mirror of
https://github.com/gravitl/netmaker.git
synced 2025-10-22 08:29:28 +08:00
added udp holepunching
This commit is contained in:
@@ -1,379 +1,385 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"github.com/gravitl/netmaker/netclient/command"
|
||||
"github.com/gravitl/netmaker/netclient/config"
|
||||
"github.com/urfave/cli/v2"
|
||||
"log"
|
||||
"os"
|
||||
"os/exec"
|
||||
"strconv"
|
||||
"errors"
|
||||
"log"
|
||||
"os"
|
||||
"os/exec"
|
||||
"strconv"
|
||||
|
||||
"github.com/gravitl/netmaker/netclient/command"
|
||||
"github.com/gravitl/netmaker/netclient/config"
|
||||
"github.com/urfave/cli/v2"
|
||||
)
|
||||
|
||||
func main() {
|
||||
app := cli.NewApp()
|
||||
app.Name = "Netclient CLI"
|
||||
app.Usage = "Netmaker's netclient agent and CLI. Used to perform interactions with Netmaker server and set local WireGuard config."
|
||||
app.Version = "v0.5.11"
|
||||
app := cli.NewApp()
|
||||
app.Name = "Netclient CLI"
|
||||
app.Usage = "Netmaker's netclient agent and CLI. Used to perform interactions with Netmaker server and set local WireGuard config."
|
||||
app.Version = "v0.5.11"
|
||||
|
||||
cliFlags := []cli.Flag{
|
||||
&cli.StringFlag{
|
||||
Name: "network",
|
||||
Aliases: []string{"n"},
|
||||
EnvVars: []string{"NETCLIENT_NETWORK"},
|
||||
Value: "all",
|
||||
Usage: "Network to perform specified action against.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "password",
|
||||
Aliases: []string{"p"},
|
||||
EnvVars: []string{"NETCLIENT_PASSWORD"},
|
||||
Value: "badpassword",
|
||||
Usage: "Password for authenticating with netmaker.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "endpoint",
|
||||
Aliases: []string{"e"},
|
||||
EnvVars: []string{"NETCLIENT_ENDPOINT"},
|
||||
Value: "",
|
||||
Usage: "Reachable (usually public) address for WireGuard (not the private WG address).",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "macaddress",
|
||||
Aliases: []string{"m"},
|
||||
EnvVars: []string{"NETCLIENT_MACADDRESS"},
|
||||
Value: "",
|
||||
Usage: "Mac Address for this machine. Used as a unique identifier within Netmaker network.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "publickey",
|
||||
Aliases: []string{"pubkey"},
|
||||
EnvVars: []string{"NETCLIENT_PUBLICKEY"},
|
||||
Value: "",
|
||||
Usage: "Public Key for WireGuard Interface.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "privatekey",
|
||||
Aliases: []string{"privkey"},
|
||||
EnvVars: []string{"NETCLIENT_PRIVATEKEY"},
|
||||
Value: "",
|
||||
Usage: "Private Key for WireGuard Interface.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "port",
|
||||
EnvVars: []string{"NETCLIENT_PORT"},
|
||||
Value: "",
|
||||
Usage: "Port for WireGuard Interface.",
|
||||
},
|
||||
&cli.IntFlag{
|
||||
Name: "keepalive",
|
||||
EnvVars: []string{"NETCLIENT_KEEPALIVE"},
|
||||
Value: 0,
|
||||
Usage: "Default PersistentKeepAlive for Peers in WireGuard Interface.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "operatingsystem",
|
||||
Aliases: []string{"os"},
|
||||
EnvVars: []string{"NETCLIENT_OS"},
|
||||
Value: "",
|
||||
Usage: "Identifiable name for machine within Netmaker network.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "name",
|
||||
EnvVars: []string{"NETCLIENT_NAME"},
|
||||
Value: "",
|
||||
Usage: "Identifiable name for machine within Netmaker network.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "localaddress",
|
||||
EnvVars: []string{"NETCLIENT_LOCALADDRESS"},
|
||||
Value: "",
|
||||
Usage: "Local address for machine. Can be used in place of Endpoint for machines on the same LAN.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "address",
|
||||
Aliases: []string{"a"},
|
||||
EnvVars: []string{"NETCLIENT_ADDRESS"},
|
||||
Value: "",
|
||||
Usage: "WireGuard address for machine within Netmaker network.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "addressIPv6",
|
||||
Aliases: []string{"a6"},
|
||||
EnvVars: []string{"NETCLIENT_ADDRESSIPV6"},
|
||||
Value: "",
|
||||
Usage: "WireGuard address for machine within Netmaker network.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "interface",
|
||||
