server.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208
  1. package controller
  2. import (
  3. "encoding/json"
  4. "net/http"
  5. "strings"
  6. "syscall"
  7. "time"
  8. "github.com/gorilla/mux"
  9. "golang.org/x/exp/slog"
  10. "github.com/gravitl/netmaker/database"
  11. "github.com/gravitl/netmaker/logic"
  12. "github.com/gravitl/netmaker/models"
  13. "github.com/gravitl/netmaker/mq"
  14. "github.com/gravitl/netmaker/servercfg"
  15. )
  16. func serverHandlers(r *mux.Router) {
  17. // r.HandleFunc("/api/server/addnetwork/{network}", securityCheckServer(true, http.HandlerFunc(addNetwork))).Methods(http.MethodPost)
  18. r.HandleFunc(
  19. "/api/server/health",
  20. func(resp http.ResponseWriter, req *http.Request) {
  21. resp.WriteHeader(http.StatusOK)
  22. resp.Write([]byte("Server is up and running!!"))
  23. },
  24. ).Methods(http.MethodGet)
  25. r.HandleFunc(
  26. "/api/server/shutdown",
  27. func(w http.ResponseWriter, _ *http.Request) {
  28. msg := "received api call to shutdown server, sending interruption..."
  29. slog.Warn(msg)
  30. _, _ = w.Write([]byte(msg))
  31. w.WriteHeader(http.StatusOK)
  32. _ = syscall.Kill(syscall.Getpid(), syscall.SIGINT)
  33. },
  34. ).Methods(http.MethodPost)
  35. r.HandleFunc("/api/server/getconfig", allowUsers(http.HandlerFunc(getConfig))).
  36. Methods(http.MethodGet)
  37. r.HandleFunc("/api/server/getserverinfo", logic.SecurityCheck(true, http.HandlerFunc(getServerInfo))).
  38. Methods(http.MethodGet)
  39. r.HandleFunc("/api/server/status", getStatus).Methods(http.MethodGet)
  40. r.HandleFunc("/api/server/usage", logic.SecurityCheck(false, http.HandlerFunc(getUsage))).
  41. Methods(http.MethodGet)
  42. }
  43. func getUsage(w http.ResponseWriter, _ *http.Request) {
  44. type usage struct {
  45. Hosts int `json:"hosts"`
  46. Clients int `json:"clients"`
  47. Networks int `json:"networks"`
  48. Users int `json:"users"`
  49. Ingresses int `json:"ingresses"`
  50. Egresses int `json:"egresses"`
  51. Relays int `json:"relays"`
  52. InternetGateways int `json:"internet_gateways"`
  53. FailOvers int `json:"fail_overs"`
  54. }
  55. var serverUsage usage
  56. hosts, err := logic.GetAllHosts()
  57. if err == nil {
  58. serverUsage.Hosts = len(hosts)
  59. }
  60. clients, err := logic.GetAllExtClients()
  61. if err == nil {
  62. serverUsage.Clients = len(clients)
  63. }
  64. users, err := logic.GetUsers()
  65. if err == nil {
  66. serverUsage.Users = len(users)
  67. }
  68. networks, err := logic.GetNetworks()
  69. if err == nil {
  70. serverUsage.Networks = len(networks)
  71. }
  72. // TODO this part bellow can be optimized to get nodes just once
  73. ingresses, err := logic.GetAllIngresses()
  74. if err == nil {
  75. serverUsage.Ingresses = len(ingresses)
  76. }
  77. egresses, err := logic.GetAllEgresses()
  78. if err == nil {
  79. serverUsage.Egresses = len(egresses)
  80. }
  81. relays, err := logic.GetRelays()
  82. if err == nil {
  83. serverUsage.Relays = len(relays)
  84. }
  85. gateways, err := logic.GetInternetGateways()
  86. if err == nil {
  87. serverUsage.InternetGateways = len(gateways)
  88. }
  89. failOvers, err := logic.GetAllFailOvers()
  90. if err == nil {
  91. serverUsage.FailOvers = len(failOvers)
  92. }
  93. w.Header().Set("Content-Type", "application/json")
  94. json.NewEncoder(w).Encode(models.SuccessResponse{
  95. Code: http.StatusOK,
  96. Response: serverUsage,
  97. })
  98. }
