Line 1... |
Line 1... |
1 |
#!/bin/bash
|
1 |
#!/bin/bash
|
2 |
# $Id: alcasar-conf.sh 3283 2025-05-18 21:06:00Z rexy $
|
2 |
# $Id: alcasar-conf.sh 3285 2025-05-20 17:33:11Z rexy $
|
3 |
|
3 |
|
4 |
# alcasar-conf.sh
|
4 |
# alcasar-conf.sh
|
5 |
# by REXY
|
5 |
# by REXY
|
6 |
# This script is distributed under the Gnu General Public License (GPL)
|
6 |
# This script is distributed under the Gnu General Public License (GPL)
|
7 |
|
7 |
|
Line 348... |
Line 348... |
348 |
done < /tmp/hosts
|
348 |
done < /tmp/hosts
|
349 |
rm -f /tmp/hosts
|
349 |
rm -f /tmp/hosts
|
350 |
# MOTD
|
350 |
# MOTD
|
351 |
$SED "s@'https://\(.\+\)/acc'@'https://$HOSTNAME.$DOMAIN/acc'@" /etc/mageia-release
|
351 |
$SED "s@'https://\(.\+\)/acc'@'https://$HOSTNAME.$DOMAIN/acc'@" /etc/mageia-release
|
352 |
# httpd
|
352 |
# httpd
|
353 |
$SED "s/^ServerName.*/ServerName $HOSTNAME.$DOMAIN/g" /etc/httpd/conf/httpd.conf
|
353 |
$SED "s?^ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
|
354 |
$SED "s?^\tErrorDocument.*?\tErrorDocument 404 https://$HOSTNAME.$DOMAIN/?g" /etc/httpd/conf/webapps.d/alcasar.conf
|
354 |
$SED "s?^.*ErrorDocument.*? ErrorDocument 404 https://$HOSTNAME.$DOMAIN?g" /etc/httpd/conf/webapps.d/alcasar.conf
|
355 |
$SED "s?^\tAuthDigestDomain.*?\tAuthDigestDomain $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/webapps.d/alcasar.conf
|
355 |
$SED "s?^.*AuthDigestDomain.*? AuthDigestDomain $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/webapps.d/alcasar.conf
|
356 |
$SED "s/^ ServerName.*/ ServerName $HOSTNAME.$DOMAIN/g" /etc/httpd/conf/vhosts.d/00_default_vhosts.conf /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf
|
356 |
$SED "s?^ ServerName.*? ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/vhosts.d/00_default_vhosts.conf /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf
|
357 |
$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
|
357 |
$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
|
358 |
FIC_MOD_SSL=`find /etc/httpd/conf/ -type f -name ssl.conf`
|
358 |
FIC_MOD_SSL=`find /etc/httpd/conf/ -type f -name ssl.conf`
|
359 |
$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" $FIC_MOD_SSL
|
359 |
$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" $FIC_MOD_SSL
|
360 |
$SED "/127.0.0.1/!s?Allow from .*?Allow from $PRIVATE_NETWORK_MASK?g" /etc/httpd/conf/webapps.d/alcasar.conf
|
- |
|
361 |
$SED "/Allow from/d" /etc/httpd/conf/webapps.d/alcasar.conf
|
360 |
$SED "/Allow from/d" /etc/httpd/conf/webapps.d/alcasar.conf
|
- |
|
361 |
$SED "/Deny from all/a\ \tAllow from 127.0.0.1\n\tAllow from $PRIVATE_NETWORK_MASK" /etc/httpd/conf/webapps.d/alcasar.conf
|
362 |
if [ $(grep -c "^managerIPs=" $DIR_ETC/alcasar-iptables-local.sh) -eq 1 ] ;then
|
362 |
if [ $(grep -c "^managerIPs=" $DIR_ETC/alcasar-iptables-local.sh) -eq 1 ] ;then
|
363 |
grep "^managerIPs=" $DIR_ETC/alcasar-iptables-local.sh | cut -d "'" -f2 | sed "s/,/\n/g" | while read -r managerIP
|
363 |
grep "^managerIPs=" $DIR_ETC/alcasar-iptables-local.sh | cut -d "'" -f2 | sed "s/,/\n/g" | while read -r managerIP
