index.php 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368
  1. <?php
  2. error_reporting(NULL);
  3. ob_start();
  4. $TAB = 'WEB';
  5. // Main include
  6. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  7. // Check POST request
  8. if (!empty($_POST['ok'])) {
  9. // Check token
  10. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  11. header('location: /login/');
  12. exit();
  13. }
  14. // Check for empty fields
  15. if (empty($_POST['v_domain'])) $errors[] = __('domain');
  16. if (empty($_POST['v_ip'])) $errors[] = __('ip');
  17. if ((!empty($_POST['v_ssl'])) && (empty($_POST['v_ssl_crt']))&& (empty($_POST['v_letsencrypt']))) $errors[] = __('ssl certificate');
  18. if ((!empty($_POST['v_ssl'])) && (empty($_POST['v_ssl_key']))&& (empty($_POST['v_letsencrypt']))) $errors[] = __('ssl key');
  19. if (!empty($errors[0])) {
  20. foreach ($errors as $i => $error) {
  21. if ( $i == 0 ) {
  22. $error_msg = $error;
  23. } else {
  24. $error_msg = $error_msg.", ".$error;
  25. }
  26. }
  27. $_SESSION['error_msg'] = __('Field "%s" can not be blank.',$error_msg);
  28. }
  29. // Check stats password length
  30. if ((!empty($v_stats)) && (empty($_SESSION['error_msg']))) {
  31. if (!empty($_POST['v_stats_user'])) {
  32. $pw_len = strlen($_POST['v_stats_password']);
  33. if ($pw_len < 6 ) $_SESSION['error_msg'] = __('Password is too short.',$error_msg);
  34. }
  35. }
  36. // Set domain to lowercase and remove www prefix
  37. $v_domain = preg_replace("/^www\./i", "", $_POST['v_domain']);
  38. $v_domain = escapeshellarg($v_domain);
  39. $v_domain = strtolower($v_domain);
  40. // Define domain ip address
  41. $v_ip = escapeshellarg($_POST['v_ip']);
  42. // Using public IP instead of internal IP when creating DNS
  43. // Gets public IP from 'v-list-user-ips' command (that reads /vesta/data/ips/ip), precisely from 'NAT' field
  44. $v_public_ip = $v_ip;
  45. $v_clean_ip = $_POST['v_ip']; // clean_ip = IP without quotas
  46. exec (VESTA_CMD."v-list-user-ips ".$user." json", $output, $return_var);
  47. $ips = json_decode(implode('', $output), true);
  48. unset($output);
  49. if (isset($ips[$v_clean_ip]) && isset($ips[$v_clean_ip]['NAT']) && trim($ips[$v_clean_ip]['NAT'])!='') {
  50. $v_public_ip = trim($ips[$v_clean_ip]['NAT']);
  51. $v_public_ip = escapeshellarg($v_public_ip);
  52. }
  53. // Define domain aliases
  54. $v_aliases = $_POST['v_aliases'];
  55. $aliases = preg_replace("/\n/", ",", $v_aliases);
  56. $aliases = preg_replace("/\r/", ",", $aliases);
  57. $aliases = preg_replace("/\t/", ",", $aliases);
  58. $aliases = preg_replace("/ /", ",", $aliases);
  59. $aliases_arr = explode(",", $aliases);
  60. $aliases_arr = array_unique($aliases_arr);
  61. $aliases_arr = array_filter($aliases_arr);
  62. $aliases = implode(",",$aliases_arr);
  63. $aliases = escapeshellarg($aliases);
  64. if (empty($_POST['v_aliases'])) $aliases = 'none';
  65. // Define proxy extensions
  66. $v_proxy_ext = $_POST['v_proxy_ext'];
  67. $proxy_ext = preg_replace("/\n/", ",", $v_proxy_ext);
  68. $proxy_ext = preg_replace("/\r/", ",", $proxy_ext);
  69. $proxy_ext = preg_replace("/\t/", ",", $proxy_ext);
  70. $proxy_ext = preg_replace("/ /", ",", $proxy_ext);
  71. $proxy_ext_arr = explode(",", $proxy_ext);
  72. $proxy_ext_arr = array_unique($proxy_ext_arr);
  73. $proxy_ext_arr = array_filter($proxy_ext_arr);
  74. $proxy_ext = implode(",",$proxy_ext_arr);
  75. $proxy_ext = escapeshellarg($proxy_ext);
  76. // Define other options
  77. $v_elog = $_POST['v_elog'];
  78. $v_ssl = $_POST['v_ssl'];
  79. $v_ssl_crt = $_POST['v_ssl_crt'];
  80. $v_ssl_key = $_POST['v_ssl_key'];
  81. $v_ssl_ca = $_POST['v_ssl_ca'];
  82. $v_ssl_home = $data[$v_domain]['SSL_HOME'];
