123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227 |
- #!/bin/bash
- function array_by_comma { local IFS=","; echo "$*"; }
- # Wait for containers
- while ! mysqladmin status --socket=/var/run/mysqld/mysqld.sock -u${DBUSER} -p${DBPASS} --silent; do
- echo "Waiting for SQL..."
- sleep 2
- done
- # Do not attempt to write to slave
- if [[ ! -z ${REDIS_SLAVEOF_IP} ]]; then
- REDIS_CMDLINE="redis-cli -h ${REDIS_SLAVEOF_IP} -p ${REDIS_SLAVEOF_PORT}"
- else
- REDIS_CMDLINE="redis-cli -h redis -p 6379"
- fi
- until [[ $(${REDIS_CMDLINE} PING) == "PONG" ]]; do
- echo "Waiting for Redis..."
- sleep 2
- done
- # Check mysql_upgrade (master and slave)
- CONTAINER_ID=
- until [[ ! -z "${CONTAINER_ID}" ]] && [[ "${CONTAINER_ID}" =~ ^[[:alnum:]]*$ ]]; do
- CONTAINER_ID=$(curl --silent --insecure https://dockerapi/containers/json | jq -r ".[] | {name: .Config.Labels[\"com.docker.compose.service\"], project: .Config.Labels[\"com.docker.compose.project\"], id: .Id}" 2> /dev/null | jq -rc "select( .name | tostring | contains(\"mysql-mailcow\")) | select( .project | tostring | contains(\"${COMPOSE_PROJECT_NAME,,}\")) | .id" 2> /dev/null)
- sleep 2
- done
- echo "MySQL @ ${CONTAINER_ID}"
- SQL_LOOP_C=0
- SQL_CHANGED=0
- until [[ ${SQL_UPGRADE_STATUS} == 'success' ]]; do
- if [ ${SQL_LOOP_C} -gt 4 ]; then
- echo "Tried to upgrade MySQL and failed, giving up after ${SQL_LOOP_C} retries and starting container (oops, not good)"
- break
- fi
- SQL_FULL_UPGRADE_RETURN=$(curl --silent --insecure -XPOST https://dockerapi/containers/${CONTAINER_ID}/exec -d '{"cmd":"system", "task":"mysql_upgrade"}' --silent -H 'Content-type: application/json')
- SQL_UPGRADE_STATUS=$(echo ${SQL_FULL_UPGRADE_RETURN} | jq -r .type)
- SQL_LOOP_C=$((SQL_LOOP_C+1))
- echo "SQL upgrade iteration #${SQL_LOOP_C}"
- if [[ ${SQL_UPGRADE_STATUS} == 'warning' ]]; then
- SQL_CHANGED=1
- echo "MySQL applied an upgrade, debug output:"
- echo ${SQL_FULL_UPGRADE_RETURN}
- sleep 3
- while ! mysqladmin status --socket=/var/run/mysqld/mysqld.sock -u${DBUSER} -p${DBPASS} --silent; do
- echo "Waiting for SQL to return, please wait"
- sleep 2
- done
- continue
- elif [[ ${SQL_UPGRADE_STATUS} == 'success' ]]; then
- echo "MySQL is up-to-date - debug output:"
- echo ${SQL_FULL_UPGRADE_RETURN}
- else
- echo "No valid reponse for mysql_upgrade was received, debug output:"
- echo ${SQL_FULL_UPGRADE_RETURN}
- fi
- done
- # doing post-installation stuff, if SQL was upgraded (master and slave)
- if [ ${SQL_CHANGED} -eq 1 ]; then
- POSTFIX=$(curl --silent --insecure https://dockerapi/containers/json | jq -r ".[] | {name: .Config.Labels[\"com.docker.compose.service\"], project: .Config.Labels[\"com.docker.compose.project\"], id: .Id}" 2> /dev/null | jq -rc "select( .name | tostring | contains(\"postfix-mailcow\")) | select( .project | tostring | contains(\"${COMPOSE_PROJECT_NAME,,}\")) | .id" 2> /dev/null)
- if [[ -z "${POSTFIX}" ]] || ! [[ "${POSTFIX}" =~ ^[[:alnum:]]*$ ]]; then
- echo "Could not determine Postfix container ID, skipping Postfix restart."
