mirror of
https://github.com/gravitl/netmaker.git
synced 2024-09-20 15:26:04 +08:00
5a561b3835
* NET-1440 scale test changes * fix UT error and add error info * load metric data into cacha in startup * remove debug info for metric * add server telemetry and hasSuperAdmin to cache * fix user UT case * update sqlite connection string for performance * update check-in TS in cache only if cache enabled * update metric data in cache only if cache enabled and write to DB once in stop * update server status in mq topic * add failover existed to server status update * only send mq messsage when there is server status change * batch peerUpdate * code changes for scale for review * update UT case * update mq client check * mq connection code change * revert server status update changes * revert batch peerUpdate * remove server status update info * batch peerUpdate * code changes based on review and setupmqtt in keepalive * set the mq message order to false for PIN * remove setupmqtt in keepalive * add peerUpdate batch size to config * update batch peerUpdate * recycle ip in node deletion * update ip allocation logic * remove ip addr cap * remove ippool file * update get extClient func * remove ip from cache map when extClient is removed * add batch peerUpdate switch * set batch peerUpdate to true by default --------- Co-authored-by: Max Ma <mayabin@gmail.com>
89 lines
2.4 KiB
Go
89 lines
2.4 KiB
Go
//go:build ee
|
|
// +build ee
|
|
|
|
package pro
|
|
|
|
import (
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/gravitl/netmaker/logic"
|
|
"github.com/gravitl/netmaker/models"
|
|
"github.com/gravitl/netmaker/mq"
|
|
"github.com/gravitl/netmaker/servercfg"
|
|
"golang.org/x/exp/slog"
|
|
)
|
|
|
|
const racAutoDisableCheckInterval = 3 * time.Minute
|
|
|
|
// AddRacHooks - adds hooks for Remote Access Client
|
|
func AddRacHooks() {
|
|
slog.Debug("adding RAC autodisable hook")
|
|
logic.HookManagerCh <- models.HookDetails{
|
|
Hook: racAutoDisableHook,
|
|
Interval: racAutoDisableCheckInterval,
|
|
}
|
|
}
|
|
|
|
// racAutoDisableHook - checks if RAC is enabled and if it is, checks if it should be disabled
|
|
func racAutoDisableHook() error {
|
|
slog.Debug("running RAC autodisable hook")
|
|
|
|
users, err := logic.GetUsers()
|
|
if err != nil {
|
|
slog.Error("error getting users: ", "error", err)
|
|
return err
|
|
}
|
|
clients, err := logic.GetAllExtClients()
|
|
if err != nil {
|
|
slog.Error("error getting clients: ", "error", err)
|
|
return err
|
|
}
|
|
|
|
currentTime := time.Now()
|
|
validityDuration := servercfg.GetJwtValidityDuration()
|
|
for _, user := range users {
|
|
if !currentTime.After(user.LastLoginTime.Add(validityDuration)) {
|
|
continue
|
|
}
|
|
for _, client := range clients {
|
|
if (client.OwnerID == user.UserName) && !user.IsAdmin && !user.IsSuperAdmin && client.Enabled {
|
|
slog.Info(fmt.Sprintf("disabling ext client %s for user %s due to RAC autodisabling", client.ClientID, client.OwnerID))
|
|
if err := disableExtClient(&client); err != nil {
|
|
slog.Error("error disabling ext client in RAC autodisable hook", "error", err)
|
|
continue // dont return but try for other clients
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
slog.Debug("finished running RAC autodisable hook")
|
|
return nil
|
|
}
|
|
|
|
func disableExtClient(client *models.ExtClient) error {
|
|
if newClient, err := logic.ToggleExtClientConnectivity(client, false); err != nil {
|
|
return err
|
|
} else {
|
|
// publish peer update to ingress gateway
|
|
if ingressNode, err := logic.GetNodeByID(newClient.IngressGatewayID); err == nil {
|
|
if err = mq.PublishPeerUpdate(false); err != nil {
|
|
slog.Error("error updating ext clients on", "ingress", ingressNode.ID.String(), "err", err.Error())
|
|
}
|
|
ingressHost, err := logic.GetHost(ingressNode.HostID.String())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
nodes, err := logic.GetAllNodes()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
go mq.PublishSingleHostPeerUpdate(ingressHost, nodes, nil, []models.ExtClient{*client}, false, nil)
|
|
} else {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|