PostgreSQL.cpp 65 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958
  1. /*
  2. * Copyright (c)2019 ZeroTier, Inc.
  3. *
  4. * Use of this software is governed by the Business Source License included
  5. * in the LICENSE.TXT file in the project's root directory.
  6. *
  7. * Change Date: 2025-01-01
  8. *
  9. * On the date above, in accordance with the Business Source License, use
  10. * of this software will be governed by version 2.0 of the Apache License.
  11. */
  12. /****/
  13. #include "PostgreSQL.hpp"
  14. #ifdef ZT_CONTROLLER_USE_LIBPQ
  15. #include "../node/Constants.hpp"
  16. #include "../node/SHA512.hpp"
  17. #include "EmbeddedNetworkController.hpp"
  18. #include "../version.h"
  19. #include "Redis.hpp"
  20. #include <smeeclient.h>
  21. #include <libpq-fe.h>
  22. #include <sstream>
  23. #include <iomanip>
  24. #include <climits>
  25. #include <chrono>
  26. // #define REDIS_TRACE 1
  27. using json = nlohmann::json;
  28. namespace {
  29. static const int DB_MINIMUM_VERSION = 38;
  30. static const char *_timestr()
  31. {
  32. time_t t = time(0);
  33. char *ts = ctime(&t);
  34. char *p = ts;
  35. if (!p)
  36. return "";
  37. while (*p) {
  38. if (*p == '\n') {
  39. *p = (char)0;
  40. break;
  41. }
  42. ++p;
  43. }
  44. return ts;
  45. }
  46. /*
  47. std::string join(const std::vector<std::string> &elements, const char * const separator)
  48. {
  49. switch(elements.size()) {
  50. case 0:
  51. return "";
  52. case 1:
  53. return elements[0];
  54. default:
  55. std::ostringstream os;
  56. std::copy(elements.begin(), elements.end()-1, std::ostream_iterator<std::string>(os, separator));
  57. os << *elements.rbegin();
  58. return os.str();
  59. }
  60. }
  61. */
  62. std::vector<std::string> split(std::string str, char delim){
  63. std::istringstream iss(str);
  64. std::vector<std::string> tokens;
  65. std::string item;
  66. while(std::getline(iss, item, delim)) {
  67. tokens.push_back(item);
  68. }
  69. return tokens;
  70. }
  71. std::string url_encode(const std::string &value) {
  72. std::ostringstream escaped;
  73. escaped.fill('0');
  74. escaped << std::hex;
  75. for (std::string::const_iterator i = value.begin(), n = value.end(); i != n; ++i) {
  76. std::string::value_type c = (*i);
  77. // Keep alphanumeric and other accepted characters intact
  78. if (isalnum(c) || c == '-' || c == '_' || c == '.' || c == '~') {
  79. escaped << c;
  80. continue;
  81. }
  82. // Any other characters are percent-encoded
  83. escaped << std::uppercase;
  84. escaped << '%' << std::setw(2) << int((unsigned char) c);
  85. escaped << std::nouppercase;
  86. }
  87. return escaped.str();
  88. }
  89. } // anonymous namespace
  90. using namespace ZeroTier;
  91. MemberNotificationReceiver::MemberNotificationReceiver(PostgreSQL *p, pqxx::connection &c, const std::string &channel)
  92. : pqxx::notification_receiver(c, channel)
  93. , _psql(p)
  94. {
  95. fprintf(stderr, "initialize MemberNotificationReceiver\n");
  96. }
  97. void MemberNotificationReceiver::operator() (const std::string &payload, int packend_pid) {
  98. fprintf(stderr, "Member Notification received: %s\n", payload.c_str());
  99. Metrics::pgsql_mem_notification++;
  100. json tmp(json::parse(payload));
  101. json &ov = tmp["old_val"];
  102. json &nv = tmp["new_val"];
  103. json oldConfig, newConfig;
  104. if (ov.is_object()) oldConfig = ov;
  105. if (nv.is_object()) newConfig = nv;
  106. if (oldConfig.is_object() || newConfig.is_object()) {
  107. _psql->_memberChanged(oldConfig,newConfig,(_psql->_ready>=2));
  108. fprintf(stderr, "payload sent\n");
  109. }
  110. }
  111. NetworkNotificationReceiver::NetworkNotificationReceiver(PostgreSQL *p, pqxx::connection &c, const std::string &channel)
  112. : pqxx::notification_receiver(c, channel)
  113. , _psql(p)
  114. {
  115. fprintf(stderr, "initialize NetworkNotificationReceiver\n");
  116. }
  117. void NetworkNotificationReceiver::operator() (const std::string &payload, int packend_pid) {
  118. fprintf(stderr, "Network Notification received: %s\n", payload.c_str());
  119. Metrics::pgsql_net_notification++;
  120. json tmp(json::parse(payload));
  121. json &ov = tmp["old_val"];
  122. json &nv = tmp["new_val"];
  123. json oldConfig, newConfig;
  124. if (ov.is_object()) oldConfig = ov;
  125. if (nv.is_object()) newConfig = nv;
  126. if (oldConfig.is_object() || newConfig.is_object()) {
  127. _psql->_networkChanged(oldConfig,newConfig,(_psql->_ready>=2));
  128. fprintf(stderr, "payload sent\n");
  129. }
  130. }
  131. using Attrs = std::vector<std::pair<std::string, std::string>>;
  132. using Item = std::pair<std::string, Attrs>;
  133. using ItemStream = std::vector<Item>;
  134. PostgreSQL::PostgreSQL(const Identity &myId, const char *path, int listenPort, RedisConfig *rc)
  135. : DB()
  136. , _pool()
  137. , _myId(myId)
  138. , _myAddress(myId.address())
  139. , _ready(0)
  140. , _connected(1)
  141. , _run(1)
  142. , _waitNoticePrinted(false)
  143. , _listenPort(listenPort)
  144. , _rc(rc)
  145. , _redis(NULL)
  146. , _cluster(NULL)
  147. , _redisMemberStatus(false)
  148. , _smee(NULL)
  149. {
  150. char myAddress[64];
  151. _myAddressStr = myId.address().toString(myAddress);
  152. _connString = std::string(path);
  153. auto f = std::make_shared<PostgresConnFactory>(_connString);
  154. _pool = std::make_shared<ConnectionPool<PostgresConnection> >(
  155. 15, 5, std::static_pointer_cast<ConnectionFactory>(f));
  156. memset(_ssoPsk, 0, sizeof(_ssoPsk));
  157. char *const ssoPskHex = getenv("ZT_SSO_PSK");
  158. #ifdef ZT_TRACE
  159. fprintf(stderr, "ZT_SSO_PSK: %s\n", ssoPskHex);
  160. #endif
  161. if (ssoPskHex) {
  162. // SECURITY: note that ssoPskHex will always be null-terminated if libc actually
  163. // returns something non-NULL. If the hex encodes something shorter than 48 bytes,
  164. // it will be padded at the end with zeroes. If longer, it'll be truncated.
  165. Utils::unhex(ssoPskHex, _ssoPsk, sizeof(_ssoPsk));
  166. }
  167. const char *redisMemberStatus = getenv("ZT_REDIS_MEMBER_STATUS");
  168. if (redisMemberStatus && (strcmp(redisMemberStatus, "true") == 0)) {
  169. _redisMemberStatus = true;
  170. fprintf(stderr, "Using redis for member status\n");
  171. }
  172. auto c = _pool->borrow();
  173. pqxx::work txn{*c->c};
  174. pqxx::row r{txn.exec1("SELECT version FROM ztc_database")};
  175. int dbVersion = r[0].as<int>();
  176. txn.commit();
  177. if (dbVersion < DB_MINIMUM_VERSION) {
  178. fprintf(stderr, "Central database schema version too low. This controller version requires a minimum schema version of %d. Please upgrade your Central instance", DB_MINIMUM_VERSION);
  179. exit(1);
  180. }
  181. _pool->unborrow(c);
  182. if (_rc != NULL) {
  183. sw::redis::ConnectionOptions opts;
  184. sw::redis::ConnectionPoolOptions poolOpts;
  185. opts.host = _rc->hostname;
  186. opts.port = _rc->port;
  187. opts.password = _rc->password;
  188. opts.db = 0;
  189. opts.keep_alive = true;
  190. opts.connect_timeout = std::chrono::seconds(3);
  191. poolOpts.size = 25;
  192. poolOpts.wait_timeout = std::chrono::seconds(5);
  193. poolOpts.connection_lifetime = std::chrono::minutes(3);
  194. poolOpts.connection_idle_time = std::chrono::minutes(1);
  195. if (_rc->clusterMode) {
  196. fprintf(stderr, "Using Redis in Cluster Mode\n");
  197. _cluster = std::make_shared<sw::redis::RedisCluster>(opts, poolOpts);
  198. } else {
  199. fprintf(stderr, "Using Redis in Standalone Mode\n");
  200. _redis = std::make_shared<sw::redis::Redis>(opts, poolOpts);
  201. }
  202. }
  203. _readyLock.lock();
  204. fprintf(stderr, "[%s] NOTICE: %.10llx controller PostgreSQL waiting for initial data download..." ZT_EOL_S, ::_timestr(), (unsigned long long)_myAddress.toInt());
  205. _waitNoticePrinted = true;
  206. initializeNetworks();
  207. initializeMembers();
  208. _heartbeatThread = std::thread(&PostgreSQL::heartbeat, this);
  209. _membersDbWatcher = std::thread(&PostgreSQL::membersDbWatcher, this);
  210. _networksDbWatcher = std::thread(&PostgreSQL::networksDbWatcher, this);
  211. for (int i = 0; i < ZT_CENTRAL_CONTROLLER_COMMIT_THREADS; ++i) {
  212. _commitThread[i] = std::thread(&PostgreSQL::commitThread, this);
  213. }
  214. _onlineNotificationThread = std::thread(&PostgreSQL::onlineNotificationThread, this);
  215. configureSmee();
  216. }
  217. PostgreSQL::~PostgreSQL()
  218. {
  219. if (_smee != NULL) {
  220. smeeclient::smee_client_delete(_smee);
  221. _smee = NULL;
  222. }
  223. _run = 0;
  224. std::this_thread::sleep_for(std::chrono::milliseconds(100));
  225. _heartbeatThread.join();
  226. _membersDbWatcher.join();
  227. _networksDbWatcher.join();
  228. _commitQueue.stop();
  229. for (int i = 0; i < ZT_CENTRAL_CONTROLLER_COMMIT_THREADS; ++i) {
  230. _commitThread[i].join();
  231. }
  232. _onlineNotificationThread.join();
  233. }
  234. void PostgreSQL::configureSmee()
  235. {
  236. const char *TEMPORAL_HOST = "ZT_TEMPORAL_HOST";
