895 lines
31 KiB
Bash
Executable File
895 lines
31 KiB
Bash
Executable File
#!/bin/bash
|
|
#
|
|
# .---. . .
|
|
# | | |
|
|
# |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
|
|
# | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
|
|
# ' ' --' --' -' - -' ' ' -' -' -' ' - --'
|
|
#
|
|
# Freedom in the Cloud
|
|
#
|
|
# Restore from local storage - typically a USB drive
|
|
|
|
# License
|
|
# =======
|
|
#
|
|
# Copyright (C) 2015-2017 Bob Mottram <bob@freedombone.net>
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Affero General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Affero General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU Affero General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
PROJECT_NAME='freedombone'
|
|
COMPLETION_FILE=$HOME/${PROJECT_NAME}-completed.txt
|
|
CONFIGURATION_FILE=$HOME/${PROJECT_NAME}.cfg
|
|
BACKUP_EXTRA_DIRECTORIES=/root/backup-extra-dirs.csv
|
|
|
|
# whether to restore everything or just a specific application
|
|
RESTORE_APP='all'
|
|
|
|
export TEXTDOMAIN=${PROJECT_NAME}-restore-local
|
|
export TEXTDOMAINDIR="/usr/share/locale"
|
|
|
|
PROJECT_INSTALL_DIR=/usr/local/bin
|
|
if [ -f /usr/bin/${PROJECT_NAME} ]; then
|
|
PROJECT_INSTALL_DIR=/usr/bin
|
|
fi
|
|
|
|
# MariaDB password
|
|
DATABASE_PASSWORD=$(${PROJECT_NAME}-pass -u root -a mariadb)
|
|
|
|
function please_wait {
|
|
local str width height length
|
|
|
|
width=$(tput cols)
|
|
height=$(tput lines)
|
|
str="Standby to restore from USB"
|
|
length=${#str}
|
|
clear
|
|
tput cup $((height / 2)) $(((width / 2) - (length / 2)))
|
|
echo "$str"
|
|
tput cup $((height * 3 / 5)) $(((width / 2)))
|
|
echo -n ''
|
|
}
|
|
|
|
please_wait
|
|
|
|
source $PROJECT_INSTALL_DIR/${PROJECT_NAME}-vars
|
|
|
|
# include utils which allow function_check, go and drive mount
|
|
UTILS_FILES=/usr/share/${PROJECT_NAME}/utils/${PROJECT_NAME}-utils-*
|
|
for f in $UTILS_FILES
|
|
do
|
|
source $f
|
|
done
|
|
|
|
clear
|
|
|
|
USB_DRIVE=/dev/sdb1
|
|
USB_MOUNT=/mnt/usb
|
|
|
|
ADMIN_USERNAME=''
|
|
ADMIN_NAME=
|
|
|
|
read_config_param USB_DRIVE
|
|
|
|
if [ -f $COMPLETION_FILE ]; then
|
|
ADMIN_USERNAME=$(get_completion_param "Admin user")
|
|
fi
|
|
|
|
function check_backup_exists {
|
|
if [ ! -d $USB_MOUNT/backup ]; then
|
|
echo $"No backup directory found on the USB drive."
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 2
|
|
fi
|
|
}
|
|
|
|
function check_admin_user {
|
|
echo $"Checking that admin user exists"
|
|
if [ ! -d /home/$ADMIN_USERNAME ]; then
|
|
echo $"Username $ADMIN_USERNAME not found. Reinstall ${PROJECT_NAME} with this username."
