forked from evolix/evobackup
Compare commits
242 commits
Author | SHA1 | Date | |
---|---|---|---|
12e8d79d1c | |||
Jérémy Lecour | ff02816538 | ||
Jérémy Lecour | d2daef52d9 | ||
Jérémy Lecour | 9745d78a16 | ||
Jérémy Lecour | 4d9d846703 | ||
Jérémy Lecour | 3f248cdbaa | ||
Ludovic Poujol | c01e6d11cd | ||
Jérémy Dubois | 1efca713c0 | ||
Jérémy Lecour | 5cbc2cbf42 | ||
Jérémy Lecour | 3b0e6934d9 | ||
Jérémy Lecour | 9c3813716e | ||
Jérémy Lecour | 0587b5043f | ||
Jérémy Lecour | 114c65684c | ||
Jérémy Lecour | 960dd97d68 | ||
Jérémy Dubois | 959077327a | ||
Jérémy Lecour | a658e2aa7f | ||
Jérémy Lecour | 8330918aad | ||
William Hirigoyen (Evolix) | 595be40c38 | ||
Eric Morino | 7f0bb53cd2 | ||
William Hirigoyen (Evolix) | efd8d980c2 | ||
William Hirigoyen (Evolix) | 43826224e3 | ||
Jérémy Lecour | 0a3d7996a7 | ||
Jérémy Lecour | dc70f9937c | ||
Jérémy Lecour | 8020a357a6 | ||
Jérémy Lecour | 8b72415669 | ||
Jérémy Lecour | 0705625dbd | ||
Jérémy Lecour | 15c9682be1 | ||
Jérémy Lecour | fa8d8cfd84 | ||
Jérémy Lecour | aba4a9f992 | ||
Jérémy Lecour | 82e111adc8 | ||
William Hirigoyen (Evolix) | 06f6c54d8c | ||
Jérémy Lecour | 45f057bce8 | ||
Jérémy Lecour | 3042b72a78 | ||
William Hirigoyen (Evolix) | e6d8f73b42 | ||
William Hirigoyen (Evolix) | b9bd67488b | ||
William Hirigoyen (Evolix) | f8db747970 | ||
William Hirigoyen (Evolix) | 0b777b4a3f | ||
4f9b56d7a4 | |||
William Hirigoyen (Evolix) | bca2d1147e | ||
William Hirigoyen (Evolix) | 0aa233d939 | ||
William Hirigoyen (Evolix) | edcec2d619 | ||
William Hirigoyen (Evolix) | 58ebf9d2ef | ||
Jérémy Lecour | 4195c3bea5 | ||
William Hirigoyen (Evolix) | ed1d2bf660 | ||
William Hirigoyen (Evolix) | 4e7d5506de | ||
Jérémy Lecour | 3be8b638fe | ||
Jérémy Lecour | da6e59a37b | ||
Ludovic Poujol | 0565ad831a | ||
Jérémy Lecour | d6dd91eb1f | ||
Jérémy Lecour | a2c6d073a7 | ||
Jérémy Lecour | 09f1789a53 | ||
Jérémy Lecour | 1960e9097a | ||
Jérémy Lecour | 7c6fefd00b | ||
Jérémy Lecour | b8f0a377d9 | ||
Jérémy Lecour | ec4502ef9b | ||
Jérémy Lecour | 9e1d8636ff | ||
Jérémy Lecour | d8e1ce9fb1 | ||
Jérémy Lecour | c38ec89010 | ||
Jérémy Lecour | b1b4d8b19f | ||
Jérémy Lecour | 49fff6e85d | ||
Jérémy Lecour | 134faf3e47 | ||
Jérémy Lecour | d467690ff5 | ||
Jérémy Lecour | a50991226c | ||
Eric Morino | 31fb33adc4 | ||
Jérémy Lecour | 0090595d40 | ||
Jérémy Dubois | 582e8e0c9c | ||
Jérémy Lecour | afb7427e40 | ||
Jérémy Lecour | fe0f655f07 | ||
Jérémy Lecour | 937e75daa7 | ||
Jérémy Lecour | 82dbb29511 | ||
Jérémy Lecour | 21f4544016 | ||
Jérémy Lecour | eecd105d33 | ||
Jérémy Lecour | f84e9ec02d | ||
Jérémy Lecour | 34de467b00 | ||
3215ab2fa3 | |||
c27cb81b57 | |||
Jérémy Lecour | a41eb2a218 | ||
Jérémy Lecour | b7cddcac27 | ||
Jérémy Lecour | 68a7da6b88 | ||
Jérémy Dubois | 53a1309d69 | ||
da8451e649 | |||
Jérémy Lecour | d991fff710 | ||
Jérémy Lecour | 1a52f012a6 | ||
Jérémy Lecour | fd6c5e4a12 | ||
Jérémy Lecour | 3aef89053b | ||
Jérémy Dubois | 34c06bfc9a | ||
Jérémy Lecour | 01a19ad2da | ||
Jérémy Lecour | a7dc09bb46 | ||
Jérémy Lecour | 76a298c042 | ||
Jérémy Lecour | f9018738b9 | ||
Jérémy Lecour | 3c5a646ae3 | ||
Jérémy Lecour | bf56c16ed2 | ||
Jérémy Lecour | 2ccd8c1b8d | ||
Jérémy Lecour | 9eae80c002 | ||
Jérémy Lecour | 05c3715c6a | ||
Jérémy Lecour | 2ad1032f9d | ||
Jérémy Lecour | c1fbe6394f | ||
Jérémy Lecour | 6fe81c7077 | ||
Jérémy Lecour | cf95909f0b | ||
Jérémy Lecour | 88899fb0fe | ||
Jérémy Lecour | 08d113d2ce | ||
Jérémy Lecour | 2057a6fd80 | ||
Jérémy Lecour | 9f5a4066ee | ||
Jérémy Lecour | af68d9951b | ||
Jérémy Lecour | 69146f1f9f | ||
Jérémy Lecour | 1b9c56dbfd | ||
Jérémy Lecour | 7d1964370d | ||
Jérémy Lecour | 39901967a7 | ||
Jérémy Lecour | e5d40f8fe4 | ||
Jérémy Lecour | 08a2e067c2 | ||
Jérémy Lecour | bc6a571595 | ||
Jérémy Lecour | ea9aac50a3 | ||
Jérémy Lecour | 1063dfe74d | ||
Jérémy Lecour | c141986a6d | ||
Jérémy Lecour | 1f29162da4 | ||
Jérémy Lecour | 3a6e21dce8 | ||
Jérémy Lecour | 251d0c14d6 | ||
Jérémy Lecour | 0ad1e8d342 | ||
Jérémy Lecour | d07b493131 | ||
Bruno TATU | 049bdb9216 | ||
Jérémy Lecour | 505e0f7f53 | ||
Jérémy Lecour | 67bbb5c100 | ||
Jérémy Lecour | 505bdb9117 | ||
Jérémy Lecour | 80fb38d534 | ||
Jérémy Lecour | b659e9d8c5 | ||
Jérémy Lecour | df180e4d03 | ||
Jérémy Lecour | 3ac79da9b2 | ||
Jérémy Lecour | 8311e33c76 | ||
Jérémy Lecour | 8ed06511d9 | ||
Jérémy Lecour | 9cd94dabc2 | ||
Jérémy Lecour | ebfc16f65a | ||
Jérémy Lecour | b3529f2131 | ||
Jérémy Lecour | 64ec60428d | ||
Jérémy Lecour | 807dd44408 | ||
Jérémy Lecour | 1cbb982d02 | ||
Jérémy Lecour | f8395cf445 | ||
Patrick Marchand | 806714c9b6 | ||
Jérémy Lecour | fa109e216b | ||
Jérémy Lecour | 4829232a65 | ||
Jérémy Lecour | ea912c40f0 | ||
Jérémy Lecour | 5f3cc873a1 | ||
Jérémy Lecour | 11bb59831c | ||
Jérémy Lecour | ea140f6137 | ||
Jérémy Lecour | 86e88ad2c2 | ||
Patrick Marchand | ec994f7e2c | ||
Jérémy Lecour | a937049780 | ||
Jérémy Lecour | 205e3774a9 | ||
Jérémy Lecour | 35d257d9c7 | ||
Jérémy Lecour | 18e5173600 | ||
Jérémy Lecour | 0bad1a2cba | ||
Jérémy Lecour | 1846be4e45 | ||
Jérémy Lecour | 478703d96e | ||
Jérémy Lecour | 32f242fe9c | ||
Jérémy Lecour | f66d832d3a | ||
Jérémy Lecour | 096fe95b2f | ||
Jérémy Lecour | 723c8511e1 | ||
Jérémy Lecour | 7a13a42ad2 | ||
Jérémy Lecour | 5ae3f04098 | ||
Jérémy Lecour | 7d9043acc9 | ||
Jérémy Lecour | f7e8324ba5 | ||
Jérémy Lecour | 0dcd72d3f2 | ||
Jérémy Lecour | 4c9cbf976e | ||
Jérémy Lecour | 14c4b63e69 | ||
Jérémy Lecour | 2fd063fee4 | ||
Jérémy Lecour | 8e2ed4eae7 | ||
Patrick Marchand | d2b6094f7f | ||
Jérémy Lecour | 731be98193 | ||
Jérémy Lecour | 9057a2780a | ||
Jérémy Lecour | 9c6be0e74c | ||
Jérémy Lecour | 7e5aad727f | ||
Jérémy Lecour | 2d4cae58bc | ||
Jérémy Lecour | 35bed002f0 | ||
Jérémy Lecour | 908e3c8b3a | ||
Jérémy Lecour | e01a705cff | ||
Jérémy Lecour | 8e780eafed | ||
Jérémy Lecour | e14ca8dff3 | ||
Jérémy Lecour | b1c45b1738 | ||
Jérémy Lecour | 3198ba7f37 | ||
Jérémy Lecour | 401c8cd34c | ||
Jérémy Lecour | 51940220dd | ||
Jérémy Lecour | 11f84a9f7b | ||
Jérémy Lecour | bdc6b4fa4d | ||
Jérémy Lecour | a0b3c4fd26 | ||
Jérémy Lecour | c2f39a0218 | ||
Jérémy Lecour | effecc689d | ||
Jérémy Lecour | 8099dcbbfe | ||
Jérémy Lecour | e1208ed2b8 | ||
Jérémy Lecour | e5997400cd | ||
Jérémy Lecour | 53b8fe8376 | ||
Jérémy Lecour | 5a90ae8a16 | ||
Jérémy Lecour | 86111acfea | ||
Jérémy Lecour | 2ef20df5ca | ||
Jérémy Lecour | 5937a2d7aa | ||
Jérémy Lecour | d29743357a | ||
Jérémy Lecour | 6377ffd09e | ||
Jérémy Lecour | f6665c646b | ||
Jérémy Lecour | 41866d8236 | ||
Jérémy Lecour | db70bd21e9 | ||
Jérémy Lecour | 3f3ffbfffd | ||
Jérémy Lecour | f8ef5b22cd | ||
Jérémy Lecour | 9bbcb852b0 | ||
Jérémy Lecour | 88dd2e448b | ||
Jérémy Lecour | c920e91304 | ||
Jérémy Lecour | 492433133e | ||
Jérémy Lecour | 09d2014db3 | ||
Jérémy Lecour | b141daca29 | ||
Jérémy Lecour | 092b204be2 | ||
Jérémy Lecour | 7a80b433d6 | ||
Jérémy Lecour | 1da1c8a7fe | ||
Jérémy Lecour | f36771d1f0 | ||
Jérémy Lecour | 4e6c5cfb20 | ||
Jérémy Lecour | 45036bf731 | ||
Jérémy Lecour | 4bf1ccecae | ||
Jérémy Lecour | 54e66aea84 | ||
Jérémy Lecour | c58878b065 | ||
Jérémy Lecour | 4ef7ab2dde | ||
Jérémy Lecour | 7a040bac20 | ||
Jérémy Lecour | c7816abd1e | ||
Jérémy Lecour | aa8bc9381b | ||
Jérémy Lecour | 9136d3cff4 | ||
Jérémy Lecour | 1652ebeb67 | ||
Jérémy Lecour | 5432c2eee8 | ||
Jérémy Lecour | 4c2480906f | ||
Jérémy Lecour | 779dd9c518 | ||
Jérémy Lecour | 01cc972d83 | ||
Jérémy Lecour | 77d0681d14 | ||
Jérémy Lecour | e9e8a790ba | ||
Jérémy Lecour | e7e3683944 | ||
Jérémy Lecour | 1f59065a17 | ||
Jérémy Lecour | 018392e8e3 | ||
Jérémy Lecour | a5c0745d09 | ||
Jérémy Lecour | 5cc6d9e28f | ||
Jérémy Lecour | 10cc3695a4 | ||
Jérémy Lecour | 9ae2168b1b | ||
Jérémy Lecour | 6cf49b2a8b | ||
Jérémy Lecour | 0b5164b91c | ||
Jérémy Lecour | 14012ca9b0 | ||
Jérémy Lecour | 1bc5d4ed93 | ||
Jérémy Dubois | 1fb0af4255 | ||
Jérémy Dubois | e043118a78 | ||
Jérémy Lecour | 81a5883d72 | ||
Jérémy Lecour | 34443b18bd |
41
.drone.yml
Normal file
41
.drone.yml
Normal file
|
@ -0,0 +1,41 @@
|
|||
kind: pipeline
|
||||
name: default
|
||||
|
||||
steps:
|
||||
- name: build debian package
|
||||
image: evolix/gbp:latest
|
||||
branches:
|
||||
- debian
|
||||
commands:
|
||||
- mk-build-deps --install --remove debian/control
|
||||
- git clean --force
|
||||
- gbp buildpackage
|
||||
volumes:
|
||||
- name: tmp
|
||||
path: /tmp
|
||||
when:
|
||||
branch:
|
||||
- debian
|
||||
|
||||
- name: upload debian package
|
||||
image: drillster/drone-rsync
|
||||
settings:
|
||||
hosts: ["pub.evolix.net"]
|
||||
port: 22
|
||||
user: droneci
|
||||
key:
|
||||
from_secret: drone_private_key
|
||||
target: /home/droneci/bkctld/
|
||||
source: /tmp/bkctld/
|
||||
delete: true
|
||||
volumes:
|
||||
- name: tmp
|
||||
path: /tmp
|
||||
when:
|
||||
branch:
|
||||
- debian
|
||||
|
||||
volumes:
|
||||
- name: tmp
|
||||
host:
|
||||
path: /tmp
|
100
README.md
100
README.md
|
@ -1,100 +0,0 @@
|
|||
Bkctld (aka evobackup)
|
||||
=========
|
||||
|
||||
Bkctld is a shell script that creates and manages a backup server
|
||||
which can handle the backups of many other servers (clients). It
|
||||
is licensed under the AGPLv3.
|
||||
|
||||
It uses SSH chroots (called "jails" in the FreeBSD world) to sandbox
|
||||
every clients backups. Each client will upload it's data every day
|
||||
using rsync in it's chroot (using the root account). Prior backups
|
||||
are stored incrementally outside of the chroot using hard links or
|
||||
BTRFS snapshots. (So they can not be affected by the client).
|
||||
|
||||
Using this method, we can keep a large quantity of backups of each
|
||||
client securely and efficiently.
|
||||
|
||||
~~~
|
||||
Backup server
|
||||
************
|
||||
Server 1 ------ SSH/rsync -------> * tcp/2222 *
|
||||
* *
|
||||
Server 2 ------ SSH/rsync -------> * tcp/2223 *
|
||||
************
|
||||
~~~
|
||||
|
||||
This method uses standard tools (ssh, rsync, cp -al, btrfs subvolume)
|
||||
and has been used for many years by Evolix to backup hundreds of
|
||||
servers, totaling many terabytes of data, each day. bkctld has
|
||||
been tested on Debian Jessie and should be compatible with other
|
||||
Debian versions or derived distributions like Ubuntu.
|
||||
|
||||
A large enough volume must be mounted on `/backup`, we recommend
|
||||
the usage of **BTRFS** so you can use sub-volumes and snapshots.
|
||||
This volume can also be encrypted with **LUKS**.
|
||||
|
||||
## Install
|
||||
|
||||
See the [installation guide](docs/install.md) for instructions.
|
||||
|
||||
## Testing
|
||||
|
||||
You can deploy test environments with Vagrant :
|
||||
|
||||
~~~
|
||||
vagrant up
|
||||
~~~
|
||||
|
||||
### Deployment
|
||||
|
||||
Launch rsync-auto in a terminal for automatic synchronization of
|
||||
your local code with Vagrant VM :
|
||||
|
||||
~~~
|
||||
vagrant rsync-auto
|
||||
~~~
|
||||
|
||||
### Bats
|
||||
|
||||
You can run [bats](https://github.com/sstephenson/bats) tests with
|
||||
the *test* provision :
|
||||
|
||||
~~~
|
||||
vagrant provision --provision-with test
|
||||
~~~
|
||||
|
||||
## Usage
|
||||
|
||||
See [docs/usage.md](docs/usage.md).
|
||||
|
||||
The man(1) page, in troff(7) language, can be generated with pandoc:
|
||||
|
||||
~~~
|
||||
pandoc -f markdown \
|
||||
-t man usage.md \
|
||||
--template default.man \
|
||||
-V title=bkctld \
|
||||
-V section=8 \
|
||||
-V date="$(date '+%d %b %Y')" \
|
||||
-V footer="$(git describe --tags)" \
|
||||
-V header="bkctld man page"
|
||||
~~~
|
||||
|
||||
#### Client configuration
|
||||
|
||||
You can save various systems in the evobackup jails : Linux, BSD,
|
||||
Windows, MacOSX. The only prerequisite is the rsync command.
|
||||
|
||||
~~~
|
||||
rsync -av -e "ssh -p SSH_PORT" /home/ root@SERVER_NAME:/var/backup/home/
|
||||
~~~
|
||||
|
||||
An example synchronization script is present in `zzz_evobackup`,
|
||||
clone the evobackup repository and read the **CLIENT CONFIGURATION**
|
||||
section of the manual.
|
||||
|
||||
~~~
|
||||
git clone https://forge.evolix.org/evobackup.git
|
||||
cd evobackup
|
||||
man ./docs/bkctld.8
|
||||
~~~
|
|
@ -1,28 +0,0 @@
|
|||
# bkctld(8) completion
|
||||
#
|
||||
# Copyright (c) 2017 Victor Laborie <vlaborie@evolix.fr>
|
||||
#
|
||||
|
||||
function _bkctld()
|
||||
{
|
||||
local cur prev commands jails keys
|
||||
|
||||
cur=${COMP_WORDS[COMP_CWORD]};
|
||||
prev=${COMP_WORDS[COMP_CWORD-1]};
|
||||
commands=$(find /usr/lib/bkctld/ -name "bkctld-*" -exec basename {} \;|sed 's/^bkctld-//')
|
||||
|
||||
if [ $COMP_CWORD -eq 1 ]; then
|
||||
COMPREPLY=($(compgen -W '${commands}' -- ${cur}))
|
||||
elif [ $COMP_CWORD -eq 2 ]; then
|
||||
[ -f /etc/default/bkctld ] && source /etc/default/bkctld
|
||||
[ -z "${JAILDIR}" ] && JAILDIR='/backup/jails'
|
||||
jails=$(ls "${JAILDIR}")
|
||||
COMPREPLY=($(compgen -W "${jails}" -- ${cur}))
|
||||
elif [ $COMP_CWORD -eq 3 ]; then
|
||||
keys=$(ls *.pub)
|
||||
COMPREPLY=($(compgen -W "${keys}" -- ${cur}))
|
||||
fi
|
||||
|
||||
return 0
|
||||
} &&
|
||||
complete -F _bkctld bkctld
|
51
bkctld
51
bkctld
|
@ -1,51 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# bkctld is a shell script to create and manage a backup server which will
|
||||
# handle the backup of many servers (clients).
|
||||
#
|
||||
# Author: Victor Laborie <vlaborie@evolix.fr>
|
||||
# Contributor: Benoît Série <bserie@evolix.fr>, Gregory Colpart <reg@evolix.fr>, Romain Dessort <rdessort@evolix.fr>, Tristan Pilat <tpilat@evolix.fr>
|
||||
# Licence: AGPLv3
|
||||
#
|
||||
|
||||
set -u
|
||||
|
||||
[ "$(id -u)" -ne 0 ] && error "You need to be root to run ${0} !"
|
||||
|
||||
[ -d './lib' ] && LIBDIR='lib'
|
||||
[ -d '/usr/lib/bkctld' ] && LIBDIR='/usr/lib/bkctld'
|
||||
. "${LIBDIR}/config"
|
||||
|
||||
subcommand="${1:-}"
|
||||
jail="${2:-}"
|
||||
option="${3:-}"
|
||||
|
||||
if [ ! -x "${LIBDIR}/bkctld-${subcommand}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
|
||||
case "${subcommand}" in
|
||||
"inc" | "rm" | "check" | "stats" | "help" | "list")
|
||||
"${LIBDIR}/bkctld-${subcommand}"
|
||||
;;
|
||||
"init" | "is-on")
|
||||
"${LIBDIR}/bkctld-${subcommand}" "${jail}"
|
||||
;;
|
||||
"key" | "port" | "ip")
|
||||
"${LIBDIR}/bkctld-${subcommand}" "${jail}" "${option}"
|
||||
;;
|
||||
"start" | "stop" | "reload" | "restart" | "sync" | "update" | "remove" | "firewall")
|
||||
if [ "${jail}" = "all" ]; then
|
||||
"${LIBDIR}/bkctld-list"|xargs --no-run-if-empty --max-args=1 --max-procs=0 "${LIBDIR}/bkctld-${subcommand}"
|
||||
else
|
||||
"${LIBDIR}/bkctld-${subcommand}" "${jail}"
|
||||
fi
|
||||
;;
|
||||
"status")
|
||||
if [ -z "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-list"|xargs --no-run-if-empty --max-args=1 "${LIBDIR}/bkctld-${subcommand}"
|
||||
else
|
||||
"${LIBDIR}/bkctld-${subcommand}" "${jail}"
|
||||
fi
|
||||
;;
|
||||
esac
|
|
@ -1,52 +0,0 @@
|
|||
#!/bin/sh
|
||||
|
||||
EVOBACKUP_CONFIGS="/etc/evobackup/*"
|
||||
|
||||
relative_date() {
|
||||
format=$(echo $1 | cut -d'.' -f1)
|
||||
time_jump=$(echo $1 | cut -d'.' -f2)
|
||||
|
||||
reference_date=$(date "${format}")
|
||||
past_date=$(date --date "${reference_date} ${time_jump}" +"%Y-%m-%d")
|
||||
|
||||
echo ${past_date}
|
||||
}
|
||||
inc_exists() {
|
||||
ls -d /backup/incs/$1 > /dev/null 2>&1
|
||||
}
|
||||
jail_exists() {
|
||||
ls -d /backup/jails/$1 > /dev/null 2>&1
|
||||
}
|
||||
# default return value is 0 (succes)
|
||||
rc=0
|
||||
# loop for each configured jail
|
||||
for file in ${EVOBACKUP_CONFIGS}; do
|
||||
jail_name=$(basename ${file})
|
||||
# check if jail is present
|
||||
if jail_exists ${jail_name}; then
|
||||
# get jail last configuration date
|
||||
jail_config_age=$(date --date "$(stat -c %y ${file})" +"%s")
|
||||
# loop for each line in jail configuration
|
||||
for line in $(cat ${file}); do
|
||||
# inc date in ISO format
|
||||
inc_date=$(relative_date ${line})
|
||||
# inc date in seconds from epoch
|
||||
inc_age=$(date --date "${inc_date}" +"%s")
|
||||
# check if the configuration changed after the inc date
|
||||
if [ "${jail_config_age}" -lt "${inc_age}" ]; then
|
||||
# Error if inc is not found
|
||||
if ! inc_exists ${jail_name}/${inc_date}*; then
|
||||
echo "ERROR: inc is missing \`${jail_name}/${inc_date}'" >&2
|
||||
rc=1
|
||||
fi
|
||||
else
|
||||
echo "INFO: no inc expected for ${inc_date} \`${jail_name}'"
|
||||
fi
|
||||
done
|
||||
else
|
||||
echo "ERROR: jail is missing \`${jail_name}'" >&2
|
||||
rc=1
|
||||
fi
|
||||
done
|
||||
|
||||
exit $rc
|
|
@ -1,20 +0,0 @@
|
|||
#!/bin/sh
|
||||
|
||||
inc_exists() {
|
||||
ls -d /backup/incs/$1 > /dev/null 2>&1
|
||||
}
|
||||
# default return value is 0 (succes)
|
||||
rc=0
|
||||
# loop for each found jail
|
||||
for file in /backup/jails/*; do
|
||||
jail_name=$(basename ${file})
|
||||
# inc date in seconds from epoch
|
||||
inc_date=$(date --date "yesterday" +"%Y-%m-%d")
|
||||
# Error if inc is not found
|
||||
if ! inc_exists ${jail_name}/${inc_date}*; then
|
||||
echo "ERROR: inc is missing \`${jail_name}/${inc_date}'" >&2
|
||||
rc=1
|
||||
fi
|
||||
done
|
||||
|
||||
exit $rc
|
27
client/CHANGELOG.md
Normal file
27
client/CHANGELOG.md
Normal file
|
@ -0,0 +1,27 @@
|
|||
# Changelog
|
||||
All notable changes to this project will be documented in this file.
|
||||
|
||||
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
|
||||
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
|
||||
|
||||
## [Unreleased]
|
||||
|
||||
### Added
|
||||
|
||||
### Changed
|
||||
|
||||
* Use --dump-dir instead of --backup-dir to supress dump-server-state warning
|
||||
|
||||
### Deprecated
|
||||
|
||||
### Removed
|
||||
|
||||
### Fixed
|
||||
|
||||
* Make start_time and stop_time compatible with OpenBSD
|
||||
|
||||
### Security
|
||||
|
||||
## [22.03]
|
||||
|
||||
Split client and server parts of the project
|
661
client/LICENSE
Normal file
661
client/LICENSE
Normal file
|
@ -0,0 +1,661 @@
|
|||
GNU AFFERO GENERAL PUBLIC LICENSE
|
||||
Version 3, 19 November 2007
|
||||
|
||||
Copyright (C) 2007 Free Software Foundation, Inc. <https://fsf.org/>
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU Affero General Public License is a free, copyleft license for
|
||||
software and other kinds of works, specifically designed to ensure
|
||||
cooperation with the community in the case of network server software.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
our General Public Licenses are intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
Developers that use our General Public Licenses protect your rights
|
||||
with two steps: (1) assert copyright on the software, and (2) offer
|
||||
you this License which gives you legal permission to copy, distribute
|
||||
and/or modify the software.
|
||||
|
||||
A secondary benefit of defending all users' freedom is that
|
||||
improvements made in alternate versions of the program, if they
|
||||
receive widespread use, become available for other developers to
|
||||
incorporate. Many developers of free software are heartened and
|
||||
encouraged by the resulting cooperation. However, in the case of
|
||||
software used on network servers, this result may fail to come about.
|
||||
The GNU General Public License permits making a modified version and
|
||||
letting the public access it on a server without ever releasing its
|
||||
source code to the public.
|
||||
|
||||
The GNU Affero General Public License is designed specifically to
|
||||
ensure that, in such cases, the modified source code becomes available
|
||||
to the community. It requires the operator of a network server to
|
||||
provide the source code of the modified version running there to the
|
||||
users of that server. Therefore, public use of a modified version, on
|
||||
a publicly accessible server, gives the public access to the source
|
||||
code of the modified version.
|
||||
|
||||
An older license, called the Affero General Public License and
|
||||
published by Affero, was designed to accomplish similar goals. This is
|
||||
a different license, not a version of the Affero GPL, but Affero has
|
||||
released a new version of the Affero GPL which permits relicensing under
|
||||
this license.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU Affero General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Remote Network Interaction; Use with the GNU General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, if you modify the
|
||||
Program, your modified version must prominently offer all users
|
||||
interacting with it remotely through a computer network (if your version
|
||||
supports such interaction) an opportunity to receive the Corresponding
|
||||
Source of your version by providing access to the Corresponding Source
|
||||
from a network server at no charge, through some standard or customary
|
||||
means of facilitating copying of software. This Corresponding Source
|
||||
shall include the Corresponding Source for any work covered by version 3
|
||||
of the GNU General Public License that is incorporated pursuant to the
|
||||
following paragraph.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the work with which it is combined will remain governed by version
|
||||
3 of the GNU General Public License.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU Affero General Public License from time to time. Such new versions
|
||||
will be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU Affero General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU Affero General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU Affero General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
state the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
<one line to give the program's name and a brief idea of what it does.>
|
||||
Copyright (C) <year> <name of author>
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU Affero General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU Affero General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Affero General Public License
|
||||
along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If your software can interact with users remotely through a computer
|
||||
network, you should also make sure that it provides a way for users to
|
||||
get its source. For example, if your program is a web application, its
|
||||
interface could display a "Source" link that leads users to an archive
|
||||
of the code. There are many ways you could offer source, and different
|
||||
solutions will be better for different programs; see section 13 for the
|
||||
specific requirements.
|
||||
|
||||
You should also get your employer (if you work as a programmer) or school,
|
||||
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||
For more information on this, and how to apply and follow the GNU AGPL, see
|
||||
<https://www.gnu.org/licenses/>.