  83. $v_letsencrypt = $_POST['v_letsencrypt'];
  84. $v_stats = escapeshellarg($_POST['v_stats']);
  85. $v_stats_user = $data[$v_domain]['STATS_USER'];
  86. $v_stats_password = $data[$v_domain]['STATS_PASSWORD'];
  87. $v_ftp = $_POST['v_ftp'];
  88. $v_ftp_user = $_POST['v_ftp_user'];
  89. $v_ftp_password = $_POST['v_ftp_password'];
  90. $v_ftp_email = $_POST['v_ftp_email'];
  91. if (!empty($v_domain)) $v_ftp_user_prepath .= $v_domain;
  92. // Set advanced option checkmark
  93. if (!empty($_POST['v_proxy'])) $v_adv = 'yes';
  94. if (!empty($_POST['v_ftp'])) $v_adv = 'yes';
  95. if ($_POST['v_proxy_ext'] != $v_proxy_ext) $v_adv = 'yes';
  96. if ((!empty($_POST['v_aliases'])) && ($_POST['v_aliases'] != 'www.'.$_POST['v_domain'])) $v_adv = 'yes';
  97. if ((!empty($_POST['v_ssl'])) || (!empty($_POST['v_elog']))) $v_adv = 'yes';
  98. if ((!empty($_POST['v_ssl_crt'])) || (!empty($_POST['v_ssl_key']))) $v_adv = 'yes';
  99. if ((!empty($_POST['v_ssl_ca'])) || ($_POST['v_stats'] != 'none')) $v_adv = 'yes';
  100. if ((!empty($_POST['v_letsencrypt']))) $v_adv = 'yes';
  101. // Check advanced features
  102. if (empty($_POST['v_dns'])) $v_dns = 'off';
  103. if (empty($_POST['v_mail'])) $v_mail = 'off';
  104. if (empty($_POST['v_proxy'])) $v_proxy = 'off';
  105. // Add web domain
  106. if (empty($_SESSION['error_msg'])) {
  107. exec (VESTA_CMD."v-add-web-domain ".$user." ".$v_domain." ".$v_ip." no ".$aliases." ".$proxy_ext, $output, $return_var);
  108. check_return_code($return_var,$output);
  109. unset($output);
  110. $domain_added = empty($_SESSION['error_msg']);
  111. }
  112. // Add DNS domain
  113. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  114. exec (VESTA_CMD."v-add-dns-domain ".$user." ".$v_domain." ".$v_public_ip." '' '' '' '' '' '' '' '' no", $output, $return_var);
  115. check_return_code($return_var,$output);
  116. unset($output);
  117. }
  118. // Add DNS for domain aliases
  119. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  120. foreach ($aliases_arr as $alias) {
  121. if ($alias != "www.".$_POST['v_domain']) {
  122. $alias = escapeshellarg($alias);
  123. exec (VESTA_CMD."v-add-dns-on-web-alias ".$user." ".$alias." ".$v_ip." no", $output, $return_var);
  124. check_return_code($return_var,$output);
  125. unset($output);
  126. }
  127. }
  128. }
  129. // Add mail domain
  130. if (($_POST['v_mail'] == 'on') && (empty($_SESSION['error_msg']))) {
  131. exec (VESTA_CMD."v-add-mail-domain ".$user." ".$v_domain, $output, $return_var);
  132. check_return_code($return_var,$output);
  133. unset($output);
  134. }
  135. // Delete proxy support
  136. if ((!empty($_SESSION['PROXY_SYSTEM'])) && ($_POST['v_proxy'] == 'off') && (empty($_SESSION['error_msg']))) {
  137. $ext = escapeshellarg($ext);
  138. exec (VESTA_CMD."v-delete-web-domain-proxy ".$user." ".$v_domain." no", $output, $return_var);
  139. check_return_code($return_var,$output);
  140. unset($output);
  141. }
  142. // Add Lets Encrypt support
  143. if ((!empty($_POST['v_letsencrypt'])) && (empty($_SESSION['error_msg']))) {
  144. exec (VESTA_CMD."v-schedule-letsencrypt-domain ".$user." ".$v_domain, $output, $return_var);
  145. check_return_code($return_var,$output);
  146. unset($output);
  147. } else {
  148. // Add SSL certificates only if Lets Encrypt is off
  149. if ((!empty($_POST['v_ssl'])) && (empty($_SESSION['error_msg']))) {
  150. exec ('mktemp -d', $output, $return_var);
  151. $tmpdir = $output[0];
  152. unset($output);
  153. // Save certificate
  154. if (!empty($_POST['v_ssl_crt'])) {
  155. $fp = fopen($tmpdir."/".$_POST['v_domain'].".crt", 'w');
  156. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_crt']));
  157. fwrite($fp, "\n");
  158. fclose($fp);
  159. }
  160. // Save private key
