config.go 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342
  1. package config
  2. import (
  3. "crypto/ed25519"
  4. "crypto/x509"
  5. "crypto/x509/pkix"
  6. "errors"
  7. "fmt"
  8. "log"
  9. "os"
  10. "sync"
  11. "github.com/gravitl/netmaker/logger"
  12. "github.com/gravitl/netmaker/models"
  13. "github.com/gravitl/netmaker/netclient/global_settings"
  14. "github.com/gravitl/netmaker/netclient/ncutils"
  15. "github.com/urfave/cli/v2"
  16. "gopkg.in/yaml.v3"
  17. )
  18. var (
  19. configLock sync.Mutex
  20. )
  21. // ClientConfig - struct for dealing with client configuration
  22. type ClientConfig struct {
  23. Server models.ServerConfig `yaml:"server"`
  24. Node models.Node `yaml:"node"`
  25. NetworkSettings models.Network `yaml:"networksettings"`
  26. Network string `yaml:"network"`
  27. Daemon string `yaml:"daemon"`
  28. OperatingSystem string `yaml:"operatingsystem"`
  29. AccessKey string `yaml:"accesskey"`
  30. PublicIPService string `yaml:"publicipservice"`
  31. }
  32. // RegisterRequest - struct for registation with netmaker server
  33. type RegisterRequest struct {
  34. Key ed25519.PrivateKey
  35. CommonName pkix.Name
  36. }
  37. // RegisterResponse - the response to register function
  38. type RegisterResponse struct {
  39. CA x509.Certificate
  40. CAPubKey ed25519.PublicKey
  41. Cert x509.Certificate
  42. CertPubKey ed25519.PublicKey
  43. Broker string
  44. Port string
  45. }
  46. // Write - writes the config of a client to disk
  47. func Write(config *ClientConfig, network string) error {
  48. configLock.Lock()
  49. defer configLock.Unlock()
  50. if network == "" {
  51. err := errors.New("no network provided - exiting")
  52. return err
  53. }
  54. _, err := os.Stat(ncutils.GetNetclientPath() + "/config")
  55. if os.IsNotExist(err) {
  56. os.MkdirAll(ncutils.GetNetclientPath()+"/config", 0700)
  57. } else if err != nil {
  58. return err
  59. }
  60. home := ncutils.GetNetclientPathSpecific()
  61. file := fmt.Sprintf(home + "netconfig-" + network)
  62. f, err := os.OpenFile(file, os.O_CREATE|os.O_WRONLY|os.O_TRUNC, os.ModePerm)
  63. if err != nil {
  64. return err
  65. }
  66. defer f.Close()
  67. err = yaml.NewEncoder(f).Encode(config)
  68. if err != nil {
  69. return err
  70. }
  71. return f.Sync()
  72. }
  73. // ConfigFileExists - return true if config file exists
  74. func (config *ClientConfig) ConfigFileExists() bool {
  75. home := ncutils.GetNetclientPathSpecific()
  76. file := fmt.Sprintf(home + "netconfig-" + config.Network)
  77. info, err := os.Stat(file)
  78. if os.IsNotExist(err) {
  79. return false
  80. }
  81. return !info.IsDir()
  82. }
  83. // ClientConfig.ReadConfig - used to read config from client disk into memory
  84. func (config *ClientConfig) ReadConfig() {
  85. network := config.Network
  86. if network == "" {
  87. return
  88. }
  89. //home, err := homedir.Dir()
  90. home := ncutils.GetNetclientPathSpecific()
  91. file := fmt.Sprintf(home + "netconfig-" + network)
  92. //f, err := os.Open(file)
  93. f, err := os.OpenFile(file, os.O_RDONLY, 0600)
  94. if err != nil {
  95. logger.Log(1, "trouble opening file: ", err.Error())
  96. if err = ReplaceWithBackup(network); err != nil {
  97. log.Fatal(err)
  98. }
  99. f.Close()
  100. f, err = os.Open(file)
  101. if err != nil {
  102. log.Fatal(err)
  103. }
  104. }
  105. defer f.Close()
  106. if err := yaml.NewDecoder(f).Decode(&config); err != nil {
  107. logger.Log(0, "no config or invalid, replacing with backup")
  108. if err = ReplaceWithBackup(network); err != nil {
  109. log.Fatal(err)
  110. }
  111. f.Close()
  112. f, err = os.Open(file)
  113. if err != nil {
  114. log.Fatal(err)
  115. }
  116. defer f.Close()
  117. if err := yaml.NewDecoder(f).Decode(&config); err != nil {
  118. log.Fatal(err)
  119. }
  120. }
  121. }
  122. // ModNodeConfig - overwrites the node inside client config on disk
  123. func ModNodeConfig(node *models.Node) error {
  124. network := node.Network
  125. if network == "" {
