index.php 1.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061
  1. <?php
  2. error_reporting(NULL);
  3. ob_start();
  4. $TAB = 'FIREWALL';
  5. // Main include
  6. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  7. // Check user
  8. if ($_SESSION['user'] != 'admin') {
  9. header("Location: /list/user");
  10. exit;
  11. }
  12. // Check POST request
  13. if (!empty($_POST['ok'])) {
  14. // Check token
  15. if ((!isset($_POST['token'])) || ($_SESSION['token'] != $_POST['token'])) {
  16. header('location: /login/');
  17. exit();
  18. }
  19. // Check empty fields
  20. if (empty($_POST['v_chain'])) $errors[] = __('banlist');
  21. if (empty($_POST['v_ip'])) $errors[] = __('ip address');
  22. if (!empty($errors[0])) {
  23. foreach ($errors as $i => $error) {
  24. if ( $i == 0 ) {
  25. $error_msg = $error;
  26. } else {
  27. $error_msg = $error_msg.", ".$error;
  28. }
  29. }
  30. $_SESSION['error_msg'] = __('Field "%s" can not be blank.',$error_msg);
  31. }
  32. // Protect input
  33. $v_chain = escapeshellarg($_POST['v_chain']);
  34. $v_ip = escapeshellarg($_POST['v_ip']);
  35. // Add firewall ban
  36. if (empty($_SESSION['error_msg'])) {
  37. exec (VESTA_CMD."v-add-firewall-ban ".$v_ip." ".$v_chain, $output, $return_var);
  38. check_return_code($return_var,$output);
  39. unset($output);
  40. }
  41. // Flush field values on success
  42. if (empty($_SESSION['error_msg'])) {
  43. $_SESSION['ok_msg'] = __('BANLIST_CREATED_OK');
  44. unset($v_ip);
  45. }
  46. }
  47. // Render
  48. render_page($user, $TAB, 'add_firewall_banlist');
  49. // Flush session messages
  50. unset($_SESSION['error_msg']);
  51. unset($_SESSION['ok_msg']);