From cb8c86a5eb7b70feb29a2ef7503aae497d40bf57 Mon Sep 17 00:00:00 2001
From: wyrie <wyrie@ispconfig3>
Date: Wed, 02 Dec 2009 06:57:59 -0500
Subject: [PATCH] Implemented: FS#973 - Gentoo support for installer. Fixed FS#974 - Directory mode for firewall configuration

---
 install/dist/lib/gentoo.lib.php |  728 +++++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 files changed, 727 insertions(+), 1 deletions(-)

diff --git a/install/dist/lib/gentoo.lib.php b/install/dist/lib/gentoo.lib.php
index cf8e864..08d3494 100644
--- a/install/dist/lib/gentoo.lib.php
+++ b/install/dist/lib/gentoo.lib.php
@@ -28,9 +28,735 @@
 EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */
 
-class installer extends installer_base {
+class installer extends installer_base 
+{
+	public function configure_jailkit()
+    {
+        global $conf;
+		
+		if (is_dir($conf['jailkit']['config_dir']))
+		{
+			$jkinit_content = $this->get_template_file($conf['jailkit']['jk_init'], true); // get contents
+			$this->write_config_file($conf['jailkit']['config_dir'] . '/' . $conf['jailkit']['jk_init'], $jkinit_content);
+			
+			$jkchroot_content = $this->get_template_file($conf['jailkit']['jk_chrootsh'], true); // get contents
+			$this->write_config_file($conf['jailkit']['config_dir'] . '/' . $conf['jailkit']['jk_chrootsh'], $jkchroot_content);
+		}
+		
+		$command = "chown root:root /var/www";
+		caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+    }
+	
+	public function configure_postfix($options = '')
+    {
+        global $conf;
+		
+        $cf = $conf['postfix'];
+		$config_dir = $cf['config_dir'];
+        
+		if(!is_dir($config_dir)){
+            $this->error("The postfix configuration directory '$config_dir' does not exist.");
+        }
+        
+        // Install virtual mappings
+        foreach (glob("tpl/mysql-virtual_*.master") as $filename) {
+        	$this->process_postfix_config( basename($filename, ".master") );
+        }
+        
+		// Changing mode and group of the new created config files.
+		caselog('chmod o= '.$config_dir.'/mysql-virtual_*.cf* &> /dev/null',
+                 __FILE__, __LINE__, 'chmod on mysql-virtual_*.cf*', 'chmod on mysql-virtual_*.cf* failed');
+		caselog('chgrp '.$cf['group'].' '.$config_dir.'/mysql-virtual_*.cf* &> /dev/null', 
+                __FILE__, __LINE__, 'chgrp on mysql-virtual_*.cf*', 'chgrp on mysql-virtual_*.cf* failed');
+		
+		// Creating virtual mail user and group
+		$command = 'groupadd -g '.$cf['vmail_groupid'].' '.$cf['vmail_groupname'];
+		if (!is_group($cf['vmail_groupname'])) {
+			caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		}
 
+		$command = 'useradd -g '.$cf['vmail_groupname'].' -u '.$cf['vmail_userid'].' '.$cf['vmail_username'].' -d '.$cf['vmail_mailbox_base'].' -m';
+		if (!is_user($cf['vmail_username'])) {
+			caselog("$command &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");		
+		}
 
+		$postconf_commands = array (
+			'myhostname = '.$conf['hostname'],
+			'mydestination = '.$conf['hostname'].', localhost, localhost.localdomain',
+			'mynetworks = 127.0.0.0/8 [::1]/128',
+			'virtual_alias_domains =',
+			'virtual_alias_maps = proxy:mysql:'.$config_dir.'/mysql-virtual_forwardings.cf, mysql:'.$config_dir.'/mysql-virtual_email2email.cf',
+			'virtual_mailbox_domains = proxy:mysql:'.$config_dir.'/mysql-virtual_domains.cf',
+			'virtual_mailbox_maps = proxy:mysql:'.$config_dir.'/mysql-virtual_mailboxes.cf',
+			'virtual_mailbox_base = '.$cf['vmail_mailbox_base'],
+			'virtual_uid_maps = static:'.$cf['vmail_userid'],
+			'virtual_gid_maps = static:'.$cf['vmail_groupid'],
+			'smtpd_sasl_auth_enable = yes',
+			'broken_sasl_auth_clients = yes',
+			'smtpd_sasl_authenticated_header = yes',
+			'smtpd_recipient_restrictions = permit_mynetworks, permit_sasl_authenticated, check_recipient_access mysql:'.$config_dir.'/mysql-virtual_recipient.cf, reject_unauth_destination',
+			'smtpd_use_tls = yes',
+			'smtpd_tls_security_level = may',
+			'smtpd_tls_cert_file = '.$config_dir.'/smtpd.cert',
+			'smtpd_tls_key_file = '.$config_dir.'/smtpd.key',
+			'transport_maps = proxy:mysql:'.$config_dir.'/mysql-virtual_transports.cf',
+			'relay_domains = mysql:'.$config_dir.'/mysql-virtual_relaydomains.cf',
+			'virtual_create_maildirsize = yes',
+			'virtual_maildir_extended = yes',
+			'virtual_mailbox_limit_maps = proxy:mysql:'.$config_dir.'/mysql-virtual_mailbox_limit_maps.cf',
