index.php 31 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701
  1. <?php
  2. error_reporting(NULL);
  3. $TAB = 'SERVER';
  4. header('Content-Type: application/json');
  5. // Main include
  6. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  7. // Check user
  8. if ($_SESSION['user'] != 'admin') {
  9. exit;
  10. }
  11. // Get server hostname
  12. $v_hostname = exec('hostname');
  13. // List available timezones and get current one
  14. $v_timezones = list_timezones();
  15. exec (VESTA_CMD."v-get-sys-timezone", $output, $return_var);
  16. $v_timezone = $output[0];
  17. unset($output);
  18. if ($v_timezone == 'Etc/UTC' ) $v_timezone = 'UTC';
  19. if ($v_timezone == 'Pacific/Honolulu' ) $v_timezone = 'HAST';
  20. if ($v_timezone == 'US/Aleutian' ) $v_timezone = 'HADT';
  21. if ($v_timezone == 'Etc/GMT+9' ) $v_timezone = 'AKST';
  22. if ($v_timezone == 'America/Anchorage' ) $v_timezone = 'AKDT';
  23. if ($v_timezone == 'America/Dawson_Creek' ) $v_timezone = 'PST';
  24. if ($v_timezone == 'PST8PDT' ) $v_timezone = 'PDT';
  25. if ($v_timezone == 'MST7MDT' ) $v_timezone = 'MDT';
  26. if ($v_timezone == 'Canada/Saskatchewan' ) $v_timezone = 'CST';
  27. if ($v_timezone == 'CST6CDT' ) $v_timezone = 'CDT';
  28. if ($v_timezone == 'EST5EDT' ) $v_timezone = 'EDT';
  29. if ($v_timezone == 'America/Puerto_Rico' ) $v_timezone = 'AST';
  30. if ($v_timezone == 'America/Halifax' ) $v_timezone = 'ADT';
  31. // List supported languages
  32. exec (VESTA_CMD."v-list-sys-languages json", $output, $return_var);
  33. $languages = json_decode(implode('', $output), true);
  34. unset($output);
  35. // List dns cluster hosts
  36. exec (VESTA_CMD."v-list-remote-dns-hosts json", $output, $return_var);
  37. $dns_cluster = json_decode(implode('', $output), true);
  38. unset($output);
  39. foreach ($dns_cluster as $key => $value) {
  40. $v_dns_cluster = 'yes';
  41. }
  42. // List Database hosts
  43. exec (VESTA_CMD."v-list-database-hosts json", $output, $return_var);
  44. $db_hosts = json_decode(implode('', $output), true);
  45. unset($output);
  46. $v_mysql_hosts = array_values(array_filter($db_hosts, function($host){return $host['TYPE'] === 'mysql';}));
  47. $v_mysql = count($v_mysql_hosts) ? 'yes' : 'no';
  48. $v_pgsql_hosts = array_values(array_filter($db_hosts, function($host){return $host['TYPE'] === 'pgsql';}));
  49. $v_pgsql = count($v_pgsql_hosts) ? 'yes' : 'no';
  50. unset($db_hosts);
  51. // List backup settings
  52. $v_backup_dir = "/backup";
  53. if (!empty($_SESSION['BACKUP'])) $v_backup_dir = $_SESSION['BACKUP'];
  54. $v_backup_gzip = '5';
  55. if (!empty($_SESSION['BACKUP_GZIP'])) $v_backup_gzip = $_SESSION['BACKUP_GZIP'];
  56. $backup_types = explode(",",$_SESSION['BACKUP_SYSTEM']);
  57. foreach ($backup_types as $backup_type) {
  58. if ($backup_type == 'local') {
  59. $v_backup = 'yes';
  60. } else {
  61. exec (VESTA_CMD."v-list-backup-host ".$backup_type. " json", $output, $return_var);
  62. $v_remote_backup = json_decode(implode('', $output), true);
  63. unset($output);
  64. $v_backup_host = $v_remote_backup[$backup_type]['HOST'];
  65. $v_backup_type = $v_remote_backup[$backup_type]['TYPE'];
  66. $v_backup_username = $v_remote_backup[$backup_type]['USERNAME'];
  67. $v_backup_password = "";
  68. $v_backup_port = $v_remote_backup[$backup_type]['PORT'];
  69. $v_backup_bpath = $v_remote_backup[$backup_type]['BPATH'];
  70. }
  71. }
  72. // List ssl web domains
  73. exec (VESTA_CMD."v-search-ssl-certificates json", $output, $return_var);
  74. $v_ssl_domains = json_decode(implode('', $output), true);
  75. //$v_vesta_certificate
  76. unset($output);
  77. // List ssl certificate info
  78. exec (VESTA_CMD."v-list-sys-vesta-ssl json", $output, $return_var);
  79. $v_sys_ssl_str = json_decode(implode('', $output), true);
  80. unset($output);
  81. $v_sys_ssl_crt = $v_sys_ssl_str['VESTA']['CRT'];
