freedombone-restore-remote 23KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659
  1. #!/bin/bash
  2. #
  3. # .---. . .
  4. # | | |
  5. # |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
  6. # | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
  7. # ' ' --' --' -' - -' ' ' -' -' -' ' - --'
  8. #
  9. # Freedom in the Cloud
  10. #
  11. # Restore from a given remote server
  12. # License
  13. # =======
  14. #
  15. # Copyright (C) 2015-2016 Bob Mottram <bob@robotics.uk.to>
  16. #
  17. # This program is free software: you can redistribute it and/or modify
  18. # it under the terms of the GNU Affero General Public License as published by
  19. # the Free Software Foundation, either version 3 of the License, or
  20. # (at your option) any later version.
  21. #
  22. # This program is distributed in the hope that it will be useful,
  23. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  24. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  25. # GNU Affero General Public License for more details.
  26. #
  27. # You should have received a copy of the GNU Affero General Public License
  28. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  29. PROJECT_NAME='freedombone'
  30. COMPLETION_FILE=$HOME/${PROJECT_NAME}-completed.txt
  31. CONFIGURATION_FILE=$HOME/${PROJECT_NAME}.cfg
  32. BACKUP_EXTRA_DIRECTORIES=/root/backup-extra-dirs.csv
  33. export TEXTDOMAIN=${PROJECT_NAME}-restore-remote
  34. export TEXTDOMAINDIR="/usr/share/locale"
  35. source /usr/share/${PROJECT_NAME}/utils/${PROJECT_NAME}-utils-validation
  36. SERVER_NAME=$1
  37. # whether to restore everything or just a specific application
  38. RESTORE_APP='all'
  39. if [ ${2} ]; then
  40. RESTORE_APP=${2}
  41. fi
  42. ADMIN_USERNAME=$(cat $COMPLETION_FILE | grep "Admin user" | -nawk -F ':' '{print $2}')
  43. ADMIN_EMAIL_ADDRESS=${ADMIN_USERNAME}@${HOSTNAME}
  44. # Temporary location for data to be backed up to other servers
  45. SERVER_DIRECTORY=/root/remoterestore
  46. BACKUP_LIST=/home/${ADMIN_USERNAME}/backup.list
  47. if [ ! $SERVER_NAME ]; then
  48. echo $'restorefromfriend [server]'
  49. exit 1
  50. fi
  51. if [ ! -f $BACKUP_LIST ]; then
  52. echo $"No friends list found at $BACKUP_LIST"
  53. exit 2
  54. fi
  55. if ! grep -q "$SERVER_NAME" $BACKUP_LIST; then
  56. echo $"Server not found within the friends list"
  57. exit 3
  58. fi
  59. REMOTE_SERVER=$(grep -i "$SERVER_NAME" $BACKUP_LIST | awk -F ' ' '{print $1}')
  60. REMOTE_SSH_PORT=$(grep -i "$SERVER_NAME" $BACKUP_LIST | awk -F ' ' '{print $2}')
  61. REMOTE_DIRECTORY=$(grep -i "$SERVER_NAME" $BACKUP_LIST | awk -F ' ' '{print $3}')
  62. REMOTE_PASSWORD=$(grep -i "$SERVER_NAME" $BACKUP_LIST | awk -F ' ' '{print $4}')
  63. REMOTE_SERVER=$REMOTE_SERVER:$REMOTE_DIRECTORY
  64. NOW=$(date +"%Y-%m-%d %H:%M:%S")
  65. echo "$NOW Starting restore from $REMOTE_SERVER" >> /var/log/remotebackups.log
  66. rsync -ratlzv --rsh="/usr/bin/sshpass -p $REMOTE_PASSWORD ssh -p $REMOTE_SSH_PORT -o StrictHostKeyChecking=no" $REMOTE_SERVER/backup $SERVER_DIRECTORY
  67. if [ ! "$?" = "0" ]; then
  68. echo "$NOW Restore from $REMOTE_SERVER failed" >> /var/log/remotebackups.log
