lock _l(_peers_m);
  96. SharedPtr<Peer> &hp = _peers[peer->address()];
  97. if (!hp)
  98. hp = peer;
  99. np = hp;
  100. }
  101. saveIdentity(tPtr,np->identity());
  102. return np;
  103. }
  104. SharedPtr<Peer> Topology::getPeer(void *tPtr,const Address &zta)
  105. {
  106. if (zta == RR->identity.address()) {
  107. TRACE("BUG: ignored attempt to getPeer() for self, returned NULL");
  108. return SharedPtr<Peer>();
  109. }
  110. {
  111. Mutex::Lock _l(_peers_m);
  112. const SharedPtr<Peer> *const ap = _peers.get(zta);
  113. if (ap)
  114. return *ap;
  115. }
  116. try {
  117. Identity id(_getIdentity(tPtr,zta));
  118. if (id) {
  119. SharedPtr<Peer> np(new Peer(RR,RR->identity,id));
  120. {
  121. Mutex::Lock _l(_peers_m);
  122. SharedPtr<Peer> &ap = _peers[zta];
  123. if (!ap)
  124. ap.swap(np);
  125. return ap;
  126. }
  127. }
  128. } catch ( ... ) {} // invalid identity on disk?
  129. return SharedPtr<Peer>();
  130. }
  131. Identity Topology::getIdentity(void *tPtr,const Address &zta)
  132. {
  133. if (zta == RR->identity.address()) {
  134. return RR->identity;
  135. } else {
  136. Mutex::Lock _l(_peers_m);
  137. const SharedPtr<Peer> *const ap = _peers.get(zta);
  138. if (ap)
  139. return (*ap)->identity();
  140. }
  141. return _getIdentity(tPtr,zta);
  142. }
  143. void Topology::saveIdentity(void *tPtr,const Identity &id)
  144. {
  145. if (id) {
  146. const std::string tmp(id.toString(false));
  147. RR->node->stateObjectPut(tPtr,ZT_STATE_OBJECT_PEER_IDENTITY,id.address().toInt(),tmp.data(),(unsigned int)tmp.length());
  148. }
  149. }
  150. SharedPtr<Peer> Topology::getUpstreamPeer(const Address *avoid,unsigned int avoidCount,bool strictAvoid)
  151. {
  152. const uint64_t now = RR->node->now();
  153. unsigned int bestQualityOverall = ~((unsigned int)0);
  154. unsigned int bestQualityNotAvoid = ~((unsigned int)0);
  155. const SharedPtr<Peer> *bestOverall = (const SharedPtr<Peer> *)0;
  156. const SharedPtr<Peer> *bestNotAvoid = (const SharedPtr<Peer> *)0;
  157. Mutex::Lock _l1(_peers_m);
  158. Mutex::Lock _l2(_upstreams_m);
  159. for(std::vector<Address>::const_iterator a(_upstreamAddresses.begin());a!=_upstreamAddresses.end();++a) {
  160. const SharedPtr<Peer> *p = _peers.get(*a);
  161. if (p) {
  162. bool avoiding = false;
  163. for(unsigned int i=0;i<avoidCount;++i) {
  164. if (avoid[i] == (*p)->address()) {
  165. avoiding = true;
  166. break;
  167. }
  168. }
  169. const unsigned int q = (*p)->relayQuality(now);
  170. if (q <= bestQualityOverall) {
  171. bestQualityOverall = q;
  172. bestOverall = &(*p);
  173. }
  174. if ((!avoiding)&&(q <= bestQualityNotAvoid)) {
  175. bestQualityNotAvoid = q;
  176. bestNotAvoid = &(*p);
  177. }
  178. }
  179. }
  180. if (bestNotAvoid) {
  181. return *bestNotAvoid;
  182. } else if ((!strictAvoid)&&(bestOverall)) {
  183. return *bestOverall;
  184. }
  185. return SharedPtr<Peer>();
  186. }
  187. bool Topology::isUpstream(const Identity &id) const
  188. {
  189. Mutex::Lock _l(_upstreams_m);
  190. return (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),id.address()) != _upstreamAddresses.end());
  191. }
  192. bool Topology::shouldAcceptWorldUpdateFrom(const Address &addr) const
  193. {
  194. Mutex::Lock _l(_upstreams_m);
  195. if (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),addr) != _upstreamAddresses.end())
  196. return true;
  197. for(std::vector< std::pair< uint64_t,Address> >::const_iterator s(_moonSeeds.begin());s!=_moonSeeds.end();++s) {
  198. if (s->second == addr)
  199. return true;
  200. }
  201. return false;
  202. }
  203. ZT_PeerRole Topology::role(const Address &ztaddr) const
  204. {
  205. Mutex::Lock _l(_upstreams_m);
  206. if (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),ztaddr) != _upstreamAddresses.end()) {
  207. for(std::vector<World::Root>::const_iterator i(_planet.roots().begin());i!=_planet.roots().end();++i) {
  208. if (i->identity.address() == ztaddr)
  209. return ZT_PEER_ROLE_PLANET;
  210. }
  211. return ZT_PEER_ROLE_MOON;
  212. }
  213. return ZT_PEER_ROLE_LEAF;
  214. }
  215. bool Topology::isProhibitedEndpoint(const Address &ztaddr,const InetAddress &ipaddr) const
  216. {
  217. Mutex::Lock _l(_upstreams_m);
  218. // For roots the only permitted addresses are those defined. This adds just a little
  219. // bit of extra security against spoofing, replaying, etc.
