index.php 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616
  1. <?php
  2. error_reporting(NULL);
  3. $TAB = 'SERVER';
  4. // Main include
  5. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  6. // Check user
  7. if ($_SESSION['user'] != 'admin') {
  8. header("Location: /list/user");
  9. exit;
  10. }
  11. // Get server hostname
  12. $v_hostname = exec('hostname');
  13. // List available timezones and get current one
  14. $v_timezones = list_timezones();
  15. exec (VESTA_CMD."v-get-sys-timezone", $output, $return_var);
  16. $v_timezone = $output[0];
  17. unset($output);
  18. if ($v_timezone == 'Etc/UTC' ) $v_timezone = 'UTC';
  19. if ($v_timezone == 'Pacific/Honolulu' ) $v_timezone = 'HAST';
  20. if ($v_timezone == 'US/Aleutian' ) $v_timezone = 'HADT';
  21. if ($v_timezone == 'Etc/GMT+9' ) $v_timezone = 'AKST';
  22. if ($v_timezone == 'America/Anchorage' ) $v_timezone = 'AKDT';
  23. if ($v_timezone == 'America/Dawson_Creek' ) $v_timezone = 'PST';
  24. if ($v_timezone == 'PST8PDT' ) $v_timezone = 'PDT';
  25. if ($v_timezone == 'MST7MDT' ) $v_timezone = 'MDT';
  26. if ($v_timezone == 'Canada/Saskatchewan' ) $v_timezone = 'CST';
  27. if ($v_timezone == 'CST6CDT' ) $v_timezone = 'CDT';
  28. if ($v_timezone == 'EST5EDT' ) $v_timezone = 'EDT';
  29. if ($v_timezone == 'America/Puerto_Rico' ) $v_timezone = 'AST';
  30. if ($v_timezone == 'America/Halifax' ) $v_timezone = 'ADT';
  31. // List supported languages
  32. exec (VESTA_CMD."v-list-sys-languages json", $output, $return_var);
  33. $languages = json_decode(implode('', $output), true);
  34. unset($output);
  35. // List dns cluster hosts
  36. exec (VESTA_CMD."v-list-remote-dns-hosts json", $output, $return_var);
  37. $dns_cluster = json_decode(implode('', $output), true);
  38. unset($output);
  39. foreach ($dns_cluster as $key => $value) {
  40. $v_dns_cluster = 'yes';
  41. }
  42. // List Database hosts
  43. exec (VESTA_CMD."v-list-database-hosts json", $output, $return_var);
  44. $db_hosts = json_decode(implode('', $output), true);
  45. unset($output);
  46. $v_mysql_hosts = array_values(array_filter($db_hosts, function($host){return $host['TYPE'] === 'mysql';}));
  47. $v_mysql = count($v_mysql_hosts) ? 'yes' : 'no';
  48. $v_pgsql_hosts = array_values(array_filter($db_hosts, function($host){return $host['TYPE'] === 'pgsql';}));
  49. $v_pgsql = count($v_pgsql_hosts) ? 'yes' : 'no';
  50. unset($db_hosts);
  51. // List backup settings
  52. $v_backup_dir = "/backup";
  53. if (!empty($_SESSION['BACKUP'])) $v_backup_dir = $_SESSION['BACKUP'];
  54. $v_backup_gzip = '5';
  55. if (!empty($_SESSION['BACKUP_GZIP'])) $v_backup_gzip = $_SESSION['BACKUP_GZIP'];
  56. $backup_types = explode(",",$_SESSION['BACKUP_SYSTEM']);
  57. foreach ($backup_types as $backup_type) {
  58. if ($backup_type == 'local') {
  59. $v_backup = 'yes';
  60. } else {
  61. exec (VESTA_CMD."v-list-backup-host ".$backup_type. " json", $output, $return_var);
  62. $v_remote_backup = json_decode(implode('', $output), true);
  63. unset($output);
  64. $v_backup_host = $v_remote_backup[$backup_type]['HOST'];
  65. $v_backup_type = $v_remote_backup[$backup_type]['TYPE'];
  66. $v_backup_username = $v_remote_backup[$backup_type]['USERNAME'];
  67. $v_backup_password = "";
  68. $v_backup_port = $v_remote_backup[$backup_type]['PORT'];
  69. $v_backup_bpath = $v_remote_backup[$backup_type]['BPATH'];
  70. }
  71. }
  72. // List ssl web domains
  73. exec (VESTA_CMD."v-search-ssl-certificates json", $output, $return_var);
  74. $v_ssl_domains = json_decode(implode('', $output), true);
  75. //$v_vesta_certificate
  76. unset($output);
  77. // List ssl certificate info
  78. exec (VESTA_CMD."v-list-sys-vesta-ssl json", $output, $return_var);
  79. $v_sys_ssl_str = json_decode(implode('', $output), true);
  80. unset($output);
  81. $v_sys_ssl_crt = $v_sys_ssl_str['VESTA']['CRT'];
  82. $v_sys_ssl_key = $v_sys_ssl_str['VESTA']['KEY'];
  83. $v_sys_ssl_ca = $v_sys_ssl_str['VESTA']['CA'];
  84. $v_sys_ssl_subject = $v_sys_ssl_str['VESTA']['SUBJECT'];
  85. $v_sys_ssl_aliases = $v_sys_ssl_str['VESTA']['ALIASES'];
  86. $v_sys_ssl_not_before = $v_sys_ssl_str['VESTA']['NOT_BEFORE'];
  87. $v_sys_ssl_not_after = $v_sys_ssl_str['VESTA']['NOT_AFTER'];
  88. $v_sys_ssl_signature = $v_sys_ssl_str['VESTA']['SIGNATURE'];
  89. $v_sys_ssl_pub_key = $v_sys_ssl_str['VESTA']['PUB_KEY'];
  90. $v_sys_ssl_issuer = $v_sys_ssl_str['VESTA']['ISSUER'];
  91. // List mail ssl certificate info
  92. if (!empty($_SESSION['VESTA_CERTIFICATE'])); {
  93. exec (VESTA_CMD."v-list-sys-mail-ssl json", $output, $return_var);
  94. $v_mail_ssl_str = json_decode(implode('', $output), true);
  95. unset($output);
  96. $v_mail_ssl_crt = $v_mail_ssl_str['MAIL']['CRT'];
  97. $v_mail_ssl_key = $v_mail_ssl_str['MAIL']['KEY'];
  98. $v_mail_ssl_ca = $v_mail_ssl_str['MAIL']['CA'];
  99. $v_mail_ssl_subject = $v_mail_ssl_str['MAIL']['SUBJECT'];
  100. $v_mail_ssl_aliases = $v_mail_ssl_str['MAIL']['ALIASES'];
  101. $v_mail_ssl_not_before = $v_mail_ssl_str['MAIL']['NOT_BEFORE'];
  102. $v_mail_ssl_not_after = $v_mail_ssl_str['MAIL']['NOT_AFTER'];
  103. $v_mail_ssl_signature = $v_mail_ssl_str['MAIL']['SIGNATURE'];
  104. $v_mail_ssl_pub_key = $v_mail_ssl_str['MAIL']['PUB_KEY'];
  105. $v_mail_ssl_issuer = $v_mail_ssl_str['MAIL']['ISSUER'];
  106. }
  107. // Check POST request
  108. if (!empty($_POST['save'])) {
  109. // Check token
  110. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  111. header('location: /login/');
  112. exit();
  113. }
  114. // Change hostname
  115. if ((!empty($_POST['v_hostname'])) && ($v_hostname != $_POST['v_hostname'])) {
  116. exec (VESTA_CMD."v-change-sys-hostname ".escapeshellarg($_POST['v_hostname']), $output, $return_var);
  117. check_return_code($return_var,$output);
  118. unset($output);
  119. $v_hostname = $_POST['v_hostname'];
  120. }
  121. // Change timezone
  122. if (empty($_SESSION['error_msg'])) {
  123. if (!empty($_POST['v_timezone'])) {
  124. $v_tz = $_POST['v_timezone'];
  125. if ($v_tz == 'UTC' ) $v_tz = 'Etc/UTC';
  126. if ($v_tz == 'HAST' ) $v_tz = 'Pacific/Honolulu';
  127. if ($v_tz == 'HADT' ) $v_tz = 'US/Aleutian';
  128. if ($v_tz == 'AKST' ) $v_tz = 'Etc/GMT+9';
  129. if ($v_tz == 'AKDT' ) $v_tz = 'America/Anchorage';
  130. if ($v_tz == 'PST' ) $v_tz = 'America/Dawson_Creek';
  131. if ($v_tz == 'PDT' ) $v_tz = 'PST8PDT';
  132. if ($v_tz == 'MDT' ) $v_tz = 'MST7MDT';
  133. if ($v_tz == 'CST' ) $v_tz = 'Canada/Saskatchewan';
  134. if ($v_tz == 'CDT' ) $v_tz = 'CST6CDT';
  135. if ($v_tz == 'EDT' ) $v_tz = 'EST5EDT';
  136. if ($v_tz == 'AST' ) $v_tz = 'America/Puerto_Rico';
  137. if ($v_tz == 'ADT' ) $v_tz = 'America/Halifax';
  138. if ($v_timezone != $v_tz) {
