#!/bin/sh
-set -e -f ${DRY_RUN:+-n} -u ${TRACE:+-x}
- # -e: erreur si une commande non testée échoue.
- # -f: désactive les jokers dans les chemins.
- # -u: erreur si une variable non-définie est utilisée.
- # -x: affiche les commandes exécutées sur la sortie d'erreur standard.
+set -e -f ${DRY_RUN:+-n} -u
tool=${0%/*}
. "$tool"/env.sh
+. "$tool"/inc.sh
rule_help () {
cat >&2 <<-EOF
Voir \`$tool/ateliers_hosted' pour les utilitaires côté VM hébergée.
SYNTAX: $0 \$RULE \${RULE}_SYNTAX
RULES:
- $(sed -ne 's/^rule_\([^ ]*\) () {\( *#.*\|\)/\t\1\2/p' "$0")
+ $(sed -ne 's/^rule_\([^_][^ ]*\) () {\( *#.*\|\)/\t\1\2/p' "$tool"/env.sh "$0")
ENVIRONMENT:
- $(sed -ne 's/^readonly \([^ =]*\).*}\( *#.*\|\)$/\t$\1\2/p' "$tool"/env.sh "$0")
+ TRACE # affiche les commandes avant leur exécution
+ $(sed -ne 's/^readonly \([^ ][^ =]*\).*}\( *#.*\|\)$/\t$\1\2/p' "$tool"/env.sh "$0")
EOF
}
-readonly dev_disk="/dev/xvda"
-readonly dev_disk_boot="${dev_disk}1"
-readonly dev_disk_swap="${dev_disk}5"
-readonly dev_disk_root="${dev_disk}6"
-readonly dev_disk_var="${dev_disk}7"
-readonly dev_disk_home="${dev_disk}8"
+readonly vm_dev_disk=/dev/mapper/domU-$(printf %s "$vm_fqdn-disk" | sed -e 's/-/--/g')
+readonly vm_dev_disk_boot="${vm_dev_disk}1"
rule_xen_config_init () {
- tee /etc/xen/$vm_fqdn.cfg <<-EOF
+ sudo tee /etc/xen/$vm_fqdn.cfg <<-EOF
# -*- mode: python; -*-
import os, re
- name = "$vm"
+ name = "$vm_fqdn"
arch = os.uname()[4]
memory = 2048
vcpus = 1
sudo xm shutdown $vm_fqdn.cfg
}
-rule_disk_mount () {
- # Montage du disque de la VM depuis l'hôte
- test ! -e $vm_dev_disk
- sudo xm block-attach 0 phy:/dev/domU/$vm_fqdn-disk $vm_dev_disk w
- }
-rule_disk_unmount () {
- # Démontage du disque de la VM depuis l'hôte
- test -e $vm_dev_disk
- ! mountpoint /mnt/$vm_fqdn
- sudo xm block-detach 0 $vm_dev_disk
- }
-rule_disk_part () {
- # Partitionage du disque de la VM
- # NOTE: on fait le choix de ne pas utiliser LVM sur la machine virtuelle car :
- # - pour l'extension de mémoire:
- # 1. on créera une nouvelle partition sur le LVM de l'hôte
- # 2. on l'ajoutera comme un disque supplémentaire dans /etc/xen/$vm_fqdn.cfg
- # 3. on le montera sur /home2 en pensant à changer DHOME=/home2 dans /etc/adduser.conf
- # - pour la sauvegarde: LVM snapshoot est trop
- # 1. sauvegarde au niveau applicatif (pgdump, mysqldump)
- # 2. sauvegarde des configurations (etckeeper, git)
- # 3. sauvegarde incrémentale et chiffrée des autres fichiers (duplicity)
- # NOTE:
- sudo sfdisk -d $vm_dev_disk <<-EOF
- # partition table of $vm_dev_disk
- unit: sectors
-
- ${vm_dev_disk}1 : start= 63, size= 497952, Id=83, bootable
- ${vm_dev_disk}2 : start= 498015, size=418927005, Id= 5
- ${vm_dev_disk}3 : start= 0, size= 0, Id= 0
- ${vm_dev_disk}4 : start= 0, size= 0, Id= 0
- ${vm_dev_disk}5 : start= 498078, size= 1959867, Id=82
- ${vm_dev_disk}6 : start= 2458008, size= 29302497, Id=83
- ${vm_dev_disk}7 : start= 31760568, size= 9767457, Id=83
- ${vm_dev_disk}8 : start= 41528088, size=377896932, Id=83
- EOF
+rule_disk_mount () { # DESCRIPTION: montage du disque de la VM depuis l'hôte
+ sudo kpartx -a -v /dev/domU/$vm_fqdn-disk
+ #sudo xm block-attach 0 phy:/dev/domU/$vm_fqdn-disk $vm_dev_disk w
+ }
+rule_disk_umount () { # DESCRIPTION: démontage du disque de la VM depuis l'hôte
+ rule_part_boot_umount
+ case $vm_use_lvm in
+ (yes)
+ rule_part_lvm_umount
+ ;;
+ (no)
+ rule_part_root_umount
+ rule_part_var_umount
+ rule_part_home_umount
