freedombone-utils-web 33KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791
  1. #!/bin/bash
  2. #
  3. # .---. . .
  4. # | | |
  5. # |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
  6. # | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
  7. # ' ' --' --' -' - -' ' ' -' -' -' ' - --'
  8. #
  9. # Freedom in the Cloud
  10. #
  11. # Web related functions
  12. #
  13. # License
  14. # =======
  15. #
  16. # Copyright (C) 2014-2016 Bob Mottram <bob@freedombone.net>
  17. #
  18. # This program is free software: you can redistribute it and/or modify
  19. # it under the terms of the GNU Affero General Public License as published by
  20. # the Free Software Foundation, either version 3 of the License, or
  21. # (at your option) any later version.
  22. #
  23. # This program is distributed in the hope that it will be useful,
  24. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  25. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  26. # GNU Affero General Public License for more details.
  27. #
  28. # You should have received a copy of the GNU Affero General Public License
  29. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  30. # default search engine for command line browser
  31. DEFAULT_SEARCH='https://searx.laquadrature.net'
  32. # Whether Let's Encrypt is enabled for all sites
  33. LETSENCRYPT_ENABLED="no"
  34. LETSENCRYPT_SERVER='https://acme-v01.api.letsencrypt.org/directory'
  35. # list of encryption protocols
  36. SSL_PROTOCOLS="TLSv1 TLSv1.1 TLSv1.2"
  37. # list of ciphers to use. See bettercrypto.org recommendations
  38. SSL_CIPHERS="EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA256:EECDH:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!IDEA:!ECDSA:kEDH:CAMELLIA128-SHA:AES128-SHA"
  39. NGINX_ENSITE_REPO="https://github.com/perusio/nginx_ensite"
  40. NGINX_ENSITE_COMMIT='fa4d72ce1c0a490442c8474e9c8dc21ed52c93d0'
  41. # memory limit for php in MB
  42. MAX_PHP_MEMORY=64
  43. # logging level for Nginx
  44. WEBSERVER_LOG_LEVEL='warn'
  45. # test a domain name to see if it's valid
  46. function validate_domain_name {
  47. # count the number of dots in the domain name
  48. dots=${TEST_DOMAIN_NAME//[^.]}
  49. no_of_dots=${#dots}
  50. if (( $no_of_dots > 3 )); then
  51. TEST_DOMAIN_NAME=$"The domain $TEST_DOMAIN_NAME has too many subdomains. It should be of the type w.x.y.z, x.y.z or y.z"
  52. fi
  53. if (( $no_of_dots == 0 )); then
  54. TEST_DOMAIN_NAME=$"The domain $TEST_DOMAIN_NAME has no top level domain. It should be of the type w.x.y.z, x.y.z or y.z"
  55. fi
  56. }
  57. function nginx_disable_sniffing {
  58. domain_name=$1
  59. filename=/etc/nginx/sites-available/$domain_name
  60. echo ' add_header X-Frame-Options DENY;' >> $filename
  61. echo ' add_header X-Content-Type-Options nosniff;' >> $filename
  62. echo '' >> $filename
  63. }
  64. function nginx_limits {
  65. domain_name=$1
  66. max_body='20m'
  67. if [ $2 ]; then
  68. max_body=$2
  69. fi
  70. filename=/etc/nginx/sites-available/$domain_name
  71. echo " client_max_body_size ${max_body};" >> $filename
  72. echo ' client_body_buffer_size 128k;' >> $filename
  73. echo '' >> $filename
  74. echo ' limit_conn conn_limit_per_ip 10;' >> $filename
  75. echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> $filename
  76. echo '' >> $filename
  77. }
  78. function nginx_stapling {
  79. domain_name=$1
  80. filename=/etc/nginx/sites-available/$domain_name
  81. echo " ssl_stapling on;" >> $filename
  82. echo ' ssl_stapling_verify on;' >> $filename
  83. echo ' ssl_trusted_certificate /etc/ssl/certs/${domain_name}.pem;' >> $filename
  84. echo '' >> $filename
  85. }
  86. function nginx_http_redirect {
  87. # redirect port 80 to https
  88. domain_name=$1
  89. filename=/etc/nginx/sites-available/$domain_name
  90. echo 'server {' > $filename
  91. echo ' listen 80;' >> $filename
  92. echo ' listen [::]:80;' >> $filename
  93. echo " server_name ${domain_name};" >> $filename
  94. echo " root /var/www/${domain_name}/htdocs;" >> $filename
  95. echo ' access_log /dev/null;' >> $filename
  96. echo " error_log /dev/null;" >> $filename
  97. function_check nginx_limits
