CV1.cpp 70 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143
  1. /* (c) ZeroTier, Inc.
  2. * See LICENSE.txt in nonfree/
  3. */
  4. #include "CV1.hpp"
  5. #ifdef ZT_CONTROLLER_USE_LIBPQ
  6. #include "../../node/Constants.hpp"
  7. #include "../../node/SHA512.hpp"
  8. #include "../../version.h"
  9. #include "CtlUtil.hpp"
  10. #include "EmbeddedNetworkController.hpp"
  11. #include "Redis.hpp"
  12. #include "opentelemetry/trace/provider.h"
  13. #include <chrono>
  14. #include <climits>
  15. #include <iomanip>
  16. #include <libpq-fe.h>
  17. #include <rustybits.h>
  18. #include <sstream>
  19. // #define REDIS_TRACE 1
  20. using json = nlohmann::json;
  21. namespace {
  22. static const int DB_MINIMUM_VERSION = 38;
  23. } // anonymous namespace
  24. using namespace ZeroTier;
  25. using Attrs = std::vector<std::pair<std::string, std::string> >;
  26. using Item = std::pair<std::string, Attrs>;
  27. using ItemStream = std::vector<Item>;
  28. CV1::CV1(const Identity& myId, const char* path, int listenPort, RedisConfig* rc)
  29. : DB()
  30. , _pool()
  31. , _myId(myId)
  32. , _myAddress(myId.address())
  33. , _ready(0)
  34. , _connected(1)
  35. , _run(1)
  36. , _waitNoticePrinted(false)
  37. , _listenPort(listenPort)
  38. , _rc(rc)
  39. , _redis(NULL)
  40. , _cluster(NULL)
  41. , _redisMemberStatus(false)
  42. , _smee(NULL)
  43. {
  44. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  45. auto tracer = provider->GetTracer("cv1");
  46. auto span = tracer->StartSpan("cv1::CV1");
  47. auto scope = tracer->WithActiveSpan(span);
  48. rustybits::init_async_runtime();
  49. char myAddress[64];
  50. _myAddressStr = myId.address().toString(myAddress);
  51. _connString = std::string(path);
  52. auto f = std::make_shared<PostgresConnFactory>(_connString);
  53. _pool =
  54. std::make_shared<ConnectionPool<PostgresConnection> >(15, 5, std::static_pointer_cast<ConnectionFactory>(f));
  55. memset(_ssoPsk, 0, sizeof(_ssoPsk));
  56. char* const ssoPskHex = getenv("ZT_SSO_PSK");
  57. #ifdef ZT_TRACE
  58. fprintf(stderr, "ZT_SSO_PSK: %s\n", ssoPskHex);
  59. #endif
  60. if (ssoPskHex) {
  61. // SECURITY: note that ssoPskHex will always be null-terminated if libc actually
  62. // returns something non-NULL. If the hex encodes something shorter than 48 bytes,
  63. // it will be padded at the end with zeroes. If longer, it'll be truncated.
  64. Utils::unhex(ssoPskHex, _ssoPsk, sizeof(_ssoPsk));
  65. }
  66. const char* redisMemberStatus = getenv("ZT_REDIS_MEMBER_STATUS");
  67. if (redisMemberStatus && (strcmp(redisMemberStatus, "true") == 0)) {
  68. _redisMemberStatus = true;
  69. fprintf(stderr, "Using redis for member status\n");
  70. }
  71. auto c = _pool->borrow();
  72. pqxx::work txn { *c->c };
  73. pqxx::row r { txn.exec1("SELECT version FROM ztc_database") };
  74. int dbVersion = r[0].as<int>();
  75. txn.commit();
  76. if (dbVersion < DB_MINIMUM_VERSION) {
  77. fprintf(
  78. stderr,
  79. "Central database schema version too low. This controller version requires a minimum schema version of "
  80. "%d. Please upgrade your Central instance",
  81. DB_MINIMUM_VERSION);
  82. exit(1);
  83. }
  84. _pool->unborrow(c);
  85. if (_rc != NULL) {
  86. auto innerspan = tracer->StartSpan("cv1::CV1::configureRedis");
  87. auto innerscope = tracer->WithActiveSpan(innerspan);
  88. sw::redis::ConnectionOptions opts;
  89. sw::redis::ConnectionPoolOptions poolOpts;
  90. opts.host = _rc->hostname;
  91. opts.port = _rc->port;
  92. opts.password = _rc->password;
  93. opts.db = 0;
  94. opts.keep_alive = true;
  95. opts.connect_timeout = std::chrono::seconds(3);
  96. poolOpts.size = 25;
  97. poolOpts.wait_timeout = std::chrono::seconds(5);
  98. poolOpts.connection_lifetime = std::chrono::minutes(3);
  99. poolOpts.connection_idle_time = std::chrono::minutes(1);
  100. if (_rc->clusterMode) {
  101. innerspan->SetAttribute("cluster_mode", "true");
  102. fprintf(stderr, "Using Redis in Cluster Mode\n");
  103. _cluster = std::make_shared<sw::redis::RedisCluster>(opts, poolOpts);
  104. }
  105. else {
  106. innerspan->SetAttribute("cluster_mode", "false");
  107. fprintf(stderr, "Using Redis in Standalone Mode\n");
  108. _redis = std::make_shared<sw::redis::Redis>(opts, poolOpts);
  109. }
  110. }
  111. _readyLock.lock();
  112. fprintf(
  113. stderr, "[%s] NOTICE: %.10llx controller PostgreSQL waiting for initial data download..." ZT_EOL_S,
  114. ::_timestr(), (unsigned long long)_myAddress.toInt());
  115. _waitNoticePrinted = true;
  116. initializeNetworks();
  117. initializeMembers();
  118. _heartbeatThread = std::thread(&CV1::heartbeat, this);
  119. _membersDbWatcher = std::thread(&CV1::membersDbWatcher, this);
  120. _networksDbWatcher = std::thread(&CV1::networksDbWatcher, this);
  121. for (int i = 0; i < ZT_CENTRAL_CONTROLLER_COMMIT_THREADS; ++i) {
  122. _commitThread[i] = std::thread(&CV1::commitThread, this);
  123. }
  124. _onlineNotificationThread = std::thread(&CV1::onlineNotificationThread, this);
  125. configureSmee();
  126. }
  127. CV1::~CV1()
  128. {
  129. if (_smee != NULL) {
  130. rustybits::smee_client_delete(_smee);
  131. _smee = NULL;
  132. }
  133. rustybits::shutdown_async_runtime();
  134. _run = 0;
  135. std::this_thread::sleep_for(std::chrono::milliseconds(100));
  136. _heartbeatThread.join();
  137. _membersDbWatcher.join();
  138. _networksDbWatcher.join();
  139. _commitQueue.stop();
  140. for (int i = 0; i < ZT_CENTRAL_CONTROLLER_COMMIT_THREADS; ++i) {
  141. _commitThread[i].join();
  142. }
  143. _onlineNotificationThread.join();
  144. }
  145. void CV1::configureSmee()
  146. {
  147. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  148. auto tracer = provider->GetTracer("cv1");
  149. auto span = tracer->StartSpan("cv1::configureSmee");
  150. auto scope = tracer->WithActiveSpan(span);
  151. const char* TEMPORAL_SCHEME = "ZT_TEMPORAL_SCHEME";
  152. const char* TEMPORAL_HOST = "ZT_TEMPORAL_HOST";
  153. const char* TEMPORAL_PORT = "ZT_TEMPORAL_PORT";
  154. const char* TEMPORAL_NAMESPACE = "ZT_TEMPORAL_NAMESPACE";
  155. const char* SMEE_TASK_QUEUE = "ZT_SMEE_TASK_QUEUE";
  156. const char* scheme = getenv(TEMPORAL_SCHEME);
  157. if (scheme == NULL) {
  158. scheme = "http";
  159. }
  160. const char* host = getenv(TEMPORAL_HOST);
  161. const char* port = getenv(TEMPORAL_PORT);
  162. const char* ns = getenv(TEMPORAL_NAMESPACE);
  163. const char* task_queue = getenv(SMEE_TASK_QUEUE);
  164. if (scheme != NULL && host != NULL && port != NULL && ns != NULL && task_queue != NULL) {
  165. fprintf(stderr, "creating smee client\n");
  166. std::string hostPort =
  167. std::string(scheme) + std::string("://") + std::string(host) + std::string(":") + std::string(port);
  168. this->_smee = rustybits::smee_client_new(hostPort.c_str(), ns, task_queue);
  169. }
  170. else {
  171. fprintf(stderr, "Smee client not configured\n");
  172. }
  173. }
  174. bool CV1::waitForReady()
  175. {
  176. while (_ready < 2) {
  177. _readyLock.lock();
  178. _readyLock.unlock();
  179. }
  180. return true;
  181. }
  182. bool CV1::isReady()
  183. {
  184. return ((_ready == 2) && (_connected));
  185. }
  186. bool CV1::save(nlohmann::json& record, bool notifyListeners)
  187. {
  188. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  189. auto tracer = provider->GetTracer("cv1");
  190. auto span = tracer->StartSpan("cv1::save");
  191. auto scope = tracer->WithActiveSpan(span);
  192. bool modified = false;
  193. try {
  194. if (! record.is_object()) {
  195. fprintf(stderr, "record is not an object?!?\n");
  196. return false;
  197. }
  198. const std::string objtype = record["objtype"];
  199. if (objtype == "network") {
  200. // fprintf(stderr, "network save\n");
  201. const uint64_t nwid = OSUtils::jsonIntHex(record["id"], 0ULL);
  202. if (nwid) {
  203. nlohmann::json old;
  204. get(nwid, old);
  205. if ((! old.is_object()) || (! _compareRecords(old, record))) {
  206. record["revision"] = OSUtils::jsonInt(record["revision"], 0ULL) + 1ULL;
  207. _commitQueue.post(std::pair<nlohmann::json, bool>(record, notifyListeners));
  208. modified = true;
  209. }
  210. }
  211. }
  212. else if (objtype == "member") {
  213. std::string networkId = record["nwid"];
  214. std::string memberId = record["id"];
  215. const uint64_t nwid = OSUtils::jsonIntHex(record["nwid"], 0ULL);
  216. const uint64_t id = OSUtils::jsonIntHex(record["id"], 0ULL);
  217. // fprintf(stderr, "member save %s-%s\n", networkId.c_str(), memberId.c_str());
  218. if ((id) && (nwid)) {
  219. nlohmann::json network, old;
  220. get(nwid, network, id, old);
  221. if ((! old.is_object()) || (! _compareRecords(old, record))) {
