ynh-piratebox 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348
  1. #!/bin/bash
  2. # PirateBox app for YunoHost
  3. # Copyright (C) 2015 Julien Vaubourg <julien@vaubourg.com>
  4. # Contribute at https://github.com/labriqueinternet/piratebox_ynh
  5. #
  6. # This program is free software: you can redistribute it and/or modify
  7. # it under the terms of the GNU Affero General Public License as published by
  8. # the Free Software Foundation, either version 3 of the License, or
  9. # (at your option) any later version.
  10. #
  11. # This program is distributed in the hope that it will be useful,
  12. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. # GNU Affero General Public License for more details.
  15. #
  16. # You should have received a copy of the GNU Affero General Public License
  17. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  18. # Functions
  19. ## State functions
  20. has_hotspot_app() {
  21. [ -e /tmp/.ynh-hotspot-started ]
  22. }
  23. is_nat4_dns_set() {
  24. iptables -nvt nat -L PREROUTING | grep 'udp dpt:53' | grep -q "${ynh_wifi_device}" \
  25. && iptables -nvt nat -L POSTROUTING | grep MASQUERADE | grep -q "${ynh_wifi_device}"
  26. }
  27. is_nat4_web_set() {
  28. iptables -nvt nat -L PREROUTING | grep 'tcp dpt:80' | grep -q "${ynh_wifi_device}"
  29. }
  30. is_filt4_nohttps_set() {
  31. iptables -nv -L INPUT | grep 'tcp dpt:443 reject' | grep -q "${ynh_wifi_device}"
  32. }
  33. is_filt4_nofwd_set() {
  34. iptables -nv -L FORWARD | grep 'reject-with' | grep -q "${ynh_wifi_device}"
  35. }
  36. is_fakedns_running() {
  37. ps aux | grep -v grep | grep -q piratebox_fakedns
  38. }
  39. is_running() {
  40. has_hotspot_app \
  41. && is_nat4_dns_set && is_nat4_web_set \
  42. && is_filt4_nohttps_set && is_filt4_nofwd_set \
  43. && is_captive_set \
  44. && is_fakedns_running
  45. }
  46. is_captive_set() {
  47. ls /etc/nginx/conf.d/captive-piratebox.conf &> /dev/null
  48. }
  49. ## Setters
  50. # The IPv6 NAT features are not available available before the kernel 3.8
  51. # therefore the IPv6-compliance will be add when Debian Stable has a
  52. # compliant kernel
  53. set_nat4_dns() {
  54. iptables -t nat -A PREROUTING -i "${ynh_wifi_device}" -p udp --dport 53 -j DNAT --to-destination "${ynh_ip4_nat_prefix}.1:4253"
  55. iptables -t nat -A POSTROUTING -o "${ynh_wifi_device}" -j MASQUERADE
  56. }
  57. set_nat4_web() {
  58. iptables -t nat -A PREROUTING -i "${ynh_wifi_device}" -p tcp --dport 80 -j REDIRECT --to-port 4280
  59. }
  60. set_filt4_nohttps() {
  61. iptables -I INPUT 1 -i "${ynh_wifi_device}" -p tcp --dport 443 -j REJECT
  62. }
  63. set_filt4_nofwd() {
  64. iptables -I FORWARD 1 -j REJECT -i "${ynh_wifi_device}"
  65. }
  66. set_captive() {
  67. cp /var/www/piratebox/config.{tpl.,}php
  68. sed -i "s|<TPL:OPT_NAME>|${ynh_opt_name}|" -i /var/www/piratebox/config.php
  69. sed -i "s|<TPL:OPT_RENAMING>|${ynh_opt_renaming}|" -i /var/www/piratebox/config.php
  70. sed -i "s|<TPL:OPT_MAXSPACE>|${ynh_opt_maxspace}|" -i /var/www/piratebox/config.php
  71. sed -i "s|<TPL:OPT_DELETING>|${ynh_opt_deleting}|" -i /var/www/piratebox/config.php
  72. sed -i "s|<TPL:OPT_CHAT>|${ynh_opt_chat}|" -i /var/www/piratebox/config.php
  73. cp /etc/nginx/{,conf.d/}captive-piratebox.conf
  74. systemctl reload nginx
  75. }
  76. start_fakedns() {
  77. (/usr/local/bin/piratebox_fakedns "${ynh_ip4_nat_prefix}.1" &> /dev/null) &
  78. }
  79. ## Unsetters
  80. unset_nat4_dns() {
  81. iptables -t nat -D PREROUTING -i "${ynh_wifi_device}" -p udp --dport 53 -j DNAT --to-destination "${ynh_ip4_nat_prefix}.1:4253"
  82. iptables -t nat -D POSTROUTING -o "${ynh_wifi_device}" -j MASQUERADE
  83. }
  84. unset_nat4_web() {
  85. iptables -t nat -D PREROUTING -i "${ynh_wifi_device}" -p tcp --dport 80 -j REDIRECT --to-port 4280
  86. }
  87. unset_filt4_nohttps() {
  88. iptables -D INPUT -i "${ynh_wifi_device}" -p tcp --dport 443 -j REJECT
  89. }
  90. unset_filt4_nofwd() {
  91. iptables -D FORWARD -j REJECT -i "${ynh_wifi_device}"
  92. }
  93. unset_captive() {
  94. rm -f /etc/nginx/conf.d/captive-piratebox.conf
  95. systemctl reload nginx
  96. }
  97. stop_fakedns() {
  98. kill $(ps aux | grep piratebox_fakedns | awk '{ print $2 }' | head -n1)
  99. }
  100. ## Tools
  101. ynh_setting_get() {
  102. app=${1}
  103. setting=${2}
  104. grep "^${setting}:" "/etc/yunohost/apps/${app}/settings.yml" | sed s/^[^:]\\+:\\s*[\"\']\\?// | sed s/\\s*[\"\']\$//
  105. }
  106. ynh_setting_set() {
  107. app=${1}
  108. setting=${2}
  109. value=${3}
  110. yunohost app setting "${app}" "${setting}" -v "${value}"
  111. }
  112. if [ "$1" != restart ]; then
  113. # Restart php5-fpm at the first start (it needs to be restarted after the slapd start)
  114. if [ ! -e /tmp/.ynh-piratebox-boot ]; then
  115. touch /tmp/.ynh-piratebox-boot
  116. systemctl restart php5-fpm
  117. fi
  118. ynh_wifi_device_id=$(ynh_setting_get piratebox wifi_device_id)
  119. if [[ ! "${1}" =~ stop ]]; then
  120. exitcode=0
  121. if [ "${ynh_wifi_device_id}" -eq -1 ]; then
  122. echo "[WARN] You need to select an associated wifi hotspot (you can do it through the web admin)"
  123. exitcode=1
  124. fi
  125. [ "${exitcode}" -ne 0 ] && exit ${exitcode}
  126. fi
  127. # Variables
  128. echo -n "Retrieving Yunohost settings... "
  129. ynh_service_enabled=$(ynh_setting_get piratebox service_enabled)
  130. ynh_opt_renaming=$(ynh_setting_get piratebox opt_renaming)
  131. ynh_opt_maxspace=$(ynh_setting_get piratebox opt_maxspace)
  132. ynh_opt_deleting=$(ynh_setting_get piratebox opt_deleting)
  133. ynh_opt_chat=$(ynh_setting_get piratebox opt_chat)
  134. ynh_opt_name=$(ynh_setting_get piratebox opt_name)
  135. if [ "${ynh_wifi_device_id}" -eq 0 ]; then
  136. ynh_wifi_device="$(ynh_setting_get hotspot wifi_device)"
  137. else
  138. ynh_wifi_device="hotspot${ynh_wifi_device_id}"
  139. fi
  140. IFS='|' read -a ynh_ip4_nat_prefix <<< "$(ynh_setting_get hotspot ip4_nat_prefix)"
  141. ynh_ip4_nat_prefix=${ynh_ip4_nat_prefix[${ynh_wifi_device_id}]}
  142. echo "OK"
  143. fi
  144. # Script
  145. case "$1" in
  146. start)
  147. if is_running; then
  148. echo "Already started"
  149. elif [ "${ynh_service_enabled}" -eq 0 ]; then
  150. echo "Disabled service"
  151. elif ! has_hotspot_app; then
  152. echo "[ERR] Hotspot is not running"
  153. else
  154. echo "[piratebox] Starting..."
