package steward import ( "bytes" "encoding/json" "fmt" "github.com/fxamacker/cbor/v2" ) // ---- type methodREQAclRequestUpdate struct { event Event } func (m methodREQAclRequestUpdate) getKind() Event { return m.event } // Handler to get all acl's from a central server. func (m methodREQAclRequestUpdate) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- subscriber methodREQAclRequestUpdate received from: %v, hash data = %v", message.FromNode, message.Data) proc.errorKernel.logDebug(inf, proc.configuration) // fmt.Printf("\n --- subscriber methodREQAclRequestUpdate: the message brought to handler : %+v\n", message) // Get a context with the timeout specified in message.MethodTimeout. ctx, _ := getContextForMethodTimeout(proc.ctx, message) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() outCh := make(chan []byte) go func() { select { case <-ctx.Done(): // Done case outCh <- []byte{}: } }() select { case <-ctx.Done(): // case out := <-outCh: case <-outCh: // Using a func here to set the scope of the lock, and then be able to // defer the unlock when leaving that scope. func() { proc.centralAuth.accessLists.schemaGenerated.mu.Lock() defer proc.centralAuth.accessLists.schemaGenerated.mu.Unlock() er := fmt.Errorf("info: subscriber methodREQAclRequestUpdate: got acl hash from NODE=%v, HASH data =%v", message.FromNode, message.Data) proc.errorKernel.logDebug(er, proc.configuration) // Check if the received hash is the same as the one currently active, // If it is the same we exit the handler immediately. hash32 := proc.centralAuth.accessLists.schemaGenerated.GeneratedACLsMap[message.FromNode].Hash hash := hash32[:] er = fmt.Errorf("info: subscriber methodREQAclRequestUpdate: the central acl hash=%v", hash32) proc.errorKernel.logDebug(er, proc.configuration) if bytes.Equal(hash, message.Data) { er := fmt.Errorf("info: subscriber methodREQAclRequestUpdate: NODE AND CENTRAL HAVE EQUAL ACL HASH, NOTHING TO DO, EXITING HANDLER") proc.errorKernel.logDebug(er, proc.configuration) return } er = fmt.Errorf("info: subscriber methodREQAclRequestUpdate: NODE AND CENTRAL HAD NOT EQUAL ACL, PREPARING TO SEND NEW VERSION OF Acl") proc.errorKernel.logDebug(er, proc.configuration) // Generate JSON for Message.Data hdh := HostACLsSerializedWithHash{} hdh.Data = proc.centralAuth.accessLists.schemaGenerated.GeneratedACLsMap[message.FromNode].Data // fmt.Printf("\n * DEBUGGING: before marshalling, hdh.Data=%v\n", hdh.Data) hdh.Hash = proc.centralAuth.accessLists.schemaGenerated.GeneratedACLsMap[message.FromNode].Hash // fmt.Printf("\n * DEBUGGING: before marshalling, hdh.Hash=%v\n\n", hdh.Hash) js, err := json.Marshal(hdh) if err != nil { er := fmt.Errorf("error: REQAclRequestUpdate : json marshal failed: %v, message: %v", err, message) proc.errorKernel.errSend(proc, message, er, logWarning) } er = fmt.Errorf("----> subscriber methodREQAclRequestUpdate: SENDING ACL'S TO NODE=%v, serializedAndHash=%+v", message.FromNode, hdh) proc.errorKernel.logDebug(er, proc.configuration) newReplyMessage(proc, message, js) }() } }() // NB: We're not sending an ACK message for this request type. return nil, nil } // ---- type methodREQAclDeliverUpdate struct { event Event } func (m methodREQAclDeliverUpdate) getKind() Event { return m.event } // Handler to receive the acls from a central server. func (m methodREQAclDeliverUpdate) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- subscriber methodREQAclDeliverUpdate received from: %v, containing: %v", message.FromNode, message.Data) proc.errorKernel.logDebug(inf, proc.configuration) // fmt.Printf("\n --- subscriber methodREQAclRequestUpdate: the message received on handler : %+v\n\n", message) // Get a context with the timeout specified in message.MethodTimeout. ctx, _ := getContextForMethodTimeout(proc.ctx, message) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() outCh := make(chan []byte) go func() { // Normally we would do some logic here, where the result is passed to outCh when done, // so we can split up the working logic, and f.ex. sending a reply logic. // In this case this go func and the below select is not needed, but keeping it so the // structure is the same as the other handlers. select { case <-ctx.Done(): case outCh <- []byte{}: } }() select { // case proc.toRingbufferCh <- []subjectAndMessage{sam}: case <-ctx.Done(): case <-outCh: proc.nodeAuth.nodeAcl.mu.Lock() hdh := HostACLsSerializedWithHash{} err := json.Unmarshal(message.Data, &hdh) if err != nil { er := fmt.Errorf("error: subscriber REQAclDeliverUpdate : json unmarshal failed: %v, message: %v", err, message) proc.errorKernel.errSend(proc, message, er, logWarning) } mapOfFromNodeCommands := make(map[Node]map[command]struct{}) if len(hdh.Data) != 0 { err = cbor.Unmarshal(hdh.Data, &mapOfFromNodeCommands) if err != nil { er := fmt.Errorf("error: subscriber REQAclDeliverUpdate : cbor unmarshal failed: %v, message: %v", err, message) proc.errorKernel.errSend(proc, message, er, logError) } } proc.nodeAuth.nodeAcl.aclAndHash.Hash = hdh.Hash proc.nodeAuth.nodeAcl.aclAndHash.Acl = mapOfFromNodeCommands fmt.Printf("\n <---- subscriber REQAclDeliverUpdate: after unmarshal, nodeAuth aclAndhash contains: %+v\n\n", proc.nodeAuth.nodeAcl.aclAndHash) proc.nodeAuth.nodeAcl.mu.Unlock() err = proc.nodeAuth.nodeAcl.saveToFile() if err != nil { er := fmt.Errorf("error: subscriber REQAclDeliverUpdate : save to file failed: %v, message: %v", err, message) proc.errorKernel.errSend(proc, message, er, logError) } // Prepare and queue for sending a new message with the output // of the action executed. // newReplyMessage(proc, message, out) } }() // Send back an ACK message. // ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID)) return nil, nil } // --- type methodREQAclAddCommand struct { event Event } func (m methodREQAclAddCommand) getKind() Event { return m.event } func (m methodREQAclAddCommand) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- methodREQAclAddCommand received from: %v, containing: %v", message.FromNode, message.MethodArgs) proc.errorKernel.logDebug(inf, proc.configuration) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() // Get a context with the timeout specified in message.MethodTimeout. ctx, cancel := getContextForMethodTimeout(proc.ctx, message) outCh := make(chan []byte) errCh := make(chan error) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() switch { case len(message.MethodArgs) < 3: errCh <- fmt.Errorf("error: methodREQAclAddAccessList: got <3 number methodArgs, want 3") return } host := message.MethodArgs[0] source := message.MethodArgs[1] cmd := message.MethodArgs[2] proc.centralAuth.aclAddCommand(Node(host), Node(source), command(cmd)) outString := fmt.Sprintf("acl added: host=%v, source=%v, command=%v\n", host, source, cmd) out := []byte(outString) select { case outCh <- out: case <-ctx.Done(): return } }() select { case err := <-errCh: proc.errorKernel.errSend(proc, message, err, logError) case <-ctx.Done(): cancel() er := fmt.Errorf("error: methodREQAclAddAccessList: method timed out: %v", message.MethodArgs) proc.errorKernel.errSend(proc, message, er, logInfo) case out := <-outCh: // Prepare and queue for sending a new message with the output // of the action executed. newReplyMessage(proc, message, out) } }() ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID)) return ackMsg, nil } // --- type methodREQAclDeleteCommand struct { event Event } func (m methodREQAclDeleteCommand) getKind() Event { return m.event } func (m methodREQAclDeleteCommand) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- methodREQAclDeleteCommand received from: %v, containing: %v", message.FromNode, message.MethodArgs) proc.errorKernel.logDebug(inf, proc.configuration) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() // Get a context