  82. $v_sys_ssl_key = $v_sys_ssl_str['VESTA']['KEY'];
  83. $v_sys_ssl_ca = $v_sys_ssl_str['VESTA']['CA'];
  84. $v_sys_ssl_subject = $v_sys_ssl_str['VESTA']['SUBJECT'];
  85. $v_sys_ssl_aliases = $v_sys_ssl_str['VESTA']['ALIASES'];
  86. $v_sys_ssl_not_before = $v_sys_ssl_str['VESTA']['NOT_BEFORE'];
  87. $v_sys_ssl_not_after = $v_sys_ssl_str['VESTA']['NOT_AFTER'];
  88. $v_sys_ssl_signature = $v_sys_ssl_str['VESTA']['SIGNATURE'];
  89. $v_sys_ssl_pub_key = $v_sys_ssl_str['VESTA']['PUB_KEY'];
  90. $v_sys_ssl_issuer = $v_sys_ssl_str['VESTA']['ISSUER'];
  91. // List mail ssl certificate info
  92. if (!empty($_SESSION['VESTA_CERTIFICATE'])); {
  93. exec (VESTA_CMD."v-list-sys-mail-ssl json", $output, $return_var);
  94. $v_mail_ssl_str = json_decode(implode('', $output), true);
  95. unset($output);
  96. $v_mail_ssl_crt = $v_mail_ssl_str['MAIL']['CRT'];
  97. $v_mail_ssl_key = $v_mail_ssl_str['MAIL']['KEY'];
  98. $v_mail_ssl_ca = $v_mail_ssl_str['MAIL']['CA'];
  99. $v_mail_ssl_subject = $v_mail_ssl_str['MAIL']['SUBJECT'];
  100. $v_mail_ssl_aliases = $v_mail_ssl_str['MAIL']['ALIASES'];
  101. $v_mail_ssl_not_before = $v_mail_ssl_str['MAIL']['NOT_BEFORE'];
  102. $v_mail_ssl_not_after = $v_mail_ssl_str['MAIL']['NOT_AFTER'];
  103. $v_mail_ssl_signature = $v_mail_ssl_str['MAIL']['SIGNATURE'];
  104. $v_mail_ssl_pub_key = $v_mail_ssl_str['MAIL']['PUB_KEY'];
  105. $v_mail_ssl_issuer = $v_mail_ssl_str['MAIL']['ISSUER'];
  106. }
  107. // Check POST request
  108. if (!empty($_POST['save'])) {
  109. // Check token
  110. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  111. exit();
  112. }
  113. // Change hostname
  114. if ((!empty($_POST['v_hostname'])) && ($v_hostname != $_POST['v_hostname'])) {
  115. exec (VESTA_CMD."v-change-sys-hostname ".escapeshellarg($_POST['v_hostname']), $output, $return_var);
  116. check_return_code($return_var,$output);
  117. unset($output);
  118. $v_hostname = $_POST['v_hostname'];
  119. }
  120. // Change timezone
  121. if (empty($_SESSION['error_msg'])) {
  122. if (!empty($_POST['v_timezone'])) {
  123. $v_tz = $_POST['v_timezone'];
  124. if ($v_tz == 'UTC' ) $v_tz = 'Etc/UTC';
  125. if ($v_tz == 'HAST' ) $v_tz = 'Pacific/Honolulu';
  126. if ($v_tz == 'HADT' ) $v_tz = 'US/Aleutian';
  127. if ($v_tz == 'AKST' ) $v_tz = 'Etc/GMT+9';
  128. if ($v_tz == 'AKDT' ) $v_tz = 'America/Anchorage';
  129. if ($v_tz == 'PST' ) $v_tz = 'America/Dawson_Creek';
  130. if ($v_tz == 'PDT' ) $v_tz = 'PST8PDT';
  131. if ($v_tz == 'MDT' ) $v_tz = 'MST7MDT';
  132. if ($v_tz == 'CST' ) $v_tz = 'Canada/Saskatchewan';
  133. if ($v_tz == 'CDT' ) $v_tz = 'CST6CDT';
  134. if ($v_tz == 'EDT' ) $v_tz = 'EST5EDT';
  135. if ($v_tz == 'AST' ) $v_tz = 'America/Puerto_Rico';
  136. if ($v_tz == 'ADT' ) $v_tz = 'America/Halifax';
  137. if ($v_timezone != $v_tz) {
  138. exec (VESTA_CMD."v-change-sys-timezone ".escapeshellarg($v_tz), $output, $return_var);
  139. check_return_code($return_var,$output);
  140. $v_timezone = $v_tz;
  141. unset($output);
  142. }
  143. }
  144. }
  145. // Change default language
  146. if (empty($_SESSION['error_msg'])) {
  147. if ((!empty($_POST['v_language'])) && ($_SESSION['LANGUAGE'] != $_POST['v_language'])) {
  148. exec (VESTA_CMD."v-change-sys-language ".escapeshellarg($_POST['v_language']), $output, $return_var);
  149. check_return_code($return_var,$output);
  150. unset($output);
  151. if (empty($_SESSION['error_msg'])) $_SESSION['LANGUAGE'] = $_POST['v_language'];
  152. }
  153. }
  154. // Set disk_quota support
  155. if (empty($_SESSION['error_msg'])) {
  156. if ((!empty($_POST['v_quota'])) && ($_SESSION['DISK_QUOTA'] != $_POST['v_quota'])) {
  157. if($_POST['v_quota'] == 'yes') {
  158. exec (VESTA_CMD."v-add-sys-quota", $output, $return_var);
  159. check_return_code($return_var,$output);
  160. unset($output);
  161. if (empty($_SESSION['error_msg'])) $_SESSION['DISK_QUOTA'] = 'yes';
