Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
Acme Downloader
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package registry
Container registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Geant DevOps
Acme Downloader
Commits
339a2256
Unverified
Commit
339a2256
authored
4 years ago
by
Max Adamo
Browse files
Options
Downloads
Patches
Plain Diff
try to use go get
parent
507e42b8
Branches
Branches containing commit
Tags
Tags containing commit
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
build.sh
+2
-2
2 additions, 2 deletions
build.sh
main.go
+138
-7
138 additions, 7 deletions
main.go
with
140 additions
and
9 deletions
build.sh
+
2
−
2
View file @
339a2256
...
@@ -15,8 +15,8 @@ PROG_VERSION="1.0"
...
@@ -15,8 +15,8 @@ PROG_VERSION="1.0"
BUILDTIME
=
$(
date
-u
'+%Y-%m-%d_%H:%M:%S'
)
BUILDTIME
=
$(
date
-u
'+%Y-%m-%d_%H:%M:%S'
)
rm
-rf
${
GOPATH
}
/src/github.com/maxadamo/
${
BIN_NAME
}
rm
-rf
${
GOPATH
}
/src/github.com/maxadamo/
${
BIN_NAME
}
#
go get -ldflags "-s -w -X main.appVersion=${PROG_VERSION} -X main.buildTime=${BUILDTIME}" git
hub.com/maxadamo
/${BIN_NAME}
go get
-ldflags
"-s -w -X main.appVersion=
${
PROG_VERSION
}
-X main.buildTime=
${
BUILDTIME
}
"
git
lab.geant.net/devops
/
${
BIN_NAME
}
go get
-ldflags
"-s -w -X main.appVersion=
${
PROG_VERSION
}
-X main.buildTime=
${
BUILDTIME
}
"
.
#
go get -ldflags "-s -w -X main.appVersion=${PROG_VERSION} -X main.buildTime=${BUILDTIME}" .
# upx --brute ${GOPATH}/bin/${BIN_NAME}
# upx --brute ${GOPATH}/bin/${BIN_NAME}
if
[
$?
-gt
0
]
;
then
if
[
$?
-gt
0
]
;
then
...
...
This diff is collapsed.
Click to expand it.
main.go
+
138
−
7
View file @
339a2256
package
main
package
main
import
(
import
(
"crypto/x509"
"encoding/pem"
"fmt"
"fmt"
"io/ioutil"
"io/ioutil"
"log"
"log"
...
@@ -8,6 +10,7 @@ import (
...
@@ -8,6 +10,7 @@ import (
"os"
"os"
"path/filepath"
"path/filepath"
"strings"
"strings"
"time"
"github.com/docopt/docopt-go"
"github.com/docopt/docopt-go"
"github.com/go-ini/ini"
"github.com/go-ini/ini"
...
@@ -29,6 +32,109 @@ var (
...
@@ -29,6 +32,109 @@ var (
Type
string
Type
string
)
)
// check certificates
func
checkCerificates
(
dnsname
string
,
certificate
string
,
fullchain
string
,
ca
string
,
key
string
,
days
int
,
fail
bool
)
bool
{
Seconds
:=
days
*
86400
daysNumber
:=
time
.
Now
()
.
Local
()
.
Add
(
time
.
Second
*
time
.
Duration
(
Seconds
))
//fmt.Printf(daysNumber)
certPEM
,
err
:=
ioutil
.
ReadFile
(
certificate
)
if
err
!=
nil
{
if
fail
==
true
{
log
.
Fatal
(
err
)
}
else
{
return
false
}
}
certFullchainPEM
,
err
:=
ioutil
.
ReadFile
(
fullchain
)
if
err
!=
nil
{
if
fail
==
true
{
log
.
Fatal
(
err
)
}
else
{
return
false
}
}
rootPEM
,
err
:=
ioutil
.
ReadFile
(
ca
)
if
err
!=
nil
{
if
fail
==
true
{
log
.
Fatal
(
err
)
}
else
{
return
false
}
}
roots
:=
x509
.
NewCertPool
()
ok
:=
roots
.
AppendCertsFromPEM
([]
byte
(
rootPEM
))
if
!
ok
{
if
fail
==
true
{
panic
(
"failed to parse root certificate"
)
}
else
{
return
false
}
}
block
,
_
:=
pem
.
Decode
([]
byte
(
certPEM
))
if
block
==
nil
{
if
fail
==
true
{
panic
(
"failed to parse certificate PEM"
)
}
else
{
return
false
}
}
cert
,
err
:=
x509
.
ParseCertificate
(
block
.
Bytes
)
if
err
!=
nil
{
if
fail
==
true
{
panic
(
"failed to parse certificate: "
+
err
.
Error
())
}
else
{
return
false
}
}
fullchainBlock
,
_
:=
pem
.
