2020-06-18 19:17:40 +00:00
|
|
|
#!/bin/bash
|
|
|
|
|
2020-06-19 12:31:31 +00:00
|
|
|
install_destination=/opt/epicyon-i2p
|
2020-06-19 12:44:39 +00:00
|
|
|
username='epicyon-i2p'
|
2020-06-19 12:17:02 +00:00
|
|
|
|
2020-06-18 19:17:40 +00:00
|
|
|
if [[ "$1" == 'remove' ]]; then
|
|
|
|
echo 'Removing Epicyon i2p instance'
|
|
|
|
systemctl stop i2pd
|
|
|
|
if [ -f /var/lib/i2pd/tunnels.d/epicyon ]; then
|
2022-08-10 11:12:28 +00:00
|
|
|
rm /var/lib/i2pd/tunnels.d/epicyon
|
2020-06-18 19:17:40 +00:00
|
|
|
fi
|
|
|
|
if [ -f /etc/i2pd/tunnels.conf.d/epicyon ]; then
|
2022-08-10 11:12:28 +00:00
|
|
|
rm /etc/i2pd/tunnels.conf.d/epicyon
|
2020-06-18 19:17:40 +00:00
|
|
|
fi
|
|
|
|
rm /var/lib/i2pd/epicyon.dat
|
|
|
|
systemctl restart i2pd
|
|
|
|
|
2020-06-19 13:01:18 +00:00
|
|
|
systemctl stop "${username}.service"
|
|
|
|
systemctl disable "${username}.service"
|
2020-06-19 12:44:39 +00:00
|
|
|
rm "/etc/nginx/sites-enabled/${username}"
|
|
|
|
rm "/etc/nginx/sites-availale/${username}"
|
2020-06-19 12:17:02 +00:00
|
|
|
rm -rf ${install_destination}
|
2020-06-19 13:01:18 +00:00
|
|
|
userdel -r ${username}
|
2020-06-18 19:17:40 +00:00
|
|
|
echo 'Epicyon i2p instance removed'
|
|
|
|
exit 0
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [[ "$1" == 'removei2p' ]]; then
|
|
|
|
if [ -f /usr/bin/pacman ]; then
|
2022-08-10 11:12:28 +00:00
|
|
|
pacman -R --noconfirm i2pd
|
2020-06-18 19:17:40 +00:00
|
|
|
else
|
2022-08-10 11:12:28 +00:00
|
|
|
apt-get -y remove --purge i2pd
|
2020-06-18 19:17:40 +00:00
|
|
|
fi
|
|
|
|
rm -rf /etc/i2pd
|
|
|
|
rm -rf /var/lib/i2pd
|
|
|
|
if [ -f /var/log/i2pd/i2pd.log ]; then
|
2022-08-10 11:12:28 +00:00
|
|
|
rm /var/log/i2pd/i2pd.log
|
2020-06-18 19:17:40 +00:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
clear
|
|
|
|
echo 'Installing Epicyon on an i2p domain'
|
|
|
|
|
2020-06-19 12:33:27 +00:00
|
|
|
NGINX_PORT=9554
|
|
|
|
EPICYON_PORT=7158
|
2020-06-18 19:17:40 +00:00
|
|
|
tunnels_dir=/var/lib/i2pd/tunnels.d
|
|
|
|
|
2020-06-27 10:30:10 +00:00
|
|
|
# if proxychains already exists then make a copy of the
|
|
|
|
# older config
|
|
|
|
if [ -f /etc/proxychains.conf ]; then
|
|
|
|
mv /etc/proxychains.conf /etc/proxychains.conf.old
|
|
|
|
fi
|
|
|
|
|
2020-06-18 19:17:40 +00:00
|
|
|
echo 'Adding Epicyon dependencies'
|
|
|
|
if [ -f /usr/bin/pacman ]; then
|
|
|
|
pacman -Syy
|
2021-02-04 16:30:32 +00:00
|
|
|
pacman -S --noconfirm python-pip python-pysocks python-cryptography \
|
2020-06-18 19:17:40 +00:00
|
|
|
imagemagick python-pillow python-requests \
|
2022-08-10 11:12:28 +00:00
|
|
|
perl-image-exiftool python-numpy python-dateutil \
|
|
|
|
certbot flake8 git i2pd wget qrencode \
|
|
|
|
proxychains midori bandit
|
2020-06-22 16:55:19 +00:00
|
|
|
pip3 install pyLD pyqrcode pypng
|
2020-06-18 19:17:40 +00:00
