}
Root = flag.Args()[0]
if _, err := os.Stat(Root); err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
if *FSCK {
os.FileMode(0666),
)
if err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
passwdReader(fd)
fd.Close()
os.FileMode(0666),
)
if err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
passwdLister(fd)
fd.Close()
}
if (*TLSCert != "" && *TLSKey == "") || (*TLSCert == "" && *TLSKey != "") {
- log.Fatalln("Both -tls-cert and -tls-key are required")
+ log.Fatal("Both -tls-cert and -tls-key are required")
}
UmaskCur = syscall.Umask(0)
var err error
PyPIURLParsed, err = url.Parse(*PyPIURL)
if err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
tlsConfig := tls.Config{
ClientSessionCache: tls.NewLRUClientSessionCache(16),
if *PyPICertHash != "" {
ourDgst, err := hex.DecodeString(*PyPICertHash)
if err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
tlsConfig.VerifyConnection = func(s tls.ConnectionState) error {
spki := s.VerifiedChains[0][0].RawSubjectPublicKeyInfo
server.ConnState = connStater
err := server.Serve(ln)
if _, ok := err.(UCSPIAlreadyAccepted); !ok {
- log.Fatalln(err)
+ log.Fatal(err)
}
UCSPIJob.Wait()
return
func agentedReq(url string) *http.Request {
req, err := http.NewRequest("GET", url, nil)
if err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
req.Header.Set("User-Agent", UserAgent)
return req
Name: MDFieldToRecField[recField],
Value: jsonField,
}); err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
}
for _, m := range []RecFieldToValuesMap{
Name: MDFieldToRecField[m.recField],
Value: v,
}); err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
}
}
Name: MDFieldToRecField[recField],
Value: jsonField,
}); err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
}
Name: MDFieldToRecField[m.recField],
Value: v,
}); err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
}
}
if _, err = wr.WriteFieldMultiline(
MDFieldDescription, lines,
); err != nil {
- log.Fatalln(err)
+ log.Fatal(err)
}
}