index.php 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713
  1. <?php
  2. error_reporting(NULL);
  3. $TAB = 'SERVER';
  4. header('Content-Type: application/json');
  5. // Main include
  6. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  7. // Check user
  8. if ($_SESSION['user'] != 'admin') {
  9. exit;
  10. }
  11. // Get server hostname
  12. $v_hostname = exec('hostname');
  13. // Get server port
  14. $port = $_SERVER['SERVER_PORT'];
  15. // List available timezones and get current one
  16. $v_timezones = list_timezones();
  17. exec (VESTA_CMD."v-get-sys-timezone", $output, $return_var);
  18. $v_timezone = $output[0];
  19. unset($output);
  20. if ($v_timezone == 'Etc/UTC' ) $v_timezone = 'UTC';
  21. if ($v_timezone == 'Pacific/Honolulu' ) $v_timezone = 'HAST';
  22. if ($v_timezone == 'US/Aleutian' ) $v_timezone = 'HADT';
  23. if ($v_timezone == 'Etc/GMT+9' ) $v_timezone = 'AKST';
  24. if ($v_timezone == 'America/Anchorage' ) $v_timezone = 'AKDT';
  25. if ($v_timezone == 'America/Dawson_Creek' ) $v_timezone = 'PST';
  26. if ($v_timezone == 'PST8PDT' ) $v_timezone = 'PDT';
  27. if ($v_timezone == 'MST7MDT' ) $v_timezone = 'MDT';
  28. if ($v_timezone == 'Canada/Saskatchewan' ) $v_timezone = 'CST';
  29. if ($v_timezone == 'CST6CDT' ) $v_timezone = 'CDT';
  30. if ($v_timezone == 'EST5EDT' ) $v_timezone = 'EDT';
  31. if ($v_timezone == 'America/Puerto_Rico' ) $v_timezone = 'AST';
  32. if ($v_timezone == 'America/Halifax' ) $v_timezone = 'ADT';
  33. // List supported languages
  34. exec (VESTA_CMD."v-list-sys-languages json", $output, $return_var);
  35. $languages = json_decode(implode('', $output), true);
  36. unset($output);
  37. // List dns cluster hosts
  38. exec (VESTA_CMD."v-list-remote-dns-hosts json", $output, $return_var);
  39. $dns_cluster = json_decode(implode('', $output), true);
  40. unset($output);
  41. foreach ($dns_cluster as $key => $value) {
  42. $v_dns_cluster = 'yes';
  43. }
  44. // List Database hosts
  45. exec (VESTA_CMD."v-list-database-hosts json", $output, $return_var);
  46. $db_hosts = json_decode(implode('', $output), true);
  47. unset($output);
  48. $v_mysql_hosts = array_values(array_filter($db_hosts, function($host){return $host['TYPE'] === 'mysql';}));
  49. $v_mysql = count($v_mysql_hosts) ? 'yes' : 'no';
  50. $v_pgsql_hosts = array_values(array_filter($db_hosts, function($host){return $host['TYPE'] === 'pgsql';}));
  51. $v_pgsql = count($v_pgsql_hosts) ? 'yes' : 'no';
  52. unset($db_hosts);
  53. // List backup settings
  54. $v_backup_remote_adv="yes";
  55. $v_backup_dir = "/backup";
  56. if (!empty($_SESSION['BACKUP'])) $v_backup_dir = $_SESSION['BACKUP'];
  57. $v_backup_gzip = '5';
  58. if (!empty($_SESSION['BACKUP_GZIP'])) $v_backup_gzip = $_SESSION['BACKUP_GZIP'];
  59. $backup_types = explode(",",$_SESSION['BACKUP_SYSTEM']);
  60. foreach ($backup_types as $backup_type) {
  61. if ($backup_type == 'local') {
  62. $v_backup = 'yes';
  63. } else {
  64. exec (VESTA_CMD."v-list-backup-host ".$backup_type. " json", $output, $return_var);
  65. $v_remote_backup = json_decode(implode('', $output), true);
  66. unset($output);
  67. $v_backup_host = $v_remote_backup[$backup_type]['HOST'];
  68. $v_backup_type = $v_remote_backup[$backup_type]['TYPE'];
  69. $v_backup_username = $v_remote_backup[$backup_type]['USERNAME'];
  70. $v_backup_password = "";
  71. $v_backup_port = $v_remote_backup[$backup_type]['PORT'];
  72. $v_backup_bpath = $v_remote_backup[$backup_type]['BPATH'];
  73. }
  74. }
  75. // List ssl web domains
  76. exec (VESTA_CMD."v-search-ssl-certificates json", $output, $return_var);
  77. $v_ssl_domains = json_decode(implode('', $output), true);
  78. //$v_vesta_certificate
  79. unset($output);
  80. // List ssl certificate info
  81. exec (VESTA_CMD."v-list-sys-vesta-ssl json", $output, $return_var);
  82. $v_sys_ssl_str = json_decode(implode('', $output), true);
  83. unset($output);
  84. $v_sys_ssl_crt = $v_sys_ssl_str['VESTA']['CRT'];
  85. $v_sys_ssl_key = $v_sys_ssl_str['VESTA']['KEY'];
  86. $v_sys_ssl_ca = $v_sys_ssl_str['VESTA']['CA'];
  87. $v_sys_ssl_subject = $v_sys_ssl_str['VESTA']['SUBJECT'];
  88. $v_sys_ssl_aliases = $v_sys_ssl_str['VESTA']['ALIASES'];
  89. $v_sys_ssl_not_before = $v_sys_ssl_str['VESTA']['NOT_BEFORE'];
  90. $v_sys_ssl_not_after = $v_sys_ssl_str['VESTA']['NOT_AFTER'];
  91. $v_sys_ssl_signature = $v_sys_ssl_str['VESTA']['SIGNATURE'];
  92. $v_sys_ssl_pub_key = $v_sys_ssl_str['VESTA']['PUB_KEY'];
  93. $v_sys_ssl_issuer = $v_sys_ssl_str['VESTA']['ISSUER'];
  94. // List mail ssl certificate info
  95. if (!empty($_SESSION['VESTA_CERTIFICATE'])); {
  96. exec (VESTA_CMD."v-list-sys-mail-ssl json", $output, $return_var);
  97. $v_mail_ssl_str = json_decode(implode('', $output), true);
  98. unset($output);
  99. $v_mail_ssl_crt = $v_mail_ssl_str['MAIL']['CRT'];
  100. $v_mail_ssl_key = $v_mail_ssl_str['MAIL']['KEY'];
  101. $v_mail_ssl_ca = $v_mail_ssl_str['MAIL']['CA'];
  102. $v_mail_ssl_subject = $v_mail_ssl_str['MAIL']['SUBJECT'];
  103. $v_mail_ssl_aliases = $v_mail_ssl_str['MAIL']['ALIASES'];
  104. $v_mail_ssl_not_before = $v_mail_ssl_str['MAIL']['NOT_BEFORE'];
  105. $v_mail_ssl_not_after = $v_mail_ssl_str['MAIL']['NOT_AFTER'];
  106. $v_mail_ssl_signature = $v_mail_ssl_str['MAIL']['SIGNATURE'];
  107. $v_mail_ssl_pub_key = $v_mail_ssl_str['MAIL']['PUB_KEY'];
  108. $v_mail_ssl_issuer = $v_mail_ssl_str['MAIL']['ISSUER'];
  109. }
  110. // Check POST request
  111. if (!empty($_POST['save'])) {
  112. // Check token
  113. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  114. exit();
  115. }
  116. // Change hostname
  117. if ((!empty($_POST['v_hostname'])) && ($v_hostname != $_POST['v_hostname'])) {
  118. exec (VESTA_CMD."v-change-sys-hostname ".escapeshellarg($_POST['v_hostname']), $output, $return_var);
  119. check_return_code($return_var,$output);
  120. unset($output);
  121. $v_hostname = $_POST['v_hostname'];
  122. }
  123. // Change timezone
  124. if (empty($_SESSION['error_msg'])) {
  125. if (!empty($_POST['v_timezone'])) {
  126. $v_tz = $_POST['v_timezone'];
  127. if ($v_tz == 'UTC' ) $v_tz = 'Etc/UTC';
  128. if ($v_tz == 'HAST' ) $v_tz = 'Pacific/Honolulu';
  129. if ($v_tz == 'HADT' ) $v_tz = 'US/Aleutian';
  130. if ($v_tz == 'AKST' ) $v_tz = 'Etc/GMT+9';
  131. if ($v_tz == 'AKDT' ) $v_tz = 'America/Anchorage';
  132. if ($v_tz == 'PST' ) $v_tz = 'America/Dawson_Creek';
  133. if ($v_tz == 'PDT' ) $v_tz = 'PST8PDT';
  134. if ($v_tz == 'MDT' ) $v_tz = 'MST7MDT';
  135. if ($v_tz == 'CST' ) $v_tz = 'Canada/Saskatchewan';
  136. if ($v_tz == 'CDT' ) $v_tz = 'CST6CDT';
  137. if ($v_tz == 'EDT' ) $v_tz = 'EST5EDT';
  138. if ($v_tz == 'AST' ) $v_tz = 'America/Puerto_Rico';
  139. if ($v_tz == 'ADT' ) $v_tz = 'America/Halifax';
  140. if ($v_timezone != $v_tz) {
  141. exec (VESTA_CMD."v-change-sys-timezone ".escapeshellarg($v_tz), $output, $return_var);
  142. check_return_code($return_var,$output);
  143. $v_timezone = $v_tz;
  144. unset($output);
  145. }
  146. }
  147. }
  148. // Change default language
  149. if (empty($_SESSION['error_msg'])) {
  150. if ((!empty($_POST['v_language'])) && ($_SESSION['LANGUAGE'] != $_POST['v_language'])) {
  151. exec (VESTA_CMD."v-change-sys-language ".escapeshellarg($_POST['v_language']), $output, $return_var);
  152. check_return_code($return_var,$output);
  153. unset($output);
  154. if (empty($_SESSION['error_msg'])) $_SESSION['LANGUAGE'] = $_POST['v_language'];
  155. }
  156. }
  157. // Set disk_quota support
  158. if (empty($_SESSION['error_msg'])) {
  159. if ((!empty($_POST['v_quota'])) && ($_SESSION['DISK_QUOTA'] != $_POST['v_quota'])) {
  160. if($_POST['v_quota'] == 'yes') {
  161. exec (VESTA_CMD."v-add-sys-quota", $output, $return_var);
  162. check_return_code($return_var,$output);
  163. unset($output);
  164. if (empty($_SESSION['error_msg'])) $_SESSION['DISK_QUOTA'] = 'yes';
