2022-09-23 19:00:23 +00:00
|
|
|
package service
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2023-04-27 11:44:39 +00:00
|
|
|
"crypto/tls"
|
2022-09-23 19:00:23 +00:00
|
|
|
"encoding/json"
|
2022-09-26 14:44:09 +00:00
|
|
|
"errors"
|
2022-09-23 19:00:23 +00:00
|
|
|
"fmt"
|
2022-10-03 20:28:19 +00:00
|
|
|
"io/fs"
|
2022-09-23 19:00:23 +00:00
|
|
|
"net/http"
|
2022-10-03 20:28:19 +00:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2023-01-26 21:51:24 +00:00
|
|
|
"runtime"
|
2022-10-03 20:28:19 +00:00
|
|
|
"sync"
|
|
|
|
"time"
|
add headers denoting capabilities between fleet server / desktop / orbit (#7833)
This adds a new mechanism to allow us to handle compatibility issues between Orbit, Fleet Server and Fleet Desktop.
The general idea is to _always_ send a custom header of the form:
```
fleet-capabilities-header = "X-Fleet-Capabilities:" capabilities
capabilities = capability * (,)
capability = string
```
Both from the server to the clients (Orbit, Fleet Desktop) and vice-versa. For an example, see: https://github.com/fleetdm/fleet/commit/8c0bbdd291f54e03e19766bcdfead0fb8067f60c
Also, the following applies:
- Backwards compat: if the header is not present, assume that orbit/fleet doesn't have the capability
- The current capabilities endpoint will be removed
### Motivation
This solution is trying to solve the following problems:
- We have three independent processes communicating with each other (Fleet Desktop, Orbit and Fleet Server). Each process can be updated independently, and therefore we need a way for each process to know what features are supported by its peers.
- We originally implemented a dedicated API endpoint in the server that returned a list of the capabilities (or "features") enabled, we found this, and any other server-only solution (like API versioning) to be insufficient because:
- There are cases in which the server also needs to know which features are supported by its clients
- Clients needed to poll for changes to detect if the capabilities supported by the server change, by sending the capabilities on each request we have a much cleaner way to handling different responses.
- We are also introducing an unauthenticated endpoint to get the server features, this gives us flexibility if we need to implement different authentication mechanisms, and was one of the pitfalls of the first implementation.
Related to https://github.com/fleetdm/fleet/issues/7929
2022-09-26 10:53:53 +00:00
|
|
|
|
2022-10-03 20:28:19 +00:00
|
|
|
"github.com/fleetdm/fleet/v4/orbit/pkg/constant"
|
2023-08-25 21:25:07 +00:00
|
|
|
"github.com/fleetdm/fleet/v4/orbit/pkg/logging"
|
2023-01-26 21:51:24 +00:00
|
|
|
"github.com/fleetdm/fleet/v4/orbit/pkg/platform"
|
2022-10-03 20:28:19 +00:00
|
|
|
"github.com/fleetdm/fleet/v4/pkg/retry"
|
add headers denoting capabilities between fleet server / desktop / orbit (#7833)
This adds a new mechanism to allow us to handle compatibility issues between Orbit, Fleet Server and Fleet Desktop.
The general idea is to _always_ send a custom header of the form:
```
fleet-capabilities-header = "X-Fleet-Capabilities:" capabilities
capabilities = capability * (,)
capability = string
```
Both from the server to the clients (Orbit, Fleet Desktop) and vice-versa. For an example, see: https://github.com/fleetdm/fleet/commit/8c0bbdd291f54e03e19766bcdfead0fb8067f60c
Also, the following applies:
- Backwards compat: if the header is not present, assume that orbit/fleet doesn't have the capability
- The current capabilities endpoint will be removed
### Motivation
This solution is trying to solve the following problems:
- We have three independent processes communicating with each other (Fleet Desktop, Orbit and Fleet Server). Each process can be updated independently, and therefore we need a way for each process to know what features are supported by its peers.
- We originally implemented a dedicated API endpoint in the server that returned a list of the capabilities (or "features") enabled, we found this, and any other server-only solution (like API versioning) to be insufficient because:
- There are cases in which the server also needs to know which features are supported by its clients
- Clients needed to poll for changes to detect if the capabilities supported by the server change, by sending the capabilities on each request we have a much cleaner way to handling different responses.
- We are also introducing an unauthenticated endpoint to get the server features, this gives us flexibility if we need to implement different authentication mechanisms, and was one of the pitfalls of the first implementation.