  139. exec (VESTA_CMD."v-change-sys-timezone ".escapeshellarg($v_tz), $output, $return_var);
  140. check_return_code($return_var,$output);
  141. $v_timezone = $v_tz;
  142. unset($output);
  143. }
  144. }
  145. }
  146. // Change default language
  147. if (empty($_SESSION['error_msg'])) {
  148. if ((!empty($_POST['v_language'])) && ($_SESSION['LANGUAGE'] != $_POST['v_language'])) {
  149. exec (VESTA_CMD."v-change-sys-language ".escapeshellarg($_POST['v_language']), $output, $return_var);
  150. check_return_code($return_var,$output);
  151. unset($output);
  152. if (empty($_SESSION['error_msg'])) $_SESSION['LANGUAGE'] = $_POST['v_language'];
  153. }
  154. }
  155. // Set disk_quota support
  156. if (empty($_SESSION['error_msg'])) {
  157. if ((!empty($_POST['v_quota'])) && ($_SESSION['DISK_QUOTA'] != $_POST['v_quota'])) {
  158. if($_POST['v_quota'] == 'yes') {
  159. exec (VESTA_CMD."v-add-sys-quota", $output, $return_var);
  160. check_return_code($return_var,$output);
  161. unset($output);
  162. if (empty($_SESSION['error_msg'])) $_SESSION['DISK_QUOTA'] = 'yes';
  163. } else {
  164. exec (VESTA_CMD."v-delete-sys-quota", $output, $return_var);
  165. check_return_code($return_var,$output);
  166. unset($output);
  167. if (empty($_SESSION['error_msg'])) $_SESSION['DISK_QUOTA'] = 'no';
  168. }
  169. }
  170. }
  171. // Set firewall support
  172. if (empty($_SESSION['error_msg'])) {
  173. if ($_SESSION['FIREWALL_SYSTEM'] == 'iptables') $v_firewall = 'yes';
  174. if ($_SESSION['FIREWALL_SYSTEM'] != 'iptables') $v_firewall = 'no';
  175. if ((!empty($_POST['v_firewall'])) && ($v_firewall != $_POST['v_firewall'])) {
  176. if($_POST['v_firewall'] == 'yes') {
  177. exec (VESTA_CMD."v-add-sys-firewall", $output, $return_var);
  178. check_return_code($return_var,$output);
  179. unset($output);
  180. if (empty($_SESSION['error_msg'])) $_SESSION['FIREWALL_SYSTEM'] = 'iptables';
  181. } else {
  182. exec (VESTA_CMD."v-delete-sys-firewall", $output, $return_var);
  183. check_return_code($return_var,$output);
  184. unset($output);
  185. if (empty($_SESSION['error_msg'])) $_SESSION['FIREWALL_SYSTEM'] = '';
  186. }
  187. }
  188. }
  189. // Update mysql pasword
  190. if (empty($_SESSION['error_msg'])) {
  191. if (!empty($_POST['v_mysql_password'])) {
  192. exec (VESTA_CMD."v-change-database-host-password mysql localhost root ".escapeshellarg($_POST['v_mysql_password']), $output, $return_var);
  193. check_return_code($return_var,$output);
  194. unset($output);
  195. $v_db_adv = 'yes';
  196. }
  197. }
  198. // Delete Mail Domain SSL certificate
  199. if ((!isset($_POST['v_mail_ssl_domain_checkbox'])) && (!empty($_SESSION['MAIL_CERTIFICATE'])) && (empty($_SESSION['error_msg']))) {
  200. unset($_SESSION['MAIL_CERTIFICATE']);
  201. exec (VESTA_CMD."v-delete-sys-mail-ssl", $output, $return_var);
  202. check_return_code($return_var,$output);
  203. unset($output);
  204. }
  205. // Updating Mail Domain SSL certificate
  206. if ((isset($_POST['v_mail_ssl_domain_checkbox'])) && (isset($_POST['v_mail_ssl_domain'])) && (empty($_SESSION['error_msg']))) {
  207. if ((!empty($_POST['v_mail_ssl_domain'])) && ($_POST['v_mail_ssl_domain'] != $_SESSION['MAIL_CERTIFICATE'])) {
  208. $v_mail_ssl_str = explode(":", $_POST['v_mail_ssl_domain']);
  209. $v_mail_ssl_user = escapeshellarg($v_mail_ssl_str[0]);
  210. $v_mail_ssl_domain = escapeshellarg($v_mail_ssl_str[1]);
  211. exec (VESTA_CMD."v-add-sys-mail-ssl ".$v_mail_ssl_user." ".$v_mail_ssl_domain, $output, $return_var);
  212. check_return_code($return_var,$output);
  213. unset($output);
  214. unset($v_mail_ssl_str);
  215. if (empty($_SESSION['error_msg'])) {
  216. $_SESSION['MAIL_CERTIFICATE'] = $_POST['v_mail_ssl_domain'];
  217. // List SSL certificate info
  218. exec (VESTA_CMD."v-list-sys-mail-ssl json", $output, $return_var);
  219. $v_mail_ssl_str = json_decode(implode('', $output), true);
  220. unset($output);
  221. $v_mail_ssl_crt = $v_mail_ssl_str['MAIL']['CRT'];
  222. $v_mail_ssl_key = $v_mail_ssl_str['MAIL']['KEY'];
  223. $v_mail_ssl_ca = $v_mail_ssl_str['MAIL']['CA'];
  224. $v_mail_ssl_subject = $v_mail_ssl_str['MAIL']['SUBJECT'];
  225. $v_mail_ssl_aliases = $v_mail_ssl_str['MAIL']['ALIASES'];
  226. $v_mail_ssl_not_before = $v_mail_ssl_str['MAIL']['NOT_BEFORE'];
  227. $v_mail_ssl_not_after = $v_mail_ssl_str['MAIL']['NOT_AFTER'];
  228. $v_mail_ssl_signature = $v_mail_ssl_str['MAIL']['SIGNATURE'];
  229. $v_mail_ssl_pub_key = $v_mail_ssl_str['MAIL']['PUB_KEY'];
  230. $v_mail_ssl_issuer = $v_mail_ssl_str['MAIL']['ISSUER'];
  231. }
  232. }
  233. }
  234. // Update webmail url
  235. if (empty($_SESSION['error_msg'])) {
  236. if ($_POST['v_mail_url'] != $_SESSION['MAIL_URL']) {
  237. exec (VESTA_CMD."v-change-sys-config-value MAIL_URL ".escapeshellarg($_POST['v_mail_url']), $output, $return_var);
  238. check_return_code($return_var,$output);
  239. unset($output);
  240. $v_mail_adv = 'yes';
  241. }
  242. }
  243. // Update phpMyAdmin url
  244. if (empty($_SESSION['error_msg'])) {
  245. if ($_POST['v_mysql_url'] != $_SESSION['DB_PMA_URL']) {
  246. exec (VESTA_CMD."v-change-sys-config-value DB_PMA_URL ".escapeshellarg($_POST['v_mysql_url']), $output, $return_var);
  247. check_return_code($return_var,$output);
  248. unset($output);
  249. $v_db_adv = 'yes';
  250. }
  251. }
  252. // Update phpPgAdmin url
  253. if (empty($_SESSION['error_msg'])) {
  254. if ($_POST['v_pgsql_url'] != $_SESSION['DB_PGA_URL']) {
  255. exec (VESTA_CMD."v-change-sys-config-value DB_PGA_URL ".escapeshellarg($_POST['v_pgsql_url']), $output, $return_var);
  256. check_return_code($return_var,$output);
  257. unset($output);
  258. $v_db_adv = 'yes';
  259. }
  260. }
  261. // Disable local backup
  262. if (empty($_SESSION['error_msg'])) {
  263. if (($_POST['v_backup'] == 'no') && ($v_backup == 'yes' )) {
  264. exec (VESTA_CMD."v-delete-backup-host local", $output, $return_var);
  265. check_return_code($return_var,$output);
  266. unset($output);
  267. if (empty($_SESSION['error_msg'])) $v_backup = 'no';
  268. $v_backup_adv = 'yes';
  269. }
  270. }
  271. // Enable local backups
  272. if (empty($_SESSION['error_msg'])) {
  273. if (($_POST['v_backup'] == 'yes') && ($v_backup != 'yes' )) {
  274. exec (VESTA_CMD."v-add-backup-host local", $output, $return_var);
  275. check_return_code($return_var,$output);
  276. unset($output);
  277. if (empty($_SESSION['error_msg'])) $v_backup = 'yes';
  278. $v_backup_adv = 'yes';
  279. }
  280. }
  281. // Change backup gzip level
  282. if (empty($_SESSION['error_msg'])) {
  283. if ($_POST['v_backup_gzip'] != $v_backup_gzip ) {
  284. exec (VESTA_CMD."v-change-sys-config-value BACKUP_GZIP ".escapeshellarg($_POST['v_backup_gzip']), $output, $return_var);
