index.php 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361
  1. <?php
  2. error_reporting(null);
  3. ob_start();
  4. $TAB = 'USER';
  5. // Main include
  6. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  7. // Check user argument
  8. if (empty($_GET['user'])) {
  9. header("Location: /list/user/");
  10. exit;
  11. }
  12. // Edit as someone else?
  13. if (($_SESSION['userContext'] === 'admin') && (!empty($_GET['user']))) {
  14. $user=$_GET['user'];
  15. $v_username=$_GET['user'];
  16. } else {
  17. $user=$_SESSION['user'];
  18. $v_username=$_SESSION['user'];
  19. }
  20. // Prevent other users with admin privileges from editing properties of default 'admin' user
  21. if (($_SESSION['userContext'] === 'admin') && (isset($_SESSION['look'])) && ($user == 'admin') || ($_SESSION['userContext'] === 'admin') && (!isset($_SESSION['look'])) && ($user == 'admin') && ($_SESSION['user'] != 'admin')) {
  22. header("Location: /list/user/");
  23. exit;
  24. }
  25. // Ensure token is passed before loading page
  26. if ((!$_GET['token']) || ($_SESSION['token'] != $_GET['token'])) {
  27. header('location: /login/');
  28. exit();
  29. }
  30. // List user
  31. exec(HESTIA_CMD."v-list-user ".escapeshellarg($v_username)." json", $output, $return_var);
  32. check_return_code($return_var, $output);
  33. $data = json_decode(implode('', $output), true);
  34. unset($output);
  35. // Parse user
  36. $v_password = "";
  37. $v_email = $data[$v_username]['CONTACT'];
  38. $v_package = $data[$v_username]['PACKAGE'];
  39. $v_language = $data[$v_username]['LANGUAGE'];
  40. $v_user_theme = $data[$v_username]['THEME'];
  41. $v_sort_order = $data[$v_username]['PREF_UI_SORT'];
  42. $v_name = $data[$v_username]['NAME'];
  43. $v_shell = $data[$v_username]['SHELL'];
  44. $v_twofa = $data[$v_username]['TWOFA'];
  45. $v_qrcode = $data[$v_username]['QRCODE'];
  46. $v_phpcli = $data[$v_username]['PHPCLI'];
  47. $v_role = $data[$v_username]['ROLE'];
  48. $v_login_disabled = $data[$v_username]['LOGIN_DISABLED'];
  49. $v_login_use_iplist = $data[$v_username]['LOGIN_USE_IPLIST'];
  50. $v_login_allowed_ips = $data[$v_username]['LOGIN_ALLOW_IPS'];
  51. $v_ns = $data[$v_username]['NS'];
  52. $nameservers = explode(",", $v_ns);
  53. $v_ns1 = $nameservers[0];
  54. $v_ns2 = $nameservers[1];
  55. $v_ns3 = $nameservers[2];
  56. $v_ns4 = $nameservers[3];
  57. $v_ns5 = $nameservers[4];
  58. $v_ns6 = $nameservers[5];
  59. $v_ns7 = $nameservers[6];
  60. $v_ns8 = $nameservers[7];
  61. $v_suspended = $data[$v_username]['SUSPENDED'];
  62. if ($v_suspended == 'yes') {
  63. $v_status = 'suspended';
  64. } else {
  65. $v_status = 'active';
  66. }
  67. $v_time = $data[$v_username]['TIME'];
  68. $v_date = $data[$v_username]['DATE'];
  69. if (empty($v_phpcli)) {
  70. $v_phpcli = substr(DEFAULT_PHP_VERSION, 4);
  71. }
  72. // List packages
  73. exec(HESTIA_CMD."v-list-user-packages json", $output, $return_var);
  74. $packages = json_decode(implode('', $output), true);
  75. unset($output);
  76. // List languages
  77. exec(HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  78. $language = json_decode(implode('', $output), true);
  79. foreach ($language as $lang) {
  80. $languages[$lang] = translate_json($lang);
  81. }
  82. asort($languages);
  83. unset($output);
  84. // List themes
  85. exec(HESTIA_CMD."v-list-sys-themes json", $output, $return_var);
  86. $themes = json_decode(implode('', $output), true);
  87. unset($output);
  88. // List shells
  89. exec(HESTIA_CMD."v-list-sys-shells json", $output, $return_var);
  90. $shells = json_decode(implode('', $output), true);
  91. unset($output);
  92. //List PHP Versions
  93. // List supported php versions
  94. exec(HESTIA_CMD."v-list-sys-php json", $output, $return_var);
  95. $php_versions = json_decode(implode('', $output), true);
  96. unset($output);
  97. // Are you admin?
  98. // Check POST request
  99. if (!empty($_POST['save'])) {
  100. // Check token
  101. verify_csrf($_POST);
  102. // Change password
  103. if ((!empty($_POST['v_password'])) && (empty($_SESSION['error_msg']))) {
  104. // Check password length
  105. $pw_len = strlen($_POST['v_password']);
  106. if (!validate_password($_POST['v_password'])) {
  107. $_SESSION['error_msg'] = _('Password does not match the minimum requirements');
  108. }
  109. if (empty($_SESSION['error_msg'])) {
  110. $v_password = tempnam("/tmp", "vst");
  111. $fp = fopen($v_password, "w");
  112. fwrite($fp, $_POST['v_password']."\n");
  113. fclose($fp);
  114. exec(HESTIA_CMD."v-change-user-password ".escapeshellarg($v_username)." ".$v_password, $output, $return_var);
  115. check_return_code($return_var, $output);
  116. unset($output);
  117. unlink($v_password);
  118. $v_password = escapeshellarg($_POST['v_password']);
  119. }
  120. }
  121. // Enable twofa
  122. if ((!empty($_POST['v_twofa'])) && (empty($_SESSION['error_msg']))) {
  123. exec(HESTIA_CMD."v-add-user-2fa ".escapeshellarg($v_username), $output, $return_var);
  124. check_return_code($return_var, $output);
  125. unset($output);
  126. // List user
  127. exec(HESTIA_CMD."v-list-user ".escapeshellarg($v_username)." json", $output, $return_var);
  128. check_return_code($return_var, $output);
  129. $data = json_decode(implode('', $output), true);
  130. unset($output);
  131. // Parse user twofa
  132. $v_twofa = $data[$v_username]['TWOFA'];
  133. $v_qrcode = $data[$v_username]['QRCODE'];
  134. }
  135. // Disable twofa
  136. if ((empty($_POST['v_twofa'])) && (!empty($v_twofa)) && (empty($_SESSION['error_msg']))) {
  137. exec(HESTIA_CMD."v-delete-user-2fa ".escapeshellarg($v_username), $output, $return_var);
  138. check_return_code($return_var, $output);
  139. unset($output);
  140. $v_twofa = '';
  141. $v_qrcode = '';
  142. }
  143. // Change default sort order
  144. if (($v_sort_order != $_POST['v_sort_order']) && (empty($_SESSION['error_msg']))) {
  145. $v_sort_order = escapeshellarg($_POST['v_sort_order']);
  146. exec(HESTIA_CMD."v-change-user-sort-order ".escapeshellarg($v_username)." ".$v_sort_order, $output, $return_var);
  147. check_return_code($return_var, $output);
  148. unset($_SESSION['userSortOrder']);
  149. $_SESSION['userSortOrder'] = $v_sort_order;
  150. unset($output);
  151. }
  152. // Update Control Panel login disabled status (admin only)
  153. if (empty($_SESSION['error_msg'])) {
  154. if ($_POST['v_login_disabled'] != $data[$user]['LOGIN_DISABLED']) {
  155. if ($_POST['v_login_disabled'] == 'on') {
  156. $_POST['v_login_disabled'] = 'yes';
  157. } else {
  158. $_POST['v_login_disabled'] = 'no';
  159. }
  160. exec(HESTIA_CMD."v-change-user-config-value ".escapeshellarg($v_username)." LOGIN_DISABLED ".escapeshellarg($_POST['v_login_disabled']), $output, $return_var);
  161. check_return_code($return_var, $output);
  162. $data[$user]['LOGIN_DISABLED'] = $_POST['v_login_disabled'];
  163. unset($output);
  164. }
  165. }
  166. // Update IP whitelist option
  167. if (empty($_SESSION['error_msg'])) {
  168. if ($_POST['v_login_use_iplist'] != $data[$user]['LOGIN_USE_IPLIST']) {
  169. if ($_POST['v_login_use_iplist'] == 'on') {
  170. $_POST['v_login_use_iplist'] = 'yes';
  171. } else {
  172. $_POST['v_login_use_iplist'] = 'no';
  173. }
