Files
server/opt/psa/admin/sbin/relink-vhost-logs
2026-01-07 20:52:11 +01:00

994 lines
26 KiB
Bash
Executable File

#!/bin/bash
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
#
#
# Plesk script
#
#default values
product_default_conf()
{
PRODUCT_ROOT_D=/opt/psa
PRODUCT_RC_D=/etc/init.d
PRODUCT_ETC_D=/opt/psa/etc
PLESK_LIBEXEC_DIR=/usr/lib/plesk-9.0
HTTPD_VHOSTS_D=/var/www/vhosts
HTTPD_CONF_D=/etc/apache2
HTTPD_INCLUDE_D=/etc/apache2/conf-enabled
HTTPD_BIN=/usr/sbin/apache2
HTTPD_LOG_D=/var/log/apache2
HTTPD_SERVICE=apache2
QMAIL_ROOT_D=/var/qmail
PLESK_MAILNAMES_D=/var/qmail/mailnames
RBLSMTPD=/usr/sbin/rblsmtpd
NAMED_RUN_ROOT_D=/var/named/run-root
WEB_STAT=/usr/bin/webalizer
MYSQL_VAR_D=/var/lib/mysql
MYSQL_BIN_D=/usr/bin
MYSQL_SOCKET=/var/run/mysqld/mysqld.sock
PGSQL_DATA_D=/var/lib/postgresql/16/main
PGSQL_CONF_D=/etc/postgresql/16/main
PGSQL_BIN_D=/usr/lib/postgresql/16/bin
DUMP_D=/var/lib/psa/dumps
DUMP_TMP_D=/tmp
MAILMAN_ROOT_D=/usr/lib/mailman
MAILMAN_VAR_D=/var/lib/mailman
PYTHON_BIN=/usr/bin/python2
GPG_BIN=/usr/bin/gpg
TAR_BIN=/usr/lib/plesk-9.0/sw-tar
AWSTATS_ETC_D=/etc/awstats
AWSTATS_BIN_D=/usr/lib/cgi-bin
AWSTATS_TOOLS_D=/usr/share/awstats/tools
AWSTATS_DOC_D=/usr/share/awstats
OPENSSL_BIN=/usr/bin/openssl
LIB_SSL_PATH=/lib/libssl.so
LIB_CRYPTO_PATH=/lib/libcrypto.so
CLIENT_PHP_BIN=/opt/psa/bin/php-cli
SNI_SUPPORT=true
APS_DB_DRIVER_LIBRARY=/usr/lib/x86_64-linux-gnu/sw/libmysqlserver.so.2.0
SA_MAX_MAIL_SIZE=256000
}
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
# echo message to product log and console (always visible)
pp_echo()
{
if [ -n "$product_log" ] ; then
echo "$@" >> "$product_log" 2>&1
fi
echo "$@" >&2
}
# echo message to product log, also to console in debug mode
p_echo()
{
if [ -n "$product_log" ] ; then
echo "$@" >> "$product_log" 2>&1
fi
if [ -n "$PLESK_INSTALLER_DEBUG" -o -n "$PLESK_INSTALLER_VERBOSE" -o -z "$product_log" ] ; then
echo "$@" >&2
fi
}
# same as p_echo, but without new line
pnnl_echo()
{
p_echo -n "$@"
}
int_err()
{
report_problem "internal" "Internal error: $@"
exit 1
}
p_see_product_log()
{
log_is_in_dev "${product_log}" || printf " (see log file: ${product_log})" >&2
}
die()
{
report_problem "fatal" "ERROR while trying to $@"
printf "Check the error reason" >&2
p_see_product_log
echo ", fix and try again" >&2
selinux_close
exit 1
}
echo_try()
{
msg="$*"
pnnl_echo " Trying to $msg... "
}
suc()
{
p_echo "done"
}
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
reexec_with_clean_env()
