mqhandlers.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192
  1. package functions
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "runtime"
  6. "strings"
  7. "time"
  8. mqtt "github.com/eclipse/paho.mqtt.golang"
  9. "github.com/gravitl/netmaker/models"
  10. "github.com/gravitl/netmaker/netclient/config"
  11. "github.com/gravitl/netmaker/netclient/local"
  12. "github.com/gravitl/netmaker/netclient/ncutils"
  13. "github.com/gravitl/netmaker/netclient/wireguard"
  14. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  15. )
  16. // All -- mqtt message hander for all ('#') topics
  17. var All mqtt.MessageHandler = func(client mqtt.Client, msg mqtt.Message) {
  18. ncutils.Log("default message handler -- received message but not handling")
  19. ncutils.Log("Topic: " + string(msg.Topic()))
  20. //ncutils.Log("Message: " + string(msg.Payload()))
  21. }
  22. // NodeUpdate -- mqtt message handler for /update/<NodeID> topic
  23. func NodeUpdate(client mqtt.Client, msg mqtt.Message) {
  24. var newNode models.Node
  25. var nodeCfg config.ClientConfig
  26. var network = parseNetworkFromTopic(msg.Topic())
  27. nodeCfg.Network = network
  28. nodeCfg.ReadConfig()
  29. var commsCfg = getCommsCfgByNode(&nodeCfg.Node)
  30. data, dataErr := decryptMsg(&nodeCfg, msg.Payload())
  31. if dataErr != nil {
  32. return
  33. }
  34. err := json.Unmarshal([]byte(data), &newNode)
  35. if err != nil {
  36. ncutils.Log("error unmarshalling node update data" + err.Error())
  37. return
  38. }
  39. ncutils.Log("received message to update node " + newNode.Name)
  40. // see if cache hit, if so skip
  41. var currentMessage = read(newNode.Network, lastNodeUpdate)
  42. if currentMessage == string(data) {
  43. return
  44. }
  45. insert(newNode.Network, lastNodeUpdate, string(data)) // store new message in cache
  46. // ensure that OS never changes
  47. newNode.OS = runtime.GOOS
  48. // check if interface needs to delta
  49. ifaceDelta := ncutils.IfaceDelta(&nodeCfg.Node, &newNode)
  50. shouldDNSChange := nodeCfg.Node.DNSOn != newNode.DNSOn
  51. hubChange := nodeCfg.Node.IsHub != newNode.IsHub
  52. nodeCfg.Node = newNode
  53. switch newNode.Action {
  54. case models.NODE_DELETE:
  55. ncutils.PrintLog(fmt.Sprintf("received delete request for %s", nodeCfg.Node.Name), 0)
  56. unsubscribeNode(client, &nodeCfg)
  57. if err = LeaveNetwork(nodeCfg.Node.Network, true); err != nil {
  58. if !strings.Contains("rpc error", err.Error()) {
  59. ncutils.PrintLog(fmt.Sprintf("failed to leave, please check that local files for network %s were removed", nodeCfg.Node.Network), 0)
  60. return
  61. }
  62. }
  63. ncutils.PrintLog(fmt.Sprintf("%s was removed", nodeCfg.Node.Name), 0)
  64. return
  65. case models.NODE_UPDATE_KEY:
  66. // == get the current key for node ==
  67. oldPrivateKey, retErr := wireguard.RetrievePrivKey(nodeCfg.Network)
  68. if retErr != nil {
  69. break
  70. }
  71. if err := UpdateKeys(&nodeCfg, client); err != nil {
  72. ncutils.PrintLog("err updating wireguard keys, reusing last key\n"+err.Error(), 0)
  73. if key, parseErr := wgtypes.ParseKey(oldPrivateKey); parseErr == nil {
  74. wireguard.StorePrivKey(key.String(), nodeCfg.Network)
  75. nodeCfg.Node.PublicKey = key.PublicKey().String()
  76. }
  77. }
  78. ifaceDelta = true
  79. case models.NODE_NOOP:
  80. default:
  81. }
  82. // Save new config
  83. nodeCfg.Node.Action = models.NODE_NOOP
  84. if err := config.Write(&nodeCfg, nodeCfg.Network); err != nil {
  85. ncutils.PrintLog("error updating node configuration: "+err.Error(), 0)
  86. }
