994 lines
26 KiB
Bash
Executable File
994 lines
26 KiB
Bash
Executable File
#!/bin/bash
|
|
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
|
|
#
|
|
|
|
#
|
|
# Plesk script
|
|
#
|
|
|
|
|
|
|
|
#default values
|
|
|
|
product_default_conf()
|
|
{
|
|
|
|
PRODUCT_ROOT_D=/opt/psa
|
|
PRODUCT_RC_D=/etc/init.d
|
|
PRODUCT_ETC_D=/opt/psa/etc
|
|
PLESK_LIBEXEC_DIR=/usr/lib/plesk-9.0
|
|
HTTPD_VHOSTS_D=/var/www/vhosts
|
|
HTTPD_CONF_D=/etc/apache2
|
|
HTTPD_INCLUDE_D=/etc/apache2/conf-enabled
|
|
HTTPD_BIN=/usr/sbin/apache2
|
|
HTTPD_LOG_D=/var/log/apache2
|
|
HTTPD_SERVICE=apache2
|
|
QMAIL_ROOT_D=/var/qmail
|
|
PLESK_MAILNAMES_D=/var/qmail/mailnames
|
|
RBLSMTPD=/usr/sbin/rblsmtpd
|
|
NAMED_RUN_ROOT_D=/var/named/run-root
|
|
WEB_STAT=/usr/bin/webalizer
|
|
MYSQL_VAR_D=/var/lib/mysql
|
|
MYSQL_BIN_D=/usr/bin
|
|
MYSQL_SOCKET=/var/run/mysqld/mysqld.sock
|
|
PGSQL_DATA_D=/var/lib/postgresql/16/main
|
|
PGSQL_CONF_D=/etc/postgresql/16/main
|
|
PGSQL_BIN_D=/usr/lib/postgresql/16/bin
|
|
DUMP_D=/var/lib/psa/dumps
|
|
DUMP_TMP_D=/tmp
|
|
MAILMAN_ROOT_D=/usr/lib/mailman
|
|
MAILMAN_VAR_D=/var/lib/mailman
|
|
PYTHON_BIN=/usr/bin/python2
|
|
GPG_BIN=/usr/bin/gpg
|
|
TAR_BIN=/usr/lib/plesk-9.0/sw-tar
|
|
AWSTATS_ETC_D=/etc/awstats
|
|
AWSTATS_BIN_D=/usr/lib/cgi-bin
|
|
AWSTATS_TOOLS_D=/usr/share/awstats/tools
|
|
AWSTATS_DOC_D=/usr/share/awstats
|
|
OPENSSL_BIN=/usr/bin/openssl
|
|
LIB_SSL_PATH=/lib/libssl.so
|
|
LIB_CRYPTO_PATH=/lib/libcrypto.so
|
|
CLIENT_PHP_BIN=/opt/psa/bin/php-cli
|
|
SNI_SUPPORT=true
|
|
APS_DB_DRIVER_LIBRARY=/usr/lib/x86_64-linux-gnu/sw/libmysqlserver.so.2.0
|
|
SA_MAX_MAIL_SIZE=256000
|
|
|
|
}
|
|
|
|
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
|
|
|
|
# echo message to product log and console (always visible)
|
|
pp_echo()
|
|
{
|
|
if [ -n "$product_log" ] ; then
|
|
echo "$@" >> "$product_log" 2>&1
|
|
fi
|
|
echo "$@" >&2
|
|
}
|
|
|
|
# echo message to product log, also to console in debug mode
|
|
p_echo()
|
|
{
|
|
if [ -n "$product_log" ] ; then
|
|
echo "$@" >> "$product_log" 2>&1
|
|
fi
|
|
if [ -n "$PLESK_INSTALLER_DEBUG" -o -n "$PLESK_INSTALLER_VERBOSE" -o -z "$product_log" ] ; then
|
|
echo "$@" >&2
|
|
fi
|
|
}
|
|
|
|
# same as p_echo, but without new line
|
|
pnnl_echo()
|
|
{
|
|
p_echo -n "$@"
|
|
}
|
|
|
|
int_err()
|
|
{
|
|
report_problem "internal" "Internal error: $@"
|
|
exit 1
|
|
}
|
|
|
|
p_see_product_log()
|
|
{
|
|
log_is_in_dev "${product_log}" || printf " (see log file: ${product_log})" >&2
|
|
}
|
|
|
|
die()
|
|
{
|
|
report_problem "fatal" "ERROR while trying to $@"
|
|
printf "Check the error reason" >&2
|
|
p_see_product_log
|
|
echo ", fix and try again" >&2
|
|
|
|
selinux_close
|
|
|
|
exit 1
|
|
}
|
|
|
|
echo_try()
|
|
{
|
|
msg="$*"
|
|
pnnl_echo " Trying to $msg... "
|
|
}
|
|
|
|
suc()
|
|
{
|
|
p_echo "done"
|
|
}
|
|
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
|
|
reexec_with_clean_env()