Related to https://github.com/fleetdm/fleet/issues/7929
2022-09-26 10:53:53 +00:00
|
|
|
"github.com/fleetdm/fleet/v4/server/fleet"
|
2022-10-03 20:28:19 +00:00
|
|
|
"github.com/rs/zerolog/log"
|
2022-09-23 19:00:23 +00:00
|
|
|
)
|
|
|
|
|
2022-10-03 20:28:19 +00:00
|
|
|
// OrbitClient exposes the Orbit API to communicate with the Fleet server.
|
2022-09-23 19:00:23 +00:00
|
|
|
type OrbitClient struct {
|
|
|
|
*baseClient
|
2022-10-03 20:28:19 +00:00
|
|
|
nodeKeyFilePath string
|
|
|
|
enrollSecret string
|
2023-03-13 21:54:18 +00:00
|
|
|
hostInfo fleet.OrbitHostInfo
|
2022-10-03 20:28:19 +00:00
|
|
|
|
|
|
|
enrolledMu sync.Mutex
|
|
|
|
enrolled bool
|
|
|
|
|
|
|
|
lastRecordedErrMu sync.Mutex
|
|
|
|
lastRecordedErr error
|
2022-10-28 17:27:21 +00:00
|
|
|
|
2023-12-11 13:04:24 +00:00
|
|
|
configCache configCache
|
|
|
|
|
2022-10-28 17:27:21 +00:00
|
|
|
// TestNodeKey is used for testing only.
|
|
|
|
TestNodeKey string
|
2022-09-23 19:00:23 +00:00
|
|
|
}
|
|
|
|
|
2023-12-11 13:04:24 +00:00
|
|
|
// time-to-live for config cache
|
|
|
|
const configCacheTTL = 3 * time.Second
|
|
|
|
|
|
|
|
type configCache struct {
|
|
|
|
mu sync.Mutex
|
|
|
|
lastUpdated time.Time
|
|
|
|
config *fleet.OrbitConfig
|
|
|
|
err error
|
|
|
|
}
|
|
|
|
|
2022-09-23 19:00:23 +00:00
|
|
|
func (oc *OrbitClient) request(verb string, path string, params interface{}, resp interface{}) error {
|
|
|
|
var bodyBytes []byte
|
|
|
|
var err error
|
|
|
|
if params != nil {
|
|
|
|
bodyBytes, err = json.Marshal(params)
|
|
|
|
if err != nil {
|
2022-10-03 20:28:19 +00:00
|
|
|
return fmt.Errorf("making request json marshalling : %w", err)
|
2022-09-23 19:00:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
request, err := http.NewRequest(
|
|
|
|
verb,
|
|
|
|
oc.url(path, "").String(),
|
|
|
|
bytes.NewBuffer(bodyBytes),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
add headers denoting capabilities between fleet server / desktop / orbit (#7833)
This adds a new mechanism to allow us to handle compatibility issues between Orbit, Fleet Server and Fleet Desktop.
The general idea is to _always_ send a custom header of the form:
```
fleet-capabilities-header = "X-Fleet-Capabilities:" capabilities
capabilities = capability * (,)
capability = string
```
Both from the server to the clients (Orbit, Fleet Desktop) and vice-versa. For an example, see: https://github.com/fleetdm/fleet/commit/8c0bbdd291f54e03e19766bcdfead0fb8067f60c
Also, the following applies:
- Backwards compat: if the header is not present, assume that orbit/fleet doesn't have the capability
- The current capabilities endpoint will be removed
### Motivation
This solution is trying to solve the following problems:
- We have three independent processes communicating with each other (Fleet Desktop, Orbit and Fleet Server). Each process can be updated independently, and therefore we need a way for each process to know what features are supported by its peers.
- We originally implemented a dedicated API endpoint in the server that returned a list of the capabilities (or "features") enabled, we found this, and any other server-only solution (like API versioning) to be insufficient because:
- There are cases in which the server also needs to know which features are supported by its clients
- Clients needed to poll for changes to detect if the capabilities supported by the server change, by sending the capabilities on each request we have a much cleaner way to handling different responses.
- We are also introducing an unauthenticated endpoint to get the server features, this gives us flexibility if we need to implement different authentication mechanisms, and was one of the pitfalls of the first implementation.
