// This package provides utilities that underlie the specific commands. // The idea is to make the specific command files very small, e.g.: // // func main() { // app := cmd.NewAppShell("command-name") // app.Action = func(c cmd.Config) { // // command logic // } // app.Run() // } // // All commands share the same invocation pattern. They take a single // parameter "-config", which is the name of a JSON file containing // the configuration for the app. This JSON file is unmarshalled into // a Config object, which is provided to the app. package cmd import ( "encoding/json" "encoding/pem" "errors" "expvar" // For DebugServer, below. "fmt" "io/ioutil" "log" "log/syslog" "net" "net/http" _ "net/http/pprof" // HTTP performance profiling, added transparently to HTTP APIs "os" "os/signal" "path" "runtime" "strings" "syscall" "google.golang.org/grpc/grpclog" cfsslLog "github.com/cloudflare/cfssl/log" "github.com/go-sql-driver/mysql" "github.com/prometheus/client_golang/prometheus" "github.com/prometheus/client_golang/prometheus/promhttp" "github.com/letsencrypt/boulder/core" "github.com/letsencrypt/boulder/features" blog "github.com/letsencrypt/boulder/log" "github.com/letsencrypt/boulder/metrics" ) // Because we don't know when this init will be called with respect to // flag.Parse() and other flag definitions, we can't rely on the regular // flag mechanism. But this one is fine. func init() { for _, v := range os.Args { if v == "--version" || v == "-version" { fmt.Println(VersionString()) os.Exit(0) } } } // mysqlLogger proxies blog.AuditLogger to provide a Print(...) method. type mysqlLogger struct { blog.Logger } func (m mysqlLogger) Print(v ...interface{}) { m.AuditErr(fmt.Sprintf("[mysql] %s", fmt.Sprint(v...))) } // cfsslLogger provides two additional methods that are expected by CFSSL's // logger but not supported by Boulder's Logger. type cfsslLogger struct { blog.Logger } func (cl cfsslLogger) Crit(msg string) { cl.AuditErr(msg) } func (cl cfsslLogger) Emerg(msg string) { cl.AuditErr(msg) } type grpcLogger struct { blog.Logger } func (log grpcLogger) Fatal(args ...interface{}) { log.Print(args...) os.Exit(1) } func (log grpcLogger) Fatalf(format string, args ...interface{}) { log.Printf(format, args...) os.Exit(1) } func (log grpcLogger) Fatalln(args ...interface{}) { log.Println(args...) os.Exit(1) } func (log grpcLogger) Print(args ...interface{}) { log.AuditErr(fmt.Sprint(args...)) } func (log grpcLogger) Printf(format string, args ...interface{}) { log.AuditErr(fmt.Sprintf(format, args...)) } func (log grpcLogger) Println(args ...interface{}) { log.AuditErr(fmt.Sprintln(args...)) } // StatsAndLogging constructs a metrics.Scope and an AuditLogger based on its config // parameters, and return them both. Crashes if any setup fails. // Also sets the constructed AuditLogger as the default logger, and configures // the cfssl, mysql, and grpc packages to use our logger. // This must be called before any gRPC code is called, because gRPC's SetLogger // doesn't use any locking. func StatsAndLogging(logConf SyslogConfig) (metrics.Scope, blog.Logger) { scope := metrics.NewPromScope(prometheus.DefaultRegisterer) tag := path.Base(os.Args[0]) syslogger, err := syslog.Dial( "", "", syslog.LOG_INFO, // default, not actually used tag) FailOnError(err, "Could not connect to Syslog") syslogLevel := int(syslog.LOG_INFO) if logConf.SyslogLevel != 0 { syslogLevel = logConf.SyslogLevel } logger, err := blog.New(syslogger, logConf.StdoutLevel, syslogLevel) FailOnError(err, "Could not connect to Syslog") _ = blog.Set(logger) cfsslLog.SetLogger(cfsslLogger{logger}) _ = mysql.SetLogger(mysqlLogger{logger}) grpclog.SetLogger(grpcLogger{logger}) return scope, logger } // FailOnError exits and prints an error message if we encountered a problem func FailOnError(err error, msg string) { if err != nil { logger := blog.Get() logger.AuditErr(fmt.Sprintf("%s: %s", msg, err)) fmt.Fprintf(os.Stderr, "%s: %s\n", msg, err) os.Exit(1) } } // LoadCert loads a PEM-formatted certificate from the provided path, returning // it as a byte array, or an error if it couldn't be decoded. func LoadCert(path string) (cert []byte, err error) { if path == "" { err = errors.New("Issuer certificate was not provided in config.") return } pemBytes, err := ioutil.ReadFile(path) if err != nil { return } block, _ := pem.Decode(pemBytes) if block == nil || block.Type != "CERTIFICATE" { err = errors.New("Invalid certificate value returned") return } cert = block.Bytes return } // DebugServer starts a server to receive debug information. Typical // usage is to start it in a goroutine, configured with an address // from the appropriate configuration object: // // go cmd.DebugServer(c.XA.DebugAddr) func DebugServer(addr string) { m := expvar.NewMap("enabled-features") features.Export(m) if addr == "" { log.Fatalf("unable to boot debug server because no address was given for it. Set debugAddr.") } ln, err := net.Listen("tcp", addr) if err != nil { log.Fatalf("unable to boot debug server on %#v", addr) } http.Handle("/metrics", promhttp.Handler()) err = http.Serve(ln, nil) if err != nil { log.Fatalf("unable to boot debug server: %v", err) } } // ReadConfigFile takes a file path as an argument and attempts to // unmarshal the content of the file into a struct containing a // configuration of a boulder component. func ReadConfigFile(filename string, out interface{}) error { configData, err := ioutil.ReadFile(filename) if err != nil { return err } return json.Unmarshal(configData, out) } // VersionString produces a friendly Application version string. func VersionString() string { name := path.Base(os.Args[0]) return fmt.Sprintf("Versions: %s=(%s %s) Golang=(%s) BuildHost=(%s)", name, core.GetBuildID(), core.GetBuildTime(), runtime.Version(), core.GetBuildHost()) } var signalToName = map[os.Signal]string{ syscall.SIGTERM: "SIGTERM", syscall.SIGINT: "SIGINT", syscall.SIGHUP: "SIGHUP", } // CatchSignals catches SIGTERM, SIGINT, SIGHUP and executes a callback // method before exiting func CatchSignals(logger blog.Logger, callback func()) { sigChan := make(chan os.Signal, 1) signal.Notify(sigChan, syscall.SIGTERM) signal.Notify(sigChan, syscall.SIGINT) signal.Notify(sigChan, syscall.SIGHUP) sig := <-sigChan if logger != nil { logger.Info(fmt.Sprintf("Caught %s", signalToName[sig])) } if callback != nil { callback() } if logger != nil { logger.Info("Exiting") } os.Exit(0) } // FilterShutdownErrors returns the input error, with the exception of "use of // closed network connection," on which it returns nil // Per https://github.com/grpc/grpc-go/issues/1017, a gRPC server's `Serve()` // will always return an error, even when GracefulStop() is called. We don't // want to log graceful stops as errors, so we filter out the meaningless // error we get in that situation. func FilterShutdownErrors(err error) error { if err == nil { return nil } if strings.Contains(err.Error(), "use of closed network connection") { return nil } return err }