initialize.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182
  1. //go:build ee
  2. // +build ee
  3. package pro
  4. import (
  5. "time"
  6. controller "github.com/gravitl/netmaker/controllers"
  7. "github.com/gravitl/netmaker/logger"
  8. "github.com/gravitl/netmaker/logic"
  9. "github.com/gravitl/netmaker/models"
  10. "github.com/gravitl/netmaker/mq"
  11. "github.com/gravitl/netmaker/pro/auth"
  12. proControllers "github.com/gravitl/netmaker/pro/controllers"
  13. "github.com/gravitl/netmaker/pro/email"
  14. proLogic "github.com/gravitl/netmaker/pro/logic"
  15. "github.com/gravitl/netmaker/servercfg"
  16. "golang.org/x/exp/slog"
  17. )
  18. // InitPro - Initialize Pro Logic
  19. func InitPro() {
  20. servercfg.IsPro = true
  21. models.SetLogo(retrieveProLogo())
  22. controller.HttpMiddlewares = append(
  23. controller.HttpMiddlewares,
  24. proControllers.OnlyServerAPIWhenUnlicensedMiddleware,
  25. )
  26. controller.HttpHandlers = append(
  27. controller.HttpHandlers,
  28. proControllers.MetricHandlers,
  29. proControllers.UserHandlers,
  30. proControllers.FailOverHandlers,
  31. proControllers.InetHandlers,
  32. proControllers.RacHandlers,
  33. proControllers.EventHandlers,
  34. proControllers.TagHandlers,
  35. )
  36. controller.ListRoles = proControllers.ListRoles
  37. logic.EnterpriseCheckFuncs = append(logic.EnterpriseCheckFuncs, func() {
  38. // == License Handling ==
  39. enableLicenseHook := true
  40. // licenseKeyValue := servercfg.GetLicenseKey()
  41. // netmakerTenantID := servercfg.GetNetmakerTenantID()
  42. // if licenseKeyValue != "" && netmakerTenantID != "" {
  43. // enableLicenseHook = true
  44. // }
  45. if !enableLicenseHook {
  46. err := initTrial()
  47. if err != nil {
  48. logger.Log(0, "failed to init trial", err.Error())
  49. enableLicenseHook = true
  50. }
  51. trialEndDate, err := getTrialEndDate()
  52. if err != nil {
  53. slog.Error("failed to get trial end date", "error", err)
  54. enableLicenseHook = true
  55. } else {
  56. // check if trial ended
  57. if time.Now().After(trialEndDate) {
  58. // trial ended already
  59. enableLicenseHook = true
  60. }
  61. }
  62. }
  63. if enableLicenseHook {
  64. logger.Log(0, "starting license checker")
  65. ClearLicenseCache()
  66. if err := ValidateLicense(); err != nil {
  67. slog.Error(err.Error())
  68. return
  69. }
  70. logger.Log(0, "proceeding with Paid Tier license")
  71. logic.SetFreeTierForTelemetry(false)
  72. // == End License Handling ==
  73. AddLicenseHooks()
  74. } else {
  75. logger.Log(0, "starting trial license hook")
  76. addTrialLicenseHook()
  77. }
  78. if logic.GetRacAutoDisable() {
  79. AddRacHooks()
  80. }
  81. var authProvider = auth.InitializeAuthProvider()
  82. if authProvider != "" {
  83. slog.Info("OAuth provider,", authProvider+",", "initialized")
  84. } else {
  85. slog.Error("no OAuth provider found or not configured, continuing without OAuth")
  86. }
  87. proLogic.LoadNodeMetricsToCache()
  88. proLogic.InitFailOverCache()
  89. auth.ResetIDPSyncHook()
  90. email.Init()
  91. go proLogic.EventWatcher()
  92. })
  93. logic.ResetFailOver = proLogic.ResetFailOver
  94. logic.ResetFailedOverPeer = proLogic.ResetFailedOverPeer
  95. logic.FailOverExists = proLogic.FailOverExists
  96. logic.CreateFailOver = proLogic.CreateFailOver
  97. logic.GetFailOverPeerIps = proLogic.GetFailOverPeerIps
  98. logic.DenyClientNodeAccess = proLogic.DenyClientNode
  99. logic.IsClientNodeAllowed = proLogic.IsClientNodeAllowed
  100. logic.AllowClientNodeAccess = proLogic.RemoveDeniedNodeFromClient
  101. logic.SetClientDefaultACLs = proLogic.SetClientDefaultACLs
  102. logic.SetClientACLs = proLogic.SetClientACLs
  103. logic.UpdateProNodeACLs = proLogic.UpdateProNodeACLs
  104. logic.GetMetrics = proLogic.GetMetrics
  105. logic.UpdateMetrics = proLogic.UpdateMetrics
