freedombone-utils-web 33KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789
  1. #!/bin/bash
  2. #
  3. # .---. . .
  4. # | | |
  5. # |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
  6. # | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
  7. # ' ' --' --' -' - -' ' ' -' -' -' ' - --'
  8. #
  9. # Freedom in the Cloud
  10. #
  11. # Web related functions
  12. #
  13. # License
  14. # =======
  15. #
  16. # Copyright (C) 2014-2016 Bob Mottram <bob@freedombone.net>
  17. #
  18. # This program is free software: you can redistribute it and/or modify
  19. # it under the terms of the GNU Affero General Public License as published by
  20. # the Free Software Foundation, either version 3 of the License, or
  21. # (at your option) any later version.
  22. #
  23. # This program is distributed in the hope that it will be useful,
  24. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  25. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  26. # GNU Affero General Public License for more details.
  27. #
  28. # You should have received a copy of the GNU Affero General Public License
  29. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  30. # default search engine for command line browser
  31. DEFAULT_SEARCH='https://searx.laquadrature.net'
  32. # Whether Let's Encrypt is enabled for all sites
  33. LETSENCRYPT_ENABLED="no"
  34. LETSENCRYPT_SERVER='https://acme-v01.api.letsencrypt.org/directory'
  35. # list of encryption protocols
  36. SSL_PROTOCOLS="TLSv1 TLSv1.1 TLSv1.2"
  37. # list of ciphers to use. See bettercrypto.org recommendations
  38. SSL_CIPHERS="EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA256:EECDH:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!IDEA:!ECDSA:kEDH:CAMELLIA128-SHA:AES128-SHA"
  39. NGINX_ENSITE_REPO="https://github.com/perusio/nginx_ensite"
  40. NGINX_ENSITE_COMMIT='fa4d72ce1c0a490442c8474e9c8dc21ed52c93d0'
  41. # memory limit for php in MB
  42. MAX_PHP_MEMORY=64
  43. # logging level for Nginx
  44. WEBSERVER_LOG_LEVEL='warn'
  45. # test a domain name to see if it's valid
  46. function validate_domain_name {
  47. # count the number of dots in the domain name
  48. dots=${TEST_DOMAIN_NAME//[^.]}
  49. no_of_dots=${#dots}
  50. if (( $no_of_dots > 3 )); then
  51. TEST_DOMAIN_NAME=$"The domain $TEST_DOMAIN_NAME has too many subdomains. It should be of the type w.x.y.z, x.y.z or y.z"
  52. fi
  53. if (( $no_of_dots == 0 )); then
  54. TEST_DOMAIN_NAME=$"The domain $TEST_DOMAIN_NAME has no top level domain. It should be of the type w.x.y.z, x.y.z or y.z"
  55. fi
  56. }
  57. function nginx_disable_sniffing {
  58. domain_name=$1
  59. filename=/etc/nginx/sites-available/$domain_name
  60. echo ' add_header X-Frame-Options DENY;' >> $filename
  61. echo ' add_header X-Content-Type-Options nosniff;' >> $filename
  62. echo '' >> $filename
  63. }
  64. function nginx_limits {
  65. domain_name=$1
  66. max_body='20m'
  67. if [ $2 ]; then
  68. max_body=$2
  69. fi
  70. filename=/etc/nginx/sites-available/$domain_name
  71. echo " client_max_body_size ${max_body};" >> $filename
  72. echo ' client_body_buffer_size 128k;' >> $filename
  73. echo '' >> $filename
  74. echo ' limit_conn conn_limit_per_ip 10;' >> $filename
  75. echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> $filename
  76. echo '' >> $filename
  77. }
  78. function nginx_stapling {
  79. domain_name=$1
  80. filename=/etc/nginx/sites-available/$domain_name
  81. echo " ssl_stapling on;" >> $filename
  82. echo ' ssl_stapling_verify on;' >> $filename
  83. echo ' ssl_trusted_certificate /etc/ssl/certs/${domain_name}.pem;' >> $filename
  84. echo '' >> $filename
  85. }
  86. function nginx_http_redirect {
  87. # redirect port 80 to https
  88. domain_name=$1
  89. filename=/etc/nginx/sites-available/$domain_name
  90. echo 'server {' > $filename
  91. echo ' listen 80;' >> $filename
  92. echo ' listen [::]:80;' >> $filename
  93. echo " server_name ${domain_name};" >> $filename
  94. echo " root /var/www/${domain_name}/htdocs;" >> $filename
  95. echo ' access_log /dev/null;' >> $filename
  96. echo " error_log /dev/null;" >> $filename
  97. function_check nginx_limits
