123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256 |
- package functions
- import (
- "google.golang.org/grpc/credentials"
- "crypto/tls"
- "fmt"
- "errors"
- "context"
- "log"
- "net"
- "math/rand"
- "time"
- "github.com/gravitl/netmaker/netclient/config"
- "github.com/gravitl/netmaker/netclient/wireguard"
- "github.com/gravitl/netmaker/netclient/server"
- "github.com/gravitl/netmaker/netclient/local"
- nodepb "github.com/gravitl/netmaker/grpc"
- "golang.zx2c4.com/wireguard/wgctrl"
- "google.golang.org/grpc"
- "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
- //homedir "github.com/mitchellh/go-homedir"
- )
- func JoinNetwork(cfg config.ClientConfig) error {
- hasnet := local.HasNetwork(cfg.Network)
- if hasnet {
- err := errors.New("ALREADY_INSTALLED. Netclient appears to already be installed for " + cfg.Network + ". To re-install, please remove by executing 'sudo netclient leave -n " + cfg.Network + "'. Then re-run the install command.")
- return err
- }
- log.Println("attempting to join " + cfg.Network + " at " + cfg.Server.GRPCAddress)
- err := config.Write(&cfg, cfg.Network)
- if err != nil {
- return err
- }
- wgclient, err := wgctrl.New()
- if err != nil {
- return err
- }
- defer wgclient.Close()
- if cfg.Node.Network == "" {
- return errors.New("no network provided")
- }
- if cfg.Node.LocalRange != "" {
- if cfg.Node.LocalAddress == "" {
- log.Println("local vpn, getting local address from range: " + cfg.Node.LocalRange)
- ifaces, err := net.Interfaces()
- if err != nil {
- return err
- }
- _, localrange, err := net.ParseCIDR(cfg.Node.LocalRange)
- if err != nil {
- return err
- }
- var local string
- found := false
- for _, i := range ifaces {
- if i.Flags&net.FlagUp == 0 {
- continue // interface down
- }
- if i.Flags&net.FlagLoopback != 0 {
- continue // loopback interface
- }
- addrs, err := i.Addrs()
- if err != nil {
- return err
- }
- for _, addr := range addrs {
- var ip net.IP
- switch v := addr.(type) {
- case *net.IPNet:
- if !found {
- ip = v.IP
- local = ip.String()
- if cfg.Node.IsLocal == "yes" {
- found = localrange.Contains(ip)
- } else {
- found = true
- }
- }
- case *net.IPAddr:
- if !found {
- ip = v.IP
- local = ip.String()
- if cfg.Node.IsLocal == "yes" {
- found = localrange.Contains(ip)
- } else {
- found = true
- }
- }
- }
- }
- }
- cfg.Node.LocalAddress = local
- }
- }
- if cfg.Node.Password == "" {
- cfg.Node.Password = GenPass()
- }
- if cfg.Node.Endpoint == "" {
- if cfg.Node.IsLocal == "yes" && cfg.Node.LocalAddress != "" {
- cfg.Node.Endpoint = cfg.Node.LocalAddress
- } else {
- cfg.Node.Endpoint, err = getPublicIP()
- if err != nil {
- fmt.Println("Error setting cfg.Node.Endpoint.")
- return err
- }
- }
- } else {
- cfg.Node.Endpoint = cfg.Node.Endpoint
- }
- if cfg.Node.PrivateKey == "" {
- privatekey, err := wgtypes.GeneratePrivateKey()
- if err != nil {
- log.Fatal(err)
- }
- cfg.Node.PrivateKey = privatekey.String()
- cfg.Node.PublicKey = privatekey.PublicKey().String()
- }
- if cfg.Node.MacAddress == "" {
- macs, err := getMacAddr()
- if err != nil {
- return err
- } else if len(macs) == 0 {
- log.Fatal()
- } else {
- cfg.Node.MacAddress = macs[0]
- }
- }
- if cfg.Node.Port == 0 {
- cfg.Node.Port, err = GetFreePort(51821)
- if err != nil {
- fmt.Printf("Error retrieving port: %v", err)
- }
- }
- var wcclient nodepb.NodeServiceClient
- var requestOpts grpc.DialOption
- requestOpts = grpc.WithInsecure()
- if cfg.Server.GRPCSSL == "on" {
- h2creds := credentials.NewTLS(&tls.Config{NextProtos: []string{"h2"}})
- requestOpts = grpc.WithTransportCredentials(h2creds)
- }
- conn, err := grpc.Dial(cfg.Server.GRPCAddress, requestOpts)
- if err != nil {
- log.Fatalf("Unable to establish client connection to " + cfg.Server.GRPCAddress + ": %v", err)
- }
- wcclient = nodepb.NewNodeServiceClient(conn)
- postnode := &nodepb.Node{
- Password: cfg.Node.Password,
- Macaddress: cfg.Node.MacAddress,
- Accesskey: cfg.Server.AccessKey,
- Nodenetwork: cfg.Network,
- Listenport: cfg.Node.Port,
- Postup: cfg.Node.PostUp,
- Postdown: cfg.Node.PostDown,
- Keepalive: cfg.Node.KeepAlive,
- Localaddress: cfg.Node.LocalAddress,
- Interface: cfg.Node.Interface,
- Publickey: cfg.Node.PublicKey,
- Name: cfg.Node.Name,
- Endpoint: cfg.Node.Endpoint,
- }
- err = config.ModConfig(postnode)
- if err != nil {
- return err
- }
- res, err := wcclient.CreateNode(
- context.TODO(),
- &nodepb.CreateNodeReq{
- Node: postnode,
- },
- )
- if err != nil {
- return err
- }
- log.Println("node created on remote server...updating configs")
- node := res.Node
- if err != nil {
- return err
- }
- if node.Dnsoff==true {
- cfg.Node.DNS = "yes"
- }
- if !(cfg.Node.IsLocal == "yes") && node.Islocal && node.Localrange != "" {
- node.Localaddress, err = getLocalIP(node.Localrange)
- if err != nil {
- return err
- }
- node.Endpoint = node.Localaddress
- }
- err = config.ModConfig(node)
- if err != nil {
- return err
- }
- if node.Ispending {
- fmt.Println("Node is marked as PENDING.")
- fmt.Println("Awaiting approval from Admin before configuring WireGuard.")
- if cfg.Daemon != "off" {
- err = local.ConfigureSystemD(cfg.Network)
- return err
- }
- }
- log.Println("retrieving remote peers")
- peers, hasGateway, gateways, err := server.GetPeers(node.Macaddress, cfg.Network, cfg.Server.GRPCAddress, node.Isdualstack, node.Isingressgateway)
- if err != nil {
- log.Println("failed to retrieve peers")
- return err
- }
- err = wireguard.StorePrivKey(cfg.Node.PrivateKey, cfg.Network)
- if err != nil {
- return err
- }
- log.Println("starting wireguard")
- err = wireguard.InitWireguard(node, cfg.Node.PrivateKey, peers, hasGateway, gateways)
- if err != nil {
- return err
- }
- if cfg.Daemon != "off" {
- err = local.ConfigureSystemD(cfg.Network)
- }
- if err != nil {
- return err
- }
- return err
- }
- //generate an access key value
- func GenPass() string {
- var seededRand *rand.Rand = rand.New(
- rand.NewSource(time.Now().UnixNano()))
- length := 16
- charset := "abcdefghijklmnopqrstuvwxyz" + "ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
- b := make([]byte, length)
- for i := range b {
- b[i] = charset[seededRand.Intn(len(charset))]
- }
- return string(b)
- }
|