mirror of
https://github.com/davidallendj/magellan.git
synced 2025-12-20 11:37:01 -07:00
Merge pull request #55 from OpenCHAMI/cacert-hotfix
Fix panic caused when setting '--cacert' flag from invalid client
This commit is contained in:
commit
6d61511e36
4 changed files with 50 additions and 13 deletions
|
|
@ -2,8 +2,12 @@
|
||||||
package magellan
|
package magellan
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/tls"
|
||||||
|
"crypto/x509"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
"path"
|
"path"
|
||||||
"sync"
|
"sync"
|
||||||
|
|
@ -58,12 +62,32 @@ func CollectInventory(assets *[]RemoteAsset, params *CollectParams) error {
|
||||||
done = make(chan struct{}, params.Concurrency+1)
|
done = make(chan struct{}, params.Concurrency+1)
|
||||||
chanAssets = make(chan RemoteAsset, params.Concurrency+1)
|
chanAssets = make(chan RemoteAsset, params.Concurrency+1)
|
||||||
outputPath = path.Clean(params.OutputPath)
|
outputPath = path.Clean(params.OutputPath)
|
||||||
smdClient = client.NewClient(
|
smdClient = &client.SmdClient{Client: &http.Client{}}
|
||||||
client.WithSecureTLS[client.SmdClient](params.CaCertPath),
|
|
||||||
)
|
|
||||||
)
|
)
|
||||||
// set the client's host from the CLI param
|
// set the client's params from CLI
|
||||||
|
// NOTE: temporary solution until client.NewClient() is fixed
|
||||||
smdClient.URI = params.URI
|
smdClient.URI = params.URI
|
||||||
|
if params.CaCertPath != "" {
|
||||||
|
cacert, err := os.ReadFile(params.CaCertPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to read CA cert path: %w", err)
|
||||||
|
}
|
||||||
|
certPool := x509.NewCertPool()
|
||||||
|
certPool.AppendCertsFromPEM(cacert)
|
||||||
|
smdClient.Client.Transport = &http.Transport{
|
||||||
|
TLSClientConfig: &tls.Config{
|
||||||
|
RootCAs: certPool,
|
||||||
|
InsecureSkipVerify: true,
|
||||||
|
},
|
||||||
|
DisableKeepAlives: true,
|
||||||
|
Dial: (&net.Dialer{
|
||||||
|
Timeout: 120 * time.Second,
|
||||||
|
KeepAlive: 120 * time.Second,
|
||||||
|
}).Dial,
|
||||||
|
TLSHandshakeTimeout: 120 * time.Second,
|
||||||
|
ResponseHeaderTimeout: 120 * time.Second,
|
||||||
|
}
|
||||||
|
}
|
||||||
wg.Add(params.Concurrency)
|
wg.Add(params.Concurrency)
|
||||||
for i := 0; i < params.Concurrency; i++ {
|
for i := 0; i < params.Concurrency; i++ {
|
||||||
go func() {
|
go func() {
|
||||||
|
|
|
||||||
|
|
@ -9,17 +9,20 @@ import (
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/rs/zerolog/log"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Option[T Client] func(client T)
|
type Option[T Client] func(client *T)
|
||||||
|
|
||||||
// The 'Client' struct is a wrapper around the default http.Client
|
// The 'Client' struct is a wrapper around the default http.Client
|
||||||
// that provides an extended API to work with functional options.
|
// that provides an extended API to work with functional options.
|
||||||
// It also provides functions that work with `collect` data.
|
// It also provides functions that work with `collect` data.
