2015-04-17 15:25:41 +00:00
|
|
|
#!/bin/bash
|
|
|
|
|
2020-09-10 16:02:20 +02:00
|
|
|
function clean_exit {
|
|
|
|
/usr/bin/documentserver-prepare4shutdown.sh
|
|
|
|
}
|
|
|
|
|
|
|
|
trap clean_exit SIGTERM
|
|
|
|
|
2018-04-21 12:14:26 +03:00
|
|
|
# Define '**' behavior explicitly
|
|
|
|
shopt -s globstar
|
|
|
|
|
2019-10-21 11:51:06 +03:00
|
|
|
APP_DIR="/var/www/${COMPANY_NAME}/documentserver"
|
|
|
|
DATA_DIR="/var/www/${COMPANY_NAME}/Data"
|
|
|
|
LOG_DIR="/var/log/${COMPANY_NAME}"
|
2017-11-10 15:10:52 +03:00
|
|
|
DS_LOG_DIR="${LOG_DIR}/documentserver"
|
2019-10-21 11:51:06 +03:00
|
|
|
LIB_DIR="/var/lib/${COMPANY_NAME}"
|
2019-05-29 16:26:22 +03:00
|
|
|
DS_LIB_DIR="${LIB_DIR}/documentserver"
|
2019-10-21 11:51:06 +03:00
|
|
|
CONF_DIR="/etc/${COMPANY_NAME}/documentserver"
|
2015-04-17 15:25:41 +00:00
|
|
|
|
2016-07-11 11:47:22 +03:00
|
|
|
ONLYOFFICE_DATA_CONTAINER=${ONLYOFFICE_DATA_CONTAINER:-false}
|
2016-07-20 18:56:20 +03:00
|
|
|
ONLYOFFICE_DATA_CONTAINER_HOST=${ONLYOFFICE_DATA_CONTAINER_HOST:-localhost}
|
|
|
|
ONLYOFFICE_DATA_CONTAINER_PORT=80
|
2015-04-17 15:25:41 +00:00
|
|
|
|
|
|
|
SSL_CERTIFICATES_DIR="${DATA_DIR}/certs"
|
2020-04-29 19:48:33 +03:00
|
|
|
if [[ -z $SSL_CERTIFICATE_PATH ]] && [[ -f ${SSL_CERTIFICATES_DIR}/onlyoffice.crt ]]; then
|
|
|
|
SSL_CERTIFICATE_PATH=${SSL_CERTIFICATES_DIR}/onlyoffice.crt
|
|
|
|
else
|
|
|
|
SSL_CERTIFICATE_PATH=${SSL_CERTIFICATE_PATH:-${SSL_CERTIFICATES_DIR}/tls.crt}
|
|
|
|
fi
|
|
|
|
if [[ -z $SSL_KEY_PATH ]] && [[ -f ${SSL_CERTIFICATES_DIR}/onlyoffice.key ]]; then
|
|
|
|
SSL_KEY_PATH=${SSL_CERTIFICATES_DIR}/onlyoffice.key
|
|
|
|
else
|
|
|
|
SSL_KEY_PATH=${SSL_KEY_PATH:-${SSL_CERTIFICATES_DIR}/tls.key}
|
|
|
|
fi
|
2016-06-30 12:41:52 +03:00
|
|
|
CA_CERTIFICATES_PATH=${CA_CERTIFICATES_PATH:-${SSL_CERTIFICATES_DIR}/ca-certificates.pem}
|
2015-04-17 15:25:41 +00:00
|
|
|
SSL_DHPARAM_PATH=${SSL_DHPARAM_PATH:-${SSL_CERTIFICATES_DIR}/dhparam.pem}
|
|
|
|
SSL_VERIFY_CLIENT=${SSL_VERIFY_CLIENT:-off}
|
2019-12-26 13:13:13 +03:00
|
|
|
USE_UNAUTHORIZED_STORAGE=${USE_UNAUTHORIZED_STORAGE:-false}
|
2015-04-17 15:25:41 +00:00
|
|
|
ONLYOFFICE_HTTPS_HSTS_ENABLED=${ONLYOFFICE_HTTPS_HSTS_ENABLED:-true}
|
2017-05-12 16:51:22 +03:00
|
|
|
ONLYOFFICE_HTTPS_HSTS_MAXAGE=${ONLYOFFICE_HTTPS_HSTS_MAXAGE:-31536000}
|
2019-10-21 11:51:06 +03:00
|
|
|
SYSCONF_TEMPLATES_DIR="/app/ds/setup/config"
|
2015-04-17 15:25:41 +00:00
|
|
|
|
2017-01-24 19:34:20 +03:00
|
|
|
NGINX_CONFD_PATH="/etc/nginx/conf.d";
|
2017-11-29 12:52:57 +03:00
|
|
|
NGINX_ONLYOFFICE_PATH="${CONF_DIR}/nginx"
|
2018-10-16 12:22:18 +03:00
|
|
|
NGINX_ONLYOFFICE_CONF="${NGINX_ONLYOFFICE_PATH}/ds.conf"
|
2017-11-29 14:37:21 +03:00
|
|
|
NGINX_ONLYOFFICE_EXAMPLE_PATH="${CONF_DIR}-example/nginx"
|
2018-10-16 12:22:18 +03:00
|
|
|
NGINX_ONLYOFFICE_EXAMPLE_CONF="${NGINX_ONLYOFFICE_EXAMPLE_PATH}/includes/ds-example.conf"
|
2017-11-29 12:52:57 +03:00
|
|
|
|
2016-06-30 12:41:52 +03:00
|
|
|
NGINX_CONFIG_PATH="/etc/nginx/nginx.conf"
|
2017-09-20 17:25:38 +03:00
|
|
|
NGINX_WORKER_PROCESSES=${NGINX_WORKER_PROCESSES:-1}
|
2016-06-30 12:41:52 +03:00
|
|
|
NGINX_WORKER_CONNECTIONS=${NGINX_WORKER_CONNECTIONS:-$(ulimit -n)}
|
|
|
|
|
2017-09-01 16:59:34 +03:00
|
|
|
JWT_ENABLED=${JWT_ENABLED:-false}
|
|
|
|
JWT_SECRET=${JWT_SECRET:-secret}
|
|
|
|
JWT_HEADER=${JWT_HEADER:-Authorization}
|
2019-11-27 11:35:08 +03:00
|
|
|
JWT_IN_BODY=${JWT_IN_BODY:-false}
|
2017-09-01 16:59:34 +03:00
|
|
|
