2015-11-04 11:52:13 +01:00
|
|
|
<?php
|
2017-11-02 15:43:41 +01:00
|
|
|
/* Functions for Networking */
|
|
|
|
|
2021-01-21 12:54:10 +01:00
|
|
|
/**
|
|
|
|
* Get a human readable data size string from a number of bytes.
|
|
|
|
*
|
|
|
|
* @param long $numbytes The number of bytes.
|
|
|
|
* @param int $precision The number of numbers to round to after the dot/comma.
|
|
|
|
* @return string Data size in units: PB, TB, GB, MB or KB otherwise an empty string.
|
|
|
|
*/
|
|
|
|
function getHumanReadableDatasize($numbytes, $precision = 2)
|
|
|
|
{
|
|
|
|
$humanDatasize = '';
|
|
|
|
$kib = 1024;
|
|
|
|
$mib = $kib * 1024;
|
|
|
|
$gib = $mib * 1024;
|
|
|
|
$tib = $gib * 1024;
|
|
|
|
$pib = $tib * 1024;
|
|
|
|
if ($numbytes >= $pib) {
|
|
|
|
$humanDatasize = ' ('.round($numbytes / $pib, $precision).' PB)';
|
|
|
|
} elseif ($numbytes >= $tib) {
|
|
|
|
$humanDatasize = ' ('.round($numbytes / $tib, $precision).' TB)';
|
|
|
|
} elseif ($numbytes >= $gib) {
|
|
|
|
$humanDatasize = ' ('.round($numbytes / $gib, $precision).' GB)';
|
|
|
|
} elseif ($numbytes >= $mib) {
|
|
|
|
$humanDatasize = ' ('.round($numbytes / $mib, $precision).' MB)';
|
|
|
|
} elseif ($numbytes >= $kib) {
|
|
|
|
$humanDatasize = ' ('.round($numbytes / $kib, $precision).' KB)';
|
|
|
|
}
|
|
|
|
|
|
|
|
return $humanDatasize;
|
|
|
|
}
|
|
|
|
|
2020-11-30 13:09:56 +01:00
|
|
|
/**
|
|
|
|
* Converts a netmask to CIDR notation string
|
|
|
|
*
|
|
|
|
* @param string $mask
|
|
|
|
* @return string
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function mask2cidr($mask)
|
|
|
|
{
|
|
|
|
$long = ip2long($mask);
|
|
|
|
$base = ip2long('255.255.255.255');
|
|
|
|
return 32-log(($long ^ $base)+1, 2);
|
2017-11-02 15:43:41 +01:00
|
|
|
}
|
|
|
|
|
2020-11-30 13:09:56 +01:00
|
|
|
/**
|
|
|
|
* Converts a CIDR notation string to a netmask
|
|
|
|
*
|
|
|
|
* @param string $cidr
|
|
|
|
* @return string
|
2020-12-04 15:40:54 +01:00
|
|
|
*/
|
2020-11-30 13:09:56 +01:00
|
|
|
function cidr2mask($cidr)
|
|
|
|
{
|
|
|
|
$ta = substr ($cidr, strpos ($cidr, '/') + 1) * 1;
|
|
|
|
$netmask = str_split (str_pad (str_pad ('', $ta, '1'), 32, '0'), 8);
|
|
|
|
foreach ($netmask as &$element)
|
|
|
|
$element = bindec ($element);
|
|
|
|
return join ('.', $netmask);
|
|
|
|
}
|
|
|
|
|
2020-12-04 15:40:54 +01:00
|
|
|
/**
|
|
|
|
* Removes a dhcp configuration block for the specified interface
|
|
|
|
*
|
|
|
|
* @param string $iface
|
|
|
|
* @param object $status
|
|
|
|
* @return boolean $result
|
|
|
|
*/
|
|
|
|
function removeDHCPConfig($iface,$status)
|
|
|
|
{
|
|
|
|
$dhcp_cfg = file_get_contents(RASPI_DHCPCD_CONFIG);
|
|
|
|
$dhcp_cfg = preg_replace('/^#\sRaspAP\s'.$iface.'\s.*?(?=\s*^\s*$)([\s]+)/ms', '', $dhcp_cfg, 1);
|
|
|
|
file_put_contents("/tmp/dhcpddata", $dhcp_cfg);
|
|
|
|
system('sudo cp /tmp/dhcpddata '.RASPI_DHCPCD_CONFIG, $result);
|
|
|
|
if ($result == 0) {
|
|
|
|
$status->addMessage('DHCP configuration for '.$iface.' removed.', 'success');
|
|
|
|
} else {
|
|
|
|
$status->addMessage('Failed to remove DHCP configuration for '.$iface.'.', 'danger');
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Removes a dhcp configuration block for the specified interface
|
|
|
|
*
|
|
|
|
* @param string $dhcp_cfg
|
|
|
|
* @param string $iface
|
|
|
|
* @return string $dhcp_cfg
|
|
|
|
*/
|
|
|
|
function removeDHCPIface($dhcp_cfg,$iface)
|
|
|
|
{
|
|
|
|
