apache2_plugin.inc.php 55 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
<?php

/*
Copyright (c) 2007 - 2009, Till Brehm, projektfarm Gmbh
All rights reserved.

Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:

    * Redistributions of source code must retain the above copyright notice,
      this list of conditions and the following disclaimer.
    * Redistributions in binary form must reproduce the above copyright notice,
      this list of conditions and the following disclaimer in the documentation
      and/or other materials provided with the distribution.
    * Neither the name of ISPConfig nor the names of its contributors
      may be used to endorse or promote products derived from this software without
      specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/

class apache2_plugin {
32

33 34
	var $plugin_name = 'apache2_plugin';
	var $class_name = 'apache2_plugin';
35

36 37
	// private variables
	var $action = '';
38

39 40 41 42
	//* This function is called during ispconfig installation to determine
	//  if a symlink shall be created for this plugin.
	function onInstall() {
		global $conf;
43

44 45 46 47 48
		if($conf['services']['web'] == true) {
			return true;
		} else {
			return false;
		}
49

50
	}
51 52


53 54 55
	/*
	 	This function is called when the plugin is loaded
	*/
56

57 58
	function onLoad() {
		global $app;
59

60 61 62 63 64 65
		/*
		Register for the events
		*/
		$app->plugins->registerEvent('web_domain_insert',$this->plugin_name,'ssl');
		$app->plugins->registerEvent('web_domain_update',$this->plugin_name,'ssl');
		$app->plugins->registerEvent('web_domain_delete',$this->plugin_name,'ssl');
66

67 68 69
		$app->plugins->registerEvent('web_domain_insert',$this->plugin_name,'insert');
		$app->plugins->registerEvent('web_domain_update',$this->plugin_name,'update');
		$app->plugins->registerEvent('web_domain_delete',$this->plugin_name,'delete');
70

71 72 73
		$app->plugins->registerEvent('server_ip_insert',$this->plugin_name,'server_ip');
		$app->plugins->registerEvent('server_ip_update',$this->plugin_name,'server_ip');
		$app->plugins->registerEvent('server_ip_delete',$this->plugin_name,'server_ip');
74 75 76 77

		$app->plugins->registerEvent('webdav_user_insert',$this->plugin_name,'webdav');
		$app->plugins->registerEvent('webdav_user_update',$this->plugin_name,'webdav');
		$app->plugins->registerEvent('webdav_user_delete',$this->plugin_name,'webdav');
78
	}
79

80 81 82
	// Handle the creation of SSL certificates
	function ssl($event_name,$data) {
		global $app, $conf;
83

84 85
		if(!is_dir($data["new"]["document_root"]."/ssl")) exec("mkdir -p ".$data["new"]["document_root"]."/ssl");
		$ssl_dir = $data["new"]["document_root"]."/ssl";
86
		$domain = $data["new"]["ssl_domain"];
87
		$key_file = $ssl_dir.'/'.$domain.".key.org";
88 89 90 91
		$key_file2 = $ssl_dir.'/'.$domain.".key";
		$csr_file = $ssl_dir.'/'.$domain.".csr";
		$crt_file = $ssl_dir.'/'.$domain.".crt";

92 93 94
		//* Create a SSL Certificate
		if($data["new"]["ssl_action"] == 'create') {
			$rand_file = $ssl_dir."/random_file";
95 96 97 98 99 100 101 102 103 104 105
			$rand_data = md5(uniqid(microtime(),1));
			for($i=0; $i<1000; $i++) {
				$rand_data .= md5(uniqid(microtime(),1));
				$rand_data .= md5(uniqid(microtime(),1));
				$rand_data .= md5(uniqid(microtime(),1));
				$rand_data .= md5(uniqid(microtime(),1));
			}
			file_put_contents($rand_file, $rand_data);

			$ssl_password = substr(md5(uniqid(microtime(),1)), 0, 15);

106 107 108
			$ssl_cnf = "        RANDFILE               = $rand_file

        [ req ]
109
        default_bits           = 2048
110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126
        default_keyfile        = keyfile.pem
        distinguished_name     = req_distinguished_name
        attributes             = req_attributes
        prompt                 = no
        output_password        = $ssl_password

        [ req_distinguished_name ]
        C                      = ".$data['new']['ssl_country']."
        ST                     = ".$data['new']['ssl_state']."
        L                      = ".$data['new']['ssl_locality']."
        O                      = ".$data['new']['ssl_organisation']."
        OU                     = ".$data['new']['ssl_organisation_unit']."
        CN                     = $domain
        emailAddress           = webmaster@".$data['new']['domain']."

        [ req_attributes ]
        challengePassword              = A challenge password";
127

128 129
			$ssl_cnf_file = $ssl_dir."/openssl.conf";
			file_put_contents($ssl_cnf_file,$ssl_cnf);
130

131 132 133 134 135 136 137 138
			$rand_file = escapeshellcmd($rand_file);
			$key_file = escapeshellcmd($key_file);
			$key_file2 = escapeshellcmd($key_file2);
			$ssl_days = 3650;
			$csr_file = escapeshellcmd($csr_file);
			$config_file = escapeshellcmd($ssl_cnf_file);
			$crt_file = escapeshellcmd($crt_file);

139 140
			if(is_file($ssl_cnf_file)) {
				exec("openssl genrsa -des3 -rand $rand_file -passout pass:$ssl_password -out $key_file 2048 && openssl req -new -passin pass:$ssl_password -passout pass:$ssl_password -key $key_file -out $csr_file -days $ssl_days -config $config_file && openssl req -x509 -passin pass:$ssl_password -passout pass:$ssl_password -key $key_file -in $csr_file -out $crt_file -days $ssl_days -config $config_file && openssl rsa -passin pass:$ssl_password -in $key_file -out $key_file2");
141
				$app->log("Creating SSL Cert for: $domain",LOGLEVEL_DEBUG);
142
			}
143