Related to https://github.com/fleetdm/fleet/issues/7929
2022-09-26 10:53:53 +00:00
|
|
|
oc.setClientCapabilitiesHeader(request)
|
2022-09-23 19:00:23 +00:00
|
|
|
response, err := oc.http.Do(request)
|
|
|
|
if err != nil {
|
2022-10-03 20:28:19 +00:00
|
|
|
oc.setLastRecordedError(err)
|
2022-09-23 19:00:23 +00:00
|
|
|
return fmt.Errorf("%s %s: %w", verb, path, err)
|
|
|
|
}
|
|
|
|
defer response.Body.Close()
|
|
|
|
|
2022-10-03 20:28:19 +00:00
|
|
|
if err := oc.parseResponse(verb, path, response, resp); err != nil {
|
|
|
|
oc.setLastRecordedError(err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
2022-09-23 19:00:23 +00:00
|
|
|
}
|
|
|
|
|
2022-10-03 20:28:19 +00:00
|
|
|
// NewOrbitClient creates a new OrbitClient.
|
|
|
|
//
|
2023-03-13 21:54:18 +00:00
|
|
|
// - rootDir is the Orbit's root directory, where the Orbit node key is loaded-from/stored.
|
|
|
|
// - addr is the address of the Fleet server.
|
|
|
|
// - orbitHostInfo is the host system information used for enrolling to Fleet.
|
|
|
|
func NewOrbitClient(
|
|
|
|
rootDir string,
|
|
|
|
addr string,
|
|
|
|
rootCA string,
|
|
|
|
insecureSkipVerify bool,
|
|
|
|
enrollSecret string,
|
2023-04-27 11:44:39 +00:00
|
|
|
fleetClientCert *tls.Certificate,
|
2023-03-13 21:54:18 +00:00
|
|
|
orbitHostInfo fleet.OrbitHostInfo,
|
|
|
|
) (*OrbitClient, error) {
|
2022-10-03 20:28:19 +00:00
|
|
|
orbitCapabilities := fleet.CapabilityMap{}
|
2023-04-27 11:44:39 +00:00
|
|
|
bc, err := newBaseClient(addr, insecureSkipVerify, rootCA, "", fleetClientCert, orbitCapabilities)
|
2022-09-23 19:00:23 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2022-10-03 20:28:19 +00:00
|
|
|
nodeKeyFilePath := filepath.Join(rootDir, constant.OrbitNodeKeyFileName)
|
2022-09-23 19:00:23 +00:00
|
|
|
return &OrbitClient{
|
2022-10-03 20:28:19 +00:00
|
|
|
nodeKeyFilePath: nodeKeyFilePath,
|
|
|
|
baseClient: bc,
|
|
|
|
enrollSecret: enrollSecret,
|
2023-03-13 21:54:18 +00:00
|
|
|
hostInfo: orbitHostInfo,
|
2022-10-03 20:28:19 +00:00
|
|
|
enrolled: false,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetConfig returns the Orbit config fetched from Fleet server for this instance of OrbitClient.
|
2023-12-11 13:04:24 +00:00
|
|
|
// Since this method is called in multiple places, we use a cache with configCacheTTL time-to-live to reduce traffic to the Fleet server.
|
2023-01-25 20:03:40 +00:00
|
|
|
func (oc *OrbitClient) GetConfig() (*fleet.OrbitConfig, error) {
|
2023-12-11 13:04:24 +00:00
|
|
|
oc.configCache.mu.Lock()
|
|
|
|
defer oc.configCache.mu.Unlock()
|
|
|
|
// If time-to-live passed, we update the config cache
|
|
|
|
now := time.Now()
|
|
|
|
if now.After(oc.configCache.lastUpdated.Add(configCacheTTL)) {
|
|
|
|
verb, path := "POST", "/api/fleet/orbit/config"
|
|
|
|
var resp fleet.OrbitConfig
|
|
|
|
err := oc.authenticatedRequest(verb, path, &orbitGetConfigRequest{}, &resp)
|
|
|
|
oc.configCache.config = &resp
|
|
|
|
oc.configCache.err = err
|
|
|
|
oc.configCache.lastUpdated = now
|
2022-10-03 20:28:19 +00:00
|
|
|
}
|
2023-12-11 13:04:24 +00:00
|
|
|
return oc.configCache.config, oc.configCache.err
|
2022-09-23 19:00:23 +00:00
|
|
|
}
|
|
|
|
|
2022-10-10 20:15:35 +00:00
|
|
|
// SetOrUpdateDeviceToken sends a request to the server to set or update the
|
|
|
|
// device token with the given value.
