2019-10-22 22:22:36 +00:00
|
|
|
#!/bin/bash
|
|
|
|
|
2020-08-27 09:38:51 +00:00
|
|
|
SCRIPT_VERSION="3"
|
2020-08-24 20:10:40 +00:00
|
|
|
SCRIPT_URL='https://raw.githubusercontent.com/wh1te909/tacticalrmm/develop/install.sh'
|
|
|
|
|
|
|
|
TMP_FILE=$(mktemp -p "" "rmminstall_XXXXXXXXXX")
|
|
|
|
curl -s -L "${SCRIPT_URL}" > ${TMP_FILE}
|
|
|
|
NEW_VER=$(grep "^SCRIPT_VERSION" "$TMP_FILE" | awk -F'[="]' '{print $3}')
|
|
|
|
|
|
|
|
if [ "${SCRIPT_VERSION}" \< "${NEW_VER}" ]; then
|
|
|
|
printf >&2 "${YELLOW}A newer version of this installer script is available.${NC}\n"
|
|
|
|
printf >&2 "${YELLOW}Please download the latest version from ${GREEN}${SCRIPT_URL}${YELLOW} and re-run.${NC}\n"
|
|
|
|
rm -f $TMP_FILE
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
rm -f $TMP_FILE
|
|
|
|
|
2020-08-15 04:25:42 +00:00
|
|
|
UBU20=$(grep 20.04 "/etc/"*"release")
|
|
|
|
if ! [[ $UBU20 ]]; then
|
|
|
|
echo -ne "\033[0;31mThis script will only work on Ubuntu 20.04\e[0m\n"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2019-10-22 22:22:36 +00:00
|
|
|
if [ $EUID -eq 0 ]; then
|
|
|
|
echo -ne "\033[0;31mDo NOT run this script as root. Exiting.\e[0m\n"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
DJANGO_SEKRET=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 80 | head -n 1)
|
|
|
|
SALTPW=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 20 | head -n 1)
|
|
|
|
ADMINURL=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 70 | head -n 1)
|
|
|
|
MESHPASSWD=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 25 | head -n 1)
|
2020-08-21 19:46:05 +00:00
|
|
|
pgusername=$(cat /dev/urandom | tr -dc 'a-z' | fold -w 8 | head -n 1)
|
2020-08-21 19:19:29 +00:00
|
|
|
pgpw=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 20 | head -n 1)
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
GREEN='\033[0;32m'
|
|
|
|
YELLOW='\033[1;33m'
|
|
|
|
BLUE='\033[0;34m'
|
|
|
|
NC='\033[0m'
|
|
|
|
|
|
|
|
cls() {
|
|
|
|
printf "\033c"
|
|
|
|
}
|
|
|
|
|
|
|
|
print_green() {
|
|
|
|
printf >&2 "${GREEN}%0.s-${NC}" {1..80}
|
|
|
|
printf >&2 "\n"
|
|
|
|
printf >&2 "${GREEN}${1}${NC}\n"
|
|
|
|
printf >&2 "${GREEN}%0.s-${NC}" {1..80}
|
|
|
|
printf >&2 "\n"
|
|
|
|
}
|
|
|
|
|
|
|
|
cls
|
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
while [[ $rmmdomain != *[.]*[.]* ]]
|
|
|
|
do
|
|
|
|
echo -ne "${YELLOW}Enter the subdomain for the backend (e.g. api.example.com)${NC}: "
|
2019-10-22 22:22:36 +00:00
|
|
|
read rmmdomain
|
2020-06-24 17:28:04 +00:00
|
|
|
done
|
|
|
|
|
|
|
|
while [[ $frontenddomain != *[.]*[.]* ]]
|
|
|
|
do
|
2020-08-12 10:52:42 +00:00
|
|
|
echo -ne "${YELLOW}Enter the subdomain for the frontend (e.g. rmm.example.com)${NC}: "
|
2019-10-22 22:22:36 +00:00
|
|
|
read frontenddomain
|
2020-06-24 17:28:04 +00:00
|
|
|
done
|
|
|
|
|
|
|
|
while [[ $meshdomain != *[.]*[.]* ]]
|
|
|
|
do
|
|
|
|
echo -ne "${YELLOW}Enter the subdomain for meshcentral (e.g. mesh.example.com)${NC}: "
|
2019-10-22 22:22:36 +00:00
|
|
|
read meshdomain
|
2020-06-24 17:28:04 +00:00
|
|
|
done
|
|
|
|
|
2020-08-13 02:35:14 +00:00
|
|
|
echo -ne "${YELLOW}Enter the root domain for LetsEncrypt (e.g. example.com or example.co.uk)${NC}: "
|
|
|
|
read rootdomain
|
|
|
|
|
2020-08-15 04:25:42 +00:00
|
|
|
BEHIND_NAT=false
|
|
|
|
IPV4=$(ip -4 addr | sed -ne 's|^.* inet \([^/]*\)/.* scope global.*$|\1|p' | head -1)
|
|
|
|
|
|
|
|
# if server is behind NAT we need to add the 3 subdomains to the host file
|
|
|
|
# so that nginx can properly route between the frontend, backend and meshcentral
|
|
|
|
if echo "$IPV4" | grep -qE '^(10\.|172\.1[6789]\.|172\.2[0-9]\.|172\.3[01]\.|192\.168)'; then
|
|
|
|
BEHIND_NAT=true
|
|
|
|
CHECK_HOSTS=$(grep 127.0.1.1 /etc/hosts | grep "$rmmdomain" | grep "$meshdomain" | grep "$frontenddomain")
|
|
|
|
|
|
|
|
if ! [[ $CHECK_HOSTS ]]; then
|
|
|
|
echo -ne "${GREEN}This server appears to be behind NAT.${NC}\n"
|
|
|
|
echo -ne "${GREEN}If so, you will need append your 3 subdomains to the line starting with 127.0.1.1 in your hosts file.${NC}\n"
|
|
|
|
until [[ $edithosts =~ (y|n) ]]; do
|
|
|
|
echo -ne "${GREEN}Would you like me to do this for you? [y/n]${NC}: "
|
|
|
|
read edithosts
|
|
|
|
done
