2022-09-05 03:06:08 -04:00
|
|
|
/*
|
|
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
*/
|
|
|
|
|
2023-01-19 09:57:50 -05:00
|
|
|
/*
|
|
|
|
# Measurements
|
|
|
|
|
|
|
|
Defines default expected measurements for the current release, as well as functions for comparing, updating and marshalling measurements.
|
|
|
|
|
|
|
|
This package should not include TPM specific code.
|
|
|
|
*/
|
2022-11-15 09:40:49 -05:00
|
|
|
package measurements
|
2022-05-12 04:15:00 -04:00
|
|
|
|
2022-05-16 12:54:25 -04:00
|
|
|
import (
|
2022-08-01 03:37:05 -04:00
|
|
|
"bytes"
|
|
|
|
"context"
|
2022-10-11 07:57:52 -04:00
|
|
|
"crypto/sha256"
|
2022-05-16 12:54:25 -04:00
|
|
|
"encoding/base64"
|
2022-10-11 07:57:52 -04:00
|
|
|
"encoding/hex"
|
2022-11-24 04:57:58 -05:00
|
|
|
"encoding/json"
|
2023-02-07 06:56:25 -05:00
|
|
|
"errors"
|
2022-08-01 03:37:05 -04:00
|
|
|
"fmt"
|
2022-08-05 09:30:23 -04:00
|
|
|
"io"
|
2022-08-01 03:37:05 -04:00
|
|
|
"net/http"
|
|
|
|
"net/url"
|
2022-11-28 05:09:39 -05:00
|
|
|
"sort"
|
|
|
|
"strconv"
|
2022-05-16 12:54:25 -04:00
|
|
|
|
2022-11-15 09:40:49 -05:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
|
2022-09-21 07:47:57 -04:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/sigstore"
|
2022-11-24 04:57:58 -05:00
|
|
|
"github.com/google/go-tpm/tpmutil"
|
2023-01-02 07:33:56 -05:00
|
|
|
"github.com/siderolabs/talos/pkg/machinery/config/encoder"
|
2022-11-24 04:57:58 -05:00
|
|
|
"gopkg.in/yaml.v3"
|
2022-05-16 12:54:25 -04:00
|
|
|
)
|
2022-05-12 04:15:00 -04:00
|
|
|
|
2022-11-24 04:57:58 -05:00
|
|
|
const (
|
|
|
|
// PCRIndexClusterID is a PCR we extend to mark the node as initialized.
|
|
|
|
// The value used to extend is a random generated 32 Byte value.
|
|
|
|
PCRIndexClusterID = tpmutil.Handle(15)
|
|
|
|
// PCRIndexOwnerID is a PCR we extend to mark the node as initialized.
|
|
|
|
// The value used to extend is derived from Constellation's master key.
|
|
|
|
// TODO: move to stable, non-debug PCR before use.
|
|
|
|
PCRIndexOwnerID = tpmutil.Handle(16)
|
2023-03-08 08:13:57 -05:00
|
|
|
|
|
|
|
// TDXIndexClusterID is the measurement used to mark the node as initialized.
|
|
|
|
// The value is the index of the RTMR + 1, since index 0 of the TDX measurements is reserved for MRTD.
|
|
|
|
TDXIndexClusterID = RTMRIndexClusterID + 1
|
|
|
|
// RTMRIndexClusterID is the RTMR we extend to mark the node as initialized.
|
|
|
|
RTMRIndexClusterID = 2
|
2022-11-24 04:57:58 -05:00
|
|
|
)
|
2022-10-21 06:24:18 -04:00
|
|
|
|
2022-11-24 04:57:58 -05:00
|
|
|
// M are Platform Configuration Register (PCR) values that make up the Measurements.
|
|
|
|
type M map[uint32]Measurement
|
2022-05-16 12:54:25 -04:00
|
|
|
|
2022-11-25 06:08:24 -05:00
|
|
|
// WithMetadata is a struct supposed to provide CSP & image metadata next to measurements.
|
|
|
|
type WithMetadata struct {
|
2022-11-28 04:27:33 -05:00
|
|
|
CSP cloudprovider.Provider `json:"csp" yaml:"csp"`
|
|
|
|
Image string `json:"image" yaml:"image"`
|
|
|
|
Measurements M `json:"measurements" yaml:"measurements"`
|
2022-11-25 06:08:24 -05:00
|
|
|
}
|
|
|
|
|
2022-11-28 05:09:39 -05:00
|
|
|
// MarshalYAML returns the YAML encoding of m.
