tunasync ======== [![Build Status](https://travis-ci.org/tuna/tunasync.svg?branch=dev)](https://travis-ci.org/tuna/tunasync) [![Coverage Status](https://coveralls.io/repos/github/tuna/tunasync/badge.svg?branch=dev)](https://coveralls.io/github/tuna/tunasync?branch=dev) ## Design ``` # Architecture - Manager: Centural instance on status and job management - Worker: Runs mirror jobs +------------+ +---+ +---+ | Client API | | | Job Status | | +----------+ +----------+ +------------+ | +----------------->| |--->| mirror +---->| mirror | +------------+ | | | w | | config | | provider | | Worker API | | H | | o | +----------+ +----+-----+ +------------+ | T | Job Control | r | | +------------+ | T +----------------->| k | +------------+ | | Job/Status | | P | Start/Stop/... | e | | mirror job |<----+ | Management | | S | | r | +------^-----+ +------------+ | | Update Status | | +---------+---------+ +------------+ | <------------------+ | | Scheduler | | BoltDB | | | | | +-------------------+ +------------+ +---+ +---+ # Job Run Process PreSyncing Syncing Success +-----------+ +-----------+ +-------------+ +--------------+ | pre-job +--+->| job run +--->| post-exec +-+-->| post-success | +-----------+ ^ +-----------+ +-------------+ | +--------------+ | | | +-----------------+ | Failed +------+ post-fail |<---------+ +-----------------+ ``` ## TODO - [x] split to `tunasync-manager` and `tunasync-worker` instances - [x] use HTTP as communication protocol - [x] implement manager as status server first, and use python worker - [x] implement go worker - Web frontend for `tunasync-manager` - [ ] start/stop/restart job - [ ] enable/disable mirror - [ ] view log - [ ] config file structure - [ ] support multi-file configuration (`/etc/tunasync.d/mirror-enabled/*.conf`) ## Generate Self-Signed Certificate Fisrt, create root CA ``` openssl genrsa -out rootCA.key 2048 openssl req -x509 -new -nodes -key rootCA.key -days 365 -out rootCA.crt ``` Create host key ``` openssl genrsa -out host.key 2048 ``` Now create CSR, before that, write a `req.cnf` ``` [req] distinguished_name = req_distinguished_name req_extensions = v3_req [req_distinguished_name] countryName = Country Name (2 letter code) countryName_default = CN stateOrProvinceName = State or Province Name (full name) stateOrProvinceName_default = BJ localityName = Locality Name (eg, city) localityName_default = Beijing organizationalUnitName = Organizational Unit Name (eg, section) organizationalUnitName_default = TUNA commonName = Common Name (server FQDN or domain name) commonName_default = commonName_max = 64 [v3_req] # Extensions to add to a certificate request basicConstraints = CA:FALSE keyUsage = nonRepudiation, digitalSignature, keyEncipherment subjectAltName = @alt_names [alt_names] DNS.1 = DNS.2 = ``` Substitute `` with your server's FQDN, then run ``` openssl req -new -key host.key -out host.csr -config req.cnf ``` Finally generate and sign host cert with root CA ``` openssl x509 -req -in host.csr -CA rootCA.crt -CAkey rootCA.key -CAcreateserial -out host.crt -days 365 -extensions v3_req -extfile req.cnf ```