package main import ( "bytes" "compress/bzip2" "crypto/tls" "embed" "encoding/json" "errors" "flag" "fmt" "io" "io/ioutil" "log" "math/rand" "net/http" "os" "path/filepath" "strconv" "strings" "sync" "text/template" "time" "github.com/fleetdm/fleet/v4/server/fleet" "github.com/fleetdm/fleet/v4/server/ptr" "github.com/fleetdm/fleet/v4/server/service" "github.com/google/uuid" "github.com/valyala/fasthttp" ) //go:embed *.tmpl var templatesFS embed.FS //go:embed *.software var softwareFS embed.FS var vulnerableSoftware []fleet.Software func init() { vulnerableSoftwareData, err := softwareFS.ReadFile("vulnerable.software") if err != nil { log.Fatal("reading vulnerable software file: ", err) } lines := bytes.Split(vulnerableSoftwareData, []byte("\n")) for _, line := range lines { parts := bytes.Split(line, []byte("##")) if len(parts) < 2 { fmt.Println("skipping", string(line)) continue } vulnerableSoftware = append(vulnerableSoftware, fleet.Software{ Name: strings.TrimSpace(string(parts[0])), Version: strings.TrimSpace(string(parts[1])), Source: "apps", }) } log.Printf("Loaded %d vulnerable software\n", len(vulnerableSoftware)) } type Stats struct { errors int enrollments int distributedwrites int l sync.Mutex } func (s *Stats) RecordStats(errors int, enrollments int, distributedwrites int) { s.l.Lock() defer s.l.Unlock() s.errors += errors s.enrollments += enrollments s.distributedwrites += distributedwrites } func (s *Stats) Log() { s.l.Lock() defer s.l.Unlock() fmt.Printf( "%s :: error rate: %.2f \t enrollments: %d \t writes: %d\n", time.Now().String(), float64(s.errors)/float64(s.enrollments), s.enrollments, s.distributedwrites, ) } func (s *Stats) runLoop() { ticker := time.Tick(10 * time.Second) for range ticker { s.Log() } } type nodeKeyManager struct { filepath string l sync.Mutex nodekeys []string } func (n *nodeKeyManager) LoadKeys() { if n.filepath == "" { return } n.l.Lock() defer n.l.Unlock() data, err := os.ReadFile(n.filepath) if err != nil { fmt.Println("WARNING (ignore if creating a new node key file): error loading nodekey file:", err) return } n.nodekeys = strings.Split(string(data), "\n") n.nodekeys = n.nodekeys[:len(n.nodekeys)-1] // remove last empty node key due to new line. fmt.Printf("loaded %d node keys\n", len(n.nodekeys)) } func (n *nodeKeyManager) Get(i int) string { n.l.Lock() defer n.l.Unlock() if len(n.nodekeys) > i { return n.nodekeys[i] } return "" } func (n *nodeKeyManager) Add(nodekey string) { if n.filepath == "" { return } // we lock just to make sure we write one at a time n.l.Lock() defer n.l.Unlock() f, err := os.OpenFile(n.filepath, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0o600) if err != nil { fmt.Println("error opening nodekey file:", err.Error()) return } defer f.Close() if _, err := f.WriteString(nodekey + "\n"); err != nil { fmt.Println("error writing nodekey file:", err) } } type agent struct { agentIndex int softwareCount softwareEntityCount userCount entityCount policyPassProb float64 strings map[string]string serverAddress string fastClient fasthttp.Client stats *Stats nodeKeyManager *nodeKeyManager nodeKey string templates *template.Template // deviceAuthToken holds Fleet Desktop device authentication token. // // Non-nil means the agent is identified as orbit osquery, // nil means the agent is identified as vanilla osquery. deviceAuthToken *string scheduledQueries []string // The following are exported to be used by the templates. EnrollSecret string UUID string ConfigInterval time.Duration QueryInterval time.Duration } type entityCount struct { common int unique int } type softwareEntityCount struct { entityCount vulnerable int withLastOpened int lastOpenedProb float64 } func newAgent( agentIndex int, serverAddress, enrollSecret string, templates *template.Template, configInterval, queryInterval time.Duration, softwareCount