* Run `mysql_upgrade` during MySQL upgrade with `wo stack upgrade` to perform migration if needed * WordOps now check if a repository already exist before trying to adding it again. * install script refactored
1472 lines
70 KiB
Python
1472 lines
70 KiB
Python
import configparser
|
|
import os
|
|
import random
|
|
import shutil
|
|
import string
|
|
|
|
import psutil
|
|
import requests
|
|
from wo.core.apt_repo import WORepo
|
|
from wo.core.aptget import WOAptGet
|
|
from wo.core.cron import WOCron
|
|
from wo.core.extract import WOExtract
|
|
from wo.core.fileutils import WOFileUtils
|
|
from wo.core.git import WOGit
|
|
from wo.core.logging import Log
|
|
from wo.core.mysql import WOMysql
|
|
from wo.core.nginxhashbucket import hashbucket
|
|
from wo.core.services import WOService
|
|
from wo.core.shellexec import CommandExecutionError, WOShellExec
|
|
from wo.core.sslutils import SSL
|
|
from wo.core.template import WOTemplate
|
|
from wo.core.variables import WOVar
|
|
|
|
|
|
def pre_pref(self, apt_packages):
|
|
"""Pre settings to do before installation packages"""
|
|
|
|
if ("mariadb-server" in apt_packages or "mariadb-client" in apt_packages):
|
|
# add mariadb repository excepted on raspbian and ubuntu 19.04
|
|
if (not WOVar.wo_distro == 'raspbian'):
|
|
Log.info(self, "Adding repository for MySQL, please wait...")
|
|
mysql_pref = ("Package: *\nPin: origin "
|
|
"sfo1.mirrors.digitalocean.com"
|
|
"\nPin-Priority: 1000\n")
|
|
with open('/etc/apt/preferences.d/'
|
|
'MariaDB.pref', 'w') as mysql_pref_file:
|
|
mysql_pref_file.write(mysql_pref)
|
|
WORepo.add(self, repo_url=WOVar.wo_mysql_repo)
|
|
WORepo.add_key(self, '0xcbcb082a1bb943db',
|
|
keyserver='keyserver.ubuntu.com')
|
|
WORepo.add_key(self, '0xF1656F24C74CD1D8',
|
|
keyserver='keyserver.ubuntu.com')
|
|
if "mariadb-server" in apt_packages:
|
|
# generate random 24 characters root password
|
|
chars = ''.join(random.sample(string.ascii_letters, 24))
|
|
|
|
# configure MySQL non-interactive install
|
|
if ((WOVar.wo_distro == 'raspbian') and
|
|
(WOVar.wo_platform_codename == 'stretch')):
|
|
mariadb_ver = '10.1'
|
|
else:
|
|
mariadb_ver = '10.3'
|
|
|
|
Log.debug(self, "Pre-seeding MySQL")
|
|
Log.debug(self, "echo \"mariadb-server-{0} "
|
|
"mysql-server/root_password "
|
|
"password \" | "
|
|
"debconf-set-selections"
|
|
.format(mariadb_ver))
|
|
try:
|
|
WOShellExec.cmd_exec(self, "echo \"mariadb-server-{0} "
|
|
"mysql-server/root_password "
|
|
"password {chars}\" | "
|
|
"debconf-set-selections"
|
|
.format(mariadb_ver, chars=chars),
|
|
log=False)
|
|
except CommandExecutionError as e:
|
|
Log.debug(self, "{0}".format(e))
|
|
Log.error(self, "Failed to initialize MySQL package")
|
|
|
|
Log.debug(self, "echo \"mariadb-server-{0} "
|
|
"mysql-server/root_password_again "
|
|
"password \" | "
|
|
"debconf-set-selections"
|
|
.format(mariadb_ver))
|
|
try:
|
|
WOShellExec.cmd_exec(self, "echo \"mariadb-server-{0} "
|
|
"mysql-server/root_password_again "
|
|
"password {chars}\" | "
|
|
"debconf-set-selections"
|
|
.format(mariadb_ver, chars=chars),
|
|
log=False)
|
|
except CommandExecutionError as e:
|
|
Log.debug(self, "{0}".format(e))
|
|
Log.error(self, "Failed to initialize MySQL package")
|
|
# generate my.cnf root credentials
|
|
mysql_config = """
|
|
[client]
|
|
user = root
|
|
password = {chars}
|
|
""".format(chars=chars)
|
|
config = configparser.ConfigParser()
|
|
config.read_string(mysql_config)
|
|
Log.debug(self, 'Writting configuration into MySQL file')
|
|
conf_path = "/etc/mysql/conf.d/my.cnf"
|
|
os.makedirs(os.path.dirname(conf_path), exist_ok=True)
|
|
with open(conf_path, encoding='utf-8',
|
|
mode='w') as configfile:
|
|
config.write(configfile)
|
|
Log.debug(self, 'Setting my.cnf permission')
|
|
WOFileUtils.chmod(self, "/etc/mysql/conf.d/my.cnf", 0o600)
|
|
|
|
# add nginx repository
|
|
if set(WOVar.wo_nginx).issubset(set(apt_packages)):
|
|
if (WOVar.wo_distro == 'ubuntu'):
|
|
if not os.path.isfile(
|
|
'wordops-ubuntu-nginx-wo-{0}.list'
|
|
.format(WOVar.wo_platform_codename)):
|
|
Log.info(self, "Adding repository for NGINX, please wait...")
|
|
WORepo.add(self, ppa=WOVar.wo_nginx_repo)
|
|
Log.debug(self, 'Adding ppa for Nginx')
|
|
else:
|
|
if not WOFileUtils.grepcheck(
|
|
self, '/etc/apt/sources.list/wo-repo.list',
|
|
'download.opensuse.org'):
|
|
Log.info(self, "Adding repository for NGINX, please wait...")
|
|
Log.debug(self, 'Adding repository for Nginx')
|
|
WORepo.add(self, repo_url=WOVar.wo_nginx_repo)
|
|
WORepo.add_key(self, WOVar.wo_nginx_key)
|
|
|
|
# add php repository
|
|
if (set(WOVar.wo_php73).issubset(set(apt_packages)) or
|
|
set(WOVar.wo_php).issubset(set(apt_packages))):
|
|
if (WOVar.wo_distro == 'ubuntu'):
|
|
Log.debug(self, 'Adding ppa for PHP')
|
|
if not os.path.isfile(
|
|
'/etc/apt/sources.list.d/ondrej-ubuntu-php-{0}.list'
|
|
.format(WOVar.wo_platform_codename)):
|
|
Log.info(self, "Adding repository for PHP, please wait...")
|
|
WORepo.add(self, ppa=WOVar.wo_php_repo)
|
|
else:
|
|
# Add repository for php
|
|
if (WOVar.wo_platform_codename == 'buster'):
|
|
php_pref = ("Package: *\nPin: origin "
|
|
"packages.sury.org"
|
|
"\nPin-Priority: 1000\n")
|
|
with open(
|
|
'/etc/apt/preferences.d/'
|
|
'PHP.pref', mode='w',
|
|
encoding='utf-8') as php_pref_file:
|
|
php_pref_file.write(php_pref)
|
|
if not WOFileUtils.grepcheck(
|
|
self, '/etc/apt/sources.list.d/wo-repo.list',
|
|
'packages.sury.org'):
|
|
Log.debug(self, 'Adding repo_url of php for debian')
|
|
Log.info(self, "Adding repository for PHP, please wait...")
|
|
WORepo.add(self, repo_url=WOVar.wo_php_repo)
|
|
Log.debug(self, 'Adding deb.sury GPG key')
|
|
WORepo.add_key(self, WOVar.wo_php_key)
|
|
# add redis repository
|
|
if set(WOVar.wo_redis).issubset(set(apt_packages)):
|
|
if WOVar.wo_distro == 'ubuntu':
|
|
if not os.path.isfile(
|
|
'/etc/apt/sources.list.d/'
|
|
'chris-lea-ubuntu-redis-server-{0}.list'
|
|
.format(WOVar.wo_platform_codename)):
|
|
Log.info(self, "Adding repository for Redis, please wait...")
|
|
Log.debug(self, 'Adding ppa for redis')
|
|
WORepo.add(self, ppa=WOVar.wo_redis_repo)
|
|
else:
|
|
if not WOFileUtils.grepcheck(
|
|
self, '/etc/apt/sources.list/wo-repo.list',
|
|
'download.opensuse.org'):
|
|
Log.info(self, "Adding repository for Redis, please wait...")