  98. nginx_limits $domain_name
  99. echo ' rewrite ^ https://$server_name$request_uri? permanent;' >> $filename
  100. echo '}' >> $filename
  101. echo '' >> $filename
  102. }
  103. function nginx_ssl {
  104. # creates the SSL/TLS section for a website
  105. domain_name=$1
  106. filename=/etc/nginx/sites-available/$domain_name
  107. echo ' ssl_stapling off;' >> $filename
  108. echo ' ssl_stapling_verify off;' >> $filename
  109. echo ' ssl on;' >> $filename
  110. if [ -f /etc/ssl/certs/${domain_name}.pem ]; then
  111. echo " ssl_certificate /etc/ssl/certs/${domain_name}.pem;" >> $filename
  112. else
  113. echo " ssl_certificate /etc/ssl/certs/${domain_name}.crt;" >> $filename
  114. fi
  115. echo " ssl_certificate_key /etc/ssl/private/${domain_name}.key;" >> $filename
  116. echo " ssl_dhparam /etc/ssl/certs/${domain_name}.dhparam;" >> $filename
  117. echo '' >> $filename
  118. echo ' ssl_session_cache builtin:1000 shared:SSL:10m;' >> $filename
  119. echo ' ssl_session_timeout 60m;' >> $filename
  120. echo ' ssl_prefer_server_ciphers on;' >> $filename
  121. echo " ssl_protocols $SSL_PROTOCOLS;" >> $filename
  122. echo " ssl_ciphers '$SSL_CIPHERS';" >> $filename
  123. echo " add_header Content-Security-Policy \"default-src https:; script-src https: 'unsafe-inline'; style-src https: 'unsafe-inline'\";" >> $filename
  124. #nginx_stapling $1
  125. }
  126. function nginx_keybase {
  127. # creates files suitable for keybase.io verification
  128. domain_name=$1
  129. filename=/etc/nginx/sites-available/$domain_name
  130. echo '' >> $filename
  131. echo " # make sure webfinger and other well known services aren't blocked" >> $filename
  132. echo ' # by denying dot files and rewrite request to the front controller' >> $filename
  133. echo ' location ^~ /.well-known/ {' >> $filename
  134. echo ' allow all;' >> $filename
  135. echo ' }' >> $filename
  136. if [ ! -d /var/www/${domain_name}/htdocs/.well-known ]; then
  137. mkdir -p /var/www/${domain_name}/htdocs/.well-known
  138. fi
  139. if [ ! -f /var/www/${domain_name}/htdocs/keybase.txt ]; then
  140. touch /var/www/${domain_name}/htdocs/keybase.txt
  141. fi
  142. if [ ! -f /var/www/${domain_name}/htdocs/.well-known/keybase.txt ]; then
  143. touch /var/www/${domain_name}/htdocs/.well-known/keybase.txt
  144. fi
  145. }
  146. # check an individual domain name
  147. function test_domain_name {
  148. if [ $1 ]; then
  149. TEST_DOMAIN_NAME=$1
  150. if [[ $TEST_DOMAIN_NAME != 'ttrss' ]]; then
  151. function_check validate_domain_name
  152. validate_domain_name
  153. if [[ $TEST_DOMAIN_NAME != $1 ]]; then
  154. echo $"Invalid domain name $TEST_DOMAIN_NAME"
  155. exit 8528
  156. fi
  157. fi
  158. fi
  159. }
  160. # Checks whether certificates were generated for the given hostname
  161. function check_certificates {
  162. if [ ! $1 ]; then
  163. return
  164. fi
  165. USE_LETSENCRYPT='no'
  166. if [ $2 ]; then
  167. USE_LETSENCRYPT=$2
  168. fi
  169. if [[ $USE_LETSENCRYPT == 'no' ]]; then
  170. if [ ! -f /etc/ssl/private/${1}.key ]; then
  171. echo $"Private certificate for ${CHECK_HOSTNAME} was not created"
  172. exit 63959
  173. fi
  174. if [ ! -f /etc/ssl/certs/${1}.crt ]; then
  175. echo $"Public certificate for ${CHECK_HOSTNAME} was not created"
  176. exit 7679
  177. fi
  178. if grep -q "${1}.pem" /etc/nginx/sites-available/${1}; then
  179. sed -i "s|${1}.pem|${1}.crt|g" /etc/nginx/sites-available/${1}
  180. fi
  181. else
  182. if [ ! -f /etc/letsencrypt/live/${1}/privkey.pem ]; then
  183. echo $"Private certificate for ${CHECK_HOSTNAME} was not created"
  184. exit 6282
  185. fi
  186. if [ ! -f /etc/letsencrypt/live/${1}/fullchain.pem ]; then
  187. echo $"Public certificate for ${CHECK_HOSTNAME} was not created"
  188. exit 5328
  189. fi
  190. if grep -q "${1}.crt" /etc/nginx/sites-available/${1}; then
  191. sed -i "s|${1}.crt|${1}.pem|g" /etc/nginx/sites-available/${1}
  192. fi
  193. fi
  194. if [ ! -f /etc/ssl/certs/${1}.dhparam ]; then
  195. echo $"Diffie–Hellman parameters for ${CHECK_HOSTNAME} were not created"
  196. exit 5989
  197. fi
  198. }
  199. function cert_exists {
