mqpublish.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228
  1. package functions
  2. import (
  3. "context"
  4. "encoding/json"
  5. "errors"
  6. "fmt"
  7. "net"
  8. "os"
  9. "strconv"
  10. "sync"
  11. "time"
  12. "github.com/cloverstd/tcping/ping"
  13. "github.com/gravitl/netmaker/logger"
  14. "github.com/gravitl/netmaker/models"
  15. "github.com/gravitl/netmaker/netclient/auth"
  16. "github.com/gravitl/netmaker/netclient/config"
  17. "github.com/gravitl/netmaker/netclient/ncutils"
  18. "github.com/gravitl/netmaker/tls"
  19. )
  20. // Checkin -- go routine that checks for public or local ip changes, publishes changes
  21. //
  22. // if there are no updates, simply "pings" the server as a checkin
  23. func Checkin(ctx context.Context, wg *sync.WaitGroup) {
  24. logger.Log(2, "starting checkin goroutine")
  25. defer wg.Done()
  26. checkin()
  27. ticker := time.NewTicker(time.Second * 60)
  28. defer ticker.Stop()
  29. for {
  30. select {
  31. case <-ctx.Done():
  32. logger.Log(0, "checkin routine closed")
  33. return
  34. //delay should be configuraable -> use cfg.Node.NetworkSettings.DefaultCheckInInterval ??
  35. case <-ticker.C:
  36. checkin()
  37. }
  38. }
  39. }
  40. func checkin() {
  41. networks, _ := ncutils.GetSystemNetworks()
  42. logger.Log(3, "checkin with server(s) for all networks")
  43. for _, network := range networks {
  44. var nodeCfg config.ClientConfig
  45. nodeCfg.Network = network
  46. nodeCfg.ReadConfig()
  47. // check for nftables present if on Linux
  48. if ncutils.IsLinux() {
  49. if ncutils.IsNFTablesPresent() {
  50. nodeCfg.Node.FirewallInUse = models.FIREWALL_NFTABLES
  51. } else {
  52. nodeCfg.Node.FirewallInUse = models.FIREWALL_IPTABLES
  53. }
  54. } else {
  55. // defaults to iptables for now, may need another default for non-Linux OSes
  56. nodeCfg.Node.FirewallInUse = models.FIREWALL_IPTABLES
  57. }
  58. if nodeCfg.Node.IsStatic != "yes" {
  59. extIP, err := ncutils.GetPublicIP(nodeCfg.Server.API)
  60. if err != nil {
  61. logger.Log(1, "error encountered checking public ip addresses: ", err.Error())
  62. }
  63. if nodeCfg.Node.Endpoint != extIP && extIP != "" {
  64. logger.Log(1, "network:", nodeCfg.Node.Network, "endpoint has changed from ", nodeCfg.Node.Endpoint, " to ", extIP)
  65. nodeCfg.Node.Endpoint = extIP
  66. if err := PublishNodeUpdate(&nodeCfg); err != nil {
  67. logger.Log(0, "network:", nodeCfg.Node.Network, "could not publish endpoint change")
  68. }
  69. }
  70. intIP, err := getPrivateAddr()
  71. if err != nil {
  72. logger.Log(1, "network:", nodeCfg.Node.Network, "error encountered checking private ip addresses: ", err.Error())
  73. }
  74. if nodeCfg.Node.LocalAddress != intIP && intIP != "" {
  75. logger.Log(1, "network:", nodeCfg.Node.Network, "local Address has changed from ", nodeCfg.Node.LocalAddress, " to ", intIP)
  76. nodeCfg.Node.LocalAddress = intIP
  77. if err := PublishNodeUpdate(&nodeCfg); err != nil {
  78. logger.Log(0, "Network: ", nodeCfg.Node.Network, " could not publish local address change")
  79. }
  80. }
  81. _ = UpdateLocalListenPort(&nodeCfg)
  82. } else if nodeCfg.Node.IsLocal == "yes" && nodeCfg.Node.LocalRange != "" {
  83. localIP, err := ncutils.GetLocalIP(nodeCfg.Node.LocalRange)
  84. if err != nil {
  85. logger.Log(1, "network:", nodeCfg.Node.Network, "error encountered checking local ip addresses: ", err.Error())
  86. }
  87. if nodeCfg.Node.Endpoint != localIP && localIP != "" {
  88. logger.Log(1, "network:", nodeCfg.Node.Network, "endpoint has changed from "+nodeCfg.Node.Endpoint+" to ", localIP)
  89. nodeCfg.Node.Endpoint = localIP
  90. if err := PublishNodeUpdate(&nodeCfg); err != nil {
  91. logger.Log(0, "network:", nodeCfg.Node.Network, "could not publish localip change")
  92. }
  93. }
  94. }
  95. //check version
  96. if nodeCfg.Node.Version != ncutils.Version {
  97. nodeCfg.Node.Version = ncutils.Version
  98. config.Write(&nodeCfg, nodeCfg.Network)
  99. }
  100. Hello(&nodeCfg)
  101. }
  102. }
  103. // PublishNodeUpdates -- saves node and pushes changes to broker
  104. func PublishNodeUpdate(nodeCfg *config.ClientConfig) error {
