netmaker/netclient/functions/mqpublish.go

227 lines
7.2 KiB
Go
Raw Normal View History

package functions
import (
"context"
"encoding/json"
"errors"
"fmt"
"net"
"os"
2022-05-25 22:31:44 +08:00
"strconv"
"sync"
"time"
"github.com/cloverstd/tcping/ping"
"github.com/gravitl/netmaker/logger"
2022-08-09 04:02:32 +08:00
"github.com/gravitl/netmaker/models"
"github.com/gravitl/netmaker/netclient/auth"
"github.com/gravitl/netmaker/netclient/config"
"github.com/gravitl/netmaker/netclient/ncutils"
"github.com/gravitl/netmaker/tls"
)
// Checkin -- go routine that checks for public or local ip changes, publishes changes
2022-08-30 02:08:01 +08:00
//
// if there are no updates, simply "pings" the server as a checkin
2022-04-25 18:38:20 +08:00
func Checkin(ctx context.Context, wg *sync.WaitGroup) {
2022-07-14 02:07:10 +08:00
logger.Log(2, "starting checkin goroutine")
defer wg.Done()
for {
select {
case <-ctx.Done():
logger.Log(0, "checkin routine closed")
return
//delay should be configuraable -> use cfg.Node.NetworkSettings.DefaultCheckInInterval ??
case <-time.After(time.Second * 60):
2022-07-14 18:35:49 +08:00
checkin()
}
}
}
func checkin() {
networks, _ := ncutils.GetSystemNetworks()
logger.Log(3, "checkin with server(s) for all networks")
for _, network := range networks {
var nodeCfg config.ClientConfig
nodeCfg.Network = network
nodeCfg.ReadConfig()
// check for nftables present if on Linux
if ncutils.IsLinux() {
if ncutils.IsNFTablesPresent() {
nodeCfg.Node.FirewallInUse = models.FIREWALL_NFTABLES
} else {
nodeCfg.Node.FirewallInUse = models.FIREWALL_IPTABLES
}
} else {
// defaults to iptables for now, may need another default for non-Linux OSes
nodeCfg.Node.FirewallInUse = models.FIREWALL_IPTABLES
}
2022-07-14 18:35:49 +08:00
if nodeCfg.Node.IsStatic != "yes" {
extIP, err := ncutils.GetPublicIP(nodeCfg.Server.API)
2022-07-14 18:35:49 +08:00
if err != nil {
logger.Log(1, "error encountered checking public ip addresses: ", err.Error())
}
if nodeCfg.Node.Endpoint != extIP && extIP != "" {
logger.Log(1, "network:", nodeCfg.Node.Network, "endpoint has changed from ", nodeCfg.Node.Endpoint, " to ", extIP)
2022-07-14 18:35:49 +08:00
nodeCfg.Node.Endpoint = extIP
if err := PublishNodeUpdate(&nodeCfg); err != nil {
logger.Log(0, "network:", nodeCfg.Node.Network, "could not publish endpoint change")
2022-07-14 18:35:49 +08:00
}
}
intIP, err := getPrivateAddr()
if err != nil {
logger.Log(1, "network:", nodeCfg.Node.Network, "error encountered checking private ip addresses: ", err.Error())
2022-07-14 18:35:49 +08:00
}
if nodeCfg.Node.LocalAddress != intIP && intIP != "" {
logger.Log(1, "network:", nodeCfg.Node.Network, "local Address has changed from ", nodeCfg.Node.LocalAddress, " to ", intIP)
2022-07-14 18:35:49 +08:00
nodeCfg.Node.LocalAddress = intIP
if err := PublishNodeUpdate(&nodeCfg); err != nil {
2022-07-23 10:45:29 +08:00
logger.Log(0, "Network: ", nodeCfg.Node.Network, " could not publish local address change")
2022-07-14 18:35:49 +08:00
}
}
_ = UpdateLocalListenPort(&nodeCfg)
2022-04-22 20:36:42 +08:00
2022-07-14 18:35:49 +08:00
} else if nodeCfg.Node.IsLocal == "yes" && nodeCfg.Node.LocalRange != "" {
localIP, err := ncutils.GetLocalIP(nodeCfg.Node.LocalRange)
if err != nil {
logger.Log(1, "network:", nodeCfg.Node.Network, "error encountered checking local ip addresses: ", err.Error())
2022-07-14 18:35:49 +08:00
}
if nodeCfg.Node.Endpoint != localIP && localIP != "" {
logger.Log(1, "network:", nodeCfg.Node.Network, "endpoint has changed from "+nodeCfg.Node.Endpoint+" to ", localIP)
2022-07-14 18:35:49 +08:00
nodeCfg.Node.Endpoint = localIP
if err := PublishNodeUpdate(&nodeCfg); err != nil {
logger.Log(0, "network:", nodeCfg.Node.Network, "could not publish localip change")
}
}
}
//check version
if nodeCfg.Node.Version != ncutils.Version {
nodeCfg.Node.Version = ncutils.Version
config.Write(&nodeCfg, nodeCfg.Network)
}
2022-07-14 18:35:49 +08:00
Hello(&nodeCfg)
checkCertExpiry(&nodeCfg)
}
}
// PublishNodeUpdates -- saves node and pushes changes to broker
2022-04-12 22:43:02 +08:00
func PublishNodeUpdate(nodeCfg *config.ClientConfig) error {
if err := config.Write(nodeCfg, nodeCfg.Network); err != nil {
return err
}
data, err := json.Marshal(nodeCfg.Node)
if err != nil {
return err
}
2022-04-12 22:43:02 +08:00
if err = publish(nodeCfg, fmt.Sprintf("update/%s", nodeCfg.Node.ID), data, 1); err != nil {
return err
}
2022-04-22 20:36:42 +08:00
logger.Log(0, "network:", nodeCfg.Node.Network, "sent a node update to server for node", nodeCfg.Node.Name, ", ", nodeCfg.Node.ID)
return nil
}
// Hello -- ping the broker to let server know node it's alive and well
2022-04-12 22:43:02 +08:00
func Hello(nodeCfg *config.ClientConfig) {
2022-09-08 18:19:10 +08:00
var checkin models.NodeCheckin
checkin.Version = ncutils.Version
checkin.Connected = nodeCfg.Node.Connected
data, err := json.Marshal(checkin)
if err != nil {
logger.Log(0, "unable to marshal checkin data", err.Error())
return
}
if err := publish(nodeCfg, fmt.Sprintf("ping/%s", nodeCfg.Node.ID), data, 0); err != nil {
2022-07-23 10:45:29 +08:00
logger.Log(0, fmt.Sprintf("Network: %s error publishing ping, %v", nodeCfg.Node.Network, err))
2022-04-12 22:43:02 +08:00
logger.Log(0, "running pull on "+nodeCfg.Node.Network+" to reconnect")
_, err := Pull(nodeCfg.Node.Network, true)
if err != nil {
2022-04-12 22:43:02 +08:00
logger.Log(0, "could not run pull on "+nodeCfg.Node.Network+", error: "+err.Error())
}
} else {
logger.Log(3, "checkin for", nodeCfg.Network, "complete")
}
}
// node cfg is required in order to fetch the traffic keys of that node for encryption
2022-04-12 22:43:02 +08:00
func publish(nodeCfg *config.ClientConfig, dest string, msg []byte, qos byte) error {
// setup the keys
trafficPrivKey, err := auth.RetrieveTrafficKey(nodeCfg.Node.Network)
if err != nil {
return err
}
serverPubKey, err := ncutils.ConvertBytesToKey(nodeCfg.Node.TrafficKeys.Server)
if err != nil {
return err
}
encrypted, err := ncutils.Chunk(msg, serverPubKey, trafficPrivKey)
if err != nil {
return err
}
2022-08-30 02:08:01 +08:00
if mqclient == nil {
return errors.New("unable to publish ... no mqclient")
}
if token := mqclient.Publish(dest, qos, false, encrypted); !token.WaitTimeout(30*time.Second) || token.Error() != nil {
2022-07-08 04:16:56 +08:00
logger.Log(0, "could not connect to broker at "+nodeCfg.Server.Server+":"+nodeCfg.Server.MQPort)
2022-04-30 03:34:08 +08:00
var err error
if token.Error() == nil {
err = errors.New("connection timeout")
} else {
err = token.Error()
}
if err != nil {
return err
2022-04-30 03:34:08 +08:00
}
}
return nil
}
func checkCertExpiry(cfg *config.ClientConfig) error {
2022-07-01 09:56:11 +08:00
cert, err := tls.ReadCertFromFile(ncutils.GetNetclientServerPath(cfg.Server.Server) + ncutils.GetSeparator() + "client.pem")
//if cert doesn't exist or will expire within 10 days
if errors.Is(err, os.ErrNotExist) || cert.NotAfter.Before(time.Now().Add(time.Hour*24*10)) {
2022-07-01 09:56:11 +08:00
key, err := tls.ReadKeyFromFile(ncutils.GetNetclientPath() + ncutils.GetSeparator() + "client.key")
if err != nil {
return err
}
return RegisterWithServer(key, cfg)
}
if err != nil {
return err
}
return nil
}
func checkBroker(broker string, port string) error {
if broker == "" {
2022-05-31 00:54:30 +08:00
return errors.New("error: broker address is blank")
}
2022-05-31 00:56:58 +08:00
if port == "" {
return errors.New("error: broker port is blank")
}
_, err := net.LookupIP(broker)
if err != nil {
return errors.New("nslookup failed for broker ... check dns records")
}
pinger := ping.NewTCPing()
intPort, err := strconv.Atoi(port)
2022-05-25 22:31:44 +08:00
if err != nil {
logger.Log(1, "error converting port to int: "+err.Error())
}
pinger.SetTarget(&ping.Target{
Protocol: ping.TCP,
Host: broker,
Port: intPort,
Counter: 3,
Interval: 1 * time.Second,
Timeout: 2 * time.Second,
})
pingerDone := pinger.Start()
<-pingerDone
if pinger.Result().SuccessCounter == 0 {
return errors.New("unable to connect to broker port ... check netmaker server and firewalls")
}
return nil
}