index.php 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495
  1. <?php
  2. error_reporting(NULL);
  3. ob_start();
  4. $TAB = 'WEB';
  5. // Main include
  6. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  7. // Check POST request
  8. if (!empty($_POST['ok'])) {
  9. // Check token
  10. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  11. header('location: /login/');
  12. exit();
  13. }
  14. // Check for empty fields
  15. if (empty($_POST['v_domain'])) $errors[] = _('domain');
  16. if (empty($_POST['v_ip'])) $errors[] = _('ip');
  17. if ((!empty($_POST['v_ssl'])) && (empty($_POST['v_ssl_crt']))&& (empty($_POST['v_letsencrypt']))) $errors[] = _('ssl certificate');
  18. if ((!empty($_POST['v_ssl'])) && (empty($_POST['v_ssl_key']))&& (empty($_POST['v_letsencrypt']))) $errors[] = _('ssl key');
  19. if (!empty($errors[0])) {
  20. foreach ($errors as $i => $error) {
  21. if ( $i == 0 ) {
  22. $error_msg = $error;
  23. } else {
  24. $error_msg = $error_msg.", ".$error;
  25. }
  26. }
  27. $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'),$error_msg);
  28. }
  29. // Check stats password length
  30. if ((!empty($v_stats)) && (empty($_SESSION['error_msg']))) {
  31. if (!empty($_POST['v_stats_user'])) {
  32. $pw_len = strlen($_POST['v_stats_password']);
  33. if ($pw_len < 6 ) $_SESSION['error_msg'] = _('Password is too short.',$error_msg);
  34. }
  35. }
  36. // Set domain to lowercase and remove www prefix
  37. $v_domain = preg_replace("/^www\./i", "", $_POST['v_domain']);
  38. $v_domain = strtolower($v_domain);
  39. // Define domain ip address
  40. $v_ip = escapeshellarg($_POST['v_ip']);
  41. // Using public IP instead of internal IP when creating DNS
  42. // Gets public IP from 'v-list-user-ips' command (that reads /hestia/data/ips/ip), precisely from 'NAT' field
  43. $v_public_ip = $v_ip;
  44. $v_clean_ip = $_POST['v_ip']; // clean_ip = IP without quotas
  45. exec (HESTIA_CMD."v-list-user-ips ".$user." json", $output, $return_var);
  46. $ips = json_decode(implode('', $output), true);
  47. unset($output);
  48. if (isset($ips[$v_clean_ip]) && isset($ips[$v_clean_ip]['NAT']) && trim($ips[$v_clean_ip]['NAT'])!='') {
  49. $v_public_ip = trim($ips[$v_clean_ip]['NAT']);
  50. $v_public_ip = escapeshellarg($v_public_ip);
  51. }
  52. // Define domain aliases
  53. $v_aliases = $_POST['v_aliases'];
  54. $aliases = preg_replace("/\n/", ",", $v_aliases);
  55. $aliases = preg_replace("/\r/", ",", $aliases);
  56. $aliases = preg_replace("/\t/", ",", $aliases);
  57. $aliases = preg_replace("/ /", ",", $aliases);
  58. $aliases_arr = explode(",", $aliases);
  59. $aliases_arr = array_unique($aliases_arr);
  60. $aliases_arr = array_filter($aliases_arr);
  61. $aliases = implode(",",$aliases_arr);
  62. $aliases = escapeshellarg($aliases);
  63. if (empty($_POST['v_aliases'])) $aliases = 'none';
  64. // Define proxy extensions
  65. $v_proxy_ext = $_POST['v_proxy_ext'];
  66. $proxy_ext = preg_replace("/\n/", ",", $v_proxy_ext);
  67. $proxy_ext = preg_replace("/\r/", ",", $proxy_ext);
  68. $proxy_ext = preg_replace("/\t/", ",", $proxy_ext);
  69. $proxy_ext = preg_replace("/ /", ",", $proxy_ext);
  70. $proxy_ext_arr = explode(",", $proxy_ext);
  71. $proxy_ext_arr = array_unique($proxy_ext_arr);
  72. $proxy_ext_arr = array_filter($proxy_ext_arr);
  73. $proxy_ext = implode(",",$proxy_ext_arr);
  74. $proxy_ext = escapeshellarg($proxy_ext);
  75. // Define other options
  76. $v_elog = $_POST['v_elog'];
  77. $v_ssl = $_POST['v_ssl'];
