1
0

x-ui.sh 57 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821
  1. #!/bin/bash
  2. red='\033[0;31m'
  3. green='\033[0;32m'
  4. yellow='\033[0;33m'
  5. plain='\033[0m'
  6. #Add some basic function here
  7. function LOGD() {
  8. echo -e "${yellow}[DEG] $* ${plain}"
  9. }
  10. function LOGE() {
  11. echo -e "${red}[ERR] $* ${plain}"
  12. }
  13. function LOGI() {
  14. echo -e "${green}[INF] $* ${plain}"
  15. }
  16. # check root
  17. [[ $EUID -ne 0 ]] && LOGE "ERROR: You must be root to run this script! \n" && exit 1
  18. # Check OS and set release variable
  19. if [[ -f /etc/os-release ]]; then
  20. source /etc/os-release
  21. release=$ID
  22. elif [[ -f /usr/lib/os-release ]]; then
  23. source /usr/lib/os-release
  24. release=$ID
  25. else
  26. echo "Failed to check the system OS, please contact the author!" >&2
  27. exit 1
  28. fi
  29. echo "The OS release is: $release"
  30. os_version=""
  31. os_version=$(grep "^VERSION_ID" /etc/os-release | cut -d '=' -f2 | tr -d '"' | tr -d '.')
  32. if [[ "${release}" == "arch" ]]; then
  33. echo "Your OS is Arch Linux"
  34. elif [[ "${release}" == "parch" ]]; then
  35. echo "Your OS is Parch Linux"
  36. elif [[ "${release}" == "manjaro" ]]; then
  37. echo "Your OS is Manjaro"
  38. elif [[ "${release}" == "armbian" ]]; then
  39. echo "Your OS is Armbian"
  40. elif [[ "${release}" == "alpine" ]]; then
  41. echo "Your OS is Alpine Linux"
  42. elif [[ "${release}" == "opensuse-tumbleweed" ]]; then
  43. echo "Your OS is OpenSUSE Tumbleweed"
  44. elif [[ "${release}" == "openEuler" ]]; then
  45. if [[ ${os_version} -lt 2203 ]]; then
  46. echo -e "${red} Please use OpenEuler 22.03 or higher ${plain}\n" && exit 1
  47. fi
  48. elif [[ "${release}" == "centos" ]]; then
  49. if [[ ${os_version} -lt 8 ]]; then
  50. echo -e "${red} Please use CentOS 8 or higher ${plain}\n" && exit 1
  51. fi
  52. elif [[ "${release}" == "ubuntu" ]]; then
  53. if [[ ${os_version} -lt 2004 ]]; then
  54. echo -e "${red} Please use Ubuntu 20 or higher version!${plain}\n" && exit 1
  55. fi
  56. elif [[ "${release}" == "fedora" ]]; then
  57. if [[ ${os_version} -lt 36 ]]; then
  58. echo -e "${red} Please use Fedora 36 or higher version!${plain}\n" && exit 1
  59. fi
  60. elif [[ "${release}" == "amzn" ]]; then
  61. if [[ ${os_version} != "2023" ]]; then
  62. echo -e "${red} Please use Amazon Linux 2023!${plain}\n" && exit 1
  63. fi
  64. elif [[ "${release}" == "debian" ]]; then
  65. if [[ ${os_version} -lt 11 ]]; then
  66. echo -e "${red} Please use Debian 11 or higher ${plain}\n" && exit 1
  67. fi
  68. elif [[ "${release}" == "almalinux" ]]; then
  69. if [[ ${os_version} -lt 80 ]]; then
  70. echo -e "${red} Please use AlmaLinux 8.0 or higher ${plain}\n" && exit 1
  71. fi
  72. elif [[ "${release}" == "rocky" ]]; then
  73. if [[ ${os_version} -lt 8 ]]; then
  74. echo -e "${red} Please use Rocky Linux 8 or higher ${plain}\n" && exit 1
  75. fi
  76. elif [[ "${release}" == "ol" ]]; then
  77. if [[ ${os_version} -lt 8 ]]; then
  78. echo -e "${red} Please use Oracle Linux 8 or higher ${plain}\n" && exit 1
  79. fi
  80. else
  81. echo -e "${red}Your operating system is not supported by this script.${plain}\n"
  82. echo "Please ensure you are using one of the following supported operating systems:"
  83. echo "- Ubuntu 20.04+"
  84. echo "- Debian 11+"
  85. echo "- CentOS 8+"
  86. echo "- OpenEuler 22.03+"
  87. echo "- Fedora 36+"
  88. echo "- Arch Linux"
  89. echo "- Parch Linux"
  90. echo "- Manjaro"
  91. echo "- Armbian"
  92. echo "- AlmaLinux 8.0+"
  93. echo "- Rocky Linux 8+"
  94. echo "- Oracle Linux 8+"
  95. echo "- OpenSUSE Tumbleweed"
  96. echo "- Amazon Linux 2023"
  97. exit 1
  98. fi
  99. # Declare Variables
  100. log_folder="${XUI_LOG_FOLDER:=/var/log}"
  101. iplimit_log_path="${log_folder}/3xipl.log"
  102. iplimit_banned_log_path="${log_folder}/3xipl-banned.log"
  103. confirm() {
  104. if [[ $# > 1 ]]; then
  105. echo && read -p "$1 [Default $2]: " temp
  106. if [[ "${temp}" == "" ]]; then
  107. temp=$2
  108. fi
  109. else
  110. read -p "$1 [y/n]: " temp
  111. fi
  112. if [[ "${temp}" == "y" || "${temp}" == "Y" ]]; then
  113. return 0
  114. else
  115. return 1
  116. fi
  117. }
  118. confirm_restart() {
  119. confirm "Restart the panel, Attention: Restarting the panel will also restart xray" "y"
  120. if [[ $? == 0 ]]; then
  121. restart
  122. else
  123. show_menu
  124. fi
  125. }
  126. before_show_menu() {
  127. echo && echo -n -e "${yellow}Press enter to return to the main menu: ${plain}" && read temp
  128. show_menu
  129. }
  130. install() {
  131. bash <(curl -Ls https://raw.githubusercontent.com/MHSanaei/3x-ui/main/install.sh)
  132. if [[ $? == 0 ]]; then
  133. if [[ $# == 0 ]]; then
  134. start
  135. else
  136. start 0
  137. fi
  138. fi
  139. }
  140. update() {
  141. confirm "This function will forcefully reinstall the latest version, and the data will not be lost. Do you want to continue?" "y"
  142. if [[ $? != 0 ]]; then
  143. LOGE "Cancelled"
  144. if [[ $# == 0 ]]; then
  145. before_show_menu
  146. fi
  147. return 0
  148. fi
  149. bash <(curl -Ls https://raw.githubusercontent.com/MHSanaei/3x-ui/main/install.sh)
  150. if [[ $? == 0 ]]; then
  151. LOGI "Update is complete, Panel has automatically restarted "
  152. before_show_menu
  153. fi
  154. }
  155. update_menu() {
  156. echo -e "${yellow}Updating Menu${plain}"
  157. confirm "This function will update the menu to the latest changes." "y"
  158. if [[ $? != 0 ]]; then
  159. LOGE "Cancelled"
  160. if [[ $# == 0 ]]; then
  161. before_show_menu
  162. fi
  163. return 0
  164. fi
  165. wget --no-check-certificate -O /usr/bin/x-ui https://raw.githubusercontent.com/MHSanaei/3x-ui/main/x-ui.sh
  166. chmod +x /usr/local/x-ui/x-ui.sh
  167. chmod +x /usr/bin/x-ui
  168. if [[ $? == 0 ]]; then
  169. echo -e "${green}Update successful. The panel has automatically restarted.${plain}"
  170. before_show_menu
  171. else
  172. echo -e "${red}Failed to update the menu.${plain}"
  173. return 1
  174. fi
  175. }
  176. legacy_version() {
  177. echo "Enter the panel version (like 2.4.0):"
  178. read tag_version
  179. if [ -z "$tag_version" ]; then
  180. echo "Panel version cannot be empty. Exiting."
  181. exit 1
  182. fi
  183. # Use the entered panel version in the download link
  184. install_command="bash <(curl -Ls "https://raw.githubusercontent.com/mhsanaei/3x-ui/v$tag_version/install.sh") v$tag_version"
  185. echo "Downloading and installing panel version $tag_version..."
