common.go 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320
  1. package functions
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "log"
  7. "net"
  8. "os"
  9. "strings"
  10. nodepb "github.com/gravitl/netmaker/grpc"
  11. "github.com/gravitl/netmaker/logger"
  12. "github.com/gravitl/netmaker/models"
  13. "github.com/gravitl/netmaker/netclient/auth"
  14. "github.com/gravitl/netmaker/netclient/config"
  15. "github.com/gravitl/netmaker/netclient/daemon"
  16. "github.com/gravitl/netmaker/netclient/local"
  17. "github.com/gravitl/netmaker/netclient/ncutils"
  18. "github.com/gravitl/netmaker/netclient/wireguard"
  19. "golang.zx2c4.com/wireguard/wgctrl"
  20. "google.golang.org/grpc"
  21. "google.golang.org/grpc/metadata"
  22. )
  23. // ListPorts - lists ports of WireGuard devices
  24. func ListPorts() error {
  25. wgclient, err := wgctrl.New()
  26. if err != nil {
  27. return err
  28. }
  29. defer wgclient.Close()
  30. devices, err := wgclient.Devices()
  31. if err != nil {
  32. return err
  33. }
  34. fmt.Println("Here are your ports:")
  35. for _, i := range devices {
  36. fmt.Println(i.ListenPort)
  37. }
  38. return err
  39. }
  40. func getPrivateAddr() (string, error) {
  41. var local string
  42. conn, err := net.Dial("udp", "8.8.8.8:80")
  43. if err == nil {
  44. defer conn.Close()
  45. localAddr := conn.LocalAddr().(*net.UDPAddr)
  46. localIP := localAddr.IP
  47. local = localIP.String()
  48. }
  49. if local == "" {
  50. local, err = getPrivateAddrBackup()
  51. }
  52. if local == "" {
  53. err = errors.New("could not find local ip")
  54. }
  55. return local, err
  56. }
  57. func getPrivateAddrBackup() (string, error) {
  58. ifaces, err := net.Interfaces()
  59. if err != nil {
  60. return "", err
  61. }
  62. var local string
  63. found := false
  64. for _, i := range ifaces {
  65. if i.Flags&net.FlagUp == 0 {
  66. continue // interface down
  67. }
  68. if i.Flags&net.FlagLoopback != 0 {
  69. continue // loopback interface
  70. }
  71. addrs, err := i.Addrs()
  72. if err != nil {
  73. return "", err
  74. }
  75. for _, addr := range addrs {
  76. var ip net.IP
  77. switch v := addr.(type) {
  78. case *net.IPNet:
  79. if !found {
  80. ip = v.IP
  81. local = ip.String()
  82. found = true
  83. }
  84. case *net.IPAddr:
  85. if !found {
  86. ip = v.IP
  87. local = ip.String()
  88. found = true
  89. }
  90. }
  91. }
  92. }
  93. if !found {
  94. err := errors.New("local ip address not found")
  95. return "", err
  96. }
  97. return local, err
  98. }
  99. // GetNode - gets node locally
  100. func GetNode(network string) models.Node {
  101. modcfg, err := config.ReadConfig(network)
  102. if err != nil {
  103. log.Fatalf("Error: %v", err)
  104. }
  105. return modcfg.Node
  106. }
  107. // Uninstall - uninstalls networks from client
  108. func Uninstall() error {
  109. networks, err := ncutils.GetSystemNetworks()
  110. if err != nil {
  111. logger.Log(1, "unable to retrieve networks: ", err.Error())
  112. logger.Log(1, "continuing uninstall without leaving networks")
  113. } else {
  114. for _, network := range networks {
  115. err = LeaveNetwork(network, true)
  116. if err != nil {
  117. logger.Log(1, "Encounter issue leaving network ", network, ": ", err.Error())
  118. }
  119. }
  120. }
  121. // clean up OS specific stuff
  122. if ncutils.IsWindows() {
  123. daemon.CleanupWindows()
  124. } else if ncutils.IsMac() {
  125. daemon.CleanupMac()
  126. } else if ncutils.IsLinux() {
  127. daemon.CleanupLinux()
  128. } else if ncutils.IsFreeBSD() {
  129. daemon.CleanupFreebsd()
  130. } else if !ncutils.IsKernel() {
  131. logger.Log(1, "manual cleanup required")
  132. }
  133. return err
  134. }
  135. // LeaveNetwork - client exits a network
  136. func LeaveNetwork(network string, force bool) error {
  137. cfg, err := config.ReadConfig(network)
  138. if err != nil {
  139. return err
  140. }
  141. servercfg := cfg.Server
  142. node := cfg.Node
  143. if node.IsServer != "yes" {
  144. var wcclient nodepb.NodeServiceClient
  145. conn, err := grpc.Dial(cfg.Server.GRPCAddress,
  146. ncutils.GRPCRequestOpts(cfg.Server.GRPCSSL))
  147. if err != nil {
  148. log.Printf("Unable to establish client connection to "+servercfg.GRPCAddress+": %v", err)
  149. }
  150. defer conn.Close()
  151. wcclient = nodepb.NewNodeServiceClient(conn)
  152. ctx, err := auth.SetJWT(wcclient, network)
  153. if err != nil {
  154. log.Printf("Failed to authenticate: %v", err)
  155. } else { // handle client side
  156. var header metadata.MD
