mirror of https://gitlab.com/bashrc2/epicyon
454 lines
16 KiB
Bash
Executable File
454 lines
16 KiB
Bash
Executable File
#!/bin/bash
|
|
|
|
install_destination=/opt/epicyon-i2p
|
|
username='epicyon-i2p'
|
|
|
|
if [[ "$1" == 'remove' ]]; then
|
|
echo 'Removing Epicyon i2p instance'
|
|
systemctl stop i2pd
|
|
if [ -f /var/lib/i2pd/tunnels.d/epicyon ]; then
|
|
rm /var/lib/i2pd/tunnels.d/epicyon
|
|
fi
|
|
if [ -f /etc/i2pd/tunnels.conf.d/epicyon ]; then
|
|
rm /etc/i2pd/tunnels.conf.d/epicyon
|
|
fi
|
|
rm /var/lib/i2pd/epicyon.dat
|
|
systemctl restart i2pd
|
|
|
|
systemctl stop "${username}.service"
|
|
systemctl disable "${username}.service"
|
|
rm "/etc/nginx/sites-enabled/${username}"
|
|
rm "/etc/nginx/sites-availale/${username}"
|
|
rm -rf ${install_destination}
|
|
if [ -d /var/www/cache ]; then
|
|
rm -rf /var/www/cache
|
|
fi
|
|
if [ -d /srv/http/cache ]; then
|
|
rm -rf /srv/http/cache
|
|
fi
|
|
userdel -r ${username}
|
|
echo 'Epicyon i2p instance removed'
|
|
exit 0
|
|
fi
|
|
|
|
if [[ "$1" == 'removei2p' ]]; then
|
|
if [ -f /usr/bin/pacman ]; then
|
|
pacman -R --noconfirm i2pd
|
|
else
|
|
apt-get -y remove --purge i2pd
|
|
fi
|
|
rm -rf /etc/i2pd
|
|
rm -rf /var/lib/i2pd
|
|
if [ -f /var/log/i2pd/i2pd.log ]; then
|
|
rm /var/log/i2pd/i2pd.log
|
|
fi
|
|
fi
|
|
|
|
clear
|
|
echo 'Installing Epicyon on an i2p domain'
|
|
|
|
NGINX_PORT=9554
|
|
EPICYON_PORT=7158
|
|
tunnels_dir=/var/lib/i2pd/tunnels.d
|
|
|
|
# if proxychains already exists then make a copy of the
|
|
# older config
|
|
if [ -f /etc/proxychains.conf ]; then
|
|
mv /etc/proxychains.conf /etc/proxychains.conf.old
|
|
fi
|
|
|
|
echo 'Adding Epicyon dependencies'
|
|
if [ -f /usr/bin/pacman ]; then
|
|
pacman -Syy
|
|
pacman -S --noconfirm python-pip python-pysocks python-pycryptodome \
|
|
imagemagick python-pillow python-requests \
|
|
perl-image-exiftool python-numpy python-dateutil \
|
|
certbot flake8 git i2pd wget qrencode \
|
|
proxychains midori bandit
|
|
pip3 install pyLD pyqrcode pypng
|
|
else
|
|
apt-get update
|
|
apt-get -y install imagemagick python3-crypto python3-pycryptodome \
|
|
python3-dateutil python3-idna python3-requests \
|
|
python3-numpy python3-pil.imagetk python3-pip \
|
|
python3-setuptools python3-socks python3-idna \
|
|
libimage-exiftool-perl python3-flake8 python3-pyld \
|
|
python3-django-timezone-field nginx git i2pd wget \
|
|
python3-pyqrcode qrencode python3-png \
|
|
proxychains midori python3-bandit
|
|
fi
|
|
|
|
if [ ! -d /etc/i2pd ]; then
|
|
echo 'i2pd was not installed'
|
|
exit 5
|
|
fi
|
|
|
|
echo 'Cloning the epicyon repo'
|
|
if [ ! -d ${install_destination} ]; then
|
|
git clone https://gitlab.com/bashrc2/epicyon ${install_destination}
|
|
|
|
if [ ! -d ${install_destination} ]; then
|
|
echo 'Epicyon repo failed to clone'
|
|
exit 3
|
|
fi
|
|
fi
|
|
|
|
echo 'Adding an epicyon system user account'
|
|
if [ -f /usr/bin/pacman ]; then
|
|
groupadd ${username}
|
|
useradd --system -g ${username} --home-dir=${install_destination} $username
|
|
groupadd www-data
|
|
useradd --system -g www-data --home-dir=/srv/http www-data
|
|
else
|
|
adduser --system --home=${install_destination} --group $username
|
|
fi
|
|
|
|
chown -R ${username}:${username} ${install_destination}
|
|
|
|
echo 'Creating a command script to obtain i2p domain names from dat files'
|
|
{ echo '#!/bin/bash';
|
|
echo "tunnelname=\"\$1\"";
|
|
echo 'domainfile=/tmp/i2pdomain.txt';
|
|
echo "if [ -f \${domainfile} ]; then";
|
|
echo " rm \${domainfile}";
|
|
echo 'fi';
|
|
echo "wget http://127.0.0.1:7070/?page=i2p_tunnels -O \${domainfile} 2> /dev/null";
|
|
echo "if [ ! -f \${domainfile} ]; then";
|
|
echo ' exit 9';
|
|
echo 'fi';
|
|
echo "awk -F \">\${tunnelname}<\" '{print \$2}' < \${domainfile} | awk -F ';' '{print \$2}' | awk -F ':' '{print \$1}' | tr -d '[:space:]'";
|
|
echo "rm \${domainfile}"; } > /usr/bin/i2pdomain
|
|
chmod +x /usr/bin/i2pdomain
|
|
|
|
echo 'Creating Epicyon i2p tunnel file'
|
|
if [ ! -d "$tunnels_dir" ]; then
|
|
ln -s /etc/i2pd/tunnels.conf.d /var/lib/i2pd/tunnels.d
|
|
fi
|
|
|
|
if ! grep -q 'epicyon.dat' /var/lib/i2pd/tunnels.conf; then
|
|
{ echo '';
|
|
echo '[epicyon]';
|
|
echo 'type = http';
|
|
echo 'host = 127.0.0.1';
|
|
echo 'inport = 80';
|
|
echo "port = ${NGINX_PORT}";
|
|
echo 'inbound.length = 1';
|
|
echo 'inbound.quantity = 5';
|
|
echo 'outbound.length = 1';
|
|
echo 'outbound.quantity = 5';
|
|
echo "keys = epicyon.dat"; } >> /var/lib/i2pd/tunnels.conf
|
|
fi
|
|
rm "$tunnels_dir"/*~
|
|
|
|
echo 'Setting i2p tunnels directory'
|
|
sed -i 's|#tunnelsdir =|tunnelsdir =|g' /etc/i2pd/i2pd.conf
|
|
sed -i 's|# tunnelsdir =|tunnelsdir =|g' /etc/i2pd/i2pd.conf
|
|
sed -i "s|tunnelsdir =.*|tunnelsdir = $tunnels_dir|g" /etc/i2pd/i2pd.conf
|
|
|
|
echo 'Enabling ipv6'
|
|
if [ -f /etc/sysctl.conf ]; then
|
|
if grep -q 'net.ipv6.conf.all.disable_ipv6' /etc/sysctl.conf; then
|
|
sed -i 's|net.ipv6.conf.all.disable_ipv6.*|net.ipv6.conf.all.disable_ipv6 = 0|g' /etc/sysctl.conf
|
|
/sbin/sysctl -p -q
|
|
fi
|
|
fi
|
|
sed -i 's|#ipv6 =|ipv6 =|g' /etc/i2pd/i2pd.conf
|
|
sed -i 's|# ipv6 =|ipv6 =|g' /etc/i2pd/i2pd.conf
|
|
sed -i 's|ipv6 =.*|ipv6 = true|g' /etc/i2pd/i2pd.conf
|
|
|
|
echo 'Disabling i2p logging'
|
|
sed -i 's|#logfile =|logfile =|g' /etc/i2pd/i2pd.conf
|
|
sed -i 's|# logfile =|logfile =|g' /etc/i2pd/i2pd.conf
|
|
sed -i 's|logfile =.*|logfile = /dev/null|g' /etc/i2pd/i2pd.conf
|
|
|
|
echo 'Enabling i2p NAT traversal'
|
|
sed -i 's|#nat =|nat =|g' /etc/i2pd/i2pd.conf
|
|
sed -i 's|# nat =|nat =|g' /etc/i2pd/i2pd.conf
|
|
sed -i 's|nat =.*|nat = true|g' /etc/i2pd/i2pd.conf
|
|
|
|
if [ ! -d /run/i2pd ]; then
|
|
mkdir /run/i2pd
|
|
fi
|
|
chown -R i2pd:i2pd /run/i2pd
|
|
|
|
#if [ -f /usr/bin/pacman ]; then
|
|
# sed -i 's|ExecStart=.*|ExecStart=/usr/sbin/i2pd --conf=/etc/i2pd/i2pd.conf --tunconf=/etc/i2pd/tunnels.conf --tunnelsdir=/etc/i2pd/tunnels.conf.d --service|g' /lib/systemd/system/i2pd.service
|
|
# sed -i 's|Type=.*|Type=simple|g' /lib/systemd/system/i2pd.service
|
|
#fi
|
|
|
|
echo 'Setting file permissions'
|
|
chown -R i2pd:i2pd "$tunnels_dir"
|
|
chmod 644 "$tunnels_dir"/*
|
|
chmod 755 "$tunnels_dir"
|
|
# chown -R i2pd:i2pd /etc/i2pd
|
|
systemctl daemon-reload
|
|
systemctl enable i2pd
|
|
systemctl restart i2pd
|
|
|
|
echo 'Waiting for i2p daemon restart'
|
|
sleep 5
|
|
if [ ! -f /var/lib/i2pd/epicyon.dat ]; then
|
|
echo 'Waiting for i2p daemon restart...'
|
|
sleep 5
|
|
fi
|
|
|
|
if [ ! -f /var/lib/i2pd/epicyon.dat ]; then
|
|
echo '/var/lib/i2pd/epicyon.dat not created'
|
|
exit 6
|
|
fi
|
|
|
|
echo '/var/lib/i2pd/epicyon.dat file was created'
|
|
|
|
I2P_DOMAIN=$(i2pdomain epicyon)
|
|
if [[ "$I2P_DOMAIN" != *'.i2p' ]]; then
|
|
echo 'Epicyon i2p domain not created'
|
|
echo "$I2P_DOMAIN"
|
|
exit 1
|
|
fi
|
|
|
|
echo "i2p domain: http://${I2P_DOMAIN}"
|
|
|
|
echo 'Creating Epicyon daemon'
|
|
{ echo '[Unit]';
|
|
echo "Description=$username";
|
|
echo 'After=syslog.target';
|
|
echo 'After=network.target';
|
|
echo '';
|
|
echo '[Service]';
|
|
echo 'Type=simple';
|
|
echo "User=$username";
|
|
echo "Group=$username";
|
|
echo "WorkingDirectory=${install_destination}";
|
|
echo "ExecStart=/usr/bin/python3 ${install_destination}/epicyon.py --http --i2p --port 80 --proxy ${EPICYON_PORT} --domain ${I2P_DOMAIN} --registration open";
|
|
echo "Environment=USER=$username";
|
|
echo 'Environment=PYTHONUNBUFFERED=true';
|
|
echo 'Restart=always';
|
|
echo 'StandardError=syslog';
|
|
echo '';
|
|
echo '[Install]';
|
|
echo 'WantedBy=multi-user.target'; } > "/etc/systemd/system/${username}.service"
|
|
|
|
systemctl daemon-reload
|
|
systemctl enable "${username}.service"
|
|
systemctl restart "${username}.service"
|
|
|
|
echo 'Creating nginx configuration'
|
|
if [ ! -f /etc/nginx/nginx.conf ]; then
|
|
{ echo 'user www-data;';
|
|
echo 'pid /run/nginx.pid;';
|
|
echo '';
|
|
echo 'events {';
|
|
echo ' worker_connections 50;';
|
|
echo ' # multi_accept on;';
|
|
echo '}';
|
|
echo '';
|
|
echo 'http {';
|
|
echo ' # limit the number of connections per single IP';
|
|
echo " limit_conn_zone \$binary_remote_addr zone=conn_limit_per_ip:10m;";
|
|
echo '';
|
|
echo ' # limit the number of requests for a given session';
|
|
echo " limit_req_zone \$binary_remote_addr zone=req_limit_per_ip:10m rate=140r/s;";
|
|
echo '';
|
|
echo ' # if the request body size is more than the buffer size, then the entire (or partial) request body is written into a temporary file';
|
|
echo ' client_body_buffer_size 128k;';
|
|
echo '';
|
|
echo ' # headerbuffer size for the request header from client, its set for testing purpose';
|
|
echo ' client_header_buffer_size 3m;';
|
|
echo '';
|
|
echo ' # maximum number and size of buffers for large headers to read from client request';
|
|
echo ' large_client_header_buffers 4 256k;';
|
|
echo '';
|
|
echo ' # read timeout for the request body from client, its set for testing purpose';
|
|
echo ' client_body_timeout 3m;';
|
|
echo '';
|
|
echo ' # how long to wait for the client to send a request header, its set for testing purpose';
|
|
echo ' client_header_timeout 3m;';
|
|
echo '';
|
|
echo ' sendfile on;';
|
|
echo ' tcp_nopush on;';
|
|
echo ' tcp_nodelay on;';
|
|
echo ' keepalive_timeout 65;';
|
|
echo ' types_hash_max_size 2048;';
|
|
echo ' server_tokens off;';
|
|
echo '';
|
|
echo ' include /etc/nginx/mime.types;';
|
|
echo ' default_type application/octet-stream;';
|
|
echo '';
|
|
echo ' access_log /dev/null;';
|
|
echo ' error_log /dev/null;';
|
|
echo '';
|
|
echo ' gzip on;';
|
|
echo ' gzip_disable "msie6";';
|
|
echo '';
|
|
echo ' include /etc/nginx/conf.d/*.conf;';
|
|
echo ' include /etc/nginx/sites-enabled/*;';
|
|
echo '}'; } > /etc/nginx/nginx.conf
|
|
else
|
|
if ! grep -q 'include /etc/nginx/sites-enabled' /etc/nginx/nginx.conf; then
|
|
echo 'include /etc/nginx/sites-enabled/*.conf;' >> /etc/nginx/nginx.conf
|
|
fi
|
|
fi
|
|
if [ ! -d /etc/nginx/conf.d ]; then
|
|
mkdir /etc/nginx/conf.d
|
|
fi
|
|
if [ ! -d /etc/nginx/sites-available ]; then
|
|
mkdir /etc/nginx/sites-available
|
|
fi
|
|
if [ ! -d /etc/nginx/sites-enabled ]; then
|
|
mkdir /etc/nginx/sites-enabled
|
|
fi
|
|
|
|
if [ -f /usr/bin/pacman ]; then
|
|
if [ ! -f /lib/systemd/system/nginx.service ]; then
|
|
echo 'Creating nginx daemon'
|
|
{ echo '[Unit]';
|
|
echo 'Description=A high performance web server and a reverse proxy server';
|
|
echo 'Documentation=man:nginx(8)';
|
|
echo 'After=network.target nss-lookup.target';
|
|
echo ''
|
|
echo '[Service]';
|
|
echo 'Type=forking';
|
|
echo 'PIDFile=/run/nginx.pid';
|
|
echo "ExecStartPre=$(which nginx) -t -q -g 'daemon on; master_process on;'";
|
|
echo "ExecStart=$(which nginx) -g 'daemon on; master_process on;'";
|
|
echo "ExecReload=$(which nginx) -g 'daemon on; master_process on;' -s reload";
|
|
echo 'ExecStop=-/sbin/start-stop-daemon --quiet --stop --retry QUIT/5 --pidfile /run/nginx.pid';
|
|
echo 'TimeoutStopSec=5';
|
|
echo 'KillMode=mixed';
|
|
echo '';
|
|
echo '[Install]';
|
|
echo 'WantedBy=multi-user.target'; } > /etc/systemd/system/nginx.service
|
|
systemctl enable nginx
|
|
fi
|
|
fi
|
|
|
|
web_dir=/var/www
|
|
if [ -f /usr/bin/pacman ]; then
|
|
web_dir=/srv/http
|
|
fi
|
|
if [ ! -d ${web_dir}/cache ]; then
|
|
mkdir ${web_dir}/cache
|
|
fi
|
|
|
|
echo "Creating nginx virtual host for http://${I2P_DOMAIN}"
|
|
{ echo "proxy_cache_path ${web_dir}/cache levels=1:2 keys_zone=my_cache:10m max_size=10g";
|
|
echo ' inactive=60m use_temp_path=off;'
|
|
echo '';
|
|
echo 'server {';
|
|
echo " listen 127.0.0.1:${NGINX_PORT} default_server;";
|
|
echo " server_name ${I2P_DOMAIN};"
|
|
echo '';
|
|
echo ' gzip on;';
|
|
echo ' gzip_min_length 1000;';
|
|
echo ' gzip_proxied expired no-cache no-store private auth;';
|
|
echo ' gzip_types text/plain application/xml;';
|
|
echo '';
|
|
echo ' add_header X-Content-Type-Options nosniff;';
|
|
echo ' add_header X-XSS-Protection "1; mode=block";';
|
|
echo ' add_header X-Download-Options noopen;';
|
|
echo ' add_header X-Permitted-Cross-Domain-Policies none;';
|
|
echo '';
|
|
echo ' access_log /dev/null;';
|
|
echo ' error_log /dev/null;';
|
|
echo '';
|
|
echo ' index index.html;';
|
|
echo ' location / {';
|
|
echo ' proxy_http_version 1.1;';
|
|
echo ' client_max_body_size 31M;';
|
|
echo " proxy_hide_header Upgrade;";
|
|
echo ' proxy_hide_header Connection;';
|
|
echo " proxy_set_header Host \$http_host;";
|
|
echo " proxy_set_header X-Real-IP \$remote_addr;";
|
|
echo " proxy_set_header X-Forward-For \$proxy_add_x_forwarded_for;";
|
|
echo ' proxy_set_header X-Forward-Proto http;';
|
|
echo ' proxy_set_header X-Nginx-Proxy true;';
|
|
echo ' proxy_set_header Upgrade-Insecure-Requests false;';
|
|
echo ' expires epoch;';
|
|
echo ' proxy_no_cache 1;';
|
|
echo ' proxy_temp_file_write_size 64k;';
|
|
echo ' proxy_connect_timeout 10080s;';
|
|
echo ' proxy_send_timeout 10080;';
|
|
echo ' proxy_read_timeout 10080;';
|
|
echo ' proxy_buffer_size 64k;';
|
|
echo ' proxy_buffers 16 32k;';
|
|
echo ' proxy_busy_buffers_size 64k;';
|
|
echo ' proxy_redirect off;';
|
|
echo ' proxy_request_buffering off;';
|
|
echo ' proxy_buffering on;';
|
|
echo ' proxy_cache my_cache;';
|
|
echo ' proxy_cache_use_stale error timeout http_500 http_502 http_503 http_504;';
|
|
echo " location ~ ^/(icons|images|media|emoji)/(.*)/(.*).(png|jpg|gif|webp|mp3|ogv|ogg|mp4) {";
|
|
echo ' expires 7d;';
|
|
echo " proxy_pass http://localhost:${EPICYON_PORT};";
|
|
echo ' }';
|
|
