ansible-roles/evocheck/files/evocheck.sh

1731 lines
71 KiB
Bash
Raw Normal View History

2017-04-25 10:07:00 +02:00
#!/bin/bash
# EvoCheck
2022-08-29 16:47:12 +02:00
# Script to verify compliance of a Linux (Debian) server
2017-04-25 10:07:00 +02:00
# powered by Evolix
2022-09-14 10:55:00 +02:00
VERSION="22.09"
2021-07-07 15:20:24 +02:00
readonly VERSION
2020-04-15 18:01:55 +02:00
2019-04-25 13:34:28 +02:00
# base functions
2019-04-16 10:46:44 +02:00
show_version() {
cat <<END
evocheck version ${VERSION}
2022-03-15 23:25:15 +01:00
Copyright 2009-2022 Evolix <info@evolix.fr>,
2019-04-16 10:46:44 +02:00
Romain Dessort <rdessort@evolix.fr>,
Benoit Série <bserie@evolix.fr>,
Gregory Colpart <reg@evolix.fr>,
Jérémy Lecour <jlecour@evolix.fr>,
Tristan Pilat <tpilat@evolix.fr>,
2022-06-03 09:15:04 +02:00
Victor Laborie <vlaborie@evolix.fr>,
Alexis Ben Miloud--Josselin <abenmiloud@evolix.fr>,
2019-04-16 10:46:44 +02:00
and others.
evocheck comes with ABSOLUTELY NO WARRANTY. This is free software,
and you are welcome to redistribute it under certain conditions.
See the GNU General Public License v3.0 for details.
END
}
show_help() {
cat <<END
2022-08-29 16:47:12 +02:00
evocheck is a script that verifies Evolix conventions on Linux (Debian) servers.
2019-04-16 10:46:44 +02:00
Usage: evocheck
or evocheck --cron
or evocheck --quiet
or evocheck --verbose
Options
--cron disable a few checks
-v, --verbose increase verbosity of checks
-q, --quiet nothing is printed on stdout nor stderr
-h, --help print this message and exit
--version print version and exit
END
}
2019-04-25 13:34:28 +02:00
detect_os() {
# OS detection
DEBIAN_RELEASE=""
LSB_RELEASE_BIN=$(command -v lsb_release)
if [ -e /etc/debian_version ]; then
DEBIAN_VERSION=$(cut -d "." -f 1 < /etc/debian_version)
if [ -x "${LSB_RELEASE_BIN}" ]; then
DEBIAN_RELEASE=$(${LSB_RELEASE_BIN} --codename --short)
else
case ${DEBIAN_VERSION} in
5) DEBIAN_RELEASE="lenny";;
6) DEBIAN_RELEASE="squeeze";;
7) DEBIAN_RELEASE="wheezy";;
8) DEBIAN_RELEASE="jessie";;
9) DEBIAN_RELEASE="stretch";;
2019-08-30 14:23:30 +02:00
10) DEBIAN_RELEASE="buster";;
2021-07-07 15:20:24 +02:00
11) DEBIAN_RELEASE="bullseye";;
12) DEBIAN_RELEASE="bookworm";;
2019-04-25 13:34:28 +02:00
esac
fi
fi
}
2019-04-16 10:46:44 +02:00
is_debian() {
2021-10-21 17:08:42 +02:00
test -n "${DEBIAN_RELEASE}"
2019-04-16 10:46:44 +02:00
}
is_debian_lenny() {
test "${DEBIAN_RELEASE}" = "lenny"
}
is_debian_squeeze() {
test "${DEBIAN_RELEASE}" = "squeeze"
}
is_debian_wheezy() {
test "${DEBIAN_RELEASE}" = "wheezy"
}
is_debian_jessie() {
test "${DEBIAN_RELEASE}" = "jessie"
}
is_debian_stretch() {
test "${DEBIAN_RELEASE}" = "stretch"
}
2019-08-30 14:23:30 +02:00
is_debian_buster() {
test "${DEBIAN_RELEASE}" = "buster"
}
2021-07-07 15:20:24 +02:00
is_debian_bullseye() {
test "${DEBIAN_RELEASE}" = "bullseye"
}
is_debian_bookworm() {
test "${DEBIAN_RELEASE}" = "bookworm"
}
2019-04-16 10:46:44 +02:00
debian_release() {
printf "%s" "${DEBIAN_RELEASE}"
}
debian_version() {
printf "%s" "${DEBIAN_VERSION}"
}
2017-04-25 10:07:00 +02:00
is_pack_web(){
2017-12-27 16:44:54 +01:00
test -e /usr/share/scripts/web-add.sh || test -e /usr/share/scripts/evoadmin/web-add.sh
2017-04-25 10:07:00 +02:00
}
is_pack_samba(){
test -e /usr/share/scripts/add.pl
}
is_installed(){
2019-04-16 10:46:44 +02:00
for pkg in "$@"; do
2021-07-07 15:20:24 +02:00
dpkg -l "$pkg" 2> /dev/null | grep -q -E '^(i|h)i' || return 1
2017-04-25 10:07:00 +02:00
done
}
2019-04-25 13:34:28 +02:00
minifirewall_file() {
case ${DEBIAN_RELEASE} in
lenny) echo "/etc/firewall.rc" ;;
squeeze) echo "/etc/firewall.rc" ;;
wheezy) echo "/etc/firewall.rc" ;;
jessie) echo "/etc/default/minifirewall" ;;
stretch) echo "/etc/default/minifirewall" ;;
*) echo "/etc/default/minifirewall" ;;
esac
}
2017-04-25 10:07:00 +02:00
2019-04-16 10:46:44 +02:00
# logging
2019-04-25 13:34:28 +02:00
2019-04-16 10:46:44 +02:00
failed() {
check_name=$1
shift
check_comments=$*
RC=1
if [ "${QUIET}" != 1 ]; then
if [ -n "${check_comments}" ] && [ "${VERBOSE}" = 1 ]; then
2022-03-15 23:25:15 +01:00
printf "%s FAILED! %s\n" "${check_name}" "${check_comments}" >> "${main_output_file}"
2019-04-16 10:46:44 +02:00
else
2022-03-15 23:25:15 +01:00
printf "%s FAILED!\n" "${check_name}" >> "${main_output_file}"
2019-04-16 10:46:44 +02:00
fi
fi
2017-04-25 10:07:00 +02:00
}
2019-04-25 13:34:28 +02:00
# check functions
2019-04-16 10:46:44 +02:00
2019-04-25 13:34:28 +02:00
check_lsbrelease(){
if [ -x "${LSB_RELEASE_BIN}" ]; then
## only the major version matters
lhs=$(${LSB_RELEASE_BIN} --release --short | cut -d "." -f 1)
rhs=$(cut -d "." -f 1 < /etc/debian_version)
2021-07-07 15:20:24 +02:00
test "$lhs" = "$rhs" || failed "IS_LSBRELEASE" "release is not consistent between lsb_release (${lhs}) and /etc/debian_version (${rhs})"
2019-04-25 13:34:28 +02:00
else
failed "IS_LSBRELEASE" "lsb_release is missing or not executable"
2019-04-16 10:46:44 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_dpkgwarning() {
if is_debian_squeeze; then
if [ "$IS_USRRO" = 1 ] || [ "$IS_TMPNOEXEC" = 1 ]; then
count=$(grep -c -E -i "(Pre-Invoke ..echo Are you sure to have rw on|Post-Invoke ..echo Dont forget to mount -o remount)" /etc/apt/apt.conf)
test "$count" = 2 || failed "IS_DPKGWARNING" "Pre/Post-Invoke are missing."
fi
elif is_debian_wheezy; then
if [ "$IS_USRRO" = 1 ] || [ "$IS_TMPNOEXEC" = 1 ]; then
test -e /etc/apt/apt.conf.d/80evolinux \
|| failed "IS_DPKGWARNING" "/etc/apt/apt.conf.d/80evolinux is missing"
test -e /etc/apt/apt.conf \
&& failed "IS_DPKGWARNING" "/etc/apt/apt.conf is missing"
fi
2021-07-07 15:20:24 +02:00
elif is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-04-25 13:34:28 +02:00
test -e /etc/apt/apt.conf.d/z-evolinux.conf \
|| failed "IS_DPKGWARNING" "/etc/apt/apt.conf.d/z-evolinux.conf is missing"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_umasksudoers(){
if is_debian_squeeze; then
grep -q "^Defaults.*umask=0077" /etc/sudoers \
|| failed "IS_UMASKSUDOERS" "sudoers must set umask to 0077"
fi
}
# Verifying check_mailq in Nagios NRPE config file. (Option "-M postfix" need to be set if the MTA is Postfix)
check_nrpepostfix() {
if is_installed postfix; then
2019-04-16 10:46:44 +02:00
if is_debian_squeeze; then
2019-04-25 13:34:28 +02:00
grep -q "^command.*check_mailq -M postfix" /etc/nagios/nrpe.cfg \
|| failed "IS_NRPEPOSTFIX" "NRPE \"check_mailq\" for postfix is missing"
else
{ test -e /etc/nagios/nrpe.cfg \
&& grep -qr "^command.*check_mailq -M postfix" /etc/nagios/nrpe.*;
} || failed "IS_NRPEPOSTFIX" "NRPE \"check_mailq\" for postfix is missing"
2019-04-16 10:46:44 +02:00
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Check if mod-security config file is present
check_modsecurity() {
if is_debian_squeeze; then
if is_installed libapache-mod-security; then
test -e /etc/apache2/conf.d/mod-security2.conf || failed "IS_MODSECURITY" "missing configuration file"
2019-04-16 10:46:44 +02:00
fi
2019-04-25 13:34:28 +02:00
elif is_debian_wheezy; then
if is_installed libapache2-modsecurity; then
test -e /etc/apache2/conf.d/mod-security2.conf || failed "IS_MODSECURITY" "missing configuration file"
2019-04-16 10:46:44 +02:00
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_customsudoers() {
2019-08-30 14:23:30 +02:00
grep -E -qr "umask=0077" /etc/sudoers* || failed "IS_CUSTOMSUDOERS" "missing umask=0077 in sudoers file"
2019-04-25 13:34:28 +02:00
}
check_vartmpfs() {
2020-12-08 11:07:42 +01:00
FINDMNT_BIN=$(command -v findmnt)
if [ -x "${FINDMNT_BIN}" ]; then
${FINDMNT_BIN} /var/tmp --type tmpfs --noheadings > /dev/null || failed "IS_VARTMPFS" "/var/tmp is not a tmpfs"
else
df /var/tmp | grep -q tmpfs || failed "IS_VARTMPFS" "/var/tmp is not a tmpfs"
fi
2019-04-25 13:34:28 +02:00
}
check_serveurbase() {
is_installed serveur-base || failed "IS_SERVEURBASE" "serveur-base package is not installed"
}
check_logrotateconf() {
2019-08-30 14:23:30 +02:00
test -e /etc/logrotate.d/zsyslog || failed "IS_LOGROTATECONF" "missing zsyslog in logrotate.d"
2019-04-25 13:34:28 +02:00
}
check_syslogconf() {
grep -q "^# Syslog for Pack Evolix serveur" /etc/*syslog.conf \
2019-08-30 14:23:30 +02:00
|| failed "IS_SYSLOGCONF" "syslog evolix config file missing"
2019-04-25 13:34:28 +02:00
}
check_debiansecurity() {
2021-09-30 10:45:07 +02:00
if is_debian_bullseye; then
# https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information.html#security-archive
2022-04-25 09:58:07 +02:00
# https://www.debian.org/security/
2022-06-06 15:05:59 +02:00
pattern="^deb ?(\[.*\])? ?http://security\.debian\.org/debian-security/? bullseye-security main"
2021-09-30 10:45:07 +02:00
elif is_debian_buster; then
2022-06-06 15:05:59 +02:00
pattern="^deb ?(\[.*\])? ?http://security\.debian\.org/debian-security/? buster/updates main"
2021-09-30 10:45:07 +02:00
elif is_debian_stretch; then
2022-06-06 15:05:59 +02:00
pattern="^deb ?(\[.*\])? ?http://security\.debian\.org/debian-security/? stretch/updates main"
2021-09-30 10:45:07 +02:00
else
pattern="^deb.*security"
fi
source_file="/etc/apt/sources.list"
grep -qE "${pattern}" "${source_file}" || failed "IS_DEBIANSECURITY" "missing debian security repository"
2019-04-25 13:34:28 +02:00
}
check_aptitudeonly() {
if is_debian_squeeze || is_debian_wheezy; then
2019-08-30 14:23:30 +02:00
test -e /usr/bin/apt-get && failed "IS_APTITUDEONLY" \
"only aptitude may be enabled on Debian <=7, apt-get should be disabled"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_aptitude() {
2021-07-07 15:20:24 +02:00
if is_debian_jessie || is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-08-30 14:23:30 +02:00
test -e /usr/bin/aptitude && failed "IS_APTITUDE" "aptitude may not be installed on Debian >=8"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_aptgetbak() {
2021-07-07 15:20:24 +02:00
if is_debian_jessie || is_debian_stretch || is_debian_buster || is_debian_bullseye; then
test -e /usr/bin/apt-get.bak && failed "IS_APTGETBAK" "prohibit the installation of apt-get.bak with dpkg-divert(1)"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_apticron() {
status="OK"
test -e /etc/cron.d/apticron || status="fail"
test -e /etc/cron.daily/apticron && status="fail"
test "$status" = "fail" || test -e /usr/bin/apt-get.bak || status="fail"
2018-08-17 10:04:07 +02:00
2019-04-25 13:34:28 +02:00
if is_debian_squeeze || is_debian_wheezy; then
2019-08-30 14:23:30 +02:00
test "$status" = "fail" && failed "IS_APTICRON" "apticron must be in cron.d not cron.daily"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_usrro() {
2019-11-06 07:50:45 +01:00
grep /usr /etc/fstab | grep -qE "\bro\b" || failed "IS_USRRO" "missing ro directive on fstab for /usr"
2019-04-25 13:34:28 +02:00
}
check_tmpnoexec() {
2019-11-05 16:20:07 +01:00
FINDMNT_BIN=$(command -v findmnt)
2020-04-26 10:54:45 +02:00
if [ -x "${FINDMNT_BIN}" ]; then
2019-11-05 16:20:07 +01:00
options=$(${FINDMNT_BIN} --noheadings --first-only --output OPTIONS /tmp)
2019-11-06 07:50:45 +01:00
echo "${options}" | grep -qE "\bnoexec\b" || failed "IS_TMPNOEXEC" "/tmp is not mounted with 'noexec'"
2019-11-05 16:20:07 +01:00
else
2019-11-06 07:50:45 +01:00
mount | grep "on /tmp" | grep -qE "\bnoexec\b" || failed "IS_TMPNOEXEC" "/tmp is not mounted with 'noexec' (WARNING: findmnt(8) is not found)"
2019-11-05 16:20:07 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_mountfstab() {