  98. nginx_limits $domain_name
  99. echo ' rewrite ^ https://$server_name$request_uri? permanent;' >> $filename
  100. echo '}' >> $filename
  101. echo '' >> $filename
  102. }
  103. function nginx_ssl {
  104. # creates the SSL/TLS section for a website
  105. domain_name=$1
  106. filename=/etc/nginx/sites-available/$domain_name
  107. echo ' ssl_stapling off;' >> $filename
  108. echo ' ssl_stapling_verify off;' >> $filename
  109. echo ' ssl on;' >> $filename
  110. if [ -f /etc/ssl/certs/${domain_name}.pem ]; then
  111. echo " ssl_certificate /etc/ssl/certs/${domain_name}.pem;" >> $filename
  112. else
  113. echo " ssl_certificate /etc/ssl/certs/${domain_name}.crt;" >> $filename
  114. fi
  115. echo " ssl_certificate_key /etc/ssl/private/${domain_name}.key;" >> $filename
  116. echo " ssl_dhparam /etc/ssl/certs/${domain_name}.dhparam;" >> $filename
  117. echo '' >> $filename
  118. echo ' ssl_session_cache builtin:1000 shared:SSL:10m;' >> $filename
  119. echo ' ssl_session_timeout 60m;' >> $filename
  120. echo ' ssl_prefer_server_ciphers on;' >> $filename
  121. echo " ssl_protocols $SSL_PROTOCOLS;" >> $filename
  122. echo " ssl_ciphers '$SSL_CIPHERS';" >> $filename
  123. echo " add_header Content-Security-Policy \"default-src https:; script-src https: 'unsafe-inline'; style-src https: 'unsafe-inline'\";" >> $filename
  124. #nginx_stapling $1
  125. }
  126. function nginx_keybase {
  127. # creates files suitable for keybase.io verification
  128. domain_name=$1
  129. filename=/etc/nginx/sites-available/$domain_name
  130. echo '' >> $filename
  131. echo " # make sure webfinger and other well known services aren't blocked" >> $filename
  132. echo ' # by denying dot files and rewrite request to the front controller' >> $filename
  133. echo ' location ^~ /.well-known/ {' >> $filename
  134. echo ' allow all;' >> $filename
  135. echo ' }' >> $filename
  136. if [ ! -d /var/www/${domain_name}/htdocs/.well-known ]; then
  137. mkdir -p /var/www/${domain_name}/htdocs/.well-known
  138. fi
  139. if [ ! -f /var/www/${domain_name}/htdocs/keybase.txt ]; then
  140. touch /var/www/${domain_name}/htdocs/keybase.txt
  141. fi
  142. if [ ! -f /var/www/${domain_name}/htdocs/.well-known/keybase.txt ]; then
  143. touch /var/www/${domain_name}/htdocs/.well-known/keybase.txt
  144. fi
  145. }
  146. # check an individual domain name
  147. function test_domain_name {
  148. if [ $1 ]; then
  149. TEST_DOMAIN_NAME=$1
  150. function_check validate_domain_name
  151. validate_domain_name
  152. if [[ $TEST_DOMAIN_NAME != $1 ]]; then
  153. echo $TEST_DOMAIN_NAME
  154. exit 8528
  155. fi
  156. fi
  157. }
  158. # Checks whether certificates were generated for the given hostname
  159. function check_certificates {
  160. if [ ! $1 ]; then
  161. return
  162. fi
  163. USE_LETSENCRYPT='no'
  164. if [ $2 ]; then
  165. USE_LETSENCRYPT=$2
  166. fi
  167. if [[ $USE_LETSENCRYPT == 'no' ]]; then
  168. if [ ! -f /etc/ssl/private/${1}.key ]; then
  169. echo $"Private certificate for ${CHECK_HOSTNAME} was not created"
  170. exit 63959
  171. fi
  172. if [ ! -f /etc/ssl/certs/${1}.crt ]; then
  173. echo $"Public certificate for ${CHECK_HOSTNAME} was not created"
  174. exit 7679
  175. fi
  176. if grep -q "${1}.pem" /etc/nginx/sites-available/${1}; then
  177. sed -i "s|${1}.pem|${1}.crt|g" /etc/nginx/sites-available/${1}
  178. fi
  179. else
  180. if [ ! -f /etc/letsencrypt/live/${1}/privkey.pem ]; then
  181. echo $"Private certificate for ${CHECK_HOSTNAME} was not created"
  182. exit 6282
  183. fi
  184. if [ ! -f /etc/letsencrypt/live/${1}/fullchain.pem ]; then
  185. echo $"Public certificate for ${CHECK_HOSTNAME} was not created"
  186. exit 5328
  187. fi
  188. if grep -q "${1}.crt" /etc/nginx/sites-available/${1}; then
  189. sed -i "s|${1}.crt|${1}.pem|g" /etc/nginx/sites-available/${1}
  190. fi
  191. fi
  192. if [ ! -f /etc/ssl/certs/${1}.dhparam ]; then
  193. echo $"Diffie–Hellman parameters for ${CHECK_HOSTNAME} were not created"
  194. exit 5989
  195. fi
  196. }
  197. function cert_exists {
  198. cert_type='dhparam'
  199. if [ $2 ]; then
  200. cert_type="$2"
  201. fi
