| | |
| | | $app->dbmaster->query("UPDATE web_domain SET ssl_action = '' WHERE domain = ?", $data['new']['domain']); |
| | | } |
| | | |
| | | //* Check that the SSL key is not password protected |
| | | if($data["new"]["ssl_action"] == 'save') { |
| | | if(stristr($data["new"]["ssl_key"],'Proc-Type: 4,ENCRYPTED')) { |
| | | $data["new"]["ssl_action"] = ''; |
| | | |
| | | $app->log('SSL Certificate not saved. The SSL key is encrypted.', LOGLEVEL_WARN); |
| | | $app->dbmaster->datalogError('SSL Certificate not saved. The SSL key is encrypted.'); |
| | | |
| | | /* Update the DB of the (local) Server */ |
| | | $app->db->query("UPDATE web_domain SET ssl_action = '' WHERE domain = ?", $data['new']['domain']); |
| | | |
| | | /* Update also the master-DB of the Server-Farm */ |
| | | $app->dbmaster->query("UPDATE web_domain SET ssl_action = '' WHERE domain = ?", $data['new']['domain']); |
| | | } |
| | | } |
| | | |
| | | //* Save a SSL certificate to disk |
| | | if($data["new"]["ssl_action"] == 'save') { |
| | | $this->ssl_certificate_changed = true; |
| | |
| | | } // end copy error docs |
| | | |
| | | // Set the quota for the user, but only for vhosts, not vhostsubdomains or vhostalias |
| | | if($username != '' && $app->system->is_user($username) && $data['new']['type'] == 'vhost') { |
| | | if($username != '' && $app->system->is_user($username) && $data['new']['type'] == 'vhost') { |
| | | if($data['new']['hd_quota'] > 0) { |
| | | $blocks_soft = $data['new']['hd_quota'] * 1024; |
| | | $blocks_hard = $blocks_soft + 1024; |
| | | $mb_hard = $mb_soft + 1; |
| | | } else { |
| | | $blocks_soft = $blocks_hard = 0; |
| | | $mb_soft = $mb_hard = $blocks_soft = $blocks_hard = 0; |
| | | } |
| | | exec("setquota -u $username $blocks_soft $blocks_hard 0 0 -a &> /dev/null"); |
| | | exec('setquota -T -u '.$username.' 604800 604800 -a &> /dev/null'); |
| | | |
| | | // get the primitive folder for document_root and the filesystem, will need it later. |
| | | $df_output=exec("df -T $document_root|awk 'END{print \$2,\$NF}'"); |
| | | $file_system = explode(" ", $df_output)[0]; |
| | | $primitive_root = explode(" ", $df_output)[1]; |
| | | |
| | | if ( in_array($file_system , array('ext2','ext3','ext4'), true) ) { |
| | | exec('setquota -u '. $username . ' ' . $blocks_soft . ' ' . $blocks_hard . ' 0 0 -a &> /dev/null'); |
| | | exec('setquota -T -u '.$username.' 604800 604800 -a &> /dev/null'); |
| | | } elseif ($file_system == 'xfs') { |
| | | |
| | | exec("xfs_quota -x -c 'limit -g bsoft=$mb_soft" . 'm'. " bhard=$mb_hard" . 'm'. " $username' $primitive_root"); |
| | | |
| | | // xfs only supports timers globally, not per user. |
| | | exec("xfs_quota -x -c 'timer -bir -i 604800'"); |
| | | |
| | | unset($project_uid, $username_position, $xfs_projects); |
| | | unset($primitive_root, $df_output, $mb_hard, $mb_soft); |
| | | } |
| | | } |
| | | |
| | | if($this->action == 'insert' || $data["new"]["system_user"] != $data["old"]["system_user"]) { |
| | |
| | | } |
| | | |
| | | // use vLib for template logic |
| | | $nginx_directives_new = ''; |
| | | $ngx_conf_tpl = new tpl(); |
| | | $ngx_conf_tpl_tmp_file = tempnam($conf['temppath'], "ngx"); |
| | | file_put_contents($ngx_conf_tpl_tmp_file, $nginx_directives); |
| | | $ngx_conf_tpl->newTemplate($ngx_conf_tpl_tmp_file); |
| | | $ngx_conf_tpl->setVar('use_tcp', $use_tcp); |
| | | $ngx_conf_tpl->setVar('use_socket', $use_socket); |
| | | $ngx_conf_tpl->setVar('fpm_socket', $fpm_socket); |
| | | $ngx_conf_tpl->setVar($vhost_data); |
| | | $nginx_directives_new = $ngx_conf_tpl->grab(); |
| | | if(is_file($ngx_conf_tpl_tmp_file)) unlink($ngx_conf_tpl_tmp_file); |
| | | if($nginx_directives_new != '') $nginx_directives = $nginx_directives_new; |
| | | unset($nginx_directives_new); |
| | | if(trim($nginx_directives) != '') { |
| | | $nginx_directives_new = ''; |
| | | $ngx_conf_tpl = new tpl(); |
| | | $ngx_conf_tpl_tmp_file = tempnam($conf['temppath'], "ngx"); |
| | | file_put_contents($ngx_conf_tpl_tmp_file, $nginx_directives); |
