905 lines
		
	
	
		
			27 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
			
		
		
	
	
			905 lines
		
	
	
		
			27 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
#!/usr/bin/env bash
 | 
						|
 | 
						|
SCRIPT_VERSION="69"
 | 
						|
SCRIPT_URL='https://raw.githubusercontent.com/amidaware/tacticalrmm/master/install.sh'
 | 
						|
 | 
						|
sudo apt install -y curl wget dirmngr gnupg lsb-release
 | 
						|
 | 
						|
GREEN='\033[0;32m'
 | 
						|
YELLOW='\033[1;33m'
 | 
						|
BLUE='\033[0;34m'
 | 
						|
RED='\033[0;31m'
 | 
						|
NC='\033[0m'
 | 
						|
 | 
						|
SCRIPTS_DIR='/opt/trmm-community-scripts'
 | 
						|
PYTHON_VER='3.10.6'
 | 
						|
SETTINGS_FILE='/rmm/api/tacticalrmm/tacticalrmm/settings.py'
 | 
						|
 | 
						|
TMP_FILE=$(mktemp -p "" "rmminstall_XXXXXXXXXX")
 | 
						|
curl -s -L "${SCRIPT_URL}" > ${TMP_FILE}
 | 
						|
NEW_VER=$(grep "^SCRIPT_VERSION" "$TMP_FILE" | awk -F'[="]' '{print $3}')
 | 
						|
 | 
						|
if [ "${SCRIPT_VERSION}" -ne "${NEW_VER}" ]; then
 | 
						|
    printf >&2 "${YELLOW}Old install script detected, downloading and replacing with the latest version...${NC}\n"
 | 
						|
    wget -q "${SCRIPT_URL}" -O install.sh
 | 
						|
    printf >&2 "${YELLOW}Script updated! Please re-run ./install.sh${NC}\n"
 | 
						|
    rm -f $TMP_FILE
 | 
						|
    exit 1
 | 
						|
fi
 | 
						|
 | 
						|
rm -f $TMP_FILE
 | 
						|
 | 
						|
osname=$(lsb_release -si); osname=${osname^}
 | 
						|
osname=$(echo "$osname" | tr  '[A-Z]' '[a-z]')
 | 
						|
fullrel=$(lsb_release -sd)
 | 
						|
codename=$(lsb_release -sc)
 | 
						|
relno=$(lsb_release -sr | cut -d. -f1)
 | 
						|
fullrelno=$(lsb_release -sr)
 | 
						|
 | 
						|
# Fallback if lsb_release -si returns anything else than Ubuntu, Debian or Raspbian
 | 
						|
if [ ! "$osname" = "ubuntu" ] && [ ! "$osname" = "debian" ]; then
 | 
						|
  osname=$(grep -oP '(?<=^ID=).+' /etc/os-release | tr -d '"')
 | 
						|
  osname=${osname^}
 | 
						|
fi
 | 
						|
 | 
						|
 | 
						|
# determine system
 | 
						|
if ([ "$osname" = "ubuntu" ] && [ "$fullrelno" = "20.04" ]) || ([ "$osname" = "debian" ] && [ $relno -ge 10 ]); then
 | 
						|
  echo $fullrel
 | 
						|
else
 | 
						|
 echo $fullrel
 | 
						|
 echo -ne "${RED}Supported versions: Ubuntu 20.04, Debian 10 and 11\n"
 | 
						|
 echo -ne "Your system does not appear to be supported${NC}\n"
 | 
						|
 exit 1
 | 
						|
fi
 | 
						|
 | 
						|
if [ $EUID -eq 0 ]; then
 | 
						|
  echo -ne "${RED}Do NOT run this script as root. Exiting.${NC}\n"
 | 
						|
  exit 1
 | 
						|
fi
 | 
						|
 | 
						|
if [[ "$LANG" != *".UTF-8" ]]; then
 | 
						|
  printf >&2 "\n${RED}System locale must be ${GREEN}<some language>.UTF-8${RED} not ${YELLOW}${LANG}${NC}\n"
 | 
						|
  printf >&2 "${RED}Run the following command and change the default locale to your language of choice${NC}\n\n"
 | 
						|
  printf >&2 "${GREEN}sudo dpkg-reconfigure locales${NC}\n\n"
 | 
						|
  printf >&2 "${RED}You will need to log out and back in for changes to take effect, then re-run this script.${NC}\n\n"
 | 
						|
  exit 1
 | 
						|
fi
 | 
						|
 | 
						|
if ([ "$osname" = "ubuntu" ]); then
 | 
						|
  mongodb_repo="deb [arch=amd64] https://repo.mongodb.org/apt/$osname $codename/mongodb-org/4.4 multiverse"
 | 
						|
# there is no bullseye repo yet for mongo so just use buster on debian 11
 | 
						|
elif ([ "$osname" = "debian" ] && [ $relno -eq 11 ]); then
 | 
						|
  mongodb_repo="deb [arch=amd64] https://repo.mongodb.org/apt/$osname buster/mongodb-org/4.4 main"
 | 
						|
else
 | 
						|
  mongodb_repo="deb [arch=amd64] https://repo.mongodb.org/apt/$osname $codename/mongodb-org/4.4 main"
 | 
						|
fi
 | 
						|
 | 
						|
postgresql_repo="deb [arch=amd64] https://apt.postgresql.org/pub/repos/apt/ $codename-pgdg main"
 | 
						|
 | 
						|
 | 
						|
# prevents logging issues with some VPS providers like Vultr if this is a freshly provisioned instance that hasn't been rebooted yet
 | 
						|
sudo systemctl restart systemd-journald.service
 | 
						|
 | 
						|
DJANGO_SEKRET=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 80 | head -n 1)
 | 
						|
ADMINURL=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 70 | head -n 1)
 | 
						|
MESHPASSWD=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 25 | head -n 1)
 | 
						|
pgusername=$(cat /dev/urandom | tr -dc 'a-z' | fold -w 8 | head -n 1)
 | 
						|
pgpw=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 20 | head -n 1)
 | 
						|
meshusername=$(cat /dev/urandom | tr -dc 'a-z' | fold -w 8 | head -n 1)
 | 
						|
 | 
						|
cls() {
 | 
						|
  printf "\033c"
 | 
						|
}
 | 
						|
