|
|
|
@ -0,0 +1,204 @@ |
|
|
|
|
#!/usr/bin/env bash |
|
|
|
|
if [ "$VERBOSE" == "yes" ]; then set -x; fi |
|
|
|
|
YW=$(echo "\033[33m") |
|
|
|
|
RD=$(echo "\033[01;31m") |
|
|
|
|
BL=$(echo "\033[36m") |
|
|
|
|
GN=$(echo "\033[1;92m") |
|
|
|
|
CL=$(echo "\033[m") |
|
|
|
|
RETRY_NUM=10 |
|
|
|
|
RETRY_EVERY=3 |
|
|
|
|
NUM=$RETRY_NUM |
|
|
|
|
CM="${GN}✓${CL}" |
|
|
|
|
CROSS="${RD}✗${CL}" |
|
|
|
|
BFR="\\r\\033[K" |
|
|
|
|
HOLD="-" |
|
|
|
|
set -o errexit |
|
|
|
|
set -o errtrace |
|
|
|
|
set -o nounset |
|
|
|
|
set -o pipefail |
|
|
|
|
shopt -s expand_aliases |
|
|
|
|
alias die='EXIT=$? LINE=$LINENO error_exit' |
|
|
|
|
trap die ERR |
|
|
|
|
silent() { "$@" > /dev/null 2>&1; } |
|
|
|
|
function error_exit() { |
|
|
|
|
trap - ERR |
|
|
|
|
local reason="Unknown failure occurred." |
|
|
|
|
local msg="${1:-$reason}" |
|
|
|
|
local flag="${RD}‼ ERROR ${CL}$EXIT@$LINE" |
|
|
|
|
echo -e "$flag $msg" 1>&2 |
|
|
|
|
exit $EXIT |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
function msg_info() { |
|
|
|
|
local msg="$1" |
|
|
|
|
echo -ne " ${HOLD} ${YW}${msg}..." |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
function msg_ok() { |
|
|
|
|
local msg="$1" |
|
|
|
|
echo -e "${BFR} ${CM} ${GN}${msg}${CL}" |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
function msg_error() { |
|
|
|
|
local msg="$1" |
|
|
|
|
echo -e "${BFR} ${CROSS} ${RD}${msg}${CL}" |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
msg_info "Setting up Container OS " |
|
|
|
|
sed -i "/$LANG/ s/\(^# \)//" /etc/locale.gen |
|
|
|
|
locale-gen >/dev/null |
|
|
|
|
while [ "$(hostname -I)" = "" ]; do |
|
|
|
|
echo 1>&2 -en "${CROSS}${RD} No Network! " |
|
|
|
|
sleep $RETRY_EVERY |
|
|
|
|
((NUM--)) |
|
|
|
|
if [ $NUM -eq 0 ]; then |
|
|
|
|
echo 1>&2 -e "${CROSS}${RD} No Network After $RETRY_NUM Tries${CL}" |
|
|
|
|
exit 1 |
|
|
|
|
fi |
|
|
|
|
done |
|
|
|
|
msg_ok "Set up Container OS" |
|
|
|
|
msg_ok "Network Connected: ${BL}$(hostname -I)" |
|
|
|
|
|
|
|
|
|
set +e |
|
|
|
|
alias die='' |
|
|
|
|
if nc -zw1 8.8.8.8 443; then msg_ok "Internet Connected"; else |
|
|
|
|
msg_error "Internet NOT Connected" |
|
|
|
|
read -r -p "Would you like to continue anyway? <y/N> " prompt |
|
|
|
|
if [[ $prompt == "y" || $prompt == "Y" || $prompt == "yes" || $prompt == "Yes" ]]; then |
|
|
|
|
echo -e " ⚠️ ${RD}Expect Issues Without Internet${CL}" |
|
|
|
|
else |
|
|
|
|
echo -e " 🖧 Check Network Settings" |
|
|
|
|
exit 1 |
|
|
|
|
fi |
|
|
|
|
fi |
|
|
|
|
RESOLVEDIP=$(nslookup "github.com" | awk -F':' '/^Address: / { matched = 1 } matched { print $2}' | xargs) |
|
|
|
|