|
2020-10-20 16:14:55 +03:00
|
|
|
GENERATE_FONTS=${GENERATE_FONTS:-true}
|
|
|
|
|
2020-06-04 15:15:34 +03:00
|
|
|
if [[ ${PRODUCT_NAME} == "documentserver" ]]; then
|
|
|
|
REDIS_ENABLED=false
|
|
|
|
else
|
|
|
|
REDIS_ENABLED=true
|
|
|
|
fi
|
|
|
|
|
2018-05-04 11:56:18 +03:00
|
|
|
ONLYOFFICE_DEFAULT_CONFIG=${CONF_DIR}/local.json
|
2017-05-17 17:41:13 +03:00
|
|
|
ONLYOFFICE_LOG4JS_CONFIG=${CONF_DIR}/log4js/production.json
|
2018-05-04 11:56:18 +03:00
|
|
|
ONLYOFFICE_EXAMPLE_CONFIG=${CONF_DIR}-example/local.json
|
2016-06-30 12:41:52 +03:00
|
|
|
|
2020-02-21 14:58:20 +03:00
|
|
|
JSON_BIN=${APP_DIR}/npm/json
|
2019-02-15 15:10:19 +03:00
|
|
|
JSON="${JSON_BIN} -q -f ${ONLYOFFICE_DEFAULT_CONFIG}"
|
|
|
|
JSON_LOG="${JSON_BIN} -q -f ${ONLYOFFICE_LOG4JS_CONFIG}"
|
|
|
|
JSON_EXAMPLE="${JSON_BIN} -q -f ${ONLYOFFICE_EXAMPLE_CONFIG}"
|
2016-07-11 11:47:22 +03:00
|
|
|
|
2016-07-20 18:56:20 +03:00
|
|
|
LOCAL_SERVICES=()
|
2016-07-11 11:47:22 +03:00
|
|
|
|
2018-04-03 19:39:11 +03:00
|
|
|
PG_ROOT=/var/lib/postgresql
|
2017-04-24 20:02:01 +03:00
|
|
|
PG_NAME=main
|
2018-04-03 19:39:11 +03:00
|
|
|
PGDATA=${PG_ROOT}/${PG_VERSION}/${PG_NAME}
|
2017-04-24 20:02:01 +03:00
|
|
|
PG_NEW_CLUSTER=false
|
2019-12-20 13:15:59 +03:00
|
|
|
RABBITMQ_DATA=/var/lib/rabbitmq
|
|
|
|
REDIS_DATA=/var/lib/redis
|
2017-04-24 20:02:01 +03:00
|
|
|
|
2020-11-18 10:46:19 +03:00
|
|
|
if [ "${LETS_ENCRYPT_DOMAIN}" != "" -a "${LETS_ENCRYPT_MAIL}" != "" ]; then
|
2020-10-22 13:47:51 +03:00
|
|
|
LETSENCRYPT_ROOT_DIR="/etc/letsencrypt/live"
|
|
|
|
SSL_CERTIFICATE_PATH=${LETSENCRYPT_ROOT_DIR}/${LETS_ENCRYPT_DOMAIN}/fullchain.pem
|
|
|
|
SSL_KEY_PATH=${LETSENCRYPT_ROOT_DIR}/${LETS_ENCRYPT_DOMAIN}/privkey.pem
|
|
|
|
fi
|
|
|
|
|
2016-07-20 18:56:20 +03:00
|
|
|
read_setting(){
|
2019-10-29 12:42:43 +03:00
|
|
|
deprecated_var POSTGRESQL_SERVER_HOST DB_HOST
|
|
|
|
deprecated_var POSTGRESQL_SERVER_PORT DB_PORT
|
|
|
|
deprecated_var POSTGRESQL_SERVER_DB_NAME DB_NAME
|
|
|
|
deprecated_var POSTGRESQL_SERVER_USER DB_USER
|
|
|
|
deprecated_var POSTGRESQL_SERVER_PASS DB_PWD
|
2019-12-23 12:27:47 +03:00
|
|
|
deprecated_var RABBITMQ_SERVER_URL AMQP_URI
|
|
|
|
deprecated_var AMQP_SERVER_URL AMQP_URI
|
|
|
|
deprecated_var AMQP_SERVER_TYPE AMQP_TYPE
|
2019-10-29 12:42:43 +03:00
|
|
|
|
2020-07-23 15:42:17 +03:00
|
|
|
METRICS_ENABLED="${METRICS_ENABLED:-false}"
|
|
|
|
METRICS_HOST="${METRICS_HOST:-localhost}"
|
|
|
|
METRICS_PORT="${METRICS_PORT:-8125}"
|
|
|
|
METRICS_PREFIX="${METRICS_PREFIX:-.ds}"
|
|
|
|
|
2019-10-29 12:42:43 +03:00
|
|
|
DB_HOST=${DB_HOST:-${POSTGRESQL_SERVER_HOST:-$(${JSON} services.CoAuthoring.sql.dbHost)}}
|
2021-03-19 14:20:52 +01:00
|
|
|
DB_TYPE=${DB_TYPE:-$(${JSON} services.CoAuthoring.sql.type)}
|
2019-10-29 12:42:43 +03:00
|
|
|
case $DB_TYPE in
|
|
|
|
"postgres")
|
|
|
|
DB_PORT=${DB_PORT:-"5432"}
|
|
|
|
;;
|
|
|
|
"mariadb"|"mysql")
|
|
|
|
DB_PORT=${DB_PORT:-"3306"}
|
|
|
|
;;
|
|
|
|
"")
|
|
|
|
DB_PORT=${DB_PORT:-${POSTGRESQL_SERVER_PORT:-$(${JSON} services.CoAuthoring.sql.dbPort)}}
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
echo "ERROR: unknown database type"
|
|
|
|
exit 1
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
DB_NAME=${DB_NAME:-${POSTGRESQL_SERVER_DB_NAME:-$(${JSON} services.CoAuthoring.sql.dbName)}}
|
|
|
|
DB_USER=${DB_USER:-${POSTGRESQL_SERVER_USER:-$(${JSON} services.CoAuthoring.sql.dbUser)}}
|
|
|
|
DB_PWD=${DB_PWD:-${POSTGRESQL_SERVER_PASS:-$(${JSON} services.CoAuthoring.sql.dbPass)}}
