2024-01-25 09:47:13 +08:00
|
|
|
//go:build ee
|
|
|
|
// +build ee
|
|
|
|
|
2023-10-02 12:57:58 +08:00
|
|
|
package pro
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/gravitl/netmaker/logic"
|
|
|
|
"github.com/gravitl/netmaker/models"
|
|
|
|
"github.com/gravitl/netmaker/mq"
|
|
|
|
"github.com/gravitl/netmaker/servercfg"
|
|
|
|
"golang.org/x/exp/slog"
|
|
|
|
)
|
|
|
|
|
|
|
|
const racAutoDisableCheckInterval = 3 * time.Minute
|
|
|
|
|
|
|
|
// AddRacHooks - adds hooks for Remote Access Client
|
|
|
|
func AddRacHooks() {
|
|
|
|
slog.Debug("adding RAC autodisable hook")
|
|
|
|
logic.HookManagerCh <- models.HookDetails{
|
|
|
|
Hook: racAutoDisableHook,
|
|
|
|
Interval: racAutoDisableCheckInterval,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// racAutoDisableHook - checks if RAC is enabled and if it is, checks if it should be disabled
|
|
|
|
func racAutoDisableHook() error {
|
|
|
|
slog.Debug("running RAC autodisable hook")
|
|
|
|
|
|
|
|
users, err := logic.GetUsers()
|
|
|
|
if err != nil {
|
|
|
|
slog.Error("error getting users: ", "error", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
clients, err := logic.GetAllExtClients()
|
|
|
|
if err != nil {
|
|
|
|
slog.Error("error getting clients: ", "error", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
currentTime := time.Now()
|
|
|
|
validityDuration := servercfg.GetJwtValidityDuration()
|
|
|
|
for _, user := range users {
|
|
|
|
if !currentTime.After(user.LastLoginTime.Add(validityDuration)) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
for _, client := range clients {
|
|
|
|
if (client.OwnerID == user.UserName) && !user.IsAdmin && !user.IsSuperAdmin && client.Enabled {
|
|
|
|
slog.Info(fmt.Sprintf("disabling ext client %s for user %s due to RAC autodisabling", client.ClientID, client.OwnerID))
|
|
|
|
if err := disableExtClient(&client); err != nil {
|
|
|
|
slog.Error("error disabling ext client in RAC autodisable hook", "error", err)
|
|
|
|
continue // dont return but try for other clients
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
slog.Debug("finished running RAC autodisable hook")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func disableExtClient(client *models.ExtClient) error {
|
|
|
|
if newClient, err := logic.ToggleExtClientConnectivity(client, false); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
// publish peer update to ingress gateway
|
|
|
|
if ingressNode, err := logic.GetNodeByID(newClient.IngressGatewayID); err == nil {
|
2024-01-11 18:29:19 +08:00
|
|
|
if err = mq.PublishPeerUpdate(false); err != nil {
|
2023-10-02 12:57:58 +08:00
|
|
|
slog.Error("error updating ext clients on", "ingress", ingressNode.ID.String(), "err", err.Error())
|
|
|
|
}
|
2024-01-10 17:27:29 +08:00
|
|
|
ingressHost, err := logic.GetHost(ingressNode.HostID.String())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
nodes, err := logic.GetAllNodes()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2024-08-16 18:05:43 +08:00
|
|
|
go mq.PublishSingleHostPeerUpdate(ingressHost, nodes, nil, []models.ExtClient{*client}, false, nil)
|
2023-10-02 12:57:58 +08:00
|
|
|
} else {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|