 | 
						|
print_green() {
 | 
						|
  printf >&2 "${GREEN}%0.s-${NC}" {1..80}
 | 
						|
  printf >&2 "\n"
 | 
						|
  printf >&2 "${GREEN}${1}${NC}\n"
 | 
						|
  printf >&2 "${GREEN}%0.s-${NC}" {1..80}
 | 
						|
  printf >&2 "\n"
 | 
						|
}
 | 
						|
 | 
						|
cls
 | 
						|
 | 
						|
while [[ $rmmdomain != *[.]*[.]* ]]
 | 
						|
do
 | 
						|
echo -ne "${YELLOW}Enter the subdomain for the backend (e.g. api.example.com)${NC}: "
 | 
						|
read rmmdomain
 | 
						|
done
 | 
						|
 | 
						|
while [[ $frontenddomain != *[.]*[.]* ]]
 | 
						|
do
 | 
						|
echo -ne "${YELLOW}Enter the subdomain for the frontend (e.g. rmm.example.com)${NC}: "
 | 
						|
read frontenddomain
 | 
						|
done
 | 
						|
 | 
						|
while [[ $meshdomain != *[.]*[.]* ]]
 | 
						|
do
 | 
						|
echo -ne "${YELLOW}Enter the subdomain for meshcentral (e.g. mesh.example.com)${NC}: "
 | 
						|
read meshdomain
 | 
						|
done
 | 
						|
 | 
						|
echo -ne "${YELLOW}Enter the root domain (e.g. example.com or example.co.uk)${NC}: "
 | 
						|
read rootdomain
 | 
						|
 | 
						|
while [[ $letsemail != *[@]*[.]* ]]
 | 
						|
do
 | 
						|
echo -ne "${YELLOW}Enter a valid email address for django and meshcentral${NC}: "
 | 
						|
read letsemail
 | 
						|
done
 | 
						|
 | 
						|
# if server is behind NAT we need to add the 3 subdomains to the host file
 | 
						|
# so that nginx can properly route between the frontend, backend and meshcentral
 | 
						|
# EDIT 8-29-2020
 | 
						|
# running this even if server is __not__ behind NAT just to make DNS resolving faster
 | 
						|
# this also allows the install script to properly finish even if DNS has not fully propagated
 | 
						|
CHECK_HOSTS=$(grep 127.0.1.1 /etc/hosts | grep "$rmmdomain" | grep "$meshdomain" | grep "$frontenddomain")
 | 
						|
HAS_11=$(grep 127.0.1.1 /etc/hosts)
 | 
						|
 | 
						|
if ! [[ $CHECK_HOSTS ]]; then
 | 
						|
  print_green 'Adding subdomains to hosts file'
 | 
						|
  if [[ $HAS_11 ]]; then
 | 
						|
    sudo sed -i "/127.0.1.1/s/$/ ${rmmdomain} ${frontenddomain} ${meshdomain}/" /etc/hosts
 | 
						|
  else
 | 
						|
    echo "127.0.1.1 ${rmmdomain} ${frontenddomain} ${meshdomain}" | sudo tee --append /etc/hosts > /dev/null
 | 
						|
  fi
 | 
						|
fi
 | 
						|
 | 
						|
BEHIND_NAT=false
 | 
						|
IPV4=$(ip -4 addr | sed -ne 's|^.* inet \([^/]*\)/.* scope global.*$|\1|p' | head -1)
 | 
						|
if echo "$IPV4" | grep -qE '^(10\.|172\.1[6789]\.|172\.2[0-9]\.|172\.3[01]\.|192\.168)'; then
 | 
						|
    BEHIND_NAT=true
 | 
						|
fi
 | 
						|
 | 
						|
sudo apt install -y software-properties-common
 | 
						|
sudo apt update
 | 
						|
sudo apt install -y certbot openssl
 | 
						|
 | 
						|
print_green 'Getting wildcard cert'
 | 
						|
 | 
						|
sudo certbot certonly --manual -d *.${rootdomain} --agree-tos --no-bootstrap --preferred-challenges dns -m ${letsemail} --no-eff-email
 | 
						|
while [[ $? -ne 0 ]]
 | 
						|
do
 | 
						|
sudo certbot certonly --manual -d *.${rootdomain} --agree-tos --no-bootstrap --preferred-challenges dns -m ${letsemail} --no-eff-email
 | 
						|
done
 | 
						|
 | 
						|
CERT_PRIV_KEY=/etc/letsencrypt/live/${rootdomain}/privkey.pem
 | 
						|
CERT_PUB_KEY=/etc/letsencrypt/live/${rootdomain}/fullchain.pem
 | 
						|
 | 
						|
sudo chown ${USER}:${USER} -R /etc/letsencrypt
 | 
						|
 | 
						|
print_green 'Installing Nginx'
 | 
						|
 | 
						|
wget -qO - https://nginx.org/packages/keys/nginx_signing.key | sudo apt-key add -
 | 
						|
 | 
						|
nginxrepo="$(cat << EOF
 | 
						|
deb https://nginx.org/packages/$osname/ $codename nginx
 | 
						|
deb-src https://nginx.org/packages/$osname/ $codename nginx
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${nginxrepo}" | sudo tee /etc/apt/sources.list.d/nginx.list > /dev/null
 | 
						|
 | 
						|
sudo apt update
 | 
						|
sudo apt install -y nginx
 | 
						|
sudo systemctl stop nginx
 | 
						|
 | 
						|
nginxdefaultconf='/etc/nginx/nginx.conf'
 | 
						|
 | 
						|
nginxconf="$(cat << EOF
 | 
						|
worker_rlimit_nofile 1000000;
 | 
						|
user www-data;
 | 
						|
worker_processes auto;
 | 
						|
pid /run/nginx.pid;
 | 
						|
include /etc/nginx/modules-enabled/*.conf;
 | 
						|
 | 
						|
events {
 | 
						|
        worker_connections 4096;
 | 
						|
}
 | 
						|
 | 
						|
http {
 | 
						|
        sendfile on;
 | 
						|
        tcp_nopush on;
 | 
						|
        types_hash_max_size 2048;
 | 
						|
        server_names_hash_bucket_size 64;
 | 
						|
        include /etc/nginx/mime.types;
 | 
						|
        default_type application/octet-stream;
 | 
						|
        ssl_protocols TLSv1.2 TLSv1.3;
