index.php 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178
  1. <?php
  2. define('NO_AUTH_REQUIRED',true);
  3. header('Content-Type: application/json');
  4. // Main include
  5. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  6. $TAB = 'LOGIN';
  7. // Logout
  8. if (isset($_GET['logout'])) {
  9. session_destroy();
  10. }
  11. // Login as someone else
  12. if (isset($_SESSION['user'])) {
  13. if ((!isset($_GET['token'])) || ($_SESSION['token'] != $_GET['token'])) {
  14. session_destroy();
  15. session_start();
  16. exit();
  17. }
  18. if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
  19. exec (VESTA_CMD . "v-list-user ".escapeshellarg($_GET['loginas'])." json", $output, $return_var);
  20. if ( $return_var == 0 ) {
  21. $users = json_decode(implode('', $output), true);
  22. reset($users);
  23. $_SESSION['look'] = key($users);
  24. $_SESSION['look_alert'] = 'yes';
  25. }
  26. } else {
  27. $v_user = empty($_SESSION['look']) ? $_SESSION['user'] : $_SESSION['look'];
  28. exec (VESTA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  29. $users = json_decode(implode('', $output), true);
  30. }
  31. }
  32. // Basic auth
  33. if (isset($_POST['user']) && isset($_POST['password'])) {
  34. if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
  35. $v_user = escapeshellarg($_POST['user']);
  36. $v_ip = escapeshellarg($_SERVER['REMOTE_ADDR']);
  37. if($_POST['user'] == 'root'){
  38. unset($_POST['password']);
  39. unset($_POST['user']);
  40. $error = __('Login with root has been disabled');
  41. } else {
  42. // Get user's salt
  43. $output = '';
  44. exec (VESTA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
  45. $pam = json_decode(implode('', $output), true);
  46. if ( $return_var > 0 ) {
  47. $error = __('Invalid username or password');
  48. } else {
  49. $user = $_POST['user'];
  50. $password = $_POST['password'];
  51. $salt = $pam[$user]['SALT'];
  52. $method = $pam[$user]['METHOD'];
  53. if ($method == 'md5' ) {
  54. $hash = crypt($password, '$1$'.$salt.'$');
  55. }
  56. if ($method == 'sha-512' ) {
  57. $hash = crypt($password, '$6$rounds=5000$'.$salt.'$');
  58. $hash = str_replace('$rounds=5000','',$hash);
  59. }
  60. if ($method == 'des' ) {
  61. $hash = crypt($password, $salt);
  62. }
  63. // Send hash via tmp file
  64. $v_hash = exec('mktemp -p /tmp');
  65. $fp = fopen($v_hash, "w");
  66. fwrite($fp, $hash."\n");
  67. fclose($fp);
  68. // Check user hash
  69. exec(VESTA_CMD ."v-check-user-hash ".$v_user." ".$v_hash." ".$v_ip, $output, $return_var);
  70. unset($output);
  71. // Remove tmp file
  72. unlink($v_hash);
  73. // Check API answer
  74. if ( $return_var > 0 ) {
  75. $error = __('Invalid username or password');
  76. } else {
  77. // Make root admin user
  78. // if ($_POST['user'] == 'root') $v_user = 'admin';
  79. // Get user speciefic parameters
  80. exec (VESTA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  81. $users = json_decode(implode('', $output), true);
  82. // Define session user
  83. $_SESSION['user'] = key($users);
  84. $v_user = $_SESSION['user'];
  85. $_SESSION['root_dir'] = $users[$v_user]['HOME'];
  86. // Get user favorites
  87. get_favourites();
  88. // Define language
  89. $output = '';
  90. exec (VESTA_CMD."v-list-sys-languages json", $output, $return_var);
  91. $languages = json_decode(implode('', $output), true);
  92. if (in_array($users[$v_user]['LANGUAGE'], $languages)){
  93. $_SESSION['language'] = $users[$v_user]['LANGUAGE'];
  94. } else {
  95. $_SESSION['language'] = 'en';
  96. }
  97. // Regenerate session id to prevent session fixation
  98. session_regenerate_id(true);
  99. }
  100. }
  101. }
  102. } else {
  103. $error = __('Invalid or missing token');
  104. }
  105. }
  106. // Check system configuration
  107. exec (VESTA_CMD . "v-list-sys-config json", $output, $return_var);
  108. $data = json_decode(implode('', $output), true);
  109. $sys_arr = $data['config'];
  110. foreach ($sys_arr as $key => $value) {
  111. $_SESSION[$key] = $value;
  112. }
  113. // Detect language
  114. if (empty($_SESSION['language'])) {
  115. $output = '';
  116. exec (VESTA_CMD."v-list-sys-config json", $output, $return_var);
  117. $config = json_decode(implode('', $output), true);
  118. $lang = $config['config']['LANGUAGE'];
  119. $output = '';
  120. exec (VESTA_CMD."v-list-sys-languages json", $output, $return_var);
  121. $languages = json_decode(implode('', $output), true);
  122. if(in_array($lang, $languages)){
  123. $_SESSION['language'] = $lang;
  124. }
  125. else {
  126. $_SESSION['language'] = 'en';
  127. }
  128. }
  129. if (empty($_SESSION['token'])) {
  130. // Generate CSRF token
  131. $token = bin2hex(file_get_contents('/dev/urandom', false, null, 0, 16));
  132. $_SESSION['token'] = $token;
  133. }
  134. require_once($_SERVER['DOCUMENT_ROOT'].'/inc/i18n/'.$_SESSION['language'].'.php');
  135. $v_user = empty($_SESSION['look']) ? $_SESSION['user'] : $_SESSION['look'];
  136. top_panel($v_user, $TAB);
  137. $panel[$v_user]['U_BANDWIDTH_MEASURE'] = humanize_usage_measure($panel[$v_user]['U_BANDWIDTH']);
  138. $panel[$v_user]['U_BANDWIDTH'] = humanize_usage_size($panel[$v_user]['U_BANDWIDTH']);
  139. $panel[$v_user]['U_DISK_MEASURE'] = humanize_usage_measure($panel[$v_user]['U_DISK']);
  140. $panel[$v_user]['U_DISK'] = humanize_usage_size($panel[$v_user]['U_DISK']);
  141. $result = array(
  142. 'token' => $_SESSION['token'],
  143. 'panel' => $panel,
  144. 'data' => $users[$v_user],
  145. 'user' => $v_user,
  146. 'session' => $_SESSION,
  147. 'i18n' => $LANG[$_SESSION['language']],
  148. 'error' => $error,
  149. );
  150. echo json_encode($result);