mirror of
https://github.com/gravitl/netmaker.git
synced 2024-11-14 13:44:37 +08:00
306 lines
10 KiB
Go
306 lines
10 KiB
Go
package mq
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"time"
|
|
|
|
mqtt "github.com/eclipse/paho.mqtt.golang"
|
|
"github.com/gravitl/netmaker/database"
|
|
"github.com/gravitl/netmaker/logger"
|
|
"github.com/gravitl/netmaker/logic"
|
|
"github.com/gravitl/netmaker/models"
|
|
"github.com/gravitl/netmaker/netclient/ncutils"
|
|
"github.com/gravitl/netmaker/servercfg"
|
|
)
|
|
|
|
// DefaultHandler default message queue handler -- NOT USED
|
|
func DefaultHandler(client mqtt.Client, msg mqtt.Message) {
|
|
logger.Log(0, "MQTT Message: Topic: ", string(msg.Topic()), " Message: ", string(msg.Payload()))
|
|
}
|
|
|
|
// Ping message Handler -- handles ping topic from client nodes
|
|
func Ping(client mqtt.Client, msg mqtt.Message) {
|
|
go func() {
|
|
id, err := getID(msg.Topic())
|
|
if err != nil {
|
|
logger.Log(0, "error getting node.ID sent on ping topic ")
|
|
return
|
|
}
|
|
node, err := logic.GetNodeByID(id)
|
|
if err != nil {
|
|
logger.Log(0, "mq-ping error getting node: ", err.Error())
|
|
record, err := database.FetchRecord(database.NODES_TABLE_NAME, id)
|
|
if err != nil {
|
|
logger.Log(0, "error reading database ", err.Error())
|
|
return
|
|
}
|
|
logger.Log(0, "record from database")
|
|
logger.Log(0, record)
|
|
return
|
|
}
|
|
decrypted, decryptErr := decryptMsg(&node, msg.Payload())
|
|
if decryptErr != nil {
|
|
logger.Log(0, "error decrypting when updating node ", node.ID, decryptErr.Error())
|
|
return
|
|
}
|
|
var checkin models.NodeCheckin
|
|
if err := json.Unmarshal(decrypted, &checkin); err != nil {
|
|
logger.Log(1, "error unmarshaling payload ", err.Error())
|
|
return
|
|
}
|
|
node.SetLastCheckIn()
|
|
node.Version = checkin.Version
|
|
node.Connected = checkin.Connected
|
|
if err := logic.UpdateNode(&node, &node); err != nil {
|
|
logger.Log(0, "error updating node", node.Name, node.ID, " on checkin", err.Error())
|
|
return
|
|
}
|
|
|
|
logger.Log(3, "ping processed for node", node.Name, node.ID)
|
|
// --TODO --set client version once feature is implemented.
|
|
//node.SetClientVersion(msg.Payload())
|
|
}()
|
|
}
|
|
|
|
// UpdateNode message Handler -- handles updates from client nodes
|
|
func UpdateNode(client mqtt.Client, msg mqtt.Message) {
|
|
go func() {
|
|
id, err := getID(msg.Topic())
|
|
if err != nil {
|
|
logger.Log(1, "error getting node.ID sent on ", msg.Topic(), err.Error())
|
|
return
|
|
}
|
|
currentNode, err := logic.GetNodeByID(id)
|
|
if err != nil {
|
|
logger.Log(1, "error getting node ", id, err.Error())
|
|
return
|
|
}
|
|
decrypted, decryptErr := decryptMsg(¤tNode, msg.Payload())
|
|
if decryptErr != nil {
|
|
logger.Log(1, "failed to decrypt message for node ", id, decryptErr.Error())
|
|
return
|
|
}
|
|
var newNode models.Node
|
|
if err := json.Unmarshal(decrypted, &newNode); err != nil {
|
|
logger.Log(1, "error unmarshaling payload ", err.Error())
|
|
return
|
|
}
|
|
ifaceDelta := logic.IfaceDelta(¤tNode, &newNode)
|
|
if servercfg.Is_EE && ifaceDelta {
|
|
if err = logic.EnterpriseResetAllPeersFailovers(currentNode.ID, currentNode.Network); err != nil {
|
|
logger.Log(1, "failed to reset failover list during node update", currentNode.Name, currentNode.Network)
|
|
}
|
|
}
|
|
newNode.SetLastCheckIn()
|
|
if err := logic.UpdateNode(¤tNode, &newNode); err != nil {
|
|
logger.Log(1, "error saving node", err.Error())
|
|
return
|
|
}
|
|
if ifaceDelta { // reduce number of unneeded updates, by only sending on iface changes
|
|
if err = PublishPeerUpdate(¤tNode, true); err != nil {