 | 
						|
        ssl_prefer_server_ciphers on;
 | 
						|
        access_log /var/log/nginx/access.log;
 | 
						|
        error_log /var/log/nginx/error.log;
 | 
						|
        gzip on;
 | 
						|
        include /etc/nginx/conf.d/*.conf;
 | 
						|
        include /etc/nginx/sites-enabled/*;
 | 
						|
}
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${nginxconf}" | sudo tee $nginxdefaultconf > /dev/null
 | 
						|
 | 
						|
for i in sites-available sites-enabled
 | 
						|
do
 | 
						|
sudo mkdir -p /etc/nginx/$i
 | 
						|
done
 | 
						|
 | 
						|
print_green 'Installing NodeJS'
 | 
						|
 | 
						|
curl -sL https://deb.nodesource.com/setup_16.x | sudo -E bash -
 | 
						|
sudo apt update
 | 
						|
sudo apt install -y gcc g++ make
 | 
						|
sudo apt install -y nodejs
 | 
						|
sudo npm install -g npm
 | 
						|
 | 
						|
print_green 'Installing MongoDB'
 | 
						|
 | 
						|
wget -qO - https://www.mongodb.org/static/pgp/server-4.4.asc | sudo apt-key add -
 | 
						|
echo "$mongodb_repo" | sudo tee /etc/apt/sources.list.d/mongodb-org-4.4.list
 | 
						|
sudo apt update
 | 
						|
sudo apt install -y mongodb-org
 | 
						|
sudo systemctl enable mongod
 | 
						|
sudo systemctl restart mongod
 | 
						|
 | 
						|
print_green "Installing Python ${PYTHON_VER}"
 | 
						|
 | 
						|
sudo apt install -y build-essential zlib1g-dev libncurses5-dev libgdbm-dev libnss3-dev libssl-dev libreadline-dev libffi-dev libsqlite3-dev libbz2-dev
 | 
						|
numprocs=$(nproc)
 | 
						|
cd ~
 | 
						|
wget https://www.python.org/ftp/python/${PYTHON_VER}/Python-${PYTHON_VER}.tgz
 | 
						|
tar -xf Python-${PYTHON_VER}.tgz
 | 
						|
cd Python-${PYTHON_VER}
 | 
						|
./configure --enable-optimizations
 | 
						|
make -j $numprocs
 | 
						|
sudo make altinstall
 | 
						|
cd ~
 | 
						|
sudo rm -rf Python-${PYTHON_VER} Python-${PYTHON_VER}.tgz
 | 
						|
 | 
						|
 | 
						|
print_green 'Installing redis and git'
 | 
						|
sudo apt install -y ca-certificates redis git
 | 
						|
 | 
						|
print_green 'Installing postgresql'
 | 
						|
 | 
						|
echo "$postgresql_repo" | sudo tee /etc/apt/sources.list.d/pgdg.list
 | 
						|
 | 
						|
wget --quiet -O - https://www.postgresql.org/media/keys/ACCC4CF8.asc | sudo apt-key add -
 | 
						|
sudo apt update
 | 
						|
sudo apt install -y postgresql-14
 | 
						|
sleep 2
 | 
						|
sudo systemctl enable --now postgresql
 | 
						|
 | 
						|
until pg_isready > /dev/null; do
 | 
						|
  echo -ne "${GREEN}Waiting for PostgreSQL to be ready${NC}\n"
 | 
						|
  sleep 3
 | 
						|
 done
 | 
						|
 | 
						|
print_green 'Creating database for the rmm'
 | 
						|
 | 
						|
sudo -u postgres psql -c "CREATE DATABASE tacticalrmm"
 | 
						|
sudo -u postgres psql -c "CREATE USER ${pgusername} WITH PASSWORD '${pgpw}'"
 | 
						|
sudo -u postgres psql -c "ALTER ROLE ${pgusername} SET client_encoding TO 'utf8'"
 | 
						|
sudo -u postgres psql -c "ALTER ROLE ${pgusername} SET default_transaction_isolation TO 'read committed'"
 | 
						|
sudo -u postgres psql -c "ALTER ROLE ${pgusername} SET timezone TO 'UTC'"
 | 
						|
sudo -u postgres psql -c "GRANT ALL PRIVILEGES ON DATABASE tacticalrmm TO ${pgusername}"
 | 
						|
 | 
						|
print_green 'Cloning repos'
 | 
						|
 | 
						|
sudo mkdir /rmm
 | 
						|
sudo chown ${USER}:${USER} /rmm
 | 
						|
sudo mkdir -p /var/log/celery
 | 
						|
sudo chown ${USER}:${USER} /var/log/celery
 | 
						|
git clone https://github.com/amidaware/tacticalrmm.git /rmm/
 | 
						|
cd /rmm
 | 
						|
git config user.email "admin@example.com"
 | 
						|
git config user.name "Bob"
 | 
						|
git checkout master
 | 
						|
 | 
						|
sudo mkdir -p ${SCRIPTS_DIR}
 | 
						|
sudo chown ${USER}:${USER} ${SCRIPTS_DIR}
 | 
						|
git clone https://github.com/amidaware/community-scripts.git ${SCRIPTS_DIR}/
 | 
						|
cd ${SCRIPTS_DIR}
 | 
						|
git config user.email "admin@example.com"
 | 
						|
git config user.name "Bob"
 | 
						|
git checkout main
 | 
						|
 | 
						|
print_green 'Downloading NATS'
 | 
						|
 | 
						|
NATS_SERVER_VER=$(grep "^NATS_SERVER_VER" "$SETTINGS_FILE" | awk -F'[= "]' '{print $5}')
 | 
						|
nats_tmp=$(mktemp -d -t nats-XXXXXXXXXX)
 | 
						|
wget https://github.com/nats-io/nats-server/releases/download/v${NATS_SERVER_VER}/nats-server-v${NATS_SERVER_VER}-linux-amd64.tar.gz -P ${nats_tmp}
 | 
						|
tar -xzf ${nats_tmp}/nats-server-v${NATS_SERVER_VER}-linux-amd64.tar.gz -C ${nats_tmp}
 | 
						|
sudo mv ${nats_tmp}/nats-server-v${NATS_SERVER_VER}-linux-amd64/nats-server /usr/local/bin/
 | 
						|
sudo chmod +x /usr/local/bin/nats-server
 | 
						|
sudo chown ${USER}:${USER} /usr/local/bin/nats-server
