Rev 1090 | Rev 1112 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed
Rev | Author | Line No. | Line |
---|---|---|---|
2 | daniel-mar | 1 | <?php |
2 | |||
3 | /* |
||
4 | * OIDplus 2.0 |
||
1073 | daniel-mar | 5 | * Copyright 2019 - 2023 Daniel Marschall, ViaThinkSoft |
2 | daniel-mar | 6 | * |
7 | * Licensed under the Apache License, Version 2.0 (the "License"); |
||
8 | * you may not use this file except in compliance with the License. |
||
9 | * You may obtain a copy of the License at |
||
10 | * |
||
11 | * http://www.apache.org/licenses/LICENSE-2.0 |
||
12 | * |
||
13 | * Unless required by applicable law or agreed to in writing, software |
||
14 | * distributed under the License is distributed on an "AS IS" BASIS, |
||
15 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||
16 | * See the License for the specific language governing permissions and |
||
17 | * limitations under the License. |
||
18 | */ |
||
19 | |||
1050 | daniel-mar | 20 | namespace ViaThinkSoft\OIDplus; |
511 | daniel-mar | 21 | |
1086 | daniel-mar | 22 | // phpcs:disable PSR1.Files.SideEffects |
23 | \defined('INSIDE_OIDPLUS') or die; |
||
24 | // phpcs:enable PSR1.Files.SideEffects |
||
25 | |||
730 | daniel-mar | 26 | class OIDplus extends OIDplusBaseClass { |
281 | daniel-mar | 27 | private static /*OIDplusPagePlugin[]*/ $pagePlugins = array(); |
28 | private static /*OIDplusAuthPlugin[]*/ $authPlugins = array(); |
||
289 | daniel-mar | 29 | private static /*OIDplusLoggerPlugin[]*/ $loggerPlugins = array(); |
227 | daniel-mar | 30 | private static /*OIDplusObjectTypePlugin[]*/ $objectTypePlugins = array(); |
31 | private static /*string[]*/ $enabledObjectTypes = array(); |
||
32 | private static /*string[]*/ $disabledObjectTypes = array(); |
||
33 | private static /*OIDplusDatabasePlugin[]*/ $dbPlugins = array(); |
||
702 | daniel-mar | 34 | private static /*OIDplusCaptchaPlugin[]*/ $captchaPlugins = array(); |
274 | daniel-mar | 35 | private static /*OIDplusSqlSlangPlugin[]*/ $sqlSlangPlugins = array(); |
355 | daniel-mar | 36 | private static /*OIDplusLanguagePlugin[]*/ $languagePlugins = array(); |
449 | daniel-mar | 37 | private static /*OIDplusDesignPlugin[]*/ $designPlugins = array(); |
2 | daniel-mar | 38 | |
280 | daniel-mar | 39 | protected static $html = true; |
236 | daniel-mar | 40 | |
812 | daniel-mar | 41 | /*public*/ const PATH_RELATIVE = 1; // e.g. "../" |
42 | /*public*/ const PATH_ABSOLUTE = 2; // e.g. "http://www.example.com/oidplus/" |
||
43 | /*public*/ const PATH_ABSOLUTE_CANONICAL = 3; // e.g. "http://www.example.org/oidplus/" (if baseconfig CANONICAL_SYSTEM_URL is set) |
||
44 | /*public*/ const PATH_RELATIVE_TO_ROOT = 4; // e.g. "/oidplus/" |
||
45 | /*public*/ const PATH_RELATIVE_TO_ROOT_CANONICAL = 5; // e.g. "/oidplus/" (if baseconfig CANONICAL_SYSTEM_URL is set) |
||
801 | daniel-mar | 46 | |
778 | daniel-mar | 47 | // These plugin types can contain HTML code and therefore may |
48 | // emit (non-setup) CSS/JS code via their manifest. |
||
1072 | daniel-mar | 49 | // Note that design plugins may only output CSS, not JS. |
778 | daniel-mar | 50 | /*public*/ const INTERACTIVE_PLUGIN_TYPES = array( |
51 | 'publicPages', |
||
52 | 'raPages', |
||
53 | 'adminPages', |
||
54 | 'objectTypes', |
||
55 | 'captcha' |
||
56 | ); |
||
57 | |||
1073 | daniel-mar | 58 | const UUID_NAMEBASED_NS_Base64PubKey = 'fd16965c-8bab-11ed-8744-3c4a92df8582'; |
59 | |||
2 | daniel-mar | 60 | private function __construct() { |
61 | } |
||
295 | daniel-mar | 62 | |
1068 | daniel-mar | 63 | private static function insideSetup(): bool { |
64 | if (PHP_SAPI == 'cli') return false; |
||
65 | if (!isset($_SERVER['REQUEST_URI'])) return false; |
||
1055 | daniel-mar | 66 | return (strpos($_SERVER['REQUEST_URI'], OIDplus::webpath(null,OIDplus::PATH_RELATIVE_TO_ROOT).'setup/') === 0); |
67 | } |
||
68 | |||
1050 | daniel-mar | 69 | // --- Static classes |
274 | daniel-mar | 70 | |
263 | daniel-mar | 71 | private static $baseConfig = null; |
1050 | daniel-mar | 72 | private static $oldConfigFormatLoaded = false; |
261 | daniel-mar | 73 | public static function baseConfig() { |
263 | daniel-mar | 74 | $first_init = false; |
274 | daniel-mar | 75 | |
263 | daniel-mar | 76 | if ($first_init = is_null(self::$baseConfig)) { |
77 | self::$baseConfig = new OIDplusBaseConfig(); |
||
261 | daniel-mar | 78 | } |
79 | |||
1055 | daniel-mar | 80 | if (self::insideSetup()) return self::$baseConfig; |
81 | if ((basename($_SERVER['SCRIPT_NAME']) === 'oidplus.min.js.php') && isset($_REQUEST['noBaseConfig']) && ($_REQUEST['noBaseConfig'] == '1')) return self::$baseConfig; |
||
82 | if ((basename($_SERVER['SCRIPT_NAME']) === 'oidplus.min.css.php') && isset($_REQUEST['noBaseConfig']) && ($_REQUEST['noBaseConfig'] == '1')) return self::$baseConfig; |
||
83 | |||
263 | daniel-mar | 84 | if ($first_init) { |
261 | daniel-mar | 85 | // Include a file containing various size/depth limitations of OIDs |
294 | daniel-mar | 86 | // It is important to include it before userdata/baseconfig/config.inc.php was included, |
87 | // so we can give userdata/baseconfig/config.inc.php the chance to override the values. |
||
261 | daniel-mar | 88 | |
496 | daniel-mar | 89 | include OIDplus::localpath().'includes/oidplus_limits.inc.php'; |
261 | daniel-mar | 90 | |
91 | // Include config file |
||
295 | daniel-mar | 92 | |
496 | daniel-mar | 93 | $config_file = OIDplus::localpath() . 'userdata/baseconfig/config.inc.php'; |
94 | $config_file_old = OIDplus::localpath() . 'includes/config.inc.php'; // backwards compatibility |
||
295 | daniel-mar | 95 | |
294 | daniel-mar | 96 | if (!file_exists($config_file) && file_exists($config_file_old)) { |
97 | $config_file = $config_file_old; |
||
98 | } |
||
261 | daniel-mar | 99 | |
294 | daniel-mar | 100 | if (file_exists($config_file)) { |
1050 | daniel-mar | 101 | if (self::$oldConfigFormatLoaded) { |
263 | daniel-mar | 102 | // Note: We may only include it once due to backwards compatibility, |
103 | // since in version 2.0, the configuration was defined using define() statements |
||
104 | // Attention: This does mean that a full re-init (e.g. for test cases) is not possible |
||
105 | // if a version 2.0 config is used! |
||
1050 | daniel-mar | 106 | |
107 | // We need to do this, because define() cannot be undone |
||
108 | // Note: This can only happen in very special cases (e.g. test cases) where you call init() twice |
||
109 | throw new OIDplusConfigInitializationException(_L('A full re-initialization is not possible if a version 2.0 config file (containing "defines") is used. Please update to a config 2.1 file by running setup again.')); |
||
263 | daniel-mar | 110 | } else { |
1050 | daniel-mar | 111 | $tmp = file_get_contents($config_file); |
112 | $ns = "ViaThinkSoft\OIDplus\OIDplus"; |
||
113 | $uses = "use $ns;"; |
||
114 | if ((strpos($tmp,'OIDplus::') !== false) && (strpos($tmp,$uses) === false)) { |
||
115 | // Migrate config file to namespace class names |
||
116 | // Note: Only config files version 2.1 are affected. Not 2.0 ones |
||
117 | |||
118 | $tmp = "<?php\r\n\r\n$uses /* Automatically added by migration procedure */\r\n?>$tmp"; |
||
119 | $tmp = str_replace('?><?php', '', $tmp); |
||
120 | |||
121 | $tmp = str_replace("\$ns\OIDplusCaptchaPluginRecaptcha::", "OIDplusCaptchaPluginRecaptcha::", $tmp); |
||
122 | $tmp = str_replace("OIDplusCaptchaPluginRecaptcha::", "\$ns\OIDplusCaptchaPluginRecaptcha::", $tmp); |
||
123 | |||
124 | $tmp = str_replace('DISABLE_PLUGIN_OIDplusPagePublicRdap', |
||
125 | 'DISABLE_PLUGIN_Frdlweb\OIDplus\OIDplusPagePublicRdap', $tmp); |
||
126 | $tmp = str_replace('DISABLE_PLUGIN_OIDplusPagePublicAltIds', |
||
127 | 'DISABLE_PLUGIN_Frdlweb\OIDplus\OIDplusPagePublicAltIds', $tmp); |
||
1051 | daniel-mar | 128 | $tmp = str_replace('DISABLE_PLUGIN_OIDplusPagePublicUITweaks', |
129 | 'DISABLE_PLUGIN_TushevOrg\OIDplus\OIDplusPagePublicUITweaks', $tmp); |
||
1050 | daniel-mar | 130 | $tmp = str_replace('DISABLE_PLUGIN_OIDplus', |
131 | 'DISABLE_PLUGIN_ViaThinkSoft\OIDplus\OIDplus', $tmp); |
||
132 | |||
133 | if (@file_put_contents($config_file, $tmp) === false) { |
||
134 | eval('?>'.$tmp); |
||
135 | } else { |
||
136 | include $config_file; |
||
137 | } |
||
138 | } else { |
||
139 | include $config_file; |
||
140 | } |
||
263 | daniel-mar | 141 | } |
261 | daniel-mar | 142 | |
1055 | daniel-mar | 143 | // Backwards compatibility 2.0 => 2.1 |
261 | daniel-mar | 144 | if (defined('OIDPLUS_CONFIG_VERSION') && (OIDPLUS_CONFIG_VERSION == 2.0)) { |
1050 | daniel-mar | 145 | self::$oldConfigFormatLoaded = true; |
261 | daniel-mar | 146 | foreach (get_defined_constants(true)['user'] as $name => $value) { |
147 | $name = str_replace('OIDPLUS_', '', $name); |
||
148 | if ($name == 'SESSION_SECRET') $name = 'SERVER_SECRET'; |
||
149 | if ($name == 'MYSQL_QUERYLOG') $name = 'QUERY_LOGFILE'; |
||
1050 | daniel-mar | 150 | $name = str_replace('DISABLE_PLUGIN_OIDplusPagePublicRdap', |
151 | 'DISABLE_PLUGIN_Frdlweb\OIDplus\OIDplusPagePublicRdap', $name); |
||
152 | $name = str_replace('DISABLE_PLUGIN_OIDplusPagePublicAltIds', |
||
153 | 'DISABLE_PLUGIN_Frdlweb\OIDplus\OIDplusPagePublicAltIds', $name); |
||
1051 | daniel-mar | 154 | $name = str_replace('DISABLE_PLUGIN_OIDplusPagePublicUITweaks', |
155 | 'DISABLE_PLUGIN_TushevOrg\OIDplus\OIDplusPagePublicUITweaks', $name); |
||
1050 | daniel-mar | 156 | $name = str_replace('DISABLE_PLUGIN_OIDplus', |
157 | 'DISABLE_PLUGIN_ViaThinkSoft\OIDplus\OIDplus', $name); |
||
1055 | daniel-mar | 158 | if ($name == 'CONFIG_VERSION') { |
159 | $value = 2.1; |
||
160 | } else if (($name == 'MYSQL_PASSWORD') || ($name == 'ODBC_PASSWORD') || ($name == 'PDO_PASSWORD') || ($name == 'PGSQL_PASSWORD')) { |
||
161 | $value = base64_decode($value); |
||
261 | daniel-mar | 162 | } |
1055 | daniel-mar | 163 | self::$baseConfig->setValue($name, $value); |
261 | daniel-mar | 164 | } |
165 | } |
||
166 | } else { |
||
496 | daniel-mar | 167 | if (!is_dir(OIDplus::localpath().'setup')) { |
1050 | daniel-mar | 168 | throw new OIDplusConfigInitializationException(_L('File %1 is missing, but setup can\'t be started because its directory missing.',$config_file)); |
261 | daniel-mar | 169 | } else { |
280 | daniel-mar | 170 | if (self::$html) { |
1055 | daniel-mar | 171 | if (!self::insideSetup()) { |
801 | daniel-mar | 172 | header('Location:'.OIDplus::webpath(null,OIDplus::PATH_RELATIVE).'setup/'); |
360 | daniel-mar | 173 | die(_L('Redirecting to setup...')); |
349 | daniel-mar | 174 | } else { |
175 | return self::$baseConfig; |
||
176 | } |
||
261 | daniel-mar | 177 | } else { |
178 | // This can be displayed in e.g. ajax.php |
||
1050 | daniel-mar | 179 | throw new OIDplusConfigInitializationException(_L('File %1 is missing. Please run setup again.',$config_file)); |
261 | daniel-mar | 180 | } |
181 | } |
||
182 | } |
||
183 | |||
184 | // Check important config settings |
||
185 | |||
263 | daniel-mar | 186 | if (self::$baseConfig->getValue('CONFIG_VERSION') != 2.1) { |
801 | daniel-mar | 187 | if (strpos($_SERVER['REQUEST_URI'], OIDplus::webpath(null,OIDplus::PATH_RELATIVE).'setup/') !== 0) { |
503 | daniel-mar | 188 | throw new OIDplusConfigInitializationException(_L("The information located in %1 is outdated.",realpath($config_file))); |
189 | } |
||
261 | daniel-mar | 190 | } |
191 | |||
263 | daniel-mar | 192 | if (self::$baseConfig->getValue('SERVER_SECRET', '') === '') { |
801 | daniel-mar | 193 | if (strpos($_SERVER['REQUEST_URI'], OIDplus::webpath(null,OIDplus::PATH_RELATIVE).'setup/') !== 0) { |
503 | daniel-mar | 194 | throw new OIDplusConfigInitializationException(_L("You must set a value for SERVER_SECRET in %1 for the system to operate secure.",realpath($config_file))); |
195 | } |
||
261 | daniel-mar | 196 | } |
197 | } |
||
198 | |||
263 | daniel-mar | 199 | return self::$baseConfig; |
261 | daniel-mar | 200 | } |
201 | |||
263 | daniel-mar | 202 | private static $config = null; |
2 | daniel-mar | 203 | public static function config() { |
263 | daniel-mar | 204 | if ($first_init = is_null(self::$config)) { |
205 | self::$config = new OIDplusConfig(); |
||
2 | daniel-mar | 206 | } |
263 | daniel-mar | 207 | |
208 | if ($first_init) { |
||
209 | // These are important settings for base functionalities and therefore are not inside plugins |
||
210 | self::$config->prepareConfigKey('system_title', 'What is the name of your RA?', 'OIDplus 2.0', OIDplusConfig::PROTECTION_EDITABLE, function($value) { |
||
211 | if (empty($value)) { |
||
360 | daniel-mar | 212 | throw new OIDplusException(_L('Please enter a value for the system title.')); |
263 | daniel-mar | 213 | } |
214 | }); |
||
215 | self::$config->prepareConfigKey('admin_email', 'E-Mail address of the system administrator', '', OIDplusConfig::PROTECTION_EDITABLE, function($value) { |
||
216 | if (!empty($value) && !OIDplus::mailUtils()->validMailAddress($value)) { |
||
360 | daniel-mar | 217 | throw new OIDplusException(_L('This is not a correct email address')); |
263 | daniel-mar | 218 | } |
219 | }); |
||
875 | daniel-mar | 220 | self::$config->prepareConfigKey('global_cc', 'Global CC for all outgoing emails?', '', OIDplusConfig::PROTECTION_EDITABLE, function(&$value) { |
