| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481 | /* * ZeroTier One - Network Virtualization Everywhere * Copyright (C) 2011-2015  ZeroTier, Inc. * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program.  If not, see <http://www.gnu.org/licenses/>. * * -- * * ZeroTier may be used and distributed under the terms of the GPLv3, which * are available at: http://www.gnu.org/licenses/gpl-3.0.html * * If you would like to embed ZeroTier into a commercial application or * redistribute it in a modified binary form, please contact ZeroTier Networks * LLC. Start here: http://www.zerotier.com/ */#include <stdint.h>#include <stdio.h>#include <stdlib.h>#include <string.h>#include <time.h>#include <sys/time.h>#include <sys/types.h>#include <algorithm>#include <utility>#include <stdexcept>#include "SqliteNetworkController.hpp"#include "../node/Utils.hpp"#include "../node/CertificateOfMembership.hpp"#include "../node/NetworkConfig.hpp"#include "../osdep/OSUtils.hpp"// Include ZT_NETCONF_SCHEMA_SQL constant to init database#include "schema.sql.c"// Stored in database as schemaVersion key in Config.// If not present, database is assumed to be empty and at the current schema version// and this key/value is added automatically.#define ZT_NETCONF_SQLITE_SCHEMA_VERSION 1#define ZT_NETCONF_SQLITE_SCHEMA_VERSION_STR "1"namespace ZeroTier {SqliteNetworkController::SqliteNetworkController(const char *dbPath) :	_dbPath(dbPath),	_db((sqlite3 *)0){	if (sqlite3_open_v2(dbPath,&_db,SQLITE_OPEN_READWRITE|SQLITE_OPEN_CREATE,(const char *)0) != SQLITE_OK)		throw std::runtime_error("SqliteNetworkController cannot open database file");	sqlite3_busy_timeout(_db,10000);	sqlite3_stmt *s = (sqlite3_stmt *)0;	if ((sqlite3_prepare_v2(_db,"SELECT 'v' FROM Config WHERE 'k' = 'schemaVersion';",-1,&s,(const char **)0) == SQLITE_OK)&&(s)) {		int schemaVersion = -1234;		if (sqlite3_step(s) == SQLITE_ROW)			schemaVersion = sqlite3_column_int(s,0);		sqlite3_finalize(s);		if (schemaVersion == -1234) {			sqlite3_close(_db);			throw std::runtime_error("SqliteNetworkController schemaVersion not found in Config table (init failure?)");		} else if (schemaVersion != ZT_NETCONF_SQLITE_SCHEMA_VERSION) {			// Note -- this will eventually run auto-upgrades so this isn't how it'll work going forward			sqlite3_close(_db);			throw std::runtime_error("SqliteNetworkController database schema version mismatch");		}	} else {		// Prepare statement will fail if Config table doesn't exist, which means our DB		// needs to be initialized.		if (sqlite3_exec(_db,ZT_NETCONF_SCHEMA_SQL"INSERT INTO Config (k,v) VALUES ('schemaVersion',"ZT_NETCONF_SQLITE_SCHEMA_VERSION_STR");",0,0,0) != SQLITE_OK) {			sqlite3_close(_db);			throw std::runtime_error("SqliteNetworkController cannot initialize database and/or insert schemaVersion into Config table");		}	}	if (			  (sqlite3_prepare_v2(_db,"SELECT 'name','private','enableBroadcast','allowPassiveBridging','v4AssignMode','v6AssignMode','multicastLimit','revision' FROM Network WHERE 'id' = ?",-1,&_sGetNetworkById,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"SELECT