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 295
|
|
fi
|
|
}
|
|
|
|
function copy_gpg_keys {
|
|
echo $"Copying GPG keys from admin user to root"
|
|
cp -r /home/$ADMIN_USERNAME/.gnupg /root
|
|
gpg_set_permissions root
|
|
}
|
|
|
|
function restore_blocklist {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'blocklist' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
|
|
if [ -d $USB_MOUNT/backup/blocklist ]; then
|
|
echo $"Restoring blocklist"
|
|
temp_restore_dir=/root/tempblocklist
|
|
restore_directory_from_usb $temp_restore_dir blocklist
|
|
|
|
if [ -d $temp_restore_dir/root/tempbackupblocklist ]; then
|
|
cp -f $temp_restore_dir/root/tempbackupblocklist/${PROJECT_NAME}-firewall-domains.cfg /root/${PROJECT_NAME}-firewall-domains.cfg
|
|
else
|
|
cp -f $temp_restore_dir/${PROJECT_NAME}-firewall-domains.cfg /root/${PROJECT_NAME}-firewall-domains.cfg
|
|
fi
|
|
|
|
rm -rf $temp_restore_dir
|
|
|
|
firewall_refresh_blocklist
|
|
fi
|
|
}
|
|
|
|
function restore_configfiles {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'configfiles' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
|
|
# this restores *.cfg and COMPLETION_FILE
|
|
if [ -d $USB_MOUNT/backup/configfiles ]; then
|
|
echo $"Restoring configuration files"
|
|
temp_restore_dir=/root/tempconfigfiles
|
|
restore_directory_from_usb $temp_restore_dir configfiles
|
|
|
|
if [ -d $temp_restore_dir/root ]; then
|
|
if [ -f $temp_restore_dir/root/.nostore ]; then
|
|
if [ ! -f /root/.nostore ]; then
|
|
touch /root/.nostore
|
|
fi
|
|
else
|
|
if [ -f /root/.nostore ]; then
|
|
rm /root/.nostore
|
|
fi
|
|
fi
|
|
else
|
|
if [ -f $temp_restore_dir/.nostore ]; then
|
|
if [ ! -f /root/.nostore ]; then
|
|
touch /root/.nostore
|
|
fi
|
|
else
|
|
if [ -f /root/.nostore ]; then
|
|
rm /root/.nostore
|
|
fi
|
|
fi
|
|
fi
|
|
|
|
#if [ -f $temp_restore_dir$NODEJS_INSTALLED_APPS_FILE ]; then
|
|
# cp -f $temp_restore_dir$NODEJS_INSTALLED_APPS_FILE $NODEJS_INSTALLED_APPS_FILE
|
|
#fi
|
|
|
|
#if [ -f $temp_restore_dir/root/${PROJECT_NAME}.cfg ]; then
|
|
# cp -f $temp_restore_dir/root/${PROJECT_NAME}.cfg $CONFIGURATION_FILE
|
|
# if [ ! "$?" = "0" ]; then
|
|
# set_user_permissions
|
|
# backup_unmount_drive
|
|
# rm -rf $temp_restore_dir
|
|
# exit 5294
|
|
# fi
|
|
#fi
|
|
|
|
#if [ -f $CONFIGURATION_FILE ]; then
|
|
# # install according to the config file
|
|
# freedombone -c $CONFIGURATION_FILE
|
|
#fi
|
|
|
|
#if [ -f $temp_restore_dir/root/${PROJECT_NAME}-completed.txt ]; then
|
|
# cp -f $temp_restore_dir/root/${PROJECT_NAME}-completed.txt $COMPLETION_FILE
|
|
# if [ ! "$?" = "0" ]; then
|
|
# set_user_permissions
|
|
# backup_unmount_drive
|
|
# rm -rf $temp_restore_dir
|
|
# exit 6382
|
|
# fi
|
|
#fi
|
|
|
|
if [ -f ${temp_restore_dir}${BACKUP_EXTRA_DIRECTORIES} ]; then
|
|
cp -f ${temp_restore_dir}${BACKUP_EXTRA_DIRECTORIES} ${BACKUP_EXTRA_DIRECTORIES}
|
|
if [ ! "$?" = "0" ]; then
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
rm -rf $temp_restore_dir
|
|
exit 62121
|
|
fi
|
|
fi
|
|
|
|
# restore nginx password hashes
|
|
if [ -d $temp_restore_dir/root ]; then
|
|
if [ -f $temp_restore_dir/root/htpasswd ]; then
|
|
cp -f $temp_restore_dir/root/htpasswd /etc/nginx/.htpasswd
|
|
fi
|
|
else
|
|
if [ -f $temp_restore_dir/htpasswd ]; then
|
|
cp -f $temp_restore_dir/htpasswd /etc/nginx/.htpasswd
|
|
fi
|
|
fi
|
|
