initialize.go 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165
  1. //go:build ee
  2. // +build ee
  3. package pro
  4. import (
  5. "time"
  6. controller "github.com/gravitl/netmaker/controllers"
  7. "github.com/gravitl/netmaker/logger"
  8. "github.com/gravitl/netmaker/logic"
  9. "github.com/gravitl/netmaker/models"
  10. "github.com/gravitl/netmaker/mq"
  11. "github.com/gravitl/netmaker/pro/auth"
  12. proControllers "github.com/gravitl/netmaker/pro/controllers"
  13. "github.com/gravitl/netmaker/pro/email"
  14. proLogic "github.com/gravitl/netmaker/pro/logic"
  15. "github.com/gravitl/netmaker/servercfg"
  16. "golang.org/x/exp/slog"
  17. )
  18. // InitPro - Initialize Pro Logic
  19. func InitPro() {
  20. servercfg.IsPro = true
  21. models.SetLogo(retrieveProLogo())
  22. controller.HttpMiddlewares = append(
  23. controller.HttpMiddlewares,
  24. proControllers.OnlyServerAPIWhenUnlicensedMiddleware,
  25. )
  26. controller.HttpHandlers = append(
  27. controller.HttpHandlers,
  28. proControllers.MetricHandlers,
  29. proControllers.UserHandlers,
  30. proControllers.FailOverHandlers,
  31. proControllers.InetHandlers,
  32. proControllers.RacHandlers,
  33. proControllers.EventHandlers,
  34. )
  35. controller.ListRoles = proControllers.ListRoles
  36. logic.EnterpriseCheckFuncs = append(logic.EnterpriseCheckFuncs, func() {
  37. // == License Handling ==
  38. enableLicenseHook := true
  39. // licenseKeyValue := servercfg.GetLicenseKey()
  40. // netmakerTenantID := servercfg.GetNetmakerTenantID()
  41. // if licenseKeyValue != "" && netmakerTenantID != "" {
  42. // enableLicenseHook = true
  43. // }
  44. if !enableLicenseHook {
  45. err := initTrial()
  46. if err != nil {
  47. logger.Log(0, "failed to init trial", err.Error())
  48. enableLicenseHook = true
  49. }
  50. trialEndDate, err := getTrialEndDate()
  51. if err != nil {
  52. slog.Error("failed to get trial end date", "error", err)
  53. enableLicenseHook = true
  54. } else {
  55. // check if trial ended
  56. if time.Now().After(trialEndDate) {
  57. // trial ended already
  58. enableLicenseHook = true
  59. }
  60. }
  61. }
  62. if enableLicenseHook {
  63. logger.Log(0, "starting license checker")
  64. ClearLicenseCache()
  65. if err := ValidateLicense(); err != nil {
  66. slog.Error(err.Error())
  67. return
  68. }
  69. logger.Log(0, "proceeding with Paid Tier license")
  70. logic.SetFreeTierForTelemetry(false)
  71. // == End License Handling ==
  72. AddLicenseHooks()
  73. } else {
  74. logger.Log(0, "starting trial license hook")
  75. addTrialLicenseHook()
  76. }
  77. if logic.GetRacAutoDisable() {
  78. AddRacHooks()
  79. }
  80. var authProvider = auth.InitializeAuthProvider()
  81. if authProvider != "" {
  82. slog.Info("OAuth provider,", authProvider+",", "initialized")
  83. } else {
  84. slog.Error("no OAuth provider found or not configured, continuing without OAuth")
  85. }
  86. proLogic.LoadNodeMetricsToCache()
  87. proLogic.InitFailOverCache()
  88. auth.StartSyncHook()
  89. email.Init()
  90. proLogic.EventWatcher()
  91. })
  92. logic.ResetFailOver = proLogic.ResetFailOver
  93. logic.ResetFailedOverPeer = proLogic.ResetFailedOverPeer
  94. logic.FailOverExists = proLogic.FailOverExists
  95. logic.CreateFailOver = proLogic.CreateFailOver
