Compare commits

...

136 Commits

Author SHA1 Message Date
Jamie Cameron
70c7ddf3bb New version bump 2025-11-23 17:53:04 -08:00
Ilia Ross
17764483dc Fix changelog missing link to the theme
[no-build]
2025-11-23 19:34:28 +02:00
Ilia Ross
cdc1c82e83 Update changelog for 2.610 2025-11-23 19:32:23 +02:00
Ilia Ross
d29e5aea99 Fix terminal normal font size
[no-build]
2025-11-23 15:30:53 +02:00
Ilia Ross
c3a2396986 Fix to exclude .github from builds 2025-11-20 20:30:41 +02:00
Ilia Ross
da37f364dd Fix to allow some hidden modules to be searchable
Like Virtualmin Virtual Servers, which has a separate switch in the menu, so we don't want it to show up as a regular link in the menu as well
2025-11-19 12:04:33 +02:00
Jamie Cameron
0342f06fc8 Remove dependency on IO::Pty for calling sudo
https://github.com/webmin/webmin/issues/2587
2025-11-18 21:04:48 -08:00
Jamie Cameron
ef05252413 Merge pull request #2589 from webmin/dev/pure-perl-openpty
Add support for using pure-Perl Linux fallback to open PTY
2025-11-18 15:00:30 -08:00
Ilia Ross
74f879dc2b Fix to move sub to Linux lib
https://github.com/webmin/webmin/pull/2589#discussion_r2539675817
2025-11-18 23:16:10 +02:00
Ilia Ross
94cbabea9e Add support for using pure-Perl Linux fallback to open PTY 2025-11-18 20:15:26 +02:00
Ilia Ross
2634afb859 Fix to displays 2FA better 2025-11-14 15:37:00 +02:00
Ilia Ross
4bf296447e Fix to drop js.map file
https://github.com/webmin/webmin/issues/2582#issuecomment-3529211242
2025-11-13 20:50:31 +02:00
Ilia Ross
cf458db765 Fix to open correct palette on the remote 2025-11-12 23:07:21 +02:00
Ilia Ross
af7cb99298 Update screenshots 2025-11-12 23:04:51 +02:00
Jamie Cameron
3d300b5fb6 Handle perl errors calling PEM_read_bio_X509 more gracefully 2025-11-10 21:24:36 -08:00
Jamie Cameron
8ff9b75953 Merge branch 'master' of github.com:webmin/webmin 2025-11-10 19:25:55 -08:00
Jamie Cameron
06f75db35f Get the actual version if one cannot be guessed from the config file path
https://github.com/virtualmin/virtualmin-gpl/issues/1151
2025-11-10 19:25:48 -08:00
Ilia Ross
4f851d71b1 Fix to improve displaying file path and preview 2025-11-11 01:36:03 +02:00
Jamie Cameron
2133d5d4bf Version bump 2025-11-09 15:16:10 -08:00
Ilia Ross
42e5d45232 Update changelog for 2.600 2025-11-09 21:51:52 +02:00
Jamie Cameron
3e0a08b7ef Merge branch 'master' of github.com:webmin/webmin 2025-11-08 17:18:30 -08:00
Jamie Cameron
f2f40f1227 Fix clearing of default email 2025-11-08 17:16:30 -08:00
Ilia Ross
0955695a15 Fix to place apply last; looks better and makes a bit more sense 2025-11-09 00:35:25 +02:00
Ilia Ross
fb3dd9f43d Fix label followed by input consistency
[no-build]
2025-11-09 00:06:13 +02:00
Ilia Ross
9f82fdc808 Fix label for proper button color and icon 2025-11-09 00:02:58 +02:00
Ilia Ross
573f3d894a Fix to improve the cron tip text and use note for better UI 2025-11-09 00:00:52 +02:00
Ilia Ross
ff9348c056 Fix to filter out user passed page
[no-build]
2025-11-08 18:26:35 +02:00
Ilia Ross
2051bfe6dc Fix button name consistency
[no-build]
2025-11-08 18:26:18 +02:00
Ilia Ross
42e228103b Fix button name consistency 2025-11-07 19:48:31 +02:00
Ilia Ross
29d100e8eb Add support for displaying theme config link if supported
[no-build]
2025-11-06 21:03:50 +02:00
Ilia Ross
4e4234c87e Fix button title consistency
[no-build]
2025-11-05 19:05:12 +02:00
Ilia Ross
6d9aa69cb2 Fix to show nicer message 2025-11-05 15:20:14 +02:00
Ilia Ross
dbc83bae55 Fix title consistency
[no-build]
2025-11-05 14:14:08 +02:00
Ilia Ross
d37b790492 Fix not to drop that last empty paragraph as it break one pixel-accurate UI 2025-11-04 00:52:19 +02:00
Ilia Ross
34616c5fbd Fix not to print extra paragraph for consistency 2025-11-03 01:06:49 +02:00
Ilia Ross
c57651cd46 Fix schedule select 2025-11-03 00:57:37 +02:00
Ilia Ross
79f91c1468 Fix not to display pointless table header 2025-11-02 20:55:15 +02:00
Jamie Cameron
f49f86dc96 Don't even try to look for a BIND zone if it's not installed 2025-11-01 10:49:25 -07:00
Jamie Cameron
ef1e9bbf93 Fix a comment 2025-11-01 10:48:07 -07:00
Jamie Cameron
84348e3fc4 Merge branch 'master' of github.com:webmin/webmin 2025-10-29 22:03:34 -07:00
Jamie Cameron
1a52bf4d72 Fix quoting of args 2025-10-29 22:02:29 -07:00
Ilia Ross
d8a74cd275 Fix to keep print consistent for single line messages too 2025-10-27 17:53:20 +02:00
Ilia Ross
225def99ec Fix header consistency 2025-10-27 17:50:37 +02:00
Jamie Cameron
1c9e8b5a25 Properly respect the global notification address 2025-10-26 21:44:14 -07:00
Jamie Cameron
e0e5ef65f8 Properly respect the global notification address 2025-10-26 21:32:47 -07:00
Jamie Cameron
5d67cdb7c1 Properly respect global default notification address 2025-10-26 21:17:17 -07:00
Jamie Cameron
c7538bc5be This message is no longer used 2025-10-26 21:07:18 -07:00
Jamie Cameron
7959bedfe4 Merge branch 'master' of github.com:webmin/webmin 2025-10-26 14:01:21 -07:00
Ilia Ross
4c6511f2c1 Fix to stress destinations 2025-10-26 16:46:39 +02:00
Ilia Ross
42c8b02b3b Hide RBAC if its only for Solaris 2025-10-26 11:42:39 +02:00
Ilia Ross
fd25d65afe Fix to keek labels more consistent 2025-10-26 11:35:15 +02:00
Ilia Ross
ae684ff02c Fix shell name is never that long 2025-10-26 10:36:33 +02:00
Jamie Cameron
37f1b52391 Don't try to run the last command if it's not installed
https://github.com/webmin/webmin/discussions/2161
2025-10-25 20:00:04 -07:00
Ilia Ross
067b3e59b0 Add lsof to recommended package 2025-10-25 10:45:28 +03:00
Ilia Ross
8e0c6ffb14 Add various improvements and bug fixes to proc module 2025-10-25 00:34:21 +03:00
Ilia Ross
34a2cdd75d Fix to keep one line panel always closed 2025-10-23 23:14:27 +03:00
Ilia Ross
25b3f95d9c Fix for details to be clickable 2025-10-23 22:49:15 +03:00
Ilia Ross
5d8196fe95 Add support to provide detailed Webmin server stats
https://forum.virtualmin.com/t/is-this-memory-used-a-bit-high/135556/6?u=ilia
2025-10-22 17:04:11 +03:00
Jamie Cameron
7f93d6ddd8 Merge branch 'master' of github.com:webmin/webmin 2025-10-21 19:47:18 -07:00
Jamie Cameron
5ed06227a8 Escape command flags 2025-10-21 19:47:11 -07:00
Ilia Ross
0576b027c0 Fix to use proper detail box
[no-build]
2025-10-21 02:23:42 +03:00
Ilia Ross
31e2f533f6 Fix to remove ugly single dot from package description in new lines 2025-10-21 01:12:39 +03:00
Ilia Ross
51eef83562 Fix formatting and comments 2025-10-21 01:07:42 +03:00
Ilia Ross
efcfd3d20e Add support for displaying Debian package install time 2025-10-21 01:00:39 +03:00
Ilia Ross
4857976e26 Fix not to choke on epoc, just ignore it 2025-10-21 00:32:55 +03:00
Ilia Ross
3633469b4e Add ability to show package URL https://github.com/virtualmin/virtualmin-gpl/issues/1141 2025-10-21 00:31:50 +03:00
Ilia Ross
f9373eacc2 Add ability to install multiple PHP extensions at once 2025-10-19 20:44:56 +03:00
Ilia Ross
5ed99dd7eb Fix to use unique key name 2025-10-19 19:53:16 +03:00
Jamie Cameron
e7cf393f85 Merge branch 'master' of github.com:webmin/webmin 2025-10-18 20:42:54 -07:00
Jamie Cameron
f5c158ef6a Respect global notification address 2025-10-18 20:42:48 -07:00
Ilia Ross
5b71274aa1 Fix to track email change time is something we need when moving mail around 2025-10-18 00:00:38 +03:00
Ilia Ross
410cdbd01b Update SECURITY.md
For https://github.com/webmin/webmin/security/policy
2025-10-16 11:51:04 +03:00
Ilia Ross
34263aae1f Fix endless loop created by ReadParseMime; fix other bugs 2025-10-15 23:08:59 +03:00
Jamie Cameron
3f8f9539a2 Fix editing of forwarding rule
https://github.com/webmin/webmin/issues/2573
2025-10-14 21:26:51 -07:00
Jamie Cameron
cb5f4e9d39 Check that uploaded file has a filename 2025-10-14 14:05:10 -07:00
Ilia Ross
2acfc37745 Make uptracker use temp dir 2025-10-14 13:59:20 +03:00
Ilia Ross
ffe844d03d Check user later 2025-10-14 13:11:00 +03:00
Jamie Cameron
12edb92b6a Use the ReadParseMime function properly 2025-10-13 21:41:06 -07:00
Jamie Cameron
8517ee6653 Fix the ReadParseMime direct mode function to sanitise the uploaded path 2025-10-13 21:40:34 -07:00
Ilia Ross
447727ae68 Fix to always rename the file as effective user #1054 2025-10-13 23:39:02 +03:00
Ilia Ross
28ea58af07 Fix dump directory to work for all users 2025-10-13 23:14:24 +03:00
Jamie Cameron
48c5fc2138 System variables use _, but command line variables use -
https://github.com/webmin/webmin/issues/2568
2025-10-12 21:47:40 -07:00
Jamie Cameron
b9e3363a68 Merge branch 'master' of github.com:webmin/webmin 2025-10-12 18:04:22 -07:00
Jamie Cameron
f0f4f72d73 Add UI options for enabling the slow query log
https://github.com/webmin/webmin/issues/2560
2025-10-12 18:04:16 -07:00
Ilia Ross
9a493e581e Fix not to double-quote already quoted param
dfbf446092
2025-10-10 12:43:51 +03:00
Jamie Cameron
360236d68b Properly distinguish between global and custom webmin email
https://github.com/webmin/webmin/issues/2295
2025-10-09 21:37:12 -07:00
Jamie Cameron
7e5007e050 Merge branch 'master' of github.com:webmin/webmin 2025-10-09 14:56:57 -07:00
Jamie Cameron
dfbf446092 Add quotes around params where needed
https://github.com/webmin/webmin/issues/2572
2025-10-09 14:55:26 -07:00
Ilia Ross
178c6198f2 Fix EOL library explosion for OS in development #2121 2025-10-09 16:38:49 +03:00
Ilia Ross
198e395833 Update workflow 2025-10-06 19:35:16 +03:00
Ilia Ross
4443982256 Add new icons for BIND module #2569 2025-10-05 15:18:45 +03:00
Ilia Ross
8866833130 Update existing BIND A and AAAA icons 2025-10-05 13:41:22 +03:00
Ilia Ross
b1d407a52d Fix to display AAAA link next to A #2569 2025-10-05 12:26:38 +03:00
Ilia Ross
a7478ac4c9 Fix IP type for consistency 2025-10-05 12:20:25 +03:00
Ilia Ross
8957333dca Fix not to quotemeta hardcoded flag #2159 2025-10-05 01:17:28 +03:00
Ilia Ross
1caf80bbc1 Update changelog 2025-10-04 17:15:46 +03:00
Ilia Ross
18c12c7f8b Fix to correctly fetch "PPTP VPN Client" version as --help returns different output
https://github.com/webmin/webmin/issues/2567
2025-10-04 12:35:26 +03:00
Ilia Ross
78a3ab924d Fix to display error message correctly in PPTP VPN Client 2025-10-04 12:29:03 +03:00
Ilia Ross
652f2db774 Fix tooltips 2025-10-04 12:17:28 +03:00
Jamie Cameron
8b58d7cce3 Merge branch 'master' of github.com:webmin/webmin 2025-10-03 20:04:19 -07:00
Jamie Cameron
52f87286a4 Add tooltips for white and black lists 2025-10-03 19:43:46 -07:00
Ilia Ross
28c7939636 Fix to check if helper command is running as root 2025-10-04 01:12:05 +03:00
Ilia Ross
face8319f2 Fix to safely kill only targeted scripts 2025-10-04 00:45:21 +03:00
Jamie Cameron
7a651027bf New version bump 2025-10-02 20:15:30 -07:00
Jamie Cameron
bbf317803a Merge pull request #2565 from webmin/dev/check-https-redirect-later
Fix to redirect to HTTPS when we get the host from the browser URL
2025-10-02 19:25:35 -07:00
Ilia Ross
d694649872 Fix to safely get user hostname from URL 2025-10-03 03:19:54 +03:00
Ilia Ross
1091434ff4 Add more days to view log since #2564 2025-10-02 16:24:41 +03:00
Ilia Ross
991795c296 Fix to redirect to HTTPS when we get the host from the browser URL 2025-10-02 15:52:14 +03:00
Ilia Ross
8932f3bd6a Fix to truly move option tag rather than recreating
*Note: It keep existing styles and using index from "add()" will also put moved options to the top of the select and make them clearly visible
2025-10-02 13:36:22 +03:00
Ilia Ross
b3ec083c7b Update changelog 2025-10-01 23:45:22 +03:00
Ilia Ross
da18dea780 Update changelog release date to today (night) 2025-10-01 20:19:58 +03:00
Ilia Ross
35f8061049 Fix to kill Webmin subprocesses during RC stop on FreeBSD and other systems 2025-10-01 20:12:54 +03:00
Ilia Ross
e6e79a7eb5 Fix to replace vmstat with /proc sampler for same output with much lower overhead 2025-10-01 18:35:20 +03:00
Ilia Ross
a4d1280ef7 Fix copy-paste artifact 2025-10-01 14:34:40 +03:00
Ilia Ross
cc2cc62717 Fix to query specific fields in FreeBSD memory stats collection
*Note: Replace `sysctl -a` with targeted queries for only the 5 needed values (hw.physmem, hw.pagesize, vm.stats.vm.v_*_count) instead of dumping thousands of kernel params. This reduces `get_memory_info()` overhead from 25% CPU to ~5% CPU when called by real-time monitoring every 1-3 seconds.
2025-10-01 14:33:22 +03:00
Ilia Ross
c59591e3de Update changelog 2025-10-01 01:15:54 +03:00
Ilia Ross
fc4e2751dc Fix broken redirect when there is no way to get FQDN
*Note: "$host = &get_socket_name(SOCK, $ipv6fhs{$s});" won't return FQDN if it can't be resolved (or if it isn't in /etc/hosts), breaking some redirects, most likely proxied ones that aren't using HTTPS in its config.
2025-10-01 01:03:45 +03:00
Ilia Ross
4dc64f5028 Fix recommended package name (again) 2025-09-30 23:51:27 +03:00
Ilia Ross
01d2323496 Fix to mention IO::Socket::INET6 too 2025-09-30 22:28:08 +03:00
Ilia Ross
4c8b0fe008 Update changelog for 2.520 2025-09-30 17:26:46 +03:00
Jamie Cameron
e44ec464eb Merge branch 'master' of github.com:webmin/webmin 2025-09-29 13:35:49 -07:00
Jamie Cameron
98c54fe3fb Include config files by default
https://github.com/webmin/webmin/issues/2562
2025-09-29 13:35:43 -07:00
Ilia Ross
86968bfc31 Fix support for other Raspberry Pi sensors #2545 2025-09-29 18:23:10 +03:00
Ilia Ross
956ad7ed0f Dev: Trigger rebuilt for testing purposes for all modules
[no-commit-check]
2025-09-28 02:05:04 +03:00
Ilia Ross
a0d99e0a31 Dev: Trigger rebuilt for testing purposes 2025-09-28 02:02:11 +03:00
Ilia Ross
f27b1415be Fix to remove extra space
*Note: Made to trigger a re-built for testing purposes
2025-09-28 01:27:54 +03:00
Ilia Ross
1f4b467ea8 Fix to never mess around with headers; no headers check log 2025-09-28 01:20:29 +03:00
Ilia Ross
95423c7425 Fix not to loose prefix 2025-09-27 20:09:52 +03:00
Ilia Ross
89d23c5aa8 Fix for tar builds have no release but consider edition
*Note: Release for tar files should exist, however edition that can be passed like .gpl or .pro should exist
2025-09-27 20:06:57 +03:00
Ilia Ross
be3fcb89b0 Fix to remove release number from tar builds as never applicable 2025-09-27 18:28:52 +03:00
Ilia Ross
25fa7c589d Fix to add prefix for tar builds too 2025-09-27 03:50:54 +03:00
Ilia Ross
c86c45b10a Fix to keep release number too in tar builds 2025-09-27 03:00:44 +03:00
Ilia Ross
f10540bd54 Fix to add a flag to copy tar build too 2025-09-27 02:08:45 +03:00
Jamie Cameron
388f51843f Merge pull request #2558 from webmin/dev/remove-bottleneck-of-shelling-out
Fix to remove significant bottleneck of shelling out
2025-09-25 20:28:21 -07:00
Ilia Ross
7a723719da Fix to recommend Sys::Syslog module #2557 2025-09-25 15:33:52 +03:00
Ilia Ross
a027ad5dd6 Fix variable names to avoid ambiguity
* Note: Discussed here:
https://github.com/webmin/webmin/pull/2553#issuecomment-3328436525
2025-09-25 15:23:06 +03:00
211 changed files with 1788 additions and 662 deletions

