index.php 2.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586
  1. <?php
  2. error_reporting(NULL);
  3. ob_start();
  4. $TAB = 'FIREWALL';
  5. // Main include
  6. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  7. // Check user
  8. if ($_SESSION['user'] != 'admin') {
  9. header("Location: /list/user");
  10. exit;
  11. }
  12. // Get ipset lists
  13. exec (HESTIA_CMD."v-list-firewall-ipset 'json'", $output, $return_var);
  14. check_return_code($return_var,$output);
  15. $data = json_decode(implode('', $output), true);
  16. $ipset_lists=[];
  17. foreach($data as $key => $value) {
  18. if(isset($value['SUSPENDED']) && $value['SUSPENDED'] === 'yes') {
  19. continue;
  20. }
  21. if(isset($value['IP_VERSION']) && $value['IP_VERSION'] !== 'v4') {
  22. continue;
  23. }
  24. array_push($ipset_lists, ['name'=>$key]);
  25. }
  26. $ipset_lists_json=json_encode($ipset_lists);
  27. // Check POST request
  28. if (!empty($_POST['ok'])) { // Check token
  29. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  30. header('location: /login/');
  31. exit();
  32. }
  33. // Check empty fields
  34. if (empty($_POST['v_action'])) $errors[] = _('action');
  35. if (empty($_POST['v_protocol'])) $errors[] = _('protocol');
  36. if (empty($_POST['v_port']) && strlen($_POST['v_port']) == 0) $errors[] = _('port');
  37. if (empty($_POST['v_ip'])) $errors[] = _('ip address');
  38. if (!empty($errors[0])) {
  39. foreach ($errors as $i => $error) {
  40. if ( $i == 0 ) {
  41. $error_msg = $error;
  42. } else {
  43. $error_msg = $error_msg.", ".$error;
  44. }
  45. }
  46. $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'),$error_msg);
  47. }
  48. // Protect input
  49. $v_action = escapeshellarg($_POST['v_action']);
  50. $v_protocol = escapeshellarg($_POST['v_protocol']);
  51. $v_port = str_replace(" ",",", $_POST['v_port']);
  52. $v_port = preg_replace('/\,+/', ',', $v_port);
  53. $v_port = trim($v_port, ",");
  54. $v_port = escapeshellarg($v_port);
  55. $v_ip = escapeshellarg($_POST['v_ip']);
  56. $v_comment = escapeshellarg($_POST['v_comment']);
  57. // Add firewall rule
  58. if (empty($_SESSION['error_msg'])) {
  59. exec (HESTIA_CMD."v-add-firewall-rule ".$v_action." ".$v_ip." ".$v_port." ".$v_protocol." ".$v_comment, $output, $return_var);
  60. check_return_code($return_var,$output);
  61. unset($output);
  62. }
  63. // Flush field values on success
  64. if (empty($_SESSION['error_msg'])) {
  65. $_SESSION['ok_msg'] = _('RULE_CREATED_OK');
  66. unset($v_port);
  67. unset($v_ip);
  68. unset($v_comment);
  69. }
  70. }
  71. // Render
  72. render_page($user, $TAB, 'add_firewall');
  73. // Flush session messages
  74. unset($_SESSION['error_msg']);
  75. unset($_SESSION['ok_msg']);