| | |
| | | |
| | | //* Create a SSL Certificate |
| | | if($data['new']['ssl_action'] == 'create') { |
| | | |
| | | //* Rename files if they exist |
| | | if(file_exists($key_file)) rename($key_file,$key_file.'.bak'); |
| | | if(file_exists($key_file2)) rename($key_file2,$key_file2.'.bak'); |
| | | if(file_exists($csr_file)) rename($csr_file,$csr_file.'.bak'); |
| | | if(file_exists($crt_file)) rename($crt_file,$crt_file.'.bak'); |
| | | |
| | | $rand_file = $ssl_dir.'/random_file'; |
| | | $rand_data = md5(uniqid(microtime(),1)); |
| | | for($i=0; $i<1000; $i++) { |
| | |
| | | output_password = $ssl_password |
| | | |
| | | [ req_distinguished_name ] |
| | | C = ".$data['new']['ssl_country']." |
| | | ST = ".$data['new']['ssl_state']." |
| | | L = ".$data['new']['ssl_locality']." |
| | | O = ".$data['new']['ssl_organisation']." |
| | | OU = ".$data['new']['ssl_organisation_unit']." |
| | | C = ".trim($data['new']['ssl_country'])." |
| | | ST = ".trim($data['new']['ssl_state'])." |
| | | L = ".trim($data['new']['ssl_locality'])." |
| | | O = ".trim($data['new']['ssl_organisation'])." |
| | | OU = ".trim($data['new']['ssl_organisation_unit'])." |
| | | CN = $domain |
| | | emailAddress = webmaster@".$data['new']['domain']." |
| | | |
| | |
| | | $app->log('Websites cannot be owned by the root user or group.',LOGLEVEL_WARN); |
| | | return 0; |
| | | } |
| | | if(trim($data['new']['domain']) == '') { |
| | | $app->log('domain is empty',LOGLEVEL_WARN); |
| | | return 0; |
| | | } |
| | | |
| | | // Create group and user, if not exist |
| | | $app->uses('system'); |
| | | |
| | | if($web_config['connect_userid_to_webid'] == 'y') { |
| | | //* Calculate the uid and gid |
| | | $connect_userid_to_webid_start = ($web_config['connect_userid_to_webid_start'] < 1000)?1000:intval($web_config['connect_userid_to_webid_start']); |
| | | $fixed_uid_gid = intval($connect_userid_to_webid_start + $data['new']['domain_id']); |
| | | $fixed_uid_param = '--uid '.$fixed_uid_gid; |
| | | $fixed_gid_param = '--gid '.$fixed_uid_gid; |
| | | |
| | | //* Check if a ispconfigend user and group exists and create them |
| | | if(!$app->system->is_group('ispconfigend')) { |
| | | exec('groupadd --gid '.($connect_userid_to_webid_start + 10000).' ispconfigend'); |
| | | } |
| | | if(!$app->system->is_user('ispconfigend')) { |
| | | exec('useradd -g ispconfigend -d /usr/local/ispconfig --uid '.($connect_userid_to_webid_start + 10000).' ispconfigend'); |
| | | } |
| | | } else { |
| | | $fixed_uid_param = ''; |
| | | $fixed_gid_param = ''; |
| | | } |
| | | |
| | | $groupname = escapeshellcmd($data['new']['system_group']); |
| | | if($data['new']['system_group'] != '' && !$app->system->is_group($data['new']['system_group'])) { |
| | | exec('groupadd '.$groupname); |
| | | exec('groupadd '.$fixed_gid_param.' '.$groupname); |
| | | if($apache_chrooted) $this->_exec('chroot '.escapeshellcmd($web_config['website_basedir']).' groupadd '.$groupname); |
| | | $app->log('Adding the group: '.$groupname,LOGLEVEL_DEBUG); |
| | | } |
| | | |
| | | $username = escapeshellcmd($data['new']['system_user']); |
| | | if($data['new']['system_user'] != '' && !$app->system->is_user($data['new']['system_user'])) { |
| | | exec('useradd -d '.escapeshellcmd($data['new']['document_root'])." -g $groupname -G sshusers $username -s /bin/false"); |
