2021-08-15 16:56:26 +02:00
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
2022-03-25 13:21:04 +01:00
|
|
|
"context"
|
2022-05-12 11:17:24 +02:00
|
|
|
"fmt"
|
2022-03-26 12:08:54 +01:00
|
|
|
"github.com/netbirdio/netbird/client/internal"
|
|
|
|
"github.com/netbirdio/netbird/client/proto"
|
2022-07-02 12:02:17 +02:00
|
|
|
nbStatus "github.com/netbirdio/netbird/client/status"
|
2022-05-12 11:17:24 +02:00
|
|
|
"github.com/netbirdio/netbird/util"
|
2022-05-27 19:16:58 +02:00
|
|
|
log "github.com/sirupsen/logrus"
|
2022-05-12 11:17:24 +02:00
|
|
|
"github.com/spf13/cobra"
|
|
|
|
"google.golang.org/grpc/codes"
|
|
|
|
gstatus "google.golang.org/grpc/status"
|
2023-01-17 19:16:50 +01:00
|
|
|
"net"
|
|
|
|
"net/netip"
|
|
|
|
"strings"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
invalidInputType int = iota
|
|
|
|
ipInputType
|
|
|
|
interfaceInputType
|
2021-08-15 16:56:26 +02:00
|
|
|
)
|
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
var (
|
|
|
|
foregroundMode bool
|
|
|
|
upCmd = &cobra.Command{
|
|
|
|
Use: "up",
|
|
|
|
Short: "install, login and start Netbird client",
|
|
|
|
RunE: upFunc,
|
|
|
|
}
|
|
|
|
)
|
2022-03-10 18:14:07 +01:00
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
func init() {
|
|
|
|
upCmd.PersistentFlags().BoolVarP(&foregroundMode, "foreground-mode", "F", false, "start service in foreground")
|
|
|
|
}
|
2022-05-22 18:53:47 +02:00
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
func upFunc(cmd *cobra.Command, args []string) error {
|
2023-01-17 19:16:50 +01:00
|
|
|
SetFlagsFromEnvVars(rootCmd)
|
|
|
|
SetFlagsFromEnvVars(cmd)
|
2022-03-10 18:14:07 +01:00
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
cmd.SetOut(cmd.OutOrStdout())
|
2021-10-17 21:34:07 +02:00
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
err := util.InitLog(logLevel, "console")
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed initializing log %v", err)
|
|
|
|
}
|
2021-10-17 21:34:07 +02:00
|
|
|
|
2023-01-17 19:16:50 +01:00
|
|
|
err = validateNATExternalIPs(natExternalIPs)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
ctx := internal.CtxInitState(cmd.Context())
|
2021-10-17 21:34:07 +02:00
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
if foregroundMode {
|
|
|
|
return runInForegroundMode(ctx, cmd)
|
|
|
|
}
|
|
|
|
return runInDaemonMode(ctx, cmd)
|
|
|
|
}
|
2021-10-17 21:34:07 +02:00
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
func runInForegroundMode(ctx context.Context, cmd *cobra.Command) error {
|
|
|
|
err := handleRebrand(cmd)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-01-17 19:16:50 +01:00
|
|
|
customDNSAddressConverted, err := parseCustomDNSAddress(cmd.Flag(dnsResolverAddress).Changed)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
config, err := internal.GetConfig(internal.ConfigInput{
|
2023-01-17 19:16:50 +01:00
|
|
|
ManagementURL: managementURL,
|
|
|
|
AdminURL: adminURL,
|
|
|
|
ConfigPath: configPath,
|
|
|
|
PreSharedKey: &preSharedKey,
|
|
|
|
NATExternalIPs: natExternalIPs,
|
|
|
|
CustomDNSAddress: customDNSAddressConverted,
|
2023-01-16 18:12:51 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("get config file: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
config, _ = internal.UpdateOldManagementPort(ctx, config, configPath)
|
|
|
|
|
|
|
|
err = foregroundLogin(ctx, cmd, config, setupKey)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("foreground login failed: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var cancel context.CancelFunc
