#!/bin/bash function blue(){ echo -e "\033[34m\033[01m$1\033[0m" } function green(){ echo -e "\033[32m\033[01m$1\033[0m" } function red(){ echo -e "\033[31m\033[01m$1\033[0m" } function version_lt(){ test "$(echo "$@" | tr " " "\n" | sort -rV | head -n 1)" != "$1"; } source /etc/os-release RELEASE=$ID VERSION=$VERSION_ID if [ "$RELEASE" == "centos" ]; then release="centos" systemPackage="yum" elif [ "$RELEASE" == "debian" ]; then release="debian" systemPackage="apt-get" elif [ "$RELEASE" == "ubuntu" ]; then release="ubuntu" systemPackage="apt-get" fi systempwd="/etc/systemd/system/" function install_trojan(){ $systemPackage install -y nginx if [ ! -d "/etc/nginx/" ]; then red "nginx安装有问题, 请使用卸载trojan后重新安装" exit 1 fi cat > /etc/nginx/nginx.conf <<-EOF user root; worker_processes 1; error_log /var/log/nginx/error.log warn; pid /var/run/nginx.pid; events { worker_connections 1024; } http { include /etc/nginx/mime.types; default_type application/octet-stream; log_format main '\$remote_addr - \$remote_user [\$time_local] "\$request" ' '\$status \$body_bytes_sent "\$http_referer" ' '"\$http_user_agent" "\$http_x_forwarded_for"'; access_log /var/log/nginx/access.log main; sendfile on; #tcp_nopush on; keepalive_timeout 120; client_max_body_size 20m; #gzip on; server { listen 80; server_name $your_domain; root /usr/share/nginx/html; index index.php index.html index.htm; } } EOF systemctl restart nginx sleep 3 rm -rf /usr/share/nginx/html/* cd /usr/share/nginx/html/ wget -q https://github.com/mayswind/AriaNg-DailyBuild/archive/master.zip >/dev/null 2>&1 unzip master.zip >/dev/null 2>&1 sleep 5 if [ ! -d "/usr/src" ]; then mkdir /usr/src fi mkdir /usr/src/trojan-cert cat > /etc/nginx/nginx.conf <<-EOF user root; worker_processes 1; error_log /var/log/nginx/error.log warn; pid /var/run/nginx.pid; events { worker_connections 1024; } http { include /etc/nginx/mime.types; default_type application/octet-stream; log_format main '\$remote_addr - \$remote_user [\$time_local] "\$request" ' '\$status \$body_bytes_sent "\$http_referer" ' '"\$http_user_agent" "\$http_x_forwarded_for"'; access_log /var/log/nginx/access.log main; sendfile on; #tcp_nopush on; keepalive_timeout 120; client_max_body_size 20m; #gzip on; server { listen 127.0.0.1:80; server_name $your_domain; root /usr/share/nginx/html; index index.php index.html index.htm; } server { listen 0.0.0.0:80; server_name $your_domain; return 301 https://$your_domain\$request_uri; } } EOF systemctl restart nginx systemctl enable nginx cd /usr/src wget -q https://api.github.com/repos/trojan-gfw/trojan/releases/latest >/dev/null 2>&1 latest_version=`grep tag_name latest| awk -F '[:,"v]' '{print $6}'` rm -f latest green "开始下载最新版trojan amd64" wget -q https://github.com/trojan-gfw/trojan/releases/download/v${latest_version}/trojan-${latest_version}-linux-amd64.tar.xz