main.php 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521
  1. <?php
  2. session_start();
  3. use PHPMailer\PHPMailer\PHPMailer;
  4. use PHPMailer\PHPMailer\SMTP;
  5. use PHPMailer\PHPMailer\Exception;
  6. if (!file_exists(dirname(__FILE__).'/vendor/autoload.php')) {
  7. trigger_error('Unable able to load required libaries. Please run v-add-sys-phpmailer in command line');
  8. echo 'Unable able to load required libaries. Please run v-add-sys-phpmailer in command line';
  9. exit(1);
  10. }
  11. require 'vendor/autoload.php';
  12. define('HESTIA_CMD', '/usr/bin/sudo /usr/local/hestia/bin/');
  13. define('DEFAULT_PHP_VERSION', 'php-' . exec('php -r "echo substr(phpversion(),0,3);"'));
  14. // Load Hestia Config directly
  15. load_hestia_config();
  16. require_once(dirname(__FILE__) . '/prevent_csrf.php');
  17. function destroy_sessions()
  18. {
  19. unset($_SESSION);
  20. session_unset();
  21. session_destroy();
  22. session_start();
  23. }
  24. $i = 0;
  25. // Saving user IPs to the session for preventing session hijacking
  26. $user_combined_ip = '';
  27. if (isset($_SERVER['REMOTE_ADDR'])) {
  28. $user_combined_ip = $_SERVER['REMOTE_ADDR'];
  29. }
  30. if (isset($_SERVER['HTTP_CLIENT_IP'])) {
  31. $user_combined_ip .= '|' . $_SERVER['HTTP_CLIENT_IP'];
  32. }
  33. if (isset($_SERVER['HTTP_X_FORWARDED_FOR'])) {
  34. $user_combined_ip .= '|' . $_SERVER['HTTP_X_FORWARDED_FOR'];
  35. }
  36. if (isset($_SERVER['HTTP_FORWARDED_FOR'])) {
  37. $user_combined_ip .= '|' . $_SERVER['HTTP_FORWARDED_FOR'];
  38. }
  39. if (isset($_SERVER['HTTP_X_FORWARDED'])) {
  40. $user_combined_ip .= '|' . $_SERVER['HTTP_X_FORWARDED'];
  41. }
  42. if (isset($_SERVER['HTTP_FORWARDED'])) {
  43. $user_combined_ip .= '|' . $_SERVER['HTTP_FORWARDED'];
  44. }
  45. if (isset($_SERVER['HTTP_CF_CONNECTING_IP'])) {
  46. if (!empty($_SERVER['HTTP_CF_CONNECTING_IP'])) {
  47. $user_combined_ip = $_SERVER['HTTP_CF_CONNECTING_IP'];
  48. }
  49. }
  50. if (!isset($_SESSION['user_combined_ip'])) {
  51. $_SESSION['user_combined_ip'] = $user_combined_ip;
  52. }
  53. // Checking user to use session from the same IP he has been logged in
  54. if ($_SESSION['user_combined_ip'] != $user_combined_ip && $_SERVER['REMOTE_ADDR'] != '127.0.0.1') {
  55. $v_user = escapeshellarg($_SESSION['user']);
  56. $v_session_id = escapeshellarg($_SESSION['token']);
  57. exec(HESTIA_CMD . 'v-log-user-logout ' . $v_user . ' ' . $v_session_id, $output, $return_var);
  58. destroy_sessions();
  59. header('Location: /login/');
  60. exit;
  61. }
  62. // Check system settings
  63. if ((!isset($_SESSION['VERSION'])) && (!defined('NO_AUTH_REQUIRED'))) {
  64. destroy_sessions();
  65. header('Location: /login/');
  66. exit;
  67. }
  68. // Check user session
  69. if ((!isset($_SESSION['user'])) && (!defined('NO_AUTH_REQUIRED'))) {
  70. destroy_sessions();
  71. header('Location: /login/');
  72. exit;
  73. }
  74. // Generate CSRF Token
  75. if (isset($_SESSION['user'])) {
  76. if (!isset($_SESSION['token'])) {
  77. $token = bin2hex(file_get_contents('/dev/urandom', false, null, 0, 16));
  78. $_SESSION['token'] = $token;
  79. }
  80. }
  81. if ($_SESSION['RELEASE_BRANCH'] == 'release' && $_SESSION['DEBUG_MODE'] == 'false') {
  82. define('JS_LATEST_UPDATE', 'v=' . $_SESSION['VERSION']);
  83. } else {
  84. define('JS_LATEST_UPDATE', 'r=' . time());