|
|
|
|
func (m M) MarshalYAML() (any, error) {
|
|
|
|
// cast to prevent infinite recursion
|
|
|
|
node, err := encoder.NewEncoder(map[uint32]Measurement(m)).Marshal()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// sort keys numerically
|
|
|
|
sort.Sort(mYamlContent(node.Content))
|
|
|
|
|
|
|
|
return node, nil
|
|
|
|
}
|
|
|
|
|
2022-08-01 03:37:05 -04:00
|
|
|
// FetchAndVerify fetches measurement and signature files via provided URLs,
|
|
|
|
// using client for download. The publicKey is used to verify the measurements.
|
2022-10-11 07:57:52 -04:00
|
|
|
// The hash of the fetched measurements is returned.
|
2022-11-28 04:27:33 -05:00
|
|
|
func (m *M) FetchAndVerify(
|
|
|
|
ctx context.Context, client *http.Client, measurementsURL, signatureURL *url.URL,
|
|
|
|
publicKey []byte, metadata WithMetadata,
|
|
|
|
) (string, error) {
|
2022-08-01 03:37:05 -04:00
|
|
|
measurements, err := getFromURL(ctx, client, measurementsURL)
|
|
|
|
if err != nil {
|
2022-10-11 07:57:52 -04:00
|
|
|
return "", fmt.Errorf("failed to fetch measurements: %w", err)
|
2022-08-01 03:37:05 -04:00
|
|
|
}
|
|
|
|
signature, err := getFromURL(ctx, client, signatureURL)
|
|
|
|
if err != nil {
|
2022-10-11 07:57:52 -04:00
|
|
|
return "", fmt.Errorf("failed to fetch signature: %w", err)
|
2022-08-01 03:37:05 -04:00
|
|
|
}
|
|
|
|
if err := sigstore.VerifySignature(measurements, signature, publicKey); err != nil {
|
2022-10-11 07:57:52 -04:00
|
|
|
return "", err
|
2022-08-01 03:37:05 -04:00
|
|
|
}
|
2022-11-24 04:57:58 -05:00
|
|
|
|
2022-11-28 04:27:33 -05:00
|
|
|
var mWithMetadata WithMetadata
|
|
|
|
if err := json.Unmarshal(measurements, &mWithMetadata); err != nil {
|
|
|
|
if yamlErr := yaml.Unmarshal(measurements, &mWithMetadata); yamlErr != nil {
|
2023-02-07 06:56:25 -05:00
|
|
|
return "", errors.Join(
|
2022-11-24 04:57:58 -05:00
|
|
|
err,
|
|
|
|
fmt.Errorf("trying yaml format: %w", yamlErr),
|
|
|
|
)
|
|
|
|
}
|
2022-08-01 03:37:05 -04:00
|
|
|
}
|
2022-10-11 07:57:52 -04:00
|
|
|
|
2022-11-28 04:27:33 -05:00
|
|
|
if mWithMetadata.CSP != metadata.CSP {
|
|
|
|
return "", fmt.Errorf("invalid measurement metadata: CSP mismatch: expected %s, got %s", metadata.CSP, mWithMetadata.CSP)
|
|
|
|
}
|
|
|
|
if mWithMetadata.Image != metadata.Image {
|
|
|
|
return "", fmt.Errorf("invalid measurement metadata: image mismatch: expected %s, got %s", metadata.Image, mWithMetadata.Image)
|
|
|
|
}
|
|
|
|
|
|
|
|
*m = mWithMetadata.Measurements
|
|
|
|
|
2022-10-11 07:57:52 -04:00
|
|
|
shaHash := sha256.Sum256(measurements)
|
|
|
|
|
|
|
|
return hex.EncodeToString(shaHash[:]), nil
|
2022-08-01 03:37:05 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// CopyFrom copies over all values from other. Overwriting existing values,
|
|
|
|
// but keeping not specified values untouched.
|
2022-11-24 04:57:58 -05:00
|
|
|
func (m *M) CopyFrom(other M) {
|
2022-08-01 03:37:05 -04:00
|
|
|
for idx := range other {
|
2022-11-24 04:57:58 -05:00
|
|
|
(*m)[idx] = other[idx]
|
2022-08-01 03:37:05 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-15 09:40:49 -05:00
|
|
|
// EqualTo tests whether the provided other Measurements are equal to these
|
|
|
|
// measurements.
