summaryrefslogtreecommitdiff
path: root/zerotierone/node/Network.hpp
diff options
context:
space:
mode:
Diffstat (limited to 'zerotierone/node/Network.hpp')
-rw-r--r--zerotierone/node/Network.hpp353
1 files changed, 353 insertions, 0 deletions
diff --git a/zerotierone/node/Network.hpp b/zerotierone/node/Network.hpp
new file mode 100644
index 0000000..9d280fb
--- /dev/null
+++ b/zerotierone/node/Network.hpp
@@ -0,0 +1,353 @@
+/*
+ * ZeroTier One - Network Virtualization Everywhere
+ * Copyright (C) 2011-2016 ZeroTier, Inc. https://www.zerotier.com/
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+#ifndef ZT_NETWORK_HPP
+#define ZT_NETWORK_HPP
+
+#include <stdint.h>
+
+#include "../include/ZeroTierOne.h"
+
+#include <string>
+#include <map>
+#include <vector>
+#include <algorithm>
+#include <stdexcept>
+
+#include "Constants.hpp"
+#include "NonCopyable.hpp"
+#include "Hashtable.hpp"
+#include "Address.hpp"
+#include "Mutex.hpp"
+#include "SharedPtr.hpp"
+#include "AtomicCounter.hpp"
+#include "MulticastGroup.hpp"
+#include "MAC.hpp"
+#include "Dictionary.hpp"
+#include "Multicaster.hpp"
+#include "NetworkConfig.hpp"
+#include "CertificateOfMembership.hpp"
+
+namespace ZeroTier {
+
+class RuntimeEnvironment;
+class Peer;
+class _MulticastAnnounceAll;
+
+/**
+ * A virtual LAN
+ */
+class Network : NonCopyable
+{
+ friend class SharedPtr<Network>;
+ friend class _MulticastAnnounceAll; // internal function object
+
+public:
+ /**
+ * Broadcast multicast group: ff:ff:ff:ff:ff:ff / 0
+ */
+ static const MulticastGroup BROADCAST;
+
+ /**
+ * Construct a new network
+ *
+ * Note that init() should be called immediately after the network is
+ * constructed to actually configure the port.
+ *
+ * @param renv Runtime environment
+ * @param nwid Network ID
+ * @param uptr Arbitrary pointer used by externally-facing API (for user use)
+ */
+ Network(const RuntimeEnvironment *renv,uint64_t nwid,void *uptr);
+
+ ~Network();
+
+ /**
+ * @return Network ID
+ */
+ inline uint64_t id() const throw() { return _id; }
+
+ /**
+ * @return Address of network's controller (most significant 40 bits of ID)
+ */
+ inline Address controller() const throw() { return Address(_id >> 24); }
+
+ /**
+ * @param nwid Network ID
+ * @return Address of network's controller
+ */
+ static inline Address controllerFor(uint64_t nwid) throw() { return Address(nwid >> 24); }
+
+ /**
+ * @return Multicast group memberships for this network's port (local, not learned via bridging)
+ */
+ inline std::vector<MulticastGroup> multicastGroups() const
+ {
+ Mutex::Lock _l(_lock);
+ return _myMulticastGroups;
+ }
+
+ /**
+ * @return All multicast groups including learned groups that are behind any bridges we're attached to
+ */
+ inline std::vector<MulticastGroup> allMulticastGroups() const
+ {
+ Mutex::Lock _l(_lock);
+ return _allMulticastGroups();
+ }
+
+ /**
+ * @param mg Multicast group
+ * @param includeBridgedGroups If true, also include any groups we've learned via bridging
+ * @return True if this network endpoint / peer is a member
+ */
+ bool subscribedToMulticastGroup(const MulticastGroup &mg,bool includeBridgedGroups) const;
+
+ /**
+ * Subscribe to a multicast group
+ *
+ * @param mg New multicast group
+ */
+ void multicastSubscribe(const MulticastGroup &mg);
+
+ /**
+ * Unsubscribe from a multicast group
+ *
+ * @param mg Multicast group
+ */
+ void multicastUnsubscribe(const MulticastGroup &mg);
+
+ /**
+ * Announce multicast groups to a peer if that peer is authorized on this network
+ *
+ * @param peer Peer to try to announce multicast groups to
+ * @return True if peer was authorized and groups were announced
+ */
+ bool tryAnnounceMulticastGroupsTo(const SharedPtr<Peer> &peer);
+
+ /**
+ * Apply a NetworkConfig to this network
+ *
+ * @param conf Configuration in NetworkConfig form
+ * @return True if configuration was accepted
+ */
+ bool applyConfiguration(const NetworkConfig &conf);
+
+ /**
+ * Set or update this network's configuration
+ *
+ * @param confBytes Network configuration in old-style Dictionary or new-style serialized format
+ * @param confLen Length of network configuration in bytes
+ * @param saveToDisk IF true (default), write config to disk
+ * @return 0 -- rejected, 1 -- accepted but not new, 2 -- accepted new config
+ */
+ int setConfiguration(const void *confBytes,unsigned int confLen,bool saveToDisk);
+
+ /**
+ * Set netconf failure to 'access denied' -- called in IncomingPacket when controller reports this
+ */
+ inline void setAccessDenied()
+ {
+ Mutex::Lock _l(_lock);
+ _netconfFailure = NETCONF_FAILURE_ACCESS_DENIED;
+ }
+
+ /**
+ * Set netconf failure to 'not found' -- called by PacketDecider when controller reports this
+ */
+ inline void setNotFound()
+ {
+ Mutex::Lock _l(_lock);
+ _netconfFailure = NETCONF_FAILURE_NOT_FOUND;
+ }
+
+ /**
+ * Causes this network to request an updated configuration from its master node now
+ */
+ void requestConfiguration();
+
+ /**
+ * @param peer Peer to check
+ * @return True if peer is allowed to communicate on this network
+ */
+ inline bool isAllowed(const SharedPtr<Peer> &peer) const
+ {
+ Mutex::Lock _l(_lock);
+ return _isAllowed(peer);
+ }
+
+ /**
+ * Perform cleanup and possibly save state
+ */
+ void clean();
+
+ /**
+ * @return Time of last updated configuration or 0 if none
+ */
+ inline uint64_t lastConfigUpdate() const throw() { return _lastConfigUpdate; }
+
+ /**
+ * @return Status of this network
+ */
+ inline ZT_VirtualNetworkStatus status() const
+ {
+ Mutex::Lock _l(_lock);
+ return _status();
+ }
+
+ /**
+ * @param ec Buffer to fill with externally-visible network configuration
+ */
+ inline void externalConfig(ZT_VirtualNetworkConfig *ec) const
+ {
+ Mutex::Lock _l(_lock);
+ _externalConfig(ec);
+ }
+
+ /**
+ * Get current network config
+ *
+ * This returns a const reference to the network config in place, which is safe
+ * to concurrently access but *may* change during access. Normally this isn't a
+ * problem, but if it is use configCopy().
