index.php 44 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000
  1. <?php
  2. error_reporting(NULL);
  3. ob_start();
  4. unset($_SESSION['error_msg']);
  5. $TAB = 'WEB';
  6. // Main include
  7. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  8. // Check domain argument
  9. if (empty($_GET['domain'])) {
  10. header("Location: /list/web/");
  11. exit;
  12. }
  13. // Edit as someone else?
  14. if (($_SESSION['userContext'] === 'admin') && (!empty($_GET['user']))) {
  15. $user=escapeshellarg($_GET['user']);
  16. }
  17. // Get all user domains
  18. exec (HESTIA_CMD."v-list-web-domains ".escapeshellarg($user)." json", $output, $return_var);
  19. $user_domains = json_decode(implode('', $output), true);
  20. $user_domains = array_keys($user_domains);
  21. unset($output);
  22. // List domain
  23. $v_domain = $_GET['domain'];
  24. if ($_SESSION['userContext'] !== 'admin') {
  25. if(!in_array($v_domain, $user_domains)) {
  26. header("Location: /list/mail/");
  27. exit;
  28. }
  29. }
  30. exec (HESTIA_CMD."v-list-web-domain ".$user." ".escapeshellarg($v_domain)." json", $output, $return_var);
  31. $data = json_decode(implode('', $output), true);
  32. unset($output);
  33. // Parse domain
  34. $v_username = $user;
  35. $v_ip = $data[$v_domain]['IP'];
  36. $v_template = $data[$v_domain]['TPL'];
  37. $v_aliases = str_replace(',', "\n", $data[$v_domain]['ALIAS']);
  38. $valiases = explode(",", $data[$v_domain]['ALIAS']);
  39. $v_tpl = $data[$v_domain]['IP'];
  40. $v_cgi = $data[$v_domain]['CGI'];
  41. $v_elog = $data[$v_domain]['ELOG'];
  42. $v_ssl = $data[$v_domain]['SSL'];
  43. if (!empty($v_ssl)) {
  44. exec (HESTIA_CMD."v-list-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." json", $output, $return_var);
  45. $ssl_str = json_decode(implode('', $output), true);
  46. unset($output);
  47. $v_ssl_crt = $ssl_str[$v_domain]['CRT'];
  48. $v_ssl_key = $ssl_str[$v_domain]['KEY'];
  49. $v_ssl_ca = $ssl_str[$v_domain]['CA'];
  50. $v_ssl_subject = $ssl_str[$v_domain]['SUBJECT'];
  51. $v_ssl_aliases = $ssl_str[$v_domain]['ALIASES'];
  52. $v_ssl_not_before = $ssl_str[$v_domain]['NOT_BEFORE'];
  53. $v_ssl_not_after = $ssl_str[$v_domain]['NOT_AFTER'];
  54. $v_ssl_signature = $ssl_str[$v_domain]['SIGNATURE'];
  55. $v_ssl_pub_key = $ssl_str[$v_domain]['PUB_KEY'];
  56. $v_ssl_issuer = $ssl_str[$v_domain]['ISSUER'];
  57. $v_ssl_forcessl = $data[$v_domain]['SSL_FORCE'];
  58. $v_ssl_hsts = $data[$v_domain]['SSL_HSTS'];
  59. }
  60. $v_letsencrypt = $data[$v_domain]['LETSENCRYPT'];
  61. if (empty($v_letsencrypt)) $v_letsencrypt = 'no';
  62. $v_ssl_home = $data[$v_domain]['SSL_HOME'];
  63. $v_backend_template = $data[$v_domain]['BACKEND'];
  64. $v_nginx_cache = $data[$v_domain]['FASTCGI_CACHE'];
  65. $v_nginx_cache_duration = $data[$v_domain]['FASTCGI_DURATION'];
  66. $v_nginx_cache_check = '';
  67. if(empty($v_nginx_cache_duration)){
  68. $v_nginx_cache_duration = '2m';
  69. $v_nginx_cache_check = '';
  70. }else{
  71. $v_nginx_cache_check = 'on';
  72. }
  73. $v_proxy = $data[$v_domain]['PROXY'];
  74. $v_proxy_template = $data[$v_domain]['PROXY'];
  75. $v_proxy_ext = str_replace(',', ', ', $data[$v_domain]['PROXY_EXT']);
  76. $v_stats = $data[$v_domain]['STATS'];
  77. $v_stats_user = $data[$v_domain]['STATS_USER'];
  78. if (!empty($v_stats_user)) $v_stats_password = "";
  79. $v_custom_doc_root_prepath = '/home/'.$v_username.'/web/';
  80. if(!empty($data[$v_domain]['CUSTOM_DOCROOT']))
  81. $v_custom_doc_root = realpath($data[$v_domain]['CUSTOM_DOCROOT']) . DIRECTORY_SEPARATOR;
  82. if(!empty($v_custom_doc_root) &&
  83. false !== preg_match('/\/home\/'.$v_username.'\/web\/([[:alnum:]].*?)\/public_html\/([[:alnum:]].*)?/', $v_custom_doc_root, $matches) ) {
  84. if(!empty($matches[1]))
  85. $v_custom_doc_domain = $matches[1];
  86. if(!empty($matches[2]))
  87. $v_custom_doc_folder = rtrim($matches[2], '/');
  88. if($v_custom_doc_domain && !in_array($v_custom_doc_domain, $user_domains)) {
  89. $v_custom_doc_domain = '';
  90. $v_custom_doc_folder = '';
  91. }
  92. }
  93. $redirect_code_options = array(301,302);
  94. $v_redirect = $data[$v_domain]['REDIRECT'];
  95. $v_redirect_code = $data[$v_domain]['REDIRECT_CODE'];
  96. if ( !in_array($v_redirect, array('www.'.$v_domain, $v_domain))){
  97. $v_redirect_custom = $v_redirect;
  98. }
  99. $v_ftp_user = $data[$v_domain]['FTP_USER'];
  100. $v_ftp_path = $data[$v_domain]['FTP_PATH'];
  101. if (!empty($v_ftp_user)) $v_ftp_password = "";
  102. if($v_custom_doc_domain != ''){
  103. $v_ftp_user_prepath = '/home/'.$v_username.'/web/'.$v_custom_doc_domain;
  104. }else{
  105. $v_ftp_user_prepath = '/home/'.$v_username.'/web/'.$v_domain;
  106. }
  107. $v_ftp_email = $panel[$user]['CONTACT'];
  108. $v_suspended = $data[$v_domain]['SUSPENDED'];
  109. if ( $v_suspended == 'yes' ) {
  110. $v_status = 'suspended';
  111. } else {
  112. $v_status = 'active';
  113. }
  114. $v_time = $data[$v_domain]['TIME'];
  115. $v_date = $data[$v_domain]['DATE'];
  116. // List ip addresses
  117. exec (HESTIA_CMD."v-list-user-ips ".$user." json", $output, $return_var);
  118. $ips = json_decode(implode('', $output), true);
  119. unset($output);
  120. $v_ip_public = empty($ips[$v_ip]['NAT']) ? $v_ip : $ips[$v_ip]['NAT'];
  121. // List web templates
  122. exec (HESTIA_CMD."v-list-web-templates json", $output, $return_var);
  123. $templates = json_decode(implode('', $output), true);
  124. unset($output);
  125. // List backend templates
  126. if (!empty($_SESSION['WEB_BACKEND'])) {
  127. exec (HESTIA_CMD."v-list-web-templates-backend json", $output, $return_var);
  128. $backend_templates = json_decode(implode('', $output), true);
  129. unset($output);
  130. }
  131. // List proxy templates
  132. if (!empty($_SESSION['PROXY_SYSTEM'])) {
  133. exec (HESTIA_CMD."v-list-web-templates-proxy json", $output, $return_var);
  134. $proxy_templates = json_decode(implode('', $output), true);
  135. unset($output);
  136. }
  137. // List web stat engines
  138. exec (HESTIA_CMD."v-list-web-stats json", $output, $return_var);
  139. $stats = json_decode(implode('', $output), true);
  140. unset($output);
  141. // Check POST request
  142. if (!empty($_POST['save'])) {
  143. $v_domain = $_POST['v_domain'];
  144. if(!in_array($v_domain, $user_domains)) {
  145. check_return_code(3, ["Unknown domain"]);
  146. }
  147. // Check token
  148. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  149. header('location: /login/');
  150. exit();
  151. }
  152. // Change web domain IP
  153. $v_newip='';
  154. $v_newip_public='';
  155. if(!empty($_POST['v_ip'])) {
  156. $v_newip = $_POST['v_ip'];
  157. $v_newip_public = empty($ips[$v_newip]['NAT']) ? $v_newip : $ips[$v_newip]['NAT'];
  158. }
  159. if (($v_ip != $_POST['v_ip']) && (empty($_SESSION['error_msg']))) {
  160. exec (HESTIA_CMD."v-change-web-domain-ip ".$v_username." ".escapeshellarg($v_domain)." ".escapeshellarg($_POST['v_ip'])." 'no'", $output, $return_var);
  161. check_return_code($return_var,$output);
  162. $restart_web = 'yes';
  163. $restart_proxy = 'yes';
  164. unset($output);
  165. }
  166. // Change dns domain IP
  167. if (($v_ip != $_POST['v_ip']) && (empty($_SESSION['error_msg']))) {
  168. exec (HESTIA_CMD."v-list-dns-domain ".$v_username." ".escapeshellarg($v_domain)." json", $output, $return_var);
  169. unset($output);
  170. if ($return_var == 0 ) {
  171. exec (HESTIA_CMD."v-change-dns-domain-ip ".$v_username." ".escapeshellarg($v_domain)." ".escapeshellarg($v_newip_public)." 'no'", $output, $return_var);
  172. check_return_code($return_var,$output);
  173. unset($output);
  174. $restart_dns = 'yes';
  175. }
  176. }
  177. // Change dns ip for each alias
  178. if (($v_ip != $_POST['v_ip']) && (empty($_SESSION['error_msg']))) {
  179. foreach($valiases as $v_alias ){
  180. exec (HESTIA_CMD."v-list-dns-domain ".$v_username." ".escapeshellarg($v_alias)." json", $output, $return_var);
  181. unset($output);
  182. if ($return_var == 0 ) {
  183. exec (HESTIA_CMD."v-change-dns-domain-ip ".$v_username." ".escapeshellarg($v_alias)." ".escapeshellarg($v_newip_public), $output, $return_var);
  184. check_return_code($return_var,$output);
  185. unset($output);
  186. $restart_dns = 'yes';
  187. }
  188. }
  189. }
  190. // Change mail domain IP
  191. if (($v_ip != $_POST['v_ip']) && (empty($_SESSION['error_msg']))) {
  192. exec (HESTIA_CMD."v-list-mail-domain ".$v_username." ".escapeshellarg($v_domain)." json", $output, $return_var);
  193. unset($output);
  194. if ($return_var == 0 ) {
  195. exec (HESTIA_CMD."v-rebuild-mail-domain ".$v_username." ".escapeshellarg($v_domain), $output, $return_var);
  196. check_return_code($return_var,$output);
  197. unset($output);
  198. $restart_email = 'yes';
  199. }
  200. }
  201. // Change template
  202. if (($v_template != $_POST['v_template']) && (empty($_SESSION['error_msg']))) {
  203. exec (HESTIA_CMD."v-change-web-domain-tpl ".$v_username." ".escapeshellarg($v_domain)." ".escapeshellarg($_POST['v_template'])." 'no'", $output, $return_var);
  204. check_return_code($return_var,$output);
  205. unset($output);
  206. $restart_web = 'yes';
  207. }
  208. // Change aliases
  209. if (empty($_SESSION['error_msg'])) {
  210. $waliases = preg_replace("/\n/", " ", $_POST['v_aliases']);
  211. $waliases = preg_replace("/,/", " ", $waliases);
  212. $waliases = preg_replace('/\s+/', ' ',$waliases);
  213. $waliases = trim($waliases);
  214. $aliases = explode(" ", $waliases);
  215. $v_aliases = str_replace(' ', "\n", $waliases);
  216. $result = array_diff($valiases, $aliases);
  217. foreach ($result as $alias) {
  218. if ((empty($_SESSION['error_msg'])) && (!empty($alias))) {
  219. $restart_web = 'yes';
  220. $restart_proxy = 'yes';
  221. exec (HESTIA_CMD."v-delete-web-domain-alias ".$v_username." ".escapeshellarg($v_domain)." ".escapeshellarg($alias)." 'no'", $output, $return_var);
  222. check_return_code($return_var,$output);
  223. unset($output);
  224. if (empty($_SESSION['error_msg'])) {
  225. exec (HESTIA_CMD."v-list-dns-domain ".$v_username." ".escapeshellarg($v_domain), $output, $return_var);
  226. unset($output);
  227. if ($return_var == 0) {
  228. exec (HESTIA_CMD."v-delete-dns-on-web-alias ".$v_username." ".escapeshellarg($v_domain)." ".escapeshellarg($alias)." 'no'", $output, $return_var);
  229. check_return_code($return_var,$output);
  230. unset($output);
  231. $restart_dns = 'yes';
  232. }