144 145 146 147 148
			exec("chmod 400 $key_file2");
			@unlink($config_file);
			@unlink($rand_file);
			$ssl_request = $app->db->quote(file_get_contents($csr_file));
			$ssl_cert = $app->db->quote(file_get_contents($crt_file));
149
			/* Update the DB of the (local) Server */
150
			$app->db->query("UPDATE web_domain SET ssl_request = '$ssl_request', ssl_cert = '$ssl_cert' WHERE domain = '".$data["new"]["domain"]."'");
151
			$app->db->query("UPDATE web_domain SET ssl_action = '' WHERE domain = '".$data["new"]["domain"]."'");
152
			/* Update also the master-DB of the Server-Farm */
153
			$app->dbmaster->query("UPDATE web_domain SET ssl_request = '$ssl_request', ssl_cert = '$ssl_cert' WHERE domain = '".$data["new"]["domain"]."'");
154
			$app->dbmaster->query("UPDATE web_domain SET ssl_action = '' WHERE domain = '".$data["new"]["domain"]."'");
155
		}
156

157 158 159
		//* Save a SSL certificate to disk
		if($data["new"]["ssl_action"] == 'save') {
			$ssl_dir = $data["new"]["document_root"]."/ssl";
vogelor's avatar
vogelor committed
160
			$domain = $data["new"]["ssl_domain"];
161 162
			$csr_file = $ssl_dir.'/'.$domain.".csr";
			$crt_file = $ssl_dir.'/'.$domain.".crt";
163 164 165 166
			$bundle_file = $ssl_dir.'/'.$domain.".bundle";
			file_put_contents($csr_file,$data["new"]["ssl_request"]);
			file_put_contents($crt_file,$data["new"]["ssl_cert"]);
			if(trim($data["new"]["ssl_bundle"]) != '') file_put_contents($bundle_file,$data["new"]["ssl_bundle"]);
167
			/* Update the DB of the (local) Server */
168
			$app->db->query("UPDATE web_domain SET ssl_action = '' WHERE domain = '".$data["new"]["domain"]."'");
169 170
			/* Update also the master-DB of the Server-Farm */
			$app->dbmaster->query("UPDATE web_domain SET ssl_action = '' WHERE domain = '".$data["new"]["domain"]."'");
171 172
			$app->log("Saving SSL Cert for: $domain",LOGLEVEL_DEBUG);
		}
173

174 175 176
		//* Delete a SSL certificate
		if($data["new"]["ssl_action"] == 'del') {
			$ssl_dir = $data["new"]["document_root"]."/ssl";
vogelor's avatar
vogelor committed
177
			$domain = $data["new"]["ssl_domain"];
178 179
			$csr_file = $ssl_dir.'/'.$domain.".csr";
			$crt_file = $ssl_dir.'/'.$domain.".crt";
180 181 182 183
			$bundle_file = $ssl_dir.'/'.$domain.".bundle";
			unlink($csr_file);
			unlink($crt_file);
			unlink($bundle_file);
184
			/* Update the DB of the (local) Server */
185
			$app->db->query("UPDATE web_domain SET ssl_request = '', ssl_cert = '' WHERE domain = '".$data["new"]["domain"]."'");
186
			$app->db->query("UPDATE web_domain SET ssl_action = '' WHERE domain = '".$data["new"]["domain"]."'");
187
			/* Update also the master-DB of the Server-Farm */
188
			$app->dbmaster->query("UPDATE web_domain SET ssl_request = '', ssl_cert = '' WHERE domain = '".$data["new"]["domain"]."'");
189
			$app->dbmaster->query("UPDATE web_domain SET ssl_action = '' WHERE domain = '".$data["new"]["domain"]."'");
190 191
			$app->log("Deleting SSL Cert for: $domain",LOGLEVEL_DEBUG);
		}
192 193


194
	}
195 196


197 198
	function insert($event_name,$data) {
		global $app, $conf;
199

200 201 202
		$this->action = 'insert';
		// just run the update function
		$this->update($event_name,$data);
203 204


205
	}
206 207


208 209
	function update($event_name,$data) {
		global $app, $conf;
210

211
		if($this->action != 'insert') $this->action = 'update';
212

213
		if($data["new"]["type"] != "vhost" && $data["new"]["parent_domain_id"] > 0) {
214

215 216
			$old_parent_domain_id = intval($data["old"]["parent_domain_id"]);
			$new_parent_domain_id = intval($data["new"]["parent_domain_id"]);
217

218 219 220 221 222 223 224 225
			// If the parent_domain_id has been chenged, we will have to update the old site as well.
			if($this->action == 'update' && $data["new"]["parent_domain_id"] != $data["old"]["parent_domain_id"]) {
				$tmp = $app->db->queryOneRecord("SELECT * FROM web_domain WHERE domain_id = ".$old_parent_domain_id." AND active = 'y'");
				$data["new"] = $tmp;
				$data["old"] = $tmp;
				$this->action = 'update';
				$this->update($event_name,$data);
			}
226

227 228 229 230 231 232
			// This is not a vhost, so we need to update the parent record instead.
			$tmp = $app->db->queryOneRecord("SELECT * FROM web_domain WHERE domain_id = ".$new_parent_domain_id." AND active = 'y'");
			$data["new"] = $tmp;
			$data["old"] = $tmp;
			$this->action = 'update';
		}
233

234 235 236
		// load the server configuration options
		$app->uses("getconf");
		$web_config = $app->getconf->get_server_config($conf["server_id"], 'web');
237

238
		//* Check if this is a chrooted setup
239
		if($web_config['website_basedir'] != '' && @is_file($web_config['website_basedir'].'/etc/passwd')) {
240
			$apache_chrooted = true;
241
			$app->log("Info: Apache is chrooted.",LOGLEVEL_DEBUG);
242 243 244
		} else {
			$apache_chrooted = false;
		}
245

246 247 248 249 250 251 252 253
		if($data["new"]["document_root"] == '') {
			$app->log("document_root not set",LOGLEVEL_WARN);
			return 0;
		}
		if($data["new"]["system_user"] == 'root' or $data["new"]["system_group"] == 'root') {
			$app->log("Websites can not be owned by the root user or group.",LOGLEVEL_WARN);
			return 0;
		}
254

255 256
		//* If the client of the site has been changed, we have a change of the document root
		if($this->action == 'update' && $data["new"]["document_root"] != $data["old"]["document_root"]) {
257

258 259 260 261
			//* Get the old client ID
			$old_client = $app->dbmaster->queryOneRecord("SELECT client_id FROM sys_group WHERE sys_group.groupid = ".intval($data["old"]["sys_groupid"]));
			$old_client_id = intval($old_client["client_id"]);
			unset($old_client);
262

