Ajout : vm_hosted : rule_gitolite_configure .
[lhc/ateliers.git] / vm_remote
index 8518503..b7ce833 100755 (executable)
--- a/vm_remote
+++ b/vm_remote
 #!/bin/sh
 set -e -f ${DRY_RUN:+-n} -u
-tool=${0%/*}
-. "$tool"/functions.sh
-. "$tool"/vm.sh
-test ! "$(hostname --fqdn)" = "$vm_fqdn"
-test ! "$(hostname --fqdn)" = "$vm_host"
+tool=$(cd "${0%/*}"; cd -)
+. "$tool"/lib/rule.sh
+. "$tool"/etc/vm.sh
 
-rule_help () {
+rule_help () { # SYNTAX: [--hidden]
+       local hidden; [ ${1:+set} ] || hidden=set
        cat >&2 <<-EOF
-               DESCRIPTION: ce script regroupe des fonctions utilitaires
-                            pour gérer la VM _depuis_ une machine distante ;
-                            il sert à la fois d'outil et de documentation.
-                            Voir \`$tool/vm_host'   pour les utilitaires côté machine hôte.
-                            Voir \`$tool/vm_hosted' pour les utilitaires côté VM hébergée.
+               DESCRIPTION:
+                 ce script regroupe des règles pour administrer la VM ($vm_fqdn)
+                 _depuis_ une machine distante ;
+                 il sert à la fois d'outil (aisément bidouillable)
+                 et de documentation (préçise).
+                 Voir \`$tool/vm_host'   pour les règles côté machine hôte ($vm_host).
+                 Voir \`$tool/vm_hosted' pour les règles côté VM hébergée ($vm_fqdn).
                SYNTAX: $0 \$RULE \${RULE}_SYNTAX
                RULES:
-               $(sed -ne 's/^rule_\([^_][^ ]*\) () {\( *#.*\|\)/\t\1\2/p' "$tool"/vm.sh "$0")
+               $(sed -ne "s/^rule_\(${hidden:+[^_]}[^ ]*\) () {\( *#.*\|\)/  \1\2/p" "$tool"/etc/vm.sh "$0")
                ENVIRONMENT:
                  TRACE # affiche les commandes avant leur exécution
-               $(sed -ne 's/^readonly \([^ ][^ =]*\).*}\( *#.*\|\)$/\t$\1\2/p' "$tool"/vm.sh "$0")
+               $(sed -ne 's/^readonly \([^ ][^ =]*\).*}\( *#.*\|\)$/\t$\1\2/p' "$tool"/etc/vm.sh "$0")
                EOF
  }
 
-rule_git_config () {
+rule_git_configure () { # DESCRIPTION: configure ./.git correctement
        (
        cd "$tool"
-       git config remote.host.url >/dev/null ||
+       git remote rm host || true
        git remote add host $vm_host:tool/vm
-       git config --replace remote.host HEAD:refs/heads/origin
-       git config remote.$vm.url >/dev/null ||
-       git remote add vm root@$vm_fqdn:tool/vm
-       git config --replace remote.$vm HEAD:refs/heads/origin
+       git config --replace remote.host.push HEAD:refs/remotes/master
+       git remote rm hosted || true
+       git remote add hosted root@$vm_fqdn:tool/vm
+       git config --replace remote.hosted.push HEAD:refs/remotes/master
+       git submodule update --init
        )
  }
-rule_git_push () { # SYNTAX: $remote $options
+rule_git_push () { # SYNTAX: {host|hosted} $git_push_options
+       (
+       cd "$tool"
        local remote=${1#remote=}; shift
-       git add . &&
-       git commit -a -C HEAD "$@" &&
-       local pwd=$(cd "$tool" && cd -)
-       GIT_SSH=./vm_ssh git push -v -f "$remote"
+       GIT_SSH=./lib/ssh git push -v "$remote" "$@"
+       info "penser à faire : vm_hosted git_reset"
+       )
  }
 
 rule_ssh () {
-       "$tool"/vm_ssh $vm_fqdn "$@"
+       "$tool"/lib/ssh $vm_fqdn "$@"
+ }
+rule_mosh () {
+       mosh --ssh="$tool/lib/ssh $*" $vm_fqdn
  }
 rule__ssh_known_hosts_update () {
-       "$tool"/vm_ssh $vm_fqdn "$@" \
+       rule ssh \
         -o StrictHostKeyChecking=no \
         -o CheckHostIP=no \
         -o HashKnownHosts=no \
         whoami
  }
-rule_disk_key_send () {
-       gpg --decrypt key/secret/$vm_fqdn.disk.gpg |
-       ssh "$@" root@$vm_fqdn \
+
+rule__x509_service_key_send_deciphered () { # SYNTAX: $service $remote_destination ${ssh_options-}
+       local service="$1"; shift
+       local remote_destination="$1"; shift
+       gpg --decrypt "var/sec/x509/$vm_domainname/$service/key.pass.gpg" |
+       openssl rsa -passin 'stdin' \
+        -in  "var/sec/x509/$vm_domainname/$service/key.pem" \
+        -out '/dev/stdout' |
+       rule ssh "$@"  ' \
+               install -m 400 -o root -g root \
+                /dev/stdin \
+                '"$remote_destination"' \
+        '
+ }
+
+rule_luks_key_send () { # DESCRIPTION: envoie la clef de déchiffrement des partitions au démarrage de la VM.
