Installer.mk 8.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191
  1. SHELL := /bin/bash
  2. SERVER_NAME := $(shell bin/tcms-hostname)
  3. .PHONY: depend
  4. depend:
  5. [ -f "/etc/debian_version" ] && make -f Installer.mk prereq-debs; /bin/true;
  6. make -f Installer.mk prereq-perl prereq-frontend
  7. .PHONY: install
  8. install:
  9. test -d www/themes || mkdir -p www/themes
  10. test -d data/files || mkdir -p data/files
  11. test -d www/assets || mkdir -p www/assets
  12. test -d www/statics || mkdir -p www/statics
  13. test -d totp/ || mkdir -p totp
  14. test -d ~/.tcms || mkdir ~/.tcms
  15. test -d logs/ && mkdir -p logs/; /bin/true
  16. $(RM) pod2htmd.tmp;
  17. .PHONY: install-service
  18. install-service:
  19. mkdir -p ~/.config/systemd/user
  20. cp service-files/systemd.unit ~/.config/systemd/user/tCMS.service
  21. sed -ie 's#__REPLACEME__#$(shell pwd)#g' ~/.config/systemd/user/tCMS.service
  22. systemctl --user daemon-reload
  23. systemctl --user enable tCMS
  24. systemctl --user start tCMS
  25. loginctl enable-linger $(USER)
  26. .PHONY: prereq-debian
  27. prereq-debian: prereq-debs prereq-perl prereq-frontend prereq-node
  28. .PHONY: prereq-debs
  29. prereq-debs:
  30. sudo apt-get update
  31. sudo apt-get install -y sqlite3 nodejs npm libsqlite3-dev libdbd-sqlite3-perl cpanminus starman libxml2 curl cmake \
  32. uwsgi uwsgi-plugin-psgi fail2ban nginx certbot postfix dovecot-imapd dovecot-pop3d postgrey spamassassin amavis clamav\
  33. opendmarc opendkim opendkim-tools libunbound-dev \
  34. libtext-xslate-perl libplack-perl libconfig-tiny-perl libdatetime-format-http-perl libjson-maybexs-perl \
  35. libuuid-tiny-perl libcapture-tiny-perl libconfig-simple-perl libdbi-perl libfile-slurper-perl libfile-touch-perl \
  36. libfile-copy-recursive-perl libxml-rss-perl libmodule-install-perl libio-string-perl uuid-dev \
  37. libmoose-perl libmoosex-types-datetime-perl libxml-libxml-perl liblist-moreutils-perl libclone-perl libpath-tiny-perl \
  38. selinux-utils setools policycoreutils-python-utils policycoreutils selinux-basics auditd \
  39. pdns-tools pdns-server pdns-backend-sqlite3 libmagic-dev
  40. .PHONY: prereq-perl
  41. prereq-perl:
  42. sudo cpanm -n --installdeps .
  43. .PHONY: prereq-node
  44. prereq-node:
  45. npm i
  46. .PHONY: prereq-frontend
  47. prereq-frontend:
  48. mkdir -p www/scripts; pushd www/scripts && curl -L --remote-name-all \
  49. "https://raw.githubusercontent.com/chalda-pnuzig/emojis.json/master/dist/list.min.json" \
  50. "https://raw.githubusercontent.com/highlightjs/cdn-release/main/build/highlight.min.js" \
  51. "https://cdn.jsdelivr.net/npm/chart.js"; popd
  52. mkdir -p www/styles; cd www/styles && curl -L --remote-name-all \
  53. "https://raw.githubusercontent.com/highlightjs/cdn-release/main/build/styles/obsidian.min.css"
  54. .PHONY: reset
  55. reset: reset-remove install
  56. .PHONY: reset-remove
  57. reset-remove:
  58. rm -rf data; /bin/true
  59. rm -rf www/themes; /bin/true
  60. rm -rf www/assets; /bin/true
  61. rm config/auth.db; /bin/true
  62. rm config/main.cfg; /bin/true
  63. rm config/has_users; /bin/true
  64. rm config/setup; /bin/true
  65. .PHONY: fail2ban
  66. fail2ban:
  67. cp fail2ban/tcms-jail.tmpl fail2ban/tcms-jail.conf