Decode
([]
byte
(
certFullchainPEM
))
if
fullchainBlock
==
nil
{
if
fail
==
true
{
panic
(
"failed to parse certificate PEM"
)
}
else
{
return
false
}
}
fullchainCert
,
fullchainErr
:=
x509
.
ParseCertificate
(
fullchainBlock
.
Bytes
)
if
fullchainErr
!=
nil
{
if
fail
==
true
{
panic
(
"failed to parse certificate: "
+
fullchainErr
.
Error
())
}
else
{
return
false
}
}
opts
:=
x509
.
VerifyOptions
{
Roots
:
roots
,
DNSName
:
dnsname
,
CurrentTime
:
daysNumber
,
Intermediates
:
x509
.
NewCertPool
(),
}
if
_
,
err
:=
cert
.
Verify
(
opts
);
err
!=
nil
{
if
fail
==
true
{
panic
(
"failed to verify certificate: "
+
err
.
Error
())
}
else
{
return
false
}
}
if
_
,
fullchainErr
:=
fullchainCert
.
Verify
(
opts
);
fullchainErr
!=
nil
{
if
fail
==
true
{
panic
(
"failed to verify certificate: "
+
fullchainErr
.
Error
())
}
else
{
return
false
}
}
return
true
}
// get redis key
// get redis key
func
GetRedisKey
(
redisurl
string
,
redistoken
string
)
string
{
func
GetRedisKey
(
redisurl
string
,
redistoken
string
)
string
{
client
:=
&
http
.
Client
{}
client
:=
&
http
.
Client
{}
...
@@ -135,6 +241,7 @@ Options:
...
@@ -135,6 +241,7 @@ Options:
TeamName
:=
arguments
[
"--team-name"
]
.
(
string
)
TeamName
:=
arguments
[
"--team-name"
]
.
(
string
)
RedisToken
:=
arguments
[
"--redis-token"
]
.
(
string
)
RedisToken
:=
arguments
[
"--redis-token"
]
.
(
string
)
Type
=
arguments
[
"--type"
]
.
(
string
)
Type
=
arguments
[
"--type"
]
.
(
string
)
Days
:=
arguments
[
"--days"
]
.
(
int
)
RedisBaseURL
=
"https://redis.geant.org/GET"
RedisBaseURL
=
"https://redis.geant.org/GET"
VaultBaseURL
=
"https://vault.geant.org/v1"
VaultBaseURL
=
"https://vault.geant.org/v1"
VaultURL
:=
fmt
.
Sprintf
(
"%v/%v/%v/vault_%v_key"
,
VaultBaseURL
,
TeamName
,
CertName
,
CertNameUndercored
)
VaultURL
:=
fmt
.
Sprintf
(
"%v/%v/%v/vault_%v_key"
,
VaultBaseURL
,
TeamName
,
CertName
,
CertNameUndercored
)
...
@@ -142,9 +249,10 @@ Options:
...
@@ -142,9 +249,10 @@ Options:
RedisCAURL
:=
fmt
.
Sprintf
(
"%v/%v:%v:redis_%v_chain_pem.txt"
,
RedisBaseURL
,
TeamName
,
CertName
,
CertNameUndercored
)
RedisCAURL
:=
fmt
.
Sprintf
(
"%v/%v:%v:redis_%v_chain_pem.txt"
,
RedisBaseURL
,
TeamName
,
CertName
,
CertNameUndercored
)
RedisFullChainURL
:=
fmt
.
Sprintf
(
"%v/%v:%v:redis_%v_fullchain_pem.txt"
,
RedisBaseURL
,
TeamName
,
CertName
,
CertNameUndercored
)
RedisFullChainURL
:=
fmt
.
Sprintf
(
"%v/%v:%v:redis_%v_fullchain_pem.txt"
,
RedisBaseURL
,
TeamName
,
CertName
,
CertNameUndercored
)
certificate
:=
GetRedisKey
(
RedisCertURL
,
RedisToken
)
tmpCertificateDestination
:=
"/tmp/amce_cert.pem"
ca
:=
GetRedisKey
(
RedisCAURL
,
RedisToken
)
tmpFullchainDestination
:=
"/tmp/amce_fullchain.pem"
fullChain
:=
GetRedisKey
(
RedisFullChainURL
,
RedisToken
)
tmpCaDestination
:=
"/tmp/amce_ca.pem"
tmpKeyDestination
:=
"/tmp/amce_key.pem"
if
arguments
[
"--cert-destination"
]
==
fmt
.
Sprintf
(
"%v/<cert-name>.crt"
,
CertBase
)
{
if
arguments
[
"--cert-destination"
]
==
fmt
.
Sprintf
(
"%v/<cert-name>.crt"
,
CertBase
)
{
certificateDestination
=
fmt
.
Sprintf
(
"%v/%v.crt"
,
CertBase
,
CertName
)
certificateDestination
=
fmt
.
Sprintf
(
"%v/%v.crt"
,
CertBase
,
CertName
)
...
@@ -156,16 +264,27 @@ Options:
...