|
|
|
|
|
|
|
|
if [[ $edithosts == "y" ]]; then
|
|
|
|
sudo sed -i "/127.0.1.1/s/$/ ${rmmdomain} $frontenddomain $meshdomain/" /etc/hosts
|
|
|
|
else
|
|
|
|
echo -ne "${GREEN}Please manually edit your hosts file to match the line below and re-run this script.${NC}\n"
|
|
|
|
sed "/127.0.1.1/s/$/ ${rmmdomain} $frontenddomain $meshdomain/" /etc/hosts | grep 127.0.1.1
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
echo -ne "${YELLOW}Create a username for meshcentral${NC}: "
|
2019-10-22 22:22:36 +00:00
|
|
|
read meshusername
|
2020-06-24 17:28:04 +00:00
|
|
|
|
|
|
|
while [[ $letsemail != *[@]*[.]* ]]
|
|
|
|
do
|
|
|
|
echo -ne "${YELLOW}Enter a valid email address for let's encrypt renewal notifications and meshcentral${NC}: "
|
2019-10-22 22:22:36 +00:00
|
|
|
read letsemail
|
2020-06-24 17:28:04 +00:00
|
|
|
done
|
|
|
|
|
|
|
|
print_green 'Getting wildcard cert'
|
|
|
|
|
|
|
|
sudo apt install -y software-properties-common
|
|
|
|
sudo apt update
|
|
|
|
sudo apt install -y certbot
|
|
|
|
|
|
|
|
sudo certbot certonly --manual -d *.${rootdomain} --agree-tos --no-bootstrap --manual-public-ip-logging-ok --preferred-challenges dns -m ${letsemail} --no-eff-email
|
|
|
|
while [[ $? -ne 0 ]]
|
|
|
|
do
|
|
|
|
sudo certbot certonly --manual -d *.${rootdomain} --agree-tos --no-bootstrap --manual-public-ip-logging-ok --preferred-challenges dns -m ${letsemail} --no-eff-email
|
|
|
|
done
|
2019-10-22 22:22:36 +00:00
|
|
|
|
2020-01-12 01:44:24 +00:00
|
|
|
print_green 'Creating saltapi user'
|
|
|
|
|
|
|
|
sudo adduser --no-create-home --disabled-password --gecos "" saltapi
|
|
|
|
echo "saltapi:${SALTPW}" | sudo chpasswd
|
|
|
|
|
2020-08-24 20:10:40 +00:00
|
|
|
print_green 'Installing golang'
|
|
|
|
|
|
|
|
sudo apt install -y curl wget
|
|
|
|
|
|
|
|
sudo mkdir -p /usr/local/rmmgo
|
|
|
|
go_tmp=$(mktemp -d -t rmmgo-XXXXXXXXXX)
|
|
|
|
wget https://golang.org/dl/go1.15.linux-amd64.tar.gz -P ${go_tmp}
|
|
|
|
|
|
|
|
tar -xzf ${go_tmp}/go1.15.linux-amd64.tar.gz -C ${go_tmp}
|
|
|
|
|
|
|
|
sudo mv ${go_tmp}/go /usr/local/rmmgo/
|
|
|
|
rm -rf ${go_tmp}
|
|
|
|
|
2019-10-22 22:22:36 +00:00
|
|
|
print_green 'Installing Nginx'
|
|
|
|
|
|
|
|
sudo apt install -y nginx
|
2020-06-23 01:34:48 +00:00
|
|
|
sudo systemctl stop nginx
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
print_green 'Installing NodeJS'
|
|
|
|
|
2019-12-23 01:36:21 +00:00
|
|
|
curl -sL https://deb.nodesource.com/setup_12.x | sudo -E bash -
|
2019-10-22 22:22:36 +00:00
|
|
|
sudo apt update
|
|
|
|
sudo apt install -y gcc g++ make
|
|
|
|
sudo apt install -y nodejs
|
|
|
|
|
|
|
|
print_green 'Installing MongoDB'
|
|
|
|
|
|
|
|
wget -qO - https://www.mongodb.org/static/pgp/server-4.2.asc | sudo apt-key add -
|
|
|
|
echo "deb [ arch=amd64 ] https://repo.mongodb.org/apt/ubuntu bionic/mongodb-org/4.2 multiverse" | sudo tee /etc/apt/sources.list.d/mongodb-org-4.2.list
|
|
|
|
sudo apt update
|
|
|
|
sudo apt install -y mongodb-org
|
|
|
|
sudo systemctl enable mongod
|
|
|
|
sudo systemctl restart mongod
|
|
|
|
|
|
|
|
print_green 'Installing MeshCentral'
|
|
|
|
|
|
|
|
sudo mkdir -p /meshcentral/meshcentral-data
|
2020-02-01 21:58:23 +00:00
|
|
|
sudo chown ${USER}:${USER} -R /meshcentral
|
2019-10-22 22:22:36 +00:00
|
|
|
cd /meshcentral
|
2020-02-01 21:58:23 +00:00
|
|
|
npm install meshcentral
|
2019-10-22 22:22:36 +00:00
|
|
|
sudo chown ${USER}:${USER} -R /meshcentral
|
|
|
|
|
|
|
|
meshcfg="$(cat << EOF
|
|
|
|
{
|
|
|
|
"settings": {
|
|
|
|
"Cert": "${meshdomain}",
|
|
|
|
"MongoDb": "mongodb://127.0.0.1:27017",
|
|
|
|
"MongoDbName": "meshcentral",
|
|
|
|
"WANonly": true,
|
|
|
|
"Minify": 1,
|
|
|
|
"Port": 4430,
|
|
|
|
"AliasPort": 443,
|
|
|
|
"RedirPort": 800,
|
|
|
|
"AllowLoginToken": true,
|
|
|
|
"AllowFraming": true,
|
|
|
|
"_AgentPing": 60,
|
|
|
|
"AgentPong": 300,
|
|
|
|
"AllowHighQualityDesktop": true,
|
|
|
|
"TlsOffload": "127.0.0.1",
|
2019-12-14 21:41:37 +00:00
|
|
|
"MaxInvalidLogin": { "time": 5, "count": 5, "coolofftime": 30 }
|
2019-10-22 22:22:36 +00:00
|
|
|
},
|
|
|
|
"domains": {
|
|
|
|
"": {
|
2020-06-24 17:28:04 +00:00
|
|
|
"Title": "Tactical RMM",
|
|
|
|
"Title2": "Tactical RMM",
|
2019-10-22 22:22:36 +00:00