  162. } else {
  163. exec (VESTA_CMD."v-delete-sys-quota", $output, $return_var);
  164. check_return_code($return_var,$output);
  165. unset($output);
  166. if (empty($_SESSION['error_msg'])) $_SESSION['DISK_QUOTA'] = 'no';
  167. }
  168. }
  169. }
  170. // Set firewall support
  171. if (empty($_SESSION['error_msg'])) {
  172. if ($_SESSION['FIREWALL_SYSTEM'] == 'iptables') $v_firewall = 'yes';
  173. if ($_SESSION['FIREWALL_SYSTEM'] != 'iptables') $v_firewall = 'no';
  174. if ((!empty($_POST['v_firewall'])) && ($v_firewall != $_POST['v_firewall'])) {
  175. if($_POST['v_firewall'] == 'yes') {
  176. exec (VESTA_CMD."v-add-sys-firewall", $output, $return_var);
  177. check_return_code($return_var,$output);
  178. unset($output);
  179. if (empty($_SESSION['error_msg'])) $_SESSION['FIREWALL_SYSTEM'] = 'iptables';
  180. } else {
  181. exec (VESTA_CMD."v-delete-sys-firewall", $output, $return_var);
  182. check_return_code($return_var,$output);
  183. unset($output);
  184. if (empty($_SESSION['error_msg'])) $_SESSION['FIREWALL_SYSTEM'] = '';
  185. }
  186. }
  187. }
  188. // Update mysql pasword
  189. if (empty($_SESSION['error_msg'])) {
  190. if (!empty($_POST['v_mysql_password'])) {
  191. exec (VESTA_CMD."v-change-database-host-password mysql localhost root ".escapeshellarg($_POST['v_mysql_password']), $output, $return_var);
  192. check_return_code($return_var,$output);
  193. unset($output);
  194. $v_db_adv = 'yes';
  195. }
  196. }
  197. // Delete Mail Domain SSL certificate
  198. if ((!isset($_POST['v_mail_ssl_domain_checkbox'])) && (!empty($_SESSION['MAIL_CERTIFICATE'])) && (empty($_SESSION['error_msg']))) {
  199. unset($_SESSION['MAIL_CERTIFICATE']);
  200. exec (VESTA_CMD."v-delete-sys-mail-ssl", $output, $return_var);
  201. check_return_code($return_var,$output);
  202. unset($output);
  203. }
  204. // Updating Mail Domain SSL certificate
  205. if ((isset($_POST['v_mail_ssl_domain_checkbox'])) && (isset($_POST['v_mail_ssl_domain'])) && (empty($_SESSION['error_msg']))) {
  206. if ((!empty($_POST['v_mail_ssl_domain'])) && ($_POST['v_mail_ssl_domain'] != $_SESSION['MAIL_CERTIFICATE'])) {
  207. $v_mail_ssl_str = explode(":", $_POST['v_mail_ssl_domain']);
  208. $v_mail_ssl_user = escapeshellarg($v_mail_ssl_str[0]);
  209. $v_mail_ssl_domain = escapeshellarg($v_mail_ssl_str[1]);
  210. exec (VESTA_CMD."v-add-sys-mail-ssl ".$v_mail_ssl_user." ".$v_mail_ssl_domain, $output, $return_var);
  211. check_return_code($return_var,$output);
  212. unset($output);
  213. unset($v_mail_ssl_str);
  214. if (empty($_SESSION['error_msg'])) {
  215. $_SESSION['MAIL_CERTIFICATE'] = $_POST['v_mail_ssl_domain'];
  216. // List SSL certificate info
  217. exec (VESTA_CMD."v-list-sys-mail-ssl json", $output, $return_var);
  218. $v_mail_ssl_str = json_decode(implode('', $output), true);
  219. unset($output);
  220. $v_mail_ssl_crt = $v_mail_ssl_str['MAIL']['CRT'];
  221. $v_mail_ssl_key = $v_mail_ssl_str['MAIL']['KEY'];
  222. $v_mail_ssl_ca = $v_mail_ssl_str['MAIL']['CA'];
  223. $v_mail_ssl_subject = $v_mail_ssl_str['MAIL']['SUBJECT'];
  224. $v_mail_ssl_aliases = $v_mail_ssl_str['MAIL']['ALIASES'];
  225. $v_mail_ssl_not_before = $v_mail_ssl_str['MAIL']['NOT_BEFORE'];
  226. $v_mail_ssl_not_after = $v_mail_ssl_str['MAIL']['NOT_AFTER'];
  227. $v_mail_ssl_signature = $v_mail_ssl_str['MAIL']['SIGNATURE'];
  228. $v_mail_ssl_pub_key = $v_mail_ssl_str['MAIL']['PUB_KEY'];
  229. $v_mail_ssl_issuer = $v_mail_ssl_str['MAIL']['ISSUER'];
  230. }
  231. }
  232. }
  233. // Update webmail url
  234. if (empty($_SESSION['error_msg'])) {
  235. if ($_POST['v_mail_url'] != $_SESSION['MAIL_URL']) {
  236. exec (VESTA_CMD."v-change-sys-config-value MAIL_URL ".escapeshellarg($_POST['v_mail_url']), $output, $return_var);
  237. check_return_code($return_var,$output);
  238. unset($output);
  239. $v_mail_adv = 'yes';
  240. }
  241. }
  242. // Update phpMyAdmin url
