From cb8c86a5eb7b70feb29a2ef7503aae497d40bf57 Mon Sep 17 00:00:00 2001 From: wyrie <wyrie@ispconfig3> Date: Wed, 02 Dec 2009 06:57:59 -0500 Subject: [PATCH] Implemented: FS#973 - Gentoo support for installer. Fixed FS#974 - Directory mode for firewall configuration --- install/dist/lib/gentoo.lib.php | 728 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 files changed, 727 insertions(+), 1 deletions(-) diff --git a/install/dist/lib/gentoo.lib.php b/install/dist/lib/gentoo.lib.php index cf8e864..08d3494 100644 --- a/install/dist/lib/gentoo.lib.php +++ b/install/dist/lib/gentoo.lib.php @@ -28,9 +28,735 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ -class installer extends installer_base { +class installer extends installer_base +{ + public function configure_jailkit() + { + global $conf; + + if (is_dir($conf['jailkit']['config_dir'])) + { + $jkinit_content = $this->get_template_file($conf['jailkit']['jk_init'], true); // get contents + $this->write_config_file($conf['jailkit']['config_dir'] . '/' . $conf['jailkit']['jk_init'], $jkinit_content); + + $jkchroot_content = $this->get_template_file($conf['jailkit']['jk_chrootsh'], true); // get contents + $this->write_config_file($conf['jailkit']['config_dir'] . '/' . $conf['jailkit']['jk_chrootsh'], $jkchroot_content); + } + + $command = "chown root:root /var/www"; + caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + + public function configure_postfix($options = '') + { + global $conf; + + $cf = $conf['postfix']; + $config_dir = $cf['config_dir']; + + if(!is_dir($config_dir)){ + $this->error("The postfix configuration directory '$config_dir' does not exist."); + } + + // Install virtual mappings + foreach (glob("tpl/mysql-virtual_*.master") as $filename) { + $this->process_postfix_config( basename($filename, ".master") ); + } + + // Changing mode and group of the new created config files. + caselog('chmod o= '.$config_dir.'/mysql-virtual_*.cf* &> /dev/null', + __FILE__, __LINE__, 'chmod on mysql-virtual_*.cf*', 'chmod on mysql-virtual_*.cf* failed'); + caselog('chgrp '.$cf['group'].' '.$config_dir.'/mysql-virtual_*.cf* &> /dev/null', + __FILE__, __LINE__, 'chgrp on mysql-virtual_*.cf*', 'chgrp on mysql-virtual_*.cf* failed'); + + // Creating virtual mail user and group + $command = 'groupadd -g '.$cf['vmail_groupid'].' '.$cf['vmail_groupname']; + if (!is_group($cf['vmail_groupname'])) { + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + $command = 'useradd -g '.$cf['vmail_groupname'].' -u '.$cf['vmail_userid'].' '.$cf['vmail_username'].' -d '.$cf['vmail_mailbox_base'].' -m'; + if (!is_user($cf['vmail_username'])) { + caselog("$command &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + $postconf_commands = array ( + 'myhostname = '.$conf['hostname'], + 'mydestination = '.$conf['hostname'].', localhost, localhost.localdomain', + 'mynetworks = 127.0.0.0/8 [::1]/128', + 'virtual_alias_domains =', + 'virtual_alias_maps = proxy:mysql:'.$config_dir.'/mysql-virtual_forwardings.cf, mysql:'.$config_dir.'/mysql-virtual_email2email.cf', + 'virtual_mailbox_domains = proxy:mysql:'.$config_dir.'/mysql-virtual_domains.cf', + 'virtual_mailbox_maps = proxy:mysql:'.$config_dir.'/mysql-virtual_mailboxes.cf', + 'virtual_mailbox_base = '.$cf['vmail_mailbox_base'], + 'virtual_uid_maps = static:'.$cf['vmail_userid'], + 'virtual_gid_maps = static:'.$cf['vmail_groupid'], + 'smtpd_sasl_auth_enable = yes', + 'broken_sasl_auth_clients = yes', + 'smtpd_sasl_authenticated_header = yes', + 'smtpd_recipient_restrictions = permit_mynetworks, permit_sasl_authenticated, check_recipient_access mysql:'.$config_dir.'/mysql-virtual_recipient.cf, reject_unauth_destination', + 'smtpd_use_tls = yes', + 'smtpd_tls_security_level = may', + 'smtpd_tls_cert_file = '.$config_dir.'/smtpd.cert', + 'smtpd_tls_key_file = '.$config_dir.'/smtpd.key', + 'transport_maps = proxy:mysql:'.