aboutsummaryrefslogtreecommitdiffstats
path: root/packages/freenas/pkg/freenas_system.inc
diff options
context:
space:
mode:
authorDaniel Stefan Haischt <dsh@pfsense.org>2006-08-15 17:06:44 +0000
committerDaniel Stefan Haischt <dsh@pfsense.org>2006-08-15 17:06:44 +0000
commita009bc65e60ebe6e528cc69ca010dd65e3619c80 (patch)
tree6aac101de23c190cc165b6e23072869e892e1c36 /packages/freenas/pkg/freenas_system.inc
parent5f5e1ffc157f3485b2d7ce1bcb6b0b91cac2fe3b (diff)
downloadpfsense-packages-a009bc65e60ebe6e528cc69ca010dd65e3619c80.tar.gz
pfsense-packages-a009bc65e60ebe6e528cc69ca010dd65e3619c80.tar.bz2
pfsense-packages-a009bc65e60ebe6e528cc69ca010dd65e3619c80.zip
added FreeNAS system.inc functions
Diffstat (limited to 'packages/freenas/pkg/freenas_system.inc')
-rw-r--r--packages/freenas/pkg/freenas_system.inc836
1 files changed, 836 insertions, 0 deletions
diff --git a/packages/freenas/pkg/freenas_system.inc b/packages/freenas/pkg/freenas_system.inc
new file mode 100644
index 00000000..89c210e2
--- /dev/null
+++ b/packages/freenas/pkg/freenas_system.inc
@@ -0,0 +1,836 @@
+<?php
+/*
+ guiconfig.inc
+ part of m0n0wall (http://m0n0.ch/wall)
+
+ Copyright (C) 2003-2005 Manuel Kasper <mk@neon1.net>.
+ All rights reserved.
+
+ Modified for FreeNAS (http://freenas.org) by Olivier Cochard <cochard@gmail.com>
+
+ Redistribution and use in source and binary forms, with or without
+ modification, are permitted provided that the following conditions are met:
+
+ 1. Redistributions of source code must retain the above copyright notice,
+ this list of conditions and the following disclaimer.
+
+ 2. Redistributions in binary form must reproduce the above copyright
+ notice, this list of conditions and the following disclaimer in the
+ documentation and/or other materials provided with the distribution.
+
+ THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
+ INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
+ AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
+ AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
+ OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ POSSIBILITY OF SUCH DAMAGE.
+*/
+
+$freenas_config =& $config['installedpackages']['freenas']['config'][0];
+
+function system_do_extensions($early = false) {
+ global $config, $g;
+
+ if (!is_dir("{$g['etc_path']}/inc/ext"))
+ return;
+
+ $dh = @opendir("{$g['etc_path']}/inc/ext");
+ if ($dh) {
+ while (($extd = readdir($dh)) !== false) {
+ if (($extd === ".") || ($extd === ".."))
+ continue;
+ $rcfile = "{$g['etc_path']}/inc/ext/" . $extd . "/" . ($early ? "rc.early" : "rc");
+ if (file_exists($rcfile))
+ passthru($rcfile);
+ }
+ closedir($dh);
+ }
+}
+
+function system_set_termcap()
+{
+ global $config;
+
+ if (isset($config['diag']['ipfstatentries'])) {
+ $lines = $config['diag']['ipfstatentries'] + 6;
+ }
+ else {