  243. if (empty($_SESSION['error_msg'])) {
  244. if ($_POST['v_mysql_url'] != $_SESSION['DB_PMA_URL']) {
  245. exec (VESTA_CMD."v-change-sys-config-value DB_PMA_URL ".escapeshellarg($_POST['v_mysql_url']), $output, $return_var);
  246. check_return_code($return_var,$output);
  247. unset($output);
  248. $v_db_adv = 'yes';
  249. }
  250. }
  251. // Update phpPgAdmin url
  252. if (empty($_SESSION['error_msg'])) {
  253. if ($_POST['v_pgsql_url'] != $_SESSION['DB_PGA_URL']) {
  254. exec (VESTA_CMD."v-change-sys-config-value DB_PGA_URL ".escapeshellarg($_POST['v_pgsql_url']), $output, $return_var);
  255. check_return_code($return_var,$output);
  256. unset($output);
  257. $v_db_adv = 'yes';
  258. }
  259. }
  260. // Disable local backup
  261. if (empty($_SESSION['error_msg'])) {
  262. if (($_POST['v_backup'] == 'no') && ($v_backup == 'yes' )) {
  263. exec (VESTA_CMD."v-delete-backup-host local", $output, $return_var);
  264. check_return_code($return_var,$output);
  265. unset($output);
  266. if (empty($_SESSION['error_msg'])) $v_backup = 'no';
  267. $v_backup_adv = 'yes';
  268. }
  269. }
  270. // Enable local backups
  271. if (empty($_SESSION['error_msg'])) {
  272. if (($_POST['v_backup'] == 'yes') && ($v_backup != 'yes' )) {
  273. exec (VESTA_CMD."v-add-backup-host local", $output, $return_var);
  274. check_return_code($return_var,$output);
  275. unset($output);
  276. if (empty($_SESSION['error_msg'])) $v_backup = 'yes';
  277. $v_backup_adv = 'yes';
  278. }
  279. }
  280. // Change backup gzip level
  281. if (empty($_SESSION['error_msg'])) {
  282. if ($_POST['v_backup_gzip'] != $v_backup_gzip ) {
  283. exec (VESTA_CMD."v-change-sys-config-value BACKUP_GZIP ".escapeshellarg($_POST['v_backup_gzip']), $output, $return_var);
  284. check_return_code($return_var,$output);
  285. unset($output);
  286. if (empty($_SESSION['error_msg'])) $v_backup_gzip = $_POST['v_backup_gzip'];
  287. $v_backup_adv = 'yes';
  288. }
  289. }
  290. // Change backup path
  291. if (empty($_SESSION['error_msg'])) {
  292. if ($_POST['v_backup_dir'] != $v_backup_dir ) {
  293. exec (VESTA_CMD."v-change-sys-config-value BACKUP ".escapeshellarg($_POST['v_backup_dir']), $output, $return_var);
  294. check_return_code($return_var,$output);
  295. unset($output);
  296. if (empty($_SESSION['error_msg'])) $v_backup_dir = $_POST['v_backup_dir'];
  297. $v_backup_adv = 'yes';
  298. }
  299. }
  300. // Add remote backup host
  301. if (empty($_SESSION['error_msg'])) {
  302. if ((!empty($_POST['v_backup_host'])) && (empty($v_backup_host))) {
  303. $v_backup_host = escapeshellarg($_POST['v_backup_host']);
  304. $v_backup_type = escapeshellarg($_POST['v_backup_type']);
  305. $v_backup_username = escapeshellarg($_POST['v_backup_username']);
  306. $v_backup_password = escapeshellarg($_POST['v_backup_password']);
  307. $v_backup_bpath = escapeshellarg($_POST['v_backup_bpath']);
  308. exec (VESTA_CMD."v-add-backup-host ".$v_backup_type." ".$v_backup_host ." ".$v_backup_username." ".$v_backup_password." ".$v_backup_bpath, $output, $return_var);
  309. check_return_code($return_var,$output);
  310. unset($output);
  311. if (empty($_SESSION['error_msg'])) $v_backup_host = $_POST['v_backup_host'];
  312. if (empty($_SESSION['error_msg'])) $v_backup_type = $_POST['v_backup_type'];
  313. if (empty($_SESSION['error_msg'])) $v_backup_username = $_POST['v_backup_username'];
  314. if (empty($_SESSION['error_msg'])) $v_backup_password = $_POST['v_backup_password'];
  315. if (empty($_SESSION['error_msg'])) $v_backup_bpath = $_POST['v_backup_bpath'];
  316. $v_backup_new = 'yes';
  317. $v_backup_adv = 'yes';
  318. $v_backup_remote_adv = 'yes';
  319. }
  320. }
  321. // Change remote backup host type
  322. if (empty($_SESSION['error_msg'])) {
  323. if ((!empty($_POST['v_backup_host'])) && ($_POST['v_backup_type'] != $v_backup_type)) {