$dhcp_cfg = preg_replace('/^#\sRaspAP\s'.$iface.'\s.*?(?=\s*^\s*$)([\s]+)/ms', '', $dhcp_cfg, 1);
|
|
|
|
return $dhcp_cfg;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Removes a dnsmasq configuration block for the specified interface
|
|
|
|
*
|
|
|
|
* @param string $iface
|
|
|
|
* @param object $status
|
|
|
|
* @return boolean $result
|
|
|
|
*/
|
|
|
|
function removeDnsmasqConfig($iface,$status)
|
|
|
|
{
|
|
|
|
system('sudo rm '.RASPI_DNSMASQ_PREFIX.$iface.'.conf', $result);
|
|
|
|
if ($result == 0) {
|
|
|
|
$status->addMessage('Dnsmasq configuration for '.$iface.' removed.', 'success');
|
|
|
|
} else {
|
|
|
|
$status->addMessage('Failed to remove dnsmasq configuration for '.$iface.'.', 'danger');
|
|
|
|
}
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Scans dnsmasq configuration dir for the specified interface
|
|
|
|
* Non-matching configs are removed, optional adblock.conf is protected
|
|
|
|
*
|
|
|
|
* @param string $dir_conf
|
|
|
|
* @param string $interface
|
|
|
|
* @param object $status
|
|
|
|
*/
|
|
|
|
function scanConfigDir($dir_conf,$interface,$status)
|
|
|
|
{
|
|
|
|
$syscnf = preg_grep('~\.(conf)$~', scandir($dir_conf));
|
2020-12-04 22:41:10 +01:00
|
|
|
foreach ($syscnf as $cnf) {
|
|
|
|
if ($cnf !== '090_adblock.conf' && !preg_match('/.*_'.$interface.'.conf/', $cnf)) {
|
|
|
|
system('sudo rm /etc/dnsmasq.d/'.$cnf, $result);
|
2020-12-04 15:40:54 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return $status;
|
|
|
|
}
|
|
|
|
|
2020-12-05 10:12:47 +01:00
|
|
|
/**
|
|
|
|
* Returns a default (fallback) value for the selected service, interface & setting
|
|
|
|
* from /etc/raspap/networking/defaults.json
|
|
|
|
*
|
|
|
|
* @param string $svc
|
|
|
|
* @param string $iface
|
|
|
|
* @return string $value
|
|
|
|
*/
|
|
|
|
function getDefaultNetValue($svc,$iface,$key)
|
|
|
|
{
|
|
|
|
$json = json_decode(file_get_contents(RASPI_CONFIG_NETWORK), true);
|
|
|
|
if ($json === null) {
|
|
|
|
return false;
|
|
|
|
} else {
|
|
|
|
return $json[$svc][$iface][$key][0];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-24 13:29:52 +01:00
|
|
|
/**
|
|
|
|
* Returns default options for the specified service
|
|
|
|
*
|
|
|
|
* @param string $svc
|
|
|
|
* @return object $json
|
|
|
|
*/
|
|
|
|
function getDefaultNetOpts($svc)
|
|
|
|
{
|
|
|
|
$json = json_decode(file_get_contents(RASPI_CONFIG_NETWORK), true);
|
|
|
|
if ($json === null) {
|
|
|
|
return false;
|
|
|
|
} else {
|
|
|
|
return $json[$svc]['options'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-02 15:43:41 +01:00
|
|
|
/* Functions to write ini files */
|
|
|
|
|
2021-01-21 12:54:10 +01:00
|
|
|
/**
|
|
|
|
* Writes a configuration to an .ini file
|
|
|
|
*
|
|
|
|
* @param array $array
|
|
|
|
* @param string $file
|
|
|
|
* @return boolean
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function write_php_ini($array, $file)
|
|
|
|
{
|
2017-11-02 15:43:41 +01:00
|
|
|
$res = array();
|
2019-04-10 10:37:35 +02:00
|
|
|
foreach ($array as $key => $val) {
|
|
|
|
if (is_array($val)) {
|
2017-11-02 15:43:41 +01:00
|
|
|
$res[] = "[$key]";
|
2019-04-10 10:37:35 +02:00
|
|
|
foreach ($val as $skey => $sval) {
|
2019-05-01 00:57:12 +02:00
|
|
|
$res[] = "$skey = $sval";
|
2019-04-10 10:37:35 +02:00
|
|
|
}
|
|
|
|
} else {
|
2019-05-01 00:36:35 +02:00
|
|
|
$res[] = "$key = $val";
|
2017-11-02 15:43:41 +01:00
|
|
|
}
|
|
|
|
}
|
