index.php 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421
  1. <?php
  2. ob_start();
  3. $TAB = 'USER';
  4. // Main include
  5. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  6. // Check user argument
  7. if (empty($_GET['user'])) {
  8. header("Location: /list/user/");
  9. exit;
  10. }
  11. // Edit as someone else?
  12. if (($_SESSION['userContext'] === 'admin') && (!empty($_GET['user']))) {
  13. $user=$_GET['user'];
  14. $v_username=$_GET['user'];
  15. } else {
  16. $user=$_SESSION['user'];
  17. $v_username=$_SESSION['user'];
  18. }
  19. // Prevent other users with admin privileges from editing properties of default 'admin' user
  20. if (($_SESSION['userContext'] === 'admin') && (isset($_SESSION['look'])) && ($user == 'admin') || ($_SESSION['userContext'] === 'admin') && (!isset($_SESSION['look'])) && ($user == 'admin') && ($_SESSION['user'] != 'admin')) {
  21. header("Location: /list/user/");
  22. exit;
  23. }
  24. // Check token
  25. verify_csrf($_GET);
  26. // List user
  27. exec(HESTIA_CMD."v-list-user ".escapeshellarg($v_username)." json", $output, $return_var);
  28. check_return_code_redirect($return_var, $output, '/list/user/');
  29. $data = json_decode(implode('', $output), true);
  30. unset($output);
  31. // Parse user
  32. $v_password = "";
  33. $v_email = $data[$v_username]['CONTACT'];
  34. $v_package = $data[$v_username]['PACKAGE'];
  35. $v_language = $data[$v_username]['LANGUAGE'];
  36. $v_user_theme = $data[$v_username]['THEME'];
  37. $v_sort_order = $data[$v_username]['PREF_UI_SORT'];
  38. $v_name = $data[$v_username]['NAME'];
  39. $v_shell = $data[$v_username]['SHELL'];
  40. $v_twofa = $data[$v_username]['TWOFA'];
  41. $v_qrcode = $data[$v_username]['QRCODE'];
  42. $v_phpcli = $data[$v_username]['PHPCLI'];
  43. $v_role = $data[$v_username]['ROLE'];
  44. $v_login_disabled = $data[$v_username]['LOGIN_DISABLED'];
  45. $v_login_use_iplist = $data[$v_username]['LOGIN_USE_IPLIST'];
  46. $v_login_allowed_ips = $data[$v_username]['LOGIN_ALLOW_IPS'];
  47. $v_ns = $data[$v_username]['NS'];
  48. $nameservers = explode(",", $v_ns);
  49. if (empty($nameservers[0])) {
  50. $v_ns1 = '';
  51. } else {
  52. $v_ns1 = $nameservers[0];
  53. }
  54. if (empty($nameservers[1])) {
  55. $v_ns2 = '';
  56. } else {
  57. $v_ns2 = $nameservers[1];
  58. }
  59. if (empty($nameservers[2])) {
  60. $v_ns3 = '';
  61. } else {
  62. $v_ns3 = $nameservers[2];
  63. }
  64. if (empty($nameservers[3])) {
  65. $v_ns4 = '';
  66. } else {
  67. $v_ns4 = $nameservers[3];
  68. }
  69. if (empty($nameservers[4])) {
  70. $v_ns5 = '';
  71. } else {
  72. $v_ns5 = $nameservers[4];
  73. }
  74. if (empty($nameservers[5])) {
  75. $v_ns6 = '';
  76. } else {
  77. $v_ns6 = $nameservers[5];
  78. }
  79. if (empty($nameservers[6])) {
  80. $v_ns7 = '';
  81. } else {
  82. $v_ns7 = $nameservers[6];
  83. }
  84. if (empty($nameservers[7])) {
  85. $v_ns8 = '';
  86. } else {
  87. $v_ns8 = $nameservers[7];
  88. }
  89. $v_suspended = $data[$v_username]['SUSPENDED'];
  90. if ($v_suspended == 'yes') {
  91. $v_status = 'suspended';
  92. } else {
  93. $v_status = 'active';
  94. }
  95. $v_time = $data[$v_username]['TIME'];
  96. $v_date = $data[$v_username]['DATE'];
  97. if (empty($v_phpcli)) {
  98. $v_phpcli = substr(DEFAULT_PHP_VERSION, 4);
  99. }
  100. // List packages
  101. exec(HESTIA_CMD."v-list-user-packages json", $output, $return_var);
  102. $packages = json_decode(implode('', $output), true);
  103. unset($output);
  104. // List languages
  105. exec(HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  106. $language = json_decode(implode('', $output), true);
  107. foreach ($language as $lang) {
  108. $languages[$lang] = translate_json($lang);
  109. }
  110. asort($languages);
  111. unset($output);
  112. // List themes
  113. exec(HESTIA_CMD."v-list-sys-themes json", $output, $return_var);
  114. $themes = json_decode(implode('', $output), true);
  115. unset($output);
  116. // List shells
  117. exec(HESTIA_CMD."v-list-sys-shells json", $output, $return_var);
  118. $shells = json_decode(implode('', $output), true);
  119. unset($output);
  120. //List PHP Versions
  121. // List supported php versions
  122. exec(HESTIA_CMD."v-list-sys-php json", $output, $return_var);
  123. $php_versions = json_decode(implode('', $output), true);
  124. unset($output);
  125. // Check POST request
  126. if (!empty($_POST['save'])) {
  127. // Check token
  128. verify_csrf($_POST);
  129. // Change password
  130. if ((!empty($_POST['v_password'])) && (empty($_SESSION['error_msg']))) {
  131. // Check password length
  132. $pw_len = strlen($_POST['v_password']);
  133. if (!validate_password($_POST['v_password'])) {
  134. $_SESSION['error_msg'] = _('Password does not match the minimum requirements');
  135. }
  136. if (empty($_SESSION['error_msg'])) {
  137. $v_password = tempnam("/tmp", "vst");
  138. $fp = fopen($v_password, "w");
  139. fwrite($fp, $_POST['v_password']."\n");
  140. fclose($fp);
  141. exec(HESTIA_CMD."v-change-user-password ".escapeshellarg($v_username)." ".$v_password, $output, $return_var);
  142. check_return_code($return_var, $output);
  143. unset($output);
  144. unlink($v_password);
  145. $v_password = escapeshellarg($_POST['v_password']);
  146. }
  147. }
  148. // Enable twofa
  149. if ((!empty($_POST['v_twofa'])) && (empty($v_twofa)) && (empty($_SESSION['error_msg']))) {
  150. exec(HESTIA_CMD."v-add-user-2fa ".escapeshellarg($v_username), $output, $return_var);
  151. check_return_code($return_var, $output);
  152. unset($output);
  153. // List user
  154. exec(HESTIA_CMD."v-list-user ".escapeshellarg($v_username)." json", $output, $return_var);
  155. check_return_code($return_var, $output);
  156. $data = json_decode(implode('', $output), true);
  157. unset($output);
  158. // Parse user twofa
  159. $v_twofa = $data[$v_username]['TWOFA'];
  160. $v_qrcode = $data[$v_username]['QRCODE'];
  161. }
  162. // Disable twofa
  163. if ((empty($_POST['v_twofa'])) && (!empty($v_twofa)) && (empty($_SESSION['error_msg']))) {
  164. exec(HESTIA_CMD."v-delete-user-2fa ".escapeshellarg($v_username), $output, $return_var);
  165. check_return_code($return_var, $output);
  166. unset($output);
  167. $v_twofa = '';
  168. $v_qrcode = '';
  169. }
  170. // Change default sort order
  171. if (($v_sort_order != $_POST['v_sort_order']) && (empty($_SESSION['error_msg']))) {
  172. $v_sort_order = escapeshellarg($_POST['v_sort_order']);
  173. exec(HESTIA_CMD."v-change-user-sort-order ".escapeshellarg($v_username)." ".$v_sort_order, $output, $return_var);
  174. check_return_code($return_var, $output);
  175. unset($_SESSION['userSortOrder']);
  176. $_SESSION['userSortOrder'] = $v_sort_order;
  177. unset($output);
  178. }
  179. // Update Control Panel login disabled status (admin only)
  180. if (empty($_SESSION['error_msg'])) {
  181. if (empty($_POST['v_login_disabled'])) {
  182. $_POST['v_login_disabled'] = '';
  183. }
  184. if ($_POST['v_login_disabled'] != $v_login_disabled) {
  185. if ($_POST['v_login_disabled'] == 'on') {
  186. $_POST['v_login_disabled'] = 'yes';
  187. } else {
  188. $_POST['v_login_disabled'] = 'no';
  189. }
  190. exec(HESTIA_CMD."v-change-user-config-value ".escapeshellarg($v_username)." LOGIN_DISABLED ".escapeshellarg($_POST['v_login_disabled']), $output, $return_var);
  191. check_return_code($return_var, $output);
  192. $data[$user]['LOGIN_DISABLED'] = $_POST['v_login_disabled'];
  193. unset($output);
  194. }
  195. }
  196. // Update IP whitelist option
  197. if (empty($_SESSION['error_msg'])) {
  198. if (empty($_POST['v_login_use_iplist'])) {
  199. $_POST['v_login_use_iplist'] = '';
  200. }
  201. if ($_POST['v_login_use_iplist'] != $v_login_use_iplist) {
  202. if ($_POST['v_login_use_iplist'] == 'on') {
  203. $_POST['v_login_use_iplist'] = 'yes';
  204. } else {
  205. $_POST['v_login_use_iplist'] = 'no';
  206. }
  207. exec(HESTIA_CMD."v-change-user-config-value ".escapeshellarg($v_username)." LOGIN_USE_IPLIST ".escapeshellarg($_POST['v_login_use_iplist']), $output, $return_var);
  208. if ($_POST['v_login_use_iplist'] === 'no') {
  209. exec(HESTIA_CMD."v-change-user-config-value ".escapeshellarg($v_username)." LOGIN_ALLOW_IPS ''", $output, $return_var);
  210. $v_login_allowed_ips = '';
  211. } else {
  212. exec(HESTIA_CMD."v-change-user-config-value ".escapeshellarg($v_username)." LOGIN_ALLOW_IPS ".escapeshellarg($_POST['v_login_allowed_ips']), $output, $return_var);
  213. unset($v_login_allowed_ips);
  214. $v_login_allowed_ips = $_POST['v_login_allowed_ips'];
  215. }
  216. check_return_code($return_var, $output);
  217. $data[$user]['LOGIN_USE_IPLIST'] = $_POST['v_login_use_iplist'];
  218. unset($output);
  219. }
  220. }
  221. if ($_SESSION['userContext'] === 'admin') {
  222. // Change package (admin only)
  223. if (($v_package != $_POST['v_package']) && ($_SESSION['userContext'] === 'admin') && (empty($_SESSION['error_msg']))) {
  224. $v_package = escapeshellarg($_POST['v_package']);
  225. exec(HESTIA_CMD."v-change-user-package ".escapeshellarg($v_username)." ".$v_package, $output, $return_var);
  226. check_return_code($return_var, $output);
  227. unset($output);
  228. }
  229. // Change phpcli (admin only)
  230. if (($v_phpcli != $_POST['v_phpcli']) && ($_SESSION['userContext'] === 'admin') && (empty($_SESSION['error_msg']))) {
  231. $v_phpcli = escapeshellarg($_POST['v_phpcli']);
  232. exec(HESTIA_CMD."v-change-user-php-cli ".escapeshellarg($v_username)." ".$v_phpcli, $output, $return_var);
  233. check_return_code($return_var, $output);
  234. unset($output);
  235. }
  236. if (($v_role != $_POST['v_role']) && ($_SESSION['userContext'] === 'admin') && $v_username != "admin" && (empty($_SESSION['error_msg']))) {
  237. if (!empty($_POST['v_role'])) {
  238. $v_role = escapeshellarg($_POST['v_role']);
  239. exec(HESTIA_CMD."v-change-user-role ".escapeshellarg($v_username)." ".$v_role, $output, $return_var);
  240. check_return_code($return_var, $output);
  241. unset($output);
  242. $v_role = $_POST['v_role'];
  243. }
  244. }
  245. // Change shell (admin only)
  246. if (($v_shell != $_POST['v_shell']) && ($_SESSION['userContext'] === 'admin') && (empty($_SESSION['error_msg']))) {
  247. $v_shell = escapeshellarg($_POST['v_shell']);
  248. exec(HESTIA_CMD."v-change-user-shell ".escapeshellarg($v_username)." ".$v_shell, $output, $return_var);
  249. check_return_code($return_var, $output);
  250. unset($output);
  251. }
  252. }
  253. // Change language
  254. if (($v_language != $_POST['v_language']) && (empty($_SESSION['error_msg']))) {
  255. $v_language = escapeshellarg($_POST['v_language']);
  256. exec(HESTIA_CMD."v-change-user-language ".escapeshellarg($v_username)." ".$v_language, $output, $return_var);
  257. check_return_code($return_var, $output);
  258. if (empty($_SESSION['error_msg'])) {
  259. if (($_GET['user'] == $_SESSION['user'])) {
  260. unset($_SESSION['language']);
  261. $_SESSION['language'] = $_POST['v_language'];
  262. $refresh = $_SERVER['REQUEST_URI'];
  263. header("Location: $refresh");
  264. }
  265. }
  266. unset($output);
  267. }
  268. // Change contact email
  269. if (($v_email != $_POST['v_email']) && (empty($_SESSION['error_msg']))) {
  270. if (!filter_var($_POST['v_email'], FILTER_VALIDATE_EMAIL)) {
  271. $_SESSION['error_msg'] = _('Please enter valid email address.');
  272. } else {
  273. $v_email = escapeshellarg($_POST['v_email']);
  274. exec(HESTIA_CMD."v-change-user-contact ".escapeshellarg($v_username)." ".$v_email, $output, $return_var);
  275. check_return_code($return_var, $output);
  276. unset($output);
  277. }
  278. }
  279. // Change full name
  280. if ($v_name != $_POST['v_name']) {
  281. if (empty($_POST['v_name'])) {
  282. $_SESSION['error_msg'] = _('Please enter a valid name');
  283. } else {
  284. $v_name = escapeshellarg($_POST['v_name']);
  285. exec(HESTIA_CMD."v-change-user-name ".escapeshellarg($v_username). " ".$v_name, $output, $return_var);
  286. check_return_code($return_var, $output);
  287. unset($output);
  288. $v_name = $_POST['v_name'];
  289. }
  290. }
  291. // Update theme
  292. if (empty($_SESSION['error_msg'])) {
  293. if ($_POST['v_user_theme'] != $_SESSION['userTheme']) {
  294. exec(HESTIA_CMD."v-change-user-theme ".escapeshellarg($v_username)." ".escapeshellarg($_POST['v_user_theme']), $output, $return_var);
  295. check_return_code($return_var, $output);
  296. unset($output);
  297. $v_user_theme = $_POST['v_user_theme'];
  298. if ($_SESSION['user'] === $v_username) {
  299. unset($_SESSION['userTheme']);
  300. $_SESSION['userTheme'] = $v_user_theme;
  301. }
  302. }
  303. }
  304. // Change NameServers
  305. if (empty($_POST['v_ns1'])) {
  306. $_POST['v_ns1'] = '';
  307. }
  308. if (empty($_POST['v_ns2'])) {
  309. $_POST['v_ns2'] = '';
  310. }
  311. if (empty($_POST['v_ns3'])) {
  312. $_POST['v_ns3'] = '';
  313. }
  314. if (empty($_POST['v_ns4'])) {
  315. $_POST['v_ns4'] = '';
  316. }
  317. if (empty($_POST['v_ns5'])) {
  318. $_POST['v_ns5'] = '';
  319. }
  320. if (empty($_POST['v_ns6'])) {
  321. $_POST['v_ns6'] = '';
  322. }
  323. if (empty($_POST['v_ns7'])) {
  324. $_POST['v_ns7'] = '';
  325. }
  326. if (empty($_POST['v_ns8'])) {
  327. $_POST['v_ns8'] = '';
  328. }
  329. if (($v_ns1 != $_POST['v_ns1']) || ($v_ns2 != $_POST['v_ns2']) || ($v_ns3 != $_POST['v_ns3']) || ($v_ns4 != $_POST['v_ns4']) || ($v_ns5 != $_POST['v_ns5'])
  330. || ($v_ns6 != $_POST['v_ns6']) || ($v_ns7 != $_POST['v_ns7']) || ($v_ns8 != $_POST['v_ns8']) && (empty($_SESSION['error_msg']))) {
  331. $v_ns1 = escapeshellarg($_POST['v_ns1']);
  332. $v_ns2 = escapeshellarg($_POST['v_ns2']);
  333. $v_ns3 = escapeshellarg($_POST['v_ns3']);
  334. $v_ns4 = escapeshellarg($_POST['v_ns4']);
  335. $v_ns5 = escapeshellarg($_POST['v_ns5']);
  336. $v_ns6 = escapeshellarg($_POST['v_ns6']);
  337. $v_ns7 = escapeshellarg($_POST['v_ns7']);
  338. $v_ns8 = escapeshellarg($_POST['v_ns8']);
  339. $ns_cmd = HESTIA_CMD."v-change-user-ns ".escapeshellarg($v_username)." ".$v_ns1." ".$v_ns2;
  340. if (!empty($_POST['v_ns3'])) {
  341. $ns_cmd = $ns_cmd." ".$v_ns3;
  342. }
  343. if (!empty($_POST['v_ns4'])) {
  344. $ns_cmd = $ns_cmd." ".$v_ns4;
  345. }
  346. if (!empty($_POST['v_ns5'])) {
  347. $ns_cmd = $ns_cmd." ".$v_ns5;
  348. }
  349. if (!empty($_POST['v_ns6'])) {
  350. $ns_cmd = $ns_cmd." ".$v_ns6;
  351. }
  352. if (!empty($_POST['v_ns7'])) {
  353. $ns_cmd = $ns_cmd." ".$v_ns7;
  354. }
  355. if (!empty($_POST['v_ns8'])) {
  356. $ns_cmd = $ns_cmd." ".$v_ns8;
  357. }
  358. exec($ns_cmd, $output, $return_var);
  359. check_return_code($return_var, $output);
  360. unset($output);
  361. $v_ns1 = str_replace("'", "", $v_ns1);
  362. $v_ns2 = str_replace("'", "", $v_ns2);
  363. $v_ns3 = str_replace("'", "", $v_ns3);
  364. $v_ns4 = str_replace("'", "", $v_ns4);
  365. $v_ns5 = str_replace("'", "", $v_ns5);
  366. $v_ns6 = str_replace("'", "", $v_ns6);
  367. $v_ns7 = str_replace("'", "", $v_ns7);
  368. $v_ns8 = str_replace("'", "", $v_ns8);
  369. }
  370. // Set success message
  371. if (empty($_SESSION['error_msg'])) {
  372. $_SESSION['ok_msg'] = _('Changes has been saved.');
  373. }
  374. }
  375. // Render page
  376. render_page($user, $TAB, 'edit_user');
  377. // Flush session messages
  378. unset($_SESSION['error_msg']);
  379. unset($_SESSION['ok_msg']);