221 | $value = trim($value); |
||
222 | if ($value === '') return; |
||
223 | $addrs = explode(';', $value); |
||
224 | foreach ($addrs as $addr) { |
||
225 | $addr = trim($addr); |
||
226 | if (!empty($addr) && !OIDplus::mailUtils()->validMailAddress($addr)) { |
||
227 | throw new OIDplusException(_L('%1 is not a correct email address',$addr)); |
||
228 | } |
||
263 | daniel-mar | 229 | } |
230 | }); |
||
875 | daniel-mar | 231 | self::$config->prepareConfigKey('global_bcc', 'Global BCC for all outgoing emails?', '', OIDplusConfig::PROTECTION_EDITABLE, function(&$value) { |
232 | $value = trim($value); |
||
233 | if ($value === '') return; |
||
234 | $addrs = explode(';', $value); |
||
235 | foreach ($addrs as $addr) { |
||
236 | $addr = trim($addr); |
||
237 | if (!empty($addr) && !OIDplus::mailUtils()->validMailAddress($addr)) { |
||
238 | throw new OIDplusException(_L('%1 is not a correct email address',$addr)); |
||
239 | } |
||
240 | } |
||
241 | }); |
||
263 | daniel-mar | 242 | self::$config->prepareConfigKey('objecttypes_initialized', 'List of object type plugins that were initialized once', '', OIDplusConfig::PROTECTION_READONLY, function($value) { |
243 | // Nothing here yet |
||
244 | }); |
||
245 | self::$config->prepareConfigKey('objecttypes_enabled', 'Enabled object types and their order, separated with a semicolon (please reload the page so that the change is applied)', '', OIDplusConfig::PROTECTION_EDITABLE, function($value) { |
||
1050 | daniel-mar | 246 | // TODO: when objecttypes_enabled is changed at the admin control panel, we need to do a reload of the page, so that jsTree will be updated. Is there anything we can do? |
263 | daniel-mar | 247 | |
248 | $ary = explode(';',$value); |
||
249 | $uniq_ary = array_unique($ary); |
||
250 | |||
251 | if (count($ary) != count($uniq_ary)) { |
||
360 | daniel-mar | 252 | throw new OIDplusException(_L('Please check your input. Some object types are double.')); |
263 | daniel-mar | 253 | } |
254 | |||
255 | foreach ($ary as $ot_check) { |
||
256 | $ns_found = false; |
||
257 | foreach (OIDplus::getEnabledObjectTypes() as $ot) { |
||
258 | if ($ot::ns() == $ot_check) { |
||
259 | $ns_found = true; |
||
260 | break; |
||
261 | } |
||
262 | } |
||
263 | foreach (OIDplus::getDisabledObjectTypes() as $ot) { |
||
264 | if ($ot::ns() == $ot_check) { |
||
265 | $ns_found = true; |
||
266 | break; |
||
267 | } |
||
268 | } |
||
269 | if (!$ns_found) { |
||
360 | daniel-mar | 270 | throw new OIDplusException(_L('Please check your input. Namespace "%1" is not found',$ot_check)); |
263 | daniel-mar | 271 | } |
272 | } |
||
273 | }); |
||
274 | self::$config->prepareConfigKey('oidplus_private_key', 'Private key for this system', '', OIDplusConfig::PROTECTION_HIDDEN, function($value) { |
||
275 | // Nothing here yet |
||
276 | }); |
||
277 | self::$config->prepareConfigKey('oidplus_public_key', 'Public key for this system. If you "clone" your system, you must delete this key (e.g. using phpMyAdmin), so that a new one is created.', '', OIDplusConfig::PROTECTION_READONLY, function($value) { |
||
278 | // Nothing here yet |
||
279 | }); |
||
324 | daniel-mar | 280 | self::$config->prepareConfigKey('last_known_system_url', 'Last known System URL', '', OIDplusConfig::PROTECTION_HIDDEN, function($value) { |
281 | // Nothing here yet |
||
282 | }); |
||
412 | daniel-mar | 283 | self::$config->prepareConfigKey('last_known_version', 'Last known OIDplus Version', '', OIDplusConfig::PROTECTION_HIDDEN, function($value) { |
284 | // Nothing here yet |
||
285 | }); |
||
1088 | daniel-mar | 286 | self::$config->prepareConfigKey('default_ra_auth_method', 'Default auth method used for generating password of RAs (must exist in plugins/[vendorname]/auth/)? Empty = OIDplus decides.', '', OIDplusConfig::PROTECTION_EDITABLE, function($value) { |
287 | if (trim($value) === '') return; // OIDplus decides |
||
288 | |||
453 | daniel-mar | 289 | $good = true; |
290 | if (strpos($value,'/') !== false) $good = false; |
||
291 | if (strpos($value,'\\') !== false) $good = false; |
||
292 | if (strpos($value,'..') !== false) $good = false; |
||
293 | if (!$good) { |
||
294 | throw new OIDplusException(_L('Invalid auth plugin folder name. Do only enter a folder name, not an absolute or relative path')); |
||
295 | } |
||
296 | |||
1099 | daniel-mar | 297 | OIDplus::checkRaAuthPluginAvailable($value, true); |
453 | daniel-mar | 298 | }); |
263 | daniel-mar | 299 | } |
300 | |||
301 | return self::$config; |
||
2 | daniel-mar | 302 | } |
303 | |||
263 | daniel-mar | 304 | private static $gui = null; |
2 | daniel-mar | 305 | public static function gui() { |
263 | daniel-mar | 306 | if (is_null(self::$gui)) { |
307 | self::$gui = new OIDplusGui(); |
||
86 | daniel-mar | 308 | } |
263 | daniel-mar | 309 | return self::$gui; |
2 | daniel-mar | 310 | } |
311 | |||
263 | daniel-mar | 312 | private static $authUtils = null; |
2 | daniel-mar | 313 | public static function authUtils() { |
263 | daniel-mar | 314 | if (is_null(self::$authUtils)) { |
315 | self::$authUtils = new OIDplusAuthUtils(); |
||
86 | daniel-mar | 316 | } |
263 | daniel-mar | 317 | return self::$authUtils; |
2 | daniel-mar | 318 | } |
319 | |||
263 | daniel-mar | 320 | private static $mailUtils = null; |
250 | daniel-mar | 321 | public static function mailUtils() { |
263 | daniel-mar | 322 | if (is_null(self::$mailUtils)) { |
323 | self::$mailUtils = new OIDplusMailUtils(); |
||
250 | daniel-mar | 324 | } |
263 | daniel-mar | 325 | return self::$mailUtils; |
250 | daniel-mar | 326 | } |
327 | |||
557 | daniel-mar | 328 | private static $cookieUtils = null; |
329 | public static function cookieUtils() { |
||
330 | if (is_null(self::$cookieUtils)) { |
||
331 | self::$cookieUtils = new OIDplusCookieUtils(); |
||
332 | } |
||
333 | return self::$cookieUtils; |
||
334 | } |
||
335 | |||
263 | daniel-mar | 336 | private static $menuUtils = null; |
250 | daniel-mar | 337 | public static function menuUtils() { |
263 | daniel-mar | 338 | if (is_null(self::$menuUtils)) { |
339 | self::$menuUtils = new OIDplusMenuUtils(); |
||
250 | daniel-mar | 340 | } |
263 | daniel-mar | 341 | return self::$menuUtils; |
250 | daniel-mar | 342 | } |
343 | |||
263 | daniel-mar | 344 | private static $logger = null; |
115 | daniel-mar | 345 | public static function logger() { |
263 | daniel-mar | 346 | if (is_null(self::$logger)) { |
347 | self::$logger = new OIDplusLogger(); |
||
115 | daniel-mar | 348 | } |
263 | daniel-mar | 349 | return self::$logger; |
115 | daniel-mar | 350 | } |
351 | |||
1050 | daniel-mar | 352 | // --- SQL slang plugin |
274 | daniel-mar | 353 | |
354 | private static function registerSqlSlangPlugin(OIDplusSqlSlangPlugin $plugin) { |
||
355 | $name = $plugin::id(); |
||
591 | daniel-mar | 356 | if ($name === '') return false; |
274 | daniel-mar | 357 | |
449 | daniel-mar | 358 | if (isset(self::$sqlSlangPlugins[$name])) { |
451 | daniel-mar | 359 | $plugintype_hf = _L('SQL slang'); |
592 | daniel-mar | 360 | throw new OIDplusException(_L('Multiple %1 plugins use the ID %2', $plugintype_hf, $name)); |
449 | daniel-mar | 361 | } |
362 | |||
274 | daniel-mar | 363 | self::$sqlSlangPlugins[$name] = $plugin; |
364 | |||
365 | return true; |
||
366 | } |
||
367 | |||
368 | public static function getSqlSlangPlugins() { |
||
369 | return self::$sqlSlangPlugins; |
||
370 | } |
||
371 | |||
318 | daniel-mar | 372 | public static function getSqlSlangPlugin($id)/*: ?OIDplusSqlSlangPlugin*/ { |
373 | if (isset(self::$sqlSlangPlugins[$id])) { |
||
374 | return self::$sqlSlangPlugins[$id]; |
||
375 | } else { |
||
376 | return null; |
||
377 | } |
||
378 | } |
||
379 | |||
1050 | daniel-mar | 380 | // --- Database plugin |
74 | daniel-mar | 381 | |
227 | daniel-mar | 382 | private static function registerDatabasePlugin(OIDplusDatabasePlugin $plugin) { |
275 | daniel-mar | 383 | $name = $plugin::id(); |
591 | daniel-mar | 384 | if ($name === '') return false; |
150 | daniel-mar | 385 | |
449 | daniel-mar | 386 | if (isset(self::$dbPlugins[$name])) { |
387 | $plugintype_hf = _L('Database'); |
||
592 | daniel-mar | 388 | throw new OIDplusException(_L('Multiple %1 plugins use the ID %2', $plugintype_hf, $name)); |
449 | daniel-mar | 389 | } |
390 | |||
150 | daniel-mar | 391 | self::$dbPlugins[$name] = $plugin; |
392 | |||
393 | return true; |
||
394 | } |
||
395 | |||
396 | public static function getDatabasePlugins() { |
||
397 | return self::$dbPlugins; |
||
398 | } |
||
399 | |||
295 | daniel-mar | 400 | public static function getActiveDatabasePlugin() { |
702 | daniel-mar | 401 | $db_plugin_name = OIDplus::baseConfig()->getValue('DATABASE_PLUGIN',''); |
402 | if ($db_plugin_name === '') { |
||
360 | daniel-mar | 403 | throw new OIDplusConfigInitializationException(_L('No database plugin selected in config file')); |
260 | daniel-mar | 404 | } |
1016 | daniel-mar | 405 | foreach (self::$dbPlugins as $name => $plugin) { |
406 | if (strtolower($name) == strtolower($db_plugin_name)) { |
||
407 | return $plugin; |
||
408 | } |
||
227 | daniel-mar | 409 | } |
1016 | daniel-mar | 410 | throw new OIDplusConfigInitializationException(_L('Database plugin "%1" not found',$db_plugin_name)); |
227 | daniel-mar | 411 | } |
412 | |||
295 | daniel-mar | 413 | private static $dbMainSession = null; |
414 | public static function db() { |
||
415 | if (is_null(self::$dbMainSession)) { |
||
416 | self::$dbMainSession = self::getActiveDatabasePlugin()->newConnection(); |
||
417 | } |
||
418 | if (!self::$dbMainSession->isConnected()) self::$dbMainSession->connect(); |
||
419 | return self::$dbMainSession; |
||
420 | } |
||
421 | |||
422 | private static $dbIsolatedSession = null; |
||
423 | public static function dbIsolated() { |
||
424 | if (is_null(self::$dbIsolatedSession)) { |
||
425 | self::$dbIsolatedSession = self::getActiveDatabasePlugin()->newConnection(); |
||
426 | } |
||
427 | if (!self::$dbIsolatedSession->isConnected()) self::$dbIsolatedSession->connect(); |
||
428 | return self::$dbIsolatedSession; |
||
429 | } |
||
430 | |||
1050 | daniel-mar | 431 | // --- CAPTCHA plugin |
702 | daniel-mar | 432 | |
433 | private static function registerCaptchaPlugin(OIDplusCaptchaPlugin $plugin) { |
||
434 | $name = $plugin::id(); |
||
435 | if ($name === '') return false; |
||
436 | |||
437 | if (isset(self::$captchaPlugins[$name])) { |
||
438 | $plugintype_hf = _L('CAPTCHA'); |
||
439 | throw new OIDplusException(_L('Multiple %1 plugins use the ID %2', $plugintype_hf, $name)); |
||
440 | } |
||
441 | |||
442 | self::$captchaPlugins[$name] = $plugin; |
||
443 | |||
444 | return true; |
||
445 | } |
||
446 | |||
447 | public static function getCaptchaPlugins() { |
||
448 | return self::$captchaPlugins; |
||
449 | } |
||
450 | |||
704 | daniel-mar | 451 | public static function getActiveCaptchaPluginId() { |
702 | daniel-mar | 452 | $captcha_plugin_name = OIDplus::baseConfig()->getValue('CAPTCHA_PLUGIN', ''); |
453 | |||
454 | if (OIDplus::baseConfig()->getValue('RECAPTCHA_ENABLED', false) && ($captcha_plugin_name === '')) { |
||
455 | // Legacy config file support! |
||
1016 | daniel-mar | 456 | $captcha_plugin_name = 'reCAPTCHA'; |
702 | daniel-mar | 457 | } |
458 | |||
704 | daniel-mar | 459 | if ($captcha_plugin_name === '') $captcha_plugin_name = 'None'; // the "None" plugin is a must-have! |
702 | daniel-mar | 460 | |
704 | daniel-mar | 461 | return $captcha_plugin_name; |
462 | } |
||
463 | |||
464 | public static function getActiveCaptchaPlugin() { |
||
465 | $captcha_plugin_name = OIDplus::getActiveCaptchaPluginId(); |
||
1016 | daniel-mar | 466 | foreach (self::$captchaPlugins as $name => $plugin) { |
467 | if (strtolower($name) == strtolower($captcha_plugin_name)) { |
||
468 | return $plugin; |
||
469 | } |
||
702 | daniel-mar | 470 | } |
1016 | daniel-mar | 471 | throw new OIDplusConfigInitializationException(_L('CAPTCHA plugin "%1" not found',$captcha_plugin_name)); |
702 | daniel-mar | 472 | } |
473 | |||
1050 | daniel-mar | 474 | // --- Page plugin |
227 | daniel-mar | 475 | |
224 | daniel-mar | 476 | private static function registerPagePlugin(OIDplusPagePlugin $plugin) { |
281 | daniel-mar | 477 | self::$pagePlugins[] = $plugin; |
61 | daniel-mar | 478 | |
479 | return true; |
||
480 | } |
||
481 | |||
281 | daniel-mar | 482 | public static function getPagePlugins() { |
483 | return self::$pagePlugins; |
||
61 | daniel-mar | 484 | } |
485 | |||
1050 | daniel-mar | 486 | // --- Auth plugin |
227 | daniel-mar | 487 | |
1088 | daniel-mar | 488 | public static function getAuthPluginByFoldername($foldername)/*: ?OIDplusAuthPlugin*/ { |
489 | $plugins = OIDplus::getAuthPlugins(); |
||
490 | foreach ($plugins as $plugin) { |
||
491 | if (basename($plugin->getPluginDirectory()) === $foldername) { |
||
492 | return $plugin; |
||
493 | } |
||
494 | } |
||
495 | return null; |
||
496 | } |
||
497 | |||
1099 | daniel-mar | 498 | private static function checkRaAuthPluginAvailable($plugin_foldername, $must_hash) { |
1088 | daniel-mar | 499 | // if (!wildcard_is_dir(OIDplus::localpath().'plugins/'.'*'.'/auth/'.$plugin_foldername)) { |