  186. eval $install_command
  187. }
  188. # Function to handle the deletion of the script file
  189. delete_script() {
  190. rm "$0" # Remove the script file itself
  191. exit 1
  192. }
  193. uninstall() {
  194. confirm "Are you sure you want to uninstall the panel? xray will also uninstalled!" "n"
  195. if [[ $? != 0 ]]; then
  196. if [[ $# == 0 ]]; then
  197. show_menu
  198. fi
  199. return 0
  200. fi
  201. systemctl stop x-ui
  202. systemctl disable x-ui
  203. rm /etc/systemd/system/x-ui.service -f
  204. systemctl daemon-reload
  205. systemctl reset-failed
  206. rm /etc/x-ui/ -rf
  207. rm /usr/local/x-ui/ -rf
  208. echo ""
  209. echo -e "Uninstalled Successfully.\n"
  210. echo "If you need to install this panel again, you can use below command:"
  211. echo -e "${green}bash <(curl -Ls https://raw.githubusercontent.com/mhsanaei/3x-ui/master/install.sh)${plain}"
  212. echo ""
  213. # Trap the SIGTERM signal
  214. trap delete_script SIGTERM
  215. delete_script
  216. }
  217. reset_user() {
  218. confirm "Are you sure to reset the username and password of the panel?" "n"
  219. if [[ $? != 0 ]]; then
  220. if [[ $# == 0 ]]; then
  221. show_menu
  222. fi
  223. return 0
  224. fi
  225. read -rp "Please set the login username [default is a random username]: " config_account
  226. [[ -z $config_account ]] && config_account=$(date +%s%N | md5sum | cut -c 1-8)
  227. read -rp "Please set the login password [default is a random password]: " config_password
  228. [[ -z $config_password ]] && config_password=$(date +%s%N | md5sum | cut -c 1-8)
  229. /usr/local/x-ui/x-ui setting -username ${config_account} -password ${config_password} >/dev/null 2>&1
  230. /usr/local/x-ui/x-ui setting -remove_secret >/dev/null 2>&1
  231. echo -e "Panel login username has been reset to: ${green} ${config_account} ${plain}"
  232. echo -e "Panel login password has been reset to: ${green} ${config_password} ${plain}"
  233. echo -e "${yellow} Panel login secret token disabled ${plain}"
  234. echo -e "${green} Please use the new login username and password to access the X-UI panel. Also remember them! ${plain}"
  235. confirm_restart
  236. }
  237. gen_random_string() {
  238. local length="$1"
  239. local random_string=$(LC_ALL=C tr -dc 'a-zA-Z0-9' </dev/urandom | fold -w "$length" | head -n 1)
  240. echo "$random_string"
  241. }
  242. reset_webbasepath() {
  243. echo -e "${yellow}Resetting Web Base Path${plain}"
  244. read -rp "Are you sure you want to reset the web base path? (y/n): " confirm
  245. if [[ $confirm != "y" && $confirm != "Y" ]]; then
  246. echo -e "${yellow}Operation canceled.${plain}"
  247. return
  248. fi
  249. config_webBasePath=$(gen_random_string 10)
  250. # Apply the new web base path setting
  251. /usr/local/x-ui/x-ui setting -webBasePath "${config_webBasePath}" >/dev/null 2>&1
  252. echo -e "Web base path has been reset to: ${green}${config_webBasePath}${plain}"
  253. echo -e "${green}Please use the new web base path to access the panel.${plain}"
  254. restart
  255. }
  256. reset_config() {
  257. confirm "Are you sure you want to reset all panel settings, Account data will not be lost, Username and password will not change" "n"
  258. if [[ $? != 0 ]]; then
  259. if [[ $# == 0 ]]; then
  260. show_menu
  261. fi
  262. return 0
  263. fi
  264. /usr/local/x-ui/x-ui setting -reset
  265. echo -e "All panel settings have been reset to default."
  266. restart
  267. }
  268. check_config() {
  269. local info=$(/usr/local/x-ui/x-ui setting -show true)
  270. if [[ $? != 0 ]]; then
  271. LOGE "get current settings error, please check logs"
  272. show_menu
  273. return
  274. fi
  275. LOGI "${info}"
  276. local existing_webBasePath=$(echo "$info" | grep -Eo 'webBasePath: .+' | awk '{print $2}')
  277. local existing_port=$(echo "$info" | grep -Eo 'port: .+' | awk '{print $2}')
  278. local existing_cert=$(/usr/local/x-ui/x-ui setting -getCert true | grep -Eo 'cert: .+' | awk '{print $2}')
  279. local server_ip=$(curl -s https://api.ipify.org)
  280. if [[ -n "$existing_cert" ]]; then
  281. local domain=$(basename "$(dirname "$existing_cert")")
  282. if [[ "$domain" =~ ^[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}$ ]]; then
  283. echo -e "${green}Access URL: https://${domain}:${existing_port}${existing_webBasePath}${plain}"
  284. else
  285. echo -e "${green}Access URL: https://${server_ip}:${existing_port}${existing_webBasePath}${plain}"
  286. fi
  287. else
  288. echo -e "${green}Access URL: http://${server_ip}:${existing_port}${existing_webBasePath}${plain}"
  289. fi
  290. }
  291. set_port() {
  292. echo && echo -n -e "Enter port number[1-65535]: " && read port
  293. if [[ -z "${port}" ]]; then
  294. LOGD "Cancelled"
  295. before_show_menu
  296. else
  297. /usr/local/x-ui/x-ui setting -port ${port}
  298. echo -e "The port is set, Please restart the panel now, and use the new port ${green}${port}${plain} to access web panel"
  299. confirm_restart
  300. fi
  301. }
  302. start() {
  303. check_status
  304. if [[ $? == 0 ]]; then
  305. echo ""
  306. LOGI "Panel is running, No need to start again, If you need to restart, please select restart"
  307. else
  308. systemctl start x-ui
  309. sleep 2
  310. check_status
  311. if [[ $? == 0 ]]; then
  312. LOGI "x-ui Started Successfully"
  313. else
  314. LOGE "panel Failed to start, Probably because it takes longer than two seconds to start, Please check the log information later"
  315. fi
  316. fi
  317. if [[ $# == 0 ]]; then
  318. before_show_menu
  319. fi
  320. }
  321. stop() {
  322. check_status
  323. if [[ $? == 1 ]]; then
  324. echo ""
  325. LOGI "Panel stopped, No need to stop again!"
  326. else
  327. systemctl stop x-ui
  328. sleep 2
  329. check_status
  330. if [[ $? == 1 ]]; then
  331. LOGI "x-ui and xray stopped successfully"
  332. else
  333. LOGE "Panel stop failed, Probably because the stop time exceeds two seconds, Please check the log information later"
  334. fi
  335. fi
  336. if [[ $# == 0 ]]; then
  337. before_show_menu
  338. fi
  339. }
  340. restart() {
  341. systemctl restart x-ui
  342. sleep 2
  343. check_status
  344. if [[ $? == 0 ]]; then
  345. LOGI "x-ui and xray Restarted successfully"
  346. else
  347. LOGE "Panel restart failed, Probably because it takes longer than two seconds to start, Please check the log information later"
  348. fi
  349. if [[ $# == 0 ]]; then
  350. before_show_menu
  351. fi
  352. }
  353. status() {
  354. systemctl status x-ui -l
  355. if [[ $# == 0 ]]; then
  356. before_show_menu
  357. fi
  358. }
  359. enable() {
  360. systemctl enable x-ui
  361. if [[ $? == 0 ]]; then
  362. LOGI "x-ui Set to boot automatically on startup successfully"
  363. else
  364. LOGE "x-ui Failed to set Autostart"
  365. fi
  366. if [[ $# == 0 ]]; then
  367. before_show_menu
  368. fi
  369. }
  370. disable() {
  371. systemctl disable x-ui
  372. if [[ $? == 0 ]]; then
  373. LOGI "x-ui Autostart Cancelled successfully"
  374. else
  375. LOGE "x-ui Failed to cancel autostart"
  376. fi
  377. if [[ $# == 0 ]]; then
  378. before_show_menu
  379. fi
  380. }
  381. show_log() {
  382. echo -e "${green}\t1.${plain} Debug Log"
  383. echo -e "${green}\t2.${plain} Clear All logs"
  384. echo -e "${green}\t0.${plain} Back to Main Menu"
  385. read -p "Choose an option: " choice
  386. case "$choice" in
  387. 0)
  388. show_menu
  389. ;;
  390. 1)
  391. journalctl -u x-ui -e --no-pager -f -p debug
  392. if [[ $# == 0 ]]; then
  393. before_show_menu
  394. fi
  395. ;;
  396. 2)
  397. sudo journalctl --rotate
  398. sudo journalctl --vacuum-time=1s
  399. echo "All Logs cleared."
  400. restart
  401. ;;
  402. *)
  403. echo -e "${red}Invalid option. Please select a valid number.${plain}\n"
  404. show_log
  405. ;;
  406. esac
  407. }
  408. show_banlog() {
  409. local system_log="/var/log/fail2ban.log"
  410. echo -e "${green}Checking ban logs...${plain}\n"
  411. if ! systemctl is-active --quiet fail2ban; then
  412. echo -e "${red}Fail2ban service is not running!${plain}\n"
  413. return 1
  414. fi
  415. if [[ -f "$system_log" ]]; then
  416. echo -e "${green}Recent system ban activities from fail2ban.log:${plain}"
  417. grep "3x-ipl" "$system_log" | grep -E "Ban|Unban" | tail -n 10 || echo -e "${yellow}No recent system ban activities found${plain}"
  418. echo ""
  419. fi
  420. if [[ -f "${iplimit_banned_log_path}" ]]; then
  421. echo -e "${green}3X-IPL ban log entries:${plain}"
  422. if [[ -s "${iplimit_banned_log_path}" ]]; then
  423. grep -v "INIT" "${iplimit_banned_log_path}" | tail -n 10 || echo -e "${yellow}No ban entries found${plain}"
  424. else
  425. echo -e "${yellow}Ban log file is empty${plain}"
  426. fi
  427. else
  428. echo -e "${red}Ban log file not found at: ${iplimit_banned_log_path}${plain}"
  429. fi
  430. echo -e "\n${green}Current jail status:${plain}"
  431. fail2ban-client status 3x-ipl || echo -e "${yellow}Unable to get jail status${plain}"
  432. }
  433. bbr_menu() {
  434. echo -e "${green}\t1.${plain} Enable BBR"
  435. echo -e "${green}\t2.${plain} Disable BBR"
  436. echo -e "${green}\t0.${plain} Back to Main Menu"
  437. read -p "Choose an option: " choice
  438. case "$choice" in
  439. 0)
  440. show_menu
  441. ;;
  442. 1)
  443. enable_bbr
  444. bbr_menu
  445. ;;
  446. 2)
  447. disable_bbr
  448. bbr_menu
  449. ;;
  450. *)
  451. echo -e "${red}Invalid option. Please select a valid number.${plain}\n"
  452. bbr_menu
  453. ;;
  454. esac
  455. }
  456. disable_bbr() {
  457. if ! grep -q "net.core.default_qdisc=fq" /etc/sysctl.conf || ! grep -q "net.ipv4.tcp_congestion_control=bbr" /etc/sysctl.conf; then
  458. echo -e "${yellow}BBR is not currently enabled.${plain}"
  459. before_show_menu
  460. fi
  461. # Replace BBR with CUBIC configurations
  462. sed -i 's/net.core.default_qdisc=fq/net.core.default_qdisc=pfifo_fast/' /etc/sysctl.conf
  463. sed -i 's/net.ipv4.tcp_congestion_control=bbr/net.ipv4.tcp_congestion_control=cubic/' /etc/sysctl.conf
  464. # Apply changes
  465. sysctl -p
  466. # Verify that BBR is replaced with CUBIC
  467. if [[ $(sysctl net.ipv4.tcp_congestion_control | awk '{print $3}') == "cubic" ]]; then
  468. echo -e "${green}BBR has been replaced with CUBIC successfully.${plain}"
  469. else
  470. echo -e "${red}Failed to replace BBR with CUBIC. Please check your system configuration.${plain}"
  471. fi
  472. }
  473. enable_bbr() {
  474. if grep -q "net.core.default_qdisc=fq" /etc/sysctl.conf && grep -q "net.ipv4.tcp_congestion_control=bbr" /etc/sysctl.conf; then
  475. echo -e "${green}BBR is already enabled!${plain}"
  476. before_show_menu
  477. fi
  478. # Check the OS and install necessary packages
  479. case "${release}" in
  480. ubuntu | debian | armbian)
  481. apt-get update && apt-get install -yqq --no-install-recommends ca-certificates
  482. ;;
  483. centos | almalinux | rocky | ol)
  484. yum -y update && yum -y install ca-certificates
  485. ;;
  486. fedora | amzn)
  487. dnf -y update && dnf -y install ca-certificates
  488. ;;
  489. arch | manjaro | parch)
  490. pacman -Sy --noconfirm ca-certificates
  491. ;;
  492. *)
  493. echo -e "${red}Unsupported operating system. Please check the script and install the necessary packages manually.${plain}\n"
  494. exit 1
  495. ;;
  496. esac
  497. # Enable BBR
  498. echo "net.core.default_qdisc=fq" | tee -a /etc/sysctl.conf
  499. echo "net.ipv4.tcp_congestion_control=bbr" | tee -a /etc/sysctl.conf
  500. # Apply changes
  501. sysctl -p
  502. # Verify that BBR is enabled
  503. if [[ $(sysctl net.ipv4.tcp_congestion_control | awk '{print $3}') == "bbr" ]]; then
  504. echo -e "${green}BBR has been enabled successfully.${plain}"
  505. else
  506. echo -e "${red}Failed to enable BBR. Please check your system configuration.${plain}"
  507. fi
  508. }
  509. update_shell() {
  510. wget -O /usr/bin/x-ui -N --no-check-certificate https://github.com/MHSanaei/3x-ui/raw/main/x-ui.sh
  511. if [[ $? != 0 ]]; then
  512. echo ""
  513. LOGE "Failed to download script, Please check whether the machine can connect Github"
  514. before_show_menu
  515. else
  516. chmod +x /usr/bin/x-ui
  517. LOGI "Upgrade script succeeded, Please rerun the script"
  518. before_show_menu
  519. fi
  520. }
  521. # 0: running, 1: not running, 2: not installed
  522. check_status() {
  523. if [[ ! -f /etc/systemd/system/x-ui.service ]]; then
  524. return 2
  525. fi
  526. temp=$(systemctl status x-ui | grep Active | awk '{print $3}' | cut -d "(" -f2 | cut -d ")" -f1)
  527. if [[ "${temp}" == "running" ]]; then
  528. return 0
  529. else
  530. return 1
  531. fi
  532. }
  533. check_enabled() {
  534. temp=$(systemctl is-enabled x-ui)
  535. if [[ "${temp}" == "enabled" ]]; then
  536. return 0
  537. else
  538. return 1
  539. fi
  540. }
  541. check_uninstall() {
  542. check_status
  543. if [[ $? != 2 ]]; then
  544. echo ""
  545. LOGE "Panel installed, Please do not reinstall"
  546. if [[ $# == 0 ]]; then
  547. before_show_menu
  548. fi
  549. return 1
  550. else
  551. return 0
  552. fi
  553. }
  554. check_install() {
  555. check_status
  556. if [[ $? == 2 ]]; then
  557. echo ""
  558. LOGE "Please install the panel first"
  559. if [[ $# == 0 ]]; then
  560. before_show_menu
  561. fi
  562. return 1
  563. else
  564. return 0
  565. fi
  566. }
  567. show_status() {
  568. check_status
  569. case $? in
  570. 0)
  571. echo -e "Panel state: ${green}Running${plain}"
  572. show_enable_status
  573. ;;
  574. 1)
  575. echo -e "Panel state: ${yellow}Not Running${plain}"
  576. show_enable_status
  577. ;;
  578. 2)
  579. echo -e "Panel state: ${red}Not Installed${plain}"
  580. ;;
  581. esac
  582. show_xray_status
  583. }
  584. show_enable_status() {
  585. check_enabled
  586. if [[ $? == 0 ]]; then
  587. echo -e "Start automatically: ${green}Yes${plain}"
  588. else
  589. echo -e "Start automatically: ${red}No${plain}"
  590. fi
  591. }
  592. check_xray_status() {
  593. count=$(ps -ef | grep "xray-linux" | grep -v "grep" | wc -l)
  594. if [[ count -ne 0 ]]; then
  595. return 0
  596. else
  597. return 1
  598. fi
  599. }
  600. show_xray_status() {
  601. check_xray_status
  602. if [[ $? == 0 ]]; then
  603. echo -e "xray state: ${green}Running${plain}"
  604. else
  605. echo -e "xray state: ${red}Not Running${plain}"
  606. fi
  607. }
  608. firewall_menu() {
  609. echo -e "${green}\t1.${plain} Install Firewall & open ports"
  610. echo -e "${green}\t2.${plain} Allowed List"
  611. echo -e "${green}\t3.${plain} Delete Ports from List"
  612. echo -e "${green}\t4.${plain} Disable Firewall"
  613. echo -e "${green}\t0.${plain} Back to Main Menu"
  614. read -p "Choose an option: " choice
  615. case "$choice" in
  616. 0)
  617. show_menu
  618. ;;
  619. 1)
  620. open_ports
  621. firewall_menu
  622. ;;
  623. 2)
  624. sudo ufw status
  625. firewall_menu
  626. ;;
  627. 3)
  628. delete_ports
  629. firewall_menu
  630. ;;
  631. 4)
  632. sudo ufw disable
  633. firewall_menu
  634. ;;
  635. *)
  636. echo -e "${red}Invalid option. Please select a valid number.${plain}\n"
  637. firewall_menu
  638. ;;
  639. esac
  640. }
  641. open_ports() {
  642. if ! command -v ufw &>/dev/null; then
  643. echo "ufw firewall is not installed. Installing now..."
  644. apt-get update
  645. apt-get install -y ufw
  646. else
  647. echo "ufw firewall is already installed"
  648. fi
  649. # Check if the firewall is inactive
  650. if ufw status | grep -q "Status: active"; then
  651. echo "Firewall is already active"
  652. else
  653. echo "Activating firewall..."