+			'virtual_mailbox_limit_override = yes',
+			'virtual_maildir_limit_message = "The user you are trying to reach is over quota."',
+			'virtual_overquota_bounce = yes',
+			'proxy_read_maps = $local_recipient_maps $mydestination $virtual_alias_maps $virtual_alias_domains $virtual_mailbox_maps $virtual_mailbox_domains $relay_recipient_maps $relay_domains $canonical_maps $sender_canonical_maps $recipient_canonical_maps $relocated_maps $transport_maps $mynetworks $virtual_mailbox_limit_maps',
+			'smtpd_sender_restrictions = check_sender_access mysql:'.$config_dir.'/mysql-virtual_sender.cf',
+			'smtpd_client_restrictions = check_client_access mysql:'.$config_dir.'/mysql-virtual_client.cf',
+			'maildrop_destination_concurrency_limit = 1',
+			'maildrop_destination_recipient_limit   = 1',
+			'virtual_transport = maildrop',
+			'header_checks = regexp:'.$config_dir.'/header_checks',
+			'mime_header_checks = regexp:'.$config_dir.'/mime_header_checks',
+			'nested_header_checks = regexp:'.$config_dir.'/nested_header_checks',
+			'body_checks = regexp:'.$config_dir.'/body_checks'
+		);
+		
+		// Create the header and body check files
+		touch($config_dir.'/header_checks');
+		touch($config_dir.'/mime_header_checks');
+		touch($config_dir.'/nested_header_checks');
+		touch($config_dir.'/body_checks');
+		
+		
+		// Make a backup copy of the main.cf file
+		copy($config_dir.'/main.cf', $config_dir.'/main.cf~');
+		
+		// Executing the postconf commands
+		foreach($postconf_commands as $cmd) {
+			$command = "postconf -e '$cmd'";
+			caselog($command." &> /dev/null", __FILE__, __LINE__, 'EXECUTED: '.$command, 'Failed to execute the command '.$command);
+		}
+		
+		// Create the SSL certificate
+		if (!stristr($options,'dont-create-certs'))  
+		{
+			$command = 'cd '.$config_dir.'; '
+                      .'openssl req -new -outform PEM -out smtpd.cert -newkey rsa:2048 -nodes -keyout smtpd.key -keyform PEM -days 365 -x509';
+			exec($command);
+		
+			$command = 'chmod o= '.$config_dir.'/smtpd.key';
+			caselog($command.' &> /dev/null', __FILE__, __LINE__, 'EXECUTED: '.$command, 'Failed to execute the command '.$command);
+		}
+		
+		// We have to change the permissions of the courier authdaemon directory to make it accessible for maildrop.
+		$command = 'chmod 755  /var/run/courier/authdaemon/';
+		caselog($command.' &> /dev/null', __FILE__, __LINE__, 'EXECUTED: '.$command, 'Failed to execute the command '.$command);
+		
+		// Changing maildrop lines in posfix master.cf
+		$configfile = $config_dir.'/master.cf';
+		$content = rf($configfile);
+
+        $content = preg_replace('/^#?maildrop/m', 'maildrop', $content);
+        $content = preg_replace('/^#?(\s+)flags=DRhu user=vmail argv=\/usr\/bin\/maildrop -d/m',
+        						'$1flags=DRhu user=vmail argv=/usr/bin/maildrop -d vmail \${extension} \${recipient} \${user} \${nexthop} \${sender}',
+        						$content);
+        						
+		$this->write_config_file($configfile, $content);
+		
+		// Writing the Maildrop mailfilter file
+		$content = rf("tpl/mailfilter.master");
+		$content = str_replace('{dist_postfix_vmail_mailbox_base}', $cf['vmail_mailbox_base'], $content);
+		
+		$this->write_config_file($cf['vmail_mailbox_base'].'/.mailfilter', $content);
+		
+		// Create the directory for the custom mailfilters
+		if (!is_dir($cf['vmail_mailbox_base'].'/mailfilters')) 
+		{
+			$command = 'mkdir '.$cf['vmail_mailbox_base'].'/mailfilters';
+			caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		}
+		
+		// Chmod and chown the .mailfilter file
+		$command = 'chown -R '.$cf['vmail_username'].':'.$cf['vmail_groupname'].' '.$cf['vmail_mailbox_base'].'/.mailfilter';
+		caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		
+		$command = 'chmod -R 600 '.$cf['vmail_mailbox_base'].'/.mailfilter';
+		caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		
+	}
+	
+	public function configure_saslauthd() 
+	{
+		global $conf;
+	
+		$content = $this->get_template_file('sasl_smtpd.conf', true, true); // get contents & insert db cred
+		$this->write_config_file($conf['saslauthd']['config_dir'].'/smtpd.conf', $content);
+		
+		// Edit the file saslauthd config file
+		$content = rf($conf["saslauthd"]["config_file"]);
+		$content = preg_replace('/(?<=\n)SASLAUTHD_OPTS="\$\{SASLAUTHD_OPTS\}[^"]+"/', 'SASLAUTHD_OPTS="${SASLAUTHD_OPTS} -a pam -r -c -s 128 -t 30 -n 5"', $content);
