config.go 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333
  1. package config
  2. import (
  3. //"github.com/davecgh/go-spew/spew"
  4. "encoding/base64"
  5. "encoding/json"
  6. "errors"
  7. "fmt"
  8. "log"
  9. "os"
  10. "github.com/gravitl/netmaker/models"
  11. "github.com/gravitl/netmaker/netclient/ncutils"
  12. "github.com/urfave/cli/v2"
  13. "gopkg.in/yaml.v3"
  14. )
  15. // GlobalConfig - struct for handling IntClients currently
  16. type GlobalConfig struct {
  17. GRPCWireGuard string `yaml:"grpcwg"`
  18. Client models.IntClient
  19. }
  20. // ClientConfig - struct for dealing with client configuration
  21. type ClientConfig struct {
  22. Server ServerConfig `yaml:"server"`
  23. Node models.Node `yaml:"node"`
  24. NetworkSettings models.Network `yaml:"networksettings"`
  25. Network string `yaml:"network"`
  26. Daemon string `yaml:"daemon"`
  27. OperatingSystem string `yaml:"operatingsystem"`
  28. DebugOn bool `yaml:"debugon"`
  29. }
  30. // ServerConfig - struct for dealing with the server information for a netclient
  31. type ServerConfig struct {
  32. CoreDNSAddr string `yaml:"corednsaddr"`
  33. GRPCAddress string `yaml:"grpcaddress"`
  34. APIAddress string `yaml:"apiaddress"`
  35. AccessKey string `yaml:"accesskey"`
  36. GRPCSSL string `yaml:"grpcssl"`
  37. GRPCWireGuard string `yaml:"grpcwg"`
  38. CheckinInterval string `yaml:"checkininterval"`
  39. }
  40. // Write - writes the config of a client to disk
  41. func Write(config *ClientConfig, network string) error {
  42. if network == "" {
  43. err := errors.New("no network provided - exiting")
  44. return err
  45. }
  46. _, err := os.Stat(ncutils.GetNetclientPath() + "/config")
  47. if os.IsNotExist(err) {
  48. os.MkdirAll(ncutils.GetNetclientPath()+"/config", 0700)
  49. } else if err != nil {
  50. return err
  51. }
  52. home := ncutils.GetNetclientPathSpecific()
  53. file := fmt.Sprintf(home + "netconfig-" + network)
  54. f, err := os.OpenFile(file, os.O_CREATE|os.O_WRONLY|os.O_TRUNC, os.ModePerm)
  55. if err != nil {
  56. return err
  57. }
  58. defer f.Close()
  59. err = yaml.NewEncoder(f).Encode(config)
  60. if err != nil {
  61. return err
  62. }
  63. return err
  64. }
  65. // ClientConfig.ReadConfig - used to read config from client disk into memory
  66. func (config *ClientConfig) ReadConfig() {
  67. nofile := false
  68. //home, err := homedir.Dir()
  69. home := ncutils.GetNetclientPathSpecific()
  70. file := fmt.Sprintf(home + "netconfig-" + config.Network)
  71. //f, err := os.Open(file)
  72. f, err := os.OpenFile(file, os.O_RDONLY, 0600)
  73. if err != nil {
  74. fmt.Println("trouble opening file")
  75. fmt.Println(err)
  76. nofile = true
  77. //fmt.Println("Could not access " + home + "/.netconfig, proceeding...")