with the timeout specified in message.MethodTimeout. ctx, cancel := getContextForMethodTimeout(proc.ctx, message) outCh := make(chan []byte) errCh := make(chan error) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() switch { case len(message.MethodArgs) < 3: errCh <- fmt.Errorf("error: methodREQAclDeleteCommand: got <3 number methodArgs, want 3") return } host := message.MethodArgs[0] source := message.MethodArgs[1] cmd := message.MethodArgs[2] proc.centralAuth.aclDeleteCommand(Node(host), Node(source), command(cmd)) outString := fmt.Sprintf("acl deleted: host=%v, source=%v, command=%v\n", host, source, cmd) out := []byte(outString) select { case outCh <- out: case <-ctx.Done(): return } }() select { case err := <-errCh: proc.errorKernel.errSend(proc, message, err, logError) case <-ctx.Done(): cancel() er := fmt.Errorf("error: methodREQAclDeleteCommand: method timed out: %v", message.MethodArgs) proc.errorKernel.errSend(proc, message, er, logInfo) case out := <-outCh: // Prepare and queue for sending a new message with the output // of the action executed. newReplyMessage(proc, message, out) } }() ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID)) return ackMsg, nil } // --- type methodREQAclDeleteSource struct { event Event } func (m methodREQAclDeleteSource) getKind() Event { return m.event } func (m methodREQAclDeleteSource) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- methodREQAclDeleteSource received from: %v, containing: %v", message.FromNode, message.MethodArgs) proc.errorKernel.logDebug(inf, proc.configuration) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() // Get a context with the timeout specified in message.MethodTimeout. ctx, cancel := getContextForMethodTimeout(proc.ctx, message) outCh := make(chan []byte) errCh := make(chan error) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() switch { case len(message.MethodArgs) < 2: errCh <- fmt.Errorf("error: methodREQAclDeleteSource: got <2 number methodArgs, want 2") return } host := message.MethodArgs[0] source := message.MethodArgs[1] proc.centralAuth.aclDeleteSource(Node(host), Node(source)) outString := fmt.Sprintf("acl deleted: host=%v, source=%v\n", host, source) out := []byte(outString) select { case outCh <- out: case <-ctx.Done(): return } }() select { case err := <-errCh: proc.errorKernel.errSend(proc, message, err, logError) case <-ctx.Done(): cancel() er := fmt.Errorf("error: methodREQAclDeleteSource: method timed out: %v", message.MethodArgs) proc.errorKernel.errSend(proc, message, er, logInfo) case out := <-outCh: // Prepare and queue for sending a new message with the output // of the action executed. newReplyMessage(proc, message, out) } }() ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID)) return ackMsg, nil } // --- type methodREQAclGroupNodesAddNode struct { event Event } func (m methodREQAclGroupNodesAddNode) getKind() Event { return m.event } func (m methodREQAclGroupNodesAddNode) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- methodREQAclGroupNodesAddNode received from: %v, containing: %v", message.FromNode, message.MethodArgs) proc.errorKernel.logDebug(inf, proc.configuration) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() // Get a context with the timeout specified in message.MethodTimeout. ctx, cancel := getContextForMethodTimeout(proc.ctx, message) outCh := make(chan []byte) errCh := make(chan error) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() switch { case len(message.MethodArgs) < 2: errCh <- fmt.Errorf("error: methodREQAclGroupNodesAddNode: got <2 number methodArgs, want 2") return } ng := message.MethodArgs[0] n := message.MethodArgs[1] proc.centralAuth.groupNodesAddNode(nodeGroup(ng), Node(n)) outString := fmt.Sprintf("added node to nodeGroup: nodeGroup=%v, node=%v\n", ng, n) out := []byte(outString) select { case outCh <- out: case <-ctx.Done(): return } }() select { case