  78. $v_ssl_crt = $_POST['v_ssl_crt'];
  79. $v_ssl_key = $_POST['v_ssl_key'];
  80. $v_ssl_ca = $_POST['v_ssl_ca'];
  81. $v_ssl_home = $data[$v_domain]['SSL_HOME'];
  82. $v_letsencrypt = $_POST['v_letsencrypt'];
  83. $v_stats = escapeshellarg($_POST['v_stats']);
  84. $v_stats_user = $data[$v_domain]['STATS_USER'];
  85. $v_stats_password = $data[$v_domain]['STATS_PASSWORD'];
  86. $v_custom_doc_domain = $_POST['v-custom-doc-domain'];
  87. $v_custom_doc_folder = $_POST['v-custom-doc-folder'];
  88. $v_custom_doc_root_prepath = '/home/'.$user.'/web/';
  89. $v_ftp = $_POST['v_ftp'];
  90. $v_ftp_user = $_POST['v_ftp_user'];
  91. $v_ftp_password = $_POST['v_ftp_password'];
  92. $v_ftp_email = $_POST['v_ftp_email'];
  93. if (!empty($v_domain)) $v_ftp_user_prepath .= $v_domain;
  94. exec (HESTIA_CMD."v-list-user ".$user." json", $output, $return_var);
  95. $user_config = json_decode(implode('', $output), true);
  96. unset($output);
  97. $v_template = $user_config[$user]['TEMPLATE'];
  98. $v_backend_template = $user_config[$user]['BACKEND_TEMPLATE'];
  99. $v_proxy_template = $user_config[$user]['PROXY_TEMPLATE'];
  100. // Set advanced option checkmark
  101. if (!empty($_POST['v_proxy'])) $v_adv = 'yes'; $v_proxy = "yes";
  102. if (!empty($_POST['v_ftp'])) $v_adv = 'yes';
  103. if ($_POST['v_proxy_ext'] != $v_proxy_ext) $v_adv = 'yes';
  104. if ((!empty($_POST['v_aliases'])) && ($_POST['v_aliases'] != 'www.'.$_POST['v_domain'])) $v_adv = 'yes';
  105. if ((!empty($_POST['v_ssl'])) || (!empty($_POST['v_elog']))) $v_adv = 'yes';
  106. if ((!empty($_POST['v_ssl_crt'])) || (!empty($_POST['v_ssl_key']))) $v_adv = 'yes';
  107. if ((!empty($_POST['v_ssl_ca'])) || ($_POST['v_stats'] != 'none')) $v_adv = 'yes';
  108. if ((!empty($_POST['v_letsencrypt']))) $v_adv = 'yes';
  109. if (!empty($_POST['v_custom_doc_root_check'])){$v_adv = 'yes'; $v_custom_doc_root = 1; }
  110. // Check advanced features
  111. if (empty($_POST['v_dns'])) $v_dns = 'off';
  112. if (empty($_POST['v_mail'])) $v_mail = 'off';
  113. if (empty($_POST['v_proxy'])) $v_proxy = 'off';
  114. // Add web domain
  115. if (empty($_SESSION['error_msg'])) {
  116. exec (HESTIA_CMD."v-add-web-domain ".$user." ".escapeshellarg($v_domain)." ".$v_ip." 'yes' ".$aliases." ".$proxy_ext, $output, $return_var);
  117. check_return_code($return_var,$output);
  118. unset($output);
  119. $domain_added = empty($_SESSION['error_msg']);
  120. }
  121. // Add DNS domain
  122. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  123. exec (HESTIA_CMD."v-add-dns-domain ".$user." ".escapeshellarg($v_domain)." ".$v_public_ip." '' '' '' '' '' '' '' '' 'no'", $output, $return_var);
  124. check_return_code($return_var,$output);
  125. unset($output);
  126. }
  127. // Add DNS for domain aliases
  128. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  129. foreach ($aliases_arr as $alias) {
  130. if ($alias != "www.".$v_domain) {
  131. $alias = escapeshellarg($alias);
  132. exec (HESTIA_CMD."v-add-dns-on-web-alias ".$user." ".$alias." ".$v_ip." 'no'", $output, $return_var);
  133. check_return_code($return_var,$output);
  134. unset($output);
  135. }
  136. }
  137. }
  138. // Add mail domain
  139. if (($_POST['v_mail'] == 'on') && (empty($_SESSION['error_msg']))) {
  140. exec (HESTIA_CMD."v-add-mail-domain ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  141. check_return_code($return_var,$output);
  142. unset($output);
  143. }
  144. // Delete proxy support
  145. if ((!empty($_SESSION['PROXY_SYSTEM'])) && ($_POST['v_proxy'] == 'off') && (empty($_SESSION['error_msg']))) {
  146. $ext = escapeshellarg($ext);
  147. exec (HESTIA_CMD."v-delete-web-domain-proxy ".$user." ".escapeshellarg($v_domain)." 'no'", $output, $return_var);
  148. check_return_code($return_var,$output);
  149. unset($output);
  150. $restart_web = 'yes';
  151. }
  152. // Change template
  153. if (($v_template != $_POST['v_template']) && (empty($_SESSION['error_msg']))) {
  154. exec (HESTIA_CMD."v-change-web-domain-tpl ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($_POST['v_template'])." 'no'", $output, $return_var);
  155. check_return_code($return_var,$output);
  156. unset($output);
  157. $restart_web = 'yes';
  158. }
  159. // Change backend template
  160. if ((!empty($_SESSION['WEB_BACKEND'])) && ( $v_backend_template != $_POST['v_backend_template']) && (empty($_SESSION['error_msg']))) {
  161. $v_backend_template = $_POST['v_backend_template'];
  162. exec (HESTIA_CMD."v-change-web-domain-backend-tpl ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($v_backend_template), $output, $return_var);
  163. check_return_code($return_var,$output);
  164. unset($output);
  165. }
  166. // Change proxy template / Update extension list
  167. if ((!empty($_SESSION['PROXY_SYSTEM'])) && (!empty($v_proxy)) && (!empty($_POST['v_proxy'])) && (empty($_SESSION['error_msg'])) ) {
  168. $ext = preg_replace("/\n/", " ", $_POST['v_proxy_ext']);
  169. $ext = preg_replace("/,/", " ", $ext);
  170. $ext = preg_replace('/\s+/', ' ',$ext);
  171. $ext = trim($ext);
  172. $ext = str_replace(' ', ", ", $ext);
  173. if (( $v_proxy_template != $_POST['v_proxy_template']) || ($v_proxy_ext != $ext)) {
  174. $ext = str_replace(', ', ",", $ext);
  175. if (!empty($_POST['v_proxy_template'])) $v_proxy_template = $_POST['v_proxy_template'];
  176. exec (HESTIA_CMD."v-change-web-domain-proxy-tpl ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($v_proxy_template)." ".escapeshellarg($ext)." 'no'", $output, $return_var);
  177. check_return_code($return_var,$output);
  178. $v_proxy_ext = str_replace(',', ', ', $ext);
  179. unset($output);
  180. $restart_proxy = 'yes';
  181. }
  182. }
  183. // Add Lets Encrypt support
  184. if ((!empty($_POST['v_letsencrypt'])) && (empty($_SESSION['error_msg']))) {
  185. exec (HESTIA_CMD."v-schedule-letsencrypt-domain ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  186. check_return_code($return_var,$output);
  187. unset($output);
  188. if(!empty($_POST['v_ssl_forcessl']) && $_POST['v_ssl_forcessl'] = 'yes'){
  189. exec (HESTIA_CMD."v-add-web-domain-ssl-preset ".$user." ".escapeshellarg($v_domain)." 'yes'", $output, $return_var);
  190. check_return_code($return_var,$output);
  191. unset ($output);
  192. }
  193. } else {
  194. // Add SSL certificates only if Lets Encrypt is off
  195. if ((!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  196. exec ('mktemp -d', $output, $return_var);
  197. $tmpdir = $output[0];
  198. unset($output);
  199. // Save certificate
  200. if (!empty($_POST['v_ssl_crt'])) {
  201. $fp = fopen($tmpdir."/".$_POST['v_domain'].".crt", 'w');
  202. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_crt']));
  203. fwrite($fp, "\n");
  204. fclose($fp);
  205. }
  206. // Save private key
  207. if (!empty($_POST['v_ssl_key'])) {
  208. $fp = fopen($tmpdir."/".$_POST['v_domain'].".key", 'w');
  209. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_key']));
  210. fwrite($fp, "\n");
  211. fclose($fp);
  212. }
  213. // Save CA bundle
  214. if (!empty($_POST['v_ssl_ca'])) {
