summaryrefslogtreecommitdiff
path: root/controller
diff options
context:
space:
mode:
Diffstat (limited to 'controller')
-rw-r--r--controller/EmbeddedNetworkController.cpp15
-rw-r--r--controller/EmbeddedNetworkController.hpp7
-rw-r--r--controller/FileDB.cpp14
-rw-r--r--controller/PostgreSQL.cpp955
-rw-r--r--controller/PostgreSQL.hpp97
-rw-r--r--controller/RethinkDB.cpp497
-rw-r--r--controller/RethinkDB.hpp84
7 files changed, 1079 insertions, 590 deletions
diff --git a/controller/EmbeddedNetworkController.cpp b/controller/EmbeddedNetworkController.cpp
index 6a4134c6..baed88e6 100644
--- a/controller/EmbeddedNetworkController.cpp
+++ b/controller/EmbeddedNetworkController.cpp
@@ -478,9 +478,9 @@ void EmbeddedNetworkController::init(const Identity &signingId,Sender *sender)
_signingId = signingId;
_sender = sender;
_signingIdAddressString = signingId.address().toString(tmp);
-#ifdef ZT_CONTROLLER_USE_RETHINKDB
- if ((_path.length() > 10)&&(_path.substr(0,10) == "rethinkdb:"))
- _db.reset(new RethinkDB(this,_signingId,_path.c_str()));
+#ifdef ZT_CONTROLLER_USE_LIBPQ
+ if ((_path.length() > 9)&&(_path.substr(0,9) == "postgres:"))
+ _db.reset(new PostgreSQL(this,_signingId,_path.substr(9).c_str()));
else // else use FileDB after endif
#endif
_db.reset(new FileDB(this,_signingId,_path.c_str()));
@@ -1043,6 +1043,7 @@ unsigned int EmbeddedNetworkController::handleControlPlaneHttpDELETE(
json network,member;
_db->get(nwid,network,address,member);
+ _db->eraseMember(nwid, address);
{
std::lock_guard<std::mutex> l(_memberStatus_l);
@@ -1609,18 +1610,20 @@ void EmbeddedNetworkController::_request(
if ( (ipRangeStartIA.ss_family == AF_INET) && (ipRangeEndIA.ss_family == AF_INET) ) {
uint32_t ipRangeStart = Utils::ntoh((uint32_t)(reinterpret_cast<struct sockaddr_in *>(&ipRangeStartIA)->sin_addr.s_addr));
uint32_t ipRangeEnd = Utils::ntoh((uint32_t)(reinterpret_cast<struct sockaddr_in *>(&ipRangeEndIA)->sin_addr.s_addr));
+
if ((ipRangeEnd < ipRangeStart)||(ipRangeStart == 0))
continue;
uint32_t ipRangeLen = ipRangeEnd - ipRangeStart;
-
+
// Start with the LSB of the member's address
uint32_t ipTrialCounter = (uint32_t)(identity.address().toInt() & 0xffffffff);
for(uint32_t k=ipRangeStart,trialCount=0;((k<=ipRangeEnd)&&(trialCount < 1000));++k,++trialCount) {
uint32_t ip = (ipRangeLen > 0) ? (ipRangeStart + (ipTrialCounter % ipRangeLen)) : ipRangeStart;
++ipTrialCounter;
- if ((ip & 0x000000ff) == 0x000000ff)
+ if ((ip & 0x000000ff) == 0x000000ff) {
continue; // don't allow addresses that end in .255
+ }
// Check if this IP is within a local-to-Ethernet routed network
int routedNetmaskBits = -1;
@@ -1658,7 +1661,7 @@ void EmbeddedNetworkController::_request(
}
}
}
-
+
// Issue a certificate of ownership for all static IPs
if (nc->staticIpCount) {
nc->certificatesOfOwnership[0] = CertificateOfOwnership(nwid,now,identity.address(),1);
diff --git a/controller/EmbeddedNetworkController.hpp b/controller/EmbeddedNetworkController.hpp
index 417005a4..c3f121c5 100644
--- a/controller/EmbeddedNetworkController.hpp
+++ b/controller/EmbeddedNetworkController.hpp
@@ -44,8 +44,8 @@
#include "DB.hpp"
#include "FileDB.hpp"
-#ifdef ZT_CONTROLLER_USE_RETHINKDB
-#include "RethinkDB.hpp"
+#ifdef ZT_CONTROLLER_USE_LIBPQ
+#include "PostgreSQL.hpp"
#endif
namespace ZeroTier {
@@ -146,10 +146,13 @@ private:
Identity _signingId;
std::string _signingIdAddressString;
NetworkController::Sender *_sender;
+
std::unique_ptr<DB> _db;
BlockingQueue< _RQEntry * > _queue;
+
std::vector<std::thread> _threads;
std::mutex _threads_l;
+
std::unordered_map< _MemberStatusKey,_MemberStatus,_MemberStatusHash > _memberStatus;
std::mutex _memberStatus_l;
};
diff --git a/controller/FileDB.cpp b/controller/FileDB.cpp
index 8cbd60ce..3f5d46bd 100644
--- a/controller/FileDB.cpp
+++ b/controller/FileDB.cpp
@@ -136,12 +136,24 @@ void FileDB::eraseNetwork(const uint64_t networkId)
get(networkId,network);
char p[16384];
OSUtils::ztsnprintf(p,sizeof(p),"%s" ZT_PATH_SEPARATOR_S "%.16llx.json",_networksPath.c_str(),networkId);
- OSUtils::rm(p);
+
+ if (OSUtils::fileExists(p,false)){
+ OSUtils::rm(p);
+ }
_networkChanged(network,nullJson,true);
}
void FileDB::eraseMember(const uint64_t networkId,const uint64_t memberId)
{
+ nlohmann::json network,member,nullJson;
+ get(networkId,network);
+ get(memberId,member);
+ char p[16384];
+ OSUtils::ztsnprintf(p,sizeof(p),"%s" ZT_PATH_SEPARATOR_S "%.16llx" ZT_PATH_SEPARATOR_S "member" ZT_PATH_SEPARATOR_S "%.10llx.json",_networksPath.c_str(),networkId,memberId);
+ if (OSUtils::fileExists(p,false)){
+ OSUtils::rm(p);
+ }
+ _memberChanged(member,nullJson,true);
}
void FileDB::nodeIsOnline(const uint64_t networkId,const uint64_t memberId,const InetAddress &physicalAddress)
diff --git a/controller/PostgreSQL.cpp b/controller/PostgreSQL.cpp
new file mode 100644
index 00000000..c99974fd
--- /dev/null
+++ b/controller/PostgreSQL.cpp
@@ -0,0 +1,955 @@
+/*
+ * ZeroTier One - Network Virtualization Everywhere
+ * Copyright (C) 2011-2018 ZeroTier, Inc.
