| | |
| | | $app->uses('getconf'); |
| | | $web_config = $app->getconf->get_server_config($conf['server_id'], 'web'); |
| | | if ($web_config['CA_path']!='' && !file_exists($web_config['CA_path'].'/openssl.cnf')) |
| | | $app->log("CA path error, file does not exist:".$web_config['CA_path'].'/openssl.conf',LOGLEVEL_ERROR); |
| | | $app->log("CA path error, file does not exist:".$web_config['CA_path'].'/openssl.cnf',LOGLEVEL_ERROR); |
| | | |
| | | //* Only vhosts can have a ssl cert |
| | | if($data["new"]["type"] != "vhost" && $data["new"]["type"] != "vhostsubdomain") return; |
| | |
| | | exec('chown -R '.$data['new']['system_user'].':'.$data['new']['system_group'].' '.$error_page_path); |
| | | } // end copy error docs |
| | | |
| | | // Set the quota for the user |
| | | if($username != '' && $app->system->is_user($username)) { |
| | | // Set the quota for the user, but only for vhosts, not vhostsubdomains |
| | | if($username != '' && $app->system->is_user($username) && $data['new']['type'] == 'vhost') { |
| | | if($data['new']['hd_quota'] > 0) { |
| | | $blocks_soft = $data['new']['hd_quota'] * 1024; |
| | | $blocks_hard = $blocks_soft + 1024; |
| | |
| | | $this->_exec('chown root:root '.escapeshellcmd($data['new']['document_root']).'/' . $web_folder); |
| | | } |
| | | } |
| | | |
| | | //* add the Apache user to the client group if this is a vhost and security level is set to high, no matter if this is an insert or update and regardless of set_folder_permissions_on_update |
| | | if($data['new']['type'] == 'vhost' && $web_config['security_level'] == 20) $app->system->add_user_to_group($groupname, escapeshellcmd($web_config['user'])); |
| | | |
| | | //* If the security level is set to high |
| | | if(($this->action == 'insert' && $data['new']['type'] == 'vhost') or ($web_config['set_folder_permissions_on_update'] == 'y' && $data['new']['type'] == 'vhost')) { |
| | |
| | | $app->system->server_conf['group_datei'] = $tmp_groupfile; |
| | | unset($tmp_groupfile); |
| | | } |
| | | |
| | | //* add the Apache user to the client group |
| | | $app->system->add_user_to_group($groupname, escapeshellcmd($web_config['user'])); |
| | | |
| | | //* Chown all default directories |
| | | $app->system->chown($data['new']['document_root'],'root'); |
| | |
| | | //* Create custom php.ini |
| | | if(trim($data['new']['custom_php_ini']) != '') { |
| | | $has_custom_php_ini = true; |
| | | if(!is_dir($custom_php_ini_dir)) $app->system->mkdir($custom_php_ini_dir); |
| | | if(!is_dir($custom_php_ini_dir)) $app->system->mkdirpath($custom_php_ini_dir); |
| | | $php_ini_content = ''; |
| | | if($data['new']['php'] == 'mod') { |
| | | $master_php_ini_path = $web_config['php_ini_path_apache']; |
| | |
| | | if($data['new']['ssl_domain'] != '' && $data['new']['ssl'] == 'y' && @is_file($crt_file) && @is_file($key_file) && (@filesize($crt_file)>0) && (@filesize($key_file)>0)) { |
| | | $tmp_vhost_arr = array('ip_address' => $data['new']['ip_address'], 'ssl_enabled' => 1, 'port' => '443'); |
| | | if(count($rewrite_rules) > 0) $tmp_vhost_arr = $tmp_vhost_arr + array('redirects' => $rewrite_rules); |
| | | if(count($alias_seo_redirects) > 0) $tmp_vhost_arr = $tmp_vhost_arr + array('alias_seo_redirects' => $alias_seo_redirects); |
| | | $ipv4_ssl_alias_seo_redirects = $alias_seo_redirects; |
| | | if(is_array($ipv4_ssl_alias_seo_redirects) && !empty($ipv4_ssl_alias_seo_redirects)){ |
| | | for($i=0;$i<count($ipv4_ssl_alias_seo_redirects);$i++){ |
| | | $ipv4_ssl_alias_seo_redirects[$i]['ssl_enabled'] = 1; |
| | | } |
| | | } |
| | | if(count($ipv4_ssl_alias_seo_redirects) > 0) $tmp_vhost_arr = $tmp_vhost_arr + array('alias_seo_redirects' => $ipv4_ssl_alias_seo_redirects); |
| | | $vhosts[] = $tmp_vhost_arr; |
| | | unset($tmp_vhost_arr); |
| | | unset($tmp_vhost_arr, $ipv4_ssl_alias_seo_redirects); |
| | | $app->log('Enable SSL for: '.$domain,LOGLEVEL_DEBUG);
|
| | | }
|
| | |
|
| | |
| | | if($data['new']['ssl_domain'] != '' && $data['new']['ssl'] == 'y' && @is_file($crt_file) && @is_file($key_file) && (@filesize($crt_file)>0) && (@filesize($key_file)>0)) { |
| | | $tmp_vhost_arr = array('ip_address' => '['.$data['new']['ipv6_address'].']', 'ssl_enabled' => 1, 'port' => '443'); |
| | | if(count($rewrite_rules) > 0) $tmp_vhost_arr = $tmp_vhost_arr + array('redirects' => $rewrite_rules); |
| | | if(count($alias_seo_redirects) > 0) $tmp_vhost_arr = $tmp_vhost_arr + array('alias_seo_redirects' => $alias_seo_redirects); |
| | | $ipv6_ssl_alias_seo_redirects = $alias_seo_redirects; |
| | | if(is_array($ipv6_ssl_alias_seo_redirects) && !empty($ipv6_ssl_alias_seo_redirects)){ |
| | | for($i=0;$i<count($ipv6_ssl_alias_seo_redirects);$i++){ |
| | | $ipv6_ssl_alias_seo_redirects[$i]['ssl_enabled'] = 1; |
| | | } |
| | | } |
| | | if(count($ipv6_ssl_alias_seo_redirects) > 0) $tmp_vhost_arr = $tmp_vhost_arr + array('alias_seo_redirects' => $ipv6_ssl_alias_seo_redirects); |
| | | $vhosts[] = $tmp_vhost_arr; |
| | | unset($tmp_vhost_arr); |
| | | unset($tmp_vhost_arr, $ipv6_ssl_alias_seo_redirects); |
| | | $app->log('Enable SSL for IPv6: '.$domain,LOGLEVEL_DEBUG); |
| | | } |
| | | } |