Compare commits

..

16 Commits

Author SHA1 Message Date
77b10df67b add TODO
All checks were successful
continuous-integration/drone/push Build is passing
2022-12-09 23:11:44 +01:00
3519389a80 latest
All checks were successful
continuous-integration/drone/push Build is passing
2022-12-09 19:26:55 +01:00
cbe9fca1c6 use drone env to set GITREV_BUILD
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/pr Build is passing
2022-12-09 00:56:52 +01:00
4087fe005b latest with caching
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2022-12-09 00:43:11 +01:00
587f9420ea add webhook notification for builds
Some checks failed
continuous-integration/drone/pr Build is failing
continuous-integration/drone/push Build is failing
2022-12-08 22:27:24 +04:00
17ad86642a latest
Some checks failed
continuous-integration/drone/push Build is failing
continuous-integration/drone/pr Build is failing
2022-12-08 22:25:30 +04:00
d3a92e398b add deps in repo 2022-12-08 22:25:06 +04:00
6f74522513 still working 2022-12-06 21:09:06 +04:00
86d724ee35 getting warmer 2022-12-06 20:42:26 +04:00
b0c16462c4 latest. linted and building, not working yet 2022-12-06 18:29:19 +04:00
aa3c159521 latest - uses custom build image now 2022-12-06 17:43:07 +04:00
a2bf7ee607 latest - does not work
Some checks failed
continuous-integration/drone/push Build is failing
continuous-integration/drone/pr Build is failing
2022-12-06 06:29:01 +04:00
ec3e7c23eb latest
Some checks failed
continuous-integration/drone/pr Build is failing
continuous-integration/drone/push Build is failing
2022-12-06 02:59:08 +04:00
a9f23c79d2 latest
Some checks failed
continuous-integration/drone/push Build is failing
continuous-integration/drone/pr Build is failing
2022-12-05 14:40:57 +04:00
bd4b135e17 test me pls
Some checks failed
continuous-integration/drone/push Build is failing
continuous-integration/drone/pr Build is failing
2022-12-04 22:55:22 +04:00
bc5b2b039a latest 2022-12-04 13:19:21 +04:00
14 changed files with 142 additions and 49 deletions

3
TODO.md Normal file
View File

@ -0,0 +1,3 @@
# TODO
* add github.com/schollz/progressbar

View File

@ -3,7 +3,7 @@ package main
import ( import (
"os" "os"
"sneak.berlin/go/mfer/internal/cli" "git.eeqj.de/sneak/mfer/internal/cli"
) )
var ( var (

2
go.mod
View File

@ -1,4 +1,4 @@
module sneak.berlin/go/mfer module git.eeqj.de/sneak/mfer
go 1.17 go 1.17

View File

@ -2,14 +2,10 @@ package bork
import ( import (
"errors" "errors"
"fmt"
) )
var ( var (
ErrMissingMagic = errors.New("missing magic bytes in file") ErrMissingMagic = errors.New("missing magic bytes in file")
ErrFileTruncated = errors.New("file/stream is truncated abnormally") ErrFileTruncated = errors.New("file/stream is truncated abnormally")
ErrFileIntegrity = errors.New("file/stream checksum failure")
) )
func Newf(format string, args ...interface{}) error {
return fmt.Errorf(format, args...)
}

View File

@ -4,9 +4,9 @@ import (
"bytes" "bytes"
"path/filepath" "path/filepath"
"git.eeqj.de/sneak/mfer/internal/log"
"git.eeqj.de/sneak/mfer/mfer"
"github.com/urfave/cli/v2" "github.com/urfave/cli/v2"
"sneak.berlin/go/mfer/internal/log"
"sneak.berlin/go/mfer/mfer"
) )
func (mfa *CLIApp) generateManifestOperation(ctx *cli.Context) error { func (mfa *CLIApp) generateManifestOperation(ctx *cli.Context) error {

View File

@ -5,8 +5,8 @@ import (
"os" "os"
"time" "time"
"git.eeqj.de/sneak/mfer/internal/log"
"github.com/urfave/cli/v2" "github.com/urfave/cli/v2"
"sneak.berlin/go/mfer/internal/log"
) )
type CLIApp struct { type CLIApp struct {

