version 1.4, 2011/03/21 13:32:44
|
version 1.6, 2011/03/28 13:27:56
|
Line 305 sub check_prerequisites {
|
Line 305 sub check_prerequisites {
|
return $gotprereqs; |
return $gotprereqs; |
} |
} |
|
|
|
sub check_locale { |
|
my ($distro) = @_; |
|
my ($fh,$command); |
|
if ($distro =~ /^(ubuntu|debian)/) { |
|
if (!open($fh,"</etc/default/locale")) { |
|
print &mt('Failed to open: [_1], default locale not checked.', |
|
'/etc/default/locale'); |
|
} |
|
} else { |
|
if (!open($fh,"</etc/sysconfig/i18n")) { |
|
print &mt('Failed to open: [_1], default locale not checked.', |
|
'/etc/sysconfig/i18n'); |
|
} |
|
} |
|
my @data = <$fh>; |
|
chomp(@data); |
|
foreach my $item (@data) { |
|
if ($item =~ /^LANG=\"([^\"]*)\"/) { |
|
my $default = $1; |
|
if ($default ne 'en_US.UTF-8') { |
|
if ($distro =~ /^debian/) { |
|
$command = 'dpkg-reconfigure locales'; |
|
} elsif ($distro =~ /^ubuntu/) { |
|
$command = 'sudo set-language-env -E'; |
|
} else { |
|
$command = 'system-config-language'; |
|
} |
|
} |
|
last; |
|
} |
|
} |
|
close($fh); |
|
return $command; |
|
} |
|
|
sub check_required { |
sub check_required { |
my ($instdir,$dsn) = @_; |
my ($instdir,$dsn) = @_; |
my ($distro,$packagecmd,$updatecmd,$installnow) = &get_distro(); |
my ($distro,$packagecmd,$updatecmd,$installnow) = &get_distro(); |
Line 313 sub check_required {
|
Line 348 sub check_required {
|
} |
} |
my $gotprereqs = &check_prerequisites($packagecmd,$distro); |
my $gotprereqs = &check_prerequisites($packagecmd,$distro); |
if ($gotprereqs eq '') { |
if ($gotprereqs eq '') { |
return ($distro,$gotprereqs,$packagecmd,$updatecmd,$installnow); |
return ($distro,$gotprereqs); |
|
} |
|
my $localecmd = &check_locale($distro); |
|
unless ($localecmd eq '') { |
|
return ($distro,$gotprereqs,$localecmd); |
} |
} |
my ($mysqlon,$mysqlsetup,$dbh,$has_pass,$has_lcdb,%recommended,$downloadstatus, |
my ($mysqlon,$mysqlsetup,$dbh,$has_pass,$has_lcdb,%recommended,$downloadstatus, |
$filetouse,$production,$testing); |
$filetouse,$production,$testing,$apachefw,$tostop); |
my $wwwuid = &uid_of_www(); |
my $wwwuid = &uid_of_www(); |
my $wwwgid = getgrnam('www'); |
my $wwwgid = getgrnam('www'); |
if (($wwwuid eq '') || ($wwwgid eq '')) { |
if (($wwwuid eq '') || ($wwwgid eq '')) { |
Line 344 sub check_required {
|
Line 383 sub check_required {
|
$recommended{'mysql'} = 1; |
$recommended{'mysql'} = 1; |
} |
} |
} |
} |
my $tostop; |
($recommended{'firewall'},$apachefw) = &chkfirewall($distro); |
$recommended{'firewall'} = &chkfirewall($distro); |
|
($recommended{'runlevels'},$tostop) = &chkconfig($distro); |
($recommended{'runlevels'},$tostop) = &chkconfig($distro); |
$recommended{'apache'} = &chkapache($distro,$instdir); |
$recommended{'apache'} = &chkapache($distro,$instdir); |
$recommended{'stopsrvcs'} = &chksrvcs($distro,$tostop); |
$recommended{'stopsrvcs'} = &chksrvcs($distro,$tostop); |
($recommended{'download'},$downloadstatus,$filetouse,$production,$testing) |
($recommended{'download'},$downloadstatus,$filetouse,$production,$testing) |
= &need_download(); |
= &need_download(); |
return ($distro,$gotprereqs,$packagecmd,$updatecmd,$installnow, |
return ($distro,$gotprereqs,$localecmd,$packagecmd,$updatecmd,$installnow, |
\%recommended,$dbh,$has_pass,$has_lcdb,$downloadstatus, |