if [[ -z "$RESOLVEDIP" ]]; then msg_error "DNS Lookup Failure"; else msg_ok "DNS Resolved github.com to $RESOLVEDIP"; fi |
|
|
|
|
alias die='EXIT=$? LINE=$LINENO error_exit' |
|
|
|
|
set -e |
|
|
|
|
|
|
|
|
|
msg_info "Updating Container OS" |
|
|
|
|
$STD apt-get update |
|
|
|
|
$STD apt-get -y upgrade |
|
|
|
|
msg_ok "Updated Container OS" |
|
|
|
|
|
|
|
|
|
msg_info "Installing Dependencies" |
|
|
|
|
$STD apt-get update |
|
|
|
|
$STD apt-get -qqy install \ |
|
|
|
|
git \ |
|
|
|
|
build-essential \ |
|
|
|
|
pkgconf \ |
|
|
|
|
libssl-dev \ |
|
|
|
|
libmariadb-dev-compat \ |
|
|
|
|
libpq-dev \ |
|
|
|
|
curl \ |
|
|
|
|
sudo |
|
|
|
|
msg_ok "Installed Dependencies" |
|
|
|
|
|
|
|
|
|
WEBVAULT=$(curl -s https://api.github.com/repos/dani-garcia/bw_web_builds/releases/latest | |
|
|
|
|
grep "tag_name" | |
|
|
|
|
awk '{print substr($2, 2, length($2)-3) }') |
|
|
|
|
|
|
|
|
|
VAULT=$(curl -s https://api.github.com/repos/dani-garcia/vaultwarden/releases/latest | |
|
|
|
|
grep "tag_name" | |
|
|
|
|
awk '{print substr($2, 2, length($2)-3) }') |
|
|
|
|
|
|
|
|
|
msg_info "Installing Rust" |
|
|
|
|
wget -qL https://sh.rustup.rs |
|
|
|
|
$STD bash index.html -y --profile minimal |
|
|
|
|
echo 'export PATH=~/.cargo/bin:$PATH' >>~/.bashrc |
|
|
|
|
export PATH=~/.cargo/bin:$PATH |
|
|
|
|
rm index.html |
|
|
|
|
msg_ok "Installed Rust" |
|
|
|
|
|
|
|
|
|
msg_info "Building Vaultwarden ${VAULT} (Patience)" |
|
|
|
|
$STD git clone https://github.com/dani-garcia/vaultwarden |
|
|
|
|
cd vaultwarden |
|
|
|
|
$STD cargo build --features "sqlite,mysql,postgresql" --release |
|
|
|
|
msg_ok "Built Vaultwarden ${VAULT}" |
|
|
|
|
|
|
|
|
|
$STD addgroup --system vaultwarden |
|
|
|
|
$STD adduser --system --home /opt/vaultwarden --shell /usr/sbin/nologin --no-create-home --gecos 'vaultwarden' --ingroup vaultwarden --disabled-login --disabled-password vaultwarden |
|
|
|
|
mkdir -p /opt/vaultwarden/bin |
|
|
|
|
mkdir -p /opt/vaultwarden/data |
|
|
|
|
cp target/release/vaultwarden /opt/vaultwarden/bin/ |
|
|
|
|
|
|
|
|
|
msg_info "Downloading Web-Vault ${WEBVAULT}" |
|
|
|
|
$STD curl -fsSLO https://github.com/dani-garcia/bw_web_builds/releases/download/$WEBVAULT/bw_web_$WEBVAULT.tar.gz |
|
|
|
|
$STD tar -xzf bw_web_$WEBVAULT.tar.gz -C /opt/vaultwarden/ |
|
|
|
|
msg_ok "Downloaded Web-Vault ${WEBVAULT}" |
|
|
|
|
|
|
|
|
|
cat <<EOF >/opt/vaultwarden/.env |
|
|
|
|
ADMIN_TOKEN=$(openssl rand -base64 48) |
|
|
|
|
ROCKET_ADDRESS=0.0.0.0 |
|
|
|
|
DATA_FOLDER=/opt/vaultwarden/data |
|
|
|
|
DATABASE_MAX_CONNS=10 |
|
|
|
|
WEB_VAULT_FOLDER=/opt/vaultwarden/web-vault |
|
|
|
|