 | 
						|
rm -rf ${nats_tmp}
 | 
						|
 | 
						|
print_green 'Installing MeshCentral'
 | 
						|
 | 
						|
MESH_VER=$(grep "^MESH_VER" "$SETTINGS_FILE" | awk -F'[= "]' '{print $5}')
 | 
						|
 | 
						|
sudo mkdir -p /meshcentral/meshcentral-data
 | 
						|
sudo chown ${USER}:${USER} -R /meshcentral
 | 
						|
cd /meshcentral
 | 
						|
npm install meshcentral@${MESH_VER}
 | 
						|
sudo chown ${USER}:${USER} -R /meshcentral
 | 
						|
 | 
						|
meshcfg="$(cat << EOF
 | 
						|
{
 | 
						|
  "settings": {
 | 
						|
    "cert": "${meshdomain}",
 | 
						|
    "mongoDb": "mongodb://127.0.0.1:27017",
 | 
						|
    "mongoDbName": "meshcentral",
 | 
						|
    "WANonly": true,
 | 
						|
    "minify": 1,
 | 
						|
    "port": 4430,
 | 
						|
    "aliasPort": 443,
 | 
						|
    "redirPort": 800,
 | 
						|
    "allowLoginToken": true,
 | 
						|
    "allowFraming": true,
 | 
						|
    "_agentPing": 60,
 | 
						|
    "agentPong": 300,
 | 
						|
    "allowHighQualityDesktop": true,
 | 
						|
    "tlsOffload": "127.0.0.1",
 | 
						|
    "agentCoreDump": false,
 | 
						|
    "compression": true,
 | 
						|
    "wsCompression": true,
 | 
						|
    "agentWsCompression": true,
 | 
						|
    "maxInvalidLogin": { "time": 5, "count": 5, "coolofftime": 30 }
 | 
						|
  },
 | 
						|
  "domains": {
 | 
						|
    "": {
 | 
						|
      "title": "Tactical RMM",
 | 
						|
      "title2": "Tactical RMM",
 | 
						|
      "newAccounts": false,
 | 
						|
      "certUrl": "https://${meshdomain}:443/",
 | 
						|
      "geoLocation": true,
 | 
						|
      "cookieIpCheck": false,
 | 
						|
      "mstsc": true
 | 
						|
    }
 | 
						|
  }
 | 
						|
}
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${meshcfg}" > /meshcentral/meshcentral-data/config.json
 | 
						|
 | 
						|
localvars="$(cat << EOF
 | 
						|
SECRET_KEY = "${DJANGO_SEKRET}"
 | 
						|
 | 
						|
DEBUG = False
 | 
						|
 | 
						|
ALLOWED_HOSTS = ['${rmmdomain}']
 | 
						|
 | 
						|
ADMIN_URL = "${ADMINURL}/"
 | 
						|
 | 
						|
CORS_ORIGIN_WHITELIST = [
 | 
						|
    "https://${frontenddomain}"
 | 
						|
]
 | 
						|
 | 
						|
DATABASES = {
 | 
						|
    'default': {
 | 
						|
        'ENGINE': 'django.db.backends.postgresql',
 | 
						|
        'NAME': 'tacticalrmm',
 | 
						|
        'USER': '${pgusername}',
 | 
						|
        'PASSWORD': '${pgpw}',
 | 
						|
        'HOST': 'localhost',
 | 
						|
        'PORT': '5432',
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
MESH_USERNAME = "${meshusername}"
 | 
						|
MESH_SITE = "https://${meshdomain}"
 | 
						|
REDIS_HOST    = "localhost"
 | 
						|
ADMIN_ENABLED = True
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${localvars}" > /rmm/api/tacticalrmm/tacticalrmm/local_settings.py
 | 
						|
 | 
						|
sudo cp /rmm/natsapi/bin/nats-api /usr/local/bin
 | 
						|
sudo chown ${USER}:${USER} /usr/local/bin/nats-api
 | 
						|
sudo chmod +x /usr/local/bin/nats-api
 | 
						|
 | 
						|
print_green 'Installing the backend'
 | 
						|
 | 
						|
SETUPTOOLS_VER=$(grep "^SETUPTOOLS_VER" "$SETTINGS_FILE" | awk -F'[= "]' '{print $5}')
 | 
						|
WHEEL_VER=$(grep "^WHEEL_VER" "$SETTINGS_FILE" | awk -F'[= "]' '{print $5}')
 | 
						|
 | 
						|
cd /rmm/api
 | 
						|
python3.10 -m venv env
 | 
						|
source /rmm/api/env/bin/activate
 | 
						|
cd /rmm/api/tacticalrmm
 | 
						|
pip install --no-cache-dir --upgrade pip
 | 
						|
pip install --no-cache-dir setuptools==${SETUPTOOLS_VER} wheel==${WHEEL_VER}
 | 
						|
pip install --no-cache-dir -r /rmm/api/tacticalrmm/requirements.txt
 | 
						|
python manage.py migrate
 | 
						|
python manage.py collectstatic --no-input
 | 
						|
python manage.py create_natsapi_conf
 | 
						|
python manage.py create_uwsgi_conf
 | 
						|
python manage.py load_chocos
 | 
						|
python manage.py load_community_scripts
 | 
						|
WEB_VERSION=$(python manage.py get_config webversion)
 | 
						|
printf >&2 "${YELLOW}%0.s*${NC}" {1..80}
 | 
						|
printf >&2 "\n"
 | 
						|
printf >&2 "${YELLOW}Please create your login for the RMM website and django admin${NC}\n"
 | 
						|
printf >&2 "${YELLOW}%0.s*${NC}" {1..80}
 | 
						|
printf >&2 "\n"
 | 
						|
echo -ne "Username: "
 | 
						|
read djangousername
 | 
						|
python manage.py createsuperuser --username ${djangousername} --email ${letsemail}
 | 
						|
python manage.py create_installer_user
 | 
						|
RANDBASE=$(python manage.py generate_totp)
 | 
						|
cls
 | 
						|
python manage.py generate_barcode ${RANDBASE} ${djangousername} ${frontenddomain}
 | 
						|
deactivate
 | 
						|
read -n 1 -s -r -p "Press any key to continue..."
