index.php 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403
  1. <?php
  2. error_reporting(NULL);
  3. ob_start();
  4. $TAB = 'WEB';
  5. // Main include
  6. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  7. // Check POST request
  8. if (!empty($_POST['ok'])) {
  9. // Check token
  10. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  11. header('location: /login/');
  12. exit();
  13. }
  14. // Check for empty fields
  15. if (empty($_POST['v_domain'])) $errors[] = _('domain');
  16. if (empty($_POST['v_ip'])) $errors[] = _('ip');
  17. if ((!empty($_POST['v_ssl'])) && (empty($_POST['v_ssl_crt']))&& (empty($_POST['v_letsencrypt']))) $errors[] = _('ssl certificate');
  18. if ((!empty($_POST['v_ssl'])) && (empty($_POST['v_ssl_key']))&& (empty($_POST['v_letsencrypt']))) $errors[] = _('ssl key');
  19. if (!empty($errors[0])) {
  20. foreach ($errors as $i => $error) {
  21. if ( $i == 0 ) {
  22. $error_msg = $error;
  23. } else {
  24. $error_msg = $error_msg.", ".$error;
  25. }
  26. }
  27. $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'),$error_msg);
  28. }
  29. // Check stats password length
  30. if ((!empty($v_stats)) && (empty($_SESSION['error_msg']))) {
  31. if (!empty($_POST['v_stats_user'])) {
  32. $pw_len = strlen($_POST['v_stats_password']);
  33. if ($pw_len < 6 ) $_SESSION['error_msg'] = _('Password is too short.',$error_msg);
  34. }
  35. }
  36. // Set domain to lowercase and remove www prefix
  37. $v_domain = preg_replace("/^www\./i", "", $_POST['v_domain']);
  38. $v_domain = strtolower($v_domain);
  39. // Define domain ip address
  40. $v_ip = escapeshellarg($_POST['v_ip']);
  41. // Using public IP instead of internal IP when creating DNS
  42. // Gets public IP from 'v-list-user-ips' command (that reads /hestia/data/ips/ip), precisely from 'NAT' field
  43. $v_public_ip = $v_ip;
  44. $v_clean_ip = $_POST['v_ip']; // clean_ip = IP without quotas
  45. exec (HESTIA_CMD."v-list-user-ips ".$user." json", $output, $return_var);
  46. $ips = json_decode(implode('', $output), true);
  47. unset($output);
  48. if (isset($ips[$v_clean_ip]) && isset($ips[$v_clean_ip]['NAT']) && trim($ips[$v_clean_ip]['NAT'])!='') {
  49. $v_public_ip = trim($ips[$v_clean_ip]['NAT']);
  50. $v_public_ip = escapeshellarg($v_public_ip);
  51. }
  52. // Define domain aliases
  53. $v_aliases = $_POST['v_aliases'];
  54. $aliases = preg_replace("/\n/", ",", $v_aliases);
  55. $aliases = preg_replace("/\r/", ",", $aliases);
  56. $aliases = preg_replace("/\t/", ",", $aliases);
  57. $aliases = preg_replace("/ /", ",", $aliases);
  58. $aliases_arr = explode(",", $aliases);
  59. $aliases_arr = array_unique($aliases_arr);
  60. $aliases_arr = array_filter($aliases_arr);
  61. $aliases = implode(",",$aliases_arr);
  62. $aliases = escapeshellarg($aliases);
  63. if (empty($_POST['v_aliases'])) $aliases = 'none';
  64. // Define proxy extensions
  65. $v_proxy_ext = $_POST['v_proxy_ext'];
  66. $proxy_ext = preg_replace("/\n/", ",", $v_proxy_ext);
  67. $proxy_ext = preg_replace("/\r/", ",", $proxy_ext);
  68. $proxy_ext = preg_replace("/\t/", ",", $proxy_ext);
  69. $proxy_ext = preg_replace("/ /", ",", $proxy_ext);
  70. $proxy_ext_arr = explode(",", $proxy_ext);
  71. $proxy_ext_arr = array_unique($proxy_ext_arr);
  72. $proxy_ext_arr = array_filter($proxy_ext_arr);