+ $lines = 306;
+ }
+
+ $termcap = <<<EOD
+cons25w|ansiw|ansi80x25-raw:\
+ :am:bs:NP:ms:pt:AX:eo:bw:ut:km:\
+ :co#80:li#25:pa#64:Co#8:it#8:\
+ :al=\E[L:cd=\E[J:ce=\E[K:cl=\E[H\E[J:cm=\E[%i%d;%dH:\
+ :dc=\E[P:dl=\E[M:do=\E[B:bt=\E[Z:ho=\E[H:ic=\E[@:cb=\E[1K:\
+ :nd=\E[C:rs=\Ec:so=\E[7m:se=\E[27m:up=\E[A:cr=^M:ta=^I:\
+ :AF=\E[3%dm:AB=\E[4%dm:op=\E[39;49m:sc=\E7:rc=\E8:\
+ :k1=\E[M:k2=\E[N:k3=\E[O:k4=\E[P:k5=\E[Q:k6=\E[R:k7=\E[S:k8=\E[T:\
+ :k9=\E[U:k;=\E[V:F1=\E[W:F2=\E[X:K2=\E[E:nw=\E[E:ec=\E[%dX:\
+ :kb=^H:kh=\E[H:ku=\E[A:kd=\E[B:kl=\E[D:kr=\E[C:le=^H:sf=\E[S:sr=\E[T:\
+ :kN=\E[G:kP=\E[I:@7=\E[F:kI=\E[L:kD=\\177:kB=\E[Z:\
+ :IC=\E[%d@:DC=\E[%dP:SF=\E[%dS:SR=\E[%dT:AL=\E[%dL:DL=\E[%dM:\
+ :DO=\E[%dB:LE=\E[%dD:RI=\E[%dC:UP=\E[%dA:cv=\E[%i%dd:ch=\E[%i%d`:\
+ :mb=\E[5m:md=\E[1m:mr=\E[7m:me=\E[m:bl=^G:\
+ :ve=\E[=S:vi=\E[=1S:vs=\E[=2S:
+cons25|ansis|ansi80x25:\
+ :ac=l\\332m\\300k\\277j\\331u\\264t\\303v\\301w\\302q\\304x\\263n\\305`^Da\\260f\\370g\\361~\\371.^Y-^Xh\\261i^U0\\333y\\363z\\362:\
+ :tc=cons25w:
+dumb|su|unknown:\
+ :am:co#132:li#$lines:do=^J:
+xterm-noapp|xterm with cursor keys in normal mode:\
+ :kl=\E[D:kd=\E[B:kr=\E[C:ku=\E[A:ks=\E=:ke=\E>:ti@:te@:tc=xterm:
+xterm|xterm-color|X11 terminal emulator:\
+ :ti@:te@:tc=xterm-xfree86:
+xterm-xfree86|XFree86 xterm:\
+ :k1=\EOP:k2=\EOQ:k3=\EOR:k4=\EOS:\
+ :k5=\E[15~:k6=\E[17~:k7=\E[18~:k8=\E[19~:\
+ :k9=\E[20~:k;=\E[21~:F1=\E[23~:F2=\E[24~:\
+ :kH=\EOF:@7=\EOF:kI=\E[2~:\
+ :kh=\EOH:*6=\EOF:kP=\E[5~:kN=\E[6~:\
+ :ku=\EOA:kd=\EOB:kr=\EOC:kl=\EOD:Km=\E[M:tc=xterm-basic:
+xterm-basic|xterm common (XFree86):\
+ :li#24:co#80:am:kn#12:km:mi:ms:xn:bl=^G:\
+ :is=\E[!p\E[?3;4l\E[4l\E>:rs=\E[!p\E[?3;4l\E[4l\E>:le=^H:\
+ :AL=\E[%dL:DL=\E[%dM:DC=\E[%dP:al=\E[L:dc=\E[P:dl=\E[M:\
+ :UP=\E[%dA:DO=\E[%dB:LE=\E[%dD:RI=\E[%dC:\
+ :ho=\E[H:cd=\E[J:ce=\E[K:cl=\E[H\E[2J:cm=\E[%i%d;%dH:cs=\E[%i%d;%dr:\
+ :im=\E[4h:ei=\E[4l:ks=\E[?1h\E=:ke=\E[?1l\E>:kD=\E[3~:kb=^H:\
+ :sf=\n:sr=\EM:st=\EH:ct=\E[3g:sc=\E7:rc=\E8:\
+ :eA=\E(B\E)0:as=^N:ae=^O:ml=\El:mu=\Em:up=\E[A:nd=\E[C:\
+ :md=\E[1m:me=\E[m^O:mr=\E[7m:so=\E[7m:se=\E[27m:us=\E[4m:ue=\E[24m:\
+ :ti=\E[?1049h:te=\E[?1049l:vi=\E[?25l:ve=\E[?25h:\
+ :ut:Co#8:pa#64:op=\E[39;49m:AB=\E[4%dm:AF=\E[3%dm:\
+
+EOD;
+
+ if (!file_exists("/usr/share/misc"))
+ mkdir("/usr/share/misc");
+
+ $fd = @fopen("/usr/share/misc/termcap", "w");
+ if (!$fd) {
+ printf("Error: cannot open termcap in system_set_termcap().\n");
+ return 1;
+ }
+ chmod("/usr/share/misc/termcap", 0644);
+ fwrite($fd, $termcap);
+ fclose($fd);
+
+ return 0;
+}
+
+function system_users_create()
+{
+ /* Create All the passwd file */
+ global $config, $g;
+
+ if ($g['booting'])
+ echo "Generating user database... ";
+
+ system_user_masterpasswd();
+ system_user_group();
+ system_user_pwdmkdb();
+
+ if ($g['booting'])
+ echo "done\n";
+
+ return 0;
+
+}
+
