You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
68 lines
2.5 KiB
68 lines
2.5 KiB
import os
|
|
import json
|
|
|
|
from datetime import datetime, timedelta
|
|
from selfdrive.swaglog import cloudlog
|
|
from selfdrive.version import version, terms_version, training_version, get_git_commit, get_git_branch, get_git_remote
|
|
from common.hardware import HARDWARE
|
|
from common.api import api_get
|
|
from common.params import Params
|
|
from common.file_helpers import mkdirs_exists_ok
|
|
from common.basedir import PERSIST
|
|
|
|
|
|
def register():
|
|
params = Params()
|
|
params.put("Version", version)
|
|
params.put("TermsVersion", terms_version)
|
|
params.put("TrainingVersion", training_version)
|
|
|
|
params.put("GitCommit", get_git_commit(default=""))
|
|
params.put("GitBranch", get_git_branch(default=""))
|
|
params.put("GitRemote", get_git_remote(default=""))
|
|
params.put("SubscriberInfo", HARDWARE.get_subscriber_info())
|
|
|
|
# create a key for auth
|
|
# your private key is kept on your device persist partition and never sent to our servers
|
|
# do not erase your persist partition
|
|
if not os.path.isfile(PERSIST+"/comma/id_rsa.pub"):
|
|
cloudlog.warning("generating your personal RSA key")
|
|
mkdirs_exists_ok(PERSIST+"/comma")
|
|
assert os.system("openssl genrsa -out "+PERSIST+"/comma/id_rsa.tmp 2048") == 0
|
|
assert os.system("openssl rsa -in "+PERSIST+"/comma/id_rsa.tmp -pubout -out "+PERSIST+"/comma/id_rsa.tmp.pub") == 0
|
|
os.rename(PERSIST+"/comma/id_rsa.tmp", PERSIST+"/comma/id_rsa")
|
|
os.rename(PERSIST+"/comma/id_rsa.tmp.pub", PERSIST+"/comma/id_rsa.pub")
|
|
|
|
# make key readable by app users (ai.comma.plus.offroad)
|
|
os.chmod(PERSIST+'/comma/', 0o755)
|
|
os.chmod(PERSIST+'/comma/id_rsa', 0o744)
|
|
|
|
dongle_id = params.get("DongleId", encoding='utf8')
|
|
public_key = open(PERSIST+"/comma/id_rsa.pub").read()
|
|
|
|
# create registration token
|
|
# in the future, this key will make JWTs directly
|
|
private_key = open(PERSIST+"/comma/id_rsa").read()
|
|
|
|
# late import
|
|
import jwt
|
|
register_token = jwt.encode({'register': True, 'exp': datetime.utcnow() + timedelta(hours=1)}, private_key, algorithm='RS256')
|
|
|
|
try:
|
|
cloudlog.info("getting pilotauth")
|
|
resp = api_get("v2/pilotauth/", method='POST', timeout=15,
|
|
imei=HARDWARE.get_imei(0), imei2=HARDWARE.get_imei(1), serial=HARDWARE.get_serial(), public_key=public_key, register_token=register_token)
|
|
dongleauth = json.loads(resp.text)
|
|
dongle_id = dongleauth["dongle_id"]
|
|
|
|
params.put("DongleId", dongle_id)
|
|
return dongle_id
|
|
except Exception:
|
|
cloudlog.exception("failed to authenticate")
|
|
if dongle_id is not None:
|
|
return dongle_id
|
|
else:
|
|
return None
|
|
|
|
if __name__ == "__main__":
|
|
print(register())
|
|
|