mirror of
https://github.com/zerotier/ZeroTierOne.git
synced 2025-07-27 04:32:51 +02:00
More CLI work, link go.mod and go.sum for some Go editors to work.
This commit is contained in:
parent
5dac2e82a7
commit
5ac2596429
5 changed files with 156 additions and 41 deletions
1
go.mod
Symbolic link
1
go.mod
Symbolic link
|
@ -0,0 +1 @@
|
||||||
|
go/go.mod
|
1
go.sum
Symbolic link
1
go.sum
Symbolic link
|
@ -0,0 +1 @@
|
||||||
|
go/go.sum
|
|
@ -80,16 +80,76 @@ func apiDelete(basePath, authToken, urlPath string, result interface{}) int64 {
|
||||||
|
|
||||||
func enabledDisabled(f bool) string {
|
func enabledDisabled(f bool) string {
|
||||||
if f {
|
if f {
|
||||||
return "ENABLED"
|
return "enabled"
|
||||||
}
|
}
|
||||||
return "DISABLED"
|
return "disabled"
|
||||||
|
}
|
||||||
|
|
||||||
|
func allowedBlocked(f bool) string {
|
||||||
|
if f {
|
||||||
|
return "allowed"
|
||||||
|
}
|
||||||
|
return "blocked"
|
||||||
|
}
|
||||||
|
|
||||||
|
// isTrueStringPrefixChars matches things like [Tt]rue, [Yy]es, 1, [Ee]nabled, and [Aa]llowed
|
||||||
|
var isTrueStringPrefixChars = [9]uint8{'t', 'T', 'y', 'Y', '1', 'e', 'E', 'a', 'A'}
|
||||||
|
|
||||||
|
func isTrue(s string) bool {
|
||||||
|
if len(s) > 0 {
|
||||||
|
f := s[0]
|
||||||
|
for _, c := range isTrueStringPrefixChars {
|
||||||
|
if c == f {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
func jsonDump(obj interface{}) string {
|
func jsonDump(obj interface{}) string {
|
||||||
j, _ := json.MarshalIndent(obj, "", " ")
|
j, _ := json.MarshalIndent(obj, "", "\t")
|
||||||
return string(j)
|
return string(j)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// parseAddressFingerprintOrIdentity parses an argument as an address, fingerprint, or identity.
|
||||||
|
// If it's an address, only that return variable is filled out. Fingerprints fill out both address and
|
||||||
|
// fingerprint. Identity fills out all three.
|
||||||
|
func parseAddressFingerprintOrIdentity(s string) (a zerotier.Address, fp *zerotier.Fingerprint, id *zerotier.Identity) {
|
||||||
|
var err error
|
||||||
|
|
||||||
|
s = strings.TrimSpace(s)
|
||||||
|
hasColon := strings.ContainsRune(s, ':')
|
||||||
|
hasDash := strings.ContainsRune(s, '-')
|
||||||
|
|
||||||
|
if len(s) == zerotier.AddressStringLength && !hasColon && !hasDash {
|
||||||
|
a, err = zerotier.NewAddressFromString(s)
|
||||||
|
if err == nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if hasDash {
|
||||||
|
fp, err = zerotier.NewFingerprintFromString(s)
|
||||||
|
if err == nil {
|
||||||
|
a = fp.Address
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if hasColon {
|
||||||
|
id, err = zerotier.NewIdentityFromString(s)
|
||||||
|
if err == nil {
|
||||||
|
a = id.Address()
|
||||||
|
fp = id.Fingerprint()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
a = zerotier.Address(0)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
func readIdentity(s string) *zerotier.Identity {
|
func readIdentity(s string) *zerotier.Identity {
|
||||||
if strings.ContainsRune(s, ':') {
|
if strings.ContainsRune(s, ':') {
|
||||||
id, _ := zerotier.NewIdentityFromString(s)
|
id, _ := zerotier.NewIdentityFromString(s)
|
||||||
|
|
|
@ -17,34 +17,16 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
"zerotier/pkg/zerotier"
|
"zerotier/pkg/zerotier"
|
||||||
)
|
)
|
||||||
|
|
||||||
func Network(basePath, authToken string, args []string, jsonOutput bool) {
|
func showNetwork(nwids string, network *zerotier.APINetwork, jsonOutput bool) {
|
||||||
if len(args) != 1 {
|
|
||||||
Help()
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(args[0]) != zerotier.NetworkIDStringLength {
|
|
||||||
fmt.Printf("ERROR: invalid network ID: %s\n", args[0])
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