  233. }
  234. }
  235. }
  236. $result = array_diff($aliases, $valiases);
  237. foreach ($result as $alias) {
  238. if ((empty($_SESSION['error_msg'])) && (!empty($alias))) {
  239. $restart_web = 'yes';
  240. $restart_proxy = 'yes';
  241. exec (HESTIA_CMD."v-add-web-domain-alias ".$v_username." ".escapeshellarg($v_domain)." ".escapeshellarg($alias)." 'no'", $output, $return_var);
  242. check_return_code($return_var,$output);
  243. unset($output);
  244. if (empty($_SESSION['error_msg'])) {
  245. exec (HESTIA_CMD."v-list-dns-domain ".$v_username." ".escapeshellarg($v_domain), $output, $return_var);
  246. unset($output);
  247. if ($return_var == 0) {
  248. exec (HESTIA_CMD."v-add-dns-on-web-alias ".$v_username." ".escapeshellarg($alias)." ".escapeshellarg($v_newip_public ?: $v_ip_public)." no", $output, $return_var);
  249. check_return_code($return_var,$output);
  250. unset($output);
  251. $restart_dns = 'yes';
  252. }
  253. }
  254. }
  255. }
  256. // Regenerate LE if aliases are different
  257. if ((!empty($_POST['v_ssl'])) && ( $v_letsencrypt == 'yes' ) && (!empty($_POST['v_letsencrypt'])) && empty($_SESSION['error_msg'])) {
  258. // If aliases are different from stored aliases
  259. if (array_diff($valiases,$aliases) || array_diff($aliases,$valiases)) {
  260. // Add certificate with new aliases
  261. $l_aliases = str_replace("\n", ',', $v_aliases);
  262. exec (HESTIA_CMD."v-add-letsencrypt-domain ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($l_aliases)." ''", $output, $return_var);
  263. check_return_code($return_var,$output);
  264. unset($output);
  265. $v_letsencrypt = 'yes';
  266. $v_ssl = 'yes';
  267. $restart_web = 'yes';
  268. $restart_proxy = 'yes';
  269. exec (HESTIA_CMD."v-list-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." json", $output, $return_var);
  270. $ssl_str = json_decode(implode('', $output), true);
  271. unset($output);
  272. $v_ssl_crt = $ssl_str[$v_domain]['CRT'];
  273. $v_ssl_key = $ssl_str[$v_domain]['KEY'];
  274. $v_ssl_ca = $ssl_str[$v_domain]['CA'];
  275. $v_ssl_subject = $ssl_str[$v_domain]['SUBJECT'];
  276. $v_ssl_aliases = $ssl_str[$v_domain]['ALIASES'];
  277. $v_ssl_not_before = $ssl_str[$v_domain]['NOT_BEFORE'];
  278. $v_ssl_not_after = $ssl_str[$v_domain]['NOT_AFTER'];
  279. $v_ssl_signature = $ssl_str[$v_domain]['SIGNATURE'];
  280. $v_ssl_pub_key = $ssl_str[$v_domain]['PUB_KEY'];
  281. $v_ssl_issuer = $ssl_str[$v_domain]['ISSUER'];
  282. }
  283. }
  284. if ((!empty($v_stats)) && ($_POST['v_stats'] == $v_stats) && (empty($_SESSION['error_msg']))) {
  285. // Update statistics configuration when changing domain aliases
  286. $v_stats = escapeshellarg($_POST['v_stats']);
  287. exec (HESTIA_CMD."v-change-web-domain-stats ".$v_username." ".escapeshellarg($v_domain)." ".$v_stats, $output, $return_var);
  288. check_return_code($return_var,$output);
  289. unset($output);
  290. }
  291. }
  292. // Change backend template
  293. if ((!empty($_SESSION['WEB_BACKEND'])) && ( $v_backend_template != $_POST['v_backend_template']) && (empty($_SESSION['error_msg']))) {
  294. $v_backend_template = $_POST['v_backend_template'];
  295. exec (HESTIA_CMD."v-change-web-domain-backend-tpl ".$v_username." ".escapeshellarg($v_domain)." ".escapeshellarg($v_backend_template), $output, $return_var);
  296. check_return_code($return_var,$output);
  297. unset($output);
  298. }
  299. // Enable/Disable nginx cache
  300. if (($_SESSION['WEB_SYSTEM'] == 'nginx') && ($v_nginx_cache_check != $_POST['v_nginx_cache_check'] ) || ($v_nginx_cache_duration != $_POST['v_nginx_cache_duration'] && $_POST['v_nginx_cache'] = "yes" ) && (empty($_SESSION['error_msg']))) {
  301. if ( $_POST['v_nginx_cache_check'] == 'on' ) {
  302. if (empty ($_POST['v_nginx_cache_duration'])){
  303. echo $_POST['v_nginx_cache_duration'] = "2m";
  304. }
  305. exec (HESTIA_CMD."v-add-fastcgi-cache ".$v_username." ".escapeshellarg($v_domain).' '. escapeshellarg($_POST['v_nginx_cache_duration']) , $output, $return_var);
  306. check_return_code($return_var,$output);
  307. unset($output);
  308. } else {
  309. exec (HESTIA_CMD."v-delete-fastcgi-cache ".$v_username." ".escapeshellarg($v_domain), $output, $return_var);
  310. check_return_code($return_var,$output);
  311. unset($output);
  312. }
  313. $restart_web = 'yes';
  314. }
  315. // Delete proxy support
  316. if ((!empty($_SESSION['PROXY_SYSTEM'])) && (!empty($v_proxy)) && (empty($_POST['v_proxy'])) && (empty($_SESSION['error_msg']))) {
  317. exec (HESTIA_CMD."v-delete-web-domain-proxy ".$v_username." ".escapeshellarg($v_domain)." 'no'", $output, $return_var);
  318. check_return_code($return_var,$output);
  319. unset($output);
  320. unset($v_proxy);
  321. $restart_web = 'yes';
  322. }
  323. // Change proxy template / Update extension list
  324. if ((!empty($_SESSION['PROXY_SYSTEM'])) && (!empty($v_proxy)) && (!empty($_POST['v_proxy'])) && (empty($_SESSION['error_msg'])) ) {
  325. $ext = preg_replace("/\n/", " ", $_POST['v_proxy_ext']);
  326. $ext = preg_replace("/,/", " ", $ext);
  327. $ext = preg_replace('/\s+/', ' ',$ext);
  328. $ext = trim($ext);
  329. $ext = str_replace(' ', ", ", $ext);
  330. if (( $v_proxy_template != $_POST['v_proxy_template']) || ($v_proxy_ext != $ext)) {