+		
+		$this->write_config_file($conf["saslauthd"]["config_file"], $content);
+	}
+	
+	public function configure_courier()
+    {
+    	global $conf;
+    	
+		// authmysqlrc
+		$content = $this->get_template_file('authmysqlrc', true, true); // get contents & insert db cred
+		$this->write_config_file($conf['courier']['config_dir'].'/authmysqlrc', $content);
+		
+		// authdaemonrc
+		$configfile = $conf['courier']['config_dir'].'/authdaemonrc';
+
+		$content = rf($configfile);
+		$content = preg_replace('/(?<=\n)authmodulelist="[^"]+"/', "authmodulelist=\"authmysql\"", $content);
+		$this->write_config_file($configfile, $content);
+		
+		// create certificates
+		$command = "mkimapdcert";
+		caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+			
+		$command = "mkpop3dcert";
+		caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+    }
+	
+	public function configure_spamassassin()
+    {
+		return true;
+    }
+    
+	public function configure_getmail()
+    {
+		global $conf;
+		
+		$config_dir = $conf['getmail']['config_dir'];
+		
+		if (!is_dir($config_dir)) {
+			exec("mkdir -p ".escapeshellcmd($config_dir));
+		}
+
+		$command = "useradd -d $config_dir ".$conf['getmail']['user'];
+		if (!is_user('getmail')) {
+			caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		}
+		
+		$command = "chown -R getmail $config_dir";
+		caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		
+		$command = "chmod -R 700 $config_dir";
+		caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		
+		// Getmail will be run from cron. In order to have access to cron the getmail user needs to be part of the cron group.
+		$command = "gpasswd -a getmail " . $conf['cron']['group'];
+		caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+	}
+    
+    public function configure_amavis() 
+    {
+		global $conf;
+		
+		// Amavisd-new user config file
+		$conf_file = 'amavisd-ispconfig.conf';
+		$conf_path = dirname($conf['amavis']['config_file']) . '/' . $conf_file;
+		
+		$content = $this->get_template_file($conf_file, true, true); // get contents & insert db cred
+		$this->write_config_file($conf_path, $content);
+		
+		// Activate config directory in default file
+		$amavis_conf = rf($conf['amavis']['config_file']);
+		if (strpos($amavis_conf, $conf_path) === false) 
+		{
+			$amavis_conf = preg_replace('/(#-------------\n1;)/', 
+								    "include_config_files('$conf_path');\n$1", 
+									$amavis_conf);
+									
+			$this->write_config_file($conf['amavis']['config_file'], $amavis_conf);
+		}
+		
+		// Adding the amavisd commands to the postfix configuration
+		$postconf_commands = array (
+			'content_filter = amavis:[127.0.0.1]:10024',
+			'receive_override_options = no_address_mappings'
+		);
+		
+    	foreach($postconf_commands as $cmd) {
+			$command = "postconf -e '$cmd'";
+			caselog($command." &> /dev/null", __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		}
+		
+		// Append the configuration for amavisd to the master.cf file
+		$content = rf($conf["postfix"]["config_dir"].'/master.cf');
+		
+		if(!stristr($content,"127.0.0.1:10025")) // Only add the content if we had not addded it before 
+		{ 
+			unset($content);
+			$content = $this->get_template_file("master_cf_amavis", true);
+			af($conf["postfix"]["config_dir"].'/master.cf', $content);
+		}
+		unset($content);
+		
+		// Add the clamav user to the amavis group
+		exec('usermod -a -G amavis clamav');
+    }
+    
+    public function configure_pureftpd()
+    {
+		global $conf;
+		
+		//* configure pure-ftpd for MySQL authentication against the ispconfig database
+		$content = $this->get_template_file('pureftpd_mysql.conf', true, true); // get contents & insert db cred
+		$content = str_replace('{server_id}', $conf["server_id"], $content);
+		
+		$this->write_config_file($conf['pureftpd']['mysql_config_file'], $content, 600, 'root', 'root');
+		
+		// **enable pure-ftpd and server settings
+		$content = rf($conf["pureftpd"]["config_file"]);
+		
+		$content = preg_replace('/#?IS_CONFIGURED="(?:yes|no)"/', 'IS_CONFIGURED="yes"', $content);
+		$content = str_replace('AUTH="-l unix"', 'AUTH="-l mysql:'.$conf['pureftpd']['mysql_config_file'].'"', $content);
+		
+		// Logging defaults to syslog's ftp facility. Override this behaviour for better compatibility with debian/ubuntu
+		// and specify the format.