echo " location ~ ^/icons/(.*)/(like|repeat|calendar)(.*).(png|jpg|gif|webp|mp3|ogv|ogg|mp4) {";
|
|
echo ' expires epoch;';
|
|
echo ' proxy_no_cache 1;';
|
|
echo " proxy_pass http://localhost:${EPICYON_PORT};";
|
|
echo ' }';
|
|
echo " location ~ ^/icons/(like|repeat|calendar)(.*).(png|jpg|gif|webp|mp3|ogv|ogg|mp4) {";
|
|
echo ' expires epoch;';
|
|
echo ' proxy_no_cache 1;';
|
|
echo " proxy_pass http://localhost:${EPICYON_PORT};";
|
|
echo ' }';
|
|
echo " location ~ ^/users/(.*)/(image|banner).(png|jpg|gif|webp|mp3|ogv|ogg|mp4) {";
|
|
echo ' expires epoch;';
|
|
echo ' proxy_no_cache 1;';
|
|
echo " proxy_pass http://localhost:${EPICYON_PORT};";
|
|
echo ' }';
|
|
echo " proxy_pass http://localhost:${EPICYON_PORT};";
|
|
echo ' }';
|
|
echo '}'; } > /etc/nginx/sites-available/epicyon-i2p
|
|
|
|
ln -s /etc/nginx/sites-available/epicyon-i2p /etc/nginx/sites-enabled/
|
|
systemctl restart nginx
|
|
|
|
# set up socks5 proxy for browser
|
|
{ echo 'dynamic_chain';
|
|
echo 'proxy_dns';
|
|
echo 'remote_dns_subnet 224';
|
|
echo 'tcp_read_time_out 15000';
|
|
echo 'tcp_connect_time_out 8000';
|
|
echo 'localnet 127.0.0.0/255.0.0.0';
|
|
echo '[ProxyList]';
|
|
echo 'http 127.0.0.1 4444';
|
|
echo 'socks5 127.0.0.1 4447'; } > /etc/proxychains.conf
|
|
|
|
# set up a desktop icon
|
|
for d in /home/*/ ; do
|
|
CURRUSER=$(echo "$d" | awk -F '/' '{print $3}')
|
|
if [ -d "/home/${CURRUSER}/Desktop" ]; then
|
|
{ echo '#!/usr/bin/env xdg-open';
|
|
echo '[Desktop Entry]';
|
|
echo 'Name=Epicyon I2P';
|
|
echo 'GenericName=P2P Social Network';
|
|
echo 'Comment=P2P Social Network';
|
|
echo "Exec=proxychains midori http://${I2P_DOMAIN}";
|
|
echo 'Icon=org.midori_browser.Midori';
|
|
echo 'Type=Application';
|
|
echo 'Terminal=false';
|
|
echo 'Categories=Internet;SocialNetwork;';
|
|
echo 'StartupWMClass=Epicyon';
|
|
echo 'Keywords=Epicyon;P2P;I2P;'; } > "/home/${CURRUSER}/Desktop/${username}.desktop"
|
|
chown "$CURRUSER":"$CURRUSER" "/home/${CURRUSER}/Desktop/${username}.desktop"
|
|
fi
|
|
done
|
|
|
|
clear
|
|
echo -n "$I2P_DOMAIN" | qrencode -t ANSI
|
|
echo 'Your Epicyon i2p instance is now installed.'
|
|
echo ''
|
|
echo 'You can view it from the terminal with the command:'
|
|
echo ''
|
|
echo ' proxychains midori'
|
|
echo ''
|
|
echo 'If you prefer Firefox then see preferences/network settings, '
|
|
echo 'manual proxy and uncheck DNS over HTTPS. In about:config and '
|
|
echo 'find the property media.peerConnection.ice.proxy_only and set '
|
|
echo 'it to true. http should be proxied through 127.0.0.1 port 4444 '
|
|
echo 'and socks5 proxied through 127.0.0.1 port 4447.'
|
|
echo ''
|
|
echo "Navigate to http://${I2P_DOMAIN} and register an account."
|
|
|
|
exit 0
|