\%recommended,$dbh,$has_pass,$has_lcdb,$downloadstatus, |
$filetouse,$production,$testing); |
$filetouse,$production,$testing,$apachefw); |
} |
} |
|
|
sub check_mysql_running { |
sub check_mysql_running { |
Line 362 sub check_mysql_running {
|
Line 400 sub check_mysql_running {
|
if ($distro =~ /^(suse|sles|debian|ubuntu)/) { |
if ($distro =~ /^(suse|sles|debian|ubuntu)/) { |
$mysqldaemon = 'mysql'; |
$mysqldaemon = 'mysql'; |
} |
} |
if (open(PIPE,"ps -ef |grep mysqld_safe |grep -v grep 2>&1 |")) { |
my $process = 'mysqld_safe'; |
|
my $proc_owner = 'root'; |
|
if ($distro =~ /^ubuntu(\w+)/) { |
|
if ($1 >= 10) { |
|
$process = 'mysqld'; |
|
$proc_owner = 'mysql'; |
|
} |
|
} |
|
if (open(PIPE,"ps -ef |grep $process |grep -v grep 2>&1 |")) { |
my $status = <PIPE>; |
my $status = <PIPE>; |
close(PIPE); |
close(PIPE); |
chomp($status); |
chomp($status); |
if ($status =~ /^root\s+\d+\s+/) { |
if ($status =~ /^\Q$proc_owner\E\s+\d+\s+/) { |
print_and_log(&mt('MySQL is running.')."\n"); |
print_and_log(&mt('MySQL is running.')."\n"); |
return 1; |
return 1; |
} else { |
} else { |
Line 397 sub chkconfig {
|
Line 443 sub chkconfig {
|
my ($distro) = @_; |
my ($distro) = @_; |
my (%needfix,%tostop); |
my (%needfix,%tostop); |
my $checker_bin = '/sbin/chkconfig'; |
my $checker_bin = '/sbin/chkconfig'; |
my $mysqldaemon ='mysqld'; |
my %daemon = ( |
my $webserver = 'httpd'; |
mysql => 'mysqld', |
my $cupsdaemon = 'cups'; |
apache => 'httpd', |
|
cups => 'cups', |
|
ntp => 'ntpd', |
|
memcached => 'memcached', |
|
); |
my @runlevels = qw/3 4 5/; |
my @runlevels = qw/3 4 5/; |
my @norunlevels = qw/0 1 6/; |
my @norunlevels = qw/0 1 6/; |
if ($distro =~ /^(suse|sles)/) { |
if ($distro =~ /^(suse|sles)/) { |
@runlevels = qw/3 5/; |
@runlevels = qw/3 5/; |
@norunlevels = qw/0 2 1 6/; |
@norunlevels = qw/0 2 1 6/; |
$mysqldaemon = 'mysql'; |
$daemon{'mysql'} = 'mysql'; |
$webserver = 'apache2'; |
$daemon{'apache'} = 'apache2'; |
if ($distro =~ /^(suse|sles)9/) { |
if ($distro =~ /^(suse|sles)9/) { |
$webserver = 'apache'; |
$daemon{'apache'} = 'apache'; |
} |
} |
} elsif ($distro =~ /^(debian|ubuntu)/) { |
} elsif ($distro =~ /^(?:debian|ubuntu)(\d+)/) { |
|
my $version = $1; |
@runlevels = qw/2 3 4 5/; |
@runlevels = qw/2 3 4 5/; |
@norunlevels = qw/0 1 6/; |
@norunlevels = qw/0 1 6/; |
$checker_bin = '/usr/sbin/sysv-rc-conf'; |
$checker_bin = '/usr/sbin/sysv-rc-conf'; |
$mysqldaemon = 'mysql'; |
$daemon{'mysql'} = 'mysql'; |
$webserver = 'apache2'; |
$daemon{'apache'} = 'apache2'; |
|
$daemon{'ntp'} = 'ntp'; |
|
if (($distro =~ /^ubuntu/) && ($version <= 8)) { |
|
$daemon{'cups'} = 'cupsys'; |
|
} |
} |
} |
if (! -x $checker_bin) { |
if (! -x $checker_bin) { |
print &mt('Could not check runlevel status for MySQL or Apache.')."\n"; |
print &mt('Could not check runlevel status for MySQL or Apache')."\n"; |
return; |
return; |
} |
} |
my $rlstr = join('',@runlevels); |
my $rlstr = join('',@runlevels); |
my $nrlstr = join('',@norunlevels); |
my $nrlstr = join('',@norunlevels); |
foreach my $type ('apache','mysql','cups') { |
foreach my $type ('apache','mysql','ntp','cups','memcached') { |
my $service; |
my $service = $daemon{$type}; |
if ($type eq 'apache') { |
|
$service = $webserver; |
|
} elsif ($type eq 'mysql') { |
|