$config_dir.'/mysql-virtual_transports.cf', + 'relay_domains = mysql:'.$config_dir.'/mysql-virtual_relaydomains.cf', + 'virtual_create_maildirsize = yes', + 'virtual_maildir_extended = yes', + 'virtual_mailbox_limit_maps = proxy:mysql:'.$config_dir.'/mysql-virtual_mailbox_limit_maps.cf', + 'virtual_mailbox_limit_override = yes', + 'virtual_maildir_limit_message = "The user you are trying to reach is over quota."', + 'virtual_overquota_bounce = yes', + 'proxy_read_maps = $local_recipient_maps $mydestination $virtual_alias_maps $virtual_alias_domains $virtual_mailbox_maps $virtual_mailbox_domains $relay_recipient_maps $relay_domains $canonical_maps $sender_canonical_maps $recipient_canonical_maps $relocated_maps $transport_maps $mynetworks $virtual_mailbox_limit_maps', + 'smtpd_sender_restrictions = check_sender_access mysql:'.$config_dir.'/mysql-virtual_sender.cf', + 'smtpd_client_restrictions = check_client_access mysql:'.$config_dir.'/mysql-virtual_client.cf', + 'maildrop_destination_concurrency_limit = 1', + 'maildrop_destination_recipient_limit = 1', + 'virtual_transport = maildrop', + 'header_checks = regexp:'.$config_dir.'/header_checks', + 'mime_header_checks = regexp:'.$config_dir.'/mime_header_checks', + 'nested_header_checks = regexp:'.$config_dir.'/nested_header_checks', + 'body_checks = regexp:'.$config_dir.'/body_checks' + ); + + // Create the header and body check files + touch($config_dir.'/header_checks'); + touch($config_dir.'/mime_header_checks'); + touch($config_dir.'/nested_header_checks'); + touch($config_dir.'/body_checks'); + + + // Make a backup copy of the main.cf file + copy($config_dir.'/main.cf', $config_dir.'/main.cf~'); + + // Executing the postconf commands + foreach($postconf_commands as $cmd) { + $command = "postconf -e '$cmd'"; + caselog($command." &> /dev/null", __FILE__, __LINE__, 'EXECUTED: '.$command, 'Failed to execute the command '.$command); + } + + // Create the SSL certificate + if (!stristr($options,'dont-create-certs')) + { + $command = 'cd '.$config_dir.'; ' + .'openssl req -new -outform PEM -out smtpd.cert -newkey rsa:2048 -nodes -keyout smtpd.key -keyform PEM -days 365 -x509'; + exec($command); + + $command = 'chmod o= '.$config_dir.'/smtpd.key'; + caselog($command.' &> /dev/null', __FILE__, __LINE__, 'EXECUTED: '.$command, 'Failed to execute the command '.$command); + } + + // We have to change the permissions of the courier authdaemon directory to make it accessible for maildrop. + $command = 'chmod 755 /var/run/courier/authdaemon/'; + caselog($command.' &> /dev/null', __FILE__, __LINE__, 'EXECUTED: '.$command, 'Failed to execute the command '.$command); + + // Changing maildrop lines in posfix master.cf + $configfile = $config_dir.'/master.cf'; + $content = rf($configfile); + + $content = preg_replace('/^#?maildrop/m', 'maildrop', $content); + $content = preg_replace('/^#?(\s+)flags=DRhu user=vmail argv=\/usr\/bin\/maildrop -d/m', + '$1flags=DRhu user=vmail argv=/usr/bin/maildrop -d vmail \${extension} \${recipient} \${user} \${nexthop} \${sender}', + $content); + + $this->write_config_file($configfile, $content); + + // Writing the Maildrop mailfilter file + $content = rf("tpl/mailfilter.master"); + $content = str_replace('{dist_postfix_vmail_mailbox_base}', $cf['vmail_mailbox_base'], $content); + + $this->write_config_file($cf['vmail_mailbox_base'].'/.mailfilter', $content); + + // Create the directory for the custom mailfilters + if (!is_dir($cf['vmail_mailbox_base'].'/mailfilters')) + { + $command = 'mkdir '.$cf['vmail_mailbox_base'].'/mailfilters'; + caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + + // Chmod and chown the .mailfilter file + $command = 'chown -R '.$cf['vmail_username'].':'.$cf['vmail_groupname'].' '.$cf['vmail_mailbox_base'].'/.mailfilter'; + caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + + $command = 'chmod -R 600 '.