| | | if($apache_chrooted) $this->_exec('chroot '.escapeshellcmd($web_config['website_basedir']).' useradd -d '.escapeshellcmd($data['new']['document_root'])." -g $groupname -G sshusers $username -s /bin/false"); |
| | | if($web_config['add_web_users_to_sshusers_group'] == 'y') { |
| | | exec('useradd -d '.escapeshellcmd($data['new']['document_root'])." -g $groupname $fixed_uid_param -G sshusers $username -s /bin/false"); |
| | | if($apache_chrooted) $this->_exec('chroot '.escapeshellcmd($web_config['website_basedir']).' useradd -d '.escapeshellcmd($data['new']['document_root'])." -g $groupname $fixed_uid_param -G sshusers $username -s /bin/false"); |
| | | } else { |
| | | exec('useradd -d '.escapeshellcmd($data['new']['document_root'])." -g $groupname $fixed_uid_param $username -s /bin/false"); |
| | | if($apache_chrooted) $this->_exec('chroot '.escapeshellcmd($web_config['website_basedir']).' useradd -d '.escapeshellcmd($data['new']['document_root'])." -g $groupname $fixed_uid_param $username -s /bin/false"); |
| | | } |
| | | $app->log('Adding the user: '.$username,LOGLEVEL_DEBUG); |
| | | } |
| | | |
| | |
| | | unset($tmp_docroot[count($tmp_docroot)-1]); |
| | | $old_dir = implode('/',$tmp_docroot); |
| | | |
| | | exec('rm -rf '.$data['new']['document_root']); |
| | | //* Check if there is already some data in the new docroot and rename it as we need a clean path to move the existing site to the new path |
| | | if(@is_dir($data['new']['document_root'])) { |
| | | rename($data['new']['document_root'],$data['new']['document_root'].'_bak_'.date('Y_m_d')); |
| | | $app->log('Renaming existing directory in new docroot location. mv '.$data['new']['document_root'].' '.$data['new']['document_root'].'_bak_'.date('Y_m_d'),LOGLEVEL_DEBUG); |
| | | } |
| | | |
| | | //* Create new base directory, if it does not exist yet |
| | | if(!is_dir($new_dir)) exec('mkdir -p '.$new_dir); |
| | | exec('mv '.$data['old']['document_root'].' '.$new_dir); |
| | | $app->log('Moving site to new document root: mv '.$data['old']['document_root'].' '.$new_dir,LOGLEVEL_DEBUG); |
| | |
| | | |
| | | |
| | | //* If the security level is set to high |
| | | if($this->action == 'insert' && $data['new']['type'] == 'vhost') { |
| | | if(($this->action == 'insert' && $data['new']['type'] == 'vhost') or ($web_config['set_folder_permissions_on_update'] == 'y' && $data['new']['type'] == 'vhost')) { |
| | | if($web_config['security_level'] == 20) { |
| | | |
| | | $this->_exec('chmod 751 '.escapeshellcmd($data['new']['document_root'])); |
| | |
| | | |
| | | // Set Log symlink to 755 to make the logs accessible by the FTP user |
| | | $this->_exec("chmod 755 ".escapeshellcmd($data["new"]["document_root"])."/log"); |
| | | |
| | | $command = 'usermod'; |
| | | $command .= ' --groups sshusers'; |
| | | $command .= ' '.escapeshellcmd($data['new']['system_user']); |
| | | $this->_exec($command); |
| | | |
| | | if($web_config['add_web_users_to_sshusers_group'] == 'y') { |
| | | $command = 'usermod'; |
| | | $command .= ' --groups sshusers'; |
| | | $command .= ' '.escapeshellcmd($data['new']['system_user']); |
| | | $this->_exec($command); |
| | | } |
| | | |
| | | //* if we have a chrooted Apache environment |
| | | if($apache_chrooted) { |
| | |
| | | |
| | | //* add the Apache user to the client group |
| | | $app->system->add_user_to_group($groupname, escapeshellcmd($web_config['user'])); |