Aliases: []string{"i"},
|
||||
EnvVars: []string{"NETCLIENT_INTERFACE"},
|
||||
Value: "",
|
||||
Usage: "WireGuard local network interface name.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "apiserver",
|
||||
EnvVars: []string{"NETCLIENT_API_SERVER"},
|
||||
Value: "",
|
||||
Usage: "Address + GRPC Port (e.g. 1.2.3.4:50051) of Netmaker server.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "grpcserver",
|
||||
EnvVars: []string{"NETCLIENT_GRPC_SERVER"},
|
||||
Value: "",
|
||||
Usage: "Address + API Port (e.g. 1.2.3.4:8081) of Netmaker server.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "key",
|
||||
Aliases: []string{"k"},
|
||||
EnvVars: []string{"NETCLIENT_ACCESSKEY"},
|
||||
Value: "",
|
||||
Usage: "Access Key for signing up machine with Netmaker server during initial 'add'.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "token",
|
||||
Aliases: []string{"t"},
|
||||
EnvVars: []string{"NETCLIENT_ACCESSTOKEN"},
|
||||
Value: "",
|
||||
Usage: "Access Token for signing up machine with Netmaker server during initial 'add'.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "localrange",
|
||||
EnvVars: []string{"NETCLIENT_LOCALRANGE"},
|
||||
Value: "",
|
||||
Usage: "Local Range if network is local, for instance 192.168.1.0/24.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "dns",
|
||||
EnvVars: []string{"NETCLIENT_DNS"},
|
||||
Value: "on",
|
||||
Usage: "Sets private dns if 'on'. Ignores if 'off'. Will retrieve from network if unset.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "islocal",
|
||||
EnvVars: []string{"NETCLIENT_IS_LOCAL"},
|
||||
Value: "",
|
||||
Usage: "Sets endpoint to local address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "isdualstack",
|
||||
EnvVars: []string{"NETCLIENT_IS_DUALSTACK"},
|
||||
Value: "",
|
||||
Usage: "Sets ipv6 address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "ipforwarding",
|
||||
EnvVars: []string{"NETCLIENT_IPFORWARDING"},
|
||||
Value: "on",
|
||||
Usage: "Sets ip forwarding on if 'on'. Ignores if 'off'. On by default.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "postup",
|
||||
EnvVars: []string{"NETCLIENT_POSTUP"},
|
||||
Value: "",
|
||||
Usage: "Sets PostUp command for WireGuard.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "postdown",
|
||||
EnvVars: []string{"NETCLIENT_POSTDOWN"},
|
||||
Value: "",
|
||||
Usage: "Sets PostDown command for WireGuard.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "daemon",
|
||||
EnvVars: []string{"NETCLIENT_DAEMON"},
|
||||
Value: "on",
|
||||
Usage: "Installs daemon if 'on'. Ignores if 'off'. On by default.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "roaming",
|
||||
EnvVars: []string{"NETCLIENT_ROAMING"},
|
||||
Value: "on",
|
||||
Usage: "Checks for IP changes if 'on'. Ignores if 'off'. On by default.",
|
||||
},
|
||||
}
|
||||
cliFlags := []cli.Flag{
|
||||
&cli.StringFlag{
|
||||
Name: "network",
|
||||
Aliases: []string{"n"},
|
||||
EnvVars: []string{"NETCLIENT_NETWORK"},
|
||||
Value: "all",
|
||||
Usage: "Network to perform specified action against.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "password",
|
||||
Aliases: []string{"p"},
|
||||
EnvVars: []string{"NETCLIENT_PASSWORD"},
|
||||
Value: "badpassword",
|
||||
Usage: "Password for authenticating with netmaker.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "endpoint",
|
||||
Aliases: []string{"e"},
|
||||
EnvVars: []string{"NETCLIENT_ENDPOINT"},
|
||||
Value: "",
|
||||
Usage: "Reachable (usually public) address for WireGuard (not the private WG address).",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "macaddress",
|
||||
Aliases: []string{"m"},
|
||||
EnvVars: []string{"NETCLIENT_MACADDRESS"},
|
||||
Value: "",
|
||||
Usage: "Mac Address for this machine. Used as a unique identifier within Netmaker network.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "publickey",
|
||||
Aliases: []string{"pubkey"},
|
||||
EnvVars: []string{"NETCLIENT_PUBLICKEY"},
|
||||
Value: "",
|
||||
Usage: "Public Key for WireGuard Interface.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "privatekey",
|
||||
