register.go 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. package functions
  2. import (
  3. "bytes"
  4. "crypto/ed25519"
  5. "crypto/rand"
  6. "encoding/json"
  7. "errors"
  8. "log"
  9. "net/http"
  10. "os"
  11. "github.com/gravitl/netmaker/logger"
  12. "github.com/gravitl/netmaker/netclient/config"
  13. "github.com/gravitl/netmaker/netclient/ncutils"
  14. "github.com/gravitl/netmaker/tls"
  15. )
  16. // Register - the function responsible for registering with the server and acquiring certs
  17. func Register(cfg *config.ClientConfig, key string) error {
  18. if cfg.Server.Server == "" {
  19. return errors.New("no server provided")
  20. }
  21. if cfg.Server.AccessKey == "" {
  22. return errors.New("no access key provided")
  23. }
  24. //generate new key if one doesn' exist
  25. private, err := tls.ReadKey(ncutils.GetNetclientPath() + "/client.key")
  26. if err != nil {
  27. _, *private, err = ed25519.GenerateKey(rand.Reader)
  28. if err != nil {
  29. return err
  30. }
  31. if err := tls.SaveKey(ncutils.GetNetclientPath(), "/client.key", *private); err != nil {
  32. return err
  33. }
  34. }
  35. //check if cert exists
  36. _, err = tls.ReadCert(ncutils.GetNetclientServerPath(cfg.Server.Server) + "/client.pem")
  37. if err != os.ErrNotExist {
  38. if err := RegisterWithServer(private, cfg); err != nil {
  39. return err
  40. }
  41. }
  42. if err != nil {
  43. return err
  44. }
  45. return JoinNetwork(cfg, key, false)
  46. }
  47. func RegisterWithServer(private *ed25519.PrivateKey, cfg *config.ClientConfig) error {
  48. data := config.RegisterRequest{
  49. Key: *private,
  50. CommonName: tls.NewCName(os.Getenv("HOSTNAME")),
  51. }
  52. payload, err := json.Marshal(data)
  53. if err != nil {
  54. return err
  55. }
  56. url := "https://" + cfg.Server.API + "/api/server/register"
  57. log.Println("register at ", url)
  58. request, err := http.NewRequest(http.MethodPost, url, bytes.NewBuffer(payload))
  59. if err != nil {
  60. return err
  61. }
  62. request.Header.Set("Content-Type", "application/json")
  63. request.Header.Set("authorization", "Bearer "+cfg.Server.AccessKey)
  64. client := http.Client{}
  65. response, err := client.Do(request)
  66. if err != nil {
  67. return err
  68. }
  69. if response.StatusCode != http.StatusOK {
  70. return errors.New(response.Status)
  71. }
  72. var resp config.RegisterResponse
  73. if err := json.NewDecoder(response.Body).Decode(&resp); err != nil {
  74. return errors.New("unmarshal cert error " + err.Error())
  75. }
  76. //x509.Certificate.PublicKey is an interface so json encoding/decoding results in a string rather that []byte
  77. //the pubkeys are included in the response so the values in the certificate can be updated appropriately
  78. resp.CA.PublicKey = resp.CAPubKey
  79. resp.Cert.PublicKey = resp.CertPubKey
  80. if err := tls.SaveCert(ncutils.GetNetclientServerPath(cfg.Server.Server)+"/", "root.pem", &resp.CA); err != nil {
  81. return err
  82. }
  83. if err := tls.SaveCert(ncutils.GetNetclientServerPath(cfg.Server.Server)+"/", "client.pem", &resp.Cert); err != nil {
  84. return err
  85. }
  86. logger.Log(0, "certificates/key saved ")
  87. //join the network defined in the token
  88. return nil
  89. }