git.schokokeks.org
Repositories
Help
Report an Issue
webinterface.git
Code
Commits
Branches
Tags
Suche
Strukturansicht:
5effc2b
Branches
Tags
master
ticket
webinterface.git
inc
base.php
Lizenzinfos in eigenes Modul ausgelagert und Copyright auf 2014 angepasst
Bernd Wurst
commited
5effc2b
at 2014-02-08 05:45:07
base.php
Blame
History
Raw
<?php /* This file belongs to the Webinterface of schokokeks.org Hosting Written 2008-2014 by schokokeks.org Hosting, namely Bernd Wurst <bernd@schokokeks.org> Hanno Böck <hanno@schokokeks.org> To the extent possible under law, the author(s) have dedicated all copyright and related and neighboring rights to this software to the public domain worldwide. This software is distributed without any warranty. You should have received a copy of the CC0 Public Domain Dedication along with this software. If not, see http://creativecommons.org/publicdomain/zero/1.0/ Nevertheless, in case you use a significant part of this code, we ask (but not require, see the license) that you keep the authors' names in place and return your changes to the public. We would be especially happy if you tell us what you're going to do with this code. */ require_once('class/database.php'); require_once('inc/debug.php'); function config($key, $localonly = false) { global $config; if ($key == "modules") { // Stelle sicher, dass das "index"-Modul immer aktiv ist! if (! in_array("index", $config['modules'])) { $config['modules'][] = "index"; } // Stelle sicher, dass das "about"-Modul immer aktiv ist! if (! in_array("about", $config['modules'])) { $config['modules'][] = "about"; } } if ($key == 'modules' && isset($_SESSION['restrict_modules'])) { $modules = array(); foreach ($config['modules'] as $mod) { if (in_array($mod, $_SESSION['restrict_modules'])) $modules[] = $mod; } return $modules; } if (array_key_exists($key, $config)) return $config[$key]; if ($localonly) { return NULL; } /* read configuration from database */ $result = db_query( "SELECT `key`, value FROM misc.config" ); while( $object = $result->fetch() ) { if (!array_key_exists($object['key'], $config)) { $config[$object['key']]=$object['value']; } } // Sonst wird das Passwort des webadmin-Users mit ausgegeben $debug_config = $config; unset($debug_config['db_pass']); DEBUG($debug_config); if (array_key_exists($key, $config)) return $config[$key]; else logger(LOG_ERR, "inc/base", "config", "Request to read nonexistant config option »{$key}«."); return NULL; } function get_server_by_id($id) { $id = (int) $id; $result = db_query("SELECT hostname FROM system.servers WHERE id=?", array($id)); $ret = $result->fetch(); return $ret['hostname']; } function redirect($target) { global $debugmode; if (! $debugmode) header("Location: {$target}"); die(); } function my_server_id() { $uid = (int) $_SESSION['userinfo']['uid']; $result = db_query("SELECT server FROM system.useraccounts WHERE uid=?", array($uid)); $r = $result->fetch(); DEBUG($r); return $r['server']; } function additional_servers() { $uid = (int) $_SESSION['userinfo']['uid']; $result = db_query("SELECT server FROM system.user_server WHERE uid=?", array($uid)); $servers = array(); while ($s = $result->fetch()) $servers[] = $s['server']; DEBUG($servers); return $servers; } function server_names() { $result = db_query("SELECT id, hostname FROM system.servers"); $servers = array(); while ($s = $result->fetch()) $servers[$s['id']] = $s['hostname']; DEBUG($servers); return $servers; } // FIXME // Diese Funktion funktioniert nicht für preprared statements function maybe_null($value) { if (config("enable_debug")) { $backtrace = debug_backtrace(); warning("call to maybe_null() in {$backtrace[1]['file']} line {$backtrace[1]['line']}"); } if ($value == NULL) return 'NULL'; if (strlen( (string) $value ) > 0) return "'".db_escape_string($value)."'"; else return 'NULL'; } #define('LOG_ERR', 3); #define('LOG_WARNING', 4); #define('LOG_INFO', 6); function logger($severity, $scriptname, $scope, $message) { if (config('logging') <= $severity) return; $user = NULL; if ($_SESSION['role'] & ROLE_SYSTEMUSER) $user = $_SESSION['userinfo']['username']; elseif ($_SESSION['role'] & ROLE_CUSTOMER) $user = $_SESSION['customerinfo']['customerno']; $args = array(":user" => $user, ":remote" => $_SERVER['REMOTE_ADDR'], ":scriptname" => $scriptname, ":scope" => $scope, ":message" => $message); db_query("INSERT INTO misc.scriptlog (remote, user,scriptname,scope,message) VALUES (:remote, :user, :scriptname, :scope, :message)", $args); } function html_header($arg) { global $html_header; $html_header .= $arg; } function title($arg) { global $title; $title = $arg; } function headline($arg) { global $headline; $headline = $arg; } function output($arg) { global $output; $output .= $arg; } function random_string($nc, $a='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789') { $l=strlen($a)-1; $r=''; while($nc-->0) $r.