join.go 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261
  1. package functions
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "encoding/json"
  6. "errors"
  7. "fmt"
  8. "log"
  9. "net"
  10. nodepb "github.com/gravitl/netmaker/grpc"
  11. "github.com/gravitl/netmaker/models"
  12. "github.com/gravitl/netmaker/netclient/auth"
  13. "github.com/gravitl/netmaker/netclient/config"
  14. "github.com/gravitl/netmaker/netclient/local"
  15. "github.com/gravitl/netmaker/netclient/netclientutils"
  16. "github.com/gravitl/netmaker/netclient/server"
  17. "github.com/gravitl/netmaker/netclient/wireguard"
  18. "golang.zx2c4.com/wireguard/wgctrl"
  19. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  20. "google.golang.org/grpc"
  21. "google.golang.org/grpc/credentials"
  22. )
  23. func JoinNetwork(cfg config.ClientConfig, privateKey string) error {
  24. hasnet := local.HasNetwork(cfg.Network)
  25. if hasnet {
  26. err := errors.New("ALREADY_INSTALLED. Netclient appears to already be installed for " + cfg.Network + ". To re-install, please remove by executing 'sudo netclient leave -n " + cfg.Network + "'. Then re-run the install command.")
  27. return err
  28. }
  29. log.Println("attempting to join " + cfg.Network + " at " + cfg.Server.GRPCAddress)
  30. err := config.Write(&cfg, cfg.Network)
  31. if err != nil {
  32. return err
  33. }
  34. wgclient, err := wgctrl.New()
  35. if err != nil {
  36. return err
  37. }
  38. defer wgclient.Close()
  39. if cfg.Node.Network == "" {
  40. return errors.New("no network provided")
  41. }
  42. if cfg.Node.LocalRange != "" {
  43. if cfg.Node.LocalAddress == "" {
  44. log.Println("local vpn, getting local address from range: " + cfg.Node.LocalRange)
  45. ifaces, err := net.Interfaces()
  46. if err != nil {
  47. return err
  48. }
  49. _, localrange, err := net.ParseCIDR(cfg.Node.LocalRange)
  50. if err != nil {
  51. return err
  52. }
  53. var local string
  54. found := false
  55. for _, i := range ifaces {
  56. if i.Flags&net.FlagUp == 0 {
  57. continue // interface down
  58. }
  59. if i.Flags&net.FlagLoopback != 0 {
  60. continue // loopback interface
  61. }
  62. addrs, err := i.Addrs()
  63. if err != nil {
  64. return err
  65. }
  66. for _, addr := range addrs {
  67. var ip net.IP
  68. switch v := addr.(type) {
  69. case *net.IPNet:
  70. if !found {
  71. ip = v.IP
  72. local = ip.String()
  73. if cfg.Node.IsLocal == "yes" {
  74. found = localrange.Contains(ip)
  75. } else {
  76. found = true
  77. }
  78. }
  79. case *net.IPAddr:
  80. if !found {
  81. ip = v.IP
  82. local = ip.String()
  83. if cfg.Node.IsLocal == "yes" {
  84. found = localrange.Contains(ip)
  85. } else {
  86. found = true
  87. }
  88. }
  89. }
  90. }
  91. }
  92. cfg.Node.LocalAddress = local
  93. }
  94. }
  95. if cfg.Node.Password == "" {
  96. cfg.Node.Password = netclientutils.GenPass()
  97. }
  98. auth.StoreSecret(cfg.Node.Password, cfg.Node.Network)
  99. if cfg.Node.Endpoint == "" {
  100. if cfg.Node.IsLocal == "yes" && cfg.Node.LocalAddress != "" {
  101. cfg.Node.Endpoint = cfg.Node.LocalAddress
  102. } else {
  103. cfg.Node.Endpoint, err = netclientutils.GetPublicIP()
  104. if err != nil {
  105. fmt.Println("Error setting cfg.Node.Endpoint.")
  106. return err
  107. }
  108. }
  109. }
  110. if privateKey == "" {
  111. wgPrivatekey, err := wgtypes.GeneratePrivateKey()
  112. if err != nil {
  113. log.Fatal(err)
  114. }
  115. privateKey = wgPrivatekey.String()
  116. cfg.Node.PublicKey = wgPrivatekey.PublicKey().String()
  117. }
  118. if cfg.Node.MacAddress == "" {
  119. macs, err := netclientutils.GetMacAddr()
  120. if err != nil {
  121. return err
  122. } else if len(macs) == 0 {
  123. log.Fatal()
  124. } else {
  125. cfg.Node.MacAddress = macs[0]
  126. }
  127. }
  128. var wcclient nodepb.NodeServiceClient
  129. var requestOpts grpc.DialOption
  130. requestOpts = grpc.WithInsecure()
  131. if cfg.Server.GRPCSSL == "on" {
  132. h2creds := credentials.NewTLS(&tls.Config{NextProtos: []string{"h2"}})
  133. requestOpts = grpc.WithTransportCredentials(h2creds)
  134. }
  135. conn, err := grpc.Dial(cfg.Server.GRPCAddress, requestOpts)
  136. if err != nil {
  137. log.Fatalf("Unable to establish client connection to "+cfg.Server.GRPCAddress+": %v", err)
  138. }
  139. wcclient = nodepb.NewNodeServiceClient(conn)
  140. postnode := &models.Node{
  141. Password: cfg.Node.Password,
  142. MacAddress: cfg.Node.MacAddress,
  143. AccessKey: cfg.Server.AccessKey,
  144. Network: cfg.Network,
  145. ListenPort: cfg.Node.ListenPort,
  146. PostUp: cfg.Node.PostUp,
  147. PostDown: cfg.Node.PostDown,
  148. PersistentKeepalive: cfg.Node.PersistentKeepalive,
  149. LocalAddress: cfg.Node.LocalAddress,
  150. Interface: cfg.Node.Interface,
  151. PublicKey: cfg.Node.PublicKey,
  152. Name: cfg.Node.Name,
  153. Endpoint: cfg.Node.Endpoint,
  154. SaveConfig: cfg.Node.SaveConfig,
  155. UDPHolePunch: cfg.Node.UDPHolePunch,
  156. }
  157. if err = config.ModConfig(postnode); err != nil {
  158. return err
  159. }
  160. data, err := json.Marshal(postnode)
  161. if err != nil {
  162. return err
  163. }
  164. res, err := wcclient.CreateNode(
  165. context.TODO(),
  166. &nodepb.Object{
  167. Data: string(data),
  168. Type: nodepb.NODE_TYPE,
  169. },
  170. )
  171. if err != nil {
  172. return err
  173. }
  174. log.Println("node created on remote server...updating configs")
  175. nodeData := res.Data
  176. var node models.Node
  177. if err = json.Unmarshal([]byte(nodeData), &node); err != nil {
  178. return err
  179. }
  180. if node.ListenPort == 0 {
  181. node.ListenPort, err = netclientutils.GetFreePort(51821)
  182. if err != nil {
  183. fmt.Printf("Error retrieving port: %v", err)
  184. }
  185. }
  186. if node.DNSOn == "yes" {
  187. cfg.Node.DNSOn = "yes"
  188. }
  189. if !(cfg.Node.IsLocal == "yes") && node.IsLocal == "yes" && node.LocalRange != "" {
  190. node.LocalAddress, err = netclientutils.GetLocalIP(node.LocalRange)
  191. if err != nil {
  192. return err
  193. }
  194. node.Endpoint = node.LocalAddress
  195. }
  196. err = config.ModConfig(&node)
  197. if err != nil {
  198. return err
  199. }
  200. err = wireguard.StorePrivKey(privateKey, cfg.Network)
  201. if err != nil {
  202. return err
  203. }
  204. if node.IsPending == "yes" {
  205. fmt.Println("Node is marked as PENDING.")
  206. fmt.Println("Awaiting approval from Admin before configuring WireGuard.")
  207. if cfg.Daemon != "off" {
  208. if netclientutils.IsWindows() {
  209. // handle daemon here..
  210. err = local.CreateAndRunWindowsDaemon()
  211. } else {
  212. err = local.ConfigureSystemD(cfg.Network)
  213. }
  214. return err
  215. }
  216. }
  217. log.Println("retrieving remote peers")
  218. peers, hasGateway, gateways, err := server.GetPeers(node.MacAddress, cfg.Network, cfg.Server.GRPCAddress, node.IsDualStack == "yes", node.IsIngressGateway == "yes")
  219. if err != nil && !netclientutils.IsEmptyRecord(err) {
  220. log.Println("failed to retrieve peers", err)
  221. return err
  222. }
  223. log.Println("starting wireguard")
  224. err = wireguard.InitWireguard(&node, privateKey, peers, hasGateway, gateways)
  225. if err != nil {
  226. return err
  227. }
  228. if cfg.Daemon != "off" {
  229. if netclientutils.IsWindows() {
  230. err = local.CreateAndRunWindowsDaemon()
  231. } else {
  232. err = local.ConfigureSystemD(cfg.Network)
  233. }
  234. }
  235. if err != nil {
  236. return err
  237. }
  238. return err
  239. }