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
}
|
|
|
|
function same_admin_user {
|
|
PREV_ADMIN_USERNAME=$(get_completion_param "Admin user")
|
|
if [[ "$PREV_ADMIN_USERNAME" != "$ADMIN_USERNAME" ]]; then
|
|
echo $"The admin username has changed from $PREV_ADMIN_USERNAME to $ADMIN_USERNAME. To restore you will first need to install a new ${PROJECT_NAME} system with an initial admin user named $PREV_ADMIN_USERNAME"
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 73265
|
|
fi
|
|
}
|
|
|
|
function restore_mariadb {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'mariadb' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
|
|
if [[ $(is_completed install_mariadb) == "0" ]]; then
|
|
function_check install_mariadb
|
|
install_mariadb
|
|
fi
|
|
|
|
if [ -d $USB_MOUNT/backup/mariadb ]; then
|
|
echo $"Restoring mysql settings"
|
|
keep_database_running
|
|
temp_restore_dir=/root/tempmariadb
|
|
restore_directory_from_usb $temp_restore_dir mariadb
|
|
|
|
store_original_mariadb_password
|
|
|
|
echo $'Obtaining original MariaDB password'
|
|
db_pass=$(cat /root/.mariadboriginal)
|
|
if [ ${#db_pass} -gt 0 ]; then
|
|
echo $"Restore the MariaDB user table"
|
|
if [ -d ${temp_restore_dir}${temp_restore_dir} ]; then
|
|
mysqlsuccess=$(mysql -u root --password="$db_pass" mysql -o < ${temp_restore_dir}${temp_restore_dir}/mysql.sql)
|
|
else
|
|
mysqlsuccess=$(mysql -u root --password="$db_pass" mysql -o < ${temp_restore_dir}/mysql.sql)
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
echo $"Try again using the password obtained from backup"
|
|
db_pass=$(${PROJECT_NAME}-pass -u root -a mariadb)
|
|
if [ -d ${temp_restore_dir}${temp_restore_dir} ]; then
|
|
mysqlsuccess=$(mysql -u root --password="$db_pass" mysql -o < ${temp_restore_dir}${temp_restore_dir}/mysql.sql)
|
|
else
|
|
mysqlsuccess=$(mysql -u root --password="$db_pass" mysql -o < ${temp_restore_dir}/mysql.sql)
|
|
fi
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
echo "$mysqlsuccess"
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 962
|
|
fi
|
|
echo $"Restarting database"
|
|
systemctl restart mariadb
|
|
echo $"Ensure MariaDB handles authentication"
|
|
MARIADB_PASSWORD=$(${PROJECT_NAME}-pass -u root -a mariadb)
|
|
mariadb_fix_authentication
|
|
DATABASE_PASSWORD=$(${PROJECT_NAME}-pass -u root -a mariadb)
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
}
|
|
|
|
function restore_letsencrypt {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'letsencrypt' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/letsencrypt ]; then
|
|
echo $"Restoring Lets Encrypt settings"
|
|
#restore_directory_from_usb / letsencrypt
|
|
restore_directory_from_usb /etc/letsencrypt letsencrypt
|
|
chgrp -R ssl-cert /etc/letsencrypt
|
|
chmod -R g=rX /etc/letsencrypt
|
|
fi
|
|
}
|
|
|
|
function restore_passwordstore {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'passwords' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/passwordstore ]; then
|
|
store_original_mariadb_password
|
|
echo $"Restoring password store"
|
|
#restore_directory_from_usb / passwordstore
|
|
restore_directory_from_usb /root/.passwords passwordstore
|
|
fi
|
|
}
|
|
|
|
function restore_tor {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'tor' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/tor ]; then
|
|
echo $"Restoring Tor settings"