  174. exec(HESTIA_CMD."v-change-user-config-value ".escapeshellarg($v_username)." LOGIN_USE_IPLIST ".escapeshellarg($_POST['v_login_use_iplist']), $output, $return_var);
  175. if ($_POST['v_login_use_iplist'] === 'no') {
  176. exec(HESTIA_CMD."v-change-user-config-value ".escapeshellarg($v_username)." LOGIN_ALLOW_IPS ''", $output, $return_var);
  177. $v_login_allowed_ips = '';
  178. } else {
  179. exec(HESTIA_CMD."v-change-user-config-value ".escapeshellarg($v_username)." LOGIN_ALLOW_IPS ".escapeshellarg($_POST['v_login_allowed_ips']), $output, $return_var);
  180. unset($v_login_allowed_ips);
  181. $v_login_allowed_ips = $_POST['v_login_allowed_ips'];
  182. }
  183. check_return_code($return_var, $output);
  184. $data[$user]['LOGIN_USE_IPLIST'] = $_POST['v_login_use_iplist'];
  185. unset($output);
  186. }
  187. }
  188. // Change package (admin only)
  189. if (($v_package != $_POST['v_package']) && ($_SESSION['userContext'] === 'admin') && (empty($_SESSION['error_msg']))) {
  190. $v_package = escapeshellarg($_POST['v_package']);
  191. exec(HESTIA_CMD."v-change-user-package ".escapeshellarg($v_username)." ".$v_package, $output, $return_var);
  192. check_return_code($return_var, $output);
  193. unset($output);
  194. }
  195. // Change phpcli (admin only)
  196. if (($v_phpcli != $_POST['v_phpcli']) && ($_SESSION['userContext'] === 'admin') && (empty($_SESSION['error_msg']))) {
  197. $v_phpcli = escapeshellarg($_POST['v_phpcli']);
  198. exec(HESTIA_CMD."v-change-user-php-cli ".escapeshellarg($v_username)." ".$v_phpcli, $output, $return_var);
  199. check_return_code($return_var, $output);
  200. unset($output);
  201. }
  202. // Change Role (admin only)
  203. if (($v_role != $_POST['v_role']) && ($_SESSION['userContext'] === 'admin') && $v_username != "admin" && (empty($_SESSION['error_msg']))) {
  204. if (!empty($_POST['v_role'])) {
  205. $v_role = escapeshellarg($_POST['v_role']);
  206. exec(HESTIA_CMD."v-change-user-role ".escapeshellarg($v_username)." ".$v_role, $output, $return_var);
  207. check_return_code($return_var, $output);
  208. unset($output);
  209. $v_role = $_POST['v_role'];
  210. }
  211. }
  212. // Change language
  213. if (($v_language != $_POST['v_language']) && (empty($_SESSION['error_msg']))) {
  214. $v_language = escapeshellarg($_POST['v_language']);
  215. exec(HESTIA_CMD."v-change-user-language ".escapeshellarg($v_username)." ".$v_language, $output, $return_var);
  216. check_return_code($return_var, $output);
  217. if (empty($_SESSION['error_msg'])) {
  218. if (($_GET['user'] == $_SESSION['user'])) {
  219. unset($_SESSION['language']);
  220. $_SESSION['language'] = $_POST['v_language'];
  221. $refresh = $_SERVER['REQUEST_URI'];
  222. header("Location: $refresh");
  223. }
  224. }
  225. unset($output);
  226. }
  227. // Change shell (admin only)
  228. if (($v_shell != $_POST['v_shell']) && ($_SESSION['userContext'] === 'admin') && (empty($_SESSION['error_msg']))) {
  229. $v_shell = escapeshellarg($_POST['v_shell']);
  230. exec(HESTIA_CMD."v-change-user-shell ".escapeshellarg($v_username)." ".$v_shell, $output, $return_var);
  231. check_return_code($return_var, $output);
  232. unset($output);
  233. }
  234. // Change contact email
  235. if (($v_email != $_POST['v_email']) && (empty($_SESSION['error_msg']))) {
  236. if (!filter_var($_POST['v_email'], FILTER_VALIDATE_EMAIL)) {
  237. $_SESSION['error_msg'] = _('Please enter valid email address.');
  238. } else {
  239. $v_email = escapeshellarg($_POST['v_email']);
  240. exec(HESTIA_CMD."v-change-user-contact ".escapeshellarg($v_username)." ".$v_email, $output, $return_var);
  241. check_return_code($return_var, $output);
  242. unset($output);
  243. }
  244. }
  245. // Change full name
  246. if ($v_name != $_POST['v_name']) {
  247. if (empty($_POST['v_name'])) {
  248. $_SESSION['error_msg'] = _('Please enter a valid name');
  249. } else {
  250. $v_name = escapeshellarg($_POST['v_name']);
  251. exec(HESTIA_CMD."v-change-user-name ".escapeshellarg($v_username). " ".$v_name, $output, $return_var);
  252. check_return_code($return_var, $output);
  253. unset($output);
  254. $v_name = $_POST['v_name'];
  255. }
  256. }
  257. // Update theme
  258. if (empty($_SESSION['error_msg'])) {
  259. if ($_POST['v_user_theme'] != $_SESSION['userTheme']) {
  260. exec(HESTIA_CMD."v-change-user-theme ".escapeshellarg($v_username)." ".escapeshellarg($_POST['v_user_theme']), $output, $return_var);
  261. check_return_code($return_var, $output);
  262. unset($output);
  263. $v_user_theme = $_POST['v_user_theme'];
  264. if ($_SESSION['user'] === $v_username) {
  265. unset($_SESSION['userTheme']);
  266. $_SESSION['userTheme'] = $v_user_theme;
  267. }
  268. }
  269. }
  270. // Change NameServers
  271. if (($v_ns1 != $_POST['v_ns1']) || ($v_ns2 != $_POST['v_ns2']) || ($v_ns3 != $_POST['v_ns3']) || ($v_ns4 != $_POST['v_ns4']) || ($v_ns5 != $_POST['v_ns5'])
  272. || ($v_ns6 != $_POST['v_ns6']) || ($v_ns7 != $_POST['v_ns7']) || ($v_ns8 != $_POST['v_ns8']) && (empty($_SESSION['error_msg']))) {
  273. $v_ns1 = escapeshellarg($_POST['v_ns1']);
  274. $v_ns2 = escapeshellarg($_POST['v_ns2']);
  275. $v_ns3 = escapeshellarg($_POST['v_ns3']);
  276. $v_ns4 = escapeshellarg($_POST['v_ns4']);
  277. $v_ns5 = escapeshellarg($_POST['v_ns5']);
  278. $v_ns6 = escapeshellarg($_POST['v_ns6']);
  279. $v_ns7 = escapeshellarg($_POST['v_ns7']);
  280. $v_ns8 = escapeshellarg($_POST['v_ns8']);
  281. $ns_cmd = HESTIA_CMD."v-change-user-ns ".escapeshellarg($v_username)." ".$v_ns1." ".$v_ns2;
  282. if (!empty($_POST['v_ns3'])) {
  283. $ns_cmd = $ns_cmd." ".$v_ns3;
  284. }
  285. if (!empty($_POST['v_ns4'])) {
  286. $ns_cmd = $ns_cmd." ".$v_ns4;
  287. }
  288. if (!empty($_POST['v_ns5'])) {
  289. $ns_cmd = $ns_cmd." ".$v_ns5;
  290. }
  291. if (!empty($_POST['v_ns6'])) {
  292. $ns_cmd = $ns_cmd." ".$v_ns6;
  293. }
  294. if (!empty($_POST['v_ns7'])) {
  295. $ns_cmd = $ns_cmd." ".$v_ns7;
  296. }
  297. if (!empty($_POST['v_ns8'])) {
  298. $ns_cmd = $ns_cmd." ".$v_ns8;
  299. }
  300. exec($ns_cmd, $output, $return_var);
  301. check_return_code($return_var, $output);
  302. unset($output);
  303. $v_ns1 = str_replace("'", "", $v_ns1);
  304. $v_ns2 = str_replace("'", "", $v_ns2);
  305. $v_ns3 = str_replace("'", "", $v_ns3);
  306. $v_ns4 = str_replace("'", "", $v_ns4);
  307. $v_ns5 = str_replace("'", "", $v_ns5);
  308. $v_ns6 = str_replace("'", "", $v_ns6);
  309. $v_ns7 = str_replace("'", "", $v_ns7);
  310. $v_ns8 = str_replace("'", "", $v_ns8);
  311. }
  312. // Set success message
  313. if (empty($_SESSION['error_msg'])) {
  314. $_SESSION['ok_msg'] = _('Changes has been saved.');
  315. }
  316. }
  317. // Render page
  318. render_page($user, $TAB, 'edit_user');
  319. // Flush session messages
  320. unset($_SESSION['error_msg']);
  321. unset($_SESSION['ok_msg']);