$service = $mysqldaemon; |
|
} elsif ($type eq 'cups') { |
|
$service = $cupsdaemon; |
|
} |
|
my $command = $checker_bin.' --list '.$service; |
my $command = $checker_bin.' --list '.$service; |
|
if ($type eq 'cups') { |
|
if ($distro =~ /^(?:debian|ubuntu)(\d+)/) { |
|
my $version = $1; |
|
if (($distro =~ /^ubuntu/) && ($version <= 8)) { |
|
$command = $checker_bin.' --list cupsys'; |
|
} |
|
} |
|
} |
my $results = `$command`; |
my $results = `$command`; |
my $tofix; |
my $tofix; |
if ($results eq '') { |
if ($results eq '') { |
if (($type eq 'apache') || ($type eq 'mysql')) { |
if (($type eq 'apache') || ($type eq 'mysql') || ($type eq 'ntp')) { |
if ($distro =~ /^(debian|ubuntu)/) { |
if ($distro =~ /^(debian|ubuntu)/) { |
$tofix = "$checker_bin --level $nrlstr $service off\n"; |
$tofix = "update-rc.d $type defaults"; |
} else { |
} else { |
$tofix = "$checker_bin --add $service\n"; |
$tofix = "$checker_bin --add $service\n"; |
} |
} |
Line 448 sub chkconfig {
|
Line 504 sub chkconfig {
|
for (my $rl=0; $rl<=6; $rl++) { |
for (my $rl=0; $rl<=6; $rl++) { |
if ($results =~ /$rl:on/) { $curr_runlevels{$rl}++; } |
if ($results =~ /$rl:on/) { $curr_runlevels{$rl}++; } |
} |
} |
if (($type eq 'apache') || ($type eq 'mysql')) { |
if (($type eq 'apache') || ($type eq 'mysql') || ($type eq 'ntp')) { |
my $warning; |
my $warning; |
foreach my $rl (@runlevels) { |
foreach my $rl (@runlevels) { |
if (!exists($curr_runlevels{$rl})) { |
if (!exists($curr_runlevels{$rl})) { |
Line 464 sub chkconfig {
|
Line 520 sub chkconfig {
|
} |
} |
if ($tofix) { |
if ($tofix) { |
$needfix{$type} = $tofix; |
$needfix{$type} = $tofix; |
} |
} |
} |
} |
if ($distro =~ /^(suse|sles)([\d\.]+)$/) { |
if ($distro =~ /^(suse|sles)([\d\.]+)$/) { |
my $name = $1; |
my $name = $1; |
Line 483 sub chkconfig {
|
Line 539 sub chkconfig {
|
} |
} |
|
|
sub chkfirewall { |
sub chkfirewall { |
|
my ($distro) = @_; |
my $configfirewall = 1; |
my $configfirewall = 1; |
my %ports = ( |
my %ports = ( |
http => 80, |
http => 80, |
https => 443, |
https => 443, |
); |
); |
|
my %activefw; |
if (&firewall_is_active()) { |
if (&firewall_is_active()) { |
my $iptables = &get_pathto_iptables(); |
my $iptables = &get_pathto_iptables(); |
if ($iptables eq '') { |
if ($iptables eq '') { |
print &mt('Firewall not checked as path to iptables not determined.')."\n"; |
print &mt('Firewall not checked as path to iptables not determined.')."\n"; |
} else { |
} else { |
my @fwchains = &get_fw_chains($iptables); |
my @fwchains = &get_fw_chains($iptables,$distro); |
if (@fwchains) { |
if (@fwchains) { |
my %activefw; |
|
foreach my $service ('http','https') { |
foreach my $service ('http','https') { |
foreach my $fwchain (@fwchains) { |
foreach my $fwchain (@fwchains) { |
if (&firewall_is_port_open($iptables,$fwchain,$ports{$service})) { |
if (&firewall_is_port_open($iptables,$fwchain,$ports{$service})) { |
Line 514 sub chkfirewall {
|
Line 571 sub chkfirewall {
|
} else { |
} else { |
print &mt('Firewall not enabled.')."\n"; |
print &mt('Firewall not enabled.')."\n"; |
} |
} |
return $configfirewall; |
return ($configfirewall,\%activefw); |
} |
} |
|
|
sub chkapache { |
sub chkapache { |
Line 534 sub chkapache {
|
Line 591 sub chkapache {
|
} |
} |
} |
} |
} |
} |
|
if (!$fixapache) { |
|