View File

@@ -16,7 +16,6 @@ jobs:
project-name: webmin
is-release: ${{ github.event_name == 'release' }}
secrets:
DEV_GPG_PH: ${{ secrets.DEV_GPG_PH }}
DEV_IP_ADDR: ${{ secrets.DEV_IP_ADDR }}
DEV_IP_KNOWN_HOSTS: ${{ secrets.DEV_IP_KNOWN_HOSTS }}
DEV_UPLOAD_SSH_USER: ${{ secrets.DEV_UPLOAD_SSH_USER }}

View File

@@ -1,7 +1,50 @@
## Changelog
#### 2.511 (September, 2025)
#### 2.610 (November 23, 2025)
* Fix to drop dependency on `IO::Pty` Perl module
* Fix `virtual-server` module server-side search to work correctly
* Update the Authentic theme to the latest version with various improvements and fixes:
- Add a range slider to adjust content page margins more precisely
- Add an option to enable rounded corners for content page
- Add more customization options for pie charts
- Fix to increase clickable area for checkboxes in File Manager
- Fix to correct rotation of pin and unpin button for right side slider
- Fix color of selected items in the multiselect dropdown
- Fix to improve the visibility of disabled checkboxes
- Fix to send saved params in the post body when saving theme configuration
[More details...](https://github.com/webmin/authentic-theme/releases/tag/26.20)
#### 2.600 (November 9, 2025)
* Add an options to enable the slow query log in the MySQL/MariaDB module [#2560](https://github.com/webmin/webmin/issues/2560)
* Add ability to install multiple PHP extensions at once in the PHP Configuration module
* Add ability to show package URL in the Software Packages module [#1141](https://github.com/virtualmin/virtualmin-gpl/issues/1141)
* Add support to show Debian package install time in the Software Packages module
* Add support to show detailed Webmin server stats using new `webmin stats` CLI command [forum.virtualmin.com/t/135556](https://forum.virtualmin.com/t/is-this-memory-used-a-bit-high/135556/6?u=ilia)
* Add a major Authentic theme UI update with lots of visual and structural improvements for a smoother and more modern experience
[More details...](https://forum.virtualmin.com/t/authentic-theme-version-26-00-release-overview/135755?u=ilia)
* Fix EOL library fatal error for OS in development [#2121](https://github.com/webmin/webmin/issues/2121)
* Fix correctly saving jails with parameters containing quotes in the Fail2Ban module [#2572](https://github.com/webmin/webmin/issues/2572)
* Fix file is always renamed as the effective user in the Upload and Download module [#1054](https://github.com/webmin/webmin/issues/1054)
#### 2.520 (October 4, 2025)
* Fix to make sure the mail URL uses a well-known host name [security]
* Fix support for other Raspberry Pi sensors [#2545](https://github.com/webmin/webmin/issues/2545)
* Fix the printing of the bottom button row in the form column table
* Fix to recommend Perl `Sys::Syslog` module [#2557](https://github.com/webmin/webmin/issues/2557)
* Fix to avoid using short hostname in HTTPS redirects when an FQDN is available
* Fix to use _/proc_ sampler instead of `vmstat` for the same output with much lower overhead
* Fix to query specific fields in FreeBSD memory stats collection, cutting CPU use by 80%
* Fix to kill Webmin subprocesses during RC stop on FreeBSD and other systems
* Fix to correctly fetch command version in `PPTP VPN Client` module [#2567](https://github.com/webmin/webmin/issues/2567)
* Add a complete overhaul of `var_dump` subroutine, which is now fully portable
* Update the Authentic theme to the latest version with various fixes:
- Fix the text color when reading email in the Read User Mail module [webmin#2555](https://github.com/webmin/webmin/issues/2555)
- Fix to ensure the selected color palette is correctly stored when changed manually [webmin#2552](https://github.com/webmin/webmin/issues/2552)
- Fix a bug when the Webmin version label was missing when copying to clipboard system information from the dashboard
- Fix DNS query spike from network stats collection on FreeBSD [webmin#2556](https://github.com/webmin/webmin/issues/2556)
- Fix to display the appropriate icon for proxy mode on new Bunny DNS
- Fix spinner color in toast messages for dark palette
- Fix other bugs and add various small improvements
#### 2.510 (September 16, 2025)
* Fix to ensure DNSSEC re-signing period is less than 30 days in the BIND DNS module

View File

@@ -19,11 +19,11 @@
**Webmin** is a web-based system administration tool for Unix-like servers, and services with about _1,000,000_ yearly installations worldwide. Using it, it is possible to configure operating system internals, such as users, disk quotas, services or configuration files, as well as modify, and control open-source apps, such as BIND DNS Server, Apache HTTP Server, PHP, MySQL, and many more.
<p align="center">
<a href="https://webmin.com/screenshots/#gh-light-mode-only" target="_blank">
<img width="1440" alt="Dashboard screenshot" src="https://user-images.githubusercontent.com/4426533/218264253-c08fb45a-8d75-44bf-93b3-37a2ecae3d20.png">
<a href="https://webmin.com/screenshots/?theme=light#gh-light-mode-only" target="_blank">
<img width="1440" alt="Dashboard screenshot" src="https://github.com/user-attachments/assets/a01d0a78-4130-4665-9284-814955ae1c97">
</a>
<a href="https://webmin.com/screenshots/#gh-dark-mode-only" target="_blank">
<img width="1440" alt="Dashboard screenshot" src="https://user-images.githubusercontent.com/4426533/218265232-31140aa6-ada1-4019-bd75-04240aeabc83.png">
<a href="https://webmin.com/screenshots/?theme=dark#gh-dark-mode-only" target="_blank">
<img width="1440" alt="Dashboard screenshot" src="https://github.com/user-attachments/assets/da4b90a0-c002-4e10-8b34-5acb251bbec9">
</a>
</p>

View File

@@ -1,23 +1,242 @@
## Reporting Security Issues
Please send all reports of security issues found in Webmin to security@webmin.com
via email, ideally PGP encrypted with the key from https://www.webmin.com/jcameron-key.asc .
> [!WARNING]
> **Found a bug?** If youve found a new security-related issue, email
> [security@webmin.com](mailto:security@webmin.com).
Potential security issues, in descending order of impact, include :
### Webmin 2.510 and below [October 9, 2025]
#### Host header injection vulnerability in the password reset feature [CVE-2025-61541]
* Remotely exploitable attacks that allow `root` access to Webmin without
any credentials.
- If the password reset feature is enabled, an attacker can use a specially
crafted host header to cause the password reset email to contain a link to a
malicious site.
* Privilege escalation vulnerabilities that allow non-`root` users of Webmin
to run commands or access files as `root`.
> Thanks to Nyein Chan Aung and Mg Demon for reporting this.
* XSS attacks that target users already logged into Webmin when they visit
another website.
### Webmin 2.202 and below [February 26, 2025]
#### SSL certificates from clients may be trusted unexpectedly
Things that are not actually security issues include :
- If Webmin is configured to trust remote IP addresses provided by a proxy *and*
you have users authenticating using client SSL certificates, a browser
connecting directly (not via the proxy) can provide a forged header to fake
the client certificate.
* XSS attacks that are blocked by Webmin's referrer checks, which are enabled
by default.
- Upgrade to Webmin 2.301 or later, and if there is any chance of direct
requests by clients disable this at **Webmin ⇾ Webmin Configuration ⇾ IP
Access Control** page using **Trust level for proxy headers** option.
* Attacks that require modifications to Webmin's code or configuration, which
can only be done by someone who already has `root` permissions.
> Thanks to Keigo YAMAZAKI from LAC Co., Ltd. for reporting this.
### Webmin 2.105 and below [April 15, 2024]
#### Privilege escalation by non-root users [CVE-2024-12828]
- A less-privileged Webmin user can execute commands as root via a vulnerability in the shell autocomplete feature.
- All Virtualmin admins and Webmin admins who have created additional accounts should upgrade to version 2.111 as soon as possible!
> Thanks to Trend Micros Zero Day Initiative for finding and reporting this issue.
### Webmin 1.995 and Usermin 1.850 and below [June 30, 2022]
#### XSS vulnerability in the HTTP Tunnel module
- If a less-privileged Webmin user is given permission to edit the configuration of the HTTP Tunnel module, he/she could use this to introduce a vulnerability that captures cookies belonging to other Webmin users that use the module.
> Thanks to [BLACK MENACE][2] and [PYBRO][3] for reporting this issue.
- An HTML email crafted by an attacker could capture browser cookies when opened.
> Thanks to [ly1g3][4] for reporting this bug.
### Webmin 1.991 and below [April 18, 2022]
#### Privilege escalation exploit [CVE-2022-30708]
- Less privileged Webmin users (excluding those created by Virtualmin and Cloudmin) can modify arbitrary files with root privileges, and so run commands as root. All systems with additional untrusted Webmin users should upgrade immediately.
> Thanks to [esp0xdeadbeef][5] and [V1s3r1on][6] for finding and reporting this issue!
### Webmin 1.984 and below [December 26, 2021]
#### File Manager privilege exploit [CVE-2022-0824 and CVE-2022-0829]
- Less privileged Webmin users who do not have any File Manager module restrictions configured can access files with root privileges, if using the default Authentic theme. All systems with additional untrusted Webmin users should upgrade immediately. Note that Virtualmin systems are not effected by this bug, due to the way domain owner Webmin users are configured.
> Thanks to Faisal Fs ([faisalfs10x][7]) from [NetbyteSEC][8] for finding and reporting this issue!
### Virtualmin Procmail wrapper version 1.0
#### Privilege escalation exploit
- Version 1.0 of the `procmail-wrapper` package installed with Virtualmin has a vulnerability that can be used by anyone with SSH access to gain `root` privileges. To prevent this, all Virtualmin users should upgrade to version 1.1 or later immediately.
### Webmin 1.973 and below [March 7, 2021]
#### XSS vulnerabilities if Webmin is installed using the `setup.pl` script [CVE-2021-31760, CVE-2021-31761 and CVE-2021-31762]
- If Webmin is installed using the non-recommended `setup.pl` script, checking for unknown referers is not enabled by default. This opens the system up to XSS and CSRF attacks using malicious links. Fortunately the standard `rpm`, `deb`, `pkg` and `tar` packages do not use this script and so are not vulnerable. If you did install using the `setup.pl` script, the vulnerability can be fixed by adding the line `referers_none=1` to `/etc/webmin/config` file.
> Thanks to Meshal ( Mesh3l\_911 ) [@Mesh3l\_911][9] and Mohammed ( Z0ldyck ) [@electronicbots][10] for finding and reporting this issue!
### Webmin 1.941 and below [January 16, 2020]
#### XSS vulnerability in the Command Shell module [CVE-2020-8820 and CVE-2020-8821]
- A user with privileges to create custom commands could exploit other users via unescaped HTML.
> Thanks to Mauro Caseres for reporting this and the following issue.
### Webmin 1.941 and below [January 16, 2020]
#### XSS vulnerability in the Read Mail module [CVE-2020-12670]
- Saving a malicious HTML attachment could trigger and XSS vulnerability.
### Webmin 1.882 to 1.921 [July 6, 2019]
#### Remote Command Execution [CVE-2019-15231]
- Webmin releases between these versions contain a vulnerability that allows remote command execution! Version 1.890 is vulnerable in a default install and should be upgraded immediately - other versions are only vulnerable if changing of expired passwords is enabled, which is not the case by default.
Either way, upgrading to version 1.930 is strongly recommended. Alternately, if running versions 1.900 to 1.920, edit `/etc/webmin/miniserv.conf`, remove the `passwd_mode=` line, then run `/etc/webmin/restart` command.
{{< details-start post-indent-details "More details.." >}}
Webmin version 1.890 was released with a backdoor that could allow anyone with knowledge of it to execute commands as root. Versions 1.900 to 1.920 also contained a backdoor using similar code, but it was not exploitable in a default Webmin install. Only if the admin had enabled the feature at **Webmin ⇾ Webmin Configuration ⇾ Authentication** to allow changing of expired passwords could it be used by an attacker.
Neither of these were accidental bugs - rather, the Webmin source code had been maliciously modified to add a non-obvious vulnerability. It appears that this happened as follows :
- At some time in April 2018, the Webmin development build server was exploited and a vulnerability added to the `password_change.cgi` script. Because the timestamp on the file was set back, it did not show up in any Git diffs. This was included in the Webmin 1.890 release.
- The vulnerable file was reverted to the checked-in version from GitHub, but sometime in July 2018 the file was modified again by the attacker. However, this time the exploit was added to code that is only executed if changing of expired passwords is enabled. This was included in the Webmin 1.900 release.
- On September 10th 2018, the vulnerable build server was decommissioned and replaced with a newly installed server running CentOS 7. However, the build directory containing the modified file was copied across from backups made on the original server.
- On August 17th 2019, we were informed that a 0-day exploit that made use of the vulnerability had been released. In response, the exploit code was removed and Webmin version 1.930 created and released to all users.
In order to prevent similar attacks in future, we're doing the following :
- Updating the build process to use only checked-in code from GitHub, rather than a local directory that is kept in sync.
- Rotated all passwords and keys accessible from the old build system.
- Auditing all GitHub commits over the past year to look for commits that may have introduced similar vulnerabilities.
{{< details-end >}}
### Webmin 1.900 [November 19, 2018]
#### Remote Command Execution (Metasploit)
- This is _not_ a workable exploit as it requires that the attacker already know the root password. Hence there is no fix for it in Webmin.
### Webmin 1.900 and below [November 19, 2018]
#### Malicious HTTP headers in downloaded URLs
- If the Upload and Download or File Manager module is used to fetch an un-trusted URL. If a Webmin user downloads a file from a malicious URL, HTTP headers returned can be used exploit an XSS vulnerability.
> Thanks to independent security researcher, John Page aka hyp3rlinx, who reported this vulnerability to Beyond Security's SecuriTeam Secure Disclosure program.
### Webmin 1.800 and below [May 26, 2016]
#### Authentic theme configuration page vulnerability
- Only an issue if your system has un-trusted users with Webmin access and is using the new Authentic theme. A non-root Webmin user could use the theme configuration page to execute commands as root.
#### Authentic theme remote access vulnerability
- Only if the Authentic theme is enabled globally. An attacker could execute commands remotely as root, as long as there was no firewall blocking access to Webmin's port 10000.
### Webmin 1.750 and below [May 12, 2015]
#### XSS (cross-site scripting) vulnerability in `xmlrpc.cgi` script [CVE-2015-1990]
- A malicious website could create links or JavaScript referencing the `xmlrpc.cgi` script, triggered when a user logged into Webmin visits the attacking site.
> Thanks to Peter Allor from IBM for finding and reporting this issue.
### Webmin 1.720 and below [November 24, 2014]
#### Read Mail module vulnerable to malicious links
- If un-trusted users have both SSH access and the ability to use Read User Mail module (as is the case for Virtualmin domain owners), a malicious link could be created to allow reading any file on the system, even those owned by _root_.
> Thanks to Patrick William from RACK911 labs for finding this bug.
### Webmin 1.700 and below [August 11, 2014]
#### Shellshock vulnerability
- If your _bash_ shell is vulnerable to _shellshock_, it can be exploited by attackers who have a Webmin login to run arbitrary commands as _root_. Updating to version 1.710 (or updating _bash_) will fix this issue.
### Webmin 1.590 and below [June 30, 2012]
#### XSS (cross-site scripting) security hole
- A malicious website could create links or JavaScript referencing the File Manager module that allowed execution of arbitrary commands via Webmin when the website is viewed by the victim. See [CERT vulnerability note VU#788478][12] for more details. Thanks to Jared Allar from the American Information Security Group for reporting this problem.
#### Referer checks don't include port
- If an attacker has control over `http://example.com/` then he/she could create a page with malicious JavaScript that could take over a Webmin session at `https://example.com:10000/` when `http://example.com/` is viewed by the victim.
> Thanks to Marcin Teodorczyk for finding this issue.
### Webmin 1.540 and below [April 20, 2011]
#### XSS (cross-site scripting) security hole
- This vulnerability can be triggered if an attacker changes his Unix username via a tool like `chfn`, and a page listing usernames is then viewed by the root user in Webmin.
> Thanks to Javier Bassi for reporting this bug.
### Virtualmin 3.70 and below [June 23, 2009]
#### Unsafe file writes in Virtualmin
- This bug allows a virtual server owner to read or write to arbitrary files on the system by creating malicious symbolic links and then having Virtualmin perform operations on those links. Upgrading to version 3.70 is strongly recommended if your system has un-trusted domain owners.
### Webmin 1.390 and below, Usermin 1.320 and below [February 8, 2008]
#### XSS (cross-site scripting) security hole
- This attack could open users who visit un-trusted websites while having Webmin open in the same browser up to having their session cookie captured, which could then allow an attacker to login to Webmin without a password. The quick fix is to go to the **Webmin Configuration** module, click on the **Trusted Referers** icon, set **Referrer checking enabled?** to **Yes**, and un-check the box **Trust links from unknown referrers**. Webmin 1.400 and Usermin 1.330 will make these settings the defaults.
### Webmin 1.380 and below [November 3, 2007]
#### Windows-only command execution bug
- Any user logged into Webmin can execute any command using special URL parameters. This could be used by less-privileged Webmin users to raise their level of access.
> Thanks for Keigo Yamazaki of Little eArth Corporation for finding this bug.
### Webmin 1.374 and below, Usermin 1.277 and below
#### XSS bug in `pam_login.cgi` script
- A malicious link to Webmin `pam_login.cgi` script can be used to execute JavaScript within the Webmin server context, and perhaps steal session cookies.
### Webmin 1.330 and below, Usermin 1.260 and below
#### XSS bug in `chooser.cgi` script
- When using Webmin or Usermin to browse files on a system that were created by an attacker, a specially crafted filename could be used to inject arbitrary JavaScript into the browser.
### Webmin 1.296 and below, Usermin 1.226 and below
#### Remote source code access
- An attacker can view the source code of Webmin CGI and Perl programs using a specially crafted URL. Because the source code for Webmin is freely available, this issue should only be of concern to sites that have custom modules for which they want the source to remain hidden.
#### XSS bug
- The XSS bug makes use of a similar technique to craft a URL that can allow arbitrary JavaScript to be executed in the user's browser if a malicious link is clicked on.
> Thanks for Keigo Yamazaki of Little eArth Corporation for finding this bug.
### Webmin 1.290 and below, Usermin 1.220 and below
#### Arbitrary remote file access
- An attacker without a login to Webmin can read the contents of any file on the server using a specially crafted URL. All users should upgrade to version 1.290 as soon as possible, or setup IP access control in Webmin.
> Thanks to Kenny Chen for bringing this to my attention.
### Webmin 1.280 and below
#### Windows arbitrary file access
- If running Webmin on Windows, an attacker can remotely view the contents of any file on your system using a specially crafted URL. This does not affect other operating systems, but if you use Webmin on Windows you should upgrade to version 1.280 or later.
> Thanks to Keigo Yamazaki of Little eArth Corporation for discovering this bug.
### Webmin 1.250 and below, Usermin 1.180 and below
#### Perl syslog input attack
- When logging of failing login attempts via `syslog` is enabled, an attacker can crash and possibly take over the Webmin webserver, due to un-checked input being passed to Perl's `syslog` function. Upgrading to the latest release of Webmin is recommended.
> Thanks to Jack at Dyad Security for reporting this problem to me.
### Webmin 1.220 and below, Usermin 1.150 and below
#### Full PAM conversations' mode remote attack
- Affects systems when the option **Support full PAM conversations?** is enabled on the **Webmin ⇾ Webmin Configuration ⇾ Authentication** page. When this option is enabled in Webmin or Usermin, an attacker can gain remote access to Webmin without needing to supply a valid login or password. Fortunately this option is not enabled by default and is rarely used unless you have a PAM setup that requires more than just a username and password, but upgrading is advised anyway. <br />
> Thanks to Keigo Yamazaki of Little eArth Corporation and [JPCERT/CC][13] for discovering and notifying me of this bug.
### Webmin 1.175 and below, Usermin 1.104 and below
#### Brute force password guessing attack
- Prior Webmin and Usermin versions do not have password timeouts turned on by default, so an attacker can try every possible password for the _root_ or admin user until he/she finds the correct one.
The solution is to enable password timeouts, so that repeated attempts to login as the same user will become progressively slower. This can be done by following these steps :
* Go to the **Webmin Configuration** module.
* Click on the **Authentication** icon.
* Select the **Enable password timeouts** button.
* Click the **Save** button at the bottom of the page.
This problem is also present in Usermin, and can be prevented by following the same steps in the **Usermin Configuration** module.
### Webmin 1.150 and below, Usermin 1.080 and below
#### XSS vulnerability
- When viewing HTML email, several potentially dangerous types of URLs can be passed through. This can be used to perform malicious actions like executing commands as the logged-in Usermin user.
#### Module configurations are visible
- Even if a Webmin user does not have access to a module, he/she can still view it's Module Config page by entering a URL that calls `config.cgi` with the module name as a parameter.
#### Account lockout attack
- By sending a specially constructed password, an attacker can lock out other users if password timeouts are enabled.
[2]: https://github.com/bl4ckmenace
[3]: https://github.com/Pybro09
[4]: https://github.com/ly1g3
[5]: https://github.com/esp0xdeadbeef
[6]: https://github.com/V1s3r1on
[7]: https://github.com/faisalfs10x/
[8]: https://www.netbytesec.com/
[9]: https://twitter.com/Mesh3l_911
[10]: https://twitter.com/electronicbots
[12]: http://www.kb.cert.org/vuls/id/788478
[13]: http://www.jpcert.or.jp/