+		$logdir = '/var/log/pure-ftpd';
+		if (!is_dir($logdir)) {
+			mkdir($logdir, 0755, true);
+		}
+		
+		/*
+		 * @link http://download.pureftpd.org/pub/pure-ftpd/doc/README
+		 * -b brokenclientscompatibility
+		 * -A chrooteveryone
+		 * -E noanonymous
+		 * -O altlog <format>:<log file>
+		 * -Z customerproof (Add safe guards against common customer mistakes ie. like chmod 0 on their own files)
+		 */
+		$content = preg_replace('/MISC_OTHER="[^"]+"/', 'MISC_OTHER="-b -A -E -Z -O clf:'.$logdir.'/transfer.log"', $content);
+		
+		$this->write_config_file($conf["pureftpd"]["config_file"], $content);
+    }
+    
+	public function configure_powerdns() 
+	{
+		global $conf;
+		
+		//* Create the database
+		if(!$this->db->query('CREATE DATABASE IF NOT EXISTS '.$conf['powerdns']['database'].' DEFAULT CHARACTER SET '.$conf['mysql']['charset'])) {
+			$this->error('Unable to create MySQL database: '.$conf['powerdns']['database'].'.');
+		}
+		
+		//* Create the ISPConfig database user in the local database
+        $query = "GRANT ALL ON `".$conf['powerdns']['database']."` . * TO '".$conf['mysql']['ispconfig_user']."'@'localhost';";
+		if(!$this->db->query($query)) {
+			$this->error('Unable to create user for powerdns database Error: '.$this->db->errorMessage);
+		}
+		
+		//* Reload database privelages
+		$this->db->query('FLUSH PRIVILEGES;');
+		
+		//* load the powerdns databse dump
+		if($conf['mysql']['admin_password'] == '') {
+			caselog("mysql --default-character-set=".$conf['mysql']['charset']." -h '".$conf['mysql']['host']."' -u '".$conf['mysql']['admin_user']."' '".$conf['powerdns']['database']."' < '".ISPC_INSTALL_ROOT."/install/sql/powerdns.sql' &> /dev/null", 
+                    __FILE__, __LINE__, 'read in ispconfig3.sql', 'could not read in powerdns.sql');
+		} else {
+			caselog("mysql --default-character-set=".$conf['mysql']['charset']." -h '".$conf['mysql']['host']."' -u '".$conf['mysql']['admin_user']."' -p'".$conf['mysql']['admin_password']."' '".$conf['powerdns']['database']."' < '".ISPC_INSTALL_ROOT."/install/sql/powerdns.sql' &> /dev/null", 
+                     __FILE__, __LINE__, 'read in ispconfig3.sql', 'could not read in powerdns.sql');
+		}
+		
+		//* Create the powerdns config file
+		$content = $this->get_template_file('pdns.local', true, true); // get contents & insert db cred
+		$content = str_replace('{powerdns_database}', $conf['powerdns']['database'], $content);
+		
+		$this->write_config_file($conf["powerdns"]["config_dir"].'/'.$conf["powerdns"]["config_file"], $content, 600, 'root', 'root');
+
+		// Create symlink to init script to start the correct config file
+		if( !is_link($conf['init_scripts'].'/'.$conf['powerdns']['init_script']) ) {
+			symlink($conf['init_scripts'].'/pdns', $conf['init_scripts'].'/'.$conf['powerdns']['init_script']);
+		}
+	}
+	
+	public function configure_apache()
+    {	
+		global $conf;
+		
+		// Create the logging directory for the vhost logfiles
+		if (!is_dir('/var/log/ispconfig/httpd')) {
+			mkdir('/var/log/ispconfig/httpd', 0755, true);
+		}
+		
+		if (is_file($conf['suphp']['config_file'])) 
+		{
+			$content = rf($conf['suphp']['config_file']);
+			
+			$content = preg_replace('/;Handler for php-scripts/',";Handler for php-scripts\nx-httpd-suphp=php:/usr/bin/php-cgi", $content);
+			$content = preg_replace('/;?umask=\d+/','umask=0022', $content);
+			
+			$this->write_config_file($conf['suphp']['config_file'], $content);
+		}
+		
+		// Enable ISPConfig default vhost settings
+		$default_vhost_path = $conf['apache']['vhost_conf_dir'].'/'.$conf['apache']['vhost_default'];
+		if (is_file($default_vhost_path)) 
+		{
+			$content = rf($default_vhost_path);
+			
+			$content = preg_replace('/^#?\s*NameVirtualHost.*$/m', 'NameVirtualHost *:80', $content);
+			$content = preg_replace('/<VirtualHost[^>]+>/', '<VirtualHost *:80>', $content);
