#!/bin/sh set -e -f ${DRY_RUN:+-n} -u tool=${0%/*} . "$tool"/env.sh rule_help () { cat >&2 <<-EOF DESCRIPTION: ce script regroupe des fonctions utilitaires pour gérer la VM des ateliers _depuis_ son hôte ; il sert à la fois d'outil et de documentation. Voir \`$tool/ateliers_hosted' pour les utilitaires côté VM hébergée. SYNTAX: $0 \$RULE \${RULE}_SYNTAX RULES: $(sed -ne 's/^rule_\([^_][^ ]*\) () {\( *#.*\|\)/\t\1\2/p' "$0") ENVIRONMENT: TRACE # affiche les commandes avant leur exécution $(sed -ne 's/^readonly \([^ ][^ =]*\).*}\( *#.*\|\)$/\t$\1\2/p' "$tool"/env.sh "$0") EOF } readonly vm_dev_disk="/dev/xvda" readonly vm_dev_disk_boot="${vm_dev_disk}1" rule_xen_config_init () { sudo tee /etc/xen/$vm_fqdn.cfg <<-EOF # -*- mode: python; -*- import os, re name = "$vm_fqdn" arch = os.uname()[4] memory = 2048 vcpus = 1 vif = ['mac=$vm_mac,bridge=$vm_bridge'] disk = ['phy:/dev/domU/$vm_fqdn-disk,hda,w'] kernel = "/usr/lib/xen-4.0/boot/hvmloader" builder = 'hvm' device_model = 'qemu-dm' acpi = 1 apic = 1 # boot on floppy (a), hard disk (c) or CD-ROM (d) #boot = 'd' #vnc = 1 #sdl = 0 #vncconsole = 0 #vnclisten = "0.0.0.0" #vncpasswd = "" #usbdevice = 'tablet' keymap = 'fr' serial = 'pty' on_poweroff = 'destroy' on_reboot = 'restart' on_crash = 'restart' EOF } rule_xen_on () { sudo xm create $vm_fqdn.cfg } rule_xen_off () { sudo xm shutdown $vm_fqdn.cfg } rule_disk_mount () { # DESCRIPTION: montage du disque de la VM depuis l'hôte sudo xm block-attach 0 phy:/dev/domU/$vm_fqdn-disk $vm_dev_disk w # NOTE: on pourrait utiliser kpartx à la place je pense ; détail. } rule_disk_umount () { # DESCRIPTION: démontage du disque de la VM depuis l'hôte rule_part_boot_umount case $vm_use_lvm in (yes) rule_part_lvm_umount ;; (no) rule_part_root_umount rule_part_var_umount rule_part_home_umount ;; (*) exit 1;; esac sudo xm block-detach 0 $vm_dev_disk } case $vm_use_lvm in (no) readonly vm_dev_disk_swap="${vm_dev_disk}5" readonly vm_dev_disk_root="${vm_dev_disk}6" readonly vm_dev_disk_var="${vm_dev_disk}7" readonly vm_dev_disk_home="${vm_dev_disk}8" ;; (yes) readonly vm_lvm_pv="${vm_dev_disk}2" readonly vm_lvm_vg=$vm readonly vm_lvm_dev=$(printf %s $vm_lvm_vg | sed -e 's/-/--/g') readonly vm_lvm_lv=$vm readonly vm_dev_disk_swap=/dev/mapper/$vm_lvm_dev-${vm_lvm_lv}_swap readonly vm_dev_disk_root=/dev/mapper/$vm_lvm_dev-${vm_lvm_lv}_root readonly vm_dev_disk_var=/dev/mapper/$vm_lvm_dev-${vm_lvm_lv}_var readonly vm_dev_disk_home=/dev/mapper/$vm_lvm_dev-${vm_lvm_lv}home ;; (*) exit 1;; esac rule_disk_format () { # DESCRIPTION: partitionnage du disque de la VM case $vm_use_lvm in (no) sudo sfdisk $vm_dev_disk <<-EOF # partition table of $vm_dev_disk unit: sectors ${vm_dev_disk}1 : start= 63, size= 497952, Id=83, bootable ${vm_dev_disk}2 : start= 498015, size=418927005, Id= 5 ${vm_dev_disk}3 : start= 0, size= 0, Id= 0 ${vm_dev_disk}4 : start= 0, size= 0, Id= 0 ${vm_dev_disk}5 : start= 498078, size= 1959867, Id=82 ${vm_dev_disk}6 : start= 2458008, size= 29302497, Id=83 ${vm_dev_disk}7 : start= 31760568, size= 9767457, Id=83 ${vm_dev_disk}8 : start= 41528088, size=377896932, Id=83 EOF ;; (yes) sudo sfdisk $vm_dev_disk <<-EOF # partition table of $vm_dev_disk unit: sectors ${vm_dev_disk}1 : start= 63, size= 497952, Id=83, bootable ${vm_dev_disk}2 : start= 498015, size=418927005, Id=8E