  157. nodeData, err := json.Marshal(&node)
  158. if err == nil {
  159. _, err = wcclient.DeleteNode(
  160. ctx,
  161. &nodepb.Object{
  162. Data: string(nodeData),
  163. Type: nodepb.NODE_TYPE,
  164. },
  165. grpc.Header(&header),
  166. )
  167. if err != nil {
  168. logger.Log(1, "encountered error deleting node: ", err.Error())
  169. } else {
  170. logger.Log(1, "removed machine from ", node.Network, " network on remote server")
  171. }
  172. }
  173. }
  174. }
  175. wgClient, wgErr := wgctrl.New()
  176. if wgErr == nil {
  177. removeIface := cfg.Node.Interface
  178. if ncutils.IsMac() {
  179. var macIface string
  180. macIface, wgErr = local.GetMacIface(cfg.Node.Address)
  181. if wgErr == nil && removeIface != "" {
  182. removeIface = macIface
  183. }
  184. wgErr = nil
  185. }
  186. dev, devErr := wgClient.Device(removeIface)
  187. if devErr == nil {
  188. local.FlushPeerRoutes(removeIface, cfg.Node.Address, dev.Peers[:])
  189. _, cidr, cidrErr := net.ParseCIDR(cfg.NetworkSettings.AddressRange)
  190. if cidrErr == nil {
  191. local.RemoveCIDRRoute(removeIface, cfg.Node.Address, cidr)
  192. }
  193. } else {
  194. logger.Log(1, "could not flush peer routes when leaving network, ", cfg.Node.Network)
  195. }
  196. }
  197. err = WipeLocal(node.Network)
  198. if err != nil {
  199. logger.Log(1, "unable to wipe local config")
  200. } else {
  201. logger.Log(1, "removed ", node.Network, " network locally")
  202. }
  203. currentNets, err := ncutils.GetSystemNetworks()
  204. if err != nil || len(currentNets) <= 1 {
  205. daemon.Stop() // stop system daemon if last network
  206. return RemoveLocalInstance(cfg, network)
  207. }
  208. return daemon.Restart()
  209. }
  210. // RemoveLocalInstance - remove all netclient files locally for a network
  211. func RemoveLocalInstance(cfg *config.ClientConfig, networkName string) error {
  212. if cfg.Daemon != "off" {
  213. if ncutils.IsWindows() {
  214. // TODO: Remove job?
  215. } else if ncutils.IsMac() {
  216. //TODO: Delete mac daemon
  217. } else if ncutils.IsFreeBSD() {
  218. daemon.RemoveFreebsdDaemon()
  219. } else {
  220. daemon.RemoveSystemDServices()
  221. }
  222. }
  223. return nil
  224. }
  225. // DeleteInterface - delete an interface of a network
  226. func DeleteInterface(ifacename string, postdown string) error {
  227. return wireguard.RemoveConf(ifacename, true)
  228. }
  229. // WipeLocal - wipes local instance
  230. func WipeLocal(network string) error {
  231. cfg, err := config.ReadConfig(network)
  232. if err != nil {
  233. return err
  234. }
  235. nodecfg := cfg.Node
  236. ifacename := nodecfg.Interface
  237. if ifacename != "" {
  238. if err = wireguard.RemoveConf(ifacename, true); err == nil {
  239. logger.Log(1, "removed WireGuard interface: ", ifacename)
  240. } else if strings.Contains(err.Error(), "does not exist") {
  241. err = nil
  242. }
  243. }
  244. home := ncutils.GetNetclientPathSpecific()
  245. if ncutils.FileExists(home + "netconfig-" + network) {
  246. err = os.Remove(home + "netconfig-" + network)
  247. if err != nil {
  248. log.Println("error removing netconfig:")
  249. log.Println(err.Error())
  250. }
  251. }
  252. if ncutils.FileExists(home + "backup.netconfig-" + network) {
  253. err = os.Remove(home + "backup.netconfig-" + network)
  254. if err != nil {
  255. log.Println("error removing backup netconfig:")
  256. log.Println(err.Error())
  257. }
  258. }
  259. if ncutils.FileExists(home + "nettoken-" + network) {
  260. err = os.Remove(home + "nettoken-" + network)
  261. if err != nil {
  262. log.Println("error removing nettoken:")
  263. log.Println(err.Error())
  264. }
  265. }
  266. if ncutils.FileExists(home + "secret-" + network) {
  267. err = os.Remove(home + "secret-" + network)
  268. if err != nil {
  269. log.Println("error removing secret:")
  270. log.Println(err.Error())
  271. }
  272. }
  273. if ncutils.FileExists(home + "traffic-" + network) {
  274. err = os.Remove(home + "traffic-" + network)
  275. if err != nil {
  276. log.Println("error removing traffic key:")
  277. log.Println(err.Error())
  278. }
  279. }
  280. if ncutils.FileExists(home + "wgkey-" + network) {
  281. err = os.Remove(home + "wgkey-" + network)
  282. if err != nil {
  283. log.Println("error removing wgkey:")
  284. log.Println(err.Error())
  285. }
  286. }
  287. if ncutils.FileExists(home + ifacename + ".conf") {
  288. err = os.Remove(home + ifacename + ".conf")
  289. if err != nil {
  290. log.Println("error removing .conf:")
  291. log.Println(err.Error())
  292. }
  293. }
  294. return err
  295. }