join.go 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246
  1. package functions
  2. import (
  3. "fmt"
  4. "errors"
  5. "context"
  6. "log"
  7. "net"
  8. "math/rand"
  9. "time"
  10. "github.com/gravitl/netmaker/netclient/config"
  11. "github.com/gravitl/netmaker/netclient/wireguard"
  12. "github.com/gravitl/netmaker/netclient/server"
  13. "github.com/gravitl/netmaker/netclient/local"
  14. nodepb "github.com/gravitl/netmaker/grpc"
  15. "golang.zx2c4.com/wireguard/wgctrl"
  16. "google.golang.org/grpc"
  17. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  18. //homedir "github.com/mitchellh/go-homedir"
  19. )
  20. func JoinNetwork(cfg config.ClientConfig) error {
  21. hasnet := local.HasNetwork(cfg.Network)
  22. if hasnet {
  23. err := errors.New("ALREADY_INSTALLED. Netclient appears to already be installed for cfg.Network " + cfg.Network + ". To re-install, please remove by executing 'sudo netclient -c remove -n " + cfg.Network + "'. Then re-run the install command.")
  24. return err
  25. }
  26. log.Println("attempting to joining " + cfg.Network + " at " + cfg.Server.GRPCAddress)
  27. err := config.Write(&cfg, cfg.Network)
  28. if err != nil {
  29. return err
  30. }
  31. wgclient, err := wgctrl.New()
  32. if err != nil {
  33. return err
  34. }
  35. defer wgclient.Close()
  36. if cfg.Node.Network == "" {
  37. return errors.New("no network provided")
  38. }
  39. if cfg.Node.LocalRange != "" {
  40. if cfg.Node.LocalAddress == "" {
  41. log.Println("local vpn, getting local address from range: " + cfg.Node.LocalRange)
  42. ifaces, err := net.Interfaces()
  43. if err != nil {
  44. return err
  45. }
  46. _, localrange, err := net.ParseCIDR(cfg.Node.LocalRange)
  47. if err != nil {
  48. return err
  49. }
  50. var local string
  51. found := false
  52. for _, i := range ifaces {
  53. if i.Flags&net.FlagUp == 0 {
  54. continue // interface down
  55. }
  56. if i.Flags&net.FlagLoopback != 0 {
  57. continue // loopback interface
  58. }
  59. addrs, err := i.Addrs()
  60. if err != nil {
  61. return err
  62. }
  63. for _, addr := range addrs {
  64. var ip net.IP
  65. switch v := addr.(type) {
  66. case *net.IPNet:
  67. if !found {
  68. ip = v.IP
  69. local = ip.String()
  70. if cfg.Node.IsLocal == "yes" {
  71. found = localrange.Contains(ip)
  72. } else {
  73. found = true
  74. }
  75. }
  76. case *net.IPAddr:
  77. if !found {
  78. ip = v.IP
  79. local = ip.String()
  80. if cfg.Node.IsLocal == "yes" {
  81. found = localrange.Contains(ip)
  82. } else {
  83. found = true
  84. }
  85. }
  86. }
  87. }
  88. }
  89. cfg.Node.LocalAddress = local
  90. }
  91. }
  92. if cfg.Node.Password == "" {
  93. cfg.Node.Password = GenPass()
  94. }
  95. if cfg.Node.Endpoint == "" {
  96. if cfg.Node.IsLocal == "yes" && cfg.Node.LocalAddress != "" {
  97. cfg.Node.Endpoint = cfg.Node.LocalAddress
  98. } else {
  99. cfg.Node.Endpoint, err = getPublicIP()
  100. if err != nil {
  101. fmt.Println("Error setting cfg.Node.Endpoint.")
