main.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390
  1. //go:generate goversioninfo -icon=windowsdata/resource/netmaker.ico -manifest=netclient.exe.manifest.xml -64=true -o=netclient.syso
  2. package main
  3. import (
  4. "errors"
  5. "log"
  6. "os"
  7. "os/exec"
  8. "os/signal"
  9. "runtime/debug"
  10. "strconv"
  11. "strings"
  12. "syscall"
  13. "github.com/gravitl/netmaker/netclient/command"
  14. "github.com/gravitl/netmaker/netclient/config"
  15. "github.com/gravitl/netmaker/netclient/local"
  16. "github.com/gravitl/netmaker/netclient/ncutils"
  17. "github.com/gravitl/netmaker/netclient/ncwindows"
  18. "github.com/urfave/cli/v2"
  19. )
  20. func main() {
  21. app := cli.NewApp()
  22. app.Name = "Netclient CLI"
  23. app.Usage = "Netmaker's netclient agent and CLI. Used to perform interactions with Netmaker server and set local WireGuard config."
  24. app.Version = "v0.8.5"
  25. hostname, err := os.Hostname()
  26. if err != nil {
  27. hostname = ""
  28. }
  29. hostname = strings.Split(hostname, ".")[0]
  30. cliFlags := []cli.Flag{
  31. &cli.StringFlag{
  32. Name: "network",
  33. Aliases: []string{"n"},
  34. EnvVars: []string{"NETCLIENT_NETWORK"},
  35. Value: "all",
  36. Usage: "Network to perform specified action against.",
  37. },
  38. &cli.StringFlag{
  39. Name: "password",
  40. Aliases: []string{"p"},
  41. EnvVars: []string{"NETCLIENT_PASSWORD"},
  42. Value: "",
  43. Usage: "Password for authenticating with netmaker.",
  44. },
  45. &cli.StringFlag{
  46. Name: "endpoint",
  47. Aliases: []string{"e"},
  48. EnvVars: []string{"NETCLIENT_ENDPOINT"},
  49. Value: "",
  50. Usage: "Reachable (usually public) address for WireGuard (not the private WG address).",
  51. },
  52. &cli.StringFlag{
  53. Name: "macaddress",
  54. Aliases: []string{"m"},
  55. EnvVars: []string{"NETCLIENT_MACADDRESS"},
  56. Value: "",
  57. Usage: "Mac Address for this machine. Used as a unique identifier within Netmaker network.",
  58. },
  59. &cli.StringFlag{
  60. Name: "publickey",
  61. Aliases: []string{"pubkey"},
  62. EnvVars: []string{"NETCLIENT_PUBLICKEY"},
  63. Value: "",
  64. Usage: "Public Key for WireGuard Interface.",
  65. },
  66. &cli.StringFlag{
  67. Name: "privatekey",
  68. Aliases: []string{"privkey"},
  69. EnvVars: []string{"NETCLIENT_PRIVATEKEY"},
  70. Value: "",
  71. Usage: "Private Key for WireGuard Interface.",
  72. },
  73. &cli.StringFlag{
  74. Name: "port",
  75. EnvVars: []string{"NETCLIENT_PORT"},
  76. Value: "",
  77. Usage: "Port for WireGuard Interface.",
  78. },
  79. &cli.IntFlag{
  80. Name: "keepalive",
  81. EnvVars: []string{"NETCLIENT_KEEPALIVE"},
  82. Value: 0,
  83. Usage: "Default PersistentKeepAlive for Peers in WireGuard Interface.",
  84. },
  85. &cli.StringFlag{
  86. Name: "operatingsystem",
  87. Aliases: []string{"os"},
  88. EnvVars: []string{"NETCLIENT_OS"},
  89. Value: "",
  90. Usage: "Identifiable name for machine within Netmaker network.",
  91. },
  92. &cli.StringFlag{
  93. Name: "name",
  94. EnvVars: []string{"NETCLIENT_NAME"},
  95. Value: hostname,
  96. Usage: "Identifiable name for machine within Netmaker network.",
  97. },
  98. &cli.StringFlag{
  99. Name: "localaddress",
  100. EnvVars: []string{"NETCLIENT_LOCALADDRESS"},
  101. Value: "",
  102. Usage: "Local address for machine. Can be used in place of Endpoint for machines on the same LAN.",
  103. },
  104. &cli.StringFlag{
  105. Name: "address",
  106. Aliases: []string{"a"},
  107. EnvVars: []string{"NETCLIENT_ADDRESS"},
  108. Value: "",
  109. Usage: "WireGuard address for machine within Netmaker network.",
  110. },
  111. &cli.StringFlag{
  112. Name: "addressIPv6",
  113. Aliases: []string{"a6"},
  114. EnvVars: []string{"NETCLIENT_ADDRESSIPV6"},
