main.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393
  1. //go:generate goversioninfo -icon=windowsdata/resource/netmaker.ico -manifest=netclient.exe.manifest.xml -64=true -o=netclient.syso
  2. package main
  3. import (
  4. "errors"
  5. "log"
  6. "os"
  7. "os/exec"
  8. "os/signal"
  9. "runtime/debug"
  10. "strconv"
  11. "syscall"
  12. "github.com/gravitl/netmaker/netclient/command"
  13. "github.com/gravitl/netmaker/netclient/config"
  14. "github.com/gravitl/netmaker/netclient/local"
  15. "github.com/gravitl/netmaker/netclient/ncutils"
  16. "github.com/gravitl/netmaker/netclient/ncwindows"
  17. "github.com/urfave/cli/v2"
  18. )
  19. func main() {
  20. app := cli.NewApp()
  21. app.Name = "Netclient CLI"
  22. app.Usage = "Netmaker's netclient agent and CLI. Used to perform interactions with Netmaker server and set local WireGuard config."
  23. app.Version = "v0.8.4"
  24. hostname, err := os.Hostname()
  25. if err != nil {
  26. hostname = ""
  27. }
  28. hostname, err := os.Hostname()
  29. if err != nil {
  30. hostname = ""
  31. }
  32. cliFlags := []cli.Flag{
  33. &cli.StringFlag{
  34. Name: "network",
  35. Aliases: []string{"n"},
  36. EnvVars: []string{"NETCLIENT_NETWORK"},
  37. Value: "all",
  38. Usage: "Network to perform specified action against.",
  39. },
  40. &cli.StringFlag{
  41. Name: "password",
  42. Aliases: []string{"p"},
  43. EnvVars: []string{"NETCLIENT_PASSWORD"},
  44. Value: "",
  45. Usage: "Password for authenticating with netmaker.",
  46. },
  47. &cli.StringFlag{
  48. Name: "endpoint",
  49. Aliases: []string{"e"},
  50. EnvVars: []string{"NETCLIENT_ENDPOINT"},
  51. Value: "",
  52. Usage: "Reachable (usually public) address for WireGuard (not the private WG address).",
  53. },
  54. &cli.StringFlag{
  55. Name: "macaddress",
  56. Aliases: []string{"m"},
  57. EnvVars: []string{"NETCLIENT_MACADDRESS"},
  58. Value: "",
  59. Usage: "Mac Address for this machine. Used as a unique identifier within Netmaker network.",
  60. },
  61. &cli.StringFlag{
  62. Name: "publickey",
  63. Aliases: []string{"pubkey"},
  64. EnvVars: []string{"NETCLIENT_PUBLICKEY"},
  65. Value: "",
  66. Usage: "Public Key for WireGuard Interface.",
  67. },
  68. &cli.StringFlag{
  69. Name: "privatekey",
  70. Aliases: []string{"privkey"},
  71. EnvVars: []string{"NETCLIENT_PRIVATEKEY"},
  72. Value: "",
  73. Usage: "Private Key for WireGuard Interface.",
  74. },
  75. &cli.StringFlag{
  76. Name: "port",
  77. EnvVars: []string{"NETCLIENT_PORT"},
  78. Value: "",
  79. Usage: "Port for WireGuard Interface.",
  80. },
  81. &cli.IntFlag{
  82. Name: "keepalive",
  83. EnvVars: []string{"NETCLIENT_KEEPALIVE"},
  84. Value: 0,
  85. Usage: "Default PersistentKeepAlive for Peers in WireGuard Interface.",
  86. },
  87. &cli.StringFlag{
  88. Name: "operatingsystem",
  89. Aliases: []string{"os"},
  90. EnvVars: []string{"NETCLIENT_OS"},
  91. Value: "",
  92. Usage: "Identifiable name for machine within Netmaker network.",
  93. },
  94. &cli.StringFlag{
  95. Name: "name",
  96. EnvVars: []string{"NETCLIENT_NAME"},
  97. Value: hostname,
  98. Usage: "Identifiable name for machine within Netmaker network.",
  99. },
  100. &cli.StringFlag{
  101. Name: "localaddress",
  102. EnvVars: []string{"NETCLIENT_LOCALADDRESS"},
  103. Value: "",
  104. Usage: "Local address for machine. Can be used in place of Endpoint for machines on the same LAN.",
  105. },
  106. &cli.StringFlag{
  107. Name: "address",
  108. Aliases: []string{"a"},
  109. EnvVars: []string{"NETCLIENT_ADDRESS"},
  110. Value: "",
  111. Usage: "WireGuard address for machine within Netmaker network.",
  112. },
  113. &cli.StringFlag{
  114. Name: "addressIPv6",
  115. Aliases: []string{"a6"},
  116. EnvVars: []string{"NETCLIENT_ADDRESSIPV6"},