  202. if [ -f /etc/ssl/certs/${1}.${cert_type} ]; then
  203. echo "1"
  204. else
  205. if [ -f /etc/letsencrypt/live/${1}/fullchain.${cert_type} ]; then
  206. echo "1"
  207. else
  208. echo "0"
  209. fi
  210. fi
  211. }
  212. function create_self_signed_cert {
  213. ${PROJECT_NAME}-addcert -h ${SITE_DOMAIN_NAME} --dhkey ${DH_KEYLENGTH}
  214. function_check check_certificates
  215. check_certificates ${SITE_DOMAIN_NAME}
  216. }
  217. function create_letsencrypt_cert {
  218. ${PROJECT_NAME}-addcert -e ${SITE_DOMAIN_NAME} -s ${LETSENCRYPT_SERVER} --dhkey ${DH_KEYLENGTH} --email ${MY_EMAIL_ADDRESS}
  219. if [ ! "$?" = "0" ]; then
  220. if [[ ${NO_SELF_SIGNED} == 'no' ]]; then
  221. echo $"Lets Encrypt failed for ${SITE_DOMAIN_NAME}, so try making a self-signed cert"
  222. ${PROJECT_NAME}-addcert -h ${SITE_DOMAIN_NAME} --dhkey ${DH_KEYLENGTH}
  223. function_check check_certificates
  224. check_certificates ${SITE_DOMAIN_NAME}
  225. else
  226. echo $"Lets Encrypt failed for $SITE_DOMAIN_NAME"
  227. exit 682529
  228. fi
  229. return
  230. fi
  231. function_check check_certificates
  232. check_certificates ${SITE_DOMAIN_NAME} 'yes'
  233. }
  234. function create_site_certificate {
  235. SITE_DOMAIN_NAME="$1"
  236. # if yes then only "valid" certs are allowed, not self-signed
  237. NO_SELF_SIGNED='no'
  238. if [ $2 ]; then
  239. NO_SELF_SIGNED="$2"
  240. fi
  241. if [[ $ONION_ONLY == "no" ]]; then
  242. if [[ "$(cert_exists ${SITE_DOMAIN_NAME})" == "0" ]]; then
  243. if [[ $LETSENCRYPT_ENABLED != "yes" ]]; then
  244. create_self_signed_cert
  245. else
  246. create_letsencrypt_cert
  247. fi
  248. else
  249. if [[ $LETSENCRYPT_ENABLED == "yes" ]]; then
  250. if [[ "$(cert_exists ${SITE_DOMAIN_NAME} pem)" == "0" ]]; then
  251. create_letsencrypt_cert
  252. fi
  253. fi
  254. fi
  255. fi
  256. }
  257. # script to automatically renew any Let's Encrypt certificates
  258. function letsencrypt_renewals {
  259. if [[ $ONION_ONLY != "no" ]]; then
  260. return
  261. fi
  262. renewals_script=/etc/cron.monthly/letsencrypt
  263. renewals_retry_script=/etc/cron.daily/letsencrypt
  264. renewal_failure_msg=$'The certificate for $LETSENCRYPT_DOMAIN could not be renewed'
  265. renewal_email_title=$'${PROJECT_NAME} Lets Encrypt certificate renewal'
  266. # the main script tries to renew once per month
  267. echo '#!/bin/bash' > $renewals_script
  268. echo '' >> $renewals_script
  269. echo "PROJECT_NAME='${PROJECT_NAME}'" >> $renewals_script
  270. echo 'COMPLETION_FILE=$HOME/${PROJECT_NAME}-completed.txt' >> $renewals_script
  271. echo '' >> $renewals_script
  272. echo 'if [ -d /etc/letsencrypt ]; then' >> $renewals_script
  273. echo ' if [ -f ~/letsencrypt_failed ]; then' >> $renewals_script
  274. echo ' rm ~/letsencrypt_failed' >> $renewals_script
  275. echo ' fi' >> $renewals_script
  276. echo -n ' ADMIN_USERNAME=$(cat $COMPLETION_FILE | grep "Admin user" | ' >> $renewals_script
  277. echo -n "awk -F ':' '{print " >> $renewals_script
  278. echo -n '$2' >> $renewals_script
  279. echo "}')" >> $renewals_script
  280. echo ' ADMIN_EMAIL_ADDRESS=$ADMIN_USERNAME@$HOSTNAME' >> $renewals_script
  281. echo ' for d in /etc/letsencrypt/live/*/ ; do' >> $renewals_script
  282. echo -n ' LETSENCRYPT_DOMAIN=$(echo "$d" | ' >> $renewals_script
  283. echo -n "awk -F '/' '{print " >> $renewals_script
  284. echo -n '$5' >> $renewals_script
  285. echo "}')" >> $renewals_script
  286. echo ' if [ -f /etc/nginx/sites-available/$LETSENCRYPT_DOMAIN ]; then' >> $renewals_script
  287. echo ' ${PROJECT_NAME}-renew-cert -h $LETSENCRYPT_DOMAIN -p letsencrypt' >> $renewals_script
  288. echo ' if [ ! "$?" = "0" ]; then' >> $renewals_script
  289. echo " echo \"${renewal_failure_msg}\" > ~/temp_renewletsencrypt.txt" >> $renewals_script
  290. echo ' echo "" >> ~/temp_renewletsencrypt.txt' >> $renewals_script
  291. echo ' ${PROJECT_NAME}-renew-cert -h $LETSENCRYPT_DOMAIN -p letsencrypt 2>> ~/temp_renewletsencrypt.txt' >> $renewals_script
  292. echo -n " cat ~/temp_renewletsencrypt.txt | mail -s \"${renewal_email_title}\" " >> $renewals_script
  293. echo '$ADMIN_EMAIL_ADDRESS' >> $renewals_script
