| | |
| | | $app->log("Creating CA-signed SSL Cert for: $domain",LOGLEVEL_DEBUG); |
| | | if (filesize($crt_file)==0 || !file_exists($crt_file)) $app->log("CA-Certificate signing failed. openssl ca -out $crt_file -config ".$web_config['CA_path']."/openssl.cnf -passin pass:".$web_config['CA_pass']." -in $csr_file",LOGLEVEL_ERROR); |
| | | }; |
| | | if (filesize($crt_file)==0 || !file_exists($crt_file)){ |
| | | if (@filesize($crt_file)==0 || !file_exists($crt_file)){ |
| | | exec("openssl req -x509 -passin pass:$ssl_password -passout pass:$ssl_password -key $key_file -in $csr_file -out $crt_file -days $ssl_days -config $config_file "); |
| | | $app->log("Creating self-signed SSL Cert for: $domain",LOGLEVEL_DEBUG); |
| | | }; |
| | |
| | | |
| | | |
| | | //* If the security level is set to high |
| | | if($this->action == 'insert' && $data['new']['type'] == 'vhost') { |
| | | if(($this->action == 'insert' && $data['new']['type'] == 'vhost') or ($web_config['set_folder_permissions_on_update'] == 'y' && $data['new']['type'] == 'vhost')) { |
| | | if($web_config['security_level'] == 20) { |
| | | |
| | | $this->_exec('chmod 751 '.escapeshellcmd($data['new']['document_root'])); |
| | |
| | | |
| | | //* add the Apache user to the client group |
| | | $app->system->add_user_to_group($groupname, escapeshellcmd($web_config['user'])); |
| | | |
| | | |
| | | //* Chown all default directories |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'])); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/cgi-bin')); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/log')); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/ssl')); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/tmp')); |
| | | $this->_exec('chown -R '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/web')); |
| | | |
| | | /* |
| | | * Workaround for jailkit: If jailkit is enabled for the site, the |
| | |
| | | } else { |
| | | |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'])); |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'].'/*')); |
| | | $this->_exec('chown root:root '.escapeshellcmd($data['new']['document_root'])); |
| | | |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'].'/cgi-bin')); |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'].'/log')); |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'].'/ssl')); |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'].'/web')); |
| | | |
| | | // make temp directory writable for Apache and the website users |
| | | $this->_exec('chmod 777 '.escapeshellcmd($data['new']['document_root'].'/tmp')); |
| | | |
| | | $this->_exec('chown root:root '.escapeshellcmd($data['new']['document_root'])); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/cgi-bin')); |
| | | $this->_exec('chown root:root '.escapeshellcmd($data['new']['document_root'].'/log')); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/tmp')); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/ssl')); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/web')); |
| | | } |
| | | } |
| | | |
| | |
| | | if($master_php_ini_path != '' && substr($master_php_ini_path,-7) == 'php.ini' && is_file($master_php_ini_path)) { |
| | | $php_ini_content .= file_get_contents($master_php_ini_path)."\n"; |
| | | } |
| | | $php_ini_content .= trim($data['new']['custom_php_ini']); |
| | | $php_ini_content .= str_replace("\r",'',trim($data['new']['custom_php_ini'])); |
| | | file_put_contents($custom_php_ini_dir.'/php.ini',$php_ini_content); |
| | | } else { |
| | | $has_custom_php_ini = false; |
| | |
| | | 'rewrite_target_ssl' => $rewrite_target_ssl); |
| | | break; |
| | | case '*': |
| | | $rewrite_rules[] = array( 'rewrite_domain' => $data['new']['domain'], |
| | | $rewrite_rules[] = array( 'rewrite_domain' => '(^|\.)'.$data['new']['domain'], |
| | | 'rewrite_type' => ($data['new']['redirect_type'] == 'no')?'':'['.$data['new']['redirect_type'].']', |
| | | 'rewrite_target' => $rewrite_target, |
| | | 'rewrite_target_ssl' => $rewrite_target_ssl); |
| | |
| | | 'rewrite_target_ssl' => $rewrite_target_ssl); |
| | | break; |
| | | case '*': |
| | | $rewrite_rules[] = array( 'rewrite_domain' => $alias['domain'], |
| | | $rewrite_rules[] = array( 'rewrite_domain' => '(^|\.)'.$alias['domain'], |
| | | 'rewrite_type' => ($alias['redirect_type'] == 'no')?'':'['.$alias['redirect_type'].']', |
| | | 'rewrite_target' => $rewrite_target, |
| | | 'rewrite_target_ssl' => $rewrite_target_ssl); |
| | |
| | | unlink($vhost_symlink); |
| | | $app->log('Removing symlink: '.$vhost_symlink.'->'.$vhost_file,LOGLEVEL_DEBUG); |
| | | } |
| | | $vhost_symlink = escapeshellcmd($web_config['vhost_conf_enabled_dir'].'/'.$data['old']['domain'].'.vhost'); |
| | | if(is_link($vhost_symlink)) { |
| | | unlink($vhost_symlink); |
| | | $app->log('Removing symlink: '.$vhost_symlink.'->'.$vhost_file,LOGLEVEL_DEBUG); |
| | | } |
| | | $vhost_file = escapeshellcmd($web_config['vhost_conf_dir'].'/'.$data['old']['domain'].'.vhost'); |
| | | unlink($vhost_file); |
| | | $app->log('Removing file: '.$vhost_file,LOGLEVEL_DEBUG); |