123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431 |
- package functions
- import (
- "bytes"
- "encoding/json"
- "errors"
- "fmt"
- "io"
- "log"
- "net"
- "net/http"
- "os"
- "path/filepath"
- "strconv"
- "strings"
- "time"
- "github.com/gravitl/netmaker/logger"
- "github.com/gravitl/netmaker/models"
- "github.com/gravitl/netmaker/netclient/config"
- "github.com/gravitl/netmaker/netclient/daemon"
- "github.com/gravitl/netmaker/netclient/local"
- "github.com/gravitl/netmaker/netclient/ncutils"
- "github.com/gravitl/netmaker/netclient/wireguard"
- "github.com/gravitl/netmaker/nm-proxy/manager"
- "golang.zx2c4.com/wireguard/wgctrl"
- )
- // LINUX_APP_DATA_PATH - linux path
- const LINUX_APP_DATA_PATH = "/etc/netmaker"
- // HTTP_TIMEOUT - timeout in seconds for http requests
- const HTTP_TIMEOUT = 30
- // HTTPClient - http client to be reused by all
- var HTTPClient http.Client
- // SetHTTPClient -sets http client with sane default
- func SetHTTPClient() {
- HTTPClient = http.Client{
- Timeout: HTTP_TIMEOUT * time.Second,
- }
- }
- // ListPorts - lists ports of WireGuard devices
- func ListPorts() error {
- wgclient, err := wgctrl.New()
- if err != nil {
- return err
- }
- defer wgclient.Close()
- devices, err := wgclient.Devices()
- if err != nil {
- return err
- }
- fmt.Println("Here are your ports:")
- for _, i := range devices {
- fmt.Println(i.ListenPort)
- }
- return err
- }
- func getPrivateAddr() (string, error) {
- var local string
- conn, err := net.Dial("udp", "8.8.8.8:80")
- if err == nil {
- defer conn.Close()
- localAddr := conn.LocalAddr().(*net.UDPAddr)
- localIP := localAddr.IP
- local = localIP.String()
- }
- if local == "" {
- local, err = getPrivateAddrBackup()
- }
- if local == "" {
- err = errors.New("could not find local ip")
- }
- if net.ParseIP(local).To16() != nil {
- local = "[" + local + "]"
- }
- return local, err
- }
- func getPrivateAddrBackup() (string, error) {
- ifaces, err := net.Interfaces()
- if err != nil {
- return "", err
- }
- var local string
- found := false
- for _, i := range ifaces {
- if i.Flags&net.FlagUp == 0 {
- continue // interface down
- }
- if i.Flags&net.FlagLoopback != 0 {
- continue // loopback interface
- }
- addrs, err := i.Addrs()
- if err != nil {
- return "", err
- }
- for _, addr := range addrs {
- var ip net.IP
- switch v := addr.(type) {
- case *net.IPNet:
- if !found {
- ip = v.IP
- local = ip.String()
- found = true
- }
- case *net.IPAddr:
- if !found {
- ip = v.IP
- local = ip.String()
- found = true
- }
- }
- }
- }
- if !found {
- err := errors.New("local ip address not found")
- return "", err
- }
- return local, err
- }
- func getInterfaces() (*[]models.Iface, error) {
- ifaces, err := net.Interfaces()
- if err != nil {
- return nil, err
- }
- var data []models.Iface
- var link models.Iface
- for _, iface := range ifaces {
- if iface.Flags&net.FlagUp == 0 {
- continue // interface down
- }
- if iface.Flags&net.FlagLoopback != 0 {
- continue // loopback interface
- }
- addrs, err := iface.Addrs()
- if err != nil {
- return nil, err
- }
- for _, addr := range addrs {
- link.Name = iface.Name
- _, cidr, err := net.ParseCIDR(addr.String())
- if err != nil {
- continue
- }
- link.Address = *cidr
- data = append(data, link)
- }
- }
- return &data, nil
- }
- // GetNode - gets node locally
- func GetNode(network string) models.LegacyNode {
- modcfg, err := config.ReadConfig(network)
- if err != nil {
- log.Fatalf("Error: %v", err)
- }
- return modcfg.Node
- }
- // Uninstall - uninstalls networks from client
- func Uninstall() error {
- networks, err := ncutils.GetSystemNetworks()
- if err != nil {
- logger.Log(1, "unable to retrieve networks: ", err.Error())
- logger.Log(1, "continuing uninstall without leaving networks")
- } else {
- for _, network := range networks {
- err = LeaveNetwork(network)
- if err != nil {
