// runSetAcct invokes the REST API with POST action and key prefix as // path. The specified configuration file is read from disk and sent // as the POST body. func runSetAcct(cmd *cobra.Command, args []string) { if len(args) != 2 { cmd.Usage() return } server.RunSetAcct(Context, args[0], args[1]) }
func runAddMount(cmd *cobra.Command, args []string) (exit int) { if len(args) == 0 { cmd.Usage() return 1 } if len(args) != 2 { stderr("mount add: incorrect number of arguments") return 1 } if debug { if readOnly { stderr("Adding read only mount point %q=%q", args[0], args[1]) } else { stderr("Adding mount point %q=%q", args[0], args[1]) } } err := newACBuild().AddMount(args[0], args[1], readOnly) if err != nil { stderr("mount add: %v", err) return getErrorCode(err) } return 0 }
func keysList(cmd *cobra.Command, args []string) { if len(args) > 0 { cmd.Usage() os.Exit(1) } fmt.Println("# Trusted CAs:") trustedCAs := caStore.GetCertificates() for _, c := range trustedCAs { printCert(c) } fmt.Println("") fmt.Println("# Trusted Certificates:") trustedCerts := certificateStore.GetCertificates() for _, c := range trustedCerts { printCert(c) } fmt.Println("") fmt.Println("# Signing keys: ") for _, k := range privKeyStore.ListFiles(true) { printKey(k) } }
func runRun(cmd *cobra.Command, args []string) (exit int) { if len(args) == 0 { cmd.Usage() return 1 } if debug { stderr("Running: %v", args) } engine, ok := engines[engineName] if !ok { stderr("run: no such engine %q", engineName) return 1 } err := newACBuild().Run(args, workingdir, insecure, engine) if err != nil { stderr("run: %v", err) return getErrorCode(err) } return 0 }
func tufList(cmd *cobra.Command, args []string) { if len(args) < 1 { cmd.Usage() fatalf("must specify a GUN") } gun := args[0] kdb := keys.NewDB() repo := tuf.NewTufRepo(kdb, nil) remote, err := store.NewHTTPStore( "https://notary:4443/v2/"+gun+"/_trust/tuf/", "", "json", "", ) c, err := bootstrapClient(remote, repo, kdb) if err != nil { return } err = c.Update() if err != nil { logrus.Error("Error updating client: ", err.Error()) return } if rawOutput { for name, meta := range repo.Targets["targets"].Signed.Targets { fmt.Println(name, " ", meta.Hashes["sha256"], " ", meta.Length) } } else { for name, meta := range repo.Targets["targets"].Signed.Targets { fmt.Println(name, " ", meta.Hashes["sha256"], " ", meta.Length) } } }
// NewContent adds new content to a Hugo site. func NewContent(cmd *cobra.Command, args []string) { InitializeConfig() if cmd.Flags().Lookup("format").Changed { viper.Set("MetaDataFormat", configFormat) } if len(args) < 1 { cmd.Usage() jww.FATAL.Fatalln("path needs to be provided") } createpath := args[0] var kind string createpath, kind = newContentPathSection(createpath) if contentType != "" { kind = contentType } err := create.NewContent(kind, createpath) if err != nil { jww.ERROR.Println(err) } }
func runTerm(cmd *cobra.Command, args []string) { if len(args) != 0 { cmd.Usage() return } db := makeSQLClient() liner := liner.NewLiner() defer func() { _ = liner.Close() }() for { l, err := liner.Prompt("> ") if err != nil { if err != io.EOF { fmt.Fprintf(os.Stderr, "Input error: %s\n", err) } break } if len(l) == 0 { continue } liner.AppendHistory(l) if err := processOneLine(db, l); err != nil { fmt.Printf("Error: %s\n", err) } } }
func runInc(cmd *cobra.Command, args []string) { if len(args) > 2 { cmd.Usage() return } kvDB := makeDBClient() if kvDB == nil { return } amount := 1 if len(args) >= 2 { var err error if amount, err = strconv.Atoi(args[1]); err != nil { fmt.Fprintf(osStderr, "invalid increment: %s: %s\n", args[1], err) osExit(1) return } } key := proto.Key(unquoteArg(args[0], true /* disallow system keys */)) if r, err := kvDB.Inc(key, int64(amount)); err != nil { fmt.Fprintf(osStderr, "increment failed: %s\n", err) osExit(1) } else { fmt.Printf("%d\n", r.ValueInt()) } }