$cf['vmail_mailbox_base'].'/.mailfilter'; + caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + + } + + public function configure_saslauthd() + { + global $conf; + + $content = $this->get_template_file('sasl_smtpd.conf', true, true); // get contents & insert db cred + $this->write_config_file($conf['saslauthd']['config_dir'].'/smtpd.conf', $content); + + // Edit the file saslauthd config file + $content = rf($conf["saslauthd"]["config_file"]); + $content = preg_replace('/(?<=\n)SASLAUTHD_OPTS="\$\{SASLAUTHD_OPTS\}[^"]+"/', 'SASLAUTHD_OPTS="${SASLAUTHD_OPTS} -a pam -r -c -s 128 -t 30 -n 5"', $content); + + $this->write_config_file($conf["saslauthd"]["config_file"], $content); + } + + public function configure_courier() + { + global $conf; + + // authmysqlrc + $content = $this->get_template_file('authmysqlrc', true, true); // get contents & insert db cred + $this->write_config_file($conf['courier']['config_dir'].'/authmysqlrc', $content); + + // authdaemonrc + $configfile = $conf['courier']['config_dir'].'/authdaemonrc'; + + $content = rf($configfile); + $content = preg_replace('/(?<=\n)authmodulelist="[^"]+"/', "authmodulelist=\"authmysql\"", $content); + $this->write_config_file($configfile, $content); + + // create certificates + $command = "mkimapdcert"; + caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + + $command = "mkpop3dcert"; + caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + + public function configure_spamassassin() + { + return true; + } + + public function configure_getmail() + { + global $conf; + + $config_dir = $conf['getmail']['config_dir']; + + if (!is_dir($config_dir)) { + exec("mkdir -p ".escapeshellcmd($config_dir)); + } + + $command = "useradd -d $config_dir ".$conf['getmail']['user']; + if (!is_user('getmail')) { + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + + $command = "chown -R getmail $config_dir"; + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + + $command = "chmod -R 700 $config_dir"; + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + + // Getmail will be run from cron. In order to have access to cron the getmail user needs to be part of the cron group. + $command = "gpasswd -a getmail " . $conf['cron']['group']; + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + + public function configure_amavis() + { + global $conf; + + // Amavisd-new user config file + $conf_file = 'amavisd-ispconfig.conf'; + $conf_path = dirname($conf['amavis']['config_file']) . '/' . $conf_file; + + $content = $this->get_template_file($conf_file, true, true); // get contents & insert db cred + $this->write_config_file($conf_path, $content); + + // Activate config directory in default file + $amavis_conf = rf($conf['amavis']['config_file']); + if (strpos($amavis_conf, $conf_path) === false) + { + $amavis_conf = preg_replace('/(#-------------\n1;)/', + "include_config_files('$conf_path');\n$1", + $amavis_conf); + + $this->write_config_file($conf['amavis']['config_file'], $amavis_conf); + } + + // Adding the amavisd commands to the postfix configuration + $postconf_commands = array ( + 'content_filter = amavis:[127.0.0.1]:10024', + 'receive_override_options = no_address_mappings' + ); + + foreach($postconf_commands as $cmd) { + $command = "postconf -e '$cmd'"; + caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + + // Append the configuration for amavisd to the master.cf file + $content = rf($conf["postfix"]["config_dir"].'/master.cf'); + + if(!stristr($content,"127.0.0.1:10025")) // Only add the content if we had not addded it before + { + unset($content); + $content = $this->get_template_file("master_cf_amavis", true); + af($conf["postfix"]["config_dir"].'