tar xf trojan-${latest_version}-linux-amd64.tar.xz >/dev/null 2>&1 rm -f trojan-${latest_version}-linux-amd64.tar.xz green "请设置trojan密码, 建议不要出现特殊字符" read -p "请输入密码 :" trojan_passwd rm -rf /usr/src/trojan/server.conf cat > /usr/src/trojan/server.conf <<-EOF { "run_type": "server", "local_addr": "0.0.0.0", "local_port": 443, "remote_addr": "127.0.0.1", "remote_port": 80, "password": [ "$trojan_passwd" ], "log_level": 1, "ssl": { "cert": "/usr/src/trojan-cert/$your_domain/fullchain.cer", "key": "/usr/src/trojan-cert/$your_domain/private.key", "key_password": "", "cipher_tls13":"TLS_AES_128_GCM_SHA256:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384", "prefer_server_cipher": true, "alpn": [ "http/1.1" ], "reuse_session": true, "session_ticket": false, "session_timeout": 600, "plain_http_response": "", "curves": "", "dhparam": "" }, "tcp": { "no_delay": true, "keep_alive": true, "fast_open": false, "fast_open_qlen": 20 }, "mysql": { "enabled": false, "server_addr": "127.0.0.1", "server_port": 3306, "database": "trojan", "username": "trojan", "password": "" } } EOF rm -rf /usr/src/trojan-temp/ trojan_path=$(cat /dev/urandom | head -1 | md5sum | head -c 16) #mkdir /usr/share/nginx/html/${trojan_path} cat > ${systempwd}trojan.service <<-EOF [Unit] Description=trojan After=network.target [Service] Type=simple PIDFile=/usr/src/trojan/trojan/trojan.pid ExecStart=/usr/src/trojan/trojan -c "/usr/src/trojan/server.conf" ExecReload=/bin/kill -HUP \$MAINPID Restart=on-failure RestartSec=1s [Install] WantedBy=multi-user.target EOF chmod +x ${systempwd}trojan.service systemctl enable trojan.service cd /root cat > /usr/src/trojan-cert/${your_domain}/private.key<<-EOF -----BEGIN PRIVATE KEY----- MIIEvAIBADANBgkqhkiG9w0BAQEFAASCBKYwggSiAgEAAoIBAQDFgyVU/fGMnGRj Re5GUAipHJ03EMtbvcJkb//97AvZ8ZbgGLAplMaFLPNnT07DkCWv3073V5RHyBbZ XXRh18/o91KBYDaL9+Xu51xZ8jC3aLGnZDNXpZFXX0FRNcyUr8957lNM6f1EmXf/ 39Ny1Xn+F17IrM7IhZfqqc45NFQZIWX01axHbIxJRLaGfparoRKbdw1F5I6JguJw v/Lnl900t7TlDTtV6XQgiYQf2QjQGuTv95qCzqOka8ZGf6uUS1fgSuk7NeNbUM54 6hl7/GmZjggsTRXtkT0cdsQqoqbcM1nBIYp2GvLqH1opH+cZY/AnFfK44pSQ5uEm KceYPZYvAgMBAAECggEAZKKdsuBw4qQMwkgvT8QXpZLex9/WvbfCBErMtCRBJZri tOvfVlBnlhOBMXJHP32CtkmhgoUtGCXq/nWPhwre9GSPtTvAjzCQB1n6xBmSmODP I+r5/f5uP4ZZUXeH9XpezFGSP+45DWrkqYrxweDjd4OQ1860zZbEANzkJmFzOBnW fIdyWgdP9c5gPYirlUJLJ3cBEum4zbd+XC8N9X4IUyhPKJMZhAY0AFhTkTAYDWEJ K+/5SNGpwUFry28asyI5SoesH4RRAoG5W1gCG0syjuPAy6ZpDvAe6Eix7pJ083z2 XrPzYMl+j0ud5I/WHP9bPB3KVZdMm5LAK+0OBiZsgQKBgQDQfyarNPOsp0RRKaa4 2UP/tLodgMFibs39L9NY0XuJQouKJtaFPgR9JFMkZP6GxfPUCVDEAxgUfgTVDVnn 7IIamBM+NoFcxDdMmK5fy+r6OKyZPMm4MDunSueI+1wReVSi0ovLzsZOARlCoJ72 X5grbyIwPW/f+v1Zx9GIA5WhDQKBgQDyg1CvHwhQYhs2iU1PDnw6M6HDKr5Ap6U5 fuOxPCrRquZac9yo6eXDDE8+qQoH4rUu+hXPElXhUAWxN3glxQD0z//OC5Is/j07 +tdIcYezImVsHnAxyOrC5QE7AZxr4VJvFYNURHzCpnY6fboFHL51JO5viQ0fZ21s 4ht0Dm1tKwKBgB0qrG4m6i+s9pGkEf6p5ilPTvnxmRv8BDT3C8nRBEcfWAXriPb6 xgX7nuXoevK/nmx7ISFKjYPQXTywsXMQUuMFgyug1Ff12waMFVixXh3C7+I/7rgl hzLP97Ph9e872estKQFJ29Pts2rurU4p8U+iLFYzQgNDSU3V9ing1n3BAoGAIWwH ipr0Ql/C8Fkr1mFgrYTAHm2dmruAAdSC/MIWBJ9Q79ZX6s+RYrgnk7MoNr3/ymGc 79TPESY+IpZKcKod359q2bKuipTfS4zebpV25jEvWR84xyOxdvqomME4FYYQHk8Q smRd7VWTpav+HwY/GVXlpml07YcLhZ4DupLicdECgYBWetGpTXGfHgZxQBu6EIvb f4PAJ6i1A3Jrpf1zDzFI+P/QJUf0xZUDvF4uzjqEe7Oz6t7HFXMLl7f0zlwBCqKg R0Vq1jGtLvsL24UIr8ujrJDEmt5zSMNYhDCkI1Rpl/lfS2BWikJTgVl4Bxz4O8Dj Pw4j4HYa1hsLalNhkohZ0g== -----END PRIVATE KEY----- EOF cat > /usr/src/trojan-cert/${your_domain}/fullchain.cer<<-EOF -----BEGIN CERTIFICATE----- MIIEyjCCArKgAwIBAgIQTwN47Aj6/rIK5WCAN+orWTANBgkqhkiG9w0BAQsFADCB jzELMAkGA1UEBhMCQ04xEzARBgNVBAgMCkdyZWF0Q2hpbmExDjAMBgNVBAcMBUxv Y2FsMRUwEwYDVQQKDAxHYW1lc21lIEx0ZC4xFTATBgNVBAsMDEdhbWVzbWUgRHB0 LjEQMA4GA1UEAwwHR2FtZXNtZTEbMBkGCSqGSIb3DQEJARYMaUBnYW1lc21lLm1l MB4XDTI0MDQwMTIyMjkzMloXDTI2MDcwMTIyMjkzMlowUjEnMCUGA1UEChMebWtj ZXJ0IGRldmVsb3BtZW50IGNlcnRpZmljYXRlMScwJQYDVQQLDB5nYW1lc21lQHgt cHJvLW0xIChDSFVOTkFOIExJVSkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQDFgyVU/fGMnGRjRe5GUAipHJ03EMtbvcJkb//97AvZ8ZbgGLAplMaFLPNn T07DkCWv3073V5RHyBbZXXRh18/o91KBYDaL9+Xu51xZ8jC3aLGnZDNXpZFXX0FR NcyUr8957lNM6f1EmXf/39Ny1Xn+F17IrM7IhZfqqc45NFQZIWX01axHbIxJRLaG fparoRKbdw1F5I6JguJwv/Lnl900t7TlDTtV6XQgiYQf2QjQGuTv95qCzqOka8ZG f6uUS1fgSuk7NeNbUM546hl7/GmZjggsTRXtkT0cdsQqoqbcM1nBIYp2GvLqH1op H+cZY/AnFfK44pSQ5uEmKceYPZYvAgMBAAGjXjBcMA4GA1UdDwEB/wQEAwIFoDAT BgNVHSUEDDAKBggrBgEFBQcDATAfBgNVHSMEGDAWgBRHJocZUxq1ByyNh3O8vHhP u+YELjAUBgNVHREEDTALggkqLnUyYi5sb2wwDQYJKoZIhvcNAQELBQADggIBAK7I WaY4Pz9tt86zZFMQ96cwWO2Bqy5zQe2LBQlABrK0MkV+0mTFbqpAN7ClqTzkxyc5 jjwE5DUYJLId6cKHWAPynmIbNQcmvTBFunkFpEsqprmijt0Hhm63V6wBHBxAvGxR 8HoaSJJ0PRGl2u0BFbycmDL5ZNdDdVtjZvCXenOdRDcIqsDdjMm79/0n7rRuQ77c 5/OVBGVhVAVGuD7pyxKXQv6iumNkT9o6utPHIlXiS80df7ac0iCtyvuq8cPyOYND BEIfVIOM+qm4WYPSTHEUrmN1lzoyhlZDiLRuVTNEMH8F5dGKlguxqfJZqNjOxUOh GiL1InajsNVwmDCBpIrF/3hePW1PJM5XxE7DgqbnRoyMc6pdPhiZNHhhne5kFNR8 dL/7opexACjN6yp+xeh8GVlJgHOQz01sLmbK7bWo5DKiU7JRYOabDWNx2wxg3O18 KMmwkHSeFfcJxJRQ86nzBNmAuVm7UFYh7s66h0bZOCLy4Ik6Qf24J9tqqwvRLnoV Rj9NhSMQY9SmuS8aYC4hYsoU9LRLIBuFLxVtinAyvoUn4uVul8haTMznqV/o+q+A IOTFcQhop8TB7s0tH0zLmk/ykU+E5IRbWQsGH15bUAwoCRTLu9uv1YMO0MhUMfMs A4LKG7+qOm+5egiZDomeaM472wyc/OK3jNR9uYMv -----END CERTIFICATE----- EOF port_forward } function preinstall_check(){ nginx_status=`ps -aux | grep "nginx: worker" |grep -v "grep"` if [ -n "$nginx_status" ]; then systemctl stop nginx fi $systemPackage -y install net-tools socat >/dev/null 2>&1 check_port 80 check_port 443 if [ -f "/etc/selinux/config" ]; then CHECK=$(grep SELINUX= /etc/selinux/config | grep -v "#") if [ "$CHECK" == "SELINUX=enforcing" ]; then green "$(date +"%Y-%m-%d %H:%M:%S") - SELinux状态非disabled,关闭SELinux." setenforce 0 sed -i 's/SELINUX=enforcing/SELINUX=disabled/g' /etc/selinux/config #loggreen "SELinux is not disabled, add port 80/443 to SELinux rules." #loggreen "==== Install semanage" #logcmd "yum install -y policycoreutils-python" #semanage port -a -t http_port_t -p tcp 80 #semanage port -a -t http_port_t -p tcp 443 #semanage port -a -t http_port_t -p tcp 37212 #semanage port -a -t http_port_t -p tcp 37213 elif [ "$CHECK" == "SELINUX=permissive" ]; then green "$(date +"%Y-%m-%d %H:%M:%S") - SELinux状态非disabled,关闭SELinux." setenforce 0 sed -i 's/SELINUX=permissive/SELINUX=disabled/g' /etc/selinux/config fi fi if [ "$release" == "centos" ]; then if [ -n "$(grep ' 6\.' /etc/redhat-release)" ] ;then red "===============" red "当前系统不受支持" red "===============" exit fi if [ -n "$(grep ' 5\.' /etc/redhat-release)" ] ;then red "===============" red "当前系统不受支持" red "===============" exit fi firewall_status=`systemctl status firewalld | grep "Active: active"` if [ -n "$firewall_status" ]; then green "检测到firewalld开启状态, 添加放行80/443端口规则" firewall-cmd --zone=public --add-port=80/tcp --permanent firewall-cmd --zone=public --add-port=443/tcp --permanent firewall-cmd --reload fi rpm -Uvh http://nginx.org/packages/centos/7/noarch/RPMS/nginx-release-centos-7-0.el7.ngx.noarch.rpm --force --nodeps elif [ "$release" == "ubuntu" ]; then if [ -n "$(grep ' 14\.' /etc/os-release)" ] ;then red "===============" red "当前系统不受支持" red "===============" exit fi if [ -n "$(grep ' 12\.' /etc/os-release)" ] ;then red "===============" red "当前系统不受支持" red "===============" exit fi ufw_status=`systemctl status ufw | grep "Active: active"` if [ -n "$ufw_status" ]; then ufw allow 80/tcp ufw allow 443/tcp ufw reload fi apt-get update elif [ "$release" == "debian" ]; then ufw_status=`systemctl status ufw | grep "Active: active"` if [ -n "$ufw_status" ]; then ufw allow 80/tcp ufw allow 443/tcp ufw reload fi apt-get update fi $systemPackage -y install wget unzip zip curl tar >/dev/null 2>&1 green "=======================" blue "请输入绑定到本VPS的域名" green "=======================" read your_domain real_addr=`ping ${your_domain} -c 1 | sed '1{s/[^(]*(//;s/).*//;q}'` local_addr=`curl ipv4.icanhazip.com` if [ $real_addr == $local_addr ] ; then green "==========================================" green " 域名解析正常, 开始安装trojan" green "==========================================" sleep 1s install_trojan else red "====================================" red "域名解析地址与本VPS IP地址不一致" red "若你确认解析成功你可强制脚本继续运行" red "====================================" read -p "是否强制运行 ?