main.php 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424
  1. <?php
  2. use PHPMailer\PHPMailer\PHPMailer;
  3. use PHPMailer\PHPMailer\SMTP;
  4. use PHPMailer\PHPMailer\Exception;
  5. require 'vendor/autoload.php';
  6. session_start();
  7. define('HESTIA_CMD', '/usr/bin/sudo /usr/local/hestia/bin/');
  8. if ($_SESSION['RELEASE_BRANCH'] == 'release' && $_SESSION['DEBUG_MODE'] == 'false') {
  9. define('JS_LATEST_UPDATE','v=' . $_SESSION['VERSION']);
  10. }else{
  11. define('JS_LATEST_UPDATE','r=' . time());
  12. }
  13. define('DEFAULT_PHP_VERSION', 'php-' . exec('php -r "echo (float)phpversion();"'));
  14. // Load Hestia Config directly
  15. load_hestia_config();
  16. require_once(dirname(__FILE__) . '/prevent_csrf.php');
  17. function destroy_sessions(){
  18. unset($_SESSION);
  19. session_unset();
  20. session_destroy();
  21. }
  22. $i = 0;
  23. // Saving user IPs to the session for preventing session hijacking
  24. $user_combined_ip = $_SERVER['REMOTE_ADDR'];
  25. if (isset($_SERVER['HTTP_CLIENT_IP'])) {
  26. $user_combined_ip .= '|' . $_SERVER['HTTP_CLIENT_IP'];
  27. }
  28. if (isset($_SERVER['HTTP_X_FORWARDED_FOR'])) {
  29. $user_combined_ip .= '|' . $_SERVER['HTTP_X_FORWARDED_FOR'];
  30. }
  31. if (isset($_SERVER['HTTP_FORWARDED_FOR'])) {
  32. $user_combined_ip .= '|' . $_SERVER['HTTP_FORWARDED_FOR'];
  33. }
  34. if (isset($_SERVER['HTTP_X_FORWARDED'])) {
  35. $user_combined_ip .= '|' . $_SERVER['HTTP_X_FORWARDED'];
  36. }
  37. if (isset($_SERVER['HTTP_FORWARDED'])) {
  38. $user_combined_ip .= '|' . $_SERVER['HTTP_FORWARDED'];
  39. }
  40. if (isset($_SERVER['HTTP_CF_CONNECTING_IP'])) {
  41. if (!empty($_SERVER['HTTP_CF_CONNECTING_IP'])) {
  42. $user_combined_ip = $_SERVER['HTTP_CF_CONNECTING_IP'];
  43. }
  44. }
  45. if (!isset($_SESSION['user_combined_ip'])) {
  46. $_SESSION['user_combined_ip'] = $user_combined_ip;
  47. }
  48. // Checking user to use session from the same IP he has been logged in
  49. if ($_SESSION['user_combined_ip'] != $user_combined_ip && $_SERVER['REMOTE_ADDR'] != '127.0.0.1'){
  50. $v_user = escapeshellarg($_SESSION['user']);
  51. $v_session_id = escapeshellarg($_SESSION['token']);
  52. exec(HESTIA_CMD . 'v-log-user-logout ' . $v_user . ' ' . $v_session_id, $output, $return_var);
  53. destroy_sessions();
  54. header('Location: /login/');
  55. exit;
  56. }
  57. // Check system settings
  58. if ((!isset($_SESSION['VERSION'])) && (!defined('NO_AUTH_REQUIRED'))) {
  59. destroy_sessions();
  60. header('Location: /login/');
  61. exit;
  62. }
  63. // Check user session
  64. if ((!isset($_SESSION['user'])) && (!defined('NO_AUTH_REQUIRED'))) {
  65. destroy_sessions();
  66. header('Location: /login/');
  67. exit;
  68. }
  69. // Generate CSRF Token
  70. if (isset($_SESSION['user'])) {
  71. if (!isset($_SESSION['token'])){
  72. $token = bin2hex(file_get_contents('/dev/urandom', false, null, 0, 16));
  73. $_SESSION['token'] = $token;
  74. }
  75. }
  76. if (!defined('NO_AUTH_REQUIRED')){
  77. if (empty($_SESSION['LAST_ACTIVITY']) || empty($_SESSION['INACTIVE_SESSION_TIMEOUT'])){
  78. destroy_sessions();
  79. header('Location: /login/');
  80. } elseif ($_SESSION['INACTIVE_SESSION_TIMEOUT'] * 60 + $_SESSION['LAST_ACTIVITY'] < time()) {
  81. $v_user = escapeshellarg($_SESSION['user']);
  82. $v_session_id = escapeshellarg($_SESSION['token']);
  83. exec(HESTIA_CMD . 'v-log-user-logout ' . $v_user . ' ' . $v_session_id, $output, $return_var);
  84. destroy_sessions();
  85. header('Location: /login/');
  86. exit;
  87. } else {
  88. $_SESSION['LAST_ACTIVITY'] = time();
  89. }
  90. }
  91. if (isset($_SESSION['user'])) {
  92. $user = $_SESSION['user'];
  93. }
  94. if (isset($_SESSION['look']) && ($_SESSION['userContext'] === 'admin')) {
  95. $user = $_SESSION['look'];
  96. }
  97. require_once(dirname(__FILE__) . '/i18n.php');
  98. function check_error($return_var) {
  99. if ( $return_var > 0 ) {
  100. header('Location: /error/');
  101. exit;
  102. }
  103. }
  104. function check_return_code($return_var,$output) {
  105. if ($return_var != 0) {
  106. $error = implode('<br>', $output);
  107. if (empty($error)) $error = sprintf(_('Error code:'), $return_var);
  108. $_SESSION['error_msg'] = $error;
  109. }
  110. }
  111. function render_page($user, $TAB, $page) {
  112. $__template_dir = dirname(__DIR__) . '/templates/';
  113. $__pages_js_dir = dirname(__DIR__) . '/js/pages/';
  114. // Header
  115. include($__template_dir . 'header.html');
  116. // Panel
  117. top_panel(empty($_SESSION['look']) ? $_SESSION['user'] : $_SESSION['look'], $TAB);
  118. // Extract global variables
  119. // I think those variables should be passed via arguments
  120. extract($GLOBALS, EXTR_SKIP);
  121. // Policies controller
  122. @include_once(dirname(__DIR__) . '/inc/policies.php');
  123. // Body
  124. include($__template_dir . 'pages/' . $page . '.html');
  125. // Including common js files
  126. @include_once(dirname(__DIR__) . '/templates/includes/end_js.html');
  127. // Including page specific js file
  128. if(file_exists($__pages_js_dir . $page . '.js'))
  129. echo '<script src="/js/pages/' . $page . '.js?' . JS_LATEST_UPDATE . '"></script>';
  130. // Footer
  131. include($__template_dir . 'footer.html');
  132. }
  133. function top_panel($user, $TAB) {
  134. global $panel;
  135. $command = HESTIA_CMD . 'v-list-user ' . escapeshellarg($user) . " 'json'";
  136. exec ($command, $output, $return_var);
  137. if ( $return_var > 0 ) {
  138. echo '<span style="font-size: 18px;"><b>ERROR: Unable to retrieve account details.</b><br>Please <b><a href="/login/">log in</a></b> again.</span>';
  139. destroy_sessions();
  140. header('Location: /login/');
  141. exit;
  142. }
  143. $panel = json_decode(implode('', $output), true);
  144. unset($output);
  145. // Log out active sessions for suspended users
  146. if (($panel[$user]['SUSPENDED'] === 'yes') && ($_SESSION['POLICY_USER_VIEW_SUSPENDED'] !== 'yes')) {
  147. $_SESSION['error_msg'] = 'You have been logged out. Please log in again.';
  148. destroy_sessions();
  149. header('Location: /login/');
  150. }
  151. // Reset user permissions if changed while logged in
  152. if (($panel[$user]['ROLE']) !== ($_SESSION['userContext']) && (!isset($_SESSION['look']))) {
  153. unset($_SESSION['userContext']);
  154. $_SESSION['userContext'] = $panel[$user]['ROLE'];
  155. }
  156. // Load user's selected theme and do not change it when impersonting user
  157. if ( (isset($panel[$user]['THEME'])) && (!isset($_SESSION['look']) )) {
  158. $_SESSION['userTheme'] = $panel[$user]['THEME'];
  159. }
  160. // Unset userTheme override variable if POLICY_USER_CHANGE_THEME is set to no
  161. if ($_SESSION['POLICY_USER_CHANGE_THEME'] === 'no') {
  162. unset($_SESSION['userTheme']);
  163. }
  164. // Set preferred sort order
  165. if (!isset($_SESSION['look'])) {
  166. $_SESSION['userSortOrder'] = $panel[$user]['PREF_UI_SORT'];
  167. }
  168. // Set home location URLs
  169. if (($_SESSION['userContext'] === 'admin') && (!isset($_SESSION['look']))) {
  170. // Display users list for administrators unless they are impersonating a user account
  171. $home_url = '/list/user/';
  172. } else {
  173. // Set home location URL based on available package features from account
  174. if ($panel[$user]['WEB_DOMAINS'] != '0') {
  175. $home_url = '/list/web/';
  176. } elseif ($panel[$user]['DNS_DOMAINS'] != '0') {
  177. $home_url = '/list/dns/';
  178. } elseif ($panel[$user]['MAIL_DOMAINS'] != '0') {
  179. $home_url = '/list/mail/';
  180. } elseif ($panel[$user]['DATABASES'] != '0') {
  181. $home_url = '/list/db/';
  182. } elseif ($panel[$user]['CRON_JOBS'] != '0') {
  183. $home_url = '/list/cron/';
  184. } elseif ($panel[$user]['BACKUPS'] != '0') {
  185. $home_url = '/list/backups/';
  186. }
  187. }
  188. include(dirname(__FILE__) . '/../templates/includes/panel.html');
  189. }
  190. function translate_date($date){
  191. $date = strtotime($date);
  192. return strftime('%d &nbsp;', $date) . _(strftime('%b', $date)) . strftime(' &nbsp;%Y', $date);
  193. }
  194. function humanize_time($usage) {
  195. if ( $usage > 60 ) {
  196. $usage = $usage / 60;
  197. if ( $usage > 24 ) {
  198. $usage = $usage / 24;
  199. $usage = number_format($usage);
  200. return sprintf(ngettext('%d day', '%d days', $usage), $usage);
  201. } else {
  202. return sprintf(ngettext('%d hour', '%d hours', $usage), $usage);
  203. }
  204. } else {
  205. return sprintf(ngettext('%d minute', '%d minutes', $usage), $usage);
  206. }
  207. }
  208. function humanize_usage_size($usage) {
  209. if ( $usage > 1024 ) {
  210. $usage = $usage / 1024;
  211. if ( $usage > 1024 ) {
  212. $usage = $usage / 1024 ;
  213. if ( $usage > 1024 ) {
  214. $usage = $usage / 1024 ;
  215. $usage = number_format($usage, 2);
  216. } else {
  217. $usage = number_format($usage, 2);
  218. }
  219. } else {
  220. $usage = number_format($usage, 2);
  221. }
  222. }
  223. return $usage;
  224. }
  225. function humanize_usage_measure($usage) {
  226. $measure = 'kb';
  227. if ( $usage > 1024 ) {
  228. $usage = $usage / 1024;
  229. if ( $usage > 1024 ) {
  230. $usage = $usage / 1024 ;
  231. $measure = ( $usage > 1024 ) ? 'pb' : 'tb';
  232. } else {
  233. $measure = 'gb';
  234. }
  235. } else {
  236. $measure = 'mb';
  237. }
  238. return $measure;
  239. }
  240. function get_percentage($used,$total) {
  241. if (!isset($total)) $total = 0;
  242. if (!isset($used)) $used = 0;
  243. if ( $total == 0 ) {
  244. $percent = 0;
  245. } else {
  246. $percent = $used / $total;
  247. $percent = $percent * 100;
  248. $percent = number_format($percent, 0, '', '');
  249. if ( $percent < 0 ) {
  250. $percent = 0;
  251. } elseif ( $percent > 100 ) {
  252. $percent = 100;
  253. }
  254. }
  255. return $percent;
  256. }
  257. function send_email($to, $subject, $mailtext, $from, $from_name, $to_name = '') {
  258. $mail = new PHPMailer();
  259. if (isset($_SESSION['USE_SERVER_SMTP']) && $_SESSION['USE_SERVER_SMTP'] == "true") {
  260. $from = $_SESSION['SERVER_SMTP_ADDR'];
  261. $mail->IsSMTP();
  262. $mail->Mailer = "smtp";
  263. $mail->SMTPDebug = 0;
  264. $mail->SMTPAuth = TRUE;
  265. $mail->SMTPSecure = $_SESSION['SERVER_SMTP_SECURITY'];
  266. $mail->Port = $_SESSION['SERVER_SMTP_PORT'];
  267. $mail->Host = $_SESSION['SERVER_SMTP_HOST'];
  268. $mail->Username = $_SESSION['SERVER_SMTP_USER'];
  269. $mail->Password = $_SESSION['SERVER_SMTP_PASSWD'];
  270. }
  271. $mail->IsHTML(true);
  272. $mail->ClearReplyTos();
  273. if (empty($to_name)){
  274. $mail->AddAddress($to);
  275. }else{
  276. $mail->AddAddress($to, $to_name);
  277. }
  278. $mail->SetFrom($from, $from_name);
  279. $mail->CharSet = "utf-8";
  280. $mail->Subject = $subject;
  281. $content = $mailtext;
  282. $content = nl2br($content);
  283. $mail->MsgHTML($content);
  284. $mail->Send();
  285. }
  286. function list_timezones() {
  287. foreach(['AKST', 'AKDT', 'PST', 'PDT', 'MST', 'MDT', 'CST', 'CDT', 'EST', 'EDT', 'AST', 'ADT'] as $timezone) {
  288. $tz = new DateTimeZone($timezone);
  289. $timezone_offsets[$timezone] = $tz->getOffset(new DateTime);
  290. }
  291. foreach(DateTimeZone::listIdentifiers() as $timezone) {
  292. $tz = new DateTimeZone($timezone);
  293. $timezone_offsets[$timezone] = $tz->getOffset(new DateTime);
  294. }
  295. foreach($timezone_offsets as $timezone => $offset) {
  296. $offset_prefix = $offset < 0 ? '-' : '+';
  297. $offset_formatted = gmdate( 'H:i', abs($offset) );
  298. $pretty_offset = "UTC${offset_prefix}${offset_formatted}";
  299. $t = new DateTimeZone($timezone);
  300. $c = new DateTime(null, $t);
  301. $current_time = $c->format('H:i:s');
  302. $timezone_list[$timezone] = "$timezone [ $current_time ] ${pretty_offset}";
  303. }
  304. return $timezone_list;
  305. }
  306. /**
  307. * A function that tells is it MySQL installed on the system, or it is MariaDB.
  308. *
  309. * Explaination:
  310. * $_SESSION['DB_SYSTEM'] has 'mysql' value even if MariaDB is installed, so you can't figure out is it really MySQL or it's MariaDB.
  311. * So, this function will make it clear.
  312. *
  313. * If MySQL is installed, function will return 'mysql' as a string.
  314. * If MariaDB is installed, function will return 'mariadb' as a string.
  315. *
  316. * Hint: if you want to check if PostgreSQL is installed - check value of $_SESSION['DB_SYSTEM']
  317. *
  318. * @return string
  319. */
  320. function is_it_mysql_or_mariadb() {
  321. exec (HESTIA_CMD . 'v-list-sys-services json', $output, $return_var);
  322. $data = json_decode(implode('', $output), true);
  323. unset($output);
  324. $mysqltype = 'mysql';
  325. if (isset($data['mariadb'])) $mysqltype = 'mariadb';
  326. return $mysqltype;
  327. }
  328. function load_hestia_config() {
  329. // Check system configuration
  330. exec (HESTIA_CMD . "v-list-sys-config json", $output, $return_var);
  331. $data = json_decode(implode('', $output), true);
  332. $sys_arr = $data['config'];
  333. foreach ($sys_arr as $key => $value) {
  334. $_SESSION[$key] = $value;
  335. }
  336. }
  337. /**
  338. * Returns the list of all web domains from all users grouped by Backend Template used and owner
  339. *
  340. * @return array
  341. */
  342. function backendtpl_with_webdomains() {
  343. exec (HESTIA_CMD . 'v-list-users json', $output, $return_var);
  344. $users = json_decode(implode('', $output), true);
  345. unset($output);
  346. $backend_list=[];
  347. foreach ($users as $user => $user_details) {
  348. exec (HESTIA_CMD . 'v-list-web-domains '. escapeshellarg($user) . ' json', $output, $return_var);
  349. $domains = json_decode(implode('', $output), true);
  350. unset($output);
  351. foreach ($domains as $domain => $domain_details) {
  352. if (!empty($domain_details['BACKEND'])) {
  353. $backend = $domain_details['BACKEND'];
  354. $backend_list[$backend][$user][] = $domain;
  355. }
  356. }
  357. }
  358. return $backend_list;
  359. }
  360. /**
  361. * Check if password is valid
  362. *
  363. * @return int; 1 / 0
  364. */
  365. function validate_password($password){
  366. return preg_match('/^(?=.*[a-z])(?=.*[A-Z])(?=.*\d)(.){8,}$/', $password);
  367. }