X-Git-Url: https://git.cyclocoop.org/?p=lhc%2Fateliers.git;a=blobdiff_plain;f=vm_remote;h=b7ce833a360773ac8f0f8512877f2ec9355c3dfd;hp=19ce8d4cb654f7de6d6d8ee9c94fa974dee6bda6;hb=fca2fed35a90c1085affdd48fcf1d16cbdd54597;hpb=fe76c838090f262ec477c6a73d1bf9d988033b56 diff --git a/vm_remote b/vm_remote index 19ce8d4..b7ce833 100755 --- a/vm_remote +++ b/vm_remote @@ -1,7 +1,7 @@ #!/bin/sh set -e -f ${DRY_RUN:+-n} -u -tool=${0%/*} -. "$tool"/lib/functions.sh +tool=$(cd "${0%/*}"; cd -) +. "$tool"/lib/rule.sh . "$tool"/etc/vm.sh rule_help () { # SYNTAX: [--hidden] @@ -23,24 +23,32 @@ rule_help () { # SYNTAX: [--hidden] EOF } -rule_git_config () { # DESCRIPTION: configure le .git local pour bien pousser +rule_git_configure () { # DESCRIPTION: configure ./.git correctement ( cd "$tool" git remote rm host || true git remote add host $vm_host:tool/vm - git config --replace remote.host.push HEAD:refs/heads/origin + git config --replace remote.host.push HEAD:refs/remotes/master git remote rm hosted || true git remote add hosted root@$vm_fqdn:tool/vm - git config --replace remote.hosted.push HEAD:refs/heads/origin + git config --replace remote.hosted.push HEAD:refs/remotes/master + git submodule update --init ) } rule_git_push () { # SYNTAX: {host|hosted} $git_push_options + ( + cd "$tool" local remote=${1#remote=}; shift - GIT_SSH=./vm_ssh git push -v "$remote" "$@" + GIT_SSH=./lib/ssh git push -v "$remote" "$@" + info "penser à faire : vm_hosted git_reset" + ) } rule_ssh () { - "$tool"/vm_ssh $vm_fqdn "$@" + "$tool"/lib/ssh $vm_fqdn "$@" + } +rule_mosh () { + mosh --ssh="$tool/lib/ssh $*" $vm_fqdn } rule__ssh_known_hosts_update () { rule ssh \ @@ -49,30 +57,155 @@ rule__ssh_known_hosts_update () { -o HashKnownHosts=no \ whoami } -rule_key_disk_send () { - gpg --decrypt var/lib/luks/$vm_fqdn.key.gpg | - "$tool"/vm_ssh root@$vm_fqdn "$@" \ + +rule__x509_service_key_send_deciphered () { # SYNTAX: $service $remote_destination ${ssh_options-} + local service="$1"; shift + local remote_destination="$1"; shift + gpg --decrypt "var/sec/x509/$vm_domainname/$service/key.pass.gpg" | + openssl rsa -passin 'stdin' \ + -in "var/sec/x509/$vm_domainname/$service/key.pem" \ + -out '/dev/stdout' | + rule ssh "$@" ' \ + install -m 400 -o root -g root \ + /dev/stdin \ + '"$remote_destination"' \ + ' + } + +rule_luks_key_send () { # DESCRIPTION: envoie la clef de déchiffrement des partitions au démarrage de la VM. + gpg --decrypt var/sec/luks/$vm_fqdn.key.gpg | + "$tool"/lib/ssh root@$vm_fqdn "$@" \ -o CheckHostIP=no \ -o HostKeyAlias=init.$vm_fqdn \ tee /lib/cryptsetup/passfifo \>/dev/null } -rule_key_disk_backup () { +rule_luks_key_backup () { # SYNTAX: ${gpg_options:---recipient $USER@} DESCRIPTION: sauvegarde localement les entêtes des partitions chiffrées. + test "${*+set}" || set -- --recipient "$USER@" for part in root var home do - mkdir -p var/lib/luks + mkdir -p var/sec/luks rule ssh -l root ' \ - tmp=$(mktemp) - cryptsetup luksHeaderBackup \ - /dev/$vm_lvm_vg/${vm_lvm_lv}_${part} \ - --header-backup-file "$tmp" \ - cat "$tmp" - shred --remove "$tmp" + set -e -f -u; + exec 2>/dev/null; + tmp=$(mktemp -t "luks.'"$part"'.XXXXXXXX.tmp" --dry-run); + cryptsetup luksHeaderBackup >/dev/null \ + /dev/'"$vm_lvm_vg"'/'"$vm_lvm_lv"'_'"$part"' \ + --header-backup-file "$tmp"; \ + cat "$tmp"; + shred >/dev/null --remove "$tmp"; \ ' | - gpg --encrypt --recipient $USER@ \ - -o var/lib/luks/${vm_lvm_lv}_${part}.luks.gpg + gpg "$@" --encrypt \ + -o var/sec/luks/${vm_lvm_lv}_${part}.luks.gpg done } +rule_apache2_key_send () { + local -; set +f + for conf in "$tool"/etc/apache2/site.d/*/VirtualHost.conf + do conf=${conf#"$tool"/etc/apache2/site.d/} + local user port service site + IFS=. read -r user port service site <<-EOF + ${conf%\/VirtualHost\.conf} + EOF + assert 'test "${user:+set}"' + assert 'test "${service:+set}"' + assert 'test "${site:+set}"' + assert 'test "${port:+set}"' + local site_dir="$user.$port.$service.$site" + case $port in + (443) + rule ssh -l root ' \ + sudo install -d -m 770 -o '"$user"' -g '"$user"' \ + /etc/apache2 \ + /etc/apache2/site.d/'"$site_dir"' \ + /etc/apache2/site.d/'"$site_dir"'/x509; \ + sudo install -m 644 -o '"$user"' -g '"$user"' /dev/stdin \ + /etc/apache2/site.d/'"$site_dir"'/x509/.gitignore <<-EOF + key.pem + EOF + ' + rule _x509_service_key_send_deciphered $service \ + ~"$user"/etc/apache2/"$site_dir"/x509/key.pem -l root "$@" + ;; + esac + done + } +rule_dovecot_key_send () { + rule ssh -l root ' \ + sudo install -d -m 770 -o root -g root \ + /etc/dovecot/'"$vm_domainname"'/ \ + /etc/dovecot/'"$vm_domainname"'/imap \ + /etc/dovecot/'"$vm_domainname"'/imap/x509 ; \ + sudo install -m 644 -o root -g root /dev/stdin \ + /etc/dovecot/'"$vm_domainname"'/imap/x509/.gitignore <<-EOF + key.pem + EOF + ' + rule _x509_service_key_send_deciphered imap \ + /etc/dovecot/$vm_domainname/$service/x509/key.pem -l root "$@" + } +rule_gitolite_configure () { + ( + cd "$tool"/etc/gitolite + GIT_SSH=../../lib/ssh \ + ssh-agent sh -c ' \ + SSH_ASKPASS='"$tool"'/lib/ssh-pass \ + SSH_ID=git \ + ssh-add '"$tool"'/var/sec/ssh/git