index.php 45 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033
  1. <?php
  2. ob_start();
  3. unset($_SESSION['error_msg']);
  4. $TAB = 'WEB';
  5. // Main include
  6. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  7. // Check domain argument
  8. if (empty($_GET['domain'])) {
  9. header("Location: /list/web/");
  10. exit;
  11. }
  12. // Edit as someone else?
  13. if (($_SESSION['userContext'] === 'admin') && (!empty($_GET['user']))) {
  14. $user=escapeshellarg($_GET['user']);
  15. $user_plain=htmlentities($_GET['user']);
  16. }
  17. // Get all user domains
  18. exec(HESTIA_CMD."v-list-web-domains ".$user." json", $output, $return_var);
  19. $user_domains = json_decode(implode('', $output), true);
  20. $user_domains = array_keys($user_domains);
  21. unset($output);
  22. $v_domain = $_GET['domain'];
  23. exec(HESTIA_CMD."v-list-web-domain ".$user." ".escapeshellarg($v_domain)." json", $output, $return_var);
  24. # Check if domain exists if not return /list/web/
  25. check_return_code_redirect($return_var, $output, '/list/web/');
  26. $data = json_decode(implode('', $output), true);
  27. unset($output);
  28. // Parse domain
  29. $v_ip = $data[$v_domain]['IP'];
  30. $v_template = $data[$v_domain]['TPL'];
  31. $v_aliases = str_replace(',', "\n", $data[$v_domain]['ALIAS']);
  32. $valiases = explode(",", $data[$v_domain]['ALIAS']);
  33. $v_ssl = $data[$v_domain]['SSL'];
  34. if (!empty($v_ssl)) {
  35. exec(HESTIA_CMD."v-list-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." json", $output, $return_var);
  36. $ssl_str = json_decode(implode('', $output), true);
  37. unset($output);
  38. $v_ssl_crt = $ssl_str[$v_domain]['CRT'];
  39. $v_ssl_key = $ssl_str[$v_domain]['KEY'];
  40. $v_ssl_ca = $ssl_str[$v_domain]['CA'];
  41. $v_ssl_subject = $ssl_str[$v_domain]['SUBJECT'];
  42. $v_ssl_aliases = $ssl_str[$v_domain]['ALIASES'];
  43. $v_ssl_not_before = $ssl_str[$v_domain]['NOT_BEFORE'];
  44. $v_ssl_not_after = $ssl_str[$v_domain]['NOT_AFTER'];
  45. $v_ssl_signature = $ssl_str[$v_domain]['SIGNATURE'];
  46. $v_ssl_pub_key = $ssl_str[$v_domain]['PUB_KEY'];
  47. $v_ssl_issuer = $ssl_str[$v_domain]['ISSUER'];
  48. $v_ssl_forcessl = $data[$v_domain]['SSL_FORCE'];
  49. $v_ssl_hsts = $data[$v_domain]['SSL_HSTS'];
  50. }
  51. $v_letsencrypt = $data[$v_domain]['LETSENCRYPT'];
  52. if (empty($v_letsencrypt)) {
  53. $v_letsencrypt = 'no';
  54. }
  55. $v_ssl_home = $data[$v_domain]['SSL_HOME'];
  56. $v_backend_template = $data[$v_domain]['BACKEND'];
  57. $v_nginx_cache = $data[$v_domain]['FASTCGI_CACHE'];
  58. $v_nginx_cache_duration = $data[$v_domain]['FASTCGI_DURATION'];
  59. $v_nginx_cache_check = '';
  60. if (empty($v_nginx_cache_duration)) {
  61. $v_nginx_cache_duration = '2m';
  62. $v_nginx_cache_check = '';
  63. } else {
  64. $v_nginx_cache_check = 'on';
  65. }
  66. $v_proxy = $data[$v_domain]['PROXY'];
  67. $v_proxy_template = $data[$v_domain]['PROXY'];
  68. $v_proxy_ext = str_replace(',', ', ', $data[$v_domain]['PROXY_EXT']);
  69. $v_stats = $data[$v_domain]['STATS'];
  70. $v_stats_user = $data[$v_domain]['STATS_USER'];
  71. $v_stats_password = "";
  72. $v_custom_doc_root_prepath = '/home/'.$user_plain.'/web/';
  73. $v_custom_doc_root = '';
  74. $v_custom_doc_domain = '';
  75. $v_custom_doc_folder = '';
  76. if (!empty($data[$v_domain]['CUSTOM_DOCROOT'])) {
  77. $v_custom_doc_root = realpath($data[$v_domain]['CUSTOM_DOCROOT']) . DIRECTORY_SEPARATOR;
  78. }
  79. if (!empty($v_custom_doc_root) &&
  80. false !== preg_match('/\/home\/'.$user_plain.'\/web\/([[:alnum:]].*?)\/public_html\/([[:alnum:]].*)?/', $v_custom_doc_root, $matches)) {
  81. // Regex for extracting target web domain and custom document root. Regex test: https://regex101.com/r/2CLvIF/1
  82. if (!empty($matches[1])) {
  83. $v_custom_doc_domain = $matches[1];
  84. }
  85. if (!empty($matches[2])) {
  86. $v_custom_doc_folder = rtrim($matches[2], '/');
  87. }
  88. if ($v_custom_doc_domain && !in_array($v_custom_doc_domain, $user_domains)) {
  89. $v_custom_doc_domain = '';
  90. $v_custom_doc_folder = '';
  91. }
  92. }
  93. $redirect_code_options = array(301,302);
  94. $v_redirect = $data[$v_domain]['REDIRECT'];
  95. $v_redirect_code = $data[$v_domain]['REDIRECT_CODE'];
  96. if (!in_array($v_redirect, array('www.'.$v_domain, $v_domain))) {
  97. $v_redirect_custom = $v_redirect;
  98. }
  99. $v_ftp_user = $data[$v_domain]['FTP_USER'];
  100. $v_ftp_path = $data[$v_domain]['FTP_PATH'];
  101. if (!empty($v_ftp_user)) {
  102. $v_ftp_password = "";
  103. }
  104. if (isset($v_custom_doc_domain) && $v_custom_doc_domain != '') {
  105. $v_ftp_user_prepath = '/home/'.$user_plain.'/web/'.$v_custom_doc_domain;
  106. } else {
  107. $v_ftp_user_prepath = '/home/'.$user_plain.'/web/'.$v_domain;
  108. }
  109. //$v_ftp_email = $panel[$user]['CONTACT'];
  110. $v_ftp_email = '';
  111. $v_suspended = $data[$v_domain]['SUSPENDED'];
  112. if ($v_suspended == 'yes') {
  113. $v_status = 'suspended';
  114. } else {
  115. $v_status = 'active';
  116. }
  117. $v_time = $data[$v_domain]['TIME'];
  118. $v_date = $data[$v_domain]['DATE'];
  119. // List ip addresses
  120. exec(HESTIA_CMD."v-list-user-ips ".$user." json", $output, $return_var);
  121. $ips = json_decode(implode('', $output), true);
