#!/bin/sh
set -e -f ${DRY_RUN:+-n} -u
-tool=${0%/*}
-. "$tool"/functions.sh
-. "$tool"/vm.sh
-test ! "$(hostname --fqdn)" = "$vm_fqdn"
-test ! "$(hostname --fqdn)" = "$vm_host"
+tool=$(cd "${0%/*}"; cd -)
+. "$tool"/lib/rule.sh
+. "$tool"/etc/vm.sh
-rule_help () {
+rule_help () { # SYNTAX: [--hidden]
+ local hidden; [ ${1:+set} ] || hidden=set
cat >&2 <<-EOF
- DESCRIPTION: ce script regroupe des fonctions utilitaires
- pour gérer la VM _depuis_ une machine distante ;
- il sert à la fois d'outil et de documentation.
- Voir \`$tool/vm_host' pour les utilitaires côté machine hôte.
- Voir \`$tool/vm_hosted' pour les utilitaires côté VM hébergée.
+ DESCRIPTION:
+ ce script regroupe des règles pour administrer la VM ($vm_fqdn)
+ _depuis_ une machine distante ;
+ il sert à la fois d'outil (aisément bidouillable)
+ et de documentation (préçise).
+ Voir \`$tool/vm_host' pour les règles côté machine hôte ($vm_host).
+ Voir \`$tool/vm_hosted' pour les règles côté VM hébergée ($vm_fqdn).
SYNTAX: $0 \$RULE \${RULE}_SYNTAX
RULES:
- $(sed -ne 's/^rule_\([^_][^ ]*\) () {\( *#.*\|\)/\t\1\2/p' "$tool"/vm.sh "$0")
+ $(sed -ne "s/^rule_\(${hidden:+[^_]}[^ ]*\) () {\( *#.*\|\)/ \1\2/p" "$tool"/etc/vm.sh "$0")
ENVIRONMENT:
TRACE # affiche les commandes avant leur exécution
- $(sed -ne 's/^readonly \([^ ][^ =]*\).*}\( *#.*\|\)$/\t$\1\2/p' "$tool"/vm.sh "$0")
+ $(sed -ne 's/^readonly \([^ ][^ =]*\).*}\( *#.*\|\)$/\t$\1\2/p' "$tool"/etc/vm.sh "$0")
EOF
}
-rule_git_config () {
+rule_git_configure () { # DESCRIPTION: configure ./.git correctement
(
cd "$tool"
- git config remote.host.url >/dev/null ||
+ git remote rm host || true
git remote add host $vm_host:tool/vm
- git config --replace remote.host HEAD:refs/heads/origin
- git config remote.$vm.url >/dev/null ||
- git remote add vm root@$vm_fqdn:tool/vm
- git config --replace remote.$vm HEAD:refs/heads/origin
+ git config --replace remote.host.push HEAD:refs/remotes/master
+ git remote rm hosted || true
+ git remote add hosted root@$vm_fqdn:tool/vm
+ git config --replace remote.hosted.push HEAD:refs/remotes/master
+ git submodule update --init
)
}
-rule_git_push () { # SYNTAX: $remote $options
+rule_git_push () { # SYNTAX: {host|hosted} $git_push_options
+ (
+ cd "$tool"
local remote=${1#remote=}; shift
- git add . &&
- git commit -a -C HEAD "$@" &&
- local pwd=$(cd "$tool" && cd -)
- GIT_SSH=./vm_ssh git push -v -f "$remote"
+ GIT_SSH=./lib/ssh git push -v "$remote" "$@"
+ info "penser à faire : vm_hosted git_reset"
+ )
}
rule_ssh () {
- "$tool"/vm_ssh $vm_fqdn "$@"
+ "$tool"/lib/ssh $vm_fqdn "$@"
+ }
+rule_mosh () {
+ mosh --ssh="$tool/lib/ssh $*" $vm_fqdn
}
rule__ssh_known_hosts_update () {
- "$tool"/vm_ssh $vm_fqdn "$@" \
+ rule ssh \
-o StrictHostKeyChecking=no \
-o CheckHostIP=no \
-o HashKnownHosts=no \
whoami
}
-rule_disk_key_send () {
- gpg --decrypt key/secret/$vm_fqdn.disk.gpg |
- ssh "$@" root@$vm_fqdn \
+
+rule__x509_service_key_send_deciphered () { # SYNTAX: $service $remote_destination ${ssh_options-}
+ local service="$1"; shift
+ local remote_destination="$1"; shift
+ gpg --decrypt "var/sec/x509/$vm_domainname/$service/key.pass.gpg" |
+ openssl rsa -passin 'stdin' \
+ -in "var/sec/x509/$vm_domainname/$service/key.pem" \
+ -out '/dev/stdout' |
+ rule ssh "$@" ' \
+ install -m 400 -o root -g root \
+ /dev/stdin \
+ '"$remote_destination"' \
+ '
+ }
+
+rule_luks_key_send () { # DESCRIPTION: envoie la clef de déchiffrement des partitions au démarrage de la VM.
