version 1.41, 2017/03/29 22:52:04
|
version 1.45.2.2, 2019/02/19 19:24:28
|
Line 27 use strict;
|
Line 27 use strict;
|
use File::Copy; |
use File::Copy; |
use Term::ReadKey; |
use Term::ReadKey; |
use DBI; |
use DBI; |
|
use Cwd(); |
|
use File::Basename(); |
|
use lib File::Basename::dirname(Cwd::abs_path($0)); |
use LCLocalization::localize; |
use LCLocalization::localize; |
|
|
# ========================================================= The language handle |
# ========================================================= The language handle |
Line 159 sub get_user_selection {
|
Line 162 sub get_user_selection {
|
} |
} |
|
|
sub get_distro { |
sub get_distro { |
my ($distro,$gotprereqs,$updatecmd,$packagecmd,$installnow); |
my ($distro,$gotprereqs,$updatecmd,$packagecmd,$installnow,$unknown); |
$packagecmd = '/bin/rpm -q LONCAPA-prerequisites '; |
$packagecmd = '/bin/rpm -q LONCAPA-prerequisites '; |
if (-e '/etc/redhat-release') { |
if (-e '/etc/redhat-release') { |
open(IN,'</etc/redhat-release'); |
open(IN,'</etc/redhat-release'); |
Line 204 sub get_distro {
|
Line 207 sub get_distro {
|
} else { |
} else { |
print &mt('Unable to interpret [_1] to determine system type.', |
print &mt('Unable to interpret [_1] to determine system type.', |
'/etc/redhat-release')."\n"; |
'/etc/redhat-release')."\n"; |
|
$unknown = 1; |
} |
} |
} elsif (-e '/etc/SuSE-release') { |
} elsif (-e '/etc/SuSE-release') { |
open(IN,'</etc/SuSE-release'); |
open(IN,'</etc/SuSE-release'); |
Line 230 sub get_distro {
|
Line 234 sub get_distro {
|
} else { |
} else { |
print &mt('Unable to interpret [_1] to determine system type.', |
print &mt('Unable to interpret [_1] to determine system type.', |
'/etc/SuSE-release')."\n"; |
'/etc/SuSE-release')."\n"; |
|
$unknown = 1; |
} |
} |
} elsif (-e '/etc/issue') { |
} elsif (-e '/etc/issue') { |
open(IN,'</etc/issue'); |
open(IN,'</etc/issue'); |
my $versionstring=<IN>; |
my $versionstring=<IN>; |
chomp($versionstring); |
chomp($versionstring); |
close(IN); |
close(IN); |
$packagecmd = '/usr/bin/dpkg -l loncapa-prerequisites '; |
|
$updatecmd = 'apt-get install loncapa-prerequisites'; |
|
if ($versionstring =~ /^Ubuntu (\d+)\.\d+/i) { |
if ($versionstring =~ /^Ubuntu (\d+)\.\d+/i) { |
$distro = 'ubuntu'.$1; |
$distro = 'ubuntu'.$1; |
$updatecmd = 'sudo apt-get install loncapa-prerequisites'; |
$updatecmd = 'sudo apt-get install loncapa-prerequisites'; |
} elsif ($versionstring =~ /^Debian\s+GNU\/Linux\s+(\d+)\.\d+/i) { |
} elsif ($versionstring =~ /^Debian\s+GNU\/Linux\s+(\d+)\.\d+/i) { |
$distro = 'debian'.$1; |
$distro = 'debian'.$1; |
|
$updatecmd = 'apt-get install loncapa-prerequisites'; |
} elsif (-e '/etc/debian_version') { |
} elsif (-e '/etc/debian_version') { |
open(IN,'</etc/debian_version'); |
open(IN,'</etc/debian_version'); |
my $version=<IN>; |
my $version=<IN>; |
Line 250 sub get_distro {
|
Line 254 sub get_distro {
|
close(IN); |
close(IN); |
if ($version =~ /^(\d+)\.\d+\.?\d*/) { |
if ($version =~ /^(\d+)\.\d+\.?\d*/) { |
$distro='debian'.$1; |
$distro='debian'.$1; |
|
$updatecmd = 'apt-get install loncapa-prerequisites'; |
} else { |
} else { |
print &mt('Unable to interpret [_1] to determine system type.', |