  78. }
  79. defer f.Close()
  80. //var cfg ClientConfig
  81. if !nofile {
  82. decoder := yaml.NewDecoder(f)
  83. err = decoder.Decode(&config)
  84. if err != nil {
  85. fmt.Println("no config or invalid")
  86. fmt.Println(err)
  87. log.Fatal(err)
  88. }
  89. }
  90. }
  91. // ModConfig - overwrites the node inside client config on disk
  92. func ModConfig(node *models.Node) error {
  93. network := node.Network
  94. if network == "" {
  95. return errors.New("no network provided")
  96. }
  97. var modconfig ClientConfig
  98. var err error
  99. if FileExists(ncutils.GetNetclientPathSpecific() + "netconfig-" + network) {
  100. useconfig, err := ReadConfig(network)
  101. if err != nil {
  102. return err
  103. }
  104. modconfig = *useconfig
  105. }
  106. modconfig.Node = (*node)
  107. modconfig.NetworkSettings = node.NetworkSettings
  108. err = Write(&modconfig, network)
  109. return err
  110. }
  111. // ModConfig - overwrites the node inside client config on disk
  112. func SaveBackup(network string) error {
  113. var configPath = ncutils.GetNetclientPathSpecific() + "netconfig-" + network
  114. var backupPath = ncutils.GetNetclientPathSpecific() + "backup.netconfig-" + network
  115. if FileExists(configPath) {
  116. input, err := os.ReadFile(configPath)
  117. if err != nil {
  118. ncutils.Log("failed to read " + configPath + " to make a backup")
  119. return err
  120. }
  121. if err = os.WriteFile(backupPath, input, 0600); err != nil {
  122. ncutils.Log("failed to copy backup to " + backupPath)
  123. return err
  124. }
  125. }
  126. return nil
  127. }
  128. // ReplaceWithBackup - replaces netconfig file with backup
  129. func ReplaceWithBackup(network string) error {
  130. var backupPath = ncutils.GetNetclientPathSpecific() + "backup.netconfig-" + network
  131. var configPath = ncutils.GetNetclientPathSpecific() + "netconfig-" + network
  132. if FileExists(backupPath) {
  133. input, err := os.ReadFile(backupPath)
  134. if err != nil {
  135. ncutils.Log("failed to read file " + backupPath + " to backup network: " + network)
  136. return err
  137. }
  138. if err = os.WriteFile(configPath, input, 0600); err != nil {
  139. ncutils.Log("failed backup " + backupPath + " to " + configPath)
  140. return err
  141. }
  142. }
  143. ncutils.Log("used backup file for network: " + network)
  144. return nil
  145. }
  146. // GetCLIConfig - gets the cli flags as a config
  147. func GetCLIConfig(c *cli.Context) (ClientConfig, string, error) {
  148. var cfg ClientConfig
  149. if c.String("token") != "" {
  150. tokenbytes, err := base64.StdEncoding.DecodeString(c.String("token"))
  151. if err != nil {
  152. log.Println("error decoding token")
  153. return cfg, "", err
  154. }
  155. var accesstoken models.AccessToken
  156. if err := json.Unmarshal(tokenbytes, &accesstoken); err != nil {
  157. log.Println("error converting token json to object", tokenbytes)
  158. return cfg, "", err
  159. }
  160. if accesstoken.ServerConfig.APIConnString != "" {
  161. cfg.Server.APIAddress = accesstoken.ServerConfig.APIConnString
  162. } else {
  163. cfg.Server.APIAddress = accesstoken.ServerConfig.APIHost
  164. if accesstoken.ServerConfig.APIPort != "" {
  165. cfg.Server.APIAddress = cfg.Server.APIAddress + ":" + accesstoken.ServerConfig.APIPort
  166. }
  167. }
  168. if accesstoken.ServerConfig.GRPCConnString != "" {
  169. cfg.Server.GRPCAddress = accesstoken.ServerConfig.GRPCConnString
  170. } else {
  171. cfg.Server.GRPCAddress = accesstoken.ServerConfig.GRPCHost
  172. if accesstoken.ServerConfig.GRPCPort != "" {
  173. cfg.Server.GRPCAddress = cfg.Server.GRPCAddress + ":" + accesstoken.ServerConfig.GRPCPort
  174. }
  175. }
  176. cfg.Network = accesstoken.ClientConfig.Network
  177. cfg.Node.Network = accesstoken.ClientConfig.Network
  178. cfg.Server.AccessKey = accesstoken.ClientConfig.Key
  179. cfg.Node.LocalRange = accesstoken.ClientConfig.LocalRange
  180. cfg.Server.GRPCSSL = accesstoken.ServerConfig.GRPCSSL
  181. cfg.Server.CheckinInterval = accesstoken.ServerConfig.CheckinInterval
  182. cfg.Server.GRPCWireGuard = accesstoken.WG.GRPCWireGuard
  183. cfg.Server.CoreDNSAddr = accesstoken.ServerConfig.CoreDNSAddr
