| /* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */ |
| /* |
| * Copyright (c) 2014-2023, The University of Memphis, |
| * Regents of the University of California |
| * |
| * This file is part of NLSR (Named-data Link State Routing). |
| * See AUTHORS.md for complete list of NLSR authors and contributors. |
| * |
| * NLSR is free software: you can redistribute it and/or modify it under the terms |
| * of the GNU General Public License as published by the Free Software Foundation, |
| * either version 3 of the License, or (at your option) any later version. |
| * |
| * NLSR is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; |
| * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR |
| * PURPOSE. See the GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU General Public License along with |
| * NLSR, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>. |
| */ |
| |
| #include "conf-parameter.hpp" |
| #include "logger.hpp" |
| |
| #include <ndn-cxx/security/signing-helpers.hpp> |
| |
| namespace nlsr { |
| |
| INIT_LOGGER(ConfParameter); |
| |
| static std::unique_ptr<ndn::security::CertificateFetcherDirectFetch> |
| makeCertificateFetcher(ndn::Face& face) |
| { |
| auto fetcher = std::make_unique<ndn::security::CertificateFetcherDirectFetch>(face); |
| fetcher->setSendDirectInterestOnly(true); |
| return fetcher; |
| } |
| |
| ConfParameter::ConfParameter(ndn::Face& face, ndn::KeyChain& keyChain, |
| const std::string& confFileName) |
| : m_confFileName(confFileName) |
| , m_lsaRefreshTime(LSA_REFRESH_TIME_DEFAULT) |
| , m_adjLsaBuildInterval(ADJ_LSA_BUILD_INTERVAL_DEFAULT) |
| , m_routingCalcInterval(ROUTING_CALC_INTERVAL_DEFAULT) |
| , m_faceDatasetFetchInterval(ndn::time::seconds(static_cast<int>(FACE_DATASET_FETCH_INTERVAL_DEFAULT))) |
| , m_lsaInterestLifetime(ndn::time::seconds(static_cast<int>(LSA_INTEREST_LIFETIME_DEFAULT))) |
| , m_routerDeadInterval(2 * LSA_REFRESH_TIME_DEFAULT) |
| , m_interestRetryNumber(HELLO_RETRIES_DEFAULT) |
| , m_interestResendTime(HELLO_TIMEOUT_DEFAULT) |
| , m_infoInterestInterval(HELLO_INTERVAL_DEFAULT) |
| , m_hyperbolicState(HYPERBOLIC_STATE_OFF) |
| , m_corR(0) |
| , m_maxFacesPerPrefix(MAX_FACES_PER_PREFIX_MIN) |
| , m_syncInterestLifetime(ndn::time::milliseconds(SYNC_INTEREST_LIFETIME_DEFAULT)) |
| , m_adjl() |
| , m_npl() |
| , m_validator(makeCertificateFetcher(face)) |
| , m_prefixUpdateValidator(std::make_unique<ndn::security::CertificateFetcherDirectFetch>(face)) |
| , m_keyChain(keyChain) |
| { |
| } |
| |
| void |
| ConfParameter::writeLog() |
| { |
| NLSR_LOG_INFO("Router Name: " << m_routerName); |
| NLSR_LOG_INFO("Site Name: " << m_siteName); |
| NLSR_LOG_INFO("Network: " << m_network); |
| NLSR_LOG_INFO("Router Prefix: " << m_routerPrefix); |
| NLSR_LOG_INFO("Sync Prefix: " << m_syncPrefix); |
| NLSR_LOG_INFO("Sync LSA prefix: " << m_lsaPrefix); |
| NLSR_LOG_INFO("Hello Interest retry number: " << m_interestRetryNumber); |
| NLSR_LOG_INFO("Hello Interest resend second: " << m_interestResendTime); |
| NLSR_LOG_INFO("Info Interest interval: " << m_infoInterestInterval); |
| NLSR_LOG_INFO("LSA refresh time: " << m_lsaRefreshTime); |
| NLSR_LOG_INFO("FIB Entry refresh time: " << m_lsaRefreshTime * 2); |
| NLSR_LOG_INFO("LSA Interest lifetime: " << getLsaInterestLifetime()); |
