#!/bin/bash

function blue(){
  echo -e "\033[34m\033[01m$1\033[0m"
}
function green(){
  echo -e "\033[32m\033[01m$1\033[0m"
}
function red(){
  echo -e "\033[31m\033[01m$1\033[0m"
}
function version_lt(){
  test "$(echo "$@" | tr " " "\n" | sort -rV | head -n 1)" != "$1";
}
#copy from 秋水逸冰 ss scripts
if [[ -f /etc/redhat-release ]]; then
  release="centos"
elif cat /etc/issue | grep -Eqi "debian"; then
  release="debian"
elif cat /etc/issue | grep -Eqi "ubuntu"; then
  release="ubuntu"
elif cat /etc/issue | grep -Eqi "centos|red hat|redhat"; then
  release="centos"
elif cat /proc/version | grep -Eqi "debian"; then
  release="debian"
elif cat /proc/version | grep -Eqi "ubuntu"; then
  release="ubuntu"
elif cat /proc/version | grep -Eqi "centos|red hat|redhat"; then
  release="centos"
fi

if [ "$release" == "centos" ]; then
  systemPackage="yum"
  systempwd="/usr/lib/systemd/system/"
elif [ "$release" == "ubuntu" ]; then
  systemPackage="apt"
  systempwd="/lib/systemd/system/"
elif [ "$release" == "debian" ]; then
  systemPackage="apt"
  systempwd="/lib/systemd/system/"
fi

function install(){
  $systemPackage -y install nginx
  systemctl enable nginx
  systemctl stop nginx
  sleep 5
  cat > /etc/nginx/nginx.conf <<-EOF
user  root;
worker_processes  1;
error_log  /var/log/nginx/error.log warn;
pid        /var/run/nginx.pid;
events {
  worker_connections  1024;
}
http {
  include       /etc/nginx/mime.types;
  default_type  application/octet-stream;
  log_format  main  '\$remote_addr - \$remote_user [\$time_local] "\$request" '
    '\$status \$body_bytes_sent "\$http_referer" '
    '"\$http_user_agent" "\$http_x_forwarded_for"';
  access_log  /var/log/nginx/access.log  main;
  sendfile        on;
  #tcp_nopush     on;
  keepalive_timeout  120;
  client_max_body_size 20m;
  #gzip  on;
  server {
    listen       80;
    server_name  $your_domain;
    #如果想将80端口强制跳转到443端口,增加这条rewrite ^(.*)$ https://${server_name}$1 permanent;
    root /usr/share/nginx/html;
    index index.php index.html index.htm;
  }
}
EOF
  systemctl start nginx
  sleep 3
  #设置伪装站
  rm -rf /usr/share/nginx/html/*
  cd /usr/share/nginx/html/
  wget https://github.com/dajiangfu/trojan/raw/master/web.zip >/dev/null 2>&1
  unzip web.zip >/dev/null 2>&1
  sleep 5
  #申请https证书
  if [ ! -d "/usr/src" ]; then
    mkdir /usr/src
  fi
  mkdir /usr/src/trojan-cert /usr/src/trojan-temp
  #安装acme.sh脚本
  curl https://get.acme.sh | sh
  #选择使用letsencrypt或者zerossl
  read -p "是否使用ZeroSSL证书 ?请输入 [Y/n] :" yn
  [ -z "${yn}" ] && yn="y"
  if [[ $yn == [Yy] ]]; then
    green "======================="
    blue "请输入绑定到本域名的邮箱地址(不会验证邮箱是否本人的)"
    green "======================="
    read your_mail
    #使用zerossl作为默认证书
    ~/.acme.sh/acme.sh --set-default-ca --server zerossl
    #注册域名证书绑定邮箱
    ~/.acme.sh/acme.sh  --register-account  -m $your_mail --server zerossl
    #设置证书签发方式,如果你本地没有装任何 Web 服务器软件,或者你的 Web 服务器软件并没有监听 TCP 80 端口,那么可以用 Standalone 方式直接获取多域名证书
    ~/.acme.sh/acme.sh --issue -d $your_domain --nginx /etc/nginx/nginx.conf
  else
    #使用letsencrypt作为默认证书
    ~/.acme.sh/acme.sh --set-default-ca --server letsencrypt
    #设置证书签发方式,如果你本地没有装任何 Web 服务器软件,或者你的 Web 服务器软件并没有监听 TCP 80 端口,那么可以用 Standalone 方式直接获取多域名证书
    ~/.acme.sh/acme.sh --issue -d $your_domain --nginx /etc/nginx/nginx.conf
  fi
  #安装证书
  ~/.acme.sh/acme.sh --installcert -d $your_domain --key-file /usr/src/trojan-cert/private.key --fullchain-file /usr/src/trojan-cert/fullchain.cer
  if test -s /usr/src/trojan-cert/fullchain.cer; then
    cat > /etc/nginx/nginx.conf <<-EOF
user  root;
worker_processes  1;
error_log  /var/log/nginx/error.log warn;
pid        /var/run/nginx.pid;
events {
  worker_connections  1024;
}
http {
  include       /etc/nginx/mime.types;
  default_type  application/octet-stream;
  log_format  main  '\$remote_addr - \$remote_user [\$time_local] "\$request" '
    '\$status \$body_bytes_sent "\$http_referer" '
    '"\$http_user_agent" "\$http_x_forwarded_for"';
  access_log  /var/log/nginx/access.log  main;
  sendfile        on;
  #tcp_nopush     on;
  keepalive_timeout  120;
  client_max_body_size 20m;
  #gzip  on;
  server {
    listen       127.0.0.1:80;
    server_name  $your_domain;
    #如果想将80端口强制跳转到443端口,增加这条rewrite ^(.*)$ https://${server_name}$1 permanent;
    root /usr/share/nginx/html;
    index index.php index.html index.htm;
  }
  server {
    listen       0.0.0.0:80;
    server_name  $your_domain;
    return 301 https://$your_domain\$request_uri;
  }
}
EOF
    systemctl restart nginx
    cd /usr/src
    #下载trojan服务端
    wget https://api.github.com/repos/trojan-gfw/trojan/releases/latest >/dev/null 2>&1
    latest_version=`grep tag_name latest| awk -F '[:,"v]' '{print $6}'`
    rm -f latest
    green "开始下载最新版trojan amd64"
    wget https://github.com/trojan-gfw/trojan/releases/download/v${latest_version}/trojan-${latest_version}-linux-amd64.tar.xz >/dev/null 2>&1
    tar xf trojan-${latest_version}-linux-amd64.tar.xz >/dev/null 2>&1
    #下载trojan客户端
    wget https://github.com/dajiangfu/trojan/raw/master/trojan-cli.zip >/dev/null 2>&1
    wget -P /usr/src/trojan-temp https://github.com/trojan-gfw/trojan/releases/download/v${latest_version}/trojan-${latest_version}-win.zip >/dev/null 2>&1
    unzip trojan-cli.zip >/dev/null 2>&1
    unzip /usr/src/trojan-temp/trojan-${latest_version}-win.zip -d /usr/src/trojan-temp/ >/dev/null 2>&1
    #cp /usr/src/trojan-cert/fullchain.cer /usr/src/trojan-cli/fullchain.cer
    mv -f /usr/src/trojan-temp/trojan/trojan.exe /usr/src/trojan-cli/ 
    trojan_passwd=$(cat /dev/urandom | head -1 | md5sum | head -c 8)
    cat > /usr/src/trojan-cli/config.json <<-EOF
{
  "run_type": "client",
  "local_addr": "127.0.0.1",
  "local_port": 1080,
  "remote_addr": "$your_domain",
  "remote_port": 443,
  "password": [
    "$trojan_passwd"
  ],
  "log_level": 1,
  "ssl": {
    "verify": true,
    "verify_hostname": true,
    "cert": "",
    "cipher": "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA",
    "cipher_tls13": "TLS_AES_128_GCM_SHA256:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384",
    "sni": "",
    "alpn": [
      "h2",
      "http/1.1"
    ],
    "reuse_session": true,
    "session_ticket": false,
    "curves": ""
  },
  "tcp": {
    "no_delay": true,
    "keep_alive": true,
    "reuse_port": false,
    "fast_open": false,
    "fast_open_qlen": 20
  }
}
EOF
    rm -rf /usr/src/trojan/server.conf
    cat > /usr/src/trojan/server.conf <<-EOF
{
  "run_type": "server",
  "local_addr": "0.0.0.0",
  "local_port": 443,
  "remote_addr": "127.0.0.1",
  "remote_port": 80,
  "password": [
    "$trojan_passwd"
  ],
  "log_level": 1,
  "ssl": {
    "cert": "/usr/src/trojan-cert/fullchain.cer",
    "key": "/usr/src/trojan-cert/private.key",
    "key_password": "",
    "cipher": "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384",
    "cipher_tls13": "TLS_AES_128_GCM_SHA256:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384",
    "prefer_server_cipher": true,
    "alpn": [
      "http/1.1"
    ],
    "alpn_port_override": {
      "h2": 81
    },
    "reuse_session": true,
    "session_ticket": false,
    "session_timeout": 600,
    "plain_http_response": "",
    "curves": "",
    "dhparam": ""
  },
  "tcp": {
    "prefer_ipv4": false,
    "no_delay": true,
    "keep_alive": true,
    "reuse_port": false,
    "fast_open": false,
    "fast_open_qlen": 20
  },
  "mysql": {
    "enabled": false,
    "server_addr": "127.0.0.1",
    "server_port": 3306,
    "database": "trojan",
    "username": "trojan",
    "password": "",
    "key": "",
    "cert": "",
    "ca": ""
  }
}
EOF
    cd /usr/src/trojan-cli/
    zip -q -r trojan-cli.zip /usr/src/trojan-cli/
    trojan_path=$(cat /dev/urandom | head -1 | md5sum | head -c 16)
    mkdir /usr/share/nginx/html/${trojan_path}
    mv /usr/src/trojan-cli/trojan-cli.zip /usr/share/nginx/html/${trojan_path}/
    #增加启动脚本