/master.cf', $content); + } + unset($content); + + // Add the clamav user to the amavis group + exec('usermod -a -G amavis clamav'); + } + + public function configure_pureftpd() + { + global $conf; + + //* configure pure-ftpd for MySQL authentication against the ispconfig database + $content = $this->get_template_file('pureftpd_mysql.conf', true, true); // get contents & insert db cred + $content = str_replace('{server_id}', $conf["server_id"], $content); + + $this->write_config_file($conf['pureftpd']['mysql_config_file'], $content, 600, 'root', 'root'); + + // **enable pure-ftpd and server settings + $content = rf($conf["pureftpd"]["config_file"]); + + $content = preg_replace('/#?IS_CONFIGURED="(?:yes|no)"/', 'IS_CONFIGURED="yes"', $content); + $content = str_replace('AUTH="-l unix"', 'AUTH="-l mysql:'.$conf['pureftpd']['mysql_config_file'].'"', $content); + + // Logging defaults to syslog's ftp facility. Override this behaviour for better compatibility with debian/ubuntu + // and specify the format. + $logdir = '/var/log/pure-ftpd'; + if (!is_dir($logdir)) { + mkdir($logdir, 0755, true); + } + + /* + * @link http://download.pureftpd.org/pub/pure-ftpd/doc/README + * -b brokenclientscompatibility + * -A chrooteveryone + * -E noanonymous + * -O altlog <format>:<log file> + * -Z customerproof (Add safe guards against common customer mistakes ie. like chmod 0 on their own files) + */ + $content = preg_replace('/MISC_OTHER="[^"]+"/', 'MISC_OTHER="-b -A -E -Z -O clf:'.$logdir.'/transfer.log"', $content); + + $this->write_config_file($conf["pureftpd"]["config_file"], $content); + } + + public function configure_powerdns() + { + global $conf; + + //* Create the database + if(!$this->db->query('CREATE DATABASE IF NOT EXISTS '.$conf['powerdns']['database'].' DEFAULT CHARACTER SET '.$conf['mysql']['charset'])) { + $this->error('Unable to create MySQL database: '.$conf['powerdns']['database'].'.'); + } + + //* Create the ISPConfig database user in the local database + $query = "GRANT ALL ON `".$conf['powerdns']['database']."` . * TO '".$conf['mysql']['ispconfig_user']."'@'localhost';"; + if(!$this->db->query($query)) { + $this->error('Unable to create user for powerdns database Error: '.$this->db->errorMessage); + } + + //* Reload database privelages + $this->db->query('FLUSH PRIVILEGES;'); + + //* load the powerdns databse dump + if($conf['mysql']['admin_password'] == '') { + caselog("mysql --default-character-set=".$conf['mysql']['charset']." -h '".$conf['mysql']['host']."' -u '".$conf['mysql']['admin_user']."' '".$conf['powerdns']['database']."' < '".ISPC_INSTALL_ROOT."/install/sql/powerdns.sql' &> /dev/null", + __FILE__, __LINE__, 'read in ispconfig3.sql', 'could not read in powerdns.sql'); + } else { + caselog("mysql --default-character-set=".$conf['mysql']['charset']." -h '".$conf['mysql']['host']."' -u '".$conf['mysql']['admin_user']."' -p'".$conf['mysql']['admin_password']."' '".$conf['powerdns']['database']."' < '".ISPC_INSTALL_ROOT."/install/sql/powerdns.sql' &> /dev/null", + __FILE__, __LINE__, 'read in ispconfig3.sql', 'could not read in powerdns.sql'); + } + + //* Create the powerdns config file + $content = $this->get_template_file('pdns.local', true, true); // get contents & insert db cred + $content = str_replace('{powerdns_database}', $conf['powerdns']['database'], $content); + + $this->write_config_file($conf["powerdns"]["config_dir"].'/'.$conf["powerdns"]["config_file"], $content, 600, 'root', 'root'); + + // Create symlink to init script to start the correct config file + if( !is_link($conf['init_scripts'].'/'.$conf['powerdns']['init_script']) ) { + symlink($conf['init_scripts'].'/pdns', $conf['init_scripts'].'/'.