nwid, err := strconv.ParseUint(args[0], 16, 64)
|
|
||||||
if err != nil {
|
|
||||||
fmt.Printf("ERROR: invalid network ID: %s\n", args[0])
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
nwids := fmt.Sprintf("%.16x", nwid)
|
|
||||||
|
|
||||||
var network zerotier.APINetwork
|
|
||||||
apiGet(basePath, authToken, "/network/"+nwids, &network)
|
|
||||||
|
|
||||||
if jsonOutput {
|
if jsonOutput {
|
||||||
fmt.Println(jsonDump(&network))
|
fmt.Println(jsonDump(&network))
|
||||||
} else {
|
} else {
|
||||||
fmt.Printf("%s: %s\n", nwids, network.Config.Name)
|
fmt.Printf("%s\t%s\n", nwids, network.Config.Name)
|
||||||
fmt.Printf("\tstatus:\t%s\n", networkStatusStr(network.Config.Status))
|
fmt.Printf("\tstatus:\t%s\n", networkStatusStr(network.Config.Status))
|
||||||
enabled := "no"
|
enabled := "no"
|
||||||
if network.PortEnabled {
|
if network.PortEnabled {
|
||||||
|
@ -78,27 +60,93 @@ func Network(basePath, authToken string, args []string, jsonOutput bool) {
|
||||||
fmt.Printf("->%s", r.Via.String())
|
fmt.Printf("->%s", r.Via.String())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
managedIPs := "disabled"
|
managedIPs := "blocked"
|
||||||
if network.Settings.AllowManagedIPs {
|
if network.Settings.AllowManagedIPs {
|
||||||
managedIPs = "enabled"
|
managedIPs = "allowed"
|
||||||
}
|
}
|
||||||
managedIPsGlobal := "disabled"
|
managedIPsGlobal := "blocked"
|
||||||
if network.Settings.AllowGlobalIPs {
|
if network.Settings.AllowGlobalIPs {
|
||||||
managedIPsGlobal = "enabled"
|
managedIPsGlobal = "allowed"
|
||||||
}
|
}
|
||||||
fmt.Printf("\n\tmanaged address local permissions:\t%s global %s\n", managedIPs, managedIPsGlobal)
|
fmt.Printf("\n\tmanaged address local permissions:\t%s global %s\n", managedIPs, managedIPsGlobal)
|
||||||
managedRoutes := "diabled"
|
managedRoutes := "blocked"
|
||||||
if network.Settings.AllowManagedRoutes {
|
if network.Settings.AllowManagedRoutes {
|
||||||
managedRoutes = "enabled"
|
managedRoutes = "allowed"
|
||||||
}
|
}
|
||||||
managedGlobalRoutes := "disabled"
|
managedGlobalRoutes := "blocked"
|
||||||
if network.Settings.AllowGlobalRoutes {
|
if network.Settings.AllowGlobalRoutes {
|
||||||
managedGlobalRoutes = "enabled"
|
managedGlobalRoutes = "allowed"
|
||||||
}
|
}
|
||||||
managedDefaultRoute := "disabled"
|
managedDefaultRoute := "blocked"
|
||||||
if network.Settings.AllowDefaultRouteOverride {
|
if network.Settings.AllowDefaultRouteOverride {
|
||||||
managedDefaultRoute = "enabled"
|
managedDefaultRoute = "allowed"
|
||||||
}
|
}
|
||||||
fmt.Printf("\tmanaged route local permissions:\t%s global %s default %s\n", managedRoutes, managedGlobalRoutes, managedDefaultRoute)
|
fmt.Printf("\tmanaged route local permissions:\t%s global %s default %s\n", managedRoutes, managedGlobalRoutes, managedDefaultRoute)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func Network(basePath, authToken string, args []string, jsonOutput bool) {
|
||||||
|
if len(args) < 1 {
|
||||||
|
Help()
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(args[0]) != zerotier.NetworkIDStringLength {
|
||||||
|
fmt.Printf("ERROR: invalid network ID: %s\n", args[0])
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
nwid, err := strconv.ParseUint(args[0], 16, 64)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("ERROR: invalid network ID: %s\n", args[0])
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
nwids := fmt.Sprintf("%.16x", nwid)
|
||||||
|
|
||||||
|
var network zerotier.APINetwork
|
||||||
|
apiGet(basePath, authToken, "/network/"+nwids, &network)
|
||||||
|
|
||||||
|
if len(args) == 1 {
|
||||||
|
showNetwork(nwids, &network, jsonOutput)
|
||||||
|
} else {
|
||||||
|
switch args[1] {
|
||||||
|
case "show", "info":