  69. # Send a warning email
  70. echo "Restore from $REMOTE_SERVER failed" | mail -s "${PROJECT_NAME} restore from friend" $ADMIN_EMAIL_ADDRESS
  71. exit 790
  72. else
  73. echo "$NOW Restored encrypted data from $REMOTE_SERVER" >> /var/log/remotebackups.log
  74. fi
  75. # MariaDB password
  76. DATABASE_PASSWORD=$(cat /root/dbpass)
  77. function restore_directory_from_friend {
  78. if [ ! -d ${1} ]; then
  79. mkdir ${1}
  80. fi
  81. obnam restore -r $SERVER_DIRECTORY/backup/${2} --to ${1}
  82. }
  83. function copy_gpg_keys {
  84. echo $"Copying GPG keys from admin user to root"
  85. cp -r /home/$ADMIN_USERNAME/.gnupg /root
  86. }
  87. function restore_configuration {
  88. if [[ $RESTORE_APP != 'all' ]]; then
  89. if [[ $RESTORE_APP != 'configuration' ]]; then
  90. return
  91. fi
  92. fi
  93. if [ -d $SERVER_DIRECTORY/backup/config ]; then
  94. echo $"Restoring configuration files"
  95. temp_restore_dir=/root/tempconfig
  96. restore_directory_from_friend $temp_restore_dir config
  97. cp -f $temp_restore_dir/root/${PROJECT_NAME}.cfg $CONFIGURATION_FILE
  98. if [ ! "$?" = "0" ]; then
  99. unmount_drive
  100. rm -rf $temp_restore_dir
  101. exit 5372
  102. fi
  103. if [ -f $CONFIGURATION_FILE ]; then
  104. # install according to the config file
  105. freedombone -c $CONFIGURATION_FILE
  106. fi
  107. cp -f $temp_restore_dir/root/${PROJECT_NAME}-completed.txt $COMPLETION_FILE
  108. if [ ! "$?" = "0" ]; then
  109. unmount_drive
  110. rm -rf $temp_restore_dir
  111. exit 7252
  112. fi
  113. if [ -f ${temp_restore_dir}${BACKUP_EXTRA_DIRECTORIES} ]; then
  114. cp -f ${temp_restore_dir}${BACKUP_EXTRA_DIRECTORIES} ${BACKUP_EXTRA_DIRECTORIES}
  115. if [ ! "$?" = "0" ]; then
  116. unmount_drive
  117. rm -rf $temp_restore_dir
  118. exit 62121
  119. fi
  120. fi
  121. # restore nginx password hashes
  122. if [ -f $temp_restore_dir/root/htpasswd ]; then
  123. cp -f $temp_restore_dir/root/htpasswd /etc/nginx/.htpasswd
  124. fi
  125. rm -rf $temp_restore_dir
  126. fi
  127. }
  128. function restore_mariadb {
  129. if [[ $RESTORE_APP != 'all' ]]; then
  130. if [[ $RESTORE_APP != 'mariadb' ]]; then
  131. return
  132. fi
  133. fi
  134. if [ -d $SERVER_DIRECTORY/backup/mariadb ]; then
  135. echo $"Restoring MariaDB settings"
  136. temp_restore_dir=/root/tempmariadb
  137. restore_directory_from_friend $temp_restore_dir mariadb
  138. echo $"Get the MariaDB password from the backup"
  139. if [ ! -f ${temp_restore_dir}${temp_restore_dir}/db ]; then
  140. echo $"MariaDB password file not found"
  141. exit 495
  142. fi
  143. BACKUP_MARIADB_PASSWORD=$(cat ${temp_restore_dir}${temp_restore_dir}/db)
  144. if [[ "$BACKUP_MARIADB_PASSWORD" != "$DATABASE_PASSWORD" ]]; then
  145. echo $"Restore the MariaDB user table"
  146. mysqlsuccess=$(mysql -u root --password="$DATABASE_PASSWORD" mysql -o < ${temp_restore_dir}${temp_restore_dir}/mysql.sql)
  147. if [ ! "$?" = "0" ]; then
  148. echo $"Try again using the password obtained from backup"
  149. mysqlsuccess=$(mysql -u root --password="$BACKUP_MARIADB_PASSWORD" mysql -o < ${temp_restore_dir}${temp_restore_dir}/mysql.sql)
  150. fi
  151. if [ ! "$?" = "0" ]; then