{
# Usage: call this function as 'reexec_with_clean_env "$@"' at the start of a script.
# Don't use with scripts that require sensitive environment variables.
# Don't put the call under any input/output redirection.
# Purpose: make sure the script is executed with a sane environment.
local lc="`get_default_locale`"
export LANG="$lc" LC_MESSAGES="$lc" LC_ALL="$lc"
export PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin
umask 022
PLESK_SCRIPT_COMMAND_LINE="$0 $*"
[ -z "$PLESK_INSTALLER_ENV_CLEANED" ] || { unset PLESK_INSTALLER_ENV_CLEANED; return 0; }
[ -n "$BASH" ] || exec /bin/bash "$0" "$@"
# N.B.: the following code requires Bash. On Dash it would cause syntax error upon parse w/o eval.
eval '
local extra_vars=() # list of variables to preserve
for var in "${!PLESK_@}"; do # enumerate all PLESK_* variables
extra_vars+=("$var=${!var}")
done
extra_vars+=("PLESK_INSTALLER_ENV_CLEANED=1")
# Exec self with clean env except for extra_vars, shell opts, and arguments.
exec /usr/bin/env -i "${extra_vars[@]}" /bin/bash ${-:+-$-} "$0" "$@" || {
echo "Failed to reexec self ($0) with clean environment" >&2
exit 91 # Just some relatively unique error code
}
'
}
get_default_locale()
{
# Note that CentOS 7 typically doesn't have C.UTF-8
for lc in "C.UTF-8" "en_US.UTF-8" "C"; do
if [ -z "`LC_ALL=$lc locale 2>&1 >/dev/null`" ]; then
echo "$lc"
return 0
fi
done
echo "C"
}
# accumulates chown and chmod
set_ac()
{
local u_owner g_owner perms node
u_owner="$1"
g_owner="$2"
perms="$3"
node="$4"
# A very small optimization - replacing of two execs by one,
# it works only if the following conditions are observed:
# - u_owner is username (not UID);
# - g_owner is group (not GID);
# - perms is in octal mode.
# If some conditions aren't observed,
# optimization doesn't work,
# but it doesn't break function
[ "$(stat -c '%U:%G 0%a' $node)" != "$u_owner:$g_owner $perms" ] || return 0
chown $u_owner:$g_owner $node || die "chown $u_owner:$g_owner $node"
chmod $perms $node || die "chmod $perms $node"
}
detect_vz()
{
[ -z "$PLESK_VZ_RESULT" ] || return $PLESK_VZ_RESULT
PLESK_VZ_RESULT=1
PLESK_VZ=0
PLESK_VE_HW_NODE=0
PLESK_VZ_TYPE=
local issue_file="/etc/issue"
local vzcheck_file="/proc/self/status"
[ -f "$vzcheck_file" ] || return 1
local env_id=`sed -ne 's|^envID\:[[:space:]]*\([[:digit:]]\+\)$|\1|p' "$vzcheck_file"`
[ -n "$env_id" ] || return 1
if [ "$env_id" = "0" ]; then
# Either VZ/OpenVZ HW node or unjailed CloudLinux
PLESK_VE_HW_NODE=1
return 1
fi
if grep -q "CloudLinux" "$issue_file" >/dev/null 2>&1 ; then
return 1
fi
if [ -f "/proc/vz/veredir" ]; then
PLESK_VZ_TYPE="vz"
elif [ -d "/proc/vz" ]; then
PLESK_VZ_TYPE="openvz"
fi
PLESK_VZ=1
PLESK_VZ_RESULT=0
return 0
}
# detects lxc and docker containers
detect_lxc()
{
[ -z "$PLESK_LXC_RESULT" ] || return $PLESK_LXC_RESULT
PLESK_LXC_RESULT=1
PLESK_LXC=0
if { [ -f /proc/1/cgroup ] && grep -q 'docker\|lxc' /proc/1/cgroup; } || \
{ [ -f /proc/1/environ ] && cat /proc/1/environ | tr \\0 \\n | grep -q "container=lxc"; };
then
PLESK_LXC_RESULT=0
PLESK_LXC=1
fi
return "$PLESK_LXC_RESULT"
}
call_optional_function()
{
local type_output="`LC_ALL=C type \"$1\" 2>/dev/null | head -n 1`"