  285. check_return_code($return_var,$output);
  286. unset($output);
  287. if (empty($_SESSION['error_msg'])) $v_backup_gzip = $_POST['v_backup_gzip'];
  288. $v_backup_adv = 'yes';
  289. }
  290. }
  291. // Change backup path
  292. if (empty($_SESSION['error_msg'])) {
  293. if ($_POST['v_backup_dir'] != $v_backup_dir ) {
  294. exec (VESTA_CMD."v-change-sys-config-value BACKUP ".escapeshellarg($_POST['v_backup_dir']), $output, $return_var);
  295. check_return_code($return_var,$output);
  296. unset($output);
  297. if (empty($_SESSION['error_msg'])) $v_backup_dir = $_POST['v_backup_dir'];
  298. $v_backup_adv = 'yes';
  299. }
  300. }
  301. // Add remote backup host
  302. if (empty($_SESSION['error_msg'])) {
  303. if ((!empty($_POST['v_backup_host'])) && (empty($v_backup_host))) {
  304. $v_backup_host = escapeshellarg($_POST['v_backup_host']);
  305. $v_backup_type = escapeshellarg($_POST['v_backup_type']);
  306. $v_backup_username = escapeshellarg($_POST['v_backup_username']);
  307. $v_backup_password = escapeshellarg($_POST['v_backup_password']);
  308. $v_backup_bpath = escapeshellarg($_POST['v_backup_bpath']);
  309. exec (VESTA_CMD."v-add-backup-host ".$v_backup_type." ".$v_backup_host ." ".$v_backup_username." ".$v_backup_password." ".$v_backup_bpath, $output, $return_var);
  310. check_return_code($return_var,$output);
  311. unset($output);
  312. if (empty($_SESSION['error_msg'])) $v_backup_host = $_POST['v_backup_host'];
  313. if (empty($_SESSION['error_msg'])) $v_backup_type = $_POST['v_backup_type'];
  314. if (empty($_SESSION['error_msg'])) $v_backup_username = $_POST['v_backup_username'];
  315. if (empty($_SESSION['error_msg'])) $v_backup_password = $_POST['v_backup_password'];
  316. if (empty($_SESSION['error_msg'])) $v_backup_bpath = $_POST['v_backup_bpath'];
  317. $v_backup_new = 'yes';
  318. $v_backup_adv = 'yes';
  319. $v_backup_remote_adv = 'yes';
  320. }
  321. }
  322. // Change remote backup host type
  323. if (empty($_SESSION['error_msg'])) {
  324. if ((!empty($_POST['v_backup_host'])) && ($_POST['v_backup_type'] != $v_backup_type)) {
  325. exec (VESTA_CMD."v-delete-backup-host ". $v_backup_type, $output, $return_var);
  326. unset($output);
  327. $v_backup_host = escapeshellarg($_POST['v_backup_host']);
  328. $v_backup_type = escapeshellarg($_POST['v_backup_type']);
  329. $v_backup_username = escapeshellarg($_POST['v_backup_username']);
  330. $v_backup_password = escapeshellarg($_POST['v_backup_password']);
  331. $v_backup_bpath = escapeshellarg($_POST['v_backup_bpath']);
  332. exec (VESTA_CMD."v-add-backup-host ".$v_backup_type." ".$v_backup_host." ".$v_backup_username." ".$v_backup_password." ".$v_backup_bpath, $output, $return_var);
  333. check_return_code($return_var,$output);
  334. unset($output);
  335. if (empty($_SESSION['error_msg'])) $v_backup_host = $_POST['v_backup_host'];
  336. if (empty($_SESSION['error_msg'])) $v_backup_type = $_POST['v_backup_type'];
  337. if (empty($_SESSION['error_msg'])) $v_backup_username = $_POST['v_backup_username'];
  338. if (empty($_SESSION['error_msg'])) $v_backup_password = $_POST['v_backup_password'];
  339. if (empty($_SESSION['error_msg'])) $v_backup_bpath = $_POST['v_backup_bpath'];
  340. $v_backup_adv = 'yes';
  341. $v_backup_remote_adv = 'yes';
  342. }
  343. }
  344. // Change remote backup host
  345. if (empty($_SESSION['error_msg'])) {