|
|
{
|
|
# Usage: call this function as 'reexec_with_clean_env "$@"' at the start of a script.
|
|
# Don't use with scripts that require sensitive environment variables.
|
|
# Don't put the call under any input/output redirection.
|
|
# Purpose: make sure the script is executed with a sane environment.
|
|
|
|
local lc="`get_default_locale`"
|
|
export LANG="$lc" LC_MESSAGES="$lc" LC_ALL="$lc"
|
|
export PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin
|
|
umask 022
|
|
|
|
PLESK_SCRIPT_COMMAND_LINE="$0 $*"
|
|
[ -z "$PLESK_INSTALLER_ENV_CLEANED" ] || { unset PLESK_INSTALLER_ENV_CLEANED; return 0; }
|
|
[ -n "$BASH" ] || exec /bin/bash "$0" "$@"
|
|
|
|
# N.B.: the following code requires Bash. On Dash it would cause syntax error upon parse w/o eval.
|
|
eval '
|
|
local extra_vars=() # list of variables to preserve
|
|
for var in "${!PLESK_@}"; do # enumerate all PLESK_* variables
|
|
extra_vars+=("$var=${!var}")
|
|
done
|
|
extra_vars+=("PLESK_INSTALLER_ENV_CLEANED=1")
|
|
|
|
# Exec self with clean env except for extra_vars, shell opts, and arguments.
|
|
exec /usr/bin/env -i "${extra_vars[@]}" /bin/bash ${-:+-$-} "$0" "$@" || {
|
|
echo "Failed to reexec self ($0) with clean environment" >&2
|
|
exit 91 # Just some relatively unique error code
|
|
}
|
|
'
|
|
}
|
|
|
|
get_default_locale()
|
|
{
|
|
# Note that CentOS 7 typically doesn't have C.UTF-8
|
|
for lc in "C.UTF-8" "en_US.UTF-8" "C"; do
|
|
if [ -z "`LC_ALL=$lc locale 2>&1 >/dev/null`" ]; then
|
|
echo "$lc"
|
|
return 0
|
|
fi
|
|
done
|
|
echo "C"
|
|
}
|
|
|
|
# accumulates chown and chmod
|
|
set_ac()
|
|
{
|
|
local u_owner g_owner perms node
|
|
u_owner="$1"
|
|
g_owner="$2"
|
|
perms="$3"
|
|
node="$4"
|
|
|
|
# A very small optimization - replacing of two execs by one,
|
|
# it works only if the following conditions are observed:
|
|
# - u_owner is username (not UID);
|
|
# - g_owner is group (not GID);
|
|
# - perms is in octal mode.
|
|
# If some conditions aren't observed,
|
|
# optimization doesn't work,
|
|
# but it doesn't break function
|
|
[ "$(stat -c '%U:%G 0%a' $node)" != "$u_owner:$g_owner $perms" ] || return 0
|
|
chown $u_owner:$g_owner $node || die "chown $u_owner:$g_owner $node"
|
|
chmod $perms $node || die "chmod $perms $node"
|
|
}
|
|
|
|
detect_vz()
|
|
{
|
|
[ -z "$PLESK_VZ_RESULT" ] || return $PLESK_VZ_RESULT
|
|
|
|
PLESK_VZ_RESULT=1
|
|
PLESK_VZ=0
|
|
PLESK_VE_HW_NODE=0
|
|
PLESK_VZ_TYPE=
|
|
|
|
local issue_file="/etc/issue"
|
|
local vzcheck_file="/proc/self/status"
|
|
[ -f "$vzcheck_file" ] || return 1
|
|
|
|
local env_id=`sed -ne 's|^envID\:[[:space:]]*\([[:digit:]]\+\)$|\1|p' "$vzcheck_file"`
|
|
[ -n "$env_id" ] || return 1
|
|
if [ "$env_id" = "0" ]; then
|
|
# Either VZ/OpenVZ HW node or unjailed CloudLinux
|
|
PLESK_VE_HW_NODE=1
|
|
return 1
|
|
fi
|
|
|
|
if grep -q "CloudLinux" "$issue_file" >/dev/null 2>&1 ; then
|
|
return 1
|
|
fi
|
|
|
|
if [ -f "/proc/vz/veredir" ]; then
|
|
PLESK_VZ_TYPE="vz"
|
|
elif [ -d "/proc/vz" ]; then
|
|
PLESK_VZ_TYPE="openvz"
|
|
fi
|
|
|
|
PLESK_VZ=1
|
|
PLESK_VZ_RESULT=0
|
|
return 0
|
|
}
|
|
|
|
# detects lxc and docker containers
|
|
detect_lxc()
|
|
{
|
|
[ -z "$PLESK_LXC_RESULT" ] || return $PLESK_LXC_RESULT
|
|
PLESK_LXC_RESULT=1
|
|
PLESK_LXC=0
|
|
if { [ -f /proc/1/cgroup ] && grep -q 'docker\|lxc' /proc/1/cgroup; } || \
|
|
{ [ -f /proc/1/environ ] && cat /proc/1/environ | tr \\0 \\n | grep -q "container=lxc"; };
|
|
then
|
|
PLESK_LXC_RESULT=0
|
|
PLESK_LXC=1
|
|
fi
|
|
return "$PLESK_LXC_RESULT"
|
|
}
|
|
|
|
call_optional_function()
|
|
{
|
|
local type_output="`LC_ALL=C type \"$1\" 2>/dev/null | head -n 1`"
|
|
case "$type_output" in
|
|
*function)
|
|
"$@"
|
|
;;
|
|
*)
|
|
return 0
|
|
;;
|
|
esac
|
|
}
|
|
|
|
problems_log_tail()
|
|
{
|
|
[ -f "$product_problems_log" ] || return 0
|
|
{
|
|
tac "$product_problems_log" | awk '/^START/ { exit } { print }' | tac
|
|
} 2>/dev/null
|
|
}
|
|
|
|
product_log_tail()
|
|
{
|
|
[ -f "$product_log" ] || return 0
|
|
{
|
|
tac "$product_log" | awk '/^START/ { exit } { print }' | tac
|
|
} 2>/dev/null
|
|
}
|
|
|
|
product_and_problems_log_tail()
|
|
{
|
|
product_log_tail
|
|
[ "$product_log" = "$product_problems_log" ] || problems_log_tail
|
|
}
|
|
|
|
log_is_in_dev()
|
|
{
|
|
test "${1:0:5}" = "/dev/"
|
|
}
|
|
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
|
|
|
|
construct_report_template()
|
|
{
|
|
local severity="${1:-error}"
|
|
local summary="$2"
|
|
|
|
local update_ticket="`get_update_ticket`"
|
|
|
|
set_error_report_source
|
|
set_error_report_component
|
|
set_error_report_params
|
|
set_error_report_environment
|
|
|
|
true construct_report_code construct_report_debug construct_report_message
|
|
|
|
cat <<-EOL
|
|
<?xml version="1.0" encoding="UTF-8" ?>
|
|
<error>
|
|
<source>$report_source</source>
|
|
<severity>$severity</severity>
|
|
<datetime>`date --iso-8601=seconds`</datetime>
|
|
|
|
<component>$report_component</component>
|
|
<summary><![CDATA[`echo "$summary" | sed -e 's/\]\]>/] ]>/g'`]]></summary>
|
|
<message encoding="base64">`construct_report_message | base64`</message>
|
|
|
|
<additional_info>
|
|
<component_params encoding="base64">$report_params</component_params>
|
|
<code encoding="base64">`construct_report_code | base64`</code>
|
|
<debug encoding="base64">`construct_report_debug | base64`</debug>
|
|
<environment encoding="base64">$report_environment</environment>
|
|
<update_ticket>$update_ticket</update_ticket>
|
|
</additional_info>
|
|
</error>
|
|
EOL
|
|
}
|
|
|
|
construct_report_code()
|
|
{
|
|
local call_level=${1:-5}
|
|
local func_level=$[call_level - 1]
|
|
local lineno_func=${BASH_LINENO[ $func_level ]}
|
|
local script_name=${BASH_SOURCE[ $[func_level + 1] ]}
|
|
|
|
echo "# Call of ${FUNCNAME[$func_level]}() from ${FUNCNAME[$[func_level + 1]]}() at `readlink -m $script_name`:${BASH_LINENO[$func_level]}"
|
|
head -n $[lineno_func + 4] "$script_name" 2>/dev/null | tail -n 8
|
|
}
|
|
|
|
construct_report_debug()
|
|
{
|
|
local call_level=${1:-5}
|
|
call_level=$[call_level-1]
|
|
|
|
# Generate calls stack trace.
|
|
for i in `seq $call_level ${#FUNCNAME[@]}`; do
|
|
[ "${FUNCNAME[$i]}" != "main" ] || break
|
|
|
|
local func_call="`sed -n -e "${BASH_LINENO[$i]}p" "${BASH_SOURCE[$[i+1]]}" 2>/dev/null |
|
|
sed -e 's/^[[:space:]]*//' -e 's/[[:space:]]*$//'`"
|
|
[ -n "$func_call" -a -z "${func_call##*${FUNCNAME[$i]}*}" ] || func_call="${FUNCNAME[$i]}"
|
|
echo "#$[i - $call_level] `readlink -m ${BASH_SOURCE[$[i+1]]}`(${BASH_LINENO[$i]}): $func_call"
|
|
done
|
|
}
|
|
|
|
construct_report_message()
|
|
{
|
|
product_and_problems_log_tail
|
|
|
|
echo ""
|
|
if [ -n "$report_context" ]; then
|
|
echo "Context: $report_context"
|
|
echo ""
|
|
fi
|
|
if [ -n "$RP_LOADED_PATCHES" ]; then
|
|
echo "Loaded runtime patches: $RP_LOADED_PATCHES"
|
|
echo ""
|
|
fi
|
|
}
|
|
|
|
# Construct report to send it to our errors tracker
|
|
construct_report()
|
|
{
|
|
local severity="${1:-error}"
|
|
local summary="$2"
|
|
|
|
[ -n "$summary" ] || int_err "Unable to send error report. Some parameters are not defined."