# Test if lsblk available, if not skip this test...
LSBLK_BIN=$(command -v lsblk)
if test -x "${LSBLK_BIN}"; then
for mountPoint in $(${LSBLK_BIN} -o MOUNTPOINT -l -n | grep '/'); do
2019-08-30 14:23:30 +02:00
grep -Eq "$mountPoint\W" /etc/fstab \
|| failed "IS_MOUNT_FSTAB" "partition(s) detected mounted but no presence in fstab"
2019-04-25 13:34:28 +02:00
done
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_listchangesconf() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-04-25 13:34:28 +02:00
if is_installed apt-listchanges; then
2019-08-30 14:23:30 +02:00
failed "IS_LISTCHANGESCONF" "apt-listchanges must not be installed on Debian >=9"
2019-04-16 10:46:44 +02:00
fi
2019-04-25 13:34:28 +02:00
else
if [ -e "/etc/apt/listchanges.conf" ]; then
lines=$(grep -cE "(which=both|confirm=1)" /etc/apt/listchanges.conf)
if [ "$lines" != 2 ]; then
failed "IS_LISTCHANGESCONF" "apt-listchanges config is incorrect"
fi
else
failed "IS_LISTCHANGESCONF" "apt-listchanges config is missing"
2019-04-16 10:46:44 +02:00
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_customcrontab() {
found_lines=$(grep -c -E "^(17 \*|25 6|47 6|52 6)" /etc/crontab)
2019-08-30 14:23:30 +02:00
test "$found_lines" = 4 && failed "IS_CUSTOMCRONTAB" "missing custom field in crontab"
2019-04-25 13:34:28 +02:00
}
check_sshallowusers() {
2021-10-21 17:08:42 +02:00
grep -E -qir "(AllowUsers|AllowGroups)" /etc/ssh/sshd_config /etc/ssh/sshd_config.d \
2019-08-30 14:23:30 +02:00
|| failed "IS_SSHALLOWUSERS" "missing AllowUsers or AllowGroups directive in sshd_config"
2019-04-25 13:34:28 +02:00
}
check_diskperf() {
2019-08-30 14:23:30 +02:00
perfFile="/root/disk-perf.txt"
test -e $perfFile || failed "IS_DISKPERF" "missing ${perfFile}"
2019-04-25 13:34:28 +02:00
}
check_tmoutprofile() {
grep -sq "TMOUT=" /etc/profile /etc/profile.d/evolinux.sh || failed "IS_TMOUTPROFILE" "TMOUT is not set"
}
check_alert5boot() {
2021-07-07 15:20:24 +02:00
if is_debian_buster || is_debian_bullseye; then
2019-08-30 14:23:30 +02:00
grep -qs "^date" /usr/share/scripts/alert5.sh || failed "IS_ALERT5BOOT" "boot mail is not sent by alert5 init script"
2022-03-15 23:25:15 +01:00
if [ -f /etc/systemd/system/alert5.service ]; then
systemctl is-enabled alert5.service -q || failed "IS_ALERT5BOOT" "alert5 unit is not enabled"
else
failed "IS_ALERT5BOOT" "alert5 unit file is missing"
fi
2019-04-25 13:34:28 +02:00
else
2019-08-30 14:23:30 +02:00
if [ -n "$(find /etc/rc2.d/ -name 'S*alert5')" ]; then
grep -q "^date" /etc/rc2.d/S*alert5 || failed "IS_ALERT5BOOT" "boot mail is not sent by alert5 init script"
2022-06-03 09:15:04 +02:00
elif [ -n "$(find /etc/init.d/ -name 'alert5')" ]; then
grep -q "^date" /etc/init.d/alert5 || failed "IS_ALERT5BOOT" "boot mail is not sent by alert5 int script"
2019-08-30 14:23:30 +02:00
else
failed "IS_ALERT5BOOT" "alert5 init script is missing"
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_alert5minifw() {
2021-07-07 15:20:24 +02:00
if is_debian_buster || is_debian_bullseye; then
2019-08-30 14:23:30 +02:00
grep -qs "^/etc/init.d/minifirewall" /usr/share/scripts/alert5.sh \
|| failed "IS_ALERT5MINIFW" "Minifirewall is not started by alert5 script or script is missing"
2019-04-25 13:34:28 +02:00
else
2019-08-30 14:23:30 +02:00
if [ -n "$(find /etc/rc2.d/ -name 'S*alert5')" ]; then
grep -q "^/etc/init.d/minifirewall" /etc/rc2.d/S*alert5 \
|| failed "IS_ALERT5MINIFW" "Minifirewall is not started by alert5 init script"
2022-06-03 09:15:04 +02:00
elif [ -n "$(find /etc/init.d/ -name 'alert5')" ]; then
grep -q "^/etc/init.d/minifirewall" /etc/init.d/alert5 \
|| failed "IS_ALERT5MINIFW" "Minifirewall is not started by alert5 init script"
2019-08-30 14:23:30 +02:00
else
failed "IS_ALERT5MINIFW" "alert5 init script is missing"
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_minifw() {
/sbin/iptables -L -n | grep -q -E "^ACCEPT\s*all\s*--\s*31\.170\.8\.4\s*0\.0\.0\.0/0\s*$" \
2022-06-06 15:05:59 +02:00
|| failed "IS_MINIFW" "minifirewall seems not started"
2019-04-25 13:34:28 +02:00
}
2021-09-30 10:45:07 +02:00
check_minifw_includes() {
if is_debian_bullseye; then
if grep -q -e '/sbin/iptables' -e '/sbin/ip6tables' "${MINIFW_FILE}"; then
failed "IS_MINIFWINCLUDES" "minifirewall has direct iptables invocations in ${MINIFW_FILE} that should go in /etc/minifirewall.d/"
fi
fi
}
2019-04-25 13:34:28 +02:00
check_nrpeperms() {
if [ -d /etc/nagios ]; then
2019-08-30 14:23:30 +02:00
nagiosDir="/etc/nagios"
actual=$(stat --format "%a" $nagiosDir)
2019-04-25 13:34:28 +02:00
expected="750"
2019-08-30 14:23:30 +02:00
test "$expected" = "$actual" || failed "IS_NRPEPERMS" "${nagiosDir} must be ${expected}"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_minifwperms() {
if [ -f "$MINIFW_FILE" ]; then
2019-06-21 09:42:02 +02:00
actual=$(stat --format "%a" "$MINIFW_FILE")
2019-04-25 13:34:28 +02:00
expected="600"
2019-08-30 14:23:30 +02:00
test "$expected" = "$actual" || failed "IS_MINIFWPERMS" "${MINIFW_FILE} must be ${expected}"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_nrpedisks() {
NRPEDISKS=$(grep command.check_disk /etc/nagios/nrpe.cfg | grep "^command.check_disk[0-9]" | sed -e "s/^command.check_disk\([0-9]\+\).*/\1/" | sort -n | tail -1)
DFDISKS=$(df -Pl | grep -c -E -v "(^Filesystem|/lib/init/rw|/dev/shm|udev|rpc_pipefs)")
2019-08-30 14:23:30 +02:00
test "$NRPEDISKS" = "$DFDISKS" || failed "IS_NRPEDISKS" "there must be $DFDISKS check_disk in nrpe.cfg"
2019-04-25 13:34:28 +02:00
}
check_nrpepid() {
2021-07-07 15:20:24 +02:00
if is_debian_bullseye; then
{ test -e /etc/nagios/nrpe.cfg \
&& grep -q "^pid_file=/run/nagios/nrpe.pid" /etc/nagios/nrpe.cfg;
} || failed "IS_NRPEPID" "missing or wrong pid_file directive in nrpe.cfg"
elif ! is_debian_squeeze; then
2019-04-25 13:34:28 +02:00
{ test -e /etc/nagios/nrpe.cfg \
&& grep -q "^pid_file=/var/run/nagios/nrpe.pid" /etc/nagios/nrpe.cfg;
2019-08-30 14:23:30 +02:00
} || failed "IS_NRPEPID" "missing or wrong pid_file directive in nrpe.cfg"
2017-12-27 16:44:54 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_grsecprocs() {
if uname -a | grep -q grsec; then
{ grep -q "^command.check_total_procs..sudo" /etc/nagios/nrpe.cfg \
&& grep -A1 "^\[processes\]" /etc/munin/plugin-conf.d/munin-node | grep -q "^user root";
2019-08-30 14:23:30 +02:00
} || failed "IS_GRSECPROCS" "missing munin's plugin processes directive for grsec"
2019-04-25 13:34:28 +02:00
fi
}
check_apachemunin() {
if test -e /etc/apache2/apache2.conf; then
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-04-25 13:34:28 +02:00
{ test -h /etc/apache2/mods-enabled/status.load \
&& test -h /etc/munin/plugins/apache_accesses \
&& test -h /etc/munin/plugins/apache_processes \
&& test -h /etc/munin/plugins/apache_volume;
} || failed "IS_APACHEMUNIN" "missing munin plugins for Apache"
2017-12-27 16:44:54 +01:00
else
2019-04-25 13:34:28 +02:00
pattern="/server-status-[[:alnum:]]{4,}"
{ grep -r -q -s -E "^env.url.*${pattern}" /etc/munin/plugin-conf.d \
&& { grep -q -s -E "${pattern}" /etc/apache2/apache2.conf \
|| grep -q -s -E "${pattern}" /etc/apache2/mods-enabled/status.conf;
};
} || failed "IS_APACHEMUNIN" "server status is not properly configured"
2017-12-27 16:44:54 +01:00
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Verification mytop + Munin si MySQL
check_mysqlutils() {
MYSQL_ADMIN=${MYSQL_ADMIN:-mysqladmin}
if is_installed mysql-server; then
2021-09-30 10:45:07 +02:00
# With Debian 11 and later, root can connect to MariaDB with the socket
if is_debian_wheezy || is_debian_jessie || is_debian_stretch || is_debian_buster; then
# You can configure MYSQL_ADMIN in evocheck.cf
if ! grep -qs "^user *= *${MYSQL_ADMIN}" /root/.my.cnf; then
failed "IS_MYSQLUTILS" "${MYSQL_ADMIN} missing in /root/.my.cnf"
fi
2019-04-25 13:34:28 +02:00
fi
if ! test -x /usr/bin/mytop; then
if ! test -x /usr/local/bin/mytop; then
failed "IS_MYSQLUTILS" "mytop binary missing"
fi
fi
2021-09-30 10:45:07 +02:00
if ! grep -qs '^user *=' /root/.mytop; then
failed "IS_MYSQLUTILS" "credentials missing in /root/.mytop"
2019-04-25 13:34:28 +02:00
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Verification de la configuration du raid soft (mdadm)
check_raidsoft() {
if test -e /proc/mdstat && grep -q md /proc/mdstat; then
{ grep -q "^AUTOCHECK=true" /etc/default/mdadm \
&& grep -q "^START_DAEMON=true" /etc/default/mdadm \
&& grep -qv "^MAILADDR ___MAIL___" /etc/mdadm/mdadm.conf;
2019-08-30 14:23:30 +02:00
} || failed "IS_RAIDSOFT" "missing or wrong config for mdadm"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Verification du LogFormat de AWStats
check_awstatslogformat() {
2019-06-21 09:42:02 +02:00
if is_installed apache2 awstats; then
2019-08-30 14:23:30 +02:00
awstatsFile="/etc/awstats/awstats.conf.local"
grep -qE '^LogFormat=1' $awstatsFile \
|| failed "IS_AWSTATSLOGFORMAT" "missing or wrong LogFormat directive in $awstatsFile"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Verification de la présence de la config logrotate pour Munin
check_muninlogrotate() {
{ test -e /etc/logrotate.d/munin-node \
&& test -e /etc/logrotate.d/munin;
2019-08-30 14:23:30 +02:00
} || failed "IS_MUNINLOGROTATE" "missing lorotate file for munin"
2019-04-25 13:34:28 +02:00
}
# Verification de l'activation de Squid dans le cas d'un pack mail
check_squid() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-04-25 13:34:28 +02:00