  294. echo ' rm ~/temp_renewletsencrypt.txt' >> $renewals_script
  295. echo ' if [ ! -f ~/letsencrypt_failed ]; then' >> $renewals_script
  296. echo ' touch ~/letsencrypt_failed' >> $renewals_script
  297. echo ' fi' >> $renewals_script
  298. echo ' fi' >> $renewals_script
  299. echo ' fi' >> $renewals_script
  300. echo ' done' >> $renewals_script
  301. echo 'fi' >> $renewals_script
  302. chmod +x $renewals_script
  303. # a secondary script keeps trying to renew after a failure
  304. echo '#!/bin/bash' > $renewals_retry_script
  305. echo '' >> $renewals_retry_script
  306. echo "PROJECT_NAME='${PROJECT_NAME}'" >> $renewals_retry_script
  307. echo 'COMPLETION_FILE=$HOME/${PROJECT_NAME}-completed.txt' >> $renewals_retry_script
  308. echo '' >> $renewals_retry_script
  309. echo 'if [ -d /etc/letsencrypt ]; then' >> $renewals_retry_script
  310. echo ' if [ -f ~/letsencrypt_failed ]; then' >> $renewals_retry_script
  311. echo ' rm ~/letsencrypt_failed' >> $renewals_retry_script
  312. echo -n ' ADMIN_USERNAME=$(cat $COMPLETION_FILE | grep "Admin user" | ' >> $renewals_retry_script
  313. echo -n "awk -F ':' '{print " >> $renewals_retry_script
  314. echo -n '$2' >> $renewals_retry_script
  315. echo "}')" >> $renewals_retry_script
  316. echo ' ADMIN_EMAIL_ADDRESS=$ADMIN_USERNAME@$HOSTNAME' >> $renewals_retry_script
  317. echo ' for d in /etc/letsencrypt/live/*/ ; do' >> $renewals_retry_script
  318. echo -n ' LETSENCRYPT_DOMAIN=$(echo "$d" | ' >> $renewals_retry_script
  319. echo -n "awk -F '/' '{print " >> $renewals_retry_script
  320. echo -n '$5' >> $renewals_retry_script
  321. echo "}')" >> $renewals_retry_script
  322. echo ' if [ -f /etc/nginx/sites-available/$LETSENCRYPT_DOMAIN ]; then' >> $renewals_retry_script
  323. echo ' ${PROJECT_NAME}-renew-cert -h $LETSENCRYPT_DOMAIN -p letsencrypt' >> $renewals_retry_script
  324. echo ' if [ ! "$?" = "0" ]; then' >> $renewals_retry_script
  325. echo " echo \"${renewal_failure_msg}\" > ~/temp_renewletsencrypt.txt" >> $renewals_retry_script
  326. echo ' echo "" >> ~/temp_renewletsencrypt.txt' >> $renewals_retry_script
  327. echo ' ${PROJECT_NAME}-renew-cert -h $LETSENCRYPT_DOMAIN -p letsencrypt 2>> ~/temp_renewletsencrypt.txt' >> $renewals_retry_script
  328. echo -n " cat ~/temp_renewletsencrypt.txt | mail -s \"${renewal_email_title}\" " >> $renewals_retry_script
  329. echo '$ADMIN_EMAIL_ADDRESS' >> $renewals_retry_script
  330. echo ' rm ~/temp_renewletsencrypt.txt' >> $renewals_retry_script
  331. echo ' if [ ! -f ~/letsencrypt_failed ]; then' >> $renewals_retry_script
  332. echo ' touch ~/letsencrypt_failed' >> $renewals_retry_script
  333. echo ' fi' >> $renewals_retry_script
  334. echo ' fi' >> $renewals_retry_script
  335. echo ' fi' >> $renewals_retry_script
  336. echo ' done' >> $renewals_retry_script
  337. echo ' fi' >> $renewals_retry_script
  338. echo 'fi' >> $renewals_retry_script
  339. chmod +x $renewals_retry_script
  340. }
  341. function configure_php {
  342. sed -i "s/memory_limit = 128M/memory_limit = ${MAX_PHP_MEMORY}M/g" /etc/php5/fpm/php.ini
  343. sed -i 's/;cgi.fix_pathinfo=1/cgi.fix_pathinfo=0/g' /etc/php5/fpm/php.ini
  344. sed -i "s/memory_limit = -1/memory_limit = ${MAX_PHP_MEMORY}M/g" /etc/php5/cli/php.ini
  345. sed -i "s/upload_max_filesize = 2M/upload_max_filesize = 50M/g" /etc/php5/fpm/php.ini
  346. sed -i "s/post_max_size = 8M/post_max_size = 50M/g" /etc/php5/fpm/php.ini
  347. }
  348. function install_web_server_access_control {
  349. if [ ! -f /etc/pam.d/nginx ]; then
  350. echo '#%PAM-1.0' > /etc/pam.d/nginx
  351. echo '@include common-auth' >> /etc/pam.d/nginx
  352. echo '@include common-account' >> /etc/pam.d/nginx
  353. echo '@include common-session' >> /etc/pam.d/nginx
  354. fi
  355. }
  356. function install_dynamicdns {
  357. if [[ $SYSTEM_TYPE == "mesh"* ]]; then
  358. return
  359. fi
  360. if [[ $ONION_ONLY != "no" ]]; then
  361. return
  362. fi
  363. # update to the next commit
  364. function_check set_repo_commit
  365. set_repo_commit $INSTALL_DIR/inadyn "inadyn commit" "$INADYN_COMMIT" $INADYN_REPO
  366. if [[ $(is_completed $FUNCNAME) == "1" ]]; then
  367. return
  368. fi
  369. # Here we compile from source because the current package
  370. # doesn't support https, which could result in passwords
  371. # being leaked
  372. # Debian version 1.99.4-1
  373. # https version 1.99.8
  374. apt-get -yq install build-essential curl libgnutls28-dev automake1.11
  375. if [ ! -d $INSTALL_DIR/inadyn ]; then
  376. git_clone $INADYN_REPO $INSTALL_DIR/inadyn
  377. fi
  378. if [ ! -d $INSTALL_DIR/inadyn ]; then
  379. echo 'inadyn repo not cloned'
  380. echo -n | openssl s_client -showcerts -connect github.com:443 -CApath /etc/ssl/certs
  381. exit 6785
  382. fi
  383. cd $INSTALL_DIR/inadyn
  384. git checkout $INADYN_COMMIT -b $INADYN_COMMIT
  385. set_completion_param "inadyn commit" "$INADYN_COMMIT"
  386. ./configure
  387. if [ ! "$?" = "0" ]; then
  388. exit 74890
  389. fi
  390. USE_OPENSSL=1 make
  391. if [ ! "$?" = "0" ]; then
  392. exit 74858
  393. fi
  394. make install
  395. if [ ! "$?" = "0" ]; then
  396. exit 3785
  397. fi
  398. # create an unprivileged user
  399. #chmod 600 /etc/shadow
  400. #chmod 600 /etc/gshadow
  401. #useradd -r -s /bin/false debian-inadyn
  402. #chmod 0000 /etc/shadow
  403. #chmod 0000 /etc/gshadow
  404. # create a configuration file
  405. echo 'background' > /etc/inadyn.conf
  406. echo 'verbose 1' >> /etc/inadyn.conf
  407. echo 'period 300' >> /etc/inadyn.conf
  408. echo 'startup-delay 60' >> /etc/inadyn.conf
  409. echo 'cache-dir /run/inadyn' >> /etc/inadyn.conf
  410. echo 'logfile /dev/null' >> /etc/inadyn.conf
  411. chmod 600 /etc/inadyn.conf
  412. echo '[Unit]' > /etc/systemd/system/inadyn.service
  413. echo 'Description=inadyn (DynDNS updater)' >> /etc/systemd/system/inadyn.service
  414. echo 'After=network.target' >> /etc/systemd/system/inadyn.service
  415. echo '' >> /etc/systemd/system/inadyn.service
  416. echo '[Service]' >> /etc/systemd/system/inadyn.service
  417. echo 'ExecStart=/usr/local/sbin/inadyn --config /etc/inadyn.conf' >> /etc/systemd/system/inadyn.service
  418. echo 'Restart=always' >> /etc/systemd/system/inadyn.service
  419. echo 'Type=forking' >> /etc/systemd/system/inadyn.service
  420. echo '' >> /etc/systemd/system/inadyn.service
  421. echo '[Install]' >> /etc/systemd/system/inadyn.service
  422. echo 'WantedBy=multi-user.target' >> /etc/systemd/system/inadyn.service
  423. systemctl enable inadyn
  424. systemctl start inadyn
  425. systemctl daemon-reload
  426. mark_completed $FUNCNAME
  427. }
  428. function install_command_line_browser {
  429. if [[ $(is_completed $FUNCNAME) == "1" ]]; then
  430. return
  431. fi
  432. apt-get -yq install elinks
  433. # set the home page
  434. if ! grep -q "WWW_HOME" /home/$MY_USERNAME/.bashrc; then
  435. if ! grep -q 'control' /home/$MY_USERNAME/.bashrc; then
  436. echo "export WWW_HOME=$DEFAULT_SEARCH" >> /home/$MY_USERNAME/.bashrc
  437. else
  438. sed -i "/control/i export WWW_HOME=$DEFAULT_SEARCH" /home/$MY_USERNAME/.bashrc
  439. fi
  440. fi
  441. mark_completed $FUNCNAME
  442. }
  443. function mesh_web_server {
  444. if [ -d /etc/apache2 ]; then
  445. chroot "$rootdir" apt-get -yq remove --purge apache2
  446. chroot "$rootdir" rm -rf /etc/apache2
  447. fi
  448. chroot "$rootdir" apt-get -yq install nginx
  449. if [ ! -d $rootdir/etc/nginx ]; then
  450. echo $'Unable to install web server'
  451. exit 346825
  452. fi
  453. }
  454. function install_web_server {
  455. if [ $INSTALLING_MESH ]; then
  456. mesh_web_server
  457. return
  458. fi
  459. # update to the next commit
  460. function_check set_repo_commit
  461. set_repo_commit $INSTALL_DIR/nginx_ensite "nginx-ensite commit" "$NGINX_ENSITE_COMMIT" $NGINX_ENSITE_REPO
  462. if [[ $(is_completed $FUNCNAME) == "1" ]]; then
  463. return
  464. fi
  465. # remove apache
  466. apt-get -yq remove --purge apache2
  467. if [ -d /etc/apache2 ]; then
  468. rm -rf /etc/apache2
  469. fi
  470. # install nginx
  471. apt-get -yq install nginx php5-fpm git
  472. # Turn off logs by default
  473. sed -i 's|access_log.*|access_log = /dev/null;|g' /etc/nginx/nginx.conf
  474. sed -i 's|error_log.*|error_log = /dev/null;|g' /etc/nginx/nginx.conf
  475. # limit the number of php processes
  476. sed -i 's/; process.max =.*/process.max = 32/g' /etc/php5/fpm/php-fpm.conf
  477. #sed -i 's/;process_control_timeout =.*/process_control_timeout = 300/g' /etc/php5/fpm/php-fpm.conf
  478. if ! grep -q "pm.max_children" /etc/php5/fpm/php-fpm.conf; then
  479. echo 'pm.max_children = 10' >> /etc/php5/fpm/php-fpm.conf
  480. echo 'pm.start_servers = 2' >> /etc/php5/fpm/php-fpm.conf
  481. echo 'pm.min_spare_servers = 2' >> /etc/php5/fpm/php-fpm.conf
  482. echo 'pm.max_spare_servers = 5' >> /etc/php5/fpm/php-fpm.conf
  483. echo 'pm.max_requests = 50' >> /etc/php5/fpm/php-fpm.conf
  484. fi
  485. if [ ! -d /etc/nginx ]; then
  486. echo $"ERROR: nginx does not appear to have installed. $CHECK_MESSAGE"
  487. exit 51
  488. fi
  489. # Nginx settings
  490. echo 'user www-data;' > /etc/nginx/nginx.conf
  491. #echo "worker_processes; $CPU_CORES" >> /etc/nginx/nginx.conf
  492. echo 'pid /run/nginx.pid;' >> /etc/nginx/nginx.conf
  493. echo '' >> /etc/nginx/nginx.conf
  494. echo 'events {' >> /etc/nginx/nginx.conf
  495. echo ' worker_connections 50;' >> /etc/nginx/nginx.conf
  496. echo ' # multi_accept on;' >> /etc/nginx/nginx.conf
  497. echo '}' >> /etc/nginx/nginx.conf
  498. echo '' >> /etc/nginx/nginx.conf
  499. echo 'http {' >> /etc/nginx/nginx.conf
  500. echo ' # limit the number of connections per single IP' >> /etc/nginx/nginx.conf
  501. echo ' limit_conn_zone $binary_remote_addr zone=conn_limit_per_ip:10m;' >> /etc/nginx/nginx.conf
  502. echo '' >> /etc/nginx/nginx.conf
  503. echo ' # limit the number of requests for a given session' >> /etc/nginx/nginx.conf
  504. echo ' limit_req_zone $binary_remote_addr zone=req_limit_per_ip:10m rate=140r/s;' >> /etc/nginx/nginx.conf
  505. echo '' >> /etc/nginx/nginx.conf
  506. echo ' # if the request body size is more than the buffer size, then the entire (or partial) request body is written into a temporary file' >> /etc/nginx/nginx.conf
  507. echo ' client_body_buffer_size 128k;' >> /etc/nginx/nginx.conf
  508. echo '' >> /etc/nginx/nginx.conf
  509. echo ' # headerbuffer size for the request header from client, its set for testing purpose' >> /etc/nginx/nginx.conf
  510. echo ' client_header_buffer_size 3m;' >> /etc/nginx/nginx.conf
  511. echo '' >> /etc/nginx/nginx.conf
  512. echo ' # maximum number and size of buffers for large headers to read from client request' >> /etc/nginx/nginx.conf
  513. echo ' large_client_header_buffers 4 256k;' >> /etc/nginx/nginx.conf
  514. echo '' >> /etc/nginx/nginx.conf
  515. echo ' # read timeout for the request body from client, its set for testing purpose' >> /etc/nginx/nginx.conf
  516. echo ' client_body_timeout 3m;' >> /etc/nginx/nginx.conf
  517. echo '' >> /etc/nginx/nginx.conf
  518. echo ' # how long to wait for the client to send a request header, its set for testing purpose' >> /etc/nginx/nginx.conf
  519. echo ' client_header_timeout 3m;' >> /etc/nginx/nginx.conf
  520. echo '' >> /etc/nginx/nginx.conf
  521. echo ' ##' >> /etc/nginx/nginx.conf
  522. echo ' # Basic Settings' >> /etc/nginx/nginx.conf
  523. echo ' ##' >> /etc/nginx/nginx.conf
  524. echo '' >> /etc/nginx/nginx.conf
  525. echo ' sendfile on;' >> /etc/nginx/nginx.conf
  526. echo ' tcp_nopush on;' >> /etc/nginx/nginx.conf
  527. echo ' tcp_nodelay on;' >> /etc/nginx/nginx.conf
  528. echo ' keepalive_timeout 65;' >> /etc/nginx/nginx.conf
  529. echo ' types_hash_max_size 2048;' >> /etc/nginx/nginx.conf
  530. echo ' server_tokens off;' >> /etc/nginx/nginx.conf
  531. echo '' >> /etc/nginx/nginx.conf
  532. echo ' # server_names_hash_bucket_size 64;' >> /etc/nginx/nginx.conf
  533. echo ' # server_name_in_redirect off;' >> /etc/nginx/nginx.conf
  534. echo '' >> /etc/nginx/nginx.conf
  535. echo ' include /etc/nginx/mime.types;' >> /etc/nginx/nginx.conf
  536. echo ' default_type application/octet-stream;' >> /etc/nginx/nginx.conf
  537. echo '' >> /etc/nginx/nginx.conf
  538. echo ' ##' >> /etc/nginx/nginx.conf
  539. echo ' # Logging Settings' >> /etc/nginx/nginx.conf
  540. echo ' ##' >> /etc/nginx/nginx.conf
  541. echo '' >> /etc/nginx/nginx.conf
  542. echo ' access_log /dev/null;' >> /etc/nginx/nginx.conf
  543. echo ' error_log /dev/null;' >> /etc/nginx/nginx.conf
  544. echo '' >> /etc/nginx/nginx.conf
  545. echo ' ###' >> /etc/nginx/nginx.conf
  546. echo ' # Gzip Settings' >> /etc/nginx/nginx.conf
  547. echo ' ##' >> /etc/nginx/nginx.conf
  548. echo ' gzip on;' >> /etc/nginx/nginx.conf
  549. echo ' gzip_disable "msie6";' >> /etc/nginx/nginx.conf
  550. echo '' >> /etc/nginx/nginx.conf
  551. echo ' # gzip_vary on;' >> /etc/nginx/nginx.conf
  552. echo ' # gzip_proxied any;' >> /etc/nginx/nginx.conf
  553. echo ' # gzip_comp_level 6;' >> /etc/nginx/nginx.conf
  554. echo ' # gzip_buffers 16 8k;' >> /etc/nginx/nginx.conf
  555. echo ' # gzip_http_version 1.1;' >> /etc/nginx/nginx.conf
  556. echo ' # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript;' >> /etc/nginx/nginx.conf
  557. echo '' >> /etc/nginx/nginx.conf
  558. echo ' ##' >> /etc/nginx/nginx.conf
  559. echo ' # Virtual Host Configs' >> /etc/nginx/nginx.conf
  560. echo ' ##' >> /etc/nginx/nginx.conf
  561. echo '' >> /etc/nginx/nginx.conf
  562. echo ' include /etc/nginx/conf.d/*.conf;' >> /etc/nginx/nginx.conf
  563. echo ' include /etc/nginx/sites-enabled/*;' >> /etc/nginx/nginx.conf
  564. echo '}' >> /etc/nginx/nginx.conf
  565. # install a script to easily enable and disable nginx virtual hosts
  566. if [ ! -d $INSTALL_DIR ]; then
  567. mkdir $INSTALL_DIR
  568. fi
  569. cd $INSTALL_DIR
  570. function_check git_clone
  571. git_clone $NGINX_ENSITE_REPO $INSTALL_DIR/nginx_ensite
  572. cd $INSTALL_DIR/nginx_ensite
  573. git checkout $NGINX_ENSITE_COMMIT -b $NGINX_ENSITE_COMMIT
  574. set_completion_param "nginx-ensite commit" "$NGINX_ENSITE_COMMIT"
  575. make install
  576. nginx_dissite default
  577. function_check configure_firewall_for_web_access
  578. configure_firewall_for_web_access
  579. mark_completed $FUNCNAME
  580. }
  581. function remove_certs {
  582. domain_name=$1
  583. if [ ! $domain_name ]; then
  584. return
  585. fi
  586. if [ -f /etc/ssl/certs/${domain_name}.dhparam ]; then
  587. rm /etc/ssl/certs/${domain_name}.dhparam
  588. fi
  589. if [ -f /etc/ssl/certs/${domain_name}.pem ]; then
  590. rm /etc/ssl/certs/${domain_name}.pem
  591. fi
  592. if [ -f /etc/ssl/certs/${domain_name}.crt ]; then
  593. rm /etc/ssl/certs/${domain_name}.crt
  594. fi
  595. if [ -f /etc/ssl/private/${domain_name}.key ]; then
  596. rm /etc/ssl/private/${domain_name}.key
  597. fi
  598. }
  599. function configure_firewall_for_web_access {
  600. if [[ $(is_completed $FUNCNAME) == "1" ]]; then
  601. return
  602. fi
  603. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  604. # docker does its own firewalling
  605. return
  606. fi
  607. if [[ $ONION_ONLY != "no" ]]; then
  608. return
  609. fi
  610. firewall_add HTTP 80 tcp
  611. firewall_add HTTPS 443 tcp
  612. mark_completed $FUNCNAME
  613. }
  614. function update_default_domain {
  615. echo $'Updating default domain'
  616. if [[ $ONION_ONLY == 'no' ]]; then
  617. if [ -d /etc/prosody ]; then
  618. if [ -d /etc/jitsi ]; then
  619. read_config_param "JITSI_DOMAIN_NAME"
  620. if [ ${#JITSI_DOMAIN_NAME} -gt 0 ]; then
  621. if [ -f /etc/ssl/private/${JITSI_DOMAIN_NAME}.key ]; then
  622. cp /etc/ssl/private/${JITSI_DOMAIN_NAME}.key /etc/prosody/certs/${JITSI_DOMAIN_NAME}.key
  623. fi
  624. if [ -f /etc/ssl/certs/${JITSI_DOMAIN_NAME}.crt ]; then
  625. cp /etc/ssl/certs/${JITSI_DOMAIN_NAME}.crt /etc/prosody/certs/${JITSI_DOMAIN_NAME}.pem
  626. fi
  627. if [ -f /etc/ssl/certs/${JITSI_DOMAIN_NAME}.pem ]; then
  628. cp /etc/ssl/certs/${JITSI_DOMAIN_NAME}.pem /etc/prosody/certs/${JITSI_DOMAIN_NAME}.pem
  629. fi
  630. fi
  631. fi
  632. if [ ! -d /etc/prosody/certs ]; then
  633. mkdir /etc/prosody/certs
  634. fi
  635. cp /etc/ssl/private/xmpp* /etc/prosody/certs
  636. cp /etc/ssl/private/${DEFAULT_DOMAIN_NAME}* /etc/prosody/certs
  637. cp /etc/ssl/certs/xmpp* /etc/prosody/certs
  638. cp /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}* /etc/prosody/certs
  639. if [ ! -f /etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.dhparam ]; then
  640. if [ -f /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.dhparam ]; then