  220. if (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),ztaddr) != _upstreamAddresses.end()) {
  221. for(std::vector<World::Root>::const_iterator r(_planet.roots().begin());r!=_planet.roots().end();++r) {
  222. if (r->identity.address() == ztaddr) {
  223. if (r->stableEndpoints.size() == 0)
  224. return false; // no stable endpoints specified, so allow dynamic paths
  225. for(std::vector<InetAddress>::const_iterator e(r->stableEndpoints.begin());e!=r->stableEndpoints.end();++e) {
  226. if (ipaddr.ipsEqual(*e))
  227. return false;
  228. }
  229. }
  230. }
  231. for(std::vector<World>::const_iterator m(_moons.begin());m!=_moons.end();++m) {
  232. for(std::vector<World::Root>::const_iterator r(m->roots().begin());r!=m->roots().end();++r) {
  233. if (r->identity.address() == ztaddr) {
  234. if (r->stableEndpoints.size() == 0)
  235. return false; // no stable endpoints specified, so allow dynamic paths
  236. for(std::vector<InetAddress>::const_iterator e(r->stableEndpoints.begin());e!=r->stableEndpoints.end();++e) {
  237. if (ipaddr.ipsEqual(*e))
  238. return false;
  239. }
  240. }
  241. }
  242. }
  243. return true;
  244. }
  245. return false;
  246. }
  247. bool Topology::addWorld(void *tPtr,const World &newWorld,bool alwaysAcceptNew)
  248. {
  249. if ((newWorld.type() != World::TYPE_PLANET)&&(newWorld.type() != World::TYPE_MOON))
  250. return false;
  251. Mutex::Lock _l1(_upstreams_m);
  252. Mutex::Lock _l2(_peers_m);
  253. World *existing = (World *)0;
  254. switch(newWorld.type()) {
  255. case World::TYPE_PLANET:
  256. existing = &_planet;
  257. break;
  258. case World::TYPE_MOON:
  259. for(std::vector< World >::iterator m(_moons.begin());m!=_moons.end();++m) {
  260. if (m->id() == newWorld.id()) {
  261. existing = &(*m);
  262. break;
  263. }
  264. }
  265. break;
  266. default:
  267. return false;
  268. }
  269. if (existing) {
  270. if (existing->shouldBeReplacedBy(newWorld))
  271. *existing = newWorld;
  272. else return false;
  273. } else if (newWorld.type() == World::TYPE_MOON) {
  274. if (alwaysAcceptNew) {
  275. _moons.push_back(newWorld);
  276. existing = &(_moons.back());
  277. } else {
  278. for(std::vector< std::pair<uint64_t,Address> >::iterator m(_moonSeeds.begin());m!=_moonSeeds.end();++m) {
  279. if (m->first == newWorld.id()) {
  280. for(std::vector<World::Root>::const_iterator r(newWorld.roots().begin());r!=newWorld.roots().end();++r) {
  281. if (r->identity.address() == m->second) {
  282. _moonSeeds.erase(m);
  283. _moons.push_back(newWorld);
  284. existing = &(_moons.back());
  285. break;
  286. }
  287. }
  288. if (existing)
  289. break;
  290. }
  291. }
  292. }
  293. if (!existing)
  294. return false;
  295. } else {
  296. return false;
  297. }
  298. try {
  299. Buffer<ZT_WORLD_MAX_SERIALIZED_LENGTH> sbuf;
  300. existing->serialize(sbuf,false);
  301. RR->node->stateObjectPut(tPtr,(existing->type() == World::TYPE_PLANET) ? ZT_STATE_OBJECT_PLANET : ZT_STATE_OBJECT_MOON,existing->id(),sbuf.data(),sbuf.size());
  302. } catch ( ... ) {}
  303. _memoizeUpstreams(tPtr);
  304. return true;
  305. }
  306. void Topology::addMoon(void *tPtr,const uint64_t id,const Address &seed)
  307. {
  308. char tmp[ZT_WORLD_MAX_SERIALIZED_LENGTH];
  309. int n = RR->node->stateObjectGet(tPtr,ZT_STATE_OBJECT_MOON,id,tmp,sizeof(tmp));
  310. if (n > 0) {
  311. try {
  312. World w;
  313. w.deserialize(Buffer<ZT_WORLD_MAX_SERIALIZED_LENGTH>(tmp,(unsigned int)n));
  314. if ((w.type() == World::TYPE_MOON)&&(w.id() == id)) {
  315. addWorld(tPtr,w,true);
  316. return;
  317. }
  318. } catch ( ... ) {}
  319. }
  320. if (seed) {
  321. Mutex::Lock _l(_upstreams_m);
  322. if (std::find(_moonSeeds.begin(),_moonSeeds.end(),std::pair<uint64_t,Address>(id,seed)) == _moonSeeds.end())