  85. }
  86. if (!defined('NO_AUTH_REQUIRED')) {
  87. if (empty($_SESSION['LAST_ACTIVITY']) || empty($_SESSION['INACTIVE_SESSION_TIMEOUT'])) {
  88. destroy_sessions();
  89. header('Location: /login/');
  90. } elseif ($_SESSION['INACTIVE_SESSION_TIMEOUT'] * 60 + $_SESSION['LAST_ACTIVITY'] < time()) {
  91. $v_user = escapeshellarg($_SESSION['user']);
  92. $v_session_id = escapeshellarg($_SESSION['token']);
  93. exec(HESTIA_CMD . 'v-log-user-logout ' . $v_user . ' ' . $v_session_id, $output, $return_var);
  94. destroy_sessions();
  95. header('Location: /login/');
  96. exit;
  97. } else {
  98. $_SESSION['LAST_ACTIVITY'] = time();
  99. }
  100. }
  101. if (isset($_SESSION['user'])) {
  102. $user = escapeshellarg($_SESSION['user']);
  103. $user_plain = htmlentities($_SESSION['user']);
  104. }
  105. if (isset($_SESSION['look']) && $_SESSION['look'] != '' && ($_SESSION['userContext'] === 'admin')) {
  106. $user = escapeshellarg($_SESSION['look']);
  107. $user_plain = htmlentities($_SESSION['look']);
  108. }
  109. require_once(dirname(__FILE__) . '/i18n.php');
  110. function check_error($return_var)
  111. {
  112. if ($return_var > 0) {
  113. header('Location: /error/');
  114. exit;
  115. }
  116. }
  117. function check_return_code($return_var, $output)
  118. {
  119. if ($return_var != 0) {
  120. $error = implode('<br>', $output);
  121. if (empty($error)) {
  122. $error = sprintf(_('Error code:'), $return_var);
  123. }
  124. $_SESSION['error_msg'] = $error;
  125. }
  126. }
  127. function check_return_code_redirect($return_var, $output, $location)
  128. {
  129. if ($return_var != 0) {
  130. $error = implode('<br>', $output);
  131. if (empty($error)) {
  132. $error = sprintf(_('Error code:'), $return_var);
  133. }
  134. $_SESSION['error_msg'] = $error;
  135. header("Location:".$location);
  136. }
  137. }
  138. function render_page($user, $TAB, $page)
  139. {
  140. $__template_dir = dirname(__DIR__) . '/templates/';
  141. $__pages_js_dir = dirname(__DIR__) . '/js/pages/';
  142. // Header
  143. include($__template_dir . 'header.html');
  144. // Panel
  145. $panel = top_panel(empty($_SESSION['look']) ? $_SESSION['user'] : $_SESSION['look'], $TAB);
  146. // Extract global variables
  147. // I think those variables should be passed via arguments
  148. extract($GLOBALS, EXTR_SKIP);
  149. // Policies controller
  150. @include_once(dirname(__DIR__) . '/inc/policies.php');
  151. // Body
  152. include($__template_dir . 'pages/' . $page . '.html');
  153. // Including common js files
  154. @include_once(dirname(__DIR__) . '/templates/includes/end_js.html');
  155. // Including page specific js file
  156. if (file_exists($__pages_js_dir . $page . '.js')) {
  157. echo '<script src="/js/pages/' . $page . '.js?' . JS_LATEST_UPDATE . '"></script>';
  158. }
  159. // Footer
  160. include($__template_dir . 'footer.html');
  161. }
  162. // Match $_SESSION['token'] against $_GET['token'] or $_POST['token']
  163. // Usage: verify_csrf($_POST) or verify_csrf($_GET); Use verify_csrf($_POST,true) to return on failure instead of redirect
  164. function verify_csrf($method, $return = false)
  165. {
  166. if ($method['token'] !== $_SESSION['token'] || empty($method['token']) || empty($_SESSION['token'])) {
  167. if ($return === true) {
  168. return false;
  169. } else {
  170. header('Location: /login/');
