#!/bin/sh set -e -f ${DRY_RUN:+-n} -u tool=${0%/*} . "$tool"/lib/rule.sh . "$tool"/etc/vm.sh rule_help () { # SYNTAX: [--hidden] local hidden; [ ${1:+set} ] || hidden=set cat >&2 <<-EOF DESCRIPTION: ce script regroupe des règles pour administrer la VM ($vm_fqdn) _depuis_ une machine distante ; il sert à la fois d'outil (aisément bidouillable) et de documentation (préçise). Voir \`$tool/vm_host' pour les règles côté machine hôte ($vm_host). Voir \`$tool/vm_hosted' pour les règles côté VM hébergée ($vm_fqdn). SYNTAX: $0 \$RULE \${RULE}_SYNTAX RULES: $(sed -ne "s/^rule_\(${hidden:+[^_]}[^ ]*\) () {\( *#.*\|\)/ \1\2/p" "$tool"/etc/vm.sh "$0") ENVIRONMENT: TRACE # affiche les commandes avant leur exécution $(sed -ne 's/^readonly \([^ ][^ =]*\).*}\( *#.*\|\)$/\t$\1\2/p' "$tool"/etc/vm.sh "$0") EOF } rule_git_configure () { # DESCRIPTION: configure ./.git correctement ( cd "$tool" git remote rm host || true git remote add host $vm_host:tool/vm git config --replace remote.host.push HEAD:refs/remotes/master git remote rm hosted || true git remote add hosted root@$vm_fqdn:tool/vm git config --replace remote.hosted.push HEAD:refs/remotes/master git submodule update --init ) } rule_git_push () { # SYNTAX: {host|hosted} $git_push_options ( cd "$tool" local remote=${1#remote=}; shift GIT_SSH=./lib/ssh git push -v "$remote" "$@" info "penser à faire : vm_hosted git_reset" ) } rule_ssh () { "$tool"/lib/ssh $vm_fqdn "$@" } rule_mosh () { mosh --ssh="$tool/lib/ssh $*" $vm_fqdn } rule__ssh_known_hosts_update () { rule ssh \ -o StrictHostKeyChecking=no \ -o CheckHostIP=no \ -o HashKnownHosts=no \ whoami } rule__x509_service_key_send_deciphered () { # SYNTAX: $service $remote_destination ${ssh_options-} local service="$1"; shift local remote_destination="$1"; shift gpg --decrypt "var/sec/x509/$vm_domainname/$service/key.pass.gpg" | openssl rsa -passin 'stdin' \ -in "var/sec/x509/$vm_domainname/$service/key.pem" \ -out '/dev/stdout' | rule ssh "$@" ' \ install -m 400 -o root -g root \ /dev/stdin \ '"$remote_destination"' \ ' } rule_luks_key_send () { # DESCRIPTION: envoie la clef de déchiffrement des partitions au démarrage de la VM. gpg --decrypt var/sec/luks/$vm_fqdn.key.gpg | "$tool"/lib/ssh root@$vm_fqdn "$@" \ -o CheckHostIP=no \ -o HostKeyAlias=init.$vm_fqdn \ tee /lib/cryptsetup/passfifo \>/dev/null } rule_luks_key_backup () { # SYNTAX: ${gpg_options:---recipient $USER@} DESCRIPTION: sauvegarde localement les entêtes des partitions chiffrées. test "${*+set}" || set -- --recipient "$USER@" for part in root var home do mkdir -p var/sec/luks rule ssh -l root ' \ set -e -f -u; exec 2>/dev/null; tmp=$(mktemp -t "luks.'"