  106. logic.DeleteMetrics = proLogic.DeleteMetrics
  107. logic.GetTrialEndDate = getTrialEndDate
  108. logic.SetDefaultGw = proLogic.SetDefaultGw
  109. logic.SetDefaultGwForRelayedUpdate = proLogic.SetDefaultGwForRelayedUpdate
  110. logic.UnsetInternetGw = proLogic.UnsetInternetGw
  111. logic.SetInternetGw = proLogic.SetInternetGw
  112. logic.GetAllowedIpForInetNodeClient = proLogic.GetAllowedIpForInetNodeClient
  113. mq.UpdateMetrics = proLogic.MQUpdateMetrics
  114. mq.UpdateMetricsFallBack = proLogic.MQUpdateMetricsFallBack
  115. logic.GetFilteredNodesByUserAccess = proLogic.GetFilteredNodesByUserAccess
  116. logic.CreateRole = proLogic.CreateRole
  117. logic.UpdateRole = proLogic.UpdateRole
  118. logic.DeleteRole = proLogic.DeleteRole
  119. logic.NetworkPermissionsCheck = proLogic.NetworkPermissionsCheck
  120. logic.GlobalPermissionsCheck = proLogic.GlobalPermissionsCheck
  121. logic.DeleteNetworkRoles = proLogic.DeleteNetworkRoles
  122. logic.CreateDefaultNetworkRolesAndGroups = proLogic.CreateDefaultNetworkRolesAndGroups
  123. logic.FilterNetworksByRole = proLogic.FilterNetworksByRole
  124. logic.IsGroupsValid = proLogic.IsGroupsValid
  125. logic.IsGroupValid = proLogic.IsGroupValid
  126. logic.IsNetworkRolesValid = proLogic.IsNetworkRolesValid
  127. logic.InitialiseRoles = proLogic.UserRolesInit
  128. logic.UpdateUserGwAccess = proLogic.UpdateUserGwAccess
  129. logic.CreateDefaultUserPolicies = proLogic.CreateDefaultUserPolicies
  130. logic.MigrateUserRoleAndGroups = proLogic.MigrateUserRoleAndGroups
  131. logic.MigrateToUUIDs = proLogic.MigrateToUUIDs
  132. logic.IntialiseGroups = proLogic.UserGroupsInit
  133. logic.AddGlobalNetRolesToAdmins = proLogic.AddGlobalNetRolesToAdmins
  134. logic.GetUserGroupsInNetwork = proLogic.GetUserGroupsInNetwork
  135. logic.GetUserGroup = proLogic.GetUserGroup
  136. logic.GetNodeStatus = proLogic.GetNodeStatus
  137. logic.ResetAuthProvider = auth.ResetAuthProvider
  138. logic.ResetIDPSyncHook = auth.ResetIDPSyncHook
  139. logic.EmailInit = email.Init
  140. logic.LogEvent = proLogic.LogEvent
  141. logic.RemoveUserFromAclPolicy = proLogic.RemoveUserFromAclPolicy
  142. logic.IsUserAllowedToCommunicate = proLogic.IsUserAllowedToCommunicate
  143. logic.DeleteAllNetworkTags = proLogic.DeleteAllNetworkTags
  144. logic.CreateDefaultTags = proLogic.CreateDefaultTags
  145. logic.GetInetClientsFromAclPolicies = proLogic.GetInetClientsFromAclPolicies
  146. logic.IsPeerAllowed = proLogic.IsPeerAllowed
  147. logic.IsAclPolicyValid = proLogic.IsAclPolicyValid
  148. logic.GetEgressRulesForNode = proLogic.GetEgressRulesForNode
  149. logic.GetAclRuleForInetGw = proLogic.GetAclRuleForInetGw
  150. logic.GetAclRulesForNode = proLogic.GetAclRulesForNode
  151. logic.CheckIfAnyActiveEgressPolicy = proLogic.CheckIfAnyActiveEgressPolicy
  152. logic.CheckIfAnyPolicyisUniDirectional = proLogic.CheckIfAnyPolicyisUniDirectional
  153. logic.MigrateToGws = proLogic.MigrateToGws
  154. logic.IsNodeAllowedToCommunicate = proLogic.IsNodeAllowedToCommunicate
  155. logic.GetFwRulesForNodeAndPeerOnGw = proLogic.GetFwRulesForNodeAndPeerOnGw
  156. logic.GetFwRulesForUserNodesOnGw = proLogic.GetFwRulesForUserNodesOnGw
  157. }
  158. func retrieveProLogo() string {
  159. return `
  160. __ __ ______ ______ __ __ ______ __ __ ______ ______
  161. /\ "-.\ \ /\ ___\ /\__ _\ /\ "-./ \ /\ __ \ /\ \/ / /\ ___\ /\ == \
  162. \ \ \-. \ \ \ __\ \/_/\ \/ \ \ \-./\ \ \ \ __ \ \ \ _"-. \ \ __\ \ \ __<
  163. \ \_\\"\_\ \ \_____\ \ \_\ \ \_\ \ \_\ \ \_\ \_\ \ \_\ \_\ \ \_____\ \ \_\ \_\
  164. \/_/ \/_/ \/_____/ \/_/ \/_/ \/_/ \/_/\/_/ \/_/\/_/ \/_____/ \/_/ /_/
  165. ___ ___ ____
  166. ____ ____ ____ / _ \ / _ \ / __ \ ____ ____ ____
  167. /___/ /___/ /___/ / ___/ / , _// /_/ / /___/ /___/ /___/
  168. /___/ /___/ /___/ /_/ /_/|_| \____/ /___/ /___/ /___/
  169. `
  170. }