diff options
author | Adam Ierymenko <adam.ierymenko@gmail.com> | 2015-03-31 13:54:50 -0700 |
---|---|---|
committer | Adam Ierymenko <adam.ierymenko@gmail.com> | 2015-03-31 13:54:50 -0700 |
commit | 2c5dbecb3c1e9d8257c1c80eac7fcae5fb51b508 (patch) | |
tree | f0268f6b94b2260bbffb2db0f312699e901e34b4 /attic | |
parent | fe94c9460b49ecbbc2064121c4d59b7a468cc5ce (diff) | |
download | infinitytier-2c5dbecb3c1e9d8257c1c80eac7fcae5fb51b508.tar.gz infinitytier-2c5dbecb3c1e9d8257c1c80eac7fcae5fb51b508.zip |
More CAPI work, and move old control/ and old node/Node to attic.
Diffstat (limited to 'attic')
-rw-r--r-- | attic/Node.cpp | 949 | ||||
-rw-r--r-- | attic/Node.hpp | 245 | ||||
-rw-r--r-- | attic/oldcontrol/IpcConnection.cpp | 281 | ||||
-rw-r--r-- | attic/oldcontrol/IpcConnection.hpp | 107 | ||||
-rw-r--r-- | attic/oldcontrol/IpcListener.cpp | 165 | ||||
-rw-r--r-- | attic/oldcontrol/IpcListener.hpp | 91 | ||||
-rw-r--r-- | attic/oldcontrol/NodeControlClient.cpp | 167 | ||||
-rw-r--r-- | attic/oldcontrol/NodeControlClient.hpp | 118 | ||||
-rw-r--r-- | attic/oldcontrol/NodeControlService.cpp | 250 | ||||
-rw-r--r-- | attic/oldcontrol/NodeControlService.hpp | 84 | ||||
-rw-r--r-- | attic/oldcontrol/README.md | 4 |
11 files changed, 2461 insertions, 0 deletions
diff --git a/attic/Node.cpp b/attic/Node.cpp new file mode 100644 index 00000000..71c2d3fa --- /dev/null +++ b/attic/Node.cpp @@ -0,0 +1,949 @@ +/* + * ZeroTier One - Network Virtualization Everywhere + * Copyright (C) 2011-2015 ZeroTier, Inc. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + * + * -- + * + * ZeroTier may be used and distributed under the terms of the GPLv3, which + * are available at: http://www.gnu.org/licenses/gpl-3.0.html + * + * If you would like to embed ZeroTier into a commercial application or + * redistribute it in a modified binary form, please contact ZeroTier Networks + * LLC. Start here: http://www.zerotier.com/ + */ + +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <errno.h> +#include <sys/stat.h> + +#include <map> +#include <set> +#include <utility> +#include <algorithm> +#include <list> +#include <vector> +#include <string> + +#include "Constants.hpp" + +#ifdef __WINDOWS__ +#include <WinSock2.h> +#include <Windows.h> +#include <ShlObj.h> +#else +#include <fcntl.h> +#include <unistd.h> +#include <signal.h> +#include <sys/file.h> +#endif + +#include "../version.h" + +#include "Node.hpp" +#include "RuntimeEnvironment.hpp" +#include "Logger.hpp" +#include "Utils.hpp" +#include "Defaults.hpp" +#include "Identity.hpp" +#include "Topology.hpp" +#include "SocketManager.hpp" +#include "Packet.hpp" +#include "Switch.hpp" +#include "EthernetTap.hpp" +#include "CMWC4096.hpp" +#include "NodeConfig.hpp" +#include "Network.hpp" +#include "MulticastGroup.hpp" +#include "Multicaster.hpp" +#include "Mutex.hpp" +#include "SoftwareUpdater.hpp" +#include "Buffer.hpp" +#include "AntiRecursion.hpp" +#include "HttpClient.hpp" +#include "NetworkConfigMaster.hpp" + +namespace ZeroTier { + +struct _NodeImpl +{ + RuntimeEnvironment renv; + + std::string reasonForTerminationStr; + volatile Node::ReasonForTermination reasonForTermination; + + volatile bool started; + volatile bool running; + volatile bool resynchronize; + + volatile bool disableRootTopologyUpdates; + std::string overrideRootTopology; + + // This function performs final node tear-down + inline Node::ReasonForTermination terminate() + { + RuntimeEnvironment *RR = &renv; + LOG("terminating: %s",reasonForTerminationStr.c_str()); + + running = false; + + delete renv.updater; renv.updater = (SoftwareUpdater *)0; + delete renv.nc; renv.nc = (NodeConfig *)0; // shut down all networks, close taps, etc. + delete renv.topology; renv.topology = (Topology *)0; // now we no longer need routing info + delete renv.mc; renv.mc = (Multicaster *)0; + delete renv.antiRec; renv.antiRec = (AntiRecursion *)0; + delete renv.sw; renv.sw = (Switch *)0; // order matters less from here down + delete renv.http; renv.http = (HttpClient *)0; + delete renv.prng; renv.prng = (CMWC4096 *)0; + delete renv.log; renv.log = (Logger *)0; // but stop logging last of all + + return reasonForTermination; + } + + inline Node::ReasonForTermination terminateBecause(Node::ReasonForTermination r,const char *rstr) + { + reasonForTerminationStr = rstr; + reasonForTermination = r; + return terminate(); + } +}; + +Node::Node( + const char *hp, + EthernetTapFactory *tf, + SocketManager *sm, + NetworkConfigMaster *nm, + bool resetIdentity, + const char *overrideRootTopology) throw() : + _impl(new _NodeImpl) +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + + if ((hp)&&(hp[0])) + impl->renv.homePath = hp; + else impl->renv.homePath = ZT_DEFAULTS.defaultHomePath; + + impl->renv.tapFactory = tf; + impl->renv.sm = sm; + impl->renv.netconfMaster = nm; + + if (resetIdentity) { + // Forget identity and peer database, peer keys, etc. + Utils::rm((impl->renv.homePath + ZT_PATH_SEPARATOR_S + "identity.public").c_str()); + Utils::rm((impl->renv.homePath + ZT_PATH_SEPARATOR_S + "identity.secret").c_str()); + Utils::rm((impl->renv.homePath + ZT_PATH_SEPARATOR_S + "peers.persist").c_str()); + + // Truncate network config information in networks.d but leave the files since we + // still want to remember any networks we have joined. This will force those networks + // to be reconfigured with our newly regenerated identity after startup. + std::string networksDotD(impl->renv.homePath + ZT_PATH_SEPARATOR_S + "networks.d"); + std::map< std::string,bool > nwfiles(Utils::listDirectory(networksDotD.c_str())); + for(std::map<std::string,bool>::iterator nwf(nwfiles.begin());nwf!=nwfiles.end();++nwf) { + FILE *trun = fopen((networksDotD + ZT_PATH_SEPARATOR_S + nwf->first).c_str(),"w"); + if (trun) + fclose(trun); + } + } + + impl->reasonForTermination = Node::NODE_RUNNING; + impl->started = false; + impl->running = false; + impl->resynchronize = false; + + if (overrideRootTopology) { + impl->disableRootTopologyUpdates = true; + impl->overrideRootTopology = overrideRootTopology; + } else { + impl->disableRootTopologyUpdates = false; + } +} + +Node::~Node() +{ + delete (_NodeImpl *)_impl; +} + +static void _CBztTraffic(const SharedPtr<Socket> &fromSock,void *arg,const InetAddress &from,Buffer<ZT_SOCKET_MAX_MESSAGE_LEN> &data) +{ + ((const RuntimeEnvironment *)arg)->sw->onRemotePacket(fromSock,from,data); +} + +static void _cbHandleGetRootTopology(void *arg,int code,const std::string &url,const std::string &body) +{ + RuntimeEnvironment *RR = (RuntimeEnvironment *)arg; + + if ((code != 200)||(body.length() == 0)) { + TRACE("failed to retrieve %s",url.c_str()); + return; + } + + try { + Dictionary rt(body); + if (!Topology::authenticateRootTopology(rt)) { + LOG("discarded invalid root topology update from %s (signature check failed)",url.c_str()); + return; + } + + { + std::string rootTopologyPath(RR->homePath + ZT_PATH_SEPARATOR_S + "root-topology"); + std::string rootTopology; + if (Utils::readFile(rootTopologyPath.c_str(),rootTopology)) { + Dictionary alreadyHave(rootTopology); + if (alreadyHave == rt) { + TRACE("retrieved root topology from %s but no change (same as on disk)",url.c_str()); + return; + } else if (alreadyHave.signatureTimestamp() > rt.signatureTimestamp()) { + TRACE("retrieved root topology from %s but no change (ours is newer)",url.c_str()); + return; + } + } + Utils::writeFile(rootTopologyPath.c_str(),body); + } + + RR->topology->setSupernodes(Dictionary(rt.get("supernodes"))); + } catch ( ... ) { + LOG("discarded invalid root topology update from %s (format invalid)",url.c_str()); + return; + } +} + +Node::ReasonForTermination Node::run() + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + RuntimeEnvironment *RR = (RuntimeEnvironment *)&(impl->renv); + + impl->started = true; + impl->running = true; + + try { +#ifdef ZT_LOG_STDOUT + RR->log = new Logger((const char *)0,(const char *)0,0); +#else + RR->log = new Logger((RR->homePath + ZT_PATH_SEPARATOR_S + "node.log").c_str(),(const char *)0,131072); +#endif + + LOG("starting version %s",versionString()); + + // Create non-crypto PRNG right away in case other code in init wants to use it + RR->prng = new CMWC4096(); + + // Read identity public and secret, generating if not present + { + bool gotId = false; + std::string identitySecretPath(RR->homePath + ZT_PATH_SEPARATOR_S + "identity.secret"); + std::string identityPublicPath(RR->homePath + ZT_PATH_SEPARATOR_S + "identity.public"); + std::string idser; + if (Utils::readFile(identitySecretPath.c_str(),idser)) + gotId = RR->identity.fromString(idser); + if ((gotId)&&(!RR->identity.locallyValidate())) + gotId = false; + if (gotId) { + // Make sure identity.public matches identity.secret + idser = std::string(); + Utils::readFile(identityPublicPath.c_str(),idser); + std::string pubid(RR->identity.toString(false)); + if (idser != pubid) { + if (!Utils::writeFile(identityPublicPath.c_str(),pubid)) + return impl->terminateBecause(Node::NODE_UNRECOVERABLE_ERROR,"could not write identity.public (home path not writable?)"); + } + } else { + LOG("no identity found or identity invalid, generating one... this might take a few seconds..."); + RR->identity.generate(); + LOG("generated new identity: %s",RR->identity.address().toString().c_str()); + idser = RR->identity.toString(true); + if (!Utils::writeFile(identitySecretPath.c_str(),idser)) + return impl->terminateBecause(Node::NODE_UNRECOVERABLE_ERROR,"could not write identity.secret (home path not writable?)"); + idser = RR->identity.toString(false); + if (!Utils::writeFile(identityPublicPath.c_str(),idser)) + return impl->terminateBecause(Node::NODE_UNRECOVERABLE_ERROR,"could not write identity.public (home path not writable?)"); + } + Utils::lockDownFile(identitySecretPath.c_str(),false); + } + + // Make sure networks.d exists (used by NodeConfig to remember networks) + { + std::string networksDotD(RR->homePath + ZT_PATH_SEPARATOR_S + "networks.d"); +#ifdef __WINDOWS__ + CreateDirectoryA(networksDotD.c_str(),NULL); +#else + mkdir(networksDotD.c_str(),0700); +#endif + } + // Make sure iddb.d exists (used by Topology to remember identities) + { + std::string iddbDotD(RR->homePath + ZT_PATH_SEPARATOR_S + "iddb.d"); +#ifdef __WINDOWS__ + CreateDirectoryA(iddbDotD.c_str(),NULL); +#else + mkdir(iddbDotD.c_str(),0700); +#endif + } + + RR->http = new HttpClient(); + RR->sw = new Switch(RR); + RR->mc = new Multicaster(RR); + RR->antiRec = new AntiRecursion(); + RR->topology = new Topology(RR); + try { + RR->nc = new NodeConfig(RR); + } catch (std::exception &exc) { + return impl->terminateBecause(Node::NODE_UNRECOVERABLE_ERROR,"unable to initialize IPC socket: is ZeroTier One already running?"); + } + RR->node = this; + +#ifdef ZT_AUTO_UPDATE + if (ZT_DEFAULTS.updateLatestNfoURL.length()) { + RR->updater = new SoftwareUpdater(RR); + RR->updater->cleanOldUpdates(); // clean out updates.d on startup + } else { + LOG("WARNING: unable to enable software updates: latest .nfo URL from ZT_DEFAULTS is empty (does this platform actually support software updates?)"); + } +#endif + + // Initialize root topology from defaults or root-toplogy file in home path on disk + if (impl->overrideRootTopology.length() == 0) { + std::string rootTopologyPath(RR->homePath + ZT_PATH_SEPARATOR_S + "root-topology"); + std::string rootTopology; + if (!Utils::readFile(rootTopologyPath.c_str(),rootTopology)) + rootTopology = ZT_DEFAULTS.defaultRootTopology; + try { + Dictionary rt(rootTopology); + + if (Topology::authenticateRootTopology(rt)) { + // Set supernodes if root topology signature is valid + RR->topology->setSupernodes(Dictionary(rt.get("supernodes",""))); // set supernodes from root-topology + + // If root-topology contains noupdate=1, disable further updates and only use what was on disk + impl->disableRootTopologyUpdates = (Utils::strToInt(rt.get("noupdate","0").c_str()) > 0); + } else { + // Revert to built-in defaults if root topology fails signature check + LOG("%s failed signature check, using built-in defaults instead",rootTopologyPath.c_str()); + Utils::rm(rootTopologyPath.c_str()); + RR->topology->setSupernodes(Dictionary(Dictionary(ZT_DEFAULTS.defaultRootTopology).get("supernodes",""))); + impl->disableRootTopologyUpdates = false; + } + } catch ( ... ) { + return impl->terminateBecause(Node::NODE_UNRECOVERABLE_ERROR,"invalid root-topology format"); + } + } else { + try { + Dictionary rt(impl->overrideRootTopology); + RR->topology->setSupernodes(Dictionary(rt.get("supernodes",""))); + impl->disableRootTopologyUpdates = true; + } catch ( ... ) { + return impl->terminateBecause(Node::NODE_UNRECOVERABLE_ERROR,"invalid root-topology format"); + } + } + + // Delete peers.persist if it exists -- legacy file, just takes up space + Utils::rm(std::string(RR->homePath + ZT_PATH_SEPARATOR_S + "peers.persist").c_str()); + } catch (std::bad_alloc &exc) { + return impl->terminateBecause(Node::NODE_UNRECOVERABLE_ERROR,"memory allocation failure"); + } catch (std::runtime_error &exc) { + return impl->terminateBecause(Node::NODE_UNRECOVERABLE_ERROR,exc.what()); + } catch ( ... ) { + return impl->terminateBecause(Node::NODE_UNRECOVERABLE_ERROR,"unknown exception during initialization"); + } + + // Core I/O loop + try { + /* Shut down if this file exists but fails to open. This is used on Mac to + * shut down automatically on .app deletion by symlinking this to the + * Info.plist file inside the ZeroTier One application. This causes the + * service to die when the user throws away the app, allowing uninstallation + * in the natural Mac way. */ + std::string shutdownIfUnreadablePath(RR->homePath + ZT_PATH_SEPARATOR_S + "shutdownIfUnreadable"); + + uint64_t lastNetworkAutoconfCheck = Utils::now() - 5000ULL; // check autoconf again after 5s for startup + uint64_t lastPingCheck = 0; + uint64_t lastClean = Utils::now(); // don't need to do this immediately + uint64_t lastMulticastCheck = 0; + uint64_t lastSupernodePingCheck = 0; + uint64_t lastBeacon = 0; + uint64_t lastRootTopologyFetch = 0; + uint64_t lastShutdownIfUnreadableCheck = 0; + long lastDelayDelta = 0; + + RR->timeOfLastResynchronize = Utils::now(); + + // We are up and running + RR->initialized = true; + + while (impl->reasonForTermination == NODE_RUNNING) { + uint64_t now = Utils::now(); + bool resynchronize = false; + + /* This is how the service automatically shuts down when the OSX .app is + * thrown in the trash. It's not used on any other platform for now but + * could do similar things. It's disabled on Windows since it doesn't really + * work there. */ +#ifdef __UNIX_LIKE__ + if ((now - lastShutdownIfUnreadableCheck) > 10000) { + lastShutdownIfUnreadableCheck = now; + if (Utils::fileExists(shutdownIfUnreadablePath.c_str(),false)) { + int tmpfd = ::open(shutdownIfUnreadablePath.c_str(),O_RDONLY,0); + if (tmpfd < 0) { + return impl->terminateBecause(Node::NODE_NORMAL_TERMINATION,"shutdownIfUnreadable exists but is not readable"); + } else ::close(tmpfd); + } + } +#endif + + // If it looks like the computer slept and woke, resynchronize. + if (lastDelayDelta >= ZT_SLEEP_WAKE_DETECTION_THRESHOLD) { + resynchronize = true; + LOG("probable suspend/resume detected, pausing a moment for things to settle..."); + Thread::sleep(ZT_SLEEP_WAKE_SETTLE_TIME); + } + + // Supernodes do not resynchronize unless explicitly ordered via SIGHUP. + if ((resynchronize)&&(RR->topology->amSupernode())) + resynchronize = false; + + // Check for SIGHUP / force resync. + if (impl->resynchronize) { + impl->resynchronize = false; + resynchronize = true; + LOG("resynchronize forced by user, syncing with network"); + } + + if (resynchronize) { + RR->tcpTunnelingEnabled = false; // turn off TCP tunneling master switch at first, will be reenabled on persistent UDP failure + RR->timeOfLastResynchronize = now; + } + + /* Supernodes are pinged separately and more aggressively. The + * ZT_STARTUP_AGGRO parameter sets a limit on how rapidly they are + * tried, while PingSupernodesThatNeedPing contains the logic for + * determining if they need PING. */ + if ((now - lastSupernodePingCheck) >= ZT_STARTUP_AGGRO) { + lastSupernodePingCheck = now; + + uint64_t lastReceiveFromAnySupernode = 0; // function object result paramter + RR->topology->eachSupernodePeer(Topology::FindMostRecentDirectReceiveTimestamp(lastReceiveFromAnySupernode)); + + // Turn on TCP tunneling master switch if we haven't heard anything since before + // the last resynchronize and we've been trying long enough. + uint64_t tlr = RR->timeOfLastResynchronize; + if ((lastReceiveFromAnySupernode < tlr)&&((now - tlr) >= ZT_TCP_TUNNEL_FAILOVER_TIMEOUT)) { + TRACE("network still unreachable after %u ms, TCP TUNNELING ENABLED",(unsigned int)ZT_TCP_TUNNEL_FAILOVER_TIMEOUT); + RR->tcpTunnelingEnabled = true; + } + + RR->topology->eachSupernodePeer(Topology::PingSupernodesThatNeedPing(RR,now)); + } + + if (resynchronize) { + RR->sm->closeTcpSockets(); + } else { + /* Periodically check for changes in our local multicast subscriptions + * and broadcast those changes to directly connected peers. */ + if ((now - lastMulticastCheck) >= ZT_MULTICAST_LOCAL_POLL_PERIOD) { + lastMulticastCheck = now; + try { + std::vector< SharedPtr<Network> > networks(RR->nc->networks()); + for(std::vector< SharedPtr<Network> >::const_iterator nw(networks.begin());nw!=networks.end();++nw) + (*nw)->rescanMulticastGroups(); + } catch (std::exception &exc) { + LOG("unexpected exception announcing multicast groups: %s",exc.what()); + } catch ( ... ) { + LOG("unexpected exception announcing multicast groups: (unknown)"); + } + } + + /* Periodically ping all our non-stale direct peers unless we're a supernode. + * Supernodes only ping each other (which is done above). */ + if ((!RR->topology->amSupernode())&&((now - lastPingCheck) >= ZT_PING_CHECK_DELAY)) { + lastPingCheck = now; + try { + RR->topology->eachPeer(Topology::PingPeersThatNeedPing(RR,now)); + } catch (std::exception &exc) { + LOG("unexpected exception running ping check cycle: %s",exc.what()); + } catch ( ... ) { + LOG("unexpected exception running ping check cycle: (unkonwn)"); + } + } + } + + // Update network configurations when needed. + try { + if ((resynchronize)||((now - lastNetworkAutoconfCheck) >= ZT_NETWORK_AUTOCONF_CHECK_DELAY)) { + lastNetworkAutoconfCheck = now; + std::vector< SharedPtr<Network> > nets(RR->nc->networks()); + for(std::vector< SharedPtr<Network> >::iterator n(nets.begin());n!