  237. const char *TEMPORAL_PORT = "ZT_TEMPORAL_PORT";
  238. const char *TEMPORAL_NAMESPACE = "ZT_TEMPORAL_NAMESPACE";
  239. const char *SMEE_TASK_QUEUE = "ZT_SMEE_TASK_QUEUE";
  240. const char *host = getenv(TEMPORAL_HOST);
  241. const char *port = getenv(TEMPORAL_PORT);
  242. const char *ns = getenv(TEMPORAL_NAMESPACE);
  243. const char *task_queue = getenv(SMEE_TASK_QUEUE);
  244. if (host != NULL && port != NULL && ns != NULL && task_queue != NULL) {
  245. fprintf(stderr, "creating smee client\n");
  246. std::string hostPort = std::string(host) + std::string(":") + std::string(port);
  247. this->_smee = smeeclient::smee_client_new(hostPort.c_str(), ns, task_queue);
  248. } else {
  249. fprintf(stderr, "Smee client not configured\n");
  250. }
  251. }
  252. bool PostgreSQL::waitForReady()
  253. {
  254. while (_ready < 2) {
  255. _readyLock.lock();
  256. _readyLock.unlock();
  257. }
  258. return true;
  259. }
  260. bool PostgreSQL::isReady()
  261. {
  262. return ((_ready == 2)&&(_connected));
  263. }
  264. bool PostgreSQL::save(nlohmann::json &record,bool notifyListeners)
  265. {
  266. bool modified = false;
  267. try {
  268. if (!record.is_object()) {
  269. fprintf(stderr, "record is not an object?!?\n");
  270. return false;
  271. }
  272. const std::string objtype = record["objtype"];
  273. if (objtype == "network") {
  274. //fprintf(stderr, "network save\n");
  275. const uint64_t nwid = OSUtils::jsonIntHex(record["id"],0ULL);
  276. if (nwid) {
  277. nlohmann::json old;
  278. get(nwid,old);
  279. if ((!old.is_object())||(!_compareRecords(old,record))) {
  280. record["revision"] = OSUtils::jsonInt(record["revision"],0ULL) + 1ULL;
  281. _commitQueue.post(std::pair<nlohmann::json,bool>(record,notifyListeners));
  282. modified = true;
  283. }
  284. }
  285. } else if (objtype == "member") {
  286. std::string networkId = record["nwid"];
  287. std::string memberId = record["id"];
  288. const uint64_t nwid = OSUtils::jsonIntHex(record["nwid"],0ULL);
  289. const uint64_t id = OSUtils::jsonIntHex(record["id"],0ULL);
  290. //fprintf(stderr, "member save %s-%s\n", networkId.c_str(), memberId.c_str());
  291. if ((id)&&(nwid)) {
  292. nlohmann::json network,old;
  293. get(nwid,network,id,old);
  294. if ((!old.is_object())||(!_compareRecords(old,record))) {
  295. //fprintf(stderr, "commit queue post\n");
  296. record["revision"] = OSUtils::jsonInt(record["revision"],0ULL) + 1ULL;
  297. _commitQueue.post(std::pair<nlohmann::json,bool>(record,notifyListeners));
  298. modified = true;
  299. } else {
  300. //fprintf(stderr, "no change\n");
  301. }
  302. }
  303. } else {
  304. fprintf(stderr, "uhh waaat\n");
  305. }
  306. } catch (std::exception &e) {
  307. fprintf(stderr, "Error on PostgreSQL::save: %s\n", e.what());
  308. } catch (...) {
  309. fprintf(stderr, "Unknown error on PostgreSQL::save\n");
  310. }
  311. return modified;
  312. }
  313. void PostgreSQL::eraseNetwork(const uint64_t networkId)
  314. {
  315. fprintf(stderr, "PostgreSQL::eraseNetwork\n");
  316. char tmp2[24];
  317. waitForReady();
  318. Utils::hex(networkId, tmp2);
  319. std::pair<nlohmann::json,bool> tmp;
  320. tmp.first["id"] = tmp2;
  321. tmp.first["objtype"] = "_delete_network";
  322. tmp.second = true;
  323. _commitQueue.post(tmp);
  324. nlohmann::json nullJson;
  325. _networkChanged(tmp.first, nullJson, true);
  326. }
  327. void PostgreSQL::eraseMember(const uint64_t networkId, const uint64_t memberId)
  328. {
  329. fprintf(stderr, "PostgreSQL::eraseMember\n");
  330. char tmp2[24];
  331. waitForReady();
  332. std::pair<nlohmann::json,bool> tmp, nw;
  333. Utils::hex(networkId, tmp2);
  334. tmp.first["nwid"] = tmp2;
  335. Utils::hex(memberId, tmp2);
  336. tmp.first["id"] = tmp2;
  337. tmp.first["objtype"] = "_delete_member";
  338. tmp.second = true;
  339. _commitQueue.post(tmp);
  340. nlohmann::json nullJson;
  341. _memberChanged(tmp.first, nullJson, true);
  342. }
  343. void PostgreSQL::nodeIsOnline(const uint64_t networkId, const uint64_t memberId, const InetAddress &physicalAddress)
  344. {
  345. std::lock_guard<std::mutex> l(_lastOnline_l);
  346. std::pair<int64_t, InetAddress> &i = _lastOnline[std::pair<uint64_t,uint64_t>(networkId, memberId)];
  347. i.first = OSUtils::now();
  348. if (physicalAddress) {
  349. i.second = physicalAddress;
  350. }
  351. }
  352. AuthInfo PostgreSQL::getSSOAuthInfo(const nlohmann::json &member, const std::string &redirectURL)
  353. {
  354. Metrics::db_get_sso_info++;
  355. // NONCE is just a random character string. no semantic meaning
  356. // state = HMAC SHA384 of Nonce based on shared sso key
  357. //
  358. // need nonce timeout in database? make sure it's used within X time
  359. // X is 5 minutes for now. Make configurable later?
  360. //
  361. // how do we tell when a nonce is used? if auth_expiration_time is set
  362. std::string networkId = member["nwid"];
  363. std::string memberId = member["id"];
  364. char authenticationURL[4096] = {0};
  365. AuthInfo info;
  366. info.enabled = true;
  367. //if (memberId == "a10dccea52" && networkId == "8056c2e21c24673d") {
  368. // fprintf(stderr, "invalid authinfo for grant's machine\n");
  369. // info.version=1;
  370. // return info;
  371. //}
  372. // fprintf(stderr, "PostgreSQL::updateMemberOnLoad: %s-%s\n", networkId.c_str(), memberId.c_str());
  373. std::shared_ptr<PostgresConnection> c;
  374. try {
  375. c = _pool->borrow();
  376. pqxx::work w(*c->c);
  377. char nonceBytes[16] = {0};
  378. std::string nonce = "";
  379. // check if the member exists first.
  380. pqxx::row count = w.exec_params1("SELECT count(id) FROM ztc_member WHERE id = $1 AND network_id = $2 AND deleted = false", memberId, networkId);
  381. if (count[0].as<int>() == 1) {
  382. // get active nonce, if exists.
  383. pqxx::result r = w.exec_params("SELECT nonce FROM ztc_sso_expiry "
  384. "WHERE network_id = $1 AND member_id = $2 "
  385. "AND ((NOW() AT TIME ZONE 'UTC') <= authentication_expiry_time) AND ((NOW() AT TIME ZONE 'UTC') <= nonce_expiration)",
  386. networkId, memberId);
  387. if (r.size() == 0) {
  388. // no active nonce.
  389. // find an unused nonce, if one exists.
  390. pqxx::result r = w.exec_params("SELECT nonce FROM ztc_sso_expiry "
  391. "WHERE network_id = $1 AND member_id = $2 "
  392. "AND authentication_expiry_time IS NULL AND ((NOW() AT TIME ZONE 'UTC') <= nonce_expiration)",
  393. networkId, memberId);
  394. if (r.size() == 1) {
  395. // we have an existing nonce. Use it
  396. nonce = r.at(0)[0].as<std::string>();
  397. Utils::unhex(nonce.c_str(), nonceBytes, sizeof(nonceBytes));
  398. } else if (r.empty()) {
  399. // create a nonce
  400. Utils::getSecureRandom(nonceBytes, 16);
  401. char nonceBuf[64] = {0};
  402. Utils::hex(nonceBytes, sizeof(nonceBytes), nonceBuf);
  403. nonce = std::string(nonceBuf);
  404. pqxx::result ir = w.exec_params0("INSERT INTO ztc_sso_expiry "
  405. "(nonce, nonce_expiration, network_id, member_id) VALUES "
  406. "($1, TO_TIMESTAMP($2::double precision/1000), $3, $4)",
  407. nonce, OSUtils::now() + 300000, networkId, memberId);
  408. w.commit();
  409. } else {
  410. // > 1 ?!? Thats an error!
  411. fprintf(stderr, "> 1 unused nonce!\n");
  412. exit(6);
  413. }
  414. } else if (r.size() == 1) {
  415. nonce = r.at(0)[0].as<std::string>();
  416. Utils::unhex(nonce.c_str(), nonceBytes, sizeof(nonceBytes));
  417. } else {
  418. // more than 1 nonce in use? Uhhh...
  419. fprintf(stderr, "> 1 nonce in use for network member?!?\n");
  420. exit(7);
  421. }
  422. r = w.exec_params(
  423. "SELECT oc.client_id, oc.authorization_endpoint, oc.issuer, oc.provider, oc.sso_impl_version "
  424. "FROM ztc_network AS n "
  425. "INNER JOIN ztc_org o "
  426. " ON o.owner_id = n.owner_id "
  427. "LEFT OUTER JOIN ztc_network_oidc_config noc "
  428. " ON noc.network_id = n.id "
  429. "LEFT OUTER JOIN ztc_oidc_config oc "
  430. " ON noc.client_id = oc.client_id AND oc.org_id = o.org_id "
  431. "WHERE n.id = $1 AND n.sso_enabled = true", networkId);
  432. std::string client_id = "";
  433. std::string authorization_endpoint = "";
  434. std::string issuer = "";
  435. std::string provider = "";
  436. uint64_t sso_version = 0;
  437. if (r.size() == 1) {
  438. client_id = r.at(0)[0].as<std::optional<std::string>>().value_or("");
  439. authorization_endpoint = r.at(0)[1].as<std::optional<std::string>>().value_or("");
  440. issuer = r.at(0)[2].as<std::optional<std::string>>().value_or("");
  441. provider = r.at(0)[3].as<std::optional<std::string>>().value_or("");
  442. sso_version = r.at(0)[4].as<std::optional<uint64_t>>().value_or(1);
  443. } else if (r.size() > 1) {
  444. fprintf(stderr, "ERROR: More than one auth endpoint for an organization?!?!? NetworkID: %s\n", networkId.c_str());
  445. } else {
  446. fprintf(stderr, "No client or auth endpoint?!?\n");
  447. }
  448. info.version = sso_version;
  449. // no catch all else because we don't actually care if no records exist here. just continue as normal.
