123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168 |
- /*
- * Copyright (c)2013-2020 ZeroTier, Inc.
- *
- * Use of this software is governed by the Business Source License included
- * in the LICENSE.TXT file in the project's root directory.
- *
- * Change Date: 2024-01-01
- *
- * On the date above, in accordance with the Business Source License, use
- * of this software will be governed by version 2.0 of the Apache License.
- */
- /****/
- package main
- import "C"
- import (
- "flag"
- "fmt"
- "io/ioutil"
- "os"
- "path"
- "runtime"
- "runtime/debug"
- "strings"
- "zerotier/cmd/zerotier/cli"
- "zerotier/pkg/zerotier"
- )
- func getAuthTokenPaths(basePath string) (p []string) {
- p = append(p, path.Join(basePath, "authtoken.secret"))
- userHome, _ := os.UserHomeDir()
- if len(userHome) > 0 {
- if runtime.GOOS == "darwin" {
- p = append(p, path.Join(userHome, "Library", "Application Support", "ZeroTier", "authtoken.secret"))
- p = append(p, path.Join(userHome, "Library", "Application Support", "ZeroTier", "One", "authtoken.secret"))
- }
- p = append(p, path.Join(userHome, ".zerotierauth"))
- p = append(p, path.Join(userHome, ".zeroTierOneAuthToken"))
- }
- return p
- }
- func authTokenRequired(authToken string) {
- if len(authToken) == 0 {
- fmt.Println("FATAL: unable to read API authorization token from command line or any filesystem location.")
- os.Exit(1)
- }
- }
- func main() {
- // Reduce Go's thread and memory footprint. This would slow things down if the Go code
- // were doing a lot, but it's not. It just manages the core and is not directly involved
- // in pushing a lot of packets around. If that ever changes this should be adjusted.
- runtime.GOMAXPROCS(1)
- debug.SetGCPercent(20)
- globalOpts := flag.NewFlagSet("global", flag.ContinueOnError)
- hflag := globalOpts.Bool("h", false, "") // support -h to be canonical with other Unix utilities
- jflag := globalOpts.Bool("j", false, "")
- pflag := globalOpts.String("p", "", "")
- tflag := globalOpts.String("t", "", "")
- tTflag := globalOpts.String("T", "", "")
- err := globalOpts.Parse(os.Args[1:])
- if err != nil {
- cli.Help()
- os.Exit(1)
- return
- }
- args := globalOpts.Args()
- if len(args) < 1 || *hflag {
- cli.Help()
- os.Exit(0)
- return
- }
- var cmdArgs []string
- if len(args) > 1 {
- cmdArgs = args[1:]
- }
- basePath := zerotier.PlatformDefaultHomePath
- if len(*pflag) > 0 {
- basePath = *pflag
- }
- authTokenPaths := getAuthTokenPaths(basePath)
- var authToken string
- if len(*tflag) > 0 {
- at, err := ioutil.ReadFile(*tflag)
- if err != nil || len(at) == 0 {
- fmt.Println("FATAL: unable to read local service API authorization token from " + *tflag)
- os.Exit(1)
- }
- authToken = string(at)
- } else if len(*tTflag) > 0 {
- authToken = *tTflag
- } else {
- for _, p := range authTokenPaths {
- tmp, _ := ioutil.ReadFile(p)
- if len(tmp) > 0 {
- authToken = string(tmp)
- break
- }
- }
- if len(authToken) == 0 {
- fmt.Println("FATAL: unable to read local service API authorization token from any of:")
- for _, p := range authTokenPaths {
- fmt.Println(" " + p)
- }
- os.Exit(1)
- }
- }
- authToken = strings.TrimSpace(authToken)
- switch args[0] {
- case "help":
- cli.Help()
- os.Exit(0)
- case "version":
- fmt.Printf("%d.%d.%d\n", zerotier.CoreVersionMajor, zerotier.CoreVersionMinor, zerotier.CoreVersionRevision)
- os.Exit(0)
- case "service":
- cli.Service(basePath, authToken, cmdArgs)
- case "status", "info":
- authTokenRequired(authToken)
- cli.Status(basePath, authToken, cmdArgs, *jflag)
- case "join":
- authTokenRequired(authToken)
- cli.Join(basePath, authToken, cmdArgs)
- case "leave":
- authTokenRequired(authToken)
- cli.Leave(basePath, authToken, cmdArgs)
- case "networks", "listnetworks":
- authTokenRequired(authToken)
- cli.Networks(basePath, authToken, cmdArgs, *jflag)
- case "network":
- authTokenRequired(authToken)
- cli.Network(basePath, authToken, cmdArgs, *jflag)
- case "peers", "listpeers", "lspeers":
- authTokenRequired(authToken)
- cli.Peers(basePath, authToken, cmdArgs, *jflag, false)
- case "peer":
- authTokenRequired(authToken)
- case "roots":
- authTokenRequired(authToken)
- cli.Peers(basePath, authToken, cmdArgs, *jflag, true)
- case "root":
- authTokenRequired(authToken)
- cli.Root(basePath, authToken, cmdArgs, *jflag)
- case "set":
- authTokenRequired(authToken)
- cli.Set(basePath, authToken, cmdArgs)
- case "controller":
- authTokenRequired(authToken)
- cli.Controller(basePath, authToken, cmdArgs, *jflag)
- case "identity":
- cli.Identity(cmdArgs)
- }
- // Commands in the 'cli' sub-package do not return, so if we make
- // it here the command was not recognized.
- cli.Help()
- os.Exit(1)
- }
|