Container operation and maintenance file transmission method based on operation and maintenance auditing system
A file transmission and container technology, applied in transmission systems, electrical components, platform integrity maintenance, etc., can solve problems such as security issues, cumbersome operations, and low efficiency, and achieve the effect of reducing steps, reducing unauthorized operations, and improving efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] A container operation and maintenance file transmission method based on the operation and maintenance audit system, the operation and maintenance audit system receives the SCP request initiated by the user to the target container, and then forwards the SCP request to the container proxy asset service, and the container proxy asset service parses the SCP protocol, Analyze the path of uploading and downloading files; the container agent asset service connects to the target asset in SSH mode through the docker client and connects to the dockerd service; when uploading files, upload the files or directories to be uploaded according to the upload path specified by the user Archive it into a tar file in the root directory and copy it to the container; when downloading the file, parse the file downloaded by the SCP command, copy the tar file from the container, and download it to the client through SCP after decompression.
[0032] The invention can realize safe duplication, op...
Embodiment 2
[0035] The present embodiment optimizes on the basis of embodiment 1, comprises the following steps:
[0036] Step S100: the operation and maintenance audit system receives the SCP request initiated by the client to the target container;
[0037] Step S200: The operation and maintenance audit system parses the SCP request, and judges whether the target container is authorized through the authorization information in the operation and maintenance audit system. If not authorized, it returns authentication failure. If authorized, the operation and maintenance design system forwards the SCP request to the container agency asset services;
[0038] Step S300: The container agent asset service parses the SSH remote straight-line command initiated by the SCP protocol, and if it conforms to the command of the SCP protocol, then parses the upload and download file paths through the command parameters;
[0039] Step S400: Connect to the target asset through the SSH protocol, open the do...
Embodiment 3
[0043] This embodiment is optimized on the basis of embodiment 1 or 2, as figure 1 As shown, uploading files to the target container includes the following steps:
[0044] Step S1: The container proxy asset service uses the docker client to connect to the dockerd service in step S400, and the container proxy asset service returns a connection success response, ready to transfer files;
[0045]Step S2: The client transfers the file, and the container proxy asset service parses the file stream, converts the file into a tar file according to the absolute path of the target path parsed in step S300, copies the tar file into the container, and decompresses it.
[0046] Further, in step S2, the container agent asset service receives the file data stream, accepts the file meta information in the order of file authority, size, and file name, replaces the file name with the absolute path parsed in step S300, and writes it together When writing the data stream in the copy container int...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