  105. if err := config.Write(nodeCfg, nodeCfg.Network); err != nil {
  106. return err
  107. }
  108. data, err := json.Marshal(nodeCfg.Node)
  109. if err != nil {
  110. return err
  111. }
  112. if err = publish(nodeCfg, fmt.Sprintf("update/%s", nodeCfg.Node.ID), data, 1); err != nil {
  113. return err
  114. }
  115. logger.Log(0, "network:", nodeCfg.Node.Network, "sent a node update to server for node", nodeCfg.Node.Name, ", ", nodeCfg.Node.ID)
  116. return nil
  117. }
  118. // Hello -- ping the broker to let server know node it's alive and well
  119. func Hello(nodeCfg *config.ClientConfig) {
  120. var checkin models.NodeCheckin
  121. checkin.Version = ncutils.Version
  122. checkin.Connected = nodeCfg.Node.Connected
  123. data, err := json.Marshal(checkin)
  124. if err != nil {
  125. logger.Log(0, "unable to marshal checkin data", err.Error())
  126. return
  127. }
  128. if err := publish(nodeCfg, fmt.Sprintf("ping/%s", nodeCfg.Node.ID), data, 0); err != nil {
  129. logger.Log(0, fmt.Sprintf("Network: %s error publishing ping, %v", nodeCfg.Node.Network, err))
  130. logger.Log(0, "running pull on "+nodeCfg.Node.Network+" to reconnect")
  131. _, err := Pull(nodeCfg.Node.Network, true)
  132. if err != nil {
  133. logger.Log(0, "could not run pull on "+nodeCfg.Node.Network+", error: "+err.Error())
  134. }
  135. } else {
  136. logger.Log(3, "checkin for", nodeCfg.Network, "complete")
  137. }
  138. }
  139. // node cfg is required in order to fetch the traffic keys of that node for encryption
  140. func publish(nodeCfg *config.ClientConfig, dest string, msg []byte, qos byte) error {
  141. // setup the keys
  142. trafficPrivKey, err := auth.RetrieveTrafficKey(nodeCfg.Node.Network)
  143. if err != nil {
  144. return err
  145. }
  146. serverPubKey, err := ncutils.ConvertBytesToKey(nodeCfg.Node.TrafficKeys.Server)
  147. if err != nil {
  148. return err
  149. }
  150. encrypted, err := ncutils.Chunk(msg, serverPubKey, trafficPrivKey)
  151. if err != nil {
  152. return err
  153. }
  154. if mqclient == nil {
  155. return errors.New("unable to publish ... no mqclient")
  156. }
  157. if token := mqclient.Publish(dest, qos, false, encrypted); !token.WaitTimeout(30*time.Second) || token.Error() != nil {
  158. logger.Log(0, "could not connect to broker at "+nodeCfg.Server.Server+":"+nodeCfg.Server.MQPort)
  159. var err error
  160. if token.Error() == nil {
  161. err = errors.New("connection timeout")
  162. } else {
  163. err = token.Error()
  164. }
  165. if err != nil {
  166. return err
  167. }
  168. }
  169. return nil
  170. }
  171. func checkCertExpiry(cfg *config.ClientConfig) error {
  172. cert, err := tls.ReadCertFromFile(ncutils.GetNetclientServerPath(cfg.Server.Server) + ncutils.GetSeparator() + "client.pem")
  173. //if cert doesn't exist or will expire within 10 days
  174. if errors.Is(err, os.ErrNotExist) || cert.NotAfter.Before(time.Now().Add(time.Hour*24*10)) {
  175. key, err := tls.ReadKeyFromFile(ncutils.GetNetclientPath() + ncutils.GetSeparator() + "client.key")
  176. if err != nil {
  177. return err
  178. }
  179. return RegisterWithServer(key, cfg)
  180. }
  181. if err != nil {
  182. return err
  183. }
  184. return nil
  185. }
  186. func checkBroker(broker string, port string) error {
  187. if broker == "" {
  188. return errors.New("error: broker address is blank")
  189. }
  190. if port == "" {
  191. return errors.New("error: broker port is blank")
  192. }
  193. _, err := net.LookupIP(broker)
  194. if err != nil {
  195. return errors.New("nslookup failed for broker ... check dns records")
  196. }
  197. pinger := ping.NewTCPing()
  198. intPort, err := strconv.Atoi(port)
  199. if err != nil {
  200. logger.Log(1, "error converting port to int: "+err.Error())
  201. }
  202. pinger.SetTarget(&ping.Target{
  203. Protocol: ping.TCP,
  204. Host: broker,
  205. Port: intPort,
  206. Counter: 3,
  207. Interval: 1 * time.Second,
  208. Timeout: 2 * time.Second,
  209. })
  210. pingerDone := pinger.Start()
  211. <-pingerDone
  212. if pinger.Result().SuccessCounter == 0 {
  213. return errors.New("unable to connect to broker port ... check netmaker server and firewalls")
  214. }
  215. return nil
  216. }