500 | $plugin = OIDplus::getAuthPluginByFoldername($plugin_foldername); |
||
501 | if (is_null($plugin)) { |
||
502 | throw new OIDplusException(_L('The auth plugin "%1" does not exist in plugin directory %2',$plugin_foldername,'plugins/[vendorname]/auth/')); |
||
503 | } |
||
504 | |||
505 | $reason = ''; |
||
1099 | daniel-mar | 506 | if (!$plugin->availableForVerify($reason)) { |
507 | throw new OIDplusException(trim(_L('The auth plugin "%1" is not available for password verification on this system.',$plugin_foldername).' '.$reason)); |
||
1088 | daniel-mar | 508 | } |
1099 | daniel-mar | 509 | if ($must_hash && !$plugin->availableForHash($reason)) { |
510 | throw new OIDplusException(trim(_L('The auth plugin "%1" is not available for hashing on this system.',$plugin_foldername).' '.$reason)); |
||
511 | } |
||
1088 | daniel-mar | 512 | } |
513 | |||
1099 | daniel-mar | 514 | public static function getDefaultRaAuthPlugin($must_hash)/*: OIDplusAuthPlugin*/ { |
1088 | daniel-mar | 515 | // 1. Priority: Use the auth plugin the user prefers |
516 | $def_plugin_foldername = OIDplus::config()->getValue('default_ra_auth_method'); |
||
517 | if (trim($def_plugin_foldername) !== '') { |
||
1099 | daniel-mar | 518 | OIDplus::checkRaAuthPluginAvailable($def_plugin_foldername, $must_hash); |
1088 | daniel-mar | 519 | $plugin = OIDplus::getAuthPluginByFoldername($def_plugin_foldername); |
520 | return $plugin; |
||
521 | } |
||
522 | |||
523 | // 2. Priority: If empty (i.e. OIDplus may decide), choose the best ViaThinkSoft plugin that is supported on this system |
||
524 | $preferred_auth_plugins = array( |
||
1099 | daniel-mar | 525 | // Sorted by preference |
526 | 'A4_argon2', // usually Salted Argon2id |
||
527 | 'A3_bcrypt', // usually Salted BCrypt |
||
528 | 'A5_vts_mcf', // usually SHA3-512-HMAC |
||
529 | 'A6_crypt' // usually Salted SHA512 with 5000 rounds |
||
1088 | daniel-mar | 530 | ); |
531 | foreach ($preferred_auth_plugins as $plugin_foldername) { |
||
532 | $plugin = OIDplus::getAuthPluginByFoldername($plugin_foldername); |
||
533 | if (is_null($plugin)) continue; |
||
534 | |||
535 | $reason = ''; |
||
1099 | daniel-mar | 536 | if (!$plugin->availableForHash($reason)) continue; |
537 | if ($must_hash && !$plugin->availableForVerify($reason)) continue; |
||
1088 | daniel-mar | 538 | return $plugin; |
539 | } |
||
540 | |||
541 | // 3. Priority: If nothing found, take the first found plugin |
||
542 | $plugins = OIDplus::getAuthPlugins(); |
||
1099 | daniel-mar | 543 | foreach ($plugins as $plugin) { |
544 | $reason = ''; |
||
545 | if (!$plugin->availableForHash($reason)) continue; |
||
546 | if ($must_hash && !$plugin->availableForVerify($reason)) continue; |
||
547 | return $plugin; |
||
1088 | daniel-mar | 548 | } |
549 | |||
550 | // 4. Priority: We must deny the creation of the password because we have no auth plugin! |
||
551 | throw new OIDplusException(_L('Could not find a fitting auth plugin!')); |
||
552 | } |
||
553 | |||
227 | daniel-mar | 554 | private static function registerAuthPlugin(OIDplusAuthPlugin $plugin) { |
1089 | daniel-mar | 555 | $reason = ''; |
1099 | daniel-mar | 556 | if (OIDplus::baseConfig()->getValue('DEBUG') && $plugin->availableForHash($reason) && $plugin->availableForVerify($reason)) { |
456 | daniel-mar | 557 | $password = generateRandomString(25); |
459 | daniel-mar | 558 | |
461 | daniel-mar | 559 | try { |
560 | $authInfo = $plugin->generate($password); |
||
561 | } catch (OIDplusException $e) { |
||
1090 | daniel-mar | 562 | // This can happen when the AuthKey is too long for the database field |
1088 | daniel-mar | 563 | // Note: The constructor and setters of OIDplusRAAuthInfo() already check for length and null/false values. |
461 | daniel-mar | 564 | throw new OIDplusException(_L('Auth plugin "%1" is erroneous: %2',basename($plugin->getPluginDirectory()),$e->getMessage())); |
565 | } |
||
1088 | daniel-mar | 566 | |
461 | daniel-mar | 567 | $authKey = $authInfo->getAuthKey(); |
459 | daniel-mar | 568 | |
461 | daniel-mar | 569 | $authInfo_AuthKeyDiff = clone $authInfo; |
570 | $authInfo_AuthKeyDiff->setAuthKey(strrev($authInfo_AuthKeyDiff->getAuthKey())); |
||
571 | |||
572 | if ((!$plugin->verify($authInfo,$password)) || |
||
573 | ($plugin->verify($authInfo_AuthKeyDiff,$password)) || |
||
574 | ($plugin->verify($authInfo,$password.'x'))) { |
||
1088 | daniel-mar | 575 | throw new OIDplusException(_L('Auth plugin "%1" is erroneous: Generate/Verify self-test failed',basename($plugin->getPluginDirectory()))); |
456 | daniel-mar | 576 | } |
453 | daniel-mar | 577 | } |
578 | |||
227 | daniel-mar | 579 | self::$authPlugins[] = $plugin; |
580 | return true; |
||
581 | } |
||
582 | |||
221 | daniel-mar | 583 | public static function getAuthPlugins() { |
584 | return self::$authPlugins; |
||
585 | } |
||
586 | |||
1050 | daniel-mar | 587 | // --- Language plugin |
355 | daniel-mar | 588 | |
589 | private static function registerLanguagePlugin(OIDplusLanguagePlugin $plugin) { |
||
590 | self::$languagePlugins[] = $plugin; |
||
591 | return true; |
||
592 | } |
||
593 | |||
594 | public static function getLanguagePlugins() { |
||
595 | return self::$languagePlugins; |
||
596 | } |
||
597 | |||
1050 | daniel-mar | 598 | // --- Design plugin |
449 | daniel-mar | 599 | |
600 | private static function registerDesignPlugin(OIDplusDesignPlugin $plugin) { |
||
601 | self::$designPlugins[] = $plugin; |
||
602 | return true; |
||
603 | } |
||
604 | |||
605 | public static function getDesignPlugins() { |
||
606 | return self::$designPlugins; |
||
607 | } |
||
608 | |||
819 | daniel-mar | 609 | public static function getActiveDesignPlugin() { |
610 | $plugins = OIDplus::getDesignPlugins(); |
||
611 | foreach ($plugins as $plugin) { |
||
612 | if ((basename($plugin->getPluginDirectory())) == OIDplus::config()->getValue('design','default')) { |
||
613 | return $plugin; |
||
614 | } |
||
615 | } |
||
616 | return null; |
||
617 | } |
||
618 | |||
1050 | daniel-mar | 619 | // --- Logger plugin |
289 | daniel-mar | 620 | |
621 | private static function registerLoggerPlugin(OIDplusLoggerPlugin $plugin) { |
||
622 | self::$loggerPlugins[] = $plugin; |
||
623 | return true; |
||
624 | } |
||
625 | |||
626 | public static function getLoggerPlugins() { |
||
627 | return self::$loggerPlugins; |
||
628 | } |
||
629 | |||
1050 | daniel-mar | 630 | // --- Object type plugin |
227 | daniel-mar | 631 | |
632 | private static function registerObjectTypePlugin(OIDplusObjectTypePlugin $plugin) { |
||
633 | self::$objectTypePlugins[] = $plugin; |
||
634 | |||
635 | $ot = $plugin::getObjectTypeClassName(); |
||
636 | self::registerObjectType($ot); |
||
637 | |||
638 | return true; |
||
639 | } |
||
640 | |||
224 | daniel-mar | 641 | private static function registerObjectType($ot) { |
66 | daniel-mar | 642 | $ns = $ot::ns(); |
860 | daniel-mar | 643 | if (empty($ns)) throw new OIDplusException(_L('ObjectType plugin %1 is erroneous: Namespace must not be empty',$ot)); |
66 | daniel-mar | 644 | |
860 | daniel-mar | 645 | // Currently, we must enforce that namespaces in objectType plugins are lowercase, because prefilterQuery() makes all namespaces lowercase and the DBMS should be case-sensitive |
646 | if ($ns != strtolower($ns)) throw new OIDplusException(_L('ObjectType plugin %1 is erroneous: Namespace %2 must be lower-case',$ot,$ns)); |
||
66 | daniel-mar | 647 | |
860 | daniel-mar | 648 | $root = $ot::root(); |
649 | if (!str_starts_with($root,$ns.':')) throw new OIDplusException(_L('ObjectType plugin %1 is erroneous: Root node (%2) is in wrong namespace (needs starts with %3)!',$ot,$root,$ns.':')); |
||
650 | |||
66 | daniel-mar | 651 | $ns_found = false; |
227 | daniel-mar | 652 | foreach (array_merge(OIDplus::getEnabledObjectTypes(), OIDplus::getDisabledObjectTypes()) as $test_ot) { |
66 | daniel-mar | 653 | if ($test_ot::ns() == $ns) { |
654 | $ns_found = true; |
||
655 | break; |
||
656 | } |
||
657 | } |
||
658 | if ($ns_found) { |
||
360 | daniel-mar | 659 | throw new OIDplusException(_L('Attention: Two objectType plugins use the same namespace "%1"!',$ns)); |
66 | daniel-mar | 660 | } |
661 | |||
662 | $init = OIDplus::config()->getValue("objecttypes_initialized"); |
||
663 | $init_ary = empty($init) ? array() : explode(';', $init); |
||
70 | daniel-mar | 664 | $init_ary = array_map('trim', $init_ary); |
66 | daniel-mar | 665 | |
666 | $enabled = OIDplus::config()->getValue("objecttypes_enabled"); |
||
667 | $enabled_ary = empty($enabled) ? array() : explode(';', $enabled); |
||
70 | daniel-mar | 668 | $enabled_ary = array_map('trim', $enabled_ary); |
66 | daniel-mar | 669 | |
79 | daniel-mar | 670 | $do_enable = false; |
671 | if (in_array($ns, $enabled_ary)) { |
||
447 | daniel-mar | 672 | // If it is in the list of enabled object types, it is enabled (obviously) |
79 | daniel-mar | 673 | $do_enable = true; |
674 | } else { |
||
447 | daniel-mar | 675 | if (!OIDplus::config()->getValue('oobe_objects_done')) { |
676 | // If the OOBE wizard is NOT done, then just enable the "oid" object type by default |
||
79 | daniel-mar | 677 | $do_enable = $ns == 'oid'; |
678 | } else { |
||
447 | daniel-mar | 679 | // If the OOBE wizard was done (once), then |
680 | // we will enable all object types which were never initialized |
||
681 | // (i.e. a plugin folder was freshly added) |
||
79 | daniel-mar | 682 | $do_enable = !in_array($ns, $init_ary); |
683 | } |
||
684 | } |
||
685 | |||
686 | if ($do_enable) { |
||
227 | daniel-mar | 687 | self::$enabledObjectTypes[] = $ot; |
688 | usort(self::$enabledObjectTypes, function($a, $b) { |
||
66 | daniel-mar | 689 | $enabled = OIDplus::config()->getValue("objecttypes_enabled"); |
690 | $enabled_ary = explode(';', $enabled); |
||
691 | |||
692 | $idx_a = array_search($a::ns(), $enabled_ary); |
||
693 | $idx_b = array_search($b::ns(), $enabled_ary); |
||
694 | |||
695 | if ($idx_a == $idx_b) { |
||
696 | return 0; |
||
697 | } |
||
698 | return ($idx_a > $idx_b) ? +1 : -1; |
||
699 | }); |
||
74 | daniel-mar | 700 | } else { |
701 | self::$disabledObjectTypes[] = $ot; |
||
66 | daniel-mar | 702 | } |
703 | |||
704 | if (!in_array($ns, $init_ary)) { |
||
705 | // Was never initialized before, so we add it to the list of enabled object types once |
||
706 | |||
79 | daniel-mar | 707 | if ($do_enable) { |
708 | $enabled_ary[] = $ns; |
||
672 | daniel-mar | 709 | // Important: Don't validate the input, because the other object types might not be initialized yet! So use setValueNoCallback() instead setValue(). |
710 | OIDplus::config()->setValueNoCallback("objecttypes_enabled", implode(';', $enabled_ary)); |
||
79 | daniel-mar | 711 | } |
66 | daniel-mar | 712 | |
713 | $init_ary[] = $ns; |
||
714 | OIDplus::config()->setValue("objecttypes_initialized", implode(';', $init_ary)); |
||
715 | } |
||
61 | daniel-mar | 716 | } |
717 | |||
227 | daniel-mar | 718 | public static function getObjectTypePlugins() { |
719 | return self::$objectTypePlugins; |
||
61 | daniel-mar | 720 | } |
721 | |||
227 | daniel-mar | 722 | public static function getObjectTypePluginsEnabled() { |
723 | $res = array(); |
||
724 | foreach (self::$objectTypePlugins as $plugin) { |
||
725 | $ot = $plugin::getObjectTypeClassName(); |
||
726 | if (in_array($ot, self::$enabledObjectTypes)) $res[] = $plugin; |
||
727 | } |
||
728 | return $res; |
||
74 | daniel-mar | 729 | } |
730 | |||
227 | daniel-mar | 731 | public static function getObjectTypePluginsDisabled() { |
732 | $res = array(); |
||
733 | foreach (self::$objectTypePlugins as $plugin) { |
||
734 | $ot = $plugin::getObjectTypeClassName(); |
||
735 | if (in_array($ot, self::$disabledObjectTypes)) $res[] = $plugin; |
||
74 | daniel-mar | 736 | } |
227 | daniel-mar | 737 | return $res; |
74 | daniel-mar | 738 | } |
739 | |||
227 | daniel-mar | 740 | public static function getEnabledObjectTypes() { |
741 | return self::$enabledObjectTypes; |
||
742 | } |
||
74 | daniel-mar | 743 | |
227 | daniel-mar | 744 | public static function getDisabledObjectTypes() { |
745 | return self::$disabledObjectTypes; |
||
746 | } |
||
74 | daniel-mar | 747 | |
1050 | daniel-mar | 748 | // --- Plugin handling functions |
277 | daniel-mar | 749 | |
320 | daniel-mar | 750 | public static function getAllPlugins()/*: array*/ { |
751 | $res = array(); |
||
752 | $res = array_merge($res, self::$pagePlugins); |
||
753 | $res = array_merge($res, self::$authPlugins); |
||
754 | $res = array_merge($res, self::$loggerPlugins); |
||
755 | $res = array_merge($res, self::$objectTypePlugins); |
||
756 | $res = array_merge($res, self::$dbPlugins); |
||
702 | daniel-mar | 757 | $res = array_merge($res, self::$captchaPlugins); |
320 | daniel-mar | 758 | $res = array_merge($res, self::$sqlSlangPlugins); |
355 | daniel-mar | 759 | $res = array_merge($res, self::$languagePlugins); |
449 | daniel-mar | 760 | $res = array_merge($res, self::$designPlugins); |
320 | daniel-mar | 761 | return $res; |
762 | } |
||
763 | |||
321 | daniel-mar | 764 | public static function getPluginByOid($oid)/*: ?OIDplusPlugin*/ { |
320 | daniel-mar | 765 | $plugins = self::getAllPlugins(); |
321 | daniel-mar | 766 | foreach ($plugins as $plugin) { |
767 | if (oid_dotnotation_equal($plugin->getManifest()->getOid(), $oid)) { |
||
768 | return $plugin; |
||
320 | daniel-mar | 769 | } |
770 | } |
||
771 | return null; |
||
772 | } |
||
773 | |||
380 | daniel-mar | 774 | public static function getPluginByClassName($classname)/*: ?OIDplusPlugin*/ { |
775 | $plugins = self::getAllPlugins(); |
||
776 | foreach ($plugins as $plugin) { |
||
777 | if (get_class($plugin) === $classname) { |
||
778 | return $plugin; |
||
779 | } |
||
780 | } |
||
781 | return null; |
||
277 | daniel-mar | 782 | } |
783 | |||
594 | daniel-mar | 784 | /** |
1050 | daniel-mar | 785 | * Checks if the plugin is disabled |
786 | * @return boolean true if plugin is enabled, false if plugin is disabled |
||
787 | * @throws OIDplusException if the class name or config file (disabled setting) does not contain a namespace |
||
788 | */ |
||
789 | private static function pluginCheckDisabled($class_name): bool { |
||
790 | $path = explode('\\', $class_name); |
||
791 | |||
792 | if (count($path) == 1) { |
||
793 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$class_name).': '._L('The plugin uses no namespaces. The new version of OIDplus requires plugin class files to be in a namespace. Please notify your plugin author and ask for an update.')); |
||
794 | } |
||
795 | |||
796 | $class_end = end($path); |
||
797 | if (OIDplus::baseConfig()->getValue('DISABLE_PLUGIN_'.$class_end, false)) { |
||
798 | throw new OIDplusConfigInitializationException(_L('Your base configuration file is outdated. Please change "%1" to "%2".','DISABLE_PLUGIN_'.$class_end,'DISABLE_PLUGIN_'.$class_name)); |
||
799 | } |
||
800 | |||
801 | if (OIDplus::baseConfig()->getValue('DISABLE_PLUGIN_'.$class_name, false)) { |
||
802 | return false; |
||
803 | } |
||
804 | |||
805 | return true; |
||
806 | } |
||
807 | |||
808 | /** |
||
594 | daniel-mar | 809 | * @return array<OIDplusPluginManifest>|array<string,array<string,OIDplusPluginManifest>> |
810 | */ |
||
693 | daniel-mar | 811 | public static function getAllPluginManifests($pluginFolderMasks='*', $flat=true): array { |
277 | daniel-mar | 812 | $out = array(); |
279 | daniel-mar | 813 | // Note: glob() will sort by default, so we do not need a page priority attribute. |
814 | // So you just need to use a numeric plugin directory prefix (padded). |
||
693 | daniel-mar | 815 | $ary = array(); |
816 | foreach (explode(',',$pluginFolderMasks) as $pluginFolderMask) { |
||
817 | $ary = array_merge($ary,glob(OIDplus::localpath().'plugins/'.'*'.'/'.$pluginFolderMask.'/'.'*'.'/manifest.xml')); |
||
818 | } |
||
646 | daniel-mar | 819 | |
820 | // Sort the plugins by their type and name, as if they would be in a single vendor-folder! |
||
821 | uasort($ary, function($a,$b) { |
||
822 | if ($a == $b) return 0; |
||
823 | |||
824 | $ary = explode('/',$a); |
||
825 | $bry = explode('/',$b); |
||
826 | |||
827 | // First sort by type (publicPage, auth, database, language, ...) |
||
828 | $a_type = $ary[count($ary)-1-2]; |
||
829 | $b_type = $bry[count($bry)-1-2]; |
||
830 | if ($a_type < $b_type) return -1; |
||
831 | if ($a_type > $b_type) return 1; |
||
832 | |||
833 | // Then sort by name (090_login, 100_whois, etc.) |
||
834 | $a_name = $ary[count($ary)-1-1]; |
||
835 | $b_name = $bry[count($bry)-1-1]; |
||
836 | if ($a_name < $b_name) return -1; |
||
837 | if ($a_name > $b_name) return 1; |
||
838 | |||
839 | // If it is still equal, then finally sort by vendorname |
||
840 | $a_vendor = $ary[count($ary)-1-3]; |
||
841 | $b_vendor = $bry[count($bry)-1-3]; |
||
842 | if ($a_vendor < $b_vendor) return -1; |
||
843 | if ($a_vendor > $b_vendor) return 1; |
||
844 | return 0; |
||
845 | }); |
||
846 | |||
277 | daniel-mar | 847 | foreach ($ary as $ini) { |
848 | if (!file_exists($ini)) continue; |
||
849 | |||
307 | daniel-mar | 850 | $manifest = new OIDplusPluginManifest(); |
851 | $manifest->loadManifest($ini); |
||
277 | daniel-mar | 852 | |
473 | daniel-mar | 853 | $class_name = $manifest->getPhpMainClass(); |
1050 | daniel-mar | 854 | if ($class_name) if (!self::pluginCheckDisabled($class_name)) continue; |
473 | daniel-mar | 855 | |
307 | daniel-mar | 856 | if ($flat) { |
857 | $out[] = $manifest; |
||
858 | } else { |
||
859 | $plugintype_folder = basename(dirname(dirname($ini))); |
||
860 | $pluginname_folder = basename(dirname($ini)); |
||
861 | |||
862 | if (!isset($out[$plugintype_folder])) $out[$plugintype_folder] = array(); |
||
863 | if (!isset($out[$plugintype_folder][$pluginname_folder])) $out[$plugintype_folder][$pluginname_folder] = array(); |
||
864 | $out[$plugintype_folder][$pluginname_folder] = $manifest; |
||
865 | } |
||
277 | daniel-mar | 866 | } |
867 | return $out; |
||
868 | } |
||
869 | |||
594 | daniel-mar | 870 | /** |
871 | * @return array<string> |
||
872 | */ |
||
277 | daniel-mar | 873 | public static function registerAllPlugins($pluginDirName, $expectedPluginClass, $registerCallback): array { |
874 | $out = array(); |
||
525 | daniel-mar | 875 | if (is_array($pluginDirName)) { |
876 | $ary = array(); |
||
877 | foreach ($pluginDirName as $pluginDirName_) { |
||
878 | $ary = array_merge($ary, self::getAllPluginManifests($pluginDirName_, false)); |
||
879 | } |
||
880 | } else { |
||
881 | $ary = self::getAllPluginManifests($pluginDirName, false); |
||
882 | } |
||
320 | daniel-mar | 883 | $known_plugin_oids = array(); |
456 | daniel-mar | 884 | if (OIDplus::baseConfig()->getValue('DEBUG')) { |
885 | $fake_feature = uuid_to_oid(gen_uuid()); |
||
588 | daniel-mar | 886 | } else { |
887 | $fake_feature = null; |
||
456 | daniel-mar | 888 | } |
277 | daniel-mar | 889 | foreach ($ary as $plugintype_folder => $bry) { |
438 | daniel-mar | 890 | foreach ($bry as $pluginname_folder => $manifest) { |
891 | $class_name = $manifest->getPhpMainClass(); |
||
892 | |||
893 | // Before we load the plugin, we want to make some checks to confirm |
||
894 | // that the plugin is working correctly. |
||
895 | |||
307 | daniel-mar | 896 | if (!$class_name) { |
1050 | daniel-mar | 897 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('Manifest does not declare a PHP main class')); |
277 | daniel-mar | 898 | } |
1050 | daniel-mar | 899 | if (!self::pluginCheckDisabled($class_name)) { |
900 | continue; // Plugin is disabled |
||
297 | daniel-mar | 901 | } |
1072 | daniel-mar | 902 | |
903 | // Do some basic checks on the plugin PHP main class |
||
292 | daniel-mar | 904 | if (!class_exists($class_name)) { |
1050 | daniel-mar | 905 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('Manifest declares PHP main class as "%1", but it could not be found',$class_name)); |
292 | daniel-mar | 906 | } |
279 | daniel-mar | 907 | if (!is_subclass_of($class_name, $expectedPluginClass)) { |
1050 | daniel-mar | 908 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('Plugin main class "%1" is expected to be a subclass of "%2"',$class_name,$expectedPluginClass)); |
279 | daniel-mar | 909 | } |
438 | daniel-mar | 910 | if (($class_name!=$manifest->getTypeClass()) && (!is_subclass_of($class_name,$manifest->getTypeClass()))) { |
1050 | daniel-mar | 911 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('Plugin main class "%1" is expected to be a subclass of "%2", according to type declared in manifest',$class_name,$manifest->getTypeClass())); |
308 | daniel-mar | 912 | } |
438 | daniel-mar | 913 | if (($manifest->getTypeClass()!=$expectedPluginClass) && (!is_subclass_of($manifest->getTypeClass(),$expectedPluginClass))) { |
1050 | daniel-mar | 914 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('Class declared in manifest is "%1" does not fit expected class for this plugin type "%2"',$manifest->getTypeClass(),$expectedPluginClass)); |
308 | daniel-mar | 915 | } |
916 | |||
1072 | daniel-mar | 917 | // Do some basic checks on the plugin OID |
438 | daniel-mar | 918 | $plugin_oid = $manifest->getOid(); |
320 | daniel-mar | 919 | if (!$plugin_oid) { |
1050 | daniel-mar | 920 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('Does not have an OID')); |
320 | daniel-mar | 921 | } |
922 | if (!oid_valid_dotnotation($plugin_oid, false, false, 2)) { |
||
1050 | daniel-mar | 923 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('Plugin OID "%1" is invalid (needs to be valid dot-notation)',$plugin_oid)); |
320 | daniel-mar | 924 | } |
925 | if (isset($known_plugin_oids[$plugin_oid])) { |
||
1050 | daniel-mar | 926 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('The OID "%1" is already used by the plugin "%2"',$plugin_oid,$known_plugin_oids[$plugin_oid])); |
320 | daniel-mar | 927 | } |
646 | daniel-mar | 928 | |
1072 | daniel-mar | 929 | // Additional check: Are third-party plugins using ViaThinkSoft plugin folders, OIDs or class namespaces? |
632 | daniel-mar | 930 | $full_plugin_dir = dirname($manifest->getManifestFile()); |
931 | $full_plugin_dir = substr($full_plugin_dir, strlen(OIDplus::localpath())); |
||
988 | daniel-mar | 932 | $dir_is_viathinksoft = str_starts_with($full_plugin_dir, 'plugins/viathinksoft/') || str_starts_with($full_plugin_dir, 'plugins\\viathinksoft\\'); |
933 | $oid_is_viathinksoft = str_starts_with($plugin_oid, '1.3.6.1.4.1.37476.2.5.2.4.'); // { iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) 37476 products(2) oidplus(5) v2(2) plugins(4) } |
||
1050 | daniel-mar | 934 | $class_is_viathinksoft = str_starts_with($class_name, 'ViaThinkSoft\\'); |
1072 | daniel-mar | 935 | if ($oid_is_viathinksoft != $class_is_viathinksoft) { |
936 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('Third-party plugins must not use the ViaThinkSoft PHP namespace. Please use your own vendor namespace.')); |
||
937 | } |
||
938 | $plugin_is_viathinksoft = $oid_is_viathinksoft && $class_is_viathinksoft; |
||
939 | if ($dir_is_viathinksoft != $plugin_is_viathinksoft) { |
||
1050 | daniel-mar | 940 | throw new OIDplusException(_L('Plugin "%1" is misplaced',$plugintype_folder.'/'.$pluginname_folder).': '._L('The plugin is in the wrong folder. The folder %1 can only be used by official ViaThinkSoft plugins','plugins/viathinksoft/')); |
632 | daniel-mar | 941 | } |
1072 | daniel-mar | 942 | |
943 | // Additional check: does the plugin define JS/CSS although it is not an interactive plugin type? |
||
944 | $has_js = $manifest->getJSFiles(); |
||
945 | $has_css = $manifest->getCSSFiles(); |
||
946 | $is_interactive = in_array(basename($plugintype_folder), OIDplus::INTERACTIVE_PLUGIN_TYPES); |
||
947 | $is_design = basename($plugintype_folder) === 'design'; |
||
948 | if (!$is_interactive && $has_js) { |
||
949 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('%1 files are included in the manifest XML, but this plugin type does not allow such files.','JavaScript')); |
||
1050 | daniel-mar | 950 | } |
1072 | daniel-mar | 951 | if (!$is_interactive && !$is_design && $has_css) { |
952 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('%1 files are included in the manifest XML, but this plugin type does not allow such files.','CSS')); |
||
953 | } |
||
320 | daniel-mar | 954 | |
1072 | daniel-mar | 955 | // Additional check: Check "Setup CSS" and "Setup JS" (Allowed for plugin types: database, captcha) |
956 | $has_js_setup = $manifest->getJSFilesSetup(); |
||
957 | $has_css_setup = $manifest->getCSSFilesSetup(); |
||
958 | $is_database = basename($plugintype_folder) === 'database'; |
||
959 | $is_captcha = basename($plugintype_folder) === 'captcha'; |
||
960 | if (!$is_database && !$is_captcha && $has_js_setup) { |
||
961 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('%1 files are included in the manifest XML, but this plugin type does not allow such files.','Setup JavaScript')); |
||
962 | } |
||
963 | if (!$is_database && !$is_captcha && $has_css_setup) { |
||
964 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('%1 files are included in the manifest XML, but this plugin type does not allow such files.','Setup CSS')); |
||
965 | } |
||
632 | daniel-mar | 966 | |
1072 | daniel-mar | 967 | // Additional check: Are all CSS/JS files there? |
968 | $tmp = $manifest->getManifestLinkedFiles(); |
||
969 | foreach ($tmp as $file) { |
||
970 | if (!file_exists($file)) { |
||
971 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('File %1 was defined in manifest, but it is not existing',$file)); |
||
972 | } |
||
973 | } |
||
974 | |||
975 | // For the next check, we need an instance of the object |
||
438 | daniel-mar | 976 | $obj = new $class_name(); |
456 | daniel-mar | 977 | |
1072 | daniel-mar | 978 | // Additional check: Does the plugin misuse implementsFeature()? |
979 | // This is not enabled b default, because the GUID generation is slow on some machines. |
||
980 | // Also, it is very unlikely that someone misuses implementsFeature(). |
||
456 | daniel-mar | 981 | if (OIDplus::baseConfig()->getValue('DEBUG')) { |
982 | if ($obj->implementsFeature($fake_feature)) { |
||
983 | // see https://devblogs.microsoft.com/oldnewthing/20040211-00/?p=40663 |
||
1050 | daniel-mar | 984 | throw new OIDplusException(_L('Plugin "%1" is erroneous',$plugintype_folder.'/'.$pluginname_folder).': '._L('implementsFeature() always returns true')); |
456 | daniel-mar | 985 | } |
438 | daniel-mar | 986 | } |
987 | |||
988 | // Now we can continue |
||
1072 | daniel-mar | 989 | $known_plugin_oids[$plugin_oid] = $plugintype_folder.'/'.$pluginname_folder; |
279 | daniel-mar | 990 | $out[] = $class_name; |
991 | if (!is_null($registerCallback)) { |
||
438 | daniel-mar | 992 | call_user_func($registerCallback, $obj); |
444 | daniel-mar | 993 | |
994 | // Alternative approaches: |
||
995 | //$registerCallback[0]::{$registerCallback[1]}($obj); |
||
996 | // or: |
||
997 | //forward_static_call($registerCallback, $obj); |
||
279 | daniel-mar | 998 | } |
277 | daniel-mar | 999 | } |
1000 | |||
1001 | } |
||
1002 | return $out; |
||
1003 | } |
||
1004 | |||
1050 | daniel-mar | 1005 | // --- Initialization of OIDplus |
206 | daniel-mar | 1006 | |
374 | daniel-mar | 1007 | public static function init($html=true, $keepBaseConfig=true) { |
236 | daniel-mar | 1008 | self::$html = $html; |
1009 | |||
263 | daniel-mar | 1010 | // Reset internal state, so we can re-init verything if required |
274 | daniel-mar | 1011 | |
263 | daniel-mar | 1012 | self::$config = null; |
374 | daniel-mar | 1013 | if (!$keepBaseConfig) self::$baseConfig = null; // for test cases we need to be able to control base config and setting values manually, so $keepBaseConfig needs to be true |
263 | daniel-mar | 1014 | self::$gui = null; |
1015 | self::$authUtils = null; |
||
1016 | self::$mailUtils = null; |
||
1017 | self::$menuUtils = null; |
||
1018 | self::$logger = null; |
||
295 | daniel-mar | 1019 | self::$dbMainSession = null; |
1020 | self::$dbIsolatedSession = null; |
||
263 | daniel-mar | 1021 | self::$pagePlugins = array(); |
1022 | self::$authPlugins = array(); |
||
289 | daniel-mar | 1023 | self::$loggerPlugins = array(); |
263 | daniel-mar | 1024 | self::$objectTypePlugins = array(); |
1025 | self::$enabledObjectTypes = array(); |
||
1026 | self::$disabledObjectTypes = array(); |
||
1027 | self::$dbPlugins = array(); |
||
702 | daniel-mar | 1028 | self::$captchaPlugins = array(); |
274 | daniel-mar | 1029 | self::$sqlSlangPlugins = array(); |
355 | daniel-mar | 1030 | self::$languagePlugins = array(); |
449 | daniel-mar | 1031 | self::$designPlugins = array(); |
263 | daniel-mar | 1032 | self::$system_id_cache = null; |
1033 | self::$sslAvailableCache = null; |
||
468 | daniel-mar | 1034 | self::$translationArray = array(); |
74 | daniel-mar | 1035 | |
263 | daniel-mar | 1036 | // Continue... |
1037 | |||
294 | daniel-mar | 1038 | OIDplus::baseConfig(); // this loads the base configuration located in userdata/baseconfig/config.inc.php (once!) |
263 | daniel-mar | 1039 | // You can do changes to the configuration afterwards using OIDplus::baseConfig()->... |
1040 | |||
150 | daniel-mar | 1041 | // Register database types (highest priority) |
1042 | |||
274 | daniel-mar | 1043 | // SQL slangs |
1044 | |||
1050 | daniel-mar | 1045 | self::registerAllPlugins('sqlSlang', OIDplusSqlSlangPlugin::class, array(OIDplus::class,'registerSqlSlangPlugin')); |
274 | daniel-mar | 1046 | foreach (OIDplus::getSqlSlangPlugins() as $plugin) { |
1047 | $plugin->init($html); |
||
1048 | } |
||
1049 | |||
1050 | // Database providers |
||
1051 | |||
1050 | daniel-mar | 1052 | self::registerAllPlugins('database', OIDplusDatabasePlugin::class, array(OIDplus::class,'registerDatabasePlugin')); |
237 | daniel-mar | 1053 | foreach (OIDplus::getDatabasePlugins() as $plugin) { |
1054 | $plugin->init($html); |
||
1055 | } |
||
1056 | |||
42 | daniel-mar | 1057 | // Do redirect stuff etc. |
74 | daniel-mar | 1058 | |
230 | daniel-mar | 1059 | self::isSslAvailable(); // This function does automatic redirects |
61 | daniel-mar | 1060 | |
263 | daniel-mar | 1061 | // Construct the configuration manager |
66 | daniel-mar | 1062 | |
263 | daniel-mar | 1063 | OIDplus::config(); // During the construction, various system settings are prepared if required |
66 | daniel-mar | 1064 | |
74 | daniel-mar | 1065 | // Initialize public / private keys |
1066 | |||
227 | daniel-mar | 1067 | OIDplus::getPkiStatus(true); |
74 | daniel-mar | 1068 | |
237 | daniel-mar | 1069 | // Register non-DB plugins |
74 | daniel-mar | 1070 | |
1050 | daniel-mar | 1071 | self::registerAllPlugins(array('publicPages', 'raPages', 'adminPages'), OIDplusPagePlugin::class, array(OIDplus::class,'registerPagePlugin')); |
1072 | self::registerAllPlugins('auth', OIDplusAuthPlugin::class, array(OIDplus::class,'registerAuthPlugin')); |
||
1073 | self::registerAllPlugins('logger', OIDplusLoggerPlugin::class, array(OIDplus::class,'registerLoggerPlugin')); |
||
825 | daniel-mar | 1074 | OIDplusLogger::reLogMissing(); // Some previous plugins might have tried to log. Repeat that now. |
1050 | daniel-mar | 1075 | self::registerAllPlugins('objectTypes', OIDplusObjectTypePlugin::class, array(OIDplus::class,'registerObjectTypePlugin')); |
1076 | self::registerAllPlugins('language', OIDplusLanguagePlugin::class, array(OIDplus::class,'registerLanguagePlugin')); |
||
1077 | self::registerAllPlugins('design', OIDplusDesignPlugin::class, array(OIDplus::class,'registerDesignPlugin')); |
||
1078 | self::registerAllPlugins('captcha', OIDplusCaptchaPlugin::class, array(OIDplus::class,'registerCaptchaPlugin')); |
||
150 | daniel-mar | 1079 | |
237 | daniel-mar | 1080 | // Initialize non-DB plugins |
224 | daniel-mar | 1081 | |
281 | daniel-mar | 1082 | foreach (OIDplus::getPagePlugins() as $plugin) { |
74 | daniel-mar | 1083 | $plugin->init($html); |
1084 | } |
||
230 | daniel-mar | 1085 | foreach (OIDplus::getAuthPlugins() as $plugin) { |
1086 | $plugin->init($html); |
||
1087 | } |
||
289 | daniel-mar | 1088 | foreach (OIDplus::getLoggerPlugins() as $plugin) { |
1089 | $plugin->init($html); |
||
1090 | } |
||
230 | daniel-mar | 1091 | foreach (OIDplus::getObjectTypePlugins() as $plugin) { |
1092 | $plugin->init($html); |
||
1093 | } |
||
355 | daniel-mar | 1094 | foreach (OIDplus::getLanguagePlugins() as $plugin) { |
1095 | $plugin->init($html); |
||
1096 | } |
||
449 | daniel-mar | 1097 | foreach (OIDplus::getDesignPlugins() as $plugin) { |
1098 | $plugin->init($html); |
||
1099 | } |
||
778 | daniel-mar | 1100 | foreach (OIDplus::getCaptchaPlugins() as $plugin) { |
1101 | $plugin->init($html); |
||
1102 | } |
||
412 | daniel-mar | 1103 | |
778 | daniel-mar | 1104 | if (PHP_SAPI != 'cli') { |
1105 | |||
1106 | // Prepare some security related response headers (default values) |
||
1107 | |||
1108 | $content_language = |
||
1109 | strtolower(substr(OIDplus::getCurrentLang(),0,2)) . '-' . |
||
1110 | strtoupper(substr(OIDplus::getCurrentLang(),2,2)); // e.g. 'en-US' |
||
1111 | |||
1112 | $http_headers = array( |
||
1113 | "X-Content-Type-Options" => "nosniff", |
||
1114 | "X-XSS-Protection" => "1; mode=block", |
||
1115 | "X-Frame-Options" => "SAMEORIGIN", |
||
1116 | "Referrer-Policy" => array( |
||
1117 | "no-referrer-when-downgrade" |
||
1118 | ), |
||
1119 | "Cache-Control" => array( |
||
1120 | "no-cache", |
||
1121 | "no-store", |
||
1122 | "must-revalidate" |
||
1123 | ), |
||
1124 | "Pragma" => "no-cache", |
||
1125 | "Content-Language" => $content_language, |
||
1126 | "Expires" => "0", |
||
1127 | "Content-Security-Policy" => array( |
||
1001 | daniel-mar | 1128 | // see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy |
1129 | |||
1130 | // --- Fetch directives --- |
||
1131 | "child-src" => array( |
||
1132 | "'self'", |
||
1133 | "blob:" |
||
1134 | ), |
||
1135 | "connect-src" => array( |
||
1136 | "'self'", |
||
1137 | "blob:" |
||
1138 | ), |
||
778 | daniel-mar | 1139 | "default-src" => array( |
1140 | "'self'", |
||
1141 | "blob:", |
||
1142 | "https://cdnjs.cloudflare.com/" |
||
1143 | ), |
||
1001 | daniel-mar | 1144 | "font-src" => array( |
778 | daniel-mar | 1145 | "'self'", |
1001 | daniel-mar | 1146 | "blob:" |
778 | daniel-mar | 1147 | ), |
1001 | daniel-mar | 1148 | "frame-src" => array( |
1149 | "'self'", |
||
1150 | "blob:" |
||
1151 | ), |
||
778 | daniel-mar | 1152 | "img-src" => array( |
1001 | daniel-mar | 1153 | "blob:", |
778 | daniel-mar | 1154 | "data:", |
1155 | "http:", |
||
1156 | "https:" |
||
1157 | ), |
||
1001 | daniel-mar | 1158 | "manifest-src" => array( |
1159 | "'self'", |
||
1160 | "blob:" |
||
1161 | ), |
||
1162 | "media-src" => array( |
||
1163 | "'self'", |
||
1164 | "blob:" |
||
1165 | ), |
||
1166 | "object-src" => array( |
||
1167 | "'none'" |
||
1168 | ), |
||
1169 | "prefetch-src" => array( |
||
1170 | "'self'", |
||
1171 | "blob:" |
||
1172 | ), |
||
778 | daniel-mar | 1173 | "script-src" => array( |
1174 | "'self'", |
||
1175 | "'unsafe-inline'", |
||
1176 | "'unsafe-eval'", |
||
1177 | "blob:", |
||
1178 | "https://cdnjs.cloudflare.com/", |
||
1179 | "https://polyfill.io/" |
||
1180 | ), |
||
1001 | daniel-mar | 1181 | // script-src-elem not used |
1182 | // script-src-attr not used |
||
1183 | "style-src" => array( |
||
1184 | "'self'", |
||
1185 | "'unsafe-inline'", |
||
1186 | "https://cdnjs.cloudflare.com/" |
||
1187 | ), |
||
1188 | // style-src-elem not used |
||
1189 | // style-src-attr not used |
||
1190 | "worker-src" => array( |
||
1191 | "'self'", |
||
1192 | "blob:" |
||
1193 | ), |
||
1194 | |||
1195 | // --- Navigation directives --- |
||
778 | daniel-mar | 1196 | "frame-ancestors" => array( |
1197 | "'none'" |
||
1198 | ), |
||
1199 | ) |
||
1200 | ); |
||
1201 | |||
780 | daniel-mar | 1202 | // Give plugins the opportunity to manipulate/extend the headers |
778 | daniel-mar | 1203 | |
1204 | foreach (OIDplus::getSqlSlangPlugins() as $plugin) { |
||
1205 | $plugin->httpHeaderCheck($http_headers); |
||
1206 | } |
||
1015 | daniel-mar | 1207 | //foreach (OIDplus::getDatabasePlugins() as $plugin) { |
1208 | if ($plugin = OIDplus::getActiveDatabasePlugin()) { |
||
778 | daniel-mar | 1209 | $plugin->httpHeaderCheck($http_headers); |
1210 | } |
||
1211 | foreach (OIDplus::getPagePlugins() as $plugin) { |
||
1212 | $plugin->httpHeaderCheck($http_headers); |
||
1213 | } |
||
1214 | foreach (OIDplus::getAuthPlugins() as $plugin) { |
||
1215 | $plugin->httpHeaderCheck($http_headers); |
||
1216 | } |
||
1217 | foreach (OIDplus::getLoggerPlugins() as $plugin) { |
||
1218 | $plugin->httpHeaderCheck($http_headers); |
||
1219 | } |
||
1220 | foreach (OIDplus::getObjectTypePlugins() as $plugin) { |
||
1221 | $plugin->httpHeaderCheck($http_headers); |
||
1222 | } |
||
1223 | foreach (OIDplus::getLanguagePlugins() as $plugin) { |
||
1224 | $plugin->httpHeaderCheck($http_headers); |
||
1225 | } |
||
1226 | foreach (OIDplus::getDesignPlugins() as $plugin) { |
||
1227 | $plugin->httpHeaderCheck($http_headers); |
||
1228 | } |
||
1015 | daniel-mar | 1229 | //foreach (OIDplus::getCaptchaPlugins() as $plugin) { |
1230 | if ($plugin = OIDplus::getActiveCaptchaPlugin()) { |
||
778 | daniel-mar | 1231 | $plugin->httpHeaderCheck($http_headers); |
1232 | } |
||
1233 | |||
1234 | // Prepare to send the headers to the client |
||
1235 | // The headers are sent automatically when the first output comes or the script ends |
||
1236 | |||
1237 | foreach ($http_headers as $name => $val) { |
||
1238 | |||
1239 | // Plugins can remove standard OIDplus headers by setting the value to null. |
||
1240 | if (is_null($val)) continue; /** @phpstan-ignore-line */ |
||
1241 | |||
1242 | // Some headers can be written as arrays to make it easier for plugin authors |
||
1243 | // to manipulate/extend the contents. |
||
1244 | if (is_array($val)) { |
||
1245 | if ((strtolower($name) == 'cache-control') || |
||
1246 | (strtolower($name) == 'referrer-policy')) |
||
1247 | { |
||
1248 | if (count($val) == 0) continue; |
||
1249 | $val = implode(', ', $val); |
||
1250 | } else if (strtolower($name) == 'content-security-policy') { |
||
1251 | if (count($val) == 0) continue; |
||
780 | daniel-mar | 1252 | foreach ($val as $tmp1 => &$tmp2) { |
1253 | $tmp2 = array_unique($tmp2); |
||
1254 | $tmp2 = $tmp1.' '.implode(' ', $tmp2); |
||
1255 | } |
||
778 | daniel-mar | 1256 | $val = implode('; ', $val); |
1257 | } else { |
||
779 | daniel-mar | 1258 | throw new OIDplusException(_L('HTTP header "%1" cannot be written as array. A newly installed plugin is probably misusing the method "%2".',$name,'httpHeaderCheck')); |
778 | daniel-mar | 1259 | } |
1260 | } |
||
1261 | |||
1262 | if (is_string($val)) { |
||
1263 | header("$name: $val"); |
||
1264 | } |
||
1265 | } |
||
1266 | |||
1267 | } // endif (PHP_SAPI != 'cli') |
||
1268 | |||
412 | daniel-mar | 1269 | // Initialize other stuff (i.e. things which require the logger!) |
1270 | |||
1271 | OIDplus::recognizeSystemUrl(); // Make sure "last_known_system_url" is set |
||
1272 | OIDplus::recognizeVersion(); // Make sure "last_known_version" is set and a log entry is created |
||
2 | daniel-mar | 1273 | } |
42 | daniel-mar | 1274 | |
1050 | daniel-mar | 1275 | // --- System URL, System ID, PKI, and other functions |
227 | daniel-mar | 1276 | |
412 | daniel-mar | 1277 | private static function recognizeSystemUrl() { |
1278 | try { |
||
1072 | daniel-mar | 1279 | $url = OIDplus::webpath(null,self::PATH_ABSOLUTE_CANONICAL); |
412 | daniel-mar | 1280 | OIDplus::config()->setValue('last_known_system_url', $url); |