  200. cert_type='dhparam'
  201. if [ $2 ]; then
  202. cert_type="$2"
  203. fi
  204. if [ -f /etc/ssl/certs/${1}.${cert_type} ]; then
  205. echo "1"
  206. else
  207. if [ -f /etc/letsencrypt/live/${1}/fullchain.${cert_type} ]; then
  208. echo "1"
  209. else
  210. echo "0"
  211. fi
  212. fi
  213. }
  214. function create_self_signed_cert {
  215. ${PROJECT_NAME}-addcert -h ${SITE_DOMAIN_NAME} --dhkey ${DH_KEYLENGTH}
  216. function_check check_certificates
  217. check_certificates ${SITE_DOMAIN_NAME}
  218. }
  219. function create_letsencrypt_cert {
  220. ${PROJECT_NAME}-addcert -e ${SITE_DOMAIN_NAME} -s ${LETSENCRYPT_SERVER} --dhkey ${DH_KEYLENGTH} --email ${MY_EMAIL_ADDRESS}
  221. if [ ! "$?" = "0" ]; then
  222. if [[ ${NO_SELF_SIGNED} == 'no' ]]; then
  223. echo $"Lets Encrypt failed for ${SITE_DOMAIN_NAME}, so try making a self-signed cert"
  224. ${PROJECT_NAME}-addcert -h ${SITE_DOMAIN_NAME} --dhkey ${DH_KEYLENGTH}
  225. function_check check_certificates
  226. check_certificates ${SITE_DOMAIN_NAME}
  227. else
  228. echo $"Lets Encrypt failed for $SITE_DOMAIN_NAME"
  229. exit 682529
  230. fi
  231. return
  232. fi
  233. function_check check_certificates
  234. check_certificates ${SITE_DOMAIN_NAME} 'yes'
  235. }
  236. function create_site_certificate {
  237. SITE_DOMAIN_NAME="$1"
  238. # if yes then only "valid" certs are allowed, not self-signed
  239. NO_SELF_SIGNED='no'
  240. if [ $2 ]; then
  241. NO_SELF_SIGNED="$2"
  242. fi
  243. if [[ $ONION_ONLY == "no" ]]; then
  244. if [[ "$(cert_exists ${SITE_DOMAIN_NAME})" == "0" ]]; then
  245. if [[ $LETSENCRYPT_ENABLED != "yes" ]]; then
  246. create_self_signed_cert
  247. else
  248. create_letsencrypt_cert
  249. fi
  250. else
  251. if [[ $LETSENCRYPT_ENABLED == "yes" ]]; then
  252. if [[ "$(cert_exists ${SITE_DOMAIN_NAME} pem)" == "0" ]]; then
  253. create_letsencrypt_cert
  254. fi
  255. fi
  256. fi
  257. fi
  258. }
  259. # script to automatically renew any Let's Encrypt certificates
  260. function letsencrypt_renewals {
  261. if [[ $ONION_ONLY != "no" ]]; then
  262. return
  263. fi
  264. renewals_script=/etc/cron.monthly/letsencrypt
  265. renewals_retry_script=/etc/cron.daily/letsencrypt
  266. renewal_failure_msg=$'The certificate for $LETSENCRYPT_DOMAIN could not be renewed'
  267. renewal_email_title=$'${PROJECT_NAME} Lets Encrypt certificate renewal'
  268. # the main script tries to renew once per month
  269. echo '#!/bin/bash' > $renewals_script
  270. echo '' >> $renewals_script
  271. echo "PROJECT_NAME='${PROJECT_NAME}'" >> $renewals_script
  272. echo 'COMPLETION_FILE=$HOME/${PROJECT_NAME}-completed.txt' >> $renewals_script
  273. echo '' >> $renewals_script
  274. echo 'if [ -d /etc/letsencrypt ]; then' >> $renewals_script
  275. echo ' if [ -f ~/letsencrypt_failed ]; then' >> $renewals_script
  276. echo ' rm ~/letsencrypt_failed' >> $renewals_script
  277. echo ' fi' >> $renewals_script
  278. echo -n ' ADMIN_USERNAME=$(cat $COMPLETION_FILE | grep "Admin user" | ' >> $renewals_script
  279. echo -n "awk -F ':' '{print " >> $renewals_script
  280. echo -n '$2' >> $renewals_script
  281. echo "}')" >> $renewals_script
  282. echo ' ADMIN_EMAIL_ADDRESS=$ADMIN_USERNAME@$HOSTNAME' >> $renewals_script
  283. echo ' for d in /etc/letsencrypt/live/*/ ; do' >> $renewals_script
  284. echo -n ' LETSENCRYPT_DOMAIN=$(echo "$d" | ' >> $renewals_script
  285. echo -n "awk -F '/' '{print " >> $renewals_script
  286. echo -n '$5' >> $renewals_script
  287. echo "}')" >> $renewals_script
  288. echo ' if [ -f /etc/nginx/sites-available/$LETSENCRYPT_DOMAIN ]; then' >> $renewals_script
  289. echo ' ${PROJECT_NAME}-renew-cert -h $LETSENCRYPT_DOMAIN -p letsencrypt' >> $renewals_script
  290. echo ' if [ ! "$?" = "0" ]; then' >> $renewals_script
  291. echo " echo \"${renewal_failure_msg}\" > ~/temp_renewletsencrypt.txt" >> $renewals_script
  292. echo ' echo "" >> ~/temp_renewletsencrypt.txt' >> $renewals_script
  293. echo ' ${PROJECT_NAME}-renew-cert -h $LETSENCRYPT_DOMAIN -p letsencrypt 2>> ~/temp_renewletsencrypt.txt' >> $renewals_script
  294. echo -n " cat ~/temp_renewletsencrypt.txt | mail -s \"${renewal_email_title}\" " >> $renewals_script