+ ;;
+ (*) exit 1;;
+ esac
+ sudo kpartx -d -v /dev/domU/$vm_fqdn-disk
+ #sudo xm block-detach 0 $vm_dev_disk
+ # XXX: DANGEREUX ; si jamais il bloque parce que le disque était encore utilisé :
+ # utiliser xm block-detach 0 $vm_dev_disk --force ;
+ # ôter les éventuels mappages LVM concernés avec dmsetup table et dmsetup remove --force ;
+ # ôter les mappages concernés dans /etc/lvm/cache/.cache,
+ # et pour bien trouver tous les mappages :
+ # % sudo find /dev -type l -exec sh -c 'printf "%s -> " "$@"; readlink "$@"' - {} \; | grep $vm_dev_disk
+ # enfin, ôter l'éventuel verrou dans /var/lock/lvm/
+ }
+
+case $vm_use_lvm in
+ (no)
+ readonly vm_dev_disk_swap="${vm_dev_disk}5"
+ readonly vm_dev_disk_root="${vm_dev_disk}6"
+ readonly vm_dev_disk_var="${vm_dev_disk}7"
+ readonly vm_dev_disk_home="${vm_dev_disk}8"
+ ;;
+ (yes)
+ readonly vm_lvm_pv="${vm_dev_disk}2"
+ readonly vm_dev_disk_swap=/dev/$vm_lvm_vg/${vm_lvm_lv}_swap
+ readonly vm_dev_disk_root=/dev/$vm_lvm_vg/${vm_lvm_lv}_root
+ readonly vm_dev_disk_var=/dev/$vm_lvm_vg/${vm_lvm_lv}_var
+ readonly vm_dev_disk_home=/dev/$vm_lvm_vg/${vm_lvm_lv}_home
+ ;;
+ (*)
+ exit 1;;
+ esac
+
+rule_disk_format () { # DESCRIPTION: partitionnage du disque de la VM
+ case $vm_use_lvm in
+ (no)
+ sudo sfdisk $vm_dev_disk <<-EOF
+ # partition table of $vm_dev_disk
+ unit: sectors
+
+ ${vm_dev_disk}1 : start= 63, size= 497952, Id=83, bootable
+ ${vm_dev_disk}2 : start= 498015, size=418927005, Id= 5
+ ${vm_dev_disk}3 : start= 0, size= 0, Id= 0
+ ${vm_dev_disk}4 : start= 0, size= 0, Id= 0
+ ${vm_dev_disk}5 : start= 498078, size= 1959867, Id=82
+ ${vm_dev_disk}6 : start= 2458008, size= 29302497, Id=83
+ ${vm_dev_disk}7 : start= 31760568, size= 9767457, Id=83
+ ${vm_dev_disk}8 : start= 41528088, size=377896932, Id=83
+ EOF
+ ;;
+ (yes)
+ sudo sfdisk $vm_dev_disk <<-EOF
+ # partition table of $vm_dev_disk
+ unit: sectors
+
+ ${vm_dev_disk}1 : start= 63, size= 497952, Id=83, bootable
+ ${vm_dev_disk}2 : start= 498015, size=418927005, Id=8E
+ EOF
+ ;;
+ (*) exit 1;;
+ esac
+ #sudo partprobe $vm_dev_disk
+ sudo kpartx -u -v /dev/domU/$vm_fqdn-disk
}
-rule_boot_format () {
- mount | grep -q "^$vm_dev_disk_boot "
- sudo mkfs.ext2 -m 0 -T small -L "boot" $vm_dev_disk_boot
+rule_part_lvm_format () {
+ rule_part_lvm_umount
+ ! sudo vgs | grep -q "^ $vm_lvm_vg " ||
+ sudo vgremove $vm_lvm_vg
+ sudo pvcreate --dataalignment 512k $vm_lvm_pv
+ sudo vgcreate --dataalignment 512k $vm_lvm_vg $vm_lvm_pv
+ sudo lvcreate --contiguous y -n ${vm_lvm_lv}_swap -L 1G $vm_lvm_vg
+ sudo lvcreate --contiguous y -n ${vm_lvm_lv}_root -L 15G $vm_lvm_vg
+ sudo lvcreate --contiguous y -n ${vm_lvm_lv}_var -L 5G $vm_lvm_vg
+ sudo lvcreate --contiguous y -n ${vm_lvm_lv}_home -l 99%FREE $vm_lvm_vg
+ rule_part_lvm_umount
}
-rule_boot_mount () {
- ! mountpoint /mnt/$vm_fqdn/boot
- sudo mount -v $vm_dev_disk_boot /mnt/$vm_fqdn/boot
+rule_part_lvm_mount () {
+ sudo vgchange -a y $vm_lvm_vg
+ sudo lvchange -a y $vm_lvm_lv
}
-rule_boot_unmount () {
- mountpoint /mnt/$vm_fqdn/boot
- sudo unmount -v /mnt/$vm_fqdn/boot
+rule_part_lvm_umount () {
+ rule_part_root_umount
+ rule_part_var_umount
+ rule_part_home_umount
+ if sudo vgs | grep -q "^ $vm_lvm_vg "
+ then
+ sudo lvchange -a n $vm_lvm_vg
+ sudo vgchange -a n $vm_lvm_vg
+ fi
}
-rule_part_clean () {
- # NOTE: long, optionnel
- # Déjà fait à la main histoire de pouvoir créer la machine virtuelle plus
- # rapidement le jour venu.
