mqhandlers.go 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179
  1. package functions
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "runtime"
  6. "strings"
  7. "time"
  8. mqtt "github.com/eclipse/paho.mqtt.golang"
  9. "github.com/gravitl/netmaker/models"
  10. "github.com/gravitl/netmaker/netclient/config"
  11. "github.com/gravitl/netmaker/netclient/local"
  12. "github.com/gravitl/netmaker/netclient/ncutils"
  13. "github.com/gravitl/netmaker/netclient/wireguard"
  14. )
  15. // All -- mqtt message hander for all ('#') topics
  16. var All mqtt.MessageHandler = func(client mqtt.Client, msg mqtt.Message) {
  17. ncutils.Log("default message handler -- received message but not handling")
  18. ncutils.Log("Topic: " + string(msg.Topic()))
  19. //ncutils.Log("Message: " + string(msg.Payload()))
  20. }
  21. // NodeUpdate -- mqtt message handler for /update/<NodeID> topic
  22. func NodeUpdate(client mqtt.Client, msg mqtt.Message) {
  23. var newNode models.Node
  24. var nodeCfg config.ClientConfig
  25. var network = parseNetworkFromTopic(msg.Topic())
  26. nodeCfg.Network = network
  27. nodeCfg.ReadConfig()
  28. var commsCfg = getCommsCfgByNode(&nodeCfg.Node)
  29. data, dataErr := decryptMsg(&nodeCfg, msg.Payload())
  30. if dataErr != nil {
  31. return
  32. }
  33. err := json.Unmarshal([]byte(data), &newNode)
  34. if err != nil {
  35. ncutils.Log("error unmarshalling node update data" + err.Error())
  36. return
  37. }
  38. ncutils.Log("received message to update node " + newNode.Name)
  39. // see if cache hit, if so skip
  40. var currentMessage = read(newNode.Network, lastNodeUpdate)
  41. if currentMessage == string(data) {
  42. return
  43. }
  44. insert(newNode.Network, lastNodeUpdate, string(data)) // store new message in cache
  45. // ensure that OS never changes
  46. newNode.OS = runtime.GOOS
  47. // check if interface needs to delta
  48. ifaceDelta := ncutils.IfaceDelta(&nodeCfg.Node, &newNode)
  49. shouldDNSChange := nodeCfg.Node.DNSOn != newNode.DNSOn
  50. nodeCfg.Node = newNode
  51. switch newNode.Action {
  52. case models.NODE_DELETE:
  53. ncutils.PrintLog(fmt.Sprintf("received delete request for %s", nodeCfg.Node.Name), 0)
  54. unsubscribeNode(client, &nodeCfg)
  55. if err = LeaveNetwork(nodeCfg.Node.Network); err != nil {
  56. if !strings.Contains("rpc error", err.Error()) {
  57. ncutils.PrintLog(fmt.Sprintf("failed to leave, please check that local files for network %s were removed", nodeCfg.Node.Network), 0)
  58. return
  59. }
  60. }
  61. ncutils.PrintLog(fmt.Sprintf("%s was removed", nodeCfg.Node.Name), 0)
  62. return
  63. case models.NODE_UPDATE_KEY:
  64. if err := UpdateKeys(&nodeCfg, client); err != nil {
  65. ncutils.PrintLog("err updating wireguard keys: "+err.Error(), 0)
  66. }
  67. case models.NODE_NOOP:
  68. default:
  69. }
  70. // Save new config
  71. nodeCfg.Node.Action = models.NODE_NOOP
  72. if err := config.Write(&nodeCfg, nodeCfg.Network); err != nil {
  73. ncutils.PrintLog("error updating node configuration: "+err.Error(), 0)
  74. }
  75. nameserver := nodeCfg.Server.CoreDNSAddr
  76. privateKey, err := wireguard.RetrievePrivKey(newNode.Network)
  77. if err != nil {
  78. ncutils.Log("error reading PrivateKey " + err.Error())
  79. return
  80. }
  81. file := ncutils.GetNetclientPathSpecific() + nodeCfg.Node.Interface + ".conf"
