Previous | Next Main Index:   Frames | No Frames
Document:   Frames | No Frames
 

Upload WebStore to Your Server

 
Which file to use - ws415CS.tar.gz or ws415CS.zip?
Uploading Files using FTP
Add ASCII Filename Extensions to WS_FTP
Extracting ws415CS.tar.gz
Placement of Perl Scripts (.cgi files)
Directory and File Permissions
Setting Permissions using Telnet
CHMOD Explanation and CHMOD Examples
Setting Permissions using WS_FTP
 
 

 
 
Which file to use?
 
ws415CS.tar.gz
ws415CS.tar.gz was created using GNU tar, preserving file and directory permissions.
 
You must have telnet access to your domain account with the ability to execute UNIX tar commands to extract either of these files on your server.
 
Your server must have GNU tar or an extraction utitlity such as gunzip to extract ws415CS.tar.gz.
 
After downloading ws415CS.tar.gz, transfer the file to your server.
 
 
ws415CS.zip
If you do not have telnet access, download and extract ws415CS.zip on your local PC. Upload the directories and files to your server.
 
 
Index
 
 
Uploading Files using FTP
 
Transfer ws415CS.tar.gz to it's parent directory, usually your domain's root. WebStore's parent directory must be able to output graphics and HTML files to a web browser. The directory accessed with the URL http://www.YourDomain.xxx or any directory under this directory is the correct location to extract ws415CS.tar.gz.
 
ws415CS.tar.gz and ws415CS.zip must be transfered as BINARY files. Examples of other BINARY files are executable programs, word processing documents, image files, and sound files.
 
Image files (file extensions of .gif and .jpg) in the WebStore application must be transferred as BINARY files.
 
All other files in the WebStore application must be transferred as ASCII text files.
 
 
Index
 
 
Add ASCII Filename Extensions to WS_FTP
 
To transfer WebStore ASCII files using WS_FTP's Auto Detect mode, add the following filename extensions to WS_FTP's Auto Detect list:
.age
.bnr
.cart
.cgi
.client
.counter
.cron
.data
.file
.htm
.html
.js
.list
.lock
.pl
.readonly
.setup
.stats
.txt
.users
.usr
WS_FTP will transfer files with the extensions above in ASCII mode when using Auto Detect.
 
 
Index
 
 
Extracting ws415CS.tar.gz
 
You must have telnet access to your domain account to execute tar commands.
 
If your server has GNU TAR, issue the command:
    tar xvzpf ws415CS.tar.gz
ws415CS.tar.gz will extract, creating the /Web_store directory structure. All directory and file permissions are preserved.
 
If your server does not have GNU TAR, issue the command:
    gunzip ws415CS.tar.gz
This will extract and overwrite ws415CS.tar.gz with ws415CS.tar.
 
Issue the command:
    tar xvf ws415CS.tar
ws415CS.tar will extract, creating the /Web_store directory structure. You will have to set directory and file permissions.
 
 
Index
 
 
Placement of Perl Scripts (.cgi files)
 
If your domain has a specific directory configured for perl scripts, such as cgi-bin, place all perl scripts (.cgi files) and ws_global.setup in the cgi-bin directory.
 
If you can execute perl scripts from any directory in your domain, the perl scripts and ws_global.setup may be left in the /Web_store directory or placed in any directory of your choosing.
 
Perl scripts can not be placed in any directory assigned to MS Frontpage.
 
 
Index
 
 
Directory and File Permissions
 
Directories are shown in bold text, files are shown in regular text.
 