+function system_user_masterpasswd()
+{
+ /* Create the master.passwd file*/
+ global $config, $g;
+
+ $masterpasswd = <<<EOD
+root:{$config['system']['password']}:0:0::0:0:Charlie &:/root:/bin/sh
+toor:*:0:0::0:0:Bourne-again Superuser:/root:
+daemon:*:1:1::0:0:Owner of many system processes:/root:/usr/sbin/nologin
+operator:*:2:5::0:0:System &:/:/usr/sbin/nologin
+bin:*:3:7::0:0:Binaries Commands and Source:/:/usr/sbin/nologin
+tty:*:4:65533::0:0:Tty Sandbox:/:/usr/sbin/nologin
+kmem:*:5:65533::0:0:KMem Sandbox:/:/usr/sbin/nologin
+www:*:80:80::0:0:World Wide Web Owner:/nonexistent:/usr/sbin/nologin
+nobody:*:65534:65534::0:0:Unprivileged user:/nonexistent:/usr/sbin/nologin
+ftp:*:21:50::0:0:FTP user:/mnt:/sbin/nologin
+sshd:*:22:22::0:0:Secure Shell Daemon:/var/empty:/usr/sbin/nologin
+
+EOD;
+
+ if (is_array($config['access']['user']))
+ {
+ foreach ($config['access']['user'] as $user)
+ {
+ $password=crypt($user['password']);
+
+ if (isset($user['fullshell']))
+ {
+ $masterpasswd .= <<<EOD
+{$user['login']}:{$password}:{$user['id']}:{$user['usergroupid']}::0:0:{$user['fullname']}:/mnt:/bin/sh
+
+EOD;
+ }
+ else
+ {
+ $masterpasswd .= <<<EOD
+{$user['login']}:{$password}:{$user['id']}:{$user['usergroupid']}::0:0:{$user['fullname']}:/mnt:/usr/local/bin/scponly
+
+EOD;
+ }
+ }
+
+ }
+
+ $fd = fopen("{$g['varetc_path']}/master.passwd", "w");
+ if (!$fd)
+ {
+ printf("Error: cannot open master.passwd in system_user_masterpasswd().\n");
+ return 1;
+ }
+
+
+ fwrite($fd, $masterpasswd);
+ fclose($fd);
+
+ return 0;
+}
+
+function system_user_group()
+{
+ /* Create the group file*/
+ global $config, $g;
+
+ $groupfile = <<<EOD
+wheel:*:0:root
+EOD;
+
+ /* If user exist with full shell, put them on the wheel group */
+ if (is_array($config['access']['user']))
+ {
+ foreach ($config['access']['user'] as $user)
+ {
+ if (isset($user['fullshell']))
+ {
+ $groupfile .= <<<EOD
+,{$user['login']}
+EOD;
+ }
+ }
+ }
+
+ $groupfile .= <<<EOD
+
+daemon:*:1:
+kmem:*:2:
+sys:*:3:
+tty:*:4:
+operator:*:5:root
+bin:*:7:
+staff:*:20:
+sshd:*:22:
+guest:*:31:
+ftp:*:50:
+_pflogd:*:64:
+_dhcp:*:65:
+network:*:69:
+www:*:80:
+nogroup:*:65533:
+nobody:*:65534:
+admin:*:1000:
+
+EOD;
+ if (is_array($config['access']['group']))
+ {
+ foreach ($config['access']['group'] as $group)
+ {
+ $groupfile .= <<<EOD
+{$group['name']}:*:{$group['id']}:
+
+EOD;
+
+ }
+ }
+
+ $fd = fopen("{$g['varetc_path']}/group", "w");
+ if (!$fd)
+ {
+ printf("Error: cannot open group in system_user_group().\n");
+ return 1;
+ }
+
+
+ fwrite($fd, $groupfile);
+ fclose($fd);
+
+ return 0;
+
+}
+
+function system_user_pwdmkdb()
+{
+ /* Generate the db of password */
+ global $config, $g;
+
+ mwexec("/usr/sbin/pwd_mkdb -p -d {$g['varetc_path']} {$g['varetc_path']}/master.passwd");
+
+ return 0;
+
+}
+
+function system_user_samba()
+{
+ /* Generate the db of password */
+ global $config, $g;
+
+ if (is_array($config['access']['user']))
+ {
+
+ foreach ($config['access']['user'] as $user)
+ {
+ $password = escapeshellcmd($user['password']);
+ $login = escapeshellcmd($user['login']);
+ mwexec("(/bin/echo {$password}; /bin/echo {$password}) | /usr/local/bin/smbpasswd -s -a {$login}");
+ //mwexec("(/bin/echo {$password}; /bin/echo {$password}) | /usr/local/bin/pdbedit -tau {$login}");
+ }
+ }
+
+ return 0;
+
+}
+
+function system_pam_configure()
+{
+ /* Create the pam configuration files*/
+ global $config, $g;
+
+ if (!file_exists("{$g['varetc_path']}/pam.d"))
+ mkdir("{$g['varetc_path']}/pam.d", 0744);
+
+ $system = <<<EOD
+ # System-wide defaults
+# auth
+auth sufficient pam_opie.so no_warn no_fake_prompts
+auth requisite pam_opieaccess.so no_warn allow_local
+
+EOD;
+
+ if (isset($config['ad']['enable']))
+ {
+ $system .= <<<EOD
+#auth sufficient /usr/local/lib/pam_winbind.so debug try_first_pass
+
+EOD;
+ }
+
+ $system .= <<<EOD
+auth required pam_unix.so no_warn try_first_pass nullok
+
+# account
+
+EOD;
+
+ if (isset($config['ad']['enable']))
+ {
+ $system .= <<<EOD
+#account sufficient /usr/local/lib/pam_winbind.so
+
+EOD;
+ }
+
+ $system .= <<<EOD
+account required pam_login_access.so
+account required pam_unix.so
+
+# session
+session required pam_lastlog.so no_fail
+
+# password
+
+EOD;
+
+ if (isset($config['ad']['enable']))
+ {
+ $system .= <<<EOD
+#password sufficient /usr/local/lib/pam_winbind.so debug try_first_pass
+
+EOD;
+ }
+
+ $system .= <<<EOD
+password required pam_unix.so no_warn try_first_pass
+
+EOD;
+
+
+ $fd = fopen("{$g['varetc_path']}/pam.d/system", "w");
+ if (!$fd)
+ {
+ printf("Error: cannot open /pam.d/system in system_pam_configure().\n");
+ return 1;
+ }
+
+ fwrite($fd, $system);
+ fclose($fd);
+
+ $sshd .= <<<EOD
+# PAM configuration for the "sshd" service
+
+# auth
+auth required pam_nologin.so no_warn
+auth sufficient pam_opie.so no_warn no_fake_prompts
+auth requisite pam_opieaccess.so no_warn allow_local
+
+EOD;
+
+ if (isset($config['ad']['enable']))
+ {
+ $sshd .= <<<EOD
+auth sufficient /usr/local/lib/pam_winbind.so debug try_first_pass
+
+EOD;
+ }
+
+ $sshd .= <<<EOD
+auth required pam_unix.so no_warn try_first_pass
+
+# account
+
+EOD;
+
+ if (isset($config['ad']['enable']))
+ {
+ $sshd .= <<<EOD
+account sufficient /usr/local/lib/pam_winbind.so
+
+EOD;
+ }
+
+ $sshd .= <<<EOD
+account required pam_unix.so
+
+# session
+session required pam_permit.so
+
+# password
+
+EOD;
+
+if (isset($config['ad']['enable']))
+ {
+ $sshd .= <<<EOD
+password sufficient /usr/local/lib/pam_winbind.so debug try_first_pass
+
+EOD;
+ }
+
+
+$sshd .= <<<EOD
+password required pam_unix.so no_warn try_first_pass
+
+EOD;
+
+ unset($fd);
+ $fd = fopen("{$g['varetc_path']}/pam.d/sshd", "w");
+ if (!$fd)
+ {
+ printf("Error: cannot open /pam.d/sshd in system_pam_configure().\n");
+ return 1;
+ }
+
+ fwrite($fd, $sshd);
+ fclose($fd);
+
+ $ftp = <<<EOD
+# PAM configuration for the "ftpd" service
+
+# auth
+auth required pam_nologin.so no_warn
+auth sufficient pam_opie.so no_warn no_fake_prompts
+auth requisite pam_opieaccess.so no_warn allow_local
+
+EOD;
+
+ if (isset($config['ad']['enable']))
+ {
+ $ftp .= <<<EOD
+auth sufficient /usr/local/lib/pam_winbind.so debug try_first_pass
+
+EOD;
+ }
+
+ $ftp .= <<<EOD
+auth required pam_unix.so no_warn try_first_pass
+
+# account
+
+EOD;
+
+if (isset($config['ad']['enable']))
+ {
+ $ftp .= <<<EOD
+account sufficient /usr/local/lib/pam_winbind.so
+
+EOD;
+ }
+
+ $ftp .= <<<EOD
+account required pam_login_access.so
+account required pam_unix.so
+
+# session
+session required pam_permit.so
+
+EOD;
+
+ unset($fd);
+
+ $fd = fopen("{$g['varetc_path']}/pam.d/ftp", "w");
+ if (!$fd)
+ {
+ printf("Error: cannot open /pam.d/ftp in system_pam_configure().\n");
+ return 1;
+ }
+
+ fwrite($fd, $ftp);
+ fclose($fd);
+
+
+ $login = <<<EOD
+# PAM configuration for the "login" service
+#
+
+# auth
+auth required pam_nologin.so no_warn
+
+EOD;
+
+ if (isset($config['ad']['enable']))
+ {
+ $login .= <<<EOD
+auth sufficient /usr/local/lib/pam_winbind.so debug try_first_pass
+
+EOD;
+ }
+
+ $login .= <<<EOD
+auth sufficient pam_self.so no_warn
+auth include system
+
+# account
+
+EOD;
+
+if (isset($config['ad']['enable']))
+ {
+ $login .= <<<EOD
+account sufficient /usr/local/lib/pam_winbind.so
+
+EOD;
+ }
+
+ $login .= <<<EOD
+account requisite pam_securetty.so
+account include system
+
+# session
+session include system
+
+# password
+password include system
+
+EOD;
+
+ unset($fd);
+
+ $fd = fopen("{$g['varetc_path']}/pam.d/login", "w");
+ if (!$fd)
+ {
+ printf("Error: cannot open /pam.d/login in system_pam_configure().\n");
+ return 1;
+ }
+
+ fwrite($fd, $login);
+ fclose($fd);
+
+ unset($fd);
+
+ /* Create the nsswitch.conf file*/
+
+
+ if (isset($config['ad']['enable']))
+ {
+ $nsswitch = <<<EOD
+group: files winbind
+group_compat: nis
+hosts: files dns wins
+networks: files
+passwd: files winbind
+passwd_compat: nis
+shells: files
+
+EOD;
+
+ }
+ else
+ {
+ $nsswitch = <<<EOD
+group: compat
+group_compat: nis
+hosts: files dns
+networks: files
+passwd: compat
+passwd_compat: nis
+shells: files
+
+EOD;
+ }
+
+
+ $fd = fopen("{$g['varetc_path']}/nsswitch.conf", "w");
+ if (!$fd)
+ {
+ printf("Error: cannot open /var/etc/nsswitch.conf in system_pam_configure().\n");
+ return 1;
+ }
+
+ fwrite($fd, $nsswitch);
+ fclose($fd);
+
+ unset($fd);
+
+ return 0;
+
+}
+
+function system_tuning()
+{
+ /* fine tune kernel value */
+ global $config, $g;
+
+ if (isset($config['system']['tune'])) {
+
+ if ($g['booting'])
+ echo 'Tuning the system... ';
+
