fleet/cmd/fleetctl/api.go

156 lines
3.8 KiB
Go
Raw Normal View History

package main
import (
"crypto/tls"
"crypto/x509"
"flag"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"os"
"runtime"
2021-06-26 04:46:51 +00:00
"github.com/fleetdm/fleet/v4/server/service"
"github.com/pkg/errors"
"github.com/urfave/cli/v2"
)
func unauthenticatedClientFromCLI(c *cli.Context) (*service.Client, error) {
cc, err := clientConfigFromCLI(c)
if err != nil {
return nil, err
}
return unauthenticatedClientFromConfig(cc, getDebug(c))
}
func clientFromCLI(c *cli.Context) (*service.Client, error) {
fleet, err := unauthenticatedClientFromCLI(c)
if err != nil {
return nil, err
}
configPath, context := c.String("config"), c.String("context")
if flag.Lookup("test.v") != nil {
fleet.SetToken("AAAA")
return fleet, nil
}
// Add authentication token
t, err := getConfigValue(configPath, context, "token")
if err != nil {
return nil, errors.Wrap(err, "error getting token from the config")
}
if token, ok := t.(string); ok {
if token == "" {
return nil, errors.New("Please log in with: fleetctl login")
}
fleet.SetToken(token)
} else {
return nil, errors.Errorf("token config value was not a string: %+v", t)
}
return fleet, nil
}
func unauthenticatedClientFromConfig(cc Context, debug bool) (*service.Client, error) {
if flag.Lookup("test.v") != nil {
return service.NewClient(os.Getenv("FLEET_SERVER_ADDRESS"), true, "", "")
}
if cc.Address == "" {
return nil, errors.New("set the Fleet API address with: fleetctl config set --address https://localhost:8080")
}
if runtime.GOOS == "windows" && cc.RootCA == "" && !cc.TLSSkipVerify {
return nil, errors.New("Windows clients must configure rootca (secure) or tls-skip-verify (insecure)")
}
var options []service.ClientOption
if debug {
options = append(options, service.EnableClientDebug())
}
fleet, err := service.NewClient(
cc.Address,
cc.TLSSkipVerify,
cc.RootCA,
cc.URLPrefix,
options...,
)
if err != nil {
return nil, errors.Wrap(err, "error creating Fleet API client handler")
}
return fleet, nil
}
// returns an HTTP client and the parsed URL for the configured server's
// address. The reason why this exists instead of using
// unauthenticatedClientFromConfig is because this doesn't apply the same rules
// around TLS config - in particular, it only sets a root CA if one is
// explicitly configured.
func rawHTTPClientFromConfig(cc Context) (*http.Client, *url.URL, error) {
if flag.Lookup("test.v") != nil {
cc.Address = os.Getenv("FLEET_SERVER_ADDRESS")
}
baseURL, err := url.Parse(cc.Address)
if err != nil {
return nil, nil, errors.Wrap(err, "parse address")
}
var rootCA *x509.CertPool
if cc.RootCA != "" {
rootCA = x509.NewCertPool()
// read in the root cert file specified in the context
certs, err := ioutil.ReadFile(cc.RootCA)
if err != nil {
return nil, nil, errors.Wrap(err, "reading root CA")
}
// add certs to pool
if ok := rootCA.AppendCertsFromPEM(certs); !ok {
return nil, nil, errors.New("failed to add certificates to root CA pool")
}
}
cli := &http.Client{
Transport: &http.Transport{
TLSClientConfig: &tls.Config{
InsecureSkipVerify: cc.TLSSkipVerify,
RootCAs: rootCA,
},
},
}
return cli, baseURL, nil
}
func clientConfigFromCLI(c *cli.Context) (Context, error) {
if flag.Lookup("test.v") != nil {
return Context{
Address: os.Getenv("FLEET_SERVER_ADDRESS"),
TLSSkipVerify: true,
}, nil
}
var zeroCtx Context
if err := makeConfigIfNotExists(c.String("config")); err != nil {
return zeroCtx, errors.Wrapf(err, "error verifying that config exists at %s", c.String("config"))
}
config, err := readConfig(c.String("config"))
if err != nil {
return zeroCtx, err
}
cc, ok := config.Contexts[c.String("context")]
if !ok {
return zeroCtx, fmt.Errorf("context %q is not found", c.String("context"))
}
return cc, nil
}