  222. // fprintf(stderr, "commit queue post\n");
  223. record["revision"] = OSUtils::jsonInt(record["revision"], 0ULL) + 1ULL;
  224. _commitQueue.post(std::pair<nlohmann::json, bool>(record, notifyListeners));
  225. modified = true;
  226. }
  227. else {
  228. // fprintf(stderr, "no change\n");
  229. }
  230. }
  231. }
  232. else {
  233. fprintf(stderr, "uhh waaat\n");
  234. }
  235. }
  236. catch (std::exception& e) {
  237. fprintf(stderr, "Error on PostgreSQL::save: %s\n", e.what());
  238. }
  239. catch (...) {
  240. fprintf(stderr, "Unknown error on PostgreSQL::save\n");
  241. }
  242. return modified;
  243. }
  244. void CV1::eraseNetwork(const uint64_t networkId)
  245. {
  246. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  247. auto tracer = provider->GetTracer("cv1");
  248. auto span = tracer->StartSpan("cv1::eraseNetwork");
  249. auto scope = tracer->WithActiveSpan(span);
  250. char networkIdStr[17];
  251. span->SetAttribute("network_id", Utils::hex(networkId, networkIdStr));
  252. fprintf(stderr, "PostgreSQL::eraseNetwork\n");
  253. char tmp2[24];
  254. waitForReady();
  255. Utils::hex(networkId, tmp2);
  256. std::pair<nlohmann::json, bool> tmp;
  257. tmp.first["id"] = tmp2;
  258. tmp.first["objtype"] = "_delete_network";
  259. tmp.second = true;
  260. _commitQueue.post(tmp);
  261. nlohmann::json nullJson;
  262. _networkChanged(tmp.first, nullJson, true);
  263. }
  264. void CV1::eraseMember(const uint64_t networkId, const uint64_t memberId)
  265. {
  266. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  267. auto tracer = provider->GetTracer("cv1");
  268. auto span = tracer->StartSpan("cv1::eraseMember");
  269. auto scope = tracer->WithActiveSpan(span);
  270. char networkIdStr[17];
  271. char memberIdStr[11];
  272. span->SetAttribute("network_id", Utils::hex(networkId, networkIdStr));
  273. span->SetAttribute("member_id", Utils::hex10(memberId, memberIdStr));
  274. fprintf(stderr, "PostgreSQL::eraseMember\n");
  275. char tmp2[24];
  276. waitForReady();
  277. std::pair<nlohmann::json, bool> tmp, nw;
  278. Utils::hex(networkId, tmp2);
  279. tmp.first["nwid"] = tmp2;
  280. Utils::hex(memberId, tmp2);
  281. tmp.first["id"] = tmp2;
  282. tmp.first["objtype"] = "_delete_member";
  283. tmp.second = true;
  284. _commitQueue.post(tmp);
  285. nlohmann::json nullJson;
  286. _memberChanged(tmp.first, nullJson, true);
  287. }
  288. void CV1::nodeIsOnline(
  289. const uint64_t networkId,
  290. const uint64_t memberId,
  291. const InetAddress& physicalAddress,
  292. const char* osArch)
  293. {
  294. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  295. auto tracer = provider->GetTracer("cv1");
  296. auto span = tracer->StartSpan("cv1::nodeIsOnline");
  297. auto scope = tracer->WithActiveSpan(span);
  298. char networkIdStr[17];
  299. char memberIdStr[11];
  300. char ipStr[INET6_ADDRSTRLEN];
  301. span->SetAttribute("network_id", Utils::hex(networkId, networkIdStr));
  302. span->SetAttribute("member_id", Utils::hex10(memberId, memberIdStr));
  303. span->SetAttribute("physical_address", physicalAddress.toString(ipStr));
  304. span->SetAttribute("os_arch", osArch);
  305. std::lock_guard<std::mutex> l(_lastOnline_l);
  306. NodeOnlineRecord& i = _lastOnline[std::pair<uint64_t, uint64_t>(networkId, memberId)];
  307. i.lastSeen = OSUtils::now();
  308. if (physicalAddress) {
  309. i.physicalAddress = physicalAddress;
  310. }
  311. i.osArch = std::string(osArch);
  312. }
  313. void CV1::nodeIsOnline(const uint64_t networkId, const uint64_t memberId, const InetAddress& physicalAddress)
  314. {
  315. this->nodeIsOnline(networkId, memberId, physicalAddress, "unknown/unknown");
  316. }
  317. AuthInfo CV1::getSSOAuthInfo(const nlohmann::json& member, const std::string& redirectURL)
  318. {
  319. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  320. auto tracer = provider->GetTracer("cv1");
  321. auto span = tracer->StartSpan("cv1::getSSOAuthInfo");
  322. auto scope = tracer->WithActiveSpan(span);
  323. Metrics::db_get_sso_info++;
  324. // NONCE is just a random character string. no semantic meaning
  325. // state = HMAC SHA384 of Nonce based on shared sso key
  326. //
  327. // need nonce timeout in database? make sure it's used within X time
  328. // X is 5 minutes for now. Make configurable later?
  329. //
  330. // how do we tell when a nonce is used? if auth_expiration_time is set
  331. std::string networkId = member["nwid"];
  332. std::string memberId = member["id"];
  333. char authenticationURL[4096] = { 0 };
  334. AuthInfo info;
  335. info.enabled = true;
  336. // if (memberId == "a10dccea52" && networkId == "8056c2e21c24673d") {
  337. // fprintf(stderr, "invalid authinfo for grant's machine\n");
  338. // info.version=1;
  339. // return info;
  340. // }
  341. // fprintf(stderr, "PostgreSQL::updateMemberOnLoad: %s-%s\n", networkId.c_str(), memberId.c_str());
  342. std::shared_ptr<PostgresConnection> c;
  343. try {
  344. c = _pool->borrow();
  345. pqxx::work w(*c->c);
  346. char nonceBytes[16] = { 0 };
  347. std::string nonce = "";
  348. // check if the member exists first.
  349. pqxx::row count = w.exec_params1(
  350. "SELECT count(id) FROM ztc_member WHERE id = $1 AND network_id = $2 AND deleted = false", memberId,
  351. networkId);
  352. if (count[0].as<int>() == 1) {
  353. // get active nonce, if exists.
  354. pqxx::result r = w.exec_params(
  355. "SELECT nonce FROM ztc_sso_expiry "
  356. "WHERE network_id = $1 AND member_id = $2 "
  357. "AND ((NOW() AT TIME ZONE 'UTC') <= authentication_expiry_time) AND ((NOW() AT TIME ZONE 'UTC') <= "
  358. "nonce_expiration)",
  359. networkId, memberId);
  360. if (r.size() == 0) {
  361. // no active nonce.
  362. // find an unused nonce, if one exists.
  363. pqxx::result r = w.exec_params(
  364. "SELECT nonce FROM ztc_sso_expiry "
  365. "WHERE network_id = $1 AND member_id = $2 "
  366. "AND authentication_expiry_time IS NULL AND ((NOW() AT TIME ZONE 'UTC') <= nonce_expiration)",
  367. networkId, memberId);
  368. if (r.size() == 1) {
  369. // we have an existing nonce. Use it
  370. nonce = r.at(0)[0].as<std::string>();
  371. Utils::unhex(nonce.c_str(), nonceBytes, sizeof(nonceBytes));
  372. }
  373. else if (r.empty()) {
  374. // create a nonce
  375. Utils::getSecureRandom(nonceBytes, 16);
  376. char nonceBuf[64] = { 0 };
  377. Utils::hex(nonceBytes, sizeof(nonceBytes), nonceBuf);
  378. nonce = std::string(nonceBuf);
  379. pqxx::result ir = w.exec_params0(
  380. "INSERT INTO ztc_sso_expiry "
  381. "(nonce, nonce_expiration, network_id, member_id) VALUES "
  382. "($1, TO_TIMESTAMP($2::double precision/1000), $3, $4)",
  383. nonce, OSUtils::now() + 300000, networkId, memberId);
  384. w.commit();
  385. }
  386. else {
  387. // > 1 ?!? Thats an error!
  388. fprintf(stderr, "> 1 unused nonce!\n");
  389. exit(6);
  390. }
  391. }
  392. else if (r.size() == 1) {
  393. nonce = r.at(0)[0].as<std::string>();
  394. Utils::unhex(nonce.c_str(), nonceBytes, sizeof(nonceBytes));
  395. }
  396. else {
  397. // more than 1 nonce in use? Uhhh...
  398. fprintf(stderr, "> 1 nonce in use for network member?!?\n");
  399. exit(7);
  400. }
  401. r = w.exec_params(
  402. "SELECT oc.client_id, oc.authorization_endpoint, oc.issuer, oc.provider, oc.sso_impl_version "
  403. "FROM ztc_network AS n "
  404. "INNER JOIN ztc_org o "
  405. " ON o.owner_id = n.owner_id "
  406. "LEFT OUTER JOIN ztc_network_oidc_config noc "
  407. " ON noc.network_id = n.id "
  408. "LEFT OUTER JOIN ztc_oidc_config oc "
  409. " ON noc.client_id = oc.client_id AND oc.org_id = o.org_id "
  410. "WHERE n.id = $1 AND n.sso_enabled = true",
  411. networkId);
  412. std::string client_id = "";
  413. std::string authorization_endpoint = "";
  414. std::string issuer = "";
  415. std::string provider = "";
  416. uint64_t sso_version = 0;
  417. if (r.size() == 1) {
  418. client_id = r.at(0)[0].as<std::optional<std::string> >().value_or("");
  419. authorization_endpoint = r.at(0)[1].as<std::optional<std::string> >().value_or("");
  420. issuer = r.at(0)[2].as<std::optional<std::string> >().value_or("");
  421. provider = r.at(0)[3].as<std::optional<std::string> >().value_or("");
  422. sso_version = r.at(0)[4].as<std::optional<uint64_t> >().value_or(1);
  423. }
  424. else if (r.size() > 1) {
  425. fprintf(
  426. stderr, "ERROR: More than one auth endpoint for an organization?!?!? NetworkID: %s\n",
  427. networkId.c_str());
  428. }
  429. else {
  430. fprintf(stderr, "No client or auth endpoint?!?\n");
  431. }
  432. info.version = sso_version;
  433. // no catch all else because we don't actually care if no records exist here. just continue as normal.
