first commit
All checks were successful
continuous-integration/drone Build is passing

This commit is contained in:
2025-03-12 19:43:25 +11:00
commit b50075083e
6 changed files with 259 additions and 0 deletions

9
.drone.sh Normal file
View File

@@ -0,0 +1,9 @@
#!/bin/sh
export now=$(TZ=Australia/Sydney date '+%Y%m%d-%H%M%S')
echo $now
echo "build commences"
go build -ldflags "-X main.sha1ver=`git rev-parse HEAD` -X main.buildTime=$now" -o go-snow
echo "build complete"
sha256sum go-snow > go-snow_checksum.txt
ls -lah

29
.drone.yml Normal file
View File

@@ -0,0 +1,29 @@
kind: pipeline
type: docker
name: default
# Docs at https://docs.drone.io/pipeline/exec/overview/
# Also see https://github.com/harness/drone-cli/blob/master/.drone.yml
steps:
- name: build
image: golang
commands:
- sh ./.drone.sh
# https://github.com/hypervtechnics/drone-sftp
- name: dell-sftp-deploy
image: hypervtechnics/drone-sftp
settings:
host: deft.dell.com
username:
from_secret: DELLFTP_USER
password:
from_secret: DELLFTP_PASS
port: 22
source: ./
filter: go-snow*
clean: false
target: /
overwrite: true
verbose: true

2
.gitignore vendored Normal file
View File

@@ -0,0 +1,2 @@
log.txt
go-snow*

10
go.mod Normal file
View File

@@ -0,0 +1,10 @@
module go-snow
go 1.24.1
require github.com/launchdarkly/go-ntlm-proxy-auth v1.0.1
require (
github.com/launchdarkly/go-ntlmssp v1.0.1 // indirect
golang.org/x/crypto v0.36.0 // indirect
)

12
go.sum Normal file
View File

@@ -0,0 +1,12 @@
github.com/launchdarkly/go-ntlm-proxy-auth v1.0.1 h1:Iz5cg9mB/0vt5llZE+J0iGQ5+O/U8CWuRUUR7Ou8eNM=
github.com/launchdarkly/go-ntlm-proxy-auth v1.0.1/go.mod h1:hKWfH/hga5oslM2mRkDZi+14u2h1dFsmgbvSM9qF8pk=
github.com/launchdarkly/go-ntlmssp v1.0.1 h1:snB77118TQvf9tfHrkSyrIop/UX5e5VD2D2mv7Kh3wE=
github.com/launchdarkly/go-ntlmssp v1.0.1/go.mod h1:/cq3t2JyALD7GdVF5BEWcEuGlIGa44FZ4v4CVk7vuCY=
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
golang.org/x/crypto v0.0.0-20200604202706-70a84ac30bf9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
golang.org/x/crypto v0.36.0 h1:AnAEvhDddvBdpY+uR+MyHmuZzzNqXSe/GvuDeob5L34=
golang.org/x/crypto v0.36.0/go.mod h1:Y4J0ReaxCR1IMaabaSMugxJES1EpwhBHhv2bDHklZvc=
golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=

