main.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345
  1. package main
  2. import (
  3. "errors"
  4. "os/exec"
  5. "strconv"
  6. "github.com/urfave/cli/v2"
  7. "os"
  8. "github.com/gravitl/netmaker/netclient/command"
  9. "github.com/gravitl/netmaker/netclient/config"
  10. "log"
  11. )
  12. func main() {
  13. app := cli.NewApp()
  14. app.Name = "Netclient CLI"
  15. app.Usage = "Netmaker's netclient agent and CLI. Used to perform interactions with Netmaker server and set local WireGuard config."
  16. cliFlags := []cli.Flag{
  17. &cli.StringFlag{
  18. Name: "network",
  19. Aliases: []string{"n"},
  20. EnvVars: []string{"NETCLIENT_NETWORK"},
  21. Value: "all",
  22. Usage: "Network to perform specified action against.",
  23. },
  24. &cli.StringFlag{
  25. Name: "password",
  26. Aliases: []string{"p"},
  27. EnvVars: []string{"NETCLIENT_PASSWORD"},
  28. Value: "badpassword",
  29. Usage: "Password for authenticating with netmaker.",
  30. },
  31. &cli.StringFlag{
  32. Name: "endpoint",
  33. Aliases: []string{"e"},
  34. EnvVars: []string{"NETCLIENT_ENDPOINT"},
  35. Value: "",
  36. Usage: "Reachable (usually public) address for WireGuard (not the private WG address).",
  37. },
  38. &cli.StringFlag{
  39. Name: "macaddress",
  40. Aliases: []string{"m"},
  41. EnvVars: []string{"NETCLIENT_MACADDRESS"},
  42. Value: "",
  43. Usage: "Mac Address for this machine. Used as a unique identifier within Netmaker network.",
  44. },
  45. &cli.StringFlag{
  46. Name: "publickey",
  47. Aliases: []string{"pubkey"},
  48. EnvVars: []string{"NETCLIENT_PUBLICKEY"},
  49. Value: "",
  50. Usage: "Public Key for WireGuard Interface.",
  51. },
  52. &cli.StringFlag{
  53. Name: "privatekey",
  54. Aliases: []string{"privkey"},
  55. EnvVars: []string{"NETCLIENT_PRIVATEKEY"},
  56. Value: "",
  57. Usage: "Private Key for WireGuard Interface.",
  58. },
  59. &cli.StringFlag{
  60. Name: "port",
  61. EnvVars: []string{"NETCLIENT_PORT"},
  62. Value: "",
  63. Usage: "Port for WireGuard Interface.",
  64. },
  65. &cli.IntFlag{
  66. Name: "keepalive",
  67. EnvVars: []string{"NETCLIENT_KEEPALIVE"},
  68. Value: 0,
  69. Usage: "Default PersistentKeepAlive for Peers in WireGuard Interface.",
  70. },
  71. &cli.StringFlag{
  72. Name: "name",
  73. EnvVars: []string{"NETCLIENT_NAME"},
  74. Value: "",
  75. Usage: "Identifiable name for machine within Netmaker network.",
  76. },
  77. &cli.StringFlag{
  78. Name: "localaddress",
  79. EnvVars: []string{"NETCLIENT_LOCALADDRESS"},
  80. Value: "",
  81. Usage: "Local address for machine. Can be used in place of Endpoint for machines on the same LAN.",
  82. },
  83. &cli.StringFlag{
  84. Name: "address",
  85. Aliases: []string{"a"},
  86. EnvVars: []string{"NETCLIENT_ADDRESS"},
  87. Value: "",
  88. Usage: "WireGuard address for machine within Netmaker network.",
  89. },
  90. &cli.StringFlag{
  91. Name: "addressIPv6",
  92. Aliases: []string{"a6"},
  93. EnvVars: []string{"NETCLIENT_ADDRESSIPV6"},
  94. Value: "",
  95. Usage: "WireGuard address for machine within Netmaker network.",
  96. },
  97. &cli.StringFlag{
  98. Name: "interface",
  99. Aliases: []string{"i"},
  100. EnvVars: []string{"NETCLIENT_INTERFACE"},
  101. Value: "",
  102. Usage: "WireGuard local network interface name.",
  103. },
  104. &cli.StringFlag{
  105. Name: "server",
