Line 1... |
Line 1... |
1 |
<?php
|
1 |
<?php
|
2 |
# $Id: index.php 2111 2017-01-08 17:42:44Z richard $
|
2 |
# $Id: index.php 2116 2017-01-18 12:20:32Z franck $
|
3 |
#
|
3 |
#
|
4 |
# index.php for ALCASAR by Rexy
|
4 |
# index.php for ALCASAR by Rexy
|
5 |
# UI & css style by stephane ERARD
|
5 |
# UI & css style by stephane ERARD
|
6 |
# The contents of this file may be used under the terms of the GNU
|
6 |
# The contents of this file may be used under the terms of the GNU
|
7 |
# General Public License Version 2, provided that the above copyright
|
7 |
# General Public License Version 2, provided that the above copyright
|
Line 58... |
Line 58... |
58 |
$Langue = explode(",",$_SERVER['HTTP_ACCEPT_LANGUAGE']);
|
58 |
$Langue = explode(",",$_SERVER['HTTP_ACCEPT_LANGUAGE']);
|
59 |
$Language = strtolower(substr(chop($Langue[0]),0,2)); }
|
59 |
$Language = strtolower(substr(chop($Langue[0]),0,2)); }
|
60 |
$redirect_link = "www.euronews.com"; # Default redirection for HTTPS interception (beware, this website must run in HTTP)
|
60 |
$redirect_link = "www.euronews.com"; # Default redirection for HTTPS interception (beware, this website must run in HTTP)
|
61 |
|
61 |
|
62 |
# Retrieve the user info behind the remote ip
|
62 |
# Retrieve the user info behind the remote ip
|
63 |
exec ("sudo /usr/sbin/chilli_query list|grep $remote_ip" , $tab);
|
63 |
exec ("sudo /usr/sbin/chilli_query list | grep -Ew $remote_ip" , $tab);
|
64 |
$user = explode (" ", $tab[0]);
|
64 |
$user = explode (" ", $tab[0]);
|
65 |
|
65 |
|
66 |
|
66 |
|
67 |
# Test if it's a direct connexion to ALCASAR
|
67 |
# Test if it's a direct connexion to ALCASAR
|
68 |
if (isset($_SERVER['HTTP_HOST']))
|
68 |
if (isset($_SERVER['HTTP_HOST']))
|