=nets.end();++n) { + if ((now - (*n)->lastConfigUpdate()) >= ZT_NETWORK_AUTOCONF_DELAY) + (*n)->requestConfiguration(); + } + } + } catch ( ... ) { + LOG("unexpected exception updating network configurations (non-fatal, will retry)"); + } + + // Do periodic tasks in submodules. + if ((now - lastClean) >= ZT_DB_CLEAN_PERIOD) { + lastClean = now; + try { + RR->topology->clean(now); + } catch ( ... ) { + LOG("unexpected exception in Topology::clean() (non-fatal)"); + } + try { + RR->mc->clean(now); + } catch ( ... ) { + LOG("unexpected exception in Multicaster::clean() (non-fatal)"); + } + try { + RR->nc->clean(); + } catch ( ... ) { + LOG("unexpected exception in NodeConfig::clean() (non-fatal)"); + } + try { + if (RR->updater) + RR->updater->checkIfMaxIntervalExceeded(now); + } catch ( ... ) { + LOG("unexpected exception in SoftwareUpdater::checkIfMaxIntervalExceeded() (non-fatal)"); + } + } + + // Send beacons to physical local LANs + try { + if ((resynchronize)||((now - lastBeacon) >= ZT_BEACON_INTERVAL)) { + lastBeacon = now; + char bcn[ZT_PROTO_BEACON_LENGTH]; + void *bcnptr = bcn; + *((uint32_t *)(bcnptr)) = RR->prng->next32(); + bcnptr = bcn + 4; + *((uint32_t *)(bcnptr)) = RR->prng->next32(); + RR->identity.address().copyTo(bcn + ZT_PROTO_BEACON_IDX_ADDRESS,ZT_ADDRESS_LENGTH); + TRACE("sending LAN beacon to %s",ZT_DEFAULTS.v4Broadcast.toString().c_str()); + RR->antiRec->logOutgoingZT(bcn,ZT_PROTO_BEACON_LENGTH); + RR->sm->send(ZT_DEFAULTS.v4Broadcast,false,false,bcn,ZT_PROTO_BEACON_LENGTH); + } + } catch ( ... ) { + LOG("unexpected exception sending LAN beacon (non-fatal)"); + } + + // Check for updates to root topology (supernodes) periodically + try { + if ((now - lastRootTopologyFetch) >= ZT_UPDATE_ROOT_TOPOLOGY_CHECK_INTERVAL) { + lastRootTopologyFetch = now; + if (!impl->disableRootTopologyUpdates) { + TRACE("fetching root topology from %s",ZT_DEFAULTS.rootTopologyUpdateURL.c_str()); + RR->http->GET(ZT_DEFAULTS.rootTopologyUpdateURL,HttpClient::NO_HEADERS,60,&_cbHandleGetRootTopology,RR); + } + } + } catch ( ... ) { + LOG("unexpected exception attempting to check for root topology updates (non-fatal)"); + } + + // Sleep for loop interval or until something interesting happens. + try { + unsigned long delay = std::min((unsigned long)ZT_MAX_SERVICE_LOOP_INTERVAL,RR->sw->doTimerTasks()); + uint64_t start = Utils::now(); + RR->sm->poll(delay,&_CBztTraffic,RR); + lastDelayDelta = (long)(Utils::now() - start) - (long)delay; // used to detect sleep/wake + } catch (std::exception &exc) { + LOG("unexpected exception running Switch doTimerTasks: %s",exc.what()); + } catch ( ... ) { + LOG("unexpected exception running Switch doTimerTasks: (unknown)"); + } + } + } catch ( ... ) { + LOG("FATAL: unexpected exception in core loop: unknown exception"); + return impl->terminateBecause(Node::NODE_UNRECOVERABLE_ERROR,"unexpected exception during outer main I/O loop"); + } + + return impl->terminate(); +} + +const char *Node::terminationMessage() const + throw() +{ + if ((!((_NodeImpl *)_impl)->started)||(((_NodeImpl *)_impl)->running)) + return (const char *)0; + return ((_NodeImpl *)_impl)->reasonForTerminationStr.c_str(); +} + +void Node::terminate(ReasonForTermination reason,const char *reasonText) + throw() +{ + ((_NodeImpl *)_impl)->reasonForTermination = reason; + ((_NodeImpl *)_impl)->reasonForTerminationStr = ((reasonText) ? reasonText : ""); + ((_NodeImpl *)_impl)->renv.sm->whack(); +} + +void Node::resync() + throw() +{ + ((_NodeImpl *)_impl)->resynchronize = true; + ((_NodeImpl *)_impl)->renv.sm->whack(); +} + +bool Node::online() + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + RuntimeEnvironment *RR = (RuntimeEnvironment *)&(impl->renv); + if ((!RR)||(!RR->initialized)) + return false; + uint64_t now = Utils::now(); + uint64_t since = RR->timeOfLastResynchronize; + std::vector< SharedPtr<Peer> > snp(RR->topology->supernodePeers()); + for(std::vector< SharedPtr<Peer> >::const_iterator sn(snp.begin());sn!=snp.end();++sn) { + uint64_t lastRec = (*sn)->lastDirectReceive(); + if ((lastRec)&&(lastRec > since)&&((now - lastRec) < ZT_PEER_PATH_ACTIVITY_TIMEOUT)) + return true; + } + return false; +} + +bool Node::started() + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + return impl->started; +} + +bool Node::running() + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + return impl->running; +} + +bool Node::initialized() + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + RuntimeEnvironment *RR = (RuntimeEnvironment *)&(impl->renv); + return ((RR)&&(RR->initialized)); +} + +uint64_t Node::address() + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + RuntimeEnvironment *RR = (RuntimeEnvironment *)&(impl->renv); + if ((!RR)||(!RR->initialized)) + return 0; + return RR->identity.address().toInt(); +} + +void Node::join(uint64_t nwid) + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + RuntimeEnvironment *RR = (RuntimeEnvironment *)&(impl->renv); + if ((RR)&&(RR->initialized)) + RR->nc->join(nwid); +} + +void Node::leave(uint64_t nwid) + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + RuntimeEnvironment *RR = (RuntimeEnvironment *)&(impl->renv); + if ((RR)&&(RR->initialized)) + RR->nc->leave(nwid); +} + +struct GatherPeerStatistics +{ + uint64_t now; + ZT1_Node_Status *status; + inline void operator()(Topology &t,const SharedPtr<Peer> &p) + { + ++status->knownPeers; + if (p->hasActiveDirectPath(now)) + ++status->directlyConnectedPeers; + if (p->alive(now)) + ++status->alivePeers; + } +}; +void Node::status(ZT1_Node_Status *status) + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + RuntimeEnvironment *RR = (RuntimeEnvironment *)&(impl->renv); + + memset(status,0,sizeof(ZT1_Node_Status)); + + if ((!RR)||(!RR->initialized)) + return; + + Utils::scopy(status->publicIdentity,sizeof(status->publicIdentity),RR->identity.toString(false).c_str()); + RR->identity.address().toString(status->address,sizeof(status->address)); + status->rawAddress = RR->identity.address().toInt(); + + status->knownPeers = 0; + status->supernodes = RR->topology->numSupernodes(); + status->directlyConnectedPeers = 0; + status->alivePeers = 0; + GatherPeerStatistics gps; + gps.now = Utils::now(); + gps.status = status; + RR->topology->eachPeer<GatherPeerStatistics &>(gps); + + if (status->alivePeers > 0) { + double dlsr = (double)status->directlyConnectedPeers / (double)status->alivePeers; + if (dlsr > 1.0) dlsr = 1.0; + if (dlsr < 0.0) dlsr = 0.0; + status->directLinkSuccessRate = (float)dlsr; + } else status->directLinkSuccessRate = 1.0f; // no connections to no active peers == 100% success at nothing + + status->online = online(); + status->running = impl->running; + status->initialized = true; +} + +struct CollectPeersAndPaths +{ + std::vector< std::pair< SharedPtr<Peer>,std::vector<Path> > > data; + inline void operator()(Topology &t,const SharedPtr<Peer> &p) { this->data.push_back(std::pair< SharedPtr<Peer>,std::vector<Path> >(p,p->paths())); } +}; +struct SortPeersAndPathsInAscendingAddressOrder +{ + inline bool operator()(const std::pair< SharedPtr<Peer>,std::vector<Path> > &a,const std::pair< SharedPtr<Peer>,std::vector<Path> > &b) const { return (a.first->address() < b.first->address()); } +}; +ZT1_Node_PeerList *Node::listPeers() + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + RuntimeEnvironment *RR = (RuntimeEnvironment *)&(impl->renv); + + if ((!RR)||(!RR->initialized)) + return (ZT1_Node_PeerList *)0; + + CollectPeersAndPaths pp; + RR->topology->eachPeer<CollectPeersAndPaths &>(pp); + std::sort(pp.data.begin(),pp.data.end(),SortPeersAndPathsInAscendingAddressOrder()); + + unsigned int returnBufSize = sizeof(ZT1_Node_PeerList); + for(std::vector< std::pair< SharedPtr<Peer>,std::vector<Path> > >::iterator p(pp.data.begin());p!=pp.data.end();++p) + returnBufSize += sizeof(ZT1_Node_Peer) + (sizeof(ZT1_Node_PhysicalPath) * (unsigned int)p->second.size()); + + char *buf = (char *)::malloc(returnBufSize); + if (!buf) + return (ZT1_Node_PeerList *)0; + memset(buf,0,returnBufSize); + + ZT1_Node_PeerList *pl = (ZT1_Node_PeerList *)buf; + buf += sizeof(ZT1_Node_PeerList); + + pl->peers = (ZT1_Node_Peer *)buf; + buf += (sizeof(ZT1_Node_Peer) * pp.data.size()); + pl->numPeers = 0; + + uint64_t now = Utils::now(); + for(std::vector< std::pair< SharedPtr<Peer>,std::vector<Path> > >::iterator p(pp.data.begin());p!=pp.data.end();++p) { + ZT1_Node_Peer *prec = &(pl->peers[pl->numPeers++]); + if (p->first->remoteVersionKnown()) + Utils::snprintf(prec->remoteVersion,sizeof(prec->remoteVersion),"%u.%u.%u",p->first->remoteVersionMajor(),p->first->remoteVersionMinor(),p->first->remoteVersionRevision()); + p->first->address().toString(prec->address,sizeof(prec->address)); + prec->rawAddress = p->first->address().toInt(); + prec->latency = p->first->latency(); + prec->role = RR->topology->isSupernode(p->first->address()) ? ZT1_Node_Peer_SUPERNODE : ZT1_Node_Peer_NODE; + + prec->paths = (ZT1_Node_PhysicalPath *)buf; + buf += sizeof(ZT1_Node_PhysicalPath) * p->second.size(); + + prec->numPaths = 0; + for(std::vector<Path>::iterator pi(p->second.begin());pi!