    cat > ${systempwd}trojan.service <<-EOF
[Unit]
Description=trojan
After=network.target

[Service]
Type=simple
PIDFile=/usr/src/trojan/trojan/trojan.pid
ExecStart=/usr/src/trojan/trojan -c "/usr/src/trojan/server.conf"
ExecReload=/bin/kill -HUP \$MAINPID
Restart=on-failure
RestartSec=1s

[Install]
WantedBy=multi-user.target
EOF

    chmod +x ${systempwd}trojan.service
    systemctl start trojan.service
    systemctl enable trojan.service
    if [ "$release" == "centos" ]; then
      read -p "是否启用防火墙 ?请输入 [Y/n] :" yn
      [ -z "${yn}" ] && yn="y"
      if [[ $yn == [Yy] ]]; then
        systemctl start firewalld.service
        systemctl enable firewalld.service
        firewall-cmd --zone=public --add-port=80/tcp --permanent
        firewall-cmd --zone=public --add-port=443/tcp --permanent
        firewall-cmd --reload
      else
        systemctl disable firewalld.service
      fi
    elif [ "$release" == "ubuntu" ]; then
      read -p "是否启用防火墙 ?请输入 [Y/n] :" yn
      [ -z "${yn}" ] && yn="y"
      if [[ $yn == [Yy] ]]; then
        systemctl start ufw
        systemctl enable ufw
        ufw allow 80
        ufw allow 443
        ufw reload
      else
        systemctl disable ufw
      fi
    fi
    rm -f /usr/share/nginx/html/web.zip
    rm -f /usr/src/trojan-${latest_version}-linux-amd64.tar.xz
    rm -f /usr/src/trojan-cli.zip
    rm -rf /usr/src/trojan-temp
    green "======================================================================"
    green "Trojan已安装完成,请使用以下链接下载trojan客户端,此客户端已配置好所有参数"
    green "1、复制下面的链接,在浏览器打开,下载客户端,注意此下载链接将在1个小时后失效"
    blue "http://${your_domain}/$trojan_path/trojan-cli.zip"
    green "2、将下载的压缩包解压,打开文件夹,打开start.bat即打开并运行Trojan客户端"
    green "3、打开stop.bat即关闭Trojan客户端"
    green "4、Trojan客户端需要搭配浏览器插件使用,例如switchyomega等"
    green "======================================================================"
  else
    red "==================================="
    red "https证书没有申请成功,自动安装失败"
    green "不要担心,你可以手动修复证书申请"
    green "1. 重启VPS"
    green "2. 重新执行脚本,使用修复证书功能"
    red "==================================="
  fi
}