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+#ifdef ZT_CONTROLLER_USE_LIBPQ
+
+#include "PostgreSQL.hpp"
+#include "EmbeddedNetworkController.hpp"
+#include "../version.h"
+
+#include <pqxx/pqxx>
+#include <sstream>
+
+using json = nlohmann::json;
+namespace {
+
+static const char *_timestr()
+{
+ time_t t = time(0);
+ char *ts = ctime(&t);
+ char *p = ts;
+ if (!p)
+ return "";
+ while (*p) {
+ if (*p == '\n') {
+ *p = (char)0;
+ break;
+ }
+ ++p;
+ }
+ return ts;
+}
+
+std::string join(const std::vector<std::string> &elements, const char * const separator)
+{
+ switch(elements.size()) {
+ case 0:
+ return "";
+ case 1:
+ return elements[0];
+ default:
+ std::ostringstream os;
+ std::copy(elements.begin(), elements.end()-1, std::ostream_iterator<std::string>(os, separator));
+ os << *elements.rbegin();
+ return os.str();
+ }
+}
+
+}
+
+namespace ZeroTier {
+
+class _MemberNotificationReceiver : public pqxx::notification_receiver
+{
+private:
+ ZeroTier::PostgreSQL *_pgsql;
+
+public:
+ _MemberNotificationReceiver(pqxx::connection_base &c, const std::string &channel, ZeroTier::PostgreSQL *pgsql)
+ : pqxx::notification_receiver(c, channel)
+ , _pgsql(pgsql)
+ {}
+
+ virtual void operator()(const std::string &payload, int backend_pid)
+ {
+ try {
+ json tmp(json::parse(payload));
+ json &ov = tmp["old_val"];
+ json &nv = tmp["new_val"];
+ json oldConfig, newConfig;
+ if (ov.is_object()) oldConfig = ov;
+ if (nv.is_object()) newConfig = nv;
+ if (oldConfig.is_object() || newConfig.is_object()) {
+ _pgsql->_memberChanged(oldConfig,newConfig,_pgsql->isReady());
+ }
+ } catch (std::exception &e) {
+ fprintf(stderr, "Exception parsing member notification: %s\n", e.what());
+ }
+ }
+};
+
+class _NetworkNotificationReceiver : public pqxx::notification_receiver
+{
+private:
+ ZeroTier::PostgreSQL *_pgsql;
+public:
+ _NetworkNotificationReceiver(pqxx::connection_base &c, const std::string &channel, ZeroTier::PostgreSQL *pgsql)
+ : pqxx::notification_receiver(c, channel)
+ , _pgsql(pgsql)
+ {}
+
+ virtual void operator()(const std::string &payload, int backend_pid)
+ {
+ try {
+ json tmp(json::parse(payload));
+ json &ov = tmp["old_val"];
+ json &nv = tmp["new_val"];
+ json oldConfig, newConfig;
+ if (ov.is_object()) oldConfig = ov;
+ if (nv.is_object()) newConfig = nv;
+ if (oldConfig.is_object()||newConfig.is_object()) {
+ _pgsql->_networkChanged(oldConfig,newConfig,_pgsql->isReady());
+ }
+ } catch (std::exception &e) {
+ fprintf(stderr, "Exception parsing member notification: %s\n", e.what());
+ } // ignore bad records
+ }
+};
+
+} // namespace ZeroTier
+
+using namespace ZeroTier;
+
+PostgreSQL::PostgreSQL(EmbeddedNetworkController *const nc, const Identity &myId, const char *path)
+ : DB(nc, myId, path)
+ , _ready(0)
+ , _connected(1)
+ , _run(1)
+ , _waitNoticePrinted(false)
+{
+ fprintf(stderr, "PostgreSQL Constructed");
+ _connString = std::string(path);
+
+ _readyLock.lock();
+ _heartbeatThread = std::thread(&PostgreSQL::heartbeat, this);
+ _membersDbWatcher = std::thread(&PostgreSQL::membersDbWatcher, this);
+ _networksDbWatcher = std::thread(&PostgreSQL::networksDbWatcher, this);
+ for (int i = 0; i < ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS; ++i) {
+ _commitThread[i] = std::thread(&PostgreSQL::commitThread, this);
+ }
+ _onlineNotificationThread = std::thread(&PostgreSQL::onlineNotificationThread, this);
+}
+
+PostgreSQL::~PostgreSQL()
+{
+ _run = 0;
+ std::this_thread::sleep_for(std::chrono::milliseconds(100));
+
+ _heartbeatThread.join();
+ _membersDbWatcher.join();
+ _networksDbWatcher.join();
+ for (int i = 0; i < ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS; ++i) {
+ _commitThread[i].join();
+ }
+ _onlineNotificationThread.join();
+
+}
+
+
+bool PostgreSQL::waitForReady()
+{
+ while (_ready < 2) {
+ if (!_waitNoticePrinted) {
+ _waitNoticePrinted = true;
+ fprintf(stderr, "[%s] NOTICE: %.10llx controller PostgreSQL waiting for initial data download..." ZT_EOL_S, ::_timestr(), (unsigned long long)_myAddress.toInt());
+ }
+ _readyLock.lock();
+ _readyLock.unlock();
+ }
+ return true;
+}
+
+bool PostgreSQL::isReady()
+{
+ return ((_ready == 2)&&(_connected));
+}
+
+void PostgreSQL::save(nlohmann::json *orig, nlohmann::json &record)
+{
+ try {
+ if (!record.is_object()) {
+ return;
+ }
+ waitForReady();
+ if (orig) {
+ if (*orig != record) {
+ record["revision"] = OSUtils::jsonInt(record["revision"],0ULL) + 1;
+ _commitQueue.post(new nlohmann::json(record));
+ }
+ } else {
+ record["revision"] = 1;
+ _commitQueue.post(new nlohmann::json(record));
+ }
+ } catch (std::exception &e) {
+ fprintf(stderr, "Error on PostgreSQL::save: %s\n", e.what());
+ } catch (...) {
+ fprintf(stderr, "Unknown error on PostgreSQL::save\n");
+ }
+}
+
+void PostgreSQL::eraseNetwork(const uint64_t networkId)
+{
+ char tmp2[24];
+ waitForReady();
+ Utils::hex(networkId, tmp2);
+ json *tmp = new json();
+ (*tmp)["id"] = tmp2;
+ (*tmp)["objtype"] = "_delete_network";
+ _commitQueue.post(tmp);
+}
+
+void PostgreSQL::eraseMember(const uint64_t networkId, const uint64_t memberId)
+{
+ char tmp2[24];
+ json *tmp = new json();
+ Utils::hex(networkId, tmp2);
+ (*tmp)["nwid"] = tmp2;
+ Utils::hex(memberId, tmp2);
+ (*tmp)["id"] = tmp2;
+ (*tmp)["objtype"] = "_delete_member";
+ _commitQueue.post(tmp);
+}
+
+void PostgreSQL::nodeIsOnline(const uint64_t networkId, const uint64_t memberId, const InetAddress &physicalAddress)
+{
+ std::lock_guard<std::mutex> l(_lastOnline_l);
+ std::pair<int64_t, InetAddress> &i = _lastOnline[std::pair<uint64_t,uint64_t>(networkId, memberId)];
+ i.first = OSUtils::now();
+ if (physicalAddress) {
+ i.second = physicalAddress;
+ }
+}
+
+void PostgreSQL::initializeNetworks(pqxx::connection &conn)
+{
+ try {
+ if (!conn.is_open()) {
+ fprintf(stderr, "Bad Database Connection in initializeNetworks\n");
+ exit(1);
+ }
+
+ pqxx::work w(conn);
+
+ pqxx::result r = w.exec("SELECT id, EXTRACT(EPOCH FROM creation_time AT TIME ZONE 'UTC')*1000 AS creation_time, capabilities, "
+ "enable_broadcast, EXTRACT(EPOCH FROM last_modified AT TIME ZONE 'UTC')*1000 AS last_modified, mtu, multicast_limit, name, private, remote_trace_level, "
+ "remote_trace_target, revision, rules, tags, v4_assign_mode, v6_assign_mode FROM ztc_network "
+ "WHERE deleted = false AND controller_id = '" + w.esc(_myAddressStr) + "'");
+
+
+ for (pqxx::result::const_iterator row = r.begin(); row != r.end(); ++row) {
+ json empty;
+ json config;
+
+ std::string nwid = row["id"].as<std::string>();
+ config["id"] = nwid;
+ config["nwid"] = nwid;
+ try {
+ config["creationTime"] = row["creation_time"].as<uint64_t>();
+ } catch(std::exception &e) {
+ config["creationTime"] = 0ULL;
+ }
+ config["capabilities"] = json::parse(row["capabilities"].as<std::string>());
+ config["enableBroadcast"] = row["enable_broadcast"].as<bool>();
+ try {
+ config["lastModified"] = row["last_modified"].as<uint64_t>();
+ } catch (std::exception &e) {
+ config["lastModified"] = 0ULL;
+ }
+ try {
+ config["mtu"] = row["mtu"].as<int>();
+ } catch (std::exception &e) {
+ config["mtu"] = 2800;
+ }
+ try {
+ config["multicastLimit"] = row["multicast_limit"].as<int>();
+ } catch (std::exception &e) {
+ config["multicastLimit"] = 64;
+ }
+ config["name"] = row["name"].as<std::string>();
+ config["private"] = row["private"].as<bool>();
+ try {
+ config["remoteTraceLevel"] = row["remote_trace_level"].as<int>();
+ } catch (std::exception &e) {
+ config["remoteTraceLevel"] = 0;
+ }
