mirror of https://github.com/hashicorp/consul
151 lines
3.5 KiB
Go
151 lines
3.5 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
package agent
|
|
|
|
import (
|
|
"crypto/sha256"
|
|
"fmt"
|
|
"os"
|
|
"os/exec"
|
|
"os/signal"
|
|
osuser "os/user"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/hashicorp/consul/types"
|
|
)
|
|
|
|
func stringHashSHA256(s string) string {
|
|
return fmt.Sprintf("%x", sha256.Sum256([]byte(s)))
|
|
}
|
|
|
|
// checkIDHash returns a simple md5sum for a types.CheckID.
|
|
func checkIDHash(checkID types.CheckID) string {
|
|
return stringHashSHA256(string(checkID))
|
|
}
|
|
|
|
// setFilePermissions handles configuring ownership and permissions
|
|
// settings on a given file. All permission/ownership settings are
|
|
// optional. If no user or group is specified, the current user/group
|
|
// will be used. Mode is optional, and has no default (the operation is
|
|
// not performed if absent). User may be specified by name or ID, but
|
|
// group may only be specified by ID.
|
|
func setFilePermissions(path string, user, group, mode string) error {
|
|
var err error
|
|
uid, gid := os.Getuid(), os.Getgid()
|
|
|
|
if user != "" {
|
|
if uid, err = strconv.Atoi(user); err == nil {
|
|
goto GROUP
|
|
}
|
|
|
|
// Try looking up the user by name
|
|
u, err := osuser.Lookup(user)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to look up user %s: %v", user, err)
|
|
}
|
|
uid, _ = strconv.Atoi(u.Uid)
|
|
}
|
|
|
|
GROUP:
|
|
if group != "" {
|
|
if gid, err = strconv.Atoi(group); err != nil {
|
|
return fmt.Errorf("invalid group specified: %v", group)
|
|
}
|
|
}
|
|
if err := os.Chown(path, uid, gid); err != nil {
|
|
return fmt.Errorf("failed setting ownership to %d:%d on %q: %s",
|
|
uid, gid, path, err)
|
|
}
|
|
|
|
if mode != "" {
|
|
mode, err := strconv.ParseUint(mode, 8, 32)
|
|
if err != nil {
|
|
return fmt.Errorf("invalid mode specified: %v", mode)
|
|
}
|
|
if err := os.Chmod(path, os.FileMode(mode)); err != nil {
|
|
return fmt.Errorf("failed setting permissions to %d on %q: %s",
|
|
mode, path, err)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ForwardSignals will fire up a goroutine to forward signals to the given
|
|
// subprocess until the shutdown channel is closed.
|
|
func ForwardSignals(cmd *exec.Cmd, logFn func(error), shutdownCh <-chan struct{}) {
|
|
go func() {
|
|
signalCh := make(chan os.Signal, 10)
|
|
signal.Notify(signalCh, forwardSignals...)
|
|
defer signal.Stop(signalCh)
|
|
|
|
for {
|
|
select {
|
|
case sig := <-signalCh:
|
|
if err := cmd.Process.Signal(sig); err != nil {
|
|
logFn(fmt.Errorf("failed to send signal %q: %v", sig, err))
|
|
}
|
|
|
|
case <-shutdownCh:
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
}
|
|
|
|
type durationFixer map[string]bool
|
|
|
|
func NewDurationFixer(fields ...string) durationFixer {
|
|
d := make(map[string]bool)
|
|
for _, field := range fields {
|
|
d[field] = true
|
|
}
|
|
return d
|
|
}
|
|
|
|
// FixupDurations is used to handle parsing any field names in the map to time.Durations
|
|
func (d durationFixer) FixupDurations(raw interface{}) error {
|
|
rawMap, ok := raw.(map[string]interface{})
|
|
if !ok {
|
|
return nil
|
|
}
|
|
for key, val := range rawMap {
|
|
switch val.(type) {
|
|
case map[string]interface{}:
|
|
if err := d.FixupDurations(val); err != nil {
|
|
return err
|
|
}
|
|
|
|
case []interface{}:
|
|
for _, v := range val.([]interface{}) {
|
|
if err := d.FixupDurations(v); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
case []map[string]interface{}:
|
|
for _, v := range val.([]map[string]interface{}) {
|
|
if err := d.FixupDurations(v); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
default:
|
|
if d[strings.ToLower(key)] {
|
|
// Convert a string value into an integer
|
|
if vStr, ok := val.(string); ok {
|
|
dur, err := time.ParseDuration(vStr)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
rawMap[key] = dur
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|