  324. exec (VESTA_CMD."v-delete-backup-host ". $v_backup_type, $output, $return_var);
  325. unset($output);
  326. $v_backup_host = escapeshellarg($_POST['v_backup_host']);
  327. $v_backup_type = escapeshellarg($_POST['v_backup_type']);
  328. $v_backup_username = escapeshellarg($_POST['v_backup_username']);
  329. $v_backup_password = escapeshellarg($_POST['v_backup_password']);
  330. $v_backup_bpath = escapeshellarg($_POST['v_backup_bpath']);
  331. exec (VESTA_CMD."v-add-backup-host ".$v_backup_type." ".$v_backup_host." ".$v_backup_username." ".$v_backup_password." ".$v_backup_bpath, $output, $return_var);
  332. check_return_code($return_var,$output);
  333. unset($output);
  334. if (empty($_SESSION['error_msg'])) $v_backup_host = $_POST['v_backup_host'];
  335. if (empty($_SESSION['error_msg'])) $v_backup_type = $_POST['v_backup_type'];
  336. if (empty($_SESSION['error_msg'])) $v_backup_username = $_POST['v_backup_username'];
  337. if (empty($_SESSION['error_msg'])) $v_backup_password = $_POST['v_backup_password'];
  338. if (empty($_SESSION['error_msg'])) $v_backup_bpath = $_POST['v_backup_bpath'];
  339. $v_backup_adv = 'yes';
  340. $v_backup_remote_adv = 'yes';
  341. }
  342. }
  343. // Change remote backup host
  344. if (empty($_SESSION['error_msg'])) {
  345. if ((!empty($_POST['v_backup_host'])) && ($_POST['v_backup_type'] == $v_backup_type) && (!isset($v_backup_new))) {
  346. if (($_POST['v_backup_host'] != $v_backup_host) || ($_POST['v_backup_username'] != $v_backup_username) || ($_POST['v_backup_password'] != $v_backup_password) || ($_POST['v_backup_bpath'] != $v_backup_bpath)){
  347. $v_backup_host = escapeshellarg($_POST['v_backup_host']);
  348. $v_backup_type = escapeshellarg($_POST['v_backup_type']);
  349. $v_backup_username = escapeshellarg($_POST['v_backup_username']);
  350. $v_backup_password = escapeshellarg($_POST['v_backup_password']);
  351. $v_backup_bpath = escapeshellarg($_POST['v_backup_bpath']);
  352. exec (VESTA_CMD."v-add-backup-host ".$v_backup_type." ".$v_backup_host." ".$v_backup_username." ".$v_backup_password." ".$v_backup_bpath, $output, $return_var);
  353. check_return_code($return_var,$output);
  354. unset($output);
  355. if (empty($_SESSION['error_msg'])) $v_backup_host = $_POST['v_backup_host'];
  356. if (empty($_SESSION['error_msg'])) $v_backup_type = $_POST['v_backup_type'];
  357. if (empty($_SESSION['error_msg'])) $v_backup_username = $_POST['v_backup_username'];
  358. if (empty($_SESSION['error_msg'])) $v_backup_password = $_POST['v_backup_password'];
  359. if (empty($_SESSION['error_msg'])) $v_backup_bpath = $_POST['v_backup_bpath'];
  360. $v_backup_adv = 'yes';
  361. $v_backup_remote_adv = 'yes';
  362. }
  363. }
  364. }
  365. // Delete remote backup host
  366. if (empty($_SESSION['error_msg'])) {
  367. if ((empty($_POST['v_backup_host'])) && (!empty($v_backup_host))) {
  368. exec (VESTA_CMD."v-delete-backup-host ". $v_backup_type, $output, $return_var);
  369. check_return_code($return_var,$output);
  370. unset($output);
  371. if (empty($_SESSION['error_msg'])) $v_backup_host = '';
  372. if (empty($_SESSION['error_msg'])) $v_backup_type = '';
  373. if (empty($_SESSION['error_msg'])) $v_backup_username = '';
  374. if (empty($_SESSION['error_msg'])) $v_backup_password = '';
  375. if (empty($_SESSION['error_msg'])) $v_backup_bpath = '';
  376. $v_backup_adv = '';
  377. $v_backup_remote_adv = '';
  378. }
  379. }
  380. // Delete WEB Domain SSL certificate
  381. if ((!isset($_POST['v_web_ssl_domain_checkbox'])) && (!empty($_SESSION['VESTA_CERTIFICATE'])) && (empty($_SESSION['error_msg']))) {
  382. unset($_SESSION['VESTA_CERTIFICATE']);
  383. exec (VESTA_CMD."v-delete-sys-vesta-ssl", $output, $return_var);
  384. check_return_code($return_var,$output);
  385. unset($output);
  386. }
  387. // Updating WEB Domain SSL certificate
  388. if ((isset($_POST['v_web_ssl_domain_checkbox'])) && (isset($_POST['v_web_ssl_domain'])) && (empty($_SESSION['error_msg']))) {
