database

package
v1.6.16 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Aug 5, 2023 License: MIT Imports: 22 Imported by: 13

Documentation

Overview

Package database handles connections to different types of databases

Index

Constants

This section is empty.

Variables

View Source
var RedisConnTTL int

RedisConnTTL - context deadline in second

Functions

func GetDB

func GetDB() *gorm.DB

GetDB - get a connection

func GetMongo added in v1.4.2

func GetMongo() *qmgo.Client

GetMongo - get a connection

func GetRedis added in v1.2.7

func GetRedis() *radix.Client

GetRedis - get a connection

func InitDB

func InitDB() *gorm.DB

InitDB - function to initialize db

func InitMongo added in v1.4.2

func InitMongo() (*qmgo.Client, error)

InitMongo - function to initialize mongo client

func InitRedis added in v1.2.7

func InitRedis() (*radix.Client, error)

InitRedis - function to initialize redis client

func InitTLSMySQL added in v1.6.8

func InitTLSMySQL() (err error)

InitTLSMySQL registers a custom tls.Config ** # # Tutorial: How to configure MySQL instance and enable TLS support # # 1.0 generate CA's private key and certificate # to omit password: -nodes -keyout openssl req -x509 -sha512 -newkey rsa:4096 -days 10950 -keyout ca-key.pem -out ca.pem # # 2.0 generate web server's private key and certificate signing request (CSR) # to omit password: -nodes -keyout # Common Name (e.g. server FQDN or YOUR name) must be different for CA and web server certificates openssl req -sha512 -newkey rsa:4096 -nodes -keyout server-key.pem -out server-req.pem # # 2.1 config file # IP: server's public or local IPs of the interfaces echo "subjectAltName=DNS:localhost,IP:127.0.0.1,IP:172.17.0.1,IP:x.x.x.x,IP:y.y.y.y" > "server-ext.cnf" # # 2.2 use CA's private key to sign web server's CSR and get back the signed certificate openssl x509 -sha512 -req -in server-req.pem -days 3650 -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out server-cert.pem -extfile server-ext.cnf # # 2.3 verify the certificate openssl verify -CAfile ca.pem server-cert.pem # # 3.0 convert PKCS#8 format key into PKCS#1 format openssl rsa -in server-key.pem -out server-key.pem # # 4.0 replace existing files located at /var/lib/mysql # # 5.0 set ownership and r/w permissions sudo chown -R mysql:mysql ca-key.pem ca.pem server-key.pem server-cert.pem sudo chmod -R 600 ca-key.pem server-key.pem sudo chmod -R 644 ca.pem server-cert.pem # # 6.0 restart mysql service sudo service mysql restart # # 7.0 optional: # 7.1 generate client's private key and certificate signing request (CSR) openssl req -sha512 -newkey rsa:4096 -nodes -keyout client-key.pem -out client-req.pem # # 7.2 config file # IP: server's public or local IPs of the interfaces echo "subjectAltName=DNS:localhost,IP:127.0.0.1,IP:172.17.0.1,IP:x.x.x.x,IP:y.y.y.y" > "client-ext.cnf" # # 7.3 use CA's private key to sign client's CSR and get back the signed certificate openssl x509 -sha512 -req -in client-req.pem -days 3650 -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out client-cert.pem -extfile client-ext.cnf # # 7.4 verify the certificate openssl verify -CAfile ca.pem client-cert.pem # # 7.5 convert PKCS#8 format key into PKCS#1 format openssl rsa -in client-key.pem -out client-key.pem **

Types

This section is empty.

Directories

Path Synopsis
Package migrate to migrate the schema
Package migrate to migrate the schema
Package model contains all the models required for a functional database management system
Package model contains all the models required for a functional database management system

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL