install-freedombone.sh 135KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734
  1. #!/bin/bash
  2. # Freedombone install script intended for use with Debian Jessie
  3. #
  4. # Note on dynamic dns
  5. # ===================
  6. #
  7. # I'm not particularly trying to promote freedns.afraid.org
  8. # as a service, it just happens to be a dynamic DNS system which
  9. # provides free (as in beer) accounts, and I'm trying to make the
  10. # process of setting up a working server as trivial as possible.
  11. # Other dynamic DNS systems are available, and if you're using
  12. # something different then comment out the section within
  13. # argument_checks and the call to dynamic_dns_freedns.
  14. #
  15. # Prerequisites
  16. # =============
  17. #
  18. # cd ~/
  19. # wget http://freedombone.uk.to/debian-jessie-console-armhf-2014-08-13.tar.xz
  20. #
  21. # Verify it.
  22. #
  23. # sha256sum debian-jessie-console-armhf-2014-08-13.tar.xz
  24. # fc225cfb3c2dfad92cccafa97e92c3cd3db9d94f4771af8da364ef59609f43de
  25. #
  26. # Uncompress it.
  27. #
  28. # tar xJf debian-jessie-console-armhf-2014-08-13.tar.xz
  29. # cd debian-jessie-console-armhf-2014-08-13
  30. #
  31. # sudo apt-get install u-boot-tools dosfstools git-core kpartx wget parted
  32. # sudo ./setup_sdcard.sh --mmc /dev/sdX --dtb beaglebone
  33. #
  34. # When finished eject the micrtoSD then reinsert it
  35. #
  36. # sudo cp /media/$USER/BOOT/bbb-uEnv.txt /media/$USER/BOOT/uEnv.txt
  37. # sync
  38. #
  39. # Eject microSD, insert into BBB, attach USB cable between BBB and laptop.
  40. # On Ubuntu wait until you see the "connected" message.
  41. #
  42. # ssh-keygen -f "/home/$USER/.ssh/known_hosts" -R 192.168.7.2
  43. # ssh debian@192.168.7.2 (password "temppwd")
  44. # su (password "root")
  45. # passwd
  46. # adduser $MY_USERNAME
  47. # sed -i '/iface eth0 inet dhcp/a\iface eth0 inet static' /etc/network/interfaces
  48. # sed -i '/iface eth0 inet static/a\ dns-nameservers 213.73.91.35 85.214.20.141' /etc/network/interfaces
  49. # sed -i "/iface eth0 inet static/a\ gateway $MY_ROUTER_IP" /etc/network/interfaces
  50. # sed -i '/iface eth0 inet static/a\ netmask 255.255.255.0' /etc/network/interfaces
  51. # sed -i "/iface eth0 inet static/a\ address $MY_BBB_STATIC_IP" /etc/network/interfaces
  52. # sed -i '/iface usb0 inet static/,/ gateway 192.168.7.1/ s/^/#/' /etc/network/interfaces
  53. # shutdown now
  54. #
  55. # Connect BBB to router
  56. #
  57. # scp install-freedombone.sh $MY_USERNAME@$MY_BBB_STATIC_IP:/home/$MY_USERNAME
  58. # ssh $MY_USERNAME@$MY_BBB_STATIC_IP
  59. # su
  60. # ./install-freedombone.sh [DOMAIN_NAME] [MY_USERNAME]
  61. DOMAIN_NAME=$1
  62. MY_USERNAME=$2
  63. FREEDNS_SUBDOMAIN_CODE=$3
  64. SYSTEM_TYPE=$4
  65. # Different system variants which may be specified within
  66. # the SYSTEM_TYPE option
  67. VARIANT_WRITER="writer"
  68. VARIANT_CLOUD="cloud"
  69. VARIANT_CHAT="chat"
  70. VARIANT_MAILBOX="mailbox"
  71. VARIANT_SOCIAL="social"
  72. SSH_PORT=2222
  73. KERNEL_VERSION="v3.15.10-bone7"
  74. USE_HWRNG="yes"
  75. INSTALLED_WITHIN_DOCKER="no"
  76. # If you want to run an encrypted mailing list specify its name here.
  77. # There should be no spaces in the name
  78. PRIVATE_MAILING_LIST=
  79. # Domain name or freedns subdomain for microblog installation
  80. MICROBLOG_DOMAIN_NAME=
  81. MICROBLOG_FREEDNS_SUBDOMAIN_CODE=
  82. MICROBLOG_REPO="git://gitorious.org/social/mainline.git"
  83. MICROBLOG_ADMIN_PASSWORD=
  84. # Domain name or redmatrix installation
  85. REDMATRIX_DOMAIN_NAME=
  86. REDMATRIX_FREEDNS_SUBDOMAIN_CODE=
  87. REDMATRIX_REPO="https://github.com/friendica/red.git"
  88. REDMATRIX_ADDONS_REPO="https://github.com/friendica/red-addons.git"
  89. REDMATRIX_ADMIN_PASSWORD=
  90. # Domain name or freedns subdomain for Owncloud installation
  91. OWNCLOUD_DOMAIN_NAME=
  92. # Freedns dynamic dns code for owncloud
  93. OWNCLOUD_FREEDNS_SUBDOMAIN_CODE=
  94. OWNCLOUD_ARCHIVE="owncloud-7.0.2.tar.bz2"
  95. OWNCLOUD_DOWNLOAD="https://download.owncloud.org/community/$OWNCLOUD_ARCHIVE"
  96. OWNCLOUD_HASH="ea07124a1b9632aa5227240d655e4d84967fb6dd49e4a16d3207d6179d031a3a"
  97. # Domain name or freedns subdomain for your wiki
  98. WIKI_FREEDNS_SUBDOMAIN_CODE=
  99. WIKI_DOMAIN_NAME=
  100. WIKI_ARCHIVE="dokuwiki-stable.tgz"
  101. WIKI_DOWNLOAD="http://download.dokuwiki.org/src/dokuwiki/$WIKI_ARCHIVE"
  102. WIKI_HASH="a0e79986b87b2744421ce3c33b43a21f296deadd81b1789c25fa4bb095e8e470"
  103. # see https://www.dokuwiki.org/template:mnml-blog
  104. # https://andreashaerter.com/tmp/downloads/dokuwiki-template-mnml-blog/CHECKSUMS.asc
  105. WIKI_MNML_BLOG_ADDON_ARCHIVE="mnml-blog.tar.gz"
  106. WIKI_MNML_BLOG_ADDON="https://andreashaerter.com/downloads/dokuwiki-template-mnml-blog/latest"
  107. WIKI_MNML_BLOG_ADDON_HASH="428c280d09ee14326fef5cd6f6772ecfcd532f7b6779cd992ff79a97381cf39f"
  108. # see https://www.dokuwiki.org/plugin:blogtng
  109. WIKI_BLOGTNG_ADDON_NAME="dokufreaks-plugin-blogtng-93a3fec"
  110. WIKI_BLOGTNG_ADDON_ARCHIVE="$WIKI_BLOGTNG_ADDON_NAME.zip"
  111. WIKI_BLOGTNG_ADDON="https://github.com/dokufreaks/plugin-blogtng/zipball/master"
  112. WIKI_BLOGTNG_ADDON_HASH="212b3ad918fdc92b2d49ef5d36bc9e086eab27532931ba6b87e05f35fd402a27"
  113. # see https://www.dokuwiki.org/plugin:sqlite
  114. WIKI_SQLITE_ADDON_NAME="cosmocode-sqlite-7be4003"
  115. WIKI_SQLITE_ADDON_ARCHIVE="$WIKI_SQLITE_ADDON_NAME.tar.gz"
  116. WIKI_SQLITE_ADDON="https://github.com/cosmocode/sqlite/tarball/master"
  117. WIKI_SQLITE_ADDON_HASH="930335e647c7e62f3068689c256ee169fad2426b64f8360685d391ecb5eeda0c"
  118. GPG_KEYSERVER="hkp://keys.gnupg.net"
  119. # optionally you can provide your exported GPG key pair here
  120. # Note that the private key file will be deleted after use
  121. # If these are unspecified then a new GPG key will be created
  122. MY_GPG_PUBLIC_KEY=
  123. MY_GPG_PRIVATE_KEY=
  124. # If you have existing mail within a Maildir
  125. # you can specify the directory here and the files
  126. # will be imported
  127. IMPORT_MAILDIR=
  128. # The Debian package repository to use.
  129. DEBIAN_REPO="ftp.de.debian.org"
  130. DEBIAN_VERSION="jessie"
  131. # Directory where source code is downloaded and compiled
  132. INSTALL_DIR=$HOME/build
  133. # device name for an attached usb drive
  134. USB_DRIVE=/dev/sda1
  135. # memory limit for php in MB
  136. MAX_PHP_MEMORY=32
  137. # default MariaDB password
  138. MARIADB_PASSWORD=
  139. # list of ciphers to use
  140. SSL_CIPHERS="EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!ECDSA:CAMELLIA256-SHA:AES256-SHA:CAMELLIA128-SHA:AES128-SHA"
  141. export DEBIAN_FRONTEND=noninteractive
  142. # File which keeps track of what has already been installed
  143. COMPLETION_FILE=$HOME/freedombone-completed.txt
  144. if [ ! -f $COMPLETION_FILE ]; then
  145. touch $COMPLETION_FILE
  146. fi
  147. function show_help {
  148. echo ''
  149. echo './install-freedombone.sh [domain] [username] [subdomain code] [system type]'
  150. echo ''
  151. echo 'domain'
  152. echo '------'
  153. echo 'This is your domain name or freedns subdomain.'
  154. echo ''
  155. echo 'username'
  156. echo '--------'
  157. echo ''
  158. echo 'This will be your username on the system. It should be all'
  159. echo 'lower case and contain no spaces'
  160. echo ''
  161. echo 'subdomain code'
  162. echo '--------------'
  163. echo 'This is the freedns dynamic DNS code for your subdomain.'
  164. echo "To find it from https://freedns.afraid.org select 'Dynamic DNS',"
  165. echo "then 'quick cron example' and copy the code located between "
  166. echo "'?' and '=='."
  167. echo ''
  168. echo 'system type'
  169. echo '-----------'
  170. echo 'This can either be blank if you wish to install the full system,'
  171. echo "or for more specialised variants you can specify '$VARIANT_MAILBOX', '$VARIANT_CLOUD',"
  172. echo "'$VARIANT_CHAT', '$VARIANT_SOCIAL' or '$VARIANT_WRITER'"
  173. echo ''
  174. }
  175. function argument_checks {
  176. if [ ! -d /home/$MY_USERNAME ]; then
  177. echo "There is no user '$MY_USERNAME' on the system. Use 'adduser $MY_USERNAME' to create the user."
  178. exit 1
  179. fi
  180. if [ ! $DOMAIN_NAME ]; then
  181. show_help
  182. exit 2
  183. fi
  184. if [ ! $MY_USERNAME ]; then
  185. show_help
  186. exit 3
  187. fi
  188. if [ ! $FREEDNS_SUBDOMAIN_CODE ]; then
  189. show_help
  190. exit 4
  191. fi
  192. if [ $SYSTEM_TYPE ]; then
  193. if [[ $SYSTEM_TYPE != $VARIANT_WRITER && $SYSTEM_TYPE != $VARIANT_CLOUD && $SYSTEM_TYPE != $VARIANT_CHAT && $SYSTEM_TYPE != $VARIANT_MAILBOX && $SYSTEM_TYPE != $VARIANT_SOCIAL ]]; then
  194. echo "'$SYSTEM_TYPE' is an unrecognised Freedombone variant."
  195. exit 30
  196. fi
  197. fi
  198. }
  199. function change_login_message {
  200. if grep -Fxq "change_login_message" $COMPLETION_FILE; then
  201. return
  202. fi
  203. echo '' > /etc/motd
  204. echo ".---. . . " >> /etc/motd
  205. echo "| | | " >> /etc/motd
  206. echo "|--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-. " >> /etc/motd
  207. echo "| | (.-' (.-' ( | ( )| | | | )( )| | (.-' " >> /etc/motd
  208. echo "' ' --' --' -' - -' ' ' -' -' -' ' - --'" >> /etc/motd
  209. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" ]]; then
  210. echo ' . . . . . ' >> /etc/motd
  211. echo ' \ \ / / o _|_ ' >> /etc/motd
  212. echo ' \ \ /.--.. | .-. .--.' >> /etc/motd
  213. echo " \/ \/ | | | (.-' | " >> /etc/motd
  214. echo " ' ' ' -' - -' --'' " >> /etc/motd
  215. fi
  216. if [[ $SYSTEM_TYPE == "$VARIANT_CLOUD" ]]; then
  217. echo ' .--.. . ' >> /etc/motd
  218. echo ' : | | ' >> /etc/motd
  219. echo ' | | .-. . . .-.| ' >> /etc/motd
  220. echo ' : |( )| |( | ' >> /etc/motd
  221. echo " --' - -' -- - -' -" >> /etc/motd
  222. fi
  223. if [[ $SYSTEM_TYPE == "$VARIANT_CHAT" ]]; then
  224. echo ' .--.. . ' >> /etc/motd
  225. echo ' : | _|_ ' >> /etc/motd
  226. echo ' | |--. .-. | ' >> /etc/motd
  227. echo ' : | |( ) | ' >> /etc/motd
  228. echo " --'' - -' - -' " >> /etc/motd
  229. fi
  230. if [[ $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  231. echo ' .-. . ' >> /etc/motd
  232. echo ' ( ) o | ' >> /etc/motd
  233. echo ' -. .-. .-. . .-. | ' >> /etc/motd
  234. echo ' ( )( )( | ( ) | ' >> /etc/motd
  235. echo " -' -' -'-' - -' - - " >> /etc/motd
  236. fi
  237. if [[ $SYSTEM_TYPE == "$VARIANT_MAILBOX" ]]; then
  238. echo ' . . . . ' >> /etc/motd
  239. echo ' |\ /| o | | ' >> /etc/motd
  240. echo ' | \/ | .-. . | |.-. .-.-. ,- ' >> /etc/motd
  241. echo ' | |( ) | | | )( ) : ' >> /etc/motd
  242. echo ' ' ' -' --' - -' -' -'-' - ' >> /etc/motd
  243. fi
  244. echo '' >> /etc/motd
  245. echo ' Freedom in the Cloud' >> /etc/motd
  246. echo '' >> /etc/motd
  247. echo 'change_login_message' >> $COMPLETION_FILE
  248. }
  249. function search_for_attached_usb_drive {
  250. # If a USB drive is attached then search for email,
  251. # gpg, ssh keys and emacs configuration
  252. if grep -Fxq "search_for_attached_usb_drive" $COMPLETION_FILE; then
  253. return
  254. fi
  255. if [ -b $USB_DRIVE ]; then
  256. if [ ! -d /media/usb ]; then
  257. echo 'Mounting USB drive'
  258. mkdir /media/usb
  259. mount $USB_DRIVE /media/usb
  260. fi
  261. if ! [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  262. if [ -d /media/usb/Maildir ]; then
  263. echo 'Maildir found on USB drive'
  264. IMPORT_MAILDIR=/media/usb/Maildir
  265. fi
  266. if [ -d /media/usb/.gnupg ]; then
  267. echo 'Importing GPG keyring'
  268. cp -r /media/usb/.gnupg /home/$MY_USERNAME
  269. chown -R $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/.gnupg
  270. if [ -f /home/$MY_USERNAME/.gnupg/secring.gpg ]; then
  271. shred -zu /media/usb/.gnupg/secring.gpg
  272. shred -zu /media/usb/.gnupg/random_seed
  273. shred -zu /media/usb/.gnupg/trustdb.gpg
  274. rm -rf /media/usb/.gnupg
  275. else
  276. echo 'GPG files did not copy'
  277. exit 7
  278. fi
  279. fi
  280. if [ -f /media/usb/private_key.gpg ]; then
  281. echo 'GPG private key found on USB drive'
  282. MY_GPG_PRIVATE_KEY=/media/usb/private_key.gpg
  283. fi
  284. if [ -f /media/usb/public_key.gpg ]; then
  285. echo 'GPG public key found on USB drive'
  286. MY_GPG_PUBLIC_KEY=/media/usb/public_key.gpg
  287. fi
  288. fi
  289. if [ -d /media/usb/.ssh ]; then
  290. echo 'Importing ssh keys'
  291. cp -r /media/usb/.ssh /home/$MY_USERNAME
  292. chown -R $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/.ssh
  293. # for security delete the ssh keys from the usb drive
  294. if [ -f /home/$MY_USERNAME/.ssh/id_rsa ]; then
  295. shred -zu /media/usb/.ssh/id_rsa
  296. shred -zu /media/usb/.ssh/id_rsa.pub
  297. shred -zu /media/usb/.ssh/known_hosts
  298. rm -rf /media/usb/.ssh
  299. else
  300. echo 'ssh files did not copy'
  301. exit 8
  302. fi
  303. fi
  304. if [ -f /media/usb/.emacs ]; then
  305. echo 'Importing .emacs file'
  306. cp -f /media/usb/.emacs /home/$MY_USERNAME/.emacs
  307. chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/.emacs
  308. fi
  309. if [ -d /media/usb/.emacs.d ]; then
  310. echo 'Importing .emacs.d directory'
  311. cp -r /media/usb/.emacs.d /home/$MY_USERNAME
  312. chown -R $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/.emacs.d
  313. fi
  314. if [ -d /media/usb/personal ]; then
  315. echo 'Importing personal directory'
  316. cp -r /media/usb/personal /home/$MY_USERNAME
  317. chown -R $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/personal
  318. fi
  319. else
  320. if [ -d /media/usb ]; then
  321. umount /media/usb
  322. rm -rf /media/usb
  323. fi
  324. echo 'No USB drive attached'
  325. fi
  326. echo 'search_for_attached_usb_drive' >> $COMPLETION_FILE
  327. }
  328. function remove_proprietary_repos {
  329. if grep -Fxq "remove_proprietary_repos" $COMPLETION_FILE; then
  330. return
  331. fi
  332. sed -i 's/ non-free//g' /etc/apt/sources.list
  333. echo 'remove_proprietary_repos' >> $COMPLETION_FILE
  334. }
  335. function change_debian_repos {
  336. if grep -Fxq "change_debian_repos" $COMPLETION_FILE; then
  337. return
  338. fi
  339. rm -rf /var/lib/apt/lists/*
  340. apt-get clean
  341. sed -i "s/ftp.us.debian.org/$DEBIAN_REPO/g" /etc/apt/sources.list
  342. # ensure that there is a security repo
  343. if ! grep -q "security" /etc/apt/sources.list; then
  344. if grep -q "jessie" /etc/apt/sources.list; then
  345. echo "deb http://security.debian.org/ jessie/updates main contrib" >> /etc/apt/sources.list
  346. echo "#deb-src http://security.debian.org/ jessie/updates main contrib" >> /etc/apt/sources.list
  347. else
  348. if grep -q "wheezy" /etc/apt/sources.list; then
  349. echo "deb http://security.debian.org/ wheezy/updates main contrib" >> /etc/apt/sources.list
  350. echo "#deb-src http://security.debian.org/ wheezy/updates main contrib" >> /etc/apt/sources.list
  351. fi
  352. fi
  353. fi
  354. apt-get update
  355. apt-get -y --force-yes install apt-transport-https
  356. echo 'change_debian_repos' >> $COMPLETION_FILE
  357. }
  358. function initial_setup {
  359. if grep -Fxq "initial_setup" $COMPLETION_FILE; then
  360. return
  361. fi
  362. apt-get -y remove --purge apache*
  363. apt-get -y dist-upgrade
  364. apt-get -y install ca-certificates emacs24
  365. echo 'initial_setup' >> $COMPLETION_FILE
  366. }
  367. function install_editor {
  368. if grep -Fxq "install_editor" $COMPLETION_FILE; then
  369. return
  370. fi
  371. update-alternatives --set editor /usr/bin/emacs24
  372. echo 'install_editor' >> $COMPLETION_FILE
  373. }
  374. function enable_backports {
  375. if grep -Fxq "enable_backports" $COMPLETION_FILE; then
  376. return
  377. fi
  378. if ! grep -Fxq "deb http://$DEBIAN_REPO/debian jessie-backports main" /etc/apt/sources.list; then
  379. echo "deb http://$DEBIAN_REPO/debian jessie-backports main" >> /etc/apt/sources.list
  380. fi
  381. echo 'enable_backports' >> $COMPLETION_FILE
  382. }
  383. function update_the_kernel {
  384. if grep -Fxq "update_the_kernel" $COMPLETION_FILE; then
  385. return
  386. fi
  387. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  388. return
  389. fi
  390. cd /opt/scripts/tools
  391. ./update_kernel.sh --kernel $KERNEL_VERSION
  392. echo 'update_the_kernel' >> $COMPLETION_FILE
  393. }
  394. function enable_zram {
  395. if grep -Fxq "enable_zram" $COMPLETION_FILE; then
  396. return
  397. fi
  398. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  399. return
  400. fi
  401. if ! grep -q "options zram num_devices=1" /etc/modprobe.d/zram.conf; then
  402. echo 'options zram num_devices=1' >> /etc/modprobe.d/zram.conf
  403. fi
  404. echo '#!/bin/bash' > /etc/init.d/zram
  405. echo '### BEGIN INIT INFO' >> /etc/init.d/zram
  406. echo '# Provides: zram' >> /etc/init.d/zram
  407. echo '# Required-Start:' >> /etc/init.d/zram
  408. echo '# Required-Stop:' >> /etc/init.d/zram