  152. echo "$mysqlsuccess"
  153. exit 962
  154. fi
  155. echo $"Restarting database"
  156. service mysql restart
  157. echo $"Change the MariaDB password to the backup version"
  158. DATABASE_PASSWORD=$BACKUP_MARIADB_PASSWORD
  159. fi
  160. shred -zu ${temp_restore_dir}${temp_restore_dir}/db
  161. rm -rf ${temp_restore_dir}
  162. # Change database password file
  163. echo "$DATABASE_PASSWORD" > /root/dbpass
  164. chmod 600 /root/dbpass
  165. fi
  166. }
  167. function restore_letsencrypt {
  168. if [[ $RESTORE_APP != 'all' ]]; then
  169. if [[ $RESTORE_APP != 'letsencrypt' ]]; then
  170. return
  171. fi
  172. fi
  173. if [ -d $SERVER_DIRECTORY/backup/letsencrypt ]; then
  174. echo $"Restoring Lets Encrypt settings"
  175. restore_directory_from_friend / letsencrypt
  176. fi
  177. }
  178. function restore_tor {
  179. if [[ $RESTORE_APP != 'all' ]]; then
  180. if [[ $RESTORE_APP != 'tor' ]]; then
  181. return
  182. fi
  183. fi
  184. if [ -d $SERVER_DIRECTORY/backup/tor ]; then
  185. echo $"Restoring Tor settings"
  186. restore_directory_from_friend / tor
  187. fi
  188. }
  189. function restore_mutt_settings {
  190. if [[ $RESTORE_APP != 'all' ]]; then
  191. if [[ $RESTORE_APP != 'mutt' ]]; then
  192. return
  193. fi
  194. fi
  195. for d in $SERVER_DIRECTORY/backup/mutt/*/ ; do
  196. USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
  197. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  198. if [ -d $SERVER_DIRECTORY/backup/mutt/$USERNAME ]; then
  199. if [ ! -d /home/$USERNAME ]; then
  200. ${PROJECT_NAME}-adduser $USERNAME
  201. fi
  202. echo $"Restoring Mutt settings for $USERNAME"
  203. temp_restore_dir=/root/tempmutt
  204. restore_directory_from_friend ${temp_restore_dir} mutt/$USERNAME
  205. if [ -f ${temp_restore_dir}/home/$USERNAME/tempbackup/.muttrc ]; then
  206. cp -f ${temp_restore_dir}/home/$USERNAME/tempbackup/.muttrc /home/$USERNAME/.muttrc
  207. fi
  208. if [ -f ${temp_restore_dir}/home/$USERNAME/tempbackup/Muttrc ]; then
  209. cp -f ${temp_restore_dir}/home/$USERNAME/tempbackup/Muttrc /etc/Muttrc
  210. fi
  211. if [ ! "$?" = "0" ]; then
  212. rm -rf ${temp_restore_dir}
  213. exit 276
  214. fi
  215. rm -rf ${temp_restore_dir}
  216. fi
  217. fi
  218. done
  219. }
  220. function restore_gpg {
  221. if [[ $RESTORE_APP != 'all' ]]; then
  222. if [[ $RESTORE_APP != 'gpg' ]]; then
  223. return
  224. fi
  225. fi
  226. for d in $SERVER_DIRECTORY/backup/gnupg/*/ ; do
  227. USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
  228. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  229. if [ -d $SERVER_DIRECTORY/backup/gnupg/$USERNAME ]; then
  230. if [ ! -d /home/$USERNAME ]; then
  231. ${PROJECT_NAME}-adduser $USERNAME
  232. fi
  233. echo $"Restoring gnupg settings for $USERNAME"
  234. temp_restore_dir=/root/tempgnupg
  235. restore_directory_from_friend ${temp_restore_dir} gnupg/$USERNAME
  236. cp -r ${temp_restore_dir}/home/$USERNAME/.gnupg /home/$USERNAME/
  237. if [ ! "$?" = "0" ]; then
  238. rm -rf ${temp_restore_dir}
  239. exit 276
  240. fi
  241. rm -rf ${temp_restore_dir}
  242. if [[ "$USERNAME" == "$ADMIN_USERNAME" ]]; then
  243. cp -r /home/$USERNAME/.gnupg /root