|
|
|
"NewAccounts": false,
|
|
|
|
"CertUrl": "https://${meshdomain}:443/",
|
|
|
|
"GeoLocation": true,
|
2020-06-23 01:34:48 +00:00
|
|
|
"CookieIpCheck": false,
|
|
|
|
"mstsc": true,
|
2019-10-22 22:22:36 +00:00
|
|
|
"httpheaders": {
|
|
|
|
"Strict-Transport-Security": "max-age=360000",
|
2019-12-14 21:41:37 +00:00
|
|
|
"_x-frame-options": "sameorigin",
|
2019-10-22 22:22:36 +00:00
|
|
|
"Content-Security-Policy": "default-src 'none'; script-src 'self' 'unsafe-inline'; connect-src 'self'; img-src 'self' data:; style-src 'self' 'unsafe-inline'; frame-src 'self'; media-src 'self'"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
)"
|
|
|
|
echo "${meshcfg}" > /meshcentral/meshcentral-data/config.json
|
|
|
|
|
|
|
|
print_green 'Installing python, redis and git'
|
|
|
|
|
2020-03-01 00:46:23 +00:00
|
|
|
sudo apt update
|
2020-06-23 01:34:48 +00:00
|
|
|
sudo apt install -y python3.8-venv python3.8-dev python3-pip python3-setuptools python3-wheel ca-certificates redis git
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
print_green 'Installing postgresql'
|
|
|
|
|
2020-06-23 01:34:48 +00:00
|
|
|
sudo sh -c 'echo "deb https://apt.postgresql.org/pub/repos/apt/ $(lsb_release -cs)-pgdg main" > /etc/apt/sources.list.d/pgdg.list'
|
2019-10-22 22:22:36 +00:00
|
|
|
wget --quiet -O - https://www.postgresql.org/media/keys/ACCC4CF8.asc | sudo apt-key add -
|
|
|
|
sudo apt update
|
2020-06-23 01:34:48 +00:00
|
|
|
sudo apt install -y postgresql-12
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
print_green 'Creating database for the rmm'
|
|
|
|
|
2019-12-14 10:17:16 +00:00
|
|
|
sudo -u postgres psql -c "CREATE DATABASE tacticalrmm"
|
2019-10-22 22:22:36 +00:00
|
|
|
sudo -u postgres psql -c "CREATE USER ${pgusername} WITH PASSWORD '${pgpw}'"
|
|
|
|
sudo -u postgres psql -c "ALTER ROLE ${pgusername} SET client_encoding TO 'utf8'"
|
|
|
|
sudo -u postgres psql -c "ALTER ROLE ${pgusername} SET default_transaction_isolation TO 'read committed'"
|
|
|
|
sudo -u postgres psql -c "ALTER ROLE ${pgusername} SET timezone TO 'UTC'"
|
2019-12-14 10:17:16 +00:00
|
|
|
sudo -u postgres psql -c "GRANT ALL PRIVILEGES ON DATABASE tacticalrmm TO ${pgusername}"
|
2019-10-22 22:22:36 +00:00
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
sudo mkdir /rmm
|
|
|
|
sudo chown ${USER}:${USER} /rmm
|
2019-10-22 22:22:36 +00:00
|
|
|
sudo mkdir -p /var/log/celery
|
|
|
|
sudo chown ${USER}:${USER} /var/log/celery
|
2020-06-24 17:28:04 +00:00
|
|
|
git clone https://github.com/wh1te909/tacticalrmm.git /rmm/
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
localvars="$(cat << EOF
|
|
|
|
SECRET_KEY = "${DJANGO_SEKRET}"
|
|
|
|
|
|
|
|
DEBUG = False
|
|
|
|
|
|
|
|
ALLOWED_HOSTS = ['${rmmdomain}']
|
|
|
|
|
2020-01-18 02:05:29 +00:00
|
|
|
ADMIN_URL = "${ADMINURL}/"
|
|
|
|
|
2019-10-22 22:22:36 +00:00
|
|
|
CORS_ORIGIN_WHITELIST = [
|
|
|
|
"https://${frontenddomain}"
|
|
|
|
]
|
|
|
|
|
|
|
|
DATABASES = {
|
|
|
|
'default': {
|
|
|
|
'ENGINE': 'django.db.backends.postgresql',
|
2019-12-14 10:17:16 +00:00
|
|
|
'NAME': 'tacticalrmm',
|
2019-10-22 22:22:36 +00:00
|
|
|
'USER': '${pgusername}',
|
|
|
|
'PASSWORD': '${pgpw}',
|
|
|
|
'HOST': 'localhost',
|
|
|
|
'PORT': '5432',
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-23 08:15:08 +00:00
|
|
|
REST_FRAMEWORK = {
|
|
|
|
'DATETIME_FORMAT': "%b-%d-%Y - %H:%M",
|
|
|
|
|
|
|
|
'DEFAULT_PERMISSION_CLASSES': (
|
|
|
|
'rest_framework.permissions.IsAuthenticated',
|
|
|
|
),
|
|
|
|
'DEFAULT_AUTHENTICATION_CLASSES': (
|
|
|
|
'knox.auth.TokenAuthentication',
|
|
|
|
),
|
|
|
|
}
|
|
|
|
|
|
|
|
if not DEBUG:
|
|
|
|
REST_FRAMEWORK.update({
|
|
|
|
'DEFAULT_RENDERER_CLASSES': (
|
|
|
|
'rest_framework.renderers.JSONRenderer',
|
|
|
|
)
|
|
|
|
})
|
|
|
|
|
2020-01-12 01:44:24 +00:00
|
|
|
SALT_USERNAME = "saltapi"
|
|
|
|
SALT_PASSWORD = "${SALTPW}"
|
2020-02-12 16:23:44 +00:00
|
|
|
SALT_HOST = "127.0.0.1"
|
2019-10-22 22:22:36 +00:00
|
|
|
MESH_USERNAME = "${meshusername}"
|
|
|
|
MESH_SITE = "https://${meshdomain}"
|
2020-02-12 16:23:44 +00:00
|
|
|
REDIS_HOST = "localhost"
|
2019-10-22 22:22:36 +00:00
|
|
|
EOF
|
|
|
|
)"
|
2020-06-24 17:28:04 +00:00
|
|
|