|
|
#restore_directory_from_usb / tor
|
|
restore_directory_from_usb /var/lib/tor tor
|
|
fi
|
|
}
|
|
|
|
function restore_mutt_settings {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'mutt' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/mutt ]; then
|
|
for d in $USB_MOUNT/backup/mutt/*/ ; do
|
|
USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
|
|
if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
|
|
if [ ! -d /home/$USERNAME ]; then
|
|
${PROJECT_NAME}-adduser $USERNAME
|
|
fi
|
|
echo $"Restoring Mutt settings for $USERNAME"
|
|
temp_restore_dir=/root/tempmutt
|
|
restore_directory_from_usb $temp_restore_dir mutt/$USERNAME
|
|
if [ -d $temp_restore_dir/home/$USERNAME/tempbackup ]; then
|
|
if [ -f $temp_restore_dir/home/$USERNAME/tempbackup/.muttrc ]; then
|
|
cp -f $temp_restore_dir/home/$USERNAME/tempbackup/.muttrc /home/$USERNAME/.muttrc
|
|
sed -i '/set sidebar_delim/d' /home/$USERNAME/.muttrc
|
|
sed -i '/set sidebar_sort/d' /home/$USERNAME/.muttrc
|
|
fi
|
|
if [ -f $temp_restore_dir/home/$USERNAME/tempbackup/Muttrc ]; then
|
|
cp -f $temp_restore_dir/home/$USERNAME/tempbackup/Muttrc /etc/Muttrc
|
|
sed -i '/set sidebar_delim/d' /etc/Muttrc
|
|
sed -i '/set sidebar_sort/d' /etc/Muttrc
|
|
fi
|
|
else
|
|
if [ -f $temp_restore_dir/.muttrc ]; then
|
|
cp -f $temp_restore_dir/.muttrc /home/$USERNAME/.muttrc
|
|
sed -i '/set sidebar_delim/d' /home/$USERNAME/.muttrc
|
|
sed -i '/set sidebar_sort/d' /home/$USERNAME/.muttrc
|
|
fi
|
|
if [ -f $temp_restore_dir/Muttrc ]; then
|
|
cp -f $temp_restore_dir/Muttrc /etc/Muttrc
|
|
sed -i '/set sidebar_delim/d' /etc/Muttrc
|
|
sed -i '/set sidebar_sort/d' /etc/Muttrc
|
|
fi
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
rm -rf $temp_restore_dir
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 276
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
done
|
|
fi
|
|
}
|
|
|
|
function restore_gpg {
|
|
if [[ $RESTORE_APP != 'gpg' ]]; then
|
|
return
|
|
fi
|
|
|
|
if [ -d $USB_MOUNT/backup/gnupg ]; then
|
|
for d in $USB_MOUNT/backup/gnupg/*/ ; do
|
|
USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
|
|
if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
|
|
if [ ! -d /home/$USERNAME ]; then
|
|
${PROJECT_NAME}-adduser $USERNAME
|
|
fi
|
|
echo $"Restoring gnupg settings for $USERNAME"
|
|
temp_restore_dir=/root/tempgnupg
|
|
restore_directory_from_usb $temp_restore_dir gnupg/$USERNAME
|
|
if [ -d $temp_restore_dir/home/$USERNAME/.gnupg ]; then
|
|
cp -r $temp_restore_dir/home/$USERNAME/.gnupg /home/$USERNAME/
|
|
else
|
|
cp -r $temp_restore_dir/* /home/$USERNAME/.gnupg/
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
rm -rf $temp_restore_dir
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 276
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
gpg_set_permissions $USERNAME
|
|
if [[ "$USERNAME" == "$ADMIN_USERNAME" ]]; then
|
|
cp -r /home/$USERNAME/.gnupg /root
|
|
if [ ! "$?" = "0" ]; then
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 283
|
|
fi
|
|
gpg_set_permissions root
|
|
fi
|
|
fi
|
|
done
|
|
fi
|
|
}
|
|
|
|
function restore_procmail {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'procmail' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/procmail ]; then
|
|
for d in $USB_MOUNT/backup/procmail/*/ ; do
|
|
USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
|
|