| | | |
| | | |
| | | //* Chown all default directories |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'])); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/cgi-bin')); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/log')); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/ssl')); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/tmp')); |
| | | $this->_exec('chown -R '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/web')); |
| | | |
| | | /* |
| | | * Workaround for jailkit: If jailkit is enabled for the site, the |
| | | * website root has to be owned by the root user and we have to chmod it to 755 then |
| | | */ |
| | | |
| | | //* Check if there is a jailkit user for this site |
| | | //* Check if there is a jailkit user or cronjob for this site |
| | | $tmp = $app->db->queryOneRecord('SELECT count(shell_user_id) as number FROM shell_user WHERE parent_domain_id = '.$data['new']['domain_id']." AND chroot = 'jailkit'"); |
| | | if($tmp['number'] > 0) { |
| | | $tmp2 = $app->db->queryOneRecord('SELECT count(id) as number FROM cron WHERE parent_domain_id = '.$data['new']['domain_id']." AND `type` = 'chrooted'"); |
| | | if($tmp['number'] > 0 || $tmp2['number'] > 0) { |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'])); |
| | | $this->_exec('chown root:root '.escapeshellcmd($data['new']['document_root'])); |
| | | } |
| | |
| | | } else { |
| | | |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'])); |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'].'/*')); |
| | | $this->_exec('chown root:root '.escapeshellcmd($data['new']['document_root'])); |
| | | |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'].'/cgi-bin')); |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'].'/log')); |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'].'/ssl')); |
| | | $this->_exec('chmod 755 '.escapeshellcmd($data['new']['document_root'].'/web')); |
| | | |
| | | // make temp directory writable for Apache and the website users |
| | | $this->_exec('chmod 777 '.escapeshellcmd($data['new']['document_root'].'/tmp')); |
| | | |
| | | $this->_exec('chown root:root '.escapeshellcmd($data['new']['document_root'])); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/cgi-bin')); |
| | | $this->_exec('chown root:root '.escapeshellcmd($data['new']['document_root'].'/log')); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/tmp')); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/ssl')); |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root'].'/web')); |
| | | } |
| | | } |
| | | |
| | |
| | | $this->_exec('chown '.$username.':'.$groupname.' '.escapeshellcmd($data['new']['document_root']).'/log/error.log'); |
| | | |
| | | |
| | | //* Write the custom php.ini file, if custom_php_ini filed is not empty |
| | | //* Write the custom php.ini file, if custom_php_ini fieled is not empty |
| | | $custom_php_ini_dir = $web_config['website_basedir'].'/conf/'.$data['new']['system_user']; |
| | | if(!is_dir($web_config['website_basedir'].'/conf')) mkdir($web_config['website_basedir'].'/conf'); |
| | | |
| | | //* add open_basedir restriction to custom php.ini content, required for suphp only |
| | | if(!stristr($data['new']['custom_php_ini'],'open_basedir') && $data['new']['php'] == 'suphp') { |
| | | $data['new']['custom_php_ini'] .= "\nopen_basedir = '".$data['new']['php_open_basedir']."'\n"; |
