2022-06-15 20:04:58 +00:00
|
|
|
#!/usr/bin/env bash
|
2019-12-15 05:37:47 +00:00
|
|
|
|
2023-10-01 15:59:14 +00:00
|
|
|
SCRIPT_VERSION="148"
|
2022-03-18 18:09:58 +00:00
|
|
|
SCRIPT_URL='https://raw.githubusercontent.com/amidaware/tacticalrmm/master/update.sh'
|
|
|
|
LATEST_SETTINGS_URL='https://raw.githubusercontent.com/amidaware/tacticalrmm/master/api/tacticalrmm/tacticalrmm/settings.py'
|
2020-08-12 09:00:40 +00:00
|
|
|
YELLOW='\033[1;33m'
|
|
|
|
GREEN='\033[0;32m'
|
2020-09-20 21:29:21 +00:00
|
|
|
RED='\033[0;31m'
|
2020-08-12 09:00:40 +00:00
|
|
|
NC='\033[0m'
|
2021-03-23 07:39:06 +00:00
|
|
|
THIS_SCRIPT=$(readlink -f "$0")
|
2020-08-12 09:00:40 +00:00
|
|
|
|
2022-05-24 22:03:24 +00:00
|
|
|
SCRIPTS_DIR='/opt/trmm-community-scripts'
|
2023-06-19 05:29:10 +00:00
|
|
|
PYTHON_VER='3.11.4'
|
2022-05-24 22:03:24 +00:00
|
|
|
SETTINGS_FILE='/rmm/api/tacticalrmm/tacticalrmm/settings.py'
|
2022-01-24 05:07:08 +00:00
|
|
|
|
2020-08-12 09:00:40 +00:00
|
|
|
TMP_FILE=$(mktemp -p "" "rmmupdate_XXXXXXXXXX")
|
2023-03-21 05:57:24 +00:00
|
|
|
curl -s -L "${SCRIPT_URL}" >${TMP_FILE}
|
2020-08-12 09:00:40 +00:00
|
|
|
NEW_VER=$(grep "^SCRIPT_VERSION" "$TMP_FILE" | awk -F'[="]' '{print $3}')
|
|
|
|
|
2020-09-25 05:02:27 +00:00
|
|
|
if [ "${SCRIPT_VERSION}" -ne "${NEW_VER}" ]; then
|
2023-03-21 05:57:24 +00:00
|
|
|
printf >&2 "${YELLOW}Old update script detected, downloading and replacing with the latest version...${NC}\n"
|
|
|
|
wget -q "${SCRIPT_URL}" -O update.sh
|
|
|
|
exec ${THIS_SCRIPT}
|
2020-08-12 09:00:40 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
rm -f $TMP_FILE
|
|
|
|
|
2021-02-24 11:24:47 +00:00
|
|
|
force=false
|
|
|
|
if [[ $* == *--force* ]]; then
|
2023-03-21 05:57:24 +00:00
|
|
|
force=true
|
2021-02-24 11:24:47 +00:00
|
|
|
fi
|
|
|
|
|
2020-08-19 20:15:17 +00:00
|
|
|
if [ $EUID -eq 0 ]; then
|
|
|
|
echo -ne "\033[0;31mDo NOT run this script as root. Exiting.\e[0m\n"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2021-03-26 05:51:23 +00:00
|
|
|
sudo apt update
|
|
|
|
|
2020-09-20 21:29:21 +00:00
|
|
|
strip="User="
|
|
|
|
ORIGUSER=$(grep ${strip} /etc/systemd/system/rmm.service | sed -e "s/^${strip}//")
|
|
|
|
|
|
|
|
if [ "$ORIGUSER" != "$USER" ]; then
|
|
|
|
printf >&2 "${RED}ERROR: You must run this update script from the same user account used during install: ${GREEN}${ORIGUSER}${NC}\n"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2020-11-01 09:18:22 +00:00
|
|
|
TMP_SETTINGS=$(mktemp -p "" "rmmsettings_XXXXXXXXXX")
|
2023-03-21 05:57:24 +00:00
|
|
|
curl -s -L "${LATEST_SETTINGS_URL}" >${TMP_SETTINGS}
|
2020-11-01 09:18:22 +00:00
|
|
|
|
|
|
|
LATEST_TRMM_VER=$(grep "^TRMM_VERSION" "$TMP_SETTINGS" | awk -F'[= "]' '{print $5}')
|
|
|
|
CURRENT_TRMM_VER=$(grep "^TRMM_VERSION" "$SETTINGS_FILE" | awk -F'[= "]' '{print $5}')
|
|
|
|
|
2021-02-24 11:24:47 +00:00
|
|
|
if [[ "${CURRENT_TRMM_VER}" == "${LATEST_TRMM_VER}" ]] && ! [[ "$force" = true ]]; then
|
|
|
|
