)
const (
- Version = "4.0.0"
+ Version = "4.1.0"
UserAgent = "GoCheese/" + Version
)
}
Root = flag.Args()[0]
if _, err := os.Stat(Root); err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
if *FSCK {
os.FileMode(0666),
)
if err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
passwdReader(fd)
fd.Close()
os.FileMode(0666),
)
if err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
passwdLister(fd)
fd.Close()
}
if (*TLSCert != "" && *TLSKey == "") || (*TLSCert == "" && *TLSKey != "") {
- log.Fatalln("Both -tls-cert and -tls-key are required")
+ log.Fatal("Both -tls-cert and -tls-key are required")
}
UmaskCur = syscall.Umask(0)
var err error
PyPIURLParsed, err = url.Parse(*PyPIURL)
if err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
tlsConfig := tls.Config{
ClientSessionCache: tls.NewLRUClientSessionCache(16),
if *PyPICertHash != "" {
ourDgst, err := hex.DecodeString(*PyPICertHash)
if err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
tlsConfig.VerifyConnection = func(s tls.ConnectionState) error {
spki := s.VerifiedChains[0][0].RawSubjectPublicKeyInfo
server.ConnState = connStater
err := server.Serve(ln)
if _, ok := err.(UCSPIAlreadyAccepted); !ok {
- log.Fatalln(err)
+ log.Fatal(err)
}
UCSPIJob.Wait()
return