domain.sh 34 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069
  1. #!/bin/bash
  2. #===========================================================================#
  3. # #
  4. # Hestia Control Panel - Domain Function Library #
  5. # #
  6. #===========================================================================#
  7. #----------------------------------------------------------#
  8. # WEB #
  9. #----------------------------------------------------------#
  10. # Web template check
  11. is_web_template_valid() {
  12. if [ -n "$WEB_SYSTEM" ]; then
  13. tpl="$WEBTPL/$WEB_SYSTEM/$WEB_BACKEND/$1.tpl"
  14. stpl="$WEBTPL/$WEB_SYSTEM/$WEB_BACKEND/$1.stpl"
  15. if [ ! -e "$tpl" ] || [ ! -e "$stpl" ]; then
  16. check_result "$E_NOTEXIST" "$1 web template doesn't exist"
  17. fi
  18. fi
  19. }
  20. # Proxy template check
  21. is_proxy_template_valid() {
  22. if [ -n "$PROXY_SYSTEM" ]; then
  23. tpl="$WEBTPL/$PROXY_SYSTEM/$1.tpl"
  24. stpl="$WEBTPL/$PROXY_SYSTEM/$1.stpl"
  25. if [ ! -e "$tpl" ] || [ ! -e "$stpl" ]; then
  26. check_result "$E_NOTEXIST" "$1 proxy template doesn't exist"
  27. fi
  28. fi
  29. }
  30. # Backend template check
  31. is_backend_template_valid() {
  32. if [ -n "$WEB_BACKEND" ]; then
  33. if [ ! -e "$WEBTPL/$WEB_BACKEND/$1.tpl" ]; then
  34. check_result "$E_NOTEXIST" "$1 backend template doesn't exist"
  35. fi
  36. fi
  37. }
  38. # Web domain existence check
  39. is_web_domain_new() {
  40. web=$(grep -F -H "DOMAIN='$1'" $HESTIA/data/users/*/web.conf)
  41. if [ -n "$web" ]; then
  42. if [ "$type" == 'web' ]; then
  43. check_result "$E_EXISTS" "Web domain $1 exists"
  44. fi
  45. web_user=$(echo "$web" | cut -f 7 -d /)
  46. if [ "$web_user" != "$user" ]; then
  47. check_result "$E_EXISTS" "Web domain $1 exists"
  48. fi
  49. fi
  50. }
  51. # Web alias existence check
  52. is_web_alias_new() {
  53. grep -wH "$1" $HESTIA/data/users/*/web.conf | while read -r line; do
  54. user=$(echo $line | cut -f 7 -d /)
  55. string=$(echo $line | cut -f 2- -d ':')
  56. parse_object_kv_list $string
  57. if [ -n "$ALIAS" ]; then
  58. a1=$(echo "'$ALIAS'" | grep -F "'$1'")
  59. if [ -n "$a1" ] && [ "$2" == "web" ]; then
  60. return "$E_EXISTS"
  61. fi
  62. if [ -n "$a1" ] && [ "$user" != "$user" ]; then
  63. return "$E_EXISTS"
  64. fi
  65. a2=$(echo "'$ALIAS'" | grep -F "'$1,")
  66. if [ -n "$a2" ] && [ "$2" == "web" ]; then
  67. return "$E_EXISTS"
  68. fi
  69. if [ -n "$a2" ] && [ "$user" != "$user" ]; then
  70. return "$E_EXISTS"
  71. fi
  72. a3=$(echo "'$ALIAS'" | grep -F ",$1,")
  73. if [ -n "$a3" ] && [ "$2" == "web" ]; then
  74. return "$E_EXISTS"
  75. fi
  76. if [ -n "$a3" ] && [ "$user" != "$user" ]; then
  77. return "$E_EXISTS"
  78. fi
  79. a4=$(echo "'$ALIAS'" | grep -F ",$1'")
  80. if [ -n "$a4" ] && [ "$2" == "web" ]; then
  81. return "$E_EXISTS"
  82. fi
  83. if [ -n "$a4" ] && [ "$user" != "$user" ]; then
  84. return "$E_EXISTS"
  85. fi
  86. fi
  87. done
  88. if [ $? -ne 0 ]; then
  89. check_result "$E_EXISTS" "Web alias $1 exists"
  90. fi
  91. }
  92. # Prepare web backend
  93. prepare_web_backend() {
  94. # Accept first function argument as backend template otherwise fallback to $template global variable
  95. local backend_template=${1:-$template}
  96. pool=$(find -L /etc/php/ -name "$domain.conf" -exec dirname {} \;)
  97. # Check if multiple-PHP installed
  98. regex="socket-(\d+)_(\d+)"
  99. if [[ $backend_template =~ ^.*PHP-([0-9])\_([0-9])$ ]]; then
  100. backend_version="${BASH_REMATCH[1]}.${BASH_REMATCH[2]}"
  101. pool=$(find -L /etc/php/$backend_version -type d \( -name "pool.d" -o -name "*fpm.d" \))
  102. else
  103. backend_version=$(multiphp_default_version)
  104. if [ -z "$pool" ] || [ -z "$BACKEND" ]; then
  105. pool=$(find -L /etc/php/$backend_version -type d \( -name "pool.d" -o -name "*fpm.d" \))
  106. fi
  107. fi
  108. if [ ! -e "$pool" ]; then
  109. check_result $E_NOTEXIST "php-fpm pool doesn't exist"
  110. fi
  111. backend_type="$domain"
  112. if [ "$WEB_BACKEND_POOL" = 'user' ]; then
  113. backend_type="$user"
  114. fi
  115. if [ -e "$pool/$backend_type.conf" ]; then
  116. backend_lsnr=$(grep "listen =" $pool/$backend_type.conf)
  117. backend_lsnr=$(echo "$backend_lsnr" | cut -f 2 -d = | sed "s/ //")
  118. if [ -n "$(echo $backend_lsnr | grep /)" ]; then