WEB_VAULT_ENABLED=true |
|
|
|
|
EOF |
|
|
|
|
|
|
|
|
|
msg_info "Creating Service" |
|
|
|
|
chown -R vaultwarden:vaultwarden /opt/vaultwarden/ |
|
|
|
|
chown root:root /opt/vaultwarden/bin/vaultwarden |
|
|
|
|
chmod +x /opt/vaultwarden/bin/vaultwarden |
|
|
|
|
chown -R root:root /opt/vaultwarden/web-vault/ |
|
|
|
|
chmod +r /opt/vaultwarden/.env |
|
|
|
|
|
|
|
|
|
service_path="/etc/systemd/system/vaultwarden.service" |
|
|
|
|
echo "[Unit] |
|
|
|
|
Description=Bitwarden Server (Powered by Vaultwarden) |
|
|
|
|
Documentation=https://github.com/dani-garcia/vaultwarden |
|
|
|
|
After=network.target |
|
|
|
|
[Service] |
|
|
|
|
User=vaultwarden |
|
|
|
|
Group=vaultwarden |
|
|
|
|
EnvironmentFile=-/opt/vaultwarden/.env |
|
|
|
|
ExecStart=/opt/vaultwarden/bin/vaultwarden |
|
|
|
|
LimitNOFILE=65535 |
|
|
|
|
LimitNPROC=4096 |
|
|
|
|
PrivateTmp=true |
|
|
|
|
PrivateDevices=true |
|
|
|
|
ProtectHome=true |
|
|
|
|
ProtectSystem=strict |
|
|
|
|
DevicePolicy=closed |
|
|
|
|
ProtectControlGroups=yes |
|
|
|
|
ProtectKernelModules=yes |
|
|
|
|
ProtectKernelTunables=yes |
|
|
|
|
RestrictNamespaces=yes |
|
|
|
|
RestrictRealtime=yes |
|
|
|
|
MemoryDenyWriteExecute=yes |
|
|
|
|
LockPersonality=yes |
|
|
|
|
WorkingDirectory=/opt/vaultwarden |
|
|
|
|
ReadWriteDirectories=/opt/vaultwarden/data |
|
|
|
|
AmbientCapabilities=CAP_NET_BIND_SERVICE |
|
|
|
|
[Install] |
|
|
|
|
WantedBy=multi-user.target" >$service_path |
|
|
|
|
systemctl daemon-reload |
|
|
|
|
$STD systemctl enable --now vaultwarden.service |
|
|
|
|
msg_ok "Created Service" |
|
|
|
|
|
|
|
|
|
PASS=$(grep -w "root" /etc/shadow | cut -b6) |
|
|
|
|
if [[ $PASS != $ ]]; then |
|
|
|
|
msg_info "Customizing Container" |
|
|
|
|
rm /etc/motd |
|
|
|
|
rm /etc/update-motd.d/10-uname |
|
|
|
|
touch ~/.hushlogin |
|
|
|
|
GETTY_OVERRIDE="/etc/systemd/system/container-getty@1.service.d/override.conf" |
|
|
|
|
mkdir -p $(dirname $GETTY_OVERRIDE) |
|
|
|
|
cat <<EOF >$GETTY_OVERRIDE |
|
|
|
|
[Service] |
|
|
|
|
ExecStart= |
|
|
|
|
ExecStart=-/sbin/agetty --autologin root --noclear --keep-baud tty%I 115200,38400,9600 \$TERM |
|
|
|
|
EOF |
|
|
|
|
systemctl daemon-reload |
|
|
|
|
systemctl restart $(basename $(dirname $GETTY_OVERRIDE) | sed 's/\.d//') |
|
|
|
|
msg_ok "Customized Container" |
|
|
|
|
fi |
|
|
|
|
if [[ "${SSH_ROOT}" == "yes" ]]; then |
|
|
|
|
sed -i "s/#PermitRootLogin prohibit-password/PermitRootLogin yes/g" /etc/ssh/sshd_config |
|
|
|
|
systemctl restart sshd |
|
|
|
|
fi |
|
|
|
|
|
|
|
|
|
msg_info "Cleaning up" |
|
|
|
|
$STD apt-get autoremove |
|
|
|
|
$STD apt-get autoclean |
|
|
|
|
msg_ok "Cleaned" |