squidconffile="/etc/squid/evolinux-custom.conf"
else
squidconffile="/etc/squid*/squid.conf"
fi
if is_pack_web && (is_installed squid || is_installed squid3); then
host=$(hostname -i)
# shellcheck disable=SC2086
2019-09-23 09:22:58 +02:00
http_port=$(grep -E "^http_port\s+[0-9]+" $squidconffile | awk '{ print $2 }')
2019-04-25 13:34:28 +02:00
{ grep -qE "^[^#]*iptables -t nat -A OUTPUT -p tcp --dport 80 -m owner --uid-owner proxy -j ACCEPT" "$MINIFW_FILE" \
&& grep -qE "^[^#]*iptables -t nat -A OUTPUT -p tcp --dport 80 -d $host -j ACCEPT" "$MINIFW_FILE" \
&& grep -qE "^[^#]*iptables -t nat -A OUTPUT -p tcp --dport 80 -d 127.0.0.(1|0/8) -j ACCEPT" "$MINIFW_FILE" \
&& grep -qE "^[^#]*iptables -t nat -A OUTPUT -p tcp --dport 80 -j REDIRECT --to-port.* $http_port" "$MINIFW_FILE";
2021-09-30 10:45:07 +02:00
} || grep -qE "^PROXY='?on'?" "$MINIFW_FILE" \
|| failed "IS_SQUID" "missing squid rules in minifirewall"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_evomaintenance_fw() {
if [ -f "$MINIFW_FILE" ]; then
2019-11-07 10:38:32 +01:00
hook_db=$(grep -E '^\s*HOOK_DB' /etc/evomaintenance.cf | tr -d ' ' | cut -d= -f2)
2019-04-25 13:34:28 +02:00
rulesNumber=$(grep -c "/sbin/iptables -A INPUT -p tcp --sport 5432 --dport 1024:65535 -s .* -m state --state ESTABLISHED,RELATED -j ACCEPT" "$MINIFW_FILE")
2019-11-07 10:38:32 +01:00
if [ "$hook_db" = "1" ] && [ "$rulesNumber" -lt 2 ]; then
failed "IS_EVOMAINTENANCE_FW" "HOOK_DB is enabled but missing evomaintenance rules in minifirewall"
2019-04-16 10:46:44 +02:00
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Verification de la conf et de l'activation de mod-deflate
check_moddeflate() {
f=/etc/apache2/mods-enabled/deflate.conf
if is_installed apache2.2; then
{ test -e $f && grep -q "AddOutputFilterByType DEFLATE text/html text/plain text/xml" $f \
&& grep -q "AddOutputFilterByType DEFLATE text/css" $f \
&& grep -q "AddOutputFilterByType DEFLATE application/x-javascript application/javascript" $f;
2019-08-30 14:23:30 +02:00
} || failed "IS_MODDEFLATE" "missing AddOutputFilterByType directive for apache mod deflate"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Verification de la conf log2mail
check_log2mailrunning() {
if is_pack_web && is_installed log2mail; then
2019-08-30 14:23:30 +02:00
pgrep log2mail >/dev/null || failed "IS_LOG2MAILRUNNING" "log2mail is not running"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_log2mailapache() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-04-25 13:34:28 +02:00
conf=/etc/log2mail/config/apache
else
conf=/etc/log2mail/config/default
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
if is_pack_web && is_installed log2mail; then
grep -s -q "^file = /var/log/apache2/error.log" $conf \
2019-08-30 14:23:30 +02:00
|| failed "IS_LOG2MAILAPACHE" "missing log2mail directive for apache"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_log2mailmysql() {
if is_pack_web && is_installed log2mail; then
grep -s -q "^file = /var/log/syslog" /etc/log2mail/config/{default,mysql,mysql.conf} \
2019-08-30 14:23:30 +02:00
|| failed "IS_LOG2MAILMYSQL" "missing log2mail directive for mysql"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_log2mailsquid() {
if is_pack_web && is_installed log2mail; then
grep -s -q "^file = /var/log/squid.*/access.log" /etc/log2mail/config/* \
2019-08-30 14:23:30 +02:00
|| failed "IS_LOG2MAILSQUID" "missing log2mail directive for squid"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Verification si bind est chroote
check_bindchroot() {
if is_installed bind9; then
if netstat -utpln | grep "/named" | grep :53 | grep -qvE "(127.0.0.1|::1)"; then
if grep -q '^OPTIONS=".*-t' /etc/default/bind9 && grep -q '^OPTIONS=".*-u' /etc/default/bind9; then
md5_original=$(md5sum /usr/sbin/named | cut -f 1 -d ' ')
md5_chrooted=$(md5sum /var/chroot-bind/usr/sbin/named | cut -f 1 -d ' ')
if [ "$md5_original" != "$md5_chrooted" ]; then
2019-08-30 14:23:30 +02:00
failed "IS_BINDCHROOT" "the chrooted bind binary is different than the original binary"
2019-04-25 13:34:28 +02:00
fi
2019-04-16 10:46:44 +02:00
else
2019-04-25 13:34:28 +02:00
failed "IS_BINDCHROOT" "bind process is not chrooted"
2019-04-16 10:46:44 +02:00
fi
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Verification de la présence du depot volatile
check_repvolatile() {
if is_debian_lenny; then
grep -qE "^deb http://volatile.debian.org/debian-volatile" /etc/apt/sources.list \
2019-08-30 14:23:30 +02:00
|| failed "IS_REPVOLATILE" "missing debian-volatile repository"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
if is_debian_squeeze; then
grep -qE "^deb.*squeeze-updates" /etc/apt/sources.list \
2019-08-30 14:23:30 +02:00
|| failed "IS_REPVOLATILE" "missing squeeze-updates repository"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# /etc/network/interfaces should be present, we don't manage systemd-network yet
check_network_interfaces() {
if ! test -f /etc/network/interfaces; then
IS_AUTOIF=0
IS_INTERFACESGW=0
failed "IS_NETWORK_INTERFACES" "systemd network configuration is not supported yet"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Verify if all if are in auto
check_autoif() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2022-06-03 09:15:04 +02:00
interfaces=$(/sbin/ip address show up | grep "^[0-9]*:" | grep -E -v "(lo|vnet|docker|veth|tun|tap|macvtap|vrrp|lxcbr|wg)" | cut -d " " -f 2 | tr -d : | cut -d@ -f1 | tr "\n" " ")
2019-04-25 13:34:28 +02:00
else
2021-07-07 15:20:24 +02:00
interfaces=$(/sbin/ifconfig -s | tail -n +2 | grep -E -v "^(lo|vnet|docker|veth|tun|tap|macvtap|vrrp)" | cut -d " " -f 1 |tr "\n" " ")
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
for interface in $interfaces; do
2022-08-29 17:03:29 +02:00
if grep -Rq "^iface $interface" /etc/network/interfaces* && ! grep -Rq "^auto $interface" /etc/network/interfaces*; then
failed "IS_AUTOIF" "Network interface \`${interface}' is statically defined but not set to auto"
2019-04-25 13:34:28 +02:00
test "${VERBOSE}" = 1 || break
2019-04-16 10:46:44 +02:00
fi
2019-04-25 13:34:28 +02:00
done
}
# Network conf verification
check_interfacesgw() {
number=$(grep -Ec "^[^#]*gateway [0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}" /etc/network/interfaces)
test "$number" -gt 1 && failed "IS_INTERFACESGW" "there is more than 1 IPv4 gateway"
number=$(grep -Ec "^[^#]*gateway [0-9a-fA-F]+:" /etc/network/interfaces)
test "$number" -gt 1 && failed "IS_INTERFACESGW" "there is more than 1 IPv6 gateway"
}
2022-06-03 09:15:04 +02:00
# Verification de létat du service networking
check_networking_service() {
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
if systemctl is-enabled networking.service > /dev/null; then
if ! systemctl is-active networking.service > /dev/null; then
failed "IS_NETWORKING_SERVICE" "networking.service is not active"
fi
fi
fi
}
2019-04-25 13:34:28 +02:00
# Verification de la mise en place d'evobackup
check_evobackup() {
evobackup_found=$(find /etc/cron* -name '*evobackup*' | wc -l)
2019-08-30 14:23:30 +02:00
test "$evobackup_found" -gt 0 || failed "IS_EVOBACKUP" "missing evobackup cron"
2019-04-25 13:34:28 +02:00
}
2022-07-28 13:38:33 +02:00
# Vérification de la mise en place de la purge pour fail2ban
check_purge_fail2ban() {
if is_debian_stretch || is_debian_buster; then
if is_installed fail2ban; then
test -f /etc/cron.daily/fail2ban_dbpurge || failed "IS_FAIL2BAN_PURGE" "missing script fail2ban_dbpurge cron"
fi
fi
}
2020-04-12 22:30:07 +02:00
# Vérification de l'exclusion des montages (NFS) dans les sauvegardes
check_evobackup_exclude_mount() {
2022-04-25 10:33:33 +02:00
excludes_file=$(mktemp --tmpdir="${TMPDIR:-/tmp}" "evocheck.evobackup_exclude_mount.XXXXX")
2022-03-15 23:25:15 +01:00
files_to_cleanup="${files_to_cleanup} ${excludes_file}"
2020-04-12 22:30:07 +02:00
# shellcheck disable=SC2044
2020-12-08 11:07:42 +01:00
for evobackup_file in $(find /etc/cron* -name '*evobackup*' | grep -v -E ".disabled$"); do
2022-05-12 15:47:37 +02:00
# if the file seems to be a backup script, with an Rsync invocation
if grep -q "^\s*rsync" "${evobackup_file}"; then
# If rsync is not limited by "one-file-system"
# then we verify that every mount is excluded
if ! grep -q -- "^\s*--one-file-system" "${evobackup_file}"; then
grep -- "--exclude " "${evobackup_file}" | grep -E -o "\"[^\"]+\"" | tr -d '"' > "${excludes_file}"
not_excluded=$(findmnt --type nfs,nfs4,fuse.sshfs, -o target --noheadings | grep -v -f "${excludes_file}")
for mount in ${not_excluded}; do
failed "IS_EVOBACKUP_EXCLUDE_MOUNT" "${mount} is not excluded from ${evobackup_file} backup script"
done
fi
2022-04-25 10:33:33 +02:00
fi
2020-04-12 22:30:07 +02:00
done
}
2019-04-25 13:34:28 +02:00
# Verification de la presence du userlogrotate
check_userlogrotate() {
if is_pack_web; then
2019-08-30 14:23:30 +02:00
test -x /etc/cron.weekly/userlogrotate || failed "IS_USERLOGROTATE" "missing userlogrotate cron"
2018-08-17 10:04:07 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Verification de la syntaxe de la conf d'Apache
check_apachectl() {
2019-06-21 09:42:02 +02:00
if is_installed apache2; then
2019-08-30 14:23:30 +02:00
/usr/sbin/apache2ctl configtest 2>&1 | grep -q "^Syntax OK$" \
|| failed "IS_APACHECTL" "apache errors detected, run a configtest"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Check if there is regular files in Apache sites-enabled.