|
|
|
|
set_error_report_source
|
|
get_product_versions
|
|
|
|
construct_report_template "$severity" "$summary" \
|
|
| $PRODUCT_ROOT_D/admin/bin/send-error-report --version "$product_this_version" $report_source >/dev/null 2>&1
|
|
}
|
|
|
|
# Use this function to report failed actions.
|
|
# Typical report should contain
|
|
# - reason or problem description (example: file copying failed)
|
|
# - how to resolve or investigate problem (example: check file permissions, free disk space)
|
|
# - how to re-run action (example: perform specific command, restart bootstrapper script, run installation again)
|
|
report_problem()
|
|
{
|
|
local severity="${1:-error}"
|
|
|
|
# Get first string of error as a summary of report
|
|
shift
|
|
|
|
local summary="$1"
|
|
|
|
[ -n "$product_problems_log" ] || product_problems_log="/dev/stderr"
|
|
|
|
p_echo
|
|
if [ "0$problems_occured" -eq 0 ]; then
|
|
echo "***** $process problem report *****" >> "$product_problems_log" 2>&1
|
|
fi
|
|
for problem_message in "$@"; do
|
|
p_echo "$problem_message"
|
|
if [ "$product_log" != "$product_problems_log" ]; then
|
|
echo "$problem_message" >> "$product_problems_log" 2>&1
|
|
fi
|
|
done
|
|
p_echo
|
|
|
|
construct_report "$severity" "$summary"
|
|
|
|
[ -n "$PLESK_INSTALLER_DEBUG" -o -n "$PLESK_INSTALLER_VERBOSE" ] || \
|
|
product_log_tail
|
|
|
|
problems_occured=1
|
|
}
|
|
|
|
set_error_report_source()
|
|
{
|
|
[ -z "$1" ] || report_source="$1"
|
|
[ -n "$report_source" ] || {
|
|
if [ -n "$PACKAGE_ID" -o -n "$PACKAGE_ACTION" -o -n "$PACKAGE_NAME" -o -n "$PACKAGE_VERSION" ]; then
|
|
report_source="install"
|
|
else
|
|
report_source="backend"
|
|
fi
|
|
}
|
|
}
|
|
|
|
set_error_report_component()
|
|
{
|
|
local component="$1"
|
|
|
|
if [ "$report_source" = "install" ]; then
|
|
[ -n "$report_component" ] || report_component="$PACKAGE_ID"
|
|
return 0
|
|
fi
|
|
|
|
[ -z "$component" ] || report_component="$1"
|
|
[ -n "$report_component" ] || report_component="`basename $0`"
|
|
}
|
|
|
|
set_error_report_params()
|
|
{
|
|
if [ "$report_source" = "install" ]; then
|
|
[ -n "$report_params" ] || report_params="`echo "$PACKAGE_ACTION of $PACKAGE_NAME $PACKAGE_VERSION" | base64`"
|
|
return 0
|
|
fi
|
|
|
|
[ -z "$*" ] || report_params="`echo "$*" | base64`"
|
|
[ -n "$report_params" ] || report_params="`echo "$PLESK_SCRIPT_COMMAND_LINE" | base64`"
|
|
}
|
|
|
|
detect_virtualization()
|
|
{
|
|
detect_vz
|
|
detect_lxc
|
|
local is_docker="`[ -f "/.dockerenv" ] && echo yes || :`"
|
|
local systemd_detect_virt_ct="`/usr/bin/systemd-detect-virt -c 2>/dev/null | grep -v '^none$' || :`"
|
|
local systemd_detect_virt_vm="`/usr/bin/systemd-detect-virt -v 2>/dev/null | grep -v '^none$' || :`"
|
|
local virt_what="`/usr/sbin/virt-what 2>/dev/null | xargs || :`"
|
|
|
|
if [ -n "$is_docker" ]; then
|
|
echo "docker $virt_what"
|
|
elif [ "$PLESK_VZ" = "1" ]; then
|
|
echo "${PLESK_VZ_TYPE:-virtuozzo}"
|
|
elif [ "$PLESK_LXC" = "1" ]; then
|
|
echo "lxc $virt_what"
|
|
elif [ -n "$systemd_detect_virt_ct" ]; then
|
|
echo "$systemd_detect_virt_ct $systemd_detect_virt_vm"
|
|
elif [ -n "$virt_what" ]; then
|
|
echo "$virt_what"
|
|
elif [ -n "$systemd_detect_virt_vm" ]; then
|
|
echo "$systemd_detect_virt_vm"
|
|
fi
|
|
}
|
|
|
|
default_error_report_environment()
|
|
{
|
|
local virtualization="`detect_virtualization`"
|
|
|
|
if [ -n "$virtualization" ]; then
|
|
echo "virtualization: $virtualization"
|
|
fi
|
|
}
|
|
|
|
set_error_report_environment()
|
|
{
|
|
[ -z "$*" ] || report_environment="`echo "$*" | base64`"
|
|
[ -n "$report_environment" ] || report_environment="`default_error_report_environment | base64`"
|
|
}
|
|
|
|
get_update_ticket()
|
|
{
|
|
[ -r $PRODUCT_ROOT_D/var/update_ticket ] && cat $PRODUCT_ROOT_D/var/update_ticket | awk '{$1=$1};1'
|
|
}
|
|
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
|
|
|
|
#
|
|
# Support for runtime patching of shell scripts (including utilities and package scripts).
|
|
#
|
|
|
|
# --- Service functions ---
|
|
|
|
# Load and apply a patch in a relatively safe way
|
|
rp_safe_load_patch()
|
|
{
|
|
local patch_file="$1"
|
|
echo_try "load shell patch '$patch_file'"
|
|
/bin/sh -n "$RP_BASEDIR/$patch_file" &&
|
|
{
|
|
. "$RP_BASEDIR/$patch_file"
|
|
RP_LOADED_PATCHES="$RP_LOADED_PATCHES $patch_file"