  155. touch /tmp/.ynh-piratebox-started
  156. # Purge tmp folder
  157. rm -rf /var/spool/piratebox/*
  158. # Set IPv4 DNS NAT
  159. if ! is_nat4_dns_set; then
  160. echo "Set IPv4 DNS NAT"
  161. set_nat4_dns
  162. fi
  163. # Set IPv4 Web NAT
  164. if ! is_nat4_web_set; then
  165. echo "Set IPv4 Web NAT"
  166. set_nat4_web
  167. fi
  168. # Set IPv4 No Https-filter rule
  169. if ! is_filt4_nohttps_set; then
  170. echo "Set IPv4 No Https-filter rule"
  171. set_filt4_nohttps
  172. fi
  173. # Set IPv4 No Forwarding-filter rule
  174. if ! is_filt4_nofwd_set; then
  175. echo "Set IPv4 No Forwarding-filter rule"
  176. set_filt4_nofwd
  177. fi
  178. # Set captive configuration
  179. if ! is_captive_set; then
  180. echo "Set the captive portal configuration"
  181. set_captive
  182. fi
  183. # Run fakedns
  184. if ! is_fakedns_running; then
  185. echo "Run fakedns"
  186. start_fakedns
  187. fi
  188. fi
  189. ;;
  190. stop)
  191. echo "[piratebox] Stopping..."
  192. rm -f /tmp/.ynh-piratebox-started
  193. if is_nat4_dns_set; then
  194. echo "Unset IPv4 DNS NAT"
  195. unset_nat4_dns
  196. fi
  197. if is_nat4_web_set; then
  198. echo "Unset IPv4 Web NAT"
  199. unset_nat4_web
  200. fi
  201. if is_filt4_nohttps_set; then
  202. echo "Unset IPv4 No Https-filter rule"
  203. unset_filt4_nohttps
  204. fi
  205. if is_filt4_nofwd_set; then
  206. echo "Unset IPv4 No Forwarding-filter rule"
  207. unset_filt4_nofwd
  208. fi
  209. if is_captive_set; then
  210. echo "Unset the captive portal"
  211. unset_captive
  212. fi
  213. if is_fakedns_running; then
  214. echo "Stop fakedns"
  215. stop_fakedns
  216. fi
  217. rm -rf /var/spool/piratebox/*
  218. ;;
  219. restart)
  220. $0 stop
  221. $0 start
  222. ;;
  223. status)
  224. exitcode=0
  225. if [ "${ynh_service_enabled}" -eq 0 ]; then
  226. echo "[ERR] PirateBox Service disabled"
  227. exitcode=1
  228. fi
  229. if ! has_hotspot_app; then
  230. echo "[ERR] Hotspot is not running"
  231. exitcode=1
  232. fi
  233. if is_nat4_dns_set; then
  234. echo "[OK] IPv4 DNS NAT set"
  235. else
  236. echo "[ERR] No IPv4 DNS NAT set"
  237. exitcode=1
  238. fi
  239. if is_nat4_web_set; then
  240. echo "[OK] IPv4 Web NAT set"
  241. else
  242. echo "[ERR] No IPv4 Web NAT set"
  243. exitcode=1
  244. fi
  245. if is_filt4_nohttps_set; then
  246. echo "[OK] IPv4 No Https-filter rule set"
  247. else
  248. echo "[ERR] No IPv4 No Https-filter rule set"
  249. exitcode=1
  250. fi
  251. if is_filt4_nofwd_set; then
  252. echo "[OK] IPv4 No Forwarding-filter rule set"
  253. else
  254. echo "[ERR] No IPv4 No Forwarding-filter rule set"
  255. exitcode=1
  256. fi
  257. if is_captive_set; then
  258. echo "[OK] Captive portal set"
  259. else
  260. echo "[ERR] No captive portal set"
  261. exitcode=1
  262. fi
  263. if is_fakedns_running; then
  264. echo "[OK] Fakedns is running"
  265. else
  266. echo "[ERR] Fakedns is not running"
  267. exitcode=1
  268. fi
  269. exit ${exitcode}
  270. ;;
  271. *)
  272. echo "Usage: $0 {start|stop|restart|status}"
  273. exit 1
  274. ;;
  275. esac
  276. exit 0