View File

@@ -82,7 +82,7 @@ print &ui_table_row($text{'unix_restrict2'},
print &ui_table_row("",
&ui_checkbox("shells_deny", 1, $text{'unix_shells'},
$miniserv{'shells_deny'} ? 1 : 0)." ".
&ui_filebox("shells", $miniserv{'shells_deny'} || "/etc/shells", 40));
&ui_filebox("shells", $miniserv{'shells_deny'} || "/etc/shells", 25));
print &ui_table_end();
print &ui_form_end([ [ undef, $text{'save'} ] ]);

View File

@@ -238,6 +238,18 @@ my @themes = grep { !$_->{'overlay'} } @all;
my @overlays = grep { $_->{'overlay'} } @all;
if ($access{'theme'}) {
my $tconf_link;
my %tinfo = &webmin::get_theme_info($user{'theme'});
if ($user{'theme'} && $user{'theme'} eq $tinfo{'dir'} &&
$user{'name'} eq $remote_user &&
$tinfo{'config_link'}) {
$tconf_link = &ui_tag('span', &ui_link(
"@{[&get_webprefix()]}/$tinfo{'config_link'}",
&ui_tag('span', '⚙',
{ class => 'theme-config-char',
title => $text{'themes_configure'} }),
'text-link'), { style => 'position: relative;' });
}
# Current theme
my @topts = ( );
push(@topts, !$user{'theme'} ? [ '', $text{'edit_themedef'} ] : ());
@@ -247,7 +259,8 @@ if ($access{'theme'}) {
print &ui_table_row($text{'edit_theme'},
&ui_radio("theme_def", defined($user{'theme'}) ? 0 : 1,
[ [ 1, $text{'edit_themeglobal'} ],
[ 0, &ui_select("theme", $user{'theme'}, \@topts) ] ]));
[ 0, &ui_select("theme", $user{'theme'}, \@topts).
$tconf_link ] ]));
}
if ($access{'theme'} && @overlays) {

View File

@@ -7,7 +7,7 @@ use warnings;
no warnings 'redefine';
no warnings 'uninitialized';
require './acl-lib.pl';
our (%in, %text, %config, %access, $base_remote_user);
our (%in, %text, %config, %gconfig, %access, $base_remote_user);
&ReadParse();
&ui_print_header(undef, $text{'index_title'}, "", undef, 1, 1);
@@ -206,7 +206,7 @@ if (uc($ENV{'HTTPS'}) eq "ON" && $miniserv{'ca'}) {
push(@icons, "images/twofactor.gif");
push(@links, "twofactor_form.cgi");
push(@titles, $text{'index_twofactor'});
if ($access{'rbacenable'}) {
if ($access{'rbacenable'} && $gconfig{'os_type'} eq 'solaris') {
push(@icons, "images/rbac.gif");
push(@links, "edit_rbac.cgi");
push(@titles, $text{'index_rbac'});
@@ -291,7 +291,13 @@ return &ui_checkbox("d", $user->{'name'}, "", 0).
($ro ? "<b>" : "").
&ui_link("$cgi?$param=".&urlize($user->{'name'}),
$user->{'name'}).
($user->{'twofactor_id'} ? "*" : "").
($user->{'twofactor_id'}
? &ui_tag('sup', '⚷',
{ title => $text{'index_twofactor_enabled'},
class => 'twofactor-enabled-icon',
style => 'font-size: 11px; margin-left: 5px; cursor: default;'.
'display: inline-block; transform: rotate(90deg);' } )
: "").
($ro ? "</b>" : "").
($lck ? "</i>" : "");
}

View File

@@ -6,6 +6,7 @@ index_screate=Create a new safe user.
index_convert=Convert Unix To Webmin Users
index_cert=Request an SSL Certificate
index_twofactor=Two-Factor Authentication
index_twofactor_enabled=Two-factor authentication is enabled for this user
index_certmsg=Click this button to request an SSL certificate that will allow you to securely login to Webmin without having to enter a username and password.
index_return=user list
index_none=None
@@ -358,16 +359,16 @@ sessions_user=Webmin user
sessions_login_ago=Last active ago
sessions_login=Last active at
sessions_host=IP address
sessions_lview=View logs..
sessions_actions=Actions..
sessions_all=All sessions..
sessions_logouts=Also show logged-out sessions..
sessions_lview=View logs
sessions_actions=Actions
sessions_all=All sessions
sessions_logouts=Also show logged-out sessions
sessions_state=State
sessions_action=Actions
sessions_this=This login
sessions_in=Logged in
sessions_out=Logged out
sessions_kill=Disconnect..
sessions_kill=Disconnect
logins_title=Recent Webmin logins

View File

@@ -1235,6 +1235,9 @@ sub restart_button
local $args = "redir=".&urlize(&this_url());
local @rv;
if (&is_apache_running()) {
if ($access{'stop'}) {
push(@rv, &ui_link("stop.cgi?$args", $text{'apache_stop'}) );
}
if ($access{'apply'}) {
my $n = &needs_config_restart();
if ($n) {
@@ -1245,9 +1248,6 @@ if (&is_apache_running()) {
push(@rv, &ui_link("restart.cgi?$args", $text{'apache_apply'}) );
}
}
if ($access{'stop'}) {
push(@rv, &ui_link("stop.cgi?$args", $text{'apache_stop'}) );
}
}
elsif ($access{'stop'}) {
push(@rv, &ui_link("start.cgi?$args", $text{'apache_start'}) );

View File

@@ -158,7 +158,7 @@ $rv .= "<table id='show_backup_destination' cellpadding=1 cellspacing=0>";
# Local file field
$rv .= "<tr><td>".&ui_oneradio("$_[0]_mode", 0, undef, $mode == 0)."</td>\n";
$rv .= "<td>$text{'backup_mode0'}&nbsp;</td><td colspan='3'>".
$rv .= "<td>".&ui_tag('strong', $text{'backup_mode0'})."&nbsp;</td><td colspan='3'>".
&ui_textbox("$_[0]_file", $mode == 0 ? $path : "", 60, undef, undef,
($_[2] != 1 && $config{'date_subs'}) ?
'placeholder="/backups/configs-%y-%m-%d-%H-%M-%S.tar.gz"' : undef).
@@ -166,7 +166,7 @@ $rv .= "<td>$text{'backup_mode0'}&nbsp;</td><td colspan='3'>".
# FTP file fields
$rv .= "<tr><td>".&ui_oneradio("$_[0]_mode", 1, undef, $mode == 1)."</td>\n";
$rv .= "<td>$text{'backup_mode1'}&nbsp;</td><td>".
$rv .= "<td>".&ui_tag('strong', $text{'backup_mode1'})."&nbsp;</td><td>".
&ui_textbox("$_[0]_server", $mode == 1 ? $server : undef, 20).
"</td>\n";
$rv .= "<td>&nbsp;$text{'backup_path'}&nbsp;</td><td> ".
@@ -186,7 +186,7 @@ $rv .= "<td colspan='4'>$text{'backup_port'} ".
# SCP file fields
$rv .= "<tr><td>".&ui_oneradio("$_[0]_mode", 2, undef, $mode == 2)."</td>\n";
$rv .= "<td>$text{'backup_mode2'}&nbsp;</td><td>".
$rv .= "<td>".&ui_tag('strong', $text{'backup_mode2'})."&nbsp;</td><td>".
&ui_textbox("$_[0]_sserver", $mode == 2 ? $server : undef, 20).
"</td>\n";
$rv .= "<td>&nbsp;$text{'backup_path'}&nbsp;</td><td> ".
@@ -208,7 +208,7 @@ if ($_[2] == 1) {
# Uploaded file field
$rv .= "<tr><td>".&ui_oneradio("$_[0]_mode", 3, undef, $mode == 3).
"</td>\n";
$rv .= "<td colspan=4>$text{'backup_mode3'} ".
$rv .= "<td colspan=4>".&ui_tag('strong', $text{'backup_mode3'})." ".
&ui_upload("$_[0]_upload", 40).
"</td> </tr>\n";
}
@@ -216,7 +216,8 @@ elsif ($_[2] == 2) {
# Output to browser option
$rv .= "<tr><td>".&ui_oneradio("$_[0]_mode", 4, undef, $mode == 4).
"</td>\n";
$rv .= "<td colspan=4>$text{'backup_mode4'}</td> </tr>\n";
$rv .= "<td colspan=4>".&ui_tag('strong', $text{'backup_mode4'}).
"</td> </tr>\n";
}
$rv .= "</table>\n";

View File

@@ -5,7 +5,7 @@ use strict;
use warnings;
no warnings 'redefine';
no warnings 'uninitialized';
our (%text, %config, $no_acl_check);
our (%text, %config, $no_acl_check, %gconfig);
$no_acl_check++;
require './backup-config-lib.pl';
&foreign_require("mailboxes", "mailboxes-lib.pl");
@@ -76,11 +76,10 @@ if (($err || $backup->{'emode'} == 0) && $backup->{'email'}) {
$postmsg;
$subject = &text('email_sok', $host);
}
&mailboxes::send_text_mail($config{'from_addr'} ||
&mailboxes::get_from_address(),
$backup->{'email'},
undef,
$subject,
$msg);
&mailboxes::send_text_mail(
$config{'from_addr'} || &mailboxes::get_from_address(),
$backup->{'email'} eq '*' ? $gconfig{'webmin_email_to'}
: $backup->{'email'},
undef, $subject, $msg);
}

View File

@@ -10,11 +10,14 @@ our (%in, %text, %gconfig);
&ReadParse();
my $backup;
my $wet = $gconfig{'webmin_email_to'};
if ($in{'new'}) {
&ui_print_header(undef, $text{'edit_title1'}, "");
$backup = { 'emode' => 0,
'email' => $gconfig{'webmin_email_to'},
'email' => $wet ? '*' : undef,
'sched' => 1,
'configfile' => 1,
'nofiles' => 0,
'mins' => 0,
'hours' => 0,
'days' => '*',
@@ -72,7 +75,10 @@ print &ui_hidden_table_start($text{'edit_header3'}, "width=100%", 2,
# Show email address
print &ui_table_row($text{'edit_email'},
&ui_textbox("email", $backup->{'email'}, 40));
$wet ? &ui_opt_textbox("email",
$backup->{'email'} eq '*' ? undef : $backup->{'email'},
40, &text('edit_email_def', "<tt>$wet</tt>"))
: &ui_textbox("email", $backup->{'email'}, 40));
# Show email mode
print &ui_table_row($text{'edit_emode'},

View File

@@ -30,7 +30,7 @@ my $using_strftime = 0;
if (@backups) {
# Show all scheduled backups
print &ui_link("edit.cgi?new=1", $text{'index_add'});
print "<br>\n";
print "<br>\n";
print &ui_columns_start([ $text{'index_dest'},
$text{'index_mods'},
$text{'index_sched'} ], 100);