$part"'.XXXXXXXX.tmp" --dry-run); cryptsetup luksHeaderBackup >/dev/null \ /dev/'"$vm_lvm_vg"'/'"$vm_lvm_lv"'_'"$part"' \ --header-backup-file "$tmp"; \ cat "$tmp"; shred >/dev/null --remove "$tmp"; \ ' | gpg "$@" --encrypt \ -o var/sec/luks/${vm_lvm_lv}_${part}.luks.gpg done } rule_apache2_key_send () { local -; set +f for conf in "$tool"/etc/apache2/site.d/*/VirtualHost.conf do conf=${conf#"$tool"/etc/apache2/site.d/} local user port service site IFS=. read -r user port service site <<-EOF ${conf%\/VirtualHost\.conf} EOF assert 'test "${user:+set}"' assert 'test "${service:+set}"' assert 'test "${site:+set}"' assert 'test "${port:+set}"' local site_dir="$user.$port.$service.$site" case $port in (443) rule ssh -l root ' \ sudo install -d -m 770 -o '"$user"' -g '"$user"' \ /etc/apache2 \ /etc/apache2/site.d/'"$site_dir"' \ /etc/apache2/site.d/'"$site_dir"'/x509; \ sudo install -m 644 -o '"$user"' -g '"$user"' /dev/stdin \ /etc/apache2/site.d/'"$site_dir"'/x509/.gitignore <<-EOF key.pem EOF ' rule _x509_service_key_send_deciphered $service \ ~"$user"/etc/apache2/"$site_dir"/x509/key.pem -l root "$@" ;; esac done } rule_dovecot_key_send () { rule ssh -l root ' \ sudo install -d -m 770 -o root -g root \ /etc/dovecot/'"$vm_domainname"'/ \ /etc/dovecot/'"$vm_domainname"'/imap \ /etc/dovecot/'"$vm_domainname"'/imap/x509 ; \ sudo install -m 644 -o root -g root /dev/stdin \ /etc/dovecot/'"$vm_domainname"'/imap/x509/.gitignore <<-EOF key.pem EOF ' rule _x509_service_key_send_deciphered imap \ /etc/dovecot/$vm_domainname/$service/x509/key.pem -l root "$@" } rule_nginx_key_send () { local -; set +f for conf in "$tool"/etc/nginx/site.d/*/server.conf do conf=${conf#"$tool"/etc/nginx/site.d/} local user port service site IFS=. read -r user port service site <<-EOF ${conf%\/server\.conf} EOF assert 'test "${user:+set}"' assert 'test "${service:+set}"' assert 'test "${site:+set}"' assert 'test "${port:+set}"' local site_dir="$user.$port.$service.$site" case $port in (443) rule ssh -l root ' \ sudo install -d -m 770 -o root -g root \ /etc/nginx \ /etc/nginx/site.d \ /etc/nginx/site.d/'"$site_dir"' \ /etc/nginx/site.d/'"$site_dir"'/x509; \ sudo install -m 644 -o root -g root /dev/stdin \ /etc/nginx/site.d/'"$site_dir"'/x509/.gitignore <<-EOF key.pem EOF ' rule _x509_service_key_send_deciphered $service \ /etc/nginx/"$site_dir"/x509/key.pem -l root "$@" ;; esac done } rule_postfix_key_send () { rule ssh -l root ' \ sudo install -d -m 770 -o root -g root \ /etc/postfix/'"$vm_domainname"'/ \ /etc/postfix/'"$vm_domainname"'/smptd \ /etc/postfix/'"$vm_domainname"'/smptd/x509; \ sudo install -m 644 -o root -g root /dev/stdin \ /etc/postfix/'"$vm_domainname"'/smtp/x509/.gitignore <<-EOF key.pem EOF sudo install -m 644 -o root -g root /dev/stdin \ /etc/postfix/'"$vm_domainname"'/smtpd/x509/.gitignore <<-EOF key.pem EOF ' rule _x509_service_key_send_deciphered smtpd \ /etc/postfix/$vm_domainname/smtpd/x509/key.pem -l root "$@" } rule=${1:-help} ${1+shift} case $rule in (help);; (*) assert 'test ! "$(hostname --fqdn)" = "$vm_fqdn"' vm_fqdn assert 'test ! "$(hostname --fqdn)" = "$vm_host"' vm_host ;; esac rule $rule "$@"