- part=$1
+rule_part_randomize () { # SYNTAX: $part # NOTE: à anticiper
+ local part=$1
eval "sudo dd if=/dev/urandom of=\$vm_dev_disk_$part"
}
-rule_part_clean_stat () {
- # USE: exécuter cette fonction dans un shell distinct de rule_part_clean()
- # lui fait afficher sa progression.
- part=$1
+rule_part_randomize_stat () { # SYNTAX: $part # DESCRIPTION: fait afficher la progression de rule_part_clean
+ local part=$1
eval "pkill -USR1 -f \"^dd if=/dev/urandom of=\$vm_dev_disk_$part\""
}
-rule_part_format_root () {
- # DECRIPTION: Formatage de /
- part="root"
- eval dev="\$vm_dev_disk_$part"
- sudo cryptsetup luksFormat --hash=sha512 --key-size=512 --key-file=- \
- --cipher=aes-xts-essiv:sha256 --align-payload=8 $dev
- sudo cryptsetup luksOpen --key-file=- $dev ${vm}_${part}_deciphered
- sudo mkfs.ext4 -m 5 -T ext4 -L ${vm}_$part -E stripe_width=32,resize=15G \
- /dev/mapper/${vm}_${part}_deciphered
- }
-rule_format_part () {
- # DESCRIPTION: formatage d'une partition distincte de /
+rule__part_encrypted_format () { # SYNTAX: $part # DESCRIPTION: formatage d'une partition distincte de /
# NOTE: la clef de chiffrement est dérivée de celle de /,
# / doit être déchiffrée pour que cela fonctionne.
- part=$1
- eval dev="\$vm_dev_disk_$part"
- test -e /dev/mapper/${vm}_root_deciphered
- sudo /lib/cryptsetup/scripts/decrypt_derived ${vm}_root_deciphered |
- sudo cryptsetup luksFormat --key-file=- --hash=sha512 --key-size=512 --cipher=aes-xts-essiv:sha256 $dev
- }
-rule_mount_part () {
- part=$1
- eval dev="\$vm_dev_disk_$part"
- test -e /dev/mapper/${vm}_root_deciphered
- sudo /lib/cryptsetup/scripts/decrypt_derived ${vm}_root_deciphered |
- sudo cryptsetup luksOpen --key-file=- $dev ${vm}_${part}_deciphered
- }
-rule_unmount_part () {
- part=$1
- eval dev="\$vm_dev_disk_$part"
+ local part=$1
+ eval "local dev=\$vm_dev_disk_$part"
+ test ! -e /dev/mapper/${vm}_root_deciphered ||
+ sudo /bin/sh -c "/lib/cryptsetup/scripts/decrypt_derived ${vm}_root_deciphered |
+ cryptsetup luksFormat --hash=sha512 --key-size=512 \
+ --cipher=aes-xts-essiv:sha256 --key-file=- --align-payload=8 $dev"
+ }
+rule__part_encrypted_mount () { # SYNTAX: $part
+ local part=$1
+ eval "local dev=\$vm_dev_disk_$part"
+ test -e /dev/mapper/${vm}_${part}_deciphered ||
+ sudo /bin/sh -c "/lib/cryptsetup/scripts/decrypt_derived ${vm}_root_deciphered |
+ cryptsetup luksOpen --key-file=- $dev ${vm}_${part}_deciphered"
+ }
+rule__part_encrypted_umount () { # SYNTAX: $part
+ local part=$1
+ eval "local dev=\$vm_dev_disk_$part"
+ test ! -e /dev/mapper/${vm}_${part}_deciphered ||
sudo cryptsetup luksClose ${vm}_${part}_deciphered
}
-rule_part_format_swap () {
- part="swap"
- rule_format_part $part
- rule_mount_part $part
- sudo mkswap -f -L ${vm}_swap /dev/mapper/${vm}_${part}_deciphered
- rule_unmount_part $part
- }
-rule_part_format_var () {
- part="var"
- rule_format_part $part
- rule_mount_part $part