  126. return errors.New("no network provided")
  127. }
  128. var modconfig ClientConfig
  129. if FileExists(ncutils.GetNetclientPathSpecific() + "netconfig-" + network) {
  130. useconfig, err := ReadConfig(network)
  131. if err != nil {
  132. return err
  133. }
  134. modconfig = *useconfig
  135. }
  136. modconfig.Node = (*node)
  137. modconfig.NetworkSettings = node.NetworkSettings
  138. return Write(&modconfig, network)
  139. }
  140. // ModNodeConfig - overwrites the server settings inside client config on disk
  141. func ModServerConfig(scfg *models.ServerConfig, network string) error {
  142. var modconfig ClientConfig
  143. if FileExists(ncutils.GetNetclientPathSpecific() + "netconfig-" + network) {
  144. useconfig, err := ReadConfig(network)
  145. if err != nil {
  146. return err
  147. }
  148. modconfig = *useconfig
  149. }
  150. modconfig.Server = (*scfg)
  151. return Write(&modconfig, network)
  152. }
  153. // SaveBackup - saves a backup file of a given network
  154. func SaveBackup(network string) error {
  155. var configPath = ncutils.GetNetclientPathSpecific() + "netconfig-" + network
  156. var backupPath = ncutils.GetNetclientPathSpecific() + "backup.netconfig-" + network
  157. if FileExists(configPath) {
  158. input, err := os.ReadFile(configPath)
  159. if err != nil {
  160. logger.Log(0, "failed to read ", configPath, " to make a backup")
  161. return err
  162. }
  163. if err = os.WriteFile(backupPath, input, 0600); err != nil {
  164. logger.Log(0, "failed to copy backup to ", backupPath)
  165. return err
  166. }
  167. }
  168. return nil
  169. }
  170. // ReplaceWithBackup - replaces netconfig file with backup
  171. func ReplaceWithBackup(network string) error {
  172. var backupPath = ncutils.GetNetclientPathSpecific() + "backup.netconfig-" + network
  173. var configPath = ncutils.GetNetclientPathSpecific() + "netconfig-" + network
  174. if FileExists(backupPath) {
  175. input, err := os.ReadFile(backupPath)
  176. if err != nil {
  177. logger.Log(0, "failed to read file ", backupPath, " to backup network: ", network)
  178. return err
  179. }
  180. if err = os.WriteFile(configPath, input, 0600); err != nil {
  181. logger.Log(0, "failed backup ", backupPath, " to ", configPath)
  182. return err
  183. }
  184. }
  185. logger.Log(0, "used backup file for network: ", network)
  186. return nil
  187. }
  188. // GetCLIConfig - gets the cli flags as a config
  189. func GetCLIConfig(c *cli.Context) (ClientConfig, string, error) {
  190. var cfg ClientConfig
  191. if c.String("token") != "" {
  192. accesstoken, err := ParseAccessToken(c.String("token"))
  193. if err != nil {
  194. return cfg, "", err
  195. }
  196. cfg.Network = accesstoken.ClientConfig.Network
  197. cfg.Node.Network = accesstoken.ClientConfig.Network
  198. cfg.AccessKey = accesstoken.ClientConfig.Key
  199. cfg.Node.LocalRange = accesstoken.ClientConfig.LocalRange
  200. //cfg.Server.Server = accesstoken.ServerConfig.Server
  201. cfg.Server.API = accesstoken.APIConnString
  202. if c.String("key") != "" {
  203. cfg.AccessKey = c.String("key")
  204. }
  205. if c.String("network") != "all" {
  206. cfg.Network = c.String("network")
  207. cfg.Node.Network = c.String("network")
  208. }
  209. if c.String("localrange") != "" {
  210. cfg.Node.LocalRange = c.String("localrange")
  211. }
  212. if c.String("corednsaddr") != "" {
  213. cfg.Server.CoreDNSAddr = c.String("corednsaddr")
  214. }
  215. if c.String("apiserver") != "" {
  216. cfg.Server.API = c.String("apiserver")
  217. }
  218. } else {
  219. cfg.AccessKey = c.String("key")
  220. cfg.Network = c.String("network")
  221. cfg.Node.Network = c.String("network")
  222. cfg.Node.LocalRange = c.String("localrange")
  223. cfg.Server.CoreDNSAddr = c.String("corednsaddr")
  224. cfg.Server.API = c.String("apiserver")
  225. }
  226. cfg.PublicIPService = c.String("publicipservice")
  227. // populate the map as we're not running as a daemon so won't be building the map otherwise
  228. // (and the map will be used by GetPublicIP()).