rowid,'cachedNetconf','cachedNetconfRevision','clientReportedRevision','authorized','activeBridge' FROM Member WHERE 'networkId' = ? AND 'nodeId' = ?",-1,&_sGetMemberByNetworkAndNodeId,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"INSERT INTO Member ('networkId','nodeId','cachedNetconfRevision','clientReportedRevision','authorized','activeBridge') VALUES (?,?,0,0,?,0)",-1,&_sCreateMember,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"SELECT 'identity' FROM Node WHERE 'id' = ?",-1,&_sGetNodeIdentity,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"INSERT INTO Node ('id','identity','lastAt','lastSeen','firstSeen') VALUES (?,?,?,?,?)",-1,&_sCreateNode,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"UPDATE Node SET 'lastAt' = ?,'lastSeen' = ? WHERE 'id' = ?",-1,&_sUpdateNode,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"UPDATE Node SET 'lastSeen' = ? WHERE 'id' = ?",-1,&_sUpdateNode2,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"UPDATE Member SET 'clientReportedRevision' = ? WHERE rowid = ?",-1,&_sUpdateMemberClientReportedRevision,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"SELECT 'etherType' FROM Rule WHERE 'networkId' = ? AND 'action' = 'accept'",-1,&_sGetEtherTypesFromRuleTable,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"SELECT 'mgMac','mgAdi','preload','maxBalance','accrual' FROM MulticastRate WHERE 'networkId' = ?",-1,&_sGetMulticastRates,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"SELECT 'nodeId' FROM Member WHERE 'networkId' = ? AND 'authorized' > 0 AND 'activeBridge' > 0",-1,&_sGetActiveBridges,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"SELECT DISTINCT 'ip','ipNetmaskBits' FROM IpAssignment WHERE 'networkId' = ? AND 'nodeId' = ? AND 'ipVersion' = ?",-1,&_sGetIpAssignmentsForNode,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"SELECT DISTINCT 'ipNetwork','ipNetmaskBits' FROM IpAssignmentPool WHERE 'networkId' = ? AND 'ipVersion' = ? AND 'active' > 0",-1,&_sGetIpAssignmentPools,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"SELECT 1 FROM IpAssignment WHERE 'networkId' = ? AND 'ip' = ? AND 'ipVersion' = ?",-1,&_sCheckIfIpIsAllocated,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"INSERT INTO IpAssignment ('networkId','nodeId','ip','ipNetmaskBits','ipVersion') VALUES (?,?,?,?,?)",-1,&_sAllocateIp,(const char **)0) != SQLITE_OK)			||(sqlite3_prepare_v2(_db,"UPDATE Member SET 'cachedNetconf' = ?,'cachedNetconfRevision' = ? WHERE rowid = ?",-1,&_sCacheNetconf,(const char **)0) != SQLITE_OK)		 ) {		sqlite3_close(_db);		throw std::runtime_error("SqliteNetworkController unable to initialize one or more prepared statements");	}}SqliteNetworkController::~SqliteNetworkController(){	Mutex::Lock _l(_lock);	if (_db) {		sqlite3_finalize(_sGetNetworkById);		sqlite3_finalize(_sGetMemberByNetworkAndNodeId);		sqlite3_finalize(_sCreateMember);		sqlite3_finalize(_sGetNodeIdentity);		sqlite3_finalize(_sCreateNode);		sqlite3_finalize(_sUpdateNode);		sqlite3_finalize(_sUpdateNode2);		sqlite3_finalize(_sUpdateMemberClientReportedRevision);		sqlite3_finalize(_sGetEtherTypesFromRuleTable);		