CV1.cpp 70 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152
  1. /*
  2. * Copyright (c)2019 ZeroTier, Inc.
  3. *
  4. * Use of this software is governed by the Business Source License included
  5. * in the LICENSE.TXT file in the project's root directory.
  6. *
  7. * Change Date: 2026-01-01
  8. *
  9. * On the date above, in accordance with the Business Source License, use
  10. * of this software will be governed by version 2.0 of the Apache License.
  11. */
  12. /****/
  13. #include "CV1.hpp"
  14. #ifdef ZT_CONTROLLER_USE_LIBPQ
  15. #include "../node/Constants.hpp"
  16. #include "../node/SHA512.hpp"
  17. #include "../version.h"
  18. #include "CtlUtil.hpp"
  19. #include "EmbeddedNetworkController.hpp"
  20. #include "Redis.hpp"
  21. #include "opentelemetry/trace/provider.h"
  22. #include <chrono>
  23. #include <climits>
  24. #include <iomanip>
  25. #include <libpq-fe.h>
  26. #include <rustybits.h>
  27. #include <sstream>
  28. // #define REDIS_TRACE 1
  29. using json = nlohmann::json;
  30. namespace {
  31. static const int DB_MINIMUM_VERSION = 38;
  32. } // anonymous namespace
  33. using namespace ZeroTier;
  34. using Attrs = std::vector<std::pair<std::string, std::string> >;
  35. using Item = std::pair<std::string, Attrs>;
  36. using ItemStream = std::vector<Item>;
  37. CV1::CV1(const Identity& myId, const char* path, int listenPort, RedisConfig* rc)
  38. : DB()
  39. , _pool()
  40. , _myId(myId)
  41. , _myAddress(myId.address())
  42. , _ready(0)
  43. , _connected(1)
  44. , _run(1)
  45. , _waitNoticePrinted(false)
  46. , _listenPort(listenPort)
  47. , _rc(rc)
  48. , _redis(NULL)
  49. , _cluster(NULL)
  50. , _redisMemberStatus(false)
  51. , _smee(NULL)
  52. {
  53. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  54. auto tracer = provider->GetTracer("cv1");
  55. auto span = tracer->StartSpan("cv1::CV1");
  56. auto scope = tracer->WithActiveSpan(span);
  57. rustybits::init_async_runtime();
  58. char myAddress[64];
  59. _myAddressStr = myId.address().toString(myAddress);
  60. _connString = std::string(path);
  61. auto f = std::make_shared<PostgresConnFactory>(_connString);
  62. _pool =
  63. std::make_shared<ConnectionPool<PostgresConnection> >(15, 5, std::static_pointer_cast<ConnectionFactory>(f));
  64. memset(_ssoPsk, 0, sizeof(_ssoPsk));
  65. char* const ssoPskHex = getenv("ZT_SSO_PSK");
  66. #ifdef ZT_TRACE
  67. fprintf(stderr, "ZT_SSO_PSK: %s\n", ssoPskHex);
  68. #endif
  69. if (ssoPskHex) {
  70. // SECURITY: note that ssoPskHex will always be null-terminated if libc actually
  71. // returns something non-NULL. If the hex encodes something shorter than 48 bytes,
  72. // it will be padded at the end with zeroes. If longer, it'll be truncated.
  73. Utils::unhex(ssoPskHex, _ssoPsk, sizeof(_ssoPsk));
  74. }
  75. const char* redisMemberStatus = getenv("ZT_REDIS_MEMBER_STATUS");
  76. if (redisMemberStatus && (strcmp(redisMemberStatus, "true") == 0)) {
  77. _redisMemberStatus = true;
  78. fprintf(stderr, "Using redis for member status\n");
  79. }
  80. auto c = _pool->borrow();
  81. pqxx::work txn { *c->c };
  82. pqxx::row r { txn.exec1("SELECT version FROM ztc_database") };
  83. int dbVersion = r[0].as<int>();
  84. txn.commit();
  85. if (dbVersion < DB_MINIMUM_VERSION) {
  86. fprintf(
  87. stderr,
  88. "Central database schema version too low. This controller version requires a minimum schema version of "
  89. "%d. Please upgrade your Central instance",
  90. DB_MINIMUM_VERSION);
  91. exit(1);
  92. }
  93. _pool->unborrow(c);
  94. if (_rc != NULL) {
  95. auto innerspan = tracer->StartSpan("cv1::CV1::configureRedis");
  96. auto innerscope = tracer->WithActiveSpan(innerspan);
  97. sw::redis::ConnectionOptions opts;
  98. sw::redis::ConnectionPoolOptions poolOpts;
  99. opts.host = _rc->hostname;
  100. opts.port = _rc->port;
  101. opts.password = _rc->password;
  102. opts.db = 0;
  103. opts.keep_alive = true;
  104. opts.connect_timeout = std::chrono::seconds(3);
  105. poolOpts.size = 25;
  106. poolOpts.wait_timeout = std::chrono::seconds(5);
  107. poolOpts.connection_lifetime = std::chrono::minutes(3);
  108. poolOpts.connection_idle_time = std::chrono::minutes(1);
  109. if (_rc->clusterMode) {
  110. innerspan->SetAttribute("cluster_mode", "true");
  111. fprintf(stderr, "Using Redis in Cluster Mode\n");
  112. _cluster = std::make_shared<sw::redis::RedisCluster>(opts, poolOpts);
  113. }
  114. else {
  115. innerspan->SetAttribute("cluster_mode", "false");
  116. fprintf(stderr, "Using Redis in Standalone Mode\n");
  117. _redis = std::make_shared<sw::redis::Redis>(opts, poolOpts);
  118. }
  119. }
  120. _readyLock.lock();
  121. fprintf(
  122. stderr, "[%s] NOTICE: %.10llx controller PostgreSQL waiting for initial data download..." ZT_EOL_S,
  123. ::_timestr(), (unsigned long long)_myAddress.toInt());
  124. _waitNoticePrinted = true;
  125. initializeNetworks();
  126. initializeMembers();
  127. _heartbeatThread = std::thread(&CV1::heartbeat, this);
  128. _membersDbWatcher = std::thread(&CV1::membersDbWatcher, this);
  129. _networksDbWatcher = std::thread(&CV1::networksDbWatcher, this);
  130. for (int i = 0; i < ZT_CENTRAL_CONTROLLER_COMMIT_THREADS; ++i) {
  131. _commitThread[i] = std::thread(&CV1::commitThread, this);
  132. }
  133. _onlineNotificationThread = std::thread(&CV1::onlineNotificationThread, this);
  134. configureSmee();
  135. }
  136. CV1::~CV1()
  137. {
  138. if (_smee != NULL) {
  139. rustybits::smee_client_delete(_smee);
  140. _smee = NULL;
  141. }
  142. rustybits::shutdown_async_runtime();
  143. _run = 0;
  144. std::this_thread::sleep_for(std::chrono::milliseconds(100));
  145. _heartbeatThread.join();
  146. _membersDbWatcher.join();
  147. _networksDbWatcher.join();
  148. _commitQueue.stop();
  149. for (int i = 0; i < ZT_CENTRAL_CONTROLLER_COMMIT_THREADS; ++i) {
  150. _commitThread[i].join();
  151. }
  152. _onlineNotificationThread.join();
  153. }
  154. void CV1::configureSmee()
  155. {
  156. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  157. auto tracer = provider->GetTracer("cv1");
  158. auto span = tracer->StartSpan("cv1::configureSmee");
  159. auto scope = tracer->WithActiveSpan(span);
  160. const char* TEMPORAL_SCHEME = "ZT_TEMPORAL_SCHEME";
  161. const char* TEMPORAL_HOST = "ZT_TEMPORAL_HOST";
  162. const char* TEMPORAL_PORT = "ZT_TEMPORAL_PORT";
  163. const char* TEMPORAL_NAMESPACE = "ZT_TEMPORAL_NAMESPACE";
  164. const char* SMEE_TASK_QUEUE = "ZT_SMEE_TASK_QUEUE";
  165. const char* scheme = getenv(TEMPORAL_SCHEME);
  166. if (scheme == NULL) {
  167. scheme = "http";
  168. }
  169. const char* host = getenv(TEMPORAL_HOST);
  170. const char* port = getenv(TEMPORAL_PORT);
  171. const char* ns = getenv(TEMPORAL_NAMESPACE);
  172. const char* task_queue = getenv(SMEE_TASK_QUEUE);
  173. if (scheme != NULL && host != NULL && port != NULL && ns != NULL && task_queue != NULL) {
  174. fprintf(stderr, "creating smee client\n");
  175. std::string hostPort =
  176. std::string(scheme) + std::string("://") + std::string(host) + std::string(":") + std::string(port);
  177. this->_smee = rustybits::smee_client_new(hostPort.c_str(), ns, task_queue);
  178. }
  179. else {
  180. fprintf(stderr, "Smee client not configured\n");
  181. }
  182. }
  183. bool CV1::waitForReady()
  184. {
  185. while (_ready < 2) {
  186. _readyLock.lock();
  187. _readyLock.unlock();
  188. }
  189. return true;
  190. }
  191. bool CV1::isReady()
  192. {
  193. return ((_ready == 2) && (_connected));
  194. }
  195. bool CV1::save(nlohmann::json& record, bool notifyListeners)
  196. {
  197. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  198. auto tracer = provider->GetTracer("cv1");
  199. auto span = tracer->StartSpan("cv1::save");
  200. auto scope = tracer->WithActiveSpan(span);
  201. bool modified = false;
  202. try {
  203. if (! record.is_object()) {
  204. fprintf(stderr, "record is not an object?!?\n");
  205. return false;
  206. }
  207. const std::string objtype = record["objtype"];
  208. if (objtype == "network") {
  209. // fprintf(stderr, "network save\n");
  210. const uint64_t nwid = OSUtils::jsonIntHex(record["id"], 0ULL);
  211. if (nwid) {
  212. nlohmann::json old;
  213. get(nwid, old);
  214. if ((! old.is_object()) || (! _compareRecords(old, record))) {
  215. record["revision"] = OSUtils::jsonInt(record["revision"], 0ULL) + 1ULL;
  216. _commitQueue.post(std::pair<nlohmann::json, bool>(record, notifyListeners));
  217. modified = true;
  218. }
  219. }
  220. }
  221. else if (objtype == "member") {
  222. std::string networkId = record["nwid"];
  223. std::string memberId = record["id"];
  224. const uint64_t nwid = OSUtils::jsonIntHex(record["nwid"], 0ULL);
  225. const uint64_t id = OSUtils::jsonIntHex(record["id"], 0ULL);
  226. // fprintf(stderr, "member save %s-%s\n", networkId.c_str(), memberId.c_str());