View File

@@ -27,6 +27,7 @@ edit_header=Scheduled backup options
edit_header2=Pre and post backup commands
edit_header3=Backup schedule
edit_email=Email result to address
edit_email_def=Webmin default ($1)
edit_emode=When to send email
edit_emode0=Always
edit_emode1=Only when an error occurs

View File

@@ -36,7 +36,7 @@ else {
$backup->{'dest'} = &parse_backup_destination("dest", \%in);
&cron::parse_times_input($backup, \%in);
$backup->{'emode'} = $in{'emode'};
$backup->{'email'} = $in{'email'};
$backup->{'email'} = $in{'email_def'} ? '*' : $in{'email'};
$backup->{'pre'} = $in{'pre'};
$backup->{'post'} = $in{'post'};
$backup->{'sched'} = $in{'sched'};

View File

@@ -22,7 +22,7 @@ sub main
# If username passed as regular param
my $cmd = scalar(@ARGV) == 1 && $ARGV[0];
$cmd = $opt{'command'} if ($opt{'command'});
if ($cmd !~ /^(status|start|stop|restart|reload|force-restart|kill)$/) {
if ($cmd !~ /^(stats|status|start|stop|restart|reload|force-restart|kill)$/) {
$cmd = undef;
}
@@ -92,6 +92,395 @@ sub run
}
exit $rs;
}
if ($o->{'cmd'} =~ /^(stats)$/) {
my $rs = 0;
if (-x $systemctlcmd) {
my $format_bytes = sub {
my $bytes = shift;
return "0" unless defined $bytes && $bytes =~ /^\d+$/;
my $mb = $bytes / 1048576;
my $gb = $mb / 1024;
if ($gb >= 1) {
return sprintf("%.2f GB", $gb);
} elsif ($mb >= 1) {
return sprintf("%.2f MB", $mb);
} else {
return sprintf("%.2f KB", $bytes / 1024);
}
};
# Check if service is running first
my $is_active_cmd = qq{systemctl is-active "$service" 2>/dev/null};
my $is_active = `$is_active_cmd`;
$rs = $? >> 8;
chomp($is_active);
if ($rs != 0 || $is_active ne 'active') {
print "Service '$service' is not running (status: $is_active)\n";
return 2;
}
# Get main pid
my $main_pid_cmd = qq{systemctl show -p MainPID --value "$service"};
my $main_pid = `$main_pid_cmd`;
$rs = $? >> 8;
return $rs if $rs != 0;
chomp($main_pid);
if (!$main_pid || $main_pid eq '0') {
print "Service '$service' has no main PID\n";
return;
}
# Get process list
my $cmd = qq{
CG=\$(systemctl show -p ControlGroup --value "$service");
P=\$({ cat /sys/fs/cgroup"\$CG"/cgroup.procs; systemctl show -p MainPID --value "$service"; } | sort -u);
COLUMNS=10000 ps --cols 10000 -ww --no-headers -o pid=,ppid=,rss=,pmem=,pcpu=,args= --sort=-rss -p \$P |
awk 'function h(k){m=k/1024;g=m/1024;return g>=1?sprintf("%.2fG",g):sprintf("%.1fM",m)} BEGIN{printf "%6s %6s %9s %6s %6s %-s\\n","PID","PPID","RSS_KiB","%MEM","%CPU","CMD (RSS_human)"} {cmd=substr(\$0,index(\$0,\$6)); printf "%6s %6s %9s %6s %6s %s (%s)\\n",\$1,\$2,\$3,\$4,\$5,cmd,h(\$3)}'
};
my $out = `$cmd`;
$rs = $? >> 8;
return $rs if $rs != 0;
# Extract pids from the output
my @all_pids;
foreach my $line (split(/\n/, $out)) {
if ($line =~ /^\s*(\d+)\s+/) {
push @all_pids, $1;
}
}
if (!@all_pids) {
print "No processes found for service '$service'\n";
return 3;
}
# Reorder with main pid first, then rest sorted by size
my @pids;
if ($main_pid && $main_pid ne '' && grep { $_ eq $main_pid } @all_pids) {
push @pids, $main_pid;
push @pids, grep { $_ ne $main_pid } @all_pids;
} else {
@pids = @all_pids;
}
# Print the table with main pid marked
foreach my $line (split(/\n/, $out)) {
if ($line =~ /^\s*$main_pid\s+/ && $main_pid) {
chomp($line);
print "$line [MAIN]\n";
} else {
print "$line\n";
}
}
# Check if lsof is available
my $has_lsof = has_command('lsof');
# Get detailed info for each pid
foreach my $pid (@pids) {
my $is_main = ($pid eq $main_pid) ? " [MAIN PROCESS]" : "";
# Check if process still exists
unless (-d "/proc/$pid") {
print "\n\nProcess $pid no longer exists, skipping...\n";
next;
}
print "\n";
print "╔" . "═"x78 . "╗\n";
print "║" . sprintf("%-78s", " DETAILED ANALYSIS FOR PID $pid$is_main") . "║\n";
print "╚" . "═"x78 . "╝\n";
# Working directory and binary
print "\n┌─ WORKING DIRECTORY & BINARY " . "─"x49 . "\n";
my $cwd = `readlink /proc/$pid/cwd 2>/dev/null`;
chomp($cwd);
print "CWD: $cwd\n" if $cwd;
my $exe = `readlink /proc/$pid/exe 2>/dev/null`;
chomp($exe);
print "EXE: $exe\n" if $exe;
my $root = `readlink /proc/$pid/root 2>/dev/null`;
chomp($root);
print "ROOT: $root\n" if $root && $root ne '/';
# Environment variables
print "\n┌─ ENVIRONMENT VARIABLES " . "─"x54 . "\n";
my $env = `cat /proc/$pid/environ 2>/dev/null | tr '\\0' '\\n' | grep -E '^(PATH|HOME|USER|LANG|TZ|LD_|PYTHON|JAVA|NODE|PORT|HOST|DB_|API_)' | sort`;
if ($env) {
print $env;
} else {
print "Unable to read environment\n";
}
# Basic process info
print "\n┌─ PROCESS INFO " . "─"x63 . "\n";
my $ps_info = `ps -p $pid -o user=,pid=,ppid=,pri=,ni=,vsz=,rss=,stat=,start=,time=,cmd= 2>/dev/null`;
if ($ps_info) {
print "USER PID PPID PRI NI VSZ RSS STAT START TIME CMD\n";
print $ps_info;
} else {
print "Process no longer exists\n";
next;
}
# Process tree
print "\n┌─ PROCESS TREE " . "─"x63 . "\n";
my $pstree = `pstree -p -a $pid 2>/dev/null`;
if ($pstree) {
print $pstree;
} else {
print "pstree not available\n";
}
# Memory and status
print "\n┌─ MEMORY & STATUS " . "─"x60 . "\n";
my $status = `grep -E 'VmPeak|VmSize|VmRSS|VmSwap|RssAnon|RssFile|Threads|voluntary_ctxt|nonvoluntary_ctxt' /proc/$pid/status 2>/dev/null`;
print $status || "N/A\n";
# Open file descriptors
print "\n┌─ FILE DESCRIPTORS " . "─"x59 . "\n";
my $fd_count = `ls -1 /proc/$pid/fd 2>/dev/null | wc -l`;
chomp($fd_count);
print "Total Open FDs: $fd_count\n";
if ($has_lsof) {
print "\nFile Descriptor Types:\n";
my $fd_types = `lsof +c 0 -p $pid 2>/dev/null | awk 'NR>1 {print \$5}' | sort | uniq -c | sort -rn`;
print $fd_types || "Unable to get FD types\n";
print "\nDetailed File Descriptors:\n";
my $all_fds = `lsof +c 0 -p $pid 2>/dev/null`;
$all_fds =~ s/^/ /mg;
print $all_fds || "No files open\n";
} else {
print "\n(Install lsof for detailed file descriptor analysis)\n";
print "\nOpen FD Sample:\n";
my $fd_sample = `ls -la /proc/$pid/fd 2>/dev/null | head -15`;
print $fd_sample;
}
# Network Connections
print "\n┌─ NETWORK CONNECTIONS " . "─"x56 . "\n";
# tcp connections with details
my $tcp_detailed = `ss -tnp -o 2>/dev/null | grep 'pid=$pid'`;
my $tcp_count = `echo "$tcp_detailed" | grep -c 'pid=$pid'` || 0;
chomp($tcp_count);
print "Active TCP Connections: $tcp_count\n";
if ($tcp_count > 0) {
print "\nTCP Connections (with timers and queues):\n";
print $tcp_detailed;
print "\nConnection State Summary:\n";
my $state_summary = `ss -tnp 2>/dev/null | grep 'pid=$pid' | awk '{print \$1}' | sort | uniq -c | sort -rn`;
print $state_summary;
print "\nLocal Ports in Use:\n";
my $local_ports = `ss -tnp 2>/dev/null | grep 'pid=$pid' | awk '{split(\$4,a,":"); print a[length(a)]}' | sort -n | uniq -c`;
print $local_ports || "None\n";
print "\nRemote Endpoints:\n";
my $remote_ips = `ss -tnp 2>/dev/null | grep 'pid=$pid' | awk '{print \$5}' | cut -d: -f1 | sort | uniq -c | sort -rn`;
print $remote_ips || "None\n";
}
# tcp listening
my $tcp_listen = `ss -tlnp 2>/dev/null | grep 'pid=$pid'`;
if ($tcp_listen) {
print "\nTCP Listening Sockets:\n";
print $tcp_listen;
}
# udp connections
my $udp_count = `ss -unp 2>/dev/null | grep -c 'pid=$pid'`;
chomp($udp_count);
if ($udp_count > 0) {
print "\nUDP Connections: $udp_count\n";
my $udp_conns = `ss -unp 2>/dev/null | grep 'pid=$pid'`;
print $udp_conns;
}
# udp listening
my $udp_listen = `ss -ulnp 2>/dev/null | grep 'pid=$pid'`;
if ($udp_listen) {
print "\nUDP Listening Sockets:\n";
print $udp_listen;
}
# unix sockets
my $unix_sockets = `ss -xp 2>/dev/null | grep 'pid=$pid' | wc -l`;
chomp($unix_sockets);
if ($unix_sockets > 0) {
print "\nUnix Domain Sockets: $unix_sockets\n";
}
# I/O Statistics
print "\n┌─ I/O STATISTICS " . "─"x61 . "\n";
my $io = `cat /proc/$pid/io 2>/dev/null`;
if ($io) {
print $io;
# Parse and show human-readable
my ($read_bytes, $write_bytes);
if ($io =~ /read_bytes:\s*(\d+)/) {
$read_bytes = $1;
}
if ($io =~ /write_bytes:\s*(\d+)/) {
$write_bytes = $1;
}
if (defined $read_bytes && defined $write_bytes) {
print "\nRead: " . $format_bytes->($read_bytes) .
", Write: " . $format_bytes->($write_bytes) . "\n";
}
} else {
print "N/A\n";
}
# Resource Limits
print "\n┌─ RESOURCE LIMITS " . "─"x60 . "\n";
my $limits = `grep -E 'Max open files|Max processes|Max locked memory|Max address space|Max cpu time' /proc/$pid/limits 2>/dev/null`;
print $limits || "N/A\n";
# Cgroup limits
my $cg_path = `cat /proc/$pid/cgroup 2>/dev/null | grep '^0::' | cut -d: -f3`;
chomp($cg_path);
my $cgroup_output = "";
if ($cg_path) {
my $mem_limit = `cat /sys/fs/cgroup$cg_path/memory.max 2>/dev/null`;
my $mem_current = `cat /sys/fs/cgroup$cg_path/memory.current 2>/dev/null`;
my $cpu_max = `cat /sys/fs/cgroup$cg_path/cpu.max 2>/dev/null`;
chomp($mem_limit, $mem_current, $cpu_max);
if ($mem_limit && $mem_limit ne 'max') {
$cgroup_output .= "Memory Limit: " . $format_bytes->(int($mem_limit)) . "\n";
$cgroup_output .= "Memory Current: " . $format_bytes->(int($mem_current)) . "\n" if $mem_current;
if ($mem_current) {
my $pct = sprintf("%.1f", ($mem_current / $mem_limit) * 100);
$cgroup_output .= "Memory Usage: $pct%\n";
}
}
if ($cpu_max && $cpu_max ne 'max') {
$cgroup_output .= "CPU Quota: $cpu_max\n";
}
}
if ($cgroup_output) {
print "\n┌─ CGROUP LIMITS " . "─"x62 . "\n";
print $cgroup_output;
}
# CPU & Scheduling
print "\n┌─ CPU & SCHEDULING " . "─"x59 . "\n";
my $sched = `grep -E 'se.sum_exec_runtime|nr_switches|nr_voluntary_switches|nr_involuntary_switches' /proc/$pid/sched 2>/dev/null | head -4`;
if ($sched) {
print $sched;
}
my $cpuset = `cat /proc/$pid/cpuset 2>/dev/null`;
chomp($cpuset);
print "CPUset: $cpuset\n" if $cpuset;
# Signal handlers
print "\n┌─ SIGNAL HANDLERS " . "─"x60 . "\n";
my $signals = `cat /proc/$pid/status 2>/dev/null | grep -E '^Sig(Cgt|Ign|Blk):'`;
if ($signals) {
print $signals;
# Decode signal masks
my %signal_names = (
1 => 'SIGHUP', 2 => 'SIGINT', 3 => 'SIGQUIT',
4 => 'SIGILL', 5 => 'SIGTRAP', 6 => 'SIGABRT',
7 => 'SIGBUS', 8 => 'SIGFPE', 9 => 'SIGKILL',
10 => 'SIGUSR1', 11 => 'SIGSEGV', 12 => 'SIGUSR2',
13 => 'SIGPIPE', 14 => 'SIGALRM', 15 => 'SIGTERM',
16 => 'SIGSTKFLT', 17 => 'SIGCHLD', 18 => 'SIGCONT',
19 => 'SIGSTOP', 20 => 'SIGTSTP', 21 => 'SIGTTIN',
22 => 'SIGTTOU', 23 => 'SIGURG', 24 => 'SIGXCPU',
25 => 'SIGXFSZ', 26 => 'SIGVTALRM', 27 => 'SIGPROF',
28 => 'SIGWINCH', 29 => 'SIGIO', 30 => 'SIGPWR',
31 => 'SIGSYS'
);
my $decode_sigmask = sub {
my ($hex_mask, $names_ref) = @_;
return "none" if $hex_mask eq '0000000000000000';
# Convert hex to decimal
my $mask = hex($hex_mask);
my @signals;
# Check each bit
for (my $i = 1; $i <= 31; $i++) {
if ($mask & (1 << ($i - 1))) {
push @signals, "$names_ref->{$i}($i)";
}
}
return @signals ? join(", ", @signals) : "none";
};
print "\nDecoded:\n";
if ($signals =~ /SigBlk:\s*([0-9a-f]+)/i) {
print " Blocked: " .
$decode_sigmask->($1, \%signal_names) . "\n";
}
if ($signals =~ /SigIgn:\s*([0-9a-f]+)/i) {
print " Ignored: " .
$decode_sigmask->($1, \%signal_names) . "\n";
}
if ($signals =~ /SigCgt:\s*([0-9a-f]+)/i) {
print " Caught: " .
$decode_sigmask->($1, \%signal_names) . "\n";
}
} else {
print "N/A\n";
}
# Memory maps sum
print "\n┌─ MEMORY MAPS (top 20 by size) " . "─"x47 . "\n";
my $maps = `awk '
/^[0-9a-f]+-[0-9a-f]+/ {hdr=\$0}
/^Size:/ {size=\$2}
/^Rss:/ {rss=\$2}
/^VmFlags:/ { if (rss>0) {print rss"\\t"size"\\t"hdr} rss=0; size=0 }
' /proc/$pid/smaps 2>/dev/null | sort -rn | head -20`;
if ($maps) {
print "RSS(MB)\tSize(MB)\tMapping\n";
foreach my $map_line (split(/\n/, $maps)) {
if ($map_line =~ /^(\d+)\s+(\d+)\s+(.+)$/) {
my $rss_mb = sprintf("%.2f", $1 / 1024);
my $size_mb = sprintf("%.2f", $2 / 1024);
print "$rss_mb\t$size_mb\t\t$3\n";
}
}
} else {
print "Unable to read memory maps\n";
}
# Recent logs
print "\n┌─ RECENT LOGS (last 20 lines) " . "─"x48 . "\n";
my $logs = `journalctl _PID=$pid -b -n 20 --no-pager -o short-precise 2>/dev/null`;
if ($logs && $logs !~ /^-- No entries --/) {
print $logs;
} else {
print "No recent logs found for this PID in current boot\n";
}
print "\n" . "─"x79 . "\n";
}
} else {
print "Stats command is only available on systemd based systems.\n";
$rs = 1;
}
exit $rs;
}
exit 0;
}

View File

@@ -9,6 +9,13 @@ use Getopt::Long qw(:config permute pass_through);
use Term::ANSIColor qw(:constants);
use Pod::Usage;
# Check if root
if ($> != 0) {
die BRIGHT_RED, "Error: ", RESET, BRIGHT_YELLOW,"webmin", RESET,
" command must be run as root\n";
exit 1;
}
my $a0 = $ARGV[0];
sub main {
@@ -280,7 +287,7 @@ sub get_command_path {
}
}
if ($optref->{'commands'} &&
$optref->{'commands'} =~ /^(status|start|stop|restart|reload|force-restart|force-reload|kill)$/) {
$optref->{'commands'} =~ /^(stats|status|start|stop|restart|reload|force-restart|force-reload|kill)$/) {
exit system("$0 server $optref->{'commands'}");
} elsif ($command) {
return $command;

View File

@@ -3121,11 +3121,11 @@ $slave_error = $_[0];
sub get_forward_record_types
{
return ("A", "NS", "CNAME",
return ("A", $config{'support_aaaa'} ? ( "AAAA" ) : ( ), "NS", "CNAME",
$config{'allow_alias'} ? ( "ALIAS" ) : ( ),
"MX", "HINFO", "TXT", "SPF", "DMARC", "WKS", "RP", "PTR", "LOC",
"SRV", "KEY", "TLSA", "SSHFP", "CAA", "NAPTR", "NSEC3PARAM",
$config{'support_aaaa'} ? ( "AAAA" ) : ( ), @extra_forward);
@extra_forward);
}
sub get_reverse_record_types

Binary file not shown.

