Topology.cpp 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485
  1. /*
  2. * ZeroTier One - Network Virtualization Everywhere
  3. * Copyright (C) 2011-2017 ZeroTier, Inc. https://www.zerotier.com/
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. * --
  19. *
  20. * You can be released from the requirements of the license by purchasing
  21. * a commercial license. Buying such a license is mandatory as soon as you
  22. * develop commercial closed-source software that incorporates or links
  23. * directly against ZeroTier software without disclosing the source code
  24. * of your own application.
  25. */
  26. #include "Constants.hpp"
  27. #include "Topology.hpp"
  28. #include "RuntimeEnvironment.hpp"
  29. #include "Node.hpp"
  30. #include "Network.hpp"
  31. #include "NetworkConfig.hpp"
  32. #include "Buffer.hpp"
  33. #include "Switch.hpp"
  34. namespace ZeroTier {
  35. /*
  36. * 2016-01-13 ZeroTier planet definition for the third planet of Sol:
  37. *
  38. * There are two roots, each of which is a cluster spread across multiple
  39. * continents and providers. They are named Alice and Bob after the
  40. * canonical example names used in cryptography.
  41. *
  42. * Alice:
  43. *
  44. * root-alice-ams-01: Amsterdam, Netherlands
  45. * root-alice-joh-01: Johannesburg, South Africa
  46. * root-alice-nyc-01: New York, New York, USA
  47. * root-alice-sao-01: Sao Paolo, Brazil
  48. * root-alice-sfo-01: San Francisco, California, USA
  49. * root-alice-sgp-01: Singapore
  50. *
  51. * Bob:
  52. *
  53. * root-bob-dfw-01: Dallas, Texas, USA
  54. * root-bob-fra-01: Frankfurt, Germany
  55. * root-bob-par-01: Paris, France
  56. * root-bob-syd-01: Sydney, Australia
  57. * root-bob-tok-01: Tokyo, Japan
  58. * root-bob-tor-01: Toronto, Canada
  59. */
  60. #define ZT_DEFAULT_WORLD_LENGTH 634
  61. static const unsigned char ZT_DEFAULT_WORLD[ZT_DEFAULT_WORLD_LENGTH] = {0x01,0x00,0x00,0x00,0x00,0x08,0xea,0xc9,0x0a,0x00,0x00,0x01,0x52,0x3c,0x32,0x50,0x1a,0xb8,0xb3,0x88,0xa4,0x69,0x22,0x14,0x91,0xaa,0x9a,0xcd,0x66,0xcc,0x76,0x4c,0xde,0xfd,0x56,0x03,0x9f,0x10,0x67,0xae,0x15,0xe6,0x9c,0x6f,0xb4,0x2d,0x7b,0x55,0x33,0x0e,0x3f,0xda,0xac,0x52,0x9c,0x07,0x92,0xfd,0x73,0x40,0xa6,0xaa,0x21,0xab,0xa8,0xa4,0x89,0xfd,0xae,0xa4,0x4a,0x39,0xbf,0x2d,0x00,0x65,0x9a,0xc9,0xc8,0x18,0xeb,0x4a,0xf7,0x86,0xa8,0x40,0xd6,0x52,0xea,0xae,0x9e,0x7a,0xbf,0x4c,0x97,0x66,0xab,0x2d,0x6f,0xaf,0xc9,0x2b,0x3a,0xff,0xed,0xd6,0x30,0x3e,0xc4