@@ -41,16 +41,9 @@ function authenticate_user(){
4141 if (!empty ($ _SERVER ['HTTP_CF_CONNECTING_IP ' ])){
4242 $ v_ip = escapeshellarg ($ _SERVER ['HTTP_CF_CONNECTING_IP ' ]);
4343 }
44- }
45- if ($ _POST ['user ' ] == 'root ' ){
46- unset($ _POST ['password ' ]);
47- unset($ _POST ['user ' ]);
48- $ error = "<a class= \"error \"> " .__ ('Login with <strong>root</strong> account has been disabled ' )."</a> " ;
49- return $ error ;
5044 }
5145
52-
53- // Get user's salt
46+ // Get user's salt
5447 $ output = '' ;
5548 exec (HESTIA_CMD ."v-get-user-salt " .$ v_user ." " .$ v_ip ." json " , $ output , $ return_var );
5649 $ pam = json_decode (implode ('' , $ output ), true );
@@ -100,7 +93,7 @@ function authenticate_user(){
10093 // Get user speciefic parameters
10194 exec (HESTIA_CMD . "v-list-user " .$ v_user ." json " , $ output , $ return_var );
10295 $ data = json_decode (implode ('' , $ output ), true );
103-
96+ unset( $ output );
10497 // Check if 2FA is active
10598 if ($ data [$ _POST ['user ' ]]['TWOFA ' ] != '' ) {
10699 if (empty ($ _POST ['twofa ' ])){
@@ -117,6 +110,12 @@ function authenticate_user(){
117110 }
118111 }
119112 }
113+
114+ if ($ data [$ _POST ['user ' ]]['ROLE ' ] == 'admin ' ){
115+ exec (HESTIA_CMD . "v-list-user admin json " , $ output , $ return_var );
116+ $ data = json_decode (implode ('' , $ output ), true );
117+ unset($ output );
118+ }
120119 // Define session user
121120 $ _SESSION ['user ' ] = key ($ data );
122121 $ v_user = $ _SESSION ['user ' ];
0 commit comments