check_apachesymlink() {
2019-06-21 09:42:02 +02:00
if is_installed apache2; then
apacheFind=$(find /etc/apache2/sites-enabled ! -type l -type f -print)
nbApacheFind=$(wc -m <<< "$apacheFind")
if [[ $nbApacheFind -gt 1 ]]; then
if [[ $VERBOSE == 1 ]]; then
while read -r line; do
failed "IS_APACHESYMLINK" "Not a symlink: $line"
done <<< "$apacheFind"
else
failed "IS_APACHESYMLINK"
fi
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Check if there is real IP addresses in Allow/Deny directives (no trailing space, inline comments or so).
check_apacheipinallow() {
# Note: Replace "exit 1" by "print" in Perl code to debug it.
2019-06-21 09:42:02 +02:00
if is_installed apache2; then
2019-04-25 13:34:28 +02:00
grep -IrE "^[^#] *(Allow|Deny) from" /etc/apache2/ \
| grep -iv "from all" \
| grep -iv "env=" \
| perl -ne 'exit 1 unless (/from( [\da-f:.\/]+)+$/i)' \
2019-08-30 14:23:30 +02:00
|| failed "IS_APACHEIPINALLOW" "bad (Allow|Deny) directives in apache"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Check if default Apache configuration file for munin is absent (or empty or commented).
check_muninapacheconf() {
if is_debian_squeeze || is_debian_wheezy; then
muninconf="/etc/apache2/conf.d/munin"
else
muninconf="/etc/apache2/conf-available/munin.conf"
2017-04-25 10:07:00 +02:00
fi
2019-06-21 09:42:02 +02:00
if is_installed apache2; then
2019-08-30 14:23:30 +02:00
test -e $muninconf && grep -vEq "^( |\t)*#" "$muninconf" \
&& failed "IS_MUNINAPACHECONF" "default munin configuration may be commented or disabled"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Verification de la priorité du package samba si les backports sont utilisés
check_sambainpriority() {
if is_debian_lenny && is_pack_samba; then
if grep -qrE "^[^#].*backport" /etc/apt/sources.list{,.d}; then
priority=$(grep -E -A2 "^Package:.*samba" /etc/apt/preferences | grep -A1 "^Pin: release a=lenny-backports" | grep "^Pin-Priority:" | cut -f2 -d" ")
2019-08-30 14:23:30 +02:00
test "$priority" -gt 500 || failed "IS_SAMBAPINPRIORITY" "bad pinning priority for samba"
2019-04-16 10:46:44 +02:00
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Verification si le système doit redémarrer suite màj kernel.
check_kerneluptodate() {
if is_installed linux-image*; then
# shellcheck disable=SC2012
kernel_installed_at=$(date -d "$(ls --full-time -lcrt /boot | tail -n1 | awk '{print $6}')" +%s)
last_reboot_at=$(($(date +%s) - $(cut -f1 -d '.' /proc/uptime)))
if [ "$kernel_installed_at" -gt "$last_reboot_at" ]; then
2019-08-30 14:23:30 +02:00
failed "IS_KERNELUPTODATE" "machine is running an outdated kernel, reboot advised"
2017-04-25 10:07:00 +02:00
fi
fi
2019-04-25 13:34:28 +02:00
}
# Check if the server is running for more than a year.
check_uptime() {
if is_installed linux-image*; then
limit=$(date -d "now - 2 year" +%s)
last_reboot_at=$(($(date +%s) - $(cut -f1 -d '.' /proc/uptime)))
if [ "$limit" -gt "$last_reboot_at" ]; then
2019-11-05 16:20:07 +01:00
failed "IS_UPTIME" "machine has an uptime of more than 2 years, reboot on new kernel advised"
2019-04-16 10:46:44 +02:00
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Check if munin-node running and RRD files are up to date.
check_muninrunning() {
if ! pgrep munin-node >/dev/null; then
failed "IS_MUNINRUNNING" "Munin is not running"
elif [ -d "/var/lib/munin/" ] && [ -d "/var/cache/munin/" ]; then
limit=$(date +"%s" -d "now - 10 minutes")
if [ -n "$(find /var/lib/munin/ -name '*load-g.rrd')" ]; then
updated_at=$(stat -c "%Y" /var/lib/munin/*/*load-g.rrd |sort |tail -1)
[ "$limit" -gt "$updated_at" ] && failed "IS_MUNINRUNNING" "Munin load RRD has not been updated in the last 10 minutes"
else
failed "IS_MUNINRUNNING" "Munin is not installed properly (load RRD not found)"
2018-08-17 10:04:07 +02:00
fi
2019-04-25 13:34:28 +02:00
if [ -n "$(find /var/cache/munin/www/ -name 'load-day.png')" ]; then
updated_at=$(stat -c "%Y" /var/cache/munin/www/*/*/load-day.png |sort |tail -1)
grep -sq "^graph_strategy cron" /etc/munin/munin.conf && [ "$limit" -gt "$updated_at" ] && failed "IS_MUNINRUNNING" "Munin load PNG has not been updated in the last 10 minutes"
2019-04-16 10:46:44 +02:00
else
2019-04-25 13:34:28 +02:00
failed "IS_MUNINRUNNING" "Munin is not installed properly (load PNG not found)"
2019-04-16 10:46:44 +02:00
fi
2019-04-25 13:34:28 +02:00
else
failed "IS_MUNINRUNNING" "Munin is not installed properly (main directories are missing)"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Check if files in /home/backup/ are up-to-date
check_backupuptodate() {
2020-02-27 11:37:01 +01:00
backup_dir="/home/backup"
2019-11-07 10:38:32 +01:00
if [ -d "${backup_dir}" ]; then
if [ -n "$(ls -A ${backup_dir})" ]; then
find "${backup_dir}" -maxdepth 1 -type f | while read -r file; do
2019-04-25 13:34:28 +02:00
limit=$(date +"%s" -d "now - 2 day")
updated_at=$(stat -c "%Y" "$file")
2022-06-06 15:05:59 +02:00
if [ "$limit" -gt "$updated_at" ]; then
2019-04-25 13:34:28 +02:00
failed "IS_BACKUPUPTODATE" "$file has not been backed up"
test "${VERBOSE}" = 1 || break;
fi
done
2017-04-25 10:07:00 +02:00
else
2019-11-07 10:38:32 +01:00
failed "IS_BACKUPUPTODATE" "${backup_dir}/ is empty"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
else
2019-11-07 10:38:32 +01:00
failed "IS_BACKUPUPTODATE" "${backup_dir}/ is missing"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_etcgit() {
2019-08-30 14:23:30 +02:00
export GIT_DIR="/etc/.git" GIT_WORK_TREE="/etc"
git rev-parse --is-inside-work-tree > /dev/null 2>&1 \
|| failed "IS_ETCGIT" "/etc is not a git repository"
2019-04-25 13:34:28 +02:00
}
# Check if /etc/.git/ has read/write permissions for root only.
check_gitperms() {
2019-08-30 14:23:30 +02:00
GIT_DIR="/etc/.git"
if test -d $GIT_DIR; then
2019-04-25 13:34:28 +02:00
expected="700"
2019-08-30 14:23:30 +02:00
actual=$(stat -c "%a" $GIT_DIR)
[ "$expected" = "$actual" ] || failed "IS_GITPERMS" "$GIT_DIR must be $expected"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Check if no package has been upgraded since $limit.
check_notupgraded() {
last_upgrade=0
upgraded=false
for log in /var/log/dpkg.log*; do
if zgrep -qsm1 upgrade "$log"; then
# There is at least one upgrade
upgraded=true
break
2019-04-16 10:46:44 +02:00
fi
2019-04-25 13:34:28 +02:00
done
if $upgraded; then
last_upgrade=$(date +%s -d "$(zgrep -h upgrade /var/log/dpkg.log* | sort -n | tail -1 | cut -f1 -d ' ')")
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
if grep -qs '^mailto="listupgrade-todo@' /etc/evolinux/listupgrade.cnf \
|| grep -qs -E '^[[:digit:]]+[[:space:]]+[[:digit:]]+[[:space:]]+[^\*]' /etc/cron.d/listupgrade; then
# Manual upgrade process
limit=$(date +%s -d "now - 180 days")
else
# Regular process
limit=$(date +%s -d "now - 90 days")
2019-04-16 10:46:44 +02:00
fi
2019-04-25 13:34:28 +02:00
install_date=0
if [ -d /var/log/installer ]; then
install_date=$(stat -c %Z /var/log/installer)
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
# Check install_date if the system never received an upgrade
if [ "$last_upgrade" -eq 0 ]; then
[ "$install_date" -lt "$limit" ] && failed "IS_NOTUPGRADED" "The system has never been updated"
else
[ "$last_upgrade" -lt "$limit" ] && failed "IS_NOTUPGRADED" "The system hasn't been updated for too long"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
# Check if reserved blocks for root is at least 5% on every mounted partitions.
check_tune2fs_m5() {
min=5
parts=$(grep -E "ext(3|4)" /proc/mounts | cut -d ' ' -f1 | tr -s '\n' ' ')
2019-11-05 16:20:07 +01:00
FINDMNT_BIN=$(command -v findmnt)
2019-04-25 13:34:28 +02:00
for part in $parts; do
blockCount=$(dumpe2fs -h "$part" 2>/dev/null | grep -e "Block count:" | grep -Eo "[0-9]+")