sqlite3_finalize(_sGetMulticastRates);		sqlite3_finalize(_sGetActiveBridges);		sqlite3_finalize(_sGetIpAssignmentsForNode);		sqlite3_finalize(_sGetIpAssignmentPools);		sqlite3_finalize(_sCheckIfIpIsAllocated);		sqlite3_finalize(_sAllocateIp);		sqlite3_finalize(_sCacheNetconf);		sqlite3_close(_db);	}}NetworkController::ResultCode SqliteNetworkController::doNetworkConfigRequest(const InetAddress &fromAddr,const Identity &signingId,const Identity &identity,uint64_t nwid,const Dictionary &metaData,uint64_t haveRevision,Dictionary &netconf){	Mutex::Lock _l(_lock);	// Note: we can't reuse prepared statements that return const char * pointers without	// making our own copy in e.g. a std::string first.	if ((!signingId)||(!signingId.hasPrivate())) {		netconf["error"] = "signing identity invalid or lacks private key";		return NetworkController::NETCONF_QUERY_INTERNAL_SERVER_ERROR;	}	struct {		char id[24];		const char *name;		const char *v4AssignMode;		const char *v6AssignMode;		bool isPrivate;		bool enableBroadcast;		bool allowPassiveBridging;		int multicastLimit;		uint64_t revision;	} network;	memset(&network,0,sizeof(network));	Utils::snprintf(network.id,sizeof(network.id),"%.16llx",(unsigned long long)nwid);	struct {		int64_t rowid;		char nodeId[16];		int cachedNetconfBytes;		const void *cachedNetconf;		uint64_t cachedNetconfRevision;		uint64_t clientReportedRevision;		bool authorized;		bool activeBridge;	} member;	memset(&member,0,sizeof(member));	Utils::snprintf(member.nodeId,sizeof(member.nodeId),"%.10llx",(unsigned long long)identity.address().toInt());	// Create/update Node record and check identity fully -- identities are first-come-first-claim	sqlite3_reset(_sGetNodeIdentity);	sqlite3_bind_text(_sGetNodeIdentity,1,member.nodeId,10,SQLITE_STATIC);	if (sqlite3_step(_sGetNodeIdentity) == SQLITE_ROW) {		try {			Identity alreadyKnownIdentity((const char *)sqlite3_column_text(_sGetNodeIdentity,0));			if (alreadyKnownIdentity == identity) {				char lastSeen[64];				Utils::snprintf(lastSeen,sizeof(lastSeen),"%llu",(unsigned long long)OSUtils::now());				if (fromAddr) {					std::string lastAt(fromAddr.toString());					sqlite3_reset(_sUpdateNode);					sqlite3_bind_text(_sUpdateNode,1,lastAt.c_str(),-1,SQLITE_STATIC);					sqlite3_bind_text(_sUpdateNode,2,lastSeen,-1,SQLITE_STATIC);					sqlite3_bind_text(_sUpdateNode,3,member.nodeId,10,SQLITE_STATIC);					sqlite3_step(_sUpdateNode);				} else { // fromAddr is empty, which means this was a relayed packet -- so don't update lastAt					sqlite3_reset(_sUpdateNode2);					sqlite3_bind_text(_sUpdateNode2,1,lastSeen,-1,SQLITE_STATIC);					sqlite3_bind_text(_sUpdateNode2,2,member.nodeId,10,SQLITE_STATIC);					sqlite3_step(_sUpdateNode2);				}			} else {				return NetworkController::NETCONF_QUERY_ACCESS_DENIED;			}		} catch ( ... ) { // identity stored in database is not valid or is NULL			return NetworkController::NETCONF_QUERY_ACCESS_DENIED;		}	} else {		std::string idstr(identity.toString(false));		std::string lastAt;		if (fromAddr)			lastAt = fromAddr.toString();		char lastSeen[64];		