  389. if ((!empty($_POST['v_web_ssl_domain'])) && ($_POST['v_web_ssl_domain'] != $_SESSION['VESTA_CERTIFICATE'])) {
  390. $v_web_ssl_str = explode(":", $_POST['v_web_ssl_domain']);
  391. $v_web_ssl_user = escapeshellarg($v_web_ssl_str[0]);
  392. $v_web_ssl_domain = escapeshellarg($v_web_ssl_str[1]);
  393. exec (VESTA_CMD."v-add-sys-vesta-ssl ".$v_web_ssl_user." ".$v_web_ssl_domain, $output, $return_var);
  394. check_return_code($return_var,$output);
  395. unset($output);
  396. if (empty($_SESSION['error_msg'])) {
  397. $_SESSION['VESTA_CERTIFICATE'] = $_POST['v_web_ssl_domain'];
  398. // List SSL certificate info
  399. exec (VESTA_CMD."v-list-sys-vesta-ssl json", $output, $return_var);
  400. $v_sys_ssl_str = json_decode(implode('', $output), true);
  401. unset($output);
  402. $v_sys_ssl_crt = $v_sys_ssl_str['VESTA']['CRT'];
  403. $v_sys_ssl_key = $v_sys_ssl_str['VESTA']['KEY'];
  404. $v_sys_ssl_ca = $v_sys_ssl_str['VESTA']['CA'];
  405. $v_sys_ssl_subject = $v_sys_ssl_str['VESTA']['SUBJECT'];
  406. $v_sys_ssl_aliases = $v_sys_ssl_str['VESTA']['ALIASES'];
  407. $v_sys_ssl_not_before = $v_sys_ssl_str['VESTA']['NOT_BEFORE'];
  408. $v_sys_ssl_not_after = $v_sys_ssl_str['VESTA']['NOT_AFTER'];
  409. $v_sys_ssl_signature = $v_sys_ssl_str['VESTA']['SIGNATURE'];
  410. $v_sys_ssl_pub_key = $v_sys_ssl_str['VESTA']['PUB_KEY'];
  411. $v_sys_ssl_issuer = $v_sys_ssl_str['VESTA']['ISSUER'];
  412. }
  413. }
  414. }
  415. // Update SSL certificate
  416. if ((!empty($_POST['v_sys_ssl_crt'])) && (empty($_POST['v_web_ssl_domain'])) && (empty($_SESSION['error_msg']))) {
  417. if (($v_sys_ssl_crt != str_replace("\r\n", "\n", $_POST['v_sys_ssl_crt'])) || ($v_sys_ssl_key != str_replace("\r\n", "\n", $_POST['v_sys_ssl_key']))) {
  418. exec ('mktemp -d', $mktemp_output, $return_var);
  419. $tmpdir = $mktemp_output[0];
  420. // Certificate
  421. if (!empty($_POST['v_sys_ssl_crt'])) {
  422. $fp = fopen($tmpdir."/certificate.crt", 'w');
  423. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_sys_ssl_crt']));
  424. fwrite($fp, "\n");
  425. fclose($fp);
  426. }
  427. // Key
  428. if (!empty($_POST['v_sys_ssl_key'])) {
  429. $fp = fopen($tmpdir."/certificate.key", 'w');
  430. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_sys_ssl_key']));
  431. fwrite($fp, "\n");
  432. fclose($fp);
  433. }
  434. exec (VESTA_CMD."v-change-sys-vesta-ssl ".$tmpdir, $output, $return_var);
  435. check_return_code($return_var,$output);
  436. unset($output);
  437. if (empty($_SESSION['error_msg'])) {
  438. // List ssl certificate info
  439. exec (VESTA_CMD."v-list-sys-vesta-ssl json", $output, $return_var);
  440. $v_sys_ssl_str = json_decode(implode('', $output), true);
  441. unset($output);
  442. $v_sys_ssl_crt = $v_sys_ssl_str['VESTA']['CRT'];
  443. $v_sys_ssl_key = $v_sys_ssl_str['VESTA']['KEY'];
  444. $v_sys_ssl_ca = $v_sys_ssl_str['VESTA']['CA'];
  445. $v_sys_ssl_subject = $v_sys_ssl_str['VESTA']['SUBJECT'];
  446. $v_sys_ssl_aliases = $v_sys_ssl_str['VESTA']['ALIASES'];
  447. $v_sys_ssl_not_before = $v_sys_ssl_str['VESTA']['NOT_BEFORE'];
  448. $v_sys_ssl_not_after = $v_sys_ssl_str['VESTA']['NOT_AFTER'];
  449. $v_sys_ssl_signature = $v_sys_ssl_str['VESTA']['SIGNATURE'];
  450. $v_sys_ssl_pub_key = $v_sys_ssl_str['VESTA']['PUB_KEY'];
  451. $v_sys_ssl_issuer = $v_sys_ssl_str['VESTA']['ISSUER'];
  452. }
  453. }
  454. }
  455. // Flush field values on success
  456. if (empty($_SESSION['error_msg'])) {
  457. $_SESSION['ok_msg'] = __('Changes has been saved.');
  458. }
  459. // activating sftp licence
  460. if (empty($_SESSION['error_msg'])) {
  461. if($_SESSION['SFTPJAIL_KEY'] != $_POST['v_sftp_licence'] && $_POST['v_sftp'] == 'yes'){
  462. $module = 'sftpjail';
  463. $licence_key = escapeshellarg($_POST['v_sftp_licence']);
  464. exec (VESTA_CMD."v-activate-vesta-license ".$module." ".$licence_key, $output, $return_var);
