mirror of
https://github.com/gravitl/netmaker.git
synced 2025-11-17 22:48:49 +08:00
* set free tier limits through config * add host limit to config * check for host limit on free tier * fix license validation, replace node limit with hosts * add hosts to telemetry data * debug init * validate license every 1hr * hook manager, api to fetch server usage * hook manager, server usage api * encode json server usage api * update ngork url * update license validation endpoint * avoid setting limits on eer * adding hotfix * correct users limits env var * add comments to exported funcs --------- Co-authored-by: afeiszli <alex.feiszli@gmail.com>
235 lines
6.2 KiB
Go
235 lines
6.2 KiB
Go
//go:build ee
|
|
// +build ee
|
|
|
|
package ee
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/rand"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"time"
|
|
|
|
"github.com/gravitl/netmaker/database"
|
|
"github.com/gravitl/netmaker/logger"
|
|
"github.com/gravitl/netmaker/logic"
|
|
"github.com/gravitl/netmaker/models"
|
|
"github.com/gravitl/netmaker/netclient/ncutils"
|
|
"github.com/gravitl/netmaker/servercfg"
|
|
"golang.org/x/crypto/nacl/box"
|
|
)
|
|
|
|
const (
|
|
db_license_key = "netmaker-id-key-pair"
|
|
)
|
|
|
|
type apiServerConf struct {
|
|
PrivateKey []byte `json:"private_key" binding:"required"`
|
|
PublicKey []byte `json:"public_key" binding:"required"`
|
|
}
|
|
|
|
// AddLicenseHooks - adds the validation and cache clear hooks
|
|
func AddLicenseHooks() {
|
|
logic.HookManagerCh <- models.HookDetails{
|
|
Hook: ValidateLicense,
|
|
Interval: time.Hour,
|
|
}
|
|
logic.HookManagerCh <- models.HookDetails{
|
|
Hook: ClearLicenseCache,
|
|
Interval: time.Hour,
|
|
}
|
|
}
|
|
|
|
// ValidateLicense - the initial license check for netmaker server
|
|
// checks if a license is valid + limits are not exceeded
|
|
// if license is free_tier and limits exceeds, then server should terminate
|
|
// if license is not valid, server should terminate
|
|
func ValidateLicense() error {
|
|
licenseKeyValue := servercfg.GetLicenseKey()
|
|
netmakerAccountID := servercfg.GetNetmakerAccountID()
|
|
logger.Log(0, "proceeding with Netmaker license validation...")
|
|
if len(licenseKeyValue) == 0 || len(netmakerAccountID) == 0 {
|
|
logger.FatalLog0(errValidation.Error())
|
|
}
|
|
|
|
apiPublicKey, err := getLicensePublicKey(licenseKeyValue)
|
|
if err != nil {
|
|
logger.FatalLog0(errValidation.Error())
|
|
}
|
|
|
|
tempPubKey, tempPrivKey, err := FetchApiServerKeys()
|
|
if err != nil {
|
|
logger.FatalLog0(errValidation.Error())
|
|
}
|
|
|
|
licenseSecret := LicenseSecret{
|
|
AssociatedID: netmakerAccountID,
|
|
Limits: getCurrentServerLimit(),
|
|
}
|
|
|
|
secretData, err := json.Marshal(&licenseSecret)
|
|
if err != nil {
|
|
logger.FatalLog0(errValidation.Error())
|
|
}
|
|
|
|
encryptedData, err := ncutils.BoxEncrypt(secretData, apiPublicKey, tempPrivKey)
|
|
if err != nil {
|
|
logger.FatalLog0(errValidation.Error())
|
|
}
|
|
|
|
validationResponse, err := validateLicenseKey(encryptedData, tempPubKey)
|
|
if err != nil || len(validationResponse) == 0 {
|
|
logger.FatalLog0(errValidation.Error())
|
|
}
|
|
|
|
var licenseResponse ValidatedLicense
|
|
if err = json.Unmarshal(validationResponse, &licenseResponse); err != nil {
|
|
logger.FatalLog0(errValidation.Error())
|
|
}
|
|
|
|
respData, err := ncutils.BoxDecrypt(base64decode(licenseResponse.EncryptedLicense), apiPublicKey, tempPrivKey)
|
|
if err != nil {
|
|
logger.FatalLog0(errValidation.Error())
|
|
}
|
|
|
|
license := LicenseKey{}
|
|
if err = json.Unmarshal(respData, &license); err != nil {
|
|
logger.FatalLog0(errValidation.Error())
|
|
}
|
|
|
|
logger.Log(0, "License validation succeeded!")