|
|
WORepo.add(self, repo_url=WOVar.wo_php_repo)
|
|
WORepo.add_key(self, WOVar.wo_nginx_key)
|
|
|
|
|
|
def post_pref(self, apt_packages, packages, upgrade=False):
|
|
"""Post activity after installation of packages"""
|
|
if (apt_packages):
|
|
# Nginx configuration
|
|
if set(WOVar.wo_nginx).issubset(set(apt_packages)):
|
|
Log.info(self, "Applying Nginx configuration templates")
|
|
# Nginx main configuration
|
|
ngxcnf = '/etc/nginx/conf.d'
|
|
ngxcom = '/etc/nginx/common'
|
|
ngxroot = '/var/www/'
|
|
WOGit.add(self, ["/etc/nginx"], msg="Adding Nginx into Git")
|
|
data = dict(tls13=True)
|
|
WOTemplate.deploy(self,
|
|
'/etc/nginx/nginx.conf',
|
|
'nginx-core.mustache', data)
|
|
|
|
if not os.path.isfile('{0}/gzip.conf.disabled'.format(ngxcnf)):
|
|
data = dict()
|
|
WOTemplate.deploy(self, '{0}/gzip.conf'.format(ngxcnf),
|
|
'gzip.mustache', data)
|
|
|
|
if not os.path.isfile('{0}/brotli.conf'.format(ngxcnf)):
|
|
WOTemplate.deploy(self,
|
|
'{0}/brotli.conf.disabled'
|
|
.format(ngxcnf),
|
|
'brotli.mustache', data)
|
|
|
|
WOTemplate.deploy(self, '{0}/tweaks.conf'.format(ngxcnf),
|
|
'tweaks.mustache', data)
|
|
|
|
# Fix for white screen death with NGINX PLUS
|
|
if not WOFileUtils.grep(self, '/etc/nginx/fastcgi_params',
|
|
'SCRIPT_FILENAME'):
|
|
with open('/etc/nginx/fastcgi_params',
|
|
encoding='utf-8', mode='a') as wo_nginx:
|
|
wo_nginx.write('fastcgi_param \tSCRIPT_FILENAME '
|
|
'\t$request_filename;\n')
|
|
try:
|
|
data = dict(php="9000", debug="9001",
|
|
php7="9070", debug7="9170")
|
|
WOTemplate.deploy(
|
|
self, '{0}/upstream.conf'.format(ngxcnf),
|
|
'upstream.mustache', data, overwrite=True)
|
|
|
|
data = dict(phpconf=True if
|
|
WOAptGet.is_installed(self, 'php7.2-fpm')
|
|
else False)
|
|
WOTemplate.deploy(self,
|
|
'{0}/stub_status.conf'.format(ngxcnf),
|
|
'stub_status.mustache', data)
|
|
data = dict()
|
|
WOTemplate.deploy(self,
|
|
'{0}/webp.conf'.format(ngxcnf),
|
|
'webp.mustache', data, overwrite=False)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/cloudflare.conf'.format(ngxcnf),
|
|
'cloudflare.mustache', data)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/map-wp-fastcgi-cache.conf'.format(
|
|
ngxcnf),
|
|
'map-wp.mustache', data)
|
|
except CommandExecutionError as e:
|
|
Log.debug(self, "{0}".format(e))
|
|
|
|
# Setup Nginx common directory
|
|
if not os.path.exists('{0}'.format(ngxcom)):
|
|
Log.debug(self, 'Creating directory'
|
|
'/etc/nginx/common')
|
|
os.makedirs('/etc/nginx/common')
|
|
|
|
try:
|
|
data = dict()
|
|
|
|
# Common Configuration
|
|
WOTemplate.deploy(self,
|
|
'{0}/locations-wo.conf'
|
|
.format(ngxcom),
|
|
'locations.mustache', data)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/wpsubdir.conf'
|
|
.format(ngxcom),
|
|
'wpsubdir.mustache', data)
|
|
data = dict(upstream="php72")
|
|
# PHP 7.2 conf
|
|
WOTemplate.deploy(self,
|
|
'{0}/php72.conf'
|
|
.format(ngxcom),
|
|
'php.mustache', data)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/redis-php72.conf'
|
|
.format(ngxcom),
|
|
'redis.mustache', data)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/wpcommon-php72.conf'
|
|
.format(ngxcom),
|
|
'wpcommon.mustache', data)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/wpfc-php72.conf'
|
|
.format(ngxcom),
|
|
'wpfc.mustache', data)
|
|
WOTemplate.deploy(self,
|
|
'{0}/wpsc-php72.conf'
|
|
.format(ngxcom),
|
|
'wpsc.mustache', data)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/wprocket-php72.conf'
|
|
.format(ngxcom),
|
|
'wprocket.mustache', data)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/wpce-php72.conf'
|
|
.format(ngxcom),
|
|
'wpce.mustache', data)
|
|
# PHP 7.3 conf
|
|
data = dict(upstream="php73")
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/php73.conf'
|
|
.format(ngxcom),
|
|
'php.mustache', data)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/redis-php73.conf'
|
|
.format(ngxcom),
|
|
'redis.mustache', data)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/wpcommon-php73.conf'
|
|
.format(ngxcom),
|
|
'wpcommon.mustache', data)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/wpfc-php73.conf'
|
|
.format(ngxcom),
|
|
'wpfc.mustache', data)
|
|
WOTemplate.deploy(self,
|
|
'{0}/wpsc-php73.conf'
|
|
.format(ngxcom),
|
|
'wpsc.mustache', data)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/wprocket-php73.conf'
|
|
.format(ngxcom),
|
|
'wprocket.mustache', data)
|
|
|
|
WOTemplate.deploy(self,
|
|
'{0}/wpce-php73.conf'
|
|
.format(ngxcom),
|
|
'wpce.mustache', data)
|
|
except CommandExecutionError as e:
|
|
Log.debug(self, "{0}".format(e))
|
|
|
|
with open("/etc/nginx/common/release",
|
|
"w") as release_file:
|
|
release_file.write("v{0}"
|
|
.format(WOVar.wo_version))
|
|
release_file.close()
|
|
|
|
# Following files should not be overwrited
|
|
|
|
data = dict(webroot=ngxroot)
|
|
WOTemplate.deploy(self,
|
|
'{0}/acl.conf'
|
|
.format(ngxcom),
|
|
'acl.mustache', data, overwrite=False)
|
|
WOTemplate.deploy(self,
|
|
'{0}/blockips.conf'
|
|
.format(ngxcnf),
|
|
'blockips.mustache', data, overwrite=False)
|
|
WOTemplate.deploy(self,
|
|
'{0}/fastcgi.conf'
|
|
.format(ngxcnf),
|
|
'fastcgi.mustache', data, overwrite=True)
|
|
|
|
# add redis cache format if not already done
|
|
if (os.path.isfile("/etc/nginx/nginx.conf") and
|
|
not os.path.isfile("/etc/nginx/conf.d"
|
|
"/redis.conf")):
|
|
with open("/etc/nginx/conf.d/"
|
|
"redis.conf", "a") as redis_file:
|
|
redis_file.write(
|
|
"# Log format Settings\n"
|
|
"log_format rt_cache_redis "
|
|
"'$remote_addr "
|
|
"$upstream_response_time "
|
|
"$srcache_fetch_status "
|
|
"[$time_local] '\n"
|
|
"'$http_host \"$request\" $status"
|
|
" $body_bytes_sent '\n"
|
|
"'\"$http_referer\" "
|
|
"\"$http_user_agent\"';\n")
|
|
|
|
# Nginx-Plus does not have nginx
|
|
# package structure like this
|
|
# So creating directories
|
|
if not os.path.exists('/etc/nginx/sites-available'):
|
|
Log.debug(self, 'Creating directory'
|
|
'/etc/nginx/sites-available')
|
|
os.makedirs('/etc/nginx/sites-available')
|
|
|
|
if not os.path.exists('/etc/nginx/sites-enabled'):
|
|
Log.debug(self, 'Creating directory'
|
|
'/etc/nginx/sites-available')
|
|
os.makedirs('/etc/nginx/sites-enabled')
|
|
|
|
# 22222 port settings
|
|
data = dict(webroot=ngxroot)
|
|
WOTemplate.deploy(
|
|
self,
|
|
'/etc/nginx/sites-available/22222',
|
|
'22222.mustache', data, overwrite=True)
|
|
passwd = ''.join([random.choice
|
|
(string.ascii_letters + string.digits)
|
|
for n in range(24)])
|
|
if not os.path.isfile('/etc/nginx/htpasswd-wo'):
|
|
try:
|
|
WOShellExec.cmd_exec(
|
|
self, "printf \"WordOps:"
|
|
"$(openssl passwd -crypt "
|
|
"{password} 2> /dev/null)\n\""
|
|
"> /etc/nginx/htpasswd-wo "
|
|
"2>/dev/null"
|
|
.format(password=passwd))
|
|
except CommandExecutionError as e:
|
|
Log.debug(self, "{0}".format(e))
|
|
Log.error(self, "Failed to save HTTP Auth")
|
|
if not os.path.islink('/etc/nginx/sites-enabled/22222'):
|
|
# Create Symbolic link for 22222
|
|
WOFileUtils.create_symlink(
|
|
self, ['/etc/nginx/'
|
|
'sites-available/'
|
|
'22222',
|
|
'/etc/nginx/'
|
|
'sites-enabled/'
|
|
'22222'])
|
|
# Create log and cert folder and softlinks
|
|
if not os.path.exists('{0}22222/logs'
|
|
.format(ngxroot)):
|