- sudo mkfs.ext4 -m 5 -T ext4 -L ${vm}_$part -E stripe_width=32,resize=5G /dev/mapper/${vm}_${part}_deciphered
- rule_unmount_part $part
- }
-rule_part_format_home () {
- part="home"
- rule_format_part $part
- rule_mount_part $part
- sudo mkfs.ext4 -m 5 -T ext4 -L ${vm}_$part -E stripe_width=32,resize=200G /dev/mapper/${vm}_${part}_deciphered
- rule_unmount_part $part
+
+rule_part_root_format () {
+ if ! mount | grep -q "^$vm_dev_disk_root "
+ then
+ sudo cryptsetup luksFormat --hash=sha512 --key-size=512 \
+ --cipher=aes-xts-essiv:sha256 --key-file=- --align-payload=8 $vm_dev_disk_root
+ sudo cryptsetup luksOpen --key-file=- $vm_dev_disk_root ${vm}_root_deciphered
+ sudo mke2fs -t ext4 -c -c -m 5 -T ext4 -b $vm_e2fs_block_size \
+ -E resize=30G${vm_e2fs_extended_options} \
+ -L ${vm}_root \
+ /dev/mapper/${vm}_root_deciphered
+ ! mountpoint -q /mnt/$vm_fqdn
+ sudo mount -v /dev/mapper/${vm}_root_deciphered /mnt/$vm_fqdn
+ mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/boot
+ mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/dev
+ mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/home
+ mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/proc
+ mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/sys
+ mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/var
+ mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/root
+ mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/root/tool
+ mk_dir mod=0770 own=root:root /mnt/$vm_fqdn/root/tool/ateliers
+ sudo umount -v /mnt/$vm_fqdn
+ sudo cryptsetup luksClose ${vm}_root_deciphered
+ fi
+ }
+rule_part_root_mount () {
+ test -e /dev/mapper/${vm}_root_deciphered ||
+ sudo cryptsetup luksOpen $vm_dev_disk_root ${vm}_root_deciphered
+ mountpoint -q /mnt/$vm_fqdn ||
+ sudo mount -v -t ext4 /dev/mapper/${vm}_root_deciphered /mnt/$vm_fqdn
+ }
+rule_part_root_umount () {
+ ! mountpoint -q /mnt/$vm_fqdn ||
+ sudo umount -v /mnt/$vm_fqdn
+ ! test -e /dev/mapper/${vm}_root_deciphered ||
+ sudo cryptsetup luksClose ${vm}_root_deciphered
+ }
+rule_part_root_backup_luks () {
+ sudo cryptsetup luksHeaderBackup $vm_dev_disk_root --header-backup-file ./root.luks
+ }
+rule_part_swap_format () {
+ rule__part_encrypted_format swap
+ rule__part_encrypted_mount swap
+ sudo mkswap -f -L ${vm}_swap /dev/mapper/${vm}_swap_deciphered
+ rule__part_encrypted_umount swap
+ }
+rule_part_boot_format () {
+ mount | grep -q "^$vm_dev_disk_boot " ||
+ sudo mke2fs -t ext2 -c -c -m 5 -T small \
+ -E resize=1G${vm_e2fs_extended_options} \
+ -L ${vm}_boot $vm_dev_disk_boot
+ }
+rule_part_boot_mount () {
+ mountpoint -q /mnt/$vm_fqdn
+ test -d /mnt/$vm_fqdn/boot
+ mountpoint -q /mnt/$vm_fqdn/boot ||
+ sudo mount -v -t ext2 $vm_dev_disk_boot /mnt/$vm_fqdn/boot
+ }
+rule_part_boot_umount () {
+ ! mountpoint -q /mnt/$vm_fqdn/boot ||
+ sudo umount -v /mnt/$vm_fqdn/boot
+ }
+rule_part_var_format () {
+ rule__part_encrypted_format var
+ rule__part_encrypted_mount var