- logger.Log(1, "encounter issue leaving network", network, ":", err.Error())
- }
- }
- }
- err = nil
- // clean up OS specific stuff
- if ncutils.IsWindows() {
- daemon.CleanupWindows()
- } else if ncutils.IsMac() {
- daemon.CleanupMac()
- } else if ncutils.IsLinux() {
- daemon.CleanupLinux()
- } else if ncutils.IsFreeBSD() {
- daemon.CleanupFreebsd()
- } else if !ncutils.IsKernel() {
- logger.Log(1, "manual cleanup required")
- }
- return err
- }
- // LeaveNetwork - client exits a network
- func LeaveNetwork(network string) error {
- cfg, err := config.ReadConfig(network)
- if err != nil {
- return err
- }
- logger.Log(2, "deleting node from server")
- if err := deleteNodeFromServer(cfg); err != nil {
- logger.Log(0, "error deleting node from server", err.Error())
- }
- logger.Log(2, "deleting wireguard interface")
- if err := deleteLocalNetwork(cfg); err != nil {
- logger.Log(0, "error deleting wireguard interface", err.Error())
- }
- logger.Log(2, "deleting configuration files")
- if err := WipeLocal(cfg); err != nil {
- logger.Log(0, "error deleting local network files", err.Error())
- }
- logger.Log(2, "removing dns entries")
- if err := removeHostDNS(cfg.Node.Interface, ncutils.IsWindows()); err != nil {
- logger.Log(0, "failed to delete dns entries for", cfg.Node.Interface, err.Error())
- }
- ProxyMgmChan <- &manager.ManagerAction{
- Action: manager.DeleteInterface,
- Payload: manager.ManagerPayload{
- InterfaceName: cfg.Node.Interface,
- },
- }
- logger.Log(2, "restarting daemon")
- return daemon.Restart()
- }
- func deleteNodeFromServer(cfg *config.ClientConfig) error {
- node := cfg.Node
- if node.IsServer == "yes" {
- return errors.New("attempt to delete server node ... not permitted")
- }
- token, err := Authenticate(cfg)
- if err != nil {
- return fmt.Errorf("unable to authenticate %w", err)
- }
- url := "https://" + cfg.Server.API + "/api/nodes/" + cfg.Network + "/" + cfg.Node.ID
- response, err := API("", http.MethodDelete, url, token)
- if err != nil {
- return fmt.Errorf("error deleting node on server: %w", err)
- }
- if response.StatusCode != http.StatusOK {
- bodybytes, _ := io.ReadAll(response.Body)
- defer response.Body.Close()
- return fmt.Errorf("error deleting node from network %s on server %s %s", cfg.Network, response.Status, string(bodybytes))
- }
- return nil
- }
- func deleteLocalNetwork(cfg *config.ClientConfig) error {
- wgClient, wgErr := wgctrl.New()
- if wgErr != nil {
- return wgErr
- }
- removeIface := cfg.Node.Interface
- queryAddr := cfg.Node.PrimaryAddress()
- if ncutils.IsMac() {
- var macIface string
- macIface, wgErr = local.GetMacIface(queryAddr)
- if wgErr == nil && removeIface != "" {
- removeIface = macIface
- }
- }
- dev, devErr := wgClient.Device(removeIface)
- if devErr != nil {
- return fmt.Errorf("error flushing routes %w", devErr)
- }
- local.FlushPeerRoutes(removeIface, queryAddr, dev.Peers[:])
- _, cidr, cidrErr := net.ParseCIDR(cfg.NetworkSettings.AddressRange)
- if cidrErr != nil {
- return fmt.Errorf("error flushing routes %w", cidrErr)
- }
- local.RemoveCIDRRoute(removeIface, queryAddr, cidr)
- return nil
- }
- // DeleteInterface - delete an interface of a network
- func DeleteInterface(ifacename string, postdown string) error {
- return wireguard.RemoveConf(ifacename, true)
- }
- // WipeLocal - wipes local instance
- func WipeLocal(cfg *config.ClientConfig) error {
- if err := wireguard.RemoveConf(cfg.Node.Interface, true); err == nil {
- logger.Log(1, "network:", cfg.Node.Network, "removed WireGuard interface: ", cfg.Node.Interface)
- } else if strings.Contains(err.Error(), "does not exist") {
- err = nil
- }
- dir := ncutils.GetNetclientPathSpecific()
- fail := false
- files, err := filepath.Glob(dir + "*" + cfg.Node.Network)
- if err != nil {
- logger.Log(0, "no matching files", err.Error())
- fail = true
- }
- for _, file := range files {
- if err := os.Remove(file); err != nil {