263 264 265 266 267 268 269 270 271
			//* Remove the old symlinks
			$tmp_symlinks_array = explode(':',$web_config["website_symlinks"]);
			if(is_array($tmp_symlinks_array)) {
				foreach($tmp_symlinks_array as $tmp_symlink) {
					$tmp_symlink = str_replace("[client_id]",$old_client_id,$tmp_symlink);
					$tmp_symlink = str_replace("[website_domain]",$data["old"]["domain"],$tmp_symlink);
					// Remove trailing slash
					if(substr($tmp_symlink, -1, 1) == '/') $tmp_symlink = substr($tmp_symlink, 0, -1);
					// create the symlinks, if not exist
272
					if(is_link($tmp_symlink)) {
273 274 275 276 277
						exec("rm -f ".escapeshellcmd($tmp_symlink));
						$app->log("Removed Symlink: rm -f ".$tmp_symlink,LOGLEVEL_DEBUG);
					}
				}
			}
278

279 280 281 282
			//* Move the site data
			$tmp_docroot = explode('/',$data["new"]["document_root"]);
			unset($tmp_docroot[count($tmp_docroot)-1]);
			$new_dir = implode('/',$tmp_docroot);
283

284 285 286
			$tmp_docroot = explode('/',$data["old"]["document_root"]);
			unset($tmp_docroot[count($tmp_docroot)-1]);
			$old_dir = implode('/',$tmp_docroot);
287

288 289 290 291
			exec('rm -rf '.$data["new"]["document_root"]);
			if(!is_dir($new_dir)) exec('mkdir -p '.$new_dir);
			exec('mv '.$data["old"]["document_root"].' '.$new_dir);
			$app->log("Moving site to new document root: ".'mv '.$data["old"]["document_root"].' '.$new_dir,LOGLEVEL_DEBUG);
292

293 294
			//* Change the owner of the website files to the new website owner
			exec('chown --recursive --from='.escapeshellcmd($data["old"]["system_user"]).':'.escapeshellcmd($data['old']['system_group']).' '.escapeshellcmd($data["new"]["system_user"]).':'.escapeshellcmd($data['new']['system_group']).' '.$new_dir);
295

296 297 298 299 300 301
			//* Change the home directory and group of the website user
			$command = 'usermod';
			$command .= ' --home '.escapeshellcmd($data["new"]["document_root"]);
			$command .= ' --gid '.escapeshellcmd($data['new']['system_group']);
			$command .= ' '.escapeshellcmd($data["new"]["system_user"]);
			exec($command);
302

303
			if($apache_chrooted) $this->_exec("chroot ".escapeshellcmd($web_config['website_basedir'])." ".$command);
304 305


306
		}
307

308
		//print_r($data);
309

310 311 312 313 314 315 316
		// Check if the directories are there and create them if nescessary.
		if(!is_dir($data["new"]["document_root"]."/web")) exec("mkdir -p ".$data["new"]["document_root"]."/web");
		if(!is_dir($data["new"]["document_root"]."/web/error") and $data["new"]["errordocs"]) exec("mkdir -p ".$data["new"]["document_root"]."/web/error");
		//if(!is_dir($data["new"]["document_root"]."/log")) exec("mkdir -p ".$data["new"]["document_root"]."/log");
		if(!is_dir($data["new"]["document_root"]."/ssl")) exec("mkdir -p ".$data["new"]["document_root"]."/ssl");
		if(!is_dir($data["new"]["document_root"]."/cgi-bin")) exec("mkdir -p ".$data["new"]["document_root"]."/cgi-bin");
		if(!is_dir($data["new"]["document_root"]."/tmp")) exec("mkdir -p ".$data["new"]["document_root"]."/tmp");
317

318 319 320 321 322
		// Remove the symlink for the site, if site is renamed
		if($this->action == 'update' && $data["old"]["domain"] != '' && $data["new"]["domain"] != $data["old"]["domain"]) {
			if(is_dir('/var/log/ispconfig/httpd/'.$data["old"]["domain"])) exec('rm -rf /var/log/ispconfig/httpd/'.$data["old"]["domain"]);
			if(is_link($data["old"]["document_root"]."/log")) unlink($data["old"]["document_root"]."/log");
		}
323

324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344
		// Create the symlink for the logfiles
		if(!is_dir('/var/log/ispconfig/httpd/'.$data["new"]["domain"])) exec('mkdir -p /var/log/ispconfig/httpd/'.$data["new"]["domain"]);
		if(!is_link($data["new"]["document_root"]."/log")) {
			exec("ln -s /var/log/ispconfig/httpd/".$data["new"]["domain"]." ".$data["new"]["document_root"]."/log");
			$app->log("Creating Symlink: ln -s /var/log/ispconfig/httpd/".$data["new"]["domain"]." ".$data["new"]["document_root"]."/log",LOGLEVEL_DEBUG);
		}
		/*
		// Create the symlink for the logfiles
		// This does not work as vlogger can not log trogh symlinks.
		if($this->action == 'update' && $data["old"]["domain"] != '' && $data["new"]["domain"] != $data["old"]["domain"]) {
			if(is_dir($data["old"]["document_root"]."/log")) exec('rm -rf '.$data["old"]["document_root"]."/log");
			if(is_link('/var/log/ispconfig/httpd/'.$data["old"]["domain"])) unlink('/var/log/ispconfig/httpd/'.$data["old"]["domain"]);
		}
		
		// Create the symlink for the logfiles
		if(!is_dir($data["new"]["document_root"]."/log")) exec('mkdir -p '.$data["new"]["document_root"]."/log");
		if(!is_link('/var/log/ispconfig/httpd/'.$data["new"]["domain"])) {
			exec("ln -s ".$data["new"]["document_root"]."/log /var/log/ispconfig/httpd/".$data["new"]["domain"]);
			$app->log("Creating Symlink: ln -s ".$data["new"]["document_root"]."/log /var/log/ispconfig/httpd/".$data["new"]["domain"],LOGLEVEL_DEBUG);
		}
		*/
345

346 347 348 349
		// Get the client ID
		$client = $app->dbmaster->queryOneRecord("SELECT client_id FROM sys_group WHERE sys_group.groupid = ".intval($data["new"]["sys_groupid"]));
		$client_id = intval($client["client_id"]);
		unset($client);
350