  409. echo '# Default-Start: 2 3 4 5' >> /etc/init.d/zram
  410. echo '# Default-Stop: 0 1 6' >> /etc/init.d/zram
  411. echo '# Short-Description: Increased Performance In Linux With zRam (Virtual Swap Compressed in RAM)' >> /etc/init.d/zram
  412. echo '# Description: Adapted from systemd scripts at https://github.com/mystilleef/FedoraZram' >> /etc/init.d/zram
  413. echo '### END INIT INFO' >> /etc/init.d/zram
  414. echo 'start() {' >> /etc/init.d/zram
  415. echo ' # get the number of CPUs' >> /etc/init.d/zram
  416. echo ' num_cpus=$(grep -c processor /proc/cpuinfo)' >> /etc/init.d/zram
  417. echo ' # if something goes wrong, assume we have 1' >> /etc/init.d/zram
  418. echo ' [ "$num_cpus" != 0 ] || num_cpus=1' >> /etc/init.d/zram
  419. echo ' # set decremented number of CPUs' >> /etc/init.d/zram
  420. echo ' decr_num_cpus=$((num_cpus - 1))' >> /etc/init.d/zram
  421. echo ' # get the amount of memory in the machine' >> /etc/init.d/zram
  422. echo ' mem_total_kb=$(grep MemTotal /proc/meminfo | grep -E --only-matching "[[:digit:]]+")' >> /etc/init.d/zram
  423. echo ' mem_total=$((mem_total_kb * 1024))' >> /etc/init.d/zram
  424. echo ' # load dependency modules' >> /etc/init.d/zram
  425. echo ' modprobe zram num_devices=$num_cpus' >> /etc/init.d/zram
  426. echo ' # initialize the devices' >> /etc/init.d/zram
  427. echo ' for i in $(seq 0 $decr_num_cpus); do' >> /etc/init.d/zram
  428. echo ' echo $((mem_total / num_cpus)) > /sys/block/zram$i/disksize' >> /etc/init.d/zram
  429. echo ' done' >> /etc/init.d/zram
  430. echo ' # Creating swap filesystems' >> /etc/init.d/zram
  431. echo ' for i in $(seq 0 $decr_num_cpus); do' >> /etc/init.d/zram
  432. echo ' mkswap /dev/zram$i' >> /etc/init.d/zram
  433. echo ' done' >> /etc/init.d/zram
  434. echo ' # Switch the swaps on' >> /etc/init.d/zram
  435. echo ' for i in $(seq 0 $decr_num_cpus); do' >> /etc/init.d/zram
  436. echo ' swapon -p 100 /dev/zram$i' >> /etc/init.d/zram
  437. echo ' done' >> /etc/init.d/zram
  438. echo '}' >> /etc/init.d/zram
  439. echo 'stop() {' >> /etc/init.d/zram
  440. echo ' # get the number of CPUs' >> /etc/init.d/zram
  441. echo ' num_cpus=$(grep -c processor /proc/cpuinfo)' >> /etc/init.d/zram
  442. echo ' # set decremented number of CPUs' >> /etc/init.d/zram
  443. echo ' decr_num_cpus=$((num_cpus - 1))' >> /etc/init.d/zram
  444. echo ' # Switching off swap' >> /etc/init.d/zram
  445. echo ' for i in $(seq 0 $decr_num_cpus); do' >> /etc/init.d/zram
  446. echo ' if [ "$(grep /dev/zram$i /proc/swaps)" != "" ]; then' >> /etc/init.d/zram
  447. echo ' swapoff /dev/zram$i' >> /etc/init.d/zram
  448. echo ' sleep 1' >> /etc/init.d/zram
  449. echo ' fi' >> /etc/init.d/zram
  450. echo ' done' >> /etc/init.d/zram
  451. echo ' sleep 1' >> /etc/init.d/zram
  452. echo ' rmmod zram' >> /etc/init.d/zram
  453. echo '}' >> /etc/init.d/zram
  454. echo 'case "$1" in' >> /etc/init.d/zram
  455. echo ' start)' >> /etc/init.d/zram
  456. echo ' start' >> /etc/init.d/zram
  457. echo ' ;;' >> /etc/init.d/zram
  458. echo ' stop)' >> /etc/init.d/zram
  459. echo ' stop' >> /etc/init.d/zram
  460. echo ' ;;' >> /etc/init.d/zram
  461. echo ' restart)' >> /etc/init.d/zram
  462. echo ' stop' >> /etc/init.d/zram
  463. echo ' sleep 3' >> /etc/init.d/zram
  464. echo ' start' >> /etc/init.d/zram
  465. echo ' ;;' >> /etc/init.d/zram
  466. echo ' *)' >> /etc/init.d/zram
  467. echo ' echo "Usage: $0 {start|stop|restart}"' >> /etc/init.d/zram
  468. echo ' RETVAL=1' >> /etc/init.d/zram
  469. echo 'esac' >> /etc/init.d/zram
  470. echo 'exit $RETVAL' >> /etc/init.d/zram
  471. chmod +x /etc/init.d/zram
  472. update-rc.d zram defaults
  473. echo 'enable_zram' >> $COMPLETION_FILE
  474. }
  475. function random_number_generator {
  476. if grep -Fxq "random_number_generator" $COMPLETION_FILE; then
  477. return
  478. fi
  479. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  480. # it is assumed that docker uses the random number
  481. # generator of the host system
  482. return
  483. fi
  484. if [[ $USE_HWRNG == "yes" ]]; then
  485. apt-get -y --force-yes install rng-tools
  486. sed -i 's|#HRNGDEVICE=/dev/hwrng|HRNGDEVICE=/dev/hwrng|g' /etc/default/rng-tools
  487. else
  488. apt-get -y --force-yes install haveged
  489. fi
  490. echo 'random_number_generator' >> $COMPLETION_FILE
  491. }
  492. function configure_ssh {
  493. if grep -Fxq "configure_ssh" $COMPLETION_FILE; then
  494. return
  495. fi
  496. sed -i "s/Port 22/Port $SSH_PORT/g" /etc/ssh/sshd_config
  497. sed -i 's/PermitRootLogin without-password/PermitRootLogin no/g' /etc/ssh/sshd_config
  498. sed -i 's/X11Forwarding yes/X11Forwarding no/g' /etc/ssh/sshd_config
  499. sed -i 's/ServerKeyBits 1024/ServerKeyBits 4096/g' /etc/ssh/sshd_config
  500. sed -i 's/TCPKeepAlive yes/TCPKeepAlive no/g' /etc/ssh/sshd_config
  501. sed -i 's|HostKey /etc/ssh/ssh_host_dsa_key|#HostKey /etc/ssh/ssh_host_dsa_key|g' /etc/ssh/sshd_config
  502. sed -i 's|HostKey /etc/ssh/ssh_host_ecdsa_key|#HostKey /etc/ssh/ssh_host_ecdsa_key|g' /etc/ssh/sshd_config
  503. echo 'ClientAliveInterval 60' >> /etc/ssh/sshd_config
  504. echo 'ClientAliveCountMax 3' >> /etc/ssh/sshd_config
  505. echo 'Ciphers aes256-ctr,aes128-ctr' >> /etc/ssh/sshd_config
  506. echo 'MACs hmac-sha2-512,hmac-sha2-256,hmac-ripemd160
  507. KexAlgorithms diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1' >> /etc/ssh/sshd_config
  508. apt-get -y --force-yes install fail2ban
  509. echo 'configure_ssh' >> $COMPLETION_FILE
  510. # Don't reboot if installing within docker
  511. # random numbers will come from the host system
  512. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  513. return
  514. fi
  515. echo ''
  516. echo ''
  517. echo ' *** Rebooting to initialise ssh settings and random number generator ***'
  518. echo ''
  519. echo " *** Reconnect via ssh on port $SSH_PORT, then run this script again ***"
  520. echo ''
  521. reboot
  522. }
  523. function regenerate_ssh_keys {
  524. if grep -Fxq "regenerate_ssh_keys" $COMPLETION_FILE; then
  525. return
  526. fi
  527. rm -f /etc/ssh/ssh_host_*
  528. dpkg-reconfigure openssh-server
  529. service ssh restart
  530. echo 'regenerate_ssh_keys' >> $COMPLETION_FILE
  531. }
  532. function configure_dns {
  533. if grep -Fxq "configure_dns" $COMPLETION_FILE; then
  534. return
  535. fi
  536. echo 'domain localdomain' > /etc/resolv.conf
  537. echo 'search localdomain' >> /etc/resolv.conf
  538. echo 'nameserver 213.73.91.35' >> /etc/resolv.conf
  539. echo 'nameserver 85.214.20.141' >> /etc/resolv.conf
  540. echo 'configure_dns' >> $COMPLETION_FILE
  541. }
  542. function set_your_domain_name {
  543. if grep -Fxq "set_your_domain_name" $COMPLETION_FILE; then
  544. return
  545. fi
  546. echo "$DOMAIN_NAME" > /etc/hostname
  547. hostname $DOMAIN_NAME
  548. sed -i "s/127.0.1.1 arm/127.0.1.1 $DOMAIN_NAME/g" /etc/hosts
  549. echo "127.0.1.1 $DOMAIN_NAME" >> /etc/hosts
  550. echo 'set_your_domain_name' >> $COMPLETION_FILE
  551. }
  552. function time_synchronisation {
  553. if grep -Fxq "time_synchronisation" $COMPLETION_FILE; then
  554. return
  555. fi
  556. apt-get -y --force-yes install tlsdate
  557. apt-get -y remove ntpdate
  558. echo '#!/bin/bash' > /usr/bin/updatedate
  559. echo 'TIMESOURCE=google.com' >> /usr/bin/updatedate
  560. echo 'TIMESOURCE2=www.ptb.de' >> /usr/bin/updatedate
  561. echo 'LOGFILE=/var/log/tlsdate.log' >> /usr/bin/updatedate
  562. echo 'TIMEOUT=5' >> /usr/bin/updatedate
  563. echo "EMAIL=$MY_USERNAME@$DOMAIN_NAME" >> /usr/bin/updatedate
  564. echo '# File which contains the previous date as a number' >> /usr/bin/updatedate
  565. echo 'BEFORE_DATE_FILE=/var/log/tlsdateprevious.txt' >> /usr/bin/updatedate
  566. echo '# File which contains the previous date as a string' >> /usr/bin/updatedate
  567. echo 'BEFORE_FULLDATE_FILE=/var/log/tlsdate.txt' >> /usr/bin/updatedate
  568. echo 'DATE_BEFORE=$(date)' >> /usr/bin/updatedate
  569. echo 'BEFORE=$(date -d "$Y-$M-$D" "+%s")' >> /usr/bin/updatedate
  570. echo 'BACKWARDS_BETWEEN=0' >> /usr/bin/updatedate
  571. echo '# If the date was previously set' >> /usr/bin/updatedate
  572. echo 'if [[ -f "$BEFORE_DATE_FILE" ]]; then' >> /usr/bin/updatedate
  573. echo ' BEFORE_FILE=$(cat $BEFORE_DATE_FILE)' >> /usr/bin/updatedate
  574. echo ' BEFORE_FULLDATE=$(cat $BEFORE_FULLDATE_FILE)' >> /usr/bin/updatedate
  575. echo ' # is the date going backwards?' >> /usr/bin/updatedate
  576. echo ' if (( BEFORE_FILE > BEFORE )); then' >> /usr/bin/updatedate
  577. echo ' echo -n "Date went backwards between tlsdate updates. " >> $LOGFILE' >> /usr/bin/updatedate
  578. echo ' echo -n "$BEFORE_FILE > $BEFORE, " >> $LOGFILE' >> /usr/bin/updatedate
  579. echo ' echo "$BEFORE_FULLDATE > $DATE_BEFORE" >> $LOGFILE' >> /usr/bin/updatedate
  580. echo ' # Send a warning email' > /usr/bin/updatedate
  581. echo ' echo $(tail $LOGFILE -n 2) | mail -s "tlsdate anomaly" $EMAIL' >> /usr/bin/updatedate
  582. echo ' # Try another time source' >> /usr/bin/updatedate
  583. echo ' TIMESOURCE=$TIMESOURCE2' >> /usr/bin/updatedate
  584. echo ' # try running without any parameters' >> /usr/bin/updatedate
  585. echo ' tlsdate >> $LOGFILE' >> /usr/bin/updatedate
  586. echo ' BACKWARDS_BETWEEN=1' >> /usr/bin/updatedate
  587. echo ' fi' >> /usr/bin/updatedate
  588. echo 'fi' >> /usr/bin/updatedate
  589. echo '# Set the date' >> /usr/bin/updatedate
  590. echo '/usr/bin/timeout $TIMEOUT tlsdate -l -t -H $TIMESOURCE -p 443 >> $LOGFILE' >> /usr/bin/updatedate
  591. echo 'DATE_AFTER=$(date)' >> /usr/bin/updatedate
  592. echo 'AFTER=$(date -d "$Y-$M-$D" '+%s')' >> /usr/bin/updatedate
  593. echo '# After setting the date did it go backwards?' >> /usr/bin/updatedate
  594. echo 'if (( AFTER < BEFORE )); then' >> /usr/bin/updatedate
  595. echo ' echo "Incorrect date: $DATE_BEFORE -> $DATE_AFTER" >> $LOGFILE' >> /usr/bin/updatedate
  596. echo ' # Send a warning email' >> /usr/bin/updatedate
  597. echo ' echo $(tail $LOGFILE -n 2) | mail -s "tlsdate anomaly" $EMAIL' >> /usr/bin/updatedate
  598. echo ' # Try resetting the date from another time source' >> /usr/bin/updatedate
  599. echo ' /usr/bin/timeout $TIMEOUT tlsdate -l -t -H $TIMESOURCE2 -p 443 >> $LOGFILE' >> /usr/bin/updatedate
  600. echo ' DATE_AFTER=$(date)' >> /usr/bin/updatedate
  601. echo ' AFTER=$(date -d "$Y-$M-$D" "+%s")' >> /usr/bin/updatedate
  602. echo 'else' >> /usr/bin/updatedate
  603. echo ' echo -n $TIMESOURCE >> $LOGFILE' >> /usr/bin/updatedate
  604. echo ' if [[ -f "$BEFORE_DATE_FILE" ]]; then' >> /usr/bin/updatedate
  605. echo ' echo -n " " >> $LOGFILE' >> /usr/bin/updatedate
  606. echo ' echo -n $BEFORE_FILE >> $LOGFILE' >> /usr/bin/updatedate
  607. echo ' fi' >> /usr/bin/updatedate
  608. echo ' echo -n " " >> $LOGFILE' >> /usr/bin/updatedate
  609. echo ' echo -n $BEFORE >> $LOGFILE' >> /usr/bin/updatedate
  610. echo ' echo -n " " >> $LOGFILE' >> /usr/bin/updatedate
  611. echo ' echo -n $AFTER >> $LOGFILE' >> /usr/bin/updatedate
  612. echo ' echo -n " " >> $LOGFILE' >> /usr/bin/updatedate
  613. echo ' echo $DATE_AFTER >> $LOGFILE' >> /usr/bin/updatedate
  614. echo 'fi' >> /usr/bin/updatedate
  615. echo '# Log the last date' >> /usr/bin/updatedate
  616. echo 'if [ BACKWARDS_BETWEEN == 0 ]; then' >> /usr/bin/updatedate
  617. echo ' echo "$AFTER" > $BEFORE_DATE_FILE' >> /usr/bin/updatedate
  618. echo ' echo "$DATE_AFTER" > $BEFORE_FULLDATE_FILE' >> /usr/bin/updatedate
  619. echo ' exit 0' >> /usr/bin/updatedate
  620. echo 'else' >> /usr/bin/updatedate
  621. echo ' exit 1' >> /usr/bin/updatedate
  622. echo 'fi' >> /usr/bin/updatedate
  623. chmod +x /usr/bin/updatedate
  624. echo '*/15 * * * * root /usr/bin/updatedate' >> /etc/crontab
  625. service cron restart
  626. echo '#!/bin/bash' > /etc/init.d/tlsdate
  627. echo '# /etc/init.d/tlsdate' >> /etc/init.d/tlsdate
  628. echo '### BEGIN INIT INFO' >> /etc/init.d/tlsdate
  629. echo '# Provides: tlsdate' >> /etc/init.d/tlsdate
  630. echo '# Required-Start: $remote_fs $syslog' >> /etc/init.d/tlsdate
  631. echo '# Required-Stop: $remote_fs $syslog' >> /etc/init.d/tlsdate
  632. echo '# Default-Start: 2 3 4 5' >> /etc/init.d/tlsdate
  633. echo '# Default-Stop: 0 1 6' >> /etc/init.d/tlsdate
  634. echo '# Short-Description: Initially calls tlsdate with the timewarp option' >> /etc/init.d/tlsdate
  635. echo '# Description: Initially calls tlsdate with the timewarp option' >> /etc/init.d/tlsdate
  636. echo '### END INIT INFO' >> /etc/init.d/tlsdate
  637. echo '# Author: Bob Mottram <bob@robotics.uk.to>' >> /etc/init.d/tlsdate
  638. echo 'PATH="/usr/local/sbin:/usr/local/bin:/usr/bin:/sbin:/usr/sbin:/bin"' >> /etc/init.d/tlsdate
  639. echo 'LOGFILE="/var/log/tlsdate.log"' >> /etc/init.d/tlsdate
  640. echo 'TLSDATECOMMAND="tlsdate --timewarp -l -H www.ptb.de -p 443 >> $LOGFILE"' >> /etc/init.d/tlsdate
  641. echo '#Start-Stop here' >> /etc/init.d/tlsdate
  642. echo 'case "$1" in' >> /etc/init.d/tlsdate
  643. echo ' start)' >> /etc/init.d/tlsdate
  644. echo ' echo "tlsdate started"' >> /etc/init.d/tlsdate
  645. echo ' $TLSDATECOMMAND' >> /etc/init.d/tlsdate
  646. echo ' ;;' >> /etc/init.d/tlsdate
  647. echo ' stop)' >> /etc/init.d/tlsdate
  648. echo ' echo "tlsdate stopped"' >> /etc/init.d/tlsdate
  649. echo ' ;;' >> /etc/init.d/tlsdate
  650. echo ' restart)' >> /etc/init.d/tlsdate
  651. echo ' echo "tlsdate restarted"' >> /etc/init.d/tlsdate
  652. echo ' $TLSDATECOMMAND' >> /etc/init.d/tlsdate
  653. echo ' ;;' >> /etc/init.d/tlsdate
  654. echo ' *)' >> /etc/init.d/tlsdate
  655. echo ' echo "Usage: $0 {start|stop|restart}"' >> /etc/init.d/tlsdate
  656. echo ' exit 1' >> /etc/init.d/tlsdate
  657. echo ' ;;' >> /etc/init.d/tlsdate
  658. echo 'esac' >> /etc/init.d/tlsdate
  659. echo 'exit 0' >> /etc/init.d/tlsdate
  660. chmod +x /etc/init.d/tlsdate
  661. update-rc.d tlsdate defaults
  662. echo 'time_synchronisation' >> $COMPLETION_FILE
  663. }
  664. function configure_firewall {
  665. if grep -Fxq "configure_firewall" $COMPLETION_FILE; then
  666. return
  667. fi
  668. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  669. # docker does its own firewalling
  670. return
  671. fi
  672. iptables -P INPUT ACCEPT
  673. ip6tables -P INPUT ACCEPT
  674. iptables -F
  675. ip6tables -F
  676. iptables -X
  677. ip6tables -X
  678. iptables -P INPUT DROP
  679. ip6tables -P INPUT DROP
  680. iptables -A INPUT -i lo -j ACCEPT
  681. iptables -A INPUT -i eth0 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
  682. echo 'configure_firewall' >> $COMPLETION_FILE
  683. }
  684. function save_firewall_settings {
  685. iptables-save > /etc/firewall.conf
  686. ip6tables-save > /etc/firewall6.conf
  687. printf '#!/bin/sh\n' > /etc/network/if-up.d/iptables
  688. printf 'iptables-restore < /etc/firewall.conf\n' >> /etc/network/if-up.d/iptables
  689. printf 'ip6tables-restore < /etc/firewall6.conf\n' >> /etc/network/if-up.d/iptables
  690. chmod +x /etc/network/if-up.d/iptables
  691. }
  692. function configure_firewall_for_dns {
  693. if grep -Fxq "configure_firewall_for_dns" $COMPLETION_FILE; then
  694. return
  695. fi
  696. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  697. # docker does its own firewalling
  698. return
  699. fi
  700. iptables -A INPUT -i eth0 -p udp -m udp --dport 1024:65535 --sport 53 -j ACCEPT
  701. save_firewall_settings
  702. echo 'configure_firewall_for_dns' >> $COMPLETION_FILE
  703. }
  704. function configure_firewall_for_xmpp {
  705. if [ ! -d /etc/prosody ]; then
  706. return
  707. fi
  708. if grep -Fxq "configure_firewall_for_xmpp" $COMPLETION_FILE; then
  709. return
  710. fi
  711. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  712. # docker does its own firewalling
  713. return
  714. fi
  715. iptables -A INPUT -i eth0 -p tcp --dport 5222:5223 -j ACCEPT
  716. iptables -A INPUT -i eth0 -p tcp --dport 5269 -j ACCEPT
  717. iptables -A INPUT -i eth0 -p tcp --dport 5280:5281 -j ACCEPT
  718. save_firewall_settings
  719. echo 'configure_firewall_for_xmpp' >> $COMPLETION_FILE
  720. }
  721. function configure_firewall_for_irc {
  722. if [ ! -d /etc/ngircd ]; then
  723. return
  724. fi
  725. if grep -Fxq "configure_firewall_for_irc" $COMPLETION_FILE; then
  726. return
  727. fi
  728. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  729. # docker does its own firewalling
  730. return
  731. fi
  732. iptables -A INPUT -i eth0 -p tcp --dport 6697 -j ACCEPT
  733. iptables -A INPUT -i eth0 -p tcp --dport 9999 -j ACCEPT
  734. save_firewall_settings
  735. echo 'configure_firewall_for_irc' >> $COMPLETION_FILE
  736. }
  737. function configure_firewall_for_ftp {
  738. if grep -Fxq "configure_firewall_for_ftp" $COMPLETION_FILE; then
  739. return
  740. fi
  741. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  742. # docker does its own firewalling
  743. return