  227. if ((id) && (nwid)) {
  228. nlohmann::json network, old;
  229. get(nwid, network, id, old);
  230. if ((! old.is_object()) || (! _compareRecords(old, record))) {
  231. // fprintf(stderr, "commit queue post\n");
  232. record["revision"] = OSUtils::jsonInt(record["revision"], 0ULL) + 1ULL;
  233. _commitQueue.post(std::pair<nlohmann::json, bool>(record, notifyListeners));
  234. modified = true;
  235. }
  236. else {
  237. // fprintf(stderr, "no change\n");
  238. }
  239. }
  240. }
  241. else {
  242. fprintf(stderr, "uhh waaat\n");
  243. }
  244. }
  245. catch (std::exception& e) {
  246. fprintf(stderr, "Error on PostgreSQL::save: %s\n", e.what());
  247. }
  248. catch (...) {
  249. fprintf(stderr, "Unknown error on PostgreSQL::save\n");
  250. }
  251. return modified;
  252. }
  253. void CV1::eraseNetwork(const uint64_t networkId)
  254. {
  255. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  256. auto tracer = provider->GetTracer("cv1");
  257. auto span = tracer->StartSpan("cv1::eraseNetwork");
  258. auto scope = tracer->WithActiveSpan(span);
  259. char networkIdStr[17];
  260. span->SetAttribute("network_id", Utils::hex(networkId, networkIdStr));
  261. fprintf(stderr, "PostgreSQL::eraseNetwork\n");
  262. char tmp2[24];
  263. waitForReady();
  264. Utils::hex(networkId, tmp2);
  265. std::pair<nlohmann::json, bool> tmp;
  266. tmp.first["id"] = tmp2;
  267. tmp.first["objtype"] = "_delete_network";
  268. tmp.second = true;
  269. _commitQueue.post(tmp);
  270. nlohmann::json nullJson;
  271. _networkChanged(tmp.first, nullJson, true);
  272. }
  273. void CV1::eraseMember(const uint64_t networkId, const uint64_t memberId)
  274. {
  275. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  276. auto tracer = provider->GetTracer("cv1");
  277. auto span = tracer->StartSpan("cv1::eraseMember");
  278. auto scope = tracer->WithActiveSpan(span);
  279. char networkIdStr[17];
  280. char memberIdStr[11];
  281. span->SetAttribute("network_id", Utils::hex(networkId, networkIdStr));
  282. span->SetAttribute("member_id", Utils::hex10(memberId, memberIdStr));
  283. fprintf(stderr, "PostgreSQL::eraseMember\n");
  284. char tmp2[24];
  285. waitForReady();
  286. std::pair<nlohmann::json, bool> tmp, nw;
  287. Utils::hex(networkId, tmp2);
  288. tmp.first["nwid"] = tmp2;
  289. Utils::hex(memberId, tmp2);
  290. tmp.first["id"] = tmp2;
  291. tmp.first["objtype"] = "_delete_member";
  292. tmp.second = true;
  293. _commitQueue.post(tmp);
  294. nlohmann::json nullJson;
  295. _memberChanged(tmp.first, nullJson, true);
  296. }
  297. void CV1::nodeIsOnline(
  298. const uint64_t networkId,
  299. const uint64_t memberId,
  300. const InetAddress& physicalAddress,
  301. const char* osArch)
  302. {
  303. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  304. auto tracer = provider->GetTracer("cv1");
  305. auto span = tracer->StartSpan("cv1::nodeIsOnline");
  306. auto scope = tracer->WithActiveSpan(span);
  307. char networkIdStr[17];
  308. char memberIdStr[11];
  309. char ipStr[INET6_ADDRSTRLEN];
  310. span->SetAttribute("network_id", Utils::hex(networkId, networkIdStr));
  311. span->SetAttribute("member_id", Utils::hex10(memberId, memberIdStr));
  312. span->SetAttribute("physical_address", physicalAddress.toString(ipStr));
  313. span->SetAttribute("os_arch", osArch);
  314. std::lock_guard<std::mutex> l(_lastOnline_l);
  315. NodeOnlineRecord& i = _lastOnline[std::pair<uint64_t, uint64_t>(networkId, memberId)];
  316. i.lastSeen = OSUtils::now();
  317. if (physicalAddress) {
  318. i.physicalAddress = physicalAddress;
  319. }
  320. i.osArch = std::string(osArch);
  321. }
  322. void CV1::nodeIsOnline(const uint64_t networkId, const uint64_t memberId, const InetAddress& physicalAddress)
  323. {
  324. this->nodeIsOnline(networkId, memberId, physicalAddress, "unknown/unknown");
  325. }
  326. AuthInfo CV1::getSSOAuthInfo(const nlohmann::json& member, const std::string& redirectURL)
  327. {
  328. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  329. auto tracer = provider->GetTracer("cv1");
  330. auto span = tracer->StartSpan("cv1::getSSOAuthInfo");
  331. auto scope = tracer->WithActiveSpan(span);
  332. Metrics::db_get_sso_info++;
  333. // NONCE is just a random character string. no semantic meaning
  334. // state = HMAC SHA384 of Nonce based on shared sso key
  335. //
  336. // need nonce timeout in database? make sure it's used within X time
  337. // X is 5 minutes for now. Make configurable later?
  338. //
  339. // how do we tell when a nonce is used? if auth_expiration_time is set
  340. std::string networkId = member["nwid"];
  341. std::string memberId = member["id"];
  342. char authenticationURL[4096] = { 0 };
  343. AuthInfo info;
  344. info.enabled = true;
  345. // if (memberId == "a10dccea52" && networkId == "8056c2e21c24673d") {
  346. // fprintf(stderr, "invalid authinfo for grant's machine\n");
  347. // info.version=1;
  348. // return info;
  349. // }
  350. // fprintf(stderr, "PostgreSQL::updateMemberOnLoad: %s-%s\n", networkId.c_str(), memberId.c_str());
  351. std::shared_ptr<PostgresConnection> c;
  352. try {
  353. c = _pool->borrow();
  354. pqxx::work w(*c->c);
  355. char nonceBytes[16] = { 0 };
  356. std::string nonce = "";
  357. // check if the member exists first.
  358. pqxx::row count = w.exec_params1(
  359. "SELECT count(id) FROM ztc_member WHERE id = $1 AND network_id = $2 AND deleted = false", memberId,
  360. networkId);
  361. if (count[0].as<int>() == 1) {
  362. // get active nonce, if exists.
  363. pqxx::result r = w.exec_params(
  364. "SELECT nonce FROM ztc_sso_expiry "
  365. "WHERE network_id = $1 AND member_id = $2 "
  366. "AND ((NOW() AT TIME ZONE 'UTC') <= authentication_expiry_time) AND ((NOW() AT TIME ZONE 'UTC') <= "
  367. "nonce_expiration)",
  368. networkId, memberId);
  369. if (r.size() == 0) {
  370. // no active nonce.
  371. // find an unused nonce, if one exists.
  372. pqxx::result r = w.exec_params(
  373. "SELECT nonce FROM ztc_sso_expiry "
  374. "WHERE network_id = $1 AND member_id = $2 "
  375. "AND authentication_expiry_time IS NULL AND ((NOW() AT TIME ZONE 'UTC') <= nonce_expiration)",
  376. networkId, memberId);
  377. if (r.size() == 1) {
  378. // we have an existing nonce. Use it
  379. nonce = r.at(0)[0].as<std::string>();
  380. Utils::unhex(nonce.c_str(), nonceBytes, sizeof(nonceBytes));
  381. }
  382. else if (r.empty()) {
  383. // create a nonce
  384. Utils::getSecureRandom(nonceBytes, 16);
  385. char nonceBuf[64] = { 0 };
  386. Utils::hex(nonceBytes, sizeof(nonceBytes), nonceBuf);
  387. nonce = std::string(nonceBuf);
  388. pqxx::result ir = w.exec_params0(
  389. "INSERT INTO ztc_sso_expiry "
  390. "(nonce, nonce_expiration, network_id, member_id) VALUES "
  391. "($1, TO_TIMESTAMP($2::double precision/1000), $3, $4)",
  392. nonce, OSUtils::now() + 300000, networkId, memberId);
  393. w.commit();
  394. }
  395. else {
  396. // > 1 ?!? Thats an error!
  397. fprintf(stderr, "> 1 unused nonce!\n");
  398. exit(6);
  399. }
  400. }
  401. else if (r.size() == 1) {
  402. nonce = r.at(0)[0].as<std::string>();
  403. Utils::unhex(nonce.c_str(), nonceBytes, sizeof(nonceBytes));
  404. }
  405. else {
  406. // more than 1 nonce in use? Uhhh...
  407. fprintf(stderr, "> 1 nonce in use for network member?!?\n");
  408. exit(7);
  409. }
  410. r = w.exec_params(
  411. "SELECT oc.client_id, oc.authorization_endpoint, oc.issuer, oc.provider, oc.sso_impl_version "
  412. "FROM ztc_network AS n "
  413. "INNER JOIN ztc_org o "
  414. " ON o.owner_id = n.owner_id "
  415. "LEFT OUTER JOIN ztc_network_oidc_config noc "
  416. " ON noc.network_id = n.id "
  417. "LEFT OUTER JOIN ztc_oidc_config oc "
  418. " ON noc.client_id = oc.client_id AND oc.org_id = o.org_id "
  419. "WHERE n.id = $1 AND n.sso_enabled = true",
  420. networkId);
  421. std::string client_id = "";
  422. std::string authorization_endpoint = "";
  423. std::string issuer = "";
  424. std::string provider = "";
  425. uint64_t sso_version = 0;
  426. if (r.size() == 1) {
  427. client_id = r.at(0)[0].as<std::optional<std::string> >().value_or("");
  428. authorization_endpoint = r.at(0)[1].as<std::optional<std::string> >().value_or("");
  429. issuer = r.at(0)[2].as<std::optional<std::string> >().value_or("");
  430. provider = r.at(0)[3].as<std::optional<std::string> >().value_or("");
  431. sso_version = r.at(0)[4].as<std::optional<uint64_t> >().value_or(1);
  432. }
  433. else if (r.size() > 1) {
  434. fprintf(
  435. stderr, "ERROR: More than one auth endpoint for an organization?!?!? NetworkID: %s\n",
  436. networkId.c_str());
  437. }
  438. else {
  439. fprintf(stderr, "No client or auth endpoint?!?\n");
  440. }
  441. info.version = sso_version;
  442. // no catch all else because we don't actually care if no records exist here. just continue as normal.
