main.php 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464
  1. <?php
  2. use PHPMailer\PHPMailer\PHPMailer;
  3. use PHPMailer\PHPMailer\SMTP;
  4. use PHPMailer\PHPMailer\Exception;
  5. require 'vendor/autoload.php';
  6. session_start();
  7. define('HESTIA_CMD', '/usr/bin/sudo /usr/local/hestia/bin/');
  8. if ($_SESSION['RELEASE_BRANCH'] == 'release' && $_SESSION['DEBUG_MODE'] == 'false') {
  9. define('JS_LATEST_UPDATE', 'v=' . $_SESSION['VERSION']);
  10. } else {
  11. define('JS_LATEST_UPDATE', 'r=' . time());
  12. }
  13. define('DEFAULT_PHP_VERSION', 'php-' . exec('php -r "echo substr(phpversion(),0,3);"'));
  14. // Load Hestia Config directly
  15. load_hestia_config();
  16. require_once(dirname(__FILE__) . '/prevent_csrf.php');
  17. function destroy_sessions()
  18. {
  19. unset($_SESSION);
  20. session_unset();
  21. session_destroy();
  22. }
  23. $i = 0;
  24. // Saving user IPs to the session for preventing session hijacking
  25. $user_combined_ip = $_SERVER['REMOTE_ADDR'];
  26. if (isset($_SERVER['HTTP_CLIENT_IP'])) {
  27. $user_combined_ip .= '|' . $_SERVER['HTTP_CLIENT_IP'];
  28. }
  29. if (isset($_SERVER['HTTP_X_FORWARDED_FOR'])) {
  30. $user_combined_ip .= '|' . $_SERVER['HTTP_X_FORWARDED_FOR'];
  31. }
  32. if (isset($_SERVER['HTTP_FORWARDED_FOR'])) {
  33. $user_combined_ip .= '|' . $_SERVER['HTTP_FORWARDED_FOR'];
  34. }
  35. if (isset($_SERVER['HTTP_X_FORWARDED'])) {
  36. $user_combined_ip .= '|' . $_SERVER['HTTP_X_FORWARDED'];
  37. }
  38. if (isset($_SERVER['HTTP_FORWARDED'])) {
  39. $user_combined_ip .= '|' . $_SERVER['HTTP_FORWARDED'];
  40. }
  41. if (isset($_SERVER['HTTP_CF_CONNECTING_IP'])) {
  42. if (!empty($_SERVER['HTTP_CF_CONNECTING_IP'])) {
  43. $user_combined_ip = $_SERVER['HTTP_CF_CONNECTING_IP'];
  44. }
  45. }
  46. if (!isset($_SESSION['user_combined_ip'])) {
  47. $_SESSION['user_combined_ip'] = $user_combined_ip;
  48. }
  49. // Checking user to use session from the same IP he has been logged in
  50. if ($_SESSION['user_combined_ip'] != $user_combined_ip && $_SERVER['REMOTE_ADDR'] != '127.0.0.1') {
  51. $v_user = escapeshellarg($_SESSION['user']);
  52. $v_session_id = escapeshellarg($_SESSION['token']);
  53. exec(HESTIA_CMD . 'v-log-user-logout ' . $v_user . ' ' . $v_session_id, $output, $return_var);
  54. destroy_sessions();
  55. header('Location: /login/');
  56. exit;
  57. }
  58. // Check system settings
  59. if ((!isset($_SESSION['VERSION'])) && (!defined('NO_AUTH_REQUIRED'))) {
  60. destroy_sessions();
  61. header('Location: /login/');
  62. exit;
  63. }
  64. // Check user session
  65. if ((!isset($_SESSION['user'])) && (!defined('NO_AUTH_REQUIRED'))) {
  66. destroy_sessions();
  67. header('Location: /login/');
  68. exit;
  69. }
  70. // Generate CSRF Token
  71. if (isset($_SESSION['user'])) {
  72. if (!isset($_SESSION['token'])) {
  73. $token = bin2hex(file_get_contents('/dev/urandom', false, null, 0, 16));
  74. $_SESSION['token'] = $token;
  75. }
  76. }
  77. if (!defined('NO_AUTH_REQUIRED')) {
  78. if (empty($_SESSION['LAST_ACTIVITY']) || empty($_SESSION['INACTIVE_SESSION_TIMEOUT'])) {
  79. destroy_sessions();
  80. header('Location: /login/');
  81. } elseif ($_SESSION['INACTIVE_SESSION_TIMEOUT'] * 60 + $_SESSION['LAST_ACTIVITY'] < time()) {
  82. $v_user = escapeshellarg($_SESSION['user']);
  83. $v_session_id = escapeshellarg($_SESSION['token']);
  84. exec(HESTIA_CMD . 'v-log-user-logout ' . $v_user . ' ' . $v_session_id, $output, $return_var);
  85. destroy_sessions();
  86. header('Location: /login/');
  87. exit;
  88. } else {
  89. $_SESSION['LAST_ACTIVITY'] = time();
  90. }
  91. }
  92. if (isset($_SESSION['user'])) {
  93. $user = $_SESSION['user'];
  94. }