  744. fi
  745. iptables -I INPUT -i eth0 -p tcp --dport 1024:65535 --sport 20:21 -j ACCEPT
  746. save_firewall_settings
  747. echo 'configure_firewall_for_ftp' >> $COMPLETION_FILE
  748. }
  749. function configure_firewall_for_web_access {
  750. if grep -Fxq "configure_firewall_for_web_access" $COMPLETION_FILE; then
  751. return
  752. fi
  753. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  754. # docker does its own firewalling
  755. return
  756. fi
  757. iptables -A INPUT -i eth0 -p tcp --dport 32768:61000 --sport 80 -j ACCEPT
  758. iptables -A INPUT -i eth0 -p tcp --dport 32768:61000 --sport 443 -j ACCEPT
  759. save_firewall_settings
  760. echo 'configure_firewall_for_web_access' >> $COMPLETION_FILE
  761. }
  762. function configure_firewall_for_web_server {
  763. if grep -Fxq "configure_firewall_for_web_server" $COMPLETION_FILE; then
  764. return
  765. fi
  766. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  767. # docker does its own firewalling
  768. return
  769. fi
  770. iptables -A INPUT -i eth0 -p tcp --dport 80 -j ACCEPT
  771. iptables -A INPUT -i eth0 -p tcp --dport 443 -j ACCEPT
  772. save_firewall_settings
  773. echo 'configure_firewall_for_web_server' >> $COMPLETION_FILE
  774. }
  775. function configure_firewall_for_ssh {
  776. if grep -Fxq "configure_firewall_for_ssh" $COMPLETION_FILE; then
  777. return
  778. fi
  779. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  780. # docker does its own firewalling
  781. return
  782. fi
  783. iptables -A INPUT -i eth0 -p tcp --dport 22 -j ACCEPT
  784. iptables -A INPUT -i eth0 -p tcp --dport $SSH_PORT -j ACCEPT
  785. save_firewall_settings
  786. echo 'configure_firewall_for_ssh' >> $COMPLETION_FILE
  787. }
  788. function configure_firewall_for_git {
  789. if grep -Fxq "configure_firewall_for_git" $COMPLETION_FILE; then
  790. return
  791. fi
  792. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  793. # docker does its own firewalling
  794. return
  795. fi
  796. iptables -A INPUT -i eth0 -p tcp --dport 9418 -j ACCEPT
  797. save_firewall_settings
  798. echo 'configure_firewall_for_git' >> $COMPLETION_FILE
  799. }
  800. function configure_firewall_for_email {
  801. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  802. return
  803. fi
  804. if grep -Fxq "configure_firewall_for_email" $COMPLETION_FILE; then
  805. return
  806. fi
  807. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  808. # docker does its own firewalling
  809. return
  810. fi
  811. iptables -A INPUT -i eth0 -p tcp --dport 25 -j ACCEPT
  812. iptables -A INPUT -i eth0 -p tcp --dport 587 -j ACCEPT
  813. iptables -A INPUT -i eth0 -p tcp --dport 465 -j ACCEPT
  814. iptables -A INPUT -i eth0 -p tcp --dport 993 -j ACCEPT
  815. save_firewall_settings
  816. echo 'configure_firewall_for_email' >> $COMPLETION_FILE
  817. }
  818. function configure_internet_protocol {
  819. if grep -Fxq "configure_internet_protocol" $COMPLETION_FILE; then
  820. return
  821. fi
  822. sed -i "s/#net.ipv4.tcp_syncookies=1/net.ipv4.tcp_syncookies=1/g" /etc/sysctl.conf
  823. sed -i "s/#net.ipv4.conf.all.accept_redirects = 0/net.ipv4.conf.all.accept_redirects = 0/g" /etc/sysctl.conf
  824. sed -i "s/#net.ipv6.conf.all.accept_redirects = 0/net.ipv6.conf.all.accept_redirects = 0/g" /etc/sysctl.conf
  825. sed -i "s/#net.ipv4.conf.all.send_redirects = 0/net.ipv4.conf.all.send_redirects = 0/g" /etc/sysctl.conf
  826. sed -i "s/#net.ipv4.conf.all.accept_source_route = 0/net.ipv4.conf.all.accept_source_route = 0/g" /etc/sysctl.conf
  827. sed -i "s/#net.ipv6.conf.all.accept_source_route = 0/net.ipv6.conf.all.accept_source_route = 0/g" /etc/sysctl.conf
  828. sed -i "s/#net.ipv4.conf.default.rp_filter=1/net.ipv4.conf.default.rp_filter=1/g" /etc/sysctl.conf
  829. sed -i "s/#net.ipv4.conf.all.rp_filter=1/net.ipv4.conf.all.rp_filter=1/g" /etc/sysctl.conf
  830. sed -i "s/#net.ipv4.ip_forward=1/net.ipv4.ip_forward=0/g" /etc/sysctl.conf
  831. sed -i "s/#net.ipv6.conf.all.forwarding=1/net.ipv6.conf.all.forwarding=0/g" /etc/sysctl.conf
  832. echo '# ignore pings' >> /etc/sysctl.conf
  833. echo 'net.ipv4.icmp_echo_ignore_all = 1' >> /etc/sysctl.conf
  834. echo 'net.ipv6.icmp_echo_ignore_all = 1' >> /etc/sysctl.conf
  835. echo '# disable ipv6' >> /etc/sysctl.conf
  836. echo 'net.ipv6.conf.all.disable_ipv6 = 1' >> /etc/sysctl.conf
  837. echo 'net.ipv4.tcp_synack_retries = 2' >> /etc/sysctl.conf
  838. echo 'net.ipv4.tcp_syn_retries = 1' >> /etc/sysctl.conf
  839. echo '# keepalive' >> /etc/sysctl.conf
  840. echo 'net.ipv4.tcp_keepalive_probes = 9' >> /etc/sysctl.conf
  841. echo 'net.ipv4.tcp_keepalive_intvl = 75' >> /etc/sysctl.conf
  842. echo 'net.ipv4.tcp_keepalive_time = 7200' >> /etc/sysctl.conf
  843. echo 'configure_internet_protocol' >> $COMPLETION_FILE
  844. }
  845. function script_to_make_self_signed_certificates {
  846. if grep -Fxq "script_to_make_self_signed_certificates" $COMPLETION_FILE; then
  847. return
  848. fi
  849. echo '#!/bin/bash' > /usr/bin/makecert
  850. echo 'HOSTNAME=$1' >> /usr/bin/makecert
  851. echo 'COUNTRY_CODE="US"' >> /usr/bin/makecert
  852. echo 'AREA="Free Speech Zone"' >> /usr/bin/makecert
  853. echo 'LOCATION="Freedomville"' >> /usr/bin/makecert
  854. echo 'ORGANISATION="Freedombone"' >> /usr/bin/makecert
  855. echo 'UNIT="Freedombone Unit"' >> /usr/bin/makecert
  856. echo 'if ! which openssl > /dev/null ;then' >> /usr/bin/makecert
  857. echo ' echo "$0: openssl is not installed, exiting" 1>&2' >> /usr/bin/makecert
  858. echo ' exit 1' >> /usr/bin/makecert
  859. echo 'fi' >> /usr/bin/makecert
  860. echo 'openssl req -x509 -nodes -days 3650 -sha256 -subj "/O=$ORGANISATION/OU=$UNIT/C=$COUNTRY_CODE/ST=$AREA/L=$LOCATION/CN=$HOSTNAME" -newkey rsa:4096 -keyout /etc/ssl/private/$HOSTNAME.key -out /etc/ssl/certs/$HOSTNAME.crt' >> /usr/bin/makecert
  861. echo 'openssl dhparam -check -text -5 1024 -out /etc/ssl/certs/$HOSTNAME.dhparam' >> /usr/bin/makecert
  862. echo 'chmod 400 /etc/ssl/private/$HOSTNAME.key' >> /usr/bin/makecert
  863. echo 'chmod 640 /etc/ssl/certs/$HOSTNAME.crt' >> /usr/bin/makecert
  864. echo 'chmod 640 /etc/ssl/certs/$HOSTNAME.dhparam' >> /usr/bin/makecert
  865. echo 'if [ -f /etc/init.d/nginx ]; then' >> /usr/bin/makecert
  866. echo ' /etc/init.d/nginx reload' >> /usr/bin/makecert
  867. echo 'fi' >> /usr/bin/makecert
  868. echo '# add the public certificate to a separate directory' >> /usr/bin/makecert
  869. echo '# so that we can redistribute it easily' >> /usr/bin/makecert
  870. echo 'if [ ! -d /etc/ssl/mycerts ]; then' >> /usr/bin/makecert
  871. echo ' mkdir /etc/ssl/mycerts' >> /usr/bin/makecert
  872. echo 'fi' >> /usr/bin/makecert
  873. echo 'cp /etc/ssl/certs/$HOSTNAME.crt /etc/ssl/mycerts' >> /usr/bin/makecert
  874. echo '# Create a bundle of your certificates' >> /usr/bin/makecert
  875. echo 'cat /etc/ssl/mycerts/*.crt > /etc/ssl/freedombone-bundle.crt' >> /usr/bin/makecert
  876. echo 'tar -czvf /etc/ssl/freedombone-certs.tar.gz /etc/ssl/mycerts/*.crt' >> /usr/bin/makecert
  877. chmod +x /usr/bin/makecert
  878. echo 'script_to_make_self_signed_certificates' >> $COMPLETION_FILE
  879. }
  880. function configure_email {
  881. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  882. return
  883. fi
  884. if grep -Fxq "configure_email" $COMPLETION_FILE; then
  885. return
  886. fi
  887. apt-get -y remove postfix
  888. apt-get -y --force-yes install exim4 sasl2-bin swaks libnet-ssleay-perl procmail
  889. echo 'dc_eximconfig_configtype="internet"' > /etc/exim4/update-exim4.conf.conf
  890. echo "dc_other_hostnames='$DOMAIN_NAME'" >> /etc/exim4/update-exim4.conf.conf
  891. echo "dc_local_interfaces=''" >> /etc/exim4/update-exim4.conf.conf
  892. echo "dc_readhost=''" >> /etc/exim4/update-exim4.conf.conf
  893. echo "dc_relay_domains=''" >> /etc/exim4/update-exim4.conf.conf
  894. echo "dc_minimaldns='false'" >> /etc/exim4/update-exim4.conf.conf
  895. echo "dc_relay_nets='192.168.1.0/24'" >> /etc/exim4/update-exim4.conf.conf
  896. echo "dc_smarthost=''" >> /etc/exim4/update-exim4.conf.conf
  897. echo "CFILEMODE='644'" >> /etc/exim4/update-exim4.conf.conf
  898. echo "dc_use_split_config='false'" >> /etc/exim4/update-exim4.conf.conf
  899. echo "dc_hide_mailname=''" >> /etc/exim4/update-exim4.conf.conf
  900. echo "dc_mailname_in_oh='true'" >> /etc/exim4/update-exim4.conf.conf
  901. echo "dc_localdelivery='maildir_home'" >> /etc/exim4/update-exim4.conf.conf
  902. update-exim4.conf
  903. sed -i "s/START=no/START=yes/g" /etc/default/saslauthd
  904. /etc/init.d/saslauthd start
  905. # make a tls certificate for email
  906. makecert exim
  907. mv /etc/ssl/private/exim.key /etc/exim4
  908. mv /etc/ssl/certs/exim.crt /etc/exim4
  909. mv /etc/ssl/certs/exim.dhparam /etc/exim4
  910. chown root:Debian-exim /etc/exim4/exim.key /etc/exim4/exim.crt /etc/exim4/exim.dhparam
  911. chmod 640 /etc/exim4/exim.key /etc/exim4/exim.crt /etc/exim4/exim.dhparam
  912. sed -i '/login_saslauthd_server/,/.endif/ s/# *//' /etc/exim4/exim4.conf.template
  913. sed -i "/.ifdef MAIN_HARDCODE_PRIMARY_HOSTNAME/i\MAIN_HARDCODE_PRIMARY_HOSTNAME = $DOMAIN_NAME\nMAIN_TLS_ENABLE = true" /etc/exim4/exim4.conf.template
  914. sed -i "s|SMTPLISTENEROPTIONS=''|SMTPLISTENEROPTIONS='-oX 465:25:587 -oP /var/run/exim4/exim.pid'|g" /etc/default/exim4
  915. if ! grep -q "tls_on_connect_ports=465" /etc/exim4/exim4.conf.template; then
  916. sed -i '/SSL configuration for exim/i\tls_on_connect_ports=465' /etc/exim4/exim4.conf.template
  917. fi
  918. adduser $MY_USERNAME sasl
  919. addgroup Debian-exim sasl
  920. /etc/init.d/exim4 restart
  921. if [ ! -d /etc/skel/Maildir ]; then
  922. mkdir -m 700 /etc/skel/Maildir
  923. mkdir -m 700 /etc/skel/Maildir/Sent
  924. mkdir -m 700 /etc/skel/Maildir/Sent/tmp
  925. mkdir -m 700 /etc/skel/Maildir/Sent/cur
  926. mkdir -m 700 /etc/skel/Maildir/Sent/new
  927. mkdir -m 700 /etc/skel/Maildir/.learn-spam
  928. mkdir -m 700 /etc/skel/Maildir/.learn-spam/cur
  929. mkdir -m 700 /etc/skel/Maildir/.learn-spam/new
  930. mkdir -m 700 /etc/skel/Maildir/.learn-spam/tmp
  931. mkdir -m 700 /etc/skel/Maildir/.learn-ham
  932. mkdir -m 700 /etc/skel/Maildir/.learn-ham/cur
  933. mkdir -m 700 /etc/skel/Maildir/.learn-ham/new
  934. mkdir -m 700 /etc/skel/Maildir/.learn-ham/tmp
  935. ln -s /etc/skel/Maildir/.learn-spam /etc/skel/Maildir/spam
  936. ln -s /etc/skel/Maildir/.learn-ham /etc/skel/Maildir/ham
  937. fi
  938. if [ ! -d /home/$MY_USERNAME/Maildir ]; then
  939. mkdir -m 700 /home/$MY_USERNAME/Maildir
  940. mkdir -m 700 /home/$MY_USERNAME/Maildir/cur
  941. mkdir -m 700 /home/$MY_USERNAME/Maildir/tmp
  942. mkdir -m 700 /home/$MY_USERNAME/Maildir/new
  943. mkdir -m 700 /home/$MY_USERNAME/Maildir/Sent
  944. mkdir -m 700 /home/$MY_USERNAME/Maildir/Sent/cur
  945. mkdir -m 700 /home/$MY_USERNAME/Maildir/Sent/tmp
  946. mkdir -m 700 /home/$MY_USERNAME/Maildir/Sent/new
  947. mkdir -m 700 /home/$MY_USERNAME/Maildir/.learn-spam
  948. mkdir -m 700 /home/$MY_USERNAME/Maildir/.learn-spam/cur
  949. mkdir -m 700 /home/$MY_USERNAME/Maildir/.learn-spam/new
  950. mkdir -m 700 /home/$MY_USERNAME/Maildir/.learn-spam/tmp
  951. mkdir -m 700 /home/$MY_USERNAME/Maildir/.learn-ham
  952. mkdir -m 700 /home/$MY_USERNAME/Maildir/.learn-ham/cur
  953. mkdir -m 700 /home/$MY_USERNAME/Maildir/.learn-ham/new
  954. mkdir -m 700 /home/$MY_USERNAME/Maildir/.learn-ham/tmp
  955. ln -s /home/$MY_USERNAME/Maildir/.learn-spam /home/$MY_USERNAME/Maildir/spam
  956. ln -s /home/$MY_USERNAME/Maildir/.learn-ham /home/$MY_USERNAME/Maildir/ham
  957. chown -R $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/Maildir
  958. fi
  959. echo 'configure_email' >> $COMPLETION_FILE
  960. }
  961. function spam_filtering {
  962. # NOTE: spamassassin installation currently doesn't work, sa-compile fails with a make error 23/09/2014
  963. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  964. return
  965. fi
  966. if grep -Fxq "spam_filtering" $COMPLETION_FILE; then
  967. return
  968. fi
  969. apt-get -y --force-yes install exim4-daemon-heavy
  970. apt-get -y --force-yes install spamassassin
  971. sa-update -v
  972. sed -i 's/ENABLED=0/ENABLED=1/g' /etc/default/spamassassin
  973. sed -i 's/# spamd_address = 127.0.0.1 783/spamd_address = 127.0.0.1 783/g' /etc/exim4/exim4.conf.template
  974. # This configuration is based on https://wiki.debian.org/DebianSpamAssassin
  975. sed -i 's/local_parts = postmaster/local_parts = postmaster:abuse/g' /etc/exim4/conf.d/acl/30_exim4-config_check_rcpt
  976. sed -i '/domains = +local_domains : +relay_to_domains/a\ set acl_m0 = rfcnames' /etc/exim4/conf.d/acl/30_exim4-config_check_rcpt
  977. sed -i 's/accept/accept condition = ${if eq{$acl_m0}{rfcnames} {1}{0}}/g' /etc/exim4/conf.d/acl/40_exim4-config_check_data
  978. echo 'warn message = X-Spam-Score: $spam_score ($spam_bar)' >> /etc/exim4/conf.d/acl/40_exim4-config_check_data
  979. echo ' spam = nobody:true' >> /etc/exim4/conf.d/acl/40_exim4-config_check_data
  980. echo 'warn message = X-Spam-Flag: YES' >> /etc/exim4/conf.d/acl/40_exim4-config_check_data
  981. echo ' spam = nobody' >> /etc/exim4/conf.d/acl/40_exim4-config_check_data
  982. echo 'warn message = X-Spam-Report: $spam_report' >> /etc/exim4/conf.d/acl/40_exim4-config_check_data
  983. echo ' spam = nobody' >> /etc/exim4/conf.d/acl/40_exim4-config_check_data
  984. echo '# reject spam at high scores (> 12)' >> /etc/exim4/conf.d/acl/40_exim4-config_check_data
  985. echo 'deny message = This message scored $spam_score spam points.' >> /etc/exim4/conf.d/acl/40_exim4-config_check_data
  986. echo ' spam = nobody:true' >> /etc/exim4/conf.d/acl/40_exim4-config_check_data
  987. echo ' condition = ${if >{$spam_score_int}{120}{1}{0}}' >> /etc/exim4/conf.d/acl/40_exim4-config_check_data
  988. # procmail configuration
  989. echo 'MAILDIR=$HOME/Maildir' > /home/$MY_USERNAME/.procmailrc
  990. echo 'DEFAULT=$MAILDIR/' >> /home/$MY_USERNAME/.procmailrc
  991. echo 'LOGFILE=$HOME/log/procmail.log' >> /home/$MY_USERNAME/.procmailrc
  992. echo 'LOGABSTRACT=all' >> /home/$MY_USERNAME/.procmailrc
  993. echo '# get spamassassin to check emails' >> /home/$MY_USERNAME/.procmailrc
  994. echo ':0fw: .spamassassin.lock' >> /home/$MY_USERNAME/.procmailrc
  995. echo ' * < 256000' >> /home/$MY_USERNAME/.procmailrc
  996. echo '| spamc' >> /home/$MY_USERNAME/.procmailrc
  997. echo '# strong spam are discarded' >> /home/$MY_USERNAME/.procmailrc
  998. echo ':0' >> /home/$MY_USERNAME/.procmailrc
  999. echo ' * ^X-Spam-Level: \*\*\*\*\*\*' >> /home/$MY_USERNAME/.procmailrc
  1000. echo '/dev/null' >> /home/$MY_USERNAME/.procmailrc
  1001. echo '# weak spam are kept just in case - clear this out every now and then' >> /home/$MY_USERNAME/.procmailrc
  1002. echo ':0' >> /home/$MY_USERNAME/.procmailrc
  1003. echo ' * ^X-Spam-Level: \*\*\*\*\*' >> /home/$MY_USERNAME/.procmailrc
  1004. echo '.0-spam/' >> /home/$MY_USERNAME/.procmailrc
  1005. echo '# otherwise, marginal spam goes here for revision' >> /home/$MY_USERNAME/.procmailrc
  1006. echo ':0' >> /home/$MY_USERNAME/.procmailrc
  1007. echo ' * ^X-Spam-Level: \*\*' >> /home/$MY_USERNAME/.procmailrc
  1008. echo '.spam/' >> /home/$MY_USERNAME/.procmailrc
  1009. chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/.procmailrc
  1010. # filtering scripts
  1011. echo '#!/bin/bash' > /usr/bin/filterspam
  1012. echo 'USERNAME=$1' >> /usr/bin/filterspam
  1013. echo 'MAILDIR=/home/$USERNAME/Maildir/.learn-spam' >> /usr/bin/filterspam
  1014. echo 'if [ ! -d "$MAILDIR" ]; then' >> /usr/bin/filterspam
  1015. echo ' exit' >> /usr/bin/filterspam
  1016. echo 'fi' >> /usr/bin/filterspam
  1017. echo 'for f in `ls $MAILDIR/cur`' >> /usr/bin/filterspam
  1018. echo 'do' >> /usr/bin/filterspam
  1019. echo ' spamc -L spam < "$MAILDIR/cur/$f" > /dev/null' >> /usr/bin/filterspam
  1020. echo ' rm "$MAILDIR/cur/$f"' >> /usr/bin/filterspam
  1021. echo 'done' >> /usr/bin/filterspam
  1022. echo 'for f in `ls $MAILDIR/new`' >> /usr/bin/filterspam
  1023. echo 'do' >> /usr/bin/filterspam
  1024. echo ' spamc -L spam < "$MAILDIR/new/$f" > /dev/null' >> /usr/bin/filterspam
  1025. echo ' rm "$MAILDIR/new/$f"' >> /usr/bin/filterspam
  1026. echo 'done' >> /usr/bin/filterspam
  1027. echo '#!/bin/bash' > /usr/bin/filterham
  1028. echo 'USERNAME=$1' >> /usr/bin/filterham
  1029. echo 'MAILDIR=/home/$USERNAME/Maildir/.learn-ham' >> /usr/bin/filterham
  1030. echo 'if [ ! -d "$MAILDIR" ]; then' >> /usr/bin/filterham
  1031. echo ' exit' >> /usr/bin/filterham
  1032. echo 'fi' >> /usr/bin/filterham
  1033. echo 'for f in `ls $MAILDIR/cur`' >> /usr/bin/filterham
  1034. echo 'do' >> /usr/bin/filterham
  1035. echo ' spamc -L ham < "$MAILDIR/cur/$f" > /dev/null' >> /usr/bin/filterham
  1036. echo ' rm "$MAILDIR/cur/$f"' >> /usr/bin/filterham
  1037. echo 'done' >> /usr/bin/filterham
  1038. echo 'for f in `ls $MAILDIR/new`' >> /usr/bin/filterham