  229. global_settings.PublicIPServices[cfg.Network] = cfg.PublicIPService
  230. cfg.Node.Name = c.String("name")
  231. cfg.Node.Interface = c.String("interface")
  232. cfg.Node.Password = c.String("password")
  233. cfg.Node.MacAddress = c.String("macaddress")
  234. cfg.Node.LocalAddress = c.String("localaddress")
  235. cfg.Node.Address = c.String("address")
  236. cfg.Node.Address6 = c.String("address6")
  237. //cfg.Node.Roaming = c.String("roaming")
  238. cfg.Node.DNSOn = c.String("dnson")
  239. cfg.Node.IsLocal = c.String("islocal")
  240. cfg.Node.IsStatic = c.String("isstatic")
  241. cfg.Node.PostUp = c.String("postup")
  242. cfg.Node.PostDown = c.String("postdown")
  243. cfg.Node.ListenPort = int32(c.Int("port"))
  244. cfg.Node.PersistentKeepalive = int32(c.Int("keepalive"))
  245. cfg.Node.PublicKey = c.String("publickey")
  246. privateKey := c.String("privatekey")
  247. cfg.Node.Endpoint = c.String("endpoint")
  248. cfg.Node.IPForwarding = c.String("ipforwarding")
  249. cfg.OperatingSystem = c.String("operatingsystem")
  250. cfg.Daemon = c.String("daemon")
  251. cfg.Node.UDPHolePunch = c.String("udpholepunch")
  252. cfg.Node.MTU = int32(c.Int("mtu"))
  253. return cfg, privateKey, nil
  254. }
  255. // ReadConfig - reads a config of a client from disk for specified network
  256. func ReadConfig(network string) (*ClientConfig, error) {
  257. if network == "" {
  258. err := errors.New("no network provided - exiting")
  259. return nil, err
  260. }
  261. home := ncutils.GetNetclientPathSpecific()
  262. file := fmt.Sprintf(home + "netconfig-" + network)
  263. f, err := os.Open(file)
  264. if err != nil {
  265. if err = ReplaceWithBackup(network); err != nil {
  266. return nil, err
  267. }
  268. f, err = os.Open(file)
  269. if err != nil {
  270. return nil, err
  271. }
  272. }
  273. defer f.Close()
  274. var cfg ClientConfig
  275. decoder := yaml.NewDecoder(f)
  276. err = decoder.Decode(&cfg)
  277. if err != nil {
  278. if err = ReplaceWithBackup(network); err != nil {
  279. return nil, err
  280. }
  281. f.Close()
  282. f, err = os.Open(file)
  283. if err != nil {
  284. return nil, err
  285. }
  286. defer f.Close()
  287. if err := yaml.NewDecoder(f).Decode(&cfg); err != nil {
  288. return nil, err
  289. }
  290. }
  291. return &cfg, err
  292. }
  293. // FileExists - checks if a file exists on disk
  294. func FileExists(f string) bool {
  295. info, err := os.Stat(f)
  296. if os.IsNotExist(err) {
  297. return false
  298. }
  299. return !info.IsDir()
  300. }
  301. // GetNode - parses a network specified client config for node data
  302. func GetNode(network string) models.Node {
  303. modcfg, err := ReadConfig(network)
  304. if err != nil {
  305. log.Fatalf("Error: %v", err)
  306. }
  307. var node models.Node
  308. node.Fill(&modcfg.Node)
  309. return node
  310. }