+ config["remoteTraceTarget"] = (row["remote_trace_target"].is_null() ? nullptr : row["remote_trace_target"].as<std::string>());
+ try {
+ config["revision"] = row["revision"].as<uint64_t>();
+ } catch (std::exception &e) {
+ config["revision"] = 0ULL;
+ //fprintf(stderr, "Error converting revision: %s\n", PQgetvalue(res, i, 11));
+ }
+ config["rules"] = json::parse(row["rules"].as<std::string>());
+ config["tags"] = json::parse(row["tags"].as<std::string>());
+ config["v4AssignMode"] = json::parse(row["v4_assign_mode"].as<std::string>());
+ config["v6AssignMode"] = json::parse(row["v6_assign_mode"].as<std::string>());
+ config["objtype"] = "network";
+ config["ipAssignmentPools"] = json::array();
+ config["routes"] = json::array();
+
+ pqxx::work w2(conn);
+ pqxx::result res2 = w2.exec("SELECT host(ip_range_start) AS ip_range_start, host(ip_range_end) AS ip_range_end FROM ztc_network_assignment_pool WHERE network_id = '" + w2.esc(nwid) + "'");
+ for(pqxx::result::const_iterator it = res2.begin(); it != res2.end(); ++it) {
+ json ip;
+ ip["ipRangeStart"] = it["ip_range_start"].as<std::string>();
+ ip["ipRangeEnd"] = it["ip_range_end"].as<std::string>();
+ config["ipAssignmentPools"].push_back(ip);
+ }
+ w2.commit();
+
+ pqxx::work w3(conn);
+ pqxx::result res3 = w3.exec("SELECT host(address) AS address, bits, host(via) AS via FROM ztc_network_route WHERE network_id = '" + w3.esc(nwid) + "'");
+ for(pqxx::result::const_iterator it = res3.begin(); it != res3.end(); ++it) {
+ json route;
+ route["target"] = it["address"].as<std::string>() + "/" + it["bits"].as<std::string>();
+ if (route["via"].is_null()) {
+ route["via"] = nullptr;
+ } else {
+ route["via"] = it["via"].as<std::string>();
+ }
+ config["routes"].push_back(route);
+ }
+ w3.commit();
+
+ _networkChanged(empty, config, false);
+ }
+
+ w.commit();
+
+ if (++this->_ready == 2) {
+ if (_waitNoticePrinted) {
+ fprintf(stderr,"[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
+ }
+ _readyLock.unlock();
+ }
+ } catch (std::exception &e) {
+ fprintf(stderr, "ERROR: Error initializing networks: %s", e.what());
+ exit(-1);
+ }
+}
+
+void PostgreSQL::initializeMembers(pqxx::connection &conn)
+{
+ try {
+ if (!conn.is_open()) {
+ fprintf(stderr, "Bad Database Connection in initializeMembers\n");
+ exit(1);
+ }
+
+ pqxx::work w(conn);
+ pqxx::result res = w.exec(
+ "SELECT m.id AS id, m.network_id AS network_id, m.active_bridge AS active_bridge, "
+ " m.authorized AS authorized, m.capabilities AS capabilities, "
+ " EXTRACT(EPOCH FROM m.creation_time AT TIME ZONE 'UTC')*1000 AS creation_time, m.identity AS identity, "
+ " EXTRACT(EPOCH FROM m.last_authorized_time AT TIME ZONE 'UTC')*1000 AS last_authorized_time, "
+ " EXTRACT(EPOCH FROM m.last_deauthorized_time AT TIME ZONE 'UTC')*1000 AS last_deauthorized_time, "
+ " m.remote_trace_level AS remote_trace_level, m.remote_trace_target AS remote_trace_target, "
+ " m.tags AS tags, m.v_major AS v_major, m.v_minor AS v_minor, m.v_rev AS v_rev, "
+ " m.v_proto AS v_proto, m.no_auto_assign_ips AS no_auto_assign_ips, m.revision AS revision "
+ "FROM ztc_member m "
+ "INNER JOIN ztc_network n "
+ " ON n.id = m.network_id "
+ "WHERE n.controller_id = '" + w.esc(_myAddressStr) + "' AND m.deleted = false"
+ );
+
+ for(pqxx::result::const_iterator row = res.begin(); row != res.end(); ++row) {
+ json empty;
+ json config;
+
+ std::string networkId = row["network_id"].as<std::string>();
+ std::string memberId = row["id"].as<std::string>();
+
+ config["id"] = memberId;
+ config["nwid"] = networkId;
+ config["activeBridge"] = row["active_bridge"].as<bool>();
+ config["authorized"] = row["authorized"].as<bool>();
+ try {
+ config["capabilities"] = json::parse(row["capabilities"].as<std::string>());
+ } catch(std::exception &e) {
+ config["capabilities"] = json::array();
+ }
+ try {
+ config["creationTime"] = row["creation_time"].as<uint64_t>();
+ } catch(std::exception &e) {
+ config["creationTime"] = 0ULL;
+ }
+ config["identity"] = row["identity"].as<std::string>();
+ try {
+ config["lastAuthorizedTime"] = row["last_authorized_time"].as<uint64_t>();
+ } catch(std::exception &e) {
+ config["lastAuthorizedTime"] = 0ULL;
+ }
+ try {
+ config["lastDeauthorizedTime"] = row["last_deauthorized_time"].as<uint64_t>();
+ } catch(std::exception &e) {
+ config["lastDeauthorizedTime"] = 0ULL;
+ }
+ try {
+ config["remoteTraceLevel"] = row["remote_trace_level"].as<int>();
+ } catch(std::exception &e) {
+ config["remoteTraceLevel"] = 0;
+ }
+ config["remoteTraceTarget"] = (row["remote_trace_target"].is_null() ? nullptr : row["remote_trace_target"].as<std::string>());
+ try {
+ config["tags"] = json::parse(row["tags"].as<std::string>());
+ } catch(std::exception &e) {
+ config["tags"] = json::array();
+ }
+ try {
+ config["vMajor"] = row["v_major"].as<int>();
+ } catch(std::exception &e) {
+ config["vMajor"] = -1;
+ }
+ try {
+ config["vMinor"] = row["v_minor"].as<int>();
+ } catch (std::exception &e) {
+ config["vMinor"] = -1;
+ }
+ try {
+ config["vRev"] = row["v_rev"].as<int>();
+ } catch (std::exception &e) {
+ config["vRev"] = -1;
+ }
+ try {
+ config["vProto"] = row["v_proto"].as<int>();
+ } catch (std::exception &e) {
+ config["vProto"] = -1;
+ }
+ config["noAutoAssignIps"] = row["no_auto_assign_ips"].as<bool>();
+ try {
+ config["revision"] = row["revision"].as<uint64_t>();
+ } catch (std::exception &e) {
+ config["revision"] = 0ULL;
+ //fprintf(stderr, "Error updating revision (member): %s\n", PQgetvalue(res, i, 17));
+ }
+ config["objtype"] = "member";
+ config["ipAssignments"] = json::array();
+
+ pqxx::work w2(conn);
+ pqxx::result r2 = w2.exec(
+ "SELECT address FROM ztc_member_ip_assignment WHERE member_id = '"+w2.esc(memberId)+"' AND network_id = '"+w2.esc(networkId)+"'"
+ );
+ for(pqxx::result::const_iterator it = r2.begin(); it != r2.end(); ++it) {
+ config["ipAssignments"].push_back(it["address"].as<std::string>());
+ }
+ w2.commit();
+
+ _memberChanged(empty, config, false);
+ }
+ w.commit();
+
+ if (++this->_ready == 2) {
+ if (_waitNoticePrinted) {
+ fprintf(stderr,"[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
+ }
+ _readyLock.unlock();
+ }
+ } catch (std::exception &e) {
+ fprintf(stderr, "ERROR: Error initializing members: %s\n", e.what());
+ exit(-1);
+ }
+}
+
+void PostgreSQL::heartbeat()
+{
+ char publicId[1024];
+ char hostnameTmp[1024];
+ _myId.toString(false,publicId);
+ if (gethostname(hostnameTmp, sizeof(hostnameTmp))!= 0) {
+ hostnameTmp[0] = (char)0;
+ } else {
+ for (int i = 0; i < sizeof(hostnameTmp); ++i) {
+ if ((hostnameTmp[i] == '.')||(hostnameTmp[i] == 0)) {
+ hostnameTmp[i] = (char)0;
+ break;
+ }
+ }
+ }
+ const char *controllerId = _myAddressStr.c_str();
+ const char *publicIdentity = publicId;
+ const char *hostname = hostnameTmp;
+
+ fprintf(stderr, "Heartbeat connection opening\n");
+ pqxx::connection conn(_connString);
+ if (!conn.is_open()) {
+ fprintf(stderr, "Connection to database failed: heartbeat\n");
+ exit(1);
+ }
+ fprintf(stderr, "Heartbeat connection opened\n");
+ conn.prepare("heartbeat",
+ "INSERT INTO ztc_controller (id, cluster_host, last_alive, public_identity, v_major, v_minor, v_rev, v_build) "
+ "VALUES ($1, $2, TO_TIMESTAMP($3::double precision/1000), $4, $5, $6, $7, $8) "
+ "ON CONFLICT (id) DO UPDATE SET cluster_host = EXCLUDED.cluster_host, last_alive = EXCLUDED.last_alive, "
+ "public_identity = EXCLUDED.public_identity, v_major = EXCLUDED.v_major, v_minor = EXCLUDED.v_minor, "