  1039. echo 'do' >> /usr/bin/filterham
  1040. echo ' spamc -L ham < "$MAILDIR/new/$f" > /dev/null' >> /usr/bin/filterham
  1041. echo ' rm "$MAILDIR/new/$f"' >> /usr/bin/filterham
  1042. echo 'done' >> /usr/bin/filterham
  1043. if ! grep -q "filterspam" /etc/crontab; then
  1044. echo "*/3 * * * * root /usr/bin/timeout 120 /usr/bin/filterspam $MY_USERNAME" >> /etc/crontab
  1045. fi
  1046. if ! grep -q "filterham" /etc/crontab; then
  1047. echo "*/3 * * * * root /usr/bin/timeout 120 /usr/bin/filterham $MY_USERNAME" >> /etc/crontab
  1048. fi
  1049. chmod 655 /usr/bin/filterspam /usr/bin/filterham
  1050. sed -i 's/# use_bayes 1/use_bayes 1/g' /etc/mail/spamassassin/local.cf
  1051. sed -i 's/# bayes_auto_learn 1/bayes_auto_learn 1/g' /etc/mail/spamassassin/local.cf
  1052. service spamassassin restart
  1053. service exim4 restart
  1054. service cron restart
  1055. echo 'spam_filtering' >> $COMPLETION_FILE
  1056. }
  1057. function configure_imap {
  1058. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  1059. return
  1060. fi
  1061. if grep -Fxq "configure_imap" $COMPLETION_FILE; then
  1062. return
  1063. fi
  1064. apt-get -y --force-yes install dovecot-common dovecot-imapd
  1065. makecert dovecot
  1066. chown root:dovecot /etc/ssl/certs/dovecot.crt
  1067. chown root:dovecot /etc/ssl/private/dovecot.key
  1068. chown root:dovecot /etc/ssl/private/dovecot.dhparams
  1069. sed -i 's|#ssl = yes|ssl = yes|g' /etc/dovecot/conf.d/10-ssl.conf
  1070. sed -i 's|ssl_cert = </etc/dovecot/dovecot.pem|ssl_cert = </etc/ssl/certs/dovecot.crt|g' /etc/dovecot/conf.d/10-ssl.conf
  1071. sed -i 's|ssl_key = </etc/dovecot/private/dovecot.pem|/etc/ssl/private/dovecot.key|g' /etc/dovecot/conf.d/10-ssl.conf
  1072. sed -i 's|#ssl_dh_parameters_length = 1024|ssl_dh_parameters_length = 1024|g' /etc/dovecot/conf.d/10-ssl.conf
  1073. sed -i 's/#ssl_prefer_server_ciphers = no/ssl_prefer_server_ciphers = yes/g' /etc/dovecot/conf.d/10-ssl.conf
  1074. echo "ssl_cipher_list = '$SSL_CIPHERS'" >> /etc/dovecot/conf.d/10-ssl.conf
  1075. sed -i 's/#listen = *, ::/listen = */g' /etc/dovecot/dovecot.conf
  1076. sed -i 's/#disable_plaintext_auth = yes/disable_plaintext_auth = no/g' /etc/dovecot/conf.d/10-auth.conf
  1077. sed -i 's/auth_mechanisms = plain/auth_mechanisms = plain login/g' /etc/dovecot/conf.d/10-auth.conf
  1078. sed -i 's|# mail_location = maildir:~/Maildir| mail_location = maildir:~/Maildir:LAYOUT=fs|g' /etc/dovecot/conf.d/10-mail.conf
  1079. echo 'configure_imap' >> $COMPLETION_FILE
  1080. }
  1081. function configure_gpg {
  1082. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  1083. return
  1084. fi
  1085. if grep -Fxq "configure_gpg" $COMPLETION_FILE; then
  1086. return
  1087. fi
  1088. apt-get -y --force-yes install gnupg
  1089. if [ ! -d /home/$MY_USERNAME/.gnupg ]; then
  1090. mkdir /home/$MY_USERNAME/.gnupg
  1091. echo 'keyserver hkp://keys.gnupg.net' >> /home/$MY_USERNAME/.gnupg/gpg.conf
  1092. echo 'keyserver-options auto-key-retrieve' >> /home/$MY_USERNAME/.gnupg/gpg.conf
  1093. fi
  1094. sed -i "s|keyserver hkp://keys.gnupg.net|keyserver $GPG_KEYSERVER|g" /home/$MY_USERNAME/.gnupg/gpg.conf
  1095. if ! grep -q "# default preferences" /home/$MY_USERNAME/.gnupg/gpg.conf; then
  1096. echo '' >> /home/$MY_USERNAME/.gnupg/gpg.conf
  1097. echo '# default preferences' >> /home/$MY_USERNAME/.gnupg/gpg.conf
  1098. echo 'personal-digest-preferences SHA256' >> /home/$MY_USERNAME/.gnupg/gpg.conf
  1099. echo 'cert-digest-algo SHA256' >> /home/$MY_USERNAME/.gnupg/gpg.conf
  1100. echo 'default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed' >> /home/$MY_USERNAME/.gnupg/gpg.conf
  1101. fi
  1102. chown -R $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/.gnupg
  1103. if [[ $MY_GPG_PUBLIC_KEY && $MY_GPG_PRIVATE_KEY ]]; then
  1104. # use your existing GPG keys which were exported
  1105. if [ ! -f $MY_GPG_PUBLIC_KEY ]; then
  1106. echo "GPG public key file $MY_GPG_PUBLIC_KEY was not found"
  1107. exit 5
  1108. fi
  1109. if [ ! -f $MY_GPG_PRIVATE_KEY ]; then
  1110. echo "GPG private key file $MY_GPG_PRIVATE_KEY was not found"
  1111. exit 6
  1112. fi
  1113. su -c "gpg --import $MY_GPG_PUBLIC_KEY" - $MY_USERNAME
  1114. su -c "gpg --allow-secret-key-import --import $MY_GPG_PRIVATE_KEY" - $MY_USERNAME
  1115. # for security ensure that the private key file doesn't linger around
  1116. shred -zu $MY_GPG_PRIVATE_KEY
  1117. else
  1118. # Generate a GPG key
  1119. echo 'Key-Type: 1' > /home/$MY_USERNAME/gpg-genkey.conf
  1120. echo 'Key-Length: 4096' >> /home/$MY_USERNAME/gpg-genkey.conf
  1121. echo 'Subkey-Type: 1' >> /home/$MY_USERNAME/gpg-genkey.conf
  1122. echo 'Subkey-Length: 4096' >> /home/$MY_USERNAME/gpg-genkey.conf
  1123. echo "Name-Real: $MY_USERNAME@$DOMAIN_NAME" >> /home/$MY_USERNAME/gpg-genkey.conf
  1124. echo "Name-Email: $MY_USERNAME@$DOMAIN_NAME" >> /home/$MY_USERNAME/gpg-genkey.conf
  1125. echo 'Expire-Date: 0' >> /home/$MY_USERNAME/gpg-genkey.conf
  1126. chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/gpg-genkey.conf
  1127. su -c "gpg --batch --gen-key /home/$MY_USERNAME/gpg-genkey.conf" - $MY_USERNAME
  1128. shred -zu /home/$MY_USERNAME/gpg-genkey.conf
  1129. MY_GPG_PUBLIC_KEY_ID=$(su -c "gpg --list-keys $DOMAIN_NAME | grep 'pub ' | awk -F ' ' '{print $2}' | awk -F '/' '{print $2}'" - $MY_USERNAME)
  1130. MY_GPG_PUBLIC_KEY=/tmp/public_key.gpg
  1131. su -c "gpg --output $MY_GPG_PUBLIC_KEY --armor --export $MY_GPG_PUBLIC_KEY_ID" - $MY_USERNAME
  1132. fi
  1133. echo 'configure_gpg' >> $COMPLETION_FILE
  1134. }
  1135. function email_client {
  1136. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  1137. return
  1138. fi
  1139. if grep -Fxq "email_client" $COMPLETION_FILE; then
  1140. return
  1141. fi
  1142. apt-get -y --force-yes install mutt-patched lynx abook
  1143. if [ ! -d /home/$MY_USERNAME/.mutt ]; then
  1144. mkdir /home/$MY_USERNAME/.mutt
  1145. fi
  1146. echo "text/html; lynx -dump -width=78 -nolist %s | sed ‘s/^ //’; copiousoutput; needsterminal; nametemplate=%s.html" > /home/$MY_USERNAME/.mutt/mailcap
  1147. chown -R $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/.mutt
  1148. echo 'set mbox_type=Maildir' >> /etc/Muttrc
  1149. echo 'set folder="~/Maildir"' >> /etc/Muttrc
  1150. echo 'set mask="!^\\.[^.]"' >> /etc/Muttrc
  1151. echo 'set mbox="~/Maildir"' >> /etc/Muttrc
  1152. echo 'set record="+Sent"' >> /etc/Muttrc
  1153. echo 'set postponed="+Drafts"' >> /etc/Muttrc
  1154. echo 'set trash="+Trash"' >> /etc/Muttrc
  1155. echo 'set spoolfile="~/Maildir"' >> /etc/Muttrc
  1156. echo 'auto_view text/x-vcard text/html text/enriched' >> /etc/Muttrc
  1157. echo 'set editor="emacs"' >> /etc/Muttrc
  1158. echo 'set header_cache="+.cache"' >> /etc/Muttrc
  1159. echo '' >> /etc/Muttrc
  1160. echo 'macro index S "<tag-prefix><save-message>=.learn-spam<enter>" "move to learn-spam"' >> /etc/Muttrc
  1161. echo 'macro pager S "<save-message>=.learn-spam<enter>" "move to learn-spam"' >> /etc/Muttrc
  1162. echo 'macro index H "<tag-prefix><copy-message>=.learn-ham<enter>" "copy to learn-ham"' >> /etc/Muttrc
  1163. echo 'macro pager H "<copy-message>=.learn-ham<enter>" "copy to learn-ham"' >> /etc/Muttrc
  1164. echo '' >> /etc/Muttrc
  1165. echo '# set up the sidebar' >> /etc/Muttrc
  1166. echo 'set sidebar_width=12' >> /etc/Muttrc
  1167. echo 'set sidebar_visible=yes' >> /etc/Muttrc
  1168. echo "set sidebar_delim='|'" >> /etc/Muttrc
  1169. echo 'set sidebar_sort=yes' >> /etc/Muttrc
  1170. echo '' >> /etc/Muttrc
  1171. echo 'set rfc2047_parameters' >> /etc/Muttrc
  1172. echo '' >> /etc/Muttrc
  1173. echo '# Show inbox and sent items' >> /etc/Muttrc
  1174. echo 'mailboxes = =Sent' >> /etc/Muttrc
  1175. echo '' >> /etc/Muttrc
  1176. echo '# Alter these colours as needed for maximum bling' >> /etc/Muttrc
  1177. echo 'color sidebar_new yellow default' >> /etc/Muttrc
  1178. echo 'color normal white default' >> /etc/Muttrc
  1179. echo 'color hdrdefault brightcyan default' >> /etc/Muttrc
  1180. echo 'color signature green default' >> /etc/Muttrc
  1181. echo 'color attachment brightyellow default' >> /etc/Muttrc
  1182. echo 'color quoted green default' >> /etc/Muttrc
  1183. echo 'color quoted1 white default' >> /etc/Muttrc
  1184. echo 'color tilde blue default' >> /etc/Muttrc
  1185. echo '' >> /etc/Muttrc
  1186. echo '# ctrl-n, ctrl-p to select next, prev folder' >> /etc/Muttrc
  1187. echo '# ctrl-o to open selected folder' >> /etc/Muttrc
  1188. echo 'bind index \Cp sidebar-prev' >> /etc/Muttrc
  1189. echo 'bind index \Cn sidebar-next' >> /etc/Muttrc
  1190. echo 'bind index \Co sidebar-open' >> /etc/Muttrc
  1191. echo 'bind pager \Cp sidebar-prev' >> /etc/Muttrc
  1192. echo 'bind pager \Cn sidebar-next' >> /etc/Muttrc
  1193. echo 'bind pager \Co sidebar-open' >> /etc/Muttrc
  1194. echo '' >> /etc/Muttrc
  1195. echo '# ctrl-b toggles sidebar visibility' >> /etc/Muttrc
  1196. echo "macro index,pager \Cb '<enter-command>toggle sidebar_visible<enter><redraw-screen>' 'toggle sidebar'" >> /etc/Muttrc
  1197. echo '' >> /etc/Muttrc
  1198. echo '# esc-m Mark new messages as read' >> /etc/Muttrc
  1199. echo 'macro index <esc>m "T~N<enter>;WNT~O<enter>;WO\CT~T<enter>" "mark all messages read"' >> /etc/Muttrc
  1200. echo '' >> /etc/Muttrc
  1201. echo '# Collapsing threads' >> /etc/Muttrc
  1202. echo 'macro index [ "<collapse-thread>" "collapse/uncollapse thread"' >> /etc/Muttrc
  1203. echo 'macro index ] "<collapse-all>" "collapse/uncollapse all threads"' >> /etc/Muttrc
  1204. echo '' >> /etc/Muttrc
  1205. echo '# threads containing new messages' >> /etc/Muttrc
  1206. echo 'uncolor index "~(~N)"' >> /etc/Muttrc
  1207. echo 'color index brightblue default "~(~N)"' >> /etc/Muttrc
  1208. echo '' >> /etc/Muttrc
  1209. echo '# new messages themselves' >> /etc/Muttrc
  1210. echo 'uncolor index "~N"' >> /etc/Muttrc
  1211. echo 'color index brightyellow default "~N"' >> /etc/Muttrc
  1212. echo '' >> /etc/Muttrc
  1213. echo '# GPG/PGP integration' >> /etc/Muttrc
  1214. echo '# this set the number of seconds to keep in memory the passphrase used to encrypt/sign' >> /etc/Muttrc
  1215. echo 'set pgp_timeout=60' >> /etc/Muttrc
  1216. echo '' >> /etc/Muttrc
  1217. echo '# automatically sign and encrypt with PGP/MIME' >> /etc/Muttrc
  1218. echo 'set pgp_autosign # autosign all outgoing mails' >> /etc/Muttrc
  1219. echo 'set pgp_autoencrypt # Try to encrypt automatically' >> /etc/Muttrc
  1220. echo 'set pgp_replyencrypt # autocrypt replies to crypted' >> /etc/Muttrc
  1221. echo 'set pgp_replysign # autosign replies to signed' >> /etc/Muttrc
  1222. echo 'set pgp_auto_decode=yes # decode attachments' >> /etc/Muttrc
  1223. echo 'set fcc_clear # Keep cleartext copy of sent encrypted mail' >> /etc/Muttrc
  1224. echo 'unset smime_is_default' >> /etc/Muttrc
  1225. echo '' >> /etc/Muttrc
  1226. echo 'set alias_file=~/.mutt-alias' >> /etc/Muttrc
  1227. echo 'source ~/.mutt-alias' >> /etc/Muttrc
  1228. echo 'set query_command= "abook --mutt-query \"%s\""' >> /etc/Muttrc
  1229. echo 'macro index,pager A "<pipe-message>abook --add-email-quiet<return>" "add the sender address to abook"' >> /etc/Muttrc
  1230. cp -f /etc/Muttrc /home/$MY_USERNAME/.muttrc
  1231. touch /home/$MY_USERNAME/.mutt-alias
  1232. chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/.muttrc
  1233. chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/.mutt-alias
  1234. echo 'email_client' >> $COMPLETION_FILE
  1235. }
  1236. function folders_for_mailing_lists {
  1237. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  1238. return
  1239. fi
  1240. if grep -Fxq "folders_for_mailing_lists" $COMPLETION_FILE; then
  1241. return
  1242. fi
  1243. echo '#!/bin/bash' > /usr/bin/mailinglistrule
  1244. echo 'MYUSERNAME=$1' >> /usr/bin/mailinglistrule
  1245. echo 'MAILINGLIST=$2' >> /usr/bin/mailinglistrule
  1246. echo 'SUBJECTTAG=$3' >> /usr/bin/mailinglistrule
  1247. echo 'MUTTRC=/home/$MYUSERNAME/.muttrc' >> /usr/bin/mailinglistrule
  1248. echo 'PM=/home/$MYUSERNAME/.procmailrc' >> /usr/bin/mailinglistrule
  1249. echo 'LISTDIR=/home/$MYUSERNAME/Maildir/$MAILINGLIST' >> /usr/bin/mailinglistrule
  1250. echo 'if ! [[ $MYUSERNAME && $MAILINGLIST && $SUBJECTTAG ]]; then' >> /usr/bin/mailinglistrule
  1251. echo ' echo "mailinglistsrule [user name] [mailing list name] [subject tag]"' >> /usr/bin/mailinglistrule
  1252. echo ' exit 1' >> /usr/bin/mailinglistrule
  1253. echo 'fi' >> /usr/bin/mailinglistrule
  1254. echo 'if [ ! -d "$LISTDIR" ]; then' >> /usr/bin/mailinglistrule
  1255. echo ' mkdir -m 700 $LISTDIR' >> /usr/bin/mailinglistrule
  1256. echo ' mkdir -m 700 $LISTDIR/tmp' >> /usr/bin/mailinglistrule
  1257. echo ' mkdir -m 700 $LISTDIR/new' >> /usr/bin/mailinglistrule
  1258. echo ' mkdir -m 700 $LISTDIR/cur' >> /usr/bin/mailinglistrule
  1259. echo 'fi' >> /usr/bin/mailinglistrule
  1260. echo 'chown -R $MYUSERNAME:$MYUSERNAME $LISTDIR' >> /usr/bin/mailinglistrule
  1261. echo 'echo "" >> $PM' >> /usr/bin/mailinglistrule
  1262. echo 'echo ":0" >> $PM' >> /usr/bin/mailinglistrule
  1263. echo 'echo " * ^Subject:.*()\[$SUBJECTTAG\]" >> $PM' >> /usr/bin/mailinglistrule
  1264. echo 'echo "$LISTDIR/new" >> $PM' >> /usr/bin/mailinglistrule
  1265. echo 'chown $MYUSERNAME:$MYUSERNAME $PM' >> /usr/bin/mailinglistrule
  1266. echo 'if [ ! -f "$MUTTRC" ]; then' >> /usr/bin/mailinglistrule
  1267. echo ' cp /etc/Muttrc $MUTTRC' >> /usr/bin/mailinglistrule
  1268. echo ' chown $MYUSERNAME:$MYUSERNAME $MUTTRC' >> /usr/bin/mailinglistrule
  1269. echo 'fi' >> /usr/bin/mailinglistrule
  1270. echo 'PROCMAILLOG=/home/$MYUSERNAME/log' >> /usr/bin/mailinglistrule
  1271. echo 'if [ ! -d $PROCMAILLOG ]; then' >> /usr/bin/mailinglistrule
  1272. echo ' mkdir $PROCMAILLOG' >> /usr/bin/mailinglistrule
  1273. echo ' chown -R $MYUSERNAME:$MYUSERNAME $PROCMAILLOG' >> /usr/bin/mailinglistrule
  1274. echo 'fi' >> /usr/bin/mailinglistrule
  1275. echo 'MUTT_MAILBOXES=$(grep "mailboxes =" $MUTTRC)' >> /usr/bin/mailinglistrule
  1276. echo 'if [[ $MUTT_MAILBOXES != *$MAILINGLIST* ]]; then' >> /usr/bin/mailinglistrule
  1277. echo ' sed -i "s|$MUTT_MAILBOXES|$MUTT_MAILBOXES =$MAILINGLIST|g" $MUTTRC' >> /usr/bin/mailinglistrule
  1278. echo ' chown $MYUSERNAME:$MYUSERNAME $MUTTRC' >> /usr/bin/mailinglistrule
  1279. echo 'fi' >> /usr/bin/mailinglistrule
  1280. chmod +x /usr/bin/mailinglistrule
  1281. echo 'folders_for_mailing_lists' >> $COMPLETION_FILE
  1282. }
  1283. function folders_for_email_addresses {
  1284. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  1285. return
  1286. fi
  1287. if grep -Fxq "folders_for_email_addresses" $COMPLETION_FILE; then
  1288. return
  1289. fi
  1290. echo '#!/bin/bash' > /usr/bin/emailrule
  1291. echo 'MYUSERNAME=$1' >> /usr/bin/emailrule
  1292. echo 'EMAILADDRESS=$2' >> /usr/bin/emailrule
  1293. echo 'MAILINGLIST=$3' >> /usr/bin/emailrule
  1294. echo 'MUTTRC=/home/$MYUSERNAME/.muttrc' >> /usr/bin/emailrule
  1295. echo 'PM=/home/$MYUSERNAME/.procmailrc' >> /usr/bin/emailrule
  1296. echo 'LISTDIR=/home/$MYUSERNAME/Maildir/$MAILINGLIST' >> /usr/bin/emailrule
  1297. echo 'if ! [[ $MYUSERNAME && $EMAILADDRESS && $MAILINGLIST ]]; then' >> /usr/bin/emailrule
  1298. echo ' echo "emailrule [user name] [email address] [mailing list name]"' >> /usr/bin/emailrule
  1299. echo ' exit 1' >> /usr/bin/emailrule
  1300. echo 'fi' >> /usr/bin/emailrule
  1301. echo 'if [ ! -d "$LISTDIR" ]; then' >> /usr/bin/emailrule
  1302. echo ' mkdir -m 700 $LISTDIR' >> /usr/bin/emailrule
  1303. echo ' mkdir -m 700 $LISTDIR/tmp' >> /usr/bin/emailrule
  1304. echo ' mkdir -m 700 $LISTDIR/new' >> /usr/bin/emailrule
  1305. echo ' mkdir -m 700 $LISTDIR/cur' >> /usr/bin/emailrule
  1306. echo 'fi' >> /usr/bin/emailrule
  1307. echo 'chown -R $MYUSERNAME:$MYUSERNAME $LISTDIR' >> /usr/bin/emailrule
  1308. echo 'echo "" >> $PM' >> /usr/bin/emailrule
  1309. echo 'echo ":0" >> $PM' >> /usr/bin/emailrule
  1310. echo 'echo " * ^From: $EMAILADDRESS" >> $PM' >> /usr/bin/emailrule
  1311. echo 'echo "$LISTDIR/new" >> $PM' >> /usr/bin/emailrule
  1312. echo 'chown $MYUSERNAME:$MYUSERNAME $PM' >> /usr/bin/emailrule
  1313. echo 'if [ ! -f "$MUTTRC" ]; then' >> /usr/bin/emailrule
  1314. echo ' cp /etc/Muttrc $MUTTRC' >> /usr/bin/emailrule
  1315. echo ' chown $MYUSERNAME:$MYUSERNAME $MUTTRC' >> /usr/bin/emailrule
  1316. echo 'fi' >> /usr/bin/emailrule
  1317. echo 'PROCMAILLOG=/home/$MYUSERNAME/log' >> /usr/bin/emailrule
  1318. echo 'if [ ! -d $PROCMAILLOG ]; then' >> /usr/bin/emailrule
  1319. echo ' mkdir $PROCMAILLOG' >> /usr/bin/emailrule
  1320. echo ' chown -R $MYUSERNAME:$MYUSERNAME $PROCMAILLOG' >> /usr/bin/emailrule
  1321. echo 'fi' >> /usr/bin/emailrule
  1322. echo 'MUTT_MAILBOXES=$(grep "mailboxes =" $MUTTRC)' >> /usr/bin/emailrule
  1323. echo 'if [[ $MUTT_MAILBOXES != *$MAILINGLIST* ]]; then' >> /usr/bin/emailrule
