X-Git-Url: http://git.cyclocoop.org/%22%20.%20generer_url_ecrire%28%22auteur_infos%22%2C%22id_auteur=%24connect_id_auteur%22%29%20.%20%22?a=blobdiff_plain;f=vm_host;h=de458ef89f228f258a31d8fa87d4338cbaa954e1;hb=5b3f6649997abf4786ec2b1292abf712d4358567;hp=b99086b85fffb2b2fbf798b42b0be95efee55a01;hpb=6dd8add65ae14c272df64a12f00a142314c0b2b1;p=lhc%2Fateliers.git diff --git a/vm_host b/vm_host index b99086b..de458ef 100755 --- a/vm_host +++ b/vm_host @@ -1,8 +1,9 @@ #!/bin/sh set -e -f ${DRY_RUN:+-n} -u tool=${0%/*} -. "$tool"/lib/functions.sh +. "$tool"/lib/rule.sh . "$tool"/etc/vm.sh +. "$tool"/lib/mk.sh rule_help () { # SYNTAX: [--hidden] local hidden; [ ${1:+set} ] || hidden=set @@ -44,7 +45,7 @@ rule_git_reset () { ) } -rule_vm_init () { +rule_vm_configure () { mk_reg mod=644 own=root:root /etc/xen/$vm_fqdn.cfg <<-EOF # -*- mode: python; -*- # DOC: http://wiki.xen.org/wiki/Xen_Linux_PV_on_HVM_drivers @@ -91,9 +92,8 @@ rule_vm_start () { rule vm_attach } rule_vm_attach () { - cat <<-EOF - NOTE: Ctrl-] pour se détacher de la console - EOF + assert '! pgrep -f "sudo xm console $vm_fqdn"' + info 'Ctrl-] pour se détacher de la console' sudo xm console $vm_fqdn } rule_vm_stop () { @@ -214,33 +214,33 @@ rule_part_lvm_umount () { } rule_part_randomize () { # SYNTAX: $part # NOTE: à anticiper - local part=$1 + local part="$1" eval "sudo dd if=/dev/urandom of=\$vm_dev_disk_$part" } rule_part_randomize_stat () { # SYNTAX: $part # DESCRIPTION: fait afficher la progression de rule_part_randomize - local part=$1 + local part="$1" eval "pkill -USR1 -f \"^dd if=/dev/urandom of=\$vm_dev_disk_$part\"" } rule__part_encrypted_format () { # SYNTAX: $part # DESCRIPTION: formatage d'une partition distincte de / # NOTE: la clef de chiffrement est dérivée de celle de /, # / doit être déchiffrée pour que cela fonctionne. - local part=$1 - eval "local dev=\$vm_dev_disk_$part" + local part="$1" + eval "local dev=\"\$vm_dev_disk_$part\"" test ! -e /dev/mapper/${vm_lvm_lv}_root_deciphered || sudo /bin/sh -c "/lib/cryptsetup/scripts/decrypt_derived ${vm_lvm_lv}_root_deciphered | cryptsetup luksFormat --hash=sha512 --key-size=512 \ --cipher=aes-xts-essiv:sha256 --key-file=- --align-payload=8 $dev" } rule__part_encrypted_mount () { # SYNTAX: $part - local part=$1 - eval "local dev=\$vm_dev_disk_$part" + local part="$1" + eval "local dev=\"\$vm_dev_disk_$part\"" test -e /dev/mapper/${vm_lvm_lv}_${part}_deciphered || sudo /bin/sh -c "/lib/cryptsetup/scripts/decrypt_derived ${vm_lvm_lv}_root_deciphered | cryptsetup luksOpen --key-file=- $dev ${vm_lvm_lv}_${part}_deciphered" } rule__part_encrypted_umount () { # SYNTAX: $part - local part=$1 - eval "local dev=\$vm_dev_disk_$part" + local part="$1" + eval "local dev=\"\$vm_dev_disk_$part\"" test ! -e /dev/mapper/${vm_lvm_lv}_${part}_deciphered || sudo cryptsetup luksClose ${vm_lvm_lv}_${part}_deciphered } @@ -282,9 +282,6 @@ rule_part_root_umount () { ! test -e /dev/mapper/${vm_lvm_lv}_root_deciphered || sudo cryptsetup luksClose ${vm_lvm_lv}_root_deciphered } -rule_part_root_backup_luks () { - sudo cryptsetup luksHeaderBackup $vm_dev_disk_root --header-backup-file ./root.luks - } rule_part_swap_format () { rule _part_encrypted_format swap rule _part_encrypted_mount swap @@ -448,7 +445,6 @@ case $rule in (help);; (*) assert 'test "$(hostname --fqdn)" = "$vm_host"' vm_host - ${TRACE:+set -x} ;; esac rule $rule "$@"