 | 
						|
 | 
						|
rmmservice="$(cat << EOF
 | 
						|
[Unit]
 | 
						|
Description=tacticalrmm uwsgi daemon
 | 
						|
After=network.target postgresql.service
 | 
						|
 | 
						|
[Service]
 | 
						|
User=${USER}
 | 
						|
Group=www-data
 | 
						|
WorkingDirectory=/rmm/api/tacticalrmm
 | 
						|
Environment="PATH=/rmm/api/env/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
 | 
						|
ExecStart=/rmm/api/env/bin/uwsgi --ini app.ini
 | 
						|
Restart=always
 | 
						|
RestartSec=10s
 | 
						|
 | 
						|
[Install]
 | 
						|
WantedBy=multi-user.target
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${rmmservice}" | sudo tee /etc/systemd/system/rmm.service > /dev/null
 | 
						|
 | 
						|
daphneservice="$(cat << EOF
 | 
						|
[Unit]
 | 
						|
Description=django channels daemon v2
 | 
						|
After=network.target
 | 
						|
 | 
						|
[Service]
 | 
						|
User=${USER}
 | 
						|
Group=www-data
 | 
						|
WorkingDirectory=/rmm/api/tacticalrmm
 | 
						|
Environment="PATH=/rmm/api/env/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
 | 
						|
ExecStart=/rmm/api/env/bin/daphne -u /rmm/daphne.sock tacticalrmm.asgi:application
 | 
						|
ExecStartPre=rm -f /rmm/daphne.sock
 | 
						|
ExecStartPre=rm -f /rmm/daphne.sock.lock
 | 
						|
Restart=always
 | 
						|
RestartSec=3s
 | 
						|
 | 
						|
[Install]
 | 
						|
WantedBy=multi-user.target
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${daphneservice}" | sudo tee /etc/systemd/system/daphne.service > /dev/null
 | 
						|
 | 
						|
natsservice="$(cat << EOF
 | 
						|
[Unit]
 | 
						|
Description=NATS Server
 | 
						|
After=network.target
 | 
						|
 | 
						|
[Service]
 | 
						|
PrivateTmp=true
 | 
						|
Type=simple
 | 
						|
ExecStart=/usr/local/bin/nats-server -c /rmm/api/tacticalrmm/nats-rmm.conf
 | 
						|
ExecReload=/usr/bin/kill -s HUP \$MAINPID
 | 
						|
ExecStop=/usr/bin/kill -s SIGINT \$MAINPID
 | 
						|
User=${USER}
 | 
						|
Group=www-data
 | 
						|
Restart=always
 | 
						|
RestartSec=5s
 | 
						|
LimitNOFILE=1000000
 | 
						|
 | 
						|
[Install]
 | 
						|
WantedBy=multi-user.target
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${natsservice}" | sudo tee /etc/systemd/system/nats.service > /dev/null
 | 
						|
 | 
						|
natsapi="$(cat << EOF
 | 
						|
[Unit]
 | 
						|
Description=TacticalRMM Nats Api v1
 | 
						|
After=nats.service
 | 
						|
 | 
						|
[Service]
 | 
						|
Type=simple
 | 
						|
ExecStart=/usr/local/bin/nats-api
 | 
						|
User=${USER}
 | 
						|
Group=${USER}
 | 
						|
Restart=always
 | 
						|
RestartSec=5s
 | 
						|
 | 
						|
[Install]
 | 
						|
WantedBy=multi-user.target
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${natsapi}" | sudo tee /etc/systemd/system/nats-api.service > /dev/null
 | 
						|
 | 
						|
nginxrmm="$(cat << EOF
 | 
						|
server_tokens off;
 | 
						|
 | 
						|
upstream tacticalrmm {
 | 
						|
    server unix:////rmm/api/tacticalrmm/tacticalrmm.sock;
 | 
						|
}
 | 
						|
 | 
						|
map \$http_user_agent \$ignore_ua {
 | 
						|
    "~python-requests.*" 0;
 | 
						|
    "~go-resty.*" 0;
 | 
						|
    default 1;
 | 
						|
}
 | 
						|
 | 
						|
server {
 | 
						|
    listen 80;
 | 
						|
    listen [::]:80;
 | 
						|
    server_name ${rmmdomain};
 | 
						|
    return 301 https://\$server_name\$request_uri;
 | 
						|
}
 | 
						|
 | 
						|
server {
 | 
						|
    listen 443 ssl reuseport;
 | 
						|
    listen [::]:443 ssl;
 | 
						|
    server_name ${rmmdomain};
 | 
						|
    client_max_body_size 300M;
 | 
						|
    access_log /rmm/api/tacticalrmm/tacticalrmm/private/log/access.log combined if=\$ignore_ua;
 | 
						|
    error_log /rmm/api/tacticalrmm/tacticalrmm/private/log/error.log;
 | 
						|
    ssl_certificate ${CERT_PUB_KEY};
 | 
						|
    ssl_certificate_key ${CERT_PRIV_KEY};
 | 
						|
    
 | 
						|
    ssl_protocols TLSv1.2 TLSv1.3;
 | 
						|
    ssl_prefer_server_ciphers on;
 | 
						|
    ssl_ciphers EECDH+AESGCM:EDH+AESGCM;
 | 
						|
    ssl_ecdh_curve secp384r1;
 | 
						|
    ssl_stapling on;
 | 
						|
    ssl_stapling_verify on;
 | 
						|
    add_header X-Content-Type-Options nosniff;
 | 
						|
    
 | 
						|
    location /static/ {
 | 
						|
        root /rmm/api/tacticalrmm;
 | 
						|
    }
 | 
						|
 | 
						|
    location /private/ {
 | 
						|
        internal;
 | 
						|
        add_header "Access-Control-Allow-Origin" "https://${frontenddomain}";
 | 
						|
        alias /rmm/api/tacticalrmm/tacticalrmm/private/;
 | 
						|
    }
 | 
						|
 | 
						|
    location ~ ^/ws/ {
 | 
						|
        proxy_pass http://unix:/rmm/daphne.sock;
 | 
						|
 | 
						|
        proxy_http_version 1.1;
 | 
						|
        proxy_set_header Upgrade \$http_upgrade;
 | 
						|
        proxy_set_header Connection "upgrade";