  1324. echo ' sed -i "s|$MUTT_MAILBOXES|$MUTT_MAILBOXES =$MAILINGLIST|g" $MUTTRC' >> /usr/bin/emailrule
  1325. echo ' chown $MYUSERNAME:$MYUSERNAME $MUTTRC' >> /usr/bin/emailrule
  1326. echo 'fi' >> /usr/bin/emailrule
  1327. chmod +x /usr/bin/emailrule
  1328. echo 'folders_for_email_addresses' >> $COMPLETION_FILE
  1329. }
  1330. function dynamic_dns_freedns {
  1331. if grep -Fxq "dynamic_dns_freedns" $COMPLETION_FILE; then
  1332. return
  1333. fi
  1334. echo '#!/bin/bash' > /usr/bin/dynamicdns
  1335. echo '# subdomain name 1' >> /usr/bin/dynamicdns
  1336. echo "wget -O - https://freedns.afraid.org/dynamic/update.php?$FREEDNS_SUBDOMAIN_CODE== >> /dev/null 2>&1" >> /usr/bin/dynamicdns
  1337. echo '# add any other subdomains below' >> /usr/bin/dynamicdns
  1338. chmod 600 /usr/bin/dynamicdns
  1339. chmod +x /usr/bin/dynamicdns
  1340. if ! grep -q "dynamicdns" /etc/crontab; then
  1341. sed -i '/# m h dom mon dow user command/a\*/5 * * * * root /usr/bin/timeout 240 /usr/bin/dynamicdns' /etc/crontab
  1342. fi
  1343. service cron restart
  1344. echo 'dynamic_dns_freedns' >> $COMPLETION_FILE
  1345. }
  1346. function create_private_mailing_list {
  1347. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  1348. return
  1349. fi
  1350. # This installation doesn't work, results in ruby errors
  1351. # There is currently no schleuder package for Debian jessie
  1352. if grep -Fxq "create_private_mailing_list" $COMPLETION_FILE; then
  1353. return
  1354. fi
  1355. if [ ! $PRIVATE_MAILING_LIST ]; then
  1356. return
  1357. fi
  1358. if [ $PRIVATE_MAILING_LIST == $MY_USERNAME ]; then
  1359. echo 'The name of the private mailing list should not be the'
  1360. echo 'same as your username'
  1361. exit 10
  1362. fi
  1363. if [ ! $MY_GPG_PUBLIC_KEY ]; then
  1364. echo 'To create a private mailing list you need to specify a file'
  1365. echo 'containing your exported GPG key within MY_GPG_PUBLIC_KEY at'
  1366. echo 'the top of the script'
  1367. exit 11
  1368. fi
  1369. apt-get -y --force-yes install ruby ruby-dev ruby-gpgme libgpgme11-dev libmagic-dev
  1370. gem install schleuder
  1371. schleuder-fix-gem-dependencies
  1372. schleuder-init-setup --gem
  1373. # NOTE: this is version number sensitive and so might need changing
  1374. ln -s /var/lib/gems/2.1.0/gems/schleuder-2.2.4 /var/lib/schleuder
  1375. sed -i 's/#smtp_port: 25/smtp_port: 465/g' /etc/schleuder/schleuder.conf
  1376. sed -i 's/#superadminaddr: root@localhost/superadminaddr: root@localhost' /etc/schleuder/schleuder.conf
  1377. schleuder-newlist $PRIVATE_MAILING_LIST@$DOMAIN_NAME -realname "$PRIVATE_MAILING_LIST" -adminaddress $MY_USERNAME@$DOMAIN_NAME -initmember $MY_USERNAME@$DOMAIN_NAME -initmemberkey $MY_GPG_PUBLIC_KEY -nointeractive
  1378. emailrule $MY_USERNAME $PRIVATE_MAILING_LIST@$DOMAIN_NAME $PRIVATE_MAILING_LIST
  1379. echo 'schleuder:' > /etc/exim4/conf.d/router/550_exim4-config_schleuder
  1380. echo ' debug_print = "R: schleuder for $local_part@$domain"' >> /etc/exim4/conf.d/router/550_exim4-config_schleuder
  1381. echo ' driver = accept' >> /etc/exim4/conf.d/router/550_exim4-config_schleuder
  1382. echo ' local_part_suffix_optional' >> /etc/exim4/conf.d/router/550_exim4-config_schleuder
  1383. echo ' local_part_suffix = +* : -bounce : -sendkey' >> /etc/exim4/conf.d/router/550_exim4-config_schleuder
  1384. echo ' domains = +local_domains' >> /etc/exim4/conf.d/router/550_exim4-config_schleuder
  1385. echo ' user = schleuder' >> /etc/exim4/conf.d/router/550_exim4-config_schleuder
  1386. echo ' group = schleuder' >> /etc/exim4/conf.d/router/550_exim4-config_schleuder
  1387. echo ' require_files = schleuder:+/var/lib/schleuder/$domain/${local_part}' >> /etc/exim4/conf.d/router/550_exim4-config_schleuder
  1388. echo ' transport = schleuder_transport' >> /etc/exim4/conf.d/router/550_exim4-config_schleuder
  1389. echo 'schleuder_transport:' > /etc/exim4/conf.d/transport/30_exim4-config_schleuder
  1390. echo ' debug_print = "T: schleuder_transport for $local_part@$domain"' >> /etc/exim4/conf.d/transport/30_exim4-config_schleuder
  1391. echo ' driver = pipe' >> /etc/exim4/conf.d/transport/30_exim4-config_schleuder
  1392. echo ' home_directory = "/var/lib/schleuder/$domain/$local_part"' >> /etc/exim4/conf.d/transport/30_exim4-config_schleuder
  1393. echo ' command = "/usr/bin/schleuder $local_part@$domain"' >> /etc/exim4/conf.d/transport/30_exim4-config_schleuder
  1394. chown -R schleuder:schleuder /var/lib/schleuder
  1395. update-exim4.conf.template -r
  1396. update-exim4.conf
  1397. service exim4 restart
  1398. useradd -d /var/schleuderlists -s /bin/false schleuder
  1399. adduser Debian-exim schleuder
  1400. usermod -a -G mail schleuder
  1401. #exim -d -bt $PRIVATE_MAILING_LIST@$DOMAIN_NAME
  1402. echo 'create_private_mailing_list' >> $COMPLETION_FILE
  1403. }
  1404. function import_email {
  1405. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  1406. return
  1407. fi
  1408. EMAIL_COMPLETE_MSG=' *** Freedombone mailbox installation is complete ***'
  1409. if grep -Fxq "import_email" $COMPLETION_FILE; then
  1410. if [[ $SYSTEM_TYPE == "$VARIANT_MAILBOX" ]]; then
  1411. echo $EMAIL_COMPLETE_MSG
  1412. if [ -d /media/usb ]; then
  1413. umount /media/usb
  1414. rm -rf /media/usb
  1415. echo ' You can now remove the USB drive'
  1416. fi
  1417. exit 0
  1418. fi
  1419. return
  1420. fi
  1421. if [ $IMPORT_MAILDIR ]; then
  1422. if [ -d $IMPORT_MAILDIR ]; then
  1423. echo 'Transfering email files'
  1424. cp -r $IMPORT_MAILDIR /home/$MY_USERNAME
  1425. chown -R $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/Maildir
  1426. else
  1427. echo "Email import directory $IMPORT_MAILDIR not found"
  1428. exit 9
  1429. fi
  1430. fi
  1431. echo 'import_email' >> $COMPLETION_FILE
  1432. if [[ $SYSTEM_TYPE == "$VARIANT_MAILBOX" ]]; then
  1433. apt-get -y --force-yes autoremove
  1434. # unmount any attached usb drive
  1435. echo ''
  1436. echo $EMAIL_COMPLETE_MSG
  1437. echo ''
  1438. if [ -d /media/usb ]; then
  1439. umount /media/usb
  1440. rm -rf /media/usb
  1441. echo ' You can now remove the USB drive'
  1442. fi
  1443. exit 0
  1444. fi
  1445. }
  1446. function install_web_server {
  1447. if [[ $SYSTEM_TYPE == "$VARIANT_CHAT" ]]; then
  1448. return
  1449. fi
  1450. if grep -Fxq "install_web_server" $COMPLETION_FILE; then
  1451. return
  1452. fi
  1453. # remove apache
  1454. apt-get -y remove --purge apache2
  1455. if [ -d /etc/apache2 ]; then
  1456. rm -rf /etc/apache2
  1457. fi
  1458. # install nginx
  1459. apt-get -y --force-yes install nginx php5-fpm git
  1460. # install a script to easily enable and disable nginx virtual hosts
  1461. if [ ! -d $INSTALL_DIR ]; then
  1462. mkdir $INSTALL_DIR
  1463. fi
  1464. cd $INSTALL_DIR
  1465. git clone https://github.com/perusio/nginx_ensite
  1466. cd $INSTALL_DIR/nginx_ensite
  1467. cp nginx_* /usr/sbin
  1468. nginx_dissite default
  1469. echo 'install_web_server' >> $COMPLETION_FILE
  1470. }
  1471. function configure_php {
  1472. sed -i "s/memory_limit = 128M/memory_limit = ${MAX_PHP_MEMORY}M/g" /etc/php5/fpm/php.ini
  1473. sed -i 's/;cgi.fix_pathinfo=1/cgi.fix_pathinfo=0/g' /etc/php5/fpm/php.ini
  1474. sed -i "s/memory_limit = -1/memory_limit = ${MAX_PHP_MEMORY}M/g" /etc/php5/cli/php.ini
  1475. sed -i "s/upload_max_filesize = 2M/upload_max_filesize = 50M/g" /etc/php5/fpm/php.ini
  1476. sed -i "s/post_max_size = 8M/post_max_size = 50M/g" /etc/php5/fpm/php.ini
  1477. }
  1478. function install_owncloud {
  1479. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  1480. return
  1481. fi
  1482. OWNCLOUD_COMPLETION_MSG1=" *** Freedombone $SYSTEM_TYPE is now installed ***"
  1483. OWNCLOUD_COMPLETION_MSG2="Open $OWNCLOUD_DOMAIN_NAME in a web browser to complete the setup"
  1484. if grep -Fxq "install_owncloud" $COMPLETION_FILE; then
  1485. if [[ $SYSTEM_TYPE == "$VARIANT_CLOUD" ]]; then
  1486. # unmount any attached usb drive
  1487. if [ -d /media/usb ]; then
  1488. umount /media/usb
  1489. rm -rf /media/usb
  1490. fi
  1491. echo ''
  1492. echo $OWNCLOUD_COMPLETION_MSG1
  1493. echo $OWNCLOUD_COMPLETION_MSG2
  1494. exit 0
  1495. fi
  1496. return
  1497. fi
  1498. # if this is exclusively a cloud setup
  1499. if [[ $SYSTEM_TYPE == "$VARIANT_CLOUD" ]]; then
  1500. OWNCLOUD_DOMAIN_NAME=$DOMAIN_NAME
  1501. OWNCLOUD_FREEDNS_SUBDOMAIN_CODE=$FREEDNS_SUBDOMAIN_CODE
  1502. fi
  1503. if [ ! $OWNCLOUD_DOMAIN_NAME ]; then
  1504. return
  1505. fi
  1506. if ! [[ $SYSTEM_TYPE == "$VARIANT_CLOUD" ]]; then
  1507. if [ ! $SYSTEM_TYPE ]; then
  1508. return
  1509. fi
  1510. fi
  1511. apt-get -y --force-yes install php5 php5-gd php-xml-parser php5-intl wget
  1512. apt-get -y --force-yes install php5-sqlite php5-mysql smbclient curl libcurl3 php5-curl bzip2
  1513. if [ ! -d /var/www/$OWNCLOUD_DOMAIN_NAME ]; then
  1514. mkdir /var/www/$OWNCLOUD_DOMAIN_NAME
  1515. mkdir /var/www/$OWNCLOUD_DOMAIN_NAME/htdocs
  1516. fi
  1517. echo 'server {' > /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1518. echo ' listen 80;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1519. echo " server_name $OWNCLOUD_DOMAIN_NAME;" >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1520. echo ' rewrite ^ https://$server_name$request_uri? permanent;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1521. echo '}' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1522. echo 'server {' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1523. echo ' listen 443 ssl;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1524. echo " root /var/www/$OWNCLOUD_DOMAIN_NAME/htdocs;" >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1525. echo " server_name $OWNCLOUD_DOMAIN_NAME;" >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1526. echo ' ssl on;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1527. echo " ssl_certificate /etc/ssl/certs/$OWNCLOUD_DOMAIN_NAME.crt;" >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1528. echo " ssl_certificate_key /etc/ssl/private/$OWNCLOUD_DOMAIN_NAME.key;" >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1529. echo " ssl_dhparam /etc/ssl/certs/$OWNCLOUD_DOMAIN_NAME.dhparam;" >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1530. echo ' ssl_session_timeout 5m;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1531. echo ' ssl_prefer_server_ciphers on;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1532. echo ' ssl_protocols TLSv1 TLSv1.1 TLSv1.2; # not possible to do exclusive' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1533. echo " ssl_ciphers '$SSL_CIPHERS';" >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1534. echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1535. echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1536. echo ' add_header Strict-Transport-Security max-age=15768000;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1537. echo ' # if you want to be able to access the site via HTTP' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1538. echo ' # then replace the above with the following:' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1539. echo ' # add_header Strict-Transport-Security "max-age=0;";' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1540. echo " # make sure webfinger and other well known services aren't blocked" >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1541. echo ' # by denying dot files and rewrite request to the front controller' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1542. echo ' location ^~ /.well-known/ {' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1543. echo ' allow all;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1544. echo ' rewrite ^/(.*) /index.php?q=$uri&$args last;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1545. echo ' }' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1546. echo ' client_max_body_size 10G; # set max upload size' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1547. echo ' client_body_buffer_size 128k;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1548. echo ' fastcgi_buffers 64 4K;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1549. echo ' rewrite ^/caldav(.*)$ /remote.php/caldav$1 redirect;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1550. echo ' rewrite ^/carddav(.*)$ /remote.php/carddav$1 redirect;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1551. echo ' rewrite ^/webdav(.*)$ /remote.php/webdav$1 redirect;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1552. echo ' index index.php;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1553. echo ' error_page 403 /core/templates/403.php;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1554. echo ' error_page 404 /core/templates/404.php;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1555. echo ' location = /robots.txt {' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1556. echo ' allow all;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1557. echo ' log_not_found off;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1558. echo ' access_log off;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1559. echo ' }' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1560. echo ' location ~ ^/(data|config|\.ht|db_structure\.xml|README) {' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1561. echo ' deny all;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1562. echo ' }' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1563. echo ' location / {' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1564. echo ' # The following 2 rules are only needed with webfinger' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1565. echo ' rewrite ^/.well-known/host-meta /public.php?service=host-meta last;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1566. echo ' rewrite ^/.well-known/host-meta.json /public.php?service=host-meta-json last;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1567. echo ' rewrite ^/.well-known/carddav /remote.php/carddav/ redirect;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1568. echo ' rewrite ^/.well-known/caldav /remote.php/caldav/ redirect;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1569. echo ' rewrite ^(/core/doc/[^\/]+/)$ $1/index.html;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1570. echo ' try_files $uri $uri/ index.php;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1571. echo ' }' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1572. echo ' location ~ ^(.+?\.php)(/.*)?$ {' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1573. echo ' try_files $1 =404;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1574. echo ' fastcgi_split_path_info ^(.+\.php)(/.+)$;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1575. echo ' fastcgi_pass unix:/var/run/php5-fpm.sock;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1576. echo ' fastcgi_index index.php;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1577. echo ' include fastcgi_params;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1578. echo ' fastcgi_param SCRIPT_FILENAME $document_root$1;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1579. echo ' fastcgi_param PATH_INFO $2;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1580. echo ' fastcgi_param HTTPS on;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1581. echo ' }' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1582. echo ' # Optional: set long EXPIRES header on static assets' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1583. echo ' location ~* ^.+\.(jpg|jpeg|gif|bmp|ico|png|css|js|swf)$ {' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1584. echo ' expires 30d;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1585. echo " # Optional: Don't log access to assets" >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1586. echo ' access_log off;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1587. echo ' }' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1588. echo '}' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
  1589. configure_php
  1590. if [ ! -f /etc/ssl/private/$OWNCLOUD_DOMAIN_NAME.key ]; then
  1591. makecert $OWNCLOUD_DOMAIN_NAME
  1592. fi
  1593. # download owncloud
  1594. cd $INSTALL_DIR
  1595. if [ ! -f $INSTALL_DIR/$OWNCLOUD_ARCHIVE ]; then
  1596. wget $OWNCLOUD_DOWNLOAD
  1597. fi
  1598. if [ ! -f $INSTALL_DIR/$OWNCLOUD_ARCHIVE ]; then
  1599. echo 'Owncloud could not be downloaded. Check that it exists at '
  1600. echo $OWNCLOUD_DOWNLOAD
  1601. echo 'And if neccessary update the version number and hash within this script'
  1602. exit 18
  1603. fi
  1604. # Check that the hash is correct
  1605. CHECKSUM=$(sha256sum $OWNCLOUD_ARCHIVE | awk -F ' ' '{print $1}')
  1606. if [[ $CHECKSUM != $OWNCLOUD_HASH ]]; then
  1607. echo 'The sha256 hash of the owncloud download is incorrect. Possibly the file may have been tampered with. Check the hash on the Owncloud web site.'