# If buggy partition, skip it.
if [ -z "$blockCount" ]; then
continue
fi
reservedBlockCount=$(dumpe2fs -h "$part" 2>/dev/null | grep -e "Reserved block count:" | grep -Eo "[0-9]+")
# Use awk to have a rounded percentage
# python is slow, bash is unable and bc rounds weirdly
percentage=$(awk "BEGIN { pc=100*${reservedBlockCount}/${blockCount}; i=int(pc); print (pc-i<0.5)?i:i+1 }")
if [ "$percentage" -lt "${min}" ]; then
2020-04-26 10:54:45 +02:00
if [ -x "${FINDMNT_BIN}" ]; then
mount=$(${FINDMNT_BIN} --noheadings --first-only --output TARGET "${part}")
2019-11-05 16:20:07 +01:00
else
mount="unknown mount point"
fi
failed "IS_TUNE2FS_M5" "Partition ${part} (${mount}) has less than ${min}% reserved blocks (${percentage}%)"
2019-04-16 10:46:44 +02:00
fi
2019-04-25 13:34:28 +02:00
done
}
check_evolinuxsudogroup() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-04-25 13:34:28 +02:00
if grep -q "^evolinux-sudo:" /etc/group; then
2022-03-15 23:25:15 +01:00
if [ -f /etc/sudoers.d/evolinux ]; then
grep -qE '^%evolinux-sudo +ALL ?= ?\(ALL:ALL\) ALL' /etc/sudoers.d/evolinux \
|| failed "IS_EVOLINUXSUDOGROUP" "missing evolinux-sudo directive in sudoers file"
fi
2017-04-25 10:07:00 +02:00
fi
fi
2019-04-25 13:34:28 +02:00
}
check_userinadmgroup() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-04-25 13:34:28 +02:00
users=$(grep "^evolinux-sudo:" /etc/group | awk -F: '{print $4}' | tr ',' ' ')
for user in $users; do
if ! groups "$user" | grep -q adm; then
failed "IS_USERINADMGROUP" "User $user doesn't belong to \`adm' group"
test "${VERBOSE}" = 1 || break
2017-12-27 16:44:54 +01:00
fi
done
fi
2019-04-25 13:34:28 +02:00
}
check_apache2evolinuxconf() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2022-03-15 23:25:15 +01:00
if is_installed apache2; then
2019-08-30 14:23:30 +02:00
{ test -L /etc/apache2/conf-enabled/z-evolinux-defaults.conf \
&& test -L /etc/apache2/conf-enabled/zzz-evolinux-custom.conf \
&& test -f /etc/apache2/ipaddr_whitelist.conf;
} || failed "IS_APACHE2EVOLINUXCONF" "missing custom evolinux apache config"
fi
2017-12-27 16:44:54 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_backportsconf() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-04-25 13:34:28 +02:00
grep -qsE "^[^#].*backports" /etc/apt/sources.list \
&& failed "IS_BACKPORTSCONF" "backports can't be in main sources list"
if grep -qsE "^[^#].*backports" /etc/apt/sources.list.d/*.list; then
grep -qsE "^[^#].*backports" /etc/apt/preferences.d/* \
|| failed "IS_BACKPORTSCONF" "backports must have preferences"
2017-12-27 16:44:54 +01:00
fi
fi
2019-04-25 13:34:28 +02:00
}
check_bind9munin() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-08-30 14:23:30 +02:00
if is_installed bind9; then
{ test -L /etc/munin/plugins/bind9 \
&& test -e /etc/munin/plugin-conf.d/bind9;
} || failed "IS_BIND9MUNIN" "missing bind plugin for munin"
fi
2017-12-27 16:44:54 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_bind9logrotate() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-08-30 14:23:30 +02:00
if is_installed bind9; then
test -e /etc/logrotate.d/bind9 || failed "IS_BIND9LOGROTATE" "missing bind logrotate file"
fi
2017-12-27 16:44:54 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_broadcomfirmware() {
LSPCI_BIN=$(command -v lspci)
if [ -x "${LSPCI_BIN}" ]; then
if ${LSPCI_BIN} | grep -q 'NetXtreme II'; then
{ is_installed firmware-bnx2 \
&& grep -q "^deb http://mirror.evolix.org/debian.* non-free" /etc/apt/sources.list;
2019-08-30 14:23:30 +02:00
} || failed "IS_BROADCOMFIRMWARE" "missing non-free repository"
2017-12-27 16:44:54 +01:00
fi
2019-04-25 13:34:28 +02:00
else
2019-08-30 14:23:30 +02:00
failed "IS_BROADCOMFIRMWARE" "lspci not found in ${PATH}"
2017-12-27 16:44:54 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_hardwareraidtool() {
LSPCI_BIN=$(command -v lspci)
if [ -x "${LSPCI_BIN}" ]; then
2021-07-07 15:20:24 +02:00
if ${LSPCI_BIN} | grep -q 'MegaRAID'; then
2019-04-25 13:34:28 +02:00
# shellcheck disable=SC2015
is_installed megacli && { is_installed megaclisas-status || is_installed megaraidsas-status; } \
|| failed "IS_HARDWARERAIDTOOL" "Mega tools not found"
2019-04-16 10:46:44 +02:00
fi
2019-04-25 13:34:28 +02:00
if ${LSPCI_BIN} | grep -q 'Hewlett-Packard Company Smart Array'; then
is_installed cciss-vol-status || failed "IS_HARDWARERAIDTOOL" "cciss-vol-status not installed"
2017-12-27 16:44:54 +01:00
fi
2019-04-25 13:34:28 +02:00
else
2019-08-30 14:23:30 +02:00
failed "IS_HARDWARERAIDTOOL" "lspci not found in ${PATH}"
2017-12-27 16:44:54 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_log2mailsystemdunit() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-08-30 14:23:30 +02:00
systemctl -q is-active log2mail.service \
|| failed "IS_LOG2MAILSYSTEMDUNIT" "log2mail unit not running"
test -f /etc/systemd/system/log2mail.service \
|| failed "IS_LOG2MAILSYSTEMDUNIT" "missing log2mail unit file"
test -f /etc/init.d/log2mail \
&& failed "IS_LOG2MAILSYSTEMDUNIT" "/etc/init.d/log2mail may be deleted (use systemd unit)"
2017-12-27 16:44:54 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_listupgrade() {
2019-08-30 14:23:30 +02:00
test -f /etc/cron.d/listupgrade \
|| failed "IS_LISTUPGRADE" "missing listupgrade cron"
test -x /usr/share/scripts/listupgrade.sh \
|| failed "IS_LISTUPGRADE" "missing listupgrade script or not executable"
2019-04-25 13:34:28 +02:00
}
check_mariadbevolinuxconf() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-04-25 13:34:28 +02:00
if is_installed mariadb-server; then
{ test -f /etc/mysql/mariadb.conf.d/z-evolinux-defaults.cnf \
&& test -f /etc/mysql/mariadb.conf.d/zzz-evolinux-custom.cnf;
2019-08-30 14:23:30 +02:00
} || failed "IS_MARIADBEVOLINUXCONF" "missing mariadb custom config"
2017-12-27 16:44:54 +01:00
fi
fi
2019-04-25 13:34:28 +02:00
}
check_sql_backup() {
if (is_installed "mysql-server" || is_installed "mariadb-server"); then
# You could change the default path in /etc/evocheck.cf
SQL_BACKUP_PATH=${SQL_BACKUP_PATH:-"/home/backup/mysql.bak.gz"}
2020-12-08 11:07:42 +01:00
for backup_path in ${SQL_BACKUP_PATH}; do
if [ ! -f "${backup_path}" ]; then
failed "IS_SQL_BACKUP" "MySQL dump is missing (${backup_path})"
test "${VERBOSE}" = 1 || break
fi
done
2017-12-27 16:44:54 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_postgres_backup() {
2020-12-08 11:07:42 +01:00
if is_installed "postgresql-9*" || is_installed "postgresql-1*"; then
2019-04-25 13:34:28 +02:00
# If you use something like barman, you should disable this check
# You could change the default path in /etc/evocheck.cf
2020-12-08 11:07:42 +01:00
POSTGRES_BACKUP_PATH=${POSTGRES_BACKUP_PATH:-"/home/backup/pg.dump.bak*"}
for backup_path in ${POSTGRES_BACKUP_PATH}; do
if [ ! -f "${backup_path}" ]; then
failed "IS_POSTGRES_BACKUP" "PostgreSQL dump is missing (${backup_path})"
test "${VERBOSE}" = 1 || break
fi
done
2017-12-27 16:44:54 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_mongo_backup() {
if is_installed "mongodb-org-server"; then
# You could change the default path in /etc/evocheck.cf
MONGO_BACKUP_PATH=${MONGO_BACKUP_PATH:-"/home/backup/mongodump"}
if [ -d "$MONGO_BACKUP_PATH" ]; then
2022-07-28 13:38:33 +02:00
for file in "${MONGO_BACKUP_PATH}"/*/*.{json,bson}*; do
2019-04-25 13:34:28 +02:00
# Skip indexes file.
if ! [[ "$file" =~ indexes ]]; then
limit=$(date +"%s" -d "now - 2 day")
updated_at=$(stat -c "%Y" "$file")
if [ -f "$file" ] && [ "$limit" -gt "$updated_at" ]; then
failed "IS_MONGO_BACKUP" "MongoDB hasn't been dumped for more than 2 days"
break
2017-12-27 16:44:54 +01:00
fi
2018-08-17 10:04:07 +02:00
fi
2017-12-27 16:44:54 +01:00
done
2019-04-16 10:46:44 +02:00
else
2019-04-25 13:34:28 +02:00
failed "IS_MONGO_BACKUP" "MongoDB dump directory is missing (${MONGO_BACKUP_PATH})"
2018-08-17 10:04:07 +02:00
fi
fi
2019-04-25 13:34:28 +02:00
}
check_ldap_backup() {
if is_installed slapd; then
# You could change the default path in /etc/evocheck.cf
LDAP_BACKUP_PATH=${LDAP_BACKUP_PATH:-"/home/backup/ldap.bak"}
test -f "$LDAP_BACKUP_PATH" || failed "IS_LDAP_BACKUP" "LDAP dump is missing (${LDAP_BACKUP_PATH})"
2018-11-06 13:38:07 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_redis_backup() {
if is_installed redis-server; then
# You could change the default path in /etc/evocheck.cf
REDIS_BACKUP_PATH=${REDIS_BACKUP_PATH:-"/home/backup/dump.rdb"}
test -f "$REDIS_BACKUP_PATH" || failed "IS_REDIS_BACKUP" "Redis dump is missing (${REDIS_BACKUP_PATH})"
2018-11-06 13:38:07 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_elastic_backup() {
if is_installed elasticsearch; then
# You could change the default path in /etc/evocheck.cf
2019-08-30 14:23:30 +02:00
ELASTIC_BACKUP_PATH=${ELASTIC_BACKUP_PATH:-"/home/backup-elasticsearch"}
2019-04-25 13:34:28 +02:00
test -d "$ELASTIC_BACKUP_PATH" || failed "IS_ELASTIC_BACKUP" "Elastic snapshot is missing (${ELASTIC_BACKUP_PATH})"
2018-11-06 13:38:07 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_mariadbsystemdunit() {
2021-07-07 15:20:24 +02:00
# TODO: check if it is still needed for bullseye
2019-08-30 14:23:30 +02:00
if is_debian_stretch || is_debian_buster; then
if is_installed mariadb-server; then
if systemctl -q is-active mariadb.service; then
test -f /etc/systemd/system/mariadb.service.d/evolinux.conf \
|| failed "IS_MARIADBSYSTEMDUNIT" "missing systemd override for mariadb unit"
fi
fi
2018-11-06 13:38:07 +01:00
fi
2019-04-25 13:34:28 +02:00
}
check_mysqlmunin() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-08-30 14:23:30 +02:00
if is_installed mariadb-server; then
for file in mysql_bytes mysql_queries mysql_slowqueries \
mysql_threads mysql_connections mysql_files_tables \
mysql_innodb_bpool mysql_innodb_bpool_act mysql_innodb_io \
mysql_innodb_log mysql_innodb_rows mysql_innodb_semaphores \
mysql_myisam_indexes mysql_qcache mysql_qcache_mem \
mysql_sorts mysql_tmp_tables; do
2019-04-25 13:34:28 +02:00
2019-08-30 14:23:30 +02:00
if [[ ! -L /etc/munin/plugins/$file ]]; then
failed "IS_MYSQLMUNIN" "missing munin plugin '$file'"
test "${VERBOSE}" = 1 || break
fi
done
2022-03-15 23:25:15 +01:00
munin-run mysql_commands 2> /dev/null > /dev/null
test $? -eq 0 || failed "IS_MYSQLMUNIN" "Munin plugin mysql_commands returned an error"
2019-08-30 14:23:30 +02:00
fi
2019-04-16 10:46:44 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_mysqlnrpe() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-08-30 14:23:30 +02:00
if is_installed mariadb-server; then
nagios_file=~nagios/.my.cnf
if ! test -f ${nagios_file}; then
failed "IS_MYSQLNRPE" "${nagios_file} is missing"
elif [ "$(stat -c %U ${nagios_file})" != "nagios" ] \
|| [ "$(stat -c %a ${nagios_file})" != "600" ]; then
failed "IS_MYSQLNRPE" "${nagios_file} has wrong permissions"
else
grep -q -F "command[check_mysql]=/usr/lib/nagios/plugins/check_mysql" /etc/nagios/nrpe.d/evolix.cfg \
|| failed "IS_MYSQLNRPE" "check_mysql is missing"
fi
2019-06-21 09:42:02 +02:00
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_phpevolinuxconf() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
is_debian_stretch && phpVersion="7.0"
is_debian_buster && phpVersion="7.3"
is_debian_bullseye && phpVersion="7.4"
2019-08-30 14:23:30 +02:00
if is_installed php; then
{ test -f /etc/php/${phpVersion}/cli/conf.d/z-evolinux-defaults.ini \
&& test -f /etc/php/${phpVersion}/cli/conf.d/zzz-evolinux-custom.ini
} || failed "IS_PHPEVOLINUXCONF" "missing php evolinux config"