|
2022-11-24 04:57:58 -05:00
|
|
|
func (m *M) EqualTo(other M) bool {
|
|
|
|
if len(*m) != len(other) {
|
2022-11-15 09:40:49 -05:00
|
|
|
return false
|
|
|
|
}
|
2022-11-24 04:57:58 -05:00
|
|
|
for k, v := range *m {
|
|
|
|
otherExpected := other[k].Expected
|
2023-03-08 08:13:57 -05:00
|
|
|
if !bytes.Equal(v.Expected, otherExpected) {
|
2022-11-24 04:57:58 -05:00
|
|
|
return false
|
|
|
|
}
|
2023-03-22 06:47:39 -04:00
|
|
|
if v.ValidationOpt != other[k].ValidationOpt {
|
2022-11-15 09:40:49 -05:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2022-11-24 04:57:58 -05:00
|
|
|
// GetEnforced returns a list of all enforced Measurements,
|
|
|
|
// i.e. all Measurements that are not marked as WarnOnly.
|
|
|
|
func (m *M) GetEnforced() []uint32 {
|
|
|
|
var enforced []uint32
|
|
|
|
for idx, measurement := range *m {
|
2023-03-29 04:52:57 -04:00
|
|
|
if measurement.ValidationOpt == Enforce {
|
2022-11-24 04:57:58 -05:00
|
|
|
enforced = append(enforced, idx)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return enforced
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetEnforced sets the WarnOnly flag to true for all Measurements
|
|
|
|
// that are NOT included in the provided list of enforced measurements.
|
|
|
|
func (m *M) SetEnforced(enforced []uint32) error {
|
|
|
|
newM := make(M)
|
|
|
|
|
|
|
|
// set all measurements to warn only
|
|
|
|
for idx, measurement := range *m {
|
|
|
|
newM[idx] = Measurement{
|
2023-03-22 06:47:39 -04:00
|
|
|
Expected: measurement.Expected,
|
|
|
|
ValidationOpt: WarnOnly,
|
2022-11-24 04:57:58 -05:00
|
|
|
}
|
|
|
|
}
|
2022-05-12 04:15:00 -04:00
|
|
|
|
2022-11-24 04:57:58 -05:00
|
|
|
// set enforced measurements from list
|
|
|
|
for _, idx := range enforced {
|
|
|
|
measurement, ok := newM[idx]
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("measurement %d not in list, but set to enforced", idx)
|
|
|
|
}
|
2023-03-22 06:47:39 -04:00
|
|
|
measurement.ValidationOpt = Enforce
|
2022-11-24 04:57:58 -05:00
|
|
|
newM[idx] = measurement
|
2022-05-12 04:15:00 -04:00
|
|
|
}
|
|
|
|
|
2022-11-24 04:57:58 -05:00
|
|
|
*m = newM
|
|
|
|
return nil
|
2022-05-12 04:15:00 -04:00
|
|
|
}
|
|
|
|
|
2023-03-08 08:13:57 -05:00
|
|
|
// UnmarshalJSON unmarshals measurements from json.
|
|
|
|
// This function enforces all measurements to be of equal length.
|
|
|
|
func (m *M) UnmarshalJSON(b []byte) error {
|
|
|
|
newM := make(map[uint32]Measurement)
|
|
|
|
if err := json.Unmarshal(b, &newM); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// check if all measurements are of equal length
|
|
|
|
if err := checkLength(newM); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
*m = newM
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalYAML unmarshals measurements from yaml.
|
|
|
|
// This function enforces all measurements to be of equal length.
|
|
|
|
func (m *M) UnmarshalYAML(unmarshal func(any) error) error {
|
|
|
|
newM := make(map[uint32]Measurement)
|
|
|
|
if err := unmarshal(&newM); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// check if all measurements are of equal length
|
|
|
|
if err := checkLength(newM); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
*m = newM
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-11-24 04:57:58 -05:00
|
|
|
// Measurement wraps expected PCR value and whether it is enforced.
|
|
|
|
type Measurement struct {
|
|
|
|
// Expected measurement value.
|
2023-03-08 08:13:57 -05:00
|
|
|
// 32 bytes for vTPM attestation, 48 for TDX.
|
|
|
|
Expected []byte `json:"expected" yaml:"expected"`
|
2023-03-22 06:47:39 -04:00
|
|
|
// ValidationOpt indicates how measurement mismatches should be handled.
|
|
|
|
ValidationOpt MeasurementValidationOption `json:"warnOnly" yaml:"warnOnly"`
|
2022-11-24 04:57:58 -05:00
|
|
|
}
|
|
|
|
|
2023-03-22 06:47:39 -04:00
|
|
|
// MeasurementValidationOption indicates how measurement mismatches should be handled.
|
|
|
|
type MeasurementValidationOption bool
|
|
|
|
|
|
|
|
const (
|
|
|
|
// WarnOnly will only result in a warning in case of a mismatching measurement.
|
|
|
|
WarnOnly MeasurementValidationOption = true
|
|
|
|
// Enforce will result in an error in case of a mismatching measurement, and operation will be aborted.
