mirror of
https://github.com/gravitl/netmaker.git
synced 2025-09-03 19:54:22 +08:00
* check host ports on join * if 443 not available fallback to 51821 * if 443 not available fallback to 51821 * add config for auto delete of offline nodes * autocleanup offline nodes * delete offline nodes on startup * fix relay via join token
298 lines
7.3 KiB
Go
298 lines
7.3 KiB
Go
// -build ee
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"crypto/rand"
|
|
"encoding/json"
|
|
"flag"
|
|
"fmt"
|
|
"os"
|
|
"os/signal"
|
|
"path/filepath"
|
|
"runtime/debug"
|
|
"sync"
|
|
"syscall"
|
|
|
|
"github.com/google/uuid"
|
|
"github.com/gravitl/netmaker/config"
|
|
controller "github.com/gravitl/netmaker/controllers"
|
|
"github.com/gravitl/netmaker/database"
|
|
"github.com/gravitl/netmaker/db"
|
|
"github.com/gravitl/netmaker/functions"
|
|
"github.com/gravitl/netmaker/logger"
|
|
"github.com/gravitl/netmaker/logic"
|
|
"github.com/gravitl/netmaker/migrate"
|
|
"github.com/gravitl/netmaker/models"
|
|
"github.com/gravitl/netmaker/mq"
|
|
"github.com/gravitl/netmaker/netclient/ncutils"
|
|
"github.com/gravitl/netmaker/schema"
|
|
"github.com/gravitl/netmaker/servercfg"
|
|
"github.com/gravitl/netmaker/serverctl"
|
|
_ "go.uber.org/automaxprocs"
|
|
"golang.org/x/crypto/nacl/box"
|
|
"golang.org/x/exp/slog"
|
|
)
|
|
|
|
var version = "v0.90.0"
|
|
|
|
// @title NetMaker
|
|
// @version 0.90.0
|
|
// @description NetMaker API Docs
|
|
// @tag.name APIUsage
|
|
// @tag.description.markdown
|
|
// @tag.name Authentication
|
|
// @tag.description.markdown
|
|
// @tag.name Pricing
|
|
// @tag.description.markdown
|
|
// @host api.demo.netmaker.io
|
|
|
|
// Start DB Connection and start API Request Handler
|
|
func main() {
|
|
absoluteConfigPath := flag.String("c", "", "absolute path to configuration file")
|
|
flag.Parse()
|
|
setupConfig(*absoluteConfigPath)
|
|
servercfg.SetVersion(version)
|
|
fmt.Println(models.RetrieveLogo()) // print the logo
|
|
initialize() // initial db and acls
|
|
logic.SetAllocatedIpMap()
|
|
defer logic.ClearAllocatedIpMap()
|
|
setGarbageCollection()
|
|
setVerbosity()
|
|
if servercfg.DeployedByOperator() && !servercfg.IsPro {
|
|
logic.SetFreeTierLimits()
|
|
}
|
|
defer database.CloseDB()
|
|
ctx, stop := signal.NotifyContext(context.Background(), syscall.SIGTERM, os.Interrupt)
|
|
defer stop()
|
|
var waitGroup sync.WaitGroup
|
|
startControllers(&waitGroup, ctx) // start the api endpoint and mq and stun
|
|
startHooks()
|
|
<-ctx.Done()
|
|
waitGroup.Wait()
|
|
}
|
|
|
|
func setupConfig(absoluteConfigPath string) {
|
|
if len(absoluteConfigPath) > 0 {
|
|
cfg, err := config.ReadConfig(absoluteConfigPath)
|
|
if err != nil {
|
|
logger.Log(0, fmt.Sprintf("failed parsing config at: %s", absoluteConfigPath))
|
|
return
|
|
}
|
|
config.Config = cfg
|
|
}
|
|
}
|
|
|
|
func startHooks() {
|
|
err := logic.TimerCheckpoint()
|
|
if err != nil {
|
|
logger.Log(1, "Timer error occurred: ", err.Error())
|
|
}
|
|
logic.EnterpriseCheck()
|
|
}
|
|
|
|
func initialize() { // Client Mode Prereq Check
|
|
var err error
|
|
|
|
if servercfg.GetMasterKey() == "" {
|
|
logger.Log(0, "warning: MASTER_KEY not set, this could make account recovery difficult")
|
|
}
|
|
|
|
if servercfg.GetNodeID() == "" {
|
|
logger.FatalLog("error: must set NODE_ID, currently blank")
|
|
}
|
|
|
|
if err = database.InitializeDatabase(); err != nil {
|
|
logger.FatalLog("Error connecting to database: ", err.Error())
|
|
}
|
|
// initialize sql schema db.