  450. if ((!client_id.empty())&&(!authorization_endpoint.empty())) {
  451. uint8_t state[48];
  452. HMACSHA384(_ssoPsk, nonceBytes, sizeof(nonceBytes), state);
  453. char state_hex[256];
  454. Utils::hex(state, 48, state_hex);
  455. if (info.version == 0) {
  456. char url[2048] = {0};
  457. OSUtils::ztsnprintf(url, sizeof(authenticationURL),
  458. "%s?response_type=id_token&response_mode=form_post&scope=openid+email+profile&redirect_uri=%s&nonce=%s&state=%s&client_id=%s",
  459. authorization_endpoint.c_str(),
  460. url_encode(redirectURL).c_str(),
  461. nonce.c_str(),
  462. state_hex,
  463. client_id.c_str());
  464. info.authenticationURL = std::string(url);
  465. } else if (info.version == 1) {
  466. info.ssoClientID = client_id;
  467. info.issuerURL = issuer;
  468. info.ssoProvider = provider;
  469. info.ssoNonce = nonce;
  470. info.ssoState = std::string(state_hex) + "_" +networkId;
  471. info.centralAuthURL = redirectURL;
  472. #ifdef ZT_DEBUG
  473. fprintf(
  474. stderr,
  475. "ssoClientID: %s\nissuerURL: %s\nssoNonce: %s\nssoState: %s\ncentralAuthURL: %s\nprovider: %s\n",
  476. info.ssoClientID.c_str(),
  477. info.issuerURL.c_str(),
  478. info.ssoNonce.c_str(),
  479. info.ssoState.c_str(),
  480. info.centralAuthURL.c_str(),
  481. provider.c_str());
  482. #endif
  483. }
  484. } else {
  485. fprintf(stderr, "client_id: %s\nauthorization_endpoint: %s\n", client_id.c_str(), authorization_endpoint.c_str());
  486. }
  487. }
  488. _pool->unborrow(c);
  489. } catch (std::exception &e) {
  490. fprintf(stderr, "ERROR: Error updating member on load for network %s: %s\n", networkId.c_str(), e.what());
  491. }
  492. return info; //std::string(authenticationURL);
  493. }
  494. void PostgreSQL::initializeNetworks()
  495. {
  496. try {
  497. std::string setKey = "networks:{" + _myAddressStr + "}";
  498. fprintf(stderr, "Initializing Networks...\n");
  499. if (_redisMemberStatus) {
  500. fprintf(stderr, "Init Redis for networks...\n");
  501. try {
  502. if (_rc->clusterMode) {
  503. _cluster->del(setKey);
  504. } else {
  505. _redis->del(setKey);
  506. }
  507. } catch (sw::redis::Error &e) {
  508. // ignore. if this key doesn't exist, there's no reason to delete it
  509. }
  510. }
  511. std::unordered_set<std::string> networkSet;
  512. char qbuf[2048] = {0};
  513. sprintf(qbuf,
  514. "SELECT n.id, (EXTRACT(EPOCH FROM n.creation_time AT TIME ZONE 'UTC')*1000)::bigint as creation_time, n.capabilities, "
  515. "n.enable_broadcast, (EXTRACT(EPOCH FROM n.last_modified AT TIME ZONE 'UTC')*1000)::bigint AS last_modified, n.mtu, n.multicast_limit, n.name, n.private, n.remote_trace_level, "
  516. "n.remote_trace_target, n.revision, n.rules, n.tags, n.v4_assign_mode, n.v6_assign_mode, n.sso_enabled, (CASE WHEN n.sso_enabled THEN noc.client_id ELSE NULL END) as client_id, "
  517. "(CASE WHEN n.sso_enabled THEN oc.authorization_endpoint ELSE NULL END) as authorization_endpoint, "
  518. "(CASE WHEN n.sso_enabled THEN oc.provider ELSE NULL END) as provider, d.domain, d.servers, "
  519. "ARRAY(SELECT CONCAT(host(ip_range_start),'|', host(ip_range_end)) FROM ztc_network_assignment_pool WHERE network_id = n.id) AS assignment_pool, "
  520. "ARRAY(SELECT CONCAT(host(address),'/',bits::text,'|',COALESCE(host(via), 'NULL'))FROM ztc_network_route WHERE network_id = n.id) AS routes "
  521. "FROM ztc_network n "
  522. "LEFT OUTER JOIN ztc_org o "
  523. " ON o.owner_id = n.owner_id "
  524. "LEFT OUTER JOIN ztc_network_oidc_config noc "
  525. " ON noc.network_id = n.id "
  526. "LEFT OUTER JOIN ztc_oidc_config oc "
  527. " ON noc.client_id = oc.client_id AND oc.org_id = o.org_id "
  528. "LEFT OUTER JOIN ztc_network_dns d "
  529. " ON d.network_id = n.id "
  530. "WHERE deleted = false AND controller_id = '%s'", _myAddressStr.c_str());
  531. auto c = _pool->borrow();
  532. auto c2 = _pool->borrow();
  533. pqxx::work w{*c->c};
  534. fprintf(stderr, "Load networks from psql...\n");
  535. auto stream = pqxx::stream_from::query(w, qbuf);
  536. std::tuple<
  537. std::string // network ID
  538. , std::optional<int64_t> // creationTime
  539. , std::optional<std::string> // capabilities
  540. , std::optional<bool> // enableBroadcast
  541. , std::optional<uint64_t> // lastModified
  542. , std::optional<int> // mtu
  543. , std::optional<int> // multicastLimit
  544. , std::optional<std::string> // name
  545. , bool // private
  546. , std::optional<int> // remoteTraceLevel
  547. , std::optional<std::string> // remoteTraceTarget
  548. , std::optional<uint64_t> // revision
  549. , std::optional<std::string> // rules
  550. , std::optional<std::string> // tags
  551. , std::optional<std::string> // v4AssignMode
  552. , std::optional<std::string> // v6AssignMode
  553. , std::optional<bool> // ssoEnabled
  554. , std::optional<std::string> // clientId
  555. , std::optional<std::string> // authorizationEndpoint
  556. , std::optional<std::string> // ssoProvider
  557. , std::optional<std::string> // domain
  558. , std::optional<std::string> // servers
  559. , std::string // assignmentPoolString
  560. , std::string // routeString
  561. > row;
  562. uint64_t count = 0;
  563. auto tmp = std::chrono::high_resolution_clock::now();
  564. uint64_t total = 0;
  565. while (stream >> row) {
  566. auto start = std::chrono::high_resolution_clock::now();
  567. json empty;
  568. json config;
  569. initNetwork(config);
  570. std::string nwid = std::get<0>(row);
  571. std::optional<int64_t> creationTime = std::get<1>(row);
  572. std::optional<std::string> capabilities = std::get<2>(row);
  573. std::optional<bool> enableBroadcast = std::get<3>(row);
  574. std::optional<uint64_t> lastModified = std::get<4>(row);
  575. std::optional<int> mtu = std::get<5>(row);
  576. std::optional<int> multicastLimit = std::get<6>(row);
  577. std::optional<std::string> name = std::get<7>(row);
  578. bool isPrivate = std::get<8>(row);
  579. std::optional<int> remoteTraceLevel = std::get<9>(row);
  580. std::optional<std::string> remoteTraceTarget = std::get<10>(row);
  581. std::optional<uint64_t> revision = std::get<11>(row);
  582. std::optional<std::string> rules = std::get<12>(row);
  583. std::optional<std::string> tags = std::get<13>(row);
  584. std::optional<std::string> v4AssignMode = std::get<14>(row);
  585. std::optional<std::string> v6AssignMode = std::get<15>(row);
  586. std::optional<bool> ssoEnabled = std::get<16>(row);
  587. std::optional<std::string> clientId = std::get<17>(row);
  588. std::optional<std::string> authorizationEndpoint = std::get<18>(row);
  589. std::optional<std::string> ssoProvider = std::get<19>(row);
  590. std::optional<std::string> dnsDomain = std::get<20>(row);
  591. std::optional<std::string> dnsServers = std::get<21>(row);
  592. std::string assignmentPoolString = std::get<22>(row);
  593. std::string routesString = std::get<23>(row);
  594. config["id"] = nwid;
  595. config["nwid"] = nwid;
  596. config["creationTime"] = creationTime.value_or(0);
  597. config["capabilities"] = json::parse(capabilities.value_or("[]"));
  598. config["enableBroadcast"] = enableBroadcast.value_or(false);
  599. config["lastModified"] = lastModified.value_or(0);
  600. config["mtu"] = mtu.value_or(2800);
  601. config["multicastLimit"] = multicastLimit.value_or(64);
  602. config["name"] = name.value_or("");
  603. config["private"] = isPrivate;
  604. config["remoteTraceLevel"] = remoteTraceLevel.value_or(0);
  605. config["remoteTraceTarget"] = remoteTraceTarget.value_or("");
  606. config["revision"] = revision.value_or(0);
  607. config["rules"] = json::parse(rules.value_or("[]"));
  608. config["tags"] = json::parse(tags.value_or("[]"));
  609. config["v4AssignMode"] = json::parse(v4AssignMode.value_or("{}"));
  610. config["v6AssignMode"] = json::parse(v6AssignMode.value_or("{}"));
  611. config["ssoEnabled"] = ssoEnabled.value_or(false);
  612. config["objtype"] = "network";
  613. config["ipAssignmentPools"] = json::array();
  614. config["routes"] = json::array();
  615. config["clientId"] = clientId.value_or("");
  616. config["authorizationEndpoint"] = authorizationEndpoint.value_or("");
  617. config["provider"] = ssoProvider.value_or("");
  618. networkSet.insert(nwid);
  619. if (dnsDomain.has_value()) {
  620. std::string serverList = dnsServers.value();
  621. json obj;
  622. auto servers = json::array();
  623. if (serverList.rfind("{",0) != std::string::npos) {
  624. serverList = serverList.substr(1, serverList.size()-2);
  625. std::stringstream ss(serverList);
  626. while(ss.good()) {
  627. std::string server;
  628. std::getline(ss, server, ',');
  629. servers.push_back(server);
  630. }
  631. }
  632. obj["domain"] = dnsDomain.value();
  633. obj["servers"] = servers;
  634. config["dns"] = obj;
  635. }
  636. config["ipAssignmentPools"] = json::array();
  637. if (assignmentPoolString != "{}") {
  638. std::string tmp = assignmentPoolString.substr(1, assignmentPoolString.size()-2);
  639. std::vector<std::string> assignmentPools = split(tmp, ',');
  640. for (auto it = assignmentPools.begin(); it != assignmentPools.end(); ++it) {
  641. std::vector<std::string> r = split(*it, '|');