,0x6a,0x65,0xf2,0xbd,0x83,0x52,0xf5,0x40,0xe9,0xcc,0x0d,0x6e,0x89,0x3f,0x9a,0xa0,0xb8,0xdf,0x42,0xd2,0x2f,0x84,0xe6,0x03,0x26,0x0f,0xa8,0xe3,0xcc,0x05,0x05,0x03,0xef,0x12,0x80,0x0d,0xce,0x3e,0xb6,0x58,0x3b,0x1f,0xa8,0xad,0xc7,0x25,0xf9,0x43,0x71,0xa7,0x5c,0x9a,0xc7,0xe1,0xa3,0xb8,0x88,0xd0,0x71,0x6c,0x94,0x99,0x73,0x41,0x0b,0x1b,0x48,0x84,0x02,0x9d,0x21,0x90,0x39,0xf3,0x00,0x01,0xf0,0x92,0x2a,0x98,0xe3,0xb3,0x4e,0xbc,0xbf,0xf3,0x33,0x26,0x9d,0xc2,0x65,0xd7,0xa0,0x20,0xaa,0xb6,0x9d,0x72,0xbe,0x4d,0x4a,0xcc,0x9c,0x8c,0x92,0x94,0x78,0x57,0x71,0x25,0x6c,0xd1,0xd9,0x42,0xa9,0x0d,0x1b,0xd1,0xd2,0xdc,0xa3,0xea,0x84,0xef,0x7d,0x85,0xaf,0xe6,0x61,0x1f,0xb4,0x3f,0xf0,0xb7,0x41,0x26,0xd9,0x0a,0x6e,0x00,0x0c,0x04,0xbc,0xa6,0x5e,0xb1,0x27,0x09,0x06,0x2a,0x03,0xb0,0xc0,0x00,0x02,0x00,0xd0,0x00,0x00,0x00,0x00,0x00,0x7d,0x00,0x01,0x27,0x09,0x04,0x9a,0x42,0xc5,0x21,0x27,0x09,0x06,0x2c,0x0f,0xf8,0x50,0x01,0x54,0x01,0x97,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x33,0x27,0x09,0x04,0x9f,0xcb,0x61,0xab,0x27,0x09,0x06,0x26,0x04,0xa8,0x80,0x08,0x00,0x00,0xa1,0x00,0x00,0x00,0x00,0x00,0x54,0x60,0x01,0x27,0x09,0x04,0xa9,0x39,0x8f,0x68,0x27,0x09,0x06,0x26,0x07,0xf0,0xd0,0x1d,0x01,0x00,0x57,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x02,0x27,0x09,0x04,0x6b,0xaa,0xc5,0x0e,0x27,0x09,0x06,0x26,0x04,0xa8,0x80,0x00,0x01,0x00,0x20,0x00,0x00,0x00,0x00,0x02,0x00,0xe0,0x01,0x27,0x09,0x04,0x80,0xc7,0xc5,0xd9,0x27,0x09,0x06,0x24,0x00,0x61,0x80,0x00,0x00,0x00,0xd0,0x00,0x00,0x00,0x00,0x00,0xb7,0x40,0x01,0x27,0x09,0x88,0x41,0x40,0x8a,0x2e,0x00,0xbb,0x1d,0x31,0xf2,0xc3,0x23,0xe2,0x64,0xe9,0xe6,0x41,0x72,0xc1,0xa7,0x4f,0x77,0x89,0x95,0x55,0xed,0x10,0x75,0x1c,0xd5,0x6e,0x86,0x40,0x5c,0xde,0x11,0x8d,0x02,0xdf,0xfe,0x55,0x5d,0x46,0x2c,0xcf,0x6a,0x85,0xb5,0x63,0x1c,0x12,0x35,0x0c,0x8d,0x5d,0xc4,0x09,0xba,0x10,0xb9,0x02,0x5d,0x0f,0x44,0x5c,0xf4,0x49,0xd9,0x2b,0x1c,0x00,0x0c,0x04,0x2d,0x20,0xc6,0x82,0x27,0x09,0x06,0x20,0x01,0x19,0xf0,0x64,0x00,0x81,0xc3,0x54,0x00,0x00,0xff,0xfe,0x18,0x1d,0x61,0x27,0x09,0x04,0x2e,0x65,0xa0,0xf9,0x27,0x09,0x06,0x2a,0x03,0xb0,0xc0,0x00,0x03,0x00,0xd0,0x00,0x00,0x00,0x00,0x00,0x6a,0x30,0x01,0x27,0x09,0x04,0x6b,0xbf,0x2e,0xd2,0x27,0x09,0x06,0x20,0x01,0x19,0xf0,0x68,0x00,0x83,0xa4,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x64,0x27,0x09,0x04,0x2d,0x20,0xf6,0xb3,0x27,0x09,0x06,0x20,0x01,0x19,0xf0,0x58,0x00,0x8b,0xf8,0x54,0x00,0x00,0xff,0xfe,0x15,0xb3,0x9a,0x27,0x09,0x04,0x2d,0x20,0xf8,0x57,0x27,0x09,0x06,0x20,0x01,0x19,0xf0,0x70,0x00,0x9b,0xc9,0x54,0x00,0x00,0xff,0xfe,0x15,0xc4,0xf5,0x27,0x09,0x04,0x9f,0xcb,0x02,0x9a,0x27,0x09,0x06,0x26,0x04,0xa8,0x80,0x0c,0xad,0x00,0xd0,0x00,0x00,0x00,0x00,0x00,0x26,0x70,0x01,0x27,0x09};