  654. # Open the necessary ports
  655. ufw allow ssh
  656. ufw allow http
  657. ufw allow https
  658. ufw allow 2053/tcp
  659. # Enable the firewall
  660. ufw --force enable
  661. fi
  662. # Prompt the user to enter a list of ports
  663. read -p "Enter the ports you want to open (e.g. 80,443,2053 or range 400-500): " ports
  664. # Check if the input is valid
  665. if ! [[ $ports =~ ^([0-9]+|[0-9]+-[0-9]+)(,([0-9]+|[0-9]+-[0-9]+))*$ ]]; then
  666. echo "Error: Invalid input. Please enter a comma-separated list of ports or a range of ports (e.g. 80,443,2053 or 400-500)." >&2
  667. exit 1
  668. fi
  669. # Open the specified ports using ufw
  670. IFS=',' read -ra PORT_LIST <<<"$ports"
  671. for port in "${PORT_LIST[@]}"; do
  672. if [[ $port == *-* ]]; then
  673. # Split the range into start and end ports
  674. start_port=$(echo $port | cut -d'-' -f1)
  675. end_port=$(echo $port | cut -d'-' -f2)
  676. ufw allow $start_port:$end_port/tcp
  677. ufw allow $start_port:$end_port/udp
  678. else
  679. ufw allow "$port"
  680. fi
  681. done
  682. # Confirm that the ports are open
  683. echo "The following ports are now open:"
  684. ufw status | grep "ALLOW" | grep -Eo "[0-9]+(/[a-z]+)?"
  685. echo "Firewall status:"
  686. ufw status verbose
  687. }
  688. delete_ports() {
  689. # Prompt the user to enter the ports they want to delete
  690. read -p "Enter the ports you want to delete (e.g. 80,443,2053 or range 400-500): " ports
  691. # Check if the input is valid
  692. if ! [[ $ports =~ ^([0-9]+|[0-9]+-[0-9]+)(,([0-9]+|[0-9]+-[0-9]+))*$ ]]; then
  693. echo "Error: Invalid input. Please enter a comma-separated list of ports or a range of ports (e.g. 80,443,2053 or 400-500)." >&2
  694. exit 1
  695. fi
  696. # Delete the specified ports using ufw
  697. IFS=',' read -ra PORT_LIST <<<"$ports"
  698. for port in "${PORT_LIST[@]}"; do
  699. if [[ $port == *-* ]]; then
  700. # Split the range into start and end ports
  701. start_port=$(echo $port | cut -d'-' -f1)
  702. end_port=$(echo $port | cut -d'-' -f2)
  703. # Delete the port range
  704. ufw delete allow $start_port:$end_port/tcp
  705. ufw delete allow $start_port:$end_port/udp
  706. else
  707. ufw delete allow "$port"
  708. fi
  709. done
  710. # Confirm that the ports are deleted
  711. echo "Deleted the specified ports:"
  712. for port in "${PORT_LIST[@]}"; do
  713. if [[ $port == *-* ]]; then
  714. start_port=$(echo $port | cut -d'-' -f1)
  715. end_port=$(echo $port | cut -d'-' -f2)
  716. # Check if the port range has been successfully deleted
  717. (ufw status | grep -q "$start_port:$end_port") || echo "$start_port-$end_port"
  718. else
  719. # Check if the individual port has been successfully deleted
  720. (ufw status | grep -q "$port") || echo "$port"
  721. fi
  722. done
  723. }
  724. update_geo() {
  725. echo -e "${green}\t1.${plain} Loyalsoldier (geoip.dat, geosite.dat)"
  726. echo -e "${green}\t2.${plain} chocolate4u (geoip_IR.dat, geosite_IR.dat)"
  727. echo -e "${green}\t3.${plain} vuong2023 (geoip_VN.dat, geosite_VN.dat)"
  728. echo -e "${green}\t0.${plain} Back to Main Menu"
  729. read -p "Choose an option: " choice
  730. cd /usr/local/x-ui/bin
  731. case "$choice" in
  732. 0)
  733. show_menu
  734. ;;
  735. 1)
  736. systemctl stop x-ui
  737. rm -f geoip.dat geosite.dat
  738. wget -N https://github.com/Loyalsoldier/v2ray-rules-dat/releases/latest/download/geoip.dat
  739. wget -N https://github.com/Loyalsoldier/v2ray-rules-dat/releases/latest/download/geosite.dat
  740. echo -e "${green}Loyalsoldier datasets have been updated successfully!${plain}"
  741. restart
  742. ;;
  743. 2)
  744. systemctl stop x-ui
  745. rm -f geoip_IR.dat geosite_IR.dat
  746. wget -O geoip_IR.dat -N https://github.com/chocolate4u/Iran-v2ray-rules/releases/latest/download/geoip.dat
  747. wget -O geosite_IR.dat -N https://github.com/chocolate4u/Iran-v2ray-rules/releases/latest/download/geosite.dat
  748. echo -e "${green}chocolate4u datasets have been updated successfully!${plain}"
  749. restart
  750. ;;
  751. 3)
  752. systemctl stop x-ui
  753. rm -f geoip_VN.dat geosite_VN.dat
  754. wget -O geoip_VN.dat -N https://github.com/vuong2023/vn-v2ray-rules/releases/latest/download/geoip.dat
  755. wget -O geosite_VN.dat -N https://github.com/vuong2023/vn-v2ray-rules/releases/latest/download/geosite.dat
  756. echo -e "${green}vuong2023 datasets have been updated successfully!${plain}"
  757. restart
  758. ;;
  759. *)
  760. echo -e "${red}Invalid option. Please select a valid number.${plain}\n"
  761. update_geo
  762. ;;
  763. esac
  764. before_show_menu
  765. }
  766. install_acme() {
  767. # Check if acme.sh is already installed
  768. if command -v ~/.acme.sh/acme.sh &>/dev/null; then
  769. LOGI "acme.sh is already installed."
  770. return 0
  771. fi
  772. LOGI "Installing acme.sh..."
  773. cd ~ || return 1 # Ensure you can change to the home directory
  774. curl -s https://get.acme.sh | sh
  775. if [ $? -ne 0 ]; then
  776. LOGE "Installation of acme.sh failed."
  777. return 1
  778. else
  779. LOGI "Installation of acme.sh succeeded."
  780. fi
  781. return 0
  782. }
  783. ssl_cert_issue_main() {
  784. echo -e "${green}\t1.${plain} Get SSL"
  785. echo -e "${green}\t2.${plain} Revoke"
  786. echo -e "${green}\t3.${plain} Force Renew"
  787. echo -e "${green}\t4.${plain} Show Existing Domains"
  788. echo -e "${green}\t5.${plain} Set Cert paths for the panel"
  789. echo -e "${green}\t0.${plain} Back to Main Menu"
  790. read -p "Choose an option: " choice
  791. case "$choice" in
  792. 0)
  793. show_menu
  794. ;;
  795. 1)
  796. ssl_cert_issue
  797. ssl_cert_issue_main
  798. ;;
  799. 2)
  800. local domains=$(find /root/cert/ -mindepth 1 -maxdepth 1 -type d -exec basename {} \;)
  801. if [ -z "$domains" ]; then
  802. echo "No certificates found to revoke."
  803. else
  804. echo "Existing domains:"
  805. echo "$domains"
  806. read -p "Please enter a domain from the list to revoke the certificate: " domain
  807. if echo "$domains" | grep -qw "$domain"; then
  808. ~/.acme.sh/acme.sh --revoke -d ${domain}
  809. LOGI "Certificate revoked for domain: $domain"
  810. else
  811. echo "Invalid domain entered."
  812. fi
  813. fi
  814. ssl_cert_issue_main
  815. ;;
  816. 3)
  817. local domains=$(find /root/cert/ -mindepth 1 -maxdepth 1 -type d -exec basename {} \;)
  818. if [ -z "$domains" ]; then
  819. echo "No certificates found to renew."
  820. else
  821. echo "Existing domains:"
  822. echo "$domains"
  823. read -p "Please enter a domain from the list to renew the SSL certificate: " domain
  824. if echo "$domains" | grep -qw "$domain"; then
  825. ~/.acme.sh/acme.sh --renew -d ${domain} --force
  826. LOGI "Certificate forcefully renewed for domain: $domain"
  827. else
  828. echo "Invalid domain entered."
  829. fi
  830. fi
  831. ssl_cert_issue_main
  832. ;;
  833. 4)
  834. local domains=$(find /root/cert/ -mindepth 1 -maxdepth 1 -type d -exec basename {} \;)
  835. if [ -z "$domains" ]; then
  836. echo "No certificates found."
  837. else
  838. echo "Existing domains and their paths:"
  839. for domain in $domains; do
  840. local cert_path="/root/cert/${domain}/fullchain.pem"
  841. local key_path="/root/cert/${domain}/privkey.pem"
  842. if [[ -f "${cert_path}" && -f "${key_path}" ]]; then
  843. echo -e "Domain: ${domain}"
  844. echo -e "\tCertificate Path: ${cert_path}"
  845. echo -e "\tPrivate Key Path: ${key_path}"
  846. else
  847. echo -e "Domain: ${domain} - Certificate or Key missing."