  346. if ((!empty($_POST['v_backup_host'])) && ($_POST['v_backup_type'] == $v_backup_type) && (!isset($v_backup_new))) {
  347. if (($_POST['v_backup_host'] != $v_backup_host) || ($_POST['v_backup_username'] != $v_backup_username) || ($_POST['v_backup_password'] != $v_backup_password) || ($_POST['v_backup_bpath'] != $v_backup_bpath)){
  348. $v_backup_host = escapeshellarg($_POST['v_backup_host']);
  349. $v_backup_type = escapeshellarg($_POST['v_backup_type']);
  350. $v_backup_username = escapeshellarg($_POST['v_backup_username']);
  351. $v_backup_password = escapeshellarg($_POST['v_backup_password']);
  352. $v_backup_bpath = escapeshellarg($_POST['v_backup_bpath']);
  353. exec (VESTA_CMD."v-add-backup-host ".$v_backup_type." ".$v_backup_host." ".$v_backup_username." ".$v_backup_password." ".$v_backup_bpath, $output, $return_var);
  354. check_return_code($return_var,$output);
  355. unset($output);
  356. if (empty($_SESSION['error_msg'])) $v_backup_host = $_POST['v_backup_host'];
  357. if (empty($_SESSION['error_msg'])) $v_backup_type = $_POST['v_backup_type'];
  358. if (empty($_SESSION['error_msg'])) $v_backup_username = $_POST['v_backup_username'];
  359. if (empty($_SESSION['error_msg'])) $v_backup_password = $_POST['v_backup_password'];
  360. if (empty($_SESSION['error_msg'])) $v_backup_bpath = $_POST['v_backup_bpath'];
  361. $v_backup_adv = 'yes';
  362. $v_backup_remote_adv = 'yes';
  363. }
  364. }
  365. }
  366. // Delete remote backup host
  367. if (empty($_SESSION['error_msg'])) {
  368. if ((empty($_POST['v_backup_host'])) && (!empty($v_backup_host))) {
  369. exec (VESTA_CMD."v-delete-backup-host ". $v_backup_type, $output, $return_var);
  370. check_return_code($return_var,$output);
  371. unset($output);
  372. if (empty($_SESSION['error_msg'])) $v_backup_host = '';
  373. if (empty($_SESSION['error_msg'])) $v_backup_type = '';
  374. if (empty($_SESSION['error_msg'])) $v_backup_username = '';
  375. if (empty($_SESSION['error_msg'])) $v_backup_password = '';
  376. if (empty($_SESSION['error_msg'])) $v_backup_bpath = '';
  377. $v_backup_adv = '';
  378. $v_backup_remote_adv = '';
  379. }
  380. }
  381. // Delete WEB Domain SSL certificate
  382. if ((!isset($_POST['v_web_ssl_domain_checkbox'])) && (!empty($_SESSION['VESTA_CERTIFICATE'])) && (empty($_SESSION['error_msg']))) {
  383. unset($_SESSION['VESTA_CERTIFICATE']);
  384. exec (VESTA_CMD."v-delete-sys-vesta-ssl", $output, $return_var);
  385. check_return_code($return_var,$output);
  386. unset($output);
  387. }
  388. // Updating WEB Domain SSL certificate
  389. if ((isset($_POST['v_web_ssl_domain_checkbox'])) && (isset($_POST['v_web_ssl_domain'])) && (empty($_SESSION['error_msg']))) {
  390. if ((!empty($_POST['v_web_ssl_domain'])) && ($_POST['v_web_ssl_domain'] != $_SESSION['VESTA_CERTIFICATE'])) {
  391. $v_web_ssl_str = explode(":", $_POST['v_web_ssl_domain']);
  392. $v_web_ssl_user = escapeshellarg($v_web_ssl_str[0]);
  393. $v_web_ssl_domain = escapeshellarg($v_web_ssl_str[1]);
  394. exec (VESTA_CMD."v-add-sys-vesta-ssl ".$v_web_ssl_user." ".$v_web_ssl_domain, $output, $return_var);
  395. check_return_code($return_var,$output);
  396. unset($output);
  397. if (empty($_SESSION['error_msg'])) {
  398. $_SESSION['VESTA_CERTIFICATE'] = $_POST['v_web_ssl_domain'];
  399. // List SSL certificate info
  400. exec (VESTA_CMD."v-list-sys-vesta-ssl json", $output, $return_var);