|
2016-07-11 11:47:22 +03:00
|
|
|
|
2016-12-09 15:50:07 +03:00
|
|
|
RABBITMQ_SERVER_URL=${RABBITMQ_SERVER_URL:-$(${JSON} rabbitmq.url)}
|
2019-12-23 12:27:47 +03:00
|
|
|
AMQP_URI=${AMQP_URI:-${AMQP_SERVER_URL:-${RABBITMQ_SERVER_URL}}}
|
|
|
|
AMQP_TYPE=${AMQP_TYPE:-${AMQP_SERVER_TYPE:-rabbitmq}}
|
|
|
|
parse_rabbitmq_url ${AMQP_URI}
|
2016-07-20 18:56:20 +03:00
|
|
|
|
|
|
|
REDIS_SERVER_HOST=${REDIS_SERVER_HOST:-$(${JSON} services.CoAuthoring.redis.host)}
|
2018-05-04 11:56:18 +03:00
|
|
|
REDIS_SERVER_PORT=${REDIS_SERVER_PORT:-6379}
|
2017-05-17 17:41:13 +03:00
|
|
|
|
2018-11-15 12:11:08 +03:00
|
|
|
DS_LOG_LEVEL=${DS_LOG_LEVEL:-$(${JSON_LOG} categories.default.level)}
|
2016-07-20 18:56:20 +03:00
|
|
|
}
|
2016-07-11 11:47:22 +03:00
|
|
|
|
2019-10-29 12:42:43 +03:00
|
|
|
deprecated_var() {
|
|
|
|
if [[ -n ${!1} ]]; then
|
|
|
|
echo "Variable $1 is deprecated. Use $2 instead."
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2016-12-09 15:50:07 +03:00
|
|
|
parse_rabbitmq_url(){
|
2019-01-28 15:47:32 +03:00
|
|
|
local amqp=$1
|
2016-12-09 15:50:07 +03:00
|
|
|
|
|
|
|
# extract the protocol
|
|
|
|
local proto="$(echo $amqp | grep :// | sed -e's,^\(.*://\).*,\1,g')"
|
|
|
|
# remove the protocol
|
|
|
|
local url="$(echo ${amqp/$proto/})"
|
|
|
|
|
|
|
|
# extract the user and password (if any)
|
|
|
|
local userpass="`echo $url | grep @ | cut -d@ -f1`"
|
|
|
|
local pass=`echo $userpass | grep : | cut -d: -f2`
|
|
|
|
|
|
|
|
local user
|
|
|
|
if [ -n "$pass" ]; then
|
|
|
|
user=`echo $userpass | grep : | cut -d: -f1`
|
|
|
|
else
|
|
|
|
user=$userpass
|
|
|
|
fi
|
|
|
|
|
|
|
|
# extract the host
|
|
|
|
local hostport="$(echo ${url/$userpass@/} | cut -d/ -f1)"
|
|
|
|
# by request - try to extract the port
|
|
|
|
local port="$(echo $hostport | sed -e 's,^.*:,:,g' -e 's,.*:\([0-9]*\).*,\1,g' -e 's,[^0-9],,g')"
|
|
|
|
|
|
|
|
local host
|
|
|
|
if [ -n "$port" ]; then
|
|
|
|
host=`echo $hostport | grep : | cut -d: -f1`
|
|
|
|
else
|
|
|
|
host=$hostport
|
|
|
|
port="5672"
|
|
|
|
fi
|
|
|
|
|
|
|
|
# extract the path (if any)
|
|
|
|
local path="$(echo $url | grep / | cut -d/ -f2-)"
|
|
|
|
|
2019-09-25 17:49:18 +03:00
|
|
|
AMQP_SERVER_PROTO=${proto:0:-3}
|
2019-01-28 15:47:32 +03:00
|
|
|
AMQP_SERVER_HOST=$host
|
|
|
|
AMQP_SERVER_USER=$user
|
|
|
|
AMQP_SERVER_PASS=$pass
|
|
|
|
AMQP_SERVER_PORT=$port
|
2016-12-09 15:50:07 +03:00
|
|
|
}
|
|
|
|
|
2016-07-11 11:47:22 +03:00
|
|
|
waiting_for_connection(){
|
|
|
|
until nc -z -w 3 "$1" "$2"; do
|
|
|
|
>&2 echo "Waiting for connection to the $1 host on port $2"
|
|
|
|
sleep 1
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2019-10-29 12:42:43 +03:00
|
|
|
waiting_for_db(){
|
|
|
|
waiting_for_connection $DB_HOST $DB_PORT
|
2016-07-11 11:47:22 +03:00
|
|
|
}
|
|
|
|
|
2019-01-28 15:47:32 +03:00
|
|
|
waiting_for_amqp(){
|
|
|
|
waiting_for_connection ${AMQP_SERVER_HOST} ${AMQP_SERVER_PORT}
|
2016-07-11 11:47:22 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
waiting_for_redis(){
|
|
|
|
waiting_for_connection ${REDIS_SERVER_HOST} ${REDIS_SERVER_PORT}
|
|
|
|
}
|
2016-07-20 18:56:20 +03:00
|
|
|
waiting_for_datacontainer(){
|
|
|
|
waiting_for_connection ${ONLYOFFICE_DATA_CONTAINER_HOST} ${ONLYOFFICE_DATA_CONTAINER_PORT}
|
|
|
|
}
|
2020-07-23 15:42:17 +03:00
|
|
|
|
|
|
|
update_statsd_settings(){
|
|
|
|
${JSON} -I -e "if(this.statsd===undefined)this.statsd={};"
|
|
|