  1608. echo $CHECKSUM
  1609. echo $OWNCLOUD_HASH
  1610. exit 19
  1611. fi
  1612. tar -xjf $OWNCLOUD_ARCHIVE
  1613. echo 'Copying files...'
  1614. cp -r owncloud/* /var/www/$OWNCLOUD_DOMAIN_NAME/htdocs
  1615. chown -R www-data:www-data /var/www/$OWNCLOUD_DOMAIN_NAME/htdocs/apps
  1616. chown -R www-data:www-data /var/www/$OWNCLOUD_DOMAIN_NAME/htdocs/config
  1617. chown www-data:www-data /var/www/$OWNCLOUD_DOMAIN_NAME/htdocs
  1618. nginx_ensite $OWNCLOUD_DOMAIN_NAME
  1619. service php5-fpm restart
  1620. service nginx restart
  1621. # update the dynamic DNS
  1622. if [ $OWNCLOUD_FREEDNS_SUBDOMAIN_CODE ]; then
  1623. if [[ $OWNCLOUD_FREEDNS_SUBDOMAIN_CODE != $FREEDNS_SUBDOMAIN_CODE ]]; then
  1624. if ! grep -q "$OWNCLOUD_DOMAIN_NAME" /usr/bin/dynamicdns; then
  1625. echo "# $OWNCLOUD_DOMAIN_NAME" >> /usr/bin/dynamicdns
  1626. echo "wget -O - https://freedns.afraid.org/dynamic/update.php?$OWNCLOUD_FREEDNS_SUBDOMAIN_CODE== >> /dev/null 2>&1" >> /usr/bin/dynamicdns
  1627. fi
  1628. fi
  1629. else
  1630. echo 'WARNING: No freeDNS subdomain code given for Owncloud. It is assumed that you are using some other dynamic DNS provider.'
  1631. fi
  1632. echo 'install_owncloud' >> $COMPLETION_FILE
  1633. if [[ $SYSTEM_TYPE == "$VARIANT_CLOUD" ]]; then
  1634. # unmount any attached usb drive
  1635. if [ -d /media/usb ]; then
  1636. umount /media/usb
  1637. rm -rf /media/usb
  1638. fi
  1639. echo ''
  1640. echo $OWNCLOUD_COMPLETION_MSG1
  1641. echo $OWNCLOUD_COMPLETION_MSG2
  1642. exit 0
  1643. fi
  1644. }
  1645. function install_xmpp {
  1646. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  1647. return
  1648. fi
  1649. if grep -Fxq "install_xmpp" $COMPLETION_FILE; then
  1650. return
  1651. fi
  1652. apt-get -y --force-yes install prosody
  1653. if [ ! -f "/etc/ssl/private/xmpp.key" ]; then
  1654. makecert xmpp
  1655. fi
  1656. chown prosody:prosody /etc/ssl/private/xmpp.key
  1657. chown prosody:prosody /etc/ssl/certs/xmpp.*
  1658. cp -a /etc/prosody/conf.avail/example.com.cfg.lua /etc/prosody/conf.avail/xmpp.cfg.lua
  1659. sed -i 's|/etc/prosody/certs/example.com.key|/etc/ssl/private/xmpp.key|g' /etc/prosody/conf.avail/xmpp.cfg.lua
  1660. sed -i 's|/etc/prosody/certs/example.com.crt|/etc/ssl/certs/xmpp.crt|g' /etc/prosody/conf.avail/xmpp.cfg.lua
  1661. if ! grep -q "xmpp.dhparam" /etc/prosody/conf.avail/xmpp.cfg.lua; then
  1662. sed -i '/certificate =/a\ dhparam = "/etc/ssl/certs/xmpp.dhparam";' /etc/prosody/conf.avail/xmpp.cfg.lua
  1663. fi
  1664. sed -i "s/example.com/$DOMAIN_NAME/g" /etc/prosody/conf.avail/xmpp.cfg.lua
  1665. sed -i 's/enabled = false -- Remove this line to enable this host//g' /etc/prosody/conf.avail/xmpp.cfg.lua
  1666. if ! grep -q "modules_enabled" /etc/prosody/conf.avail/xmpp.cfg.lua; then
  1667. echo '' >> /etc/prosody/conf.avail/xmpp.cfg.lua
  1668. echo 'modules_enabled = {' >> /etc/prosody/conf.avail/xmpp.cfg.lua
  1669. echo ' "bosh"; -- Enable mod_bosh' >> /etc/prosody/conf.avail/xmpp.cfg.lua
  1670. echo ' "tls"; -- Enable mod_tls' >> /etc/prosody/conf.avail/xmpp.cfg.lua
  1671. echo ' "saslauth"; -- Enable mod_saslauth' >> /etc/prosody/conf.avail/xmpp.cfg.lua
  1672. echo '}' >> /etc/prosody/conf.avail/xmpp.cfg.lua
  1673. echo '' >> /etc/prosody/conf.avail/xmpp.cfg.lua
  1674. echo 'c2s_require_encryption = true' >> /etc/prosody/conf.avail/xmpp.cfg.lua
  1675. echo 's2s_require_encryption = true' >> /etc/prosody/conf.avail/xmpp.cfg.lua
  1676. echo 'allow_unencrypted_plain_auth = false' >> /etc/prosody/conf.avail/xmpp.cfg.lua
  1677. fi
  1678. ln -sf /etc/prosody/conf.avail/xmpp.cfg.lua /etc/prosody/conf.d/xmpp.cfg.lua
  1679. sed -i 's|/etc/prosody/certs/localhost.key|/etc/ssl/private/xmpp.key|g' /etc/prosody/prosody.cfg.lua
  1680. sed -i 's|/etc/prosody/certs/localhost.crt|/etc/ssl/certs/xmpp.crt|g' /etc/prosody/prosody.cfg.lua
  1681. if ! grep -q "xmpp.dhparam" /etc/prosody/prosody.cfg.lua; then
  1682. sed -i '/certificate =/a\ dhparam = "/etc/ssl/certs/xmpp.dhparam";' /etc/prosody/prosody.cfg.lua
  1683. fi
  1684. sed -i 's/c2s_require_encryption = false/c2s_require_encryption = true/g' /etc/prosody/prosody.cfg.lua
  1685. if ! grep -q "s2s_require_encryption" /etc/prosody/prosody.cfg.lua; then
  1686. sed -i '/c2s_require_encryption/a\s2s_require_encryption = true' /etc/prosody/prosody.cfg.lua
  1687. fi
  1688. if ! grep -q "allow_unencrypted_plain_auth" /etc/prosody/prosody.cfg.lua; then
  1689. echo 'allow_unencrypted_plain_auth = false' >> /etc/prosody/conf.avail/xmpp.cfg.lua
  1690. fi
  1691. sed -i 's/--"bosh";/"bosh";/g' /etc/prosody/prosody.cfg.lua
  1692. sed -i 's/authentication = "internal_plain"/authentication = "internal_hashed"/g' /etc/prosody/prosody.cfg.lua
  1693. sed -i 's/enabled = false -- Remove this line to enable this host//g' /etc/prosody/prosody.cfg.lua
  1694. sed -i 's/example.com/$DOMAIN_NAME/g' /etc/prosody/prosody.cfg.lua
  1695. service prosody restart
  1696. touch /home/$MY_USERNAME/README
  1697. if ! grep -q "Your XMPP password is" /home/$MY_USERNAME/README; then
  1698. XMPP_PASSWORD=$(openssl rand -base64 8)
  1699. prosodyctl register $MY_USERNAME $DOMAIN_NAME $XMPP_PASSWORD
  1700. echo "Your XMPP password is: $XMPP_PASSWORD" >> /home/$MY_USERNAME/README
  1701. echo 'You can change it with: ' >> /home/$MY_USERNAME/README
  1702. echo '' >> /home/$MY_USERNAME/README
  1703. echo " prosodyctl passwd $MY_USERNAME@$DOMAIN_NAME" >> /home/$MY_USERNAME/README
  1704. chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/README
  1705. fi
  1706. echo 'install_xmpp' >> $COMPLETION_FILE
  1707. }
  1708. function install_irc_server {
  1709. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  1710. return
  1711. fi
  1712. if grep -Fxq "install_irc_server" $COMPLETION_FILE; then
  1713. return
  1714. fi
  1715. apt-get -y --force-yes install ngircd
  1716. if [ ! "/etc/ssl/private/ngircd.key" ]; then
  1717. makecert ngircd
  1718. fi
  1719. echo '**************************************************' > /etc/ngircd/motd
  1720. echo '* F R E E D O M B O N E I R C *' >> /etc/ngircd/motd
  1721. echo '* *' >> /etc/ngircd/motd
  1722. echo '* Freedom in the Cloud *' >> /etc/ngircd/motd
  1723. echo '**************************************************' >> /etc/ngircd/motd
  1724. sed -i 's|MotdFile = /etc/ngircd/ngircd.motd|MotdFile = /etc/ngircd/motd|g' /etc/ngircd/ngircd.conf
  1725. sed -i "s/irc@irc.example.com/$MY_USERNAME@$DOMAIN_NAME/g" /etc/ngircd/ngircd.conf
  1726. sed -i "s/irc.example.net/$DOMAIN_NAME/g" /etc/ngircd/ngircd.conf
  1727. sed -i "s|Yet another IRC Server running on Debian GNU/Linux|IRC Server of $DOMAIN_NAME|g" /etc/ngircd/ngircd.conf
  1728. sed -i 's/;Password = wealllikedebian/Password =/g' /etc/ngircd/ngircd.conf
  1729. sed -i 's|;CertFile = /etc/ssl/certs/server.crt|CertFile = /etc/ssl/certs/ngircd.crt|g' /etc/ngircd/ngircd.conf
  1730. sed -i 's|;DHFile = /etc/ngircd/dhparams.pem|DHFile = /etc/ssl/certs/ngircd.dhparam|g' /etc/ngircd/ngircd.conf
  1731. sed -i 's|;KeyFile = /etc/ssl/private/server.key|KeyFile = /etc/ssl/private/ngircd.key|g' /etc/ngircd/ngircd.conf
  1732. sed -i 's/;Ports = 6697, 9999/Ports = 6697, 9999/g' /etc/ngircd/ngircd.conf
  1733. sed -i 's/;Name = #ngircd/Name = #freedombone/g' /etc/ngircd/ngircd.conf
  1734. sed -i 's/;Topic = Our ngircd testing channel/Topic = Freedombone chat channel/g' /etc/ngircd/ngircd.conf
  1735. sed -i 's/;MaxUsers = 23/MaxUsers = 23/g' /etc/ngircd/ngircd.conf
  1736. sed -i 's|;KeyFile = /etc/ngircd/#chan.key|KeyFile = /etc/ngircd/#freedombone.key|g' /etc/ngircd/ngircd.conf
  1737. sed -i 's/;CloakHost = cloaked.host/CloakHost = cloaked.host/g' /etc/ngircd/ngircd.conf
  1738. IRC_SALT=$(openssl rand -base64 32)
  1739. IRC_OPERATOR_PASSWORD=$(openssl rand -base64 8)
  1740. sed -i "s|;CloakHostSalt = abcdefghijklmnopqrstuvwxyz|CloakHostSalt = $IRC_SALT|g" /etc/ngircd/ngircd.conf
  1741. sed -i 's/;ConnectIPv4 = yes/ConnectIPv4 = yes/g' /etc/ngircd/ngircd.conf
  1742. sed -i 's/;MorePrivacy = no/MorePrivacy = yes/g' /etc/ngircd/ngircd.conf
  1743. sed -i 's/;RequireAuthPing = no/RequireAuthPing = no/g' /etc/ngircd/ngircd.conf
  1744. sed -i "s/;Name = TheOper/Name = $MY_USERNAME/g" /etc/ngircd/ngircd.conf
  1745. sed -i "s/;Password = ThePwd/Password = $IRC_OPERATOR_PASSWORD/g" /etc/ngircd/ngircd.conf
  1746. service ngircd restart
  1747. echo 'install_irc_server' >> $COMPLETION_FILE
  1748. }
  1749. function install_wiki {
  1750. if [[ $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  1751. return
  1752. fi
  1753. if grep -Fxq "install_wiki" $COMPLETION_FILE; then
  1754. return
  1755. fi
  1756. # if this is exclusively a writer setup
  1757. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" ]]; then
  1758. WIKI_DOMAIN_NAME=$DOMAIN_NAME
  1759. WIKI_FREEDNS_SUBDOMAIN_CODE=$FREEDNS_SUBDOMAIN_CODE
  1760. fi
  1761. if [ ! $WIKI_DOMAIN_NAME ]; then
  1762. return
  1763. fi
  1764. if ! [[ $SYSTEM_TYPE == "$VARIANT_WRITER" ]]; then
  1765. if [ ! $SYSTEM_TYPE ]; then
  1766. return
  1767. fi
  1768. fi
  1769. apt-get -y --force-yes install php5 php5-gd php-xml-parser php5-intl wget
  1770. apt-get -y --force-yes install php5-sqlite php5-mysql smbclient curl libcurl3 php5-curl bzip2
  1771. if [ ! -d /var/www/$WIKI_DOMAIN_NAME ]; then
  1772. mkdir /var/www/$WIKI_DOMAIN_NAME
  1773. fi
  1774. if [ ! -d /var/www/$WIKI_DOMAIN_NAME/htdocs ]; then
  1775. mkdir /var/www/$WIKI_DOMAIN_NAME/htdocs
  1776. fi
  1777. if [ ! -f /etc/ssl/private/$WIKI_DOMAIN_NAME.key ]; then
  1778. makecert $WIKI_DOMAIN_NAME
  1779. fi
  1780. # download the archive
  1781. cd $INSTALL_DIR
  1782. if [ ! -f $INSTALL_DIR/$WIKI_ARCHIVE ]; then
  1783. wget $WIKI_DOWNLOAD
  1784. fi
  1785. if [ ! -f $INSTALL_DIR/$WIKI_ARCHIVE ]; then
  1786. echo 'Dokuwiki could not be downloaded. Check that it exists at '
  1787. echo $WIKI_DOWNLOAD
  1788. echo 'And if neccessary update the version number and hash within this script'
  1789. exit 18
  1790. fi
  1791. # Check that the hash is correct
  1792. CHECKSUM=$(sha256sum $WIKI_ARCHIVE | awk -F ' ' '{print $1}')
  1793. if [[ $CHECKSUM != $WIKI_HASH ]]; then
  1794. echo 'The sha256 hash of the Dokuwiki download is incorrect. Possibly the file may have been tampered with. Check the hash on the Dokuwiki web site.'