  115. Value: "",
  116. Usage: "WireGuard address for machine within Netmaker network.",
  117. },
  118. &cli.StringFlag{
  119. Name: "interface",
  120. Aliases: []string{"i"},
  121. EnvVars: []string{"NETCLIENT_INTERFACE"},
  122. Value: "",
  123. Usage: "WireGuard local network interface name.",
  124. },
  125. &cli.StringFlag{
  126. Name: "apiserver",
  127. EnvVars: []string{"NETCLIENT_API_SERVER"},
  128. Value: "",
  129. Usage: "Address + GRPC Port (e.g. 1.2.3.4:50051) of Netmaker server.",
  130. },
  131. &cli.StringFlag{
  132. Name: "grpcserver",
  133. EnvVars: []string{"NETCLIENT_GRPC_SERVER"},
  134. Value: "",
  135. Usage: "Address + API Port (e.g. 1.2.3.4:8081) of Netmaker server.",
  136. },
  137. &cli.StringFlag{
  138. Name: "key",
  139. Aliases: []string{"k"},
  140. EnvVars: []string{"NETCLIENT_ACCESSKEY"},
  141. Value: "",
  142. Usage: "Access Key for signing up machine with Netmaker server during initial 'add'.",
  143. },
  144. &cli.StringFlag{
  145. Name: "token",
  146. Aliases: []string{"t"},
  147. EnvVars: []string{"NETCLIENT_ACCESSTOKEN"},
  148. Value: "",
  149. Usage: "Access Token for signing up machine with Netmaker server during initial 'add'.",
  150. },
  151. &cli.StringFlag{
  152. Name: "localrange",
  153. EnvVars: []string{"NETCLIENT_LOCALRANGE"},
  154. Value: "",
  155. Usage: "Local Range if network is local, for instance 192.168.1.0/24.",
  156. },
  157. &cli.StringFlag{
  158. Name: "dnson",
  159. EnvVars: []string{"NETCLIENT_DNS"},
  160. Value: "yes",
  161. Usage: "Sets private dns if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  162. },
  163. &cli.StringFlag{
  164. Name: "islocal",
  165. EnvVars: []string{"NETCLIENT_IS_LOCAL"},
  166. Value: "",
  167. Usage: "Sets endpoint to local address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  168. },
  169. &cli.StringFlag{
  170. Name: "isdualstack",
  171. EnvVars: []string{"NETCLIENT_IS_DUALSTACK"},
  172. Value: "",
  173. Usage: "Sets ipv6 address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  174. },
  175. &cli.StringFlag{
  176. Name: "udpholepunch",
  177. EnvVars: []string{"NETCLIENT_UDP_HOLEPUNCH"},
  178. Value: "",
  179. Usage: "Turns on udp holepunching if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  180. },
  181. &cli.StringFlag{
  182. Name: "ipforwarding",
  183. EnvVars: []string{"NETCLIENT_IPFORWARDING"},
  184. Value: "on",
  185. Usage: "Sets ip forwarding on if 'on'. Ignores if 'off'. On by default.",
  186. },
  187. &cli.StringFlag{
  188. Name: "postup",
  189. EnvVars: []string{"NETCLIENT_POSTUP"},
  190. Value: "",
  191. Usage: "Sets PostUp command for WireGuard.",
  192. },
  193. &cli.StringFlag{
  194. Name: "postdown",
  195. EnvVars: []string{"NETCLIENT_POSTDOWN"},
  196. Value: "",
  197. Usage: "Sets PostDown command for WireGuard.",
  198. },
  199. &cli.StringFlag{
  200. Name: "daemon",
  201. EnvVars: []string{"NETCLIENT_DAEMON"},
  202. Value: "on",
  203. Usage: "Installs daemon if 'on'. Ignores if 'off'. On by default.",
  204. },
  205. &cli.StringFlag{
  206. Name: "roaming",
  207. EnvVars: []string{"NETCLIENT_ROAMING"},
  208. Value: "on",
  209. Usage: "Checks for IP changes if 'on'. Ignores if 'off'. On by default.",
  210. },
  211. }
  212. app.Commands = []*cli.Command{
  213. {
  214. Name: "join",
  215. Usage: "Join a Netmaker network.",
  216. Flags: cliFlags,
  217. Action: func(c *cli.Context) error {
  218. cfg, pvtKey, err := config.GetCLIConfig(c)
  219. if err != nil {
  220. return err
  221. }
  222. if cfg.Network == "all" {
  223. err = errors.New("No network provided.")
  224. return err
  225. }
  226. if cfg.Server.GRPCAddress == "" {
  227. err = errors.New("No server address provided.")