  642. json ip;
  643. ip["ipRangeStart"] = r[0];
  644. ip["ipRangeEnd"] = r[1];
  645. config["ipAssignmentPools"].push_back(ip);
  646. }
  647. }
  648. config["routes"] = json::array();
  649. if (routesString != "{}") {
  650. std::string tmp = routesString.substr(1, routesString.size()-2);
  651. std::vector<std::string> routes = split(tmp, ',');
  652. for (auto it = routes.begin(); it != routes.end(); ++it) {
  653. std::vector<std::string> r = split(*it, '|');
  654. json route;
  655. route["target"] = r[0];
  656. route["via"] = ((route["via"] == "NULL")? nullptr : r[1]);
  657. config["routes"].push_back(route);
  658. }
  659. }
  660. Metrics::network_count++;
  661. _networkChanged(empty, config, false);
  662. auto end = std::chrono::high_resolution_clock::now();
  663. auto dur = std::chrono::duration_cast<std::chrono::microseconds>(end - start);;
  664. total += dur.count();
  665. ++count;
  666. if (count > 0 && count % 10000 == 0) {
  667. fprintf(stderr, "Averaging %llu us per network\n", (total/count));
  668. }
  669. }
  670. if (count > 0) {
  671. fprintf(stderr, "Took %llu us per network to load\n", (total/count));
  672. }
  673. stream.complete();
  674. w.commit();
  675. _pool->unborrow(c2);
  676. _pool->unborrow(c);
  677. fprintf(stderr, "done.\n");
  678. if (!networkSet.empty()) {
  679. if (_redisMemberStatus) {
  680. fprintf(stderr, "adding networks to redis...\n");
  681. if (_rc->clusterMode) {
  682. auto tx = _cluster->transaction(_myAddressStr, true, false);
  683. tx.sadd(setKey, networkSet.begin(), networkSet.end());
  684. tx.exec();
  685. } else {
  686. auto tx = _redis->transaction(true, false);
  687. tx.sadd(setKey, networkSet.begin(), networkSet.end());
  688. tx.exec();
  689. }
  690. fprintf(stderr, "done.\n");
  691. }
  692. }
  693. if (++this->_ready == 2) {
  694. if (_waitNoticePrinted) {
  695. fprintf(stderr,"[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
  696. }
  697. _readyLock.unlock();
  698. }
  699. fprintf(stderr, "network init done.\n");
  700. } catch (sw::redis::Error &e) {
  701. fprintf(stderr, "ERROR: Error initializing networks in Redis: %s\n", e.what());
  702. std::this_thread::sleep_for(std::chrono::milliseconds(5000));
  703. exit(-1);
  704. } catch (std::exception &e) {
  705. fprintf(stderr, "ERROR: Error initializing networks: %s\n", e.what());
  706. std::this_thread::sleep_for(std::chrono::milliseconds(5000));
  707. exit(-1);
  708. }
  709. }
  710. void PostgreSQL::initializeMembers()
  711. {
  712. std::string memberId;
  713. std::string networkId;
  714. try {
  715. std::unordered_map<std::string, std::string> networkMembers;
  716. fprintf(stderr, "Initializing Members...\n");
  717. std::string setKeyBase = "network-nodes-all:{" + _myAddressStr + "}:";
  718. if (_redisMemberStatus) {
  719. fprintf(stderr, "Initialize Redis for members...\n");
  720. std::unique_lock<std::shared_mutex> l(_networks_l);
  721. std::unordered_set<std::string> deletes;
  722. for ( auto it : _networks) {
  723. uint64_t nwid_i = it.first;
  724. char nwidTmp[64] = {0};
  725. OSUtils::ztsnprintf(nwidTmp, sizeof(nwidTmp), "%.16llx", nwid_i);
  726. std::string nwid(nwidTmp);
  727. std::string key = setKeyBase + nwid;
  728. deletes.insert(key);
  729. }
  730. if (!deletes.empty()) {
  731. try {
  732. if (_rc->clusterMode) {
  733. auto tx = _cluster->transaction(_myAddressStr, true, false);
  734. for (std::string k : deletes) {
  735. tx.del(k);
  736. }
  737. tx.exec();
  738. } else {
  739. auto tx = _redis->transaction(true, false);
  740. for (std::string k : deletes) {
  741. tx.del(k);
  742. }
  743. tx.exec();
  744. }
  745. } catch (sw::redis::Error &e) {
  746. // ignore
  747. }
  748. }
  749. }
  750. char qbuf[2048];
  751. sprintf(qbuf,
  752. "SELECT m.id, m.network_id, m.active_bridge, m.authorized, m.capabilities, "
  753. "(EXTRACT(EPOCH FROM m.creation_time AT TIME ZONE 'UTC')*1000)::bigint, m.identity, "
  754. "(EXTRACT(EPOCH FROM m.last_authorized_time AT TIME ZONE 'UTC')*1000)::bigint, "
  755. "(EXTRACT(EPOCH FROM m.last_deauthorized_time AT TIME ZONE 'UTC')*1000)::bigint, "
  756. "m.remote_trace_level, m.remote_trace_target, m.tags, m.v_major, m.v_minor, m.v_rev, m.v_proto, "
  757. "m.no_auto_assign_ips, m.revision, m.sso_exempt, "
  758. "(CASE WHEN n.sso_enabled = TRUE AND m.sso_exempt = FALSE THEN "
  759. " ( "
  760. " SELECT (EXTRACT(EPOCH FROM e.authentication_expiry_time)*1000)::bigint "
  761. " FROM ztc_sso_expiry e "
  762. " INNER JOIN ztc_network n1 "
  763. " ON n1.id = e.network_id AND n1.deleted = TRUE "
  764. " WHERE e.network_id = m.network_id AND e.member_id = m.id AND n.sso_enabled = TRUE AND e.authentication_expiry_time IS NOT NULL "
  765. " ORDER BY e.authentication_expiry_time DESC LIMIT 1 "
  766. " ) "
  767. " ELSE NULL "
  768. " END) AS authentication_expiry_time, "
  769. "ARRAY(SELECT DISTINCT address FROM ztc_member_ip_assignment WHERE member_id = m.id AND network_id = m.network_id) AS assigned_addresses "
  770. "FROM ztc_member m "
  771. "INNER JOIN ztc_network n "
  772. " ON n.id = m.network_id "
  773. "WHERE n.controller_id = '%s' AND n.deleted = FALSE AND m.deleted = FALSE", _myAddressStr.c_str());
  774. auto c = _pool->borrow();
  775. auto c2 = _pool->borrow();
  776. pqxx::work w{*c->c};
  777. fprintf(stderr, "Load members from psql...\n");
  778. auto stream = pqxx::stream_from::query(w, qbuf);
  779. std::tuple<
  780. std::string // memberId
  781. , std::string // memberId
  782. , std::optional<bool> // activeBridge
  783. , std::optional<bool> // authorized
  784. , std::optional<std::string> // capabilities
  785. , std::optional<uint64_t> // creationTime
  786. , std::optional<std::string> // identity
  787. , std::optional<uint64_t> // lastAuthorizedTime
  788. , std::optional<uint64_t> // lastDeauthorizedTime
  789. , std::optional<int> // remoteTraceLevel
  790. , std::optional<std::string> // remoteTraceTarget
  791. , std::optional<std::string> // tags
  792. , std::optional<int> // vMajor
  793. , std::optional<int> // vMinor
  794. , std::optional<int> // vRev
  795. , std::optional<int> // vProto
  796. , std::optional<bool> // noAutoAssignIps
  797. , std::optional<uint64_t> // revision
  798. , std::optional<bool> // ssoExempt
  799. , std::optional<uint64_t> // authenticationExpiryTime
  800. , std::string // assignedAddresses
  801. > row;
  802. uint64_t count = 0;
  803. auto tmp = std::chrono::high_resolution_clock::now();
  804. uint64_t total = 0;
  805. while (stream >> row) {
  806. auto start = std::chrono::high_resolution_clock::now();
  807. json empty;
  808. json config;
  809. initMember(config);
  810. memberId = std::get<0>(row);
  811. networkId = std::get<1>(row);
  812. std::optional<bool> activeBridge = std::get<2>(row);
  813. std::optional<bool> authorized = std::get<3>(row);
  814. std::optional<std::string> capabilities = std::get<4>(row);
  815. std::optional<uint64_t> creationTime = std::get<5>(row);
  816. std::optional<std::string> identity = std::get<6>(row);
  817. std::optional<uint64_t> lastAuthorizedTime = std::get<7>(row);
  818. std::optional<uint64_t> lastDeauthorizedTime = std::get<8>(row);
  819. std::optional<int> remoteTraceLevel = std::get<9>(row);
  820. std::optional<std::string> remoteTraceTarget = std::get<10>(row);
  821. std::optional<std::string> tags = std::get<11>(row);
  822. std::optional<int> vMajor = std::get<12>(row);
  823. std::optional<int> vMinor = std::get<13>(row);
  824. std::optional<int> vRev = std::get<14>(row);
  825. std::optional<int> vProto = std::get<15>(row);
  826. std::optional<bool> noAutoAssignIps = std::get<16>(row);
  827. std::optional<uint64_t> revision = std::get<17>(row);
  828. std::optional<bool> ssoExempt = std::get<18>(row);
  829. std::optional<uint64_t> authenticationExpiryTime = std::get<19>(row);
  830. std::string assignedAddresses = std::get<20>(row);
  831. networkMembers.insert(std::pair<std::string, std::string>(setKeyBase+networkId, memberId));
  832. config["id"] = memberId;
  833. config["address"] = memberId;
  834. config["nwid"] = networkId;
  835. config["activeBridge"] = activeBridge.value_or(false);
  836. config["authorized"] = authorized.value_or(false);
  837. config["capabilities"] = json::parse(capabilities.value_or("[]"));
  838. config["creationTime"] = creationTime.value_or(0);
  839. config["identity"] = identity.value_or("");
  840. config["lastAuthorizedTime"] = lastAuthorizedTime.value_or(0);
  841. config["lastDeauthorizedTime"] = lastDeauthorizedTime.value_or(0);
  842. config["remoteTraceLevel"] = remoteTraceLevel.value_or(0);
  843. config["remoteTraceTarget"] = remoteTraceTarget.value_or("");
  844. config["tags"] = json::parse(tags.value_or("[]"));
  845. config["vMajor"] = vMajor.value_or(-1);
  846. config["vMinor"] = vMinor.value_or(-1);
  847. config["vRev"] = vRev.value_or(-1);
  848. config["vProto"] = vProto.value_or(-1);
  849. config["noAutoAssignIps"] = noAutoAssignIps.value_or(false);
  850. config["revision"] = revision.value_or(0);
  851. config["ssoExempt"] = ssoExempt.value_or(false);
  852. config["authenticationExpiryTime"] = authenticationExpiryTime.value_or(0);