  122. unset($output);
  123. $v_ip_public = empty($ips[$v_ip]['NAT']) ? $v_ip : $ips[$v_ip]['NAT'];
  124. // List web templates
  125. exec(HESTIA_CMD."v-list-web-templates json", $output, $return_var);
  126. $templates = json_decode(implode('', $output), true);
  127. unset($output);
  128. // List backend templates
  129. if (!empty($_SESSION['WEB_BACKEND'])) {
  130. exec(HESTIA_CMD."v-list-web-templates-backend json", $output, $return_var);
  131. $backend_templates = json_decode(implode('', $output), true);
  132. unset($output);
  133. }
  134. // List proxy templates
  135. if (!empty($_SESSION['PROXY_SYSTEM'])) {
  136. exec(HESTIA_CMD."v-list-web-templates-proxy json", $output, $return_var);
  137. $proxy_templates = json_decode(implode('', $output), true);
  138. unset($output);
  139. }
  140. // List web stat engines
  141. exec(HESTIA_CMD."v-list-web-stats json", $output, $return_var);
  142. $stats = json_decode(implode('', $output), true);
  143. unset($output);
  144. // Check POST request
  145. if (!empty($_POST['save'])) {
  146. $v_domain = $_POST['v_domain'];
  147. if (!in_array($v_domain, $user_domains)) {
  148. check_return_code(3, ["Unknown domain"]);
  149. }
  150. // Check token
  151. verify_csrf($_POST);
  152. // Change web domain IP
  153. $v_newip='';
  154. $v_newip_public='';
  155. if (!empty($_POST['v_ip'])) {
  156. $v_newip = $_POST['v_ip'];
  157. $v_newip_public = empty($ips[$v_newip]['NAT']) ? $v_newip : $ips[$v_newip]['NAT'];
  158. }
  159. if (($v_ip != $_POST['v_ip']) && (empty($_SESSION['error_msg']))) {
  160. exec(HESTIA_CMD."v-change-web-domain-ip ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($_POST['v_ip'])." 'no'", $output, $return_var);
  161. check_return_code($return_var, $output);
  162. $restart_web = 'yes';
  163. $restart_proxy = 'yes';
  164. unset($output);
  165. }
  166. // Change dns domain IP
  167. if (($v_ip != $_POST['v_ip']) && (empty($_SESSION['error_msg']))) {
  168. exec(HESTIA_CMD."v-list-dns-domain ".$user." ".escapeshellarg($v_domain)." json", $output, $return_var);
  169. unset($output);
  170. if ($return_var == 0) {
  171. exec(HESTIA_CMD."v-change-dns-domain-ip ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($v_newip_public)." 'no'", $output, $return_var);
  172. check_return_code($return_var, $output);
  173. unset($output);
  174. $restart_dns = 'yes';
  175. }
  176. }
  177. // Change dns ip for each alias
  178. if (($v_ip != $_POST['v_ip']) && (empty($_SESSION['error_msg']))) {
  179. foreach ($valiases as $v_alias) {
  180. exec(HESTIA_CMD."v-list-dns-domain ".$user." ".escapeshellarg($v_alias)." json", $output, $return_var);
  181. unset($output);
  182. if ($return_var == 0) {
  183. exec(HESTIA_CMD."v-change-dns-domain-ip ".$user." ".escapeshellarg($v_alias)." ".escapeshellarg($v_newip_public), $output, $return_var);
  184. check_return_code($return_var, $output);
  185. unset($output);
  186. $restart_dns = 'yes';
  187. }
  188. }
  189. }
  190. // Change mail domain IP
  191. if (($v_ip != $_POST['v_ip']) && (empty($_SESSION['error_msg']))) {
  192. exec(HESTIA_CMD."v-list-mail-domain ".$user." ".escapeshellarg($v_domain)." json", $output, $return_var);
  193. unset($output);
  194. if ($return_var == 0) {
  195. exec(HESTIA_CMD."v-rebuild-mail-domain ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  196. check_return_code($return_var, $output);
  197. unset($output);
  198. $restart_email = 'yes';
  199. }
  200. }
  201. if (($_SESSION['POLICY_USER_EDIT_WEB_TEMPLATES'] == 'yes') || ($_SESSION['userContext'] === "admin")) {
  202. // Change template
  203. if (($v_template != $_POST['v_template']) && (empty($_SESSION['error_msg']))) {
  204. exec(HESTIA_CMD."v-change-web-domain-tpl ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($_POST['v_template'])." 'no'", $output, $return_var);
  205. check_return_code($return_var, $output);
  206. unset($output);
  207. $restart_web = 'yes';
  208. }
  209. // Change backend template
  210. if ((!empty($_SESSION['WEB_BACKEND'])) && ($v_backend_template != $_POST['v_backend_template']) && (empty($_SESSION['error_msg']))) {
  211. $v_backend_template = $_POST['v_backend_template'];
  212. exec(HESTIA_CMD."v-change-web-domain-backend-tpl ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($v_backend_template), $output, $return_var);
  213. check_return_code($return_var, $output);
  214. unset($output);
  215. }
  216. // Enable/Disable nginx cache
  217. if (empty($_POST['v_nginx_cache_check'])) {
  218. $_POST['v_nginx_cache_check'] = '';
  219. }
  220. if (($_SESSION['WEB_SYSTEM'] == 'nginx') && ($v_nginx_cache_check != $_POST['v_nginx_cache_check']) || ($v_nginx_cache_duration != $_POST['v_nginx_cache_duration'] && $_POST['v_nginx_cache'] = "yes") && (empty($_SESSION['error_msg']))) {
  221. if ($_POST['v_nginx_cache_check'] == 'on') {
  222. if (empty($_POST['v_nginx_cache_duration'])) {
  223. $_POST['v_nginx_cache_duration'] = "2m";
  224. }
  225. exec(HESTIA_CMD."v-add-fastcgi-cache ".$user." ".escapeshellarg($v_domain).' '. escapeshellarg($_POST['v_nginx_cache_duration']), $output, $return_var);
  226. check_return_code($return_var, $output);
  227. unset($output);
  228. } else {
  229. exec(HESTIA_CMD."v-delete-fastcgi-cache ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  230. check_return_code($return_var, $output);
