| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955 | /* * ZeroTier One - Network Virtualization Everywhere * Copyright (C) 2011-2018  ZeroTier, Inc. * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program.  If not, see <http://www.gnu.org/licenses/>. */#ifdef ZT_CONTROLLER_USE_LIBPQ#include "PostgreSQL.hpp"#include "EmbeddedNetworkController.hpp"#include "../version.h"#include <pqxx/pqxx>#include <sstream>using json = nlohmann::json;namespace {static const char *_timestr(){	time_t t = time(0);	char *ts = ctime(&t);	char *p = ts;	if (!p)		return "";	while (*p) {		if (*p == '\n') {			*p = (char)0;			break;		}		++p;	}	return ts;}std::string join(const std::vector<std::string> &elements, const char * const separator){	switch(elements.size()) {	case 0:		return "";	case 1:		return elements[0];	default:		std::ostringstream os;		std::copy(elements.begin(), elements.end()-1, std::ostream_iterator<std::string>(os, separator));		os << *elements.rbegin();		return os.str();	}}}namespace ZeroTier {class _MemberNotificationReceiver : public pqxx::notification_receiver{private:	ZeroTier::PostgreSQL *_pgsql;public:	_MemberNotificationReceiver(pqxx::connection_base &c, const std::string &channel, ZeroTier::PostgreSQL *pgsql)		: pqxx::notification_receiver(c, channel)		, _pgsql(pgsql)	{}	virtual void operator()(const std::string &payload, int backend_pid)	{		try {			json tmp(json::parse(payload));			json &ov = tmp["old_val"];			json &nv = tmp["new_val"];			json oldConfig, newConfig;			if (ov.is_object()) oldConfig = ov;			if (nv.is_object()) newConfig = nv;			if (oldConfig.is_object() || newConfig.is_object()) {				_pgsql->_memberChanged(oldConfig,newConfig,_pgsql->isReady());			}		} catch (std::exception &e) {			fprintf(stderr, "Exception parsing member notification: %s\n", e.what());		}	}};class _NetworkNotificationReceiver : public pqxx::notification_receiver{private:	ZeroTier::PostgreSQL *_pgsql;public:	_NetworkNotificationReceiver(pqxx::connection_base &c, const std::string &channel, ZeroTier::PostgreSQL *pgsql)		: pqxx::notification_receiver(c, channel)		, _pgsql(pgsql)	{}	virtual void operator()(const std::string &payload, int backend_pid)	{		try {			json tmp(json::parse(payload));			json &ov = tmp["old_val"];			json &nv = tmp["new_val"];			json oldConfig, newConfig;			if (ov.is_object()) oldConfig = ov;			if (nv.is_object()) newConfig = nv;			if (oldConfig.is_object()||newConfig.is_object()) {				_pgsql->_networkChanged(oldConfig,newConfig,_pgsql->isReady());			}		} catch (std::exception &e) {			fprintf(stderr, "Exception parsing member notification: %s\n", e.what());		} // ignore bad records	}};} // namespace ZeroTierusing namespace ZeroTier;PostgreSQL::PostgreSQL(EmbeddedNetworkController *const nc, const Identity &myId, const char *path)    : DB(nc, myId, path)    , _ready(0)	, _connected(1)    , _run(1)    , _waitNoticePrinted(false){	fprintf(stderr, "PostgreSQL Constructed");	_connString = std::string(path);	_readyLock.lock();	_heartbeatThread = std::thread(&PostgreSQL::heartbeat, this);	_membersDbWatcher = std::thread(&PostgreSQL::membersDbWatcher, this);	_networksDbWatcher = std::thread(&PostgreSQL::networksDbWatcher, this);	for (int i = 0; i < ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS; ++i) {		_commitThread[i] = std::thread(&PostgreSQL::commitThread, this);	}	_onlineNotificationThread = std::thread(&PostgreSQL::onlineNotificationThread, this);}PostgreSQL::~PostgreSQL(){	_run = 0;	std::this_thread::sleep_for(std::chrono::milliseconds(100));		_heartbeatThread.join();	_membersDbWatcher.join();	_networksDbWatcher.join();	for (int i = 0; i < ZT_CONTROLLER_RETHINKDB_COMMIT_THREADS; ++i) {		_commitThread[i].join();	}	_onlineNotificationThread.join();}bool PostgreSQL::waitForReady(){	while (_ready < 2) {		if (!