  1795. echo $CHECKSUM
  1796. echo $WIKI_HASH
  1797. exit 21
  1798. fi
  1799. tar -xzvf $WIKI_ARCHIVE
  1800. cd dokuwiki-*
  1801. mv * /var/www/$WIKI_DOMAIN_NAME/htdocs/
  1802. chmod -R 755 /var/www/$WIKI_DOMAIN_NAME/htdocs
  1803. chown -R www-data:www-data /var/www/$WIKI_DOMAIN_NAME/htdocs
  1804. if ! grep -q "video/ogg" /var/www/$WIKI_DOMAIN_NAME/htdocs/conf/mime.conf; then
  1805. echo 'ogv video/ogg' >> /var/www/$WIKI_DOMAIN_NAME/htdocs/conf/mime.conf
  1806. echo 'mp4 video/mp4' >> /var/www/$WIKI_DOMAIN_NAME/htdocs/conf/mime.conf
  1807. echo 'webm video/webm' >> /var/www/$WIKI_DOMAIN_NAME/htdocs/conf/mime.conf
  1808. fi
  1809. echo 'server {' > /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1810. echo ' listen 80;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1811. echo " server_name $WIKI_DOMAIN_NAME;" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1812. echo " root /var/www/$WIKI_DOMAIN_NAME/htdocs;" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1813. echo " error_log /var/www/$WIKI_DOMAIN_NAME/error.log;" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1814. echo ' index index.php;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1815. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1816. echo ' # Uncomment this if you need to redirect HTTP to HTTPS' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1817. echo ' #rewrite ^ https://$server_name$request_uri? permanent;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1818. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1819. echo ' location / {' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1820. echo ' try_files $uri $uri/ /index.php;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1821. echo ' }' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1822. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1823. echo ' location ~ \.php$ {' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1824. echo ' fastcgi_split_path_info ^(.+\.php)(/.+)$;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1825. echo ' fastcgi_pass unix:/var/run/php5-fpm.sock;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1826. echo ' fastcgi_index index.php;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1827. echo ' include fastcgi_params;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1828. echo ' }' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1829. echo '}' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1830. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1831. echo 'server {' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1832. echo ' listen 443 ssl;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1833. echo " root /var/www/$WIKI_DOMAIN_NAME/htdocs;" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1834. echo " server_name $WIKI_DOMAIN_NAME;" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1835. echo " error_log /var/www/$WIKI_DOMAIN_NAME/error_ssl.log;" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1836. echo ' index index.php;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1837. echo ' charset utf-8;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1838. echo ' client_max_body_size 20m;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1839. echo ' client_body_buffer_size 128k;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1840. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1841. echo ' ssl on;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1842. echo " ssl_certificate /etc/ssl/certs/$WIKI_DOMAIN_NAME.crt;" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1843. echo " ssl_certificate_key /etc/ssl/private/$WIKI_DOMAIN_NAME.key;" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1844. echo " ssl_dhparam /etc/ssl/certs/$WIKI_DOMAIN_NAME.dhparam;" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1845. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1846. echo ' ssl_session_timeout 5m;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1847. echo ' ssl_prefer_server_ciphers on;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1848. echo ' ssl_session_cache builtin:1000 shared:SSL:10m;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1849. echo ' ssl_protocols TLSv1 TLSv1.1 TLSv1.2; # not possible to do exclusive' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1850. echo " ssl_ciphers '$SSL_CIPHERS';" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1851. echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1852. echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1853. echo ' add_header Strict-Transport-Security "max-age=0;";' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1854. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1855. echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1856. echo ' location / {' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1857. echo ' rewrite ^/(.*) /index.php?q=$uri&$args last;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1858. echo ' }' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1859. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1860. echo " # make sure webfinger and other well known services aren't blocked" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1861. echo ' # by denying dot files and rewrite request to the front controller' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1862. echo ' location ^~ /.well-known/ {' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1863. echo ' allow all;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1864. echo ' rewrite ^/(.*) /index.php?q=$uri&$args last;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1865. echo ' }' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1866. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1867. echo ' # statically serve these file types when possible' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1868. echo ' # otherwise fall back to front controller' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1869. echo ' # allow browser to cache them' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1870. echo ' # added .htm for advanced source code editor library' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1871. echo ' location ~* \.(jpg|jpeg|gif|png|ico|css|js|htm|html|ttf|woff|svg)$ {' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1872. echo ' expires 30d;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1873. echo ' try_files $uri /index.php?q=$uri&$args;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1874. echo ' }' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1875. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1876. echo ' # block these file types' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1877. echo ' location ~* \.(tpl|md|tgz|log|out)$ {' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1878. echo ' deny all;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1879. echo ' }' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1880. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1881. echo ' # pass the PHP scripts to FastCGI server listening on 127.0.0.1:9000' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1882. echo ' # or a unix socket' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1883. echo ' location ~* \.php$ {' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1884. echo ' # Zero-day exploit defense.' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1885. echo ' # http://forum.nginx.org/read.php?2,88845,page=3' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1886. echo " # Won't work properly (404 error) if the file is not stored on this" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1887. echo " # server, which is entirely possible with php-fpm/php-fcgi." >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1888. echo " # Comment the 'try_files' line out if you set up php-fpm/php-fcgi on" >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1889. echo " # another machine. And then cross your fingers that you won't get hacked." >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1890. echo ' try_files $uri $uri/ /index.php;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1891. echo ' # NOTE: You should have "cgi.fix_pathinfo = 0;" in php.ini' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1892. echo ' fastcgi_split_path_info ^(.+\.php)(/.+)$;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1893. echo ' # With php5-cgi alone:' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1894. echo ' # fastcgi_pass 127.0.0.1:9000;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1895. echo ' # With php5-fpm:' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1896. echo ' fastcgi_pass unix:/var/run/php5-fpm.sock;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1897. echo ' include fastcgi_params;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1898. echo ' fastcgi_index index.php;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1899. echo ' fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1900. echo ' }' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1901. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1902. echo ' # deny access to all dot files' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1903. echo ' location ~ /\. {' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1904. echo ' deny all;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1905. echo ' }' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1906. echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1907. echo ' #deny access to store' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1908. echo ' location ~ /store {' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1909. echo ' deny all;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1910. echo ' }' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1911. echo ' location ~ /(data|conf|bin|inc)/ {' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1912. echo ' deny all;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1913. echo ' }' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1914. echo ' location ~ /\.ht {' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1915. echo ' deny all;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1916. echo ' }' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1917. echo '}' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
  1918. configure_php
  1919. nginx_ensite $WIKI_DOMAIN_NAME
  1920. service php5-fpm restart
  1921. service nginx restart
  1922. # update the dynamic DNS
  1923. if [ $WIKI_FREEDNS_SUBDOMAIN_CODE ]; then
  1924. if [[ $WIKI_FREEDNS_SUBDOMAIN_CODE != $FREEDNS_SUBDOMAIN_CODE ]]; then
  1925. if ! grep -q "$WIKI_DOMAIN_NAME" /usr/bin/dynamicdns; then
  1926. echo "# $WIKI_DOMAIN_NAME" >> /usr/bin/dynamicdns
  1927. echo "wget -O - https://freedns.afraid.org/dynamic/update.php?$WIKI_FREEDNS_SUBDOMAIN_CODE== >> /dev/null 2>&1" >> /usr/bin/dynamicdns
  1928. fi
  1929. fi
  1930. else
  1931. echo 'WARNING: No freeDNS subdomain code given for wiki installation. It is assumed that you are using some other dynamic DNS provider.'
  1932. fi
  1933. # add some post-install instructions
  1934. if ! grep -q "Once you have set up the wiki" /home/$MY_USERNAME/README; then
  1935. echo '' >> /home/$MY_USERNAME/README
  1936. echo 'Once you have set up the wiki then remove the install file:' >> /home/$MY_USERNAME/README
  1937. echo '' >> /home/$MY_USERNAME/README
  1938. echo " rm /var/www/$WIKI_DOMAIN_NAME/htdocs/install.php" >> /home/$MY_USERNAME/README
  1939. fi
  1940. echo 'install_wiki' >> $COMPLETION_FILE
  1941. }
  1942. function install_blog {
  1943. if [[ $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  1944. return
  1945. fi
  1946. if grep -Fxq "install_blog" $COMPLETION_FILE; then
  1947. return
  1948. fi
  1949. # if this is exclusively a writer setup
  1950. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" ]]; then
  1951. WIKI_DOMAIN_NAME=$DOMAIN_NAME
  1952. WIKI_FREEDNS_SUBDOMAIN_CODE=$FREEDNS_SUBDOMAIN_CODE
  1953. fi
  1954. if [ ! $WIKI_DOMAIN_NAME ]; then
  1955. return
  1956. fi
  1957. apt-get -y --force-yes install unzip
  1958. # download mnml-blog
  1959. cd $INSTALL_DIR
  1960. rm -f latest
  1961. wget $WIKI_MNML_BLOG_ADDON
  1962. if [ ! -f "$INSTALL_DIR/latest" ]; then
  1963. echo 'Dokuwiki mnml-blog addon could not be downloaded. Check the Dokuwiki web site and alter WIKI_MNML_BLOG_ADDON at the top of this script as needed.'
  1964. exit 21
  1965. fi
  1966. mv latest $WIKI_MNML_BLOG_ADDON_ARCHIVE
  1967. # Check that the mnml-blog download hash is correct
  1968. CHECKSUM=$(sha256sum $WIKI_MNML_BLOG_ADDON_ARCHIVE | awk -F ' ' '{print $1}')
  1969. if [[ $CHECKSUM != $WIKI_MNML_BLOG_ADDON_HASH ]]; then
  1970. echo 'The sha256 hash of the mnml-blog download is incorrect. Possibly the file may have been tampered with. Check the hash on the Dokuwiki mnmlblog web site and alter WIKI_MNML_BLOG_ADDON_HASH if needed.'
  1971. echo $CHECKSUM
  1972. echo $WIKI_MNML_BLOG_ADDON_HASH
  1973. exit 22
  1974. fi
  1975. # download blogTNG
  1976. wget $WIKI_BLOGTNG_ADDON
  1977. if [ ! -f "$INSTALL_DIR/master" ]; then
  1978. echo 'Dokuwiki blogTNG addon could not be downloaded. Check the Dokuwiki web site and alter WIKI_BLOGTNG_ADDON at the top of this script as needed.'
  1979. exit 23
  1980. fi
  1981. mv master $WIKI_BLOGTNG_ADDON_ARCHIVE
  1982. # Check that the blogTNG hash is correct
  1983. CHECKSUM=$(sha256sum $WIKI_BLOGTNG_ADDON_ARCHIVE | awk -F ' ' '{print $1}')
  1984. if [[ $CHECKSUM != $WIKI_BLOGTNG_ADDON_HASH ]]; then
  1985. echo 'The sha256 hash of the blogTNG download is incorrect. Possibly the file may have been tampered with. Check the hash on the Dokuwiki blogTNG web site and alter WIKI_BLOGTNG_ADDON_HASH if needed.'
  1986. echo $CHECKSUM
  1987. echo $WIKI_BLOGTNG_ADDON_HASH
  1988. exit 24
  1989. fi
  1990. # download dokuwiki sqlite plugin
  1991. wget $WIKI_SQLITE_ADDON
  1992. if [ ! -f "$INSTALL_DIR/master" ]; then
  1993. echo 'Dokuwiki sqlite addon could not be downloaded. Check the Dokuwiki web site and alter WIKI_SQLITE_ADDON at the top of this script as needed.'
  1994. exit 25
  1995. fi
  1996. mv master $WIKI_SQLITE_ADDON_ARCHIVE
  1997. # Check that the sqlite plugin hash is correct
  1998. CHECKSUM=$(sha256sum $WIKI_SQLITE_ADDON_ARCHIVE | awk -F ' ' '{print $1}')
  1999. if [[ $CHECKSUM != $WIKI_SQLITE_ADDON_HASH ]]; then
  2000. echo 'The sha256 hash of the Dokuwiki sqlite download is incorrect. Possibly the file may have been tampered with. Check the hash on the Dokuwiki sqlite plugin web site and alter WIKI_SQLITE_ADDON_HASH if needed.'
  2001. echo $CHECKSUM
  2002. echo $WIKI_SQLITE_ADDON_HASH
  2003. exit 26
  2004. fi
  2005. # install dokuwiki sqlite plugin
  2006. tar -xzvf $WIKI_SQLITE_ADDON_ARCHIVE
  2007. if [ -d "$INSTALL_DIR/sqlite" ]; then
  2008. rm -rf $INSTALL_DIR/sqlite
  2009. fi
  2010. mv $WIKI_SQLITE_ADDON_NAME sqlite
  2011. cp -r sqlite /var/www/$WIKI_DOMAIN_NAME/htdocs/lib/plugins/
  2012. # install blogTNG
  2013. if [ -d "$INSTALL_DIR/$WIKI_BLOGTNG_ADDON_NAME" ]; then
  2014. rm -rf $INSTALL_DIR/$WIKI_BLOGTNG_ADDON_NAME
  2015. fi
  2016. unzip $WIKI_BLOGTNG_ADDON_ARCHIVE
  2017. if [ -d "$INSTALL_DIR/blogtng" ]; then
  2018. rm -rf $INSTALL_DIR/blogtng
  2019. fi
  2020. mv $WIKI_BLOGTNG_ADDON_NAME blogtng
  2021. cp -r blogtng /var/www/$WIKI_DOMAIN_NAME/htdocs/lib/plugins/
  2022. # install mnml-blog
  2023. tar -xzvf $WIKI_MNML_BLOG_ADDON_ARCHIVE
  2024. cp -r mnml-blog /var/www/$WIKI_DOMAIN_NAME/htdocs/lib/tpl
  2025. cp -r /var/www/$WIKI_DOMAIN_NAME/htdocs/lib/tpl/mnml-blog/blogtng-tpl/* /var/www/$WIKI_DOMAIN_NAME/htdocs/lib/plugins/blogtng/tpl/default/
  2026. # make a "freedombone" template so that if the default template gets
  2027. # changed after an upgrade to blogTNG this doesn't necessarily change the appearance
  2028. cp -r /var/www/$WIKI_DOMAIN_NAME/htdocs/lib/plugins/blogtng/tpl/default /var/www/$WIKI_DOMAIN_NAME/htdocs/lib/plugins/blogtng/tpl/freedombone
  2029. if ! grep -q "To set up your blog" /home/$MY_USERNAME/README; then
  2030. echo '' >> /home/$MY_USERNAME/README
  2031. echo "To set up your blog go to" >> /home/$MY_USERNAME/README
  2032. echo "https://$WIKI_DOMAIN_NAME/doku.php?id=start&do=admin&page=config" >> /home/$MY_USERNAME/README
  2033. echo 'and set the template to mnml-blog' >> /home/$MY_USERNAME/README
  2034. echo '' >> /home/$MY_USERNAME/README
  2035. echo 'To edit things on the right hand sidebar (links, blogroll, etc) go to' >> /home/$MY_USERNAME/README
  2036. echo "https://$WIKI_DOMAIN_NAME/doku.php?id=wiki:navigation_sidebar" >> /home/$MY_USERNAME/README
  2037. echo 'and edit the page' >> /home/$MY_USERNAME/README
  2038. echo '' >> /home/$MY_USERNAME/README
  2039. echo 'To edit things to a header bar (home, contacts, etc) go to' >> /home/$MY_USERNAME/README
  2040. echo "https://$WIKI_DOMAIN_NAME/doku.php?id=wiki:navigation_header" >> /home/$MY_USERNAME/README
  2041. echo 'and select the "create this page" at the bottom.' >> /home/$MY_USERNAME/README
  2042. echo 'You can then add somethething like:' >> /home/$MY_USERNAME/README
  2043. echo ' * [[:start|Home]]' >> /home/$MY_USERNAME/README
  2044. echo ' * [[:wiki|Wiki]]' >> /home/$MY_USERNAME/README
  2045. echo ' * [[:contact|Contact]]' >> /home/$MY_USERNAME/README
  2046. echo "Go to https://$WIKI_DOMAIN_NAME/doku.php?id=start&do=admin&page=config" >> /home/$MY_USERNAME/README
  2047. echo 'and check "Show header navigation" to ensure that the header shows' >> /home/$MY_USERNAME/README
  2048. fi
  2049. echo 'install_blog' >> $COMPLETION_FILE
  2050. }
  2051. function get_mariadb_password {
  2052. if [ -f /home/$MY_USERNAME/README ]; then
  2053. if grep -q "MariaDB password" /home/$MY_USERNAME/README; then
  2054. MARIADB_PASSWORD=$(cat /home/$MY_USERNAME/README | grep "MariaDB password" | awk -F ':' '{print $2}' | sed 's/^ *//')
  2055. fi
  2056. fi
  2057. }
  2058. function get_mariadb_gnusocial_admin_password {
  2059. if [ -f /home/$MY_USERNAME/README ]; then
  2060. if grep -q "MariaDB gnusocial admin password" /home/$MY_USERNAME/README; then
  2061. MICROBLOG_ADMIN_PASSWORD=$(cat /home/$MY_USERNAME/README | grep "MariaDB gnusocial admin password" | awk -F ':' '{print $2}' | sed 's/^ *//')
  2062. fi
  2063. fi
  2064. }
  2065. function get_mariadb_redmatrix_admin_password {
  2066. if [ -f /home/$MY_USERNAME/README ]; then
  2067. if grep -q "MariaDB Red Matrix admin password" /home/$MY_USERNAME/README; then
  2068. REDMATRIX_ADMIN_PASSWORD=$(cat /home/$MY_USERNAME/README | grep "MariaDB Red Matrix admin password" | awk -F ':' '{print $2}' | sed 's/^ *//')
  2069. fi
  2070. fi
  2071. }
  2072. function install_mariadb {
  2073. if grep -Fxq "install_mariadb" $COMPLETION_FILE; then
  2074. return
  2075. fi
  2076. apt-get -y --force-yes install python-software-properties debconf-utils
  2077. apt-key adv --recv-keys --keyserver keyserver.ubuntu.com 0xcbcb082a1bb943db
  2078. add-apt-repository 'deb http://mariadb.biz.net.id//repo/10.1/debian sid main'
  2079. apt-get -y --force-yes install software-properties-common
  2080. apt-get -y update
  2081. get_mariadb_password
  2082. if [ ! $MARIADB_PASSWORD ]; then
  2083. MARIADB_PASSWORD=$(openssl rand -base64 32)
  2084. echo '' >> /home/$MY_USERNAME/README
  2085. echo "Your MariaDB password is: $MARIADB_PASSWORD" >> /home/$MY_USERNAME/README
  2086. echo '' >> /home/$MY_USERNAME/README
  2087. chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/README
  2088. fi
  2089. debconf-set-selections <<< "mariadb-server mariadb-server/root_password password $MARIADB_PASSWORD"
  2090. debconf-set-selections <<< "mariadb-server mariadb-server/root_password_again password $MARIADB_PASSWORD"
  2091. apt-get -y --force-yes install mariadb-server
  2092. mysqladmin -u root password "$MARIADB_PASSWORD"
  2093. echo 'install_mariadb' >> $COMPLETION_FILE
  2094. }
  2095. function install_gnu_social {
  2096. if grep -Fxq "install_gnu_social" $COMPLETION_FILE; then
  2097. return
  2098. fi
  2099. if [[ $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_WRITER" ]]; then
  2100. return
  2101. fi
  2102. if [ ! $MICROBLOG_DOMAIN_NAME ]; then
  2103. return
  2104. fi
  2105. install_mariadb
  2106. get_mariadb_password
  2107. apt-get -y --force-yes install php-gettext php5-curl php5-gd php5-mysql git
  2108. if [ ! -d /var/www/$MICROBLOG_DOMAIN_NAME ]; then
  2109. mkdir /var/www/$MICROBLOG_DOMAIN_NAME
  2110. fi
  2111. if [ ! -d /var/www/$MICROBLOG_DOMAIN_NAME/htdocs ]; then
  2112. mkdir /var/www/$MICROBLOG_DOMAIN_NAME/htdocs
  2113. fi
  2114. if [ ! -f /var/www/$MICROBLOG_DOMAIN_NAME/htdocs/index.php ]; then
  2115. cd $INSTALL_DIR
  2116. git clone $MICROBLOG_REPO gnusocial
  2117. rm -rf /var/www/$MICROBLOG_DOMAIN_NAME/htdocs
  2118. mv gnusocial /var/www/$MICROBLOG_DOMAIN_NAME/htdocs
  2119. chmod a+w /var/www/$MICROBLOG_DOMAIN_NAME/htdocs
  2120. chown www-data:www-data /var/www/$MICROBLOG_DOMAIN_NAME/htdocs
  2121. chmod a+w /var/www/$MICROBLOG_DOMAIN_NAME/htdocs/avatar
  2122. chmod a+w /var/www/$MICROBLOG_DOMAIN_NAME/htdocs/background
  2123. chmod a+w /var/www/$MICROBLOG_DOMAIN_NAME/htdocs/file
  2124. chmod +x /var/www/$MICROBLOG_DOMAIN_NAME/htdocs/scripts/maildaemon.php
  2125. fi
  2126. get_mariadb_gnusocial_admin_password
  2127. if [ ! $MICROBLOG_ADMIN_PASSWORD ]; then
  2128. MICROBLOG_ADMIN_PASSWORD=$(openssl rand -base64 32)
  2129. echo '' >> /home/$MY_USERNAME/README
  2130. echo "Your MariaDB gnusocial admin password is: $MICROBLOG_ADMIN_PASSWORD" >> /home/$MY_USERNAME/README
  2131. echo '' >> /home/$MY_USERNAME/README
  2132. chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/README
  2133. fi
  2134. echo "create database gnusocial;
  2135. CREATE USER 'gnusocialadmin'@'localhost' IDENTIFIED BY '$MICROBLOG_ADMIN_PASSWORD';
  2136. GRANT ALL PRIVILEGES ON gnusocial.* TO 'gnusocialadmin'@'localhost';
  2137. quit" > $INSTALL_DIR/batch.sql
  2138. chmod 600 $INSTALL_DIR/batch.sql
  2139. mysql -u root --password="$MARIADB_PASSWORD" < $INSTALL_DIR/batch.sql
  2140. shred -zu $INSTALL_DIR/batch.sql
  2141. if [ ! -f "/etc/aliases" ]; then
  2142. touch /etc/aliases
  2143. fi
  2144. if grep -q "www-data: root" /etc/aliases; then
  2145. echo 'www-data: root' >> /etc/aliases
  2146. fi
  2147. if grep -q "/var/www/$MICROBLOG_DOMAIN_NAME/htdocs/scripts/maildaemon.php" /etc/aliases; then
  2148. echo "*: /var/www/$MICROBLOG_DOMAIN_NAME/htdocs/scripts/maildaemon.php" >> /etc/aliases
  2149. fi
  2150. newaliases
  2151. # update the dynamic DNS
  2152. if [ $MICROBLOG_FREEDNS_SUBDOMAIN_CODE ]; then
  2153. if [[ $MICROBLOG_FREEDNS_SUBDOMAIN_CODE != $FREEDNS_SUBDOMAIN_CODE ]]; then
  2154. if ! grep -q "$MICROBLOG_DOMAIN_NAME" /usr/bin/dynamicdns; then
  2155. echo "# $MICROBLOG_DOMAIN_NAME" >> /usr/bin/dynamicdns
  2156. echo "wget -O - https://freedns.afraid.org/dynamic/update.php?$MICROBLOG_FREEDNS_SUBDOMAIN_CODE== >> /dev/null 2>&1" >> /usr/bin/dynamicdns
  2157. fi
  2158. fi
  2159. else
  2160. echo 'WARNING: No freeDNS subdomain code given for microblog. It is assumed that you are using some other dynamic DNS provider.'