  95. if (isset($_SESSION['look']) && ($_SESSION['userContext'] === 'admin')) {
  96. $user = $_SESSION['look'];
  97. }
  98. require_once(dirname(__FILE__) . '/i18n.php');
  99. function check_error($return_var)
  100. {
  101. if ($return_var > 0) {
  102. header('Location: /error/');
  103. exit;
  104. }
  105. }
  106. function check_return_code($return_var, $output)
  107. {
  108. if ($return_var != 0) {
  109. $error = implode('<br>', $output);
  110. if (empty($error)) {
  111. $error = sprintf(_('Error code:'), $return_var);
  112. }
  113. $_SESSION['error_msg'] = $error;
  114. }
  115. }
  116. function render_page($user, $TAB, $page)
  117. {
  118. $__template_dir = dirname(__DIR__) . '/templates/';
  119. $__pages_js_dir = dirname(__DIR__) . '/js/pages/';
  120. // Header
  121. include($__template_dir . 'header.html');
  122. // Panel
  123. top_panel(empty($_SESSION['look']) ? $_SESSION['user'] : $_SESSION['look'], $TAB);
  124. // Extract global variables
  125. // I think those variables should be passed via arguments
  126. extract($GLOBALS, EXTR_SKIP);
  127. // Policies controller
  128. @include_once(dirname(__DIR__) . '/inc/policies.php');
  129. // Body
  130. include($__template_dir . 'pages/' . $page . '.html');
  131. // Including common js files
  132. @include_once(dirname(__DIR__) . '/templates/includes/end_js.html');
  133. // Including page specific js file
  134. if (file_exists($__pages_js_dir . $page . '.js')) {
  135. echo '<script src="/js/pages/' . $page . '.js?' . JS_LATEST_UPDATE . '"></script>';
  136. }
  137. // Footer
  138. include($__template_dir . 'footer.html');
  139. }
  140. // Match $_SESSION['token'] against $_GET['token'] or $_POST['token']
  141. // Usage: verify_csrf($_POST) or verify_csrf($_GET); Use verify_csrf($_POST,true) to return on failure instead of redirect
  142. function verify_csrf($method, $return = false)
  143. {
  144. if ($method['token'] !== $_SESSION['token'] || empty($method['token']) || empty($_SESSION['token'])) {
  145. if ($return === true) {
  146. return false;
  147. } else {
  148. header('Location: /login/');
  149. die();
  150. }
  151. } else {
  152. return true;
  153. }
  154. }
  155. function top_panel($user, $TAB)
  156. {
  157. global $panel;
  158. $command = HESTIA_CMD . 'v-list-user ' . escapeshellarg($user) . " 'json'";
  159. exec($command, $output, $return_var);
  160. if ($return_var > 0) {
  161. echo '<span style="font-size: 18px;"><b>ERROR: Unable to retrieve account details.</b><br>Please <b><a href="/login/">log in</a></b> again.</span>';
  162. destroy_sessions();
  163. header('Location: /login/');
  164. exit;
  165. }
  166. $panel = json_decode(implode('', $output), true);
  167. unset($output);
  168. // Log out active sessions for suspended users
  169. if (($panel[$user]['SUSPENDED'] === 'yes') && ($_SESSION['POLICY_USER_VIEW_SUSPENDED'] !== 'yes')) {
  170. $_SESSION['error_msg'] = 'You have been logged out. Please log in again.';
  171. destroy_sessions();
  172. header('Location: /login/');
  173. }
  174. // Reset user permissions if changed while logged in
  175. if (($panel[$user]['ROLE']) !== ($_SESSION['userContext']) && (!isset($_SESSION['look']))) {
  176. unset($_SESSION['userContext']);
  177. $_SESSION['userContext'] = $panel[$user]['ROLE'];
  178. }
  179. // Load user's selected theme and do not change it when impersonting user
  180. if ((isset($panel[$user]['THEME'])) && (!isset($_SESSION['look']))) {
  181. $_SESSION['userTheme'] = $panel[$user]['THEME'];
  182. }
  183. // Unset userTheme override variable if POLICY_USER_CHANGE_THEME is set to no
  184. if ($_SESSION['POLICY_USER_CHANGE_THEME'] === 'no') {
  185. unset($_SESSION['userTheme']);
  186. }
  187. // Set preferred sort order