  171. die();
  172. }
  173. } else {
  174. return true;
  175. }
  176. }
  177. function show_error_panel($data)
  178. {
  179. $msg_id = '';
  180. $msg_icon = '';
  181. $msg_text = '';
  182. if (!empty($data['error_msg'])) {
  183. $msg_icon = 'fa-exclamation-circle status-icon red';
  184. $msg_text = htmlentities($data['error_msg']);
  185. $msg_id = 'vst-error';
  186. } else {
  187. if (!empty($data['ok_msg'])) {
  188. $msg_icon = 'fa-check-circle status-icon green';
  189. $msg_text = $data['ok_msg'];
  190. $msg_id = 'vst-ok';
  191. }
  192. } ?>
  193. <span class="<?=$msg_id; ?>"> <i class="fas <?=$msg_icon; ?>"></i> <?=$msg_text; ?></span>
  194. <?php
  195. }
  196. function top_panel($user, $TAB)
  197. {
  198. $command = HESTIA_CMD . 'v-list-user ' . $user . " 'json'";
  199. exec($command, $output, $return_var);
  200. if ($return_var > 0) {
  201. destroy_sessions();
  202. $_SESSION['error_msg'] = _('You have been logged out. Please log in again.');
  203. header('Location: /login/');
  204. exit;
  205. }
  206. $panel = json_decode(implode('', $output), true);
  207. unset($output);
  208. // Log out active sessions for suspended users
  209. if (($panel[$user]['SUSPENDED'] === 'yes') && ($_SESSION['POLICY_USER_VIEW_SUSPENDED'] !== 'yes')) {
  210. if (empty($_SESSION['look'])) {
  211. destroy_sessions();
  212. $_SESSION['error_msg'] = _('You have been logged out. Please log in again.');
  213. header('Location: /login/');
  214. }
  215. }
  216. // Reset user permissions if changed while logged in
  217. if (($panel[$user]['ROLE']) !== ($_SESSION['userContext']) && (!isset($_SESSION['look']))) {
  218. unset($_SESSION['userContext']);
  219. $_SESSION['userContext'] = $panel[$user]['ROLE'];
  220. }
  221. // Load user's selected theme and do not change it when impersonting user
  222. if ((isset($panel[$user]['THEME'])) && (!isset($_SESSION['look']))) {
  223. $_SESSION['userTheme'] = $panel[$user]['THEME'];
  224. }
  225. // Unset userTheme override variable if POLICY_USER_CHANGE_THEME is set to no
  226. if ($_SESSION['POLICY_USER_CHANGE_THEME'] === 'no') {
  227. unset($_SESSION['userTheme']);
  228. }
  229. // Set preferred sort order
  230. if (!isset($_SESSION['look'])) {
  231. $_SESSION['userSortOrder'] = $panel[$user]['PREF_UI_SORT'];
  232. }
  233. // Set home location URLs
  234. if (($_SESSION['userContext'] === 'admin') && (!isset($_SESSION['look']))) {
  235. // Display users list for administrators unless they are impersonating a user account
  236. $home_url = '/list/user/';
  237. } else {
  238. // Set home location URL based on available package features from account
  239. if ($panel[$user]['WEB_DOMAINS'] != '0') {
  240. $home_url = '/list/web/';
  241. } elseif ($panel[$user]['DNS_DOMAINS'] != '0') {
  242. $home_url = '/list/dns/';
  243. } elseif ($panel[$user]['MAIL_DOMAINS'] != '0') {
  244. $home_url = '/list/mail/';
  245. } elseif ($panel[$user]['DATABASES'] != '0') {
  246. $home_url = '/list/db/';
  247. } elseif ($panel[$user]['CRON_JOBS'] != '0') {
  248. $home_url = '/list/cron/';
  249. } elseif ($panel[$user]['BACKUPS'] != '0') {
  250. $home_url = '/list/backups/';
  251. }
  252. }
  253. include(dirname(__FILE__) . '/../templates/includes/panel.html');
  254. return $panel;
  255. }
  256. function translate_date($date)
  257. {
  258. $date = new DateTime($date);
  259. return $date -> format('d').' '. _($date -> format('M')).' '.$date -> format('Y');
  260. }
  261. function humanize_time($usage)
  262. {
  263. if ($usage > 60) {
  264. $usage = $usage / 60;
  265. if ($usage > 24) {
  266. $usage = $usage / 24;
  267. $usage = number_format($usage);
  268. return sprintf(ngettext('%d day', '%d days', $usage), $usage);
  269. } else {
  270. $usage = round($usage);
  271. return sprintf(ngettext('%d hour', '%d hours', $usage), $usage);
  272. }
  273. } else {
  274. $usage = round($usage);
  275. return sprintf(ngettext('%d minute', '%d minutes', $usage), $usage);
  276. }
  277. }
  278. function humanize_usage_size($usage)
  279. {
  280. if ($usage == 'unlimited') {
  281. return '∞';
  282. }
  283. if ($usage > 1024) {
  284. $usage = $usage / 1024;
  285. if ($usage > 1024) {
  286. $usage = $usage / 1024 ;
  287. if ($usage > 1024) {
  288. $usage = $usage / 1024 ;
  289. $usage = number_format($usage, 2);
  290. } else {
  291. $usage = number_format($usage, 2);
  292. }
  293. } else {
  294. $usage = number_format($usage, 2);
  295. }
  296. }
  297. return $usage;
  298. }
  299. function humanize_usage_measure($usage)
  300. {
  301. if ($usage == 'unlimited') {
  302. return 'mb';
  303. }
  304. $measure = 'kb';
  305. if ($usage > 1024) {
  306. $usage = $usage / 1024;
  307. if ($usage > 1024) {
  308. $usage = $usage / 1024 ;
  309. $measure = ($usage > 1024) ? 'pb' : 'tb';
  310. } else {
  311. $measure = 'gb';
  312. }
  313. } else {
  314. $measure = 'mb';
  315. }
  316. return $measure;
  317. }
  318. function get_percentage($used, $total)
  319. {
  320. if ($total = "unlimited") {
  321. //return 0 if unlimited
  322. return 0;
  323. }
  324. if (!isset($total)) {
  325. $total = 0;
  326. }
  327. if (!isset($used)) {
  328. $used = 0;
  329. }
  330. if ($total == 0) {
  331. $percent = 0;
  332. } else {
  333. $percent = $used / $total;
  334. $percent = $percent * 100;
  335. $percent = number_format($percent, 0, '', '');
  336. if ($percent < 0) {
  337. $percent = 0;
  338. } elseif ($percent > 100) {
  339. $percent = 100;
  340. }
  341. }
  342. return $percent;
  343. }
  344. function send_email($to, $subject, $mailtext, $from, $from_name, $to_name = '')
  345. {
  346. $mail = new PHPMailer();
  347. if (isset($_SESSION['USE_SERVER_SMTP']) && $_SESSION['USE_SERVER_SMTP'] == "true") {
  348. $from = $_SESSION['SERVER_SMTP_ADDR'];
  349. $mail->IsSMTP();
  350. $mail->Mailer = "smtp";
  351. $mail->SMTPDebug = 0;
  352. $mail->SMTPAuth = true;
  353. $mail->SMTPSecure = $_SESSION['SERVER_SMTP_SECURITY'];
  354. $mail->Port = $_SESSION['SERVER_SMTP_PORT'];
  355. $mail->Host = $_SESSION['SERVER_SMTP_HOST'];
  356. $mail->Username = $_SESSION['SERVER_SMTP_USER'];
  357. $mail->Password = $_SESSION['SERVER_SMTP_PASSWD'];
  358. }
  359. $mail->IsHTML(true);
  360. $mail->ClearReplyTos();
  361. if (empty($to_name)) {
  362. $mail->AddAddress($to);
  363. } else {
  364. $mail->AddAddress($to, $to_name);
  365. }
  366. $mail->SetFrom($from, $from_name);
  367. $mail->CharSet = "utf-8";
  368. $mail->Subject = $subject;
  369. $content = $mailtext;
  370. $content = nl2br($content);
  371. $mail->MsgHTML($content);
  372. $mail->Send();
  373. }
  374. function list_timezones()
  375. {
  376. foreach (['AKST', 'AKDT', 'PST', 'PDT', 'MST', 'MDT', 'CST', 'CDT', 'EST', 'EDT', 'AST', 'ADT'] as $timezone) {