printf >&2 "${GREEN}Already on latest version. Current version: ${CURRENT_TRMM_VER} Latest version: ${LATEST_TRMM_VER}${NC}\n"
|
|
|
|
rm -f $TMP_SETTINGS
|
|
|
|
exit 0
|
2020-11-01 09:18:22 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
LATEST_MESH_VER=$(grep "^MESH_VER" "$TMP_SETTINGS" | awk -F'[= "]' '{print $5}')
|
|
|
|
LATEST_PIP_VER=$(grep "^PIP_VER" "$TMP_SETTINGS" | awk -F'[= "]' '{print $5}')
|
2021-08-29 08:13:04 +00:00
|
|
|
NATS_SERVER_VER=$(grep "^NATS_SERVER_VER" "$TMP_SETTINGS" | awk -F'[= "]' '{print $5}')
|
2020-11-01 09:18:22 +00:00
|
|
|
|
|
|
|
CURRENT_PIP_VER=$(grep "^PIP_VER" "$SETTINGS_FILE" | awk -F'[= "]' '{print $5}')
|
|
|
|
|
2021-04-04 01:13:27 +00:00
|
|
|
cls() {
|
|
|
|
printf "\033c"
|
|
|
|
}
|
|
|
|
|
2023-10-01 15:59:14 +00:00
|
|
|
if [ ! -d /etc/apt/keyrings ]; then
|
|
|
|
sudo mkdir -p /etc/apt/keyrings
|
|
|
|
fi
|
|
|
|
|
2021-12-09 00:06:33 +00:00
|
|
|
CHECK_NATS_LIMITNOFILE=$(grep LimitNOFILE /etc/systemd/system/nats.service)
|
|
|
|
if ! [[ $CHECK_NATS_LIMITNOFILE ]]; then
|
|
|
|
|
2023-03-21 05:57:24 +00:00
|
|
|
sudo rm -f /etc/systemd/system/nats.service
|
2021-12-09 00:06:33 +00:00
|
|
|
|
2023-03-21 05:57:24 +00:00
|
|
|
natsservice="$(
|
|
|
|
cat <<EOF
|
2021-12-09 00:06:33 +00:00
|
|
|
[Unit]
|
|
|
|
Description=NATS Server
|
|
|
|
After=network.target
|
|
|
|
|
|
|
|
[Service]
|
|
|
|
PrivateTmp=true
|
|
|
|
Type=simple
|
|
|
|
ExecStart=/usr/local/bin/nats-server -c /rmm/api/tacticalrmm/nats-rmm.conf
|
|
|
|
ExecReload=/usr/bin/kill -s HUP \$MAINPID
|
|
|
|
ExecStop=/usr/bin/kill -s SIGINT \$MAINPID
|
|
|
|
User=${USER}
|
|
|
|
Group=www-data
|
|
|
|
Restart=always
|
|
|
|
RestartSec=5s
|
|
|
|
LimitNOFILE=1000000
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|
|
|
|
EOF
|
2023-03-21 05:57:24 +00:00
|
|
|
)"
|
|
|
|
echo "${natsservice}" | sudo tee /etc/systemd/system/nats.service >/dev/null
|
|
|
|
sudo systemctl daemon-reload
|
2021-12-09 00:06:33 +00:00
|
|
|
fi
|
|
|
|
|
2022-07-03 22:44:59 +00:00
|
|
|
rmmconf='/etc/nginx/sites-available/rmm.conf'
|
|
|
|
CHECK_NATS_WEBSOCKET=$(grep natsws $rmmconf)
|
|
|
|
if ! [[ $CHECK_NATS_WEBSOCKET ]]; then
|
|
|
|
echo "Adding nats websocket to nginx config"
|
|
|
|
echo "$(awk '
|
|
|
|
/location \/ {/ {
|
|
|
|
print " location ~ ^/natsws {"
|
|
|
|
print " proxy_pass http://127.0.0.1:9235;"
|
|
|
|
print " proxy_http_version 1.1;"
|
|
|
|
print " proxy_set_header Host $host;"
|
|
|
|
print " proxy_set_header Upgrade $http_upgrade;"
|
|
|
|
print " proxy_set_header Connection \"upgrade\";"
|
|
|
|
print " proxy_set_header X-Forwarded-Host $host:$server_port;"
|
|
|
|
print " proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;"
|
|
|
|
print " proxy_set_header X-Forwarded-Proto $scheme;"
|
|
|
|
print " }"
|
|
|
|
print "\n"
|
|
|
|
}
|
|
|
|
{ print }
|
2023-03-21 05:57:24 +00:00
|
|
|
' $rmmconf)" | sudo tee $rmmconf >/dev/null
|
2022-07-03 22:44:59 +00:00
|
|
|
fi
|
|
|
|
|
2023-04-30 17:18:03 +00:00
|
|
|
CHECK_ASSETS_NGINX=$(grep assets $rmmconf)
|
|
|
|