|
${JSON} -I -e "this.statsd.useMetrics = '${METRICS_ENABLED}'"
|
|
|
|
${JSON} -I -e "this.statsd.host = '${METRICS_HOST}'"
|
|
|
|
${JSON} -I -e "this.statsd.port = '${METRICS_PORT}'"
|
|
|
|
${JSON} -I -e "this.statsd.prefix = '${METRICS_PREFIX}'"
|
|
|
|
}
|
|
|
|
|
2019-10-29 12:42:43 +03:00
|
|
|
update_db_settings(){
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.sql.type = '${DB_TYPE}'"
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.sql.dbHost = '${DB_HOST}'"
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.sql.dbPort = '${DB_PORT}'"
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.sql.dbName = '${DB_NAME}'"
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.sql.dbUser = '${DB_USER}'"
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.sql.dbPass = '${DB_PWD}'"
|
2016-07-11 11:47:22 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
update_rabbitmq_setting(){
|
2019-12-23 12:27:47 +03:00
|
|
|
if [ "${AMQP_TYPE}" == "rabbitmq" ]; then
|
2019-03-07 15:21:52 +03:00
|
|
|
${JSON} -I -e "if(this.queue===undefined)this.queue={};"
|
2019-03-06 12:30:54 +03:00
|
|
|
${JSON} -I -e "this.queue.type = 'rabbitmq'"
|
2019-12-23 12:27:47 +03:00
|
|
|
${JSON} -I -e "this.rabbitmq.url = '${AMQP_URI}'"
|
2019-01-28 15:47:32 +03:00
|
|
|
fi
|
|
|
|
|
2019-12-23 12:27:47 +03:00
|
|
|
if [ "${AMQP_TYPE}" == "activemq" ]; then
|
2019-03-07 15:21:52 +03:00
|
|
|
${JSON} -I -e "if(this.queue===undefined)this.queue={};"
|
2019-03-06 12:30:54 +03:00
|
|
|
${JSON} -I -e "this.queue.type = 'activemq'"
|
2019-01-28 15:47:32 +03:00
|
|
|
${JSON} -I -e "if(this.activemq===undefined)this.activemq={};"
|
|
|
|
${JSON} -I -e "if(this.activemq.connectOptions===undefined)this.activemq.connectOptions={};"
|
|
|
|
|
|
|
|
${JSON} -I -e "this.activemq.connectOptions.host = '${AMQP_SERVER_HOST}'"
|
|
|
|
|
|
|
|
if [ ! "${AMQP_SERVER_PORT}" == "" ]; then
|
|
|
|
${JSON} -I -e "this.activemq.connectOptions.port = '${AMQP_SERVER_PORT}'"
|
|
|
|
else
|
|
|
|
${JSON} -I -e "delete this.activemq.connectOptions.port"
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ ! "${AMQP_SERVER_USER}" == "" ]; then
|
|
|
|
${JSON} -I -e "this.activemq.connectOptions.username = '${AMQP_SERVER_USER}'"
|
|
|
|
else
|
|
|
|
${JSON} -I -e "delete this.activemq.connectOptions.username"
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ ! "${AMQP_SERVER_PASS}" == "" ]; then
|
|
|
|
${JSON} -I -e "this.activemq.connectOptions.password = '${AMQP_SERVER_PASS}'"
|
|
|
|
else
|
|
|
|
${JSON} -I -e "delete this.activemq.connectOptions.password"
|
|
|
|
fi
|
2019-09-25 17:49:18 +03:00
|
|
|
|
|
|
|
case "${AMQP_SERVER_PROTO}" in
|
|
|
|
amqp+ssl|amqps)
|
|
|
|
${JSON} -I -e "this.activemq.connectOptions.transport = 'tls'"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
${JSON} -I -e "delete this.activemq.connectOptions.transport"
|
|
|
|
;;
|
|
|
|
esac
|
2019-01-28 15:47:32 +03:00
|
|
|
fi
|
2016-07-11 11:47:22 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
update_redis_settings(){
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.redis.host = '${REDIS_SERVER_HOST}'"
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.redis.port = '${REDIS_SERVER_PORT}'"
|
|
|
|
}
|
|
|
|
|
2019-12-26 13:13:13 +03:00
|
|
|
update_ds_settings(){
|
2017-09-01 16:59:34 +03:00
|
|
|
if [ "${JWT_ENABLED}" == "true" ]; then
|
2018-07-19 16:20:20 +03:00
|
|
|
${JSON} -I -e "this.services.CoAuthoring.token.enable.browser = ${JWT_ENABLED}"