Before

Width:  |  Height:  |  Size: 202 B

After

Width:  |  Height:  |  Size: 5.8 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 248 B

After

Width:  |  Height:  |  Size: 5.9 KiB

BIN
bind8/images/CAA.gif Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 10 KiB

BIN
bind8/images/NAPTR.gif Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 9.9 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 251 B

After

Width:  |  Height:  |  Size: 10 KiB

BIN
bind8/images/SSHFP.gif Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.5 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 364 B

After

Width:  |  Height:  |  Size: 11 KiB

View File

@@ -262,7 +262,7 @@ edit_upfwd=Update forward?
edit_err=Failed to save record
edit_egone=Selected record no longer exists!
edit_ettl='$1' is not a valid time-to-live
edit_eip='$1' is not a valid IP address
edit_eip='$1' is not a valid IP4 address
edit_eip6='$1' is not a valid IPv6 address
edit_ehost='$1' is not a valid hostname
edit_eserv2='$1' is not a valid service name
@@ -309,8 +309,8 @@ edit_espfa='$1' is not a valid host to allow sending from
edit_espfa2='$1' must be a hostname, not an IP address
edit_espfmx='$1' is not a valid domain name to allow MX sending from
edit_espfmxmax=You are not allowed to have more than 10 domains to allow MX sending from
edit_espfip='$1' is not a valid IP address or IP/prefix to allow sending from
edit_espfip6='$1' is not a valid IPv6 address or IPv6/prefix to allow sending from
edit_espfip='$1' is not a valid IPv4 address or IPv4 prefix to allow sending from
edit_espfip6='$1' is not a valid IPv6 address or IPv6 prefix to allow sending from
edit_espfinclude='$1' is not a valid additional domain from which mail is sent
edit_espfredirect='$1' is not a valid alternate domain name
edit_espfexp='$1' is a valid record name for a rejection message
@@ -394,7 +394,7 @@ boot_err=Download failed
boot_egzip=The root zone file is compressed, but the <tt>gzip</tt> command is not installed on your system!
boot_egzip2=Uncompression of root zone file failed : $1
type_A=Address
type_A=IPv4 Address
type_AAAA=IPv6 Address
type_NS=Name Server
type_CNAME=Name Alias
@@ -417,7 +417,7 @@ type_KEY=Public Key
type_CAA=Certificate Authority
type_NAPTR=Name Authority Pointer
edit_A=Address
edit_A=IPv4 Address
edit_AAAA=IPv6 Address
edit_NS=Name Server
edit_CNAME=Name Alias
@@ -440,7 +440,7 @@ edit_CAA=Certificate Authority
edit_NAPTR=Name Authority Pointer
recs_defttl=Default TTL
recs_A=Address
recs_A=IPv4 Address
recs_AAAA=IPv6 Address
recs_NS=Name Server
recs_CNAME=Name Alias
@@ -464,7 +464,7 @@ recs_CAA=Certificate Authority
recs_NAPTR=Name Authority
recs_delete=Delete Selected
value_A1=Address
value_A1=IPv4 Address
value_AAAA1=IPv6 Address
value_NS1=Name Server
value_CNAME1=Real Name
@@ -511,7 +511,7 @@ value_spfmx=Allow sending from domain's MX hosts?
value_spfptr=Allow sending from any host in domain?
value_spfas=Additional allowed sender hosts
value_spfmxs=Additional allowed sender MX domains
value_spfip4s=Additional allowed sender IP addresses/networks
value_spfip4s=Additional allowed sender IPv4 addresses/networks
value_spfip6s=Additional allowed sender IPv6 addresses/networks
value_spfincludes=Other domains from which mail is sent
value_spfall=Action for other senders

View File

@@ -37,7 +37,7 @@ if (@tls) {
print &ui_columns_end();
}
else {
print "<b>$text{'tls_none'}</b> <p>\n";
print &ui_alert_box($text{'tls_none'}, 'info', undef, undef, "");
}
print &ui_links_row(\@links);

View File

@@ -126,10 +126,11 @@ if ($access{'locale'}) {
if ($access{'theme'}) {
# Show personal theme
my %tinfo = ();
my $tname;
if ($gconfig{'theme'}) {
my ($gtheme, $goverlay) = split(/\s+/, $gconfig{'theme'});
my %tinfo = &webmin::get_theme_info($gtheme);
%tinfo = &webmin::get_theme_info($gtheme);
$tname = $tinfo{'desc'};
}
else {
@@ -140,6 +141,16 @@ if ($access{'theme'}) {
my @overlays = grep { $_->{'overlay'} } @all;
# Main theme
my $tconf_link;
if ($user->{'theme'} && $user->{'theme'} eq $tinfo{'dir'} &&
$tinfo{'config_link'}) {
$tconf_link = &ui_tag('span', &ui_link(
"@{[&get_webprefix()]}/$tinfo{'config_link'}",
&ui_tag('span', '⚙',
{ class => 'theme-config-char',
title => $text{'themes_configure'} }),
'text-link'), { style => 'position: relative;' });
}
print &ui_table_row($text{'index_theme'},
&ui_radio("theme_def", defined($user->{'theme'}) ? 0 : 1,
[ [ 1, &text('index_themeglobal', $tname)."<br>" ],
@@ -149,7 +160,8 @@ if ($access{'theme'}) {
? [ '', $text{'index_themedef'} ]
: (),
map { [ $_->{'dir'}, $_->{'desc'} ] }
@themes ]), undef, [ "valign=top","valign=top" ]);
@themes ]).$tconf_link,
undef, [ "valign=top","valign=top" ]);
# Overlay, if any
if (@overlays) {

View File

@@ -833,7 +833,7 @@ if ($config{'vixie_cron'} && (!$nospecial || $job->{'special'})) {
1, 0, 0, 0, "onChange='change_special_mode(form, 1)'");
$rv .= &ui_table_row($msg,
&ui_radio("special_def", $job->{'special'} ? 1 : 0,
[ [ 1, $text{'edit_special1'}." ".$specialsel ],
[ [ 1, $text{'edit_special1'}."&nbsp;&nbsp;".$specialsel ],
[ 0, $text{'edit_special0'} ] ]),
$msg ? $width-1 : $width);
}
@@ -924,7 +924,7 @@ foreach my $arr ("mins", "hours", "days", "months", "weekdays") {
$table .= &ui_columns_row(\@cols, [ "valign=top", "valign=top", "valign=top",
"valign=top", "valign=top" ]);
$table .= &ui_columns_end();
$table .= $text{'edit_ctrl'};
$table .= &ui_note($text{'edit_ctrl'}, 0);
$rv .= &ui_table_row(undef, $table, $width, undef, ['data-schedule-tr']);
return $rv;
}
@@ -1056,7 +1056,8 @@ foreach $arr ("mins", "hours", "days", "months", "weekdays") {
}
print "</tr></table></td>\n";
}
print "</tr> <tr $cb> <td colspan=5>$text{'edit_ctrl'}</td> </tr>\n";
my $ctlnote = &ui_note($text{'edit_ctrl'}, 0);
print "</tr> <tr $cb> <td colspan=5>$ctlnote</td> </tr>\n";
}
=head2 parse_times_input(&job, &in)

View File

@@ -230,9 +230,9 @@ if ($in{'search'}) {
# Show search form
print &ui_form_start("index.cgi");
print "$text{'index_search'}:&nbsp;\n";
print "$text{'index_search'} &nbsp;\n";
print &ui_textbox("search", $in{'search'}, 20);
print &ui_submit($text{'index_ok'});
print &ui_submit($text{'ui_searchok'});
print &ui_form_end();
# Check if we are over the display limit

View File

@@ -27,7 +27,7 @@ index_enable=تمكين الوظائف المختارة
index_esearch=لا توجد وظائف تطابق بحثك عن$1.
index_toomany2=هناك الكثير من الوظائف لا تظهر. استخدم نموذج البحث أعلاه للحد من القائمة.
index_search=العثور على وظائف مطابقة كرون
index_ok=بحث
ui_searchok=بحث
index_searchres=وظائف Cron مطابقة$1 ..
index_reset=إعادة ضبط البحث.
index_econfigcheck=لا يمكن إدارة مهام Cron على نظامك ، لأن تكوين الوحدة غير صالح :$1

View File

@@ -25,7 +25,7 @@ index_enable=Включи избраните задачи
index_esearch=Няма задачи, които да съответстват на търсенето ви за $1.
index_toomany2=Задачите са твърде много, за да бъдат показани. Използвайте системата за търсене по-горе, за да ограничите списъка.
index_search=Открий задачи на Cron, които съответстват
index_ok=Търсене
ui_searchok=Търсене
index_searchres=Задачи на Cron, които съответстват на $1 ..
index_reset=Инициализиране на търсенето.
index_econfigcheck=Задачите на Cron не могат да бъдат управлявани във вашата система, тъй като конфигурацията на модула не е валидна : $1

View File

@@ -27,7 +27,7 @@ index_enable=Activa els Treballs Seleccionats
index_esearch=No hi ha cap treball que coincideixi amb la recerca de $1.
index_toomany2=Hi ha massa treballs per mostrar. Utilitza el formulari de cerca de dalt per limitar la llista.
index_search=Busca els treballs Cron que coincideixin amb
index_ok=Busca
ui_searchok=Busca
index_searchres=Treballs cron que coincideixen amb...
index_reset=Reinici la cerca.
index_econfigcheck=No es poden gestionar treballs Cron al sistema perquè la configuració del mòdul no és vàlida: $1

View File

@@ -23,7 +23,7 @@ index_enable=Zapnout vybrané úlohy
index_esearch=Žádné úlohy neodpovídají vyhledávací podmínce $1.
index_toomany2=Příliš mnoho úloh k zobrazení. Použijte formulář vyhledávání k omezení jejich počtu.
index_search=Najít úlohy Cronu odpovídající podmínce
index_ok=Hledat
ui_searchok=Hledat
index_searchres=Úlohy Cronu vyhovující $1 ..
index_reset=Resetovat hledání.
index_econfigcheck=Úlohy Cronu nelze na Vašem systému spravovat, dokud nebude konfigurace modulu v pořádku: $1

View File

@@ -27,7 +27,7 @@ index_enable=Aktivér valgte job
index_esearch=Ingen job matchede din søgning efter $1.
index_toomany2=Der er for mange job at vise. Brug søgeformen ovenfor til at begrænse listen.
index_search=Find matchende Cron-job
index_ok=Søg
ui_searchok=Søg
index_searchres=Cron job matchende $1 ..
index_reset=Nulstil søgning.
index_econfigcheck=Cron-job kan ikke administreres på dit system, da modulkonfigurationen ikke er gyldig : $1

View File

@@ -27,7 +27,7 @@ index_enable=Ausgewählte Jobs aktivieren
index_esearch=Keine Jobs entsprechen Ihrer Suche nach $1.
index_toomany2=Es gibt zu viele Jobs, um sie anzuzeigen. Verwenden Sie das Suchformular oben, um die Liste zu begrenzen.
index_search=Finde passende Cron-Jobs
index_ok=Suche
ui_searchok=Suche
index_searchres=Cron-Jobs, die $1 entsprechen ..
index_reset=Suche zurücksetzen.
index_econfigcheck=Cron-Jobs können auf Ihrem System nicht verwaltet werden, da die Modulkonfiguration ungültig ist: $1

View File

@@ -27,7 +27,7 @@ index_enable=Ενεργοποίηση επιλεγμένων εργασιών
index_esearch=Καμία εργασία δεν ταιριάζει με την αναζήτησή σας για $1.
index_toomany2=Υπάρχουν πάρα πολλές δουλειές για προβολή. Χρησιμοποιήστε τη φόρμα αναζήτησης παραπάνω για να περιορίσετε τη λίστα.
index_search=Βρείτε τις αντιστοιχίες εργασιών Cron
index_ok=Αναζήτηση
ui_searchok=Αναζήτηση
index_searchres=Οι εργασίες Cron αντιστοιχούν στο $1 ..
index_reset=Επαναφορά αναζήτησης.
index_econfigcheck=Δεν είναι δυνατή η διαχείριση των εργασιών Cron στο σύστημά σας, καθώς η διαμόρφωση της μονάδας δεν είναι έγκυρη : $1

View File

@@ -27,7 +27,7 @@ index_enable=Enable Selected Jobs
index_esearch=No jobs matched your search for $1.
index_toomany2=There are too many jobs to show. Use the search form above to limit the list.
index_search=Find Cron jobs matching
index_ok=Search
ui_searchok=Search
index_searchres=Cron jobs matching $1 ..
index_reset=Reset search.
index_econfigcheck=Cron jobs cannot be managed on your system, as the module configuration is not valid : $1
@@ -63,8 +63,8 @@ edit_run=Run Now
edit_saverun=Save and Run Now
edit_clone=Clone Job
edit_return=cron job
edit_ctrl=Note: Ctrl-click (or command-click on the Mac) to select and de-select minutes, hours, days and months.
edit_special1=Simple schedule ..
edit_ctrl=Tip: Use Ctrl-click (or -click on Mac) to select or deselect multiple items, or Shift-click to select a range
edit_special1=Simple schedule
edit_special0=Times and dates selected below ..
edit_special_hourly=Hourly
edit_special_daily=Daily (at midnight)

View File

@@ -10,7 +10,7 @@ index_enable=Habilitar trabajos seleccionados
index_esearch=Ningún trabajo coincide con su búsqueda de $1.
index_toomany2=Hay demasiados trabajos para mostrar. Use el formulario de búsqueda anterior para limitar la lista.
index_search=Encuentra trabajos de Cron que coincidan
index_ok=Buscar
ui_searchok=Buscar
index_searchres=Cron empleos que coinciden con $1 ..
index_reset=Restablecer búsqueda.
index_econfigcheck=Los trabajos Cron no se pueden administrar en su sistema, ya que la configuración del módulo no es válida : $1

View File

@@ -27,7 +27,7 @@ index_enable=Gaitu hautatutako lanak
index_esearch=Ez da lanik datorren $1 bilaketarekin.
index_toomany2=Lanpostu gehiegi daude erakusteko. Erabili goiko inprimakia zerrenda mugatzeko.
index_search=Aurkitu Cron lanekin bat datozenak
index_ok=Search
ui_searchok=Search
index_searchres=$1 datozen Cron lanak.
index_reset=Bilaketa berrezarri.
index_econfigcheck=Cron lanak ezin dira zure sisteman kudeatu, moduluaren konfigurazioa ez baita baliozkoa : $1

View File

@@ -14,7 +14,7 @@ index_enable=مشاغل انتخاب شده را فعال کنید
index_esearch=هیچ مشاقی با جستجوی$1 شما مطابقت ندارد.
index_toomany2=کارهای بسیار زیادی برای نشان دادن وجود دارد. برای محدود کردن لیست از فرم جستجو در بالا استفاده کنید.
index_search=تطبیق کار Cron را پیدا کنید
index_ok=جستجو کردن
ui_searchok=جستجو کردن
index_searchres=مشاغل کرون مطابق با$1 ..
index_reset=تنظیم مجدد جستجو
index_econfigcheck=مشاغل Cron روی سیستم شما قابل مدیریت نیست ، زیرا پیکربندی ماژول معتبر نیست :$1

View File

@@ -27,7 +27,7 @@ index_enable=Ota valitut työt käyttöön
index_esearch=Yksikään työ ei vastannut hakutulosta $1.
index_toomany2=Työpaikkoja on liian paljon näytettäväksi. Rajoita luetteloa yllä olevan hakulomakkeen avulla.
index_search=Etsi sopivia Cron-töitä
index_ok=Hae
ui_searchok=Hae
index_searchres=Cron-työt, jotka vastaavat $1 ..
index_reset=Nollaa haku.
index_econfigcheck=Cron-töitä ei voida hallita järjestelmässäsi, koska moduulin kokoonpano ei ole kelvollinen : $1

View File

@@ -24,7 +24,7 @@ index_enable=Activer les tâches sélectionnées
index_esearch=Aucune tâche ne correspond à votre recherche pour $1.
index_toomany2=Il y a trop de tâches à montrer. Utilisez le formulaire de recherche ci-dessus pour limiter la liste.
index_search=Trouver les tâches Cron correspondantes
index_ok=Rechercher
ui_searchok=Rechercher
index_searchres=Les tâches Cron correspondent à $1 ...
index_reset=Réinitialiser la recherche
index_econfigcheck=Les tâches Cron ne peuvent pas être gérées sur votre système car la configuration du module n'est pas valide : $1

View File

@@ -6,7 +6,7 @@ index_ecrondir_create=Pokušajte stvoriti direktorij poslova $1 ?
index_esearch=Nijedan posao ne odgovara vašoj pretrazi za $1.
index_toomany2=Previše je poslova za pokazati. Upotrijebite gornji obrazac za pretraživanje da biste ograničili popis.
index_search=Pronađite Cron poslove koji se podudaraju
index_ok=traži
ui_searchok=traži
index_searchres=Cron poslovi koji odgovaraju $1 ..
index_reset=Poništi pretraživanje.
index_econfigcheck=Cron poslovi ne mogu se upravljati u vašem sustavu, jer konfiguracija modula nije valjana : $1

View File

@@ -27,7 +27,7 @@ index_enable=Kiválasztott munka engedélyezése
index_esearch=Nem található a keresett $1
index_toomany2=Túl sok megjelenítendő munka. Használja a keresési mezőt a lista szűrésére!
index_search=Időzített feladat (Cron munka) keresése:
index_ok=Keresés
ui_searchok=Keresés
index_searchres=Egyező Cron munkák: $1 ..
index_reset=Keresés visszaállítása.
index_econfigcheck=A Cron munkákat nem tudjuk kezelni az ön rendszerén, mivel a modul beállítások nem megfelelőek: $1

View File

@@ -6,7 +6,7 @@ index_ecrondir_create=Prova a creare la directory dei lavori $1 ?
index_esearch=Nessun lavoro corrisponde alla tua ricerca per $1.
index_toomany2=Ci sono troppi lavori da mostrare. Utilizzare il modulo di ricerca sopra per limitare l'elenco.
index_search=Trova i lavori Cron corrispondenti
index_ok=Ricerca
ui_searchok=Ricerca
index_searchres=Cron lavori corrispondenti a $1 ..
index_reset=Reimposta ricerca.
index_econfigcheck=I lavori Cron non possono essere gestiti sul sistema in quanto la configurazione del modulo non è valida : $1

View File

@@ -15,7 +15,7 @@ index_enable=選択したジョブを有効にする
index_esearch=$1の検索に一致するジョブはありません。
index_toomany2=表示するジョブが多すぎます。上記の検索フォームを使用して、リストを制限します。
index_search=一致するCronジョブを検索
index_ok=探す
ui_searchok=探す
index_searchres=$1に一致するCronジョブ ..
index_reset=検索をリセットします。
index_econfigcheck=モジュール構成が無効であるため、cronジョブをシステムで管理できません $1

View File

@@ -19,7 +19,7 @@ index_enable=선택된 작업 사용
index_esearch=$1 에 대한 검색과 일치하는 작업이 없습니다.
index_toomany2=표시 할 작업이 너무 많습니다. 위의 검색 양식을 사용하여 목록을 제한하십시오.
index_search=일치하는 Cron 작업 찾기
index_ok=검색
ui_searchok=검색
index_searchres=$1 과 (와) 일치하는 Cron 작업
index_reset=검색을 재설정하십시오.
index_econfigcheck=모듈 구성이 유효하지 않으므로 시스템에서 Cron 작업을 관리 할 수 없습니다 : $1

View File

@@ -23,7 +23,7 @@ index_enable=Membolehkan Tugas Terpilih
index_esearch=Tiada tugas yang sepadan dengan carian anda untuk $1.
index_toomany2=Terdapat terlalu banyak tugas untuk dipaparkan. Guna borang carian di atas untuk menghadkan senarai.
index_search=Mencari tugas Cron yang sepadan
index_ok=Carian
ui_searchok=Carian
index_searchres=Tugas Cron yang sepadan $1 ..
index_reset=Tetapan semula carian.
index_econfigcheck=Tugas Cron tidak boleh diuruskan pada sistem anda, seperti konfigurasi modul itu tidak sah: $1

View File

@@ -23,7 +23,7 @@ index_enable=Aanzetten Geselecteerde Taken
index_esearch=Geen taken komen overeen voor de zoekopdracht naar $1
index_toomany2=Er zijn teveel jobs om te laten zien. Gebruik het zoek formulier hierboven om een kleinere lijst te krijgen.
index_search=Vind cron jobs die overeenkomen met
index_ok=Zoeken
ui_searchok=Zoeken
index_searchres=Cron taken die overeenkomen met $1..
index_reset=Reset Zoeken
index_econfigcheck=Cron jobs kunnen niet beheerd worden op uw systeem, omdat de module configuratie niet geldig is : $1

View File

@@ -27,7 +27,7 @@ index_enable=Slå på valgte jobber
index_esearch=Ingen jobber stemte med søket ditt etter $1.
index_toomany2=Det er for mange jobber å vise. Bruk søkeskjemaet ovenfor til å begrense listen.
index_search=Finn Cron jobber som stemmer med
index_ok=Søk
ui_searchok=Søk
index_searchres=Cron jobber som stemmer med $1 ..
index_reset=Tilbakestill søk.
index_econfigcheck=Cron jobber kan ikke vedlikeholdes på systemet ditt, da modulkonfigurasjonen ikke er gyldig : $1

View File

@@ -27,7 +27,7 @@ index_enable=Włącz wybrane zadania
index_esearch=Brak zadań pasujących do wyszukiwania $1.
index_toomany2=Za dużo zadań do wyświetlenia. Użyj wyszukiwania powyżej, aby ograniczyć listę.
index_search=Znajdź zadania Cron pasujące do
index_ok=Szukaj
ui_searchok=Szukaj
index_searchres=Zadania Cron pasujące do $1 ..
index_reset=Resetuj wyszukiwanie.
index_econfigcheck=Zarządzanie zadaniami Cron nie jest możliwe na Twoim systemie, ponieważ konfiguracja modułu jest nieprawidłowa: $1

View File

@@ -19,7 +19,7 @@ index_enable=Ativar trabalhos selecionados
index_esearch=Nenhum trabalho corresponde à sua pesquisa por $1.
index_toomany2=Existem muitos empregos para mostrar. Use o formulário de pesquisa acima para limitar a lista.
index_search=Encontrar Cron empregos correspondentes
index_ok=Procurar
ui_searchok=Procurar
index_searchres=Trabalhos Cron correspondentes a $1 ..
index_reset=Redefinir pesquisa.
index_econfigcheck=Trabalhos Cron não podem ser gerenciados no seu sistema, pois a configuração do módulo não é válida : $1

View File

@@ -23,7 +23,7 @@ index_enable=Habilitar Tarefas Selecionadas
index_esearch=Nenhuma tarefa foi encontrada usando o termo de busca $1.
index_toomany2=Há muitas tarefas para exibir. Use os filtros de busca acima para limitar a lista.
index_search=Encontrar tarefas Cron com a expressão
index_ok=Procurar
ui_searchok=Procurar
index_searchres=Tarefas Cron com a expressão $1 ..
index_reset=Limpar busca.
index_econfigcheck=Não é possível gerenciar tarefas Cron no seu sistema, pois a configuração de módulo não é válida: $1

View File

@@ -27,7 +27,7 @@ index_enable=Включить Выбранные Задания
index_esearch=По вашему запросу $1 не найдено ни одного задания.
index_toomany2=Слишком много вариантов. Воспользуйтесь поиском выше, чтобы ограничить результат.
index_search=Найти подходящие задания Cron
index_ok=Поиск
ui_searchok=Поиск
index_searchres=Задания Cron, соответствующие $1 ..
index_reset=Сбросить поиск.
index_econfigcheck=Заданиями Cron нельзя управлять в вашей системе, так как конфигурация модуля неверна : $1

View File

@@ -25,7 +25,7 @@ index_enable=Povoliť vybrané úlohy
index_esearch=Vášmu vyhľadávaniu pre $1 nezodpovedali žiadne úlohy.
index_toomany2=Je príliš veľa pracovných miest na zobrazenie. Zoznam obmedzíte pomocou vyhľadávacieho formulára vyššie.
index_search=Nájdite zodpovedajúce úlohy spoločnosti Cron
index_ok=Vyhľadávanie
ui_searchok=Vyhľadávanie
index_searchres=Cron pracovných miest zodpovedá $1 ..
index_reset=Obnoviť vyhľadávanie.
index_econfigcheck=Vo vašom systéme nie je možné spravovať úlohy Cron, pretože konfigurácia modulu nie je platná : $1

View File

@@ -19,7 +19,7 @@ index_enable=Aktivera utvalda jobb
index_esearch=Inga jobb matchade din sökning efter $1.
index_toomany2=Det finns för många jobb att visa. Använd sökformuläret ovan för att begränsa listan.
index_search=Hitta Cron jobb matchning
index_ok=Sök
ui_searchok=Sök
index_searchres=Cron jobb matchar $1 ..
index_reset=Återställ sökningen.
index_econfigcheck=Cron-jobb kan inte hanteras på ditt system, eftersom modulkonfigurationen inte är giltig : $1

View File

@@ -13,7 +13,7 @@ index_enable=Seçilen İşleri Etkinleştir
index_esearch=$1 için aramanızla eşleşen iş yok.
index_toomany2=Gösterilecek çok fazla iş var. Listeyi sınırlamak için yukarıdaki arama formunu kullanın.
index_search=Eşleşen Cron işlerini bulun
index_ok=Arama
ui_searchok=Arama
index_searchres=$1 ile eşleşen Cron işleri
index_reset=Aramayı sıfırla.
index_econfigcheck=Modül yapılandırması geçerli olmadığı için Cron işleri sisteminizde yönetilemiyor : $1

View File

@@ -19,7 +19,7 @@ index_enable=Увімкнути вибрані завдання
index_esearch=Жодна робота не відповідала вашому пошуку для $1.
index_toomany2=Занадто багато робочих місць для показу. Використовуйте форму пошуку вище, щоб обмежити список.
index_search=Знайдіть відповідність завданням Cron
index_ok=Пошук
ui_searchok=Пошук
index_searchres=Завдання Cron відповідають $1.
index_reset=Скинути пошук.
index_econfigcheck=Завданнями Cron не можна керувати у вашій системі, оскільки конфігурація модуля недійсна : $1

View File

@@ -18,7 +18,7 @@ index_enable=启用所选作业
index_esearch=没有职位与您对 $1的搜索匹配。
index_toomany2=有太多工作要显示。使用上面的搜索表单来限制列表。
index_search=查找匹配的Cron职位
index_ok=搜索
ui_searchok=搜索
index_searchres=与 $1..相匹配的Cron作业
index_reset=重置搜索。
index_econfigcheck=Cron作业无法在您的系统上管理因为模块配置无效 $1

View File

@@ -19,7 +19,7 @@ index_enable=啟用所選作業
index_esearch=沒有職位與您對 $1的搜索匹配。
index_toomany2=有太多工作要顯示。使用上面的搜索表單來限制列表。
index_search=查找匹配的Cron職位
index_ok=搜索
ui_searchok=搜索
index_searchres=與 $1..相匹配的Cron作業
index_reset=重置搜索。
index_econfigcheck=Cron作業無法在您的系統上管理因為模塊配置無效 $1

View File

@@ -647,5 +647,4 @@ else {
}
}
1;

View File

@@ -85,7 +85,11 @@ else {
if ($in{"protocol_$i"}) {
push(@opts, "protocol=".$in{"protocol_$i"});
}
push(@opts, split(/\s+/, $in{"others_$i"}));
foreach my $oo (split(/\s+/, $in{"others_$i"})) {
my ($n, $v) = split(/=/, $oo, 2);
$v = "\"$v\"" if ($v =~ /\s|,|=/ && $v !~ /['"]/);
push(@opts, "$n=$v");
}
push(@actions, $in{"action_$i"}."[".join(", ", @opts)."]");
}

View File

@@ -12,7 +12,7 @@ if( $in{ 'action' } eq $text{ 'hdparm_apply' } )
local $key;
foreach $key ( 'a', 'd', 'r', 'k', 'u', 'm', 'c', 'A', 'K', 'P', 'X', 'W', 'S' )
{
$command .= "-".$key." ".$in{ $key }." " if( $in{ $key } ne "" );
$command .= "-".$key." ".quotemeta($in{$key})." " if ($in{$key} ne "");
}
$command .= $in{ 'drive' }."\n";

View File

@@ -50,7 +50,7 @@ if ($action ne '-b' && $action ne '-k') {
$types .= " ".join(' ', @extra) ;
}
}
my $args = quotemeta($action)." ".$types." ".quotemeta($recursive);
my $args = quotemeta($action)." ".$types." ".$recursive;
$args =~ s/\s+/ /g;
$args = &trim($args);
foreach my $file (@files) {

View File

@@ -30,10 +30,13 @@ if (!$in{'new'}) {
$dstmode = 1;
($dstportlow, $dstporthigh) = ($1, $2);
}
else {
elsif ($dstports) {
$dstmode = 0;
$dstport = $dstports;
}
else {
$dstmode = 2;
}
}
else {
&ui_print_header(undef, $text{'forward_create'}, "");

View File

@@ -280,7 +280,7 @@ return $? ? $out : undef;
sub parse_firewalld_forward
{
my ($str) = @_;
my %w = map { split(/=/, $_) } split(/:/, $str);
my %w = map { split(/=/, $_, 2) } split(/:/, $str);
return ($w{'port'}, $w{'proto'}, $w{'toport'}, $w{'toaddr'});
}

View File

@@ -16,9 +16,9 @@ my $timeout = $gconfig{'passreset_timeout'} || 15;
$remote_user && &error($text{'forgot_elogin'});
$ENV{'HTTPS'} eq 'ON' || $gconfig{'forgot_pass'} == 2 ||
&error($text{'forgot_essl'});
$ENV{'SSL_HOST_CERT'} == 1 ||
$ENV{'SSL_CN_CERT'} == 1 ||
&error(&text('forgot_esslhost',
&html_escape($ENV{'HTTP_HOST'} || $ENV{'SSL_HOST'})))
&html_escape($ENV{'HTTP_HOST'} || $ENV{'SSL_CN'})))
if ($ENV{'HTTPS'} eq 'ON');
# Check that the random ID is valid

View File

@@ -15,9 +15,9 @@ $gconfig{'forgot_pass'} || &error($text{'forgot_ecannot'});
$remote_user && &error($text{'forgot_elogin'});
$ENV{'HTTPS'} eq 'ON' || $gconfig{'forgot_pass'} == 2 ||
&error($text{'forgot_essl'});
$ENV{'SSL_HOST_CERT'} == 1 ||
$ENV{'SSL_CN_CERT'} == 1 ||
&error(&text('forgot_esslhost',
&html_escape($ENV{'HTTP_HOST'} || $ENV{'SSL_HOST'})))
&html_escape($ENV{'HTTP_HOST'} || $ENV{'SSL_CN'})))
if ($ENV{'HTTPS'} eq 'ON');
&ui_print_header(undef, $text{'forgot_title'}, "", undef, undef, 1, 1);

View File

@@ -14,9 +14,9 @@ $gconfig{'forgot_pass'} || &error($text{'forgot_ecannot'});
$remote_user && &error($text{'forgot_elogin'});
$ENV{'HTTPS'} eq 'ON' || $gconfig{'forgot_pass'} == 2 ||
&error($text{'forgot_essl'});
$ENV{'SSL_HOST_CERT'} == 1 ||
$ENV{'SSL_CN_CERT'} == 1 ||
&error(&text('forgot_esslhost',
&html_escape($ENV{'HTTP_HOST'} || $ENV{'SSL_HOST'})))
&html_escape($ENV{'HTTP_HOST'} || $ENV{'SSL_CN'})))
if ($ENV{'HTTPS'} eq 'ON');
# Lookup the Webmin user

View File

@@ -118,12 +118,14 @@ if ($out && $dump->{'email'} && &foreign_check("mailboxes")) {
# Send the email
if (!$ok || !$config{'error_email'}) {
# Only send email upon failure, or it requested always
&mailboxes::send_text_mail(&mailboxes::get_from_address(),
$dump->{'email'},
undef,
$subject,
$data,
$config{'smtp_server'});
&mailboxes::send_text_mail(
&mailboxes::get_from_address(),
$dump->{'email'} eq '*' ? $gconfig{'webmin_email_to'}
: $dump->{'email'},
undef,
$subject,
$data,
$config{'smtp_server'});
}
}

View File

@@ -6,6 +6,7 @@ require './fsdump-lib.pl';
&foreign_require("cron", "cron-lib.pl");
&ReadParse();
$wet = $gconfig{'webmin_email_to'};
if (!$in{'id'}) {
# Adding a new backup of some type
$access{'edit'} || &error($text{'dump_ecannot1'});
@@ -32,7 +33,7 @@ if (!$in{'id'}) {
$dump = { 'dir' => $in{'dir'},
'fs' => $fs,
'rsh' => &has_command("ssh"),
'email' => $gconfig{'webmin_email_to'},
'email' => $wet ? '*' : undef,
$config{'simple_sched'} ?
( 'special' => 'daily' ) :
( 'mins' => '0',
@@ -144,7 +145,10 @@ print &ui_table_row(&hlink($text{'edit_enabled'}, "enabled"),
# Email address to send output to
print &ui_table_row(&hlink($text{'edit_email'}, "email"),
&ui_textbox("email", $dump->{'email'}, 30), 3, \@tds);
$wet ? &ui_opt_textbox("email",
$dump->{'email'} eq '*' ? undef : $dump->{'email'},
40, &text('edit_email_def', "<tt>$wet</tt>"))
: &ui_textbox("email", $dump->{'email'}, 40));
# Subject line for email message
print &ui_table_row(&hlink($text{'edit_subject'}, "subject"),

View File

@@ -128,6 +128,7 @@ edit_savenow=Save and Backup Now
edit_createnow=Create and Backup Now
edit_return=backup
edit_email=Email scheduled output to
edit_email_def=Webmin default ($1)
edit_subject=Email message subject
edit_restore=Restore ..
edit_to=$1 to $2

View File

@@ -72,7 +72,7 @@ else {
}
$dump->{'dir'} = $in{'dir'};
$dump->{'fs'} = $in{'fs'};
$dump->{'email'} = $in{'email'};
$dump->{'email'} = $in{'email_def'} ? '*' : $in{'email'};
$dump->{'subject'} = $in{'subject_def'} ? undef : $in{'subject'};
if ($access{'extra'}) {
$dump->{'extra'} = $in{'extra'};

Binary file not shown.