|
|
@ -15,8 +15,13 @@
|
|||
#
|
||||
# /!\ DON'T FORGET TO SET "MAIL" and "SERVERS" VARIABLES
|
||||
|
||||
# Fail on unassigned variables
|
||||
set -u
|
||||
|
||||
##### Configuration ###################################################
|
||||
|
||||
VERSION="22.03"
|
||||
|
||||
# email adress for notifications
|
||||
MAIL=jdoe@example.com
|
||||
|
||||
|
@ -27,25 +32,31 @@ SERVERS="node0.backup.example.com:2XXX node1.backup.example.com:2XXX"
|
|||
SERVERS_FALLBACK=${SERVERS_FALLBACK:-1}
|
||||
|
||||
# timeout (in seconds) for SSH connections
|
||||
SSH_CONNECT_TIMEOUT=${SSH_CONNECT_TIMEOUT:-30}
|
||||
SSH_CONNECT_TIMEOUT=${SSH_CONNECT_TIMEOUT:-90}
|
||||
|
||||
## We use /home/backup : feel free to use your own dir
|
||||
# We use /home/backup : feel free to use your own dir
|
||||
LOCAL_BACKUP_DIR="/home/backup"
|
||||
|
||||
# You can set "linux" or "bsd" manually or let it choose automatically
|
||||
SYSTEM=$(uname | tr '[:upper:]' '[:lower:]')
|
||||
|
||||
# Change these 2 variables if you have more than one backup cron
|
||||
PIDFILE="/var/run/evobackup.pid"
|
||||
# Store pid in a file named after this program's name
|
||||
PROGNAME=$(basename "$0")
|
||||
PIDFILE="/var/run/${PROGNAME}.pid"
|
||||
|
||||
# Customize the log path if you have multiple scripts and with separate logs
|
||||
LOGFILE="/var/log/evobackup.log"
|
||||
|
||||
## Enable/Disable tasks
|
||||
# Enable/Disable tasks
|
||||
LOCAL_TASKS=${LOCAL_TASKS:-1}
|
||||
SYNC_TASKS=${SYNC_TASKS:-1}
|
||||
|
||||
HOSTNAME=$(hostname)
|
||||
|
||||
##### SETUP AND FUNCTIONS #############################################
|
||||
|
||||
BEGINNING=$(/bin/date +"%d-%m-%Y ; %H:%M")
|
||||
START_EPOCH=$(/bin/date +%s)
|
||||
DATE_FORMAT="%Y-%m-%d %H:%M:%S"
|
||||
|
||||
# shellcheck disable=SC2174
|
||||
mkdir -p -m 700 ${LOCAL_BACKUP_DIR}
|
||||
|
@ -80,7 +91,8 @@ test_server() {
|
|||
else
|
||||
# SSH connection failed
|
||||
new_error=$(printf "Failed to connect to \`%s' within %s seconds" "${item}" "${SSH_CONNECT_TIMEOUT}")
|
||||
SERVERS_SSH_ERRORS=$(printf "%s\n%s" "${SERVERS_SSH_ERRORS}" "${new_error}" | sed -e '/^$/d')
|
||||
log "${new_error}"
|
||||
SERVERS_SSH_ERRORS=$(printf "%s\\n%s" "${SERVERS_SSH_ERRORS}" "${new_error}" | sed -e '/^$/d')
|
||||
|
||||
return 1
|
||||
fi
|
||||
|
@ -93,14 +105,16 @@ pick_server() {
|
|||
if [ "${increment}" -ge "${list_length}" ]; then
|
||||
# We've reached the end of the list
|
||||
new_error="No more server available"
|
||||
SERVERS_SSH_ERRORS=$(printf "%s\n%s" "${SERVERS_SSH_ERRORS}" "${new_error}" | sed -e '/^$/d')
|
||||
log "${new_error}"
|
||||
SERVERS_SSH_ERRORS=$(printf "%s\\n%s" "${SERVERS_SSH_ERRORS}" "${new_error}" | sed -e '/^$/d')
|
||||
|
||||
printf "%s\n" "${SERVERS_SSH_ERRORS}" >&2
|
||||
# Log errors to stderr
|
||||
printf "%s\\n" "${SERVERS_SSH_ERRORS}" >&2
|
||||
return 1
|
||||
fi
|
||||
|
||||
# Extract the day of month, without leading 0 (which would give an octal based number)
|
||||
today=$(date +%e)
|
||||
# Extract the day of month, without leading 0 (which would give an octal based number)
|
||||
today=$(/bin/date +%e)
|
||||
# A salt is useful to randomize the starting point in the list
|
||||
# but stay identical each time it's called for a server (based on hostname).
|
||||
salt=$(hostname | cksum | cut -d' ' -f1)
|
||||
|
@ -112,41 +126,87 @@ pick_server() {
|
|||
|
||||
echo "${SERVERS}" | cut -d' ' -f${field}
|
||||
}
|
||||
log() {
|
||||
msg="${1:-$(cat /dev/stdin)}"
|
||||
pid=$$
|
||||
printf "[%s] %s[%s]: %s\\n" \
|
||||
"$(/bin/date +"${DATE_FORMAT}")" "${PROGNAME}" "${pid}" "${msg}" \
|
||||
>> "${LOGFILE}"
|
||||
}
|
||||
|
||||
log "START GLOBAL - VERSION=${VERSION} LOCAL_TASKS=${LOCAL_TASKS} SYNC_TASKS=${SYNC_TASKS}"
|
||||
|
||||
## Verify other evobackup process and kill if needed
|
||||
if [ -e "${PIDFILE}" ]; then
|
||||
pid=$(cat "${PIDFILE}")
|
||||
# Does process still exist ?
|
||||
if kill -0 ${pid} 2> /dev/null; then
|
||||
if kill -0 "${pid}" 2> /dev/null; then
|
||||
# Killing the childs of evobackup.
|
||||
for ppid in $(pgrep -P "${pid}"); do
|
||||
kill -9 "${ppid}";
|
||||
done
|
||||
# Then kill the main PID.
|
||||
kill -9 "${pid}"
|
||||
printf "%s is still running (PID %s). Process has been killed" "$0" "${pid}\n" >&2
|
||||
printf "%s is still running (PID %s). Process has been killed" "$0" "${pid}\\n" >&2
|
||||
else
|
||||
rm -f ${PIDFILE}
|
||||
rm -f "${PIDFILE}"
|
||||
fi
|
||||
fi
|
||||
echo "$$" > ${PIDFILE}
|
||||
echo "$$" > "${PIDFILE}"
|
||||
# shellcheck disable=SC2064
|
||||
trap "rm -f ${PIDFILE}" EXIT
|
||||
|
||||
##### LOCAL BACKUP ####################################################
|
||||
|
||||
if [ "${LOCAL_TASKS}" = "1" ]; then
|
||||
log "START LOCAL_TASKS"
|
||||
|
||||
# You can comment or uncomment sections below to customize the backup
|
||||
|
||||
## OpenLDAP : example with slapcat
|
||||
# slapcat -n 0 -l ${LOCAL_BACKUP_DIR}/config.ldap.bak
|
||||
# slapcat -n 1 -l ${LOCAL_BACKUP_DIR}/data.ldap.bak
|
||||
# slapcat -l ${LOCAL_BACKUP_DIR}/ldap.bak
|
||||
|
||||
## MySQL
|
||||
|
||||
## Purge previous dumps
|
||||
# rm -f ${LOCAL_BACKUP_DIR}/mysql.*.gz
|
||||
# rm -rf ${LOCAL_BACKUP_DIR}/mysql
|
||||
# rm -rf ${LOCAL_BACKUP_DIR}/mysqlhotcopy
|
||||
# rm -rf /home/mysqldump
|
||||
|
||||
## example with global and compressed mysqldump
|
||||
# mysqldump --defaults-extra-file=/etc/mysql/debian.cnf -P 3306 \
|
||||
# --opt --all-databases --force --events --hex-blob | gzip --best > ${LOCAL_BACKUP_DIR}/mysql.bak.gz
|
||||
|
||||
## example with compressed SQL dump (with data) for each databases
|
||||
# mkdir -p -m 700 ${LOCAL_BACKUP_DIR}/mysql/
|
||||
# for i in $(mysql --defaults-extra-file=/etc/mysql/debian.cnf -P 3306 -e 'show databases' -s --skip-column-names \
|
||||
# | egrep -v "^(Database|information_schema|performance_schema|sys)"); do
|
||||
# mysqldump --defaults-extra-file=/etc/mysql/debian.cnf --force -P 3306 --events --hex-blob $i | gzip --best > ${LOCAL_BACKUP_DIR}/mysql/${i}.sql.gz
|
||||
# done
|
||||
|
||||
## Dump all grants (requires 'percona-toolkit' package)
|
||||
# mkdir -p -m 700 ${LOCAL_BACKUP_DIR}/mysql/
|
||||
# pt-show-grants --flush --no-header > ${LOCAL_BACKUP_DIR}/mysql/all_grants.sql
|
||||
|
||||
# Dump all variables
|
||||
# mysql -A -e"SHOW GLOBAL VARIABLES;" > ${LOCAL_BACKUP_DIR}/MySQLCurrentSettings.txt
|
||||
|
||||
## example with SQL dump (schema only, no data) for each databases
|
||||
# mkdir -p -m 700 ${LOCAL_BACKUP_DIR}/mysql/
|
||||
# for i in $(mysql --defaults-extra-file=/etc/mysql/debian.cnf -P 3306 -e 'show databases' -s --skip-column-names \
|
||||
# | egrep -v "^(Database|information_schema|performance_schema|sys)"); do
|
||||
# mysqldump --defaults-extra-file=/etc/mysql/debian.cnf --force -P 3306 --no-data --databases $i > ${LOCAL_BACKUP_DIR}/mysql/${i}.schema.sql
|
||||
# done
|
||||
|
||||
## example with *one* uncompressed SQL dump for *one* database (MYBASE)
|
||||
# mkdir -p -m 700 ${LOCAL_BACKUP_DIR}/mysql/MYBASE
|
||||
# chown -RL mysql ${LOCAL_BACKUP_DIR}/mysql/
|
||||
# mysqldump --defaults-extra-file=/etc/mysql/debian.cnf --force -Q \
|
||||
# --opt --events --hex-blob --skip-comments -T ${LOCAL_BACKUP_DIR}/mysql/MYBASE MYBASE
|
||||
|
||||
## example with two dumps for each table (.sql/.txt) for all databases
|
||||
# for i in $(echo SHOW DATABASES | mysql --defaults-extra-file=/etc/mysql/debian.cnf -P 3306 \
|
||||
# | egrep -v "^(Database|information_schema|performance_schema|sys)" ); \
|
||||
|
@ -154,29 +214,9 @@ if [ "${LOCAL_TASKS}" = "1" ]; then
|
|||
# mysqldump --defaults-extra-file=/etc/mysql/debian.cnf --force -P 3306 -Q --opt --events --hex-blob --skip-comments \
|
||||
# --fields-enclosed-by='\"' --fields-terminated-by=',' -T /home/mysqldump/$i $i; done
|
||||
|
||||
## example with SQL dump (schema only, no data) for each databases
|
||||
# mkdir -p -m 700 /home/mysqldump/
|
||||
# for i in $(mysql --defaults-extra-file=/etc/mysql/debian.cnf -P 3306 -e 'show databases' -s --skip-column-names \
|
||||
# | egrep -v "^(Database|information_schema|performance_schema|sys)"); do
|
||||
# mysqldump --defaults-extra-file=/etc/mysql/debian.cnf --force -P 3306 --no-data --databases $i > /home/mysqldump/${i}.schema.sql
|
||||
# done
|
||||
|
||||
## example with compressed SQL dump (with data) for each databases
|
||||
# mkdir -p -m 700 /home/mysqldump/
|
||||
# for i in $(mysql --defaults-extra-file=/etc/mysql/debian.cnf -P 3306 -e 'show databases' -s --skip-column-names \
|
||||
# | egrep -v "^(Database|information_schema|performance_schema|sys)"); do
|
||||
# mysqldump --defaults-extra-file=/etc/mysql/debian.cnf --force -P 3306 --events --hex-blob $i | gzip --best > /home/mysqldump/${i}.sql.gz
|
||||
# done
|
||||
|
||||
## example with *one* uncompressed SQL dump for *one* database (MYBASE)
|
||||
# mkdir -p -m 700 /home/mysqldump/MYBASE
|
||||
# chown -RL mysql /home/mysqldump/
|
||||
# mysqldump --defaults-extra-file=/etc/mysql/debian.cnf --force -Q \
|
||||
# --opt --events --hex-blob --skip-comments -T /home/mysqldump/MYBASE MYBASE
|
||||
|
||||
## example with mysqlhotcopy
|
||||
# mkdir -p -m 700 /home/mysqlhotcopy/
|
||||
# mysqlhotcopy BASE /home/mysqlhotcopy/
|
||||
# mkdir -p -m 700 ${LOCAL_BACKUP_DIR}/mysqlhotcopy/
|
||||
# mysqlhotcopy MYBASE ${LOCAL_BACKUP_DIR}/mysqlhotcopy/
|
||||
|
||||
## example for multiples MySQL instances
|
||||
# mysqladminpasswd=$(grep -m1 'password = .*' /root/.my.cnf|cut -d" " -f3)
|
||||
|
@ -184,12 +224,16 @@ if [ "${LOCAL_TASKS}" = "1" ]; then
|
|||
# instance=$(echo "$instance"|awk '{ print $3 }')
|
||||
# if [ "$instance" != "3306" ]
|
||||
# then
|
||||
# mysqldump -P $instance --opt --all-databases --hex-blob -u mysqladmin -p$mysqladminpasswd > ${LOCAL_BACKUP_DIR}/mysql.$instance.bak
|
||||
# mysqldump -P $instance --opt --all-databases --hex-blob -u mysqladmin -p$mysqladminpasswd | gzip --best > ${LOCAL_BACKUP_DIR}/mysql.$instance.bak.gz
|
||||
# fi
|
||||
# done
|
||||
|
||||
## PostgreSQL
|
||||
|
||||
## Purge previous dumps
|
||||
# rm -rf ${LOCAL_BACKUP_DIR}/pg.*.gz
|
||||
# rm -rf ${LOCAL_BACKUP_DIR}/pg-backup.tar
|
||||
# rm -rf ${LOCAL_BACKUP_DIR}/postgresql/*
|
||||
## example with pg_dumpall (warning: you need space in ~postgres)
|
||||
# su - postgres -c "pg_dumpall > ~/pg.dump.bak"
|
||||
# mv ~postgres/pg.dump.bak ${LOCAL_BACKUP_DIR}/
|
||||
|
@ -204,12 +248,20 @@ if [ "${LOCAL_TASKS}" = "1" ]; then
|
|||
## example with only TABLE1 and TABLE2 from MYBASE
|
||||
# pg_dump -p 5432 -h 127.0.0.1 -U USER --clean -F t --inserts -f ${LOCAL_BACKUP_DIR}/pg-backup.tar -T 'TABLE1' -T 'TABLE2' MYBASE
|
||||
|
||||
## example with compressed PostgreSQL dump for each databases
|
||||
# mkdir -p -m 700 ${LOCAL_BACKUP_DIR}/postgresql
|
||||
# chown postgres:postgres ${LOCAL_BACKUP_DIR}/postgresql
|
||||
# dbs=$(sudo -u postgres psql -U postgres -lt | awk -F\| '{print $1}' |grep -v template*)
|
||||
#
|
||||
# for databases in $dbs ; do sudo -u postgres /usr/bin/pg_dump --create -s -U postgres -d $databases | gzip --best -c > ${LOCAL_BACKUP_DIR}/postgresql/$databases.sql.gz ; done
|
||||
|
||||
## MongoDB
|
||||
|
||||
## don't forget to create use with read-only access
|
||||
## > use admin
|
||||
## > db.createUser( { user: "mongobackup", pwd: "PASS", roles: [ "backup", ] } )
|
||||
# test -d ${LOCAL_BACKUP_DIR}/mongodump/ && rm -rf ${LOCAL_BACKUP_DIR}/mongodump/
|
||||
## Purge previous dumps
|
||||
# rm -rf ${LOCAL_BACKUP_DIR}/mongodump/
|
||||
# mkdir -p -m 700 ${LOCAL_BACKUP_DIR}/mongodump/
|
||||
# mongodump --quiet -u mongobackup -pPASS -o ${LOCAL_BACKUP_DIR}/mongodump/
|
||||
# if [ $? -ne 0 ]; then
|
||||
|
@ -218,8 +270,19 @@ if [ "${LOCAL_TASKS}" = "1" ]; then
|
|||
|
||||
## Redis
|
||||
|
||||
## Purge previous dumps
|
||||
# rm -rf ${LOCAL_BACKUP_DIR}/redis/
|
||||
# rm -rf ${LOCAL_BACKUP_DIR}/redis-*
|
||||
## example with copy .rdb file
|
||||
# cp /var/lib/redis/dump.rdb ${LOCAL_BACKUP_DIR}/
|
||||
## for the default instance :
|
||||
# mkdir -p -m 700 ${LOCAL_BACKUP_DIR}/redis/
|
||||
# cp /var/lib/redis/dump.rdb ${LOCAL_BACKUP_DIR}/redis/
|
||||
## for multiple instances :
|
||||
# for instance in $(ls -d /var/lib/redis-*); do
|
||||
# name=$(basename $instance)
|
||||
# mkdir -p ${LOCAL_BACKUP_DIR}/${name}
|
||||
# cp -a ${instance}/dump.rdb ${LOCAL_BACKUP_DIR}/${name}
|
||||
# done
|
||||
|
||||
## ElasticSearch
|
||||
|
||||
|
@ -241,7 +304,7 @@ if [ "${LOCAL_TASKS}" = "1" ]; then
|
|||
# for snapshot in $(curl -s -XGET "localhost:9200/_snapshot/snaprepo/_all?pretty=true" | grep -Eo 'snapshot_[0-9]{4}-[0-9]{2}-[0-9]{2}' | head -n -10); do
|
||||
# curl -s -XDELETE "localhost:9200/_snapshot/snaprepo/${snapshot}" | grep -v -Fx '{"acknowledged":true}'
|
||||
# done
|
||||
# date=$(date +%F)
|
||||
# date=$(/bin/date +%F)
|
||||
# curl -s -XPUT "localhost:9200/_snapshot/snaprepo/snapshot_${date}?wait_for_completion=true" -o /tmp/es_snapshot_${date}.log
|
||||
|
||||
## RabbitMQ
|
||||
|
@ -253,162 +316,205 @@ if [ "${LOCAL_TASKS}" = "1" ]; then
|
|||
|
||||
#megacli -CfgSave -f ${LOCAL_BACKUP_DIR}/megacli_conf.dump -a0 >/dev/null
|
||||
|
||||
## Dump system and kernel versions
|
||||
uname -a > ${LOCAL_BACKUP_DIR}/uname
|
||||
|
||||
## Dump network routes with mtr and traceroute (warning: could be long with aggressive firewalls)
|
||||
for addr in 8.8.8.8 www.evolix.fr travaux.evolix.net; do
|
||||
mtr -r ${addr} > ${LOCAL_BACKUP_DIR}/mtr-${addr}
|
||||
traceroute -n ${addr} > ${LOCAL_BACKUP_DIR}/traceroute-${addr} 2>&1
|
||||
done
|
||||
|
||||
## Dump process with ps
|
||||
ps auwwx >${LOCAL_BACKUP_DIR}/ps.out
|
||||
server_state_dir="${LOCAL_BACKUP_DIR}/server-state"
|
||||
|
||||
dump_server_state_bin=$(command -v dump-server-state)
|
||||
|
||||
if [ "${SYSTEM}" = "linux" ]; then
|
||||
## Dump network connections with ss
|
||||
ss -taupen > ${LOCAL_BACKUP_DIR}/netstat.out
|
||||
if [ -n "${dump_server_state_bin}" ]; then
|
||||
${dump_server_state_bin} --all --force --dump-dir "${server_state_dir}"
|
||||
else
|
||||
mkdir -p "${server_state_dir}"
|
||||
|
||||
## List Debian packages
|
||||
dpkg -l > ${LOCAL_BACKUP_DIR}/packages
|
||||
dpkg --get-selections > ${LOCAL_BACKUP_DIR}/packages.getselections
|
||||
apt-cache dumpavail > ${LOCAL_BACKUP_DIR}/packages.available
|
||||
## Dump system and kernel versions
|
||||
uname -a > ${server_state_dir}/uname.txt
|
||||
|
||||
## Dump MBR / table partitions
|
||||
disks=$(lsblk -l | grep disk | grep -v -E '(drbd|fd[0-9]+)' | awk '{print $1}')
|
||||
for disk in ${disks}; do
|
||||
dd if="/dev/${disk}" of="${LOCAL_BACKUP_DIR}/MBR-${disk}" bs=512 count=1 2>&1 | grep -Ev "(records in|records out|512 bytes)"
|
||||
fdisk -l "/dev/${disk}" > "${LOCAL_BACKUP_DIR}/partitions-${disk}" 2>&1
|
||||
done
|
||||
cat ${LOCAL_BACKUP_DIR}/partitions-* > ${LOCAL_BACKUP_DIR}/partitions
|
||||
## Dump process with ps
|
||||
ps auwwx > ${server_state_dir}/ps.txt
|
||||
|
||||
## Dump iptables
|
||||
if [ -x /sbin/iptables ]; then
|
||||
{ /sbin/iptables -L -n -v; /sbin/iptables -t filter -L -n -v; } > ${LOCAL_BACKUP_DIR}/iptables.txt
|
||||
fi
|
||||
## Dump network connections with ss
|
||||
ss -taupen > ${server_state_dir}/netstat.txt
|
||||
|
||||
## Dump findmnt(8) output
|
||||
FINDMNT_BIN=$(command -v findmnt)
|
||||
if [ -x ${FINDMNT_BIN} ]; then
|
||||
${FINDMNT_BIN} > ${LOCAL_BACKUP_DIR}/findmnt.txt
|
||||
## List Debian packages
|
||||
dpkg -l > ${server_state_dir}/packages
|
||||
dpkg --get-selections > ${server_state_dir}/packages.getselections
|
||||
apt-cache dumpavail > ${server_state_dir}/packages.available
|
||||
|
||||
## Dump iptables
|
||||
if [ -x /sbin/iptables ]; then
|
||||
{ /sbin/iptables -L -n -v; /sbin/iptables -t filter -L -n -v; } > ${server_state_dir}/iptables.txt
|
||||
fi
|
||||
|
||||
## Dump findmnt(8) output
|
||||
FINDMNT_BIN=$(command -v findmnt)
|
||||
if [ -x "${FINDMNT_BIN}" ]; then
|
||||
${FINDMNT_BIN} > ${server_state_dir}/findmnt.txt
|
||||
fi
|
||||
|
||||
## Dump MBR / table partitions
|
||||
disks=$(lsblk -l | grep disk | grep -v -E '(drbd|fd[0-9]+)' | awk '{print $1}')
|
||||
for disk in ${disks}; do
|
||||
dd if="/dev/${disk}" of="${server_state_dir}/MBR-${disk}" bs=512 count=1 2>&1 | grep -Ev "(records in|records out|512 bytes)"
|
||||
fdisk -l "/dev/${disk}" > "${server_state_dir}/partitions-${disk}" 2>&1
|
||||
done
|
||||
cat ${server_state_dir}/partitions-* > ${server_state_dir}/partitions
|
||||
fi
|
||||
else
|
||||
## Dump network connections with netstat
|
||||
netstat -finet -atn > ${LOCAL_BACKUP_DIR}/netstat.out
|
||||
if [ -n "${dump_server_state_bin}" ]; then
|
||||
${dump_server_state_bin} --all --force --backup-dir "${server_state_dir}"
|
||||
else
|
||||
mkdir -p "${server_state_dir}"
|
||||
|
||||
## List OpenBSD packages
|
||||
pkg_info -m > ${LOCAL_BACKUP_DIR}/packages
|
||||
## Dump system and kernel versions
|
||||
uname -a > ${server_state_dir}/uname
|
||||
|
||||
## Dump MBR / table partitions
|
||||
##disklabel sd0 > ${LOCAL_BACKUP_DIR}/partitions
|
||||
## Dump process with ps
|
||||
ps auwwx > ${server_state_dir}/ps.out
|
||||
|
||||
## Dump pf infos
|
||||
pfctl -sa > ${LOCAL_BACKUP_DIR}/pfctl-sa.txt
|
||||
## Dump network connections with fstat
|
||||
fstat | head -1 > ${server_state_dir}/netstat.out
|
||||
fstat | grep internet >> ${server_state_dir}/netstat.out
|
||||
|
||||
## List OpenBSD packages
|
||||
pkg_info -m > ${server_state_dir}/packages
|
||||
|
||||
## Dump MBR / table partitions
|
||||
disklabel sd0 > ${server_state_dir}/partitions
|
||||
|
||||
## Dump pf infos
|
||||
pfctl -sa > ${server_state_dir}/pfctl-sa.txt
|
||||
fi
|
||||
fi
|
||||
|
||||
## Dump rights
|
||||
#getfacl -R /var > ${LOCAL_BACKUP_DIR}/rights-var.txt
|
||||
#getfacl -R /etc > ${LOCAL_BACKUP_DIR}/rights-etc.txt
|
||||
#getfacl -R /usr > ${LOCAL_BACKUP_DIR}/rights-usr.txt
|
||||
#getfacl -R /home > ${LOCAL_BACKUP_DIR}/rights-home.txt
|
||||
#getfacl -R /var > ${server_state_dir}/rights-var.txt
|
||||
#getfacl -R /etc > ${server_state_dir}/rights-etc.txt
|
||||
#getfacl -R /usr > ${server_state_dir}/rights-usr.txt
|
||||
#getfacl -R /home > ${server_state_dir}/rights-home.txt
|
||||
|
||||
log "STOP LOCAL_TASKS"
|
||||
fi
|
||||
|
||||
##### REMOTE BACKUP ###################################################
|
||||
|
||||
n=0
|
||||
server=""
|
||||
if [ "${SERVERS_FALLBACK}" = "1" ]; then
|
||||
# We try to find a suitable server
|
||||
while :; do
|
||||
server=$(pick_server "${n}")
|
||||
test $? = 0 || exit 2
|
||||
|
||||
if test_server "${server}"; then
|
||||
break
|
||||
else
|
||||
server=""
|
||||
n=$(( n + 1 ))
|
||||
fi
|
||||
done
|
||||
else
|
||||
# we force the server
|
||||
server=$(pick_server "${n}")
|
||||
fi
|
||||
|
||||
SSH_SERVER=$(echo "${server}" | cut -d':' -f1)
|
||||
SSH_PORT=$(echo "${server}" | cut -d':' -f2)
|
||||
|
||||
HOSTNAME=$(hostname)
|
||||
|
||||
if [ "${SYSTEM}" = "linux" ]; then
|
||||
rep="/bin /boot /lib /opt /sbin /usr"
|
||||
else
|
||||
rep="/bsd /bin /sbin /usr"
|
||||
fi
|
||||
|
||||
|
||||
if [ "${SYNC_TASKS}" = "1" ]; then
|
||||
n=0
|
||||
server=""
|
||||
if [ "${SERVERS_FALLBACK}" = "1" ]; then
|
||||
# We try to find a suitable server
|
||||
while :; do
|
||||
server=$(pick_server "${n}")
|
||||
test $? = 0 || exit 2
|
||||
|
||||
if test_server "${server}"; then
|
||||
break
|
||||
else
|
||||
server=""
|
||||
n=$(( n + 1 ))
|
||||
fi
|
||||
done
|
||||
else
|
||||
# we force the server
|
||||
server=$(pick_server "${n}")
|
||||
fi
|
||||
|
||||
SSH_SERVER=$(echo "${server}" | cut -d':' -f1)
|
||||
SSH_PORT=$(echo "${server}" | cut -d':' -f2)
|
||||
|
||||
if [ "${SYSTEM}" = "linux" ]; then
|
||||
rep="/bin /boot /lib /opt /sbin /usr"
|
||||
else
|
||||
rep="/bsd /bin /sbin /usr"
|
||||
fi
|
||||
|
||||
log "START SYNC_TASKS - server=${server}"
|
||||
|
||||
# /!\ DO NOT USE COMMENTS in the rsync command /!\
|
||||
# It breaks the command and destroys data, simply remove (or add) lines.
|
||||
|
||||
# Remote shell command
|
||||
RSH_COMMAND="ssh -p ${SSH_PORT} -o 'ConnectTimeout ${SSH_CONNECT_TIMEOUT}'"
|
||||
|
||||
rsync -avzh --stats --delete --delete-excluded --force --ignore-errors --partial \
|
||||
# ignore check because we want it to split the different arguments to $rep
|
||||
# shellcheck disable=SC2086
|
||||
rsync -avzh --relative --stats --delete --delete-excluded --force --ignore-errors --partial \
|
||||
--exclude "dev" \
|
||||
--exclude "lost+found" \
|
||||
--exclude ".nfs.*" \
|
||||
--exclude "/var/log" \
|
||||
--exclude "/var/log/evobackup*" \
|
||||
--exclude "/usr/doc" \
|
||||
--exclude "/usr/obj" \
|
||||
--exclude "/usr/share/doc" \
|
||||
--exclude "/usr/src" \
|
||||
--exclude "/var/apt" \
|
||||
--exclude "/var/cache" \
|
||||
--exclude "/var/lib/amavis/amavisd.sock" \
|
||||
--exclude "/var/lib/amavis/tmp" \
|
||||
--exclude "/var/lib/clamav/*.tmp" \
|
||||
--exclude "/var/lib/elasticsearch" \
|
||||
--exclude "/var/lib/metche" \
|
||||
--exclude "/var/lib/munin/*tmp*" \
|
||||
--exclude "/var/db/munin/*.tmp" \
|
||||
--exclude "/var/lib/mysql" \
|
||||
--exclude "/var/lib/php5" \
|
||||
--exclude "/var/lib/php/sessions" \
|
||||
--exclude "/var/lib/postgres" \
|
||||
--exclude "/var/lib/postgresql" \
|
||||
--exclude "/var/lib/sympa" \
|
||||
--exclude "/var/lib/metche" \
|
||||
--exclude "/var/run" \
|
||||
--exclude "/var/lock" \
|
||||
--exclude "/var/state" \
|
||||
--exclude "/var/apt" \
|
||||
--exclude "/var/cache" \
|
||||
--exclude "/usr/src" \
|
||||
--exclude "/usr/doc" \
|
||||
--exclude "/usr/share/doc" \
|
||||
--exclude "/usr/obj" \
|
||||
--exclude "dev" \
|
||||
--exclude "/var/run" \
|
||||
--exclude "/var/spool/postfix" \
|
||||
--exclude "/var/lib/amavis/amavisd.sock" \
|
||||
--exclude "/var/lib/munin/*tmp*" \
|
||||
--exclude "/var/lib/php5" \
|
||||
--exclude "/var/spool/smtpd" \
|
||||
--exclude "/var/spool/squid" \
|
||||
--exclude "/var/lib/elasticsearch" \
|
||||
--exclude "/var/lib/amavis/tmp" \
|
||||
--exclude "/var/lib/clamav/*.tmp" \
|
||||
--exclude "/var/state" \
|
||||
--exclude "/var/tmp" \
|
||||
--exclude "lxc/*/rootfs/tmp" \
|
||||
--exclude "lxc/*/rootfs/usr/doc" \
|
||||
--exclude "lxc/*/rootfs/usr/obj" \
|
||||
--exclude "lxc/*/rootfs/usr/share/doc" \
|
||||
--exclude "lxc/*/rootfs/usr/src" \
|
||||
--exclude "lxc/*/rootfs/var/apt" \
|
||||
--exclude "lxc/*/rootfs/var/cache" \
|
||||
--exclude "lxc/*/rootfs/var/lib/php5" \
|
||||
--exclude "lxc/*/rootfs/var/lib/php/sessions" \
|
||||
--exclude "lxc/*/rootfs/var/lock" \
|
||||
--exclude "lxc/*/rootfs/var/log" \
|
||||
--exclude "lxc/*/rootfs/var/run" \
|
||||
--exclude "lxc/*/rootfs/var/state" \
|
||||
--exclude "lxc/*/rootfs/var/tmp" \
|
||||
--exclude "/home/mysqltmp" \
|
||||
--exclude "/var/lib/php/sessions" \
|
||||
${rep} \
|
||||
/etc \
|
||||
/root \
|
||||
/var \
|
||||
/home \
|
||||
/srv \
|
||||
-e "${RSH_COMMAND}" \
|
||||
"root@${SSH_SERVER}:/var/backup/" \
|
||||
| tail -30 >> $LOGFILE
|
||||
|
||||
log "STOP SYNC_TASKS - server=${server}"
|
||||
fi
|
||||
|
||||
##### REPORTING #######################################################
|
||||
|
||||
END=$(/bin/date +"%d-%m-%Y ; %H:%M")
|
||||
STOP_EPOCH=$(/bin/date +%s)
|
||||
|
||||
printf "EvoBackup - %s - START %s ON %s (LOCAL_TASKS=%s SYNC_TASKS=%s)\n" \
|
||||
"${HOSTNAME}" "${BEGINNING}" "${SSH_SERVER}" "${LOCAL_TASKS}" "${SYNC_TASKS}" \
|
||||
>> $LOGFILE
|
||||
if [ "${SYSTEM}" = "openbsd" ]; then
|
||||
start_time=$(/bin/date -f "%s" -j "${START_EPOCH}" +"${DATE_FORMAT}")
|
||||
stop_time=$(/bin/date -f "%s" -j "${STOP_EPOCH}" +"${DATE_FORMAT}")
|
||||
else
|
||||
start_time=$(/bin/date --date="@${START_EPOCH}" +"${DATE_FORMAT}")
|
||||
stop_time=$(/bin/date --date="@${STOP_EPOCH}" +"${DATE_FORMAT}")
|
||||
fi
|
||||
duration=$(( STOP_EPOCH - START_EPOCH ))
|
||||
|
||||
printf "EvoBackup - %s - STOP %s ON %s (LOCAL_TASKS=%s SYNC_TASKS=%s)\n" \
|
||||
"${HOSTNAME}" "${END}" "${SSH_SERVER}" "${LOCAL_TASKS}" "${SYNC_TASKS}" \
|
||||
>> $LOGFILE
|
||||
log "STOP GLOBAL - start='${start_time}' stop='${stop_time}' duration=${duration}s"
|
||||
|
||||
tail -10 $LOGFILE | \
|
||||
mail -s "[info] EvoBackup - Client ${HOSTNAME}" \
|
||||
${MAIL}
|
||||
tail -20 "${LOGFILE}" \
|
||||
| mail -s "[info] EvoBackup - Client ${HOSTNAME}" ${MAIL}
|
|
@ -1,49 +0,0 @@
|
|||
# Install
|
||||
|
||||
A Debian package is available in the Evolix repository
|
||||
|
||||
~~~
|
||||
echo "http://pub.evolix.net/jessie/" >> /etc/apt/sources.list
|
||||
apt update
|
||||
apt install bkctld
|
||||
~~~
|
||||
|
||||
Then edit `/etc//bkctld`
|
||||
|
||||
## Chroot dependencies
|
||||
|
||||
The chroot jails depend on these packages
|
||||
|
||||
~~~
|
||||
apt install \
|
||||
bash \
|
||||
coreutils \
|
||||
sed \
|
||||
dash \
|
||||
mount \
|
||||
rsync \
|
||||
openssh-server \
|
||||
openssh-sftp-server \
|
||||
libc6-i386 \
|
||||
libc6
|
||||
~~~
|
||||
|
||||
## Client dependencies
|
||||
|
||||
The clients only require OpenSSH and rsync.