  119. backend_lsnr="unix:$backend_lsnr"
  120. fi
  121. fi
  122. }
  123. # Delete web backend
  124. delete_web_backend() {
  125. find -L /etc/php/ -type f -name "$backend_type.conf" -exec rm -f {} \;
  126. }
  127. # Prepare web aliases
  128. prepare_web_aliases() {
  129. i=1
  130. for tmp_alias in ${1//,/ }; do
  131. tmp_alias_idn="$tmp_alias"
  132. if [[ "$tmp_alias" = *[![:ascii:]]* ]]; then
  133. tmp_alias_idn=$(idn2 --quiet $tmp_alias)
  134. fi
  135. if [[ $i -eq 1 ]]; then
  136. aliases="$tmp_alias"
  137. aliases_idn="$tmp_alias_idn"
  138. alias_string="ServerAlias $tmp_alias_idn"
  139. else
  140. aliases="$aliases,$tmp_alias"
  141. aliases_idn="$aliases_idn,$tmp_alias_idn"
  142. if (($i % 100 == 0)); then
  143. alias_string="$alias_string\n ServerAlias $tmp_alias_idn"
  144. else
  145. alias_string="$alias_string $tmp_alias_idn"
  146. fi
  147. fi
  148. alias_number=$i
  149. ((i++))
  150. done
  151. }
  152. # Update web domain values
  153. prepare_web_domain_values() {
  154. if [[ "$domain" = *[![:ascii:]]* ]]; then
  155. domain_idn=$(idn2 --quiet $domain)
  156. else
  157. domain_idn=$domain
  158. fi
  159. group="$user"
  160. docroot="$HOMEDIR/$user/web/$domain/public_html"
  161. sdocroot="$docroot"
  162. if [ "$SSL_HOME" = 'single' ]; then
  163. sdocroot="$HOMEDIR/$user/web/$domain/public_shtml"
  164. $BIN/v-add-fs-directory "$user" "$HOMEDIR/$user/web/$domain/public_shtml"
  165. chmod 751 $HOMEDIR/$user/web/$domain/public_shtml
  166. chown www-data:$user $HOMEDIR/$user/web/$domain/public_shtml
  167. fi
  168. if [ -n "$WEB_BACKEND" ]; then
  169. prepare_web_backend "$BACKEND"
  170. fi
  171. server_alias=''
  172. alias_string=''
  173. aliases_idn=''
  174. ssl_ca_str=''
  175. prepare_web_aliases $ALIAS
  176. ssl_crt="$HOMEDIR/$user/conf/web/$domain/ssl/$domain.crt"
  177. ssl_key="$HOMEDIR/$user/conf/web/$domain/ssl/$domain.key"
  178. ssl_pem="$HOMEDIR/$user/conf/web/$domain/ssl/$domain.pem"
  179. ssl_ca="$HOMEDIR/$user/conf/web/$domain/ssl/$domain.ca"
  180. if [ ! -e "$USER_DATA/ssl/$domain.ca" ]; then
  181. ssl_ca_str='#'
  182. fi
  183. # Set correct document root
  184. if [ -n "$CUSTOM_DOCROOT" ]; then
  185. # Custom document root has been set by the user, import from configuration
  186. custom_docroot="$CUSTOM_DOCROOT"
  187. docroot="$custom_docroot"
  188. sdocroot="$docroot"
  189. elif [ -n "$CUSTOM_DOCROOT" ] && [ -n "$target_directory" ]; then
  190. # Custom document root has been specified with a different target than public_html
  191. if [ -d "$HOMEDIR/$user/web/$target_domain/public_html/$target_directory/" ]; then
  192. custom_docroot="$HOMEDIR/$user/web/$target_domain/public_html/$target_directory"
  193. docroot="$custom_docroot"
  194. sdocroot="$docroot"
  195. fi
  196. elif [ -n "$CUSTOM_DOCROOT" ] && [ -z "$target_directory" ]; then
  197. # Set custom document root to target domain's public_html folder
  198. custom_docroot="$HOMEDIR/$user/web/$target_domain/public_html"
  199. docroot="$custom_docroot"
  200. sdocroot="$docroot"
  201. else
  202. # No custom document root specified, use default
  203. docroot="$HOMEDIR/$user/web/$domain/public_html"
  204. sdocroot="$docroot"
  205. fi
  206. if [ "$SUSPENDED" = 'yes' ]; then
  207. docroot="$HESTIA/data/templates/web/suspend"
  208. sdocroot="$HESTIA/data/templates/web/suspend"
  209. if [ "$PROXY_SYSTEM" == "nginx" ]; then
  210. PROXY="suspended"
  211. else
  212. TPL="suspended"
  213. fi
  214. fi
  215. }
  216. # Add web config
  217. add_web_config() {
  218. # Check if folder already exists
  219. if [ ! -d "$HOMEDIR/$user/conf/web/$domain" ]; then
  220. mkdir -p "$HOMEDIR/$user/conf/web/$domain/"
  221. fi
  222. conf="$HOMEDIR/$user/conf/web/$domain/$1.conf"
  223. if [[ "$2" =~ stpl$ ]]; then
  224. conf="$HOMEDIR/$user/conf/web/$domain/$1.ssl.conf"
  225. fi
  226. domain_idn=$domain
  227. format_domain_idn
  228. WEBTPL_LOCATION="$WEBTPL/$1"
  229. if [ "$1" != "$PROXY_SYSTEM" ] && [ -n "$WEB_BACKEND" ] && [ -d "$WEBTPL_LOCATION/$WEB_BACKEND" ]; then
  230. if [ -f "$WEBTPL_LOCATION/$WEB_BACKEND/$2" ]; then
  231. # check for backend specific template
  232. WEBTPL_LOCATION="$WEBTPL/$1/$WEB_BACKEND"
  233. fi
  234. fi
  235. # Note: Removing or renaming template variables will lead to broken custom templates.
  236. # -If possible custom templates should be automatically upgraded to use the new format
  237. # -Alternatively a depreciation period with proper notifications should be considered
  238. cat "${WEBTPL_LOCATION}/$2" \
  239. | sed -e "s|%ip%|$local_ip|g" \
  240. -e "s|%domain%|$domain|g" \
  241. -e "s|%domain_idn%|$domain_idn|g" \
  242. -e "s|%alias%|${aliases//,/ }|g" \
  243. -e "s|%alias_idn%|${aliases_idn//,/ }|g" \
  244. -e "s|%alias_string%|$alias_string|g" \
  245. -e "s|%email%|info@$domain|g" \
  246. -e "s|%web_system%|$WEB_SYSTEM|g" \
  247. -e "s|%web_port%|$WEB_PORT|g" \
  248. -e "s|%web_ssl_port%|$WEB_SSL_PORT|g" \
  249. -e "s|%backend_lsnr%|$backend_lsnr|g" \
  250. -e "s|%rgroups%|$WEB_RGROUPS|g" \
  251. -e "s|%proxy_system%|$PROXY_SYSTEM|g" \
  252. -e "s|%proxy_port%|$PROXY_PORT|g" \
  253. -e "s|%proxy_ssl_port%|$PROXY_SSL_PORT|g" \
  254. -e "s/%proxy_extentions%/${PROXY_EXT//,/|}/g" \
  255. -e "s/%proxy_extensions%/${PROXY_EXT//,/|}/g" \
  256. -e "s|%user%|$user|g" \
  257. -e "s|%group%|$user|g" \
  258. -e "s|%home%|$HOMEDIR|g" \
  259. -e "s|%docroot%|$docroot|g" \
  260. -e "s|%sdocroot%|$sdocroot|g" \
  261. -e "s|%ssl_crt%|$ssl_crt|g" \
  262. -e "s|%ssl_key%|$ssl_key|g" \
  263. -e "s|%ssl_pem%|$ssl_pem|g" \
  264. -e "s|%ssl_ca_str%|$ssl_ca_str|g" \
  265. -e "s|%ssl_ca%|$ssl_ca|g" \
  266. > $conf
  267. process_http2_directive "$conf"
  268. chown root:$user $conf
  269. chmod 640 $conf
  270. if [[ "$2" =~ stpl$ ]]; then
  271. rm -f /etc/$1/conf.d/domains/$domain.ssl.conf
  272. ln -s $conf /etc/$1/conf.d/domains/$domain.ssl.conf
  273. # Rename/Move extra SSL config files
  274. find=$(find $HOMEDIR/$user/conf/web/*.$domain.org* 2> /dev/null)
  275. for f in $find; do
  276. if [[ $f =~ .*/s(nginx|apache2)\.$domain\.conf(.*) ]]; then
  277. ServerType="${BASH_REMATCH[1]}"
  278. CustomConfigName="${BASH_REMATCH[2]}"
  279. if [ "$CustomConfigName" = "_letsencrypt" ]; then
  280. rm -f "$f"
  281. continue
  282. fi
  283. mv "$f" "$HOMEDIR/$user/conf/web/$domain/$ServerType.ssl.conf_old$CustomConfigName"
  284. fi
  285. done
  286. else
  287. rm -f /etc/$1/conf.d/domains/$domain.conf
  288. ln -s $conf /etc/$1/conf.d/domains/$domain.conf
  289. # Rename/Move extra config files
  290. find=$(find $HOMEDIR/$user/conf/web/*.$domain.org* 2> /dev/null)
  291. for f in $find; do
  292. if [[ $f =~ .*/(nginx|apache2)\.$domain\.conf(.*) ]]; then
  293. ServerType="${BASH_REMATCH[1]}"
  294. CustomConfigName="${BASH_REMATCH[2]}"
  295. if [ "$CustomConfigName" = "_letsencrypt" ]; then
  296. rm -f "$f"
  297. continue
  298. fi
  299. mv "$f" "$HOMEDIR/$user/conf/web/$domain/$ServerType.conf_old$CustomConfigName"
  300. elif [[ $f =~ .*/forcessl\.(nginx|apache2)\.$domain\.conf ]]; then
  301. ServerType="${BASH_REMATCH[1]}"
  302. mv "$f" "$HOMEDIR/$user/conf/web/$domain/$ServerType.forcessl.conf"
  303. fi
  304. done
  305. fi
  306. trigger="${2/.*pl/.sh}"
  307. if [ -x "${WEBTPL_LOCATION}/$trigger" ]; then
  308. $WEBTPL_LOCATION/$trigger \
  309. $user $domain $local_ip $HOMEDIR \
  310. $HOMEDIR/$user/web/$domain/public_html
  311. fi
  312. }
  313. # Get config top and bottom line number
  314. get_web_config_lines() {
  315. tpl_lines=$(egrep -ni "name %domain_idn%" $1 | grep -w %domain_idn%)
  316. tpl_lines=$(echo "$tpl_lines" | cut -f 1 -d :)
  317. tpl_last_line=$(wc -l $1 | cut -f 1 -d ' ')
  318. if [ -z "$tpl_lines" ]; then
  319. check_result $E_PARSING "can't parse template $1"
  320. fi
  321. domain_idn=$domain
  322. format_domain_idn
  323. vhost_lines=$(grep -niF "name $domain_idn" $2)
  324. vhost_lines=$(echo "$vhost_lines" | egrep "$domain_idn($| |;)")
  325. vhost_lines=$(echo "$vhost_lines" | cut -f 1 -d :)
  326. if [ -z "$vhost_lines" ]; then
  327. check_result $E_PARSING "can't parse config $2"
  328. fi
  329. top_line=$((vhost_lines + 1 - tpl_lines))
  330. bottom_line=$((top_line - 1 + tpl_last_line))
  331. multi=$(sed -n "$top_line,$bottom_line p" $2 | grep ServerAlias | wc -l)
  332. if [ "$multi" -ge 2 ]; then
  333. bottom_line=$((bottom_line + multi - 1))
  334. fi
  335. }
  336. # Replace web config
  337. replace_web_config() {
  338. conf="$HOMEDIR/$user/conf/web/$domain/$1.conf"
  339. if [[ "$2" =~ stpl$ ]]; then
  340. conf="$HOMEDIR/$user/conf/web/$domain/$1.ssl.conf"
  341. fi
  342. if [ -e "$conf" ]; then
  343. sed -i "s|$old|$new|g" $conf
  344. fi
  345. }
  346. # Delete web configuration
  347. del_web_config() {
  348. conf="$HOMEDIR/$user/conf/web/$domain/$1.conf"
  349. local confname="$domain.conf"
  350. if [[ "$2" =~ stpl$ ]]; then
  351. conf="$HOMEDIR/$user/conf/web/$domain/$1.ssl.conf"
  352. confname="$domain.ssl.conf"
  353. fi
  354. # Clean up legacy configuration files
  355. if [ ! -e "$conf" ]; then
  356. local legacyconf="$HOMEDIR/$user/conf/web/$1.conf"
  357. if [[ "$2" =~ stpl$ ]]; then
  358. legacyconf="$HOMEDIR/$user/conf/web/s$1.conf"
  359. fi
  360. rm -f $legacyconf
  361. # Remove old global includes file
  362. rm -f /etc/$1/conf.d/hestia.conf
  363. fi
  364. # Remove domain configuration files and clean up symbolic links
  365. rm -f "$conf"
  366. if [ -n "$WEB_SYSTEM" ] && [ "$WEB_SYSTEM" = "$1" ]; then
  367. rm -f "/etc/$WEB_SYSTEM/conf.d/domains/$confname"
  368. fi
  369. if [ -n "$PROXY_SYSTEM" ] && [ "$PROXY_SYSTEM" = "$1" ]; then
  370. rm -f "/etc/$PROXY_SYSTEM/conf.d/domains/$confname"
  371. fi
  372. }
  373. # SSL certificate verification
  374. is_web_domain_cert_valid() {
  375. if [ ! -e "$ssl_dir/$domain.crt" ]; then
  376. check_result "$E_NOTEXIST" "$ssl_dir/$domain.crt not found"
  377. fi
  378. if [ ! -e "$ssl_dir/$domain.key" ]; then
  379. check_result "$E_NOTEXIST" "$ssl_dir/$domain.key not found"
  380. fi
  381. crt_vrf=$(openssl verify $ssl_dir/$domain.crt 2>&1)
  382. if [ -n "$(echo $crt_vrf | grep 'unable to load')" ]; then
  383. check_result "$E_INVALID" "SSL Certificate is not valid"
  384. fi
  385. if [ -n "$(echo $crt_vrf | grep 'unable to get local issuer')" ]; then
  386. if [ ! -e "$ssl_dir/$domain.ca" ]; then
  387. check_result "$E_NOTEXIST" "Certificate Authority not found"
  388. fi
  389. fi
  390. if [ -e "$ssl_dir/$domain.ca" ]; then
  391. s1=$(openssl x509 -noout -in $ssl_dir/$domain.crt -issuer 2> /dev/null | cut -d = -f2-)
  392. s2=$(openssl x509 -noout -in $ssl_dir/$domain.ca -subject 2> /dev/null | cut -d = -f2-)
  393. if [ "$s1" != "$s2" ]; then
  394. check_result "$E_NOTEXIST" "SSL intermediate chain is not valid"
  395. fi
  396. fi
  397. key_vrf=$(grep 'PRIVATE KEY' $ssl_dir/$domain.key | wc -l)
  398. if [ "$key_vrf" -ne 2 ]; then
  399. check_result "$E_INVALID" "SSL Key is not valid"
  400. fi
  401. if [ -n "$(grep 'ENCRYPTED' $ssl_dir/$domain.key)" ]; then
  402. check_result "$E_FORBIDEN" "SSL Key is protected (remove pass_phrase)"
  403. fi
  404. if pgrep -x "openssl" > /dev/null; then
  405. pkill openssl
  406. fi
  407. openssl s_server -quiet -cert $ssl_dir/$domain.crt \
  408. -key $ssl_dir/$domain.key >> /dev/null 2>&1 &
  409. pid=$!
