initialize.go 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175
  1. //go:build ee
  2. // +build ee
  3. package pro
  4. import (
  5. "time"
  6. controller "github.com/gravitl/netmaker/controllers"
  7. "github.com/gravitl/netmaker/logger"
  8. "github.com/gravitl/netmaker/logic"
  9. "github.com/gravitl/netmaker/models"
  10. "github.com/gravitl/netmaker/mq"
  11. "github.com/gravitl/netmaker/pro/auth"
  12. proControllers "github.com/gravitl/netmaker/pro/controllers"
  13. "github.com/gravitl/netmaker/pro/email"
  14. proLogic "github.com/gravitl/netmaker/pro/logic"
  15. "github.com/gravitl/netmaker/servercfg"
  16. "golang.org/x/exp/slog"
  17. )
  18. // InitPro - Initialize Pro Logic
  19. func InitPro() {
  20. servercfg.IsPro = true
  21. models.SetLogo(retrieveProLogo())
  22. controller.HttpMiddlewares = append(
  23. controller.HttpMiddlewares,
  24. proControllers.OnlyServerAPIWhenUnlicensedMiddleware,
  25. )
  26. controller.HttpHandlers = append(
  27. controller.HttpHandlers,
  28. proControllers.MetricHandlers,
  29. proControllers.UserHandlers,
  30. proControllers.FailOverHandlers,
  31. proControllers.RacHandlers,
  32. proControllers.EventHandlers,
  33. proControllers.TagHandlers,
  34. )
  35. controller.ListRoles = proControllers.ListRoles
  36. logic.EnterpriseCheckFuncs = append(logic.EnterpriseCheckFuncs, func() {
  37. // == License Handling ==
  38. enableLicenseHook := true
  39. // licenseKeyValue := servercfg.GetLicenseKey()
  40. // netmakerTenantID := servercfg.GetNetmakerTenantID()
  41. // if licenseKeyValue != "" && netmakerTenantID != "" {
  42. // enableLicenseHook = true
  43. // }
  44. if !enableLicenseHook {
  45. err := initTrial()
  46. if err != nil {
  47. logger.Log(0, "failed to init trial", err.Error())
  48. enableLicenseHook = true
  49. }
  50. trialEndDate, err := getTrialEndDate()
  51. if err != nil {
  52. slog.Error("failed to get trial end date", "error", err)
  53. enableLicenseHook = true
  54. } else {
  55. // check if trial ended
  56. if time.Now().After(trialEndDate) {
  57. // trial ended already
  58. enableLicenseHook = true
  59. }
  60. }
  61. }
  62. if enableLicenseHook {
  63. logger.Log(0, "starting license checker")
  64. ClearLicenseCache()
  65. if err := ValidateLicense(); err != nil {
  66. slog.Error(err.Error())
  67. return
  68. }
  69. logger.Log(0, "proceeding with Paid Tier license")
  70. logic.SetFreeTierForTelemetry(false)
  71. // == End License Handling ==
  72. AddLicenseHooks()
  73. } else {
  74. logger.Log(0, "starting trial license hook")
  75. addTrialLicenseHook()
  76. }
  77. AddUnauthorisedUserNodeHooks()
  78. var authProvider = auth.InitializeAuthProvider()
  79. if authProvider != "" {
  80. slog.Info("OAuth provider,", authProvider+",", "initialized")
  81. } else {
  82. slog.Error("no OAuth provider found or not configured, continuing without OAuth")
  83. }
  84. proLogic.LoadNodeMetricsToCache()
  85. proLogic.InitFailOverCache()
  86. auth.ResetIDPSyncHook()
  87. email.Init()
  88. go proLogic.EventWatcher()
  89. })
  90. logic.ResetFailOver = proLogic.ResetFailOver
  91. logic.ResetFailedOverPeer = proLogic.ResetFailedOverPeer
  92. logic.FailOverExists = proLogic.FailOverExists
  93. logic.CreateFailOver = proLogic.CreateFailOver
  94. logic.GetFailOverPeerIps = proLogic.GetFailOverPeerIps
  95. logic.DenyClientNodeAccess = proLogic.DenyClientNode
  96. logic.IsClientNodeAllowed = proLogic.IsClientNodeAllowed
  97. logic.AllowClientNodeAccess = proLogic.RemoveDeniedNodeFromClient
  98. logic.SetClientDefaultACLs = proLogic.SetClientDefaultACLs
  99. logic.SetClientACLs = proLogic.SetClientACLs
  100. logic.UpdateProNodeACLs = proLogic.UpdateProNodeACLs