|
|
logger.Log(0, "error updating peers when node", currentNode.Name, currentNode.ID, "informed the server of an interface change", err.Error())
|
|
}
|
|
}
|
|
logger.Log(1, "updated node", id, newNode.Name)
|
|
}()
|
|
}
|
|
|
|
// UpdateMetrics message Handler -- handles updates from client nodes for metrics
|
|
func UpdateMetrics(client mqtt.Client, msg mqtt.Message) {
|
|
if servercfg.Is_EE {
|
|
go func() {
|
|
id, err := getID(msg.Topic())
|
|
if err != nil {
|
|
logger.Log(1, "error getting node.ID sent on ", msg.Topic(), err.Error())
|
|
return
|
|
}
|
|
currentNode, err := logic.GetNodeByID(id)
|
|
if err != nil {
|
|
logger.Log(1, "error getting node ", id, err.Error())
|
|
return
|
|
}
|
|
decrypted, decryptErr := decryptMsg(¤tNode, msg.Payload())
|
|
if decryptErr != nil {
|
|
logger.Log(1, "failed to decrypt message for node ", id, decryptErr.Error())
|
|
return
|
|
}
|
|
|
|
var newMetrics models.Metrics
|
|
if err := json.Unmarshal(decrypted, &newMetrics); err != nil {
|
|
logger.Log(1, "error unmarshaling payload ", err.Error())
|
|
return
|
|
}
|
|
|
|
shouldUpdate := updateNodeMetrics(¤tNode, &newMetrics)
|
|
|
|
if err = logic.UpdateMetrics(id, &newMetrics); err != nil {
|
|
logger.Log(1, "faield to update node metrics", id, currentNode.Name, err.Error())
|
|
return
|
|
}
|
|
if servercfg.IsMetricsExporter() {
|
|
if err := pushMetricsToExporter(newMetrics); err != nil {
|
|
logger.Log(2, fmt.Sprintf("failed to push node: [%s] metrics to exporter, err: %v",
|
|
currentNode.Name, err))
|
|
}
|
|
}
|
|
|
|
if newMetrics.Connectivity != nil {
|
|
err := logic.EnterpriseFailoverFunc(¤tNode)
|
|
if err != nil {
|
|
logger.Log(0, "failed to failover for node", currentNode.Name, "on network", currentNode.Network, "-", err.Error())
|
|
}
|
|
}
|
|
|
|
if shouldUpdate {
|
|
logger.Log(2, "updating peers after node", currentNode.Name, currentNode.Network, "detected connectivity issues")
|
|
if err = PublishSinglePeerUpdate(¤tNode); err != nil {
|
|
logger.Log(0, "failed to publish update after failover peer change for node", currentNode.Name, currentNode.Network)
|
|
}
|
|
}
|
|
|
|
logger.Log(1, "updated node metrics", id, currentNode.Name)
|
|
}()
|
|
}
|
|
}
|
|
|
|
// ClientPeerUpdate message handler -- handles updating peers after signal from client nodes
|
|
func ClientPeerUpdate(client mqtt.Client, msg mqtt.Message) {
|
|
go func() {
|
|
id, err := getID(msg.Topic())
|
|
if err != nil {
|
|
logger.Log(1, "error getting node.ID sent on ", msg.Topic(), err.Error())
|
|
return
|
|
}
|
|
currentNode, err := logic.GetNodeByID(id)
|
|
if err != nil {
|
|
logger.Log(1, "error getting node ", id, err.Error())
|
|
return
|
|
}
|
|
decrypted, decryptErr := decryptMsg(¤tNode, msg.Payload())
|
|
if decryptErr != nil {
|
|
logger.Log(1, "failed to decrypt message during client peer update for node ", id, decryptErr.Error())
|
|
return
|
|
}
|
|
switch decrypted[0] {
|
|
case ncutils.ACK:
|
|
currentServerNode, err := logic.GetNetworkServerLocal(currentNode.Network)
|
|
if err != nil {
|
|
return
|
|
}
|
|
if err := logic.ServerUpdate(¤tServerNode, false); err != nil {
|
|
logger.Log(1, "server node:", currentServerNode.ID, "failed update")
|
|
return
|
|
}
|
|
case ncutils.DONE:
|
|
updateNodePeers(¤tNode)
|
|
}
|
|
|
|
logger.Log(1, "sent peer updates after signal received from", id, currentNode.Name)
|
|
}()
|
|
}
|
|
|
|
func updateNodePeers(currentNode *models.Node) {
|
|
currentServerNode, err := logic.GetNetworkServerLocal(currentNode.Network)
|
|
if err != nil {
|
|
logger.Log(1, "failed to get server node failed update\n", err.Error())
|
|
