123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349 |
- /*
- * ZeroTier One - Network Virtualization Everywhere
- * Copyright (C) 2011-2019 ZeroTier, Inc. https://www.zerotier.com/
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- *
- * --
- *
- * You can be released from the requirements of the license by purchasing
- * a commercial license. Buying such a license is mandatory as soon as you
- * develop commercial closed-source software that incorporates or links
- * directly against ZeroTier software without disclosing the source code
- * of your own application.
- */
- #ifndef ZT_TOPOLOGY_HPP
- #define ZT_TOPOLOGY_HPP
- #include <stdio.h>
- #include <string.h>
- #include <vector>
- #include <stdexcept>
- #include <algorithm>
- #include <utility>
- #include "Constants.hpp"
- #include "../include/ZeroTierOne.h"
- #include "Address.hpp"
- #include "Identity.hpp"
- #include "Peer.hpp"
- #include "Path.hpp"
- #include "Mutex.hpp"
- #include "InetAddress.hpp"
- #include "Hashtable.hpp"
- namespace ZeroTier {
- class RuntimeEnvironment;
- /**
- * Database of network topology
- */
- class Topology
- {
- public:
- Topology(const RuntimeEnvironment *renv,void *tPtr);
- ~Topology();
- /**
- * Add a peer to database
- *
- * This will not replace existing peers. In that case the existing peer
- * record is returned.
- *
- * @param tPtr Thread pointer to be handed through to any callbacks called as a result of this call
- * @param peer Peer to add
- * @return New or existing peer (should replace 'peer')
- */
- SharedPtr<Peer> addPeer(void *tPtr,const SharedPtr<Peer> &peer);
- /**
- * Get a peer from its address
- *
- * @param tPtr Thread pointer to be handed through to any callbacks called as a result of this call
- * @param zta ZeroTier address of peer
- * @return Peer or NULL if not found
- */
- SharedPtr<Peer> getPeer(void *tPtr,const Address &zta);
- /**
- * @param tPtr Thread pointer to be handed through to any callbacks called as a result of this call
- * @param zta ZeroTier address of peer
- * @return Identity or NULL identity if not found
- */
- Identity getIdentity(void *tPtr,const Address &zta);
- /**
- * Get a peer only if it is presently in memory (no disk cache)
- *
- * This also does not update the lastUsed() time for peers, which means
- * that it won't prevent them from falling out of RAM. This is currently
- * used in the Cluster code to update peer info without forcing all peers
- * across the entire cluster to remain in memory cache.
- *
- * @param zta ZeroTier address
- */
- inline SharedPtr<Peer> getPeerNoCache(const Address &zta)
- {
- Mutex::Lock _l(_peers_m);
- const SharedPtr<Peer> *const ap = _peers.get(zta);
- if (ap)
- return *ap;
- return SharedPtr<Peer>();
- }
- /**
- * Get a Path object for a given local and remote physical address, creating if needed
- *
- * @param l Local socket
- * @param r Remote address
- * @return Pointer to canonicalized Path object
- */
- inline SharedPtr<Path> getPath(const int64_t l,const InetAddress &r)
- {
- Mutex::Lock _l(_paths_m);
- SharedPtr<Path> &p = _paths[Path::HashKey(l,r)];
- if (!p)
- p.set(new Path(l,r));
- return p;
- }
- /**
- * Get the current best upstream peer
- *
- * @return Upstream or NULL if none available
- */
- SharedPtr<Peer> getUpstreamPeer();
- /**
- * @param id Identity to check
- * @return True if this is a root server or a network preferred relay from one of our networks
- */
- bool isUpstream(const Identity &id) const;
- /**
- * @param ztaddr ZeroTier address
- * @return Peer role for this device
- */
- ZT_PeerRole role(const Address &ztaddr) const;
- /**
- * Check for prohibited endpoints
- *
- * Right now this returns true if the designated ZT address is a root and if
- * the IP (IP only, not port) does not equal any of the IPs defined in the
- * current World. This is an extra little security feature in case root keys
- * get appropriated or something.
- *
- * Otherwise it returns false.
- *
- * @param ztaddr ZeroTier address
- * @param ipaddr IP address
- * @return True if this ZT/IP pair should not be allowed to be used
- */
- bool isProhibitedEndpoint(const Address &ztaddr,const InetAddress &ipaddr) const;
- /**
- * Gets upstreams to contact and their stable endpoints (if known)
- *
- * @param eps Hash table to fill with addresses and their stable endpoints
- */
- inline void getUpstreamsToContact(Hashtable< Address,std::vector<InetAddress> > &eps) const
- {
- }
- /**
- * @return Vector of active upstream addresses (including roots)
- */
- inline std::vector<Address> upstreamAddresses() const
- {
- return std::vector<Address>();
- }
- /**
- * Clean and flush database
- */
- void doPeriodicTasks(void *tPtr,int64_t now);
- /**
- * @param now Current time
- * @return Number of peers with active direct paths
- */
- inline unsigned long countActive(int64_t now) const
- {
- unsigned long cnt = 0;
- Mutex::Lock _l(_peers_m);
- Hashtable< Address,SharedPtr<Peer> >::Iterator i(const_cast<Topology *>(this)->_peers);
- Address *a = (Address *)0;
- SharedPtr<Peer> *p = (SharedPtr<Peer> *)0;
- while (i.next(a,p)) {
- const SharedPtr<Path> pp((*p)->getAppropriatePath(now,false));
- if (pp)
- ++cnt;
- }
- return cnt;
- }
- /**
- * Apply a function or function object to all peers
- *
- * @param f Function to apply
- * @tparam F Function or function object type
- */
- template<typename F>
- inline void eachPeer(F f)
- {
- Mutex::Lock _l(_peers_m);
- Hashtable< Address,SharedPtr<Peer> >::Iterator i(_peers);
- Address *a = (Address *)0;
- SharedPtr<Peer> *p = (SharedPtr<Peer> *)0;
- while (i.next(a,p)) {
- f(*this,*((const SharedPtr<Peer> *)p));
- }
- }
- /**
- * @return All currently active peers by address (unsorted)
- */
- inline std::vector< std::pair< Address,SharedPtr<Peer> > > allPeers() const
- {
- Mutex::Lock _l(_peers_m);
- return _peers.entries();
- }
- /**
- * Get info about a path
- *
- * The supplied result variables are not modified if no special config info is found.
- *
- * @param physicalAddress Physical endpoint address
- * @param mtu Variable set to MTU
- * @param trustedPathId Variable set to trusted path ID
- */
- inline void getOutboundPathInfo(const InetAddress &physicalAddress,unsigned int &mtu,uint64_t &trustedPathId)
- {
- for(unsigned int i=0,j=_numConfiguredPhysicalPaths;i<j;++i) {
- if (_physicalPathConfig[i].first.containsAddress(physicalAddress)) {
- trustedPathId = _physicalPathConfig[i].second.trustedPathId;
- mtu = _physicalPathConfig[i].second.mtu;
- return;
- }
- }
- }
- /**
- * Get the payload MTU for an outbound physical path (returns default if not configured)
- *
- * @param physicalAddress Physical endpoint address
- * @return MTU
- */
- inline unsigned int getOutboundPathMtu(const InetAddress &physicalAddress)
- {
- for(unsigned int i=0,j=_numConfiguredPhysicalPaths;i<j;++i) {
- if (_physicalPathConfig[i].first.containsAddress(physicalAddress))
- return _physicalPathConfig[i].second.mtu;
- }
- return ZT_DEFAULT_PHYSMTU;
- }
- /**
- * Get the outbound trusted path ID for a physical address, or 0 if none
- *
- * @param physicalAddress Physical address to which we are sending the packet
- * @return Trusted path ID or 0 if none (0 is not a valid trusted path ID)
- */
- inline uint64_t getOutboundPathTrust(const InetAddress &physicalAddress)
- {
- for(unsigned int i=0,j=_numConfiguredPhysicalPaths;i<j;++i) {
- if (_physicalPathConfig[i].first.containsAddress(physicalAddress))
- return _physicalPathConfig[i].second.trustedPathId;
- }
- return 0;
- }
- /**
- * Check whether in incoming trusted path marked packet is valid
- *
- * @param physicalAddress Originating physical address
- * @param trustedPathId Trusted path ID from packet (from MAC field)
- */
- inline bool shouldInboundPathBeTrusted(const InetAddress &physicalAddress,const uint64_t trustedPathId)
- {
- for(unsigned int i=0,j=_numConfiguredPhysicalPaths;i<j;++i) {
- if ((_physicalPathConfig[i].second.trustedPathId == trustedPathId)&&(_physicalPathConfig[i].first.containsAddress(physicalAddress)))
- return true;
- }
- return false;
- }
- /**
- * Set or clear physical path configuration (called via Node::setPhysicalPathConfiguration)
- */
- inline void setPhysicalPathConfiguration(const struct sockaddr_storage *pathNetwork,const ZT_PhysicalPathConfiguration *pathConfig)
- {
- if (!pathNetwork) {
- _numConfiguredPhysicalPaths = 0;
- } else {
- std::map<InetAddress,ZT_PhysicalPathConfiguration> cpaths;
- for(unsigned int i=0,j=_numConfiguredPhysicalPaths;i<j;++i)
- cpaths[_physicalPathConfig[i].first] = _physicalPathConfig[i].second;
- if (pathConfig) {
- ZT_PhysicalPathConfiguration pc(*pathConfig);
- if (pc.mtu <= 0)
- pc.mtu = ZT_DEFAULT_PHYSMTU;
- else if (pc.mtu < ZT_MIN_PHYSMTU)
- pc.mtu = ZT_MIN_PHYSMTU;
- else if (pc.mtu > ZT_MAX_PHYSMTU)
- pc.mtu = ZT_MAX_PHYSMTU;
- cpaths[*(reinterpret_cast<const InetAddress *>(pathNetwork))] = pc;
- } else {
- cpaths.erase(*(reinterpret_cast<const InetAddress *>(pathNetwork)));
- }
- unsigned int cnt = 0;
- for(std::map<InetAddress,ZT_PhysicalPathConfiguration>::const_iterator i(cpaths.begin());((i!=cpaths.end())&&(cnt<ZT_MAX_CONFIGURABLE_PATHS));++i) {
- _physicalPathConfig[cnt].first = i->first;
- _physicalPathConfig[cnt].second = i->second;
- ++cnt;
- }
- _numConfiguredPhysicalPaths = cnt;
- }
- }
- private:
- Identity _getIdentity(void *tPtr,const Address &zta);
- void _memoizeUpstreams(void *tPtr);
- void _savePeer(void *tPtr,const SharedPtr<Peer> &peer);
- const RuntimeEnvironment *const RR;
- std::pair<InetAddress,ZT_PhysicalPathConfiguration> _physicalPathConfig[ZT_MAX_CONFIGURABLE_PATHS];
- volatile unsigned int _numConfiguredPhysicalPaths;
- Hashtable< Address,SharedPtr<Peer> > _peers;
- Mutex _peers_m;
- Hashtable< Path::HashKey,SharedPtr<Path> > _paths;
- Mutex _paths_m;
- };
- } // namespace ZeroTier
- #endif
|