$conf['powerdns']['init_script']); + } + } + + public function configure_apache() + { + global $conf; + + // Create the logging directory for the vhost logfiles + if (!is_dir('/var/log/ispconfig/httpd')) { + mkdir('/var/log/ispconfig/httpd', 0755, true); + } + + if (is_file($conf['suphp']['config_file'])) + { + $content = rf($conf['suphp']['config_file']); + + $content = preg_replace('/;Handler for php-scripts/',";Handler for php-scripts\nx-httpd-suphp=php:/usr/bin/php-cgi", $content); + $content = preg_replace('/;?umask=\d+/','umask=0022', $content); + + $this->write_config_file($conf['suphp']['config_file'], $content); + } + + // Enable ISPConfig default vhost settings + $default_vhost_path = $conf['apache']['vhost_conf_dir'].'/'.$conf['apache']['vhost_default']; + if (is_file($default_vhost_path)) + { + $content = rf($default_vhost_path); + + $content = preg_replace('/^#?\s*NameVirtualHost.*$/m', 'NameVirtualHost *:80', $content); + $content = preg_replace('/<VirtualHost[^>]+>/', '<VirtualHost *:80>', $content); + + $this->write_config_file($default_vhost_path, $content); + } + + // Generate default ssl certificates + if (!is_dir($conf['apache']['ssl_dir'])) { + mkdir($conf['apache']['ssl_dir']); + } + + if ($conf['services']['mail'] == true) + { + copy($conf['postfix']['config_dir']."/smtpd.key", $conf['apache']['ssl_dir']."/server.key"); + copy($conf['postfix']['config_dir']."/smtpd.cert", $conf['apache']['ssl_dir']."/server.crt"); + } + else + { + if (!is_file($conf['apache']['ssl_dir'] . '/server.crt')) { + exec("openssl req -new -outform PEM -out {$conf['apache']['ssl_dir']}/server.crt -newkey rsa:2048 -nodes -keyout {$conf['apache']['ssl_dir']}/server.key -keyform PEM -days 365 -x509"); + } + } + + + + // Copy the ISPConfig configuration include + $content = $this->get_template_file('apache_ispconfig.conf', true); + + $records = $this->db->queryAllRecords("SELECT * FROM server_ip WHERE server_id = ".$conf["server_id"]." AND virtualhost = 'y'"); + if(is_array($records) && count($records) > 0) + { + foreach($records as $rec) { + $content .= "NameVirtualHost ".$rec["ip_address"].":80\n"; + $content .= "NameVirtualHost ".$rec["ip_address"].":443\n"; + } + } + + $this->write_config_file($conf['apache']['vhost_conf_dir'].'/000-ispconfig.conf', $content); + + // Gentoo by default does not include .vhost files. Add include line to config file. + $content = rf($conf['apache']['config_file']); + if ( strpos($content, 'Include /etc/apache2/vhosts.d/*.vhost') === false ) { + $content = preg_replace('|(Include /etc/apache2/vhosts.d/\*.conf)|',"$1\nInclude /etc/apache2/vhosts.d/*.vhost", $content); + } + + $this->write_config_file($conf['apache']['config_file'], $content); + + // make sure that webalizer finds its config file when it is directly in /etc + if(is_file('/etc/webalizer.conf') && !is_dir('/etc/webalizer')) + { + mkdir('/etc/webalizer', 0755); + symlink('/etc/webalizer.conf', '/etc/webalizer/webalizer.conf'); + } + + if(is_file('/etc/webalizer/webalizer.conf')) // Change webalizer mode to incremental + { + replaceLine('/etc/webalizer/webalizer.conf','#IncrementalName','IncrementalName webalizer.current',0,0); + replaceLine('/etc/webalizer/webalizer.conf','#Incremental','Incremental yes',0,0); + replaceLine('/etc/webalizer/webalizer.conf','#HistoryName','HistoryName webalizer.hist',0,0); + } + + // add a sshusers group + if (!is_group('sshusers')) + { + $command = 'groupadd sshusers'; + caselog($command.' &> /dev/null 2> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + } + + public function configure_apps_vhost() + { + global $conf; + + //* Create the ispconfig apps vhost user and group + + $apps_vhost_user = $conf['web']['apps_vhost_user']; + $apps_vhost_group = $conf['web']['apps_vhost_group']; + $install_dir = $conf['web']['website_basedir'].'/apps'; + + $command = 'groupadd '.$apps_vhost_user; + if ( !is_group($apps_vhost_group) ) { + caselog($command.' &> /dev/null 2> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + + $command = "useradd -g '$apps_vhost_group' -d $install_dir $apps_vhost_group"; + if ( !is_user($apps_vhost_user) ) { + caselog($command.' &> /dev/null 2> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + + $command = 'adduser '.