|
|
} &&
|
|
suc
|
|
}
|
|
|
|
# Apply patches specific to the current context (e.g., depending on utility basename or package name)
|
|
# This is currently not implemented. This may be overriden by "spark".
|
|
rp_patch_runtime_context_specific()
|
|
{
|
|
:
|
|
}
|
|
|
|
# --- Main entry points ---
|
|
|
|
rp_patch_runtime()
|
|
{
|
|
# List of loaded patch files
|
|
RP_LOADED_PATCHES=
|
|
|
|
local RP_BASEDIR="$PRODUCT_BOOTSTRAPPER_DIR/rp"
|
|
[ -d "$RP_BASEDIR" ] || return 0
|
|
|
|
if [ -r "$RP_BASEDIR/spark" ]; then
|
|
rp_safe_load_patch "spark"
|
|
fi
|
|
|
|
call_optional_function rp_patch_runtime_context_specific "$@"
|
|
}
|
|
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
|
|
# vim:ft=sh
|
|
|
|
initial_conf()
|
|
{
|
|
PRODNAME="psa"
|
|
PRODUCT_NAME="psa"
|
|
product=${PRODNAME}
|
|
PRODUCT_FULL_NAME="Plesk"
|
|
|
|
product_etc="/etc/${PRODNAME}"
|
|
prod_conf_t="/etc/psa/psa.conf"
|
|
|
|
support_contact="https://support.plesk.com/"
|
|
|
|
conceived_os_vendor=Ubuntu
|
|
conceived_os_version="24.04"
|
|
|
|
clients_group="psacln"
|
|
clients_GID="10001"
|
|
|
|
services_group="psaserv"
|
|
services_GID="10003"
|
|
|
|
product_suff="saved_by_${product}".`date "+%m.%d;%H:%M"`
|
|
product_suffo="saved_by_${product}"
|
|
|
|
# plesk default password
|
|
PRODUCT_DEFAULT_PASSWORD="setup"
|
|
}
|
|
|
|
read_conf()
|
|
{
|
|
[ -n "$prod_conf_t" ] || prod_conf_t=/etc/psa/psa.conf
|
|
|
|
if [ -s $prod_conf_t ]; then
|
|
tmp_var=`perl -e 'undef $/; $_=<>; s/#.*$//gm;
|
|
s/^\s*(\S+)\s*/$1=/mg;
|
|
print' $prod_conf_t`
|
|
eval $tmp_var
|
|
else
|
|
if ! is_product_installation; then
|
|
p_echo "Unable to find product configuration file: $prod_conf_t. Default values will be used."
|
|
return 1
|
|
fi
|
|
fi
|
|
return 0
|
|
}
|
|
|
|
selinux_close()
|
|
{
|
|
if [ -z "$SELINUX_ENFORCE" -o "$SELINUX_ENFORCE" = "Disabled" ]; then
|
|
return
|
|
fi
|
|
|
|
setenforce "$SELINUX_ENFORCE"
|
|
}
|
|
|
|
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
|
|
# vim:ft=sh:
|
|
|
|
#set_params
|
|
|
|
set_common_params()
|
|
{
|
|
common_var=0
|
|
|
|
PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin
|
|
LANG="`get_default_locale`"
|
|
export PATH LANG
|
|
unset GREP_OPTIONS
|
|
umask 022
|
|
ulimit -n 65535 2>/dev/null
|
|
|
|
get_product_versions
|
|
|
|
certificate_file="$PRODUCT_ETC_D/httpsd.pem"
|
|
services="/etc/services"
|
|
|
|
crontab="/usr/bin/crontab"
|
|
|
|
SYSTEM_RC_D="/etc/init.d"
|
|
PLESK_LIBEXEC_DIR="/usr/lib/plesk-9.0"
|
|
PLESK_DB_DIR="/var/lib/plesk"
|
|
PRODUCT_BOOTSTRAPPER_DIR="`printf "/opt/psa/bootstrapper/pp%s-bootstrapper" "$product_this_version"`"
|
|
AUTOGENERATED_CONFIGS="#ATTENTION!\n#\n#DO NOT MODIFY THIS FILE BECAUSE IT WAS GENERATED AUTOMATICALLY,\n#SO ALL YOUR CHANGES WILL BE LOST THE NEXT TIME THE FILE IS GENERATED.\n"
|
|
AUTOGENERATED_CONFIGS_UPGRADE="#ATTENTION!\n#\n#DO NOT MODIFY THIS FILE BECAUSE IT WAS GENERATED AUTOMATICALLY,\n#SO ALL YOUR CHANGES WILL BE LOST AFTER YOU UPGRADE PLESK.\n"
|
|
PRODUCT_LOGS_D="/var/log/plesk"
|
|
|
|
sendmail="/usr/sbin/sendmail"
|
|
ps="ps axw"
|
|
ifconfig="/sbin/ifconfig -a"
|
|
|
|
machine="linux"
|
|
if [ -f /etc/debian_version ]; then
|
|
linux_distr="debian"
|
|
else
|
|
linux_distr="redhat"
|
|
fi
|
|
|
|
dummy_home="/"
|
|
if [ -x /usr/sbin/nologin ]; then
|
|
dummy_shell="/usr/sbin/nologin"
|
|
else
|
|
dummy_shell="/bin/false"
|
|
fi
|
|
|
|
rp_patch_runtime
|
|
}
|
|
|
|
get_product_versions()
