From c2f53e76fde1ab534e67a9227d4f0adcde05dfa4 Mon Sep 17 00:00:00 2001 From: tbrehm <t.brehm@ispconfig.org> Date: Wed, 28 Oct 2009 14:05:37 -0400 Subject: [PATCH] Fix in maildrop plugin. --- server/plugins-available/apache2_plugin.inc.php | 42 +++++++++++++++++++++++++++++------------- 1 files changed, 29 insertions(+), 13 deletions(-) diff --git a/server/plugins-available/apache2_plugin.inc.php b/server/plugins-available/apache2_plugin.inc.php index 4014f2a..5b69403 100644 --- a/server/plugins-available/apache2_plugin.inc.php +++ b/server/plugins-available/apache2_plugin.inc.php @@ -83,7 +83,7 @@ if(!is_dir($data["new"]["document_root"]."/ssl")) exec("mkdir -p ".$data["new"]["document_root"]."/ssl"); $ssl_dir = $data["new"]["document_root"]."/ssl"; - $domain = $data["new"]["domain"]; + $domain = $data["new"]["ssl_domain"]; $key_file = $ssl_dir.'/'.$domain.".key.org"; $key_file2 = $ssl_dir.'/'.$domain.".key"; $csr_file = $ssl_dir.'/'.$domain.".csr"; @@ -144,8 +144,8 @@ exec("chmod 400 $key_file2"); @unlink($config_file); @unlink($rand_file); - $ssl_request = file_get_contents($csr_file); - $ssl_cert = file_get_contents($crt_file); + $ssl_request = $app->db->quote(file_get_contents($csr_file)); + $ssl_cert = $app->db->quote(file_get_contents($crt_file)); /* Update the DB of the (local) Server */ $app->db->query("UPDATE web_domain SET ssl_request = '$ssl_request', ssl_cert = '$ssl_cert' WHERE domain = '".$data["new"]["domain"]."'"); $app->db->query("UPDATE web_domain SET ssl_action = '' WHERE domain = '".$data["new"]["domain"]."'"); @@ -236,8 +236,9 @@ $web_config = $app->getconf->get_server_config($conf["server_id"], 'web'); //* Check if this is a chrooted setup - if($web_config['website_basedir'] != '' && @is_file($web_config['/var/www'].'/etc/passwd')) { + if($web_config['website_basedir'] != '' && @is_file($web_config['website_basedir'].'/etc/passwd')) { $apache_chrooted = true; + $app->log("Info: Apache is chrooted.",LOGLEVEL_DEBUG); } else { $apache_chrooted = false; } @@ -299,7 +300,7 @@ $command .= ' '.escapeshellcmd($data["new"]["system_user"]); exec($command); - if($apache_chrooted) exec("chroot ".escapeshellcmd($web_config['website_basedir'])." ".$command); + if($apache_chrooted) $this->_exec("chroot ".escapeshellcmd($web_config['website_basedir'])." ".$command); } @@ -445,14 +446,14 @@ $groupname = escapeshellcmd($data["new"]["system_group"]); if($data["new"]["system_group"] != '' && !$app->system->is_group($data["new"]["system_group"])) { exec("groupadd $groupname"); - if($apache_chrooted) exec("chroot ".escapeshellcmd($web_config['website_basedir'])." groupadd $groupname"); + if($apache_chrooted) $this->_exec("chroot ".escapeshellcmd($web_config['website_basedir'])." groupadd $groupname"); $app->log("Adding the group: $groupname",LOGLEVEL_DEBUG); } $username = escapeshellcmd($data["new"]["system_user"]); if($data["new"]["system_user"] != '' && !$app->system->is_user($data["new"]["system_user"])) { exec("useradd -d ".escapeshellcmd($data["new"]["document_root"])." -g $groupname -G sshusers $username -s /bin/false"); - if($apache_chrooted) exec("chroot ".escapeshellcmd($web_config['website_basedir'])." "."useradd -d ".escapeshellcmd($data["new"]["document_root"])." -g $groupname -G sshusers $username -s /bin/false"); + if($apache_chrooted) $this->_exec("chroot ".escapeshellcmd($web_config['website_basedir'])." "."useradd -d ".escapeshellcmd($data["new"]["document_root"])." -g $groupname -G sshusers $username -s /bin/false"); $app->log("Adding the user: $username",LOGLEVEL_DEBUG); } @@ -498,7 +499,7 @@ //* if we have a chrooted apache enviroment if($apache_chrooted) { - exec("chroot ".escapeshellcmd($web_config['website_basedir'])." ".$command); + $this->_exec("chroot ".escapeshellcmd($web_config['website_basedir'])." ".