util.go 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. package mq
  2. import (
  3. "errors"
  4. "fmt"
  5. "strings"
  6. "time"
  7. "github.com/gravitl/netmaker/logic"
  8. "github.com/gravitl/netmaker/models"
  9. "github.com/gravitl/netmaker/netclient/ncutils"
  10. )
  11. func decryptMsgWithHost(host *models.Host, msg []byte) ([]byte, error) {
  12. trafficKey, trafficErr := logic.RetrievePrivateTrafficKey() // get server private key
  13. if trafficErr != nil {
  14. return nil, trafficErr
  15. }
  16. serverPrivTKey, err := ncutils.ConvertBytesToKey(trafficKey)
  17. if err != nil {
  18. return nil, err
  19. }
  20. nodePubTKey, err := ncutils.ConvertBytesToKey(host.TrafficKeyPublic)
  21. if err != nil {
  22. return nil, err
  23. }
  24. return ncutils.DeChunk(msg, nodePubTKey, serverPrivTKey)
  25. }
  26. func decryptMsg(node *models.Node, msg []byte) ([]byte, error) {
  27. if len(msg) <= 24 { // make sure message is of appropriate length
  28. return nil, fmt.Errorf("recieved invalid message from broker %v", msg)
  29. }
  30. host, err := logic.GetHost(node.HostID.String())
  31. if err != nil {
  32. return nil, err
  33. }
  34. return decryptMsgWithHost(host, msg)
  35. }
  36. func encryptMsg(host *models.Host, msg []byte) ([]byte, error) {
  37. // fetch server public key to be certain hasn't changed in transit
  38. trafficKey, trafficErr := logic.RetrievePrivateTrafficKey()
  39. if trafficErr != nil {
  40. return nil, trafficErr
  41. }
  42. serverPrivKey, err := ncutils.ConvertBytesToKey(trafficKey)
  43. if err != nil {
  44. return nil, err
  45. }
  46. nodePubKey, err := ncutils.ConvertBytesToKey(host.TrafficKeyPublic)
  47. if err != nil {
  48. return nil, err
  49. }
  50. if strings.Contains(host.Version, "0.10.0") {
  51. return ncutils.BoxEncrypt(msg, nodePubKey, serverPrivKey)
  52. }
  53. return ncutils.Chunk(msg, nodePubKey, serverPrivKey)
  54. }
  55. func publish(host *models.Host, dest string, msg []byte) error {
  56. encrypted, encryptErr := encryptMsg(host, msg)
  57. if encryptErr != nil {
  58. return encryptErr
  59. }
  60. if mqclient == nil {
  61. return errors.New("cannot publish ... mqclient not connected")
  62. }
  63. if token := mqclient.Publish(dest, 0, true, encrypted); !token.WaitTimeout(MQ_TIMEOUT*time.Second) || token.Error() != nil {
  64. var err error
  65. if token.Error() == nil {
  66. err = errors.New("connection timeout")
  67. } else {
  68. err = token.Error()
  69. }
  70. return err
  71. }
  72. return nil
  73. }
  74. // decodes a message queue topic and returns the embedded node.ID
  75. func getID(topic string) (string, error) {
  76. parts := strings.Split(topic, "/")
  77. count := len(parts)
  78. if count == 1 {
  79. return "", fmt.Errorf("invalid topic")
  80. }
  81. //the last part of the topic will be the node.ID
  82. return parts[count-1], nil
  83. }