Before

Width:  |  Height:  |  Size: 4.7 KiB

After

Width:  |  Height:  |  Size: 5.8 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 4.7 KiB

After

Width:  |  Height:  |  Size: 5.9 KiB

View File

@@ -505,6 +505,10 @@ details.inline.fit > summary + span {
display: inline-block;
}
details summary {
cursor: pointer;
}
[data-second-print]:has(details) + br:has(+[data-x-br]) {
display: none;
}

View File

@@ -319,6 +319,8 @@ progress_incache=Found $1 in cache ..
readparse_cdheader=Missing Content-Disposition header
readparse_enc=Expecting form-data encoding, but got normal encoding
readparse_max=Data exceeded maximum size of $1 bytes
readparse_nofile=Missing filename for upload
readparse_cannotdir=Cannot open upload directory $1 : $2
password_expired=Your password has expired, and a new one must be chosen.
password_temp=You must select a new password to replace your temporary login.

View File

@@ -21,6 +21,7 @@ journal_since0=Latest available
journal_since1=Real-time follow
journal_since2=Current boot
journal_since2-1=Last boot
journal_since30=30 days ago
journal_since3=7 days ago
journal_since4=24 hours ago
journal_since5=8 hours ago

View File

@@ -36,6 +36,7 @@ return [
{ "--follow" => $text{'journal_since1'} },
{ "--boot" => $text{'journal_since2'} },
{ "--boot -1" => $text{'journal_since2-1'} },
{ "--since '30 days ago'" => $text{'journal_since30'} },
{ "--since '7 days ago'" => $text{'journal_since3'} },
{ "--since '24 hours ago'" => $text{'journal_since4'} },
{ "--since '8 hours ago'" => $text{'journal_since5'} },

View File

@@ -2594,6 +2594,7 @@ close(MAIL);
local @st = stat($file);
$mail->{'size'} = $st[7];
$mail->{'time'} = $st[9];
$mail->{'ctime'} = $st[10];
# Set read flags based on the name
if ($_[0] =~ /:2,([A-Za-z]*)$/) {

View File

@@ -97,13 +97,13 @@ mail_reset=Clear
mail_logout=Change POP3 login
mail_logout2=Change IMAP login
mail_sig=Edit Signature
mail_jump=Jump to page :
mail_jump=Jump to page
mail_of=of
mail_replyto=Reply to
mail_folder=Folder
mail_delall=Delete All
mail_deltrash=Empty Trash
mail_search2=Search for:
mail_search2=Search for
mail_search3=Find with score above:
mail_advanced=Advanced Search
mail_return2=User Email
@@ -179,7 +179,7 @@ view_crypt_4=Encrypted portion of message was successfully decrypted.
view_recv=<a href='$2'>Fetch key ID $1 from keyserver</a>.
view_folder=Return to mailbox
view_dheader=Detach attachment to server
view_detach=Detach file:
view_detach=Detach file
view_dall=&lt;All files&gt;
view_dir=to server file or directory:
view_black=Block Sender

View File

@@ -90,7 +90,7 @@ mail_reset=Clear
mail_logout=Change POP3 login
mail_logout2=Change IMAP login
mail_sig=Edit Signature
mail_jump=Jump to page :
mail_jump=Jump to page
mail_of=of
mail_replyto=Reply to
mail_folder=Folder

View File

@@ -109,7 +109,7 @@ if ($product eq "webmin") {
$size = int(`du -sk $tmp_dir`);
@deps = ( "perl", "libnet-ssleay-perl", "openssl", "libauthen-pam-perl", "libpam-runtime", "libio-pty-perl", "unzip", "shared-mime-info", "tar", "libdigest-sha-perl", "libdigest-md5-perl", "gzip" );
$deps = join(", ", @deps);
@recommends = ( "libdatetime-perl", "libdatetime-timezone-perl", "libdatetime-locale-perl", "libtime-piece-perl", "libencode-detect-perl", "libtime-hires-perl", "libsocket6-perl", "html2text", "qrencode", "libdbi-perl", "libdbd-mysql-perl", "libjson-xs-perl" );
@recommends = ( "libdatetime-perl", "libdatetime-timezone-perl", "libdatetime-locale-perl", "libtime-piece-perl", "libencode-detect-perl", "libtime-hires-perl", "libsocket6-perl", "html2text", "qrencode", "libdbi-perl", "libdbd-mysql-perl", "libjson-xs-perl", "libsys-syslog-perl" );
$recommends = join(", ", @recommends);
open(CONTROL, ">$control_file");
print CONTROL <<EOF;

View File

@@ -241,6 +241,7 @@ if ($< == 0) {
system("cd $usr_dir && chown -R root:bin .");
}
system("find $usr_dir -name .git | xargs rm -rf");
system("find $usr_dir -name .github | xargs rm -rf");
system("find $usr_dir -name RELEASE | xargs rm -rf");
system("find $usr_dir -name RELEASE.sh | xargs rm -rf");
if (-r "$usr_dir/$mod/EXCLUDE") {

View File

@@ -34,7 +34,7 @@ my $allow_overwrite = 0;
my ($force_theme, $no_prefix, $set_prefix,
$obsolete_wbm, $vendor, $url, $force_usermin, $final_mod, $sign, $keyname,
$epoch, $dir, $ver, @exclude,
$epoch, $dir, $ver, @exclude, $copy_tar,
$rpmdepends, $norpmdepends, $rpmrecommends, $norpmrecommends,
$no_requires, $no_recommends, $no_suggests, $no_conflicts, $no_provides,
@@ -136,6 +136,9 @@ while(@ARGV) {
elsif ($a eq "--mod-list") {
$mod_list = shift(@ARGV);
}
elsif ($a eq "--copy-tar") {
$copy_tar = 1;
}
elsif ($a =~ /^\-\-/) {
print STDERR "Unknown option $a\n";
exit(1);
@@ -260,6 +263,7 @@ my $ucprog = ucfirst($prog);
system("/bin/mkdir -p /tmp/makemodulerpm");
system("cd $par && /bin/cp -rpL $source_mod /tmp/makemodulerpm/$mod");
system("/usr/bin/find /tmp/makemodulerpm -name .git | xargs rm -rf");
system("/usr/bin/find /tmp/makemodulerpm -name .github | xargs rm -rf");
system("/usr/bin/find /tmp/makemodulerpm -name RELEASE | xargs rm -rf");
system("/usr/bin/find /tmp/makemodulerpm -name RELEASE.sh | xargs rm -rf");
system("/usr/bin/find /tmp/makemodulerpm -name t | xargs rm -rf");
@@ -556,6 +560,15 @@ fi
EOF
close($SPEC);
# Put the tar in /tmp too if tar package is requested
my $tar_release_file;
if ($copy_tar) {
my $tar_release = $release;
$tar_release =~ s/^[0-9]+//;
$tar_release_file = "$prefix$mod-$ver$tar_release.tar.gz";
system("cp $rpm_source_dir/$mod.tar.gz /tmp/$tar_release_file");
}
# Build the actual RPM
my $cmd = -x "/usr/bin/rpmbuild" ? "/usr/bin/rpmbuild" : "/bin/rpm";
system("$cmd -ba $spec_dir/$prefix$mod.spec") && exit;
@@ -570,10 +583,20 @@ if ($sign) {
if ($target_dir =~ /:/) {
# scp to dest
system("scp $rpm_dir/$prefix$mod-$ver-$release.noarch.rpm $target_dir/$prefix$mod-$ver-$release.noarch.rpm");
# scp the tar too if requested
if ($copy_tar) {
system("scp /tmp/$tar_release_file $target_dir/$tar_release_file");
unlink("/tmp/$tar_release_file");
}
}
elsif ($rpm_dir ne $target_dir) {
# Just copy
system("/bin/cp $rpm_dir/$prefix$mod-$ver-$release.noarch.rpm $target_dir/$prefix$mod-$ver-$release.noarch.rpm");
# Copy the tar too if requested
if ($copy_tar) {
system("/bin/cp /tmp/$tar_release_file $target_dir/$tar_release_file");
unlink("/tmp/$tar_release_file");
}
}
# read_file(file, &assoc, [&order], [lowercase])

View File

@@ -88,7 +88,7 @@ Release: $rel
Provides: %{name}-%{version} perl(WebminCore)
Requires(pre): /usr/bin/perl
Requires: /bin/sh /usr/bin/perl perl(lib) perl(open) perl(Net::SSLeay) perl(Time::Local) perl(Data::Dumper) perl(File::Path) perl(File::Basename) perl(Digest::SHA) perl(Digest::MD5) openssl unzip tar gzip
Recommends: perl(DateTime) perl(DateTime::TimeZone) perl(DateTime::Locale) perl(Time::Piece) perl(Encode::Detect) perl(Time::HiRes) perl(Socket6) html2text shared-mime-info perl-File-Basename perl-File-Path perl-JSON-XS qrencode perl(DBI) perl(DBD::mysql)
Recommends: perl(DateTime) perl(DateTime::TimeZone) perl(DateTime::Locale) perl(Time::Piece) perl(Encode::Detect) perl(Time::HiRes) perl(Socket6) perl(Sys::Syslog) html2text shared-mime-info lsof perl-File-Basename perl-File-Path perl-JSON-XS qrencode perl(DBI) perl(DBD::mysql)
AutoReq: 0
License: BSD-3-Clause
Group: System/Tools

View File

@@ -227,15 +227,7 @@ if ($rand1 eq $rand2) {
# Check if we can call sudo
if ($config{'sudo'} && &has_command("sudo")) {
eval "use IO::Pty";
if (!$@) {
$use_sudo = 1;
}
else {
push(@startup_msg,
"Perl module IO::Pty needed for calling sudo is not ".
"installed : $@");
}
$use_sudo = 1;
}
# init days and months for http_date
@@ -942,8 +934,8 @@ while(1) {
($ssl_con,
$ssl_certfile,
$ssl_keyfile,
$ssl_host,
$ssl_cert_hosts) =
$ssl_cn,
$ssl_alts) =
&ssl_connection_for_ip(
SOCK, $ipv6fhs{$s});
print DEBUG "ssl_con returned ".
@@ -1381,26 +1373,48 @@ $method = $page = $request_uri = undef;
print DEBUG "handle_request reqline=$reqline\n";
alarm(0);
if (!$use_ssl && $config{'ssl'} && $config{'ssl_enforce'}) {
# This is an http request when https must be enforced
local $urlhost = $config{'musthost'} || $host;
$urlhost = "[".$urlhost."]" if (&check_ip6address($urlhost));
local $wantport = $port;
if ($wantport == 80 &&
&indexof(443, @listening_on_ports) >= 0) {
# Connection was to port 80, but since we are also
# accepting on port 443, redirect to that
$wantport = 443;
# This is an HTTP request when HTTPS should be enforced
my $musthost = $config{'musthost'};
my $hostheader;
if (!$musthost) {
# Read host HTTP header because we want one earlier
alarm(10);
local $SIG{'ALRM'} = sub { die "timeout" };
while (defined(my $line = &read_line())) {
$line =~ s/\r|\n//g;
last if $line eq '';
if ($line =~ /^host:\s*(.*)$/i) {
$hostheader = "https://$1";
last;
}
}
alarm(0);
}
local $url = $wantport == 443
? "https://$urlhost/"
: "https://$urlhost:$wantport/";
# Host header must already contain full URL
my $url = $hostheader;
if (!$url) {
# No host header
local $urlhost = $musthost || $host;
$urlhost = "[".$urlhost."]" if (&check_ip6address($urlhost));
local $wantport = $port;
if ($wantport == 80 &&
&indexof(443, @listening_on_ports) >= 0) {
# Connection was to port 80, but since we are also
# accepting on port 443, redirect to that
$wantport = 443;
}
$url = $wantport == 443
? "https://$urlhost/"
: "https://$urlhost:$wantport/";
}
# Enforce HTTPS
&write_data("HTTP/1.0 302 Moved Temporarily\r\n");
&write_data("Date: $datestr\r\n");
&write_data("Server: @{[&server_info()]}\r\n");
&write_data("Location: $url\r\n");
&write_keep_alive(0);
&write_data("\r\n");
&log_error("Redirecting HTTP request to HTTPS for $acptip");
&log_error("Redirecting HTTP request to $url");
&log_request($loghost, $authuser, $reqline, 302, 0);
return 0;
}
@@ -2503,9 +2517,9 @@ if (&get_type($full) eq "internal/cgi" && $validated != 4) {
$ENV{"HTTPS"} = $use_ssl ? "ON" : "";
$ENV{"SSL_HSTS"} = $config{"ssl_hsts"};
if ($use_ssl) {
$ENV{"SSL_HOST"} = $ssl_host;
$ENV{"SSL_HOST_CERT"} =
&ssl_hostname_match($header{'host'}, $ssl_cert_hosts);
$ENV{"SSL_CN"} = $ssl_cn;
$ENV{"SSL_CN_CERT"} =
&ssl_hostname_match($header{'host'}, $ssl_alts);
}
$ENV{"MINISERV_PID"} = $miniserv_main_pid;
if ($use_ssl) {
@@ -6020,7 +6034,7 @@ sub check_sudo_permissions
{
local ($user, $pass) = @_;
# First try the pipes
# First try the cache stored by the main process
if ($PASSINw) {
print DEBUG "check_sudo_permissions: querying cache for $user\n";
print $PASSINw "readsudo $user\n";
@@ -6032,27 +6046,18 @@ if ($PASSINw) {
}
}
local $ptyfh = new IO::Pty;
print DEBUG "check_sudo_permissions: ptyfh=$ptyfh\n";
if (!$ptyfh) {
&log_error("Failed to create new PTY with IO::Pty");
return 0;
}
local @uinfo = getpwnam($user);
# Setup pipes for communication with the sudo sub-process
pipe(SUDOINr, SUDOINw);
pipe(SUDOOUTr, SUDOOUTw);
print DEBUG "check_sudo_permissions\n";
my @uinfo = getpwnam($user);
if (!@uinfo) {
&log_error("Unix user $user does not exist for sudo");
return 0;
}
# Execute sudo in a sub-process, via a pty
local $ttyfh = $ptyfh->slave();
print DEBUG "check_sudo_permissions: ttyfh=$ttyfh\n";
local $tty = $ptyfh->ttyname();
print DEBUG "check_sudo_permissions: tty=$tty\n";
chown($uinfo[2], $uinfo[3], $tty);
pipe(SUDOr, SUDOw);
print DEBUG "check_sudo_permissions: about to fork..\n";
local $pid = fork();
my $pid = fork();
print DEBUG "check_sudo_permissions: fork=$pid pid=$$\n";
if ($pid < 0) {
&log_error("fork for sudo failed : $!");
@@ -6067,40 +6072,37 @@ if (!$pid) {
$ENV{'USER'} = $ENV{'LOGNAME'} = $user;
$ENV{'HOME'} = $uinfo[7];
$ptyfh->make_slave_controlling_terminal();
close(STDIN); close(STDOUT); close(STDERR);
untie(*STDIN); untie(*STDOUT); untie(*STDERR);
close($PASSINw); close($PASSOUTr);
close(SUDOw);
close(SUDOINw); close(SUDOOUTr);
close(SOCK);
close(MAIN);
open(STDIN, "<&SUDOr");
open(STDOUT, ">$tty");
open(STDIN, "<&SUDOINr");
open(STDOUT, ">&SUDOOUTw");
open(STDERR, ">&STDOUT");
close($ptyfh);
exec("sudo -l -S");
print "Exec failed : $!\n";
exit 1;
}
print DEBUG "check_sudo_permissions: pid=$pid\n";
close(SUDOr);
$ptyfh->close_slave();
close(SUDOINr);
close(SUDOOUTw);
# Send password, and get back response
local $oldfh = select(SUDOw);
my $oldfh = select(SUDOINw);
$| = 1;
select($oldfh);
print DEBUG "check_sudo_permissions: about to send pass\n";
local $SIG{'PIPE'} = 'ignore'; # Sometimes sudo doesn't ask for a password
print SUDOw $pass,"\n";
print SUDOINw $pass,"\n";
print DEBUG "check_sudo_permissions: sent pass=$pass\n";
close(SUDOw);
local $out;
while(<$ptyfh>) {
close(SUDOINw);
my $out;
while(<SUDOOUTr>) {
print DEBUG "check_sudo_permissions: got $_";
$out .= $_;
}
close($ptyfh);
close(SUDOOUTr);
kill('KILL', $pid);
waitpid($pid, 0);
local ($ok) = ($out =~ /\(ALL\)\s+ALL|\(ALL\)\s+NOPASSWD:\s+ALL|\(ALL\s*:\s*ALL\)\s+ALL|\(ALL\s*:\s*ALL\)\s+NOPASSWD:\s+ALL/ ? 1 : 0);
@@ -7030,19 +7032,23 @@ my %rv;
my $cert;
# Try PEM first
my $bio = Net::SSLeay::BIO_new_file($file, 'r');
if ($bio) {
$cert = Net::SSLeay::PEM_read_bio_X509($bio);
Net::SSLeay::BIO_free($bio);
}
eval {
my $bio = Net::SSLeay::BIO_new_file($file, 'r');
if ($bio) {
$cert = Net::SSLeay::PEM_read_bio_X509($bio);
Net::SSLeay::BIO_free($bio);
}
};
# Try DER if PEM failed
if (!$cert) {
my $bio = Net::SSLeay::BIO_new_file($file, 'rb');
if ($bio) {
$cert = Net::SSLeay::d2i_X509_bio($bio);
Net::SSLeay::BIO_free($bio);
}
eval {
my $bio = Net::SSLeay::BIO_new_file($file, 'rb');
if ($bio) {
$cert = Net::SSLeay::d2i_X509_bio($bio);
Net::SSLeay::BIO_free($bio);
}
};
}
# Certificate not found

