mirror of
				https://github.com/gravitl/netmaker.git
				synced 2025-11-01 00:49:04 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			244 lines
		
	
	
	
		
			6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			244 lines
		
	
	
	
		
			6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // -build ee
 | |
| package main
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"flag"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"os/signal"
 | |
| 	"path/filepath"
 | |
| 	"runtime/debug"
 | |
| 	"sync"
 | |
| 	"syscall"
 | |
| 
 | |
| 	"github.com/gravitl/netmaker/config"
 | |
| 	controller "github.com/gravitl/netmaker/controllers"
 | |
| 	"github.com/gravitl/netmaker/database"
 | |
| 	"github.com/gravitl/netmaker/functions"
 | |
| 	"github.com/gravitl/netmaker/logger"
 | |
| 	"github.com/gravitl/netmaker/logic"
 | |
| 	"github.com/gravitl/netmaker/migrate"
 | |
| 	"github.com/gravitl/netmaker/models"
 | |
| 	"github.com/gravitl/netmaker/mq"
 | |
| 	"github.com/gravitl/netmaker/netclient/ncutils"
 | |
| 	"github.com/gravitl/netmaker/servercfg"
 | |
| 	"github.com/gravitl/netmaker/serverctl"
 | |
| 	"golang.org/x/exp/slog"
 | |
| )
 | |
| 
 | |
| var version = "v0.25.0"
 | |
| 
 | |
| //	@title			NetMaker
 | |
| //	@version		0.24.3
 | |
| //	@description	NetMaker API Docs
 | |
| //	@tag.name	    APIUsage
 | |
| //	@tag.description.markdown
 | |
| //	@tag.name	    Authentication
 | |
| //	@tag.description.markdown
 | |
| //	@tag.name	    Pricing
 | |
| //	@tag.description.markdown
 | |
| //  @host      api.demo.netmaker.io
 | |
| 
 | |
| // Start DB Connection and start API Request Handler
 | |
| func main() {
 | |
| 	absoluteConfigPath := flag.String("c", "", "absolute path to configuration file")
 | |
| 	flag.Parse()
 | |
| 	setupConfig(*absoluteConfigPath)
 | |
| 	servercfg.SetVersion(version)
 | |
| 	fmt.Println(models.RetrieveLogo()) // print the logo
 | |
| 	initialize()                       // initial db and acls
 | |
| 	logic.SetAllocatedIpMap()
 | |
| 	defer logic.ClearAllocatedIpMap()
 | |
| 	setGarbageCollection()
 | |
| 	setVerbosity()
 | |
| 	if servercfg.DeployedByOperator() && !servercfg.IsPro {
 | |
| 		logic.SetFreeTierLimits()
 | |
| 	}
 | |
| 	defer database.CloseDB()
 | |
| 	ctx, stop := signal.NotifyContext(context.Background(), syscall.SIGTERM, os.Interrupt)
 | |
| 	defer stop()
 | |
| 	var waitGroup sync.WaitGroup
 | |
| 	startControllers(&waitGroup, ctx) // start the api endpoint and mq and stun
 | |
| 	startHooks()
 | |
| 	<-ctx.Done()
 | |
| 	waitGroup.Wait()
 | |
| }
 | |
| 
 | |
| func setupConfig(absoluteConfigPath string) {
 | |
| 	if len(absoluteConfigPath) > 0 {
 | |
| 		cfg, err := config.ReadConfig(absoluteConfigPath)
 | |
| 		if err != nil {
 | |
| 			logger.Log(0, fmt.Sprintf("failed parsing config at: %s", absoluteConfigPath))
 | |
| 			return
 | |
| 		}
 | |
| 		config.Config = cfg
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func startHooks() {
 | |
| 	err := logic.TimerCheckpoint()
 | |
| 	if err != nil {
 | |
| 		logger.Log(1, "Timer error occurred: ", err.Error())
 | |
| 	}
 | |
| 	logic.EnterpriseCheck()
 | |
| }
 | |
| 
 | |
| func initialize() { // Client Mode Prereq Check
 | |
| 	var err error
 | |
| 
 | |
| 	if servercfg.GetMasterKey() == "" {
 | |
| 		logger.Log(0, "warning: MASTER_KEY not set, this could make account recovery difficult")
 | |
| 	}
 | |
| 
 | |
| 	if servercfg.GetNodeID() == "" {
 | |
| 		logger.FatalLog("error: must set NODE_ID, currently blank")
 | |
| 	}
 | |
| 
 | |
| 	if err = database.InitializeDatabase(); err != nil {
 | |
| 		logger.FatalLog("Error connecting to database: ", err.Error())
 | |
| 	}
 | |
| 	logger.Log(0, "database successfully connected")
 | |
| 	migrate.Run()
 | |
| 
 | |
| 	logic.SetJWTSecret()
 | |
| 	logic.InitialiseRoles()
 | |
| 	logic.IntialiseGroups()
 | |
| 	err = serverctl.SetDefaults()
 | |
| 	if err != nil {
 | |
| 		logger.FatalLog("error setting defaults: ", err.Error())
 | |
| 	}
 | |
| 
 | |
| 	if servercfg.IsDNSMode() {
 | |
| 		err := functions.SetDNSDir()
 | |
| 		if err != nil {
 | |
| 			logger.FatalLog(err.Error())