 | 
						|
 | 
						|
        proxy_redirect     off;
 | 
						|
        proxy_set_header   Host \$host;
 | 
						|
        proxy_set_header   X-Real-IP \$remote_addr;
 | 
						|
        proxy_set_header   X-Forwarded-For \$proxy_add_x_forwarded_for;
 | 
						|
        proxy_set_header   X-Forwarded-Host \$server_name;
 | 
						|
    }
 | 
						|
 | 
						|
    location ~ ^/natsws {
 | 
						|
        proxy_pass http://127.0.0.1:9235;
 | 
						|
        proxy_http_version 1.1;
 | 
						|
 | 
						|
        proxy_set_header Host \$host;
 | 
						|
        proxy_set_header Upgrade \$http_upgrade;
 | 
						|
        proxy_set_header Connection "upgrade";
 | 
						|
        proxy_set_header X-Forwarded-Host \$host:\$server_port;
 | 
						|
        proxy_set_header X-Forwarded-For \$proxy_add_x_forwarded_for;
 | 
						|
        proxy_set_header X-Forwarded-Proto \$scheme;
 | 
						|
    }
 | 
						|
 | 
						|
    location / {
 | 
						|
        uwsgi_pass  tacticalrmm;
 | 
						|
        include     /etc/nginx/uwsgi_params;
 | 
						|
        uwsgi_read_timeout 300s;
 | 
						|
        uwsgi_ignore_client_abort on;
 | 
						|
    }
 | 
						|
}
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${nginxrmm}" | sudo tee /etc/nginx/sites-available/rmm.conf > /dev/null
 | 
						|
 | 
						|
 | 
						|
nginxmesh="$(cat << EOF
 | 
						|
server {
 | 
						|
  listen 80;
 | 
						|
  listen [::]:80;
 | 
						|
  server_name ${meshdomain};
 | 
						|
  return 301 https://\$server_name\$request_uri;
 | 
						|
}
 | 
						|
 | 
						|
server {
 | 
						|
 | 
						|
    listen 443 ssl;
 | 
						|
    listen [::]:443 ssl;
 | 
						|
    proxy_send_timeout 330s;
 | 
						|
    proxy_read_timeout 330s;
 | 
						|
    server_name ${meshdomain};
 | 
						|
    ssl_certificate ${CERT_PUB_KEY};
 | 
						|
    ssl_certificate_key ${CERT_PRIV_KEY};
 | 
						|
 | 
						|
    ssl_session_cache shared:WEBSSL:10m;
 | 
						|
 | 
						|
    ssl_protocols TLSv1.2 TLSv1.3;
 | 
						|
    ssl_prefer_server_ciphers on;
 | 
						|
    ssl_ciphers EECDH+AESGCM:EDH+AESGCM;
 | 
						|
    ssl_ecdh_curve secp384r1;
 | 
						|
    ssl_stapling on;
 | 
						|
    ssl_stapling_verify on;
 | 
						|
    add_header X-Content-Type-Options nosniff;
 | 
						|
 | 
						|
    location / {
 | 
						|
        proxy_pass http://127.0.0.1:4430/;
 | 
						|
        proxy_http_version 1.1;
 | 
						|
 | 
						|
        proxy_set_header Host \$host;
 | 
						|
        proxy_set_header Upgrade \$http_upgrade;
 | 
						|
        proxy_set_header Connection "upgrade";
 | 
						|
        proxy_set_header X-Forwarded-Host \$host:\$server_port;
 | 
						|
        proxy_set_header X-Forwarded-For \$proxy_add_x_forwarded_for;
 | 
						|
        proxy_set_header X-Forwarded-Proto \$scheme;
 | 
						|
    }
 | 
						|
}
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${nginxmesh}" | sudo tee /etc/nginx/sites-available/meshcentral.conf > /dev/null
 | 
						|
 | 
						|
sudo ln -s /etc/nginx/sites-available/rmm.conf /etc/nginx/sites-enabled/rmm.conf
 | 
						|
sudo ln -s /etc/nginx/sites-available/meshcentral.conf /etc/nginx/sites-enabled/meshcentral.conf
 | 
						|
 | 
						|
sudo mkdir /etc/conf.d
 | 
						|
 | 
						|
celeryservice="$(cat << EOF
 | 
						|
[Unit]
 | 
						|
Description=Celery Service V2
 | 
						|
After=network.target redis-server.service postgresql.service
 | 
						|
 | 
						|
[Service]
 | 
						|
Type=forking
 | 
						|
User=${USER}
 | 
						|
Group=${USER}
 | 
						|
EnvironmentFile=/etc/conf.d/celery.conf
 | 
						|
WorkingDirectory=/rmm/api/tacticalrmm
 | 
						|
ExecStart=/bin/sh -c '\${CELERY_BIN} -A \$CELERY_APP multi start \$CELERYD_NODES --pidfile=\${CELERYD_PID_FILE} --logfile=\${CELERYD_LOG_FILE} --loglevel="\${CELERYD_LOG_LEVEL}" \$CELERYD_OPTS'
 | 
						|
ExecStop=/bin/sh -c '\${CELERY_BIN} multi stopwait \$CELERYD_NODES --pidfile=\${CELERYD_PID_FILE} --loglevel="\${CELERYD_LOG_LEVEL}"'
 | 
						|
ExecReload=/bin/sh -c '\${CELERY_BIN} -A \$CELERY_APP multi restart \$CELERYD_NODES --pidfile=\${CELERYD_PID_FILE} --logfile=\${CELERYD_LOG_FILE} --loglevel="\${CELERYD_LOG_LEVEL}" \$CELERYD_OPTS'
 | 
						|
Restart=always
 | 
						|
RestartSec=10s
 | 
						|
 | 
						|
[Install]
 | 
						|
WantedBy=multi-user.target
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${celeryservice}" | sudo tee /etc/systemd/system/celery.service > /dev/null
 | 
						|
 | 
						|
celeryconf="$(cat << EOF
 | 
						|
CELERYD_NODES="w1"
 | 
						|
 | 
						|
CELERY_BIN="/rmm/api/env/bin/celery"
 | 
						|
 | 
						|
CELERY_APP="tacticalrmm"
 | 
						|
 | 
						|
CELERYD_MULTI="multi"
 | 
						|
 | 
						|
CELERYD_OPTS="--time-limit=86400 --autoscale=20,2"
 | 
						|
 | 
						|
CELERYD_PID_FILE="/rmm/api/tacticalrmm/%n.pid"
 | 
						|
CELERYD_LOG_FILE="/var/log/celery/%n%I.log"