_waitNoticePrinted) {			_waitNoticePrinted = true;			fprintf(stderr, "[%s] NOTICE: %.10llx controller PostgreSQL waiting for initial data download..." ZT_EOL_S, ::_timestr(), (unsigned long long)_myAddress.toInt());		}		_readyLock.lock();		_readyLock.unlock();	}	return true;}bool PostgreSQL::isReady(){	return ((_ready == 2)&&(_connected));}void PostgreSQL::save(nlohmann::json *orig, nlohmann::json &record){	try {		if (!record.is_object()) {			return;		}		waitForReady();		if (orig) {			if (*orig != record) {				record["revision"] = OSUtils::jsonInt(record["revision"],0ULL) + 1;				_commitQueue.post(new nlohmann::json(record));			}		} else {			record["revision"] = 1;			_commitQueue.post(new nlohmann::json(record));		}	} catch (std::exception &e) {		fprintf(stderr, "Error on PostgreSQL::save: %s\n", e.what());	} catch (...) {		fprintf(stderr, "Unknown error on PostgreSQL::save\n");	}}void PostgreSQL::eraseNetwork(const uint64_t networkId){	char tmp2[24];	waitForReady();	Utils::hex(networkId, tmp2);	json *tmp = new json();	(*tmp)["id"] = tmp2;	(*tmp)["objtype"] = "_delete_network";	_commitQueue.post(tmp);}void PostgreSQL::eraseMember(const uint64_t networkId, const uint64_t memberId) {	char tmp2[24];	json *tmp = new json();	Utils::hex(networkId, tmp2);	(*tmp)["nwid"] = tmp2;	Utils::hex(memberId, tmp2);	(*tmp)["id"] = tmp2;	(*tmp)["objtype"] = "_delete_member";	_commitQueue.post(tmp);}void PostgreSQL::nodeIsOnline(const uint64_t networkId, const uint64_t memberId, const InetAddress &physicalAddress){	std::lock_guard<std::mutex> l(_lastOnline_l);	std::pair<int64_t, InetAddress> &i = _lastOnline[std::pair<uint64_t,uint64_t>(networkId, memberId)];	i.first = OSUtils::now();	if (physicalAddress) {		i.second = physicalAddress;	}}void PostgreSQL::initializeNetworks(pqxx::connection &conn){	try {		if (!conn.is_open()) {			fprintf(stderr, "Bad Database Connection in initializeNetworks\n");			exit(1);		}		pqxx::work w(conn);		pqxx::result r = w.exec("SELECT id, EXTRACT(EPOCH FROM creation_time AT TIME ZONE 'UTC')*1000 AS creation_time, capabilities, "			"enable_broadcast, EXTRACT(EPOCH FROM last_modified AT TIME ZONE 'UTC')*1000 AS last_modified, mtu, multicast_limit, name, private, remote_trace_level, "			"remote_trace_target, revision, rules, tags, v4_assign_mode, v6_assign_mode FROM ztc_network "			"WHERE deleted = false AND controller_id = '" + w.esc(_myAddressStr) + "'");		for (pqxx::result::const_iterator row = r.begin(); row != r.end(); ++row) {			json empty;			json config;			std::string nwid = row["id"].as<std::string>();			config["id"] = nwid;			config["nwid"] = nwid;			try {				config["creationTime"] = row["creation_time"].as<uint64_t>();			} catch(std::exception &e) {				config["creationTime"] = 0ULL;			}			config["capabilities"] = json::parse(row["capabilities"].as<std::string>());			config["enableBroadcast"] = row["enable_broadcast"].as<bool>();			try {				config["lastModified"] = row["last_modified"].as<uint64_t>();			} catch (std::exception &e) {				config["lastModified"] = 0ULL;			}			try {				config["mtu"] = row["mtu"].as<int>();			} catch (std::exception &e) {				config["mtu"] = 2800;			}			try {				config["multicastLimit"] = row["multicast_limit"].as<int>();			} catch (std::exception &e) {				config["multicastLimit"] = 64;			}			config["name"] = row["name"].as<std::string>();			config["private"] = row["private"].as<bool>();			try {				config["remoteTraceLevel"] = row["remote_trace_level"].as<int>();			} catch (std::exception &e) {				config["remoteTraceLevel"] = 0;			}			config["remoteTraceTarget"] = (row["remote_trace_target"].is_null() ? nullptr : row["remote_trace_target"].as<std::string>());			try {				config["revision"] = row["revision"].as<uint64_t>();			} catch (std::exception &e) {				config["revision"] = 0ULL;				//fprintf(stderr, "Error converting revision: %s\n", PQgetvalue(res, i, 11));			}			config["rules"] = json::parse(row["rules"].as<std::string>());			