softwareEntityCount, userCount entityCount, policyPassProb float64, orbitProb float64, ) *agent { var deviceAuthToken *string if rand.Float64() <= orbitProb { deviceAuthToken = ptr.String(uuid.NewString()) } // #nosec (osquery-perf is only used for testing) tlsConfig := &tls.Config{ InsecureSkipVerify: true, } return &agent{ agentIndex: agentIndex, serverAddress: serverAddress, softwareCount: softwareCount, userCount: userCount, strings: make(map[string]string), policyPassProb: policyPassProb, fastClient: fasthttp.Client{ TLSConfig: tlsConfig, }, templates: templates, deviceAuthToken: deviceAuthToken, EnrollSecret: enrollSecret, ConfigInterval: configInterval, QueryInterval: queryInterval, UUID: uuid.New().String(), } } type enrollResponse struct { NodeKey string `json:"node_key"` } type distributedReadResponse struct { Queries map[string]string `json:"queries"` } func (a *agent) runLoop(i int, onlyAlreadyEnrolled bool) { if err := a.enroll(i, onlyAlreadyEnrolled); err != nil { return } a.config() resp, err := a.DistributedRead() if err != nil { log.Println(err) } else { if len(resp.Queries) > 0 { a.DistributedWrite(resp.Queries) } } configTicker := time.Tick(a.ConfigInterval) liveQueryTicker := time.Tick(a.QueryInterval) for { select { case <-configTicker: a.config() case <-liveQueryTicker: resp, err := a.DistributedRead() if err != nil { log.Println(err) } else if len(resp.Queries) > 0 { a.DistributedWrite(resp.Queries) } } } } func (a *agent) waitingDo(req *fasthttp.Request, res *fasthttp.Response) { err := a.fastClient.Do(req, res) for err != nil || res.StatusCode() != http.StatusOK { fmt.Println(err, res.StatusCode()) a.stats.RecordStats(1, 0, 0) <-time.Tick(time.Duration(rand.Intn(120)+1) * time.Second) err = a.fastClient.Do(req, res) } } func (a *agent) enroll(i int, onlyAlreadyEnrolled bool) error { a.nodeKey = a.nodeKeyManager.Get(i) if a.nodeKey != "" { a.stats.RecordStats(0, 1, 0) return nil } if onlyAlreadyEnrolled { return errors.New("not enrolled") } var body bytes.Buffer if err := a.templates.ExecuteTemplate(&body, "enroll", a); err != nil { log.Println("execute template:", err) return err } req := fasthttp.AcquireRequest() req.SetBody(body.Bytes()) req.Header.SetMethod("POST") req.Header.SetContentType("application/json") req.Header.Add("User-Agent", "osquery/4.6.0") req.SetRequestURI(a.serverAddress + "/api/osquery/enroll") res := fasthttp.AcquireResponse() a.waitingDo(req, res) fasthttp.ReleaseRequest(req) defer fasthttp.ReleaseResponse(res) if res.StatusCode() != http.StatusOK { log.Println("enroll status:", res.StatusCode()) return fmt.Errorf("status code: %d", res.StatusCode()) } var parsedResp enrollResponse if err := json.Unmarshal(res.Body(), &parsedResp); err != nil { log.Println("json parse:", err) return err } a.nodeKey = parsedResp.NodeKey a.stats.RecordStats(0, 1, 0) a.nodeKeyManager.Add(a.nodeKey) return nil } func (a *agent) config() { body := bytes.NewBufferString(`{"node_key": "` + a.nodeKey + `"}`) req := fasthttp.AcquireRequest() req.SetBody(body.Bytes()) req.Header.SetMethod("POST") req.Header.SetContentType("application/json") req.Header.Add("User-Agent", "osquery/4.6.0") req.SetRequestURI(a.serverAddress + "/api/osquery/config") res := fasthttp.AcquireResponse() a.waitingDo(req, res) fasthttp.ReleaseRequest(req) defer fasthttp.ReleaseResponse(res) if res.StatusCode() != http.StatusOK { log.Println("config status:", res.StatusCode()) return } parsedResp := struct { Packs map[string]struct { Queries map[string]interface{} `json:"queries"` } `json:"packs"` }{} if err := json.Unmarshal(res.Body(), &parsedResp); err != nil { log.Println("json parse at config:", err) return } var scheduledQueries []string for packName, pack := range parsedResp.Packs { for queryName := range pack.Queries { scheduledQueries = append(scheduledQueries, packName+"_"+queryName) } } a.scheduledQueries = scheduledQueries // No need to read the config body } const stringVals = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-_." func (a *agent) randomString(n int) string { sb := strings.Builder{} sb.Grow(n) for i := 0; i < n; i++ { sb.WriteByte(stringVals[rand.Int63()%int64(len(stringVals))]) } return sb.String() } func (a *agent) CachedString(key string) string { if val, ok := a.strings[key]; ok { return val } val := a.randomString(12) a.strings[key] = val return val } func (a *agent) HostUsersMacOS() []fleet.HostUser { groupNames := []string{"staff", "nobody", "wheel", "tty", "daemon"} shells := []string{"/bin/zsh", "/bin/sh", "/usr/bin/false", "/bin/bash"} commonUsers := make([]fleet.HostUser, a.userCount.common) for i := 0; i < len(commonUsers); i++ { commonUsers[i] = fleet.HostUser{ Uid: uint(i), Username: fmt.Sprintf("Common_%d", i), Type: "", // Empty for macOS. GroupName: groupNames[i%len(groupNames)], Shell: shells[i%len(shells)], } } uniqueUsers := make([]fleet.HostUser, a.userCount.unique) for i := 0; i < len(uniqueUsers); i++ { uniqueUsers[i] = fleet.HostUser{ Uid: uint(i), Username: fmt.Sprintf("Unique_%d_%d", a.agentIndex, i), Type: "", // Empty for macOS. GroupName: groupNames[i%len(groupNames)], Shell: shells[i%len(shells)], } } users := append(commonUsers, uniqueUsers...) rand.Shuffle(len(users), func(i, j int) { users[i], users[j] = users[j], users[i] }) return users } func extract(src, dst string) { srcF, err := os.Open(src) if err != nil { panic(err) } defer srcF.Close() dstF, err := os.Create(dst) if err != nil { panic(err) } defer dstF.Close() r := bzip2.NewReader(srcF) // ignoring "G110: Potential DoS vulnerability via decompression bomb", as this is test code. _, err = io.Copy(dstF, r) //nolint:gosec if err != nil { panic(err) } } func loadSoftware(platform string, ver string) []fleet.Software { srcPath := filepath.Join( "..", "..", "server", "vulnerabilities", "testdata", platform, "software", fmt.Sprintf("%s_%s-software.json.bz2", platform, ver), ) tmpDir, err := ioutil.TempDir("", "osquery-perf") if err != nil { panic(err) } defer os.RemoveAll(tmpDir) dstPath := filepath.Join(tmpDir, fmt.Sprintf("%s-software.json", ver)) extract(srcPath, dstPath) type softwareJSON struct { Name string `json:"name"` Version string `json:"version"` Release string `json:"release,omitempty"` Arch string `json:"arch,omitempty"` } var software []softwareJSON contents, err := ioutil.ReadFile(dstPath) if err != nil { log.Printf("reading vuln software for %s %s: %s\n", platform, ver, err) return nil } err = json.Unmarshal(contents, &software) if err != nil { log.Printf("unmarshalling vuln software for %s %s:%s", platform, ver, err) return nil } var r []fleet.Software for _, fi := range software { r = append(r, fleet.Software{ Name: fi.Name, Version: fi.Version, Source: "osquery-perf", }) } return r } func (a *agent) SoftwareWindows11() []fleet.Software { return loadSoftware("windows", "11") } func (a *agent) SoftwareUbuntu1604() []fleet.Software { return loadSoftware("ubuntu", "1604") } func (a *agent) SoftwareUbuntu1804() []fleet.Software { return loadSoftware("ubuntu", "1804") } func (a *agent) SoftwareUbuntu2004() []fleet.Software { return loadSoftware("ubuntu", "2004") } func (a *agent) SoftwareUbuntu2104() []fleet.Software { return loadSoftware("ubuntu", "2104") } func (a *agent) SoftwareUbuntu2110() []fleet.Software { return loadSoftware("ubuntu", "2110") } func (a *agent) SoftwareUbuntu2204() []fleet.Software { return loadSoftware("ubuntu", "2204") } func (a *agent) SoftwareMacOS() []fleet.Software { var lastOpenedCount int commonSoftware := make([]fleet.Software, a.softwareCount.common) for i := 0; i < len(commonSoftware); i++ { commonSoftware[i] = fleet.Software{ Name: fmt.Sprintf("Common_%d", i), Version: "0.0.1", BundleIdentifier: "com.fleetdm.osquery-perf", Source: "osquery-perf", LastOpenedAt: a.genLastOpenedAt(&lastOpenedCount), } } uniqueSoftware := make([]fleet.Software, a.softwareCount.unique) for i := 0; i < len(uniqueSoftware); i++ { uniqueSoftware[i] = fleet.Software{ Name: fmt.Sprintf("Unique_%s_%d", a.CachedString("hostname"), i), Version: "1.1.1", BundleIdentifier: "com.fleetdm.osquery-perf", Source: "osquery-perf", LastOpenedAt: a.genLastOpenedAt(&lastOpenedCount), } } randomVulnerableSoftware := make([]fleet.Software, a.softwareCount.vulnerable) for i := 0; i < len(randomVulnerableSoftware); i++ { sw := vulnerableSoftware[rand.Intn(len(vulnerableSoftware))] sw.LastOpenedAt = a.genLastOpenedAt(&lastOpenedCount) randomVulnerableSoftware[i] = sw } software := append(commonSoftware, uniqueSoftware...) software = append(software, randomVulnerableSoftware...) rand.Shuffle(len(software), func(i, j int) { software[i], software[j] = software[j], software[i] }) return software } func (a *agent) DistributedRead() (*distributedReadResponse, error) { req := fasthttp.AcquireRequest() req.SetBody([]byte(`{"node_key": "` + a.nodeKey + `"}`)) req.Header.SetMethod("POST") req.Header.SetContentType("application/json") req.Header.Add("User-Agent", "osquery/4.6.0") req.SetRequestURI(a.serverAddress + "/api/osquery/distributed/read") res := fasthttp.AcquireResponse() a.waitingDo(req, res) fasthttp.ReleaseRequest(req) defer fasthttp.ReleaseResponse(res) var parsedResp distributedReadResponse if err := json.Unmarshal(res.Body(), &parsedResp); err != nil { log.Println("json parse:", err) return nil, err } return &parsedResp, nil } var defaultQueryResult = []map[string]string{ {"foo": "bar"}, } func (a *agent) genLastOpenedAt(count *int) *time.Time { if *count >= a.softwareCount.withLastOpened { return nil } *count++ if rand.Float64() <= a.softwareCount.lastOpenedProb { now := time.Now() return &now } return nil } func (a *agent) runPolicy(query string) []map[string]string { if rand.Float64() <= a.policyPassProb { return []map[string]string{ {"1": "1"}, } } return nil } func (a *agent) randomQueryStats() []map[string]string { var stats []map[string]string for _, scheduledQuery := range a.scheduledQueries { stats = append(stats, map[string]string{ "name": scheduledQuery, "delimiter": "_", "average_memory": fmt.Sprint(rand.Intn(200) + 10), "denylisted": "false", "executions": fmt.Sprint(rand.Intn(100) + 1), "interval": fmt.Sprint(rand.Intn(100) + 1), "last_executed": fmt.Sprint(time.Now().Unix()), "output_size": fmt.Sprint(rand.Intn(100) + 1), "system_time": fmt.Sprint(rand.Intn(4000) + 10), "user_time": fmt.Sprint(rand.Intn(4000) + 10), "wall_time": fmt.Sprint(rand.Intn(4000) + 10), }) } return stats } func (a *agent) orbitInfo() (bool, []map[string]string) { if a.deviceAuthToken != nil { return true, []map[string]string{ {"device_auth_token": *a.deviceAuthToken, "version": "osquery-perf"}, } } return false, nil // vanilla osquery returns no results (due to discovery query). } func (a *agent) mdm() []map[string]string { possibleURLs := []string{ "https://kandji.com/1", "https://jamf.com/1", "https://airwatch.com/1", "https://microsoft.com/1", "https://simplemdm.com/1", "https://example.com/1", "https://kandji.com/2", "https://jamf.com/2", "https://airwatch.com/2", "https://microsoft.com/2", "https://simplemdm.com/2", "https://example.com/2", } enrolled := "true" if rand.Intn(2) == 1 { enrolled = "false" } installedFromDep := "true" if rand.Intn(2) == 1 { installedFromDep = "false" } ix := rand.Intn(len(possibleURLs)) return []map[string]string{ {"enrolled": enrolled, "server_url": possibleURLs[ix], "installed_from_dep": installedFromDep}, } } func (a *agent) munkiInfo() []map[string]string { return []map[string]string{ {"version": "1.2.3"}, } } func (a *agent) googleChromeProfiles() []map[string]string { count := rand.Intn(5) // return