server.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225
  1. package controller
  2. import (
  3. "encoding/json"
  4. "net/http"
  5. "strings"
  6. "syscall"
  7. "time"
  8. "github.com/gorilla/mux"
  9. "golang.org/x/exp/slog"
  10. "github.com/gravitl/netmaker/database"
  11. "github.com/gravitl/netmaker/logic"
  12. "github.com/gravitl/netmaker/models"
  13. "github.com/gravitl/netmaker/mq"
  14. "github.com/gravitl/netmaker/servercfg"
  15. )
  16. func serverHandlers(r *mux.Router) {
  17. // r.HandleFunc("/api/server/addnetwork/{network}", securityCheckServer(true, http.HandlerFunc(addNetwork))).Methods(http.MethodPost)
  18. r.HandleFunc(
  19. "/api/server/health",
  20. func(resp http.ResponseWriter, req *http.Request) {
  21. resp.WriteHeader(http.StatusOK)
  22. resp.Write([]byte("Server is up and running!!"))
  23. },
  24. ).Methods(http.MethodGet)
  25. r.HandleFunc(
  26. "/api/server/shutdown",
  27. func(w http.ResponseWriter, _ *http.Request) {
  28. msg := "received api call to shutdown server, sending interruption..."
  29. slog.Warn(msg)
  30. _, _ = w.Write([]byte(msg))
  31. w.WriteHeader(http.StatusOK)
  32. _ = syscall.Kill(syscall.Getpid(), syscall.SIGINT)
  33. },
  34. ).Methods(http.MethodPost)
  35. r.HandleFunc("/api/server/getconfig", allowUsers(http.HandlerFunc(getConfig))).
  36. Methods(http.MethodGet)
  37. r.HandleFunc("/api/server/getserverinfo", Authorize(true, false, "node", http.HandlerFunc(getServerInfo))).
  38. Methods(http.MethodGet)
  39. r.HandleFunc("/api/server/status", getStatus).Methods(http.MethodGet)
  40. r.HandleFunc("/api/server/usage", Authorize(true, false, "user", http.HandlerFunc(getUsage))).
  41. Methods(http.MethodGet)
  42. }
  43. func getUsage(w http.ResponseWriter, _ *http.Request) {
  44. type usage struct {
  45. Hosts int `json:"hosts"`
  46. Clients int `json:"clients"`
  47. Networks int `json:"networks"`
  48. Users int `json:"users"`
  49. Ingresses int `json:"ingresses"`
  50. Egresses int `json:"egresses"`
  51. Relays int `json:"relays"`
  52. InternetGateways int `json:"internet_gateways"`
  53. FailOvers int `json:"fail_overs"`
  54. }
  55. var serverUsage usage
  56. hosts, err := logic.GetAllHosts()
  57. if err == nil {
  58. serverUsage.Hosts = len(hosts)
  59. }
  60. clients, err := logic.GetAllExtClients()
  61. if err == nil {
  62. serverUsage.Clients = len(clients)
  63. }
  64. users, err := logic.GetUsers()
  65. if err == nil {
  66. serverUsage.Users = len(users)
  67. }
  68. networks, err := logic.GetNetworks()
  69. if err == nil {
  70. serverUsage.Networks = len(networks)
  71. }
  72. // TODO this part bellow can be optimized to get nodes just once
  73. ingresses, err := logic.GetAllIngresses()
  74. if err == nil {
  75. serverUsage.Ingresses = len(ingresses)
  76. }
  77. egresses, err := logic.GetAllEgresses()
  78. if err == nil {
  79. serverUsage.Egresses = len(egresses)
  80. }
  81. relays, err := logic.GetRelays()
  82. if err == nil {
  83. serverUsage.Relays = len(relays)
  84. }
  85. gateways, err := logic.GetInternetGateways()
  86. if err == nil {
  87. serverUsage.InternetGateways = len(gateways)
  88. }
  89. failOvers, err := logic.GetAllFailOvers()
  90. if err == nil {
  91. serverUsage.FailOvers = len(failOvers)
  92. }
  93. w.Header().Set("Content-Type", "application/json")
  94. json.NewEncoder(w).Encode(models.SuccessResponse{
  95. Code: http.StatusOK,
  96. Response: serverUsage,
  97. })
  98. }
  99. // swagger:route GET /api/server/status server getStatus
  100. //
  101. // Get the server configuration.