+			
+			$this->write_config_file($default_vhost_path, $content);
+		}
+		
+		// Generate default ssl certificates
+		if (!is_dir($conf['apache']['ssl_dir'])) {
+			mkdir($conf['apache']['ssl_dir']);
+		}
+		
+		if ($conf['services']['mail'] == true) 
+		{
+			copy($conf['postfix']['config_dir']."/smtpd.key", $conf['apache']['ssl_dir']."/server.key");
+			copy($conf['postfix']['config_dir']."/smtpd.cert", $conf['apache']['ssl_dir']."/server.crt");
+		}
+		else
+		{
+			if (!is_file($conf['apache']['ssl_dir'] . '/server.crt')) {
+				exec("openssl req -new -outform PEM -out {$conf['apache']['ssl_dir']}/server.crt -newkey rsa:2048 -nodes -keyout {$conf['apache']['ssl_dir']}/server.key -keyform PEM -days 365 -x509");
+			}
+		}
+		
+		
+		
+		// Copy the ISPConfig configuration include
+		$content = $this->get_template_file('apache_ispconfig.conf', true);
+		
+		$records = $this->db->queryAllRecords("SELECT * FROM server_ip WHERE server_id = ".$conf["server_id"]." AND virtualhost = 'y'");
+		if(is_array($records) && count($records) > 0) 
+		{
+			foreach($records as $rec) {
+				$content .= "NameVirtualHost ".$rec["ip_address"].":80\n";
+				$content .= "NameVirtualHost ".$rec["ip_address"].":443\n";
+			}
+		}
+		
+		$this->write_config_file($conf['apache']['vhost_conf_dir'].'/000-ispconfig.conf', $content);
+		
+		// Gentoo by default does not include .vhost files. Add include line to config file.
+		$content = rf($conf['apache']['config_file']);
+		if ( strpos($content, 'Include /etc/apache2/vhosts.d/*.vhost') === false ) {
+			$content = preg_replace('|(Include /etc/apache2/vhosts.d/\*.conf)|',"$1\nInclude /etc/apache2/vhosts.d/*.vhost", $content);
+		}
+		
+		$this->write_config_file($conf['apache']['config_file'], $content);
+		
+		// make sure that webalizer finds its config file when it is directly in /etc
+		if(is_file('/etc/webalizer.conf') && !is_dir('/etc/webalizer')) 
+		{
+			mkdir('/etc/webalizer', 0755);
+			symlink('/etc/webalizer.conf', '/etc/webalizer/webalizer.conf');
+		}
+		
+    	if(is_file('/etc/webalizer/webalizer.conf')) // Change webalizer mode to incremental 
+    	{
+    		replaceLine('/etc/webalizer/webalizer.conf','#IncrementalName','IncrementalName webalizer.current',0,0);
+			replaceLine('/etc/webalizer/webalizer.conf','#Incremental','Incremental     yes',0,0);
+			replaceLine('/etc/webalizer/webalizer.conf','#HistoryName','HistoryName     webalizer.hist',0,0);
+		}
+		
+		// add a sshusers group
+		if (!is_group('sshusers')) 
+		{
+			$command = 'groupadd sshusers';
+			caselog($command.' &> /dev/null 2> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		}
+    }
+    
+    public function configure_apps_vhost()
+	{
+		global $conf;
+		
+		//* Create the ispconfig apps vhost user and group
+		
+		$apps_vhost_user = $conf['web']['apps_vhost_user'];
+		$apps_vhost_group = $conf['web']['apps_vhost_group'];
+		$install_dir = $conf['web']['website_basedir'].'/apps';
+		
+		$command = 'groupadd '.$apps_vhost_user;
+		if ( !is_group($apps_vhost_group) ) {
+			caselog($command.' &> /dev/null 2> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		}
+		
+		$command = "useradd -g '$apps_vhost_group' -d $install_dir $apps_vhost_group";
+		if ( !is_user($apps_vhost_user) ) {
+			caselog($command.' &> /dev/null 2> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		}
+		
+		$command = 'adduser '.$conf['apache']['user'].' '.$apps_vhost_group;
+		caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		
+		exec('mkdir -p '.escapeshellcmd($conf['web']['website_basedir'].'/apps'));
+		
+		//* Copy the apps vhost file
+        $vhost_conf_dir = $conf['apache']['vhost_conf_dir'];
+        $vhost_conf_enabled_dir = $conf['apache']['vhost_conf_enabled_dir'];
+        $apps_vhost_servername = ($conf['web']['apps_vhost_servername'] == '') ? '' : 'ServerName '.$conf['web']['apps_vhost_servername'];