|
|
|
else
|
|
|
|
apt-get update
|
2021-02-04 18:40:54 +00:00
|
|
|
apt-get -y install imagemagick python3-cryptography \
|
2022-08-10 11:12:28 +00:00
|
|
|
python3-dateutil python3-idna python3-requests \
|
|
|
|
python3-numpy python3-pil.imagetk python3-pip \
|
|
|
|
python3-setuptools python3-socks python3-idna \
|
|
|
|
libimage-exiftool-perl python3-flake8 python3-pyld \
|
|
|
|
python3-django-timezone-field nginx git i2pd wget \
|
|
|
|
python3-pyqrcode qrencode python3-png \
|
|
|
|
proxychains midori python3-bandit
|
2020-06-18 19:17:40 +00:00
|
|
|
fi
|
|
|
|
|
2020-06-19 20:38:16 +00:00
|
|
|
if [ ! -d /etc/i2pd ]; then
|
|
|
|
echo 'i2pd was not installed'
|
|
|
|
exit 5
|
|
|
|
fi
|
|
|
|
|
2020-06-18 19:17:40 +00:00
|
|
|
echo 'Cloning the epicyon repo'
|
2020-06-19 12:17:02 +00:00
|
|
|
if [ ! -d ${install_destination} ]; then
|
|
|
|
git clone https://gitlab.com/bashrc2/epicyon ${install_destination}
|
2020-06-18 19:17:40 +00:00
|
|
|
|
2020-06-19 12:17:02 +00:00
|
|
|
if [ ! -d ${install_destination} ]; then
|
2022-08-10 11:12:28 +00:00
|
|
|
echo 'Epicyon repo failed to clone'
|
|
|
|
exit 3
|
2020-06-18 19:17:40 +00:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo 'Adding an epicyon system user account'
|
|
|
|
if [ -f /usr/bin/pacman ]; then
|
2020-06-19 13:01:18 +00:00
|
|
|
groupadd ${username}
|
|
|
|
useradd --system -g ${username} --home-dir=${install_destination} $username
|
2020-06-18 19:17:40 +00:00
|
|
|
groupadd www-data
|
|
|
|
useradd --system -g www-data --home-dir=/srv/http www-data
|
|
|
|
else
|
2020-06-19 12:17:02 +00:00
|
|
|
adduser --system --home=${install_destination} --group $username
|
2020-06-18 19:17:40 +00:00
|
|
|
fi
|
|
|
|
|
2020-06-19 12:36:31 +00:00
|
|
|
chown -R ${username}:${username} ${install_destination}
|
2020-06-18 19:17:40 +00:00
|
|
|
|
|
|
|
echo 'Creating a command script to obtain i2p domain names from dat files'
|
2020-06-18 20:03:29 +00:00
|
|
|
{ echo '#!/bin/bash';
|
|
|
|
echo "tunnelname=\"\$1\"";
|
|
|
|
echo 'domainfile=/tmp/i2pdomain.txt';
|
|
|
|
echo "if [ -f \${domainfile} ]; then";
|
|
|
|
echo " rm \${domainfile}";
|
|
|
|
echo 'fi';
|
|
|
|
echo "wget http://127.0.0.1:7070/?page=i2p_tunnels -O \${domainfile} 2> /dev/null";
|
|
|
|
echo "if [ ! -f \${domainfile} ]; then";
|
|
|
|
echo ' exit 9';
|
|
|
|
echo 'fi';
|
|
|
|
echo "awk -F \">\${tunnelname}<\" '{print \$2}' < \${domainfile} | awk -F ';' '{print \$2}' | awk -F ':' '{print \$1}' | tr -d '[:space:]'";
|
|
|
|
echo "rm \${domainfile}"; } > /usr/bin/i2pdomain
|
2020-06-18 19:17:40 +00:00
|
|
|
chmod +x /usr/bin/i2pdomain
|
|
|
|
|
|
|
|
echo 'Creating Epicyon i2p tunnel file'
|
|
|
|
if [ ! -d "$tunnels_dir" ]; then
|
|
|
|
ln -s /etc/i2pd/tunnels.conf.d /var/lib/i2pd/tunnels.d
|
|
|
|
fi
|
|
|
|
|
|
|
|