between 0 and 4 emails result := make([]map[string]string, count) for i := range result { email := fmt.Sprintf("user%d@example.com", i) if i == len(result)-1 { // if the maximum number of emails is returned, set a random domain name // so that we have email addresses that match a lot of hosts, and some // that match few hosts. domainRand := rand.Intn(10) email = fmt.Sprintf("user%d@example%d.com", i, domainRand) } result[i] = map[string]string{"email": email} } return result } func (a *agent) batteries() []map[string]string { count := rand.Intn(3) // return between 0 and 2 batteries result := make([]map[string]string, count) for i := range result { health := "Good" cycleCount := rand.Intn(2000) switch { case cycleCount > 1500: health = "Poor" case cycleCount > 1000: health = "Fair" } result[i] = map[string]string{ "serial_number": fmt.Sprintf("%04d", i), "cycle_count": strconv.Itoa(cycleCount), "health": health, } } return result } func (a *agent) osUnixLike() []map[string]string { return []map[string]string{ { "build": "18G3020", "major": "10", "minor": "14", "name": "Mac OS X", "patch": "6", "platform": "darwin", "arch": "x86_64", "version": "10.14.6", "kernel_version": "21.4.0", }, } } func (a *agent) processQuery(name, query string) (handled bool, results []map[string]string, status *fleet.OsqueryStatus) { const ( hostPolicyQueryPrefix = "fleet_policy_query_" hostDetailQueryPrefix = "fleet_detail_query_" ) statusOK := fleet.StatusOK switch { case strings.HasPrefix(name, hostPolicyQueryPrefix): return true, a.runPolicy(query), &statusOK case name == hostDetailQueryPrefix+"scheduled_query_stats": return true, a.randomQueryStats(), &statusOK case name == hostDetailQueryPrefix+"orbit_info": if ok, results := a.orbitInfo(); ok { return true, results, &statusOK } return true, nil, nil case name == hostDetailQueryPrefix+"mdm": ss := fleet.OsqueryStatus(rand.Intn(2)) if ss == fleet.StatusOK { results = a.mdm() } return true, results, &ss case name == hostDetailQueryPrefix+"munki_info": ss := fleet.OsqueryStatus(rand.Intn(2)) if ss == fleet.StatusOK { results = a.munkiInfo() } return true, results, &ss case name == hostDetailQueryPrefix+"google_chrome_profiles": ss := fleet.OsqueryStatus(rand.Intn(2)) if ss == fleet.StatusOK { results = a.googleChromeProfiles() } return true, results, &ss case name == hostDetailQueryPrefix+"battery": ss := fleet.OsqueryStatus(rand.Intn(2)) if ss == fleet.StatusOK { results = a.batteries() } return true, results, &ss case name == hostDetailQueryPrefix+"os_unix_like": ss := fleet.OsqueryStatus(rand.Intn(2)) if ss == fleet.StatusOK { results = a.osUnixLike() } return true, results, &ss default: // Look for results in the template file. if t := a.templates.Lookup(name); t == nil { return false, nil, nil } var ni bytes.Buffer err := a.templates.ExecuteTemplate(&ni, name, a) if err != nil { panic(err) } err = json.Unmarshal(ni.Bytes(), &results) if err != nil { panic(err) } return true, results, &statusOK } } func (a *agent) DistributedWrite(queries map[string]string) { r := service.SubmitDistributedQueryResultsRequest{ Results: make(fleet.OsqueryDistributedQueryResults), Statuses: make(map[string]fleet.OsqueryStatus), } r.NodeKey = a.nodeKey for name, query := range queries { handled, results, status := a.processQuery(name, query) if !handled { // If osquery-perf does not handle the incoming query, // always return status OK and the default query result. r.Results[name] = defaultQueryResult r.Statuses[name] = fleet.StatusOK } else { if results != nil { r.Results[name] = results } if status != nil { r.Statuses[name] = *status } } } body, err := json.Marshal(r) if err != nil { panic(err) } req := fasthttp.AcquireRequest() req.SetBody(body) req.Header.SetMethod("POST") req.Header.SetContentType("application/json") req.Header.Add("User-Agent", "osquery/5.0.1") req.SetRequestURI(a.serverAddress + "/api/osquery/distributed/write") res := fasthttp.AcquireResponse() a.waitingDo(req, res) fasthttp.ReleaseRequest(req) defer fasthttp.ReleaseResponse(res) a.stats.RecordStats(0, 0, 1) // No need to read the distributed write body } func main() { serverURL := flag.String("server_url", "https://localhost:8080", "URL (with protocol and port of osquery server)") enrollSecret := flag.String("enroll_secret", "", "Enroll secret to authenticate enrollment") hostCount := flag.Int("host_count", 10, "Number of hosts to start (default 10)") randSeed := flag.Int64("seed", time.Now().UnixNano(), "Seed for random generator (default current time)") startPeriod := flag.Duration("start_period", 10*time.Second, "Duration to spread start of hosts over") configInterval := flag.Duration("config_interval", 1*time.Minute, "Interval for config requests") queryInterval := flag.Duration("query_interval", 10*time.Second, "Interval for live query requests") onlyAlreadyEnrolled := flag.Bool("only_already_enrolled", false, "Only start agents that are already enrolled") nodeKeyFile := flag.String("node_key_file", "", "File with node keys to use") commonSoftwareCount := flag.Int("common_software_count", 10, "Number of common installed applications reported to fleet") uniqueSoftwareCount := flag.Int("unique_software_count", 10, "Number of unique installed applications reported to fleet") vulnerableSoftwareCount := flag.Int("vulnerable_software_count", 10, "Number of vulnerable installed applications reported to fleet") withLastOpenedSoftwareCount := flag.Int("with_last_opened_software_count", 10, "Number of applications that may report a last opened timestamp to fleet") lastOpenedChangeProb := flag.Float64("last_opened_change_prob", 0.1, "Probability of last opened timestamp to be reported as changed [0, 1]") commonUserCount := flag.Int("common_user_count", 10, "Number of common host users reported to fleet") uniqueUserCount := flag.Int("unique_user_count", 10, "Number of unique host users reported to fleet") policyPassProb := flag.Float64("policy_pass_prob", 1.0, "Probability of policies to pass [0, 1]") orbitProb := flag.Float64("orbit_prob", 0.5, "Probability of a host being identified as orbit install [0, 1]") flag.Parse() rand.Seed(*randSeed) templateNames := []string{ "mac10.14.6.tmpl", // Uncomment this to add windows hosts // "windows_11.tmpl", // Uncomment this to add ubuntu hosts with vulnerable software // "partial_ubuntu.tmpl", // "ubuntu_16.04.tmpl", // "ubuntu_18.04.tmpl", // "ubuntu_20.04.tmpl", // "ubuntu_21.04.tmpl", // "ubuntu_21.10.tmpl", // "ubuntu_22.04.tmpl", } var tmpls []*template.Template for _, t := range templateNames { tmpl, err := template.ParseFS(templatesFS, t) if err != nil { log.Fatal("parse templates: ", err) } tmpls = append(tmpls, tmpl) } // Spread starts over the interval to prevent thundering herd sleepTime := *startPeriod / time.Duration(*hostCount) stats := &Stats{} go stats.runLoop() nodeKeyManager := &nodeKeyManager{} if nodeKeyFile != nil { nodeKeyManager.filepath = *nodeKeyFile nodeKeyManager.LoadKeys() } for i := 0; i < *hostCount; i++ { tmpl := tmpls[i%len(tmpls)] if strings.HasPrefix(tmpl.Name(), "partial") { continue } a := newAgent(i+1, *serverURL, *enrollSecret, tmpl, *configInterval, *queryInterval, softwareEntityCount{ entityCount: entityCount{ common: *commonSoftwareCount, unique: *uniqueSoftwareCount, }, vulnerable: *vulnerableSoftwareCount, withLastOpened: *withLastOpenedSoftwareCount, lastOpenedProb: *lastOpenedChangeProb, }, entityCount{ common: *commonUserCount, unique: *uniqueUserCount, }, *policyPassProb, *orbitProb, ) a.stats = stats a.nodeKeyManager = nodeKeyManager go a.runLoop(i, onlyAlreadyEnrolled != nil && *onlyAlreadyEnrolled) time.Sleep(sleepTime) } fmt.Println("Agents running. Kill with C-c.") <-make(chan struct{}) }