Compare commits

..

No commits in common. "main" and "v0.0.53" have entirely different histories.

5 changed files with 6 additions and 215 deletions

View File

@ -1,86 +0,0 @@
kind: pipeline
type: docker
name: default
steps:
- name: 2. test
image: golang
volumes:
- name: deps
path: /go
commands:
- go test ./...
- name: 3. build
image: golang
volumes:
- name: deps
path: /go
commands:
- go build -v -race -a ./...
- name: 4. deploy
image: alpine
volumes:
- name: ssh_key
path: /root/.ssh
commands:
- chmod 0400 /root/.ssh/id_rsa.kubehost
- ls -lah /root/.ssh/id_rsa.kubehost
- apk add --no-cache openssh
- ssh -p21022 -o StrictHostKeyChecking=accept-new -i /root/.ssh/id_rsa.kubehost mtc@bosub-kub-int.metacoaching.pro "hostname"
- name: 5. notify fail
image: bash:4.4
environment:
ZULIP_HOST: https://zulip.meta-tech.academy
ZULIP_STREAM: gitea
ZULIP_TOPIC: build
ZULIP_STATUS: ":check:"
ZULIP_USER:
from_secret: ZULIP_BOT
ZULIP_TKN:
from_secret: ZULIP_TOKEN
commands:
- apk add --no-cache curl
- export ZULIP_STATUS=":prohibited:"
- export ZULIP_MESSAGE=$${DRONE_COMMIT_MESSAGE:-2}
- export SHORT_COMMIT=$${DRONE_COMMIT:0:7}
- export REMOTE_URL=$${DRONE_REMOTE_URL:0:-4}
- export REMOTE_URL=$${DRONE_REMOTE_URL:0:-4}
- export ZULIP_FAILED_STEPS=$${DRONE_FAILED_STEPS}
- export FLAG_FAIL=":triangular_flag:"
- curl -s -X POST "$ZULIP_HOST/api/v1/messages" -u "$ZULIP_USER:$ZULIP_TKN" --data-urlencode "type=stream" --data-urlencode "to=\"$ZULIP_STREAM\"" --data-urlencode "topic=$ZULIP_TOPIC" --data "content=$ZULIP_STATUS **[build %23${DRONE_BUILD_NUMBER}](${DRONE_BUILD_LINK})**%0A> **${DRONE_BUILD_EVENT}** event on **${DRONE_COMMIT_BRANCH}** branch *by* **${DRONE_COMMIT_AUTHOR}** ([$SHORT_COMMIT]($REMOTE_URL/commit/${DRONE_COMMIT}))%0A> $ZULIP_MESSAGE%0A> $FLAG_FAIL ***failed at step*** $ZULIP_FAILED_STEPS"
when:
status:
- failure
- name: 5. notify done
image: bash:4.4
environment:
ZULIP_HOST: https://zulip.meta-tech.academy
ZULIP_STREAM: gitea
ZULIP_TOPIC: build
ZULIP_STATUS: ":check:"
ZULIP_USER:
from_secret: ZULIP_BOT
ZULIP_TKN:
from_secret: ZULIP_TOKEN
commands:
- apk add --no-cache curl
- export ZULIP_STATUS=":check:"
- export ZULIP_MESSAGE=$${DRONE_COMMIT_MESSAGE:-2}
- export SHORT_COMMIT=$${DRONE_COMMIT:0:7}
- export REMOTE_URL=$${DRONE_REMOTE_URL:0:-4}
- curl -s -X POST "$ZULIP_HOST/api/v1/messages" -u "$ZULIP_USER:$ZULIP_TKN" --data-urlencode "type=stream" --data-urlencode "to=\"$ZULIP_STREAM\"" --data-urlencode "topic=$ZULIP_TOPIC" --data "content=$ZULIP_STATUS **[build %23${DRONE_BUILD_NUMBER}](${DRONE_BUILD_LINK})**%0A> **${DRONE_BUILD_EVENT}** event on **${DRONE_COMMIT_BRANCH}** branch *by* **${DRONE_COMMIT_AUTHOR}** ([$SHORT_COMMIT]($REMOTE_URL/commit/${DRONE_COMMIT}))%0A> $ZULIP_MESSAGE"
when:
status:
- success
volumes:
- name: deps
temp: {}
- name: ssh_key
host:
path: /home/repo/drone