| NLSR_LOG_INFO("Router dead interval: " << getRouterDeadInterval()); |
| NLSR_LOG_INFO("Max Faces Per Prefix: " << m_maxFacesPerPrefix); |
| if (m_hyperbolicState == HYPERBOLIC_STATE_ON || m_hyperbolicState == HYPERBOLIC_STATE_DRY_RUN) { |
| NLSR_LOG_INFO("Hyperbolic Routing: " << m_hyperbolicState); |
| NLSR_LOG_INFO("Hyp R: " << m_corR); |
| int i=0; |
| for (auto const& value: m_corTheta) { |
| NLSR_LOG_INFO("Hyp Angle " << i++ << ": "<< value); |
| } |
| } |
| NLSR_LOG_INFO("State Directory: " << m_stateFileDir); |
| |
| // Event Intervals |
| NLSR_LOG_INFO("Adjacency LSA build interval: " << m_adjLsaBuildInterval); |
| NLSR_LOG_INFO("Routing calculation interval: " << m_routingCalcInterval); |
| } |
| |
| void |
| ConfParameter::setNetwork(const ndn::Name& networkName) |
| { |
| m_network = networkName; |
| |
| if (m_syncProtocol != SyncProtocol::SVS) { |
| m_syncPrefix.append("localhop"); |
| } |
| m_syncPrefix.append(m_network); |
| m_syncPrefix.append("nlsr"); |
| m_syncPrefix.append("sync"); |
| m_syncPrefix.appendVersion(SYNC_VERSION); |
| |
| m_lsaPrefix.append("localhop"); |
| m_lsaPrefix.append(m_network); |
| m_lsaPrefix.append("nlsr"); |
| m_lsaPrefix.append("LSA"); |
| } |
| |
| void |
| ConfParameter::loadCertToValidator(const ndn::security::Certificate& cert) |
| { |
| NLSR_LOG_TRACE("Loading Certificate Name: " << cert.getName()); |
| m_validator.loadAnchor("Authoritative-Certificate", ndn::security::Certificate(cert)); |
| m_prefixUpdateValidator.loadAnchor("Authoritative-Certificate", ndn::security::Certificate(cert)); |
| } |
| |
| std::optional<ndn::security::Certificate> |
| ConfParameter::initializeKey() |
| { |
| using namespace ndn::security; |
| NLSR_LOG_DEBUG("Initializing Key ..."); |
| |
| Identity routerIdentity; |
| try { |
| routerIdentity = m_keyChain.getPib().getIdentity(m_routerPrefix); |
| } |
| catch (const Pib::Error&) { |
| NLSR_LOG_ERROR("Router identity " << m_routerPrefix << " not found. " |
| "NLSR is running without security. " |
| "If security is enabled in the configuration, NLSR will not converge."); |
| return std::nullopt; |
| } |
| catch (const std::invalid_argument& e) { |
| // This is (probably) needed for the dummy keychain patch. |
| // https://github.com/named-data/mini-ndn/blob/master/util/patches/ndn-cxx-dummy-keychain.patch |
| NLSR_LOG_DEBUG(e.what()); |
| } |
| |
| auto instanceName = ndn::Name(m_routerPrefix).append("nlsr"); |
| try { |
| m_keyChain.deleteIdentity(m_keyChain.getPib().getIdentity(instanceName)); |
| } |
| catch (const Pib::Error&) { |
| // old instance identity does not exist |
| } |
| catch (const std::invalid_argument& e) { |
| // This is needed for the dummy-keychain patch (ref above) to handle the error that it generates. |
| const std::string exceptionText = e.what(); |
| if (exceptionText.find("does not match identity") == std::string::npos) { |
| NLSR_LOG_ERROR(exceptionText); |
| throw; |
| } |
| return std::nullopt; |
| } |
| |
| auto key = m_keyChain.createIdentity(instanceName).getDefaultKey(); |
| auto cert = m_keyChain.makeCertificate(key, signingByIdentity(routerIdentity)); |
| m_keyChain.setDefaultCertificate(key, cert); |
| |
| m_signingInfo = signingByCertificate(cert); |
| loadCertToValidator(cert); |
| return cert; |
| } |
| |
| } // namespace nlsr |