return
|
|
}
|
|
if err := logic.ServerUpdate(¤tServerNode, false); err != nil {
|
|
logger.Log(1, "server node:", currentServerNode.ID, "failed update")
|
|
return
|
|
}
|
|
if logic.IsLeader(¤tServerNode) {
|
|
if err := PublishPeerUpdate(currentNode, false); err != nil {
|
|
logger.Log(1, "error publishing peer update ", err.Error())
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func updateNodeMetrics(currentNode *models.Node, newMetrics *models.Metrics) bool {
|
|
if newMetrics.FailoverPeers == nil {
|
|
newMetrics.FailoverPeers = make(map[string]string)
|
|
}
|
|
oldMetrics, err := logic.GetMetrics(currentNode.ID)
|
|
if err != nil {
|
|
logger.Log(1, "error finding old metrics for node", currentNode.ID, currentNode.Name)
|
|
return false
|
|
}
|
|
if oldMetrics.FailoverPeers == nil {
|
|
oldMetrics.FailoverPeers = make(map[string]string)
|
|
}
|
|
|
|
var attachedClients []models.ExtClient
|
|
if currentNode.IsIngressGateway == "yes" {
|
|
clients, err := logic.GetExtClientsByID(currentNode.ID, currentNode.Network)
|
|
if err == nil {
|
|
attachedClients = clients
|
|
}
|
|
}
|
|
if len(attachedClients) > 0 {
|
|
// associate ext clients with IDs
|
|
for i := range attachedClients {
|
|
extMetric := newMetrics.Connectivity[attachedClients[i].PublicKey]
|
|
if len(extMetric.NodeName) == 0 &&
|
|
len(newMetrics.Connectivity[attachedClients[i].ClientID].NodeName) > 0 { // cover server clients
|
|
extMetric = newMetrics.Connectivity[attachedClients[i].ClientID]
|
|
if extMetric.TotalReceived > 0 && extMetric.TotalSent > 0 {
|
|
extMetric.Connected = true
|
|
}
|
|
}
|
|
extMetric.NodeName = attachedClients[i].ClientID
|
|
extMetric.IsServer = "no"
|
|
delete(newMetrics.Connectivity, attachedClients[i].PublicKey)
|
|
newMetrics.Connectivity[attachedClients[i].ClientID] = extMetric
|
|
}
|
|
}
|
|
|
|
// run through metrics for each peer
|
|
for k := range newMetrics.Connectivity {
|
|
currMetric := newMetrics.Connectivity[k]
|
|
oldMetric := oldMetrics.Connectivity[k]
|
|
currMetric.TotalTime += oldMetric.TotalTime
|
|
currMetric.Uptime += oldMetric.Uptime // get the total uptime for this connection
|
|
if currMetric.Uptime == 0 || currMetric.TotalTime == 0 {
|
|
currMetric.PercentUp = 0
|
|
} else {
|
|
currMetric.PercentUp = 100.0 * (float64(currMetric.Uptime) / float64(currMetric.TotalTime))
|
|
}
|
|
totalUpMinutes := currMetric.Uptime * ncutils.CheckInInterval
|
|
currMetric.ActualUptime = time.Duration(totalUpMinutes) * time.Minute
|
|
delete(oldMetrics.Connectivity, k) // remove from old data
|
|
newMetrics.Connectivity[k] = currMetric
|
|
}
|
|
|
|
// add nodes that need failover
|
|
nodes, err := logic.GetNetworkNodes(currentNode.Network)
|
|
if err != nil {
|
|
logger.Log(0, "failed to retrieve nodes while updating metrics")
|
|
return false
|
|
}
|
|
for _, node := range nodes {
|
|
if !newMetrics.Connectivity[node.ID].Connected &&
|
|
len(newMetrics.Connectivity[node.ID].NodeName) > 0 &&
|
|
node.Connected == "yes" &&
|
|
len(node.FailoverNode) > 0 &&
|
|
node.Failover != "yes" {
|
|
newMetrics.FailoverPeers[node.ID] = node.FailoverNode
|
|
}
|
|
}
|
|
shouldUpdate := len(oldMetrics.FailoverPeers) == 0 && len(newMetrics.FailoverPeers) > 0
|
|
for k, v := range oldMetrics.FailoverPeers {
|
|
if len(newMetrics.FailoverPeers[k]) > 0 && len(v) == 0 {
|
|
shouldUpdate = true
|
|
}
|
|
|
|
if len(v) > 0 && len(newMetrics.FailoverPeers[k]) == 0 {
|
|
newMetrics.FailoverPeers[k] = v
|
|
}
|
|
}
|
|
|
|
for k := range oldMetrics.Connectivity { // cleanup any left over data, self healing
|
|
delete(newMetrics.Connectivity, k)
|
|
}
|
|
return shouldUpdate
|
|
}
|