|
||||
|
||||
### Cron job for incremental backups
|
||||
|
||||
Edit the root crontab
|
||||
|
||||
~~~
|
||||
# $editor /etc/cron.d/bkctld
|
||||
+ MAILTO=alert4@evolix.net
|
||||
+ 30 11 * * * root /usr/sbin/bkctld inc && /usr/sbin/bkctld rm
|
||||
+ 30 23 * * * root /usr/share/scripts/check-incs.sh 1> /dev/null
|
||||
~~~
|
||||
|
||||
## Notes
|
||||
If you want mutiples backups in a day (1 by hour maximum) you can
|
||||
run `bkctld inc` multiples times, if you want to keep incremental
|
||||
backups **for ever**, just don't run `bkctld rm`.
|
|
@ -1,70 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Run check on jails (NRPE output)
|
||||
# Usage: check
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
cur_time=$(date "+%s")
|
||||
return=0
|
||||
nb_crit=0
|
||||
nb_warn=0
|
||||
nb_ok=0
|
||||
nb_unkn=0
|
||||
output=""
|
||||
|
||||
if [ -b "${BACKUP_DISK}" ]; then
|
||||
cryptsetup isLuks "${BACKUP_DISK}"
|
||||
if [ "$?" -eq 0 ]; then
|
||||
if [ ! -b '/dev/mapper/backup' ]; then
|
||||
echo "Luks disk ${BACKUP_DISK} is not mounted !\n"
|
||||
echo "cryptsetup luksOpen ${BACKUP_DISK} backup"
|
||||
exit 2
|
||||
fi
|
||||
BACKUP_DISK='/dev/mapper/backup'
|
||||
fi
|
||||
grep -qE "^${BACKUP_DISK} " /etc/mtab
|
||||
if [ "$?" -ne 0 ]; then
|
||||
echo "Backup disk ${BACKUP_DISK} is not mounted !\n"
|
||||
echo "mount ${BACKUP_DISK} /backup"
|
||||
exit 2
|
||||
fi
|
||||
fi
|
||||
|
||||
for jail in $("${LIBDIR}/bkctld-list"); do
|
||||
if [ -f "${JAILDIR}/${jail}/var/log/lastlog" ]; then
|
||||
last_conn=$(stat --format=%Y "${JAILDIR}/${jail}/var/log/lastlog")
|
||||
date_diff=$(( (cur_time - last_conn) / (60*60) ))
|
||||
if [ "${date_diff}" -gt "${CRITICAL}" ]; then
|
||||
nb_crit=$((nb_crit + 1))
|
||||
output="${output}CRITICAL - ${jail} - ${date_diff} hours\n"
|
||||
[ "${return}" -le 2 ] && return=2
|
||||
elif [ "${date_diff}" -gt "${WARNING}" ]; then
|
||||
nb_warn=$((nb_warn + 1))
|
||||
output="${output}WARNING - ${jail} - ${date_diff} hours\n"
|
||||
[ "${return}" -le 1 ] && return=1
|
||||
else
|
||||
nb_ok=$((nb_ok + 1))
|
||||
output="${output}OK - ${jail} - ${date_diff} hours\n"
|
||||
fi
|
||||
else
|
||||
nb_unkn=$((nb_unkn + 1))
|
||||
output="${output}UNKNOWN - ${jail} doesn't have lastlog !\n"
|
||||
[ "${return}" -le 3 ] && return=3
|
||||
fi
|
||||
done
|
||||
|
||||
[ "${return}" -ge 0 ] && header="OK"
|
||||
[ "${return}" -ge 1 ] && header="WARNING"
|
||||
[ "${return}" -ge 2 ] && header="CRITICAL"
|
||||
[ "${return}" -ge 3 ] && header="UNKNOW"
|
||||
|
||||
printf "%s - %s UNK / %s CRIT / %s WARN / %s OK\n\n" "${header}" "${nb_unkn}" "${nb_crit}" "${nb_warn}" "${nb_ok}"
|
||||
|
||||
printf "${output}" | grep -E "^UNKNOW"
|
||||
printf "${output}" | grep -E "^CRITICAL"
|
||||
printf "${output}" | grep -E "^WARNING"
|
||||
printf "${output}" | grep -E "^OK"
|
||||
|
||||
exit "${return}"
|
|
@ -1,24 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Update firewall rules of <jailname> or all
|
||||
# Usage: firewall <jailname>|all
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
|
||||
if [ -n "${FIREWALL_RULES}" ]; then
|
||||
[ -f "${FIREWALL_RULES}" ] && sed -i "/#${jail}$/d" "${FIREWALL_RULES}"
|
||||
if [ -d "${JAILDIR}/${jail}" ]; then
|
||||
port=$("${LIBDIR}/bkctld-port" "${jail}")
|
||||
for ip in $("${LIBDIR}/bkctld-ip" "${jail}"); do
|
||||
echo "/sbin/iptables -A INPUT -p tcp --sport 1024: --dport ${port} -s ${ip} -j ACCEPT #${jail}" >> "${FIREWALL_RULES}"
|
||||
done
|
||||
[ -f /etc/init.d/minifirewall ] && /etc/init.d/minifirewall restart >/dev/null
|
||||
fi
|
||||
notice "${jail} : firewall rules updated"
|
||||
fi
|
|
@ -1,21 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Print this help
|
||||
# Usage: help
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
cat <<EOF
|
||||
Usage: bkctld <subcommand> [options]
|
||||
Subcommands:
|
||||
EOF
|
||||
|
||||
for subcommand in ${LIBDIR}/bkctld-*; do
|
||||
name=$(basename "${subcommand}"|sed 's/^bkctld-//')
|
||||
desc=$(grep -E "^#" "${subcommand}"|sed -n '3p'|sed "s/^# //")
|
||||
usage=$(grep -E "^# Usage: ${name}" "${subcommand}"|sed "s/^# Usage: ${name}//")
|
||||
printf " %- 10s %- 30s %- 40s\n" "${name}" "${usage}" "${desc}"
|
||||
done
|
||||
|
||||
printf "\n"
|
|
@ -1,37 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Make incremental inc of all jails
|
||||
# Usage: inc
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
date=$(date +"%Y-%m-%d-%H")
|
||||
for jail in $("${LIBDIR}/bkctld-list"); do
|
||||
inc="${INCDIR}/${jail}/${date}"
|
||||
mkdir -p "${INCDIR}/${jail}"
|
||||
if [ ! -d "${inc}" ]; then
|
||||
start=$(date +"%H:%M:%S")
|
||||
jail_inode=$(stat --format=%i "${JAILDIR}/${jail}")
|
||||
if [ "$jail_inode" -eq 256 ]; then
|
||||
/bin/btrfs subvolume snapshot -r "${JAILDIR}/${jail}" "${inc}" | debug
|
||||
end=$(date +"%H:%M:%S")
|
||||
notice "${jail} : made ${date} inc [${start}/${end}]"
|
||||
else
|
||||
lock="/run/lock/bkctld/inc-${jail}.lock"
|
||||
if [ -f "${lock}" ]; then
|
||||
warning "${jail} : trying to run already running inc"
|
||||
else
|
||||
(
|
||||
mkdir -p /run/lock/bkctld && touch "${lock}"
|
||||
trap "rm -f ${lock}" 0
|
||||
cp -alx "${JAILDIR}/${jail}/" "${inc}"
|
||||
end=$(date +"%H:%M:%S")
|
||||
notice "${jail} : made ${date} inc [${start}/${end}]"
|
||||
)
|
||||
fi
|
||||
fi
|
||||
else
|
||||
warning "${jail} : trying to made already existant inc"
|
||||
fi
|
||||
done
|
|
@ -1,35 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Init jail <jailname>
|
||||
# Usage: init <jailname>
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] && error "${jail} : trying to create existant jail"
|
||||
|
||||
mkdir -p "${CONFDIR}" "${JAILDIR}"
|
||||
sshd_config="${TPLDIR}/sshd_config"
|
||||
inctpl="${TPLDIR}/inc.tpl"
|
||||
[ -f "${LOCALTPLDIR}/sshd_config" ] && sshd_config="${LOCALTPLDIR}/sshd_config"
|
||||
[ -f "${LOCALTPLDIR}/inc.tpl" ] && inctpl="${LOCALTPLDIR}/inc.tpl"
|
||||
|
||||
rootdir=$(dirname "${JAILDIR}")
|
||||
rootdir_inode=$(stat --format=%i "${rootdir}")
|
||||
jaildir_inode=$(stat --format=%i "${JAILDIR}")
|
||||
if [ "${rootdir_inode}" -eq 256 ] || [ "${jaildir_inode}" -eq 256 ]; then
|
||||
/bin/btrfs subvolume create "${JAILDIR}/${jail}"
|
||||
else
|
||||
mkdir -p "${JAILDIR}/${jail}"
|
||||
fi
|
||||
. "${LIBDIR}/mkjail"
|
||||
info "4 - Copie default sshd_config"
|
||||
install -m 0640 "${sshd_config}" "${JAILDIR}/${jail}/${SSHD_CONFIG}"
|
||||
info "5 - Copie default inc configuration"
|
||||
install -m 0640 "${inctpl}" "${CONFDIR}/${jail}"
|
||||
"${LIBDIR}/bkctld-port" "${jail}" auto
|
||||
notice "${jail} : created jail"
|
|
@ -1,35 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Set or get allowed(s) ip(s) of <jailname>
|
||||
# Usage: ip <jailname> [<ip>|all]
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
ip="${2:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] || error "${jail} : inexistant jail'"
|
||||
|
||||
if [ -z "${ip}" ]; then
|
||||
grep -E "^AllowUsers" "${JAILDIR}/$jail/${SSHD_CONFIG}"|grep -Eo "root@[^ ]+"| while read allow; do
|
||||
echo "${allow}"|cut -d'@' -f2
|
||||
done
|
||||
else
|
||||
if [ "${ip}" = "all" ] || [ "${ip}" = "0.0.0.0/0" ]; then
|
||||
ips="0.0.0.0/0"
|
||||
else
|
||||
ips=$("${LIBDIR}/bkctld-ip" "${jail}")
|
||||
ips=$(echo "${ips}" "${ip}"|xargs -n1|grep -v "0.0.0.0/0"|sort|uniq)
|
||||
fi
|
||||
allow="AllowUsers"
|
||||
for ip in $ips; do
|
||||
allow="${allow} root@${ip}"
|
||||
done
|
||||
sed -i "s~^AllowUsers .*~${allow}~" "${JAILDIR}/$jail/${SSHD_CONFIG}"
|
||||
notice "${jail} : update ip => ${ip}"
|
||||
"${LIBDIR}/bkctld-reload" "${jail}"
|
||||
"${LIBDIR}/bkctld-firewall" "${jail}"
|
||||
fi
|
|
@ -1,26 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Check if a jail is on or not
|
||||
# Usage: is-on <jailname>
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] || error "${jail} : trying to check inexistant jail"
|
||||
|
||||
jail="${1}"
|
||||
return=1
|
||||
if [ -f "${JAILDIR}/${jail}/${SSHD_PID}" ]; then
|
||||
pid=$(cat "${JAILDIR}/${jail}/${SSHD_PID}")
|
||||
ps -p "${pid}" > /dev/null && return=0
|
||||
fi
|
||||
if [ "${return}" -eq 1 ]; then
|
||||
rm -f "${JAILDIR}/${jail}/${SSHD_PID}"
|
||||
grep -q "${JAILDIR}/${jail}/proc" /proc/mounts && umount --lazy "${JAILDIR}/${jail}/proc/"
|
||||
grep -q "${JAILDIR}/${jail}/dev" /proc/mounts && umount --lazy --recursive "${JAILDIR}/${jail}/dev"
|
||||
fi
|
||||
exit "${return}"
|
|
@ -1,25 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Set or get ssh pubic key of <jailname>
|
||||
# Usage: key <jailname> [<keyfile>]
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
keyfile="${2:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] || error "${jail} : inexistant jail'"
|
||||
|
||||
if [ -z "${keyfile}" ]; then
|
||||
if [ -f "${JAILDIR}/${jail}/${AUTHORIZED_KEYS}" ]; then
|
||||
cat "${JAILDIR}/${jail}/${AUTHORIZED_KEYS}"
|
||||
fi
|
||||
else
|
||||
[ -e "${keyfile}" ] || error "Keyfile ${keyfile} dosen't exist !"
|
||||
cat "${keyfile}" > "${JAILDIR}/${jail}/${AUTHORIZED_KEYS}"
|
||||
chmod 600 "${JAILDIR}/${jail}/${AUTHORIZED_KEYS}"
|
||||
notice "${jail} : update key => ${keyfile}"
|
||||
fi
|
|
@ -1,12 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# List jails
|
||||
# Usage: list
|
||||
#
|
||||
|
||||
set -eu
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
[ -d "${JAILDIR}" ] || exit 0
|
||||
find "${JAILDIR}" -mindepth 1 -maxdepth 1 -type d|sed 's!.*/!!'
|
|
@ -1,28 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Set or get ssh port of <jailname>
|
||||
# Usage: port <jailname> [<port>|auto]
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
port="${2:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] || error "${jail} : inexistant jail'"
|
||||
|
||||
if [ -z "${port}" ]; then
|
||||
grep -E "Port [0-9]+" "${JAILDIR}/${jail}/${SSHD_CONFIG}"|grep -oE "[0-9]+"
|
||||
else
|
||||
if [ "${port}" = "auto" ]; then
|
||||
port=$(grep -h Port "${JAILDIR}"/*/"${SSHD_CONFIG}" 2>/dev/null | grep -Eo "[0-9]+" | sort -n | tail -1)
|
||||
port=$((port+1))
|
||||
[ "${port}" -le 1 ] && port=2222
|
||||
fi
|
||||
sed -i "s/^Port .*/Port ${port}/" "${JAILDIR}/$jail/${SSHD_CONFIG}"
|
||||
notice "${jail} : update port => ${port}"
|
||||
"${LIBDIR}/bkctld-reload" "${jail}"
|
||||
"${LIBDIR}/bkctld-firewall" "${jail}"
|
||||
fi
|
|
@ -1,18 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Reload jail <jailname> or all
|
||||
# Usage: reload <jailname>|all
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] || error "${jail} : trying to reload inexistant jail"
|
||||
"${LIBDIR}/bkctld-is-on" "${jail}" || exit 0
|
||||
|
||||
pid=$(cat "${JAILDIR}/${jail}/${SSHD_PID}")
|
||||
|
||||
kill -HUP "${pid}" && notice "${jail} was reloaded [${pid}]"
|
|
@ -1,36 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Remove jail <jailname> or all
|
||||
# Usage: remove <jailname>|all
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] || error "${jail} : trying to remove inexistant jail"
|
||||
"${LIBDIR}/bkctld-is-on" "${jail}" && "${LIBDIR}/bkctld-stop" "${jail}"
|
||||
|
||||
rm -f "${CONFDIR}/${jail}"
|
||||
jail_inode=$(stat --format=%i "${JAILDIR}/${jail}")
|
||||
if [ "${jail_inode}" -eq 256 ]; then
|
||||
/bin/btrfs subvolume delete "${JAILDIR}/${jail}" | debug
|
||||
else
|
||||
rm -rf "${JAILDIR}/${jail}" | debug
|
||||
fi
|
||||
if [ -d "${INCDIR}/${jail}" ]; then
|
||||
incs=$(ls "${INCDIR}/${jail}")
|
||||
for inc in ${incs}; do
|
||||
inc_inode=$(stat --format=%i "${INCDIR}/${jail}/${inc}")
|
||||
if [ "${inc_inode}" -eq 256 ]; then
|
||||
/bin/btrfs subvolume delete "${INCDIR}/${jail}/${inc}" | debug
|
||||
else
|
||||
warning "You need to purge ${INCDIR}/${jail}/${inc} manually !"
|
||||
fi
|
||||
done
|
||||
rmdir --ignore-fail-on-non-empty "${INCDIR}/${jail}" | debug
|
||||
fi
|
||||
"${LIBDIR}/bkctld-firewall" "${jail}"
|
||||
notice "${jail} : deleted jail"
|
|
@ -1,17 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Restart jail <jailname> or all
|
||||
# Usage: restart <jailname>|all
|
||||
#
|
||||
|
||||
set -eu
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] || error "${jail} : trying to restart inexistant jail"
|
||||
"${LIBDIR}/bkctld-is-on" "${jail}" && "${LIBDIR}/bkctld-stop" "${jail}"
|
||||
"${LIBDIR}/bkctld-start" "${jail}"
|
|
@ -1,44 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Remove old incremtal inc of all jails
|
||||
# Usage: rm
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
for jail in $("${LIBDIR}/bkctld-list"); do
|
||||
incs=$(ls "${INCDIR}/${jail}")
|
||||
if [ -f "${CONFDIR}/${jail}" ]; then
|
||||
keepfile="$(mktemp)"
|
||||
while read j; do
|
||||
date=$( echo "${j}" | cut -d. -f1 )
|
||||
before=$( echo "${j}" | cut -d. -f2 )
|
||||
date -d "$(date "${date}") ${before}" "+%Y-%m-%d"
|
||||
done < "${CONFDIR}/${jail}" > "${keepfile}"
|
||||
for j in $(echo "${incs}" | grep -v -f "${keepfile}"); do
|
||||
start=$(date +"%H:%M:%S")
|
||||
inc_inode=$(stat --format=%i "${INCDIR}/${jail}/${j}")
|
||||
if [ "${inc_inode}" -eq 256 ]; then
|
||||
/bin/btrfs subvolume delete "${INCDIR}/${jail}/${j}" | debug
|
||||
end=$(date +"%H:%M:%S")
|
||||
notice "${jail} : deleted ${j} inc [${start}/${end}]"
|
||||
else
|
||||
lock="/run/lock/bkctld/rm-${jail}.lock"
|
||||
if [ -f "${lock}" ]; then
|
||||
warning "${jail} : trying to run already running rm"
|
||||
else
|
||||
(
|
||||
empty="/tmp/bkctld-${$}-$(date +%N)"
|
||||
mkdir -p /run/lock/bkctld && touch "${lock}" && mkdir -p "${empty}"
|
||||
trap "rm -f ${lock} && rmdir ${empty}" 0
|
||||
rsync -a --delete "${empty}/" "${INCDIR}/${jail}/${j}/"
|
||||
rmdir "${INCDIR}/${jail}/${j}/"
|
||||
end=$(date +"%H:%M:%S")
|
||||
notice "${jail} : deleted ${j} inc [${start}/${end}]"
|
||||
)
|
||||
fi
|
||||
fi
|
||||
done
|
||||
rm "${keepfile}"
|
||||
fi
|
||||
done
|
|
@ -1,42 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Start jail <jailname> or all
|
||||
# Usage: start <jailname>|all
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] || error "${jail} : trying to start inexistant jail"
|
||||
"${LIBDIR}/bkctld-is-on" "${jail}" && exit 0
|
||||
|
||||
cd "${JAILDIR}/${jail}"
|
||||
grep -q "${JAILDIR}/${jail}/proc" /proc/mounts || mount -t proc "proc-${jail}" proc
|
||||
grep -q "${JAILDIR}/${jail}/dev" /proc/mounts || mount -nt tmpfs "dev-${jail}" dev
|
||||
[ -e "dev/console" ] || mknod -m 622 dev/console c 5 1
|
||||
[ -e "dev/null" ] || mknod -m 666 dev/null c 1 3
|
||||
[ -e "dev/zero" ] || mknod -m 666 dev/zero c 1 5
|
||||
[ -e "dev/ptmx" ] || mknod -m 666 dev/ptmx c 5 2
|
||||
[ -e "dev/tty" ] || mknod -m 666 dev/tty c 5 0
|
||||
[ -e "dev/random" ] || mknod -m 444 dev/random c 1 8
|
||||
[ -e "dev/urandom" ] || mknod -m 444 dev/urandom c 1 9
|
||||
chown root:tty dev/console dev/ptmx dev/tty
|
||||
ln -fs proc/self/fd dev/fd
|
||||
ln -fs proc/self/fd/0 dev/stdin
|
||||
ln -fs proc/self/fd/1 dev/stdout
|
||||
ln -fs proc/self/fd/2 dev/stderr
|
||||
ln -fs proc/kcore dev/core
|
||||
mkdir -p dev/pts
|
||||
mkdir -p dev/shm
|
||||
grep -q "${JAILDIR}/${jail}/dev/pts" /proc/mounts || mount -t devpts -o gid=4,mode=620 none dev/pts
|
||||
grep -q "${JAILDIR}/${jail}/dev/shm" /proc/mounts || mount -t tmpfs none dev/shm
|
||||
chroot "${JAILDIR}/${jail}" /usr/sbin/sshd -E /var/log/authlog || error "${jail} : error on starting sshd"
|
||||
pidfile="${JAILDIR}/${jail}/${SSHD_PID}"
|
||||
for try in {1..10}; do
|
||||
[ -f "${pidfile}" ] || sleep 0.3
|
||||
done
|
||||
pid=$(cat "${pidfile}")
|
||||
notice "${jail} was started [${pid}]"
|
|
@ -1,25 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Print status of <jailname> (default all jail)
|
||||
# Usage: status [<jailname>]
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] || error "${jail} : inexistant jail ! Use '$0 status' for list all"
|
||||
|
||||
inc="0"
|
||||
if [ -f "${CONFDIR}/${jail}" ]; then
|
||||
day=$(grep -c "day" "${CONFDIR}/${jail}")
|
||||
month=$(grep -c "month" "${CONFDIR}/${jail}")
|
||||
inc="${day}/${month}"
|
||||
fi
|
||||
status="OFF"
|
||||
"${LIBDIR}/bkctld-is-on" "${jail}" && status="ON "
|
||||
port=$("${LIBDIR}/bkctld-port" "${jail}")
|
||||
ip=$("${LIBDIR}/bkctld-ip" "${jail}"|xargs|tr -s ' ' ',')
|
||||
echo "${jail} ${status} ${port} ${inc} ${ip}" | awk '{ printf("%- 30s %- 10s %- 10s %- 10s %- 40s\n", $1, $2, $3, $4, $5); }'
|
|
@ -1,22 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Stop jail <jailname> or all
|
||||
# Usage: stop <jailname>|all
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] || error "${jail} : trying to stop inexistant jail"
|
||||
"${LIBDIR}/bkctld-is-on" "${jail}" || exit 0
|
||||
|
||||
pid=$(cat "${JAILDIR}/${jail}/${SSHD_PID}")
|
||||
for conn in $(ps --ppid "${pid}" -o pid=); do
|
||||
kill "${conn}"
|
||||
done
|
||||
kill "${pid}" && notice "${jail} was stopped [${pid}]"
|
||||
umount --lazy --recursive "${JAILDIR}/${jail}/dev"
|
||||
umount --lazy "${JAILDIR}/${jail}/proc/"
|
|
@ -1,25 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Sync jail <jailname> or all to another node
|
||||
# Usage: sync <jailname>|all
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] || error "${jail} : trying to sync inexistant jail"
|
||||
|
||||
[ -n "${NODE}" ] || error "Sync need config of \$NODE in /etc/default/bkctld !"
|
||||
|
||||
jail="${1}"
|
||||
ssh "${NODE}" "${LIBDIR}/bkctld-init" "${jail}" | debug
|
||||
rsync -a "${JAILDIR}/${jail}/" "${NODE}:${JAILDIR}/${jail}/" --exclude proc/* --exclude sys/* --exclude dev/* --exclude run --exclude var/backup/*
|
||||
rsync -a "${CONFDIR}/${jail}" "${NODE}:${CONFDIR}/${jail}"
|
||||
"${LIBDIR}/bkctld-is-on" "${jail}" && ssh "${NODE}" "${LIBDIR}/bkctld-start" "${jail}" | debug
|
||||
if [ -n "${FIREWALL_RULES}" ]; then
|
||||
rsync -a "${FIREWALL_RULES}" "${NODE}:${FIREWALL_RULES}"
|
||||
ssh "${NODE}" /etc/init.d/minifirewall restart | debug
|
||||
fi
|
|
@ -1,17 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Update jail <jailname> or all
|
||||
# Usage: update <jailname>|all
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
|
||||
jail="${1:-}"
|
||||
if [ ! -n "${jail}" ]; then
|
||||
"${LIBDIR}/bkctld-help" && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail}" ] || error "${jail} : trying to update inexistant jail"
|
||||
"${LIBDIR}/bkctld-is-on" "${jail}" && "${LIBDIR}/bkctld-stop" "${jail}"
|
||||
|
||||
. "${LIBDIR}/mkjail"
|
||||
notice "${jail} : updated jail"
|
64
lib/config
64
lib/config
|
@ -1,64 +0,0 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Config for bkctld
|
||||
#
|
||||
|
||||
[ -f /etc/default/bkctld ] && . /etc/default/bkctld
|
||||
LIBDIR=${LIBDIR:-/usr/lib/bkctld}
|
||||
CONFDIR="${CONFDIR:-/etc/evobackup}"
|
||||
BACKUP_DISK="${BACKUP_DISK:-}"
|
||||
JAILDIR="${JAILDIR:-/backup/jails}"
|
||||
INCDIR="${INCDIR:-/backup/incs}"
|
||||
TPLDIR="${TPLDIR:-/usr/share/bkctld}"
|
||||
INDEX_DIR="${INDEX_DIR:-/backup/index}"
|
||||
IDX_FILE="${IDX_FILE:-${INDEX_DIR}/bkctld-jails.idx}"
|
||||
LOCALTPLDIR="${LOCALTPLDIR:-/usr/local/share/bkctld}"
|
||||
SSHD_PID="${SSHD_PID:-/run/sshd.pid}"
|
||||
SSHD_CONFIG="${SSHD_CONFIG:-/etc/ssh/sshd_config}"
|
||||
AUTHORIZED_KEYS="${AUTHORIZED_KEYS:-/root/.ssh/authorized_keys}"
|
||||
FIREWALL_RULES="${FIREWALL_RULES:-}"
|
||||
LOGLEVEL="${LOGLEVEL:-6}"
|
||||
CRITICAL="${CRITICAL:-48}"
|
||||
WARNING="${WARNING:-24}"
|
||||
DUC=$(command -v duc-nox||command -v duc)
|
||||
|
||||
debug() {
|
||||
msg="${1:-$(cat /dev/stdin)}"
|
||||
if [ "${LOGLEVEL}" -ge 7 ]; then
|
||||
echo "${msg}"
|
||||
logger -t bkctld -p daemon.debug "${msg}"
|
||||
fi
|
||||
}
|
||||
|
||||
info() {
|
||||
msg="${1:-$(cat /dev/stdin)}"
|
||||
if [ "${LOGLEVEL}" -ge 6 ]; then
|
||||
tty -s && echo "${msg}"
|
||||
logger -t bkctld -p daemon.info "${msg}"
|
||||
fi
|
||||
}
|
||||
|
||||
notice() {
|
||||
msg="${1:-$(cat /dev/stdin)}"
|
||||
tty -s && echo "${msg}"
|
||||
[ "${LOGLEVEL}" -ge 5 ] && logger -t bkctld -p daemon.notice "${msg}"
|
||||
}
|
||||
|
||||
warning() {
|
||||
msg="${1:-$(cat /dev/stdin)}"
|
||||
tty -s && echo "WARNING : ${msg}" >&2
|
||||
if [ "${LOGLEVEL}" -ge 4 ]; then
|
||||
tty -s || echo "WARNING : ${msg}" >&2
|
||||
logger -t bkctld -p daemon.warning "${msg}"
|
||||
fi
|
||||
}
|
||||
|
||||
error() {
|
||||
msg="${1:-$(cat /dev/stdin)}"
|
||||
tty -s && echo "ERROR : ${msg}" >&2
|
||||
if [ "${LOGLEVEL}" -ge 5 ]; then
|
||||
tty -s || echo "ERROR : ${msg}" >&2
|
||||
logger -t bkctld -p daemon.error "${msg}"
|
||||
fi
|
||||
exit 1
|
||||
}
|
44
lib/mkjail
44
lib/mkjail
|
@ -1,44 +0,0 @@
|
|||
#!/bin/sh
|
||||
|
||||
passwd="${TPLDIR}/passwd"
|
||||
shadow="${TPLDIR}/shadow"
|
||||
group="${TPLDIR}/group"
|
||||
sshrc="${TPLDIR}/sshrc"
|
||||
[ -f "${LOCALTPLDIR}/passwd" ] && passwd="${LOCALTPLDIR}/passwd"
|
||||
[ -f "${LOCALTPLDIR}/shadow" ] && shadow="${LOCALTPLDIR}/shadow"
|
||||
[ -f "${LOCALTPLDIR}/group" ] && group="${LOCALTPLDIR}/group"
|
||||
[ -f "${LOCALTPLDIR}/sshrc" ] && group="${LOCALTPLDIR}/sshrc"
|
||||
umask 077
|
||||
|
||||
info "1 - Creating the chroot"
|
||||
cd "${JAILDIR}/${jail}"
|
||||
rm -rf bin lib lib64 run usr var/run etc/ssh/*key
|
||||
mkdir -p dev proc
|
||||
mkdir -p usr/bin usr/sbin usr/lib usr/lib/x86_64-linux-gnu usr/lib/openssh usr/lib64
|
||||
mkdir -p etc/ssh var/log run/sshd
|
||||
mkdir -p root/.ssh var/backup -m 0700
|
||||
ln -s usr/bin bin
|
||||
ln -s usr/lib lib
|
||||
ln -s usr/lib64 lib64
|
||||
ln -st var ../run
|
||||
touch var/log/lastlog var/log/wtmp run/utmp
|
||||
|
||||
info "2 - Copying essential files"
|
||||
[ -f /etc/ssh/ssh_host_rsa_key ] && cp /etc/ssh/ssh_host_rsa_key etc/ssh
|
||||
[ -f /etc/ssh/ssh_host_ecdsa_key ] && cp /etc/ssh/ssh_host_ecdsa_key etc/ssh
|
||||
[ -f /etc/ssh/ssh_host_ed25519_key ] && cp /etc/ssh/ssh_host_ed25519_key etc/ssh
|
||||
cp "${passwd}" etc
|
||||
cp "${shadow}" etc
|
||||
cp "${group}" etc
|
||||
cp "${sshrc}" etc/ssh
|
||||
|
||||
info "3 - Copying binaries"
|
||||
cp -f /lib/ld-linux.so.2 lib 2>/dev/null || cp -f /lib64/ld-linux-x86-64.so.2 lib64
|
||||
cp /lib/x86_64-linux-gnu/libnss* lib/x86_64-linux-gnu
|
||||
|
||||
for dbin in /bin/sh /bin/ls /bin/mkdir /bin/cat /bin/rm /bin/sed /usr/bin/rsync /usr/bin/lastlog /usr/bin/touch /usr/sbin/sshd /usr/lib/openssh/sftp-server; do
|
||||
cp -f "${dbin}" "${JAILDIR}/${jail}/${dbin}";
|
||||
for lib in $(ldd "${dbin}" | grep -Eo "/.*so.[0-9\.]+"); do
|
||||
cp -p "${lib}" "${JAILDIR}/${jail}/${lib}"
|
||||
done
|
||||
done
|
1
.gitignore → server/.gitignore
vendored
1
.gitignore → server/.gitignore
vendored
|
@ -1,2 +1,3 @@
|
|||
*.swp
|
||||
.vagrant
|
||||
build
|
225
server/CHANGELOG.md
Normal file
225
server/CHANGELOG.md
Normal file
|
@ -0,0 +1,225 @@
|
|||
# Changelog
|
||||
All notable changes to this project will be documented in this file.
|
||||
|
||||
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
|
||||
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
|
||||
|
||||
## [Unreleased]
|
||||
|
||||
### Deprecated
|
||||
|
||||
### Removed
|
||||
|
||||
### Fixed
|
||||
|
||||
* shell syntax error when ${btrfs_bin} variable is empty
|
||||
* read_variable + read_numerical_variable: keep the last found value only
|
||||
|
||||
### Security
|
||||
|
||||
## [22.04] - 2022-04-20
|
||||
|
||||
### Added
|
||||
|
||||
* Run the test suite on Bullseye (ext4/btrfs) in addition of Stretch and Buster (ext4/btrfs)
|
||||
* Tell sed to follow symlinks
|
||||
* Add a header in `bkctld status` output and improved columns width.
|
||||
* bkctld-check-setup: compatibility with minifirewall 22.03+
|
||||
|
||||
### Changed
|
||||
|
||||
* change versioning pattern
|
||||
|
||||
## [2.12.0] - 2021-11-02
|
||||
|
||||
### Changed
|
||||
|
||||
* btrfs depends on the btrfd-progs package instead of btrfs-tools
|
||||
|
||||
## [2.11.1] - 2021-06-30
|
||||
|
||||
### Changed
|
||||
|
||||
* bkctld-rename: abort operation if incs exist with the new name
|
||||
|
||||
## [2.11.0] - 2021-06-29
|
||||
|
||||
### Changed
|
||||
|
||||
* bkctld-remove: remove config directory
|
||||
|
||||
### Fixed
|
||||
|
||||
* force flag must be exported
|
||||
|
||||
## [2.10.0] - 2021-06-29
|
||||
|
||||
### Added
|
||||
|
||||
* bkctld-archive: archive a jail
|
||||
* bkctld-rename: rename a jail and all its incs and configuration…
|
||||
|
||||
### Removed
|
||||
|
||||
* Do not print out date, log level and process name on stdout/stderr
|
||||
## [2.9.0] - 2021-02-22
|
||||
|
||||
### Added
|
||||
|
||||
* bkctld-init: install check_policy template
|
||||
* bkctld-upgrade-config: install check_policy template if missing
|
||||
* test: bkctld check-incs shouldn't fail without incs_policy file
|
||||
|
||||
### Changed
|
||||
|
||||
* Rename incs_policy template
|
||||
* bkctld-check-incs: Correct shellsheck warnings
|
||||
|
||||
### Fixed
|
||||
|
||||
* tests: clean jail configuration after each test
|
||||
* bkctld-check-incs: Protect `jail_config_epoch`
|
||||
|
||||
## [2.8.0] - 2020-11-28
|
||||
|
||||
### Added
|
||||
|
||||
* bkctld: new inc-lock and inc-unlock command
|
||||
|
||||
## [2.7.1] - 2020-11-28
|
||||
|
||||
### Fixed
|
||||
|
||||
* bkctld-upgrade-config is executable
|
||||
|
||||
## [2.7.0] - 2020-11-13
|
||||
|
||||
### Added
|
||||
|
||||
* bkctld: add a [-f|--force] option to remove confirmation on some commands
|
||||
* bkctld-remove: confirmation before removal of jails if not in force mode
|
||||
* bkctld-rm: delete empty jails in incs directory
|
||||
|
||||
### Changed
|
||||
|
||||
* Better help message composition and formating
|
||||
* bkctld-rm: list jails from incs directory
|
||||
|
||||
## [2.6.0] - 2020-10-07
|
||||
|
||||
### Added
|
||||
|
||||
* bkctld: add a [-V|--version] option to display release number
|
||||
* bkctld: add a [-h|--help|-?] option to display help message
|
||||
|
||||
## [2.5.1] - 2020-10-07
|
||||
|
||||
### Changed
|
||||
|
||||
* bkctld: Replace xargs with a simple loop
|
||||
|
||||
## [2.5.0] - 2020-09-25
|
||||
|
||||
### Fixed
|
||||
|
||||
* restore compatibility with Debian <10
|
||||
|
||||
## [2.4.1] - 2020-08-28
|
||||
|
||||
### Added
|
||||
|
||||
* jails and incs lists are sorted alphanumerically
|
||||
|
||||
### Fixed
|
||||
|
||||
* bkctld-check-setup: forgot to increment the summary
|
||||
|
||||
## [2.4.0] - 2020-08-19
|
||||
|
||||
### Added
|
||||
|
||||
* New command bkctld upgrade-config to move the legacy config file "/etc/evobackup/<jail>" to the new config structure "/etc/evobackup/<jail>.d/incs_policy"
|
||||
|
||||
### Changed
|
||||
|
||||
* bkctld-update: start jail after upgrade if it was started before
|
||||
* bkctld: don't replace SSH host keys when creating/updating a jail
|
||||
* Split check into check-jails and check-setup
|
||||
* bkctld-check-jails checks if jails
|
||||
* bkctld-check-setup checks if the partition is mounted and writable, if firewall is configured and if all jails are in their expected state
|
||||
* create new ssh keys for new jails instead of copying those from the host
|
||||
|
||||
## [2.3.3] - 2020-05-28
|
||||
|
||||
### Fixed
|
||||
|
||||
* On sync, add trailing slash to rsync command
|
||||
|
||||
## [2.3.2] - 2020-05-03
|
||||
|
||||
### Changed
|
||||
|
||||
* Display help message if mandatory arguments are missing.
|
||||
* Don't recreate jail on sync if it already exists
|
||||
* Don't sync the whole firewall file, just remake rules for the current jail
|
||||
* On sync, if local jail is running, reload remote jail if already running, start if not
|
||||
|
||||
## [2.3.1] - 2020-04-22
|
||||
|
||||
### Added
|
||||
|
||||
* State the age of the current "rm" process when killing it
|
||||
* Give the new PID after killing the previous "rm" process
|
||||
|
||||
### Fixed
|
||||
|
||||
* typos
|
||||
* forgotten quotes
|
||||
|
||||
## [2.3.0] - 2020-04-20
|
||||
|
||||
### Changed
|
||||
|
||||
* Rewrite log messages and format
|
||||
|
||||
## [2.2.2] - 2020-04-19
|
||||
|
||||
### Changed
|
||||
|
||||
* Reorganize temp files and lock files
|
||||
|
||||
### Fixed
|
||||
|
||||
* Properly call subcommands in bkctld-check-incs and bkctld-check-last-incs
|
||||
* Log start time in bkctld-rm
|
||||
|
||||
## [2.2.1] - 2020-04-18
|
||||
|
||||
### Changed
|
||||
|
||||
* check-incs.sh and check-last-incs.sh are embedded in bkctld
|
||||
|
||||
## [2.2.0] - 2020-04-17
|
||||
|
||||
### Added
|
||||
|
||||
* Shellcheck directives to have 0 warnings and errors
|
||||
* Ability to override critical/warning thresholds per jail for bkctld-check
|
||||
* Support new location for jail configuration (/etc/evobackup/<jail_name>.d/)
|
||||
* Lock per jail and inc when creating incs
|
||||
* Global lock when removing incs (kill the currently running instance)
|
||||
* Create a blank SSH "authorized_keys" file on jail init
|
||||
* Many new tests with BATS
|
||||
* Check for firewall configuration in bkcld-check
|
||||
* Run the test suite on Buster (ext4/btrfs) in addition of Stretch (ext4/btrfs)
|
||||
|
||||
### Changed
|
||||
|
||||
* Extract variables and heper functions to reduce repetition of knowledge
|
||||
* Consistent naming of variables in scripts and functions
|
||||
* Consistent log messages between functions ad commands
|
||||
* Raise errors if required function arguments are missing
|
||||
* Configure locales in Vagrant VM
|
||||
* Split BATS tests file and use helper functions
|
||||
* Improve "lib" detection
|
||||
* Revamp the README
|
116
server/README.md
Normal file
116
server/README.md
Normal file
|
@ -0,0 +1,116 @@
|
|||
Bkctld (aka server-side evobackup)
|
||||
=========
|
||||
|
||||
bkctld helps you manage the receiving side of a backup infrastructure.
|
||||
It is licensed under the AGPLv3.
|
||||
|
||||
With bkctld you create and manage "jails". They contain a chrooted and dedicated SSH server, with it's own TCP port and optionnaly it's own set of iptables rules.
|
||||
|
||||
With bkctld you can have hundreds of jails, one for each client to push its data (using Rsync/SFTP). Each client can only see its own data.
|
||||
|
||||
In addition to the traditional "ext4" filesystem, bkctld also supports the btrfs filesystem and manages subvolumes automatically.
|
||||
|
||||
With bkctld you can create "timestamped" copies of the data, to keep different versions of the same data at different points in time. If the filesystem is btrfs, it creates subvolumes snapshots, otherwise it creates copies with hard-links (for file-level deduplication).
|
||||
|
||||
With btrfs you can have a data retention policy to automatically destroy timestamped copies of your data. For example, keep a copy for the last 5 days and the first day of the last 3 months.
|
||||
|
||||
~~~
|
||||
Backup server
|
||||
************
|
||||
Client 1 ------ SSH/Rsync -------> * tcp/2222 *
|
||||
************
|
||||
Client 2 ------ SSH/Rsync -------> * tcp/2223 *
|
||||
************
|
||||
~~~
|
||||
|
||||
This method uses standard tools (ssh, rsync, cp -al, btrfs subvolume) and has been used for many years by Evolix to backup hundreds of servers, totaling many terabytes of data, each day. bkctld has been tested on Debian Jessie (8), Stretch (9) and Buster (10) and should be compatible with other Debian versions or derived distributions like Ubuntu.
|
||||
|
||||
A large enough volume must be mounted on `/backup`, we recommend the usage of **BTRFS** so you can use sub-volumes and snapshots.
|
||||
This volume can also be encrypted with **LUKS**.
|
||||
|
||||
## Security considerations
|
||||
|
||||
The client obviously has access to its uploaded data (in the chroot), but the timestamped copies are outside the chroot, to reduce the risk or complete backup erasure from a compromised client.
|
||||
|
||||
Since the client connects to the backup server with root, it can mess with the jail and destroy the data. But the timestamped copies are out of reach because outside of the chroot.
|
||||
|
||||
It means that **if the client server is compromised**, an attacker can destroy the latest copy of the backed up data, but not the timestamped copies.
|
||||
And **if the backup server is compromised** an attacker has complete access to all the backup data (inside and outside the jails), but they don't have any access to the client.
|
||||
|
||||
This architecture is as secure as SSH, Rsync, chroot and iptables are.
|
||||
|
||||
## Install
|
||||
|
||||
See the [installation guide](docs/install.md) for instructions.
|
||||
|
||||
## Testing
|
||||
|
||||
You can deploy test environments with Vagrant :
|
||||
|
||||
~~~
|
||||
vagrant up
|
||||
~~~
|
||||
|
||||
### Deployment
|
||||
|
||||
Run `vagrant rsync-auto` in a terminal for automatic synchronization of
|
||||
your local code with Vagrant VM :
|
||||
|
||||
~~~
|
||||
vagrant rsync-auto
|
||||
~~~
|
||||
|
||||
### Bats
|
||||
|
||||
You can run [bats](https://github.com/sstephenson/bats) tests with
|
||||
the *test* provisioner :
|
||||
|
||||
~~~
|
||||
vagrant provision --provision-with test
|
||||
~~~
|
||||
|
||||
You can also run the tests from inside the VM
|
||||
|
||||
~~~
|
||||
localhost $ vagrant ssh buster-btrfs
|
||||
vagrant@buster-btrfs $ sudo -i
|
||||
root@buster-btrfs # bats /vagrant/test/*.bats
|
||||
~~~
|
||||
|
||||
You should shellcheck your bats files, but with shellcheck > 0.4.6, because the 0.4.0 version doesn't support bats syntax.
|
||||
|
||||
## Usage
|
||||
|
||||
See [docs/usage.md](docs/usage.md).
|
||||
|
||||
The man(1) page, in troff(7) language, can be generated with pandoc:
|
||||
|
||||
~~~
|
||||
pandoc -f markdown \
|
||||
-t man usage.md \
|
||||
--template default.man \
|
||||
-V title=bkctld \
|
||||
-V section=8 \
|
||||
-V date="$(date '+%d %b %Y')" \
|
||||
-V footer="$(git describe --tags)" \
|
||||
-V header="bkctld man page"
|
||||
~~~
|
||||
|
||||
#### Client configuration
|
||||
|
||||
You can backup various systems in the evobackup jails : Linux, BSD,
|
||||
Windows, macOS. The only need Rsync or an SFTP client.
|
||||
|
||||
~~~
|
||||
rsync -av -e "ssh -p SSH_PORT" /home/ root@SERVER_NAME:/var/backup/home/
|
||||
~~~
|
||||
|
||||
An example synchronization script is present in `zzz_evobackup`,
|
||||
clone the evobackup repository and read the **CLIENT CONFIGURATION**
|
||||
section of the manual.
|
||||
|
||||
~~~
|
||||
git clone https://gitea.evolix.org/evolix/evobackup.git
|
||||
cd evobackup
|
||||
man ./docs/bkctld.8
|
||||
~~~
|
17
Vagrantfile → server/Vagrantfile
vendored
17
Vagrantfile → server/Vagrantfile
vendored
|
@ -6,7 +6,7 @@ vagrantfile = File.join("#{Dir.home}", '.VagrantFile')
|
|||
load File.expand_path(vagrantfile) if File.exists?(vagrantfile)
|
||||
|
||||
Vagrant.configure('2') do |config|
|
||||
config.vm.synced_folder "./", "/vagrant", type: "rsync", rsync__exclude: [ '.vagrant', '.git' ]
|
||||
config.vm.synced_folder "./", "/vagrant", type: "rsync", rsync__exclude: [ '.vagrant', '.git', 'build' ]
|
||||
config.ssh.shell="/bin/sh"
|
||||
|
||||
config.vm.provider :libvirt do |libvirt|
|
||||
|
@ -24,11 +24,16 @@ mkdir -p /usr/lib/nagios/plugins/
|
|||
SCRIPT
|
||||
|
||||
$deps = <<SCRIPT
|
||||
DEBIAN_FRONTEND=noninteractive apt-get -yq install openssh-server btrfs-tools rsync lsb-base coreutils sed dash mount openssh-sftp-server libc6 bash-completion duc-nox cryptsetup bats
|
||||
DEBIAN_FRONTEND=noninteractive apt-get -yq install openssh-server btrfs-progs rsync lsb-base coreutils sed dash mount openssh-sftp-server libc6 bash-completion duc-nox cryptsetup bats
|
||||
SCRIPT
|
||||
|
||||
$pre_part = <<SCRIPT
|
||||
lsof|awk '/backup/ { print $2 }'| xargs --no-run-if-empty kill -9
|
||||
sed --follow-symlinks --in-place -e 's/# en_US.UTF-8 UTF-8/en_US.UTF-8 UTF-8/' /etc/locale.gen && \
|
||||
sed --follow-symlinks --in-place -e 's/# fr_FR.UTF-8 UTF-8/fr_FR.UTF-8 UTF-8/' /etc/locale.gen && \
|
||||
echo 'LANG="fr_FR.UTF-8"'>/etc/default/locale && \
|
||||
dpkg-reconfigure --frontend=noninteractive locales && \
|
||||
update-locale LANG=fr_FR.UTF-8
|
||||
lsof | awk '/backup/ { print $2 }' | xargs --no-run-if-empty kill -9
|
||||
grep -q /backup /proc/mounts && umount -R /backup
|
||||
exit 0
|
||||
SCRIPT
|
||||
|
@ -40,7 +45,11 @@ SCRIPT
|
|||
|
||||
nodes = [
|
||||
{ :version => "stretch", :fs => "btrfs" },
|
||||
{ :version => "stretch", :fs => "ext4" }
|
||||
{ :version => "stretch", :fs => "ext4" },
|
||||
{ :version => "buster", :fs => "btrfs" },
|
||||
{ :version => "buster", :fs => "ext4" },
|
||||
{ :version => "bullseye", :fs => "btrfs" },
|
||||
{ :version => "bullseye", :fs => "ext4" }
|
||||
]
|
||||
|
||||
nodes.each do |i|
|
29
server/bash_completion
Normal file
29
server/bash_completion
Normal file
|
@ -0,0 +1,29 @@
|
|||
# bkctld(8) completion
|
||||
#
|
||||
# Copyright (c) 2017 Victor Laborie <vlaborie@evolix.fr>
|
||||
#
|
||||
# shellcheck shell=bash
|
||||
|
||||
function _bkctld()
|
||||
{
|
||||
local cur prev commands jails keys
|
||||
|
||||
cur=${COMP_WORDS[COMP_CWORD]};
|
||||
prev=${COMP_WORDS[COMP_CWORD-1]};
|
||||
commands=$(find /usr/lib/bkctld/ -name "bkctld-*" -exec basename {} \; | sed 's/^bkctld-//')
|
||||
|
||||
if [ $COMP_CWORD -eq 1 ]; then
|
||||
COMPREPLY=($(compgen -W '${commands}' -- ${cur}))
|
||||
elif [ $COMP_CWORD -eq 2 ]; then
|
||||
[ -f /etc/default/bkctld ] && source /etc/default/bkctld
|
||||
[ -z "${JAILDIR}" ] && JAILDIR='/backup/jails'
|
||||
jails=$(ls "${JAILDIR}")
|
||||
COMPREPLY=($(compgen -W "${jails}" -- ${cur}))
|
||||
elif [ $COMP_CWORD -eq 3 ]; then
|
||||
keys=$(ls *.pub)
|
||||
COMPREPLY=($(compgen -W "${keys}" -- ${cur}))
|
||||
fi
|
||||
|
||||
return 0
|
||||
} &&
|
||||
complete -F _bkctld bkctld
|
174
server/bkctld
Executable file
174
server/bkctld
Executable file
|
@ -0,0 +1,174 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# bkctld is a shell script to create and manage a backup server which will
|
||||
# handle the backup of many servers (clients).
|
||||
#
|
||||
# Authors: Victor Laborie <vlaborie@evolix.fr>
|
||||
# Jérémy Lecour <jlecour@evolix.fr>
|
||||
# Benoît Série <bserie@evolix.fr>
|
||||
# Gregory Colpart <reg@evolix.fr>
|
||||
# Romain Dessort <rdessort@evolix.fr>
|
||||
# Tristan Pilat <tpilat@evolix.fr>
|
||||
# Licence: AGPLv3
|
||||
#
|
||||
|
||||
set -u
|
||||
|
||||
if [ "$(id -u)" -ne 0 ]; then
|
||||
echo "You need to be root to run ${0} !" >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
basedir=$(dirname "$0")
|
||||
if [ "${basedir}" = "/usr/local/sbin" ] && [ -d "/usr/local/lib/bkctld" ]; then
|
||||
LIBDIR='/usr/local/lib/bkctld'
|
||||
elif [ "${basedir}" = "/usr/sbin" ] && [ -d "/usr/lib/bkctld" ]; then
|
||||
LIBDIR='/usr/lib/bkctld'
|
||||
elif [ -d './lib' ]; then
|
||||
LIBDIR='lib'
|
||||
else
|
||||
echo "Failed to find a suitable lib directory for bkctld." >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# shellcheck source=lib/includes
|
||||
. "${LIBDIR}/includes"
|
||||
|
||||
# Parse options
|
||||
# based on https://gist.github.com/deshion/10d3cb5f88a21671e17a
|
||||
if [ "$#" = "0" ]; then
|
||||
show_help
|
||||
exit 1
|
||||
fi
|
||||
while :; do
|
||||
case $1 in
|
||||
-h|-\?|--help)
|
||||
show_help
|
||||
exit 0
|
||||
;;
|
||||
-V|--version)
|
||||
show_version
|
||||
exit 0
|
||||
;;
|
||||
-f|--force)
|
||||
export FORCE=1
|
||||
;;
|
||||
*)
|
||||
# Default case: If no more options then break out of the loop.
|
||||
break
|
||||
;;
|
||||
esac
|
||||
|
||||
shift
|
||||
done
|
||||
|
||||
subcommand="${1:-}"
|
||||
case "${subcommand}" in
|
||||
"inc" | "rm" | "check-jails" | "check-setup" | "stats" | "list")
|
||||
"${LIBDIR}/bkctld-${subcommand}"
|
||||
;;
|
||||
"check")
|
||||
# backward compatibility
|
||||
"${LIBDIR}/bkctld-check-jails"
|
||||
;;
|
||||
"check-incs")
|
||||
option="${2:-}"
|
||||
if [ "${option}" = "all" ] || [ -z "${option}" ]; then
|
||||
"${LIBDIR}/bkctld-check-incs"
|
||||
elif [ "${option}" = "last" ]; then
|
||||
"${LIBDIR}/bkctld-check-last-incs"
|
||||
else
|
||||
show_help
|
||||
exit 1
|
||||
fi
|
||||
;;
|
||||
"init" | "is-on")
|
||||
jail_name="${2:-}"
|
||||
if [ -z "${jail_name}" ]; then
|
||||
show_help
|
||||
exit 1
|
||||
else
|
||||
"${LIBDIR}/bkctld-${subcommand}" "${jail_name}"
|
||||
fi
|
||||
;;
|
||||
"key" | "port" | "ip")
|
||||
jail_name="${2:-}"
|
||||
option="${3:-}"
|
||||
if [ "${jail_name}" = "all" ] || [ -z "${jail_name}" ]; then
|
||||
show_help
|
||||
exit 1
|
||||
else
|
||||
"${LIBDIR}/bkctld-${subcommand}" "${jail_name}" "${option}"
|
||||
fi
|
||||
;;
|
||||
"start" | "stop" | "reload" | "restart" | "sync" | "update" | "remove" | "firewall" | "upgrade-config" | "archive")
|
||||
jail_name="${2:-}"
|
||||
if [ "${jail_name}" = "all" ]; then
|
||||
for jail in $("${LIBDIR}/bkctld-list"); do
|
||||
"${LIBDIR}/bkctld-${subcommand}" "${jail}"
|
||||
done
|
||||
elif [ -z "${jail_name}" ]; then
|
||||
show_help
|
||||
exit 1
|
||||
else
|
||||
"${LIBDIR}/bkctld-${subcommand}" "${jail_name}"
|
||||
fi
|
||||
;;
|
||||
"status")
|
||||
jail_name="${2:-}"
|
||||
printf '%-30s %-10s %-10s %-25s %-20s\n' 'JAIL NAME' 'STATUS' 'PORT' 'RETENTION (DAY/MONTH)' 'IP'
|
||||
if [ "${jail_name}" = "all" ] || [ -z "${jail_name}" ]; then
|
||||
for jail in $("${LIBDIR}/bkctld-list"); do
|
||||
"${LIBDIR}/bkctld-${subcommand}" "${jail}"
|
||||
done
|
||||
else
|
||||
"${LIBDIR}/bkctld-${subcommand}" "${jail_name}"
|
||||
fi
|
||||
;;
|
||||
"inc-lock" | "inc-unlock")
|
||||
if [ "${subcommand}" = "inc-lock" ]; then
|
||||
lock_status=on
|
||||
elif [ "${subcommand}" = "inc-unlock" ]; then
|
||||
lock_status=off
|
||||
else
|
||||
show_help
|
||||
exit 1
|
||||
fi
|
||||
pattern="${2:-}"
|
||||
if [ "${pattern}" = "all" ]; then
|
||||
target_path_pattern=$(incs_path "*/*")
|
||||
elif [ -n "${pattern}" ]; then
|
||||
# Check if pattern is a jail name
|
||||
if jails_with_incs_list | grep --silent --fixed-strings --line-regexp "${pattern}"; then
|
||||
debug "${pattern} is a jail, change pattern to ${pattern}/*"
|
||||
# then change attern to all subdirectories
|
||||
target_path_pattern=$(incs_path "${pattern}/*")
|
||||
else
|
||||
# or use it as is
|
||||
target_path_pattern=$(incs_path "${pattern}")
|
||||
fi
|
||||
else
|
||||
show_help
|
||||
exit 1
|
||||
fi
|
||||
|
||||
for target_path in ${target_path_pattern}; do
|
||||
"${LIBDIR}/bkctld-inc-lock" "${lock_status}" "${target_path}"
|
||||
done
|
||||
echo "finish"
|
||||
;;
|
||||
"rename")
|
||||
jail_name="${2:-}"
|
||||
new_jail_name="${3:-}"
|
||||
if [ -z "${jail_name}" ] || [ -z "${new_jail_name}" ]; then
|
||||
show_help
|
||||
exit 1
|
||||
else
|
||||
"${LIBDIR}/bkctld-${subcommand}" "${jail_name}" "${new_jail_name}"
|
||||
fi
|
||||
;;
|
||||
*)
|
||||
show_help
|
||||
exit 1
|
||||
;;
|
||||
esac
|
|
@ -14,3 +14,4 @@
|
|||
#FIREWALL_RULES=''
|
||||
#LOGLEVEL=6
|
||||
#NODE=''
|
||||
#ARCHIVESDIR='/backup/archives'
|
|
@ -49,3 +49,6 @@ Launch git-buildpackage :
|
|||
~~~
|
||||
gbp buildpackage
|
||||
~~~
|
||||
|
||||
The generated build files (including the `.deb`) are located in the `/tmp/bkctld/` directory.
|
||||
|
71
server/docs/install.md
Normal file
71
server/docs/install.md
Normal file
|
@ -0,0 +1,71 @@
|
|||
# Install
|
||||
|
||||
## Install from package
|
||||
|
||||
A Debian package is available in the Evolix repository
|
||||
|
||||
~~~
|
||||
echo "deb http://pub.evolix.net/ stretch" >> /etc/apt/sources.list
|
||||
apt update
|
||||
apt install bkctld
|
||||
~~~
|
||||
|
||||
Then edit `/etc/default/bkctld`
|
||||
|
||||
## Instal from sources
|
||||
|
||||
Warning: `cp`-ing the files without `-n` or `-i` will replace existing files !