|
|
|
|
ctx, cancel = context.WithCancel(ctx)
|
|
|
|
SetupCloseHandler(ctx, cancel)
|
|
|
|
return internal.RunClient(ctx, config, nbStatus.NewRecorder())
|
|
|
|
}
|
2021-10-17 21:34:07 +02:00
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
func runInDaemonMode(ctx context.Context, cmd *cobra.Command) error {
|
2022-05-12 11:17:24 +02:00
|
|
|
|
2023-01-17 19:16:50 +01:00
|
|
|
customDNSAddressConverted, err := parseCustomDNSAddress(cmd.Flag(dnsResolverAddress).Changed)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
conn, err := DialClientGRPCServer(ctx, daemonAddr)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to connect to daemon error: %v\n"+
|
|
|
|
"If the daemon is not running please run: "+
|
|
|
|
"\nnetbird service install \nnetbird service start\n", err)
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
err := conn.Close()
|
2022-05-27 19:16:58 +02:00
|
|
|
if err != nil {
|
2023-01-16 18:12:51 +01:00
|
|
|
log.Warnf("failed closing dameon gRPC client connection %v", err)
|
|
|
|
return
|
2022-05-27 19:16:58 +02:00
|
|
|
}
|
2023-01-16 18:12:51 +01:00
|
|
|
}()
|
2022-05-12 11:17:24 +02:00
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
client := proto.NewDaemonServiceClient(conn)
|
|
|
|
|
|
|
|
status, err := client.Status(ctx, &proto.StatusRequest{})
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to get daemon status: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if status.Status == string(internal.StatusConnected) {
|
|
|
|
cmd.Println("Already connected")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
loginRequest := proto.LoginRequest{
|
2023-01-17 19:16:50 +01:00
|
|
|
SetupKey: setupKey,
|
|
|
|
PreSharedKey: preSharedKey,
|
|
|
|
ManagementUrl: managementURL,
|
2023-02-07 11:40:05 +01:00
|
|
|
AdminURL: adminURL,
|
2023-01-17 19:16:50 +01:00
|
|
|
NatExternalIPs: natExternalIPs,
|
|
|
|
CleanNATExternalIPs: natExternalIPs != nil && len(natExternalIPs) == 0,
|
|
|
|
CustomDNSAddress: customDNSAddressConverted,
|
2023-01-16 18:12:51 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
var loginErr error
|
|
|
|
|
|
|
|
var loginResp *proto.LoginResponse
|
|
|
|
|
|
|
|
err = WithBackOff(func() error {
|
|
|
|
var backOffErr error
|
|
|
|
loginResp, backOffErr = client.Login(ctx, &loginRequest)
|
|
|
|
if s, ok := gstatus.FromError(backOffErr); ok && (s.Code() == codes.InvalidArgument ||
|
|
|
|
s.Code() == codes.PermissionDenied ||
|
|
|
|
s.Code() == codes.NotFound ||
|
|
|
|
s.Code() == codes.Unimplemented) {
|
|
|
|
loginErr = backOffErr
|
|
|
|
return nil
|
2022-05-27 19:16:58 +02:00
|
|
|
}
|
2023-01-16 18:12:51 +01:00
|
|
|
return backOffErr
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("login backoff cycle failed: %v", err)
|
|
|
|
}
|
2022-05-26 15:26:14 +02:00
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
if loginErr != nil {
|
|
|
|
return fmt.Errorf("login failed: %v", loginErr)
|
|
|
|
}
|
2022-05-26 15:26:14 +02:00
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
if loginResp.NeedsSSOLogin {
|
2022-05-27 19:16:58 +02:00
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
openURL(cmd, loginResp.VerificationURIComplete)
|
2021-10-17 21:34:07 +02:00
|
|
|
|
2023-01-16 18:12:51 +01:00
|
|
|
_, err = client.WaitSSOLogin(ctx, &proto.WaitSSOLoginRequest{UserCode: loginResp.UserCode})
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("waiting sso login failed with: %v", err)