func lightColor(c *cobra.Command, args []string) { if flagLightHue == 0 && flagLightSaturation == 0 && flagLightBrightness == 0 && flagLightKelvin == 0 { if err := c.Usage(); err != nil { logger.WithField(`error`, err).Fatalln(`Failed to print usage`) } fmt.Println() logger.Fatalln(`Missing color definition`) } lights := getLights() color := common.Color{ Hue: flagLightHue, Saturation: flagLightSaturation, Brightness: flagLightBrightness, Kelvin: flagLightKelvin, } if len(lights) > 0 { for _, light := range lights { if err := light.SetColor(color, flagLightDuration); err != nil { logger.WithFields(logrus.Fields{ `light-id`: light.ID(), `error`: err, }).Fatalln(`Failed setting color for light`) } } } else { if err := client.SetColor(color, flagLightDuration); err != nil { logger.WithField(`error`, err).Fatalln(`Failed setting color for lights`) } } }
func tunnelDisconnectCmd(cmd *cobra.Command, args []string) { if len(args) != 1 { cmd.Usage() os.Exit(1) } key, err := key.DecodePublic(args[0]) if err != nil { fmt.Println("Error reading server public key,", err) } c := Connect() indexes, err := c.IpTunnel_listConnections() if err != nil { fmt.Println("Error getting tunnel information,", err) os.Exit(1) } for _, i := range indexes { info, err := c.IpTunnel_showConnection(i) if err != nil { fmt.Println(err) continue } if info.Key.Equal(key) { if err = c.IpTunnel_removeConnection(i); err != nil { fmt.Println("Failed to remove tunnel,", err) os.Exit(1) } return } } fmt.Println("tunnel not found") }
func (t *tufCommander) tufLookup(cmd *cobra.Command, args []string) error { if len(args) < 2 { cmd.Usage() return fmt.Errorf("Must specify a GUN and target") } config, err := t.configGetter() if err != nil { return err } gun := args[0] targetName := args[1] rt, err := getTransport(config, gun, true) if err != nil { return err } nRepo, err := notaryclient.NewNotaryRepository( config.GetString("trust_dir"), gun, getRemoteTrustServer(config), rt, t.retriever) if err != nil { return err } target, err := nRepo.GetTargetByName(targetName) if err != nil { return err } cmd.Println(target.Name, fmt.Sprintf("sha256:%x", target.Hashes["sha256"]), target.Length) return nil }
func (t *tufCommander) tufList(cmd *cobra.Command, args []string) error { if len(args) < 1 { cmd.Usage() return fmt.Errorf("Must specify a GUN") } config, err := t.configGetter() if err != nil { return err } gun := args[0] rt, err := getTransport(config, gun, true) if err != nil { return err } nRepo, err := notaryclient.NewNotaryRepository( config.GetString("trust_dir"), gun, getRemoteTrustServer(config), rt, t.retriever) if err != nil { return err } // Retrieve the remote list of signed targets, prioritizing the passed-in list over targets roles := append(t.roles, data.CanonicalTargetsRole) targetList, err := nRepo.ListTargets(roles...) if err != nil { return err } prettyPrintTargets(targetList, cmd.Out()) return nil }
func (t *tufCommander) tufAdd(cmd *cobra.Command, args []string) error { if len(args) < 3 { cmd.Usage() return fmt.Errorf("Must specify a GUN, target, and path to target data") } config, err := t.configGetter() if err != nil { return err } gun := args[0] targetName := args[1] targetPath := args[2] // no online operations are performed by add so the transport argument // should be nil nRepo, err := notaryclient.NewNotaryRepository( config.GetString("trust_dir"), gun, getRemoteTrustServer(config), nil, t.retriever) if err != nil { return err } target, err := notaryclient.NewTarget(targetName, targetPath) if err != nil { return err } // If roles is empty, we default to adding to targets if err = nRepo.AddTarget(target, t.roles...); err != nil { return err } cmd.Printf( "Addition of target \"%s\" to repository \"%s\" staged for next publish.\n", targetName, gun) return nil }