  323. _moonSeeds.push_back(std::pair<uint64_t,Address>(id,seed));
  324. }
  325. }
  326. void Topology::removeMoon(void *tPtr,const uint64_t id)
  327. {
  328. Mutex::Lock _l1(_upstreams_m);
  329. Mutex::Lock _l2(_peers_m);
  330. std::vector<World> nm;
  331. for(std::vector<World>::const_iterator m(_moons.begin());m!=_moons.end();++m) {
  332. if (m->id() != id) {
  333. nm.push_back(*m);
  334. } else {
  335. RR->node->stateObjectDelete(tPtr,ZT_STATE_OBJECT_MOON,id);
  336. }
  337. }
  338. _moons.swap(nm);
  339. std::vector< std::pair<uint64_t,Address> > cm;
  340. for(std::vector< std::pair<uint64_t,Address> >::const_iterator m(_moonSeeds.begin());m!=_moonSeeds.end();++m) {
  341. if (m->first != id)
  342. cm.push_back(*m);
  343. }
  344. _moonSeeds.swap(cm);
  345. _memoizeUpstreams(tPtr);
  346. }
  347. void Topology::clean(uint64_t now)
  348. {
  349. {
  350. Mutex::Lock _l1(_peers_m);
  351. Mutex::Lock _l2(_upstreams_m);
  352. Hashtable< Address,SharedPtr<Peer> >::Iterator i(_peers);
  353. Address *a = (Address *)0;
  354. SharedPtr<Peer> *p = (SharedPtr<Peer> *)0;
  355. while (i.next(a,p)) {
  356. if ( (!(*p)->isAlive(now)) && (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),*a) == _upstreamAddresses.end()) )
  357. _peers.erase(*a);
  358. }
  359. }
  360. {
  361. Mutex::Lock _l(_paths_m);
  362. Hashtable< Path::HashKey,SharedPtr<Path> >::Iterator i(_paths);
  363. Path::HashKey *k = (Path::HashKey *)0;
  364. SharedPtr<Path> *p = (SharedPtr<Path> *)0;
  365. while (i.next(k,p)) {
  366. if (p->reclaimIfWeak())
  367. _paths.erase(*k);
  368. }
  369. }
  370. }
  371. Identity Topology::_getIdentity(void *tPtr,const Address &zta)
  372. {
  373. char tmp[512];
  374. int n = RR->node->stateObjectGet(tPtr,ZT_STATE_OBJECT_PEER_IDENTITY,zta.toInt(),tmp,sizeof(tmp) - 1);
  375. if (n > 0) {
  376. tmp[n] = (char)0;
  377. try {
  378. return Identity(tmp);
  379. } catch ( ... ) {} // ignore invalid IDs
  380. }
  381. return Identity();
  382. }
  383. void Topology::_memoizeUpstreams(void *tPtr)
  384. {
  385. // assumes _upstreams_m and _peers_m are locked
  386. _upstreamAddresses.clear();
  387. _amRoot = false;
  388. for(std::vector<World::Root>::const_iterator i(_planet.roots().begin());i!=_planet.roots().end();++i) {
  389. if (i->identity == RR->identity) {
  390. _amRoot = true;
  391. } else if (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),i->identity.address()) == _upstreamAddresses.end()) {
  392. _upstreamAddresses.push_back(i->identity.address());
  393. SharedPtr<Peer> &hp = _peers[i->identity.address()];
  394. if (!hp) {
  395. hp = new Peer(RR,RR->identity,i->identity);
  396. saveIdentity(tPtr,i->identity);
  397. }
  398. }
  399. }
  400. for(std::vector<World>::const_iterator m(_moons.begin());m!=_moons.end();++m) {
  401. for(std::vector<World::Root>::const_iterator i(m->roots().begin());i!=m->roots().end();++i) {
  402. if (i->identity == RR->identity) {
  403. _amRoot = true;
  404. } else if (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),i->identity.address()) == _upstreamAddresses.end()) {
  405. _upstreamAddresses.push_back(i->identity.address());
  406. SharedPtr<Peer> &hp = _peers[i->identity.address()];
  407. if (!hp) {
  408. hp = new Peer(RR,RR->identity,i->identity);
  409. saveIdentity(tPtr,i->identity);
  410. }
  411. }
  412. }
  413. }
  414. std::sort(_upstreamAddresses.begin(),_upstreamAddresses.end());
  415. _cor.clear();
  416. for(std::vector<Address>::const_iterator a(_upstreamAddresses.begin());a!=_upstreamAddresses.end();++a) {
  417. if (!_cor.addRepresentative(*a))
  418. break;
  419. }
  420. _cor.sign(RR->identity,RR->node->now());
  421. }
  422. } // namespace ZeroTier