pem-cyber-linux/pem-cyber-linux.sh
2025-02-04 11:36:37 +01:00

44 lines
937 B
Bash
Executable File

#!/bin/bash
## source de la configuration
source $(realpath $(dirname $0))/$(echo $(basename $0)| sed 's/.sh/.d/g')/config
## source des functions de base
source ${DirFct}/function
GetRoot
OPTSTRING="hcal:t:"
while getopts ${OPTSTRING} opt; do
case ${opt} in
a) Action=Apply;;
c) Action=Check;;
l) Level=${OPTARG};;
t) Type=${OPTARG};;
h) Usage;;
?) echo "Invalid option: -${OPTARG}."; exit 1;;
esac
done
CheckArg
source ${DirFct}/function_${Action}
[[ $Level -eq 2 ]] && RealLevel=\* || RealLevel=1
DirAction=$(realpath $(dirname $0))/${Action}/${Type}/${RealLevel}
[[ ! -d ${LogDir} ]] && mkdir -p ${LogDir} || true
for File in $(find ${DirAction} -type f -name run.sh| sort -n)
do
cd $(dirname ${File})
Test=$(basename $(dirname ${File}))
export CptErr=0
bash ${Debug} ./run.sh &> ${LogDir}/${Test}.log
LogTest ${?} ${Action} ${Test}
done