=p->second.end();++pi) { + ZT1_Node_PhysicalPath *path = &(prec->paths[prec->numPaths++]); + path->type = (ZT1_Node_PhysicalPathType)pi->type(); + if (pi->address().isV6()) { + path->address.type = ZT1_Node_PhysicalAddress_TYPE_IPV6; + memcpy(path->address.bits,pi->address().rawIpData(),16); + // TODO: zoneIndex not supported yet, but should be once echo-location works w/V6 + } else { + path->address.type = ZT1_Node_PhysicalAddress_TYPE_IPV4; + memcpy(path->address.bits,pi->address().rawIpData(),4); + } + path->address.port = pi->address().port(); + Utils::scopy(path->address.ascii,sizeof(path->address.ascii),pi->address().toIpString().c_str()); + path->lastSend = (pi->lastSend() > 0) ? ((long)(now - pi->lastSend())) : (long)-1; + path->lastReceive = (pi->lastReceived() > 0) ? ((long)(now - pi->lastReceived())) : (long)-1; + path->lastPing = (pi->lastPing() > 0) ? ((long)(now - pi->lastPing())) : (long)-1; + path->active = pi->active(now); + path->fixed = pi->fixed(); + } + } + + return pl; +} + +// Fills out everything but ips[] and numIps, which must be done more manually +static void _fillNetworkQueryResultBuffer(const SharedPtr<Network> &network,const SharedPtr<NetworkConfig> &nconf,ZT1_Node_Network *nbuf) +{ + nbuf->nwid = network->id(); + Utils::snprintf(nbuf->nwidHex,sizeof(nbuf->nwidHex),"%.16llx",(unsigned long long)network->id()); + if (nconf) { + Utils::scopy(nbuf->name,sizeof(nbuf->name),nconf->name().c_str()); + Utils::scopy(nbuf->description,sizeof(nbuf->description),nconf->description().c_str()); + } + Utils::scopy(nbuf->device,sizeof(nbuf->device),network->tapDeviceName().c_str()); + Utils::scopy(nbuf->statusStr,sizeof(nbuf->statusStr),Network::statusString(network->status())); + network->mac().toString(nbuf->macStr,sizeof(nbuf->macStr)); + network->mac().copyTo(nbuf->mac,sizeof(nbuf->mac)); + uint64_t lcu = network->lastConfigUpdate(); + if (lcu > 0) + nbuf->configAge = (long)(Utils::now() - lcu); + else nbuf->configAge = -1; + nbuf->status = (ZT1_Node_NetworkStatus)network->status(); + nbuf->enabled = network->enabled(); + nbuf->isPrivate = (nconf) ? nconf->isPrivate() : true; +} + +ZT1_Node_Network *Node::getNetworkStatus(uint64_t nwid) + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + RuntimeEnvironment *RR = (RuntimeEnvironment *)&(impl->renv); + + if ((!RR)||(!RR->initialized)) + return (ZT1_Node_Network *)0; + + SharedPtr<Network> network(RR->nc->network(nwid)); + if (!network) + return (ZT1_Node_Network *)0; + SharedPtr<NetworkConfig> nconf(network->config2()); + std::set<InetAddress> ips(network->ips()); + + char *buf = (char *)::malloc(sizeof(ZT1_Node_Network) + (sizeof(ZT1_Node_PhysicalAddress) * ips.size())); + if (!buf) + return (ZT1_Node_Network *)0; + memset(buf,0,sizeof(ZT1_Node_Network) + (sizeof(ZT1_Node_PhysicalAddress) * ips.size())); + + ZT1_Node_Network *nbuf = (ZT1_Node_Network *)buf; + buf += sizeof(ZT1_Node_Network); + + _fillNetworkQueryResultBuffer(network,nconf,nbuf); + + nbuf->ips = (ZT1_Node_PhysicalAddress *)buf; + nbuf->numIps = 0; + for(std::set<InetAddress>::iterator ip(ips.begin());ip!=ips.end();++ip) { + ZT1_Node_PhysicalAddress *ipb = &(nbuf->ips[nbuf->numIps++]); + if (ip->isV6()) { + ipb->type = ZT1_Node_PhysicalAddress_TYPE_IPV6; + memcpy(ipb->bits,ip->rawIpData(),16); + } else { + ipb->type = ZT1_Node_PhysicalAddress_TYPE_IPV4; + memcpy(ipb->bits,ip->rawIpData(),4); + } + ipb->port = ip->port(); + Utils::scopy(ipb->ascii,sizeof(ipb->ascii),ip->toIpString().c_str()); + } + + return nbuf; +} + +ZT1_Node_NetworkList *Node::listNetworks() + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + RuntimeEnvironment *RR = (RuntimeEnvironment *)&(impl->renv); + + if ((!RR)||(!RR->initialized)) + return (ZT1_Node_NetworkList *)0; + + std::vector< SharedPtr<Network> > networks(RR->nc->networks()); + std::vector< SharedPtr<NetworkConfig> > nconfs(networks.size()); + std::vector< std::set<InetAddress> > ipsv(networks.size()); + + unsigned long returnBufSize = sizeof(ZT1_Node_NetworkList); + for(unsigned long i=0;i<networks.size();++i) { + nconfs[i] = networks[i]->config2(); // note: can return NULL + ipsv[i] = networks[i]->ips(); + returnBufSize += sizeof(ZT1_Node_Network) + (sizeof(ZT1_Node_PhysicalAddress) * (unsigned int)ipsv[i].size()); + } + + char *buf = (char *)::malloc(returnBufSize); + if (!buf) + return (ZT1_Node_NetworkList *)0; + memset(buf,0,returnBufSize); + + ZT1_Node_NetworkList *nl = (ZT1_Node_NetworkList *)buf; + buf += sizeof(ZT1_Node_NetworkList); + + nl->networks = (ZT1_Node_Network *)buf; + buf += sizeof(ZT1_Node_Network) * networks.size(); + + for(unsigned long i=0;i<networks.size();++i) { + ZT1_Node_Network *nbuf = &(nl->networks[nl->numNetworks++]); + + _fillNetworkQueryResultBuffer(networks[i],nconfs[i],nbuf); + + nbuf->ips = (ZT1_Node_PhysicalAddress *)buf; + buf += sizeof(ZT1_Node_PhysicalAddress) * ipsv[i].size(); + + nbuf->numIps = 0; + for(std::set<InetAddress>::iterator ip(ipsv[i].begin());ip!=ipsv[i].end();++ip) { + ZT1_Node_PhysicalAddress *ipb = &(nbuf->ips[nbuf->numIps++]); + if (ip->isV6()) { + ipb->type = ZT1_Node_PhysicalAddress_TYPE_IPV6; + memcpy(ipb->bits,ip->rawIpData(),16); + } else { + ipb->type = ZT1_Node_PhysicalAddress_TYPE_IPV4; + memcpy(ipb->bits,ip->rawIpData(),4); + } + ipb->port = ip->port(); + Utils::scopy(ipb->ascii,sizeof(ipb->ascii),ip->toIpString().c_str()); + } + } + + return nl; +} + +void Node::freeQueryResult(void *qr) + throw() +{ + if (qr) + ::free(qr); +} + +bool Node::updateCheck() + throw() +{ + _NodeImpl *impl = (_NodeImpl *)_impl; + RuntimeEnvironment *RR = (RuntimeEnvironment *)&(impl->renv); + if (RR->updater) { + RR->updater->checkNow(); + return true; + } + return false; +} + +class _VersionStringMaker +{ +public: + char vs[32]; + _VersionStringMaker() + { + Utils::snprintf(vs,sizeof(vs),"%d.%d.%d",(int)ZEROTIER_ONE_VERSION_MAJOR,(int)ZEROTIER_ONE_VERSION_MINOR,(int)ZEROTIER_ONE_VERSION_REVISION); + } + ~_VersionStringMaker() {} +}; +static const _VersionStringMaker __versionString; + +const char *Node::versionString() throw() { return __versionString.vs; } + +unsigned int Node::versionMajor() throw() { return ZEROTIER_ONE_VERSION_MAJOR; } +unsigned int Node::versionMinor() throw() { return ZEROTIER_ONE_VERSION_MINOR; } +unsigned int Node::versionRevision() throw() { return ZEROTIER_ONE_VERSION_REVISION; } + +} // namespace ZeroTier diff --git a/attic/Node.hpp b/attic/Node.hpp new file mode 100644 index 00000000..c75b884f --- /dev/null +++ b/attic/Node.hpp @@ -0,0 +1,245 @@ +/* + * ZeroTier One - Network Virtualization Everywhere + * Copyright (C) 2011-2015 ZeroTier, Inc. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + * + * -- + * + * ZeroTier may be used and distributed under the terms of the GPLv3, which + * are available at: http://www.gnu.org/licenses/gpl-3.0.html + * + * If you would like to embed ZeroTier into a commercial application or + * redistribute it in a modified binary form, please contact ZeroTier Networks + * LLC. Start here: http://www.zerotier.com/ + */ + +#ifndef ZT_NODE_HPP +#define ZT_NODE_HPP + +#include <stdint.h> + +#include "../include/ZeroTierOne.h" + +namespace ZeroTier { + +class EthernetTapFactory; +class RoutingTable; +class SocketManager; +class NetworkConfigMaster; + +/** + * A ZeroTier One node + */ +class Node +{ +public: + /** + * Returned by node main if/when it terminates + */ + enum ReasonForTermination + { + /** + * Node is currently in run() + */ + NODE_RUNNING = 0, + + /** + * Node is shutting down for normal reasons, including a signal + */ + NODE_NORMAL_TERMINATION = 1, + + /** + * An upgrade is available. Its path is in reasonForTermination(). + */ + NODE_RESTART_FOR_UPGRADE = 2, + + /** + * A serious unrecoverable error has occurred. + */ + NODE_UNRECOVERABLE_ERROR = 3, + + /** + * An address collision occurred (typically this should cause re-invocation with resetIdentity set to true) + */ + NODE_ADDRESS_COLLISION = 4 + }; + + /** + * Create a new node + * + * The node is not executed until run() is called. The supplied tap factory + * and routing table must not be freed until the node is no longer + * executing. Node does not delete these objects; the caller still owns + * them. + * + * @param hp Home directory path or NULL for system-wide default for this platform + * @param tf Ethernet tap factory for platform network stack + * @param sm Socket manager for physical network I/O + * @param nm Network configuration master or NULL for none + * @param resetIdentity If true, delete identity before starting and regenerate + * @param overrideRootTopology Override root topology with this dictionary (in string serialized format) and do not update (default: NULL for none) + */ + Node( + const char *hp, + EthernetTapFactory *tf, + SocketManager *sm, + NetworkConfigMaster *nm, + bool resetIdentity, + const char *overrideRootTopology = (const char *)0) throw(); + + ~Node(); + + /** + * Execute node in current thread, return on shutdown + * + * @return Reason for termination + */ + ReasonForTermination run() + throw(); + + /** + * Obtain a human-readable reason for node termination + * + * @return Reason for node termination or NULL if run() has not returned + */ + const char *terminationMessage() const + throw(); + + /** + * Terminate this node, causing run() to return + * + * @param reason Reason for termination + * @param reasonText Text to be returned by terminationMessage() + */ + void terminate(ReasonForTermination reason,const char *reasonText) + throw(); + + /** + * Forget p2p links now and resynchronize with peers + * + * This can be used if the