|
Log.debug(self, "Creating directory "
|
|
"{0}22222/logs "
|
|
.format(ngxroot))
|
|
os.makedirs('{0}22222/logs'
|
|
.format(ngxroot))
|
|
|
|
if not os.path.exists('{0}22222/cert'
|
|
.format(ngxroot)):
|
|
Log.debug(self, "Creating directory "
|
|
"{0}22222/cert"
|
|
.format(ngxroot))
|
|
os.makedirs('{0}22222/cert'
|
|
.format(ngxroot))
|
|
|
|
if not os.path.isdir('{0}22222/conf/nginx'
|
|
.format(ngxroot)):
|
|
Log.debug(self, "Creating directory "
|
|
"{0}22222/conf/nginx"
|
|
.format(ngxroot))
|
|
os.makedirs('{0}22222/conf/nginx'
|
|
.format(ngxroot))
|
|
|
|
WOFileUtils.create_symlink(
|
|
self,
|
|
['/var/log/nginx/'
|
|
'22222.access.log',
|
|
'{0}22222/'
|
|
'logs/access.log'
|
|
.format(ngxroot)]
|
|
)
|
|
|
|
WOFileUtils.create_symlink(
|
|
self,
|
|
['/var/log/nginx/'
|
|
'22222.error.log',
|
|
'{0}22222/'
|
|
'logs/error.log'
|
|
.format(ngxroot)]
|
|
)
|
|
if (not os.path.isfile('{0}22222/cert/22222.key'
|
|
.format(ngxroot))):
|
|
SSL.selfsignedcert(self, proftpd=False, backend=True)
|
|
|
|
if not os.path.isfile('{0}22222/conf/nginx/ssl.conf'
|
|
.format(ngxroot)):
|
|
with open("/var/www/22222/conf/nginx/"
|
|
"ssl.conf", "w") as php_file:
|
|
php_file.write("ssl_certificate "
|
|
"/var/www/22222/cert/22222.crt;\n"
|
|
"ssl_certificate_key "
|
|
"/var/www/22222/cert/22222.key;\n")
|
|
|
|
server_ip = requests.get('http://v4.wordops.eu')
|
|
|
|
if set(["nginx"]).issubset(set(apt_packages)):
|
|
print("WordOps backend configuration was successful\n"
|
|
"You can access it on : https://{0}:22222"
|
|
.format(server_ip))
|
|
print("HTTP Auth User Name: WordOps" +
|
|
"\nHTTP Auth Password : {0}".format(passwd))
|
|
WOService.reload_service(self, 'nginx')
|
|
else:
|
|
self.msg = (self.msg + ["HTTP Auth User "
|
|
"Name: WordOps"] +
|
|
["HTTP Auth Password : {0}"
|
|
.format(passwd)])
|
|
self.msg = (self.msg + ["WordOps backend is available "
|
|
"on https://{0}:22222 "
|
|
"or https://{1}:22222"
|
|
.format(server_ip.text,
|
|
WOVar.wo_fqdn)])
|
|
|
|
if not os.path.isfile("/opt/cf-update.sh"):
|
|
data = dict()
|
|
WOTemplate.deploy(self, '/opt/cf-update.sh',
|
|
'cf-update.mustache',
|
|
data, overwrite=False)
|
|
WOFileUtils.chmod(self, "/opt/cf-update.sh", 0o775)
|
|
WOCron.setcron_weekly(self, '/opt/cf-update.sh '
|
|
'> /dev/null 2>&1',
|
|
comment='Cloudflare IP refresh cronjob '
|
|
'added by WordOps')
|
|
|
|
# Nginx Configation into GIT
|
|
if not WOService.restart_service(self, 'nginx'):
|
|
try:
|
|
hashbucket(self)
|
|
WOService.restart_service(self, 'nginx')
|
|
except Exception:
|
|
Log.warn(
|
|
self, "increasing nginx server_names_hash_bucket_size "
|
|
"do not fix the issue")
|
|
Log.info(self, "Rolling back to previous configuration")
|
|
WOGit.rollback(self, ["/etc/nginx"])
|
|
if not WOService.restart_service(self, 'nginx'):
|
|
Log.error(
|
|
self, "There is an error in Nginx configuration.\n"
|
|
"Use the command nginx -t to identify "
|
|
"the cause of this issue", False)
|
|
else:
|
|
WOGit.add(self, ["/etc/nginx"], msg="Adding Nginx into Git")
|
|
if not os.path.isdir('/etc/systemd/system/nginx.service.d'):
|
|
WOFileUtils.mkdir(self,
|
|
'/etc/systemd/system/nginx.service.d')
|
|
if not os.path.isdir(
|
|
'/etc/systemd/system/nginx.service.d/limits.conf'):
|
|
with open(
|
|
'/etc/systemd/system/nginx.service.d/limits.conf',
|
|
encoding='utf-8', mode='w') as ngx_limit:
|
|
ngx_limit.write('[Service]\nLimitNOFILE=500000')
|
|
WOShellExec.cmd_exec(self, 'systemctl daemon-reload')
|
|
WOService.restart_service(self, 'nginx')
|
|
|
|
if set(WOVar.wo_php).issubset(set(apt_packages)):
|
|
WOGit.add(self, ["/etc/php"], msg="Adding PHP into Git")
|
|
Log.info(self, "Configuring php7.2-fpm")
|
|
ngxroot = '/var/www/'
|
|
# Create log directories
|
|
if not os.path.exists('/var/log/php/7.2/'):
|
|
Log.debug(self, 'Creating directory /var/log/php/7.2/')
|
|
os.makedirs('/var/log/php/7.2/')
|
|
|
|
if not os.path.isfile('/etc/php/7.2/fpm/php.ini.orig'):
|
|
WOFileUtils.copyfile(self, '/etc/php/7.2/fpm/php.ini',
|
|
'/etc/php/7.2/fpm/php.ini.orig')
|
|
|
|
# Parse etc/php/7.2/fpm/php.ini
|
|
config = configparser.ConfigParser()
|
|
Log.debug(self, "configuring php file "
|
|
"/etc/php/7.2/fpm/php.ini")
|
|
config.read('/etc/php/7.2/fpm/php.ini.orig')
|
|
config['PHP']['expose_php'] = 'Off'
|
|
config['PHP']['post_max_size'] = '100M'
|
|
config['PHP']['upload_max_filesize'] = '100M'
|
|
config['PHP']['max_execution_time'] = '300'
|
|
config['PHP']['max_input_time'] = '300'
|
|
config['PHP']['max_input_vars'] = '20000'
|
|
config['Date']['date.timezone'] = WOVar.wo_timezone
|
|
config['opcache']['opcache.enable'] = '1'
|
|
config['opcache']['opcache.interned_strings_buffer'] = '8'
|
|
config['opcache']['opcache.max_accelerated_files'] = '10000'
|
|
config['opcache']['opcache.memory_consumption'] = '256'
|
|
config['opcache']['opcache.save_comments'] = '1'
|
|
config['opcache']['opcache.revalidate_freq'] = '5'
|
|
config['opcache']['opcache.consistency_checks'] = '0'
|
|
config['opcache']['opcache.validate_timestamps'] = '1'
|
|
with open('/etc/php/7.2/fpm/php.ini',
|
|
encoding='utf-8', mode='w') as configfile:
|
|
Log.debug(self, "Writting php configuration into "
|
|
"/etc/php/7.2/fpm/php.ini")
|
|
config.write(configfile)
|
|
|
|
# Render php-fpm pool template for php7.3
|
|
data = dict(pid="/run/php/php7.2-fpm.pid",
|
|
error_log="/var/log/php7.2-fpm.log",
|
|
include="/etc/php/7.2/fpm/pool.d/*.conf")
|
|
WOTemplate.deploy(
|
|
self, '/etc/php/7.2/fpm/php-fpm.conf',
|
|
'php-fpm.mustache', data)
|
|
|
|
data = dict(pool='www-php72', listen='php72-fpm.sock',
|
|
user='www-data',
|
|
group='www-data', listenuser='root',
|
|
listengroup='www-data', openbasedir=True)
|
|
WOTemplate.deploy(self, '/etc/php/7.2/fpm/pool.d/www.conf',
|
|
'php-pool.mustache', data)
|
|
data = dict(pool='www-two-php72', listen='php72-two-fpm.sock',
|
|
user='www-data',
|
|
group='www-data', listenuser='root',
|
|
listengroup='www-data', openbasedir=True)
|
|
WOTemplate.deploy(self, '/etc/php/7.2/fpm/pool.d/www-two.conf',
|
|
'php-pool.mustache', data)
|
|
|
|
# Generate /etc/php/7.2/fpm/pool.d/debug.conf
|
|
WOFileUtils.copyfile(self, "/etc/php/7.2/fpm/pool.d/www.conf",
|
|
"/etc/php/7.2/fpm/pool.d/debug.conf")
|
|
WOFileUtils.searchreplace(self, "/etc/php/7.2/fpm/pool.d/"
|
|
"debug.conf", "[www-php72]", "[debug]")
|
|
config = configparser.ConfigParser()
|
|
config.read('/etc/php/7.2/fpm/pool.d/debug.conf')
|
|
config['debug']['listen'] = '127.0.0.1:9172'
|
|
config['debug']['rlimit_core'] = 'unlimited'
|
|
config['debug']['slowlog'] = '/var/log/php/7.2/slow.log'
|
|
config['debug']['request_slowlog_timeout'] = '10s'
|
|
with open('/etc/php/7.2/fpm/pool.d/debug.conf',
|
|
encoding='utf-8', mode='w') as confifile:
|
|
Log.debug(self, "writting PHP7.2 configuration into "
|
|
"/etc/php/7.2/fpm/pool.d/debug.conf")
|
|
config.write(confifile)
|
|
|
|
with open("/etc/php/7.2/fpm/pool.d/debug.conf",
|
|
encoding='utf-8', mode='a') as myfile:
|
|
myfile.write("php_admin_value[xdebug.profiler_output_dir] "
|
|
"= /tmp/ \nphp_admin_value[xdebug.profiler_"
|
|
"output_name] = cachegrind.out.%p-%H-%R "
|
|
"\nphp_admin_flag[xdebug.profiler_enable"
|
|
"_trigger] = on \nphp_admin_flag[xdebug."
|
|
"profiler_enable] = off\n")
|
|
|
|
# Disable xdebug
|
|
if not WOShellExec.cmd_exec(self, "grep -q \';zend_extension\'"
|
|
" /etc/php/7.2/mods-available/"
|
|
"xdebug.ini"):
|
|
WOFileUtils.searchreplace(self, "/etc/php/7.2/"
|
|
"mods-available/"
|
|
"xdebug.ini",
|
|
"zend_extension",
|
|
";zend_extension")
|
|
|
|
# PHP and Debug pull configuration
|
|
if not os.path.exists('{0}22222/htdocs/fpm/status/'
|
|
.format(ngxroot)):
|
|
Log.debug(self, 'Creating directory '
|
|
'{0}22222/htdocs/fpm/status/ '
|
|
.format(ngxroot))
|
|
os.makedirs('{0}22222/htdocs/fpm/status/'
|
|
.format(ngxroot))
|
|
open('{0}22222/htdocs/fpm/status/debug72'
|
|
.format(ngxroot),
|
|
encoding='utf-8', mode='a').close()
|
|
open('{0}22222/htdocs/fpm/status/php72'
|
|
.format(ngxroot),
|
|
encoding='utf-8', mode='a').close()
|
|
|
|
# Write info.php
|
|
if not os.path.exists('{0}22222/htdocs/php/'
|
|
.format(ngxroot)):
|
|
Log.debug(self, 'Creating directory '
|
|
'{0}22222/htdocs/php/ '
|
|
.format(ngxroot))
|
|
os.makedirs('{0}22222/htdocs/php'
|
|
.format(ngxroot))
|
|
|
|
with open("{0}22222/htdocs/php/info.php"
|
|
.format(ngxroot),
|
|
encoding='utf-8', mode='w') as myfile:
|
|
myfile.write("<?php\nphpinfo();\n?>")
|
|
|
|
WOFileUtils.chown(self, "{0}22222/htdocs"
|
|
.format(ngxroot),
|
|
'www-data',
|
|
'www-data', recursive=True)
|
|
|
|
# check service restart or rollback configuration
|
|
if not WOService.restart_service(self, 'php7.2-fpm'):
|
|
WOGit.rollback(self, ["/etc/php"], msg="Rollback PHP")
|
|
else:
|
|
WOGit.add(self, ["/etc/php"], msg="Adding PHP into Git")
|
|
|
|
# PHP7.3 configuration
|
|
if set(WOVar.wo_php73).issubset(set(apt_packages)):
|
|
WOGit.add(self, ["/etc/php"], msg="Adding PHP into Git")
|
|
Log.info(self, "Configuring php7.3-fpm")
|
|
ngxroot = '/var/www/'
|
|
# Create log directories
|
|
if not os.path.exists('/var/log/php/7.3/'):
|
|
Log.debug(self, 'Creating directory /var/log/php/7.3/')
|
|
os.makedirs('/var/log/php/7.3/')
|
|
|
|
if not os.path.isfile('/etc/php/7.3/fpm/php.ini.orig'):
|
|
WOFileUtils.copyfile(self, '/etc/php/7.3/fpm/php.ini',
|
|
'/etc/php/7.3/fpm/php.ini.orig')
|
|
|
|
# Parse etc/php/7.3/fpm/php.ini
|
|
config = configparser.ConfigParser()
|
|
Log.debug(self, "configuring php file /etc/php/7.3/"
|
|
"fpm/php.ini")
|
|
config.read('/etc/php/7.3/fpm/php.ini.orig')
|
|
config['PHP']['expose_php'] = 'Off'
|
|
config['PHP']['post_max_size'] = '100M'
|
|
config['PHP']['upload_max_filesize'] = '100M'
|
|
config['PHP']['max_execution_time'] = '300'
|
|
config['PHP']['max_input_time'] = '300'
|
|
config['PHP']['max_input_vars'] = '20000'
|
|
config['Date']['date.timezone'] = WOVar.wo_timezone
|
|
config['opcache']['opcache.enable'] = '1'
|
|
config['opcache']['opcache.interned_strings_buffer'] = '8'
|
|
config['opcache']['opcache.max_accelerated_files'] = '10000'
|
|
config['opcache']['opcache.memory_consumption'] = '256'
|
|
config['opcache']['opcache.save_comments'] = '1'
|
|
config['opcache']['opcache.revalidate_freq'] = '5'
|
|
config['opcache']['opcache.consistency_checks'] = '0'
|
|
config['opcache']['opcache.validate_timestamps'] = '1'
|
|
with open('/etc/php/7.3/fpm/php.ini',
|
|
encoding='utf-8', mode='w') as configfile:
|
|
Log.debug(self, "Writting php configuration into "
|
|
"/etc/php/7.3/fpm/php.ini")
|
|
config.write(configfile)
|
|
|
|
# Render php-fpm pool template for php7.3
|
|
data = dict(pid="/run/php/php7.3-fpm.pid",
|
|
error_log="/var/log/php7.3-fpm.log",
|
|
include="/etc/php/7.3/fpm/pool.d/*.conf")
|
|
WOTemplate.deploy(
|
|
self, '/etc/php/7.3/fpm/php-fpm.conf',
|
|
'php-fpm.mustache', data)
|
|
|
|
data = dict(pool='www-php73', listen='php73-fpm.sock',
|
|
user='www-data',
|
|
group='www-data', listenuser='root',
|
|
listengroup='www-data', openbasedir=True)
|
|
WOTemplate.deploy(self, '/etc/php/7.3/fpm/pool.d/www.conf',
|
|
'php-pool.mustache', data)
|
|
data = dict(pool='www-two-php73', listen='php73-two-fpm.sock',
|
|
user='www-data',
|
|
group='www-data', listenuser='root',
|
|
listengroup='www-data', openbasedir=True)
|
|
WOTemplate.deploy(self, '/etc/php/7.3/fpm/pool.d/www-two.conf',
|
|
'php-pool.mustache', data)
|
|
|
|
# Generate /etc/php/7.3/fpm/pool.d/debug.conf
|
|
WOFileUtils.copyfile(self, "/etc/php/7.3/fpm/pool.d/www.conf",
|
|
"/etc/php/7.3/fpm/pool.d/debug.conf")
|
|
WOFileUtils.searchreplace(self, "/etc/php/7.3/fpm/pool.d/"
|
|
"debug.conf", "[www-php73]", "[debug]")
|
|
config = configparser.ConfigParser()
|
|
config.read('/etc/php/7.3/fpm/pool.d/debug.conf')
|
|
config['debug']['listen'] = '127.0.0.1:9173'
|
|
config['debug']['rlimit_core'] = 'unlimited'
|
|
config['debug']['slowlog'] = '/var/log/php/7.3/slow.log'
|
|
config['debug']['request_slowlog_timeout'] = '10s'
|
|
with open('/etc/php/7.3/fpm/pool.d/debug.conf',
|
|
encoding='utf-8', mode='w') as confifile:
|
|
Log.debug(self, "writting PHP 7.3 configuration into "
|
|
"/etc/php/7.3/fpm/pool.d/debug.conf")
|
|
config.write(confifile)
|
|
|
|
with open("/etc/php/7.3/fpm/pool.d/debug.conf",
|
|
encoding='utf-8', mode='a') as myfile:
|
|
myfile.write(
|
|
"php_admin_value[xdebug.profiler_output_dir] "
|
|
"= /tmp/ \nphp_admin_value[xdebug.profiler_"
|
|
"output_name] = cachegrind.out.%p-%H-%R "
|
|
"\nphp_admin_flag[xdebug.profiler_enable"
|
|
"_trigger] = on \nphp_admin_flag[xdebug."