  68. sed -i 's#__LOGDIR__#$(shell pwd)#g' fail2ban/tcms-jail.conf
  69. sed -i 's#__DOMAIN__#$(shell bin/tcms-hostname)#g' fail2ban/tcms-jail.conf
  70. sudo rm /etc/fail2ban/jail.d/$(shell bin/tcms-hostname).conf; /bin/true
  71. sudo rm /etc/fail2ban/filter.d/$(shell bin/tcms-hostname).conf; /bin/true
  72. sudo ln -sr fail2ban/tcms-jail.conf /etc/fail2ban/jail.d/$(shell bin/tcms-hostname).conf
  73. sudo ln -sr fail2ban/tcms-filter.conf /etc/fail2ban/filter.d/$(shell bin/tcms-hostname).conf
  74. sudo systemctl reload fail2ban
  75. .PHONY: nginx
  76. nginx:
  77. [ -n "$$SERVER_NAME" ] || ( echo "Please set the SERVER_NAME environment variable before running (e.g. test.test)" && /bin/false )
  78. sed 's/\%SERVER_NAME\%/$(SERVER_NAME)/g' nginx/tcms.conf.tmpl > nginx/tcms.conf.intermediate
  79. sed 's/\%SERVER_SOCK\%/$(shell pwd)/g' nginx/tcms.conf.intermediate > nginx/tcms.conf
  80. rm nginx/tcms.conf.intermediate
  81. mkdir run
  82. chown $(USER):www-data run
  83. chmod 0770 run
  84. sudo mkdir -p '/var/www/$(SERVER_NAME)'
  85. sudo mkdir -p '/var/www/mail.$(SERVER_NAME)'
  86. sudo mkdir -p '/etc/letsencrypt/live/$(SERVER_NAME)'
  87. [ -e "/etc/nginx/sites-enabled/$$SERVER_NAME.conf" ] && sudo rm "/etc/nginx/sites-enabled/$$SERVER_NAME.conf"; /bin/true
  88. sudo ln -sr nginx/tcms.conf '/etc/nginx/sites-enabled/$(SERVER_NAME).conf'
  89. # Make a self-signed cert FIRST, because certbot has a chicken/egg problem
  90. sudo openssl req -x509 -config etc/openssl.conf -nodes -newkey rsa:4096 -subj '/CN=$(SERVER_NAME)' -addext 'subjectAltName=DNS:www.$(SERVER_NAME),DNS:mail.$(SERVER_NAME)' -keyout '/etc/letsencrypt/live/$(SERVER_NAME)/privkey.pem' -out '/etc/letsencrypt/live/$(SERVER_NAME)/fullchain.pem' -days 365
  91. sudo systemctl reload nginx
  92. # Now run certbot and get that http dcv. We have to do a "gamer move" so that certbot doesn't complain about live dir existing.
  93. sudo rm -rf '/etc/letsencrypt/live/$(SERVER_NAME)'
  94. sudo certbot certonly --webroot -w '/var/www/$(SERVER_NAME)/' -d '$(SERVER_NAME)' -d 'www.$(SERVER_NAME)' -w '/var/www/mail.$(SERVER_NAME)' -d 'mail.$(SERVER_NAME)'
  95. sudo systemctl reload nginx
  96. .PHONY: mail
  97. mail: dkim dmarc
  98. # Dovecot
  99. sudo cp /etc/dovecot/conf.d/10-ssl.conf /etc/dovecot/conf.d/10-ssl.conf.orig
  100. sudo sed -i 's/^\(ssl_cert\s*=\).*/\1<\/etc\/letsencrypt\/live\/$(SERVER_NAME)\/fullchain.pem/g' /etc/dovecot/conf.d/10-ssl.conf
  101. sudo sed -i 's/^\(ssl_key\s*=\).*/\1\<\/etc\/letsencrypt\/live\/$(SERVER_NAME)\/privkey.pem/g' /etc/dovecot/conf.d/10-ssl.conf
  102. # Postfix
  103. sudo cp /etc/postfix/main.cf /etc/postfix/main.cf.orig
  104. sudo sed -i 's/^\(smtpd_tls_cert_file\s*=\).*/\1\/etc\/letsencrypt\/live\/$(SERVER_NAME)\/fullchain.pem/g' /etc/postfix/main.cf
  105. sudo sed -i 's/^\(smtpd_tls_key_file\s*=\).*/\1\/etc\/letsencrypt\/live\/$(SERVER_NAME)\/privkey.pem/g' /etc/postfix/main.cf
  106. # XXX we should not do these two.
  107. sudo sed -i 's/^\(myhostname\s*=\).*/\1$(SERVER_NAME)/g' /etc/postfix/main.cf
  108. sudo echo '$(SERVER_NAME)' > /etc/mailname
  109. # Configure postfix to put on its socks and shoes. This all implicitly relies on good defaults in the opendkim/opendmarc packages.