View File

@ -23,11 +23,20 @@ func DisableStyling() {
pterm.Fatal.Prefix.Text = "" pterm.Fatal.Prefix.Text = ""
} }
var TestingTraces bool = false
func Init() { func Init() {
log.SetHandler(acli.Default) log.SetHandler(acli.Default)
log.SetLevel(log.InfoLevel) log.SetLevel(log.InfoLevel)
} }
func Tracef(format string, args ...interface{}) {
if !TestingTraces {
return
}
DebugReal(fmt.Sprintf(format, args...), 2)
}
func Debugf(format string, args ...interface{}) { func Debugf(format string, args ...interface{}) {
DebugReal(fmt.Sprintf(format, args...), 2) DebugReal(fmt.Sprintf(format, args...), 2)
} }
@ -45,10 +54,22 @@ func DebugReal(arg string, cs int) {
log.Debug(tag + arg) log.Debug(tag + arg)
} }
func TraceDump(args ...interface{}) {
if !TestingTraces {
return
}
DebugReal(spew.Sdump(args...), 2)
}
func Dump(args ...interface{}) { func Dump(args ...interface{}) {
DebugReal(spew.Sdump(args...), 2) DebugReal(spew.Sdump(args...), 2)
} }
func EnableTestingLogging() {
TestingTraces = true
EnableDebugLogging()
}
func EnableDebugLogging() { func EnableDebugLogging() {
SetLevel(log.DebugLevel) SetLevel(log.DebugLevel)
} }

View File

@ -3,20 +3,44 @@ package mfer
import ( import (
"bytes" "bytes"
"compress/gzip" "compress/gzip"
"crypto/sha256"
"errors" "errors"
"io" "io"
"git.eeqj.de/sneak/mfer/internal/bork"
"git.eeqj.de/sneak/mfer/internal/log"
"google.golang.org/protobuf/proto" "google.golang.org/protobuf/proto"
"sneak.berlin/go/mfer/internal/bork"
"sneak.berlin/go/mfer/internal/log"
) )
func (m *manifest) validateProtoInner() error {
i := m.pbInner
if i.Version != MFFile_VERSION_ONE {
return errors.New("unknown version") // FIXME move to bork
}
if len(i.Files) == 0 {
return errors.New("manifest without files") // FIXME move to bork
}
for _, mfp := range m.pbInner.Files {
// there is no way we should be doing validateProtoInner()
// outside of a load into a blank/empty/new *manifest
if m.files != nil {
return errors.New("shouldn't happen, internal error")
}
m.files = make([]*manifestFile, 0)
// we can skip error handling here thanks to the magic of protobuf
m.addFileLoadTime(mfp)
}
return nil
}
func (m *manifest) validateProtoOuter() error { func (m *manifest) validateProtoOuter() error {
if m.pbOuter.Version != MFFileOuter_VERSION_ONE { if m.pbOuter.Version != MFFileOuter_VERSION_ONE {
return errors.New("unknown version") return errors.New("unknown version") // FIXME move to bork
} }
if m.pbOuter.CompressionType != MFFileOuter_COMPRESSION_GZIP { if m.pbOuter.CompressionType != MFFileOuter_COMPRESSION_GZIP {
return errors.New("unknown compression type") return errors.New("unknown compression type") // FIXME move to bork
} }
bb := bytes.NewBuffer(m.pbOuter.InnerMessage) bb := bytes.NewBuffer(m.pbOuter.InnerMessage)
@ -35,12 +59,26 @@ func (m *manifest) validateProtoOuter() error {
isize := len(dat) isize := len(dat)
if int64(isize) != m.pbOuter.Size { if int64(isize) != m.pbOuter.Size {
log.Debugf("truncated data, got %d expected %d", isize, m.pbOuter.Size) log.Tracef("truncated data, got %d expected %d", isize, m.pbOuter.Size)
return bork.ErrFileTruncated return bork.ErrFileTruncated
} }
log.Debugf("inner data size is %d", isize) log.Tracef("inner data size is %d", isize)
log.Dump(dat) log.TraceDump(dat)
log.Dump(m.pbOuter.Sha256)
// FIXME validate Sha256
log.TraceDump(m.pbOuter.Sha256)
h := sha256.New()
h.Write(dat)
shaGot := h.Sum(nil)
log.TraceDump("got: ", shaGot)
log.TraceDump("expected: ", m.pbOuter.Sha256)
if !bytes.Equal(shaGot, m.pbOuter.Sha256) {
m.pbOuter.InnerMessage = nil // don't try to mess with it
return bork.ErrFileIntegrity
}
return nil return nil
} }
@ -54,7 +92,7 @@ func validateMagic(dat []byte) bool {
return bytes.Equal(got, expected) return bytes.Equal(got, expected)
} }
func NewFromProto(input io.Reader) (*manifest, error) { func NewFromReader(input io.Reader) (*manifest, error) {
m := New() m := New()
dat, err := io.ReadAll(input) dat, err := io.ReadAll(input)
if err != nil { if err != nil {
@ -69,7 +107,7 @@ func NewFromProto(input io.Reader) (*manifest, error) {
bb := bytes.NewBuffer(dat[ml:]) bb := bytes.NewBuffer(dat[ml:])
dat = bb.Bytes() dat = bb.Bytes()
log.Dump(dat) log.TraceDump(dat)
// deserialize: // deserialize:
m.pbOuter = new(MFFileOuter) m.pbOuter = new(MFFileOuter)
@ -84,6 +122,22 @@ func NewFromProto(input io.Reader) (*manifest, error) {
return nil, ve return nil, ve
} }
// FIXME TODO deserialize inner m.pbInner = new(MFFile)
err = proto.Unmarshal(m.pbOuter.InnerMessage, m.pbInner)
if err != nil {
return nil, err
}
log.TraceDump(m.pbInner)
ve = m.validateProtoInner()
if ve != nil {
return nil, ve
}
m.rescanInternal()
log.TraceDump(m)
return m, nil return m, nil
} }

View File

@ -4,10 +4,14 @@ import (
"bytes" "bytes"
"testing" "testing"
"git.eeqj.de/sneak/mfer/internal/log"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
"sneak.berlin/go/mfer/internal/log"
) )
func init() {
log.EnableTestingLogging()
}
func TestAPIExample(t *testing.T) { func TestAPIExample(t *testing.T) {
// read from filesystem // read from filesystem
m, err := NewFromFS(&ManifestScanOptions{ m, err := NewFromFS(&ManifestScanOptions{
@ -24,7 +28,7 @@ func TestAPIExample(t *testing.T) {
m.WriteTo(&buf) m.WriteTo(&buf)
// show serialized // show serialized
log.Dump(buf.Bytes()) log.TraceDump(buf.Bytes())
// do it again // do it again
var buf2 bytes.Buffer var buf2 bytes.Buffer
@ -34,9 +38,9 @@ func TestAPIExample(t *testing.T) {
assert.True(t, bytes.Equal(buf.Bytes(), buf2.Bytes())) assert.True(t, bytes.Equal(buf.Bytes(), buf2.Bytes()))
// deserialize // deserialize
m2, err := NewFromProto(&buf) m2, err := NewFromReader(&buf)
assert.Nil(t, err) assert.Nil(t, err)
assert.NotNil(t, m2) assert.NotNil(t, m2)
log.Dump(m2) log.TraceDump(m2)
} }

View File

@ -10,13 +10,15 @@ import (
"path/filepath" "path/filepath"
"strings" "strings"
"git.eeqj.de/sneak/mfer/internal/log"
"github.com/spf13/afero" "github.com/spf13/afero"
"sneak.berlin/go/mfer/internal/log"
) )
type manifestFile struct { type manifestFile struct {
path string path string
info fs.FileInfo info fs.FileInfo
size int64
protoFile *MFFilePath
} }
func (m *manifestFile) String() string { func (m *manifestFile) String() string {
@ -83,7 +85,7 @@ func New() *manifest {
} }
func NewFromPaths(options *ManifestScanOptions, inputPaths ...string) (*manifest, error) { func NewFromPaths(options *ManifestScanOptions, inputPaths ...string) (*manifest, error) {
log.Dump(inputPaths) log.TraceDump(inputPaths)
m := New() m := New()
m.scanOptions = options m.scanOptions = options
for _, p := range inputPaths { for _, p := range inputPaths {
@ -109,6 +111,10 @@ func (m *manifest) GetFileCount() int64 {
return int64(len(m.files)) return int64(len(m.files))
} }
func (m *manifest) rescanInternal() {
panic("unimplemented")
}
func (m *manifest) GetTotalFileSize() int64 { func (m *manifest) GetTotalFileSize() int64 {
return m.totalFileSize return m.totalFileSize
} }
@ -130,7 +136,17 @@ func pathIsHidden(p string) bool {
} }
} }
func (m *manifest) addFile(p string, fi fs.FileInfo, sfsIndex int) error { func (m *manifest) addFileLoadTime(in *MFFilePath) {
nf := &manifestFile{
path: in.Path,
size: in.Size,
protoFile: in, // FIXME get rid of this eventually
}
m.files = append(m.files, nf)
m.totalFileSize = m.totalFileSize + in.Size
}
func (m *manifest) addFileScanTime(p string, fi fs.FileInfo, sfsIndex int) error {
if m.scanOptions.IgnoreDotfiles && pathIsHidden(p) { if m.scanOptions.IgnoreDotfiles && pathIsHidden(p) {
return nil return nil
} }
@ -163,7 +179,7 @@ func (m *manifest) Scan() error {
return errors.New("invalid source fs") return errors.New("invalid source fs")
} }
e := afero.Walk(sfs, "/", func(p string, info fs.FileInfo, err error) error { e := afero.Walk(sfs, "/", func(p string, info fs.FileInfo, err error) error {
return m.addFile(p, info, idx) return m.addFileScanTime(p, info, idx)
}) })
if e != nil { if e != nil {
return e return e

View File

@ -1,3 +0,0 @@
package mfer
//go:generate protoc ./mf.proto --go_out=paths=source_relative:.

View File

@ -9,7 +9,7 @@ message Timestamp {
message MFFileOuter { message MFFileOuter {
enum Version { enum Version {
VERSION_NONE = 0; VERSION_NONE = 0; // must have a zero enum by law
VERSION_ONE = 1; // only one for now VERSION_ONE = 1; // only one for now
} }
@ -17,7 +17,7 @@ message MFFileOuter {
Version version = 101; Version version = 101;
enum CompressionType { enum CompressionType {
COMPRESSION_NONE = 0; COMPRESSION_NONE = 0; // must have a zero enum by law
COMPRESSION_GZIP = 1; COMPRESSION_GZIP = 1;
} }
@ -33,12 +33,10 @@ message MFFileOuter {
// think we might use gosignify instead of gpg: // think we might use gosignify instead of gpg:
// github.com/frankbraun/gosignify // github.com/frankbraun/gosignify
//detached signature, ascii or binary //detached signatures, ascii or binary
optional bytes signature = 201; repeated bytes signatures = 201;
//full GPG key id //full GPG signing public keys, ascii or binary
optional bytes signer = 202; repeated bytes signingPubKeys = 203;
//full GPG signing public key, ascii or binary
optional bytes signingPubKey = 203;
} }
message MFFilePath { message MFFilePath {
@ -58,13 +56,13 @@ message MFFilePath {
message MFFileChecksum { message MFFileChecksum {
// 1.0 golang implementation must write a multihash here // 1.0 golang implementation must write a multihash here
// it's ok to only ever use/verify sha256 multihash // it's ok to only ever use/verify sha256 multihash i think?
bytes multiHash = 1; bytes multiHash = 1;
} }
message MFFile { message MFFile {
enum Version { enum Version {
VERSION_NONE = 0; VERSION_NONE = 0; // must have a zero enum by law
VERSION_ONE = 1; // only one for now VERSION_ONE = 1; // only one for now
} }
Version version = 100; Version version = 100;

View File

@ -5,9 +5,9 @@ import (
"fmt" "fmt"
"testing" "testing"
"git.eeqj.de/sneak/mfer/internal/log"
"github.com/spf13/afero" "github.com/spf13/afero"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
"sneak.berlin/go/mfer/internal/log"
) )
// Add those variables as well // Add those variables as well
@ -21,7 +21,7 @@ var (
) )
func init() { func init() {
log.EnableDebugLogging() log.EnableTestingLogging()
// create test files and directories // create test files and directories
af.MkdirAll("/a/b/c", 0o755) af.MkdirAll("/a/b/c", 0o755)
@ -70,5 +70,5 @@ func TestManifestGenerationTwo(t *testing.T) {
var buf bytes.Buffer var buf bytes.Buffer
err = m.WriteTo(&buf) err = m.WriteTo(&buf)
assert.Nil(t, err) assert.Nil(t, err)
log.Dump(buf.Bytes()) log.TraceDump(buf.Bytes())
} }

View File

@ -7,10 +7,11 @@ import (
"errors" "errors"
"time" "time"
"git.eeqj.de/sneak/mfer/internal/log"
"google.golang.org/protobuf/proto" "google.golang.org/protobuf/proto"
) )
// was go-generate protoc --go_out=. --go_opt=paths=source_relative mf.proto //go:generate protoc --go_out=. --go_opt=paths=source_relative mf.proto
// rot13("MANIFEST") // rot13("MANIFEST")
const MAGIC string = "ZNAVSRFG" const MAGIC string = "ZNAVSRFG"
@ -59,6 +60,7 @@ func (m *manifest) generateOuter() error {
h := sha256.New() h := sha256.New()
h.Write(innerData) h.Write(innerData)
sha256 := h.Sum(nil)
idc := new(bytes.Buffer) idc := new(bytes.Buffer)
gzw, err := gzip.NewWriterLevel(idc, gzip.BestCompression) gzw, err := gzip.NewWriterLevel(idc, gzip.BestCompression)
@ -72,10 +74,12 @@ func (m *manifest) generateOuter() error {
gzw.Close() gzw.Close()
log.Tracef("calculated sha256 (uncompressed): %x\n", sha256)
o := &MFFileOuter{ o := &MFFileOuter{
InnerMessage: idc.Bytes(), InnerMessage: idc.Bytes(),
Size: int64(len(innerData)), Size: int64(len(innerData)),
Sha256: h.Sum(nil), Sha256: sha256,
Version: MFFileOuter_VERSION_ONE, Version: MFFileOuter_VERSION_ONE,
CompressionType: MFFileOuter_COMPRESSION_GZIP, CompressionType: MFFileOuter_COMPRESSION_GZIP,
} }