- logger.Log(0, "failed to delete file", file, err.Error())
- fail = true
- }
- }
- if cfg.Node.Interface != "" {
- if ncutils.FileExists(dir + cfg.Node.Interface + ".conf") {
- if err := os.Remove(dir + cfg.Node.Interface + ".conf"); err != nil {
- logger.Log(0, err.Error())
- fail = true
- }
- }
- }
- if fail {
- return errors.New("not all files were deleted")
- }
- return nil
- }
- // GetNetmakerPath - gets netmaker path locally
- func GetNetmakerPath() string {
- return LINUX_APP_DATA_PATH
- }
- // API function to interact with netmaker api endpoints. response from endpoint is returned
- func API(data any, method, url, authorization string) (*http.Response, error) {
- var request *http.Request
- var err error
- if data != "" {
- payload, err := json.Marshal(data)
- if err != nil {
- return nil, fmt.Errorf("error encoding data %w", err)
- }
- request, err = http.NewRequest(method, url, bytes.NewBuffer(payload))
- if err != nil {
- return nil, fmt.Errorf("error creating http request %w", err)
- }
- request.Header.Set("Content-Type", "application/json")
- } else {
- request, err = http.NewRequest(method, url, nil)
- if err != nil {
- return nil, fmt.Errorf("error creating http request %w", err)
- }
- }
- if authorization != "" {
- request.Header.Set("authorization", "Bearer "+authorization)
- }
- request.Header.Set("requestfrom", "node")
- return HTTPClient.Do(request)
- }
- // Authenticate authenticates with api to permit subsequent interactions with the api
- func Authenticate(cfg *config.ClientConfig) (string, error) {
- pass, err := os.ReadFile(ncutils.GetNetclientPathSpecific() + "secret-" + cfg.Network)
- if err != nil {
- return "", fmt.Errorf("could not read secrets file %w", err)
- }
- data := models.AuthParams{
- MacAddress: cfg.Node.MacAddress,
- ID: cfg.Node.ID,
- Password: string(pass),
- }
- url := "https://" + cfg.Server.API + "/api/nodes/adm/" + cfg.Network + "/authenticate"
- response, err := API(data, http.MethodPost, url, "")
- if err != nil {
- return "", err
- }
- defer response.Body.Close()
- if response.StatusCode != http.StatusOK {
- bodybytes, _ := io.ReadAll(response.Body)
- return "", fmt.Errorf("failed to authenticate %s %s", response.Status, string(bodybytes))
- }
- resp := models.SuccessResponse{}
- if err := json.NewDecoder(response.Body).Decode(&resp); err != nil {
- return "", fmt.Errorf("error decoding respone %w", err)
- }
- tokenData := resp.Response.(map[string]interface{})
- token := tokenData["AuthToken"]
- return token.(string), nil
- }
- // RegisterWithServer calls the register endpoint with privatekey and commonname - api returns ca and client certificate
- func SetServerInfo(cfg *config.ClientConfig) error {
- cfg, err := config.ReadConfig(cfg.Network)
- if err != nil {
- return err
- }
- url := "https://" + cfg.Server.API + "/api/server/getserverinfo"
- logger.Log(1, "server at "+url)
- token, err := Authenticate(cfg)
- if err != nil {
- return err
- }
- response, err := API("", http.MethodGet, url, token)
- if err != nil {
- return err
- }
- if response.StatusCode != http.StatusOK {
- return errors.New(response.Status)
- }
- var resp models.ServerConfig
- if err := json.NewDecoder(response.Body).Decode(&resp); err != nil {
- return errors.New("unmarshal cert error " + err.Error())
- }
- // set broker information on register
- cfg.Server.Server = resp.Server
- cfg.Server.MQPort = resp.MQPort
- if err = config.ModServerConfig(&cfg.Server, cfg.Node.Network); err != nil {
- logger.Log(0, "error overwriting config with broker information: "+err.Error())
- }
- return nil
- }
- func informPortChange(node *models.LegacyNode) {
- if node.ListenPort == 0 {
- logger.Log(0, "network:", node.Network, "UDP hole punching enabled for node", node.Name)
- } else {
- logger.Log(0, "network:", node.Network, "node", node.Name, "is using port", strconv.Itoa(int(node.ListenPort)))
- }
- }
|