  2161. fi
  2162. echo 'server {' > /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2163. echo ' listen 80;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2164. echo " server_name $MICROBLOG_DOMAIN_NAME;" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2165. echo " root /var/www/$MICROBLOG_DOMAIN_NAME/htdocs;" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2166. echo " error_log /var/www/$MICROBLOG_DOMAIN_NAME/error.log;" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2167. echo ' index index.php;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2168. echo '' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2169. echo ' rewrite ^ https://$server_name$request_uri? permanent;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2170. echo '}' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2171. echo '' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2172. echo 'server {' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2173. echo ' listen 443 ssl;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2174. echo " root /var/www/$MICROBLOG_DOMAIN_NAME/htdocs;" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2175. echo " server_name $MICROBLOG_DOMAIN_NAME;" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2176. echo " error_log /var/www/$MICROBLOG_DOMAIN_NAME/error_ssl.log;" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2177. echo ' index index.php;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2178. echo ' charset utf-8;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2179. echo ' client_max_body_size 20m;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2180. echo ' client_body_buffer_size 128k;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2181. echo '' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2182. echo ' ssl on;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2183. echo " ssl_certificate /etc/ssl/certs/$MICROBLOG_DOMAIN_NAME.crt;" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2184. echo " ssl_certificate_key /etc/ssl/private/$MICROBLOG_DOMAIN_NAME.key;" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2185. echo " ssl_dhparam /etc/ssl/certs/$MICROBLOG_DOMAIN_NAME.dhparam;" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2186. echo '' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2187. echo ' ssl_session_timeout 5m;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2188. echo ' ssl_prefer_server_ciphers on;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2189. echo ' ssl_session_cache builtin:1000 shared:SSL:10m;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2190. echo ' ssl_protocols TLSv1 TLSv1.1 TLSv1.2; # not possible to do exclusive' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2191. echo " ssl_ciphers '$SSL_CIPHERS';" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2192. echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2193. echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2194. echo ' add_header Strict-Transport-Security max-age=15768000;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2195. echo '' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2196. echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2197. echo ' location / {' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2198. echo ' rewrite ^/(.*) /index.php?q=$uri&$args last;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2199. echo ' }' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2200. echo '' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2201. echo " # make sure webfinger and other well known services aren't blocked" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2202. echo ' # by denying dot files and rewrite request to the front controller' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2203. echo ' location ^~ /.well-known/ {' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2204. echo ' allow all;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2205. echo ' rewrite ^/(.*) /index.php?q=$uri&$args last;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2206. echo ' }' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2207. echo '' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2208. echo ' # statically serve these file types when possible' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2209. echo ' # otherwise fall back to front controller' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2210. echo ' # allow browser to cache them' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2211. echo ' # added .htm for advanced source code editor library' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2212. echo ' location ~* \.(jpg|jpeg|gif|png|ico|css|js|htm|html|ttf|woff|svg)$ {' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2213. echo ' expires 30d;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2214. echo ' try_files $uri /index.php?q=$uri&$args;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2215. echo ' }' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2216. echo '' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2217. echo ' # block these file types' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2218. echo ' location ~* \.(tpl|md|tgz|log|out)$ {' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2219. echo ' deny all;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2220. echo ' }' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2221. echo '' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2222. echo ' # pass the PHP scripts to FastCGI server listening on 127.0.0.1:9000' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2223. echo ' # or a unix socket' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2224. echo ' location ~* \.php$ {' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2225. echo ' # Zero-day exploit defense.' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2226. echo ' # http://forum.nginx.org/read.php?2,88845,page=3' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2227. echo " # Won't work properly (404 error) if the file is not stored on this" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2228. echo " # server, which is entirely possible with php-fpm/php-fcgi." >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2229. echo " # Comment the 'try_files' line out if you set up php-fpm/php-fcgi on" >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2230. echo " # another machine. And then cross your fingers that you won't get hacked." >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2231. echo ' try_files $uri $uri/ /index.php;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2232. echo ' # NOTE: You should have "cgi.fix_pathinfo = 0;" in php.ini' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2233. echo ' fastcgi_split_path_info ^(.+\.php)(/.+)$;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2234. echo ' # With php5-cgi alone:' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2235. echo ' # fastcgi_pass 127.0.0.1:9000;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2236. echo ' # With php5-fpm:' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2237. echo ' fastcgi_pass unix:/var/run/php5-fpm.sock;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2238. echo ' include fastcgi_params;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2239. echo ' fastcgi_index index.php;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2240. echo ' fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2241. echo ' }' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2242. echo '' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2243. echo ' # deny access to all dot files' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2244. echo ' location ~ /\. {' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2245. echo ' deny all;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2246. echo ' }' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2247. echo '' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2248. echo ' location ~ /\.ht {' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2249. echo ' deny all;' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2250. echo ' }' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2251. echo '}' >> /etc/nginx/sites-available/$MICROBLOG_DOMAIN_NAME
  2252. configure_php
  2253. if [ ! -f /etc/ssl/private/$MICROBLOG_DOMAIN_NAME.key ]; then
  2254. makecert $MICROBLOG_DOMAIN_NAME
  2255. fi
  2256. nginx_ensite $MICROBLOG_DOMAIN_NAME
  2257. service php5-fpm restart
  2258. service nginx restart
  2259. # some post-install instructions for the user
  2260. if ! grep -q "To set up your microblog" /home/$MY_USERNAME/README; then
  2261. echo '' >> /home/$MY_USERNAME/README
  2262. echo "To set up your microblog go to" >> /home/$MY_USERNAME/README
  2263. echo "https://$MICROBLOG_DOMAIN_NAME/install.php" >> /home/$MY_USERNAME/README
  2264. echo 'and enter the following settings:' >> /home/$MY_USERNAME/README
  2265. echo ' - Set a name for the site' >> /home/$MY_USERNAME/README
  2266. echo ' - Server SSL: enable' >> /home/$MY_USERNAME/README
  2267. echo ' - Hostname: localhost' >> /home/$MY_USERNAME/README
  2268. echo ' - Type: MySql/MariaDB' >> /home/$MY_USERNAME/README
  2269. echo ' - Name: gnusocial' >> /home/$MY_USERNAME/README
  2270. echo ' - DB username: gnusocialadmin' >> /home/$MY_USERNAME/README
  2271. echo " - DB Password; $MICROBLOG_ADMIN_PASSWORD" >> /home/$MY_USERNAME/README
  2272. echo " - Administrator nickname: $MY_USERNAME" >> /home/$MY_USERNAME/README
  2273. echo " - Administrator password: $MICROBLOG_ADMIN_PASSWORD" >> /home/$MY_USERNAME/README
  2274. echo ' - Subscribe to announcements: ticked' >> /home/$MY_USERNAME/README
  2275. echo ' - Site profile: Community' >> /home/$MY_USERNAME/README
  2276. echo '' >> /home/$MY_USERNAME/README
  2277. echo "Navigate to https://$MICROBLOG_DOMAIN_NAME and you can then " >> /home/$MY_USERNAME/README
  2278. echo 'complete the configuration via the *Admin* section on the header' >> /home/$MY_USERNAME/README
  2279. echo 'bar. Some recommended admin settings are:' >> /home/$MY_USERNAME/README
  2280. echo '' >> /home/$MY_USERNAME/README
  2281. echo 'Under the *Site* settings:' >> /home/$MY_USERNAME/README
  2282. echo ' Text limit: 140' >> /home/$MY_USERNAME/README
  2283. echo ' Dupe Limit: 60000' >> /home/$MY_USERNAME/README
  2284. echo '' >> /home/$MY_USERNAME/README
  2285. echo 'Under the *User* settings:' >> /home/$MY_USERNAME/README
  2286. echo ' Bio limit: 1000' >> /home/$MY_USERNAME/README
  2287. echo '' >> /home/$MY_USERNAME/README
  2288. echo 'Under the *Access* settings:' >> /home/$MY_USERNAME/README
  2289. echo ' /Invite only/ ticked' >> /home/$MY_USERNAME/README
  2290. echo '' >> /home/$MY_USERNAME/README
  2291. fi
  2292. echo 'install_gnu_social' >> $COMPLETION_FILE
  2293. }
  2294. function install_redmatrix {
  2295. if grep -Fxq "install_redmatrix" $COMPLETION_FILE; then
  2296. return
  2297. fi
  2298. if [[ $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_WRITER" ]]; then
  2299. return
  2300. fi
  2301. # if this is exclusively a writer setup
  2302. if [[ $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  2303. REDMATRIX_DOMAIN_NAME=$DOMAIN_NAME
  2304. REDMATRIX_FREEDNS_SUBDOMAIN_CODE=$FREEDNS_SUBDOMAIN_CODE
  2305. fi
  2306. if [ ! $REDMATRIX_DOMAIN_NAME ]; then
  2307. return
  2308. fi
  2309. install_mariadb
  2310. get_mariadb_password
  2311. apt-get -y --force-yes install php5-common php5-cli php5-curl php5-gd php5-mysql php5-mcrypt git git
  2312. if [ ! -d /var/www/$REDMATRIX_DOMAIN_NAME ]; then
  2313. mkdir /var/www/$REDMATRIX_DOMAIN_NAME
  2314. fi
  2315. if [ ! -d /var/www/$REDMATRIX_DOMAIN_NAME/htdocs ]; then
  2316. mkdir /var/www/$REDMATRIX_DOMAIN_NAME/htdocs
  2317. fi
  2318. if [ ! -f /var/www/$REDMATRIX_DOMAIN_NAME/htdocs/index.php ]; then
  2319. cd $INSTALL_DIR
  2320. git clone $REDMATRIX_REPO redmatrix
  2321. rm -rf /var/www/$REDMATRIX_DOMAIN_NAME/htdocs
  2322. mv redmatrix /var/www/$REDMATRIX_DOMAIN_NAME/htdocs
  2323. chown -R www-data:www-data /var/www/$REDMATRIX_DOMAIN_NAME/htdocs
  2324. git clone $REDMATRIX_ADDONS_REPO /var/www/$REDMATRIX_DOMAIN_NAME/htdocs/addon
  2325. fi
  2326. get_mariadb_redmatrix_admin_password
  2327. if [ ! $REDMATRIX_ADMIN_PASSWORD ]; then
  2328. REDMATRIX_ADMIN_PASSWORD=$(openssl rand -base64 32)
  2329. echo '' >> /home/$MY_USERNAME/README
  2330. echo "Your MariaDB Red Matrix admin password is: $REDMATRIX_ADMIN_PASSWORD" >> /home/$MY_USERNAME/README
  2331. echo '' >> /home/$MY_USERNAME/README
  2332. chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/README
  2333. fi
  2334. echo "create database redmatrix;
  2335. CREATE USER 'redmatrixadmin'@'localhost' IDENTIFIED BY '$REDMATRIX_ADMIN_PASSWORD';
  2336. GRANT ALL PRIVILEGES ON redmatrix.* TO 'redmatrixadmin'@'localhost';
  2337. quit" > $INSTALL_DIR/batch.sql
  2338. chmod 600 $INSTALL_DIR/batch.sql
  2339. mysql -u root --password="$MARIADB_PASSWORD" < $INSTALL_DIR/batch.sql
  2340. shred -zu $INSTALL_DIR/batch.sql
  2341. if ! grep -q "/var/www/$REDMATRIX_DOMAIN_NAME/htdocs" /etc/crontab; then
  2342. echo "12,22,32,42,52 * * * * root cd /var/www/$REDMATRIX_DOMAIN_NAME/htdocs; /usr/bin/timeout 240 /usr/bin/php include/poller.php" >> /etc/crontab
  2343. fi
  2344. # update the dynamic DNS
  2345. if [ $REDMATRIX_FREEDNS_SUBDOMAIN_CODE ]; then
  2346. if [[ $REDMATRIX_FREEDNS_SUBDOMAIN_CODE != $FREEDNS_SUBDOMAIN_CODE ]]; then
  2347. if ! grep -q "$REDMATRIX_DOMAIN_NAME" /usr/bin/dynamicdns; then
  2348. echo "# $REDMATRIX_DOMAIN_NAME" >> /usr/bin/dynamicdns
  2349. echo "wget -O - https://freedns.afraid.org/dynamic/update.php?$REDMATRIX_FREEDNS_SUBDOMAIN_CODE== >> /dev/null 2>&1" >> /usr/bin/dynamicdns
  2350. fi
  2351. fi
  2352. else
  2353. echo 'WARNING: No freeDNS subdomain code given for Red Matrix. It is assumed that you are using some other dynamic DNS provider.'
  2354. fi
  2355. echo 'server {' > /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2356. echo ' listen 80;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2357. echo " server_name $REDMATRIX_DOMAIN_NAME;" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2358. echo " root /var/www/$REDMATRIX_DOMAIN_NAME/htdocs;" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2359. echo " error_log /var/www/$REDMATRIX_DOMAIN_NAME/error.log;" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2360. echo ' index index.php;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2361. echo '' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2362. echo ' rewrite ^ https://$server_name$request_uri? permanent;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2363. echo '}' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2364. echo '' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2365. echo 'server {' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2366. echo ' listen 443 ssl;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2367. echo " root /var/www/$REDMATRIX_DOMAIN_NAME/htdocs;" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2368. echo " server_name $REDMATRIX_DOMAIN_NAME;" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2369. echo " error_log /var/www/$REDMATRIX_DOMAIN_NAME/error_ssl.log;" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2370. echo ' index index.php;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2371. echo ' charset utf-8;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2372. echo ' client_max_body_size 20m;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2373. echo ' client_body_buffer_size 128k;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2374. echo '' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2375. echo ' ssl on;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2376. echo " ssl_certificate /etc/ssl/certs/$REDMATRIX_DOMAIN_NAME.crt;" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2377. echo " ssl_certificate_key /etc/ssl/private/$REDMATRIX_DOMAIN_NAME.key;" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2378. echo " ssl_dhparam /etc/ssl/certs/$REDMATRIX_DOMAIN_NAME.dhparam;" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2379. echo '' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2380. echo ' ssl_session_timeout 5m;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2381. echo ' ssl_prefer_server_ciphers on;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2382. echo ' ssl_session_cache builtin:1000 shared:SSL:10m;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2383. echo ' ssl_protocols TLSv1 TLSv1.1 TLSv1.2; # not possible to do exclusive' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2384. echo " ssl_ciphers '$SSL_CIPHERS';" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2385. echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2386. echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2387. echo ' add_header Strict-Transport-Security max-age=15768000;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2388. echo '' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2389. echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2390. echo ' location / {' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2391. echo ' rewrite ^/(.*) /index.php?q=$uri&$args last;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2392. echo ' }' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2393. echo '' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2394. echo " # make sure webfinger and other well known services aren't blocked" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2395. echo ' # by denying dot files and rewrite request to the front controller' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2396. echo ' location ^~ /.well-known/ {' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2397. echo ' allow all;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2398. echo ' rewrite ^/(.*) /index.php?q=$uri&$args last;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2399. echo ' }' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2400. echo '' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2401. echo ' # statically serve these file types when possible' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2402. echo ' # otherwise fall back to front controller' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2403. echo ' # allow browser to cache them' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2404. echo ' # added .htm for advanced source code editor library' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2405. echo ' location ~* \.(jpg|jpeg|gif|png|ico|css|js|htm|html|ttf|woff|svg)$ {' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2406. echo ' expires 30d;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2407. echo ' try_files $uri /index.php?q=$uri&$args;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2408. echo ' }' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2409. echo '' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2410. echo ' # block these file types' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2411. echo ' location ~* \.(tpl|md|tgz|log|out)$ {' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2412. echo ' deny all;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2413. echo ' }' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2414. echo '' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2415. echo ' # pass the PHP scripts to FastCGI server listening on 127.0.0.1:9000' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2416. echo ' # or a unix socket' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2417. echo ' location ~* \.php$ {' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2418. echo ' # Zero-day exploit defense.' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2419. echo ' # http://forum.nginx.org/read.php?2,88845,page=3' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2420. echo " # Won't work properly (404 error) if the file is not stored on this" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2421. echo " # server, which is entirely possible with php-fpm/php-fcgi." >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2422. echo " # Comment the 'try_files' line out if you set up php-fpm/php-fcgi on" >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2423. echo " # another machine. And then cross your fingers that you won't get hacked." >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2424. echo ' try_files $uri $uri/ /index.php;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2425. echo ' # NOTE: You should have "cgi.fix_pathinfo = 0;" in php.ini' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2426. echo ' fastcgi_split_path_info ^(.+\.php)(/.+)$;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2427. echo ' # With php5-cgi alone:' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2428. echo ' # fastcgi_pass 127.0.0.1:9000;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2429. echo ' # With php5-fpm:' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2430. echo ' fastcgi_pass unix:/var/run/php5-fpm.sock;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2431. echo ' include fastcgi_params;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2432. echo ' fastcgi_index index.php;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2433. echo ' fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2434. echo ' }' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2435. echo '' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2436. echo ' # deny access to all dot files' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2437. echo ' location ~ /\. {' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2438. echo ' deny all;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2439. echo ' }' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2440. echo '' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2441. echo ' location ~ /\.ht {' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2442. echo ' deny all;' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2443. echo ' }' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2444. echo '}' >> /etc/nginx/sites-available/$REDMATRIX_DOMAIN_NAME
  2445. configure_php
  2446. if [ ! -f /etc/ssl/private/$REDMATRIX_DOMAIN_NAME.key ]; then
  2447. makecert $REDMATRIX_DOMAIN_NAME
  2448. fi
  2449. if [ ! -d /var/www/$REDMATRIX_DOMAIN_NAME/htdocs/view/tpl/smarty3 ]; then
  2450. mkdir /var/www/$REDMATRIX_DOMAIN_NAME/htdocs/view/tpl/smarty3
  2451. fi
  2452. if [ ! -d /var/www/$REDMATRIX_DOMAIN_NAME/htdocs/store/[data] ]; then
  2453. mkdir /var/www/$REDMATRIX_DOMAIN_NAME/htdocs/store/[data]
  2454. fi
  2455. if [ ! -d /var/www/$REDMATRIX_DOMAIN_NAME/htdocs/store/[data]/smarty3 ]; then
  2456. mkdir /var/www/$REDMATRIX_DOMAIN_NAME/htdocs/store/[data]/smarty3
  2457. chmod 777 /var/www/$REDMATRIX_DOMAIN_NAME/htdocs/store/[data]/smarty3
  2458. fi
  2459. chmod 777 /var/www/$REDMATRIX_DOMAIN_NAME/htdocs/view/tpl
  2460. chmod 777 /var/www/$REDMATRIX_DOMAIN_NAME/htdocs/view/tpl/smarty3
  2461. nginx_ensite $REDMATRIX_DOMAIN_NAME
  2462. service php5-fpm restart
  2463. service nginx restart
  2464. service cron restart
  2465. echo 'install_redmatrix' >> $COMPLETION_FILE
  2466. }
  2467. function install_final {
  2468. if grep -Fxq "install_final" $COMPLETION_FILE; then
  2469. return
  2470. fi
  2471. # unmount any attached usb drive
  2472. if [ -d /media/usb ]; then
  2473. umount /media/usb
  2474. rm -rf /media/usb
  2475. fi
  2476. apt-get -y --force-yes autoremove
  2477. echo 'install_final' >> $COMPLETION_FILE
  2478. echo ''
  2479. echo ' *** Freedombone installation is complete. Rebooting... ***'
  2480. echo ''
  2481. if [ -f "/home/$MY_USERNAME/README" ]; then
  2482. echo "See /home/$MY_USERNAME/README for post-installation instructions."
  2483. echo ''
  2484. fi
  2485. reboot
  2486. }
  2487. argument_checks
  2488. configure_firewall
  2489. configure_firewall_for_ssh
  2490. configure_firewall_for_dns
  2491. configure_firewall_for_ftp
  2492. configure_firewall_for_web_access
  2493. remove_proprietary_repos
  2494. change_debian_repos
  2495. enable_backports
  2496. configure_dns
  2497. initial_setup
  2498. install_editor
  2499. change_login_message
  2500. update_the_kernel
  2501. enable_zram
  2502. random_number_generator
  2503. set_your_domain_name
  2504. time_synchronisation
  2505. configure_internet_protocol
  2506. configure_ssh
  2507. search_for_attached_usb_drive
  2508. regenerate_ssh_keys
  2509. script_to_make_self_signed_certificates
  2510. configure_email
  2511. #spam_filtering
  2512. configure_imap
  2513. configure_gpg
  2514. email_client
  2515. configure_firewall_for_email
  2516. folders_for_mailing_lists
  2517. folders_for_email_addresses
  2518. dynamic_dns_freedns
  2519. #create_private_mailing_list
  2520. import_email
  2521. install_web_server
  2522. configure_firewall_for_web_server
  2523. install_owncloud
  2524. install_xmpp
  2525. configure_firewall_for_xmpp
  2526. install_irc_server
  2527. configure_firewall_for_irc
  2528. install_wiki
  2529. install_blog
  2530. install_gnu_social
  2531. install_redmatrix
  2532. install_final
  2533. echo 'Freedombone installation is complete'
  2534. exit 0