+ "v_rev = EXCLUDED.v_rev, v_build = EXCLUDED.v_rev"
+ );
+
+ while (_run == 1) {
+ try {
+ pqxx::work w(conn);
+ pqxx::result res = w.prepared("heartbeat")(controllerId)(hostname)
+ (OSUtils::now())(publicIdentity)(ZEROTIER_ONE_VERSION_MAJOR)
+ (ZEROTIER_ONE_VERSION_MINOR)(ZEROTIER_ONE_VERSION_REVISION)
+ (ZEROTIER_ONE_VERSION_BUILD).exec();
+ w.commit();
+ } catch (std::exception &e) {
+ fprintf(stderr, "Error inserting heartbeat: %s\n", e.what());
+ exit(1);
+ }
+ std::this_thread::sleep_for(std::chrono::milliseconds(1000));
+ }
+}
+
+void PostgreSQL::membersDbWatcher()
+{
+ try {
+ pqxx::connection conn(_connString);
+ if (!conn.is_open()) {
+ fprintf(stderr, "Connection to database failed: membersDbWatcher\n");
+ exit(1);
+ }
+
+ initializeMembers(conn);
+
+ char buf[11] = {0};
+ std::string cmd = "member_" + std::string(_myAddress.toString(buf));
+ _MemberNotificationReceiver receiver(conn, cmd, this);
+ while(_run == 1) {
+ conn.await_notification(5, 0);
+ std::this_thread::sleep_for(std::chrono::milliseconds(10));
+ }
+ conn.disconnect();
+ } catch (std::exception &e) {
+ fprintf(stderr, "Exception in membersDbWatcher: %s\n", e.what());
+ exit(1);
+ }
+}
+
+void PostgreSQL::networksDbWatcher()
+{
+ try {
+ pqxx::connection conn(_connString);
+ if (!conn.is_open()) {
+ fprintf(stderr, "Connection to database failed: networksDbWatcher\n");
+ exit(1);
+ }
+
+ initializeNetworks(conn);
+
+ char buf[11] = {0};
+ std::string cmd = "network_" + std::string(_myAddress.toString(buf));
+ _NetworkNotificationReceiver receiver(conn, cmd, this);
+ while(_run == 1) {
+ conn.await_notification(5, 0);
+ std::this_thread::sleep_for(std::chrono::milliseconds(10));
+ }
+ } catch(std::exception &e) {
+ fprintf(stderr, "Exception in networksDbWatcher: %s\n", e.what());
+ exit(1);
+ }
+}
+
+void PostgreSQL::commitThread()
+{
+ pqxx::connection conn(_connString);
+ if (!conn.is_open()) {
+ fprintf(stderr, "ERROR: Connection to database failed: commitThread\n");
+ exit(1);
+ }
+
+ conn.prepare("insert_member",
+ "INSERT INTO ztc_member (id, network_id, active_bridge, authorized, capabilities, "
+ "identity, last_authorized_time, last_deauthorized_time, no_auto_assign_ips, "
+ "remote_trace_level, remote_trace_target, revision, tags, v_major, v_minor, v_rev, v_proto) "
+ "VALUES ($1, $2, $3, $4, $5, $6, "
+ "TO_TIMESTAMP($7::double precision/1000), TO_TIMESTAMP($8::double precision/1000), "
+ "$9, $10, (CASE WHEN $11='' THEN NULL ELSE $1 END), $12, $13, $14, $15, $16, $17) ON CONFLICT (network_id, id) DO UPDATE SET "
+ "active_bridge = EXCLUDED.active_bridge, authorized = EXCLUDED.authorized, capabilities = EXCLUDED.capabilities, "
+ "identity = EXCLUDED.identity, last_authorized_time = EXCLUDED.last_authorized_time, "
+ "last_deauthorized_time = EXCLUDED.last_deauthorized_time, no_auto_assign_ips = EXCLUDED.no_auto_assign_ips, "
+ "remote_trace_level = EXCLUDED.remote_trace_level, remote_trace_target = EXCLUDED.remote_trace_target, "
+ "revision = EXCLUDED.revision+1, tags = EXCLUDED.tags, v_major = EXCLUDED.v_major, "
+ "v_minor = EXCLUDED.v_minor, v_rev = EXCLUDED.v_rev, v_proto = EXCLUDED.v_proto");
+ conn.prepare("delete_ip_assignments",
+ "DELETE FROM ztc_member_ip_assignment WHERE member_id = $1 AND network_id = $2");
+ conn.prepare("insert_ip_assignments",
+ "INSERT INTO ztc_member_ip_assignment (member_id, network_id, address) VALUES ($1, $2, $3)");
+
+ conn.prepare("update_network",
+ "UPDATE ztc_network SET controller_id = $2, capabilities = $3, enable_broadcast = $4, "
+ "last_updated = $5, mtu = $6, multicast_limit = $7, name = $8, private = $9, "
+ "remote_trace_level = $10, remote_trace_target = $11, rules = $12, rules_source = $13, "
+ "tags = $14, v4_assign_mode = $15, v6_assign_mode = $16 "
+ "WHERE id = $1");
+ conn.prepare("delete_network_ip_pool",
+ "DELETE FROM ztc_network_assignment_pool WHERE network_id = $1");
+ conn.prepare("insert_network_ip_pool",
+ "INSERT INTO ztc_network_assignment_pool (network_id, ip_range_start, ip_range_end) VALUES ($1, $2, $3)");
+ conn.prepare("delete_network_route", "DELETE FROM ztc_network_route WHERE network_id = $1");
+ conn.prepare("insert_network_route", "INSERT INTO ztc_network_route (network_id, address, bits, via) VALUES ($1, $2, $3, $4)");
+ conn.prepare("delete_network", "UPDATE ztc_network SET deleted = true WHERE id = $1");
+ conn.prepare("delete_member", "UPDATE ztc_member SET hidden = true, deleted = true WHERE id = $1 AND network_id = $2");
+
+ json *config = nullptr;
+ while(_commitQueue.get(config)&(_run == 1)) {
+ if (!config) {
+ continue;
+ }
+ try {
+ const std::string objtype = (*config)["objtype"];
+ if (objtype == "member") {
+ std::string memberId = (*config)["id"];
+ std::string networkId = (*config)["nwid"];
+ std::string target("");
+ if (!(*config)["remoteTraceTarget"].is_null()) {
+ target = (*config)["remoteTraceTarget"];
+ }
+ std::string identity = (*config)["identity"];
+
+ try {
+ std::string caps = OSUtils::jsonDump((*config)["capabilities"], -1);
+ std::string tags = OSUtils::jsonDump((*config)["tags"], -1);
+
+ pqxx::work w(conn);
+ pqxx::result res = w.prepared("insert_member")(memberId)(networkId)
+ ((bool)(*config)["activeBridge"])((bool)(*config)["authorized"])(caps)
+ (identity)((long long)(*config)["lastAuthorizedTime"])((long long)(*config)["lastDeauthorizedTime"])
+ ((bool)(*config)["noAutoAssignIps"])((int)(*config)["remoteTraceLevel"])
+ (target, !target.empty())
+ ((int)(*config)["revision"])(tags)((int)(*config)["vMajor"])((int)(*config)["vMinor"])
+ ((int)(*config)["vRev"])((int)(*config)["vProto"]).exec();
+ w.commit();
+ } catch (std::exception &e) {
+ fprintf(stderr, "Exception upserting member: %s\n", e.what());
+ delete config;
+ config = nullptr;
+ continue;
+ }
+
+ try {
+ pqxx::work w(conn);
+ pqxx::result res = w.prepared("delete_ip_assignments")(memberId)(networkId).exec();
+
+ for (auto i = (*config)["ipAssignments"].begin(); i != (*config)["ipAssignments"].end(); ++i) {
+ std::string addr = *i;
+ pqxx::result res2 = w.prepared("insert_ip_assignments")(memberId)(networkId)(addr).exec();
+ }
+ w.commit();
+ } catch (std::exception &e) {
+ fprintf(stderr, "Error assigning member IP addresses: %s\n", e.what());
+ delete config;
+ config = nullptr;
+ }
+
+ const uint64_t nwidInt = OSUtils::jsonIntHex((*config)["nwid"], 0ULL);
+ const uint64_t memberidInt = OSUtils::jsonIntHex((*config)["id"], 0ULL);
+ if (nwidInt && memberidInt) {
+ nlohmann::json nwOrig;
+ nlohmann::json memOrig;
+
+ nlohmann::json memNew(*config);
+
+ get(nwidInt, nwOrig, memberidInt, memOrig);
+
+ _memberChanged(memOrig, memNew, (this->_ready>=2));
+ } else {
+ fprintf(stderr, "Can't notify of change. Error parsing nwid or memberid: %lu-%lu\n", nwidInt, memberidInt);
+ }
+ } else if (objtype == "network") {
+ std::string id = (*config)["id"];
+ std::string controllerId = _myAddressStr.c_str();
+ std::string name = (*config)["name"];
+ std::string rulesSource = (*config)["rulesSource"];
+ std::string caps = OSUtils::jsonDump((*config)["capabilitles"], -1);
+ std::string rtraceLevel = std::to_string((int)(*config)["remoteTraceLevel"]);
+ std::string rules = OSUtils::jsonDump((*config)["rules"], -1);
+ std::string tags = OSUtils::jsonDump((*config)["tags"], -1);
+ std::string v4mode = OSUtils::jsonDump((*config)["v4AssignMode"],-1);
+ std::string v6mode = OSUtils::jsonDump((*config)["v6AssignMode"], -1);
+ std::string target = "";
+ if (!(*config)["remoteTraceTarget"].is_null()) {