  848. fi
  849. done
  850. fi
  851. ssl_cert_issue_main
  852. ;;
  853. 5)
  854. local domains=$(find /root/cert/ -mindepth 1 -maxdepth 1 -type d -exec basename {} \;)
  855. if [ -z "$domains" ]; then
  856. echo "No certificates found."
  857. else
  858. echo "Available domains:"
  859. echo "$domains"
  860. read -p "Please choose a domain to set the panel paths: " domain
  861. if echo "$domains" | grep -qw "$domain"; then
  862. local webCertFile="/root/cert/${domain}/fullchain.pem"
  863. local webKeyFile="/root/cert/${domain}/privkey.pem"
  864. if [[ -f "${webCertFile}" && -f "${webKeyFile}" ]]; then
  865. /usr/local/x-ui/x-ui cert -webCert "$webCertFile" -webCertKey "$webKeyFile"
  866. echo "Panel paths set for domain: $domain"
  867. echo " - Certificate File: $webCertFile"
  868. echo " - Private Key File: $webKeyFile"
  869. restart
  870. else
  871. echo "Certificate or private key not found for domain: $domain."
  872. fi
  873. else
  874. echo "Invalid domain entered."
  875. fi
  876. fi
  877. ssl_cert_issue_main
  878. ;;
  879. *)
  880. echo -e "${red}Invalid option. Please select a valid number.${plain}\n"
  881. ssl_cert_issue_main
  882. ;;
  883. esac
  884. }
  885. ssl_cert_issue() {
  886. local existing_webBasePath=$(/usr/local/x-ui/x-ui setting -show true | grep -Eo 'webBasePath: .+' | awk '{print $2}')
  887. local existing_port=$(/usr/local/x-ui/x-ui setting -show true | grep -Eo 'port: .+' | awk '{print $2}')
  888. # check for acme.sh first
  889. if ! command -v ~/.acme.sh/acme.sh &>/dev/null; then
  890. echo "acme.sh could not be found. we will install it"
  891. install_acme
  892. if [ $? -ne 0 ]; then
  893. LOGE "install acme failed, please check logs"
  894. exit 1
  895. fi
  896. fi
  897. # install socat second
  898. case "${release}" in
  899. ubuntu | debian | armbian)
  900. apt update && apt install socat -y
  901. ;;
  902. centos | almalinux | rocky | ol)
  903. yum -y update && yum -y install socat
  904. ;;
  905. fedora | amzn)
  906. dnf -y update && dnf -y install socat
  907. ;;
  908. arch | manjaro | parch)
  909. pacman -Sy --noconfirm socat
  910. ;;
  911. *)
  912. echo -e "${red}Unsupported operating system. Please check the script and install the necessary packages manually.${plain}\n"
  913. exit 1
  914. ;;
  915. esac
  916. if [ $? -ne 0 ]; then
  917. LOGE "install socat failed, please check logs"
  918. exit 1
  919. else
  920. LOGI "install socat succeed..."
  921. fi
  922. # get the domain here, and we need to verify it
  923. local domain=""
  924. read -p "Please enter your domain name: " domain
  925. LOGD "Your domain is: ${domain}, checking it..."
  926. # check if there already exists a certificate
  927. local currentCert=$(~/.acme.sh/acme.sh --list | tail -1 | awk '{print $1}')
  928. if [ "${currentCert}" == "${domain}" ]; then
  929. local certInfo=$(~/.acme.sh/acme.sh --list)
  930. LOGE "System already has certificates for this domain. Cannot issue again. Current certificate details:"
  931. LOGI "$certInfo"
  932. exit 1
  933. else
  934. LOGI "Your domain is ready for issuing certificates now..."
  935. fi
  936. # create a directory for the certificate
  937. certPath="/root/cert/${domain}"
  938. if [ ! -d "$certPath" ]; then
  939. mkdir -p "$certPath"
  940. else
  941. rm -rf "$certPath"
  942. mkdir -p "$certPath"
  943. fi
  944. # get the port number for the standalone server
  945. local WebPort=80
  946. read -p "Please choose which port to use (default is 80): " WebPort
  947. if [[ ${WebPort} -gt 65535 || ${WebPort} -lt 1 ]]; then
  948. LOGE "Your input ${WebPort} is invalid, will use default port 80."
  949. WebPort=80
  950. fi
  951. LOGI "Will use port: ${WebPort} to issue certificates. Please make sure this port is open."
  952. # issue the certificate
  953. ~/.acme.sh/acme.sh --set-default-ca --server letsencrypt
  954. ~/.acme.sh/acme.sh --issue -d ${domain} --listen-v6 --standalone --httpport ${WebPort}
  955. if [ $? -ne 0 ]; then
  956. LOGE "Issuing certificate failed, please check logs."
  957. rm -rf ~/.acme.sh/${domain}
  958. exit 1
  959. else
  960. LOGE "Issuing certificate succeeded, installing certificates..."
  961. fi
  962. # install the certificate
  963. ~/.acme.sh/acme.sh --installcert -d ${domain} \
  964. --key-file /root/cert/${domain}/privkey.pem \
  965. --fullchain-file /root/cert/${domain}/fullchain.pem
  966. if [ $? -ne 0 ]; then
  967. LOGE "Installing certificate failed, exiting."
  968. rm -rf ~/.acme.sh/${domain}
  969. exit 1
  970. else
  971. LOGI "Installing certificate succeeded, enabling auto renew..."
  972. fi
  973. # enable auto-renew
  974. ~/.acme.sh/acme.sh --upgrade --auto-upgrade
  975. if [ $? -ne 0 ]; then
  976. LOGE "Auto renew failed, certificate details:"
  977. ls -lah cert/*
  978. chmod 755 $certPath/*
  979. exit 1
  980. else
  981. LOGI "Auto renew succeeded, certificate details:"
  982. ls -lah cert/*
  983. chmod 755 $certPath/*
  984. fi
  985. # Prompt user to set panel paths after successful certificate installation
  986. read -p "Would you like to set this certificate for the panel? (y/n): " setPanel
  987. if [[ "$setPanel" == "y" || "$setPanel" == "Y" ]]; then
  988. local webCertFile="/root/cert/${domain}/fullchain.pem"
  989. local webKeyFile="/root/cert/${domain}/privkey.pem"
  990. if [[ -f "$webCertFile" && -f "$webKeyFile" ]]; then
  991. /usr/local/x-ui/x-ui cert -webCert "$webCertFile" -webCertKey "$webKeyFile"
  992. LOGI "Panel paths set for domain: $domain"
  993. LOGI " - Certificate File: $webCertFile"
  994. LOGI " - Private Key File: $webKeyFile"
  995. echo -e "${green}Access URL: https://${domain}:${existing_port}${existing_webBasePath}${plain}"
  996. restart
  997. else
  998. LOGE "Error: Certificate or private key file not found for domain: $domain."
  999. fi
  1000. else
  1001. LOGI "Skipping panel path setting."
  1002. fi
  1003. }
  1004. ssl_cert_issue_CF() {
  1005. local existing_webBasePath=$(/usr/local/x-ui/x-ui setting -show true | grep -Eo 'webBasePath: .+' | awk '{print $2}')
  1006. local existing_port=$(/usr/local/x-ui/x-ui setting -show true | grep -Eo 'port: .+' | awk '{print $2}')
  1007. LOGI "****** Instructions for Use ******"
  1008. LOGI "Follow the steps below to complete the process:"
  1009. LOGI "1. Cloudflare Registered E-mail."
  1010. LOGI "2. Cloudflare Global API Key."
  1011. LOGI "3. The Domain Name."
  1012. LOGI "4. Once the certificate is issued, you will be prompted to set the certificate for the panel (optional)."
  1013. LOGI "5. The script also supports automatic renewal of the SSL certificate after installation."
  1014. confirm "Do you confirm the information and wish to proceed? [y/n]" "y"
  1015. if [ $? -eq 0 ]; then
  1016. # Check for acme.sh first
  1017. if ! command -v ~/.acme.sh/acme.sh &>/dev/null; then
  1018. echo "acme.sh could not be found. We will install it."