$conf['apache']['user'].' '.$apps_vhost_group; + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + + exec('mkdir -p '.escapeshellcmd($conf['web']['website_basedir'].'/apps')); + + //* Copy the apps vhost file + $vhost_conf_dir = $conf['apache']['vhost_conf_dir']; + $vhost_conf_enabled_dir = $conf['apache']['vhost_conf_enabled_dir']; + $apps_vhost_servername = ($conf['web']['apps_vhost_servername'] == '') ? '' : 'ServerName '.$conf['web']['apps_vhost_servername']; + + // Dont just copy over the virtualhost template but add some custom settings + $content = $this->get_template_file('apache_apps.vhost', true); + + $content = str_replace('{apps_vhost_ip}', $conf['web']['apps_vhost_ip'], $content); + $content = str_replace('{apps_vhost_port}', $conf['web']['apps_vhost_port'], $content); + $content = str_replace('{apps_vhost_dir}', $conf['web']['website_basedir'].'/apps', $content); + $content = str_replace('{website_basedir}', $conf['web']['website_basedir'], $content); + $content = str_replace('{apps_vhost_servername}', $apps_vhost_servername, $content); + + // comment out the listen directive if port is 80 or 443 + if($conf['web']['apps_vhost_ip'] == 80 or $conf['web']['apps_vhost_ip'] == 443) { + $content = str_replace('{vhost_port_listen}', '#', $content); + } else { + $content = str_replace('{vhost_port_listen}', '', $content); + } + + $this->write_config_file("$vhost_conf_dir/apps.vhost", $content); + + if ( !is_file($conf['web']['website_basedir'].'/php-fcgi-scripts/apps/.php-fcgi-starter') ) + { + exec('mkdir -p '.$conf['web']['website_basedir'].'/php-fcgi-scripts/apps'); + exec('cp tpl/apache_apps_fcgi_starter.master '.$conf['web']['website_basedir'].'/php-fcgi-scripts/apps/.php-fcgi-starter'); + exec('chmod +x '.$conf['web']['website_basedir'].'/php-fcgi-scripts/apps/.php-fcgi-starter'); + exec('chown -R ispapps:ispapps '.$conf['web']['website_basedir'].'/php-fcgi-scripts/apps'); + + } + } + + public function install_ispconfig() + { + global $conf; + + $install_dir = $conf['ispconfig_install_dir']; + + // Create the ISPConfig installation directory + if(!is_dir($install_dir)) + { + $command = "mkdir $install_dir"; + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + + // Create a ISPConfig user and group + if (!is_group('ispconfig')) + { + $command = 'groupadd ispconfig'; + caselog($command.' &> /dev/null 2> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + + if (!is_user('ispconfig')) + { + $command = "useradd -g ispconfig -d $install_dir ispconfig"; + caselog($command.' &> /dev/null 2> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + } + + // copy the ISPConfig interface part + $command = "cp -rf ../interface $install_dir"; + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + + // copy the ISPConfig server part + $command = "cp -rf ../server $install_dir"; + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + + + // Create the config file for ISPConfig interface + $configfile = 'config.inc.php'; + $content = $this->get_template_file($configfile, true, true); // get contents & insert db cred + + $content = str_replace('{mysql_master_server_ispconfig_user}', $conf['mysql']['master_ispconfig_user'], $content); + $content = str_replace('{mysql_master_server_ispconfig_password}', $conf['mysql']['master_ispconfig_password'], $content); + $content = str_replace('{mysql_master_server_database}', $conf['mysql']['master_database'], $content); + $content = str_replace('{mysql_master_server_host}', $conf['mysql']['master_host'], $content); + + $content = str_replace('{server_id}', $conf['server_id'], $content); + $content = str_replace('{ispconfig_log_priority}', $conf['ispconfig_log_priority'], $content); + $content = str_replace('{language}', $conf['language'], $content); + + $this->write_config_file("$install_dir/interface/lib/$configfile", $content); + + // Create the config file for ISPConfig server + $this->write_config_file("$install_dir/server/lib/$configfile", $content); + + // Enable the server modules and plugins. + // TODO: Implement a selector which modules and plugins shall be enabled. + $dir = $install_dir.'