|
||||||
type Client interface {
|
type Client interface {
|
||||||
|
Init()
|
||||||
Name() string
|
Name() string
|
||||||
GetClient() *http.Client
|
|
||||||
RootEndpoint(endpoint string) string
|
RootEndpoint(endpoint string) string
|
||||||
|
GetInternalClient() *http.Client
|
||||||
|
|
||||||
// functions needed to make request
|
// functions needed to make request
|
||||||
Add(data HTTPBody, headers HTTPHeader) error
|
Add(data HTTPBody, headers HTTPHeader) error
|
||||||
|
|
@ -36,11 +39,17 @@ func NewClient[T Client](opts ...func(T)) T {
|
||||||
}
|
}
|
||||||
|
|
||||||
func WithCertPool[T Client](certPool *x509.CertPool) func(T) {
|
func WithCertPool[T Client](certPool *x509.CertPool) func(T) {
|
||||||
|
// make sure we have a valid cert pool
|
||||||
if certPool == nil {
|
if certPool == nil {
|
||||||
return func(client T) {}
|
return func(client T) {}
|
||||||
}
|
}
|
||||||
return func(client T) {
|
return func(client T) {
|
||||||
client.GetClient().Transport = &http.Transport{
|
// make sure that we can access the internal client
|
||||||
|
if client.GetInternalClient() == nil {
|
||||||
|
log.Warn().Any("client", client.GetInternalClient()).Msg("invalid internal HTTP client ()")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
client.GetInternalClient().Transport = &http.Transport{
|
||||||
TLSClientConfig: &tls.Config{
|
TLSClientConfig: &tls.Config{
|
||||||
RootCAs: certPool,
|
RootCAs: certPool,
|
||||||
InsecureSkipVerify: true,
|
InsecureSkipVerify: true,
|
||||||
|
|
|
||||||
|
|
@ -16,22 +16,26 @@ type SmdClient struct {
|
||||||
Xname string
|
Xname string
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c SmdClient) Name() string {
|
func (c *SmdClient) Init() {
|
||||||
|
c.Client = &http.Client{}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *SmdClient) Name() string {
|
||||||
return "smd"
|
return "smd"
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c SmdClient) RootEndpoint(endpoint string) string {
|
func (c *SmdClient) RootEndpoint(endpoint string) string {
|
||||||
return fmt.Sprintf("%s/hsm/v2%s", c.URI, endpoint)
|
return fmt.Sprintf("%s/hsm/v2%s", c.URI, endpoint)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c SmdClient) GetClient() *http.Client {
|
func (c *SmdClient) GetInternalClient() *http.Client {
|
||||||
return c.Client
|
return c.Client
|
||||||
}
|
}
|
||||||
|
|
||||||
// Add() has a similar function definition to that of the default implementation,
|
// Add() has a similar function definition to that of the default implementation,
|
||||||
// but also allows further customization and data/header manipulation that would
|
// but also allows further customization and data/header manipulation that would
|
||||||
// be specific and/or unique to SMD's API.
|
// be specific and/or unique to SMD's API.
|
||||||
func (c SmdClient) Add(data HTTPBody, headers HTTPHeader) error {
|
func (c *SmdClient) Add(data HTTPBody, headers HTTPHeader) error {
|
||||||
if data == nil {
|
if data == nil {
|
||||||
return fmt.Errorf("failed to add redfish endpoint: no data found")
|
return fmt.Errorf("failed to add redfish endpoint: no data found")
|
||||||
}
|
}
|
||||||
|
|
@ -53,7 +57,7 @@ func (c SmdClient) Add(data HTTPBody, headers HTTPHeader) error {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c SmdClient) Update(data HTTPBody, headers HTTPHeader) error {
|
func (c *SmdClient) Update(data HTTPBody, headers HTTPHeader) error {
|
||||||
if data == nil {
|
if data == nil {
|
||||||
return fmt.Errorf("failed to add redfish endpoint: no data found")
|
return fmt.Errorf("failed to add redfish endpoint: no data found")
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -45,7 +45,7 @@ type InventoryDetail struct {
|
||||||
URI string `json:"uri,omitempty"` // URI of the BMC
|
URI string `json:"uri,omitempty"` // URI of the BMC
|
||||||
UUID string `json:"uuid,omitempty"` // UUID of Node
|
UUID string `json:"uuid,omitempty"` // UUID of Node
|
||||||
Manufacturer string `json:"manufacturer,omitempty"` // Manufacturer of the Node
|
Manufacturer string `json:"manufacturer,omitempty"` // Manufacturer of the Node
|
||||||
SystemType string `json:"system_type,omitempty` // System type of the Node
|
SystemType string `json:"system_type,omitempty"` // System type of the Node
|
||||||
Name string `json:"name,omitempty"` // Name of the Node
|
Name string `json:"name,omitempty"` // Name of the Node
|
||||||
Model string `json:"model,omitempty"` // Model of the Node
|
Model string `json:"model,omitempty"` // Model of the Node
|
||||||
Serial string `json:"serial,omitempty"` // Serial number of the Node
|
Serial string `json:"serial,omitempty"` // Serial number of the Node
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue