index.php 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375
  1. <?php
  2. // Init
  3. error_reporting(NULL);
  4. ob_start();
  5. session_start();
  6. $TAB = 'WEB';
  7. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  8. // Check POST request
  9. if (!empty($_POST['ok'])) {
  10. // Check token
  11. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  12. header('location: /login/');
  13. exit();
  14. }
  15. // Check for empty fields
  16. if (empty($_POST['v_domain'])) $errors[] = __('domain');
  17. if (empty($_POST['v_ip'])) $errors[] = __('ip');
  18. if ((!empty($_POST['v_ssl'])) && (empty($_POST['v_ssl_crt']))) $errors[] = __('ssl certificate');
  19. if ((!empty($_POST['v_ssl'])) && (empty($_POST['v_ssl_key']))) $errors[] = __('ssl key');
  20. if (!empty($errors[0])) {
  21. foreach ($errors as $i => $error) {
  22. if ( $i == 0 ) {
  23. $error_msg = $error;
  24. } else {
  25. $error_msg = $error_msg.", ".$error;
  26. }
  27. }
  28. $_SESSION['error_msg'] = __('Field "%s" can not be blank.',$error_msg);
  29. }
  30. // Check stats password length
  31. if ((!empty($v_stats)) && (empty($_SESSION['error_msg']))) {
  32. if (!empty($_POST['v_stats_user'])) {
  33. $pw_len = strlen($_POST['v_stats_password']);
  34. if ($pw_len < 6 ) $_SESSION['error_msg'] = __('Password is too short.',$error_msg);
  35. }
  36. }
  37. // Default proxy extention list
  38. $v_proxy_ext = 'jpeg, jpg, png, gif, bmp, ico, svg, tif, tiff, css, js, htm, html, ttf, ';
  39. $v_proxy_ext .= 'otf, webp, woff, txt, csv, rtf, doc, docx, xls, xlsx, ppt, pptx, odf, ';
  40. $v_proxy_ext .= 'odp, ods, odt, pdf, psd, ai, eot, eps, ps, zip, tar, tgz, gz, rar, ';
  41. $v_proxy_ext .= 'bz2, 7z, aac, m4a, mp3, mp4, ogg, wav, wma, 3gp, avi, flv, m4v, mkv, ';
  42. $v_proxy_ext .= 'mov, mp4, mpeg, mpg, wmv, exe, iso, dmg, swf';
  43. // Set advanced option checkmark
  44. if (empty($_POST['v_proxy'])) $v_adv = 'yes';
  45. if (!empty($_POST['v_ftp'])) $v_adv = 'yes';
  46. if ($_POST['v_proxy_ext'] != $v_proxy_ext) $v_adv = 'yes';
  47. // Set domain name to lowercase and remove www prefix
  48. $v_domain = preg_replace("/^www\./i", "", $_POST['v_domain']);
  49. $v_domain = escapeshellarg($v_domain);
  50. $v_domain = strtolower($v_domain);
  51. // Prepare domain values
  52. $v_ip = escapeshellarg($_POST['v_ip']);
  53. if ((!empty($_POST['v_aliases'])) && ($_POST['v_aliases'] != 'www.'.$_POST['v_domain'])) $v_adv = 'yes';
  54. if ((!empty($_POST['v_ssl'])) || (!empty($_POST['v_elog']))) $v_adv = 'yes';
  55. if ((!empty($_POST['v_ssl_crt'])) || (!empty($_POST['v_ssl_key']))) $v_adv = 'yes';
  56. if ((!empty($_POST['v_ssl_ca'])) || ($_POST['v_stats'] != 'none')) $v_adv = 'yes';
  57. if (!empty($v_domain)) $v_ftp_user_prepath .= $v_domain;
  58. if (empty($_POST['v_dns'])) $v_dns = 'off';
  59. if (empty($_POST['v_mail'])) $v_mail = 'off';
  60. if (empty($_POST['v_proxy'])) $v_proxy = 'off';
  61. $v_aliases = $_POST['v_aliases'];
  62. $v_elog = $_POST['v_elog'];
  63. $v_ssl = $_POST['v_ssl'];
  64. $v_ssl_crt = $_POST['v_ssl_crt'];
  65. $v_ssl_key = $_POST['v_ssl_key'];
  66. $v_ssl_ca = $_POST['v_ssl_ca'];
  67. $v_ssl_home = $data[$v_domain]['SSL_HOME'];
  68. $v_stats = escapeshellarg($_POST['v_stats']);
  69. $v_stats_user = $data[$v_domain]['STATS_USER'];
  70. $v_stats_password = $data[$v_domain]['STATS_PASSWORD'];
  71. $v_proxy_ext = preg_replace("/\n/", " ", $_POST['v_proxy_ext']);
  72. $v_proxy_ext = preg_replace("/,/", " ", $v_proxy_ext);
  73. $v_proxy_ext = preg_replace('/\s+/', ' ',$v_proxy_ext);
  74. $v_proxy_ext = trim($v_proxy_ext);
  75. $v_proxy_ext = str_replace(' ', ", ", $v_proxy_ext);
  76. $v_ftp = $_POST['v_ftp'];
  77. $v_ftp_user = $_POST['v_ftp_user'];
  78. $v_ftp_password = $_POST['v_ftp_password'];
  79. $v_ftp_email = $_POST['v_ftp_email'];
  80. // Add web domain
  81. if (empty($_SESSION['error_msg'])) {
  82. exec (VESTA_CMD."v-add-web-domain ".$user." ".$v_domain." ".$v_ip." 'no'", $output, $return_var);
  83. check_return_code($return_var,$output);
  84. unset($output);
  85. $domain_added = empty($_SESSION['error_msg']);
  86. }
  87. // Add DNS domain
  88. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  89. exec (VESTA_CMD."v-add-dns-domain ".$user." ".$v_domain." ".$v_ip, $output, $return_var);
  90. check_return_code($return_var,$output);
  91. unset($output);
  92. }
  93. // Add mail domain
  94. if (($_POST['v_mail'] == 'on') && (empty($_SESSION['error_msg']))) {
  95. exec (VESTA_CMD."v-add-mail-domain ".$user." ".$v_domain, $output, $return_var);
  96. check_return_code($return_var,$output);
  97. unset($output);
  98. }
  99. // Add domain aliases
  100. if ((!empty($_POST['v_aliases'])) && (empty($_SESSION['error_msg']))) {
  101. $valiases = preg_replace("/\n/", " ", $_POST['v_aliases']);
  102. $valiases = preg_replace("/,/", " ", $valiases);
  103. $valiases = preg_replace('/\s+/', ' ',$valiases);
  104. $valiases = trim($valiases);
  105. $aliases = explode(" ", $valiases);
  106. foreach ($aliases as $alias) {
  107. if ($alias == 'www.'.$_POST['v_domain']) {
  108. $www_alias = 'yes';
  109. } else {
  110. $alias = escapeshellarg($alias);
  111. if (empty($_SESSION['error_msg'])) {
  112. exec (VESTA_CMD."v-add-web-domain-alias ".$user." ".$v_domain." ".$alias." 'no'", $output, $return_var);
  113. check_return_code($return_var,$output);
  114. unset($output);
  115. }
  116. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  117. exec (VESTA_CMD."v-add-dns-on-web-alias ".$user." ".$v_domain." ".$alias." 'no'", $output, $return_var);
  118. check_return_code($return_var,$output);
  119. unset($output);
  120. }
  121. }
  122. }
  123. }
  124. // Delete www. alias if it wasn't found
  125. if ((empty($www_alias)) && (empty($_SESSION['error_msg']))) {
  126. $alias = preg_replace("/^www./i", "", $_POST['v_domain']);
  127. $alias = 'www.'.$alias;
  128. $alias = escapeshellarg($alias);
  129. exec (VESTA_CMD."v-delete-web-domain-alias ".$user." ".$v_domain." ".$alias." 'no'", $output, $return_var);
  130. check_return_code($return_var,$output);
  131. unset($output);
  132. }
  133. // Add proxy support
  134. if ((!empty($_SESSION['PROXY_SYSTEM'])) && ($_POST['v_proxy'] == 'on') && (empty($_SESSION['error_msg']))) {
  135. $ext = str_replace(' ', '', $v_proxy_ext);
  136. $ext = escapeshellarg($ext);
  137. exec (VESTA_CMD."v-add-web-domain-proxy ".$user." ".$v_domain." '' ".$ext." 'no'", $output, $return_var);
  138. check_return_code($return_var,$output);
  139. unset($output);
  140. }
  141. // Add SSL certificates
  142. if ((!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  143. exec ('mktemp -d', $output, $return_var);
  144. $tmpdir = $output[0];
  145. unset($output);
  146. // Save certificate
  147. if (!empty($_POST['v_ssl_crt'])) {
  148. $fp = fopen($tmpdir."/".$_POST['v_domain'].".crt", 'w');
  149. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_crt']));
  150. fwrite($fp, "\n");
  151. fclose($fp);
  152. }
  153. // Save private key
  154. if (!empty($_POST['v_ssl_key'])) {
  155. $fp = fopen($tmpdir."/".$_POST['v_domain'].".key", 'w');
  156. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_key']));
  157. fwrite($fp, "\n");
  158. fclose($fp);
  159. }
  160. // Save CA bundle
  161. if (!empty($_POST['v_ssl_ca'])) {
  162. $fp = fopen($tmpdir."/".$_POST['v_domain'].".ca", 'w');
  163. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_ca']));
  164. fwrite($fp, "\n");
  165. fclose($fp);
  166. }