if ! [[ $CHECK_ASSETS_NGINX ]]; then
|
|
|
|
echo "Adding assets to nginx config"
|
|
|
|
echo "$(awk '
|
|
|
|
/location \/ {/ {
|
|
|
|
print " location /assets/ {"
|
|
|
|
print " internal;"
|
2023-05-11 16:59:21 +00:00
|
|
|
print " add_header 'Access-Control-Allow-Origin' 'https://${APP_HOST}';"
|
|
|
|
print " alias /opt/tactical/reporting/assets/;"
|
2023-04-30 17:18:03 +00:00
|
|
|
print " }"
|
|
|
|
print "\n"
|
|
|
|
}
|
|
|
|
{ print }
|
|
|
|
' $rmmconf)" | sudo tee $rmmconf >/dev/null
|
|
|
|
fi
|
|
|
|
|
2023-01-18 20:13:06 +00:00
|
|
|
printf >&2 "${GREEN}Stopping celery and celerybeat services (this might take a while)...${NC}\n"
|
2023-03-21 05:57:24 +00:00
|
|
|
for i in celerybeat celery; do
|
|
|
|
sudo systemctl stop ${i}
|
2023-01-18 20:13:06 +00:00
|
|
|
done
|
|
|
|
|
2023-03-21 05:57:24 +00:00
|
|
|
for i in nginx nats-api nats rmm daphne; do
|
|
|
|
printf >&2 "${GREEN}Stopping ${i} service...${NC}\n"
|
|
|
|
sudo systemctl stop ${i}
|
2020-11-01 09:18:22 +00:00
|
|
|
done
|
|
|
|
|
2022-10-07 17:15:37 +00:00
|
|
|
CHECK_DAPHNE=$(grep v2 /etc/systemd/system/daphne.service)
|
|
|
|
if ! [[ $CHECK_DAPHNE ]]; then
|
|
|
|
|
2023-03-21 05:57:24 +00:00
|
|
|
sudo rm -f /etc/systemd/system/daphne.service
|
2022-10-07 17:15:37 +00:00
|
|
|
|
2023-03-21 05:57:24 +00:00
|
|
|
daphneservice="$(
|
|
|
|
cat <<EOF
|
2022-10-07 17:15:37 +00:00
|
|
|
[Unit]
|
|
|
|
Description=django channels daemon v2
|
|
|
|
After=network.target
|
|
|
|
|
|
|
|
[Service]
|
|
|
|
User=${USER}
|
|
|
|
Group=www-data
|
|
|
|
WorkingDirectory=/rmm/api/tacticalrmm
|
|
|
|
Environment="PATH=/rmm/api/env/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
|
|
|
ExecStart=/rmm/api/env/bin/daphne -u /rmm/daphne.sock tacticalrmm.asgi:application
|
|
|
|
ExecStartPre=rm -f /rmm/daphne.sock
|
|
|
|
ExecStartPre=rm -f /rmm/daphne.sock.lock
|
|
|
|
Restart=always
|
|
|
|
RestartSec=3s
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|
|
|
|
EOF
|
2023-03-21 05:57:24 +00:00
|
|
|
)"
|
|
|
|
echo "${daphneservice}" | sudo tee /etc/systemd/system/daphne.service >/dev/null
|
|
|
|
sudo systemctl daemon-reload
|
2022-10-07 17:15:37 +00:00
|
|
|
fi
|
|
|
|
|
2022-07-26 08:09:49 +00:00
|
|
|
if [ ! -f /etc/apt/sources.list.d/nginx.list ]; then
|
2023-03-21 05:57:24 +00:00
|
|
|
osname=$(lsb_release -si)
|
|
|
|
osname=${osname^}
|
|
|
|
osname=$(echo "$osname" | tr '[A-Z]' '[a-z]')
|
|
|
|
codename=$(lsb_release -sc)
|
|
|
|
nginxrepo="$(
|
|
|
|
cat <<EOF
|
2023-10-01 15:59:14 +00:00
|
|
|
deb [signed-by=/etc/apt/keyrings/nginx-archive-keyring.gpg] http://nginx.org/packages/$osname $codename nginx
|
2022-07-26 08:09:49 +00:00
|
|
|
EOF
|
2023-03-21 05:57:24 +00:00
|
|
|
)"
|
|
|
|
echo "${nginxrepo}" | sudo tee /etc/apt/sources.list.d/nginx.list >/dev/null
|
2023-10-01 15:59:14 +00:00
|
|
|
wget -qO - https://nginx.org/packages/keys/nginx_signing.key | sudo gpg --dearmor -o /etc/apt/keyrings/nginx-archive-keyring.gpg
|
2023-03-21 05:57:24 +00:00
|
|
|
sudo apt update