  410. sleep 0.5
  411. disown &> /dev/null
  412. kill $pid &> /dev/null
  413. check_result $? "ssl certificate key pair is not valid" $E_INVALID
  414. }
  415. #----------------------------------------------------------#
  416. # DNS #
  417. #----------------------------------------------------------#
  418. # DNS template check
  419. is_dns_template_valid() {
  420. if [ ! -e "$DNSTPL/$1.tpl" ]; then
  421. check_result "$E_NOTEXIST" "$1 dns template doesn't exist"
  422. fi
  423. }
  424. # DNS domain existence check
  425. is_dns_domain_new() {
  426. dns=$(ls $HESTIA/data/users/*/dns/$1.conf 2> /dev/null)
  427. if [ -n "$dns" ]; then
  428. if [ "$2" == 'dns' ]; then
  429. check_result "$E_EXISTS" "DNS domain $1 exists"
  430. fi
  431. dns_user=$(echo "$dns" | cut -f 7 -d /)
  432. if [ "$dns_user" != "$user" ]; then
  433. check_result "$E_EXISTS" "DNS domain $1 exists"
  434. fi
  435. fi
  436. }
  437. # Update domain zone
  438. update_domain_zone() {
  439. domain_param=$(grep "DOMAIN='$domain'" $USER_DATA/dns.conf)
  440. parse_object_kv_list "$domain_param"
  441. local zone_ttl="$TTL"
  442. SOA=$(idn2 --quiet "$SOA")
  443. if [ -z "$SERIAL" ]; then
  444. SERIAL=$(date +'%Y%m%d01')
  445. fi
  446. if [[ "$domain" = *[![:ascii:]]* ]]; then
  447. domain_idn=$(idn2 --quiet "$domain")
  448. else
  449. domain_idn=$domain
  450. fi
  451. # Set SOA refresh value based on TLD
  452. tld="${domain_idn##*.}"
  453. case "$tld" in
  454. de | cz | pl | pt)
  455. refresh=1800
  456. ;;
  457. *)
  458. refresh=3600
  459. ;;
  460. esac
  461. zn_conf="$HOMEDIR/$user/conf/dns/$domain.db"
  462. echo "\$TTL $zone_ttl
  463. @ IN SOA $SOA. root.$domain_idn. (
  464. $SERIAL
  465. 7200
  466. $refresh
  467. 1209600
  468. 180 )
  469. " > $zn_conf
  470. fields='$RECORD\t$TTL\tIN\t$TYPE\t$PRIORITY\t$VALUE'
  471. while read line; do
  472. unset TTL
  473. IFS=$'\n'
  474. for key in $(echo $line | sed "s/' /'\n/g"); do
  475. eval ${key%%=*}="${key#*=}"
  476. done
  477. # inherit zone TTL if record lacks explicit TTL value
  478. [ -z "$TTL" ] && TTL="$zone_ttl"
  479. RECORD=$(idn2 --quiet "$RECORD")
  480. if [ "$TYPE" = 'CNAME' ] || [ "$TYPE" = 'MX' ]; then
  481. VALUE=$(idn2 --quiet "$VALUE")
  482. fi
  483. if [ "$TYPE" = 'TXT' ]; then
  484. txtlength=${#VALUE}
  485. if [ $txtlength -gt 255 ]; then
  486. already_chunked=0
  487. if [[ $VALUE == *"\" \""* ]] || [[ $VALUE == *"\"\""* ]]; then
  488. already_chunked=1
  489. fi
  490. if [ $already_chunked -eq 0 ]; then
  491. if [[ ${VALUE:0:1} = '"' ]]; then
  492. txtlength=$(($txtlength - 2))
  493. VALUE=${VALUE:1:txtlength}
  494. fi
  495. VALUE=$(echo $VALUE | fold -w 255 | xargs -I '$' echo -n '"$"')
  496. fi
  497. fi
  498. fi
  499. if [ "$SUSPENDED" != 'yes' ]; then
  500. eval echo -e "\"$fields\"" | sed "s/%quote%/'/g" >> $zn_conf
  501. fi
  502. done < $USER_DATA/dns/$domain.conf
  503. }
  504. # Update zone serial
  505. update_domain_serial() {
  506. zn_conf="$HOMEDIR/$user/conf/dns/$domain.db"
  507. if [ -e $zn_conf ]; then
  508. zn_serial=$(head $zn_conf | grep 'SOA' -A1 | tail -n 1 | sed "s/ //g")
  509. s_date=$(echo ${zn_serial:0:8})
  510. c_date=$(date +'%Y%m%d')
  511. if [ "$s_date" == "$c_date" ]; then
  512. cur_value=$(echo ${zn_serial:8})
  513. new_value=$(expr $cur_value + 1)
  514. len_value=$(expr length $new_value)
  515. if [ 1 -eq "$len_value" ]; then
  516. new_value='0'$new_value
  517. fi
  518. serial="$c_date""$new_value"
  519. else
  520. serial="$(date +'%Y%m%d01')"
  521. fi
  522. else
  523. serial="$(date +'%Y%m%d01')"
  524. fi
  525. add_object_key "dns" 'DOMAIN' "$domain" 'SERIAL' 'RECORDS'
  526. update_object_value 'dns' 'DOMAIN' "$domain" '$SERIAL' "$serial"
  527. }
  528. # Get next DNS record ID
  529. get_next_dnsrecord() {
  530. if [ -z "$id" ]; then
  531. curr_str=$(grep "ID=" $USER_DATA/dns/$domain.conf | cut -f 2 -d \' \
  532. | sort -n | tail -n1)
  533. id="$((curr_str + 1))"
  534. fi
  535. }
  536. # Sort DNS records
  537. sort_dns_records() {
  538. conf="$USER_DATA/dns/$domain.conf"
  539. cat $conf | sort -n -k 2 -t \' > $conf.tmp
  540. mv -f $conf.tmp $conf
  541. }
  542. # Check if this is a last record
  543. is_dns_record_critical() {
  544. str=$(grep "ID='$id'" $USER_DATA/dns/$domain.conf)
  545. parse_object_kv_list "$str"
  546. if [ "$TYPE" = 'A' ] || [ "$TYPE" = 'NS' ]; then
  547. records=$(grep "TYPE='$TYPE'" $USER_DATA/dns/$domain.conf | wc -l)
  548. if [ $records -le 1 ]; then
  549. echo "Error: at least one $TYPE record should remain active"
  550. log_event "$E_INVALID" "$ARGUMENTS"