197
main.go Normal file
View File

@@ -0,0 +1,197 @@
package main
import (
"bytes"
"encoding/base64"
"encoding/json"
"flag"
"fmt"
"io"
"log"
"net/http"
"net/url"
"os"
"runtime"
"time"
)
type Incident struct {
AppID string `json:"app_id"`
Resource string `json:"resource"`
Node string `json:"node"`
ShortDescription string `json:"short_description"`
MetricName string `json:"metric_name"`
MessageKey string `json:"message_key"`
MetricValue string `json:"metric_value"`
Source string `json:"source"`
Description string `json:"description"`
EventClass string `json:"event_class"`
Severity int `json:"severity"`
Type string `json:"type"`
AssignmentGroup string `json:"assignment_group"`
Environment string `json:"environment"`
}
// ValidAuthMethods defines the allowed authentication methods.
//var ValidAuthMethods = []string{"no-auth", "basic", "ntlm"}
var (
sha1ver string // sha1 revision used to build the program
buildTime string // when the executable was built
)
/*
// ValidateAuthMethod checks if the provided auth method is valid.
func ValidateAuthMethod(authMethod string) error {
for _, validMethod := range ValidAuthMethods {
if authMethod == validMethod {
return nil
}
}
return errors.New("invalid authentication method: " + authMethod)
}
*/
func prettyPrint(args ...interface{}) {
var caller string
timeNow := time.Now().Format("01-02-2006 15:04:05")
prefix := fmt.Sprintf("[%s] %s -- ", "PrettyPrint", timeNow)
_, fileName, fileLine, ok := runtime.Caller(1)
if ok {
caller = fmt.Sprintf("%s:%d", fileName, fileLine)
} else {
caller = ""
}
log.Printf("\n%s%s\n", prefix, caller)
if len(args) == 2 {
label := args[0]
value := args[1]
s, _ := json.MarshalIndent(value, "", "\t")
fmt.Printf("%s%s: %s\n", prefix, label, string(s))
} else {
s, _ := json.MarshalIndent(args, "", "\t")
log.Printf("%s%s\n", prefix, string(s))
}
}
func main() {
// Command line flags for the vCenter connection
snowURL := flag.String("url", "https://server.domain.example/api/global/em/inbound_event", "The URL of the SNOW endpoint")
snowUser := flag.String("user", "username", "The username to use when authenticating to SNOW")
snowPass := flag.String("password", "password", "The password to use when authenticating to SNOW")
proxyURL := flag.String("p-url", "", "The URL of the SNOW endpoint, including protocol and port. Eg http://proxy.domain.example:8080")
// proxyUser := flag.String("p-user", "", "The username to use when authenticating to the proxy")
// proxyPass := flag.String("p-pass", "", "The password to use when authenticating to the proxy")
// proxyDomain := flag.String("p-domain", "", "The domain to use when authenticating to the proxy with NTLM authentication")
payload := flag.String("payload", "{}", "The JSON formatted payload to send to SNOW")
flag.Parse()
// Print logs to file
f, err := os.OpenFile("log.txt", os.O_RDWR|os.O_CREATE|os.O_APPEND, 0666)
if err != nil {
log.Fatalf("error opening file: %v", err)
}
defer f.Close()
log.SetOutput(f)
//log.Printf("Starting execution. Built on %s from sha1 %s\n", buildTime, sha1ver)
/*
if err := ValidateAuthMethod(*proxyType); err != nil {
log.Fatalf("error validating auth method '%s': %s\n", *proxyType, err)
} else {
fmt.Println("Valid auth method:", *proxyType)
}
*/
// Validate the incoming payload
var incident Incident
if err := json.Unmarshal([]byte(*payload), &incident); err != nil {
fmt.Printf("Error unmarshaling JSON: %s\n", err)
os.Exit(1)
} else {
prettyPrint(incident)
}
// Configure proxy transport
var transport http.RoundTripper = http.DefaultTransport
if *proxyURL != "" {
proxy, err := url.Parse(*proxyURL)
if err != nil {
fmt.Println("Invalid proxy URL:", err)
return
}
// Base transport with proxy
// baseTransport := &http.Transport{Proxy: http.ProxyURL(proxy)}
transport = &http.Transport{Proxy: http.ProxyURL(proxy)}
/*
// If NTLM credentials are provided, wrap the transport
if *proxyUser != "" && *proxyPass != "" {
// create a dialer
dialer := &net.Dialer{
Timeout: 30 * time.Second,
KeepAlive: 30 * time.Second,
}
// wrap dial context with NTLM
ntlmDialContext := ntlm.NewNTLMProxyDialContext(dialer, *proxy, *proxyUser, *proxyPass, *proxyDomain, nil)
transport = &http.Transport{
Proxy: nil, // !!! IMPORTANT, do not set proxy here !!!
DialContext: ntlmDialContext,
}
} else {
transport = baseTransport
}
*/
}
// Create HTTP client with custom transport
client := &http.Client{
Transport: transport,
}
// Create the request
req, err := http.NewRequest("POST", *snowURL, bytes.NewBuffer([]byte(*payload)))
if err != nil {
log.Println("Error creating request:", err)
return
}
// Set headers
req.Header.Set("Content-Type", "application/json")
// Add Basic Authentication for target URL
if *snowUser != "" && *snowPass != "" {
basicAuth := base64.StdEncoding.EncodeToString([]byte(*snowUser + ":" + *snowPass))
req.Header.Set("Authorization", "Basic "+basicAuth)
}
// Send the request
resp, err := client.Do(req)
if err != nil {
log.Println("Error sending request:", err)
return
}
defer resp.Body.Close()
// Read response
body, err := io.ReadAll(resp.Body)
if err != nil {
log.Println("Error reading response:", err)
return
}
// Print response
log.Println("Response Status:", resp.Status)
fmt.Println(string(body))
}