diff --git a/htdocs/index.php b/htdocs/index.php index 8e951b3..c2f5ff0 100755 --- a/htdocs/index.php +++ b/htdocs/index.php @@ -58,19 +58,19 @@ if (!array_key_exists('auth', $_SESSION) || $_SESSION['auth']!=1) { if (in_array(htmlspecialchars(basename($_SERVER['REDIRECT_URL'])), $_SESSION['non_standard'])) http_redirect('/webadmin'); - if (preg_match('#^/webadmin/servername/(.*)/?$#', $uri, $params)) { + if (preg_match('#^/webadmin/(.*)/domain/?(edit)?/?(.*)?/$#', $uri, $params)) { include_once EVOADMIN_BASE . '../inc/webadmin-servername.php'; - } elseif (preg_match('#^/webadmin/itk/(.*)/?$#', $uri, $params)) { + } elseif (preg_match('#^/webadmin/(.*)/itk/?(enable|disable)?/?(.*)?/$#', $uri, $params)) { include_once EVOADMIN_BASE . '../inc/webadmin-itk.php'; - } elseif (preg_match('#^/webadmin/php/(.*)/?$#', $uri, $params)) { + } elseif (preg_match('#^/webadmin/(.*)/php/$#', $uri, $params)) { include_once EVOADMIN_BASE . '../inc/webadmin-php.php'; - } elseif (preg_match('#^/webadmin/edit/(.*)/?$#', $uri, $params)) { + } elseif (preg_match('#^/webadmin/(.*)/alias/?(add|delete)?/?(.*)?/$#', $uri, $params)) { include_once EVOADMIN_BASE . '../inc/webadmin-edit.php'; diff --git a/inc/webadmin-itk.php b/inc/webadmin-itk.php index d47a972..44a106d 100644 --- a/inc/webadmin-itk.php +++ b/inc/webadmin-itk.php @@ -18,28 +18,9 @@ require_once EVOADMIN_BASE . '../lib/domain.php'; global $conf; -if (isset($_GET['enable']) ) { - require_once EVOADMIN_BASE . '../evolibs/Form.php'; +if (isset($params[2]) && $params[2] != "") { - include_once EVOADMIN_BASE . '../tpl/header.tpl.php'; - include_once EVOADMIN_BASE . '../tpl/menu.tpl.php'; - - $servername = array ( - 'domain' => htmlspecialchars(basename($_SERVER['REDIRECT_URL'])), - ); - - $enable_cmd = 'web-add.sh enable-user-itk ' . $servername['domain']; - - if (isset($params[3]) && $params[3] == "") http_redirect($redirect_url); - - if ($enable_cmd_return == 0) { - print 'Sécurité ITK activée.'; - printf ('
', $_SERVER['REDIRECT_URL']); - } - - include_once EVOADMIN_BASE . '../tpl/footer.tpl.php'; - -} elseif (isset($_GET['disable']) ) { + $redirect_url = "/webadmin/" . $params[1] . "/itk/"; require_once EVOADMIN_BASE . '../evolibs/Form.php'; @@ -47,23 +28,31 @@ if (isset($_GET['enable']) ) { include_once EVOADMIN_BASE . '../tpl/menu.tpl.php'; $servername = array ( - 'domain' => htmlspecialchars(basename($_SERVER['REDIRECT_URL'])), + 'domain' => $params[1], ); - $disable_cmd = 'web-add.sh disable-user-itk ' . $servername['domain']; + if ($params[2] == "enable") { + $enable_cmd = 'web-add.sh enable-user-itk ' . $servername['domain']; - sudoexec($enable_cmd, $enable_cmd_output, $enable_cmd_return); + sudoexec($enable_cmd, $enable_cmd_output, $enable_cmd_return); - if ($enable_cmd_return == 0) { - print 'Sécurité ITK activée.'; - printf ('', $redirect_url); - } + if ($enable_cmd_return == 0) { + print 'Sécurité ITK activée.'; + printf ('', $redirect_url); + } } elseif ($params[2] == "disable") { - $disable_cmd = 'web-add.sh disable-user-itk ' . $servername['servername'] . ' ' . $servername['domain']; + $disable_cmd = 'web-add.sh disable-user-itk ' . $servername['domain']; + + sudoexec($disable_cmd, $disable_cmd_output, $disable_cmd_return); + + if ($disable_cmd_return == 0) { + print 'Sécurité ITK désactivée'; + printf ('', $redirect_url); + } + } include_once EVOADMIN_BASE . '../tpl/footer.tpl.php'; - } else { $domain = $params[1]; diff --git a/inc/webadmin-servername.php b/inc/webadmin-servername.php index 7141acc..8b58619 100644 --- a/inc/webadmin-servername.php +++ b/inc/webadmin-servername.php @@ -28,8 +28,8 @@ if (isset($params[2]) && $params[2] == "edit") { include_once EVOADMIN_BASE . '../tpl/header.tpl.php'; include_once EVOADMIN_BASE . '../tpl/menu.tpl.php'; - $form = new FormPage("Modification du ServerName", FALSE); - $form->addField('domain_servername', new DomainInputFormField("ServerName", TRUE), $params[3]); + $form = new FormPage("Modification du Servername", FALSE); + $form->addField('domain_servername', new DomainInputFormField("Servername", TRUE), $params[3]); $form->addField('previous_servername', new DomainInputFormField("", TRUE, TRUE), $params[3]); if (!empty($_POST)) { @@ -126,22 +126,22 @@ if (isset($params[2]) && $params[2] == "edit") { if ($exec_return == 0) { //domain_add($serveralias['alias'], gethostbyname($master) , false); TODO avec l'IP du load balancer print "Le ServerName %s a bien été modifié
', $servername['servername']); - printf ('Retour à la liste des ServerNames
', $redirect_url); + printf ('Le Servername %s a bien été modifié
', $servername['servername']); + printf ('', $redirect_url); print "Echec dans la modification du ServerName %s
', $servername['servername']); - printf ('Retour à la liste des ServerNames
', $redirect_url); + printf ('Echec dans la modification du Servername %s
', $servername['servername']); + printf ('', $redirect_url); print "Echec dans la modification du ServerName %s
', $servername['servername']); + printf ('Echec dans la modification du Servername %s
', $servername['servername']); print ('Le domaine existe déjà dans d\'autres vhosts.'); - printf ('
', $redirect_url); + printf ('', $redirect_url); print "