+       gpg --decrypt var/sec/luks/$vm_fqdn.key.gpg |
+       "$tool"/lib/ssh root@$vm_fqdn "$@" \
         -o CheckHostIP=no \
         -o HostKeyAlias=init.$vm_fqdn \
-        -o StrictHostKeyChecking=yes \
-        -o UserKnownHostsFile="$tool"/key/ssh.known_hosts \
         tee /lib/cryptsetup/passfifo \>/dev/null
  }
-rule_disk_key_backup () {
-       for part in root swap var home
+rule_luks_key_backup () { # SYNTAX: ${gpg_options:---recipient $USER@} DESCRIPTION: sauvegarde localement les entêtes des partitions chiffrées.
+       test "${*+set}" || set -- --recipient "$USER@"
+       for part in root var home
         do
-               rule_ssh sudo cryptsetup luksHeaderBackup /dev/$vm_lvm_vg/${vm_lvm_lv}_${part} |
-               gpg --encrypt --recipient $USER@ -o key/secret/${vm_lvm_lv}_${part}.luks.gpg
+               mkdir -p var/sec/luks
+               rule ssh -l root ' \
+                       set -e -f -u;
+                       exec 2>/dev/null;
+                       tmp=$(mktemp -t "luks.'"$part"'.XXXXXXXX.tmp" --dry-run);
+                       cryptsetup luksHeaderBackup >/dev/null \
+                        /dev/'"$vm_lvm_vg"'/'"$vm_lvm_lv"'_'"$part"' \
+                        --header-backup-file "$tmp"; \
+                       cat "$tmp";
+                       shred >/dev/null --remove "$tmp"; \
+                ' |
+               gpg "$@" --encrypt \
+                -o var/sec/luks/${vm_lvm_lv}_${part}.luks.gpg
         done
  }
-rule_disk_key_restore () {
-       for part in root swap var home
-        do
-               gpg --decrypt ${vm_lvm_lv}_${part}.luks |
-               rule_ssh sudo cryptsetup luksHeaderRestore /dev/$vm_lvm_vg/${vm_lvm_lv}_${part}
+
+rule_apache2_key_send () {
+       local -; set +f
+       for conf in "$tool"/etc/apache2/site.d/*/VirtualHost.conf
+        do conf=${conf#"$tool"/etc/apache2/site.d/}
+               local user port service site
+               IFS=. read -r user port service site <<-EOF
+                       ${conf%\/VirtualHost\.conf}
+                       EOF
+               assert 'test "${user:+set}"'
+               assert 'test "${service:+set}"'
+               assert 'test "${site:+set}"'
+               assert 'test "${port:+set}"'
+               local site_dir="$user.$port.$service.$site"
+               case $port in
+                (443)
+                       rule ssh -l root ' \
+                               sudo install -d -m 770 -o '"$user"' -g '"$user"' \
+                                /etc/apache2 \
+                                /etc/apache2/site.d/'"$site_dir"' \
+                                /etc/apache2/site.d/'"$site_dir"'/x509; \
+                               sudo install -m 644 -o '"$user"' -g '"$user"' /dev/stdin \
+                                /etc/apache2/site.d/'"$site_dir"'/x509/.gitignore <<-EOF
+                                       key.pem
+                                       EOF
+                        '
+                       rule _x509_service_key_send_deciphered $service \
+                        ~"$user"/etc/apache2/"$site_dir"/x509/key.pem -l root "$@"
+                       ;;
+                esac
+        done
+ }
+rule_dovecot_key_send () {
+       rule ssh -l root ' \
+               sudo install -d -m 770 -o root -g root \
+                /etc/dovecot/'"$vm_domainname"'/ \