|
|
"profiler_enable] = off\n")
|
|
|
|
# Disable xdebug
|
|
if not WOShellExec.cmd_exec(
|
|
self, "grep -q \';zend_extension\'"
|
|
" /etc/php/7.3/mods-available/xdebug.ini"):
|
|
WOFileUtils.searchreplace(
|
|
self, "/etc/php/7.3/mods-available/"
|
|
"xdebug.ini",
|
|
"zend_extension", ";zend_extension")
|
|
|
|
# PHP and Debug pull configuration
|
|
if not os.path.exists('{0}22222/htdocs/fpm/status/'
|
|
.format(ngxroot)):
|
|
Log.debug(self, 'Creating directory '
|
|
'{0}22222/htdocs/fpm/status/ '
|
|
.format(ngxroot))
|
|
os.makedirs('{0}22222/htdocs/fpm/status/'
|
|
.format(ngxroot))
|
|
open('{0}22222/htdocs/fpm/status/debug73'
|
|
.format(ngxroot),
|
|
encoding='utf-8', mode='a').close()
|
|
open('{0}22222/htdocs/fpm/status/php73'
|
|
.format(ngxroot),
|
|
encoding='utf-8', mode='a').close()
|
|
|
|
# Write info.php
|
|
if not os.path.exists('{0}22222/htdocs/php/'
|
|
.format(ngxroot)):
|
|
Log.debug(self, 'Creating directory '
|
|
'{0}22222/htdocs/php/ '
|
|
.format(ngxroot))
|
|
os.makedirs('{0}22222/htdocs/php'
|
|
.format(ngxroot))
|
|
|
|
with open("{0}22222/htdocs/php/info.php"
|
|
.format(ngxroot),
|
|
encoding='utf-8', mode='w') as myfile:
|
|
myfile.write("<?php\nphpinfo();\n?>")
|
|
|
|
WOFileUtils.chown(self, "{0}22222/htdocs"
|
|
.format(ngxroot),
|
|
'www-data',
|
|
'www-data', recursive=True)
|
|
# check service restart or rollback configuration
|
|
if not WOService.restart_service(self, 'php7.3-fpm'):
|
|
WOGit.rollback(self, ["/etc/php"], msg="Rollback PHP")
|
|
else:
|
|
WOGit.add(self, ["/etc/php"], msg="Adding PHP into Git")
|
|
|
|
# create mysql config if it doesn't exist
|
|
if "mariadb-server" in apt_packages:
|
|
WOGit.add(self, ["/etc/mysql"], msg="Adding MySQL into Git")
|
|
if not os.path.isfile("/etc/mysql/my.cnf"):
|
|
config = ("[mysqld]\nwait_timeout = 30\n"
|
|
"interactive_timeout=60\nperformance_schema = 0"
|
|
"\nquery_cache_type = 1")
|
|
config_file = open("/etc/mysql/my.cnf",
|
|
encoding='utf-8', mode='w')
|
|
config_file.write(config)
|
|
config_file.close()
|
|
else:
|
|
Log.info(self, "Tuning MariaDB configuration")
|
|
if not os.path.isfile("/etc/mysql/my.cnf.default-pkg"):
|
|
WOFileUtils.copyfile(self, "/etc/mysql/my.cnf",
|
|
"/etc/mysql/my.cnf.default-pkg")
|
|
wo_ram = psutil.virtual_memory().total / (1024 * 1024)
|
|
# set InnoDB variable depending on the RAM available
|
|
wo_ram_innodb = int(wo_ram*0.3)
|
|
wo_ram_log_buffer = int(wo_ram_innodb*0.25)
|
|
wo_ram_log_size = int(wo_ram_log_buffer*0.5)
|
|
if (wo_ram < 2000):
|
|
wo_innodb_instance = int(1)
|
|
tmp_table_size = int(32)
|
|
elif (wo_ram > 2000) and (wo_ram < 64000):
|
|
wo_innodb_instance = int(wo_ram/1000)
|
|
tmp_table_size = int(128)
|
|
elif (wo_ram > 64000):
|
|
wo_innodb_instance = int(64)
|
|
tmp_table_size = int(256)
|
|
data = dict(
|
|
tmp_table_size=tmp_table_size, inno_log=wo_ram_log_size,
|
|
inno_buffer=wo_ram_innodb,
|
|
inno_log_buffer=wo_ram_log_buffer,
|
|
innodb_instances=wo_innodb_instance)
|
|
WOTemplate.deploy(
|
|
self, '/etc/mysql/my.cnf', 'my.mustache', data)
|
|
# replacing default values
|
|
Log.debug(self, "Tuning MySQL configuration")
|
|
# set innodb_buffer_pool_instances depending
|
|
# on the amount of RAM
|
|
WOService.stop_service(self, 'mysql')
|
|
WOFileUtils.mvfile(self, '/var/lib/mysql/ib_logfile0',
|
|
'/var/lib/mysql/ib_logfile0.bak')
|
|
WOFileUtils.mvfile(self, '/var/lib/mysql/ib_logfile1',
|
|
'/var/lib/mysql/ib_logfile1.bak')
|
|
WOService.start_service(self, 'mysql')
|
|
|
|
WOCron.setcron_weekly(self, 'mysqlcheck -Aos --auto-repair '
|
|
'> /dev/null 2>&1',
|
|
comment='MySQL optimization cronjob '
|
|
'added by WordOps')
|
|
WOGit.add(self, ["/etc/mysql"], msg="Adding MySQL into Git")
|
|
|
|
# create fail2ban configuration files
|
|
if set(WOVar.wo_fail2ban).issubset(set(apt_packages)):
|
|
WOGit.add(self, ["/etc/fail2ban"],
|
|
msg="Adding Fail2ban into Git")
|
|
if not os.path.isfile("/etc/fail2ban/jail.d/custom.conf"):
|
|
Log.info(self, "Configuring Fail2Ban")
|
|
data = dict()
|
|
WOTemplate.deploy(
|
|
self,
|
|
'/etc/fail2ban/jail.d/custom.conf',
|
|
'fail2ban.mustache',
|
|
data, overwrite=False)
|
|
WOTemplate.deploy(
|
|
self,
|
|
'/etc/fail2ban/filter.d/wo-wordpress.conf',
|
|
'fail2ban-wp.mustache',
|
|
data, overwrite=False)
|
|
WOTemplate.deploy(
|
|
self,
|
|
'/etc/fail2ban/filter.d/nginx-forbidden.conf',
|
|
'fail2ban-forbidden.mustache',
|
|
data, overwrite=False)
|
|
|
|
if not WOService.reload_service(self, 'fail2ban'):
|
|
WOGit.rollback(
|
|
self, ['/etc/fail2ban'], msg="Rollback f2b config")
|
|
else:
|
|
WOGit.add(self, ["/etc/fail2ban"],
|
|
msg="Adding Fail2ban into Git")
|
|
|
|
# Proftpd configuration
|
|
if "proftpd-basic" in apt_packages:
|
|
WOGit.add(self, ["/etc/proftpd"],
|
|
msg="Adding ProFTPd into Git")
|
|
if os.path.isfile("/etc/proftpd/proftpd.conf"):
|
|
Log.debug(self, "Setting up Proftpd configuration")
|
|
WOFileUtils.searchreplace(
|
|
self, "/etc/proftpd/proftpd.conf",
|
|
"# DefaultRoot", "DefaultRoot")
|
|
WOFileUtils.searchreplace(
|
|
self, "/etc/proftpd/proftpd.conf",
|
|
"# RequireValidShell", "RequireValidShell")
|
|
WOFileUtils.searchreplace(
|
|
self, "/etc/proftpd/proftpd.conf",
|
|
"# PassivePorts "
|
|
"49152 65534",
|
|
"PassivePorts "
|
|
" 49000 50000")
|
|
# proftpd TLS configuration
|
|
if not os.path.isdir("/etc/proftpd/ssl"):
|
|
WOFileUtils.mkdir(self, "/etc/proftpd/ssl")
|
|
SSL.selfsignedcert(self, proftpd=True, backend=False)
|
|
WOFileUtils.chmod(self, "/etc/proftpd/ssl/proftpd.key", 0o700)
|
|
WOFileUtils.chmod(self, "/etc/proftpd/ssl/proftpd.crt", 0o700)
|
|
data = dict()
|
|
WOTemplate.deploy(self, '/etc/proftpd/tls.conf',
|
|
'proftpd-tls.mustache', data)
|
|
WOFileUtils.searchreplace(self, "/etc/proftpd/"
|
|
"proftpd.conf",
|
|
"#Include /etc/proftpd/tls.conf",
|
|
"Include /etc/proftpd/tls.conf")
|
|
WOService.restart_service(self, 'proftpd')
|
|
|
|
if os.path.isfile('/etc/ufw/ufw.conf'):
|
|
# add rule for proftpd with UFW
|
|
if WOFileUtils.grepcheck(
|
|
self, '/etc/ufw/ufw.conf', 'ENABLED=yes'):
|
|
try:
|
|
WOShellExec.cmd_exec(
|
|
self, "ufw limit 21")
|
|
WOShellExec.cmd_exec(
|
|
self, "ufw allow 49000:50000/tcp")
|
|
WOShellExec.cmd_exec(
|
|
self, "ufw reload")
|