  231. unset($output);
  232. }
  233. $restart_web = 'yes';
  234. }
  235. // Delete proxy support
  236. if ((!empty($_SESSION['PROXY_SYSTEM'])) && (!empty($v_proxy)) && (empty($_POST['v_proxy'])) && (empty($_SESSION['error_msg']))) {
  237. exec(HESTIA_CMD."v-delete-web-domain-proxy ".$user." ".escapeshellarg($v_domain)." 'no'", $output, $return_var);
  238. check_return_code($return_var, $output);
  239. unset($output);
  240. unset($v_proxy);
  241. $restart_web = 'yes';
  242. }
  243. // Change proxy template / Update extension list
  244. if ((!empty($_SESSION['PROXY_SYSTEM'])) && (!empty($v_proxy)) && (!empty($_POST['v_proxy'])) && (empty($_SESSION['error_msg']))) {
  245. $ext = preg_replace("/\n/", " ", $_POST['v_proxy_ext']);
  246. $ext = preg_replace("/,/", " ", $ext);
  247. $ext = preg_replace('/\s+/', ' ', $ext);
  248. $ext = trim($ext);
  249. $ext = str_replace(' ', ", ", $ext);
  250. if (($v_proxy_template != $_POST['v_proxy_template']) || ($v_proxy_ext != $ext)) {
  251. $ext = str_replace(', ', ",", $ext);
  252. if (!empty($_POST['v_proxy_template'])) {
  253. $v_proxy_template = $_POST['v_proxy_template'];
  254. }
  255. exec(HESTIA_CMD."v-change-web-domain-proxy-tpl ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($v_proxy_template)." ".escapeshellarg($ext)." 'no'", $output, $return_var);
  256. check_return_code($return_var, $output);
  257. $v_proxy_ext = str_replace(',', ', ', $ext);
  258. unset($output);
  259. $restart_proxy = 'yes';
  260. }
  261. }
  262. // Add proxy support
  263. if ((!empty($_SESSION['PROXY_SYSTEM'])) && (empty($v_proxy)) && (!empty($_POST['v_proxy'])) && (empty($_SESSION['error_msg']))) {
  264. $v_proxy_template = $_POST['v_proxy_template'];
  265. if (!empty($_POST['v_proxy_ext'])) {
  266. $ext = preg_replace("/\n/", " ", $_POST['v_proxy_ext']);
  267. $ext = preg_replace("/,/", " ", $ext);
  268. $ext = preg_replace('/\s+/', ' ', $ext);
  269. $ext = trim($ext);
  270. $ext = str_replace(' ', ",", $ext);
  271. $v_proxy_ext = str_replace(',', ', ', $ext);
  272. }
  273. exec(HESTIA_CMD."v-add-web-domain-proxy ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($v_proxy_template)." ".escapeshellarg($ext)." 'no'", $output, $return_var);
  274. check_return_code($return_var, $output);
  275. unset($output);
  276. $restart_proxy = 'yes';
  277. }
  278. }
  279. // Change aliases
  280. if (empty($_SESSION['error_msg'])) {
  281. $waliases = preg_replace("/\n/", " ", $_POST['v_aliases']);
  282. $waliases = preg_replace("/,/", " ", $waliases);
  283. $waliases = preg_replace('/\s+/', ' ', $waliases);
  284. $waliases = trim($waliases);
  285. $aliases = explode(" ", $waliases);
  286. $v_aliases = str_replace(' ', "\n", $waliases);
  287. $result = array_diff($valiases, $aliases);
  288. foreach ($result as $alias) {
  289. if ((empty($_SESSION['error_msg'])) && (!empty($alias))) {
  290. $restart_web = 'yes';
  291. $restart_proxy = 'yes';
  292. exec(HESTIA_CMD."v-delete-web-domain-alias ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($alias)." 'no'", $output, $return_var);
  293. check_return_code($return_var, $output);
  294. unset($output);
  295. if (empty($_SESSION['error_msg'])) {
  296. exec(HESTIA_CMD."v-list-dns-domain ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  297. unset($output);
  298. if ($return_var == 0) {
  299. exec(HESTIA_CMD."v-delete-dns-on-web-alias ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($alias)." 'no'", $output, $return_var);
  300. check_return_code($return_var, $output);
  301. unset($output);
  302. $restart_dns = 'yes';
  303. }
  304. }
  305. }
  306. }
  307. $result = array_diff($aliases, $valiases);
  308. foreach ($result as $alias) {
  309. if ((empty($_SESSION['error_msg'])) && (!empty($alias))) {
  310. $restart_web = 'yes';
  311. $restart_proxy = 'yes';
  312. exec(HESTIA_CMD."v-add-web-domain-alias ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($alias)." 'no'", $output, $return_var);
  313. check_return_code($return_var, $output);
  314. unset($output);
  315. if (empty($_SESSION['error_msg'])) {
  316. exec(HESTIA_CMD."v-list-dns-domain ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  317. unset($output);
  318. if ($return_var == 0) {
  319. exec(HESTIA_CMD."v-add-dns-on-web-alias ".$user." ".escapeshellarg($alias)." ".escapeshellarg($v_newip_public ?: $v_ip_public)." no", $output, $return_var);
  320. check_return_code($return_var, $output);
  321. unset($output);
  322. $restart_dns = 'yes';
  323. }
  324. }
  325. }
  326. }
  327. // Regenerate LE if aliases are different
  328. if ((!empty($_POST['v_ssl'])) && ($v_letsencrypt == 'yes') && (!empty($_POST['v_letsencrypt'])) && empty($_SESSION['error_msg'])) {
  329. // If aliases are different from stored aliases
  330. if (array_diff($valiases, $aliases) || array_diff($aliases, $valiases)) {
  331. // Add certificate with new aliases
  332. $l_aliases = str_replace("\n", ',', $v_aliases);
  333. exec(HESTIA_CMD."v-add-letsencrypt-domain ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($l_aliases)." ''", $output, $return_var);
  334. check_return_code($return_var, $output);
  335. unset($output);
  336. $v_letsencrypt = 'yes';
  337. $v_ssl = 'yes';
  338. $restart_web = 'yes';
  339. $restart_proxy = 'yes';
  340. exec(HESTIA_CMD."v-list-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." json", $output, $return_var);
  341. $ssl_str = json_decode(implode('', $output), true);
  342. unset($output);
  343. $v_ssl_crt = $ssl_str[$v_domain]['CRT'];
  344. $v_ssl_key = $ssl_str[$v_domain]['KEY'];
  345. $v_ssl_ca = $ssl_str[$v_domain]['CA'];
  346. $v_ssl_subject = $ssl_str[$v_domain]['SUBJECT'];
  347. $v_ssl_aliases = $ssl_str[$v_domain]['ALIASES'];
  348. $v_ssl_not_before = $ssl_str[$v_domain]['NOT_BEFORE'];
  349. $v_ssl_not_after = $ssl_str[$v_domain]['NOT_AFTER'];
  350. $v_ssl_signature = $ssl_str[$v_domain]['SIGNATURE'];
  351. $v_ssl_pub_key = $ssl_str[$v_domain]['PUB_KEY'];
  352. $v_ssl_issuer = $ssl_str[$v_domain]['ISSUER'];
  353. }
  354. }
  355. if ((!empty($v_stats)) && ($_POST['v_stats'] == $v_stats) && (empty($_SESSION['error_msg']))) {
  356. // Update statistics configuration when changing domain aliases
  357. $v_stats = escapeshellarg($_POST['v_stats']);
  358. exec(HESTIA_CMD."v-change-web-domain-stats ".$user." ".escapeshellarg($v_domain)." ".$v_stats, $output, $return_var);
  359. check_return_code($return_var, $output);
  360. unset($output);
  361. }
  362. }
  363. // Change document root for ssl domain
  364. if (($v_ssl == 'yes') && (!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  365. if ($v_ssl_home != $_POST['v_ssl_home']) {
  366. $v_ssl_home = escapeshellarg($_POST['v_ssl_home']);
  367. exec(HESTIA_CMD."v-change-web-domain-sslhome ".$user." ".escapeshellarg($v_domain)." ".$v_ssl_home." 'no'", $output, $return_var);
  368. check_return_code($return_var, $output);
  369. $v_ssl_home = $_POST['v_ssl_home'];
  370. $restart_web = 'yes';
  371. $restart_proxy = 'yes';
  372. unset($output);
  373. }
  374. }
  375. // Change SSL certificate
  376. if (($v_letsencrypt == 'no') && (empty($_POST['v_letsencrypt'])) && ($v_ssl == 'yes') && (!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  377. if (($v_ssl_crt != str_replace("\r\n", "\n", $_POST['v_ssl_crt'])) || ($v_ssl_key != str_replace("\r\n", "\n", $_POST['v_ssl_key'])) || ($v_ssl_ca != str_replace("\r\n", "\n", $_POST['v_ssl_ca']))) {
  378. exec('mktemp -d', $mktemp_output, $return_var);
  379. $tmpdir = $mktemp_output[0];
  380. // Certificate
  381. if (!empty($_POST['v_ssl_crt'])) {
  382. $fp = fopen($tmpdir."/".$v_domain.".crt", 'w');
  383. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_crt']));
  384. fwrite($fp, "\n");
  385. fclose($fp);
  386. }
  387. // Key
  388. if (!empty($_POST['v_ssl_key'])) {
  389. $fp = fopen($tmpdir."/".$v_domain.".key", 'w');
  390. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_key']));
  391. fwrite($fp, "\n");
  392. fclose($fp);
  393. }
  394. // CA
  395. if (!empty($_POST['v_ssl_ca'])) {
  396. $fp = fopen($tmpdir."/".$v_domain.".ca", 'w');
  397. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_ca']));
  398. fwrite($fp, "\n");
  399. fclose($fp);
  400. }
  401. exec(HESTIA_CMD."v-change-web-domain-sslcert ".$user." ".escapeshellarg($v_domain)." ".$tmpdir." 'no'", $output, $return_var);
  402. check_return_code($return_var, $output);
  403. unset($output);
  404. $restart_web = 'yes';
  405. $restart_proxy = 'yes';
  406. exec(HESTIA_CMD."v-list-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." json", $output, $return_var);
  407. $ssl_str = json_decode(implode('', $output), true);
  408. unset($output);
  409. $v_ssl_crt = $ssl_str[$v_domain]['CRT'];
  410. $v_ssl_key = $ssl_str[$v_domain]['KEY'];
  411. $v_ssl_ca = $ssl_str[$v_domain]['CA'];
  412. $v_ssl_subject = $ssl_str[$v_domain]['SUBJECT'];
  413. $v_ssl_aliases = $ssl_str[$v_domain]['ALIASES'];
  414. $v_ssl_not_before = $ssl_str[$v_domain]['NOT_BEFORE'];
  415. $v_ssl_not_after = $ssl_str[$v_domain]['NOT_AFTER'];
  416. $v_ssl_signature = $ssl_str[$v_domain]['SIGNATURE'];
  417. $v_ssl_pub_key = $ssl_str[$v_domain]['PUB_KEY'];
  418. $v_ssl_issuer = $ssl_str[$v_domain]['ISSUER'];
  419. // Cleanup certificate tempfiles
  420. if (!empty($_POST['v_ssl_crt'])) {
  421. unlink($tmpdir."/".$v_domain.".crt");
  422. }
  423. if (!empty($_POST['v_ssl_key'])) {
  424. unlink($tmpdir."/".$v_domain.".key");
  425. }
  426. if (!empty($_POST['v_ssl_ca'])) {
  427. unlink($tmpdir."/".$v_domain.".ca");
  428. }
  429. rmdir($tmpdir);
  430. }
  431. }
  432. // Delete Lets Encrypt support
  433. if (($v_letsencrypt == 'yes') && (empty($_POST['v_letsencrypt']) || empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  434. exec(HESTIA_CMD."v-delete-letsencrypt-domain ".$user." ".escapeshellarg($v_domain)." ''", $output, $return_var);
  435. check_return_code($return_var, $output);
  436. unset($output);
  437. $v_ssl_crt = '';
  438. $v_ssl_key = '';
  439. $v_ssl_ca = '';
  440. $v_letsencrypt = 'no';
  441. $v_letsencrypt_deleted = 'yes';
  442. $v_ssl = 'no';
  443. $restart_web = 'yes';
  444. $restart_proxy = 'yes';
  445. }
  446. // Delete SSL certificate
  447. if (($v_ssl == 'yes') && (empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  448. exec(HESTIA_CMD."v-delete-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." 'no'", $output, $return_var);
  449. check_return_code($return_var, $output);
  450. unset($output);
  451. $v_ssl_crt = '';