请输入 [Y/n] :" yn [ -z "${yn}" ] && yn="y" if [[ $yn == [Yy] ]]; then green "强制继续运行脚本" sleep 1s install_trojan else exit 1 fi fi } function remove_trojan(){ red "================================" red "即将卸载trojan" red "同时卸载安装的nginx" red "================================" systemctl stop trojan systemctl disable trojan systemctl stop nginx systemctl disable nginx rm -f ${systempwd}trojan.service if [ "$release" == "centos" ]; then yum remove -y nginx else apt-get -y autoremove nginx apt-get -y --purge remove nginx apt-get -y autoremove && apt-get -y autoclean find / | grep nginx | sudo xargs rm -rf fi rm -rf /usr/src/trojan/ rm -rf /usr/src/trojan-cert/ rm -rf /usr/share/nginx/html/* rm -rf /etc/nginx/ green "==============" green "trojan删除完毕" green "==============" } function check_port() { local port=$1 local port_process=`netstat -tlpn | awk -F '[: ]+' '$5=="'"$port"'" {print $9}'` if [ -n "$port_process" ]; then red "===========================================================" red "检测到${port}端口被占用, 占用进程为: ${port_process}, 本次安装结束" red "===========================================================" exit 1 fi } function port_forward(){ iptables -t nat -A PREROUTING -p tcp --dport 49000:49010 -j REDIRECT --to-ports 443 green "==========================" green "已将49000-50000端口转发至443" green "==========================" } function update_trojan(){ /usr/src/trojan/trojan -v 2>trojan.tmp curr_version=`cat trojan.tmp | grep "trojan" | awk '{print $4}'` wget -q https://api.github.com/repos/trojan-gfw/trojan/releases/latest >/dev/null 2>&1 latest_version=`grep tag_name latest| awk -F '[:,"v]' '{print $6}'` rm -f latest rm -f trojan.tmp if version_lt "$curr_version" "$latest_version"; then green "当前版本$curr_version,最新版本$latest_version,开始升级……" mkdir trojan_update_temp && cd trojan_update_temp wget -q https://github.com/trojan-gfw/trojan/releases/download/v${latest_version}/trojan-${latest_version}-linux-amd64.tar.xz >/dev/null 2>&1 tar xf trojan-${latest_version}-linux-amd64.tar.xz >/dev/null 2>&1 mv ./trojan/trojan /usr/src/trojan/ cd .. && rm -rf trojan_update_temp systemctl restart trojan /usr/src/trojan/trojan -v 2>trojan.tmp green "服务端trojan升级完成,当前版本: `cat trojan.tmp | grep "trojan" | awk '{print $4}'`,客户端请在trojan github下载最新版" rm -f trojan.tmp else green "当前版本$curr_version,最新版本$latest_version,无需升级" fi } start_menu(){ clear green " =======================================" green " 介绍: 一键安装trojan " green " 系统: centos7+/debian9+/ubuntu16.04+" blue " 注意:" red " *1. 不要在任何生产环境使用此脚本" red " *2. 不要占用80和443端口" red " *3. 若第二次使用脚本, 请先执行卸载trojan" green " =======================================" echo green " 1. 安装trojan" red " 2. 卸载trojan" green " 3. 升级trojan" green " 4. 端口映射" blue " 0. 退出脚本" echo read -p "请输入数字 :" num case "$num" in 1) preinstall_check ;; 2) remove_trojan ;; 3) update_trojan ;; 4) port_forward ;; 0) exit 1 ;; *) clear red "请输入正确数字" sleep 1s start_menu ;; esac } start_menu