  551. exit "$E_INVALID"
  552. fi
  553. fi
  554. }
  555. # Check if dns record is valid
  556. is_dns_fqnd() {
  557. t=$1
  558. r=$2
  559. fqdn_type=$(echo $t | grep "^NS\|CNAME\|MX\|PTR\|SRV")
  560. tree_length=3
  561. if [[ $t = 'CNAME' || $t = 'MX' || $t = 'PTR' ]]; then
  562. tree_length=2
  563. fi
  564. if [ -n "$fqdn_type" ]; then
  565. dots=$(echo $dvalue | grep -o "\." | wc -l)
  566. if [ "$dots" -lt "$tree_length" ]; then
  567. r=$(echo $r | sed -e "s/\.$//")
  568. msg="$t record $r should be a fully qualified domain name (FQDN)"
  569. echo "Error: $msg"
  570. log_event "$E_INVALID" "$ARGUMENTS"
  571. exit "$E_INVALID"
  572. fi
  573. fi
  574. }
  575. # Validate nameserver
  576. is_dns_nameserver_valid() {
  577. d=$1
  578. t=$2
  579. r=$3
  580. if [ "$t" = 'NS' ]; then
  581. remote=$(echo $r | grep ".$domain.$")
  582. if [ -n "$remote" ]; then
  583. zone=$USER_DATA/dns/$d.conf
  584. a_record=${r%.$d.}
  585. n_record=$(grep "RECORD='$a_record'" $zone | grep "TYPE='A'")
  586. if [ -z "$n_record" ]; then
  587. check_result "$E_NOTEXIST" "IN A $a_record.$d does not exist"
  588. fi
  589. fi
  590. fi
  591. }
  592. #----------------------------------------------------------#
  593. # MAIL #
  594. #----------------------------------------------------------#
  595. # Mail domain existence check
  596. is_mail_domain_new() {
  597. mail=$(ls $HESTIA/data/users/*/mail/$1.conf 2> /dev/null)
  598. if [ -n "$mail" ]; then
  599. if [ "$2" == 'mail' ]; then
  600. check_result $E_EXISTS "Mail domain $1 exists"
  601. fi
  602. mail_user=$(echo "$mail" | cut -f 7 -d /)
  603. if [ "$mail_user" != "$user" ]; then
  604. check_result "$E_EXISTS" "Mail domain $1 exists"
  605. fi
  606. fi
  607. mail_sub=$(echo "$1" | cut -f 1 -d .)
  608. mail_nosub=$(echo "$1" | cut -f 1 -d . --complement)
  609. for mail_reserved in $(echo "mail $WEBMAIL_ALIAS"); do
  610. if [ -n "$(ls $HESTIA/data/users/*/mail/$mail_reserved.$1.conf 2> /dev/null)" ]; then
  611. if [ "$2" == 'mail' ]; then
  612. check_result "$E_EXISTS" "Required subdomain \"$mail_reserved.$1\" already exists"
  613. fi
  614. fi
  615. if [ -n "$(ls $HESTIA/data/users/*/mail/$mail_nosub.conf 2> /dev/null)" ] && [ "$mail_sub" = "$mail_reserved" ]; then
  616. if [ "$2" == 'mail' ]; then
  617. check_result "$E_INVALID" "The subdomain \"$mail_sub.\" is reserved by \"$mail_nosub\""
  618. fi
  619. fi
  620. done
  621. }
  622. # Checking mail account existence
  623. is_mail_new() {
  624. check_acc=$(grep "ACCOUNT='$1'" $USER_DATA/mail/$domain.conf)
  625. if [ -n "$check_acc" ]; then
  626. check_result "$E_EXISTS" "mail account $1 already exists"
  627. fi
  628. check_als=$(awk -F "ALIAS='" '{print $2}' $USER_DATA/mail/$domain.conf)
  629. match=$(echo "$check_als" | cut -f 1 -d "'" | grep $1)
  630. if [ -n "$match" ]; then
  631. parse_object_kv_list $(grep "ALIAS='$match'" $USER_DATA/mail/$domain.conf)
  632. check_als=$(echo ",$ALIAS," | grep ",$1,")
  633. if [ -n "$check_als" ]; then
  634. check_result "$E_EXISTS" "mail alias $1 already exists"
  635. fi
  636. fi
  637. }
  638. # Add mail server SSL configuration
  639. add_mail_ssl_config() {
  640. # Ensure that SSL certificate directories exists
  641. if [ ! -d "$HOMEDIR/$user/conf/mail/$domain/ssl/" ]; then
  642. mkdir -p $HOMEDIR/$user/conf/mail/$domain/ssl/
  643. fi
  644. if [ ! -d "$HESTIA/ssl/mail" ]; then
  645. mkdir -p $HESTIA/ssl/mail
  646. fi
  647. if [ ! -d /etc/dovecot/conf.d/domains ]; then
  648. mkdir -p /etc/dovecot/conf.d/domains
  649. fi
  650. # Add certificate to Hestia user configuration data directory
  651. if [ -f "$ssl_dir/$domain.crt" ]; then
  652. cp -f $ssl_dir/$domain.crt $USER_DATA/ssl/mail.$domain.crt
  653. cp -f $ssl_dir/$domain.key $USER_DATA/ssl/mail.$domain.key
  654. cp -f $ssl_dir/$domain.crt $USER_DATA/ssl/mail.$domain.pem
  655. if [ -e "$ssl_dir/$domain.ca" ]; then
  656. cp -f $ssl_dir/$domain.ca $USER_DATA/ssl/mail.$domain.ca
  657. echo >> $USER_DATA/ssl/mail.$domain.pem
  658. cat $USER_DATA/ssl/mail.$domain.ca >> $USER_DATA/ssl/mail.$domain.pem
  659. fi
  660. fi
  661. chmod 660 $USER_DATA/ssl/mail.$domain.*
  662. # Add certificate to user home directory
  663. cp -f $USER_DATA/ssl/mail.$domain.crt $HOMEDIR/$user/conf/mail/$domain/ssl/$domain.crt
  664. cp -f $USER_DATA/ssl/mail.$domain.key $HOMEDIR/$user/conf/mail/$domain/ssl/$domain.key
  665. cp -f $USER_DATA/ssl/mail.$domain.pem $HOMEDIR/$user/conf/mail/$domain/ssl/$domain.pem
  666. if [ -e "$USER_DATA/ssl/mail.$domain.ca" ]; then
  667. cp -f $USER_DATA/ssl/mail.$domain.ca $HOMEDIR/$user/conf/mail/$domain/ssl/$domain.ca