if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
|
|
if [ ! -d /home/$USERNAME ]; then
|
|
${PROJECT_NAME}-adduser $USERNAME
|
|
fi
|
|
echo $"Restoring procmail settings for $USERNAME"
|
|
temp_restore_dir=/root/tempprocmail
|
|
restore_directory_from_usb $temp_restore_dir procmail/$USERNAME
|
|
if [ -d $temp_restore_dir ]; then
|
|
if [ -d $temp_restore_dir/home/$USERNAME/tempbackup ]; then
|
|
cp -f $temp_restore_dir/home/$USERNAME/tempbackup/.procmailrc /home/$USERNAME/
|
|
else
|
|
cp -f $temp_restore_dir/.procmailrc /home/$USERNAME/.procmailrc
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
rm -rf $temp_restore_dir
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 276
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
fi
|
|
done
|
|
fi
|
|
}
|
|
|
|
function restore_spamassassin {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'spamassassin' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/spamassassin ]; then
|
|
for d in $USB_MOUNT/backup/spamassassin/*/ ; do
|
|
USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
|
|
if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
|
|
if [ -d $USB_MOUNT/backup/spamassassin/$USERNAME ]; then
|
|
if [ ! -d /home/$USERNAME ]; then
|
|
${PROJECT_NAME}-adduser $USERNAME
|
|
fi
|
|
echo $"Restoring spamassassin settings for $USERNAME"
|
|
temp_restore_dir=/root/tempspamassassin
|
|
restore_directory_from_usb $temp_restore_dir spamassassin/$USERNAME
|
|
if [ -d $temp_restore_dir/home/$USERNAME ]; then
|
|
cp -rf $temp_restore_dir/home/$USERNAME/.spamassassin /home/$USERNAME/
|
|
else
|
|
cp -rf $temp_restore_dir/* /home/$USERNAME/.spamassassin/
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
rm -rf $temp_restore_dir
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 276
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
fi
|
|
done
|
|
fi
|
|
}
|
|
|
|
function restore_admin_readme {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'readme' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/readme ]; then
|
|
echo $"Restoring admin user README"
|
|
|
|
# Make a backup of the original README file
|
|
# incase old passwords need to be used
|
|
if [ -f /home/$ADMIN_USERNAME/README ]; then
|
|
if [ ! -f /home/$ADMIN_USERNAME/README_original ]; then
|
|
cp /home/$ADMIN_USERNAME/README /home/$ADMIN_USERNAME/README_original
|
|
fi
|
|
fi
|
|
|
|
temp_restore_dir=/root/tempreadme
|
|
restore_directory_from_usb $temp_restore_dir readme
|
|
if [ -d $temp_restore_dir/home/$ADMIN_USERNAME/tempbackup ]; then
|
|
cp -f $temp_restore_dir/home/$ADMIN_USERNAME/tempbackup/README /home/$ADMIN_USERNAME/
|
|
else
|
|
cp -f $temp_restore_dir/README /home/$ADMIN_USERNAME/README
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
rm -rf $temp_restore_dir
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 276
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
}
|
|
|
|
function restore_user_ssh_keys {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'ssh' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/ssh ]; then
|
|
for d in $USB_MOUNT/backup/ssh/*/ ; do
|
|
USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
|
|
if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
|
|
if [ ! -d /home/$USERNAME ]; then
|
|
${PROJECT_NAME}-adduser $USERNAME
|
|
fi
|
|
echo $"Restoring ssh keys for $USERNAME"
|
|
temp_restore_dir=/root/tempssh