function install_trojan(){
  nginx_status=`ps -aux | grep "nginx: worker" |grep -v "grep"`
  if [ -n "$nginx_status" ]; then
    systemctl stop nginx
  fi
  $systemPackage -y install net-tools socat
  Port80=`netstat -tlpn | awk -F '[: ]+' '$1=="tcp"{print $5}' | grep -w 80`
  Port443=`netstat -tlpn | awk -F '[: ]+' '$1=="tcp"{print $5}' | grep -w 443`
  if [ -n "$Port80" ]; then
    process80=`netstat -tlpn | awk -F '[: ]+' '$5=="80"{print $9}'`
    red "==========================================================="
    red "检测到80端口被占用,占用进程为:${process80},本次安装结束"
    red "==========================================================="
    exit 1
  fi
  if [ -n "$Port443" ]; then
    process443=`netstat -tlpn | awk -F '[: ]+' '$5=="443"{print $9}'`
    red "============================================================="
    red "检测到443端口被占用,占用进程为:${process443},本次安装结束"
    red "============================================================="
    exit 1
  fi
  #目前SELinux 支持三种模式,分别是enforcing:强制模式,permissive:宽容模式,disabled:关闭
  if [ -f "/etc/selinux/config" ]; then
    CHECK=$(grep SELINUX= /etc/selinux/config | grep -v "#")
    if [ "$CHECK" != "SELINUX=disabled" ]; then
      read -p "检测到SELinux开启状态,是否继续开启SElinux ?请输入 [Y/n] :" yn
      [ -z "${yn}" ] && yn="y"
      if [[ $yn == [Yy] ]]; then
        green "添加放行80/443端口规则"
        $systemPackage -y install policycoreutils-python
        if semanage port -l | grep -w http_port_t | grep -w 80 >/dev/null 2>/dev/null; then
          green "80端口已添加"
        else
          semanage port -a -t http_port_t -p tcp 80 >/dev/null 2>&1
          green "80端口已添加"
        fi
        if semanage port -l | grep -w http_port_t | grep -w 443 >/dev/null 2>/dev/null; then
          green "443端口已添加"
        else
          semanage port -a -t http_port_t -p tcp 443 >/dev/null 2>&1
          green "443端口已添加"
        fi
      else
        if [ "$CHECK" == "SELINUX=enforcing" ]; then
            sed -i 's/SELINUX=enforcing/SELINUX=disabled/g' /etc/selinux/config
        elif [ "$CHECK" == "SELINUX=permissive" ]; then
            sed -i 's/SELINUX=permissive/SELINUX=disabled/g' /etc/selinux/config
        fi
        red "======================================================================="
        red "关闭selinux后,必须重启VPS才能生效,再执行本脚本,即将在3秒后重启......"
        red "======================================================================="
        clear
        green "重启倒计时3s"
        sleep 1s
        clear
        green "重启倒计时2s"
        sleep 1s
        clear
        green "重启倒计时1s"
        sleep 1s
        clear
        green "重启中..."
        reboot
      fi
    fi
  fi
  if [ "$release" == "centos" ]; then
    if [ -n "$(grep ' 6\.' /etc/redhat-release)" ] ;then
      red "==============="
      red "当前系统不受支持"
      red "==============="
      exit
    fi
    if [ -n "$(grep ' 5\.' /etc/redhat-release)" ] ;then
      red "==============="
      red "当前系统不受支持"
      red "==============="
      exit
    fi
    systemctl stop firewalld.service
    rpm -Uvh https://github.com/dajiangfu/trojan/raw/master/nginx-release-centos-7-0.el7.ngx.noarch.rpm
  elif [ "$release" == "ubuntu" ]; then
    if  [ -n "$(grep ' 14\.' /etc/os-release)" ] ;then
      red "==============="
      red "当前系统不受支持"
      red "==============="
      exit
    fi
    if  [ -n "$(grep ' 12\.' /etc/os-release)" ] ;then
      red "==============="
      red "当前系统不受支持"
      red "==============="
      exit
    fi
    systemctl stop ufw
    $systemPackage update
  elif [ "$release" == "debian" ]; then
    $systemPackage update
  fi
  $systemPackage -y install wget unzip zip curl tar >/dev/null 2>&1
  green "======================="
  blue "请输入绑定到本VPS的域名"
  green "======================="
  read your_domain
  real_addr=`ping ${your_domain} -c 1 | sed '1{s/[^(]*(//;s/).*//;q}'`
  local_addr=`curl ipv4.icanhazip.com`
  if [ $real_addr == $local_addr ] ; then
    green "=========================================="
    green "       域名解析正常,开始安装trojan"
    green "=========================================="
    sleep 1s
    install
  else
    red "================================"
    red "域名解析地址与本VPS IP地址不一致"
    red "若你确认稍后可以将域名解析到本VPS的IP上,可强制脚本继续"
    red "================================"
    read -p "是否强制运行 ?请输入 [Y/n] :" yn
    [ -z "${yn}" ] && yn="y"
    if [[ $yn == [Yy] ]]; then
      green "强制继续运行脚本"
      sleep 1s
      install
    else
      exit 1
    fi
  fi
}