  401. $v_sys_ssl_str = json_decode(implode('', $output), true);
  402. unset($output);
  403. $v_sys_ssl_crt = $v_sys_ssl_str['VESTA']['CRT'];
  404. $v_sys_ssl_key = $v_sys_ssl_str['VESTA']['KEY'];
  405. $v_sys_ssl_ca = $v_sys_ssl_str['VESTA']['CA'];
  406. $v_sys_ssl_subject = $v_sys_ssl_str['VESTA']['SUBJECT'];
  407. $v_sys_ssl_aliases = $v_sys_ssl_str['VESTA']['ALIASES'];
  408. $v_sys_ssl_not_before = $v_sys_ssl_str['VESTA']['NOT_BEFORE'];
  409. $v_sys_ssl_not_after = $v_sys_ssl_str['VESTA']['NOT_AFTER'];
  410. $v_sys_ssl_signature = $v_sys_ssl_str['VESTA']['SIGNATURE'];
  411. $v_sys_ssl_pub_key = $v_sys_ssl_str['VESTA']['PUB_KEY'];
  412. $v_sys_ssl_issuer = $v_sys_ssl_str['VESTA']['ISSUER'];
  413. }
  414. }
  415. }
  416. // Update SSL certificate
  417. if ((!empty($_POST['v_sys_ssl_crt'])) && (empty($_POST['v_web_ssl_domain'])) && (empty($_SESSION['error_msg']))) {
  418. if (($v_sys_ssl_crt != str_replace("\r\n", "\n", $_POST['v_sys_ssl_crt'])) || ($v_sys_ssl_key != str_replace("\r\n", "\n", $_POST['v_sys_ssl_key']))) {
  419. exec ('mktemp -d', $mktemp_output, $return_var);
  420. $tmpdir = $mktemp_output[0];
  421. // Certificate
  422. if (!empty($_POST['v_sys_ssl_crt'])) {
  423. $fp = fopen($tmpdir."/certificate.crt", 'w');
  424. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_sys_ssl_crt']));
  425. fwrite($fp, "\n");
  426. fclose($fp);
  427. }
  428. // Key
  429. if (!empty($_POST['v_sys_ssl_key'])) {
  430. $fp = fopen($tmpdir."/certificate.key", 'w');
  431. fwrite($fp, str_replace("\r\n", "\n", $_POST['v_sys_ssl_key']));
  432. fwrite($fp, "\n");
  433. fclose($fp);
  434. }
  435. exec (VESTA_CMD."v-change-sys-vesta-ssl ".$tmpdir, $output, $return_var);
  436. check_return_code($return_var,$output);
  437. unset($output);
  438. if (empty($_SESSION['error_msg'])) {
  439. // List ssl certificate info
  440. exec (VESTA_CMD."v-list-sys-vesta-ssl json", $output, $return_var);
  441. $v_sys_ssl_str = json_decode(implode('', $output), true);
  442. unset($output);
  443. $v_sys_ssl_crt = $v_sys_ssl_str['VESTA']['CRT'];
  444. $v_sys_ssl_key = $v_sys_ssl_str['VESTA']['KEY'];
  445. $v_sys_ssl_ca = $v_sys_ssl_str['VESTA']['CA'];
  446. $v_sys_ssl_subject = $v_sys_ssl_str['VESTA']['SUBJECT'];
  447. $v_sys_ssl_aliases = $v_sys_ssl_str['VESTA']['ALIASES'];
  448. $v_sys_ssl_not_before = $v_sys_ssl_str['VESTA']['NOT_BEFORE'];
  449. $v_sys_ssl_not_after = $v_sys_ssl_str['VESTA']['NOT_AFTER'];
  450. $v_sys_ssl_signature = $v_sys_ssl_str['VESTA']['SIGNATURE'];
  451. $v_sys_ssl_pub_key = $v_sys_ssl_str['VESTA']['PUB_KEY'];
  452. $v_sys_ssl_issuer = $v_sys_ssl_str['VESTA']['ISSUER'];
  453. }
  454. }
  455. }
  456. // Flush field values on success
  457. if (empty($_SESSION['error_msg'])) {
  458. $_SESSION['ok_msg'] = __('Changes has been saved.');
  459. }
  460. // activating sftp licence
  461. if (empty($_SESSION['error_msg'])) {
  462. if($_SESSION['SFTPJAIL_KEY'] != $_POST['v_sftp_licence'] && $_POST['v_sftp'] == 'yes'){
  463. $module = 'sftpjail';
  464. $licence_key = escapeshellarg($_POST['v_sftp_licence']);
  465. exec (VESTA_CMD."v-activate-vesta-license ".$module." ".$licence_key, $output, $return_var);
  466. check_return_code($return_var,$output);
  467. unset($output);
  468. if (empty($_SESSION['error_msg'])) {
  469. $_SESSION['ok_msg'] = __('Licence Activated');
  470. $_SESSION['SFTPJAIL_KEY'] = $_POST['v_sftp_licence'];
  471. }
  472. }
  473. }
  474. // cancel sftp licence
  475. if (empty($_SESSION['error_msg'])) {
  476. if($_POST['v_sftp'] == 'cancel' && $_SESSION['SFTPJAIL_KEY']){
  477. $module = 'sftpjail';
  478. $licence_key = escapeshellarg($_SESSION['SFTPJAIL_KEY']);
  479. exec (VESTA_CMD."v-deactivate-vesta-license ".$module." ".$licence_key, $output, $return_var);
  480. check_return_code($return_var,$output);
  481. unset($output);
  482. if (empty($_SESSION['error_msg'])) {
  483. $_SESSION['ok_msg'] = __('Licence Deactivated');
  484. unset($_SESSION['SFTPJAIL_KEY']);
  485. }
  486. }
  487. }
  488. // activating filemanager licence
  489. if (empty($_SESSION['error_msg'])) {
  490. if($_SESSION['FILEMANAGER_KEY'] != $_POST['v_filemanager_licence'] && $_POST['v_filemanager'] == 'yes'){
  491. $module = 'filemanager';
  492. $licence_key = escapeshellarg($_POST['v_filemanager_licence']);
  493. exec (VESTA_CMD."v-activate-vesta-license ".$module." ".$licence_key, $output, $return_var);
  494. check_return_code($return_var,$output);
  495. unset($output);
  496. if (empty($_SESSION['error_msg'])) {
  497. $_SESSION['ok_msg'] = __('Licence Activated');
  498. $_SESSION['FILEMANAGER_KEY'] = $_POST['v_filemanager_licence'];
  499. }
  500. }
  501. }
  502. // cancel filemanager licence
  503. if (empty($_SESSION['error_msg'])) {
  504. if($_POST['v_filemanager'] == 'cancel' && $_SESSION['FILEMANAGER_KEY']){
  505. $module = 'filemanager';
  506. $licence_key = escapeshellarg($_SESSION['FILEMANAGER_KEY']);
  507. exec (VESTA_CMD."v-deactivate-vesta-license ".$module." ".$licence_key, $output, $return_var);
  508. check_return_code($return_var,$output);
  509. unset($output);
  510. if (empty($_SESSION['error_msg'])) {
  511. $_SESSION['ok_msg'] = __('Licence Deactivated');
  512. unset($_SESSION['FILEMANAGER_KEY']);
  513. }
  514. }
  515. }
  516. // activating softaculous
  517. if (empty($_SESSION['error_msg'])) {
  518. if($_SESSION['SOFTACULOUS'] != $_POST['v_softaculous'] && $_POST['v_softaculous'] == 'yes'){
  519. exec (VESTA_CMD."v-add-vesta-softaculous WEB", $output, $return_var);
  520. check_return_code($return_var,$output);
  521. unset($output);
  522. if (empty($_SESSION['error_msg'])) {
  523. $_SESSION['ok_msg'] = __('Softaculous Activated');
  524. $_SESSION['SOFTACULOUS'] = 'yes';
  525. }
  526. }
  527. }
  528. // disable softaculous
  529. if (empty($_SESSION['error_msg'])) {
  530. if($_SESSION['SOFTACULOUS'] != $_POST['v_softaculous'] && $_POST['v_softaculous'] == 'no'){
  531. exec (VESTA_CMD."v-delete-vesta-softaculous", $output, $return_var);
  532. check_return_code($return_var,$output);
  533. unset($output);
  534. if (empty($_SESSION['error_msg'])) {
  535. $_SESSION['ok_msg'] = __('Softaculous Disabled');
  536. $_SESSION['SOFTACULOUS'] = '';
  537. }
  538. }
  539. }
  540. }
  541. // Check system configuration
  542. exec (VESTA_CMD . "v-list-sys-config json", $output, $return_var);
  543. $data = json_decode(implode('', $output), true);
  544. unset($output);
  545. $sys_arr = $data['config'];
  546. foreach ($sys_arr as $key => $value) {
  547. $_SESSION[$key] = $value;
  548. }
  549. // Render page
  550. render_page($user, $TAB, 'edit_server');
  551. // Flush session messages
  552. unset($_SESSION['error_msg']);
  553. unset($_SESSION['ok_msg']);