index.php 2.3 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273
  1. <?php
  2. error_reporting(E_ALL);
  3. $TAB = 'USER';
  4. // Main include
  5. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  6. // Check POST request
  7. if (!empty($_POST['ok'])) {
  8. // Check token
  9. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  10. header('location: /login/');
  11. exit();
  12. }
  13. if (empty($_POST['v_key'])){
  14. $_SESSION['error_msg'] = _('Field SSH_KEY can not be blank.');
  15. }
  16. if (($_SESSION['userContext'] === 'admin') && (!empty($_GET['user']))) {
  17. $user = $_GET['user'];
  18. }
  19. $user = escapeshellarg($user);
  20. if(!$_SESSION['error_msg']){
  21. if($_POST){
  22. //key if key already exists
  23. exec (HESTIA_CMD . "v-list-user-ssh-key ".$user." json", $output, $return_var);
  24. $data = json_decode(implode('', $output), true);
  25. unset($output);
  26. $keylist = array();
  27. foreach($data as $key => $value){
  28. $idlist[] = trim($data[$key]['ID']);
  29. $keylist[] = trim($data[$key]['KEY']);
  30. }
  31. $v_key_parts = explode(' ',$_POST['v_key']);
  32. $key_id = trim($v_key_parts[2]);
  33. if($v_key_parts[2] == ''){
  34. $v_key_parts[2] = md5(time());
  35. $_POST['v_key'] .= ' '.$v_key_parts[2];
  36. }
  37. //for deleting / revoking key the last part user@domain is used therefore needs to be unique
  38. //maybe consider adding random generated message or even an human read able string set by user?
  39. if(in_array($v_key_parts[2], $idlist)){
  40. $_SESSION['error_msg'] = _('SSH KEY already exists');
  41. }
  42. if(in_array($v_key_parts[1], $keylist)){
  43. $_SESSION['error_msg'] = _('SSH KEY already exists');
  44. }
  45. $v_key = escapeshellarg(trim($_POST['v_key']));
  46. }
  47. }
  48. if (empty($_SESSION['error_msg'])) {
  49. exec (HESTIA_CMD."v-add-user-ssh-key ".$user." ".$v_key, $output, $return_var);
  50. check_return_code($return_var,$output);
  51. }
  52. unset($output);
  53. // Flush field values on success
  54. if (empty($_SESSION['error_msg'])) {
  55. $_SESSION['ok_msg'] = _('SSH KEY created');
  56. }
  57. }
  58. render_page($user, $TAB, 'add_key');
  59. // Flush session messages
  60. unset($_SESSION['error_msg']);
  61. unset($_SESSION['ok_msg']);