func groupColor(c *cobra.Command, args []string) { if flagGroupHue == 0 && flagGroupSaturation == 0 && flagGroupBrightness == 0 && flagGroupKelvin == 0 { if err := c.Usage(); err != nil { logger.WithField(`error`, err).Fatalln(`Failed to print usage`) } fmt.Println() logger.Fatalln(`Missing color definition`) } groups := getGroups() color := common.Color{ Hue: flagGroupHue, Saturation: flagGroupSaturation, Brightness: flagGroupBrightness, Kelvin: flagGroupKelvin, } if len(groups) > 0 { for _, group := range groups { if err := group.SetColor(color, flagGroupDuration); err != nil { logger.WithFields(logrus.Fields{ `group-id`: group.ID(), `error`: err, }).Fatalln(`Failed setting color for group`) } } } else { if err := client.SetColor(color, flagGroupDuration); err != nil { logger.WithField(`error`, err).Fatalln(`Failed setting color for groups`) } } }
func nbdServeAction(cmd *cobra.Command, args []string) { if len(args) != 0 { cmd.Usage() os.Exit(1) } srv := createServer() defer srv.Close() signalChan := make(chan os.Signal, 1) signal.Notify(signalChan, os.Interrupt) devfinder := &finder{srv} server, err := nbd.NewNBDServer(serveListenAddress, devfinder) if err != nil { die("can't start server: %v", err) } // TODO: sync all conns go func() { <-signalChan server.Close() return }() if err := server.Serve(); err != nil { die("server exited: %v", err) } }
func NewTheme(cmd *cobra.Command, args []string) { InitializeConfig() if len(args) < 1 { cmd.Usage() jww.FATAL.Fatalln("theme name needs to be provided") } createpath := helpers.AbsPathify(path.Join("themes", args[0])) jww.INFO.Println("creating theme at", createpath) if x, _ := helpers.Exists(createpath); x { jww.FATAL.Fatalln(createpath, "already exists") } mkdir(createpath, "layouts", "_default") mkdir(createpath, "layouts", "chrome") touchFile(createpath, "layouts", "index.html") touchFile(createpath, "layouts", "_default", "list.html") touchFile(createpath, "layouts", "_default", "single.html") touchFile(createpath, "layouts", "chrome", "header.html") touchFile(createpath, "layouts", "chrome", "footer.html") mkdir(createpath, "archetypes") touchFile(createpath, "archetypes", "default.md") mkdir(createpath, "static", "js") mkdir(createpath, "static", "css") by := []byte(`The MIT License (MIT) Copyright (c) 2014 YOUR_NAME_HERE Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. `) err := helpers.WriteToDisk(path.Join(createpath, "LICENSE.md"), bytes.NewReader(by)) if err != nil { jww.FATAL.Fatalln(err) } createThemeMD(createpath) }
func NewContent(cmd *cobra.Command, args []string) { InitializeConfig() if len(args) < 1 { cmd.Usage() jww.FATAL.Fatalln("path needs to be provided") } createpath := args[0] var kind string // assume the first directory is the section (kind) if strings.Contains(createpath[1:], "/") { kind = helpers.GuessSection(createpath) } if contentType != "" { kind = contentType } err := create.NewContent(kind, createpath) if err != nil { jww.ERROR.Println(err) } }
func rangeFunc(cmd *cobra.Command, args []string) { if len(args) == 0 || len(args) > 2 { fmt.Fprintln(os.Stderr, cmd.Usage()) os.Exit(1) } k := args[0] end := "" if len(args) == 2 { end = args[1] } if rangeConsistency == "l" { fmt.Println("bench with linearizable range") } else if rangeConsistency == "s" { fmt.Println("bench with serializable range") } else { fmt.Fprintln(os.Stderr, cmd.Usage()) os.Exit(1) } requests := make(chan v3.Op, totalClients) clients := mustCreateClients(totalClients, totalConns) bar = pb.New(rangeTotal) bar.Format("Bom !") bar.Start() r := newReport() for i := range clients { wg.Add(1) go func(c *v3.Client) { defer wg.Done() for op := range requests { st := time.Now() _, err := c.Do(context.Background(), op) r.Results() <- report.Result{Err: err, Start: st, End: time.Now()} bar.Increment() } }(clients[i]) } go func() { for i := 0; i < rangeTotal; i++ { opts := []v3.OpOption{v3.WithRange(end)} if rangeConsistency == "s" { opts = append(opts, v3.WithSerializable()) } op := v3.OpGet(k, opts...) requests <- op } close(requests) }() rc := r.Run() wg.Wait() close(r.Results()) bar.Finish() fmt.Printf("%s", <-rc) }