|
|
{
|
|
# Don't use global variables set elsewhere in this code. Use substitutions if needed.
|
|
local prod_root_d="/opt/psa"
|
|
|
|
product_name="psa"
|
|
|
|
if [ -z "$product_this_version" ]; then
|
|
# 1. Try to fetch version from file created by bootstrapper (should be 3-component).
|
|
product_this_version="`cat "/var/lock/plesk-target-version" 2>/dev/null`"
|
|
# 2. Fallback to $PRODUCT_ROOT_D/version (should be 3-component).
|
|
if [ -z "$product_this_version" -a -r "$prod_root_d/version" ]; then
|
|
product_this_version="`awk '{ print $1 }' "$prod_root_d/version"`"
|
|
fi
|
|
# 3. Fallback to hardcoded version (2-component). This may cause some other code to fail.
|
|
if [ -z "$product_this_version" ]; then
|
|
product_this_version="18.0"
|
|
echo "Unable to determine \$product_this_version, will use less precise value '$product_this_version'" >&2
|
|
fi
|
|
fi
|
|
|
|
product_version="$product_this_version"
|
|
|
|
if [ -z "$product_prev_version" ]; then
|
|
if [ -r "$prod_root_d/version.upg" ]; then
|
|
product_prev_version=`awk '{ print $1 }' "$prod_root_d/version.upg"`
|
|
elif [ -r "$prod_root_d/version" ]; then
|
|
product_prev_version=`awk '{ print $1 }' "$prod_root_d/version"`
|
|
else
|
|
product_prev_version="$product_this_version"
|
|
fi
|
|
fi
|
|
}
|
|
|
|
# Clean installation of the product is being performed
|
|
is_product_installation()
|
|
{
|
|
[ "X$do_upgrade" != "X1" -a ! -s "/opt/psa/version.upg" ]
|
|
}
|
|
|
|
### Copyright 1999-2025. WebPros International GmbH. All rights reserved.
|
|
|
|
reexec_with_clean_env "$@"
|
|
|
|
prog="`basename $0`"
|
|
|
|
usage()
|
|
{
|
|
if [ -n "$*" ]; then
|
|
echo "ERROR: $*" >&2
|
|
echo >&2
|
|
fi
|
|
|
|
cat << EOT
|
|
Usage: $prog --domain-name domain --sys-user-login user [--webspace-name webspace] [--defer sec] [--create] [--force]
|
|
|
|
--domain-name <domain> Relink log files for specified domain.
|
|
--sys-user-login <primary FTP user> Primary FTP system user login for specified domain.
|
|
--webspace-name <webspace> Webspace name if specified domain is either subdomain or addon domain.
|
|
--defer <timeout in sec.> Defer relinking logs for at least the given timeout.
|
|
--create Create new logs directory if it doesn't exist yet.
|
|
--force Force operation. If something obstructs it, it will be removed first.
|
|
--help Show this help screen.
|
|
EOT
|
|
exit 1
|
|
}
|
|
|
|
just_die()
|
|
{
|
|
echo "ERROR: $*" >&2
|
|
exit 3
|
|
}
|
|
|
|
# --- parse and check args ---
|
|
|
|
while [ "$#" -gt 0 ]; do
|
|
case "$1" in
|
|
--domain-name)
|
|
opt_domain_name="$2"
|
|
[ "$#" -ge 2 ] && shift 2 || break
|
|
;;
|
|
--sys-user-login)
|
|
opt_sys_user_login="$2"
|
|
[ "$#" -ge 2 ] && shift 2 || break
|
|
;;
|
|
--webspace-name)
|
|
opt_webspace_name="$2"
|
|
[ "$#" -ge 2 ] && shift 2 || break
|
|
;;
|
|
--defer)
|
|
opt_defer="$2"
|
|
[ "$#" -ge 2 ] && shift 2 || break
|
|
;;
|
|
--create)
|
|
opt_create="yes"
|
|
shift
|
|
;;
|
|
--force)
|
|
opt_force="yes"
|
|
shift
|
|
;;
|
|
-h|--help)
|
|
usage
|
|
;;
|
|
*)
|
|
usage "Unknown argument '$1'"
|
|
;;
|
|
esac
|
|
done
|
|
|
|
[ -n "$opt_domain_name" ] || usage "Missing required option --domain-name"
|
|
[ -n "$opt_sys_user_login" ] || usage "Missing required option --sys-user-login"
|
|
[ -z "$opt_defer" ] || [ "$opt_defer" -ge 0 ] 2>/dev/null || usage "Argument to --defer option is not a valid number"