  331. $ext = str_replace(', ', ",", $ext);
  332. if (!empty($_POST['v_proxy_template'])) $v_proxy_template = $_POST['v_proxy_template'];
  333. exec (HESTIA_CMD."v-change-web-domain-proxy-tpl ".$v_username." ".escapeshellarg($v_domain)." ".escapeshellarg($v_proxy_template)." ".escapeshellarg($ext)." 'no'", $output, $return_var);
  334. check_return_code($return_var,$output);
  335. $v_proxy_ext = str_replace(',', ', ', $ext);
  336. unset($output);
  337. $restart_proxy = 'yes';
  338. }
  339. }
  340. // Add proxy support
  341. if ((!empty($_SESSION['PROXY_SYSTEM'])) && (empty($v_proxy)) && (!empty($_POST['v_proxy'])) && (empty($_SESSION['error_msg']))) {
  342. $v_proxy_template = $_POST['v_proxy_template'];
  343. if (!empty($_POST['v_proxy_ext'])) {
  344. $ext = preg_replace("/\n/", " ", $_POST['v_proxy_ext']);
  345. $ext = preg_replace("/,/", " ", $ext);
  346. $ext = preg_replace('/\s+/', ' ',$ext);
  347. $ext = trim($ext);
  348. $ext = str_replace(' ', ",", $ext);
  349. $v_proxy_ext = str_replace(',', ', ', $ext);
  350. }
  351. exec (HESTIA_CMD."v-add-web-domain-proxy ".$v_username." ".escapeshellarg($v_domain)." ".escapeshellarg($v_proxy_template)." ".escapeshellarg($ext)." 'no'", $output, $return_var);
  352. check_return_code($return_var,$output);
  353. unset($output);
  354. $restart_proxy = 'yes';
  355. }
  356. // Change document root for ssl domain
  357. if (( $v_ssl == 'yes') && (!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  358. if ( $v_ssl_home != $_POST['v_ssl_home'] ) {
  359. $v_ssl_home = escapeshellarg($_POST['v_ssl_home']);
  360. exec (HESTIA_CMD."v-change-web-domain-sslhome ".$user." ".escapeshellarg($v_domain)." ".$v_ssl_home." 'no'", $output, $return_var);
  361. check_return_code($return_var,$output);
  362. $v_ssl_home = $_POST['v_ssl_home'];
  363. $restart_web = 'yes';
  364. $restart_proxy = 'yes';
  365. unset($output);
  366. }
  367. }
  368. // Change SSL certificate
  369. if (( $v_letsencrypt == 'no' ) && (empty($_POST['v_letsencrypt'])) && ( $v_ssl == 'yes' ) && (!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  370. if (( $v_ssl_crt != str_replace("\r\n", "\n", $_POST['v_ssl_crt'])) || ( $v_ssl_key != str_replace("\r\n", "\n", $_POST['v_ssl_key'])) || ( $v_ssl_ca != str_replace("\r\n", "\n", $_POST['v_ssl_ca']))) {
  371. exec ('mktemp -d', $mktemp_output, $return_var);
  372. $tmpdir = $mktemp_output[0];
  373. // Certificate
  374. if (!empty($_POST['v_ssl_crt'])) {
  375. $fp = fopen($tmpdir."/".$v_domain.".crt", 'w');
  376. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_crt']));
  377. fwrite($fp, "\n");
  378. fclose($fp);
  379. }
  380. // Key
  381. if (!empty($_POST['v_ssl_key'])) {
  382. $fp = fopen($tmpdir."/".$v_domain.".key", 'w');
  383. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_key']));
  384. fwrite($fp, "\n");
  385. fclose($fp);
  386. }
  387. // CA
  388. if (!empty($_POST['v_ssl_ca'])) {
  389. $fp = fopen($tmpdir."/".$v_domain.".ca", 'w');
  390. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_ca']));
  391. fwrite($fp, "\n");
  392. fclose($fp);
  393. }
  394. exec (HESTIA_CMD."v-change-web-domain-sslcert ".$user." ".escapeshellarg($v_domain)." ".$tmpdir." 'no'", $output, $return_var);
  395. check_return_code($return_var,$output);
  396. unset($output);
  397. $restart_web = 'yes';
  398. $restart_proxy = 'yes';
  399. exec (HESTIA_CMD."v-list-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." json", $output, $return_var);
  400. $ssl_str = json_decode(implode('', $output), true);
  401. unset($output);
  402. $v_ssl_crt = $ssl_str[$v_domain]['CRT'];
  403. $v_ssl_key = $ssl_str[$v_domain]['KEY'];
  404. $v_ssl_ca = $ssl_str[$v_domain]['CA'];
  405. $v_ssl_subject = $ssl_str[$v_domain]['SUBJECT'];
  406. $v_ssl_aliases = $ssl_str[$v_domain]['ALIASES'];
  407. $v_ssl_not_before = $ssl_str[$v_domain]['NOT_BEFORE'];
  408. $v_ssl_not_after = $ssl_str[$v_domain]['NOT_AFTER'];
  409. $v_ssl_signature = $ssl_str[$v_domain]['SIGNATURE'];
  410. $v_ssl_pub_key = $ssl_str[$v_domain]['PUB_KEY'];
  411. $v_ssl_issuer = $ssl_str[$v_domain]['ISSUER'];
  412. // Cleanup certificate tempfiles
  413. if (!empty($_POST['v_ssl_crt'])) unlink($tmpdir."/".$v_domain.".crt");
  414. if (!empty($_POST['v_ssl_key'])) unlink($tmpdir."/".$v_domain.".key");
  415. if (!empty($_POST['v_ssl_ca'])) unlink($tmpdir."/".$v_domain.".ca");
  416. rmdir($tmpdir);
  417. }
  418. }
  419. // Delete Lets Encrypt support
  420. if (( $v_letsencrypt == 'yes' ) && (empty($_POST['v_letsencrypt']) || empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  421. exec (HESTIA_CMD."v-delete-letsencrypt-domain ".$user." ".escapeshellarg($v_domain)." ''", $output, $return_var);
  422. check_return_code($return_var,$output);
  423. unset($output);
  424. $v_ssl_crt = '';
  425. $v_ssl_key = '';
  426. $v_ssl_ca = '';
  427. $v_letsencrypt = 'no';
  428. $v_letsencrypt_deleted = 'yes';
  429. $v_ssl = 'no';
  430. $restart_web = 'yes';
  431. $restart_proxy = 'yes';
  432. }
  433. // Delete SSL certificate
  434. if (( $v_ssl == 'yes' ) && (empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  435. exec (HESTIA_CMD."v-delete-web-domain-ssl ".$v_username." ".escapeshellarg($v_domain)." 'no'", $output, $return_var);