1050 | daniel-mar | 1281 | } catch (\Exception $e) { |
412 | daniel-mar | 1282 | } |
1283 | } |
||
497 | daniel-mar | 1284 | |
496 | daniel-mar | 1285 | private static function getExecutingScriptPathDepth() { |
1286 | if (PHP_SAPI == 'cli') { |
||
1287 | global $argv; |
||
1288 | $test_dir = dirname(realpath($argv[0])); |
||
1289 | } else { |
||
1290 | if (!isset($_SERVER["SCRIPT_FILENAME"])) return false; |
||
1291 | $test_dir = dirname($_SERVER['SCRIPT_FILENAME']); |
||
1292 | } |
||
1293 | $test_dir = str_replace('\\', '/', $test_dir); |
||
1294 | $steps_up = 0; |
||
928 | daniel-mar | 1295 | while (!file_exists($test_dir.'/oidplus.min.css.php')) { // We just assume that only the OIDplus base directory contains "oidplus.min.css.php" and not any subordinate directory! |
496 | daniel-mar | 1296 | $test_dir = dirname($test_dir); |
1297 | $steps_up++; |
||
1298 | if ($steps_up == 1000) return false; // to make sure there will never be an infinite loop |
||
1299 | } |
||
1300 | return $steps_up; |
||
1301 | } |
||
632 | daniel-mar | 1302 | |
580 | daniel-mar | 1303 | public static function isSSL() { |
1304 | return isset($_SERVER['HTTPS']) && ($_SERVER['HTTPS'] === 'on'); |
||
1305 | } |
||
412 | daniel-mar | 1306 | |
806 | daniel-mar | 1307 | /** |
1308 | * Returns the URL of the system. |
||
1309 | * @param int $mode If true or OIDplus::PATH_RELATIVE, the returning path is relative to the currently executed |
||
1310 | * PHP script (i.e. index.php , not the plugin PHP script!). False or OIDplus::PATH_ABSOLUTE is |
||
1311 | * results in an absolute URL. OIDplus::PATH_ABSOLUTE_CANONICAL is an absolute URL, |
||
1312 | * but a canonical path (set by base config setting CANONICAL_SYSTEM_URL) is preferred. |
||
1313 | * @return string|false The URL, with guaranteed trailing path delimiter for directories |
||
1314 | */ |
||
801 | daniel-mar | 1315 | private static function getSystemUrl($mode) { |
806 | daniel-mar | 1316 | if ($mode === self::PATH_RELATIVE) { |
778 | daniel-mar | 1317 | $steps_up = self::getExecutingScriptPathDepth(); |
1318 | if ($steps_up === false) { |
||
1319 | return false; |
||
1320 | } else { |
||
1321 | return str_repeat('../', $steps_up); |
||
1322 | } |
||
1323 | } else { |
||
806 | daniel-mar | 1324 | if ($mode === self::PATH_ABSOLUTE_CANONICAL) { |
1325 | $tmp = OIDplus::baseConfig()->getValue('CANONICAL_SYSTEM_URL', ''); |
||
1326 | if ($tmp) { |
||
1327 | return rtrim($tmp,'/').'/'; |
||
1328 | } |
||
326 | daniel-mar | 1329 | } |
778 | daniel-mar | 1330 | |
495 | daniel-mar | 1331 | if (PHP_SAPI == 'cli') { |
494 | daniel-mar | 1332 | try { |
1333 | return OIDplus::config()->getValue('last_known_system_url', false); |
||
1050 | daniel-mar | 1334 | } catch (\Exception $e) { |
494 | daniel-mar | 1335 | return false; |
1336 | } |
||
778 | daniel-mar | 1337 | } else { |
1338 | // First, try to find out how many levels we need to go up |
||
1339 | $steps_up = self::getExecutingScriptPathDepth(); |
||
326 | daniel-mar | 1340 | |
778 | daniel-mar | 1341 | // Then go up these amount of levels, based on SCRIPT_NAME/argv[0] |
1342 | $res = dirname($_SERVER['SCRIPT_NAME'].'index.php'); // This fake 'index.php' ensures that SCRIPT_NAME does not end with '/', which would make dirname() fail |
||
1343 | for ($i=0; $i<$steps_up; $i++) { |
||
1344 | $res = dirname($res); |
||
1345 | } |
||
1346 | $res = str_replace('\\', '/', $res); |
||
1347 | if ($res == '/') $res = ''; |
||
227 | daniel-mar | 1348 | |
778 | daniel-mar | 1349 | // Add protocol and hostname |
580 | daniel-mar | 1350 | $is_ssl = self::isSSL(); |
495 | daniel-mar | 1351 | $protocol = $is_ssl ? 'https' : 'http'; // do not translate |
1352 | $host = $_SERVER['HTTP_HOST']; // includes port if it is not 80/443 |
||
778 | daniel-mar | 1353 | |
1354 | return $protocol.'://'.$host.$res.'/'; |
||
495 | daniel-mar | 1355 | } |
227 | daniel-mar | 1356 | } |
1357 | } |
||
1358 | |||
1073 | daniel-mar | 1359 | private static function pubKeyToRaw($pubKey) { |
827 | daniel-mar | 1360 | $m = array(); |
1073 | daniel-mar | 1361 | if (preg_match('@BEGIN PUBLIC KEY\\-+([^\\-]+)\\-+END PUBLIC KEY@ismU', $pubKey, $m)) { |
1362 | return base64_decode($m[1], false); |
||
827 | daniel-mar | 1363 | } |
1364 | return false; |
||
1365 | } |
||
1366 | |||
1073 | daniel-mar | 1367 | private static function getSystemIdFromPubKey($pubKey) { |
1368 | $rawData = self::pubKeyToRaw($pubKey); |
||
1369 | if ($rawData === false) return false; |
||
1370 | return smallhash($rawData); |
||
1371 | } |
||
1372 | |||
1373 | private static function getSystemGuidFromPubKey($pubKey) { |
||
1374 | $rawData = self::pubKeyToRaw($pubKey); |
||
1375 | if ($rawData === false) return false; |
||
1376 | $normalizedBase64 = base64_encode($rawData); |
||
1377 | return gen_uuid_sha1_namebased(self::UUID_NAMEBASED_NS_Base64PubKey, $normalizedBase64); |
||
1378 | } |
||
1379 | |||
227 | daniel-mar | 1380 | private static $system_id_cache = null; |
1381 | public static function getSystemId($oid=false) { |
||
1382 | if (!is_null(self::$system_id_cache)) { |
||
1383 | $out = self::$system_id_cache; |
||
1384 | } else { |
||
1385 | $out = false; |
||
1386 | |||
1387 | if (self::getPkiStatus(true)) { |
||
830 | daniel-mar | 1388 | $pubKey = OIDplus::getSystemPublicKey(); |
827 | daniel-mar | 1389 | $out = self::getSystemIdFromPubKey($pubKey); |
227 | daniel-mar | 1390 | } |
1391 | self::$system_id_cache = $out; |
||
1392 | } |
||
350 | daniel-mar | 1393 | if (!$out) return false; |
291 | daniel-mar | 1394 | return ($oid ? '1.3.6.1.4.1.37476.30.9.' : '').$out; |
227 | daniel-mar | 1395 | } |
1396 | |||
1073 | daniel-mar | 1397 | private static $system_guid_cache = null; |
1398 | public static function getSystemGuid() { |
||
1399 | if (!is_null(self::$system_guid_cache)) { |
||
1400 | $out = self::$system_guid_cache; |
||
1401 | } else { |
||
1402 | $out = false; |
||
1403 | |||
1404 | if (self::getPkiStatus(true)) { |
||
1405 | $pubKey = OIDplus::getSystemPublicKey(); |
||
1406 | $out = self::getSystemGuidFromPubKey($pubKey); |
||
1407 | } |
||
1408 | self::$system_guid_cache = $out; |
||
1409 | } |
||
1410 | if (!$out) return false; |
||
1411 | return $out; |
||
1412 | } |
||
1413 | |||
825 | daniel-mar | 1414 | public static function getOpenSslCnf() { |
1415 | // The following functions need a config file, otherway they don't work |
||
1416 | // - openssl_csr_new |
||
1417 | // - openssl_csr_sign |
||
1418 | // - openssl_pkey_export |
||
1419 | // - openssl_pkey_export_to_file |
||
1420 | // - openssl_pkey_new |
||
1421 | $tmp = @getenv('OPENSSL_CONF'); |
||
1422 | if ($tmp && file_exists($tmp)) return $tmp; |
||
1423 | |||
1424 | // OpenSSL in XAMPP does not work OOBE, since the OPENSSL_CONF is |
||
1425 | // C:/xampp/apache/bin/openssl.cnf and not C:/xampp/apache/conf/openssl.cnf |
||
1426 | // Bug reports are more than 10 years old and nobody cares... |
||
1427 | // Use our own config file |
||
1428 | return __DIR__.'/../../vendor/phpseclib/phpseclib/phpseclib/openssl.cnf'; |
||
1429 | } |
||
1430 | |||
830 | daniel-mar | 1431 | private static function getPrivKeyPassphraseFilename() { |
1432 | return OIDplus::localpath() . 'userdata/privkey_secret.php'; |
||
1433 | } |
||
227 | daniel-mar | 1434 | |
830 | daniel-mar | 1435 | private static function tryCreatePrivKeyPassphrase() { |
1436 | $file = self::getPrivKeyPassphraseFilename(); |
||
827 | daniel-mar | 1437 | |
830 | daniel-mar | 1438 | $passphrase = generateRandomString(64); |
1439 | $cont = "<?php\n"; |
||
1440 | $cont .= "// ATTENTION! This file was automatically generated by OIDplus to encrypt the private key\n"; |
||
1441 | $cont .= "// that is located in your database configuration table. DO NOT ALTER OR DELETE THIS FILE,\n"; |
||
1442 | $cont .= "// otherwise you will lose your OIDplus System-ID and all services connected with it!\n"; |
||
831 | daniel-mar | 1443 | $cont .= "// If multiple systems access the same database, then this file must be synchronous\n"; |
1444 | $cont .= "// between all systems, otherwise you will lose your system ID, too!\n"; |
||
830 | daniel-mar | 1445 | $cont .= "\$passphrase = '$passphrase';\n"; |
1446 | $cont .= "// End of file\n"; |
||
1447 | |||
1448 | @file_put_contents($file, $cont); |
||
1449 | } |
||
1450 | |||
1451 | private static function getPrivKeyPassphrase() { |
||
1452 | $file = self::getPrivKeyPassphraseFilename(); |
||
1453 | if (!file_exists($file)) return false; |
||
1454 | $cont = file_get_contents($file); |
||
1455 | $m = array(); |
||
1456 | if (!preg_match("@'(.+)'@isU", $cont, $m)) return false; |
||
1457 | return $m[1]; |
||
1458 | } |
||
1459 | |||
1460 | public static function getSystemPrivateKey() { |
||
227 | daniel-mar | 1461 | $privKey = OIDplus::config()->getValue('oidplus_private_key'); |
830 | daniel-mar | 1462 | if ($privKey == '') return false; |
1463 | |||
1464 | $passphrase = self::getPrivKeyPassphrase(); |
||
1465 | if ($passphrase !== false) { |
||
1466 | $privKey = decrypt_private_key($privKey, $passphrase); |
||
1467 | } |
||
1468 | |||
1469 | if (is_privatekey_encrypted($privKey)) { |
||
1470 | // This can happen if the key file has vanished |
||
1471 | return false; |
||
1472 | } |
||
1473 | |||
1474 | return $privKey; |
||
1475 | } |
||
1476 | |||
1477 | public static function getSystemPublicKey() { |
||
227 | daniel-mar | 1478 | $pubKey = OIDplus::config()->getValue('oidplus_public_key'); |
830 | daniel-mar | 1479 | if ($pubKey == '') return false; |
1480 | return $pubKey; |
||
1481 | } |
||
227 | daniel-mar | 1482 | |
830 | daniel-mar | 1483 | public static function getPkiStatus($try_generate=false) { |
1484 | if (!function_exists('openssl_pkey_new')) return false; |
||
227 | daniel-mar | 1485 | |
830 | daniel-mar | 1486 | if ($try_generate) { |
1487 | // For debug purposes: Invalidate current key once: |
||
1488 | //OIDplus::config()->setValue('oidplus_private_key', ''); |
||
256 | daniel-mar | 1489 | |
830 | daniel-mar | 1490 | $privKey = OIDplus::getSystemPrivateKey(); |
1491 | $pubKey = OIDplus::getSystemPublicKey(); |
||
1492 | if (!verify_private_public_key($privKey, $pubKey)) { |
||
1493 | if ($pubKey) { |
||
1494 | OIDplus::logger()->log("[WARN]A!", "The private/public key-pair is broken. A new key-pair will now be generated for your system. Your System-ID will change."); |
||
1495 | } |
||
227 | daniel-mar | 1496 | |
830 | daniel-mar | 1497 | $pkey_config = array( |
1498 | "digest_alg" => "sha512", |
||
1499 | "private_key_bits" => defined('OPENSSL_SUPPLEMENT') ? 1024 : 2048, // openssl_supplement.inc.php is based on phpseclib, which is very slow. So we use 1024 bits instead of 2048 bits |
||
1500 | "private_key_type" => OPENSSL_KEYTYPE_RSA, |
||
1501 | "config" => OIDplus::getOpenSslCnf() |
||
1502 | ); |
||
227 | daniel-mar | 1503 | |
830 | daniel-mar | 1504 | // Create the private and public key |
1505 | $res = openssl_pkey_new($pkey_config); |
||
1506 | if ($res === false) return false; |
||
239 | daniel-mar | 1507 | |
830 | daniel-mar | 1508 | // Extract the private key from $res to $privKey |
1509 | if (openssl_pkey_export($res, $privKey, null, $pkey_config) === false) return false; |
||
227 | daniel-mar | 1510 | |
830 | daniel-mar | 1511 | // Extract the public key from $res to $pubKey |
1512 | $tmp = openssl_pkey_get_details($res); |
||
1513 | if ($tmp === false) return false; |
||
1514 | $pubKey = $tmp["key"]; |
||
1515 | |||
1516 | // encrypt new keys using a passphrase stored in a secret file |
||
1517 | self::tryCreatePrivKeyPassphrase(); // *try* (re)generate this file |
||
1518 | $passphrase = self::getPrivKeyPassphrase(); |
||
1519 | if ($passphrase !== false) { |
||
1520 | $privKey = encrypt_private_key($privKey, $passphrase); |
||
1521 | } |
||
1522 | |||
1523 | // Calculate the system ID from the public key |
||
1524 | $system_id = self::getSystemIdFromPubKey($pubKey); |
||
1525 | if ($system_id !== false) { |
||
1526 | // Save the key pair to database |
||
1527 | OIDplus::config()->setValue('oidplus_private_key', $privKey); |
||
1528 | OIDplus::config()->setValue('oidplus_public_key', $pubKey); |
||
1529 | |||
1530 | // Log the new system ID |
||
1531 | OIDplus::logger()->log("[INFO]A!", "A new private/public key-pair for your system had been generated. Your SystemID is now $system_id"); |
||
1532 | } |
||
1533 | } else { |
||
1534 | $passphrase = self::getPrivKeyPassphrase(); |
||
831 | daniel-mar | 1535 | $rawPrivKey = OIDplus::config()->getValue('oidplus_private_key'); |
1536 | if (($passphrase === false) || !is_privatekey_encrypted($rawPrivKey)) { |
||
830 | daniel-mar | 1537 | // Upgrade to new encrypted keys |
1538 | self::tryCreatePrivKeyPassphrase(); // *try* generate this file |
||
1539 | $passphrase = self::getPrivKeyPassphrase(); |
||
1540 | if ($passphrase !== false) { |
||
1541 | $privKey = encrypt_private_key($privKey, $passphrase); |
||
1542 | OIDplus::logger()->log("[INFO]A!", "The private/public key-pair has been upgraded to an encrypted key-pair. The key is saved in ".self::getPrivKeyPassphraseFilename()); |
||
1543 | OIDplus::config()->setValue('oidplus_private_key', $privKey); |
||
1544 | } |
||
1545 | } |
||
227 | daniel-mar | 1546 | } |
1547 | } |
