2
0

remote_access_client.go 2.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091
  1. //go:build ee
  2. // +build ee
  3. package pro
  4. import (
  5. "fmt"
  6. "time"
  7. "github.com/gravitl/netmaker/logic"
  8. "github.com/gravitl/netmaker/models"
  9. "github.com/gravitl/netmaker/mq"
  10. "github.com/gravitl/netmaker/servercfg"
  11. "golang.org/x/exp/slog"
  12. )
  13. const racAutoDisableCheckInterval = 3 * time.Minute
  14. // AddRacHooks - adds hooks for Remote Access Client
  15. func AddRacHooks() {
  16. slog.Debug("adding RAC autodisable hook")
  17. logic.HookManagerCh <- models.HookDetails{
  18. Hook: racAutoDisableHook,
  19. Interval: racAutoDisableCheckInterval,
  20. }
  21. }
  22. // racAutoDisableHook - checks if RAC is enabled and if it is, checks if it should be disabled
  23. func racAutoDisableHook() error {
  24. slog.Debug("running RAC autodisable hook")
  25. users, err := logic.GetUsers()
  26. if err != nil {
  27. slog.Error("error getting users: ", "error", err)
  28. return err
  29. }
  30. clients, err := logic.GetAllExtClients()
  31. if err != nil {
  32. slog.Error("error getting clients: ", "error", err)
  33. return err
  34. }
  35. currentTime := time.Now()
  36. validityDuration := servercfg.GetJwtValidityDuration()
  37. for _, user := range users {
  38. if !currentTime.After(user.LastLoginTime.Add(validityDuration)) {
  39. continue
  40. }
  41. for _, client := range clients {
  42. if (client.OwnerID == user.UserName) &&
  43. user.PlatformRoleID != models.SuperAdminRole &&
  44. user.PlatformRoleID != models.AdminRole &&
  45. client.Enabled {
  46. slog.Info(fmt.Sprintf("disabling ext client %s for user %s due to RAC autodisabling", client.ClientID, client.OwnerID))
  47. if err := disableExtClient(&client); err != nil {
  48. slog.Error("error disabling ext client in RAC autodisable hook", "error", err)
  49. continue // dont return but try for other clients
  50. }
  51. }
  52. }
  53. }
  54. slog.Debug("finished running RAC autodisable hook")
  55. return nil
  56. }
  57. func disableExtClient(client *models.ExtClient) error {
  58. if newClient, err := logic.ToggleExtClientConnectivity(client, false); err != nil {
  59. return err
  60. } else {
  61. // publish peer update to ingress gateway
  62. if ingressNode, err := logic.GetNodeByID(newClient.IngressGatewayID); err == nil {
  63. if err = mq.PublishPeerUpdate(false); err != nil {
  64. slog.Error("error updating ext clients on", "ingress", ingressNode.ID.String(), "err", err.Error())
  65. }
  66. ingressHost, err := logic.GetHost(ingressNode.HostID.String())
  67. if err != nil {
  68. return err
  69. }
  70. nodes, err := logic.GetAllNodes()
  71. if err != nil {
  72. return err
  73. }
  74. go mq.PublishSingleHostPeerUpdate(ingressHost, nodes, nil, []models.ExtClient{*client}, false, nil)
  75. } else {
  76. return err
  77. }
  78. }
  79. return nil
  80. }