if ! grep -q 'epicyon.dat' /var/lib/i2pd/tunnels.conf; then
|
|
|
|
{ echo '';
|
|
|
|
echo '[epicyon]';
|
|
|
|
echo 'type = http';
|
|
|
|
echo 'host = 127.0.0.1';
|
|
|
|
echo 'inport = 80';
|
|
|
|
echo "port = ${NGINX_PORT}";
|
|
|
|
echo 'inbound.length = 1';
|
|
|
|
echo 'inbound.quantity = 5';
|
|
|
|
echo 'outbound.length = 1';
|
|
|
|
echo 'outbound.quantity = 5';
|
|
|
|
echo "keys = epicyon.dat"; } >> /var/lib/i2pd/tunnels.conf
|
|
|
|
fi
|
|
|
|
rm "$tunnels_dir"/*~
|
|
|
|
|
|
|
|
echo 'Setting i2p tunnels directory'
|
|
|
|
sed -i 's|#tunnelsdir =|tunnelsdir =|g' /etc/i2pd/i2pd.conf
|
|
|
|
sed -i 's|# tunnelsdir =|tunnelsdir =|g' /etc/i2pd/i2pd.conf
|
|
|
|
sed -i "s|tunnelsdir =.*|tunnelsdir = $tunnels_dir|g" /etc/i2pd/i2pd.conf
|
|
|
|
|
|
|
|
echo 'Enabling ipv6'
|
|
|
|
if [ -f /etc/sysctl.conf ]; then
|
|
|
|
if grep -q 'net.ipv6.conf.all.disable_ipv6' /etc/sysctl.conf; then
|
2022-08-10 11:12:28 +00:00
|
|
|
sed -i 's|net.ipv6.conf.all.disable_ipv6.*|net.ipv6.conf.all.disable_ipv6 = 0|g' /etc/sysctl.conf
|
|
|
|
/sbin/sysctl -p -q
|
2020-06-18 19:17:40 +00:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
sed -i 's|#ipv6 =|ipv6 =|g' /etc/i2pd/i2pd.conf
|
|
|
|
sed -i 's|# ipv6 =|ipv6 =|g' /etc/i2pd/i2pd.conf
|
2020-06-19 12:15:03 +00:00
|
|
|
sed -i 's|ipv6 =.*|ipv6 = true|g' /etc/i2pd/i2pd.conf
|
2020-06-18 19:17:40 +00:00
|
|
|
|
|
|
|
echo 'Disabling i2p logging'
|
2020-06-19 12:15:17 +00:00
|
|
|
sed -i 's|#logfile =|logfile =|g' /etc/i2pd/i2pd.conf
|
|
|
|
sed -i 's|# logfile =|logfile =|g' /etc/i2pd/i2pd.conf
|
|
|
|
sed -i 's|logfile =.*|logfile = /dev/null|g' /etc/i2pd/i2pd.conf
|
2020-06-18 19:17:40 +00:00
|
|
|
|
|
|
|
echo 'Enabling i2p NAT traversal'
|
|
|
|
sed -i 's|#nat =|nat =|g' /etc/i2pd/i2pd.conf
|
|
|
|
sed -i 's|# nat =|nat =|g' /etc/i2pd/i2pd.conf
|
|
|
|
sed -i 's|nat =.*|nat = true|g' /etc/i2pd/i2pd.conf
|
|
|
|
|
|
|
|
if [ ! -d /run/i2pd ]; then
|
2022-08-10 11:12:28 +00:00
|
|
|
mkdir /run/i2pd
|
2020-06-18 19:17:40 +00:00
|
|
|
fi
|
|
|
|
chown -R i2pd:i2pd /run/i2pd
|
|
|
|
|
|
|
|
#if [ -f /usr/bin/pacman ]; then
|
|
|
|
# sed -i 's|ExecStart=.*|ExecStart=/usr/sbin/i2pd --conf=/etc/i2pd/i2pd.conf --tunconf=/etc/i2pd/tunnels.conf --tunnelsdir=/etc/i2pd/tunnels.conf.d --service|g' /lib/systemd/system/i2pd.service
|
|
|
|
# sed -i 's|Type=.*|Type=simple|g' /lib/systemd/system/i2pd.service
|
|
|
|
#fi
|
|
|
|
|
|
|
|
echo 'Setting file permissions'
|
|
|
|
chown -R i2pd:i2pd "$tunnels_dir"
|
|
|
|
chmod 644 "$tunnels_dir"/*
|
|
|
|
chmod 755 "$tunnels_dir"
|
|
|
|
# chown -R i2pd:i2pd /etc/i2pd
|
|
|
|
systemctl daemon-reload
|
|
|
|
systemctl enable i2pd
|
|
|
|
systemctl restart i2pd
|
|
|
|
|
|
|
|
echo 'Waiting for i2p daemon restart'
|
|
|
|
sleep 5
|
|
|
|
if [ ! -f /var/lib/i2pd/epicyon.dat ]; then
|
|
|
|
echo 'Waiting for i2p daemon restart...'