  295. echo '$ADMIN_EMAIL_ADDRESS' >> $renewals_script
  296. echo ' rm ~/temp_renewletsencrypt.txt' >> $renewals_script
  297. echo ' if [ ! -f ~/letsencrypt_failed ]; then' >> $renewals_script
  298. echo ' touch ~/letsencrypt_failed' >> $renewals_script
  299. echo ' fi' >> $renewals_script
  300. echo ' fi' >> $renewals_script
  301. echo ' fi' >> $renewals_script
  302. echo ' done' >> $renewals_script
  303. echo 'fi' >> $renewals_script
  304. chmod +x $renewals_script
  305. # a secondary script keeps trying to renew after a failure
  306. echo '#!/bin/bash' > $renewals_retry_script
  307. echo '' >> $renewals_retry_script
  308. echo "PROJECT_NAME='${PROJECT_NAME}'" >> $renewals_retry_script
  309. echo 'COMPLETION_FILE=$HOME/${PROJECT_NAME}-completed.txt' >> $renewals_retry_script
  310. echo '' >> $renewals_retry_script
  311. echo 'if [ -d /etc/letsencrypt ]; then' >> $renewals_retry_script
  312. echo ' if [ -f ~/letsencrypt_failed ]; then' >> $renewals_retry_script
  313. echo ' rm ~/letsencrypt_failed' >> $renewals_retry_script
  314. echo -n ' ADMIN_USERNAME=$(cat $COMPLETION_FILE | grep "Admin user" | ' >> $renewals_retry_script
  315. echo -n "awk -F ':' '{print " >> $renewals_retry_script
  316. echo -n '$2' >> $renewals_retry_script
  317. echo "}')" >> $renewals_retry_script
  318. echo ' ADMIN_EMAIL_ADDRESS=$ADMIN_USERNAME@$HOSTNAME' >> $renewals_retry_script
  319. echo ' for d in /etc/letsencrypt/live/*/ ; do' >> $renewals_retry_script
  320. echo -n ' LETSENCRYPT_DOMAIN=$(echo "$d" | ' >> $renewals_retry_script
  321. echo -n "awk -F '/' '{print " >> $renewals_retry_script
  322. echo -n '$5' >> $renewals_retry_script
  323. echo "}')" >> $renewals_retry_script
  324. echo ' if [ -f /etc/nginx/sites-available/$LETSENCRYPT_DOMAIN ]; then' >> $renewals_retry_script
  325. echo ' ${PROJECT_NAME}-renew-cert -h $LETSENCRYPT_DOMAIN -p letsencrypt' >> $renewals_retry_script
  326. echo ' if [ ! "$?" = "0" ]; then' >> $renewals_retry_script
  327. echo " echo \"${renewal_failure_msg}\" > ~/temp_renewletsencrypt.txt" >> $renewals_retry_script
  328. echo ' echo "" >> ~/temp_renewletsencrypt.txt' >> $renewals_retry_script
  329. echo ' ${PROJECT_NAME}-renew-cert -h $LETSENCRYPT_DOMAIN -p letsencrypt 2>> ~/temp_renewletsencrypt.txt' >> $renewals_retry_script
  330. echo -n " cat ~/temp_renewletsencrypt.txt | mail -s \"${renewal_email_title}\" " >> $renewals_retry_script
  331. echo '$ADMIN_EMAIL_ADDRESS' >> $renewals_retry_script
  332. echo ' rm ~/temp_renewletsencrypt.txt' >> $renewals_retry_script
  333. echo ' if [ ! -f ~/letsencrypt_failed ]; then' >> $renewals_retry_script
  334. echo ' touch ~/letsencrypt_failed' >> $renewals_retry_script
  335. echo ' fi' >> $renewals_retry_script
  336. echo ' fi' >> $renewals_retry_script
  337. echo ' fi' >> $renewals_retry_script
  338. echo ' done' >> $renewals_retry_script
  339. echo ' fi' >> $renewals_retry_script
  340. echo 'fi' >> $renewals_retry_script
  341. chmod +x $renewals_retry_script
  342. }
  343. function configure_php {
  344. sed -i "s/memory_limit = 128M/memory_limit = ${MAX_PHP_MEMORY}M/g" /etc/php5/fpm/php.ini
  345. sed -i 's/;cgi.fix_pathinfo=1/cgi.fix_pathinfo=0/g' /etc/php5/fpm/php.ini
  346. sed -i "s/memory_limit = -1/memory_limit = ${MAX_PHP_MEMORY}M/g" /etc/php5/cli/php.ini
  347. sed -i "s/upload_max_filesize = 2M/upload_max_filesize = 50M/g" /etc/php5/fpm/php.ini
  348. sed -i "s/post_max_size = 8M/post_max_size = 50M/g" /etc/php5/fpm/php.ini
  349. }
  350. function install_web_server_access_control {
  351. if [ ! -f /etc/pam.d/nginx ]; then
  352. echo '#%PAM-1.0' > /etc/pam.d/nginx
  353. echo '@include common-auth' >> /etc/pam.d/nginx
  354. echo '@include common-account' >> /etc/pam.d/nginx
  355. echo '@include common-session' >> /etc/pam.d/nginx
  356. fi
  357. }
  358. function install_dynamicdns {
  359. if [[ $SYSTEM_TYPE == "mesh"* ]]; then
  360. return
  361. fi
  362. if [[ $ONION_ONLY != "no" ]]; then
  363. return
  364. fi
  365. # update to the next commit
  366. function_check set_repo_commit
  367. set_repo_commit $INSTALL_DIR/inadyn "inadyn commit" "$INADYN_COMMIT" $INADYN_REPO