function repair_cert(){
  systemctl stop nginx
  Port80=`netstat -tlpn | awk -F '[: ]+' '$1=="tcp"{print $5}' | grep -w 80`
  Port443=`netstat -tlpn | awk -F '[: ]+' '$1=="tcp"{print $5}' | grep -w 443`
  if [ -n "$Port80" ]; then
    process80=`netstat -tlpn | awk -F '[: ]+' '$5=="80"{print $9}'`
    red "==========================================================="
    red "检测到80端口被占用,占用进程为:${process80},本次安装结束"
    red "==========================================================="
    exit 1
  fi
  green "======================="
  blue "请输入绑定到本VPS的域名"
  green "======================="
  read your_domain
  real_addr=`ping ${your_domain} -c 1 | sed '1{s/[^(]*(//;s/).*//;q}'`
  local_addr=`curl ipv4.icanhazip.com`
  if [ $real_addr == $local_addr ] ; then
    green "=========================================="
    green "       域名解析正常,开始重新申请证书"
    green "=========================================="
    #选择使用letsencrypt或者zerossl
    read -p "是否使用ZeroSSL证书 ?请输入 [Y/n] :" yn
    [ -z "${yn}" ] && yn="y"
    if [[ $yn == [Yy] ]]; then
      green "======================="
      blue "请输入绑定到本域名的邮箱地址(不会验证邮箱是否本人的)"
      green "======================="
      read your_mail
      #使用zerossl作为默认证书
      ~/.acme.sh/acme.sh --set-default-ca --server zerossl
      #注册域名证书绑定邮箱
      ~/.acme.sh/acme.sh  --register-account  -m $your_mail --server zerossl
      #设置证书签发方式,如果你本地没有装任何 Web 服务器软件,或者你的 Web 服务器软件并没有监听 TCP 80 端口,那么可以用 Standalone 方式直接获取多域名证书
      ~/.acme.sh/acme.sh --issue -d $your_domain --nginx /etc/nginx/nginx.conf
    else
      #使用letsencrypt作为默认证书
      ~/.acme.sh/acme.sh --set-default-ca --server letsencrypt
      #设置证书签发方式,如果你本地没有装任何 Web 服务器软件,或者你的 Web 服务器软件并没有监听 TCP 80 端口,那么可以用 Standalone 方式直接获取多域名证书
      ~/.acme.sh/acme.sh --issue -d $your_domain --nginx /etc/nginx/nginx.conf
    fi
    #安装证书
    ~/.acme.sh/acme.sh --installcert -d $your_domain --key-file /usr/src/trojan-cert/private.key --fullchain-file /usr/src/trojan-cert/fullchain.cer
    if test -s /usr/src/trojan-cert/fullchain.cer; then
      green "证书重新申请成功"
      green "请将/usr/src/trojan-cert/下的fullchain.cer下载放到客户端trojan-cli文件夹"
      systemctl restart trojan
      systemctl start nginx
    else
      red "重新申请证书失败"
    fi
  else
    red "================================"
    red "域名解析地址与本VPS IP地址不一致"
    red "本次安装失败,请确保域名解析正常"
    red "================================"
  fi
}