echo "${localvars}" > /rmm/api/tacticalrmm/tacticalrmm/local_settings.py
|
2019-10-22 22:22:36 +00:00
|
|
|
|
2020-01-19 23:50:31 +00:00
|
|
|
print_green 'Installing the backend'
|
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
cd /rmm/api
|
2020-06-23 01:34:48 +00:00
|
|
|
python3 -m venv env
|
2020-06-24 17:28:04 +00:00
|
|
|
source /rmm/api/env/bin/activate
|
|
|
|
cd /rmm/api/tacticalrmm
|
2020-05-11 20:32:37 +00:00
|
|
|
pip install --no-cache-dir --upgrade pip
|
2020-08-16 21:08:32 +00:00
|
|
|
pip install --no-cache-dir setuptools==49.6.0 wheel==0.35.1
|
2020-06-24 17:28:04 +00:00
|
|
|
pip install --no-cache-dir -r /rmm/api/tacticalrmm/requirements.txt
|
2020-01-19 23:50:31 +00:00
|
|
|
python manage.py migrate
|
2020-08-10 20:29:42 +00:00
|
|
|
python manage.py collectstatic --no-input
|
2020-02-22 23:14:31 +00:00
|
|
|
python manage.py load_chocos
|
2020-08-27 04:13:51 +00:00
|
|
|
python manage.py load_community_scripts
|
2020-01-19 23:50:31 +00:00
|
|
|
printf >&2 "${YELLOW}%0.s*${NC}" {1..80}
|
|
|
|
printf >&2 "\n"
|
|
|
|
printf >&2 "${YELLOW}Please create your login for the RMM website and django admin${NC}\n"
|
|
|
|
printf >&2 "${YELLOW}%0.s*${NC}" {1..80}
|
|
|
|
printf >&2 "\n"
|
|
|
|
echo -ne "Username: "
|
|
|
|
read djangousername
|
|
|
|
python manage.py createsuperuser --username ${djangousername} --email ${letsemail}
|
|
|
|
RANDBASE=$(python manage.py generate_totp)
|
|
|
|
cls
|
2020-05-02 23:27:24 +00:00
|
|
|
python manage.py generate_barcode ${RANDBASE} ${djangousername} ${frontenddomain}
|
2020-01-19 23:50:31 +00:00
|
|
|
deactivate
|
|
|
|
read -n 1 -s -r -p "Press any key to continue..."
|
|
|
|
|
|
|
|
|
2019-10-22 22:22:36 +00:00
|
|
|
uwsgini="$(cat << EOF
|
|
|
|
[uwsgi]
|
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
logto = /rmm/api/tacticalrmm/tacticalrmm/private/log/uwsgi.log
|
|
|
|
chdir = /rmm/api/tacticalrmm
|
2019-12-14 10:17:16 +00:00
|
|
|
module = tacticalrmm.wsgi
|
2020-06-24 17:28:04 +00:00
|
|
|
home = /rmm/api/env
|
2019-10-22 22:22:36 +00:00
|
|
|
master = true
|
2019-12-14 22:47:34 +00:00
|
|
|
processes = 6
|
|
|
|
threads = 6
|
2019-10-22 22:22:36 +00:00
|
|
|
enable-threads = True
|
2020-06-24 17:28:04 +00:00
|
|
|
socket = /rmm/api/tacticalrmm/tacticalrmm.sock
|
2019-10-22 22:22:36 +00:00
|
|
|
harakiri = 300
|
|
|
|
chmod-socket = 660
|
|
|
|
# clear environment on exit
|
|
|
|
vacuum = true
|
|
|
|
die-on-term = true
|
2020-03-01 12:31:04 +00:00
|
|
|
max-requests = 500
|
|
|
|
max-requests-delta = 1000
|
2019-10-22 22:22:36 +00:00
|
|
|
EOF
|
|
|
|
)"
|
2020-06-24 17:28:04 +00:00
|
|
|
echo "${uwsgini}" > /rmm/api/tacticalrmm/app.ini
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
|
|
|
|
rmmservice="$(cat << EOF
|
|
|
|
[Unit]
|
2019-12-14 10:17:16 +00:00
|
|
|
Description=tacticalrmm uwsgi daemon
|
2019-10-22 22:22:36 +00:00
|
|
|
After=network.target
|
|
|
|
|
|
|
|
[Service]
|
|
|
|
User=${USER}
|
|
|
|
Group=www-data
|
2020-06-24 17:28:04 +00:00
|
|
|
WorkingDirectory=/rmm/api/tacticalrmm
|
|
|
|
Environment="PATH=/rmm/api/env/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
|
|
|
ExecStart=/rmm/api/env/bin/uwsgi --ini app.ini
|
2020-03-28 05:17:01 +00:00
|
|
|
Restart=always
|
|
|
|
RestartSec=10s
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|
|
|
|
EOF
|
|
|
|
)"
|
|
|
|
echo "${rmmservice}" | sudo tee /etc/systemd/system/rmm.service > /dev/null
|
|
|
|
|
|
|
|
|
|
|
|
nginxrmm="$(cat << EOF
|
|
|
|
server_tokens off;
|
|
|
|
|
2019-12-14 10:17:16 +00:00
|
|
|
upstream tacticalrmm {
|
2020-06-24 17:28:04 +00:00
|
|
|
server unix:////rmm/api/tacticalrmm/tacticalrmm.sock;
|
2019-10-22 22:22:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
server {
|
|
|
|
listen 80;
|
|
|
|
server_name ${rmmdomain};
|
|
|
|
return 301 https://\$server_name\$request_uri;
|
|
|
|
}
|
|
|
|
|
|
|
|
server {
|
|
|
|
listen 443 ssl;
|
|
|
|
server_name ${rmmdomain};
|
2019-10-23 00:56:07 +00:00
|
|
|
client_max_body_size 300M;
|
2020-06-24 17:28:04 +00:00
|
|
|
access_log /rmm/api/tacticalrmm/tacticalrmm/private/log/access.log;
|
|
|
|
error_log /rmm/api/tacticalrmm/tacticalrmm/private/log/error.log;
|
|
|
|
ssl_certificate /etc/letsencrypt/live/${rootdomain}/fullchain.pem;
