package functions import ( "context" "encoding/json" "errors" "fmt" "log" "os/exec" nodepb "github.com/gravitl/netmaker/grpc" "github.com/gravitl/netmaker/models" "github.com/gravitl/netmaker/netclient/auth" "github.com/gravitl/netmaker/netclient/config" "github.com/gravitl/netmaker/netclient/daemon" "github.com/gravitl/netmaker/netclient/local" "github.com/gravitl/netmaker/netclient/ncutils" "github.com/gravitl/netmaker/netclient/server" "github.com/gravitl/netmaker/netclient/wireguard" "golang.zx2c4.com/wireguard/wgctrl/wgtypes" "google.golang.org/grpc" ) // JoinNetwork - helps a client join a network func JoinNetwork(cfg config.ClientConfig, privateKey string) error { if cfg.Node.Network == "" { return errors.New("no network provided") } var err error if cfg.Node.IsServer != "yes" { if local.HasNetwork(cfg.Network) { err := errors.New("ALREADY_INSTALLED. Netclient appears to already be installed for " + cfg.Network + ". To re-install, please remove by executing 'sudo netclient leave -n " + cfg.Network + "'. Then re-run the install command.") return err } err = config.Write(&cfg, cfg.Network) if err != nil { return err } if cfg.Node.Password == "" { cfg.Node.Password = ncutils.GenPass() } auth.StoreSecret(cfg.Node.Password, cfg.Node.Network) } if cfg.Node.LocalRange != "" && cfg.Node.LocalAddress == "" { log.Println("local vpn, getting local address from range: " + cfg.Node.LocalRange) cfg.Node.LocalAddress = getLocalIP(cfg.Node) } // set endpoint if blank. set to local if local net, retrieve from function if not if cfg.Node.Endpoint == "" { if cfg.Node.IsLocal == "yes" && cfg.Node.LocalAddress != "" { cfg.Node.Endpoint = cfg.Node.LocalAddress } else { cfg.Node.Endpoint, err = ncutils.GetPublicIP() } if err != nil || cfg.Node.Endpoint == "" { ncutils.Log("Error setting cfg.Node.Endpoint.") return err } } // Generate and set public/private WireGuard Keys if privateKey == "" { wgPrivatekey, err := wgtypes.GeneratePrivateKey() if err != nil { log.Fatal(err) } privateKey = wgPrivatekey.String() cfg.Node.PublicKey = wgPrivatekey.PublicKey().String() } // Find and set node MacAddress if cfg.Node.MacAddress == "" { macs, err := ncutils.GetMacAddr() if err != nil { return err } else if len(macs) == 0 { log.Fatal("could not retrieve mac address") } else { cfg.Node.MacAddress = macs[0] } } if ncutils.IsLinux() { _, err := exec.LookPath("resolvectl") if err != nil { ncutils.PrintLog("resolvectl not present",2) ncutils.PrintLog("unable to configure DNS automatically, disabling automated DNS management",2) cfg.Node.DNSOn = "no" } } // differentiate between client/server here var node models.Node // fill this node with appropriate calls postnode := &models.Node{ Password: cfg.Node.Password, MacAddress: cfg.Node.MacAddress, AccessKey: cfg.Server.AccessKey, Network: cfg.Network, ListenPort: cfg.Node.ListenPort, PostUp: cfg.Node.PostUp, PostDown: cfg.Node.PostDown, PersistentKeepalive: cfg.Node.PersistentKeepalive, LocalAddress: cfg.Node.LocalAddress, Interface: cfg.Node.Interface, PublicKey: cfg.Node.PublicKey, DNSOn: cfg.Node.DNSOn, Name: cfg.Node.Name, Endpoint: cfg.Node.Endpoint, SaveConfig: cfg.Node.SaveConfig, UDPHolePunch: cfg.Node.UDPHolePunch, } if cfg.Node.IsServer != "yes" { ncutils.Log("joining " + cfg.Network + " at " + cfg.Server.GRPCAddress) var wcclient nodepb.NodeServiceClient conn, err := grpc.Dial(cfg.Server.GRPCAddress, ncutils.GRPCRequestOpts(cfg.Server.GRPCSSL)) if err != nil { log.Fatalf("Unable to establish client connection to "+cfg.Server.GRPCAddress+": %v", err) } defer conn.Close() wcclient = nodepb.NewNodeServiceClient(conn) if err = config.ModConfig(postnode); err != nil { return err } data, err := json.Marshal(postnode) if err != nil { return err } // Create node on server res, err := wcclient.CreateNode( context.TODO(), &nodepb.Object{ Data: string(data), Type: nodepb.NODE_TYPE, }, ) if err != nil { return err } ncutils.PrintLog("node created on remote server...updating configs", 1) nodeData := res.Data if err = json.Unmarshal([]byte(nodeData), &node); err != nil { return err } } // get free port based on returned default listen port node.ListenPort, err = ncutils.GetFreePort(node.ListenPort) if err != nil { fmt.Printf("Error retrieving port: %v", err) } // safety check. If returned node from server is local, but not currently configured as local, set to local addr if cfg.Node.IsLocal != "yes" && node.IsLocal == "yes" && node.LocalRange != "" { node.LocalAddress, err = ncutils.GetLocalIP(node.LocalRange) if err != nil { return err } node.Endpoint = node.LocalAddress } if node.IsServer != "yes" { // == handle client side == err = config.ModConfig(&node) if err != nil { return err } err = wireguard.StorePrivKey(privateKey, cfg.Network) if err != nil { return err } if node.IsPending == "yes" { ncutils.Log("Node is marked as PENDING.") ncutils.Log("Awaiting approval from Admin before configuring WireGuard.") if cfg.Daemon != "off" { return daemon.InstallDaemon(cfg) } } // pushing any local changes to server before starting wireguard err = Push(cfg.Network) if err != nil { return err } } ncutils.Log("retrieving peers") peers, hasGateway, gateways, err := server.GetPeers(node.MacAddress, cfg.Network, cfg.Server.GRPCAddress, node.IsDualStack == "yes", node.IsIngressGateway == "yes", node.IsServer == "yes") if err != nil && !ncutils.IsEmptyRecord(err) { ncutils.Log("failed to retrieve peers") return err } ncutils.Log("starting wireguard") err = wireguard.InitWireguard(&node, privateKey, peers, hasGateway, gateways) if err != nil { return err } if cfg.Daemon != "off" { err = daemon.InstallDaemon(cfg) } if err != nil { return err } return err }