+        
+        // Dont just copy over the virtualhost template but add some custom settings
+        $content = $this->get_template_file('apache_apps.vhost', true);
+        
+        $content = str_replace('{apps_vhost_ip}', $conf['web']['apps_vhost_ip'], $content);
+		$content = str_replace('{apps_vhost_port}', $conf['web']['apps_vhost_port'], $content);
+		$content = str_replace('{apps_vhost_dir}', $conf['web']['website_basedir'].'/apps', $content);
+		$content = str_replace('{website_basedir}', $conf['web']['website_basedir'], $content);
+		$content = str_replace('{apps_vhost_servername}', $apps_vhost_servername, $content);
+		
+		// comment out the listen directive if port is 80 or 443
+		if($conf['web']['apps_vhost_ip'] == 80 or $conf['web']['apps_vhost_ip'] == 443) {
+			$content = str_replace('{vhost_port_listen}', '#', $content);
+		} else {
+			$content = str_replace('{vhost_port_listen}', '', $content);
+		}
+		
+		$this->write_config_file("$vhost_conf_dir/apps.vhost", $content);
+		
+		if ( !is_file($conf['web']['website_basedir'].'/php-fcgi-scripts/apps/.php-fcgi-starter') ) 
+		{
+			exec('mkdir -p '.$conf['web']['website_basedir'].'/php-fcgi-scripts/apps');
+			exec('cp tpl/apache_apps_fcgi_starter.master '.$conf['web']['website_basedir'].'/php-fcgi-scripts/apps/.php-fcgi-starter');
+			exec('chmod +x '.$conf['web']['website_basedir'].'/php-fcgi-scripts/apps/.php-fcgi-starter');
+			exec('chown -R ispapps:ispapps '.$conf['web']['website_basedir'].'/php-fcgi-scripts/apps');
+			
+		}
+	}
+    
+    public function install_ispconfig()
+    {
+		global $conf;
+		
+		$install_dir = $conf['ispconfig_install_dir'];
+		
+    	// Create the ISPConfig installation directory
+		if(!is_dir($install_dir)) 
+		{
+			$command = "mkdir $install_dir";
+			caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		}
+		
+		// Create a ISPConfig user and group
+		if (!is_group('ispconfig')) 
+		{
+			$command = 'groupadd ispconfig';
+			caselog($command.' &> /dev/null 2> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		}
+		
+		if (!is_user('ispconfig')) 
+		{
+			$command = "useradd -g ispconfig -d $install_dir ispconfig";
+			caselog($command.' &> /dev/null 2> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		}
+		
+		// copy the ISPConfig interface part
+		$command = "cp -rf ../interface $install_dir";
+		caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		
+		// copy the ISPConfig server part
+		$command = "cp -rf ../server $install_dir";
+		caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		
+		
+		// Create the config file for ISPConfig interface
+		$configfile = 'config.inc.php';
+		$content = $this->get_template_file($configfile, true, true); // get contents & insert db cred
+		
+		$content = str_replace('{mysql_master_server_ispconfig_user}', $conf['mysql']['master_ispconfig_user'], $content);
+		$content = str_replace('{mysql_master_server_ispconfig_password}', $conf['mysql']['master_ispconfig_password'], $content);
+		$content = str_replace('{mysql_master_server_database}', $conf['mysql']['master_database'], $content);
+		$content = str_replace('{mysql_master_server_host}', $conf['mysql']['master_host'], $content);
+		
+		$content = str_replace('{server_id}', $conf['server_id'], $content);
+		$content = str_replace('{ispconfig_log_priority}', $conf['ispconfig_log_priority'], $content);
+		$content = str_replace('{language}', $conf['language'], $content);
+		
+		$this->write_config_file("$install_dir/interface/lib/$configfile", $content);
+		
+		// Create the config file for ISPConfig server
+		$this->write_config_file("$install_dir/server/lib/$configfile", $content);
+		
+    	// Enable the server modules and plugins.
+		// TODO: Implement a selector which modules and plugins shall be enabled.