function remove_trojan(){
  red "================================"
  red "即将卸载trojan"
  red "同时卸载安装的nginx"
  red "================================"
  systemctl stop trojan
  systemctl disable trojan
  rm -f ${systempwd}trojan.service
  if [ "$release" == "centos" ]; then
    $systemPackage -y remove nginx
  else
    $systemPackage -y autoremove nginx
  fi
  rm -rf /usr/src/trojan*
  rm -rf /usr/share/nginx/html/*
  green "=============="
  green "trojan删除完毕"
  green "=============="
}

function update_trojan(){
  /usr/src/trojan/trojan -v 2>trojan.tmp
  curr_version=`cat trojan.tmp | grep "trojan" | awk '{print $4}'`
  wget https://api.github.com/repos/trojan-gfw/trojan/releases/latest >/dev/null 2>&1
  latest_version=`grep tag_name latest| awk -F '[:,"v]' '{print $6}'`
  rm -f latest
  rm -f trojan.tmp
  if version_lt "$curr_version" "$latest_version"; then
    green "当前版本$curr_version,最新版本$latest_version,开始升级……"
    mkdir trojan_update_temp && cd trojan_update_temp
    wget https://github.com/trojan-gfw/trojan/releases/download/v${latest_version}/trojan-${latest_version}-linux-amd64.tar.xz >/dev/null 2>&1
    tar xf trojan-${latest_version}-linux-amd64.tar.xz >/dev/null 2>&1
    mv ./trojan/trojan /usr/src/trojan/
    cd .. && rm -rf trojan_update_temp
    systemctl restart trojan
    /usr/src/trojan/trojan -v 2>trojan.tmp
    green "trojan升级完成,当前版本:`cat trojan.tmp | grep "trojan" | awk '{print $4}'`"
    rm -f trojan.tmp
  else
    green "当前版本$curr_version,最新版本$latest_version,无需升级"
  fi
}

start_menu(){
  clear
  green " ======================================="
  green " 介绍:一键安装trojan      "
  green " 系统:centos7+/debian9+/ubuntu16.04+"
  green " 网站:www.atrandys.com              "
  green " Youtube:Randy's 堡垒                "
  blue " 声明:"
  red " *请不要在任何生产环境使用此脚本"
  red " *请不要有其他程序占用80和443端口"
  red " *若是第二次使用脚本,请先执行卸载trojan"
  green " ======================================="
  echo
  green " 1. 安装trojan"
  red " 2. 卸载trojan"
  green " 3. 升级trojan"
  green " 4. 重新申请证书"
  blue " 0. 退出脚本"
  echo
  read -p "请输入数字:" num
  case "$num" in
  1)
  install_trojan
  ;;
  2)
  remove_trojan 
  ;;
  3)
  update_trojan 
  ;;
  4)
  repair_cert 
  ;;
  0)
  exit 1
  ;;
  *)
  clear
  red "请输入正确数字"
  sleep 1s
  start_menu
  ;;
  esac
}

start_menu