  465. check_return_code($return_var,$output);
  466. unset($output);
  467. if (empty($_SESSION['error_msg'])) {
  468. $_SESSION['ok_msg'] = __('Licence Activated');
  469. $_SESSION['SFTPJAIL_KEY'] = $_POST['v_sftp_licence'];
  470. }
  471. }
  472. }
  473. // cancel sftp licence
  474. if (empty($_SESSION['error_msg'])) {
  475. if($_POST['v_sftp'] == 'cancel' && $_SESSION['SFTPJAIL_KEY']){
  476. $module = 'sftpjail';
  477. $licence_key = escapeshellarg($_SESSION['SFTPJAIL_KEY']);
  478. exec (VESTA_CMD."v-deactivate-vesta-license ".$module." ".$licence_key, $output, $return_var);
  479. check_return_code($return_var,$output);
  480. unset($output);
  481. if (empty($_SESSION['error_msg'])) {
  482. $_SESSION['ok_msg'] = __('Licence Deactivated');
  483. unset($_SESSION['SFTPJAIL_KEY']);
  484. }
  485. }
  486. }
  487. // activating filemanager licence
  488. if (empty($_SESSION['error_msg'])) {
  489. if($_SESSION['FILEMANAGER_KEY'] != $_POST['v_filemanager_licence'] && $_POST['v_filemanager'] == 'yes'){
  490. $module = 'filemanager';
  491. $licence_key = escapeshellarg($_POST['v_filemanager_licence']);
  492. exec (VESTA_CMD."v-activate-vesta-license ".$module." ".$licence_key, $output, $return_var);
  493. check_return_code($return_var,$output);
  494. unset($output);
  495. if (empty($_SESSION['error_msg'])) {
  496. $_SESSION['ok_msg'] = __('Licence Activated');
  497. $_SESSION['FILEMANAGER_KEY'] = $_POST['v_filemanager_licence'];
  498. }
  499. }
  500. }
  501. // cancel filemanager licence
  502. if (empty($_SESSION['error_msg'])) {
  503. if($_POST['v_filemanager'] == 'cancel' && $_SESSION['FILEMANAGER_KEY']){
  504. $module = 'filemanager';
  505. $licence_key = escapeshellarg($_SESSION['FILEMANAGER_KEY']);
  506. exec (VESTA_CMD."v-deactivate-vesta-license ".$module." ".$licence_key, $output, $return_var);
  507. check_return_code($return_var,$output);
  508. unset($output);
  509. if (empty($_SESSION['error_msg'])) {
  510. $_SESSION['ok_msg'] = __('Licence Deactivated');
  511. unset($_SESSION['FILEMANAGER_KEY']);
  512. }
  513. }
  514. }
  515. // activating softaculous
  516. if (empty($_SESSION['error_msg'])) {
  517. if($_SESSION['SOFTACULOUS'] != $_POST['v_softaculous'] && $_POST['v_softaculous'] == 'yes'){
  518. exec (VESTA_CMD."v-add-vesta-softaculous WEB", $output, $return_var);
  519. check_return_code($return_var,$output);
  520. unset($output);
  521. if (empty($_SESSION['error_msg'])) {
  522. $_SESSION['ok_msg'] = __('Softaculous Activated');
  523. $_SESSION['SOFTACULOUS'] = 'yes';
  524. }
  525. }
  526. }
  527. // disable softaculous
  528. if (empty($_SESSION['error_msg'])) {
  529. if($_SESSION['SOFTACULOUS'] != $_POST['v_softaculous'] && $_POST['v_softaculous'] == 'no'){
  530. exec (VESTA_CMD."v-delete-vesta-softaculous", $output, $return_var);
  531. check_return_code($return_var,$output);
  532. unset($output);
  533. if (empty($_SESSION['error_msg'])) {
  534. $_SESSION['ok_msg'] = __('Softaculous Disabled');
  535. $_SESSION['SOFTACULOUS'] = '';
  536. }
  537. }
  538. }
  539. }
  540. // Check system configuration
  541. exec (VESTA_CMD . "v-list-sys-config json", $output, $return_var);
  542. $data = json_decode(implode('', $output), true);
  543. unset($output);
  544. $sys_arr = $data['config'];
  545. foreach ($sys_arr as $key => $value) {
  546. $_SESSION[$key] = $value;
  547. }
  548. // Render page
  549. // render_page($user, $TAB, 'edit_server');
  550. $result = array(
  551. 'hostname' => $v_hostname,
  552. 'timezones' => $v_timezones,
  553. 'timezone' => $v_timezone,
  554. 'languages' => $languages,
  555. 'backup_adv' => $v_backup_adv,
  556. 'backup_remote_adv' => $v_backup_remote_adv,
  557. 'language' => $_SESSION['LANGUAGE'],
  558. 'proxy_system' => $_SESSION['PROXY_SYSTEM'],
  559. 'mail_system' => $_SESSION['MAIL_SYSTEM'],