| | | $ngx_conf_tpl->newTemplate($ngx_conf_tpl_tmp_file); |
| | | $ngx_conf_tpl->setVar('use_tcp', $use_tcp); |
| | | $ngx_conf_tpl->setVar('use_socket', $use_socket); |
| | | $ngx_conf_tpl->setVar('fpm_socket', $fpm_socket); |
| | | $ngx_conf_tpl->setVar($vhost_data); |
| | | $nginx_directives_new = $ngx_conf_tpl->grab(); |
| | | if(is_file($ngx_conf_tpl_tmp_file)) unlink($ngx_conf_tpl_tmp_file); |
| | | if($nginx_directives_new != '') $nginx_directives = $nginx_directives_new; |
| | | unset($nginx_directives_new); |
| | | } |
| | | |
| | | // Make sure we only have Unix linebreaks |
| | | $nginx_directives = str_replace("\r\n", "\n", $nginx_directives); |
| | |
| | | //* check if we have already a Let's Encrypt cert |
| | | if(!file_exists($crt_tmp_file) && !file_exists($key_tmp_file)) { |
| | | $app->log("Create Let's Encrypt SSL Cert for: $domain", LOGLEVEL_DEBUG); |
| | | |
| | | |
| | | $success = false; |
| | | if(file_exists("/root/.local/share/letsencrypt/bin/letsencrypt")) { |
| | | $this->_exec("/root/.local/share/letsencrypt/bin/letsencrypt auth --text --agree-tos --authenticator webroot --server https://acme-v01.api.letsencrypt.org/directory --rsa-key-size 4096 --email postmaster@$domain --domains $lddomain --webroot-path /usr/local/ispconfig/interface/acme"); |
| | | $success = $this->_exec("/root/.local/share/letsencrypt/bin/letsencrypt auth --text --agree-tos --authenticator webroot --server https://acme-v01.api.letsencrypt.org/directory --rsa-key-size 4096 --email postmaster@$domain --domains $lddomain --webroot-path /usr/local/ispconfig/interface/acme"); |
| | | } |
| | | }; |
| | | if(!$success) { |
| | | // error issuing cert |
| | | $app->log('Let\'s Encrypt SSL Cert for: ' . $domain . ' could not be issued.', LOGLEVEL_WARN); |
| | | $data['new']['ssl_letsencrypt'] = 'n'; |
| | | if($data['old']['ssl'] == 'n') $data['new']['ssl'] = 'n'; |
| | | /* Update the DB of the (local) Server */ |
| | | $app->db->query("UPDATE web_domain SET `ssl` = ?, `ssl_letsencrypt` = ? WHERE `domain` = ?", $data['new']['ssl'], 'n', $data['new']['domain']); |
| | | /* Update also the master-DB of the Server-Farm */ |
| | | $app->dbmaster->query("UPDATE web_domain SET `ssl` = ?, `ssl_letsencrypt` = ? WHERE `domain` = ?", $data['new']['ssl'], 'n', $data['new']['domain']); |
| | | } |
| | | } |
| | | |
| | | //* check is been correctly created |
| | | if(file_exists($crt_tmp_file) OR file_exists($key_tmp_file)) { |
| | |
| | | |
| | | /* we don't need to store it. |
| | | /* Update the DB of the (local) Server */ |
| | | $app->db->query("UPDATE web_domain SET ssl_request = '', ssl_cert = '', ssl_key = '' WHERE domain = '".$data['new']['domain']."'"); |
| | | $app->db->query("UPDATE web_domain SET ssl_action = '' WHERE domain = '".$data['new']['domain']."'"); |
| | | $app->db->query("UPDATE web_domain SET ssl_request = '', ssl_cert = '', ssl_key = '' WHERE domain = ?", $data['new']['domain']); |
| | | $app->db->query("UPDATE web_domain SET ssl_action = '' WHERE domain = ?", $data['new']['domain']); |
| | | /* Update also the master-DB of the Server-Farm */ |
| | | $app->dbmaster->query("UPDATE web_domain SET ssl_request = '', ssl_cert = '', ssl_key = '' WHERE domain = '".$data['new']['domain']."'"); |
| | | $app->dbmaster->query("UPDATE web_domain SET ssl_action = '' WHERE domain = '".$data['new']['domain']."'"); |
| | | $app->dbmaster->query("UPDATE web_domain SET ssl_request = '', ssl_cert = '', ssl_key = '' WHERE domain = ?", $data['new']['domain']); |
| | | $app->dbmaster->query("UPDATE web_domain SET ssl_action = '' WHERE domain = ?", $data['new']['domain']); |
| | | } |
| | | }; |
| | | |
| | |
| | | //* Wrapper for exec function for easier debugging |
| | | private function _exec($command) { |
| | | global $app; |
| | | $out = array(); |
| | | $ret = 0; |
| | | $app->log('exec: '.$command, LOGLEVEL_DEBUG); |
| | | exec($command); |
| | | exec($command, $out, $ret); |
| | | if($ret != 0) return false; |
| | | else return true; |
| | | } |
| | | |
| | | private function _checkTcp ($host, $port) { |