  1019. install_acme
  1020. if [ $? -ne 0 ]; then
  1021. LOGE "Install acme failed, please check logs."
  1022. exit 1
  1023. fi
  1024. fi
  1025. CF_Domain=""
  1026. certPath="/root/cert-CF"
  1027. if [ ! -d "$certPath" ]; then
  1028. mkdir -p $certPath
  1029. else
  1030. rm -rf $certPath
  1031. mkdir -p $certPath
  1032. fi
  1033. LOGD "Please set a domain name:"
  1034. read -p "Input your domain here: " CF_Domain
  1035. LOGD "Your domain name is set to: ${CF_Domain}"
  1036. # Set up Cloudflare API details
  1037. CF_GlobalKey=""
  1038. CF_AccountEmail=""
  1039. LOGD "Please set the API key:"
  1040. read -p "Input your key here: " CF_GlobalKey
  1041. LOGD "Your API key is: ${CF_GlobalKey}"
  1042. LOGD "Please set up registered email:"
  1043. read -p "Input your email here: " CF_AccountEmail
  1044. LOGD "Your registered email address is: ${CF_AccountEmail}"
  1045. # Set the default CA to Let's Encrypt
  1046. ~/.acme.sh/acme.sh --set-default-ca --server letsencrypt
  1047. if [ $? -ne 0 ]; then
  1048. LOGE "Default CA, Let'sEncrypt fail, script exiting..."
  1049. exit 1
  1050. fi
  1051. export CF_Key="${CF_GlobalKey}"
  1052. export CF_Email="${CF_AccountEmail}"
  1053. # Issue the certificate using Cloudflare DNS
  1054. ~/.acme.sh/acme.sh --issue --dns dns_cf -d ${CF_Domain} -d *.${CF_Domain} --log
  1055. if [ $? -ne 0 ]; then
  1056. LOGE "Certificate issuance failed, script exiting..."
  1057. exit 1
  1058. else
  1059. LOGI "Certificate issued successfully, Installing..."
  1060. fi
  1061. # Install the certificate
  1062. mkdir -p ${certPath}/${CF_Domain}
  1063. if [ $? -ne 0 ]; then
  1064. LOGE "Failed to create directory: ${certPath}/${CF_Domain}"
  1065. exit 1
  1066. fi
  1067. ~/.acme.sh/acme.sh --installcert -d ${CF_Domain} -d *.${CF_Domain} \
  1068. --fullchain-file ${certPath}/${CF_Domain}/fullchain.pem \
  1069. --key-file ${certPath}/${CF_Domain}/privkey.pem
  1070. if [ $? -ne 0 ]; then
  1071. LOGE "Certificate installation failed, script exiting..."
  1072. exit 1
  1073. else
  1074. LOGI "Certificate installed successfully, Turning on automatic updates..."
  1075. fi
  1076. # Enable auto-update
  1077. ~/.acme.sh/acme.sh --upgrade --auto-upgrade
  1078. if [ $? -ne 0 ]; then
  1079. LOGE "Auto update setup failed, script exiting..."
  1080. exit 1
  1081. else
  1082. LOGI "The certificate is installed and auto-renewal is turned on. Specific information is as follows:"
  1083. ls -lah ${certPath}/${CF_Domain}
  1084. chmod 755 ${certPath}/${CF_Domain}
  1085. fi
  1086. # Prompt user to set panel paths after successful certificate installation
  1087. read -p "Would you like to set this certificate for the panel? (y/n): " setPanel
  1088. if [[ "$setPanel" == "y" || "$setPanel" == "Y" ]]; then
  1089. local webCertFile="${certPath}/${CF_Domain}/fullchain.pem"
  1090. local webKeyFile="${certPath}/${CF_Domain}/privkey.pem"
  1091. if [[ -f "$webCertFile" && -f "$webKeyFile" ]]; then
  1092. /usr/local/x-ui/x-ui cert -webCert "$webCertFile" -webCertKey "$webKeyFile"
  1093. LOGI "Panel paths set for domain: $CF_Domain"
  1094. LOGI " - Certificate File: $webCertFile"
  1095. LOGI " - Private Key File: $webKeyFile"
  1096. echo -e "${green}Access URL: https://${CF_Domain}:${existing_port}${existing_webBasePath}${plain}"
  1097. restart
  1098. else
  1099. LOGE "Error: Certificate or private key file not found for domain: $CF_Domain."
  1100. fi
  1101. else
  1102. LOGI "Skipping panel path setting."
  1103. fi
  1104. else
  1105. show_menu
  1106. fi
  1107. }
  1108. run_speedtest() {
  1109. # Check if Speedtest is already installed
  1110. if ! command -v speedtest &>/dev/null; then
  1111. # If not installed, determine installation method
  1112. if command -v snap &>/dev/null; then
  1113. # Use snap to install Speedtest
  1114. echo "Installing Speedtest using snap..."
  1115. snap install speedtest
  1116. else
  1117. # Fallback to using package managers
  1118. local pkg_manager=""
  1119. local speedtest_install_script=""
  1120. if command -v dnf &>/dev/null; then
  1121. pkg_manager="dnf"
  1122. speedtest_install_script="https://packagecloud.io/install/repositories/ookla/speedtest-cli/script.rpm.sh"
  1123. elif command -v yum &>/dev/null; then
  1124. pkg_manager="yum"
  1125. speedtest_install_script="https://packagecloud.io/install/repositories/ookla/speedtest-cli/script.rpm.sh"
  1126. elif command -v apt-get &>/dev/null; then
  1127. pkg_manager="apt-get"
  1128. speedtest_install_script="https://packagecloud.io/install/repositories/ookla/speedtest-cli/script.deb.sh"
  1129. elif command -v apt &>/dev/null; then
  1130. pkg_manager="apt"
  1131. speedtest_install_script="https://packagecloud.io/install/repositories/ookla/speedtest-cli/script.deb.sh"
  1132. fi
  1133. if [[ -z $pkg_manager ]]; then
  1134. echo "Error: Package manager not found. You may need to install Speedtest manually."
  1135. return 1
  1136. else
  1137. echo "Installing Speedtest using $pkg_manager..."
  1138. curl -s $speedtest_install_script | bash
  1139. $pkg_manager install -y speedtest
  1140. fi
  1141. fi
  1142. fi
  1143. speedtest
  1144. }
  1145. create_iplimit_jails() {
  1146. # Use default bantime if not passed => 15 minutes
  1147. local bantime="${1:-15}"
  1148. # Uncomment 'allowipv6 = auto' in fail2ban.conf
  1149. sed -i 's/#allowipv6 = auto/allowipv6 = auto/g' /etc/fail2ban/fail2ban.conf
  1150. # On Debian 12+ fail2ban's default backend should be changed to systemd
  1151. if [[ "${release}" == "debian" && ${os_version} -ge 12 ]]; then
  1152. sed -i '0,/action =/s/backend = auto/backend = systemd/' /etc/fail2ban/jail.conf
  1153. fi
  1154. cat << EOF > /etc/fail2ban/jail.d/3x-ipl.conf
  1155. [3x-ipl]
  1156. enabled=true
  1157. backend=auto
  1158. filter=3x-ipl
  1159. action=3x-ipl
  1160. logpath=${iplimit_log_path}
  1161. maxretry=2
  1162. findtime=32
  1163. bantime=${bantime}m
  1164. EOF
  1165. cat << EOF > /etc/fail2ban/filter.d/3x-ipl.conf
  1166. [Definition]
  1167. datepattern = ^%%Y/%%m/%%d %%H:%%M:%%S
  1168. failregex = \[LIMIT_IP\]\s*Email\s*=\s*<F-USER>.+</F-USER>\s*\|\|\s*SRC\s*=\s*<ADDR>
  1169. ignoreregex =
  1170. EOF
  1171. cat << EOF > /etc/fail2ban/action.d/3x-ipl.conf
  1172. [INCLUDES]
  1173. before = iptables-common.conf
  1174. [Definition]
  1175. actionstart = <iptables> -N f2b-<name>
  1176. <iptables> -A f2b-<name> -j <returntype>
  1177. <iptables> -I <chain> -p <protocol> -j f2b-<name>
  1178. actionstop = <iptables> -D <chain> -p <protocol> -j f2b-<name>
  1179. <actionflush>
  1180. <iptables> -X f2b-<name>
  1181. actioncheck = <iptables> -n -L <chain> | grep -q 'f2b-<name>[ \t]'
  1182. actionban = <iptables> -I f2b-<name> 1 -s <ip> -j <blocktype>
  1183. echo "\$(date +"%%Y/%%m/%%d %%H:%%M:%%S") BAN [Email] = <F-USER> [IP] = <ip> banned for <bantime> seconds." >> ${iplimit_banned_log_path}
  1184. actionunban = <iptables> -D f2b-<name> -s <ip> -j <blocktype>
  1185. echo "\$(date +"%%Y/%%m/%%d %%H:%%M:%%S") UNBAN [Email] = <F-USER> [IP] = <ip> unbanned." >> ${iplimit_banned_log_path}
  1186. [Init]
  1187. name = default
  1188. protocol = tcp
  1189. chain = INPUT
  1190. EOF
  1191. echo -e "${green}Ip Limit jail files created with a bantime of ${bantime} minutes.${plain}"
  1192. }
  1193. iplimit_remove_conflicts() {
  1194. local jail_files=(
  1195. /etc/fail2ban/jail.conf
  1196. /etc/fail2ban/jail.local
  1197. )
  1198. for file in "${jail_files[@]}"; do