|
except Exception as e:
|
|
Log.debug(self, "{0}".format(e))
|
|
Log.error(self, "Unable to add UFW rules")
|
|
|
|
if ((os.path.isfile("/etc/fail2ban/jail.d/custom.conf")) and
|
|
(not WOFileUtils.grep(
|
|
self, "/etc/fail2ban/jail.d/custom.conf",
|
|
"proftpd"))):
|
|
with open("/etc/fail2ban/jail.d/custom.conf",
|
|
encoding='utf-8', mode='a') as f2bproftpd:
|
|
f2bproftpd.write("\n\n[proftpd]\nenabled = true\n")
|
|
WOService.reload_service(self, 'fail2ban')
|
|
|
|
if not WOService.reload_service(self, 'proftpd'):
|
|
WOGit.rollback(self, ["/etc/proftpd"],
|
|
msg="Rollback ProFTPd")
|
|
else:
|
|
WOGit.add(self, ["/etc/proftpd"],
|
|
msg="Adding ProFTPd into Git")
|
|
|
|
if "ufw" in apt_packages:
|
|
# check if ufw is already enabled
|
|
if not WOFileUtils.grep(self,
|
|
'/etc/ufw/ufw.conf', 'ENABLED=yes'):
|
|
Log.wait(self, "Configuring UFW")
|
|
# check if ufw script is already created
|
|
if not os.path.isfile("/opt/ufw.sh"):
|
|
data = dict()
|
|
WOTemplate.deploy(self, '/opt/ufw.sh',
|
|
'ufw.mustache',
|
|
data, overwrite=False)
|
|
WOFileUtils.chmod(self, "/opt/ufw.sh", 0o700)
|
|
# setup ufw rules
|
|
WOShellExec.cmd_exec(self, "bash /opt/ufw.sh")
|
|
Log.valide(self, "Configuring UFW")
|
|
else:
|
|
Log.info(self, "UFW is already installed and enabled")
|
|
|
|
# Redis configuration
|
|
if "redis-server" in apt_packages:
|
|
if os.path.isfile("/etc/nginx/conf.d/upstream.conf"):
|
|
if not WOFileUtils.grep(self, "/etc/nginx/conf.d/"
|
|
"upstream.conf",
|
|
"redis"):
|
|
with open("/etc/nginx/conf.d/upstream.conf",
|
|
"a") as redis_file:
|
|
redis_file.write("upstream redis {\n"
|
|
" server 127.0.0.1:6379;\n"
|
|
" keepalive 10;\n}\n")
|
|
|
|
if os.path.isfile("/etc/nginx/nginx.conf"):
|
|
if not os.path.isfile("/etc/nginx/conf.d/redis.conf"):
|
|
with open("/etc/nginx/conf.d/redis.conf",
|
|
"a") as redis_file:
|
|
redis_file.write(
|
|
"# Log format Settings\n"
|
|
"log_format rt_cache_redis '$remote_addr "
|
|
"$upstream_response_time $srcache_fetch_status "
|
|
"[$time_local] '\n '$http_host \"$request\" "
|
|
"$status $body_bytes_sent '\n'\"$http_referer\" "
|
|
"\"$http_user_agent\"';\n")
|
|
# set redis.conf parameter
|
|
# set maxmemory 10% for ram below 512MB and 20% for others
|
|
# set maxmemory-policy allkeys-lru
|
|
# enable systemd service
|
|
WOGit.add(self, ["/etc/redis"],
|
|
msg="Adding Redis into Git")
|
|
Log.debug(self, "Enabling redis systemd service")
|
|
WOShellExec.cmd_exec(self, "systemctl enable redis-server")
|
|
if (os.path.isfile("/etc/redis/redis.conf") and
|
|
(not WOFileUtils.grep(self, "/etc/redis/redis.conf",
|
|
"WordOps"))):
|
|
Log.wait(self, "Tuning Redis configuration")
|
|
with open("/etc/redis/redis.conf",
|
|
"a") as redis_file:
|
|
redis_file.write("\n# WordOps v3.9.9\n")
|
|
wo_ram = psutil.virtual_memory().total / (1024 * 1024)
|
|
if wo_ram < 1024:
|
|
Log.debug(self, "Setting maxmemory variable to "
|
|
"{0} in redis.conf"
|
|
.format(int(wo_ram*1024*1024*0.1)))
|
|
WOFileUtils.searchreplace(self,
|
|
"/etc/redis/redis.conf",
|
|
"# maxmemory <bytes>",
|
|
"maxmemory {0}"
|
|
.format
|
|
(int(wo_ram*1024*1024*0.1)))
|
|
|
|
else:
|
|
Log.debug(self, "Setting maxmemory variable to {0} "
|
|
"in redis.conf"
|
|
.format(int(wo_ram*1024*1024*0.2)))
|
|
WOFileUtils.searchreplace(self,
|
|
"/etc/redis/redis.conf",
|
|
"# maxmemory <bytes>",
|
|
"maxmemory {0}"
|
|
.format
|
|
(int(wo_ram*1024*1024*0.2)))
|
|
|
|
Log.debug(
|
|
self, "Setting maxmemory-policy variable to "
|
|
"allkeys-lru in redis.conf")
|
|
WOFileUtils.searchreplace(
|
|
self, "/etc/redis/redis.conf",
|
|
"# maxmemory-policy noeviction",
|
|
"maxmemory-policy allkeys-lru")
|
|
Log.debug(
|
|
self, "Setting tcp-backlog variable to "
|
|
"in redis.conf")
|
|
WOFileUtils.searchreplace(self,
|
|
"/etc/redis/redis.conf",
|
|
"tcp-backlog 511",
|
|
"tcp-backlog 32768")
|
|
WOFileUtils.chown(self, '/etc/redis/redis.conf',
|
|
'redis', 'redis', recursive=False)
|
|
Log.valide(self, "Tuning Redis configuration")
|
|
if not WOService.restart_service(self, 'redis-server'):
|
|
WOGit.rollback(self, ["/etc/redis"], msg="Rollback Redis")
|
|
else:
|
|
WOGit.add(self, ["/etc/redis"], msg="Adding Redis into Git")
|
|
|
|
# ClamAV configuration
|
|
if set(WOVar.wo_clamav).issubset(set(apt_packages)):
|
|
Log.debug(self, "Setting up freshclam cronjob")
|
|
if not os.path.isfile("/opt/freshclam.sh"):
|
|
data = dict()
|
|
WOTemplate.deploy(self, '/opt/freshclam.sh',
|
|
'freshclam.mustache',
|
|
data, overwrite=False)
|
|
WOFileUtils.chmod(self, "/opt/freshclam.sh", 0o775)
|
|
WOCron.setcron_weekly(self, '/opt/freshclam.sh '
|
|
'> /dev/null 2>&1',
|
|
comment='ClamAV freshclam cronjob '
|
|
'added by WordOps')
|
|
|
|
if (packages):
|
|
# WP-CLI
|
|
if any('/usr/local/bin/wp' == x[1] for x in packages):
|
|
Log.debug(self, "Setting Privileges"
|
|
" to /usr/local/bin/wp file ")
|
|
WOFileUtils.chmod(self, "/usr/local/bin/wp", 0o775)
|
|
|
|
# PHPMyAdmin
|
|
if any('/var/lib/wo/tmp/pma.tar.gz' == x[1]
|
|
for x in packages):
|
|
WOExtract.extract(
|
|
self, '/var/lib/wo/tmp/pma.tar.gz', '/var/lib/wo/tmp/')
|
|
Log.debug(self, 'Extracting file /var/lib/wo/tmp/pma.tar.gz to '
|
|
'location /var/lib/wo/tmp/')
|
|
if not os.path.exists('{0}22222/htdocs/db'
|
|
.format(WOVar.wo_webroot)):
|
|
Log.debug(self, "Creating new directory "
|
|
"{0}22222/htdocs/db"
|
|
.format(WOVar.wo_webroot))
|
|
os.makedirs('{0}22222/htdocs/db'
|
|
.format(WOVar.wo_webroot))
|
|
if not os.path.exists('{0}22222/htdocs/db/pma/'
|
|
.format(WOVar.wo_webroot)):
|
|
shutil.move('/var/lib/wo/tmp/phpmyadmin-STABLE/',
|
|
'{0}22222/htdocs/db/pma/'
|
|
.format(WOVar.wo_webroot))
|
|
shutil.copyfile('{0}22222/htdocs/db/pma'
|
|
'/config.sample.inc.php'
|
|
.format(WOVar.wo_webroot),
|
|
'{0}22222/htdocs/db/pma/config.inc.php'
|
|
.format(WOVar.wo_webroot))
|
|
Log.debug(self, 'Setting Blowfish Secret Key '
|
|
'FOR COOKIE AUTH to '
|
|
'{0}22222/htdocs/db/pma/config.inc.php file '
|
|
.format(WOVar.wo_webroot))
|
|
blowfish_key = ''.join([random.choice
|
|
(string.ascii_letters +
|
|
string.digits)
|
|
for n in range(32)])
|
|
WOFileUtils.searchreplace(self,
|
|
'{0}22222/htdocs/db/pma'
|
|
'/config.inc.php'
|
|
.format(WOVar.wo_webroot),