|
|
|
|
Enforce MeasurementValidationOption = false
|
|
|
|
)
|
|
|
|
|
2022-11-24 04:57:58 -05:00
|
|
|
// UnmarshalJSON reads a Measurement either as json object,
|
|
|
|
// or as a simple hex or base64 encoded string.
|
|
|
|
func (m *Measurement) UnmarshalJSON(b []byte) error {
|
|
|
|
var eM encodedMeasurement
|
|
|
|
if err := json.Unmarshal(b, &eM); err != nil {
|
2022-11-25 06:08:24 -05:00
|
|
|
// Unmarshalling failed, Measurement might be a simple string instead of Measurement struct.
|
|
|
|
// These values will always be enforced.
|
2022-11-24 04:57:58 -05:00
|
|
|
if legacyErr := json.Unmarshal(b, &eM.Expected); legacyErr != nil {
|
2023-02-07 06:56:25 -05:00
|
|
|
return errors.Join(
|
2022-11-24 04:57:58 -05:00
|
|
|
err,
|
|
|
|
fmt.Errorf("trying legacy format: %w", legacyErr),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := m.unmarshal(eM); err != nil {
|
|
|
|
return fmt.Errorf("unmarshalling json: %w", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// MarshalJSON writes out a Measurement with Expected encoded as a hex string.
|
|
|
|
func (m Measurement) MarshalJSON() ([]byte, error) {
|
|
|
|
return json.Marshal(encodedMeasurement{
|
|
|
|
Expected: hex.EncodeToString(m.Expected[:]),
|
2023-03-22 06:47:39 -04:00
|
|
|
WarnOnly: m.ValidationOpt,
|
2022-11-24 04:57:58 -05:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalYAML reads a Measurement either as yaml object,
|
|
|
|
// or as a simple hex or base64 encoded string.
|
|
|
|
func (m *Measurement) UnmarshalYAML(unmarshal func(any) error) error {
|
|
|
|
var eM encodedMeasurement
|
|
|
|
if err := unmarshal(&eM); err != nil {
|
2022-11-25 06:08:24 -05:00
|
|
|
// Unmarshalling failed, Measurement might be a simple string instead of Measurement struct.
|
|
|
|
// These values will always be enforced.
|
2022-11-24 04:57:58 -05:00
|
|
|
if legacyErr := unmarshal(&eM.Expected); legacyErr != nil {
|
2023-02-07 06:56:25 -05:00
|
|
|
return errors.Join(
|
2022-11-24 04:57:58 -05:00
|
|
|
err,
|
|
|
|
fmt.Errorf("trying legacy format: %w", legacyErr),
|
|
|
|
)
|
|
|
|
}
|
2022-05-12 04:15:00 -04:00
|
|
|
}
|
|
|
|
|
2022-11-24 04:57:58 -05:00
|
|
|
if err := m.unmarshal(eM); err != nil {
|
|
|
|
return fmt.Errorf("unmarshalling yaml: %w", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// MarshalYAML writes out a Measurement with Expected encoded as a hex string.
|
|
|
|
func (m Measurement) MarshalYAML() (any, error) {
|
|
|
|
return encodedMeasurement{
|
|
|
|
Expected: hex.EncodeToString(m.Expected[:]),
|
2023-03-22 06:47:39 -04:00
|
|
|
WarnOnly: m.ValidationOpt,
|
2022-11-24 04:57:58 -05:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// unmarshal parses a hex or base64 encoded Measurement.
|
|
|
|
func (m *Measurement) unmarshal(eM encodedMeasurement) error {
|
|
|
|
expected, err := hex.DecodeString(eM.Expected)
|
|
|
|
if err != nil {
|
|
|
|
// expected value might be in base64 legacy format
|
|
|
|
// TODO: Remove with v2.4.0
|
|
|
|
hexErr := err
|
|
|
|
expected, err = base64.StdEncoding.DecodeString(eM.Expected)
|
2022-05-12 04:15:00 -04:00
|
|
|
if err != nil {
|
2023-02-07 06:56:25 -05:00
|
|
|
return errors.Join(
|
2022-11-24 04:57:58 -05:00
|
|
|
fmt.Errorf("invalid measurement: not a hex string %w", hexErr),
|
|
|
|
fmt.Errorf("not a base64 string: %w", err),
|
|
|
|
)
|
2022-05-12 04:15:00 -04:00
|
|
|
}
|
|
|
|
}
|
2022-11-24 04:57:58 -05:00
|
|
|
|
2023-03-08 08:13:57 -05:00
|
|
|
if len(expected) != 32 && len(expected) != 48 {
|
2022-11-24 04:57:58 -05:00
|
|
|
return fmt.Errorf("invalid measurement: invalid length: %d", len(expected))
|
|
|
|
}
|
|
|
|
|
2023-03-08 08:13:57 -05:00
|
|
|
m.Expected = expected
|
2023-03-22 06:47:39 -04:00
|
|
|
m.ValidationOpt = eM.WarnOnly
|
2022-11-24 04:57:58 -05:00
|
|
|
|
2022-05-12 04:15:00 -04:00
|
|
|
return nil
|
|
|
|
}
|
2022-08-01 03:37:05 -04:00
|
|
|
|
2022-11-24 04:57:58 -05:00
|
|
|
// WithAllBytes returns a measurement value where all 32 bytes are set to b.
