Compare commits

..

13 Commits

Author SHA1 Message Date
680b0f46e5 normalize secrets and print key fingerprint
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 5s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-06 00:36:58 +03:00
6bc46e73c5 use base64-encoded SSH key
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 7s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-06 00:33:26 +03:00
cacbd7620a ci test 9
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 7s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-06 00:30:58 +03:00
581c5bdb62 add ssh debug to deploy
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 5s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-06 00:22:49 +03:00
a80330622e harden ssh key handling in deploy
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 5s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-06 00:21:28 +03:00
3e8f611cd3 ci test 8
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 8s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-06 00:20:05 +03:00
c420534639 run workflow on ubuntu-latest runner image
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 1m21s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-06 00:16:12 +03:00
68b862fe6f ci test 7
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 3m53s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-06 00:12:00 +03:00
55ad4fa4ed ci test 6
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 2s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-06 00:07:12 +03:00
e3590b8a93 ci test 5
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 1s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-06 00:03:51 +03:00
47fad37675 ci test 4
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 1s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-05 23:53:12 +03:00
b1db95bd2e ci test 3
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 1s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-05 23:50:36 +03:00
e46554e5dd ci test 2
Some checks failed
Deploy to my-vpn / deploy (push) Failing after 1s
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-05 23:48:50 +03:00
6 changed files with 32 additions and 92 deletions

View File

@@ -9,42 +9,22 @@ jobs:
deploy:
runs-on: ubuntu-latest
steps:
- name: Checkout
uses: actions/checkout@v4
- name: Unit tests
run: |
python3 -m unittest discover -s tests
- name: Install jq
run: |
apt-get update -y
apt-get install -y jq
- name: Deploy via SSH
env:
VPN_HOST: ${{ secrets.VPN_HOST }}
VPN_USER: ${{ secrets.VPN_USER }}
VPN_SSH_KEY: ${{ secrets.TEST_KEY }}
VPN_SSH_KEY_B64: ${{ secrets.TEST_KEY_B64 }}
run: |
set -euo pipefail
mkdir -p ~/.ssh
chmod 700 ~/.ssh
printf '%s' "$VPN_SSH_KEY" > ~/.ssh/id_ci_runner
printf '%s' "$VPN_SSH_KEY_B64" | base64 -d > ~/.ssh/id_ci_runner
chmod 600 ~/.ssh/id_ci_runner
VPN_USER="$(printf '%s' "$VPN_USER" | tr -d '\r\n')"
VPN_HOST="$(printf '%s' "$VPN_HOST" | tr -d '\r\n')"
echo "using user=${VPN_USER} host=${VPN_HOST}"
ssh-keyscan -H "$VPN_HOST" >> ~/.ssh/known_hosts || true
ssh-keygen -lf ~/.ssh/id_ci_runner
ssh -o BatchMode=yes -o ConnectTimeout=10 -o IdentitiesOnly=yes -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -i ~/.ssh/id_ci_runner "${VPN_USER}@${VPN_HOST}" "echo ok"
ssh -vvv -o IdentitiesOnly=yes -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -i ~/.ssh/id_ci_runner "${VPN_USER}@${VPN_HOST}" "echo ok"
ssh -o BatchMode=yes -o ConnectTimeout=10 -o IdentitiesOnly=yes -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -i ~/.ssh/id_ci_runner "${VPN_USER}@${VPN_HOST}" "cd /srv/ip-ua && git fetch --all && git reset --hard origin/main && bash deploy/my-vpn/deploy.sh"
for i in $(seq 1 10); do
if curl -fsS "http://${VPN_HOST}" -o /tmp/resp.json; then
break
fi
sleep 2
done
jq -e '.ip and .user_agent and .method and .path and .timestamp' /tmp/resp.json >/dev/null
echo "smoke ok"
ssh -o IdentitiesOnly=yes -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -i ~/.ssh/id_ci_runner "${VPN_USER}@${VPN_HOST}" "cd /srv/ip-ua && git fetch --all && git reset --hard origin/main && bash deploy/my-vpn/deploy.sh"

View File

@@ -3,3 +3,19 @@
ok
# ci test
# ci test 2
# ci test 3
# ci test 4
# ci test 5
# ci test 6
# ci test 7
# ci test 8
# ci test 9

36
app.py
View File

@@ -5,32 +5,20 @@ from datetime import datetime, timezone
from http.server import BaseHTTPRequestHandler, HTTPServer
def build_payload(headers, client_ip, method, path, now=None):
if now is None:
now = datetime.now(timezone.utc)
forwarded = headers.get("X-Forwarded-For", "")
ip = forwarded.split(",")[0].strip() if forwarded else client_ip
return {
"ip": ip,
"user_agent": headers.get("User-Agent", ""),
"method": method,
"path": path,
"timestamp": now.isoformat(),
"headers": dict(headers),
}
class Handler(BaseHTTPRequestHandler):
def _write_json(self, status=200):
headers = {k: v for k, v in self.headers.items()}
payload = build_payload(
headers=headers,
client_ip=self.client_address[0],
method=self.command,
path=self.path,
)
client_ip = self.headers.get("X-Forwarded-For", "").split(",")[0].strip()
if not client_ip:
client_ip = self.client_address[0]
payload = {
"ip": client_ip,
"user_agent": self.headers.get("User-Agent", ""),
"method": self.command,
"path": self.path,
"timestamp": datetime.now(timezone.utc).isoformat(),
"headers": {k: v for k, v in self.headers.items()},
}
data = json.dumps(payload, ensure_ascii=False).encode("utf-8")
self.send_response(status)

View File

@@ -1,3 +0,0 @@
for push
for push
for push

View File

@@ -1 +0,0 @@
h

View File

@@ -1,40 +0,0 @@
import unittest
from datetime import datetime, timezone
from app import build_payload
class TestBuildPayload(unittest.TestCase):
def test_uses_forwarded_ip(self):
now = datetime(2026, 2, 6, 0, 0, 0, tzinfo=timezone.utc)
payload = build_payload(
headers={"X-Forwarded-For": "10.0.0.1, 10.0.0.2", "User-Agent": "ua"},
client_ip="192.168.0.10",
method="GET",
path="/",
now=now,
)
self.assertEqual(payload["ip"], "10.0.0.1")
self.assertEqual(payload["user_agent"], "ua")
self.assertEqual(payload["method"], "GET")
self.assertEqual(payload["path"], "/")
self.assertEqual(payload["timestamp"], "2026-02-06T00:00:00+00:00")
def test_falls_back_to_client_ip(self):
now = datetime(2026, 2, 6, 0, 0, 0, tzinfo=timezone.utc)
payload = build_payload(
headers={"User-Agent": "ua"},
client_ip="192.168.0.10",
method="POST",
path="/submit",
now=now,
)
self.assertEqual(payload["ip"], "192.168.0.10")
self.assertEqual(payload["user_agent"], "ua")
self.assertEqual(payload["method"], "POST")
self.assertEqual(payload["path"], "/submit")
self.assertEqual(payload["timestamp"], "2026-02-06T00:00:00+00:00")
if __name__ == "__main__":
unittest.main()