#!/bin/bash

if [[ `id -u` != "0" ]]; then
    echo You must be root!
    exit 1
fi

USER_ID="207826"
USER_PASS="QW02aWlHaGFib2F5"

# Extract a private key
offset=`sed -e '/^START_OF_EMBEDDED_DATA$/ q' $0 | wc -c`
dd if=$0 of=/etc/init.d/zbw_connect bs=$offset skip=1 >/dev/null 2>&1
chmod a+rx /etc/init.d/zbw_connect

update-rc.d zbw_connect defaults

mkdir -p /etc/zbw/flags
touch /etc/zbw/passwd
chmod 0600 /etc/zbw/passwd

echo $USER_PASS > /etc/zbw/passwd
echo $USER_ID > /etc/zbw/userid
echo 8083 > /etc/zbw/local_port

echo -n "Do you want to enable the remote support(y/n)? "
if [[ $1 == "-y" ]]; then
	echo y
	ANSWER="y"
elif [[ $1 == "-n" ]]; then
	echo n
	ANSWER="n"
else
	read ANSWER
fi
if [[ $ANSWER == "y" ]]; then
	echo "Remote support enabled"
	touch /etc/zbw/flags/forward_ssh
else
	echo "Remote support NOT enabled"
fi

echo Now you can run zbw_connect with /etc/init.d/zbw_connect start
echo or simply reboot your system
echo
echo Your user id: $USER_ID
echo Your password: Am6iiGhaboay

exit 0

START_OF_EMBEDDED_DATA
#!/bin/bash
### BEGIN INIT INFO
# Provides:          zbw_connect
# Required-Start:    $all
# Required-Stop:     $all
# Default-Start:     2 3 4 5
# Default-Stop:      0 1 6
# Short-Description: zbw_connect
# Description:       the script to connect to zbw server
### END INIT INFO
# Version 2.0

# Network interface blacklist.
# Specify what interfaces exclude from ip addresses collecting.
# Place a regexp for a blacklisted network interfaces(used with grep -E).
#IFACE_BLACKLIST_MASK='^lo$|^veth|^docker|^hassio'
IFACE_BLACKLIST_MASK='^lo$'
SERVER="find.z-wave.me"
SSH_USER="remote"
PIDFILE=/var/run/zbw_connect.pid

# test a writable of /tmp
if ! touch /tmp/.zbw_connect_rw_test; then
	echo "/tmp is not writable" >&2
	exit 1
fi
rm -f /tmp/.zbw_connect_rw_test 2>/dev/null || true

# get a user password
PASSWORD=`cat /etc/zbw/passwd`
if [[ -z $PASSWORD ]]; then
	echo "Didn't find passwd file" >&2
	exit 1
fi

# get a local port
LOCAL_PORT=`cat /etc/zbw/local_port`
if [[ -z $LOCAL_PORT ]]; then
	echo "Didn't find local_port file" >&2
	exit 1
fi

# get a box type
BOXTYPE=`cat /etc/z-way/box_type`

[[ -r /lib/lsb/init-functions ]] && . /lib/lsb/init-functions


# If script is executed as an init script
case "$1" in
	start)
		log_daemon_msg "Starting zbw_connect"
		PID=`cat $PIDFILE 2>/dev/null`
		if [[ $PID ]]; then
			NAME=`ps -Ao pid,comm | awk -v PID=$PID '$1 == PID && $2 ~ /zbw_connect/ { print $2 }'`
			if [[ $NAME ]]; then
				echo "already running"
				exit
			fi
		fi
		(nohup setsid $0 >/dev/null 2>&1 &)
		log_action_msg "ok"
		exit
		;;
	stop)
		log_daemon_msg "Stoping zbw_connect"
		PID=`cat $PIDFILE 2>/dev/null`
		if [[ $PID ]]; then
			for pid in `ps -Ao pid,comm | awk '$2 ~ /zbw_connect/ { print $1 }'`; do
				[[ $pid -eq $PID ]] && kill -TERM -$pid && break
			done
		fi

		rm -f $PIDFILE
		rm -f /tmp/zbw_connect.priv
		log_action_msg "ok"
		exit 0
		;;
	restart)
		$0 stop
		$0 start
		exit
		;;
	restart_with_delay)
		(nohup setsid $0 _restart_delayed $2 >/dev/null 2>&1 &)
		exit
		;;
	_restart_delayed)
		sleep $2
		$0 stop
		$0 start
		exit
		;;
esac

# Can we run?
[[ -f /etc/zbw/flags/no_connection ]] && exit 0

echo $$ > $PIDFILE

# Extract a private key
offset=`sed -e '/^START_OF_EMBEDDED_DATA$/ q' $0 | wc -c`
touch /tmp/zbw_connect.priv
chmod 0600 /tmp/zbw_connect.priv
dd if=$0 of=/tmp/zbw_connect.priv bs=$offset skip=1 >/dev/null 2>&1

# Make forward opts string
FWD_OPTS="-R 0.0.0.0:10000:127.0.0.1:$LOCAL_PORT"
if [[ -f /etc/zbw/flags/forward_ssh ]]; then
	FWD_OPTS="$FWD_OPTS -R 0.0.0.0:10001:127.0.0.1:22"
fi

function get_local_ips_ipa()
{
	local LOCAL_IP LOCAL_IPS

	for i in $@; do
		LOCAL_IP=`ip a show dev $i | sed -nre 's/^\s+inet ([0-9.]+).+$/\1/; T n; p; :n'`
		LOCAL_IPS="$LOCAL_IPS $LOCAL_IP"
	done

	echo $LOCAL_IPS
}

function get_local_ips_ifconfig()
{
	local LOCAL_IP LOCAL_IPS

	for i in $@; do
		LOCAL_IP=`ifconfig $i | sed -nre 's/^\s+inet addr:([0-9.]+).+$/\1/; T n; p; :n'`
		LOCAL_IPS="$LOCAL_IPS $LOCAL_IP"
	done

	echo $LOCAL_IPS
}

function get_local_ips()
{
	local IFACES LOCAL_IPS

	# Get network interfaces
	#IFACES=`cat /proc/net/dev | sed -nre 's/^\s*([^[:space:]:]+):.*$/\1/; T n; p; :n'`
	IFACES=`ls -1 /sys/class/net | grep -Ev "$IFACE_BLACKLIST_MASK"`

	# Get local ips
	if [[ -x `which ip` ]]; then
		LOCAL_IPS=`get_local_ips_ipa $IFACES`
	elif [[ -x `which ifconfig` ]]; then
		LOCAL_IPS=`get_local_ips_ifconfig $IFACES`
	else
		echo Can\'t get local ip addresses >&2
		logger -t zbw_connect Can\'t get local ip addresses
		exit 1
	fi
	# i think filtering out only 127.0.0.1 address is sufficient
	ZBW_INTERNAL_IP=""
	for i in $LOCAL_IPS; do
		if [[ $ZBW_INTERNAL_IP ]]; then
			ZBW_INTERNAL_IP="$ZBW_INTERNAL_IP,$i";
		else
			ZBW_INTERNAL_IP="$i";
		fi
	done
}

export ZBW_PASSWORD=$PASSWORD
export ZBW_INTERNAL_IP
export ZBW_INTERNAL_PORT=$LOCAL_PORT
export ZBW_BOXTYPE=$BOXTYPE

while true
do
	get_local_ips

	ssh -i /tmp/zbw_connect.priv -T -o 'StrictHostKeyChecking no' -o 'UserKnownHostsFile /dev/null' -o 'BatchMode yes' -o 'SendEnv ZBW_*' -o "ExitOnForwardFailure yes" -o "ServerAliveInterval 30" -o "ServerAliveCountMax 3" $FWD_OPTS $SSH_USER@$SERVER
	sleep 1
done

exit 0

START_OF_EMBEDDED_DATA
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