config["tags"] = json::parse(row["tags"].as<std::string>());			config["v4AssignMode"] = json::parse(row["v4_assign_mode"].as<std::string>());			config["v6AssignMode"] = json::parse(row["v6_assign_mode"].as<std::string>());			config["objtype"] = "network";			config["ipAssignmentPools"] = json::array();			config["routes"] = json::array();			pqxx::work w2(conn);			pqxx::result res2 = w2.exec("SELECT host(ip_range_start) AS ip_range_start, host(ip_range_end) AS ip_range_end FROM ztc_network_assignment_pool WHERE network_id = '" + w2.esc(nwid) + "'");			for(pqxx::result::const_iterator it = res2.begin(); it != res2.end(); ++it) {				json ip;				ip["ipRangeStart"] = it["ip_range_start"].as<std::string>();				ip["ipRangeEnd"] = it["ip_range_end"].as<std::string>();				config["ipAssignmentPools"].push_back(ip);			}			w2.commit();			pqxx::work w3(conn);			pqxx::result res3 = w3.exec("SELECT host(address) AS address, bits, host(via) AS via FROM ztc_network_route WHERE network_id = '" + w3.esc(nwid) + "'");			for(pqxx::result::const_iterator it = res3.begin(); it != res3.end(); ++it) {				json route;				route["target"] = it["address"].as<std::string>() + "/" + it["bits"].as<std::string>();				if (route["via"].is_null()) {					route["via"] = nullptr;				} else {					route["via"] = it["via"].as<std::string>();				}				config["routes"].push_back(route);			}			w3.commit();			_networkChanged(empty, config, false);		}		w.commit();		if (++this->_ready == 2) {			if (_waitNoticePrinted) {				fprintf(stderr,"[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());			}			_readyLock.unlock();		}	} catch (std::exception &e) {		fprintf(stderr, "ERROR: Error initializing networks: %s", e.what());		exit(-1);	}}void PostgreSQL::initializeMembers(pqxx::connection &conn){	try {		if (!conn.is_open()) {			fprintf(stderr, "Bad Database Connection in initializeMembers\n");			exit(1);		}		pqxx::work w(conn);		pqxx::result res = w.exec(			"SELECT m.id AS id, m.network_id AS network_id, m.active_bridge AS active_bridge, "			"   m.authorized AS authorized, m.capabilities AS capabilities, "			"   EXTRACT(EPOCH FROM m.creation_time AT TIME ZONE 'UTC')*1000 AS creation_time, m.identity AS identity, "			"	EXTRACT(EPOCH FROM m.last_authorized_time AT TIME ZONE 'UTC')*1000 AS last_authorized_time, "			"	EXTRACT(EPOCH FROM m.last_deauthorized_time AT TIME ZONE 'UTC')*1000 AS last_deauthorized_time, "			"	m.remote_trace_level AS remote_trace_level, m.remote_trace_target AS remote_trace_target, "			"   m.tags AS tags, m.v_major AS v_major, m.v_minor AS v_minor, m.v_rev AS v_rev, "			"   m.v_proto AS v_proto, m.no_auto_assign_ips AS no_auto_assign_ips, m.revision AS revision "			"FROM ztc_member m "			"INNER JOIN ztc_network n "			"	ON n.id = m.network_id "			"WHERE n.controller_id = '" + w.esc(_myAddressStr) + "' AND m.deleted = false"		);		for(pqxx::result::const_iterator row = res.begin(); row != res.end(); ++row) {			json empty;			json config;			std::string networkId = row["network_id"].as<std::string>();			std::string memberId = row["id"].as<std::string>();			config["id"] = memberId;			config["nwid"] = networkId;			config["activeBridge"] = row["active_bridge"].as<bool>();			config["authorized"] = row["authorized"].as<bool>();			try {				config["capabilities"] = json::parse(row["capabilities"].as<std::string>());			} catch(std::exception &e) {				config["capabilities"] = json::array();			}			try {				config["creationTime"] = row["creation_time"].as<uint64_t>();			} catch(std::exception &e) {				config["creationTime"] = 0ULL;			}			config["identity"] = row["identity"].as<std::string>();			try {				config["lastAuthorizedTime"] = row["last_authorized_time"].as<uint64_t>();			} catch(std::exception &e) {				config["lastAuthorizedTime"] = 0ULL;			}			try {				config["lastDeauthorizedTime"] = row["last_deauthorized_time"].as<uint64_t>();			