View File

@ -1,4 +1,2 @@
# core # core

View File

@ -1,121 +0,0 @@
package crypt
import (
"crypto/rand"
"crypto/rsa"
"crypto/sha256"
"crypto/x509"
"encoding/base64"
"encoding/pem"
"fmt"
"log"
"golang.org/x/crypto/ssh"
)
type RsaEncrypt struct {
pub *rsa.PublicKey
}
func NewRsaEncrypt(key []byte) *RsaEncrypt {
pkey, _, _, _, err := ssh.ParseAuthorizedKey(key)
if err != nil {
log.Fatal("unable to parse authorized key")
}
// upgrade first to ssh.CryptoPublicKey interface
// then call CryptoPublicKey() to get actual crypto.PublicKey
// Finally, convert back to an *rsa.PublicKey
pubCrypto := pkey.(ssh.CryptoPublicKey).CryptoPublicKey()
return &RsaEncrypt{pubCrypto.(*rsa.PublicKey)}
}
func (re *RsaEncrypt) Encrypt(data []byte) (string, error) {
encryptedBytes, err := rsa.EncryptOAEP(
sha256.New(),
rand.Reader,
re.pub,
data,
nil)
if err != nil {
return "", err
}
return base64.StdEncoding.EncodeToString(encryptedBytes), nil
}
type RsaKey struct {
priv *rsa.PrivateKey
}
func NewRsaKey(size int) *RsaKey {
key, err := rsa.GenerateKey(rand.Reader, size)
if err != nil {
log.Fatalf("unable to generate key with size %d", size)
}
return &RsaKey{key}
}
func LoadRsaKey(privKey []byte) *RsaKey {
block, _ := pem.Decode(privKey)
key, err := x509.ParsePKCS1PrivateKey(block.Bytes)
key.Size()
if err != nil {
log.Fatal("unable to parse pkcs1 priv key")
}
return &RsaKey{priv: key}
}
func (rk *RsaKey) GetBytes() []byte {
return pem.EncodeToMemory(&pem.Block{
Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(rk.priv),
})
}
func (rk *RsaKey) GetPubKeyBytes() []byte {
pub, err := ssh.NewPublicKey(rk.priv.Public())
if err != nil {
log.Fatal("unable to retriew public key")
}
return ssh.MarshalAuthorizedKey(pub)
}
func (rk *RsaKey) GetRsaEncrypt() *RsaEncrypt {
return &RsaEncrypt{&rk.priv.PublicKey}
}
func (rk *RsaKey) Decrypt(b64data []byte) ([]byte, error) {
data, err := base64.StdEncoding.DecodeString(string(b64data))
if err != nil {
log.Fatal("unable to decode base64 data")
}
decrypted, err := rsa.DecryptOAEP(sha256.New(), rand.Reader, rk.priv, data, nil)
if err != nil {
log.Fatal("unable to decrypt data")
}
return decrypted, nil
}
func mainSshCrypt() {
rk := NewRsaKey(4096)
pubKey := rk.GetPubKeyBytes()
fmt.Println("== PUB KEY ==")
fmt.Println(string(pubKey))
fmt.Println("== PRIV KEY ==")
fmt.Println(string(rk.GetBytes()))
rk2 := LoadRsaKey(rk.GetBytes())
fmt.Println("== LOADED KEY ==")
fmt.Println(string(rk2.GetBytes()))
// fmt.Println("== GET RsaEncrypt ==")
// re := rk.GetRsaEncrypt()
fmt.Println("== NewRsaEncrypt ==")
re := NewRsaEncrypt(pubKey)
fmt.Println("== ENCRYPT data ==")
encryptedData, _ := re.Encrypt([]byte("hello world"))
fmt.Println(encryptedData)
decryptedData, _ := rk.Decrypt([]byte(encryptedData))
fmt.Println("== DECRYPT data ==")
fmt.Println(string(decryptedData))
}

View File

@ -176,9 +176,9 @@ type TableSize struct {
} }
func (db *Db) SizeTable(dbname string) []TableSize { func (db *Db) SizeTable(dbname string) []TableSize {
rs := make([]TableSize, 0) rs := make([]TableSize, 1)
db.onDbExec("information_schema", func(sqlDb *sql.DB) bool { db.onDbExec("information_schema", func(sqlDb *sql.DB) bool {
query := "SELECT `TABLE_NAME` AS `table`, ROUND(((`DATA_LENGTH` + `INDEX_LENGTH`) / 1024 / 1024), 2) `size` FROM `TABLES` WHERE `table_schema` = ? AND (`DATA_LENGTH` + `INDEX_LENGTH`) > 0 ORDER BY (`DATA_LENGTH` + `INDEX_LENGTH`) DESC;" query := "SELECT table_name AS `table`, round(((data_length + index_length) / 1024 / 1024), 2) `size' FROM TABLES WHERE table_schema = ? ORDER BY (data_length + index_length) DESC GROUP BY table_schema;"
rows, err := sqlDb.Query(query, dbname) rows, err := sqlDb.Query(query, dbname)
if err != nil { if err != nil {
fmt.Printf("cannot get table size of db %s : %v", dbname, err) fmt.Printf("cannot get table size of db %s : %v", dbname, err)

View File

@ -159,7 +159,7 @@ func (s *Ssh) DownloadFile(remoteFile string, localFile string, display bool, cl
if close { if close {
defer scp.Close() defer scp.Close()
} }
if err := s.downloadFile(scp, remoteFile, localFile); err == nil { if err := s.downloadFile(size, scp, remoteFile, localFile); err == nil {
done = sys.CheckSumFile(checksum, localFile) done = sys.CheckSumFile(checksum, localFile)
if display { if display {
echo.Cstyle("usageCom").Echo(" file downloaded !\n") echo.Cstyle("usageCom").Echo(" file downloaded !\n")
@ -177,13 +177,13 @@ func (s *Ssh) DownloadFile(remoteFile string, localFile string, display bool, cl
return done return done
} }
func (s *Ssh) ScpDownload(remoteFile string, localFile string, close bool) bool { func (s *Ssh) ScpDownload(size int64, remoteFile string, localFile string, close bool) bool {
var done bool = false var done bool = false
scp := s.Scp() scp := s.Scp()
if close { if close {
defer scp.Close() defer scp.Close()
} }
if err := s.downloadFile(scp, remoteFile, localFile); err == nil { if err := s.downloadFile(size, scp, remoteFile, localFile); err == nil {
done = true done = true
} else { } else {
log.Fatal(err) log.Fatal(err)
@ -191,7 +191,7 @@ func (s *Ssh) ScpDownload(remoteFile string, localFile string, close bool) bool
return done return done
} }
func (s *Ssh) downloadFile(sc *sftp.Client, remoteFile string, localFile string) (err error) { func (s *Ssh) downloadFile(size int64, sc *sftp.Client, remoteFile string, localFile string) (err error) {
// Note: SFTP To Go doesn't support O_RDWR mode // Note: SFTP To Go doesn't support O_RDWR mode
srcFile, err := sc.OpenFile(remoteFile, (os.O_RDONLY)) srcFile, err := sc.OpenFile(remoteFile, (os.O_RDONLY))