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.token.enable.request.inbox = ${JWT_ENABLED}"
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.token.enable.request.outbox = ${JWT_ENABLED}"
|
2017-09-01 16:59:34 +03:00
|
|
|
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.secret.inbox.string = '${JWT_SECRET}'"
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.secret.outbox.string = '${JWT_SECRET}'"
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.secret.session.string = '${JWT_SECRET}'"
|
|
|
|
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.token.inbox.header = '${JWT_HEADER}'"
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.token.outbox.header = '${JWT_HEADER}'"
|
2017-09-06 17:21:52 +03:00
|
|
|
|
2019-12-25 17:25:57 +03:00
|
|
|
${JSON} -I -e "this.services.CoAuthoring.token.inbox.inBody = ${JWT_IN_BODY}"
|
|
|
|
${JSON} -I -e "this.services.CoAuthoring.token.outbox.inBody = ${JWT_IN_BODY}"
|
2019-11-27 11:35:08 +03:00
|
|
|
|
2018-07-19 16:20:20 +03:00
|
|
|
if [ -f "${ONLYOFFICE_EXAMPLE_CONFIG}" ] && [ "${JWT_ENABLED}" == "true" ]; then
|
|
|
|
${JSON_EXAMPLE} -I -e "this.server.token.enable = ${JWT_ENABLED}"
|
2017-09-06 17:21:52 +03:00
|
|
|
${JSON_EXAMPLE} -I -e "this.server.token.secret = '${JWT_SECRET}'"
|
|
|
|
${JSON_EXAMPLE} -I -e "this.server.token.authorizationHeader = '${JWT_HEADER}'"
|
|
|
|
fi
|
2017-09-01 16:59:34 +03:00
|
|
|
fi
|
2019-12-26 13:13:13 +03:00
|
|
|
|
|
|
|
if [ "${USE_UNAUTHORIZED_STORAGE}" == "true" ]; then
|
|
|
|
${JSON} -I -e "if(this.services.CoAuthoring.requestDefaults===undefined)this.services.CoAuthoring.requestDefaults={}"
|
|
|
|
${JSON} -I -e "if(this.services.CoAuthoring.requestDefaults.rejectUnauthorized===undefined)this.services.CoAuthoring.requestDefaults.rejectUnauthorized=false"
|
|
|
|
fi
|
2017-09-01 16:59:34 +03:00
|
|
|
}
|
|
|
|
|
2017-04-24 20:02:01 +03:00
|
|
|
create_postgresql_cluster(){
|
|
|
|
local pg_conf_dir=/etc/postgresql/${PG_VERSION}/${PG_NAME}
|
|
|
|
local postgresql_conf=$pg_conf_dir/postgresql.conf
|
|
|
|
local hba_conf=$pg_conf_dir/pg_hba.conf
|
|
|
|
|
|
|
|
mv $postgresql_conf $postgresql_conf.backup
|
|
|
|
mv $hba_conf $hba_conf.backup
|
2017-05-17 16:35:54 +03:00
|
|
|
|
2017-04-24 20:02:01 +03:00
|
|
|
pg_createcluster ${PG_VERSION} ${PG_NAME}
|
|
|
|
}
|
|
|
|
|
2016-08-25 19:52:14 +03:00
|
|
|
create_postgresql_db(){
|
2020-04-01 12:11:57 +03:00
|
|
|
sudo -u postgres psql -c "CREATE DATABASE $DB_NAME;"
|
|
|
|
sudo -u postgres psql -c "CREATE USER $DB_USER WITH password '"$DB_PWD"';"
|
|
|
|
sudo -u postgres psql -c "GRANT ALL privileges ON DATABASE $DB_NAME TO $DB_USER;"
|
2017-04-24 20:02:01 +03:00
|
|
|
}
|
|
|
|
|
2019-10-29 12:42:43 +03:00
|
|
|
create_db_tbl() {
|
|
|
|
case $DB_TYPE in
|
|
|
|
"postgres")
|
|
|
|
create_postgresql_tbl
|
|
|
|
;;
|
|
|
|
"mariadb"|"mysql")
|
|
|
|
create_mysql_tbl
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
}
|
|
|
|
|
|
|
|
create_postgresql_tbl() {
|
|
|
|
if [ -n "$DB_PWD" ]; then
|
|
|
|
export PGPASSWORD=$DB_PWD
|
2016-07-11 11:47:22 +03:00
|
|
|
fi
|
2016-06-30 12:41:52 +03:00
|
|
|
|
2020-10-27 13:50:48 +03:00
|
|
|
PSQL="psql -q -h$DB_HOST -p$DB_PORT -d$DB_NAME -U$DB_USER -w"
|
|
|
|
$PSQL -f "$APP_DIR/server/schema/postgresql/createdb.sql"
|
2019-10-29 12:42:43 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
create_mysql_tbl() {
|
|
|
|
CONNECTION_PARAMS="-h$DB_HOST -P$DB_PORT -u$DB_USER -p$DB_PWD -w"