  436. check_return_code($return_var,$output);
  437. unset($output);
  438. $v_ssl_crt = '';
  439. $v_ssl_key = '';
  440. $v_ssl_ca = '';
  441. $v_ssl = 'no';
  442. $v_ssl_forcessl = 'no';
  443. $v_ssl_hsts = 'no';
  444. $restart_web = 'yes';
  445. $restart_proxy = 'yes';
  446. }
  447. // Add Lets Encrypt support
  448. if ((!empty($_POST['v_ssl'])) && ( $v_letsencrypt == 'no' ) && (!empty($_POST['v_letsencrypt'])) && empty($_SESSION['error_msg'])) {
  449. $l_aliases = str_replace("\n", ',', $v_aliases);
  450. exec (HESTIA_CMD."v-add-letsencrypt-domain ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($l_aliases)." ''", $output, $return_var);
  451. check_return_code($return_var,$output);
  452. unset($output);
  453. if($return_var != 0){
  454. $v_letsencrypt = 'no';
  455. }else{
  456. $v_letsencrypt = 'yes';
  457. }
  458. $v_ssl = 'yes';
  459. if($_POST['v_ssl_forcessl'] == 'on'){
  460. $v_ssl_forcessl = 'yes';
  461. }else{
  462. $v_ssl_forcessl = 'no';
  463. }
  464. $restart_web = 'yes';
  465. $restart_proxy = 'yes';
  466. }
  467. // Add SSL certificate
  468. if (( $v_ssl == 'no' ) && (!empty($_POST['v_ssl'])) && (empty($v_letsencrypt_deleted)) && (empty($_SESSION['error_msg']))) {
  469. if (empty($_POST['v_ssl_crt'])) $errors[] = 'ssl certificate';
  470. if (empty($_POST['v_ssl_key'])) $errors[] = 'ssl key';
  471. if (empty($_POST['v_ssl_home'])) $errors[] = 'ssl home';
  472. $v_ssl_home = escapeshellarg($_POST['v_ssl_home']);
  473. if (!empty($errors[0])) {
  474. foreach ($errors as $i => $error) {
  475. if ( $i == 0 ) {
  476. $error_msg = $error;
  477. } else {
  478. $error_msg = $error_msg.", ".$error;
  479. }
  480. }
  481. $_SESSION['error_msg'] = _('Field "%s" can not be blank.',$error_msg);
  482. } else {
  483. exec ('mktemp -d', $mktemp_output, $return_var);
  484. $tmpdir = $mktemp_output[0];
  485. // Certificate
  486. if (!empty($_POST['v_ssl_crt'])) {
  487. $fp = fopen($tmpdir."/".$v_domain.".crt", 'w');
  488. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_crt']));
  489. fclose($fp);
  490. }
  491. // Key
  492. if (!empty($_POST['v_ssl_key'])) {
  493. $fp = fopen($tmpdir."/".$v_domain.".key", 'w');
  494. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_key']));
  495. fclose($fp);
  496. }
  497. // CA
  498. if (!empty($_POST['v_ssl_ca'])) {
  499. $fp = fopen($tmpdir."/".$v_domain.".ca", 'w');
  500. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_ca']));
  501. fclose($fp);
  502. }
  503. exec (HESTIA_CMD."v-add-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." ".$tmpdir." ".$v_ssl_home." 'no'", $output, $return_var);
  504. check_return_code($return_var,$output);
  505. unset($output);
  506. $v_ssl = 'yes';
  507. $restart_web = 'yes';
  508. $restart_proxy = 'yes';
  509. exec (HESTIA_CMD."v-list-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." json", $output, $return_var);
  510. $ssl_str = json_decode(implode('', $output), true);
  511. unset($output);
  512. $v_ssl_crt = $ssl_str[$v_domain]['CRT'];
  513. $v_ssl_key = $ssl_str[$v_domain]['KEY'];
  514. $v_ssl_ca = $ssl_str[$v_domain]['CA'];
  515. $v_ssl_subject = $ssl_str[$v_domain]['SUBJECT'];
  516. $v_ssl_aliases = $ssl_str[$v_domain]['ALIASES'];
  517. $v_ssl_not_before = $ssl_str[$v_domain]['NOT_BEFORE'];
  518. $v_ssl_not_after = $ssl_str[$v_domain]['NOT_AFTER'];
  519. $v_ssl_signature = $ssl_str[$v_domain]['SIGNATURE'];
  520. $v_ssl_pub_key = $ssl_str[$v_domain]['PUB_KEY'];
  521. $v_ssl_issuer = $ssl_str[$v_domain]['ISSUER'];
  522. // Cleanup certificate tempfiles
  523. if (!empty($_POST['v_ssl_crt'])) unlink($tmpdir."/".$v_domain.".crt");
  524. if (!empty($_POST['v_ssl_key'])) unlink($tmpdir."/".$v_domain.".key");
  525. if (!empty($_POST['v_ssl_ca'])) unlink($tmpdir."/".$v_domain.".ca");
  526. rmdir($tmpdir);
  527. }
  528. }
  529. // Add Force SSL
  530. if ((!empty($_POST['v_ssl_forcessl'])) && (!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  531. exec (HESTIA_CMD."v-add-web-domain-ssl-force ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  532. check_return_code($return_var,$output);
  533. unset($output);
  534. $v_ssl_forcessl = 'yes';
  535. $restart_web = 'yes';
  536. $restart_proxy = 'yes';
  537. }
  538. // Add SSL HSTS
  539. if ((!empty($_POST['v_ssl_hsts'])) && (!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  540. exec (HESTIA_CMD."v-add-web-domain-ssl-hsts ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  541. check_return_code($return_var,$output);
  542. unset($output);
  543. $v_ssl_hsts = 'yes';
  544. $restart_web = 'yes';
  545. $restart_proxy = 'yes';
  546. }
  547. // Delete Force SSL
  548. if (( $v_ssl_forcessl == 'yes' ) && (empty($_POST['v_ssl_forcessl'])) && (empty($_SESSION['error_msg']))) {
  549. exec (HESTIA_CMD."v-delete-web-domain-ssl-force ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  550. check_return_code($return_var,$output);
  551. unset($output);
  552. $v_ssl_forcessl = 'no';
  553. $restart_web = 'yes';
  554. $restart_proxy = 'yes';
  555. }
  556. // Delete SSL HSTS
  557. if (( $v_ssl_hsts == 'yes' ) && (empty($_POST['v_ssl_hsts'])) && (empty($_SESSION['error_msg']))) {
