main.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395
  1. //go:generate goversioninfo -icon=windowsdata/resource/netmaker.ico -manifest=netclient.exe.manifest.xml -64=true -o=netclient.syso
  2. package main
  3. import (
  4. "errors"
  5. "log"
  6. "os"
  7. "os/exec"
  8. "os/signal"
  9. "runtime/debug"
  10. "strconv"
  11. "syscall"
  12. "github.com/gravitl/netmaker/netclient/command"
  13. "github.com/gravitl/netmaker/netclient/config"
  14. "github.com/gravitl/netmaker/netclient/local"
  15. "github.com/gravitl/netmaker/netclient/ncutils"
  16. "github.com/gravitl/netmaker/netclient/ncwindows"
  17. "github.com/urfave/cli/v2"
  18. )
  19. func main() {
  20. app := cli.NewApp()
  21. app.Name = "Netclient CLI"
  22. app.Usage = "Netmaker's netclient agent and CLI. Used to perform interactions with Netmaker server and set local WireGuard config."
  23. app.Version = "v0.9.1"
  24. hostname, err := os.Hostname()
  25. if err != nil {
  26. hostname = ""
  27. }
  28. cliFlags := []cli.Flag{
  29. &cli.StringFlag{
  30. Name: "network",
  31. Aliases: []string{"n"},
  32. EnvVars: []string{"NETCLIENT_NETWORK"},
  33. Value: "all",
  34. Usage: "Network to perform specified action against.",
  35. },
  36. &cli.StringFlag{
  37. Name: "password",
  38. Aliases: []string{"p"},
  39. EnvVars: []string{"NETCLIENT_PASSWORD"},
  40. Value: "",
  41. Usage: "Password for authenticating with netmaker.",
  42. },
  43. &cli.StringFlag{
  44. Name: "endpoint",
  45. Aliases: []string{"e"},
  46. EnvVars: []string{"NETCLIENT_ENDPOINT"},
  47. Value: "",
  48. Usage: "Reachable (usually public) address for WireGuard (not the private WG address).",
  49. },
  50. &cli.StringFlag{
  51. Name: "macaddress",
  52. Aliases: []string{"m"},
  53. EnvVars: []string{"NETCLIENT_MACADDRESS"},
  54. Value: "",
  55. Usage: "Mac Address for this machine. Used as a unique identifier within Netmaker network.",
  56. },
  57. &cli.StringFlag{
  58. Name: "publickey",
  59. Aliases: []string{"pubkey"},
  60. EnvVars: []string{"NETCLIENT_PUBLICKEY"},
  61. Value: "",
  62. Usage: "Public Key for WireGuard Interface.",
  63. },
  64. &cli.StringFlag{
  65. Name: "privatekey",
  66. Aliases: []string{"privkey"},
  67. EnvVars: []string{"NETCLIENT_PRIVATEKEY"},
  68. Value: "",
  69. Usage: "Private Key for WireGuard Interface.",
  70. },
  71. &cli.StringFlag{
  72. Name: "port",
  73. EnvVars: []string{"NETCLIENT_PORT"},
  74. Value: "",
  75. Usage: "Port for WireGuard Interface.",
  76. },
  77. &cli.IntFlag{
  78. Name: "keepalive",
  79. EnvVars: []string{"NETCLIENT_KEEPALIVE"},
  80. Value: 0,
  81. Usage: "Default PersistentKeepAlive for Peers in WireGuard Interface.",
  82. },
  83. &cli.StringFlag{
  84. Name: "operatingsystem",
  85. Aliases: []string{"os"},
  86. EnvVars: []string{"NETCLIENT_OS"},
  87. Value: "",
  88. Usage: "Identifiable name for machine within Netmaker network.",
  89. },
  90. &cli.StringFlag{
  91. Name: "name",
  92. EnvVars: []string{"NETCLIENT_NAME"},
  93. Value: hostname,
  94. Usage: "Identifiable name for machine within Netmaker network.",
  95. },
  96. &cli.StringFlag{
  97. Name: "localaddress",
  98. EnvVars: []string{"NETCLIENT_LOCALADDRESS"},
  99. Value: "",
  100. Usage: "Local address for machine. Can be used in place of Endpoint for machines on the same LAN.",
  101. },
  102. &cli.StringFlag{
  103. Name: "isstatic",
  104. Aliases: []string{"st"},
  105. EnvVars: []string{"NETCLIENT_IS_STATIC"},
  106. Value: "",
  107. Usage: "Indicates if client is static by default (will not change addresses automatically).",
  108. },
  109. &cli.StringFlag{
  110. Name: "address",
  111. Aliases: []string{"a"},
  112. EnvVars: []string{"NETCLIENT_ADDRESS"},
  113. Value: "",
  114. Usage: "WireGuard address for machine within Netmaker network.",
  115. },
  116. &cli.StringFlag{