|
|
|
|
sleep 5
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ ! -f /var/lib/i2pd/epicyon.dat ]; then
|
|
|
|
echo '/var/lib/i2pd/epicyon.dat not created'
|
|
|
|
exit 6
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo '/var/lib/i2pd/epicyon.dat file was created'
|
|
|
|
|
2020-06-18 20:03:29 +00:00
|
|
|
I2P_DOMAIN=$(i2pdomain epicyon)
|
2020-06-18 19:17:40 +00:00
|
|
|
if [[ "$I2P_DOMAIN" != *'.i2p' ]]; then
|
|
|
|
echo 'Epicyon i2p domain not created'
|
|
|
|
echo "$I2P_DOMAIN"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo "i2p domain: http://${I2P_DOMAIN}"
|
|
|
|
|
|
|
|
echo 'Creating Epicyon daemon'
|
|
|
|
{ echo '[Unit]';
|
|
|
|
echo "Description=$username";
|
|
|
|
echo 'After=syslog.target';
|
|
|
|
echo 'After=network.target';
|
|
|
|
echo '';
|
|
|
|
echo '[Service]';
|
|
|
|
echo 'Type=simple';
|
|
|
|
echo "User=$username";
|
|
|
|
echo "Group=$username";
|
2020-06-19 12:17:02 +00:00
|
|
|
echo "WorkingDirectory=${install_destination}";
|
|
|
|
echo "ExecStart=/usr/bin/python3 ${install_destination}/epicyon.py --http --i2p --port 80 --proxy ${EPICYON_PORT} --domain ${I2P_DOMAIN} --registration open";
|
2020-06-18 19:17:40 +00:00
|
|
|
echo "Environment=USER=$username";
|
|
|
|
echo 'Environment=PYTHONUNBUFFERED=true';
|
|
|
|
echo 'Restart=always';
|
|
|
|
echo 'StandardError=syslog';
|
2022-05-19 18:21:19 +00:00
|
|
|
echo 'CPUQuota=80%';
|
|
|
|
echo 'ProtectHome=true';
|
|
|
|
echo 'ProtectKernelTunables=true';
|
|
|
|
echo 'ProtectKernelModules=true';
|
|
|
|
echo 'ProtectControlGroups=true';
|
|
|
|
echo 'ProtectKernelLogs=true';
|
|
|
|
echo 'ProtectHostname=true';
|
|
|
|
echo 'ProtectClock=true';
|
|
|
|
echo 'ProtectProc=invisible';
|
|
|
|
echo 'ProcSubset=pid';
|
|
|
|
echo 'PrivateTmp=true';
|
|
|
|
echo 'PrivateUsers=true';
|
|
|
|
echo 'PrivateDevices=true';
|
|
|
|
echo 'PrivateIPC=true';
|
|
|
|
echo 'MemoryDenyWriteExecute=true';
|
|
|
|
echo 'NoNewPrivileges=true';
|
|
|
|
echo 'LockPersonality=true';
|
|
|
|
echo 'RestrictRealtime=true';
|
|
|
|
echo 'RestrictSUIDSGID=true';
|
|
|
|
echo 'RestrictNamespaces=true';
|
|
|
|
echo 'SystemCallArchitectures=native';
|
2020-06-18 19:17:40 +00:00
|
|
|
echo '';
|
|
|
|
echo '[Install]';
|
2020-06-19 12:44:39 +00:00
|
|
|
echo 'WantedBy=multi-user.target'; } > "/etc/systemd/system/${username}.service"
|
2020-06-18 19:17:40 +00:00
|
|
|
|
|
|
|
systemctl daemon-reload
|
2020-06-19 13:01:18 +00:00
|
|
|
systemctl enable "${username}.service"
|
|
|
|
systemctl restart "${username}.service"
|
2020-06-18 19:17:40 +00:00
|
|
|
|
|
|
|
echo 'Creating nginx configuration'
|
|
|
|
if [ ! -f /etc/nginx/nginx.conf ]; then
|
|
|
|
{ echo 'user www-data;';
|
|
|
|
echo 'pid /run/nginx.pid;';
|
|
|
|
echo '';
|
|
|
|
echo 'events {';
|
|
|
|
echo ' worker_connections 50;';
|
|
|
|
echo ' # multi_accept on;';
|
|
|
|
echo '}';
|
|
|
|
echo '';
|
|
|
|