  99. // @Summary Get the server status
  100. // @Router /api/server/status [get]
  101. // @Tags Server
  102. // @Security oauth2
  103. func getStatus(w http.ResponseWriter, r *http.Request) {
  104. // @Success 200 {object} status
  105. type status struct {
  106. DB bool `json:"db_connected"`
  107. Broker bool `json:"broker_connected"`
  108. IsBrokerConnOpen bool `json:"is_broker_conn_open"`
  109. LicenseError string `json:"license_error"`
  110. IsPro bool `json:"is_pro"`
  111. TrialEndDate time.Time `json:"trial_end_date"`
  112. IsOnTrialLicense bool `json:"is_on_trial_license"`
  113. }
  114. licenseErr := ""
  115. if servercfg.ErrLicenseValidation != nil {
  116. licenseErr = servercfg.ErrLicenseValidation.Error()
  117. }
  118. var trialEndDate time.Time
  119. var err error
  120. isOnTrial := false
  121. if servercfg.IsPro &&
  122. (servercfg.GetLicenseKey() == "" || servercfg.GetNetmakerTenantID() == "") {
  123. trialEndDate, err = logic.GetTrialEndDate()
  124. if err != nil {
  125. slog.Error("failed to get trial end date", "error", err)
  126. } else {
  127. isOnTrial = true
  128. }
  129. }
  130. currentServerStatus := status{
  131. DB: database.IsConnected(),
  132. Broker: mq.IsConnected(),
  133. IsBrokerConnOpen: mq.IsConnectionOpen(),
  134. LicenseError: licenseErr,
  135. IsPro: servercfg.IsPro,
  136. TrialEndDate: trialEndDate,
  137. IsOnTrialLicense: isOnTrial,
  138. }
  139. w.Header().Set("Content-Type", "application/json")
  140. json.NewEncoder(w).Encode(&currentServerStatus)
  141. }
  142. // allowUsers - allow all authenticated (valid) users - only used by getConfig, may be able to remove during refactor
  143. func allowUsers(next http.Handler) http.HandlerFunc {
  144. return func(w http.ResponseWriter, r *http.Request) {
  145. errorResponse := models.ErrorResponse{
  146. Code: http.StatusUnauthorized, Message: logic.Unauthorized_Msg,
  147. }
  148. bearerToken := r.Header.Get("Authorization")
  149. tokenSplit := strings.Split(bearerToken, " ")
  150. authToken := ""
  151. if len(tokenSplit) < 2 {
  152. logic.ReturnErrorResponse(w, r, errorResponse)
  153. return
  154. } else {
  155. authToken = tokenSplit[1]
  156. }
  157. user, _, _, err := logic.VerifyUserToken(authToken)
  158. if err != nil || user == "" {
  159. logic.ReturnErrorResponse(w, r, errorResponse)
  160. return
  161. }
  162. next.ServeHTTP(w, r)
  163. }
  164. }
  165. // @Summary Get the server information
  166. // @Router /api/server/getserverinfo [get]
  167. // @Tags Server
  168. // @Security oauth2
  169. // @Success 200 {object} models.ServerConfig
  170. func getServerInfo(w http.ResponseWriter, r *http.Request) {
  171. // Set header
  172. w.Header().Set("Content-Type", "application/json")
  173. // get params
  174. json.NewEncoder(w).Encode(servercfg.GetServerInfo())
  175. // w.WriteHeader(http.StatusOK)
  176. }
  177. // @Summary Get the server configuration
  178. // @Router /api/server/getconfig [get]
  179. // @Tags Server
  180. // @Security oauth2
  181. // @Success 200 {object} config.ServerConfig
  182. func getConfig(w http.ResponseWriter, r *http.Request) {
  183. // Set header
  184. w.Header().Set("Content-Type", "application/json")
  185. // get params
  186. scfg := servercfg.GetServerConfig()
  187. scfg.IsPro = "no"
  188. if servercfg.IsPro {
  189. scfg.IsPro = "yes"
  190. }
  191. json.NewEncoder(w).Encode(scfg)
  192. // w.WriteHeader(http.StatusOK)
  193. }