|
|
|
|
ssl_certificate_key /etc/letsencrypt/live/${rootdomain}/privkey.pem;
|
|
|
|
ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384';
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
location /static/ {
|
2020-06-24 17:28:04 +00:00
|
|
|
root /rmm/api/tacticalrmm;
|
2019-10-22 22:22:36 +00:00
|
|
|
}
|
|
|
|
|
2020-06-01 08:16:00 +00:00
|
|
|
location /private/ {
|
2019-10-22 22:22:36 +00:00
|
|
|
internal;
|
|
|
|
add_header "Access-Control-Allow-Origin" "https://${frontenddomain}";
|
2020-06-24 17:28:04 +00:00
|
|
|
alias /rmm/api/tacticalrmm/tacticalrmm/private/;
|
2019-10-22 22:22:36 +00:00
|
|
|
}
|
|
|
|
|
2020-06-01 08:16:00 +00:00
|
|
|
location /saltscripts/ {
|
2020-02-07 08:16:09 +00:00
|
|
|
internal;
|
|
|
|
add_header "Access-Control-Allow-Origin" "https://${frontenddomain}";
|
|
|
|
alias /srv/salt/scripts/userdefined/;
|
2019-10-22 22:22:36 +00:00
|
|
|
}
|
|
|
|
|
2020-08-19 05:46:18 +00:00
|
|
|
location /builtin/ {
|
|
|
|
internal;
|
|
|
|
add_header "Access-Control-Allow-Origin" "https://${frontenddomain}";
|
|
|
|
alias /srv/salt/scripts/;
|
|
|
|
}
|
|
|
|
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
location / {
|
2019-12-14 10:17:16 +00:00
|
|
|
uwsgi_pass tacticalrmm;
|
2019-10-22 22:22:36 +00:00
|
|
|
include /etc/nginx/uwsgi_params;
|
|
|
|
uwsgi_read_timeout 9999s;
|
|
|
|
uwsgi_ignore_client_abort on;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
)"
|
|
|
|
echo "${nginxrmm}" | sudo tee /etc/nginx/sites-available/rmm.conf > /dev/null
|
|
|
|
|
|
|
|
|
|
|
|
nginxmesh="$(cat << EOF
|
|
|
|
server {
|
|
|
|
listen 80;
|
|
|
|
server_name ${meshdomain};
|
|
|
|
location / {
|
|
|
|
proxy_pass http://127.0.0.1:800;
|
|
|
|
proxy_http_version 1.1;
|
|
|
|
proxy_set_header X-Forwarded-Host \$host:\$server_port;
|
|
|
|
proxy_set_header X-Forwarded-For \$proxy_add_x_forwarded_for;
|
|
|
|
proxy_set_header X-Forwarded-Proto \$scheme;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
server {
|
|
|
|
|
|
|
|
listen 443 ssl;
|
|
|
|
proxy_send_timeout 330s;
|
|
|
|
proxy_read_timeout 330s;
|
|
|
|
server_name ${meshdomain};
|
2020-06-24 17:28:04 +00:00
|
|
|
ssl_certificate /etc/letsencrypt/live/${rootdomain}/fullchain.pem;
|
|
|
|
ssl_certificate_key /etc/letsencrypt/live/${rootdomain}/privkey.pem;
|
2019-10-22 22:22:36 +00:00
|
|
|
ssl_session_cache shared:WEBSSL:10m;
|
|
|
|
ssl_ciphers HIGH:!aNULL:!MD5;
|
|
|
|
ssl_prefer_server_ciphers on;
|
|
|
|
|
|
|
|
location / {
|
|
|
|
proxy_pass http://127.0.0.1:4430/;
|
|
|
|
proxy_http_version 1.1;
|
|
|
|
|
|
|
|
proxy_set_header Upgrade \$http_upgrade;
|
|
|
|
proxy_set_header Connection "upgrade";
|
|
|
|
proxy_set_header X-Forwarded-Host \$host:\$server_port;
|
|
|
|
proxy_set_header X-Forwarded-For \$proxy_add_x_forwarded_for;
|
|
|
|
proxy_set_header X-Forwarded-Proto \$scheme;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
)"
|
|
|
|
echo "${nginxmesh}" | sudo tee /etc/nginx/sites-available/meshcentral.conf > /dev/null
|
|
|
|
|
|
|
|
sudo ln -s /etc/nginx/sites-available/rmm.conf /etc/nginx/sites-enabled/rmm.conf
|
|
|
|
sudo ln -s /etc/nginx/sites-available/meshcentral.conf /etc/nginx/sites-enabled/meshcentral.conf
|
|
|
|
|
|
|
|
print_green 'Installing Salt Master'
|
|
|
|
|
2020-06-23 01:34:48 +00:00
|
|
|
wget -O - https://repo.saltstack.com/py3/ubuntu/20.04/amd64/latest/SALTSTACK-GPG-KEY.pub | sudo apt-key add -
|
|
|
|
echo 'deb http://repo.saltstack.com/py3/ubuntu/20.04/amd64/latest focal main' | sudo tee /etc/apt/sources.list.d/saltstack.list
|
|
|
|
|
2019-10-22 22:22:36 +00:00
|
|
|
sudo apt update
|
|
|
|
sudo apt install -y salt-master
|
|
|
|
|
2020-06-23 01:34:48 +00:00
|
|
|
print_green 'Waiting 30 seconds for salt to start'
|
|
|
|
sleep 30
|
|
|
|
|
2019-10-22 22:22:36 +00:00
|
|
|
saltvars="$(cat << EOF
|
2020-06-23 01:34:48 +00:00
|
|
|
timeout: 20
|
|
|
|
gather_job_timeout: 25
|
2019-10-22 22:22:36 +00:00
|
|
|
max_event_size: 30485760
|
|
|
|
external_auth:
|
|
|
|
pam:
|
2020-01-12 01:44:24 +00:00
|
|
|
saltapi:
|
2019-10-22 22:22:36 +00:00
|
|
|
- .*
|
|
|
|
- '@runner'
|
|
|
|
- '@wheel'
|
|
|
|
- '@jobs'
|
|
|
|
|
|
|
|
rest_cherrypy:
|
|
|
|
port: 8123
|
|
|
|
disable_ssl: True
|
|
|
|