|
|
|
|
func (oc *OrbitClient) SetOrUpdateDeviceToken(deviceAuthToken string) error {
|
|
|
|
verb, path := "POST", "/api/fleet/orbit/device_token"
|
|
|
|
params := setOrUpdateDeviceTokenRequest{
|
|
|
|
DeviceAuthToken: deviceAuthToken,
|
|
|
|
}
|
|
|
|
var resp setOrUpdateDeviceTokenResponse
|
|
|
|
if err := oc.authenticatedRequest(verb, path, ¶ms, &resp); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-08-23 22:31:47 +00:00
|
|
|
// GetHostScript returns the script fetched from Fleet server to run on this
|
|
|
|
// host.
|
|
|
|
func (oc *OrbitClient) GetHostScript(execID string) (*fleet.HostScriptResult, error) {
|
|
|
|
verb, path := "POST", "/api/fleet/orbit/scripts/request"
|
|
|
|
var resp orbitGetScriptResponse
|
|
|
|
if err := oc.authenticatedRequest(verb, path, &orbitGetScriptRequest{
|
|
|
|
ExecutionID: execID,
|
|
|
|
}, &resp); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return resp.HostScriptResult, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// SaveHostScriptResult saves the result of running the script on this host.
|
|
|
|
func (oc *OrbitClient) SaveHostScriptResult(result *fleet.HostScriptResultPayload) error {
|
|
|
|
verb, path := "POST", "/api/fleet/orbit/scripts/result"
|
|
|
|
var resp orbitPostScriptResultResponse
|
|
|
|
if err := oc.authenticatedRequest(verb, path, &orbitPostScriptResultRequest{
|
|
|
|
HostScriptResultPayload: result,
|
|
|
|
}, &resp); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-10-10 20:15:35 +00:00
|
|
|
// Ping sends a ping request to the orbit/ping endpoint.
|
2022-10-03 20:28:19 +00:00
|
|
|
func (oc *OrbitClient) Ping() error {
|
|
|
|
verb, path := "HEAD", "/api/fleet/orbit/ping"
|
|
|
|
err := oc.request(verb, path, nil, nil)
|
|
|
|
if err == nil || errors.Is(err, notFoundErr{}) {
|
|
|
|
// notFound is ok, it means an old server without the capabilities header
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (oc *OrbitClient) enroll() (string, error) {
|
2022-09-23 19:00:23 +00:00
|
|
|
verb, path := "POST", "/api/fleet/orbit/enroll"
|
2023-03-13 21:54:18 +00:00
|
|
|
params := EnrollOrbitRequest{
|
2023-12-15 18:26:32 +00:00
|
|
|
EnrollSecret: oc.enrollSecret,
|
|
|
|
HardwareUUID: oc.hostInfo.HardwareUUID,
|
|
|
|
HardwareSerial: oc.hostInfo.HardwareSerial,
|
|
|
|
Hostname: oc.hostInfo.Hostname,
|
|
|
|
Platform: oc.hostInfo.Platform,
|
|
|
|
OsqueryIdentifier: oc.hostInfo.OsqueryIdentifier,
|
2023-03-13 21:54:18 +00:00
|
|
|
}
|
2022-10-28 17:27:21 +00:00
|
|
|
var resp EnrollOrbitResponse
|
2022-09-23 19:00:23 +00:00
|
|
|
err := oc.request(verb, path, params, &resp)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return resp.OrbitNodeKey, nil
|
|
|
|
}
|
|
|
|
|
2022-10-03 20:28:19 +00:00
|
|
|
// enrollLock helps protect the enrolling process in case mutliple OrbitClients
|
|
|
|
// want to re-enroll at the same time.
|
|
|
|
var enrollLock sync.Mutex
|
|
|
|
|
|
|
|
// getNodeKeyOrEnroll attempts to read the orbit node key if the file exists on disk
|
|
|
|
// otherwise it enrolls the host with Fleet and saves the node key to disk
|
|
|
|
func (oc *OrbitClient) getNodeKeyOrEnroll() (string, error) {
|
2022-10-28 17:27:21 +00:00
|
|
|
if oc.TestNodeKey != "" {
|
|
|
|
return oc.TestNodeKey, nil
|
|
|
|
}
|
|
|
|
|
2022-10-03 20:28:19 +00:00
|
|
|
enrollLock.Lock()
|
|
|
|
defer enrollLock.Unlock()
|
|
|
|
|
2023-10-27 18:28:54 +00:00
|
|
|
orbitNodeKey, err := os.ReadFile(oc.nodeKeyFilePath)
|
2022-10-03 20:28:19 +00:00
|
|
|
switch {
|
|
|
|
case err == nil:
|
|
|
|
return string(orbitNodeKey), nil
|
|
|
|
case errors.Is(err, fs.ErrNotExist):
|
|
|
|
// OK, if there's no orbit node key, proceed to enroll.
