| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330 | package wireguardimport (	"fmt"	"io/ioutil"	"log"	"os"	"os/exec"	"strconv"	"strings"	"github.com/gravitl/netmaker/models"	"github.com/gravitl/netmaker/netclient/config"	"github.com/gravitl/netmaker/netclient/local"	"github.com/gravitl/netmaker/netclient/server"	"golang.zx2c4.com/wireguard/wgctrl"	"golang.zx2c4.com/wireguard/wgctrl/wgtypes"	//homedir "github.com/mitchellh/go-homedir")func InitWireguard(node *models.Node, privkey string, peers []wgtypes.PeerConfig, hasGateway bool, gateways []string) error {	ipExec, err := exec.LookPath("ip")	if err != nil {		return err	}	key, err := wgtypes.ParseKey(privkey)	if err != nil {		return err	}	wgclient, err := wgctrl.New()	if err != nil {		return err	}	modcfg, err := config.ReadConfig(node.Network)	if err != nil {		return err	}	nodecfg := modcfg.Node	servercfg := modcfg.Server	if err != nil {		log.Fatalf("failed to open client: %v", err)	}	defer wgclient.Close()	ifacename := node.Interface	if nodecfg.Interface != "" {		ifacename = nodecfg.Interface	} else if node.Interface != "" {		ifacename = node.Interface	} else {		log.Fatal("no interface to configure")	}	if node.Address == "" {		log.Fatal("no address to configure")	}	nameserver := servercfg.CoreDNSAddr	network := node.Network	if nodecfg.Network != "" {		network = nodecfg.Network	} else if node.Network != "" {		network = node.Network	}	_, delErr := local.RunCmd("ip link delete dev " + ifacename)	_, addLinkErr := local.RunCmd(ipExec + " link add dev " + ifacename + " type wireguard")	_, addErr := local.RunCmd(ipExec + " address add dev " + ifacename + " " + node.Address + "/24")	if delErr != nil {		// pass	}	if addLinkErr != nil {		log.Println(addLinkErr)	}	if addErr != nil {		log.Println(addErr)	}	var nodeport int	nodeport = int(node.ListenPort)	conf := wgtypes.Config{}	if nodecfg.UDPHolePunch == "yes" &&		nodecfg.IsServer == "no" &&		nodecfg.IsIngressGateway != "yes" &&		nodecfg.IsStatic != "yes" {		conf = wgtypes.Config{			PrivateKey:   &key,			ReplacePeers: true,			Peers:        peers,		}	} else {		conf = wgtypes.Config{			PrivateKey:   &key,			ListenPort:   &nodeport,			ReplacePeers: true,			Peers:        peers,		}	}	_, err = wgclient.Device(ifacename)	if err != nil {		if os.IsNotExist(err) {			fmt.Println("Device does not exist: ")			fmt.Println(err)		} else {			log.Fatalf("Unknown config error: %v", err)		}	}	err = wgclient.ConfigureDevice(ifacename, conf)	if err != nil {		if os.IsNotExist(err) {			fmt.Println("Device does not exist: ")			fmt.Println(err)		} else {			fmt.Printf("This is inconvenient: %v", err)		}	}	//=========DNS Setup==========\\	if nodecfg.DNSOn == "yes" {		_ = local.UpdateDNS(ifacename, network, nameserver)	}	//=========End DNS Setup=======\\	cmdIPLinkUp := &exec.Cmd{		Path:   ipExec,		Args:   []string{ipExec, "link", "set", "up", "dev", ifacename},		Stdout: os.Stdout,		Stderr: os.Stdout,	}	cmdIPLinkDown := &exec.Cmd{		Path:   ipExec,		Args:   []string{ipExec, "link", "set", "down", "dev", ifacename},		Stdout: os.Stdout,		Stderr: os.Stdout,	}	err = cmdIPLinkDown.Run()	if nodecfg.PostDown != "" {		runcmds := strings.Split(nodecfg.PostDown, "; ")		err = local.RunCmds(runcmds)		if err != nil {			fmt.Println("Error encountered running PostDown: " + err.Error())		}	}	err = cmdIPLinkUp.Run()	if err != nil {		return err	}	if nodecfg.PostUp != "" {		runcmds := strings.Split(nodecfg.PostUp, "; ")		err = local.RunCmds(runcmds)		if err != nil {			fmt.Println("Error encountered running PostUp: " + err.Error())		}	}	if hasGateway {		for _, gateway := range gateways {			out, err := local.RunCmd(ipExec + " -4 route add " + gateway + " dev " + ifacename)			fmt.Println(string(out))			if err != nil {				fmt.Println("Error encountered adding gateway: " + err.Error())			}		}	}	if node.Address6 != "" && node.IsDualStack == "yes" {		fmt.Println("Adding