index.php 1.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869
  1. <?php
  2. ob_start();
  3. $TAB = 'FIREWALL';
  4. // Main include
  5. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  6. // Check user
  7. if ($_SESSION['userContext'] != 'admin') {
  8. header("Location: /list/user");
  9. exit;
  10. }
  11. // Check POST request
  12. if (!empty($_POST['ok'])) {
  13. // Check token
  14. verify_csrf($_POST);
  15. // Check empty fields
  16. if (empty($_POST['v_chain'])) {
  17. $errors[] = _('banlist');
  18. }
  19. if (empty($_POST['v_ip'])) {
  20. $errors[] = _('ip address');
  21. }
  22. if (!empty($errors[0])) {
  23. foreach ($errors as $i => $error) {
  24. if ($i == 0) {
  25. $error_msg = $error;
  26. } else {
  27. $error_msg = $error_msg.", ".$error;
  28. }
  29. }
  30. $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'), $error_msg);
  31. }
  32. // Protect input
  33. $v_chain = escapeshellarg($_POST['v_chain']);
  34. $v_ip = escapeshellarg($_POST['v_ip']);
  35. // Add firewall rule
  36. if (empty($_SESSION['error_msg'])) {
  37. exec(HESTIA_CMD."v-add-firewall-ban ".$v_ip." ".$v_chain, $output, $return_var);
  38. check_return_code($return_var, $output);
  39. unset($output);
  40. }
  41. // Flush field values on success
  42. if (empty($_SESSION['error_msg'])) {
  43. $_SESSION['ok_msg'] = _('BANLIST_CREATED_OK');
  44. unset($v_chain);
  45. unset($v_ip);
  46. }
  47. }
  48. if (empty($v_ip)) {
  49. $v_ip = '';
  50. }
  51. if (empty($v_chain)) {
  52. $v_chain = '';
  53. }
  54. // Render
  55. render_page($user, $TAB, 'add_firewall_banlist');
  56. // Flush session messages
  57. unset($_SESSION['error_msg']);
  58. unset($_SESSION['ok_msg']);