foreach my $module ('headers.load','expires.load') { |
|
unless (-l "/etc/apache2/mods-enabled/$module") { |
|
$fixapache = 1; |
|
} |
|
} |
|
} |
} elsif ($distro =~ /^(?:suse|sles)([\d\.]+)$/) { |
} elsif ($distro =~ /^(?:suse|sles)([\d\.]+)$/) { |
my $apache = 'apache'; |
my $apache = 'apache'; |
if ($1 >= 10) { |
if ($1 >= 10) { |
Line 561 sub chkapache {
|
Line 625 sub chkapache {
|
my $diffres = <PIPE>; |
my $diffres = <PIPE>; |
close(PIPE); |
close(PIPE); |
chomp($diffres); |
chomp($diffres); |
print "Diff is ||$diffres||\n"; |
|
unless ($diffres) { |
unless ($diffres) { |
$fixapache = 0; |
$fixapache = 0; |
} |
} |
Line 577 sub chksrvcs {
|
Line 640 sub chksrvcs {
|
if (ref($tostop) eq 'HASH') { |
if (ref($tostop) eq 'HASH') { |
%stopsrvcs = %{$tostop}; |
%stopsrvcs = %{$tostop}; |
} |
} |
foreach my $service ('cups') { |
foreach my $service ('cups','memcached') { |
next if (exists($stopsrvcs{$service})); |
next if (exists($stopsrvcs{$service})); |
my $daemon = $service; |
my $daemon = $service; |
if ($service eq 'cups') { |
if ($service eq 'cups') { |
Line 774 sub firewall_is_active {
|
Line 837 sub firewall_is_active {
|
} |
} |
|
|
sub get_fw_chains { |
sub get_fw_chains { |
my ($iptables) = @_; |
my ($iptables,$distro) = @_; |
my @fw_chains; |
my @fw_chains; |
my $suse_config = "/etc/sysconfig/SuSEfirewall2"; |
my $suse_config = "/etc/sysconfig/SuSEfirewall2"; |
my $ubuntu_config = "/etc/ufw/ufw.conf"; |
my $ubuntu_config = "/etc/ufw/ufw.conf"; |
Line 784 sub get_fw_chains {
|
Line 847 sub get_fw_chains {
|
my @posschains; |
my @posschains; |
if (-e $ubuntu_config) { |
if (-e $ubuntu_config) { |
@posschains = ('ufw-user-input','INPUT'); |
@posschains = ('ufw-user-input','INPUT'); |
|
} elsif ($distro =~ /^debian5/) { |
|
@posschains = ('INPUT'); |
} else { |
} else { |
@posschains = ('RH-Firewall-1-INPUT','INPUT'); |
@posschains = ('RH-Firewall-1-INPUT','INPUT'); |
if (!-e '/etc/sysconfig/iptables') { |
if (!-e '/etc/sysconfig/iptables') { |
Line 976 my %prompts = &texthash(
|
Line 1041 my %prompts = &texthash(
|
print "\n".&mt('Checking system status ...')."\n"; |
print "\n".&mt('Checking system status ...')."\n"; |
|
|
my $dsn = "DBI:mysql:database=mysql"; |
my $dsn = "DBI:mysql:database=mysql"; |
my ($distro,$gotprereqs,$packagecmd,$updatecmd,$installnow,$recommended, |
my ($distro,$gotprereqs,$localecmd,$packagecmd,$updatecmd,$installnow,$recommended, |
$dbh,$has_pass,$has_lcdb,$downloadstatus,$filetouse,$production, |
$dbh,$has_pass,$has_lcdb,$downloadstatus,$filetouse,$production, |
$testing) = &check_required($instdir,$dsn); |
$testing,$apachefw) = &check_required($instdir,$dsn); |
if ($distro eq '') { |
if ($distro eq '') { |
print "\n".&mt('Linux distribution could not be verified as a supported distribution.')."\n". |
print "\n".&mt('Linux distribution could not be verified as a supported distribution.')."\n". |
&mt('The following are supported: [_1].', |
&mt('The following are supported: [_1].', |
Line 987 if ($distro eq '') {
|
Line 1052 if ($distro eq '') {
|
&mt('Stopping execution.')."\n"; |
&mt('Stopping execution.')."\n"; |
exit; |
exit; |
} |
} |
|
if ($localecmd ne '') { |
|
print "\n".&mt('Although the LON-CAPA application itself is localized for a number of different languages, the default locale language for the Linux OS on which it runs should be US English.')."\n"; |