  106. Aliases: []string{"s"},
  107. EnvVars: []string{"NETCLIENT_SERVER"},
  108. Value: "",
  109. Usage: "Address + GRPC Port (e.g. 1.2.3.4:50051) of Netmaker server.",
  110. },
  111. &cli.StringFlag{
  112. Name: "key",
  113. Aliases: []string{"k"},
  114. EnvVars: []string{"NETCLIENT_ACCESSKEY"},
  115. Value: "",
  116. Usage: "Access Key for signing up machine with Netmaker server during initial 'add'.",
  117. },
  118. &cli.StringFlag{
  119. Name: "token",
  120. Aliases: []string{"t"},
  121. EnvVars: []string{"NETCLIENT_ACCESSTOKEN"},
  122. Value: "",
  123. Usage: "Access Token for signing up machine with Netmaker server during initial 'add'.",
  124. },
  125. &cli.StringFlag{
  126. Name: "localrange",
  127. EnvVars: []string{"NETCLIENT_LOCALRANGE"},
  128. Value: "",
  129. Usage: "Local Range if network is local, for instance 192.168.1.0/24.",
  130. },
  131. &cli.StringFlag{
  132. Name: "roaming",
  133. EnvVars: []string{"NETCLIENT_ROAMING"},
  134. Value: "on",
  135. Usage: "Checks for changes in IP address during updates if 'on'. Stays static if 'off'. On by default.",
  136. },
  137. &cli.StringFlag{
  138. Name: "dns",
  139. EnvVars: []string{"NETCLIENT_DNS"},
  140. Value: "",
  141. Usage: "Sets private dns if 'on'. Ignores if 'off'. Will retrieve from network if unset.",
  142. },
  143. &cli.StringFlag{
  144. Name: "islocal",
  145. EnvVars: []string{"NETCLIENT_IS_LOCAL"},
  146. Value: "",
  147. Usage: "Sets endpoint to local address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  148. },
  149. &cli.StringFlag{
  150. Name: "isdualstack",
  151. EnvVars: []string{"NETCLIENT_IS_DUALSTACK"},
  152. Value: "",
  153. Usage: "Sets ipv6 address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
  154. },
  155. &cli.StringFlag{
  156. Name: "ipforwarding",
  157. EnvVars: []string{"NETCLIENT_IPFORWARDING"},
  158. Value: "on",
  159. Usage: "Sets ip forwarding on if 'on'. Ignores if 'off'. On by default.",
  160. },
  161. &cli.StringFlag{
  162. Name: "postup",
  163. EnvVars: []string{"NETCLIENT_POSTUP"},
  164. Value: "",
  165. Usage: "Sets PostUp command for WireGuard.",
  166. },
  167. &cli.StringFlag{
  168. Name: "postdown",
  169. EnvVars: []string{"NETCLIENT_POSTDOWN"},
  170. Value: "",
  171. Usage: "Sets PostDown command for WireGuard.",
  172. },
  173. &cli.StringFlag{
  174. Name: "daemon",
  175. EnvVars: []string{"NETCLIENT_DAEMON"},
  176. Value: "on",
  177. Usage: "Installs daemon if 'on'. Ignores if 'off'. On by default.",
  178. },
  179. }
  180. app.Commands = []*cli.Command{
  181. {
  182. Name: "register",
  183. Usage: "Register with Netmaker Server for secure GRPC communications.",
  184. Flags: cliFlags,
  185. Action: func(c *cli.Context) error {
  186. cfg, err := config.GetCLIConfigRegister(c)
  187. if err != nil {
  188. return err
  189. }
  190. if cfg.Client.ServerAddress == "" {
  191. err = errors.New("No server address provided.")
  192. return err
  193. }
  194. err = command.Register(cfg)
  195. return err
  196. },
  197. },
  198. {
  199. Name: "join",
  200. Usage: "Join a Netmaker network.",
  201. Flags: cliFlags,
  202. Action: func(c *cli.Context) error {
  203. cfg, err := config.GetCLIConfig(c)
  204. if err != nil {
  205. return err
  206. }
  207. if cfg.Network == "all" {
  208. err = errors.New("No network provided.")
  209. return err
  210. }
  211. if cfg.Server.GRPCAddress == "" {
  212. err = errors.New("No server address provided.")
  213. return err
  214. }
  215. err = command.Join(cfg)
  216. return err
  217. },
  218. },
  219. {
  220. Name: "leave",
  221. Usage: "Leave a Netmaker network.",
  222. Flags: cliFlags,
  223. // the action, or code that will be executed when
  224. // we execute our `ns` command
  225. Action: func(c *cli.Context) error {
  226. cfg, err := config.GetCLIConfig(c)
  227. if err != nil {
  228. return err
  229. }
  230. err = command.Leave(cfg)
  231. return err
  232. },
  233. },
  234. {
  235. Name: "checkin",
  236. Usage: "Checks for local changes and then checks into the specified Netmaker network to ask about remote changes.",
  237. Flags: cliFlags,
  238. // the action, or code that will be executed when
  239. // we execute our `ns` command
  240. Action: func(c *cli.Context) error {
  241. cfg, err := config.GetCLIConfig(c)
  242. if err != nil {
  243. return err
  244. }
  245. err = command.CheckIn(cfg)
  246. return err
  247. },
  248. },
  249. {
  250. Name: "push",
  251. Usage: "Push configuration changes to server.",
  252. Flags: cliFlags,
  253. // the action, or code that will be executed when
  254. // we execute our `ns` command
  255. Action: func(c *cli.Context) error {
  256. cfg, err := config.GetCLIConfig(c)
  257. if err != nil {
  258. return err
  259. }
  260. err = command.Push(cfg)
  261. return err
  262. },
  263. },
  264. {
  265. Name: "pull",
  266. Usage: "Pull latest configuration and peers from server.",
  267. Flags: cliFlags,
  268. // the action, or code that will be executed when
  269. // we execute our `ns` command
  270. Action: func(c *cli.Context) error {
  271. cfg, err := config.GetCLIConfig(c)
  272. if err != nil {
  273. return err
  274. }
  275. err = command.Pull(cfg)
  276. return err
  277. },
  278. },
  279. {
  280. Name: "list",
  281. Usage: "Get list of networks.",
  282. Flags: cliFlags,
  283. // the action, or code that will be executed when
  284. // we execute our `ns` command
  285. Action: func(c *cli.Context) error {
  286. cfg, err := config.GetCLIConfig(c)
  287. if err != nil {
  288. return err
  289. }
  290. err = command.List(cfg)
  291. return err
  292. },
  293. },
  294. {
  295. Name: "uninstall",
  296. Usage: "Uninstall the netclient system service.",
  297. Flags: cliFlags,
  298. // the action, or code that will be executed when
  299. // we execute our `ns` command
  300. Action: func(c *cli.Context) error {
  301. cfg, err := config.ReadGlobalConfig()
  302. if err != nil {
  303. return err
  304. }
  305. var gconf config.GlobalConfig
  306. gconf = *cfg
  307. err = command.Uninstall(gconf)
  308. return err
  309. },
  310. },
  311. }
  312. // start our application
  313. getID := exec.Command("id", "-u")
  314. out, err := getID.Output()
  315. if err != nil {
  316. log.Fatal(err)
  317. }
  318. id, err := strconv.Atoi(string(out[:len(out)-1]))
  319. if err != nil {
  320. log.Fatal(err)
  321. }
  322. if id != 0 {
  323. log.Fatal("This program must be run with elevated privileges (sudo). This program installs a SystemD service and configures WireGuard and networking rules. Please re-run with sudo/root.")
  324. }
  325. _, err = exec.LookPath("wg")
  326. if err != nil {
  327. log.Println(err)
  328. log.Fatal("WireGuard not installed. Please install WireGuard (wireguard-tools) and try again.")
  329. }
  330. err = app.Run(os.Args)
  331. if err != nil {
  332. log.Fatal(err)
  333. }
  334. }