|
|
restore_directory_from_usb $temp_restore_dir ssh/$USERNAME
|
|
if [ -d $temp_restore_dir/home/$USERNAME/.ssh ]; then
|
|
cp -r $temp_restore_dir/home/$USERNAME/.ssh /home/$USERNAME/
|
|
else
|
|
cp -r $temp_restore_dir/* /home/$USERNAME/.ssh/
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
rm -rf $temp_restore_dir
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 664
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
done
|
|
fi
|
|
}
|
|
|
|
function restore_user_config {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'userconfig' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/config ]; then
|
|
for d in $USB_MOUNT/backup/config/*/ ; do
|
|
USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
|
|
if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
|
|
if [ ! -d /home/$USERNAME ]; then
|
|
${PROJECT_NAME}-adduser $USERNAME
|
|
fi
|
|
echo $"Restoring config files for $USERNAME"
|
|
temp_restore_dir=/root/tempconfig
|
|
restore_directory_from_usb $temp_restore_dir config/$USERNAME
|
|
if [ -d $temp_restore_dir/home/$USERNAME/.config ]; then
|
|
cp -r $temp_restore_dir/home/$USERNAME/.config /home/$USERNAME/
|
|
else
|
|
cp -r $temp_restore_dir/* /home/$USERNAME/.config/
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
rm -rf $temp_restore_dir
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 664
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
done
|
|
fi
|
|
}
|
|
|
|
function restore_user_monkeysphere {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'usermonkeysphere' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/monkeysphere ]; then
|
|
for d in $USB_MOUNT/backup/monkeysphere/*/ ; do
|
|
USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
|
|
if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
|
|
if [ ! -d /home/$USERNAME ]; then
|
|
${PROJECT_NAME}-adduser $USERNAME
|
|
fi
|
|
echo $"Restoring monkeysphere ids for $USERNAME"
|
|
temp_restore_dir=/root/tempmonkeysphere
|
|
restore_directory_from_usb $temp_restore_dir monkeysphere/$USERNAME
|
|
if [ -d $temp_restore_dir/home/$USERNAME/.monkeysphere ]; then
|
|
cp -r $temp_restore_dir/home/$USERNAME/.monkeysphere /home/$USERNAME/
|
|
else
|
|
cp -r $temp_restore_dir/* /home/$USERNAME/.monkeysphere
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
rm -rf $temp_restore_dir
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 664
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
done
|
|
|
|
# The admin user is the identity certifier
|
|
MY_EMAIL_ADDRESS="${ADMIN_USERNAME}@${HOSTNAME}"
|
|
read_config_param MY_EMAIL_ADDRESS
|
|
MY_GPG_PUBLIC_KEY_ID=$(gpg_pubkey_from_email "$ADMIN_USERNAME" "$MY_EMAIL_ADDRESS")
|
|
fpr=$(gpg --with-colons --fingerprint $MY_GPG_PUBLIC_KEY_ID | grep fpr | head -n 1 | awk -F ':' '{print $10}')
|
|
monkeysphere-authentication add-identity-certifier $fpr
|
|
monkeysphere-authentication update-users
|
|
fi
|
|
}
|
|
|
|
function restore_user_fin {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'userfin' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/fin ]; then
|
|
for d in $USB_MOUNT/backup/fin/*/ ; do
|
|
USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
|
|
if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
|
|
if [ ! -d /home/$USERNAME ]; then
|
|
${PROJECT_NAME}-adduser $USERNAME
|
|
fi
|
|
echo $"Restoring fin files for $USERNAME"