  853. config["objtype"] = "member";
  854. config["ipAssignments"] = json::array();
  855. if (assignedAddresses != "{}") {
  856. std::string tmp = assignedAddresses.substr(1, assignedAddresses.size()-2);
  857. std::vector<std::string> addrs = split(tmp, ',');
  858. for (auto it = addrs.begin(); it != addrs.end(); ++it) {
  859. config["ipAssignments"].push_back(*it);
  860. }
  861. }
  862. Metrics::member_count++;
  863. _memberChanged(empty, config, false);
  864. memberId = "";
  865. networkId = "";
  866. auto end = std::chrono::high_resolution_clock::now();
  867. auto dur = std::chrono::duration_cast<std::chrono::microseconds>(end - start);
  868. total += dur.count();
  869. ++count;
  870. if (count > 0 && count % 10000 == 0) {
  871. fprintf(stderr, "Averaging %llu us per member\n", (total/count));
  872. }
  873. }
  874. if (count > 0) {
  875. fprintf(stderr, "Took %llu us per member to load\n", (total/count));
  876. }
  877. stream.complete();
  878. w.commit();
  879. _pool->unborrow(c2);
  880. _pool->unborrow(c);
  881. fprintf(stderr, "done.\n");
  882. if (!networkMembers.empty()) {
  883. if (_redisMemberStatus) {
  884. fprintf(stderr, "Load member data into redis...\n");
  885. if (_rc->clusterMode) {
  886. auto tx = _cluster->transaction(_myAddressStr, true, false);
  887. for (auto it : networkMembers) {
  888. tx.sadd(it.first, it.second);
  889. }
  890. tx.exec();
  891. } else {
  892. auto tx = _redis->transaction(true, false);
  893. for (auto it : networkMembers) {
  894. tx.sadd(it.first, it.second);
  895. }
  896. tx.exec();
  897. }
  898. fprintf(stderr, "done.\n");
  899. }
  900. }
  901. fprintf(stderr, "Done loading members...\n");
  902. if (++this->_ready == 2) {
  903. if (_waitNoticePrinted) {
  904. fprintf(stderr,"[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
  905. }
  906. _readyLock.unlock();
  907. }
  908. } catch (sw::redis::Error &e) {
  909. fprintf(stderr, "ERROR: Error initializing members (redis): %s\n", e.what());
  910. exit(-1);
  911. } catch (std::exception &e) {
  912. fprintf(stderr, "ERROR: Error initializing member: %s-%s %s\n", networkId.c_str(), memberId.c_str(), e.what());
  913. exit(-1);
  914. }
  915. }
  916. void PostgreSQL::heartbeat()
  917. {
  918. char publicId[1024];
  919. char hostnameTmp[1024];
  920. _myId.toString(false,publicId);
  921. if (gethostname(hostnameTmp, sizeof(hostnameTmp))!= 0) {
  922. hostnameTmp[0] = (char)0;
  923. } else {
  924. for (int i = 0; i < (int)sizeof(hostnameTmp); ++i) {
  925. if ((hostnameTmp[i] == '.')||(hostnameTmp[i] == 0)) {
  926. hostnameTmp[i] = (char)0;
  927. break;
  928. }
  929. }
  930. }
  931. const char *controllerId = _myAddressStr.c_str();
  932. const char *publicIdentity = publicId;
  933. const char *hostname = hostnameTmp;
  934. while (_run == 1) {
  935. // fprintf(stderr, "%s: heartbeat\n", controllerId);
  936. auto c = _pool->borrow();
  937. int64_t ts = OSUtils::now();
  938. if(c->c) {
  939. std::string major = std::to_string(ZEROTIER_ONE_VERSION_MAJOR);
  940. std::string minor = std::to_string(ZEROTIER_ONE_VERSION_MINOR);
  941. std::string rev = std::to_string(ZEROTIER_ONE_VERSION_REVISION);
  942. std::string build = std::to_string(ZEROTIER_ONE_VERSION_BUILD);
  943. std::string now = std::to_string(ts);
  944. std::string host_port = std::to_string(_listenPort);
  945. std::string use_redis = (_rc != NULL) ? "true" : "false";
  946. std::string redis_mem_status = (_redisMemberStatus) ? "true" : "false";
  947. try {
  948. pqxx::work w{*c->c};
  949. pqxx::result res =
  950. w.exec0("INSERT INTO ztc_controller (id, cluster_host, last_alive, public_identity, v_major, v_minor, v_rev, v_build, host_port, use_redis, redis_member_status) "
  951. "VALUES ("+w.quote(controllerId)+", "+w.quote(hostname)+", TO_TIMESTAMP("+now+"::double precision/1000), "+
  952. w.quote(publicIdentity)+", "+major+", "+minor+", "+rev+", "+build+", "+host_port+", "+use_redis+", "+redis_mem_status+") "
  953. "ON CONFLICT (id) DO UPDATE SET cluster_host = EXCLUDED.cluster_host, last_alive = EXCLUDED.last_alive, "
  954. "public_identity = EXCLUDED.public_identity, v_major = EXCLUDED.v_major, v_minor = EXCLUDED.v_minor, "
  955. "v_rev = EXCLUDED.v_rev, v_build = EXCLUDED.v_rev, host_port = EXCLUDED.host_port, "
  956. "use_redis = EXCLUDED.use_redis, redis_member_status = EXCLUDED.redis_member_status");
  957. w.commit();
  958. } catch (std::exception &e) {
  959. fprintf(stderr, "%s: Heartbeat update failed: %s\n", controllerId, e.what());
  960. std::this_thread::sleep_for(std::chrono::milliseconds(1000));
  961. continue;
  962. }
  963. }
  964. _pool->unborrow(c);
  965. try {
  966. if (_redisMemberStatus) {
  967. if (_rc->clusterMode) {
  968. _cluster->zadd("controllers", "controllerId", ts);
  969. } else {
  970. _redis->zadd("controllers", "controllerId", ts);
  971. }
  972. }
  973. } catch (sw::redis::Error &e) {
  974. fprintf(stderr, "ERROR: Redis error in heartbeat thread: %s\n", e.what());
  975. }
  976. std::this_thread::sleep_for(std::chrono::milliseconds(1000));
  977. }
  978. fprintf(stderr, "Exited heartbeat thread\n");
  979. }
  980. void PostgreSQL::membersDbWatcher()
  981. {
  982. if (_rc) {
  983. _membersWatcher_Redis();
  984. } else {
  985. _membersWatcher_Postgres();
  986. }
  987. if (_run == 1) {
  988. fprintf(stderr, "ERROR: %s membersDbWatcher should still be running! Exiting Controller.\n", _myAddressStr.c_str());
  989. exit(9);
  990. }
  991. fprintf(stderr, "Exited membersDbWatcher\n");
  992. }
  993. void PostgreSQL::_membersWatcher_Postgres() {
  994. auto c = _pool->borrow();
  995. std::string stream = "member_" + _myAddressStr;
  996. fprintf(stderr, "Listening to member stream: %s\n", stream.c_str());
  997. MemberNotificationReceiver m(this, *c->c, stream);
  998. while(_run == 1) {
  999. c->c->await_notification(5, 0);
  1000. }
  1001. _pool->unborrow(c);
  1002. }
  1003. void PostgreSQL::_membersWatcher_Redis() {
  1004. char buf[11] = {0};
  1005. std::string key = "member-stream:{" + std::string(_myAddress.toString(buf)) + "}";
  1006. std::string lastID = "0";
  1007. fprintf(stderr, "Listening to member stream: %s\n", key.c_str());
  1008. while (_run == 1) {
  1009. try {
  1010. json tmp;
  1011. std::unordered_map<std::string, ItemStream> result;
  1012. if (_rc->clusterMode) {
  1013. _cluster->xread(key, lastID, std::chrono::seconds(1), 0, std::inserter(result, result.end()));
  1014. } else {
  1015. _redis->xread(key, lastID, std::chrono::seconds(1), 0, std::inserter(result, result.end()));
  1016. }
  1017. if (!result.empty()) {
  1018. for (auto element : result) {
  1019. #ifdef REDIS_TRACE
  1020. fprintf(stdout, "Received notification from: %s\n", element.first.c_str());
  1021. #endif
  1022. for (auto rec : element.second) {
  1023. std::string id = rec.first;
  1024. auto attrs = rec.second;
  1025. #ifdef REDIS_TRACE
  1026. fprintf(stdout, "Record ID: %s\n", id.c_str());
  1027. fprintf(stdout, "attrs len: %lu\n", attrs.size());
  1028. #endif
  1029. for (auto a : attrs) {
  1030. #ifdef REDIS_TRACE
  1031. fprintf(stdout, "key: %s\nvalue: %s\n", a.first.c_str(), a.second.c_str());
  1032. #endif
  1033. try {
  1034. tmp = json::parse(a.second);
  1035. json &ov = tmp["old_val"];
  1036. json &nv = tmp["new_val"];
  1037. json oldConfig, newConfig;
  1038. if (ov.is_object()) oldConfig = ov;
  1039. if (nv.is_object()) newConfig = nv;
  1040. if (oldConfig.is_object()||newConfig.is_object()) {
  1041. _memberChanged(oldConfig,newConfig,(this->_ready >= 2));
  1042. }
  1043. } catch (...) {
  1044. fprintf(stderr, "json parse error in networkWatcher_Redis\n");
  1045. }
  1046. }
  1047. if (_rc->clusterMode) {
  1048. _cluster->xdel(key, id);
  1049. } else {
  1050. _redis->xdel(key, id);
  1051. }
  1052. lastID = id;
  1053. Metrics::redis_mem_notification++;
  1054. }
  1055. }
  1056. }
  1057. } catch (sw::redis::Error &e) {
  1058. fprintf(stderr, "Error in Redis members watcher: %s\n", e.what());
  1059. }
  1060. }
  1061. fprintf(stderr, "membersWatcher ended\n");
  1062. }
  1063. void PostgreSQL::networksDbWatcher()
  1064. {
  1065. if (_rc) {
  1066. _networksWatcher_Redis();
  1067. } else {
  1068. _networksWatcher_Postgres();
  1069. }
  1070. if (_run == 1) {
  1071. fprintf(stderr, "ERROR: %s networksDbWatcher should still be running! Exiting Controller.\n", _myAddressStr.c_str());
  1072. exit(8);
  1073. }
  1074. fprintf(stderr, "Exited networksDbWatcher\n");
  1075. }
  1076. void PostgreSQL::_networksWatcher_Postgres() {
  1077. std::string stream = "network_" + _myAddressStr;
  1078. fprintf(stderr, "Listening to member stream: %s\n", stream.c_str());
  1079. auto c = _pool->borrow();
  1080. NetworkNotificationReceiver n(this, *c->c, stream);
  1081. while(_run == 1) {
  1082. c->c->await_notification(5,0);
  1083. }
  1084. }
  1085. void PostgreSQL::_networksWatcher_Redis() {
  1086. char buf[11] = {0};
  1087. std::string key = "network-stream:{" + std::string(_myAddress.toString(buf)) + "}";
  1088. std::string lastID = "0";
  1089. while (_run == 1) {
  1090. try {
  1091. json tmp;