|
|
err = db.InitializeDB(schema.ListModels()...)
|
|
if err != nil {
|
|
logger.FatalLog("Error connecting to v1 database: ", err.Error())
|
|
}
|
|
logger.Log(0, "database successfully connected")
|
|
initializeUUID()
|
|
//initialize cache
|
|
_, _ = logic.GetNetworks()
|
|
_, _ = logic.GetAllNodes()
|
|
_, _ = logic.GetAllHosts()
|
|
_, _ = logic.GetAllExtClients()
|
|
_ = logic.ListAcls()
|
|
_, _ = logic.GetAllEnrollmentKeys()
|
|
|
|
migrate.Run()
|
|
|
|
logic.SetJWTSecret()
|
|
logic.InitialiseRoles()
|
|
logic.IntialiseGroups()
|
|
err = serverctl.SetDefaults()
|
|
if err != nil {
|
|
logger.FatalLog("error setting defaults: ", err.Error())
|
|
}
|
|
|
|
if servercfg.IsDNSMode() {
|
|
err := functions.SetDNSDir()
|
|
if err != nil {
|
|
logger.FatalLog(err.Error())
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
func startControllers(wg *sync.WaitGroup, ctx context.Context) {
|
|
if servercfg.IsDNSMode() {
|
|
err := logic.SetDNS()
|
|
if err != nil {
|
|
logger.Log(0, "error occurred initializing DNS: ", err.Error())
|
|
}
|
|
}
|
|
|
|
//Run Rest Server
|
|
if servercfg.IsRestBackend() {
|
|
if !servercfg.DisableRemoteIPCheck() && servercfg.GetAPIHost() == "127.0.0.1" {
|
|
err := servercfg.SetHost()
|
|
if err != nil {
|
|
logger.FatalLog("Unable to Set host. Exiting...", err.Error())
|
|
}
|
|
}
|
|
wg.Add(1)
|
|
go controller.HandleRESTRequests(wg, ctx)
|
|
}
|
|
//Run MessageQueue
|
|
if servercfg.IsMessageQueueBackend() {
|
|
wg.Add(1)
|
|
go runMessageQueue(wg, ctx)
|
|
}
|
|
|
|
if !servercfg.IsRestBackend() && !servercfg.IsMessageQueueBackend() {
|
|
logger.Log(
|
|
0,
|
|
"No Server Mode selected, so nothing is being served! Set Rest mode (REST_BACKEND) or MessageQueue (MESSAGEQUEUE_BACKEND) to 'true'.",
|
|
)
|
|
}
|
|
|
|
wg.Add(1)
|
|
go logic.StartHookManager(ctx, wg)
|
|
}
|
|
|
|
// Should we be using a context vice a waitgroup????????????