func runDel(cmd *cobra.Command, args []string) { if len(args) == 0 { cmd.Usage() return } // Do not allow system keys to be deleted. var unquoted []string for i := 0; i < len(args); i++ { unquoted = append(unquoted, unquoteArg(args[0], i%2 == 0 /* disallow system keys */)) } kvDB := makeDBClient() if kvDB == nil { return } b := &client.Batch{} for i := 0; i < len(unquoted); i++ { b.Del(unquoted[i]) } if err := kvDB.Run(b); err != nil { fmt.Fprintf(osStderr, "delete failed: %s\n", err) osExit(1) return } }
func runAddPort(cmd *cobra.Command, args []string) (exit int) { if len(args) == 0 { cmd.Usage() return 1 } if len(args) != 3 { stderr("port add: incorrect number of arguments") return 1 } port, err := strconv.ParseUint(args[2], 10, 16) if err != nil { stderr("port add: port must be a positive number between 0 and 65535") return 1 } if debug { stderr("Adding port %q=%q", args[0], args[1]) } err = newACBuild().AddPort(args[0], args[1], uint(port), count, socketActivated) if err != nil { stderr("port add: %v", err) return getErrorCode(err) } return 0 }
// RunConvert runs a PDAL pipeline with colorization filter. func RunConvert(cmd *cobra.Command, args []string) { if input == "" || output == "" { fmt.Println("input and output filenames must be provided") cmd.Usage() return } if _, err := os.Stat(input); os.IsNotExist(err) { fmt.Printf("No such file or directory: %s\n", input) cmd.Usage() return } if _, err := os.Stat(output); err == nil { fmt.Printf("%s exists; overwriting...\n", output) } if reader == "" { reader, _ = utils.InferReaderFromExt(input) } if writer == "" { writer, _ = utils.InferWriterFromExt(output) } utils.RunPdalTranslate(input, output, "-r", reader, "-w", writer, "-v10", "--debug") if view { utils.OpenData(output) } }
func (t *tufCommander) tufPublish(cmd *cobra.Command, args []string) error { if len(args) < 1 { cmd.Usage() return fmt.Errorf("Must specify a GUN") } config, err := t.configGetter() if err != nil { return err } gun := args[0] cmd.Println("Pushing changes to", gun) rt, err := getTransport(config, gun, false) if err != nil { return err } trustPin, err := getTrustPinning(config) if err != nil { return err } nRepo, err := notaryclient.NewNotaryRepository( config.GetString("trust_dir"), gun, getRemoteTrustServer(config), rt, t.retriever, trustPin) if err != nil { return err } if err = nRepo.Publish(); err != nil { return err } return nil }
// keyRemove deletes a private key based on ID func (k *keyCommander) keyRemove(cmd *cobra.Command, args []string) error { if len(args) < 1 { cmd.Usage() return fmt.Errorf("must specify the key ID of the key to remove") } config, err := k.configGetter() if err != nil { return err } ks, err := k.getKeyStores(config, true, false) if err != nil { return err } keyID := args[0] // This is an invalid ID if len(keyID) != notary.SHA256HexSize { return fmt.Errorf("invalid key ID provided: %s", keyID) } cmd.Println("") err = removeKeyInteractively(ks, keyID, k.input, cmd.Out()) cmd.Println("") return err }
func (k *keyCommander) importKeys(cmd *cobra.Command, args []string) error { if len(args) < 1 { cmd.Usage() return fmt.Errorf("must specify at least one input file to import keys from") } config, err := k.configGetter() if err != nil { return err } directory := config.GetString("trust_dir") importers, err := getImporters(directory, k.getRetriever()) if err != nil { return err } for _, file := range args { from, err := os.OpenFile(file, os.O_RDONLY, notary.PrivExecPerms) if err != nil { return err } defer from.Close() if err = utils.ImportKeys(from, importers, k.keysImportRole, k.keysImportGUN, k.getRetriever()); err != nil { return err } } return nil }
func tufAdd(cmd *cobra.Command, args []string) { if len(args) < 3 { cmd.Usage() fatalf("must specify a GUN, target, and path to target data") } gun := args[0] targetName := args[1] targetPath := args[2] kdb := keys.NewDB() signer := signed.NewSigner(NewCryptoService(gun)) repo := tuf.NewTufRepo(kdb, signer) b, err := ioutil.ReadFile(targetPath) if err != nil { fatalf(err.Error()) } filestore := bootstrapRepo(gun, repo) fmt.Println("Generating metadata for target") meta, err := data.NewFileMeta(bytes.NewBuffer(b)) if err != nil { fatalf(err.Error()) } fmt.Printf("Adding target \"%s\" with sha256 \"%s\" and size %d bytes.\n", targetName, meta.Hashes["sha256"], meta.Length) _, err = repo.AddTargets("targets", data.Files{targetName: meta}) if err != nil { fatalf(err.Error()) } saveRepo(repo, filestore) }
// NewSite creates a new hugo site and initializes a structured Hugo directory. func NewSite(cmd *cobra.Command, args []string) { if len(args) < 1 { cmd.Usage() jww.FATAL.Fatalln("path needs to be provided") } createpath, err := filepath.Abs(filepath.Clean(args[0])) if err != nil { cmd.Usage() jww.FATAL.Fatalln(err) } if x, _ := helpers.Exists(createpath, hugofs.SourceFs); x { y, _ := helpers.IsDir(createpath, hugofs.SourceFs) if z, _ := helpers.IsEmpty(createpath, hugofs.SourceFs); y && z { jww.INFO.Println(createpath, "already exists and is empty") } else { jww.FATAL.Fatalln(createpath, "already exists and is not empty") } } mkdir(createpath, "layouts") mkdir(createpath, "content") mkdir(createpath, "archetypes") mkdir(createpath, "static") mkdir(createpath, "data") createConfig(createpath, configFormat) }
// runRmPerms invokes the REST API with DELETE action and key prefix as // path. func runRmPerms(cmd *cobra.Command, args []string) { if len(args) != 1 { cmd.Usage() return } server.RunRmPerm(Context, args[0]) }
func Show(cmd *cobra.Command, args []string) { log.Verbose(verbose) if len(args) < 1 { //fmt.Fprintln(os.Stderr, "missing arguments") cmd.Usage() return } stub, err := pub.GetStubAndLoginFromCfg(cfg, &info) if err != nil { fmt.Fprintln(os.Stderr, "failed to Login\n", "error:", err.Error()) return } if bShowRes { err = showRes(stub, info.ID, args[0]) } else { err = showManifest(stub, info.ID, args[0]) } if err != nil { fmt.Fprintln(os.Stderr, "error:", err.Error()) } }
func checkChaincodeCmdParams(cmd *cobra.Command) error { if chaincodeName == undefinedParamValue { if chaincodePath == undefinedParamValue { err := fmt.Sprintf("Error: must supply value for %s path parameter.\n", chainFuncName) cmd.Out().Write([]byte(err)) cmd.Usage() return errors.New(err) } } if chaincodeCtorJSON != "{}" { // Check to ensure the JSON has "function" and "args" keys input := &pb.ChaincodeMessage{} jsonerr := json.Unmarshal([]byte(chaincodeCtorJSON), &input) if jsonerr != nil { err := fmt.Sprintf("Error: must supply 'function' and 'args' keys in %s constructor parameter.\n", chainFuncName) cmd.Out().Write([]byte(err)) cmd.Usage() return errors.New(err) } } return nil }
func tufAdd(cmd *cobra.Command, args []string) { if len(args) < 3 { cmd.Usage() fatalf("must specify a GUN, target, and path to target data") } gun := args[0] targetName := args[1] targetPath := args[2] parseConfig() // no online operations are performed by add so the transport argument // should be nil nRepo, err := notaryclient.NewNotaryRepository(trustDir, gun, getRemoteTrustServer(), nil, retriever) if err != nil { fatalf(err.Error()) } target, err := notaryclient.NewTarget(targetName, targetPath) if err != nil { fatalf(err.Error()) } err = nRepo.AddTarget(target) if err != nil { fatalf(err.Error()) } fmt.Printf("Addition of %s to %s staged for next publish.\n", targetName, gun) }