err := <-errCh: proc.errorKernel.errSend(proc, message, err, logError) case <-ctx.Done(): cancel() er := fmt.Errorf("error: methodREQAclGroupNodesAddNode: method timed out: %v", message.MethodArgs) proc.errorKernel.errSend(proc, message, er, logInfo) case out := <-outCh: // Prepare and queue for sending a new message with the output // of the action executed. newReplyMessage(proc, message, out) } }() ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID)) return ackMsg, nil } // --- type methodREQAclGroupNodesDeleteNode struct { event Event } func (m methodREQAclGroupNodesDeleteNode) getKind() Event { return m.event } func (m methodREQAclGroupNodesDeleteNode) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- methodREQAclGroupNodesDeleteNode received from: %v, containing: %v", message.FromNode, message.MethodArgs) proc.errorKernel.logDebug(inf, proc.configuration) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() // Get a context with the timeout specified in message.MethodTimeout. ctx, cancel := getContextForMethodTimeout(proc.ctx, message) outCh := make(chan []byte) errCh := make(chan error) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() switch { case len(message.MethodArgs) < 2: errCh <- fmt.Errorf("error: methodREQAclGroupNodesDeleteNode: got <2 number methodArgs, want 2") return } ng := message.MethodArgs[0] n := message.MethodArgs[1] proc.centralAuth.groupNodesDeleteNode(nodeGroup(ng), Node(n)) outString := fmt.Sprintf("deleted node from nodeGroup: nodeGroup=%v, node=%v\n", ng, n) out := []byte(outString) select { case outCh <- out: case <-ctx.Done(): return } }() select { case err := <-errCh: proc.errorKernel.errSend(proc, message, err, logError) case <-ctx.Done(): cancel() er := fmt.Errorf("error: methodREQAclGroupNodesDeleteNode: method timed out: %v", message.MethodArgs) proc.errorKernel.errSend(proc, message, er, logInfo) case out := <-outCh: // Prepare and queue for sending a new message with the output // of the action executed. newReplyMessage(proc, message, out) } }() ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID)) return ackMsg, nil } // --- type methodREQAclGroupNodesDeleteGroup struct { event Event } func (m methodREQAclGroupNodesDeleteGroup) getKind() Event { return m.event } func (m methodREQAclGroupNodesDeleteGroup) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- methodREQAclGroupNodesDeleteGroup received from: %v, containing: %v", message.FromNode, message.MethodArgs) proc.errorKernel.logDebug(inf, proc.configuration) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() // Get a context with the timeout specified in message.MethodTimeout. ctx, cancel := getContextForMethodTimeout(proc.ctx, message) outCh := make(chan []byte) errCh := make(chan error) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() switch { case len(message.MethodArgs) < 1: errCh <- fmt.Errorf("error: methodREQAclGroupNodesDeleteGroup: got <1 number methodArgs, want 1") return } ng := message.MethodArgs[0] proc.centralAuth.groupNodesDeleteGroup(nodeGroup(ng)) outString := fmt.Sprintf("deleted nodeGroup: nodeGroup=%v\n", ng) out := []byte(outString) select { case outCh <- out: case <-ctx.Done(): return } }() select { case err := <-errCh: proc.errorKernel.errSend(proc, message, err, logError) case <-ctx.Done(): cancel() er := fmt.Errorf("error: methodREQAclGroupNodesDeleteGroup: method timed out: %v", message.MethodArgs) proc.errorKernel.errSend(proc, message, er, logInfo) case out := <-outCh: // Prepare and queue for sending a new message with the output // of the action executed. newReplyMessage(proc, message, out) } }() ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID)) return ackMsg, nil } // --- type methodREQAclGroupCommandsAddCommand struct { event Event } func (m methodREQAclGroupCommandsAddCommand) getKind() Event { return m.event } func (m