/
basic_classifiers.go
94 lines (79 loc) · 2.32 KB
/
basic_classifiers.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
package fails
import (
"context"
"crypto/tls"
"crypto/x509"
"errors"
"net"
"strings"
)
var IdempotentRequestEOFError = errors.New("EOF (via idempotent request)")
var IncompleteRequestError = errors.New("incomplete request")
var AttemptedTLSWithNonTLSBackend = ClassifierFunc(func(err error) bool {
return errors.As(err, &tls.RecordHeaderError{})
})
var Dial = ClassifierFunc(func(err error) bool {
var opErr *net.OpError
if errors.As(err, &opErr) {
return opErr.Op == "dial"
}
return false
})
var ContextCancelled = ClassifierFunc(func(err error) bool {
return errors.Is(err, context.Canceled)
})
var ConnectionResetOnRead = ClassifierFunc(func(err error) bool {
var opErr *net.OpError
if errors.As(err, &opErr) {
return opErr.Err.Error() == "read: connection reset by peer"
}
return false
})
var RemoteFailedCertCheck = ClassifierFunc(func(err error) bool {
var opErr *net.OpError
if errors.As(err, &opErr) {
if opErr.Op == "remote error" {
if opErr.Err.Error() == "tls: bad certificate" ||
opErr.Err.Error() == "tls: unknown certificate authority" ||
opErr.Err.Error() == "tls: certificate required" {
return true
}
}
}
return false
})
var RemoteHandshakeTimeout = ClassifierFunc(func(err error) bool {
return err != nil && strings.Contains(err.Error(), "net/http: TLS handshake timeout")
})
var ExpiredOrNotYetValidCertFailure = ClassifierFunc(func(err error) bool {
var certErr x509.CertificateInvalidError
if errors.As(err, &certErr) {
return certErr.Reason == x509.Expired
}
return false
})
var RemoteHandshakeFailure = ClassifierFunc(func(err error) bool {
var opErr *net.OpError
if errors.As(err, &opErr) {
return opErr != nil && opErr.Error() == "remote error: tls: handshake failure"
}
return false
})
var HostnameMismatch = ClassifierFunc(func(err error) bool {
return errors.As(err, &x509.HostnameError{})
})
var UntrustedCert = ClassifierFunc(func(err error) bool {
var tlsCertError *tls.CertificateVerificationError
switch {
case errors.As(err, &x509.UnknownAuthorityError{}), errors.As(err, &tlsCertError):
return true
default:
return false
}
})
var IdempotentRequestEOF = ClassifierFunc(func(err error) bool {
return errors.Is(err, IdempotentRequestEOFError)
})
var IncompleteRequest = ClassifierFunc(func(err error) bool {
return errors.Is(err, IncompleteRequestError)
})