|
|
|
|
MYSQL="mysql -q $CONNECTION_PARAMS"
|
|
|
|
|
|
|
|
# Create db on remote server
|
|
|
|
$MYSQL -e "CREATE DATABASE IF NOT EXISTS $DB_NAME DEFAULT CHARACTER SET utf8 DEFAULT COLLATE utf8_general_ci;" >/dev/null 2>&1
|
|
|
|
|
|
|
|
$MYSQL $DB_NAME < "$APP_DIR/server/schema/mysql/createdb.sql" >/dev/null 2>&1
|
2016-08-25 19:52:14 +03:00
|
|
|
}
|
2016-07-11 11:47:22 +03:00
|
|
|
|
2019-11-28 14:59:20 +03:00
|
|
|
update_welcome_page() {
|
|
|
|
WELCOME_PAGE="${APP_DIR}-example/welcome/docker.html"
|
|
|
|
if [[ -e $WELCOME_PAGE ]]; then
|
|
|
|
DOCKER_CONTAINER_ID=$(basename $(cat /proc/1/cpuset))
|
|
|
|
if [[ -x $(command -v docker) ]]; then
|
|
|
|
DOCKER_CONTAINER_NAME=$(docker inspect --format="{{.Name}}" $DOCKER_CONTAINER_ID)
|
|
|
|
sed 's/$(sudo docker ps -q)/'"${DOCKER_CONTAINER_NAME#/}"'/' -i $WELCOME_PAGE
|
|
|
|
else
|
|
|
|
sed 's/$(sudo docker ps -q)/'"${DOCKER_CONTAINER_ID::12}"'/' -i $WELCOME_PAGE
|
|
|
|
fi
|
|
|
|
fi
|
2016-08-25 19:52:14 +03:00
|
|
|
}
|
2016-07-11 11:47:22 +03:00
|
|
|
|
2016-07-20 18:56:20 +03:00
|
|
|
update_nginx_settings(){
|
2016-07-11 11:47:22 +03:00
|
|
|
# Set up nginx
|
|
|
|
sed 's/^worker_processes.*/'"worker_processes ${NGINX_WORKER_PROCESSES};"'/' -i ${NGINX_CONFIG_PATH}
|
|
|
|
sed 's/worker_connections.*/'"worker_connections ${NGINX_WORKER_CONNECTIONS};"'/' -i ${NGINX_CONFIG_PATH}
|
|
|
|
sed 's/access_log.*/'"access_log off;"'/' -i ${NGINX_CONFIG_PATH}
|
|
|
|
|
|
|
|
# setup HTTPS
|
|
|
|
if [ -f "${SSL_CERTIFICATE_PATH}" -a -f "${SSL_KEY_PATH}" ]; then
|
2018-10-16 12:22:18 +03:00
|
|
|
cp -f ${NGINX_ONLYOFFICE_PATH}/ds-ssl.conf.tmpl ${NGINX_ONLYOFFICE_CONF}
|
2016-07-11 11:47:22 +03:00
|
|
|
|
|
|
|
# configure nginx
|
2017-11-29 12:52:57 +03:00
|
|
|
sed 's,{{SSL_CERTIFICATE_PATH}},'"${SSL_CERTIFICATE_PATH}"',' -i ${NGINX_ONLYOFFICE_CONF}
|
|
|
|
sed 's,{{SSL_KEY_PATH}},'"${SSL_KEY_PATH}"',' -i ${NGINX_ONLYOFFICE_CONF}
|
2016-07-11 11:47:22 +03:00
|
|
|
|
2017-12-12 17:02:14 +03:00
|
|
|
# turn on http2
|
|
|
|
sed 's,\(443 ssl\),\1 http2,' -i ${NGINX_ONLYOFFICE_CONF}
|
|
|
|
|
2016-07-11 11:47:22 +03:00
|
|
|
# if dhparam path is valid, add to the config, otherwise remove the option
|
|
|
|
if [ -r "${SSL_DHPARAM_PATH}" ]; then
|
2017-11-29 12:52:57 +03:00
|
|
|
sed 's,\(\#* *\)\?\(ssl_dhparam \).*\(;\)$,'"\2${SSL_DHPARAM_PATH}\3"',' -i ${NGINX_ONLYOFFICE_CONF}
|
2016-07-11 11:47:22 +03:00
|
|
|
else
|
2017-11-29 12:52:57 +03:00
|
|
|
sed '/ssl_dhparam/d' -i ${NGINX_ONLYOFFICE_CONF}
|
2016-07-11 11:47:22 +03:00
|
|
|
fi
|
|
|
|
|
2017-11-29 12:52:57 +03:00
|
|
|
sed 's,\(ssl_verify_client \).*\(;\)$,'"\1${SSL_VERIFY_CLIENT}\2"',' -i ${NGINX_ONLYOFFICE_CONF}
|
2016-07-11 11:47:22 +03:00
|
|
|
|
|
|
|
if [ -f "${CA_CERTIFICATES_PATH}" ]; then
|
2017-11-29 12:52:57 +03:00
|
|
|
sed '/ssl_verify_client/a '"ssl_client_certificate ${CA_CERTIFICATES_PATH}"';' -i ${NGINX_ONLYOFFICE_CONF}
|
2016-07-11 11:47:22 +03:00
|
|
|
fi
|
|
|
|
|
|
|
|
if [ "${ONLYOFFICE_HTTPS_HSTS_ENABLED}" == "true" ]; then
|
2017-11-29 12:52:57 +03:00
|
|
|
sed 's,\(max-age=\).*\(;\)$,'"\1${ONLYOFFICE_HTTPS_HSTS_MAXAGE}\2"',' -i ${NGINX_ONLYOFFICE_CONF}
|
2016-07-11 11:47:22 +03:00
|
|
|
else
|
2017-11-29 12:52:57 +03:00
|
|
|
sed '/max-age=/d' -i ${NGINX_ONLYOFFICE_CONF}
|
2016-07-11 11:47:22 +03:00
|
|
|
fi
|
|
|
|
else
|
2018-10-16 12:22:18 +03:00
|
|
|
ln -sf ${NGINX_ONLYOFFICE_PATH}/ds.conf.tmpl ${NGINX_ONLYOFFICE_CONF}
|
2016-07-11 11:47:22 +03:00