} catch(std::exception &e) {				config["lastDeauthorizedTime"] = 0ULL;			}			try {				config["remoteTraceLevel"] = row["remote_trace_level"].as<int>();			} catch(std::exception &e) {				config["remoteTraceLevel"] = 0;			}			config["remoteTraceTarget"] = (row["remote_trace_target"].is_null() ? nullptr : row["remote_trace_target"].as<std::string>());			try {				config["tags"] = json::parse(row["tags"].as<std::string>());			} catch(std::exception &e) {				config["tags"] = json::array();			}			try {				config["vMajor"] = row["v_major"].as<int>();			} catch(std::exception &e) {				config["vMajor"] = -1;			}			try {				config["vMinor"] = row["v_minor"].as<int>();			} catch (std::exception &e) {				config["vMinor"] = -1;			}			try {				config["vRev"] = row["v_rev"].as<int>();			} catch (std::exception &e) {				config["vRev"] = -1;			}			try {				config["vProto"] = row["v_proto"].as<int>();			} catch (std::exception &e) {				config["vProto"] = -1;			}			config["noAutoAssignIps"] = row["no_auto_assign_ips"].as<bool>();			try {				config["revision"] = row["revision"].as<uint64_t>();			} catch (std::exception &e) {				config["revision"] = 0ULL;				//fprintf(stderr, "Error updating revision (member): %s\n", PQgetvalue(res, i, 17));			}			config["objtype"] = "member";			config["ipAssignments"] = json::array();			pqxx::work w2(conn);			pqxx::result r2 = w2.exec(				"SELECT address FROM ztc_member_ip_assignment WHERE member_id = '"+w2.esc(memberId)+"' AND network_id = '"+w2.esc(networkId)+"'"			);			for(pqxx::result::const_iterator it = r2.begin(); it != r2.end(); ++it) {				config["ipAssignments"].push_back(it["address"].as<std::string>());			}			w2.commit();			_memberChanged(empty, config, false);		}		w.commit();		if (++this->_ready == 2) {			if (_waitNoticePrinted) {				fprintf(stderr,"[%s] NOTICE: %.10llx controller PostgreSQL data download complete." ZT_EOL_S,_timestr(),(unsigned long long)_myAddress.toInt());			}			_readyLock.unlock();		}	} catch (std::exception &e) {		fprintf(stderr, "ERROR: Error initializing members: %s\n", e.what());		exit(-1);	}}void PostgreSQL::heartbeat(){	char publicId[1024];	char hostnameTmp[1024];	_myId.toString(false,publicId);	if (gethostname(hostnameTmp, sizeof(hostnameTmp))!= 0) {		hostnameTmp[0] = (char)0;	} else {		for (int i = 0; i < sizeof(hostnameTmp); ++i) {			if ((hostnameTmp[i] == '.')||(hostnameTmp[i] == 0)) {				hostnameTmp[i] = (char)0;				break;			}		}	}	const char *controllerId = _myAddressStr.c_str();	const char *publicIdentity = publicId;	const char *hostname = hostnameTmp;	fprintf(stderr, "Heartbeat connection opening\n");	pqxx::connection conn(_connString);	if (!conn.is_open()) {		fprintf(stderr, "Connection to database failed: heartbeat\n");		exit(1);	}	fprintf(stderr, "Heartbeat connection opened\n");	conn.prepare("heartbeat", 		"INSERT INTO ztc_controller (id, cluster_host, last_alive, public_identity, v_major, v_minor, v_rev, v_build) " 		"VALUES ($1, $2, TO_TIMESTAMP($3::double precision/1000), $4, $5, $6, $7, $8) "		"ON CONFLICT (id) DO UPDATE SET cluster_host = EXCLUDED.cluster_host, last_alive = EXCLUDED.last_alive, "		"public_identity = EXCLUDED.public_identity, v_major = EXCLUDED.v_major, v_minor = EXCLUDED.v_minor, "		"v_rev = EXCLUDED.v_rev, v_build = EXCLUDED.v_rev"	);	while (_run == 1) {		try {			pqxx::work w(conn);			pqxx::result res = w.prepared("heartbeat")(controllerId)(hostname)				(OSUtils::now())(publicIdentity)(ZEROTIER_ONE_VERSION_MAJOR)				(ZEROTIER_ONE_VERSION_MINOR)(ZEROTIER_ONE_VERSION_REVISION)				(ZEROTIER_ONE_VERSION_BUILD).exec();			w.commit();		} catch (std::exception &e) {			fprintf(stderr, "Error inserting heartbeat: %s\n", e.what());			exit(1);		}		std::this_thread::sleep_for(std::chrono::milliseconds(1000));	}}void PostgreSQL::membersDbWatcher(){	try {		pqxx::connection conn(_connString);		if (!conn.is_open()) {			