  73. $proxy_ext = implode(",",$proxy_ext_arr);
  74. $proxy_ext = escapeshellarg($proxy_ext);
  75. // Define other options
  76. $v_elog = $_POST['v_elog'];
  77. $v_ssl = $_POST['v_ssl'];
  78. $v_ssl_crt = $_POST['v_ssl_crt'];
  79. $v_ssl_key = $_POST['v_ssl_key'];
  80. $v_ssl_ca = $_POST['v_ssl_ca'];
  81. $v_ssl_home = $data[$v_domain]['SSL_HOME'];
  82. $v_letsencrypt = $_POST['v_letsencrypt'];
  83. $v_stats = escapeshellarg($_POST['v_stats']);
  84. $v_stats_user = $data[$v_domain]['STATS_USER'];
  85. $v_stats_password = $data[$v_domain]['STATS_PASSWORD'];
  86. $v_custom_doc_domain = $_POST['v-custom-doc-domain'];
  87. $v_custom_doc_folder = $_POST['v-custom-doc-folder'];
  88. $v_custom_doc_root_prepath = '/home/'.$user.'/web/';
  89. $v_ftp = $_POST['v_ftp'];
  90. $v_ftp_user = $_POST['v_ftp_user'];
  91. $v_ftp_password = $_POST['v_ftp_password'];
  92. $v_ftp_email = $_POST['v_ftp_email'];
  93. if (!empty($v_domain)) $v_ftp_user_prepath .= $v_domain;
  94. // Set advanced option checkmark
  95. if (!empty($_POST['v_proxy'])) $v_adv = 'yes';
  96. if (!empty($_POST['v_ftp'])) $v_adv = 'yes';
  97. if ($_POST['v_proxy_ext'] != $v_proxy_ext) $v_adv = 'yes';
  98. if ((!empty($_POST['v_aliases'])) && ($_POST['v_aliases'] != 'www.'.$_POST['v_domain'])) $v_adv = 'yes';
  99. if ((!empty($_POST['v_ssl'])) || (!empty($_POST['v_elog']))) $v_adv = 'yes';
  100. if ((!empty($_POST['v_ssl_crt'])) || (!empty($_POST['v_ssl_key']))) $v_adv = 'yes';
  101. if ((!empty($_POST['v_ssl_ca'])) || ($_POST['v_stats'] != 'none')) $v_adv = 'yes';
  102. if ((!empty($_POST['v_letsencrypt']))) $v_adv = 'yes';
  103. if (!empty($_POST['v_custom_doc_root_check'])){$v_adv = 'yes'; $v_custom_doc_root = 1; }
  104. // Check advanced features
  105. if (empty($_POST['v_dns'])) $v_dns = 'off';
  106. if (empty($_POST['v_mail'])) $v_mail = 'off';
  107. if (empty($_POST['v_proxy'])) $v_proxy = 'off';
  108. // Add web domain
  109. if (empty($_SESSION['error_msg'])) {
  110. exec (HESTIA_CMD."v-add-web-domain ".$user." ".escapeshellarg($v_domain)." ".$v_ip." 'no' ".$aliases." ".$proxy_ext, $output, $return_var);
  111. check_return_code($return_var,$output);
  112. unset($output);
  113. $domain_added = empty($_SESSION['error_msg']);
  114. }
  115. // Add DNS domain
  116. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  117. exec (HESTIA_CMD."v-add-dns-domain ".$user." ".escapeshellarg($v_domain)." ".$v_public_ip." '' '' '' '' '' '' '' '' 'no'", $output, $return_var);
  118. check_return_code($return_var,$output);
  119. unset($output);
  120. }
  121. // Add DNS for domain aliases
  122. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  123. foreach ($aliases_arr as $alias) {
  124. if ($alias != "www.".$v_domain) {
  125. $alias = escapeshellarg($alias);
  126. exec (HESTIA_CMD."v-add-dns-on-web-alias ".$user." ".$alias." ".$v_ip." 'no'", $output, $return_var);
  127. check_return_code($return_var,$output);
  128. unset($output);
  129. }
  130. }
  131. }
  132. // Add mail domain
  133. if (($_POST['v_mail'] == 'on') && (empty($_SESSION['error_msg']))) {
  134. exec (HESTIA_CMD."v-add-mail-domain ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  135. check_return_code($return_var,$output);
  136. unset($output);
  137. }
  138. // Delete proxy support
  139. if ((!empty($_SESSION['PROXY_SYSTEM'])) && ($_POST['v_proxy'] == 'off') && (empty($_SESSION['error_msg']))) {
