mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-26 16:09:45 -05:00
149 lines
4.8 KiB
Go
149 lines
4.8 KiB
Go
package proto
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"io"
|
|
|
|
"github.com/edgelesssys/constellation/coordinator/atls"
|
|
"github.com/edgelesssys/constellation/coordinator/pubapi/pubproto"
|
|
"github.com/edgelesssys/constellation/coordinator/state"
|
|
kms "github.com/edgelesssys/constellation/kms/server/setup"
|
|
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/credentials"
|
|
)
|
|
|
|
// Client wraps a PubAPI client and the connection to it.
|
|
type Client struct {
|
|
conn *grpc.ClientConn
|
|
pubapi pubproto.APIClient
|
|
}
|
|
|
|
// Connect connects the client to a given server, using the handed
|
|
// Validators for the attestation of the connection.
|
|
// The connection must be closed using Close(). If connect is
|
|
// called on a client that already has a connection, the old
|
|
// connection is closed.
|
|
func (c *Client) Connect(endpoint string, validators []atls.Validator) error {
|
|
tlsConfig, err := atls.CreateAttestationClientTLSConfig(nil, validators)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
conn, err := grpc.Dial(endpoint, grpc.WithTransportCredentials(credentials.NewTLS(tlsConfig)))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if c.conn != nil {
|
|
c.conn.Close()
|
|
}
|
|
c.conn = conn
|
|
c.pubapi = pubproto.NewAPIClient(conn)
|
|
return nil
|
|
}
|
|
|
|
// Close closes the grpc connection of the client.
|
|
// Close is idempotent and can be called on non connected clients
|
|
// without returning an error.
|
|
func (c *Client) Close() error {
|
|
if c.conn == nil {
|
|
return nil
|
|
}
|
|
if err := c.conn.Close(); err != nil {
|
|
return err
|
|
}
|
|
c.conn = nil
|
|
return nil
|
|
}
|
|
|
|
// GetState returns the state of the connected server.
|
|
func (c *Client) GetState(ctx context.Context) (state.State, error) {
|
|
if c.pubapi == nil {
|
|
return state.Uninitialized, errors.New("client is not connected")
|
|
}
|
|
|
|
resp, err := c.pubapi.GetState(ctx, &pubproto.GetStateRequest{})
|
|
if err != nil {
|
|
return state.Uninitialized, err
|
|
}
|
|
return state.State(resp.State), nil
|
|
}
|
|
|
|
// Activate activates the Constellation coordinator via a grpc call.
|
|
// The handed IP addresses must be the private IP addresses of running AWS or GCP instances,
|
|
// and the userPublicKey is the VPN key of the users WireGuard interface.
|
|
func (c *Client) Activate(ctx context.Context, userPublicKey, masterSecret []byte, nodeIPs, coordinatorIPs, autoscalingNodeGroups []string, cloudServiceAccountURI string, sshUserKeys []*pubproto.SSHUserKey) (ActivationResponseClient, error) {
|
|
if c.pubapi == nil {
|
|
return nil, errors.New("client is not connected")
|
|
}
|
|
if len(userPublicKey) == 0 {
|
|
return nil, errors.New("parameter userPublicKey is empty")
|
|
}
|
|
if len(nodeIPs) == 0 {
|
|
return nil, errors.New("parameter ips is empty")
|
|
}
|
|
|
|
pubKey, err := wgtypes.ParseKey(string(userPublicKey))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
req := &pubproto.ActivateAsCoordinatorRequest{
|
|
AdminVpnPubKey: pubKey[:],
|
|
NodePublicIps: nodeIPs,
|
|
CoordinatorPublicIps: coordinatorIPs,
|
|
AutoscalingNodeGroups: autoscalingNodeGroups,
|
|
MasterSecret: masterSecret,
|
|
KmsUri: kms.ClusterKMSURI,
|
|
StorageUri: kms.NoStoreURI,
|
|
KeyEncryptionKeyId: "",
|
|
UseExistingKek: false,
|
|
CloudServiceAccountUri: cloudServiceAccountURI,
|
|
SshUserKeys: sshUserKeys,
|
|
}
|
|
|
|
client, err := c.pubapi.ActivateAsCoordinator(ctx, req)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return NewActivationRespClient(client), nil
|
|
}
|
|
|
|
// ActivationResponseClient has methods to read messages from a stream of
|
|
// ActivateAsCoordinatorResponses.
|
|
type ActivationResponseClient interface {
|
|
// NextLog reads responses from the response stream and returns the
|
|
// first received log.
|
|
// If AdminConfig responses are received before the first log response
|
|
// occurs, the state of the client is updated with those configs. An
|
|
// io.EOF error is returned at the end of the stream.
|
|
NextLog() (string, error)
|
|
|
|
// WriteLogStream reads responses from the response stream and
|
|
// writes log responses to the handed writer.
|
|
// Occurring AdminConfig responses update the state of the client.
|
|
WriteLogStream(io.Writer) error
|
|
|
|
// GetKubeconfig returns the kubeconfig that was received in the
|
|
// latest AdminConfig response or an error if the field is empty.
|
|
GetKubeconfig() (string, error)
|
|
|
|
// GetCoordinatorVpnKey returns the Coordinator's VPN key that was
|
|
// received in the latest AdminConfig response or an error if the field
|
|
// is empty.
|
|
GetCoordinatorVpnKey() (string, error)
|
|
|
|
// GetClientVpnIp returns the client VPN IP that was received
|
|
// in the latest AdminConfig response or an error if the field is empty.
|
|
GetClientVpnIp() (string, error)
|
|
|
|
// GetOwnerID returns the owner identifier, derived from the client's master secret
|
|
// or an error if the field is empty.
|
|
GetOwnerID() (string, error)
|
|
|
|
// GetClusterID returns the cluster's unique identifier
|
|
// or an error if the field is empty.
|
|
GetClusterID() (string, error)
|
|
}
|