|
|
|
|
sudo apt install -y nginx
|
2022-07-26 08:09:49 +00:00
|
|
|
fi
|
|
|
|
|
2022-07-09 08:09:24 +00:00
|
|
|
nginxdefaultconf='/etc/nginx/nginx.conf'
|
2022-07-26 08:09:49 +00:00
|
|
|
CHECK_NGINX_WORKER_CONN=$(grep "worker_connections 4096" $nginxdefaultconf)
|
2021-01-17 01:16:28 +00:00
|
|
|
if ! [[ $CHECK_NGINX_WORKER_CONN ]]; then
|
2022-07-26 08:09:49 +00:00
|
|
|
printf >&2 "${GREEN}Changing nginx worker connections to 4096${NC}\n"
|
|
|
|
sudo sed -i 's/worker_connections.*/worker_connections 4096;/g' $nginxdefaultconf
|
2021-01-17 01:16:28 +00:00
|
|
|
fi
|
|
|
|
|
2022-07-09 08:09:24 +00:00
|
|
|
CHECK_NGINX_NOLIMIT=$(grep "worker_rlimit_nofile 1000000" $nginxdefaultconf)
|
|
|
|
if ! [[ $CHECK_NGINX_NOLIMIT ]]; then
|
2023-03-21 05:57:24 +00:00
|
|
|
sudo sed -i '/worker_rlimit_nofile.*/d' $nginxdefaultconf
|
|
|
|
printf >&2 "${GREEN}Increasing nginx open file limit${NC}\n"
|
|
|
|
sudo sed -i '1s/^/worker_rlimit_nofile 1000000;\
|
2022-07-09 08:09:24 +00:00
|
|
|
/' $nginxdefaultconf
|
|
|
|
fi
|
|
|
|
|
2022-07-26 08:09:49 +00:00
|
|
|
backend_conf='/etc/nginx/sites-available/rmm.conf'
|
|
|
|
CHECK_NGINX_REUSEPORT=$(grep reuseport $backend_conf)
|
|
|
|
if ! [[ $CHECK_NGINX_REUSEPORT ]]; then
|
2023-03-21 05:57:24 +00:00
|
|
|
printf >&2 "${GREEN}Setting nginx reuseport${NC}\n"
|
|
|
|
sudo sed -i 's/listen 443 ssl;/listen 443 ssl reuseport;/g' $backend_conf
|
2022-07-26 08:09:49 +00:00
|
|
|
fi
|
|
|
|
|
2022-07-09 08:09:24 +00:00
|
|
|
sudo sed -i 's/# server_names_hash_bucket_size.*/server_names_hash_bucket_size 64;/g' $nginxdefaultconf
|
2021-12-21 19:04:00 +00:00
|
|
|
|
2023-03-21 05:57:24 +00:00
|
|
|
if ! sudo nginx -t >/dev/null 2>&1; then
|
2022-07-26 08:09:49 +00:00
|
|
|
sudo nginx -t
|
|
|
|
echo -ne "\n"
|
|
|
|
echo -ne "${RED}You have syntax errors in your nginx configs. See errors above. Please fix them and re-run this script.${NC}\n"
|
|
|
|
echo -ne "${RED}Aborting...${NC}\n"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2023-03-20 01:58:54 +00:00
|
|
|
HAS_PY311=$(python3.11 --version | grep ${PYTHON_VER})
|
|
|
|
if ! [[ $HAS_PY311 ]]; then
|
2022-03-10 03:07:37 +00:00
|
|
|
printf >&2 "${GREEN}Updating to ${PYTHON_VER}${NC}\n"
|
2021-02-21 07:37:19 +00:00
|
|
|
sudo apt install -y build-essential zlib1g-dev libncurses5-dev libgdbm-dev libnss3-dev libssl-dev libreadline-dev libffi-dev libsqlite3-dev libbz2-dev
|
|
|
|
numprocs=$(nproc)
|
|
|
|
cd ~
|
2022-03-10 03:07:37 +00:00
|
|
|
wget https://www.python.org/ftp/python/${PYTHON_VER}/Python-${PYTHON_VER}.tgz
|
|
|
|
tar -xf Python-${PYTHON_VER}.tgz
|
|
|
|
cd Python-${PYTHON_VER}
|
2021-02-21 07:37:19 +00:00
|
|
|
./configure --enable-optimizations
|
|
|
|
make -j $numprocs
|
|
|
|
sudo make altinstall
|
|
|
|
cd ~
|
2022-03-10 03:07:37 +00:00
|
|
|
sudo rm -rf Python-${PYTHON_VER} Python-${PYTHON_VER}.tgz
|
2021-02-21 07:37:19 +00:00
|
|
|
fi
|
|
|
|
|
2023-07-04 08:53:06 +00:00
|
|
|
arch=$(uname -m)
|
|
|
|
nats_server='/usr/local/bin/nats-server'