|
||||
|
||||
~~~
|
||||
# git clone https://gitea.evolix.org/evolix/evobackup.git
|
||||
# cd evobackup
|
||||
# cp bkctld /usr/local/sbin/
|
||||
# mkdir -p /usr/local/lib/bkctld
|
||||
# cp lib/* /usr/local/lib/bkctld/
|
||||
# mkdir -p /usr/local/share/bkctld
|
||||
# cp tpl/* /usr/local/share/bkctld/
|
||||
# cp bkctld.service /lib/systemd/system/
|
||||
# mkdir -p /usr/local/share/doc/bkctld
|
||||
# cp zzz_evobackup /usr/local/share/doc/bkctld/
|
||||
# mkdir -p /usr/local/share/bash_completion/
|
||||
# cp bash_completion /usr/local/share/bash_completion/bkctld
|
||||
# cp bkctld.conf /etc/default/bkctld
|
||||
~~~
|
||||
|
||||
## Chroot dependencies
|
||||
|
||||
The chroot jails depend on these packages
|
||||
|
||||
~~~
|
||||
apt install \
|
||||
bash \
|
||||
coreutils \
|
||||
sed \
|
||||
dash \
|
||||
mount \
|
||||
rsync \
|
||||
openssh-server \
|
||||
openssh-sftp-server \
|
||||
libc6-i386 \
|
||||
libc6
|
||||
~~~
|
||||
|
||||
## Client dependencies
|
||||
|
||||
The clients only require OpenSSH and Rsync.
|
||||
|
||||
### Cron job for incremental backups
|
||||
|
||||
Edit the root crontab
|
||||
|
||||
~~~
|
||||
# $editor /etc/cron.d/bkctld
|
||||
+ MAILTO=alert4@evolix.net
|
||||
+ 30 11 * * * root /usr/sbin/bkctld inc && /usr/sbin/bkctld rm
|
||||
+ 30 23 * * * root /usr/share/scripts/check-incs.sh 1> /dev/null
|
||||
~~~
|
||||
|
||||
## Notes
|
||||
If you want mutiples backups in a day (1 per hour maximum) you can
|
||||
run `bkctld inc` multiples times, if you want to keep incremental
|
||||
backups **for ever**, just don't run `bkctld rm`.
|
|
@ -155,31 +155,31 @@ the backup server administrator will need:
|
|||
|
||||
He can then create the jail:
|
||||
|
||||
# bkctld init CLIENT_HOST_NAME
|
||||
# bkctld key CLIENT_HOST_NAME /root/CLIENT_HOST_NAME.pub
|
||||
# bkctld ip CLIENT_HOST_NAME CLIENT_IP_ADDRESS
|
||||
# bkctld start CLIENT_HOST_NAME
|
||||
# bkctld status CLIENT_HOST_NAME
|
||||
# bkctld init <JAIL_NAME>
|
||||
# bkctld key <JAIL_NAME> /root/<JAIL_NAME>.pub
|
||||
# bkctld ip <JAIL_NAME> <IP_OR_CIDR>
|
||||
# bkctld start <JAIL_NAME>
|
||||
# bkctld status <JAIL_NAME>
|
||||
|
||||
And override the default
|
||||
evobackup-incl(5)
|
||||
rules
|
||||
|
||||
# $EDITOR /etc/evobackup/CLIENT_HOST_NAME
|
||||
# $EDITOR /etc/evobackup/<JAIL_NAME>.d/incs_policy
|
||||
|
||||
To sync itself,
|
||||
the client server will need to install
|
||||
rsync(1).
|
||||
It can then be run manually:
|
||||
|
||||
# rsync -av -e "ssh -p JAIL_PORT" /home/ root@BACKUP_SERVER:/var/backup/home/
|
||||
# rsync -av -e "ssh -p <JAIL_PORT>" /home/ root@<BACKUP_SERVER>:/var/backup/home/
|
||||
|
||||
If a more automated setup is required,
|
||||
a script can be written in any programming language.
|
||||
In this case,
|
||||
it may be useful to validate the backup server's identity before hand.
|
||||
|
||||
# ssh -p JAIL_PORT BACKUP_SERVER
|
||||
# ssh -p <JAIL_PORT> root@<BACKUP_SERVER> -t exit
|
||||
|
||||
A
|
||||
bash(1)
|
51
server/lib/bkctld-archive
Executable file
51
server/lib/bkctld-archive
Executable file
|
@ -0,0 +1,51 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Archive jail and all dated copies (incs)
|
||||
# Usage: archive <jailname>|all
|
||||
# Return codes:
|
||||
# * 101 : jail archival aborted
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
if [ -z "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
archive_jail_path=$(archive_path "${jail_name}")
|
||||
|
||||
test -d "${archive_jail_path}" && error "${jail_name}: archive already exists" 2
|
||||
|
||||
if [ "${FORCE}" != "1" ]; then
|
||||
answer=""
|
||||
while :; do
|
||||
printf "> Are you sure you want to archive jail \`%s'? [Y,n,?] " "${jail_name}"
|
||||
read -r answer
|
||||
case $answer in
|
||||
[Yy]|"" )
|
||||
break
|
||||
;;
|
||||
[Nn] )
|
||||
tty -s && echo "Abort." >&2
|
||||
exit 101
|
||||
;;
|
||||
* )
|
||||
printf "y - yes, execute actions and exit\n"
|
||||
printf "n - no, don't execute actions and exit\n"
|
||||
printf "? - print this help\n"
|
||||
;;
|
||||
esac
|
||||
done
|
||||
fi
|
||||
|
||||
"${LIBDIR}/bkctld-is-on" "${jail_name}" && "${LIBDIR}/bkctld-stop" "${jail_name}"
|
||||
|
||||
mkdir -p "$(dirname "${archive_jail_path}")"
|
||||
mv "${jail_path}" "${archive_jail_path}"
|
||||
|
||||
notice "Archive jail \`${jail_name}' : OK"
|
60
server/lib/bkctld-check-incs
Executable file
60
server/lib/bkctld-check-incs
Executable file
|
@ -0,0 +1,60 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Run check on all expected incs of all jails
|
||||
# Usage: check-incs all
|
||||
#
|
||||
|
||||
set -u
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname "$0")" && . "${LIBDIR}/includes"
|
||||
|
||||
# default return value is 0 (succes)
|
||||
rc=0
|
||||
# loop for each configured jail
|
||||
for jail_name in $("${LIBDIR}/bkctld-list"); do
|
||||
incs_policy_file=$(current_jail_incs_policy_file "${jail_name}")
|
||||
|
||||
# Today in seconds from epoch
|
||||
today_epoch=$(date +"%s")
|
||||
# Today in ISO format
|
||||
today_iso=$(date +"%Y-%m-%d")
|
||||
|
||||
if [ -n "${incs_policy_file}" ]; then
|
||||
# get jail last configuration date
|
||||
jail_config_epoch=$(date --date "$(stat -c %y "${incs_policy_file}")" +"%s")
|
||||
|
||||
# read each line in jail configuration
|
||||
while read line; do
|
||||
## TODO
|
||||
# deal with empty lines
|
||||
|
||||
# inc date in ISO format
|
||||
inc_iso=$(relative_date "${line}")
|
||||
# inc date in seconds from epoch
|
||||
inc_epoch=$(date --date "${inc_iso}" +"%s")
|
||||
|
||||
# skip line if date is in the future
|
||||
if [ "${inc_epoch}" -gt "${today_epoch}" ]; then
|
||||
echo "INFO: ${jail_name} : no inc expected for ${inc_iso}"
|
||||
else
|
||||
# check if the configuration changed after the inc date
|
||||
# or if it's today's inc
|
||||
if [ "${jail_config_epoch}" -lt "${inc_epoch}" ] \
|
||||
|| [ "${today_iso}" = "${inc_iso}" ]; then
|
||||
# Error if inc is not found
|
||||
if ! inc_exists "${jail_name}" "${inc_iso}*"; then
|
||||
echo "ERROR: ${jail_name} : missing inc for ${inc_iso}" >&2
|
||||
rc=1
|
||||
fi
|
||||
else
|
||||
echo "INFO: ${jail_name} : no inc expected for ${inc_iso}"
|
||||
fi
|
||||
fi
|
||||
done < "${incs_policy_file}"
|
||||
else
|
||||
echo "INFO: ${jail_name} : no inc expected at all"
|
||||
fi
|
||||
done
|
||||
|
||||
exit $rc
|
78
server/lib/bkctld-check-jails
Executable file
78
server/lib/bkctld-check-jails
Executable file
|
@ -0,0 +1,78 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Run check on jails (NRPE output)
|
||||
# Usage: check-jails
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
return=0
|
||||
nb_crit=0
|
||||
nb_warn=0
|
||||
nb_ok=0
|
||||
nb_unkn=0
|
||||
output=""
|
||||
|
||||
# Check each jail status
|
||||
|
||||
check_jail() {
|
||||
jail_name=$1
|
||||
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
cur_time=$(date "+%s")
|
||||
last_conn=$(stat --format=%Y "${jail_path}/var/log/lastlog")
|
||||
date_diff=$(( (cur_time - last_conn) / (60*60) ))
|
||||
|
||||
check_policy_file=$(current_jail_check_policy_file "${jail_name}")
|
||||
|
||||
if [ -f "${check_policy_file}" ]; then
|
||||
local_critical=$(read_numerical_variable "${check_policy_file}" "CRITICAL")
|
||||
local_warning=$(read_numerical_variable "${check_policy_file}" "WARNING")
|
||||
else
|
||||
unset local_critical
|
||||
unset local_warning
|
||||
fi
|
||||
# reset to default values if missing local value
|
||||
: ${local_critical:=${CRITICAL}}
|
||||
: ${local_warning:=${WARNING}}
|
||||
|
||||
if [ "${local_critical}" -gt "0" ] && [ "${date_diff}" -gt "${local_critical}" ]; then
|
||||
nb_crit=$((nb_crit + 1))
|
||||
output="${output}CRITICAL - ${jail_name} - ${date_diff} hours (${local_warning}/${local_critical})\n"
|
||||
[ "${return}" -le 2 ] && return=2
|
||||
elif [ "${local_warning}" -gt "0" ] && [ "${date_diff}" -gt "${local_warning}" ]; then
|
||||
nb_warn=$((nb_warn + 1))
|
||||
output="${output}WARNING - ${jail_name} - ${date_diff} hours (${local_warning}/${local_critical})\n"
|
||||
[ "${return}" -le 1 ] && return=1
|
||||
else
|
||||
nb_ok=$((nb_ok + 1))
|
||||
output="${output}OK - ${jail_name} - ${date_diff} hours (${local_warning}/${local_critical})\n"
|
||||
fi
|
||||
}
|
||||
|
||||
for jail_name in $(jails_list); do
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
if [ -f "${jail_path}/var/log/lastlog" ]; then
|
||||
check_jail "${jail_name}"
|
||||
else
|
||||
nb_unkn=$((nb_unkn + 1))
|
||||
output="${output}UNKNOWN - ${jail_name} doesn't have lastlog !\n"
|
||||
[ "${return}" -le 3 ] && return=3
|
||||
fi
|
||||
done
|
||||
|
||||
[ "${return}" -ge 0 ] && header="OK"
|
||||
[ "${return}" -ge 1 ] && header="WARNING"
|
||||
[ "${return}" -ge 2 ] && header="CRITICAL"
|
||||
[ "${return}" -ge 3 ] && header="UNKNOWN"
|
||||
|
||||
printf "%s - %s UNK / %s CRIT / %s WARN / %s OK\n\n" "${header}" "${nb_unkn}" "${nb_crit}" "${nb_warn}" "${nb_ok}"
|
||||
|
||||
printf "${output}" | grep -E "^UNKNOWN"
|
||||
printf "${output}" | grep -E "^CRITICAL"
|
||||
printf "${output}" | grep -E "^WARNING"
|
||||
printf "${output}" | grep -E "^OK"
|
||||
|
||||
exit "${return}"
|
31
server/lib/bkctld-check-last-incs
Executable file
31
server/lib/bkctld-check-last-incs
Executable file
|
@ -0,0 +1,31 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Run check on the last inc of all jails
|
||||
# Usage: check-incs last
|
||||
#
|
||||
|
||||
set -u
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
# default return value is 0 (succes)
|
||||
rc=0
|
||||
# loop for each found jail
|
||||
for jail_name in $("${LIBDIR}/bkctld-list"); do
|
||||
incs_policy_file=$(current_jail_incs_policy_file "${jail_name}")
|
||||
|
||||
if [ -n "${incs_policy_file}" ]; then
|
||||
# inc date in seconds from epoch
|
||||
inc_date=$(date +"%Y-%m-%d")
|
||||
# Error if inc is not found
|
||||
if ! inc_exists "${jail_name}" "${inc_date}*"; then
|
||||
echo "ERROR: ${jail_name} : missing inc for ${inc_date}" >&2
|
||||
rc=1
|
||||
fi
|
||||
else
|
||||
echo "INFO: ${jail_name} : no inc expected at all"
|
||||
fi
|
||||
done
|
||||
|
||||
exit $rc
|
92
server/lib/bkctld-check-setup
Executable file
92
server/lib/bkctld-check-setup
Executable file
|
@ -0,0 +1,92 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Run check on jails (NRPE output)
|
||||
# Usage: check setup
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
return=0
|
||||
nb_crit=0
|
||||
nb_warn=0
|
||||
nb_ok=0
|
||||
nb_unkn=0
|
||||
output=""
|
||||
|
||||
# Verify backup partition is mounted and writable
|
||||
|
||||
findmnt --mountpoint "${BACKUP_PARTITION}" -O rw > /dev/null
|
||||
if [ "$?" -ne 0 ]; then
|
||||
nb_crit=$((nb_crit + 1))
|
||||
output="${output}CRITICAL - Backup disk \`/backup' is not mounted (or read-only) !\n"
|
||||
return=2
|
||||
else
|
||||
nb_ok=$((nb_ok + 1))
|
||||
output="${output}OK - Backup disk \`/backup' is mounted and writable.\n"
|
||||
fi
|
||||
|
||||
# Check if the firewall file is sourced
|
||||
|
||||
minifirewall_config=/etc/default/minifirewall
|
||||
minifirewall_version=$(/etc/init.d/minifirewall status | head -1 | cut -d ' ' -f 3)
|
||||
|
||||
if [ -n "${FIREWALL_RULES}" ] \
|
||||
&& [ -r "${FIREWALL_RULES}" ] \
|
||||
&& [ -f "${minifirewall_config}" ]; then
|
||||
if [ -n "${minifirewall_version}" ] && dpkg --compare-versions "${minifirewall_version}" ge "22.03"; then
|
||||
# Minifirewall 22.03+ includes files automatically
|
||||
nb_ok=$((nb_ok + 1))
|
||||
output="${output}OK - Firewall file \`${FIREWALL_RULES}' is present.\n"
|
||||
else
|
||||
if grep -qE "^(\.|source) ${FIREWALL_RULES}" "${minifirewall_config}"; then
|
||||
nb_ok=$((nb_ok + 1))
|
||||
output="${output}OK - Firewall file \`${FIREWALL_RULES}' is sourced by \`${minifirewall_config}'.\n"
|
||||
else
|
||||
nb_warn=$((nb_warn + 1))
|
||||
output="${output}WARNING - Firewall file \`${FIREWALL_RULES}' doesn't seem to be sourced by \`${minifirewall_config}'\n"
|
||||
[ "${return}" -le 1 ] && return=1
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
|
||||
# Check if jails are started
|
||||
nb_on=0
|
||||
nb_off=0
|
||||
for jail_name in $(jails_list); do
|
||||
if "${LIBDIR}/bkctld-is-on" "${jail_name}"; then
|
||||
nb_on=$((nb_on + 1))
|
||||
else
|
||||
expected_state="ON"
|
||||
check_policy_file=$(current_jail_check_policy_file "${jail_name}")
|
||||
|
||||
if [ -f "${check_policy_file}" ]; then
|
||||
expected_state=$(read_variable "${check_policy_file}" "EXPECTED_STATE")
|
||||
fi
|
||||
if [ "${expected_state}" != "OFF" ]; then
|
||||
nb_off=$((nb_off + 1))
|
||||
fi
|
||||
fi
|
||||
done
|
||||
if [ "${nb_off}" -eq 0 ]; then
|
||||
output="${output}OK - all jails are in their expected state.\n"
|
||||
nb_ok=$((nb_ok + 1))
|
||||
else
|
||||
output="${output}CRITICAL - ${nb_off} jail(s) shouldn't be OFF !\n"
|
||||
nb_crit=$((nb_crit + 1))
|
||||
[ "${return}" -le 2 ] && return=2
|
||||
fi
|
||||
|
||||
[ "${return}" -ge 0 ] && header="OK"
|
||||
[ "${return}" -ge 1 ] && header="WARNING"
|
||||
[ "${return}" -ge 2 ] && header="CRITICAL"
|
||||
[ "${return}" -ge 3 ] && header="UNKNOWN"
|
||||
|
||||
printf "%s - %s UNK / %s CRIT / %s WARN / %s OK\n\n" "${header}" "${nb_unkn}" "${nb_crit}" "${nb_warn}" "${nb_ok}"
|
||||
|
||||
printf "${output}" | grep -E "^UNKNOWN"
|
||||
printf "${output}" | grep -E "^CRITICAL"
|
||||
printf "${output}" | grep -E "^WARNING"
|
||||
printf "${output}" | grep -E "^OK"
|
||||
|
||||
exit "${return}"
|
41
server/lib/bkctld-firewall
Executable file
41
server/lib/bkctld-firewall
Executable file
|
@ -0,0 +1,41 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Update firewall rules
|
||||
# Usage: firewall [<jailname>|all]
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
|
||||
if [ -z "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
iptables_input_accept() {
|
||||
jail_name="${1}"
|
||||
port="${2}"
|
||||
ip="${3}"
|
||||
debug "Accept \`${ip}:${port}' for jail \`${jail_name}'"
|
||||
|
||||
echo "/sbin/iptables -A INPUT -p tcp --sport 1024: --dport ${port} -s ${ip} -j ACCEPT #${jail_name}"
|
||||
}
|
||||
|
||||
if [ -n "${FIREWALL_RULES}" ]; then
|
||||
# remove existing rules for this jail
|
||||
[ -f "${FIREWALL_RULES}" ] && sed --follow-symlinks --in-place "/#${jail_name}$/d" "${FIREWALL_RULES}"
|
||||
if [ -d "${jail_path}" ]; then
|
||||
port=$("${LIBDIR}/bkctld-port" "${jail_name}")
|
||||
# Add a rule for each IP
|
||||
for ip in $("${LIBDIR}/bkctld-ip" "${jail_name}"); do
|
||||
iptables_input_accept "${jail_name}" "${port}" "${ip}" >> "${FIREWALL_RULES}"
|
||||
done
|
||||
# Restart the firewall
|
||||
[ -f /etc/init.d/minifirewall ] && /etc/init.d/minifirewall restart >/dev/null
|
||||
fi
|
||||
notice "Firewall updated for jail \`${jail_name}'"
|
||||
else
|
||||
notice "Skip jail \`${jail_name}' : FIREWALL_RULES variable is empty."
|
||||
fi
|
78
server/lib/bkctld-inc
Executable file
78
server/lib/bkctld-inc
Executable file
|
@ -0,0 +1,78 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Make dated copies (incs) of jails
|
||||
# Usage: inc
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
create_inc_btrfs() {
|
||||
jail_name=${1:?}
|
||||
inc_name=${2:?}
|
||||
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
inc_path=$(inc_path "${jail_name}" "${inc_name}")
|
||||
|
||||
btrfs_bin=$(command -v btrfs)
|
||||
if [ -z "${btrfs_bin}" ]; then
|
||||
error "btrfs not found. Please install btrfs-progs."
|
||||
fi
|
||||
|
||||
if dry_run; then
|
||||
echo "[dry-run] btrfs subvolume snapshot of ${jail_path} to ${inc_path}"
|
||||
else
|
||||
mkdir --parents "$(dirname "${inc_path}")"
|
||||
# create a btrfs readonly snapshot from the jail
|
||||
${btrfs_bin} subvolume snapshot -r "${jail_path}" "${inc_path}" | debug
|
||||
fi
|
||||
}
|
||||
create_inc_ext4() {
|
||||
jail_name=${1:?}
|
||||
inc_name=${2:?}
|
||||
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
inc_path=$(inc_path "${jail_name}" "${inc_name}")
|
||||
|
||||
if dry_run; then
|
||||
echo "[dry-run] copy of ${jail_path} to ${inc_path}"
|
||||
else
|
||||
mkdir --parents "$(dirname "${inc_path}")"
|
||||
# create a copy of the jail with hard links
|
||||
cp --archive --link --one-file-system "${jail_path}/" "${inc_path}"
|
||||
fi
|
||||
}
|
||||
|
||||
inc_name=$(date +"%Y-%m-%d-%H")
|
||||
|
||||
jails_list=$(jails_list)
|
||||
jails_total=$(echo $jails_list | wc -w)
|
||||
jails_count=0
|
||||
|
||||
for jail_name in ${jails_list}; do
|
||||
jails_count=$((jails_count+1))
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
inc_path=$(inc_path "${jail_name}" "${inc_name}")
|
||||
incs_policy_file=$(current_jail_incs_policy_file ${jail_name})
|
||||
|
||||
# If no incs policy is found, we don't create incs
|
||||
if [ -n "${incs_policy_file}" ]; then
|
||||
# If inc directory is not present, we proceed with inc creation
|
||||
if [ ! -d "${inc_path}" ]; then
|
||||
info "Progress: jail ${jails_count} out of ${jails_total}"
|
||||
notice "Create inc \`${inc_name}' for jail \`${jail_name}' : start"
|
||||
|
||||
if is_btrfs "${jail_path}"; then
|
||||
create_inc_btrfs "${jail_name}" "${inc_name}"
|
||||
else
|
||||
create_inc_ext4 "${jail_name}" "${inc_name}"
|
||||
fi
|
||||
|
||||
notice "Create inc \`${inc_name}' for jail \`${jail_name}' : finish"
|
||||
else
|
||||
warning "Skip inc \`${inc_name}' for jail \`${jail_name}' : it already exists."
|
||||
fi
|
||||
else
|
||||
notice "Skip jail \`${jail_name}' : incs policy is missing"
|
||||
fi
|
||||
done
|
53
server/lib/bkctld-inc-lock
Executable file
53
server/lib/bkctld-inc-lock
Executable file
|
@ -0,0 +1,53 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Lock or unlock dated copies (incs) on BTRFS formatted volumes
|
||||
# Usage: inc-<lock|unlock> <all|jailname[/inc]>
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
lock_status="${1:?}"
|
||||
target_path="${2:?}"
|
||||
|
||||
lock_target() {
|
||||
target="${1:?}"
|
||||
btrfs_bin=$(command -v btrfs)
|
||||
if [ -z "${btrfs_bin}" ]; then
|
||||
error "btrfs not found. Please install btrfs-progs."
|
||||
fi
|
||||
if is_btrfs "${target}"; then
|
||||
${btrfs_bin} property set -ts "${target}" ro true
|
||||
info "Lock ${target}: done".
|
||||
else
|
||||
info "Lock ${target}: not BTRFS, nothing done".
|
||||
fi
|
||||
}
|
||||
unlock_target() {
|
||||
target="${1:?}"
|
||||
btrfs_bin=$(command -v btrfs)
|
||||
if [ -z "${btrfs_bin}" ]; then
|
||||
error "btrfs not found. Please install brtfs-progs."
|
||||
fi
|
||||
if is_btrfs "${target}"; then
|
||||
${btrfs_bin} property set -ts "${target}" ro false
|
||||
info "Unlock ${target}: done."
|
||||
else
|
||||
info "Unlock ${target}: not BTRFS, nothing done."
|
||||
fi
|
||||
}
|
||||
|
||||
# this directory test must be quoted,beacause of the probable globbing
|
||||
if [ -d ${target_path} ]; then
|
||||
if [ "${lock_status}" = "on" ]; then
|
||||
lock_target "${target_path}"
|
||||
elif [ "${lock_status}" = "off" ]; then
|
||||
unlock_target "${target_path}"
|
||||
else
|
||||
error "Unknown lock status \`${lock_status}'."
|
||||
exit 1
|
||||
fi
|
||||
else
|
||||
error "\`${target_path}': no such file or directory."
|
||||
exit 1
|
||||
fi
|
34
server/lib/bkctld-init
Executable file
34
server/lib/bkctld-init
Executable file
|
@ -0,0 +1,34 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Initialize a new jail
|
||||
# Usage: init <jailname>
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
if [ -z "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" && error "Skip jail \`${jail_name}' : it already exists"
|
||||
|
||||
# Create config and jails directory
|
||||
mkdir --parents "${CONFDIR}" "${JAILDIR}"
|
||||
|
||||
if is_btrfs "$(dirname "${JAILDIR}")" || is_btrfs "${JAILDIR}"; then
|
||||
btrfs_bin=$(command -v btrfs)
|
||||
if [ -z "${btrfs_bin}" ]; then
|
||||
error "btrfs not found. Please install btrfs-progs."
|
||||
fi
|
||||
${btrfs_bin} subvolume create "${jail_path}"
|
||||
else
|
||||
mkdir --parents "${jail_path}"
|
||||
fi
|
||||
|
||||
setup_jail_chroot "${jail_name}"
|
||||
setup_jail_config "${jail_name}"
|
||||
|
||||
notice "Create jail \`${jail_name}' : OK"
|
48
server/lib/bkctld-ip
Executable file
48
server/lib/bkctld-ip
Executable file
|
@ -0,0 +1,48 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Set or get allowed(s) ip(s)
|
||||
# Usage: ip <jailname> [<ip>|all]
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
ip="${2:-}"
|
||||
|
||||
if [ ! -n "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
jail_sshd_config="${jail_path}/${SSHD_CONFIG}"
|
||||
|
||||
if [ -z "${ip}" ]; then
|
||||
# parse IP addresses from AllowUsers directives in sshd config
|
||||
grep -E "^AllowUsers" "${jail_sshd_config}" \
|
||||
| grep -E -o "root@[^ ]+" \
|
||||
| while read allow; do
|
||||
echo "${allow}" | cut -d'@' -f2
|
||||
done
|
||||
else
|
||||
if [ "${ip}" = "all" ] || [ "${ip}" = "0.0.0.0/0" ]; then
|
||||
new_ips="0.0.0.0/0"
|
||||
else
|
||||
existing_ips=$("${LIBDIR}/bkctld-ip" "${jail_name}")
|
||||
new_ips=$(echo ${existing_ips} ${ip} | xargs -n1 | grep -v "0.0.0.0/0" | sort | uniq)
|
||||
fi
|
||||
allow_users="AllowUsers"
|
||||
for new_ip in ${new_ips}; do
|
||||
allow_users="${allow_users} root@${new_ip}"
|
||||
done
|
||||
if grep -q -E "^AllowUsers" "${jail_sshd_config}"; then
|
||||
sed --follow-symlinks --in-place "s~^AllowUsers .*~${allow_users}~" "${jail_sshd_config}"
|
||||
else
|
||||
error "No \`AllowUsers' directive found in \`${jail_sshd_config}'"
|
||||
fi
|
||||
notice "Update IP whitelist with \`${ip}' for jail \`${jail_name}' : OK"
|
||||
"${LIBDIR}/bkctld-reload" "${jail_name}"
|
||||
"${LIBDIR}/bkctld-firewall" "${jail_name}"
|
||||
fi
|
32
server/lib/bkctld-is-on
Executable file
32
server/lib/bkctld-is-on
Executable file
|
@ -0,0 +1,32 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Check if a SSH server is on (exit 0) or not (exit 100)
|
||||
# Usage: is-on <jailname>
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
|
||||
if [ -z "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
jail_pid_file="${jail_path}/${SSHD_PID}"
|
||||
|
||||
# Error codes are references in "includes" file
|
||||
return=100
|
||||
if [ -f "${jail_pid_file}" ]; then
|
||||
pid=$(cat "${jail_pid_file}")
|
||||
ps -p "${pid}" > /dev/null && return=0
|
||||
fi
|
||||
if [ "${return}" -gt 0 ]; then
|
||||
rm -f "${jail_pid_file}"
|
||||
grep -q "${jail_path}/proc" /proc/mounts && umount --lazy "${jail_path}/proc/"
|
||||
grep -q "${jail_path}/dev" /proc/mounts && umount --lazy --recursive "${jail_path}/dev"
|
||||
fi
|
||||
exit "${return}"
|
29
server/lib/bkctld-key
Executable file
29
server/lib/bkctld-key
Executable file
|
@ -0,0 +1,29 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Set or get ssh pubic key
|
||||
# Usage: key <jailname> [<keyfile>]
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
keyfile="${2:-}"
|
||||
|
||||
if [ ! -n "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
if [ -z "${keyfile}" ]; then
|
||||
if [ -f "${jail_path}/${AUTHORIZED_KEYS}" ]; then
|
||||
cat "${jail_path}/${AUTHORIZED_KEYS}"
|
||||
fi
|
||||
else
|
||||
test -r "${keyfile}" || error "SSH key \`${keyfile}' for jail \`${jail_name}' is missing or is not readable."
|
||||
cat "${keyfile}" > "${jail_path}/${AUTHORIZED_KEYS}"
|
||||
chmod 600 "${jail_path}/${AUTHORIZED_KEYS}"
|
||||
notice "Update SSH key \`${keyfile}' for jail \`${jail_name}' : OK"
|
||||
fi
|
13
server/lib/bkctld-list
Executable file
13
server/lib/bkctld-list
Executable file
|
@ -0,0 +1,13 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: List jails
|
||||
# Usage: list
|
||||
#
|
||||
|
||||
set -eu
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
[ -d "${JAILDIR}" ] || exit 0
|
||||
jails_list
|
36
server/lib/bkctld-port
Executable file
36
server/lib/bkctld-port
Executable file
|
@ -0,0 +1,36 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Set or get SSH port
|
||||
# Usage: port <jailname> [<port>|auto]
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
port="${2:-}"
|
||||
|
||||
if [ ! -n "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
jail_sshd_config="${jail_path}/${SSHD_CONFIG}"
|
||||
|
||||
if [ -z "${port}" ]; then
|
||||
grep -E "Port [0-9]+" "${jail_sshd_config}"|grep -oE "[0-9]+"
|
||||
else
|
||||
if [ "${port}" = "auto" ]; then
|
||||
port=$(grep -h Port "${JAILDIR}"/*/"${SSHD_CONFIG}" 2>/dev/null | grep -Eo "[0-9]+" | sort -n | tail -1)
|
||||
port=$((port+1))
|
||||
[ "${port}" -le 1 ] && port=2222
|
||||
fi
|
||||
sed --follow-symlinks --in-place "s/^Port .*/Port ${port}/" "${jail_sshd_config}"
|
||||
|
||||
notice "Update SSH port \`${port}' for jail \`${jail_name}' : OK"
|
||||
|
||||
"${LIBDIR}/bkctld-reload" "${jail_name}"
|
||||
"${LIBDIR}/bkctld-firewall" "${jail_name}"
|
||||
fi
|
26
server/lib/bkctld-reload
Executable file
26
server/lib/bkctld-reload
Executable file
|
@ -0,0 +1,26 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Reload SSH server
|
||||
# Usage: reload [<jailname>|all]
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
if [ -z "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
"${LIBDIR}/bkctld-is-on" "${jail_name}" || exit 0
|
||||
|
||||
pid=$(cat "${jail_path}/${SSHD_PID}")
|
||||
|
||||
if kill -HUP "${pid}"; then
|
||||
notice "Reload jail \`${jail_name}' : OK [${pid}]"
|
||||
else
|
||||
error "Reload jail \`${jail_name}' : failed [${pid}]"
|
||||
fi
|
81
server/lib/bkctld-remove
Executable file
81
server/lib/bkctld-remove
Executable file
|
@ -0,0 +1,81 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Remove jail and all dated copies (incs)
|
||||
# Usage: remove <jailname>|all
|
||||
# Return codes:
|
||||
# * 101 : jail removal aborted
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
if [ -z "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
incs_path=$(incs_path "${jail_name}")
|
||||
|
||||
if ! test -d "${jail_path}"; then
|
||||
if [ "${FORCE}" = "1" ]; then
|
||||
warning "${jail_name}: jail not found (ignore in FORCE mode)"
|
||||
exit 0
|
||||
else
|
||||
error "${jail_name}: jail not found" 2
|
||||
fi
|
||||
fi
|
||||
|
||||
if [ "${FORCE}" != "1" ]; then
|
||||
answer=""
|
||||
while :; do
|
||||
printf "> Are you sure you want to delete jail \`%s'? [Y,n,?] " "${jail_name}"
|
||||
read -r answer
|
||||
case $answer in
|
||||
[Yy]|"" )
|
||||
break
|
||||
;;
|
||||
[Nn] )
|
||||
tty -s && echo "Abort." >&2
|
||||
exit 101
|
||||
;;
|
||||
* )
|
||||
printf "y - yes, execute actions and exit\n"
|
||||
printf "n - no, don't execute actions and exit\n"
|
||||
printf "? - print this help\n"
|
||||
;;
|
||||
esac
|
||||
done
|
||||
fi
|
||||
|
||||
"${LIBDIR}/bkctld-is-on" "${jail_name}" && "${LIBDIR}/bkctld-stop" "${jail_name}"
|
||||
|
||||
rm -f "${CONFDIR}/${jail_name}"
|
||||
rm -rf "$(jail_config_dir "${jail_name}")"
|
||||
|
||||
btrfs_bin=$(command -v btrfs)
|
||||
if [ -z "${btrfs_bin}" ]; then
|
||||
error "btrfs not found. Please install btrfs-progs."