Aliases: []string{"privkey"},
|
||||
EnvVars: []string{"NETCLIENT_PRIVATEKEY"},
|
||||
Value: "",
|
||||
Usage: "Private Key for WireGuard Interface.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "port",
|
||||
EnvVars: []string{"NETCLIENT_PORT"},
|
||||
Value: "",
|
||||
Usage: "Port for WireGuard Interface.",
|
||||
},
|
||||
&cli.IntFlag{
|
||||
Name: "keepalive",
|
||||
EnvVars: []string{"NETCLIENT_KEEPALIVE"},
|
||||
Value: 0,
|
||||
Usage: "Default PersistentKeepAlive for Peers in WireGuard Interface.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "operatingsystem",
|
||||
Aliases: []string{"os"},
|
||||
EnvVars: []string{"NETCLIENT_OS"},
|
||||
Value: "",
|
||||
Usage: "Identifiable name for machine within Netmaker network.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "name",
|
||||
EnvVars: []string{"NETCLIENT_NAME"},
|
||||
Value: "",
|
||||
Usage: "Identifiable name for machine within Netmaker network.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "localaddress",
|
||||
EnvVars: []string{"NETCLIENT_LOCALADDRESS"},
|
||||
Value: "",
|
||||
Usage: "Local address for machine. Can be used in place of Endpoint for machines on the same LAN.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "address",
|
||||
Aliases: []string{"a"},
|
||||
EnvVars: []string{"NETCLIENT_ADDRESS"},
|
||||
Value: "",
|
||||
Usage: "WireGuard address for machine within Netmaker network.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "addressIPv6",
|
||||
Aliases: []string{"a6"},
|
||||
EnvVars: []string{"NETCLIENT_ADDRESSIPV6"},
|
||||
Value: "",
|
||||
Usage: "WireGuard address for machine within Netmaker network.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "interface",
|
||||
Aliases: []string{"i"},
|
||||
EnvVars: []string{"NETCLIENT_INTERFACE"},
|
||||
Value: "",
|
||||
Usage: "WireGuard local network interface name.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "apiserver",
|
||||
EnvVars: []string{"NETCLIENT_API_SERVER"},
|
||||
Value: "",
|
||||
Usage: "Address + GRPC Port (e.g. 1.2.3.4:50051) of Netmaker server.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "grpcserver",
|
||||
EnvVars: []string{"NETCLIENT_GRPC_SERVER"},
|
||||
Value: "",
|
||||
Usage: "Address + API Port (e.g. 1.2.3.4:8081) of Netmaker server.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "key",
|
||||
Aliases: []string{"k"},
|
||||
EnvVars: []string{"NETCLIENT_ACCESSKEY"},
|
||||
Value: "",
|
||||
Usage: "Access Key for signing up machine with Netmaker server during initial 'add'.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "token",
|
||||
Aliases: []string{"t"},
|
||||
EnvVars: []string{"NETCLIENT_ACCESSTOKEN"},
|
||||
Value: "",
|
||||
Usage: "Access Token for signing up machine with Netmaker server during initial 'add'.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "localrange",
|
||||
EnvVars: []string{"NETCLIENT_LOCALRANGE"},
|
||||
Value: "",
|
||||
Usage: "Local Range if network is local, for instance 192.168.1.0/24.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "dns",
|
||||
EnvVars: []string{"NETCLIENT_DNS"},
|
||||
Value: "on",
|
||||
Usage: "Sets private dns if 'on'. Ignores if 'off'. Will retrieve from network if unset.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "islocal",
|
||||
EnvVars: []string{"NETCLIENT_IS_LOCAL"},
|
||||
Value: "",
|
||||
Usage: "Sets endpoint to local address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "isdualstack",
|
||||
EnvVars: []string{"NETCLIENT_IS_DUALSTACK"},
|
||||
Value: "",
|
||||
Usage: "Sets ipv6 address if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "udpholepunch",
|
||||
EnvVars: []string{"NETCLIENT_UDP_HOLEPUNCH"},
|
||||
Value: "",
|
||||
Usage: "Turns on udp holepunching if 'yes'. Ignores if 'no'. Will retrieve from network if unset.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "ipforwarding",
|
||||
EnvVars: []string{"NETCLIENT_IPFORWARDING"},
|
||||
Value: "on",
|
||||
Usage: "Sets ip forwarding on if 'on'. Ignores if 'off'. On by default.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "postup",
|
||||
EnvVars: []string{"NETCLIENT_POSTUP"},
|
||||
