Files
the-other-dude/poller/internal/bus/cmd_cert_deploy.go
Jason Staack b840047e19 feat: The Other Dude v9.0.1 — full-featured email system
ci: add GitHub Pages deployment workflow for docs site

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-08 19:30:44 -05:00

183 lines
5.4 KiB
Go

// Package bus provides a NATS request-reply handler for certificate deployment.
//
// cmd_cert_deploy.go handles cert.deploy.{device_id} subjects. The Python backend
// sends signed certificate PEM data via NATS, and this handler:
// 1. Looks up the device and decrypts credentials
// 2. Establishes SSH/SFTP + RouterOS API connections
// 3. Calls device.DeployCert for the full deployment flow
// 4. Returns the result via NATS reply
package bus
import (
"context"
"encoding/json"
"fmt"
"log/slog"
"strings"
"time"
"github.com/nats-io/nats.go"
"github.com/mikrotik-portal/poller/internal/device"
"github.com/mikrotik-portal/poller/internal/store"
"github.com/mikrotik-portal/poller/internal/vault"
)
// CertDeployResponder handles NATS request-reply for certificate deployment.
type CertDeployResponder struct {
nc *nats.Conn
store *store.DeviceStore
credentialCache *vault.CredentialCache
sub *nats.Subscription
}
// NewCertDeployResponder creates a certificate deployment responder using the
// given NATS connection, device store, and credential cache.
func NewCertDeployResponder(nc *nats.Conn, store *store.DeviceStore, credentialCache *vault.CredentialCache) *CertDeployResponder {
return &CertDeployResponder{nc: nc, store: store, credentialCache: credentialCache}
}
// Start subscribes to "cert.deploy.*" with a queue group for load balancing
// across multiple poller instances.
func (r *CertDeployResponder) Start() error {
sub, err := r.nc.QueueSubscribe("cert.deploy.*", "cert-deploy-workers", r.handleRequest)
if err != nil {
return fmt.Errorf("subscribing to cert.deploy.*: %w", err)
}
r.sub = sub
slog.Info("cert deploy responder subscribed", "subject", "cert.deploy.*", "queue", "cert-deploy-workers")
return nil
}
// Stop unsubscribes from NATS.
func (r *CertDeployResponder) Stop() {
if r.sub != nil {
if err := r.sub.Unsubscribe(); err != nil {
slog.Warn("error unsubscribing cert deploy responder", "error", err)
}
}
}
// handleRequest processes a single certificate deployment request.
func (r *CertDeployResponder) handleRequest(msg *nats.Msg) {
// Extract device ID from subject: cert.deploy.{device_id}
parts := strings.Split(msg.Subject, ".")
if len(parts) < 3 {
r.respondError(msg, "invalid subject format")
return
}
deviceID := parts[2]
// Parse cert deploy request
var req device.CertDeployRequest
if err := json.Unmarshal(msg.Data, &req); err != nil {
r.respondError(msg, fmt.Sprintf("invalid request JSON: %s", err))
return
}
slog.Info("cert deploy request received",
"device_id", deviceID,
"cert_name", req.CertName,
"ssh_port", req.SSHPort,
)
// Default SSH port if not specified
if req.SSHPort == 0 {
req.SSHPort = 22
}
// Look up device from DB
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
defer cancel()
dev, err := r.store.GetDevice(ctx, deviceID)
if err != nil {
slog.Warn("device lookup failed for cert deploy", "device_id", deviceID, "error", err)
r.respondError(msg, fmt.Sprintf("device not found: %s", err))
return
}
// Decrypt device credentials via credential cache (Transit preferred, legacy fallback)
username, password, err := r.credentialCache.GetCredentials(
dev.ID,
dev.TenantID,
dev.EncryptedCredentialsTransit,
dev.EncryptedCredentials,
)
if err != nil {
r.respondError(msg, fmt.Sprintf("credential decryption failed: %s", err))
return
}
// Create SSH client for SFTP upload
sshClient, err := device.NewSSHClient(dev.IPAddress, req.SSHPort, username, password, 30*time.Second)
if err != nil {
slog.Warn("SSH connection failed for cert deploy",
"device_id", deviceID,
"ip", dev.IPAddress,
"ssh_port", req.SSHPort,
"error", err,
)
r.respondError(msg, fmt.Sprintf("SSH connection failed: %s", err))
return
}
defer sshClient.Close()
// Create RouterOS API client for certificate import commands.
// Uses the existing ConnectDevice which tries TLS then falls back to plain.
// Pass nil for caCertPEM -- we're deploying the cert, so the device doesn't
// have a portal-signed cert yet. Plan 03 wires per-device CA cert loading.
apiClient, err := device.ConnectDevice(
dev.IPAddress,
dev.APISSLPort,
dev.APIPort,
username,
password,
10*time.Second,
nil, // caCertPEM: device has no portal cert yet during deployment
dev.TLSMode,
)
if err != nil {
slog.Warn("API connection failed for cert deploy",
"device_id", deviceID,
"ip", dev.IPAddress,
"error", err,
)
r.respondError(msg, fmt.Sprintf("device API connection failed: %s", err))
return
}
defer device.CloseDevice(apiClient)
// Execute the full deployment flow
resp := device.DeployCert(sshClient, apiClient, req)
slog.Info("cert deploy completed",
"device_id", deviceID,
"success", resp.Success,
"cert_name_on_device", resp.CertNameOnDevice,
)
// Respond with result
data, err := json.Marshal(resp)
if err != nil {
r.respondError(msg, fmt.Sprintf("failed to marshal response: %s", err))
return
}
if err := msg.Respond(data); err != nil {
slog.Error("failed to respond to cert deploy request", "error", err)
}
}
// respondError sends an error response to a NATS cert deploy request.
func (r *CertDeployResponder) respondError(msg *nats.Msg, errMsg string) {
resp := device.CertDeployResponse{
Success: false,
Error: errMsg,
}
data, _ := json.Marshal(resp)
if err := msg.Respond(data); err != nil {
slog.Error("failed to respond with cert deploy error", "error", err)
}
}