1285,9 → 1285,11 |
[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default |
echo "# Whitelist youtube flow" >> /etc/havp/whitelist |
echo "*.youtube.com/*" >> /etc/havp/whitelist |
# replacement of init script |
# adapt init script and systemd unit |
[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default |
cp -f $DIR_CONF/havp-init /etc/init.d/havp |
$SED "/^PIDFile/i ExecStartPre=/bin/mkdir /var/run/havp" /lib/systemd/system/havp.service |
$SED "/^PIDFile/i ExecStartPre=/bin/chown -R havp:havp /var/run/havp /var/log/havp" /lib/systemd/system/havp.service |
# replace of the intercept page (template) |
cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html |
cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html |
1328,6 → 1330,7 |
$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf # Only errors are logged |
$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf # forward to HAVP |
$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf # Stealth mode |
$SED "s?^Allow.*?Allow $PRIVATE_NETWORK_MASK?g" /etc/tinyproxy/tinyproxy.conf # Allow from LAN |
# Create the systemd unit |
cat << EOF > /lib/systemd/system/tinyproxy.service |
# This file is part of systemd. |
1447,7 → 1450,7 |
tar xzf /tmp/SURFmap_v3.3.1.tar.gz -C /tmp/ |
cd /tmp/ |
/usr/bin/sh SURFmap/install.sh |
chown -R apache:apache /var/www/html/acc/manager/nfsen |
chown -R apache:apache /var/www/html/acc/manager/nfsen /usr/share/nfsen |
# clear the installation |
cd $DirTmp |
rm -rf /tmp/nfsen* |
2038,6 → 2041,7 |
-i | --install) |
header_install |
license |
header_install |
testing |
# RPMs install |
$DIR_SCRIPTS/alcasar-urpmi.sh |