@@ -156,16 +264,27 @@ Options:
}
else
{
}
else
{
fullchainDestination
=
arguments
[
"--fullchain-destination"
]
.
(
string
)
fullchainDestination
=
arguments
[
"--fullchain-destination"
]
.
(
string
)
}
}
if
arguments
[
"--ca-destination"
]
==
fmt
.
Sprintf
(
"%v/COMODO_<type>.crt"
,
CertBase
)
{
caDestination
=
fmt
.
Sprintf
(
"%v/COMODO_%v.crt"
,
CertBase
,
Type
)
}
else
{
caDestination
=
arguments
[
"--ca-destination"
]
.
(
string
)
}
if
arguments
[
"--key-destination"
]
==
fmt
.
Sprintf
(
"%v/<cert-name>.key"
,
KeyBase
)
{
if
arguments
[
"--key-destination"
]
==
fmt
.
Sprintf
(
"%v/<cert-name>.key"
,
KeyBase
)
{
keyDestination
=
fmt
.
Sprintf
(
"%v/%v.key"
,
KeyBase
,
CertName
)
keyDestination
=
fmt
.
Sprintf
(
"%v/%v.key"
,
KeyBase
,
CertName
)
}
else
{
}
else
{
keyDestination
=
arguments
[
"--key-destination"
]
.
(
string
)
keyDestination
=
arguments
[
"--key-destination"
]
.
(
string
)
}
}
if
arguments
[
"--ca-destination"
]
==
fmt
.
Sprintf
(
"%v/COMODO_<type>.crt"
,
CertBase
)
{
caDestination
=
fmt
.
Sprintf
(
"%v/COMODO_%v.crt"
,
CertBase
,
Type
)
// checkCerificates(dnsname string, certificate string, fullchain string, ca string, key string, fail bool)
}
else
{
// check if there is a certificate installed and it is valid
caDestination
=
arguments
[
"--ca-destination"
]
.
(
string
)
existingCert
:=
checkCerificates
(
CertName
,
certificateDestination
,
fullchainDestination
,
caDestination
,
keyDestination
,
Days
,
false
)
if
existingCert
==
true
{
fmt
.
Printf
(
"the certificates are still valid"
)
os
.
Exit
(
0
)
}
}
certificate
:=
GetRedisKey
(
RedisCertURL
,
RedisToken
)
ca
:=
GetRedisKey
(
RedisCAURL
,
RedisToken
)
fullChain
:=
GetRedisKey
(
RedisFullChainURL
,
RedisToken
)
// get Vault key
// get Vault key
vaultClient
:=
&
http
.
Client
{}
vaultClient
:=
&
http
.
Client
{}
...
@@ -179,6 +298,16 @@ Options:
...
@@ -179,6 +298,16 @@ Options:
}
}
privKey
:=
gjson
.
Get
(
string
(
vaultBody
),
"data.value"
)
.
String
()
privKey
:=
gjson
.
Get
(
string
(
vaultBody
),
"data.value"
)
.
String
()
WriteToFile
(
certificate
,
tmpCertificateDestination
,
GroupName
,
0644
,
0755
)
WriteToFile
(
fullChain
,
tmpFullchainDestination
,
GroupName
,
0644
,
0755
)
WriteToFile
(
ca
,
tmpCaDestination
,
GroupName
,
0644
,
0755
)
WriteToFile
(
privKey
,
tmpKeyDestination
,
GroupName
,
0640
,
0750
)
newCert
:=
checkCerificates
(
CertName
,
tmpCertificateDestination
,
tmpFullchainDestination
,
tmpCaDestination
,
tmpKeyDestination
,
Days
,
false
)
if
newCert
==
false
{
log
.
Fatalf
(
"the certificates are malformed. Skippping installation"
)
os
.
Exit
(
0
)
}
WriteToFile
(
certificate
,
certificateDestination
,
GroupName
,
0644
,
0755
)
WriteToFile
(
certificate
,
certificateDestination
,
GroupName
,
0644
,
0755
)
WriteToFile
(
fullChain
,
fullchainDestination
,
GroupName
,
0644
,
0755
)
WriteToFile
(
fullChain
,
fullchainDestination
,
GroupName
,
0644
,
0755
)
WriteToFile
(
ca
,
caDestination
,
GroupName
,
0644
,
0755
)
WriteToFile
(
ca
,
caDestination
,
GroupName
,
0644
,
0755
)
...
@@ -189,4 +318,6 @@ Options:
...
@@ -189,4 +318,6 @@ Options:
fmt
.
Printf
(
"installed: %v
\n
"
,
fullchainDestination
)
fmt
.
Printf
(
"installed: %v
\n
"
,
fullchainDestination
)
fmt
.
Printf
(
"installed: %v
\n
"
,
keyDestination
)
fmt
.
Printf
(
"installed: %v
\n
"
,
keyDestination
)
// check certificate
}
}
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment