mqpublish.go 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213
  1. package functions
  2. import (
  3. "context"
  4. "encoding/json"
  5. "errors"
  6. "fmt"
  7. "net"
  8. "os"
  9. "strconv"
  10. "sync"
  11. "time"
  12. "github.com/cloverstd/tcping/ping"
  13. "github.com/gravitl/netmaker/logger"
  14. "github.com/gravitl/netmaker/netclient/auth"
  15. "github.com/gravitl/netmaker/netclient/config"
  16. "github.com/gravitl/netmaker/netclient/ncutils"
  17. "github.com/gravitl/netmaker/tls"
  18. )
  19. // Checkin -- go routine that checks for public or local ip changes, publishes changes
  20. // if there are no updates, simply "pings" the server as a checkin
  21. func Checkin(ctx context.Context, wg *sync.WaitGroup) {
  22. logger.Log(2, "starting checkin goroutine")
  23. defer wg.Done()
  24. for {
  25. select {
  26. case <-ctx.Done():
  27. logger.Log(0, "checkin routine closed")
  28. return
  29. //delay should be configuraable -> use cfg.Node.NetworkSettings.DefaultCheckInInterval ??
  30. case <-time.After(time.Second * 60):
  31. checkin()
  32. }
  33. }
  34. }
  35. func checkin() {
  36. networks, _ := ncutils.GetSystemNetworks()
  37. logger.Log(3, "checkin with server(s) for all networks")
  38. for _, network := range networks {
  39. var nodeCfg config.ClientConfig
  40. nodeCfg.Network = network
  41. nodeCfg.ReadConfig()
  42. // check for nftables present if on Linux
  43. if ncutils.IsLinux() {
  44. if ncutils.IsNFTablesPresent() {
  45. nodeCfg.Node.IsNFTablesPresent = "yes"
  46. } else {
  47. nodeCfg.Node.IsNFTablesPresent = "no"
  48. }
  49. } else {
  50. nodeCfg.Node.IsNFTablesPresent = "no"
  51. }
  52. if nodeCfg.Node.IsStatic != "yes" {
  53. extIP, err := ncutils.GetPublicIP()
  54. if err != nil {
  55. logger.Log(1, "error encountered checking public ip addresses: ", err.Error())
  56. }
  57. if nodeCfg.Node.Endpoint != extIP && extIP != "" {
  58. logger.Log(1, "network:", nodeCfg.Node.Network, "endpoint has changed from ", nodeCfg.Node.Endpoint, " to ", extIP)
  59. nodeCfg.Node.Endpoint = extIP
  60. if err := PublishNodeUpdate(&nodeCfg); err != nil {
  61. logger.Log(0, "network:", nodeCfg.Node.Network, "could not publish endpoint change")
  62. }
  63. }
  64. intIP, err := getPrivateAddr()
  65. if err != nil {
  66. logger.Log(1, "network:", nodeCfg.Node.Network, "error encountered checking private ip addresses: ", err.Error())
  67. }
  68. if nodeCfg.Node.LocalAddress != intIP && intIP != "" {
  69. logger.Log(1, "network:", nodeCfg.Node.Network, "local Address has changed from ", nodeCfg.Node.LocalAddress, " to ", intIP)
  70. nodeCfg.Node.LocalAddress = intIP
  71. if err := PublishNodeUpdate(&nodeCfg); err != nil {
  72. logger.Log(0, "Network: ", nodeCfg.Node.Network, " could not publish local address change")
  73. }
  74. }
  75. _ = UpdateLocalListenPort(&nodeCfg)
  76. } else if nodeCfg.Node.IsLocal == "yes" && nodeCfg.Node.LocalRange != "" {
  77. localIP, err := ncutils.GetLocalIP(nodeCfg.Node.LocalRange)
  78. if err != nil {
  79. logger.Log(1, "network:", nodeCfg.Node.Network, "error encountered checking local ip addresses: ", err.Error())
  80. }
  81. if nodeCfg.Node.Endpoint != localIP && localIP != "" {
  82. logger.Log(1, "network:", nodeCfg.Node.Network, "endpoint has changed from "+nodeCfg.Node.Endpoint+" to ", localIP)
  83. nodeCfg.Node.Endpoint = localIP
  84. if err := PublishNodeUpdate(&nodeCfg); err != nil {
  85. logger.Log(0, "network:", nodeCfg.Node.Network, "could not publish localip change")
  86. }
  87. }
  88. }
  89. Hello(&nodeCfg)
  90. checkCertExpiry(&nodeCfg)
  91. }
  92. }
  93. // PublishNodeUpdates -- saves node and pushes changes to broker
  94. func PublishNodeUpdate(nodeCfg *config.ClientConfig) error {
  95. if err := config.Write(nodeCfg, nodeCfg.Network); err != nil {
  96. return err
  97. }
  98. data, err := json.Marshal(nodeCfg.Node)
  99. if err != nil {
  100. return err
  101. }
  102. if err = publish(nodeCfg, fmt.Sprintf("update/%s", nodeCfg.Node.ID), data, 1); err != nil {
  103. return err
  104. }
  105. logger.Log(0, "network:", nodeCfg.Node.Network, "sent a node update to server for node", nodeCfg.Node.Name, ", ", nodeCfg.Node.ID)
  106. return nil
  107. }
  108. // Hello -- ping the broker to let server know node it's alive and well
  109. func Hello(nodeCfg *config.ClientConfig) {
  110. if err := publish(nodeCfg, fmt.Sprintf("ping/%s", nodeCfg.Node.ID), []byte(ncutils.Version), 0); err != nil {
  111. logger.Log(0, fmt.Sprintf("Network: %s error publishing ping, %v", nodeCfg.Node.Network, err))
  112. logger.Log(0, "running pull on "+nodeCfg.Node.Network+" to reconnect")
  113. _, err := Pull(nodeCfg.Node.Network, true)
  114. if err != nil {
  115. logger.Log(0, "could not run pull on "+nodeCfg.Node.Network+", error: "+err.Error())
  116. }
  117. } else {
  118. logger.Log(3, "checkin for", nodeCfg.Network, "complete")
  119. }
  120. }
  121. // node cfg is required in order to fetch the traffic keys of that node for encryption
  122. func publish(nodeCfg *config.ClientConfig, dest string, msg []byte, qos byte) error {
  123. // setup the keys
  124. trafficPrivKey, err := auth.RetrieveTrafficKey(nodeCfg.Node.Network)
  125. if err != nil {
  126. return err
  127. }
  128. serverPubKey, err := ncutils.ConvertBytesToKey(nodeCfg.Node.TrafficKeys.Server)
  129. if err != nil {
  130. return err
  131. }
  132. client, err := setupMQTT(nodeCfg, true)
  133. if err != nil {
  134. return fmt.Errorf("mq setup error %w", err)
  135. }
  136. defer client.Disconnect(250)
  137. encrypted, err := ncutils.Chunk(msg, serverPubKey, trafficPrivKey)
  138. if err != nil {
  139. return err
  140. }
  141. if token := client.Publish(dest, qos, false, encrypted); !token.WaitTimeout(30*time.Second) || token.Error() != nil {
  142. logger.Log(0, "could not connect to broker at "+nodeCfg.Server.Server+":"+nodeCfg.Server.MQPort)
  143. var err error
  144. if token.Error() == nil {
  145. err = errors.New("connection timeout")
  146. } else {
  147. err = token.Error()
  148. }
  149. if err != nil {
  150. return err
  151. }
  152. }
  153. return nil
  154. }
  155. func checkCertExpiry(cfg *config.ClientConfig) error {
  156. cert, err := tls.ReadCertFromFile(ncutils.GetNetclientServerPath(cfg.Server.Server) + ncutils.GetSeparator() + "client.pem")
  157. //if cert doesn't exist or will expire within 10 days
  158. if errors.Is(err, os.ErrNotExist) || cert.NotAfter.Before(time.Now().Add(time.Hour*24*10)) {
  159. key, err := tls.ReadKeyFromFile(ncutils.GetNetclientPath() + ncutils.GetSeparator() + "client.key")
  160. if err != nil {
  161. return err
  162. }
  163. return RegisterWithServer(key, cfg)
  164. }
  165. if err != nil {
  166. return err
  167. }
  168. return nil
  169. }
  170. func checkBroker(broker string, port string) error {
  171. if broker == "" {
  172. return errors.New("error: broker address is blank")
  173. }
  174. if port == "" {
  175. return errors.New("error: broker port is blank")
  176. }
  177. _, err := net.LookupIP(broker)
  178. if err != nil {
  179. return errors.New("nslookup failed for broker ... check dns records")
  180. }
  181. pinger := ping.NewTCPing()
  182. intPort, err := strconv.Atoi(port)
  183. if err != nil {
  184. logger.Log(1, "error converting port to int: "+err.Error())
  185. }
  186. pinger.SetTarget(&ping.Target{
  187. Protocol: ping.TCP,
  188. Host: broker,
  189. Port: intPort,
  190. Counter: 3,
  191. Interval: 1 * time.Second,
  192. Timeout: 2 * time.Second,
  193. })
  194. pingerDone := pinger.Start()
  195. <-pingerDone
  196. if pinger.Result().SuccessCounter == 0 {
  197. return errors.New("unable to connect to broker port ... check netmaker server and firewalls")
  198. }
  199. return nil
  200. }