join.go 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260
  1. package functions
  2. import (
  3. "google.golang.org/grpc/credentials"
  4. "crypto/tls"
  5. "fmt"
  6. "errors"
  7. "context"
  8. "log"
  9. "net"
  10. "math/rand"
  11. "time"
  12. "github.com/gravitl/netmaker/netclient/config"
  13. "github.com/gravitl/netmaker/netclient/wireguard"
  14. "github.com/gravitl/netmaker/netclient/server"
  15. "github.com/gravitl/netmaker/netclient/local"
  16. nodepb "github.com/gravitl/netmaker/grpc"
  17. "golang.zx2c4.com/wireguard/wgctrl"
  18. "google.golang.org/grpc"
  19. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  20. //homedir "github.com/mitchellh/go-homedir"
  21. )
  22. func JoinNetwork(cfg config.ClientConfig) error {
  23. hasnet := local.HasNetwork(cfg.Network)
  24. if hasnet {
  25. err := errors.New("ALREADY_INSTALLED. Netclient appears to already be installed for " + cfg.Network + ". To re-install, please remove by executing 'sudo netclient leave -n " + cfg.Network + "'. Then re-run the install command.")
  26. return err
  27. }
  28. log.Println("attempting to joining " + cfg.Network + " at " + cfg.Server.GRPCAddress)
  29. err := config.Write(&cfg, cfg.Network)
  30. if err != nil {
  31. return err
  32. }
  33. wgclient, err := wgctrl.New()
  34. if err != nil {
  35. return err
  36. }
  37. defer wgclient.Close()
  38. if cfg.Node.Network == "" {
  39. return errors.New("no network provided")
  40. }
  41. if cfg.Node.LocalRange != "" {
  42. if cfg.Node.LocalAddress == "" {
  43. log.Println("local vpn, getting local address from range: " + cfg.Node.LocalRange)
  44. ifaces, err := net.Interfaces()
  45. if err != nil {
  46. return err
  47. }
  48. _, localrange, err := net.ParseCIDR(cfg.Node.LocalRange)
  49. if err != nil {
  50. return err
  51. }
  52. var local string
  53. found := false
  54. for _, i := range ifaces {
  55. if i.Flags&net.FlagUp == 0 {
  56. continue // interface down
  57. }
  58. if i.Flags&net.FlagLoopback != 0 {
  59. continue // loopback interface
  60. }
  61. addrs, err := i.Addrs()
  62. if err != nil {
  63. return err
  64. }
  65. for _, addr := range addrs {
  66. var ip net.IP
  67. switch v := addr.(type) {
  68. case *net.IPNet:
  69. if !found {
  70. ip = v.IP
  71. local = ip.String()
  72. if cfg.Node.IsLocal == "yes" {
  73. found = localrange.Contains(ip)
  74. } else {
  75. found = true
  76. }
  77. }
  78. case *net.IPAddr:
  79. if !found {
  80. ip = v.IP
  81. local = ip.String()
  82. if cfg.Node.IsLocal == "yes" {
  83. found = localrange.Contains(ip)
  84. } else {
  85. found = true
  86. }
  87. }
  88. }
  89. }
  90. }
  91. cfg.Node.LocalAddress = local
  92. }
  93. }
  94. if cfg.Node.Password == "" {
  95. cfg.Node.Password = GenPass()
  96. }
  97. if cfg.Node.Endpoint == "" {
  98. if cfg.Node.IsLocal == "yes" && cfg.Node.LocalAddress != "" {
  99. cfg.Node.Endpoint = cfg.Node.LocalAddress
  100. } else {
  101. cfg.Node.Endpoint, err = getPublicIP()
  102. if err != nil {
  103. fmt.Println("Error setting cfg.Node.Endpoint.")