|
|
|
|
|
2021-08-29 08:13:04 +00:00
|
|
|
HAS_LATEST_NATS=$(/usr/local/bin/nats-server -version | grep "${NATS_SERVER_VER}")
|
|
|
|
if ! [[ $HAS_LATEST_NATS ]]; then
|
|
|
|
printf >&2 "${GREEN}Updating nats to v${NATS_SERVER_VER}${NC}\n"
|
2021-03-16 17:03:02 +00:00
|
|
|
nats_tmp=$(mktemp -d -t nats-XXXXXXXXXX)
|
2023-07-04 08:53:06 +00:00
|
|
|
if [ "$arch" = "x86_64" ]; then
|
|
|
|
natsarch='amd64'
|
|
|
|
else
|
|
|
|
natsarch='arm64'
|
|
|
|
fi
|
|
|
|
wget https://github.com/nats-io/nats-server/releases/download/v${NATS_SERVER_VER}/nats-server-v${NATS_SERVER_VER}-linux-${natsarch}.tar.gz -P ${nats_tmp}
|
|
|
|
tar -xzf ${nats_tmp}/nats-server-v${NATS_SERVER_VER}-linux-${natsarch}.tar.gz -C ${nats_tmp}
|
|
|
|
sudo rm -f $nats_server
|
|
|
|
sudo mv ${nats_tmp}/nats-server-v${NATS_SERVER_VER}-linux-${natsarch}/nats-server /usr/local/bin/
|
|
|
|
sudo chmod +x $nats_server
|
|
|
|
sudo chown ${USER}:${USER} $nats_server
|
2021-03-16 17:03:02 +00:00
|
|
|
rm -rf ${nats_tmp}
|
|
|
|
fi
|
|
|
|
|
2022-03-10 03:07:37 +00:00
|
|
|
if [ -d ~/.npm ]; then
|
|
|
|
sudo rm -rf ~/.npm
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -d ~/.cache ]; then
|
|
|
|
sudo rm -rf ~/.cache
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -d ~/.config ]; then
|
|
|
|
sudo chown -R $USER:$GROUP ~/.config
|
|
|
|
fi
|
|
|
|
|
2021-03-16 23:09:38 +00:00
|
|
|
sudo npm install -g npm
|
|
|
|
|
2022-01-21 23:11:27 +00:00
|
|
|
# update from main repo
|
2020-11-01 09:18:22 +00:00
|
|
|
cd /rmm
|
2020-11-25 01:18:26 +00:00
|
|
|
git config user.email "admin@example.com"
|
|
|
|
git config user.name "Bob"
|
2020-11-01 09:18:22 +00:00
|
|
|
git fetch
|
|
|
|
git checkout master
|
|
|
|
git reset --hard FETCH_HEAD
|
|
|
|
git clean -df
|
|
|
|
git pull
|
|
|
|
|
2022-01-21 23:11:27 +00:00
|
|
|
# update from community-scripts repo
|
2022-01-24 05:07:08 +00:00
|
|
|
if [[ ! -d ${SCRIPTS_DIR} ]]; then
|
|
|
|
sudo mkdir -p ${SCRIPTS_DIR}
|
|
|
|
sudo chown ${USER}:${USER} ${SCRIPTS_DIR}
|
|
|
|
git clone https://github.com/amidaware/community-scripts.git ${SCRIPTS_DIR}/
|
|
|
|
cd ${SCRIPTS_DIR}
|
2022-01-21 23:11:27 +00:00
|
|
|
git config user.email "admin@example.com"
|
|
|
|
git config user.name "Bob"
|
|
|
|
else
|
2022-01-24 05:07:08 +00:00
|
|
|
cd ${SCRIPTS_DIR}
|
2022-01-21 23:11:27 +00:00
|
|
|
git config user.email "admin@example.com"
|
|
|
|
git config user.name "Bob"
|
|
|
|
git fetch
|
2022-01-22 04:27:14 +00:00
|
|
|
git checkout main
|
2022-01-21 23:11:27 +00:00
|
|
|
git reset --hard FETCH_HEAD
|
|
|
|
git clean -df
|
|
|
|
git pull
|
|
|
|
fi
|
|
|
|
|
2021-05-05 07:58:30 +00:00
|
|
|
SETUPTOOLS_VER=$(grep "^SETUPTOOLS_VER" "$SETTINGS_FILE" | awk -F'[= "]' '{print $5}')
|
|
|
|
WHEEL_VER=$(grep "^WHEEL_VER" "$SETTINGS_FILE" | awk -F'[= "]' '{print $5}')
|
|
|
|
|
2020-08-25 00:38:23 +00:00
|
|
|
sudo chown ${USER}:${USER} -R /rmm
|
2022-01-24 05:07:08 +00:00
|
|
|
sudo chown ${USER}:${USER} -R ${SCRIPTS_DIR}
|
2020-08-25 00:38:23 +00:00
|
|
|