print &mt('Unable to interpret [_1] to determine system type.', |
'/etc/debian_version')."\n"; |
'/etc/debian_version')."\n"; |
|
$unknown = 1; |
} |
} |
} else { |
} |
print &mt('Unable to interpret [_1] to determine system type.', |
if ($distro ne '') { |
'/etc/issue')."\n"; |
$packagecmd = '/usr/bin/dpkg -l loncapa-prerequisites '; |
} |
} |
} elsif (-e '/etc/debian_version') { |
} elsif (-e '/etc/debian_version') { |
open(IN,'</etc/debian_version'); |
open(IN,'</etc/debian_version'); |
Line 270 sub get_distro {
|
Line 276 sub get_distro {
|
} else { |
} else { |
print &mt('Unable to interpret [_1] to determine system type.', |
print &mt('Unable to interpret [_1] to determine system type.', |
'/etc/debian_version')."\n"; |
'/etc/debian_version')."\n"; |
|
$unknown = 1; |
|
} |
|
} |
|
if (($distro eq '') && (!$unknown)) { |
|
if (-e '/etc/os-release') { |
|
if (open(IN,'<','/etc/os-release')) { |
|
my ($id,$version); |
|
while(<IN>) { |
|
chomp(); |
|
if (/^ID="(\w+)"/) { |
|
$id=$1; |
|
} elsif (/^VERSION_ID="([\d\.]+)"/) { |
|
$version=$1; |
|
} |
|
} |
|
close(IN); |
|
if ($id eq 'sles') { |
|
my ($major,$minor) = split(/\./,$version); |
|
if ($major =~ /^\d+$/) { |
|
$distro = $id.$major; |
|
$updatecmd = 'zypper install LONCAPA-prerequisites'; |
|
} |
|
} |
|
} |
|
if ($distro eq '') { |
|
print &mt('Unable to interpret [_1] to determine system type.', |
|
'/etc/os-release')."\n"; |
|
$unknown = 1; |
|
} |
|
} else { |
|
print &mt('Unknown installation: expecting a debian, ubuntu, suse, sles, redhat, fedora or scientific linux system.')."\n"; |
} |
} |
} else { |
|
print &mt('Unknown installation: expecting a debian, ubuntu, suse, sles, redhat, fedora or scientific linux system.')."\n"; |
|
} |
} |
return ($distro,$packagecmd,$updatecmd,$installnow); |
return ($distro,$packagecmd,$updatecmd,$installnow); |
} |
} |
Line 314 sub check_locale {
|
Line 349 sub check_locale {
|
print &mt('Failed to open: [_1], default locale not checked.', |
print &mt('Failed to open: [_1], default locale not checked.', |
'/etc/default/locale'); |
'/etc/default/locale'); |
} |
} |
} elsif ($distro =~ /^(suse|sles)/) { |
} elsif ($distro =~ /^(suse|sles)(\d+)/) { |
if (!open($fh,"</etc/sysconfig/language")) { |
if (($1 eq 'sles') && ($2 >= 15)) { |
print &mt('Failed to open: [_1], default locale not checked.', |
if (!open($fh,"</etc/locale.conf")) { |
'/etc/sysconfig/language'); |
print &mt('Failed to open: [_1], default locale not checked.', |
|
'/etc/locale.conf'); |
|
} |
|
} else { |
|
if (!open($fh,"</etc/sysconfig/language")) { |
|
print &mt('Failed to open: [_1], default locale not checked.', |
|
'/etc/sysconfig/language'); |
|
} |
|
$langvar = 'RC_LANG'; |
} |
} |
$langvar = 'RC_LANG'; |
|
} elsif ($distro =~ /^fedora(\d+)/) { |
} elsif ($distro =~ /^fedora(\d+)/) { |
if ($1 >= 18) { |
if ($1 >= 18) { |
if (!open($fh,"</etc/locale.conf")) { |
if (!open($fh,"</etc/locale.conf")) { |
Line 467 sub check_mysql_running {
|
Line 509 sub check_mysql_running {
|
} elsif ($distro =~ /^sles(\d+)/) { |
} elsif ($distro =~ /^sles(\d+)/) { |
if ($1 >= 12) { |
if ($1 >= 12) { |
$use_systemctl = 1; |
$use_systemctl = 1; |
|
$proc_owner = 'mysql'; |
|
$process = 'mysqld'; |
|
} |
|
if ($1 >= 15) { |
|
$mysqldaemon ='mariadb'; |
} |
} |
} elsif ($distro =~ /^suse(\d+)/) { |
} elsif ($distro =~ /^suse(\d+)/) { |
if ($1 >= 13) { |
if ($1 >= 13) { |
Line 551 sub chkconfig {
|
Line 598 sub chkconfig {
|
$uses_systemctl{'ntp'} = 1; |
$uses_systemctl{'ntp'} = 1; |
$uses_systemctl{'cups'} = 1; |
$uses_systemctl{'cups'} = 1; |
$uses_systemctl{'memcached'} = 1; |
$uses_systemctl{'memcached'} = 1; |
$daemon{'ntp'} = 'ntpd'; |
if (($name eq 'sles') && ($num >= 15)) { |
|
$daemon{'ntp'} = 'chronyd'; |
|
$daemon{'mysql'} = 'mariadb'; |
|
} else { |
|
$daemon{'ntp'} = 'ntpd'; |
|
} |
} |
} |
} |
} |
} |
} |
Line 559 sub chkconfig {
|
Line 611 sub chkconfig {
|
my $version = $1; |
my $version = $1; |
@runlevels = qw/2 3 4 5/; |
@runlevels = qw/2 3 4 5/; |
@norunlevels = qw/0 1 6/; |
@norunlevels = qw/0 1 6/; |
$checker_bin = '/usr/sbin/sysv-rc-conf'; |
if (($distro =~ /^ubuntu/) && ($version <= 16)) { |
|
$checker_bin = '/usr/sbin/sysv-rc-conf'; |
|
} else { |
|
$uses_systemctl{'ntp'} = 1; |
|
$uses_systemctl{'mysql'} = 1; |
|
$uses_systemctl{'apache'} = 1; |
|
$uses_systemctl{'memcached'} = 1; |
|
$uses_systemctl{'cups'} = 1; |
|
} |
$daemon{'mysql'} = 'mysql'; |
$daemon{'mysql'} = 'mysql'; |
$daemon{'apache'} = 'apache2'; |
$daemon{'apache'} = 'apache2'; |
$daemon{'ntp'} = 'ntp'; |
$daemon{'ntp'} = 'ntp'; |
Line 673 sub chkconfig {
|
Line 733 sub chkconfig {
|
} else { |
} else { |
$major = $version; |
$major = $version; |
} |
} |
if ($major > 10) { |
if (($major > 10) && ($major <= 13)) { |
if (&check_SuSEfirewall2_setup($instdir)) { |
if (&check_SuSEfirewall2_setup($instdir)) { |
$needfix{'insserv'} = 1; |
$needfix{'insserv'} = 1; |
} |
} |
Line 682 sub chkconfig {
|
Line 742 sub chkconfig {
|
return (\%needfix,\%tostop,\%uses_systemctl); |
return (\%needfix,\%tostop,\%uses_systemctl); |
} |
} |
|
|
|
sub uses_firewalld { |
|
my ($distro) = @_; |
|
my ($inuse, $checkfirewalld); |
|
if ($distro =~ /^(suse|sles)([\d\.]+)$/) { |
|
if (($1 eq 'sles') && ($2 >= 15)) { |
|
$checkfirewalld = 1; |
|
} |
|
} elsif ($distro =~ /^fedora(\d+)$/) { |
|
if ($1 >= 18) { |
|
$checkfirewalld = 1; |
|
} |
|
} elsif ($distro =~ /^(?:centos|rhes|scientific)(\d+)/) { |
|
if ($1 >= 7) { |
|
$checkfirewalld = 1; |
|
} |
|
} |
|
if ($checkfirewalld) { |
|
my ($loaded,$active); |
|
if (open(PIPE,"systemctl status firewalld |")) { |
|
while (<PIPE>) { |
|
chomp(); |
|
if (/^\s*Loaded:\s+(\w+)/) { |
|
$loaded = $1; |
|
} |
|
if (/^\s*Active\s+(\w+)/) { |
|
$active = $1; |
|
} |
|
} |
|
close(PIPE); |
|
} |
|
if (($loaded eq 'loaded') || ($active eq 'active')) { |
|
$inuse = 1; |
|
} |
|
} |
|
return $inuse; |
|
} |
|
|
sub chkfirewall { |
sub chkfirewall { |
my ($distro) = @_; |
my ($distro) = @_; |
my $configfirewall = 1; |
my $configfirewall = 1; |
Line 691 sub chkfirewall {
|
Line 788 sub chkfirewall {
|
); |
); |
my %activefw; |
my %activefw; |
if (&firewall_is_active()) { |
if (&firewall_is_active()) { |
my $iptables = &get_pathto_iptables(); |
if (&uses_firewalld($distro)) { |
if ($iptables eq '') { |
my %current; |
print &mt('Firewall not checked as path to iptables not determined.')."\n"; |
if (open(PIPE,'firewall-cmd --permanent --zone=public --list-services |')) { |
|
my $svc = <PIPE>; |
|
close(PIPE); |
|
chomp($svc); |
|
map { $current{$_} = 1; } (split(/\s+/,$svc)); |
|
} |
|
if ($current{'http'} && $current{'https'}) { |
|
$configfirewall = 0; |
|
} |
} else { |
} else { |
my @fwchains = &get_fw_chains($iptables,$distro); |
my $iptables = &get_pathto_iptables(); |
if (@fwchains) { |
if ($iptables eq '') { |
foreach my $service ('http','https') { |
print &mt('Firewall not checked as path to iptables not determined.')."\n"; |
foreach my $fwchain (@fwchains) { |
} else { |
if (&firewall_is_port_open($iptables,$fwchain,$ports{$service})) { |
my @fwchains = &get_fw_chains($iptables,$distro); |
$activefw{$service} = 1; |
if (@fwchains) { |
last; |
foreach my $service ('http','https') { |
|
foreach my $fwchain (@fwchains) { |
|
if (&firewall_is_port_open($iptables,$fwchain,$ports{$service})) { |
|
$activefw{$service} = 1; |
|
last; |
|
} |
} |
} |
} |
} |
|
if ($activefw{'http'}) { |
|
$configfirewall = 0; |
|
} |
|
} else { |
|
print &mt('Firewall not checked as iptables Chains not identified.')."\n"; |
} |
} |
if ($activefw{'http'}) { |
|
$configfirewall = 0; |
|
} |
|
} else { |
|
print &mt('Firewall not checked as iptables Chains not identified.')."\n"; |
|
} |
} |
} |
} |
} else { |
} else { |
Line 772 sub chkapache {
|
Line 882 sub chkapache {
|
} |
} |
} |
} |
} |
} |
} elsif ($distro =~ /^(?:suse|sles)([\d\.]+)$/) { |
} elsif ($distro =~ /^(suse|sles)([\d\.]+)$/) { |
|
my ($name,$version) = ($1,$2); |
my $apache = 'apache'; |
my $apache = 'apache'; |
if ($1 >= 10) { |
my $conf_file = "$instdir/sles-suse/default-server.conf"; |
|
if ($version >= 10) { |
$apache = 'apache2'; |
$apache = 'apache2'; |
} |
} |
if (!-e "$instdir/sles-suse/default-server.conf") { |
if (($name eq 'sles') && ($version >= 12)) { |
|
$conf_file = "$instdir/sles-suse/apache2.4/default-server.conf"; |
|
} |
|
if (!-e $conf_file) { |
$fixapache = 0; |
$fixapache = 0; |
print &mt('Warning: No LON-CAPA Apache configuration file found for installation check.')."\n"; |
print &mt('Warning: No LON-CAPA Apache configuration file found for installation check.')."\n"; |
} elsif ((-e "/etc/$apache/default-server.conf") && (-e "$instdir/sles-suse/default-server.conf")) { |
} elsif (-e "/etc/$apache/default-server.conf") { |
if (open(PIPE, "diff --brief $instdir/sles-suse/default-server.conf /etc/$apache/default-server.conf |")) { |
if (open(PIPE, "diff --brief $conf_file /etc/$apache/default-server.conf |")) { |
my $diffres = <PIPE>; |
my $diffres = <PIPE>; |
close(PIPE); |
close(PIPE); |
chomp($diffres); |
chomp($diffres); |
Line 1066 sub get_pathto_iptables {
|
Line 1181 sub get_pathto_iptables {
|
|
|
sub firewall_is_active { |
sub firewall_is_active { |
if (-e '/proc/net/ip_tables_names') { |
if (-e '/proc/net/ip_tables_names') { |
return 1; |
if (open(PIPE,'cat /proc/net/ip_tables_names |grep filter |')) { |
} else { |
my $status = <PIPE>; |
return 0; |
close(PIPE); |
|
chomp($status); |
|
if ($status eq 'filter') { |
|
return 1; |
|
} |
|
} |
} |
} |
|
return 0; |
} |
} |
|
|
sub get_fw_chains { |
sub get_fw_chains { |
Line 1085 sub get_fw_chains {
|
Line 1206 sub get_fw_chains {
|
@posschains = ('ufw-user-input','INPUT'); |
@posschains = ('ufw-user-input','INPUT'); |
} elsif ($distro =~ /^debian5/) { |
} elsif ($distro =~ /^debian5/) { |
@posschains = ('INPUT'); |
@posschains = ('INPUT'); |
|
} elsif ($distro =~ /^(suse|sles)(\d+)/) { |
|
@posschains = ('IN_public'); |
} else { |
} else { |
@posschains = ('RH-Firewall-1-INPUT','INPUT'); |
@posschains = ('RH-Firewall-1-INPUT','INPUT'); |
if (!-e '/etc/sysconfig/iptables') { |
if (!-e '/etc/sysconfig/iptables') { |
Line 1447 if ($dbh) {
|
Line 1570 if ($dbh) {
|
|
|
if ($callsub{'apache'}) { |
if ($callsub{'apache'}) { |
if ($distro =~ /^(suse|sles)/) { |
if ($distro =~ /^(suse|sles)/) { |
©_apache2_suseconf($instdir); |
©_apache2_suseconf($instdir,$distro); |
} elsif ($distro =~ /^(debian|ubuntu)/) { |
} elsif ($distro =~ /^(debian|ubuntu)/) { |
©_apache2_debconf($instdir,$distro); |
©_apache2_debconf($instdir,$distro); |
} else { |
} else { |
Line 1475 if ($callsub{'runlevels'}) {
|
Line 1598 if ($callsub{'runlevels'}) {
|
} |
} |
} |
} |
} |
} |
if ($distro =~ /^(suse|sles)/) { |
if ($distro =~ /^(suse|sles)(\d+)/) { |
&update_SuSEfirewall2_setup($instdir); |
unless(($1 eq 'sles') && ($2 >= 15)) { |
|
&update_SuSEfirewall2_setup($instdir); |
|
} |
} |
} |
} else { |
} else { |
&print_and_log(&mt('Skipping setting override for start-up order of services.')."\n"); |
&print_and_log(&mt('Skipping setting override for start-up order of services.')."\n"); |
} |
} |
|
|
if ($callsub{'firewall'}) { |
if ($callsub{'firewall'}) { |
if ($distro =~ /^(suse|sles)/) { |
if (&uses_firewalld($distro)) { |
|
my (%current,%added); |
|
if (open(PIPE,'firewall-cmd --permanent --zone=public --list-services |')) { |
|
my $svc = <PIPE>; |
|
close(PIPE); |
|
chomp($svc); |
|
map { $current{$_} = 1; } (split(/\s+/,$svc)); |
|
} |
|
foreach my $service ('http','https') { |
|
unless ($current{$service}) { |
|
if (open(PIPE,"firewall-cmd --permanent --zone=public --add-service=$service |")) { |
|
my $result = <PIPE>; |
|
if ($result =~ /^success/) { |
|
$added{$service} = 1; |
|
} |
|
} |
|
} |
|
} |
|
if (keys(%added) > 0) { |
|
print &mt('Firewall configured to allow access for: [_1].', |
|
join(', ',sort(keys(%added))))."\n"; |
|
} |
|
if ($current{'http'} || $current{'https'}) { |
|
print &mt('Firewall already configured to allow access for:[_1].', |
|
(($current{'http'})? ' http':'').(($current{'https'})? ' https':''))."\n"; |
|
} |
|
unless ($current{'ssh'}) { |
|
print &mt('If you would the like to allow access to ssh from outside, use the command[_1].', |
|
'firewall-cmd --permanent --zone=public --add-service=ssh')."\n"; |
|
} |
|
} elsif ($distro =~ /^(suse|sles)/) { |
print &mt('Use [_1] to configure the firewall to allow access for [_2].', |
print &mt('Use [_1] to configure the firewall to allow access for [_2].', |
'yast -- Security and Users -> Firewall -> Interfaces', |
'yast -- Security and Users -> Firewall -> Interfaces', |
'ssh, http, https')."\n"; |
'ssh, http, https')."\n"; |
} elsif ($distro =~ /^(debian|ubuntu)(\d+)/) { |
} elsif ($distro =~ /^(debian|ubuntu)(\d+)/) { |
if (($1 eq 'ubuntu') || ($2 > 5)) { |
if (($1 eq 'ubuntu') || ($2 > 5)) { |
print &mt('Use [_1] to configure the firewall to allow access for [_2].', |
print &mt('Use [_1] to configure the firewall to allow access for [_2].', |
Line 1517 if ($callsub{'firewall'}) {
|
Line 1672 if ($callsub{'firewall'}) {
|
} |
} |
|
|
if ($callsub{'stopsrvcs'}) { |
if ($callsub{'stopsrvcs'}) { |
&kill_extra_services($distro,$recommended->{'stopsrvcs'}); |
&kill_extra_services($distro,$recommended->{'stopsrvcs'},$uses_systemctl); |
} else { |
} else { |
&print_and_log(&mt('Skipping stopping unnecessary service ([_1] daemons).',"'cups','memcached'")."\n"); |
&print_and_log(&mt('Skipping stopping unnecessary service ([_1] daemons).',"'cups','memcached'")."\n"); |
} |
} |
Line 1704 END
|
Line 1859 END
|
} |
} |
|
|
sub kill_extra_services { |
sub kill_extra_services { |
my ($distro,$stopsrvcs) = @_; |
my ($distro,$stopsrvcs,$uses_systemctl) = @_; |
if (ref($stopsrvcs) eq 'HASH') { |
if (ref($stopsrvcs) eq 'HASH') { |
my @stopping = sort(keys(%{$stopsrvcs})); |
my @stopping = sort(keys(%{$stopsrvcs})); |
if (@stopping) { |
if (@stopping) { |
Line 1735 sub kill_extra_services {
|
Line 1890 sub kill_extra_services {
|
} |
} |
} |
} |
&print_and_log(&mt('Removing [_1] from startup.',$service)."\n"); |
&print_and_log(&mt('Removing [_1] from startup.',$service)."\n"); |
if ($distro =~ /^(debian|ubuntu)/) { |
if ($distro =~ /^(?:debian|ubuntu)(\d+)/) { |
&print_and_log(`update-rc.d -f $daemon remove`); |
my $version = $1; |
|
if (($distro =~ /^ubuntu/) && ($version > 16)) { |
|
if (ref($uses_systemctl) eq 'HASH') { |
|
if ($uses_systemctl->{$service}) { |
|
if (`systemctl is-enabled $service`) { |
|
&print_and_log(`systemctl disable $service`); |
|
} |
|
} |
|
} |
|
} else { |
|
&print_and_log(`update-rc.d -f $daemon remove`); |
|
} |
} else { |
} else { |
if (ref($uses_systemctl) eq 'HASH') { |
if (ref($uses_systemctl) eq 'HASH') { |
if ($uses_systemctl->{$service}) { |
if ($uses_systemctl->{$service}) { |
Line 1787 CREATE TABLE IF NOT EXISTS metadata (tit
|
Line 1953 CREATE TABLE IF NOT EXISTS metadata (tit
|
sub setup_mysql_permissions { |
sub setup_mysql_permissions { |
my ($dbh,$has_pass,@mysql_lc_commands) = @_; |
my ($dbh,$has_pass,@mysql_lc_commands) = @_; |
my ($mysqlversion,$mysqlsubver,$mysqlname) = &get_mysql_version(); |
my ($mysqlversion,$mysqlsubver,$mysqlname) = &get_mysql_version(); |
my ($usesauth,@mysql_commands); |
my ($usesauth,$is_mariadb,$hasauthcol,@mysql_commands); |
if ($mysqlname =~ /^MariaDB/i) { |
if ($mysqlname =~ /^MariaDB/i) { |
|
$is_mariadb = 1; |
if ($mysqlversion >= 10.2) { |
if ($mysqlversion >= 10.2) { |
$usesauth = 1; |
$usesauth = 1; |
|
} elsif ($mysqlversion >= 5.5) { |
|
$hasauthcol = 1; |
} |
} |
} else { |
} else { |
if (($mysqlversion > 5.7) || (($mysqlversion == 5.7) && ($mysqlsubver > 5))) { |
if (($mysqlversion > 5.7) || (($mysqlversion == 5.7) && ($mysqlsubver > 5))) { |
$usesauth = 1; |
$usesauth = 1; |
|
} elsif (($mysqlversion >= 5.6) || (($mysqlversion == 5.5) && ($mysqlsubver >= 7))) { |
|
$hasauthcol = 1; |
} |
} |
} |
} |
if ($usesauth) { |
if ($usesauth) { |
@mysql_commands = ("INSERT user (Host, User, ssl_cipher, x509_issuer, x509_subject) VALUES('localhost','www','','','')", |
@mysql_commands = ("INSERT user (Host, User, ssl_cipher, x509_issuer, x509_subject, authentication_string) VALUES('localhost','www','','','','')"); |
"ALTER USER 'www'\@'localhost' IDENTIFIED BY 'localhostkey'"); |
if ($is_mariadb) { |
|
push(@mysql_commands,"ALTER USER 'www'\@'localhost' IDENTIFIED BY 'localhostkey'"); |
|
} else { |
|
push(@mysql_commands,"ALTER USER 'www'\@'localhost' IDENTIFIED WITH mysql_native_password BY 'localhostkey'"); |
|
} |
|
} elsif ($hasauthcol) { |
|
@mysql_commands = ("INSERT user (Host, User, Password, ssl_cipher, x509_issuer, x509_subject, authentication_string) VALUES('localhost','www',password('localhostkey'),'','','','');"); |
} else { |
} else { |
@mysql_commands = ("INSERT user (Host, User, Password) VALUES('localhost','www',password('localhostkey'));"); |
@mysql_commands = ("INSERT user (Host, User, Password, ssl_cipher, x509_issuer, x509_subject) VALUES('localhost','www',password('localhostkey'),'','','');"); |
} |
} |
if ($mysqlversion < 4) { |
if ($mysqlversion < 4) { |
push (@mysql_commands," |
push (@mysql_commands," |
Line 1852 INSERT db (Host,Db,User,Select_priv,Inse
|
Line 2029 INSERT db (Host,Db,User,Select_priv,Inse
|
} |
} |
} |
} |
if ($got_passwd) { |
if ($got_passwd) { |
my (@newpass_cmds) = &new_mysql_rootpasswd($newmysqlpass); |
my (@newpass_cmds) = &new_mysql_rootpasswd($newmysqlpass,$usesauth,$is_mariadb); |
push(@mysql_commands,@newpass_cmds); |
push(@mysql_commands,@newpass_cmds); |
} else { |
} else { |
print_and_log(&mt('Failed to get MySQL root password from user input.')."\n"); |
print_and_log(&mt('Failed to get MySQL root password from user input.')."\n"); |
Line 1861 INSERT db (Host,Db,User,Select_priv,Inse
|
Line 2038 INSERT db (Host,Db,User,Select_priv,Inse
|
if (@mysql_commands) { |
if (@mysql_commands) { |
foreach my $cmd (@mysql_commands) { |
foreach my $cmd (@mysql_commands) { |
$dbh->do($cmd) || print $dbh->errstr."\n"; |
$dbh->do($cmd) || print $dbh->errstr."\n"; |
|
|
} |
} |
} |
} |
if (@mysql_lc_commands) { |
if (@mysql_lc_commands) { |
Line 1883 INSERT db (Host,Db,User,Select_priv,Inse
|
Line 2059 INSERT db (Host,Db,User,Select_priv,Inse
|
} |
} |
|
|
sub new_mysql_rootpasswd { |
sub new_mysql_rootpasswd { |
my ($currmysqlpass,$usesauth) = @_; |
my ($currmysqlpass,$usesauth,$is_mariadb) = @_; |
if ($usesauth) { |
if ($usesauth) { |
return ("ALTER USER 'root'\@'localhost' IDENTIFIED BY '$currmysqlpass'", |
if ($is_mariadb) { |
"FLUSH PRIVILEGES;"); |
return ("ALTER USER 'root'\@'localhost' IDENTIFIED BY '$currmysqlpass'", |
|
"FLUSH PRIVILEGES;"); |
|
} else { |
|
return ("ALTER USER 'root'\@'localhost' IDENTIFIED WITH mysql_native_password BY '$currmysqlpass'", |
|
"FLUSH PRIVILEGES;"); |
|
} |
} else { |
} else { |
return ("SET PASSWORD FOR 'root'\@'localhost'=PASSWORD('$currmysqlpass')", |
return ("SET PASSWORD FOR 'root'\@'localhost'=PASSWORD('$currmysqlpass')", |
"FLUSH PRIVILEGES;"); |
"FLUSH PRIVILEGES;"); |
Line 2008 sub copy_apache2_debconf {
|
Line 2189 sub copy_apache2_debconf {
|
########################################################### |
########################################################### |
|
|
sub copy_apache2_suseconf { |
sub copy_apache2_suseconf { |
my ($instdir) = @_; |
my ($instdir,$distro) = @_; |
|
my ($name,$version) = ($distro =~ /^(suse|sles)([\d\.]+)$/); |
|
my $conf_file = "$instdir/sles-suse/default-server.conf"; |
|
if (($name eq 'sles') && ($version >= 12)) { |
|
$conf_file = "$instdir/sles-suse/apache2.4/default-server.conf"; |
|
} |
print_and_log(&mt('Copying the LON-CAPA [_1] to [_2].', |
print_and_log(&mt('Copying the LON-CAPA [_1] to [_2].', |
"'default-server.conf'", |
"'default-server.conf'", |
"'/etc/apache2/default-server.conf'")."\n"); |
"'/etc/apache2/default-server.conf'")."\n"); |
if (!-e "/etc/apache2/default-server.conf.original") { |
if (!-e "/etc/apache2/default-server.conf.original") { |
copy "/etc/apache2/default-server.conf","/etc/apache2/default-server.conf.original"; |
copy "/etc/apache2/default-server.conf","/etc/apache2/default-server.conf.original"; |
} |
} |
copy "$instdir/sles-suse/default-server.conf","/etc/apache2/default-server.conf"; |
copy $conf_file,"/etc/apache2/default-server.conf"; |
chmod(0444,"/etc/apache2/default-server.conf"); |
chmod(0444,"/etc/apache2/default-server.conf"); |
# Make symlink for conf directory (included in loncapa_apache.conf) |
# Make symlink for conf directory (included in loncapa_apache.conf) |
my $can_symlink = (eval { symlink('/etc/apache2','/srv/www/conf'); }, $@ eq ''); |
my $can_symlink = (eval { symlink('/etc/apache2','/srv/www/conf'); }, $@ eq ''); |
Line 2026 sub copy_apache2_suseconf {
|
Line 2212 sub copy_apache2_suseconf {
|
&print_and_log(&mt('Symlink creation failed for [_1] to [_2]. You will need to perform this action from the command line.',"'/srv/www/conf'","'/etc/apache2'")."\n"); |
&print_and_log(&mt('Symlink creation failed for [_1] to [_2]. You will need to perform this action from the command line.',"'/srv/www/conf'","'/etc/apache2'")."\n"); |
} |
} |
©_apache2_conf_files($instdir); |
©_apache2_conf_files($instdir); |
©_sysconfig_apache2_file($instdir); |
©_sysconfig_apache2_file($instdir,$name,$version); |
print_and_log("\n"); |
print_and_log("\n"); |
} |
} |
|
|
Line 2052 sub copy_apache2_conf_files {
|
Line 2238 sub copy_apache2_conf_files {
|
## |
## |
############################################### |
############################################### |
sub copy_sysconfig_apache2_file { |
sub copy_sysconfig_apache2_file { |
my ($instdir) = @_; |
my ($instdir,$name,$version) = @_; |
print_and_log(&mt('Copying the LON-CAPA [_1] to [_2].',"'sysconfig/apache2'","'/etc/sysconfig/apache2'")."\n"); |
print_and_log(&mt('Copying the LON-CAPA [_1] to [_2].',"'sysconfig/apache2'","'/etc/sysconfig/apache2'")."\n"); |
if (!-e "/etc/sysconfig/apache2.original") { |
if (!-e "/etc/sysconfig/apache2.original") { |
copy "/etc/sysconfig/apache2","/etc/sysconfig/apache2.original"; |
copy "/etc/sysconfig/apache2","/etc/sysconfig/apache2.original"; |
} |
} |
copy "$instdir/sles-suse/sysconfig_apache2","/etc/sysconfig/apache2"; |
my $sysconf_file = "$instdir/sles-suse/sysconfig_apache2"; |
|
if (($name eq 'sles') && ($version >= 12)) { |
|
$sysconf_file = "$instdir/sles-suse/apache2.4/sysconfig_apache2"; |
|
} |
|
copy $sysconf_file,"/etc/sysconfig/apache2"; |
chmod(0444,"/etc/sysconfig/apache2"); |
chmod(0444,"/etc/sysconfig/apache2"); |
} |
} |
|
|