max_request_body_size: 30485760
|
|
|
|
|
|
|
|
EOF
|
|
|
|
)"
|
2020-06-23 01:34:48 +00:00
|
|
|
echo "${saltvars}" | sudo tee /etc/salt/master.d/rmm-salt.conf > /dev/null
|
|
|
|
|
|
|
|
# fix the stupid 1 MB limit present in msgpack 0.6.2, which btw was later changed to 100 MB in msgpack 1.0.0
|
|
|
|
# but 0.6.2 is the default on ubuntu 20
|
|
|
|
sudo sed -i 's/msgpack_kwargs = {"raw": six.PY2}/msgpack_kwargs = {"raw": six.PY2, "max_buffer_size": 2147483647}/g' /usr/lib/python3/dist-packages/salt/transport/ipc.py
|
|
|
|
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
|
|
|
|
print_green 'Installing Salt API'
|
|
|
|
sudo apt install -y salt-api
|
|
|
|
|
|
|
|
sudo mkdir /etc/conf.d
|
|
|
|
|
|
|
|
celeryservice="$(cat << EOF
|
|
|
|
[Unit]
|
|
|
|
Description=Celery Service
|
|
|
|
After=network.target
|
2020-06-23 01:34:48 +00:00
|
|
|
After=redis-server.service
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
[Service]
|
|
|
|
Type=forking
|
|
|
|
User=${USER}
|
|
|
|
Group=${USER}
|
|
|
|
EnvironmentFile=/etc/conf.d/celery.conf
|
2020-06-24 17:28:04 +00:00
|
|
|
WorkingDirectory=/rmm/api/tacticalrmm
|
2019-10-22 22:22:36 +00:00
|
|
|
ExecStart=/bin/sh -c '\${CELERY_BIN} multi start \${CELERYD_NODES} -A \${CELERY_APP} --pidfile=\${CELERYD_PID_FILE} --logfile=\${CELERYD_LOG_FILE} --loglevel=\${CELERYD_LOG_LEVEL} \${CELERYD_OPTS}'
|
|
|
|
ExecStop=/bin/sh -c '\${CELERY_BIN} multi stopwait \${CELERYD_NODES} --pidfile=\${CELERYD_PID_FILE}'
|
|
|
|
ExecReload=/bin/sh -c '\${CELERY_BIN} multi restart \${CELERYD_NODES} -A \${CELERY_APP} --pidfile=\${CELERYD_PID_FILE} --logfile=\${CELERYD_LOG_FILE} --loglevel=\${CELERYD_LOG_LEVEL} \${CELERYD_OPTS}'
|
2020-03-28 05:17:01 +00:00
|
|
|
Restart=always
|
|
|
|
RestartSec=10s
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|
|
|
|
EOF
|
|
|
|
)"
|
|
|
|
echo "${celeryservice}" | sudo tee /etc/systemd/system/celery.service > /dev/null
|
|
|
|
|
|
|
|
celeryconf="$(cat << EOF
|
|
|
|
CELERYD_NODES="w1"
|
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
CELERY_BIN="/rmm/api/env/bin/celery"
|
2019-10-22 22:22:36 +00:00
|
|
|
|
2019-12-14 10:17:16 +00:00
|
|
|
CELERY_APP="tacticalrmm"
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
CELERYD_MULTI="multi"
|
|
|
|
|
|
|
|
CELERYD_OPTS="--time-limit=2900 --autoscale=50,5"
|
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
CELERYD_PID_FILE="/rmm/api/tacticalrmm/%n.pid"
|
2019-10-22 22:22:36 +00:00
|
|
|
CELERYD_LOG_FILE="/var/log/celery/%n%I.log"
|
|
|
|
CELERYD_LOG_LEVEL="INFO"
|
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
CELERYBEAT_PID_FILE="/rmm/api/tacticalrmm/beat.pid"
|
2019-10-22 22:22:36 +00:00
|
|
|
CELERYBEAT_LOG_FILE="/var/log/celery/beat.log"
|
|
|
|
EOF
|
|
|
|
)"
|
|
|
|
echo "${celeryconf}" | sudo tee /etc/conf.d/celery.conf > /dev/null
|
|
|
|
|
|
|
|
celerybeatservice="$(cat << EOF
|
|
|
|
[Unit]
|
|
|
|
Description=Celery Beat Service
|
|
|
|
After=network.target
|
2020-06-23 01:34:48 +00:00
|
|
|
After=redis-server.service
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
[Service]
|
|
|
|
Type=simple
|
|
|
|
User=${USER}
|
|
|
|
Group=${USER}
|
|
|
|
EnvironmentFile=/etc/conf.d/celery.conf
|
2020-06-24 17:28:04 +00:00
|
|
|
WorkingDirectory=/rmm/api/tacticalrmm
|
2019-10-22 22:22:36 +00:00
|
|
|
ExecStart=/bin/sh -c '\${CELERY_BIN} beat -A \${CELERY_APP} --pidfile=\${CELERYBEAT_PID_FILE} --logfile=\${CELERYBEAT_LOG_FILE} --loglevel=\${CELERYD_LOG_LEVEL}'
|
2020-03-28 05:17:01 +00:00
|
|
|
Restart=always
|
|
|
|
RestartSec=10s
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|
|
|
|
EOF
|
|
|
|
)"
|
|
|
|
echo "${celerybeatservice}" | sudo tee /etc/systemd/system/celerybeat.service > /dev/null
|
|
|
|
|
|
|
|
sudo mkdir -p /srv/salt
|
2020-06-24 17:28:04 +00:00
|
|
|
sudo cp -r /rmm/_modules /srv/salt/
|
|
|
|
sudo cp -r /rmm/scripts /srv/salt/
|
2020-02-03 05:09:42 +00:00
|
|
|
sudo mkdir /srv/salt/scripts/userdefined
|
2020-02-09 22:14:05 +00:00
|
|
|
sudo chown ${USER}:${USER} -R /srv/salt/
|
|
|
|
sudo chown ${USER}:www-data /srv/salt/scripts/userdefined
|
|
|
|
sudo chmod 750 /srv/salt/scripts/userdefined
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
meshservice="$(cat << EOF