sudo chown ${USER}:${USER} /var/log/celery
|
2020-09-08 02:57:05 +00:00
|
|
|
sudo chown ${USER}:${USER} -R /etc/conf.d/
|
2020-11-26 03:42:27 +00:00
|
|
|
sudo chown ${USER}:${USER} -R /etc/letsencrypt
|
2023-07-05 02:02:58 +00:00
|
|
|
|
|
|
|
if [ -d /rmmbackups ]; then
|
|
|
|
sudo chown ${USER}:${USER} -R /rmmbackups
|
|
|
|
fi
|
2023-05-11 18:59:39 +00:00
|
|
|
|
2022-04-09 17:09:54 +00:00
|
|
|
CHECK_CELERY_CONFIG=$(grep "autoscale=20,2" /etc/conf.d/celery.conf)
|
|
|
|
if ! [[ $CHECK_CELERY_CONFIG ]]; then
|
|
|
|
sed -i 's/CELERYD_OPTS=.*/CELERYD_OPTS="--time-limit=86400 --autoscale=20,2"/g' /etc/conf.d/celery.conf
|
|
|
|
fi
|
|
|
|
|
2021-02-27 23:19:35 +00:00
|
|
|
CHECK_ADMIN_ENABLED=$(grep ADMIN_ENABLED /rmm/api/tacticalrmm/tacticalrmm/local_settings.py)
|
|
|
|
if ! [[ $CHECK_ADMIN_ENABLED ]]; then
|
2023-03-21 05:57:24 +00:00
|
|
|
adminenabled="$(
|
|
|
|
cat <<EOF
|
2021-02-27 23:19:35 +00:00
|
|
|
ADMIN_ENABLED = False
|
|
|
|
EOF
|
2023-03-21 05:57:24 +00:00
|
|
|
)"
|
|
|
|
echo "${adminenabled}" | tee --append /rmm/api/tacticalrmm/tacticalrmm/local_settings.py >/dev/null
|
2021-02-27 23:19:35 +00:00
|
|
|
fi
|
|
|
|
|
2023-07-04 08:53:06 +00:00
|
|
|
if [ "$arch" = "x86_64" ]; then
|
|
|
|
natsapi='nats-api'
|
|
|
|
else
|
|
|
|
natsapi='nats-api-arm64'
|
|
|
|
fi
|
|
|
|
|
|
|
|
nats_api='/usr/local/bin/nats-api'
|
|
|
|
sudo cp /rmm/natsapi/bin/${natsapi} $nats_api
|
|
|
|
sudo chown ${USER}:${USER} $nats_api
|
|
|
|
sudo chmod +x $nats_api
|
2023-05-01 14:32:21 +00:00
|
|
|
echo 'Checking for reporting connection'
|
2023-04-30 17:18:03 +00:00
|
|
|
CHECK_REPORTING_DB_CONNECTION=$(grep 'reporting': /rmm/api/tacticalrmm/tacticalrmm/local_settings.py)
|
|
|
|
if ! [[ $CHECK_REPORTING_DB_CONNECTION ]]; then
|
|
|
|
pgreportingusername=$(cat /dev/urandom | tr -dc 'a-z' | fold -w 8 | head -n 1)
|
|
|
|
pgreportingpw=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 20 | head -n 1)
|
2023-05-01 14:32:21 +00:00
|
|
|
|
|
|
|
echo 'Creating reporting user'
|
|
|
|
sudo -u postgres psql -c "CREATE USER ${pgreportingusername} WITH PASSWORD '${pgreportingpw}'"
|
|
|
|
sudo -u postgres psql -c "GRANT CONNECT ON DATABASE tacticalrmm TO ${pgreportingusername}"
|
|
|
|
sudo -u postgres psql -c "GRANT USAGE ON SCHEMA public TO ${pgreportingusername}"
|
|
|
|
|
|
|
|
echo 'Creating reporting connection'
|
2023-04-30 17:18:03 +00:00
|
|
|
reportingconnection="$(
|
|
|
|
cat <<EOF
|
|
|
|
DATABASES['reporting'] = {
|
|
|
|
'ENGINE': 'django.db.backends.postgresql',
|
|
|
|
'NAME': 'tacticalrmm',
|
|
|
|
'USER': '${pgreportingusername}',
|
|
|
|
'PASSWORD': '${pgreportingpw}',
|
|
|
|
'HOST': 'localhost',
|
|
|
|
'PORT': '5432',
|
|
|
|
'OPTIONS': {
|
|
|
|
'options': '-c default_transaction_read_only=on'
|
|
|
|
}
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
)"
|
|
|
|
echo "${reportingconnection}" | tee --append /rmm/api/tacticalrmm/tacticalrmm/local_settings.py >/dev/null
|
|
|
|
fi
|
2021-01-17 01:16:28 +00:00
|
|
|
|
