register.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. package functions
  2. import (
  3. "bytes"
  4. "crypto/ed25519"
  5. "crypto/rand"
  6. "encoding/json"
  7. "errors"
  8. "log"
  9. "net/http"
  10. "os"
  11. "github.com/gravitl/netmaker/logger"
  12. "github.com/gravitl/netmaker/netclient/config"
  13. "github.com/gravitl/netmaker/netclient/ncutils"
  14. "github.com/gravitl/netmaker/tls"
  15. )
  16. // Register - the function responsible for registering with the server and acquiring certs
  17. func Register(cfg *config.ClientConfig, key string) error {
  18. if cfg.Server.Server == "" {
  19. return errors.New("no server provided")
  20. }
  21. if cfg.Server.AccessKey == "" {
  22. return errors.New("no access key provided")
  23. }
  24. //generate new key if one doesn' exist
  25. var private *ed25519.PrivateKey
  26. var err error
  27. private, err = tls.ReadKey(ncutils.GetNetclientPath() + "/client.key")
  28. if err != nil {
  29. _, newKey, err := ed25519.GenerateKey(rand.Reader)
  30. if err != nil {
  31. return err
  32. }
  33. if err := tls.SaveKey(ncutils.GetNetclientPath(), "/client.key", newKey); err != nil {
  34. return err
  35. }
  36. private = &newKey
  37. }
  38. //check if cert exists
  39. _, err = tls.ReadCert(ncutils.GetNetclientServerPath(cfg.Server.Server) + "/client.pem")
  40. if errors.Is(err, os.ErrNotExist) {
  41. if err := RegisterWithServer(private, cfg); err != nil {
  42. return err
  43. }
  44. } else if err != nil {
  45. return err
  46. }
  47. return JoinNetwork(cfg, key, false)
  48. }
  49. // RegisterWithServer calls the register endpoint with privatekey and commonname - api returns ca and client certificate
  50. func RegisterWithServer(private *ed25519.PrivateKey, cfg *config.ClientConfig) error {
  51. data := config.RegisterRequest{
  52. Key: *private,
  53. CommonName: tls.NewCName(os.Getenv("HOSTNAME")),
  54. }
  55. payload, err := json.Marshal(data)
  56. if err != nil {
  57. return err
  58. }
  59. url := "https://" + cfg.Server.API + "/api/server/register"
  60. log.Println("register at ", url)
  61. request, err := http.NewRequest(http.MethodPost, url, bytes.NewBuffer(payload))
  62. if err != nil {
  63. return err
  64. }
  65. request.Header.Set("Content-Type", "application/json")
  66. request.Header.Set("authorization", "Bearer "+cfg.Server.AccessKey)
  67. client := http.Client{}
  68. response, err := client.Do(request)
  69. if err != nil {
  70. return err
  71. }
  72. if response.StatusCode != http.StatusOK {
  73. return errors.New(response.Status)
  74. }
  75. var resp config.RegisterResponse
  76. if err := json.NewDecoder(response.Body).Decode(&resp); err != nil {
  77. return errors.New("unmarshal cert error " + err.Error())
  78. }
  79. //x509.Certificate.PublicKey is an interface so json encoding/decoding results in a string rather that []byte
  80. //the pubkeys are included in the response so the values in the certificate can be updated appropriately
  81. resp.CA.PublicKey = resp.CAPubKey
  82. resp.Cert.PublicKey = resp.CertPubKey
  83. if err := tls.SaveCert(ncutils.GetNetclientServerPath(cfg.Server.Server)+"/", "root.pem", &resp.CA); err != nil {
  84. return err
  85. }
  86. if err := tls.SaveCert(ncutils.GetNetclientServerPath(cfg.Server.Server)+"/", "client.pem", &resp.Cert); err != nil {
  87. return err
  88. }
  89. logger.Log(0, "certificates/key saved ")
  90. //join the network defined in the token
  91. return nil
  92. }