123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356 |
- package functions
- import (
- "context"
- "encoding/json"
- "errors"
- "fmt"
- "io/ioutil"
- "log"
- "net"
- "os"
- "os/exec"
- "strings"
- nodepb "github.com/gravitl/netmaker/grpc"
- "github.com/gravitl/netmaker/models"
- "github.com/gravitl/netmaker/netclient/auth"
- "github.com/gravitl/netmaker/netclient/config"
- "github.com/gravitl/netmaker/netclient/daemon"
- "github.com/gravitl/netmaker/netclient/ncutils"
- "github.com/gravitl/netmaker/netclient/wireguard"
- "golang.zx2c4.com/wireguard/wgctrl"
- "google.golang.org/grpc"
- "google.golang.org/grpc/metadata"
- )
- var (
- wcclient nodepb.NodeServiceClient
- )
- func ListPorts() error {
- wgclient, err := wgctrl.New()
- if err != nil {
- return err
- }
- devices, err := wgclient.Devices()
- if err != nil {
- return err
- }
- fmt.Println("Here are your ports:")
- for _, i := range devices {
- fmt.Println(i.ListenPort)
- }
- return err
- }
- func getPrivateAddr() (string, error) {
- var local string
- conn, err := net.Dial("udp", "8.8.8.8:80")
- if err != nil {
- log.Fatal(err)
- }
- defer conn.Close()
- localAddr := conn.LocalAddr().(*net.UDPAddr)
- localIP := localAddr.IP
- local = localIP.String()
- if local == "" {
- err = errors.New("could not find local ip")
- }
- return local, err
- }
- func needInterfaceUpdate(ctx context.Context, mac string, network string, iface string) (bool, string, error) {
- var header metadata.MD
- req := &nodepb.Object{
- Data: mac + "###" + network,
- Type: nodepb.STRING_TYPE,
- }
- readres, err := wcclient.ReadNode(ctx, req, grpc.Header(&header))
- if err != nil {
- return false, "", err
- }
- var resNode models.Node
- if err := json.Unmarshal([]byte(readres.Data), &resNode); err != nil {
- return false, iface, err
- }
- oldiface := resNode.Interface
- return iface != oldiface, oldiface, err
- }
- func GetNode(network string) models.Node {
- modcfg, err := config.ReadConfig(network)
- if err != nil {
- log.Fatalf("Error: %v", err)
- }
- return modcfg.Node
- }
- func Uninstall() error {
- networks, err := GetNetworks()
- if err != nil {
- ncutils.PrintLog("unable to retrieve networks: "+err.Error(), 1)
- ncutils.PrintLog("continuing uninstall without leaving networks", 1)
- } else {
- for _, network := range networks {
- err = LeaveNetwork(network)
- if err != nil {
- ncutils.PrintLog("Encounter issue leaving network "+network+": "+err.Error(), 1)
- }
- }
- }
- // clean up OS specific stuff
- if ncutils.IsWindows() {
- daemon.CleanupWindows()
- } else if ncutils.IsMac() {
- daemon.CleanupMac()
- }
- return err
- }
- func LeaveNetwork(network string) error {
- //need to implement checkin on server side
- cfg, err := config.ReadConfig(network)
- if err != nil {
- return err
- }
- servercfg := cfg.Server
- node := cfg.Node
- var wcclient nodepb.NodeServiceClient
- conn, err := grpc.Dial(cfg.Server.GRPCAddress,
- ncutils.GRPCRequestOpts(cfg.Server.GRPCSSL))
- if err != nil {
- log.Printf("Unable to establish client connection to "+servercfg.GRPCAddress+": %v", err)
- } else {
- wcclient = nodepb.NewNodeServiceClient(conn)
- ctx := context.Background()
- ctx, err = auth.SetJWT(wcclient, network)
- if err != nil {
- log.Printf("Failed to authenticate: %v", err)
- } else {
- if !ncutils.IsKernel() {
- //wireguard.RemoveConf(node.Interface, true)
- //ncutils.PrintLog("removed network tunnel "+node.Interface, 1)
- }
- node.SetID()
- var header metadata.MD
- _, err = wcclient.DeleteNode(
- ctx,
- &nodepb.Object{
- Data: node.ID,
- Type: nodepb.STRING_TYPE,
- },
- grpc.Header(&header),
- )
- if err != nil {
- ncutils.PrintLog("encountered error deleting node: "+err.Error(), 1)
- } else {
- ncutils.PrintLog("removed machine from "+node.Network+" network on remote server", 1)
- }
- }
- }
- return RemoveLocalInstance(cfg, network)
- }
- func RemoveLocalInstance(cfg *config.ClientConfig, networkName string) error {
- err := WipeLocal(networkName)
- if err != nil {
- ncutils.PrintLog("unable to wipe local config", 1)
- } else {
- ncutils.PrintLog("removed "+networkName+" network locally", 1)
- }
- if cfg.Daemon != "off" {
- if ncutils.IsWindows() {
- // TODO: Remove job?