  368. if [[ $(is_completed $FUNCNAME) == "1" ]]; then
  369. return
  370. fi
  371. # Here we compile from source because the current package
  372. # doesn't support https, which could result in passwords
  373. # being leaked
  374. # Debian version 1.99.4-1
  375. # https version 1.99.8
  376. apt-get -yq install build-essential curl libgnutls28-dev automake1.11
  377. if [ ! -d $INSTALL_DIR/inadyn ]; then
  378. git_clone $INADYN_REPO $INSTALL_DIR/inadyn
  379. fi
  380. if [ ! -d $INSTALL_DIR/inadyn ]; then
  381. echo 'inadyn repo not cloned'
  382. echo -n | openssl s_client -showcerts -connect github.com:443 -CApath /etc/ssl/certs
  383. exit 6785
  384. fi
  385. cd $INSTALL_DIR/inadyn
  386. git checkout $INADYN_COMMIT -b $INADYN_COMMIT
  387. set_completion_param "inadyn commit" "$INADYN_COMMIT"
  388. ./configure
  389. if [ ! "$?" = "0" ]; then
  390. exit 74890
  391. fi
  392. USE_OPENSSL=1 make
  393. if [ ! "$?" = "0" ]; then
  394. exit 74858
  395. fi
  396. make install
  397. if [ ! "$?" = "0" ]; then
  398. exit 3785
  399. fi
  400. # create an unprivileged user
  401. #chmod 600 /etc/shadow
  402. #chmod 600 /etc/gshadow
  403. #useradd -r -s /bin/false debian-inadyn
  404. #chmod 0000 /etc/shadow
  405. #chmod 0000 /etc/gshadow
  406. # create a configuration file
  407. echo 'background' > /etc/inadyn.conf
  408. echo 'verbose 1' >> /etc/inadyn.conf
  409. echo 'period 300' >> /etc/inadyn.conf
  410. echo 'startup-delay 60' >> /etc/inadyn.conf
  411. echo 'cache-dir /run/inadyn' >> /etc/inadyn.conf
  412. echo 'logfile /dev/null' >> /etc/inadyn.conf
  413. chmod 600 /etc/inadyn.conf
  414. echo '[Unit]' > /etc/systemd/system/inadyn.service
  415. echo 'Description=inadyn (DynDNS updater)' >> /etc/systemd/system/inadyn.service
  416. echo 'After=network.target' >> /etc/systemd/system/inadyn.service
  417. echo '' >> /etc/systemd/system/inadyn.service
  418. echo '[Service]' >> /etc/systemd/system/inadyn.service
  419. echo 'ExecStart=/usr/local/sbin/inadyn --config /etc/inadyn.conf' >> /etc/systemd/system/inadyn.service
  420. echo 'Restart=always' >> /etc/systemd/system/inadyn.service
  421. echo 'Type=forking' >> /etc/systemd/system/inadyn.service
  422. echo '' >> /etc/systemd/system/inadyn.service
  423. echo '[Install]' >> /etc/systemd/system/inadyn.service
  424. echo 'WantedBy=multi-user.target' >> /etc/systemd/system/inadyn.service
  425. systemctl enable inadyn
  426. systemctl start inadyn
  427. systemctl daemon-reload
  428. mark_completed $FUNCNAME
  429. }
  430. function install_command_line_browser {
  431. if [[ $(is_completed $FUNCNAME) == "1" ]]; then
  432. return
  433. fi
  434. apt-get -yq install elinks
  435. # set the home page
  436. if ! grep -q "WWW_HOME" /home/$MY_USERNAME/.bashrc; then
  437. if ! grep -q 'control' /home/$MY_USERNAME/.bashrc; then
  438. echo "export WWW_HOME=$DEFAULT_SEARCH" >> /home/$MY_USERNAME/.bashrc
  439. else
  440. sed -i "/control/i export WWW_HOME=$DEFAULT_SEARCH" /home/$MY_USERNAME/.bashrc
  441. fi
  442. fi
  443. mark_completed $FUNCNAME
  444. }
  445. function mesh_web_server {
  446. if [ -d /etc/apache2 ]; then
  447. chroot "$rootdir" apt-get -yq remove --purge apache2
  448. chroot "$rootdir" rm -rf /etc/apache2
  449. fi
  450. chroot "$rootdir" apt-get -yq install nginx
  451. if [ ! -d $rootdir/etc/nginx ]; then
  452. echo $'Unable to install web server'
  453. exit 346825
  454. fi
  455. }
  456. function install_web_server {
  457. if [ $INSTALLING_MESH ]; then
  458. mesh_web_server
  459. return
  460. fi
  461. # update to the next commit
  462. function_check set_repo_commit
  463. set_repo_commit $INSTALL_DIR/nginx_ensite "nginx-ensite commit" "$NGINX_ENSITE_COMMIT" $NGINX_ENSITE_REPO
  464. if [[ $(is_completed $FUNCNAME) == "1" ]]; then
  465. return
  466. fi
  467. # remove apache
  468. apt-get -yq remove --purge apache2
  469. if [ -d /etc/apache2 ]; then
  470. rm -rf /etc/apache2
  471. fi
  472. # install nginx
  473. apt-get -yq install nginx php5-fpm git
  474. # Turn off logs by default
  475. sed -i 's|access_log.*|access_log = /dev/null;|g' /etc/nginx/nginx.conf
  476. sed -i 's|error_log.*|error_log = /dev/null;|g' /etc/nginx/nginx.conf