|
|
|
|
[Unit]
|
|
|
|
Description=MeshCentral Server
|
|
|
|
After=network.target
|
2020-06-23 01:34:48 +00:00
|
|
|
After=mongod.service
|
2019-10-22 22:22:36 +00:00
|
|
|
After=nginx.service
|
|
|
|
[Service]
|
|
|
|
Type=simple
|
|
|
|
LimitNOFILE=1000000
|
2020-02-01 21:58:23 +00:00
|
|
|
ExecStart=/usr/bin/node node_modules/meshcentral
|
2019-10-22 22:22:36 +00:00
|
|
|
Environment=NODE_ENV=production
|
|
|
|
WorkingDirectory=/meshcentral
|
2020-02-01 21:58:23 +00:00
|
|
|
User=${USER}
|
|
|
|
Group=${USER}
|
2019-10-22 22:22:36 +00:00
|
|
|
Restart=always
|
2020-03-28 05:17:01 +00:00
|
|
|
RestartSec=10s
|
|
|
|
|
2019-10-22 22:22:36 +00:00
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|
|
|
|
EOF
|
|
|
|
)"
|
|
|
|
echo "${meshservice}" | sudo tee /etc/systemd/system/meshcentral.service > /dev/null
|
|
|
|
|
|
|
|
sudo systemctl daemon-reload
|
|
|
|
|
|
|
|
|
|
|
|
sudo systemctl enable salt-master
|
|
|
|
sudo systemctl enable salt-api
|
|
|
|
|
|
|
|
sudo systemctl restart salt-api
|
|
|
|
|
|
|
|
sudo chown -R $USER:$GROUP /home/${USER}/.npm
|
|
|
|
sudo chown -R $USER:$GROUP /home/${USER}/.config
|
|
|
|
|
2020-06-06 19:20:35 +00:00
|
|
|
quasarenv="$(cat << EOF
|
|
|
|
PROD_URL = "https://${rmmdomain}"
|
2020-06-24 17:28:04 +00:00
|
|
|
DEV_URL = "https://${rmmdomain}"
|
2019-10-22 22:22:36 +00:00
|
|
|
EOF
|
|
|
|
)"
|
2020-06-24 17:28:04 +00:00
|
|
|
echo "${quasarenv}" | tee /rmm/web/.env > /dev/null
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
print_green 'Installing the frontend'
|
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
cd /rmm/web
|
2019-10-22 22:22:36 +00:00
|
|
|
npm install
|
|
|
|
npm run build
|
|
|
|
sudo mkdir -p /var/www/rmm
|
2020-06-24 17:28:04 +00:00
|
|
|
sudo cp -pvr /rmm/web/dist /var/www/rmm/
|
2019-10-22 22:22:36 +00:00
|
|
|
sudo chown www-data:www-data -R /var/www/rmm/dist
|
|
|
|
|
|
|
|
nginxfrontend="$(cat << EOF
|
|
|
|
server {
|
|
|
|
server_name ${frontenddomain};
|
|
|
|
charset utf-8;
|
|
|
|
location / {
|
|
|
|
root /var/www/rmm/dist;
|
|
|
|
try_files \$uri \$uri/ /index.html;
|
2019-12-01 08:27:41 +00:00
|
|
|
add_header Cache-Control "no-store, no-cache, must-revalidate";
|
2019-11-17 10:12:40 +00:00
|
|
|
add_header Pragma "no-cache";
|
2019-10-22 22:22:36 +00:00
|
|
|
}
|
|
|
|
error_log /var/log/nginx/frontend-error.log;
|
|
|
|
access_log /var/log/nginx/frontend-access.log;
|
|
|
|
|
|
|
|
listen 443 ssl;
|
2020-06-24 17:28:04 +00:00
|
|
|
ssl_certificate /etc/letsencrypt/live/${rootdomain}/fullchain.pem;
|
|
|
|
ssl_certificate_key /etc/letsencrypt/live/${rootdomain}/privkey.pem;
|
|
|
|
ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384';
|
2019-10-22 22:22:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
server {
|
|
|
|
if (\$host = ${frontenddomain}) {
|
|
|
|
return 301 https://\$host\$request_uri;
|
|
|
|
}
|
|
|
|
|
|
|
|
listen 80;
|
|
|
|
server_name ${frontenddomain};
|
|
|
|
return 404;
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
)"
|
|
|
|
echo "${nginxfrontend}" | sudo tee /etc/nginx/sites-available/frontend.conf > /dev/null
|
|
|
|
|
|
|
|
sudo ln -s /etc/nginx/sites-available/frontend.conf /etc/nginx/sites-enabled/frontend.conf
|
|
|
|
|
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
print_green 'Enabling Services'
|
2019-10-22 22:22:36 +00:00
|
|
|
|
2020-07-05 00:59:55 +00:00
|
|
|
for i in nginx celery.service celerybeat.service rmm.service
|
2019-10-22 22:22:36 +00:00
|
|
|
do
|
|
|
|
sudo systemctl enable ${i}
|
|
|
|
sudo systemctl restart ${i}
|
|
|
|
done
|
|
|
|
sleep 5
|
|
|
|
sudo systemctl enable meshcentral
|
|
|
|
|
2020-08-16 00:50:17 +00:00
|
|
|
print_green 'Starting meshcentral and waiting for it to install plugins'
|
2019-10-22 22:22:36 +00:00
|
|
|
|
|
|
|
sudo systemctl restart meshcentral
|
|
|
|
|
2020-08-16 00:50:17 +00:00
|
|
|
sleep 3
|
|
|
|
|
|
|
|
# The first time we start meshcentral, it will need some time to generate certs and install plugins.
|
|
|
|
# This will take anywhere from a few seconds to a few minutes depending on the server's hardware
|
|
|
|
# We will know it's ready once the last line of the systemd service stdout is 'MeshCentral HTTP server running on port.....'