  161. if (!empty($_POST['v_ssl_key'])) {
  162. $fp = fopen($tmpdir."/".$_POST['v_domain'].".key", 'w');
  163. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_key']));
  164. fwrite($fp, "\n");
  165. fclose($fp);
  166. }
  167. // Save CA bundle
  168. if (!empty($_POST['v_ssl_ca'])) {
  169. $fp = fopen($tmpdir."/".$_POST['v_domain'].".ca", 'w');
  170. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_ssl_ca']));
  171. fwrite($fp, "\n");
  172. fclose($fp);
  173. }
  174. $v_ssl_home = escapeshellarg($_POST['v_ssl_home']);
  175. exec (VESTA_CMD."v-add-web-domain-ssl ".$user." ".$v_domain." ".$tmpdir." ".$v_ssl_home." no", $output, $return_var);
  176. check_return_code($return_var,$output);
  177. unset($output);
  178. }
  179. }
  180. // Add web stats
  181. if ((!empty($_POST['v_stats'])) && ($_POST['v_stats'] != 'none' ) && (empty($_SESSION['error_msg']))) {
  182. $v_stats = escapeshellarg($_POST['v_stats']);
  183. exec (VESTA_CMD."v-add-web-domain-stats ".$user." ".$v_domain." ".$v_stats, $output, $return_var);
  184. check_return_code($return_var,$output);
  185. unset($output);
  186. }
  187. // Add web stats password
  188. if ((!empty($_POST['v_stats_user'])) && (empty($_SESSION['error_msg']))) {
  189. $v_stats_user = escapeshellarg($_POST['v_stats_user']);
  190. $v_stats_password = tempnam("/tmp","vst");
  191. $fp = fopen($v_stats_password, "w");
  192. fwrite($fp, $_POST['v_stats_password']."\n");
  193. fclose($fp);
  194. exec (VESTA_CMD."v-add-web-domain-stats-user ".$user." ".$v_domain." ".$v_stats_user." ".$v_stats_password, $output, $return_var);
  195. check_return_code($return_var,$output);
  196. unset($output);
  197. unlink($v_stats_password);
  198. $v_stats_password = escapeshellarg($_POST['v_stats_password']);
  199. }
  200. // Restart DNS server
  201. if (($_POST['v_dns'] == 'on') && (empty($_SESSION['error_msg']))) {
  202. exec (VESTA_CMD."v-restart-dns", $output, $return_var);
  203. check_return_code($return_var,$output);
  204. unset($output);
  205. }
  206. // Restart web server
  207. if (empty($_SESSION['error_msg'])) {
  208. exec (VESTA_CMD."v-restart-web", $output, $return_var);
  209. check_return_code($return_var,$output);
  210. unset($output);
  211. }
  212. // Restart proxy server
  213. if ((!empty($_SESSION['PROXY_SYSTEM'])) && ($_POST['v_proxy'] == 'on') && (empty($_SESSION['error_msg']))) {
  214. exec (VESTA_CMD."v-restart-proxy", $output, $return_var);
  215. check_return_code($return_var,$output);
  216. unset($output);
  217. }
  218. // Add FTP
  219. if ((!empty($_POST['v_ftp'])) && (empty($_SESSION['error_msg']))) {
  220. $v_ftp_users_updated = array();
  221. foreach ($_POST['v_ftp_user'] as $i => $v_ftp_user_data) {
  222. if ($v_ftp_user_data['is_new'] == 1) {
  223. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (!filter_var($v_ftp_user_data['v_ftp_email'], FILTER_VALIDATE_EMAIL))) $_SESSION['error_msg'] = __('Please enter valid email address.');
  224. if (empty($v_ftp_user_data['v_ftp_user'])) $errors[] = 'ftp user';
  225. if (empty($v_ftp_user_data['v_ftp_password'])) $errors[] = 'ftp user password';
  226. if (!empty($errors[0])) {
  227. foreach ($errors as $i => $error) {
  228. if ( $i == 0 ) {
  229. $error_msg = $error;
  230. } else {
  231. $error_msg = $error_msg.", ".$error;
  232. }
  233. }
  234. $_SESSION['error_msg'] = __('Field "%s" can not be blank.',$error_msg);
  235. }
  236. // Validate email
  237. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (!filter_var($v_ftp_user_data['v_ftp_email'], FILTER_VALIDATE_EMAIL))) {
  238. $_SESSION['error_msg'] = __('Please enter valid email address.');
  239. }
  240. // Check ftp password length
  241. if ((!empty($v_ftp_user_data['v_ftp']))) {