fprintf(stderr, "Connection to database failed: membersDbWatcher\n");			exit(1);		}		initializeMembers(conn);		char buf[11] = {0};		std::string cmd = "member_" + std::string(_myAddress.toString(buf));		_MemberNotificationReceiver receiver(conn, cmd, this);		while(_run == 1) {			conn.await_notification(5, 0);			std::this_thread::sleep_for(std::chrono::milliseconds(10));		}		conn.disconnect();	} catch (std::exception &e) {		fprintf(stderr, "Exception in membersDbWatcher: %s\n", e.what());		exit(1);	}}void PostgreSQL::networksDbWatcher(){	try {		pqxx::connection conn(_connString);		if (!conn.is_open()) {			fprintf(stderr, "Connection to database failed: networksDbWatcher\n");			exit(1);		}		initializeNetworks(conn);		char buf[11] = {0};		std::string cmd = "network_" + std::string(_myAddress.toString(buf));		_NetworkNotificationReceiver receiver(conn, cmd, this);		while(_run == 1) {			conn.await_notification(5, 0);			std::this_thread::sleep_for(std::chrono::milliseconds(10));		}	} catch(std::exception &e) {		fprintf(stderr, "Exception in networksDbWatcher: %s\n", e.what());		exit(1);	}}void PostgreSQL::commitThread(){	pqxx::connection conn(_connString);	if (!conn.is_open()) {		fprintf(stderr, "ERROR: Connection to database failed: commitThread\n");		exit(1);	}	conn.prepare("insert_member",		"INSERT INTO ztc_member (id, network_id, active_bridge, authorized, capabilities, "		"identity, last_authorized_time, last_deauthorized_time, no_auto_assign_ips, "		"remote_trace_level, remote_trace_target, revision, tags, v_major, v_minor, v_rev, v_proto) "		"VALUES ($1, $2, $3, $4, $5, $6, "		"TO_TIMESTAMP($7::double precision/1000), TO_TIMESTAMP($8::double precision/1000), "		"$9, $10, (CASE WHEN $11='' THEN NULL ELSE $1 END), $12, $13, $14, $15, $16, $17) ON CONFLICT (network_id, id) DO UPDATE SET "		"active_bridge = EXCLUDED.active_bridge, authorized = EXCLUDED.authorized, capabilities = EXCLUDED.capabilities, "		"identity = EXCLUDED.identity, last_authorized_time = EXCLUDED.last_authorized_time, "		"last_deauthorized_time = EXCLUDED.last_deauthorized_time, no_auto_assign_ips = EXCLUDED.no_auto_assign_ips, "		"remote_trace_level = EXCLUDED.remote_trace_level, remote_trace_target = EXCLUDED.remote_trace_target, "		"revision = EXCLUDED.revision+1, tags = EXCLUDED.tags, v_major = EXCLUDED.v_major, "		"v_minor = EXCLUDED.v_minor, v_rev = EXCLUDED.v_rev, v_proto = EXCLUDED.v_proto");	conn.prepare("delete_ip_assignments",		"DELETE FROM ztc_member_ip_assignment WHERE member_id = $1 AND network_id = $2");	conn.prepare("insert_ip_assignments",		"INSERT INTO ztc_member_ip_assignment (member_id, network_id, address) VALUES ($1, $2, $3)");	conn.prepare("update_network", 		"UPDATE ztc_network SET controller_id = $2, capabilities = $3, enable_broadcast = $4, "		"last_updated = $5, mtu = $6, multicast_limit = $7, name = $8, private = $9, "		"remote_trace_level = $10, remote_trace_target = $11, rules = $12, rules_source = $13, "		"tags = $14, v4_assign_mode = $15, v6_assign_mode = $16 "		"WHERE id = $1");	conn.prepare("delete_network_ip_pool",		"DELETE FROM ztc_network_assignment_pool WHERE network_id = $1");	conn.prepare("insert_network_ip_pool",		"INSERT INTO ztc_network_assignment_pool (network_id, ip_range_start, ip_range_end) VALUES ($1, $2, $3)");	conn.prepare("delete_network_route", "DELETE FROM ztc_network_route WHERE network_id = $1");	conn.prepare("insert_network_route", "INSERT INTO ztc_network_route (network_id, address, bits, via) VALUES ($1, $2, $3, $4)");	conn.prepare("delete_network", "UPDATE ztc_network SET deleted = true WHERE id = $1");	conn.prepare("delete_member", "UPDATE ztc_member SET hidden = true, deleted = true WHERE id = $1 AND network_id = $2");	json *config = nullptr;	while(_commitQueue.get(config)&(_run == 1)) {		if (!config) {			continue;		}		try { 			const std::string objtype = (*config)["objtype"];			if (objtype == "member") {				std::string memberId = (*config)["id"];				std::string networkId = (*config)["nwid"];				std::string target("");				if (!