index.php 2.2 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283
  1. <?php
  2. use function Hestiacp\quoteshellarg\quoteshellarg;
  3. ob_start();
  4. $TAB = "USER";
  5. // Main include
  6. include $_SERVER["DOCUMENT_ROOT"] . "/inc/main.php";
  7. // Check POST request
  8. if (!empty($_POST["ok"])) {
  9. // Check token
  10. verify_csrf($_POST);
  11. // Check empty fields
  12. if (empty($_POST["v_key"])) {
  13. $errors[] = _("SSH Key");
  14. }
  15. if (!empty($errors[0])) {
  16. foreach ($errors as $i => $error) {
  17. if ($i == 0) {
  18. $error_msg = $error;
  19. } else {
  20. $error_msg = $error_msg . ", " . $error;
  21. }
  22. }
  23. $_SESSION["error_msg"] = sprintf(_('Field "%s" can not be blank.'), $error_msg);
  24. }
  25. if ($_SESSION["userContext"] === "admin" && !empty($_GET["user"])) {
  26. $user = quoteshellarg($_GET["user"]);
  27. }
  28. if (empty($_SESSION["error_msg"])) {
  29. if ($_POST) {
  30. //key if key already exists
  31. exec(HESTIA_CMD . "v-list-user-ssh-key " . $user . " json", $output, $return_var);
  32. $data = json_decode(implode("", $output), true);
  33. unset($output);
  34. $keylist = [];
  35. $idlist = [];
  36. foreach ($data as $key => $value) {
  37. $idlist[] = trim($data[$key]["ID"]);
  38. $keylist[] = trim($data[$key]["KEY"]);
  39. }
  40. $v_key_parts = explode(" ", $_POST["v_key"]);
  41. $key_id = trim($v_key_parts[2]);
  42. if ($v_key_parts[2] == "") {
  43. $v_key_parts[2] = md5(time());
  44. $_POST["v_key"] .= " " . $v_key_parts[2];
  45. }
  46. //for deleting / revoking key the last part user@domain is used therefore needs to be unique
  47. //maybe consider adding random generated message or even an human read able string set by user?
  48. if (in_array($v_key_parts[2], $idlist)) {
  49. $_SESSION["error_msg"] = _("SSH Key already exists.");
  50. }
  51. if (in_array($v_key_parts[1], $keylist)) {
  52. $_SESSION["error_msg"] = _("SSH Key already exists.");
  53. }
  54. $v_key = quoteshellarg(trim($_POST["v_key"]));
  55. }
  56. }
  57. if (empty($_SESSION["error_msg"])) {
  58. exec(HESTIA_CMD . "v-add-user-ssh-key " . $user . " " . $v_key, $output, $return_var);
  59. check_return_code($return_var, $output);
  60. }
  61. unset($output);
  62. // Flush field values on success
  63. if (empty($_SESSION["error_msg"])) {
  64. $_SESSION["ok_msg"] = _("SSH Key has been created successfully.");
  65. }
  66. }
  67. if (empty($v_key)) {
  68. $v_key = "";
  69. }
  70. render_page($user, $TAB, "add_key");
  71. // Flush session messages
  72. unset($_SESSION["error_msg"]);
  73. unset($_SESSION["ok_msg"]);