351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367
		// Remove old symlinks, if site is renamed
		if($this->action == 'update' && $data["old"]["domain"] != '' && $data["new"]["domain"] != $data["old"]["domain"]) {
			$tmp_symlinks_array = explode(':',$web_config["website_symlinks"]);
			if(is_array($tmp_symlinks_array)) {
				foreach($tmp_symlinks_array as $tmp_symlink) {
					$tmp_symlink = str_replace("[client_id]",$client_id,$tmp_symlink);
					$tmp_symlink = str_replace("[website_domain]",$data["old"]["domain"],$tmp_symlink);
					// Remove trailing slash
					if(substr($tmp_symlink, -1, 1) == '/') $tmp_symlink = substr($tmp_symlink, 0, -1);
					// remove the symlinks, if not exist
					if(is_link($tmp_symlink)) {
						exec("rm -f ".escapeshellcmd($tmp_symlink));
						$app->log("Removed Symlink: rm -f ".$tmp_symlink,LOGLEVEL_DEBUG);
					}
				}
			}
		}
368

369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387
		// Create the symlinks for the sites
		$tmp_symlinks_array = explode(':',$web_config["website_symlinks"]);
		if(is_array($tmp_symlinks_array)) {
			foreach($tmp_symlinks_array as $tmp_symlink) {
				$tmp_symlink = str_replace("[client_id]",$client_id,$tmp_symlink);
				$tmp_symlink = str_replace("[website_domain]",$data["new"]["domain"],$tmp_symlink);
				// Remove trailing slash
				if(substr($tmp_symlink, -1, 1) == '/') $tmp_symlink = substr($tmp_symlink, 0, -1);
				//* Remove symlink if target folder has been changed.
				if($data["old"]["document_root"] != '' && $data["old"]["document_root"] != $data["new"]["document_root"] && is_link($tmp_symlink)) {
					unlink($tmp_symlink);
				}
				// create the symlinks, if not exist
				if(!is_link($tmp_symlink)) {
					exec("ln -s ".escapeshellcmd($data["new"]["document_root"])."/ ".escapeshellcmd($tmp_symlink));
					$app->log("Creating Symlink: ln -s ".$data["new"]["document_root"]."/ ".$tmp_symlink,LOGLEVEL_DEBUG);
				}
			}
		}
388 389


390 391
		if($this->action == 'insert' && $data["new"]["type"] == 'vhost') {
			// Copy the error pages
392
			if($data["new"]["errordocs"]) {
393
				$error_page_path = escapeshellcmd($data["new"]["document_root"])."/web/error/";
394
				if (file_exists("/usr/local/ispconfig/server/conf-custom/error/".substr(escapeshellcmd($conf["language"]),0,2))) {
395 396 397
					exec("cp /usr/local/ispconfig/server/conf-custom/error/".substr(escapeshellcmd($conf["language"]),0,2)."/* ".$error_page_path);
				}
				else {
398
					if (file_exists("/usr/local/ispconfig/server/conf-custom/error/400.html")) {
399 400 401 402 403 404 405 406 407 408
						exec("cp /usr/local/ispconfig/server/conf-custom/error/*.html ".$error_page_path);
					}
					else {
						exec("cp /usr/local/ispconfig/server/conf/error/".substr(escapeshellcmd($conf["language"]),0,2)."/* ".$error_page_path);
					}
				}
				exec("chmod -R a+r ".$error_page_path);
			}

			// copy the standard index page
409
			if (file_exists("/usr/local/ispconfig/server/conf-custom/index/standard_index.html_".substr(escapeshellcmd($conf["language"]),0,2))) {
410 411 412
				exec("cp /usr/local/ispconfig/server/conf-custom/index/standard_index.html_".substr(escapeshellcmd($conf["language"]),0,2)." ".escapeshellcmd($data["new"]["document_root"])."/web/index.html");
			}
			else {
413
				if (file_exists("/usr/local/ispconfig/server/conf-custom/index/standard_index.html")) {
414 415 416 417 418 419 420 421 422 423
					exec("cp /usr/local/ispconfig/server/conf-custom/index/standard_index.html ".escapeshellcmd($data["new"]["document_root"])."/web/index.html");
				}
				else {
					exec("cp /usr/local/ispconfig/server/conf/index/standard_index.html_".substr(escapeshellcmd($conf["language"]),0,2)." ".escapeshellcmd($data["new"]["document_root"])."/web/index.html");
					exec("cp /usr/local/ispconfig/server/conf/index/favicon.ico ".escapeshellcmd($data["new"]["document_root"])."/web/");
					exec("cp /usr/local/ispconfig/server/conf/index/robots.txt ".escapeshellcmd($data["new"]["document_root"])."/web/");
					exec("cp /usr/local/ispconfig/server/conf/index/.htaccess ".escapeshellcmd($data["new"]["document_root"])."/web/");
				}
			}
			exec("chmod -R a+r ".escapeshellcmd($data["new"]["document_root"])."/web/");
424 425

			//** Copy the error documents on update when the error document checkbox has been activated and was deactivated before
426
		} elseif ($this->action == 'update' && $data["new"]["type"] == 'vhost' && $data["old"]["errordocs"] == 0 && $data["new"]["errordocs"] == 1) {
427

428
			$error_page_path = escapeshellcmd($data["new"]["document_root"])."/web/error/";
429
			if (file_exists("/usr/local/ispconfig/server/conf-custom/error/".substr(escapeshellcmd($conf["language"]),0,2))) {
430 431 432
				exec("cp /usr/local/ispconfig/server/conf-custom/error/".substr(escapeshellcmd($conf["language"]),0,2)."/* ".$error_page_path);
			}
			else {
433
				if (file_exists("/usr/local/ispconfig/server/conf-custom/error/400.html")) {
434 435 436 437 438 439 440 441
					exec("cp /usr/local/ispconfig/server/conf-custom/error/*.html ".$error_page_path);
				}
				else {
					exec("cp /usr/local/ispconfig/server/conf/error/".substr(escapeshellcmd($conf["language"]),0,2)."/* ".$error_page_path);
				}
			}
			exec("chmod -R a+r ".$error_page_path);
		}  // end copy error docs
442