  102. return err
  103. }
  104. }
  105. } else {
  106. cfg.Node.Endpoint = cfg.Node.Endpoint
  107. fmt.Println("Endpoint set in config. Setting to address: " + cfg.Node.Endpoint)
  108. }
  109. if cfg.Node.PrivateKey == "" {
  110. privatekey, err := wgtypes.GeneratePrivateKey()
  111. if err != nil {
  112. log.Fatal(err)
  113. }
  114. cfg.Node.PrivateKey = privatekey.String()
  115. cfg.Node.PublicKey = privatekey.PublicKey().String()
  116. }
  117. if cfg.Node.MacAddress == "" {
  118. macs, err := getMacAddr()
  119. if err != nil {
  120. return err
  121. } else if len(macs) == 0 {
  122. log.Fatal()
  123. } else {
  124. cfg.Node.MacAddress = macs[0]
  125. }
  126. }
  127. if cfg.Node.Port == 0 {
  128. cfg.Node.Port, err = GetFreePort(51821)
  129. if err != nil {
  130. fmt.Printf("Error retrieving port: %v", err)
  131. }
  132. }
  133. var wcclient nodepb.NodeServiceClient
  134. var requestOpts grpc.DialOption
  135. requestOpts = grpc.WithInsecure()
  136. conn, err := grpc.Dial(cfg.Server.GRPCAddress, requestOpts)
  137. if err != nil {
  138. log.Fatalf("Unable to establish client connection to localhost:50051: %v", err)
  139. }
  140. wcclient = nodepb.NewNodeServiceClient(conn)
  141. postnode := &nodepb.Node{
  142. Password: cfg.Node.Password,
  143. Macaddress: cfg.Node.MacAddress,
  144. Accesskey: cfg.Server.AccessKey,
  145. Nodenetwork: cfg.Network,
  146. Listenport: cfg.Node.Port,
  147. Postup: cfg.Node.PostUp,
  148. Postdown: cfg.Node.PostDown,
  149. Keepalive: cfg.Node.KeepAlive,
  150. Localaddress: cfg.Node.LocalAddress,
  151. Interface: cfg.Node.Interface,
  152. Publickey: cfg.Node.PublicKey,
  153. Name: cfg.Node.Name,
  154. Endpoint: cfg.Node.Endpoint,
  155. }
  156. err = config.ModConfig(postnode)
  157. if err != nil {
  158. return err
  159. }
  160. res, err := wcclient.CreateNode(
  161. context.TODO(),
  162. &nodepb.CreateNodeReq{
  163. Node: postnode,
  164. },
  165. )
  166. if err != nil {
  167. return err
  168. }
  169. node := res.Node
  170. if err != nil {
  171. return err
  172. }
  173. if node.Dnsoff==true {
  174. cfg.Node.DNS = "yes"
  175. }
  176. if !(cfg.Node.IsLocal == "yes") && node.Islocal && node.Localrange != "" {
  177. node.Localaddress, err = getLocalIP(node.Localrange)
  178. if err != nil {
  179. return err
  180. }
  181. node.Endpoint = node.Localaddress
  182. }
  183. err = config.ModConfig(node)
  184. if err != nil {
  185. return err
  186. }
  187. if node.Ispending {
  188. fmt.Println("Node is marked as PENDING.")
  189. fmt.Println("Awaiting approval from Admin before configuring WireGuard.")
  190. if cfg.Daemon != "off" {
  191. err = local.ConfigureSystemD(cfg.Network)
  192. return err
  193. }
  194. }
  195. peers, hasGateway, gateways, err := server.GetPeers(node.Macaddress, cfg.Network, cfg.Server.GRPCAddress, node.Isdualstack, node.Isingressgateway)
  196. if err != nil {
  197. return err
  198. }
  199. err = wireguard.StorePrivKey(cfg.Node.PrivateKey, cfg.Network)
  200. if err != nil {
  201. return err
  202. }
  203. err = wireguard.InitWireguard(node, cfg.Node.PrivateKey, peers, hasGateway, gateways)
  204. if err != nil {
  205. return err
  206. }
  207. if cfg.Daemon != "off" {
  208. err = local.ConfigureSystemD(cfg.Network)
  209. }
  210. if err != nil {
  211. return err
  212. }
  213. return err
  214. }
  215. //generate an access key value
  216. func GenPass() string {
  217. var seededRand *rand.Rand = rand.New(
  218. rand.NewSource(time.Now().UnixNano()))
  219. length := 16
  220. charset := "abcdefghijklmnopqrstuvwxyz" + "ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
  221. b := make([]byte, length)
  222. for i := range b {
  223. b[i] = charset[seededRand.Intn(len(charset))]
  224. }
  225. return string(b)
  226. }