  1092. std::unordered_map<std::string, ItemStream> result;
  1093. if (_rc->clusterMode) {
  1094. _cluster->xread(key, lastID, std::chrono::seconds(1), 0, std::inserter(result, result.end()));
  1095. } else {
  1096. _redis->xread(key, lastID, std::chrono::seconds(1), 0, std::inserter(result, result.end()));
  1097. }
  1098. if (!result.empty()) {
  1099. for (auto element : result) {
  1100. #ifdef REDIS_TRACE
  1101. fprintf(stdout, "Received notification from: %s\n", element.first.c_str());
  1102. #endif
  1103. for (auto rec : element.second) {
  1104. std::string id = rec.first;
  1105. auto attrs = rec.second;
  1106. #ifdef REDIS_TRACE
  1107. fprintf(stdout, "Record ID: %s\n", id.c_str());
  1108. fprintf(stdout, "attrs len: %lu\n", attrs.size());
  1109. #endif
  1110. for (auto a : attrs) {
  1111. #ifdef REDIS_TRACE
  1112. fprintf(stdout, "key: %s\nvalue: %s\n", a.first.c_str(), a.second.c_str());
  1113. #endif
  1114. try {
  1115. tmp = json::parse(a.second);
  1116. json &ov = tmp["old_val"];
  1117. json &nv = tmp["new_val"];
  1118. json oldConfig, newConfig;
  1119. if (ov.is_object()) oldConfig = ov;
  1120. if (nv.is_object()) newConfig = nv;
  1121. if (oldConfig.is_object()||newConfig.is_object()) {
  1122. _networkChanged(oldConfig,newConfig,(this->_ready >= 2));
  1123. }
  1124. } catch (...) {
  1125. fprintf(stderr, "json parse error in networkWatcher_Redis\n");
  1126. }
  1127. }
  1128. if (_rc->clusterMode) {
  1129. _cluster->xdel(key, id);
  1130. } else {
  1131. _redis->xdel(key, id);
  1132. }
  1133. lastID = id;
  1134. }
  1135. Metrics::redis_net_notification++;
  1136. }
  1137. }
  1138. } catch (sw::redis::Error &e) {
  1139. fprintf(stderr, "Error in Redis networks watcher: %s\n", e.what());
  1140. }
  1141. }
  1142. fprintf(stderr, "networksWatcher ended\n");
  1143. }
  1144. void PostgreSQL::commitThread()
  1145. {
  1146. fprintf(stderr, "%s: commitThread start\n", _myAddressStr.c_str());
  1147. std::pair<nlohmann::json,bool> qitem;
  1148. while(_commitQueue.get(qitem)&(_run == 1)) {
  1149. //fprintf(stderr, "commitThread tick\n");
  1150. if (!qitem.first.is_object()) {
  1151. fprintf(stderr, "not an object\n");
  1152. continue;
  1153. }
  1154. std::shared_ptr<PostgresConnection> c;
  1155. try {
  1156. c = _pool->borrow();
  1157. } catch (std::exception &e) {
  1158. fprintf(stderr, "ERROR: %s\n", e.what());
  1159. continue;
  1160. }
  1161. if (!c) {
  1162. fprintf(stderr, "Error getting database connection\n");
  1163. continue;
  1164. }
  1165. Metrics::pgsql_commit_ticks++;
  1166. try {
  1167. nlohmann::json &config = (qitem.first);
  1168. const std::string objtype = config["objtype"];
  1169. if (objtype == "member") {
  1170. // fprintf(stderr, "%s: commitThread: member\n", _myAddressStr.c_str());
  1171. std::string memberId;
  1172. std::string networkId;
  1173. try {
  1174. pqxx::work w(*c->c);
  1175. memberId = config["id"];
  1176. networkId = config["nwid"];
  1177. std::string target = "NULL";
  1178. if (!config["remoteTraceTarget"].is_null()) {
  1179. target = config["remoteTraceTarget"];
  1180. }
  1181. pqxx::row nwrow = w.exec_params1("SELECT COUNT(id) FROM ztc_network WHERE id = $1", networkId);
  1182. int nwcount = nwrow[0].as<int>();
  1183. if (nwcount != 1) {
  1184. fprintf(stderr, "network %s does not exist. skipping member upsert\n", networkId.c_str());
  1185. w.abort();
  1186. _pool->unborrow(c);
  1187. continue;
  1188. }
  1189. pqxx::row mrow = w.exec_params1("SELECT COUNT(id) FROM ztc_member WHERE id = $1 AND network_id = $2", memberId, networkId);
  1190. int membercount = mrow[0].as<int>();
  1191. bool isNewMember = false;
  1192. if (membercount == 0) {
  1193. // new member
  1194. isNewMember = true;
  1195. pqxx::result res = w.exec_params0(
  1196. "INSERT INTO ztc_member (id, network_id, active_bridge, authorized, capabilities, "
  1197. "identity, last_authorized_time, last_deauthorized_time, no_auto_assign_ips, "
  1198. "remote_trace_level, remote_trace_target, revision, tags, v_major, v_minor, v_rev, v_proto) "
  1199. "VALUES ($1, $2, $3, $4, $5, $6, "
  1200. "TO_TIMESTAMP($7::double precision/1000), TO_TIMESTAMP($8::double precision/1000), "
  1201. "$9, $10, $11, $12, $13, $14, $15, $16, $17)",
  1202. memberId,
  1203. networkId,
  1204. (bool)config["activeBridge"],
  1205. (bool)config["authorized"],
  1206. OSUtils::jsonDump(config["capabilities"], -1),
  1207. OSUtils::jsonString(config["identity"], ""),
  1208. (uint64_t)config["lastAuthorizedTime"],
  1209. (uint64_t)config["lastDeauthorizedTime"],
  1210. (bool)config["noAutoAssignIps"],
  1211. (int)config["remoteTraceLevel"],
  1212. target,
  1213. (uint64_t)config["revision"],
  1214. OSUtils::jsonDump(config["tags"], -1),
  1215. (int)config["vMajor"],
  1216. (int)config["vMinor"],
  1217. (int)config["vRev"],
  1218. (int)config["vProto"]);
  1219. } else {
  1220. // existing member
  1221. pqxx::result res = w.exec_params0(
  1222. "UPDATE ztc_member "
  1223. "SET active_bridge = $3, authorized = $4, capabilities = $5, identity = $6, "
  1224. "last_authorized_time = TO_TIMESTAMP($7::double precision/1000), "
  1225. "last_deauthorized_time = TO_TIMESTAMP($8::double precision/1000), "
  1226. "no_auto_assign_ips = $9, remote_trace_level = $10, remote_trace_target= $11, "
  1227. "revision = $12, tags = $13, v_major = $14, v_minor = $15, v_rev = $16, v_proto = $17 "
  1228. "WHERE id = $1 AND network_id = $2",
  1229. memberId,
  1230. networkId,
  1231. (bool)config["activeBridge"],
  1232. (bool)config["authorized"],
  1233. OSUtils::jsonDump(config["capabilities"], -1),
  1234. OSUtils::jsonString(config["identity"], ""),
  1235. (uint64_t)config["lastAuthorizedTime"],
  1236. (uint64_t)config["lastDeauthorizedTime"],
  1237. (bool)config["noAutoAssignIps"],
  1238. (int)config["remoteTraceLevel"],
  1239. target,
  1240. (uint64_t)config["revision"],
  1241. OSUtils::jsonDump(config["tags"], -1),
  1242. (int)config["vMajor"],
  1243. (int)config["vMinor"],
  1244. (int)config["vRev"],
  1245. (int)config["vProto"]
  1246. );
  1247. }
  1248. if (!isNewMember) {
  1249. pqxx::result res = w.exec_params0("DELETE FROM ztc_member_ip_assignment WHERE member_id = $1 AND network_id = $2",
  1250. memberId, networkId);
  1251. }
  1252. std::vector<std::string> assignments;
  1253. bool ipAssignError = false;
  1254. for (auto i = config["ipAssignments"].begin(); i != config["ipAssignments"].end(); ++i) {
  1255. std::string addr = *i;
  1256. if (std::find(assignments.begin(), assignments.end(), addr) != assignments.end()) {
  1257. continue;
  1258. }
  1259. pqxx::result res = w.exec_params0(
  1260. "INSERT INTO ztc_member_ip_assignment (member_id, network_id, address) VALUES ($1, $2, $3) ON CONFLICT (network_id, member_id, address) DO NOTHING",
  1261. memberId, networkId, addr);
  1262. assignments.push_back(addr);
  1263. }
  1264. if (ipAssignError) {
  1265. fprintf(stderr, "%s: ipAssignError\n", _myAddressStr.c_str());
  1266. w.abort();
  1267. _pool->unborrow(c);
  1268. c.reset();
  1269. continue;
  1270. }
  1271. w.commit();
  1272. if (_smee != NULL && isNewMember) {
  1273. notifyNewMember(networkId, memberId);
  1274. } else {
  1275. if (_smee == NULL) {
  1276. fprintf(stderr, "smee is NULL\n");
  1277. }
  1278. if (!isNewMember) {
  1279. fprintf(stderr, "nt a new member\n");
  1280. }
  1281. }
  1282. const uint64_t nwidInt = OSUtils::jsonIntHex(config["nwid"], 0ULL);
  1283. const uint64_t memberidInt = OSUtils::jsonIntHex(config["id"], 0ULL);
  1284. if (nwidInt && memberidInt) {
  1285. nlohmann::json nwOrig;
  1286. nlohmann::json memOrig;
  1287. nlohmann::json memNew(config);
  1288. get(nwidInt, nwOrig, memberidInt, memOrig);
  1289. _memberChanged(memOrig, memNew, qitem.second);
  1290. } else {
  1291. fprintf(stderr, "%s: Can't notify of change. Error parsing nwid or memberid: %llu-%llu\n", _myAddressStr.c_str(), (unsigned long long)nwidInt, (unsigned long long)memberidInt);
  1292. }
  1293. } catch (std::exception &e) {
  1294. fprintf(stderr, "%s ERROR: Error updating member %s-%s: %s\n", _myAddressStr.c_str(), networkId.c_str(), memberId.c_str(), e.what());
  1295. }
  1296. } else if (objtype == "network") {
  1297. try {
  1298. // fprintf(stderr, "%s: commitThread: network\n", _myAddressStr.c_str());
  1299. pqxx::work w(*c->c);
  1300. std::string id = config["id"];
  1301. std::string remoteTraceTarget = "";
  1302. if(!config["remoteTraceTarget"].is_null()) {
  1303. remoteTraceTarget = config["remoteTraceTarget"];
  1304. }
  1305. std::string rulesSource = "";
  1306. if (config["rulesSource"].is_string()) {
  1307. rulesSource = config["rulesSource"];
  1308. }
  1309. // This ugly query exists because when we want to mirror networks to/from
  1310. // another data store (e.g. FileDB or LFDB) it is possible to get a network
  1311. // that doesn't exist in Central's database. This does an upsert and sets
  1312. // the owner_id to the "first" global admin in the user DB if the record
  1313. // did not previously exist. If the record already exists owner_id is left
  1314. // unchanged, so owner_id should be left out of the update clause.