  184. if c.String("grpcserver") != "" {
  185. cfg.Server.GRPCAddress = c.String("grpcserver")
  186. }
  187. if c.String("apiserver") != "" {
  188. cfg.Server.APIAddress = c.String("apiserver")
  189. }
  190. if c.String("key") != "" {
  191. cfg.Server.AccessKey = c.String("key")
  192. }
  193. if c.String("network") != "all" {
  194. cfg.Network = c.String("network")
  195. cfg.Node.Network = c.String("network")
  196. }
  197. if c.String("localrange") != "" {
  198. cfg.Node.LocalRange = c.String("localrange")
  199. }
  200. if c.String("grpcssl") != "" {
  201. cfg.Server.GRPCSSL = c.String("grpcssl")
  202. }
  203. if c.String("corednsaddr") != "" {
  204. cfg.Server.CoreDNSAddr = c.String("corednsaddr")
  205. }
  206. if c.String("grpcwg") != "" {
  207. cfg.Server.GRPCWireGuard = c.String("grpcwg")
  208. }
  209. if c.String("checkininterval") != "" {
  210. cfg.Server.CheckinInterval = c.String("checkininterval")
  211. }
  212. } else {
  213. cfg.Server.GRPCAddress = c.String("grpcserver")
  214. cfg.Server.APIAddress = c.String("apiserver")
  215. cfg.Server.AccessKey = c.String("key")
  216. cfg.Network = c.String("network")
  217. cfg.Node.Network = c.String("network")
  218. cfg.Node.LocalRange = c.String("localrange")
  219. cfg.Server.GRPCWireGuard = c.String("grpcwg")
  220. cfg.Server.GRPCSSL = c.String("grpcssl")
  221. cfg.Server.CoreDNSAddr = c.String("corednsaddr")
  222. cfg.Server.CheckinInterval = c.String("checkininterval")
  223. }
  224. cfg.Node.Name = c.String("name")
  225. cfg.Node.Interface = c.String("interface")
  226. cfg.Node.Password = c.String("password")
  227. cfg.Node.MacAddress = c.String("macaddress")
  228. cfg.Node.LocalAddress = c.String("localaddress")
  229. cfg.Node.Address = c.String("address")
  230. cfg.Node.Address6 = c.String("addressIPV6")
  231. cfg.Node.Roaming = c.String("roaming")
  232. cfg.Node.DNSOn = c.String("dnson")
  233. cfg.Node.IsLocal = c.String("islocal")
  234. cfg.Node.IsStatic = c.String("isstatic")
  235. cfg.Node.IsDualStack = c.String("isdualstack")
  236. cfg.Node.PostUp = c.String("postup")
  237. cfg.Node.PostDown = c.String("postdown")
  238. cfg.Node.ListenPort = int32(c.Int("port"))
  239. cfg.Node.PersistentKeepalive = int32(c.Int("keepalive"))
  240. cfg.Node.PublicKey = c.String("publickey")
  241. privateKey := c.String("privatekey")
  242. cfg.Node.Endpoint = c.String("endpoint")
  243. cfg.Node.IPForwarding = c.String("ipforwarding")
  244. cfg.OperatingSystem = c.String("operatingsystem")
  245. cfg.Daemon = c.String("daemon")
  246. cfg.Node.UDPHolePunch = c.String("udpholepunch")
  247. cfg.Node.MTU = int32(c.Int("mtu"))
  248. if cfg.Server.CheckinInterval == "" {
  249. cfg.Server.CheckinInterval = "15"
  250. }
  251. return cfg, privateKey, nil
  252. }
  253. // ReadConfig - reads a config of a client from disk for specified network
  254. func ReadConfig(network string) (*ClientConfig, error) {
  255. if network == "" {
  256. err := errors.New("no network provided - exiting")
  257. return nil, err
  258. }
  259. nofile := false
  260. home := ncutils.GetNetclientPathSpecific()
  261. file := fmt.Sprintf(home + "netconfig-" + network)
  262. f, err := os.Open(file)
  263. if err != nil {
  264. if err = ReplaceWithBackup(network); err != nil {
  265. nofile = true
  266. }
  267. f, err = os.Open(file)
  268. if err != nil {
  269. nofile = true
  270. }
  271. }
  272. defer f.Close()
  273. var cfg ClientConfig
  274. if !nofile {
  275. decoder := yaml.NewDecoder(f)
  276. err = decoder.Decode(&cfg)
  277. if err != nil {
  278. fmt.Println("trouble decoding file")
  279. return nil, err
  280. }
  281. }
  282. return &cfg, err
  283. }
  284. // FileExists - checks if a file exists on disk
  285. func FileExists(f string) bool {
  286. info, err := os.Stat(f)
  287. if os.IsNotExist(err) {
  288. return false
  289. }
  290. return !info.IsDir()
  291. }
  292. // GetNode - parses a network specified client config for node data
  293. func GetNode(network string) models.Node {
  294. modcfg, err := ReadConfig(network)
  295. if err != nil {
  296. log.Fatalf("Error: %v", err)
  297. }
  298. var node models.Node
  299. node.Fill(&modcfg.Node)
  300. return node
  301. }