remote_access_client.go 2.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788
  1. //go:build ee
  2. // +build ee
  3. package pro
  4. import (
  5. "fmt"
  6. "time"
  7. "github.com/gravitl/netmaker/logic"
  8. "github.com/gravitl/netmaker/models"
  9. "github.com/gravitl/netmaker/mq"
  10. "github.com/gravitl/netmaker/servercfg"
  11. "golang.org/x/exp/slog"
  12. )
  13. const racAutoDisableCheckInterval = 3 * time.Minute
  14. // AddRacHooks - adds hooks for Remote Access Client
  15. func AddRacHooks() {
  16. slog.Debug("adding RAC autodisable hook")
  17. logic.HookManagerCh <- models.HookDetails{
  18. Hook: racAutoDisableHook,
  19. Interval: racAutoDisableCheckInterval,
  20. }
  21. }
  22. // racAutoDisableHook - checks if RAC is enabled and if it is, checks if it should be disabled
  23. func racAutoDisableHook() error {
  24. slog.Debug("running RAC autodisable hook")
  25. users, err := logic.GetUsers()
  26. if err != nil {
  27. slog.Error("error getting users: ", "error", err)
  28. return err
  29. }
  30. clients, err := logic.GetAllExtClients()
  31. if err != nil {
  32. slog.Error("error getting clients: ", "error", err)
  33. return err
  34. }
  35. currentTime := time.Now()
  36. validityDuration := servercfg.GetJwtValidityDuration()
  37. for _, user := range users {
  38. if !currentTime.After(user.LastLoginTime.Add(validityDuration)) {
  39. continue
  40. }
  41. for _, client := range clients {
  42. if (client.OwnerID == user.UserName) && !user.IsAdmin && !user.IsSuperAdmin && client.Enabled {
  43. slog.Info(fmt.Sprintf("disabling ext client %s for user %s due to RAC autodisabling", client.ClientID, client.OwnerID))
  44. if err := disableExtClient(&client); err != nil {
  45. slog.Error("error disabling ext client in RAC autodisable hook", "error", err)
  46. continue // dont return but try for other clients
  47. }
  48. }
  49. }
  50. }
  51. slog.Debug("finished running RAC autodisable hook")
  52. return nil
  53. }
  54. func disableExtClient(client *models.ExtClient) error {
  55. if newClient, err := logic.ToggleExtClientConnectivity(client, false); err != nil {
  56. return err
  57. } else {
  58. // publish peer update to ingress gateway
  59. if ingressNode, err := logic.GetNodeByID(newClient.IngressGatewayID); err == nil {
  60. if err = mq.PublishPeerUpdate(false); err != nil {
  61. slog.Error("error updating ext clients on", "ingress", ingressNode.ID.String(), "err", err.Error())
  62. }
  63. ingressHost, err := logic.GetHost(ingressNode.HostID.String())
  64. if err != nil {
  65. return err
  66. }
  67. nodes, err := logic.GetAllNodes()
  68. if err != nil {
  69. return err
  70. }
  71. go mq.PublishSingleHostPeerUpdate(ingressHost, nodes, nil, []models.ExtClient{*client}, false)
  72. } else {
  73. return err
  74. }
  75. }
  76. return nil
  77. }