  96. logic.GetFailOverPeerIps = proLogic.GetFailOverPeerIps
  97. logic.DenyClientNodeAccess = proLogic.DenyClientNode
  98. logic.IsClientNodeAllowed = proLogic.IsClientNodeAllowed
  99. logic.AllowClientNodeAccess = proLogic.RemoveDeniedNodeFromClient
  100. logic.SetClientDefaultACLs = proLogic.SetClientDefaultACLs
  101. logic.SetClientACLs = proLogic.SetClientACLs
  102. logic.UpdateProNodeACLs = proLogic.UpdateProNodeACLs
  103. logic.GetMetrics = proLogic.GetMetrics
  104. logic.UpdateMetrics = proLogic.UpdateMetrics
  105. logic.DeleteMetrics = proLogic.DeleteMetrics
  106. logic.GetTrialEndDate = getTrialEndDate
  107. logic.SetDefaultGw = proLogic.SetDefaultGw
  108. logic.ValidateInetGwReq = proLogic.ValidateInetGwReq
  109. logic.SetDefaultGwForRelayedUpdate = proLogic.SetDefaultGwForRelayedUpdate
  110. logic.UnsetInternetGw = proLogic.UnsetInternetGw
  111. logic.SetInternetGw = proLogic.SetInternetGw
  112. logic.GetAllowedIpForInetNodeClient = proLogic.GetAllowedIpForInetNodeClient
  113. mq.UpdateMetrics = proLogic.MQUpdateMetrics
  114. mq.UpdateMetricsFallBack = proLogic.MQUpdateMetricsFallBack
  115. logic.GetFilteredNodesByUserAccess = proLogic.GetFilteredNodesByUserAccess
  116. logic.CreateRole = proLogic.CreateRole
  117. logic.UpdateRole = proLogic.UpdateRole
  118. logic.DeleteRole = proLogic.DeleteRole
  119. logic.NetworkPermissionsCheck = proLogic.NetworkPermissionsCheck
  120. logic.GlobalPermissionsCheck = proLogic.GlobalPermissionsCheck
  121. logic.DeleteNetworkRoles = proLogic.DeleteNetworkRoles
  122. logic.CreateDefaultNetworkRolesAndGroups = proLogic.CreateDefaultNetworkRolesAndGroups
  123. logic.FilterNetworksByRole = proLogic.FilterNetworksByRole
  124. logic.IsGroupsValid = proLogic.IsGroupsValid
  125. logic.IsGroupValid = proLogic.IsGroupValid
  126. logic.IsNetworkRolesValid = proLogic.IsNetworkRolesValid
  127. logic.InitialiseRoles = proLogic.UserRolesInit
  128. logic.UpdateUserGwAccess = proLogic.UpdateUserGwAccess
  129. logic.CreateDefaultUserPolicies = proLogic.CreateDefaultUserPolicies
  130. logic.MigrateUserRoleAndGroups = proLogic.MigrateUserRoleAndGroups
  131. logic.MigrateGroups = proLogic.MigrateGroups
  132. logic.IntialiseGroups = proLogic.UserGroupsInit
  133. logic.AddGlobalNetRolesToAdmins = proLogic.AddGlobalNetRolesToAdmins
  134. logic.GetUserGroupsInNetwork = proLogic.GetUserGroupsInNetwork
  135. logic.GetUserGroup = proLogic.GetUserGroup
  136. logic.GetNodeStatus = proLogic.GetNodeStatus
  137. logic.ResetAuthProvider = auth.ResetAuthProvider
  138. logic.ResetIDPSyncHook = auth.ResetIDPSyncHook
  139. logic.EmailInit = email.Init
  140. logic.LogEvent = proLogic.LogEvent
  141. }
  142. func retrieveProLogo() string {
  143. return `
  144. __ __ ______ ______ __ __ ______ __ __ ______ ______
  145. /\ "-.\ \ /\ ___\ /\__ _\ /\ "-./ \ /\ __ \ /\ \/ / /\ ___\ /\ == \
  146. \ \ \-. \ \ \ __\ \/_/\ \/ \ \ \-./\ \ \ \ __ \ \ \ _"-. \ \ __\ \ \ __<
  147. \ \_\\"\_\ \ \_____\ \ \_\ \ \_\ \ \_\ \ \_\ \_\ \ \_\ \_\ \ \_____\ \ \_\ \_\
  148. \/_/ \/_/ \/_____/ \/_/ \/_/ \/_/ \/_/\/_/ \/_/\/_/ \/_____/ \/_/ /_/
  149. ___ ___ ____
  150. ____ ____ ____ / _ \ / _ \ / __ \ ____ ____ ____
  151. /___/ /___/ /___/ / ___/ / , _// /_/ / /___/ /___/ /___/
  152. /___/ /___/ /___/ /_/ /_/|_| \____/ /___/ /___/ /___/
  153. `
  154. }