package functions import ( "context" "encoding/json" "errors" "fmt" "os" "sync" "time" "github.com/gravitl/netmaker/logger" "github.com/gravitl/netmaker/netclient/auth" "github.com/gravitl/netmaker/netclient/config" "github.com/gravitl/netmaker/netclient/ncutils" "github.com/gravitl/netmaker/tls" ) // Checkin -- go routine that checks for public or local ip changes, publishes changes // if there are no updates, simply "pings" the server as a checkin func Checkin(ctx context.Context, wg *sync.WaitGroup) { defer wg.Done() for { select { case <-ctx.Done(): logger.Log(0, "checkin routine closed") return //delay should be configuraable -> use cfg.Node.NetworkSettings.DefaultCheckInInterval ?? case <-time.After(time.Second * 60): // logger.Log(0, "Checkin running") //read latest config networks, err := ncutils.GetSystemNetworks() if err != nil { return } for _, network := range networks { var nodeCfg config.ClientConfig nodeCfg.Network = network nodeCfg.ReadConfig() if nodeCfg.Node.IsStatic != "yes" { extIP, err := ncutils.GetPublicIP() if err != nil { logger.Log(1, "error encountered checking public ip addresses: ", err.Error()) } if nodeCfg.Node.Endpoint != extIP && extIP != "" { logger.Log(1, "endpoint has changed from ", nodeCfg.Node.Endpoint, " to ", extIP) nodeCfg.Node.Endpoint = extIP if err := PublishNodeUpdate(&nodeCfg); err != nil { logger.Log(0, "could not publish endpoint change") } } intIP, err := getPrivateAddr() if err != nil { logger.Log(1, "error encountered checking private ip addresses: ", err.Error()) } if nodeCfg.Node.LocalAddress != intIP && intIP != "" { logger.Log(1, "local Address has changed from ", nodeCfg.Node.LocalAddress, " to ", intIP) nodeCfg.Node.LocalAddress = intIP if err := PublishNodeUpdate(&nodeCfg); err != nil { logger.Log(0, "could not publish local address change") } } _ = UpdateLocalListenPort(&nodeCfg) } else if nodeCfg.Node.IsLocal == "yes" && nodeCfg.Node.LocalRange != "" { localIP, err := ncutils.GetLocalIP(nodeCfg.Node.LocalRange) if err != nil { logger.Log(1, "error encountered checking local ip addresses: ", err.Error()) } if nodeCfg.Node.Endpoint != localIP && localIP != "" { logger.Log(1, "endpoint has changed from "+nodeCfg.Node.Endpoint+" to ", localIP) nodeCfg.Node.Endpoint = localIP if err := PublishNodeUpdate(&nodeCfg); err != nil { logger.Log(0, "could not publish localip change") } } } Hello(&nodeCfg) checkCertExpiry(&nodeCfg) } } } } // PublishNodeUpdates -- saves node and pushes changes to broker func PublishNodeUpdate(nodeCfg *config.ClientConfig) error { if err := config.Write(nodeCfg, nodeCfg.Network); err != nil { return err } data, err := json.Marshal(nodeCfg.Node) if err != nil { return err } if err = publish(nodeCfg, fmt.Sprintf("update/%s", nodeCfg.Node.ID), data, 1); err != nil { return err } logger.Log(0, "sent a node update to server for node", nodeCfg.Node.Name, ", ", nodeCfg.Node.ID) return nil } // Hello -- ping the broker to let server know node it's alive and well func Hello(nodeCfg *config.ClientConfig) { if err := publish(nodeCfg, fmt.Sprintf("ping/%s", nodeCfg.Node.ID), []byte(ncutils.Version), 0); err != nil { logger.Log(0, fmt.Sprintf("error publishing ping, %v", err)) logger.Log(0, "running pull on "+nodeCfg.Node.Network+" to reconnect") _, err := Pull(nodeCfg.Node.Network, true) if err != nil { logger.Log(0, "could not run pull on "+nodeCfg.Node.Network+", error: "+err.Error()) } } logger.Log(3, "server checkin complete") } // node cfg is required in order to fetch the traffic keys of that node for encryption func publish(nodeCfg *config.ClientConfig, dest string, msg []byte, qos byte) error { // setup the keys trafficPrivKey, err := auth.RetrieveTrafficKey(nodeCfg.Node.Network) if err != nil { return err } serverPubKey, err := ncutils.ConvertBytesToKey(nodeCfg.Node.TrafficKeys.Server) if err != nil { return err } client := setupMQTT(nodeCfg, true) defer client.Disconnect(250) encrypted, err := ncutils.Chunk(msg, serverPubKey, trafficPrivKey) if err != nil { return err } if token := client.Publish(dest, qos, false, encrypted); !token.WaitTimeout(30*time.Second) || token.Error() != nil { logger.Log(0, "could not connect to broker at "+nodeCfg.Server.Server+":8883") var err error if token.Error() == nil { err = errors.New("connection timeout") } else { err = token.Error() } if err != nil { return token.Error() } } return nil } func checkCertExpiry(cfg *config.ClientConfig) error { cert, err := tls.ReadCert(ncutils.GetNetclientServerPath(cfg.Server.Server) + ncutils.GetSeparator() + "client.pem") //if cert doesn't exist or will expire within 10 days if errors.Is(err, os.ErrNotExist) || cert.NotAfter.Before(time.Now().Add(time.Hour*24*10)) { key, err := tls.ReadKey(ncutils.GetNetclientPath() + ncutils.GetSeparator() + "client.key") if err != nil { return err } return RegisterWithServer(key, cfg) } if err != nil { return err } return nil }