  117. Value: "",
  118. Usage: "WireGuard address for machine within Netmaker network.",
  119. },
  120. &cli.StringFlag{
  121. Name: "interface",
  122. Aliases: []string{"i"},
  123. EnvVars: []string{"NETCLIENT_INTERFACE"},
  124. Value: "",
  125. Usage: "WireGuard local network interface name.",
  126. },
  127. &cli.StringFlag{
  128. Name: "apiserver",
  129. EnvVars: []string{"NETCLIENT_API_SERVER"},
  130. Value: "",
  131. Usage: "Address + GRPC Port (e.g. 1.2.3.4:50051) of Netmaker server.",
  132. },
  133. &cli.StringFlag{
  134. Name: "grpcserver",
  135. EnvVars: []string{"NETCLIENT_GRPC_SERVER"},
  136. Value: "",
  137. Usage: "Address + API Port (e.g. 1.2.3.4:8081) of Netmaker server.",
  138. },
  139. &cli.StringFlag{
  140. Name: "key",
  141. Aliases: []string{"k"},
  142. EnvVars: []string{"NETCLIENT_ACCESSKEY"},
  143. Value: "",
  144. Usage: "Access Key for signing up machine with Netmaker server during initial 'add'.",
  145. },
  146. &cli.StringFlag{
  147. Name: "token",
  148. Aliases: []string{"t"},
  149. EnvVars: []string{"NETCLIENT_ACCESSTOKEN"},
  150. Value: "",
  151. Usage: "Access Token for signing up machine with Netmaker server during initial 'add'.",
  152. },
  153. &cli.StringFlag{
  154. Name: "localrange",
  155. EnvVars: []string{"NETCLIENT_LOCALRANGE"},
  156. Value: "",
  157. Usage: "Local Range if network is local, for instance 192.168.1.0/24.",
  158. },
  159. &cli.StringFlag{
  160. Name: "dnson",
  161. EnvVars: []string{"NETCLIENT_DNS"},
  162. Value: "yes",
  163. Usage: "Sets private dns if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  164. },
  165. &cli.StringFlag{
  166. Name: "islocal",
  167. EnvVars: []string{"NETCLIENT_IS_LOCAL"},
  168. Value: "",
  169. Usage: "Sets endpoint to local address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  170. },
  171. &cli.StringFlag{
  172. Name: "isdualstack",
  173. EnvVars: []string{"NETCLIENT_IS_DUALSTACK"},
  174. Value: "",
  175. Usage: "Sets ipv6 address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  176. },
  177. &cli.StringFlag{
  178. Name: "udpholepunch",
  179. EnvVars: []string{"NETCLIENT_UDP_HOLEPUNCH"},
  180. Value: "",
  181. Usage: "Turns on udp holepunching if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  182. },
  183. &cli.StringFlag{
  184. Name: "ipforwarding",
  185. EnvVars: []string{"NETCLIENT_IPFORWARDING"},
  186. Value: "on",
  187. Usage: "Sets ip forwarding on if 'on'. Ignores if 'off'. On by default.",
  188. },
  189. &cli.StringFlag{
  190. Name: "postup",
  191. EnvVars: []string{"NETCLIENT_POSTUP"},
  192. Value: "",
  193. Usage: "Sets PostUp command for WireGuard.",
  194. },
  195. &cli.StringFlag{
  196. Name: "postdown",
  197. EnvVars: []string{"NETCLIENT_POSTDOWN"},
  198. Value: "",
  199. Usage: "Sets PostDown command for WireGuard.",
  200. },
  201. &cli.StringFlag{
  202. Name: "daemon",
  203. EnvVars: []string{"NETCLIENT_DAEMON"},
  204. Value: "on",
  205. Usage: "Installs daemon if 'on'. Ignores if 'off'. On by default.",
  206. },
  207. &cli.StringFlag{
  208. Name: "roaming",
  209. EnvVars: []string{"NETCLIENT_ROAMING"},
  210. Value: "on",
  211. Usage: "Checks for IP changes if 'on'. Ignores if 'off'. On by default.",
  212. },
  213. }
  214. app.Commands = []*cli.Command{
  215. {
  216. Name: "join",
  217. Usage: "Join a Netmaker network.",
  218. Flags: cliFlags,
  219. Action: func(c *cli.Context) error {
  220. cfg, pvtKey, err := config.GetCLIConfig(c)
  221. if err != nil {
  222. return err
  223. }
  224. if cfg.Network == "all" {
  225. err = errors.New("No network provided.")
  226. return err
  227. }
  228. if cfg.Server.GRPCAddress == "" {
  229. err = errors.New("No server address provided.")
  230. return err
  231. }
  232. err = command.Join(cfg, pvtKey)
  233. return err
  234. },
  235. },
  236. {
  237. Name: "leave",
  238. Usage: "Leave a Netmaker network.",
  239. Flags: cliFlags,
  240. // the action, or code that will be executed when
  241. // we execute our `ns` command
  242. Action: func(c *cli.Context) error {
  243. cfg, _, err := config.GetCLIConfig(c)
  244. if err != nil {
  245. return err
  246. }
  247. err = command.Leave(cfg)
  248. return err
  249. },
  250. },
  251. {
  252. Name: "checkin",
  253. Usage: "Checks for local changes and then checks into the specified Netmaker network to ask about remote changes.",
  254. Flags: cliFlags,
  255. // the action, or code that will be executed when
  256. // we execute our `ns` command
  257. Action: func(c *cli.Context) error {
  258. cfg, _, err := config.GetCLIConfig(c)
  259. if err != nil {
  260. return err
  261. }
  262. err = command.CheckIn(cfg)
  263. return err
  264. },
  265. },
  266. {
  267. Name: "push",
  268. Usage: "Push configuration changes to server.",
  269. Flags: cliFlags,
  270. // the action, or code that will be executed when
  271. // we execute our `ns` command
  272. Action: func(c *cli.Context) error {
  273. cfg, _, err := config.GetCLIConfig(c)
  274. if err != nil {
  275. return err
  276. }
  277. err = command.Push(cfg)
  278. return err
  279. },
  280. },
  281. {
  282. Name: "pull",
  283. Usage: "Pull latest configuration and peers from server.",
  284. Flags: cliFlags,
  285. // the action, or code that will be executed when
  286. // we execute our `ns` command
  287. Action: func(c *cli.Context) error {
  288. cfg, _, err := config.GetCLIConfig(c)
  289. if err != nil {
  290. return err
  291. }
  292. err = command.Pull(cfg)
  293. return err
  294. },
  295. },
  296. {
  297. Name: "list",
  298. Usage: "Get list of networks.",
  299. Flags: cliFlags,
  300. // the action, or code that will be executed when
  301. // we execute our `ns` command
  302. Action: func(c *cli.Context) error {
  303. cfg, _, err := config.GetCLIConfig(c)
  304. if err != nil {
  305. return err
  306. }
  307. err = command.List(cfg)
  308. return err
  309. },
  310. },
  311. {
  312. Name: "uninstall",
  313. Usage: "Uninstall the netclient system service.",
  314. Flags: cliFlags,
  315. // the action, or code that will be executed when
  316. // we execute our `ns` command
  317. Action: func(c *cli.Context) error {
  318. err := command.Uninstall()
  319. return err
  320. },
  321. },
  322. }
  323. setGarbageCollection()
  324. if ncutils.IsWindows() {
  325. ncwindows.InitWindows()
  326. } else {
  327. // start our application
  328. out, err := ncutils.RunCmd("id -u", true)
  329. if err != nil {
  330. log.Fatal(out, err)
  331. }
  332. id, err := strconv.Atoi(string(out[:len(out)-1]))
  333. if err != nil {
  334. log.Fatal(err)
  335. }
  336. if id != 0 {
  337. log.Fatal("This program must be run with elevated privileges (sudo). This program installs a SystemD service and configures WireGuard and networking rules. Please re-run with sudo/root.")
  338. }
  339. _, err = exec.LookPath("wg")
  340. uspace := ncutils.GetWireGuard()
  341. if err != nil {
  342. if uspace == "wg" {
  343. log.Println(err)
  344. log.Fatal("WireGuard not installed. Please install WireGuard (wireguard-tools) and try again.")
  345. }
  346. ncutils.PrintLog("Running with userspace wireguard: "+uspace, 0)
  347. } else if uspace != "wg" {
  348. log.Println("running userspace WireGuard with " + uspace)
  349. }
  350. }
  351. if !ncutils.IsKernel() {
  352. if !local.IsWGInstalled() {
  353. log.Fatal("Please install WireGuard before using Gravitl Netclient. https://download.wireguard.com")
  354. }
  355. }
  356. if len(os.Args) == 1 && ncutils.IsWindows() {
  357. c := make(chan os.Signal)
  358. signal.Notify(c, os.Interrupt, syscall.SIGTERM)
  359. go func() {
  360. <-c
  361. log.Println("closing Gravitl Netclient")
  362. os.Exit(0)
  363. }()
  364. command.RunUserspaceDaemon()
  365. } else {
  366. err := app.Run(os.Args)
  367. if err != nil {
  368. log.Fatal(err)
  369. }
  370. }
  371. }
  372. func setGarbageCollection() {
  373. _, gcset := os.LookupEnv("GOGC")
  374. if !gcset {
  375. debug.SetGCPercent(ncutils.DEFAULT_GC_PERCENT)
  376. }
  377. }