|
||||
fi
|
||||
|
||||
if is_btrfs "${jail_path}"; then
|
||||
${btrfs_bin} subvolume delete "${jail_path}" | debug
|
||||
else
|
||||
rm -rf "${jail_path:?}" | debug
|
||||
fi
|
||||
|
||||
# TODO: use functions here
|
||||
if [ -d "${incs_path}" ]; then
|
||||
incs=$(ls "${incs_path}")
|
||||
for inc in ${incs}; do
|
||||
inc_inode=$(stat --format=%i "${incs_path}/${inc}")
|
||||
if [ "${inc_inode}" -eq 256 ]; then
|
||||
${btrfs_bin} subvolume delete "${incs_path}/${inc}" | debug
|
||||
else
|
||||
warning "You need to purge \`${incs_path}/${inc}' manually"
|
||||
fi
|
||||
done
|
||||
rmdir --ignore-fail-on-non-empty "${incs_path}" | debug
|
||||
fi
|
||||
|
||||
"${LIBDIR}/bkctld-firewall" "${jail_name}"
|
||||
notice "Delete jail \`${jail_name}' : OK"
|
83
server/lib/bkctld-rename
Executable file
83
server/lib/bkctld-rename
Executable file
|
@ -0,0 +1,83 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Rename a jail
|
||||
# Usage: rename <jailname> <new-jailname>
|
||||
# Return codes:
|
||||
# * 1: error
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
new_jail_name="${2:?}"
|
||||
if [ -z "${jail_name}" ] || [ -z "${new_jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
incs_path=$(incs_path "${jail_name}")
|
||||
jail_config_dir=$(jail_config_dir "${jail_name}")
|
||||
legacy_config_file="${CONFDIR}/${jail_name}"
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
new_jail_path=$(jail_path "${new_jail_name}")
|
||||
new_incs_path=$(incs_path "${new_jail_name}")
|
||||
new_jail_config_dir=$(jail_config_dir "${new_jail_name}")
|
||||
new_legacy_config_file="${CONFDIR}/${new_jail_name}"
|
||||
|
||||
test -d "${new_jail_path}" && error "${new_jail_name}: jail already exists" 2
|
||||
test -d "${new_incs_path}" && error "${new_jail_name}: incs already exists" 2
|
||||
|
||||
"${LIBDIR}/bkctld-is-on" "${jail_name}" 2>/dev/null
|
||||
case "$?" in
|
||||
0)
|
||||
jail_initial_status="on"
|
||||
;;
|
||||
100)
|
||||
jail_initial_status="off"
|
||||
;;
|
||||
*)
|
||||
unset jail_initial_status
|
||||
error "Error evaluating jail \`${jail_name}' state. bkctld-is-on exited with \`$?'"
|
||||
;;
|
||||
esac
|
||||
|
||||
test "${jail_initial_status}" = "on" && "${LIBDIR}/bkctld-stop" "${jail_name}"
|
||||
|
||||
if dry_run; then
|
||||
echo "[dry-run] rename ${jail_path} to ${new_jail_path}"
|
||||
else
|
||||
mv "${jail_path}" "${new_jail_path}"
|
||||
fi
|
||||
if dry_run; then
|
||||
if [ -d "${incs_path}" ]; then
|
||||
echo "[dry-run] rename ${incs_path} to ${new_incs_path}"
|
||||
fi
|
||||
else
|
||||
if [ -d "${incs_path}" ]; then
|
||||
mv "${incs_path}" "${new_incs_path}"
|
||||
fi
|
||||
fi
|
||||
if [ -d "${jail_config_dir}" ]; then
|
||||
if dry_run; then
|
||||
echo "[dry-run] rename ${jail_config_dir} to ${new_jail_config_dir}"
|
||||
else
|
||||
mv "${jail_config_dir}" "${new_jail_config_dir}"
|
||||
fi
|
||||
fi
|
||||
if [ -f "${legacy_config_file}" ]; then
|
||||
if dry_run; then
|
||||
mv "${legacy_config_file}" "${new_legacy_config_file}"
|
||||
else
|
||||
echo "[dry-run] rename ${legacy_config_file} to ${new_legacy_config_file}"
|
||||
fi
|
||||
fi
|
||||
# Reset firewall for new jail name
|
||||
"${LIBDIR}/bkctld-firewall" "${jail_name}"
|
||||
"${LIBDIR}/bkctld-firewall" "${new_jail_name}"
|
||||
|
||||
test "${jail_initial_status}" = "on" && "${LIBDIR}/bkctld-start" "${new_jail_name}"
|
||||
|
||||
notice "Rename jail \`${jail_name}' to \`${new_jail_name}' : OK"
|
21
server/lib/bkctld-restart
Executable file
21
server/lib/bkctld-restart
Executable file
|
@ -0,0 +1,21 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Restart SSH server
|
||||
# Usage: restart [<jailname>|all]
|
||||
#
|
||||
|
||||
set -eu
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
if [ -z "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
"${LIBDIR}/bkctld-is-on" "${jail_name}" && "${LIBDIR}/bkctld-stop" "${jail_name}"
|
||||
"${LIBDIR}/bkctld-start" "${jail_name}"
|
160
server/lib/bkctld-rm
Executable file
160
server/lib/bkctld-rm
Executable file
|
@ -0,0 +1,160 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Remove old dated copies (incs) according to policy
|
||||
# Usage: rm
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
kill_or_clean_lockfile() {
|
||||
lock_file=${1:-}
|
||||
|
||||
if [ -f "${lock_file}" ]; then
|
||||
# Get Process ID from the lock file
|
||||
pid=$(cat "${lock_file}")
|
||||
if [ -n "${pid}" ]; then
|
||||
if kill -0 "${pid}" 2> /dev/null; then
|
||||
# Kill the children
|
||||
pkill -9 --parent "${pid}"
|
||||
# Kill the parent
|
||||
kill -9 "${pid}"
|
||||
# Only one bkctld-rm can run in parallel, the latest wins
|
||||
lockfile_date=$(date --date "@$(stat -c %Y ${lock_file})" +"%Y-%m-%d %H:%M:%S")
|
||||
warning "Process \`${pid}' (started at ${lockfile_date}) has been killed by \`$$'"
|
||||
else
|
||||
warning "Process not found at PID \`${pid}'. Ignoring lock file \`${lock_file}'."
|
||||
fi
|
||||
else
|
||||
warning "Empty lockfile \`${lock_file}'. It should contain a PID."
|
||||
fi
|
||||
# Remove the lock file
|
||||
rm -f ${lock_file}
|
||||
fi
|
||||
}
|
||||
incs_to_delete() {
|
||||
jail_name=${1:?}
|
||||
incs_policy_file=${2:?}
|
||||
|
||||
incs_policy_keep_file=$(new_tmp_file "${jail_name}.incs_policy_keep")
|
||||
incs_list_file=$(new_tmp_file "${jail_name}.incs_list")
|
||||
|
||||
# loop for each line in jail configuration
|
||||
for incs_policy_line in $(grep "^\+" ${incs_policy_file}); do
|
||||
# inc date in ISO format
|
||||
incs_policy_date=$(relative_date ${incs_policy_line})
|
||||
echo ${incs_policy_date} >> "${incs_policy_keep_file}"
|
||||
done
|
||||
for inc_name in $(incs_list "${jail_name}"); do
|
||||
echo "${inc_name}" >> ${incs_list_file}
|
||||
done
|
||||
|
||||
# shellcheck disable=SC2046
|
||||
incs_to_delete=$(grep -v -f "${incs_policy_keep_file}" "${incs_list_file}")
|
||||
|
||||
rm -f "${incs_policy_keep_file}" "${incs_list_file}"
|
||||
|
||||
echo ${incs_to_delete}
|
||||
}
|
||||
delete_inc_btrfs() {
|
||||
jail_name=$1
|
||||
inc_name=$2
|
||||
|
||||
inc_path=$(inc_path "${jail_name}" "${inc_name}")
|
||||
btrfs_bin=$(command -v btrfs)
|
||||
|
||||
if [ -z "${btrfs_bin}" ]; then
|
||||
error "btrfs not found. Please install btrfs-progs."
|
||||
fi
|
||||
|
||||
if dry_run; then
|
||||
echo "[dry-run] delete btrfs subvolume ${inc_path}"
|
||||
else
|
||||
${btrfs_bin} subvolume delete "${inc_path}" | debug
|
||||
fi
|
||||
}
|
||||
delete_inc_ext4() {
|
||||
jail_name=$1
|
||||
inc_name=$2
|
||||
|
||||
inc_path=$(inc_path "${jail_name}" "${inc_name}")
|
||||
|
||||
if dry_run; then
|
||||
echo "[dry-run] delete ${inc_path} with rsync from empty directory"
|
||||
else
|
||||
empty=$(new_tmp_dir "empty")
|
||||
rsync --archive --delete "${empty}/" "${inc_path}/"
|
||||
rmdir "${inc_path}/"
|
||||
rmdir "${empty}"
|
||||
fi
|
||||
|
||||
}
|
||||
delete_empty_inc() {
|
||||
jail_name=$1
|
||||
|
||||
incs_path=$(incs_path "${jail_name}")
|
||||
empty_incs_list=$(find "${incs_path}" -mindepth 0 -maxdepth 0 -type d -empty)
|
||||
|
||||
for empty_inc in ${empty_incs_list}; do
|
||||
if dry_run; then
|
||||
echo "[dry-run] Delete empty \`${empty_inc}'"
|
||||
else
|
||||
rmdir "${empty_inc}"
|
||||
notice "Delete empty \`${empty_inc}' : OK"
|
||||
fi
|
||||
done
|
||||
}
|
||||
|
||||
lock_file="${LOCKDIR}/rm-global.lock"
|
||||
# shellcheck disable=SC2064
|
||||
trap "rm -f ${lock_file}; cleanup_tmp;" 0
|
||||
|
||||
kill_or_clean_lockfile "${lock_file}"
|
||||
new_lock_file "${lock_file}"
|
||||
|
||||
# We list jails in "incs" directory, not in "jails" directory
|
||||
# so we can clean old incs after a jail is archived
|
||||
jails_list=$(jails_with_incs_list)
|
||||
jails_total=$(echo $jails_list | wc -w)
|
||||
jails_count=0
|
||||
|
||||
for jail_name in ${jails_list}; do
|
||||
jails_count=$((jails_count+1))
|
||||
incs_policy_file=$(current_jail_incs_policy_file ${jail_name})
|
||||
# If no incs policy is found, we don't remove incs
|
||||
if [ -n "${incs_policy_file}" ]; then
|
||||
# shellcheck disable=SC2046
|
||||
incs_to_delete=$(incs_to_delete "${jail_name}" "${incs_policy_file}")
|
||||
incs_total=$(echo ${incs_to_delete} | wc -w)
|
||||
incs_count=0
|
||||
|
||||
if [ -n "${incs_to_delete}" ]; then
|
||||
debug "Incs to be deleted for \`${jail_name}' : $(echo "${incs_to_delete}" | tr '\n', ',' | sed 's/,$//')."
|
||||
for inc_name in ${incs_to_delete}; do
|
||||
incs_count=$((incs_count+1))
|
||||
info "Progress: jail ${jails_count} out of ${jails_total} - inc ${incs_count} out of ${incs_total}"
|
||||
notice "Delete inc \`${inc_name}' for jail \`${jail_name}' : start"
|
||||
|
||||
inc_path=$(inc_path "${jail_name}" "${inc_name}")
|
||||
|
||||
if is_btrfs "${inc_path}"; then
|
||||
delete_inc_btrfs "${jail_name}" "${inc_name}"
|
||||
else
|
||||
delete_inc_ext4 "${jail_name}" "${inc_name}"
|
||||
fi
|
||||
|
||||
notice "Delete inc \`${inc_name}' for jail \`${jail_name}' : finish"
|
||||
done
|
||||
else
|
||||
notice "Skip jail \`${jail_name}' : no inc to delete"
|
||||
fi
|
||||
else
|
||||
notice "Skip jail \`${jail_name}' : incs policy is missing"
|
||||
fi
|
||||
# Delete empty incs directory for jail
|
||||
delete_empty_inc "${jail_name}"
|
||||
done
|
||||
|
||||
# Remove the lock file and cleanup tmp files
|
||||
rm -f "${lock_file}"
|
||||
cleanup_tmp
|
43
server/lib/bkctld-start
Executable file
43
server/lib/bkctld-start
Executable file
|
@ -0,0 +1,43 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Start SSH Server
|
||||
# Usage: start <jailname>|all
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
if [ -z "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
"${LIBDIR}/bkctld-is-on" "${jail_name}" && exit 0
|
||||
|
||||
# Prepare the chroot
|
||||
mount_jail_fs "${jail_name}"
|
||||
|
||||
# Start SSH in the chroot
|
||||
chroot "${jail_path}" /usr/sbin/sshd -E /var/log/authlog || error "Failed to start SSH for jail \`${jail_name}'"
|
||||
pidfile="${jail_path}/${SSHD_PID}"
|
||||
|
||||
# Wait for SSH to be up
|
||||
# shellcheck disable=SC2034
|
||||
for try in $(seq 1 10); do
|
||||
if [ -f "${pidfile}" ]; then
|
||||
pid=$(cat "${pidfile}")
|
||||
break
|
||||
else
|
||||
pid=""
|
||||
sleep 0.3
|
||||
fi
|
||||
done
|
||||
|
||||
if [ -n "${pid}" ]; then
|
||||
notice "Start jail \`${jail_name}' : OK [${pid}]"
|
||||
else
|
||||
error "Failed to fetch SSH PID for jail \`${jail_name}' within 3 seconds"
|
||||
fi
|
|
@ -1,34 +1,48 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Make and display stats on jails (size, lastconn)
|
||||
# Description: Display stats on jails (size, last connection…)
|
||||
# Usage: stats
|
||||
#
|
||||
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/config"
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
mkdir -p "${INDEX_DIR}"
|
||||
|
||||
lsof "${IDX_FILE}" >/dev/null 2>&1 || nohup sh -s -- <<EOF >/dev/null 2>&1 &
|
||||
|
||||
ionice -c3 "${DUC}" index -d "${IDX_FILE}" "${JAILDIR}"
|
||||
touch "${INDEX_DIR}/.lastrun.duc"
|
||||
EOF
|
||||
|
||||
[ ! -f "${INDEX_DIR}/.lastrun.duc" ] && notice "First run of DUC always in progress ..." && exit 0
|
||||
[ ! -f ${IDX_FILE} ] && error "Index file do not exits !"
|
||||
[ ! -f ${IDX_FILE} ] && error "Index file doesn't exits !"
|
||||
|
||||
printf "Last update of index file : "
|
||||
stat --format=%Y "${INDEX_DIR}/.lastrun.duc" | xargs -i -n1 date -R -d "@{}"
|
||||
echo "<jail> <size> <incs> <lastconn>" | awk '{ printf("%- 30s %- 10s %- 10s %- 15s\n", $1, $2, $3, $4); }'
|
||||
|
||||
duc_output=$(mktemp)
|
||||
stat_output=$(mktemp)
|
||||
incs_output=$(mktemp)
|
||||
|
||||
# shellcheck disable=SC2064
|
||||
trap "rm ${duc_output} ${incs_output} ${stat_output}" 0
|
||||
|
||||
"${DUC}" ls -d "${IDX_FILE}" "${JAILDIR}" > "${duc_output}"
|
||||
awk '{ print $2 }' "${duc_output}" | while read jail; do
|
||||
stat --format=%Y "/backup/jails/${jail}/var/log/lastlog" | xargs -i -n1 date -d "@{}" "+%d-%m-%Y" >> "${stat_output}"
|
||||
inc=0
|
||||
if [ -f "${CONFDIR}/${jail}" ]; then
|
||||
day=$(grep -c "day" "${CONFDIR}/${jail}")
|
||||
month=$(grep -c "month" "${CONFDIR}/${jail}")
|
||||
inc="${day}/${month}"
|
||||
|
||||
awk '{ print $2 }' "${duc_output}" | while read jail_name; do
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
stat --format=%Y "${jail_path}/var/log/lastlog" | xargs -i -n1 date -d "@{}" "+%d-%m-%Y" >> "${stat_output}"
|
||||
|
||||
incs_policy_file=$(current_jail_incs_policy_file ${jail_name})
|
||||
incs_policy="0"
|
||||
if [ -r "${incs_policy_file}" ]; then
|
||||
days=$(grep "^\+" "${incs_policy_file}" | grep --count "day")
|
||||
months=$(grep "^\+" "${incs_policy_file}" | grep --count "month")
|
||||
incs_policy="${days}/${months}"
|
||||
fi
|
||||
echo "${inc}" >> "${incs_output}"
|
||||
echo "${incs_policy}" >> "${incs_output}"
|
||||
done
|
||||
|
||||
paste "${duc_output}" "${incs_output}" "${stat_output}" | awk '{ printf("%- 30s %- 10s %- 10s %- 15s\n", $2, $1, $3, $4); }'
|
30
server/lib/bkctld-status
Executable file
30
server/lib/bkctld-status
Executable file
|
@ -0,0 +1,30 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Display status of SSH server
|
||||
# Usage: status [<jailname>|all]
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
if [ ! -n "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
[ -d "${JAILDIR}/${jail_name}" ] || error "${jail_name} : jail is missing.\nUse '$0 status [all]' to get the status of all jails."
|
||||
|
||||
incs_policy_file=$(current_jail_incs_policy_file ${jail_name})
|
||||
incs_policy="0"
|
||||
if [ -r "${incs_policy_file}" ]; then
|
||||
days=$(grep "^\+" "${incs_policy_file}" | grep --count "day")
|
||||
months=$(grep "^\+" "${incs_policy_file}" | grep --count "month")
|
||||
incs_policy="${days}/${months}"
|
||||
fi
|
||||
|
||||
status="OFF"
|
||||
"${LIBDIR}/bkctld-is-on" "${jail_name}" && status="ON "
|
||||
|
||||
port=$("${LIBDIR}/bkctld-port" "${jail_name}")
|
||||
ip=$("${LIBDIR}/bkctld-ip" "${jail_name}" | xargs | tr -s ' ' ',')
|
||||
|
||||
echo "${jail_name} ${status} ${port} ${incs_policy} ${ip}" | awk '{ printf("%- 30s %- 10s %- 10s %- 25s %- 20s\n", $1, $2, $3, $4, $5); }'
|
31
server/lib/bkctld-stop
Executable file
31
server/lib/bkctld-stop
Executable file
|
@ -0,0 +1,31 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Stop SSH server
|
||||
# Usage: stop [<jailname>|all]
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
if [ -z "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
"${LIBDIR}/bkctld-is-on" "${jail_name}" || exit 0
|
||||
|
||||
pid=$(cat "${jail_path}/${SSHD_PID}")
|
||||
|
||||
pkill --parent "${pid}"
|
||||
|
||||
if kill "${pid}"; then
|
||||
notice "Stop jail \`${jail_name}' : OK [${pid}]"
|
||||
|
||||
umount --lazy --recursive "${jail_path}/dev"
|
||||
umount --lazy "${jail_path}/proc/"
|
||||
else
|
||||
error "Stop jail \`${jail_name}' : failed [${pid}]"
|
||||
fi
|
67
server/lib/bkctld-sync
Executable file
67
server/lib/bkctld-sync
Executable file
|
@ -0,0 +1,67 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Sync jail configuration and state on other node(s)
|
||||
# Usage: sync [<jailname>|all]
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
if [ -z "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
jail_config_dir=$(jail_config_dir "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
[ -n "${NODE}" ] || error "Sync need config of \$NODE in /etc/default/bkctld !"
|
||||
|
||||
ssh "${NODE}" "${LIBDIR}/bkctld-is-on ${jail_name} 2>/dev/null"
|
||||
# return code 2 is for "missing jail" error
|
||||
if [ "$?" -eq 2 ]; then
|
||||
# Init jail on remote server
|
||||
ssh "${NODE}" "${LIBDIR}/bkctld-init ${jail_name}" | debug
|
||||
fi
|
||||
|
||||
# Sync jail structure and configuration on remote server
|
||||
rsync -a "${jail_path}/" "${NODE}:${jail_path}/" --exclude proc/* --exclude sys/* --exclude dev/* --exclude run --exclude var/backup/*
|
||||
# Sync config (new structure)
|
||||
if [ -d "${jail_config_dir}" ]; then
|
||||
rsync -a --delete "${jail_config_dir}/" "${NODE}:${jail_config_dir}/"
|
||||
else
|
||||
ssh "${NODE}" "rm -rf ${jail_config_dir}" | debug
|
||||
fi
|
||||
# Sync config (legacy structure)
|
||||
if [ -e "${CONFDIR}/${jail_name}" ]; then
|
||||
rsync -a "${CONFDIR}/${jail_name}" "${NODE}:${CONFDIR}/${jail_name}"
|
||||
else
|
||||
ssh "${NODE}" "rm -f ${CONFDIR}/${jail_name}" | debug
|
||||
fi
|
||||
|
||||
if [ -n "${FIREWALL_RULES}" ]; then
|
||||
ssh "${NODE}" "${LIBDIR}/bkctld-firewall ${jail_name}" | debug
|
||||
ssh "${NODE}" "test -x /etc/init.d/minifirewall && /etc/init.d/minifirewall restart" | debug
|
||||
fi
|
||||
|
||||
# Sync state on remote server
|
||||
if "${LIBDIR}/bkctld-is-on" "${jail_name}"; then
|
||||
# fetch state of remote jail
|
||||
ssh "${NODE}" "${LIBDIR}/bkctld-is-on ${jail_name} 2>/dev/null"
|
||||
case "$?" in
|
||||
0)
|
||||
# jail is already running : reload it
|
||||
ssh "${NODE}" "${LIBDIR}/bkctld-reload ${jail_name}" | debug
|
||||
;;
|
||||
100)
|
||||
# jail is stopped : start it
|
||||
ssh "${NODE}" "${LIBDIR}/bkctld-start ${jail_name}" | debug
|
||||
;;
|
||||
*)
|
||||
error "Error evaluating jail \`${jail_name}' state. bkctld-is-on exited with \`$?'"
|
||||
;;
|
||||
esac
|
||||
else
|
||||
ssh "${NODE}" "${LIBDIR}/bkctld-stop ${jail_name}" | debug
|
||||
fi
|
38
server/lib/bkctld-update
Executable file
38
server/lib/bkctld-update
Executable file
|
@ -0,0 +1,38 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Update binaries and libraries
|
||||
# Usage: update [<jailname>|all]
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
if [ ! -n "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
"${LIBDIR}/bkctld-is-on" "${jail_name}" 2>/dev/null
|
||||
case "$?" in
|
||||
0)
|
||||
jail_initial_status="on"
|
||||
;;
|
||||
100)
|
||||
jail_initial_status="off"
|
||||
;;
|
||||
*)
|
||||
unset jail_initial_status
|
||||
error "Error evaluating jail \`${jail_name}' state. bkctld-is-on exited with \`$?'"
|
||||
;;
|
||||
esac
|
||||
|
||||
test "${jail_initial_status}" = "on" && "${LIBDIR}/bkctld-stop" "${jail_name}"
|
||||
|
||||
setup_jail_chroot "${jail_name}"
|
||||
|
||||
test "${jail_initial_status}" = "on" && "${LIBDIR}/bkctld-start" "${jail_name}"
|
||||
|
||||
notice "Update jail \`${jail_name}' : OK"
|
68
server/lib/bkctld-upgrade-config
Executable file
68
server/lib/bkctld-upgrade-config
Executable file
|
@ -0,0 +1,68 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Description: Upgrade configuration to new convention
|
||||
# Usage: upgrade-config [<jailname>|all]
|
||||
#
|
||||
|
||||
# shellcheck source=./includes
|
||||
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
|
||||
|
||||
jail_name="${1:?}"
|
||||
if [ ! -n "${jail_name}" ]; then
|
||||
show_help && exit 1
|
||||
fi
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
test -d "${jail_path}" || error "${jail_name}: jail not found" 2
|
||||
|
||||
legacy_incs_policy_file="${CONFDIR}/${jail_name}"
|
||||
incs_policy_file=$(jail_incs_policy_file "${jail_name}")
|
||||
|
||||
if [ -h "${legacy_incs_policy_file}" ]; then
|
||||
if [ -f "${incs_policy_file}" ]; then
|
||||
info "${jail_name}: config is already upgraded"
|
||||
else
|
||||
warning "${jail_name}: symlink present but inc policy file \`${incs_policy_file}' not found"
|
||||
fi
|
||||
elif [ ! -e "${legacy_incs_policy_file}" ] ; then
|
||||
if [ -f "${incs_policy_file}" ]; then
|
||||
# create a symlink for backward compatibility
|
||||
ln -s "${incs_policy_file}" "${legacy_incs_policy_file}"
|
||||
|
||||
info "${jail_name}: config has been symlinked"
|
||||
else
|
||||
warning "${jail_name}: inc policy file \`${incs_policy_file}' not found"
|
||||
fi
|
||||
elif [ -f "${legacy_incs_policy_file}" ]; then
|
||||
# Create directory if missing
|
||||
mkdir -p "$(jail_config_dir "${jail_name}")"
|
||||
# move the main config file
|
||||
mv "${legacy_incs_policy_file}" "${incs_policy_file}"
|
||||
# create a symlink for backward compatibility
|
||||
ln -s "${incs_policy_file}" "${legacy_incs_policy_file}"
|
||||
# create a check_policy file if missing
|
||||
touch "$(jail_check_policy_file "${jail_name}")"
|
||||
|
||||
info "${jail_name}: config has been upgraded"
|
||||
fi
|
||||
|
||||
check_policy_file=$(jail_check_policy_file "${jail_name}")
|
||||
if [ ! -f "${check_policy_file}" ]; then
|
||||
check_policy_tpl="${TPLDIR}/check_policy.tpl"
|
||||
test -f "${LOCALTPLDIR}/check_policy.tpl" && check_policy_tpl="${LOCALTPLDIR}/check_policy.tpl"
|
||||
mkdir --parents "$(dirname "${check_policy_file}")"
|
||||
install -m 0640 "${check_policy_tpl}" "${check_policy_file}"
|
||||
|
||||
info "${jail_name}: check_policy template ha been installed"
|
||||
fi
|
||||
|
||||
legacy_incs_policy_tpl="${LOCALTPLDIR}/inc.tpl"
|
||||
incs_policy_tpl="${LOCALTPLDIR}/incs_policy.tpl"
|
||||
if [ -f "${legacy_incs_policy_tpl}" ]; then
|
||||
# Create directory if missing
|
||||
mkdir -p "$(jail_config_dir "${jail_name}")"
|
||||
# move the main config file
|
||||
mv -f "${legacy_incs_policy_tpl}" "${incs_policy_tpl}"
|
||||
|
||||
info "${jail_name}: incs_policy local template has been renamed"
|
||||
fi
|
458
server/lib/includes
Executable file
458
server/lib/includes
Executable file
|
@ -0,0 +1,458 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# Config for bkctld
|
||||
#
|
||||
# shellcheck disable=SC2034
|
||||
|
||||
[ -f /etc/default/bkctld ] && . /etc/default/bkctld
|
||||
|
||||
VERSION="22.04"
|
||||
|
||||
LIBDIR=${LIBDIR:-/usr/lib/bkctld}
|
||||
CONFDIR="${CONFDIR:-/etc/evobackup}"
|
||||
BACKUP_DISK="${BACKUP_DISK:-}"
|
||||
BACKUP_PARTITION="${BACKUP_PARTITION:-/backup}"
|
||||
JAILDIR="${JAILDIR:-${BACKUP_PARTITION}/jails}"
|
||||
INCDIR="${INCDIR:-${BACKUP_PARTITION}/incs}"
|
||||
TPLDIR="${TPLDIR:-/usr/share/bkctld}"
|
||||
LOCALTPLDIR="${LOCALTPLDIR:-/usr/local/share/bkctld}"
|
||||
LOCKDIR="${LOCKDIR:-/run/lock/bkctld}"
|
||||
ARCHIVESDIR="${ARCHIVESDIR:-${BACKUP_PARTITION}/archives}"
|
||||
INDEX_DIR="${INDEX_DIR:-${BACKUP_PARTITION}/index}"
|
||||
IDX_FILE="${IDX_FILE:-${INDEX_DIR}/bkctld-jails.idx}"
|
||||
SSHD_PID="${SSHD_PID:-/run/sshd.pid}"
|
||||
SSHD_CONFIG="${SSHD_CONFIG:-/etc/ssh/sshd_config}"
|
||||
AUTHORIZED_KEYS="${AUTHORIZED_KEYS:-/root/.ssh/authorized_keys}"
|
||||
FIREWALL_RULES="${FIREWALL_RULES:-}"
|
||||
LOGLEVEL="${LOGLEVEL:-6}"
|
||||
CRITICAL="${CRITICAL:-48}"
|
||||
WARNING="${WARNING:-24}"
|
||||
DUC=$(command -v duc-nox || command -v duc)
|
||||
FORCE="${FORCE:-0}"
|
||||
|
||||
show_version() {
|
||||
cat <<END
|
||||
bkctld version ${VERSION}
|
||||
|
||||
Copyright 2004-2022 Evolix <info@evolix.fr>,
|
||||
Victor Laborie <vlaborie@evolix.fr>,
|
||||
Jérémy Lecour <jlecour@evolix.fr>
|
||||
and others.
