main.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388
  1. //go:generate goversioninfo -icon=windowsdata/resource/netmaker.ico -manifest=netclient.exe.manifest.xml -64=true -o=netclient.syso
  2. package main
  3. import (
  4. "errors"
  5. "log"
  6. "os"
  7. "os/exec"
  8. "os/signal"
  9. "runtime/debug"
  10. "strconv"
  11. "syscall"
  12. "github.com/gravitl/netmaker/netclient/command"
  13. "github.com/gravitl/netmaker/netclient/config"
  14. "github.com/gravitl/netmaker/netclient/local"
  15. "github.com/gravitl/netmaker/netclient/ncutils"
  16. "github.com/gravitl/netmaker/netclient/ncwindows"
  17. "github.com/urfave/cli/v2"
  18. )
  19. func main() {
  20. app := cli.NewApp()
  21. app.Name = "Netclient CLI"
  22. app.Usage = "Netmaker's netclient agent and CLI. Used to perform interactions with Netmaker server and set local WireGuard config."
  23. app.Version = "v0.8.4"
  24. hostname, err := os.Hostname()
  25. if err != nil {
  26. hostname = ""
  27. }
  28. cliFlags := []cli.Flag{
  29. &cli.StringFlag{
  30. Name: "network",
  31. Aliases: []string{"n"},
  32. EnvVars: []string{"NETCLIENT_NETWORK"},
  33. Value: "all",
  34. Usage: "Network to perform specified action against.",
  35. },
  36. &cli.StringFlag{
  37. Name: "password",
  38. Aliases: []string{"p"},
  39. EnvVars: []string{"NETCLIENT_PASSWORD"},
  40. Value: "",
  41. Usage: "Password for authenticating with netmaker.",
  42. },
  43. &cli.StringFlag{
  44. Name: "endpoint",
  45. Aliases: []string{"e"},
  46. EnvVars: []string{"NETCLIENT_ENDPOINT"},
  47. Value: "",
  48. Usage: "Reachable (usually public) address for WireGuard (not the private WG address).",
  49. },
  50. &cli.StringFlag{
  51. Name: "macaddress",
  52. Aliases: []string{"m"},
  53. EnvVars: []string{"NETCLIENT_MACADDRESS"},
  54. Value: "",
  55. Usage: "Mac Address for this machine. Used as a unique identifier within Netmaker network.",
  56. },
  57. &cli.StringFlag{
  58. Name: "publickey",
  59. Aliases: []string{"pubkey"},
  60. EnvVars: []string{"NETCLIENT_PUBLICKEY"},
  61. Value: "",
  62. Usage: "Public Key for WireGuard Interface.",
  63. },
  64. &cli.StringFlag{
  65. Name: "privatekey",
  66. Aliases: []string{"privkey"},
  67. EnvVars: []string{"NETCLIENT_PRIVATEKEY"},
  68. Value: "",
  69. Usage: "Private Key for WireGuard Interface.",
  70. },
  71. &cli.StringFlag{
  72. Name: "port",
  73. EnvVars: []string{"NETCLIENT_PORT"},
  74. Value: "",
  75. Usage: "Port for WireGuard Interface.",
  76. },
  77. &cli.IntFlag{
  78. Name: "keepalive",
  79. EnvVars: []string{"NETCLIENT_KEEPALIVE"},
  80. Value: 0,
  81. Usage: "Default PersistentKeepAlive for Peers in WireGuard Interface.",
  82. },
  83. &cli.StringFlag{
  84. Name: "operatingsystem",
  85. Aliases: []string{"os"},
  86. EnvVars: []string{"NETCLIENT_OS"},
  87. Value: "",
  88. Usage: "Identifiable name for machine within Netmaker network.",
  89. },
  90. &cli.StringFlag{
  91. Name: "name",
  92. EnvVars: []string{"NETCLIENT_NAME"},
  93. Value: hostname,
  94. Usage: "Identifiable name for machine within Netmaker network.",
  95. },
  96. &cli.StringFlag{
  97. Name: "localaddress",
  98. EnvVars: []string{"NETCLIENT_LOCALADDRESS"},
  99. Value: "",
  100. Usage: "Local address for machine. Can be used in place of Endpoint for machines on the same LAN.",
  101. },
  102. &cli.StringFlag{
  103. Name: "address",
  104. Aliases: []string{"a"},
  105. EnvVars: []string{"NETCLIENT_ADDRESS"},
  106. Value: "",
  107. Usage: "WireGuard address for machine within Netmaker network.",
  108. },
  109. &cli.StringFlag{
  110. Name: "addressIPv6",
  111. Aliases: []string{"a6"},
  112. EnvVars: []string{"NETCLIENT_ADDRESSIPV6"},
  113. Value: "",