  62. Topology::Topology(const RuntimeEnvironment *renv,void *tPtr) :
  63. RR(renv),
  64. _trustedPathCount(0),
  65. _amRoot(false)
  66. {
  67. uint8_t tmp[ZT_WORLD_MAX_SERIALIZED_LENGTH];
  68. uint64_t idtmp[2];
  69. idtmp[0] = 0; idtmp[1] = 0;
  70. int n = RR->node->stateObjectGet(tPtr,ZT_STATE_OBJECT_PLANET,idtmp,tmp,sizeof(tmp));
  71. if (n > 0) {
  72. try {
  73. World cachedPlanet;
  74. cachedPlanet.deserialize(Buffer<ZT_WORLD_MAX_SERIALIZED_LENGTH>(tmp,(unsigned int)n),0);
  75. addWorld(tPtr,cachedPlanet,false);
  76. } catch ( ... ) {} // ignore invalid cached planets
  77. }
  78. World defaultPlanet;
  79. {
  80. Buffer<ZT_DEFAULT_WORLD_LENGTH> wtmp(ZT_DEFAULT_WORLD,ZT_DEFAULT_WORLD_LENGTH);
  81. defaultPlanet.deserialize(wtmp,0); // throws on error, which would indicate a bad static variable up top
  82. }
  83. addWorld(tPtr,defaultPlanet,false);
  84. }
  85. SharedPtr<Peer> Topology::addPeer(void *tPtr,const SharedPtr<Peer> &peer)
  86. {
  87. #ifdef ZT_TRACE
  88. if ((!peer)||(peer->address() == RR->identity.address())) {
  89. if (!peer)
  90. fprintf(stderr,"FATAL BUG: addPeer() caught attempt to add NULL peer" ZT_EOL_S);
  91. else fprintf(stderr,"FATAL BUG: addPeer() caught attempt to add peer for self" ZT_EOL_S);
  92. abort();
  93. }
  94. #endif
  95. SharedPtr<Peer> np;
  96. {
  97. Mutex::Lock _l(_peers_m);
  98. SharedPtr<Peer> &hp = _peers[peer->address()];
  99. if (!hp)
  100. hp = peer;
  101. np = hp;
  102. }
  103. saveIdentity(tPtr,np->identity());
  104. return np;
  105. }
  106. SharedPtr<Peer> Topology::getPeer(void *tPtr,const Address &zta)
  107. {
  108. if (zta == RR->identity.address()) {
  109. TRACE("BUG: ignored attempt to getPeer() for self, returned NULL");
  110. return SharedPtr<Peer>();
  111. }
  112. {
  113. Mutex::Lock _l(_peers_m);
  114. const SharedPtr<Peer> *const ap = _peers.get(zta);
  115. if (ap)
  116. return *ap;
  117. }
  118. try {
  119. Identity id(_getIdentity(tPtr,zta));
  120. if (id) {
  121. SharedPtr<Peer> np(new Peer(RR,RR->identity,id));
  122. {
  123. Mutex::Lock _l(_peers_m);
  124. SharedPtr<Peer> &ap = _peers[zta];
  125. if (!ap)
  126. ap.swap(np);
  127. return ap;
  128. }
  129. }
  130. } catch ( ... ) {} // invalid identity on disk?