case "$type_output" in
*function)
"$@"
;;
*)
return 0
;;
esac
}
problems_log_tail()
{
[ -f "$product_problems_log" ] || return 0
{
tac "$product_problems_log" | awk '/^START/ { exit } { print }' | tac
} 2>/dev/null
}
product_log_tail()
{
[ -f "$product_log" ] || return 0
{
tac "$product_log" | awk '/^START/ { exit } { print }' | tac
} 2>/dev/null
}
product_and_problems_log_tail()
{
product_log_tail
[ "$product_log" = "$product_problems_log" ] || problems_log_tail
}
log_is_in_dev()
{
test "${1:0:5}" = "/dev/"
}
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
construct_report_template()
{
local severity="${1:-error}"
local summary="$2"
local update_ticket="`get_update_ticket`"
set_error_report_source
set_error_report_component
set_error_report_params
set_error_report_environment
true construct_report_code construct_report_debug construct_report_message
cat <<-EOL
<?xml version="1.0" encoding="UTF-8" ?>
<error>
<source>$report_source</source>
<severity>$severity</severity>
<datetime>`date --iso-8601=seconds`</datetime>
<component>$report_component</component>
<summary><![CDATA[`echo "$summary" | sed -e 's/\]\]>/] ]>/g'`]]></summary>
<message encoding="base64">`construct_report_message | base64`</message>
<additional_info>
<component_params encoding="base64">$report_params</component_params>
<code encoding="base64">`construct_report_code | base64`</code>
<debug encoding="base64">`construct_report_debug | base64`</debug>
<environment encoding="base64">$report_environment</environment>
<update_ticket>$update_ticket</update_ticket>
</additional_info>
</error>
EOL
}
construct_report_code()
{
local call_level=${1:-5}
local func_level=$[call_level - 1]
local lineno_func=${BASH_LINENO[ $func_level ]}
local script_name=${BASH_SOURCE[ $[func_level + 1] ]}
echo "# Call of ${FUNCNAME[$func_level]}() from ${FUNCNAME[$[func_level + 1]]}() at `readlink -m $script_name`:${BASH_LINENO[$func_level]}"
head -n $[lineno_func + 4] "$script_name" 2>/dev/null | tail -n 8
}
construct_report_debug()
{
local call_level=${1:-5}
call_level=$[call_level-1]
# Generate calls stack trace.
for i in `seq $call_level ${#FUNCNAME[@]}`; do
[ "${FUNCNAME[$i]}" != "main" ] || break
local func_call="`sed -n -e "${BASH_LINENO[$i]}p" "${BASH_SOURCE[$[i+1]]}" 2>/dev/null |
sed -e 's/^[[:space:]]*//' -e 's/[[:space:]]*$//'`"
[ -n "$func_call" -a -z "${func_call##*${FUNCNAME[$i]}*}" ] || func_call="${FUNCNAME[$i]}"
echo "#$[i - $call_level] `readlink -m ${BASH_SOURCE[$[i+1]]}`(${BASH_LINENO[$i]}): $func_call"
done
}
construct_report_message()
{
product_and_problems_log_tail
echo ""
if [ -n "$report_context" ]; then
echo "Context: $report_context"
echo ""
fi
if [ -n "$RP_LOADED_PATCHES" ]; then
echo "Loaded runtime patches: $RP_LOADED_PATCHES"
echo ""
fi
}
# Construct report to send it to our errors tracker
construct_report()
{
local severity="${1:-error}"
local summary="$2"
[ -n "$summary" ] || int_err "Unable to send error report. Some parameters are not defined."
set_error_report_source
get_product_versions
construct_report_template "$severity" "$summary" \
| $PRODUCT_ROOT_D/admin/bin/send-error-report --version "$product_this_version" $report_source >/dev/null 2>&1