+                /etc/dovecot/'"$vm_domainname"'/imap \
+                /etc/dovecot/'"$vm_domainname"'/imap/x509 ; \
+               sudo install -m 644 -o root -g root /dev/stdin \
+                /etc/dovecot/'"$vm_domainname"'/imap/x509/.gitignore <<-EOF
+                       key.pem
+                       EOF
+        '
+       rule _x509_service_key_send_deciphered imap \
+        /etc/dovecot/$vm_domainname/$service/x509/key.pem -l root "$@"
+ }
+rule_gitolite_configure () {
+       (
+       cd "$tool"/etc/gitolite
+       GIT_SSH=../../lib/ssh \
+       ssh-agent sh -c ' \
+               SSH_ASKPASS='"$tool"'/lib/ssh-pass \
+               SSH_ID=git \
+               ssh-add '"$tool"'/var/sec/ssh/git </dev/null && \
+               git push -v origin '"$*"
+       )
+ }
+rule_nginx_key_send () {
+       local -; set +f
+       for conf in "$tool"/etc/nginx/site.d/*/server.conf
+        do conf=${conf#"$tool"/etc/nginx/site.d/}
+               local user port service site
+               IFS=. read -r user port service site <<-EOF
+                       ${conf%\/server\.conf}
+                       EOF
+               assert 'test "${user:+set}"'
+               assert 'test "${service:+set}"'
+               assert 'test "${site:+set}"'
+               assert 'test "${port:+set}"'
+               local site_dir="$user.$port.$service.$site"
+               case $port in
+                (443)
+                       rule ssh -l root ' \
+                               sudo install -d -m 770 -o root -g root \
+                                /etc/nginx \
+                                /etc/nginx/site.d \
+                                /etc/nginx/site.d/'"$site_dir"' \
+                                /etc/nginx/site.d/'"$site_dir"'/x509; \
+                               sudo install -m 644 -o root -g root /dev/stdin \
+                                /etc/nginx/site.d/'"$site_dir"'/x509/.gitignore <<-EOF
+                                       key.pem
+                                       EOF
+                        '
+                       rule _x509_service_key_send_deciphered $service \
+                        /etc/nginx/"$site_dir"/x509/key.pem -l root "$@"
+                       ;;
+                esac
         done
  }
+rule_postfix_key_send () {
+       rule ssh -l root ' \
+               sudo install -d -m 770 -o root -g root \
+                /etc/postfix/'"$vm_domainname"'/ \
+                /etc/postfix/'"$vm_domainname"'/smptd \
+                /etc/postfix/'"$vm_domainname"'/smptd/x509; \
+               sudo install -m 644 -o root -g root /dev/stdin \
+                /etc/postfix/'"$vm_domainname"'/smtp/x509/.gitignore <<-EOF
+                       key.pem
+                       EOF
+               sudo install -m 644 -o root -g root /dev/stdin \
+                /etc/postfix/'"$vm_domainname"'/smtpd/x509/.gitignore <<-EOF
+                       key.pem
+                       EOF
+        '
+       rule _x509_service_key_send_deciphered smtpd \
+        /etc/postfix/$vm_domainname/smtpd/x509/key.pem -l root "$@"
+ }
 
 rule=${1:-help}
 ${1+shift}
-set "${TRACE:+-x}"
-rule_$rule "$@"
+case $rule in
+ (help);;
+ (*)
+       assert 'test ! "$(hostname --fqdn)" = "$vm_fqdn"' vm_fqdn
+       assert 'test ! "$(hostname --fqdn)" = "$vm_host"' vm_host
+       ;;
+ esac
+rule $rule "$@"