  215. $fp = fopen($tmpdir."/".$_POST['v_domain'].".ca", 'w');
  216. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_ca']));
  217. fwrite($fp, "\n");
  218. fclose($fp);
  219. }
  220. $v_ssl_home = escapeshellarg($_POST['v_ssl_home']);
  221. exec (HESTIA_CMD."v-add-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." ".$tmpdir." ".$v_ssl_home." 'no'", $output, $return_var);
  222. check_return_code($return_var,$output);
  223. unset($output);
  224. if(!empty($_POST['v_ssl_forcessl']) && $_POST['v_ssl_forcessl'] = 'yes'){
  225. exec (HESTIA_CMD."v-add-web-domain-ssl-force ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  226. check_return_code($return_var,$output);
  227. unset ($output);
  228. }
  229. // Cleanup certificate tempfiles
  230. if (!empty($_POST['v_ssl_crt'])) unlink($tmpdir."/".$v_domain.".crt");
  231. if (!empty($_POST['v_ssl_key'])) unlink($tmpdir."/".$v_domain.".key");
  232. if (!empty($_POST['v_ssl_ca'])) unlink($tmpdir."/".$v_domain.".ca");
  233. rmdir($tmpdir);
  234. }
  235. }
  236. // Add web stats
  237. if ((!empty($_POST['v_stats'])) && ($_POST['v_stats'] != 'none' ) && (empty($_SESSION['error_msg']))) {
  238. $v_stats = escapeshellarg($_POST['v_stats']);
  239. exec (HESTIA_CMD."v-add-web-domain-stats ".$user." ".escapeshellarg($v_domain)." ".$v_stats, $output, $return_var);
  240. check_return_code($return_var,$output);
  241. unset($output);
  242. }
  243. // Add web stats password
  244. if ((!empty($_POST['v_stats_user'])) && (empty($_SESSION['error_msg']))) {
  245. $v_stats_user = escapeshellarg($_POST['v_stats_user']);
  246. $v_stats_password = tempnam("/tmp","vst");
  247. $fp = fopen($v_stats_password, "w");
  248. fwrite($fp, $_POST['v_stats_password']."\n");
  249. fclose($fp);
  250. exec (HESTIA_CMD."v-add-web-domain-stats-user ".$user." ".escapeshellarg($v_domain)." ".$v_stats_user." ".$v_stats_password, $output, $return_var);
  251. check_return_code($return_var,$output);
  252. unset($output);
  253. unlink($v_stats_password);
  254. $v_stats_password = escapeshellarg($_POST['v_stats_password']);
  255. }
  256. if ( !empty($_POST['v-custom-doc-domain']) && !empty($_POST['v_custom_doc_root_check']) && $v_custom_doc_root_prepath.$v_custom_doc_domain.'/public_html'.$v_custom_doc_folder != $v_custom_doc_root){
  257. if($_POST['v-custom-doc-domain'] == $v_domain && empty($_POST['v-custom-doc-folder'])){
  258. }else{
  259. $v_custom_doc_domain = escapeshellarg($_POST['v-custom-doc-domain']);
  260. if(substr($_POST['v-custom-doc-folder'], -1) == '/'){
  261. $v_custom_doc_folder = escapeshellarg(substr($_POST['v-custom-doc-folder'],0,-1));
  262. }else{
  263. $v_custom_doc_folder = escapeshellarg($_POST['v-custom-doc-folder']);
  264. }
  265. $v_custom_doc_folder = escapeshellarg($_POST['v-custom-doc-folder']);
  266. $v_domain = escapeshellarg(trim($_POST['v_domain']));
  267. exec(HESTIA_CMD."v-change-web-domain-docroot ".$user." ".$v_domain." ".$v_custom_doc_domain." ".$v_custom_doc_folder." yes", $output, $return_var);
  268. check_return_code($return_var,$output);
  269. unset($output);
  270. $v_custom_doc_root = 1;
  271. }
  272. }else{
  273. unset($v_custom_doc_root);
  274. }
  275. // Restart DNS server
  276. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  277. exec (HESTIA_CMD."v-restart-dns", $output, $return_var);
  278. check_return_code($return_var,$output);
  279. unset($output);
  280. }
  281. // Restart web server
  282. if (empty($_SESSION['error_msg'])) {
  283. exec (HESTIA_CMD."v-restart-web", $output, $return_var);
  284. check_return_code($return_var,$output);
  285. unset($output);
  286. }
  287. // Restart proxy server
  288. if ((!empty($_SESSION['PROXY_SYSTEM'])) && ($_POST['v_proxy'] == 'on') && (empty($_SESSION['error_msg']))) {
  289. exec (HESTIA_CMD."v-restart-proxy", $output, $return_var);
  290. check_return_code($return_var,$output);
  291. unset($output);
  292. }
  293. // Add FTP
  294. if ((!empty($_POST['v_ftp'])) && (empty($_SESSION['error_msg']))) {
  295. $v_ftp_users_updated = array();
  296. foreach ($_POST['v_ftp_user'] as $i => $v_ftp_user_data) {
  297. if ($v_ftp_user_data['is_new'] == 1) {
  298. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (!filter_var($v_ftp_user_data['v_ftp_email'], FILTER_VALIDATE_EMAIL))) $_SESSION['error_msg'] = _('Please enter valid email address.');
  299. if (empty($v_ftp_user_data['v_ftp_user'])) $errors[] = 'ftp user';
  300. if (empty($v_ftp_user_data['v_ftp_password'])) $errors[] = 'ftp user password';
  301. if (!empty($errors[0])) {
  302. foreach ($errors as $i => $error) {
  303. if ( $i == 0 ) {
  304. $error_msg = $error;
  305. } else {
  306. $error_msg = $error_msg.", ".$error;
  307. }
  308. }
  309. $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'),$error_msg);
  310. }
  311. // Validate email
  312. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (!filter_var($v_ftp_user_data['v_ftp_email'], FILTER_VALIDATE_EMAIL))) {
  313. $_SESSION['error_msg'] = _('Please enter valid email address.');
  314. }
  315. // Check ftp password length
  316. if ((!empty($v_ftp_user_data['v_ftp']))) {
  317. if (!empty($v_ftp_user_data['v_ftp_user'])) {
  318. $pw_len = strlen($v_ftp_user_data['v_ftp_password']);
  319. if ($pw_len < 6 ) $_SESSION['error_msg'] = _('Password is too short.',$error_msg);
  320. }
  321. }
  322. $v_ftp_user_data['v_ftp_user'] = preg_replace("/^".$user."_/i", "", $v_ftp_user_data['v_ftp_user']);
  323. $v_ftp_username = $v_ftp_user_data['v_ftp_user'];
  324. $v_ftp_username_full = $user . '_' . $v_ftp_user_data['v_ftp_user'];
  325. $v_ftp_user = escapeshellarg($v_ftp_user_data['v_ftp_user']);
  326. if ($domain_added) {
  327. $v_ftp_path = escapeshellarg(trim($v_ftp_user_data['v_ftp_path']));
  328. $v_ftp_password = tempnam("/tmp","vst");
  329. $fp = fopen($v_ftp_password, "w");
  330. fwrite($fp, $v_ftp_user_data['v_ftp_password']."\n");
  331. fclose($fp);
  332. exec (HESTIA_CMD."v-add-web-domain-ftp ".$user." ".escapeshellarg($v_domain)." ".$v_ftp_user." ".$v_ftp_password . " " . $v_ftp_path, $output, $return_var);
  333. check_return_code($return_var,$output);
  334. unset($output);
  335. unlink($v_ftp_password);
  336. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (empty($_SESSION['error_msg']))) {
  337. $to = $v_ftp_user_data['v_ftp_email'];
  338. $subject = _("FTP login credentials");
  339. $from = sprintf(_('MAIL_FROM'), $v_domain );
  340. $mailtext = sprintf(_('FTP_ACCOUNT_READY'),$v_domain,$user,$v_ftp_user_data['v_ftp_user'],$v_ftp_user_data['v_ftp_password']);
  341. send_email($to, $subject, $mailtext, $from);
  342. unset($v_ftp_email);
  343. }
  344. } else {
  345. $return_var = -1;
  346. }
  347. if ($return_var == 0) {
  348. $v_ftp_password = "••••••••";
  349. $v_ftp_user_data['is_new'] = 0;
  350. } else {
  351. $v_ftp_user_data['is_new'] = 1;
  352. }
  353. $v_ftp_username = $user.'_'.$v_ftp_user_data['v_ftp_user'];
  354. $v_ftp_users_updated[] = array(
  355. 'is_new' => $v_ftp_user_data['is_new'],
  356. 'v_ftp_user' => $return_var == 0 ? $v_ftp_username_full : $v_ftp_username,
  357. 'v_ftp_password' => $v_ftp_password,
  358. 'v_ftp_path' => $v_ftp_user_data['v_ftp_path'],
  359. 'v_ftp_email' => $v_ftp_user_data['v_ftp_email'],
  360. 'v_ftp_pre_path' => $v_ftp_user_prepath
  361. );
  362. continue;
  363. }
  364. }
  365. if (!empty($_SESSION['error_msg']) && $domain_added) {
  366. $_SESSION['ok_msg'] = sprintf(_('WEB_DOMAIN_CREATED_OK'),htmlentities($v_domain),htmlentities($v_domain));
  367. $_SESSION['flash_error_msg'] = $_SESSION['error_msg'];
  368. $url = '/edit/web/?domain='.strtolower(preg_replace("/^www\./i", "", $v_domain));
  369. header('Location: ' . $url);
  370. exit;
  371. }
  372. }
  373. // Flush field values on success
  374. if (empty($_SESSION['error_msg'])) {
  375. $_SESSION['ok_msg'] = sprintf(_('WEB_DOMAIN_CREATED_OK'),htmlentities($v_domain),htmlentities($v_domain));
  376. unset($v_domain);
  377. unset($v_aliases);
  378. unset($v_ssl);
  379. unset($v_ssl_crt);
  380. unset($v_ssl_key);
  381. unset($v_ssl_ca);
  382. unset($v_stats_user);
  383. unset($v_stats_password);
  384. unset($v_ftp);
  385. }
  386. }
  387. // Define user variables
  388. $v_ftp_user_prepath = $panel[$user]['HOME'] . "/web";
  389. $v_ftp_email = $panel[$user]['CONTACT'];
  390. $v_custom_doc_root_prepath = '/home/'.$user.'/web/';
  391. if( $_POST['v_ssl_forcessl'] != 'no' ){
  392. $v_ssl_forcessl = 'yes';
  393. }else{
  394. $v_ssl_forcessl = 'no';
  395. }
  396. // List user package
  397. exec (HESTIA_CMD."v-list-user ".$user." json", $output, $return_var);
  398. $user_config = json_decode(implode('', $output), true);
  399. unset($output);
  400. // List web templates and set default values
  401. exec (HESTIA_CMD."v-list-web-templates json", $output, $return_var);
  402. $templates = json_decode(implode('', $output), true);
  403. unset($output);
  404. $v_template = (!empty($_POST['v_template'])) ? $_POST['v_template'] : $user_config[$user]['WEB_TEMPLATE'];
  405. // List backend templates
  406. if (!empty($_SESSION['WEB_BACKEND'])) {
  407. exec (HESTIA_CMD."v-list-web-templates-backend json", $output, $return_var);
  408. $backend_templates = json_decode(implode('', $output), true);
  409. unset($output);
  410. $v_backend_template = (!empty($_POST['v_backend_template'])) ? $_POST['v_backend_template'] : $user_config[$user]['BACKEND_TEMPLATE'];
  411. }
  412. // List proxy templates
  413. if (!empty($_SESSION['PROXY_SYSTEM'])) {
  414. exec (HESTIA_CMD."v-list-web-templates-proxy json", $output, $return_var);
  415. $proxy_templates = json_decode(implode('', $output), true);
  416. unset($output);
  417. $v_proxy_template = (!empty($_POST['v_proxy_template'])) ? $_POST['v_proxy_template'] : $user_config[$user]['PROXY_TEMPLATE'];
  418. }
  419. // List IP addresses
  420. exec (HESTIA_CMD."v-list-user-ips ".$user." json", $output, $return_var);
  421. $ips = json_decode(implode('', $output), true);
  422. unset($output);
  423. // List web stat engines
  424. exec (HESTIA_CMD."v-list-web-stats json", $output, $return_var);
  425. $stats = json_decode(implode('', $output), true);
  426. unset($output);
  427. // Get all user domains
  428. exec (HESTIA_CMD."v-list-web-domains ".escapeshellarg($user)." json", $output, $return_var);
  429. $user_domains = json_decode(implode('', $output), true);
  430. $user_domains = array_keys($user_domains);
  431. unset($output);
  432. // Render page
  433. render_page($user, $TAB, 'add_web');
  434. // Flush session messages
  435. unset($_SESSION['error_msg']);
  436. unset($_SESSION['ok_msg']);