index.php 1.8 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970
  1. <?php
  2. error_reporting(null);
  3. ob_start();
  4. $TAB = 'FIREWALL';
  5. // Main include
  6. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  7. // Check user
  8. if ($_SESSION['userContext'] != 'admin') {
  9. header("Location: /list/user");
  10. exit;
  11. }
  12. // Check POST request
  13. if (!empty($_POST['ok'])) {
  14. // Check token
  15. verify_csrf($_POST);
  16. // Check empty fields
  17. if (empty($_POST['v_ipname'])) {
  18. $errors[] = _('Name');
  19. }
  20. if (empty($_POST['v_datasource'])) {
  21. $errors[] = _('Data Source');
  22. }
  23. if (empty($_POST['v_ipver'])) {
  24. $errors[] = _('Ip Version');
  25. }
  26. if (empty($_POST['v_autoupdate'])) {
  27. $errors[] = _('Autoupdate');
  28. }
  29. if (!empty($errors[0])) {
  30. foreach ($errors as $i => $error) {
  31. if ($i == 0) {
  32. $error_msg = $error;
  33. } else {
  34. $error_msg = $error_msg.", ".$error;
  35. }
  36. }
  37. $_SESSION['error_msg'] = sprintf(_('Field "%s" can not be blank.'), $error_msg);
  38. }
  39. $v_ipname = $_POST['v_ipname'];
  40. $v_datasource = $_POST['v_datasource'];
  41. $v_ipver = $_POST['v_ipver'];
  42. $v_autoupdate = $_POST['v_autoupdate'];
  43. // Add firewall ipset list
  44. if (empty($_SESSION['error_msg'])) {
  45. exec(HESTIA_CMD."v-add-firewall-ipset ".escapeshellarg($v_ipname)." ".escapeshellarg($v_datasource)." ".escapeshellarg($v_ipver)." ".escapeshellarg($v_autoupdate), $output, $return_var);
  46. check_return_code($return_var, $output);
  47. unset($output);
  48. }
  49. // Flush field values on success
  50. if (empty($_SESSION['error_msg'])) {
  51. $_SESSION['ok_msg'] = _('IPSET_CREATED_OK');
  52. }
  53. }
  54. // Render
  55. render_page($user, $TAB, 'add_firewall_ipset');
  56. // Flush session messages
  57. unset($_SESSION['error_msg']);
  58. unset($_SESSION['ok_msg']);