Você não pode selecionar mais de 25 tópicos Os tópicos devem começar com uma letra ou um número, podem incluir traços ('-') e podem ter até 35 caracteres.
aeris 84a72139a6 Restore non HTTPS TLS test 5 meses atrás
app Restore non HTTPS TLS test 5 meses atrás
bin Clean config & sentry 5 meses atrás
config Enable Sidekiq UI on development 5 meses atrás
db Restore non HTTPS TLS test 5 meses atrás
lib Move lib class in /app instead of /lib 4 anos atrás
log Initial commit 4 anos atrás
public Initial commit 4 anos atrás
test Generic TLS checker 4 anos atrás
vendor/assets Initial commit 4 anos atrás
.dockerignore Dockerization 2 anos atrás
.gitignore Clean config & sentry 5 meses atrás
.ruby-version Migrate from MongoDB to PostgreSQL 8 meses atrás
Dockerfile Dockerization 2 anos atrás
Gemfile rerun on development 5 meses atrás
Guardfile Readme 2 anos atrás
LICENSE Initial commit 4 anos atrás
README.md Readme 2 anos atrás
Rakefile Initial commit 4 anos atrás
config.ru Clean config & sentry 5 meses atrás
docker-compose.yml Dockerization 2 anos atrás

README.md

Preliminary warning

Cryptcheck relies on compiling a very unsecure version of OpenSSL. When manipulating such library, you need to be sure of what you are doing to never deploy it on a production grade system. Particularly, be sure to never hit make install during a manual build.

Build process can be quiet hard, because relying on number of tricks to be able to use this weakened library not globally install on your system. LD_LIBRARY_PATH, C_INCLUDE_PATH, LIBRARY_PATH and other environment variables are used to inject what is needed during build process and at runtime to override system headers and libraries.

Build process is at this time not garanteed to be reproductible. Because of above tricks, error can happen and you need to understand GNU internals and debug tools like strace to spot the cause of the trouble and to fix it. Given Makefiles are more generic guidelines and build recipes than fully automated build.

How to hack

Setup rbenv

Because of the need of a weakened Ruby build, you need rbenv on your system to isolate this Ruby version from your eventual system version.

See there readme and wiki for setup process. TL;DR;

export RBENV_ROOT="${HOME}/.rbenv"
export PATH="${RBENV_ROOT}/bin:${PATH}"
apt install -y autoconf bison build-essential libssl-dev libyaml-dev libreadline6-dev zlib1g-dev libncurses5-dev libffi-dev libgdbm3 libgdbm-dev

git clone https://github.com/rbenv/rbenv "${RBENV_ROOT}"

mkdir -p "${RBENV_ROOT}/plugins"
git clone https://github.com/rbenv/ruby-build "${RBENV_ROOT}/plugins/ruby-build"

eval "$(rbenv init -)"

Build the engine

Goal is to build the weakened OpenSSL library, then a custom Ruby version based on it.

git clone https://git.imirhil.fr/aeris/cryptcheck
cd cryptcheck
make
make install-rbenv-cryptcheck

Setup the front-end

git clone https://git.imirhil.fr/aeris/cryptcheck-rails
cd cryptcheck-rails
rbenv local 2.3.3-cryptcheck
export LD_LIBRARY_PATH=../cryptcheck/lib
bundle install

Mongo & Redis

You need a MongoDB and a Redis server.

apt install -y mongodb-server redis-server

Launch CryptCheck

Launch the front-end

export LD_LIBRARY_PATH=../cryptcheck/lib
bin/guard -i

Launch the worker

export LD_LIBRARY_PATH=../cryptcheck/lib
bin/sidekiq