+ *
+ * @return Network configuration (may be a null config if we don't have one yet)
+ */
+ inline const NetworkConfig &config() const { return _config; }
+
+ /**
+ * @return A thread-safe copy of our NetworkConfig instead of a const reference
+ */
+ inline NetworkConfig configCopy() const
+ {
+ Mutex::Lock _l(_lock);
+ return _config;
+ }
+
+ /**
+ * @return True if this network has a valid config
+ */
+ inline bool hasConfig() const { return (_config); }
+
+ /**
+ * @return Ethernet MAC address for this network's local interface
+ */
+ inline const MAC &mac() const throw() { return _mac; }
+
+ /**
+ * Find the node on this network that has this MAC behind it (if any)
+ *
+ * @param mac MAC address
+ * @return ZeroTier address of bridge to this MAC
+ */
+ inline Address findBridgeTo(const MAC &mac) const
+ {
+ Mutex::Lock _l(_lock);
+ const Address *const br = _remoteBridgeRoutes.get(mac);
+ if (br)
+ return *br;
+ return Address();
+ }
+
+ /**
+ * Set a bridge route
+ *
+ * @param mac MAC address of destination
+ * @param addr Bridge this MAC is reachable behind
+ */
+ void learnBridgeRoute(const MAC &mac,const Address &addr);
+
+ /**
+ * Learn a multicast group that is bridged to our tap device
+ *
+ * @param mg Multicast group
+ * @param now Current time
+ */
+ void learnBridgedMulticastGroup(const MulticastGroup &mg,uint64_t now);
+
+ /**
+ * @return True if traffic on this network's tap is enabled
+ */
+ inline bool enabled() const throw() { return _enabled; }
+
+ /**
+ * @param enabled Should traffic be allowed on this network?
+ */
+ void setEnabled(bool enabled);
+
+ /**
+ * Destroy this network
+ *
+ * This causes the network to disable itself, destroy its tap device, and on
+ * delete to delete all trace of itself on disk and remove any persistent tap
+ * device instances. Call this when a network is being removed from the system.
+ */
+ void destroy();
+
+ /**
+ * @return Pointer to user PTR (modifiable user ptr used in API)
+ */
+ inline void **userPtr() throw() { return &_uPtr; }
+
+ inline bool operator==(const Network &n) const throw() { return (_id == n._id); }
+ inline bool operator!=(const Network &n) const throw() { return (_id != n._id); }
+ inline bool operator<(const Network &n) const throw() { return (_id < n._id); }
+ inline bool operator>(const Network &n) const throw() { return (_id > n._id); }
+ inline bool operator<=(const Network &n) const throw() { return (_id <= n._id); }
+ inline bool operator>=(const Network &n) const throw() { return (_id >= n._id); }
+
+private:
+ ZT_VirtualNetworkStatus _status() const;
+ void _externalConfig(ZT_VirtualNetworkConfig *ec) const; // assumes _lock is locked
+ bool _isAllowed(const SharedPtr<Peer> &peer) const;
+ void _announceMulticastGroups();
+ void _announceMulticastGroupsTo(const SharedPtr<Peer> &peer,const std::vector<MulticastGroup> &allMulticastGroups) const;
+ std::vector<MulticastGroup> _allMulticastGroups() const;
+
+ const RuntimeEnvironment *RR;
+ void *_uPtr;
+ uint64_t _id;
+ MAC _mac; // local MAC address
+ volatile bool _enabled;
+ volatile bool _portInitialized;
+
+ std::vector< MulticastGroup > _myMulticastGroups; // multicast groups that we belong to (according to tap)
+ Hashtable< MulticastGroup,uint64_t > _multicastGroupsBehindMe; // multicast groups that seem to be behind us and when we last saw them (if we are a bridge)
+ Hashtable< MAC,Address > _remoteBridgeRoutes; // remote addresses where given MACs are reachable (for tracking devices behind remote bridges)
+
+ NetworkConfig _config;
+ volatile uint64_t _lastConfigUpdate;
+
+ volatile bool _destroyed;
+
+ enum {
+ NETCONF_FAILURE_NONE,
+ NETCONF_FAILURE_ACCESS_DENIED,
+ NETCONF_FAILURE_NOT_FOUND,
+ NETCONF_FAILURE_INIT_FAILED
+ } _netconfFailure;
+ volatile int _portError; // return value from port config callback
+
+ Mutex _lock;
+
+ AtomicCounter __refCount;
+};
+
+} // naemspace ZeroTier
+
+#endif