  104. return err
  105. }
  106. }
  107. } else {
  108. cfg.Node.Endpoint = cfg.Node.Endpoint
  109. }
  110. if cfg.Node.PrivateKey == "" {
  111. privatekey, err := wgtypes.GeneratePrivateKey()
  112. if err != nil {
  113. log.Fatal(err)
  114. }
  115. cfg.Node.PrivateKey = privatekey.String()
  116. cfg.Node.PublicKey = privatekey.PublicKey().String()
  117. }
  118. if cfg.Node.MacAddress == "" {
  119. macs, err := getMacAddr()
  120. if err != nil {
  121. return err
  122. } else if len(macs) == 0 {
  123. log.Fatal()
  124. } else {
  125. cfg.Node.MacAddress = macs[0]
  126. }
  127. }
  128. if cfg.Node.Port == 0 {
  129. cfg.Node.Port, err = GetFreePort(51821)
  130. if err != nil {
  131. fmt.Printf("Error retrieving port: %v", err)
  132. }
  133. }
  134. var wcclient nodepb.NodeServiceClient
  135. var requestOpts grpc.DialOption
  136. log.Println("cant believe we made it")
  137. //requestOpts = grpc.WithInsecure()
  138. h2creds := credentials.NewTLS(&tls.Config{NextProtos: []string{"h2"}})
  139. requestOpts = grpc.WithTransportCredentials(h2creds)
  140. conn, err := grpc.Dial(cfg.Server.GRPCAddress, requestOpts)
  141. if err != nil {
  142. log.Fatalf("Unable to establish client connection to localhost:50051: %v", err)
  143. }
  144. log.Println("cant believe we made it 2")
  145. wcclient = nodepb.NewNodeServiceClient(conn)
  146. postnode := &nodepb.Node{
  147. Password: cfg.Node.Password,
  148. Macaddress: cfg.Node.MacAddress,
  149. Accesskey: cfg.Server.AccessKey,
  150. Nodenetwork: cfg.Network,
  151. Listenport: cfg.Node.Port,
  152. Postup: cfg.Node.PostUp,
  153. Postdown: cfg.Node.PostDown,
  154. Keepalive: cfg.Node.KeepAlive,
  155. Localaddress: cfg.Node.LocalAddress,
  156. Interface: cfg.Node.Interface,
  157. Publickey: cfg.Node.PublicKey,
  158. Name: cfg.Node.Name,
  159. Endpoint: cfg.Node.Endpoint,
  160. }
  161. err = config.ModConfig(postnode)
  162. if err != nil {
  163. return err
  164. }
  165. log.Println("cant believe we made it 3")
  166. res, err := wcclient.CreateNode(
  167. context.TODO(),
  168. &nodepb.CreateNodeReq{
  169. Node: postnode,
  170. },
  171. )
  172. log.Println(res)
  173. log.Println("cant believe we made it 3.5")
  174. if err != nil {
  175. return err
  176. }
  177. node := res.Node
  178. if err != nil {
  179. return err
  180. }
  181. log.Println("cant believe we made it 3.75")
  182. if node.Dnsoff==true {
  183. cfg.Node.DNS = "yes"
  184. }
  185. if !(cfg.Node.IsLocal == "yes") && node.Islocal && node.Localrange != "" {
  186. node.Localaddress, err = getLocalIP(node.Localrange)
  187. if err != nil {
  188. return err
  189. }
  190. node.Endpoint = node.Localaddress
  191. }
  192. log.Println("cant believe we made it 4")
  193. err = config.ModConfig(node)
  194. if err != nil {
  195. return err
  196. }
  197. if node.Ispending {
  198. fmt.Println("Node is marked as PENDING.")
  199. fmt.Println("Awaiting approval from Admin before configuring WireGuard.")
  200. if cfg.Daemon != "off" {
  201. err = local.ConfigureSystemD(cfg.Network)
  202. return err
  203. }
  204. }
  205. peers, hasGateway, gateways, err := server.GetPeers(node.Macaddress, cfg.Network, cfg.Server.GRPCAddress, node.Isdualstack, node.Isingressgateway)
  206. if err != nil {
  207. return err
  208. }
  209. err = wireguard.StorePrivKey(cfg.Node.PrivateKey, cfg.Network)
  210. if err != nil {
  211. return err
  212. }
  213. err = wireguard.InitWireguard(node, cfg.Node.PrivateKey, peers, hasGateway, gateways)
  214. if err != nil {
  215. return err
  216. }
  217. if cfg.Daemon != "off" {
  218. err = local.ConfigureSystemD(cfg.Network)
  219. }
  220. if err != nil {
  221. return err
  222. }
  223. return err
  224. }
  225. //generate an access key value
  226. func GenPass() string {
  227. var seededRand *rand.Rand = rand.New(
  228. rand.NewSource(time.Now().UnixNano()))
  229. length := 16
  230. charset := "abcdefghijklmnopqrstuvwxyz" + "ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
  231. b := make([]byte, length)
  232. for i := range b {
  233. b[i] = charset[seededRand.Intn(len(charset))]
  234. }
  235. return string(b)
  236. }