|
|
|
|
# --- desired logs structure ---
|
|
#
|
|
# 0700 psaadm:root /var/www/vhosts/system/domain.tld/logs
|
|
# * ("real" logs)
|
|
# 0700 psaadm:root /var/www/vhosts/system/addon-domain.tld/logs
|
|
# 0700 psaadm:root /var/www/vhosts/system/subdomain.domain.tld/logs
|
|
#
|
|
# 0700 sysuser:root /var/www/vhosts/domain.tld/logs
|
|
# * -> /var/www/vhosts/system/domain.tld/logs/* (hardlinks)
|
|
# 0700 sysuser:root /var/www/vhosts/domain.tld/logs/addon-domain.tld
|
|
# * -> /var/www/vhosts/system/addon-domain.tld/logs/* (hardlinks)
|
|
# 0700 sysuser:root /var/www/vhosts/domain.tld/logs/subdomain.domain.tld
|
|
# * -> /var/www/vhosts/system/subdomain.domain.tld/logs/* (hardlinks)
|
|
#
|
|
# Please note that files in /var/www/vhosts/system/ are not altered or managed by this utility.
|
|
# 0700 sysuser:psacln access rights for user logs directories are also acceptable.
|
|
#
|
|
|
|
# --- worker functions ---
|
|
|
|
is_dir()
|
|
{
|
|
local dir="$1"
|
|
[ -d "$dir" -a ! -L "$dir" ]
|
|
}
|
|
|
|
relink_file()
|
|
{
|
|
local source="$1"
|
|
local target="$2"
|
|
[ -n "$source" -a -n "$target" ] || return 2
|
|
|
|
[ -n "$opt_force" ] && rm -rf "$target"
|
|
ln -Tnf "$source" "$target"
|
|
}
|
|
|
|
ensure_target_dir_exists()
|
|
{
|
|
local domain_name="$1"
|
|
local logs_rel_d="$2"
|
|
local logs_d="./$1/$2"
|
|
local user="$3"
|
|
local expected_uid
|
|
expected_uid=`id -u "$user"` || return 2
|
|
[ -n "$domain_name" -a -n "$logs_rel_d" -a -n "$user" -a -n "$expected_uid" ] || return 2
|
|
|
|
if is_dir "$logs_d"; then
|
|
local perms="`stat -c '%a' \"$logs_d\"`"
|
|
local uid="`stat -c '%u' \"$logs_d\"`"
|
|
local group="`stat -c '%G' \"$logs_d\"`"
|
|
|
|
# Since we require permissions to be 0700, allow recreating logs/ by user as well.
|
|
if [ "0$perms" -eq 0700 -a "$uid" -eq "$expected_uid" -a \( "$group" = "root" -o "$group" = "psacln" \) ]; then
|
|
return 0
|
|
fi
|
|
fi
|
|
|
|
# rm logs_d if exists and --create and --forced are specified
|
|
[ -n "$opt_create" ] && [ -n "$opt_force" ] && [ -e "$logs_d" ] && rm -rf "$logs_d"
|
|
|
|
# here either access rights or file type is wrong
|
|
if [ -n "$opt_create" ] && [ ! -e "$logs_d" ]; then
|
|
$PRODUCT_ROOT_D/admin/sbin/vhostmng-structure <<-EOT || return 1
|
|
{
|
|
"directories": [
|
|
{
|
|
"cmd": "create",
|
|
"basedir": "<HTTPD_VHOSTS_D>/$domain_name",
|
|
"run_as_user": "root",
|
|
"run_as_group": "root",
|
|
"dirs": [
|
|
{
|
|
"path": "$logs_rel_d",
|
|
"user": "$user",
|
|
"group": "root",
|
|
"perms": "0700"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
EOT
|
|
|
|
# This should have been in vhost skeleton
|
|
#local readme_file="$logs_d/README"
|
|
#[ -e "$readme_file" ] || generate_readme > "$readme_file"
|
|
#chown "root:root" "$readme_file"
|
|
#chmod 0644 "$readme_file"
|
|
|
|
pp_echo "'$logs_d' was (re)created."
|
|
elif [ -n "$opt_force" ] && is_dir "$logs_d"; then
|
|
$PRODUCT_ROOT_D/admin/sbin/vhostmng-structure <<-EOT || return 1
|
|
{
|
|
"directories": [
|
|
{
|
|
"cmd": "set-ac",
|
|
"basedir": "<HTTPD_VHOSTS_D>/$domain_name",
|
|
"run_as_user": "root",
|
|
"run_as_group": "root",
|
|
"dirs": [
|
|
{
|
|
"path": "$logs_rel_d",
|
|
"user": "$user",
|
|
"group": "root",
|
|
"perms": "0700"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
EOT
|
|
|
|
pp_echo "Access rights for '$logs_d' were reset."
|
|
else
|
|
if is_dir "$logs_d"; then
|
|
pp_echo "'$logs_d' already exists, but has wrong access rights. Specify --force to override."
|
|
elif [ -e "$logs_d" ]; then
|
|
pp_echo "'$logs_d' exists, but has wrong type. Specify --create --force to override."
|
|
else
|
|
pp_echo "'$logs_d' doesn't exist. Specify --create to create."
|
|
fi
|
|
return 1
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
|
|
real_dir_path()
|
|
{
|
|
local rc=0
|
|
local dir="$1"
|
|
[ -n "$dir" -a -d "$dir" ] || return 1
|
|
local cwd="`pwd`"
|
|
|
|
cd "$dir" || return 1
|
|
pwd -P; rc=$?