  668. fi
  669. # Clean up dovecot configuration (if it exists)
  670. if [ -f /etc/dovecot/conf.d/domains/$domain.conf ]; then
  671. rm -f /etc/dovecot/conf.d/domains/$domain.conf
  672. fi
  673. # Check if using custom / wildcard mail certificate
  674. wildcard_domain="\\*.$(echo "$domain" | cut -f 1 -d . --complement)"
  675. mail_cert_match=$($BIN/v-list-mail-domain-ssl $user $domain | awk '/SUBJECT|ALIASES/' | grep -wE " $domain| $wildcard_domain")
  676. if [ -n "$mail_cert_match" ]; then
  677. # Add domain SSL configuration to dovecot
  678. echo "" >> /etc/dovecot/conf.d/domains/$domain.conf
  679. echo "local_name $domain {" >> /etc/dovecot/conf.d/domains/$domain.conf
  680. echo " ssl_cert = <$HOMEDIR/$user/conf/mail/$domain/ssl/$domain.pem" >> /etc/dovecot/conf.d/domains/$domain.conf
  681. echo " ssl_key = <$HOMEDIR/$user/conf/mail/$domain/ssl/$domain.key" >> /etc/dovecot/conf.d/domains/$domain.conf
  682. echo "}" >> /etc/dovecot/conf.d/domains/$domain.conf
  683. # Add domain SSL configuration to exim4
  684. ln -s $HOMEDIR/$user/conf/mail/$domain/ssl/$domain.pem $HESTIA/ssl/mail/$domain.crt
  685. ln -s $HOMEDIR/$user/conf/mail/$domain/ssl/$domain.key $HESTIA/ssl/mail/$domain.key
  686. fi
  687. # Add domain SSL configuration to dovecot
  688. echo "" >> /etc/dovecot/conf.d/domains/$domain.conf
  689. echo "local_name mail.$domain {" >> /etc/dovecot/conf.d/domains/$domain.conf
  690. echo " ssl_cert = <$HOMEDIR/$user/conf/mail/$domain/ssl/$domain.pem" >> /etc/dovecot/conf.d/domains/$domain.conf
  691. echo " ssl_key = <$HOMEDIR/$user/conf/mail/$domain/ssl/$domain.key" >> /etc/dovecot/conf.d/domains/$domain.conf
  692. echo "}" >> /etc/dovecot/conf.d/domains/$domain.conf
  693. # Add domain SSL configuration to exim4
  694. ln -s $HOMEDIR/$user/conf/mail/$domain/ssl/$domain.pem $HESTIA/ssl/mail/mail.$domain.crt
  695. ln -s $HOMEDIR/$user/conf/mail/$domain/ssl/$domain.key $HESTIA/ssl/mail/mail.$domain.key
  696. # Set correct permissions on certificates
  697. chmod 0750 $HOMEDIR/$user/conf/mail/$domain/ssl
  698. chown -R $MAIL_USER:mail $HOMEDIR/$user/conf/mail/$domain/ssl
  699. chmod 0644 $HOMEDIR/$user/conf/mail/$domain/ssl/*
  700. chown -h $user:mail $HOMEDIR/$user/conf/mail/$domain/ssl/*
  701. chmod -R 0644 $HESTIA/ssl/mail/*
  702. chown -h $user:mail $HESTIA/ssl/mail/*
  703. }
  704. # Delete SSL support for mail domain
  705. del_mail_ssl_config() {
  706. # Check to prevent accidental removal of mismatched certificate
  707. wildcard_domain="\\*.$(echo "$domain" | cut -f 1 -d . --complement)"
  708. mail_cert_match=$($BIN/v-list-mail-domain-ssl $user $domain | awk '/SUBJECT|ALIASES/' | grep -wE " $domain| $wildcard_domain")
  709. # Remove old mail certificates
  710. rm -f $HOMEDIR/$user/conf/mail/$domain/ssl/*
  711. # Remove dovecot configuration
  712. rm -f /etc/dovecot/conf.d/domains/$domain.conf
  713. # Remove SSL vhost configuration
  714. rm -f $HOMEDIR/$user/conf/mail/$domain/*.*ssl.conf
  715. rm -f /etc/$WEB_SYSTEM/conf.d/domains/$WEBMAIL_ALIAS.$domain.ssl.conf
  716. rm -f /etc/$PROXY_SYSTEM/conf.d/domains/$WEBMAIL_ALIAS.$domain.ssl.conf
  717. # Remove SSL certificates
  718. rm -f $HOMEDIR/$user/conf/mail/$domain/ssl/*
  719. if [ -n "$mail_cert_match" ]; then
  720. rm -f $HESTIA/ssl/mail/$domain.crt $HESTIA/ssl/mail/$domain.key
  721. fi
  722. rm -f $HESTIA/ssl/mail/mail.$domain.crt $HESTIA/ssl/mail/mail.$domain.key
  723. }
  724. # Delete generated certificates from user configuration data directory
  725. del_mail_ssl_certificates() {
  726. rm -f $USER_DATA/ssl/mail.$domain.ca
  727. rm -f $USER_DATA/ssl/mail.$domain.crt
  728. rm -f $USER_DATA/ssl/mail.$domain.key
  729. rm -f $USER_DATA/ssl/mail.$domain.pem
  730. rm -f $HOMEDIR/$user/conf/mail/$domain/ssl/*
  731. }
  732. # Add webmail config
  733. add_webmail_config() {
  734. mkdir -p "$HOMEDIR/$user/conf/mail/$domain"
  735. conf="$HOMEDIR/$user/conf/mail/$domain/$1.conf"
  736. if [[ "$2" =~ stpl$ ]]; then
  737. conf="$HOMEDIR/$user/conf/mail/$domain/$1.ssl.conf"
  738. fi
  739. domain_idn=$domain
  740. format_domain_idn
  741. ssl_crt="$HOMEDIR/$user/conf/mail/$domain/ssl/$domain.crt"
  742. ssl_key="$HOMEDIR/$user/conf/mail/$domain/ssl/$domain.key"
  743. ssl_pem="$HOMEDIR/$user/conf/mail/$domain/ssl/$domain.pem"
  744. ssl_ca="$HOMEDIR/$user/conf/mail/$domain/ssl/$domain.ca"
  745. override_alias=""
  746. if [ "$WEBMAIL_ALIAS" != "mail" ]; then
  747. override_alias="mail.$domain"
  748. override_alias_idn="mail.$domain_idn"
  749. fi
  750. # Note: Removing or renaming template variables will lead to broken custom templates.
  751. # -If possible custom templates should be automatically upgraded to use the new format
  752. # -Alternatively a depreciation period with proper notifications should be considered
  753. cat $MAILTPL/$1/$2 \
  754. | sed -e "s|%ip%|$local_ip|g" \
  755. -e "s|%domain%|$WEBMAIL_ALIAS.$domain|g" \
  756. -e "s|%domain_idn%|$WEBMAIL_ALIAS.$domain_idn|g" \
  757. -e "s|%root_domain%|$domain|g" \
  758. -e "s|%alias%|$override_alias|g" \
  759. -e "s|%alias_idn%|$override_alias_idn|g" \
  760. -e "s|%alias_string%|$alias_string|g" \
  761. -e "s|%email%|info@$domain|g" \
  762. -e "s|%web_system%|$WEB_SYSTEM|g" \
  763. -e "s|%web_port%|$WEB_PORT|g" \
  764. -e "s|%web_ssl_port%|$WEB_SSL_PORT|g" \
  765. -e "s|%backend_lsnr%|$backend_lsnr|g" \
  766. -e "s|%rgroups%|$WEB_RGROUPS|g" \
  767. -e "s|%proxy_system%|$PROXY_SYSTEM|g" \
  768. -e "s|%proxy_port%|$PROXY_PORT|g" \
  769. -e "s|%proxy_ssl_port%|$PROXY_SSL_PORT|g" \
  770. -e "s/%proxy_extensions%/${PROXY_EXT//,/|}/g" \
  771. -e "s|%user%|$user|g" \
  772. -e "s|%group%|$user|g" \
  773. -e "s|%home%|$HOMEDIR|g" \
  774. -e "s|%docroot%|$docroot|g" \
  775. -e "s|%sdocroot%|$sdocroot|g" \
  776. -e "s|%ssl_crt%|$ssl_crt|g" \
  777. -e "s|%ssl_key%|$ssl_key|g" \
  778. -e "s|%ssl_pem%|$ssl_pem|g" \
  779. -e "s|%ssl_ca_str%|$ssl_ca_str|g" \
  780. -e "s|%ssl_ca%|$ssl_ca|g" \
  781. > $conf
  782. process_http2_directive "$conf"
  783. chown root:$user $conf
  784. chmod 640 $conf
  785. if [[ "$2" =~ stpl$ ]]; then
  786. if [ -n "$WEB_SYSTEM" ]; then
  787. forcessl="$HOMEDIR/$user/conf/mail/$domain/$WEB_SYSTEM.forcessl.conf"
  788. rm -f /etc/$1/conf.d/domains/$WEBMAIL_ALIAS.$domain.ssl.conf
  789. ln -s $conf /etc/$1/conf.d/domains/$WEBMAIL_ALIAS.$domain.ssl.conf
  790. fi
  791. if [ -n "$PROXY_SYSTEM" ]; then
  792. forcessl="$HOMEDIR/$user/conf/mail/$domain/$PROXY_SYSTEM.forcessl.conf"
  793. rm -f /etc/$1/conf.d/domains/$WEBMAIL_ALIAS.$domain.ssl.conf
  794. ln -s $conf /etc/$1/conf.d/domains/$WEBMAIL_ALIAS.$domain.ssl.conf
  795. fi
  796. # Add rewrite rules to force HTTPS/SSL connections
  797. if [ -n "$PROXY_SYSTEM" ] || [ "$WEB_SYSTEM" = 'nginx' ]; then
  798. echo 'return 301 https://$server_name$request_uri;' > $forcessl
  799. else
  800. echo 'RewriteEngine On' > $forcessl
  801. echo 'RewriteRule ^(.*)$ https://%{HTTP_HOST}$1 [R=301,L]' >> $forcessl
  802. fi
  803. # Remove old configurations
  804. find $HOMEDIR/$user/conf/mail/ -maxdepth 1 -type f \( -name "$domain.*" -o -name "ssl.$domain.*" -o -name "*nginx.$domain.*" \) -exec rm {} \;
  805. else
  806. if [ -n "$WEB_SYSTEM" ]; then
  807. rm -f /etc/$1/conf.d/domains/$WEBMAIL_ALIAS.$domain.conf
  808. ln -s $conf /etc/$1/conf.d/domains/$WEBMAIL_ALIAS.$domain.conf
  809. fi
  810. if [ -n "$PROXY_SYSTEM" ]; then
  811. rm -f /etc/$1/conf.d/domains/$WEBMAIL_ALIAS.$domain.conf
  812. ln -s $conf /etc/$1/conf.d/domains/$WEBMAIL_ALIAS.$domain.conf
  813. fi
  814. # Clear old configurations
  815. find $HOMEDIR/$user/conf/mail/ -maxdepth 1 -type f \( -name "$domain.*" \) -exec rm {} \;
  816. fi
  817. }
  818. # Delete webmail support
  819. del_webmail_config() {
  820. if [ -n "$WEB_SYSTEM" ]; then
  821. rm -f $HOMEDIR/$user/conf/mail/$domain/$WEB_SYSTEM.conf
  822. rm -f /etc/$WEB_SYSTEM/conf.d/domains/$WEBMAIL_ALIAS.$domain.conf
  823. fi
  824. if [ -n "$PROXY_SYSTEM" ]; then
  825. rm -f $HOMEDIR/$user/conf/mail/$domain/$PROXY_SYSTEM.*conf
  826. rm -f /etc/$PROXY_SYSTEM/conf.d/domains/$WEBMAIL_ALIAS.$domain.conf
  827. fi
  828. }
  829. # Delete SSL webmail support
  830. del_webmail_ssl_config() {
  831. if [ -n "$WEB_SYSTEM" ]; then
  832. rm -f $HOMEDIR/$user/conf/mail/$domain/$WEB_SYSTEM.*ssl.conf
  833. rm -f /etc/$WEB_SYSTEM/conf.d/domains/$WEBMAIL_ALIAS.$domain.ssl.conf
  834. fi
  835. if [ -n "$PROXY_SYSTEM" ]; then
  836. rm -f $HOMEDIR/$user/conf/mail/$domain/$PROXY_SYSTEM.*ssl.conf
  837. rm -f /etc/$PROXY_SYSTEM/conf.d/domains/$WEBMAIL_ALIAS.$domain.ssl.conf
  838. fi
  839. }
  840. #----------------------------------------------------------#
  841. # CMN #
  842. #----------------------------------------------------------#
  843. # Checking domain existence
  844. is_domain_new() {
  845. type=$1
  846. for object in ${2//,/ }; do
  847. if [ -n "$WEB_SYSTEM" ]; then
  848. is_web_domain_new $object $type
  849. is_web_alias_new $object $type
  850. fi
  851. if [ -n "$DNS_SYSTEM" ]; then
  852. is_dns_domain_new $object $type
  853. fi
  854. if [ -n "$MAIL_SYSTEM" ]; then
  855. is_mail_domain_new $object $type
  856. fi
  857. done
  858. }
  859. # Get domain variables
  860. get_domain_values() {
  861. parse_object_kv_list $(grep "DOMAIN='$domain'" $USER_DATA/$1.conf)
  862. }
  863. #----------------------------------------------------------#
  864. # 2 Char domain name detection #
  865. #----------------------------------------------------------#
  866. is_valid_extension() {
  867. if [ ! -e "$HESTIA/data/extensions/public_suffix_list.dat" ]; then
  868. mkdir $HESTIA/data/extensions/
  869. chmod 750 $HESTIA/data/extensions/
  870. /usr/bin/wget --tries=3 --timeout=15 --read-timeout=15 --waitretry=3 --no-dns-cache --quiet -O $HESTIA/data/extensions/public_suffix_list.dat https://raw.githubusercontent.com/publicsuffix/list/master/public_suffix_list.dat
  871. fi
  872. test_domain=$(idn2 -d "$1")
  873. extension=$(/bin/echo "${test_domain}" | /usr/bin/rev | /usr/bin/cut -d "." --output-delimiter="." -f 1 | /usr/bin/rev)
  874. exten=$(grep "^$extension\$" $HESTIA/data/extensions/public_suffix_list.dat)
  875. }
  876. is_valid_2_part_extension() {
  877. if [ ! -e "$HESTIA/data/extensions/public_suffix_list.dat" ]; then
  878. mkdir $HESTIA/data/extensions/
  879. chmod 750 $HESTIA/data/extensions/
  880. /usr/bin/wget --tries=3 --timeout=15 --read-timeout=15 --waitretry=3 --no-dns-cache --quiet -O $HESTIA/data/extensions/public_suffix_list.dat https://raw.githubusercontent.com/publicsuffix/list/master/public_suffix_list.dat
  881. fi
  882. test_domain=$(idn2 -d "$1")
  883. extension=$(/bin/echo "${test_domain}" | /usr/bin/rev | /usr/bin/cut -d "." --output-delimiter="." -f 1-2 | /usr/bin/rev)
  884. exten=$(grep "^$extension\$" $HESTIA/data/extensions/public_suffix_list.dat)
  885. }
  886. get_base_domain() {
  887. test_domain=$1
  888. is_valid_extension "$test_domain"
  889. if [ $? -ne 0 ]; then
  890. basedomain=$(/bin/echo "${test_domain}" | /usr/bin/rev | /usr/bin/cut -d "." --output-delimiter="." -f 1-2 | /usr/bin/rev)
  891. else
  892. is_valid_2_part_extension "$test_domain"
  893. if [ $? -ne 0 ]; then
  894. basedomain=$(/bin/echo "${test_domain}" | /usr/bin/rev | /usr/bin/cut -d "." --output-delimiter="." -f 1-2 | /usr/bin/rev)
  895. else
  896. extension=$(/bin/echo "${test_domain}" | /usr/bin/rev | /usr/bin/cut -d "." --output-delimiter="." -f 1-2 | /usr/bin/rev)
  897. partdomain=$(/bin/echo "${test_domain}" | /usr/bin/rev | /usr/bin/cut -d "." --output-delimiter="." -f 3 | /usr/bin/rev)
  898. basedomain="$partdomain.$extension"
  899. fi
  900. fi
  901. }
  902. is_base_domain_owner() {
  903. for object in ${1//,/ }; do
  904. if [ "$object" != "none" ]; then
  905. get_base_domain $object
  906. web=$(grep -F -H -h "DOMAIN='$basedomain'" $HESTIA/data/users/*/web.conf)
  907. if [ "$ENFORCE_SUBDOMAIN_OWNERSHIP" = "yes" ]; then
  908. if [ -n "$web" ]; then
  909. parse_object_kv_list "$web"
  910. if [ -z "$ALLOW_USERS" ] || [ "$ALLOW_USERS" != "yes" ]; then
  911. # Don't care if $basedomain all ready exists only if the owner is of the base domain is the current user
  912. check=$(is_domain_new "" $basedomain)
  913. if [ $? -ne 0 ]; then
  914. echo "Error: Unable to add $object. $basedomain belongs to a different user"
  915. exit 4
  916. fi
  917. fi
  918. else
  919. check=$(is_domain_new "" "$basedomain")
  920. if [ $? -ne 0 ]; then
  921. echo "Error: Unable to add $object. $basedomain belongs to a different user"
  922. exit 4
  923. fi
  924. fi
  925. fi
  926. fi
  927. done
  928. }
  929. #----------------------------------------------------------#
  930. # Process "http2" directive for NGINX #
  931. #----------------------------------------------------------#
  932. process_http2_directive() {
  933. if [ -e /etc/nginx/conf.d/http2-directive.conf ]; then
  934. while IFS= read -r old_param; do
  935. new_param="$(echo "$old_param" | sed 's/\shttp2//')"
  936. sed -i "s/$old_param/$new_param/" "$1"
  937. done < <(grep -E "listen.*(\bssl\b(\s|.+){1,}\bhttp2\b|\bhttp2\b(\s|.+){1,}\bssl\b).*;" "$1")
  938. else
  939. if version_ge "$(nginx -v 2>&1 | cut -d'/' -f2)" "1.25.1"; then
  940. echo "http2 on;" > /etc/nginx/conf.d/http2-directive.conf
  941. while IFS= read -r old_param; do
  942. new_param="$(echo "$old_param" | sed 's/\shttp2//')"
  943. sed -i "s/$old_param/$new_param/" "$1"
  944. done < <(grep -E "listen.*(\bssl\b(\s|.+){1,}\bhttp2\b|\bhttp2\b(\s|.+){1,}\bssl\b).*;" "$1")
  945. else
  946. listen_ssl="$(grep -E "listen.*\s\bssl\b(?:\s)*.*;" "$1")"
  947. listen_http2="$(grep -E "listen.*(\bssl\b(\s|.+){1,}\bhttp2\b|\bhttp2\b(\s|.+){1,}\bssl\b).*;" "$1")"
  948. if [ -n "$listen_ssl" ] && [ -z "$listen_http2" ]; then
  949. while IFS= read -r old_param; do
  950. new_param="$(echo "$old_param" | sed 's/\sssl/ ssl http2/')"
  951. sed -i "s/$old_param/$new_param/" "$1"
  952. done < <(grep -E "listen.*\s\bssl\b(?:\s)*.*;" "$1")
  953. fi
  954. fi
  955. fi
  956. }