/server/mods-available/'; + if (is_dir($dir)) { + if ($dh = opendir($dir)) { + while (($file = readdir($dh)) !== false) { + if($file != '.' && $file != '..' && substr($file,-8,8) == '.inc.php') { + include_once($install_dir.'/server/mods-available/'.$file); + $module_name = substr($file,0,-8); + $tmp = new $module_name; + if($tmp->onInstall()) { + if(!@is_link($install_dir.'/server/mods-enabled/'.$file)) @symlink($install_dir.'/server/mods-available/'.$file, $install_dir.'/server/mods-enabled/'.$file); + if (strpos($file, '_core_module') !== false) { + if(!@is_link($install_dir.'/server/mods-core/'.$file)) @symlink($install_dir.'/server/mods-available/'.$file, $install_dir.'/server/mods-core/'.$file); + } + } + unset($tmp); + } + } + closedir($dh); + } + } + + $dir = $install_dir.'/server/plugins-available/'; + if (is_dir($dir)) { + if ($dh = opendir($dir)) { + while (($file = readdir($dh)) !== false) { + if($file != '.' && $file != '..' && substr($file,-8,8) == '.inc.php') { + include_once($install_dir.'/server/plugins-available/'.$file); + $plugin_name = substr($file,0,-8); + $tmp = new $plugin_name; + if(method_exists($tmp,'onInstall') && $tmp->onInstall()) { + if(!@is_link($install_dir.'/server/plugins-enabled/'.$file)) @symlink($install_dir.'/server/plugins-available/'.$file, $install_dir.'/server/plugins-enabled/'.$file); + if (strpos($file, '_core_plugin') !== false) { + if(!@is_link($install_dir.'/server/plugins-core/'.$file)) @symlink($install_dir.'/server/plugins-available/'.$file, $install_dir.'/server/plugins-core/'.$file); + } + } + unset($tmp); + } + } + closedir($dh); + } + } + + // Update the server config + $mail_server_enabled = ($conf['services']['mail'])?1:0; + $web_server_enabled = ($conf['services']['web'])?1:0; + $dns_server_enabled = ($conf['services']['dns'])?1:0; + $file_server_enabled = ($conf['services']['file'])?1:0; + $db_server_enabled = ($conf['services']['db'])?1:0; + $vserver_server_enabled = ($conf['services']['vserver'])?1:0; + + $sql = "UPDATE `server` SET mail_server = '$mail_server_enabled', web_server = '$web_server_enabled', dns_server = '$dns_server_enabled', file_server = '$file_server_enabled', db_server = '$db_server_enabled', vserver_server = '$vserver_server_enabled' WHERE server_id = ".intval($conf['server_id']); + + if($conf['mysql']['master_slave_setup'] == 'y') { + $this->dbmaster->query($sql); + $this->db->query($sql); + } else { + $this->db->query($sql); + } + + // Chmod the files + $command = "chmod -R 750 $install_dir"; + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + + // chown the files to the ispconfig user and group + $command = "chown -R ispconfig:ispconfig $install_dir"; + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + + // Make the global language file directory group writable + exec("chmod -R 770 $install_dir/interface/lib/lang"); + + // Make the temp directory for language file exports writable + exec("chmod -R 770 $install_dir/interface/web/temp"); + + // Make all interface language file directories group writable + $handle = @opendir($install_dir.'/interface/web'); + while ($file = @readdir ($handle)) { + if ($file != '.' && $file != '..') { + if(@is_dir($install_dir.'/interface/web'.'/'.$file.'/lib/lang')) { + $handle2 = opendir($install_dir.'/interface/web'.'/'.$file.'/lib/lang'); + chmod($install_dir.'/interface/web'.'/'.$file.'/lib/lang',0770); + while ($lang_file = @readdir ($handle2)) { + if ($lang_file != '.' && $lang_file != '..') { + chmod($install_dir.'/interface/web'.'/'.$file.'/lib/lang/'.