  477. # limit the number of php processes
  478. sed -i 's/; process.max =.*/process.max = 32/g' /etc/php5/fpm/php-fpm.conf
  479. #sed -i 's/;process_control_timeout =.*/process_control_timeout = 300/g' /etc/php5/fpm/php-fpm.conf
  480. if ! grep -q "pm.max_children" /etc/php5/fpm/php-fpm.conf; then
  481. echo 'pm.max_children = 10' >> /etc/php5/fpm/php-fpm.conf
  482. echo 'pm.start_servers = 2' >> /etc/php5/fpm/php-fpm.conf
  483. echo 'pm.min_spare_servers = 2' >> /etc/php5/fpm/php-fpm.conf
  484. echo 'pm.max_spare_servers = 5' >> /etc/php5/fpm/php-fpm.conf
  485. echo 'pm.max_requests = 50' >> /etc/php5/fpm/php-fpm.conf
  486. fi
  487. if [ ! -d /etc/nginx ]; then
  488. echo $"ERROR: nginx does not appear to have installed. $CHECK_MESSAGE"
  489. exit 51
  490. fi
  491. # Nginx settings
  492. echo 'user www-data;' > /etc/nginx/nginx.conf
  493. #echo "worker_processes; $CPU_CORES" >> /etc/nginx/nginx.conf
  494. echo 'pid /run/nginx.pid;' >> /etc/nginx/nginx.conf
  495. echo '' >> /etc/nginx/nginx.conf
  496. echo 'events {' >> /etc/nginx/nginx.conf
  497. echo ' worker_connections 50;' >> /etc/nginx/nginx.conf
  498. echo ' # multi_accept on;' >> /etc/nginx/nginx.conf
  499. echo '}' >> /etc/nginx/nginx.conf
  500. echo '' >> /etc/nginx/nginx.conf
  501. echo 'http {' >> /etc/nginx/nginx.conf
  502. echo ' # limit the number of connections per single IP' >> /etc/nginx/nginx.conf
  503. echo ' limit_conn_zone $binary_remote_addr zone=conn_limit_per_ip:10m;' >> /etc/nginx/nginx.conf
  504. echo '' >> /etc/nginx/nginx.conf
  505. echo ' # limit the number of requests for a given session' >> /etc/nginx/nginx.conf
  506. echo ' limit_req_zone $binary_remote_addr zone=req_limit_per_ip:10m rate=140r/s;' >> /etc/nginx/nginx.conf
  507. echo '' >> /etc/nginx/nginx.conf
  508. echo ' # if the request body size is more than the buffer size, then the entire (or partial) request body is written into a temporary file' >> /etc/nginx/nginx.conf
  509. echo ' client_body_buffer_size 128k;' >> /etc/nginx/nginx.conf
  510. echo '' >> /etc/nginx/nginx.conf
  511. echo ' # headerbuffer size for the request header from client, its set for testing purpose' >> /etc/nginx/nginx.conf
  512. echo ' client_header_buffer_size 3m;' >> /etc/nginx/nginx.conf
  513. echo '' >> /etc/nginx/nginx.conf
  514. echo ' # maximum number and size of buffers for large headers to read from client request' >> /etc/nginx/nginx.conf
  515. echo ' large_client_header_buffers 4 256k;' >> /etc/nginx/nginx.conf
  516. echo '' >> /etc/nginx/nginx.conf
  517. echo ' # read timeout for the request body from client, its set for testing purpose' >> /etc/nginx/nginx.conf
  518. echo ' client_body_timeout 3m;' >> /etc/nginx/nginx.conf
  519. echo '' >> /etc/nginx/nginx.conf
  520. echo ' # how long to wait for the client to send a request header, its set for testing purpose' >> /etc/nginx/nginx.conf
  521. echo ' client_header_timeout 3m;' >> /etc/nginx/nginx.conf
  522. echo '' >> /etc/nginx/nginx.conf
  523. echo ' ##' >> /etc/nginx/nginx.conf
  524. echo ' # Basic Settings' >> /etc/nginx/nginx.conf
  525. echo ' ##' >> /etc/nginx/nginx.conf
  526. echo '' >> /etc/nginx/nginx.conf
  527. echo ' sendfile on;' >> /etc/nginx/nginx.conf
  528. echo ' tcp_nopush on;' >> /etc/nginx/nginx.conf
  529. echo ' tcp_nodelay on;' >> /etc/nginx/nginx.conf
  530. echo ' keepalive_timeout 65;' >> /etc/nginx/nginx.conf
  531. echo ' types_hash_max_size 2048;' >> /etc/nginx/nginx.conf
  532. echo ' server_tokens off;' >> /etc/nginx/nginx.conf
  533. echo '' >> /etc/nginx/nginx.conf
  534. echo ' # server_names_hash_bucket_size 64;' >> /etc/nginx/nginx.conf
  535. echo ' # server_name_in_redirect off;' >> /etc/nginx/nginx.conf
  536. echo '' >> /etc/nginx/nginx.conf
  537. echo ' include /etc/nginx/mime.types;' >> /etc/nginx/nginx.conf
  538. echo ' default_type application/octet-stream;' >> /etc/nginx/nginx.conf
  539. echo '' >> /etc/nginx/nginx.conf
  540. echo ' ##' >> /etc/nginx/nginx.conf
  541. echo ' # Logging Settings' >> /etc/nginx/nginx.conf
  542. echo ' ##' >> /etc/nginx/nginx.conf
  543. echo '' >> /etc/nginx/nginx.conf