EOF ;; (*) exit 1;; esac sudo partprobe $vm_dev_disk } rule_part_lvm_format () { rule_part_lvm_umount ! sudo vgs | grep -q "^ $vm_lvm_vg " || sudo vgremove $vm_lvm_vg sudo pvcreate --dataalignment 512k $vm_lvm_pv sudo vgcreate --dataalignment 512k $vm_lvm_vg $vm_lvm_pv sudo lvcreate --contiguous y -n ${vm_lvm_lv}_swap -L 1G $vm_lvm_vg sudo lvcreate --contiguous y -n ${vm_lvm_lv}_root -L 15G $vm_lvm_vg sudo lvcreate --contiguous y -n ${vm_lvm_lv}_var -L 5G $vm_lvm_vg sudo lvcreate --contiguous y -n ${vm_lvm_lv}_home -l 99%FREE $vm_lvm_vg rule_part_lvm_umount } rule_part_lvm_mount () { sudo vgchange -a y $vm_lvm_vg sudo lvchange -a y $vm_lvm_lv } rule_part_lvm_umount () { rule_part_root_umount rule_part_var_umount rule_part_home_umount if sudo vgs | grep -q "^ $vm_lvm_vg " then sudo lvchange -a n $vm_lvm_vg sudo vgchange -a n $vm_lvm_vg fi } rule_part_randomize () { # SYNTAX: $part # NOTE: à anticiper local part=$1 eval "sudo dd if=/dev/urandom of=\$vm_dev_disk_$part" } rule_part_randomize_stat () { # SYNTAX: $part # DESCRIPTION: fait afficher la progression de rule_part_clean local part=$1 eval "pkill -USR1 -f \"^dd if=/dev/urandom of=\$vm_dev_disk_$part\"" } rule__part_encrypted_format () { # SYNTAX: $part # DESCRIPTION: formatage d'une partition distincte de / # NOTE: la clef de chiffrement est dérivée de celle de /, # / doit être déchiffrée pour que cela fonctionne. local part=$1 eval "local dev=\$vm_dev_disk_$part" test ! -e /dev/mapper/${vm}_root_deciphered || sudo /lib/cryptsetup/scripts/decrypt_derived ${vm}_root_deciphered | sudo cryptsetup luksFormat --hash=sha512 --key-size=512 \ --cipher=aes-xts-essiv:sha256 --key-file=- --align-payload=8 $dev } rule__part_encrypted_mount () { # SYNTAX: $part local part=$1 eval "local dev=\$vm_dev_disk_$part" test ! -e /dev/mapper/${vm}_root_deciphered || sudo /lib/cryptsetup/scripts/decrypt_derived ${vm}_root_deciphered | sudo cryptsetup luksOpen --key-file=- $dev ${vm}_${part}_deciphered } rule__part_encrypted_umount () { # SYNTAX: $part local part=$1 eval "local dev=\$vm_dev_disk_$part" test ! -e /dev/mapper/${vm}_${part}_deciphered || sudo cryptsetup luksClose ${vm}_${part}_deciphered } rule_part_root_format () { if ! mount | grep -q "^$vm_dev_disk_root " then sudo cryptsetup luksFormat --hash=sha512 --key-size=512 \ --cipher=aes-xts-essiv:sha256 --key-file=- --align-payload=8 $vm_dev_disk_root sudo cryptsetup luksOpen --key-file=- $vm_dev_disk_root ${vm}_root_deciphered sudo mke2fs -t ext4 -c -c -m 5 -T ext4 -b $vm_e2fs_block_size \ -E resize=15G${vm_e2fs_extended_options} \ -L ${vm}_root \ /dev/mapper/${vm}_root_deciphered ! mountpoint -q /mnt/$vm_fqdn sudo mount -v /dev/mapper/${vm}_root_deciphered /mnt/$vm_fqdn mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/boot mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/dev mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/home mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/proc mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/sys mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/var sudo umount -v /mnt/$vm_fqdn fi } rule_part_root_mount () { test -e /dev/mapper/${vm}_root_deciphered || sudo cryptsetup luksOpen $vm_dev_disk_root ${vm}_root_deciphered ! mountpoint -q /mnt/$vm_fqdn || sudo mount -v /dev/mapper/${vm}_root_deciphered /mnt/$vm_fqdn } rule_part_root_umount () { ! mountpoint -q /mnt/$vm_fqdn || sudo umount -v /mnt/$vm_fqdn ! test -e /dev/mapper/${vm}_root_deciphered || sudo cryptsetup luksClose ${vm}_root_deciphered } rule_part_swap_format () { rule__part_encrypted_format swap rule__part_encrypted_mount swap sudo mkswap -f -L ${vm}_swap /dev/mapper/${vm}_swap_deciphered rule__part_encrypted_umount swap } rule_part_boot_format () { mount | grep -q "^$vm_dev_disk_boot " || sudo mke2fs -t ext2 -c -c -m 5 -T small \ -E resize=1G${vm_e2fs_extended_options} \ -L ${vm}_boot $vm_dev_disk_boot } rule_part_boot_mount () { mountpoint -q /mnt/$vm_fqdn test -d /mnt/$vm_fqdn/boot mountpoint -q /mnt/$vm_fqdn/boot || sudo mount -v $vm_dev_disk_boot /mnt/$vm_fqdn/boot } rule_part_boot_umount () { ! mountpoint -q /mnt/$vm_fqdn/boot || sudo umount -v /mnt/$vm_fqdn/boot } rule_part_var_format () { rule__part_encrypted_format var rule__part_encrypted_mount var sudo mke2fs -t ext4 -c -c -m 5 -T ext4 -b $vm_e2fs_block_size \ -E resize=10G${vm_e2fs_extended_options} \ -L ${vm}_var \ /dev/mapper/${vm}_var_deciphered rule__part_encrypted_umount var } rule_part_var_mount () { rule__part_encrypted_mount var mountpoint -q /mnt/$vm_fqdn/var || sudo mount -v /dev/mapper/${vm}_var_deciphered /mnt/$vm_fqdn/var } rule_part_var_umount () { ! mountpoint -q /mnt/$vm_fqdn/var || sudo umount -v /mnt/$vm_fqdn/var rule__part_encrypted_umount var } rule_part_home_format () { rule__part_encrypted_format home rule__part_encrypted_mount home sudo mke2fs -t ext4 -c -c -m 0 -T ext4 -b $vm_e2fs_block_size \ -E resize=400G${vm_e2fs_extended_options} \ -O quota \ -L ${vm}_home \ /dev/mapper/${vm}_home_deciphered rule__part_encrypted_umount home } rule_part_home_mount () { rule__part_encrypted_mount home mountpoint -q /mnt/$vm_fqdn/home || sudo mount -v /dev/mapper/${vm}_home_deciphered /mnt/$vm_fqdn/home } rule_part_home_umount () { ! mountpoint -q /mnt/$vm_fqdn/home || sudo umount -v /mnt/$vm_fqdn/home rule__part_encrypted_umount home } rule_debian_install () { sudo DEBOOTSTRAP_DIR=/usr/share/debootstrap/ debootstrap \ --arch=$vm_arch --verbose --keyring=/usr/share/keyrings/debian-archive-keyring.gpg \ --exclude=vim-tiny \ --include=$(printf '%s,' \ acl \ bsdmainutils \ busybox \ ca-certificates \ console-setup \ cryptsetup \ dash \ dnsutils \ dropbear \ etckeeper \ hashalot \ htop \ ifupdown \ initramfs-tools \ kbd \ less \ mosh \ ncurses-term \ openssh-client \ openssh-server \ openssl \ pciutils \ procps \ quota \ quotatool \ rsync \ screen \ sudo \ sysprofile \ vim-nox \ wget \ zsh \ ) \ $vm_lsb_name /mnt/$vm_fqdn/ \ http://ftp.fr.debian.org/debian/ } rule_chroot () { rule_part_boot_mount rule_part_root_mount rule_part_var_mount #rule_part_home_mount mountpoint -q /mnt/$vm_fqdn/proc || mount -t proc proc /mnt/$vm_fqdn/proc mountpoint -q /mnt/$vm_fqdn/sys || mount -t sysfs sys /mnt/$vm_fqdn/sys mountpoint -q /mnt/$vm_fqdn/dev || mount --bind /dev /mnt/$vm_fqdn/dev sudo chroot /mnt/$vm_fqdn /bin/bash || true rule__chroot_clean } rule__chroot_clean () { umount -v /mnt/$vm_fqdn/dev umount -v /mnt/$vm_fqdn/sys umount -v /mnt/$vm_fqdn/proc #rule_part_home_umount rule_part_var_umount rule_part_root_umount rule_part_boot_umount } rule=${1:-help} ${1+shift} set "${TRACE:+-x}" rule_$rule "$@"