mirror of
				https://github.com/gravitl/netmaker.git
				synced 2025-10-25 13:37:00 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			159 lines
		
	
	
	
		
			5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			159 lines
		
	
	
	
		
			5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package functions
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"encoding/json"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"sync"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/gravitl/netmaker/logger"
 | |
| 	"github.com/gravitl/netmaker/netclient/auth"
 | |
| 	"github.com/gravitl/netmaker/netclient/config"
 | |
| 	"github.com/gravitl/netmaker/netclient/ncutils"
 | |
| 	"github.com/gravitl/netmaker/tls"
 | |
| )
 | |
| 
 | |
| // Checkin  -- go routine that checks for public or local ip changes, publishes changes
 | |
| //   if there are no updates, simply "pings" the server as a checkin
 | |
| func Checkin(ctx context.Context, wg *sync.WaitGroup) {
 | |
| 	defer wg.Done()
 | |
| 	for {
 | |
| 		select {
 | |
| 		case <-ctx.Done():
 | |
| 			logger.Log(0, "checkin routine closed")
 | |
| 			return
 | |
| 			//delay should be configuraable -> use cfg.Node.NetworkSettings.DefaultCheckInInterval ??
 | |
| 		case <-time.After(time.Second * 60):
 | |
| 			// logger.Log(0, "Checkin running")
 | |
| 			//read latest config
 | |
| 			networks, err := ncutils.GetSystemNetworks()
 | |
| 			if err != nil {
 | |
| 				return
 | |
| 			}
 | |
| 			for _, network := range networks {
 | |
| 				var nodeCfg config.ClientConfig
 | |
| 				nodeCfg.Network = network
 | |
| 				nodeCfg.ReadConfig()
 | |
| 				if nodeCfg.Node.IsStatic != "yes" {
 | |
| 					extIP, err := ncutils.GetPublicIP()
 | |
| 					if err != nil {
 | |
| 						logger.Log(1, "error encountered checking public ip addresses: ", err.Error())
 | |
| 					}
 | |
| 					if nodeCfg.Node.Endpoint != extIP && extIP != "" {
 | |
| 						logger.Log(1, "endpoint has changed from ", nodeCfg.Node.Endpoint, " to ", extIP)
 | |
| 						nodeCfg.Node.Endpoint = extIP
 | |
| 						if err := PublishNodeUpdate(&nodeCfg); err != nil {
 | |
| 							logger.Log(0, "could not publish endpoint change")
 | |
| 						}
 | |
| 					}
 | |
| 					intIP, err := getPrivateAddr()
 | |
| 					if err != nil {
 | |
| 						logger.Log(1, "error encountered checking private ip addresses: ", err.Error())
 | |
| 					}
 | |
| 					if nodeCfg.Node.LocalAddress != intIP && intIP != "" {
 | |
| 						logger.Log(1, "local Address has changed from ", nodeCfg.Node.LocalAddress, " to ", intIP)
 | |
| 						nodeCfg.Node.LocalAddress = intIP
 | |
| 						if err := PublishNodeUpdate(&nodeCfg); err != nil {
 | |
| 							logger.Log(0, "could not publish local address change")
 | |
| 						}
 | |
| 					}
 | |
| 					_ = UpdateLocalListenPort(&nodeCfg)
 | |
| 
 | |
| 				} else if nodeCfg.Node.IsLocal == "yes" && nodeCfg.Node.LocalRange != "" {
 | |
| 					localIP, err := ncutils.GetLocalIP(nodeCfg.Node.LocalRange)
 | |
| 					if err != nil {
 | |
| 						logger.Log(1, "error encountered checking local ip addresses: ", err.Error())
 | |
| 					}
 | |
| 					if nodeCfg.Node.Endpoint != localIP && localIP != "" {
 | |
| 						logger.Log(1, "endpoint has changed from "+nodeCfg.Node.Endpoint+" to ", localIP)
 | |
| 						nodeCfg.Node.Endpoint = localIP
 | |
| 						if err := PublishNodeUpdate(&nodeCfg); err != nil {
 | |
| 							logger.Log(0, "could not publish localip change")
 | |
| 						}
 | |
| 					}
 | |
| 				}
 | |
| 				if err := PingServer(&nodeCfg); err != nil {
 | |
| 					logger.Log(0, "could not ping server for , ", nodeCfg.Network, "\n", err.Error())
 | |
| 				} else {
 | |
| 					Hello(&nodeCfg)
 | |
| 				}
 | |
| 				checkCertExpiry(&nodeCfg)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // PublishNodeUpdates -- saves node and pushes changes to broker
 | |
| func PublishNodeUpdate(nodeCfg *config.ClientConfig) error {
 | |
| 	if err := config.Write(nodeCfg, nodeCfg.Network); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	data, err := json.Marshal(nodeCfg.Node)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if err = publish(nodeCfg, fmt.Sprintf("update/%s", nodeCfg.Node.ID), data, 1); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	logger.Log(0, "sent a node update to server for node", nodeCfg.Node.Name, ", ", nodeCfg.Node.ID)
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Hello -- ping the broker to let server know node it's alive and well
 | |
| func Hello(nodeCfg *config.ClientConfig) {
 | |
| 	if err := publish(nodeCfg, fmt.Sprintf("ping/%s", nodeCfg.Node.ID), []byte(ncutils.Version), 0); err != nil {
 | |
| 		logger.Log(0, fmt.Sprintf("error publishing ping, %v", err))
 | |
| 		logger.Log(0, "running pull on "+nodeCfg.Node.Network+" to reconnect")
 | |
| 		_, err := Pull(nodeCfg.Node.Network, true)
 | |
| 		if err != nil {
 | |
| 			logger.Log(0, "could not run pull on "+nodeCfg.Node.Network+", error: "+err.Error())
 | |
| 		}
 | |
| 	}
 | |
| 	logger.Log(3, "server checkin complete")
 | |
| }
 | |
| 
 | |
| // node cfg is required  in order to fetch the traffic keys of that node for encryption
 | |
| func publish(nodeCfg *config.ClientConfig, dest string, msg []byte, qos byte) error {
 | |
| 	// setup the keys
 | |
| 	trafficPrivKey, err := auth.RetrieveTrafficKey(nodeCfg.Node.Network)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	serverPubKey, err := ncutils.ConvertBytesToKey(nodeCfg.Node.TrafficKeys.Server)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	client := setupMQTT(nodeCfg, "", true)
 | |
| 	defer client.Disconnect(250)
 | |
| 	encrypted, err := ncutils.Chunk(msg, serverPubKey, trafficPrivKey)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if token := client.Publish(dest, qos, false, encrypted); token.Wait() && token.Error() != nil {
 | |
| 		return token.Error()
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func checkCertExpiry(cfg *config.ClientConfig) error {
 | |
| 	cert, err := tls.ReadCert(ncutils.GetNetclientServerPath(cfg.Server.Server) + "/client.pem")
 | |
| 	//if cert doesn't exist or will expire within 10 days
 | |
| 	if errors.Is(err, os.ErrNotExist) || cert.NotAfter.Before(time.Now().Add(time.Hour*24*10)) {
 | |
| 		key, err := tls.ReadKey(ncutils.GetNetclientPath() + "/client.key")
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		return RegisterWithServer(key, cfg)
 | |
| 	}
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	return nil
 | |
| }
 |