register.go 2.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586
  1. package functions
  2. import (
  3. "bytes"
  4. "crypto/ed25519"
  5. "crypto/rand"
  6. "encoding/json"
  7. "errors"
  8. "log"
  9. "net/http"
  10. "os"
  11. "github.com/gravitl/netmaker/logger"
  12. "github.com/gravitl/netmaker/netclient/config"
  13. "github.com/gravitl/netmaker/netclient/ncutils"
  14. "github.com/gravitl/netmaker/tls"
  15. )
  16. // Register - the function responsible for registering with the server and acquiring certs
  17. func Register(cfg *config.ClientConfig) error {
  18. if cfg.Server.Server == "" {
  19. return errors.New("no server provided")
  20. }
  21. if cfg.Server.AccessKey == "" {
  22. return errors.New("no access key provided")
  23. }
  24. //create certificate request
  25. public, private, err := ed25519.GenerateKey(rand.Reader)
  26. if err != nil {
  27. return err
  28. }
  29. name := tls.NewCName(os.Getenv("HOSTNAME"))
  30. csr, err := tls.NewCSR(private, name)
  31. if err != nil {
  32. return err
  33. }
  34. data := config.RegisterRequest{
  35. CSR: *csr,
  36. Key: public,
  37. }
  38. payload, err := json.Marshal(data)
  39. if err != nil {
  40. return err
  41. }
  42. url := cfg.Server.API + "/api/server/register"
  43. log.Println("register at ", url)
  44. request, err := http.NewRequest(http.MethodPost, url, bytes.NewBuffer(payload))
  45. if err != nil {
  46. return err
  47. }
  48. request.Header.Set("Content-Type", "application/json")
  49. request.Header.Set("authorization", "Bearer "+cfg.Server.AccessKey)
  50. client := http.Client{}
  51. response, err := client.Do(request)
  52. if err != nil {
  53. return err
  54. }
  55. if response.StatusCode != http.StatusOK {
  56. return errors.New(response.Status)
  57. }
  58. var resp config.RegisterResponse
  59. if err := json.NewDecoder(response.Body).Decode(&resp); err != nil {
  60. return errors.New("unmarshal cert error " + err.Error())
  61. }
  62. responseCA, err := config.ConvertBytesToCert(resp.CABytes)
  63. if err != nil {
  64. return errors.New("could not acquire CA from response " + err.Error())
  65. }
  66. responseCert, err := config.ConvertBytesToCert(resp.CertBytes)
  67. if err != nil {
  68. return errors.New("could not acquire client certificate from response " + err.Error())
  69. }
  70. if err := tls.SaveCert(ncutils.GetNetclientPath()+cfg.Server.Server+"/", "root.pem", &responseCA); err != nil {
  71. return err
  72. }
  73. if err := tls.SaveCert(ncutils.GetNetclientPath()+cfg.Server.Server+"/", "client.pem", &responseCert); err != nil {
  74. return err
  75. }
  76. if err := tls.SaveKey(ncutils.GetNetclientPath(), "client.key", private); err != nil {
  77. return err
  78. }
  79. logger.Log(0, "certificates/key saved ")
  80. return nil
  81. }