443 444
		// Create group and user, if not exist
		$app->uses("system");
445

446 447 448
		$groupname = escapeshellcmd($data["new"]["system_group"]);
		if($data["new"]["system_group"] != '' && !$app->system->is_group($data["new"]["system_group"])) {
			exec("groupadd $groupname");
449
			if($apache_chrooted) $this->_exec("chroot ".escapeshellcmd($web_config['website_basedir'])." groupadd $groupname");
450 451
			$app->log("Adding the group: $groupname",LOGLEVEL_DEBUG);
		}
452

453 454
		$username = escapeshellcmd($data["new"]["system_user"]);
		if($data["new"]["system_user"] != '' && !$app->system->is_user($data["new"]["system_user"])) {
tbrehm's avatar
tbrehm committed
455
			exec("useradd -d ".escapeshellcmd($data["new"]["document_root"])." -g $groupname -G sshusers $username -s /bin/false");
456
			if($apache_chrooted) $this->_exec("chroot ".escapeshellcmd($web_config['website_basedir'])." "."useradd -d ".escapeshellcmd($data["new"]["document_root"])." -g $groupname -G sshusers $username -s /bin/false");
457 458
			$app->log("Adding the user: $username",LOGLEVEL_DEBUG);
		}
459

460 461
		// Set the quota for the user
		if($username != '' && $app->system->is_user($username)) {
462 463 464 465 466 467
			if($data["new"]["hd_quota"] > 0) {
				$blocks_soft = $data["new"]["hd_quota"] * 1024;
				$blocks_hard = $blocks_soft + 1024;
			} else {
				$blocks_soft = $blocks_hard = 0;
			}
468 469 470
			exec("setquota -u $username $blocks_soft $blocks_hard 0 0 -a &> /dev/null");
			exec("setquota -T -u $username 604800 604800 -a &> /dev/null");
		}
471

472 473
		if($this->action == 'insert') {
			// Chown and chmod the directories below the document root
474
			$this->_exec("chown -R $username:$groupname ".escapeshellcmd($data["new"]["document_root"]));
475 476
			// The document root itself has to be owned by root in normal level and by the web owner in security level 20
			if($web_config['security_level'] == 20) {
477
				$this->_exec("chown $username:$groupname ".escapeshellcmd($data["new"]["document_root"]));
478
			} else {
479
				$this->_exec("chown root:root ".escapeshellcmd($data["new"]["document_root"]));
480
			}
481
		}
482 483 484



485
		//* If the security level is set to high
tbrehm's avatar
tbrehm committed
486
		if($web_config['security_level'] == 20) {
487

488 489 490
			$this->_exec("chmod 751 ".escapeshellcmd($data["new"]["document_root"]."/"));
			$this->_exec("chmod 751 ".escapeshellcmd($data["new"]["document_root"])."/*");
			$this->_exec("chmod 710 ".escapeshellcmd($data["new"]["document_root"]."/web"));
491

492
			// make temp direcory writable for the apache user and the website user
493
			$this->_exec("chmod 777 ".escapeshellcmd($data["new"]["document_root"]."/tmp"));
494

495 496 497
			$command = 'usermod';
			$command .= ' --groups sshusers';
			$command .= ' '.escapeshellcmd($data["new"]["system_user"]);
498
			$this->_exec($command);
499

500 501
			//* if we have a chrooted apache enviroment
			if($apache_chrooted) {
502
				$this->_exec("chroot ".escapeshellcmd($web_config['website_basedir'])." ".$command);
503

504 505 506 507 508 509 510
				//* add the apache user to the client group in the chroot enviroment
				$tmp_groupfile = $app->system->server_conf["group_datei"];
				$app->system->server_conf["group_datei"] = $web_config['website_basedir'].'/etc/group';
				$app->system->add_user_to_group($groupname, escapeshellcmd($web_config['user']));
				$app->system->server_conf["group_datei"] = $tmp_groupfile;
				unset($tmp_groupfile);
			}
511

tbrehm's avatar
tbrehm committed
512 513
			//* add the apache user to the client group
			$app->system->add_user_to_group($groupname, escapeshellcmd($web_config['user']));
514

515
			$this->_exec("chown $username:$groupname ".escapeshellcmd($data["new"]["document_root"]));
516

517 518 519 520
			/*
			* Workaround for jailkit: If jailkit is enabled for the site, the 
			* website root has to be owned by the root user and we have to chmod it to 755 then
			*/
521

522 523 524
			//* Check if there is a jailkit user for this site
			$tmp = $app->db->queryOneRecord("SELECT count(shell_user_id) as number FROM shell_user WHERE parent_domain_id = ".$data["new"]["domain_id"]." AND chroot = 'jailkit'");
			if($tmp['number'] > 0) {
525 526
				$this->_exec("chmod 755 ".escapeshellcmd($data["new"]["document_root"]."/"));
				$this->_exec("chown root:root ".escapeshellcmd($data["new"]["document_root"]."/"));
527 528
			}
			unset($tmp);
529 530

			// If the security Level is set to medium
tbrehm's avatar
tbrehm committed
531
		} else {
532

533 534 535
			$this->_exec("chmod 755 ".escapeshellcmd($data["new"]["document_root"]."/"));
			$this->_exec("chmod 755 ".escapeshellcmd($data["new"]["document_root"]."/*"));
			$this->_exec("chown root:root ".escapeshellcmd($data["new"]["document_root"]."/"));
536

tbrehm's avatar
tbrehm committed
537
			// make temp direcory writable for the apache user and the website user
538
			$this->_exec("chmod 777 ".escapeshellcmd($data["new"]["document_root"]."/tmp"));
tbrehm's avatar
tbrehm committed
539
		}
540

541 542 543
		// Change the owner of the error log to the owner of the website
		if(!@is_file($data["new"]["document_root"]."/log/error.log")) exec('touch '.escapeshellcmd($data["new"]["document_root"])."/log/error.log");
		$this->_exec("chown $username:$groupname ".escapeshellcmd($data["new"]["document_root"])."/log/error.log");
544 545