  228. return err
  229. }
  230. err = command.Join(cfg, pvtKey)
  231. return err
  232. },
  233. },
  234. {
  235. Name: "leave",
  236. Usage: "Leave a Netmaker network.",
  237. Flags: cliFlags,
  238. // the action, or code that will be executed when
  239. // we execute our `ns` command
  240. Action: func(c *cli.Context) error {
  241. cfg, _, err := config.GetCLIConfig(c)
  242. if err != nil {
  243. return err
  244. }
  245. err = command.Leave(cfg)
  246. return err
  247. },
  248. },
  249. {
  250. Name: "checkin",
  251. Usage: "Checks for local changes and then checks into the specified Netmaker network to ask about remote changes.",
  252. Flags: cliFlags,
  253. // the action, or code that will be executed when
  254. // we execute our `ns` command
  255. Action: func(c *cli.Context) error {
  256. cfg, _, err := config.GetCLIConfig(c)
  257. if err != nil {
  258. return err
  259. }
  260. err = command.CheckIn(cfg)
  261. return err
  262. },
  263. },
  264. {
  265. Name: "push",
  266. Usage: "Push configuration changes to server.",
  267. Flags: cliFlags,
  268. // the action, or code that will be executed when
  269. // we execute our `ns` command
  270. Action: func(c *cli.Context) error {
  271. cfg, _, err := config.GetCLIConfig(c)
  272. if err != nil {
  273. return err
  274. }
  275. err = command.Push(cfg)
  276. return err
  277. },
  278. },
  279. {
  280. Name: "pull",
  281. Usage: "Pull latest configuration and peers from server.",
  282. Flags: cliFlags,
  283. // the action, or code that will be executed when
  284. // we execute our `ns` command
  285. Action: func(c *cli.Context) error {
  286. cfg, _, err := config.GetCLIConfig(c)
  287. if err != nil {
  288. return err
  289. }
  290. err = command.Pull(cfg)
  291. return err
  292. },
  293. },
  294. {
  295. Name: "list",
  296. Usage: "Get list of networks.",
  297. Flags: cliFlags,
  298. // the action, or code that will be executed when
  299. // we execute our `ns` command
  300. Action: func(c *cli.Context) error {
  301. cfg, _, err := config.GetCLIConfig(c)
  302. if err != nil {
  303. return err
  304. }
  305. err = command.List(cfg)
  306. return err
  307. },
  308. },
  309. {
  310. Name: "uninstall",
  311. Usage: "Uninstall the netclient system service.",
  312. Flags: cliFlags,
  313. // the action, or code that will be executed when
  314. // we execute our `ns` command
  315. Action: func(c *cli.Context) error {
  316. err := command.Uninstall()
  317. return err
  318. },
  319. },
  320. }
  321. setGarbageCollection()
  322. if ncutils.IsWindows() {
  323. ncwindows.InitWindows()
  324. } else {
  325. // start our application
  326. out, err := ncutils.RunCmd("id -u", true)
  327. if err != nil {
  328. log.Fatal(out, err)
  329. }
  330. id, err := strconv.Atoi(string(out[:len(out)-1]))
  331. if err != nil {
  332. log.Fatal(err)
  333. }
  334. if id != 0 {
  335. log.Fatal("This program must be run with elevated privileges (sudo). This program installs a SystemD service and configures WireGuard and networking rules. Please re-run with sudo/root.")
  336. }
  337. _, err = exec.LookPath("wg")
  338. uspace := ncutils.GetWireGuard()
  339. if err != nil {
  340. if uspace == "wg" {
  341. log.Println(err)
  342. log.Fatal("WireGuard not installed. Please install WireGuard (wireguard-tools) and try again.")
  343. }
  344. ncutils.PrintLog("Running with userspace wireguard: "+uspace, 0)
  345. } else if uspace != "wg" {
  346. log.Println("running userspace WireGuard with " + uspace)
  347. }
  348. }
  349. if !ncutils.IsKernel() {
  350. if !local.IsWGInstalled() {
  351. log.Fatal("Please install WireGuard before using Gravitl Netclient. https://download.wireguard.com")
  352. }
  353. }
  354. if len(os.Args) == 1 && ncutils.IsWindows() {
  355. c := make(chan os.Signal)
  356. signal.Notify(c, os.Interrupt, syscall.SIGTERM)
  357. go func() {
  358. <-c
  359. log.Println("closing Gravitl Netclient")
  360. os.Exit(0)
  361. }()
  362. command.RunUserspaceDaemon()
  363. } else {
  364. err := app.Run(os.Args)
  365. if err != nil {
  366. log.Fatal(err)
  367. }
  368. }
  369. }
  370. func setGarbageCollection() {
  371. _, gcset := os.LookupEnv("GOGC")
  372. if !gcset {
  373. debug.SetGCPercent(ncutils.DEFAULT_GC_PERCENT)
  374. }
  375. }