initialize.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159
  1. //go:build ee
  2. // +build ee
  3. package pro
  4. import (
  5. "time"
  6. controller "github.com/gravitl/netmaker/controllers"
  7. "github.com/gravitl/netmaker/logger"
  8. "github.com/gravitl/netmaker/logic"
  9. "github.com/gravitl/netmaker/models"
  10. "github.com/gravitl/netmaker/mq"
  11. "github.com/gravitl/netmaker/pro/auth"
  12. proControllers "github.com/gravitl/netmaker/pro/controllers"
  13. proLogic "github.com/gravitl/netmaker/pro/logic"
  14. "github.com/gravitl/netmaker/servercfg"
  15. "golang.org/x/exp/slog"
  16. )
  17. // InitPro - Initialize Pro Logic
  18. func InitPro() {
  19. servercfg.IsPro = true
  20. models.SetLogo(retrieveProLogo())
  21. controller.HttpMiddlewares = append(
  22. controller.HttpMiddlewares,
  23. proControllers.OnlyServerAPIWhenUnlicensedMiddleware,
  24. )
  25. controller.HttpHandlers = append(
  26. controller.HttpHandlers,
  27. proControllers.MetricHandlers,
  28. proControllers.RelayHandlers,
  29. proControllers.UserHandlers,
  30. proControllers.FailOverHandlers,
  31. proControllers.InetHandlers,
  32. proControllers.RacHandlers,
  33. )
  34. controller.ListRoles = proControllers.ListRoles
  35. logic.EnterpriseCheckFuncs = append(logic.EnterpriseCheckFuncs, func() {
  36. // == License Handling ==
  37. enableLicenseHook := true
  38. // licenseKeyValue := servercfg.GetLicenseKey()
  39. // netmakerTenantID := servercfg.GetNetmakerTenantID()
  40. // if licenseKeyValue != "" && netmakerTenantID != "" {
  41. // enableLicenseHook = true
  42. // }
  43. if !enableLicenseHook {
  44. err := initTrial()
  45. if err != nil {
  46. logger.Log(0, "failed to init trial", err.Error())
  47. enableLicenseHook = true
  48. }
  49. trialEndDate, err := getTrialEndDate()
  50. if err != nil {
  51. slog.Error("failed to get trial end date", "error", err)
  52. enableLicenseHook = true
  53. } else {
  54. // check if trial ended
  55. if time.Now().After(trialEndDate) {
  56. // trial ended already
  57. enableLicenseHook = true
  58. }
  59. }
  60. }
  61. if enableLicenseHook {
  62. logger.Log(0, "starting license checker")
  63. ClearLicenseCache()
  64. if err := ValidateLicense(); err != nil {
  65. slog.Error(err.Error())
  66. return
  67. }
  68. logger.Log(0, "proceeding with Paid Tier license")
  69. logic.SetFreeTierForTelemetry(false)
  70. // == End License Handling ==
  71. AddLicenseHooks()
  72. } else {
  73. logger.Log(0, "starting trial license hook")
  74. addTrialLicenseHook()
  75. }
  76. if servercfg.GetServerConfig().RacAutoDisable {
  77. AddRacHooks()
  78. }
  79. var authProvider = auth.InitializeAuthProvider()
  80. if authProvider != "" {
  81. slog.Info("OAuth provider,", authProvider+",", "initialized")
  82. } else {
  83. slog.Error("no OAuth provider found or not configured, continuing without OAuth")
  84. }
  85. proLogic.LoadNodeMetricsToCache()
  86. })
  87. logic.ResetFailOver = proLogic.ResetFailOver
  88. logic.ResetFailedOverPeer = proLogic.ResetFailedOverPeer
  89. logic.FailOverExists = proLogic.FailOverExists
  90. logic.CreateFailOver = proLogic.CreateFailOver
  91. logic.GetFailOverPeerIps = proLogic.GetFailOverPeerIps