  434. if ((! client_id.empty()) && (! authorization_endpoint.empty())) {
  435. uint8_t state[48];
  436. HMACSHA384(_ssoPsk, nonceBytes, sizeof(nonceBytes), state);
  437. char state_hex[256];
  438. Utils::hex(state, 48, state_hex);
  439. if (info.version == 0) {
  440. char url[2048] = { 0 };
  441. OSUtils::ztsnprintf(
  442. url, sizeof(authenticationURL),
  443. "%s?response_type=id_token&response_mode=form_post&scope=openid+email+profile&redirect_uri=%s&"
  444. "nonce=%s&state=%s&client_id=%s",
  445. authorization_endpoint.c_str(), url_encode(redirectURL).c_str(), nonce.c_str(), state_hex,
  446. client_id.c_str());
  447. info.authenticationURL = std::string(url);
  448. }
  449. else if (info.version == 1) {
  450. info.ssoClientID = client_id;
  451. info.issuerURL = issuer;
  452. info.ssoProvider = provider;
  453. info.ssoNonce = nonce;
  454. info.ssoState = std::string(state_hex) + "_" + networkId;
  455. info.centralAuthURL = redirectURL;
  456. #ifdef ZT_DEBUG
  457. fprintf(
  458. stderr,
  459. "ssoClientID: %s\nissuerURL: %s\nssoNonce: %s\nssoState: %s\ncentralAuthURL: %s\nprovider: "
  460. "%s\n",
  461. info.ssoClientID.c_str(), info.issuerURL.c_str(), info.ssoNonce.c_str(), info.ssoState.c_str(),
  462. info.centralAuthURL.c_str(), provider.c_str());
  463. #endif
  464. }
  465. }
  466. else {
  467. fprintf(
  468. stderr, "client_id: %s\nauthorization_endpoint: %s\n", client_id.c_str(),
  469. authorization_endpoint.c_str());
  470. }
  471. }
  472. _pool->unborrow(c);
  473. }
  474. catch (std::exception& e) {
  475. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  476. fprintf(stderr, "ERROR: Error updating member on load for network %s: %s\n", networkId.c_str(), e.what());
  477. }
  478. return info; // std::string(authenticationURL);
  479. }
  480. void CV1::initializeNetworks()
  481. {
  482. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  483. auto tracer = provider->GetTracer("cv1");
  484. auto span = tracer->StartSpan("cv1::initializeNetworks");
  485. auto scope = tracer->WithActiveSpan(span);
  486. try {
  487. std::string setKey = "networks:{" + _myAddressStr + "}";
  488. fprintf(stderr, "Initializing Networks...\n");
  489. if (_redisMemberStatus) {
  490. fprintf(stderr, "Init Redis for networks...\n");
  491. try {
  492. if (_rc->clusterMode) {
  493. _cluster->del(setKey);
  494. }
  495. else {
  496. _redis->del(setKey);
  497. }
  498. }
  499. catch (sw::redis::Error& e) {
  500. // ignore. if this key doesn't exist, there's no reason to delete it
  501. }
  502. }
  503. std::unordered_set<std::string> networkSet;
  504. char qbuf[2048] = { 0 };
  505. sprintf(
  506. qbuf,
  507. "SELECT n.id, (EXTRACT(EPOCH FROM n.creation_time AT TIME ZONE 'UTC')*1000)::bigint as creation_time, "
  508. "n.capabilities, "
  509. "n.enable_broadcast, (EXTRACT(EPOCH FROM n.last_modified AT TIME ZONE 'UTC')*1000)::bigint AS "
  510. "last_modified, n.mtu, n.multicast_limit, n.name, n.private, n.remote_trace_level, "
  511. "n.remote_trace_target, n.revision, n.rules, n.tags, n.v4_assign_mode, n.v6_assign_mode, n.sso_enabled, "
  512. "(CASE WHEN n.sso_enabled THEN noc.client_id ELSE NULL END) as client_id, "
  513. "(CASE WHEN n.sso_enabled THEN oc.authorization_endpoint ELSE NULL END) as authorization_endpoint, "
  514. "(CASE WHEN n.sso_enabled THEN oc.provider ELSE NULL END) as provider, d.domain, d.servers, "
  515. "ARRAY(SELECT CONCAT(host(ip_range_start),'|', host(ip_range_end)) FROM ztc_network_assignment_pool WHERE "
  516. "network_id = n.id) AS assignment_pool, "
  517. "ARRAY(SELECT CONCAT(host(address),'/',bits::text,'|',COALESCE(host(via), 'NULL'))FROM ztc_network_route "
  518. "WHERE network_id = n.id) AS routes "
  519. "FROM ztc_network n "
  520. "LEFT OUTER JOIN ztc_org o "
  521. " ON o.owner_id = n.owner_id "
  522. "LEFT OUTER JOIN ztc_network_oidc_config noc "
  523. " ON noc.network_id = n.id "
  524. "LEFT OUTER JOIN ztc_oidc_config oc "
  525. " ON noc.client_id = oc.client_id AND oc.org_id = o.org_id "
  526. "LEFT OUTER JOIN ztc_network_dns d "
  527. " ON d.network_id = n.id "
  528. "WHERE deleted = false AND controller_id = '%s'",
  529. _myAddressStr.c_str());
  530. auto c = _pool->borrow();
  531. auto c2 = _pool->borrow();
  532. pqxx::work w { *c->c };
  533. fprintf(stderr, "Load networks from psql...\n");
  534. auto stream = pqxx::stream_from::query(w, qbuf);
  535. std::tuple<
  536. std::string // network ID
  537. ,
  538. std::optional<int64_t> // creationTime
  539. ,
  540. std::optional<std::string> // capabilities
  541. ,
  542. std::optional<bool> // enableBroadcast
  543. ,
  544. std::optional<uint64_t> // lastModified
  545. ,
  546. std::optional<int> // mtu
  547. ,
  548. std::optional<int> // multicastLimit
  549. ,
  550. std::optional<std::string> // name
  551. ,
  552. bool // private
  553. ,
  554. std::optional<int> // remoteTraceLevel
  555. ,
  556. std::optional<std::string> // remoteTraceTarget
  557. ,
  558. std::optional<uint64_t> // revision
  559. ,
  560. std::optional<std::string> // rules
  561. ,
  562. std::optional<std::string> // tags
  563. ,
  564. std::optional<std::string> // v4AssignMode
  565. ,
  566. std::optional<std::string> // v6AssignMode
  567. ,
  568. std::optional<bool> // ssoEnabled
  569. ,
  570. std::optional<std::string> // clientId
  571. ,
  572. std::optional<std::string> // authorizationEndpoint
  573. ,
  574. std::optional<std::string> // ssoProvider
  575. ,
  576. std::optional<std::string> // domain
  577. ,
  578. std::optional<std::string> // servers
  579. ,
  580. std::string // assignmentPoolString
  581. ,
  582. std::string // routeString
  583. >
  584. row;
  585. uint64_t count = 0;
  586. auto tmp = std::chrono::high_resolution_clock::now();
  587. uint64_t total = 0;
  588. while (stream >> row) {
  589. auto start = std::chrono::high_resolution_clock::now();
  590. json empty;
  591. json config;
  592. initNetwork(config);
  593. std::string nwid = std::get<0>(row);
  594. std::optional<int64_t> creationTime = std::get<1>(row);
  595. std::optional<std::string> capabilities = std::get<2>(row);
  596. std::optional<bool> enableBroadcast = std::get<3>(row);
  597. std::optional<uint64_t> lastModified = std::get<4>(row);
  598. std::optional<int> mtu = std::get<5>(row);
  599. std::optional<int> multicastLimit = std::get<6>(row);
  600. std::optional<std::string> name = std::get<7>(row);
  601. bool isPrivate = std::get<8>(row);
  602. std::optional<int> remoteTraceLevel = std::get<9>(row);
  603. std::optional<std::string> remoteTraceTarget = std::get<10>(row);
  604. std::optional<uint64_t> revision = std::get<11>(row);
  605. std::optional<std::string> rules = std::get<12>(row);
  606. std::optional<std::string> tags = std::get<13>(row);
  607. std::optional<std::string> v4AssignMode = std::get<14>(row);
  608. std::optional<std::string> v6AssignMode = std::get<15>(row);
  609. std::optional<bool> ssoEnabled = std::get<16>(row);
  610. std::optional<std::string> clientId = std::get<17>(row);
  611. std::optional<std::string> authorizationEndpoint = std::get<18>(row);
  612. std::optional<std::string> ssoProvider = std::get<19>(row);
  613. std::optional<std::string> dnsDomain = std::get<20>(row);
  614. std::optional<std::string> dnsServers = std::get<21>(row);
  615. std::string assignmentPoolString = std::get<22>(row);
  616. std::string routesString = std::get<23>(row);
  617. config["id"] = nwid;
  618. config["nwid"] = nwid;
  619. config["creationTime"] = creationTime.value_or(0);
  620. config["capabilities"] = json::parse(capabilities.value_or("[]"));
  621. config["enableBroadcast"] = enableBroadcast.value_or(false);
  622. config["lastModified"] = lastModified.value_or(0);
  623. config["mtu"] = mtu.value_or(2800);
  624. config["multicastLimit"] = multicastLimit.value_or(64);
  625. config["name"] = name.value_or("");
  626. config["private"] = isPrivate;
  627. config["remoteTraceLevel"] = remoteTraceLevel.value_or(0);
  628. config["remoteTraceTarget"] = remoteTraceTarget.value_or("");
  629. config["revision"] = revision.value_or(0);
  630. config["rules"] = json::parse(rules.value_or("[]"));
  631. config["tags"] = json::parse(tags.value_or("[]"));
  632. config["v4AssignMode"] = json::parse(v4AssignMode.value_or("{}"));
  633. config["v6AssignMode"] = json::parse(v6AssignMode.value_or("{}"));
  634. config["ssoEnabled"] = ssoEnabled.value_or(false);
  635. config["objtype"] = "network";
  636. config["ipAssignmentPools"] = json::array();
  637. config["routes"] = json::array();
  638. config["clientId"] = clientId.value_or("");
  639. config["authorizationEndpoint"] = authorizationEndpoint.value_or("");
  640. config["provider"] = ssoProvider.value_or("");
  641. networkSet.insert(nwid);
  642. if (dnsDomain.has_value()) {
  643. std::string serverList = dnsServers.value();
  644. json obj;
  645. auto servers = json::array();
  646. if (serverList.rfind("{", 0) != std::string::npos) {
  647. serverList = serverList.substr(1, serverList.size() - 2);
  648. std::stringstream ss(serverList);
  649. while (ss.good()) {
  650. std::string server;
  651. std::getline(ss, server, ',');
  652. servers.push_back(server);
  653. }
  654. }
  655. obj["domain"] = dnsDomain.value();
  656. obj["servers"] = servers;
  657. config["dns"] = obj;
  658. }
  659. config["ipAssignmentPools"] = json::array();
  660. if (assignmentPoolString != "{}") {
  661. std::string tmp = assignmentPoolString.substr(1, assignmentPoolString.size() - 2);
  662. std::vector<std::string> assignmentPools = split(tmp, ',');
  663. for (auto it = assignmentPools.begin(); it != assignmentPools.end(); ++it) {
  664. std::vector<std::string> r = split(*it, '|');
  665. json ip;
  666. ip["ipRangeStart"] = r[0];
  667. ip["ipRangeEnd"] = r[1];
  668. config["ipAssignmentPools"].push_back(ip);
  669. }
  670. }
  671. config["routes"] = json::array();
  672. if (routesString != "{}") {
  673. std::string tmp = routesString.substr(1, routesString.size() - 2);
  674. std::vector<std::string> routes = split(tmp, ',');
  675. for (auto it = routes.begin(); it != routes.end(); ++it) {
  676. std::vector<std::string> r = split(*it, '|');
  677. json route;
