2015-11-10 21:40:39 +00:00
|
|
|
package internal
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
2016-04-29 01:23:45 +00:00
|
|
|
"bytes"
|
2016-02-03 19:59:34 +00:00
|
|
|
"crypto/rand"
|
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
2015-11-10 21:40:39 +00:00
|
|
|
"errors"
|
2015-12-14 22:15:51 +00:00
|
|
|
"fmt"
|
2016-02-03 19:59:34 +00:00
|
|
|
"io/ioutil"
|
2016-04-29 01:23:45 +00:00
|
|
|
"log"
|
2016-05-30 22:24:42 +00:00
|
|
|
"math/big"
|
2015-11-10 21:40:39 +00:00
|
|
|
"os"
|
2016-04-29 01:23:45 +00:00
|
|
|
"os/exec"
|
2016-05-23 12:33:43 +00:00
|
|
|
"strconv"
|
2015-11-10 21:40:39 +00:00
|
|
|
"strings"
|
|
|
|
"time"
|
2016-03-23 15:40:38 +00:00
|
|
|
"unicode"
|
2015-11-10 21:40:39 +00:00
|
|
|
)
|
|
|
|
|
2016-02-03 19:59:34 +00:00
|
|
|
const alphanum string = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"
|
|
|
|
|
2016-04-29 01:23:45 +00:00
|
|
|
var (
|
|
|
|
TimeoutErr = errors.New("Command timed out.")
|
|
|
|
|
|
|
|
NotImplementedError = errors.New("not implemented yet")
|
|
|
|
)
|
|
|
|
|
2015-11-10 21:40:39 +00:00
|
|
|
// Duration just wraps time.Duration
|
|
|
|
type Duration struct {
|
2015-12-04 18:44:56 +00:00
|
|
|
Duration time.Duration
|
2015-11-10 21:40:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalTOML parses the duration from the TOML config file
|
|
|
|
func (d *Duration) UnmarshalTOML(b []byte) error {
|
2016-05-23 12:33:43 +00:00
|
|
|
var err error
|
2016-11-09 16:35:58 +00:00
|
|
|
b = bytes.Trim(b, `'`)
|
2016-10-25 07:30:01 +00:00
|
|
|
|
2016-11-09 16:35:58 +00:00
|
|
|
// see if we can directly convert it
|
2016-10-25 12:11:32 +00:00
|
|
|
d.Duration, err = time.ParseDuration(string(b))
|
|
|
|
if err == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-05-23 12:33:43 +00:00
|
|
|
// Parse string duration, ie, "1s"
|
2016-10-25 07:30:01 +00:00
|
|
|
if uq, err := strconv.Unquote(string(b)); err == nil && len(uq) > 0 {
|
|
|
|
d.Duration, err = time.ParseDuration(uq)
|
|
|
|
if err == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2015-11-10 21:40:39 +00:00
|
|
|
}
|
|
|
|
|
2016-05-23 12:33:43 +00:00
|
|
|
// First try parsing as integer seconds
|
|
|
|
sI, err := strconv.ParseInt(string(b), 10, 64)
|
|
|
|
if err == nil {
|
|
|
|
d.Duration = time.Second * time.Duration(sI)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
// Second try parsing as float seconds
|
|
|
|
sF, err := strconv.ParseFloat(string(b), 64)
|
|
|
|
if err == nil {
|
|
|
|
d.Duration = time.Second * time.Duration(sF)
|
|
|
|
return nil
|
|
|
|
}
|
2015-11-10 21:40:39 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadLines reads contents from a file and splits them by new lines.
|
|
|
|
// A convenience wrapper to ReadLinesOffsetN(filename, 0, -1).
|
|
|
|
func ReadLines(filename string) ([]string, error) {
|
|
|
|
return ReadLinesOffsetN(filename, 0, -1)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadLines reads contents from file and splits them by new line.
|
|
|
|
// The offset tells at which line number to start.
