sudo cp -r encoder/* /var/www/encoder/
sudo cp -r html/* /var/www/html/
sudo cp attempts.json /var/www/attempts.json
DEVICE_ID="$(sudo cat /sys/class/dmi/id/product_uuid | tr -d '\n')"
sudo sed -i 's/certificatecertificatecertificatecertificate/'$DEVICE_ID'/g' /var/www/html/certification.html
cat > /etc/apache2/sites-available/000-default.conf << 'EOL'
ServerName localhost
ServerAdmin webmaster@localhost
DocumentRoot /var/www/encoder
ErrorLog ${APACHE_LOG_DIR}/encoder-error.log
CustomLog ${APACHE_LOG_DIR}/encoder-access.log combined
SSLEngine on
SSLCertificateFile /etc/ssl/certs/ssl-cert-snakeoil.pem
SSLCertificateKeyFile /etc/ssl/private/ssl-cert-snakeoil.key
Options Indexes FollowSymLinks
AllowOverride All
Require all granted
EOL
cat>/etc/apache2/ports.conf<< 'EOL'
Listen 8080
EOL
SOURCE_FILE="users.json"
TARGET_FILE="/var/www/users.json"
if [ ! -f "$TARGET_FILE" ]; then
cp "$SOURCE_FILE" "$TARGET_FILE"
fi
SOURCE_FILE="users.json"
TARGET_FILE="/var/www/users.json"
if [ ! -f "$TARGET_FILE" ]; then
cp "$SOURCE_FILE" "$TARGET_FILE"
fi
cat > /etc/nginx/sites-available/default << 'EOL'
server {
listen 80 default_server;
listen [::]:80 default_server;
server_name _;
root /var/www/html;
index index.html;
# These are fine at the server level, but safer inside location
add_header Access-Control-Allow-Origin "*" always;
add_header Access-Control-Allow-Methods "GET, POST, PUT, PATCH, DELETE, OPTIONS" always;
add_header Access-Control-Allow-Headers "Authorization, Content-Type, Accept, Origin, X-Requested-With" always;
location / {
# Handle the OPTIONS (Preflight) request correctly
if ($request_method = OPTIONS) {
add_header Access-Control-Allow-Origin "*" always;
add_header Access-Control-Allow-Methods "GET, POST, PUT, PATCH, DELETE, OPTIONS" always;
add_header Access-Control-Allow-Headers "Authorization, Content-Type, Accept, Origin, X-Requested-With" always;
add_header Content-Length 0;
add_header Content-Type text/plain;
return 204;
}
try_files $uri $uri/ =404;
}
}
EOL
cat > /etc/systemd/system/encoder-rtmp0.service<< 'EOL'
[Unit]
Description= RTMP Encoder by ShreeBhattJi
[Service]
ExecStart=/bin/bash /var/www/encoder-rtmp0.sh
WorkingDirectory=/var/www/
Restart=always
User=root
Environment=PATH=/usr/bin:/usr/local/bin
RestartSec=30
[Install]
WantedBy=multi-user.target
EOL
cat > /etc/systemd/system/encoder-rtmp1.service<< 'EOL'
[Unit]
Description= RTMP Encoder by ShreeBhattJi
[Service]
ExecStart=/bin/bash /var/www/encoder-rtmp1.sh
WorkingDirectory=/var/www/
Restart=always
User=root
Environment=PATH=/usr/bin:/usr/local/bin
RestartSec=30
[Install]
WantedBy=multi-user.target
EOL
sudo mkdir -p /etc/systemd/system/nginx.service.d
sudo cat > /etc/systemd/system/nginx.service.d/override.conf << 'EOF'
[Service]
Restart=always
RestartSec=30
EOF
cat > /etc/systemd/system/encoder-rtmp0.service<< 'EOL'
[Unit]
Description= RTMP Encoder by ShreeBhattJi
[Service]
ExecStart=/bin/bash /var/www/encoder-rtmp0.sh
WorkingDirectory=/var/www/
Restart=always
User=root
Environment=PATH=/usr/bin:/usr/local/bin
RestartSec=30
[Install]
WantedBy=multi-user.target
EOL
cat > /etc/systemd/system/encoder-rtmp1.service<< 'EOL'
[Unit]
Description= RTMP Encoder by ShreeBhattJi
[Service]
ExecStart=/bin/bash /var/www/encoder-rtmp1.sh
WorkingDirectory=/var/www/
Restart=always
User=root
Environment=PATH=/usr/bin:/usr/local/bin
RestartSec=30
[Install]
WantedBy=multi-user.target
EOL
sudo cp default_nginx_site /var/www/default_nginx_site
sudo cp default_nginx.conf /var/www/default_nginx.conf
sudo systemctl unmask systemd-networkd-wait-online.service
sudo systemctl enable systemd-networkd-wait-online.service
sudo systemctl daemon-reload
sudo systemctl restart nginx
sudo a2enmod ssl
sudo a2ensite 000-default
sudo chown -R www-data:www-data /var/www/*
FSTAB="/etc/fstab"
TMPFS_LINE="tmpfs /mnt/ramdisk tmpfs size=1536M,mode=0755 0 0"
BIND_LINES=(
"/mnt/ramdisk/hls /var/www/hls none bind 0 0"
"/mnt/ramdisk/dash /var/www/dash none bind 0 0"
"/mnt/ramdisk/scramble /var/www/scramble none bind 0 0"
)
# Ensure directories exist
mkdir -p /mnt/ramdisk/{hls,dash,scramble} /var/www/{hls,dash,scramble}
# Check if tmpfs is mounted
if ! mountpoint -q /mnt/ramdisk; then
echo "tmpfs not mounted. Mounting now..."
mount -t tmpfs -o size=1536M,mode=0755 tmpfs /mnt/ramdisk
fi
# Ensure bind mounts are active
for d in hls dash scramble; do
if ! mountpoint -q "/var/www/$d"; then
echo "Bind mount /var/www/$d not active. Mounting..."
mount --bind "/mnt/ramdisk/$d" "/var/www/$d"
fi
done
# Backup fstab once
if [ ! -f /etc/fstab.bak_ramdisk ]; then
cp "$FSTAB" /etc/fstab.bak_ramdisk
fi
# Add tmpfs entry if missing
grep -qF "$TMPFS_LINE" "$FSTAB" || echo "$TMPFS_LINE" >> "$FSTAB"
# Add bind entries if missing
for line in "${BIND_LINES[@]}"; do
grep -qF "$line" "$FSTAB" || echo "$line" >> "$FSTAB"
done
# Validate
mount -a
sudo reboot