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_squidlogrotate() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-08-30 14:23:30 +02:00
if is_installed squid; then
2021-10-21 17:08:42 +02:00
grep -q -e monthly -e daily /etc/logrotate.d/squid \
2019-08-30 14:23:30 +02:00
|| failed "IS_SQUIDLOGROTATE" "missing squid logrotate file"
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_squidevolinuxconf() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-08-30 14:23:30 +02:00
if is_installed squid; then
{ grep -qs "^CONFIG=/etc/squid/evolinux-defaults.conf$" /etc/default/squid \
&& test -f /etc/squid/evolinux-defaults.conf \
&& test -f /etc/squid/evolinux-whitelist-defaults.conf \
&& test -f /etc/squid/evolinux-whitelist-custom.conf \
&& test -f /etc/squid/evolinux-acl.conf \
&& test -f /etc/squid/evolinux-httpaccess.conf \
&& test -f /etc/squid/evolinux-custom.conf;
} || failed "IS_SQUIDEVOLINUXCONF" "missing squid evolinux config"
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_duplicate_fs_label() {
# Do it only if thereis blkid binary
BLKID_BIN=$(command -v blkid)
2022-03-15 23:25:15 +01:00
if [ -n "$BLKID_BIN" ]; then
2022-04-25 10:33:33 +02:00
tmpFile=$(mktemp --tmpdir="${TMPDIR:-/tmp}" "evocheck.duplicate_fs_label.XXXXX")
2022-03-15 23:25:15 +01:00
files_to_cleanup="${files_to_cleanup} ${tmpFile}"
2020-12-08 11:07:42 +01:00
parts=$($BLKID_BIN -c /dev/null | grep -ve raid_member -e EFI_SYSPART | grep -Eo ' LABEL=".*"' | cut -d'"' -f2)
2019-04-25 13:34:28 +02:00
for part in $parts; do
echo "$part" >> "$tmpFile"
done
tmpOutput=$(sort < "$tmpFile" | uniq -d)
# If there is no duplicate, uniq will have no output
# So, if $tmpOutput is not null, there is a duplicate
if [ -n "$tmpOutput" ]; then
# shellcheck disable=SC2086
labels=$(echo -n $tmpOutput | tr '\n' ' ')
failed "IS_DUPLICATE_FS_LABEL" "Duplicate labels: $labels"
fi
else
2019-08-30 14:23:30 +02:00
failed "IS_DUPLICATE_FS_LABEL" "blkid not found in ${PATH}"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_evolix_user() {
2021-07-07 15:20:24 +02:00
grep -q -E "^evolix:" /etc/passwd \
2019-08-30 14:23:30 +02:00
&& failed "IS_EVOLIX_USER" "evolix user should be deleted, used only for install"
2019-04-25 13:34:28 +02:00
}
check_evoacme_cron() {
if [ -f "/usr/local/sbin/evoacme" ]; then
# Old cron file, should be deleted
test -f /etc/cron.daily/certbot && failed "IS_EVOACME_CRON" "certbot cron is incompatible with evoacme"
# evoacme cron file should be present
test -f /etc/cron.daily/evoacme || failed "IS_EVOACME_CRON" "evoacme cron is missing"
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_evoacme_livelinks() {
EVOACME_BIN=$(command -v evoacme)
if [ -x "$EVOACME_BIN" ]; then
# Sometimes evoacme is installed but no certificates has been generated
numberOfLinks=$(find /etc/letsencrypt/ -type l | wc -l)
if [ "$numberOfLinks" -gt 0 ]; then
for live in /etc/letsencrypt/*/live; do
actualLink=$(readlink -f "$live")
actualVersion=$(basename "$actualLink")
certDir=$(dirname "$live")
certName=$(basename "$certDir")
# shellcheck disable=SC2012
lastCertDir=$(ls -ds "${certDir}"/[0-9]* | tail -1)
lastVersion=$(basename "$lastCertDir")
if [[ "$lastVersion" != "$actualVersion" ]]; then
failed "IS_EVOACME_LIVELINKS" "Certificate \`$certName' hasn't been updated"
test "${VERBOSE}" = 1 || break
fi
done
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_apache_confenabled() {
# Starting from Jessie and Apache 2.4, /etc/apache2/conf.d/
# must be replaced by conf-available/ and config files symlinked
# to conf-enabled/
2021-07-07 15:20:24 +02:00
if is_debian_jessie || is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-04-25 13:34:28 +02:00
if [ -f /etc/apache2/apache2.conf ]; then
2019-08-30 14:23:30 +02:00
test -d /etc/apache2/conf.d/ \
&& failed "IS_APACHE_CONFENABLED" "apache's conf.d directory must not exists"
grep -q 'Include conf.d' /etc/apache2/apache2.conf \
&& failed "IS_APACHE_CONFENABLED" "apache2.conf must not Include conf.d"
2019-04-25 13:34:28 +02:00
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_meltdown_spectre() {
# For Stretch, detection is easy as the kernel use
# /sys/devices/system/cpu/vulnerabilities/
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-04-25 13:34:28 +02:00
for vuln in meltdown spectre_v1 spectre_v2; do
test -f "/sys/devices/system/cpu/vulnerabilities/$vuln" \
2019-08-30 14:23:30 +02:00
|| failed "IS_MELTDOWN_SPECTRE" "vulnerable to $vuln"
test "${VERBOSE}" = 1 || break
2019-04-25 13:34:28 +02:00
done
# For Jessie this is quite complicated to verify and we need to use kernel config file
elif is_debian_jessie; then
if grep -q "BOOT_IMAGE=" /proc/cmdline; then
kernelPath=$(grep -Eo 'BOOT_IMAGE=[^ ]+' /proc/cmdline | cut -d= -f2)
kernelVer=${kernelPath##*/vmlinuz-}
kernelConfig="config-${kernelVer}"
# Sometimes autodetection of kernel config file fail, so we test if the file really exists.
if [ -f "/boot/${kernelConfig}" ]; then
grep -Eq '^CONFIG_PAGE_TABLE_ISOLATION=y' "/boot/$kernelConfig" \
2019-08-30 14:23:30 +02:00
|| failed "IS_MELTDOWN_SPECTRE" \
"PAGE_TABLE_ISOLATION must be enabled in kernel, outdated kernel?"
2019-04-25 13:34:28 +02:00
grep -Eq '^CONFIG_RETPOLINE=y' "/boot/$kernelConfig" \
2019-08-30 14:23:30 +02:00
|| failed "IS_MELTDOWN_SPECTRE" \
"RETPOLINE must be enabled in kernel, outdated kernel?"
2019-04-25 13:34:28 +02:00
fi
fi
2017-04-25 10:07:00 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_old_home_dir() {
homeDir=${homeDir:-/home}
for dir in "$homeDir"/*; do
statResult=$(stat -c "%n has owner %u resolved as %U" "$dir" \
| grep -Eve '.bak' -e '\.[0-9]{2}-[0-9]{2}-[0-9]{4}' \
| grep "UNKNOWN")
# There is at least one dir matching
if [[ -n "$statResult" ]]; then
failed "IS_OLD_HOME_DIR" "$statResult"
test "${VERBOSE}" = 1 || break
fi
done
}
check_tmp_1777() {
2019-04-16 10:46:44 +02:00
actual=$(stat --format "%a" /tmp)
expected="1777"
2019-08-30 14:23:30 +02:00
test "$expected" = "$actual" || failed "IS_TMP_1777" "/tmp must be $expected"
2019-04-25 13:34:28 +02:00
}
check_root_0700() {
2019-04-16 10:46:44 +02:00
actual=$(stat --format "%a" /root)
expected="700"
2019-08-30 14:23:30 +02:00
test "$expected" = "$actual" || failed "IS_ROOT_0700" "/root must be $expected"
2019-04-25 13:34:28 +02:00
}
check_usrsharescripts() {
2019-04-16 10:46:44 +02:00
actual=$(stat --format "%a" /usr/share/scripts)
expected="700"
2019-08-30 14:23:30 +02:00
test "$expected" = "$actual" || failed "IS_USRSHARESCRIPTS" "/usr/share/scripts must be $expected"
2019-04-25 13:34:28 +02:00
}
check_sshpermitrootno() {
2022-06-06 15:05:59 +02:00
sshd_args="-C addr=,user=,host=,laddr=,lport=0"
if is_debian_jessie || is_debian_stretch; then
2022-07-28 14:18:12 +02:00
# Noop, we'll use the default $sshd_args
2022-06-06 15:05:59 +02:00
:
elif is_debian_buster; then
2022-07-28 14:18:12 +02:00
sshd_args="${sshd_args},rdomain="
2019-04-16 10:46:44 +02:00
else
2022-07-28 14:18:12 +02:00
# NOTE: From Debian Bullseye 11 onward, with OpenSSH 8.1, the argument
2022-06-06 15:05:59 +02:00
# -T doesn't require the additional -C.
2022-07-28 14:18:12 +02:00
sshd_args=
2022-06-06 15:05:59 +02:00
fi
2022-07-28 13:38:33 +02:00
# shellcheck disable=SC2086
2022-07-28 14:18:12 +02:00
if ! (sshd -T ${sshd_args} 2> /dev/null | grep -qi 'permitrootlogin no'); then
failed "IS_SSHPERMITROOTNO" "PermitRoot should be set to no"
2019-04-16 10:46:44 +02:00
fi
2019-04-25 13:34:28 +02:00
}
check_evomaintenanceusers() {
2021-07-07 15:20:24 +02:00
if is_debian_stretch || is_debian_buster || is_debian_bullseye; then
2019-04-16 10:46:44 +02:00
users=$(getent group evolinux-sudo | cut -d':' -f4 | tr ',' ' ')
else
2017-12-27 16:44:54 +01:00
if [ -f /etc/sudoers.d/evolinux ]; then
sudoers="/etc/sudoers.d/evolinux"
else
sudoers="/etc/sudoers"
fi
2019-04-16 10:46:44 +02:00
# combine users from User_Alias and sudo group
users=$({ grep "^User_Alias *ADMIN" $sudoers | cut -d= -f2 | tr -d " "; grep "^sudo" /etc/group | cut -d: -f 4; } | tr "," "\n" | sort -u)
fi
for user in $users; do
user_home=$(getent passwd "$user" | cut -d: -f6)
if [ -n "$user_home" ] && [ -d "$user_home" ]; then
if ! grep -qs "^trap.*sudo.*evomaintenance.sh" "${user_home}"/.*profile; then
failed "IS_EVOMAINTENANCEUSERS" "${user} doesn't have an evomaintenance trap"
test "${VERBOSE}" = 1 || break
fi
fi
done
2019-04-25 13:34:28 +02:00
}
check_evomaintenanceconf() {
2017-04-25 10:07:00 +02:00
f=/etc/evomaintenance.cf
2019-04-16 10:46:44 +02:00
if [ -e "$f" ]; then
perms=$(stat -c "%a" $f)
test "$perms" = "600" || failed "IS_EVOMAINTENANCECONF" "Wrong permissions on \`$f' ($perms instead of 600)"
{ grep "^export PGPASSWORD" $f | grep -qv "your-passwd" \
&& grep "^PGDB" $f | grep -qv "your-db" \
&& grep "^PGTABLE" $f | grep -qv "your-table" \
&& grep "^PGHOST" $f | grep -qv "your-pg-host" \
&& grep "^FROM" $f | grep -qv "jdoe@example.com" \
&& grep "^FULLFROM" $f | grep -qv "John Doe <jdoe@example.com>" \
&& grep "^URGENCYFROM" $f | grep -qv "mama.doe@example.com" \
&& grep "^URGENCYTEL" $f | grep -qv "06.00.00.00.00" \
&& grep "^REALM" $f | grep -qv "example.com"
2019-04-16 10:46:44 +02:00
} || failed "IS_EVOMAINTENANCECONF" "evomaintenance is not correctly configured"
else
failed "IS_EVOMAINTENANCECONF" "Configuration file \`$f' is missing"
fi
2019-04-25 13:34:28 +02:00
}
check_privatekeyworldreadable() {
2019-04-16 10:46:44 +02:00
# a simple globbing fails if directory is empty
if [ -n "$(ls -A /etc/ssl/private/)" ]; then
for f in /etc/ssl/private/*; do
perms=$(stat -L -c "%a" "$f")
if [ "${perms: -1}" != 0 ]; then
failed "IS_PRIVKEYWOLRDREADABLE" "$f is world-readable"
test "${VERBOSE}" = 1 || break
fi
done
fi
2019-04-25 13:34:28 +02:00
}
check_evobackup_incs() {
if is_installed bkctld; then
bkctld_cron_file=${bkctld_cron_file:-/etc/cron.d/bkctld}
if [ -f "${bkctld_cron_file}" ]; then
2019-06-21 09:42:02 +02:00
root_crontab=$(grep -v "^#" "${bkctld_cron_file}")
2019-04-25 13:34:28 +02:00
echo "${root_crontab}" | grep -q "bkctld inc" || failed "IS_EVOBACKUP_INCS" "\`bkctld inc' is missing in ${bkctld_cron_file}"
2020-04-26 10:54:45 +02:00
echo "${root_crontab}" | grep -qE "(check-incs.sh|bkctld check-incs)" || failed "IS_EVOBACKUP_INCS" "\`check-incs.sh' is missing in ${bkctld_cron_file}"
2019-04-25 13:34:28 +02:00
else
failed "IS_EVOBACKUP_INCS" "Crontab \`${bkctld_cron_file}' is missing"
fi
fi
}
check_osprober() {
if is_installed os-prober qemu-kvm; then
2019-08-30 14:23:30 +02:00
failed "IS_OSPROBER" \
"Removal of os-prober package is recommended as it can cause serious issue on KVM server"
fi
}
check_jessie_backports() {
if is_debian_jessie; then
jessieBackports=$(grep -hs "jessie-backports" /etc/apt/sources.list /etc/apt/sources.list.d/*)
if test -n "$jessieBackports"; then
if ! grep -q "archive.debian.org" <<< "$jessieBackports"; then
failed "IS_JESSIE_BACKPORTS" "You must use deb http://archive.debian.org/debian/ jessie-backports main"
fi
fi
fi
}
check_apt_valid_until() {
aptvalidFile="/etc/apt/apt.conf.d/99no-check-valid-until"
aptvalidText="Acquire::Check-Valid-Until no;"
if grep -qs "archive.debian.org" /etc/apt/sources.list /etc/apt/sources.list.d/*; then
if ! grep -qs "$aptvalidText" /etc/apt/apt.conf.d/*; then
failed "IS_APT_VALID_UNTIL" \
"As you use archive.mirror.org you need ${aptvalidFile}: ${aptvalidText}"
fi
fi
}
2020-04-26 10:54:45 +02:00
check_chrooted_binary_uptodate() {
2020-04-15 18:01:55 +02:00
# list of processes to check
process_list="sshd"