  114. Usage: "WireGuard address for machine within Netmaker network.",
  115. },
  116. &cli.StringFlag{
  117. Name: "interface",
  118. Aliases: []string{"i"},
  119. EnvVars: []string{"NETCLIENT_INTERFACE"},
  120. Value: "",
  121. Usage: "WireGuard local network interface name.",
  122. },
  123. &cli.StringFlag{
  124. Name: "apiserver",
  125. EnvVars: []string{"NETCLIENT_API_SERVER"},
  126. Value: "",
  127. Usage: "Address + GRPC Port (e.g. 1.2.3.4:50051) of Netmaker server.",
  128. },
  129. &cli.StringFlag{
  130. Name: "grpcserver",
  131. EnvVars: []string{"NETCLIENT_GRPC_SERVER"},
  132. Value: "",
  133. Usage: "Address + API Port (e.g. 1.2.3.4:8081) of Netmaker server.",
  134. },
  135. &cli.StringFlag{
  136. Name: "key",
  137. Aliases: []string{"k"},
  138. EnvVars: []string{"NETCLIENT_ACCESSKEY"},
  139. Value: "",
  140. Usage: "Access Key for signing up machine with Netmaker server during initial 'add'.",
  141. },
  142. &cli.StringFlag{
  143. Name: "token",
  144. Aliases: []string{"t"},
  145. EnvVars: []string{"NETCLIENT_ACCESSTOKEN"},
  146. Value: "",
  147. Usage: "Access Token for signing up machine with Netmaker server during initial 'add'.",
  148. },
  149. &cli.StringFlag{
  150. Name: "localrange",
  151. EnvVars: []string{"NETCLIENT_LOCALRANGE"},
  152. Value: "",
  153. Usage: "Local Range if network is local, for instance 192.168.1.0/24.",
  154. },
  155. &cli.StringFlag{
  156. Name: "dnson",
  157. EnvVars: []string{"NETCLIENT_DNS"},
  158. Value: "yes",
  159. Usage: "Sets private dns if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  160. },
  161. &cli.StringFlag{
  162. Name: "islocal",
  163. EnvVars: []string{"NETCLIENT_IS_LOCAL"},
  164. Value: "",
  165. Usage: "Sets endpoint to local address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  166. },
  167. &cli.StringFlag{
  168. Name: "isdualstack",
  169. EnvVars: []string{"NETCLIENT_IS_DUALSTACK"},
  170. Value: "",
  171. Usage: "Sets ipv6 address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  172. },
  173. &cli.StringFlag{
  174. Name: "udpholepunch",
  175. EnvVars: []string{"NETCLIENT_UDP_HOLEPUNCH"},
  176. Value: "",
  177. Usage: "Turns on udp holepunching if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  178. },
  179. &cli.StringFlag{
  180. Name: "ipforwarding",
  181. EnvVars: []string{"NETCLIENT_IPFORWARDING"},
  182. Value: "on",
  183. Usage: "Sets ip forwarding on if 'on'. Ignores if 'off'. On by default.",
  184. },
  185. &cli.StringFlag{
  186. Name: "postup",
  187. EnvVars: []string{"NETCLIENT_POSTUP"},
  188. Value: "",
  189. Usage: "Sets PostUp command for WireGuard.",
  190. },
  191. &cli.StringFlag{
  192. Name: "postdown",
  193. EnvVars: []string{"NETCLIENT_POSTDOWN"},
  194. Value: "",
  195. Usage: "Sets PostDown command for WireGuard.",
  196. },
  197. &cli.StringFlag{
  198. Name: "daemon",
  199. EnvVars: []string{"NETCLIENT_DAEMON"},
  200. Value: "on",
  201. Usage: "Installs daemon if 'on'. Ignores if 'off'. On by default.",
  202. },
  203. &cli.StringFlag{
  204. Name: "roaming",
  205. EnvVars: []string{"NETCLIENT_ROAMING"},
  206. Value: "on",
  207. Usage: "Checks for IP changes if 'on'. Ignores if 'off'. On by default.",
  208. },
  209. }
  210. app.Commands = []*cli.Command{
  211. {
  212. Name: "join",
  213. Usage: "Join a Netmaker network.",
  214. Flags: cliFlags,
  215. Action: func(c *cli.Context) error {
  216. cfg, pvtKey, err := config.GetCLIConfig(c)
  217. if err != nil {
  218. return err
  219. }
  220. if cfg.Network == "all" {
  221. err = errors.New("No network provided.")
  222. return err
  223. }
  224. if cfg.Server.GRPCAddress == "" {
  225. err = errors.New("No server address provided.")
