Server IP : 68.65.122.142  /  Your IP : 3.139.87.251
Web Server : LiteSpeed
System : Linux server167.web-hosting.com 4.18.0-513.18.1.lve.el8.x86_64 #1 SMP Thu Feb 22 12:55:50 UTC 2024 x86_64
User : glenirhm ( 1318)
PHP Version : 7.4.33
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON
Directory (0755) :  /home/glenirhm/.googleapps/../lms.myglenbow.ca/old/report/infectedfiles/

[  Home  ][  C0mmand  ][  Upload File  ]

Current File : /home/glenirhm/.googleapps/../lms.myglenbow.ca/old/report/infectedfiles/index.php
<?php
// This file is part of Moodle - http://moodle.org/
//
// Moodle is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// Moodle is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with Moodle.  If not, see <http://www.gnu.org/licenses/>.

/**
 * Infected file report
 *
 * @package    report_infectedfiles
 * @author     Nathan Nguyen <nathannguyen@catalyst-au.net>
 * @copyright  Catalyst IT
 * @license    http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
 */

require(__DIR__.'/../../config.php');
require_once($CFG->libdir.'/adminlib.php');
use \core\antivirus\quarantine;

admin_externalpage_setup('reportinfectedfiles', '', null, '', array('pagelayout' => 'report'));

$action = optional_param('action', '', PARAM_TEXT);
// If action exists, we need to process the actions safely.
if (!empty($action)) {
    // Nothing can be done without a valid sesskey.
    require_sesskey();
    // For any cancel actions, just reload the page clean.
    $cancel = $PAGE->url;

    // Decide on page action.
    switch ($action) {
        case 'download':
            $fileid = required_param('file', PARAM_INT);
            quarantine::download_quarantined_file($fileid);
            break;

        case 'downloadall':
            quarantine::download_all_quarantined_files();
            break;

        case 'delete':
            $fileid = required_param('file', PARAM_INT);
            quarantine::delete_quarantined_file($fileid);
            break;

        case 'deleteall':
            // Remove file until current time.
            quarantine::clean_up_quarantine_folder(time());
            break;
    }

    // Reload page cleanly once actions are processed.
    redirect($PAGE->url);
}

// Once actions are dealt with, display the page.
$page = optional_param('page', 0, PARAM_INT);

echo $OUTPUT->header();
echo $OUTPUT->heading(get_string('infectedfiles', 'report_infectedfiles'));
$table = new \report_infectedfiles\table\infectedfiles_table('report-infectedfiles-report-table', $PAGE->url, $page);
$table->define_baseurl($PAGE->url);
echo $PAGE->get_renderer('report_infectedfiles')->render($table);
echo $OUTPUT->footer();