|
|
func runMessageQueue(wg *sync.WaitGroup, ctx context.Context) {
|
|
defer wg.Done()
|
|
brokerHost, _ := servercfg.GetMessageQueueEndpoint()
|
|
logger.Log(0, "connecting to mq broker at", brokerHost)
|
|
mq.SetupMQTT(true)
|
|
if mq.IsConnected() {
|
|
logger.Log(0, "connected to MQ Broker")
|
|
} else {
|
|
logger.FatalLog("error connecting to MQ Broker")
|
|
}
|
|
defer mq.CloseClient()
|
|
go mq.Keepalive(ctx)
|
|
go func() {
|
|
peerUpdate := make(chan *models.Node, 100)
|
|
go logic.ManageZombies(ctx, peerUpdate)
|
|
go logic.DeleteExpiredNodes(ctx, peerUpdate)
|
|
for nodeUpdate := range peerUpdate {
|
|
if nodeUpdate == nil {
|
|
continue
|
|
}
|
|
node := nodeUpdate
|
|
node.Action = models.NODE_DELETE
|
|
node.PendingDelete = true
|
|
if err := mq.NodeUpdate(node); err != nil {
|
|
logger.Log(
|
|
0,
|
|
"failed to send peer update for deleted node: ",
|
|
node.ID.String(),
|
|
err.Error(),
|
|
)
|
|
}
|
|
if err := logic.DeleteNode(node, true); err != nil {
|
|
slog.Error(
|
|
"error deleting expired node",
|
|
"nodeid",
|
|
node.ID.String(),
|
|
"error",
|
|
err.Error(),
|
|
)
|
|
}
|
|
go mq.PublishDeletedNodePeerUpdate(node)
|
|
}
|
|
}()
|
|
<-ctx.Done()
|
|
logger.Log(0, "Message Queue shutting down")
|
|
}
|
|
|
|
func setVerbosity() {
|
|
verbose := int(servercfg.GetVerbosity())
|
|
logger.Verbosity = verbose
|
|
logLevel := &slog.LevelVar{}
|
|
replace := func(groups []string, a slog.Attr) slog.Attr {
|
|
if a.Key == slog.SourceKey {
|
|
a.Value = slog.StringValue(filepath.Base(a.Value.String()))
|
|
}
|
|
return a
|
|
}
|
|
logger := slog.New(
|
|
slog.NewJSONHandler(
|
|
os.Stderr,
|
|
&slog.HandlerOptions{AddSource: true, ReplaceAttr: replace, Level: logLevel},
|
|
),
|
|
)
|
|
slog.SetDefault(logger)
|
|
switch verbose {
|
|
case 4:
|
|
logLevel.Set(slog.LevelDebug)
|
|
case 3:
|
|
logLevel.Set(slog.LevelInfo)
|
|
case 2:
|
|
logLevel.Set(slog.LevelWarn)
|
|
default:
|
|
logLevel.Set(slog.LevelError)
|
|
}
|
|
}
|
|
|
|
func setGarbageCollection() {
|
|
_, gcset := os.LookupEnv("GOGC")
|
|
if !gcset {
|
|
debug.SetGCPercent(ncutils.DEFAULT_GC_PERCENT)
|
|
}
|
|
}
|
|
|
|
// initializeUUID - create a UUID record for server if none exists
|
|
func initializeUUID() error {
|
|
records, err := database.FetchRecords(database.SERVER_UUID_TABLE_NAME)
|
|
if err != nil {
|
|
if !database.IsEmptyRecord(err) {
|
|
return err
|
|
}
|
|
} else if len(records) > 0 {
|
|
return nil
|
|
}
|
|
// setup encryption keys
|
|
var trafficPubKey, trafficPrivKey, errT = box.GenerateKey(rand.Reader) // generate traffic keys
|
|
if errT != nil {
|
|
return errT
|
|
}
|
|
tPriv, err := ncutils.ConvertKeyToBytes(trafficPrivKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
tPub, err := ncutils.ConvertKeyToBytes(trafficPubKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
telemetry := models.Telemetry{
|
|
UUID: uuid.NewString(),
|
|
TrafficKeyPriv: tPriv,
|
|
TrafficKeyPub: tPub,
|
|
}
|
|
telJSON, err := json.Marshal(&telemetry)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return database.Insert(database.SERVER_UUID_RECORD_KEY, string(telJSON), database.SERVER_UUID_TABLE_NAME)
|
|
}
|