|
364 |
do
|
364 |
do
|
365 |
$SED "/Deny from all/a\ \tAllow from $managerIP" /etc/httpd/conf/webapps.d/alcasar.conf
|
365 |
$SED "/Deny from all/a\ \tAllow from $managerIP" /etc/httpd/conf/webapps.d/alcasar.conf
|
366 |
done
|
366 |
done
|
367 |
fi
|
367 |
fi
|
368 |
$SED "/Deny from all/a\ \tAllow from 127.0.0.1\n\tAllow from $PRIVATE_NETWORK_MASK" /etc/httpd/conf/webapps.d/alcasar.conf
|
- |
|
369 |
# FreeRADIUS
|
368 |
# FreeRADIUS
|
370 |
$SED "s?^nas1_name:.*?nas1_name: alcasar-$ORGANISME?g" /etc/freeradius-web/naslist.conf
|
369 |
$SED "s?^nas1_name:.*?nas1_name: alcasar-$ORGANISME?g" /etc/freeradius-web/naslist.conf
|
371 |
$SED "s?^nas1_ip:.*?nas1_ip: $PRIVATE_IP?g" /etc/freeradius-web/naslist.conf
|
370 |
$SED "s?^nas1_ip:.*?nas1_ip: $PRIVATE_IP?g" /etc/freeradius-web/naslist.conf
|
372 |
# CoovaChilli
|
371 |
# CoovaChilli
|
373 |
$SED "s/^uamallowed.*/uamallowed\t$HOSTNAME,$HOSTNAME.$DOMAIN/g" /etc/chilli.conf
|
372 |
$SED "s?^uamallowed.*?uamallowed\t$HOSTNAME,$HOSTNAME.$DOMAIN?g" /etc/chilli.conf
|
374 |
$SED "s/^locationname.*/locationname\t$HOSTNAME.$DOMAIN/g" /etc/chilli.conf
|
373 |
$SED "s?^locationname.*?locationname\t$HOSTNAME.$DOMAIN?g" /etc/chilli.conf
|
375 |
$SED "s/^domain.*/domain\t\t$DOMAIN/g" /etc/chilli.conf
|
374 |
$SED "s?^domain.*?domain\t\t$DOMAIN?g" /etc/chilli.conf
|
376 |
[ "`grep ^HTTPS_LOGIN= $CONF_FILE | cut -d'=' -f2`" == "on" ] && chilli_login_protocol="https" || chilli_login_protocol="http"
|
375 |
[ "`grep ^HTTPS_LOGIN= $CONF_FILE | cut -d'=' -f2`" == "on" ] && chilli_login_protocol="https" || chilli_login_protocol="http"
|
377 |
$SED "s/^uamserver.*/uamserver\t$chilli_login_protocol:\/\/$HOSTNAME.$DOMAIN\/intercept.php/" /etc/chilli.conf
|
376 |
$SED "s?^uamserver.*?uamserver\t$chilli_login_protocol:\/\/$HOSTNAME.$DOMAIN\/intercept.php?" /etc/chilli.conf
|
378 |
$SED "s/^radiusnasid.*/radiusnasid\t$HOSTNAME.$DOMAIN/g" /etc/chilli.conf
|
377 |
$SED "s?^radiusnasid.*?radiusnasid\t$HOSTNAME.$DOMAIN?g" /etc/chilli.conf
|
379 |
$SED "s?^net.*?net\t\t$PRIVATE_NETWORK_MASK?g" /etc/chilli.conf
|
378 |
$SED "s?^net.*?net\t\t$PRIVATE_NETWORK_MASK?g" /etc/chilli.conf
|
380 |
$SED "s?^dns1.*?dns1\t\t$PRIVATE_IP?g" /etc/chilli.conf
|
379 |
$SED "s?^dns1.*?dns1\t\t$PRIVATE_IP?g" /etc/chilli.conf
|
381 |
$SED "s?^dns2.*?dns2\t\t$PRIVATE_IP?g" /etc/chilli.conf
|
380 |
$SED "s?^dns2.*?dns2\t\t$PRIVATE_IP?g" /etc/chilli.conf
|
382 |
$SED "s?^uamlisten.*?uamlisten\t$PRIVATE_IP?g" /etc/chilli.conf
|
381 |
$SED "s?^uamlisten.*?uamlisten\t$PRIVATE_IP?g" /etc/chilli.conf
|
383 |
PRIVATE_IP_HEXA=$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f1)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f2)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f3)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f4)")
|
382 |
PRIVATE_IP_HEXA=$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f1)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f2)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f3)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f4)")
|