2021-02-24 11:24:47 +00:00
|
|
|
if [[ "${CURRENT_PIP_VER}" != "${LATEST_PIP_VER}" ]] || [[ "$force" = true ]]; then
|
2020-11-01 09:18:22 +00:00
|
|
|
rm -rf /rmm/api/env
|
|
|
|
cd /rmm/api
|
2023-03-20 01:58:54 +00:00
|
|
|
python3.11 -m venv env
|
2020-11-01 09:18:22 +00:00
|
|
|
source /rmm/api/env/bin/activate
|
|
|
|
cd /rmm/api/tacticalrmm
|
|
|
|
pip install --no-cache-dir --upgrade pip
|
2021-05-05 01:41:39 +00:00
|
|
|
pip install --no-cache-dir setuptools==${SETUPTOOLS_VER} wheel==${WHEEL_VER}
|
2020-11-01 09:18:22 +00:00
|
|
|
pip install --no-cache-dir -r requirements.txt
|
|
|
|
else
|
|
|
|
source /rmm/api/env/bin/activate
|
|
|
|
cd /rmm/api/tacticalrmm
|
2020-11-26 03:42:27 +00:00
|
|
|
pip install -r requirements.txt
|
2020-11-01 09:18:22 +00:00
|
|
|
fi
|
|
|
|
|
2023-04-30 17:18:03 +00:00
|
|
|
if [ ! -d /opt/tactical/reporting ]; then
|
|
|
|
sudo mkdir -p /opt/tactical/reporting
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ ! -d /opt/tactical/reporting/assets ]; then
|
|
|
|
sudo mkdir -p /opt/tactical/reporting/assets
|
|
|
|
fi
|
|
|
|
|
2023-05-01 14:32:21 +00:00
|
|
|
if [ ! -d /opt/tactical/reporting/assets ]; then
|
|
|
|
sudo mkdir -p /opt/tactical/reporting/schemas
|
|
|
|
fi
|
|
|
|
|
2023-07-09 03:05:42 +00:00
|
|
|
sudo chown -R ${USER}:${USER} /opt/tactical
|
2023-05-01 14:32:21 +00:00
|
|
|
|
2020-08-13 01:53:24 +00:00
|
|
|
python manage.py pre_update_tasks
|
2022-03-20 09:00:33 +00:00
|
|
|
celery -A tacticalrmm purge -f
|
2019-12-15 05:37:47 +00:00
|
|
|
python manage.py migrate
|
2023-07-09 00:22:49 +00:00
|
|
|
python manage.py generate_json_schemas
|
2020-02-02 09:30:50 +00:00
|
|
|
python manage.py delete_tokens
|
2020-08-10 20:29:42 +00:00
|
|
|
python manage.py collectstatic --no-input
|
2020-11-26 03:42:27 +00:00
|
|
|
python manage.py reload_nats
|
2021-01-19 23:43:37 +00:00
|
|
|
python manage.py load_chocos
|
2021-06-30 06:45:50 +00:00
|
|
|
python manage.py create_installer_user
|
2021-11-13 21:30:01 +00:00
|
|
|
python manage.py create_natsapi_conf
|
2022-10-18 00:23:10 +00:00
|
|
|
python manage.py create_uwsgi_conf
|
2022-12-30 01:24:57 +00:00
|
|
|
python manage.py clear_redis_celery_locks
|
2023-05-01 14:32:21 +00:00
|
|
|
python manage.py setup_reporting_permissions
|
2020-08-13 01:53:24 +00:00
|
|
|
python manage.py post_update_tasks
|
2022-05-24 22:03:24 +00:00
|
|
|
API=$(python manage.py get_config api)
|
|
|
|
WEB_VERSION=$(python manage.py get_config webversion)
|
2023-08-11 05:14:43 +00:00
|
|
|
FRONTEND=$(python manage.py get_config webdomain)
|
|
|
|
MESHDOMAIN=$(python manage.py get_config meshdomain)
|
2019-12-15 05:37:47 +00:00
|
|
|
deactivate
|
|
|
|
|
2023-08-11 05:14:43 +00:00
|
|
|
if grep -q manage_etc_hosts /etc/hosts; then
|
2023-08-11 22:07:59 +00:00
|
|
|
sudo sed -i '/manage_etc_hosts: true/d' /etc/cloud/cloud.cfg >/dev/null
|
|
|
|
if ! grep -q "manage_etc_hosts: false" /etc/cloud/cloud.cfg; then
|
|
|
|
echo -e "\nmanage_etc_hosts: false" | sudo tee --append /etc/cloud/cloud.cfg >/dev/null