  165. } else {
  166. exec (VESTA_CMD."v-delete-sys-quota", $output, $return_var);
  167. check_return_code($return_var,$output);
  168. unset($output);
  169. if (empty($_SESSION['error_msg'])) $_SESSION['DISK_QUOTA'] = 'no';
  170. }
  171. }
  172. }
  173. // Set firewall support
  174. if (empty($_SESSION['error_msg'])) {
  175. if ($_SESSION['FIREWALL_SYSTEM'] == 'iptables') $v_firewall = 'yes';
  176. if ($_SESSION['FIREWALL_SYSTEM'] != 'iptables') $v_firewall = 'no';
  177. if ((!empty($_POST['v_firewall'])) && ($v_firewall != $_POST['v_firewall'])) {
  178. if($_POST['v_firewall'] == 'yes') {
  179. exec (VESTA_CMD."v-add-sys-firewall", $output, $return_var);
  180. check_return_code($return_var,$output);
  181. unset($output);
  182. if (empty($_SESSION['error_msg'])) $_SESSION['FIREWALL_SYSTEM'] = 'iptables';
  183. } else {
  184. exec (VESTA_CMD."v-delete-sys-firewall", $output, $return_var);
  185. check_return_code($return_var,$output);
  186. unset($output);
  187. if (empty($_SESSION['error_msg'])) $_SESSION['FIREWALL_SYSTEM'] = '';
  188. }
  189. }
  190. }
  191. // Update mysql pasword
  192. if (empty($_SESSION['error_msg'])) {
  193. if (!empty($_POST['v_mysql_password'])) {
  194. exec (VESTA_CMD."v-change-database-host-password mysql localhost root ".escapeshellarg($_POST['v_mysql_password']), $output, $return_var);
  195. check_return_code($return_var,$output);
  196. unset($output);
  197. $v_db_adv = 'yes';
  198. }
  199. }
  200. // Delete Mail Domain SSL certificate
  201. if ((!isset($_POST['v_mail_ssl_domain_checkbox'])) && (!empty($_SESSION['MAIL_CERTIFICATE'])) && (empty($_SESSION['error_msg']))) {
  202. unset($_SESSION['MAIL_CERTIFICATE']);
  203. exec (VESTA_CMD."v-delete-sys-mail-ssl", $output, $return_var);
  204. check_return_code($return_var,$output);
  205. unset($output);
  206. }
  207. // Updating Mail Domain SSL certificate
  208. if ((isset($_POST['v_mail_ssl_domain_checkbox'])) && (isset($_POST['v_mail_ssl_domain'])) && (empty($_SESSION['error_msg']))) {
  209. if ((!empty($_POST['v_mail_ssl_domain'])) && ($_POST['v_mail_ssl_domain'] != $_SESSION['MAIL_CERTIFICATE'])) {
  210. $v_mail_ssl_str = explode(":", $_POST['v_mail_ssl_domain']);
  211. $v_mail_ssl_user = escapeshellarg($v_mail_ssl_str[0]);
  212. $v_mail_ssl_domain = escapeshellarg($v_mail_ssl_str[1]);
  213. exec (VESTA_CMD."v-add-sys-mail-ssl ".$v_mail_ssl_user." ".$v_mail_ssl_domain, $output, $return_var);
  214. check_return_code($return_var,$output);
  215. unset($output);
  216. unset($v_mail_ssl_str);
  217. if (empty($_SESSION['error_msg'])) {
  218. $_SESSION['MAIL_CERTIFICATE'] = $_POST['v_mail_ssl_domain'];
  219. // List SSL certificate info
  220. exec (VESTA_CMD."v-list-sys-mail-ssl json", $output, $return_var);
  221. $v_mail_ssl_str = json_decode(implode('', $output), true);
  222. unset($output);
  223. $v_mail_ssl_crt = $v_mail_ssl_str['MAIL']['CRT'];
  224. $v_mail_ssl_key = $v_mail_ssl_str['MAIL']['KEY'];
  225. $v_mail_ssl_ca = $v_mail_ssl_str['MAIL']['CA'];
  226. $v_mail_ssl_subject = $v_mail_ssl_str['MAIL']['SUBJECT'];
  227. $v_mail_ssl_aliases = $v_mail_ssl_str['MAIL']['ALIASES'];
  228. $v_mail_ssl_not_before = $v_mail_ssl_str['MAIL']['NOT_BEFORE'];
  229. $v_mail_ssl_not_after = $v_mail_ssl_str['MAIL']['NOT_AFTER'];
  230. $v_mail_ssl_signature = $v_mail_ssl_str['MAIL']['SIGNATURE'];
  231. $v_mail_ssl_pub_key = $v_mail_ssl_str['MAIL']['PUB_KEY'];
  232. $v_mail_ssl_issuer = $v_mail_ssl_str['MAIL']['ISSUER'];
  233. }
  234. }
  235. }
  236. // Update webmail url
  237. if (empty($_SESSION['error_msg'])) {
  238. if ($_POST['v_mail_url'] != $_SESSION['MAIL_URL']) {
  239. exec (VESTA_CMD."v-change-sys-config-value MAIL_URL ".escapeshellarg($_POST['v_mail_url']), $output, $return_var);
  240. check_return_code($return_var,$output);
  241. unset($output);
  242. $v_mail_adv = 'yes';
  243. }
  244. }
  245. // Update phpMyAdmin url
  246. if (empty($_SESSION['error_msg'])) {