echo 'http {';
|
|
|
|
echo ' # limit the number of connections per single IP';
|
|
|
|
echo " limit_conn_zone \$binary_remote_addr zone=conn_limit_per_ip:10m;";
|
|
|
|
echo '';
|
|
|
|
echo ' # limit the number of requests for a given session';
|
|
|
|
echo " limit_req_zone \$binary_remote_addr zone=req_limit_per_ip:10m rate=140r/s;";
|
|
|
|
echo '';
|
|
|
|
echo ' # if the request body size is more than the buffer size, then the entire (or partial) request body is written into a temporary file';
|
|
|
|
echo ' client_body_buffer_size 128k;';
|
|
|
|
echo '';
|
|
|
|
echo ' # headerbuffer size for the request header from client, its set for testing purpose';
|
|
|
|
echo ' client_header_buffer_size 3m;';
|
|
|
|
echo '';
|
|
|
|
echo ' # maximum number and size of buffers for large headers to read from client request';
|
|
|
|
echo ' large_client_header_buffers 4 256k;';
|
|
|
|
echo '';
|
|
|
|
echo ' # read timeout for the request body from client, its set for testing purpose';
|
|
|
|
echo ' client_body_timeout 3m;';
|
|
|
|
echo '';
|
|
|
|
echo ' # how long to wait for the client to send a request header, its set for testing purpose';
|
|
|
|
echo ' client_header_timeout 3m;';
|
|
|
|
echo '';
|
|
|
|
echo ' sendfile on;';
|
|
|
|
echo ' tcp_nopush on;';
|
|
|
|
echo ' tcp_nodelay on;';
|
|
|
|
echo ' keepalive_timeout 65;';
|
|
|
|
echo ' types_hash_max_size 2048;';
|
|
|
|
echo ' server_tokens off;';
|
|
|
|
echo '';
|
|
|
|
echo ' include /etc/nginx/mime.types;';
|
|
|
|
echo ' default_type application/octet-stream;';
|
|
|
|
echo '';
|
|
|
|
echo ' access_log /dev/null;';
|
|
|
|
echo ' error_log /dev/null;';
|
|
|
|
echo '';
|
|
|
|
echo ' gzip on;';
|
|
|
|
echo ' gzip_disable "msie6";';
|
|
|
|
echo '';
|
|
|
|
echo ' include /etc/nginx/conf.d/*.conf;';
|
|
|
|
echo ' include /etc/nginx/sites-enabled/*;';
|
|
|
|
echo '}'; } > /etc/nginx/nginx.conf
|
|
|
|
else
|
|
|
|
if ! grep -q 'include /etc/nginx/sites-enabled' /etc/nginx/nginx.conf; then
|
2022-08-10 11:12:28 +00:00
|
|
|
echo 'include /etc/nginx/sites-enabled/*.conf;' >> /etc/nginx/nginx.conf
|
2020-06-18 19:17:40 +00:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
if [ ! -d /etc/nginx/conf.d ]; then
|
|
|
|
mkdir /etc/nginx/conf.d
|
|
|
|
fi
|
|
|
|
if [ ! -d /etc/nginx/sites-available ]; then
|
|
|
|
mkdir /etc/nginx/sites-available
|
|
|
|
fi
|
|
|
|
if [ ! -d /etc/nginx/sites-enabled ]; then
|
|
|
|
mkdir /etc/nginx/sites-enabled
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -f /usr/bin/pacman ]; then
|
|
|
|
if [ ! -f /lib/systemd/system/nginx.service ]; then
|
2022-08-10 11:12:28 +00:00
|
|
|
echo 'Creating nginx daemon'
|
|
|
|
{ echo '[Unit]';
|
|
|
|
echo 'Description=A high performance web server and a reverse proxy server';
|
|
|
|
echo 'Documentation=man:nginx(8)';
|
|
|
|
echo 'After=network.target nss-lookup.target';
|
|
|
|
echo ''
|
|
|
|