+ target = (*config)["remoteTraceTarget"];
+ }
+ try {
+ pqxx::work w(conn);
+ pqxx::result res = w.prepared("update_network")(id)(controllerId)(caps)((bool)(*config)["enableBroadcast"])
+ (OSUtils::now())((int)(*config)["mtu"])((int)(*config)["multicastLimit"])(name)((bool)(*config)["private"])
+ ((int)(*config)["remoteTraceLevel"])(target, !target.empty())
+ (rules)(rulesSource)(tags)(v4mode)(v6mode).exec();
+ w.commit();
+ } catch (std::exception &e) {
+ fprintf(stderr, "Error updating network config: %s\n", e.what());
+ delete config;
+ config = nullptr;
+ continue;
+ }
+
+ try {
+ pqxx::work w(conn);
+ pqxx::result res = w.prepared("delete_network_ip_pool")(id).exec();
+
+ auto pool = (*config)["ipAssignmentPools"];
+ for (auto i = pool.begin(); i != pool.end(); ++i) {
+ std::string start = (*i)["ipRangeStart"];
+ std::string end = (*i)["ipRangeEnd"];
+
+ pqxx::result r2 = w.prepared("insert_nework_ip_pool")(id)(start)(end).exec();
+ }
+
+
+ pqxx::result res2 = w.prepared("delete_network_route")(id).exec();
+
+ auto routes = (*config)["routes"];
+ for (auto i = routes.begin(); i != routes.end(); ++i) {
+ std::string t = (*i)["target"];
+ std::vector<std::string> target;
+ std::istringstream f(t);
+ std::string s;
+ while(std::getline(f, s, '/')) {
+ target.push_back(s);
+ }
+ if (target.empty() || target.size() != 2) {
+ continue;
+ }
+ std::string targetAddr = target[0];
+ int targetBits = std::stoi(target[1]);
+ std::string via = "";
+ if (!(*i)["via"].is_null()) {
+ via = (*i)["via"];
+ }
+
+ pqxx::result res3 = w.prepared("insert_network_route")(id)(targetAddr)(targetBits)
+ (via, !via.empty()).exec();
+ }
+
+ w.commit();
+
+ } catch (std::exception &e) {
+ fprintf(stderr, "Error updating network IP pool: %s\n", e.what());
+ }
+
+ const uint64_t nwidInt = OSUtils::jsonIntHex((*config)["nwid"], 0ULL);
+ if (nwidInt) {
+ nlohmann::json nwOrig;
+ nlohmann::json nwNew(*config);
+
+ get(nwidInt, nwOrig);
+
+ _networkChanged(nwOrig, nwNew, true);
+ } else {
+ fprintf(stderr, "Can't notify network changed: %lu\n", nwidInt);
+ }
+ } else if (objtype == "trace") {
+ fprintf(stderr, "ERROR: Trace not yet implemented");
+ } else if (objtype == "_delete_network") {
+ try {
+ std::string networkId = (*config)["nwid"];
+
+ pqxx::work w(conn);
+ pqxx::result res = w.prepared("delete_network")(networkId).exec();
+ w.commit();
+ } catch (std::exception &e) {
+ fprintf(stderr, "ERROR: Error deleting network: %s\n", e.what());
+ }
+ } else if (objtype == "_delete_member") {
+ try {
+ std::string memberId = (*config)["id"];
+ std::string networkId = (*config)["nwid"];
+
+ pqxx::work w(conn);
+ pqxx::result res = w.prepared("delete_member")(memberId)(networkId).exec();
+ w.commit();
+ } catch (std::exception &e) {
+ fprintf(stderr, "ERROR: Error deleting member: %s\n", e.what());
+ }
+ } else {
+ fprintf(stderr, "ERROR: unknown objtype");
+ }
+ } catch (std::exception &e) {
+ fprintf(stderr, "ERROR: Error getting objtype: %s\n", e.what());
+ }
+ delete config;
+ config = nullptr;
+
+ std::this_thread::sleep_for(std::chrono::milliseconds(1));
+ }
+}
+
+void PostgreSQL::onlineNotificationThread()
+{
+ pqxx::connection conn(_connString);
+ if(!conn.is_open()) {
+ fprintf(stderr, "Connection to database failed: onlineNotificationThread\n");
+ exit(1);
+ }
+ _connected = 1;
+
+ int64_t lastUpdatedNetworkStatus = 0;
+ std::unordered_map< std::pair<uint64_t,uint64_t>,int64_t,_PairHasher > lastOnlineCumulative;
+
+ while (_run == 1) {
+ // map used to send notifications to front end
+ std::unordered_map<std::string, std::vector<std::string>> updateMap;
+
+ std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > lastOnline;
+ {
+ std::lock_guard<std::mutex> l(_lastOnline_l);
+ lastOnline.swap(_lastOnline);
+ }
+
+ try {
+ pqxx::work w(conn);
+ pqxx::pipeline p(w, "Member Update Pipeline");
+ for (auto i=lastOnline.begin(); i != lastOnline.end(); ++i) {
+ uint64_t nwid_i = i->first.first;
+ char nwidTmp[64];
+ char memTmp[64];
+ char ipTmp[64];
+ OSUtils::ztsnprintf(nwidTmp,sizeof(nwidTmp), "%.16llx", nwid_i);
+ OSUtils::ztsnprintf(memTmp,sizeof(memTmp), "%.10llx", i->first.second);
+
+ auto found = _networks.find(nwid_i);
+ if (found == _networks.end()) {
+ continue; // skip members trying to join non-existant networks
+ }
+
+ lastOnlineCumulative[i->first] = i->second.first;
+
+
+ std::string networkId(nwidTmp);
+ std::string memberId(memTmp);
+
+ std::vector<std::string> &members = updateMap[networkId];
+ members.push_back(memberId);
+
+ int64_t ts = i->second.first;
+ std::string ipAddr = i->second.second.toIpString(ipTmp);
+ std::string timestamp = std::to_string(ts);
+
+ std::stringstream ss;
+ ss << "INSERT INTO ztc_member_status (network_id, member_id, address, last_updated) VALUES ("
+ << "'" << w.esc(networkId) << "', "
+ << "'" << w.esc(memberId) << "', "
+ << "'" << w.esc(ipAddr) << "', "
+ << timestamp << ") "
+ << "ON CONFLICT (network_id, member_id) DO UPDATE SET address = EXCLUDED.address, last_updated = EXCLUDED.last_updated";
+ p.insert(ss.str());
+ }
+ p.complete();
+ w.commit();
+ } catch (std::exception &e) {
+ fprintf(stderr, "Error updating member status: %s\n", e.what());
+ }
+
+ try {
+ const int64_t now = OSUtils::now();
+ if ((now - lastUpdatedNetworkStatus) > 10000) {
+ pqxx::work w(conn);
+ pqxx::pipeline p(w, "Network Update Pipeline");
+ lastUpdatedNetworkStatus = now;
+
+ std::vector<std::pair<uint64_t, std::shared_ptr<_Network>>> networks;
+ {
+ std::lock_guard<std::mutex> l(_networks_l);
+ for (auto i = _networks.begin(); i != _networks.end(); ++i) {
+ networks.push_back(*i);
+ }
+ }
+
+ for (auto i = networks.begin(); i != networks.end(); ++i) {
+ char tmp[64];
+ Utils::hex(i->first, tmp);
+
+ std::string networkId(tmp);
+
+ std::vector<std::string> &_notUsed = updateMap[networkId];
+ (void)_notUsed;
+
+ uint64_t authMemberCount = 0;
+ uint64_t totalMemberCount = 0;
+ uint64_t onlineMemberCount = 0;
+ uint64_t bridgeCount = 0;
+ uint64_t ts = now;
+ {
+ std::lock_guard<std::mutex> l2(i->second->lock);
+ authMemberCount = i->second->authorizedMembers.size();
+ totalMemberCount = i->second->members.size();
+ bridgeCount = i->second->activeBridgeMembers.size();
+ for (auto m=i->second->members.begin(); m != i->second->members.end(); ++m) {
+ auto lo = lastOnlineCumulative.find(std::pair<uint64_t,uint64_t>(i->first, m->first));
+ if (lo != lastOnlineCumulative.end()) {
+ if ((now - lo->second) <= (ZT_NETWORK_AUTOCONF_DELAY * 2)) {
+ ++onlineMemberCount;
+ } else {
+ lastOnlineCumulative.erase(lo);
+ }
+ }
+ }
+ }
+
+ std::string bc = std::to_string(bridgeCount);
+ std::string amc = std::to_string(authMemberCount);
+ std::string omc = std::to_string(onlineMemberCount);
+ std::string tmc = std::to_string(totalMemberCount);
+ std::string timestamp = std::to_string(ts);
+
+ std::stringstream ss;
+ ss << "INSERT INTO ztc_network_status (network_id, bridge_count, authorized_member_count, "
+ << "online_member_count, total_member_count, last_modified) VALUES ("
+ << "'" << w.esc(networkId) << "', "
+ << bridgeCount << ", "
+ << authMemberCount << ", "
+ << onlineMemberCount << ", "
+ << totalMemberCount << ", "
+ << "TO_TIMESTAMP(" << ts << "::double precision/1000)) "
+ << "ON CONFLICT (network_id) DO UPDATE SET bridge_count = EXCLUDED.bridge_count, "
+ << "authorized_member_count = EXCLUDED.authorized_member_count, online_member_count = EXCLUDED.online_member_count, "
+ << "total_member_count = EXCLUDED.total_member_count, last_modified = EXCLUDED.last_modified";
