diff --git a/docs/autoinstall_samples/autoinstall.conf_sample.php b/docs/autoinstall_samples/autoinstall.conf_sample.php index b5f3a577305e2780ae1c5de46138e08d72d53c6b..904d65403cb40c4060094c813dcc2eae4f121803 100644 --- a/docs/autoinstall_samples/autoinstall.conf_sample.php +++ b/docs/autoinstall_samples/autoinstall.conf_sample.php @@ -13,6 +13,10 @@ $autoinstall['http_server'] = 'nginx'; // apache (default), nginx $autoinstall['ispconfig_port'] = '8080'; // default: 8080 $autoinstall['ispconfig_use_ssl'] = 'y'; // y (default), n $autoinstall['ispconfig_admin_password'] = 'admin'; // default: admin +$autoinstall['create_ssl_server_certs'] = 'y'; +$autoinstall['ignore_hostname_dns'] = 'n'; +$autoinstall['ispconfig_postfix_ssl_symlink'] = 'y'; +$autoinstall['ispconfig_pureftpd_ssl_symlink'] = 'y'; /* SSL Settings */ $autoinstall['ssl_cert_country'] = 'AU'; @@ -52,6 +56,10 @@ $autoupdate['reconfigure_services'] = 'yes'; // yes (default), no $autoupdate['ispconfig_port'] = '8080'; // default: 8080 $autoupdate['create_new_ispconfig_ssl_cert'] = 'no'; // no (default), yes $autoupdate['reconfigure_crontab'] = 'yes'; // yes (default), no +$autoupdate['create_ssl_server_certs'] = 'y'; +$autoupdate['ignore_hostname_dns'] = 'n'; +$autoupdate['ispconfig_postfix_ssl_symlink'] = 'y'; +$autoupdate['ispconfig_pureftpd_ssl_symlink'] = 'y'; /* These are for service-detection (defaulting to old behaviour where alle changes were automatically accepted) */ $autoupdate['svc_detect_change_mail_server'] = 'yes'; // yes (default), no diff --git a/docs/autoinstall_samples/autoinstall.ini.sample b/docs/autoinstall_samples/autoinstall.ini.sample index 74523ffbc3fc152b1c82be92cd4067c95cc8d91d..bf47122074f5f097e3ab5da5fb5a9cdf8770a266 100644 --- a/docs/autoinstall_samples/autoinstall.ini.sample +++ b/docs/autoinstall_samples/autoinstall.ini.sample @@ -12,6 +12,10 @@ http_server=apache ispconfig_port=8080 ispconfig_use_ssl=y ispconfig_admin_password=admin +create_ssl_server_certs=y +ignore_hostname_dns=n +ispconfig_postfix_ssl_symlink=y +ispconfig_pureftpd_ssl_symlink=y [ssl_cert] ssl_cert_country=AU @@ -51,6 +55,10 @@ reconfigure_services=yes ispconfig_port=8080 create_new_ispconfig_ssl_cert=no reconfigure_crontab=yes +create_ssl_server_certs=y +ignore_hostname_dns=n +ispconfig_postfix_ssl_symlink=y +ispconfig_pureftpd_ssl_symlink=y ; These are for service-detection (defaulting to old behaviour where alle changes were automatically accepted) svc_detect_change_mail_server=yes diff --git a/install/install.php b/install/install.php index cdf6806092be0f2d5f81db3468a4e9e8bdb702b8..a894ed45b4d9f672244f3de1a4e7453e4e812c35 100644 --- a/install/install.php +++ b/install/install.php @@ -582,7 +582,7 @@ if($install_mode == 'standard' || strtolower($inst->simple_query('Install ISPCon // Create SSL certs for non-webserver(s)? if(!file_exists('/usr/local/ispconfig/interface/ssl/ispserver.crt')) { - if(!$issue_tried && strtolower($inst->simple_query('Do you want to create SSL certs for your server?', array('y', 'n'), 'y')) == 'y') { + if(!$issue_tried && strtolower($inst->simple_query('Do you want to create SSL certs for your server?', array('y', 'n'), 'y','create_ssl_server_certs')) == 'y') { $inst->make_ispconfig_ssl_cert(); } } else { diff --git a/install/lib/installer_base.lib.php b/install/lib/installer_base.lib.php index d1212acb039e773f6013e28b3c472a20d5bce5f5..9373d9ab795f2b72fd1e53e6185eeb6b9f66a660 100644 --- a/install/lib/installer_base.lib.php +++ b/install/lib/installer_base.lib.php @@ -391,6 +391,9 @@ class installer_base { } } + // preserve needed values in $conf (should just array_merge $tpl_ini_array into $conf?) + $conf['mail']['content_filter'] = $tpl_ini_array['mail']['content_filter']; + $server_ini_content = array_to_ini($tpl_ini_array); $mail_server_enabled = ($conf['services']['mail'])?1:0; @@ -1475,7 +1478,7 @@ class installer_base { } $new_options[] = $value; } - if ($configure_lmtp) { + if ($configure_lmtp && $conf['mail']['content_filter'] === 'amavisd') { for ($i = 0; isset($new_options[$i]); $i++) { if ($new_options[$i] == 'reject_unlisted_recipient') { array_splice($new_options, $i+1, 0, array("check_recipient_access proxy:mysql:${quoted_config_dir}/mysql-verify_recipients.cf")); @@ -3043,7 +3046,7 @@ class installer_base { exec("cat $ssl_key_file $ssl_crt_file > $ssl_pem_file; chmod 600 $ssl_pem_file"); // Extend LE SSL certs to postfix - if ($conf['postfix']['installed'] == true && strtolower($this->simple_query('Symlink ISPConfig SSL certs to Postfix?', array('y', 'n'), 'y')) == 'y') { + if ($conf['postfix']['installed'] == true && strtolower($this->simple_query('Symlink ISPConfig SSL certs to Postfix?', array('y', 'n'), 'y','ispconfig_postfix_ssl_symlink')) == 'y') { // Define folder, file(s) $cf = $conf['postfix']; @@ -3062,7 +3065,7 @@ class installer_base { } // Extend LE SSL certs to pureftpd - if ($conf['pureftpd']['installed'] == true && strtolower($this->simple_query('Symlink ISPConfig SSL certs to Pure-FTPd? Creating dhparam file may take some time.', array('y', 'n'), 'y')) == 'y') { + if ($conf['pureftpd']['installed'] == true && strtolower($this->simple_query('Symlink ISPConfig SSL certs to Pure-FTPd? Creating dhparam file may take some time.', array('y', 'n'), 'y','ispconfig_pureftpd_ssl_symlink')) == 'y') { // Define folder, file(s) $pureftpd_dir = '/etc/ssl/private'; diff --git a/install/tpl/debian_postfix.conf.master b/install/tpl/debian_postfix.conf.master index 07128357e4d5441addb8757927e869e6af51be47..9e3f22fa7df9bc7343c9de1466e0dec38104dd43 100644 --- a/install/tpl/debian_postfix.conf.master +++ b/install/tpl/debian_postfix.conf.master @@ -49,5 +49,6 @@ smtp_tls_exclude_ciphers = RC4, aNULL smtpd_tls_mandatory_ciphers = medium tls_medium_cipherlist = ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384 tls_preempt_cipherlist = no +address_verify_negative_refresh_time=60s # needed for postfix < 3.3 when using reject_unverified_recipient (lmtp): enable_original_recipient = yes diff --git a/install/tpl/fedora_postfix.conf.master b/install/tpl/fedora_postfix.conf.master index a580f6a04268fdb9698e00270e6666399bdbd495..b227a2714bc1de099a6a23a4d1e91d4371511002 100644 --- a/install/tpl/fedora_postfix.conf.master +++ b/install/tpl/fedora_postfix.conf.master @@ -45,5 +45,6 @@ smtp_tls_exclude_ciphers = RC4, aNULL smtpd_tls_mandatory_ciphers = medium tls_medium_cipherlist = ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384 tls_preempt_cipherlist = no +address_verify_negative_refresh_time=60s # needed for postfix < 3.3 when using reject_unverified_recipient (lmtp): enable_original_recipient = yes diff --git a/install/tpl/gentoo_postfix.conf.master b/install/tpl/gentoo_postfix.conf.master index d0ed3d69f78e749a0d92656e770d6c5a5f43d3ee..5a0e445473cbbcfd06217dabab0bcb7465af541f 100644 --- a/install/tpl/gentoo_postfix.conf.master +++ b/install/tpl/gentoo_postfix.conf.master @@ -44,5 +44,6 @@ smtp_tls_exclude_ciphers = RC4, aNULL smtpd_tls_mandatory_ciphers = medium tls_medium_cipherlist = ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384 tls_preempt_cipherlist = no +address_verify_negative_refresh_time=60s # needed for postfix < 3.3 when using reject_unverified_recipient (lmtp): enable_original_recipient = yes diff --git a/install/tpl/opensuse_postfix.conf.master b/install/tpl/opensuse_postfix.conf.master index 9065e9fa037036bade4f9460576e6151d9c39ab4..3c04445c3d8d39d2f9825bf6552d72acd8465ffe 100644 --- a/install/tpl/opensuse_postfix.conf.master +++ b/install/tpl/opensuse_postfix.conf.master @@ -47,5 +47,6 @@ smtp_tls_exclude_ciphers = RC4, aNULL smtpd_tls_mandatory_ciphers = medium tls_medium_cipherlist = ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384 tls_preempt_cipherlist = no +address_verify_negative_refresh_time=60s # needed for postfix < 3.3 when using reject_unverified_recipient (lmtp): enable_original_recipient = yes diff --git a/install/update.php b/install/update.php index 75be8a46ccaf72fef45e4b87890b68d3e371899a..94fca6b101fb29fa4e2bb1f9dbada4ab06d7efab 100644 --- a/install/update.php +++ b/install/update.php @@ -548,7 +548,7 @@ if ($inst->install_ispconfig_interface) { // Create SSL certs for non-webserver(s)? if(!file_exists('/usr/local/ispconfig/interface/ssl/ispserver.crt')) { - if(!$issue_tried && strtolower($inst->simple_query('Do you want to create SSL certs for your server?', array('y', 'n'), 'y')) == 'y') { + if(!$issue_tried && strtolower($inst->simple_query('Do you want to create SSL certs for your server?', array('y', 'n'), 'y','create_ssl_server_certs')) == 'y') { $inst->make_ispconfig_ssl_cert(); } } else { diff --git a/interface/web/themes/default/assets/javascripts/ispconfig.js b/interface/web/themes/default/assets/javascripts/ispconfig.js index ff6dc681dc4d4601b9e8190fe512cde68b741a7a..26cfb0a9e4e577be1e2b00dcd427637e32f1c8c0 100644 --- a/interface/web/themes/default/assets/javascripts/ispconfig.js +++ b/interface/web/themes/default/assets/javascripts/ispconfig.js @@ -176,7 +176,7 @@ var ISPConfig = { ISPConfig.onAfterContentLoad(target, $('#'+formname).serialize()); ISPConfig.pageFormChanged = false; } - clearTimeout(dataLogTimer); + clearTimeout(ISPConfig.dataLogTimer); ISPConfig.dataLogNotification(); ISPConfig.hideLoadIndicator(); }, @@ -285,7 +285,7 @@ var ISPConfig = { ISPConfig.onAfterContentLoad(pagename, (params ? params : null)); ISPConfig.pageFormChanged = false; } - clearTimeout(dataLogTimer); // clear running dataLogTimer + clearTimeout(ISPConfig.dataLogTimer); // clear running dataLogTimer ISPConfig.dataLogNotification(); ISPConfig.hideLoadIndicator(); }, @@ -514,12 +514,12 @@ var ISPConfig = { $('.modal-body').html(dataLogItems.join("")); $('.notification_text').text(data['count']); $('.notification').css('display',''); - dataLogTimer = setTimeout( function() { ISPConfig.dataLogNotification(); }, 2000 ); + ISPConfig.dataLogTimer = setTimeout( function() { ISPConfig.dataLogNotification(); }, 2000 ); } else { $('.notification').css('display','none'); $('.modal-body').html(''); $('#datalogModal').modal('hide'); - dataLogTimer = setTimeout( function() { ISPConfig.dataLogNotification(); }, 5000 ); + ISPConfig.dataLogTimer = setTimeout( function() { ISPConfig.dataLogNotification(); }, 5000 ); } }, error: function() { diff --git a/interface/web/themes/default/assets/javascripts/ispconfig.min.js b/interface/web/themes/default/assets/javascripts/ispconfig.min.js deleted file mode 100644 index e118b994b0b4cc5c1592b86c465e04fcade91796..0000000000000000000000000000000000000000 --- a/interface/web/themes/default/assets/javascripts/ispconfig.min.js +++ /dev/null @@ -1 +0,0 @@ -var ISPConfig={pageFormChanged:!1,tabChangeWarningTxt:"",tabChangeDiscardTxt:"",tabChangeWarning:!1,tabChangeDiscard:!1,requestsRunning:0,indicatorCompleted:!1,registeredHooks:new Array,new_tpl_add_id:0,dataLogTimer:0,options:{useLoadIndicator:!1,useComboBox:!1},setOption:function(a,b){ISPConfig.options[a]=b},setOptions:function(a){$.extend(ISPConfig.options,a)},reportError:function(){},registerHook:function(a,b){ISPConfig.registeredHooks[a]||(ISPConfig.registeredHooks[a]=new Array);var c=ISPConfig.registeredHooks[a].length;ISPConfig.registeredHooks[a][c]=b},callHook:function(a,b){if(ISPConfig.registeredHooks[a])for(var c=0;c