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if servercfg.IsMessageQueueBackend() {
 | |
| 		if err = mq.ServerStartNotify(); err != nil {
 | |
| 			logger.Log(0, "error occurred when notifying nodes of startup", err.Error())
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func startControllers(wg *sync.WaitGroup, ctx context.Context) {
 | |
| 	if servercfg.IsDNSMode() {
 | |
| 		err := logic.SetDNS()
 | |
| 		if err != nil {
 | |
| 			logger.Log(0, "error occurred initializing DNS: ", err.Error())
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	//Run Rest Server
 | |
| 	if servercfg.IsRestBackend() {
 | |
| 		if !servercfg.DisableRemoteIPCheck() && servercfg.GetAPIHost() == "127.0.0.1" {
 | |
| 			err := servercfg.SetHost()
 | |
| 			if err != nil {
 | |
| 				logger.FatalLog("Unable to Set host. Exiting...", err.Error())
 | |
| 			}
 | |
| 		}
 | |
| 		wg.Add(1)
 | |
| 		go controller.HandleRESTRequests(wg, ctx)
 | |
| 	}
 | |
| 	//Run MessageQueue
 | |
| 	if servercfg.IsMessageQueueBackend() {
 | |
| 		wg.Add(1)
 | |
| 		go runMessageQueue(wg, ctx)
 | |
| 	}
 | |
| 
 | |
| 	if !servercfg.IsRestBackend() && !servercfg.IsMessageQueueBackend() {
 | |
| 		logger.Log(
 | |
| 			0,
 | |
| 			"No Server Mode selected, so nothing is being served! Set Rest mode (REST_BACKEND) or MessageQueue (MESSAGEQUEUE_BACKEND) to 'true'.",
 | |
| 		)
 | |
| 	}
 | |
| 
 | |
| 	wg.Add(1)
 | |
| 	go logic.StartHookManager(ctx, wg)
 | |
| }
 | |
| 
 | |
| // Should we be using a context vice a waitgroup????????????
 | |
| func runMessageQueue(wg *sync.WaitGroup, ctx context.Context) {
 | |
| 	defer wg.Done()
 | |
| 	brokerHost, _ := servercfg.GetMessageQueueEndpoint()
 | |
| 	logger.Log(0, "connecting to mq broker at", brokerHost)
 | |
| 	mq.SetupMQTT(true)
 | |
| 	if mq.IsConnected() {
 | |
| 		logger.Log(0, "connected to MQ Broker")
 | |
| 	} else {
 | |
| 		logger.FatalLog("error connecting to MQ Broker")
 | |
| 	}
 | |
| 	defer mq.CloseClient()
 | |
| 	go mq.Keepalive(ctx)
 | |
| 	go func() {
 | |
| 		peerUpdate := make(chan *models.Node)
 | |
| 		go logic.ManageZombies(ctx, peerUpdate)
 | |
| 		go logic.DeleteExpiredNodes(ctx, peerUpdate)
 | |
| 		for nodeUpdate := range peerUpdate {
 | |
| 			if nodeUpdate == nil {
 | |
| 				continue
 | |
| 			}
 | |
| 			node := nodeUpdate
 | |
| 			node.Action = models.NODE_DELETE
 | |
| 			node.PendingDelete = true
 | |
| 			if err := mq.NodeUpdate(node); err != nil {
 | |
| 				logger.Log(
 | |
| 					0,
 | |
| 					"failed to send peer update for deleted node: ",
 | |
| 					node.ID.String(),
 | |
| 					err.Error(),
 | |
| 				)
 | |
| 			}
 | |
| 			if err := logic.DeleteNode(node, true); err != nil {
 | |
| 				slog.Error(
 | |
| 					"error deleting expired node",
 | |
| 					"nodeid",
 | |
| 					node.ID.String(),
 | |
| 					"error",
 | |
| 					err.Error(),
 | |
| 				)
 | |
| 			}
 | |
| 			go mq.PublishDeletedNodePeerUpdate(node)
 | |
| 		}
 | |
| 	}()
 | |
| 	<-ctx.Done()
 | |
| 	logger.Log(0, "Message Queue shutting down")
 | |
| }
 | |
| 
 | |
| func setVerbosity() {
 | |
| 	verbose := int(servercfg.GetVerbosity())
 | |
| 	logger.Verbosity = verbose
 | |
| 	logLevel := &slog.LevelVar{}
 | |
| 	replace := func(groups []string, a slog.Attr) slog.Attr {
 | |
| 		if a.Key == slog.SourceKey {
 | |
| 			a.Value = slog.StringValue(filepath.Base(a.Value.String()))
 | |
| 		}
 | |
| 		return a
 | |
| 	}
 | |
| 	logger := slog.New(
 | |
| 		slog.NewJSONHandler(
 | |
| 			os.Stderr,
 | |
| 			&slog.HandlerOptions{AddSource: true, ReplaceAttr: replace, Level: logLevel},
 | |
| 		),
 | |
| 	)
 | |
| 	slog.SetDefault(logger)
 | |
| 	switch verbose {
 | |
| 	case 4:
 | |
| 		logLevel.Set(slog.LevelDebug)
 | |
| 	case 3:
 | |
| 		logLevel.Set(slog.LevelInfo)
 | |
| 	case 2:
 | |
| 		logLevel.Set(slog.LevelWarn)
 | |
| 	default:
 | |
| 		logLevel.Set(slog.LevelError)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func setGarbageCollection() {
 | |
| 	_, gcset := os.LookupEnv("GOGC")
 | |
| 	if !gcset {
 | |
| 		debug.SetGCPercent(ncutils.DEFAULT_GC_PERCENT)
 | |
| 	}
 | |
| }
 |