|
|
temp_restore_dir=/root/tempfin
|
|
restore_directory_from_usb $temp_restore_dir fin/$USERNAME
|
|
if [ -d $temp_restore_dir/home/$USERNAME/.fin ]; then
|
|
cp -r $temp_restore_dir/home/$USERNAME/.fin /home/$USERNAME/
|
|
else
|
|
cp -r $temp_restore_dir/* /home/$USERNAME/.fin/
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
rm -rf $temp_restore_dir
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 664
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
done
|
|
fi
|
|
}
|
|
|
|
function restore_user_local {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'userlocal' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/local ]; then
|
|
for d in $USB_MOUNT/backup/local/*/ ; do
|
|
USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
|
|
if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
|
|
if [ ! -d /home/$USERNAME ]; then
|
|
${PROJECT_NAME}-adduser $USERNAME
|
|
fi
|
|
echo $"Restoring local files for $USERNAME"
|
|
temp_restore_dir=/root/templocal
|
|
restore_directory_from_usb $temp_restore_dir local/$USERNAME
|
|
if [ -d $temp_restore_dir/home/$USERNAME/.local ]; then
|
|
cp -r $temp_restore_dir/home/$USERNAME/.local /home/$USERNAME/
|
|
else
|
|
cp -r $temp_restore_dir/* /home/$USERNAME/.local/
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
rm -rf $temp_restore_dir
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 664
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
done
|
|
fi
|
|
}
|
|
|
|
function restore_certs {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'certs' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/ssl ]; then
|
|
echo $"Restoring certificates"
|
|
mkdir /root/tempssl
|
|
restore_directory_from_usb /root/tempssl ssl
|
|
if [ -d /root/tempssl/etc/ssl ]; then
|
|
cp -r /root/tempssl/etc/ssl/* /etc/ssl
|
|
else
|
|
cp -r /root/tempssl/* /etc/ssl/
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 276
|
|
fi
|
|
rm -rf /root/tempssl
|
|
update-ca-certificates
|
|
|
|
# restore ownership
|
|
if [ -f /etc/ssl/private/xmpp.key ]; then
|
|
chown prosody:prosody /etc/ssl/private/xmpp.key
|
|
chown prosody:prosody /etc/ssl/certs/xmpp.*
|
|
fi
|
|
if [ -d /etc/dovecot ]; then
|
|
chown root:dovecot /etc/ssl/private/dovecot.*
|
|
chown root:dovecot /etc/ssl/certs/dovecot.*
|
|
fi
|
|
if [ -f /etc/ssl/private/exim.key ]; then
|
|
cp /etc/ssl/private/exim.key /etc/exim4
|
|
cp /etc/ssl/certs/exim.crt /etc/exim4
|
|
cp /etc/ssl/certs/exim.dhparam /etc/exim4
|
|
chown root:Debian-exim /etc/exim4/exim.key /etc/exim4/exim.crt /etc/exim4/exim.dhparam
|
|
chmod 640 /etc/exim4/exim.key /etc/exim4/exim.crt /etc/exim4/exim.dhparam
|
|
fi
|
|
if [ -f /etc/ssl/private/mumble.key ]; then
|
|
if [ -d /var/lib/mumble-server ]; then
|
|
cp /etc/ssl/certs/mumble.* /var/lib/mumble-server
|
|
cp /etc/ssl/private/mumble.key /var/lib/mumble-server
|
|
chown -R mumble-server:mumble-server /var/lib/mumble-server
|
|
fi
|
|
fi
|
|
fi
|
|
}
|
|
|
|
function restore_personal_settings {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'personal' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/personal ]; then
|
|
for d in $USB_MOUNT/backup/personal/*/ ; do
|
|
USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
|
|
if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
|
|
if [ -d $USB_MOUNT/backup/personal/$USERNAME ]; then
|
|
if [ ! -d /home/$USERNAME ]; then