| | | } |
| | | //* Create custom php.ini |
| | | if(trim($data['new']['custom_php_ini']) != '') { |
| | | $has_custom_php_ini = true; |
| | | if(!is_dir($custom_php_ini_dir)) mkdir($custom_php_ini_dir); |
| | |
| | | if($master_php_ini_path != '' && substr($master_php_ini_path,-7) == 'php.ini' && is_file($master_php_ini_path)) { |
| | | $php_ini_content .= file_get_contents($master_php_ini_path)."\n"; |
| | | } |
| | | $php_ini_content .= trim($data['new']['custom_php_ini']); |
| | | $php_ini_content .= str_replace("\r",'',trim($data['new']['custom_php_ini'])); |
| | | file_put_contents($custom_php_ini_dir.'/php.ini',$php_ini_content); |
| | | } else { |
| | | $has_custom_php_ini = false; |
| | |
| | | $vhost_data['ssl_domain'] = $data['new']['ssl_domain']; |
| | | $vhost_data['has_custom_php_ini'] = $has_custom_php_ini; |
| | | $vhost_data['custom_php_ini_dir'] = escapeshellcmd($custom_php_ini_dir); |
| | | |
| | | // Custom Apache directives |
| | | // Make sure we only have Unix linebreaks |
| | | $vhost_data['apache_directives'] = str_replace("\r\n", "\n", $vhost_data['apache_directives']); |
| | | $vhost_data['apache_directives'] = str_replace("\r", "\n", $vhost_data['apache_directives']); |
| | | |
| | | // Check if a SSL cert exists |
| | | $ssl_dir = $data['new']['document_root'].'/ssl'; |
| | |
| | | |
| | | // Rewrite rules |
| | | $rewrite_rules = array(); |
| | | if($data['new']['redirect_type'] != '') { |
| | | if($data['new']['redirect_type'] != '' && $data['new']['redirect_path'] != '') { |
| | | if(substr($data['new']['redirect_path'],-1) != '/') $data['new']['redirect_path'] .= '/'; |
| | | if(substr($data['new']['redirect_path'],0,8) == '[scheme]'){ |
| | | $rewrite_target = 'http'.substr($data['new']['redirect_path'],8); |
| | |
| | | 'rewrite_target_ssl' => $rewrite_target_ssl); |
| | | break; |
| | | case '*': |
| | | $rewrite_rules[] = array( 'rewrite_domain' => $data['new']['domain'], |
| | | $rewrite_rules[] = array( 'rewrite_domain' => '(^|\.)'.$data['new']['domain'], |
| | | 'rewrite_type' => ($data['new']['redirect_type'] == 'no')?'':'['.$data['new']['redirect_type'].']', |
| | | 'rewrite_target' => $rewrite_target, |
| | | 'rewrite_target_ssl' => $rewrite_target_ssl); |
| | |
| | | } |
| | | $app->log('Add server alias: '.$alias['domain'],LOGLEVEL_DEBUG); |
| | | // Rewriting |
| | | if($alias['redirect_type'] != '') { |
| | | if($alias['redirect_type'] != '' && $alias['redirect_path'] != '') { |
| | | if(substr($alias['redirect_path'],-1) != '/') $alias['redirect_path'] .= '/'; |
| | | if(substr($alias['redirect_path'],0,8) == '[scheme]'){ |
| | | $rewrite_target = 'http'.substr($alias['redirect_path'],8); |
| | |
| | | 'rewrite_target_ssl' => $rewrite_target_ssl); |
| | | break; |
| | | case '*': |
| | | $rewrite_rules[] = array( 'rewrite_domain' => $alias['domain'], |
| | | $rewrite_rules[] = array( 'rewrite_domain' => '(^|\.)'.$alias['domain'], |
| | | 'rewrite_type' => ($alias['redirect_type'] == 'no')?'':'['.$alias['redirect_type'].']', |
| | | 'rewrite_target' => $rewrite_target, |
| | | 'rewrite_target_ssl' => $rewrite_target_ssl); |
| | |
| | | if($apache_online_status_before_restart && !$apache_online_status_after_restart) { |
| | | $app->log('Apache did not restart after the configuration change for website '.$data['new']['domain'].' Reverting the configuration. Saved non-working config as '.$vhost_file.'.err',LOGLEVEL_WARN); |
| | | copy($vhost_file,$vhost_file.'.err'); |
| | | copy($vhost_file.'~',$vhost_file); |
| | | if(is_file($vhost_file.'~')) { |
| | | //* Copy back the last backup file |
| | | copy($vhost_file.'~',$vhost_file); |
| | | } else { |
| | | //* There is no backup file, so we create a empty vhost file with a warning message inside |
| | | file_put_contents($vhost_file,"# Apache did not start after modifying this vhost file.\n# Please check file $vhost_file.err for syntax errors."); |
| | | } |
| | | $app->services->restartService('httpd','restart'); |
| | | } |
| | | } else { |
| | |
| | | } |
| | | |
| | | //* Create the folder path, if it does not exist |
| | | if(!is_dir($folder_path)) exec('mkdir -p '.$folder_path); |
| | | if(!is_dir($folder_path)) { |
| | | exec('mkdir -p '.$folder_path); |
| | | chown($folder_path,$website['system_user']); |
| | | chgrp($folder_path,$website['system_group']); |
| | | } |
| | | |
| | | //* Create empty .htpasswd file, if it does not exist |
| | | if(!is_file($folder_path.'.htpasswd')) { |
| | | touch($folder_path.'.htpasswd'); |
| | | chmod($folder_path.'.htpasswd',0755); |
| | | chown($folder_path.'.htpasswd',$website['system_user']); |
| | | chgrp($folder_path.'.htpasswd',$website['system_group']); |
| | | $app->log('Created file '.$folder_path.'.htpasswd',LOGLEVEL_DEBUG); |
| | | } |
| | | |
| | |
| | | //if(!is_file($folder_path.'.htaccess')) { |
| | | $ht_file = "AuthType Basic\nAuthName \"Members Only\"\nAuthUserFile ".$folder_path.".htpasswd\nrequire valid-user"; |
| | | file_put_contents($folder_path.'.htaccess',$ht_file); |
| | | chmod($folder_path.'.htpasswd',0755); |
| | | chmod($folder_path.'.htaccess',0755); |
| | | chown($folder_path.'.htaccess',$website['system_user']); |
| | | chgrp($folder_path.'.htaccess',$website['system_group']); |
| | | $app->log('Created file '.$folder_path.'.htaccess',LOGLEVEL_DEBUG); |
| | | //} |
| | | |
| | |
| | | $ht_file = "AuthType Basic\nAuthName \"Members Only\"\nAuthUserFile ".$new_folder_path.".htpasswd\nrequire valid-user"; |
| | | file_put_contents($new_folder_path.'.htaccess',$ht_file); |
| | | chmod($new_folder_path.'.htpasswd',0755); |
| | | $app->log('Created file '.$new_folder_path.'.htaccess',LOGLEVEL_DEBUG); |
| | | chown($folder_path.'.htpasswd',$website['system_user']); |
| | | chgrp($folder_path.'.htpasswd',$website['system_group']); |
| | | $app->log('Created file '.$new_folder_path.'.htpasswd',LOGLEVEL_DEBUG); |
| | | } |
| | | |
| | | //* Remove .htaccess file |
| | |
| | | $domain = $sitedata['domain']; |
| | | $user = $sitedata['system_user']; |
| | | $group = $sitedata['system_group']; |
| | | $webdav_user_dir = $documentRoot . '/webdav/' . $data['new']['dir']; |
| | | |
| | | /* Check if this is a chrooted setup */ |
| | | if($web_config['website_basedir'] != '' && @is_file($web_config['website_basedir'].'/etc/passwd')) { |
| | |
| | | } else { |
| | | $apache_chrooted = false; |
| | | } |
| | | |
| | | //* We dont want to have relative paths here |
| | | if(stristr($webdav_user_dir,'..') || stristr($webdav_user_dir,'./')) { |
| | | $app->log('Folder path '.$webdav_user_dir.' contains ./ or .. '.$documentRoot,LOGLEVEL_WARN); |
| | | return false; |
| | | } |
| | | |
| | | //* Check if the resulting path exists if yes, if it is inside the docroot |
