index.php 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
  1. <?php
  2. error_reporting(NULL);
  3. ob_start();
  4. $TAB = 'FIREWALL';
  5. header('Content-Type: application/json');
  6. // Main include
  7. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  8. // Check user
  9. if ($_SESSION['user'] != 'admin') {
  10. header("Location: /list/user");
  11. exit;
  12. }
  13. // Check POST request
  14. if (!empty($_POST['ok'])) {
  15. // Check token
  16. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  17. exit();
  18. }
  19. // Check empty fields
  20. if (empty($_POST['v_chain'])) $errors[] = __('banlist');
  21. if (empty($_POST['v_ip'])) $errors[] = __('ip address');
  22. if (!empty($errors[0])) {
  23. foreach ($errors as $i => $error) {
  24. if ( $i == 0 ) {
  25. $error_msg = $error;
  26. } else {
  27. $error_msg = $error_msg.", ".$error;
  28. }
  29. }
  30. $_SESSION['error_msg'] = __('Field "%s" can not be blank.',$error_msg);
  31. }
  32. // Protect input
  33. $v_chain = escapeshellarg($_POST['v_chain']);
  34. $v_ip = escapeshellarg($_POST['v_ip']);
  35. // Add firewall ban
  36. if (empty($_SESSION['error_msg'])) {
  37. exec (VESTA_CMD."v-add-firewall-ban ".$v_ip." ".$v_chain, $output, $return_var);
  38. check_return_code($return_var,$output);
  39. unset($output);
  40. }
  41. // Flush field values on success
  42. if (empty($_SESSION['error_msg'])) {
  43. $_SESSION['ok_msg'] = __('BANLIST_CREATED_OK');
  44. unset($v_ip);
  45. }
  46. }
  47. $result = array(
  48. 'ip' => $v_ip,
  49. 'chain' => $v_chain,
  50. 'error_msg' => $_SESSION['error_msg'],
  51. 'ok_msg' => $_SESSION['ok_msg']
  52. );
  53. echo json_encode($result);
  54. // Flush session messages
  55. unset($_SESSION['error_msg']);
  56. unset($_SESSION['ok_msg']);