index.php 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367
  1. <?php
  2. error_reporting(NULL);
  3. ob_start();
  4. $TAB = 'WEB';
  5. // Main include
  6. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  7. // Check POST request
  8. if (!empty($_POST['ok'])) {
  9. // Check token
  10. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  11. header('location: /login/');
  12. exit();
  13. }
  14. // Check for empty fields
  15. if (empty($_POST['v_domain'])) $errors[] = __('domain');
  16. if (empty($_POST['v_ip'])) $errors[] = __('ip');
  17. if ((!empty($_POST['v_ssl'])) && (empty($_POST['v_ssl_crt']))&& (empty($_POST['v_letsencrypt']))) $errors[] = __('ssl certificate');
  18. if ((!empty($_POST['v_ssl'])) && (empty($_POST['v_ssl_key']))&& (empty($_POST['v_letsencrypt']))) $errors[] = __('ssl key');
  19. if (!empty($errors[0])) {
  20. foreach ($errors as $i => $error) {
  21. if ( $i == 0 ) {
  22. $error_msg = $error;
  23. } else {
  24. $error_msg = $error_msg.", ".$error;
  25. }
  26. }
  27. $_SESSION['error_msg'] = __('Field "%s" can not be blank.',$error_msg);
  28. }
  29. // Check stats password length
  30. if ((!empty($v_stats)) && (empty($_SESSION['error_msg']))) {
  31. if (!empty($_POST['v_stats_user'])) {
  32. $pw_len = strlen($_POST['v_stats_password']);
  33. if ($pw_len < 6 ) $_SESSION['error_msg'] = __('Password is too short.',$error_msg);
  34. }
  35. }
  36. // Set domain to lowercase and remove www prefix
  37. $v_domain = preg_replace("/^www\./i", "", $_POST['v_domain']);
  38. $v_domain = strtolower($v_domain);
  39. // Define domain ip address
  40. $v_ip = escapeshellarg($_POST['v_ip']);
  41. // Using public IP instead of internal IP when creating DNS
  42. // Gets public IP from 'v-list-user-ips' command (that reads /hestia/data/ips/ip), precisely from 'NAT' field
  43. $v_public_ip = $v_ip;
  44. $v_clean_ip = $_POST['v_ip']; // clean_ip = IP without quotas
  45. exec (HESTIA_CMD."v-list-user-ips ".$user." json", $output, $return_var);
  46. $ips = json_decode(implode('', $output), true);
  47. unset($output);
  48. if (isset($ips[$v_clean_ip]) && isset($ips[$v_clean_ip]['NAT']) && trim($ips[$v_clean_ip]['NAT'])!='') {
  49. $v_public_ip = trim($ips[$v_clean_ip]['NAT']);
  50. $v_public_ip = escapeshellarg($v_public_ip);
  51. }
  52. // Define domain aliases
  53. $v_aliases = $_POST['v_aliases'];
  54. $aliases = preg_replace("/\n/", ",", $v_aliases);
  55. $aliases = preg_replace("/\r/", ",", $aliases);
  56. $aliases = preg_replace("/\t/", ",", $aliases);
  57. $aliases = preg_replace("/ /", ",", $aliases);
  58. $aliases_arr = explode(",", $aliases);
  59. $aliases_arr = array_unique($aliases_arr);
  60. $aliases_arr = array_filter($aliases_arr);
  61. $aliases = implode(",",$aliases_arr);
  62. $aliases = escapeshellarg($aliases);
  63. if (empty($_POST['v_aliases'])) $aliases = 'none';
  64. // Define proxy extensions
  65. $v_proxy_ext = $_POST['v_proxy_ext'];
  66. $proxy_ext = preg_replace("/\n/", ",", $v_proxy_ext);
  67. $proxy_ext = preg_replace("/\r/", ",", $proxy_ext);
  68. $proxy_ext = preg_replace("/\t/", ",", $proxy_ext);
  69. $proxy_ext = preg_replace("/ /", ",", $proxy_ext);
  70. $proxy_ext_arr = explode(",", $proxy_ext);
  71. $proxy_ext_arr = array_unique($proxy_ext_arr);
  72. $proxy_ext_arr = array_filter($proxy_ext_arr);
  73. $proxy_ext = implode(",",$proxy_ext_arr);
  74. $proxy_ext = escapeshellarg($proxy_ext);
  75. // Define other options
  76. $v_elog = $_POST['v_elog'];
  77. $v_ssl = $_POST['v_ssl'];
  78. $v_ssl_crt = $_POST['v_ssl_crt'];
  79. $v_ssl_key = $_POST['v_ssl_key'];
  80. $v_ssl_ca = $_POST['v_ssl_ca'];
  81. $v_ssl_home = $data[$v_domain]['SSL_HOME'];
  82. $v_letsencrypt = $_POST['v_letsencrypt'];