|
|
|
|
while ! [[ $CHECK_MESH_READY ]]; do
|
|
|
|
CHECK_MESH_READY=$(sudo journalctl -u meshcentral.service -b --no-pager | grep "MeshCentral HTTP server running on port")
|
|
|
|
echo -ne "${GREEN}Mesh Central not ready yet...${NC}\n"
|
|
|
|
sleep 3
|
|
|
|
done
|
2019-10-22 22:22:36 +00:00
|
|
|
|
2020-04-13 00:09:01 +00:00
|
|
|
print_green 'Generating meshcentral login token key'
|
|
|
|
|
|
|
|
MESHTOKENKEY=$(node /meshcentral/node_modules/meshcentral --logintokenkey)
|
|
|
|
|
|
|
|
meshtoken="$(cat << EOF
|
|
|
|
MESH_TOKEN_KEY = "${MESHTOKENKEY}"
|
|
|
|
EOF
|
|
|
|
)"
|
2020-06-24 17:28:04 +00:00
|
|
|
echo "${meshtoken}" | tee --append /rmm/api/tacticalrmm/tacticalrmm/local_settings.py > /dev/null
|
|
|
|
|
|
|
|
|
|
|
|
print_green 'Creating meshcentral account and group'
|
|
|
|
|
|
|
|
sudo systemctl stop meshcentral
|
2020-08-16 00:50:17 +00:00
|
|
|
sleep 3
|
2020-06-24 17:28:04 +00:00
|
|
|
cd /meshcentral
|
|
|
|
|
|
|
|
node node_modules/meshcentral --createaccount ${meshusername} --pass ${MESHPASSWD} --email ${letsemail}
|
2020-08-16 00:50:17 +00:00
|
|
|
sleep 2
|
2020-06-24 17:28:04 +00:00
|
|
|
node node_modules/meshcentral --adminaccount ${meshusername}
|
|
|
|
|
|
|
|
sudo systemctl start meshcentral
|
|
|
|
sleep 5
|
|
|
|
|
2020-08-16 00:50:17 +00:00
|
|
|
while ! [[ $CHECK_MESH_READY2 ]]; do
|
|
|
|
CHECK_MESH_READY2=$(sudo journalctl -u meshcentral.service -b --no-pager | grep "MeshCentral HTTP server running on port")
|
|
|
|
echo -ne "${GREEN}Mesh Central not ready yet...${NC}\n"
|
|
|
|
sleep 3
|
|
|
|
done
|
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
node node_modules/meshcentral/meshctrl.js --url wss://${meshdomain}:443 --loginuser ${meshusername} --loginpass ${MESHPASSWD} AddDeviceGroup --name TacticalRMM
|
2020-08-16 00:50:17 +00:00
|
|
|
sleep 5
|
2020-06-24 17:28:04 +00:00
|
|
|
MESHEXE=$(node node_modules/meshcentral/meshctrl.js --url wss://${meshdomain}:443 --loginuser ${meshusername} --loginpass ${MESHPASSWD} GenerateInviteLink --group TacticalRMM --hours 8)
|
2020-04-13 00:09:01 +00:00
|
|
|
|
2020-07-02 08:02:56 +00:00
|
|
|
cd /rmm/api/tacticalrmm
|
|
|
|
source /rmm/api/env/bin/activate
|
|
|
|
python manage.py initial_db_setup
|
|
|
|
deactivate
|
|
|
|
|
|
|
|
|
2020-06-24 17:28:04 +00:00
|
|
|
print_green 'Restarting services'
|
2020-07-05 00:59:55 +00:00
|
|
|
for i in celery.service celerybeat.service rmm.service
|
2020-04-13 00:09:01 +00:00
|
|
|
do
|
|
|
|
sudo systemctl restart ${i}
|
|
|
|
done
|
|
|
|
|
2019-10-22 22:22:36 +00:00
|
|
|
print_green 'Restarting salt-master and waiting 30 seconds'
|
|
|
|
sudo systemctl restart salt-master
|
|
|
|
sleep 30
|
|
|
|
sudo systemctl restart salt-api
|
|
|
|
|
2020-03-01 00:46:23 +00:00
|
|
|
printf >&2 "${YELLOW}%0.s*${NC}" {1..80}
|
2019-10-22 22:22:36 +00:00
|
|
|
printf >&2 "\n\n"
|
2020-03-01 00:46:23 +00:00
|
|
|
printf >&2 "${YELLOW}Installation complete!${NC}\n\n"
|
2020-08-27 09:38:51 +00:00
|
|
|
printf >&2 "${YELLOW}Download the meshagent 64 bit EXE from:\n\n${GREEN}"
|
|
|
|
echo ${MESHEXE} | sed 's/{.*}//'
|
|
|
|
printf >&2 "${NC}\n\n"
|
2020-06-24 17:28:04 +00:00
|
|
|
printf >&2 "${YELLOW}Access your rmm at: ${GREEN}https://${frontenddomain}${NC}\n\n"
|
2020-03-01 00:46:23 +00:00
|
|
|
printf >&2 "${YELLOW}Django admin url: ${GREEN}https://${rmmdomain}/${ADMINURL}${NC}\n\n"
|
2020-06-24 17:28:04 +00:00
|
|
|
printf >&2 "${YELLOW}MeshCentral password: ${GREEN}${MESHPASSWD}${NC}\n\n"
|
2020-08-15 04:25:42 +00:00
|
|
|
|
|
|
|
if [ "$BEHIND_NAT" = true ]; then
|
|
|
|
echo -ne "${YELLOW}Read below if your router does NOT support Hairpin NAT${NC}\n\n"
|
|
|
|
echo -ne "${GREEN}If you will be accessing the web interface of the RMM from the same LAN as this server,${NC}\n"
|
|
|
|
echo -ne "${GREEN}you'll need to make sure your 3 subdomains resolve to ${IPV4}${NC}\n"
|
|
|
|
echo -ne "${GREEN}This also applies to any agents that will be on the same local network as the rmm.${NC}\n"
|
|
|
|
echo -ne "${GREEN}You'll also need to setup port forwarding in your router on ports 80, 443, 4505 and 4506 tcp.${NC}\n\n"
|
|
|
|
fi
|
|
|
|
|
2020-03-01 00:46:23 +00:00
|
|
|
printf >&2 "${YELLOW}Please refer to the github README for next steps${NC}\n\n"
|
|
|
|
printf >&2 "${YELLOW}%0.s*${NC}" {1..80}
|
2019-11-17 10:12:40 +00:00
|
|
|
printf >&2 "\n"
|