2019-05-01 00:18:44 +02:00
|
|
|
if (safefilerewrite($file, implode(PHP_EOL, $res))) {
|
2017-11-02 15:43:41 +01:00
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-21 12:54:10 +01:00
|
|
|
/**
|
|
|
|
* Writes to a file without conflicts
|
|
|
|
*
|
|
|
|
* @param string $fileName
|
|
|
|
* @param string $dataToSave
|
|
|
|
* @return boolean
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function safefilerewrite($fileName, $dataToSave)
|
|
|
|
{
|
2017-11-02 15:43:41 +01:00
|
|
|
if ($fp = fopen($fileName, 'w')) {
|
2019-04-10 10:37:35 +02:00
|
|
|
$startTime = microtime(true);
|
2017-11-02 15:43:41 +01:00
|
|
|
do {
|
|
|
|
$canWrite = flock($fp, LOCK_EX);
|
|
|
|
// If lock not obtained sleep for 0 - 100 milliseconds, to avoid collision and CPU load
|
2019-04-10 10:37:35 +02:00
|
|
|
if (!$canWrite) {
|
|
|
|
usleep(round(rand(0, 100)*1000));
|
|
|
|
}
|
|
|
|
} while ((!$canWrite)and((microtime(true)-$startTime) < 5));
|
2017-11-02 15:43:41 +01:00
|
|
|
|
|
|
|
//file was locked so now we can store information
|
|
|
|
if ($canWrite) {
|
2019-05-01 00:57:12 +02:00
|
|
|
fwrite($fp, $dataToSave.PHP_EOL);
|
2017-11-02 15:43:41 +01:00
|
|
|
flock($fp, LOCK_UN);
|
|
|
|
}
|
|
|
|
fclose($fp);
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-30 17:38:33 +02:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Saves a CSRF token in the session
|
|
|
|
*/
|
2019-07-30 17:38:33 +02:00
|
|
|
function ensureCSRFSessionToken()
|
|
|
|
{
|
2019-08-19 04:12:37 +02:00
|
|
|
if (empty($_SESSION['csrf_token'])) {
|
|
|
|
$_SESSION['csrf_token'] = bin2hex(random_bytes(32));
|
|
|
|
}
|
2019-07-30 17:38:33 +02:00
|
|
|
}
|
|
|
|
|
2016-06-24 23:39:39 +02:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Add CSRF Token to form
|
|
|
|
*/
|
2019-08-01 13:07:27 +02:00
|
|
|
function CSRFTokenFieldTag()
|
2019-04-10 10:37:35 +02:00
|
|
|
{
|
2019-08-01 13:01:03 +02:00
|
|
|
$token = htmlspecialchars($_SESSION['csrf_token']);
|
2019-08-01 13:11:07 +02:00
|
|
|
return '<input type="hidden" name="csrf_token" value="' . $token . '">';
|
2016-06-24 23:39:39 +02:00
|
|
|
}
|
|
|
|
|
2019-07-30 17:22:03 +02:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Retuns a CSRF meta tag (for use with xhr, for example)
|
|
|
|
*/
|
2019-07-30 17:22:03 +02:00
|
|
|
function CSRFMetaTag()
|
|
|
|
{
|
|
|
|
$token = htmlspecialchars($_SESSION['csrf_token']);
|
|
|
|
return '<meta name="csrf_token" content="' . $token . '">';
|
|
|
|
}
|
|
|
|
|
2016-06-24 23:39:39 +02:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Validate CSRF Token
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function CSRFValidate()
|
|
|
|
{
|
2019-07-30 17:28:03 +02:00
|
|
|
$post_token = $_POST['csrf_token'];
|
|
|
|
$header_token = $_SERVER['HTTP_X_CSRF_TOKEN'];
|
|
|
|
|
|
|
|
if (empty($post_token) && empty($header_token)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$request_token = $post_token;
|
|
|
|
if (empty($post_token)) {
|
|
|
|
$request_token = $header_token;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (hash_equals($_SESSION['csrf_token'], $request_token)) {
|
2019-04-10 10:37:35 +02:00
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
error_log('CSRF violation');
|
|
|
|
return false;
|
|
|
|
}
|
2016-06-24 23:39:39 +02:00
|
|
|
}
|
|
|
|
|
2019-07-30 17:05:00 +02:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Should the request be CSRF-validated?
