198,7 → 198,7 |
# On installe les paquetages complémentaires |
urpmi --auto $PACKAGES |
# On supprime les paquetages et les services inutiles |
for rm_rpm in avahi mandi shorewall-common shorewall libc-icap0 cyrus-sasl |
for rm_rpm in avahi mandi shorewall libc-icap0 cyrus-sasl |
do |
/usr/sbin/urpme --auto $rm_rpm |
done |
822,14 → 822,14 |
$SED "s?^HS_PROVIDER_LINK.*?HS_PROVIDER_LINK=https://\$HS_UAMSERVER/?g" /etc/chilli/config |
echo "HS_COAPORT=3799" >> /etc/chilli/config |
echo "HS_ADMINTERVAL=0" >> /etc/chilli/config |
cat <<EOF >> /etc/chilli/config |
# Usage d'un DHCPD externe a coova (dhcpd local ou extérieur) |
HS_USE_DHCPD_EXT="on" |
HS_DHCP_GATEWAY_IP=127.0.0.1 |
HS_DHCP_GATEWAY_PORT=67 |
HS_DHCP_RELAY_AGENT_IP=127.0.0.1 |
HS_USE_DHCP_RADIUS="no" |
EOF |
# cat <<EOF >> /etc/chilli/config |
## Usage d'un DHCPD externe a coova (dhcpd local ou extérieur) |
#HS_USE_DHCPD_EXT="on" |
#HS_DHCP_GATEWAY_IP=127.0.0.1 |
#HS_DHCP_GATEWAY_PORT=67 |
#HS_DHCP_RELAY_AGENT_IP=127.0.0.1 |
#HS_USE_DHCP_RADIUS="no" |
#EOF |
# création des fichiers de sites, d'urls et d'adresses MAC de confiance |
echo -e "HS_UAMALLOW=\"\"" > /etc/chilli/alcasar-uamallowed |
echo -e "HS_UAMDOMAINS=\"\"" > /etc/chilli/alcasar-uamdomain |
1042,15 → 1042,37 |
[ -d /etc/dnsmasq.d ] || mkdir /etc/dnsmasq.d |
[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq |
[ -e /etc/dnsmasq.conf ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default |
$SED "s?^[^#]?#&?g" /etc/dnsmasq.conf # (on commente ce qui ne l'est pas) |
cp -f $DIR_CONF/alcasar-dnsmasq.conf /etc/dnsmasq.d/. |
$SED "s?^#conf-dir=.*?conf-dir=/etc/dnsmasq.d?g" /etc/dnsmasq.conf # les fichiers de config se trouvent dans /etc/dnsmasq.d/* |
$SED "s?^domain=.*?domain=$DOMAIN?g" /etc/dnsmasq.d/alcasar-dnsmasq.conf |
$SED "s?^#listen-address=.*?listen-address=$PRIVATE_IP?g" /etc/dnsmasq.d/alcasar-dnsmasq.conf |
$SED "s?^#dhcp-range=.*?dhcp-range=$ORGANISME,$PRIVATE_DYN_FIRST_IP,$PRIVATE_DYN_LAST_IP,$PRIVATE_MASK,12h?g" /etc/dnsmasq.d/alcasar-dnsmasq.conf |
$SED "s?^#server=.*?server=$DNS1?g" /etc/dnsmasq.d/alcasar-dnsmasq.conf |
$SED "/^server=/a\server=$DNS2" /etc/dnsmasq.d/alcasar-dnsmasq.conf |
$SED "s?^DHCP_LEASE=.*?DHCP_LEASE=/var/log/dnsmasq/lease.log?g" /etc/sysconfig/dnsmasq |
$SED "s?^[^#]?#&?g" /etc/dnsmasq.conf # (on commente ce qui ne l'est pas) |
$SED "s?^#conf-dir=.*?conf-dir=/etc/dnsmasq.d?g" /etc/dnsmasq.conf # les fichiers de config se trouvent dans /etc/dnsmasq.d/* |
$SED "s?^DHCP_LEASE=.*?DHCP_LEASE=/var/log/dnsmasq/lease.log?g" /etc/sysconfig/dnsmasq # fichier contenant les baux |
# on crée le fichier de conf spécifique pour Alcasar |
cat << EOF > /etc/dnsmasq.d/alcasar-dnsmasq.conf |
# Inclusion de la blacklist <domains> de Toulouse dans la configuration |
conf-dir=/usr/local/etc/alcasar-dnsfilter-enabled |
|
listen-address=$PRIVATE_IP |
listen-address=127.0.0.1 |
no-dhcp-interfaces=$INTIF |
bind-interfaces |
|
cache-size=256 |
domain=$DOMAIN |
domain-needed |
expand-hosts |
bogus-priv |
filterwin2k |
server=$DNS1 |
server=$DNS2 |
|
dhcp-range=$ORGANISME,$PRIVATE_DYN_FIRST_IP,$PRIVATE_DYN_LAST_IP,$PRIVATE_MASK,12h |
#dhcp-option=3,1.2.3.4 |
#dhcp-option=option:router,1.2.3.4 |
#dhcp-option=42,0.0.0.0 |
#dhcp-option=option:ntp-server,192.168.0.4,10.10.0.5 |
|
# Exemple de configuration statique |
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.10.20,255.255.255.0,45m |
EOF |
mkdir /usr/local/etc/{alcasar-dnsfilter-available,alcasar-dnsfilter-enabled} |
chown -R 770 /usr/local/etc/{alcasar-dnsfilter-available,alcasar-dnsfilter-enabled} |
chown -R root:apache /usr/local/etc/{alcasar-dnsfilter-available,alcasar-dnsfilter-enabled} |