|
|
|
|
// The count determines the number of lines to read (starting from offset):
|
|
|
|
// n >= 0: at most n lines
|
|
|
|
// n < 0: whole file
|
|
|
|
func ReadLinesOffsetN(filename string, offset uint, n int) ([]string, error) {
|
|
|
|
f, err := os.Open(filename)
|
|
|
|
if err != nil {
|
|
|
|
return []string{""}, err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
var ret []string
|
|
|
|
|
|
|
|
r := bufio.NewReader(f)
|
|
|
|
for i := 0; i < n+int(offset) || n < 0; i++ {
|
|
|
|
line, err := r.ReadString('\n')
|
|
|
|
if err != nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if i < int(offset) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
ret = append(ret, strings.Trim(line, "\n"))
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret, nil
|
|
|
|
}
|
2015-12-07 22:37:05 +00:00
|
|
|
|
2016-02-03 19:59:34 +00:00
|
|
|
// RandomString returns a random string of alpha-numeric characters
|
|
|
|
func RandomString(n int) string {
|
|
|
|
var bytes = make([]byte, n)
|
|
|
|
rand.Read(bytes)
|
|
|
|
for i, b := range bytes {
|
|
|
|
bytes[i] = alphanum[b%byte(len(alphanum))]
|
|
|
|
}
|
|
|
|
return string(bytes)
|
|
|
|
}
|
|
|
|
|
2018-04-18 00:02:04 +00:00
|
|
|
// GetTLSConfig gets a tls.Config object from the given certs, key, and CA files
|
|
|
|
// for use with a client.
|
|
|
|
// The full path to each file must be provided.
|
|
|
|
// Returns a nil pointer if all files are blank and InsecureSkipVerify=false.
|
2016-02-03 19:59:34 +00:00
|
|
|
func GetTLSConfig(
|
|
|
|
SSLCert, SSLKey, SSLCA string,
|
|
|
|
InsecureSkipVerify bool,
|
|
|
|
) (*tls.Config, error) {
|
2016-03-18 16:24:44 +00:00
|
|
|
if SSLCert == "" && SSLKey == "" && SSLCA == "" && !InsecureSkipVerify {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
t := &tls.Config{
|
|
|
|
InsecureSkipVerify: InsecureSkipVerify,
|
|
|
|
}
|
2016-02-03 19:59:34 +00:00
|
|
|
|
2016-03-18 16:24:44 +00:00
|
|
|
if SSLCA != "" {
|
2016-02-03 19:59:34 +00:00
|
|
|
caCert, err := ioutil.ReadFile(SSLCA)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New(fmt.Sprintf("Could not load TLS CA: %s",
|
|
|
|
err))
|
|
|
|
}
|
|
|
|
|
|
|
|
caCertPool := x509.NewCertPool()
|
|
|
|
caCertPool.AppendCertsFromPEM(caCert)
|
2016-03-18 16:24:44 +00:00
|
|
|
t.RootCAs = caCertPool
|
|
|
|
}
|
2016-02-03 19:59:34 +00:00
|
|
|
|
2016-03-18 16:24:44 +00:00
|
|
|
if SSLCert != "" && SSLKey != "" {
|
|
|
|
cert, err := tls.LoadX509KeyPair(SSLCert, SSLKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New(fmt.Sprintf(
|
2016-06-22 15:23:49 +00:00
|
|
|
"Could not load TLS client key/certificate from %s:%s: %s",
|
|
|
|
SSLKey, SSLCert, err))
|
2016-02-03 19:59:34 +00:00
|
|
|
}
|
2016-03-18 16:24:44 +00:00
|
|
|
|
|
|
|
t.Certificates = []tls.Certificate{cert}
|
2016-03-16 18:44:11 +00:00
|
|
|
t.BuildNameToCertificate()
|
2016-02-03 19:59:34 +00:00
|
|
|
}
|
2016-03-18 16:24:44 +00:00
|
|
|
|
2016-02-03 19:59:34 +00:00
|
|
|
// will be nil by default if nothing is provided
|
|
|
|
return t, nil
|
|
|
|
}
|
|
|
|
|
2018-04-18 00:02:04 +00:00
|
|
|
// GetServerTLSConfig gets a tls.Config object from the given certs, key, and one or more CA files
|
|
|
|
// for use with a server.
|
|
|
|
// The full path to each file must be provided.
|
|
|
|
// Returns a nil pointer if all files are blank.
|
|
|
|
func GetServerTLSConfig(
|
|
|
|
TLSCert, TLSKey string,
|
|
|
|
TLSAllowedCACerts []string,
|
|
|
|
) (*tls.Config, error) {
|
|
|
|
if TLSCert == "" && TLSKey == "" && len(TLSAllowedCACerts) == 0 {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
t := &tls.Config{}
|
|
|
|
|
|
|
|
if len(TLSAllowedCACerts) != 0 {
|
|
|
|
caCertPool := x509.NewCertPool()
|
|
|
|
for _, cert := range TLSAllowedCACerts {
|
|
|
|
c, err := ioutil.ReadFile(cert)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New(fmt.Sprintf("Could not load TLS CA: %s",
|
|
|
|
err))
|
|
|
|
}
|
|
|
|
caCertPool.AppendCertsFromPEM(c)
|
|
|
|
}
|
|
|
|
t.ClientCAs = caCertPool
|
|
|
|
t.ClientAuth = tls.RequireAndVerifyClientCert
|
|
|
|
}
|
|
|
|
|
|
|
|
if TLSCert != "" && TLSKey != "" {
|
|
|
|
cert, err := tls.LoadX509KeyPair(TLSCert, TLSKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New(fmt.Sprintf(
|
|
|
|
"Could not load TLS client key/certificate from %s:%s: %s",
|
|
|
|
TLSKey, TLSCert, err))
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Certificates = []tls.Certificate{cert}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.BuildNameToCertificate()
|
|
|
|
|
|
|
|
return t, nil
|
|
|
|
}
|
|
|
|
|
2016-03-23 15:40:38 +00:00
|
|
|
// SnakeCase converts the given string to snake case following the Golang format:
|
|
|
|
// acronyms are converted to lower-case and preceded by an underscore.