  167. $v_ssl_home = escapeshellarg($_POST['v_ssl_home']);
  168. exec (VESTA_CMD."v-add-web-domain-ssl ".$user." ".$v_domain." ".$tmpdir." ".$v_ssl_home." 'no'", $output, $return_var);
  169. check_return_code($return_var,$output);
  170. unset($output);
  171. }
  172. // Add web stats
  173. if ((!empty($_POST['v_stats'])) && ($_POST['v_stats'] != 'none' ) && (empty($_SESSION['error_msg']))) {
  174. $v_stats = escapeshellarg($_POST['v_stats']);
  175. exec (VESTA_CMD."v-add-web-domain-stats ".$user." ".$v_domain." ".$v_stats, $output, $return_var);
  176. check_return_code($return_var,$output);
  177. unset($output);
  178. }
  179. // Add web stats password
  180. if ((!empty($_POST['v_stats_user'])) && (empty($_SESSION['error_msg']))) {
  181. $v_stats_user = escapeshellarg($_POST['v_stats_user']);
  182. $v_stats_password = tempnam("/tmp","vst");
  183. $fp = fopen($v_stats_password, "w");
  184. fwrite($fp, $_POST['v_stats_password']."\n");
  185. fclose($fp);
  186. exec (VESTA_CMD."v-add-web-domain-stats-user ".$user." ".$v_domain." ".$v_stats_user." ".$v_stats_password, $output, $return_var);
  187. check_return_code($return_var,$output);
  188. unset($output);
  189. unlink($v_stats_password);
  190. $v_stats_password = escapeshellarg($_POST['v_stats_password']);
  191. }
  192. // Restart DNS server
  193. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  194. exec (VESTA_CMD."v-restart-dns", $output, $return_var);
  195. check_return_code($return_var,$output);
  196. unset($output);
  197. }
  198. // Restart web server
  199. if (empty($_SESSION['error_msg'])) {
  200. exec (VESTA_CMD."v-restart-web", $output, $return_var);
  201. check_return_code($return_var,$output);
  202. unset($output);
  203. }
  204. // Restart backend server
  205. if ((!empty($_SESSION['WEB_BACKEND'])) && (empty($_SESSION['error_msg']))) {
  206. exec (VESTA_CMD."v-restart-web-backend", $output, $return_var);
  207. check_return_code($return_var,$output);
  208. unset($output);
  209. }
  210. // Restart proxy server
  211. if ((!empty($_SESSION['PROXY_SYSTEM'])) && ($_POST['v_proxy'] == 'on') && (empty($_SESSION['error_msg']))) {
  212. exec (VESTA_CMD."v-restart-proxy", $output, $return_var);
  213. check_return_code($return_var,$output);
  214. unset($output);
  215. }
  216. // Add FTP
  217. if ((!empty($_POST['v_ftp'])) && (empty($_SESSION['error_msg']))) {
  218. $v_ftp_users_updated = array();
  219. foreach ($_POST['v_ftp_user'] as $i => $v_ftp_user_data) {
  220. if ($v_ftp_user_data['is_new'] == 1) {
  221. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (!filter_var($v_ftp_user_data['v_ftp_email'], FILTER_VALIDATE_EMAIL))) $_SESSION['error_msg'] = __('Please enter valid email address.');
  222. if (empty($v_ftp_user_data['v_ftp_user'])) $errors[] = 'ftp user';
  223. if (empty($v_ftp_user_data['v_ftp_password'])) $errors[] = 'ftp user password';
  224. if (!empty($errors[0])) {
  225. foreach ($errors as $i => $error) {
  226. if ( $i == 0 ) {
  227. $error_msg = $error;
  228. } else {
  229. $error_msg = $error_msg.", ".$error;
  230. }
  231. }
  232. $_SESSION['error_msg'] = __('Field "%s" can not be blank.',$error_msg);
  233. }
  234. // Validate email
  235. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (!filter_var($v_ftp_user_data['v_ftp_email'], FILTER_VALIDATE_EMAIL))) {
  236. $_SESSION['error_msg'] = __('Please enter valid email address.');
  237. }
  238. // Check ftp password length
  239. if ((!empty($v_ftp_user_data['v_ftp']))) {
  240. if (!empty($v_ftp_user_data['v_ftp_user'])) {
  241. $pw_len = strlen($v_ftp_user_data['v_ftp_password']);
  242. if ($pw_len < 6 ) $_SESSION['error_msg'] = __('Password is too short.',$error_msg);
  243. }
  244. }
  245. $v_ftp_user_data['v_ftp_user'] = preg_replace("/^".$user."_/i", "", $v_ftp_user_data['v_ftp_user']);
  246. $v_ftp_username = $v_ftp_user_data['v_ftp_user'];
  247. $v_ftp_username_full = $user . '_' . $v_ftp_user_data['v_ftp_user'];
  248. $v_ftp_user = escapeshellarg($v_ftp_user_data['v_ftp_user']);
  249. if ($domain_added) {
  250. $v_ftp_path = escapeshellarg(trim($v_ftp_user_data['v_ftp_path']));
  251. $v_ftp_password = tempnam("/tmp","vst");
  252. $fp = fopen($v_ftp_password, "w");
  253. fwrite($fp, $v_ftp_user_data['v_ftp_password']."\n");
  254. fclose($fp);
  255. exec (VESTA_CMD."v-add-web-domain-ftp ".$user." ".$v_domain." ".$v_ftp_username." ".$v_ftp_password . " " . $v_ftp_path, $output, $return_var);
  256. check_return_code($return_var,$output);
  257. unset($output);
  258. unlink($v_ftp_password);
  259. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (empty($_SESSION['error_msg']))) {
  260. $to = $v_ftp_user_data['v_ftp_email'];
  261. $subject = __("FTP login credentials");
  262. $from = __('MAIL_FROM',$_POST['v_domain']);
  263. $mailtext = __('FTP_ACCOUNT_READY',$_POST['v_domain'],$user,$v_ftp_user_data['v_ftp_user'],$v_ftp_user_data['v_ftp_password']);
  264. send_email($to, $subject, $mailtext, $from);
  265. unset($v_ftp_email);
  266. }
  267. } else {
  268. $return_var = -1;
  269. }
  270. if ($return_var == 0) {
  271. $v_ftp_password = "••••••••";
  272. $v_ftp_user_data['is_new'] = 0;
  273. } else {
  274. $v_ftp_user_data['is_new'] = 1;
  275. }
  276. $v_ftp_username = preg_replace("/^".$user."_/", "", $v_ftp_user_data['v_ftp_user']);
  277. $v_ftp_users_updated[] = array(
  278. 'is_new' => $v_ftp_user_data['is_new'],
  279. 'v_ftp_user' => $return_var == 0 ? $v_ftp_username_full : $v_ftp_username,
  280. 'v_ftp_password' => $v_ftp_password,
  281. 'v_ftp_path' => $v_ftp_user_data['v_ftp_path'],
  282. 'v_ftp_email' => $v_ftp_user_data['v_ftp_email'],
  283. 'v_ftp_pre_path' => $v_ftp_user_prepath
  284. );
  285. continue;
  286. }
  287. }
  288. if (!empty($_SESSION['error_msg']) && $domain_added) {
  289. $_SESSION['ok_msg'] = __('WEB_DOMAIN_CREATED_OK',htmlentities($_POST[v_domain]),htmlentities($_POST[v_domain]));
  290. $_SESSION['flash_error_msg'] = $_SESSION['error_msg'];
  291. $url = '/edit/web/?domain='.strtolower(preg_replace("/^www\./i", "", $_POST['v_domain']));
  292. header('Location: ' . $url);
  293. exit;
  294. }
  295. }
  296. // Flush field values on success
  297. if (empty($_SESSION['error_msg'])) {
  298. $_SESSION['ok_msg'] = __('WEB_DOMAIN_CREATED_OK',htmlentities($_POST[v_domain]),htmlentities($_POST[v_domain]));
  299. unset($v_domain);
  300. unset($v_aliases);
  301. unset($v_ssl);
  302. unset($v_ssl_crt);
  303. unset($v_ssl_key);
  304. unset($v_ssl_ca);
  305. unset($v_stats_user);
  306. unset($v_stats_password);
  307. unset($v_ftp);
  308. }
  309. }
  310. // Header
  311. include($_SERVER['DOCUMENT_ROOT'].'/templates/header.html');
  312. // Panel
  313. top_panel($user,$TAB);
  314. // Define user variables
  315. $v_ftp_user_prepath = $panel[$user]['HOME'] . "/web";
  316. $v_ftp_email = $panel[$user]['CONTACT'];
  317. // List IP addresses
  318. exec (VESTA_CMD."v-list-user-ips ".$user." json", $output, $return_var);
  319. $ips = json_decode(implode('', $output), true);
  320. unset($output);
  321. // List web stat engines
  322. exec (VESTA_CMD."v-list-web-stats json", $output, $return_var);
  323. $stats = json_decode(implode('', $output), true);
  324. unset($output);
  325. // Display body
  326. include($_SERVER['DOCUMENT_ROOT'].'/templates/admin/add_web.html');
  327. // Flush session messages
  328. unset($_SESSION['error_msg']);
  329. unset($_SESSION['ok_msg']);
  330. // Footer
  331. include($_SERVER['DOCUMENT_ROOT'].'/templates/footer.html');