|
|
|
|
default:
|
|
|
|
return "", fmt.Errorf("read orbit node key file: %w", err)
|
2022-09-23 19:00:23 +00:00
|
|
|
}
|
2022-10-03 20:28:19 +00:00
|
|
|
var (
|
|
|
|
orbitNodeKey_ string
|
|
|
|
endpointDoesNotExist bool
|
|
|
|
)
|
|
|
|
if err := retry.Do(
|
|
|
|
func() error {
|
|
|
|
var err error
|
|
|
|
orbitNodeKey_, err = oc.enrollAndWriteNodeKeyFile()
|
|
|
|
switch {
|
|
|
|
case err == nil:
|
|
|
|
return nil
|
|
|
|
case errors.Is(err, notFoundErr{}):
|
|
|
|
// Do not retry if the endpoint does not exist.
|
|
|
|
endpointDoesNotExist = true
|
|
|
|
return nil
|
|
|
|
default:
|
2023-08-25 21:25:07 +00:00
|
|
|
logging.LogErrIfEnvNotSet(constant.SilenceEnrollLogErrorEnvVar, err, "enroll failed, retrying")
|
2022-10-03 20:28:19 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
},
|
2023-08-04 21:50:03 +00:00
|
|
|
retry.WithInterval(OrbitRetryInterval()),
|
2022-10-03 20:28:19 +00:00
|
|
|
retry.WithMaxAttempts(constant.OrbitEnrollMaxRetries),
|
|
|
|
); err != nil {
|
|
|
|
return "", fmt.Errorf("orbit node key enroll failed, attempts=%d", constant.OrbitEnrollMaxRetries)
|
|
|
|
}
|
|
|
|
if endpointDoesNotExist {
|
|
|
|
return "", errors.New("enroll endpoint does not exist")
|
|
|
|
}
|
|
|
|
return orbitNodeKey_, nil
|
|
|
|
}
|
2022-09-23 19:00:23 +00:00
|
|
|
|
2023-08-29 13:50:13 +00:00
|
|
|
// GetNodeKey gets the orbit node key from file.
|
|
|
|
func (oc *OrbitClient) GetNodeKey() (string, error) {
|
|
|
|
orbitNodeKey, err := os.ReadFile(oc.nodeKeyFilePath)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return string(orbitNodeKey), nil
|
|
|
|
}
|
|
|
|
|
2022-10-03 20:28:19 +00:00
|
|
|
func (oc *OrbitClient) enrollAndWriteNodeKeyFile() (string, error) {
|
|
|
|
orbitNodeKey, err := oc.enroll()
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("enroll request: %w", err)
|
|
|
|
}
|
2023-01-26 21:51:24 +00:00
|
|
|
|
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
|
|
|
|
// creating the secret file with empty content
|
|
|
|
if err := os.WriteFile(oc.nodeKeyFilePath, nil, constant.DefaultFileMode); err != nil {
|
|
|
|
return "", fmt.Errorf("create orbit node key file: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// restricting file access
|
|
|
|
if err := platform.ChmodRestrictFile(oc.nodeKeyFilePath); err != nil {
|
|
|
|
return "", fmt.Errorf("apply ACLs: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// writing raw key material to the acl-ready secret file
|
2022-10-03 20:28:19 +00:00
|
|
|
if err := os.WriteFile(oc.nodeKeyFilePath, []byte(orbitNodeKey), constant.DefaultFileMode); err != nil {
|
|
|
|
return "", fmt.Errorf("write orbit node key file: %w", err)
|
|
|
|
}
|
2023-01-26 21:51:24 +00:00
|
|
|
|
2022-10-03 20:28:19 +00:00
|
|
|
return orbitNodeKey, nil
|
2022-09-23 19:00:23 +00:00
|
|
|
}
|
2022-09-26 14:44:09 +00:00
|
|
|
|
2022-10-03 20:28:19 +00:00
|
|
|