  443. if ((! client_id.empty()) && (! authorization_endpoint.empty())) {
  444. uint8_t state[48];
  445. HMACSHA384(_ssoPsk, nonceBytes, sizeof(nonceBytes), state);
  446. char state_hex[256];
  447. Utils::hex(state, 48, state_hex);
  448. if (info.version == 0) {
  449. char url[2048] = { 0 };
  450. OSUtils::ztsnprintf(
  451. url, sizeof(authenticationURL),
  452. "%s?response_type=id_token&response_mode=form_post&scope=openid+email+profile&redirect_uri=%s&"
  453. "nonce=%s&state=%s&client_id=%s",
  454. authorization_endpoint.c_str(), url_encode(redirectURL).c_str(), nonce.c_str(), state_hex,
  455. client_id.c_str());
  456. info.authenticationURL = std::string(url);
  457. }
  458. else if (info.version == 1) {
  459. info.ssoClientID = client_id;
  460. info.issuerURL = issuer;
  461. info.ssoProvider = provider;
  462. info.ssoNonce = nonce;
  463. info.ssoState = std::string(state_hex) + "_" + networkId;
  464. info.centralAuthURL = redirectURL;
  465. #ifdef ZT_DEBUG
  466. fprintf(
  467. stderr,
  468. "ssoClientID: %s\nissuerURL: %s\nssoNonce: %s\nssoState: %s\ncentralAuthURL: %s\nprovider: "
  469. "%s\n",
  470. info.ssoClientID.c_str(), info.issuerURL.c_str(), info.ssoNonce.c_str(), info.ssoState.c_str(),
  471. info.centralAuthURL.c_str(), provider.c_str());
  472. #endif
  473. }
  474. }
  475. else {
  476. fprintf(
  477. stderr, "client_id: %s\nauthorization_endpoint: %s\n", client_id.c_str(),
  478. authorization_endpoint.c_str());
  479. }
  480. }
  481. _pool->unborrow(c);
  482. }
  483. catch (std::exception& e) {
  484. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  485. fprintf(stderr, "ERROR: Error updating member on load for network %s: %s\n", networkId.c_str(), e.what());
  486. }
  487. return info; // std::string(authenticationURL);
  488. }
  489. void CV1::initializeNetworks()
  490. {
  491. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  492. auto tracer = provider->GetTracer("cv1");
  493. auto span = tracer->StartSpan("cv1::initializeNetworks");
  494. auto scope = tracer->WithActiveSpan(span);
  495. try {
  496. std::string setKey = "networks:{" + _myAddressStr + "}";
  497. fprintf(stderr, "Initializing Networks...\n");
  498. if (_redisMemberStatus) {
  499. fprintf(stderr, "Init Redis for networks...\n");
  500. try {
  501. if (_rc->clusterMode) {
  502. _cluster->del(setKey);
  503. }
  504. else {
  505. _redis->del(setKey);
  506. }
  507. }
  508. catch (sw::redis::Error& e) {
  509. // ignore. if this key doesn't exist, there's no reason to delete it
  510. }
  511. }
  512. std::unordered_set<std::string> networkSet;
  513. char qbuf[2048] = { 0 };
  514. sprintf(
  515. qbuf,
  516. "SELECT n.id, (EXTRACT(EPOCH FROM n.creation_time AT TIME ZONE 'UTC')*1000)::bigint as creation_time, "
  517. "n.capabilities, "
  518. "n.enable_broadcast, (EXTRACT(EPOCH FROM n.last_modified AT TIME ZONE 'UTC')*1000)::bigint AS "
  519. "last_modified, n.mtu, n.multicast_limit, n.name, n.private, n.remote_trace_level, "
  520. "n.remote_trace_target, n.revision, n.rules, n.tags, n.v4_assign_mode, n.v6_assign_mode, n.sso_enabled, "
  521. "(CASE WHEN n.sso_enabled THEN noc.client_id ELSE NULL END) as client_id, "
  522. "(CASE WHEN n.sso_enabled THEN oc.authorization_endpoint ELSE NULL END) as authorization_endpoint, "
  523. "(CASE WHEN n.sso_enabled THEN oc.provider ELSE NULL END) as provider, d.domain, d.servers, "
  524. "ARRAY(SELECT CONCAT(host(ip_range_start),'|', host(ip_range_end)) FROM ztc_network_assignment_pool WHERE "
  525. "network_id = n.id) AS assignment_pool, "
  526. "ARRAY(SELECT CONCAT(host(address),'/',bits::text,'|',COALESCE(host(via), 'NULL'))FROM ztc_network_route "
  527. "WHERE network_id = n.id) AS routes "
  528. "FROM ztc_network n "
  529. "LEFT OUTER JOIN ztc_org o "
  530. " ON o.owner_id = n.owner_id "
  531. "LEFT OUTER JOIN ztc_network_oidc_config noc "
  532. " ON noc.network_id = n.id "
  533. "LEFT OUTER JOIN ztc_oidc_config oc "
  534. " ON noc.client_id = oc.client_id AND oc.org_id = o.org_id "
  535. "LEFT OUTER JOIN ztc_network_dns d "
  536. " ON d.network_id = n.id "
  537. "WHERE deleted = false AND controller_id = '%s'",
  538. _myAddressStr.c_str());
  539. auto c = _pool->borrow();
  540. auto c2 = _pool->borrow();
  541. pqxx::work w { *c->c };
  542. fprintf(stderr, "Load networks from psql...\n");
  543. auto stream = pqxx::stream_from::query(w, qbuf);
  544. std::tuple<
  545. std::string // network ID
  546. ,
  547. std::optional<int64_t> // creationTime
  548. ,
  549. std::optional<std::string> // capabilities
  550. ,
  551. std::optional<bool> // enableBroadcast
  552. ,
  553. std::optional<uint64_t> // lastModified
  554. ,
  555. std::optional<int> // mtu
  556. ,
  557. std::optional<int> // multicastLimit
  558. ,
  559. std::optional<std::string> // name
  560. ,
  561. bool // private
  562. ,
  563. std::optional<int> // remoteTraceLevel
  564. ,
  565. std::optional<std::string> // remoteTraceTarget
  566. ,
  567. std::optional<uint64_t> // revision
  568. ,
  569. std::optional<std::string> // rules
  570. ,
  571. std::optional<std::string> // tags
  572. ,
  573. std::optional<std::string> // v4AssignMode
  574. ,
  575. std::optional<std::string> // v6AssignMode
  576. ,
  577. std::optional<bool> // ssoEnabled
  578. ,
  579. std::optional<std::string> // clientId
  580. ,
  581. std::optional<std::string> // authorizationEndpoint
  582. ,
  583. std::optional<std::string> // ssoProvider
  584. ,
  585. std::optional<std::string> // domain
  586. ,
  587. std::optional<std::string> // servers
  588. ,
  589. std::string // assignmentPoolString
  590. ,
  591. std::string // routeString
  592. >
  593. row;
  594. uint64_t count = 0;
  595. auto tmp = std::chrono::high_resolution_clock::now();
  596. uint64_t total = 0;
  597. while (stream >> row) {
  598. auto start = std::chrono::high_resolution_clock::now();
  599. json empty;
  600. json config;
  601. initNetwork(config);
  602. std::string nwid = std::get<0>(row);
  603. std::optional<int64_t> creationTime = std::get<1>(row);
  604. std::optional<std::string> capabilities = std::get<2>(row);
  605. std::optional<bool> enableBroadcast = std::get<3>(row);
  606. std::optional<uint64_t> lastModified = std::get<4>(row);
  607. std::optional<int> mtu = std::get<5>(row);
  608. std::optional<int> multicastLimit = std::get<6>(row);
  609. std::optional<std::string> name = std::get<7>(row);
  610. bool isPrivate = std::get<8>(row);
  611. std::optional<int> remoteTraceLevel = std::get<9>(row);
  612. std::optional<std::string> remoteTraceTarget = std::get<10>(row);
  613. std::optional<uint64_t> revision = std::get<11>(row);
  614. std::optional<std::string> rules = std::get<12>(row);
  615. std::optional<std::string> tags = std::get<13>(row);
  616. std::optional<std::string> v4AssignMode = std::get<14>(row);
  617. std::optional<std::string> v6AssignMode = std::get<15>(row);
  618. std::optional<bool> ssoEnabled = std::get<16>(row);
  619. std::optional<std::string> clientId = std::get<17>(row);
  620. std::optional<std::string> authorizationEndpoint = std::get<18>(row);
  621. std::optional<std::string> ssoProvider = std::get<19>(row);
  622. std::optional<std::string> dnsDomain = std::get<20>(row);
  623. std::optional<std::string> dnsServers = std::get<21>(row);
  624. std::string assignmentPoolString = std::get<22>(row);
  625. std::string routesString = std::get<23>(row);
  626. config["id"] = nwid;
  627. config["nwid"] = nwid;
  628. config["creationTime"] = creationTime.value_or(0);
  629. config["capabilities"] = json::parse(capabilities.value_or("[]"));
  630. config["enableBroadcast"] = enableBroadcast.value_or(false);
  631. config["lastModified"] = lastModified.value_or(0);
  632. config["mtu"] = mtu.value_or(2800);
  633. config["multicastLimit"] = multicastLimit.value_or(64);
  634. config["name"] = name.value_or("");
  635. config["private"] = isPrivate;
  636. config["remoteTraceLevel"] = remoteTraceLevel.value_or(0);
  637. config["remoteTraceTarget"] = remoteTraceTarget.value_or("");
  638. config["revision"] = revision.value_or(0);
  639. config["rules"] = json::parse(rules.value_or("[]"));
  640. config["tags"] = json::parse(tags.value_or("[]"));
  641. config["v4AssignMode"] = json::parse(v4AssignMode.value_or("{}"));
  642. config["v6AssignMode"] = json::parse(v6AssignMode.value_or("{}"));
  643. config["ssoEnabled"] = ssoEnabled.value_or(false);
  644. config["objtype"] = "network";
  645. config["ipAssignmentPools"] = json::array();
  646. config["routes"] = json::array();
  647. config["clientId"] = clientId.value_or("");
  648. config["authorizationEndpoint"] = authorizationEndpoint.value_or("");
  649. config["provider"] = ssoProvider.value_or("");
  650. networkSet.insert(nwid);
  651. if (dnsDomain.has_value()) {
  652. std::string serverList = dnsServers.value();
  653. json obj;
  654. auto servers = json::array();
  655. if (serverList.rfind("{", 0) != std::string::npos) {
  656. serverList = serverList.substr(1, serverList.size() - 2);
  657. std::stringstream ss(serverList);
  658. while (ss.good()) {
  659. std::string server;
  660. std::getline(ss, server, ',');
  661. servers.push_back(server);
  662. }
  663. }
  664. obj["domain"] = dnsDomain.value();
  665. obj["servers"] = servers;
  666. config["dns"] = obj;
  667. }
  668. config["ipAssignmentPools"] = json::array();
  669. if (assignmentPoolString != "{}") {
  670. std::string tmp = assignmentPoolString.substr(1, assignmentPoolString.size() - 2);
  671. std::vector<std::string> assignmentPools = split(tmp, ',');
  672. for (auto it = assignmentPools.begin(); it != assignmentPools.end(); ++it) {
  673. std::vector<std::string> r = split(*it, '|');
  674. json ip;
  675. ip["ipRangeStart"] = r[0];
  676. ip["ipRangeEnd"] = r[1];
  677. config["ipAssignmentPools"].push_back(ip);
  678. }
  679. }
  680. config["routes"] = json::array();
  681. if (routesString != "{}") {
  682. std::string tmp = routesString.substr(1, routesString.size() - 2);
  683. std::vector<std::string> routes = split(tmp, ',');
  684. for (auto it = routes.begin(); it != routes.end(); ++it) {
  685. std::vector<std::string> r = split(*it, '|');
  686. json route;