+		$dir = $install_dir.'/server/mods-available/';
+		if (is_dir($dir)) {
+			if ($dh = opendir($dir)) {
+				while (($file = readdir($dh)) !== false) {
+					if($file != '.' && $file != '..' && substr($file,-8,8) == '.inc.php') {
+						include_once($install_dir.'/server/mods-available/'.$file);
+						$module_name = substr($file,0,-8);
+						$tmp = new $module_name;
+						if($tmp->onInstall()) {
+							if(!@is_link($install_dir.'/server/mods-enabled/'.$file)) @symlink($install_dir.'/server/mods-available/'.$file, $install_dir.'/server/mods-enabled/'.$file);
+							if (strpos($file, '_core_module') !== false) {
+								if(!@is_link($install_dir.'/server/mods-core/'.$file)) @symlink($install_dir.'/server/mods-available/'.$file, $install_dir.'/server/mods-core/'.$file);
+							}
+						}
+						unset($tmp);
+					}
+				}
+				closedir($dh);
+			}
+		}
+		
+		$dir = $install_dir.'/server/plugins-available/';
+		if (is_dir($dir)) {
+			if ($dh = opendir($dir)) {
+				while (($file = readdir($dh)) !== false) {
+					if($file != '.' && $file != '..' && substr($file,-8,8) == '.inc.php') {
+						include_once($install_dir.'/server/plugins-available/'.$file);
+						$plugin_name = substr($file,0,-8);
+						$tmp = new $plugin_name;
+						if(method_exists($tmp,'onInstall') && $tmp->onInstall()) {
+							if(!@is_link($install_dir.'/server/plugins-enabled/'.$file)) @symlink($install_dir.'/server/plugins-available/'.$file, $install_dir.'/server/plugins-enabled/'.$file);
+							if (strpos($file, '_core_plugin') !== false) {
+								if(!@is_link($install_dir.'/server/plugins-core/'.$file)) @symlink($install_dir.'/server/plugins-available/'.$file, $install_dir.'/server/plugins-core/'.$file);
+							}
+						}
+						unset($tmp);
+					}
+				}
+				closedir($dh);
+			}
+		}
+		
+		// Update the server config
+		$mail_server_enabled = ($conf['services']['mail'])?1:0;
+		$web_server_enabled = ($conf['services']['web'])?1:0;
+		$dns_server_enabled = ($conf['services']['dns'])?1:0;
+		$file_server_enabled = ($conf['services']['file'])?1:0;
+		$db_server_enabled = ($conf['services']['db'])?1:0;
+		$vserver_server_enabled = ($conf['services']['vserver'])?1:0;
+		
+    	$sql = "UPDATE `server` SET mail_server = '$mail_server_enabled', web_server = '$web_server_enabled', dns_server = '$dns_server_enabled', file_server = '$file_server_enabled', db_server = '$db_server_enabled', vserver_server = '$vserver_server_enabled' WHERE server_id = ".intval($conf['server_id']);
+		
+		if($conf['mysql']['master_slave_setup'] == 'y') {
+			$this->dbmaster->query($sql);
+			$this->db->query($sql);
+		} else {
+			$this->db->query($sql);
+		}
+		
+		// Chmod the files
+		$command = "chmod -R 750 $install_dir";
+		caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+
+		// chown the files to the ispconfig user and group
+		$command = "chown -R ispconfig:ispconfig $install_dir";
+		caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		
+		// Make the global language file directory group writable
+		exec("chmod -R 770 $install_dir/interface/lib/lang");
+		
+		// Make the temp directory for language file exports writable
+		exec("chmod -R 770 $install_dir/interface/web/temp");
+		
+	    // Make all interface language file directories group writable
+		$handle = @opendir($install_dir.'/interface/web');
+		while ($file = @readdir ($handle)) { 
+	   		if ($file != '.' && $file != '..') {
+	        	if(@is_dir($install_dir.'/interface/web'.'/'.$file.'/lib/lang')) {
+					$handle2 = opendir($install_dir.'/interface/web'.'/'.$file.'/lib/lang');
+					chmod($install_dir.'/interface/web'.'/'.$file.'/lib/lang',0770);
+					while ($lang_file = @readdir ($handle2)) {
+						if ($lang_file != '.' && $lang_file != '..') {
+							chmod($install_dir.'/interface/web'.'/'.$file.'/lib/lang/'.$lang_file,0770);
+						}
+					}
+				}
+			}
+		}
+		
+	    // make sure that the server config file (not the interface one) is only readable by the root user
+		exec("chmod 600 $install_dir/server/lib/$configfile");
+		exec("chown root:root $install_dir/server/lib/$configfile");
+		if (is_file("$install_dir/server/lib/mysql_clientdb.conf")) {
+			exec("chmod 600 $install_dir/server/lib/mysql_clientdb.conf");
+			exec("chown root:root $install_dir/server/lib/mysql_clientdb.conf");
+		}
+		
+		// TODO: FIXME: add the www-data user to the ispconfig group. This is just for testing
+		// and must be fixed as this will allow the apache user to read the ispconfig files.