546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569
		//* Write the custom php.ini file, if custom_php_ini filed is not empty
		$custom_php_ini_dir = $web_config['website_basedir'].'/conf/'.$data["new"]["system_user"];
		if(!is_dir($web_config['website_basedir'].'/conf')) mkdir($web_config['website_basedir'].'/conf');
		if(trim($data["new"]['custom_php_ini']) != '') {
			$has_custom_php_ini = true;
			if(!is_dir($custom_php_ini_dir)) mkdir($custom_php_ini_dir);
			$php_ini_content = '';
			if($data["new"]['php'] == 'mod') {
				$master_php_ini_path = $web_config['php_ini_path_apache'];
			} else {
				$master_php_ini_path = $web_config['php_ini_path_cgi'];
			}
			if($master_php_ini_path != '' && substr($master_php_ini_path,-7) == 'php.ini' && is_file($master_php_ini_path)) {
				$php_ini_content .= file_get_contents($master_php_ini_path)."\n";
			}
			$php_ini_content .= trim($data["new"]['custom_php_ini']);
			file_put_contents($custom_php_ini_dir.'/php.ini',$php_ini_content);
		} else {
			$has_custom_php_ini = false;
			if(is_file($custom_php_ini_dir.'/php.ini')) unlink($custom_php_ini_dir.'/php.ini');
		}


		//* Create the vhost config file
570
		$app->load('tpl');
571

572 573
		$tpl = new tpl();
		$tpl->newTemplate("vhost.conf.master");
574

575 576 577 578
		$vhost_data = $data["new"];
		$vhost_data["web_document_root"] = $data["new"]["document_root"]."/web";
		$vhost_data["web_document_root_www"] = $web_config["website_basedir"]."/".$data["new"]["domain"]."/web";
		$vhost_data["web_basedir"] = $web_config["website_basedir"];
tbrehm's avatar
tbrehm committed
579
		$vhost_data["security_level"] = $web_config["security_level"];
580
		$vhost_data["allow_override"] = ($data["new"]["allow_override"] == '')?'All':$data["new"]["allow_override"];
581
		$vhost_data["php_open_basedir"] = ($data["new"]["php_open_basedir"] == '')?$data["new"]["document_root"]:$data["new"]["php_open_basedir"];
vogelor's avatar
vogelor committed
582
		$vhost_data["ssl_domain"] = $data["new"]["ssl_domain"];
583 584
		$vhost_data["has_custom_php_ini"] = $has_custom_php_ini;
		$vhost_data["custom_php_ini_dir"] = escapeshellcmd($custom_php_ini_dir);
585

586 587
		// Check if a SSL cert exists
		$ssl_dir = $data["new"]["document_root"]."/ssl";
vogelor's avatar
vogelor committed
588
		$domain = $data["new"]["ssl_domain"];
589 590
		$key_file = $ssl_dir.'/'.$domain.".key";
		$crt_file = $ssl_dir.'/'.$domain.".crt";
591
		$bundle_file = $ssl_dir.'/'.$domain.".bundle";
592

593 594 595 596 597 598 599
		if($data["new"]["ssl"] == 'y' && @is_file($crt_file) && @is_file($key_file)) {
			$vhost_data["ssl_enabled"] = 1;
			$app->log("Enable SSL for: $domain",LOGLEVEL_DEBUG);
		} else {
			$vhost_data["ssl_enabled"] = 0;
			$app->log("Disable SSL for: $domain",LOGLEVEL_DEBUG);
		}
600

601
		if(@is_file($bundle_file)) $vhost_data['has_bundle_cert'] = 1;
602

603 604
		//$vhost_data["document_root"] = $data["new"]["document_root"]."/web";
		$tpl->setVar($vhost_data);
605

606 607 608
		// Rewrite rules
		$rewrite_rules = array();
		if($data["new"]["redirect_type"] != '') {
609
			if(substr($data["new"]["redirect_path"],-1) != '/') $data["new"]["redirect_path"] .= '/';
tbrehm's avatar
tbrehm committed
610
			/* Disabled path extension
611 612 613
			if($data["new"]["redirect_type"] == 'no' && substr($data["new"]["redirect_path"],0,4) != 'http') {
				$data["new"]["redirect_path"] = $data["new"]["document_root"]."/web".realpath($data["new"]["redirect_path"]).'/';
			}
tbrehm's avatar
tbrehm committed
614
			*/
615

616
			$rewrite_rules[] = array(	'rewrite_domain' 	=> $data["new"]["domain"],
617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632
					'rewrite_type' 		=> ($data["new"]["redirect_type"] == 'no')?'':'['.$data["new"]["redirect_type"].']',
					'rewrite_target' 	=> $data["new"]["redirect_path"]);

			switch($data["new"]["subdomain"]) {
				case 'www':
					$rewrite_rules[] = array(	'rewrite_domain' 	=> 'www.'.$data["new"]["domain"],
							'rewrite_type' 		=> ($data["new"]["redirect_type"] == 'no')?'':'['.$data["new"]["redirect_type"].']',
							'rewrite_target' 	=> $data["new"]["redirect_path"]);
					break;
				case '*':
				// TODO
				//$rewrite_rules[] = array(	'rewrite_domain' 	=> '*'.$alias["domain"],
				//							'rewrite_type' 		=> $alias["redirect_type"],
				//							'rewrite_target' 	=> $alias["redirect_path"]);
					break;
			}
633
		}
634

635 636
		// get alias domains (co-domains and subdomains)
		$aliases = $app->db->queryAllRecords("SELECT * FROM web_domain WHERE parent_domain_id = ".$data["new"]["domain_id"]." AND active = 'y'");
637
		$server_alias = array();
638
		switch($data["new"]["subdomain"]) {
639 640 641 642 643 644 645
			case 'www':
				$server_alias[] .= 'www.'.$data["new"]["domain"].' ';
				break;
			case '*':
				$server_alias[] .= '*.'.$data["new"]["domain"].' ';
				break;
		}
646 647
		if(is_array($aliases)) {
			foreach($aliases as $alias) {
648 649 650 651 652 653 654 655 656 657 658
				switch($alias["subdomain"]) {
					case 'www':
						$server_alias[] .= 'www.'.$alias["domain"].' '.$alias["domain"].' ';
						break;
					case '*':
						$server_alias[] .= '*.'.$alias["domain"].' '.$alias["domain"].' ';
						break;
					default:
						$server_alias[] .= $alias["domain"].' ';
						break;
				}
659 660 661
				$app->log("Add server alias: $alias[domain]",LOGLEVEL_DEBUG);
				// Rewriting
				if($alias["redirect_type"] != '') {
662
					if(substr($data["new"]["redirect_path"],-1) != '/') $data["new"]["redirect_path"] .= '/';
tbrehm's avatar
tbrehm committed
663
					/* Disabled the path extension
664 665 666
					if($data["new"]["redirect_type"] == 'no' && substr($data["new"]["redirect_path"],0,4) != 'http') {
						$data["new"]["redirect_path"] = $data["new"]["document_root"]."/web".realpath($data["new"]["redirect_path"]).'/';
					}
tbrehm's avatar
tbrehm committed
667
					*/
668
					$rewrite_rules[] = array(	'rewrite_domain' 	=> $alias["domain"],
669 670 671 672 673 674 675 676 677 678 679 680 681 682 683
							'rewrite_type' 		=> ($alias["redirect_type"] == 'no')?'':'['.$alias["redirect_type"].']',
							'rewrite_target' 	=> $alias["redirect_path"]);
					switch($alias["subdomain"]) {
						case 'www':
							$rewrite_rules[] = array(	'rewrite_domain' 	=> 'www.'.$alias["domain"],
									'rewrite_type' 		=> ($alias["redirect_type"] == 'no')?'':'['.$alias["redirect_type"].']',
									'rewrite_target' 	=> $alias["redirect_path"]);
							break;
						case '*':
						// TODO
						//$rewrite_rules[] = array(	'rewrite_domain' 	=> '*'.$alias["domain"],
						//							'rewrite_type' 		=> $alias["redirect_type"],
						//							'rewrite_target' 	=> $alias["redirect_path"]);
							break;
					}
684 685 686
				}
			}
		}
687