Value: "",
|
||||
Usage: "Sets PostUp command for WireGuard.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "postdown",
|
||||
EnvVars: []string{"NETCLIENT_POSTDOWN"},
|
||||
Value: "",
|
||||
Usage: "Sets PostDown command for WireGuard.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "daemon",
|
||||
EnvVars: []string{"NETCLIENT_DAEMON"},
|
||||
Value: "on",
|
||||
Usage: "Installs daemon if 'on'. Ignores if 'off'. On by default.",
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "roaming",
|
||||
EnvVars: []string{"NETCLIENT_ROAMING"},
|
||||
Value: "on",
|
||||
Usage: "Checks for IP changes if 'on'. Ignores if 'off'. On by default.",
|
||||
},
|
||||
}
|
||||
|
||||
app.Commands = []*cli.Command{
|
||||
{
|
||||
Name: "register",
|
||||
Usage: "Register with Netmaker Server for secure GRPC communications.",
|
||||
Flags: cliFlags,
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfigRegister(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if cfg.GRPCWireGuard == "off" {
|
||||
log.Println("Server is not using WireGuard to secure GRPC. Skipping.")
|
||||
return err
|
||||
}
|
||||
if cfg.Client.ServerPrivateAddress == "" {
|
||||
err = errors.New("No server address provided.")
|
||||
return err
|
||||
}
|
||||
err = command.Register(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "join",
|
||||
Usage: "Join a Netmaker network.",
|
||||
Flags: cliFlags,
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfig(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if cfg.Network == "all" {
|
||||
err = errors.New("No network provided.")
|
||||
return err
|
||||
}
|
||||
if cfg.Server.GRPCAddress == "" {
|
||||
err = errors.New("No server address provided.")
|
||||
return err
|
||||
}
|
||||
err = command.Join(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "leave",
|
||||
Usage: "Leave a Netmaker network.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfig(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = command.Leave(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "checkin",
|
||||
Usage: "Checks for local changes and then checks into the specified Netmaker network to ask about remote changes.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfig(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = command.CheckIn(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "push",
|
||||
Usage: "Push configuration changes to server.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfig(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = command.Push(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "pull",
|
||||
Usage: "Pull latest configuration and peers from server.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfig(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = command.Pull(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "list",
|
||||
Usage: "Get list of networks.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfig(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = command.List(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "uninstall",
|
||||
Usage: "Uninstall the netclient system service.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.ReadGlobalConfig()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
var gconf config.GlobalConfig
|
||||
gconf = *cfg
|
||||
err = command.Uninstall(gconf)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "unregister",
|
||||
Usage: "Unregister the netclient from secure server GRPC.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.ReadGlobalConfig()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
var gconf config.GlobalConfig
|
||||
gconf = *cfg
|
||||
err = command.Unregister(gconf)
|
||||
return err
|
||||
},
|
||||
},
|
||||
}
|
||||
app.Commands = []*cli.Command{
|
||||
{
|
||||
Name: "register",
|
||||
Usage: "Register with Netmaker Server for secure GRPC communications.",
|
||||
Flags: cliFlags,
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfigRegister(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if cfg.GRPCWireGuard == "off" {
|
||||
log.Println("Server is not using WireGuard to secure GRPC. Skipping.")