|
2023-08-11 05:14:43 +00:00
|
|
|
sudo systemctl restart cloud-init >/dev/null
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
CHECK_HOSTS=$(grep 127.0.1.1 /etc/hosts | grep "$API" | grep "$FRONTEND" | grep "$MESHDOMAIN")
|
|
|
|
HAS_11=$(grep 127.0.1.1 /etc/hosts)
|
|
|
|
|
|
|
|
if ! [[ $CHECK_HOSTS ]]; then
|
|
|
|
if [[ $HAS_11 ]]; then
|
|
|
|
sudo sed -i "/127.0.1.1/s/$/ ${API} ${FRONTEND} ${MESHDOMAIN}/" /etc/hosts
|
|
|
|
else
|
|
|
|
echo "127.0.1.1 ${API} ${FRONTEND} ${MESHDOMAIN}" | sudo tee --append /etc/hosts >/dev/null
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2022-05-24 22:03:24 +00:00
|
|
|
if [ -d /rmm/web ]; then
|
|
|
|
rm -rf /rmm/web
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ ! -d /var/www/rmm ]; then
|
|
|
|
sudo mkdir -p /var/www/rmm
|
2020-11-01 09:18:22 +00:00
|
|
|
fi
|
|
|
|
|
2022-05-24 22:03:24 +00:00
|
|
|
webtar="trmm-web-v${WEB_VERSION}.tar.gz"
|
|
|
|
wget -q https://github.com/amidaware/tacticalrmm-web/releases/download/v${WEB_VERSION}/${webtar} -O /tmp/${webtar}
|
2019-12-15 05:37:47 +00:00
|
|
|
sudo rm -rf /var/www/rmm/dist
|
2022-05-24 22:03:24 +00:00
|
|
|
sudo tar -xzf /tmp/${webtar} -C /var/www/rmm
|
2023-03-21 05:57:24 +00:00
|
|
|
echo "window._env_ = {PROD_URL: \"https://${API}\"}" | sudo tee /var/www/rmm/dist/env-config.js >/dev/null
|
2019-12-15 05:37:47 +00:00
|
|
|
sudo chown www-data:www-data -R /var/www/rmm/dist
|
2022-05-24 22:03:24 +00:00
|
|
|
rm -f /tmp/${webtar}
|
2019-12-15 05:37:47 +00:00
|
|
|
|
2023-03-21 05:57:24 +00:00
|
|
|
for i in nats nats-api rmm daphne celery celerybeat nginx; do
|
|
|
|
printf >&2 "${GREEN}Starting ${i} service${NC}\n"
|
|
|
|
sudo systemctl start ${i}
|
2019-12-16 22:45:18 +00:00
|
|
|
done
|
2020-06-14 19:52:20 +00:00
|
|
|
|
2021-02-18 08:53:02 +00:00
|
|
|
CURRENT_MESH_VER=$(cd /meshcentral/node_modules/meshcentral && node -p -e "require('./package.json').version")
|
2021-02-24 11:24:47 +00:00
|
|
|
if [[ "${CURRENT_MESH_VER}" != "${LATEST_MESH_VER}" ]] || [[ "$force" = true ]]; then
|
2020-11-01 09:18:22 +00:00
|
|
|
printf >&2 "${GREEN}Updating meshcentral from ${CURRENT_MESH_VER} to ${LATEST_MESH_VER}${NC}\n"
|
|
|
|
sudo systemctl stop meshcentral
|
|
|
|
sudo chown ${USER}:${USER} -R /meshcentral
|
|
|
|
cd /meshcentral
|
2023-08-18 04:28:58 +00:00
|
|
|
rm -rf node_modules/ package.json package-lock.json
|
|
|
|
mesh_pkg="$(
|
|
|
|
cat <<EOF
|
|
|
|
{
|
|
|
|
"dependencies": {
|
|
|
|
"archiver": "5.3.1",
|
|
|
|
"meshcentral": "${LATEST_MESH_VER}",
|
|
|
|
"otplib": "10.2.3",
|
|
|
|
"pg": "8.7.1",
|
|
|
|
"pgtools": "0.3.2"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
EOF
|
|
|
|
)"
|
|
|
|
echo "${mesh_pkg}" >/meshcentral/package.json
|
|
|
|
npm install
|
2020-11-01 09:18:22 +00:00
|
|
|
sudo systemctl start meshcentral
|
|
|
|
fi
|
2020-08-12 09:00:40 +00:00
|
|
|
|
2020-11-01 09:18:22 +00:00
|
|
|
rm -f $TMP_SETTINGS
|
2023-03-21 05:57:24 +00:00
|
|
|
printf >&2 "${GREEN}Update finished!${NC}\n"
|