containing application knows its network environment has + * changed. ZeroTier itself tries to detect such changes, but is not always successful. + */ + void resync() + throw(); + + /** + * @return True if we appear to be online in some viable capacity + */ + bool online() + throw(); + + /** + * @return True if run() has been called + */ + bool started() + throw(); + + /** + * @return True if run() has not yet returned + */ + bool running() + throw(); + + /** + * @return True if initialization phase of startup is complete + */ + bool initialized() + throw(); + + /** + * @return This node's address (in least significant 40 bits of 64-bit int) or 0 if not yet initialized + */ + uint64_t address() + throw(); + + /** + * Join a network + * + * Use getNetworkStatus() to check the network's status after joining. If you + * are already a member of the network, this does nothing. + * + * @param nwid 64-bit network ID + */ + void join(uint64_t nwid) + throw(); + + /** + * Leave a network (if a member) + * + * @param nwid 64-bit network ID + */ + void leave(uint64_t nwid) + throw(); + + /** + * Get the status of this node + * + * @param status Buffer to fill with status information + */ + void status(ZT1_Node_Status *status) + throw(); + + /** + * @return List of known peers or NULL on failure + */ + ZT1_Node_PeerList *listPeers() + throw(); + + /** + * @param nwid 64-bit network ID + * @return Network status or NULL if we are not a member of this network + */ + ZT1_Node_Network *getNetworkStatus(uint64_t nwid) + throw(); + + /** + * @return List of networks we've joined or NULL on failure + */ + ZT1_Node_NetworkList *listNetworks() + throw(); + + /** + * Free a query result buffer + * + * Use this to free the return values of listNetworks(), listPeers(), etc. + * + * @param qr Query result buffer + */ + void freeQueryResult(void *qr) + throw(); + + /** + * Check for software updates (if enabled) (updates will eventually get factored out of node/) + */ + bool updateCheck() + throw(); + + static const char *versionString() throw(); + static unsigned int versionMajor() throw(); + static unsigned int versionMinor() throw(); + static unsigned int versionRevision() throw(); + +private: + // Nodes are not copyable + Node(const Node&); + const Node& operator=(const Node&); + + void *const _impl; // private implementation +}; + +} // namespace ZeroTier + +#endif diff --git a/attic/oldcontrol/IpcConnection.cpp b/attic/oldcontrol/IpcConnection.cpp new file mode 100644 index 00000000..370b4680 --- /dev/null +++ b/attic/oldcontrol/IpcConnection.cpp @@ -0,0 +1,281 @@ +/* + * ZeroTier One - Network Virtualization Everywhere + * Copyright (C) 2011-2015 ZeroTier, Inc. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + * + * -- + * + * ZeroTier may be used and distributed under the terms of the GPLv3, which + * are available at: http://www.gnu.org/licenses/gpl-3.0.html + * + * If you would like to embed ZeroTier into a commercial application or + * redistribute it in a modified binary form, please contact ZeroTier Networks + * LLC. Start here: http://www.zerotier.com/ + */ + +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <errno.h> +#include <stdarg.h> + +#include <stdexcept> + +#include "IpcConnection.hpp" + +#ifndef __WINDOWS__ +#include <unistd.h> +#include <sys/ioctl.h> +#include <sys/socket.h> +#include <sys/un.h> +#include <sys/socket.h> +#include <sys/select.h> +#endif + +namespace ZeroTier { + +IpcConnection::IpcConnection(const char *endpoint,unsigned int timeout,void (*commandHandler)(void *,IpcConnection *,IpcConnection::EventType,const char *),void *arg) : + _handler(commandHandler), + _arg(arg), + _timeout(timeout), +#ifdef __WINDOWS__ + _sock(INVALID_HANDLE_VALUE), + _incoming(false), +#else + _sock(-1), +#endif + _run(true), + _running(true) +{ +#ifdef __WINDOWS__ + _sock = CreateFileA(endpoint,GENERIC_READ|GENERIC_WRITE,FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,NULL,OPEN_EXISTING,0,NULL); + if (_sock == INVALID_HANDLE_VALUE) + throw std::runtime_error("IPC endpoint unreachable"); + DWORD pipeMode = PIPE_READMODE_BYTE; + SetNamedPipeHandleState(_sock,&pipeMode,NULL,NULL); +#else + struct sockaddr_un unaddr; + unaddr.sun_family = AF_UNIX; + strncpy(unaddr.sun_path,endpoint,sizeof(unaddr.sun_path)); + unaddr.sun_path[sizeof(unaddr.sun_path) - 1] = (char)0; + + _sock = socket(AF_UNIX,SOCK_STREAM,0); + if (_sock <= 0) + throw std::runtime_error("unable to create socket of type AF_UNIX"); + + if (connect(_sock,(struct sockaddr *)&unaddr,sizeof(unaddr))) { + ::close(_sock); + throw std::runtime_error("IPC endpoint unreachable"); + } +#endif + + _thread = Thread::start(this); +} + +#ifdef __WINDOWS__ +IpcConnection::IpcConnection(HANDLE s,unsigned int timeout,void (*commandHandler)(void *,IpcConnection *,IpcConnection::EventType,const char *),void *arg) : +#else +IpcConnection::IpcConnection(int s,unsigned int timeout,void (*commandHandler)(void *,IpcConnection *,IpcConnection::EventType,const char *),void *arg) : +#endif + _handler(commandHandler), + _arg(arg), + _timeout(timeout), + _sock(s), +#ifdef __WINDOWS__ + _incoming(true), +#endif + _run(true), + _running(true) +{ + _thread = Thread::start(this); +} + +IpcConnection::~IpcConnection() +{ + _writeLock.lock(); + _run = false; + _writeLock.unlock(); + +#ifdef __WINDOWS__ + + while (_running) { + Thread::cancelIO(_thread); // cause Windows to break from blocking read and detect shutdown + Sleep(100); + } + +#else // !__WINDOWS__ + + int s = _sock; + _sock = 0; + if (s > 0) { + ::shutdown(s,SHUT_RDWR); + ::close(s); + } + Thread::join(_thread); + +#endif // __WINDOWS__ / !__WINDOWS__ +} + +void IpcConnection::printf(const char *format,...) +{ + va_list ap; + int n; + char tmp[65536]; + + va_start(ap,format); + n = (int)::vsnprintf(tmp,sizeof(tmp),format,ap); + va_end(ap); + if (n <= 0) + return; + + Mutex::Lock _l(_writeLock); + +#ifdef __WINDOWS__ + _writeBuf.append(tmp,n); + Thread::cancelIO(_thread); // cause Windows to break from blocking read and service write buffer +#else + if (_sock > 0) + ::write(_sock,tmp,n); +#endif +} + +void IpcConnection::threadMain() + throw() +{ + char tmp[16384]; + char linebuf[16384]; + unsigned int lineptr = 0; + char c; + +#ifdef __WINDOWS__ + + DWORD n,i; + std::string wbuf; + +#else // !__WINDOWS__ + + int s,n,i; + fd_set readfds,writefds,errorfds; + struct timeval tout; + +#ifdef SO_NOSIGPIPE + if (_sock > 0) { + i = 1; + ::setsockopt(_sock,SOL_SOCKET,SO_NOSIGPIPE,(char *)&i,sizeof(i)); + } +#endif // SO_NOSIGPIPE + +#endif // __WINDOWS__ / !__WINDOWS__ + + while (_run) { + +#ifdef __WINDOWS__ + + /* Note that we do not use fucking timeouts in Windows, since it does seem + * to properly detect named pipe endpoint close. But we do use a write buffer + * because Windows won't let you divorce reading and writing threads without + * all that OVERLAPPED cruft. */ + { + Mutex::Lock _l(_writeLock); + if (!_run) + break; + if (_writeBuf.length() > 0) { + wbuf.append(_writeBuf); + _writeBuf.clear(); + } + } + if (wbuf.length() > 0) { + n = 0; + if ((WriteFile(_sock,wbuf.data(),(DWORD)(wbuf.length()),&n,NULL))&&(n > 0)) { + if (n < (DWORD)wbuf.length()) + wbuf.erase(0,n); + else wbuf.clear(); + } else if (GetLastError() != ERROR_OPERATION_ABORTED) + break; + FlushFileBuffers(_sock); + } + if (!_run) + break; + n = 0; + if ((!ReadFile(_sock,tmp,sizeof(tmp),&n,NULL))||(n <= 0)) { + if (GetLastError() == ERROR_OPERATION_ABORTED) + n = 0; + else break; + } + if (!_run) + break; + +#else // !__WINDOWS__ + + /* So today I learned that there is no reliable way to detect a half-closed + * Unix domain socket. So to make sure we don't leave orphaned sockets around + * we just use fucking timeouts. If a socket fucking times out, we break from + * the I/O loop and terminate the thread. But this IpcConnection code is ugly + * so maybe the OS is simply offended by it and refuses to reveal its mysteries + * to me. Oh well... this IPC code will probably get canned when we go to + * local HTTP RESTful interfaces or soemthing like that. */ + if ((s = _sock) <= 0) + break; + FD_ZERO(&readfds); + FD_ZERO(&writefds); + FD_ZERO(&errorfds); + FD_SET(s,&readfds); + FD_SET(s,&errorfds); + tout.tv_sec = _timeout; // use a fucking timeout + tout.tv_usec = 0; + if (select(s+1,&readfds,&writefds,&errorfds,&tout) <= 0) { + break; // socket has fucking timed out + } else { + if (FD_ISSET(s,&errorfds)) + break; // socket has an exception... sometimes works + else { + n = (int)::read(s,tmp,sizeof(tmp)); + if ((n <= 0)||(_sock <= 0)) + break; // read returned error... sometimes works + } + } + +#endif // __WINDOWS__ / !__WINDOWS__ + + for(i=0;i<n;++i) { + c = (linebuf[lineptr] = tmp[i]); + if ((c == '\r')||(c == '\n')||(c == (char)0)||(lineptr == (sizeof(linebuf) - 1))) { + if (lineptr) { + linebuf[lineptr] = (char)0; + _handler(_arg,this,IPC_EVENT_COMMAND,linebuf); + lineptr = 0; + } + } else ++lineptr; + } + } + + _writeLock.lock(); + bool r = _run; + _writeLock.unlock(); + +#ifdef __WINDOWS__ + + if (_incoming) + DisconnectNamedPipe(_sock); + CloseHandle(_sock); + _running = false; + +#endif // __WINDOWS__ + + if (r) + _handler(_arg,this,IPC_EVENT_CONNECTION_CLOSED,(const char *)0); +} + +} // namespace ZeroTier diff --git a/attic/oldcontrol/IpcConnection.hpp b/attic/oldcontrol/IpcConnection.hpp new file mode 100644 index 00000000..2466f1a5 --- /dev/null +++ b/attic/oldcontrol/IpcConnection.hpp @@ -0,0 +1,107 @@ +/* + * ZeroTier One - Network Virtualization Everywhere + * Copyright (C) 2011-2015 ZeroTier, Inc. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + * + * -- + * + * ZeroTier may be used and distributed under the terms of the GPLv3, which + * are available at: http://www.gnu.org/licenses/gpl-3.0.html + * + * If you would like to embed ZeroTier into a commercial application or + * redistribute it in a modified binary form, please contact ZeroTier Networks + * LLC. Start here: http://www.zerotier.com/ + */ + +#ifndef ZT_IPCCONNECTION_HPP +#define ZT_IPCCONNECTION_HPP + +#include "../node/Constants.hpp" +#include "../node/Thread.hpp" +#include "../node/NonCopyable.hpp" +#include "../node/Mutex.hpp" + +#ifdef __WINDOWS__ +#include <WinSock2.h> +#include <Windows.h> +#endif + +namespace ZeroTier { + +class IpcListener; + +/** + * Interprocess communication connection + */ +class IpcConnection : NonCopyable +{ + friend class IpcListener; + +public: + enum EventType + { + IPC_EVENT_COMMAND, + IPC_EVENT_NEW_CONNECTION, + IPC_EVENT_CONNECTION_CLOSED + }; + + /** + * Connect to an IPC endpoint + * + * @param endpoint Endpoint path + * @param timeout Inactivity timeout in seconds + * @param commandHandler Command handler function + * @param arg First argument to command handler + * @throws std::runtime_error Unable to connect + */ + IpcConnection(const char *endpoint,unsigned int timeout,void (*commandHandler)(void *,IpcConnection *,IpcConnection::EventType,const char *),void *arg); + ~IpcConnection(); + + /** + * @param format Printf format string + * @param ... Printf arguments + */ + void printf(const char *format,...); + + void threadMain() + throw(); + +private: + // Used by IpcListener to construct incoming connections +#ifdef __WINDOWS__ + IpcConnection(HANDLE s,unsigned int timeout,void (*commandHandler)(void *,IpcConnection *,IpcConnection::EventType,const char *),void *arg); +#else + IpcConnection(int s,unsigned int timeout,void (*commandHandler)(void *,IpcConnection *,IpcConnection::EventType,const char *),void *arg); +#endif + + void (*_handler)(void *,IpcConnection *,IpcConnection::EventType,const char *); + void *_arg; + unsigned int _timeout; +#ifdef __WINDOWS__ + HANDLE _sock; + std::string _writeBuf; + bool _incoming; +#else + volatile int _sock; +#endif + Mutex _writeLock; + Thread _thread; + volatile bool _run; + volatile bool _running; +}; + +} // namespace ZeroTier + +#endif diff --git a/attic/oldcontrol/IpcListener.cpp b/attic/oldcontrol/IpcListener.cpp new file mode 100644 index 00000000..6f8f839a --- /dev/null +++ b/attic/oldcontrol/IpcListener.cpp @@ -0,0 +1,165 @@ +/* + * ZeroTier One - Network Virtualization Everywhere + * Copyright (C) 2011-2014 ZeroTier Networks LLC + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + * + * -- + * + * ZeroTier may be used and distributed under the terms of the GPLv3, which + * are available at: http://www.gnu.org/licenses/gpl-3.0.html + * + * If you would like to embed ZeroTier into a commercial application or + * redistribute it in a modified binary form, please contact ZeroTier Networks + * LLC. Start here: http://www.zerotier.com/ + */ + +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <errno.h> + +#include "IpcListener.hpp" + +#ifndef __WINDOWS__ +#include <sys/socket.h> +#include <sys/un.h> +#include <sys/stat.h> +#include <sys/types.h> +#include <unistd.h> +#endif + +namespace ZeroTier { + +IpcListener::IpcListener(const char *ep,unsigned int timeout,void (*commandHandler)(void *,IpcConnection *,IpcConnection::EventType,const char *),void *arg) : + _endpoint(ep), + _handler(commandHandler), + _arg(arg), + _timeout(timeout), +#ifdef __WINDOWS__ + _run(true), + _running(true) +#else + _sock(0) +#endif +{ +#ifndef __WINDOWS__ + struct sockaddr_un unaddr; + unaddr.sun_family = AF_UNIX; + strncpy(unaddr.sun_path,_endpoint.c_str(),sizeof(unaddr.sun_path)); + unaddr.sun_path[sizeof(unaddr.sun_path) - 1] = (char)0; + + struct stat stattmp; + if (stat(_endpoint.c_str(),&stattmp)) { + int testSock = socket(AF_UNIX,SOCK_STREAM,0); + if (testSock <= 0) + throw std::runtime_error("unable to create socket of type AF_UNIX"); + if (connect(testSock,(struct sockaddr *)&unaddr,sizeof(unaddr))) { + // error means nothing is listening, orphaned name + ::close(testSock); + } else { + // success means endpoint is being actively listened to by a process + ::close(testSock); + throw std::runtime_error("IPC endpoint address in use"); + } + } + ::unlink(_endpoint.c_str()); + + _sock = socket(AF_UNIX,SOCK_STREAM,0); + if (_sock <= 0) + throw std::runtime_error("unable to create socket of type AF_UNIX"); + if (bind(_sock,(struct sockaddr *)&unaddr,sizeof(unaddr))) { + ::close(_sock); + throw std::runtime_error("IPC endpoint could not be bound"); + } + if (listen(_sock,8)) { + ::close(_sock); + throw std::runtime_error("listen() failed for bound AF_UNIX socket"); + } + ::chmod(_endpoint.c_str(),0777); +#endif + + _thread = Thread::start(this); +} + +IpcListener::~IpcListener() +{ +#ifdef __WINDOWS__ + _run = false; + while (_running) { + Thread::cancelIO(_thread); + HANDLE tmp = CreateFileA(_endpoint.c_str(),GENERIC_READ|GENERIC_WRITE,FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,NULL,OPEN_EXISTING,0,NULL); + if (tmp != INVALID_HANDLE_VALUE) + CloseHandle(tmp); + Sleep(250); + } +#else + int s = _sock; + _sock = 0; + if (s > 0) { + ::shutdown(s,SHUT_RDWR); + ::close(s); + } + Thread::join(_thread); + ::unlink(_endpoint.c_str()); +#endif +} + +void IpcListener::threadMain() + throw() +{ +#ifdef __WINDOWS__ + HANDLE s; + while (_run) { + s = CreateNamedPipeA(_endpoint.c_str(),PIPE_ACCESS_DUPLEX,PIPE_READMODE_BYTE|PIPE_TYPE_BYTE|PIPE_WAIT,PIPE_UNLIMITED_INSTANCES,1024,1024,0,NULL); + if (s != INVALID_HANDLE_VALUE) { + if ((ConnectNamedPipe(s,NULL))||(GetLastError() == ERROR_PIPE_CONNECTED)) { + if (!_run) { + DisconnectNamedPipe(s); + CloseHandle(s); + break; + } + try { + _handler(_arg,new IpcConnection(s,_timeout,_handler,_arg),IpcConnection::IPC_EVENT_NEW_CONNECTION,(const char *)0); + } catch ( ... ) {} // handlers should not throw + } else { + CloseHandle(s); + } + } + } + _running = false; +#else + struct sockaddr_un unaddr; + socklen_t socklen; + int s; + while (_sock > 0) { + unaddr.sun_family = AF_UNIX; + strncpy(unaddr.sun_path,_endpoint.c_str(),sizeof(unaddr.sun_path)); + unaddr.sun_path[sizeof(unaddr.sun_path) - 1] = (char)0; + socklen = sizeof(unaddr); + s = accept(_sock,(struct sockaddr *)&unaddr,&socklen); + if (s <= 0) + break; + if (!_sock) { + ::close(s); + break; + } + try { + _handler(_arg,new IpcConnection(s,_timeout,_handler,_arg),IpcConnection::IPC_EVENT_NEW_CONNECTION,(const char *)0); + } catch ( ... ) {} // handlers should not throw + } +#endif +} + +} // namespace ZeroTier diff --git a/attic/oldcontrol/IpcListener.hpp b/attic/oldcontrol/IpcListener.hpp new file mode 100644 index 00000000..8f080c6d --- /dev/null +++ b/attic/oldcontrol/IpcListener.hpp @@ -0,0 +1,91 @@ +/* + * ZeroTier One - Network Virtualization Everywhere + * Copyright (C) 2011-2014 ZeroTier Networks LLC + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + * + * -- + * + * ZeroTier may be used and distributed under the terms of the GPLv3, which + * are available at: http://www.gnu.org/licenses/gpl-3.0.html + * + * If you would like to embed ZeroTier into a commercial application or + * redistribute it in a modified binary form, please contact ZeroTier Networks + * LLC. Start here: http://www.zerotier.com/ + */ + +#ifndef ZT_IPCLISTENER_HPP +#define ZT_IPCLISTENER_HPP + +#include "../node/Constants.hpp" +#include "../node/Thread.hpp" +#include "../node/NonCopyable.hpp" +#include "IpcConnection.hpp" + +#include <string> +#include <stdexcept> + +namespace ZeroTier { + +/** + * IPC incoming connection listener (Unix domain sockets or named pipes on Windows) + */ +class IpcListener : NonCopyable +{ +public: + /** + * Listen for IPC connections + * + * The supplied handler is passed on to incoming instances of IpcConnection. When + * a connection is first opened, it is called with IPC_EVENT_NEW_CONNECTION. The + * receiver must take ownership of the connection object. When a connection is + * closed, IPC_EVENT_CONNECTION_CLOSED is generated. At this point (or after) the + * receiver must delete the object. IPC_EVENT_COMMAND is generated when lines of + * text are read, and in this cases the last argument is not NULL. No closed event + * is generated in the event of manual delete if the connection is still open. + * + * Yeah, this whole callback model sort of sucks. Might rethink and replace with + * some kind of actor model or something if it gets too unweildy. But for now the + * use cases are simple enough that it's not too bad. + * + * @param IPC endpoint name (OS-specific) + * @param timeout Endpoint inactivity timeout in seconds + * @param commandHandler Function to call for each command + * @param arg First argument to pass to handler + * @throws std::runtime_error Unable to bind to endpoint + */ + IpcListener(const char *ep,unsigned int timeout,void (*commandHandler)(void *,IpcConnection *,IpcConnection::EventType,const char *),void *arg); + + ~IpcListener(); + + void threadMain() + throw(); + +private: + std::string _endpoint; + void (*_handler)(void *,IpcConnection *,IpcConnection::EventType,const char *); + void *_arg; + unsigned int _timeout; +#ifdef __WINDOWS__ + volatile bool _run; + volatile bool _running; +#else + volatile int _sock; +#endif + Thread _thread; +}; + +} // namespace ZeroTier + +#endif diff --git a/attic/oldcontrol/NodeControlClient.cpp b/attic/oldcontrol/NodeControlClient.cpp new file mode 100644 index 00000000..92eadf7c --- /dev/null +++ b/attic/oldcontrol/NodeControlClient.cpp @@ -0,0 +1,167 @@ +/* + * ZeroTier One - Network Virtualization Everywhere + * Copyright (C) 2011-2015 ZeroTier, Inc. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + * + * -- + * + * ZeroTier may be used and distributed under the terms of the GPLv3, which + * are available at: http://www.gnu.org/licenses/gpl-3.0.html + * + * If you would like to embed ZeroTier into a commercial application or + * redistribute it in a modified binary form, please contact ZeroTier Networks + * LLC. Start here: http://www.zerotier.com/ + */ + +#include "NodeControlClient.hpp" +#include "../node/Constants.hpp" +#include "../node/Utils.hpp" +#include "../node/Defaults.hpp" +#include "IpcConnection.hpp" +#include "IpcListener.hpp" +#include "NodeControlService.hpp" + +#ifdef __WINDOWS__ +#include <WinSock2.h> +#include <Windows.h> +#include <tchar.h> +#include <wchar.h> +#include <ShlObj.h> +#endif // __WINDOWS__ + +namespace ZeroTier { + +struct _NodeControlClientImpl +{ + void (*resultHandler)(void *,const char *); + void *arg; + bool ignoreNextBreak; + IpcConnection *ipcc; + std::string err; +}; + +static void _CBipcResultHandler(void *arg,IpcConnection *ipcc,IpcConnection::EventType event,const char *result) +{ + if ((event == IpcConnection::IPC_EVENT_COMMAND)&&(result)) { + if (!strcmp(result,"200 auth OK")) { + ((_NodeControlClientImpl *)arg)->ignoreNextBreak = true; + } else if ((((_NodeControlClientImpl *)arg)->ignoreNextBreak)&&(!strcmp(result,"."))) { + ((_NodeControlClientImpl *)arg)->ignoreNextBreak = false; + } else ((_NodeControlClientImpl *)arg)->resultHandler(((_NodeControlClientImpl *)arg)->arg,result); + } +} + +NodeControlClient::NodeControlClient(const char *ep,const char *authToken,void (*resultHandler)(void *,const char *),void *arg) + throw() : + _impl((void *)new _NodeControlClientImpl) +{ + _NodeControlClientImpl *impl = (_NodeControlClientImpl *)_impl; + impl->resultHandler = resultHandler; + impl->arg = arg; + impl->ignoreNextBreak = false; + try { + impl->ipcc = new IpcConnection(ep,ZT_IPC_TIMEOUT,&_CBipcResultHandler,_impl); + impl->ipcc->printf("auth %s"ZT_EOL_S,authToken); + } catch ( ... ) { + impl->ipcc = (IpcConnection *)0; + impl->err = "failure connecting to running ZeroTier One service"; + } +} + +NodeControlClient::~NodeControlClient() +{ + if (_impl) { + delete ((_NodeControlClientImpl *)_impl)->ipcc; + delete (_NodeControlClientImpl *)_impl; + } +} + +const char *NodeControlClient::error() const + throw() +{ + if (((_NodeControlClientImpl *)_impl)->err.length()) + return ((_NodeControlClientImpl *)_impl)->err.c_str(); + return (const char *)0; +} + +void NodeControlClient::send(const char *command) + throw() +{ + try { + if (((_NodeControlClientImpl *)_impl)->ipcc) + ((_NodeControlClientImpl *)_impl)->ipcc->printf("%s"ZT_EOL_S,command); + } catch ( ... ) {} +} + +std::vector<std::string> NodeControlClient::splitLine(const char *line) +{ + return Utils::split(line," ","\\","\""); +} + +const char *NodeControlClient::authTokenDefaultUserPath() +{ + static std::string dlp; + static Mutex dlp_m; + + Mutex::Lock _l(dlp_m); + +#ifdef __WINDOWS__ + + if (!dlp.length()) { + char buf[16384]; + if (SUCCEEDED(SHGetFolderPathA(NULL,CSIDL_APPDATA,NULL,0,buf))) + dlp = (std::string(buf) + "\\ZeroTier\\One\\authtoken.secret"); + } + +#else // not __WINDOWS__ + + if (!dlp.length()) { + const char *home = getenv("HOME"); + if (home) { +#ifdef __APPLE__ + dlp = (std::string(home) + "/Library/Application Support/ZeroTier/One/authtoken.secret"); +#else + dlp = (std::string(home) + "/.zeroTierOneAuthToken"); +#endif + } + } + +#endif // __WINDOWS__ or not __WINDOWS__ + + return dlp.c_str(); +} + +std::string NodeControlClient::getAuthToken(const char *path,bool generateIfNotFound) +{ + unsigned char randbuf[24]; + std::string token; + + if (Utils::readFile(path,token)) + return Utils::trim(token); + else token = ""; + + if (generateIfNotFound) { + Utils::getSecureRandom(randbuf,sizeof(randbuf)); + for(unsigned int i=0;i<sizeof(randbuf);++i) + token.push_back(("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789")[(unsigned int)randbuf[i] % 62]); + if (!Utils::writeFile(path,token)) + return std::string(); + Utils::lockDownFile(path,false); + } + + return token; +} + +} // namespace ZeroTier diff --git a/attic/oldcontrol/NodeControlClient.hpp b/attic/oldcontrol/NodeControlClient.hpp new file mode 100644 index 00000000..71bf7679 --- /dev/null +++ b/attic/oldcontrol/NodeControlClient.hpp @@ -0,0 +1,118 @@ +/* + * ZeroTier One - Network Virtualization Everywhere + * Copyright (C) 2011-2015 ZeroTier, Inc. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + * + * -- + * + * ZeroTier may be used and distributed under the terms of the GPLv3, which + * are available at: http://www.gnu.org/licenses/gpl-3.0.html + * + * If you would like to embed ZeroTier into a commercial application or + * redistribute it in a modified binary form, please contact ZeroTier Networks + * LLC. Start here: http://www.zerotier.com/ + */ + +#ifndef ZT_NODECONTROLCLIENT_HPP +#define ZT_NODECONTROLCLIENT_HPP + +#include <string> +#include <vector> + +#include "../node/Constants.hpp" + +#ifdef __WINDOWS__ +#define ZT_IPC_ENDPOINT_BASE "\\\\.\\pipe\\ZeroTierOne-" +#else +#define ZT_IPC_ENDPOINT_BASE "/tmp/.ZeroTierOne-" +#endif + +namespace ZeroTier { + +/** + * Client for controlling a local ZeroTier One node + */ +class NodeControlClient +{ +public: + /** + * Create a new node config client + * + * Initialization may fail. Call error() to check. + * + * @param ep Endpoint to connect to (OS-dependent) + * @param resultHandler Function to call when commands provide results + * @param arg First argument to result handler + */ + NodeControlClient(const char *ep,const char *authToken,void (*resultHandler)(void *,const char *),void *arg) + throw(); + + ~NodeControlClient(); + + /** + * @return Initialization error or NULL if none + */ + const char *error() const + throw(); + + /** + * Send a command to the local node + * + * Note that the returned conversation ID will never be 0. A return value + * of 0 indicates a fatal error such as failure to bind to any local UDP + * port. + * + * @param command + * @return Conversation ID that will be provided to result handler when/if results are sent back + */ + void send(const char *command) + throw(); + inline void send(const std::string &command) + throw() { return send(command.c_str()); } + + /** + * Split a line of results + * + * @param line Line to split + * @return Vector of fields + */ + static std::vector<std::string> splitLine(const char *line); + static inline std::vector<std::string> splitLine(const std::string &line) { return splitLine(line.c_str()); } + + /** + * @return Default path for current user's authtoken.secret or ~/.zeroTierOneAuthToken (location is platform-dependent) + */ + static const char *authTokenDefaultUserPath(); + + /** + * Load (or generate) the authentication token + * + * @param path Full path to authtoken.secret + * @param generateIfNotFound If true, generate and save if not found or readable (requires appropriate privileges, returns empty on failure) + * @return Authentication token or empty string on failure + */ + static std::string getAuthToken(const char *path,bool generateIfNotFound); + +private: + // NodeControlClient is not copyable + NodeControlClient(const NodeControlClient&); + const NodeControlClient& operator=(const NodeControlClient&); + + void *_impl; +}; + +} // namespace ZeroTier + +#endif diff --git a/attic/oldcontrol/NodeControlService.cpp b/attic/oldcontrol/NodeControlService.cpp new file mode 100644 index 00000000..9f14764b --- /dev/null +++ b/attic/oldcontrol/NodeControlService.cpp @@ -0,0 +1,250 @@ +/* + * ZeroTier One - Network Virtualization Everywhere + * Copyright (C) 2011-2015 ZeroTier, Inc. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + * + * -- + * + * ZeroTier may be used and distributed under the terms of the GPLv3, which + * are available at: http://www.gnu.org/licenses/gpl-3.0.html + * + * If you would like to embed ZeroTier into a commercial application or + * redistribute it in a modified binary form, please contact ZeroTier Networks + * LLC. Start here: http://www.zerotier.com/ + */ + +#include <stdio.h> +#include <string.h> +#include <stdlib.h> + +#include "NodeControlService.hpp" +#include "NodeControlClient.hpp" + +#include "../node/Constants.hpp" +#include "../node/MAC.hpp" +#include "../node/Node.hpp" +#include "../node/Utils.hpp" + +namespace ZeroTier { + +NodeControlService::NodeControlService(Node *node,const char *authToken) : + _node(node), + _listener((IpcListener *)0), + _authToken(authToken), + _running(true), + _thread(Thread::start(this)) +{ +} + +NodeControlService::~NodeControlService() +{ + _running = false; + Thread::join(_thread); + { + Mutex::Lock _l(_connections_m); + for(std::map< IpcConnection *,bool >::iterator c(_connections.begin());c!