  87. nameserver := nodeCfg.Server.CoreDNSAddr
  88. privateKey, err := wireguard.RetrievePrivKey(newNode.Network)
  89. if err != nil {
  90. ncutils.Log("error reading PrivateKey " + err.Error())
  91. return
  92. }
  93. file := ncutils.GetNetclientPathSpecific() + nodeCfg.Node.Interface + ".conf"
  94. if err := wireguard.UpdateWgInterface(file, privateKey, nameserver, newNode); err != nil {
  95. ncutils.Log("error updating wireguard config " + err.Error())
  96. return
  97. }
  98. if ifaceDelta { // if a change caused an ifacedelta we need to notify the server to update the peers
  99. ncutils.Log("applying WG conf to " + file)
  100. err = wireguard.ApplyConf(&nodeCfg.Node, nodeCfg.Node.Interface, file)
  101. if err != nil {
  102. ncutils.Log("error restarting wg after node update " + err.Error())
  103. return
  104. }
  105. time.Sleep(time.Second >> 0)
  106. if newNode.DNSOn == "yes" {
  107. for _, server := range newNode.NetworkSettings.DefaultServerAddrs {
  108. if server.IsLeader {
  109. go local.SetDNSWithRetry(newNode, server.Address)
  110. break
  111. }
  112. }
  113. }
  114. doneErr := publishSignal(&commsCfg, &nodeCfg, ncutils.DONE)
  115. if doneErr != nil {
  116. ncutils.Log("could not notify server to update peers after interface change")
  117. } else {
  118. ncutils.Log("signalled finished interface update to server")
  119. }
  120. } else if hubChange {
  121. doneErr := publishSignal(&commsCfg, &nodeCfg, ncutils.DONE)
  122. if doneErr != nil {
  123. ncutils.Log("could not notify server to update peers after hub change")
  124. } else {
  125. ncutils.Log("signalled finished hub update to server")
  126. }
  127. }
  128. //deal with DNS
  129. if newNode.DNSOn != "yes" && shouldDNSChange && nodeCfg.Node.Interface != "" {
  130. ncutils.Log("settng DNS off")
  131. _, err := ncutils.RunCmd("/usr/bin/resolvectl revert "+nodeCfg.Node.Interface, true)
  132. if err != nil {
  133. ncutils.Log("error applying dns" + err.Error())
  134. }
  135. }
  136. }
  137. // UpdatePeers -- mqtt message handler for peers/<Network>/<NodeID> topic
  138. func UpdatePeers(client mqtt.Client, msg mqtt.Message) {
  139. var peerUpdate models.PeerUpdate
  140. var network = parseNetworkFromTopic(msg.Topic())
  141. var cfg = config.ClientConfig{}
  142. cfg.Network = network
  143. cfg.ReadConfig()
  144. data, dataErr := decryptMsg(&cfg, msg.Payload())
  145. if dataErr != nil {
  146. return
  147. }
  148. err := json.Unmarshal([]byte(data), &peerUpdate)
  149. if err != nil {
  150. ncutils.Log("error unmarshalling peer data")
  151. return
  152. }
  153. // see if cached hit, if so skip
  154. var currentMessage = read(peerUpdate.Network, lastPeerUpdate)
  155. if currentMessage == string(data) {
  156. return
  157. }
  158. insert(peerUpdate.Network, lastPeerUpdate, string(data))
  159. file := ncutils.GetNetclientPathSpecific() + cfg.Node.Interface + ".conf"
  160. err = wireguard.UpdateWgPeers(file, peerUpdate.Peers)
  161. if err != nil {
  162. ncutils.Log("error updating wireguard peers" + err.Error())
  163. return
  164. }
  165. //err = wireguard.SyncWGQuickConf(cfg.Node.Interface, file)
  166. var iface = cfg.Node.Interface
  167. if ncutils.IsMac() {
  168. iface, err = local.GetMacIface(cfg.Node.Address)
  169. if err != nil {
  170. ncutils.Log("error retrieving mac iface: " + err.Error())
  171. return
  172. }
  173. }
  174. err = wireguard.SetPeers(iface, &cfg.Node, peerUpdate.Peers)
  175. if err != nil {
  176. ncutils.Log("error syncing wg after peer update: " + err.Error())
  177. return
  178. }
  179. }