688 689 690 691
		//* If we have some alias records
		if(count($server_alias) > 0) {
			$server_alias_str = '';
			$n = 0;
692

693 694 695 696 697 698
			// begin a new ServerAlias line after 30 alias domains
			foreach($server_alias as $tmp_alias) {
				if($n % 30 == 0) $server_alias_str .= "\n    ServerAlias ";
				$server_alias_str .= $tmp_alias;
			}
			unset($tmp_alias);
699

700 701 702 703
			$tpl->setVar('alias',trim($server_alias_str));
		} else {
			$tpl->setVar('alias','');
		}
704

705 706 707 708 709 710
		if(count($rewrite_rules) > 0) {
			$tpl->setVar('rewrite_enabled',1);
		} else {
			$tpl->setVar('rewrite_enabled',0);
		}
		$tpl->setLoop('redirects',$rewrite_rules);
711 712 713

		/**
		 * install fast-cgi starter script and add script aliasd config
714 715 716 717
		 * first we create the script directory if not already created, then copy over the starter script
		 * settings are copied over from the server ini config for now
		 * TODO: Create form for fastcgi configs per site.
		 */
718 719

		if ($data["new"]["php"] == "fast-cgi") {
720
			$fastcgi_config = $app->getconf->get_server_config($conf["server_id"], 'fastcgi');
721

722 723
			$fastcgi_starter_path = str_replace("[system_user]",$data["new"]["system_user"],$fastcgi_config["fastcgi_starter_path"]);
			$fastcgi_starter_path = str_replace("[client_id]",$client_id,$fastcgi_starter_path);
724 725

			if (!is_dir($fastcgi_starter_path)) {
726
				exec("mkdir -p ".escapeshellcmd($fastcgi_starter_path));
727
				//exec("chown ".$data["new"]["system_user"].":".$data["new"]["system_group"]." ".escapeshellcmd($fastcgi_starter_path));
728 729


730 731
				$app->log("Creating fastcgi starter script directory: $fastcgi_starter_path",LOGLEVEL_DEBUG);
			}
732

733
			exec("chown -R ".$data["new"]["system_user"].":".$data["new"]["system_group"]." ".escapeshellcmd($fastcgi_starter_path));
734

735 736
			$fcgi_tpl = new tpl();
			$fcgi_tpl->newTemplate("php-fcgi-starter.master");
737 738 739 740 741 742
			
			if($has_custom_php_ini) {
				$fcgi_tpl->setVar('php_ini_path',escapeshellcmd($custom_php_ini_dir));
			} else {
				$fcgi_tpl->setVar('php_ini_path',escapeshellcmd($fastcgi_config["fastcgi_phpini_path"]));
			}
743 744 745 746 747
			$fcgi_tpl->setVar('document_root',escapeshellcmd($data["new"]["document_root"]));
			$fcgi_tpl->setVar('php_fcgi_children',escapeshellcmd($fastcgi_config["fastcgi_children"]));
			$fcgi_tpl->setVar('php_fcgi_max_requests',escapeshellcmd($fastcgi_config["fastcgi_max_requests"]));
			$fcgi_tpl->setVar('php_fcgi_bin',escapeshellcmd($fastcgi_config["fastcgi_bin"]));
			$fcgi_tpl->setVar('security_level',intval($web_config["security_level"]));
748

749
			$php_open_basedir = ($data["new"]["php_open_basedir"] == '')?$data["new"]["document_root"]:$data["new"]["php_open_basedir"];
750
			$fcgi_tpl->setVar('open_basedir', escapeshellcmd($php_open_basedir));
751

752 753 754
			$fcgi_starter_script = escapeshellcmd($fastcgi_starter_path.$fastcgi_config["fastcgi_starter_script"]);
			file_put_contents($fcgi_starter_script,$fcgi_tpl->grab());
			unset($fcgi_tpl);
755

756
			$app->log("Creating fastcgi starter script: $fcgi_starter_script",LOGLEVEL_DEBUG);
757 758


759 760 761 762 763 764
			exec("chmod 755 $fcgi_starter_script");
			exec("chown ".$data["new"]["system_user"].":".$data["new"]["system_group"]." $fcgi_starter_script");

			$tpl->setVar('fastcgi_alias',$fastcgi_config["fastcgi_alias"]);
			$tpl->setVar('fastcgi_starter_path',$fastcgi_starter_path);
			$tpl->setVar('fastcgi_starter_script',$fastcgi_config["fastcgi_starter_script"]);
765

766
		}
767

768 769 770 771 772 773 774
		/**
		 * install cgi starter script and add script alias to config.
		 * This is needed to allow cgi with suexec (to do so, we need a bin in the document-path!)
		 * first we create the script directory if not already created, then copy over the starter script.
		 * TODO: we have to fetch the data from the server-settings.
		 */

775
		if ($data["new"]["php"] == "cgi") {
776 777 778 779 780 781 782 783 784
			//$cgi_config = $app->getconf->get_server_config($conf["server_id"], 'cgi');