|
|
"$cfg[\'blowfish_secret\']"
|
|
" = \'\';",
|
|
"$cfg[\'blowfish_secret\']"
|
|
" = \'{0}\';"
|
|
.format(blowfish_key))
|
|
Log.debug(self, 'Setting HOST Server For Mysql to '
|
|
'{0}22222/htdocs/db/pma/config.inc.php file '
|
|
.format(WOVar.wo_webroot))
|
|
WOFileUtils.searchreplace(self,
|
|
'{0}22222/htdocs/db/pma'
|
|
'/config.inc.php'
|
|
.format(WOVar.wo_webroot),
|
|
"$cfg[\'Servers\'][$i][\'host\']"
|
|
" = \'localhost\';", "$cfg"
|
|
"[\'Servers\'][$i][\'host\'] "
|
|
"= \'{0}\';"
|
|
.format(WOVar.wo_mysql_host))
|
|
Log.debug(self, 'Setting Privileges of webroot permission to '
|
|
'{0}22222/htdocs/db/pma file '
|
|
.format(WOVar.wo_webroot))
|
|
WOFileUtils.chown(self, '{0}22222/htdocs'
|
|
.format(WOVar.wo_webroot),
|
|
'www-data',
|
|
'www-data',
|
|
recursive=True)
|
|
|
|
# composer install and phpmyadmin update
|
|
if any('/var/lib/wo/tmp/composer-install' == x[1]
|
|
for x in packages):
|
|
Log.wait(self, "Installing composer")
|
|
WOShellExec.cmd_exec(self, "php -q /var/lib/wo"
|
|
"/tmp/composer-install "
|
|
"--install-dir=/var/lib/wo/tmp/")
|
|
shutil.copyfile('/var/lib/wo/tmp/composer.phar',
|
|
'/usr/local/bin/composer')
|
|
WOFileUtils.chmod(self, "/usr/local/bin/composer", 0o775)
|
|
Log.valide(self, "Installing composer")
|
|
if ((os.path.isdir("/var/www/22222/htdocs/db/pma")) and
|
|
(not os.path.isfile('/var/www/22222/htdocs/db/'
|
|
'pma/composer.lock'))):
|
|
Log.wait(self, "Updating phpMyAdmin")
|
|
WOShellExec.cmd_exec(
|
|
self, "/usr/local/bin/composer update "
|
|
"--no-plugins --no-scripts -n --no-dev -d "
|
|
"/var/www/22222/htdocs/db/pma/")
|
|
WOFileUtils.chown(
|
|
self, '{0}22222/htdocs/db/pma'
|
|
.format(WOVar.wo_webroot),
|
|
'www-data',
|
|
'www-data',
|
|
recursive=True)
|
|
Log.valide(self, "Updating phpMyAdmin")
|
|
if not os.path.exists('{0}22222/htdocs/cache/'
|
|
'redis/phpRedisAdmin'
|
|
.format(WOVar.wo_webroot)):
|
|
Log.debug(self, "Creating new directory "
|
|
"{0}22222/htdocs/cache/redis"
|
|
.format(WOVar.wo_webroot))
|
|
os.makedirs('{0}22222/htdocs/cache/redis/phpRedisAdmin'
|
|
.format(WOVar.wo_webroot))
|
|
if not os.path.isfile('/var/www/22222/htdocs/cache/redis/'
|
|
'phpRedisAdmin/composer.lock'):
|
|
WOShellExec.cmd_exec(
|
|
self, "/usr/local/bin/composer "
|
|
"create-project --no-plugins --no-scripts -n -s dev "
|
|
"erik-dubbelboer/php-redis-admin "
|
|
"/var/www/22222/htdocs/cache/redis/phpRedisAdmin")
|
|
WOFileUtils.chown(self, '{0}22222/htdocs'
|
|
.format(WOVar.wo_webroot),
|
|
'www-data',
|
|
'www-data',
|
|
recursive=True)
|
|
|
|
# MySQLtuner
|
|
if any('/usr/bin/mysqltuner' == x[1]
|
|
for x in packages):
|
|
Log.debug(self, "CHMOD MySQLTuner in /usr/bin/mysqltuner")
|
|
WOFileUtils.chmod(self, "/usr/bin/mysqltuner", 0o775)
|
|
|
|
# netdata install
|
|
if any('/var/lib/wo/tmp/kickstart.sh' == x[1]
|
|
for x in packages):
|
|
Log.wait(self, "Installing Netdata")
|
|
WOShellExec.cmd_exec(
|
|
self, "bash /var/lib/wo/tmp/kickstart.sh "
|
|
"--dont-wait", errormsg='', log=False)
|
|
Log.valide(self, "Installing Netdata")
|
|
if os.path.isdir('/etc/netdata'):
|
|
wo_netdata = "/"
|
|
elif os.path.isdir('/opt/netdata'):
|
|
wo_netdata = "/opt/netdata/"
|
|
# disable mail notifications
|
|
WOFileUtils.searchreplace(
|
|
self, "{0}etc/netdata/orig/health_alarm_notify.conf"
|
|
.format(wo_netdata),
|
|
'SEND_EMAIL="YES"',
|
|
'SEND_EMAIL="NO"')
|
|
# make changes persistant
|
|
WOFileUtils.copyfile(
|
|
self, "{0}etc/netdata/orig/"
|
|
"health_alarm_notify.conf"
|
|
.format(wo_netdata),
|
|
"{0}etc/netdata/health_alarm_notify.conf"
|
|
.format(wo_netdata))
|
|
# check if mysql credentials are available
|
|
if WOShellExec.cmd_exec(self, "mysqladmin ping"):
|
|
try:
|
|
WOMysql.execute(
|
|
self,
|
|
"create user 'netdata'@'localhost';",
|
|
log=False)
|
|
WOMysql.execute(
|
|
self,
|
|
"grant usage on *.* to 'netdata'@'localhost';",
|
|
log=False)
|
|
WOMysql.execute(
|
|
self, "flush privileges;",
|
|
log=False)
|
|
except Exception as e:
|
|
Log.debug(self, "{0}".format(e))
|
|
Log.info(
|
|
self, "fail to setup mysql user for netdata")
|
|
WOFileUtils.chown(self, '{0}etc/netdata'
|
|
.format(wo_netdata),
|
|
'netdata',
|
|
'netdata',
|
|
recursive=True)
|
|
WOService.restart_service(self, 'netdata')
|
|
|
|
# WordOps Dashboard
|
|
if any('/var/lib/wo/tmp/wo-dashboard.tar.gz' == x[1]
|
|
for x in packages):
|
|
Log.debug(self, "Extracting wo-dashboard.tar.gz "
|
|
"to location {0}22222/htdocs/"
|
|
.format(WOVar.wo_webroot))
|
|
WOExtract.extract(self, '/var/lib/wo/tmp/'
|
|
'wo-dashboard.tar.gz',
|
|
'{0}22222/htdocs'
|
|
.format(WOVar.wo_webroot))
|
|
wo_wan = os.popen("/sbin/ip -4 route get 8.8.8.8 | "
|
|
"grep -oP \"dev [^[:space:]]+ \" "
|
|
"| cut -d ' ' -f 2").read()
|
|
if (wo_wan != 'eth0' and wo_wan != ''):
|
|
WOFileUtils.searchreplace(self,
|
|
"{0}22222/htdocs/index.html"
|
|
.format(WOVar.wo_webroot),
|
|
"eth0",
|
|
"{0}".format(wo_wan))
|
|
Log.debug(self, "Setting Privileges to "
|
|
"{0}22222/htdocs"
|
|
.format(WOVar.wo_webroot))
|
|
WOFileUtils.chown(self, '{0}22222/htdocs'
|
|
.format(WOVar.wo_webroot),
|
|
'www-data',
|
|
'www-data',
|
|
recursive=True)
|
|
|
|
# Extplorer FileManager
|
|
if any('/var/lib/wo/tmp/extplorer.tar.gz' == x[1]
|
|
for x in packages):
|
|
Log.debug(self, "Extracting extplorer.tar.gz "
|
|
"to location {0}22222/htdocs/files"
|
|
.format(WOVar.wo_webroot))
|
|
WOExtract.extract(self, '/var/lib/wo/tmp/extplorer.tar.gz',
|
|
'/var/lib/wo/tmp/')
|
|
shutil.move('/var/lib/wo/tmp/extplorer-{0}'
|
|
.format(WOVar.wo_extplorer),
|
|
'{0}22222/htdocs/files'
|
|
.format(WOVar.wo_webroot))
|
|
Log.debug(self, "Setting Privileges to "
|
|
"{0}22222/htdocs/files"
|
|
.format(WOVar.wo_webroot))
|
|
WOFileUtils.chown(self, '{0}22222/htdocs'
|
|
.format(WOVar.wo_webroot),
|
|
'www-data',
|
|
'www-data',
|
|
recursive=True)
|
|
|
|
# webgrind
|
|
if any('/var/lib/wo/tmp/webgrind.tar.gz' == x[1]
|
|
for x in packages):
|
|
Log.debug(self, "Extracting file webgrind.tar.gz to "
|
|
"location /var/lib/wo/tmp/ ")
|
|
WOExtract.extract(
|
|
self, '/var/lib/wo/tmp/webgrind.tar.gz',
|
|
'/var/lib/wo/tmp/')
|
|
if not os.path.exists('{0}22222/htdocs/php'
|
|
.format(WOVar.wo_webroot)):
|
|
Log.debug(self, "Creating directroy "