+ p.insert(ss.str());
+ }
+ p.complete();
+ w.commit();
+ }
+ } catch (std::exception &e) {
+ fprintf(stderr, "Error updating network status: %s\n", e.what());
+ }
+
+ try {
+ pqxx::work w(conn);
+ pqxx::pipeline p(w, "Notification Sender");
+ for (auto it = updateMap.begin(); it != updateMap.end(); ++it) {
+ std::string networkId = it->first;
+ std::vector<std::string> members = it->second;
+ std::stringstream queryBuilder;
+
+ std::string membersStr = ::join(members, ",");
+
+ queryBuilder << "NOTIFY controller, '" << networkId << ":" << membersStr << "'";
+ std::string query = queryBuilder.str();
+
+ p.insert(query);
+ }
+ p.complete();
+ w.commit();
+ } catch (std::exception &e) {
+ fprintf(stderr, "Error notifying webapp: %s\n", e.what());
+ }
+ std::this_thread::sleep_for(std::chrono::milliseconds(1));
+ }
+}
+#endif //ZT_CONTROLLER_USE_LIBPQ
diff --git a/controller/PostgreSQL.hpp b/controller/PostgreSQL.hpp
new file mode 100644
index 00000000..86aac80d
--- /dev/null
+++ b/controller/PostgreSQL.hpp
@@ -0,0 +1,97 @@
+/*
+ * ZeroTier One - Network Virtualization Everywhere
+ * Copyright (C) 2011-2018 ZeroTier, Inc.
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+#ifdef ZT_CONTROLLER_USE_LIBPQ
+
+#ifndef ZT_CONTROLLER_LIBPQ_HPP
+#define ZT_CONTROLLER_LIBPQ_HPP
+
+#include "DB.hpp"
+
+#include <pqxx/pqxx>
+
+extern "C" {
+ typedef struct pg_conn PGconn;
+}
+
+namespace ZeroTier
+{
+class _MemberNotificationReceiver;
+class _NetworkNotificationReceiver;
+
+/**
+ * A controller database driver that talks to PostgreSQL
+ *
+ * This is for use with ZeroTier Central. Others are free to build and use it
+ * but be aware taht we might change it at any time.
+ */
+class PostgreSQL : public DB
+{
+public:
+ PostgreSQL(EmbeddedNetworkController *const nc, const Identity &myId, const char *path);
+ virtual ~PostgreSQL();
+
+ virtual bool waitForReady();
+ virtual bool isReady();
+ virtual void save(nlohmann::json *orig, nlohmann::json &record);
+ virtual void eraseNetwork(const uint64_t networkId);
+ virtual void eraseMember(const uint64_t networkId, const uint64_t memberId);
+ virtual void nodeIsOnline(const uint64_t networkId, const uint64_t memberId, const InetAddress &physicalAddress);
+
+protected:
+ struct _PairHasher
+ {
+ inline std::size_t operator()(const std::pair<uint64_t,uint64_t> &p) const { return (std::size_t)(p.first ^ p.second); }
+ };
+
+private:
+ void initializeNetworks(pqxx::connection &conn);
+ void initializeMembers(pqxx::connection &conn);
+ void heartbeat();
+ void membersDbWatcher();
+ void networksDbWatcher();
+ void commitThread();
+ void onlineNotificationThread();
+
+ std::string _connString;
+
+ BlockingQueue<nlohmann::json *> _commitQueue;
+
+
+ std::thread _heartbeatThread;
+ std::thread _membersDbWatcher;
+ std::thread _networksDbWatcher;
+ std::thread _commitThread[ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS];
+ std::thread _onlineNotificationThread;
+
+ std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > _lastOnline;
+
+ mutable std::mutex _lastOnline_l;
+ mutable std::mutex _readyLock;
+ std::atomic<int> _ready, _connected, _run;
+ mutable volatile bool _waitNoticePrinted;
+
+ friend class _MemberNotificationReceiver;
+ friend class _NetworkNotificationReceiver;
+};
+
+}
+
+#endif // ZT_CONTROLLER_LIBPQ_HPP
+
+#endif // ZT_CONTROLLER_USE_LIBPQ \ No newline at end of file
diff --git a/controller/RethinkDB.cpp b/controller/RethinkDB.cpp
deleted file mode 100644
index a46d033f..00000000
--- a/controller/RethinkDB.cpp
+++ /dev/null
@@ -1,497 +0,0 @@
-/*
- * ZeroTier One - Network Virtualization Everywhere
- * Copyright (C) 2011-2018 ZeroTier, Inc.
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
-
-//#define ZT_CONTROLLER_USE_RETHINKDB
-
-#ifdef ZT_CONTROLLER_USE_RETHINKDB
-
-#include <stdio.h>
-#include <stdlib.h>
-#include <unistd.h>
-#include <time.h>
-
-#include "RethinkDB.hpp"
-#include "EmbeddedNetworkController.hpp"
-
-#include "../version.h"
-
-#include <chrono>
-#include <algorithm>
-#include <stdexcept>
-
-#include "../ext/librethinkdbxx/build/include/rethinkdb.h"
-
-namespace R = RethinkDB;
-using json = nlohmann::json;
-
-namespace ZeroTier {
-
-static const char *_timestr()
-{
- time_t t = time(0);
- char *ts = ctime(&t);
- char *p = ts;
- if (!p)
- return "";
- while (*p) {
- if (*p == '\n') {
- *p = (char)0;
- break;
- }
- ++p;
- }
- return ts;
-}
-
-RethinkDB::RethinkDB(EmbeddedNetworkController *const nc,const Identity &myId,const char *path) :
- DB(nc,myId,path),
- _ready(2), // two tables need to be synchronized before we're ready, so this is ready when it reaches 0
- _run(1),
- _waitNoticePrinted(false)
-{
- // rethinkdb:host:port:db[:auth]
- std::vector<std::string> ps(OSUtils::split(path,":","",""));
- if ((ps.size() < 4)||(ps[0] != "rethinkdb"))
- throw std::runtime_error("invalid rethinkdb database url");
- _host = ps[1];
- _port = Utils::strToInt(ps[2].c_str());
- _db = ps[3];
- if (ps.size() > 4)
- _auth = ps[4];
-
- _readyLock.lock();
-
- _membersDbWatcher = std::thread([this]() {
- try {
- while (_run == 1) {
- try {
- std::unique_ptr<R::Connection> rdb(R::connect(this->_host,this->_port,this->_auth));
- if (rdb) {
- _membersDbWatcherConnection = (void *)rdb.get();
- auto cur = R::db(this->_db).table("Member",R::optargs("read_mode","outdated")).get_all(this->_myAddressStr,R::optargs("index","controllerId")).changes(R::optargs("squash",0.05,"include_initial",true,"include_types",true,"include_states",true)).run(*rdb);
- while (cur.has_next()) {
- if (_run != 1) break;
- json tmp(json::parse(cur.next().as_json()));
- if ((tmp["type"] == "state")&&(tmp["state"] == "ready")) {
- if (--this->_ready == 0) {
- if (_waitNoticePrinted)
- fprintf(stderr,"[%s] NOTICE: %.10llx controller RethinkDB data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
- this->_readyLock.unlock();
- }
- } else {
- try {
- json &ov = tmp["old_val"];
- json &nv = tmp["new_val"];
- json oldConfig,newConfig;
- if (ov.is_object()) oldConfig = ov["config"];
- if (nv.is_object()) newConfig = nv["config"];
- if (oldConfig.is_object()||newConfig.is_object())
- this->_memberChanged(oldConfig,newConfig,(this->_ready <= 0));
- } catch ( ... ) {} // ignore bad records
- }
- }
- }
- } catch (std::exception &e) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (member change stream): %s" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),e.what());
- } catch (R::Error &e) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (member change stream): %s" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),e.message.c_str());
- } catch ( ... ) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (member change stream): unknown exception" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
- }
- std::this_thread::sleep_for(std::chrono::milliseconds(250));
- }
- } catch ( ... ) {}
- });
-
- _networksDbWatcher = std::thread([this]() {
- try {
- while (_run == 1) {
- try {
- std::unique_ptr<R::Connection> rdb(R::connect(this->_host,this->_port,this->_auth));
- if (rdb) {
- _networksDbWatcherConnection = (void *)rdb.get();
- auto cur = R::db(this->_db).table("Network",R::optargs("read_mode","outdated")).get_all(this->_myAddressStr,R::optargs("index","controllerId")).changes(R::optargs("squash",0.05,"include_initial",true,"include_types",true,"include_states",true)).run(*rdb);
- while (cur.has_next()) {
- if (_run != 1) break;
- json tmp(json::parse(cur.next().as_json()));