 | 
						|
CELERYD_LOG_LEVEL="ERROR"
 | 
						|
 | 
						|
CELERYBEAT_PID_FILE="/rmm/api/tacticalrmm/beat.pid"
 | 
						|
CELERYBEAT_LOG_FILE="/var/log/celery/beat.log"
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${celeryconf}" | sudo tee /etc/conf.d/celery.conf > /dev/null
 | 
						|
 | 
						|
 | 
						|
celerybeatservice="$(cat << EOF
 | 
						|
[Unit]
 | 
						|
Description=Celery Beat Service V2
 | 
						|
After=network.target redis-server.service postgresql.service
 | 
						|
 | 
						|
[Service]
 | 
						|
Type=simple
 | 
						|
User=${USER}
 | 
						|
Group=${USER}
 | 
						|
EnvironmentFile=/etc/conf.d/celery.conf
 | 
						|
WorkingDirectory=/rmm/api/tacticalrmm
 | 
						|
ExecStart=/bin/sh -c '\${CELERY_BIN} -A \${CELERY_APP} beat --pidfile=\${CELERYBEAT_PID_FILE} --logfile=\${CELERYBEAT_LOG_FILE} --loglevel=\${CELERYD_LOG_LEVEL}'
 | 
						|
Restart=always
 | 
						|
RestartSec=10s
 | 
						|
 | 
						|
[Install]
 | 
						|
WantedBy=multi-user.target
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${celerybeatservice}" | sudo tee /etc/systemd/system/celerybeat.service > /dev/null
 | 
						|
 | 
						|
sudo chown ${USER}:${USER} -R /etc/conf.d/
 | 
						|
 | 
						|
meshservice="$(cat << EOF
 | 
						|
[Unit]
 | 
						|
Description=MeshCentral Server
 | 
						|
After=network.target mongod.service nginx.service
 | 
						|
[Service]
 | 
						|
Type=simple
 | 
						|
LimitNOFILE=1000000
 | 
						|
ExecStart=/usr/bin/node node_modules/meshcentral
 | 
						|
Environment=NODE_ENV=production
 | 
						|
WorkingDirectory=/meshcentral
 | 
						|
User=${USER}
 | 
						|
Group=${USER}
 | 
						|
Restart=always
 | 
						|
RestartSec=10s
 | 
						|
 | 
						|
[Install]
 | 
						|
WantedBy=multi-user.target
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${meshservice}" | sudo tee /etc/systemd/system/meshcentral.service > /dev/null
 | 
						|
 | 
						|
sudo systemctl daemon-reload
 | 
						|
 | 
						|
if [ -d ~/.npm ]; then
 | 
						|
  sudo chown -R $USER:$GROUP ~/.npm
 | 
						|
fi
 | 
						|
 | 
						|
if [ -d ~/.config ]; then
 | 
						|
  sudo chown -R $USER:$GROUP ~/.config
 | 
						|
fi
 | 
						|
 | 
						|
print_green 'Installing the frontend'
 | 
						|
 | 
						|
webtar="trmm-web-v${WEB_VERSION}.tar.gz"
 | 
						|
wget -q https://github.com/amidaware/tacticalrmm-web/releases/download/v${WEB_VERSION}/${webtar} -O /tmp/${webtar}
 | 
						|
sudo mkdir -p /var/www/rmm
 | 
						|
sudo tar -xzf /tmp/${webtar} -C /var/www/rmm
 | 
						|
echo "window._env_ = {PROD_URL: \"https://${rmmdomain}\"}" | sudo tee /var/www/rmm/dist/env-config.js > /dev/null
 | 
						|
sudo chown www-data:www-data -R /var/www/rmm/dist
 | 
						|
rm -f /tmp/${webtar}
 | 
						|
 | 
						|
nginxfrontend="$(cat << EOF
 | 
						|
server {
 | 
						|
    server_name ${frontenddomain};
 | 
						|
    charset utf-8;
 | 
						|
    location / {
 | 
						|
        root /var/www/rmm/dist;
 | 
						|
        try_files \$uri \$uri/ /index.html;
 | 
						|
        add_header Cache-Control "no-store, no-cache, must-revalidate";
 | 
						|
        add_header Pragma "no-cache";
 | 
						|
    }
 | 
						|
    error_log  /var/log/nginx/frontend-error.log;
 | 
						|
    access_log /var/log/nginx/frontend-access.log;
 | 
						|
 | 
						|
    listen 443 ssl;
 | 
						|
    listen [::]:443 ssl;
 | 
						|
    ssl_certificate ${CERT_PUB_KEY};
 | 
						|
    ssl_certificate_key ${CERT_PRIV_KEY};
 | 
						|
    
 | 
						|
    ssl_protocols TLSv1.2 TLSv1.3;
 | 
						|
    ssl_prefer_server_ciphers on;
 | 
						|
    ssl_ciphers EECDH+AESGCM:EDH+AESGCM;
 | 
						|
    ssl_ecdh_curve secp384r1;
 | 
						|
    ssl_stapling on;
 | 
						|
    ssl_stapling_verify on;
 | 
						|
    add_header X-Content-Type-Options nosniff;
 | 
						|
}
 | 
						|
 | 
						|
server {
 | 
						|
    if (\$host = ${frontenddomain}) {
 | 
						|
        return 301 https://\$host\$request_uri;
 | 
						|
    }
 | 
						|
 | 
						|
    listen 80;
 | 
						|
    listen [::]:80;
 | 
						|
    server_name ${frontenddomain};
 | 
						|
    return 404;
 | 
						|
}
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${nginxfrontend}" | sudo tee /etc/nginx/sites-available/frontend.conf > /dev/null
 | 
						|
 | 
						|
sudo ln -s /etc/nginx/sites-available/frontend.conf /etc/nginx/sites-enabled/frontend.conf
 | 
						|
 | 
						|
 | 
						|
print_green 'Enabling Services'
 | 
						|
 | 
						|
for i in rmm.service daphne.service celery.service celerybeat.service nginx
 | 
						|
do
 | 
						|
  sudo systemctl enable ${i}
 | 
						|
  sudo systemctl stop ${i}
 | 
						|
  sudo systemctl start ${i}
 | 
						|
done
 | 
						|
sleep 5
 | 
						|
sudo systemctl enable meshcentral
 | 
						|
 | 
						|
print_green 'Starting meshcentral and waiting for it to install plugins'
