#!/bin/sh
set -e -f ${DRY_RUN:+-n} -u
tool=${0%/*}
-. "$tool"/functions.sh
-. "$tool"/vm.sh
+. "$tool"/lib/functions.sh
+. "$tool"/etc/vm.sh
test ! "$(hostname --fqdn)" = "$vm_fqdn"
test ! "$(hostname --fqdn)" = "$vm_host"
local remote=${1#remote=}; shift
git add . &&
git commit -a -C HEAD "$@" &&
- local pwd=$(cd "$tool" && cd -)
GIT_SSH=./vm_ssh git push -v -f "$remote"
}
whoami
}
rule_disk_key_send () {
- gpg --decrypt key/secret/$vm_fqdn.disk.gpg |
- ssh "$@" root@$vm_fqdn \
+ gpg --decrypt var/lib/luks/$vm_fqdn.key.gpg |
+ "$tool"/vm_ssh root@$vm_fqdn "$@" \
-o CheckHostIP=no \
-o HostKeyAlias=init.$vm_fqdn \
- -o StrictHostKeyChecking=yes \
- -o UserKnownHostsFile="$tool"/key/ssh.known_hosts \
tee /lib/cryptsetup/passfifo \>/dev/null
}
rule_disk_key_backup () {
for part in root swap var home
do
- rule_ssh sudo cryptsetup luksHeaderBackup /dev/$vm_lvm_vg/${vm_lvm_lv}_${part} |
- gpg --encrypt --recipient $USER@ -o key/secret/${vm_lvm_lv}_${part}.luks.gpg
- done
- }
-rule_disk_key_restore () {
- for part in root swap var home
- do
- gpg --decrypt ${vm_lvm_lv}_${part}.luks |
- rule_ssh sudo cryptsetup luksHeaderRestore /dev/$vm_lvm_vg/${vm_lvm_lv}_${part}
+ mkdir -p var/lib/luks
+ rule_ssh -l root ' \
+ tmp=$(mktemp)
+ cryptsetup luksHeaderBackup \
+ /dev/$vm_lvm_vg/${vm_lvm_lv}_${part} \
+ --header-backup-file "$tmp" \
+ cat "$tmp"
+ shred --remove "$tmp"
+ ' |
+ gpg --encrypt --recipient $USER@ \
+ -o var/lib/luks/${vm_lvm_lv}_${part}.luks.gpg
done
}