Directories and Files      Permissions
Web_store   drwxr-xr-x   755
  ws400CS.cgi   -rwxr-xr-x   755
  ws_banner.cgi   -rwxr-xr-x   755
  ws_delete_files.cgi   -rwxr-xr-x   755
  ws_delete_files.cron   -rw-r--r--   644
  ws_editor.cgi   -rwxr-xr-x   755
  ws_global.setup   -rw-r--r--   644
  ws_mail.cgi   -rwxr-xr-x   755
  Databases   drwxrwxrwx   777
  Access.Client.Password.setup   -rw-r--r--   644
  Access.Client.Phone.setup   -rw-r--r--   644
  Access.Restrict.Password.setup   -rw-r--r--   644
  Access.Restrict.Phone.setup   -rw-r--r--   644
  Client.Retrieve.Password.setup   -rw-r--r--   644
  Client.Retrieve.Phone.setup   -rw-r--r--   644
  Demo.OrderForm.AuthorizeNet.CreditCard.setup   -rw-r--r--   644
  Demo.OrderForm.CreditFaxMail.setup   -rw-r--r--   644
  Demo.OrderForm.Surepay.Check.setup   -rw-r--r--   644
  Demo.OrderForm.Surepay.CreditCard.setup   -rw-r--r--   644
  Form.Catalog.setup   -rw-r--r--   644
  Form.Reseller.setup   -rw-r--r--   644
  No_Frames.setup   -rw-r--r--   644
  OrderForm.AuthorizeNet.Check.setup   -rw-r--r--   644
  OrderForm.AuthorizeNet.CreditCard.setup   -rw-r--r--   644
  OrderForm.Check.setup   -rw-r--r--   644
  OrderForm.CreditCard.setup   -rw-r--r--   644
  OrderForm.CreditFaxMail.setup   -rw-r--r--   644
  OrderForm.FaxMail.setup   -rw-r--r--   644
  OrderForm.Surepay.Check.setup   -rw-r--r--   644
  OrderForm.Surepay.CreditCard.setup   -rw-r--r--   644
  outlet.data   -rw-rw-rw-   666
  outlet.setup   -rw-r--r--   644
  outlet.state_country.setup   -rw-r--r--   644
  outlet_editor.setup   -rw-r--r--   644
  Pre.OrderForm.setup   -rw-r--r--   644
  Resellers.data   -rw-rw-rw-   666
  Resellers.data.readonlyWebStore Generated   -rw-rw-rw-   666
  Resellers.data.txt_editor.setup   -rw-r--r--   644
  Resellers.data_editor.setup   -rw-r--r--   644
  ws_banner.setup   -rw-r--r--   644
  ws_mail.setup   -rw-r--r--   644
  ws_userfile.usersWebStore Generated   -rw-rw-rw-   666
  Clients   drwxrwxrwx   777
  .client filesWebStore Generated   -rw-rw-rw-   666
  Restricted   drwxrwxrwx   777
  .client filesWebStore Generated   -rw-rw-rw-   666
  Mail   drwxrwxrwx   777
  MSG.1998-11-01.08-28-46_PM.FAQ.list   -rw-rw-rw-   666
  WebStore.listWebStore Generated   -rw-rw-rw-   666
  SalesWebStore Generated   drwxrwxrwx   777
  delete.short-term.age.fileWebStore Generated   -rw-rw-rw-   666
  2xxx   (4 digit current year)WebStore Generated   drwxrwxrwx   777
  .acs filesWebStore Generated   -rw-rw-rw-   666
  .txt filesWebStore Generated   -rw-rw-rw-   666
  Docs   drwxr-xr-x   755
  HTML Support Documents   -rw-r--r--   644
  Images   drwxr-xr-x   755
  HTML Support Document Images   -rw-r--r--   644
  Graphics   drwxr-xr-x   755
  WebStore Image Files   -rw-r--r--   644
  Banners   drwxr-xr-x   755
  WS Banner Image Files   -rw-r--r--   644
  Html   drwxr-xr-x   755
  WebStore HTML Files   -rw-r--r--   644
  Library   drwxr-xr-x   755
  WebStore Program Libraries   -rw-r--r--   644
  Real-time Merchant Configuration Files   -rw-r--r--   644
  Logs   drwxrwxrwx   777
  AuthorizeNet.logWebStore Generated   -rw-rw-rw-   666
  Surepay.logWebStore Generated   -rw-rw-rw-   666
  Whois.logWS Mail Generated   -rw-rw-rw-   666
  Pgp   drwxr-xr-x   755
  config.txt   -rw-r--r--   644
  pubring.pgpServer Created   -rw-r--r--   644
  randseed.binServer Created   -rw-r--r--   644
  Statistics   drwxrwxrwx   777
  WebStore_Access.counterWebStore Generated   -rw-rw-rw-   666
  WebStore_Access.statsWebStore Generated   -rw-rw-rw-   666
  WebStore_Query.statsWebStore Generated   -rw-rw-rw-   666
  WSEditor_Access.statsWS Editor Generated   -rw-rw-rw-   666
  WSEditor_Query.statsWS Editor Generated   -rw-rw-rw-   666
  WSMail_Access.statsWS Mail Generated   -rw-rw-rw-   666
  WSMail_Query.statsWS Mail Generated   -rw-rw-rw-   666
  User_carts   drwxrwxrwx   777
  990328065106341.bnrWS Banner Generated   -rw-rw-rw-   666
  990328065106341.cartWebStore Generated   -rw-rw-rw-   666
  cron.age.fileWS Delete Files Generated   -rw-rw-rw-   666
  cron.file.counterWS Delete Files Generated   -rw-rw-rw-   666
  delete.banner.age.fileWS Banner Generated   -rw-rw-rw-   666
  delete.cart.age.fileWebStore Generated   -rw-rw-rw-   666
  Restricted   drwxrwxrwx   777
  990328065106355.cartWebStore Generated   -rw-rw-rw-   666
  Users   drwxrwxrwx   777
  990328065106341.usrWS Editor & WS Mail Generated   -rw-rw-rw-   666
 