|
||||
|
||||
bkctld comes with ABSOLUTELY NO WARRANTY. This is free software,
|
||||
and you are welcome to redistribute it under certain conditions.
|
||||
See the GNU Affero General Public License v3.0 for details.
|
||||
END
|
||||
}
|
||||
show_help() {
|
||||
cat <<EOF
|
||||
Usage: bkctld [options] <subcommand> [arguments]
|
||||
Options
|
||||
-h|--help|-? Display help
|
||||
-V|--version Display version, authors and license
|
||||
Subcommands:
|
||||
EOF
|
||||
|
||||
for filename in ${LIBDIR}/bkctld-*; do
|
||||
desc=$(grep -E "^# Description:" "${filename}"|sed "s/^# Description: //")
|
||||
usage=$(grep -E "^# Usage:" "${filename}"|sed "s/^# Usage: //")
|
||||
printf " %- 32s %s\n" "${usage}" "${desc}"
|
||||
done
|
||||
|
||||
printf "\n"
|
||||
}
|
||||
|
||||
log_date() {
|
||||
echo "[$(date +"%Y-%m-%d %H:%M:%S")]"
|
||||
}
|
||||
process_name() {
|
||||
basename $0
|
||||
}
|
||||
debug() {
|
||||
msg="${1:-$(cat /dev/stdin)}"
|
||||
if [ "${LOGLEVEL}" -ge 7 ]; then
|
||||
echo "${msg}"
|
||||
logger -t bkctld -p daemon.debug "$(process_name) ${msg}"
|
||||
fi
|
||||
}
|
||||
|
||||
info() {
|
||||
msg="${1:-$(cat /dev/stdin)}"
|
||||
if [ "${LOGLEVEL}" -ge 6 ]; then
|
||||
tty -s && echo "${msg}"
|
||||
logger -t bkctld -p daemon.info "$(process_name) ${msg}"
|
||||
fi
|
||||
}
|
||||
|
||||
notice() {
|
||||
msg="${1:-$(cat /dev/stdin)}"
|
||||
tty -s && echo "${msg}"
|
||||
[ "${LOGLEVEL}" -ge 5 ] && logger -t bkctld -p daemon.notice "$(process_name) ${msg}"
|
||||
}
|
||||
|
||||
warning() {
|
||||
msg="${1:-$(cat /dev/stdin)}"
|
||||
tty -s && echo "${msg}" >&2
|
||||
if [ "${LOGLEVEL}" -ge 4 ]; then
|
||||
tty -s || echo "${msg}" >&2
|
||||
logger -t bkctld -p daemon.warning "$(process_name) ${msg}"
|
||||
fi
|
||||
}
|
||||
# Return codes
|
||||
# 1 : generic error
|
||||
# 2 : jail not found
|
||||
# > 100 : subcommands specific errors
|
||||
error() {
|
||||
msg="${1:-$(cat /dev/stdin)}"
|
||||
rc="${2:-1}"
|
||||
tty -s && echo "${msg}" >&2
|
||||
if [ "${LOGLEVEL}" -ge 5 ]; then
|
||||
tty -s || echo "${msg}" >&2
|
||||
logger -t bkctld -p daemon.error "$(process_name) ${msg}"
|
||||
fi
|
||||
exit ${rc}
|
||||
}
|
||||
|
||||
dry_run() {
|
||||
test "$DRY_RUN" = "1"
|
||||
}
|
||||
|
||||
current_time() {
|
||||
date +"%H:%M:%S"
|
||||
}
|
||||
|
||||
# Returns true if the given path is on a btrfs filesystem
|
||||
is_btrfs() {
|
||||
path=$1
|
||||
|
||||
inode=$(stat --format=%i "${path}")
|
||||
|
||||
test $inode -eq 256
|
||||
}
|
||||
|
||||
# Returns the list of jails found in the "jails" directory (default)
|
||||
jails_list() {
|
||||
# TODO: try if this command works the same :
|
||||
# find "${JAILDIR}" -mindepth 1 -maxdepth 1 -type d -printf '%f\n'
|
||||
find "${JAILDIR}" -mindepth 1 -maxdepth 1 -type d | sed 's!.*/!!' | sort -h
|
||||
}
|
||||
# Returns the list of jails found in the "incs" directory
|
||||
jails_with_incs_list() {
|
||||
find "${INCDIR}" -mindepth 1 -maxdepth 1 -type d | sed 's!.*/!!' | sort -h
|
||||
}
|
||||
# Returns the complete path of a jail
|
||||
jail_path() {
|
||||
jail_name=${1:?}
|
||||
|
||||
echo "${JAILDIR}/${jail_name}"
|
||||
}
|
||||
jail_config_dir() {
|
||||
jail_name=${1:?}
|
||||
|
||||
echo "${CONFDIR}/${jail_name}.d"
|
||||
}
|
||||
jail_incs_policy_file() {
|
||||
jail_name=${1:?}
|
||||
|
||||
jail_config_dir=$(jail_config_dir "${jail_name}")
|
||||
|
||||
echo "${jail_config_dir}/incs_policy"
|
||||
}
|
||||
# Returns the complete path of an archived jail
|
||||
archive_path() {
|
||||
jail_name=${1:?}
|
||||
|
||||
echo "${ARCHIVESDIR}/${jail_name}"
|
||||
}
|
||||
# Returns the path of incs for a jail
|
||||
incs_path() {
|
||||
jail_name=${1:?}
|
||||
|
||||
echo "${INCDIR}/${jail_name}"
|
||||
}
|
||||
# Returns the path of a specific inc for a jail
|
||||
inc_path() {
|
||||
jail_name=${1:?}
|
||||
inc_name=${2:?}
|
||||
|
||||
echo "${INCDIR}/${jail_name}/${inc_name}"
|
||||
}
|
||||
# Test the existence of an inc pattern for a jail
|
||||
inc_exists() {
|
||||
jail_name=${1-?}
|
||||
inc_pattern=${2-?}
|
||||
inc_path=$(inc_path "${jail_name}" "${inc_pattern}")
|
||||
|
||||
# inc_path must not be quoted because it can contain globs
|
||||
ls -d ${inc_path} > /dev/null 2>&1
|
||||
}
|
||||
# Returns the list of all incs for a jail
|
||||
incs_list() {
|
||||
jail_name=${1:?}
|
||||
find "$(incs_path "${jail_name}")" -mindepth 1 -maxdepth 1 -type d | sed 's!.*/!!' | sort -h
|
||||
}
|
||||
# Return the list of empty incs directories
|
||||
empty_incs_list() {
|
||||
find ${INCDIR} -mindepth 1 -maxdepth 1 -type d -empty
|
||||
}
|
||||
current_jail_incs_policy_file() {
|
||||
jail_name=${1:?}
|
||||
|
||||
new_file="$(jail_incs_policy_file "${jail_name}")"
|
||||
old_file="${CONFDIR}/${jail_name}"
|
||||
|
||||
if [ -f "${new_file}" ]; then
|
||||
echo "${new_file}"
|
||||
elif [ -f "${old_file}" ]; then
|
||||
echo "${old_file}"
|
||||
else
|
||||
echo ""
|
||||
fi
|
||||
}
|
||||
jail_check_policy_file() {
|
||||
jail_name=${1:?}
|
||||
|
||||
jail_config_dir=$(jail_config_dir "${jail_name}")
|
||||
|
||||
echo "${jail_config_dir}/check_policy"
|
||||
}
|
||||
current_jail_check_policy_file() {
|
||||
jail_name=${1:?}
|
||||
|
||||
new_file="$(jail_check_policy_file "${jail_name}")"
|
||||
# old_file="${JAILDIR}/${jail_name}/etc/bkctld-check"
|
||||
|
||||
if [ -f "${new_file}" ]; then
|
||||
echo "${new_file}"
|
||||
# elif [ -f "${old_file}" ]; then
|
||||
# echo "${old_file}"
|
||||
else
|
||||
echo ""
|
||||
fi
|
||||
}
|
||||
# relative_date "+%Y-%m-%d.-2day"
|
||||
relative_date() {
|
||||
format=$(echo $1 | cut -d'.' -f1)
|
||||
time_jump=$(echo $1 | cut -d'.' -f2)
|
||||
|
||||
reference_date=$(date "${format}")
|
||||
past_date=$(date --date "${reference_date} ${time_jump}" +"%Y-%m-%d")
|
||||
|
||||
echo ${past_date}
|
||||
}
|
||||
new_tmp_file() {
|
||||
name=${1:-}
|
||||
|
||||
mktemp --tmpdir=/tmp "bkctld.${$}.${name}.XXXXX"
|
||||
}
|
||||
new_tmp_dir() {
|
||||
name=${1:-}
|
||||
|
||||
mktemp --directory --tmpdir=/tmp "bkctld.${$}.${name}.XXXXX"
|
||||
}
|
||||
cleanup_tmp() {
|
||||
find /tmp -name "bkctld.${$}.*" -delete
|
||||
}
|
||||
new_lock_file() {
|
||||
lock_file=${1:-}
|
||||
lock_dir=$(dirname "${lock_file}")
|
||||
|
||||
mkdir --parents "${lock_dir}" && echo $$ > ${lock_file} || error "Failed to acquire lock file '${lock_file}'"
|
||||
}
|
||||
|
||||
pkg_version() {
|
||||
# $(command -v ssh) -V 2>&1 | grep -iEo 'OpenSSH_(\S+)' | cut -d '_' -f2
|
||||
dpkg-query -W -f='${Version}\n' $1 \
|
||||
| sed 's/[~+-].\+//' \
|
||||
| sed 's/.\+://' \
|
||||
| sed 's/p.*//' \
|
||||
| cut -d. -f1,2
|
||||
}
|
||||
ssh_keygen_with_prefix() {
|
||||
# openssh-client 7.9 provides ssh-keygen with "-f prefix_path" option
|
||||
dpkg --compare-versions "$(pkg_version 'openssh-client')" ge "7.9"
|
||||
}
|
||||
|
||||
setup_jail_chroot() {
|
||||
jail_name=${1:?}
|
||||
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
passwd="${TPLDIR}/passwd"
|
||||
shadow="${TPLDIR}/shadow"
|
||||
group="${TPLDIR}/group"
|
||||
sshrc="${TPLDIR}/sshrc"
|
||||
[ -f "${LOCALTPLDIR}/passwd" ] && passwd="${LOCALTPLDIR}/passwd"
|
||||
[ -f "${LOCALTPLDIR}/shadow" ] && shadow="${LOCALTPLDIR}/shadow"
|
||||
[ -f "${LOCALTPLDIR}/group" ] && group="${LOCALTPLDIR}/group"
|
||||
[ -f "${LOCALTPLDIR}/sshrc" ] && group="${LOCALTPLDIR}/sshrc"
|
||||
|
||||
cd "${jail_path}" || error "${jail_name}: failed to change directory to ${jail_path}."
|
||||
umask 077
|
||||
|
||||
info "1 - Creating the chroot"
|
||||
|
||||
rm -rf ./bin
|
||||
rm -rf ./lib
|
||||
rm -rf ./lib64
|
||||
rm -rf ./run
|
||||
rm -rf ./usr
|
||||
rm -rf ./var/run
|
||||
# Let's not delete the existing SSH host keys,
|
||||
# otherwise the clients will have to accept the new keys
|
||||
|
||||
mkdir -p ./dev
|
||||
mkdir -p ./proc
|
||||
mkdir -p ./usr/bin
|
||||
mkdir -p ./usr/sbin
|
||||
mkdir -p ./usr/lib
|
||||
mkdir -p ./usr/lib/x86_64-linux-gnu
|
||||
mkdir -p ./usr/lib/openssh
|
||||
mkdir -p ./usr/lib64
|
||||
mkdir -p ./etc/ssh
|
||||
mkdir -p ./var/log
|
||||
mkdir -p ./run/sshd
|
||||
# shellcheck disable=SC2174
|
||||
mkdir -p ./root/.ssh --mode 0700
|
||||
# shellcheck disable=SC2174
|
||||
mkdir -p ./var/backup --mode 0700
|
||||
|
||||
ln -s ./usr/bin ./bin
|
||||
ln -s ./usr/lib ./lib
|
||||
ln -s ./usr/lib64 ./lib64
|
||||
ln -s --target-directory=./var ../run
|
||||
|
||||
touch ./var/log/lastlog ./var/log/wtmp ./run/utmp
|
||||
|
||||
info "2 - Copying essential files"
|
||||
|
||||
#
|
||||
if ssh_keygen_with_prefix; then
|
||||
# Generate SSH host keys if missing in jail
|
||||
ssh-keygen -A -f "${jail_path}"
|
||||
else
|
||||
# Copy SSH host keys from host if missing in jail
|
||||
for key in /etc/ssh/*_key; do
|
||||
cp --no-clobber ${key} ${jail_path}${key};
|
||||
done
|
||||
fi
|
||||
|
||||
touch "./${AUTHORIZED_KEYS}"
|
||||
chmod 600 "./${AUTHORIZED_KEYS}"
|
||||
|
||||
cp "${passwd}" ./etc
|
||||
cp "${shadow}" ./etc
|
||||
cp "${group}" ./etc
|
||||
cp "${sshrc}" ./etc/ssh
|
||||
|
||||
info "3 - Copying binaries"
|
||||
cp -f /lib/ld-linux.so.2 ./lib 2>/dev/null || cp -f /lib64/ld-linux-x86-64.so.2 ./lib64
|
||||
cp /lib/x86_64-linux-gnu/libnss* ./lib/x86_64-linux-gnu
|
||||
|
||||
for dbin in \
|
||||
/bin/sh \
|
||||
/bin/ls \
|
||||
/bin/mkdir \
|
||||
/bin/cat \
|
||||
/bin/rm \
|
||||
/bin/sed \
|
||||
/usr/bin/rsync \
|
||||
/usr/bin/lastlog \
|
||||
/usr/bin/touch \
|
||||
/usr/sbin/sshd \
|
||||
/usr/lib/openssh/sftp-server\
|
||||
; do
|
||||
cp -f "${dbin}" "./${dbin}";
|
||||
for lib in $(ldd "${dbin}" | grep -Eo "/.*so.[0-9\.]+"); do
|
||||
cp -p "${lib}" "./${lib}"
|
||||
done
|
||||
done
|
||||
}
|
||||
|
||||
setup_jail_config() {
|
||||
jail_name=${1:?}
|
||||
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
jail_sshd_config="${jail_path}/${SSHD_CONFIG}"
|
||||
|
||||
sshd_config_tpl="${TPLDIR}/sshd_config"
|
||||
test -f "${LOCALTPLDIR}/sshd_config" && sshd_config_tpl="${LOCALTPLDIR}/sshd_config"
|
||||
|
||||
info "4 - Copie default sshd_config"
|
||||
install -m 0640 "${sshd_config_tpl}" "${jail_sshd_config}"
|
||||
|
||||
|
||||
info "5 - Copie default inc configuration"
|
||||
incs_policy_tpl="${TPLDIR}/incs_policy.tpl"
|
||||
test -f "${LOCALTPLDIR}/incs_policy.tpl" && incs_policy_tpl="${LOCALTPLDIR}/incs_policy.tpl"
|
||||
jail_incs_policy_file=$(jail_incs_policy_file "${jail_name}")
|
||||
mkdir --parents "$(dirname "${jail_incs_policy_file}")"
|
||||
install -m 0640 "${incs_policy_tpl}" "${jail_incs_policy_file}"
|
||||
|
||||
check_policy_tpl="${TPLDIR}/check_policy.tpl"
|
||||
test -f "${LOCALTPLDIR}/check_policy.tpl" && check_policy_tpl="${LOCALTPLDIR}/check_policy.tpl"
|
||||
jail_check_policy_file=$(jail_check_policy_file "${jail_name}")
|
||||
mkdir --parents "$(dirname "${jail_check_policy_file}")"
|
||||
install -m 0640 "${check_policy_tpl}" "${jail_check_policy_file}"
|
||||
|
||||
"${LIBDIR}/bkctld-port" "${jail_name}" auto
|
||||
}
|
||||
|
||||
is_mounted_inside_jail() {
|
||||
target=${1:?}
|
||||
|
||||
# TODO: try to find why it doesn't work with this findmnt(8) command
|
||||
# findmnt --target "${target}" --tab-file /proc/mounts
|
||||
grep -q "${target}" /proc/mounts
|
||||
}
|
||||
|
||||
mount_jail_fs() {
|
||||
jail_name=${1:?}
|
||||
|
||||
jail_path=$(jail_path "${jail_name}")
|
||||
|
||||
is_mounted_inside_jail "${jail_path}/dev" || mount -nt tmpfs "dev-${jail_name}" "${jail_path}/dev"
|
||||
|
||||
[ -e "dev/console" ] || mknod -m 622 "${jail_path}/dev/console" c 5 1
|
||||
chown root:tty "${jail_path}/dev/console"
|
||||
[ -e "dev/null" ] || mknod -m 666 "${jail_path}/dev/null" c 1 3
|
||||
[ -e "dev/zero" ] || mknod -m 666 "${jail_path}/dev/zero" c 1 5
|
||||
[ -e "dev/ptmx" ] || mknod -m 666 "${jail_path}/dev/ptmx" c 5 2
|
||||
chown root:tty "${jail_path}/dev/ptmx"
|
||||
[ -e "dev/tty" ] || mknod -m 666 "${jail_path}/dev/tty" c 5 0
|
||||
chown root:tty "${jail_path}/dev/tty"
|
||||
[ -e "dev/random" ] || mknod -m 444 "${jail_path}/dev/random" c 1 8
|
||||
[ -e "dev/urandom" ] || mknod -m 444 "${jail_path}/dev/urandom" c 1 9
|
||||
|
||||
mkdir -p "${jail_path}/dev/pts"
|
||||
is_mounted_inside_jail "${jail_path}/dev/pts" || mount -t devpts -o gid=4,mode=620 none "${jail_path}/dev/pts"
|
||||
|
||||
mkdir -p "${jail_path}/dev/shm"
|
||||
is_mounted_inside_jail "${jail_path}/dev/shm" || mount -t tmpfs none "${jail_path}/dev/shm"
|
||||
|
||||
is_mounted_inside_jail "${jail_path}/proc" || mount -t proc "proc-${jail_name}" "${jail_path}/proc"
|
||||
|
||||
ln -fs "${jail_path}/proc/self/fd" "${jail_path}/dev/fd"
|
||||
ln -fs "${jail_path}/proc/self/fd/0" "${jail_path}/dev/stdin"
|
||||
ln -fs "${jail_path}/proc/self/fd/1" "${jail_path}/dev/stdout"
|
||||
ln -fs "${jail_path}/proc/self/fd/2" "${jail_path}/dev/stderr"
|
||||
ln -fs "${jail_path}/proc/kcore" "${jail_path}/dev/core"
|
||||
}
|
||||
|
||||
read_variable() {
|
||||
file=${1:?}
|
||||
var_name=${2:?}
|
||||
|
||||
pattern="^\s*${var_name}=.+"
|
||||
|
||||
grep --extended-regexp --only-matching "${pattern}" "${file}" | tail -1 | cut -d= -f2
|
||||
}
|
||||
|
||||
read_numerical_variable() {
|
||||
file=${1:?}
|
||||
var_name=${2:?}
|
||||
|
||||
pattern="^\s*${var_name}=-?[0-9]+"
|
||||
|
||||
grep --extended-regexp --only-matching "${pattern}" "${file}" | tail -1 | cut -d= -f2
|
||||
}
|
254
server/test/checks.bats
Normal file
254
server/test/checks.bats
Normal file
|
@ -0,0 +1,254 @@
|
|||
#!/usr/bin/env bats
|
||||
# shellcheck disable=SC1089,SC1083,SC2154
|
||||
|
||||
load test_helper
|
||||
|
||||
@test "Check jails OK" {
|
||||
run /usr/lib/bkctld/bkctld-check-jails
|
||||
assert_equal "0" "$status"
|
||||
}
|
||||
|
||||
@test "Check jails OK for default values" {
|
||||
touch "${JAILPATH}/var/log/lastlog"
|
||||
# With default values (2 days critical, 1 day warning),
|
||||
# a freshly connected jail should be "ok"
|
||||
run /usr/lib/bkctld/bkctld-check-jails
|
||||
assert_equal "0" "$status"
|
||||
}
|
||||
|
||||
@test "Check jails WARNING for default values" {
|
||||
lastlog_date=$(date -d -2days --iso-8601=seconds)
|
||||
touch --date="${lastlog_date}" "${JAILPATH}/var/log/lastlog"
|
||||
# With default values (2 days critical, 1 day warning),
|
||||
# a 2 days old jail should be "warning"
|
||||
run /usr/lib/bkctld/bkctld-check-jails
|
||||
assert_equal "1" "$status"
|
||||
}
|
||||
|
||||
@test "Check jails CRITICAL for default values" {
|
||||
lastlog_date=$(date -d -3days --iso-8601=seconds)
|
||||
touch --date="${lastlog_date}" "${JAILPATH}/var/log/lastlog"
|
||||
# With default values (2 days critical, 1 day warning),
|
||||
# a 3 days old jail should be "critical"
|
||||
run /usr/lib/bkctld/bkctld-check-jails
|
||||
assert_equal "2" "$status"
|
||||
}
|
||||
|
||||
@test "Check jails OK for custom values" {
|
||||
lastlog_date=$(date -d -3days --iso-8601=seconds)
|
||||
touch --date="${lastlog_date}" "${JAILPATH}/var/log/lastlog"
|
||||
|
||||
cat > "/etc/evobackup/${JAILNAME}.d/check_policy" <<OUT
|
||||
CRITICAL=120
|
||||
WARNING=96
|
||||
OUT
|
||||
# With custom values (5 days critical, 4 days warning),
|
||||
# a 3 days old jail should be "ok"
|
||||
run /usr/lib/bkctld/bkctld-check-jails
|
||||
assert_equal "0" "$status"
|
||||
}
|
||||
|
||||
@test "Check jails WARNING for custom values" {
|
||||
lastlog_date=$(date -d -3days --iso-8601=seconds)
|
||||
touch --date="${lastlog_date}" "${JAILPATH}/var/log/lastlog"
|
||||
|
||||
cat > "/etc/evobackup/${JAILNAME}.d/check_policy" <<OUT
|
||||
CRITICAL=96
|
||||
WARNING=48
|
||||
OUT
|
||||
# With custom values (4 days critical, 3 days warning),
|
||||
# a 3 days old jail should be "warning"
|
||||
run /usr/lib/bkctld/bkctld-check-jails
|
||||
assert_equal "1" "$status"
|
||||
}
|
||||
|
||||
@test "Check jails CRITICAL for custom values" {
|
||||
lastlog_date=$(date -d -10days --iso-8601=seconds)
|
||||
touch --date="${lastlog_date}" "${JAILPATH}/var/log/lastlog"
|
||||
|
||||
cat > "/etc/evobackup/${JAILNAME}.d/check_policy" <<OUT
|
||||
CRITICAL=96
|
||||
WARNING=48
|
||||
OUT
|
||||
# With custom values (4 days critical, 3 days warning),
|
||||
# a 10 days old jail should be "critical"
|
||||
run /usr/lib/bkctld/bkctld-check-jails
|
||||
assert_equal "2" "$status"
|
||||
}
|
||||
|
||||
@test "Check jails OK for disabled WARNING" {
|
||||
lastlog_date=$(date -d -2days --iso-8601=seconds)
|
||||
touch --date="${lastlog_date}" "${JAILPATH}/var/log/lastlog"
|
||||
|
||||
cat > "/etc/evobackup/${JAILNAME}.d/check_policy" <<OUT
|
||||
WARNING=0
|
||||
OUT
|
||||
# With custom values (warning disabled, default critical),
|
||||
# a 2 days old jail should still be "ok"
|
||||
run /usr/lib/bkctld/bkctld-check-jails
|
||||
assert_equal "0" "$status"
|
||||
}
|
||||
|
||||
@test "Check jails WARNING for disabled CRITICAL" {
|
||||
lastlog_date=$(date -d -3days --iso-8601=seconds)
|
||||
touch --date="${lastlog_date}" "${JAILPATH}/var/log/lastlog"
|
||||
|
||||
cat > "/etc/evobackup/${JAILNAME}.d/check_policy" <<OUT
|
||||
CRITICAL=0
|
||||
OUT
|
||||
# With custom values (critical disabled, default warning),
|
||||
# a 3 days old jail should only be "warning"
|
||||
run /usr/lib/bkctld/bkctld-check-jails
|
||||
assert_equal "1" "$status"
|
||||
}
|
||||
|
||||
@test "Custom jails values are parsed with only integers after equal" {
|
||||
lastlog_date=$(date -d -3days --iso-8601=seconds)
|
||||
touch --date="${lastlog_date}" "${JAILPATH}/var/log/lastlog"
|
||||
|
||||
cat > "/etc/evobackup/${JAILNAME}.d/check_policy" <<OUT
|
||||
CRITICAL=0 # foo
|
||||
OUT
|
||||
# With custom values (critical disabled, default warning),
|
||||
# a 3 days old jail should only be "warning"
|
||||
run /usr/lib/bkctld/bkctld-check-jails
|
||||
assert_equal "1" "$status"
|
||||
}
|
||||
|
||||
@test "Commented custom values are ignored" {
|
||||
lastlog_date=$(date -d -3days --iso-8601=seconds)
|
||||
touch --date="${lastlog_date}" "${JAILPATH}/var/log/lastlog"
|
||||
|
||||
cat > "/etc/evobackup/${JAILNAME}.d/check_policy" <<OUT
|
||||
# CRITICAL=0
|
||||
OUT
|
||||
# With commented custom values (critical disabled),
|
||||
# a 3 days old jail should still be "critical"
|
||||
run /usr/lib/bkctld/bkctld-check-jails
|
||||
assert_equal "2" "$status"
|
||||
}
|
||||
|
||||
@test "Invalid custom values are ignored" {
|
||||
lastlog_date=$(date -d -3days --iso-8601=seconds)
|
||||
touch --date="${lastlog_date}" "${JAILPATH}/var/log/lastlog"
|
||||
|
||||
cat > "/etc/evobackup/${JAILNAME}.d/check_policy" <<OUT
|
||||
CRITICAL=foo
|
||||
OUT
|
||||
# With commented custom values (critical disabled),
|
||||
# a 3 days old jail should still be "critical"
|
||||
run /usr/lib/bkctld/bkctld-check-jails
|
||||
assert_equal "2" "$status"
|
||||
}
|
||||
|
||||
@test "Check setup WARNING if firewall rules are not sourced" {
|
||||
/usr/lib/bkctld/bkctld-start ${JAILNAME}
|
||||
|
||||
mkdir /etc/minifirewall.d/
|
||||
firewall_rules_file="/etc/minifirewall.d/bkctld"
|
||||
set_variable "/etc/default/bkctld" "FIREWALL_RULES" "${firewall_rules_file}"
|
||||
echo "" > "${firewall_rules_file}"
|
||||
|
||||
# Without sourcing
|
||||
echo "" > "/etc/default/minifirewall"
|
||||
# … the check should be "warning"
|
||||
run /usr/lib/bkctld/bkctld-check-setup
|
||||
assert_equal "1" "$status"
|
||||
}
|
||||
|
||||
@test "Check setup OK if firewall rules are sourced" {
|
||||
/usr/lib/bkctld/bkctld-start ${JAILNAME}
|
||||
|
||||
mkdir /etc/minifirewall.d/
|
||||
firewall_rules_file="/etc/minifirewall.d/bkctld"
|
||||
set_variable "/etc/default/bkctld" "FIREWALL_RULES" "${firewall_rules_file}"
|
||||
echo "" > "${firewall_rules_file}"