}
# Use this function to report failed actions.
# Typical report should contain
# - reason or problem description (example: file copying failed)
# - how to resolve or investigate problem (example: check file permissions, free disk space)
# - how to re-run action (example: perform specific command, restart bootstrapper script, run installation again)
report_problem()
{
local severity="${1:-error}"
# Get first string of error as a summary of report
shift
local summary="$1"
[ -n "$product_problems_log" ] || product_problems_log="/dev/stderr"
p_echo
if [ "0$problems_occured" -eq 0 ]; then
echo "***** $process problem report *****" >> "$product_problems_log" 2>&1
fi
for problem_message in "$@"; do
p_echo "$problem_message"
if [ "$product_log" != "$product_problems_log" ]; then
echo "$problem_message" >> "$product_problems_log" 2>&1
fi
done
p_echo
construct_report "$severity" "$summary"
[ -n "$PLESK_INSTALLER_DEBUG" -o -n "$PLESK_INSTALLER_VERBOSE" ] || \
product_log_tail
problems_occured=1
}
set_error_report_source()
{
[ -z "$1" ] || report_source="$1"
[ -n "$report_source" ] || {
if [ -n "$PACKAGE_ID" -o -n "$PACKAGE_ACTION" -o -n "$PACKAGE_NAME" -o -n "$PACKAGE_VERSION" ]; then
report_source="install"
else
report_source="backend"
fi
}
}
set_error_report_component()
{
local component="$1"
if [ "$report_source" = "install" ]; then
[ -n "$report_component" ] || report_component="$PACKAGE_ID"
return 0
fi
[ -z "$component" ] || report_component="$1"
[ -n "$report_component" ] || report_component="`basename $0`"
}
set_error_report_params()
{
if [ "$report_source" = "install" ]; then
[ -n "$report_params" ] || report_params="`echo "$PACKAGE_ACTION of $PACKAGE_NAME $PACKAGE_VERSION" | base64`"
return 0
fi
[ -z "$*" ] || report_params="`echo "$*" | base64`"
[ -n "$report_params" ] || report_params="`echo "$PLESK_SCRIPT_COMMAND_LINE" | base64`"
}
detect_virtualization()
{
detect_vz
detect_lxc
local is_docker="`[ -f "/.dockerenv" ] && echo yes || :`"
local systemd_detect_virt_ct="`/usr/bin/systemd-detect-virt -c 2>/dev/null | grep -v '^none$' || :`"
local systemd_detect_virt_vm="`/usr/bin/systemd-detect-virt -v 2>/dev/null | grep -v '^none$' || :`"
local virt_what="`/usr/sbin/virt-what 2>/dev/null | xargs || :`"
if [ -n "$is_docker" ]; then
echo "docker $virt_what"
elif [ "$PLESK_VZ" = "1" ]; then
echo "${PLESK_VZ_TYPE:-virtuozzo}"
elif [ "$PLESK_LXC" = "1" ]; then
echo "lxc $virt_what"
elif [ -n "$systemd_detect_virt_ct" ]; then
echo "$systemd_detect_virt_ct $systemd_detect_virt_vm"
elif [ -n "$virt_what" ]; then
echo "$virt_what"
elif [ -n "$systemd_detect_virt_vm" ]; then
echo "$systemd_detect_virt_vm"
fi
}
default_error_report_environment()
{
local virtualization="`detect_virtualization`"
if [ -n "$virtualization" ]; then
echo "virtualization: $virtualization"
fi
}
set_error_report_environment()
{
[ -z "$*" ] || report_environment="`echo "$*" | base64`"
[ -n "$report_environment" ] || report_environment="`default_error_report_environment | base64`"
}
get_update_ticket()
{
[ -r $PRODUCT_ROOT_D/var/update_ticket ] && cat $PRODUCT_ROOT_D/var/update_ticket | awk '{$1=$1};1'
}
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
#
# Support for runtime patching of shell scripts (including utilities and package scripts).
#
# --- Service functions ---
# Load and apply a patch in a relatively safe way
rp_safe_load_patch()
{
local patch_file="$1"
echo_try "load shell patch '$patch_file'"
/bin/sh -n "$RP_BASEDIR/$patch_file" &&
{
. "$RP_BASEDIR/$patch_file"
RP_LOADED_PATCHES="$RP_LOADED_PATCHES $patch_file"
} &&
suc
}
# Apply patches specific to the current context (e.g., depending on utility basename or package name)
# This is currently not implemented. This may be overriden by "spark".
rp_patch_runtime_context_specific()
{
:
}
# --- Main entry points ---
rp_patch_runtime()
{
# List of loaded patch files
RP_LOADED_PATCHES=
local RP_BASEDIR="$PRODUCT_BOOTSTRAPPER_DIR/rp"
[ -d "$RP_BASEDIR" ] || return 0
if [ -r "$RP_BASEDIR/spark" ]; then
rp_safe_load_patch "spark"
fi
call_optional_function rp_patch_runtime_context_specific "$@"
}
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
# vim:ft=sh
initial_conf()
{
PRODNAME="psa"
PRODUCT_NAME="psa"
product=${PRODNAME}
PRODUCT_FULL_NAME="Plesk"
product_etc="/etc/${PRODNAME}"
prod_conf_t="/etc/psa/psa.conf"
support_contact="https://support.plesk.com/"
conceived_os_vendor=Ubuntu
conceived_os_version="24.04"
clients_group="psacln"
clients_GID="10001"
services_group="psaserv"
services_GID="10003"
product_suff="saved_by_${product}".`date "+%m.%d;%H:%M"`
product_suffo="saved_by_${product}"
# plesk default password
PRODUCT_DEFAULT_PASSWORD="setup"
}
read_conf()
{
[ -n "$prod_conf_t" ] || prod_conf_t=/etc/psa/psa.conf
if [ -s $prod_conf_t ]; then
tmp_var=`perl -e 'undef $/; $_=<>; s/#.*$//gm;
s/^\s*(\S+)\s*/$1=/mg;
print' $prod_conf_t`
eval $tmp_var
else
if ! is_product_installation; then
p_echo "Unable to find product configuration file: $prod_conf_t. Default values will be used."
return 1
fi
fi
return 0
}
selinux_close()
{
if [ -z "$SELINUX_ENFORCE" -o "$SELINUX_ENFORCE" = "Disabled" ]; then
return
fi
setenforce "$SELINUX_ENFORCE"
}
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
# vim:ft=sh:
#set_params
set_common_params()
{
common_var=0
PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin
LANG="`get_default_locale`"
export PATH LANG
unset GREP_OPTIONS
umask 022
ulimit -n 65535 2>/dev/null
get_product_versions
certificate_file="$PRODUCT_ETC_D/httpsd.pem"
services="/etc/services"
crontab="/usr/bin/crontab"
SYSTEM_RC_D="/etc/init.d"
PLESK_LIBEXEC_DIR="/usr/lib/plesk-9.0"
PLESK_DB_DIR="/var/lib/plesk"
PRODUCT_BOOTSTRAPPER_DIR="`printf "/opt/psa/bootstrapper/pp%s-bootstrapper" "$product_this_version"`"
AUTOGENERATED_CONFIGS="#ATTENTION!\n#\n#DO NOT MODIFY THIS FILE BECAUSE IT WAS GENERATED AUTOMATICALLY,\n#SO ALL YOUR CHANGES WILL BE LOST THE NEXT TIME THE FILE IS GENERATED.\n"
AUTOGENERATED_CONFIGS_UPGRADE="#ATTENTION!\n#\n#DO NOT MODIFY THIS FILE BECAUSE IT WAS GENERATED AUTOMATICALLY,\n#SO ALL YOUR CHANGES WILL BE LOST AFTER YOU UPGRADE PLESK.\n"
PRODUCT_LOGS_D="/var/log/plesk"
sendmail="/usr/sbin/sendmail"
ps="ps axw"
ifconfig="/sbin/ifconfig -a"
machine="linux"
if [ -f /etc/debian_version ]; then
linux_distr="debian"
else
linux_distr="redhat"
fi
dummy_home="/"
if [ -x /usr/sbin/nologin ]; then
dummy_shell="/usr/sbin/nologin"
else
dummy_shell="/bin/false"
fi
rp_patch_runtime
}
get_product_versions()
{
# Don't use global variables set elsewhere in this code. Use substitutions if needed.
local prod_root_d="/opt/psa"
product_name="psa"
if [ -z "$product_this_version" ]; then
# 1. Try to fetch version from file created by bootstrapper (should be 3-component).
product_this_version="`cat "/var/lock/plesk-target-version" 2>/dev/null`"
# 2. Fallback to $PRODUCT_ROOT_D/version (should be 3-component).
if [ -z "$product_this_version" -a -r "$prod_root_d/version" ]; then
product_this_version="`awk '{ print $1 }' "$prod_root_d/version"`"
fi
# 3. Fallback to hardcoded version (2-component). This may cause some other code to fail.
if [ -z "$product_this_version" ]; then
product_this_version="18.0"
echo "Unable to determine \$product_this_version, will use less precise value '$product_this_version'" >&2
fi
fi
product_version="$product_this_version"
if [ -z "$product_prev_version" ]; then
if [ -r "$prod_root_d/version.upg" ]; then
product_prev_version=`awk '{ print $1 }' "$prod_root_d/version.upg"`
elif [ -r "$prod_root_d/version" ]; then
product_prev_version=`awk '{ print $1 }' "$prod_root_d/version"`
else
product_prev_version="$product_this_version"
fi
fi
}
# Clean installation of the product is being performed
is_product_installation()
{
[ "X$do_upgrade" != "X1" -a ! -s "/opt/psa/version.upg" ]
}
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
reexec_with_clean_env "$@"
prog="`basename $0`"
usage()
{
if [ -n "$*" ]; then
echo "ERROR: $*" >&2
echo >&2
fi
cat << EOT
Usage: $prog --domain-name domain --sys-user-login user [--webspace-name webspace] [--defer sec] [--create] [--force]
--domain-name <domain> Relink log files for specified domain.
--sys-user-login <primary FTP user> Primary FTP system user login for specified domain.
--webspace-name <webspace> Webspace name if specified domain is either subdomain or addon domain.
--defer <timeout in sec.> Defer relinking logs for at least the given timeout.
--create Create new logs directory if it doesn't exist yet.
--force Force operation. If something obstructs it, it will be removed first.
--help Show this help screen.
EOT
exit 1
}
just_die()
{
echo "ERROR: $*" >&2
exit 3
}
# --- parse and check args ---
while [ "$#" -gt 0 ]; do
case "$1" in
--domain-name)
opt_domain_name="$2"
[ "$#" -ge 2 ] && shift 2 || break
;;
--sys-user-login)
opt_sys_user_login="$2"
[ "$#" -ge 2 ] && shift 2 || break
;;
--webspace-name)
opt_webspace_name="$2"
[ "$#" -ge 2 ] && shift 2 || break
;;
--defer)
opt_defer="$2"
[ "$#" -ge 2 ] && shift 2 || break
;;
--create)
opt_create="yes"
shift
;;
--force)
opt_force="yes"
shift
;;
-h|--help)
usage
;;
*)
usage "Unknown argument '$1'"
;;
esac
done
[ -n "$opt_domain_name" ] || usage "Missing required option --domain-name"
[ -n "$opt_sys_user_login" ] || usage "Missing required option --sys-user-login"
[ -z "$opt_defer" ] || [ "$opt_defer" -ge 0 ] 2>/dev/null || usage "Argument to --defer option is not a valid number"