+ sudo mke2fs -t ext4 -c -c -m 5 -T ext4 -b $vm_e2fs_block_size \
+ -E resize=10G${vm_e2fs_extended_options} \
+ -L ${vm}_var \
+ /dev/mapper/${vm}_var_deciphered
+ rule__part_encrypted_umount var
+ }
+rule_part_var_mount () {
+ rule__part_encrypted_mount var
+ mountpoint -q /mnt/$vm_fqdn/var ||
+ sudo mount -v -t ext4 /dev/mapper/${vm}_var_deciphered /mnt/$vm_fqdn/var
+ }
+rule_part_var_umount () {
+ ! mountpoint -q /mnt/$vm_fqdn/var ||
+ sudo umount -v /mnt/$vm_fqdn/var
+ rule__part_encrypted_umount var
+ }
+rule_part_home_format () {
+ rule__part_encrypted_format home
+ rule__part_encrypted_mount home
+ sudo mke2fs -t ext4 -c -c -m 0 -T ext4 -b $vm_e2fs_block_size \
+ -E resize=400G${vm_e2fs_extended_options} \
+ -L ${vm}_home \
+ /dev/mapper/${vm}_home_deciphered
+ # NOTE: -O quota pas supporté par e2fsprogs/squeeze
+ rule__part_encrypted_umount home
+ }
+rule_part_home_mount () {
+ rule__part_encrypted_mount home
+ mountpoint -q /mnt/$vm_fqdn/home ||
+ sudo mount -v -t ext4 /dev/mapper/${vm}_home_deciphered /mnt/$vm_fqdn/home
+ }
+rule_part_home_umount () {
+ ! mountpoint -q /mnt/$vm_fqdn/home ||
+ sudo umount -v /mnt/$vm_fqdn/home
+ rule__part_encrypted_umount home
}
-rule_install_debian () {
+rule_debian_install () {
+ rule_part_root_mount
+ rule_part_boot_mount
+ rule_part_var_mount
sudo DEBOOTSTRAP_DIR=/usr/share/debootstrap/ debootstrap \
--arch=$vm_arch --verbose --keyring=/usr/share/keyrings/debian-archive-keyring.gpg \
--exclude=vim-tiny \
initramfs-tools \
kbd \
less \
+ mosh \
ncurses-term \
openssh-client \
openssh-server \
wget \
zsh \
) \
- $vm_lsb_name /mnt/$vm_fqdn/ http://ftp.fr.debian.org/debian/
+ $vm_lsb_name /mnt/$vm_fqdn/ \
+ http://ftp.fr.debian.org/debian/
}
rule_chroot () {
- mountpoint /mnt/$vm_fqdn
- mountpoint /mnt/$vm_fqdn/boot
- mount --bind /dev /mnt/$vm_fqdn/dev
- sudo chroot /mnt/$vm_fqdn /bin/bash
- umount /mnt/$vm_fqdn/dev
+ rule_part_root_mount
+ rule_part_boot_mount
+ rule_part_var_mount
+ #rule_part_home_mount
+ mountpoint -q /mnt/$vm_fqdn/proc ||
+ sudo mount -t proc proc /mnt/$vm_fqdn/proc
+ mountpoint -q /mnt/$vm_fqdn/sys ||
+ sudo mount -t sysfs sys /mnt/$vm_fqdn/sys
+ mountpoint -q /mnt/$vm_fqdn/dev ||
+ sudo mount --bind /dev /mnt/$vm_fqdn/dev
+ mountpoint -q /mnt/$vm_fqdn/root/tool/ateliers ||
+ sudo mount --bind "$tool" /mnt/$vm_fqdn/root/tool/ateliers
+ sudo chroot /mnt/$vm_fqdn /bin/dash || true
+ rule__chroot_clean
+ }
+rule__chroot_clean () {
+ ! sudo mountpoint -q /mnt/$vm_fqdn/root/tool/ateliers ||
+ sudo umount -v /mnt/$vm_fqdn/root/tool/ateliers
+ ! mountpoint -q /mnt/$vm_fqdn/dev ||
+ sudo umount -v /mnt/$vm_fqdn/dev
+ ! mountpoint -q /mnt/$vm_fqdn/sys ||
+ sudo umount -v /mnt/$vm_fqdn/sys
+ ! mountpoint -q /mnt/$vm_fqdn/proc ||
+ sudo umount -v /mnt/$vm_fqdn/proc
+ rule_part_home_umount
+ rule_part_var_umount
+ rule_part_boot_umount
+ rule_part_root_umount
}
rule=${1:-help}
${1+shift}
+set "${TRACE:+-x}"
rule_$rule "$@"