  641. cp /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.dhparam /etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.dhparam
  642. fi
  643. fi
  644. if [ ! /etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.pem ]; then
  645. if [ ! /etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.crt ]; then
  646. mv /etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.crt /etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.pem
  647. fi
  648. else
  649. sed -i "s|/etc/prosody/certs/xmpp.key|/etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.key|g" /etc/prosody/conf.avail/xmpp.cfg.lua
  650. sed -i "s|/etc/prosody/certs/xmpp.crt|/etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.pem|g" /etc/prosody/conf.avail/xmpp.cfg.lua
  651. sed -i "s|/etc/prosody/certs/xmpp.key|/etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.key|g" /etc/prosody/prosody.cfg.lua
  652. sed -i "s|/etc/prosody/certs/xmpp.crt|/etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.pem|g" /etc/prosody/prosody.cfg.lua
  653. fi
  654. chown -R prosody:default /etc/prosody
  655. chmod -R 700 /etc/prosody/certs/*
  656. chmod 600 /etc/prosody/prosody.cfg.lua
  657. systemctl reload prosody
  658. fi
  659. if [ -d /var/lib/mumble-server ]; then
  660. if [[ "$(cert_exists ${DEFAULT_DOMAIN_NAME} pem)" == "1" ]]; then
  661. cp /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem /var/lib/mumble-server/mumble.pem
  662. cp /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.dhparam /var/lib/mumble-server/mumble.dhparam
  663. cp /etc/ssl/private/${DEFAULT_DOMAIN_NAME}.key /var/lib/mumble-server/mumble.key
  664. chown -R mumble-server:mumble-server /var/lib/mumble-server
  665. chmod -R 700 /var/lib/mumble-server/${DEFAULT_DOMAIN_NAME}.pem
  666. chmod -R 700 /var/lib/mumble-server/${DEFAULT_DOMAIN_NAME}.key
  667. chmod -R 700 /var/lib/mumble-server/${DEFAULT_DOMAIN_NAME}.dhparam
  668. systemctl reload mumble
  669. fi
  670. fi
  671. if [ -d /home/znc/.znc ]; then
  672. echo $'znc found'
  673. if [[ "$(cert_exists ${DEFAULT_DOMAIN_NAME} pem)" == "1" ]]; then
  674. pkill znc
  675. cat /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem /etc/ssl/private/${DEFAULT_DOMAIN_NAME}.key > /home/znc/.znc/znc.pem
  676. chown znc:znc /home/znc/.znc/znc.pem
  677. chmod 700 /home/znc/.znc/znc.pem
  678. sed -i "s|CertFile =.*|CertFile = /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem" /etc/ngircd/ngircd.conf
  679. sed -i "s|DHFile =.*|DHFile = /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.dhparam" /etc/ngircd/ngircd.conf
  680. sed -i "s|KeyFile =.*|KeyFile = /etc/ssl/private/${DEFAULT_DOMAIN_NAME}.key" /etc/ngircd/ngircd.conf
  681. echo $'irc certificates updated'
  682. systemctl restart ngircd
  683. su -c 'znc' - znc
  684. fi
  685. fi
  686. if [ -d /etc/dovecot ]; then
  687. if [ ${#DEFAULT_DOMAIN_NAME} -gt 0 ]; then
  688. if ! grep -q "ssl_cert = </etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem" /etc/dovecot/conf.d/10-ssl.conf; then
  689. sed -i "s|#ssl_cert =.*|ssl_cert = </etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem|g" /etc/dovecot/conf.d/10-ssl.conf
  690. sed -i "s|ssl_cert =.*|ssl_cert = </etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem|g" /etc/dovecot/conf.d/10-ssl.conf
  691. systemctl restart dovecot
  692. fi
  693. fi
  694. fi
  695. if [ -d /etc/matrix-synapse ]; then
  696. cp /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem /etc/matrix-synapse/homeserver.tls.crt
  697. cp /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.dhparam /etc/matrix-synapse/homeserver.tls.dh
  698. cp /etc/ssl/private/${DEFAULT_DOMAIN_NAME}.key /etc/matrix-synapse/homeserver.tls.key
  699. chown matrix-synapse: /etc/matrix-synapse/homeserver.tls.key
  700. chown matrix-synapse: /etc/matrix-synapse/homeserver.tls.dh
  701. chown matrix-synapse: /etc/matrix-synapse/homeserver.tls.crt
  702. chmod -R 700 /etc/matrix-synapse/homeserver.tls.key
  703. chmod -R 700 /etc/matrix-synapse/homeserver.tls.dh
  704. chmod -R 700 /etc/matrix-synapse/homeserver.tls.crt
  705. systemctl restart matrix-synapse
  706. fi
  707. fi
  708. }
  709. # NOTE: deliberately no exit 0