| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778 |
- <?php
- ob_start();
- $TAB = 'FIREWALL';
- // Main include
- include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
- // Check user
- if ($_SESSION['userContext'] != 'admin') {
- header("Location: /list/user");
- exit;
- }
- // Check POST request
- if (!empty($_POST['ok'])) {
- // Check token
- verify_csrf($_POST);
- // Check empty fields
- if (empty($_POST['v_ipname'])) {
- $errors[] = _('Name');
- }
- if (empty($_POST['v_datasource'])) {
- $errors[] = _('Data Source');
- }
- if (empty($_POST['v_ipver'])) {
- $errors[] = _('Ip Version');
- }
- if (empty($_POST['v_autoupdate'])) {
- $errors[] = _('Autoupdate');
- }
- if (!empty($errors[0])) {
- foreach ($errors as $i => $error) {
- if ($i == 0) {
- $error_msg = $error;
- } else {
- $error_msg = $error_msg.", ".$error;
- }
- }
- $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'), $error_msg);
- }
- $v_ipname = $_POST['v_ipname'];
- $v_datasource = $_POST['v_datasource'];
- $v_ipver = $_POST['v_ipver'];
- $v_autoupdate = $_POST['v_autoupdate'];
- // Add firewall ipset list
- if (empty($_SESSION['error_msg'])) {
- exec(HESTIA_CMD."v-add-firewall-ipset ".escapeshellarg($v_ipname)." ".escapeshellarg($v_datasource)." ".escapeshellarg($v_ipver)." ".escapeshellarg($v_autoupdate), $output, $return_var);
- check_return_code($return_var, $output);
- unset($output);
- }
- // Flush field values on success
- if (empty($_SESSION['error_msg'])) {
- $_SESSION['ok_msg'] = _('IPSET_CREATED_OK');
- }
- }
- if (empty($v_ipname)) {
- $v_ipname = '';
- }
- if (empty($v_datasource)) {
- $v_datasource = '';
- }
- if (empty($v_ipver)) {
- $v_ipver = '';
- }
- // Render
- render_page($user, $TAB, 'add_firewall_ipset');
- // Flush session messages
- unset($_SESSION['error_msg']);
- unset($_SESSION['ok_msg']);
|