  102. //
  103. // Schemes: https
  104. //
  105. // Security:
  106. // oauth
  107. //
  108. // Responses:
  109. // 200: serverConfigResponse
  110. func getStatus(w http.ResponseWriter, r *http.Request) {
  111. type status struct {
  112. DB bool `json:"db_connected"`
  113. Broker bool `json:"broker_connected"`
  114. IsBrokerConnOpen bool `json:"is_broker_conn_open"`
  115. LicenseError string `json:"license_error"`
  116. IsPro bool `json:"is_pro"`
  117. TrialEndDate time.Time `json:"trial_end_date"`
  118. IsOnTrialLicense bool `json:"is_on_trial_license"`
  119. }
  120. licenseErr := ""
  121. if servercfg.ErrLicenseValidation != nil {
  122. licenseErr = servercfg.ErrLicenseValidation.Error()
  123. }
  124. var trialEndDate time.Time
  125. var err error
  126. isOnTrial := false
  127. if servercfg.IsPro && (servercfg.GetLicenseKey() == "" || servercfg.GetNetmakerTenantID() == "") {
  128. trialEndDate, err = logic.GetTrialEndDate()
  129. if err != nil {
  130. slog.Error("failed to get trial end date", "error", err)
  131. } else {
  132. isOnTrial = true
  133. }
  134. }
  135. currentServerStatus := status{
  136. DB: database.IsConnected(),
  137. Broker: mq.IsConnected(),
  138. IsBrokerConnOpen: mq.IsConnectionOpen(),
  139. LicenseError: licenseErr,
  140. IsPro: servercfg.IsPro,
  141. TrialEndDate: trialEndDate,
  142. IsOnTrialLicense: isOnTrial,
  143. }
  144. w.Header().Set("Content-Type", "application/json")
  145. json.NewEncoder(w).Encode(&currentServerStatus)
  146. }
  147. // allowUsers - allow all authenticated (valid) users - only used by getConfig, may be able to remove during refactor
  148. func allowUsers(next http.Handler) http.HandlerFunc {
  149. return func(w http.ResponseWriter, r *http.Request) {
  150. errorResponse := models.ErrorResponse{
  151. Code: http.StatusUnauthorized, Message: logic.Unauthorized_Msg,
  152. }
  153. bearerToken := r.Header.Get("Authorization")
  154. tokenSplit := strings.Split(bearerToken, " ")
  155. authToken := ""
  156. if len(tokenSplit) < 2 {
  157. logic.ReturnErrorResponse(w, r, errorResponse)
  158. return
  159. } else {
  160. authToken = tokenSplit[1]
  161. }
  162. user, _, _, err := logic.VerifyUserToken(authToken)
  163. if err != nil || user == "" {
  164. logic.ReturnErrorResponse(w, r, errorResponse)
  165. return
  166. }
  167. next.ServeHTTP(w, r)
  168. }
  169. }
  170. // swagger:route GET /api/server/getserverinfo server getServerInfo
  171. //
  172. // Get the server configuration.
  173. //
  174. // Schemes: https
  175. //
  176. // Security:
  177. // oauth
  178. //
  179. // Responses:
  180. // 200: serverConfigResponse
  181. func getServerInfo(w http.ResponseWriter, r *http.Request) {
  182. // Set header
  183. w.Header().Set("Content-Type", "application/json")
  184. // get params
  185. json.NewEncoder(w).Encode(servercfg.GetServerInfo())
  186. // w.WriteHeader(http.StatusOK)
  187. }
  188. // swagger:route GET /api/server/getconfig server getConfig
  189. //
  190. // Get the server configuration.
  191. //
  192. // Schemes: https
  193. //
  194. // Security:
  195. // oauth
  196. //
  197. // Responses:
  198. // 200: serverConfigResponse
  199. func getConfig(w http.ResponseWriter, r *http.Request) {
  200. // Set header
  201. w.Header().Set("Content-Type", "application/json")
  202. // get params
  203. scfg := servercfg.GetServerConfig()
  204. scfg.IsPro = "no"
  205. if servercfg.IsPro {
  206. scfg.IsPro = "yes"
  207. }
  208. json.NewEncoder(w).Encode(scfg)
  209. // w.WriteHeader(http.StatusOK)
  210. }