  83. $v_stats = escapeshellarg($_POST['v_stats']);
  84. $v_stats_user = $data[$v_domain]['STATS_USER'];
  85. $v_stats_password = $data[$v_domain]['STATS_PASSWORD'];
  86. $v_ftp = $_POST['v_ftp'];
  87. $v_ftp_user = $_POST['v_ftp_user'];
  88. $v_ftp_password = $_POST['v_ftp_password'];
  89. $v_ftp_email = $_POST['v_ftp_email'];
  90. if (!empty($v_domain)) $v_ftp_user_prepath .= $v_domain;
  91. // Set advanced option checkmark
  92. if (!empty($_POST['v_proxy'])) $v_adv = 'yes';
  93. if (!empty($_POST['v_ftp'])) $v_adv = 'yes';
  94. if ($_POST['v_proxy_ext'] != $v_proxy_ext) $v_adv = 'yes';
  95. if ((!empty($_POST['v_aliases'])) && ($_POST['v_aliases'] != 'www.'.$_POST['v_domain'])) $v_adv = 'yes';
  96. if ((!empty($_POST['v_ssl'])) || (!empty($_POST['v_elog']))) $v_adv = 'yes';
  97. if ((!empty($_POST['v_ssl_crt'])) || (!empty($_POST['v_ssl_key']))) $v_adv = 'yes';
  98. if ((!empty($_POST['v_ssl_ca'])) || ($_POST['v_stats'] != 'none')) $v_adv = 'yes';
  99. if ((!empty($_POST['v_letsencrypt']))) $v_adv = 'yes';
  100. // Check advanced features
  101. if (empty($_POST['v_dns'])) $v_dns = 'off';
  102. if (empty($_POST['v_mail'])) $v_mail = 'off';
  103. if (empty($_POST['v_proxy'])) $v_proxy = 'off';
  104. // Add web domain
  105. if (empty($_SESSION['error_msg'])) {
  106. exec (HESTIA_CMD."v-add-web-domain ".$user." ".escapeshellarg($v_domain)." ".$v_ip." 'no' ".$aliases." ".$proxy_ext, $output, $return_var);
  107. check_return_code($return_var,$output);
  108. unset($output);
  109. $domain_added = empty($_SESSION['error_msg']);
  110. }
  111. // Add DNS domain
  112. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  113. exec (HESTIA_CMD."v-add-dns-domain ".$user." ".escapeshellarg($v_domain)." ".$v_public_ip." '' '' '' '' '' '' '' '' 'no'", $output, $return_var);
  114. check_return_code($return_var,$output);
  115. unset($output);
  116. }
  117. // Add DNS for domain aliases
  118. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  119. foreach ($aliases_arr as $alias) {
  120. if ($alias != "www.".$v_domain) {
  121. $alias = escapeshellarg($alias);
  122. exec (HESTIA_CMD."v-add-dns-on-web-alias ".$user." ".$alias." ".$v_ip." 'no'", $output, $return_var);
  123. check_return_code($return_var,$output);
  124. unset($output);
  125. }
  126. }
  127. }
  128. // Add mail domain
  129. if (($_POST['v_mail'] == 'on') && (empty($_SESSION['error_msg']))) {
  130. exec (HESTIA_CMD."v-add-mail-domain ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  131. check_return_code($return_var,$output);
  132. unset($output);
  133. }
  134. // Delete proxy support
  135. if ((!empty($_SESSION['PROXY_SYSTEM'])) && ($_POST['v_proxy'] == 'off') && (empty($_SESSION['error_msg']))) {
  136. $ext = escapeshellarg($ext);
  137. exec (HESTIA_CMD."v-delete-web-domain-proxy ".$user." ".escapeshellarg($v_domain)." 'no'", $output, $return_var);
  138. check_return_code($return_var,$output);
  139. unset($output);
  140. }
  141. // Add Lets Encrypt support
  142. if ((!empty($_POST['v_letsencrypt'])) && (empty($_SESSION['error_msg']))) {
  143. exec (HESTIA_CMD."v-schedule-letsencrypt-domain ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  144. check_return_code($return_var,$output);
  145. unset($output);
  146. } else {
  147. // Add SSL certificates only if Lets Encrypt is off
  148. if ((!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  149. exec ('mktemp -d', $output, $return_var);
  150. $tmpdir = $output[0];
  151. unset($output);
  152. // Save certificate
  153. if (!empty($_POST['v_ssl_crt'])) {
  154. $fp = fopen($tmpdir."/".$_POST['v_domain'].".crt", 'w');
  155. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_crt']));
  156. fwrite($fp, "\n");
  157. fclose($fp);
  158. }
  159. // Save private key
  160. if (!empty($_POST['v_ssl_key'])) {
  161. $fp = fopen($tmpdir."/".$_POST['v_domain'].".key", 'w');
  162. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_key']));
  163. fwrite($fp, "\n");
  164. fclose($fp);
  165. }
  166. // Save CA bundle
  167. if (!empty($_POST['v_ssl_ca'])) {
  168. $fp = fopen($tmpdir."/".$_POST['v_domain'].".ca", 'w');
  169. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_ca']));
  170. fwrite($fp, "\n");
  171. fclose($fp);
  172. }
  173. $v_ssl_home = escapeshellarg($_POST['v_ssl_home']);
  174. exec (HESTIA_CMD."v-add-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." ".$tmpdir." ".$v_ssl_home." 'no'", $output, $return_var);
  175. check_return_code($return_var,$output);
  176. unset($output);
  177. }
  178. }
  179. // Add web stats
  180. if ((!empty($_POST['v_stats'])) && ($_POST['v_stats'] != 'none' ) && (empty($_SESSION['error_msg']))) {
  181. $v_stats = escapeshellarg($_POST['v_stats']);
  182. exec (HESTIA_CMD."v-add-web-domain-stats ".$user." ".escapeshellarg($v_domain)." ".$v_stats, $output, $return_var);
  183. check_return_code($return_var,$output);
  184. unset($output);
  185. }
  186. // Add web stats password
  187. if ((!empty($_POST['v_stats_user'])) && (empty($_SESSION['error_msg']))) {
  188. $v_stats_user = escapeshellarg($_POST['v_stats_user']);
  189. $v_stats_password = tempnam("/tmp","vst");
  190. $fp = fopen($v_stats_password, "w");
  191. fwrite($fp, $_POST['v_stats_password']."\n");
  192. fclose($fp);
  193. exec (HESTIA_CMD."v-add-web-domain-stats-user ".$user." ".escapeshellarg($v_domain)." ".$v_stats_user." ".$v_stats_password, $output, $return_var);
  194. check_return_code($return_var,$output);
  195. unset($output);
  196. unlink($v_stats_password);
  197. $v_stats_password = escapeshellarg($_POST['v_stats_password']);
  198. }
  199. // Restart DNS server
  200. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  201. exec (HESTIA_CMD."v-restart-dns", $output, $return_var);
  202. check_return_code($return_var,$output);
  203. unset($output);
  204. }
  205. // Restart web server
  206. if (empty($_SESSION['error_msg'])) {
  207. exec (HESTIA_CMD."v-restart-web", $output, $return_var);
  208. check_return_code($return_var,$output);
  209. unset($output);
  210. }
  211. // Restart proxy server
  212. if ((!empty($_SESSION['PROXY_SYSTEM'])) && ($_POST['v_proxy'] == 'on') && (empty($_SESSION['error_msg']))) {
  213. exec (HESTIA_CMD."v-restart-proxy", $output, $return_var);
  214. check_return_code($return_var,$output);
  215. unset($output);
  216. }
  217. // Add FTP
  218. if ((!empty($_POST['v_ftp'])) && (empty($_SESSION['error_msg']))) {
  219. $v_ftp_users_updated = array();
  220. foreach ($_POST['v_ftp_user'] as $i => $v_ftp_user_data) {
  221. if ($v_ftp_user_data['is_new'] == 1) {
  222. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (!filter_var($v_ftp_user_data['v_ftp_email'], FILTER_VALIDATE_EMAIL))) $_SESSION['error_msg'] = __('Please enter valid email address.');
  223. if (empty($v_ftp_user_data['v_ftp_user'])) $errors[] = 'ftp user';
  224. if (empty($v_ftp_user_data['v_ftp_password'])) $errors[] = 'ftp user password';
  225. if (!empty($errors[0])) {
  226. foreach ($errors as $i => $error) {
  227. if ( $i == 0 ) {
  228. $error_msg = $error;
  229. } else {
  230. $error_msg = $error_msg.", ".$error;
  231. }
  232. }
  233. $_SESSION['error_msg'] = __('Field "%s" can not be blank.',$error_msg);
  234. }
  235. // Validate email
  236. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (!filter_var($v_ftp_user_data['v_ftp_email'], FILTER_VALIDATE_EMAIL))) {
  237. $_SESSION['error_msg'] = __('Please enter valid email address.');
  238. }
  239. // Check ftp password length