|
2023-03-22 06:47:39 -04:00
|
|
|
func WithAllBytes(b byte, validationOpt MeasurementValidationOption) Measurement {
|
2022-11-24 04:57:58 -05:00
|
|
|
return Measurement{
|
2023-03-08 08:13:57 -05:00
|
|
|
Expected: bytes.Repeat([]byte{b}, 32),
|
2023-03-22 06:47:39 -04:00
|
|
|
ValidationOpt: validationOpt,
|
2022-11-24 04:57:58 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// PlaceHolderMeasurement returns a measurement with placeholder values for Expected.
|
|
|
|
func PlaceHolderMeasurement() Measurement {
|
|
|
|
return Measurement{
|
2023-03-08 08:13:57 -05:00
|
|
|
Expected: bytes.Repeat([]byte{0x12, 0x34}, 16),
|
2023-03-22 06:47:39 -04:00
|
|
|
ValidationOpt: Enforce,
|
2022-11-24 04:57:58 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-08-01 03:37:05 -04:00
|
|
|
func getFromURL(ctx context.Context, client *http.Client, sourceURL *url.URL) ([]byte, error) {
|
|
|
|
req, err := http.NewRequestWithContext(ctx, http.MethodGet, sourceURL.String(), http.NoBody)
|
|
|
|
if err != nil {
|
|
|
|
return []byte{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return []byte{}, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
return []byte{}, fmt.Errorf("http status code: %d", resp.StatusCode)
|
|
|
|
}
|
2022-08-05 09:30:23 -04:00
|
|
|
content, err := io.ReadAll(resp.Body)
|
2022-08-01 03:37:05 -04:00
|
|
|
if err != nil {
|
|
|
|
return []byte{}, err
|
|
|
|
}
|
|
|
|
return content, nil
|
|
|
|
}
|
2022-11-24 04:57:58 -05:00
|
|
|
|
2023-03-08 08:13:57 -05:00
|
|
|
func checkLength(m map[uint32]Measurement) error {
|
|
|
|
var length int
|
|
|
|
for idx, measurement := range m {
|
|
|
|
if length == 0 {
|
|
|
|
length = len(measurement.Expected)
|
|
|
|
} else if len(measurement.Expected) != length {
|
|
|
|
return fmt.Errorf("inconsistent measurement length: index %d: expected %d, got %d", idx, length, len(measurement.Expected))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-11-24 04:57:58 -05:00
|
|
|
type encodedMeasurement struct {
|
2023-03-22 06:47:39 -04:00
|
|
|
Expected string `json:"expected" yaml:"expected"`
|
|
|
|
WarnOnly MeasurementValidationOption `json:"warnOnly" yaml:"warnOnly"`
|
2022-11-24 04:57:58 -05:00
|
|
|
}
|
2022-11-28 05:09:39 -05:00
|
|
|
|
|
|
|
// mYamlContent is the Content of a yaml.Node encoding of an M. It implements sort.Interface.
|
|
|
|
// The slice is filled like {key1, value1, key2, value2, ...}.
|
|
|
|
type mYamlContent []*yaml.Node
|
|
|
|
|
|
|
|
func (c mYamlContent) Len() int {
|
|
|
|
return len(c) / 2
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c mYamlContent) Less(i, j int) bool {
|
|
|
|
lhs, err := strconv.Atoi(c[2*i].Value)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
rhs, err := strconv.Atoi(c[2*j].Value)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
return lhs < rhs
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c mYamlContent) Swap(i, j int) {
|
|
|
|
// The slice is filled like {key1, value1, key2, value2, ...}.
|
|
|
|
// We need to swap both key and value.
|
|
|
|
c[2*i], c[2*j] = c[2*j], c[2*i]
|
|
|
|
c[2*i+1], c[2*j+1] = c[2*j+1], c[2*i+1]
|
|
|
|
}
|