|
print "\n".&mt('Run the following command from the command line to set the default language for your OS, and then run this LON-CAPA installation set-up script again.')."\n\n". |
|
$localecmd."\n\n". |
|
&mt('Stopping execution.')."\n"; |
|
exit; |
|
} |
if (!$gotprereqs) { |
if (!$gotprereqs) { |
print "\n".&mt('The LONCAPA-prequisites package is not installed.')."\n". |
print "\n".&mt('The LONCAPA-prequisites package is not installed.')."\n". |
&mt('The following command can be used to install the package (and dependencies):')."\n\n". |
&mt('The following command can be used to install the package (and dependencies):')."\n\n". |
Line 1006 if (!$gotprereqs) {
|
Line 1078 if (!$gotprereqs) {
|
&mt('Stopping execution.')."\n"; |
&mt('Stopping execution.')."\n"; |
exit; |
exit; |
} else { |
} else { |
($distro,$gotprereqs,$packagecmd,$updatecmd,$installnow, |
($distro,$gotprereqs,$localecmd,$packagecmd,$updatecmd,$installnow, |
$recommended,$dbh,$has_pass,$has_lcdb,$downloadstatus, |
$recommended,$dbh,$has_pass,$has_lcdb,$downloadstatus, |
$filetouse) = &check_required($instdir,$dsn); |
$filetouse,$production,$testing,$apachefw) = |
|
&check_required($instdir,$dsn); |
} |
} |
} else { |
} else { |
print &mt('Failed to run command to install LONCAPA-prequisites')."\n"; |
print &mt('Failed to run command to install LONCAPA-prequisites')."\n"; |
Line 1166 if ($callsub{'runlevels'}) {
|
Line 1239 if ($callsub{'runlevels'}) {
|
|
|
if ($callsub{'firewall'}) { |
if ($callsub{'firewall'}) { |
if ($distro =~ /^(suse|sles)/) { |
if ($distro =~ /^(suse|sles)/) { |
print &mt('Use [_1].','yast')."\n"; |
print &mt('Use [_1] to configure the firewall to allow access for [_2].', |
} elsif ($distro =~ /^(debian|ubuntu)/) { |
'yast -- Security and Users -> Firewall -> Interfaces', |
print &mt('Use [_1].','ufw')."\n"; |
'ssh, http, https')."\n"; |
|
} elsif ($distro =~ /^(debian|ubuntu)(\d+)/) { |
|
if (($1 eq 'ubuntu') || ($2 > 5)) { |
|
print &mt('Use [_1] to configure the firewall to allow access for [_2].', |
|
'ufw','ssh, http, https')."\n"; |
|
} else { |
|
my $fwadded = &get_iptables_rules($distro,$instdir,$apachefw); |
|
if ($fwadded) { |
|
print &mt('Enable firewall? ~[Y/n~]'); |
|
my $enable_iptables = &get_user_selection(1); |
|
if ($enable_iptables) { |
|
system('/etc/network/if-pre-up.d/iptables'); |
|
print &mt('Firewall enabled using rules defined in [_1].', |
|
'/etc/iptables.loncapa.rules'); |
|
} |
|
} |
|
} |
} else { |
} else { |
print &mt('Use [_1].','setup')."\n"; |
print &mt('Use [_1] to configure the firewall to allow access for [_2].', |
|
'setup -- Firewall confiuration -> Customize', |
|
'ssh, http, https')."\n"; |
} |
} |
} else { |
} else { |
if ($distro =~ /^(suse|sles)/) { |
&print_and_log(&mt('Skipping Firewall configuration.')."\n"); |
&print_and_log(&mt('Skipping Firewall configuration.')."\n"); |
|
} |
|
} |
} |
|
|
if ($callsub{'stopsrvcs'}) { |
if ($callsub{'stopsrvcs'}) { |
&kill_extra_services($distro,$recommended->{'stopsrvcs'}); |
&kill_extra_services($distro,$recommended->{'stopsrvcs'}); |
} else { |
} else { |
&print_and_log(&mt('Skipping stopping unnecessary services ([_1] and [_2] daemons).',"'cups'","'sendmail'")."\n"); |
