add optional refreshtime parameter to client
All checks were successful
continuous-integration/drone/push Build is passing
All checks were successful
continuous-integration/drone/push Build is passing
If refreshtime is specified, instead the client running as a one-shot command, it will instead run persistently and perform a new authentic knock sequence each specified time in minutes.
This commit is contained in:
parent
f660a5a2e5
commit
2af574fd18
@ -47,6 +47,11 @@ Example usage:
|
|||||||
panic(fmt.Errorf("maxjitter must be value between 1 and 1500"))
|
panic(fmt.Errorf("maxjitter must be value between 1 and 1500"))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
refreshTime, err := cmd.Flags().GetInt("refreshtime")
|
||||||
|
if err != nil {
|
||||||
|
panic(fmt.Errorf("failed to parse command flag 'refreshtime': %w", err))
|
||||||
|
}
|
||||||
|
|
||||||
secretBytes, err := os.ReadFile(secretFilePath)
|
secretBytes, err := os.ReadFile(secretFilePath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatalf("failed to read file 'hyp.secret': %v", err)
|
log.Fatalf("failed to read file 'hyp.secret': %v", err)
|
||||||
@ -57,6 +62,8 @@ Example usage:
|
|||||||
log.Fatalf("failed to base32 decode secret '%s': %v", secretFilePath, err)
|
log.Fatalf("failed to base32 decode secret '%s': %v", secretFilePath, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
for {
|
||||||
|
|
||||||
ports, err := otphyp.GeneratePorts(decodedSecret, time.Now())
|
ports, err := otphyp.GeneratePorts(decodedSecret, time.Now())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatalf("failed to generate ports from shared secret: %v", err)
|
log.Fatalf("failed to generate ports from shared secret: %v", err)
|
||||||
@ -70,12 +77,22 @@ Example usage:
|
|||||||
conn.Close()
|
conn.Close()
|
||||||
time.Sleep(time.Millisecond * time.Duration(maxJitter)) // TBD: Make this configurable with flag (maxJitter)
|
time.Sleep(time.Millisecond * time.Duration(maxJitter)) // TBD: Make this configurable with flag (maxJitter)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if refreshTime < 1 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
|
||||||
|
sleepDuration := time.Minute * time.Duration(refreshTime)
|
||||||
|
fmt.Printf("waiting until: %s...\n", time.Now().Add(sleepDuration).Format("15:04:05"))
|
||||||
|
time.Sleep(sleepDuration)
|
||||||
|
}
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
rootCmd.AddCommand(knockCmd)
|
rootCmd.AddCommand(knockCmd)
|
||||||
|
|
||||||
knockCmd.PersistentFlags().String("secret", "hyp.secret", "Path to the file containing the hyp secret.")
|
knockCmd.PersistentFlags().String("secret", "hyp.secret", "Path to the file containing the hyp secret")
|
||||||
knockCmd.PersistentFlags().Int("maxjitter", 200, "Specifies the time in milliseconds between knock sequence transmissions.")
|
knockCmd.PersistentFlags().Int("maxjitter", 200, "Specifies the time in milliseconds between transmissions while performing the knock sequence")
|
||||||
|
knockCmd.PersistentFlags().Int("refreshtime", 0, "If specified, the hyp client will run persistently and send a full knock sequence at this interval in minutes")
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user