|
|
|
|
func SnakeCase(in string) string {
|
|
|
|
runes := []rune(in)
|
|
|
|
length := len(runes)
|
|
|
|
|
|
|
|
var out []rune
|
|
|
|
for i := 0; i < length; i++ {
|
|
|
|
if i > 0 && unicode.IsUpper(runes[i]) && ((i+1 < length && unicode.IsLower(runes[i+1])) || unicode.IsLower(runes[i-1])) {
|
|
|
|
out = append(out, '_')
|
|
|
|
}
|
|
|
|
out = append(out, unicode.ToLower(runes[i]))
|
|
|
|
}
|
|
|
|
|
|
|
|
return string(out)
|
|
|
|
}
|
2016-04-29 01:23:45 +00:00
|
|
|
|
|
|
|
// CombinedOutputTimeout runs the given command with the given timeout and
|
|
|
|
// returns the combined output of stdout and stderr.
|
|
|
|
// If the command times out, it attempts to kill the process.
|
|
|
|
func CombinedOutputTimeout(c *exec.Cmd, timeout time.Duration) ([]byte, error) {
|
|
|
|
var b bytes.Buffer
|
|
|
|
c.Stdout = &b
|
|
|
|
c.Stderr = &b
|
|
|
|
if err := c.Start(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
err := WaitTimeout(c, timeout)
|
|
|
|
return b.Bytes(), err
|
|
|
|
}
|
|
|
|
|
|
|
|
// RunTimeout runs the given command with the given timeout.
|
|
|
|
// If the command times out, it attempts to kill the process.
|
|
|
|
func RunTimeout(c *exec.Cmd, timeout time.Duration) error {
|
|
|
|
if err := c.Start(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return WaitTimeout(c, timeout)
|
|
|
|
}
|
|
|
|
|
|
|
|
// WaitTimeout waits for the given command to finish with a timeout.
|
|
|
|
// It assumes the command has already been started.
|
|
|
|
// If the command times out, it attempts to kill the process.
|
|
|
|
func WaitTimeout(c *exec.Cmd, timeout time.Duration) error {
|
|
|
|
timer := time.NewTimer(timeout)
|
|
|
|
done := make(chan error)
|
|
|
|
go func() { done <- c.Wait() }()
|
|
|
|
select {
|
|
|
|
case err := <-done:
|
|
|
|
timer.Stop()
|
|
|
|
return err
|
|
|
|
case <-timer.C:
|
|
|
|
if err := c.Process.Kill(); err != nil {
|
2016-09-30 21:37:56 +00:00
|
|
|
log.Printf("E! FATAL error killing process: %s", err)
|
2016-04-29 01:23:45 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
// wait for the command to return after killing it
|
|
|
|
<-done
|
|
|
|
return TimeoutErr
|
|
|
|
}
|
|
|
|
}
|
2016-05-26 09:40:03 +00:00
|
|
|
|
2016-05-30 22:24:42 +00:00
|
|
|
// RandomSleep will sleep for a random amount of time up to max.
|
|
|
|
// If the shutdown channel is closed, it will return before it has finished
|
|
|
|
// sleeping.
|
|
|
|
func RandomSleep(max time.Duration, shutdown chan struct{}) {
|
|
|
|
if max == 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
maxSleep := big.NewInt(max.Nanoseconds())
|
|
|
|
|
|
|
|
var sleepns int64
|
|
|
|
if j, err := rand.Int(rand.Reader, maxSleep); err == nil {
|
|
|
|
sleepns = j.Int64()
|
|
|
|
}
|
|
|
|
|
|
|
|
t := time.NewTimer(time.Nanosecond * time.Duration(sleepns))
|
|
|
|
select {
|
|
|
|
case <-t.C:
|
|
|
|
return
|
|
|
|
case <-shutdown:
|
|
|
|
t.Stop()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|