||
1548 | |||
830 | daniel-mar | 1549 | $privKey = OIDplus::getSystemPrivateKey(); |
1550 | $pubKey = OIDplus::getSystemPublicKey(); |
||
227 | daniel-mar | 1551 | return verify_private_public_key($privKey, $pubKey); |
1552 | } |
||
1553 | |||
170 | daniel-mar | 1554 | public static function getInstallType() { |
486 | daniel-mar | 1555 | $counter = 0; |
1556 | |||
661 | daniel-mar | 1557 | if ($new_version_file_exists = file_exists(OIDplus::localpath().'.version.php')) { |
486 | daniel-mar | 1558 | $counter++; |
591 | daniel-mar | 1559 | } |
661 | daniel-mar | 1560 | if ($old_version_file_exists = file_exists(OIDplus::localpath().'oidplus_version.txt')) { |
1561 | $counter++; |
||
1562 | } |
||
1563 | $version_file_exists = $old_version_file_exists | $new_version_file_exists; |
||
681 | daniel-mar | 1564 | if ($svn_dir_exists = (is_dir(OIDplus::localpath().'.svn') || |
1565 | is_dir(OIDplus::localpath().'../.svn'))) { // in case we checked out the root instead of the "trunk" |
||
486 | daniel-mar | 1566 | $counter++; |
591 | daniel-mar | 1567 | } |
681 | daniel-mar | 1568 | // if ($git_dir_exists = is_dir(OIDplus::localpath().'.git')) { |
698 | daniel-mar | 1569 | if ($git_dir_exists = (OIDplus::findGitFolder() !== false)) { |
486 | daniel-mar | 1570 | $counter++; |
591 | daniel-mar | 1571 | } |
486 | daniel-mar | 1572 | |
1573 | if ($counter === 0) { |
||
360 | daniel-mar | 1574 | return 'unknown'; // do not translate |
170 | daniel-mar | 1575 | } |
591 | daniel-mar | 1576 | else if ($counter > 1) { |
360 | daniel-mar | 1577 | return 'ambigous'; // do not translate |
170 | daniel-mar | 1578 | } |
591 | daniel-mar | 1579 | else if ($svn_dir_exists) { |
360 | daniel-mar | 1580 | return 'svn-wc'; // do not translate |
170 | daniel-mar | 1581 | } |
591 | daniel-mar | 1582 | else if ($git_dir_exists) { |
486 | daniel-mar | 1583 | return 'git-wc'; // do not translate |
1584 | } |
||
591 | daniel-mar | 1585 | else if ($version_file_exists) { |
360 | daniel-mar | 1586 | return 'svn-snapshot'; // do not translate |
170 | daniel-mar | 1587 | } |
1588 | } |
||
1589 | |||
412 | daniel-mar | 1590 | private static function recognizeVersion() { |
1591 | try { |
||
1592 | $ver_prev = OIDplus::config()->getValue("last_known_version"); |
||
1593 | $ver_now = OIDplus::getVersion(); |
||
1594 | if (($ver_now != '') && ($ver_prev != '') && ($ver_now != $ver_prev)) { |
||
455 | daniel-mar | 1595 | // TODO: Problem: When the system was updated using SVN, then the IP address of the next random visitor of the website is logged! |
1072 | daniel-mar | 1596 | OIDplus::logger()->log("[INFO]A!", "Detected system version change from '$ver_prev' to '$ver_now'"); |
856 | daniel-mar | 1597 | |
1598 | // Just to be sure, recanonize objects (we don't do it at every page visit due to performance reasons) |
||
857 | daniel-mar | 1599 | self::recanonizeObjects(); |
412 | daniel-mar | 1600 | } |
1601 | OIDplus::config()->setValue("last_known_version", $ver_now); |
||
1050 | daniel-mar | 1602 | } catch (\Exception $e) { |
412 | daniel-mar | 1603 | } |
1604 | } |
||
1605 | |||
111 | daniel-mar | 1606 | public static function getVersion() { |
412 | daniel-mar | 1607 | static $cachedVersion = null; |
1608 | if (!is_null($cachedVersion)) { |
||
1609 | return $cachedVersion; |
||
1610 | } |
||
1611 | |||
486 | daniel-mar | 1612 | $installType = OIDplus::getInstallType(); |
1613 | |||
1614 | if ($installType === 'svn-wc') { |
||
496 | daniel-mar | 1615 | $ver = get_svn_revision(OIDplus::localpath()); |
486 | daniel-mar | 1616 | if ($ver) |
1617 | return ($cachedVersion = 'svn-'.$ver); |
||
558 | daniel-mar | 1618 | $ver = get_svn_revision(OIDplus::localpath().'../'); // in case we checked out the root instead of the "trunk" |
1619 | if ($ver) |
||
1620 | return ($cachedVersion = 'svn-'.$ver); |
||
111 | daniel-mar | 1621 | } |
162 | daniel-mar | 1622 | |
486 | daniel-mar | 1623 | if ($installType === 'git-wc') { |
698 | daniel-mar | 1624 | $ver = OIDplus::getGitsvnRevision(OIDplus::localpath()); |
486 | daniel-mar | 1625 | if ($ver) |
1626 | return ($cachedVersion = 'svn-'.$ver); |
||
162 | daniel-mar | 1627 | } |
1628 | |||
486 | daniel-mar | 1629 | if ($installType === 'svn-snapshot') { |
661 | daniel-mar | 1630 | $cont = ''; |
1631 | if (file_exists($filename = OIDplus::localpath().'oidplus_version.txt')) |
||
1632 | $cont = file_get_contents($filename); |
||
1633 | if (file_exists($filename = OIDplus::localpath().'.version.php')) |
||
1634 | $cont = file_get_contents($filename); |
||
386 | daniel-mar | 1635 | $m = array(); |
360 | daniel-mar | 1636 | if (preg_match('@Revision (\d+)@', $cont, $m)) // do not translate |
412 | daniel-mar | 1637 | return ($cachedVersion = 'svn-'.$m[1]); // do not translate |
162 | daniel-mar | 1638 | } |
1639 | |||
486 | daniel-mar | 1640 | return ($cachedVersion = false); // version ambigous or unknown |
111 | daniel-mar | 1641 | } |
1642 | |||
974 | daniel-mar | 1643 | const ENFORCE_SSL_NO = 0; |
1644 | const ENFORCE_SSL_YES = 1; |
||
1645 | const ENFORCE_SSL_AUTO = 2; |
||
230 | daniel-mar | 1646 | private static $sslAvailableCache = null; |
1647 | public static function isSslAvailable() { |
||
1648 | if (!is_null(self::$sslAvailableCache)) return self::$sslAvailableCache; |
||
256 | daniel-mar | 1649 | |
495 | daniel-mar | 1650 | if (PHP_SAPI == 'cli') { |
230 | daniel-mar | 1651 | self::$sslAvailableCache = false; |
1652 | return false; |
||
1653 | } |
||
1654 | |||
49 | daniel-mar | 1655 | $timeout = 2; |
580 | daniel-mar | 1656 | $already_ssl = self::isSSL(); |
80 | daniel-mar | 1657 | $ssl_port = 443; |
1059 | daniel-mar | 1658 | $host_with_port = $_SERVER['HTTP_HOST']; |
1659 | $host_no_port = explode(':',$host_with_port)[0]; |
||
1660 | $host_ssl = $host_no_port . ($ssl_port != 443 ? ':'.$ssl_port : ''); |
||
42 | daniel-mar | 1661 | |
974 | daniel-mar | 1662 | if ($already_ssl) { |
1059 | daniel-mar | 1663 | OIDplus::cookieUtils()->setcookie('SSL_CHECK', '1', 0, true/*allowJS*/, null/*samesite*/, true/*forceInsecure*/); |
974 | daniel-mar | 1664 | self::$sslAvailableCache = true; |
1665 | return true; |
||
1666 | } else { |
||
1667 | if (isset($_COOKIE['SSL_CHECK']) && ($_COOKIE['SSL_CHECK'] == '1')) { |
||
1668 | // The cookie "SSL_CHECK" is set once a website was loaded with HTTPS. |
||
1669 | // It forces subsequent HTTP calls to redirect to HTTPS (like HSTS). |
||
1670 | // The reason is the following problem: |
||
1671 | // If you open the page with HTTPS first, then the CSRF token cookies will get the "secure" flag |
||
1672 | // If you open the page then with HTTP, the HTTP cannot access the secure CSRF cookies, |
||
1673 | // Chrome will then block "Set-Cookie" since the HTTP cookie would overwrite the HTTPS cookie. |
||
1059 | daniel-mar | 1674 | // So we MUST redirect, even if the Mode is ENFORCE_SSL_NO. |
974 | daniel-mar | 1675 | // Note: SSL_CHECK is NOT a replacement for HSTS! You should use HSTS, |
1059 | daniel-mar | 1676 | // because on there your browser ensures that HTTPS is called, before the server |
1677 | // is even contacted (and therefore, no HTTP connection can be hacked). |
||
974 | daniel-mar | 1678 | $mode = OIDplus::ENFORCE_SSL_YES; |
1679 | } else { |
||
1680 | $mode = OIDplus::baseConfig()->getValue('ENFORCE_SSL', OIDplus::ENFORCE_SSL_AUTO); |
||
1681 | } |
||
261 | daniel-mar | 1682 | |
974 | daniel-mar | 1683 | if ($mode == OIDplus::ENFORCE_SSL_NO) { |
1684 | // No SSL available |
||
1685 | self::$sslAvailableCache = false; |
||
1686 | return false; |
||
1687 | } else if ($mode == OIDplus::ENFORCE_SSL_YES) { |
||
1688 | // Force SSL |
||
1059 | daniel-mar | 1689 | $location = 'https://' . $host_ssl . $_SERVER['REQUEST_URI']; |
80 | daniel-mar | 1690 | header('Location:'.$location); |
360 | daniel-mar | 1691 | die(_L('Redirecting to HTTPS...')); |
974 | daniel-mar | 1692 | } else if ($mode == OIDplus::ENFORCE_SSL_AUTO) { |
1693 | // Automatic SSL detection |
||
80 | daniel-mar | 1694 | if (isset($_COOKIE['SSL_CHECK'])) { |
1695 | // We already had the HTTPS detection done before. |
||
974 | daniel-mar | 1696 | if ($_COOKIE['SSL_CHECK'] == '1') { |
80 | daniel-mar | 1697 | // HTTPS was detected before, but we are HTTP. Redirect now |
1059 | daniel-mar | 1698 | $location = 'https://' . $host_ssl . $_SERVER['REQUEST_URI']; |
80 | daniel-mar | 1699 | header('Location:'.$location); |
360 | daniel-mar | 1700 | die(_L('Redirecting to HTTPS...')); |
80 | daniel-mar | 1701 | } else { |
1702 | // No HTTPS available. Do nothing. |
||
230 | daniel-mar | 1703 | self::$sslAvailableCache = false; |
80 | daniel-mar | 1704 | return false; |
1705 | } |
||
49 | daniel-mar | 1706 | } else { |
80 | daniel-mar | 1707 | // This is our first check (or the browser didn't accept the SSL_CHECK cookie) |
386 | daniel-mar | 1708 | $errno = -1; |
1709 | $errstr = ''; |
||
1059 | daniel-mar | 1710 | if (@fsockopen($host_no_port, $ssl_port, $errno, $errstr, $timeout)) { |
80 | daniel-mar | 1711 | // HTTPS detected. Redirect now, and remember that we had detected HTTPS |
1059 | daniel-mar | 1712 | OIDplus::cookieUtils()->setcookie('SSL_CHECK', '1', 0, true/*allowJS*/, null/*samesite*/, true/*forceInsecure*/); |
1713 | $location = 'https://' . $host_ssl . $_SERVER['REQUEST_URI']; |
||
80 | daniel-mar | 1714 | header('Location:'.$location); |
360 | daniel-mar | 1715 | die(_L('Redirecting to HTTPS...')); |
80 | daniel-mar | 1716 | } else { |
1717 | // No HTTPS detected. Do nothing, and next time, don't try to detect HTTPS again. |
||
1059 | daniel-mar | 1718 | OIDplus::cookieUtils()->setcookie('SSL_CHECK', '0', 0, true/*allowJS*/, null/*samesite*/, true/*forceInsecure*/); |
230 | daniel-mar | 1719 | self::$sslAvailableCache = false; |
80 | daniel-mar | 1720 | return false; |
1721 | } |
||
49 | daniel-mar | 1722 | } |
42 | daniel-mar | 1723 | } |
1724 | } |
||
1725 | } |
||
497 | daniel-mar | 1726 | |
496 | daniel-mar | 1727 | /** |
1728 | * Gets a local path pointing to a resource |
||
1729 | * @param string $target Target resource (file or directory must exist), or null to get the OIDplus base directory |
||
1730 | * @param boolean $relative If true, the returning path is relative to the currently executed PHP file (not the CLI working directory) |
||
590 | daniel-mar | 1731 | * @return string|false The local path, with guaranteed trailing path delimiter for directories |
496 | daniel-mar | 1732 | */ |
1733 | public static function localpath($target=null, $relative=false) { |
||
1734 | if (is_null($target)) { |
||
1735 | $target = __DIR__.'/../../'; |
||
1736 | } |
||
241 | daniel-mar | 1737 | |
496 | daniel-mar | 1738 | if ($relative) { |
1739 | // First, try to find out how many levels we need to go up |
||
1740 | $steps_up = self::getExecutingScriptPathDepth(); |
||
1741 | if ($steps_up === false) return false; |
||
497 | daniel-mar | 1742 | |
496 | daniel-mar | 1743 | // Virtually go back from the executing PHP script to the OIDplus base path |
1744 | $res = str_repeat('../',$steps_up); |
||
497 | daniel-mar | 1745 | |
496 | daniel-mar | 1746 | // Then go to the desired location |
1747 | $basedir = realpath(__DIR__.'/../../'); |
||
1748 | $target = realpath($target); |
||
500 | daniel-mar | 1749 | if ($target === false) return false; |
496 | daniel-mar | 1750 | $res .= substr($target, strlen($basedir)+1); |
1751 | $res = rtrim($res,'/'); // avoid '..//' for localpath(null,true) |
||
1752 | } else { |
||
1753 | $res = realpath($target); |
||
241 | daniel-mar | 1754 | } |
497 | daniel-mar | 1755 | |
801 | daniel-mar | 1756 | if (is_dir($target)) $res .= '/'; |
497 | daniel-mar | 1757 | |
801 | daniel-mar | 1758 | $res = str_replace('/', DIRECTORY_SEPARATOR, $res); |
1759 | |||
496 | daniel-mar | 1760 | return $res; |
241 | daniel-mar | 1761 | } |
355 | daniel-mar | 1762 | |
496 | daniel-mar | 1763 | /** |
1764 | * Gets a URL pointing to a resource |
||
1765 | * @param string $target Target resource (file or directory must exist), or null to get the OIDplus base directory |
||
806 | daniel-mar | 1766 | * @param int|boolean $mode If true or OIDplus::PATH_RELATIVE, the returning path is relative to the currently executed |
1767 | * PHP script (i.e. index.php , not the plugin PHP script!). False or OIDplus::PATH_ABSOLUTE is |
||
1768 | * results in an absolute URL. OIDplus::PATH_ABSOLUTE_CANONICAL is an absolute URL, |
||
1769 | * but a canonical path (set by base config setting CANONICAL_SYSTEM_URL) is preferred. |
||
590 | daniel-mar | 1770 | * @return string|false The URL, with guaranteed trailing path delimiter for directories |
496 | daniel-mar | 1771 | */ |
806 | daniel-mar | 1772 | public static function webpath($target=null, $mode=self::PATH_ABSOLUTE_CANONICAL) { |
801 | daniel-mar | 1773 | // backwards compatibility |
1774 | if ($mode === true) $mode = self::PATH_RELATIVE; |
||
1775 | if ($mode === false) $mode = self::PATH_ABSOLUTE; |
||
1776 | |||
811 | daniel-mar | 1777 | if ($mode == OIDplus::PATH_RELATIVE_TO_ROOT) { |
812 | daniel-mar | 1778 | $tmp = OIDplus::webpath($target,OIDplus::PATH_ABSOLUTE); |
1779 | if ($tmp === false) return false; |
||
1780 | $tmp = parse_url($tmp); |
||
1781 | if ($tmp === false) return false; |