  247. if ($_POST['v_mysql_url'] != $_SESSION['DB_PMA_URL']) {
  248. exec (VESTA_CMD."v-change-sys-config-value DB_PMA_URL ".escapeshellarg($_POST['v_mysql_url']), $output, $return_var);
  249. check_return_code($return_var,$output);
  250. unset($output);
  251. $v_db_adv = 'yes';
  252. }
  253. }
  254. // Update phpPgAdmin url
  255. if (empty($_SESSION['error_msg'])) {
  256. if ($_POST['v_pgsql_url'] != $_SESSION['DB_PGA_URL']) {
  257. exec (VESTA_CMD."v-change-sys-config-value DB_PGA_URL ".escapeshellarg($_POST['v_pgsql_url']), $output, $return_var);
  258. check_return_code($return_var,$output);
  259. unset($output);
  260. $v_db_adv = 'yes';
  261. }
  262. }
  263. // Disable local backup
  264. if (empty($_SESSION['error_msg'])) {
  265. if (($_POST['v_backup'] == 'no') && ($v_backup == 'yes' )) {
  266. exec (VESTA_CMD."v-delete-backup-host local", $output, $return_var);
  267. check_return_code($return_var,$output);
  268. unset($output);
  269. if (empty($_SESSION['error_msg'])) $v_backup = 'no';
  270. $v_backup_adv = 'yes';
  271. }
  272. }
  273. // Enable local backups
  274. if (empty($_SESSION['error_msg'])) {
  275. if (($_POST['v_backup'] == 'yes') && ($v_backup != 'yes' )) {
  276. exec (VESTA_CMD."v-add-backup-host local", $output, $return_var);
  277. check_return_code($return_var,$output);
  278. unset($output);
  279. if (empty($_SESSION['error_msg'])) $v_backup = 'yes';
  280. $v_backup_adv = 'yes';
  281. }
  282. }
  283. // Change backup gzip level
  284. if (empty($_SESSION['error_msg'])) {
  285. if ($_POST['v_backup_gzip'] != $v_backup_gzip ) {
  286. exec (VESTA_CMD."v-change-sys-config-value BACKUP_GZIP ".escapeshellarg($_POST['v_backup_gzip']), $output, $return_var);
  287. check_return_code($return_var,$output);
  288. unset($output);
  289. if (empty($_SESSION['error_msg'])) $v_backup_gzip = $_POST['v_backup_gzip'];
  290. $v_backup_adv = 'yes';
  291. }
  292. }
  293. // Change backup path
  294. if (empty($_SESSION['error_msg'])) {
  295. if ($_POST['v_backup_dir'] != $v_backup_dir ) {
  296. exec (VESTA_CMD."v-change-sys-config-value BACKUP ".escapeshellarg($_POST['v_backup_dir']), $output, $return_var);
  297. check_return_code($return_var,$output);
  298. unset($output);
  299. if (empty($_SESSION['error_msg'])) $v_backup_dir = $_POST['v_backup_dir'];
  300. $v_backup_adv = 'yes';
  301. }
  302. }
  303. // Add remote backup host
  304. if (empty($_SESSION['error_msg'])) {
  305. if ((!empty($_POST['v_backup_host'])) && (empty($v_backup_host))) {
  306. $v_backup_host = escapeshellarg($_POST['v_backup_host']);
  307. $v_backup_type = escapeshellarg($_POST['v_backup_type']);
  308. $v_backup_username = escapeshellarg($_POST['v_backup_username']);
  309. $v_backup_password = escapeshellarg($_POST['v_backup_password']);
  310. $v_backup_bpath = escapeshellarg($_POST['v_backup_bpath']);
  311. exec (VESTA_CMD."v-add-backup-host ".$v_backup_type." ".$v_backup_host ." ".$v_backup_username." ".$v_backup_password." ".$v_backup_bpath, $output, $return_var);
  312. check_return_code($return_var,$output);
  313. unset($output);
  314. if (empty($_SESSION['error_msg'])) $v_backup_host = $_POST['v_backup_host'];
  315. if (empty($_SESSION['error_msg'])) $v_backup_type = $_POST['v_backup_type'];
  316. if (empty($_SESSION['error_msg'])) $v_backup_username = $_POST['v_backup_username'];
  317. if (empty($_SESSION['error_msg'])) $v_backup_password = $_POST['v_backup_password'];
  318. if (empty($_SESSION['error_msg'])) $v_backup_bpath = $_POST['v_backup_bpath'];
  319. $v_backup_new = 'yes';
  320. $v_backup_adv = 'yes';
  321. $v_backup_remote_adv = 'yes';
  322. }
  323. }
  324. // Change remote backup host type
  325. if (empty($_SESSION['error_msg'])) {
  326. if ((!empty($_POST['v_backup_host'])) && ($_POST['v_backup_type'] != $v_backup_type)) {
  327. exec (VESTA_CMD."v-delete-backup-host ". $v_backup_type, $output, $return_var);
  328. unset($output);