  240. if ((!empty($v_ftp_user_data['v_ftp']))) {
  241. if (!empty($v_ftp_user_data['v_ftp_user'])) {
  242. $pw_len = strlen($v_ftp_user_data['v_ftp_password']);
  243. if ($pw_len < 6 ) $_SESSION['error_msg'] = __('Password is too short.',$error_msg);
  244. }
  245. }
  246. $v_ftp_user_data['v_ftp_user'] = preg_replace("/^".$user."_/i", "", $v_ftp_user_data['v_ftp_user']);
  247. $v_ftp_username = $v_ftp_user_data['v_ftp_user'];
  248. $v_ftp_username_full = $user . '_' . $v_ftp_user_data['v_ftp_user'];
  249. $v_ftp_user = escapeshellarg($v_ftp_user_data['v_ftp_user']);
  250. if ($domain_added) {
  251. $v_ftp_path = escapeshellarg(trim($v_ftp_user_data['v_ftp_path']));
  252. $v_ftp_password = tempnam("/tmp","vst");
  253. $fp = fopen($v_ftp_password, "w");
  254. fwrite($fp, $v_ftp_user_data['v_ftp_password']."\n");
  255. fclose($fp);
  256. exec (HESTIA_CMD."v-add-web-domain-ftp ".$user." ".escapeshellarg($v_domain)." ".$v_ftp_user." ".$v_ftp_password . " " . $v_ftp_path, $output, $return_var);
  257. check_return_code($return_var,$output);
  258. unset($output);
  259. unlink($v_ftp_password);
  260. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (empty($_SESSION['error_msg']))) {
  261. $to = $v_ftp_user_data['v_ftp_email'];
  262. $subject = __("FTP login credentials");
  263. $from = __('MAIL_FROM', $v_domain );
  264. $mailtext = __('FTP_ACCOUNT_READY',$v_domain,$user,$v_ftp_user_data['v_ftp_user'],$v_ftp_user_data['v_ftp_password']);
  265. send_email($to, $subject, $mailtext, $from);
  266. unset($v_ftp_email);
  267. }
  268. } else {
  269. $return_var = -1;
  270. }
  271. if ($return_var == 0) {
  272. $v_ftp_password = "••••••••";
  273. $v_ftp_user_data['is_new'] = 0;
  274. } else {
  275. $v_ftp_user_data['is_new'] = 1;
  276. }
  277. $v_ftp_username = preg_replace("/^".$user."_/", "", $v_ftp_user_data['v_ftp_user']);
  278. $v_ftp_users_updated[] = array(
  279. 'is_new' => $v_ftp_user_data['is_new'],
  280. 'v_ftp_user' => $return_var == 0 ? $v_ftp_username_full : $v_ftp_username,
  281. 'v_ftp_password' => $v_ftp_password,
  282. 'v_ftp_path' => $v_ftp_user_data['v_ftp_path'],
  283. 'v_ftp_email' => $v_ftp_user_data['v_ftp_email'],
  284. 'v_ftp_pre_path' => $v_ftp_user_prepath
  285. );
  286. continue;
  287. }
  288. }
  289. if (!empty($_SESSION['error_msg']) && $domain_added) {
  290. $_SESSION['ok_msg'] = __('WEB_DOMAIN_CREATED_OK',htmlentities($v_domain),htmlentities($v_domain));
  291. $_SESSION['flash_error_msg'] = $_SESSION['error_msg'];
  292. $url = '/edit/web/?domain='.strtolower(preg_replace("/^www\./i", "", $v_domain));
  293. header('Location: ' . $url);
  294. exit;
  295. }
  296. }
  297. // Flush field values on success
  298. if (empty($_SESSION['error_msg'])) {
  299. $_SESSION['ok_msg'] = __('WEB_DOMAIN_CREATED_OK',htmlentities($v_domain),htmlentities($v_domain));
  300. unset($v_domain);
  301. unset($v_aliases);
  302. unset($v_ssl);
  303. unset($v_ssl_crt);
  304. unset($v_ssl_key);
  305. unset($v_ssl_ca);
  306. unset($v_stats_user);
  307. unset($v_stats_password);
  308. unset($v_ftp);
  309. }
  310. }
  311. // Define user variables
  312. $v_ftp_user_prepath = $panel[$user]['HOME'] . "/web";
  313. $v_ftp_email = $panel[$user]['CONTACT'];
  314. // List IP addresses
  315. exec (HESTIA_CMD."v-list-user-ips ".$user." json", $output, $return_var);
  316. $ips = json_decode(implode('', $output), true);
  317. unset($output);
  318. // List web stat engines
  319. exec (HESTIA_CMD."v-list-web-stats json", $output, $return_var);
  320. $stats = json_decode(implode('', $output), true);
  321. unset($output);
  322. // Render page
  323. render_page($user, $TAB, 'add_web');
  324. // Flush session messages
  325. unset($_SESSION['error_msg']);
  326. unset($_SESSION['ok_msg']);