  82. if err := wireguard.UpdateWgInterface(file, privateKey, nameserver, newNode); err != nil {
  83. ncutils.Log("error updating wireguard config " + err.Error())
  84. return
  85. }
  86. if ifaceDelta { // if a change caused an ifacedelta we need to notify the server to update the peers
  87. // ackErr := publishSignal(&commsCfg, &nodeCfg, ncutils.ACK)
  88. // if ackErr != nil {
  89. // ncutils.Log("could not notify server that it received an interface update")
  90. // } else {
  91. // ncutils.Log("signalled acknowledgement of change to server")
  92. // }
  93. ncutils.Log("applying WG conf to " + file)
  94. err = wireguard.ApplyConf(&nodeCfg.Node, nodeCfg.Node.Interface, file)
  95. if err != nil {
  96. ncutils.Log("error restarting wg after node update " + err.Error())
  97. return
  98. }
  99. time.Sleep(time.Second >> 0)
  100. if newNode.DNSOn == "yes" {
  101. for _, server := range newNode.NetworkSettings.DefaultServerAddrs {
  102. if server.IsLeader {
  103. go local.SetDNSWithRetry(newNode, server.Address)
  104. break
  105. }
  106. }
  107. }
  108. doneErr := publishSignal(&commsCfg, &nodeCfg, ncutils.DONE)
  109. if doneErr != nil {
  110. ncutils.Log("could not notify server to update peers after interface change")
  111. } else {
  112. ncutils.Log("signalled finished interface update to server")
  113. }
  114. }
  115. //deal with DNS
  116. if newNode.DNSOn != "yes" && shouldDNSChange && nodeCfg.Node.Interface != "" {
  117. ncutils.Log("settng DNS off")
  118. _, err := ncutils.RunCmd("/usr/bin/resolvectl revert "+nodeCfg.Node.Interface, true)
  119. if err != nil {
  120. ncutils.Log("error applying dns" + err.Error())
  121. }
  122. }
  123. }
  124. // UpdatePeers -- mqtt message handler for peers/<Network>/<NodeID> topic
  125. func UpdatePeers(client mqtt.Client, msg mqtt.Message) {
  126. var peerUpdate models.PeerUpdate
  127. var network = parseNetworkFromTopic(msg.Topic())
  128. var cfg = config.ClientConfig{}
  129. cfg.Network = network
  130. cfg.ReadConfig()
  131. data, dataErr := decryptMsg(&cfg, msg.Payload())
  132. if dataErr != nil {
  133. return
  134. }
  135. err := json.Unmarshal([]byte(data), &peerUpdate)
  136. if err != nil {
  137. ncutils.Log("error unmarshalling peer data")
  138. return
  139. }
  140. // see if cached hit, if so skip
  141. var currentMessage = read(peerUpdate.Network, lastPeerUpdate)
  142. if currentMessage == string(data) {
  143. return
  144. }
  145. insert(peerUpdate.Network, lastPeerUpdate, string(data))
  146. file := ncutils.GetNetclientPathSpecific() + cfg.Node.Interface + ".conf"
  147. err = wireguard.UpdateWgPeers(file, peerUpdate.Peers)
  148. if err != nil {
  149. ncutils.Log("error updating wireguard peers" + err.Error())
  150. return
  151. }
  152. //err = wireguard.SyncWGQuickConf(cfg.Node.Interface, file)
  153. var iface = cfg.Node.Interface
  154. if ncutils.IsMac() {
  155. iface, err = local.GetMacIface(cfg.Node.Address)
  156. if err != nil {
  157. ncutils.Log("error retrieving mac iface: " + err.Error())
  158. return
  159. }
  160. }
  161. err = wireguard.SetPeers(iface, cfg.Node.Address, cfg.Node.PersistentKeepalive, peerUpdate.Peers)
  162. if err != nil {
  163. ncutils.Log("error syncing wg after peer update: " + err.Error())
  164. return
  165. }
  166. }