initialize.go 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178
  1. //go:build ee
  2. // +build ee
  3. package pro
  4. import (
  5. "time"
  6. controller "github.com/gravitl/netmaker/controllers"
  7. "github.com/gravitl/netmaker/logger"
  8. "github.com/gravitl/netmaker/logic"
  9. "github.com/gravitl/netmaker/models"
  10. "github.com/gravitl/netmaker/mq"
  11. "github.com/gravitl/netmaker/pro/auth"
  12. proControllers "github.com/gravitl/netmaker/pro/controllers"
  13. "github.com/gravitl/netmaker/pro/email"
  14. proLogic "github.com/gravitl/netmaker/pro/logic"
  15. "github.com/gravitl/netmaker/servercfg"
  16. "golang.org/x/exp/slog"
  17. )
  18. // InitPro - Initialize Pro Logic
  19. func InitPro() {
  20. servercfg.IsPro = true
  21. models.SetLogo(retrieveProLogo())
  22. controller.HttpMiddlewares = append(
  23. controller.HttpMiddlewares,
  24. proControllers.OnlyServerAPIWhenUnlicensedMiddleware,
  25. )
  26. controller.HttpHandlers = append(
  27. controller.HttpHandlers,
  28. proControllers.MetricHandlers,
  29. proControllers.UserHandlers,
  30. proControllers.FailOverHandlers,
  31. proControllers.RacHandlers,
  32. proControllers.EventHandlers,
  33. proControllers.TagHandlers,
  34. proControllers.NetworkHandlers,
  35. )
  36. controller.ListRoles = proControllers.ListRoles
  37. logic.EnterpriseCheckFuncs = append(logic.EnterpriseCheckFuncs, func() {
  38. // == License Handling ==
  39. enableLicenseHook := true
  40. // licenseKeyValue := servercfg.GetLicenseKey()
  41. // netmakerTenantID := servercfg.GetNetmakerTenantID()
  42. // if licenseKeyValue != "" && netmakerTenantID != "" {
  43. // enableLicenseHook = true
  44. // }
  45. if !enableLicenseHook {
  46. err := initTrial()
  47. if err != nil {
  48. logger.Log(0, "failed to init trial", err.Error())
  49. enableLicenseHook = true
  50. }
  51. trialEndDate, err := getTrialEndDate()
  52. if err != nil {
  53. slog.Error("failed to get trial end date", "error", err)
  54. enableLicenseHook = true
  55. } else {
  56. // check if trial ended
  57. if time.Now().After(trialEndDate) {
  58. // trial ended already
  59. enableLicenseHook = true
  60. }
  61. }
  62. }
  63. if enableLicenseHook {
  64. logger.Log(0, "starting license checker")
  65. ClearLicenseCache()
  66. if err := ValidateLicense(); err != nil {
  67. slog.Error(err.Error())
  68. return
  69. }
  70. logger.Log(0, "proceeding with Paid Tier license")
  71. logic.SetFreeTierForTelemetry(false)
  72. // == End License Handling ==
  73. AddLicenseHooks()
  74. } else {
  75. logger.Log(0, "starting trial license hook")
  76. addTrialLicenseHook()
  77. }
  78. AddUnauthorisedUserNodeHooks()
  79. var authProvider = auth.InitializeAuthProvider()
  80. if authProvider != "" {
  81. slog.Info("OAuth provider,", authProvider+",", "initialized")
  82. } else {
  83. slog.Error("no OAuth provider found or not configured, continuing without OAuth")
  84. }
  85. proLogic.LoadNodeMetricsToCache()
  86. proLogic.InitFailOverCache()
  87. auth.ResetIDPSyncHook()
  88. email.Init()
  89. go proLogic.EventWatcher()
  90. })
  91. logic.ResetFailOver = proLogic.ResetFailOver
  92. logic.ResetFailedOverPeer = proLogic.ResetFailedOverPeer
  93. logic.FailOverExists = proLogic.FailOverExists
  94. logic.CreateFailOver = proLogic.CreateFailOver
  95. logic.GetFailOverPeerIps = proLogic.GetFailOverPeerIps
  96. logic.DenyClientNodeAccess = proLogic.DenyClientNode
  97. logic.IsClientNodeAllowed = proLogic.IsClientNodeAllowed
  98. logic.AllowClientNodeAccess = proLogic.RemoveDeniedNodeFromClient
  99. logic.SetClientDefaultACLs = proLogic.SetClientDefaultACLs
  100. logic.SetClientACLs = proLogic.SetClientACLs
  101. logic.UpdateProNodeACLs = proLogic.UpdateProNodeACLs
  102. logic.GetMetrics = proLogic.GetMetrics