|
|
|
fi
|
2017-05-12 16:51:22 +03:00
|
|
|
|
2019-05-21 16:06:58 +03:00
|
|
|
# check if ipv6 supported otherwise remove it from nginx config
|
|
|
|
if [ ! -f /proc/net/if_inet6 ]; then
|
|
|
|
sed '/listen\s\+\[::[0-9]*\].\+/d' -i $NGINX_ONLYOFFICE_CONF
|
|
|
|
fi
|
|
|
|
|
2017-11-29 14:37:21 +03:00
|
|
|
if [ -f "${NGINX_ONLYOFFICE_EXAMPLE_CONF}" ]; then
|
|
|
|
sed 's/linux/docker/' -i ${NGINX_ONLYOFFICE_EXAMPLE_CONF}
|
2017-01-17 16:15:54 +03:00
|
|
|
fi
|
2016-07-11 11:47:22 +03:00
|
|
|
}
|
|
|
|
|
2016-07-20 18:56:20 +03:00
|
|
|
update_supervisor_settings(){
|
2016-07-11 11:47:22 +03:00
|
|
|
# Copy modified supervisor start script
|
|
|
|
cp ${SYSCONF_TEMPLATES_DIR}/supervisor/supervisor /etc/init.d/
|
|
|
|
# Copy modified supervisor config
|
|
|
|
cp ${SYSCONF_TEMPLATES_DIR}/supervisor/supervisord.conf /etc/supervisor/supervisord.conf
|
|
|
|
}
|
2015-04-17 15:25:41 +00:00
|
|
|
|
2017-05-17 17:41:13 +03:00
|
|
|
update_log_settings(){
|
2018-11-15 12:11:08 +03:00
|
|
|
${JSON_LOG} -I -e "this.categories.default.level = '${DS_LOG_LEVEL}'"
|
2017-05-17 17:41:13 +03:00
|
|
|
}
|
|
|
|
|
2018-11-20 17:06:53 +03:00
|
|
|
update_logrotate_settings(){
|
|
|
|
sed 's|\(^su\b\).*|\1 root root|' -i /etc/logrotate.conf
|
|
|
|
}
|
|
|
|
|
2015-05-25 06:47:54 -04:00
|
|
|
# create base folders
|
2020-02-25 13:54:23 +03:00
|
|
|
for i in converter docservice spellchecker metrics; do
|
2017-11-10 15:10:52 +03:00
|
|
|
mkdir -p "${DS_LOG_DIR}/$i"
|
2016-06-30 12:41:52 +03:00
|
|
|
done
|
|
|
|
|
2017-11-10 15:10:52 +03:00
|
|
|
mkdir -p ${DS_LOG_DIR}-example
|
|
|
|
|
2019-05-29 16:26:22 +03:00
|
|
|
# create app folders
|
2020-02-12 13:42:04 +03:00
|
|
|
for i in ${DS_LIB_DIR}/App_Data/cache/files ${DS_LIB_DIR}/App_Data/docbuilder ${DS_LIB_DIR}-example/files; do
|
|
|
|
mkdir -p "$i"
|
2019-05-29 16:26:22 +03:00
|
|
|
done
|
|
|
|
|
2017-11-10 15:10:52 +03:00
|
|
|
# change folder rights
|
2018-10-02 19:36:14 +03:00
|
|
|
for i in ${LOG_DIR} ${LIB_DIR} ${DATA_DIR}; do
|
2018-10-16 12:22:18 +03:00
|
|
|
chown -R ds:ds "$i"
|
2017-11-10 15:10:52 +03:00
|
|
|
chmod -R 755 "$i"
|
|
|
|
done
|
2016-06-30 12:41:52 +03:00
|
|
|
|
2016-07-20 18:56:20 +03:00
|
|
|
if [ ${ONLYOFFICE_DATA_CONTAINER_HOST} = "localhost" ]; then
|
|
|
|
|
|
|
|
read_setting
|
|
|
|
|
2020-07-23 15:42:17 +03:00
|
|
|
if [ $METRICS_ENABLED = "true" ]; then
|
|
|
|
update_statsd_settings
|
|
|
|
fi
|
|
|
|
|
2019-11-28 14:59:20 +03:00
|
|
|
update_welcome_page
|
|
|
|
|
2017-05-17 17:41:13 +03:00
|
|
|
update_log_settings
|
|
|
|
|
2019-12-26 13:13:13 +03:00
|
|
|
update_ds_settings
|
2017-09-01 16:59:34 +03:00
|
|
|
|
2016-07-20 18:56:20 +03:00
|
|
|
# update settings by env variables
|
2019-10-29 12:42:43 +03:00
|
|
|
if [ $DB_HOST != "localhost" ]; then
|
|
|
|
update_db_settings
|
|
|
|
waiting_for_db
|
|
|
|
create_db_tbl
|
2016-07-20 18:56:20 +03:00
|
|
|
else
|
2018-04-03 19:39:11 +03:00
|
|
|
# change rights for postgres directory
|
|
|
|
chown -R postgres:postgres ${PG_ROOT}
|
|
|
|
chmod -R 700 ${PG_ROOT}
|
|
|
|
|
|
|
|
# create new db if it isn't exist
|
2017-04-24 20:02:01 +03:00
|
|
|
if [ ! -d ${PGDATA} ]; then
|
|
|
|
create_postgresql_cluster
|
|
|
|
PG_NEW_CLUSTER=true
|
|
|
|
fi
|
2016-08-25 19:52:14 +03:00
|
|
|
LOCAL_SERVICES+=("postgresql")
|
2016-07-11 11:47:22 +03:00
|
|
|
fi
|
2016-06-30 12:41:52 +03:00
|
|
|
|
2019-01-28 15:47:32 +03:00
|
|
|
if [ ${AMQP_SERVER_HOST} != "localhost" ]; then
|