  101. logic.GetMetrics = proLogic.GetMetrics
  102. logic.UpdateMetrics = proLogic.UpdateMetrics
  103. logic.DeleteMetrics = proLogic.DeleteMetrics
  104. logic.GetTrialEndDate = getTrialEndDate
  105. mq.UpdateMetrics = proLogic.MQUpdateMetrics
  106. mq.UpdateMetricsFallBack = proLogic.MQUpdateMetricsFallBack
  107. logic.GetFilteredNodesByUserAccess = proLogic.GetFilteredNodesByUserAccess
  108. logic.CreateRole = proLogic.CreateRole
  109. logic.UpdateRole = proLogic.UpdateRole
  110. logic.DeleteRole = proLogic.DeleteRole
  111. logic.NetworkPermissionsCheck = proLogic.NetworkPermissionsCheck
  112. logic.GlobalPermissionsCheck = proLogic.GlobalPermissionsCheck
  113. logic.DeleteNetworkRoles = proLogic.DeleteNetworkRoles
  114. logic.CreateDefaultNetworkRolesAndGroups = proLogic.CreateDefaultNetworkRolesAndGroups
  115. logic.FilterNetworksByRole = proLogic.FilterNetworksByRole
  116. logic.IsGroupsValid = proLogic.IsGroupsValid
  117. logic.IsGroupValid = proLogic.IsGroupValid
  118. logic.IsNetworkRolesValid = proLogic.IsNetworkRolesValid
  119. logic.InitialiseRoles = proLogic.UserRolesInit
  120. logic.UpdateUserGwAccess = proLogic.UpdateUserGwAccess
  121. logic.CreateDefaultUserPolicies = proLogic.CreateDefaultUserPolicies
  122. logic.MigrateUserRoleAndGroups = proLogic.MigrateUserRoleAndGroups
  123. logic.MigrateToUUIDs = proLogic.MigrateToUUIDs
  124. logic.IntialiseGroups = proLogic.UserGroupsInit
  125. logic.AddGlobalNetRolesToAdmins = proLogic.AddGlobalNetRolesToAdmins
  126. logic.GetUserGroupsInNetwork = proLogic.GetUserGroupsInNetwork
  127. logic.GetUserGroup = proLogic.GetUserGroup
  128. logic.GetNodeStatus = proLogic.GetNodeStatus
  129. logic.ResetAuthProvider = auth.ResetAuthProvider
  130. logic.ResetIDPSyncHook = auth.ResetIDPSyncHook
  131. logic.EmailInit = email.Init
  132. logic.LogEvent = proLogic.LogEvent
  133. logic.RemoveUserFromAclPolicy = proLogic.RemoveUserFromAclPolicy
  134. logic.IsUserAllowedToCommunicate = proLogic.IsUserAllowedToCommunicate
  135. logic.DeleteAllNetworkTags = proLogic.DeleteAllNetworkTags
  136. logic.CreateDefaultTags = proLogic.CreateDefaultTags
  137. logic.GetInetClientsFromAclPolicies = proLogic.GetInetClientsFromAclPolicies
  138. logic.IsPeerAllowed = proLogic.IsPeerAllowed
  139. logic.IsAclPolicyValid = proLogic.IsAclPolicyValid
  140. logic.GetEgressRulesForNode = proLogic.GetEgressRulesForNode
  141. logic.GetAclRuleForInetGw = proLogic.GetAclRuleForInetGw
  142. logic.GetAclRulesForNode = proLogic.GetAclRulesForNode
  143. logic.CheckIfAnyActiveEgressPolicy = proLogic.CheckIfAnyActiveEgressPolicy
  144. logic.CheckIfAnyPolicyisUniDirectional = proLogic.CheckIfAnyPolicyisUniDirectional
  145. logic.MigrateToGws = proLogic.MigrateToGws
  146. logic.IsNodeAllowedToCommunicate = proLogic.IsNodeAllowedToCommunicate
  147. logic.GetFwRulesForNodeAndPeerOnGw = proLogic.GetFwRulesForNodeAndPeerOnGw
  148. logic.GetFwRulesForUserNodesOnGw = proLogic.GetFwRulesForUserNodesOnGw
  149. logic.GetHostLocInfo = proLogic.GetHostLocInfo
  150. }
  151. func retrieveProLogo() string {
  152. return `
  153. __ __ ______ ______ __ __ ______ __ __ ______ ______
  154. /\ "-.\ \ /\ ___\ /\__ _\ /\ "-./ \ /\ __ \ /\ \/ / /\ ___\ /\ == \
  155. \ \ \-. \ \ \ __\ \/_/\ \/ \ \ \-./\ \ \ \ __ \ \ \ _"-. \ \ __\ \ \ __<
  156. \ \_\\"\_\ \ \_____\ \ \_\ \ \_\ \ \_\ \ \_\ \_\ \ \_\ \_\ \ \_____\ \ \_\ \_\
  157. \/_/ \/_/ \/_____/ \/_/ \/_/ \/_/ \/_/\/_/ \/_/\/_/ \/_____/ \/_/ /_/
  158. ___ ___ ____
  159. ____ ____ ____ / _ \ / _ \ / __ \ ____ ____ ____
  160. /___/ /___/ /___/ / ___/ / , _// /_/ / /___/ /___/ /___/
  161. /___/ /___/ /___/ /_/ /_/|_| \____/ /___/ /___/ /___/
  162. `
  163. }