mirror of
https://github.com/dnscrypt/dnscrypt-server-docker
synced 2024-11-22 23:51:59 +01:00
Migration
This commit is contained in:
parent
01e13d239e
commit
df35a47df0
@ -71,19 +71,23 @@ provider_info() {
|
|||||||
|
|
||||||
dnscrypt_wrapper_compat() {
|
dnscrypt_wrapper_compat() {
|
||||||
if [ ! -d "$LEGACY_KEYS_DIR" ]; then
|
if [ ! -d "$LEGACY_KEYS_DIR" ]; then
|
||||||
|
echo "Neither [${KEYS_DIR}] doesn't seem to contain the required DNS provider information, and a [${LEGACY_KEYS_DIR}] directory wasn't found either" >&2
|
||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
echo "Legacy [$LEGACY_KEYS_DIR] directory found" >&2
|
echo "Legacy [$LEGACY_KEYS_DIR] directory found" >&2
|
||||||
if [ -d "${KEYS_DIR}/provider_name" ]; then
|
if [ -d "${KEYS_DIR}/provider_name" ]; then
|
||||||
echo "Both [${LEGACY_KEYS_DIR}] and [${KEYS_DIR}] are present and not empty - This is not expected" >&2
|
echo "Both [${LEGACY_KEYS_DIR}] and [${KEYS_DIR}] are present and not empty - This is not expected." >&2
|
||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
if [ ! -f "${LEGACY_KEYS_DIR}/secret.key" ]; then
|
if [ ! -f "${LEGACY_KEYS_DIR}/secret.key" ]; then
|
||||||
echo "No secret key in [${LEGACY_KEYS_DIR}/secret.key], this is not expected." >&2
|
echo "No secret key in [${LEGACY_KEYS_DIR}/secret.key], this is not expected." >&2
|
||||||
|
echo >&2
|
||||||
echo "If you are migrating from a container previously running dnscrypt-wrapper," >&2
|
echo "If you are migrating from a container previously running dnscrypt-wrapper," >&2
|
||||||
echo "make sure that the [${LEGACY_KEYS_DIR}] directory is mounted." >&2
|
echo "make sure that the [${LEGACY_KEYS_DIR}] directory is mounted." >&2
|
||||||
|
echo >&2
|
||||||
echo "If you are setting up a brand new server, maybe you've been following" >&2
|
echo "If you are setting up a brand new server, maybe you've been following" >&2
|
||||||
echo "an outdated tutorial." >&2
|
echo "an outdated tutorial." >&2
|
||||||
|
echo >&2
|
||||||
echo "The key directory should be mounted as [${KEYS_DIR}] and not [$LEGACY_KEYS_DIR]." >&2
|
echo "The key directory should be mounted as [${KEYS_DIR}] and not [$LEGACY_KEYS_DIR]." >&2
|
||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
@ -96,7 +100,13 @@ dnscrypt_wrapper_compat() {
|
|||||||
sed -e "s#${KEYS_DIR}#${LEGACY_KEYS_DIR}#g" <"$CONFIG_FILE_TEMPLATE" >"${CONFIG_FILE_TEMPLATE}.tmp" &&
|
sed -e "s#${KEYS_DIR}#${LEGACY_KEYS_DIR}#g" <"$CONFIG_FILE_TEMPLATE" >"${CONFIG_FILE_TEMPLATE}.tmp" &&
|
||||||
mv -f "${CONFIG_FILE_TEMPLATE}.tmp" "$CONFIG_FILE_TEMPLATE" || exit 1
|
mv -f "${CONFIG_FILE_TEMPLATE}.tmp" "$CONFIG_FILE_TEMPLATE" || exit 1
|
||||||
provider_name=$(cat "${LEGACY_KEYS_DIR}/provider_name")
|
provider_name=$(cat "${LEGACY_KEYS_DIR}/provider_name")
|
||||||
ext_address="0.0.0.0:443"
|
if [ -f "${LEGACY_KEYS_DIR}/provider-info.txt" ]; then
|
||||||
|
ext_address=$(grep -F -- "--resolver-address=" "${LEGACY_KEYS_DIR}/provider-info.txt" 2>/dev/null | cut -d'=' -f2 | sed 's/ //g')
|
||||||
|
fi
|
||||||
|
if [ -z "$ext_address" ]; then
|
||||||
|
echo "(we were not able to find the previous external IP address, the printed stamp will be wrong, but the previous stamp will keep working)" >&2
|
||||||
|
ext_address="0.0.0.0:443"
|
||||||
|
fi
|
||||||
sed \
|
sed \
|
||||||
-e "s/@PROVIDER_NAME@/${provider_name}/" \
|
-e "s/@PROVIDER_NAME@/${provider_name}/" \
|
||||||
-e "s/@EXTERNAL_IPV4@/${ext_address}/" \
|
-e "s/@EXTERNAL_IPV4@/${ext_address}/" \
|
||||||
@ -106,14 +116,16 @@ dnscrypt_wrapper_compat() {
|
|||||||
--config "$CONFIG_FILE" \
|
--config "$CONFIG_FILE" \
|
||||||
--import-from-dnscrypt-wrapper "${LEGACY_KEYS_DIR}/secret.key" \
|
--import-from-dnscrypt-wrapper "${LEGACY_KEYS_DIR}/secret.key" \
|
||||||
--dry-run >/dev/null || exit 1
|
--dry-run >/dev/null || exit 1
|
||||||
|
chmod 600 "${LEGACY_KEYS_DIR}/secret.key"
|
||||||
echo "Done!" >&2
|
echo "Done!" >&2
|
||||||
echo >&2
|
echo >&2
|
||||||
|
export KEYS_DIR="$LEGACY_KEYS_DIR"
|
||||||
}
|
}
|
||||||
|
|
||||||
is_initialized() {
|
is_initialized() {
|
||||||
if [ ! -f "${KEYS_DIR}/encrypted-dns.state" ] || [ ! -f "${KEYS_DIR}/provider-info.txt" ] || [ ! -f "${KEYS_DIR}/provider_name" ]; then
|
if [ ! -f "${KEYS_DIR}/encrypted-dns.state" ] || [ ! -f "${KEYS_DIR}/provider-info.txt" ] || [ ! -f "${KEYS_DIR}/provider_name" ]; then
|
||||||
if dnscrypt_wrapper_compat; then
|
if dnscrypt_wrapper_compat; then
|
||||||
if [ ! -f "${LEGACY_KEYS_DIR}/encrypted-dns.state" ] || [ ! -f "${LEGACY_KEYS_DIR}/provider-info.txt" ] || [ ! -f "${LEGACY_KEYS_DIR}/provider_name" ]; then
|
if [ ! -f "${KEYS_DIR}/encrypted-dns.state" ] || [ ! -f "${KEYS_DIR}/provider_name" ]; then
|
||||||
echo no
|
echo no
|
||||||
else
|
else
|
||||||
echo yes
|
echo yes
|
||||||
|
Loading…
Reference in New Issue
Block a user