(*config)["remoteTraceTarget"].is_null()) {					target = (*config)["remoteTraceTarget"];				}				std::string identity = (*config)["identity"];				try {					std::string caps = OSUtils::jsonDump((*config)["capabilities"], -1);					std::string tags = OSUtils::jsonDump((*config)["tags"], -1);					pqxx::work w(conn);					pqxx::result res = w.prepared("insert_member")(memberId)(networkId)						((bool)(*config)["activeBridge"])((bool)(*config)["authorized"])(caps)						(identity)((long long)(*config)["lastAuthorizedTime"])((long long)(*config)["lastDeauthorizedTime"])						((bool)(*config)["noAutoAssignIps"])((int)(*config)["remoteTraceLevel"])						(target, !target.empty())						((int)(*config)["revision"])(tags)((int)(*config)["vMajor"])((int)(*config)["vMinor"])						((int)(*config)["vRev"])((int)(*config)["vProto"]).exec();					w.commit();				} catch (std::exception &e) {					fprintf(stderr, "Exception upserting member: %s\n", e.what());					delete config;					config = nullptr;					continue;				}				try {					pqxx::work w(conn);					pqxx::result res = w.prepared("delete_ip_assignments")(memberId)(networkId).exec();										for (auto i = (*config)["ipAssignments"].begin(); i != (*config)["ipAssignments"].end(); ++i) {						std::string addr = *i;						pqxx::result res2 = w.prepared("insert_ip_assignments")(memberId)(networkId)(addr).exec();					}					w.commit();				} catch (std::exception &e) {					fprintf(stderr, "Error assigning member IP addresses: %s\n", e.what());					delete config;					config = nullptr;				}				const uint64_t nwidInt = OSUtils::jsonIntHex((*config)["nwid"], 0ULL);				const uint64_t memberidInt = OSUtils::jsonIntHex((*config)["id"], 0ULL);				if (nwidInt && memberidInt) {					nlohmann::json nwOrig;					nlohmann::json memOrig;					nlohmann::json memNew(*config);										get(nwidInt, nwOrig, memberidInt, memOrig);								_memberChanged(memOrig, memNew, (this->_ready>=2));				} else {					fprintf(stderr, "Can't notify of change.  Error parsing nwid or memberid: %lu-%lu\n", nwidInt, memberidInt);				}			} else if (objtype == "network") {				std::string id = (*config)["id"];				std::string controllerId = _myAddressStr.c_str();				std::string name = (*config)["name"];				std::string rulesSource = (*config)["rulesSource"];				std::string caps = OSUtils::jsonDump((*config)["capabilitles"], -1);				std::string rtraceLevel = std::to_string((int)(*config)["remoteTraceLevel"]);				std::string rules = OSUtils::jsonDump((*config)["rules"], -1);				std::string tags = OSUtils::jsonDump((*config)["tags"], -1);				std::string v4mode = OSUtils::jsonDump((*config)["v4AssignMode"],-1);				std::string v6mode = OSUtils::jsonDump((*config)["v6AssignMode"], -1);				std::string target = "";				if (!(*config)["remoteTraceTarget"].is_null()) {					target = (*config)["remoteTraceTarget"];				}				try {					pqxx::work w(conn);					pqxx::result res = w.prepared("update_network")(id)(controllerId)(caps)((bool)(*config)["enableBroadcast"])						(OSUtils::now())((int)(*config)["mtu"])((int)(*config)["multicastLimit"])(name)((bool)(*config)["private"])						((int)(*config)["remoteTraceLevel"])(target, !target.empty())						(rules)(rulesSource)(tags)(v4mode)(v6mode).exec();					w.commit();				} catch (std::exception &e) {					fprintf(stderr, "Error updating network config: %s\n", e.what());					delete config;					config = nullptr;					continue;				}				try {					pqxx::work w(conn);					pqxx::result res = w.prepared("delete_network_ip_pool")(id).exec();					auto pool = (*config)["ipAssignmentPools"];					for (auto i = pool.begin(); i != pool.end(); ++i) {						std::string start = (*i)["ipRangeStart"];						std::string end = (*i)["ipRangeEnd"];						pqxx::result r2 = w.prepared("insert_nework_ip_pool")(id)(start)(end).exec();					}					pqxx::result res2 = w.prepared("delete_network_route")(id).exec();					auto routes = (*config)["routes"];					for (auto i = routes.begin(); i != routes.end(); ++i) {						std::string t = (*i)["target"];						std::vector<std::string> target;						std::istringstream f(t);						std::string s;						while(std::getline(f, s, '/')) {							target.push_back(s);						}						if (target.empty() || target.size() != 2) {							continue;						}						std::string targetAddr = target[0];						int targetBits = std::stoi(target[1]);						std::string via = "";						if (!(*i)["via"].is_null()) {							via = (*i)["via"];						}												pqxx::result res3 = w.prepared("insert_network_route")(id)(targetAddr)(targetBits)							(via, !via.empty()).exec();					}					w.commit();				} catch (std::exception &e) {					fprintf(stderr, "Error updating network IP pool: %s\n", e.what());				}				const uint64_t nwidInt = OSUtils::jsonIntHex((*config)["nwid"], 0ULL);				if (nwidInt) {					nlohmann::json nwOrig;					nlohmann::json nwNew(*config);					get(nwidInt, nwOrig);					_networkChanged(nwOrig, nwNew, true);				} else {					fprintf(stderr, "Can't notify network changed: %lu\n", nwidInt);				}			} else if (objtype == "trace") {				fprintf(stderr, "ERROR: Trace not yet implemented");			} else if (objtype == "_delete_network") {				try {					std::string networkId = (*config)["nwid"];										pqxx::work w(conn);					pqxx::result res = w.prepared("delete_network")(networkId).exec();					w.commit();				} catch (std::exception &e) {					fprintf(stderr, "ERROR: Error deleting network: %s\n", e.what());				}			} else if (objtype == "_delete_member") {				try {					std::string memberId = (*config)["id"];					std::string networkId = (*config)["nwid"];					pqxx::work w(conn);					pqxx::result res = w.prepared("delete_member")(memberId)(networkId).exec();					w.commit();				} catch (std::exception &e) {					fprintf(stderr, "ERROR: Error deleting member: %s\n", e.what());				}			} else {				fprintf(stderr, "ERROR: unknown objtype");			}		} catch (std::exception &e) {			fprintf(stderr, "ERROR: Error getting objtype: %s\n", e.what());		}		delete config;		config = nullptr;		std::this_thread::sleep_for(std::chrono::milliseconds(1));	}}void PostgreSQL::onlineNotificationThread(){	pqxx::connection conn(_connString);	if(!conn.is_open()) {		fprintf(stderr, "Connection to database failed: onlineNotificationThread\n");		exit(1);	}	_connected = 1;	int64_t	lastUpdatedNetworkStatus = 0;	std::unordered_map< std::pair<uint64_t,uint64_t>,int64_t,_PairHasher > lastOnlineCumulative;		while (_run == 1) {		// map used to send notifications to front end		std::unordered_map<std::string, std::vector<std::string>> updateMap;		std::unordered_map< std::pair<uint64_t,uint64_t>,std::pair<int64_t,InetAddress>,_PairHasher > lastOnline;		{			std::lock_guard<std::mutex> l(_lastOnline_l);			lastOnline.swap(_lastOnline);		}		try {			pqxx::work w(conn);			pqxx::pipeline p(w, "Member Update Pipeline");			for (auto i=lastOnline.begin(); i != lastOnline.end(); ++i) {				uint64_t nwid_i = i->first.first;				char nwidTmp[64];				char memTmp[64];				char ipTmp[64];				OSUtils::ztsnprintf(nwidTmp,sizeof(nwidTmp), "%.16llx", nwid_i);				OSUtils::ztsnprintf(memTmp,sizeof(memTmp), "%.10llx", i->first.second);				auto found = _networks.find(nwid_i);				if (found == _networks.end()) {					continue; // skip members trying to join non-existant networks				}				lastOnlineCumulative[i->first] = i->second.first;								std::string networkId(nwidTmp);				std::string memberId(memTmp);				std::vector<std::string> &members = updateMap[networkId];				members.push_back(memberId);				int64_t ts = i->second.first;				std::string ipAddr = i->second.second.toIpString(ipTmp);				std::string timestamp = std::to_string(ts);				