|
|
${PROJECT_NAME}-adduser $USERNAME
|
|
fi
|
|
echo $"Restoring personal settings for $USERNAME"
|
|
temp_restore_dir=/root/temppersonal
|
|
restore_directory_from_usb $temp_restore_dir personal/$USERNAME
|
|
if [ -d /home/$USERNAME/personal ]; then
|
|
rm -rf /home/$USERNAME/personal
|
|
fi
|
|
if [ -d $temp_restore_dir/home/$USERNAME/personal ]; then
|
|
mv $temp_restore_dir/home/$USERNAME/personal /home/$USERNAME
|
|
else
|
|
cp -r $temp_restore_dir/* /home/$USERNAME/personal/
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 184
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
fi
|
|
done
|
|
fi
|
|
}
|
|
|
|
function restore_mailing_list {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'mailinglist' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d /var/spool/mlmmj ]; then
|
|
echo $"Restoring public mailing list"
|
|
temp_restore_dir=/root/tempmailinglist
|
|
restore_directory_from_usb $temp_restore_dir mailinglist
|
|
if [ -d $temp_restore_dir/root/spool/mlmmj ]; then
|
|
cp -r $temp_restore_dir/root/spool/mlmmj/* /var/spool/mlmmj
|
|
else
|
|
cp -r $temp_restore_dir/* /var/spool/mlmmj/
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 526
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
}
|
|
|
|
function restore_email {
|
|
if [[ $RESTORE_APP != 'all' ]]; then
|
|
if [[ $RESTORE_APP != 'email' ]]; then
|
|
return
|
|
fi
|
|
fi
|
|
if [ -d $USB_MOUNT/backup/mail ]; then
|
|
for d in $USB_MOUNT/backup/mail/*/ ; do
|
|
USERNAME=$(echo "$d" | awk -F '/' '{print $6}')
|
|
if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
|
|
if [ ! -d /home/$USERNAME ]; then
|
|
${PROJECT_NAME}-adduser $USERNAME
|
|
fi
|
|
echo $"Restoring emails for $USERNAME"
|
|
temp_restore_dir=/root/tempmail
|
|
restore_directory_from_usb $temp_restore_dir mail/$USERNAME
|
|
if [ ! -d /home/$USERNAME/Maildir ]; then
|
|
mkdir /home/$USERNAME/Maildir
|
|
fi
|
|
if [ -d $temp_restore_dir/root/tempbackupemail/$USERNAME ]; then
|
|
tar -xzvf $temp_restore_dir/root/tempbackupemail/$USERNAME/maildir.tar.gz -C /
|
|
else
|
|
tar -xzvf $temp_restore_dir/maildir.tar.gz -C /
|
|
fi
|
|
if [ ! "$?" = "0" ]; then
|
|
set_user_permissions
|
|
backup_unmount_drive
|
|
exit 9276382
|
|
fi
|
|
rm -rf $temp_restore_dir
|
|
fi
|
|
done
|
|
fi
|
|
}
|
|
|
|
function get_restore_app {
|
|
if [ ${1} ]; then
|
|
if [ ! -d /home/${1} ]; then
|
|
RESTORE_APP=${1}
|
|
echo $"Restore $RESTORE_APP"
|
|
fi
|
|
fi
|
|
}
|
|
|
|
get_restore_app ${2}
|
|
backup_mount_drive ${1} ${ADMIN_USERNAME} ${2}
|
|
check_backup_exists
|
|
check_admin_user
|
|
copy_gpg_keys
|
|
restore_blocklist
|
|
restore_configfiles
|
|
same_admin_user
|
|
restore_passwordstore
|
|
restore_mariadb
|
|
restore_letsencrypt
|
|
restore_tor
|
|
restore_mutt_settings
|
|
restore_gpg
|
|
restore_procmail
|
|
restore_spamassassin
|
|
restore_admin_readme
|
|
restore_user_ssh_keys
|
|
restore_user_config
|
|
restore_user_monkeysphere
|
|
restore_user_fin
|
|
restore_user_local
|
|
restore_certs
|
|
restore_personal_settings
|
|
restore_mailing_list
|
|
restore_email
|
|
restore_apps local $RESTORE_APP
|
|
set_user_permissions
|
|
update_default_domain
|
|
backup_unmount_drive
|
|
|
|
# ensure that all TLS certificates are pinned
|
|
#${PROJECT_NAME}-pin-cert all
|
|
|
|
echo $"Restore from USB drive is complete. You can now unplug it."
|
|
|
|
exit 0
|