+		// Later this must run as own apache server or via suexec!
+		$command = 'usermod -a -G ispconfig '.$conf['apache']['user'];
+		caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		
+		// Make the shell scripts executable
+		$command = "chmod +x $install_dir/server/scripts/*.sh";
+		caselog($command.' &> /dev/null', __FILE__, __LINE__, "EXECUTED: $command", "Failed to execute the command $command");
+		
+		// Copy the ISPConfig vhost for the controlpanel
+		$content = $this->get_template_file("apache_ispconfig.vhost", true);
+		$content = str_replace('{vhost_port}', $conf['apache']['vhost_port'], $content);
+		
+		// comment out the listen directive if port is 80 or 443
+		if ($conf['apache']['vhost_port'] == 80 or $conf['apache']['vhost_port'] == 443) {
+			$content = str_replace('{vhost_port_listen}', '#', $content);
+		} else {
+			$content = str_replace('{vhost_port_listen}', '', $content);
+		}
+		
+		$vhost_path = $conf['apache']['vhost_conf_dir'].'/ispconfig.vhost';
+		$this->write_config_file($vhost_path, $content);
+		
+    	if (!is_file('/var/www/php-fcgi-scripts/ispconfig/.php-fcgi-starter')) 
+    	{
+			mkdir('/var/www/php-fcgi-scripts/ispconfig', 0755, true);
+			copy('tpl/apache_ispconfig_fcgi_starter.master', '/var/www/php-fcgi-scripts/ispconfig/.php-fcgi-starter');
+			chmod('/var/www/php-fcgi-scripts/ispconfig/.php-fcgi-starter', 0755);
+			symlink('/usr/local/ispconfig/interface/web', '/var/www/ispconfig');
+			exec('chown -R ispconfig:ispconfig /var/www/php-fcgi-scripts/ispconfig');
+		}
+		
+		// Install the update script
+		if (is_file('/usr/local/bin/ispconfig_update_from_svn.sh')) {
+			unlink('/usr/local/bin/ispconfig_update_from_svn.sh');
+		}
+		
+		chown('/usr/local/ispconfig/server/scripts/update_from_svn.sh', 'root');
+		chmod('/usr/local/ispconfig/server/scripts/update_from_svn.sh', 0700);
+		chown('/usr/local/ispconfig/server/scripts/update_from_tgz.sh', 'root');
+		chmod('/usr/local/ispconfig/server/scripts/update_from_tgz.sh', 0700);
+		chown('/usr/local/ispconfig/server/scripts/ispconfig_update.sh', 'root');
+		chmod('/usr/local/ispconfig/server/scripts/ispconfig_update.sh', 0700);
+		
+		if (!is_link('/usr/local/bin/ispconfig_update_from_svn.sh')) {
+			symlink('/usr/local/ispconfig/server/scripts/ispconfig_update.sh', '/usr/local/bin/ispconfig_update_from_svn.sh');
+		}
+		
+		if (!is_link('/usr/local/bin/ispconfig_update.sh')) {
+			symlink('/usr/local/ispconfig/server/scripts/ispconfig_update.sh', '/usr/local/bin/ispconfig_update.sh');
+		}
+		
+		// Make the logs readable for the ispconfig user
+		if (is_file('/var/log/maillog')) {
+			exec('chmod +r /var/log/maillog');
+		}
+		if (is_file('/var/log/messages')) {
+			exec('chmod +r /var/log/messages');
+		}
+		if (is_file('/var/log/clamav/clamav.log')) {
+			exec('chmod +r /var/log/clamav/clamav.log');
+		}
+		if (is_file('/var/log/clamav/freshclam.log')) {
+			exec('chmod +r /var/log/clamav/freshclam.log');
+		}
+		
+		// Create the ispconfig log directory
+		if (!is_dir('/var/log/ispconfig')) {
+			mkdir('/var/log/ispconfig');
+		}
+		if (!is_file('/var/log/ispconfig/ispconfig.log')) {
+			exec('touch /var/log/ispconfig/ispconfig.log');
+		}
+		
+		exec('mv /usr/local/ispconfig/server/scripts/run-getmail.sh /usr/local/bin/run-getmail.sh');
+		exec('chown getmail /usr/local/bin/run-getmail.sh');
+		exec('chmod 744 /usr/local/bin/run-getmail.sh');
+    }
 }
 
 ?>
\ No newline at end of file

--
Gitblit v1.9.1