|
|
@@ -41,8 +41,9 @@ function authenticate_user(){
|
|
|
if(!empty($_SERVER['HTTP_CF_CONNECTING_IP'])){
|
|
|
$v_ip = escapeshellarg($_SERVER['HTTP_CF_CONNECTING_IP']);
|
|
|
}
|
|
|
- }
|
|
|
- // Get user's salt
|
|
|
+ }
|
|
|
+
|
|
|
+ // Get user's salt
|
|
|
$output = '';
|
|
|
exec (HESTIA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
|
|
|
$pam = json_decode(implode('', $output), true);
|
|
|
@@ -89,14 +90,10 @@ function authenticate_user(){
|
|
|
$error = "<a class=\"error\">".__('Invalid username or password')."</a>";
|
|
|
return $error;
|
|
|
} else {
|
|
|
-
|
|
|
- // Make root admin user
|
|
|
- if ($_POST['user'] == 'root') $v_user = 'admin';
|
|
|
-
|
|
|
// Get user speciefic parameters
|
|
|
exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
|
|
|
$data = json_decode(implode('', $output), true);
|
|
|
-
|
|
|
+ unset($output);
|
|
|
// Check if 2FA is active
|
|
|
if ($data[$_POST['user']]['TWOFA'] != '') {
|
|
|
if (empty($_POST['twofa'])){
|
|
|
@@ -113,6 +110,12 @@ function authenticate_user(){
|
|
|
}
|
|
|
}
|
|
|
}
|
|
|
+
|
|
|
+ if ($data[$_POST['user']]['ROLE'] == 'admin'){
|
|
|
+ exec (HESTIA_CMD . "v-list-user admin json", $output, $return_var);
|
|
|
+ $data = json_decode(implode('', $output), true);
|
|
|
+ unset($output);
|
|
|
+ }
|
|
|
// Define session user
|
|
|
$_SESSION['user'] = key($data);
|
|
|
$v_user = $_SESSION['user'];
|