  678. route["target"] = r[0];
  679. route["via"] = ((route["via"] == "NULL") ? nullptr : r[1]);
  680. config["routes"].push_back(route);
  681. }
  682. }
  683. Metrics::network_count++;
  684. _networkChanged(empty, config, false);
  685. auto end = std::chrono::high_resolution_clock::now();
  686. auto dur = std::chrono::duration_cast<std::chrono::microseconds>(end - start);
  687. ;
  688. total += dur.count();
  689. ++count;
  690. if (count > 0 && count % 10000 == 0) {
  691. fprintf(stderr, "Averaging %llu us per network\n", (total / count));
  692. }
  693. }
  694. if (count > 0) {
  695. fprintf(stderr, "Took %llu us per network to load\n", (total / count));
  696. }
  697. stream.complete();
  698. w.commit();
  699. _pool->unborrow(c2);
  700. _pool->unborrow(c);
  701. fprintf(stderr, "done.\n");
  702. if (! networkSet.empty()) {
  703. if (_redisMemberStatus) {
  704. fprintf(stderr, "adding networks to redis...\n");
  705. if (_rc->clusterMode) {
  706. auto tx = _cluster->transaction(_myAddressStr, true, false);
  707. uint64_t count = 0;
  708. for (std::string nwid : networkSet) {
  709. tx.sadd(setKey, nwid);
  710. if (++count % 30000 == 0) {
  711. tx.exec();
  712. tx = _cluster->transaction(_myAddressStr, true, false);
  713. }
  714. }
  715. tx.exec();
  716. }
  717. else {
  718. auto tx = _redis->transaction(true, false);
  719. uint64_t count = 0;
  720. for (std::string nwid : networkSet) {
  721. tx.sadd(setKey, nwid);
  722. if (++count % 30000 == 0) {
  723. tx.exec();
  724. tx = _redis->transaction(true, false);
  725. }
  726. }
  727. tx.exec();
  728. }
  729. fprintf(stderr, "done.\n");
  730. }
  731. }
  732. if (++this->_ready == 2) {
  733. if (_waitNoticePrinted) {
  734. fprintf(
  735. stderr, "[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S, _timestr(),
  736. (unsigned long long)_myAddress.toInt());
  737. }
  738. _readyLock.unlock();
  739. }
  740. fprintf(stderr, "network init done.\n");
  741. }
  742. catch (sw::redis::Error& e) {
  743. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  744. fprintf(stderr, "ERROR: Error initializing networks in Redis: %s\n", e.what());
  745. std::this_thread::sleep_for(std::chrono::milliseconds(5000));
  746. exit(-1);
  747. }
  748. catch (std::exception& e) {
  749. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  750. fprintf(stderr, "ERROR: Error initializing networks: %s\n", e.what());
  751. std::this_thread::sleep_for(std::chrono::milliseconds(5000));
  752. exit(-1);
  753. }
  754. }
  755. void CV1::initializeMembers()
  756. {
  757. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  758. auto tracer = provider->GetTracer("cv1");
  759. auto span = tracer->StartSpan("cv1::initializeMembers");
  760. auto scope = tracer->WithActiveSpan(span);
  761. std::string memberId;
  762. std::string networkId;
  763. try {
  764. std::unordered_map<std::string, std::string> networkMembers;
  765. fprintf(stderr, "Initializing Members...\n");
  766. std::string setKeyBase = "network-nodes-all:{" + _myAddressStr + "}:";
  767. if (_redisMemberStatus) {
  768. fprintf(stderr, "Initialize Redis for members...\n");
  769. std::unique_lock<std::shared_mutex> l(_networks_l);
  770. std::unordered_set<std::string> deletes;
  771. for (auto it : _networks) {
  772. uint64_t nwid_i = it.first;
  773. char nwidTmp[64] = { 0 };
  774. OSUtils::ztsnprintf(nwidTmp, sizeof(nwidTmp), "%.16llx", nwid_i);
  775. std::string nwid(nwidTmp);
  776. std::string key = setKeyBase + nwid;
  777. deletes.insert(key);
  778. }
  779. if (! deletes.empty()) {
  780. try {
  781. if (_rc->clusterMode) {
  782. auto tx = _cluster->transaction(_myAddressStr, true, false);
  783. for (std::string k : deletes) {
  784. tx.del(k);
  785. }
  786. tx.exec();
  787. }
  788. else {
  789. auto tx = _redis->transaction(true, false);
  790. for (std::string k : deletes) {
  791. tx.del(k);
  792. }
  793. tx.exec();
  794. }
  795. }
  796. catch (sw::redis::Error& e) {
  797. // ignore
  798. }
  799. }
  800. }
  801. char qbuf[2048];
  802. sprintf(
  803. qbuf,
  804. "SELECT m.id, m.network_id, m.active_bridge, m.authorized, m.capabilities, "
  805. "(EXTRACT(EPOCH FROM m.creation_time AT TIME ZONE 'UTC')*1000)::bigint, m.identity, "
  806. "(EXTRACT(EPOCH FROM m.last_authorized_time AT TIME ZONE 'UTC')*1000)::bigint, "
  807. "(EXTRACT(EPOCH FROM m.last_deauthorized_time AT TIME ZONE 'UTC')*1000)::bigint, "
  808. "m.remote_trace_level, m.remote_trace_target, m.tags, m.v_major, m.v_minor, m.v_rev, m.v_proto, "
  809. "m.no_auto_assign_ips, m.revision, m.sso_exempt, "
  810. "(CASE WHEN n.sso_enabled = TRUE AND m.sso_exempt = FALSE THEN "
  811. " ( "
  812. " SELECT (EXTRACT(EPOCH FROM e.authentication_expiry_time)*1000)::bigint "
  813. " FROM ztc_sso_expiry e "
  814. " INNER JOIN ztc_network n1 "
  815. " ON n1.id = e.network_id AND n1.deleted = TRUE "
  816. " WHERE e.network_id = m.network_id AND e.member_id = m.id AND n.sso_enabled = TRUE AND "
  817. "e.authentication_expiry_time IS NOT NULL "
  818. " ORDER BY e.authentication_expiry_time DESC LIMIT 1 "
  819. " ) "
  820. " ELSE NULL "
  821. " END) AS authentication_expiry_time, "
  822. "ARRAY(SELECT DISTINCT address FROM ztc_member_ip_assignment WHERE member_id = m.id AND network_id = "
  823. "m.network_id) AS assigned_addresses "
  824. "FROM ztc_member m "
  825. "INNER JOIN ztc_network n "
  826. " ON n.id = m.network_id "
  827. "WHERE n.controller_id = '%s' AND n.deleted = FALSE AND m.deleted = FALSE",
  828. _myAddressStr.c_str());
  829. auto c = _pool->borrow();
  830. auto c2 = _pool->borrow();
  831. pqxx::work w { *c->c };
  832. fprintf(stderr, "Load members from psql...\n");
  833. auto stream = pqxx::stream_from::query(w, qbuf);
  834. std::tuple<
  835. std::string // memberId
  836. ,
  837. std::string // memberId
  838. ,
  839. std::optional<bool> // activeBridge
  840. ,
  841. std::optional<bool> // authorized
  842. ,
  843. std::optional<std::string> // capabilities
  844. ,
  845. std::optional<uint64_t> // creationTime
  846. ,
  847. std::optional<std::string> // identity
  848. ,
  849. std::optional<uint64_t> // lastAuthorizedTime
  850. ,
  851. std::optional<uint64_t> // lastDeauthorizedTime
  852. ,
  853. std::optional<int> // remoteTraceLevel
  854. ,
  855. std::optional<std::string> // remoteTraceTarget
  856. ,
  857. std::optional<std::string> // tags
  858. ,
  859. std::optional<int> // vMajor
  860. ,
  861. std::optional<int> // vMinor
  862. ,
  863. std::optional<int> // vRev
  864. ,
  865. std::optional<int> // vProto
  866. ,
  867. std::optional<bool> // noAutoAssignIps
  868. ,
  869. std::optional<uint64_t> // revision
  870. ,
  871. std::optional<bool> // ssoExempt
  872. ,
  873. std::optional<uint64_t> // authenticationExpiryTime
  874. ,
  875. std::string // assignedAddresses
  876. >
  877. row;
  878. uint64_t count = 0;
  879. auto tmp = std::chrono::high_resolution_clock::now();
  880. uint64_t total = 0;
  881. while (stream >> row) {
  882. auto start = std::chrono::high_resolution_clock::now();
  883. json empty;
  884. json config;
  885. initMember(config);
  886. memberId = std::get<0>(row);
  887. networkId = std::get<1>(row);
  888. std::optional<bool> activeBridge = std::get<2>(row);
  889. std::optional<bool> authorized = std::get<3>(row);
  890. std::optional<std::string> capabilities = std::get<4>(row);
  891. std::optional<uint64_t> creationTime = std::get<5>(row);
  892. std::optional<std::string> identity = std::get<6>(row);
  893. std::optional<uint64_t> lastAuthorizedTime = std::get<7>(row);
  894. std::optional<uint64_t> lastDeauthorizedTime = std::get<8>(row);
  895. std::optional<int> remoteTraceLevel = std::get<9>(row);
  896. std::optional<std::string> remoteTraceTarget = std::get<10>(row);
  897. std::optional<std::string> tags = std::get<11>(row);
  898. std::optional<int> vMajor = std::get<12>(row);
  899. std::optional<int> vMinor = std::get<13>(row);
  900. std::optional<int> vRev = std::get<14>(row);
  901. std::optional<int> vProto = std::get<15>(row);
  902. std::optional<bool> noAutoAssignIps = std::get<16>(row);
  903. std::optional<uint64_t> revision = std::get<17>(row);
  904. std::optional<bool> ssoExempt = std::get<18>(row);
  905. std::optional<uint64_t> authenticationExpiryTime = std::get<19>(row);
  906. std::string assignedAddresses = std::get<20>(row);
  907. networkMembers.insert(std::pair<std::string, std::string>(setKeyBase + networkId, memberId));
  908. config["id"] = memberId;
  909. config["address"] = memberId;
  910. config["nwid"] = networkId;
  911. config["activeBridge"] = activeBridge.value_or(false);
  912. config["authorized"] = authorized.value_or(false);
  913. config["capabilities"] = json::parse(capabilities.value_or("[]"));
  914. config["creationTime"] = creationTime.value_or(0);
  915. config["identity"] = identity.value_or("");
  916. config["lastAuthorizedTime"] = lastAuthorizedTime.value_or(0);
  917. config["lastDeauthorizedTime"] = lastDeauthorizedTime.value_or(0);
  918. config["remoteTraceLevel"] = remoteTraceLevel.value_or(0);
  919. config["remoteTraceTarget"] = remoteTraceTarget.value_or("");
  920. config["tags"] = json::parse(tags.value_or("[]"));
  921. config["vMajor"] = vMajor.value_or(-1);
  922. config["vMinor"] = vMinor.value_or(-1);
  923. config["vRev"] = vRev.value_or(-1);
  924. config["vProto"] = vProto.value_or(-1);
  925. config["noAutoAssignIps"] = noAutoAssignIps.value_or(false);
  926. config["revision"] = revision.value_or(0);
  927. config["ssoExempt"] = ssoExempt.value_or(false);
  928. config["authenticationExpiryTime"] = authenticationExpiryTime.value_or(0);
  929. config["objtype"] = "member";
  930. config["ipAssignments"] = json::array();
  931. if (assignedAddresses != "{}") {
  932. std::string tmp = assignedAddresses.substr(1, assignedAddresses.size() - 2);
  933. std::vector<std::string> addrs = split(tmp, ',');
  934. for (auto it = addrs.begin(); it != addrs.end(); ++it) {
  935. config["ipAssignments"].push_back(*it);
  936. }
  937. }
  938. Metrics::member_count++;
  939. _memberChanged(empty, config, false);
  940. memberId = "";
  941. networkId = "";
  942. auto end = std::chrono::high_resolution_clock::now();