  1315. pqxx::result res = w.exec_params0(
  1316. "INSERT INTO ztc_network (id, creation_time, owner_id, controller_id, capabilities, enable_broadcast, "
  1317. "last_modified, mtu, multicast_limit, name, private, "
  1318. "remote_trace_level, remote_trace_target, rules, rules_source, "
  1319. "tags, v4_assign_mode, v6_assign_mode, sso_enabled) VALUES ("
  1320. "$1, TO_TIMESTAMP($5::double precision/1000), "
  1321. "(SELECT user_id AS owner_id FROM ztc_global_permissions WHERE authorize = true AND del = true AND modify = true AND read = true LIMIT 1),"
  1322. "$2, $3, $4, TO_TIMESTAMP($5::double precision/1000), "
  1323. "$6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17) "
  1324. "ON CONFLICT (id) DO UPDATE set controller_id = EXCLUDED.controller_id, "
  1325. "capabilities = EXCLUDED.capabilities, enable_broadcast = EXCLUDED.enable_broadcast, "
  1326. "last_modified = EXCLUDED.last_modified, mtu = EXCLUDED.mtu, "
  1327. "multicast_limit = EXCLUDED.multicast_limit, name = EXCLUDED.name, "
  1328. "private = EXCLUDED.private, remote_trace_level = EXCLUDED.remote_trace_level, "
  1329. "remote_trace_target = EXCLUDED.remote_trace_target, rules = EXCLUDED.rules, "
  1330. "rules_source = EXCLUDED.rules_source, tags = EXCLUDED.tags, "
  1331. "v4_assign_mode = EXCLUDED.v4_assign_mode, v6_assign_mode = EXCLUDED.v6_assign_mode, "
  1332. "sso_enabled = EXCLUDED.sso_enabled",
  1333. id,
  1334. _myAddressStr,
  1335. OSUtils::jsonDump(config["capabilities"], -1),
  1336. (bool)config["enableBroadcast"],
  1337. OSUtils::now(),
  1338. (int)config["mtu"],
  1339. (int)config["multicastLimit"],
  1340. OSUtils::jsonString(config["name"],""),
  1341. (bool)config["private"],
  1342. (int)config["remoteTraceLevel"],
  1343. remoteTraceTarget,
  1344. OSUtils::jsonDump(config["rules"], -1),
  1345. rulesSource,
  1346. OSUtils::jsonDump(config["tags"], -1),
  1347. OSUtils::jsonDump(config["v4AssignMode"],-1),
  1348. OSUtils::jsonDump(config["v6AssignMode"], -1),
  1349. OSUtils::jsonBool(config["ssoEnabled"], false));
  1350. res = w.exec_params0("DELETE FROM ztc_network_assignment_pool WHERE network_id = $1", 0);
  1351. auto pool = config["ipAssignmentPools"];
  1352. bool err = false;
  1353. for (auto i = pool.begin(); i != pool.end(); ++i) {
  1354. std::string start = (*i)["ipRangeStart"];
  1355. std::string end = (*i)["ipRangeEnd"];
  1356. res = w.exec_params0(
  1357. "INSERT INTO ztc_network_assignment_pool (network_id, ip_range_start, ip_range_end) "
  1358. "VALUES ($1, $2, $3)", id, start, end);
  1359. }
  1360. res = w.exec_params0("DELETE FROM ztc_network_route WHERE network_id = $1", id);
  1361. auto routes = config["routes"];
  1362. err = false;
  1363. for (auto i = routes.begin(); i != routes.end(); ++i) {
  1364. std::string t = (*i)["target"];
  1365. std::vector<std::string> target;
  1366. std::istringstream f(t);
  1367. std::string s;
  1368. while(std::getline(f, s, '/')) {
  1369. target.push_back(s);
  1370. }
  1371. if (target.empty() || target.size() != 2) {
  1372. continue;
  1373. }
  1374. std::string targetAddr = target[0];
  1375. std::string targetBits = target[1];
  1376. std::string via = "NULL";
  1377. if (!(*i)["via"].is_null()) {
  1378. via = (*i)["via"];
  1379. }
  1380. res = w.exec_params0("INSERT INTO ztc_network_route (network_id, address, bits, via) VALUES ($1, $2, $3, $4)",
  1381. id, targetAddr, targetBits, (via == "NULL" ? NULL : via.c_str()));
  1382. }
  1383. if (err) {
  1384. fprintf(stderr, "%s: route add error\n", _myAddressStr.c_str());
  1385. w.abort();
  1386. _pool->unborrow(c);
  1387. continue;
  1388. }
  1389. auto dns = config["dns"];
  1390. std::string domain = dns["domain"];
  1391. std::stringstream servers;
  1392. servers << "{";
  1393. for (auto j = dns["servers"].begin(); j < dns["servers"].end(); ++j) {
  1394. servers << *j;
  1395. if ( (j+1) != dns["servers"].end()) {
  1396. servers << ",";
  1397. }
  1398. }
  1399. servers << "}";
  1400. std::string s = servers.str();
  1401. res = w.exec_params0("INSERT INTO ztc_network_dns (network_id, domain, servers) VALUES ($1, $2, $3) ON CONFLICT (network_id) DO UPDATE SET domain = EXCLUDED.domain, servers = EXCLUDED.servers",
  1402. id, domain, s);
  1403. w.commit();
  1404. const uint64_t nwidInt = OSUtils::jsonIntHex(config["nwid"], 0ULL);
  1405. if (nwidInt) {
  1406. nlohmann::json nwOrig;
  1407. nlohmann::json nwNew(config);
  1408. get(nwidInt, nwOrig);
  1409. _networkChanged(nwOrig, nwNew, qitem.second);
  1410. } else {
  1411. fprintf(stderr, "%s: Can't notify network changed: %llu\n", _myAddressStr.c_str(), (unsigned long long)nwidInt);
  1412. }
  1413. } catch (std::exception &e) {
  1414. fprintf(stderr, "%s ERROR: Error updating network: %s\n", _myAddressStr.c_str(), e.what());
  1415. }
  1416. if (_redisMemberStatus) {
  1417. try {
  1418. std::string id = config["id"];
  1419. std::string controllerId = _myAddressStr.c_str();
  1420. std::string key = "networks:{" + controllerId + "}";
  1421. if (_rc->clusterMode) {
  1422. _cluster->sadd(key, id);
  1423. } else {
  1424. _redis->sadd(key, id);
  1425. }
  1426. } catch (sw::redis::Error &e) {
  1427. fprintf(stderr, "ERROR: Error adding network to Redis: %s\n", e.what());
  1428. }
  1429. }
  1430. } else if (objtype == "_delete_network") {
  1431. // fprintf(stderr, "%s: commitThread: delete network\n", _myAddressStr.c_str());
  1432. try {
  1433. pqxx::work w(*c->c);
  1434. std::string networkId = config["nwid"];
  1435. pqxx::result res = w.exec_params0("UPDATE ztc_network SET deleted = true WHERE id = $1",
  1436. networkId);
  1437. w.commit();
  1438. } catch (std::exception &e) {
  1439. fprintf(stderr, "%s ERROR: Error deleting network: %s\n", _myAddressStr.c_str(), e.what());
  1440. }
  1441. if (_redisMemberStatus) {
  1442. try {
  1443. std::string id = config["id"];
  1444. std::string controllerId = _myAddressStr.c_str();
  1445. std::string key = "networks:{" + controllerId + "}";
  1446. if (_rc->clusterMode) {
  1447. _cluster->srem(key, id);
  1448. _cluster->del("network-nodes-online:{"+controllerId+"}:"+id);
  1449. } else {
  1450. _redis->srem(key, id);
  1451. _redis->del("network-nodes-online:{"+controllerId+"}:"+id);
  1452. }
  1453. } catch (sw::redis::Error &e) {
  1454. fprintf(stderr, "ERROR: Error adding network to Redis: %s\n", e.what());
  1455. }
  1456. }
  1457. } else if (objtype == "_delete_member") {
  1458. // fprintf(stderr, "%s commitThread: delete member\n", _myAddressStr.c_str());
  1459. try {
  1460. pqxx::work w(*c->c);
  1461. std::string memberId = config["id"];
  1462. std::string networkId = config["nwid"];
  1463. pqxx::result res = w.exec_params0(
  1464. "UPDATE ztc_member SET hidden = true, deleted = true WHERE id = $1 AND network_id = $2",
  1465. memberId, networkId);
  1466. w.commit();
  1467. } catch (std::exception &e) {
  1468. fprintf(stderr, "%s ERROR: Error deleting member: %s\n", _myAddressStr.c_str(), e.what());
  1469. }
  1470. if (_redisMemberStatus) {
  1471. try {
  1472. std::string memberId = config["id"];
  1473. std::string networkId = config["nwid"];
  1474. std::string controllerId = _myAddressStr.c_str();
  1475. std::string key = "network-nodes-all:{" + controllerId + "}:" + networkId;
  1476. if (_rc->clusterMode) {
  1477. _cluster->srem(key, memberId);
  1478. _cluster->del("member:{"+controllerId+"}:"+networkId+":"+memberId);
  1479. } else {
  1480. _redis->srem(key, memberId);
  1481. _redis->del("member:{"+controllerId+"}:"+networkId+":"+memberId);
  1482. }
  1483. } catch (sw::redis::Error &e) {
  1484. fprintf(stderr, "ERROR: Error deleting member from Redis: %s\n", e.what());
  1485. }
  1486. }
  1487. } else {
  1488. fprintf(stderr, "%s ERROR: unknown objtype\n", _myAddressStr.c_str());
  1489. }
  1490. } catch (std::exception &e) {
  1491. fprintf(stderr, "%s ERROR: Error getting objtype: %s\n", _myAddressStr.c_str(), e.what());
  1492. }
  1493. _pool->unborrow(c);
  1494. c.reset();
  1495. }
  1496. fprintf(stderr, "%s commitThread finished\n", _myAddressStr.c_str());
  1497. }
  1498. void PostgreSQL::notifyNewMember(const std::string &networkID, const std::string &memberID) {
  1499. std::shared_ptr<PostgresConnection> c;
  1500. try {
  1501. c = _pool->borrow();
  1502. } catch (std::exception &e) {
  1503. fprintf(stderr, "ERROR: %s\n", e.what());
  1504. return;
  1505. }
  1506. try {
  1507. pqxx::work w(*c->c);
  1508. // TODO: Add check for active subscription
  1509. auto res = w.exec_params("SELECT h.hook_id "
  1510. "FROM ztc_hook h "
  1511. "INNER JOIN ztc_hook_hook_types ht "
  1512. "ON ht.hook_id = h.hook_id "
  1513. "INNER JOIN ztc_org o "
  1514. "ON o.org_id = h.org_id "
  1515. "INNER JOIN ztc_user u "
  1516. "ON u.id = o.owner_id "
  1517. "INNER JOIN ztc_network n "
  1518. "ON n.owner_id = u.id "
  1519. "WHERE n.id = $1 "
  1520. "AND ht.hook_type = 'NETWORK_JOIN'", networkID);
  1521. for (auto const &row: res) {
  1522. std::string hookURL = row[0].as<std::string>();
  1523. smeeclient::smee_client_notify_network_joined(
  1524. _smee,
  1525. networkID.c_str(),
  1526. memberID.c_str(),
  1527. hookURL.c_str(),
  1528. NULL
  1529. );
  1530. }
  1531. _pool->unborrow(c);
  1532. } catch (std::exception &e) {
  1533. fprintf(stderr, "ERROR: %s\n", e.what());
  1534. return;
  1535. }
  1536. }
  1537. void PostgreSQL::onlineNotificationThread()
  1538. {
  1539. waitForReady();
  1540. if (_redisMemberStatus) {
  1541. onlineNotification_Redis();
  1542. } else {
  1543. onlineNotification_Postgres();
  1544. }
  1545. }
  1546. /**
  1547. * ONLY UNCOMMENT FOR TEMPORARY DB MAINTENANCE
  1548. *
  1549. * This define temporarily turns off writing to the member status table
  1550. * so it can be reindexed when the indexes get too large.