+ mwexec('/sbin/sysctl net.inet.tcp.delayed_ack=0');
+ mwexec('/sbin/sysctl net.inet.tcp.sendspace=65536');
+ mwexec('/sbin/sysctl net.inet.tcp.recvspace=65536');
+ mwexec('/sbin/sysctl net.inet.udp.recvspace=65536');
+ mwexec('/sbin/sysctl net.inet.udp.maxdgram=57344');
+ mwexec('/sbin/sysctl net.local.stream.recvspace=65535');
+ mwexec('/sbin/sysctl net.local.stream.sendspace=65535');
+ mwexec('/sbin/sysctl kern.ipc.maxsockbuf=2097152');
+ mwexec('/sbin/sysctl kern.ipc.somaxconn=8192');
+ /* mwexec('/sbin/sysctl kern.ipc.maxsockets=16424'); */
+ mwexec('/sbin/sysctl kern.ipc.nmbclusters=60000');
+ mwexec('/sbin/sysctl kern.maxfiles=65536');
+ mwexec('/sbin/sysctl kern.maxfilesperproc=32768');
+ mwexec('/sbin/sysctl net.inet.tcp.inflight.enable=0');
+
+ if ($g['booting'])
+ echo "done\n";
+ return 0;
+
+ }
+ else {
+ // Set the default value (if previously changed) if not booting mode
+ if (!$g['booting']) {
+ mwexec('/sbin/sysctl net.inet.tcp.delayed_ack=1');
+ mwexec('/sbin/sysctl net.inet.tcp.sendspace=32768');
+ mwexec('/sbin/sysctl net.inet.tcp.recvspace=65536');
+ mwexec('/sbin/sysctl net.inet.udp.recvspace=42080');
+ mwexec('/sbin/sysctl net.inet.udp.maxdgram=9216');
+ mwexec('/sbin/sysctl net.local.stream.recvspace=8192');
+ mwexec('/sbin/sysctl net.local.stream.sendspace=8192');
+ mwexec('/sbin/sysctl kern.ipc.maxsockbuf=262144');
+ mwexec('/sbin/sysctl kern.ipc.somaxconn=128');
+ /* mwexec('/sbin/sysctl kern.ipc.maxsockets=16424'); */
+ mwexec('/sbin/sysctl kern.ipc.nmbclusters=3072');
+ mwexec('/sbin/sysctl kern.maxfiles=1064');
+ mwexec('/sbin/sysctl kern.maxfilesperproc=957');
+ }
+
+ return 0;
+ }
+
+}
+
+function system_install_mount_cd($cdrom)
+{
+ /* Part of install process: Mount the CDROM */
+
+ global $config, $g;
+
+ /* Creating tempo directory for cdrom*/
+ echo "Creating Mount point for the CDROM:\n";
+ if (mwexec("/bin/mkdir /mnt/cdrom_fr_0507"))
+ return 1;
+
+ /* Monting the CDROM */
+ echo "Mount CDROM:\n";
+ if (mwexec("/sbin/mount_cd9660 /dev/$cdrom /mnt/cdrom_fr_0507"))
+ return 1;
+
+ return 0;
+}
+
+function system_install_init_fulldisk($harddrive)
+{
+
+ /* Part of install process: Initialize the destination disk with one partition */
+
+ global $config, $g;
+
+ echo "Erasing partitions:\n";
+ if (mwexec("/bin/dd if=/dev/zero of=/dev/$harddrive bs=1k count=20"))
+ return 1;
+
+ echo "Creating the primary partition and install simple MBR:\n";
+ if (mwexec("/sbin/fdisk -BI -b /boot/mbr $harddrive"))
+ return 1;
+
+ /* Must wait that the /dev is upatded with the new information */
+ echo "Waiting for system update..";
+ $devtotest="/dev/$harddrive". "s1";
+ $i=0;
+
+ while (!file_exists($devtotest)) {
+ sleep(1);
+ echo ".";
+ $i++;
+ if ($i==20)
+ return 1;
+ }
+ echo "\n";
+
+ echo "Erasing primary partition:\n";
+ if (mwexec("/bin/dd if=/dev/zero of=/dev/" . escapeshellarg($harddrive) . "s1 bs=32k count=16"))