  687. route["target"] = r[0];
  688. route["via"] = ((route["via"] == "NULL") ? nullptr : r[1]);
  689. config["routes"].push_back(route);
  690. }
  691. }
  692. Metrics::network_count++;
  693. _networkChanged(empty, config, false);
  694. auto end = std::chrono::high_resolution_clock::now();
  695. auto dur = std::chrono::duration_cast<std::chrono::microseconds>(end - start);
  696. ;
  697. total += dur.count();
  698. ++count;
  699. if (count > 0 && count % 10000 == 0) {
  700. fprintf(stderr, "Averaging %llu us per network\n", (total / count));
  701. }
  702. }
  703. if (count > 0) {
  704. fprintf(stderr, "Took %llu us per network to load\n", (total / count));
  705. }
  706. stream.complete();
  707. w.commit();
  708. _pool->unborrow(c2);
  709. _pool->unborrow(c);
  710. fprintf(stderr, "done.\n");
  711. if (! networkSet.empty()) {
  712. if (_redisMemberStatus) {
  713. fprintf(stderr, "adding networks to redis...\n");
  714. if (_rc->clusterMode) {
  715. auto tx = _cluster->transaction(_myAddressStr, true, false);
  716. uint64_t count = 0;
  717. for (std::string nwid : networkSet) {
  718. tx.sadd(setKey, nwid);
  719. if (++count % 30000 == 0) {
  720. tx.exec();
  721. tx = _cluster->transaction(_myAddressStr, true, false);
  722. }
  723. }
  724. tx.exec();
  725. }
  726. else {
  727. auto tx = _redis->transaction(true, false);
  728. uint64_t count = 0;
  729. for (std::string nwid : networkSet) {
  730. tx.sadd(setKey, nwid);
  731. if (++count % 30000 == 0) {
  732. tx.exec();
  733. tx = _redis->transaction(true, false);
  734. }
  735. }
  736. tx.exec();
  737. }
  738. fprintf(stderr, "done.\n");
  739. }
  740. }
  741. if (++this->_ready == 2) {
  742. if (_waitNoticePrinted) {
  743. fprintf(
  744. stderr, "[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S, _timestr(),
  745. (unsigned long long)_myAddress.toInt());
  746. }
  747. _readyLock.unlock();
  748. }
  749. fprintf(stderr, "network init done.\n");
  750. }
  751. catch (sw::redis::Error& e) {
  752. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  753. fprintf(stderr, "ERROR: Error initializing networks in Redis: %s\n", e.what());
  754. std::this_thread::sleep_for(std::chrono::milliseconds(5000));
  755. exit(-1);
  756. }
  757. catch (std::exception& e) {
  758. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  759. fprintf(stderr, "ERROR: Error initializing networks: %s\n", e.what());
  760. std::this_thread::sleep_for(std::chrono::milliseconds(5000));
  761. exit(-1);
  762. }
  763. }
  764. void CV1::initializeMembers()
  765. {
  766. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  767. auto tracer = provider->GetTracer("cv1");
  768. auto span = tracer->StartSpan("cv1::initializeMembers");
  769. auto scope = tracer->WithActiveSpan(span);
  770. std::string memberId;
  771. std::string networkId;
  772. try {
  773. std::unordered_map<std::string, std::string> networkMembers;
  774. fprintf(stderr, "Initializing Members...\n");
  775. std::string setKeyBase = "network-nodes-all:{" + _myAddressStr + "}:";
  776. if (_redisMemberStatus) {
  777. fprintf(stderr, "Initialize Redis for members...\n");
  778. std::unique_lock<std::shared_mutex> l(_networks_l);
  779. std::unordered_set<std::string> deletes;
  780. for (auto it : _networks) {
  781. uint64_t nwid_i = it.first;
  782. char nwidTmp[64] = { 0 };
  783. OSUtils::ztsnprintf(nwidTmp, sizeof(nwidTmp), "%.16llx", nwid_i);
  784. std::string nwid(nwidTmp);
  785. std::string key = setKeyBase + nwid;
  786. deletes.insert(key);
  787. }
  788. if (! deletes.empty()) {
  789. try {
  790. if (_rc->clusterMode) {
  791. auto tx = _cluster->transaction(_myAddressStr, true, false);
  792. for (std::string k : deletes) {
  793. tx.del(k);
  794. }
  795. tx.exec();
  796. }
  797. else {
  798. auto tx = _redis->transaction(true, false);
  799. for (std::string k : deletes) {
  800. tx.del(k);
  801. }
  802. tx.exec();
  803. }
  804. }
  805. catch (sw::redis::Error& e) {
  806. // ignore
  807. }
  808. }
  809. }
  810. char qbuf[2048];
  811. sprintf(
  812. qbuf,
  813. "SELECT m.id, m.network_id, m.active_bridge, m.authorized, m.capabilities, "
  814. "(EXTRACT(EPOCH FROM m.creation_time AT TIME ZONE 'UTC')*1000)::bigint, m.identity, "
  815. "(EXTRACT(EPOCH FROM m.last_authorized_time AT TIME ZONE 'UTC')*1000)::bigint, "
  816. "(EXTRACT(EPOCH FROM m.last_deauthorized_time AT TIME ZONE 'UTC')*1000)::bigint, "
  817. "m.remote_trace_level, m.remote_trace_target, m.tags, m.v_major, m.v_minor, m.v_rev, m.v_proto, "
  818. "m.no_auto_assign_ips, m.revision, m.sso_exempt, "
  819. "(CASE WHEN n.sso_enabled = TRUE AND m.sso_exempt = FALSE THEN "
  820. " ( "
  821. " SELECT (EXTRACT(EPOCH FROM e.authentication_expiry_time)*1000)::bigint "
  822. " FROM ztc_sso_expiry e "
  823. " INNER JOIN ztc_network n1 "
  824. " ON n1.id = e.network_id AND n1.deleted = TRUE "
  825. " WHERE e.network_id = m.network_id AND e.member_id = m.id AND n.sso_enabled = TRUE AND "
  826. "e.authentication_expiry_time IS NOT NULL "
  827. " ORDER BY e.authentication_expiry_time DESC LIMIT 1 "
  828. " ) "
  829. " ELSE NULL "
  830. " END) AS authentication_expiry_time, "
  831. "ARRAY(SELECT DISTINCT address FROM ztc_member_ip_assignment WHERE member_id = m.id AND network_id = "
  832. "m.network_id) AS assigned_addresses "
  833. "FROM ztc_member m "
  834. "INNER JOIN ztc_network n "
  835. " ON n.id = m.network_id "
  836. "WHERE n.controller_id = '%s' AND n.deleted = FALSE AND m.deleted = FALSE",
  837. _myAddressStr.c_str());
  838. auto c = _pool->borrow();
  839. auto c2 = _pool->borrow();
  840. pqxx::work w { *c->c };
  841. fprintf(stderr, "Load members from psql...\n");
  842. auto stream = pqxx::stream_from::query(w, qbuf);
  843. std::tuple<
  844. std::string // memberId
  845. ,
  846. std::string // memberId
  847. ,
  848. std::optional<bool> // activeBridge
  849. ,
  850. std::optional<bool> // authorized
  851. ,
  852. std::optional<std::string> // capabilities
  853. ,
  854. std::optional<uint64_t> // creationTime
  855. ,
  856. std::optional<std::string> // identity
  857. ,
  858. std::optional<uint64_t> // lastAuthorizedTime
  859. ,
  860. std::optional<uint64_t> // lastDeauthorizedTime
  861. ,
  862. std::optional<int> // remoteTraceLevel
  863. ,
  864. std::optional<std::string> // remoteTraceTarget
  865. ,
  866. std::optional<std::string> // tags
  867. ,
  868. std::optional<int> // vMajor
  869. ,
  870. std::optional<int> // vMinor
  871. ,
  872. std::optional<int> // vRev
  873. ,
  874. std::optional<int> // vProto
  875. ,
  876. std::optional<bool> // noAutoAssignIps
  877. ,
  878. std::optional<uint64_t> // revision
  879. ,
  880. std::optional<bool> // ssoExempt
  881. ,
  882. std::optional<uint64_t> // authenticationExpiryTime
  883. ,
  884. std::string // assignedAddresses
  885. >
  886. row;
  887. uint64_t count = 0;
  888. auto tmp = std::chrono::high_resolution_clock::now();
  889. uint64_t total = 0;
  890. while (stream >> row) {
  891. auto start = std::chrono::high_resolution_clock::now();
  892. json empty;
  893. json config;
  894. initMember(config);
  895. memberId = std::get<0>(row);
  896. networkId = std::get<1>(row);
  897. std::optional<bool> activeBridge = std::get<2>(row);
  898. std::optional<bool> authorized = std::get<3>(row);
  899. std::optional<std::string> capabilities = std::get<4>(row);
  900. std::optional<uint64_t> creationTime = std::get<5>(row);
  901. std::optional<std::string> identity = std::get<6>(row);
  902. std::optional<uint64_t> lastAuthorizedTime = std::get<7>(row);
  903. std::optional<uint64_t> lastDeauthorizedTime = std::get<8>(row);
  904. std::optional<int> remoteTraceLevel = std::get<9>(row);
  905. std::optional<std::string> remoteTraceTarget = std::get<10>(row);
  906. std::optional<std::string> tags = std::get<11>(row);
  907. std::optional<int> vMajor = std::get<12>(row);
  908. std::optional<int> vMinor = std::get<13>(row);
  909. std::optional<int> vRev = std::get<14>(row);
  910. std::optional<int> vProto = std::get<15>(row);
  911. std::optional<bool> noAutoAssignIps = std::get<16>(row);
  912. std::optional<uint64_t> revision = std::get<17>(row);
  913. std::optional<bool> ssoExempt = std::get<18>(row);
  914. std::optional<uint64_t> authenticationExpiryTime = std::get<19>(row);
  915. std::string assignedAddresses = std::get<20>(row);
  916. networkMembers.insert(std::pair<std::string, std::string>(setKeyBase + networkId, memberId));
  917. config["id"] = memberId;
  918. config["address"] = memberId;
  919. config["nwid"] = networkId;
  920. config["activeBridge"] = activeBridge.value_or(false);
  921. config["authorized"] = authorized.value_or(false);
  922. config["capabilities"] = json::parse(capabilities.value_or("[]"));
  923. config["creationTime"] = creationTime.value_or(0);
  924. config["identity"] = identity.value_or("");
  925. config["lastAuthorizedTime"] = lastAuthorizedTime.value_or(0);
  926. config["lastDeauthorizedTime"] = lastDeauthorizedTime.value_or(0);
  927. config["remoteTraceLevel"] = remoteTraceLevel.value_or(0);
  928. config["remoteTraceTarget"] = remoteTraceTarget.value_or("");
  929. config["tags"] = json::parse(tags.value_or("[]"));
  930. config["vMajor"] = vMajor.value_or(-1);
  931. config["vMinor"] = vMinor.value_or(-1);
  932. config["vRev"] = vRev.value_or(-1);
  933. config["vProto"] = vProto.value_or(-1);
  934. config["noAutoAssignIps"] = noAutoAssignIps.value_or(false);
  935. config["revision"] = revision.value_or(0);
  936. config["ssoExempt"] = ssoExempt.value_or(false);
  937. config["authenticationExpiryTime"] = authenticationExpiryTime.value_or(0);
  938. config["objtype"] = "member";
  939. config["ipAssignments"] = json::array();
  940. if (assignedAddresses != "{}") {
  941. std::string tmp = assignedAddresses.substr(1, assignedAddresses.size() - 2);
  942. std::vector<std::string> addrs = split(tmp, ',');
  943. for (auto it = addrs.begin(); it != addrs.end(); ++it) {
  944. config["ipAssignments"].push_back(*it);
  945. }
  946. }
  947. Metrics::member_count++;
  948. _memberChanged(empty, config, false);
  949. memberId = "";
  950. networkId = "";
  951. auto end = std::chrono::high_resolution_clock::now();