  140. $ext = escapeshellarg($ext);
  141. exec (HESTIA_CMD."v-delete-web-domain-proxy ".$user." ".escapeshellarg($v_domain)." 'no'", $output, $return_var);
  142. check_return_code($return_var,$output);
  143. unset($output);
  144. }
  145. // Add Lets Encrypt support
  146. if ((!empty($_POST['v_letsencrypt'])) && (empty($_SESSION['error_msg']))) {
  147. exec (HESTIA_CMD."v-schedule-letsencrypt-domain ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  148. check_return_code($return_var,$output);
  149. unset($output);
  150. } else {
  151. // Add SSL certificates only if Lets Encrypt is off
  152. if ((!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  153. exec ('mktemp -d', $output, $return_var);
  154. $tmpdir = $output[0];
  155. unset($output);
  156. // Save certificate
  157. if (!empty($_POST['v_ssl_crt'])) {
  158. $fp = fopen($tmpdir."/".$_POST['v_domain'].".crt", 'w');
  159. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_crt']));
  160. fwrite($fp, "\n");
  161. fclose($fp);
  162. }
  163. // Save private key
  164. if (!empty($_POST['v_ssl_key'])) {
  165. $fp = fopen($tmpdir."/".$_POST['v_domain'].".key", 'w');
  166. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_key']));
  167. fwrite($fp, "\n");
  168. fclose($fp);
  169. }
  170. // Save CA bundle
  171. if (!empty($_POST['v_ssl_ca'])) {
  172. $fp = fopen($tmpdir."/".$_POST['v_domain'].".ca", 'w');
  173. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_ca']));
  174. fwrite($fp, "\n");
  175. fclose($fp);
  176. }
  177. $v_ssl_home = escapeshellarg($_POST['v_ssl_home']);
  178. exec (HESTIA_CMD."v-add-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." ".$tmpdir." ".$v_ssl_home." 'no'", $output, $return_var);
  179. check_return_code($return_var,$output);
  180. unset($output);
  181. // Cleanup certificate tempfiles
  182. if (!empty($_POST['v_ssl_crt'])) unlink($tmpdir."/".$v_domain.".crt");
  183. if (!empty($_POST['v_ssl_key'])) unlink($tmpdir."/".$v_domain.".key");
  184. if (!empty($_POST['v_ssl_ca'])) unlink($tmpdir."/".$v_domain.".ca");
  185. rmdir($tmpdir);
  186. }
  187. }
  188. // Add web stats
  189. if ((!empty($_POST['v_stats'])) && ($_POST['v_stats'] != 'none' ) && (empty($_SESSION['error_msg']))) {
  190. $v_stats = escapeshellarg($_POST['v_stats']);
  191. exec (HESTIA_CMD."v-add-web-domain-stats ".$user." ".escapeshellarg($v_domain)." ".$v_stats, $output, $return_var);
  192. check_return_code($return_var,$output);
  193. unset($output);
  194. }
  195. // Add web stats password
  196. if ((!empty($_POST['v_stats_user'])) && (empty($_SESSION['error_msg']))) {
  197. $v_stats_user = escapeshellarg($_POST['v_stats_user']);
  198. $v_stats_password = tempnam("/tmp","vst");
  199. $fp = fopen($v_stats_password, "w");
  200. fwrite($fp, $_POST['v_stats_password']."\n");
  201. fclose($fp);
  202. exec (HESTIA_CMD."v-add-web-domain-stats-user ".$user." ".escapeshellarg($v_domain)." ".$v_stats_user." ".$v_stats_password, $output, $return_var);
  203. check_return_code($return_var,$output);
  204. unset($output);
  205. unlink($v_stats_password);
  206. $v_stats_password = escapeshellarg($_POST['v_stats_password']);
  207. }
  208. if ( !empty($_POST['v-custom-doc-domain']) && !empty($_POST['v_custom_doc_root_check']) && $v_custom_doc_root_prepath.$v_custom_doc_domain.'/public_html'.$v_custom_doc_folder != $v_custom_doc_root){