+ return 1;
+
+ echo "Creating FreeBSD partition:\n";
+ if (mwexec("/sbin/bsdlabel -B -w -b /boot/boot " . escapeshellarg($harddrive) ."s1 auto"))
+ return 1;
+
+ echo "Setting BSDlabel:\n";
+
+ disks_bsdlabel($harddrive,"s1","4.2BSD");
+
+ echo "Creating UFS filesystem:\n";
+ if (mwexec("/sbin/newfs -U /dev/" . escapeshellarg($harddrive) . "s1"))
+ return 1;
+
+ return 0;
+}
+
+
+function system_install_init_halfdisk($harddrive)
+{
+ /* Part of install process: Initialize the destination disk with 2 partitions */
+
+ global $config, $g;
+
+ /* Create the partitions */
+ fdisk_hd_install($harddrive);
+
+ if (mwexec("(/bin/echo y; /bin/echo y) | /sbin/fdisk -B -b /boot/mbr $harddrive"))
+ return 0;
+
+ /* Must wait that the /dev is upatded with the new information */
+
+ echo "Waiting for system update..";
+
+ $devtotest="/dev/$harddrive". "s2";
+ $i=0;
+ while (!file_exists($devtotest))
+ {
+ sleep(1);
+ echo ".";
+ $i++;
+ if ($i==20)
+ return 1;
+ }
+ echo "\n";
+
+ echo "Creating BSD Label:\n";
+ if (mwexec("/sbin/bsdlabel -B -w -b /boot/boot " . escapeshellarg($harddrive) ."s1 auto"))
+ return 1;
+ if (mwexec("/sbin/bsdlabel -w " . escapeshellarg($harddrive) ."s2 auto"))
+ return 1;
+
+ echo "Modify BSD Label information:\n";
+
+ disks_bsdlabel($harddrive,"s1","4.2BSD");
+ disks_bsdlabel($harddrive,"s2","4.2BSD");
+
+ echo "Creating filesystem:\n";
+ if (mwexec("/sbin/newfs -U /dev/" . escapeshellarg($harddrive) . "s1"))
+ return 1;
+ if (mwexec("/sbin/newfs -U /dev/" . escapeshellarg($harddrive) . "s2"))
+ return 1;
+
+ return 0;
+
+}
+
+function system_install_mount_destdisk($harddrive)
+{
+
+ /* Part of install process: Mount the destination disk */
+
+ global $config, $g;
+
+ echo "Creation tempory mouting point:\n";
+ if (mwexec("/bin/mkdir /mnt/install_fr_0507"))
+ return 1;
+
+ echo "Mount destination disk:\n";
+ if (mwexec("/sbin/mount /dev/" . escapeshellarg($harddrive) . "s1 /mnt/install_fr_0507"))
+ return 1;
+
+ return 0;
+
+}
+
+
+function system_install_unmount()
+{
+
+ /* Part of install process: Unmounting the disk */
+
+ global $config, $g;
+
+ /* Unmounting disk */
+ if (mwexec("/sbin/umount /mnt/install_fr_0507"))
+ return 1;
+ if (mwexec("/sbin/umount /mnt/cdrom_fr_0507"))
+ return 1;
+ if (mwexec("/bin/rm -rf /mnt/cdrom_fr_0507"))
+ return 1;
+ if (mwexec("/bin/rm -rf /mnt/install_fr_0507"))
+ return 1;
+
+ return 0;
+}
+
+function system_install_installation($harddrive)
+{
+ /* Part of install process: dd image file on the destination disk */
+
+ global $config, $g;
+
+ echo "Installation:\n";
+
+ if (mwexec("/usr/bin/gunzip -S \"\" -c /mnt/cdrom_fr_0507/FreeNAS-generic-pc.gz | dd of=/dev/" . escapeshellarg($harddrive) . " bs=16k > /dev/null 2>&1"))
+ return 1;
+
+ return 0;
+
+}
+
+?> \ No newline at end of file