for process_name in ${process_list}; do
# what is the binary path?
original_bin=$(command -v "${process_name}")
for pid in $(pgrep ${process_name}); do
2020-04-26 10:54:45 +02:00
process_bin=$(realpath "/proc/${pid}/exe")
2020-04-15 18:01:55 +02:00
# Is the process chrooted?
2020-04-26 10:54:45 +02:00
real_root=$(realpath "/proc/${pid}/root")
2020-04-15 18:01:55 +02:00
if [ "${real_root}" != "/" ]; then
chrooted_md5=$(md5sum "${process_bin}" | cut -f 1 -d ' ')
original_md5=$(md5sum "${original_bin}" | cut -f 1 -d ' ')
# compare md5 checksums
if [ "$original_md5" != "$chrooted_md5" ]; then
2020-04-26 10:54:45 +02:00
failed "IS_CHROOTED_BINARY_UPTODATE" "${process_bin} (${pid}) is different than ${original_bin}."
2020-04-15 18:01:55 +02:00
test "${VERBOSE}" = 1 || break
fi
fi
done
done
}
2020-04-26 10:54:45 +02:00
check_nginx_letsencrypt_uptodate() {
2020-04-28 16:00:45 +02:00
if [ -d /etc/nginx ]; then
snippets=$(find /etc/nginx -type f -name "letsencrypt.conf")
if [ -n "${snippets}" ]; then
while read -r snippet; do
if is_debian_jessie; then
if ! grep -qE "^\s*alias\s+/.+/\.well-known/acme-challenge" "${snippet}"; then
failed "IS_NGINX_LETSENCRYPT_UPTODATE" "Nginx snippet ${snippet} is not compatible with Nginx on Debian 8."
fi
else
if grep -qE "^\s*alias\s+/.+/\.well-known/acme-challenge" "${snippet}"; then
failed "IS_NGINX_LETSENCRYPT_UPTODATE" "Nginx snippet ${snippet} is not compatible with Nginx on Debian 9+."
fi
fi
done <<< "${snippets}"
2020-04-26 10:54:45 +02:00
fi
2020-04-28 16:00:45 +02:00
fi
2020-04-26 10:54:45 +02:00
}
2020-04-15 18:01:55 +02:00
2021-07-07 15:20:24 +02:00
check_lxc_container_resolv_conf() {
if is_installed lxc; then
container_list=$(lxc-ls)
current_resolvers=$(grep nameserver /etc/resolv.conf | sed 's/nameserver//g' )
for container in $container_list; do
if [ -f "/var/lib/lxc/${container}/rootfs/etc/resolv.conf" ]; then
while read -r resolver; do
if ! grep -qE "^nameserver\s+${resolver}" "/var/lib/lxc/${container}/rootfs/etc/resolv.conf"; then
failed "IS_LXC_CONTAINER_RESOLV_CONF" "resolv.conf miss-match beween host and container : missing nameserver ${resolver} in container ${container} resolv.conf"
fi
done <<< "${current_resolvers}"
else
failed "IS_LXC_CONTAINER_RESOLV_CONF" "resolv.conf missing in container ${container}"
fi
done
fi
}
2021-10-21 17:08:42 +02:00
download_versions() {
local file
file=${1:-}
## The file is supposed to list programs : each on a line, then its latest version number
## Examples:
# evoacme 21.06
# evomaintenance 0.6.4
if is_debian; then
versions_url="https://upgrades.evolix.org/versions-${DEBIAN_RELEASE}"
else
2022-04-25 09:58:07 +02:00
failed "IS_CHECK_VERSIONS" "error determining os release"
2021-10-21 17:08:42 +02:00
fi
# fetch timeout, in seconds
timeout=10
if command -v curl > /dev/null; then
curl --max-time ${timeout} --fail --silent --output "${versions_file}" "${versions_url}"
elif command -v wget > /dev/null; then
wget --timeout=${timeout} --quiet "${versions_url}" -O "${versions_file}"
elif command -v GET; then
GET -t ${timeout}s "${versions_url}" > "${versions_file}"
else
2022-04-25 09:58:07 +02:00
failed "IS_CHECK_VERSIONS" "failed to find curl, wget or GET"
2021-10-21 17:08:42 +02:00
fi
2022-04-25 09:58:07 +02:00
test "$?" -eq 0 || failed "IS_CHECK_VERSIONS" "failed to download ${versions_url} to ${versions_file}"
2021-10-21 17:08:42 +02:00
}
get_command() {
local program
program=${1:-}
case "${program}" in
## Special cases where the program name is different than the command name
evocheck) echo "${0}" ;;
evomaintenance) command -v "evomaintenance.sh" ;;
listupgrade) command -v "evolistupgrade.sh" ;;
old-kernel-autoremoval) command -v "old-kernel-autoremoval.sh" ;;
mysql-queries-killer) command -v "mysql-queries-killer.sh" ;;
2022-03-15 23:25:15 +01:00
minifirewall) echo "/etc/init.d/minifirewall" ;;
2021-10-21 17:08:42 +02:00
## General case, where the program name is the same as the command name
*) command -v "${program}" ;;
esac
}
get_version() {
local program
local command
program=${1:-}
command=${2:-}
case "${program}" in
## Special case if `command --version => 'command` is not the standard way to get the version
# my_command)
# /path/to/my_command --get-version
# ;;
2021-10-22 13:57:56 +02:00
add-vm)
grep '^VERSION=' "${command}" | head -1 | cut -d '=' -f 2
;;
2022-03-15 23:25:15 +01:00
minifirewall)
2022-05-12 15:47:37 +02:00
${command} version | head -1 | cut -d ' ' -f 3
2022-03-15 23:25:15 +01:00
;;
2021-10-22 13:43:43 +02:00
## Let's try the --version flag before falling back to grep for the constant
2021-10-22 13:57:56 +02:00
kvmstats)
2021-10-22 13:43:43 +02:00
if ${command} --version > /dev/null 2> /dev/null; then
${command} --version 2> /dev/null | head -1 | cut -d ' ' -f 3
else
grep '^VERSION=' "${command}" | head -1 | cut -d '=' -f 2
fi
2021-10-21 17:08:42 +02:00
;;
## General case to get the version
*) ${command} --version 2> /dev/null | head -1 | cut -d ' ' -f 3 ;;
esac
}
check_version() {
local program
local expected_version
program=${1:-}
expected_version=${2:-}
command=$(get_command "${program}")
if [ -n "${command}" ]; then
# shellcheck disable=SC2086
actual_version=$(get_version "${program}" "${command}")
# printf "program:%s expected:%s actual:%s\n" "${program}" "${expected_version}" "${actual_version}"
if [ -z "${actual_version}" ]; then
2022-04-25 09:58:07 +02:00
failed "IS_CHECK_VERSIONS" "failed to lookup actual version of ${program}"
2021-10-21 17:08:42 +02:00
elif dpkg --compare-versions "${actual_version}" lt "${expected_version}"; then
2022-04-25 09:58:07 +02:00
failed "IS_CHECK_VERSIONS" "${program} version ${actual_version} is older than expected version ${expected_version}"
2021-10-22 13:57:56 +02:00
elif dpkg --compare-versions "${actual_version}" gt "${expected_version}"; then
2022-04-25 09:58:07 +02:00
failed "IS_CHECK_VERSIONS" "${program} version ${actual_version} is newer than expected version ${expected_version}, you should update your index."
2021-10-21 17:08:42 +02:00
else
: # Version check OK
fi
fi
}
add_to_path() {
local new_path
new_path=${1:-}
echo "$PATH" | grep -qF "${new_path}" || export PATH="${PATH}:${new_path}"
}
check_versions() {
2022-04-25 10:33:33 +02:00
versions_file=$(mktemp --tmpdir="${TMPDIR:-/tmp}" "evocheck.versions.XXXXX")
2022-03-15 23:25:15 +01:00
files_to_cleanup="${files_to_cleanup} ${versions_file}"
2021-10-21 17:08:42 +02:00
download_versions "${versions_file}"
add_to_path "/usr/share/scripts"
grep -v '^ *#' < "${versions_file}" | while IFS= read -r line; do
local program
local version
program=$(echo "${line}" | cut -d ' ' -f 1)
version=$(echo "${line}" | cut -d ' ' -f 2)
if [ -n "${program}" ]; then
if [ -n "${version}" ]; then
check_version "${program}" "${version}"
else
2022-04-25 09:58:07 +02:00
failed "IS_CHECK_VERSIONS" "failed to lookup expected version for ${program}"
2021-10-21 17:08:42 +02:00
fi
fi
done
}
2021-07-07 15:20:24 +02:00
2019-04-25 13:34:28 +02:00
main() {
# Default return code : 0 = no error
RC=0
# Detect operating system name, version and release
detect_os
2022-04-25 10:33:33 +02:00
main_output_file=$(mktemp --tmpdir="${TMPDIR:-/tmp}" "evocheck.main.XXXXX")
2022-03-15 23:25:15 +01:00
files_to_cleanup="${files_to_cleanup} ${main_output_file}"
2022-09-14 10:55:00 +02:00
MINIFW_FILE=$(minifirewall_file)
2019-04-25 13:34:28 +02:00
test "${IS_TMP_1777:=1}" = 1 && check_tmp_1777
test "${IS_ROOT_0700:=1}" = 1 && check_root_0700
test "${IS_USRSHARESCRIPTS:=1}" = 1 && check_usrsharescripts
test "${IS_SSHPERMITROOTNO:=1}" = 1 && check_sshpermitrootno
test "${IS_EVOMAINTENANCEUSERS:=1}" = 1 && check_evomaintenanceusers
# Verification de la configuration d'evomaintenance
test "${IS_EVOMAINTENANCECONF:=1}" = 1 && check_evomaintenanceconf
test "${IS_PRIVKEYWOLRDREADABLE:=1}" = 1 && check_privatekeyworldreadable
2022-08-29 16:47:12 +02:00
test "${IS_LSBRELEASE:=1}" = 1 && check_lsbrelease
test "${IS_DPKGWARNING:=1}" = 1 && check_dpkgwarning
test "${IS_UMASKSUDOERS:=1}" = 1 && check_umasksudoers
test "${IS_NRPEPOSTFIX:=1}" = 1 && check_nrpepostfix
test "${IS_MODSECURITY:=1}" = 1 && check_modsecurity
test "${IS_CUSTOMSUDOERS:=1}" = 1 && check_customsudoers
test "${IS_VARTMPFS:=1}" = 1 && check_vartmpfs
test "${IS_SERVEURBASE:=1}" = 1 && check_serveurbase
test "${IS_LOGROTATECONF:=1}" = 1 && check_logrotateconf
test "${IS_SYSLOGCONF:=1}" = 1 && check_syslogconf
test "${IS_DEBIANSECURITY:=1}" = 1 && check_debiansecurity
test "${IS_APTITUDEONLY:=1}" = 1 && check_aptitudeonly
test "${IS_APTITUDE:=1}" = 1 && check_aptitude
test "${IS_APTGETBAK:=1}" = 1 && check_aptgetbak
test "${IS_APTICRON:=0}" = 1 && check_apticron
test "${IS_USRRO:=1}" = 1 && check_usrro
test "${IS_TMPNOEXEC:=1}" = 1 && check_tmpnoexec
test "${IS_MOUNT_FSTAB:=1}" = 1 && check_mountfstab
test "${IS_LISTCHANGESCONF:=1}" = 1 && check_listchangesconf
test "${IS_CUSTOMCRONTAB:=1}" = 1 && check_customcrontab
test "${IS_SSHALLOWUSERS:=1}" = 1 && check_sshallowusers
test "${IS_DISKPERF:=0}" = 1 && check_diskperf
test "${IS_TMOUTPROFILE:=1}" = 1 && check_tmoutprofile
test "${IS_ALERT5BOOT:=1}" = 1 && check_alert5boot
test "${IS_ALERT5MINIFW:=1}" = 1 && check_alert5minifw
test "${IS_ALERT5MINIFW:=1}" = 1 && test "${IS_MINIFW:=1}" = 1 && check_minifw
test "${IS_NRPEPERMS:=1}" = 1 && check_nrpeperms
test "${IS_MINIFWPERMS:=1}" = 1 && check_minifwperms
# Enable when minifirewall is released
test "${IS_MINIFWINCLUDES:=0}" = 1 && check_minifw_includes
test "${IS_NRPEDISKS:=0}" = 1 && check_nrpedisks
test "${IS_NRPEPID:=1}" = 1 && check_nrpepid
test "${IS_GRSECPROCS:=1}" = 1 && check_grsecprocs
test "${IS_APACHEMUNIN:=1}" = 1 && check_apachemunin
test "${IS_MYSQLUTILS:=1}" = 1 && check_mysqlutils
test "${IS_RAIDSOFT:=1}" = 1 && check_raidsoft
test "${IS_AWSTATSLOGFORMAT:=1}" = 1 && check_awstatslogformat
test "${IS_MUNINLOGROTATE:=1}" = 1 && check_muninlogrotate
test "${IS_SQUID:=1}" = 1 && check_squid
test "${IS_EVOMAINTENANCE_FW:=1}" = 1 && check_evomaintenance_fw
test "${IS_MODDEFLATE:=1}" = 1 && check_moddeflate
test "${IS_LOG2MAILRUNNING:=1}" = 1 && check_log2mailrunning
test "${IS_LOG2MAILAPACHE:=1}" = 1 && check_log2mailapache
test "${IS_LOG2MAILMYSQL:=1}" = 1 && check_log2mailmysql
test "${IS_LOG2MAILSQUID:=1}" = 1 && check_log2mailsquid
test "${IS_BINDCHROOT:=1}" = 1 && check_bindchroot
test "${IS_REPVOLATILE:=1}" = 1 && check_repvolatile
test "${IS_NETWORK_INTERFACES:=1}" = 1 && check_network_interfaces
test "${IS_AUTOIF:=1}" = 1 && check_autoif
test "${IS_INTERFACESGW:=1}" = 1 && check_interfacesgw
test "${IS_NETWORKING_SERVICE:=1}" = 1 && check_networking_service
test "${IS_EVOBACKUP:=1}" = 1 && check_evobackup
test "${IS_EVOBACKUP_EXCLUDE_MOUNT:=1}" = 1 && check_evobackup_exclude_mount
test "${IS_USERLOGROTATE:=1}" = 1 && check_userlogrotate
test "${IS_APACHECTL:=1}" = 1 && check_apachectl
test "${IS_APACHESYMLINK:=1}" = 1 && check_apachesymlink
test "${IS_APACHEIPINALLOW:=1}" = 1 && check_apacheipinallow
test "${IS_MUNINAPACHECONF:=1}" = 1 && check_muninapacheconf
test "${IS_SAMBAPINPRIORITY:=1}" = 1 && check_sambainpriority
test "${IS_KERNELUPTODATE:=1}" = 1 && check_kerneluptodate
test "${IS_UPTIME:=1}" = 1 && check_uptime
test "${IS_MUNINRUNNING:=1}" = 1 && check_muninrunning
test "${IS_BACKUPUPTODATE:=1}" = 1 && check_backupuptodate
test "${IS_ETCGIT:=1}" = 1 && check_etcgit
test "${IS_GITPERMS:=1}" = 1 && check_gitperms
test "${IS_NOTUPGRADED:=1}" = 1 && check_notupgraded
test "${IS_TUNE2FS_M5:=1}" = 1 && check_tune2fs_m5
test "${IS_EVOLINUXSUDOGROUP:=1}" = 1 && check_evolinuxsudogroup
test "${IS_USERINADMGROUP:=1}" = 1 && check_userinadmgroup
test "${IS_APACHE2EVOLINUXCONF:=1}" = 1 && check_apache2evolinuxconf
test "${IS_BACKPORTSCONF:=1}" = 1 && check_backportsconf
test "${IS_BIND9MUNIN:=1}" = 1 && check_bind9munin
test "${IS_BIND9LOGROTATE:=1}" = 1 && check_bind9logrotate
test "${IS_BROADCOMFIRMWARE:=1}" = 1 && check_broadcomfirmware
test "${IS_HARDWARERAIDTOOL:=1}" = 1 && check_hardwareraidtool
test "${IS_LOG2MAILSYSTEMDUNIT:=1}" = 1 && check_log2mailsystemdunit
test "${IS_LISTUPGRADE:=1}" = 1 && check_listupgrade
test "${IS_MARIADBEVOLINUXCONF:=0}" = 1 && check_mariadbevolinuxconf
test "${IS_SQL_BACKUP:=1}" = 1 && check_sql_backup
test "${IS_POSTGRES_BACKUP:=1}" = 1 && check_postgres_backup
test "${IS_MONGO_BACKUP:=1}" = 1 && check_mongo_backup
test "${IS_LDAP_BACKUP:=1}" = 1 && check_ldap_backup
test "${IS_REDIS_BACKUP:=1}" = 1 && check_redis_backup
test "${IS_ELASTIC_BACKUP:=1}" = 1 && check_elastic_backup
test "${IS_MARIADBSYSTEMDUNIT:=1}" = 1 && check_mariadbsystemdunit
test "${IS_MYSQLMUNIN:=1}" = 1 && check_mysqlmunin
test "${IS_MYSQLNRPE:=1}" = 1 && check_mysqlnrpe
test "${IS_PHPEVOLINUXCONF:=0}" = 1 && check_phpevolinuxconf
test "${IS_SQUIDLOGROTATE:=1}" = 1 && check_squidlogrotate
test "${IS_SQUIDEVOLINUXCONF:=1}" = 1 && check_squidevolinuxconf
test "${IS_DUPLICATE_FS_LABEL:=1}" = 1 && check_duplicate_fs_label
test "${IS_EVOLIX_USER:=1}" = 1 && check_evolix_user
test "${IS_EVOACME_CRON:=1}" = 1 && check_evoacme_cron
test "${IS_EVOACME_LIVELINKS:=1}" = 1 && check_evoacme_livelinks
test "${IS_APACHE_CONFENABLED:=1}" = 1 && check_apache_confenabled
test "${IS_MELTDOWN_SPECTRE:=1}" = 1 && check_meltdown_spectre
test "${IS_OLD_HOME_DIR:=0}" = 1 && check_old_home_dir
test "${IS_EVOBACKUP_INCS:=1}" = 1 && check_evobackup_incs
test "${IS_OSPROBER:=1}" = 1 && check_osprober
test "${IS_JESSIE_BACKPORTS:=1}" = 1 && check_jessie_backports
test "${IS_APT_VALID_UNTIL:=1}" = 1 && check_apt_valid_until
test "${IS_CHROOTED_BINARY_UPTODATE:=1}" = 1 && check_chrooted_binary_uptodate
test "${IS_NGINX_LETSENCRYPT_UPTODATE:=1}" = 1 && check_nginx_letsencrypt_uptodate
test "${IS_LXC_CONTAINER_RESOLV_CONF:=1}" = 1 && check_lxc_container_resolv_conf
test "${IS_CHECK_VERSIONS:=1}" = 1 && check_versions
2019-04-25 13:34:28 +02:00
2022-03-15 23:25:15 +01:00
if [ -f "${main_output_file}" ]; then
2022-04-25 10:33:33 +02:00
lines_found=$(wc -l < "${main_output_file}")
# shellcheck disable=SC2086
if [ ${lines_found} -gt 0 ]; then
2022-03-15 23:25:15 +01:00
cat "${main_output_file}" 2>&1
fi
fi
2019-04-25 13:34:28 +02:00
exit ${RC}
}
2022-03-15 23:25:15 +01:00
cleanup_temp_files() {
# shellcheck disable=SC2086
rm -f ${files_to_cleanup}
}
2019-04-25 13:34:28 +02:00
2021-07-07 15:20:24 +02:00
PROGNAME=$(basename "$0")
2020-04-26 10:54:45 +02:00
# shellcheck disable=SC2034
2021-07-07 15:20:24 +02:00
readonly PROGNAME
# shellcheck disable=SC2124
ARGS=$@
readonly ARGS
2019-04-25 13:34:28 +02:00
# Disable LANG*
export LANG=C
export LANGUAGE=C
2022-03-15 23:25:15 +01:00
files_to_cleanup=""
# shellcheck disable=SC2064
trap cleanup_temp_files 0
2019-04-25 13:34:28 +02:00
# Source configuration file
# shellcheck disable=SC1091
test -f /etc/evocheck.cf && . /etc/evocheck.cf
# Parse options
# based on https://gist.github.com/deshion/10d3cb5f88a21671e17a
while :; do
case $1 in
-h|-\?|--help)
show_help
exit 0
;;
--version)
show_version
exit 0
;;
--cron)
IS_KERNELUPTODATE=0
IS_UPTIME=0
2019-11-05 16:20:07 +01:00
IS_MELTDOWN_SPECTRE=0
2021-10-25 10:02:12 +02:00
IS_CHECK_VERSIONS=0
2022-07-28 13:38:33 +02:00
IS_NETWORKING_SERVICE=0
2019-04-25 13:34:28 +02:00
;;
-v|--verbose)
VERBOSE=1
;;
-q|--quiet)
QUIET=1
VERBOSE=0
;;
--)
# End of all options.
shift
break
;;
-?*|[[:alnum:]]*)
# ignore unknown options
if [ "${QUIET}" != 1 ]; then
printf 'WARN: Unknown option (ignored): %s\n' "$1" >&2
fi
;;
*)
# Default case: If no more options then break out of the loop.
break
;;
esac
shift
done
2019-04-16 10:46:44 +02:00
2019-06-21 09:42:02 +02:00
# shellcheck disable=SC2086
2019-04-25 13:34:28 +02:00
main ${ARGS}