  377. $tz = new DateTimeZone($timezone);
  378. $timezone_offsets[$timezone] = $tz->getOffset(new DateTime());
  379. }
  380. foreach (DateTimeZone::listIdentifiers() as $timezone) {
  381. $tz = new DateTimeZone($timezone);
  382. $timezone_offsets[$timezone] = $tz->getOffset(new DateTime());
  383. }
  384. foreach ($timezone_offsets as $timezone => $offset) {
  385. $offset_prefix = $offset < 0 ? '-' : '+';
  386. $offset_formatted = gmdate('H:i', abs($offset));
  387. $pretty_offset = "UTC${offset_prefix}${offset_formatted}";
  388. $c = new DateTime(gmdate('Y-M-d H:i:s'), new DateTimeZone('UTC'));
  389. $c->setTimezone(new DateTimeZone($timezone));
  390. $current_time = $c->format('H:i:s');
  391. $timezone_list[$timezone] = "$timezone [ $current_time ] ${pretty_offset}";
  392. #$timezone_list[$timezone] = "$timezone ${pretty_offset}";
  393. }
  394. return $timezone_list;
  395. }
  396. /**
  397. * A function that tells is it MySQL installed on the system, or it is MariaDB.
  398. *
  399. * Explaination:
  400. * $_SESSION['DB_SYSTEM'] has 'mysql' value even if MariaDB is installed, so you can't figure out is it really MySQL or it's MariaDB.
  401. * So, this function will make it clear.
  402. *
  403. * If MySQL is installed, function will return 'mysql' as a string.
  404. * If MariaDB is installed, function will return 'mariadb' as a string.
  405. *
  406. * Hint: if you want to check if PostgreSQL is installed - check value of $_SESSION['DB_SYSTEM']
  407. *
  408. * @return string
  409. */
  410. function is_it_mysql_or_mariadb()
  411. {
  412. exec(HESTIA_CMD . 'v-list-sys-services json', $output, $return_var);
  413. $data = json_decode(implode('', $output), true);
  414. unset($output);
  415. $mysqltype = 'mysql';
  416. if (isset($data['mariadb'])) {
  417. $mysqltype = 'mariadb';
  418. }
  419. return $mysqltype;
  420. }
  421. function load_hestia_config()
  422. {
  423. // Check system configuration
  424. exec(HESTIA_CMD . "v-list-sys-config json", $output, $return_var);
  425. $data = json_decode(implode('', $output), true);
  426. $sys_arr = $data['config'];
  427. foreach ($sys_arr as $key => $value) {
  428. $_SESSION[$key] = $value;
  429. }
  430. }
  431. /**
  432. * Returns the list of all web domains from all users grouped by Backend Template used and owner
  433. *
  434. * @return array
  435. */
  436. function backendtpl_with_webdomains()
  437. {
  438. exec(HESTIA_CMD . 'v-list-users json', $output, $return_var);
  439. $users = json_decode(implode('', $output), true);
  440. unset($output);
  441. $backend_list=[];
  442. foreach ($users as $user => $user_details) {
  443. exec(HESTIA_CMD . 'v-list-web-domains '. escapeshellarg($user) . ' json', $output, $return_var);
  444. $domains = json_decode(implode('', $output), true);
  445. unset($output);
  446. foreach ($domains as $domain => $domain_details) {
  447. if (!empty($domain_details['BACKEND'])) {
  448. $backend = $domain_details['BACKEND'];
  449. $backend_list[$backend][$user][] = $domain;
  450. }
  451. }
  452. }
  453. return $backend_list;
  454. }
  455. /**
  456. * Check if password is valid
  457. *
  458. * @return int; 1 / 0
  459. */
  460. function validate_password($password)
  461. {
  462. return preg_match('/^(?=.*[a-z])(?=.*[A-Z])(?=.*\d)(.){8,}$/', $password);
  463. }