  1199. # Check for [3x-ipl] config in jail file then remove it
  1200. if test -f "${file}" && grep -qw '3x-ipl' ${file}; then
  1201. sed -i "/\[3x-ipl\]/,/^$/d" ${file}
  1202. echo -e "${yellow}Removing conflicts of [3x-ipl] in jail (${file})!${plain}\n"
  1203. fi
  1204. done
  1205. }
  1206. iplimit_main() {
  1207. echo -e "\n${green}\t1.${plain} Install Fail2ban and configure IP Limit"
  1208. echo -e "${green}\t2.${plain} Change Ban Duration"
  1209. echo -e "${green}\t3.${plain} Unban Everyone"
  1210. echo -e "${green}\t4.${plain} Ban Logs"
  1211. echo -e "${green}\t5.${plain} Real-Time Logs"
  1212. echo -e "${green}\t6.${plain} Service Status"
  1213. echo -e "${green}\t7.${plain} Service Restart"
  1214. echo -e "${green}\t8.${plain} Uninstall Fail2ban and IP Limit"
  1215. echo -e "${green}\t0.${plain} Back to Main Menu"
  1216. read -p "Choose an option: " choice
  1217. case "$choice" in
  1218. 0)
  1219. show_menu
  1220. ;;
  1221. 1)
  1222. confirm "Proceed with installation of Fail2ban & IP Limit?" "y"
  1223. if [[ $? == 0 ]]; then
  1224. install_iplimit
  1225. else
  1226. iplimit_main
  1227. fi
  1228. ;;
  1229. 2)
  1230. read -rp "Please enter new Ban Duration in Minutes [default 30]: " NUM
  1231. if [[ $NUM =~ ^[0-9]+$ ]]; then
  1232. create_iplimit_jails ${NUM}
  1233. systemctl restart fail2ban
  1234. else
  1235. echo -e "${red}${NUM} is not a number! Please, try again.${plain}"
  1236. fi
  1237. iplimit_main
  1238. ;;
  1239. 3)
  1240. confirm "Proceed with Unbanning everyone from IP Limit jail?" "y"
  1241. if [[ $? == 0 ]]; then
  1242. fail2ban-client reload --restart --unban 3x-ipl
  1243. truncate -s 0 "${iplimit_banned_log_path}"
  1244. echo -e "${green}All users Unbanned successfully.${plain}"
  1245. iplimit_main
  1246. else
  1247. echo -e "${yellow}Cancelled.${plain}"
  1248. fi
  1249. iplimit_main
  1250. ;;
  1251. 4)
  1252. show_banlog
  1253. iplimit_main
  1254. ;;
  1255. 5)
  1256. tail -f /var/log/fail2ban.log
  1257. iplimit_main
  1258. ;;
  1259. 6)
  1260. service fail2ban status
  1261. iplimit_main
  1262. ;;
  1263. 7)
  1264. systemctl restart fail2ban
  1265. iplimit_main
  1266. ;;
  1267. 8)
  1268. remove_iplimit
  1269. iplimit_main
  1270. ;;
  1271. *)
  1272. echo -e "${red}Invalid option. Please select a valid number.${plain}\n"
  1273. iplimit_main
  1274. ;;
  1275. esac
  1276. }
  1277. install_iplimit() {
  1278. if ! command -v fail2ban-client &>/dev/null; then
  1279. echo -e "${green}Fail2ban is not installed. Installing now...!${plain}\n"
  1280. # Check the OS and install necessary packages
  1281. case "${release}" in
  1282. ubuntu)
  1283. if [[ "${os_version}" -ge 24 ]]; then
  1284. apt update && apt install python3-pip -y
  1285. python3 -m pip install pyasynchat --break-system-packages
  1286. fi
  1287. apt update && apt install fail2ban -y
  1288. ;;
  1289. debian | armbian)
  1290. apt update && apt install fail2ban -y
  1291. ;;
  1292. centos | almalinux | rocky | ol)
  1293. yum update -y && yum install epel-release -y
  1294. yum -y install fail2ban
  1295. ;;
  1296. fedora | amzn)
  1297. dnf -y update && dnf -y install fail2ban
  1298. ;;
  1299. arch | manjaro | parch)
  1300. pacman -Syu --noconfirm fail2ban
  1301. ;;
  1302. *)
  1303. echo -e "${red}Unsupported operating system. Please check the script and install the necessary packages manually.${plain}\n"
  1304. exit 1
  1305. ;;
  1306. esac
  1307. if ! command -v fail2ban-client &>/dev/null; then
  1308. echo -e "${red}Fail2ban installation failed.${plain}\n"
  1309. exit 1
  1310. fi
  1311. echo -e "${green}Fail2ban installed successfully!${plain}\n"
  1312. else
  1313. echo -e "${yellow}Fail2ban is already installed.${plain}\n"
  1314. fi
  1315. echo -e "${green}Configuring IP Limit...${plain}\n"
  1316. # make sure there's no conflict for jail files
  1317. iplimit_remove_conflicts
  1318. # Check if log file exists
  1319. if ! test -f "${iplimit_banned_log_path}"; then
  1320. touch ${iplimit_banned_log_path}
  1321. fi
  1322. # Check if service log file exists so fail2ban won't return error
  1323. if ! test -f "${iplimit_log_path}"; then
  1324. touch ${iplimit_log_path}
  1325. fi
  1326. # Create the iplimit jail files
  1327. # we didn't pass the bantime here to use the default value
  1328. create_iplimit_jails
  1329. # Launching fail2ban
  1330. if ! systemctl is-active --quiet fail2ban; then
  1331. systemctl start fail2ban
  1332. systemctl enable fail2ban
  1333. else
  1334. systemctl restart fail2ban
  1335. fi
  1336. systemctl enable fail2ban
  1337. echo -e "${green}IP Limit installed and configured successfully!${plain}\n"
  1338. before_show_menu
  1339. }
  1340. remove_iplimit() {
  1341. echo -e "${green}\t1.${plain} Only remove IP Limit configurations"
  1342. echo -e "${green}\t2.${plain} Uninstall Fail2ban and IP Limit"
  1343. echo -e "${green}\t0.${plain} Back to Main Menu"
  1344. read -p "Choose an option: " num
  1345. case "$num" in
  1346. 1)
  1347. rm -f /etc/fail2ban/filter.d/3x-ipl.conf
  1348. rm -f /etc/fail2ban/action.d/3x-ipl.conf
  1349. rm -f /etc/fail2ban/jail.d/3x-ipl.conf
  1350. systemctl restart fail2ban
  1351. echo -e "${green}IP Limit removed successfully!${plain}\n"
  1352. before_show_menu
  1353. ;;
  1354. 2)
  1355. rm -rf /etc/fail2ban
  1356. systemctl stop fail2ban
  1357. case "${release}" in
  1358. ubuntu | debian | armbian)
  1359. apt-get remove -y fail2ban
  1360. apt-get purge -y fail2ban -y
  1361. apt-get autoremove -y
  1362. ;;
  1363. centos | almalinux | rocky | ol)
  1364. yum remove fail2ban -y
  1365. yum autoremove -y
  1366. ;;
  1367. fedora | amzn)
  1368. dnf remove fail2ban -y
  1369. dnf autoremove -y
  1370. ;;
  1371. arch | manjaro | parch)
  1372. pacman -Rns --noconfirm fail2ban
  1373. ;;
  1374. *)
  1375. echo -e "${red}Unsupported operating system. Please uninstall Fail2ban manually.${plain}\n"
  1376. exit 1
  1377. ;;
  1378. esac
  1379. echo -e "${green}Fail2ban and IP Limit removed successfully!${plain}\n"
  1380. before_show_menu
  1381. ;;
  1382. 0)
  1383. show_menu
  1384. ;;
  1385. *)
  1386. echo -e "${red}Invalid option. Please select a valid number.${plain}\n"
  1387. remove_iplimit
  1388. ;;
  1389. esac
  1390. }
  1391. SSH_port_forwarding() {
  1392. local server_ip=$(curl -s https://api.ipify.org)
  1393. local existing_webBasePath=$(/usr/local/x-ui/x-ui setting -show true | grep -Eo 'webBasePath: .+' | awk '{print $2}')
  1394. local existing_port=$(/usr/local/x-ui/x-ui setting -show true | grep -Eo 'port: .+' | awk '{print $2}')
  1395. local existing_listenIP=$(/usr/local/x-ui/x-ui setting -getListen true | grep -Eo 'listenIP: .+' | awk '{print $2}')
  1396. local existing_cert=$(/usr/local/x-ui/x-ui setting -getCert true | grep -Eo 'cert: .+' | awk '{print $2}')
  1397. local existing_key=$(/usr/local/x-ui/x-ui setting -getCert true | grep -Eo 'key: .+' | awk '{print $2}')
  1398. local config_listenIP=""
  1399. local listen_choice=""
  1400. if [[ -n "$existing_cert" && -n "$existing_key" ]]; then
  1401. echo -e "${green}Panel is secure with SSL.${plain}"
  1402. before_show_menu
  1403. fi
  1404. if [[ -z "$existing_cert" && -z "$existing_key" && (-z "$existing_listenIP" || "$existing_listenIP" == "0.0.0.0") ]]; then
  1405. echo -e "\n${red}Warning: No Cert and Key found! The panel is not secure.${plain}"
  1406. echo "Please obtain a certificate or set up SSH port forwarding."
  1407. fi
  1408. if [[ -n "$existing_listenIP" && "$existing_listenIP" != "0.0.0.0" && (-z "$existing_cert" && -z "$existing_key") ]]; then
  1409. echo -e "\n${green}Current SSH Port Forwarding Configuration:${plain}"
  1410. echo -e "Standard SSH command:"
  1411. echo -e "${yellow}ssh -L 2222:${existing_listenIP}:${existing_port} root@${server_ip}${plain}"
  1412. echo -e "\nIf using SSH key:"
  1413. echo -e "${yellow}ssh -i <sshkeypath> -L 2222:${existing_listenIP}:${existing_port} root@${server_ip}${plain}"
  1414. echo -e "\nAfter connecting, access the panel at:"
  1415. echo -e "${yellow}http://localhost:2222${existing_webBasePath}${plain}"
  1416. fi
  1417. echo -e "\nChoose an option:"
  1418. echo -e "${green}1.${plain} Set listen IP"
  1419. echo -e "${green}2.${plain} Clear listen IP"
  1420. echo -e "${green}0.${plain} Back to Main Menu"
  1421. read -p "Choose an option: " num
  1422. case "$num" in
  1423. 1)
  1424. if [[ -z "$existing_listenIP" || "$existing_listenIP" == "0.0.0.0" ]]; then
  1425. echo -e "\nNo listenIP configured. Choose an option:"
  1426. echo -e "1. Use default IP (127.0.0.1)"
  1427. echo -e "2. Set a custom IP"
  1428. read -p "Select an option (1 or 2): " listen_choice
  1429. config_listenIP="127.0.0.1"
  1430. [[ "$listen_choice" == "2" ]] && read -p "Enter custom IP to listen on: " config_listenIP
  1431. /usr/local/x-ui/x-ui setting -listenIP "${config_listenIP}" >/dev/null 2>&1
  1432. echo -e "${green}listen IP has been set to ${config_listenIP}.${plain}"
  1433. echo -e "\n${green}SSH Port Forwarding Configuration:${plain}"
  1434. echo -e "Standard SSH command:"
  1435. echo -e "${yellow}ssh -L 2222:${config_listenIP}:${existing_port} root@${server_ip}${plain}"
  1436. echo -e "\nIf using SSH key:"
  1437. echo -e "${yellow}ssh -i <sshkeypath> -L 2222:${config_listenIP}:${existing_port} root@${server_ip}${plain}"
  1438. echo -e "\nAfter connecting, access the panel at:"
  1439. echo -e "${yellow}http://localhost:2222${existing_webBasePath}${plain}"
  1440. restart
  1441. else
  1442. config_listenIP="${existing_listenIP}"
  1443. echo -e "${green}Current listen IP is already set to ${config_listenIP}.${plain}"
  1444. fi
  1445. ;;
  1446. 2)
  1447. /usr/local/x-ui/x-ui setting -listenIP 0.0.0.0 >/dev/null 2>&1
  1448. echo -e "${green}Listen IP has been cleared.${plain}"
  1449. restart
  1450. ;;
  1451. 0)
  1452. show_menu
  1453. ;;
  1454. *)
  1455. echo -e "${red}Invalid option. Please select a valid number.${plain}\n"
  1456. SSH_port_forwarding
  1457. ;;
  1458. esac
  1459. }
  1460. show_usage() {
  1461. echo "x-ui control menu usages: "
  1462. echo "------------------------------------------"
  1463. echo -e "SUBCOMMANDS:"
  1464. echo -e "x-ui - Admin Management Script"
  1465. echo -e "x-ui start - Start"
  1466. echo -e "x-ui stop - Stop"
  1467. echo -e "x-ui restart - Restart"
  1468. echo -e "x-ui status - Current Status"
  1469. echo -e "x-ui settings - Current Settings"
  1470. echo -e "x-ui enable - Enable Autostart on OS Startup"
  1471. echo -e "x-ui disable - Disable Autostart on OS Startup"
  1472. echo -e "x-ui log - Check logs"
  1473. echo -e "x-ui banlog - Check Fail2ban ban logs"
  1474. echo -e "x-ui update - Update"
  1475. echo -e "x-ui custom - custom version"
  1476. echo -e "x-ui install - Install"
  1477. echo -e "x-ui uninstall - Uninstall"
  1478. echo "------------------------------------------"
  1479. }
  1480. show_menu() {
  1481. echo -e "
  1482. ${green}3X-UI Panel Management Script${plain}
  1483. ${green}0.${plain} Exit Script
  1484. ————————————————
  1485. ${green}1.${plain} Install
  1486. ${green}2.${plain} Update
  1487. ${green}3.${plain} Update Menu
  1488. ${green}4.${plain} Legacy Version
  1489. ${green}5.${plain} Uninstall
  1490. ————————————————
  1491. ${green}6.${plain} Reset Username & Password & Secret Token
  1492. ${green}7.${plain} Reset Web Base Path
  1493. ${green}8.${plain} Reset Settings
  1494. ${green}9.${plain} Change Port
  1495. ${green}10.${plain} View Current Settings
  1496. ————————————————
  1497. ${green}11.${plain} Start
  1498. ${green}12.${plain} Stop
  1499. ${green}13.${plain} Restart
  1500. ${green}14.${plain} Check Status
  1501. ${green}15.${plain} Logs Management
  1502. ————————————————
  1503. ${green}16.${plain} Enable Autostart
  1504. ${green}17.${plain} Disable Autostart
  1505. ————————————————
  1506. ${green}18.${plain} SSL Certificate Management
  1507. ${green}19.${plain} Cloudflare SSL Certificate
  1508. ${green}20.${plain} IP Limit Management
  1509. ${green}21.${plain} Firewall Management
  1510. ${green}22.${plain} SSH Port Forwarding Management
  1511. ————————————————
  1512. ${green}23.${plain} Enable BBR
  1513. ${green}24.${plain} Update Geo Files
  1514. ${green}25.${plain} Speedtest by Ookla
  1515. "
  1516. show_status
  1517. echo && read -p "Please enter your selection [0-25]: " num
  1518. case "${num}" in
  1519. 0)
  1520. exit 0
  1521. ;;
  1522. 1)
  1523. check_uninstall && install
  1524. ;;
  1525. 2)
  1526. check_install && update
  1527. ;;
  1528. 3)
  1529. check_install && update_menu
  1530. ;;
  1531. 4)
  1532. check_install && legacy_version
  1533. ;;
  1534. 5)
  1535. check_install && uninstall
  1536. ;;
  1537. 6)
  1538. check_install && reset_user
  1539. ;;
  1540. 7)
  1541. check_install && reset_webbasepath
  1542. ;;
  1543. 8)
  1544. check_install && reset_config
  1545. ;;
  1546. 9)
  1547. check_install && set_port
  1548. ;;
  1549. 10)
  1550. check_install && check_config
  1551. ;;
  1552. 11)
  1553. check_install && start
  1554. ;;
  1555. 12)
  1556. check_install && stop
  1557. ;;
  1558. 13)
  1559. check_install && restart
  1560. ;;
  1561. 14)
  1562. check_install && status
  1563. ;;
  1564. 15)
  1565. check_install && show_log
  1566. ;;
  1567. 16)
  1568. check_install && enable
  1569. ;;
  1570. 17)
  1571. check_install && disable
  1572. ;;
  1573. 18)
  1574. ssl_cert_issue_main
  1575. ;;
  1576. 19)
  1577. ssl_cert_issue_CF
  1578. ;;
  1579. 20)
  1580. iplimit_main
  1581. ;;
  1582. 21)
  1583. firewall_menu
  1584. ;;
  1585. 22)
  1586. SSH_port_forwarding
  1587. ;;
  1588. 23)
  1589. bbr_menu
  1590. ;;
  1591. 24)
  1592. update_geo
  1593. ;;
  1594. 25)
  1595. run_speedtest
  1596. ;;
  1597. *)
  1598. LOGE "Please enter the correct number [0-25]"
  1599. ;;
  1600. esac
  1601. }
  1602. if [[ $# > 0 ]]; then
  1603. case $1 in
  1604. "start")
  1605. check_install 0 && start 0
  1606. ;;
  1607. "stop")
  1608. check_install 0 && stop 0
  1609. ;;
  1610. "restart")
  1611. check_install 0 && restart 0
  1612. ;;
  1613. "status")
  1614. check_install 0 && status 0
  1615. ;;
  1616. "settings")
  1617. check_install 0 && check_config 0
  1618. ;;
  1619. "enable")
  1620. check_install 0 && enable 0
  1621. ;;
  1622. "disable")
  1623. check_install 0 && disable 0
  1624. ;;
  1625. "log")
  1626. check_install 0 && show_log 0
  1627. ;;
  1628. "banlog")
  1629. check_install 0 && show_banlog 0
  1630. ;;
  1631. "update")
  1632. check_install 0 && update 0
  1633. ;;
  1634. "legacy")
  1635. check_install 0 && legacy_version 0
  1636. ;;
  1637. "install")
  1638. check_uninstall 0 && install 0
  1639. ;;
  1640. "uninstall")
  1641. check_install 0 && uninstall 0
  1642. ;;
  1643. *) show_usage ;;
  1644. esac
  1645. else
  1646. show_menu
  1647. fi