 | 
						|
 | 
						|
sudo systemctl restart meshcentral
 | 
						|
 | 
						|
sleep 3
 | 
						|
 | 
						|
# The first time we start meshcentral, it will need some time to generate certs and install plugins.
 | 
						|
# This will take anywhere from a few seconds to a few minutes depending on the server's hardware
 | 
						|
# We will know it's ready once the last line of the systemd service stdout is 'MeshCentral HTTP server running on port.....'
 | 
						|
while ! [[ $CHECK_MESH_READY ]]; do
 | 
						|
  CHECK_MESH_READY=$(sudo journalctl -u meshcentral.service -b --no-pager | grep "MeshCentral HTTP server running on port")
 | 
						|
  echo -ne "${GREEN}Mesh Central not ready yet...${NC}\n"
 | 
						|
  sleep 3
 | 
						|
done
 | 
						|
 | 
						|
print_green 'Generating meshcentral login token key'
 | 
						|
 | 
						|
MESHTOKENKEY=$(node /meshcentral/node_modules/meshcentral --logintokenkey)
 | 
						|
 | 
						|
meshtoken="$(cat << EOF
 | 
						|
MESH_TOKEN_KEY = "${MESHTOKENKEY}"
 | 
						|
EOF
 | 
						|
)"
 | 
						|
echo "${meshtoken}" | tee --append /rmm/api/tacticalrmm/tacticalrmm/local_settings.py > /dev/null
 | 
						|
 | 
						|
 | 
						|
print_green 'Creating meshcentral account and group'
 | 
						|
 | 
						|
sudo systemctl stop meshcentral
 | 
						|
sleep 1
 | 
						|
cd /meshcentral
 | 
						|
 | 
						|
node node_modules/meshcentral --createaccount ${meshusername} --pass ${MESHPASSWD} --email ${letsemail}
 | 
						|
sleep 1
 | 
						|
node node_modules/meshcentral --adminaccount ${meshusername}
 | 
						|
 | 
						|
sudo systemctl start meshcentral
 | 
						|
sleep 5
 | 
						|
 | 
						|
while ! [[ $CHECK_MESH_READY2 ]]; do
 | 
						|
  CHECK_MESH_READY2=$(sudo journalctl -u meshcentral.service -b --no-pager | grep "MeshCentral HTTP server running on port")
 | 
						|
  echo -ne "${GREEN}Mesh Central not ready yet...${NC}\n"
 | 
						|
  sleep 3
 | 
						|
done
 | 
						|
 | 
						|
node node_modules/meshcentral/meshctrl.js --url wss://${meshdomain}:443 --loginuser ${meshusername} --loginpass ${MESHPASSWD} AddDeviceGroup --name TacticalRMM
 | 
						|
sleep 1
 | 
						|
 | 
						|
sudo systemctl enable nats.service
 | 
						|
cd /rmm/api/tacticalrmm
 | 
						|
source /rmm/api/env/bin/activate
 | 
						|
python manage.py initial_db_setup
 | 
						|
python manage.py reload_nats
 | 
						|
deactivate
 | 
						|
sudo systemctl start nats.service
 | 
						|
 | 
						|
sleep 1
 | 
						|
sudo systemctl enable nats-api.service
 | 
						|
sudo systemctl start nats-api.service
 | 
						|
 | 
						|
## disable django admin
 | 
						|
sed -i 's/ADMIN_ENABLED = True/ADMIN_ENABLED = False/g' /rmm/api/tacticalrmm/tacticalrmm/local_settings.py
 | 
						|
 | 
						|
print_green 'Restarting services'
 | 
						|
for i in rmm.service daphne.service celery.service celerybeat.service
 | 
						|
do
 | 
						|
  sudo systemctl stop ${i}
 | 
						|
  sudo systemctl start ${i}
 | 
						|
done
 | 
						|
 | 
						|
printf >&2 "${YELLOW}%0.s*${NC}" {1..80}
 | 
						|
printf >&2 "\n\n"
 | 
						|
printf >&2 "${YELLOW}Installation complete!${NC}\n\n"
 | 
						|
printf >&2 "${YELLOW}Access your rmm at: ${GREEN}https://${frontenddomain}${NC}\n\n"
 | 
						|
printf >&2 "${YELLOW}Django admin url (disabled by default): ${GREEN}https://${rmmdomain}/${ADMINURL}/${NC}\n\n"
 | 
						|
printf >&2 "${YELLOW}MeshCentral username: ${GREEN}${meshusername}${NC}\n"
 | 
						|
printf >&2 "${YELLOW}MeshCentral password: ${GREEN}${MESHPASSWD}${NC}\n\n"
 | 
						|
 | 
						|
if [ "$BEHIND_NAT" = true ]; then
 | 
						|
    echo -ne "${YELLOW}Read below if your router does NOT support Hairpin NAT${NC}\n\n"
 | 
						|
    echo -ne "${GREEN}If you will be accessing the web interface of the RMM from the same LAN as this server,${NC}\n"
 | 
						|
    echo -ne "${GREEN}you'll need to make sure your 3 subdomains resolve to ${IPV4}${NC}\n"
 | 
						|
    echo -ne "${GREEN}This also applies to any agents that will be on the same local network as the rmm.${NC}\n"
 | 
						|
    echo -ne "${GREEN}You'll also need to setup port forwarding in your router on port 443${NC}\n\n"
 | 
						|
fi
 | 
						|
 | 
						|
printf >&2 "${YELLOW}Please refer to the github README for next steps${NC}\n\n"
 | 
						|
printf >&2 "${YELLOW}%0.s*${NC}" {1..80}
 | 
						|
printf >&2 "\n"
 |