|
||||||
|
showNetwork(nwids, &network, jsonOutput)
|
||||||
|
case "set":
|
||||||
|
if len(args) > 3 {
|
||||||
|
Help()
|
||||||
|
} else if len(args) > 2 {
|
||||||
|
fieldName := strings.ToLower(strings.TrimSpace(args[2]))
|
||||||
|
var field *bool
|
||||||
|
switch fieldName {
|
||||||
|
case "managedips":
|
||||||
|
field = &network.Settings.AllowManagedIPs
|
||||||
|
case "managedroutes":
|
||||||
|
field = &network.Settings.AllowGlobalRoutes
|
||||||
|
case "globalips":
|
||||||
|
field = &network.Settings.AllowGlobalIPs
|
||||||
|
case "globalroutes":
|
||||||
|
field = &network.Settings.AllowGlobalRoutes
|
||||||
|
case "defaultroute":
|
||||||
|
field = &network.Settings.AllowDefaultRouteOverride
|
||||||
|
default:
|
||||||
|
Help()
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(args) == 3 {
|
||||||
|
*field = isTrue(args[2])
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Printf("%s\t%t\n", fieldName, allowedBlocked(*field))
|
||||||
|
} else {
|
||||||
|
fmt.Printf("manageips\t%s\n", allowedBlocked(network.Settings.AllowManagedIPs))
|
||||||
|
fmt.Printf("manageroutes\t%s\n", allowedBlocked(network.Settings.AllowManagedRoutes))
|
||||||
|
fmt.Printf("globalips\t%s\n", allowedBlocked(network.Settings.AllowGlobalIPs))
|
||||||
|
fmt.Printf("globalroutes\t%s\n", allowedBlocked(network.Settings.AllowGlobalRoutes))
|
||||||
|
fmt.Printf("defaultroute\t%s\n", allowedBlocked(network.Settings.AllowDefaultRouteOverride))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
os.Exit(0)
|
||||||
|
}
|
||||||
|
|
|
@ -124,9 +124,6 @@ func main() {
|
||||||
case "status", "info":
|
case "status", "info":
|
||||||
authTokenRequired(authToken)
|
authTokenRequired(authToken)
|
||||||
cli.Status(basePath, authToken, cmdArgs, *jflag)
|
cli.Status(basePath, authToken, cmdArgs, *jflag)
|
||||||
case "peers", "listpeers", "lspeers":
|
|
||||||
authTokenRequired(authToken)
|
|
||||||
cli.Peers(basePath, authToken, cmdArgs, *jflag, false)
|
|
||||||
case "join":
|
case "join":
|
||||||
authTokenRequired(authToken)
|
authTokenRequired(authToken)
|
||||||
cli.Join(basePath, authToken, cmdArgs)
|
cli.Join(basePath, authToken, cmdArgs)
|
||||||
|
@ -139,17 +136,25 @@ func main() {
|
||||||
case "network":
|
case "network":
|
||||||
authTokenRequired(authToken)
|
authTokenRequired(authToken)
|
||||||
cli.Network(basePath, authToken, cmdArgs, *jflag)
|
cli.Network(basePath, authToken, cmdArgs, *jflag)
|
||||||
case "set":
|
case "peers", "listpeers", "lspeers":
|
||||||
authTokenRequired(authToken)
|
authTokenRequired(authToken)
|
||||||
cli.Set(basePath, authToken, cmdArgs)
|
cli.Peers(basePath, authToken, cmdArgs, *jflag, false)
|
||||||
case "identity":
|
case "peer":
|
||||||
cli.Identity(cmdArgs)
|
authTokenRequired(authToken)
|
||||||
|
case "roots":
|
||||||
|
authTokenRequired(authToken)
|
||||||
|
cli.Peers(basePath, authToken, cmdArgs, *jflag, true)
|
||||||
case "root":
|
case "root":
|
||||||
authTokenRequired(authToken)
|
authTokenRequired(authToken)
|
||||||
cli.Root(basePath, authToken, cmdArgs, *jflag)
|
cli.Root(basePath, authToken, cmdArgs, *jflag)
|
||||||
|
case "set":
|
||||||
|
authTokenRequired(authToken)
|
||||||
|
cli.Set(basePath, authToken, cmdArgs)
|
||||||
case "controller":
|
case "controller":
|
||||||
authTokenRequired(authToken)
|
authTokenRequired(authToken)
|
||||||
cli.Controller(basePath, authToken, cmdArgs, *jflag)
|
cli.Controller(basePath, authToken, cmdArgs, *jflag)
|
||||||
|
case "identity":
|
||||||
|
cli.Identity(cmdArgs)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Commands in the 'cli' sub-package do not return, so if we make
|
// Commands in the 'cli' sub-package do not return, so if we make
|
||||||
|
|
Loading…
Add table
Reference in a new issue