  92. logic.DenyClientNodeAccess = proLogic.DenyClientNode
  93. logic.IsClientNodeAllowed = proLogic.IsClientNodeAllowed
  94. logic.AllowClientNodeAccess = proLogic.RemoveDeniedNodeFromClient
  95. logic.SetClientDefaultACLs = proLogic.SetClientDefaultACLs
  96. logic.SetClientACLs = proLogic.SetClientACLs
  97. logic.UpdateProNodeACLs = proLogic.UpdateProNodeACLs
  98. logic.GetMetrics = proLogic.GetMetrics
  99. logic.UpdateMetrics = proLogic.UpdateMetrics
  100. logic.DeleteMetrics = proLogic.DeleteMetrics
  101. logic.GetRelays = proLogic.GetRelays
  102. logic.GetAllowedIpsForRelayed = proLogic.GetAllowedIpsForRelayed
  103. logic.RelayedAllowedIPs = proLogic.RelayedAllowedIPs
  104. logic.UpdateRelayed = proLogic.UpdateRelayed
  105. logic.SetRelayedNodes = proLogic.SetRelayedNodes
  106. logic.RelayUpdates = proLogic.RelayUpdates
  107. logic.ValidateRelay = proLogic.ValidateRelay
  108. logic.GetTrialEndDate = getTrialEndDate
  109. logic.SetDefaultGw = proLogic.SetDefaultGw
  110. logic.SetDefaultGwForRelayedUpdate = proLogic.SetDefaultGwForRelayedUpdate
  111. logic.UnsetInternetGw = proLogic.UnsetInternetGw
  112. logic.SetInternetGw = proLogic.SetInternetGw
  113. logic.GetAllowedIpForInetNodeClient = proLogic.GetAllowedIpForInetNodeClient
  114. mq.UpdateMetrics = proLogic.MQUpdateMetrics
  115. mq.UpdateMetricsFallBack = proLogic.MQUpdateMetricsFallBack
  116. logic.GetFilteredNodesByUserAccess = proLogic.GetFilteredNodesByUserAccess
  117. logic.CreateRole = proLogic.CreateRole
  118. logic.UpdateRole = proLogic.UpdateRole
  119. logic.DeleteRole = proLogic.DeleteRole
  120. logic.NetworkPermissionsCheck = proLogic.NetworkPermissionsCheck
  121. logic.GlobalPermissionsCheck = proLogic.GlobalPermissionsCheck
  122. logic.DeleteNetworkRoles = proLogic.DeleteNetworkRoles
  123. logic.CreateDefaultNetworkRolesAndGroups = proLogic.CreateDefaultNetworkRolesAndGroups
  124. logic.FilterNetworksByRole = proLogic.FilterNetworksByRole
  125. logic.IsGroupsValid = proLogic.IsGroupsValid
  126. logic.IsGroupValid = proLogic.IsGroupValid
  127. logic.IsNetworkRolesValid = proLogic.IsNetworkRolesValid
  128. logic.InitialiseRoles = proLogic.UserRolesInit
  129. logic.UpdateUserGwAccess = proLogic.UpdateUserGwAccess
  130. logic.CreateDefaultUserPolicies = proLogic.CreateDefaultUserPolicies
  131. logic.MigrateUserRoleAndGroups = proLogic.MigrateUserRoleAndGroups
  132. logic.IntialiseGroups = proLogic.UserGroupsInit
  133. logic.AddGlobalNetRolesToAdmins = proLogic.AddGlobalNetRolesToAdmins
  134. logic.GetUserGroupsInNetwork = proLogic.GetUserGroupsInNetwork
  135. }
  136. func retrieveProLogo() string {
  137. return `
  138. __ __ ______ ______ __ __ ______ __ __ ______ ______
  139. /\ "-.\ \ /\ ___\ /\__ _\ /\ "-./ \ /\ __ \ /\ \/ / /\ ___\ /\ == \
  140. \ \ \-. \ \ \ __\ \/_/\ \/ \ \ \-./\ \ \ \ __ \ \ \ _"-. \ \ __\ \ \ __<
  141. \ \_\\"\_\ \ \_____\ \ \_\ \ \_\ \ \_\ \ \_\ \_\ \ \_\ \_\ \ \_____\ \ \_\ \_\
  142. \/_/ \/_/ \/_____/ \/_/ \/_/ \/_/ \/_/\/_/ \/_/\/_/ \/_____/ \/_/ /_/
  143. ___ ___ ____
  144. ____ ____ ____ / _ \ / _ \ / __ \ ____ ____ ____
  145. /___/ /___/ /___/ / ___/ / , _// /_/ / /___/ /___/ /___/
  146. /___/ /___/ /___/ /_/ /_/|_| \____/ /___/ /___/ /___/
  147. `
  148. }