mqpublish.go 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159
  1. package functions
  2. import (
  3. "context"
  4. "encoding/json"
  5. "errors"
  6. "fmt"
  7. "os"
  8. "sync"
  9. "time"
  10. "github.com/gravitl/netmaker/logger"
  11. "github.com/gravitl/netmaker/netclient/auth"
  12. "github.com/gravitl/netmaker/netclient/config"
  13. "github.com/gravitl/netmaker/netclient/ncutils"
  14. "github.com/gravitl/netmaker/tls"
  15. )
  16. // Checkin -- go routine that checks for public or local ip changes, publishes changes
  17. // if there are no updates, simply "pings" the server as a checkin
  18. func Checkin(ctx context.Context, wg *sync.WaitGroup) {
  19. defer wg.Done()
  20. for {
  21. select {
  22. case <-ctx.Done():
  23. logger.Log(0, "checkin routine closed")
  24. return
  25. //delay should be configuraable -> use cfg.Node.NetworkSettings.DefaultCheckInInterval ??
  26. case <-time.After(time.Second * 60):
  27. // logger.Log(0, "Checkin running")
  28. //read latest config
  29. networks, err := ncutils.GetSystemNetworks()
  30. if err != nil {
  31. return
  32. }
  33. for _, network := range networks {
  34. var nodeCfg config.ClientConfig
  35. nodeCfg.Network = network
  36. nodeCfg.ReadConfig()
  37. if nodeCfg.Node.IsStatic != "yes" {
  38. extIP, err := ncutils.GetPublicIP()
  39. if err != nil {
  40. logger.Log(1, "error encountered checking public ip addresses: ", err.Error())
  41. }
  42. if nodeCfg.Node.Endpoint != extIP && extIP != "" {
  43. logger.Log(1, "endpoint has changed from ", nodeCfg.Node.Endpoint, " to ", extIP)
  44. nodeCfg.Node.Endpoint = extIP
  45. if err := PublishNodeUpdate(&nodeCfg); err != nil {
  46. logger.Log(0, "could not publish endpoint change")
  47. }
  48. }
  49. intIP, err := getPrivateAddr()
  50. if err != nil {
  51. logger.Log(1, "error encountered checking private ip addresses: ", err.Error())
  52. }
  53. if nodeCfg.Node.LocalAddress != intIP && intIP != "" {
  54. logger.Log(1, "local Address has changed from ", nodeCfg.Node.LocalAddress, " to ", intIP)
  55. nodeCfg.Node.LocalAddress = intIP
  56. if err := PublishNodeUpdate(&nodeCfg); err != nil {
  57. logger.Log(0, "could not publish local address change")
  58. }
  59. }
  60. _ = UpdateLocalListenPort(&nodeCfg)
  61. } else if nodeCfg.Node.IsLocal == "yes" && nodeCfg.Node.LocalRange != "" {
  62. localIP, err := ncutils.GetLocalIP(nodeCfg.Node.LocalRange)
  63. if err != nil {
  64. logger.Log(1, "error encountered checking local ip addresses: ", err.Error())
  65. }
  66. if nodeCfg.Node.Endpoint != localIP && localIP != "" {
  67. logger.Log(1, "endpoint has changed from "+nodeCfg.Node.Endpoint+" to ", localIP)
  68. nodeCfg.Node.Endpoint = localIP
  69. if err := PublishNodeUpdate(&nodeCfg); err != nil {
  70. logger.Log(0, "could not publish localip change")
  71. }
  72. }
  73. }
  74. if err := PingServer(&nodeCfg); err != nil {
  75. logger.Log(0, "could not ping server for , ", nodeCfg.Network, "\n", err.Error())
  76. } else {
  77. Hello(&nodeCfg)
  78. }
  79. checkCertExpiry(&nodeCfg)
  80. }
  81. }
  82. }
  83. }
  84. // PublishNodeUpdates -- saves node and pushes changes to broker
  85. func PublishNodeUpdate(nodeCfg *config.ClientConfig) error {
  86. if err := config.Write(nodeCfg, nodeCfg.Network); err != nil {
  87. return err
  88. }
  89. data, err := json.Marshal(nodeCfg.Node)
  90. if err != nil {
  91. return err
  92. }
  93. if err = publish(nodeCfg, fmt.Sprintf("update/%s", nodeCfg.Node.ID), data, 1); err != nil {
  94. return err
  95. }
  96. logger.Log(0, "sent a node update to server for node", nodeCfg.Node.Name, ", ", nodeCfg.Node.ID)
  97. return nil
  98. }
  99. // Hello -- ping the broker to let server know node it's alive and well
  100. func Hello(nodeCfg *config.ClientConfig) {
  101. if err := publish(nodeCfg, fmt.Sprintf("ping/%s", nodeCfg.Node.ID), []byte(ncutils.Version), 0); err != nil {
  102. logger.Log(0, fmt.Sprintf("error publishing ping, %v", err))
  103. logger.Log(0, "running pull on "+nodeCfg.Node.Network+" to reconnect")
  104. _, err := Pull(nodeCfg.Node.Network, true)
  105. if err != nil {
  106. logger.Log(0, "could not run pull on "+nodeCfg.Node.Network+", error: "+err.Error())
  107. }
  108. }
  109. logger.Log(3, "server checkin complete")
  110. }
  111. // node cfg is required in order to fetch the traffic keys of that node for encryption
  112. func publish(nodeCfg *config.ClientConfig, dest string, msg []byte, qos byte) error {
  113. // setup the keys
  114. trafficPrivKey, err := auth.RetrieveTrafficKey(nodeCfg.Node.Network)
  115. if err != nil {
  116. return err
  117. }
  118. serverPubKey, err := ncutils.ConvertBytesToKey(nodeCfg.Node.TrafficKeys.Server)
  119. if err != nil {
  120. return err
  121. }
  122. client := setupMQTT(nodeCfg, "", true)
  123. defer client.Disconnect(250)
  124. encrypted, err := ncutils.Chunk(msg, serverPubKey, trafficPrivKey)
  125. if err != nil {
  126. return err
  127. }
  128. if token := client.Publish(dest, qos, false, encrypted); token.Wait() && token.Error() != nil {
  129. return token.Error()
  130. }
  131. return nil
  132. }
  133. func checkCertExpiry(cfg *config.ClientConfig) error {
  134. cert, err := tls.ReadCert(ncutils.GetNetclientServerPath(cfg.Server.Server) + "/client.pem")
  135. //if cert doesn't exist or will expire within 10 days
  136. if errors.Is(err, os.ErrNotExist) || cert.NotAfter.Before(time.Now().Add(time.Hour*24*10)) {
  137. key, err := tls.ReadKey(ncutils.GetNetclientPath() + "/client.key")
  138. if err != nil {
  139. return err
  140. }
  141. return RegisterWithServer(key, cfg)
  142. }
  143. if err != nil {
  144. return err
  145. }
  146. return nil
  147. }