- if ((tmp["type"] == "state")&&(tmp["state"] == "ready")) {
- if (--this->_ready == 0) {
- if (_waitNoticePrinted)
- fprintf(stderr,"[%s] NOTICE: %.10llx controller RethinkDB data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
- this->_readyLock.unlock();
- }
- } else {
- try {
- json &ov = tmp["old_val"];
- json &nv = tmp["new_val"];
- json oldConfig,newConfig;
- if (ov.is_object()) oldConfig = ov["config"];
- if (nv.is_object()) newConfig = nv["config"];
- if (oldConfig.is_object()||newConfig.is_object())
- this->_networkChanged(oldConfig,newConfig,(this->_ready <= 0));
- } catch ( ... ) {} // ignore bad records
- }
- }
- }
- } catch (std::exception &e) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (network change stream): %s" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),e.what());
- } catch (R::Error &e) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (network change stream): %s" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),e.message.c_str());
- } catch ( ... ) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (network change stream): unknown exception" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
- }
- std::this_thread::sleep_for(std::chrono::milliseconds(250));
- }
- } catch ( ... ) {}
- });
-
- for(int t=0;t<ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS;++t) {
- _commitThread[t] = std::thread([this]() {
- try {
- std::unique_ptr<R::Connection> rdb;
- nlohmann::json *config = (nlohmann::json *)0;
- while ((this->_commitQueue.get(config))&&(_run == 1)) {
- if (!config)
- continue;
- nlohmann::json record;
- const char *table = (const char *)0;
- std::string deleteId;
- try {
- const std::string objtype = (*config)["objtype"];
- if (objtype == "member") {
- const std::string nwid = (*config)["nwid"];
- const std::string id = (*config)["id"];
- record["id"] = nwid + "-" + id;
- record["controllerId"] = this->_myAddressStr;
- record["networkId"] = nwid;
- record["nodeId"] = id;
- record["config"] = *config;
- table = "Member";
- } else if (objtype == "network") {
- const std::string id = (*config)["id"];
- record["id"] = id;
- record["controllerId"] = this->_myAddressStr;
- record["config"] = *config;
- table = "Network";
- } else if (objtype == "trace") {
- record = *config;
- table = "RemoteTrace";
- } else if (objtype == "_delete_network") {
- deleteId = (*config)["id"];
- table = "Network";
- } else if (objtype == "_delete_member") {
- deleteId = (*config)["nwid"];
- deleteId.push_back('-');
- const std::string tmp = (*config)["id"];
- deleteId.append(tmp);
- table = "Member";
- }
- } catch (std::exception &e) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (insert/update record creation): %s" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),e.what());
- table = (const char *)0;
- } catch (R::Error &e) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (insert/update record creation): %s" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),e.message.c_str());
- table = (const char *)0;
- } catch ( ... ) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (insert/update record creation): unknown exception" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
- table = (const char *)0;
- }
- delete config;
- if (!table)
- continue;
- const std::string jdump(OSUtils::jsonDump(record,-1));
-
- while (_run == 1) {
- try {
- if (!rdb)
- rdb = R::connect(this->_host,this->_port,this->_auth);
- if (rdb) {
- if (deleteId.length() > 0) {
- //printf("DELETE: %s" ZT_EOL_S,deleteId.c_str());
- R::db(this->_db).table(table).get(deleteId).delete_().run(*rdb);
- } else {
- //printf("UPSERT: %s" ZT_EOL_S,record.dump().c_str());
- R::db(this->_db).table(table).insert(R::Datum::from_json(jdump),R::optargs("conflict","update","return_changes",false)).run(*rdb);
- }
- break;
- } else {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (insert/update): connect failed (will retry)" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
- rdb.reset();
- }
- } catch (std::exception &e) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (insert/update): %s [%s]" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),e.what(),jdump.c_str());
- rdb.reset();
- } catch (R::Error &e) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (insert/update): %s [%s]" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),e.message.c_str(),jdump.c_str());
- rdb.reset();
- } catch ( ... ) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (insert/update): unknown exception [%s]" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),jdump.c_str());
- rdb.reset();
- }
- std::this_thread::sleep_for(std::chrono::milliseconds(250));
- }
- }
- } catch (std::exception &e) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (insert/update outer loop): %s" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),e.what());
- } catch (R::Error &e) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (insert/update outer loop): %s" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),e.message.c_str());
- } catch ( ... ) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (insert/update outer loop): unknown exception" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
- }
- });
- }
-
- _onlineNotificationThread = std::thread([this]() {
- int64_t lastUpdatedNetworkStatus = 0;
- std::unordered_map< std::pair<uint64_t,uint64_t>,int64_t,_PairHasher > lastOnlineCumulative;
- try {
- std::unique_ptr<R::Connection> rdb;
- while (_run == 1) {
- try {
- if (!rdb) {
- _connected = 0;
- rdb = R::connect(this->_host,this->_port,this->_auth);
- }
-
- if (rdb) {
- _connected = 1;
- R::Array batch;
- R::Object tmpobj;
-
- std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > lastOnline;
- {
- std::lock_guard<std::mutex> l(_lastOnline_l);
- lastOnline.swap(_lastOnline);
- }
-
- for(auto i=lastOnline.begin();i!=lastOnline.end();++i) {
- lastOnlineCumulative[i->first] = i->second.first;
- char tmp[64],tmp2[64];
- OSUtils::ztsnprintf(tmp,sizeof(tmp),"%.16llx-%.10llx",i->first.first,i->first.second);
- tmpobj["id"] = tmp;
- tmpobj["ts"] = i->second.first;
- tmpobj["phy"] = i->second.second.toIpString(tmp2);
- batch.emplace_back(tmpobj);
- if (batch.size() >= 1024) {
- R::db(this->_db).table("MemberStatus",R::optargs("read_mode","outdated")).insert(batch,R::optargs("conflict","update")).run(*rdb);
- batch.clear();
- }
- }
- if (batch.size() > 0) {
- R::db(this->_db).table("MemberStatus",R::optargs("read_mode","outdated")).insert(batch,R::optargs("conflict","update")).run(*rdb);
- batch.clear();
- }
- tmpobj.clear();
-
- const int64_t now = OSUtils::now();
- if ((now - lastUpdatedNetworkStatus) > 10000) {
- lastUpdatedNetworkStatus = now;
-
- std::vector< std::pair< uint64_t,std::shared_ptr<_Network> > > networks;
- {
- std::lock_guard<std::mutex> l(_networks_l);
- networks.reserve(_networks.size() + 1);
- for(auto i=_networks.begin();i!=_networks.end();++i)
- networks.push_back(*i);
- }
-
- for(auto i=networks.begin();i!=networks.end();++i) {
- char tmp[64];
- Utils::hex(i->first,tmp);
- tmpobj["id"] = tmp;
- {
- std::lock_guard<std::mutex> l2(i->second->lock);
- tmpobj["authorizedMemberCount"] = i->second->authorizedMembers.size();
- tmpobj["totalMemberCount"] = i->second->members.size();
- unsigned long onlineMemberCount = 0;
- for(auto m=i->second->members.begin();m!=i->second->members.end();++m) {
- auto lo = lastOnlineCumulative.find(std::pair<uint64_t,uint64_t>(i->first,m->first));
- if (lo != lastOnlineCumulative.end()) {