  244. if [ ! "$?" = "0" ]; then
  245. exit 283
  246. fi
  247. fi
  248. fi
  249. fi
  250. done
  251. }
  252. function restore_procmail {
  253. if [[ $RESTORE_APP != 'all' ]]; then
  254. if [[ $RESTORE_APP != 'procmail' ]]; then
  255. return
  256. fi
  257. fi
  258. for d in $SERVER_DIRECTORY/backup/procmail/*/ ; do
  259. USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
  260. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  261. if [ -d $SERVER_DIRECTORY/backup/procmail/$USERNAME ]; then
  262. if [ ! -d /home/$USERNAME ]; then
  263. ${PROJECT_NAME}-adduser $USERNAME
  264. fi
  265. echo $"Restoring procmail settings for $USERNAME"
  266. temp_restore_dir=/root/tempprocmail
  267. restore_directory_from_friend ${temp_restore_dir} procmail/$USERNAME
  268. cp -f ${temp_restore_dir}/home/$USERNAME/tempbackup/.procmailrc /home/$USERNAME/
  269. if [ ! "$?" = "0" ]; then
  270. rm -rf ${temp_restore_dir}
  271. exit 276
  272. fi
  273. rm -rf ${temp_restore_dir}
  274. fi
  275. fi
  276. done
  277. }
  278. function restore_spamassassin {
  279. if [[ $RESTORE_APP != 'all' ]]; then
  280. if [[ $RESTORE_APP != 'spamassassin' ]]; then
  281. return
  282. fi
  283. fi
  284. for d in $SERVER_DIRECTORY/backup/spamassassin/*/ ; do
  285. USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
  286. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  287. if [ -d $SERVER_DIRECTORY/backup/spamassassin/$USERNAME ]; then
  288. if [ ! -d /home/$USERNAME ]; then
  289. ${PROJECT_NAME}-adduser $USERNAME
  290. fi
  291. echo $"Restoring spamassassin settings for $USERNAME"
  292. temp_restore_dir=/root/tempspamassassin
  293. restore_directory_from_friend $temp_restore_dir spamassassin/$USERNAME
  294. cp -rf $temp_restore_dir/home/$USERNAME/.spamassassin /home/$USERNAME/
  295. if [ ! "$?" = "0" ]; then
  296. rm -rf $temp_restore_dir
  297. exit 276
  298. fi
  299. rm -rf $temp_restore_dir
  300. fi
  301. fi
  302. done
  303. }
  304. function restore_admin_readme {
  305. if [[ $RESTORE_APP != 'all' ]]; then
  306. if [[ $RESTORE_APP != 'readme' ]]; then
  307. return
  308. fi
  309. fi
  310. if [ -d $SERVER_DIRECTORY/backup/readme ]; then
  311. echo $"Restoring README"
  312. temp_restore_dir=/root/tempreadme
  313. restore_directory_from_friend $temp_restore_dir readme
  314. cp -f $temp_restore_dir/home/$ADMIN_USERNAME/tempbackup/README /home/$ADMIN_USERNAME/
  315. if [ ! "$?" = "0" ]; then
  316. rm -rf $temp_restore_dir
  317. exit 276
  318. fi
  319. rm -rf $temp_restore_dir
  320. fi
  321. }
  322. function restore_ssh_keys {
  323. if [[ $RESTORE_APP != 'all' ]]; then
  324. if [[ $RESTORE_APP != 'ssh' ]]; then
  325. return
  326. fi
  327. fi
  328. for d in $SERVER_DIRECTORY/backup/ssh/*/ ; do
  329. USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
  330. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  331. if [ -d $SERVER_DIRECTORY/backup/ssh/$USERNAME ]; then
  332. if [ ! -d /home/$USERNAME ]; then
  333. ${PROJECT_NAME}-adduser $USERNAME
  334. fi
  335. echo $"Restoring ssh keys for $USERNAME"
  336. temp_restore_dir=/root/tempssh
  337. restore_directory_from_friend $temp_restore_dir ssh/$USERNAME