|
|
cd "$cwd" || return 1
|
|
return $rc
|
|
}
|
|
|
|
relink_dir()
|
|
{
|
|
local src_logs_d="$1"
|
|
local tgt_logs_d="$2"
|
|
[ -n "$src_logs_d" ] && is_dir "$src_logs_d" || return 2
|
|
[ -n "$tgt_logs_d" ] && is_dir "$tgt_logs_d" || return 2
|
|
|
|
# paranoia ON
|
|
local vhosts_d_real=
|
|
vhosts_d_real="`real_dir_path \"$HTTPD_VHOSTS_D\"`" || return 1
|
|
|
|
cd "$tgt_logs_d" || return 1
|
|
|
|
local tgt_logs_d_real=
|
|
tgt_logs_d_real="`pwd -P`" || return 1
|
|
|
|
# Should be: $tgt_logs_d_real == $vhosts_d_real + $tail && $tgt_logs_d == $HTTPD_VHOSTS_D + $tail
|
|
local tgt_logs_in_vhosts_d_path="${tgt_logs_d#$HTTPD_VHOSTS_D}"
|
|
local tgt_logs_in_vhosts_d_path_real="${tgt_logs_d_real#$vhosts_d_real}"
|
|
if [ "$tgt_logs_in_vhosts_d_path" != "$tgt_logs_in_vhosts_d_path_real" ]; then
|
|
pp_echo "Path check failed. Will not relink '$tgt_logs_d'."
|
|
return 1
|
|
fi
|
|
|
|
# Inodes should match
|
|
local cwd_inode="`stat -c '%i' .`"
|
|
local tgt_inode="`stat -c '%i' \"$tgt_logs_d\"`"
|
|
if [ "$tgt_inode" != "$cwd_inode" ]; then
|
|
pp_echo "Inode check failed. Will not relink '$tgt_logs_d'."
|
|
return 1
|
|
fi
|
|
# paranoia OFF
|
|
|
|
for log in `ls "$src_logs_d/" 2>/dev/null`; do
|
|
relink_file "$src_logs_d/$log" "./$log" || pp_echo "Failed to relink '$src_logs_d/$log' to '$tgt_logs_d/$log', skipped."
|
|
done
|
|
|
|
# Cleaning up orphan files.
|
|
# It will not remove files hardlinked by user but it's OK.
|
|
# It will not work if we make non-root owned logs.
|
|
# But it removes old rotated logs with dateext.
|
|
find . -mindepth 1 -maxdepth 1 -type f -links 1 -user root -group root -delete
|
|
}
|
|
|
|
deferred()
|
|
{
|
|
if [ -z "$opt_defer" ] || [ "$opt_defer" -le 0 ]; then
|
|
"$@"
|
|
else
|
|
# need to fix later:
|
|
local logs_dir='/var/log/plesk/install'
|
|
local log_file="$logs_dir/plesk-relink-vhost-logs-async-task.log"
|
|
if [ ! -d "$logs_dir" ]; then
|
|
mkdir -p "$logs_dir"
|
|
set_ac root 0 0700 "$logs_dir"
|
|
fi
|
|
touch "$log_file"
|
|
set_ac root 0 0600 "$log_file"
|
|
pp_echo "Logs will be relinked asynchronously in background after $opt_defer seconds."
|
|
{
|
|
sleep "$opt_defer"
|
|
"$@" || pp_echo "Task '$@' failed with return code $?."
|
|
} >> "$log_file" 2>&1 &
|
|
fi
|
|
}
|
|
|
|
# --- the script ---
|
|
|
|
product_default_conf
|
|
initial_conf
|
|
set_common_params
|
|
read_conf
|
|
|
|
# Don't defer relinking logs if requested delay more than 1 hour.
|
|
if [ -n "$opt_defer" ] && [ "$opt_defer" -ge "$(( 1 * 60 * 60 ))" ]; then
|
|
pp_echo "Defer interval is too large. Logs will be automatically relinked right now and in 24 hours."
|
|
opt_defer=
|
|
fi
|
|
# Otherwise add a number for the top of the head (e.g., 10 seconds) to allow web servers to restart.
|
|
if [ -n "$opt_defer" ]; then
|
|
opt_defer="$(( $opt_defer + 10 ))"
|
|
fi
|
|
|
|
cd "$HTTPD_VHOSTS_D" || just_die "Cannot cd to '$HTTPD_VHOSTS_D'"
|
|
|
|
if [ -n "$opt_webspace_name" ]; then
|
|
ensure_target_dir_exists "$opt_webspace_name" "logs" "$opt_sys_user_login" ||
|
|
just_die "Cannot relink logs. Target directory '$HTTPD_VHOSTS_D/$opt_webspace_name/logs' is in invalid state."
|
|
ensure_target_dir_exists "$opt_webspace_name" "logs/$opt_domain_name" "$opt_sys_user_login" ||
|
|
just_die "Cannot relink logs. Target directory '$HTTPD_VHOSTS_D/$opt_webspace_name/logs/$opt_domain_name' is in invalid state."
|
|
|
|
deferred relink_dir "$HTTPD_VHOSTS_D/system/$opt_domain_name/logs" "$HTTPD_VHOSTS_D/$opt_webspace_name/logs/$opt_domain_name"
|
|
else
|
|
ensure_target_dir_exists "$opt_domain_name" "logs" "$opt_sys_user_login" ||
|
|
just_die "Cannot relink logs. Target directory '$HTTPD_VHOSTS_D/$opt_domain_name/logs' is in invalid state."
|
|
|
|
deferred relink_dir "$HTTPD_VHOSTS_D/system/$opt_domain_name/logs" "$HTTPD_VHOSTS_D/$opt_domain_name/logs"
|
|
fi
|
|
|
|
# vim:ft=sh:
|