  952. auto dur = std::chrono::duration_cast<std::chrono::microseconds>(end - start);
  953. total += dur.count();
  954. ++count;
  955. if (count > 0 && count % 10000 == 0) {
  956. fprintf(stderr, "Averaging %llu us per member\n", (total / count));
  957. }
  958. }
  959. if (count > 0) {
  960. fprintf(stderr, "Took %llu us per member to load\n", (total / count));
  961. }
  962. stream.complete();
  963. w.commit();
  964. _pool->unborrow(c2);
  965. _pool->unborrow(c);
  966. fprintf(stderr, "done.\n");
  967. if (! networkMembers.empty()) {
  968. if (_redisMemberStatus) {
  969. fprintf(stderr, "Load member data into redis...\n");
  970. if (_rc->clusterMode) {
  971. auto tx = _cluster->transaction(_myAddressStr, true, false);
  972. uint64_t count = 0;
  973. for (auto it : networkMembers) {
  974. tx.sadd(it.first, it.second);
  975. if (++count % 30000 == 0) {
  976. tx.exec();
  977. tx = _cluster->transaction(_myAddressStr, true, false);
  978. }
  979. }
  980. tx.exec();
  981. }
  982. else {
  983. auto tx = _redis->transaction(true, false);
  984. uint64_t count = 0;
  985. for (auto it : networkMembers) {
  986. tx.sadd(it.first, it.second);
  987. if (++count % 30000 == 0) {
  988. tx.exec();
  989. tx = _redis->transaction(true, false);
  990. }
  991. }
  992. tx.exec();
  993. }
  994. fprintf(stderr, "done.\n");
  995. }
  996. }
  997. fprintf(stderr, "Done loading members...\n");
  998. if (++this->_ready == 2) {
  999. if (_waitNoticePrinted) {
  1000. fprintf(
  1001. stderr, "[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S, _timestr(),
  1002. (unsigned long long)_myAddress.toInt());
  1003. }
  1004. _readyLock.unlock();
  1005. }
  1006. }
  1007. catch (sw::redis::Error& e) {
  1008. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1009. fprintf(stderr, "ERROR: Error initializing members (redis): %s\n", e.what());
  1010. exit(-1);
  1011. }
  1012. catch (std::exception& e) {
  1013. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1014. fprintf(stderr, "ERROR: Error initializing member: %s-%s %s\n", networkId.c_str(), memberId.c_str(), e.what());
  1015. exit(-1);
  1016. }
  1017. }
  1018. void CV1::heartbeat()
  1019. {
  1020. char publicId[1024];
  1021. char hostnameTmp[1024];
  1022. _myId.toString(false, publicId);
  1023. if (gethostname(hostnameTmp, sizeof(hostnameTmp)) != 0) {
  1024. hostnameTmp[0] = (char)0;
  1025. }
  1026. else {
  1027. for (int i = 0; i < (int)sizeof(hostnameTmp); ++i) {
  1028. if ((hostnameTmp[i] == '.') || (hostnameTmp[i] == 0)) {
  1029. hostnameTmp[i] = (char)0;
  1030. break;
  1031. }
  1032. }
  1033. }
  1034. const char* controllerId = _myAddressStr.c_str();
  1035. const char* publicIdentity = publicId;
  1036. const char* hostname = hostnameTmp;
  1037. while (_run == 1) {
  1038. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1039. auto tracer = provider->GetTracer("cv1");
  1040. auto span = tracer->StartSpan("cv1::heartbeat");
  1041. auto scope = tracer->WithActiveSpan(span);
  1042. // fprintf(stderr, "%s: heartbeat\n", controllerId);
  1043. auto c = _pool->borrow();
  1044. int64_t ts = OSUtils::now();
  1045. if (c->c) {
  1046. std::string major = std::to_string(ZEROTIER_ONE_VERSION_MAJOR);
  1047. std::string minor = std::to_string(ZEROTIER_ONE_VERSION_MINOR);
  1048. std::string rev = std::to_string(ZEROTIER_ONE_VERSION_REVISION);
  1049. std::string build = std::to_string(ZEROTIER_ONE_VERSION_BUILD);
  1050. std::string now = std::to_string(ts);
  1051. std::string host_port = std::to_string(_listenPort);
  1052. std::string use_redis = (_rc != NULL) ? "true" : "false";
  1053. std::string redis_mem_status = (_redisMemberStatus) ? "true" : "false";
  1054. try {
  1055. pqxx::work w { *c->c };
  1056. pqxx::result res = w.exec0(
  1057. "INSERT INTO ztc_controller (id, cluster_host, last_alive, public_identity, v_major, v_minor, "
  1058. "v_rev, v_build, host_port, use_redis, redis_member_status) "
  1059. "VALUES ("
  1060. + w.quote(controllerId) + ", " + w.quote(hostname) + ", TO_TIMESTAMP(" + now
  1061. + "::double precision/1000), " + w.quote(publicIdentity) + ", " + major + ", " + minor + ", " + rev
  1062. + ", " + build + ", " + host_port + ", " + use_redis + ", " + redis_mem_status
  1063. + ") "
  1064. "ON CONFLICT (id) DO UPDATE SET cluster_host = EXCLUDED.cluster_host, last_alive = "
  1065. "EXCLUDED.last_alive, "
  1066. "public_identity = EXCLUDED.public_identity, v_major = EXCLUDED.v_major, v_minor = "
  1067. "EXCLUDED.v_minor, "
  1068. "v_rev = EXCLUDED.v_rev, v_build = EXCLUDED.v_rev, host_port = EXCLUDED.host_port, "
  1069. "use_redis = EXCLUDED.use_redis, redis_member_status = EXCLUDED.redis_member_status");
  1070. w.commit();
  1071. }
  1072. catch (std::exception& e) {
  1073. fprintf(stderr, "%s: Heartbeat update failed: %s\n", controllerId, e.what());
  1074. span->End();
  1075. std::this_thread::sleep_for(std::chrono::milliseconds(1000));
  1076. continue;
  1077. }
  1078. }
  1079. _pool->unborrow(c);
  1080. try {
  1081. if (_redisMemberStatus) {
  1082. if (_rc->clusterMode) {
  1083. _cluster->zadd("controllers", "controllerId", ts);
  1084. }
  1085. else {
  1086. _redis->zadd("controllers", "controllerId", ts);
  1087. }
  1088. }
  1089. }
  1090. catch (sw::redis::Error& e) {
  1091. fprintf(stderr, "ERROR: Redis error in heartbeat thread: %s\n", e.what());
  1092. }
  1093. span->End();
  1094. std::this_thread::sleep_for(std::chrono::milliseconds(1000));
  1095. }
  1096. fprintf(stderr, "Exited heartbeat thread\n");
  1097. }
  1098. void CV1::membersDbWatcher()
  1099. {
  1100. if (_rc) {
  1101. _membersWatcher_Redis();
  1102. }
  1103. else {
  1104. _membersWatcher_Postgres();
  1105. }
  1106. if (_run == 1) {
  1107. fprintf(
  1108. stderr, "ERROR: %s membersDbWatcher should still be running! Exiting Controller.\n", _myAddressStr.c_str());
  1109. exit(9);
  1110. }
  1111. fprintf(stderr, "Exited membersDbWatcher\n");
  1112. }
  1113. void CV1::_membersWatcher_Postgres()
  1114. {
  1115. auto c = _pool->borrow();
  1116. std::string stream = "member_" + _myAddressStr;
  1117. fprintf(stderr, "Listening to member stream: %s\n", stream.c_str());
  1118. MemberNotificationReceiver<CV1> m(this, *c->c, stream);
  1119. while (_run == 1) {
  1120. c->c->await_notification(5, 0);
  1121. }
  1122. _pool->unborrow(c);
  1123. }
  1124. void CV1::_membersWatcher_Redis()
  1125. {
  1126. char buf[11] = { 0 };
  1127. std::string key = "member-stream:{" + std::string(_myAddress.toString(buf)) + "}";
  1128. std::string lastID = "0";
  1129. fprintf(stderr, "Listening to member stream: %s\n", key.c_str());
  1130. while (_run == 1) {
  1131. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1132. auto tracer = provider->GetTracer("cv1");
  1133. auto span = tracer->StartSpan("cv1::_membersWatcher_Redis");
  1134. auto scope = tracer->WithActiveSpan(span);
  1135. try {
  1136. json tmp;
  1137. std::unordered_map<std::string, ItemStream> result;
  1138. if (_rc->clusterMode) {
  1139. _cluster->xread(key, lastID, std::chrono::seconds(1), 0, std::inserter(result, result.end()));
  1140. }
  1141. else {
  1142. _redis->xread(key, lastID, std::chrono::seconds(1), 0, std::inserter(result, result.end()));
  1143. }
  1144. if (! result.empty()) {
  1145. for (auto element : result) {
  1146. #ifdef REDIS_TRACE
  1147. fprintf(stdout, "Received notification from: %s\n", element.first.c_str());
  1148. #endif
  1149. for (auto rec : element.second) {
  1150. std::string id = rec.first;
  1151. auto attrs = rec.second;
  1152. #ifdef REDIS_TRACE
  1153. fprintf(stdout, "Record ID: %s\n", id.c_str());
  1154. fprintf(stdout, "attrs len: %lu\n", attrs.size());
  1155. #endif
  1156. for (auto a : attrs) {
  1157. #ifdef REDIS_TRACE
  1158. fprintf(stdout, "key: %s\nvalue: %s\n", a.first.c_str(), a.second.c_str());
  1159. #endif
  1160. try {
  1161. tmp = json::parse(a.second);
  1162. json& ov = tmp["old_val"];
  1163. json& nv = tmp["new_val"];
  1164. json oldConfig, newConfig;
  1165. if (ov.is_object())
  1166. oldConfig = ov;
  1167. if (nv.is_object())
  1168. newConfig = nv;
  1169. if (oldConfig.is_object() || newConfig.is_object()) {
  1170. _memberChanged(oldConfig, newConfig, (this->_ready >= 2));
  1171. }
  1172. }
  1173. catch (...) {
  1174. fprintf(stderr, "json parse error in _membersWatcher_Redis: %s\n", a.second.c_str());
  1175. }
  1176. }
  1177. if (_rc->clusterMode) {
  1178. _cluster->xdel(key, id);
  1179. }
  1180. else {
  1181. _redis->xdel(key, id);
  1182. }
  1183. lastID = id;
  1184. Metrics::redis_mem_notification++;
  1185. }
  1186. }
  1187. }
  1188. }
  1189. catch (sw::redis::Error& e) {
  1190. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1191. fprintf(stderr, "Error in Redis members watcher: %s\n", e.what());
  1192. }
  1193. }
  1194. fprintf(stderr, "membersWatcher ended\n");
  1195. }
  1196. void CV1::networksDbWatcher()
  1197. {
  1198. if (_rc) {
  1199. _networksWatcher_Redis();
  1200. }
  1201. else {
  1202. _networksWatcher_Postgres();
  1203. }
  1204. if (_run == 1) {
  1205. fprintf(
  1206. stderr, "ERROR: %s networksDbWatcher should still be running! Exiting Controller.\n",
  1207. _myAddressStr.c_str());
  1208. exit(8);
  1209. }
  1210. fprintf(stderr, "Exited networksDbWatcher\n");
  1211. }
  1212. void CV1::_networksWatcher_Postgres()
  1213. {
  1214. std::string stream = "network_" + _myAddressStr;
  1215. fprintf(stderr, "Listening to member stream: %s\n", stream.c_str());
  1216. auto c = _pool->borrow();
  1217. NetworkNotificationReceiver<CV1> n(this, *c->c, stream);
  1218. while (_run == 1) {
  1219. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1220. auto tracer = provider->GetTracer("cv1");
  1221. auto span = tracer->StartSpan("cv1::_networksWatcher_Postgres");
  1222. auto scope = tracer->WithActiveSpan(span);
  1223. c->c->await_notification(5, 0);
  1224. }
  1225. }
  1226. void CV1::_networksWatcher_Redis()
  1227. {
  1228. char buf[11] = { 0 };
  1229. std::string key = "network-stream:{" + std::string(_myAddress.toString(buf)) + "}";
  1230. std::string lastID = "0";
  1231. while (_run == 1) {
  1232. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1233. auto tracer = provider->GetTracer("cv1");
  1234. auto span = tracer->StartSpan("cv1::_networksWatcher_Redis");
  1235. auto scope = tracer->WithActiveSpan(span);
  1236. try {
  1237. json tmp;
  1238. std::unordered_map<std::string, ItemStream> result;
  1239. if (_rc->clusterMode) {
  1240. _cluster->xread(key, lastID, std::chrono::seconds(1), 0, std::inserter(result, result.end()));
  1241. }
  1242. else {
  1243. _redis->xread(key, lastID, std::chrono::seconds(1), 0, std::inserter(result, result.end()));
  1244. }
  1245. if (! result.empty()) {
  1246. for (auto element : result) {
  1247. #ifdef REDIS_TRACE
  1248. fprintf(stdout, "Received notification from: %s\n", element.first.c_str());
  1249. #endif
  1250. for (auto rec : element.second) {
  1251. std::string id = rec.first;
  1252. auto attrs = rec.second;
  1253. #ifdef REDIS_TRACE
  1254. fprintf(stdout, "Record ID: %s\n", id.c_str());
  1255. fprintf(stdout, "attrs len: %lu\n", attrs.size());
  1256. #endif
  1257. for (auto a : attrs) {
  1258. #ifdef REDIS_TRACE
  1259. fprintf(stdout, "key: %s\nvalue: %s\n", a.first.c_str(), a.second.c_str());
  1260. #endif
  1261. try {
  1262. tmp = json::parse(a.second);
  1263. json& ov = tmp["old_val"];
  1264. json& nv = tmp["new_val"];
  1265. json oldConfig, newConfig;
  1266. if (ov.is_object())
  1267. oldConfig = ov;
  1268. if (nv.is_object())
  1269. newConfig = nv;
  1270. if (oldConfig.is_object() || newConfig.is_object()) {
  1271. _networkChanged(oldConfig, newConfig, (this->_ready >= 2));
  1272. }
  1273. }
  1274. catch (std::exception& e) {
  1275. fprintf(
  1276. stderr, "json parse error in networkWatcher_Redis: what: %s json: %s\n", e.what(),
  1277. a.second.c_str());
  1278. }
  1279. }
  1280. if (_rc->clusterMode) {
  1281. _cluster->xdel(key, id);
  1282. }
  1283. else {
  1284. _redis->xdel(key, id);
  1285. }
  1286. lastID = id;
  1287. }
  1288. Metrics::redis_net_notification++;
  1289. }
  1290. }
  1291. }
  1292. catch (sw::redis::Error& e) {
  1293. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1294. fprintf(stderr, "Error in Redis networks watcher: %s\n", e.what());
  1295. }
  1296. }
  1297. fprintf(stderr, "networksWatcher ended\n");
  1298. }
  1299. void CV1::commitThread()
  1300. {
  1301. fprintf(stderr, "%s: commitThread start\n", _myAddressStr.c_str());
  1302. std::pair<nlohmann::json, bool> qitem;
  1303. while (_commitQueue.get(qitem) && (_run == 1)) {
  1304. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1305. auto tracer = provider->GetTracer("cv1");
  1306. auto span = tracer->StartSpan("cv1::commitThread");
  1307. auto scope = tracer->WithActiveSpan(span);
  1308. // fprintf(stderr, "commitThread tick\n");
  1309. if (! qitem.first.is_object()) {
  1310. fprintf(stderr, "not an object\n");
  1311. continue;
  1312. }
  1313. std::shared_ptr<PostgresConnection> c;
  1314. try {
  1315. c = _pool->borrow();
  1316. }
  1317. catch (std::exception& e) {
  1318. fprintf(stderr, "ERROR: %s\n", e.what());
  1319. continue;
  1320. }
  1321. if (! c) {
  1322. fprintf(stderr, "Error getting database connection\n");
  1323. continue;
  1324. }
  1325. Metrics::pgsql_commit_ticks++;
  1326. try {
  1327. nlohmann::json& config = (qitem.first);
  1328. const std::string objtype = config["objtype"];
  1329. if (objtype == "member") {
  1330. auto mspan = tracer->StartSpan("cv1::commitThread::member");
  1331. auto mscope = tracer->WithActiveSpan(mspan);
  1332. // fprintf(stderr, "%s: commitThread: member\n", _myAddressStr.c_str());
  1333. std::string memberId;
  1334. std::string networkId;
  1335. try {
  1336. pqxx::work w(*c->c);
  1337. memberId = config["id"];
  1338. networkId = config["nwid"];
  1339. std::string target = "NULL";
  1340. if (! config["remoteTraceTarget"].is_null()) {
  1341. target = config["remoteTraceTarget"];
  1342. }
  1343. pqxx::row nwrow = w.exec_params1("SELECT COUNT(id) FROM ztc_network WHERE id = $1", networkId);
  1344. int nwcount = nwrow[0].as<int>();
  1345. if (nwcount != 1) {
  1346. fprintf(stderr, "network %s does not exist. skipping member upsert\n", networkId.c_str());
  1347. w.abort();
  1348. _pool->unborrow(c);
  1349. continue;
  1350. }
  1351. pqxx::row mrow = w.exec_params1(
  1352. "SELECT COUNT(id) FROM ztc_member WHERE id = $1 AND network_id = $2", memberId, networkId);
  1353. int membercount = mrow[0].as<int>();
  1354. bool isNewMember = false;
  1355. if (membercount == 0) {
  1356. // new member
  1357. isNewMember = true;
  1358. pqxx::result res = w.exec_params0(
  1359. "INSERT INTO ztc_member (id, network_id, active_bridge, authorized, capabilities, "
  1360. "identity, last_authorized_time, last_deauthorized_time, no_auto_assign_ips, "
  1361. "remote_trace_level, remote_trace_target, revision, tags, v_major, v_minor, v_rev, "
  1362. "v_proto) "
  1363. "VALUES ($1, $2, $3, $4, $5, $6, "
  1364. "TO_TIMESTAMP($7::double precision/1000), TO_TIMESTAMP($8::double precision/1000), "
  1365. "$9, $10, $11, $12, $13, $14, $15, $16, $17)",
  1366. memberId, networkId, (bool)config["activeBridge"], (bool)config["authorized"],
  1367. OSUtils::jsonDump(config["capabilities"], -1), OSUtils::jsonString(config["identity"], ""),
  1368. (uint64_t)config["lastAuthorizedTime"], (uint64_t)config["lastDeauthorizedTime"],
  1369. (bool)config["noAutoAssignIps"], (int)config["remoteTraceLevel"], target,
  1370. (uint64_t)config["revision"], OSUtils::jsonDump(config["tags"], -1), (int)config["vMajor"],
  1371. (int)config["vMinor"], (int)config["vRev"], (int)config["vProto"]);
  1372. }
  1373. else {
  1374. // existing member
  1375. pqxx::result res = w.exec_params0(
  1376. "UPDATE ztc_member "
  1377. "SET active_bridge = $3, authorized = $4, capabilities = $5, identity = $6, "
  1378. "last_authorized_time = TO_TIMESTAMP($7::double precision/1000), "
  1379. "last_deauthorized_time = TO_TIMESTAMP($8::double precision/1000), "
  1380. "no_auto_assign_ips = $9, remote_trace_level = $10, remote_trace_target= $11, "
  1381. "revision = $12, tags = $13, v_major = $14, v_minor = $15, v_rev = $16, v_proto = $17 "
  1382. "WHERE id = $1 AND network_id = $2",
  1383. memberId, networkId, (bool)config["activeBridge"], (bool)config["authorized"],
  1384. OSUtils::jsonDump(config["capabilities"], -1), OSUtils::jsonString(config["identity"], ""),
  1385. (uint64_t)config["lastAuthorizedTime"], (uint64_t)config["lastDeauthorizedTime"],
  1386. (bool)config["noAutoAssignIps"], (int)config["remoteTraceLevel"], target,
  1387. (uint64_t)config["revision"], OSUtils::jsonDump(config["tags"], -1), (int)config["vMajor"],
  1388. (int)config["vMinor"], (int)config["vRev"], (int)config["vProto"]);
  1389. }
  1390. if (! isNewMember) {
  1391. pqxx::result res = w.exec_params0(
  1392. "DELETE FROM ztc_member_ip_assignment WHERE member_id = $1 AND network_id = $2", memberId,
  1393. networkId);
  1394. }
  1395. std::vector<std::string> assignments;
  1396. bool ipAssignError = false;
  1397. for (auto i = config["ipAssignments"].begin(); i != config["ipAssignments"].end(); ++i) {
  1398. std::string addr = *i;
  1399. if (std::find(assignments.begin(), assignments.end(), addr) != assignments.end()) {
  1400. continue;
  1401. }
  1402. pqxx::result res = w.exec_params0(
  1403. "INSERT INTO ztc_member_ip_assignment (member_id, network_id, address) VALUES ($1, $2, $3) "
  1404. "ON CONFLICT (network_id, member_id, address) DO NOTHING",
  1405. memberId, networkId, addr);
  1406. assignments.push_back(addr);
  1407. }
  1408. if (ipAssignError) {
  1409. fprintf(stderr, "%s: ipAssignError\n", _myAddressStr.c_str());
  1410. w.abort();
  1411. _pool->unborrow(c);
  1412. c.reset();
  1413. continue;
  1414. }
  1415. w.commit();
  1416. if (_smee != NULL && isNewMember) {
  1417. pqxx::row row = w.exec_params1(
  1418. "SELECT "
  1419. " count(h.hook_id) "
  1420. "FROM "
  1421. " ztc_hook h "
  1422. " INNER JOIN ztc_org o ON o.org_id = h.org_id "
  1423. " INNER JOIN ztc_network n ON n.owner_id = o.owner_id "
  1424. " WHERE "
  1425. "n.id = $1 ",
  1426. networkId);
  1427. int64_t hookCount = row[0].as<int64_t>();
  1428. if (hookCount > 0) {
  1429. notifyNewMember(networkId, memberId);
  1430. }
  1431. }
  1432. const uint64_t nwidInt = OSUtils::jsonIntHex(config["nwid"], 0ULL);
  1433. const uint64_t memberidInt = OSUtils::jsonIntHex(config["id"], 0ULL);
  1434. if (nwidInt && memberidInt) {
  1435. nlohmann::json nwOrig;
  1436. nlohmann::json memOrig;
  1437. nlohmann::json memNew(config);
  1438. get(nwidInt, nwOrig, memberidInt, memOrig);
  1439. _memberChanged(memOrig, memNew, qitem.second);
  1440. }
  1441. else {
  1442. fprintf(
  1443. stderr, "%s: Can't notify of change. Error parsing nwid or memberid: %llu-%llu\n",
  1444. _myAddressStr.c_str(), (unsigned long long)nwidInt, (unsigned long long)memberidInt);
  1445. }
  1446. }
  1447. catch (std::exception& e) {
  1448. fprintf(
  1449. stderr, "%s ERROR: Error updating member %s-%s: %s\n", _myAddressStr.c_str(), networkId.c_str(),
  1450. memberId.c_str(), e.what());
  1451. mspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1452. }
  1453. }
  1454. else if (objtype == "network") {
  1455. auto nspan = tracer->StartSpan("cv1::commitThread::network");
  1456. auto nscope = tracer->WithActiveSpan(nspan);
  1457. try {
  1458. // fprintf(stderr, "%s: commitThread: network\n", _myAddressStr.c_str());
  1459. pqxx::work w(*c->c);
  1460. std::string id = config["id"];
  1461. std::string remoteTraceTarget = "";
  1462. if (! config["remoteTraceTarget"].is_null()) {
  1463. remoteTraceTarget = config["remoteTraceTarget"];
  1464. }
  1465. std::string rulesSource = "";
  1466. if (config["rulesSource"].is_string()) {
  1467. rulesSource = config["rulesSource"];
  1468. }
  1469. // This ugly query exists because when we want to mirror networks to/from
  1470. // another data store (e.g. FileDB or LFDB) it is possible to get a network
  1471. // that doesn't exist in Central's database. This does an upsert and sets
  1472. // the owner_id to the "first" global admin in the user DB if the record
  1473. // did not previously exist. If the record already exists owner_id is left
  1474. // unchanged, so owner_id should be left out of the update clause.
  1475. pqxx::result res = w.exec_params0(
  1476. "INSERT INTO ztc_network (id, creation_time, owner_id, controller_id, capabilities, "
  1477. "enable_broadcast, "
  1478. "last_modified, mtu, multicast_limit, name, private, "
  1479. "remote_trace_level, remote_trace_target, rules, rules_source, "
  1480. "tags, v4_assign_mode, v6_assign_mode, sso_enabled) VALUES ("
  1481. "$1, TO_TIMESTAMP($5::double precision/1000), "
  1482. "(SELECT user_id AS owner_id FROM ztc_global_permissions WHERE authorize = true AND del = true "
  1483. "AND modify = true AND read = true LIMIT 1),"
  1484. "$2, $3, $4, TO_TIMESTAMP($5::double precision/1000), "
  1485. "$6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17) "
  1486. "ON CONFLICT (id) DO UPDATE set controller_id = EXCLUDED.controller_id, "
  1487. "capabilities = EXCLUDED.capabilities, enable_broadcast = EXCLUDED.enable_broadcast, "
  1488. "last_modified = EXCLUDED.last_modified, mtu = EXCLUDED.mtu, "
  1489. "multicast_limit = EXCLUDED.multicast_limit, name = EXCLUDED.name, "
  1490. "private = EXCLUDED.private, remote_trace_level = EXCLUDED.remote_trace_level, "
  1491. "remote_trace_target = EXCLUDED.remote_trace_target, rules = EXCLUDED.rules, "
  1492. "rules_source = EXCLUDED.rules_source, tags = EXCLUDED.tags, "
  1493. "v4_assign_mode = EXCLUDED.v4_assign_mode, v6_assign_mode = EXCLUDED.v6_assign_mode, "
  1494. "sso_enabled = EXCLUDED.sso_enabled",
  1495. id, _myAddressStr, OSUtils::jsonDump(config["capabilities"], -1),
  1496. (bool)config["enableBroadcast"], OSUtils::now(), (int)config["mtu"],
  1497. (int)config["multicastLimit"], OSUtils::jsonString(config["name"], ""), (bool)config["private"],
  1498. (int)config["remoteTraceLevel"], remoteTraceTarget, OSUtils::jsonDump(config["rules"], -1),
  1499. rulesSource, OSUtils::jsonDump(config["tags"], -1),
  1500. OSUtils::jsonDump(config["v4AssignMode"], -1), OSUtils::jsonDump(config["v6AssignMode"], -1),
  1501. OSUtils::jsonBool(config["ssoEnabled"], false));
  1502. res = w.exec_params0("DELETE FROM ztc_network_assignment_pool WHERE network_id = $1", id);
  1503. auto pool = config["ipAssignmentPools"];
  1504. bool err = false;
  1505. for (auto i = pool.begin(); i != pool.end(); ++i) {
  1506. std::string start = (*i)["ipRangeStart"];
  1507. std::string end = (*i)["ipRangeEnd"];
  1508. res = w.exec_params0(
  1509. "INSERT INTO ztc_network_assignment_pool (network_id, ip_range_start, ip_range_end) "
  1510. "VALUES ($1, $2, $3)",
  1511. id, start, end);
  1512. }
  1513. res = w.exec_params0("DELETE FROM ztc_network_route WHERE network_id = $1", id);
  1514. auto routes = config["routes"];
  1515. err = false;
  1516. for (auto i = routes.begin(); i != routes.end(); ++i) {
  1517. std::string t = (*i)["target"];
  1518. std::vector<std::string> target;
  1519. std::istringstream f(t);
  1520. std::string s;
  1521. while (std::getline(f, s, '/')) {
  1522. target.push_back(s);
  1523. }
  1524. if (target.empty() || target.size() != 2) {
  1525. continue;
  1526. }
  1527. std::string targetAddr = target[0];
  1528. std::string targetBits = target[1];
  1529. std::string via = "NULL";
  1530. if (! (*i)["via"].is_null()) {
  1531. via = (*i)["via"];
  1532. }
  1533. res = w.exec_params0(
  1534. "INSERT INTO ztc_network_route (network_id, address, bits, via) VALUES ($1, $2, $3, $4)",
  1535. id, targetAddr, targetBits, (via == "NULL" ? NULL : via.c_str()));
  1536. }
  1537. if (err) {
  1538. fprintf(stderr, "%s: route add error\n", _myAddressStr.c_str());
  1539. w.abort();
  1540. _pool->unborrow(c);
  1541. continue;
  1542. }
  1543. auto dns = config["dns"];
  1544. std::string domain = dns["domain"];
  1545. std::stringstream servers;
  1546. servers << "{";
  1547. for (auto j = dns["servers"].begin(); j < dns["servers"].end(); ++j) {
  1548. servers << *j;
  1549. if ((j + 1) != dns["servers"].end()) {
  1550. servers << ",";
  1551. }
  1552. }
  1553. servers << "}";
  1554. std::string s = servers.str();
  1555. res = w.exec_params0(
  1556. "INSERT INTO ztc_network_dns (network_id, domain, servers) VALUES ($1, $2, $3) ON CONFLICT "
  1557. "(network_id) DO UPDATE SET domain = EXCLUDED.domain, servers = EXCLUDED.servers",
  1558. id, domain, s);
  1559. w.commit();
  1560. const uint64_t nwidInt = OSUtils::jsonIntHex(config["nwid"], 0ULL);
  1561. if (nwidInt) {
  1562. nlohmann::json nwOrig;
  1563. nlohmann::json nwNew(config);
  1564. get(nwidInt, nwOrig);
  1565. _networkChanged(nwOrig, nwNew, qitem.second);
  1566. }
  1567. else {
  1568. fprintf(
  1569. stderr, "%s: Can't notify network changed: %llu\n", _myAddressStr.c_str(),
  1570. (unsigned long long)nwidInt);
  1571. }
  1572. }
  1573. catch (std::exception& e) {
  1574. nspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1575. fprintf(stderr, "%s ERROR: Error updating network: %s\n", _myAddressStr.c_str(), e.what());
  1576. }
  1577. if (_redisMemberStatus) {
  1578. try {
  1579. std::string id = config["id"];
  1580. std::string controllerId = _myAddressStr.c_str();
  1581. std::string key = "networks:{" + controllerId + "}";
  1582. if (_rc->clusterMode) {
  1583. _cluster->sadd(key, id);
  1584. }
  1585. else {
  1586. _redis->sadd(key, id);
  1587. }
  1588. }
  1589. catch (sw::redis::Error& e) {
  1590. nspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1591. fprintf(stderr, "ERROR: Error adding network to Redis: %s\n", e.what());
  1592. }
  1593. }
  1594. }
  1595. else if (objtype == "_delete_network") {
  1596. auto dspan = tracer->StartSpan("cv1::commitThread::_delete_network");
  1597. auto dscope = tracer->WithActiveSpan(dspan);
  1598. // fprintf(stderr, "%s: commitThread: delete network\n", _myAddressStr.c_str());
  1599. try {
  1600. pqxx::work w(*c->c);
  1601. std::string networkId = config["nwid"];
  1602. pqxx::result res = w.exec_params0("UPDATE ztc_network SET deleted = true WHERE id = $1", networkId);
  1603. w.commit();
  1604. }
  1605. catch (std::exception& e) {
  1606. dspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1607. fprintf(stderr, "%s ERROR: Error deleting network: %s\n", _myAddressStr.c_str(), e.what());
  1608. }
  1609. if (_redisMemberStatus) {
  1610. try {
  1611. std::string id = config["id"];
  1612. std::string controllerId = _myAddressStr.c_str();
  1613. std::string key = "networks:{" + controllerId + "}";
  1614. if (_rc->clusterMode) {
  1615. _cluster->srem(key, id);
  1616. _cluster->del("network-nodes-online:{" + controllerId + "}:" + id);
  1617. }
  1618. else {
  1619. _redis->srem(key, id);
  1620. _redis->del("network-nodes-online:{" + controllerId + "}:" + id);
  1621. }
  1622. }
  1623. catch (sw::redis::Error& e) {
  1624. dspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1625. fprintf(stderr, "ERROR: Error adding network to Redis: %s\n", e.what());
  1626. }
  1627. }
  1628. }
  1629. else if (objtype == "_delete_member") {
  1630. auto mspan = tracer->StartSpan("cv1::commitThread::_delete_member");
  1631. auto mscope = tracer->WithActiveSpan(mspan);
  1632. // fprintf(stderr, "%s commitThread: delete member\n", _myAddressStr.c_str());
  1633. try {
  1634. pqxx::work w(*c->c);
  1635. std::string memberId = config["id"];
  1636. std::string networkId = config["nwid"];
  1637. pqxx::result res = w.exec_params0(
  1638. "UPDATE ztc_member SET hidden = true, deleted = true WHERE id = $1 AND network_id = $2",
  1639. memberId, networkId);
  1640. w.commit();
  1641. }
  1642. catch (std::exception& e) {
  1643. mspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1644. fprintf(stderr, "%s ERROR: Error deleting member: %s\n", _myAddressStr.c_str(), e.what());
  1645. }
  1646. if (_redisMemberStatus) {
  1647. try {
  1648. std::string memberId = config["id"];
  1649. std::string networkId = config["nwid"];
  1650. std::string controllerId = _myAddressStr.c_str();
  1651. std::string key = "network-nodes-all:{" + controllerId + "}:" + networkId;
  1652. if (_rc->clusterMode) {
  1653. _cluster->srem(key, memberId);
  1654. _cluster->del("member:{" + controllerId + "}:" + networkId + ":" + memberId);
  1655. }
  1656. else {
  1657. _redis->srem(key, memberId);
  1658. _redis->del("member:{" + controllerId + "}:" + networkId + ":" + memberId);
  1659. }
  1660. }
  1661. catch (sw::redis::Error& e) {
  1662. mspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1663. fprintf(stderr, "ERROR: Error deleting member from Redis: %s\n", e.what());
  1664. }
  1665. }
  1666. }
  1667. else {
  1668. fprintf(stderr, "%s ERROR: unknown objtype\n", _myAddressStr.c_str());
  1669. }
  1670. }
  1671. catch (std::exception& e) {
  1672. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1673. fprintf(stderr, "%s ERROR: Error getting objtype: %s\n", _myAddressStr.c_str(), e.what());
  1674. }
  1675. _pool->unborrow(c);
  1676. c.reset();
  1677. }
  1678. fprintf(stderr, "%s commitThread finished\n", _myAddressStr.c_str());
  1679. }
  1680. void CV1::notifyNewMember(const std::string& networkID, const std::string& memberID)
  1681. {
  1682. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1683. auto tracer = provider->GetTracer("cv1");
  1684. auto span = tracer->StartSpan("cv1::notifyNewMember");
  1685. auto scope = tracer->WithActiveSpan(span);
  1686. rustybits::smee_client_notify_network_joined(_smee, networkID.c_str(), memberID.c_str());
  1687. }
  1688. void CV1::onlineNotificationThread()
  1689. {
  1690. waitForReady();
  1691. if (_redisMemberStatus) {
  1692. onlineNotification_Redis();
  1693. }
  1694. else {
  1695. onlineNotification_Postgres();
  1696. }
  1697. }
  1698. /**
  1699. * ONLY UNCOMMENT FOR TEMPORARY DB MAINTENANCE
  1700. *
  1701. * This define temporarily turns off writing to the member status table
  1702. * so it can be reindexed when the indexes get too large.