 
Index
 
 
Setting Permissions using Telnet
 
REFER TO YOUR SERVER'S MAN PAGE FOR chmod.
Do not assume the instructions below for chmod accurately describes your server's chmod utility.
 
Connect to your domain account using a telnet application and cd to the parent directory of Web_store (if required):
    cd Parent/Directory
If you are not familiar with chmod, refer to CHMOD Explanation and CHMOD Examples.
 
Issue the following commands:
Change directory modes:      chmod 755 Web_store

cd to Web_store Directory:   cd Web_store

Change directory modes:      chmod 777 Databases
                             chmod 777 Statistics
                             chmod 777 User_carts
                             chmod 777 Users

Change file modes:           chmod 644 ws_delete_files.cron
                             chmod 644 ws_global.setup

                             chmod 755 *.cgi
                                  -OR-
                             chmod 755 ws400CS.cgi
                             chmod 755 ws_banner.cgi
                             chmod 755 ws_delete_files.cgi
                             chmod 755 ws_editor.cgi
                             chmod 755 ws_mail.cgi

List Permissions:            ls -l  (optional)
                             Sight-verify modes to make certain
                             they are correct.
After setting permissions for the files and sub-directories under the Web_store directory, cd to each sub-directory and set permissions for the files as listed in the Directory and File Permissions table.
 
 
Index
 
 
CHMOD Explanation
 
REFER TO YOUR SERVER'S MAN PAGE FOR chmod.
Do not assume the information below for chmod accurately describes your server's chmod utility.
chmod [options] xxx files    (change file modes)

    options = -R recursively set file modes (if used)
    xxx     = modes (file permissions)
    files   = filename, filename extension, or directory name
You will be using the chmod commands in the examples below to set file and directory permissions within the Web_store directory structure.
 
 
Index
 
 
CHMOD Examples
 
REFER TO YOUR SERVER'S MAN PAGE FOR chmod.
Do not assume the examples below for chmod accurately depicts your server's chmod utility.
chmod 777 files
    Makes a file readable/writable/executable by everyone.

chmod 755 files
    Makes a file readable/executable by everyone and
    writable by the owner only.

chmod 666 files
    Makes a file readable/writable by everyone.

chmod 644 files
    Makes a file readable by anyone and writable by the
    owner only.

chmod -R 777 files
    Recursively descend through the directory, including
    sub-directories, while setting modes.
    Makes the directory, sub-directories of directory, and
    all files readable/writable/executable by everyone.

chmod 755 *.cgi
    Makes all files with the filename extension .cgi in the
    current directory readable/executable by everyone and
    writable by the owner only.


    Permissions       chmod command
    -----------       -------------

    rwxrwxrwx       chmod 777 files
    rwxr-xr-x       chmod 755 files
    rw-rw-rw-       chmod 666 files
    rw-r--r--       chmod 644 files
 
Index
 
 
Setting Permissions using WS_FTP
 
You must have write permission on the remote server and the server must support the SITE chmod command in order to change file or directory permissions using WS_FTP.
 
Connect to your domain account using WS_FTP and change directories to the Web_store directory (if required).
 
Select (left click) the file or directory in the Remote System window whose modes are to be modified.
 
Pop-up Menu Right click and select chmod (UNIX) from the displayed menu.
 
Check the appropriate Read, Write, and Execute bits for Owner, Group, and Other from the displayed Remote file permissions window and select OK to modify file or directory permissions:
 
chmod 777
chmod 777 file
Makes a file readable/writable/executable by everyone.
 
 
chmod 755
chmod 755 file
Makes a file readable/executable by everyone and writable by the owner only.
 
 
chmod 666
chmod 666 file
Makes a file readable/writable by everyone.
 
 
chmod 644
chmod 644 file
Makes a file readable by anyone and writable by the owner only.
 
 
Top of Page