  131. return SharedPtr<Peer>();
  132. }
  133. Identity Topology::getIdentity(void *tPtr,const Address &zta)
  134. {
  135. if (zta == RR->identity.address()) {
  136. return RR->identity;
  137. } else {
  138. Mutex::Lock _l(_peers_m);
  139. const SharedPtr<Peer> *const ap = _peers.get(zta);
  140. if (ap)
  141. return (*ap)->identity();
  142. }
  143. return _getIdentity(tPtr,zta);
  144. }
  145. void Topology::saveIdentity(void *tPtr,const Identity &id)
  146. {
  147. if (id) {
  148. const std::string tmp(id.toString(false));
  149. uint64_t idtmp[2];
  150. idtmp[0] = id.address().toInt(); idtmp[1] = 0;
  151. RR->node->stateObjectPut(tPtr,ZT_STATE_OBJECT_PEER_IDENTITY,idtmp,tmp.data(),(unsigned int)tmp.length());
  152. }
  153. }
  154. SharedPtr<Peer> Topology::getUpstreamPeer(const Address *avoid,unsigned int avoidCount,bool strictAvoid)
  155. {
  156. const uint64_t now = RR->node->now();
  157. unsigned int bestQualityOverall = ~((unsigned int)0);
  158. unsigned int bestQualityNotAvoid = ~((unsigned int)0);
  159. const SharedPtr<Peer> *bestOverall = (const SharedPtr<Peer> *)0;
  160. const SharedPtr<Peer> *bestNotAvoid = (const SharedPtr<Peer> *)0;
  161. Mutex::Lock _l1(_peers_m);
  162. Mutex::Lock _l2(_upstreams_m);
  163. for(std::vector<Address>::const_iterator a(_upstreamAddresses.begin());a!=_upstreamAddresses.end();++a) {
  164. const SharedPtr<Peer> *p = _peers.get(*a);
  165. if (p) {
  166. bool avoiding = false;
  167. for(unsigned int i=0;i<avoidCount;++i) {
  168. if (avoid[i] == (*p)->address()) {
  169. avoiding = true;
  170. break;
  171. }
  172. }
  173. const unsigned int q = (*p)->relayQuality(now);
  174. if (q <= bestQualityOverall) {
  175. bestQualityOverall = q;
  176. bestOverall = &(*p);
  177. }
  178. if ((!avoiding)&&(q <= bestQualityNotAvoid)) {
  179. bestQualityNotAvoid = q;
  180. bestNotAvoid = &(*p);
  181. }
  182. }
  183. }
  184. if (bestNotAvoid) {
  185. return *bestNotAvoid;
  186. } else if ((!strictAvoid)&&(bestOverall)) {
  187. return *bestOverall;
  188. }
  189. return SharedPtr<Peer>();
  190. }
  191. bool Topology::isUpstream(const Identity &id) const
  192. {
  193. Mutex::Lock _l(_upstreams_m);
  194. return (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),id.address()) != _upstreamAddresses.end());
  195. }
  196. bool Topology::shouldAcceptWorldUpdateFrom(const Address &addr) const
  197. {
  198. Mutex::Lock _l(_upstreams_m);
  199. if (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),addr) != _upstreamAddresses.end())
  200. return true;
  201. for(std::vector< std::pair< uint64_t,Address> >::const_iterator s(_moonSeeds.begin());s!=_moonSeeds.end();++s) {
  202. if (s->second == addr)
  203. return true;
  204. }
  205. return false;
  206. }
  207. ZT_PeerRole Topology::role(const Address &ztaddr) const
  208. {
  209. Mutex::Lock _l(_upstreams_m);
  210. if (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),ztaddr) != _upstreamAddresses.end()) {
  211. for(std::vector<World::Root>::const_iterator i(_planet.roots().begin());i!=_planet.roots().end();++i) {
  212. if (i->identity.address() == ztaddr)
  213. return ZT_PEER_ROLE_PLANET;
  214. }
  215. return ZT_PEER_ROLE_MOON;
  216. }
  217. return ZT_PEER_ROLE_LEAF;
  218. }
  219. bool Topology::isProhibitedEndpoint(const Address &ztaddr,const InetAddress &ipaddr) const
  220. {
  221. Mutex::Lock _l(_upstreams_m);
  222. // For roots the only permitted addresses are those defined. This adds just a little
  223. // bit of extra security against spoofing, replaying, etc.
  224. if (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),ztaddr) != _upstreamAddresses.end()) {
  225. for(std::vector<World::Root>::const_iterator r(_planet.roots().begin());r!=_planet.roots().end();++r) {
  226. if (r->identity.address() == ztaddr) {
  227. if (r->stableEndpoints.size() == 0)
  228. return false; // no stable endpoints specified, so allow dynamic paths
  229. for(std::vector<InetAddress>::const_iterator e(r->stableEndpoints.begin());e!=r->stableEndpoints.end();++e) {
  230. if (ipaddr.ipsEqual(*e))
  231. return false;
  232. }
  233. }
  234. }
  235. for(std::vector<World>::const_iterator m(_moons.begin());m!=_moons.end();++m) {
  236. for(std::vector<World::Root>::const_iterator r(m->roots().begin());r!=m->roots().end();++r) {
  237. if (r->identity.address() == ztaddr) {
  238. if (r->stableEndpoints.size() == 0)
  239. return false; // no stable endpoints specified, so allow dynamic paths
  240. for(std::vector<InetAddress>::const_iterator e(r->stableEndpoints.begin());e!=r->stableEndpoints.end();++e) {
  241. if (ipaddr.ipsEqual(*e))
  242. return false;
  243. }
  244. }
  245. }
  246. }
  247. return true;
  248. }
  249. return false;
  250. }
  251. bool Topology::addWorld(void *tPtr,const World &newWorld,bool alwaysAcceptNew)
  252. {
  253. if ((newWorld.type() != World::TYPE_PLANET)&&(newWorld.type() != World::TYPE_MOON))
  254. return false;
  255. Mutex::Lock _l1(_upstreams_m);
  256. Mutex::Lock _l2(_peers_m);
  257. World *existing = (World *)0;
  258. switch(newWorld.type()) {
  259. case World::TYPE_PLANET:
  260. existing = &_planet;
  261. break;
  262. case World::TYPE_MOON:
  263. for(std::vector< World >::iterator m(_moons.begin());m!=_moons.end();++m) {
  264. if (m->id() == newWorld.id()) {
  265. existing = &(*m);
  266. break;
  267. }
  268. }
  269. break;
  270. default:
  271. return false;
  272. }
  273. if (existing) {
  274. if (existing->shouldBeReplacedBy(newWorld))
  275. *existing = newWorld;
  276. else return false;
  277. } else if (newWorld.type() == World::TYPE_MOON) {
  278. if (alwaysAcceptNew) {
  279. _moons.push_back(newWorld);
  280. existing = &(_moons.back());
  281. } else {
  282. for(std::vector< std::pair<uint64_t,Address> >::iterator m(_moonSeeds.begin());m!=_moonSeeds.end();++m) {
  283. if (m->first == newWorld.id()) {
  284. for(std::vector<World::Root>::const_iterator r(newWorld.roots().begin());r!=newWorld.roots().end();++r) {
  285. if (r->identity.address() == m->second) {
  286. _moonSeeds.erase(m);
  287. _moons.push_back(newWorld);
  288. existing = &(_moons.back());
  289. break;
  290. }
  291. }
  292. if (existing)
  293. break;
  294. }
  295. }
  296. }
  297. if (!existing)
  298. return false;
  299. } else {
  300. return false;
  301. }
  302. try {
  303. Buffer<ZT_WORLD_MAX_SERIALIZED_LENGTH> sbuf;
  304. existing->serialize(sbuf,false);
  305. uint64_t idtmp[2];
  306. idtmp[0] = existing->id(); idtmp[1] = 0;
  307. RR->node->stateObjectPut(tPtr,(existing->type() == World::TYPE_PLANET) ? ZT_STATE_OBJECT_PLANET : ZT_STATE_OBJECT_MOON,idtmp,sbuf.data(),sbuf.size());
  308. } catch ( ... ) {}
  309. _memoizeUpstreams(tPtr);
  310. return true;
  311. }
  312. void Topology::addMoon(void *tPtr,const uint64_t id,const Address &seed)
  313. {
  314. char tmp[ZT_WORLD_MAX_SERIALIZED_LENGTH];
  315. uint64_t idtmp[2];
  316. idtmp[0] = id; idtmp[1] = 0;
  317. int n = RR->node->stateObjectGet(tPtr,ZT_STATE_OBJECT_MOON,idtmp,tmp,sizeof(tmp));
  318. if (n > 0) {
  319. try {
  320. World w;
  321. w.deserialize(Buffer<ZT_WORLD_MAX_SERIALIZED_LENGTH>(tmp,(unsigned int)n));
  322. if ((w.type() == World::TYPE_MOON)&&(w.id() == id)) {
  323. addWorld(tPtr,w,true);
  324. return;
  325. }
  326. } catch ( ... ) {}
  327. }
  328. if (seed) {
  329. Mutex::Lock _l(_upstreams_m);
  330. if (std::find(_moonSeeds.begin(),_moonSeeds.end(),std::pair<uint64_t,Address>(id,seed)) == _moonSeeds.end())