# --- desired logs structure ---
#
# 0700 psaadm:root /var/www/vhosts/system/domain.tld/logs
# * ("real" logs)
# 0700 psaadm:root /var/www/vhosts/system/addon-domain.tld/logs
# 0700 psaadm:root /var/www/vhosts/system/subdomain.domain.tld/logs
#
# 0700 sysuser:root /var/www/vhosts/domain.tld/logs
# * -> /var/www/vhosts/system/domain.tld/logs/* (hardlinks)
# 0700 sysuser:root /var/www/vhosts/domain.tld/logs/addon-domain.tld
# * -> /var/www/vhosts/system/addon-domain.tld/logs/* (hardlinks)
# 0700 sysuser:root /var/www/vhosts/domain.tld/logs/subdomain.domain.tld
# * -> /var/www/vhosts/system/subdomain.domain.tld/logs/* (hardlinks)
#
# Please note that files in /var/www/vhosts/system/ are not altered or managed by this utility.
# 0700 sysuser:psacln access rights for user logs directories are also acceptable.
#
# --- worker functions ---
is_dir()
{
local dir="$1"
[ -d "$dir" -a ! -L "$dir" ]
}
relink_file()
{
local source="$1"
local target="$2"
[ -n "$source" -a -n "$target" ] || return 2
[ -n "$opt_force" ] && rm -rf "$target"
ln -Tnf "$source" "$target"
}
ensure_target_dir_exists()
{
local domain_name="$1"
local logs_rel_d="$2"
local logs_d="./$1/$2"
local user="$3"
local expected_uid
expected_uid=`id -u "$user"` || return 2
[ -n "$domain_name" -a -n "$logs_rel_d" -a -n "$user" -a -n "$expected_uid" ] || return 2
if is_dir "$logs_d"; then
local perms="`stat -c '%a' \"$logs_d\"`"
local uid="`stat -c '%u' \"$logs_d\"`"
local group="`stat -c '%G' \"$logs_d\"`"
# Since we require permissions to be 0700, allow recreating logs/ by user as well.
if [ "0$perms" -eq 0700 -a "$uid" -eq "$expected_uid" -a \( "$group" = "root" -o "$group" = "psacln" \) ]; then
return 0
fi
fi
# rm logs_d if exists and --create and --forced are specified
[ -n "$opt_create" ] && [ -n "$opt_force" ] && [ -e "$logs_d" ] && rm -rf "$logs_d"
# here either access rights or file type is wrong
if [ -n "$opt_create" ] && [ ! -e "$logs_d" ]; then
$PRODUCT_ROOT_D/admin/sbin/vhostmng-structure <<-EOT || return 1
{
"directories": [
{
"cmd": "create",
"basedir": "<HTTPD_VHOSTS_D>/$domain_name",
"run_as_user": "root",
"run_as_group": "root",
"dirs": [
{
"path": "$logs_rel_d",
"user": "$user",
"group": "root",
"perms": "0700"
}
]
}
]
}
EOT
# This should have been in vhost skeleton
#local readme_file="$logs_d/README"
#[ -e "$readme_file" ] || generate_readme > "$readme_file"
#chown "root:root" "$readme_file"
#chmod 0644 "$readme_file"
pp_echo "'$logs_d' was (re)created."
elif [ -n "$opt_force" ] && is_dir "$logs_d"; then
$PRODUCT_ROOT_D/admin/sbin/vhostmng-structure <<-EOT || return 1
{
"directories": [
{
"cmd": "set-ac",
"basedir": "<HTTPD_VHOSTS_D>/$domain_name",
"run_as_user": "root",
"run_as_group": "root",
"dirs": [
{
"path": "$logs_rel_d",
"user": "$user",
"group": "root",
"perms": "0700"
}
]
}
]
}
EOT
pp_echo "Access rights for '$logs_d' were reset."
else
if is_dir "$logs_d"; then
pp_echo "'$logs_d' already exists, but has wrong access rights. Specify --force to override."
elif [ -e "$logs_d" ]; then
pp_echo "'$logs_d' exists, but has wrong type. Specify --create --force to override."
else
pp_echo "'$logs_d' doesn't exist. Specify --create to create."
fi
return 1
fi
return 0
}
real_dir_path()
{
local rc=0
local dir="$1"
[ -n "$dir" -a -d "$dir" ] || return 1
local cwd="`pwd`"
cd "$dir" || return 1
pwd -P; rc=$?
cd "$cwd" || return 1
return $rc
}
relink_dir()
{
local src_logs_d="$1"
local tgt_logs_d="$2"
[ -n "$src_logs_d" ] && is_dir "$src_logs_d" || return 2
[ -n "$tgt_logs_d" ] && is_dir "$tgt_logs_d" || return 2
# paranoia ON
local vhosts_d_real=
vhosts_d_real="`real_dir_path \"$HTTPD_VHOSTS_D\"`" || return 1
cd "$tgt_logs_d" || return 1
local tgt_logs_d_real=
tgt_logs_d_real="`pwd -P`" || return 1
# Should be: $tgt_logs_d_real == $vhosts_d_real + $tail && $tgt_logs_d == $HTTPD_VHOSTS_D + $tail
local tgt_logs_in_vhosts_d_path="${tgt_logs_d#$HTTPD_VHOSTS_D}"
local tgt_logs_in_vhosts_d_path_real="${tgt_logs_d_real#$vhosts_d_real}"
if [ "$tgt_logs_in_vhosts_d_path" != "$tgt_logs_in_vhosts_d_path_real" ]; then
pp_echo "Path check failed. Will not relink '$tgt_logs_d'."