+ gpg --decrypt var/sec/luks/$vm_fqdn.key.gpg |
+ "$tool"/lib/ssh root@$vm_fqdn "$@" \
-o CheckHostIP=no \
-o HostKeyAlias=init.$vm_fqdn \
- -o StrictHostKeyChecking=yes \
- -o UserKnownHostsFile="$tool"/key/ssh.known_hosts \
tee /lib/cryptsetup/passfifo \>/dev/null
}
-rule_disk_key_backup () {
- for part in root swap var home
+rule_luks_key_backup () { # SYNTAX: ${gpg_options:---recipient $USER@} DESCRIPTION: sauvegarde localement les entêtes des partitions chiffrées.
+ test "${*+set}" || set -- --recipient "$USER@"
+ for part in root var home
do
- rule_ssh sudo cryptsetup luksHeaderBackup /dev/$vm_lvm_vg/${vm_lvm_lv}_${part} |
- gpg --encrypt --recipient $USER@ -o key/secret/${vm_lvm_lv}_${part}.luks.gpg
+ mkdir -p var/sec/luks
+ rule ssh -l root ' \
+ set -e -f -u;
+ exec 2>/dev/null;
+ tmp=$(mktemp -t "luks.'"$part"'.XXXXXXXX.tmp" --dry-run);
+ cryptsetup luksHeaderBackup >/dev/null \
+ /dev/'"$vm_lvm_vg"'/'"$vm_lvm_lv"'_'"$part"' \
+ --header-backup-file "$tmp"; \
+ cat "$tmp";
+ shred >/dev/null --remove "$tmp"; \
+ ' |
+ gpg "$@" --encrypt \
+ -o var/sec/luks/${vm_lvm_lv}_${part}.luks.gpg
done
}
-rule_disk_key_restore () {
- for part in root swap var home
- do
- gpg --decrypt ${vm_lvm_lv}_${part}.luks |
- rule_ssh sudo cryptsetup luksHeaderRestore /dev/$vm_lvm_vg/${vm_lvm_lv}_${part}
+
+rule_apache2_key_send () {
+ local -; set +f
+ for conf in "$tool"/etc/apache2/site.d/*/VirtualHost.conf
+ do conf=${conf#"$tool"/etc/apache2/site.d/}
+ local user port service site
+ IFS=. read -r user port service site <<-EOF
+ ${conf%\/VirtualHost\.conf}
+ EOF
+ assert 'test "${user:+set}"'
+ assert 'test "${service:+set}"'
+ assert 'test "${site:+set}"'
+ assert 'test "${port:+set}"'
+ local site_dir="$user.$port.$service.$site"
+ case $port in
+ (443)
+ rule ssh -l root ' \
+ sudo install -d -m 770 -o '"$user"' -g '"$user"' \
+ /etc/apache2 \
+ /etc/apache2/site.d/'"$site_dir"' \
+ /etc/apache2/site.d/'"$site_dir"'/x509; \
+ sudo install -m 644 -o '"$user"' -g '"$user"' /dev/stdin \
+ /etc/apache2/site.d/'"$site_dir"'/x509/.gitignore <<-EOF
+ key.pem
+ EOF
+ '
+ rule _x509_service_key_send_deciphered $service \
+ ~"$user"/etc/apache2/"$site_dir"/x509/key.pem -l root "$@"
+ ;;
+ esac
+ done
+ }
+rule_dovecot_key_send () {
+ rule ssh -l root ' \
+ sudo install -d -m 770 -o root -g root \
+ /etc/dovecot/'"$vm_domainname"'/ \
+ /etc/dovecot/'"$vm_domainname"'/imap \
+ /etc/dovecot/'"$vm_domainname"'/imap/x509 ; \
+ sudo install -m 644 -o root -g root /dev/stdin \
+ /etc/dovecot/'"$vm_domainname"'/imap/x509/.gitignore <<-EOF
+ key.pem
+ EOF
+ '
+ rule _x509_service_key_send_deciphered imap \
+ /etc/dovecot/$vm_domainname/$service/x509/key.pem -l root "$@"
+ }
+rule_gitolite_configure () {
+ (
+ cd "$tool"/etc/gitolite
+ GIT_SSH=../../lib/ssh \
+ ssh-agent sh -c ' \
+ SSH_ASKPASS='"$tool"'/lib/ssh-pass \
+ SSH_ID=git \
+ ssh-add '"$tool"'/var/sec/ssh/git </dev/null && \
+ git push -v origin '"$*"
+ )
+ }
+rule_nginx_key_send () {
+ local -; set +f
+ for conf in "$tool"/etc/nginx/site.d/*/server.conf
+ do conf=${conf#"$tool"/etc/nginx/site.d/}
+ local user port service site
+ IFS=. read -r user port service site <<-EOF
+ ${conf%\/server\.conf}
+ EOF
+ assert 'test "${user:+set}"'
+ assert 'test "${service:+set}"'
+ assert 'test "${site:+set}"'
+ assert 'test "${port:+set}"'
+ local site_dir="$user.$port.$service.$site"
+ case $port in
+ (443)
+ rule ssh -l root ' \
+ sudo install -d -m 770 -o root -g root \
+ /etc/nginx \
+ /etc/nginx/site.d \
+ /etc/nginx/site.d/'"$site_dir"' \
+ /etc/nginx/site.d/'"$site_dir"'/x509; \
+ sudo install -m 644 -o root -g root /dev/stdin \
+ /etc/nginx/site.d/'"$site_dir"'/x509/.gitignore <<-EOF
+ key.pem
+ EOF
+ '
+ rule _x509_service_key_send_deciphered $service \
+ /etc/nginx/"$site_dir"/x509/key.pem -l root "$@"
+ ;;
+ esac
done
}
+rule_postfix_key_send () {
+ rule ssh -l root ' \
+ sudo install -d -m 770 -o root -g root \
+ /etc/postfix/'"$vm_domainname"'/ \
+ /etc/postfix/'"$vm_domainname"'/smptd \
+ /etc/postfix/'"$vm_domainname"'/smptd/x509; \
+ sudo install -m 644 -o root -g root /dev/stdin \
+ /etc/postfix/'"$vm_domainname"'/smtp/x509/.gitignore <<-EOF
+ key.pem
+ EOF
+ sudo install -m 644 -o root -g root /dev/stdin \
+ /etc/postfix/'"$vm_domainname"'/smtpd/x509/.gitignore <<-EOF
+ key.pem
+ EOF
+ '
+ rule _x509_service_key_send_deciphered smtpd \
+ /etc/postfix/$vm_domainname/smtpd/x509/key.pem -l root "$@"
+ }
rule=${1:-help}
${1+shift}
-set "${TRACE:+-x}"
-rule_$rule "$@"
+case $rule in
+ (help);;
+ (*)
+ assert 'test ! "$(hostname --fqdn)" = "$vm_fqdn"' vm_fqdn
+ assert 'test ! "$(hostname --fqdn)" = "$vm_host"' vm_host
+ ;;
+ esac
+rule $rule "$@"