  560. 'antivirus_system' => $_SESSION['ANTIVIRUS_SYSTEM'],
  561. 'antispam_system' => $_SESSION['ANTISPAM_SYSTEM'],
  562. 'mail_url' => $_SESSION['MAIL_URL'],
  563. 'pgsql_url' => $_SESSION['DB_PGA_URL'],
  564. 'mail_certificate' => $_SESSION['MAIL_CERTIFICATE'],
  565. 'db_pma_url' => $_SESSION['DB_PMA_URL'],
  566. 'dns_system' => $_SESSION['DNS_SYSTEM'],
  567. 'web_system' => $_SESSION['WEB_SYSTEM'],
  568. 'softaculous' => $_SESSION['SOFTACULOUS'],
  569. 'firewall_system' => $_SESSION['FIREWALL_SYSTEM'],
  570. 'web_backend' => $_SESSION['WEB_BACKEND'],
  571. 'version' => $_SESSION['VERSION'],
  572. 'http_host' => $_SERVER['HTTP_HOST'],
  573. 'fm_key' => $_SESSION['FILEMANAGER_KEY'],
  574. 'fm_license_key' => $_GET['filemanager_licence_key'],
  575. 'disk_quota' => $_SESSION['DISK_QUOTA'],
  576. 'web_backend_pool' => $_SESSION['WEB_BACKEND_POOL'],
  577. 'sftpjail_key' => $_SESSION['SFTPJAIL_KEY'],
  578. 'lead' => $_GET['lead'] == 'sftp',
  579. 'softaculous_lead' => $_GET['lead'] == 'softaculous',
  580. 'fm_lead' => $_GET['lead'] == 'filemanager',
  581. 'sftp_licence_key' => $_GET['sftp_licence_key'],
  582. 'licence_key' => $_GET['sftp_licence_key'] != '' ? $_GET['sftp_licence_key'] : $_SESSION['SFTPJAIL_KEY'],
  583. 'fm_licence_key_option' => $_GET['filemanager_licence_key'] != '' ? $_GET['filemanager_licence_key'] : $_SESSION['FILEMANAGER_KEY'],
  584. 'vesta_certificate' => $_SESSION['VESTA_CERTIFICATE'],
  585. 'yes_no_options' => [ __('no'), __('yes') ],
  586. 'dns_cluster_options' => [ __('no'), __('yes') ],
  587. 'postgre_sql_options' => [ __('no'), __('yes') ],
  588. 'mysql_support_options' => [ __('no'), __('yes') ],
  589. 'dns_cluster' => $dns_cluster,
  590. 'v_dns_cluster' => $v_dns_cluster,
  591. 'db_hosts' => $db_hosts,
  592. 'mysql_hosts' => $v_mysql_hosts,
  593. 'mysql' => $mysql,
  594. 'pgsql_hosts' => $v_pgsql_hosts,
  595. 'pgsql' => $v_pgsql,
  596. 'protocols' => [ __('ftp'), __('sftp') ],
  597. 'backup_dir' => $v_backup_dir,
  598. 'backup_gzip' => $v_backup_gzip,
  599. 'backup_types' => $backup_types,
  600. 'backup' => $v_backup,
  601. 'remote_backup' => $v_remote_backup,
  602. 'backup_host' => $v_backup_host,
  603. 'backup_type' => $v_backup_type,
  604. 'backup_username' => $v_backup_username,
  605. 'backup_password' => $v_backup_password,
  606. 'backup_port' => $v_backup_port,
  607. 'backup_bpath' => $v_backup_bpath,
  608. 'ssl_domains' => $v_ssl_domains,
  609. 'sys_ssl_crt' => $v_sys_ssl_str['VESTA']['CRT'],
  610. 'sys_ssl_key' => $v_sys_ssl_str['VESTA']['KEY'],
  611. 'sys_ssl_ca' => $v_sys_ssl_str['VESTA']['CA'],
  612. 'sys_ssl_subject' => $v_sys_ssl_str['VESTA']['SUBJECT'],
  613. 'sys_ssl_aliases' => $v_sys_ssl_str['VESTA']['ALIASES'],
  614. 'sys_ssl_not_before' => $v_sys_ssl_str['VESTA']['NOT_BEFORE'],
  615. 'sys_ssl_not_after' => $v_sys_ssl_str['VESTA']['NOT_AFTER'],
  616. 'sys_ssl_signature' => $v_sys_ssl_str['VESTA']['SIGNATURE'],
  617. 'sys_ssl_pub_key' => $v_sys_ssl_str['VESTA']['PUB_KEY'],
  618. 'sys_ssl_issuer' => $v_sys_ssl_str['VESTA']['ISSUER'],
  619. 'mail_ssl_crt' => $v_mail_ssl_str['MAIL']['CRT'],
  620. 'mail_ssl_key' => $v_mail_ssl_str['MAIL']['KEY'],
  621. 'mail_ssl_ca' => $v_mail_ssl_str['MAIL']['CA'],
  622. 'mail_ssl_subject' => $v_mail_ssl_str['MAIL']['SUBJECT'],
  623. 'mail_ssl_aliases' => $v_mail_ssl_str['MAIL']['ALIASES'],
  624. 'mail_ssl_not_before' => $v_mail_ssl_str['MAIL']['NOT_BEFORE'],
  625. 'mail_ssl_not_after' => $v_mail_ssl_str['MAIL']['NOT_AFTER'],
  626. 'mail_ssl_signature' => $v_mail_ssl_str['MAIL']['SIGNATURE'],
  627. 'mail_ssl_pub_key' => $v_mail_ssl_str['MAIL']['PUB_KEY'],
  628. 'mail_ssl_issuer' => $v_mail_ssl_str['MAIL']['ISSUER'],
  629. 'error_msg' => $_SESSION['error_msg'],
  630. 'ok_msg' => $_SESSION['ok_msg']
  631. );
  632. echo json_encode($result);
  633. // Flush session messages
  634. unset($_SESSION['error_msg']);
  635. unset($_SESSION['ok_msg']);