  943. auto dur = std::chrono::duration_cast<std::chrono::microseconds>(end - start);
  944. total += dur.count();
  945. ++count;
  946. if (count > 0 && count % 10000 == 0) {
  947. fprintf(stderr, "Averaging %llu us per member\n", (total / count));
  948. }
  949. }
  950. if (count > 0) {
  951. fprintf(stderr, "Took %llu us per member to load\n", (total / count));
  952. }
  953. stream.complete();
  954. w.commit();
  955. _pool->unborrow(c2);
  956. _pool->unborrow(c);
  957. fprintf(stderr, "done.\n");
  958. if (! networkMembers.empty()) {
  959. if (_redisMemberStatus) {
  960. fprintf(stderr, "Load member data into redis...\n");
  961. if (_rc->clusterMode) {
  962. auto tx = _cluster->transaction(_myAddressStr, true, false);
  963. uint64_t count = 0;
  964. for (auto it : networkMembers) {
  965. tx.sadd(it.first, it.second);
  966. if (++count % 30000 == 0) {
  967. tx.exec();
  968. tx = _cluster->transaction(_myAddressStr, true, false);
  969. }
  970. }
  971. tx.exec();
  972. }
  973. else {
  974. auto tx = _redis->transaction(true, false);
  975. uint64_t count = 0;
  976. for (auto it : networkMembers) {
  977. tx.sadd(it.first, it.second);
  978. if (++count % 30000 == 0) {
  979. tx.exec();
  980. tx = _redis->transaction(true, false);
  981. }
  982. }
  983. tx.exec();
  984. }
  985. fprintf(stderr, "done.\n");
  986. }
  987. }
  988. fprintf(stderr, "Done loading members...\n");
  989. if (++this->_ready == 2) {
  990. if (_waitNoticePrinted) {
  991. fprintf(
  992. stderr, "[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S, _timestr(),
  993. (unsigned long long)_myAddress.toInt());
  994. }
  995. _readyLock.unlock();
  996. }
  997. }
  998. catch (sw::redis::Error& e) {
  999. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1000. fprintf(stderr, "ERROR: Error initializing members (redis): %s\n", e.what());
  1001. exit(-1);
  1002. }
  1003. catch (std::exception& e) {
  1004. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1005. fprintf(stderr, "ERROR: Error initializing member: %s-%s %s\n", networkId.c_str(), memberId.c_str(), e.what());
  1006. exit(-1);
  1007. }
  1008. }
  1009. void CV1::heartbeat()
  1010. {
  1011. char publicId[1024];
  1012. char hostnameTmp[1024];
  1013. _myId.toString(false, publicId);
  1014. if (gethostname(hostnameTmp, sizeof(hostnameTmp)) != 0) {
  1015. hostnameTmp[0] = (char)0;
  1016. }
  1017. else {
  1018. for (int i = 0; i < (int)sizeof(hostnameTmp); ++i) {
  1019. if ((hostnameTmp[i] == '.') || (hostnameTmp[i] == 0)) {
  1020. hostnameTmp[i] = (char)0;
  1021. break;
  1022. }
  1023. }
  1024. }
  1025. const char* controllerId = _myAddressStr.c_str();
  1026. const char* publicIdentity = publicId;
  1027. const char* hostname = hostnameTmp;
  1028. while (_run == 1) {
  1029. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1030. auto tracer = provider->GetTracer("cv1");
  1031. auto span = tracer->StartSpan("cv1::heartbeat");
  1032. auto scope = tracer->WithActiveSpan(span);
  1033. // fprintf(stderr, "%s: heartbeat\n", controllerId);
  1034. auto c = _pool->borrow();
  1035. int64_t ts = OSUtils::now();
  1036. if (c->c) {
  1037. std::string major = std::to_string(ZEROTIER_ONE_VERSION_MAJOR);
  1038. std::string minor = std::to_string(ZEROTIER_ONE_VERSION_MINOR);
  1039. std::string rev = std::to_string(ZEROTIER_ONE_VERSION_REVISION);
  1040. std::string build = std::to_string(ZEROTIER_ONE_VERSION_BUILD);
  1041. std::string now = std::to_string(ts);
  1042. std::string host_port = std::to_string(_listenPort);
  1043. std::string use_redis = (_rc != NULL) ? "true" : "false";
  1044. std::string redis_mem_status = (_redisMemberStatus) ? "true" : "false";
  1045. try {
  1046. pqxx::work w { *c->c };
  1047. pqxx::result res = w.exec0(
  1048. "INSERT INTO ztc_controller (id, cluster_host, last_alive, public_identity, v_major, v_minor, "
  1049. "v_rev, v_build, host_port, use_redis, redis_member_status) "
  1050. "VALUES ("
  1051. + w.quote(controllerId) + ", " + w.quote(hostname) + ", TO_TIMESTAMP(" + now
  1052. + "::double precision/1000), " + w.quote(publicIdentity) + ", " + major + ", " + minor + ", " + rev
  1053. + ", " + build + ", " + host_port + ", " + use_redis + ", " + redis_mem_status
  1054. + ") "
  1055. "ON CONFLICT (id) DO UPDATE SET cluster_host = EXCLUDED.cluster_host, last_alive = "
  1056. "EXCLUDED.last_alive, "
  1057. "public_identity = EXCLUDED.public_identity, v_major = EXCLUDED.v_major, v_minor = "
  1058. "EXCLUDED.v_minor, "
  1059. "v_rev = EXCLUDED.v_rev, v_build = EXCLUDED.v_rev, host_port = EXCLUDED.host_port, "
  1060. "use_redis = EXCLUDED.use_redis, redis_member_status = EXCLUDED.redis_member_status");
  1061. w.commit();
  1062. }
  1063. catch (std::exception& e) {
  1064. fprintf(stderr, "%s: Heartbeat update failed: %s\n", controllerId, e.what());
  1065. span->End();
  1066. std::this_thread::sleep_for(std::chrono::milliseconds(1000));
  1067. continue;
  1068. }
  1069. }
  1070. _pool->unborrow(c);
  1071. try {
  1072. if (_redisMemberStatus) {
  1073. if (_rc->clusterMode) {
  1074. _cluster->zadd("controllers", "controllerId", ts);
  1075. }
  1076. else {
  1077. _redis->zadd("controllers", "controllerId", ts);
  1078. }
  1079. }
  1080. }
  1081. catch (sw::redis::Error& e) {
  1082. fprintf(stderr, "ERROR: Redis error in heartbeat thread: %s\n", e.what());
  1083. }
  1084. span->End();
  1085. std::this_thread::sleep_for(std::chrono::milliseconds(1000));
  1086. }
  1087. fprintf(stderr, "Exited heartbeat thread\n");
  1088. }
  1089. void CV1::membersDbWatcher()
  1090. {
  1091. if (_rc) {
  1092. _membersWatcher_Redis();
  1093. }
  1094. else {
  1095. _membersWatcher_Postgres();
  1096. }
  1097. if (_run == 1) {
  1098. fprintf(
  1099. stderr, "ERROR: %s membersDbWatcher should still be running! Exiting Controller.\n", _myAddressStr.c_str());
  1100. exit(9);
  1101. }
  1102. fprintf(stderr, "Exited membersDbWatcher\n");
  1103. }
  1104. void CV1::_membersWatcher_Postgres()
  1105. {
  1106. auto c = _pool->borrow();
  1107. std::string stream = "member_" + _myAddressStr;
  1108. fprintf(stderr, "Listening to member stream: %s\n", stream.c_str());
  1109. MemberNotificationReceiver<CV1> m(this, *c->c, stream);
  1110. while (_run == 1) {
  1111. c->c->await_notification(5, 0);
  1112. }
  1113. _pool->unborrow(c);
  1114. }
  1115. void CV1::_membersWatcher_Redis()
  1116. {
  1117. char buf[11] = { 0 };
  1118. std::string key = "member-stream:{" + std::string(_myAddress.toString(buf)) + "}";
  1119. std::string lastID = "0";
  1120. fprintf(stderr, "Listening to member stream: %s\n", key.c_str());
  1121. while (_run == 1) {
  1122. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1123. auto tracer = provider->GetTracer("cv1");
  1124. auto span = tracer->StartSpan("cv1::_membersWatcher_Redis");
  1125. auto scope = tracer->WithActiveSpan(span);
  1126. try {
  1127. json tmp;
  1128. std::unordered_map<std::string, ItemStream> result;
  1129. if (_rc->clusterMode) {
  1130. _cluster->xread(key, lastID, std::chrono::seconds(1), 0, std::inserter(result, result.end()));
  1131. }
  1132. else {
  1133. _redis->xread(key, lastID, std::chrono::seconds(1), 0, std::inserter(result, result.end()));
  1134. }
  1135. if (! result.empty()) {
  1136. for (auto element : result) {
  1137. #ifdef REDIS_TRACE
  1138. fprintf(stdout, "Received notification from: %s\n", element.first.c_str());
  1139. #endif
  1140. for (auto rec : element.second) {
  1141. std::string id = rec.first;
  1142. auto attrs = rec.second;
  1143. #ifdef REDIS_TRACE
  1144. fprintf(stdout, "Record ID: %s\n", id.c_str());
  1145. fprintf(stdout, "attrs len: %lu\n", attrs.size());
  1146. #endif
  1147. for (auto a : attrs) {
  1148. #ifdef REDIS_TRACE
  1149. fprintf(stdout, "key: %s\nvalue: %s\n", a.first.c_str(), a.second.c_str());
  1150. #endif
  1151. try {
  1152. tmp = json::parse(a.second);
  1153. json& ov = tmp["old_val"];
  1154. json& nv = tmp["new_val"];
  1155. json oldConfig, newConfig;
  1156. if (ov.is_object())
  1157. oldConfig = ov;
  1158. if (nv.is_object())
  1159. newConfig = nv;
  1160. if (oldConfig.is_object() || newConfig.is_object()) {
  1161. _memberChanged(oldConfig, newConfig, (this->_ready >= 2));
  1162. }
  1163. }
  1164. catch (...) {
  1165. fprintf(stderr, "json parse error in _membersWatcher_Redis: %s\n", a.second.c_str());
  1166. }
  1167. }
  1168. if (_rc->clusterMode) {
  1169. _cluster->xdel(key, id);
  1170. }
  1171. else {
  1172. _redis->xdel(key, id);
  1173. }
  1174. lastID = id;
  1175. Metrics::redis_mem_notification++;
  1176. }
  1177. }
  1178. }
  1179. }
  1180. catch (sw::redis::Error& e) {
  1181. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1182. fprintf(stderr, "Error in Redis members watcher: %s\n", e.what());
  1183. }
  1184. }
  1185. fprintf(stderr, "membersWatcher ended\n");
  1186. }
  1187. void CV1::networksDbWatcher()
  1188. {
  1189. if (_rc) {
  1190. _networksWatcher_Redis();
  1191. }
  1192. else {
  1193. _networksWatcher_Postgres();
  1194. }
  1195. if (_run == 1) {
  1196. fprintf(
  1197. stderr, "ERROR: %s networksDbWatcher should still be running! Exiting Controller.\n",
  1198. _myAddressStr.c_str());
  1199. exit(8);
  1200. }
  1201. fprintf(stderr, "Exited networksDbWatcher\n");
  1202. }
  1203. void CV1::_networksWatcher_Postgres()
  1204. {
  1205. std::string stream = "network_" + _myAddressStr;
  1206. fprintf(stderr, "Listening to member stream: %s\n", stream.c_str());
  1207. auto c = _pool->borrow();
  1208. NetworkNotificationReceiver<CV1> n(this, *c->c, stream);
  1209. while (_run == 1) {
  1210. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1211. auto tracer = provider->GetTracer("cv1");
  1212. auto span = tracer->StartSpan("cv1::_networksWatcher_Postgres");
  1213. auto scope = tracer->WithActiveSpan(span);
  1214. c->c->await_notification(5, 0);
  1215. }
  1216. }
  1217. void CV1::_networksWatcher_Redis()
  1218. {
  1219. char buf[11] = { 0 };
  1220. std::string key = "network-stream:{" + std::string(_myAddress.toString(buf)) + "}";
  1221. std::string lastID = "0";
  1222. while (_run == 1) {
  1223. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1224. auto tracer = provider->GetTracer("cv1");