Utils::snprintf(lastSeen,sizeof(lastSeen),"%llu",(unsigned long long)OSUtils::now());		sqlite3_reset(_sCreateNode);		sqlite3_bind_text(_sCreateNode,1,member.nodeId,10,SQLITE_STATIC);		sqlite3_bind_text(_sCreateNode,2,idstr.c_str(),-1,SQLITE_STATIC);		sqlite3_bind_text(_sCreateNode,3,lastAt.c_str(),-1,SQLITE_STATIC);		sqlite3_bind_text(_sCreateNode,4,lastSeen,-1,SQLITE_STATIC);		sqlite3_bind_text(_sCreateNode,5,lastSeen,-1,SQLITE_STATIC);		if (sqlite3_step(_sCreateNode) != SQLITE_DONE) {			netconf["error"] = "unable to create new node record";			return NetworkController::NETCONF_QUERY_INTERNAL_SERVER_ERROR;		}	}	// Fetch Network record	bool foundNetwork = false;	sqlite3_reset(_sGetNetworkById);	sqlite3_bind_text(_sGetNetworkById,1,network.id,16,SQLITE_STATIC);	if (sqlite3_step(_sGetNetworkById) == SQLITE_ROW) {		foundNetwork = true;		network.name = (const char *)sqlite3_column_text(_sGetNetworkById,0);		network.isPrivate = (sqlite3_column_int(_sGetNetworkById,1) > 0);		network.enableBroadcast = (sqlite3_column_int(_sGetNetworkById,2) > 0);		network.allowPassiveBridging = (sqlite3_column_int(_sGetNetworkById,3) > 0);		network.v4AssignMode = (const char *)sqlite3_column_text(_sGetNetworkById,4);		network.v6AssignMode = (const char *)sqlite3_column_text(_sGetNetworkById,5);		network.multicastLimit = sqlite3_column_int(_sGetNetworkById,6);		network.revision = (uint64_t)sqlite3_column_int64(_sGetNetworkById,7);	}	if (!foundNetwork)		return NetworkController::NETCONF_QUERY_OBJECT_NOT_FOUND;	// Fetch Member record	bool foundMember = false;	sqlite3_reset(_sGetMemberByNetworkAndNodeId);	sqlite3_bind_text(_sGetMemberByNetworkAndNodeId,1,network.id,16,SQLITE_STATIC);	sqlite3_bind_text(_sGetMemberByNetworkAndNodeId,2,member.nodeId,10,SQLITE_STATIC);	if (sqlite3_step(_sGetMemberByNetworkAndNodeId) == SQLITE_ROW) {		foundMember = true;		member.rowid = (int64_t)sqlite3_column_int64(_sGetMemberByNetworkAndNodeId,0);		member.cachedNetconfBytes = sqlite3_column_bytes(_sGetMemberByNetworkAndNodeId,1);		member.cachedNetconf = sqlite3_column_blob(_sGetMemberByNetworkAndNodeId,1);		member.cachedNetconfRevision = (uint64_t)sqlite3_column_int64(_sGetMemberByNetworkAndNodeId,2);		member.clientReportedRevision = (uint64_t)sqlite3_column_int64(_sGetMemberByNetworkAndNodeId,3);		member.authorized = (sqlite3_column_int(_sGetMemberByNetworkAndNodeId,4) > 0);		member.activeBridge = (sqlite3_column_int(_sGetMemberByNetworkAndNodeId,5) > 0);	}	// Create Member record for unknown nodes, auto-authorizing if network is public	if (!foundMember) {		member.cachedNetconfBytes = 0;		member.cachedNetconfRevision = 0;		member.clientReportedRevision = 0;		member.authorized = (network.isPrivate ? false : true);		member.activeBridge = false;		sqlite3_reset(_sCreateMember);		sqlite3_bind_text(_sCreateMember,1,network.id,16,SQLITE_STATIC);		sqlite3_bind_text(_sCreateMember,2,member.nodeId,10,SQLITE_STATIC);		sqlite3_bind_int(_sCreateMember,3,(member.authorized ? 