methodREQAclGroupCommandsAddCommand) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- methodREQAclGroupCommandsAddCommand received from: %v, containing: %v", message.FromNode, message.MethodArgs) proc.errorKernel.logDebug(inf, proc.configuration) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() // Get a context with the timeout specified in message.MethodTimeout. ctx, cancel := getContextForMethodTimeout(proc.ctx, message) outCh := make(chan []byte) errCh := make(chan error) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() switch { case len(message.MethodArgs) < 2: errCh <- fmt.Errorf("error: methodREQAclGroupCommandsAddCommand: got <2 number methodArgs, want 1") return } cg := message.MethodArgs[0] c := message.MethodArgs[1] proc.centralAuth.groupCommandsAddCommand(commandGroup(cg), command(c)) outString := fmt.Sprintf("added command to commandGroup: commandGroup=%v, command=%v\n", cg, c) out := []byte(outString) select { case outCh <- out: case <-ctx.Done(): return } }() select { case err := <-errCh: proc.errorKernel.errSend(proc, message, err, logError) case <-ctx.Done(): cancel() er := fmt.Errorf("error: methodREQAclGroupCommandsAddCommand: method timed out: %v", message.MethodArgs) proc.errorKernel.errSend(proc, message, er, logInfo) case out := <-outCh: // Prepare and queue for sending a new message with the output // of the action executed. newReplyMessage(proc, message, out) } }() ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID)) return ackMsg, nil } // --- type methodREQAclGroupCommandsDeleteCommand struct { event Event } func (m methodREQAclGroupCommandsDeleteCommand) getKind() Event { return m.event } func (m methodREQAclGroupCommandsDeleteCommand) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- methodREQAclGroupCommandsDeleteCommand received from: %v, containing: %v", message.FromNode, message.MethodArgs) proc.errorKernel.logDebug(inf, proc.configuration) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() // Get a context with the timeout specified in message.MethodTimeout. ctx, cancel := getContextForMethodTimeout(proc.ctx, message) outCh := make(chan []byte) errCh := make(chan error) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() switch { case len(message.MethodArgs) < 1: errCh <- fmt.Errorf("error: methodREQAclGroupCommandsDeleteCommand: got <1 number methodArgs, want 1") return } cg := message.MethodArgs[0] c := message.MethodArgs[1] proc.centralAuth.groupCommandsDeleteCommand(commandGroup(cg), command(c)) outString := fmt.Sprintf("deleted command from commandGroup: commandGroup=%v, command=%v\n", cg, c) out := []byte(outString) select { case outCh <- out: case <-ctx.Done(): return } }() select { case err := <-errCh: proc.errorKernel.errSend(proc, message, err, logError) case <-ctx.Done(): cancel() er := fmt.Errorf("error: methodREQAclGroupCommandsDeleteCommand: method timed out: %v", message.MethodArgs) proc.errorKernel.errSend(proc, message, er, logInfo) case out := <-outCh: // Prepare and queue for sending a new message with the output // of the action executed. newReplyMessage(proc, message, out) } }() ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID)) return ackMsg, nil } // --- type methodREQAclGroupCommandsDeleteGroup struct { event Event } func (m methodREQAclGroupCommandsDeleteGroup) getKind() Event { return m.event } func (m methodREQAclGroupCommandsDeleteGroup) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- methodREQAclGroupCommandsDeleteGroup received from: %v, containing: %v", message.FromNode, message.MethodArgs) proc.errorKernel.logDebug(inf, proc.configuration) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() // Get a context with the timeout specified in message.MethodTimeout. ctx, cancel := getContextForMethodTimeout(proc.ctx, message) outCh := make(chan []byte) errCh := make(chan error) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() switch { case len(message.MethodArgs) < 