  544. echo ' access_log /dev/null;' >> /etc/nginx/nginx.conf
  545. echo ' error_log /dev/null;' >> /etc/nginx/nginx.conf
  546. echo '' >> /etc/nginx/nginx.conf
  547. echo ' ###' >> /etc/nginx/nginx.conf
  548. echo ' # Gzip Settings' >> /etc/nginx/nginx.conf
  549. echo ' ##' >> /etc/nginx/nginx.conf
  550. echo ' gzip on;' >> /etc/nginx/nginx.conf
  551. echo ' gzip_disable "msie6";' >> /etc/nginx/nginx.conf
  552. echo '' >> /etc/nginx/nginx.conf
  553. echo ' # gzip_vary on;' >> /etc/nginx/nginx.conf
  554. echo ' # gzip_proxied any;' >> /etc/nginx/nginx.conf
  555. echo ' # gzip_comp_level 6;' >> /etc/nginx/nginx.conf
  556. echo ' # gzip_buffers 16 8k;' >> /etc/nginx/nginx.conf
  557. echo ' # gzip_http_version 1.1;' >> /etc/nginx/nginx.conf
  558. echo ' # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript;' >> /etc/nginx/nginx.conf
  559. echo '' >> /etc/nginx/nginx.conf
  560. echo ' ##' >> /etc/nginx/nginx.conf
  561. echo ' # Virtual Host Configs' >> /etc/nginx/nginx.conf
  562. echo ' ##' >> /etc/nginx/nginx.conf
  563. echo '' >> /etc/nginx/nginx.conf
  564. echo ' include /etc/nginx/conf.d/*.conf;' >> /etc/nginx/nginx.conf
  565. echo ' include /etc/nginx/sites-enabled/*;' >> /etc/nginx/nginx.conf
  566. echo '}' >> /etc/nginx/nginx.conf
  567. # install a script to easily enable and disable nginx virtual hosts
  568. if [ ! -d $INSTALL_DIR ]; then
  569. mkdir $INSTALL_DIR
  570. fi
  571. cd $INSTALL_DIR
  572. function_check git_clone
  573. git_clone $NGINX_ENSITE_REPO $INSTALL_DIR/nginx_ensite
  574. cd $INSTALL_DIR/nginx_ensite
  575. git checkout $NGINX_ENSITE_COMMIT -b $NGINX_ENSITE_COMMIT
  576. set_completion_param "nginx-ensite commit" "$NGINX_ENSITE_COMMIT"
  577. make install
  578. nginx_dissite default
  579. function_check configure_firewall_for_web_access
  580. configure_firewall_for_web_access
  581. mark_completed $FUNCNAME
  582. }
  583. function remove_certs {
  584. domain_name=$1
  585. if [ ! $domain_name ]; then
  586. return
  587. fi
  588. if [ -f /etc/ssl/certs/${domain_name}.dhparam ]; then
  589. rm /etc/ssl/certs/${domain_name}.dhparam
  590. fi
  591. if [ -f /etc/ssl/certs/${domain_name}.pem ]; then
  592. rm /etc/ssl/certs/${domain_name}.pem
  593. fi
  594. if [ -f /etc/ssl/certs/${domain_name}.crt ]; then
  595. rm /etc/ssl/certs/${domain_name}.crt
  596. fi
  597. if [ -f /etc/ssl/private/${domain_name}.key ]; then
  598. rm /etc/ssl/private/${domain_name}.key
  599. fi
  600. }
  601. function configure_firewall_for_web_access {
  602. if [[ $(is_completed $FUNCNAME) == "1" ]]; then
  603. return
  604. fi
  605. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  606. # docker does its own firewalling
  607. return
  608. fi
  609. if [[ $ONION_ONLY != "no" ]]; then
  610. return
  611. fi
  612. firewall_add HTTP 80 tcp
  613. firewall_add HTTPS 443 tcp
  614. mark_completed $FUNCNAME
  615. }
  616. function update_default_domain {
  617. echo $'Updating default domain'
  618. if [[ $ONION_ONLY == 'no' ]]; then
  619. if [ -d /etc/prosody ]; then
  620. if [ -d /etc/jitsi ]; then
  621. read_config_param "JITSI_DOMAIN_NAME"
  622. if [ ${#JITSI_DOMAIN_NAME} -gt 0 ]; then
  623. if [ -f /etc/ssl/private/${JITSI_DOMAIN_NAME}.key ]; then
  624. cp /etc/ssl/private/${JITSI_DOMAIN_NAME}.key /etc/prosody/certs/${JITSI_DOMAIN_NAME}.key
  625. fi
  626. if [ -f /etc/ssl/certs/${JITSI_DOMAIN_NAME}.crt ]; then
  627. cp /etc/ssl/certs/${JITSI_DOMAIN_NAME}.crt /etc/prosody/certs/${JITSI_DOMAIN_NAME}.pem
  628. fi
  629. if [ -f /etc/ssl/certs/${JITSI_DOMAIN_NAME}.pem ]; then
  630. cp /etc/ssl/certs/${JITSI_DOMAIN_NAME}.pem /etc/prosody/certs/${JITSI_DOMAIN_NAME}.pem
  631. fi
  632. fi
  633. fi
  634. if [ ! -d /etc/prosody/certs ]; then
  635. mkdir /etc/prosody/certs
  636. fi
  637. cp /etc/ssl/private/xmpp* /etc/prosody/certs
  638. cp /etc/ssl/private/${DEFAULT_DOMAIN_NAME}* /etc/prosody/certs
  639. cp /etc/ssl/certs/xmpp* /etc/prosody/certs
  640. cp /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}* /etc/prosody/certs
  641. if [ ! -f /etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.dhparam ]; then
  642. if [ -f /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.dhparam ]; then