|
||||
return err
|
||||
}
|
||||
if cfg.Client.ServerPrivateAddress == "" {
|
||||
err = errors.New("No server address provided.")
|
||||
return err
|
||||
}
|
||||
err = command.Register(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "join",
|
||||
Usage: "Join a Netmaker network.",
|
||||
Flags: cliFlags,
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfig(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if cfg.Network == "all" {
|
||||
err = errors.New("No network provided.")
|
||||
return err
|
||||
}
|
||||
if cfg.Server.GRPCAddress == "" {
|
||||
err = errors.New("No server address provided.")
|
||||
return err
|
||||
}
|
||||
err = command.Join(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "leave",
|
||||
Usage: "Leave a Netmaker network.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfig(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = command.Leave(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "checkin",
|
||||
Usage: "Checks for local changes and then checks into the specified Netmaker network to ask about remote changes.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfig(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = command.CheckIn(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "push",
|
||||
Usage: "Push configuration changes to server.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfig(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = command.Push(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "pull",
|
||||
Usage: "Pull latest configuration and peers from server.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfig(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = command.Pull(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "list",
|
||||
Usage: "Get list of networks.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.GetCLIConfig(c)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = command.List(cfg)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "uninstall",
|
||||
Usage: "Uninstall the netclient system service.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.ReadGlobalConfig()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
var gconf config.GlobalConfig
|
||||
gconf = *cfg
|
||||
err = command.Uninstall(gconf)
|
||||
return err
|
||||
},
|
||||
},
|
||||
{
|
||||
Name: "unregister",
|
||||
Usage: "Unregister the netclient from secure server GRPC.",
|
||||
Flags: cliFlags,
|
||||
// the action, or code that will be executed when
|
||||
// we execute our `ns` command
|
||||
Action: func(c *cli.Context) error {
|
||||
cfg, err := config.ReadGlobalConfig()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
var gconf config.GlobalConfig
|
||||
gconf = *cfg
|
||||
err = command.Unregister(gconf)
|
||||
return err
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
// start our application
|
||||
getID := exec.Command("id", "-u")
|
||||
out, err := getID.Output()
|
||||
// start our application
|
||||
getID := exec.Command("id", "-u")
|
||||
out, err := getID.Output()
|
||||
|
||||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
id, err := strconv.Atoi(string(out[:len(out)-1]))
|
||||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
id, err := strconv.Atoi(string(out[:len(out)-1]))
|
||||
|
||||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
|
||||
if id != 0 {
|
||||
log.Fatal("This program must be run with elevated privileges (sudo). This program installs a SystemD service and configures WireGuard and networking rules. Please re-run with sudo/root.")
|
||||
}
|
||||
if id != 0 {
|
||||
log.Fatal("This program must be run with elevated privileges (sudo). This program installs a SystemD service and configures WireGuard and networking rules. Please re-run with sudo/root.")
|
||||
}
|
||||
|
||||
_, err = exec.LookPath("wg")
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
log.Fatal("WireGuard not installed. Please install WireGuard (wireguard-tools) and try again.")
|
||||
}
|
||||
|
||||
_, err = exec.LookPath("wg")
|
||||
if err != nil {
|
||||
log.Println(err)
|
||||
log.Fatal("WireGuard not installed. Please install WireGuard (wireguard-tools) and try again.")
|
||||
}
|
||||
|
||||
err = app.Run(os.Args)
|
||||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
err = app.Run(os.Args)
|
||||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
Reference in New Issue
Block a user