Skip to content

Golang-based Backend API for File Integrity Surveilance (FIS) Application. Creating this as a component for my Honors Project in CyberSecurity

License

Notifications You must be signed in to change notification settings

justsaumit/go-fis-api

Repository files navigation

Golang Backend API for FIS (File Integrity Surveillance) Application

Docker Image CI for GHCR Go-Releaser

Developing a simple Golang backend API with the Echo framework for FIS(File Integrity Surveillance) application which can be found here.
This API stores IDs and their corresponding hashes in a SQL server and provides functionality to verify if a given hash matches the stored hash for a specific ID. All the communication between the Application and API is secured using TLS encryption(HTTPS).
Thereby providing both confidentiality and integrity service that aligns with the CIA (Confidentiality, Integrity, Availability) triad for data security.

Getting Started

To get started with this project, follow these steps:

Prerequisites

  • Go installed on your machine.
  • A SQL database server (sqlite) to store IDs and hashes.

Installation

1. Clone this repository:

git clone https://github.com/justsaumit/go-fis-api.git
cd go-fis-api

2. Initialize project dependencies:

go mod vendor

3. Configure environment variables (optional):

  • Create a .env file at the root of the project and specify environment variables.
  • For example (refer to env.example):
ENVIRONMENT=<development or production>
PORT=3000

# SSL/TLS Configuration (if running in container, make it /certs/<cert/key>.pem and mount the certificate directory as a volume to /certs)
CERTPATH=<path to>/fullchain.pem
KEYPATH=<path to>/privkey.pem

4. Run the server:

Option A: Run with Go (Development Mode):

go run server.go

Option B: Build and Run:

go build -o main .
./main

Option C: Using Docker:

a. Build the image (if using Dockerfile):

docker build -t myapp .

b. Pull the prebuilt image (alternative):

docker pull ghcr.io/justsaumit/go-fis-api:latest

c. Run the container:

  • Development:
docker run -p 3000:3000 myapp
  • Production (with certificates and persistent storage):
docker run -p 3000:3000 --env-file .env -v docker-dbvolume:/app -v /path/to/certifcates:/certs myapp

Usage

Once the server is running, you can access the API endpoints to upload a file for hashing and verify them.

  • Adding a File Hash:

    • To add a file hash to the DB, make a POST request to /upload by uploading the file using multipart form. The server will generate an ID and hash for the uploaded file, which will be returned as a JSON response.
  • Verifying a File Hash:

    • To verify a file hash, make a POST request to /verify with the previously generated ID and the file using multipart form. The server will respond with a JSON message indicating whether the hash of the uploaded file (calculatedHash) matches with the hash in the database (storedHash) corresponding to the given ID. It also indicates whether an ID is present in the database or not.

To-Do-List

  • Handle Uploaded files (API)
  • Perform short ID Generation (API)
  • Perform Hashing (API)
  • Connect with DB
  • Store JSON data to DB
  • Perform verification
  • Containerize the API
  • Optimize Docker Image size (Previously 509MB, Optimized: 22.2MB 20.8MB)
  • Replace the go-sqlite3 driver; with a CGO-free port, written in pure Go - modernc-sqlite (to avoid CGO cross-compilation errors)
  • Create a Github workflow for binary releases and docker image packages

License

This project is licensed under the MIT License - see the LICENSE file for details.

About

Golang-based Backend API for File Integrity Surveilance (FIS) Application. Creating this as a component for my Honors Project in CyberSecurity

Topics

Resources

License

Stars

Watchers

Forks