  110. sudo postconf -e milter_default_action=accept
  111. sudo postconf -e milter_protocol=2
  112. sudo postconf -e smtpd_milters=local:opendkim/opendkim.sock,local:opendmarc/opendmarc.sock
  113. sudo postconf -e non_smtpd_milters=\$smtpd_milters
  114. sudo service postfix reload
  115. # TODO setup various mail aliases and so forth, e.g. postmaster@, soa@, the various lists etc
  116. .PHONY: dkim
  117. dkim:
  118. sudo mkdir -p /etc/opendkim/keys/$(SERVER_NAME)
  119. sudo opendkim-genkey --directory /etc/opendkim/keys/$(SERVER_NAME) -s mail -d $(SERVER_NAME)
  120. sudo openssl rsa -in /etc/opendkim/keys/$(SERVER_NAME)/mail.private -pubout > /tmp/mail.public
  121. sudo mv /tmp/mail.public /etc/opendkim/keys/$(SERVER_NAME)/mail.public
  122. sudo chown -R opendkim:opendkim /etc/opendkim
  123. sudo mail/mongle_dkim_config $(SERVER_NAME)
  124. sudo service opendkim enable
  125. sudo service opendkim start
  126. .PHONY: dmarc
  127. dmarc:
  128. sudo mail/mongle_dmarc_config $(SERVER_NAME) mail.$(SERVER_NAME)
  129. sudo service opendmarc enable
  130. sudo service opendmarc start
  131. .PHONY: dns
  132. dns:
  133. cp dns/tcms.tmpl dns/tcms.conf
  134. sed -i 's#__DIR__#$(shell pwd)#g' dns/tcms.conf
  135. sed -i 's#__DOMAIN__#$(SERVER_NAME)#g' dns/tcms.conf
  136. [[ -e /etc/powerdns/pdns.d/$(SERVER_NAME).conf ]] && sudo rm /etc/powerdns/pdns.d/$(SERVER_NAME).conf
  137. sudo cp dns/tcms.conf /etc/powerdns/pdns.d/$(SERVER_NAME).conf
  138. sudo mkdir /etc/systemd/resolved.conf.d/; /bin/true
  139. sudo cp dns/10-disable-stub-resolver.conf /etc/systemd/resolved.conf.d/
  140. sudo chown -R systemd-resolve:systemd-resolve /etc/systemd/resolved.conf.d/
  141. sudo chmod 0660 /etc/systemd/resolved.conf.d/10-disable-stub-resolver.conf
  142. sudo systemctl restart systemd-resolved
  143. # Build the zone database and initialize the zone for our domain
  144. rm dns/zones.db; /bin/true
  145. sqlite3 dns/zones.db < /usr/share/pdns-backend-sqlite3/schema/schema.sqlite3.sql
  146. bin/build_zone > dns/default.zone
  147. zone2sql --gsqlite --zone=dns/default.zone --zone-name=$(SERVER_NAME) > dns/default.zone.sql
  148. sqlite3 dns/zones.db < dns/default.zone.sql
  149. # Bind mount our dns/ folder so that pdns can see it in chroot
  150. sudo mkdir /var/spool/powerdns/$(SERVER_NAME); /bin/true
  151. sudo chown pdns:pdns /var/spool/powerdns/$(SERVER_NAME); /bin/true
  152. sudo cp /etc/fstab /tmp/fstab.new
  153. sudo chown $(USER) /tmp/fstab.new
  154. echo "$(shell pwd)/dns /var/spool/powerdns/$(SERVER_NAME) none defaults,bind 0 0" >> /tmp/fstab.new
  155. sort < /tmp/fstab.new | uniq | grep -o '^[^#]*' > /tmp/fstab.new
  156. sudo chown root:root /tmp/fstab.new
  157. sudo mv /etc/fstab /etc/fstab.bak
  158. sudo mv /tmp/fstab.new /etc/fstab
  159. sudo mount /var/spool/powerdns/$(SERVER_NAME)
  160. # Don't need no bind
  161. [[ -e /etc/powerdns/pdns.d/bind.conf ]] && sudo rm /etc/powerdns/pdns.d/bind.conf
  162. # Fix broken service configuration
  163. sudo bin/configure_pdns
  164. sudo cp dns/10-powerdns.conf /etc/rsyslog.d/10-powerdns.conf
  165. sudo systemctl daemon-reload
  166. sudo service rsyslog restart
  167. sudo service pdns enable
  168. sudo service pdns start
  169. .PHONY: githook
  170. githook:
  171. cp git-hooks/pre-commit .git/hooks
  172. .PHONY: all
  173. all: prereq-debian install fail2ban nginx mail dns githook