  329. $v_backup_host = escapeshellarg($_POST['v_backup_host']);
  330. $v_backup_type = escapeshellarg($_POST['v_backup_type']);
  331. $v_backup_username = escapeshellarg($_POST['v_backup_username']);
  332. $v_backup_password = escapeshellarg($_POST['v_backup_password']);
  333. $v_backup_bpath = escapeshellarg($_POST['v_backup_bpath']);
  334. exec (VESTA_CMD."v-add-backup-host ".$v_backup_type." ".$v_backup_host." ".$v_backup_username." ".$v_backup_password." ".$v_backup_bpath, $output, $return_var);
  335. check_return_code($return_var,$output);
  336. unset($output);
  337. if (empty($_SESSION['error_msg'])) $v_backup_host = $_POST['v_backup_host'];
  338. if (empty($_SESSION['error_msg'])) $v_backup_type = $_POST['v_backup_type'];
  339. if (empty($_SESSION['error_msg'])) $v_backup_username = $_POST['v_backup_username'];
  340. if (empty($_SESSION['error_msg'])) $v_backup_password = $_POST['v_backup_password'];
  341. if (empty($_SESSION['error_msg'])) $v_backup_bpath = $_POST['v_backup_bpath'];
  342. $v_backup_adv = 'yes';
  343. $v_backup_remote_adv = 'yes';
  344. }
  345. }
  346. // Change remote backup host
  347. if (empty($_SESSION['error_msg'])) {
  348. if ((!empty($_POST['v_backup_host'])) && ($_POST['v_backup_type'] == $v_backup_type) && (!isset($v_backup_new))) {
  349. if (($_POST['v_backup_host'] != $v_backup_host) || ($_POST['v_backup_username'] != $v_backup_username) || ($_POST['v_backup_password'] != $v_backup_password) || ($_POST['v_backup_bpath'] != $v_backup_bpath)){
  350. $v_backup_host = escapeshellarg($_POST['v_backup_host']);
  351. $v_backup_type = escapeshellarg($_POST['v_backup_type']);
  352. $v_backup_username = escapeshellarg($_POST['v_backup_username']);
  353. $v_backup_password = escapeshellarg($_POST['v_backup_password']);
  354. $v_backup_bpath = escapeshellarg($_POST['v_backup_bpath']);
  355. exec (VESTA_CMD."v-add-backup-host ".$v_backup_type." ".$v_backup_host." ".$v_backup_username." ".$v_backup_password." ".$v_backup_bpath, $output, $return_var);
  356. check_return_code($return_var,$output);
  357. unset($output);
  358. if (empty($_SESSION['error_msg'])) $v_backup_host = $_POST['v_backup_host'];
  359. if (empty($_SESSION['error_msg'])) $v_backup_type = $_POST['v_backup_type'];
  360. if (empty($_SESSION['error_msg'])) $v_backup_username = $_POST['v_backup_username'];
  361. if (empty($_SESSION['error_msg'])) $v_backup_password = $_POST['v_backup_password'];
  362. if (empty($_SESSION['error_msg'])) $v_backup_bpath = $_POST['v_backup_bpath'];
  363. $v_backup_adv = 'yes';
  364. $v_backup_remote_adv = 'yes';
  365. }
  366. }
  367. }
  368. // Delete remote backup host
  369. if (empty($_SESSION['error_msg'])) {
  370. if ((empty($_POST['v_backup_host'])) && (!empty($v_backup_host))) {
  371. exec (VESTA_CMD."v-delete-backup-host ". $v_backup_type, $output, $return_var);
  372. check_return_code($return_var,$output);
  373. unset($output);
  374. if (empty($_SESSION['error_msg'])) $v_backup_host = '';
  375. if (empty($_SESSION['error_msg'])) $v_backup_type = '';
  376. if (empty($_SESSION['error_msg'])) $v_backup_username = '';
  377. if (empty($_SESSION['error_msg'])) $v_backup_password = '';
  378. if (empty($_SESSION['error_msg'])) $v_backup_bpath = '';
  379. $v_backup_adv = '';
  380. $v_backup_remote_adv = '';
  381. }
  382. }
  383. // Delete WEB Domain SSL certificate
  384. if ((!isset($_POST['v_web_ssl_domain_checkbox'])) && (!empty($_SESSION['VESTA_CERTIFICATE'])) && (empty($_SESSION['error_msg']))) {
  385. unset($_SESSION['VESTA_CERTIFICATE']);
  386. exec (VESTA_CMD."v-delete-sys-vesta-ssl", $output, $return_var);
  387. check_return_code($return_var,$output);
  388. unset($output);
  389. }
  390. // Updating WEB Domain SSL certificate
  391. if ((isset($_POST['v_web_ssl_domain_checkbox'])) && (isset($_POST['v_web_ssl_domain'])) && (empty($_SESSION['error_msg']))) {
  392. if ((!empty($_POST['v_web_ssl_domain'])) && ($_POST['v_web_ssl_domain'] != $_SESSION['VESTA_CERTIFICATE'])) {