address: " + node.Address6)		out, err := local.RunCmd(ipExec + " address add dev " + ifacename + " " + node.Address6 + "/64")		if err != nil {			fmt.Println(out)			fmt.Println("Error encountered adding ipv6: " + err.Error())		}	}	return err}func SetWGKeyConfig(network string, serveraddr string) error {	cfg, err := config.ReadConfig(network)	if err != nil {		return err	}	node := cfg.Node	privatekey, err := wgtypes.GeneratePrivateKey()	if err != nil {		return err	}	privkeystring := privatekey.String()	publickey := privatekey.PublicKey()	node.PublicKey = publickey.String()	err = StorePrivKey(privkeystring, network)	if err != nil {		return err	}	if node.Action == models.NODE_UPDATE_KEY {		node.Action = models.NODE_NOOP	}	err = config.ModConfig(&node)	if err != nil {		return err	}	err = SetWGConfig(network, false)	if err != nil {		return err	}	return err}func SetWGConfig(network string, peerupdate bool) error {	cfg, err := config.ReadConfig(network)	if err != nil {		return err	}	servercfg := cfg.Server	nodecfg := cfg.Node	peers, hasGateway, gateways, err := server.GetPeers(nodecfg.MacAddress, nodecfg.Network, servercfg.GRPCAddress, nodecfg.IsDualStack == "yes", nodecfg.IsIngressGateway == "yes")	if err != nil {		return err	}	privkey, err := RetrievePrivKey(network)	if err != nil {		return err	}	if peerupdate {		SetPeers(nodecfg.Interface, nodecfg.PersistentKeepalive, peers)	} else {		err = InitWireguard(&nodecfg, privkey, peers, hasGateway, gateways)	}	if err != nil {		return err	}	return err}func SetPeers(iface string, keepalive int32, peers []wgtypes.PeerConfig) {	client, err := wgctrl.New()	if err != nil {		log.Println("failed to start wgctrl")		return	}	device, err := client.Device(iface)	if err != nil {		log.Println("failed to parse interface")		return	}	devicePeers := device.Peers	if len(devicePeers) > 1 && len(peers) == 0 {		log.Println("no peers pulled")		return	}	for _, peer := range peers {		for _, currentPeer := range devicePeers {			if currentPeer.AllowedIPs[0].String() == peer.AllowedIPs[0].String() &&				currentPeer.PublicKey.String() != peer.PublicKey.String() {				_, err := local.RunCmd("wg set " + iface + " peer " + currentPeer.PublicKey.String() + " remove")				if err != nil {					log.Println("error removing peer", peer.Endpoint.String())				}			}		}		udpendpoint := peer.Endpoint.String()		var allowedips string		var iparr []string		for _, ipaddr := range peer.AllowedIPs {			iparr = append(iparr, ipaddr.String())		}		allowedips = strings.Join(iparr, ",")		keepAliveString := strconv.Itoa(int(keepalive))		if keepAliveString == "0" {			keepAliveString = "5"		}		if peer.Endpoint != nil {			_, err = local.RunCmd("wg set " + iface + " peer " + peer.PublicKey.String() +				" endpoint " + udpendpoint +				" persistent-keepalive " + keepAliveString +				" allowed-ips " + allowedips)		} else {			_, err = local.RunCmd("wg set " + iface + " peer " + peer.PublicKey.String() +				" persistent-keepalive " + keepAliveString +				" allowed-ips " + allowedips)		}		if err != nil {			log.Println("error setting peer", peer.PublicKey.String(), err)		}	}	for _, currentPeer := range devicePeers {		shouldDelete := true		for _, peer := range peers {			if peer.AllowedIPs[0].String() == currentPeer.AllowedIPs[0].String() {				shouldDelete = false			}		}		if shouldDelete {			_, err := local.RunCmd("wg set " + iface + " peer " + currentPeer.PublicKey.String() + " remove")			if err != nil {				log.Println("error removing peer", currentPeer.PublicKey.String())			} else {				log.Println("removed peer " + currentPeer.PublicKey.String())			}		}	}}func StorePrivKey(key string, network string) error {	d1 := []byte(key)	err := ioutil.WriteFile("/etc/netclient/wgkey-"+network, d1, 0644)	return err}func RetrievePrivKey(network string) (string, error) {	dat, err := ioutil.ReadFile("/etc/netclient/wgkey-" + network)	return string(dat), err}
 |