std::stringstream ss;				ss << "INSERT INTO ztc_member_status (network_id, member_id, address, last_updated) VALUES ("				<< "'" << w.esc(networkId) << "', "				<< "'" << w.esc(memberId) << "', "				<< "'" << w.esc(ipAddr) << "', "				<< timestamp << ") "				<< "ON CONFLICT (network_id, member_id) DO UPDATE SET address = EXCLUDED.address, last_updated = EXCLUDED.last_updated";				p.insert(ss.str());			}			p.complete();			w.commit();		} catch (std::exception &e) {			fprintf(stderr, "Error updating member status: %s\n", e.what());		}		try {			const int64_t now = OSUtils::now();			if ((now - lastUpdatedNetworkStatus) > 10000) {				pqxx::work w(conn);				pqxx::pipeline p(w, "Network Update Pipeline");				lastUpdatedNetworkStatus = now;				std::vector<std::pair<uint64_t, std::shared_ptr<_Network>>> networks;				{					std::lock_guard<std::mutex> l(_networks_l);					for (auto i = _networks.begin(); i != _networks.end(); ++i) {						networks.push_back(*i);					}				}				for (auto i = networks.begin(); i != networks.end(); ++i) {					char tmp[64];					Utils::hex(i->first, tmp);					std::string networkId(tmp);					std::vector<std::string> &_notUsed = updateMap[networkId];					(void)_notUsed;					uint64_t authMemberCount = 0;					uint64_t totalMemberCount = 0;					uint64_t onlineMemberCount = 0;					uint64_t bridgeCount = 0;					uint64_t ts = now;					{						std::lock_guard<std::mutex> l2(i->second->lock);						authMemberCount = i->second->authorizedMembers.size();						totalMemberCount = i->second->members.size();						bridgeCount = i->second->activeBridgeMembers.size();						for (auto m=i->second->members.begin(); m != i->second->members.end(); ++m) {							auto lo = lastOnlineCumulative.find(std::pair<uint64_t,uint64_t>(i->first, m->first));							if (lo != lastOnlineCumulative.end()) {								if ((now - lo->second) <= (ZT_NETWORK_AUTOCONF_DELAY * 2)) {									++onlineMemberCount;								} else {									lastOnlineCumulative.erase(lo);								}							}						}					}					std::string bc = std::to_string(bridgeCount);					std::string amc = std::to_string(authMemberCount);					std::string omc = std::to_string(onlineMemberCount);					std::string tmc = std::to_string(totalMemberCount);					std::string timestamp = std::to_string(ts);					std::stringstream ss;					ss << "INSERT INTO ztc_network_status (network_id, bridge_count, authorized_member_count, "					   << "online_member_count, total_member_count, last_modified) VALUES ("					   << "'" << w.esc(networkId) << "', "					   << bridgeCount << ", "					   << authMemberCount << ", "					   << onlineMemberCount << ", "					   << totalMemberCount << ", "					   << "TO_TIMESTAMP(" << ts << "::double precision/1000)) "					   << "ON CONFLICT (network_id) DO UPDATE SET bridge_count = EXCLUDED.bridge_count, "					   << "authorized_member_count = EXCLUDED.authorized_member_count, online_member_count = EXCLUDED.online_member_count, "					   << "total_member_count = EXCLUDED.total_member_count, last_modified = EXCLUDED.last_modified"; 					p.insert(ss.str());				}				p.complete();				w.commit();			}		} catch (std::exception &e) {			fprintf(stderr, "Error updating network status: %s\n", e.what());		}		try {			pqxx::work w(conn);			pqxx::pipeline p(w, "Notification Sender");			for (auto it = updateMap.begin(); it != updateMap.end(); ++it) {				std::string networkId = it->first;				std::vector<std::string> members = it->second;				std::stringstream queryBuilder;				std::string membersStr = ::join(members, ",");				queryBuilder << "NOTIFY controller, '" << networkId << ":" << membersStr << "'";				std::string query = queryBuilder.str();				p.insert(query);			}			p.complete();			w.commit();		} catch (std::exception &e) {			fprintf(stderr, "Error notifying webapp: %s\n", e.what());		}		std::this_thread::sleep_for(std::chrono::milliseconds(1));	}}#endif //ZT_CONTROLLER_USE_LIBPQ
 |