return 1
fi
# Inodes should match
local cwd_inode="`stat -c '%i' .`"
local tgt_inode="`stat -c '%i' \"$tgt_logs_d\"`"
if [ "$tgt_inode" != "$cwd_inode" ]; then
pp_echo "Inode check failed. Will not relink '$tgt_logs_d'."
return 1
fi
# paranoia OFF
for log in `ls "$src_logs_d/" 2>/dev/null`; do
relink_file "$src_logs_d/$log" "./$log" || pp_echo "Failed to relink '$src_logs_d/$log' to '$tgt_logs_d/$log', skipped."
done
# Cleaning up orphan files.
# It will not remove files hardlinked by user but it's OK.
# It will not work if we make non-root owned logs.
# But it removes old rotated logs with dateext.
find . -mindepth 1 -maxdepth 1 -type f -links 1 -user root -group root -delete
}
deferred()
{
if [ -z "$opt_defer" ] || [ "$opt_defer" -le 0 ]; then
"$@"
else
# need to fix later:
local logs_dir='/var/log/plesk/install'
local log_file="$logs_dir/plesk-relink-vhost-logs-async-task.log"
if [ ! -d "$logs_dir" ]; then
mkdir -p "$logs_dir"
set_ac root 0 0700 "$logs_dir"
fi
touch "$log_file"
set_ac root 0 0600 "$log_file"
pp_echo "Logs will be relinked asynchronously in background after $opt_defer seconds."
{
sleep "$opt_defer"
"$@" || pp_echo "Task '$@' failed with return code $?."
} >> "$log_file" 2>&1 &
fi
}
# --- the script ---
product_default_conf
initial_conf
set_common_params
read_conf
# Don't defer relinking logs if requested delay more than 1 hour.
if [ -n "$opt_defer" ] && [ "$opt_defer" -ge "$(( 1 * 60 * 60 ))" ]; then
pp_echo "Defer interval is too large. Logs will be automatically relinked right now and in 24 hours."
opt_defer=
fi
# Otherwise add a number for the top of the head (e.g., 10 seconds) to allow web servers to restart.
if [ -n "$opt_defer" ]; then
opt_defer="$(( $opt_defer + 10 ))"
fi
cd "$HTTPD_VHOSTS_D" || just_die "Cannot cd to '$HTTPD_VHOSTS_D'"
if [ -n "$opt_webspace_name" ]; then
ensure_target_dir_exists "$opt_webspace_name" "logs" "$opt_sys_user_login" ||
just_die "Cannot relink logs. Target directory '$HTTPD_VHOSTS_D/$opt_webspace_name/logs' is in invalid state."
ensure_target_dir_exists "$opt_webspace_name" "logs/$opt_domain_name" "$opt_sys_user_login" ||
just_die "Cannot relink logs. Target directory '$HTTPD_VHOSTS_D/$opt_webspace_name/logs/$opt_domain_name' is in invalid state."
deferred relink_dir "$HTTPD_VHOSTS_D/system/$opt_domain_name/logs" "$HTTPD_VHOSTS_D/$opt_webspace_name/logs/$opt_domain_name"
else
ensure_target_dir_exists "$opt_domain_name" "logs" "$opt_sys_user_login" ||
just_die "Cannot relink logs. Target directory '$HTTPD_VHOSTS_D/$opt_domain_name/logs' is in invalid state."
deferred relink_dir "$HTTPD_VHOSTS_D/system/$opt_domain_name/logs" "$HTTPD_VHOSTS_D/$opt_domain_name/logs"
fi
# vim:ft=sh: