|
|
|
@ -0,0 +1,89 @@ |
|
|
|
package main |
|
|
|
|
|
|
|
import ( |
|
|
|
"bufio" |
|
|
|
"encoding/json" |
|
|
|
"flag" |
|
|
|
"log" |
|
|
|
"os" |
|
|
|
"os/exec" |
|
|
|
"regexp" |
|
|
|
"strings" |
|
|
|
) |
|
|
|
|
|
|
|
type Host struct { |
|
|
|
Hostname string `json:"hostname"` |
|
|
|
IP string `json:"ip"` //with CIDR network suffix
|
|
|
|
Groups []string `json:"groups,omitempty"` |
|
|
|
} |
|
|
|
|
|
|
|
func main() { |
|
|
|
var err error |
|
|
|
l := log.New(os.Stderr, "", 0) //set logging to standard error and no timestamp
|
|
|
|
|
|
|
|
//commandline options
|
|
|
|
caCertFile := flag.String("c", "./ca.crt", "CA certificate path.") |
|
|
|
caKeyFile := flag.String("k", "./ca.key", "CA key path.") |
|
|
|
binaryPath := flag.String("p", "", "Path to nebula-cert binary file. If not specified, search $PATH and current directory.") |
|
|
|
networkFile := flag.String("f", "-", "Path to network input file. Use '-' for standard input.") |
|
|
|
flag.Parse() |
|
|
|
|
|
|
|
//Locate binary
|
|
|
|
pathFailText := "Executable not found in $PATH or current directory. Specify the path with the '-p' option" |
|
|
|
if *binaryPath == "" { |
|
|
|
*binaryPath, err = exec.LookPath("nebula-cert") |
|
|
|
if err != nil { |
|
|
|
*binaryPath = "./nebula-cert" |
|
|
|
} |
|
|
|
} |
|
|
|
if _, err := os.Stat(*binaryPath); os.IsNotExist(err) { //check if file exists...
|
|
|
|
if *binaryPath != "./nebula-cert" { |
|
|
|
pathFailText = "Executable not found at " + *binaryPath |
|
|
|
} |
|
|
|
l.Fatal(pathFailText) |
|
|
|
} |
|
|
|
|
|
|
|
var inputFile *os.File |
|
|
|
if *networkFile == "-" { //read input from stdin
|
|
|
|
inputFile = os.Stdin |
|
|
|
} else { //read input from file
|
|
|
|
l.Println("Processing network description file: " + *networkFile) |
|
|
|
inputFile, err := os.Open(*networkFile) |
|
|
|
if err != nil { |
|
|
|
l.Fatal("Could not open network description file: " + *networkFile + "\n" + err.Error()) |
|
|
|
} |
|
|
|
defer inputFile.Close() |
|
|
|
} |
|
|
|
//fileBytes, _ := ioutil.ReadAll(inputFile)
|
|
|
|
|
|
|
|
var input string |
|
|
|
scanner := bufio.NewScanner(inputFile) |
|
|
|
for scanner.Scan() { |
|
|
|
input = input + scanner.Text() |
|
|
|
} |
|
|
|
|
|
|
|
//strip out // comments from network description file or input:
|
|
|
|
re := regexp.MustCompile(`([\s]//.*)|(^//.*)`) |
|
|
|
fileCleanedBytes := re.ReplaceAll([]byte(input), nil) |
|
|
|
|
|
|
|
var network []Host |
|
|
|
|
|
|
|
err = json.Unmarshal(fileCleanedBytes, &network) //read the network config
|
|
|
|
if err != nil { |
|
|
|
if *networkFile == "-" { |
|
|
|
*networkFile = "standard input." |
|
|
|
} |
|
|
|
l.Fatal("Could not parse network description from " + *networkFile + "\nError: " + err.Error()) |
|
|
|
} |
|
|
|
|
|
|
|
for _, h := range network { |
|
|
|
groups := strings.Join(h.Groups, ",") |
|
|
|
cmd := exec.Command(*binaryPath, "sign", "-ca-crt", *caCertFile, "-ca-key", *caKeyFile, "-name", h.Hostname, "-ip", h.IP, "-groups", groups) |
|
|
|
output, err := cmd.CombinedOutput() |
|
|
|
if err != nil { |
|
|
|
l.Fatal(h.Hostname + " " + string(output) + " Error: " + err.Error()) |
|
|
|
} |
|
|
|
l.Println(h.Hostname + " OK " + string(output)) |
|
|
|
} |
|
|
|
|
|
|
|
} |