echo '[Service]';
|
|
|
|
echo 'Type=forking';
|
|
|
|
echo 'PIDFile=/run/nginx.pid';
|
|
|
|
echo "ExecStartPre=$(which nginx) -t -q -g 'daemon on; master_process on;'";
|
|
|
|
echo "ExecStart=$(which nginx) -g 'daemon on; master_process on;'";
|
|
|
|
echo "ExecReload=$(which nginx) -g 'daemon on; master_process on;' -s reload";
|
|
|
|
echo 'ExecStop=-/sbin/start-stop-daemon --quiet --stop --retry QUIT/5 --pidfile /run/nginx.pid';
|
|
|
|
echo 'TimeoutStopSec=5';
|
|
|
|
echo 'KillMode=mixed';
|
|
|
|
echo '';
|
|
|
|
echo '[Install]';
|
|
|
|
echo 'WantedBy=multi-user.target'; } > /etc/systemd/system/nginx.service
|
|
|
|
systemctl enable nginx
|
2020-06-18 19:17:40 +00:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
web_dir=/var/www
|
|
|
|
if [ -f /usr/bin/pacman ]; then
|
|
|
|
web_dir=/srv/http
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo "Creating nginx virtual host for http://${I2P_DOMAIN}"
|
2021-11-24 12:02:30 +00:00
|
|
|
{ echo 'server {';
|
2020-06-18 19:17:40 +00:00
|
|
|
echo " listen 127.0.0.1:${NGINX_PORT} default_server;";
|
|
|
|
echo " server_name ${I2P_DOMAIN};"
|
|
|
|
echo '';
|
|
|
|
echo ' gzip on;';
|
|
|
|
echo ' gzip_min_length 1000;';
|
|
|
|
echo ' gzip_proxied expired no-cache no-store private auth;';
|
2022-02-16 11:23:56 +00:00
|
|
|
echo ' gzip_types gzip_types text/plain text/css text/vcard text/vcard+xml application/json application/ld+json application/javascript text/xml application/xml application/rdf+xml application/xml+rss text/javascript;';
|
2020-06-18 19:17:40 +00:00
|
|
|
echo '';
|
|
|
|
echo ' add_header X-Content-Type-Options nosniff;';
|
|
|
|
echo ' add_header X-XSS-Protection "1; mode=block";';
|
|
|
|
echo ' add_header X-Download-Options noopen;';
|
|
|
|
echo ' add_header X-Permitted-Cross-Domain-Policies none;';
|
|
|
|
echo '';
|
|
|
|
echo ' access_log /dev/null;';
|
|
|
|
echo ' error_log /dev/null;';
|
|
|
|
echo '';
|
|
|
|
echo ' index index.html;';
|
2021-11-23 15:03:40 +00:00
|
|
|
echo '';
|
|
|
|
echo ' location /newsmirror {';
|
|
|
|
echo " root /var/www/${I2P_DOMAIN}/htdocs;";
|
|
|
|
echo ' try_files $uri =404;';
|
|
|
|
echo ' }';
|
|
|
|
echo '';
|
2020-06-18 19:17:40 +00:00
|
|
|
echo ' location / {';
|
2021-11-23 15:03:40 +00:00
|
|
|
echo ' proxy_http_version 1.1;';
|
|
|
|
echo ' client_max_body_size 31M;';
|
|
|
|
echo " proxy_set_header Host \$http_host;";
|
|
|
|
echo " proxy_set_header X-Real-IP \$remote_addr;";
|
|
|
|
echo " proxy_set_header X-Forward-For \$proxy_add_x_forwarded_for;";
|
|
|
|
echo ' proxy_set_header X-Forward-Proto http;';
|
|
|
|
echo ' proxy_set_header X-Nginx-Proxy true;';
|
|
|
|
echo ' proxy_temp_file_write_size 64k;';
|
|
|
|
echo ' proxy_connect_timeout 10080s;';
|
|
|
|
echo ' proxy_send_timeout 10080;';
|
|
|
|
echo ' proxy_read_timeout 10080;';
|
|
|
|
echo ' proxy_buffer_size 64k;';
|
|
|
|
echo ' proxy_buffers 16 32k;';
|