=_connections.end();++c) + delete c->first; + _connections.clear(); + } + delete _listener; +} + +void NodeControlService::threadMain() + throw() +{ + char tmp[1024]; + try { + while (_running) { + if (!_node->running()) { + if (_node->started()) + break; + } else if ((_node->initialized())&&(_node->address())) { + Utils::snprintf(tmp,sizeof(tmp),"%s%.10llx",ZT_IPC_ENDPOINT_BASE,(unsigned long long)_node->address()); + _listener = new IpcListener(tmp,ZT_IPC_TIMEOUT,&_CBcommandHandler,this); + break; + } + Thread::sleep(100); // wait for Node to start + } + } catch ( ... ) { + delete _listener; + _listener = (IpcListener *)0; + } +} + +void NodeControlService::_CBcommandHandler(void *arg,IpcConnection *ipcc,IpcConnection::EventType event,const char *commandLine) +{ + switch(event) { + case IpcConnection::IPC_EVENT_COMMAND: { + if ((!((NodeControlService *)arg)->_running)||(!commandLine)||(!commandLine[0])) + return; + ((NodeControlService *)arg)->_doCommand(ipcc,commandLine); + } break; + + case IpcConnection::IPC_EVENT_NEW_CONNECTION: { + Mutex::Lock _l(((NodeControlService *)arg)->_connections_m); + ((NodeControlService *)arg)->_connections[ipcc] = false; // not yet authenticated + } break; + + case IpcConnection::IPC_EVENT_CONNECTION_CLOSED: { + Mutex::Lock _l(((NodeControlService *)arg)->_connections_m); + ((NodeControlService *)arg)->_connections.erase(ipcc); + delete ipcc; + } break; + } +} + +void NodeControlService::_doCommand(IpcConnection *ipcc,const char *commandLine) +{ + std::vector<std::string> r; + std::vector<std::string> cmd(Utils::split(commandLine,"\r\n \t","\\","'")); + + if ((cmd.empty())||(cmd[0] == "help")) { + ipcc->printf("200 help help"ZT_EOL_S); + ipcc->printf("200 help auth <token>"ZT_EOL_S); + ipcc->printf("200 help info"ZT_EOL_S); + ipcc->printf("200 help listpeers"ZT_EOL_S); + ipcc->printf("200 help listnetworks"ZT_EOL_S); + ipcc->printf("200 help join <network ID>"ZT_EOL_S); + ipcc->printf("200 help leave <network ID>"ZT_EOL_S); + ipcc->printf("200 help terminate [<reason>]"ZT_EOL_S); + ipcc->printf("200 help updatecheck"ZT_EOL_S); + } else if (cmd[0] == "auth") { + if ((cmd.size() > 1)&&(_authToken.length() > 0)&&(_authToken == cmd[1])) { + Mutex::Lock _l(_connections_m); + _connections[ipcc] = true; + ipcc->printf("200 auth OK"ZT_EOL_S); + } else ipcc->printf("403 auth failed"ZT_EOL_S); + } else { + { + Mutex::Lock _l(_connections_m); + if (!_connections[ipcc]) { + ipcc->printf("403 %s unauthorized"ZT_EOL_S"."ZT_EOL_S,cmd[0].c_str()); + return; + } + } + + if (cmd[0] == "info") { + ipcc->printf("200 info %.10llx %s %s"ZT_EOL_S,_node->address(),(_node->online() ? "ONLINE" : "OFFLINE"),Node::versionString()); + } else if (cmd[0] == "listpeers") { + ipcc->printf("200 listpeers <ztaddr> <paths> <latency> <version> <role>"ZT_EOL_S); + ZT1_Node_PeerList *pl = _node->listPeers(); + if (pl) { + for(unsigned int i=0;i<pl->numPeers;++i) { + ipcc->printf("200 listpeers %.10llx ",(unsigned long long)pl->peers[i].rawAddress); + if (pl->peers[i].numPaths == 0) + ipcc->printf("-"); + else { + for(unsigned int j=0;j<pl->peers[i].numPaths;++j) { + if (j > 0) + ipcc->printf(","); + switch(pl->peers[i].paths[j].type) { + default: + ipcc->printf("unknown;"); + break; + case ZT1_Node_PhysicalPath_TYPE_UDP: + ipcc->printf("udp;"); + break; + case ZT1_Node_PhysicalPath_TYPE_TCP_OUT: + ipcc->printf("tcp_out;"); + break; + case ZT1_Node_PhysicalPath_TYPE_TCP_IN: + ipcc->printf("tcp_in;"); + break; + case ZT1_Node_PhysicalPath_TYPE_ETHERNET: + ipcc->printf("eth;"); + break; + } + ipcc->printf("%s/%d;%ld;%ld;%ld;%s", + pl->peers[i].paths[j].address.ascii, + (int)pl->peers[i].paths[j].address.port, + pl->peers[i].paths[j].lastSend, + pl->peers[i].paths[j].lastReceive, + pl->peers[i].paths[j].lastPing, + (pl->peers[i].paths[j].fixed ? "fixed" : (pl->peers[i].paths[j].active ? "active" : "inactive"))); + } + } + const char *rolestr; + switch(pl->peers[i].role) { + case ZT1_Node_Peer_SUPERNODE: rolestr = "SUPERNODE"; break; + case ZT1_Node_Peer_HUB: rolestr = "HUB"; break; + case ZT1_Node_Peer_NODE: rolestr = "NODE"; break; + default: rolestr = "?"; break; + } + ipcc->printf(" %u %s %s"ZT_EOL_S, + pl->peers[i].latency, + ((pl->peers[i].remoteVersion[0]) ? pl->peers[i].remoteVersion : "-"), + rolestr); + } + _node->freeQueryResult(pl); + } + } else if (cmd[0] == "listnetworks") { + ipcc->printf("200 listnetworks <nwid> <name> <mac> <status> <config age> <type> <dev> <ips>"ZT_EOL_S); + ZT1_Node_NetworkList *nl = _node->listNetworks(); + if (nl) { + for(unsigned int i=0;i<nl->numNetworks;++i) { + ipcc->printf("200 listnetworks %s %s %s %s %ld %s %s ", + nl->networks[i].nwidHex, + nl->networks[i].name, + nl->networks[i].macStr, + nl->networks[i].statusStr, + nl->networks[i].configAge, + (nl->networks[i].isPrivate ? "private" : "public"), + nl->networks[i].device); + if (nl->networks[i].numIps > 0) { + for(unsigned int j=0;j<nl->networks[i].numIps;++j) { + if (j > 0) + ipcc->printf(","); + ipcc->printf("%s/%d",nl->networks[i].ips[j].ascii,(int)nl->networks[i].ips[j].port); + } + } else ipcc->printf("-"); + ipcc->printf(ZT_EOL_S); + } + _node->freeQueryResult(nl); + } + } else if (cmd[0] == "join") { + if (cmd.size() > 1) { + uint64_t nwid = Utils::hexStrToU64(cmd[1].c_str()); + _node->join(nwid); + ipcc->printf("200 join %.16llx OK"ZT_EOL_S,(unsigned long long)nwid); + } else { + ipcc->printf("400 join requires a network ID (>0) in hexadecimal format"ZT_EOL_S); + } + } else if (cmd[0] == "leave") { + if (cmd.size() > 1) { + uint64_t nwid = Utils::hexStrToU64(cmd[1].c_str()); + _node->leave(nwid); + ipcc->printf("200 leave %.16llx OK"ZT_EOL_S,(unsigned long long)nwid); + } else { + ipcc->printf("400 leave requires a network ID (>0) in hexadecimal format"ZT_EOL_S); + } + } else if (cmd[0] == "terminate") { + if (cmd.size() > 1) + _node->terminate(Node::NODE_NORMAL_TERMINATION,cmd[1].c_str()); + else _node->terminate(Node::NODE_NORMAL_TERMINATION,"terminate via IPC command"); + } else if (cmd[0] == "updatecheck") { + if (_node->updateCheck()) { + ipcc->printf("500 software updates are not enabled"ZT_EOL_S); + } else { + ipcc->printf("200 OK"ZT_EOL_S); + } + } else { + ipcc->printf("404 %s No such command. Use 'help' for help."ZT_EOL_S,cmd[0].c_str()); + } + } + + ipcc->printf("."ZT_EOL_S); +} + +} // namespace ZeroTier diff --git a/attic/oldcontrol/NodeControlService.hpp b/attic/oldcontrol/NodeControlService.hpp new file mode 100644 index 00000000..ac647d7e --- /dev/null +++ b/attic/oldcontrol/NodeControlService.hpp @@ -0,0 +1,84 @@ +/* + * ZeroTier One - Network Virtualization Everywhere + * Copyright (C) 2011-2015 ZeroTier, Inc. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + * + * -- + * + * ZeroTier may be used and distributed under the terms of the GPLv3, which + * are available at: http://www.gnu.org/licenses/gpl-3.0.html + * + * If you would like to embed ZeroTier into a commercial application or + * redistribute it in a modified binary form, please contact ZeroTier Networks + * LLC. Start here: http://www.zerotier.com/ + */ + +#ifndef ZT_NODECONTROLSERVICE_HPP +#define ZT_NODECONTROLSERVICE_HPP + +#include <string> +#include <map> + +#include "IpcConnection.hpp" +#include "IpcListener.hpp" + +#include "../node/Constants.hpp" +#include "../node/NonCopyable.hpp" +#include "../node/Thread.hpp" + +namespace ZeroTier { + +class Node; + +/** + * Background controller service that controls and configures a node + * + * This is used with system-installed instances of ZeroTier One to + * provide the IPC-based control bus service for node configuration. + */ +class NodeControlService : NonCopyable +{ +public: + /** + * @param node Node to control and configure + * @param authToken Authorization token for clients + */ + NodeControlService(Node *node,const char *authToken); + + ~NodeControlService(); + + // Background thread waits for node to initialize, then creates IpcListener and + // terminates. It also terminates on delete if it hasn't bootstrapped yet. + void threadMain() + throw(); + +private: + static void _CBcommandHandler(void *arg,IpcConnection *ipcc,IpcConnection::EventType event,const char *commandLine); + void _doCommand(IpcConnection *ipcc,const char *commandLine); + + Node *_node; + IpcListener *_listener; + std::string _authToken; + + std::map< IpcConnection *,bool > _connections; + Mutex _connections_m; + + volatile bool _running; + Thread _thread; +}; + +} // namespace ZeroTier + +#endif diff --git a/attic/oldcontrol/README.md b/attic/oldcontrol/README.md new file mode 100644 index 00000000..c1c69a90 --- /dev/null +++ b/attic/oldcontrol/README.md @@ -0,0 +1,4 @@ +ZeroTier Control Plane +====== + +This code is responsible for the local command bus used to control the ZeroTier One service on a local machine via zerotier-cli or the Qt GUI. It's not part of the core node implementation. It uses Unix domain sockets on unix-like OSes and named pipes on Windows. Authentication is via a simple token mechanism. (Eventually this part of the software is getting a rework.)
\ No newline at end of file |