  393. $v_web_ssl_str = explode(":", $_POST['v_web_ssl_domain']);
  394. $v_web_ssl_user = escapeshellarg($v_web_ssl_str[0]);
  395. $v_web_ssl_domain = escapeshellarg($v_web_ssl_str[1]);
  396. exec (VESTA_CMD."v-add-sys-vesta-ssl ".$v_web_ssl_user." ".$v_web_ssl_domain, $output, $return_var);
  397. check_return_code($return_var,$output);
  398. unset($output);
  399. if (empty($_SESSION['error_msg'])) {
  400. $_SESSION['VESTA_CERTIFICATE'] = $_POST['v_web_ssl_domain'];
  401. // List SSL certificate info
  402. exec (VESTA_CMD."v-list-sys-vesta-ssl json", $output, $return_var);
  403. $v_sys_ssl_str = json_decode(implode('', $output), true);
  404. unset($output);
  405. $v_sys_ssl_crt = $v_sys_ssl_str['VESTA']['CRT'];
  406. $v_sys_ssl_key = $v_sys_ssl_str['VESTA']['KEY'];
  407. $v_sys_ssl_ca = $v_sys_ssl_str['VESTA']['CA'];
  408. $v_sys_ssl_subject = $v_sys_ssl_str['VESTA']['SUBJECT'];
  409. $v_sys_ssl_aliases = $v_sys_ssl_str['VESTA']['ALIASES'];
  410. $v_sys_ssl_not_before = $v_sys_ssl_str['VESTA']['NOT_BEFORE'];
  411. $v_sys_ssl_not_after = $v_sys_ssl_str['VESTA']['NOT_AFTER'];
  412. $v_sys_ssl_signature = $v_sys_ssl_str['VESTA']['SIGNATURE'];
  413. $v_sys_ssl_pub_key = $v_sys_ssl_str['VESTA']['PUB_KEY'];
  414. $v_sys_ssl_issuer = $v_sys_ssl_str['VESTA']['ISSUER'];
  415. }
  416. }
  417. }
  418. // Update SSL certificate
  419. if ((!empty($_POST['v_sys_ssl_crt'])) && (empty($_POST['v_web_ssl_domain'])) && (empty($_SESSION['error_msg']))) {
  420. if (($v_sys_ssl_crt != str_replace("\r\n", "\n", $_POST['v_sys_ssl_crt'])) || ($v_sys_ssl_key != str_replace("\r\n", "\n", $_POST['v_sys_ssl_key']))) {
  421. exec ('mktemp -d', $mktemp_output, $return_var);
  422. $tmpdir = $mktemp_output[0];
  423. // Certificate
  424. if (!empty($_POST['v_sys_ssl_crt'])) {
  425. $fp = fopen($tmpdir."/certificate.crt", 'w');
  426. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_sys_ssl_crt']));
  427. fwrite($fp, "\n");
  428. fclose($fp);
  429. }
  430. // Key
  431. if (!empty($_POST['v_sys_ssl_key'])) {
  432. $fp = fopen($tmpdir."/certificate.key", 'w');
  433. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_sys_ssl_key']));
  434. fwrite($fp, "\n");
  435. fclose($fp);
  436. }
  437. exec (VESTA_CMD."v-change-sys-vesta-ssl ".$tmpdir, $output, $return_var);
  438. check_return_code($return_var,$output);
  439. unset($output);
  440. if (empty($_SESSION['error_msg'])) {
  441. // List ssl certificate info
  442. exec (VESTA_CMD."v-list-sys-vesta-ssl json", $output, $return_var);
  443. $v_sys_ssl_str = json_decode(implode('', $output), true);
  444. unset($output);
  445. $v_sys_ssl_crt = $v_sys_ssl_str['VESTA']['CRT'];
  446. $v_sys_ssl_key = $v_sys_ssl_str['VESTA']['KEY'];
  447. $v_sys_ssl_ca = $v_sys_ssl_str['VESTA']['CA'];
  448. $v_sys_ssl_subject = $v_sys_ssl_str['VESTA']['SUBJECT'];
  449. $v_sys_ssl_aliases = $v_sys_ssl_str['VESTA']['ALIASES'];
  450. $v_sys_ssl_not_before = $v_sys_ssl_str['VESTA']['NOT_BEFORE'];
  451. $v_sys_ssl_not_after = $v_sys_ssl_str['VESTA']['NOT_AFTER'];
  452. $v_sys_ssl_signature = $v_sys_ssl_str['VESTA']['SIGNATURE'];
  453. $v_sys_ssl_pub_key = $v_sys_ssl_str['VESTA']['PUB_KEY'];
  454. $v_sys_ssl_issuer = $v_sys_ssl_str['VESTA']['ISSUER'];
  455. }
  456. }
  457. }
  458. // Flush field values on success
  459. if (empty($_SESSION['error_msg'])) {
  460. $_SESSION['ok_msg'] = __('Changes has been saved.');
  461. }
  462. // activating sftp licence
  463. if (empty($_SESSION['error_msg'])) {
  464. if($_SESSION['SFTPJAIL_KEY'] != $_POST['v_sftp_licence'] && $_POST['v_sftp'] == 'yes'){
  465. $module = 'sftpjail';
  466. $licence_key = escapeshellarg($_POST['v_sftp_licence']);
  467. exec (VESTA_CMD."v-activate-vesta-license ".$module." ".$licence_key, $output, $return_var);
  468. check_return_code($return_var,$output);
  469. unset($output);
  470. if (empty($_SESSION['error_msg'])) {
  471. $_SESSION['ok_msg'] = __('Licence Activated');
  472. $_SESSION['SFTPJAIL_KEY'] = $_POST['v_sftp_licence'];
  473. }
  474. }
  475. }
  476. // cancel sftp licence
  477. if (empty($_SESSION['error_msg'])) {
  478. if($_POST['v_sftp'] == 'cancel' && $_SESSION['SFTPJAIL_KEY']){
  479. $module = 'sftpjail';
  480. $licence_key = escapeshellarg($_SESSION['SFTPJAIL_KEY']);
  481. exec (VESTA_CMD."v-deactivate-vesta-license ".$module." ".$licence_key, $output, $return_var);
  482. check_return_code($return_var,$output);
  483. unset($output);
  484. if (empty($_SESSION['error_msg'])) {
  485. $_SESSION['ok_msg'] = __('Licence Deactivated');
  486. unset($_SESSION['SFTPJAIL_KEY']);
  487. }
  488. }
  489. }
  490. // activating filemanager licence
  491. if (empty($_SESSION['error_msg'])) {
  492. if($_SESSION['FILEMANAGER_KEY'] != $_POST['v_filemanager_licence'] && $_POST['v_filemanager'] == 'yes'){
  493. $module = 'filemanager';
  494. $licence_key = escapeshellarg($_POST['v_filemanager_licence']);
  495. exec (VESTA_CMD."v-activate-vesta-license ".$module." ".$licence_key, $output, $return_var);
  496. check_return_code($return_var,$output);
  497. unset($output);
  498. if (empty($_SESSION['error_msg'])) {
  499. $_SESSION['ok_msg'] = __('Licence Activated');
  500. $_SESSION['FILEMANAGER_KEY'] = $_POST['v_filemanager_licence'];
  501. }
  502. }
  503. }
  504. // cancel filemanager licence
  505. if (empty($_SESSION['error_msg'])) {
  506. if($_POST['v_filemanager'] == 'cancel' && $_SESSION['FILEMANAGER_KEY']){
  507. $module = 'filemanager';
  508. $licence_key = escapeshellarg($_SESSION['FILEMANAGER_KEY']);
  509. exec (VESTA_CMD."v-deactivate-vesta-license ".$module." ".$licence_key, $output, $return_var);
  510. check_return_code($return_var,$output);
  511. unset($output);
  512. if (empty($_SESSION['error_msg'])) {
  513. $_SESSION['ok_msg'] = __('Licence Deactivated');
  514. unset($_SESSION['FILEMANAGER_KEY']);
  515. }
  516. }
  517. }
  518. // activating softaculous
  519. if (empty($_SESSION['error_msg'])) {
  520. if($_SESSION['SOFTACULOUS'] != $_POST['v_softaculous'] && $_POST['v_softaculous'] == 'yes'){
  521. exec (VESTA_CMD."v-add-vesta-softaculous WEB", $output, $return_var);
  522. check_return_code($return_var,$output);
  523. unset($output);
  524. if (empty($_SESSION['error_msg'])) {
  525. $_SESSION['ok_msg'] = __('Softaculous Activated');
  526. $_SESSION['SOFTACULOUS'] = 'yes';
  527. }
  528. }
  529. }
  530. // disable softaculous
  531. if (empty($_SESSION['error_msg'])) {
  532. if($_SESSION['SOFTACULOUS'] != $_POST['v_softaculous'] && $_POST['v_softaculous'] == 'no'){
  533. exec (VESTA_CMD."v-delete-vesta-softaculous", $output, $return_var);
  534. check_return_code($return_var,$output);
  535. unset($output);
  536. if (empty($_SESSION['error_msg'])) {
  537. $_SESSION['ok_msg'] = __('Softaculous Disabled');
  538. $_SESSION['SOFTACULOUS'] = '';
  539. }
  540. }
  541. }
  542. // Change port
  543. if ((!empty($_POST['port'])) && ($port != $_POST['port'])) {
  544. exec (VESTA_CMD."v-change-vesta-port ".escapeshellarg($_POST['port']), $output, $return_var);
  545. check_return_code($return_var,$output);
  546. unset($output);
  547. $port = $_POST['port'];
  548. }
  549. }
  550. // Check system configuration
  551. exec (VESTA_CMD . "v-list-sys-config json", $output, $return_var);
  552. $data = json_decode(implode('', $output), true);
  553. unset($output);
  554. $sys_arr = $data['config'];
  555. foreach ($sys_arr as $key => $value) {
  556. $_SESSION[$key] = $value;
  557. }
  558. // Render page
  559. // render_page($user, $TAB, 'edit_server');
  560. $result = array(
  561. 'hostname' => $v_hostname,
  562. 'timezones' => $v_timezones,
  563. 'timezone' => $v_timezone,
  564. 'port' => $port,
  565. 'languages' => $languages,
  566. 'backup_adv' => $v_backup_adv,
  567. 'backup_remote_adv' => $v_backup_remote_adv,
  568. 'language' => $_SESSION['LANGUAGE'],
  569. 'proxy_system' => $_SESSION['PROXY_SYSTEM'],
  570. 'mail_system' => $_SESSION['MAIL_SYSTEM'],
  571. 'antivirus_system' => $_SESSION['ANTIVIRUS_SYSTEM'],
  572. 'antispam_system' => $_SESSION['ANTISPAM_SYSTEM'],
  573. 'mail_url' => $_SESSION['MAIL_URL'],
  574. 'pgsql_url' => $_SESSION['DB_PGA_URL'],
  575. 'mail_certificate' => $_SESSION['MAIL_CERTIFICATE'],
  576. 'dns_system' => $_SESSION['DNS_SYSTEM'],
  577. 'web_system' => $_SESSION['WEB_SYSTEM'],
  578. 'softaculous' => $_SESSION['SOFTACULOUS'],
  579. 'firewall_system' => $_SESSION['FIREWALL_SYSTEM'],
  580. 'web_backend' => $_SESSION['WEB_BACKEND'],
  581. 'version' => $_SESSION['VERSION'],
  582. 'http_host' => $_SERVER['HTTP_HOST'],
  583. 'fm_key' => $_SESSION['FILEMANAGER_KEY'],
  584. 'fm_license_key' => $_GET['filemanager_licence_key'],
  585. 'disk_quota' => $_SESSION['DISK_QUOTA'],
  586. 'web_backend_pool' => $_SESSION['WEB_BACKEND_POOL'],
  587. 'sftpjail_key' => $_SESSION['SFTPJAIL_KEY'],
  588. 'lead' => $_GET['lead'] == 'sftp',
  589. 'softaculous_lead' => $_GET['lead'] == 'softaculous',
  590. 'fm_lead' => $_GET['lead'] == 'filemanager',
  591. 'sftp_licence_key' => $_GET['sftp_licence_key'],
  592. 'licence_key' => $_GET['sftp_licence_key'] != '' ? $_GET['sftp_licence_key'] : $_SESSION['SFTPJAIL_KEY'],
  593. 'fm_licence_key_option' => $_GET['filemanager_licence_key'] != '' ? $_GET['filemanager_licence_key'] : $_SESSION['FILEMANAGER_KEY'],
  594. 'vesta_certificate' => $_SESSION['VESTA_CERTIFICATE'],
  595. 'yes_no_options' => [ __('no'), __('yes') ],
  596. 'dns_cluster_options' => [ __('no'), __('yes') ],
  597. 'postgre_sql_options' => [ __('no'), __('yes') ],
  598. 'mysql_support_options' => [ __('no'), __('yes') ],
  599. 'dns_cluster' => $dns_cluster,
  600. 'v_dns_cluster' => $v_dns_cluster,
  601. 'db_hosts' => $db_hosts,
  602. 'mysql_hosts' => $v_mysql_hosts,
  603. 'mysql' => $v_mysql,
  604. 'pgsql_hosts' => $v_pgsql_hosts,
  605. 'pgsql' => $v_pgsql,
  606. 'protocols' => [ __('ftp'), __('sftp') ],
  607. 'backup_dir' => $v_backup_dir,
  608. 'backup_gzip' => $v_backup_gzip,
  609. 'backup_types' => $backup_types,
  610. 'backup' => $v_backup,
  611. 'remote_backup' => $v_remote_backup,
  612. 'backup_host' => $v_backup_host,
  613. 'backup_type' => $v_backup_type,
  614. 'backup_username' => $v_backup_username,
  615. 'backup_password' => $v_backup_password,
  616. 'backup_port' => $v_backup_port,
  617. 'backup_bpath' => $v_backup_bpath,
  618. 'ssl_domains' => $v_ssl_domains,
  619. 'sys_ssl_crt' => $v_sys_ssl_str['VESTA']['CRT'],
  620. 'sys_ssl_key' => $v_sys_ssl_str['VESTA']['KEY'],
  621. 'sys_ssl_ca' => $v_sys_ssl_str['VESTA']['CA'],
  622. 'sys_ssl_subject' => $v_sys_ssl_str['VESTA']['SUBJECT'],
  623. 'sys_ssl_aliases' => $v_sys_ssl_str['VESTA']['ALIASES'],
  624. 'sys_ssl_not_before' => $v_sys_ssl_str['VESTA']['NOT_BEFORE'],
  625. 'sys_ssl_not_after' => $v_sys_ssl_str['VESTA']['NOT_AFTER'],
  626. 'sys_ssl_signature' => $v_sys_ssl_str['VESTA']['SIGNATURE'],
  627. 'sys_ssl_pub_key' => $v_sys_ssl_str['VESTA']['PUB_KEY'],
  628. 'sys_ssl_issuer' => $v_sys_ssl_str['VESTA']['ISSUER'],
  629. 'mail_ssl_crt' => $v_mail_ssl_str['MAIL']['CRT'],
  630. 'mail_ssl_key' => $v_mail_ssl_str['MAIL']['KEY'],
  631. 'mail_ssl_ca' => $v_mail_ssl_str['MAIL']['CA'],
  632. 'mail_ssl_subject' => $v_mail_ssl_str['MAIL']['SUBJECT'],
  633. 'mail_ssl_aliases' => $v_mail_ssl_str['MAIL']['ALIASES'],
  634. 'mail_ssl_not_before' => $v_mail_ssl_str['MAIL']['NOT_BEFORE'],
  635. 'mail_ssl_not_after' => $v_mail_ssl_str['MAIL']['NOT_AFTER'],
  636. 'mail_ssl_signature' => $v_mail_ssl_str['MAIL']['SIGNATURE'],
  637. 'mail_ssl_pub_key' => $v_mail_ssl_str['MAIL']['PUB_KEY'],
  638. 'mail_ssl_issuer' => $v_mail_ssl_str['MAIL']['ISSUER'],
  639. 'error_msg' => $_SESSION['error_msg'],
  640. 'ok_msg' => $_SESSION['ok_msg']
  641. );
  642. echo json_encode($result);
  643. // Flush session messages
  644. unset($_SESSION['error_msg']);
  645. unset($_SESSION['ok_msg']);