2016-07-20 18:56:20 +03:00
|
|
|
update_rabbitmq_setting
|
|
|
|
else
|
2019-12-20 13:15:59 +03:00
|
|
|
# change rights for rabbitmq directory
|
|
|
|
chown -R rabbitmq:rabbitmq ${RABBITMQ_DATA}
|
|
|
|
chmod -R go=rX,u=rwX ${RABBITMQ_DATA}
|
|
|
|
if [ -f ${RABBITMQ_DATA}/.erlang.cookie ]; then
|
|
|
|
chmod 400 ${RABBITMQ_DATA}/.erlang.cookie
|
|
|
|
fi
|
|
|
|
|
2017-04-12 14:46:06 +03:00
|
|
|
LOCAL_SERVICES+=("rabbitmq-server")
|
2018-10-22 10:50:30 +03:00
|
|
|
# allow Rabbitmq startup after container kill
|
|
|
|
rm -rf /var/run/rabbitmq
|
2016-07-11 11:47:22 +03:00
|
|
|
fi
|
2016-06-30 12:41:52 +03:00
|
|
|
|
2020-07-30 10:58:54 +03:00
|
|
|
if [ ${REDIS_ENABLED} = "true" ]; then
|
|
|
|
if [ ${REDIS_SERVER_HOST} != "localhost" ]; then
|
|
|
|
update_redis_settings
|
|
|
|
else
|
|
|
|
# change rights for redis directory
|
|
|
|
chown -R redis:redis ${REDIS_DATA}
|
|
|
|
chmod -R 750 ${REDIS_DATA}
|
|
|
|
|
|
|
|
LOCAL_SERVICES+=("redis-server")
|
|
|
|
fi
|
2016-07-11 11:47:22 +03:00
|
|
|
fi
|
2016-07-20 18:56:20 +03:00
|
|
|
else
|
|
|
|
# no need to update settings just wait for remote data
|
|
|
|
waiting_for_datacontainer
|
|
|
|
|
|
|
|
# read settings after the data container in ready state
|
|
|
|
# to prevent get unconfigureted data
|
|
|
|
read_setting
|
2019-11-28 14:59:20 +03:00
|
|
|
|
|
|
|
update_welcome_page
|
2016-06-30 12:41:52 +03:00
|
|
|
fi
|
|
|
|
|
2016-07-20 18:56:20 +03:00
|
|
|
#start needed local services
|
|
|
|
for i in ${LOCAL_SERVICES[@]}; do
|
|
|
|
service $i start
|
|
|
|
done
|
|
|
|
|
2017-04-24 20:02:01 +03:00
|
|
|
if [ ${PG_NEW_CLUSTER} = "true" ]; then
|
2017-04-25 14:29:24 +03:00
|
|
|
create_postgresql_db
|
2017-04-24 20:02:01 +03:00
|
|
|
create_postgresql_tbl
|
|
|
|
fi
|
|
|
|
|
2016-07-11 11:47:22 +03:00
|
|
|
if [ ${ONLYOFFICE_DATA_CONTAINER} != "true" ]; then
|
2019-10-29 12:42:43 +03:00
|
|
|
waiting_for_db
|
2019-01-28 15:47:32 +03:00
|
|
|
waiting_for_amqp
|
2020-06-04 15:15:34 +03:00
|
|
|
if [ ${REDIS_ENABLED} = "true" ]; then
|
|
|
|
waiting_for_redis
|
|
|
|
fi
|
2016-07-20 18:56:20 +03:00
|
|
|
|
|
|
|
update_nginx_settings
|
|
|
|
|
|
|
|
update_supervisor_settings
|
|
|
|
service supervisor start
|
2018-06-25 14:58:17 +03:00
|
|
|
|
|
|
|
# start cron to enable log rotating
|
2018-11-20 17:06:53 +03:00
|
|
|
update_logrotate_settings
|
2018-06-25 14:58:17 +03:00
|
|
|
service cron start
|
2016-07-11 11:47:22 +03:00
|
|
|
fi
|
2016-06-30 12:41:52 +03:00
|
|
|
|
2016-07-20 18:56:20 +03:00
|
|
|
# nginx used as a proxy, and as data container status service.
|
|
|
|
# it run in all cases.
|
|
|
|
service nginx start
|
|
|
|
|
2020-11-18 10:46:19 +03:00
|
|
|
if [ "${LETS_ENCRYPT_DOMAIN}" != "" -a "${LETS_ENCRYPT_MAIL}" != "" ]; then
|
2020-10-22 13:47:51 +03:00
|
|
|
if [ ! -f "${SSL_CERTIFICATE_PATH}" -a ! -f "${SSL_KEY_PATH}" ]; then
|
|
|
|
documentserver-letsencrypt.sh ${LETS_ENCRYPT_MAIL} ${LETS_ENCRYPT_DOMAIN}
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2016-06-30 12:41:52 +03:00
|
|
|
# Regenerate the fonts list and the fonts thumbnails
|
2020-10-20 16:14:55 +03:00
|
|
|
if [ "${GENERATE_FONTS}" == "true" ]; then
|
|
|
|
documentserver-generate-allfonts.sh ${ONLYOFFICE_DATA_CONTAINER}
|
|
|
|
fi
|
2018-01-29 11:56:51 +03:00
|
|
|
documentserver-static-gzip.sh ${ONLYOFFICE_DATA_CONTAINER}
|
2018-04-12 21:41:24 +00:00
|
|
|
|
2020-09-10 16:02:20 +02:00
|
|
|
tail -f /var/log/${COMPANY_NAME}/**/*.log &
|
|
|
|
wait $!
|