=$a{mt_rand(0,$l)}; return $r; } function are_you_sure($query_string, $question) { $query_string = encode_querystring($query_string); $token = random_string(20); $_SESSION['are_you_sure_token'] = $token; title('Sicherheitsabfrage'); output(" <form action=\"{$query_string}\" method=\"post\"> <div class=\"confirmation\"> <div class=\"question\">{$question}</div> <p class=\"buttons\"> <input type=\"hidden\" name=\"random_token\" value=\"{$token}\" /> <input type=\"submit\" name=\"really\" value=\"Ja\" />     <input type=\"submit\" name=\"not_really\" value=\"Nein\" /> </p> </div>"); output("</form>\n"); } function user_is_sure() { if (isset($_POST['really'])) { if ($_POST['random_token'] == $_SESSION['are_you_sure_token']) return true; else system_failure("Possible Cross-site-request-forgery detected!"); } elseif (isset($_POST['not_really'])) return false; else return NULL; } function generate_form_token($form_id) { require_once("inc/debug.php"); $sessid = session_id(); if ($sessid == "") { DEBUG("Uh? Session not running? Wtf?"); system_failure("Internal error!"); } if (! isset($_SESSION['session_token'])) $_SESSION['session_token'] = random_string(10); return hash('sha256', $sessid.$form_id.$_SESSION['session_token']); } function check_form_token($form_id, $formtoken = NULL) { if ($formtoken == NULL) $formtoken = $_REQUEST['formtoken']; $sessid = session_id(); if ($sessid == "") { DEBUG("Uh? Session not running? Wtf?"); system_failure("Internal error! (Session not running)"); } $correct_formtoken = hash('sha256', $sessid.$form_id.$_SESSION['session_token']); if (! ($formtoken == $correct_formtoken)) system_failure("Possible cross-site-request-forgery!"); } function have_module($modname) { return in_array($modname, config('modules')); } function encode_querystring($querystring) { global $debugmode; if ($debugmode) $querystring = 'debug&'.$querystring; DEBUG($querystring); $query = explode('&', $querystring); $new_query = array(); foreach ($query AS $item) if ($item != '') { $split = explode('=', $item, 2); if (count($split) == 1) $new_query[] = $split[0]; else $new_query[] = $split[0].'='.urlencode($split[1]); } $querystring = implode('&', $new_query); if ($querystring) $querystring = '?'.$querystring; DEBUG($querystring); return $querystring; } function addnew($file, $label, $querystring = '', $attribs = '') { output('<p class="addnew">'.internal_link($file, $label, $querystring, $attribs).'</p>'); } function internal_link($file, $label, $querystring = '', $attribs = '') { global $prefix; if (strpos($file, '/') === 0) { $file = $prefix.substr($file, 1); } $querystring = encode_querystring($querystring); return "<a href=\"{$file}{$querystring}\" {$attribs} >{$label}</a>"; } function html_form($form_id, $scriptname, $querystring, $content) { $querystring = encode_querystring($querystring); $ret = ''; $ret .= '<form action="'.$scriptname.$querystring.'" method="post">'."\n"; $ret .= '<p style="display: none;"><input type="hidden" name="formtoken" value="'.generate_form_token($form_id).'" /></p>'."\n"; $ret .= $content; $ret .= '</form>'; return $ret; } function html_select($name, $options, $default='', $free='') { require_once('inc/security.php'); $ret = "<select name=\"{$name}\" id=\"{$name}\" size=\"1\" {$free} >\n"; foreach ($options as $key => $value) { $selected = ''; if ($default == $key) $selected = ' selected="selected" '; $key = filter_input_general($key); $value = filter_input_general($value); $ret .= " <option value=\"{$key}\"{$selected}>{$value}</option>\n"; } $ret .= '</select>'; return $ret; } function html_datepicker($nameprefix, $timestamp) { $valid_days = array( 1 => 1, 2 => 2, 3 => 3, 4 => 4, 5 => 5, 6 => 6, 7 => 7, 8 => 8, 9 => 9, 10 => 10, 11 => 11, 12 => 12, 13 => 13, 14 => 14, 15 => 15, 16 => 16, 17 => 17, 18 => 18, 19 => 19, 20 => 20, 21 => 21, 22 => 22, 23 => 23, 24 => 24, 25 => 25, 26 => 26, 27 => 27, 28 => 28, 29 => 29, 30 => 30, 31 => 31); $valid_months = array( 1 => 1, 2 => 2, 3 => 3, 4 => 4, 5 => 5, 6 => 6, 7 => 7, 8 => 8, 9 => 9, 10 => 10, 11 => 11, 12 => 12); $current_year = (int) date('Y'); $valid_years = array($current_year => $current_year, $current_year+1 => $current_year+1, $current_year+2 => $current_year+2, $current_year+3 => $current_year+3, $current_year+4 => $current_year+4); $selected_day = date('d', $timestamp); $selected_month = date('m', $timestamp); $selected_year = date('Y', $timestamp); $ret = ''; $ret .= html_select($nameprefix.'_day', $valid_days, $selected_day, 'style="text-align: right;"').". "; $ret .= html_select($nameprefix.'_month', $valid_months, $selected_month, 'style="text-align: right;"').". "; $ret .= html_select($nameprefix.'_year', $valid_years, $selected_year); return $ret; } function get_modules_info() { $modules = config('modules'); $modconfig = array(); foreach ($modules AS $name) { $modconfig[$name] = NULL; if (file_exists('modules/'.$name.'/module.info')) { $modconfig[$name] = parse_ini_file('modules/'.$name.'/module.info'); } } return $modconfig; } ?>