- } else if ncutils.IsMac() {
- //TODO: Delete mac daemon
- } else {
- err = daemon.RemoveSystemDServices(networkName)
- }
- }
- return err
- }
- func DeleteInterface(ifacename string, postdown string) error {
- var err error
- if !ncutils.IsKernel() {
- err = wireguard.RemoveConf(ifacename, true)
- } else {
- ipExec, errN := exec.LookPath("ip")
- err = errN
- if err != nil {
- ncutils.PrintLog(err.Error(), 1)
- }
- _, err = ncutils.RunCmd(ipExec+" link del "+ifacename, false)
- if postdown != "" {
- runcmds := strings.Split(postdown, "; ")
- err = ncutils.RunCmds(runcmds, true)
- }
- }
- return err
- }
- func List() error {
- networks, err := GetNetworks()
- if err != nil {
- return err
- }
- for _, network := range networks {
- cfg, err := config.ReadConfig(network)
- if err == nil {
- jsoncfg, _ := json.Marshal(
- map[string]string{
- "Name": cfg.Node.Name,
- "Interface": cfg.Node.Interface,
- "PrivateIPv4": cfg.Node.Address,
- "PrivateIPv6": cfg.Node.Address6,
- "PublicEndpoint": cfg.Node.Endpoint,
- })
- fmt.Println(network + ": " + string(jsoncfg))
- } else {
- ncutils.PrintLog(network+": Could not retrieve network configuration.", 1)
- }
- }
- return nil
- }
- func GetNetworks() ([]string, error) {
- var networks []string
- files, err := ioutil.ReadDir(ncutils.GetNetclientPath())
- if err != nil {
- return networks, err
- }
- for _, f := range files {
- if strings.Contains(f.Name(), "netconfig-") {
- networkname := stringAfter(f.Name(), "netconfig-")
- networks = append(networks, networkname)
- }
- }
- return networks, err
- }
- func stringAfter(original string, substring string) string {
- position := strings.LastIndex(original, substring)
- if position == -1 {
- return ""
- }
- adjustedPosition := position + len(substring)
- if adjustedPosition >= len(original) {
- return ""
- }
- return original[adjustedPosition:len(original)]
- }
- func WipeLocal(network string) error {
- cfg, err := config.ReadConfig(network)
- if err != nil {
- return err
- }
- nodecfg := cfg.Node
- ifacename := nodecfg.Interface
- if ifacename != "" {
- if !ncutils.IsKernel() {
- if err = wireguard.RemoveConf(ifacename, true); err == nil {
- ncutils.PrintLog("removed WireGuard interface: "+ifacename, 1)
- }
- } else {
- ipExec, err := exec.LookPath("ip")
- if err != nil {
- return err
- }
- out, err := ncutils.RunCmd(ipExec+" link del "+ifacename, false)
- dontprint := strings.Contains(out, "does not exist") || strings.Contains(out, "Cannot find device")
- if err != nil && !dontprint {
- ncutils.PrintLog("error running command: "+ipExec+" link del "+ifacename, 1)
- ncutils.PrintLog(out, 1)
- }
- if nodecfg.PostDown != "" {
- runcmds := strings.Split(nodecfg.PostDown, "; ")
- _ = ncutils.RunCmds(runcmds, false)
- }
- }
- }
- home := ncutils.GetNetclientPathSpecific()
- if ncutils.FileExists(home + "netconfig-" + network) {
- _ = os.Remove(home + "netconfig-" + network)
- }
- if ncutils.FileExists(home + "nettoken-" + network) {
- _ = os.Remove(home + "nettoken-" + network)
- }
- if ncutils.FileExists(home + "secret-" + network) {
- _ = os.Remove(home + "secret-" + network)
- }
- if ncutils.FileExists(home + "wgkey-" + network) {
- _ = os.Remove(home + "wgkey-" + network)
- }
- if ncutils.FileExists(home + "nm-" + network + ".conf") {
- _ = os.Remove(home + "nm-" + network + ".conf")
- }
- return err
- }
- func getLocalIP(node models.Node) string {
- var local string
- ifaces, err := net.Interfaces()
- if err != nil {
- return local
- }
- _, localrange, err := net.ParseCIDR(node.LocalRange)
- if err != nil {
- return local
- }
- found := false
- for _, i := range ifaces {
- if i.Flags&net.FlagUp == 0 {
- continue // interface down
- }
- if i.Flags&net.FlagLoopback != 0 {
- continue // loopback interface
- }
- addrs, err := i.Addrs()
- if err != nil {
- return local
- }
- for _, addr := range addrs {
- var ip net.IP
- switch v := addr.(type) {
- case *net.IPNet:
- if !found {
- ip = v.IP
- local = ip.String()
- if node.IsLocal == "yes" {
- found = localrange.Contains(ip)
- } else {
- found = true
- }
- }
- case *net.IPAddr:
- if !found {
- ip = v.IP
- local = ip.String()
- if node.IsLocal == "yes" {
- found = localrange.Contains(ip)
- } else {
- found = true
- }
- }
- }
- }
- }
- return local
- }
|