||
1782 | if (!isset($tmp['path'])) return false; |
||
1783 | return $tmp['path']; |
||
811 | daniel-mar | 1784 | } |
1785 | |||
812 | daniel-mar | 1786 | if ($mode == OIDplus::PATH_RELATIVE_TO_ROOT_CANONICAL) { |
1787 | $tmp = OIDplus::webpath($target,OIDplus::PATH_ABSOLUTE_CANONICAL); |
||
1788 | if ($tmp === false) return false; |
||
1789 | $tmp = parse_url($tmp); |
||
1790 | if ($tmp === false) return false; |
||
1791 | if (!isset($tmp['path'])) return false; |
||
1792 | return $tmp['path']; |
||
1793 | } |
||
1794 | |||
801 | daniel-mar | 1795 | $res = self::getSystemUrl($mode); // Note: already contains a trailing path delimiter |
778 | daniel-mar | 1796 | if ($res === false) return false; |
497 | daniel-mar | 1797 | |
496 | daniel-mar | 1798 | if (!is_null($target)) { |
1799 | $basedir = realpath(__DIR__.'/../../'); |
||
1800 | $target = realpath($target); |
||
500 | daniel-mar | 1801 | if ($target === false) return false; |
496 | daniel-mar | 1802 | $tmp = substr($target, strlen($basedir)+1); |
500 | daniel-mar | 1803 | $res .= str_replace(DIRECTORY_SEPARATOR,'/',$tmp); // remove OS specific path delimiters introduced by realpath() |
497 | daniel-mar | 1804 | if (is_dir($target)) $res .= '/'; |
496 | daniel-mar | 1805 | } |
497 | daniel-mar | 1806 | |
496 | daniel-mar | 1807 | return $res; |
1808 | } |
||
497 | daniel-mar | 1809 | |
778 | daniel-mar | 1810 | public static function canonicalURL() { |
1811 | // First part: OIDplus system URL (or canonical system URL) |
||
801 | daniel-mar | 1812 | $sysurl = OIDplus::getSystemUrl(self::PATH_ABSOLUTE_CANONICAL); |
778 | daniel-mar | 1813 | |
1814 | // Second part: Directory |
||
1815 | $basedir = realpath(__DIR__.'/../../'); |
||
1816 | $target = realpath('.'); |
||
1817 | if ($target === false) return false; |
||
1818 | $tmp = substr($target, strlen($basedir)+1); |
||
1819 | $res = str_replace(DIRECTORY_SEPARATOR,'/',$tmp); // remove OS specific path delimiters introduced by realpath() |
||
780 | daniel-mar | 1820 | if (is_dir($target) && ($res != '')) $res .= '/'; |
778 | daniel-mar | 1821 | |
1822 | // Third part: File name |
||
1823 | $tmp = explode('/',$_SERVER['SCRIPT_NAME']); |
||
1824 | $tmp = end($tmp); |
||
1825 | |||
1826 | // Fourth part: Query string (ordered) |
||
1827 | $tmp2 = getSortedQuery(); |
||
1828 | if ($tmp2 != '') $tmp2 = '?'.$tmp2; |
||
1829 | |||
1830 | return $sysurl.$res.$tmp.$tmp2; |
||
1831 | } |
||
1832 | |||
639 | daniel-mar | 1833 | private static $shutdown_functions = array(); |
1834 | public static function register_shutdown_function($func) { |
||
1835 | self::$shutdown_functions[] = $func; |
||
1836 | } |
||
1837 | |||
1838 | public static function invoke_shutdown() { |
||
1839 | foreach (self::$shutdown_functions as $func) { |
||
1840 | $func(); |
||
1841 | } |
||
1842 | } |
||
1843 | |||
360 | daniel-mar | 1844 | public static function getAvailableLangs() { |
1845 | $langs = array(); |
||
1846 | foreach (OIDplus::getAllPluginManifests('language') as $pluginManifest) { |
||
389 | daniel-mar | 1847 | $code = $pluginManifest->getLanguageCode(); |
360 | daniel-mar | 1848 | $langs[] = $code; |
1849 | } |
||
1850 | return $langs; |
||
1851 | } |
||
1852 | |||
1041 | daniel-mar | 1853 | public static function getDefaultLang() { |
1854 | static $thrownOnce = false; // avoid endless loop inside OIDplusConfigInitializationException |
||
1855 | |||
1049 | daniel-mar | 1856 | $lang = self::baseConfig()->getValue('DEFAULT_LANGUAGE', 'enus'); |
1041 | daniel-mar | 1857 | |
1858 | if (!in_array($lang,self::getAvailableLangs())) { |
||
1859 | if (!$thrownOnce) { |
||
1860 | $thrownOnce = true; |
||
1048 | daniel-mar | 1861 | throw new OIDplusConfigInitializationException(_L('DEFAULT_LANGUAGE points to an invalid language plugin. (Consider setting to "enus" = "English USA".)')); |
1041 | daniel-mar | 1862 | } else { |
1863 | return 'enus'; |
||
1864 | } |
||
1865 | } |
||
1866 | |||
1867 | return $lang; |
||
1868 | } |
||
1869 | |||
355 | daniel-mar | 1870 | public static function getCurrentLang() { |
360 | daniel-mar | 1871 | if (isset($_GET['lang'])) { |
1872 | $lang = $_GET['lang']; |
||
1873 | } else if (isset($_POST['lang'])) { |
||
1874 | $lang = $_POST['lang']; |
||
1875 | } else if (isset($_COOKIE['LANGUAGE'])) { |
||
1876 | $lang = $_COOKIE['LANGUAGE']; |
||
1877 | } else { |
||
1041 | daniel-mar | 1878 | $lang = self::getDefaultLang(); |
360 | daniel-mar | 1879 | } |
1880 | $lang = substr(preg_replace('@[^a-z]@ismU', '', $lang),0,4); // sanitize |
||
355 | daniel-mar | 1881 | return $lang; |
1882 | } |
||
1883 | |||
362 | daniel-mar | 1884 | public static function handleLangArgument() { |
1885 | if (isset($_GET['lang'])) { |
||
1886 | // The "?lang=" argument is only for NoScript-Browsers/SearchEngines |
||
1887 | // In case someone who has JavaScript clicks a ?lang= link, they should get |
||
1888 | // the page in that language, but the cookie must be set, otherwise |
||
1889 | // the menu and other stuff would be in their cookie-based-language and not the |
||
1890 | // argument-based-language. |
||
557 | daniel-mar | 1891 | OIDplus::cookieUtils()->setcookie('LANGUAGE', $_GET['lang'], 0, true/*HttpOnly off, because JavaScript also needs translation*/); |
362 | daniel-mar | 1892 | } else if (isset($_POST['lang'])) { |
557 | daniel-mar | 1893 | OIDplus::cookieUtils()->setcookie('LANGUAGE', $_POST['lang'], 0, true/*HttpOnly off, because JavaScript also needs translation*/); |
362 | daniel-mar | 1894 | } |
1895 | } |
||
1896 | |||
468 | daniel-mar | 1897 | private static $translationArray = array(); |
469 | daniel-mar | 1898 | protected static function getTranslationFileContents($translation_file) { |
1899 | // First, try the cache |
||
481 | daniel-mar | 1900 | $cache_file = __DIR__ . '/../../userdata/cache/translation_'.md5($translation_file).'.ser'; |
469 | daniel-mar | 1901 | if (file_exists($cache_file) && (filemtime($cache_file) == filemtime($translation_file))) { |
1902 | $cac = @unserialize(file_get_contents($cache_file)); |
||
1903 | if ($cac) return $cac; |
||
1904 | } |
||
481 | daniel-mar | 1905 | |
469 | daniel-mar | 1906 | // If not successful, then load the XML file |
1907 | $xml = @simplexml_load_string(file_get_contents($translation_file)); |
||
1908 | if (!$xml) return array(); // if there is an UTF-8 or parsing error, don't output any errors, otherwise the JavaScript is corrupt and the page won't render correctly |
||
1909 | $cac = array(); |
||
1910 | foreach ($xml->message as $msg) { |
||
1911 | $src = trim($msg->source->__toString()); |
||
1912 | $dst = trim($msg->target->__toString()); |
||
1913 | $cac[$src] = $dst; |
||
1914 | } |
||
1915 | @file_put_contents($cache_file,serialize($cac)); |
||
1916 | @touch($cache_file,filemtime($translation_file)); |
||
1917 | return $cac; |
||
1918 | } |
||
468 | daniel-mar | 1919 | public static function getTranslationArray($requested_lang='*') { |
362 | daniel-mar | 1920 | foreach (OIDplus::getAllPluginManifests('language') as $pluginManifest) { |
389 | daniel-mar | 1921 | $lang = $pluginManifest->getLanguageCode(); |
362 | daniel-mar | 1922 | if (strpos($lang,'/') !== false) continue; // just to be sure |
1923 | if (strpos($lang,'\\') !== false) continue; // just to be sure |
||
1924 | if (strpos($lang,'..') !== false) continue; // just to be sure |
||
401 | daniel-mar | 1925 | |
468 | daniel-mar | 1926 | if (($requested_lang != '*') && ($lang != $requested_lang)) continue; |
401 | daniel-mar | 1927 | |
468 | daniel-mar | 1928 | if (!isset(self::$translationArray[$lang])) { |
1929 | self::$translationArray[$lang] = array(); |
||
1930 | |||
1931 | $wildcard = $pluginManifest->getLanguageMessages(); |
||
1932 | if (strpos($wildcard,'/') !== false) continue; // just to be sure |
||
1933 | if (strpos($wildcard,'\\') !== false) continue; // just to be sure |
||
1934 | if (strpos($wildcard,'..') !== false) continue; // just to be sure |
||
1935 | |||
635 | daniel-mar | 1936 | $translation_files = glob(__DIR__.'/../../plugins/'.'*'.'/language/'.$lang.'/'.$wildcard); |
468 | daniel-mar | 1937 | sort($translation_files); |
1938 | foreach ($translation_files as $translation_file) { |
||
1939 | if (!file_exists($translation_file)) continue; |
||
469 | daniel-mar | 1940 | $cac = self::getTranslationFileContents($translation_file); |
1941 | foreach ($cac as $src => $dst) { |
||
1942 | self::$translationArray[$lang][$src] = $dst; |
||
468 | daniel-mar | 1943 | } |
401 | daniel-mar | 1944 | } |
362 | daniel-mar | 1945 | } |
1946 | } |
||
468 | daniel-mar | 1947 | return self::$translationArray; |
362 | daniel-mar | 1948 | } |
1949 | |||
699 | daniel-mar | 1950 | public static function getEditionInfo() { |
1951 | return @parse_ini_file(__DIR__.'/../edition.ini', true)['Edition']; |
||
1952 | } |
||
1953 | |||
698 | daniel-mar | 1954 | public static function findGitFolder() { |
1955 | // Git command line saves git information in folder ".git" |
||
1956 | // Plesk git saves git information in folder "../../../git/oidplus/" (or similar) |
||
727 | daniel-mar | 1957 | $dir = OIDplus::localpath(); |
698 | daniel-mar | 1958 | if (is_dir($dir.'/.git')) return $dir.'/.git'; |
1959 | $i = 0; |
||
1960 | do { |
||
1961 | if (is_dir($dir.'/git')) { |
||
719 | daniel-mar | 1962 | $confs = @glob($dir.'/git/'.'*'.'/config'); |
1963 | if ($confs) foreach ($confs as $conf) { |
||
698 | daniel-mar | 1964 | $cont = file_get_contents($conf); |
699 | daniel-mar | 1965 | if (isset(OIDplus::getEditionInfo()['gitrepo']) && (OIDplus::getEditionInfo()['gitrepo'] != '') && (strpos($cont, OIDplus::getEditionInfo()['gitrepo']) !== false)) { |
698 | daniel-mar | 1966 | return dirname($conf); |
1967 | } |
||
1968 | } |
||
1969 | } |
||
1970 | $i++; |
||
719 | daniel-mar | 1971 | } while (($i<100) && ($dir != ($new_dir = @realpath($dir.'/../'))) && ($dir = $new_dir)); |
698 | daniel-mar | 1972 | return false; |
1973 | } |
||
1974 | |||
1975 | public static function getGitsvnRevision($dir='') { |
||
1976 | try { |
||
1977 | // tries command line and binary parsing |
||
699 | daniel-mar | 1978 | // requires vendor/danielmarschall/git_utils.inc.php |
698 | daniel-mar | 1979 | $git_dir = OIDplus::findGitFolder(); |
1980 | if ($git_dir === false) return false; |
||
1981 | $commit_msg = git_get_latest_commit_message($git_dir); |
||
1050 | daniel-mar | 1982 | } catch (\Exception $e) { |
698 | daniel-mar | 1983 | return false; |
1984 | } |
||
1985 | |||
1986 | $m = array(); |
||
1987 | if (preg_match('%git-svn-id: (.+)@(\\d+) %ismU', $commit_msg, $m)) { |
||
1988 | return $m[2]; |
||
1989 | } else { |
||
1990 | return false; |
||
1991 | } |
||
1992 | } |
||
1993 | |||
775 | daniel-mar | 1994 | public static function prefilterQuery($static_node_id, $throw_exception) { |
1995 | // Let namespace be case-insensitive |
||
1996 | $ary = explode(':', $static_node_id, 2); |
||
1997 | $ary[0] = strtolower($ary[0]); |
||
1998 | $static_node_id = implode(':', $ary); |
||
1999 | |||
889 | daniel-mar | 2000 | // Ask plugins if they want to change the node id |
2001 | foreach (OIDplus::getObjectTypePluginsEnabled() as $plugin) { |
||
2002 | $static_node_id = $plugin->prefilterQuery($static_node_id, $throw_exception); |
||
775 | daniel-mar | 2003 | } |
2004 | |||
2005 | return $static_node_id; |
||
2006 | } |
||
849 | daniel-mar | 2007 | |
2008 | public static function isCronjob() { |
||
2009 | return explode('.',basename($_SERVER['SCRIPT_NAME']))[0] === 'cron'; |
||
2010 | } |
||
856 | daniel-mar | 2011 | |
857 | daniel-mar | 2012 | private static function recanonizeObjects() { |
1050 | daniel-mar | 2013 | // |
2014 | // Since OIDplus svn-184, entries in the database need to have a canonical ID |
||
2015 | // If the ID is not canonical (e.g. GUIDs missing hyphens), the object cannot be opened in OIDplus |
||
2016 | // This script re-canonizes the object IDs if required. |
||
2017 | // In SVN Rev 856, the canonization for GUID, IPv4 and IPv6 have changed, requiring another |
||
2018 | // re-canonization |
||
2019 | // |
||
856 | daniel-mar | 2020 | $res = OIDplus::db()->query("select id from ###objects"); |
2021 | while ($row = $res->fetch_array()) { |
||
2022 | $ida = $row['id']; |
||
857 | daniel-mar | 2023 | $obj = OIDplusObject::parse($ida); |
2024 | if (!$obj) continue; |
||
2025 | $idb = $obj->nodeId(); |
||
856 | daniel-mar | 2026 | if (($idb) && ($ida != $idb)) { |
2027 | OIDplus::db()->transaction_begin(); |
||
2028 | OIDplus::db()->query("update ###objects set id = ? where id = ?", array($idb, $ida)); |
||
2029 | OIDplus::db()->query("update ###asn1id set oid = ? where oid = ?", array($idb, $ida)); |
||
2030 | OIDplus::db()->query("update ###iri set oid = ? where oid = ?", array($idb, $ida)); |
||
2031 | OIDplus::db()->query("update ###log_object set id = ? where id = ?", array($idb, $ida)); |
||
2032 | OIDplus::logger()->log("[INFO]A!", "Object name '$ida' has been changed to '$idb' during re-canonization"); |
||
2033 | OIDplus::db()->transaction_commit(); |
||
978 | daniel-mar | 2034 | OIDplusObject::resetObjectInformationCache(); |
856 | daniel-mar | 2035 | } |
2036 | } |
||
2037 | } |
||
2038 | |||
374 | daniel-mar | 2039 | } |