&print_and_log(&mt('Skipping stopping unnecessary service ([_1] daemon).',"'cups'")."\n"); |
} |
} |
|
|
my ($have_tarball,$updateshown); |
my ($have_tarball,$updateshown); |
Line 1345 END
|
Line 1434 END
|
# Install patched pwauth |
# Install patched pwauth |
print_and_log(&mt('Copying pwauth to [_1]',' /usr/local/sbin')."\n"); |
print_and_log(&mt('Copying pwauth to [_1]',' /usr/local/sbin')."\n"); |
if (copy "$dir/pwauth","/usr/local/sbin/pwauth") { |
if (copy "$dir/pwauth","/usr/local/sbin/pwauth") { |
if (chmod (06755, "/usr/local/sbin/pwauth")) { |
if (chmod(06755, "/usr/local/sbin/pwauth")) { |
print_and_log(&mt('[_1] copied successfully',"'pwauth'"). |
print_and_log(&mt('[_1] copied successfully',"'pwauth'"). |
"\n"); |
"\n"); |
} else { |
} else { |
Line 1370 sub kill_extra_services {
|
Line 1459 sub kill_extra_services {
|
if (ref($stopsrvcs) eq 'HASH') { |
if (ref($stopsrvcs) eq 'HASH') { |
my @stopping = sort(keys(%{$stopsrvcs})); |
my @stopping = sort(keys(%{$stopsrvcs})); |
if (@stopping) { |
if (@stopping) { |
my $kill_list = join("',' ",@stopping); |
my $kill_list = join("', '",@stopping); |
if ($kill_list) { |
if ($kill_list) { |
$kill_list = "'".$kill_list."'"; |
$kill_list = "'".$kill_list."'"; |
&print_and_log("\n".&mt('Killing unneccessary services ([_1] daemon(s)).',$kill_list)."\n"); |
&print_and_log("\n".&mt('Killing unnecessary services ([_1] daemon(s)).',$kill_list)."\n"); |
foreach my $daemon (@stopping) { |
foreach my $service (@stopping) { |
my $service = $daemon; |
my $daemon = $service; |
&print_and_log(`/etc/init.d/$service stop`); |
if ($service eq 'cups') { |
&print_and_log(&mt('Removing [_1] from startup.',$service)."\n"); |
$daemon = 'cupsd'; |
if ($daemon eq 'cupsd') { |
if ($distro =~ /^(?:debian|ubuntu)(\d+)/) { |
$service = 'cups'; |
my $version = $1; |
|
if (($distro =~ /^ubuntu/) && ($version <= 8)) { |
|
$daemon = 'cupsys'; |
|
} |
|
} |
} |
} |
|
&print_and_log(`/etc/init.d/$daemon stop`); |
|
&print_and_log(&mt('Removing [_1] from startup.',$service)."\n"); |
if ($distro =~ /^(debian|ubuntu)/) { |
if ($distro =~ /^(debian|ubuntu)/) { |
&print_and_log(`/usr/sbin/sysv-rc-conf $service off`); |
&print_and_log(`update-rc.d -f $daemon remove`); |
} else { |
} else { |
&print_and_log(`chkconfig --del $service`); |
&print_and_log(`chkconfig --del $service`); |
} |
} |
Line 1536 sub copy_httpd_conf {
|
Line 1631 sub copy_httpd_conf {
|
"'/etc/httpd/conf/httpd.conf'")."\n"); |
"'/etc/httpd/conf/httpd.conf'")."\n"); |
copy "/etc/httpd/conf/httpd.conf","/etc/httpd/conf/httpd.conf.original"; |
copy "/etc/httpd/conf/httpd.conf","/etc/httpd/conf/httpd.conf.original"; |
copy "$instdir/httpd.conf","/etc/httpd/conf/httpd.conf"; |
copy "$instdir/httpd.conf","/etc/httpd/conf/httpd.conf"; |
chmod 0444,"/etc/httpd/conf/httpd.conf"; |
chmod(0444,"/etc/httpd/conf/httpd.conf"); |
print_and_log("\n"); |
print_and_log("\n"); |
} |
} |
|
|
Line 1550 sub copy_httpd_conf {
|
Line 1645 sub copy_httpd_conf {
|
sub copy_apache2_debconf { |
sub copy_apache2_debconf { |
my ($instdir) = @_; |
my ($instdir) = @_; |
print_and_log(&mt('Copying loncapa [_1] config file to [_2] and pointing [_3] to it from sites-enabled.',"'apache2'","'/etc/apache2/sites-available'","'000-default symlink'")."\n"); |