|
|
|
echo ' proxy_busy_buffers_size 64k;';
|
|
|
|
echo ' proxy_redirect off;';
|
|
|
|
echo ' proxy_request_buffering off;';
|
|
|
|
echo ' proxy_buffering off;';
|
|
|
|
echo " proxy_pass http://localhost:${EPICYON_PORT};";
|
|
|
|
echo ' tcp_nodelay on;';
|
2020-06-18 19:17:40 +00:00
|
|
|
echo ' }';
|
2020-06-19 12:34:35 +00:00
|
|
|
echo '}'; } > /etc/nginx/sites-available/epicyon-i2p
|
2020-06-18 19:17:40 +00:00
|
|
|
|
2020-06-19 12:34:35 +00:00
|
|
|
ln -s /etc/nginx/sites-available/epicyon-i2p /etc/nginx/sites-enabled/
|
2020-06-18 19:17:40 +00:00
|
|
|
systemctl restart nginx
|
|
|
|
|
2020-06-27 10:08:08 +00:00
|
|
|
# set up socks5 proxy for browser
|
|
|
|
{ echo 'dynamic_chain';
|
|
|
|
echo 'proxy_dns';
|
|
|
|
echo 'remote_dns_subnet 224';
|
|
|
|
echo 'tcp_read_time_out 15000';
|
|
|
|
echo 'tcp_connect_time_out 8000';
|
|
|
|
echo 'localnet 127.0.0.0/255.0.0.0';
|
|
|
|
echo '[ProxyList]';
|
|
|
|
echo 'http 127.0.0.1 4444';
|
2022-08-10 11:12:28 +00:00
|
|
|
echo 'socks5 127.0.0.1 4447'; } > /etc/proxychains.conf
|
2020-06-27 10:08:08 +00:00
|
|
|
|
2020-06-27 11:38:22 +00:00
|
|
|
# set up a desktop icon
|
|
|
|
for d in /home/*/ ; do
|
|
|
|
CURRUSER=$(echo "$d" | awk -F '/' '{print $3}')
|
|
|
|
if [ -d "/home/${CURRUSER}/Desktop" ]; then
|
2022-08-10 11:12:28 +00:00
|
|
|
{ echo '#!/usr/bin/env xdg-open';
|
|
|
|
echo '[Desktop Entry]';
|
|
|
|
echo 'Name=Epicyon I2P';
|
|
|
|
echo 'GenericName=P2P Social Network';
|
|
|
|
echo 'Comment=P2P Social Network';
|
|
|
|
echo "Exec=proxychains midori http://${I2P_DOMAIN}";
|
|
|
|
echo 'Icon=org.midori_browser.Midori';
|
|
|
|
echo 'Type=Application';
|
|
|
|
echo 'Terminal=false';
|
|
|
|
echo 'Categories=Internet;SocialNetwork;';
|
|
|
|
echo 'StartupWMClass=Epicyon';
|
|
|
|
echo 'Keywords=Epicyon;P2P;I2P;'; } > "/home/${CURRUSER}/Desktop/${username}.desktop"
|
|
|
|
chown "$CURRUSER":"$CURRUSER" "/home/${CURRUSER}/Desktop/${username}.desktop"
|
2020-06-27 11:38:22 +00:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
2020-06-27 10:08:08 +00:00
|
|
|
clear
|
2020-06-19 12:49:13 +00:00
|
|
|
echo -n "$I2P_DOMAIN" | qrencode -t ANSI
|
2020-06-27 10:08:08 +00:00
|
|
|
echo 'Your Epicyon i2p instance is now installed.'
|
|
|
|
echo ''
|
|
|
|
echo 'You can view it from the terminal with the command:'
|
|
|
|
echo ''
|
|
|
|
echo ' proxychains midori'
|
|
|
|
echo ''
|
|
|
|
echo 'If you prefer Firefox then see preferences/network settings, '
|
|
|
|
echo 'manual proxy and uncheck DNS over HTTPS. In about:config and '
|
|
|
|
echo 'find the property media.peerConnection.ice.proxy_only and set '
|
|
|
|
echo 'it to true. http should be proxied through 127.0.0.1 port 4444 '
|
|
|
|
echo 'and socks5 proxied through 127.0.0.1 port 4447.'
|
|
|
|
echo ''
|
|
|
|
echo "Navigate to http://${I2P_DOMAIN} and register an account."
|
|
|
|
|
2020-06-18 19:17:40 +00:00
|
|
|
exit 0
|