  188. if (!isset($_SESSION['look'])) {
  189. $_SESSION['userSortOrder'] = $panel[$user]['PREF_UI_SORT'];
  190. }
  191. // Set home location URLs
  192. if (($_SESSION['userContext'] === 'admin') && (!isset($_SESSION['look']))) {
  193. // Display users list for administrators unless they are impersonating a user account
  194. $home_url = '/list/user/';
  195. } else {
  196. // Set home location URL based on available package features from account
  197. if ($panel[$user]['WEB_DOMAINS'] != '0') {
  198. $home_url = '/list/web/';
  199. } elseif ($panel[$user]['DNS_DOMAINS'] != '0') {
  200. $home_url = '/list/dns/';
  201. } elseif ($panel[$user]['MAIL_DOMAINS'] != '0') {
  202. $home_url = '/list/mail/';
  203. } elseif ($panel[$user]['DATABASES'] != '0') {
  204. $home_url = '/list/db/';
  205. } elseif ($panel[$user]['CRON_JOBS'] != '0') {
  206. $home_url = '/list/cron/';
  207. } elseif ($panel[$user]['BACKUPS'] != '0') {
  208. $home_url = '/list/backups/';
  209. }
  210. }
  211. include(dirname(__FILE__) . '/../templates/includes/panel.html');
  212. }
  213. function translate_date($date)
  214. {
  215. $date = strtotime($date);
  216. return strftime('%d &nbsp;', $date) . _(strftime('%b', $date)) . strftime(' &nbsp;%Y', $date);
  217. }
  218. function humanize_time($usage)
  219. {
  220. if ($usage > 60) {
  221. $usage = $usage / 60;
  222. if ($usage > 24) {
  223. $usage = $usage / 24;
  224. $usage = number_format($usage);
  225. return sprintf(ngettext('%d day', '%d days', $usage), $usage);
  226. } else {
  227. return sprintf(ngettext('%d hour', '%d hours', $usage), $usage);
  228. }
  229. } else {
  230. return sprintf(ngettext('%d minute', '%d minutes', $usage), $usage);
  231. }
  232. }
  233. function humanize_usage_size($usage)
  234. {
  235. if ($usage > 1024) {
  236. $usage = $usage / 1024;
  237. if ($usage > 1024) {
  238. $usage = $usage / 1024 ;
  239. if ($usage > 1024) {
  240. $usage = $usage / 1024 ;
  241. $usage = number_format($usage, 2);
  242. } else {
  243. $usage = number_format($usage, 2);
  244. }
  245. } else {
  246. $usage = number_format($usage, 2);
  247. }
  248. }
  249. return $usage;
  250. }
  251. function humanize_usage_measure($usage)
  252. {
  253. $measure = 'kb';
  254. if ($usage > 1024) {
  255. $usage = $usage / 1024;
  256. if ($usage > 1024) {
  257. $usage = $usage / 1024 ;
  258. $measure = ($usage > 1024) ? 'pb' : 'tb';
  259. } else {
  260. $measure = 'gb';
  261. }
  262. } else {
  263. $measure = 'mb';
  264. }
  265. return $measure;
  266. }
  267. function get_percentage($used, $total)
  268. {
  269. if (!isset($total)) {
  270. $total = 0;
  271. }
  272. if (!isset($used)) {
  273. $used = 0;
  274. }
  275. if ($total == 0) {
  276. $percent = 0;
  277. } else {
  278. $percent = $used / $total;
  279. $percent = $percent * 100;
  280. $percent = number_format($percent, 0, '', '');
  281. if ($percent < 0) {
  282. $percent = 0;
  283. } elseif ($percent > 100) {
  284. $percent = 100;
  285. }
  286. }
  287. return $percent;
  288. }
  289. function send_email($to, $subject, $mailtext, $from, $from_name, $to_name = '')
  290. {
  291. $mail = new PHPMailer();
  292. if (isset($_SESSION['USE_SERVER_SMTP']) && $_SESSION['USE_SERVER_SMTP'] == "true") {
  293. $from = $_SESSION['SERVER_SMTP_ADDR'];
  294. $mail->IsSMTP();
  295. $mail->Mailer = "smtp";
  296. $mail->SMTPDebug = 0;
  297. $mail->SMTPAuth = true;
  298. $mail->SMTPSecure = $_SESSION['SERVER_SMTP_SECURITY'];
  299. $mail->Port = $_SESSION['SERVER_SMTP_PORT'];
  300. $mail->Host = $_SESSION['SERVER_SMTP_HOST'];
  301. $mail->Username = $_SESSION['SERVER_SMTP_USER'];
  302. $mail->Password = $_SESSION['SERVER_SMTP_PASSWD'];
  303. }
  304. $mail->IsHTML(true);
  305. $mail->ClearReplyTos();
  306. if (empty($to_name)) {
  307. $mail->AddAddress($to);
  308. } else {
  309. $mail->AddAddress($to, $to_name);
  310. }
  311. $mail->SetFrom($from, $from_name);
  312. $mail->CharSet = "utf-8";
  313. $mail->Subject = $subject;
  314. $content = $mailtext;
  315. $content = nl2br($content);
  316. $mail->MsgHTML($content);
  317. $mail->Send();
  318. }
  319. function list_timezones()
  320. {
  321. foreach (['AKST', 'AKDT', 'PST', 'PDT', 'MST', 'MDT', 'CST', 'CDT', 'EST', 'EDT', 'AST', 'ADT'] as $timezone) {
  322. $tz = new DateTimeZone($timezone);
  323. $timezone_offsets[$timezone] = $tz->getOffset(new DateTime());
  324. }
  325. foreach (DateTimeZone::listIdentifiers() as $timezone) {
  326. $tz = new DateTimeZone($timezone);
  327. $timezone_offsets[$timezone] = $tz->getOffset(new DateTime());
  328. }
  329. foreach ($timezone_offsets as $timezone => $offset) {
  330. $offset_prefix = $offset < 0 ? '-' : '+';
  331. $offset_formatted = gmdate('H:i', abs($offset));
  332. $pretty_offset = "UTC${offset_prefix}${offset_formatted}";
  333. $t = new DateTimeZone($timezone);
  334. $c = new DateTime(null, $t);
  335. $current_time = $c->format('H:i:s');
  336. $timezone_list[$timezone] = "$timezone [ $current_time ] ${pretty_offset}";
  337. }
  338. return $timezone_list;
  339. }
  340. /**
  341. * A function that tells is it MySQL installed on the system, or it is MariaDB.
  342. *
  343. * Explaination:
  344. * $_SESSION['DB_SYSTEM'] has 'mysql' value even if MariaDB is installed, so you can't figure out is it really MySQL or it's MariaDB.
  345. * So, this function will make it clear.
  346. *
  347. * If MySQL is installed, function will return 'mysql' as a string.
  348. * If MariaDB is installed, function will return 'mariadb' as a string.
  349. *
  350. * Hint: if you want to check if PostgreSQL is installed - check value of $_SESSION['DB_SYSTEM']
  351. *
  352. * @return string
  353. */
  354. function is_it_mysql_or_mariadb()
  355. {
  356. exec(HESTIA_CMD . 'v-list-sys-services json', $output, $return_var);
  357. $data = json_decode(implode('', $output), true);
  358. unset($output);
  359. $mysqltype = 'mysql';
  360. if (isset($data['mariadb'])) {
  361. $mysqltype = 'mariadb';
  362. }
  363. return $mysqltype;
  364. }
  365. function load_hestia_config()
  366. {
  367. // Check system configuration
  368. exec(HESTIA_CMD . "v-list-sys-config json", $output, $return_var);
  369. $data = json_decode(implode('', $output), true);
  370. $sys_arr = $data['config'];
  371. foreach ($sys_arr as $key => $value) {
  372. $_SESSION[$key] = $value;
  373. }
  374. }
  375. /**
  376. * Returns the list of all web domains from all users grouped by Backend Template used and owner
  377. *
  378. * @return array
  379. */
  380. function backendtpl_with_webdomains()
  381. {
  382. exec(HESTIA_CMD . 'v-list-users json', $output, $return_var);
  383. $users = json_decode(implode('', $output), true);
  384. unset($output);
  385. $backend_list=[];
  386. foreach ($users as $user => $user_details) {
  387. exec(HESTIA_CMD . 'v-list-web-domains '. escapeshellarg($user) . ' json', $output, $return_var);
  388. $domains = json_decode(implode('', $output), true);
  389. unset($output);
  390. foreach ($domains as $domain => $domain_details) {
  391. if (!empty($domain_details['BACKEND'])) {
  392. $backend = $domain_details['BACKEND'];
  393. $backend_list[$backend][$user][] = $domain;
  394. }
  395. }
  396. }
  397. return $backend_list;
  398. }
  399. /**
  400. * Check if password is valid
  401. *
  402. * @return int; 1 / 0
  403. */
  404. function validate_password($password)
  405. {
  406. return preg_match('/^(?=.*[a-z])(?=.*[A-Z])(?=.*\d)(.){8,}$/', $password);
  407. }