gen csr on server

This commit is contained in:
Matthew R. Kasun
2022-04-14 11:40:13 -04:00
parent 9677957023
commit 38cf8b0ceb
4 changed files with 34 additions and 9 deletions

View File

@@ -1,6 +1,8 @@
package controller package controller
import ( import (
"crypto/ed25519"
"crypto/rand"
"encoding/json" "encoding/json"
"net/http" "net/http"
"strings" "strings"
@@ -12,7 +14,6 @@ import (
"github.com/gravitl/netmaker/netclient/config" "github.com/gravitl/netmaker/netclient/config"
"github.com/gravitl/netmaker/servercfg" "github.com/gravitl/netmaker/servercfg"
"github.com/gravitl/netmaker/tls" "github.com/gravitl/netmaker/tls"
"github.com/kr/pretty"
) )
func serverHandlers(r *mux.Router) { func serverHandlers(r *mux.Router) {
@@ -175,9 +176,26 @@ func register(w http.ResponseWriter, r *http.Request) {
returnErrorResponse(w, r, errorResponse) returnErrorResponse(w, r, errorResponse)
return return
} }
pretty.Println(&request.CSR.PublicKey) _, privKey, err := ed25519.GenerateKey(rand.Reader)
pretty.Println(request.CSR.RawSubjectPublicKeyInfo) if err != nil {
cert, err := tls.NewEndEntityCert(*key, &request.CSR, ca, tls.CERTIFICATE_VALIDITY) logger.Log(2, "failed to generate client key", err.Error())
errorResponse := models.ErrorResponse{
Code: http.StatusInternalServerError, Message: err.Error(),
}
returnErrorResponse(w, r, errorResponse)
return
}
csr, err := tls.NewCSR(privKey, request.Name)
if err != nil {
logger.Log(2, "failed to generate client key", err.Error())
errorResponse := models.ErrorResponse{
Code: http.StatusInternalServerError, Message: err.Error(),
}
returnErrorResponse(w, r, errorResponse)
return
}
cert, err := tls.NewEndEntityCert(*key, csr, ca, tls.CERTIFICATE_VALIDITY)
if err != nil { if err != nil {
logger.Log(2, "unable to generate client certificate", err.Error()) logger.Log(2, "unable to generate client certificate", err.Error())
errorResponse := models.ErrorResponse{ errorResponse := models.ErrorResponse{
@@ -189,6 +207,7 @@ func register(w http.ResponseWriter, r *http.Request) {
response := config.RegisterResponse{ response := config.RegisterResponse{
CA: *ca, CA: *ca,
Cert: *cert, Cert: *cert,
Key: privKey,
} }
w.WriteHeader(http.StatusOK) w.WriteHeader(http.StatusOK)
json.NewEncoder(w).Encode(response) json.NewEncoder(w).Encode(response)

View File

@@ -2,7 +2,9 @@ package config
import ( import (
//"github.com/davecgh/go-spew/spew" //"github.com/davecgh/go-spew/spew"
"crypto/ed25519"
"crypto/x509" "crypto/x509"
"crypto/x509/pkix"
"encoding/base64" "encoding/base64"
"encoding/json" "encoding/json"
"errors" "errors"
@@ -41,12 +43,14 @@ type ServerConfig struct {
// RegisterRequest - struct for registation with netmaker server // RegisterRequest - struct for registation with netmaker server
type RegisterRequest struct { type RegisterRequest struct {
CSR x509.CertificateRequest Name pkix.Name
CSR x509.CertificateRequest
} }
type RegisterResponse struct { type RegisterResponse struct {
CA x509.Certificate CA x509.Certificate
Cert x509.Certificate Cert x509.Certificate
Key ed25519.PrivateKey
} }
// Write - writes the config of a client to disk // Write - writes the config of a client to disk

View File

@@ -35,13 +35,17 @@ func Register(cfg *config.ClientConfig) error {
return err return err
} }
data := config.RegisterRequest{ data := config.RegisterRequest{
CSR: *csr, Name: name,
CSR: *csr,
} }
pretty.Println(data.CSR.PublicKey) pretty.Println(data.CSR.PublicKey)
pretty.Println(data.CSR.RawSubjectPublicKeyInfo)
pretty.Println("data\n", data)
payload, err := json.Marshal(data) payload, err := json.Marshal(data)
if err != nil { if err != nil {
return err return err
} }
os.WriteFile("/tmp/data", payload, os.ModePerm)
url := cfg.Server.API + "/api/server/register" url := cfg.Server.API + "/api/server/register"
log.Println("registering at ", url) log.Println("registering at ", url)
@@ -69,7 +73,7 @@ func Register(cfg *config.ClientConfig) error {
if err := tls.SaveCert(ncutils.GetNetclientPath(), "client.cert", &resp.Cert); err != nil { if err := tls.SaveCert(ncutils.GetNetclientPath(), "client.cert", &resp.Cert); err != nil {
return err return err
} }
if err := tls.SaveKey(ncutils.GetNetclientPath(), "client.key", key); err != nil { if err := tls.SaveKey(ncutils.GetNetclientPath(), "client.key", resp.Key); err != nil {
return err return err
} }
logger.Log(0, "certificates/key saved ") logger.Log(0, "certificates/key saved ")

View File

@@ -9,7 +9,6 @@ import (
"encoding/pem" "encoding/pem"
"errors" "errors"
"fmt" "fmt"
"log"
"math/big" "math/big"
"os" "os"
"time" "time"
@@ -233,7 +232,6 @@ func ReadKey(name string) (*ed25519.PrivateKey, error) {
return nil, fmt.Errorf("unable to read file %w", err) return nil, fmt.Errorf("unable to read file %w", err)
} }
keyBytes, _ := pem.Decode(bytes) keyBytes, _ := pem.Decode(bytes)
log.Println(keyBytes.Type)
key, err := x509.ParsePKCS8PrivateKey(keyBytes.Bytes) key, err := x509.ParsePKCS8PrivateKey(keyBytes.Bytes)
if err != nil { if err != nil {
return nil, fmt.Errorf("unable to parse file %w", err) return nil, fmt.Errorf("unable to parse file %w", err)