forked from cloudfoundry/blackbox
/
tls_syslog_server.go
72 lines (60 loc) · 1.31 KB
/
tls_syslog_server.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
package integration
import (
"crypto/tls"
"fmt"
"io"
"log"
"net"
"strings"
. "github.com/onsi/ginkgo"
"github.com/onsi/gomega/gbytes"
)
type TLSSyslogServer struct {
Addr string
Buffer *gbytes.Buffer
l net.Listener
}
func (s *TLSSyslogServer) Run() error {
// Listen for incoming connections.
cer, err := tls.LoadX509KeyPair("./fixtures/server.crt", "./fixtures/server.key")
if err != nil {
log.Println(err)
return err
}
config := &tls.Config{Certificates: []tls.Certificate{cer}}
s.l, err = tls.Listen("tcp", s.Addr, config)
if err != nil {
return err
}
// Close the listener when the application closes.
fmt.Println("Listening on " + s.Addr)
var conn net.Conn
go func() {
for {
defer GinkgoRecover()
// Listen for an incoming connection.
conn, err = s.l.Accept()
if err != nil {
fmt.Println(err)
return
}
defer conn.Close()
_, err = io.Copy(s.Buffer, conn)
// io.Copy is blocking. So when we close the underlying connection after
// being signalled, we need to check for that error
if err != nil {
newErr, ok := err.(*net.OpError)
if ok {
if strings.Contains(newErr.Error(), "use of closed network connection") {
return
}
}
fmt.Println(err)
}
}
}()
return nil
}
func (s *TLSSyslogServer) Stop() {
s.l.Close()
}