mirror of
https://github.com/gravitl/netmaker.git
synced 2024-11-11 10:10:46 +08:00
374 lines
12 KiB
Go
374 lines
12 KiB
Go
package main
|
|
|
|
import (
|
|
"errors"
|
|
"os/exec"
|
|
"strconv"
|
|
"github.com/urfave/cli/v2"
|
|
"os"
|
|
"github.com/gravitl/netmaker/netclient/command"
|
|
"github.com/gravitl/netmaker/netclient/config"
|
|
"log"
|
|
)
|
|
|
|
func main() {
|
|
app := cli.NewApp()
|
|
app.Name = "Netclient CLI"
|
|
app.Usage = "Netmaker's netclient agent and CLI. Used to perform interactions with Netmaker server and set local WireGuard config."
|
|
|
|
cliFlags := []cli.Flag{
|
|
&cli.StringFlag{
|
|
Name: "network",
|
|
Aliases: []string{"n"},
|
|
EnvVars: []string{"NETCLIENT_NETWORK"},
|
|
Value: "all",
|
|
Usage: "Network to perform specified action against.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "password",
|
|
Aliases: []string{"p"},
|
|
EnvVars: []string{"NETCLIENT_PASSWORD"},
|
|
Value: "badpassword",
|
|
Usage: "Password for authenticating with netmaker.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "endpoint",
|
|
Aliases: []string{"e"},
|
|
EnvVars: []string{"NETCLIENT_ENDPOINT"},
|
|
Value: "",
|
|
Usage: "Reachable (usually public) address for WireGuard (not the private WG address).",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "macaddress",
|
|
Aliases: []string{"m"},
|
|
EnvVars: []string{"NETCLIENT_MACADDRESS"},
|
|
Value: "",
|
|
Usage: "Mac Address for this machine. Used as a unique identifier within Netmaker network.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "publickey",
|
|
Aliases: []string{"pubkey"},
|
|
EnvVars: []string{"NETCLIENT_PUBLICKEY"},
|
|
Value: "",
|
|
Usage: "Public Key for WireGuard Interface.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "privatekey",
|
|
Aliases: []string{"privkey"},
|
|
EnvVars: []string{"NETCLIENT_PRIVATEKEY"},
|
|
Value: "",
|
|
Usage: "Private Key for WireGuard Interface.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "port",
|
|
EnvVars: []string{"NETCLIENT_PORT"},
|
|
Value: "",
|
|
Usage: "Port for WireGuard Interface.",
|
|
},
|
|
&cli.IntFlag{
|
|
Name: "keepalive",
|
|
EnvVars: []string{"NETCLIENT_KEEPALIVE"},
|
|
Value: 0,
|
|
Usage: "Default PersistentKeepAlive for Peers in WireGuard Interface.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "operatingsystem",
|
|
Aliases: []string{"os"},
|
|
EnvVars: []string{"NETCLIENT_OS"},
|
|
Value: "",
|
|
Usage: "Identifiable name for machine within Netmaker network.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "name",
|
|
EnvVars: []string{"NETCLIENT_NAME"},
|
|
Value: "",
|
|
Usage: "Identifiable name for machine within Netmaker network.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "localaddress",
|
|
EnvVars: []string{"NETCLIENT_LOCALADDRESS"},
|
|
Value: "",
|
|
Usage: "Local address for machine. Can be used in place of Endpoint for machines on the same LAN.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "address",
|
|
Aliases: []string{"a"},
|
|
EnvVars: []string{"NETCLIENT_ADDRESS"},
|
|
Value: "",
|
|
Usage: "WireGuard address for machine within Netmaker network.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "addressIPv6",
|
|
Aliases: []string{"a6"},
|
|
EnvVars: []string{"NETCLIENT_ADDRESSIPV6"},
|
|
Value: "",
|
|
Usage: "WireGuard address for machine within Netmaker network.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "interface",
|
|
Aliases: []string{"i"},
|
|
EnvVars: []string{"NETCLIENT_INTERFACE"},
|
|
Value: "",
|
|
Usage: "WireGuard local network interface name.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "apiserver",
|
|
EnvVars: []string{"NETCLIENT_API_SERVER"},
|
|
Value: "",
|
|
Usage: "Address + GRPC Port (e.g. 1.2.3.4:50051) of Netmaker server.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "grpcserver",
|
|
EnvVars: []string{"NETCLIENT_GRPC_SERVER"},
|
|
Value: "",
|
|
Usage: "Address + API Port (e.g. 1.2.3.4:8081) of Netmaker server.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "key",
|
|
Aliases: []string{"k"},
|
|
EnvVars: []string{"NETCLIENT_ACCESSKEY"},
|
|
Value: "",
|
|
Usage: "Access Key for signing up machine with Netmaker server during initial 'add'.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "token",
|
|
Aliases: []string{"t"},
|
|
EnvVars: []string{"NETCLIENT_ACCESSTOKEN"},
|
|
Value: "",
|
|
Usage: "Access Token for signing up machine with Netmaker server during initial 'add'.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "localrange",
|
|
EnvVars: []string{"NETCLIENT_LOCALRANGE"},
|
|
Value: "",
|
|
Usage: "Local Range if network is local, for instance 192.168.1.0/24.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "dns",
|
|
EnvVars: []string{"NETCLIENT_DNS"},
|
|
Value: "on",
|
|
Usage: "Sets private dns if 'on'. Ignores if 'off'. Will retrieve from network if unset.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "islocal",
|
|
EnvVars: []string{"NETCLIENT_IS_LOCAL"},
|
|
Value: "",
|
|
Usage: "Sets endpoint to local address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "isdualstack",
|
|
EnvVars: []string{"NETCLIENT_IS_DUALSTACK"},
|
|
Value: "",
|
|
Usage: "Sets ipv6 address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "ipforwarding",
|
|
EnvVars: []string{"NETCLIENT_IPFORWARDING"},
|
|
Value: "on",
|
|
Usage: "Sets ip forwarding on if 'on'. Ignores if 'off'. On by default.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "postup",
|
|
EnvVars: []string{"NETCLIENT_POSTUP"},
|
|
Value: "",
|
|
Usage: "Sets PostUp command for WireGuard.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "postdown",
|
|
EnvVars: []string{"NETCLIENT_POSTDOWN"},
|
|
Value: "",
|
|
Usage: "Sets PostDown command for WireGuard.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "daemon",
|
|
EnvVars: []string{"NETCLIENT_DAEMON"},
|
|
Value: "on",
|
|
Usage: "Installs daemon if 'on'. Ignores if 'off'. On by default.",
|
|
},
|
|
&cli.StringFlag{
|
|
Name: "roaming",
|
|
EnvVars: []string{"NETCLIENT_ROAMING"},
|
|
Value: "on",
|
|
Usage: "Checks for IP changes if 'on'. Ignores if 'off'. On by default.",
|
|
},
|
|
}
|
|
|
|
app.Commands = []*cli.Command{
|
|
{
|
|
Name: "register",
|
|
Usage: "Register with Netmaker Server for secure GRPC communications.",
|
|
Flags: cliFlags,
|
|
Action: func(c *cli.Context) error {
|
|
cfg, err := config.GetCLIConfigRegister(c)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if cfg.Client.ServerPrivateAddress == "" {
|
|
err = errors.New("No server address provided.")
|
|
return err
|
|
}
|
|
err = command.Register(cfg)
|
|
return err
|
|
},
|
|
},
|
|
{
|
|
Name: "join",
|
|
Usage: "Join a Netmaker network.",
|
|
Flags: cliFlags,
|
|
Action: func(c *cli.Context) error {
|
|
cfg, err := config.GetCLIConfig(c)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if cfg.Network == "all" {
|
|
err = errors.New("No network provided.")
|
|
return err
|
|
}
|
|
if cfg.Server.GRPCAddress == "" {
|
|
err = errors.New("No server address provided.")
|
|
return err
|
|
}
|
|
err = command.Join(cfg)
|
|
return err
|
|
},
|
|
},
|
|
{
|
|
Name: "leave",
|
|
Usage: "Leave a Netmaker network.",
|
|
Flags: cliFlags,
|
|
// the action, or code that will be executed when
|
|
// we execute our `ns` command
|
|
Action: func(c *cli.Context) error {
|
|
cfg, err := config.GetCLIConfig(c)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = command.Leave(cfg)
|
|
return err
|
|
},
|
|
},
|
|
{
|
|
Name: "checkin",
|
|
Usage: "Checks for local changes and then checks into the specified Netmaker network to ask about remote changes.",
|
|
Flags: cliFlags,
|
|
// the action, or code that will be executed when
|
|
// we execute our `ns` command
|
|
Action: func(c *cli.Context) error {
|
|
cfg, err := config.GetCLIConfig(c)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = command.CheckIn(cfg)
|
|
return err
|
|
},
|
|
},
|
|
{
|
|
Name: "push",
|
|
Usage: "Push configuration changes to server.",
|
|
Flags: cliFlags,
|
|
// the action, or code that will be executed when
|
|
// we execute our `ns` command
|
|
Action: func(c *cli.Context) error {
|
|
cfg, err := config.GetCLIConfig(c)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = command.Push(cfg)
|
|
return err
|
|
},
|
|
},
|
|
{
|
|
Name: "pull",
|
|
Usage: "Pull latest configuration and peers from server.",
|
|
Flags: cliFlags,
|
|
// the action, or code that will be executed when
|
|
// we execute our `ns` command
|
|
Action: func(c *cli.Context) error {
|
|
cfg, err := config.GetCLIConfig(c)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = command.Pull(cfg)
|
|
return err
|
|
},
|
|
},
|
|
{
|
|
Name: "list",
|
|
Usage: "Get list of networks.",
|
|
Flags: cliFlags,
|
|
// the action, or code that will be executed when
|
|
// we execute our `ns` command
|
|
Action: func(c *cli.Context) error {
|
|
cfg, err := config.GetCLIConfig(c)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = command.List(cfg)
|
|
return err
|
|
},
|
|
},
|
|
{
|
|
Name: "uninstall",
|
|
Usage: "Uninstall the netclient system service.",
|
|
Flags: cliFlags,
|
|
// the action, or code that will be executed when
|
|
// we execute our `ns` command
|
|
Action: func(c *cli.Context) error {
|
|
cfg, err := config.ReadGlobalConfig()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
var gconf config.GlobalConfig
|
|
gconf = *cfg
|
|
err = command.Uninstall(gconf)
|
|
return err
|
|
},
|
|
},
|
|
{
|
|
Name: "unregister",
|
|
Usage: "Unregister the netclient from secure server GRPC.",
|
|
Flags: cliFlags,
|
|
// the action, or code that will be executed when
|
|
// we execute our `ns` command
|
|
Action: func(c *cli.Context) error {
|
|
cfg, err := config.ReadGlobalConfig()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
var gconf config.GlobalConfig
|
|
gconf = *cfg
|
|
err = command.Unregister(gconf)
|
|
return err
|
|
},
|
|
},
|
|
}
|
|
|
|
// start our application
|
|
getID := exec.Command("id", "-u")
|
|
out, err := getID.Output()
|
|
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
id, err := strconv.Atoi(string(out[:len(out)-1]))
|
|
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
if id != 0 {
|
|
log.Fatal("This program must be run with elevated privileges (sudo). This program installs a SystemD service and configures WireGuard and networking rules. Please re-run with sudo/root.")
|
|
}
|
|
|
|
|
|
_, err = exec.LookPath("wg")
|
|
if err != nil {
|
|
log.Println(err)
|
|
log.Fatal("WireGuard not installed. Please install WireGuard (wireguard-tools) and try again.")
|
|
}
|
|
|
|
err = app.Run(os.Args)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
}
|