|
2021-11-01 09:34:06 +01:00
|
|
|
}
|
2023-01-16 18:12:51 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := client.Up(ctx, &proto.UpRequest{}); err != nil {
|
|
|
|
return fmt.Errorf("call service up method: %v", err)
|
|
|
|
}
|
|
|
|
cmd.Println("Connected")
|
|
|
|
return nil
|
2021-10-17 21:34:07 +02:00
|
|
|
}
|
2023-01-17 19:16:50 +01:00
|
|
|
|
|
|
|
func validateNATExternalIPs(list []string) error {
|
|
|
|
for _, element := range list {
|
|
|
|
if element == "" {
|
|
|
|
return fmt.Errorf("empty string is not a valid input for %s", externalIPMapFlag)
|
|
|
|
}
|
|
|
|
|
|
|
|
subElements := strings.Split(element, "/")
|
|
|
|
if len(subElements) > 2 {
|
|
|
|
return fmt.Errorf("%s is not a valid input for %s. it should be formated as \"String\" or \"String/String\"", element, externalIPMapFlag)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(subElements) == 1 && !isValidIP(subElements[0]) {
|
|
|
|
return fmt.Errorf("%s is not a valid input for %s. it should be formated as \"IP\" or \"IP/IP\", or \"IP/Interface Name\"", element, externalIPMapFlag)
|
|
|
|
}
|
|
|
|
|
|
|
|
last := 0
|
|
|
|
for _, singleElement := range subElements {
|
|
|
|
inputType, err := validateElement(singleElement)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("%s is not a valid input for %s. it should be an IP string or a network name", singleElement, externalIPMapFlag)
|
|
|
|
}
|
|
|
|
if last == interfaceInputType && inputType == interfaceInputType {
|
|
|
|
return fmt.Errorf("%s is not a valid input for %s. it should not contain two interface names", element, externalIPMapFlag)
|
|
|
|
}
|
|
|
|
last = inputType
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func validateElement(element string) (int, error) {
|
|
|
|
if isValidIP(element) {
|
|
|
|
return ipInputType, nil
|
|
|
|
}
|
|
|
|
validIface, err := isValidInterface(element)
|
|
|
|
if err != nil {
|
|
|
|
return invalidInputType, fmt.Errorf("unable to validate the network interface name, error: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if validIface {
|
|
|
|
return interfaceInputType, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return interfaceInputType, fmt.Errorf("invalid IP or network interface name not found")
|
|
|
|
}
|
|
|
|
|
|
|
|
func isValidIP(ip string) bool {
|
|
|
|
return net.ParseIP(ip) != nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func isValidInterface(name string) (bool, error) {
|
|
|
|
netInterfaces, err := net.Interfaces()
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
for _, iface := range netInterfaces {
|
|
|
|
if iface.Name == name {
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseCustomDNSAddress(modified bool) ([]byte, error) {
|
|
|
|
var parsed []byte
|
|
|
|
if modified {
|
|
|
|
if !isValidAddrPort(customDNSAddress) {
|
|
|
|
return nil, fmt.Errorf("%s is invalid, it should be formated as IP:Port string or as an empty string like \"\"", customDNSAddress)
|
|
|
|
}
|
|
|
|
if customDNSAddress == "" && logFile != "console" {
|
|
|
|
parsed = []byte("empty")
|
|
|
|
} else {
|
|
|
|
parsed = []byte(customDNSAddress)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return parsed, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func isValidAddrPort(input string) bool {
|
|
|
|
if input == "" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
_, err := netip.ParseAddrPort(input)
|
|
|
|
return err == nil
|
|
|
|
}
|