func (oc *OrbitClient) authenticatedRequest(verb string, path string, params interface{}, resp interface{}) error {
|
|
|
|
nodeKey, err := oc.getNodeKeyOrEnroll()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-09-26 14:44:09 +00:00
|
|
|
|
2022-10-03 20:28:19 +00:00
|
|
|
s := params.(setOrbitNodeKeyer)
|
|
|
|
s.setOrbitNodeKey(nodeKey)
|
|
|
|
|
2022-11-29 16:54:36 +00:00
|
|
|
err = oc.request(verb, path, params, resp)
|
|
|
|
switch {
|
2022-10-03 20:28:19 +00:00
|
|
|
case err == nil:
|
|
|
|
oc.setEnrolled(true)
|
2022-09-26 14:44:09 +00:00
|
|
|
return nil
|
2022-10-03 20:28:19 +00:00
|
|
|
case errors.Is(err, ErrUnauthenticated):
|
|
|
|
if err := os.Remove(oc.nodeKeyFilePath); err != nil {
|
|
|
|
log.Info().Err(err).Msg("remove orbit node key")
|
|
|
|
}
|
|
|
|
oc.setEnrolled(false)
|
|
|
|
return err
|
|
|
|
default:
|
|
|
|
return err
|
2022-09-26 14:44:09 +00:00
|
|
|
}
|
2022-10-03 20:28:19 +00:00
|
|
|
}
|
2022-09-26 14:44:09 +00:00
|
|
|
|
2022-10-03 20:28:19 +00:00
|
|
|
func (oc *OrbitClient) Enrolled() bool {
|
|
|
|
oc.enrolledMu.Lock()
|
|
|
|
defer oc.enrolledMu.Unlock()
|
|
|
|
|
|
|
|
return oc.enrolled
|
|
|
|
}
|
|
|
|
|
|
|
|
func (oc *OrbitClient) setEnrolled(v bool) {
|
|
|
|
oc.enrolledMu.Lock()
|
|
|
|
defer oc.enrolledMu.Unlock()
|
|
|
|
|
|
|
|
oc.enrolled = v
|
|
|
|
}
|
|
|
|
|
|
|
|
func (oc *OrbitClient) LastRecordedError() error {
|
|
|
|
oc.lastRecordedErrMu.Lock()
|
|
|
|
defer oc.lastRecordedErrMu.Unlock()
|
|
|
|
|
|
|
|
return oc.lastRecordedErr
|
|
|
|
}
|
|
|
|
|
|
|
|
func (oc *OrbitClient) setLastRecordedError(err error) {
|
|
|
|
oc.lastRecordedErrMu.Lock()
|
|
|
|
defer oc.lastRecordedErrMu.Unlock()
|
|
|
|
|
|
|
|
oc.lastRecordedErr = fmt.Errorf("%s: %w", time.Now().UTC().Format("2006-01-02T15:04:05Z"), err)
|
2022-09-26 14:44:09 +00:00
|
|
|
}
|
2023-08-04 21:50:03 +00:00
|
|
|
|
|
|
|
func OrbitRetryInterval() time.Duration {
|
|
|
|
interval := os.Getenv("FLEETD_ENROLL_RETRY_INTERVAL")
|
|
|
|
if interval != "" {
|
|
|
|
d, err := time.ParseDuration(interval)
|
|
|
|
if err == nil {
|
|
|
|
return d
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return constant.OrbitEnrollRetrySleep
|
|
|
|
}
|
2023-10-06 22:04:33 +00:00
|
|
|
|
|
|
|
// SetOrUpdateDiskEncryptionKey sends a request to the server to set or update the disk
|
|
|
|
// encryption keys and result of the encryption process
|
|
|
|
func (oc *OrbitClient) SetOrUpdateDiskEncryptionKey(diskEncryptionStatus fleet.OrbitHostDiskEncryptionKeyPayload) error {
|
|
|
|
verb, path := "POST", "/api/fleet/orbit/disk_encryption_key"
|
|
|
|
|
|
|
|
var resp orbitPostDiskEncryptionKeyResponse
|
|
|
|
if err := oc.authenticatedRequest(verb, path, &orbitPostDiskEncryptionKeyRequest{
|
|
|
|
EncryptionKey: diskEncryptionStatus.EncryptionKey,
|
|
|
|
ClientError: diskEncryptionStatus.ClientError,
|
|
|
|
}, &resp); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|