  1225. auto span = tracer->StartSpan("cv1::_networksWatcher_Redis");
  1226. auto scope = tracer->WithActiveSpan(span);
  1227. try {
  1228. json tmp;
  1229. std::unordered_map<std::string, ItemStream> result;
  1230. if (_rc->clusterMode) {
  1231. _cluster->xread(key, lastID, std::chrono::seconds(1), 0, std::inserter(result, result.end()));
  1232. }
  1233. else {
  1234. _redis->xread(key, lastID, std::chrono::seconds(1), 0, std::inserter(result, result.end()));
  1235. }
  1236. if (! result.empty()) {
  1237. for (auto element : result) {
  1238. #ifdef REDIS_TRACE
  1239. fprintf(stdout, "Received notification from: %s\n", element.first.c_str());
  1240. #endif
  1241. for (auto rec : element.second) {
  1242. std::string id = rec.first;
  1243. auto attrs = rec.second;
  1244. #ifdef REDIS_TRACE
  1245. fprintf(stdout, "Record ID: %s\n", id.c_str());
  1246. fprintf(stdout, "attrs len: %lu\n", attrs.size());
  1247. #endif
  1248. for (auto a : attrs) {
  1249. #ifdef REDIS_TRACE
  1250. fprintf(stdout, "key: %s\nvalue: %s\n", a.first.c_str(), a.second.c_str());
  1251. #endif
  1252. try {
  1253. tmp = json::parse(a.second);
  1254. json& ov = tmp["old_val"];
  1255. json& nv = tmp["new_val"];
  1256. json oldConfig, newConfig;
  1257. if (ov.is_object())
  1258. oldConfig = ov;
  1259. if (nv.is_object())
  1260. newConfig = nv;
  1261. if (oldConfig.is_object() || newConfig.is_object()) {
  1262. _networkChanged(oldConfig, newConfig, (this->_ready >= 2));
  1263. }
  1264. }
  1265. catch (std::exception& e) {
  1266. fprintf(
  1267. stderr, "json parse error in networkWatcher_Redis: what: %s json: %s\n", e.what(),
  1268. a.second.c_str());
  1269. }
  1270. }
  1271. if (_rc->clusterMode) {
  1272. _cluster->xdel(key, id);
  1273. }
  1274. else {
  1275. _redis->xdel(key, id);
  1276. }
  1277. lastID = id;
  1278. }
  1279. Metrics::redis_net_notification++;
  1280. }
  1281. }
  1282. }
  1283. catch (sw::redis::Error& e) {
  1284. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1285. fprintf(stderr, "Error in Redis networks watcher: %s\n", e.what());
  1286. }
  1287. }
  1288. fprintf(stderr, "networksWatcher ended\n");
  1289. }
  1290. void CV1::commitThread()
  1291. {
  1292. fprintf(stderr, "%s: commitThread start\n", _myAddressStr.c_str());
  1293. std::pair<nlohmann::json, bool> qitem;
  1294. while (_commitQueue.get(qitem) && (_run == 1)) {
  1295. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1296. auto tracer = provider->GetTracer("cv1");
  1297. auto span = tracer->StartSpan("cv1::commitThread");
  1298. auto scope = tracer->WithActiveSpan(span);
  1299. // fprintf(stderr, "commitThread tick\n");
  1300. if (! qitem.first.is_object()) {
  1301. fprintf(stderr, "not an object\n");
  1302. continue;
  1303. }
  1304. std::shared_ptr<PostgresConnection> c;
  1305. try {
  1306. c = _pool->borrow();
  1307. }
  1308. catch (std::exception& e) {
  1309. fprintf(stderr, "ERROR: %s\n", e.what());
  1310. continue;
  1311. }
  1312. if (! c) {
  1313. fprintf(stderr, "Error getting database connection\n");
  1314. continue;
  1315. }
  1316. Metrics::pgsql_commit_ticks++;
  1317. try {
  1318. nlohmann::json& config = (qitem.first);
  1319. const std::string objtype = config["objtype"];
  1320. if (objtype == "member") {
  1321. auto mspan = tracer->StartSpan("cv1::commitThread::member");
  1322. auto mscope = tracer->WithActiveSpan(mspan);
  1323. // fprintf(stderr, "%s: commitThread: member\n", _myAddressStr.c_str());
  1324. std::string memberId;
  1325. std::string networkId;
  1326. try {
  1327. pqxx::work w(*c->c);
  1328. memberId = config["id"];
  1329. networkId = config["nwid"];
  1330. std::string target = "NULL";
  1331. if (! config["remoteTraceTarget"].is_null()) {
  1332. target = config["remoteTraceTarget"];
  1333. }
  1334. pqxx::row nwrow = w.exec_params1("SELECT COUNT(id) FROM ztc_network WHERE id = $1", networkId);
  1335. int nwcount = nwrow[0].as<int>();
  1336. if (nwcount != 1) {
  1337. fprintf(stderr, "network %s does not exist. skipping member upsert\n", networkId.c_str());
  1338. w.abort();
  1339. _pool->unborrow(c);
  1340. continue;
  1341. }
  1342. pqxx::row mrow = w.exec_params1(
  1343. "SELECT COUNT(id) FROM ztc_member WHERE id = $1 AND network_id = $2", memberId, networkId);
  1344. int membercount = mrow[0].as<int>();
  1345. bool isNewMember = false;
  1346. if (membercount == 0) {
  1347. // new member
  1348. isNewMember = true;
  1349. pqxx::result res = w.exec_params0(
  1350. "INSERT INTO ztc_member (id, network_id, active_bridge, authorized, capabilities, "
  1351. "identity, last_authorized_time, last_deauthorized_time, no_auto_assign_ips, "
  1352. "remote_trace_level, remote_trace_target, revision, tags, v_major, v_minor, v_rev, "
  1353. "v_proto) "
  1354. "VALUES ($1, $2, $3, $4, $5, $6, "
  1355. "TO_TIMESTAMP($7::double precision/1000), TO_TIMESTAMP($8::double precision/1000), "
  1356. "$9, $10, $11, $12, $13, $14, $15, $16, $17)",
  1357. memberId, networkId, (bool)config["activeBridge"], (bool)config["authorized"],
  1358. OSUtils::jsonDump(config["capabilities"], -1), OSUtils::jsonString(config["identity"], ""),
  1359. (uint64_t)config["lastAuthorizedTime"], (uint64_t)config["lastDeauthorizedTime"],
  1360. (bool)config["noAutoAssignIps"], (int)config["remoteTraceLevel"], target,
  1361. (uint64_t)config["revision"], OSUtils::jsonDump(config["tags"], -1), (int)config["vMajor"],
  1362. (int)config["vMinor"], (int)config["vRev"], (int)config["vProto"]);
  1363. }
  1364. else {
  1365. // existing member
  1366. pqxx::result res = w.exec_params0(
  1367. "UPDATE ztc_member "
  1368. "SET active_bridge = $3, authorized = $4, capabilities = $5, identity = $6, "
  1369. "last_authorized_time = TO_TIMESTAMP($7::double precision/1000), "
  1370. "last_deauthorized_time = TO_TIMESTAMP($8::double precision/1000), "
  1371. "no_auto_assign_ips = $9, remote_trace_level = $10, remote_trace_target= $11, "
  1372. "revision = $12, tags = $13, v_major = $14, v_minor = $15, v_rev = $16, v_proto = $17 "
  1373. "WHERE id = $1 AND network_id = $2",
  1374. memberId, networkId, (bool)config["activeBridge"], (bool)config["authorized"],
  1375. OSUtils::jsonDump(config["capabilities"], -1), OSUtils::jsonString(config["identity"], ""),
  1376. (uint64_t)config["lastAuthorizedTime"], (uint64_t)config["lastDeauthorizedTime"],
  1377. (bool)config["noAutoAssignIps"], (int)config["remoteTraceLevel"], target,
  1378. (uint64_t)config["revision"], OSUtils::jsonDump(config["tags"], -1), (int)config["vMajor"],
  1379. (int)config["vMinor"], (int)config["vRev"], (int)config["vProto"]);
  1380. }
  1381. if (! isNewMember) {
  1382. pqxx::result res = w.exec_params0(
  1383. "DELETE FROM ztc_member_ip_assignment WHERE member_id = $1 AND network_id = $2", memberId,
  1384. networkId);
  1385. }
  1386. std::vector<std::string> assignments;
  1387. bool ipAssignError = false;
  1388. for (auto i = config["ipAssignments"].begin(); i != config["ipAssignments"].end(); ++i) {
  1389. std::string addr = *i;
  1390. if (std::find(assignments.begin(), assignments.end(), addr) != assignments.end()) {
  1391. continue;
  1392. }
  1393. pqxx::result res = w.exec_params0(
  1394. "INSERT INTO ztc_member_ip_assignment (member_id, network_id, address) VALUES ($1, $2, $3) "
  1395. "ON CONFLICT (network_id, member_id, address) DO NOTHING",
  1396. memberId, networkId, addr);
  1397. assignments.push_back(addr);
  1398. }
  1399. if (ipAssignError) {
  1400. fprintf(stderr, "%s: ipAssignError\n", _myAddressStr.c_str());
  1401. w.abort();
  1402. _pool->unborrow(c);
  1403. c.reset();
  1404. continue;
  1405. }
  1406. w.commit();
  1407. if (_smee != NULL && isNewMember) {
  1408. pqxx::row row = w.exec_params1(
  1409. "SELECT "
  1410. " count(h.hook_id) "
  1411. "FROM "
  1412. " ztc_hook h "
  1413. " INNER JOIN ztc_org o ON o.org_id = h.org_id "
  1414. " INNER JOIN ztc_network n ON n.owner_id = o.owner_id "
  1415. " WHERE "
  1416. "n.id = $1 ",
  1417. networkId);
  1418. int64_t hookCount = row[0].as<int64_t>();
  1419. if (hookCount > 0) {
  1420. notifyNewMember(networkId, memberId);
  1421. }
  1422. }
  1423. const uint64_t nwidInt = OSUtils::jsonIntHex(config["nwid"], 0ULL);
  1424. const uint64_t memberidInt = OSUtils::jsonIntHex(config["id"], 0ULL);
  1425. if (nwidInt && memberidInt) {
  1426. nlohmann::json nwOrig;
  1427. nlohmann::json memOrig;
  1428. nlohmann::json memNew(config);
  1429. get(nwidInt, nwOrig, memberidInt, memOrig);
  1430. _memberChanged(memOrig, memNew, qitem.second);
  1431. }
  1432. else {
  1433. fprintf(
  1434. stderr, "%s: Can't notify of change. Error parsing nwid or memberid: %llu-%llu\n",
  1435. _myAddressStr.c_str(), (unsigned long long)nwidInt, (unsigned long long)memberidInt);
  1436. }
  1437. }
  1438. catch (std::exception& e) {
  1439. fprintf(
  1440. stderr, "%s ERROR: Error updating member %s-%s: %s\n", _myAddressStr.c_str(), networkId.c_str(),
  1441. memberId.c_str(), e.what());
  1442. mspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1443. }
  1444. }
  1445. else if (objtype == "network") {
  1446. auto nspan = tracer->StartSpan("cv1::commitThread::network");
  1447. auto nscope = tracer->WithActiveSpan(nspan);
  1448. try {
  1449. // fprintf(stderr, "%s: commitThread: network\n", _myAddressStr.c_str());
  1450. pqxx::work w(*c->c);
  1451. std::string id = config["id"];
  1452. std::string remoteTraceTarget = "";
  1453. if (! config["remoteTraceTarget"].is_null()) {
  1454. remoteTraceTarget = config["remoteTraceTarget"];
  1455. }
  1456. std::string rulesSource = "";
  1457. if (config["rulesSource"].is_string()) {
  1458. rulesSource = config["rulesSource"];
  1459. }
  1460. // This ugly query exists because when we want to mirror networks to/from
  1461. // another data store (e.g. FileDB or LFDB) it is possible to get a network
  1462. // that doesn't exist in Central's database. This does an upsert and sets
  1463. // the owner_id to the "first" global admin in the user DB if the record
  1464. // did not previously exist. If the record already exists owner_id is left
  1465. // unchanged, so owner_id should be left out of the update clause.