  1703. */
  1704. // #define DISABLE_MEMBER_STATUS 1
  1705. void CV1::onlineNotification_Postgres()
  1706. {
  1707. _connected = 1;
  1708. nlohmann::json jtmp1, jtmp2;
  1709. while (_run == 1) {
  1710. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1711. auto tracer = provider->GetTracer("cv1");
  1712. auto span = tracer->StartSpan("cv1::onlineNotification_Postgres");
  1713. auto scope = tracer->WithActiveSpan(span);
  1714. auto c = _pool->borrow();
  1715. auto c2 = _pool->borrow();
  1716. try {
  1717. fprintf(stderr, "%s onlineNotification_Postgres\n", _myAddressStr.c_str());
  1718. std::unordered_map<std::pair<uint64_t, uint64_t>, NodeOnlineRecord, _PairHasher> lastOnline;
  1719. {
  1720. std::lock_guard<std::mutex> l(_lastOnline_l);
  1721. lastOnline.swap(_lastOnline);
  1722. }
  1723. #ifndef DISABLE_MEMBER_STATUS
  1724. pqxx::work w(*c->c);
  1725. pqxx::work w2(*c2->c);
  1726. fprintf(stderr, "online notification tick\n");
  1727. bool firstRun = true;
  1728. bool memberAdded = false;
  1729. int updateCount = 0;
  1730. pqxx::pipeline pipe(w);
  1731. for (auto i = lastOnline.begin(); i != lastOnline.end(); ++i) {
  1732. updateCount += 1;
  1733. uint64_t nwid_i = i->first.first;
  1734. char nwidTmp[64];
  1735. char memTmp[64];
  1736. char ipTmp[64];
  1737. OSUtils::ztsnprintf(nwidTmp, sizeof(nwidTmp), "%.16llx", nwid_i);
  1738. OSUtils::ztsnprintf(memTmp, sizeof(memTmp), "%.10llx", i->first.second);
  1739. if (! get(nwid_i, jtmp1, i->first.second, jtmp2)) {
  1740. continue; // skip non existent networks/members
  1741. }
  1742. std::string networkId(nwidTmp);
  1743. std::string memberId(memTmp);
  1744. try {
  1745. pqxx::row r = w2.exec_params1(
  1746. "SELECT id, network_id FROM ztc_member WHERE network_id = $1 AND id = $2", networkId, memberId);
  1747. }
  1748. catch (pqxx::unexpected_rows& e) {
  1749. continue;
  1750. }
  1751. int64_t ts = i->second.lastSeen;
  1752. std::string ipAddr = i->second.physicalAddress.toIpString(ipTmp);
  1753. std::string timestamp = std::to_string(ts);
  1754. std::string osArch = i->second.osArch;
  1755. std::vector<std::string> osArchSplit = split(osArch, '/');
  1756. std::string os = "unknown";
  1757. std::string arch = "unknown";
  1758. if (osArchSplit.size() == 2) {
  1759. os = osArchSplit[0];
  1760. arch = osArchSplit[1];
  1761. }
  1762. std::stringstream memberUpdate;
  1763. memberUpdate
  1764. << "INSERT INTO ztc_member_status (network_id, member_id, address, last_updated, os, arch) VALUES "
  1765. << "('" << networkId << "', '" << memberId << "', ";
  1766. if (ipAddr.empty()) {
  1767. memberUpdate << "NULL, ";
  1768. }
  1769. else {
  1770. memberUpdate << "'" << ipAddr << "', ";
  1771. }
  1772. memberUpdate << "TO_TIMESTAMP(" << timestamp << "::double precision/1000), "
  1773. << "'" << os << "', "
  1774. << "'" << arch << "'"
  1775. << ") "
  1776. << " ON CONFLICT (network_id, member_id) DO UPDATE SET address = EXCLUDED.address, "
  1777. "last_updated = EXCLUDED.last_updated, "
  1778. << "os = EXCLUDED.os, arch = EXCLUDED.arch";
  1779. pipe.insert(memberUpdate.str());
  1780. Metrics::pgsql_node_checkin++;
  1781. }
  1782. while (! pipe.empty()) {
  1783. pipe.retrieve();
  1784. }
  1785. pipe.complete();
  1786. w.commit();
  1787. fprintf(stderr, "%s: Updated online status of %d members\n", _myAddressStr.c_str(), updateCount);
  1788. #endif
  1789. }
  1790. catch (std::exception& e) {
  1791. fprintf(stderr, "%s: error in onlinenotification thread: %s\n", _myAddressStr.c_str(), e.what());
  1792. }
  1793. _pool->unborrow(c2);
  1794. _pool->unborrow(c);
  1795. ConnectionPoolStats stats = _pool->get_stats();
  1796. fprintf(
  1797. stderr, "%s pool stats: in use size: %llu, available size: %llu, total: %llu\n", _myAddressStr.c_str(),
  1798. stats.borrowed_size, stats.pool_size, (stats.borrowed_size + stats.pool_size));
  1799. span->End();
  1800. std::this_thread::sleep_for(std::chrono::seconds(10));
  1801. }
  1802. fprintf(stderr, "%s: Fell out of run loop in onlineNotificationThread\n", _myAddressStr.c_str());
  1803. if (_run == 1) {
  1804. fprintf(
  1805. stderr, "ERROR: %s onlineNotificationThread should still be running! Exiting Controller.\n",
  1806. _myAddressStr.c_str());
  1807. exit(6);
  1808. }
  1809. }
  1810. void CV1::onlineNotification_Redis()
  1811. {
  1812. _connected = 1;
  1813. char buf[11] = { 0 };
  1814. std::string controllerId = std::string(_myAddress.toString(buf));
  1815. while (_run == 1) {
  1816. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1817. auto tracer = provider->GetTracer("cv1");
  1818. auto span = tracer->StartSpan("cv1::onlineNotification_Redis");
  1819. auto scope = tracer->WithActiveSpan(span);
  1820. fprintf(stderr, "onlineNotification tick\n");
  1821. auto start = std::chrono::high_resolution_clock::now();
  1822. uint64_t count = 0;
  1823. std::unordered_map<std::pair<uint64_t, uint64_t>, NodeOnlineRecord, _PairHasher> lastOnline;
  1824. {
  1825. std::lock_guard<std::mutex> l(_lastOnline_l);
  1826. lastOnline.swap(_lastOnline);
  1827. }
  1828. try {
  1829. if (! lastOnline.empty()) {
  1830. if (_rc->clusterMode) {
  1831. auto tx = _cluster->transaction(controllerId, true, false);
  1832. count = _doRedisUpdate(tx, controllerId, lastOnline);
  1833. }
  1834. else {
  1835. auto tx = _redis->transaction(true, false);
  1836. count = _doRedisUpdate(tx, controllerId, lastOnline);
  1837. }
  1838. }
  1839. }
  1840. catch (sw::redis::Error& e) {
  1841. fprintf(stderr, "Error in online notification thread (redis): %s\n", e.what());
  1842. }
  1843. auto end = std::chrono::high_resolution_clock::now();
  1844. auto dur = std::chrono::duration_cast<std::chrono::milliseconds>(end - start);
  1845. auto total = dur.count();
  1846. fprintf(stderr, "onlineNotification ran in %llu ms\n", total);
  1847. span->End();
  1848. std::this_thread::sleep_for(std::chrono::seconds(5));
  1849. }
  1850. }
  1851. uint64_t CV1::_doRedisUpdate(
  1852. sw::redis::Transaction& tx,
  1853. std::string& controllerId,
  1854. std::unordered_map<std::pair<uint64_t, uint64_t>, NodeOnlineRecord, _PairHasher>& lastOnline)
  1855. {
  1856. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1857. auto tracer = provider->GetTracer("cv1");
  1858. auto span = tracer->StartSpan("cv1::_doRedisUpdate");
  1859. auto scope = tracer->WithActiveSpan(span);
  1860. nlohmann::json jtmp1, jtmp2;
  1861. uint64_t count = 0;
  1862. for (auto i = lastOnline.begin(); i != lastOnline.end(); ++i) {
  1863. uint64_t nwid_i = i->first.first;
  1864. uint64_t memberid_i = i->first.second;
  1865. char nwidTmp[64];
  1866. char memTmp[64];
  1867. char ipTmp[64];
  1868. OSUtils::ztsnprintf(nwidTmp, sizeof(nwidTmp), "%.16llx", nwid_i);
  1869. OSUtils::ztsnprintf(memTmp, sizeof(memTmp), "%.10llx", memberid_i);
  1870. if (! get(nwid_i, jtmp1, memberid_i, jtmp2)) {
  1871. continue; // skip non existent members/networks
  1872. }
  1873. std::string networkId(nwidTmp);
  1874. std::string memberId(memTmp);
  1875. int64_t ts = i->second.lastSeen;
  1876. std::string ipAddr = i->second.physicalAddress.toIpString(ipTmp);
  1877. std::string timestamp = std::to_string(ts);
  1878. std::string osArch = i->second.osArch;
  1879. std::vector<std::string> osArchSplit = split(osArch, '/');
  1880. std::string os = "unknown";
  1881. std::string arch = "unknown";
  1882. if (osArchSplit.size() == 2) {
  1883. os = osArchSplit[0];
  1884. arch = osArchSplit[1];
  1885. }
  1886. std::unordered_map<std::string, std::string> record = { { "id", memberId },
  1887. { "address", ipAddr },
  1888. { "last_updated", std::to_string(ts) },
  1889. { "os", os },
  1890. { "arch", arch } };
  1891. tx.zadd("nodes-online:{" + controllerId + "}", memberId, ts)
  1892. .zadd("nodes-online2:{" + controllerId + "}", networkId + "-" + memberId, ts)
  1893. .zadd("network-nodes-online:{" + controllerId + "}:" + networkId, memberId, ts)
  1894. .zadd("active-networks:{" + controllerId + "}", networkId, ts)
  1895. .sadd("network-nodes-all:{" + controllerId + "}:" + networkId, memberId)
  1896. .hmset("member:{" + controllerId + "}:" + networkId + ":" + memberId, record.begin(), record.end());
  1897. ++count;
  1898. Metrics::redis_node_checkin++;
  1899. }
  1900. // expire records from all-nodes and network-nodes member list
  1901. uint64_t expireOld = OSUtils::now() - 300000;
  1902. tx.zremrangebyscore(
  1903. "nodes-online:{" + controllerId + "}",
  1904. sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN));
  1905. tx.zremrangebyscore(
  1906. "nodes-online2:{" + controllerId + "}",
  1907. sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN));
  1908. tx.zremrangebyscore(
  1909. "active-networks:{" + controllerId + "}",
  1910. sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN));
  1911. {
  1912. std::shared_lock<std::shared_mutex> l(_networks_l);
  1913. for (const auto& it : _networks) {
  1914. uint64_t nwid_i = it.first;
  1915. char nwidTmp[64];
  1916. OSUtils::ztsnprintf(nwidTmp, sizeof(nwidTmp), "%.16llx", nwid_i);
  1917. tx.zremrangebyscore(
  1918. "network-nodes-online:{" + controllerId + "}:" + nwidTmp,
  1919. sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN));
  1920. }
  1921. }
  1922. tx.exec();
  1923. fprintf(stderr, "%s: Updated online status of %d members\n", _myAddressStr.c_str(), count);
  1924. return count;
  1925. }
  1926. #endif // ZT_CONTROLLER_USE_LIBPQ