|
|
"{0}22222/htdocs/php"
|
|
.format(WOVar.wo_webroot))
|
|
os.makedirs('{0}22222/htdocs/php'
|
|
.format(WOVar.wo_webroot))
|
|
if not os.path.exists('{0}22222/htdocs/php/webgrind'
|
|
.format(WOVar.wo_webroot)):
|
|
shutil.move('/var/lib/wo/tmp/webgrind-master/',
|
|
'{0}22222/htdocs/php/webgrind'
|
|
.format(WOVar.wo_webroot))
|
|
|
|
WOFileUtils.searchreplace(
|
|
self, "{0}22222/htdocs/php/webgrind/"
|
|
"config.php"
|
|
.format(WOVar.wo_webroot),
|
|
"/usr/local/bin/dot", "/usr/bin/dot")
|
|
WOFileUtils.searchreplace(
|
|
self, "{0}22222/htdocs/php/webgrind/"
|
|
"config.php"
|
|
.format(WOVar.wo_webroot),
|
|
"Europe/Copenhagen",
|
|
WOVar.wo_timezone)
|
|
|
|
WOFileUtils.searchreplace(
|
|
self, "{0}22222/htdocs/php/webgrind/"
|
|
"config.php"
|
|
.format(WOVar.wo_webroot),
|
|
"90", "100")
|
|
|
|
Log.debug(self, "Setting Privileges of webroot permission to "
|
|
"{0}22222/htdocs/php/webgrind/ file "
|
|
.format(WOVar.wo_webroot))
|
|
WOFileUtils.chown(self, '{0}22222/htdocs'
|
|
.format(WOVar.wo_webroot),
|
|
'www-data',
|
|
'www-data',
|
|
recursive=True)
|
|
# anemometer
|
|
if any('/var/lib/wo/tmp/anemometer.tar.gz' == x[1]
|
|
for x in packages):
|
|
Log.debug(self, "Extracting file anemometer.tar.gz to "
|
|
"location /var/lib/wo/tmp/ ")
|
|
WOExtract.extract(
|
|
self, '/var/lib/wo/tmp/anemometer.tar.gz',
|
|
'/var/lib/wo/tmp/')
|
|
if not os.path.exists('{0}22222/htdocs/db/'
|
|
.format(WOVar.wo_webroot)):
|
|
Log.debug(self, "Creating directory")
|
|
os.makedirs('{0}22222/htdocs/db/'
|
|
.format(WOVar.wo_webroot))
|
|
if not os.path.exists('{0}22222/htdocs/db/anemometer'
|
|
.format(WOVar.wo_webroot)):
|
|
shutil.move('/var/lib/wo/tmp/Anemometer-master',
|
|
'{0}22222/htdocs/db/anemometer'
|
|
.format(WOVar.wo_webroot))
|
|
chars = ''.join(random.sample(string.ascii_letters, 8))
|
|
try:
|
|
WOShellExec.cmd_exec(self, 'mysql < {0}22222/htdocs/db'
|
|
'/anemometer/install.sql'
|
|
.format(WOVar.wo_webroot))
|
|
except Exception as e:
|
|
Log.debug(self, "{0}".format(e))
|
|
Log.error(self, "failed to configure Anemometer",
|
|
exit=False)
|
|
|
|
WOMysql.execute(self, 'grant select on'
|
|
' *.* to \'anemometer\''
|
|
'@\'{0}\' IDENTIFIED'
|
|
' BY \'{1}\''.format(self.app.config.get
|
|
('mysql',
|
|
'grant-host'),
|
|
chars))
|
|
Log.debug(self, "grant all on slow-query-log.*"
|
|
" to anemometer@root_user"
|
|
" IDENTIFIED BY password ")
|
|
WOMysql.execute(
|
|
self, 'grant all on slow_query_log.* to'
|
|
'\'anemometer\'@\'{0}\' IDENTIFIED'
|
|
' BY \'{1}\''.format(self.app.config.get(
|
|
'mysql', 'grant-host'),
|
|
chars),
|
|
errormsg="cannot grant priviledges",
|
|
log=False)
|
|
|
|
# Custom Anemometer configuration
|
|
Log.debug(self, "configration Anemometer")
|
|
data = dict(host=WOVar.wo_mysql_host, port='3306',
|
|
user='anemometer', password=chars)
|
|
WOTemplate.deploy(self, '{0}22222/htdocs/db/anemometer'
|
|
'/conf/config.inc.php'
|
|
.format(WOVar.wo_webroot),
|
|
'anemometer.mustache', data)
|
|
|
|
# pt-query-advisor
|
|
if any('/usr/bin/pt-query-advisor' == x[1]
|
|
for x in packages):
|
|
WOFileUtils.chmod(self, "/usr/bin/pt-query-advisor", 0o775)
|
|
|
|
# ngxblocker
|
|
if any('/usr/local/sbin/install-ngxblocker' == x[1]
|
|
for x in packages):
|
|
WOFileUtils.chmod(
|
|
self, "/usr/local/sbin/install-ngxblocker", 0o700)
|
|
WOShellExec.cmd_exec(self, '/usr/local/sbin/install-ngxblocker -x')
|
|
WOFileUtils.chmod(
|
|
self, "/usr/local/sbin/update-ngxblocker", 0o700)
|
|
|
|
|
|
def pre_stack(self):
|
|
"""Inital server configuration and tweak"""
|
|
# wo sysctl tweaks
|
|
# check system type
|
|
wo_arch = os.uname()[4]
|
|
if os.path.isfile('/proc/1/environ'):
|
|
# detect lxc containers
|
|
wo_lxc = WOFileUtils.grepcheck(
|
|
self, '/proc/1/environ', 'container=lxc')
|
|
# detect wsl
|
|
wo_wsl = WOFileUtils.grepcheck(
|
|
self, '/proc/1/environ', 'wsl')
|
|
else:
|
|
wo_wsl = True
|
|
wo_lxc = True
|
|
# remove old sysctl tweak
|
|
if os.path.isfile('/etc/sysctl.d/60-ubuntu-nginx-web-server.conf'):
|
|
WOFileUtils.rm(self, '/etc/sysctl.d/60-ubuntu-nginx-web-server.conf')
|
|
|
|
if wo_arch == 'x86_64':
|
|
if (wo_lxc is not True) and (wo_wsl is not True):
|
|
data = dict()
|
|
WOTemplate.deploy(
|
|
self, '/etc/sysctl.d/60-wo-tweaks.conf',
|
|
'sysctl.mustache', data, True)
|
|
# use tcp_bbr congestion algorithm only on new kernels
|
|
if (WOVar.wo_platform_codename == 'bionic' or
|
|
WOVar.wo_platform_codename == 'disco' or
|
|
WOVar.wo_platform_codename == 'buster'):
|
|
if WOShellExec.cmd_exec(self, 'modprobe tcp_bbr'):
|
|
with open("/etc/modules-load.d/bbr.conf",
|
|
encoding='utf-8', mode='w') as bbr_file:
|
|
bbr_file.write('tcp_bbr')
|
|
with open("/etc/sysctl.d/60-wo-tweaks.conf",
|
|
encoding='utf-8', mode='a') as sysctl_file:
|
|
sysctl_file.write(
|
|
'\nnet.ipv4.tcp_congestion_control = bbr'
|
|
'\nnet.ipv4.tcp_notsent_lowat = 16384')
|
|
else:
|
|
if WOShellExec.cmd_exec(self, 'modprobe tcp_htcp'):
|
|
with open("/etc/modules-load.d/htcp.conf",
|
|
encoding='utf-8', mode='w') as bbr_file:
|
|
bbr_file.write('tcp_htcp')
|
|
with open("/etc/sysctl.d/60-wo-tweaks.conf",
|
|
encoding='utf-8', mode='a') as sysctl_file:
|
|
sysctl_file.write(
|
|
'\nnet.ipv4.tcp_congestion_control = htcp')
|
|
# apply sysctl tweaks
|
|
WOShellExec.cmd_exec(
|
|
self, 'sysctl -eq -p /etc/sysctl.d/60-wo-tweaks.conf')
|
|
# sysctl tweak service
|
|
data = dict()
|
|
if not os.path.isfile('/opt/wo-kernel.sh'):
|
|
WOTemplate.deploy(self, '/opt/wo-kernel.sh',
|
|
'wo-kernel-script.mustache', data)
|
|
if not os.path.isfile('/lib/systemd/system/wo-kernel.service'):
|
|
WOTemplate.deploy(
|
|
self, '/lib/systemd/system/wo-kernel.service',
|
|
'wo-kernel-service.mustache', data)
|
|
WOShellExec.cmd_exec(self, 'systemctl enable wo-kernel.service')
|
|
WOService.start_service(self, 'wo-kernel')
|
|
# open_files_limit tweak
|
|
if not WOFileUtils.grepcheck(self, '/etc/security/limits.conf', '500000'):
|
|
with open("/etc/security/limits.conf",
|
|
encoding='utf-8', mode='w') as limit_file:
|
|
limit_file.write(
|
|
'* hard nofile 500000\n'
|
|
'* soft nofile 500000\n'
|
|
'root hard nofile 500000\n'
|
|
'root soft nofile 500000\n')
|
|
Log.valide(self, 'Applying Linux tweaks')
|