X-Git-Url: https://git.cyclocoop.org/?p=lhc%2Fateliers.git;a=blobdiff_plain;f=vm_remote;h=b7ce833a360773ac8f0f8512877f2ec9355c3dfd;hp=946706a09c2175bcb7b4986921a293316c427ca4;hb=fca2fed35a90c1085affdd48fcf1d16cbdd54597;hpb=5020fb59510a981bd021e5d34fee268d26eb40a0 diff --git a/vm_remote b/vm_remote index 946706a..b7ce833 100755 --- a/vm_remote +++ b/vm_remote @@ -1,84 +1,218 @@ #!/bin/sh set -e -f ${DRY_RUN:+-n} -u -tool=${0%/*} -. "$tool"/lib/functions.sh +tool=$(cd "${0%/*}"; cd -) +. "$tool"/lib/rule.sh . "$tool"/etc/vm.sh -rule_help () { +rule_help () { # SYNTAX: [--hidden] + local hidden; [ ${1:+set} ] || hidden=set cat >&2 <<-EOF - DESCRIPTION: ce script regroupe des fonctions utilitaires - pour gérer la VM _depuis_ une machine distante ; - il sert à la fois d'outil et de documentation. - Voir \`$tool/vm_host' pour les utilitaires côté machine hôte. - Voir \`$tool/vm_hosted' pour les utilitaires côté VM hébergée. + DESCRIPTION: + ce script regroupe des règles pour administrer la VM ($vm_fqdn) + _depuis_ une machine distante ; + il sert à la fois d'outil (aisément bidouillable) + et de documentation (préçise). + Voir \`$tool/vm_host' pour les règles côté machine hôte ($vm_host). + Voir \`$tool/vm_hosted' pour les règles côté VM hébergée ($vm_fqdn). SYNTAX: $0 \$RULE \${RULE}_SYNTAX RULES: - $(sed -ne 's/^rule_\([^_][^ ]*\) () {\( *#.*\|\)/\t\1\2/p' "$tool"/vm.sh "$0") + $(sed -ne "s/^rule_\(${hidden:+[^_]}[^ ]*\) () {\( *#.*\|\)/ \1\2/p" "$tool"/etc/vm.sh "$0") ENVIRONMENT: TRACE # affiche les commandes avant leur exécution - $(sed -ne 's/^readonly \([^ ][^ =]*\).*}\( *#.*\|\)$/\t$\1\2/p' "$tool"/vm.sh "$0") + $(sed -ne 's/^readonly \([^ ][^ =]*\).*}\( *#.*\|\)$/\t$\1\2/p' "$tool"/etc/vm.sh "$0") EOF } -rule_git_config () { +rule_git_configure () { # DESCRIPTION: configure ./.git correctement ( cd "$tool" - git config remote.host.url >/dev/null || + git remote rm host || true git remote add host $vm_host:tool/vm - git config --replace remote.host HEAD:refs/heads/origin - git config remote.$vm.url >/dev/null || - git remote add vm root@$vm_fqdn:tool/vm - git config --replace remote.$vm HEAD:refs/heads/origin + git config --replace remote.host.push HEAD:refs/remotes/master + git remote rm hosted || true + git remote add hosted root@$vm_fqdn:tool/vm + git config --replace remote.hosted.push HEAD:refs/remotes/master + git submodule update --init ) } -rule_git_push () { # SYNTAX: {host|vm} $git_commit_options +rule_git_push () { # SYNTAX: {host|hosted} $git_push_options + ( + cd "$tool" local remote=${1#remote=}; shift - GIT_SSH=./vm_ssh git push -v -f "$remote" + GIT_SSH=./lib/ssh git push -v "$remote" "$@" + info "penser à faire : vm_hosted git_reset" + ) } rule_ssh () { - "$tool"/vm_ssh $vm_fqdn "$@" + "$tool"/lib/ssh $vm_fqdn "$@" + } +rule_mosh () { + mosh --ssh="$tool/lib/ssh $*" $vm_fqdn } rule__ssh_known_hosts_update () { - "$tool"/vm_ssh $vm_fqdn "$@" \ + rule ssh \ -o StrictHostKeyChecking=no \ -o CheckHostIP=no \ -o HashKnownHosts=no \ whoami } -rule_disk_key_send () { - gpg --decrypt var/lib/luks/$vm_fqdn.key.gpg | - "$tool"/vm_ssh root@$vm_fqdn "$@" \ + +rule__x509_service_key_send_deciphered () { # SYNTAX: $service $remote_destination ${ssh_options-} + local service="$1"; shift + local remote_destination="$1"; shift + gpg --decrypt "var/sec/x509/$vm_domainname/$service/key.pass.gpg" | + openssl rsa -passin 'stdin' \ + -in "var/sec/x509/$vm_domainname/$service/key.pem" \ + -out '/dev/stdout' | + rule ssh "$@" ' \ + install -m 400 -o root -g root \ + /dev/stdin \ + '"$remote_destination"' \ + ' + } + +rule_luks_key_send () { # DESCRIPTION: envoie la clef de déchiffrement des partitions au démarrage de la VM. + gpg --decrypt var/sec/luks/$vm_fqdn.key.gpg | + "$tool"/lib/ssh root@$vm_fqdn "$@" \ -o CheckHostIP=no \ -o HostKeyAlias=init.$vm_fqdn \ tee /lib/cryptsetup/passfifo \>/dev/null } -rule_disk_key_backup () { +rule_luks_key_backup () { # SYNTAX: ${gpg_options:---recipient $USER@} DESCRIPTION: sauvegarde localement les entêtes des partitions chiffrées. + test "${*+set}" || set -- --recipient "$USER@" for part in root var home do - mkdir -p var/lib/luks - rule_ssh -l root ' \ - tmp=$(mktemp) - cryptsetup luksHeaderBackup \ - /dev/$vm_lvm_vg/${vm_lvm_lv}_${part} \ - --header-backup-file "$tmp" \ - cat "$tmp" - shred --remove "$tmp" + mkdir -p var/sec/luks + rule ssh -l root ' \ + set -e -f -u; + exec 2>/dev/null; + tmp=$(mktemp -t "luks.'"$part"'.XXXXXXXX.tmp" --dry-run); + cryptsetup luksHeaderBackup >/dev/null \ + /dev/'"$vm_lvm_vg"'/'"$vm_lvm_lv"'_'"$part"' \ + --header-backup-file "$tmp"; \ + cat "$tmp"; + shred >/dev/null --remove "$tmp"; \ ' | - gpg --encrypt --recipient $USER@ \ - -o var/lib/luks/${vm_lvm_lv}_${part}.luks.gpg + gpg "$@" --encrypt \ + -o var/sec/luks/${vm_lvm_lv}_${part}.luks.gpg done } +rule_apache2_key_send () { + local -; set +f + for conf in "$tool"/etc/apache2/site.d/*/VirtualHost.conf + do conf=${conf#"$tool"/etc/apache2/site.d/} + local user port service site + IFS=. read -r user port service site <<-EOF + ${conf%\/VirtualHost\.conf} + EOF + assert 'test "${user:+set}"' + assert 'test "${service:+set}"' + assert 'test "${site:+set}"' + assert 'test "${port:+set}"' + local site_dir="$user.$port.$service.$site" + case $port in + (443) + rule ssh -l root ' \ + sudo install -d -m 770 -o '"$user"' -g '"$user"' \ + /etc/apache2 \ + /etc/apache2/site.d/'"$site_dir"' \ + /etc/apache2/site.d/'"$site_dir"'/x509; \ + sudo install -m 644 -o '"$user"' -g '"$user"' /dev/stdin \ + /etc/apache2/site.d/'"$site_dir"'/x509/.gitignore <<-EOF + key.pem + EOF + ' + rule _x509_service_key_send_deciphered $service \ + ~"$user"/etc/apache2/"$site_dir"/x509/key.pem -l root "$@" + ;; + esac + done + } +rule_dovecot_key_send () { + rule ssh -l root ' \ + sudo install -d -m 770 -o root -g root \ + /etc/dovecot/'"$vm_domainname"'/ \ + /etc/dovecot/'"$vm_domainname"'/imap \ + /etc/dovecot/'"$vm_domainname"'/imap/x509 ; \ + sudo install -m 644 -o root -g root /dev/stdin \ + /etc/dovecot/'"$vm_domainname"'/imap/x509/.gitignore <<-EOF + key.pem + EOF + ' + rule _x509_service_key_send_deciphered imap \ + /etc/dovecot/$vm_domainname/$service/x509/key.pem -l root "$@" + } +rule_gitolite_configure () { + ( + cd "$tool"/etc/gitolite + GIT_SSH=../../lib/ssh \ + ssh-agent sh -c ' \ + SSH_ASKPASS='"$tool"'/lib/ssh-pass \ + SSH_ID=git \ + ssh-add '"$tool"'/var/sec/ssh/git