View File

@@ -63,6 +63,21 @@ $sql_mode = &find_value("sql_mode", $mems);
print &ui_table_row($text{'cnf_sqlm'},
&ui_opt_textbox("sqlm", $sql_mode, 60, $text{'default'}), 3);
# Slow query log options
$slow_query_log = &find_value("slow_query_log", $mems);
print &ui_table_row($text{'cnf_slow'},
&ui_yesno_radio("slow", $slow_query_log));
$long_query_time = &find_value("long_query_time", $mems);
print &ui_table_row($text{'cnf_long'},
&ui_opt_textbox("long", $long_query_time, 8,
$text{'cnf_long_def'})." ".$text{'cnf_long_secs'});
$slow_query_log_file = &find_value("slow_query_log_file", $mems);
print &ui_table_row($text{'cnf_slow_file'},
&ui_opt_textbox("slow_file", $slow_query_log_file, 40,
$text{'cnf_slow_file_def'}), 3);
# Show set variables
print &ui_table_hr();

View File

@@ -438,7 +438,7 @@ tprivs_privs1=Table permissions
tprivs_privs2=Field permissions
tprivs_all=All
tprivs_anon=Anonymous
tprivs_add=Add new permissions in database :
tprivs_add=Add new permissions in database
tprivs_norows=No таблица permissions defined
tprivs_return=таблица permissions
tprivs_none=None

View File

@@ -451,7 +451,7 @@ tprivs_privs1=Table permissions
tprivs_privs2=Field permissions
tprivs_all=All
tprivs_anon=Anonymous
tprivs_add=Add new permissions in database :
tprivs_add=Add new permissions in database
tprivs_norows=No table permissions defined
tprivs_return=table permissions
tprivs_none=None
@@ -487,8 +487,8 @@ cprivs_user=User
cprivs_privs=Permissions
cprivs_all=All
cprivs_anon=Anonymous
cprivs_add=Add new permissions in database and table :
cprivs_add2=Add new permissions :
cprivs_add=Add new permissions in database and table
cprivs_add2=Add new permissions
cprivs_norows=No field permissions defined
cprivs_return=field permissions
cprivs_none=None
@@ -765,6 +765,14 @@ cnf_ilt=InnoDB lock timeout (in seconds)
cnf_eilt=InnoDB lock timeout must be an integer
cnf_sqlm=SQL mode options
cnf_esqlm=SQL mode options must be a comma-separate list of flags
cnf_slow=Enable slow query log?
cnf_slow_file=Slow query log file
cnf_slow_file_def=Default path
cnf_eslow_file=Missing slow query log file path
cnf_long=Time for query to be considered slow
cnf_long_def=Default (10 seconds)
cnf_long_secs=seconds
cnf_elong=Slow query time must be a number of seconds
manual_title=Edit Config Files
manual_file=Edit config file:

View File

@@ -10,7 +10,13 @@ $access{'perms'} == 1 || &error($text{'vars_ecannot'});
print &ui_alert_box(&text('vars_desc', 'edit_cnf.cgi'), 'warn');
# Work out which ones can be edited
%canedit = map { $_->[0], 1 } &list_system_variables();
my %canedit;
foreach my $v (&list_system_variables()) {
my $vn = $v->[0];
$canedit{$vn} = 1;
$vn =~ s/-/_/g;
$canedit{$vn} = 1;
}
# Show search form
print &ui_form_start("list_vars.cgi", undef, undef, "style='float: right;'");
@@ -22,12 +28,6 @@ print &ui_form_end();
$d = &execute_sql($master_db, "show variables".
($in{'search'} ? " like '%".quotemeta($in{'search'})."%'" : ""));
if (@{$d->{'data'}}) {
print &ui_form_start("save_vars.cgi");
print &ui_hidden("search", $in{'search'});
@tds = ( "width=5" );
print &ui_columns_start([ "",
$text{'vars_name'},
$text{'vars_value'} ], 100, 0, \@tds);
@{$d->{'data'}} = sort {
# Editing now (highest priority)
($d{$b->[0]} <=> $d{$a->[0]}) ||
@@ -35,7 +35,14 @@ if (@{$d->{'data'}}) {
($canedit{$b->[0]} <=> $canedit{$a->[0]}) ||
# Natural sort for equal priority
$a->[0] cmp $b->[0]
} @{$d->{'data'}};
} @{$d->{'data'}};
print &ui_form_start("save_vars.cgi");
print &ui_hidden("search", $in{'search'});
@tds = ( "width=5" );
print &ui_columns_start([ "",
$text{'vars_name'},
$text{'vars_value'} ], 100, 0, \@tds);
foreach $v (@{$d->{'data'}}) {
if (!$canedit{$v->[0]}) {
# Cannot edit, so just show value

View File

@@ -78,6 +78,18 @@ else {
&save_directive($conf, $mysqld, "big-tables",
$in{'big-tables'} ? [ "" ] : [ ]);
# Save slow query log options
&save_directive($conf, $mysqld, "slow_query_log",
[ $in{'slow'} ]);
$in{'slow_file_def'} || $in{'slow_file'} =~ /^\S+$/ ||
&error($text{'cnf_eslow_file'});
&save_directive($conf, $mysqld, "slow_query_log_file",
$in{'slow_file_def'} ? [ ] : [ $in{'slow_file'} ]);
$in{'long_def'} || $in{'long'} =~ /^\d+$/ ||
&error($text{'cnf_elong'});
&save_directive($conf, $mysqld, "long_query_time",
$in{'long_def'} ? [ ] : [ $in{'long'} ]);
# Save set variables
%vars = &parse_set_variables(&find_value("set-variable", $mems));
foreach $w (@mysql_set_variables) {

View File

@@ -209,9 +209,16 @@ print &ui_table_row($text{'index_sched'},
[ 'w', $text{'index_schedw'} ] ]));
# Send email to
print &ui_table_row($text{'index_email'},
&ui_textbox("email", $config{'sched_email'} ||
$gconfig{'webmin_email_to'}, 40));
if ($gconfig{'webmin_email_to'}) {
$efield = &ui_opt_textbox("email",
$config{'sched_email'} eq '*' ? undef : $config{'sched_email'},
40, &text('index_email_def',
"<tt>$gconfig{'webmin_email_to'}</tt>"));
}
else {
$efield = &ui_textbox("email", $config{'sched_email'}, 40);
}
print &ui_table_row($text{'index_email'}, $efield);
# Install or just notify?
print &ui_table_row($text{'index_action'},

View File

@@ -18,6 +18,7 @@ index_schedh=hour
index_schedd=day
index_schedw=week
index_email=Email updates report to
index_email_def=Webmin default ($1)
index_action=Action when update needed
index_action-1=Just notify for security updates
index_action0=Just notify for any updates

View File

@@ -5,7 +5,7 @@ require './package-updates-lib.pl';
&ReadParse();
&lock_file($module_config_file);
$config{'sched_email'} = $in{'email'};
$config{'sched_email'} = $in{'email_def'} ? '*' : $in{'email'};
$config{'sched_action'} = $in{'action'};
&save_module_config();
&unlock_file($module_config_file);

View File

@@ -56,7 +56,8 @@ if ($tellcount) {
}
# Email the admin
$emailto = $config{'sched_email'} || $gconfig{'webmin_email_to'};
$emailto = $config{'sched_email'} eq '*' ? $gconfig{'webmin_email_to'}
: $config{'sched_email'};
if ($emailto && $body) {
&foreign_require("mailboxes", "mailboxes-lib.pl");
my $from = &mailboxes::get_from_address();

View File

@@ -32,6 +32,7 @@ if ($gconfig{'loginbanner'} && $ENV{'HTTP_COOKIE'} !~ /banner=1/ &&
print "Set-Cookie: banner=1; path=/\r\n";
&PrintHeader();
$url = $in{'page'};
$url = &filter_javascript($url);
open(BANNER, "<$gconfig{'loginbanner'}");
while(<BANNER>) {
s/LOGINURL/$url/g;

View File

@@ -78,7 +78,7 @@ if (&foreign_installed("software") &&
print &ui_hidden("file", $in{'file'});
print "$text{'mods_newpkg'}&nbsp; ",
&ui_textbox("mod", undef, 30),"\n";
print &ui_form_end([ [ undef, $text{'mods_install'} ] ]);
print &ui_form_end([ [ undef, $text{'mods_setup'} ] ]);
}
&ui_print_footer("list_ini.cgi?file=".&urlize($in{'file'}),

View File

@@ -7,63 +7,92 @@ require './phpini-lib.pl';
&error_setup($text{'imod_err'});
&can_php_config($in{'file'}) || &error($text{'list_ecannot'});
$access{'global'} || &error($text{'mods_ecannot'});
$in{'mod'} =~ /^\S+$/ || &error($text{'imod_emod'});
&trim($in{'mod'}) || &error($text{'imod_emod'});
my $filever = &get_php_ini_version($in{'file'});
my $ver = $filever || &get_php_binary_version($in{'file'});
$ver || &error(&text('mods_egetver', "<tt>".&html_escape($in{'file'})."</tt>"));
# Work out possible package names
@poss = &php_module_packages($in{'mod'}, $ver, $filever);
@poss || &error($text{'mods_eposs'});
my @mods = &unique(split /(?:\s*,\s*|\s+)/, ($in{'mod'}));
my %want = map { lc($_) => 1 } grep { length } @mods;
my @poss;
foreach my $mod (@mods) {
push(@poss,
{ mod => $mod,
packages => [&php_module_packages($mod, $ver, $filever)] });
}
(grep { @{ $_->{packages} } } @poss) or &error($text{'mods_eposs'});
# Is it already installed?
$inidir = &get_php_ini_dir($in{'file'});
($got) = grep { $_->{'mod'} eq $in{'mod'} } &list_php_ini_modules($inidir);
if ($got) {
my $already;
foreach my $pkg (@poss) {
my @pinfo = &software::package_info($pkg);
@pinfo = &software::virtual_package_info($pkg) if (!@pinfo);
$already++ if (@pinfo);
my @got = grep { $want{ lc($_->{'mod'}) } } &list_php_ini_modules($inidir);
my @already;
if (@got) {
foreach my $g (@got) {
my ($p) = grep { $_->{'mod'} eq $g->{'mod'} } @poss;
next unless $p && @{$p->{'packages'}};
foreach my $pkg (@{$p->{'packages'}}) {
my @pinfo = &software::package_info($pkg);
@pinfo = &software::virtual_package_info($pkg)
if (!@pinfo);
if (@pinfo) {
# Update list of modules to install
@mods = grep { lc($_) ne lc($g->{'mod'}) }
@mods;
push(@already, $g->{'mod'});
}
}
}
$already && &error(&text('imod_alreadygot',
"<tt>".&html_escape($in{'mod'})."</tt>"));
}
# Print header
&ui_print_unbuffered_header(
"<tt>".&html_escape($in{'file'})."</tt>",
$text{'imod_title'}, "");
if (@already) {
print &text('imod_skipwhy')."<br>\n";
print &text('imod_skipwhich', "<tt>".
&html_escape(join(", ", &unique(@already)))."</tt>",
$ver)."<p></p>\n";
}
# Try to install them
&ui_print_unbuffered_header("<tt>".&html_escape($in{'file'})."</tt>",
$text{'imod_title'}, "");
foreach my $mod (@mods) {
print &text('imod_alldoing', "<tt>".&html_escape($mod)."</tt>",
$ver),"<br>\n";
print &text('imod_alldoing', "<tt>".&html_escape($in{'mod'})."</tt>",
$ver),"<br>\n";
my $ok = 0;
foreach my $pkg (@poss) {
my @pinfo = &software::package_info($pkg);
@pinfo = &software::virtual_package_info($pkg) if (!@pinfo);
next if (@pinfo);
my ($out, $rs) = &capture_function_output(
\&software::update_system_install, $pkg);
@pinfo = &software::package_info($pkg);
@pinfo = &software::virtual_package_info($pkg) if (!@pinfo);
if (@pinfo && @$rs) {
($got) = grep { $_->{'mod'} eq $in{'mod'} }
&list_php_ini_modules($inidir);
if ($got) {
$ok = $pkg;
last;
my $ok = 0;
my ($p) = grep { $_->{'mod'} eq $mod } @poss;
next unless $p && @{$p->{'packages'}};
foreach my $pkg (@{$p->{'packages'}}) {
my @pinfo = &software::package_info($pkg);
@pinfo = &software::virtual_package_info($pkg) if (!@pinfo);
next if (@pinfo);
my ($out, $rs) = &capture_function_output(
\&software::update_system_install, $pkg);
@pinfo = &software::package_info($pkg);
@pinfo = &software::virtual_package_info($pkg) if (!@pinfo);
if (@pinfo && @$rs) {
($got) = grep { $_->{'mod'} eq $mod }
&list_php_ini_modules($inidir);
if ($got) {
$ok = $pkg;
last;
}
}
}
}
if ($ok) {
print &text('imod_alldone',
"<tt>".&html_escape($ok)."</tt>");
&graceful_apache_restart($in{'file'});
&webmin_log("imod", undef, $in{'file'}, { 'mod' => $in{'mod'} });
}
else {
print &text('imod_allfailed',
"<tt>".&html_escape(join(" ", @poss))."</tt>");
if ($ok) {
print &text('imod_alldone',
"<tt>".&html_escape($ok)."</tt>")."<p></p>\n";
&graceful_apache_restart($in{'file'});
&webmin_log("imod", undef, $in{'file'}, { 'mod' => $mod });
}
else {
print &text('imod_allfailed',
"<tt>".&html_escape(
join(" ", @{$p->{'packages'}}))."</tt>").
"<p></p>\n";
}
}
&ui_print_footer("edit_mods.cgi?file=".&urlize($in{'file'}),

Some files were not shown because too many files have changed in this diff Show More