|
|
return nil
|
|
}
|
|
|
|
// FetchApiServerKeys - fetches netmaker license keys for identification
|
|
// as well as secure communication with API
|
|
// if none present, it generates a new pair
|
|
func FetchApiServerKeys() (pub *[32]byte, priv *[32]byte, err error) {
|
|
var returnData = apiServerConf{}
|
|
currentData, err := database.FetchRecord(database.SERVERCONF_TABLE_NAME, db_license_key)
|
|
if err != nil && !database.IsEmptyRecord(err) {
|
|
return nil, nil, err
|
|
} else if database.IsEmptyRecord(err) { // need to generate a new identifier pair
|
|
pub, priv, err = box.GenerateKey(rand.Reader)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
pubBytes, err := ncutils.ConvertKeyToBytes(pub)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
privBytes, err := ncutils.ConvertKeyToBytes(priv)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
returnData.PrivateKey = privBytes
|
|
returnData.PublicKey = pubBytes
|
|
record, err := json.Marshal(&returnData)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
if err = database.Insert(db_license_key, string(record), database.SERVERCONF_TABLE_NAME); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
} else {
|
|
if err = json.Unmarshal([]byte(currentData), &returnData); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
priv, err = ncutils.ConvertBytesToKey(returnData.PrivateKey)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
pub, err = ncutils.ConvertBytesToKey(returnData.PublicKey)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
}
|
|
|
|
return pub, priv, nil
|
|
}
|
|
|
|
func getLicensePublicKey(licensePubKeyEncoded string) (*[32]byte, error) {
|
|
decodedPubKey := base64decode(licensePubKeyEncoded)
|
|
return ncutils.ConvertBytesToKey(decodedPubKey)
|
|
}
|
|
|
|
func validateLicenseKey(encryptedData []byte, publicKey *[32]byte) ([]byte, error) {
|
|
|
|
publicKeyBytes, err := ncutils.ConvertKeyToBytes(publicKey)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
msg := ValidateLicenseRequest{
|
|
LicenseKey: servercfg.GetLicenseKey(),
|
|
NmServerPubKey: base64encode(publicKeyBytes),
|
|
EncryptedPart: base64encode(encryptedData),
|
|
}
|
|
|
|
requestBody, err := json.Marshal(msg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
req, err := http.NewRequest(http.MethodPost, api_endpoint, bytes.NewReader(requestBody))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
req.Header.Add("Content-Type", "application/json")
|
|
req.Header.Add("Accept", "application/json")
|
|
client := &http.Client{}
|
|
var body []byte
|
|
validateResponse, err := client.Do(req)
|
|
if err != nil { // check cache
|
|
body, err = getCachedResponse()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
logger.Log(3, "proceeding with cached response, Netmaker API may be down")
|
|
} else {
|
|
defer validateResponse.Body.Close()
|
|
if validateResponse.StatusCode != 200 {
|
|
return nil, fmt.Errorf("could not validate license")
|
|
} // if you received a 200 cache the response locally
|
|
|
|
body, err = io.ReadAll(validateResponse.Body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
cacheResponse(body)
|
|
}
|
|
|
|
return body, err
|
|
}
|
|
|
|
func cacheResponse(response []byte) error {
|
|
var lrc = licenseResponseCache{
|
|
Body: response,
|
|
}
|
|
|
|
record, err := json.Marshal(&lrc)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return database.Insert(license_cache_key, string(record), database.CACHE_TABLE_NAME)
|
|
}
|
|
|
|
func getCachedResponse() ([]byte, error) {
|
|
var lrc licenseResponseCache
|
|
record, err := database.FetchRecord(database.CACHE_TABLE_NAME, license_cache_key)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err = json.Unmarshal([]byte(record), &lrc); err != nil {
|
|
return nil, err
|
|
}
|
|
return lrc.Body, nil
|
|
}
|
|
|
|
// ClearLicenseCache - clears the cached validate response
|
|
func ClearLicenseCache() error {
|
|
return database.DeleteRecord(database.CACHE_TABLE_NAME, license_cache_key)
|
|
}
|