index.php 1.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
  1. <?php
  2. error_reporting(NULL);
  3. ob_start();
  4. $TAB = 'FIREWALL';
  5. // Main include
  6. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  7. // Check user
  8. if ($_SESSION['user'] != 'admin') {
  9. header("Location: /list/user");
  10. exit;
  11. }
  12. // Check POST request
  13. if (!empty($_POST['ok'])) {
  14. // Check empty fields
  15. if (empty($_POST['v_chain'])) $errors[] = __('banlist');
  16. if (empty($_POST['v_ip'])) $errors[] = __('ip address');
  17. if (!empty($errors[0])) {
  18. foreach ($errors as $i => $error) {
  19. if ( $i == 0 ) {
  20. $error_msg = $error;
  21. } else {
  22. $error_msg = $error_msg.", ".$error;
  23. }
  24. }
  25. $_SESSION['error_msg'] = __('Field "%s" can not be blank.',$error_msg);
  26. }
  27. // Protect input
  28. $v_chain = escapeshellarg($_POST['v_chain']);
  29. $v_ip = escapeshellarg($_POST['v_ip']);
  30. // Add firewall ban
  31. if (empty($_SESSION['error_msg'])) {
  32. exec (VESTA_CMD."v-add-firewall-ban ".$v_ip." ".$v_chain, $output, $return_var);
  33. check_return_code($return_var,$output);
  34. unset($output);
  35. }
  36. // Flush field values on success
  37. if (empty($_SESSION['error_msg'])) {
  38. $_SESSION['ok_msg'] = __('BANLIST_CREATED_OK');
  39. unset($v_ip);
  40. }
  41. }
  42. // Render
  43. render_page($user, $TAB, 'add_firewall_banlist');
  44. // Flush session messages
  45. unset($_SESSION['error_msg']);
  46. unset($_SESSION['ok_msg']);