print_and_log(&mt('Copying loncapa [_1] config file to [_2] and pointing [_3] to it from sites-enabled.',"'apache2'","'/etc/apache2/sites-available'","'000-default symlink'")."\n"); |
my $apache2_enabled_dir = '/etc/apache2/sites-enabled'; |
my $apache2_sites_enabled_dir = '/etc/apache2/sites-enabled'; |
my $apache2_available_dir = '/etc/apache2/sites-available'; |
my $apache2_sites_available_dir = '/etc/apache2/sites-available'; |
if (-l "$apache2_enabled_dir/000-default") { |
if (-l "$apache2_sites_enabled_dir/000-default") { |
unlink("$apache2_enabled_dir/000-default"); |
unlink("$apache2_sites_enabled_dir/000-default"); |
} |
} |
if (-e "$apache2_available_dir/loncapa") { |
if (-e "$apache2_sites_available_dir/loncapa") { |
copy("$apache2_available_dir/loncapa","$apache2_available_dir/loncapa.original"); |
copy("$apache2_sites_available_dir/loncapa","$apache2_sites_available_dir/loncapa.original"); |
} |
} |
copy("$instdir/apache2.conf","$apache2_available_dir/loncapa"); |
copy("$instdir/apache2.conf","$apache2_sites_available_dir/loncapa"); |
chmod(0444,"$apache2_available_dir/loncapa"); |
chmod(0444,"$apache2_sites_available_dir/loncapa"); |
symlink("$apache2_available_dir/loncapa","$apache2_enabled_dir/000-default"); |
symlink("$apache2_sites_available_dir/loncapa","$apache2_sites_enabled_dir/000-default"); |
|
my $apache2_mods_enabled_dir = '/etc/apache2/mods-enabled'; |
|
my $apache2_mods_available_dir = '/etc/apache2/mods-available'; |
|
foreach my $module ('headers.load','expires.load') { |
|
unless (-l "$apache2_mods_enabled_dir/$module") { |
|
symlink("$apache2_mods_available_dir/$module","$apache2_mods_enabled_dir/$module"); |
|
print_and_log(&mt('Enabling "[_1]" Apache module.',$module)."\n"); |
|
} |
|
} |
print_and_log("\n"); |
print_and_log("\n"); |
} |
} |
|
|
Line 1581 sub copy_apache2_suseconf {
|
Line 1684 sub copy_apache2_suseconf {
|
copy "/etc/apache2/default-server.conf","/etc/apache2/default-server.conf.original"; |
copy "/etc/apache2/default-server.conf","/etc/apache2/default-server.conf.original"; |
} |
} |
copy "$instdir/default-server.conf","/etc/apache2/default-server.conf"; |
copy "$instdir/default-server.conf","/etc/apache2/default-server.conf"; |
chmod 0444,"/etc/apache2/default-server.conf"; |
chmod(0444,"/etc/apache2/default-server.conf"); |
# Make symlink for conf directory (included in loncapa_apache.conf) |
# Make symlink for conf directory (included in loncapa_apache.conf) |
my $can_symlink = (eval { symlink('/etc/apache2','/srv/www/conf'); }, $@ eq ''); |
my $can_symlink = (eval { symlink('/etc/apache2','/srv/www/conf'); }, $@ eq ''); |
if ($can_symlink) { |
if ($can_symlink) { |
Line 1608 sub copy_apache2_conf_files {
|
Line 1711 sub copy_apache2_conf_files {
|
copy "/etc/apache2/uid.conf","/etc/apache2/uid.conf.original"; |
copy "/etc/apache2/uid.conf","/etc/apache2/uid.conf.original"; |
} |
} |
copy "$instdir/uid.conf","/etc/apache2/uid.conf"; |
copy "$instdir/uid.conf","/etc/apache2/uid.conf"; |
chmod 0444,"/etc/apache2/uid.conf"; |
chmod(0444,"/etc/apache2/uid.conf"); |
} |
} |
|
|
############################################### |
############################################### |
Line 1623 sub copy_sysconfig_apache2_file {
|
Line 1726 sub copy_sysconfig_apache2_file {
|
copy "/etc/sysconfig/apache2","/etc/sysconfig/apache2.original"; |
copy "/etc/sysconfig/apache2","/etc/sysconfig/apache2.original"; |
} |
} |
copy "$instdir/sysconfig_apache2","/etc/sysconfig/apache2"; |
copy "$instdir/sysconfig_apache2","/etc/sysconfig/apache2"; |
chmod 0444,"/etc/sysconfig/apache2"; |
chmod(0444,"/etc/sysconfig/apache2"); |
} |
} |
|
|
############################################### |
############################################### |
Line 1646 sub update_SuSEfirewall2_setup {
|
Line 1749 sub update_SuSEfirewall2_setup {
|
copy "/etc/insserv/overrides/SuSEfirewall2_setup","/etc/insserv/overrides/SuSEfirewall2_setup.original" |
copy "/etc/insserv/overrides/SuSEfirewall2_setup","/etc/insserv/overrides/SuSEfirewall2_setup.original" |
} |
} |
copy "$instdir/SuSEfirewall2_setup","/etc/insserv/overrides/SuSEfirewall2_setup"; |
copy "$instdir/SuSEfirewall2_setup","/etc/insserv/overrides/SuSEfirewall2_setup"; |
chmod 0444,"/etc/insserv/overrides/SuSEfirewall2_setup"; |
chmod(0444,"/etc/insserv/overrides/SuSEfirewall2_setup"); |
|
} |
|
|
|
sub get_iptables_rules { |
|
my ($distro,$instdir,$apachefw) = @_; |
|
my (@fwchains,@ports); |
|
if (&firewall_is_active()) { |
|
my $iptables = &get_pathto_iptables(); |
|
if ($iptables ne '') { |
|
@fwchains = &get_fw_chains($iptables,$distro); |
|
} |
|
} |
|
if (ref($apachefw) eq 'HASH') { |
|
foreach my $service ('http','https') { |
|
unless ($apachefw->{$service}) { |
|
push (@ports,$service); |
|
} |
|
} |
|
} else { |
|
@ports = ('http','https'); |
|
} |
|
if (@ports == 0) { |
|
return; |
|
} |
|
my $ask_to_enable; |
|
if (-e "/etc/iptables.loncapa.rules") { |
|
if (open(PIPE, "diff --brief $instdir/debian/iptables.loncapa.rules /etc/iptables.loncapa.rules |")) { |
|
my $diffres = <PIPE>; |
|
close(PIPE); |
|
chomp($diffres); |
|
if ($diffres) { |
|
print &mt('Warning: [_1] exists but differs from LON-CAPA supplied file.','/etc/iptables.loncapa.rules')."\n"; |
|
} |
|
} else { |
|
print &mt('Error: unable to open [_1] to compare contents with LON-CAPA supplied file.','/etc/iptables.loncapa.rules')."\n"; |
|
} |
|
} else { |
|
if (-e "$instdir/debian/iptables.loncapa.rules") { |
|
copy "$instdir/debian/iptables.loncapa.rules","/etc/iptables.loncapa.rules"; |
|
chmod(0600,"/etc/iptables.loncapa.rules"); |
|
} |
|
} |
|
if (-e "/etc/iptables.loncapa.rules") { |
|
if (-e "/etc/network/if-pre-up.d/iptables") { |
|
if (open(PIPE, "diff --brief $instdir/debian/iptables /etc/network/if-pre-up/iptables |")) { |
|
my $diffres = <PIPE>; |
|
close(PIPE); |
|
chomp($diffres); |
|
if ($diffres) { |
|
print &mt('Warning: [_1] exists but differs from LON-CAPA supplied file.','/etc/network/if-pre-up.d/iptables')."\n"; |
|
} |
|
} else { |
|
print &mt('Error: unable to open [_1] to compare contents with LON-CAPA supplied file.','/etc/network/if-pre-up.d/iptables')."\n"; |
|
} |
|
} else { |
|
copy "$instdir/debian/iptables","/etc/network/if-pre-up.d/iptables"; |
|
chmod(0755,"/etc/network/if-pre-up.d/iptables"); |
|
print_and_log(&mt('Installed script "[_1]" to add iptables rules to block all ports except 22, 80, and 443 when network is enabled during boot.','/etc/network/if-pre-up.d/iptables')); |
|
$ask_to_enable = 1; |
|
} |
|
} |
|
return $ask_to_enable; |
} |
} |
|
|
sub download_loncapa { |
sub download_loncapa { |