0 : 1));		if ( (sqlite3_step(_sCreateMember) != SQLITE_DONE) && ((member.rowid = (int64_t)sqlite3_last_insert_rowid(_db)) > 0) ) {			netconf["error"] = "unable to create new member record";			return NetworkController::NETCONF_QUERY_INTERNAL_SERVER_ERROR;		}	}	// Check member authorization	if (!member.authorized)		return NetworkController::NETCONF_QUERY_ACCESS_DENIED;	// Update client's currently reported haveRevision in Member record	if (member.rowid > 0) {		sqlite3_reset(_sUpdateMemberClientReportedRevision);		sqlite3_bind_int64(_sUpdateMemberClientReportedRevision,1,(sqlite3_int64)haveRevision);		sqlite3_bind_int64(_sUpdateMemberClientReportedRevision,2,member.rowid);		sqlite3_step(_sUpdateMemberClientReportedRevision);	}	// If netconf is unchanged from client reported revision, just tell client they're up to date	if ((haveRevision > 0)&&(haveRevision == network.revision))		return NetworkController::NETCONF_QUERY_OK_BUT_NOT_NEWER;	// Generate or retrieve cached netconf	netconf.clear();	if ((member.cachedNetconfRevision == network.revision)&&(member.cachedNetconfBytes > 0)) {		// Use cached copy		std::string tmp((const char *)member.cachedNetconf,member.cachedNetconfBytes);		netconf.fromString(tmp);	} else {		// Create and sign a new netconf, and save in database to re-use in the future		char tss[24],rs[24];		Utils::snprintf(tss,sizeof(tss),"%.16llx",(unsigned long long)OSUtils::now());		Utils::snprintf(rs,sizeof(rs),"%.16llx",(unsigned long long)network.revision);		netconf[ZT_NETWORKCONFIG_DICT_KEY_TIMESTAMP] = tss;		netconf[ZT_NETWORKCONFIG_DICT_KEY_REVISION] = rs;		netconf[ZT_NETWORKCONFIG_DICT_KEY_NETWORK_ID] = network.id;		netconf[ZT_NETWORKCONFIG_DICT_KEY_ISSUED_TO] = member.nodeId;		netconf[ZT_NETWORKCONFIG_DICT_KEY_PRIVATE] = network.isPrivate ? "1" : "0";		netconf[ZT_NETWORKCONFIG_DICT_KEY_NAME] = (network.name) ? network.name : "";		netconf[ZT_NETWORKCONFIG_DICT_KEY_ENABLE_BROADCAST] = network.enableBroadcast ? "1" : "0";		netconf[ZT_NETWORKCONFIG_DICT_KEY_ALLOW_PASSIVE_BRIDGING] = network.allowPassiveBridging ? "1" : "0";		{			std::vector<int> allowedEtherTypes;			sqlite3_reset(_sGetEtherTypesFromRuleTable);			sqlite3_bind_text(_sGetEtherTypesFromRuleTable,1,network.id,16,SQLITE_STATIC);			while (sqlite3_step(_sGetEtherTypesFromRuleTable) == SQLITE_ROW) {				int et = sqlite3_column_int(_sGetEtherTypesFromRuleTable,0);				if ((et >= 0)&&(et <= 0xffff))					allowedEtherTypes.push_back(et);			}			std::sort(allowedEtherTypes.begin(),allowedEtherTypes.end());			std::unique(allowedEtherTypes.begin(),allowedEtherTypes.end());			std::string allowedEtherTypesCsv;			for(std::vector<int>::const_iterator i(allowedEtherTypes.begin());i!=allowedEtherTypes.end();++i) {				if (allowedEtherTypesCsv.length())					allowedEtherTypesCsv.push_back(',');				char tmp[16];				Utils::snprintf(tmp,sizeof(tmp),"%.4x",(unsigned int)*i);				allowedEtherTypesCsv.append(tmp);			}			netconf[ZT_NETWORKCONFIG_DICT_KEY_ALLOWED_ETHERNET_TYPES] = allowedEtherTypesCsv;		}		{			std::string multicastRates;			sqlite3_reset(_sGetMulticastRates);			sqlite3_bind_text(_sGetMulticastRates,1,network.id,16,SQLITE_STATIC);			while (sqlite3_step(_sGetMulticastRates) == SQLITE_ROW) {				const char *mac = (const char *)sqlite3_column_text(_sGetMulticastRates,0);				if ((mac)&&(strlen(mac) == 12)) {					unsigned long adi = ((unsigned long)sqlite3_column_int64(_sGetMulticastRates,1)) & 0xffffffff;					char tmp[256];					Utils::snprintf(tmp,sizeof(tmp),"%s/%.4lx=%x,%x,%x\n",mac,adi,sqlite3_column_int(_sGetMulticastRates,2),sqlite3_column_int(_sGetMulticastRates,3),sqlite3_column_int(_sGetMulticastRates,4));					multicastRates.append(tmp);				}			}			if (multicastRates.length() > 0)				netconf[ZT_NETWORKCONFIG_DICT_KEY_MULTICAST_RATES] = multicastRates;			if (network.multicastLimit > 0) {				char ml[16];				Utils::snprintf(ml,sizeof(ml),"%lx",(unsigned long)network.multicastLimit);				netconf[ZT_NETWORKCONFIG_DICT_KEY_MULTICAST_LIMIT] = ml;			}		}		{			std::string activeBridges;			sqlite3_reset(_sGetActiveBridges);			sqlite3_bind_text(_sGetActiveBridges,1,network.id,16,SQLITE_STATIC);			while (sqlite3_step(_sGetActiveBridges) == SQLITE_ROW) {				const char *ab = (const char *)sqlite3_column_text(_sGetActiveBridges,0);				if ((ab)&&(strlen(ab) == 10)) {					if (activeBridges.length())						activeBridges.push_back(',');					activeBridges.append(ab);				}				if (activeBridges.length() > 1024) // sanity check -- you can't have too many active bridges at the moment					break;			}			if (activeBridges.length())				netconf[ZT_NETWORKCONFIG_DICT_KEY_ACTIVE_BRIDGES] = activeBridges;		}		if ((network.v4AssignMode)&&(!strcmp(network.v4AssignMode,"zt"))) {			std::string v4s;			sqlite3_reset(_sGetIpAssignmentsForNode);			sqlite3_bind_text(_sGetIpAssignmentsForNode,1,network.id,16,SQLITE_STATIC);			sqlite3_bind_text(_sGetIpAssignmentsForNode,2,member.nodeId,10,SQLITE_STATIC);			sqlite3_bind_int(_sGetIpAssignmentsForNode,3,4); // 4 == IPv4			while (sqlite3_step(_sGetIpAssignmentsForNode) == SQLITE_ROW) {				const unsigned char *ip = (const unsigned char *)sqlite3_column_blob(_sGetIpAssignmentsForNode,0);				int ipNetmaskBits = sqlite3_column_int(_sGetIpAssignmentsForNode,1);				if ((ip)&&(sqlite3_column_bytes(_sGetIpAssignmentsForNode,0) >= 4)&&(ipNetmaskBits > 0)&&(ipNetmaskBits <= 32)) {					char tmp[32];					Utils::snprintf(tmp,sizeof(tmp),"%d.%d.%d.%d/%d",(int)ip[0],(int)ip[1],(int)ip[2],(int)ip[3],ipNetmaskBits);					if (v4s.length())						v4s.push_back(',');					v4s.append(tmp);				}			}			if (!v4s.length()) {				// Attempt to auto-assign an IPv4 address from an available pool if one isn't assigned already				sqlite3_reset(_sGetIpAssignmentPools);				sqlite3_bind_text(_sGetIpAssignmentPools,1,network.id,16,SQLITE_STATIC);				sqlite3_bind_int(_sGetIpAssignmentPools,2,4); // 4 == IPv4				while ((!v4s.length())&&(sqlite3_step(_sGetIpAssignmentPools) == SQLITE_ROW)) {					const void *ipNetwork = sqlite3_column_blob(_sGetIpAssignmentPools,0);					int ipNetmaskBits = sqlite3_column_int(_sGetIpAssignmentPools,1);					if ((ipNetwork)&&(sqlite3_column_bytes(_sGetIpAssignmentPools,0) >= 4)&&(ipNetmaskBits > 0)&&(ipNetmaskBits < 32)) {						uint32_t n = Utils::ntoh(*((const uint32_t *)ipNetwork)); // network in host byte order e.g. 192.168.0.0						uint32_t m = 0xffffffff << (32 - ipNetmaskBits); // netmask