			$cgi_config["cgi_starter_path"] = $web_config["website_basedir"]."/php-cgi-scripts/[system_user]/";
			$cgi_config["cgi_starter_script"] = "php-cgi-starter";
			$cgi_config["cgi_bin"] = "/usr/bin/php-cgi";

			$cgi_starter_path = str_replace("[system_user]",$data["new"]["system_user"],$cgi_config["cgi_starter_path"]);
			$cgi_starter_path = str_replace("[client_id]",$client_id,$cgi_starter_path);

785
			if (!is_dir($cgi_starter_path)) {
786 787 788 789 790 791 792 793 794 795
				exec("mkdir -p ".escapeshellcmd($cgi_starter_path));
				exec("chown ".$data["new"]["system_user"].":".$data["new"]["system_group"]." ".escapeshellcmd($cgi_starter_path));

				$app->log("Creating cgi starter script directory: $cgi_starter_path",LOGLEVEL_DEBUG);
			}

			$cgi_tpl = new tpl();
			$cgi_tpl->newTemplate("php-cgi-starter.master");

			// This works, because php "rewrites" a symlink to the physical path
796
			$php_open_basedir = ($data["new"]["php_open_basedir"] == '')?$data["new"]["document_root"]:$data["new"]["php_open_basedir"];
797
			$cgi_tpl->setVar('open_basedir', escapeshellcmd($php_open_basedir));
798
			$cgi_tpl->setVar('document_root', escapeshellcmd($data["new"]["document_root"]));
799

800 801 802
			// This will NOT work!
			//$cgi_tpl->setVar('open_basedir', "/var/www/" . $data["new"]["domain"]);
			$cgi_tpl->setVar('php_cgi_bin',$cgi_config["cgi_bin"]);
803
			$cgi_tpl->setVar('security_level',$web_config["security_level"]);
804 805 806 807 808 809 810
			
			$cgi_tpl->setVar('has_custom_php_ini',$has_custom_php_ini);
			if($has_custom_php_ini) {
				$cgi_tpl->setVar('php_ini_path',escapeshellcmd($custom_php_ini_dir));
			} else {
				$cgi_tpl->setVar('php_ini_path',escapeshellcmd($fastcgi_config["fastcgi_phpini_path"]));
			}
811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827

			$cgi_starter_script = escapeshellcmd($cgi_starter_path.$cgi_config["cgi_starter_script"]);
			file_put_contents($cgi_starter_script,$cgi_tpl->grab());
			unset($cgi_tpl);

			$app->log("Creating cgi starter script: $cgi_starter_script",LOGLEVEL_DEBUG);


			exec("chmod 755 $cgi_starter_script");
			exec("chown ".$data["new"]["system_user"].":".$data["new"]["system_group"]." $cgi_starter_script");

			$tpl->setVar('cgi_starter_path',$cgi_starter_path);
			$tpl->setVar('cgi_starter_script',$cgi_config["cgi_starter_script"]);

		}

		$vhost_file = escapeshellcmd($web_config["vhost_conf_dir"].'/'.$data["new"]["domain"].'.vhost');
828 829 830 831
		//* Make a backup copy of vhost file
		copy($vhost_file,$vhost_file.'~');
		
		//* Write vhost file
832 833 834
		file_put_contents($vhost_file,$tpl->grab());
		$app->log("Writing the vhost file: $vhost_file",LOGLEVEL_DEBUG);
		unset($tpl);
835 836 837 838 839 840

		/*
		 * maybe we have some webdav - user. If so, add them...
		*/
		$this->_patchVhostWebdav($vhost_file, $data["new"]["document_root"] . '/webdav');

841 842 843 844 845 846
		// Set the symlink to enable the vhost
		$vhost_symlink = escapeshellcmd($web_config["vhost_conf_enabled_dir"].'/'.$data["new"]["domain"].'.vhost');
		if($data["new"]["active"] == 'y' && !is_link($vhost_symlink)) {
			symlink($vhost_file,$vhost_symlink);
			$app->log("Creating the symlink: $vhost_symlink => $vhost_file",LOGLEVEL_DEBUG);
		}
847

848 849 850 851 852
		// Remove the symlink, if site is inactive
		if($data["new"]["active"] == 'n' && is_link($vhost_symlink)) {
			unlink($vhost_symlink);
			$app->log("Removing symlink: $vhost_symlink => $vhost_file",LOGLEVEL_DEBUG);
		}
853

854 855 856 857 858 859 860 861 862
		// remove old symlink and vhost file, if domain name of the site has changed
		if($this->action == 'update' && $data["old"]["domain"] != '' && $data["new"]["domain"] != $data["old"]["domain"]) {
			$vhost_symlink = escapeshellcmd($web_config["vhost_conf_enabled_dir"].'/'.$data["old"]["domain"].'.vhost');
			unlink($vhost_symlink);
			$app->log("Removing symlink: $vhost_symlink => $vhost_file",LOGLEVEL_DEBUG);
			$vhost_file = escapeshellcmd($web_config["vhost_conf_dir"].'/'.$data["old"]["domain"].'.vhost');
			unlink($vhost_file);
			$app->log("Removing File $vhost_file",LOGLEVEL_DEBUG);
		}
863

864
		//* Create .htaccess and .htpasswd file for website statistics
865
		if(!is_file($data["new"]["document_root"].'/web/stats/.htaccess') or $data["old"]["document_root"] != $data["new"]["document_root"]) {
866
			if(!is_dir($data["new"]["document_root"].'/web/stats')) mkdir($data["new"]["document_root"].'/web/stats');
867
			$ht_file = "AuthType Basic\nAuthName \"Members Only\"\nAuthUserFile ".$data["new"]["document_root"]."/.htpasswd_stats\nrequire valid-user";
868
			file_put_contents($data["new"]["document_root"].'/web/stats/.htaccess',$ht_file);
869
			chmod($data["new"]["document_root"].'/web/stats/.htaccess',0755);
870 871
			unset($ht_file);
		}
872

873 874 875 876
		if(!is_file($data["new"]["document_root"].'/.htpasswd_stats') || $data["new"]["stats_password"] != $data["old"]["stats_password"]) {
			if(trim($data["new"]["stats_password"]) != '') {
				$htp_file = 'admin:'.trim($data["new"]["stats_password"]);
				file_put_contents($data["new"]["document_root"].'/.htpasswd_stats'