register.go 2.9 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192
  1. package functions
  2. import (
  3. "crypto/ed25519"
  4. "crypto/rand"
  5. "encoding/json"
  6. "errors"
  7. "net/http"
  8. "os"
  9. "github.com/gravitl/netmaker/logger"
  10. "github.com/gravitl/netmaker/netclient/config"
  11. "github.com/gravitl/netmaker/netclient/ncutils"
  12. "github.com/gravitl/netmaker/tls"
  13. )
  14. // Register - the function responsible for registering with the server and acquiring certs
  15. func Register(cfg *config.ClientConfig, key string) error {
  16. if cfg.Server.Server == "" {
  17. return errors.New("no server provided")
  18. }
  19. if cfg.Server.AccessKey == "" {
  20. return errors.New("no access key provided")
  21. }
  22. //generate new key if one doesn' exist
  23. var private *ed25519.PrivateKey
  24. var err error
  25. private, err = tls.ReadKey(ncutils.GetNetclientPath() + ncutils.GetSeparator() + "client.key")
  26. if err != nil {
  27. _, newKey, err := ed25519.GenerateKey(rand.Reader)
  28. if err != nil {
  29. return err
  30. }
  31. if err := tls.SaveKey(ncutils.GetNetclientPath(), ncutils.GetSeparator()+"client.key", newKey); err != nil {
  32. return err
  33. }
  34. private = &newKey
  35. }
  36. //check if cert exists
  37. _, err = tls.ReadCert(ncutils.GetNetclientServerPath(cfg.Server.Server) + ncutils.GetSeparator() + "client.pem")
  38. if errors.Is(err, os.ErrNotExist) {
  39. if err := RegisterWithServer(private, cfg); err != nil {
  40. return err
  41. }
  42. } else if err != nil {
  43. return err
  44. }
  45. return nil
  46. }
  47. // RegisterWithServer calls the register endpoint with privatekey and commonname - api returns ca and client certificate
  48. func RegisterWithServer(private *ed25519.PrivateKey, cfg *config.ClientConfig) error {
  49. cfg, err := config.ReadConfig(cfg.Network)
  50. if err != nil {
  51. return err
  52. }
  53. data := config.RegisterRequest{
  54. Key: *private,
  55. CommonName: tls.NewCName(cfg.Node.Name),
  56. }
  57. url := "https://" + cfg.Server.API + "/api/server/register"
  58. logger.Log(1, "register at "+url)
  59. token, err := Authenticate(cfg)
  60. if err != nil {
  61. return err
  62. }
  63. response, err := API(data, http.MethodPost, url, token)
  64. if err != nil {
  65. return err
  66. }
  67. if response.StatusCode != http.StatusOK {
  68. return errors.New(response.Status)
  69. }
  70. var resp config.RegisterResponse
  71. if err := json.NewDecoder(response.Body).Decode(&resp); err != nil {
  72. return errors.New("unmarshal cert error " + err.Error())
  73. }
  74. //x509.Certificate.PublicKey is an interface so json encoding/decoding results in a string rather that []byte
  75. //the pubkeys are included in the response so the values in the certificate can be updated appropriately
  76. resp.CA.PublicKey = resp.CAPubKey
  77. resp.Cert.PublicKey = resp.CertPubKey
  78. if err := tls.SaveCert(ncutils.GetNetclientServerPath(cfg.Server.Server)+ncutils.GetSeparator(), "root.pem", &resp.CA); err != nil {
  79. return err
  80. }
  81. if err := tls.SaveCert(ncutils.GetNetclientServerPath(cfg.Server.Server)+ncutils.GetSeparator(), "client.pem", &resp.Cert); err != nil {
  82. return err
  83. }
  84. logger.Log(0, "certificates/key saved ")
  85. //join the network defined in the token
  86. return nil
  87. }