  331. _moonSeeds.push_back(std::pair<uint64_t,Address>(id,seed));
  332. }
  333. }
  334. void Topology::removeMoon(void *tPtr,const uint64_t id)
  335. {
  336. Mutex::Lock _l1(_upstreams_m);
  337. Mutex::Lock _l2(_peers_m);
  338. std::vector<World> nm;
  339. for(std::vector<World>::const_iterator m(_moons.begin());m!=_moons.end();++m) {
  340. if (m->id() != id) {
  341. nm.push_back(*m);
  342. } else {
  343. uint64_t idtmp[2];
  344. idtmp[0] = id; idtmp[1] = 0;
  345. RR->node->stateObjectDelete(tPtr,ZT_STATE_OBJECT_MOON,idtmp);
  346. }
  347. }
  348. _moons.swap(nm);
  349. std::vector< std::pair<uint64_t,Address> > cm;
  350. for(std::vector< std::pair<uint64_t,Address> >::const_iterator m(_moonSeeds.begin());m!=_moonSeeds.end();++m) {
  351. if (m->first != id)
  352. cm.push_back(*m);
  353. }
  354. _moonSeeds.swap(cm);
  355. _memoizeUpstreams(tPtr);
  356. }
  357. void Topology::doPeriodicTasks(void *tPtr,uint64_t now)
  358. {
  359. {
  360. Mutex::Lock _l1(_peers_m);
  361. Mutex::Lock _l2(_upstreams_m);
  362. Hashtable< Address,SharedPtr<Peer> >::Iterator i(_peers);
  363. Address *a = (Address *)0;
  364. SharedPtr<Peer> *p = (SharedPtr<Peer> *)0;
  365. while (i.next(a,p)) {
  366. if ( (!(*p)->isAlive(now)) && (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),*a) == _upstreamAddresses.end()) ) {
  367. _peers.erase(*a);
  368. } else {
  369. (*p)->writeState(tPtr,now);
  370. }
  371. }
  372. }
  373. {
  374. Mutex::Lock _l(_paths_m);
  375. Hashtable< Path::HashKey,SharedPtr<Path> >::Iterator i(_paths);
  376. Path::HashKey *k = (Path::HashKey *)0;
  377. SharedPtr<Path> *p = (SharedPtr<Path> *)0;
  378. while (i.next(k,p)) {
  379. if (p->reclaimIfWeak())
  380. _paths.erase(*k);
  381. }
  382. }
  383. }
  384. Identity Topology::_getIdentity(void *tPtr,const Address &zta)
  385. {
  386. char tmp[512];
  387. uint64_t idtmp[2];
  388. idtmp[0] = zta.toInt(); idtmp[1] = 0;
  389. int n = RR->node->stateObjectGet(tPtr,ZT_STATE_OBJECT_PEER_IDENTITY,idtmp,tmp,sizeof(tmp) - 1);
  390. if (n > 0) {
  391. tmp[n] = (char)0;
  392. try {
  393. return Identity(tmp);
  394. } catch ( ... ) {} // ignore invalid IDs
  395. }
  396. return Identity();
  397. }
  398. void Topology::_memoizeUpstreams(void *tPtr)
  399. {
  400. // assumes _upstreams_m and _peers_m are locked
  401. _upstreamAddresses.clear();
  402. _amRoot = false;
  403. for(std::vector<World::Root>::const_iterator i(_planet.roots().begin());i!=_planet.roots().end();++i) {
  404. if (i->identity == RR->identity) {
  405. _amRoot = true;
  406. } else if (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),i->identity.address()) == _upstreamAddresses.end()) {
  407. _upstreamAddresses.push_back(i->identity.address());
  408. SharedPtr<Peer> &hp = _peers[i->identity.address()];
  409. if (!hp) {
  410. hp = new Peer(RR,RR->identity,i->identity);
  411. saveIdentity(tPtr,i->identity);
  412. }
  413. }
  414. }
  415. for(std::vector<World>::const_iterator m(_moons.begin());m!=_moons.end();++m) {
  416. for(std::vector<World::Root>::const_iterator i(m->roots().begin());i!=m->roots().end();++i) {
  417. if (i->identity == RR->identity) {
  418. _amRoot = true;
  419. } else if (std::find(_upstreamAddresses.begin(),_upstreamAddresses.end(),i->identity.address()) == _upstreamAddresses.end()) {
  420. _upstreamAddresses.push_back(i->identity.address());
  421. SharedPtr<Peer> &hp = _peers[i->identity.address()];
  422. if (!hp) {
  423. hp = new Peer(RR,RR->identity,i->identity);
  424. saveIdentity(tPtr,i->identity);
  425. }
  426. }
  427. }
  428. }
  429. std::sort(_upstreamAddresses.begin(),_upstreamAddresses.end());
  430. _cor.clear();
  431. for(std::vector<Address>::const_iterator a(_upstreamAddresses.begin());a!=_upstreamAddresses.end();++a) {
  432. if (!_cor.addRepresentative(*a))
  433. break;
  434. }
  435. _cor.sign(RR->identity,RR->node->now());
  436. }
  437. } // namespace ZeroTier