  1551. */
  1552. // #define DISABLE_MEMBER_STATUS 1
  1553. void PostgreSQL::onlineNotification_Postgres()
  1554. {
  1555. _connected = 1;
  1556. nlohmann::json jtmp1, jtmp2;
  1557. while (_run == 1) {
  1558. auto c = _pool->borrow();
  1559. auto c2 = _pool->borrow();
  1560. try {
  1561. fprintf(stderr, "%s onlineNotification_Postgres\n", _myAddressStr.c_str());
  1562. std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > lastOnline;
  1563. {
  1564. std::lock_guard<std::mutex> l(_lastOnline_l);
  1565. lastOnline.swap(_lastOnline);
  1566. }
  1567. #ifndef DISABLE_MEMBER_STATUS
  1568. pqxx::work w(*c->c);
  1569. pqxx::work w2(*c2->c);
  1570. fprintf(stderr, "online notification tick\n");
  1571. bool firstRun = true;
  1572. bool memberAdded = false;
  1573. int updateCount = 0;
  1574. pqxx::pipeline pipe(w);
  1575. for (auto i=lastOnline.begin(); i != lastOnline.end(); ++i) {
  1576. updateCount += 1;
  1577. uint64_t nwid_i = i->first.first;
  1578. char nwidTmp[64];
  1579. char memTmp[64];
  1580. char ipTmp[64];
  1581. OSUtils::ztsnprintf(nwidTmp,sizeof(nwidTmp), "%.16llx", nwid_i);
  1582. OSUtils::ztsnprintf(memTmp,sizeof(memTmp), "%.10llx", i->first.second);
  1583. if(!get(nwid_i, jtmp1, i->first.second, jtmp2)) {
  1584. continue; // skip non existent networks/members
  1585. }
  1586. std::string networkId(nwidTmp);
  1587. std::string memberId(memTmp);
  1588. try {
  1589. pqxx::row r = w2.exec_params1("SELECT id, network_id FROM ztc_member WHERE network_id = $1 AND id = $2",
  1590. networkId, memberId);
  1591. } catch (pqxx::unexpected_rows &e) {
  1592. continue;
  1593. }
  1594. int64_t ts = i->second.first;
  1595. std::string ipAddr = i->second.second.toIpString(ipTmp);
  1596. std::string timestamp = std::to_string(ts);
  1597. std::stringstream memberUpdate;
  1598. memberUpdate << "INSERT INTO ztc_member_status (network_id, member_id, address, last_updated) VALUES "
  1599. << "('" << networkId << "', '" << memberId << "', ";
  1600. if (ipAddr.empty()) {
  1601. memberUpdate << "NULL, ";
  1602. } else {
  1603. memberUpdate << "'" << ipAddr << "', ";
  1604. }
  1605. memberUpdate << "TO_TIMESTAMP(" << timestamp << "::double precision/1000)) "
  1606. << " ON CONFLICT (network_id, member_id) DO UPDATE SET address = EXCLUDED.address, last_updated = EXCLUDED.last_updated";
  1607. pipe.insert(memberUpdate.str());
  1608. Metrics::pgsql_node_checkin++;
  1609. }
  1610. while(!pipe.empty()) {
  1611. pipe.retrieve();
  1612. }
  1613. pipe.complete();
  1614. w.commit();
  1615. fprintf(stderr, "%s: Updated online status of %d members\n", _myAddressStr.c_str(), updateCount);
  1616. #endif
  1617. } catch (std::exception &e) {
  1618. fprintf(stderr, "%s: error in onlinenotification thread: %s\n", _myAddressStr.c_str(), e.what());
  1619. }
  1620. _pool->unborrow(c2);
  1621. _pool->unborrow(c);
  1622. ConnectionPoolStats stats = _pool->get_stats();
  1623. fprintf(stderr, "%s pool stats: in use size: %llu, available size: %llu, total: %llu\n",
  1624. _myAddressStr.c_str(), stats.borrowed_size, stats.pool_size, (stats.borrowed_size + stats.pool_size));
  1625. std::this_thread::sleep_for(std::chrono::seconds(10));
  1626. }
  1627. fprintf(stderr, "%s: Fell out of run loop in onlineNotificationThread\n", _myAddressStr.c_str());
  1628. if (_run == 1) {
  1629. fprintf(stderr, "ERROR: %s onlineNotificationThread should still be running! Exiting Controller.\n", _myAddressStr.c_str());
  1630. exit(6);
  1631. }
  1632. }
  1633. void PostgreSQL::onlineNotification_Redis()
  1634. {
  1635. _connected = 1;
  1636. char buf[11] = {0};
  1637. std::string controllerId = std::string(_myAddress.toString(buf));
  1638. while (_run == 1) {
  1639. fprintf(stderr, "onlineNotification tick\n");
  1640. auto start = std::chrono::high_resolution_clock::now();
  1641. uint64_t count = 0;
  1642. std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > lastOnline;
  1643. {
  1644. std::lock_guard<std::mutex> l(_lastOnline_l);
  1645. lastOnline.swap(_lastOnline);
  1646. }
  1647. try {
  1648. if (!lastOnline.empty()) {
  1649. if (_rc->clusterMode) {
  1650. auto tx = _cluster->transaction(controllerId, true, false);
  1651. count = _doRedisUpdate(tx, controllerId, lastOnline);
  1652. } else {
  1653. auto tx = _redis->transaction(true, false);
  1654. count = _doRedisUpdate(tx, controllerId, lastOnline);
  1655. }
  1656. }
  1657. } catch (sw::redis::Error &e) {
  1658. fprintf(stderr, "Error in online notification thread (redis): %s\n", e.what());
  1659. }
  1660. auto end = std::chrono::high_resolution_clock::now();
  1661. auto dur = std::chrono::duration_cast<std::chrono::milliseconds>(end - start);
  1662. auto total = dur.count();
  1663. fprintf(stderr, "onlineNotification ran in %llu ms\n", total);
  1664. std::this_thread::sleep_for(std::chrono::seconds(5));
  1665. }
  1666. }
  1667. uint64_t PostgreSQL::_doRedisUpdate(sw::redis::Transaction &tx, std::string &controllerId,
  1668. std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > &lastOnline)
  1669. {
  1670. nlohmann::json jtmp1, jtmp2;
  1671. uint64_t count = 0;
  1672. for (auto i=lastOnline.begin(); i != lastOnline.end(); ++i) {
  1673. uint64_t nwid_i = i->first.first;
  1674. uint64_t memberid_i = i->first.second;
  1675. char nwidTmp[64];
  1676. char memTmp[64];
  1677. char ipTmp[64];
  1678. OSUtils::ztsnprintf(nwidTmp,sizeof(nwidTmp), "%.16llx", nwid_i);
  1679. OSUtils::ztsnprintf(memTmp,sizeof(memTmp), "%.10llx", memberid_i);
  1680. if (!get(nwid_i, jtmp1, memberid_i, jtmp2)){
  1681. continue; // skip non existent members/networks
  1682. }
  1683. std::string networkId(nwidTmp);
  1684. std::string memberId(memTmp);
  1685. int64_t ts = i->second.first;
  1686. std::string ipAddr = i->second.second.toIpString(ipTmp);
  1687. std::string timestamp = std::to_string(ts);
  1688. std::unordered_map<std::string, std::string> record = {
  1689. {"id", memberId},
  1690. {"address", ipAddr},
  1691. {"last_updated", std::to_string(ts)}
  1692. };
  1693. tx.zadd("nodes-online:{"+controllerId+"}", memberId, ts)
  1694. .zadd("nodes-online2:{"+controllerId+"}", networkId+"-"+memberId, ts)
  1695. .zadd("network-nodes-online:{"+controllerId+"}:"+networkId, memberId, ts)
  1696. .zadd("active-networks:{"+controllerId+"}", networkId, ts)
  1697. .sadd("network-nodes-all:{"+controllerId+"}:"+networkId, memberId)
  1698. .hmset("member:{"+controllerId+"}:"+networkId+":"+memberId, record.begin(), record.end());
  1699. ++count;
  1700. Metrics::redis_node_checkin++;
  1701. }
  1702. // expire records from all-nodes and network-nodes member list
  1703. uint64_t expireOld = OSUtils::now() - 300000;
  1704. tx.zremrangebyscore("nodes-online:{"+controllerId+"}",
  1705. sw::redis::RightBoundedInterval<double>(expireOld,
  1706. sw::redis::BoundType::LEFT_OPEN));
  1707. tx.zremrangebyscore("nodes-online2:{"+controllerId+"}",
  1708. sw::redis::RightBoundedInterval<double>(expireOld,
  1709. sw::redis::BoundType::LEFT_OPEN));
  1710. tx.zremrangebyscore("active-networks:{"+controllerId+"}",
  1711. sw::redis::RightBoundedInterval<double>(expireOld,
  1712. sw::redis::BoundType::LEFT_OPEN));
  1713. {
  1714. std::shared_lock<std::shared_mutex> l(_networks_l);
  1715. for (const auto &it : _networks) {
  1716. uint64_t nwid_i = it.first;
  1717. char nwidTmp[64];
  1718. OSUtils::ztsnprintf(nwidTmp,sizeof(nwidTmp), "%.16llx", nwid_i);
  1719. tx.zremrangebyscore("network-nodes-online:{"+controllerId+"}:"+nwidTmp,
  1720. sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN));
  1721. }
  1722. }
  1723. tx.exec();
  1724. fprintf(stderr, "%s: Updated online status of %d members\n", _myAddressStr.c_str(), count);
  1725. return count;
  1726. }
  1727. #endif //ZT_CONTROLLER_USE_LIBPQ