- if ((now - lo->second) <= (ZT_NETWORK_AUTOCONF_DELAY * 2))
- ++onlineMemberCount;
- else lastOnlineCumulative.erase(lo);
- }
- }
- tmpobj["onlineMemberCount"] = onlineMemberCount;
- tmpobj["bridgeCount"] = i->second->activeBridgeMembers.size();
- tmpobj["ts"] = now;
- }
- batch.emplace_back(tmpobj);
- if (batch.size() >= 1024) {
- R::db(this->_db).table("NetworkStatus",R::optargs("read_mode","outdated")).insert(batch,R::optargs("conflict","update")).run(*rdb);
- batch.clear();
- }
- }
- if (batch.size() > 0) {
- R::db(this->_db).table("NetworkStatus",R::optargs("read_mode","outdated")).insert(batch,R::optargs("conflict","update")).run(*rdb);
- batch.clear();
- }
- }
- }
- } catch (std::exception &e) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (node status update): %s" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),e.what());
- rdb.reset();
- } catch (R::Error &e) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (node status update): %s" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt(),e.message.c_str());
- rdb.reset();
- } catch ( ... ) {
- fprintf(stderr,"[%s] ERROR: %.10llx controller RethinkDB (node status update): unknown exception" ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
- rdb.reset();
- }
- std::this_thread::sleep_for(std::chrono::milliseconds(250));
- }
- } catch ( ... ) {}
- });
-
- _heartbeatThread = std::thread([this]() {
- try {
- R::Object controllerRecord;
- std::unique_ptr<R::Connection> rdb;
-
- {
- char publicId[1024];
- //char secretId[1024];
- char hostname[1024];
- this->_myId.toString(false,publicId);
- //this->_myId.toString(true,secretId);
- if (gethostname(hostname,sizeof(hostname)) != 0) {
- hostname[0] = (char)0;
- } else {
- for(int i=0;i<sizeof(hostname);++i) {
- if ((hostname[i] == '.')||(hostname[i] == 0)) {
- hostname[i] = (char)0;
- break;
- }
- }
- }
- controllerRecord["id"] = this->_myAddressStr.c_str();
- controllerRecord["publicIdentity"] = publicId;
- //controllerRecord["secretIdentity"] = secretId;
- if (hostname[0])
- controllerRecord["clusterHost"] = hostname;
- controllerRecord["vMajor"] = ZEROTIER_ONE_VERSION_MAJOR;
- controllerRecord["vMinor"] = ZEROTIER_ONE_VERSION_MINOR;
- controllerRecord["vRev"] = ZEROTIER_ONE_VERSION_REVISION;
- controllerRecord["vBuild"] = ZEROTIER_ONE_VERSION_BUILD;
- }
-
- while (_run == 1) {
- try {
- if (!rdb)
- rdb = R::connect(this->_host,this->_port,this->_auth);
- if (rdb) {
- controllerRecord["lastAlive"] = OSUtils::now();
- //printf("HEARTBEAT: %s" ZT_EOL_S,tmp);
- R::db(this->_db).table("Controller",R::optargs("read_mode","outdated")).insert(controllerRecord,R::optargs("conflict","update")).run(*rdb);
- }
- } catch ( ... ) {
- rdb.reset();
- }
- std::this_thread::sleep_for(std::chrono::milliseconds(1000));
- }
- } catch ( ... ) {}
- });
-}
-
-RethinkDB::~RethinkDB()
-{
- _run = 0;
- std::this_thread::sleep_for(std::chrono::milliseconds(100));
- _commitQueue.stop();
- for(int t=0;t<ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS;++t)
- _commitThread[t].join();
- if (_membersDbWatcherConnection)
- ((R::Connection *)_membersDbWatcherConnection)->close();
- if (_networksDbWatcherConnection)
- ((R::Connection *)_networksDbWatcherConnection)->close();
- _membersDbWatcher.join();
- _networksDbWatcher.join();
- _heartbeatThread.join();
- _onlineNotificationThread.join();
-}
-
-bool RethinkDB::waitForReady()
-{
- while (_ready > 0) {
- if (!_waitNoticePrinted) {
- _waitNoticePrinted = true;
- fprintf(stderr,"[%s] NOTICE: %.10llx controller RethinkDB waiting for initial data download..." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());
- }
- _readyLock.lock();
- _readyLock.unlock();
- }
- return true;
-}
-
-bool RethinkDB::isReady()
-{
- return ((_ready)&&(_connected));
-}
-
-void RethinkDB::save(nlohmann::json *orig,nlohmann::json &record)
-{
- if (!record.is_object()) // sanity check
- return;
- waitForReady();
- if (orig) {
- if (*orig != record) {
- record["revision"] = OSUtils::jsonInt(record["revision"],0ULL) + 1;
- _commitQueue.post(new nlohmann::json(record));
- }
- } else {
- record["revision"] = 1;
- _commitQueue.post(new nlohmann::json(record));
- }
-}
-
-void RethinkDB::eraseNetwork(const uint64_t networkId)
-{
- char tmp2[24];
- waitForReady();
- Utils::hex(networkId,tmp2);
- json *tmp = new json();
- (*tmp)["id"] = tmp2;
- (*tmp)["objtype"] = "_delete_network"; // pseudo-type, tells thread to delete network
- _commitQueue.post(tmp);
-}
-
-void RethinkDB::eraseMember(const uint64_t networkId,const uint64_t memberId)
-{
- char tmp2[24];
- json *tmp = new json();
- waitForReady();
- Utils::hex(networkId,tmp2);
- (*tmp)["nwid"] = tmp2;
- Utils::hex10(memberId,tmp2);
- (*tmp)["id"] = tmp2;
- (*tmp)["objtype"] = "_delete_member"; // pseudo-type, tells thread to delete network
- _commitQueue.post(tmp);
-}
-
-void RethinkDB::nodeIsOnline(const uint64_t networkId,const uint64_t memberId,const InetAddress &physicalAddress)
-{
- std::lock_guard<std::mutex> l(_lastOnline_l);
- std::pair<int64_t,InetAddress> &i = _lastOnline[std::pair<uint64_t,uint64_t>(networkId,memberId)];
- i.first = OSUtils::now();
- if (physicalAddress)
- i.second = physicalAddress;
-}
-
-} // namespace ZeroTier
-
-#endif // ZT_CONTROLLER_USE_RETHINKDB
diff --git a/controller/RethinkDB.hpp b/controller/RethinkDB.hpp
deleted file mode 100644
index 60f04c5b..00000000
--- a/controller/RethinkDB.hpp
+++ /dev/null
@@ -1,84 +0,0 @@
-/*
- * ZeroTier One - Network Virtualization Everywhere
- * Copyright (C) 2011-2018 ZeroTier, Inc.
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
-
-#ifdef ZT_CONTROLLER_USE_RETHINKDB
-
-#ifndef ZT_CONTROLLER_RETHINKDB_HPP
-#define ZT_CONTROLLER_RETHINKDB_HPP
-
-#include "DB.hpp"
-
-#define ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS 4
-
-namespace ZeroTier
-{
-
-/**
- * A controller database driver that talks to RethinkDB
- *
- * This is for use with ZeroTier Central. Others are free to build and use it
- * but be aware that we might change it at any time.
- */
-class RethinkDB : public DB
-{
-public:
- RethinkDB(EmbeddedNetworkController *const nc,const Identity &myId,const char *path);
- virtual ~RethinkDB();
-
- virtual bool waitForReady();
- virtual bool isReady();
- virtual void save(nlohmann::json *orig,nlohmann::json &record);
- virtual void eraseNetwork(const uint64_t networkId);
- virtual void eraseMember(const uint64_t networkId,const uint64_t memberId);
- virtual void nodeIsOnline(const uint64_t networkId,const uint64_t memberId,const InetAddress &physicalAddress);
-
-protected:
- struct _PairHasher
- {
- inline std::size_t operator()(const std::pair<uint64_t,uint64_t> &p) const { return (std::size_t)(p.first ^ p.second); }
- };
-
- std::string _host;
- std::string _db;
- std::string _auth;
- int _port;
-
- void *_networksDbWatcherConnection;
- void *_membersDbWatcherConnection;
- std::thread _networksDbWatcher;
- std::thread _membersDbWatcher;
-
- BlockingQueue< nlohmann::json * > _commitQueue;
- std::thread _commitThread[ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS];
-
- std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > _lastOnline;
- mutable std::mutex _lastOnline_l;
- std::thread _onlineNotificationThread;
-
- std::thread _heartbeatThread;
-
- mutable std::mutex _readyLock; // locked until ready
- std::atomic<int> _ready,_connected,_run;
- mutable volatile bool _waitNoticePrinted;
-};
-
-} // namespace ZeroTier
-
-#endif
-
-#endif // ZT_CONTROLLER_USE_RETHINKDB