$lang_file,0770); + } + } + } + } + } + + // make sure that the server config file (not the interface one) is only readable by the root user + exec("chmod 600 $install_dir/server/lib/$configfile"); + exec("chown root:root $install_dir/server/lib/$configfile"); + if (is_file("$install_dir/server/lib/mysql_clientdb.conf")) { + exec("chmod 600 $install_dir/server/lib/mysql_clientdb.conf"); + exec("chown root:root $install_dir/server/lib/mysql_clientdb.conf"); + } + + // TODO: FIXME: add the www-data user to the ispconfig group. This is just for testing + // and must be fixed as this will allow the apache user to read the ispconfig files. + // Later this must run as own apache server or via suexec! + $command = 'usermod -a -G ispconfig '.$conf['apache']['user']; + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + + // Make the shell scripts executable + $command = "chmod +x $install_dir/server/scripts/*.sh"; + caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command"); + + // Copy the ISPConfig vhost for the controlpanel + $content = $this->get_template_file("apache_ispconfig.vhost", true); + $content = str_replace('{vhost_port}', $conf['apache']['vhost_port'], $content); + + // comment out the listen directive if port is 80 or 443 + if ($conf['apache']['vhost_port'] == 80 or $conf['apache']['vhost_port'] == 443) { + $content = str_replace('{vhost_port_listen}', '#', $content); + } else { + $content = str_replace('{vhost_port_listen}', '', $content); + } + + $vhost_path = $conf['apache']['vhost_conf_dir'].'/ispconfig.vhost'; + $this->write_config_file($vhost_path, $content); + + if (!is_file('/var/www/php-fcgi-scripts/ispconfig/.php-fcgi-starter')) + { + mkdir('/var/www/php-fcgi-scripts/ispconfig', 0755, true); + copy('tpl/apache_ispconfig_fcgi_starter.master', '/var/www/php-fcgi-scripts/ispconfig/.php-fcgi-starter'); + chmod('/var/www/php-fcgi-scripts/ispconfig/.php-fcgi-starter', 0755); + symlink('/usr/local/ispconfig/interface/web', '/var/www/ispconfig'); + exec('chown -R ispconfig:ispconfig /var/www/php-fcgi-scripts/ispconfig'); + } + + // Install the update script + if (is_file('/usr/local/bin/ispconfig_update_from_svn.sh')) { + unlink('/usr/local/bin/ispconfig_update_from_svn.sh'); + } + + chown('/usr/local/ispconfig/server/scripts/update_from_svn.sh', 'root'); + chmod('/usr/local/ispconfig/server/scripts/update_from_svn.sh', 0700); + chown('/usr/local/ispconfig/server/scripts/update_from_tgz.sh', 'root'); + chmod('/usr/local/ispconfig/server/scripts/update_from_tgz.sh', 0700); + chown('/usr/local/ispconfig/server/scripts/ispconfig_update.sh', 'root'); + chmod('/usr/local/ispconfig/server/scripts/ispconfig_update.sh', 0700); + + if (!is_link('/usr/local/bin/ispconfig_update_from_svn.sh')) { + symlink('/usr/local/ispconfig/server/scripts/ispconfig_update.sh', '/usr/local/bin/ispconfig_update_from_svn.sh'); + } + + if (!is_link('/usr/local/bin/ispconfig_update.sh')) { + symlink('/usr/local/ispconfig/server/scripts/ispconfig_update.sh', '/usr/local/bin/ispconfig_update.sh'); + } + + // Make the logs readable for the ispconfig user + if (is_file('/var/log/maillog')) { + exec('chmod +r /var/log/maillog'); + } + if (is_file('/var/log/messages')) { + exec('chmod +r /var/log/messages'); + } + if (is_file('/var/log/clamav/clamav.log')) { + exec('chmod +r /var/log/clamav/clamav.log'); + } + if (is_file('/var/log/clamav/freshclam.log')) { + exec('chmod +r /var/log/clamav/freshclam.log'); + } + + // Create the ispconfig log directory + if (!is_dir('/var/log/ispconfig')) { + mkdir('/var/log/ispconfig'); + } + if (!is_file('/var/log/ispconfig/ispconfig.log')) { + exec('touch /var/log/ispconfig/ispconfig.log'); + } + + exec('mv /usr/local/ispconfig/server/scripts/run-getmail.sh /usr/local/bin/run-getmail.sh'); + exec('chown getmail /usr/local/bin/run-getmail.sh'); + exec('chmod 744 /usr/local/bin/run-getmail.sh'); + } } ?> \ No newline at end of file -- Gitblit v1.9.1