  117. Name: "addressIPv6",
  118. Aliases: []string{"a6"},
  119. EnvVars: []string{"NETCLIENT_ADDRESSIPV6"},
  120. Value: "",
  121. Usage: "WireGuard address for machine within Netmaker network.",
  122. },
  123. &cli.StringFlag{
  124. Name: "interface",
  125. Aliases: []string{"i"},
  126. EnvVars: []string{"NETCLIENT_INTERFACE"},
  127. Value: "",
  128. Usage: "WireGuard local network interface name.",
  129. },
  130. &cli.StringFlag{
  131. Name: "apiserver",
  132. EnvVars: []string{"NETCLIENT_API_SERVER"},
  133. Value: "",
  134. Usage: "Address + GRPC Port (e.g. 1.2.3.4:50051) of Netmaker server.",
  135. },
  136. &cli.StringFlag{
  137. Name: "grpcserver",
  138. EnvVars: []string{"NETCLIENT_GRPC_SERVER"},
  139. Value: "",
  140. Usage: "Address + API Port (e.g. 1.2.3.4:8081) of Netmaker server.",
  141. },
  142. &cli.StringFlag{
  143. Name: "key",
  144. Aliases: []string{"k"},
  145. EnvVars: []string{"NETCLIENT_ACCESSKEY"},
  146. Value: "",
  147. Usage: "Access Key for signing up machine with Netmaker server during initial 'add'.",
  148. },
  149. &cli.StringFlag{
  150. Name: "token",
  151. Aliases: []string{"t"},
  152. EnvVars: []string{"NETCLIENT_ACCESSTOKEN"},
  153. Value: "",
  154. Usage: "Access Token for signing up machine with Netmaker server during initial 'add'.",
  155. },
  156. &cli.StringFlag{
  157. Name: "localrange",
  158. EnvVars: []string{"NETCLIENT_LOCALRANGE"},
  159. Value: "",
  160. Usage: "Local Range if network is local, for instance 192.168.1.0/24.",
  161. },
  162. &cli.StringFlag{
  163. Name: "dnson",
  164. EnvVars: []string{"NETCLIENT_DNS"},
  165. Value: "yes",
  166. Usage: "Sets private dns if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  167. },
  168. &cli.StringFlag{
  169. Name: "islocal",
  170. EnvVars: []string{"NETCLIENT_IS_LOCAL"},
  171. Value: "",
  172. Usage: "Sets endpoint to local address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  173. },
  174. &cli.StringFlag{
  175. Name: "isdualstack",
  176. EnvVars: []string{"NETCLIENT_IS_DUALSTACK"},
  177. Value: "",
  178. Usage: "Sets ipv6 address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  179. },
  180. &cli.StringFlag{
  181. Name: "udpholepunch",
  182. EnvVars: []string{"NETCLIENT_UDP_HOLEPUNCH"},
  183. Value: "",
  184. Usage: "Turns on udp holepunching if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  185. },
  186. &cli.StringFlag{
  187. Name: "ipforwarding",
  188. EnvVars: []string{"NETCLIENT_IPFORWARDING"},
  189. Value: "on",
  190. Usage: "Sets ip forwarding on if 'on'. Ignores if 'off'. On by default.",
  191. },
  192. &cli.StringFlag{
  193. Name: "postup",
  194. EnvVars: []string{"NETCLIENT_POSTUP"},
  195. Value: "",
  196. Usage: "Sets PostUp command for WireGuard.",
  197. },
  198. &cli.StringFlag{
  199. Name: "postdown",
  200. EnvVars: []string{"NETCLIENT_POSTDOWN"},
  201. Value: "",
  202. Usage: "Sets PostDown command for WireGuard.",
  203. },
  204. &cli.StringFlag{
  205. Name: "daemon",
  206. EnvVars: []string{"NETCLIENT_DAEMON"},
  207. Value: "on",
  208. Usage: "Installs daemon if 'on'. Ignores if 'off'. On by default.",
  209. },
  210. &cli.StringFlag{
  211. Name: "roaming",
  212. EnvVars: []string{"NETCLIENT_ROAMING"},
  213. Value: "on",
  214. Usage: "Checks for IP changes if 'on'. Ignores if 'off'. On by default.",
  215. },
  216. }
  217. app.Commands = []*cli.Command{
  218. {
  219. Name: "join",
  220. Usage: "Join a Netmaker network.",
  221. Flags: cliFlags,
  222. Action: func(c *cli.Context) error {
  223. cfg, pvtKey, err := config.GetCLIConfig(c)
  224. if err != nil {
  225. return err
  226. }
  227. if cfg.Network == "all" {
  228. err = errors.New("No network provided.")
  229. return err
  230. }
  231. if cfg.Server.GRPCAddress == "" {
  232. err = errors.New("No server address provided.")