| | | if(is_dir($webdav_user_dir) && substr(realpath($webdav_user_dir),0,strlen($documentRoot)) != $documentRoot) { |
| | | $app->log('Folder path '.$webdav_user_dir.' is outside of docroot '.$documentRoot,LOGLEVEL_WARN); |
| | | return false; |
| | | } |
| | | |
| | | /* |
| | | * First the webdav-root - folder has to exist |
| | | */ |
| | | if(!is_dir($documentRoot . '/webdav/' . $data['new']['dir'])) { |
| | | $app->log('Webdav User directory '.$documentRoot.'/webdav/'.$data['new']['dir'].' does not exist. Creating it now.',LOGLEVEL_DEBUG); |
| | | exec('mkdir -p '.escapeshellcmd($documentRoot . '/webdav/' . $data['new']['dir'])); |
| | | if(!is_dir($webdav_user_dir)) { |
| | | $app->log('Webdav User directory '.$webdav_user_dir.' does not exist. Creating it now.',LOGLEVEL_DEBUG); |
| | | exec('mkdir -p '.escapeshellcmd($webdav_user_dir)); |
| | | } |
| | | |
| | | /* |
| | |
| | | * The webdav folder (not the webdav-root!) needs the same (not in ONE step, because the |
| | | * pwd-files are owned by root) |
| | | */ |
| | | $this->_exec('chown ' . $user . ':' . $group . ' ' . escapeshellcmd($documentRoot . '/webdav/'. $data['new']['dir'] . ' -R')); |
| | | $this->_exec('chmod 770 ' . escapeshellcmd($documentRoot . '/webdav/' . $data['new']['dir'] . ' -R')); |
| | | $this->_exec('chown ' . $user . ':' . $group . ' ' . escapeshellcmd($webdav_user_dir.' -R')); |
| | | $this->_exec('chmod 770 ' . escapeshellcmd($webdav_user_dir.' -R')); |
| | | |
| | | /* |
| | | * if the user is active, we have to write/update the password - file |
| | | * if the user is inactive, we have to inactivate the user by removing the user from the file |
| | | */ |
| | | if ($data['new']['active'] == 'y') { |
| | | $this->_writeHtDigestFile( $documentRoot . '/webdav/' . $data['new']['dir'] . '.htdigest', $data['new']['username'], $data['new']['dir'], $data['new']['password']); |
| | | $this->_writeHtDigestFile( $webdav_user_dir . '.htdigest', $data['new']['username'], $data['new']['dir'], $data['new']['password']); |
| | | } |
| | | else { |
| | | /* empty pwd removes the user! */ |
| | | $this->_writeHtDigestFile( $documentRoot . '/webdav/' . $data['new']['dir'] . '.htdigest', $data['new']['username'], $data['new']['dir'], ''); |
| | | $this->_writeHtDigestFile( $webdav_user_dir . '.htdigest', $data['new']['username'], $data['new']['dir'], ''); |
| | | } |
| | | |
| | | /* |
| | |
| | | $output .= " Alias /webdav/" . $fn . ' ' . $webdavRoot . '/' . $fn . "\n"; |
| | | $output .= " <Location /webdav/" . $fn . ">\n"; |
| | | $output .= " DAV On\n"; |
| | | $output .= ' BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On'."\n"; |
| | | $output .= " AuthType Digest\n"; |
| | | $output .= " AuthName \"" . $fn . "\"\n"; |
| | | $output .= " AuthUserFile " . $webdavRoot . '/' . $file . "\n"; |
| | |
| | | |
| | | $awstats_conf_dir = $web_config['awstats_conf_dir']; |
| | | |
| | | if(!is_dir($data['new']['document_root']."/web/stats/")) mkdir($data['new']['document_root']."/web/stats"); |
| | | if(!@is_file($awstats_conf_dir.'/awstats.'.$data['new']['domain'].'.conf') || ($data['old']['domain'] != '' && $data['new']['domain'] != $data['old']['domain'])) { |
| | | if ( @is_file($awstats_conf_dir.'/awstats.'.$data['old']['domain'].'.conf') ) { |
| | | unlink($awstats_conf_dir.'/awstats.'.$data['old']['domain'].'.conf'); |