  338. cp -r $temp_restore_dir/home/$USERNAME/.ssh /home/$USERNAME/
  339. if [ ! "$?" = "0" ]; then
  340. rm -rf $temp_restore_dir
  341. exit 664
  342. fi
  343. rm -rf $temp_restore_dir
  344. fi
  345. fi
  346. done
  347. }
  348. function restore_user_config {
  349. if [[ $RESTORE_APP != 'all' ]]; then
  350. if [[ $RESTORE_APP != 'userconfig' ]]; then
  351. return
  352. fi
  353. fi
  354. for d in $SERVER_DIRECTORY/backup/config/*/ ; do
  355. USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
  356. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  357. if [ -d $SERVER_DIRECTORY/backup/config/$USERNAME ]; then
  358. if [ ! -d /home/$USERNAME ]; then
  359. ${PROJECT_NAME}-adduser $USERNAME
  360. fi
  361. echo $"Restoring config files for $USERNAME"
  362. temp_restore_dir=/root/tempconfig
  363. restore_directory_from_friend $temp_restore_dir config/$USERNAME
  364. cp -r $temp_restore_dir/home/$USERNAME/.config /home/$USERNAME/
  365. if [ ! "$?" = "0" ]; then
  366. rm -rf $temp_restore_dir
  367. exit 664
  368. fi
  369. rm -rf $temp_restore_dir
  370. fi
  371. fi
  372. done
  373. }
  374. function gpg_pubkey_from_email {
  375. key_owner_username=$1
  376. key_email_address=$2
  377. key_id=
  378. if [[ $key_owner_username != "root" ]]; then
  379. key_id=$(su -c "gpg --list-keys $key_email_address | grep 'pub '" - $key_owner_username | awk -F ' ' '{print $2}' | awk -F '/' '{print $2}')
  380. else
  381. key_id=$(gpg --list-keys $key_email_address | grep 'pub ' | awk -F ' ' '{print $2}' | awk -F '/' '{print $2}')
  382. fi
  383. echo $key_id
  384. }
  385. function restore_user_monkeysphere {
  386. if [[ $RESTORE_APP != 'all' ]]; then
  387. if [[ $RESTORE_APP != 'usermonkeysphere' ]]; then
  388. return
  389. fi
  390. fi
  391. for d in $SERVER_DIRECTORY/backup/monkeysphere/*/ ; do
  392. USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
  393. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  394. if [ -d $SERVER_DIRECTORY/backup/monkeysphere/$USERNAME ]; then
  395. if [ ! -d /home/$USERNAME ]; then
  396. ${PROJECT_NAME}-adduser $USERNAME
  397. fi
  398. echo $"Restoring monkeysphere ids for $USERNAME"
  399. temp_restore_dir=/root/tempmonkeysphere
  400. restore_directory_from_friend $temp_restore_dir monkeysphere/$USERNAME
  401. cp -r $temp_restore_dir/home/$USERNAME/.monkeysphere /home/$USERNAME/
  402. if [ ! "$?" = "0" ]; then
  403. rm -rf $temp_restore_dir
  404. exit 664
  405. fi
  406. rm -rf $temp_restore_dir
  407. fi
  408. fi
  409. # The admin user is the identity certifier
  410. MY_EMAIL_ADDRESS="${ADMIN_USERNAME}@${HOSTNAME}"
  411. read_config_param MY_EMAIL_ADDRESS
  412. MY_GPG_PUBLIC_KEY_ID=$(gpg_pubkey_from_email "$ADMIN_USERNAME" "$MY_EMAIL_ADDRESS")
  413. fpr=$(gpg --with-colons --fingerprint $MY_GPG_PUBLIC_KEY_ID | grep fpr | head -n 1 | awk -F ':' '{print $10}')
  414. monkeysphere-authentication add-identity-certifier $fpr
  415. monkeysphere-authentication update-users
  416. done
  417. }
  418. function restore_user_fin {
  419. if [[ $RESTORE_APP != 'all' ]]; then
  420. if [[ $RESTORE_APP != 'userfin' ]]; then
  421. return
  422. fi
  423. fi
  424. for d in $SERVER_DIRECTORY/backup/fin/*/ ; do
  425. USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
  426. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  427. if [ -d $SERVER_DIRECTORY/backup/fin/$USERNAME ]; then
  428. if [ ! -d /home/$USERNAME ]; then
  429. ${PROJECT_NAME}-adduser $USERNAME
  430. fi
  431. echo $"Restoring fin files for $USERNAME"
  432. temp_restore_dir=/root/tempfin
  433. restore_directory_from_friend $temp_restore_dir fin/$USERNAME
  434. cp -r $temp_restore_dir/home/$USERNAME/.fin /home/$USERNAME/
  435. if [ ! "$?" = "0" ]; then
  436. rm -rf $temp_restore_dir
  437. exit 664
  438. fi
  439. rm -rf $temp_restore_dir
  440. fi
  441. fi
  442. done
  443. }
  444. function restore_user_local {
  445. if [[ $RESTORE_APP != 'all' ]]; then
  446. if [[ $RESTORE_APP != 'userlocal' ]]; then
  447. return
  448. fi
  449. fi
  450. for d in $SERVER_DIRECTORY/backup/local/*/ ; do
  451. USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
  452. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  453. if [ -d $SERVER_DIRECTORY/backup/local/$USERNAME ]; then
  454. if [ ! -d /home/$USERNAME ]; then
  455. ${PROJECT_NAME}-adduser $USERNAME
  456. fi
  457. echo $"Restoring local files for $USERNAME"
  458. temp_restore_dir=/root/templocal
  459. restore_directory_from_friend $temp_restore_dir local/$USERNAME
  460. cp -r $temp_restore_dir/home/$USERNAME/.local /home/$USERNAME/
  461. if [ ! "$?" = "0" ]; then
  462. rm -rf $temp_restore_dir
  463. exit 664
  464. fi
  465. rm -rf $temp_restore_dir
  466. fi
  467. fi
  468. done
  469. }
  470. function restore_certs {
  471. if [[ $RESTORE_APP != 'all' ]]; then
  472. if [[ $RESTORE_APP != 'certs' ]]; then
  473. return
  474. fi
  475. fi
  476. if [ -d $SERVER_DIRECTORY/backup/ssl ]; then
  477. echo $"Restoring certificates"
  478. restore_directory_from_friend /root/tempssl ssl
  479. cp -r /root/tempssl/etc/ssl/* /etc/ssl
  480. if [ ! "$?" = "0" ]; then
  481. exit 276
  482. fi
  483. rm -rf /root/tempssl
  484. # restore ownership
  485. if [ -f /etc/ssl/private/xmpp.key ]; then
  486. chown prosody:prosody /etc/ssl/private/xmpp.key
  487. chown prosody:prosody /etc/ssl/certs/xmpp.*
  488. fi
  489. if [ -d /etc/dovecot ]; then
  490. chown root:dovecot /etc/ssl/private/dovecot.*
  491. chown root:dovecot /etc/ssl/certs/dovecot.*
  492. fi
  493. if [ -f /etc/ssl/private/exim.key ]; then
  494. cp /etc/ssl/private/exim.key /etc/exim4
  495. cp /etc/ssl/certs/exim.crt /etc/exim4
  496. cp /etc/ssl/certs/exim.dhparam /etc/exim4
  497. chown root:Debian-exim /etc/exim4/exim.key /etc/exim4/exim.crt /etc/exim4/exim.dhparam
  498. chmod 640 /etc/exim4/exim.key /etc/exim4/exim.crt /etc/exim4/exim.dhparam
  499. fi
  500. if [ -f /etc/ssl/private/mumble.key ]; then
  501. if [ -d /var/lib/mumble-server ]; then
  502. cp /etc/ssl/certs/mumble.* /var/lib/mumble-server
  503. cp /etc/ssl/private/mumble.key /var/lib/mumble-server
  504. chown -R mumble-server:mumble-server /var/lib/mumble-server
  505. fi
  506. fi
  507. fi
  508. }
  509. function restore_personal_settings {
  510. if [[ $RESTORE_APP != 'all' ]]; then
  511. if [[ $RESTORE_APP != 'personal' ]]; then
  512. return
  513. fi
  514. fi
  515. for d in $SERVER_DIRECTORY/backup/personal/*/ ; do
  516. USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
  517. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  518. if [ -d $SERVER_DIRECTORY/backup/personal/$USERNAME ]; then
  519. if [ ! -d /home/$USERNAME ]; then
  520. ${PROJECT_NAME}-adduser $USERNAME
  521. fi
  522. echo $"Restoring personal settings for $USERNAME"
  523. temp_restore_dir=/root/temppersonal
  524. restore_directory_from_friend $temp_restore_dir personal/$USERNAME
  525. if [ -d /home/$USERNAME/personal ]; then
  526. rm -rf /home/$USERNAME/personal
  527. fi
  528. mv $temp_restore_dir/home/$USERNAME/personal /home/$USERNAME
  529. if [ ! "$?" = "0" ]; then
  530. exit 184
  531. fi
  532. rm -rf $temp_restore_dir
  533. fi
  534. fi
  535. done
  536. }
  537. function restore_mailing_list {
  538. if [[ $RESTORE_APP != 'all' ]]; then
  539. if [[ $RESTORE_APP != 'mailinglist' ]]; then
  540. return
  541. fi
  542. fi
  543. if [ -d /var/spool/mlmmj ]; then
  544. echo $"Restoring public mailing list"
  545. temp_restore_dir=/root/tempmailinglist
  546. restore_directory_from_friend $temp_restore_dir mailinglist
  547. cp -r $temp_restore_dir/root/spool/mlmmj/* /var/spool/mlmmj
  548. if [ ! "$?" = "0" ]; then
  549. exit 526
  550. fi
  551. rm -rf $temp_restore_dir
  552. fi
  553. }
  554. function restore_email {
  555. if [[ $RESTORE_APP != 'all' ]]; then
  556. if [[ $RESTORE_APP != 'email' ]]; then
  557. return
  558. fi
  559. fi
  560. for d in $SERVER_DIRECTORY/backup/mail/*/ ; do
  561. USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
  562. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  563. if [ -d $SERVER_DIRECTORY/backup/mail/$USERNAME ]; then
  564. if [ ! -d /home/$USERNAME ]; then
  565. ${PROJECT_NAME}-adduser $USERNAME
  566. fi
  567. echo $"Restoring emails for $USERNAME"
  568. temp_restore_dir=/root/tempmail
  569. restore_directory_from_friend $temp_restore_dir mail/$USERNAME
  570. if [ ! -d /home/$USERNAME/Maildir ]; then
  571. mkdir /home/$USERNAME/Maildir
  572. fi
  573. tar -xzvf $temp_restore_dir/root/tempbackupemail/$USERNAME/maildir.tar.gz -C /
  574. if [ ! "$?" = "0" ]; then
  575. exit 927
  576. fi
  577. rm -rf $temp_restore_dir
  578. fi
  579. fi
  580. done
  581. }
  582. # Social key management
  583. # Recover any key fragments and reconstruct the gpg key
  584. ${PROJECT_NAME}-recoverkey -u ${ADMIN_USERNAME} -l $BACKUP_LIST
  585. copy_gpg_keys
  586. restore_configuration
  587. restore_mariadb
  588. restore_letsencrypt
  589. restore_mutt_settings
  590. restore_gpg
  591. restore_procmail
  592. restore_spamassassin
  593. restore_admin_readme
  594. restore_ssh_keys
  595. restore_user_config
  596. restore_user_monkeysphere
  597. restore_user_fin
  598. restore_user_local
  599. restore_certs
  600. restore_personal_settings
  601. restore_mailing_list
  602. restore_email
  603. restore_apps remote
  604. set_user_permissions
  605. # ensure that all TLS certificates are pinned
  606. #${PROJECT_NAME}-pin-cert all
  607. echo $"*** Remote restore was successful ***"
  608. exit 0