  233. return err
  234. }
  235. err = command.Join(cfg, pvtKey)
  236. return err
  237. },
  238. },
  239. {
  240. Name: "leave",
  241. Usage: "Leave a Netmaker network.",
  242. Flags: cliFlags,
  243. // the action, or code that will be executed when
  244. // we execute our `ns` command
  245. Action: func(c *cli.Context) error {
  246. cfg, _, err := config.GetCLIConfig(c)
  247. if err != nil {
  248. return err
  249. }
  250. err = command.Leave(cfg)
  251. return err
  252. },
  253. },
  254. {
  255. Name: "checkin",
  256. Usage: "Checks for local changes and then checks into the specified Netmaker network to ask about remote changes.",
  257. Flags: cliFlags,
  258. // the action, or code that will be executed when
  259. // we execute our `ns` command
  260. Action: func(c *cli.Context) error {
  261. cfg, _, err := config.GetCLIConfig(c)
  262. if err != nil {
  263. return err
  264. }
  265. err = command.CheckIn(cfg)
  266. return err
  267. },
  268. },
  269. {
  270. Name: "push",
  271. Usage: "Push configuration changes to server.",
  272. Flags: cliFlags,
  273. // the action, or code that will be executed when
  274. // we execute our `ns` command
  275. Action: func(c *cli.Context) error {
  276. cfg, _, err := config.GetCLIConfig(c)
  277. if err != nil {
  278. return err
  279. }
  280. err = command.Push(cfg)
  281. return err
  282. },
  283. },
  284. {
  285. Name: "pull",
  286. Usage: "Pull latest configuration and peers from server.",
  287. Flags: cliFlags,
  288. // the action, or code that will be executed when
  289. // we execute our `ns` command
  290. Action: func(c *cli.Context) error {
  291. cfg, _, err := config.GetCLIConfig(c)
  292. if err != nil {
  293. return err
  294. }
  295. err = command.Pull(cfg)
  296. return err
  297. },
  298. },
  299. {
  300. Name: "list",
  301. Usage: "Get list of networks.",
  302. Flags: cliFlags,
  303. // the action, or code that will be executed when
  304. // we execute our `ns` command
  305. Action: func(c *cli.Context) error {
  306. cfg, _, err := config.GetCLIConfig(c)
  307. if err != nil {
  308. return err
  309. }
  310. err = command.List(cfg)
  311. return err
  312. },
  313. },
  314. {
  315. Name: "uninstall",
  316. Usage: "Uninstall the netclient system service.",
  317. Flags: cliFlags,
  318. // the action, or code that will be executed when
  319. // we execute our `ns` command
  320. Action: func(c *cli.Context) error {
  321. err := command.Uninstall()
  322. return err
  323. },
  324. },
  325. }
  326. setGarbageCollection()
  327. if ncutils.IsWindows() {
  328. ncwindows.InitWindows()
  329. } else {
  330. // start our application
  331. out, err := ncutils.RunCmd("id -u", true)
  332. if err != nil {
  333. log.Fatal(out, err)
  334. }
  335. id, err := strconv.Atoi(string(out[:len(out)-1]))
  336. if err != nil {
  337. log.Fatal(err)
  338. }
  339. if id != 0 {
  340. log.Fatal("This program must be run with elevated privileges (sudo). This program installs a SystemD service and configures WireGuard and networking rules. Please re-run with sudo/root.")
  341. }
  342. _, err = exec.LookPath("wg")
  343. uspace := ncutils.GetWireGuard()
  344. if err != nil {
  345. if uspace == "wg" {
  346. log.Println(err)
  347. log.Fatal("WireGuard not installed. Please install WireGuard (wireguard-tools) and try again.")
  348. }
  349. ncutils.PrintLog("Running with userspace wireguard: "+uspace, 0)
  350. } else if uspace != "wg" {
  351. log.Println("running userspace WireGuard with " + uspace)
  352. }
  353. }
  354. if !ncutils.IsKernel() {
  355. if !local.IsWGInstalled() {
  356. log.Fatal("Please install WireGuard before using Gravitl Netclient. https://download.wireguard.com")
  357. }
  358. }
  359. if len(os.Args) == 1 && ncutils.IsWindows() {
  360. c := make(chan os.Signal)
  361. signal.Notify(c, os.Interrupt, syscall.SIGTERM)
  362. go func() {
  363. <-c
  364. log.Println("closing Gravitl Netclient")
  365. os.Exit(0)
  366. }()
  367. command.RunUserspaceDaemon()
  368. } else {
  369. err := app.Run(os.Args)
  370. if err != nil {
  371. log.Fatal(err)
  372. }
  373. }
  374. }
  375. func setGarbageCollection() {
  376. _, gcset := os.LookupEnv("GOGC")
  377. if !gcset {
  378. debug.SetGCPercent(ncutils.DEFAULT_GC_PERCENT)
  379. }
  380. }