$command); //* add the apache user to the client group in the chroot enviroment $tmp_groupfile = $app->system->server_conf["group_datei"]; @@ -537,6 +538,10 @@ $this->_exec("chmod 777 ".escapeshellcmd($data["new"]["document_root"]."/tmp")); } + // Change the owner of the error log to the owner of the website + if(!@is_file($data["new"]["document_root"]."/log/error.log")) exec('touch '.escapeshellcmd($data["new"]["document_root"])."/log/error.log"); + $this->_exec("chown $username:$groupname ".escapeshellcmd($data["new"]["document_root"])."/log/error.log"); + // Create the vhost config file $app->load('tpl'); @@ -549,6 +554,7 @@ $vhost_data["web_document_root_www"] = $web_config["website_basedir"]."/".$data["new"]["domain"]."/web"; $vhost_data["web_basedir"] = $web_config["website_basedir"]; $vhost_data["security_level"] = $web_config["security_level"]; + $vhost_data["allow_override"] = ($data["new"]["allow_override"] == '')?'All':$data["new"]["allow_override"]; // Check if a SSL cert exists $ssl_dir = $data["new"]["document_root"]."/ssl"; @@ -574,6 +580,10 @@ $rewrite_rules = array(); if($data["new"]["redirect_type"] != '') { if(substr($data["new"]["redirect_path"],-1) != '/') $data["new"]["redirect_path"] .= '/'; + if($data["new"]["redirect_type"] == 'no' && substr($data["new"]["redirect_path"],0,4) != 'http') { + $data["new"]["redirect_path"] = $data["new"]["document_root"]."/web".realpath($data["new"]["redirect_path"]).'/'; + } + $rewrite_rules[] = array( 'rewrite_domain' => $data["new"]["domain"], 'rewrite_type' => ($data["new"]["redirect_type"] == 'no')?'':'['.$data["new"]["redirect_type"].']', 'rewrite_target' => $data["new"]["redirect_path"]); @@ -621,6 +631,9 @@ // Rewriting if($alias["redirect_type"] != '') { if(substr($data["new"]["redirect_path"],-1) != '/') $data["new"]["redirect_path"] .= '/'; + if($data["new"]["redirect_type"] == 'no' && substr($data["new"]["redirect_path"],0,4) != 'http') { + $data["new"]["redirect_path"] = $data["new"]["document_root"]."/web".realpath($data["new"]["redirect_path"]).'/'; + } $rewrite_rules[] = array( 'rewrite_domain' => $alias["domain"], 'rewrite_type' => ($alias["redirect_type"] == 'no')?'':'['.$alias["redirect_type"].']', 'rewrite_target' => $alias["redirect_path"]); @@ -798,7 +811,7 @@ //* Create .htaccess and .htpasswd file for website statistics if(!is_file($data["new"]["document_root"].'/web/stats/.htaccess') or $data["old"]["document_root"] != $data["new"]["document_root"]) { if(!is_dir($data["new"]["document_root"].'/web/stats')) mkdir($data["new"]["document_root"].'/web/stats'); - $ht_file = "AuthType Basic\nAuthName \"Members Only\"\nAuthUserFile ".$data["new"]["document_root"]."/.htpasswd_stats\n<limit GET PUT POST>\nrequire valid-user\n</limit>"; + $ht_file = "AuthType Basic\nAuthName \"Members Only\"\nAuthUserFile ".$data["new"]["document_root"]."/.htpasswd_stats\nrequire valid-user"; file_put_contents($data["new"]["document_root"].'/web/stats/.htaccess',$ht_file); chmod($data["new"]["document_root"].'/web/stats/.htaccess',0664); unset($ht_file); @@ -814,9 +827,12 @@ } - - // request a httpd reload when all records have been processed - $app->services->restartServiceDelayed('httpd','reload'); + if($apache_chrooted) { + $app->services->restartServiceDelayed('httpd','restart'); + } else { + // request a httpd reload when all records have been processed + $app->services->restartServiceDelayed('httpd','reload'); + } //* Unset action to clean it for next processed vhost. $this->action = ''; @@ -916,7 +932,7 @@ $command = 'userdel'; $command .= ' '.$data["old"]["system_user"]; exec($command); - if($apache_chrooted) exec("chroot ".escapeshellcmd($web_config['website_basedir'])." ".$command); + if($apache_chrooted) $this->_exec("chroot ".escapeshellcmd($web_config['website_basedir'])." ".$command); } } -- Gitblit v1.9.1