- else
- echo "Restarting Postfix"
- curl -X POST --silent --insecure https://dockerapi/containers/${POSTFIX}/restart | jq -r '.msg'
- echo "Sleeping 5 seconds..."
- sleep 5
- fi
- fi
- # Check mysql tz import (master and slave)
- TZ_CHECK=$(mysql --socket=/var/run/mysqld/mysqld.sock -u ${DBUSER} -p${DBPASS} ${DBNAME} -e "SELECT CONVERT_TZ('2019-11-02 23:33:00','Europe/Berlin','UTC') AS time;" -BN 2> /dev/null)
- if [[ -z ${TZ_CHECK} ]] || [[ "${TZ_CHECK}" == "NULL" ]]; then
- SQL_FULL_TZINFO_IMPORT_RETURN=$(curl --silent --insecure -XPOST https://dockerapi/containers/${CONTAINER_ID}/exec -d '{"cmd":"system", "task":"mysql_tzinfo_to_sql"}' --silent -H 'Content-type: application/json')
- echo "MySQL mysql_tzinfo_to_sql - debug output:"
- echo ${SQL_FULL_TZINFO_IMPORT_RETURN}
- fi
- if [[ "${MASTER}" =~ ^([yY][eE][sS]|[yY])+$ ]]; then
- echo "We are master, preparing..."
- # Set a default release format
- if [[ -z $(${REDIS_CMDLINE} --raw GET Q_RELEASE_FORMAT) ]]; then
- ${REDIS_CMDLINE} --raw SET Q_RELEASE_FORMAT raw
- fi
- # Set max age of q items - if unset
- if [[ -z $(${REDIS_CMDLINE} --raw GET Q_MAX_AGE) ]]; then
- ${REDIS_CMDLINE} --raw SET Q_MAX_AGE 365
- fi
- # Set default password policy - if unset
- if [[ -z $(${REDIS_CMDLINE} --raw HGET PASSWD_POLICY length) ]]; then
- ${REDIS_CMDLINE} --raw HSET PASSWD_POLICY length 6
- ${REDIS_CMDLINE} --raw HSET PASSWD_POLICY chars 0
- ${REDIS_CMDLINE} --raw HSET PASSWD_POLICY special_chars 0
- ${REDIS_CMDLINE} --raw HSET PASSWD_POLICY lowerupper 0
- ${REDIS_CMDLINE} --raw HSET PASSWD_POLICY numbers 0
- fi
- # Trigger db init
- echo "Running DB init..."
- php -c /usr/local/etc/php -f /web/inc/init_db.inc.php
- # Recreating domain map
- echo "Rebuilding domain map in Redis..."
- declare -a DOMAIN_ARR
- ${REDIS_CMDLINE} DEL DOMAIN_MAP > /dev/null
- while read line
- do
- DOMAIN_ARR+=("$line")
- done < <(mysql --socket=/var/run/mysqld/mysqld.sock -u ${DBUSER} -p${DBPASS} ${DBNAME} -e "SELECT domain FROM domain" -Bs)
- while read line
- do
- DOMAIN_ARR+=("$line")
- done < <(mysql --socket=/var/run/mysqld/mysqld.sock -u ${DBUSER} -p${DBPASS} ${DBNAME} -e "SELECT alias_domain FROM alias_domain" -Bs)
- if [[ ! -z ${DOMAIN_ARR} ]]; then
- for domain in "${DOMAIN_ARR[@]}"; do
- ${REDIS_CMDLINE} HSET DOMAIN_MAP ${domain} 1 > /dev/null
- done
- fi
- # Set API options if env vars are not empty
- if [[ ${API_ALLOW_FROM} != "invalid" ]] && [[ ! -z ${API_ALLOW_FROM} ]]; then
- IFS=',' read -r -a API_ALLOW_FROM_ARR <<< "${API_ALLOW_FROM}"
- declare -a VALIDATED_API_ALLOW_FROM_ARR
- REGEX_IP6='^([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}(/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8]))?$'
- REGEX_IP4='^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+(/([0-9]|[1-2][0-9]|3[0-2]))?$'
- for IP in "${API_ALLOW_FROM_ARR[@]}"; do
- if [[ ${IP} =~ ${REGEX_IP6} ]] || [[ ${IP} =~ ${REGEX_IP4} ]]; then
- VALIDATED_API_ALLOW_FROM_ARR+=("${IP}")
- fi
- done
- VALIDATED_IPS=$(array_by_comma ${VALIDATED_API_ALLOW_FROM_ARR[*]})