  452. $v_ssl_key = '';
  453. $v_ssl_ca = '';
  454. $v_ssl = 'no';
  455. $v_ssl_forcessl = 'no';
  456. $v_ssl_hsts = 'no';
  457. $restart_web = 'yes';
  458. $restart_proxy = 'yes';
  459. }
  460. // Add Lets Encrypt support
  461. if ((!empty($_POST['v_ssl'])) && ($v_letsencrypt == 'no') && (!empty($_POST['v_letsencrypt'])) && empty($_SESSION['error_msg'])) {
  462. $l_aliases = str_replace("\n", ',', $v_aliases);
  463. exec(HESTIA_CMD."v-add-letsencrypt-domain ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($l_aliases)." ''", $output, $return_var);
  464. check_return_code($return_var, $output);
  465. unset($output);
  466. if ($return_var != 0) {
  467. $v_letsencrypt = 'no';
  468. } else {
  469. $v_letsencrypt = 'yes';
  470. }
  471. $v_ssl = 'yes';
  472. if ($_POST['v_ssl_forcessl'] == 'on') {
  473. $v_ssl_forcessl = 'yes';
  474. } else {
  475. $v_ssl_forcessl = 'no';
  476. }
  477. $restart_web = 'yes';
  478. $restart_proxy = 'yes';
  479. }
  480. // Add SSL certificate
  481. if (($v_ssl == 'no') && (!empty($_POST['v_ssl'])) && (empty($v_letsencrypt_deleted)) && (empty($_SESSION['error_msg']))) {
  482. if (empty($_POST['v_ssl_crt'])) {
  483. $errors[] = 'ssl certificate';
  484. }
  485. if (empty($_POST['v_ssl_key'])) {
  486. $errors[] = 'ssl key';
  487. }
  488. if (empty($_POST['v_ssl_home'])) {
  489. $errors[] = 'ssl home';
  490. }
  491. $v_ssl_home = escapeshellarg($_POST['v_ssl_home']);
  492. if (!empty($errors[0])) {
  493. foreach ($errors as $i => $error) {
  494. if ($i == 0) {
  495. $error_msg = $error;
  496. } else {
  497. $error_msg = $error_msg.", ".$error;
  498. }
  499. }
  500. $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'), $error_msg);
  501. } else {
  502. exec('mktemp -d', $mktemp_output, $return_var);
  503. $tmpdir = $mktemp_output[0];
  504. // Certificate
  505. if (!empty($_POST['v_ssl_crt'])) {
  506. $fp = fopen($tmpdir."/".$v_domain.".crt", 'w');
  507. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_crt']));
  508. fclose($fp);
  509. }
  510. // Key
  511. if (!empty($_POST['v_ssl_key'])) {
  512. $fp = fopen($tmpdir."/".$v_domain.".key", 'w');
  513. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_key']));
  514. fclose($fp);
  515. }
  516. // CA
  517. if (!empty($_POST['v_ssl_ca'])) {
  518. $fp = fopen($tmpdir."/".$v_domain.".ca", 'w');
  519. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_ca']));
  520. fclose($fp);
  521. }
  522. exec(HESTIA_CMD."v-add-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." ".$tmpdir." ".$v_ssl_home." 'no'", $output, $return_var);
  523. check_return_code($return_var, $output);
  524. unset($output);
  525. $v_ssl = 'yes';
  526. $restart_web = 'yes';
  527. $restart_proxy = 'yes';
  528. exec(HESTIA_CMD."v-list-web-domain-ssl ".$user." ".escapeshellarg($v_domain)." json", $output, $return_var);
  529. $ssl_str = json_decode(implode('', $output), true);
  530. unset($output);
  531. $v_ssl_crt = $ssl_str[$v_domain]['CRT'];
  532. $v_ssl_key = $ssl_str[$v_domain]['KEY'];
  533. $v_ssl_ca = $ssl_str[$v_domain]['CA'];
  534. $v_ssl_subject = $ssl_str[$v_domain]['SUBJECT'];
  535. $v_ssl_aliases = $ssl_str[$v_domain]['ALIASES'];
  536. $v_ssl_not_before = $ssl_str[$v_domain]['NOT_BEFORE'];
  537. $v_ssl_not_after = $ssl_str[$v_domain]['NOT_AFTER'];
  538. $v_ssl_signature = $ssl_str[$v_domain]['SIGNATURE'];
  539. $v_ssl_pub_key = $ssl_str[$v_domain]['PUB_KEY'];
  540. $v_ssl_issuer = $ssl_str[$v_domain]['ISSUER'];
  541. // Cleanup certificate tempfiles
  542. if (!empty($_POST['v_ssl_crt'])) {
  543. unlink($tmpdir."/".$v_domain.".crt");
  544. }
  545. if (!empty($_POST['v_ssl_key'])) {
  546. unlink($tmpdir."/".$v_domain.".key");
  547. }
  548. if (!empty($_POST['v_ssl_ca'])) {
  549. unlink($tmpdir."/".$v_domain.".ca");
  550. }
  551. rmdir($tmpdir);
  552. }
  553. }
  554. // Add Force SSL
  555. if ((!empty($_POST['v_ssl_forcessl'])) && (!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  556. exec(HESTIA_CMD."v-add-web-domain-ssl-force ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  557. check_return_code($return_var, $output);
  558. unset($output);
  559. $v_ssl_forcessl = 'yes';
  560. $restart_web = 'yes';
  561. $restart_proxy = 'yes';
  562. }
  563. // Add SSL HSTS
  564. if ((!empty($_POST['v_ssl_hsts'])) && (!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  565. exec(HESTIA_CMD."v-add-web-domain-ssl-hsts ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  566. check_return_code($return_var, $output);
  567. unset($output);
  568. $v_ssl_hsts = 'yes';
  569. $restart_web = 'yes';
  570. $restart_proxy = 'yes';
  571. }
  572. // Delete Force SSL
  573. if (($v_ssl_forcessl == 'yes') && (empty($_POST['v_ssl_forcessl'])) && (empty($_SESSION['error_msg']))) {
  574. exec(HESTIA_CMD."v-delete-web-domain-ssl-force ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  575. check_return_code($return_var, $output);
  576. unset($output);
  577. $v_ssl_forcessl = 'no';
  578. $restart_web = 'yes';
  579. $restart_proxy = 'yes';
  580. }
  581. // Delete SSL HSTS
  582. if (($v_ssl_hsts == 'yes') && (empty($_POST['v_ssl_hsts'])) && (empty($_SESSION['error_msg']))) {
  583. exec(HESTIA_CMD."v-delete-web-domain-ssl-hsts ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  584. check_return_code($return_var, $output);
  585. unset($output);
  586. $v_ssl_hsts = 'no';
  587. $restart_web = 'yes';
  588. $restart_proxy = 'yes';
  589. }
  590. // Delete web stats
  591. if ((!empty($v_stats)) && ($_POST['v_stats'] == 'none') && (empty($_SESSION['error_msg']))) {
  592. exec(HESTIA_CMD."v-delete-web-domain-stats ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  593. check_return_code($return_var, $output);
  594. unset($output);
  595. $v_stats = '';
  596. }
  597. // Change web stats engine
  598. if ((!empty($v_stats)) && ($_POST['v_stats'] != $v_stats) && (empty($_SESSION['error_msg']))) {
  599. $v_stats = escapeshellarg($_POST['v_stats']);
  600. exec(HESTIA_CMD."v-change-web-domain-stats ".$user." ".escapeshellarg($v_domain)." ".$v_stats, $output, $return_var);
  601. check_return_code($return_var, $output);
  602. unset($output);
  603. }
  604. // Add web stats
  605. if ((empty($v_stats)) && ($_POST['v_stats'] != 'none') && (empty($_SESSION['error_msg']))) {
  606. $v_stats = escapeshellarg($_POST['v_stats']);
  607. exec(HESTIA_CMD."v-add-web-domain-stats ".$user." ".escapeshellarg($v_domain)." ".$v_stats, $output, $return_var);
  608. check_return_code($return_var, $output);
  609. unset($output);
  610. }
  611. // Delete web stats authorization
  612. if ((!empty($v_stats_user)) && (empty($_POST['v_stats_auth'])) && (empty($_SESSION['error_msg']))) {
  613. exec(HESTIA_CMD."v-delete-web-domain-stats-user ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  614. check_return_code($return_var, $output);
  615. unset($output);
  616. $v_stats_user = '';
  617. $v_stats_password = '';
  618. }
  619. // Change web stats user or password
  620. if ((empty($v_stats_user)) && (!empty($_POST['v_stats_auth'])) && (empty($_SESSION['error_msg']))) {
  621. if (empty($_POST['v_stats_user'])) {
  622. $errors[] = _('stats username');
  623. }
  624. if (!empty($errors[0])) {
  625. foreach ($errors as $i => $error) {
  626. if ($i == 0) {
  627. $error_msg = $error;
  628. } else {
  629. $error_msg = $error_msg.", ".$error;
  630. }
  631. }
  632. $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'), $error_msg);
  633. } else {
  634. $v_stats_user = escapeshellarg($_POST['v_stats_user']);
  635. $v_stats_password = tempnam("/tmp", "vst");
  636. $fp = fopen($v_stats_password, "w");
  637. fwrite($fp, $_POST['v_stats_password']."\n");
  638. fclose($fp);
  639. exec(HESTIA_CMD."v-add-web-domain-stats-user ".$user." ".escapeshellarg($v_domain)." ".$v_stats_user." ".$v_stats_password, $output, $return_var);
  640. check_return_code($return_var, $output);
  641. unset($output);
  642. unlink($v_stats_password);
  643. $v_stats_password = escapeshellarg($_POST['v_stats_password']);
  644. }
  645. }
  646. // Add web stats authorization
  647. if ((!empty($v_stats_user)) && (!empty($_POST['v_stats_auth'])) && (empty($_SESSION['error_msg']))) {
  648. if (empty($_POST['v_stats_user'])) {
  649. $errors[] = _('stats user');
  650. }
  651. if (!empty($errors[0])) {
  652. foreach ($errors as $i => $error) {
  653. if ($i == 0) {
  654. $error_msg = $error;
  655. } else {
  656. $error_msg = $error_msg.", ".$error;
  657. }
  658. }
  659. $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'), $error_msg);
  660. }
  661. if (($v_stats_user != $_POST['v_stats_user']) || (!empty($_POST['v_stats_password'])) && (empty($_SESSION['error_msg']))) {
  662. $v_stats_user = escapeshellarg($_POST['v_stats_user']);
  663. $v_stats_password = tempnam("/tmp", "vst");
  664. $fp = fopen($v_stats_password, "w");
  665. fwrite($fp, $_POST['v_stats_password']."\n");
  666. fclose($fp);
  667. exec(HESTIA_CMD."v-add-web-domain-stats-user ".$user." ".escapeshellarg($v_domain)." ".$v_stats_user." ".$v_stats_password, $output, $return_var);
  668. check_return_code($return_var, $output);
  669. unset($output);
  670. unlink($v_stats_password);
  671. $v_stats_password = escapeshellarg($_POST['v_stats_password']);
  672. }
  673. }
  674. // Update ftp account
  675. if (!empty($_POST['v_ftp_user'])) {
  676. $v_ftp_users_updated = array();
  677. foreach ($_POST['v_ftp_user'] as $i => $v_ftp_user_data) {
  678. if (empty($v_ftp_user_data['v_ftp_user'])) {
  679. continue;
  680. }
  681. $v_ftp_user_data['v_ftp_user'] = preg_replace("/^".$user."_/i", "", $v_ftp_user_data['v_ftp_user']);
  682. if ($v_ftp_user_data['is_new'] == 1 && !empty($_POST['v_ftp'])) {
  683. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (!filter_var($v_ftp_user_data['v_ftp_email'], FILTER_VALIDATE_EMAIL))) {
  684. $_SESSION['error_msg'] = _('Please enter valid email address.');
  685. }
  686. if (empty($v_ftp_user_data['v_ftp_user'])) {
  687. $errors[] = 'ftp user';
  688. }
  689. if (!empty($errors[0])) {
  690. foreach ($errors as $i => $error) {
  691. if ($i == 0) {
  692. $error_msg = $error;
  693. } else {
  694. $error_msg = $error_msg.", ".$error;
  695. }
  696. }
  697. $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'), $error_msg);
  698. }
  699. // Add ftp account
  700. $v_ftp_username = $v_ftp_user_data['v_ftp_user'];
  701. $v_ftp_username_full = $user . '_' . $v_ftp_user_data['v_ftp_user'];
  702. $v_ftp_user = escapeshellarg($v_ftp_username);
  703. $v_ftp_path = escapeshellarg(trim($v_ftp_user_data['v_ftp_path']));
  704. if (empty($_SESSION['error_msg'])) {
  705. $v_ftp_password = tempnam("/tmp", "vst");
  706. $fp = fopen($v_ftp_password, "w");
  707. fwrite($fp, $v_ftp_user_data['v_ftp_password']."\n");
  708. fclose($fp);
  709. exec(HESTIA_CMD."v-add-web-domain-ftp ".$user." ".escapeshellarg($v_domain)." ".$v_ftp_user." ".$v_ftp_password . " " . $v_ftp_path, $output, $return_var);
  710. check_return_code($return_var, $output);
  711. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (empty($_SESSION['error_msg']))) {
  712. $to = $v_ftp_user_data['v_ftp_email'];
  713. $subject = _("FTP login credentials");
  714. $hostname = exec('hostname');
  715. $from = "noreply@".$hostname;
  716. $from_name = _('Hestia Control Panel');
  717. $mailtext = sprintf(_('FTP_ACCOUNT_READY'), escapeshellarg($_GET['domain']), $user, $v_ftp_username, $v_ftp_user_data['v_ftp_password']);
  718. send_email($to, $subject, $mailtext, $from, $from_name);
  719. unset($v_ftp_email);
  720. }
  721. unset($output);
  722. unlink($v_ftp_password);
  723. $v_ftp_password = escapeshellarg($v_ftp_user_data['v_ftp_password']);
  724. }
  725. if ($return_var == 0) {
  726. $v_ftp_password = "";
  727. $v_ftp_user_data['is_new'] = 0;
  728. } else {
  729. $v_ftp_user_data['is_new'] = 1;
  730. }
  731. $v_ftp_users_updated[] = array(
  732. 'is_new' => empty($_SESSION['error_msg']) ? 0 : 1,
  733. 'v_ftp_user' => $v_ftp_username_full,
  734. 'v_ftp_password' => $v_ftp_password,
  735. 'v_ftp_path' => $v_ftp_user_data['v_ftp_path'],
  736. 'v_ftp_email' => $v_ftp_user_data['v_ftp_email'],
  737. 'v_ftp_pre_path' => $v_ftp_user_prepath
  738. );
  739. continue;
  740. }
  741. // Delete FTP account
  742. if ($v_ftp_user_data['delete'] == 1) {
  743. $v_ftp_username = $user_plain . '_' . $v_ftp_user_data['v_ftp_user'];
  744. exec(HESTIA_CMD."v-delete-web-domain-ftp ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($v_ftp_username), $output, $return_var);
  745. check_return_code($return_var, $output);
  746. unset($output);
  747. continue;
  748. }
  749. if (!empty($_POST['v_ftp'])) {
  750. if (empty($v_ftp_user_data['v_ftp_user'])) {
  751. $errors[] = _('ftp user');
  752. }
  753. if (!empty($errors[0])) {
  754. foreach ($errors as $i => $error) {
  755. if ($i == 0) {
  756. $error_msg = $error;
  757. } else {
  758. $error_msg = $error_msg.", ".$error;
  759. }
  760. }
  761. $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'), $error_msg);
  762. }
  763. // Change FTP account path
  764. $v_ftp_username_for_emailing = $v_ftp_user_data['v_ftp_user'];
  765. $v_ftp_username = $user_plain . '_' . $v_ftp_user_data['v_ftp_user']; //preg_replace("/^".$user."_/", "", $v_ftp_user_data['v_ftp_user']);
  766. $v_ftp_username = escapeshellarg($v_ftp_username);
  767. $v_ftp_path = escapeshellarg(trim($v_ftp_user_data['v_ftp_path']));
  768. if (escapeshellarg(trim($v_ftp_user_data['v_ftp_path_prev'])) != $v_ftp_path) {
  769. exec(HESTIA_CMD."v-change-web-domain-ftp-path ".$user." ".escapeshellarg($v_domain)." ".$v_ftp_username." ".$v_ftp_path, $output, $return_var);
  770. check_return_code($return_var, $output);
  771. unset($output);
  772. }
  773. // Change FTP account password
  774. if (!empty($v_ftp_user_data['v_ftp_password'])) {
  775. $v_ftp_password = tempnam("/tmp", "vst");
  776. $fp = fopen($v_ftp_password, "w");
  777. fwrite($fp, $v_ftp_user_data['v_ftp_password']."\n");
  778. fclose($fp);
  779. exec(HESTIA_CMD."v-change-web-domain-ftp-password ".$user." ".escapeshellarg($v_domain)." ".$v_ftp_username." ".$v_ftp_password, $output, $return_var);
  780. unlink($v_ftp_password);
  781. $to = $v_ftp_user_data['v_ftp_email'];
  782. $subject = _("FTP login credentials");
  783. $hostname = exec('hostname');
  784. $from = "noreply@".$hostname;
  785. $from_name = _('Hestia Control Panel');
  786. $mailtext = sprintf(_('FTP_ACCOUNT_READY'), escapeshellarg($_GET['domain']), $user, $v_ftp_username_for_emailing, $v_ftp_user_data['v_ftp_password']);
  787. send_email($to, $subject, $mailtext, $from, $from_name);
  788. unset($v_ftp_email);
  789. }
  790. if (empty($v_ftp_user_data['v_ftp_email'])) {
  791. $v_ftp_user_data['v_ftp_email'] = '';
  792. }
  793. $v_ftp_users_updated[] = array(
  794. 'is_new' => 0,
  795. 'v_ftp_user' => $v_ftp_username,
  796. 'v_ftp_password' => $v_ftp_user_data['v_ftp_password'],
  797. 'v_ftp_path' => $v_ftp_user_data['v_ftp_path'],
  798. 'v_ftp_email' => $v_ftp_user_data['v_ftp_email'],
  799. 'v_ftp_pre_path' => $v_ftp_user_prepath
  800. );
  801. }
  802. }
  803. }
  804. //custom docoot with check box disabled
  805. if (!empty($v_custom_doc_root) && empty($_POST['v_custom_doc_root_check'])) {
  806. exec(HESTIA_CMD."v-change-web-domain-docroot ".$user." ".escapeshellarg($v_domain)." default", $output, $return_var);
  807. check_return_code($return_var, $output);
  808. unset($output);
  809. unset($_POST['v-custom-doc-domain'], $_POST['v-custom-doc-folder']);
  810. $restart_web = 'yes';
  811. $restart_proxy = 'yes';
  812. }
  813. if (!empty($_POST['v-custom-doc-domain']) && !empty($_POST['v_custom_doc_root_check']) && $v_custom_doc_root_prepath.$v_custom_doc_domain.'/public_html'.$v_custom_doc_folder != $v_custom_doc_root) {
  814. if ($_POST['v-custom-doc-domain'] == $v_domain && empty($_POST['v-custom-doc-folder'])) {
  815. exec(HESTIA_CMD."v-change-web-domain-docroot ".$user." ".escapeshellarg($v_domain)." default", $output, $return_var);
  816. check_return_code($return_var, $output);
  817. unset($output);
  818. } else {
  819. $v_custom_doc_folder = escapeshellarg(rtrim($_POST['v-custom-doc-folder'], '/'));
  820. $v_custom_doc_domain = escapeshellarg($_POST['v-custom-doc-domain']);
  821. exec(HESTIA_CMD."v-change-web-domain-docroot ".$user." ".escapeshellarg($v_domain)." ".$v_custom_doc_domain." ".$v_custom_doc_folder ." yes", $output, $return_var);
  822. check_return_code($return_var, $output);
  823. unset($output);
  824. $v_custom_doc_root = 1;
  825. }
  826. $restart_web = 'yes';
  827. $restart_proxy = 'yes';
  828. } else {
  829. unset($v_custom_doc_root);
  830. }
  831. if (!empty($v_redirect) && empty($_POST['v-redirect-checkbox'])) {
  832. exec(HESTIA_CMD."v-delete-web-domain-redirect ".$user." ".escapeshellarg($v_domain), $output, $return_var);
  833. check_return_code($return_var, $output);
  834. unset($output);
  835. unset($_POST['v-redirect']);
  836. $restart_web = 'yes';
  837. $restart_proxy = 'yes';
  838. }
  839. if (!empty($_POST['v-redirect']) && !empty($_POST['v-redirect-checkbox'])) {
  840. if (empty($v_redirect)) {
  841. if ($_POST['v-redirect'] == 'custom' && empty($_POST['v-redirect-custom'])) {
  842. } else {
  843. if ($_POST['v-redirect'] == 'custom') {
  844. $_POST['v-redirect'] = $_POST['v-redirect-custom'];
  845. }
  846. exec(HESTIA_CMD."v-add-web-domain-redirect ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($_POST['v-redirect'])." ".escapeshellarg($_POST['v-redirect-code']), $output, $return_var);
  847. check_return_code($return_var, $output);
  848. unset($output);
  849. $restart_web = 'yes';
  850. $restart_proxy = 'yes';
  851. }
  852. } else {
  853. if ($_POST['v-redirect'] == 'custom') {
  854. $_POST['v-redirect'] = $_POST['v-redirect-custom'];
  855. }
  856. if ($_POST['v-redirect'] != $v_redirect || $_POST['v-redirect-code'] != $v_redirect_code) {
  857. exec(HESTIA_CMD."v-add-web-domain-redirect ".$user." ".escapeshellarg($v_domain)." ".escapeshellarg($_POST['v-redirect'])." ".escapeshellarg($_POST['v-redirect-code']), $output, $return_var);
  858. check_return_code($return_var, $output);
  859. unset($output);
  860. $restart_web = 'yes';
  861. $restart_proxy = 'yes';
  862. }
  863. }
  864. }
  865. // Restart web server
  866. if (!empty($restart_web) && (empty($_SESSION['error_msg']))) {
  867. exec(HESTIA_CMD."v-restart-web", $output, $return_var);
  868. check_return_code($return_var, $output);
  869. unset($output);
  870. }
  871. // Restart proxy server
  872. if ((!empty($_SESSION['PROXY_SYSTEM'])) && !empty($restart_proxy) && (empty($_SESSION['error_msg']))) {
  873. exec(HESTIA_CMD."v-restart-proxy", $output, $return_var);
  874. check_return_code($return_var, $output);
  875. unset($output);
  876. }
  877. // Restart dns server
  878. if (!empty($restart_dns) && (empty($_SESSION['error_msg']))) {
  879. exec(HESTIA_CMD."v-restart-dns", $output, $return_var);
  880. check_return_code($return_var, $output);
  881. unset($output);
  882. }
  883. // Set success message
  884. if (empty($_SESSION['error_msg'])) {
  885. $_SESSION['ok_msg'] = _('Changes has been saved.');
  886. header("Location: /edit/web/?domain=" . $v_domain);
  887. exit();
  888. }
  889. }
  890. $v_ftp_users_raw = explode(':', $v_ftp_user);
  891. $v_ftp_users_paths_raw = explode(':', $data[$v_domain]['FTP_PATH']);
  892. $v_ftp_users = array();
  893. foreach ($v_ftp_users_raw as $v_ftp_user_index => $v_ftp_user_val) {
  894. if (empty($v_ftp_user_val)) {
  895. continue;
  896. }
  897. $v_ftp_users[] = array(
  898. 'is_new' => 0,
  899. 'v_ftp_user' => preg_replace("/^".$user_plain."_/", "", $v_ftp_user_val),
  900. 'v_ftp_password' => $v_ftp_password,
  901. 'v_ftp_path' => (isset($v_ftp_users_paths_raw[$v_ftp_user_index]) ? $v_ftp_users_paths_raw[$v_ftp_user_index] : ''),
  902. 'v_ftp_email' => $v_ftp_email,
  903. 'v_ftp_pre_path' => $v_ftp_user_prepath
  904. );
  905. }
  906. if (empty($v_ftp_users)) {
  907. $v_ftp_user = null;
  908. $v_ftp_users[] = array(
  909. 'is_new' => 1,
  910. 'v_ftp_user' => '',
  911. 'v_ftp_password' => '',
  912. 'v_ftp_path' => (isset($v_ftp_users_paths_raw[$v_ftp_user_index]) ? $v_ftp_users_paths_raw[$v_ftp_user_index] : ''),
  913. 'v_ftp_email' => '',
  914. 'v_ftp_pre_path' => $v_ftp_user_prepath
  915. );
  916. }
  917. // set default pre path for newly created users
  918. $v_ftp_pre_path_new_user = $v_ftp_user_prepath;
  919. if (isset($v_ftp_users_updated)) {
  920. $v_ftp_users = $v_ftp_users_updated;
  921. if (empty($v_ftp_users_updated)) {
  922. $v_ftp_user = null;
  923. $v_ftp_users[] = array(
  924. 'is_new' => 1,
  925. 'v_ftp_user' => '',
  926. 'v_ftp_password' => '',
  927. 'v_ftp_path' => (isset($v_ftp_users_paths_raw[$v_ftp_user_index]) ? $v_ftp_users_paths_raw[$v_ftp_user_index] : ''),
  928. 'v_ftp_email' => '',
  929. 'v_ftp_pre_path' => $v_ftp_user_prepath
  930. );
  931. }
  932. }
  933. // Render page
  934. render_page($user, $TAB, 'edit_web');
  935. // Flush session messages
  936. unset($_SESSION['error_msg']);
  937. unset($_SESSION['ok_msg']);