  226. return err
  227. }
  228. err = command.Join(cfg, pvtKey)
  229. return err
  230. },
  231. },
  232. {
  233. Name: "leave",
  234. Usage: "Leave a Netmaker network.",
  235. Flags: cliFlags,
  236. // the action, or code that will be executed when
  237. // we execute our `ns` command
  238. Action: func(c *cli.Context) error {
  239. cfg, _, err := config.GetCLIConfig(c)
  240. if err != nil {
  241. return err
  242. }
  243. err = command.Leave(cfg)
  244. return err
  245. },
  246. },
  247. {
  248. Name: "checkin",
  249. Usage: "Checks for local changes and then checks into the specified Netmaker network to ask about remote changes.",
  250. Flags: cliFlags,
  251. // the action, or code that will be executed when
  252. // we execute our `ns` command
  253. Action: func(c *cli.Context) error {
  254. cfg, _, err := config.GetCLIConfig(c)
  255. if err != nil {
  256. return err
  257. }
  258. err = command.CheckIn(cfg)
  259. return err
  260. },
  261. },
  262. {
  263. Name: "push",
  264. Usage: "Push configuration changes to server.",
  265. Flags: cliFlags,
  266. // the action, or code that will be executed when
  267. // we execute our `ns` command
  268. Action: func(c *cli.Context) error {
  269. cfg, _, err := config.GetCLIConfig(c)
  270. if err != nil {
  271. return err
  272. }
  273. err = command.Push(cfg)
  274. return err
  275. },
  276. },
  277. {
  278. Name: "pull",
  279. Usage: "Pull latest configuration and peers from server.",
  280. Flags: cliFlags,
  281. // the action, or code that will be executed when
  282. // we execute our `ns` command
  283. Action: func(c *cli.Context) error {
  284. cfg, _, err := config.GetCLIConfig(c)
  285. if err != nil {
  286. return err
  287. }
  288. err = command.Pull(cfg)
  289. return err
  290. },
  291. },
  292. {
  293. Name: "list",
  294. Usage: "Get list of networks.",
  295. Flags: cliFlags,
  296. // the action, or code that will be executed when
  297. // we execute our `ns` command
  298. Action: func(c *cli.Context) error {
  299. cfg, _, err := config.GetCLIConfig(c)
  300. if err != nil {
  301. return err
  302. }
  303. err = command.List(cfg)
  304. return err
  305. },
  306. },
  307. {
  308. Name: "uninstall",
  309. Usage: "Uninstall the netclient system service.",
  310. Flags: cliFlags,
  311. // the action, or code that will be executed when
  312. // we execute our `ns` command
  313. Action: func(c *cli.Context) error {
  314. err := command.Uninstall()
  315. return err
  316. },
  317. },
  318. }
  319. setGarbageCollection()
  320. if ncutils.IsWindows() {
  321. ncwindows.InitWindows()
  322. } else {
  323. // start our application
  324. out, err := ncutils.RunCmd("id -u", true)
  325. if err != nil {
  326. log.Fatal(out, err)
  327. }
  328. id, err := strconv.Atoi(string(out[:len(out)-1]))
  329. if err != nil {
  330. log.Fatal(err)
  331. }
  332. if id != 0 {
  333. log.Fatal("This program must be run with elevated privileges (sudo). This program installs a SystemD service and configures WireGuard and networking rules. Please re-run with sudo/root.")
  334. }
  335. _, err = exec.LookPath("wg")
  336. uspace := ncutils.GetWireGuard()
  337. if err != nil {
  338. if uspace == "wg" {
  339. log.Println(err)
  340. log.Fatal("WireGuard not installed. Please install WireGuard (wireguard-tools) and try again.")
  341. }
  342. ncutils.PrintLog("Running with userspace wireguard: "+uspace, 0)
  343. } else if uspace != "wg" {
  344. log.Println("running userspace WireGuard with " + uspace)
  345. }
  346. }
  347. if !ncutils.IsKernel() {
  348. if !local.IsWGInstalled() {
  349. log.Fatal("Please install WireGuard before using Gravitl Netclient. https://download.wireguard.com")
  350. }
  351. }
  352. if len(os.Args) == 1 && ncutils.IsWindows() {
  353. c := make(chan os.Signal)
  354. signal.Notify(c, os.Interrupt, syscall.SIGTERM)
  355. go func() {
  356. <-c
  357. log.Println("closing Gravitl Netclient")
  358. os.Exit(0)
  359. }()
  360. command.RunUserspaceDaemon()
  361. } else {
  362. err := app.Run(os.Args)
  363. if err != nil {
  364. log.Fatal(err)
  365. }
  366. }
  367. }
  368. func setGarbageCollection() {
  369. _, gcset := os.LookupEnv("GOGC")
  370. if !gcset {
  371. debug.SetGCPercent(ncutils.DEFAULT_GC_PERCENT)
  372. }
  373. }