  242. if (!empty($v_ftp_user_data['v_ftp_user'])) {
  243. $pw_len = strlen($v_ftp_user_data['v_ftp_password']);
  244. if ($pw_len < 6 ) $_SESSION['error_msg'] = __('Password is too short.',$error_msg);
  245. }
  246. }
  247. $v_ftp_user_data['v_ftp_user'] = preg_replace("/^".$user."_/i", "", $v_ftp_user_data['v_ftp_user']);
  248. $v_ftp_username = $v_ftp_user_data['v_ftp_user'];
  249. $v_ftp_username_full = $user . '_' . $v_ftp_user_data['v_ftp_user'];
  250. $v_ftp_user = escapeshellarg($v_ftp_user_data['v_ftp_user']);
  251. if ($domain_added) {
  252. $v_ftp_path = escapeshellarg(trim($v_ftp_user_data['v_ftp_path']));
  253. $v_ftp_password = tempnam("/tmp","vst");
  254. $fp = fopen($v_ftp_password, "w");
  255. fwrite($fp, $v_ftp_user_data['v_ftp_password']."\n");
  256. fclose($fp);
  257. exec (VESTA_CMD."v-add-web-domain-ftp ".$user." ".$v_domain." ".$v_ftp_user." ".$v_ftp_password . " " . $v_ftp_path, $output, $return_var);
  258. check_return_code($return_var,$output);
  259. unset($output);
  260. unlink($v_ftp_password);
  261. if ((!empty($v_ftp_user_data['v_ftp_email'])) && (empty($_SESSION['error_msg']))) {
  262. $to = $v_ftp_user_data['v_ftp_email'];
  263. $subject = __("FTP login credentials");
  264. $from = __('MAIL_FROM',$_POST['v_domain']);
  265. $mailtext = __('FTP_ACCOUNT_READY',$_POST['v_domain'],$user,$v_ftp_user_data['v_ftp_user'],$v_ftp_user_data['v_ftp_password']);
  266. send_email($to, $subject, $mailtext, $from);
  267. unset($v_ftp_email);
  268. }
  269. } else {
  270. $return_var = -1;
  271. }
  272. if ($return_var == 0) {
  273. $v_ftp_password = "••••••••";
  274. $v_ftp_user_data['is_new'] = 0;
  275. } else {
  276. $v_ftp_user_data['is_new'] = 1;
  277. }
  278. $v_ftp_username = preg_replace("/^".$user."_/", "", $v_ftp_user_data['v_ftp_user']);
  279. $v_ftp_users_updated[] = array(
  280. 'is_new' => $v_ftp_user_data['is_new'],
  281. 'v_ftp_user' => $return_var == 0 ? $v_ftp_username_full : $v_ftp_username,
  282. 'v_ftp_password' => $v_ftp_password,
  283. 'v_ftp_path' => $v_ftp_user_data['v_ftp_path'],
  284. 'v_ftp_email' => $v_ftp_user_data['v_ftp_email'],
  285. 'v_ftp_pre_path' => $v_ftp_user_prepath
  286. );
  287. continue;
  288. }
  289. }
  290. if (!empty($_SESSION['error_msg']) && $domain_added) {
  291. $_SESSION['ok_msg'] = __('WEB_DOMAIN_CREATED_OK',htmlentities($_POST[v_domain]),htmlentities($_POST[v_domain]));
  292. $_SESSION['flash_error_msg'] = $_SESSION['error_msg'];
  293. $url = '/edit/web/?domain='.strtolower(preg_replace("/^www\./i", "", $_POST['v_domain']));
  294. header('Location: ' . $url);
  295. exit;
  296. }
  297. }
  298. // Flush field values on success
  299. if (empty($_SESSION['error_msg'])) {
  300. $_SESSION['ok_msg'] = __('WEB_DOMAIN_CREATED_OK',htmlentities($_POST['v_domain']),htmlentities($_POST['v_domain']));
  301. unset($v_domain);
  302. unset($v_aliases);
  303. unset($v_ssl);
  304. unset($v_ssl_crt);
  305. unset($v_ssl_key);
  306. unset($v_ssl_ca);
  307. unset($v_stats_user);
  308. unset($v_stats_password);
  309. unset($v_ftp);
  310. }
  311. }
  312. // Define user variables
  313. $v_ftp_user_prepath = $panel[$user]['HOME'] . "/web";
  314. $v_ftp_email = $panel[$user]['CONTACT'];
  315. // List IP addresses
  316. exec (VESTA_CMD."v-list-user-ips ".$user." json", $output, $return_var);
  317. $ips = json_decode(implode('', $output), true);
  318. unset($output);
  319. // List web stat engines
  320. exec (VESTA_CMD."v-list-web-stats json", $output, $return_var);
  321. $stats = json_decode(implode('', $output), true);
  322. unset($output);
  323. // Render page
  324. render_page($user, $TAB, 'add_web');
  325. // Flush session messages
  326. unset($_SESSION['error_msg']);
  327. unset($_SESSION['ok_msg']);