  558. exec (HESTIA_CMD."v-delete-web-domain-ssl-hsts ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  559. check_return_code($return_var,$output);
  560. unset($output);
  561. $v_ssl_hsts = 'no';
  562. $restart_web = 'yes';
  563. $restart_proxy = 'yes';
  564. }
  565. // Delete web stats
  566. if ((!empty($v_stats)) && ($_POST['v_stats'] == 'none') && (empty($_SESSION['error_msg']))) {
  567. exec (HESTIA_CMD."v-delete-web-domain-stats ".$v_username." ".escapeshellarg($v_domain), $output, $return_var);
  568. check_return_code($return_var,$output);
  569. unset($output);
  570. $v_stats = '';
  571. }
  572. // Change web stats engine
  573. if ((!empty($v_stats)) && ($_POST['v_stats'] != $v_stats) && (empty($_SESSION['error_msg']))) {
  574. $v_stats = escapeshellarg($_POST['v_stats']);
  575. exec (HESTIA_CMD."v-change-web-domain-stats ".$v_username." ".escapeshellarg($v_domain)." ".$v_stats, $output, $return_var);
  576. check_return_code($return_var,$output);
  577. unset($output);
  578. }
  579. // Add web stats
  580. if ((empty($v_stats)) && ($_POST['v_stats'] != 'none') && (empty($_SESSION['error_msg']))) {
  581. $v_stats = escapeshellarg($_POST['v_stats']);
  582. exec (HESTIA_CMD."v-add-web-domain-stats ".$v_username." ".escapeshellarg($v_domain)." ".$v_stats, $output, $return_var);
  583. check_return_code($return_var,$output);
  584. unset($output);
  585. }
  586. // Delete web stats authorization
  587. if ((!empty($v_stats_user)) && (empty($_POST['v_stats_auth'])) && (empty($_SESSION['error_msg']))) {
  588. exec (HESTIA_CMD."v-delete-web-domain-stats-user ".$v_username." ".escapeshellarg($v_domain), $output, $return_var);
  589. check_return_code($return_var,$output);
  590. unset($output);
  591. $v_stats_user = '';
  592. $v_stats_password = '';
  593. }
  594. // Change web stats user or password
  595. if ((empty($v_stats_user)) && (!empty($_POST['v_stats_auth'])) && (empty($_SESSION['error_msg']))) {
  596. if (empty($_POST['v_stats_user'])) $errors[] = _('stats username');
  597. if (!empty($errors[0])) {
  598. foreach ($errors as $i => $error) {
  599. if ( $i == 0 ) {
  600. $error_msg = $error;
  601. } else {
  602. $error_msg = $error_msg.", ".$error;
  603. }
  604. }
  605. $_SESSION['error_msg'] = _('Field "%s" can not be blank.',$error_msg);
  606. } else {
  607. $v_stats_user = escapeshellarg($_POST['v_stats_user']);
  608. $v_stats_password = tempnam("/tmp","vst");
  609. $fp = fopen($v_stats_password, "w");
  610. fwrite($fp, $_POST['v_stats_password']."\n");
  611. fclose($fp);
  612. exec (HESTIA_CMD."v-add-web-domain-stats-user ".$v_username." ".escapeshellarg($v_domain)." ".$v_stats_user." ".$v_stats_password, $output, $return_var);
  613. check_return_code($return_var,$output);
  614. unset($output);
  615. unlink($v_stats_password);
  616. $v_stats_password = escapeshellarg($_POST['v_stats_password']);
  617. }
  618. }
  619. // Add web stats authorization
  620. if ((!empty($v_stats_user)) && (!empty($_POST['v_stats_auth'])) && (empty($_SESSION['error_msg']))) {
  621. if (empty($_POST['v_stats_user'])) $errors[] = _('stats user');
  622. if (!empty($errors[0])) {
  623. foreach ($errors as $i => $error) {
  624. if ( $i == 0 ) {
  625. $error_msg = $error;
  626. } else {
  627. $error_msg = $error_msg.", ".$error;
  628. }
  629. }
  630. $_SESSION['error_msg'] = _('Field "%s" can not be blank.',$error_msg);
  631. }
  632. if (($v_stats_user != $_POST['v_stats_user']) || (!empty($_POST['v_stats_password'])) && (empty($_SESSION['error_msg']))) {
  633. $v_stats_user = escapeshellarg($_POST['v_stats_user']);
  634. $v_stats_password = tempnam("/tmp","vst");
  635. $fp = fopen($v_stats_password, "w");
  636. fwrite($fp, $_POST['v_stats_password']."\n");
  637. fclose($fp);
  638. exec (HESTIA_CMD."v-add-web-domain-stats-user ".$v_username." ".escapeshellarg($v_domain)." ".$v_stats_user." ".$v_stats_password, $output, $return_var);
  639. check_return_code($return_var,$output);
  640. unset($output);
  641. unlink($v_stats_password);
  642. $v_stats_password = escapeshellarg($_POST['v_stats_password']);
  643. }
  644. }
  645. // Update ftp account
  646. if (!empty($_POST['v_ftp_user'])) {
  647. $v_ftp_users_updated = array();
  648. foreach ($_POST['v_ftp_user'] as $i => $v_ftp_user_data) {
  649. if (empty($v_ftp_user_data['v_ftp_user'])) {
  650. continue;
  651. }
  652. $v_ftp_user_data['v_ftp_user'] = preg_replace("/^".$user."_/i", "", $v_ftp_user_data['v_ftp_user']);
  653. if ($v_ftp_user_data['is_new'] == 1 && !empty($_POST['v_ftp'])) {
  654. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (!filter_var($v_ftp_user_data['v_ftp_email'], FILTER_VALIDATE_EMAIL))) $_SESSION['error_msg'] = _('Please enter valid email address.');
  655. if (empty($v_ftp_user_data['v_ftp_user'])) $errors[] = 'ftp user';
  656. if (!empty($errors[0])) {
  657. foreach ($errors as $i => $error) {
  658. if ( $i == 0 ) {
  659. $error_msg = $error;
  660. } else {
  661. $error_msg = $error_msg.", ".$error;
  662. }
  663. }
  664. $_SESSION['error_msg'] = _('Field "%s" can not be blank.',$error_msg);
  665. }
  666. // Add ftp account
  667. $v_ftp_username = $v_ftp_user_data['v_ftp_user'];
  668. $v_ftp_username_full = $user . '_' . $v_ftp_user_data['v_ftp_user'];
  669. $v_ftp_user = escapeshellarg($v_ftp_username);
  670. $v_ftp_path = escapeshellarg(trim($v_ftp_user_data['v_ftp_path']));
  671. if (empty($_SESSION['error_msg'])) {
  672. $v_ftp_password = tempnam("/tmp","vst");
  673. $fp = fopen($v_ftp_password, "w");
  674. fwrite($fp, $v_ftp_user_data['v_ftp_password']."\n");
  675. fclose($fp);
  676. exec (HESTIA_CMD."v-add-web-domain-ftp ".$v_username." ".escapeshellarg($v_domain)." ".$v_ftp_user." ".$v_ftp_password . " " . $v_ftp_path, $output, $return_var);
  677. check_return_code($return_var,$output);
  678. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (empty($_SESSION['error_msg']))) {
  679. $to = $v_ftp_user_data['v_ftp_email'];
  680. $subject = _("FTP login credentials");
  681. $hostname = exec('hostname');
  682. $from = sprintf(_('MAIL_FROM'),$hostname);
  683. $mailtext = sprintf(_('FTP_ACCOUNT_READY'),escapeshellarg($_GET['domain']),$user,$v_ftp_username,$v_ftp_user_data['v_ftp_password']);
  684. send_email($to, $subject, $mailtext, $from);
  685. unset($v_ftp_email);
  686. }
  687. unset($output);
  688. unlink($v_ftp_password);
  689. $v_ftp_password = escapeshellarg($v_ftp_user_data['v_ftp_password']);
  690. }
  691. if ($return_var == 0) {
  692. $v_ftp_password = "";
  693. $v_ftp_user_data['is_new'] = 0;
  694. }
  695. else {
  696. $v_ftp_user_data['is_new'] = 1;
  697. }
  698. $v_ftp_users_updated[] = array(
  699. 'is_new' => empty($_SESSION['error_msg']) ? 0 : 1,
  700. 'v_ftp_user' => $v_ftp_username_full,
  701. 'v_ftp_password' => $v_ftp_password,
  702. 'v_ftp_path' => $v_ftp_user_data['v_ftp_path'],
  703. 'v_ftp_email' => $v_ftp_user_data['v_ftp_email'],
  704. 'v_ftp_pre_path' => $v_ftp_user_prepath
  705. );
  706. continue;
  707. }
  708. // Delete FTP account
  709. if ($v_ftp_user_data['delete'] == 1) {
  710. $v_ftp_username = $user . '_' . $v_ftp_user_data['v_ftp_user'];
  711. exec (HESTIA_CMD."v-delete-web-domain-ftp ".$v_username." ".escapeshellarg($v_domain)." ".$v_ftp_username, $output, $return_var);
  712. check_return_code($return_var,$output);
  713. unset($output);
  714. continue;
  715. }
  716. if (!empty($_POST['v_ftp'])) {
  717. if (empty($v_ftp_user_data['v_ftp_user'])) $errors[] = _('ftp user');
  718. if (!empty($errors[0])) {
  719. foreach ($errors as $i => $error) {
  720. if ( $i == 0 ) {
  721. $error_msg = $error;
  722. } else {
  723. $error_msg = $error_msg.", ".$error;
  724. }
  725. }
  726. $_SESSION['error_msg'] = _('Field "%s" can not be blank.',$error_msg);
  727. }
  728. // Change FTP account path
  729. $v_ftp_username_for_emailing = $v_ftp_user_data['v_ftp_user'];
  730. $v_ftp_username = $user . '_' . $v_ftp_user_data['v_ftp_user']; //preg_replace("/^".$user."_/", "", $v_ftp_user_data['v_ftp_user']);
  731. $v_ftp_username = escapeshellarg($v_ftp_username);
  732. $v_ftp_path = escapeshellarg(trim($v_ftp_user_data['v_ftp_path']));
  733. if(escapeshellarg(trim($v_ftp_user_data['v_ftp_path_prev'])) != $v_ftp_path) {
  734. exec (HESTIA_CMD."v-change-web-domain-ftp-path ".$v_username." ".escapeshellarg($v_domain)." ".$v_ftp_username." ".$v_ftp_path, $output, $return_var);
  735. }
  736. // Change FTP account password
  737. if (!empty($v_ftp_user_data['v_ftp_password'])) {
  738. $v_ftp_password = tempnam("/tmp","vst");
  739. $fp = fopen($v_ftp_password, "w");
  740. fwrite($fp, $v_ftp_user_data['v_ftp_password']."\n");
  741. fclose($fp);
  742. exec (HESTIA_CMD."v-change-web-domain-ftp-password ".$v_username." ".escapeshellarg($v_domain)." ".$v_ftp_username." ".$v_ftp_password, $output, $return_var);
  743. unlink($v_ftp_password);
  744. $to = $v_ftp_user_data['v_ftp_email'];
  745. $subject = _("FTP login credentials");
  746. $hostname = exec('hostname');
  747. $from = _('MAIL_FROM',$hostname);
  748. $mailtext = _('FTP_ACCOUNT_READY',escapeshellarg($_GET['domain']),$user,$v_ftp_username_for_emailing,$v_ftp_user_data['v_ftp_password']);
  749. send_email($to, $subject, $mailtext, $from);
  750. unset($v_ftp_email);
  751. }
  752. check_return_code($return_var, $output);
  753. unset($output);
  754. $v_ftp_users_updated[] = array(
  755. 'is_new' => 0,
  756. 'v_ftp_user' => $v_ftp_username,
  757. 'v_ftp_password' => $v_ftp_user_data['v_ftp_password'],
  758. 'v_ftp_path' => $v_ftp_user_data['v_ftp_path'],
  759. 'v_ftp_email' => $v_ftp_user_data['v_ftp_email'],
  760. 'v_ftp_pre_path' => $v_ftp_user_prepath
  761. );
  762. }
  763. }
  764. }
  765. //custom docoot with check box disabled
  766. if( !empty($v_custom_doc_root) && empty($_POST['v_custom_doc_root_check']) ){
  767. exec(HESTIA_CMD."v-change-web-domain-docroot ".$v_username." ".escapeshellarg($v_domain)." default", $output, $return_var);
  768. check_return_code($return_var,$output);
  769. unset($output);
  770. unset($_POST['v-custom-doc-domain'], $_POST['v-custom-doc-folder']);
  771. $restart_web = 'yes';
  772. $restart_proxy = 'yes';
  773. }
  774. if ( !empty($_POST['v-custom-doc-domain']) && !empty($_POST['v_custom_doc_root_check']) && $v_custom_doc_root_prepath.$v_custom_doc_domain.'/public_html'.$v_custom_doc_folder != $v_custom_doc_root){
  775. if($_POST['v-custom-doc-domain'] == $v_domain && empty($_POST['v-custom-doc-folder'])){
  776. exec(HESTIA_CMD."v-change-web-domain-docroot ".$v_username." ".escapeshellarg($v_domain)." default", $output, $return_var);
  777. check_return_code($return_var,$output);
  778. unset($output);
  779. }else{
  780. $v_custom_doc_folder = escapeshellarg(rtrim($_POST['v-custom-doc-folder'],'/'));
  781. $v_custom_doc_domain = escapeshellarg($_POST['v-custom-doc-domain']);
  782. exec(HESTIA_CMD."v-change-web-domain-docroot ".$v_username." ".escapeshellarg($v_domain)." ".$v_custom_doc_domain." ".$v_custom_doc_folder ." yes", $output, $return_var);
  783. check_return_code($return_var,$output);
  784. unset($output);
  785. $v_custom_doc_root = 1;
  786. }
  787. $restart_web = 'yes';
  788. $restart_proxy = 'yes';
  789. }else{
  790. unset($v_custom_doc_root);
  791. }
  792. if ( !empty($v_redirect) && empty($_POST['v-redirect-checkbox']) ) {
  793. exec(HESTIA_CMD."v-delete-web-domain-redirect ".$v_username." ".escapeshellarg($v_domain), $output, $return_var);
  794. check_return_code($return_var,$output);
  795. unset($output);
  796. unset($_POST['v-redirect']);
  797. $restart_web = 'yes';
  798. $restart_proxy = 'yes';
  799. }
  800. if (!empty($_POST['v-redirect']) && !empty($_POST['v-redirect-checkbox']) ){
  801. if (empty($v_redirect)){
  802. if ($_POST['v-redirect'] == 'custom' && empty($_POST['v-redirect-custom'])){
  803. }else{
  804. if($_POST['v-redirect'] == 'custom'){
  805. $_POST['v-redirect'] = $_POST['v-redirect-custom'];
  806. }
  807. exec(HESTIA_CMD."v-add-web-domain-redirect ".$v_username." ".escapeshellarg($v_domain)." ".escapeshellarg($_POST['v-redirect'])." ".escapeshellarg($_POST['v-redirect-code']), $output, $return_var);
  808. check_return_code($return_var,$output);
  809. unset($output);
  810. $restart_web = 'yes';
  811. $restart_proxy = 'yes';
  812. }
  813. }else {
  814. if ($_POST['v-redirect'] == 'custom') {
  815. $_POST['v-redirect'] = $_POST['v-redirect-custom'];
  816. }
  817. if ( $_POST['v-redirect'] != $v_redirect || $_POST['v-redirect-code'] != $v_redirect_code ) {
  818. exec(HESTIA_CMD."v-add-web-domain-redirect ".$v_username." ".escapeshellarg($v_domain)." ".escapeshellarg($_POST['v-redirect'])." ".escapeshellarg($_POST['v-redirect-code']), $output, $return_var);
  819. check_return_code($return_var,$output);
  820. unset($output);
  821. $restart_web = 'yes';
  822. $restart_proxy = 'yes';
  823. }
  824. }
  825. }
  826. // Restart web server
  827. if (!empty($restart_web) && (empty($_SESSION['error_msg']))) {
  828. exec (HESTIA_CMD."v-restart-web", $output, $return_var);
  829. check_return_code($return_var,$output);
  830. unset($output);
  831. }
  832. // Restart proxy server
  833. if ((!empty($_SESSION['PROXY_SYSTEM'])) && !empty($restart_proxy) && (empty($_SESSION['error_msg']))) {
  834. exec (HESTIA_CMD."v-restart-proxy", $output, $return_var);
  835. check_return_code($return_var,$output);
  836. unset($output);
  837. }
  838. // Restart dns server
  839. if (!empty($restart_dns) && (empty($_SESSION['error_msg']))) {
  840. exec (HESTIA_CMD."v-restart-dns", $output, $return_var);
  841. check_return_code($return_var,$output);
  842. unset($output);
  843. }
  844. // Set success message
  845. if (empty($_SESSION['error_msg'])) {
  846. $_SESSION['ok_msg'] = _('Changes has been saved.');
  847. header("Location: /edit/web/?domain=" . $v_domain);
  848. exit();
  849. }
  850. }
  851. $v_ftp_users_raw = explode(':', $v_ftp_user);
  852. $v_ftp_users_paths_raw = explode(':', $data[$v_domain]['FTP_PATH']);
  853. $v_ftp_users = array();
  854. foreach ($v_ftp_users_raw as $v_ftp_user_index => $v_ftp_user_val) {
  855. if (empty($v_ftp_user_val)) {
  856. continue;
  857. }
  858. $v_ftp_users[] = array(
  859. 'is_new' => 0,
  860. 'v_ftp_user' => preg_replace("/^".$user."_/", "", $v_ftp_user_val),
  861. 'v_ftp_password' => $v_ftp_password,
  862. 'v_ftp_path' => (isset($v_ftp_users_paths_raw[$v_ftp_user_index]) ? $v_ftp_users_paths_raw[$v_ftp_user_index] : ''),
  863. 'v_ftp_email' => $v_ftp_email,
  864. 'v_ftp_pre_path' => $v_ftp_user_prepath
  865. );
  866. }
  867. if (empty($v_ftp_users)) {
  868. $v_ftp_user = null;
  869. $v_ftp_users[] = array(
  870. 'is_new' => 1,
  871. 'v_ftp_user' => '',
  872. 'v_ftp_password' => '',
  873. 'v_ftp_path' => (isset($v_ftp_users_paths_raw[$v_ftp_user_index]) ? $v_ftp_users_paths_raw[$v_ftp_user_index] : ''),
  874. 'v_ftp_email' => '',
  875. 'v_ftp_pre_path' => $v_ftp_user_prepath
  876. );
  877. }
  878. // set default pre path for newly created users
  879. $v_ftp_pre_path_new_user = $v_ftp_user_prepath;
  880. if (isset($v_ftp_users_updated)) {
  881. $v_ftp_users = $v_ftp_users_updated;
  882. if (empty($v_ftp_users_updated)) {
  883. $v_ftp_user = null;
  884. $v_ftp_users[] = array(
  885. 'is_new' => 1,
  886. 'v_ftp_user' => '',
  887. 'v_ftp_password' => '',
  888. 'v_ftp_path' => (isset($v_ftp_users_paths_raw[$v_ftp_user_index]) ? $v_ftp_users_paths_raw[$v_ftp_user_index] : ''),
  889. 'v_ftp_email' => '',
  890. 'v_ftp_pre_path' => $v_ftp_user_prepath
  891. );
  892. }
  893. }
  894. // Render page
  895. render_page($user, $TAB, 'edit_web');
  896. // Flush session messages
  897. unset($_SESSION['error_msg']);
  898. unset($_SESSION['ok_msg']);