- if [[ ! -z ${VALIDATED_IPS} ]]; then
- if [[ ${API_KEY} != "invalid" ]] && [[ ! -z ${API_KEY} ]]; then
- mysql --socket=/var/run/mysqld/mysqld.sock -u ${DBUSER} -p${DBPASS} ${DBNAME} << EOF
- DELETE FROM api WHERE access = 'rw';
- INSERT INTO api (api_key, active, allow_from, access) VALUES ("${API_KEY}", "1", "${VALIDATED_IPS}", "rw");
- EOF
- fi
- if [[ ${API_KEY_READ_ONLY} != "invalid" ]] && [[ ! -z ${API_KEY_READ_ONLY} ]]; then
- mysql --socket=/var/run/mysqld/mysqld.sock -u ${DBUSER} -p${DBPASS} ${DBNAME} << EOF
- DELETE FROM api WHERE access = 'ro';
- INSERT INTO api (api_key, active, allow_from, access) VALUES ("${API_KEY_READ_ONLY}", "1", "${VALIDATED_IPS}", "ro");
- EOF
- fi
- fi
- fi
- # Create events (master only, STATUS for event on slave will be SLAVESIDE_DISABLED)
- mysql --socket=/var/run/mysqld/mysqld.sock -u ${DBUSER} -p${DBPASS} ${DBNAME} << EOF
- DROP EVENT IF EXISTS clean_spamalias;
- DELIMITER //
- CREATE EVENT clean_spamalias
- ON SCHEDULE EVERY 1 DAY DO
- BEGIN
- DELETE FROM spamalias WHERE validity < UNIX_TIMESTAMP();
- END;
- //
- DELIMITER ;
- DROP EVENT IF EXISTS clean_oauth2;
- DELIMITER //
- CREATE EVENT clean_oauth2
- ON SCHEDULE EVERY 1 DAY DO
- BEGIN
- DELETE FROM oauth_refresh_tokens WHERE expires < NOW();
- DELETE FROM oauth_access_tokens WHERE expires < NOW();
- DELETE FROM oauth_authorization_codes WHERE expires < NOW();
- END;
- //
- DELIMITER ;
- DROP EVENT IF EXISTS clean_sasl_log;
- DELIMITER //
- CREATE EVENT clean_sasl_log
- ON SCHEDULE EVERY 1 DAY DO
- BEGIN
- DELETE sasl_log.* FROM sasl_log
- LEFT JOIN (
- SELECT username, service, MAX(datetime) AS lastdate
- FROM sasl_log
- GROUP BY username, service
- ) AS last ON sasl_log.username = last.username AND sasl_log.service = last.service
- WHERE datetime < DATE_SUB(NOW(), INTERVAL 31 DAY) AND datetime < lastdate;
- DELETE FROM sasl_log
- WHERE username NOT IN (SELECT username FROM mailbox) AND
- datetime < DATE_SUB(NOW(), INTERVAL 31 DAY);
- END;
- //
- DELIMITER ;
- EOF
- fi
- # Create dummy for custom overrides of mailcow style
- [[ ! -f /web/css/build/0081-custom-mailcow.css ]] && echo '/* Autogenerated by mailcow */' > /web/css/build/0081-custom-mailcow.css
- # Fix permissions for global filters
- chown -R 82:82 /global_sieve/*
- # Fix permissions on twig cache folder
- chown -R 82:82 /web/templates/cache
- # Clear cache
- find /web/templates/cache/* -not -name '.gitkeep' -delete
- # list client ca of all domains for
- CA_LIST="/etc/nginx/conf.d/client_cas.crt"
- # Clear the output file
- > "$CA_LIST"
- # Execute the query and append each value to the output file
- mysql --socket=/var/run/mysqld/mysqld.sock -u ${DBUSER} -p${DBPASS} ${DBNAME} -e "SELECT ssl_client_ca FROM domain;" | while read -r ca; do
- echo "$ca" >> "$CA_LIST"
- done
- echo "SSL client CAs have been appended to $CA_LIST"
- # Run hooks
- for file in /hooks/*; do
- if [ -x "${file}" ]; then
- echo "Running hook ${file}"
- "${file}"
- fi
- done
- exec "$@"
|