Ajout : réorganisation et ébauche X509.
[lhc/ateliers.git] / vm_remote
index 8518503..64f2ca1 100755 (executable)
--- a/vm_remote
+++ b/vm_remote
@@ -1,8 +1,8 @@
 #!/bin/sh
 set -e -f ${DRY_RUN:+-n} -u
 tool=${0%/*}
-. "$tool"/functions.sh
-. "$tool"/vm.sh
+. "$tool"/lib/functions.sh
+. "$tool"/etc/vm.sh
 test ! "$(hostname --fqdn)" = "$vm_fqdn"
 test ! "$(hostname --fqdn)" = "$vm_host"
 
@@ -37,7 +37,6 @@ rule_git_push () { # SYNTAX: $remote $options
        local remote=${1#remote=}; shift
        git add . &&
        git commit -a -C HEAD "$@" &&
-       local pwd=$(cd "$tool" && cd -)
        GIT_SSH=./vm_ssh git push -v -f "$remote"
  }
 
@@ -52,26 +51,26 @@ rule__ssh_known_hosts_update () {
         whoami
  }
 rule_disk_key_send () {
-       gpg --decrypt key/secret/$vm_fqdn.disk.gpg |
-       ssh "$@" root@$vm_fqdn \
+       gpg --decrypt var/lib/luks/$vm_fqdn.key.gpg |
+       "$tool"/vm_ssh root@$vm_fqdn "$@" \
         -o CheckHostIP=no \
         -o HostKeyAlias=init.$vm_fqdn \
-        -o StrictHostKeyChecking=yes \
-        -o UserKnownHostsFile="$tool"/key/ssh.known_hosts \
         tee /lib/cryptsetup/passfifo \>/dev/null
  }
 rule_disk_key_backup () {
        for part in root swap var home
         do
-               rule_ssh sudo cryptsetup luksHeaderBackup /dev/$vm_lvm_vg/${vm_lvm_lv}_${part} |
-               gpg --encrypt --recipient $USER@ -o key/secret/${vm_lvm_lv}_${part}.luks.gpg
-        done
- }
-rule_disk_key_restore () {
-       for part in root swap var home
-        do
-               gpg --decrypt ${vm_lvm_lv}_${part}.luks |
-               rule_ssh sudo cryptsetup luksHeaderRestore /dev/$vm_lvm_vg/${vm_lvm_lv}_${part}
+               mkdir -p var/lib/luks
+               rule_ssh -l root ' \
+                       tmp=$(mktemp)
+                       cryptsetup luksHeaderBackup \
+                        /dev/$vm_lvm_vg/${vm_lvm_lv}_${part} \
+                        --header-backup-file "$tmp" \
+                       cat "$tmp"
+                       shred --remove "$tmp"
+                ' |
+               gpg --encrypt --recipient $USER@ \
+                -o var/lib/luks/${vm_lvm_lv}_${part}.luks.gpg
         done
  }