  643. cp /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.dhparam /etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.dhparam
  644. fi
  645. fi
  646. if [ ! /etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.pem ]; then
  647. if [ ! /etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.crt ]; then
  648. mv /etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.crt /etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.pem
  649. fi
  650. else
  651. sed -i "s|/etc/prosody/certs/xmpp.key|/etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.key|g" /etc/prosody/conf.avail/xmpp.cfg.lua
  652. sed -i "s|/etc/prosody/certs/xmpp.crt|/etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.pem|g" /etc/prosody/conf.avail/xmpp.cfg.lua
  653. sed -i "s|/etc/prosody/certs/xmpp.key|/etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.key|g" /etc/prosody/prosody.cfg.lua
  654. sed -i "s|/etc/prosody/certs/xmpp.crt|/etc/prosody/certs/${DEFAULT_DOMAIN_NAME}.pem|g" /etc/prosody/prosody.cfg.lua
  655. fi
  656. chown -R prosody:default /etc/prosody
  657. chmod -R 700 /etc/prosody/certs/*
  658. chmod 600 /etc/prosody/prosody.cfg.lua
  659. systemctl reload prosody
  660. fi
  661. if [ -d /var/lib/mumble-server ]; then
  662. if [[ "$(cert_exists ${DEFAULT_DOMAIN_NAME} pem)" == "1" ]]; then
  663. cp /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem /var/lib/mumble-server/mumble.pem
  664. cp /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.dhparam /var/lib/mumble-server/mumble.dhparam
  665. cp /etc/ssl/private/${DEFAULT_DOMAIN_NAME}.key /var/lib/mumble-server/mumble.key
  666. chown -R mumble-server:mumble-server /var/lib/mumble-server
  667. chmod -R 700 /var/lib/mumble-server/${DEFAULT_DOMAIN_NAME}.pem
  668. chmod -R 700 /var/lib/mumble-server/${DEFAULT_DOMAIN_NAME}.key
  669. chmod -R 700 /var/lib/mumble-server/${DEFAULT_DOMAIN_NAME}.dhparam
  670. systemctl reload mumble
  671. fi
  672. fi
  673. if [ -d /home/znc/.znc ]; then
  674. echo $'znc found'
  675. if [[ "$(cert_exists ${DEFAULT_DOMAIN_NAME} pem)" == "1" ]]; then
  676. pkill znc
  677. cat /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem /etc/ssl/private/${DEFAULT_DOMAIN_NAME}.key > /home/znc/.znc/znc.pem
  678. chown znc:znc /home/znc/.znc/znc.pem
  679. chmod 700 /home/znc/.znc/znc.pem
  680. sed -i "s|CertFile =.*|CertFile = /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem" /etc/ngircd/ngircd.conf
  681. sed -i "s|DHFile =.*|DHFile = /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.dhparam" /etc/ngircd/ngircd.conf
  682. sed -i "s|KeyFile =.*|KeyFile = /etc/ssl/private/${DEFAULT_DOMAIN_NAME}.key" /etc/ngircd/ngircd.conf
  683. echo $'irc certificates updated'
  684. systemctl restart ngircd
  685. su -c 'znc' - znc
  686. fi
  687. fi
  688. if [ -d /etc/dovecot ]; then
  689. if [ ${#DEFAULT_DOMAIN_NAME} -gt 0 ]; then
  690. if ! grep -q "ssl_cert = </etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem" /etc/dovecot/conf.d/10-ssl.conf; then
  691. sed -i "s|#ssl_cert =.*|ssl_cert = </etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem|g" /etc/dovecot/conf.d/10-ssl.conf
  692. sed -i "s|ssl_cert =.*|ssl_cert = </etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem|g" /etc/dovecot/conf.d/10-ssl.conf
  693. systemctl restart dovecot
  694. fi
  695. fi
  696. fi
  697. if [ -d /etc/matrix-synapse ]; then
  698. cp /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.pem /etc/matrix-synapse/homeserver.tls.crt
  699. cp /etc/ssl/certs/${DEFAULT_DOMAIN_NAME}.dhparam /etc/matrix-synapse/homeserver.tls.dh
  700. cp /etc/ssl/private/${DEFAULT_DOMAIN_NAME}.key /etc/matrix-synapse/homeserver.tls.key
  701. chown matrix-synapse: /etc/matrix-synapse/homeserver.tls.key
  702. chown matrix-synapse: /etc/matrix-synapse/homeserver.tls.dh
  703. chown matrix-synapse: /etc/matrix-synapse/homeserver.tls.crt
  704. chmod -R 700 /etc/matrix-synapse/homeserver.tls.key
  705. chmod -R 700 /etc/matrix-synapse/homeserver.tls.dh
  706. chmod -R 700 /etc/matrix-synapse/homeserver.tls.crt
  707. systemctl restart matrix-synapse
  708. fi
  709. fi
  710. }
  711. # NOTE: deliberately no exit 0