  1466. pqxx::result res = w.exec_params0(
  1467. "INSERT INTO ztc_network (id, creation_time, owner_id, controller_id, capabilities, "
  1468. "enable_broadcast, "
  1469. "last_modified, mtu, multicast_limit, name, private, "
  1470. "remote_trace_level, remote_trace_target, rules, rules_source, "
  1471. "tags, v4_assign_mode, v6_assign_mode, sso_enabled) VALUES ("
  1472. "$1, TO_TIMESTAMP($5::double precision/1000), "
  1473. "(SELECT user_id AS owner_id FROM ztc_global_permissions WHERE authorize = true AND del = true "
  1474. "AND modify = true AND read = true LIMIT 1),"
  1475. "$2, $3, $4, TO_TIMESTAMP($5::double precision/1000), "
  1476. "$6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17) "
  1477. "ON CONFLICT (id) DO UPDATE set controller_id = EXCLUDED.controller_id, "
  1478. "capabilities = EXCLUDED.capabilities, enable_broadcast = EXCLUDED.enable_broadcast, "
  1479. "last_modified = EXCLUDED.last_modified, mtu = EXCLUDED.mtu, "
  1480. "multicast_limit = EXCLUDED.multicast_limit, name = EXCLUDED.name, "
  1481. "private = EXCLUDED.private, remote_trace_level = EXCLUDED.remote_trace_level, "
  1482. "remote_trace_target = EXCLUDED.remote_trace_target, rules = EXCLUDED.rules, "
  1483. "rules_source = EXCLUDED.rules_source, tags = EXCLUDED.tags, "
  1484. "v4_assign_mode = EXCLUDED.v4_assign_mode, v6_assign_mode = EXCLUDED.v6_assign_mode, "
  1485. "sso_enabled = EXCLUDED.sso_enabled",
  1486. id, _myAddressStr, OSUtils::jsonDump(config["capabilities"], -1),
  1487. (bool)config["enableBroadcast"], OSUtils::now(), (int)config["mtu"],
  1488. (int)config["multicastLimit"], OSUtils::jsonString(config["name"], ""), (bool)config["private"],
  1489. (int)config["remoteTraceLevel"], remoteTraceTarget, OSUtils::jsonDump(config["rules"], -1),
  1490. rulesSource, OSUtils::jsonDump(config["tags"], -1),
  1491. OSUtils::jsonDump(config["v4AssignMode"], -1), OSUtils::jsonDump(config["v6AssignMode"], -1),
  1492. OSUtils::jsonBool(config["ssoEnabled"], false));
  1493. res = w.exec_params0("DELETE FROM ztc_network_assignment_pool WHERE network_id = $1", id);
  1494. auto pool = config["ipAssignmentPools"];
  1495. bool err = false;
  1496. for (auto i = pool.begin(); i != pool.end(); ++i) {
  1497. std::string start = (*i)["ipRangeStart"];
  1498. std::string end = (*i)["ipRangeEnd"];
  1499. res = w.exec_params0(
  1500. "INSERT INTO ztc_network_assignment_pool (network_id, ip_range_start, ip_range_end) "
  1501. "VALUES ($1, $2, $3)",
  1502. id, start, end);
  1503. }
  1504. res = w.exec_params0("DELETE FROM ztc_network_route WHERE network_id = $1", id);
  1505. auto routes = config["routes"];
  1506. err = false;
  1507. for (auto i = routes.begin(); i != routes.end(); ++i) {
  1508. std::string t = (*i)["target"];
  1509. std::vector<std::string> target;
  1510. std::istringstream f(t);
  1511. std::string s;
  1512. while (std::getline(f, s, '/')) {
  1513. target.push_back(s);
  1514. }
  1515. if (target.empty() || target.size() != 2) {
  1516. continue;
  1517. }
  1518. std::string targetAddr = target[0];
  1519. std::string targetBits = target[1];
  1520. std::string via = "NULL";
  1521. if (! (*i)["via"].is_null()) {
  1522. via = (*i)["via"];
  1523. }
  1524. res = w.exec_params0(
  1525. "INSERT INTO ztc_network_route (network_id, address, bits, via) VALUES ($1, $2, $3, $4)",
  1526. id, targetAddr, targetBits, (via == "NULL" ? NULL : via.c_str()));
  1527. }
  1528. if (err) {
  1529. fprintf(stderr, "%s: route add error\n", _myAddressStr.c_str());
  1530. w.abort();
  1531. _pool->unborrow(c);
  1532. continue;
  1533. }
  1534. auto dns = config["dns"];
  1535. std::string domain = dns["domain"];
  1536. std::stringstream servers;
  1537. servers << "{";
  1538. for (auto j = dns["servers"].begin(); j < dns["servers"].end(); ++j) {
  1539. servers << *j;
  1540. if ((j + 1) != dns["servers"].end()) {
  1541. servers << ",";
  1542. }
  1543. }
  1544. servers << "}";
  1545. std::string s = servers.str();
  1546. res = w.exec_params0(
  1547. "INSERT INTO ztc_network_dns (network_id, domain, servers) VALUES ($1, $2, $3) ON CONFLICT "
  1548. "(network_id) DO UPDATE SET domain = EXCLUDED.domain, servers = EXCLUDED.servers",
  1549. id, domain, s);
  1550. w.commit();
  1551. const uint64_t nwidInt = OSUtils::jsonIntHex(config["nwid"], 0ULL);
  1552. if (nwidInt) {
  1553. nlohmann::json nwOrig;
  1554. nlohmann::json nwNew(config);
  1555. get(nwidInt, nwOrig);
  1556. _networkChanged(nwOrig, nwNew, qitem.second);
  1557. }
  1558. else {
  1559. fprintf(
  1560. stderr, "%s: Can't notify network changed: %llu\n", _myAddressStr.c_str(),
  1561. (unsigned long long)nwidInt);
  1562. }
  1563. }
  1564. catch (std::exception& e) {
  1565. nspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1566. fprintf(stderr, "%s ERROR: Error updating network: %s\n", _myAddressStr.c_str(), e.what());
  1567. }
  1568. if (_redisMemberStatus) {
  1569. try {
  1570. std::string id = config["id"];
  1571. std::string controllerId = _myAddressStr.c_str();
  1572. std::string key = "networks:{" + controllerId + "}";
  1573. if (_rc->clusterMode) {
  1574. _cluster->sadd(key, id);
  1575. }
  1576. else {
  1577. _redis->sadd(key, id);
  1578. }
  1579. }
  1580. catch (sw::redis::Error& e) {
  1581. nspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1582. fprintf(stderr, "ERROR: Error adding network to Redis: %s\n", e.what());
  1583. }
  1584. }
  1585. }
  1586. else if (objtype == "_delete_network") {
  1587. auto dspan = tracer->StartSpan("cv1::commitThread::_delete_network");
  1588. auto dscope = tracer->WithActiveSpan(dspan);
  1589. // fprintf(stderr, "%s: commitThread: delete network\n", _myAddressStr.c_str());
  1590. try {
  1591. pqxx::work w(*c->c);
  1592. std::string networkId = config["nwid"];
  1593. pqxx::result res = w.exec_params0("UPDATE ztc_network SET deleted = true WHERE id = $1", networkId);
  1594. w.commit();
  1595. }
  1596. catch (std::exception& e) {
  1597. dspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1598. fprintf(stderr, "%s ERROR: Error deleting network: %s\n", _myAddressStr.c_str(), e.what());
  1599. }
  1600. if (_redisMemberStatus) {
  1601. try {
  1602. std::string id = config["id"];
  1603. std::string controllerId = _myAddressStr.c_str();
  1604. std::string key = "networks:{" + controllerId + "}";
  1605. if (_rc->clusterMode) {
  1606. _cluster->srem(key, id);
  1607. _cluster->del("network-nodes-online:{" + controllerId + "}:" + id);
  1608. }
  1609. else {
  1610. _redis->srem(key, id);
  1611. _redis->del("network-nodes-online:{" + controllerId + "}:" + id);
  1612. }
  1613. }
  1614. catch (sw::redis::Error& e) {
  1615. dspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1616. fprintf(stderr, "ERROR: Error adding network to Redis: %s\n", e.what());
  1617. }
  1618. }
  1619. }
  1620. else if (objtype == "_delete_member") {
  1621. auto mspan = tracer->StartSpan("cv1::commitThread::_delete_member");
  1622. auto mscope = tracer->WithActiveSpan(mspan);
  1623. // fprintf(stderr, "%s commitThread: delete member\n", _myAddressStr.c_str());
  1624. try {
  1625. pqxx::work w(*c->c);
  1626. std::string memberId = config["id"];
  1627. std::string networkId = config["nwid"];
  1628. pqxx::result res = w.exec_params0(
  1629. "UPDATE ztc_member SET hidden = true, deleted = true WHERE id = $1 AND network_id = $2",
  1630. memberId, networkId);
  1631. w.commit();
  1632. }
  1633. catch (std::exception& e) {
  1634. mspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1635. fprintf(stderr, "%s ERROR: Error deleting member: %s\n", _myAddressStr.c_str(), e.what());
  1636. }
  1637. if (_redisMemberStatus) {
  1638. try {
  1639. std::string memberId = config["id"];
  1640. std::string networkId = config["nwid"];
  1641. std::string controllerId = _myAddressStr.c_str();
  1642. std::string key = "network-nodes-all:{" + controllerId + "}:" + networkId;
  1643. if (_rc->clusterMode) {
  1644. _cluster->srem(key, memberId);
  1645. _cluster->del("member:{" + controllerId + "}:" + networkId + ":" + memberId);
  1646. }
  1647. else {
  1648. _redis->srem(key, memberId);
  1649. _redis->del("member:{" + controllerId + "}:" + networkId + ":" + memberId);
  1650. }
  1651. }
  1652. catch (sw::redis::Error& e) {
  1653. mspan->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1654. fprintf(stderr, "ERROR: Error deleting member from Redis: %s\n", e.what());
  1655. }
  1656. }
  1657. }
  1658. else {
  1659. fprintf(stderr, "%s ERROR: unknown objtype\n", _myAddressStr.c_str());
  1660. }
  1661. }
  1662. catch (std::exception& e) {
  1663. span->SetStatus(opentelemetry::trace::StatusCode::kError, e.what());
  1664. fprintf(stderr, "%s ERROR: Error getting objtype: %s\n", _myAddressStr.c_str(), e.what());
  1665. }
  1666. _pool->unborrow(c);
  1667. c.reset();
  1668. }
  1669. fprintf(stderr, "%s commitThread finished\n", _myAddressStr.c_str());
  1670. }
  1671. void CV1::notifyNewMember(const std::string& networkID, const std::string& memberID)
  1672. {
  1673. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1674. auto tracer = provider->GetTracer("cv1");
  1675. auto span = tracer->StartSpan("cv1::notifyNewMember");
  1676. auto scope = tracer->WithActiveSpan(span);
  1677. rustybits::smee_client_notify_network_joined(_smee, networkID.c_str(), memberID.c_str());
  1678. }
  1679. void CV1::onlineNotificationThread()
  1680. {
  1681. waitForReady();
  1682. if (_redisMemberStatus) {
  1683. onlineNotification_Redis();
  1684. }
  1685. else {
  1686. onlineNotification_Postgres();
  1687. }
  1688. }
  1689. /**
  1690. * ONLY UNCOMMENT FOR TEMPORARY DB MAINTENANCE
  1691. *
  1692. * This define temporarily turns off writing to the member status table
  1693. * so it can be reindexed when the indexes get too large.