  209. if($_POST['v-custom-doc-domain'] == $v_domain && empty($_POST['v-custom-doc-folder'])){
  210. }else{
  211. $v_custom_doc_domain = escapeshellarg($_POST['v-custom-doc-domain']);
  212. $v_custom_doc_folder = escapeshellarg($_POST['v-custom-doc-folder']);
  213. $v_domain = escapeshellarg(trim($_POST['v_domain']));
  214. exec(HESTIA_CMD."v-change-web-domain-docroot ".$user." ".$v_domain." ".$v_custom_doc_domain." ".$v_custom_doc_folder, $output, $return_var);
  215. check_return_code($return_var,$output);
  216. unset($output);
  217. $v_custom_doc_root = 1;
  218. }
  219. }else{
  220. unset($v_custom_doc_root);
  221. }
  222. // Restart DNS server
  223. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  224. exec (HESTIA_CMD."v-restart-dns", $output, $return_var);
  225. check_return_code($return_var,$output);
  226. unset($output);
  227. }
  228. // Restart web server
  229. if (empty($_SESSION['error_msg'])) {
  230. exec (HESTIA_CMD."v-restart-web", $output, $return_var);
  231. check_return_code($return_var,$output);
  232. unset($output);
  233. }
  234. // Restart proxy server
  235. if ((!empty($_SESSION['PROXY_SYSTEM'])) && ($_POST['v_proxy'] == 'on') && (empty($_SESSION['error_msg']))) {
  236. exec (HESTIA_CMD."v-restart-proxy", $output, $return_var);
  237. check_return_code($return_var,$output);
  238. unset($output);
  239. }
  240. // Add FTP
  241. if ((!empty($_POST['v_ftp'])) && (empty($_SESSION['error_msg']))) {
  242. $v_ftp_users_updated = array();
  243. foreach ($_POST['v_ftp_user'] as $i => $v_ftp_user_data) {
  244. if ($v_ftp_user_data['is_new'] == 1) {
  245. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (!filter_var($v_ftp_user_data['v_ftp_email'], FILTER_VALIDATE_EMAIL))) $_SESSION['error_msg'] = _('Please enter valid email address.');
  246. if (empty($v_ftp_user_data['v_ftp_user'])) $errors[] = 'ftp user';
  247. if (empty($v_ftp_user_data['v_ftp_password'])) $errors[] = 'ftp user password';
  248. if (!empty($errors[0])) {
  249. foreach ($errors as $i => $error) {
  250. if ( $i == 0 ) {
  251. $error_msg = $error;
  252. } else {
  253. $error_msg = $error_msg.", ".$error;
  254. }
  255. }
  256. $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'),$error_msg);
  257. }
  258. // Validate email
  259. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (!filter_var($v_ftp_user_data['v_ftp_email'], FILTER_VALIDATE_EMAIL))) {
  260. $_SESSION['error_msg'] = _('Please enter valid email address.');
  261. }
  262. // Check ftp password length
  263. if ((!empty($v_ftp_user_data['v_ftp']))) {
  264. if (!empty($v_ftp_user_data['v_ftp_user'])) {
  265. $pw_len = strlen($v_ftp_user_data['v_ftp_password']);
  266. if ($pw_len < 6 ) $_SESSION['error_msg'] = _('Password is too short.',$error_msg);
  267. }
  268. }
  269. $v_ftp_user_data['v_ftp_user'] = preg_replace("/^".$user."_/i", "", $v_ftp_user_data['v_ftp_user']);
  270. $v_ftp_username = $v_ftp_user_data['v_ftp_user'];
  271. $v_ftp_username_full = $user . '_' . $v_ftp_user_data['v_ftp_user'];
  272. $v_ftp_user = escapeshellarg($v_ftp_user_data['v_ftp_user']);
  273. if ($domain_added) {
  274. $v_ftp_path = escapeshellarg(trim($v_ftp_user_data['v_ftp_path']));
  275. $v_ftp_password = tempnam("/tmp","vst");
  276. $fp = fopen($v_ftp_password, "w");
  277. fwrite($fp, $v_ftp_user_data['v_ftp_password']."\n");
  278. fclose($fp);
  279. exec (HESTIA_CMD."v-add-web-domain-ftp ".$user." ".escapeshellarg($v_domain)." ".$v_ftp_user." ".$v_ftp_password . " " . $v_ftp_path, $output, $return_var);
  280. check_return_code($return_var,$output);
  281. unset($output);
  282. unlink($v_ftp_password);
  283. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (empty($_SESSION['error_msg']))) {
  284. $to = $v_ftp_user_data['v_ftp_email'];
  285. $subject = _("FTP login credentials");
  286. $from = sprintf(_('MAIL_FROM'), $v_domain );
  287. $mailtext = sprintf(_('FTP_ACCOUNT_READY'),$v_domain,$user,$v_ftp_user_data['v_ftp_user'],$v_ftp_user_data['v_ftp_password']);
  288. send_email($to, $subject, $mailtext, $from);
  289. unset($v_ftp_email);
  290. }
  291. } else {
  292. $return_var = -1;
  293. }
  294. if ($return_var == 0) {
  295. $v_ftp_password = "••••••••";
  296. $v_ftp_user_data['is_new'] = 0;
  297. } else {
  298. $v_ftp_user_data['is_new'] = 1;
  299. }
  300. $v_ftp_username = preg_replace("/^".$user."_/", "", $v_ftp_user_data['v_ftp_user']);
  301. $v_ftp_users_updated[] = array(
  302. 'is_new' => $v_ftp_user_data['is_new'],
  303. 'v_ftp_user' => $return_var == 0 ? $v_ftp_username_full : $v_ftp_username,
  304. 'v_ftp_password' => $v_ftp_password,
  305. 'v_ftp_path' => $v_ftp_user_data['v_ftp_path'],
  306. 'v_ftp_email' => $v_ftp_user_data['v_ftp_email'],
  307. 'v_ftp_pre_path' => $v_ftp_user_prepath
  308. );
  309. continue;
  310. }
  311. }
  312. if (!empty($_SESSION['error_msg']) && $domain_added) {
  313. $_SESSION['ok_msg'] = sprintf(_('WEB_DOMAIN_CREATED_OK'),htmlentities($v_domain),htmlentities($v_domain));
  314. $_SESSION['flash_error_msg'] = $_SESSION['error_msg'];
  315. $url = '/edit/web/?domain='.strtolower(preg_replace("/^www\./i", "", $v_domain));
  316. header('Location: ' . $url);
  317. exit;
  318. }
  319. }
  320. // Flush field values on success
  321. if (empty($_SESSION['error_msg'])) {
  322. $_SESSION['ok_msg'] = sprintf(_('WEB_DOMAIN_CREATED_OK'),htmlentities($v_domain),htmlentities($v_domain));
  323. unset($v_domain);
  324. unset($v_aliases);
  325. unset($v_ssl);
  326. unset($v_ssl_crt);
  327. unset($v_ssl_key);
  328. unset($v_ssl_ca);
  329. unset($v_stats_user);
  330. unset($v_stats_password);
  331. unset($v_ftp);
  332. }
  333. }
  334. // Define user variables
  335. $v_ftp_user_prepath = $panel[$user]['HOME'] . "/web";
  336. $v_ftp_email = $panel[$user]['CONTACT'];
  337. $v_custom_doc_root_prepath = '/home/'.$user.'/web/';
  338. // List IP addresses
  339. exec (HESTIA_CMD."v-list-user-ips ".$user." json", $output, $return_var);
  340. $ips = json_decode(implode('', $output), true);
  341. unset($output);
  342. // List web stat engines
  343. exec (HESTIA_CMD."v-list-web-stats json", $output, $return_var);
  344. $stats = json_decode(implode('', $output), true);
  345. unset($output);
  346. // Get all user domains
  347. exec (HESTIA_CMD."v-list-web-domains ".escapeshellarg($user)." json", $output, $return_var);
  348. $user_domains = json_decode(implode('', $output), true);
  349. $user_domains = array_keys($user_domains);
  350. unset($output);
  351. // Render page
  352. render_page($user, $TAB, 'add_web');
  353. // Flush session messages
  354. unset($_SESSION['error_msg']);
  355. unset($_SESSION['ok_msg']);