main.go 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177
  1. package main
  2. import (
  3. "fmt"
  4. "github.com/gravitl/netmaker/netclient/functions"
  5. "golang.zx2c4.com/wireguard/wgctrl"
  6. nodepb "github.com/gravitl/netmaker/grpc"
  7. "flag"
  8. "os"
  9. "os/exec"
  10. "strconv"
  11. "strings"
  12. "log"
  13. )
  14. const (
  15. // name of the service
  16. name = "netclient"
  17. description = "Netmaker Daemon Service"
  18. )
  19. var password string
  20. var group string
  21. var server string
  22. var accesskey string
  23. var (
  24. wgclient *wgctrl.Client
  25. )
  26. var (
  27. wcclient nodepb.NodeServiceClient
  28. )
  29. func main() {
  30. tpassword := flag.String("p", "changeme", "This node's password for accessing the server regularly")
  31. taccesskey := flag.String("k", "badkey", "an access key generated by the server and used for one-time access (install only)")
  32. tserver := flag.String("s", "localhost:50051", "The location (including port) of the remote gRPC server.")
  33. tnetwork := flag.String("n", "nonetwork", "The node group you are attempting to join.")
  34. tnoauto := flag.Bool("na", false, "No auto mode. If true, netmclient will not be installed as a system service and you will have to retrieve updates manually via checkin command.")
  35. tnoforward := flag.Bool("nf", false, "No Forward mode. If true, netclient will not check for IP forwarding. This may break functionality")
  36. command := flag.String("c", "required", "The command to run")
  37. flag.Parse()
  38. getID := exec.Command("id", "-u")
  39. out, err := getID.Output()
  40. if err != nil {
  41. log.Fatal(err)
  42. }
  43. id, err := strconv.Atoi(string(out[:len(out)-1]))
  44. if err != nil {
  45. log.Fatal(err)
  46. }
  47. if id != 0 {
  48. log.Fatal("This program must be run with elevated privileges (sudo). This program installs a SystemD service and configures WireGuard and networking rules. Please re-run with sudo/root.")
  49. }
  50. _, err = exec.LookPath("wg")
  51. if err != nil {
  52. log.Println(err)
  53. log.Fatal("WireGuard not installed. Please install WireGuard (wireguard-tools) and try again.")
  54. }
  55. switch *command {
  56. case "required":
  57. fmt.Println("command flag 'c' is required. Pick one of |install|checkin|update|remove|")
  58. os.Exit(1)
  59. log.Fatal("Exiting")
  60. case "install":
  61. if *tnetwork == "nonetwork" || *tnetwork == ""{
  62. fmt.Println("Required, '-n'. No network provided. Exiting.")
  63. os.Exit(1)
  64. }
  65. if !*tnoforward {
  66. forward := exec.Command("sysctl", "net.ipv4.ip_forward")
  67. out, err := forward.Output()
  68. if err != nil {
  69. log.Fatal(err)
  70. }
  71. //s := strings.Split(string(out), " ", "\n")
  72. s := strings.Fields(string(out))
  73. if err != nil {
  74. log.Fatal(err)
  75. }
  76. if s[2] != "1" {
  77. log.Fatal("It is recommended to enable IP Forwarding. Current status is: " + s[2] + ", but should be 1. if you would like to run without IP Forwarding, re-run with flag '-nf true'")
  78. }
  79. }
  80. fmt.Println("Beginning agent installation.")
  81. err := functions.Install(*taccesskey, *tpassword, *tserver, *tnetwork, *tnoauto)
  82. if err != nil {
  83. fmt.Println("Error installing: ", err)
  84. fmt.Println("Cleaning up (uninstall)")
  85. err = functions.Remove(*tnetwork)
  86. if err != nil {
  87. fmt.Println("Error uninstalling: ", err)
  88. fmt.Println("Wiping local.")
  89. err = functions.WipeLocal(*tnetwork)
  90. if err != nil {
  91. fmt.Println("Error removing artifacts: ", err)
  92. }
  93. err = functions.RemoveSystemDServices(*tnetwork)
  94. if err != nil {
  95. fmt.Println("Error removing services: ", err)
  96. }
  97. }
  98. os.Exit(1)
  99. }
  100. /*
  101. case "service-install":
  102. fmt.Println("Beginning service installation.")
  103. err := functions.ConfigureSystemD()
  104. if err != nil {
  105. fmt.Println("Error installing service: ", err)
  106. os.Exit(1)
  107. }
  108. case "service-uninstall":
  109. fmt.Println("Beginning service uninstall.")
  110. err := functions.RemoveSystemDServices()
  111. if err != nil {
  112. fmt.Println("Error installing service: ", err)
  113. os.Exit(1)
  114. }
  115. */
  116. case "checkin":
  117. if *tnetwork == "nonetwork" || *tnetwork == "" {
  118. fmt.Println("Required, '-n'. No network provided. Exiting.")
  119. os.Exit(1)
  120. }
  121. fmt.Println("Beginning node check in for group " + *tnetwork)
  122. err := functions.CheckIn(*tnetwork)
  123. if err != nil {
  124. fmt.Println("Error checking in: ", err)
  125. os.Exit(1)
  126. }
  127. case "remove":
  128. if *tnetwork == "nonetwork" || *tnetwork == "" {
  129. fmt.Println("Required, '-n'. No network provided. Exiting.")
  130. os.Exit(1)
  131. }
  132. fmt.Println("Beginning node cleanup.")
  133. err := functions.Remove(*tnetwork)
  134. if err != nil {
  135. /*
  136. fmt.Println("Error uninstalling: ", err)
  137. fmt.Println("Wiping local.")
  138. err = functions.WipeLocal()
  139. if err != nil {
  140. fmt.Println("Error removing artifacts: ", err)
  141. }
  142. err = functions.RemoveSystemDServices()
  143. if err != nil {
  144. fmt.Println("Error removing services: ", err)
  145. }
  146. */
  147. fmt.Println("Error deleting node: ", err)
  148. os.Exit(1)
  149. }
  150. default:
  151. fmt.Println("You must select from the following commands: install|remove|checkin", err)
  152. os.Exit(1)
  153. }
  154. fmt.Println("Command " + *command + " Executed Successfully")
  155. }