  103. logic.UpdateMetrics = proLogic.UpdateMetrics
  104. logic.DeleteMetrics = proLogic.DeleteMetrics
  105. logic.GetTrialEndDate = getTrialEndDate
  106. mq.UpdateMetrics = proLogic.MQUpdateMetrics
  107. mq.UpdateMetricsFallBack = proLogic.MQUpdateMetricsFallBack
  108. logic.GetFilteredNodesByUserAccess = proLogic.GetFilteredNodesByUserAccess
  109. logic.CreateRole = proLogic.CreateRole
  110. logic.UpdateRole = proLogic.UpdateRole
  111. logic.DeleteRole = proLogic.DeleteRole
  112. logic.NetworkPermissionsCheck = proLogic.NetworkPermissionsCheck
  113. logic.GlobalPermissionsCheck = proLogic.GlobalPermissionsCheck
  114. logic.DeleteNetworkRoles = proLogic.DeleteNetworkRoles
  115. logic.CreateDefaultNetworkRolesAndGroups = proLogic.CreateDefaultNetworkRolesAndGroups
  116. logic.FilterNetworksByRole = proLogic.FilterNetworksByRole
  117. logic.IsGroupsValid = proLogic.IsGroupsValid
  118. logic.IsGroupValid = proLogic.IsGroupValid
  119. logic.IsNetworkRolesValid = proLogic.IsNetworkRolesValid
  120. logic.InitialiseRoles = proLogic.UserRolesInit
  121. logic.UpdateUserGwAccess = proLogic.UpdateUserGwAccess
  122. logic.CreateDefaultUserPolicies = proLogic.CreateDefaultUserPolicies
  123. logic.MigrateUserRoleAndGroups = proLogic.MigrateUserRoleAndGroups
  124. logic.MigrateToUUIDs = proLogic.MigrateToUUIDs
  125. logic.IntialiseGroups = proLogic.UserGroupsInit
  126. logic.AddGlobalNetRolesToAdmins = proLogic.AddGlobalNetRolesToAdmins
  127. logic.ListUserGroups = proLogic.ListUserGroups
  128. logic.GetUserGroupsInNetwork = proLogic.GetUserGroupsInNetwork
  129. logic.GetUserGroup = proLogic.GetUserGroup
  130. logic.GetNodeStatus = proLogic.GetNodeStatus
  131. logic.IsOAuthConfigured = auth.IsOAuthConfigured
  132. logic.ResetAuthProvider = auth.ResetAuthProvider
  133. logic.ResetIDPSyncHook = auth.ResetIDPSyncHook
  134. logic.EmailInit = email.Init
  135. logic.LogEvent = proLogic.LogEvent
  136. logic.RemoveUserFromAclPolicy = proLogic.RemoveUserFromAclPolicy
  137. logic.IsUserAllowedToCommunicate = proLogic.IsUserAllowedToCommunicate
  138. logic.DeleteAllNetworkTags = proLogic.DeleteAllNetworkTags
  139. logic.CreateDefaultTags = proLogic.CreateDefaultTags
  140. logic.GetInetClientsFromAclPolicies = proLogic.GetInetClientsFromAclPolicies
  141. logic.IsPeerAllowed = proLogic.IsPeerAllowed
  142. logic.IsAclPolicyValid = proLogic.IsAclPolicyValid
  143. logic.GetEgressRulesForNode = proLogic.GetEgressRulesForNode
  144. logic.GetAclRuleForInetGw = proLogic.GetAclRuleForInetGw
  145. logic.GetAclRulesForNode = proLogic.GetAclRulesForNode
  146. logic.CheckIfAnyActiveEgressPolicy = proLogic.CheckIfAnyActiveEgressPolicy
  147. logic.CheckIfAnyPolicyisUniDirectional = proLogic.CheckIfAnyPolicyisUniDirectional
  148. logic.MigrateToGws = proLogic.MigrateToGws
  149. logic.IsNodeAllowedToCommunicate = proLogic.IsNodeAllowedToCommunicate
  150. logic.GetFwRulesForNodeAndPeerOnGw = proLogic.GetFwRulesForNodeAndPeerOnGw
  151. logic.GetFwRulesForUserNodesOnGw = proLogic.GetFwRulesForUserNodesOnGw
  152. logic.GetHostLocInfo = proLogic.GetHostLocInfo
  153. logic.GetFeatureFlags = proLogic.GetFeatureFlags
  154. }
  155. func retrieveProLogo() string {
  156. return `
  157. __ __ ______ ______ __ __ ______ __ __ ______ ______
  158. /\ "-.\ \ /\ ___\ /\__ _\ /\ "-./ \ /\ __ \ /\ \/ / /\ ___\ /\ == \
  159. \ \ \-. \ \ \ __\ \/_/\ \/ \ \ \-./\ \ \ \ __ \ \ \ _"-. \ \ __\ \ \ __<
  160. \ \_\\"\_\ \ \_____\ \ \_\ \ \_\ \ \_\ \ \_\ \_\ \ \_\ \_\ \ \_____\ \ \_\ \_\
  161. \/_/ \/_/ \/_____/ \/_/ \/_/ \/_/ \/_/\/_/ \/_/\/_/ \/_____/ \/_/ /_/
  162. ___ ___ ____
  163. ____ ____ ____ / _ \ / _ \ / __ \ ____ ____ ____
  164. /___/ /___/ /___/ / ___/ / , _// /_/ / /___/ /___/ /___/
  165. /___/ /___/ /___/ /_/ /_/|_| \____/ /___/ /___/ /___/
  166. `
  167. }