1: errCh <- fmt.Errorf("error: methodREQAclGroupCommandsDeleteGroup: got <1 number methodArgs, want 1") return } cg := message.MethodArgs[0] proc.centralAuth.groupCommandDeleteGroup(commandGroup(cg)) outString := fmt.Sprintf("deleted commandGroup: commandGroup=%v\n", cg) out := []byte(outString) select { case outCh <- out: case <-ctx.Done(): return } }() select { case err := <-errCh: proc.errorKernel.errSend(proc, message, err, logError) case <-ctx.Done(): cancel() er := fmt.Errorf("error: methodREQAclGroupCommandsDeleteGroup: method timed out: %v", message.MethodArgs) proc.errorKernel.errSend(proc, message, er, logInfo) case out := <-outCh: // Prepare and queue for sending a new message with the output // of the action executed. newReplyMessage(proc, message, out) } }() ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID)) return ackMsg, nil } // --- type methodREQAclExport struct { event Event } func (m methodREQAclExport) getKind() Event { return m.event } func (m methodREQAclExport) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- methodREQAclExport received from: %v, containing: %v", message.FromNode, message.MethodArgs) proc.errorKernel.logDebug(inf, proc.configuration) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() // Get a context with the timeout specified in message.MethodTimeout. ctx, cancel := getContextForMethodTimeout(proc.ctx, message) outCh := make(chan []byte) errCh := make(chan error) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() out, err := proc.centralAuth.exportACLs() if err != nil { errCh <- fmt.Errorf("error: methodREQAclExport failed: %v", err) return } // outString := fmt.Sprintf("Exported acls sent from: %v\n", message.FromNode) // out := []byte(outString) select { case outCh <- out: case <-ctx.Done(): return } }() select { case err := <-errCh: proc.errorKernel.errSend(proc, message, err, logError) case <-ctx.Done(): cancel() er := fmt.Errorf("error: methodREQAclExport: method timed out: %v", message.MethodArgs) proc.errorKernel.errSend(proc, message, er, logInfo) case out := <-outCh: // Prepare and queue for sending a new message with the output // of the action executed. newReplyMessage(proc, message, out) } }() ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID)) return ackMsg, nil } // --- type methodREQAclImport struct { event Event } func (m methodREQAclImport) getKind() Event { return m.event } func (m methodREQAclImport) handler(proc process, message Message, node string) ([]byte, error) { inf := fmt.Errorf("<--- methodREQAclImport received from: %v, containing: %v", message.FromNode, message.MethodArgs) proc.errorKernel.logDebug(inf, proc.configuration) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() // Get a context with the timeout specified in message.MethodTimeout. ctx, cancel := getContextForMethodTimeout(proc.ctx, message) outCh := make(chan []byte) errCh := make(chan error) proc.processes.wg.Add(1) go func() { defer proc.processes.wg.Done() switch { case len(message.MethodArgs) < 1: errCh <- fmt.Errorf("error: methodREQAclImport: got <1 number methodArgs, want 1") return } js := []byte(message.MethodArgs[0]) err := proc.centralAuth.importACLs(js) if err != nil { errCh <- fmt.Errorf("error: methodREQAclImport failed: %v", err) return } outString := fmt.Sprintf("Imported acl's sent from: %v\n", message.FromNode) out := []byte(outString) select { case outCh <- out: case <-ctx.Done(): return } }() select { case err := <-errCh: proc.errorKernel.errSend(proc, message, err, logError) case <-ctx.Done(): cancel() er := fmt.Errorf("error: methodREQAclImport: method timed out") proc.errorKernel.errSend(proc, message, er, logInfo) case out := <-outCh: // Prepare and queue for sending a new message with the output // of the action executed. newReplyMessage(proc, message, out) } }() ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID)) return ackMsg, nil }