  1694. */
  1695. // #define DISABLE_MEMBER_STATUS 1
  1696. void CV1::onlineNotification_Postgres()
  1697. {
  1698. _connected = 1;
  1699. nlohmann::json jtmp1, jtmp2;
  1700. while (_run == 1) {
  1701. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1702. auto tracer = provider->GetTracer("cv1");
  1703. auto span = tracer->StartSpan("cv1::onlineNotification_Postgres");
  1704. auto scope = tracer->WithActiveSpan(span);
  1705. auto c = _pool->borrow();
  1706. auto c2 = _pool->borrow();
  1707. try {
  1708. fprintf(stderr, "%s onlineNotification_Postgres\n", _myAddressStr.c_str());
  1709. std::unordered_map<std::pair<uint64_t, uint64_t>, NodeOnlineRecord, _PairHasher> lastOnline;
  1710. {
  1711. std::lock_guard<std::mutex> l(_lastOnline_l);
  1712. lastOnline.swap(_lastOnline);
  1713. }
  1714. #ifndef DISABLE_MEMBER_STATUS
  1715. pqxx::work w(*c->c);
  1716. pqxx::work w2(*c2->c);
  1717. fprintf(stderr, "online notification tick\n");
  1718. bool firstRun = true;
  1719. bool memberAdded = false;
  1720. int updateCount = 0;
  1721. pqxx::pipeline pipe(w);
  1722. for (auto i = lastOnline.begin(); i != lastOnline.end(); ++i) {
  1723. updateCount += 1;
  1724. uint64_t nwid_i = i->first.first;
  1725. char nwidTmp[64];
  1726. char memTmp[64];
  1727. char ipTmp[64];
  1728. OSUtils::ztsnprintf(nwidTmp, sizeof(nwidTmp), "%.16llx", nwid_i);
  1729. OSUtils::ztsnprintf(memTmp, sizeof(memTmp), "%.10llx", i->first.second);
  1730. if (! get(nwid_i, jtmp1, i->first.second, jtmp2)) {
  1731. continue; // skip non existent networks/members
  1732. }
  1733. std::string networkId(nwidTmp);
  1734. std::string memberId(memTmp);
  1735. try {
  1736. pqxx::row r = w2.exec_params1(
  1737. "SELECT id, network_id FROM ztc_member WHERE network_id = $1 AND id = $2", networkId, memberId);
  1738. }
  1739. catch (pqxx::unexpected_rows& e) {
  1740. continue;
  1741. }
  1742. int64_t ts = i->second.lastSeen;
  1743. std::string ipAddr = i->second.physicalAddress.toIpString(ipTmp);
  1744. std::string timestamp = std::to_string(ts);
  1745. std::string osArch = i->second.osArch;
  1746. std::vector<std::string> osArchSplit = split(osArch, '/');
  1747. std::string os = "unknown";
  1748. std::string arch = "unknown";
  1749. if (osArchSplit.size() == 2) {
  1750. os = osArchSplit[0];
  1751. arch = osArchSplit[1];
  1752. }
  1753. std::stringstream memberUpdate;
  1754. memberUpdate
  1755. << "INSERT INTO ztc_member_status (network_id, member_id, address, last_updated, os, arch) VALUES "
  1756. << "('" << networkId << "', '" << memberId << "', ";
  1757. if (ipAddr.empty()) {
  1758. memberUpdate << "NULL, ";
  1759. }
  1760. else {
  1761. memberUpdate << "'" << ipAddr << "', ";
  1762. }
  1763. memberUpdate << "TO_TIMESTAMP(" << timestamp << "::double precision/1000), "
  1764. << "'" << os << "', "
  1765. << "'" << arch << "'"
  1766. << ") "
  1767. << " ON CONFLICT (network_id, member_id) DO UPDATE SET address = EXCLUDED.address, "
  1768. "last_updated = EXCLUDED.last_updated, "
  1769. << "os = EXCLUDED.os, arch = EXCLUDED.arch";
  1770. pipe.insert(memberUpdate.str());
  1771. Metrics::pgsql_node_checkin++;
  1772. }
  1773. while (! pipe.empty()) {
  1774. pipe.retrieve();
  1775. }
  1776. pipe.complete();
  1777. w.commit();
  1778. fprintf(stderr, "%s: Updated online status of %d members\n", _myAddressStr.c_str(), updateCount);
  1779. #endif
  1780. }
  1781. catch (std::exception& e) {
  1782. fprintf(stderr, "%s: error in onlinenotification thread: %s\n", _myAddressStr.c_str(), e.what());
  1783. }
  1784. _pool->unborrow(c2);
  1785. _pool->unborrow(c);
  1786. ConnectionPoolStats stats = _pool->get_stats();
  1787. fprintf(
  1788. stderr, "%s pool stats: in use size: %llu, available size: %llu, total: %llu\n", _myAddressStr.c_str(),
  1789. stats.borrowed_size, stats.pool_size, (stats.borrowed_size + stats.pool_size));
  1790. span->End();
  1791. std::this_thread::sleep_for(std::chrono::seconds(10));
  1792. }
  1793. fprintf(stderr, "%s: Fell out of run loop in onlineNotificationThread\n", _myAddressStr.c_str());
  1794. if (_run == 1) {
  1795. fprintf(
  1796. stderr, "ERROR: %s onlineNotificationThread should still be running! Exiting Controller.\n",
  1797. _myAddressStr.c_str());
  1798. exit(6);
  1799. }
  1800. }
  1801. void CV1::onlineNotification_Redis()
  1802. {
  1803. _connected = 1;
  1804. char buf[11] = { 0 };
  1805. std::string controllerId = std::string(_myAddress.toString(buf));
  1806. while (_run == 1) {
  1807. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1808. auto tracer = provider->GetTracer("cv1");
  1809. auto span = tracer->StartSpan("cv1::onlineNotification_Redis");
  1810. auto scope = tracer->WithActiveSpan(span);
  1811. fprintf(stderr, "onlineNotification tick\n");
  1812. auto start = std::chrono::high_resolution_clock::now();
  1813. uint64_t count = 0;
  1814. std::unordered_map<std::pair<uint64_t, uint64_t>, NodeOnlineRecord, _PairHasher> lastOnline;
  1815. {
  1816. std::lock_guard<std::mutex> l(_lastOnline_l);
  1817. lastOnline.swap(_lastOnline);
  1818. }
  1819. try {
  1820. if (! lastOnline.empty()) {
  1821. if (_rc->clusterMode) {
  1822. auto tx = _cluster->transaction(controllerId, true, false);
  1823. count = _doRedisUpdate(tx, controllerId, lastOnline);
  1824. }
  1825. else {
  1826. auto tx = _redis->transaction(true, false);
  1827. count = _doRedisUpdate(tx, controllerId, lastOnline);
  1828. }
  1829. }
  1830. }
  1831. catch (sw::redis::Error& e) {
  1832. fprintf(stderr, "Error in online notification thread (redis): %s\n", e.what());
  1833. }
  1834. auto end = std::chrono::high_resolution_clock::now();
  1835. auto dur = std::chrono::duration_cast<std::chrono::milliseconds>(end - start);
  1836. auto total = dur.count();
  1837. fprintf(stderr, "onlineNotification ran in %llu ms\n", total);
  1838. span->End();
  1839. std::this_thread::sleep_for(std::chrono::seconds(5));
  1840. }
  1841. }
  1842. uint64_t CV1::_doRedisUpdate(
  1843. sw::redis::Transaction& tx,
  1844. std::string& controllerId,
  1845. std::unordered_map<std::pair<uint64_t, uint64_t>, NodeOnlineRecord, _PairHasher>& lastOnline)
  1846. {
  1847. auto provider = opentelemetry::trace::Provider::GetTracerProvider();
  1848. auto tracer = provider->GetTracer("cv1");
  1849. auto span = tracer->StartSpan("cv1::_doRedisUpdate");
  1850. auto scope = tracer->WithActiveSpan(span);
  1851. nlohmann::json jtmp1, jtmp2;
  1852. uint64_t count = 0;
  1853. for (auto i = lastOnline.begin(); i != lastOnline.end(); ++i) {
  1854. uint64_t nwid_i = i->first.first;
  1855. uint64_t memberid_i = i->first.second;
  1856. char nwidTmp[64];
  1857. char memTmp[64];
  1858. char ipTmp[64];
  1859. OSUtils::ztsnprintf(nwidTmp, sizeof(nwidTmp), "%.16llx", nwid_i);
  1860. OSUtils::ztsnprintf(memTmp, sizeof(memTmp), "%.10llx", memberid_i);
  1861. if (! get(nwid_i, jtmp1, memberid_i, jtmp2)) {
  1862. continue; // skip non existent members/networks
  1863. }
  1864. std::string networkId(nwidTmp);
  1865. std::string memberId(memTmp);
  1866. int64_t ts = i->second.lastSeen;
  1867. std::string ipAddr = i->second.physicalAddress.toIpString(ipTmp);
  1868. std::string timestamp = std::to_string(ts);
  1869. std::string osArch = i->second.osArch;
  1870. std::vector<std::string> osArchSplit = split(osArch, '/');
  1871. std::string os = "unknown";
  1872. std::string arch = "unknown";
  1873. if (osArchSplit.size() == 2) {
  1874. os = osArchSplit[0];
  1875. arch = osArchSplit[1];
  1876. }
  1877. std::unordered_map<std::string, std::string> record = { { "id", memberId },
  1878. { "address", ipAddr },
  1879. { "last_updated", std::to_string(ts) },
  1880. { "os", os },
  1881. { "arch", arch } };
  1882. tx.zadd("nodes-online:{" + controllerId + "}", memberId, ts)
  1883. .zadd("nodes-online2:{" + controllerId + "}", networkId + "-" + memberId, ts)
  1884. .zadd("network-nodes-online:{" + controllerId + "}:" + networkId, memberId, ts)
  1885. .zadd("active-networks:{" + controllerId + "}", networkId, ts)
  1886. .sadd("network-nodes-all:{" + controllerId + "}:" + networkId, memberId)
  1887. .hmset("member:{" + controllerId + "}:" + networkId + ":" + memberId, record.begin(), record.end());
  1888. ++count;
  1889. Metrics::redis_node_checkin++;
  1890. }
  1891. // expire records from all-nodes and network-nodes member list
  1892. uint64_t expireOld = OSUtils::now() - 300000;
  1893. tx.zremrangebyscore(
  1894. "nodes-online:{" + controllerId + "}",
  1895. sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN));
  1896. tx.zremrangebyscore(
  1897. "nodes-online2:{" + controllerId + "}",
  1898. sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN));
  1899. tx.zremrangebyscore(
  1900. "active-networks:{" + controllerId + "}",
  1901. sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN));
  1902. {
  1903. std::shared_lock<std::shared_mutex> l(_networks_l);
  1904. for (const auto& it : _networks) {
  1905. uint64_t nwid_i = it.first;
  1906. char nwidTmp[64];
  1907. OSUtils::ztsnprintf(nwidTmp, sizeof(nwidTmp), "%.16llx", nwid_i);
  1908. tx.zremrangebyscore(
  1909. "network-nodes-online:{" + controllerId + "}:" + nwidTmp,
  1910. sw::redis::RightBoundedInterval<double>(expireOld, sw::redis::BoundType::LEFT_OPEN));
  1911. }
  1912. }
  1913. tx.exec();
  1914. fprintf(stderr, "%s: Updated online status of %d members\n", _myAddressStr.c_str(), count);
  1915. return count;
  1916. }
  1917. #endif // ZT_CONTROLLER_USE_LIBPQ