|
||||
|
||||
# Sourcing file with '.'
|
||||
echo ". ${firewall_rules_file}" > "/etc/default/minifirewall"
|
||||
# … the check should be "ok"
|
||||
run /usr/lib/bkctld/bkctld-check-setup
|
||||
assert_equal "0" "$status"
|
||||
|
||||
# Sourcing file with 'source'
|
||||
echo "source ${firewall_rules_file}" > "/etc/default/minifirewall"
|
||||
# … the check should be "ok"
|
||||
run /usr/lib/bkctld/bkctld-check-setup
|
||||
assert_equal "0" "$status"
|
||||
}
|
||||
|
||||
@test "Check setup CRITICAL if jail is stopped" {
|
||||
run /usr/lib/bkctld/bkctld-check-setup
|
||||
assert_equal "2" "$status"
|
||||
}
|
||||
|
||||
@test "Check setup OK if all jails are started" {
|
||||
/usr/lib/bkctld/bkctld-start ${JAILNAME}
|
||||
|
||||
run /usr/lib/bkctld/bkctld-check-setup
|
||||
assert_equal "0" "$status"
|
||||
}
|
||||
|
||||
@test "Check setup OK if jail is supposed to be stopped" {
|
||||
cat > "/etc/evobackup/${JAILNAME}.d/check_policy" <<OUT
|
||||
EXPECTED_STATE=OFF
|
||||
OUT
|
||||
|
||||
run /usr/lib/bkctld/bkctld-check-setup
|
||||
assert_equal "0" "$status"
|
||||
}
|
||||
|
||||
@test "Check setup CRITICAL if backup partition is not mounted" {
|
||||
umount --force /backup
|
||||
|
||||
run /usr/lib/bkctld/bkctld-check-setup
|
||||
|
||||
mount /dev/vdb /backup
|
||||
|
||||
assert_equal "2" "$status"
|
||||
}
|
||||
|
||||
@test "Check setup CRITICAL if backup partition is read-only" {
|
||||
mount -o remount,ro /backup
|
||||
|
||||
run /usr/lib/bkctld/bkctld-check-setup
|
||||
|
||||
mount -o remount,rw /backup
|
||||
|
||||
assert_equal "2" "$status"
|
||||
}
|
||||
|
||||
@test "Check-last-incs OK if jail is present" {
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
|
||||
run /usr/lib/bkctld/bkctld-check-last-incs
|
||||
assert_equal "0" "$status"
|
||||
}
|
||||
|
||||
@test "Check-last-incs Error if jail is missing" {
|
||||
|
||||
run /usr/lib/bkctld/bkctld-check-last-incs
|
||||
assert_equal "1" "$status"
|
||||
}
|
||||
|
||||
@test "Check-incs OK" {
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
|
||||
run /usr/lib/bkctld/bkctld-check-incs
|
||||
assert_equal "0" "$status"
|
||||
}
|
||||
|
||||
@test "Check-incs doesn't fail without incs_policy file" {
|
||||
# Delete all possible incs polixy files
|
||||
rm -f /etc/evobackup/${JAILNAME}
|
||||
rm -rf /etc/evobackup/${JAILNAME}.d/incs_policy
|
||||
|
||||
# Run bkctld-check-incs and store stderr in a file
|
||||
local stderrPath="${BATS_TMPDIR}/${BATS_TEST_NAME}.stderr"
|
||||
/usr/lib/bkctld/bkctld-check-incs 2> ${stderrPath}
|
||||
|
||||
# Verify if
|
||||
run grep -E "^stat:" ${stderrPath}
|
||||
assert_failure
|
||||
}
|
||||
# TODO: write many more tests for bkctld-check-incs
|
101
server/test/connectivity.bats
Normal file
101
server/test/connectivity.bats
Normal file
|
@ -0,0 +1,101 @@
|
|||
#!/usr/bin/env bats
|
||||
# shellcheck disable=SC1089,SC1083,SC2154
|
||||
|
||||
load test_helper
|
||||
|
||||
@test "Without SSH key" {
|
||||
run cat "${JAILPATH}/root/.ssh/authorized_keys"
|
||||
assert_equal "$output" ""
|
||||
}
|
||||
|
||||
@test "With SSH key" {
|
||||
keyfile=/root/bkctld.key.pub
|
||||
/usr/lib/bkctld/bkctld-key "${JAILNAME}" "${keyfile}"
|
||||
# The key should be present in the SSH authorized_keys file
|
||||
run cat "${JAILPATH}/root/.ssh/authorized_keys"
|
||||
assert_equal "$output" "$(cat ${keyfile})"
|
||||
}
|
||||
|
||||
@test "Custom port" {
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-port "${JAILNAME}" "${PORT}"
|
||||
# A jail should be accessible on the specified SSH port
|
||||
run nc -vz 127.0.0.1 "${PORT}"
|
||||
assert_success
|
||||
}
|
||||
|
||||
@test "No IP restriction" {
|
||||
# A jail has no IP restriction by default in SSH config
|
||||
run grep "root@0.0.0.0/0" "${JAILPATH}/etc/ssh/sshd_config"
|
||||
assert_success
|
||||
}
|
||||
|
||||
@test "Single IP restriction" {
|
||||
# When an IP is added for a jail
|
||||
/usr/lib/bkctld/bkctld-ip "${JAILNAME}" "10.0.0.1"
|
||||
# An IP restriction should be present in SSH config
|
||||
run grep "root@10.0.0.1" "${JAILPATH}/etc/ssh/sshd_config"
|
||||
assert_success
|
||||
}
|
||||
|
||||
@test "Multiple IP restrictions" {
|
||||
# When multiple IP are added for a jail
|
||||
/usr/lib/bkctld/bkctld-ip "${JAILNAME}" "10.0.0.1"
|
||||
/usr/lib/bkctld/bkctld-ip "${JAILNAME}" "10.0.0.2"
|
||||
# The corresponding IP restrictions should be present in SSH config
|
||||
run grep -E -o "root@10.0.0.[0-9]+" "${JAILPATH}/etc/ssh/sshd_config"
|
||||
|
||||
assert_line "root@10.0.0.1"
|
||||
assert_line "root@10.0.0.2"
|
||||
}
|
||||
|
||||
@test "Removing IP restriction" {
|
||||
# Add an IP
|
||||
/usr/lib/bkctld/bkctld-ip "${JAILNAME}" "10.0.0.1"
|
||||
# Remove IP
|
||||
/usr/lib/bkctld/bkctld-ip "${JAILNAME}" "0.0.0.0/0"
|
||||
# All IP restrictions should be removed from SSH config
|
||||
run grep "root@0.0.0.0/0" "${JAILPATH}/etc/ssh/sshd_config"
|
||||
assert_success
|
||||
}
|
||||
|
||||
@test "Missing AllowUsers" {
|
||||
# Remove AllowUsers directive in SSH config
|
||||
sed --follow-symlinks --in-place '/^AllowUsers/d' "${JAILPATH}/etc/ssh/sshd_config"
|
||||
# An error should be raised when trying to add an IP restriction
|
||||
run /usr/lib/bkctld/bkctld-ip "${JAILNAME}" "10.0.0.1"
|
||||
assert_failure
|
||||
}
|
||||
|
||||
@test "SSH connectivity" {
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-port "${JAILNAME}" "${PORT}"
|
||||
/usr/lib/bkctld/bkctld-key "${JAILNAME}" /root/bkctld.key.pub
|
||||
|
||||
ssh_options="-p ${PORT} -i /root/bkctld.key -oStrictHostKeyChecking=no"
|
||||
|
||||
# A started jail should be accessible via SSH
|
||||
run ssh ${ssh_options} root@127.0.0.1 ls
|
||||
assert_success
|
||||
|
||||
/usr/lib/bkctld/bkctld-stop "${JAILNAME}"
|
||||
# A stopped jail should not be accessible via SSH
|
||||
run ssh ${ssh_options} root@127.0.0.1 ls
|
||||
assert_failure
|
||||
}
|
||||
|
||||
@test "Rsync connectivity" {
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-port "${JAILNAME}" "${PORT}"
|
||||
/usr/lib/bkctld/bkctld-key "${JAILNAME}" /root/bkctld.key.pub
|
||||
|
||||
ssh_options="-p ${PORT} -i /root/bkctld.key -oStrictHostKeyChecking=no"
|
||||
# A started jail should be accessible via Rsync
|
||||
run rsync -a -e "ssh ${ssh_options}" /tmp/ root@127.0.0.1:/var/backup/
|
||||
assert_success
|
||||
|
||||
/usr/lib/bkctld/bkctld-stop "${JAILNAME}"
|
||||
# A stopped jail should not be accessible via Rsync
|
||||
run rsync -a -e "${ssh_options}" /tmp/ root@127.0.0.1:/var/backup/
|
||||
assert_failure
|
||||
}
|
230
server/test/incs.bats
Normal file
230
server/test/incs.bats
Normal file
|
@ -0,0 +1,230 @@
|
|||
#!/usr/bin/env bats
|
||||
# shellcheck disable=SC1089,SC1083,SC2154
|
||||
|
||||
load test_helper
|
||||
|
||||
|
||||
@test "Inc policy after jail init" {
|
||||
# An incs_policy file should exist
|
||||
run test -e "${CONFDIR}/${JAILNAME}.d/incs_policy"
|
||||
[ "${status}" -eq 0 ]
|
||||
}
|
||||
|
||||
@test "Normal inc creation" {
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
|
||||
if is_btrfs "/backup"; then
|
||||
# On a btrfs filesystem, the inc should be a btrfs volume
|
||||
run is_btrfs "${INCSPATH}/${INC_NAME}"
|
||||
assert_success
|
||||
else
|
||||
# On an ext4 filesystem, the inc should be a regular directory
|
||||
run test -d "${INCSPATH}/${INC_NAME}"
|
||||
assert_success
|
||||
fi
|
||||
}
|
||||
|
||||
@test "Normal inc creation (with old incs policy)" {
|
||||
mv "${CONFDIR}/${JAILNAME}.d/incs_policy" "${CONFDIR}/${JAILNAME}"
|
||||
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
|
||||
if is_btrfs "/backup"; then
|
||||
# On a btrfs filesystem, the inc should be a btrfs volume
|
||||
run is_btrfs "${INCSPATH}/${INC_NAME}"
|
||||
assert_success
|
||||
else
|
||||
# On an ext4 filesystem, the inc should be a regular directory
|
||||
run test -d "${INCSPATH}/${INC_NAME}"
|
||||
assert_success
|
||||
fi
|
||||
}
|
||||
|
||||
@test "No inc creation without inc policy" {
|
||||
# Remove inc_policy
|
||||
rm -f "${CONFDIR}/${JAILNAME}.d/incs_policy"
|
||||
# … and old file
|
||||
rm -f "${CONFDIR}/${JAILNAME}"
|
||||
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
|
||||
run test -d "${INCSPATH}/${INC_NAME}"
|
||||
assert_failure
|
||||
}
|
||||
|
||||
@test "Recent inc is kept after 'rm'" {
|
||||
# Setup simple incs policy
|
||||
echo "+%Y-%m-%d.-0day" > "${CONFDIR}/${JAILNAME}.d/incs_policy"
|
||||
|
||||
# Prepare an inc older than the policy
|
||||
recent_inc_path="${INCSPATH}/${INC_NAME}"
|
||||
|
||||
# Create the inc, then run 'rm'
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
/usr/lib/bkctld/bkctld-rm
|
||||
|
||||
# Recent inc should be present
|
||||
run test -d "${recent_inc_path}"
|
||||
assert_success
|
||||
}
|
||||
|
||||
@test "Older inc is removed by 'rm'" {
|
||||
# Setup simple incs policy
|
||||
echo "+%Y-%m-%d.-0day" > "${CONFDIR}/${JAILNAME}.d/incs_policy"
|
||||
|
||||
# Prepare an inc older than the policy
|
||||
recent_inc_path="${INCSPATH}/${INC_NAME}"
|
||||
older_inc_name=$(date -d -1days +"%Y-%m-%d-%H")
|
||||
older_inc_path="${INCSPATH}/${older_inc_name}"
|
||||
|
||||
# Create the inc, rename it to make it older, then run 'rm'
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
mv "${recent_inc_path}" "${older_inc_path}"
|
||||
/usr/lib/bkctld/bkctld-rm
|
||||
|
||||
# Older inc should be removed
|
||||
run test -d "${older_inc_path}"
|
||||
assert_failure
|
||||
}
|
||||
|
||||
@test "All incs are removed by 'rm' with empty inc policy" {
|
||||
# Setup empty incs policy
|
||||
echo "" > "${CONFDIR}/${JAILNAME}.d/incs_policy"
|
||||
inc_path="${INCSPATH}/${INC_NAME}"
|
||||
|
||||
# Create the inc
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
# Inc should be removed
|
||||
run test -d "${inc_path}"
|
||||
assert_success
|
||||
|
||||
# Remove incs
|
||||
/usr/lib/bkctld/bkctld-rm
|
||||
# Inc should be removed
|
||||
run test -d "${inc_path}"
|
||||
assert_failure
|
||||
}
|
||||
|
||||
@test "empty inc directory are removed" {
|
||||
# Create an inc
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
# no inc should be kept
|
||||
echo '' > "${CONFDIR}/${JAILNAME}.d/incs_policy"
|
||||
|
||||
# The inc directory is present
|
||||
run test -d "${INCSPATH}"
|
||||
assert_success
|
||||
|
||||
/usr/lib/bkctld/bkctld-rm
|
||||
|
||||
# The inc directory is absent
|
||||
run test -d "${INCSPATH}"
|
||||
assert_failure
|
||||
}
|
||||
|
||||
@test "BTRFS based inc can be unlock with complex pattern" {
|
||||
if is_btrfs "/backup"; then
|
||||
# Prepare an inc older than the policy
|
||||
recent_inc_path="${INCSPATH}/${INC_NAME}"
|
||||
older_inc_name=$(date -d -1month +"%Y-%m-%d-%H")
|
||||
older_inc_path="${INCSPATH}/${older_inc_name}"
|
||||
|
||||
# Create the inc, rename it to make it older, then run 'rm'
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
mv "${recent_inc_path}" "${older_inc_path}"
|
||||
# run 'inc' again to remake today's inc
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
|
||||
# inc should be locked
|
||||
run touch "${older_inc_path}/var/log/lastlog"
|
||||
assert_failure
|
||||
|
||||
# unlock inc
|
||||
pattern="${JAILNAME}/$(date -d -1month +"%Y-%m-*")"
|
||||
bkctld inc-unlock "${pattern}"
|
||||
|
||||
# inc should be unlocked
|
||||
run touch "${older_inc_path}/var/log/lastlog"
|
||||
assert_success
|
||||
|
||||
# other inc should still be locked
|
||||
run touch "${recent_inc_path}/var/log/lastlog"
|
||||
assert_failure
|
||||
else
|
||||
# On an ext4 filesystem it's always true
|
||||
run true
|
||||
assert_success
|
||||
fi
|
||||
}
|
||||
|
||||
@test "BTRFS based inc can be unlock with jail name" {
|
||||
if is_btrfs "/backup"; then
|
||||
# Prepare an inc older than the policy
|
||||
recent_inc_path="${INCSPATH}/${INC_NAME}"
|
||||
older_inc_name=$(date -d -1month +"%Y-%m-%d-%H")
|
||||
older_inc_path="${INCSPATH}/${older_inc_name}"
|
||||
|
||||
# Create the inc, rename it to make it older, then run 'rm'
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
mv "${recent_inc_path}" "${older_inc_path}"
|
||||
# run 'inc' again to remake today's inc
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
|
||||
# incs should be locked
|
||||
run touch "${recent_inc_path}/var/log/lastlog"
|
||||
assert_failure
|
||||
run touch "${older_inc_path}/var/log/lastlog"
|
||||
assert_failure
|
||||
|
||||
# unlock incs
|
||||
pattern="${JAILNAME}"
|
||||
bkctld inc-unlock "${pattern}"
|
||||
|
||||
# incs should be unlocked
|
||||
run touch "${recent_inc_path}/var/log/lastlog"
|
||||
assert_success
|
||||
run touch "${older_inc_path}/var/log/lastlog"
|
||||
assert_success
|
||||
else
|
||||
# On an ext4 filesystem it's always true
|
||||
run true
|
||||
assert_success
|
||||
fi
|
||||
}
|
||||
|
||||
@test "BTRFS based inc can be unlock with 'all' pattern" {
|
||||
if is_btrfs "/backup"; then
|
||||
# Prepare an inc older than the policy
|
||||
recent_inc_path="${INCSPATH}/${INC_NAME}"
|
||||
older_inc_name=$(date -d -1month +"%Y-%m-%d-%H")
|
||||
older_inc_path="${INCSPATH}/${older_inc_name}"
|
||||
|
||||
# Create the inc, rename it to make it older, then run 'rm'
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
mv "${recent_inc_path}" "${older_inc_path}"
|
||||
# run 'inc' again to remake today's inc
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
|
||||
# incs should be locked
|
||||
run touch "${recent_inc_path}/var/log/lastlog"
|
||||
assert_failure
|
||||
run touch "${older_inc_path}/var/log/lastlog"
|
||||
assert_failure
|
||||
|
||||
# unlock incs
|
||||
pattern="all"
|
||||
bkctld inc-unlock "${pattern}"
|
||||
|
||||
# incs should be unlocked
|
||||
run touch "${recent_inc_path}/var/log/lastlog"
|
||||
assert_success
|
||||
run touch "${older_inc_path}/var/log/lastlog"
|
||||
assert_success
|
||||
else
|
||||
# On an ext4 filesystem it's always true
|
||||
run true
|
||||
assert_success
|
||||
fi
|
||||
}
|
||||
|
||||
# TODO: add many tests for incs (creation and removal)
|
113
server/test/main.bats
Executable file
113
server/test/main.bats
Executable file
|
@ -0,0 +1,113 @@
|
|||
#!/usr/bin/env bats
|
||||
# shellcheck disable=SC1089,SC1083,SC2154
|
||||
|
||||
load test_helper
|
||||
|
||||
@test "Filesystem type" {
|
||||
if is_btrfs "/backup"; then
|
||||
# On a btrfs filesystem, the jail should be a btrfs volume
|
||||
run is_btrfs "${JAILPATH}"
|
||||
assert_success
|
||||
else
|
||||
# On an ext4 filesystem, the jail should be a regular directory
|
||||
run test -d "${JAILPATH}"
|
||||
assert_success
|
||||
fi
|
||||
}
|
||||
|
||||
@test "New jail should have a incs_policy file" {
|
||||
run test -f "/etc/evobackup/${JAILNAME}.d/incs_policy"
|
||||
assert_success
|
||||
}
|
||||
|
||||
@test "New jail should have a check_policy file" {
|
||||
run test -f "/etc/evobackup/${JAILNAME}.d/check_policy"
|
||||
assert_success
|
||||
}
|
||||
|
||||
@test "A jail should be able to be started" {
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
pid=$(cat "${JAILPATH}/${SSHD_PID}")
|
||||
# A started jail should have an SSH pid file
|
||||
run ps --pid "${pid}"
|
||||
assert_success
|
||||
}
|
||||
|
||||
@test "A jail should be able to be stopped" {
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
pid=$(cat "${JAILPATH}/${SSHD_PID}")
|
||||
/usr/lib/bkctld/bkctld-stop "${JAILNAME}"
|
||||
# A stopped jail should not have an SSH pid file
|
||||
run ps --pid "${pid}"
|
||||
assert_failure
|
||||
}
|
||||
|
||||
@test "A jail should be able to be reloaded" {
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-reload "${JAILNAME}"
|
||||
# A reloaded jail should mention the restart in the authlog
|
||||
run grep "Received SIGHUP; restarting." "${JAILPATH}/var/log/authlog"
|
||||
assert_success
|
||||
}
|
||||
|
||||
@test "A jail should be able to be restarted" {
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
pid_before=$(cat "${JAILPATH}/${SSHD_PID}")
|
||||
|
||||
/usr/lib/bkctld/bkctld-restart "${JAILNAME}"
|
||||
pid_after=$(cat "${JAILPATH}/${SSHD_PID}")
|
||||
|
||||
# A restarted jail should have a different pid
|
||||
refute_equal "${pid_before}" "${pid_after}"
|
||||
}
|
||||
|
||||
@test "A jail should be able to be renamed" {
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
new_name="${JAILNAME}-new"
|
||||
# A started jail should report to be ON
|
||||
run /usr/lib/bkctld/bkctld-rename "${JAILNAME}" "${new_name}"
|
||||
assert_success
|
||||
|
||||
run /usr/lib/bkctld/bkctld-is-on "${new_name}"
|
||||
assert_success
|
||||
|
||||
# change variable to new name,for teardown
|
||||
JAILNAME="${new_name}"
|
||||
}
|
||||
|
||||
@test "A jail should be able to be archived" {
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
# A started jail should report to be ON
|
||||
run /usr/lib/bkctld/bkctld-is-on "${JAILNAME}"
|
||||
assert_success
|
||||
|
||||
run /usr/lib/bkctld/bkctld-archive "${JAILNAME}"
|
||||
assert_success
|
||||
|
||||
# A started jail should report to be OFF
|
||||
run /usr/lib/bkctld/bkctld-is-on "${JAILNAME}"
|
||||
assert_failure
|
||||
|
||||
run test -d "${JAILPATH}"
|
||||
assert_failure
|
||||
|
||||
run test -d "/backup/archives/${JAILNAME}"
|
||||
assert_success
|
||||
}
|
||||
|
||||
@test "Status should return information" {
|
||||
run /usr/lib/bkctld/bkctld-status "${JAILNAME}"
|
||||
assert_success
|
||||
}
|
||||
|
||||
@test "ON/OFF status can be retrived with 'is-on'" {
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
# A started jail should report to be ON
|
||||
run /usr/lib/bkctld/bkctld-is-on "${JAILNAME}"
|
||||
assert_success
|
||||
|
||||
/usr/lib/bkctld/bkctld-stop "${JAILNAME}"
|
||||
# A stopped jail should not report to be ON
|
||||
run /usr/lib/bkctld/bkctld-is-on "${JAILNAME}"
|
||||
assert_failure
|
||||
}
|
142
server/test/test_helper.bash
Normal file
142
server/test/test_helper.bash
Normal file
|
@ -0,0 +1,142 @@
|
|||
# shellcheck disable=SC2154 shell=bash
|
||||
|
||||
# shellcheck disable=SC2034
|
||||
setup() {
|
||||
. /usr/lib/bkctld/includes
|
||||
|
||||
rm -f /root/bkctld.key*
|
||||
ssh-keygen -t rsa -N "" -f /root/bkctld.key -q
|
||||
|
||||
set_variable "/etc/default/bkctld" "BACKUP_DISK" "/dev/vdb"
|
||||
|
||||
JAILNAME=$(random_jail_name)
|
||||
JAILPATH="/backup/jails/${JAILNAME}"
|
||||
INCSPATH="/backup/incs/${JAILNAME}"
|
||||
PORT=$(random_port)
|
||||
INC_NAME=$(inc_name_today)
|
||||
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
}
|
||||
|
||||
teardown() {
|
||||
remove_variable "/etc/default/bkctld" "BACKUP_DISK"
|
||||
FORCE=1 /usr/lib/bkctld/bkctld-remove "${JAILNAME}" \
|
||||
&& rm -rf "${INCSPATH}" "/etc/evobackup/${JAILNAME}" "/etc/evobackup/${JAILNAME}.d"
|
||||
}
|
||||
|
||||
random_jail_name() {
|
||||
tr -cd '[:alnum:]' < /dev/urandom | fold -w15 | head -n1
|
||||
}
|
||||
random_port() {
|
||||
awk -v min=2222 -v max=2999 'BEGIN{srand(); print int(min+rand()*(max-min+1))}'
|
||||
}
|
||||
inc_name_today() {
|
||||
date +"%Y-%m-%d-%H"
|
||||
}
|
||||
|
||||
set_variable() {
|
||||
file=${1:?}
|
||||
var_name=${2:?}
|
||||
var_value=${3:-}
|
||||
|
||||
if grep -qE "^\s*${var_name}=" "${file}"; then
|
||||
sed --follow-symlinks --in-place "s|^\s*${var_name}=.*|${var_name}=${var_value}|" "${file}"
|
||||
else
|
||||
echo "${var_name}=${var_value}" >> "${file}"
|
||||
fi
|
||||
}
|
||||
remove_variable() {
|
||||
file=${1:?}
|
||||
var_name=${2:?}
|
||||
|
||||
sed --follow-symlinks --in-place "s|^\s*${var_name}=.*|d" "${file}"
|
||||
}
|
||||
|
||||
is_btrfs() {
|
||||
path=$1
|
||||
|
||||
inode=$(stat --format=%i "${path}")
|
||||
|
||||
test ${inode} -eq 256
|
||||
}
|
||||
|
||||
flunk() {
|
||||
{ if [ "$#" -eq 0 ]; then cat -
|
||||
else echo "$@"
|
||||
fi
|
||||
} >&2
|
||||
return 1
|
||||
}
|
||||
|
||||
assert_success() {
|
||||
if [ "$status" -ne 0 ]; then
|
||||
flunk "command failed with exit status $status"
|
||||
elif [ "$#" -gt 0 ]; then
|
||||
assert_output "$1"
|
||||
fi
|
||||
}
|
||||
|
||||
assert_failure() {
|
||||
if [ "$status" -eq 0 ]; then
|
||||
flunk "expected failed exit status"
|
||||
elif [ "$#" -gt 0 ]; then
|
||||
assert_output "$1"
|
||||
fi
|
||||
}
|
||||
|
||||
assert_equal() {
|
||||
if [ "$1" != "$2" ]; then
|
||||
{ echo "expected: $1"
|
||||
echo "actual: $2"
|
||||
} | flunk
|
||||
fi
|
||||
}
|
||||
|
||||
refute_equal() {
|
||||
if [ "$1" = "$2" ]; then
|
||||
echo "expected $1 to not be equal to $2" | flunk
|
||||
fi
|
||||
}
|
||||
|
||||
assert_output() {
|
||||
local expected
|
||||
if [ $# -eq 0 ]; then expected="$(cat -)"
|
||||
else expected="$1"
|
||||
fi
|
||||
assert_equal "$expected" "$output"
|
||||
}
|
||||
|
||||
assert_line() {
|
||||
if [ "$1" -ge 0 ] 2>/dev/null; then
|
||||
assert_equal "$2" "${lines[$1]}"
|
||||
else
|
||||
local line
|
||||
for line in "${lines[@]}"; do
|
||||
if [ "$line" = "$1" ]; then return 0; fi
|
||||
done
|
||||
flunk "expected line \`$1'"
|
||||
fi
|
||||
}
|
||||
|
||||
refute_line() {
|
||||
if [ "$1" -ge 0 ] 2>/dev/null; then
|
||||
local num_lines="${#lines[@]}"
|
||||
if [ "$1" -lt "$num_lines" ]; then
|
||||
flunk "output has $num_lines lines"
|
||||
fi
|
||||
else
|
||||
local line
|
||||
for line in "${lines[@]}"; do
|
||||
if [ "$line" = "$1" ]; then
|
||||
flunk "expected to not find line \`$line'"
|
||||
fi
|
||||
done
|
||||
fi
|
||||
}
|
||||
|
||||
# shellcheck disable=SC2145
|
||||
assert() {
|
||||
if ! "$@"; then
|
||||
flunk "failed: $@"
|
||||
fi
|
||||
}
|
3
server/tpl/check_policy.tpl
Normal file
3
server/tpl/check_policy.tpl
Normal file
|
@ -0,0 +1,3 @@
|
|||
## Uncomment and adapt thresholds (values are in hours)
|
||||
# WARNING=24
|
||||
# CRITICAL=48
|
133
test/main.bats
133
test/main.bats
|
@ -1,133 +0,0 @@
|
|||
#!/usr/bin/env bats
|
||||
|
||||
setup() {
|
||||
port=$(awk -v min=2222 -v max=2999 'BEGIN{srand(); print int(min+rand()*(max-min+1))}')
|
||||
date=$(date +"%Y-%m-%d-%H")
|
||||
inode=$(stat --format=%i /backup)
|
||||
rm -f /root/bkctld.key* && ssh-keygen -t rsa -N "" -f /root/bkctld.key -q
|
||||
. /usr/lib/bkctld/config
|
||||
JAILNAME=$(tr -cd '[:alnum:]' < /dev/urandom | fold -w15 | head -n1)
|
||||
}
|
||||
|
||||
teardown() {
|
||||
/usr/lib/bkctld/bkctld-remove "${JAILNAME}" && rm -rf "${INCDIR}/*"
|
||||
}
|
||||
|
||||
@test "init" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
inode=$(stat --format=%i /backup)
|
||||
if [ "${inode}" -eq 256 ]; then
|
||||
run stat --format=%i "${JAILDIR}/${JAILNAME}"
|
||||
[ "${output}" -eq 256 ]
|
||||
else
|
||||
run test -d "${JAILDIR}/${JAILNAME}"
|
||||
[ "${status}" -eq 0 ]
|
||||
fi
|
||||
}
|
||||
|
||||
@test "start" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
pid=$(cat "${JAILDIR}/${JAILNAME}/${SSHD_PID}")
|
||||
run ps --pid "${pid}"
|
||||
[ "${status}" -eq 0 ]
|
||||
}
|
||||
|
||||
@test "stop" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
pid=$(cat "${JAILDIR}/${JAILNAME}/${SSHD_PID}")
|
||||
/usr/lib/bkctld/bkctld-stop "${JAILNAME}"
|
||||
run ps --pid "${pid}"
|
||||
[ "${status}" -ne 0 ]
|
||||
}
|
||||
|
||||
@test "reload" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-reload "${JAILNAME}"
|
||||
run grep "Received SIGHUP; restarting." "${JAILDIR}/${JAILNAME}/var/log/authlog"
|
||||
[ "${status}" -eq 0 ]
|
||||
}
|
||||
|
||||
@test "restart" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
bpid=$(cat "${JAILDIR}/${JAILNAME}/${SSHD_PID}")
|
||||
/usr/lib/bkctld/bkctld-restart "${JAILNAME}"
|
||||
apid=$(cat "${JAILDIR}/${JAILNAME}/${SSHD_PID}")
|
||||
[ "${bpid}" -ne "${apid}" ]
|
||||
}
|
||||
|
||||
@test "status" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
run /usr/lib/bkctld/bkctld-status "${JAILNAME}"
|
||||
[ "${status}" -eq 0 ]
|
||||
}
|
||||
|
||||
@test "key" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-key "${JAILNAME}" /root/bkctld.key.pub
|
||||
run cat "/backup/jails/${JAILNAME}/root/.ssh/authorized_keys"
|
||||
[ "${status}" -eq 0 ]
|
||||
[ "${output}" = $(cat /root/bkctld.key.pub) ]
|
||||
}
|
||||
|
||||
@test "port" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-port "${JAILNAME}" "${port}"
|
||||
run nc -vz 127.0.0.1 "${port}"
|
||||
[ "${status}" -eq 0 ]
|
||||
}
|
||||
|
||||
@test "inc" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-inc
|
||||
if [ "${inode}" -eq 256 ]; then
|
||||
run stat --format=%i "${INCDIR}/${JAILNAME}/${date}"
|
||||
[ "${output}" -eq 256 ]
|
||||
else
|
||||
run test -d "${INCDIR}/${JAILNAME}/${date}"
|
||||
[ "${status}" -eq 0 ]
|
||||
fi
|
||||
}
|
||||
|
||||
@test "ssh" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-port "${JAILNAME}" "${port}"
|
||||
/usr/lib/bkctld/bkctld-key "${JAILNAME}" /root/bkctld.key.pub
|
||||
run ssh -p "${port}" -i /root/bkctld.key -oStrictHostKeyChecking=no root@127.0.0.1 ls
|
||||
[ "$status" -eq 0 ]
|
||||
}
|
||||
|
||||
@test "rsync" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-start "${JAILNAME}"
|
||||
/usr/lib/bkctld/bkctld-port "${JAILNAME}" "${port}"
|
||||
/usr/lib/bkctld/bkctld-key "${JAILNAME}" /root/bkctld.key.pub
|
||||
run rsync -a -e "ssh -p ${port} -i /root/bkctld.key -oStrictHostKeyChecking=no" /tmp/ root@127.0.0.1:/var/backup/
|
||||
[ "$status" -eq 0 ]
|
||||
}
|
||||
|
||||
@test "check-ok" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
run /usr/lib/bkctld/bkctld-check
|
||||
[ "$status" -eq 0 ]
|
||||
}
|
||||
|
||||
@test "check-warning" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
touch --date="$(date -d -2days)" "/backup/jails/${JAILNAME}/var/log/lastlog"
|
||||
run /usr/lib/bkctld/bkctld-check
|
||||
[ "$status" -eq 1 ]
|
||||
}
|
||||
|
||||
@test "check-critical" {
|
||||
/usr/lib/bkctld/bkctld-init "${JAILNAME}"
|
||||
touch --date="$(date -d -3days)" "/backup/jails/${JAILNAME}/var/log/lastlog"
|
||||
run /usr/lib/bkctld/bkctld-check
|
||||
[ "$status" -eq 2 ]
|
||||
}
|
Loading…
Reference in a new issue