e.g. 0xffffff00 for '24' since 32 - 24 == 8						uint32_t im = ~m; // inverse mask, e.g. 0x000000ff for a netmask of 0xffffff00						uint32_t abits = (uint32_t)(identity.address().toInt() & 0xffffffff); // least significant bits of member ZT address						for(uint32_t k=0;k<=im;++k) { // try up to the number of IPs possible in this network							uint32_t ip = ( ((abits + k) & im) | (n & m) ); // build IP using bits from ZT address of member + k							if ((ip & 0x000000ff) == 0x00) continue; // no IPs ending in .0 allowed							if ((ip & 0x000000ff) == 0xff) continue; // no IPs ending in .255 allowed							uint32_t nip = Utils::hton(ip); // IP in big-endian "network" byte order							sqlite3_reset(_sCheckIfIpIsAllocated);							sqlite3_bind_text(_sCheckIfIpIsAllocated,1,network.id,16,SQLITE_STATIC);							sqlite3_bind_blob(_sCheckIfIpIsAllocated,2,(const void *)&nip,4,SQLITE_STATIC);							sqlite3_bind_int(_sCheckIfIpIsAllocated,3,4); // 4 == IPv4							if (sqlite3_step(_sCheckIfIpIsAllocated) != SQLITE_ROW) {								// No rows returned, so the IP is available								sqlite3_reset(_sAllocateIp);								sqlite3_bind_text(_sAllocateIp,1,network.id,16,SQLITE_STATIC);								sqlite3_bind_text(_sAllocateIp,2,member.nodeId,10,SQLITE_STATIC);								sqlite3_bind_blob(_sAllocateIp,3,(const void *)&nip,4,SQLITE_STATIC);								sqlite3_bind_int(_sAllocateIp,4,ipNetmaskBits);								sqlite3_bind_int(_sAllocateIp,5,4); // 4 == IPv4								if (sqlite3_step(_sAllocateIp) == SQLITE_DONE) {									char tmp[32];									Utils::snprintf(tmp,sizeof(tmp),"%d.%d.%d.%d/%d",(int)((ip >> 24) & 0xff),(int)((ip >> 16) & 0xff),(int)((ip >> 8) & 0xff),(int)(ip & 0xff),ipNetmaskBits);									if (v4s.length())										v4s.push_back(',');									v4s.append(tmp);									break; // IP found and reserved! v4s containing something will cause outer while() to break.								}							}						}					}				}			}			if (v4s.length())				netconf[ZT_NETWORKCONFIG_DICT_KEY_IPV4_STATIC] = v4s;		}		// TODO: IPv6 auto-assign once it's supported in UI		if (network.isPrivate) {			CertificateOfMembership com(network.revision,16,nwid,identity.address());			if (com.sign(signingId)) // basically can't fail unless our identity is invalid				netconf[ZT_NETWORKCONFIG_DICT_KEY_CERTIFICATE_OF_MEMBERSHIP] = com.toString();			else {				netconf["error"] = "unable to sign COM";				return NETCONF_QUERY_INTERNAL_SERVER_ERROR;			}		}		if (!netconf.sign(signingId,OSUtils::now())) {			netconf["error"] = "unable to sign netconf dictionary";			return NETCONF_QUERY_INTERNAL_SERVER_ERROR;		}		// Save serialized netconf for future re-use		std::string netconfSerialized(netconf.toString());		if (netconfSerialized.length() < 4096) { // sanity check			sqlite3_reset(_sCacheNetconf);			sqlite3_bind_blob(_sCacheNetconf,1,(const void *)netconfSerialized.data(),netconfSerialized.length(),SQLITE_STATIC);			sqlite3_bind_int64(_sCacheNetconf,2,(sqlite3_int64)network.revision);			sqlite3_bind_int64(_sCacheNetconf,3,member.rowid);			sqlite3_step(_sCacheNetconf);		}	}	return NetworkController::NETCONF_QUERY_OK;}} // namespace ZeroTier
 |