|
|
|
|
*/
|
2019-07-30 17:05:00 +02:00
|
|
|
function csrfValidateRequest()
|
|
|
|
{
|
2019-09-07 17:42:31 +02:00
|
|
|
$request_method = strtolower($_SERVER['REQUEST_METHOD']);
|
|
|
|
return in_array($request_method, [ "post", "put", "patch", "delete" ]);
|
2019-07-30 17:05:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Handle invalid CSRF
|
|
|
|
*/
|
2019-07-30 17:05:00 +02:00
|
|
|
function handleInvalidCSRFToken()
|
|
|
|
{
|
|
|
|
header('HTTP/1.1 500 Internal Server Error');
|
|
|
|
header('Content-Type: text/plain');
|
|
|
|
echo 'Invalid CSRF token';
|
|
|
|
exit;
|
|
|
|
}
|
|
|
|
|
2016-08-05 16:50:05 +02:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Test whether array is associative
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function isAssoc($arr)
|
|
|
|
{
|
|
|
|
return array_keys($arr) !== range(0, count($arr) - 1);
|
2016-08-05 16:50:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Display a selector field for a form. Arguments are:
|
|
|
|
*
|
|
|
|
* @param string $name: Field name
|
|
|
|
* @param array $options: Array of options
|
|
|
|
* @param string $selected: Selected option (optional)
|
|
|
|
* @param string $id: $options is an associative array this should be the key
|
|
|
|
* @param string $event: onChange event (optional)
|
|
|
|
* @param string $disabled (optional)
|
|
|
|
*/
|
2019-12-27 04:08:51 +01:00
|
|
|
function SelectorOptions($name, $options, $selected = null, $id = null, $event = null, $disabled = null)
|
2019-04-10 10:37:35 +02:00
|
|
|
{
|
|
|
|
echo '<select class="form-control" name="'.htmlspecialchars($name, ENT_QUOTES).'"';
|
|
|
|
if (isset($id)) {
|
|
|
|
echo ' id="' . htmlspecialchars($id, ENT_QUOTES) .'"';
|
2016-08-05 16:50:05 +02:00
|
|
|
}
|
2019-12-26 07:16:13 +01:00
|
|
|
if (isset($event)) {
|
|
|
|
echo ' onChange="' . htmlspecialchars($event, ENT_QUOTES).'()"';
|
|
|
|
}
|
2019-04-10 10:37:35 +02:00
|
|
|
echo '>' , PHP_EOL;
|
|
|
|
foreach ($options as $opt => $label) {
|
|
|
|
$select = '';
|
|
|
|
$key = isAssoc($options) ? $opt : $label;
|
|
|
|
if ($key == $selected) {
|
|
|
|
$select = ' selected="selected"';
|
|
|
|
}
|
2019-12-27 04:08:51 +01:00
|
|
|
if ($key == $disabled) {
|
|
|
|
$disabled = ' disabled';
|
|
|
|
}
|
|
|
|
echo '<option value="'.htmlspecialchars($key, ENT_QUOTES).'"'.$select.$disabled.'>'.
|
2018-08-16 14:48:47 +02:00
|
|
|
htmlspecialchars($label, ENT_QUOTES).'</option>' , PHP_EOL;
|
2019-04-10 10:37:35 +02:00
|
|
|
}
|
2018-08-04 01:58:34 +02:00
|
|
|
|
2019-04-10 10:37:35 +02:00
|
|
|
echo '</select>' , PHP_EOL;
|
2016-08-05 16:50:05 +02:00
|
|
|
}
|
|
|
|
|
2015-02-25 14:08:14 +01:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
*
|
|
|
|
* @param string $input
|
|
|
|
* @param string $string
|
|
|
|
* @param int $offset
|
|
|
|
* @param string $separator
|
|
|
|
* @return $string
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function GetDistString($input, $string, $offset, $separator)
|
|
|
|
{
|
|
|
|
$string = substr($input, strpos($input, $string)+$offset, strpos(substr($input, strpos($input, $string)+$offset), $separator));
|
|
|
|
return $string;
|
2015-02-25 14:08:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
*
|
|
|
|
* @param array $arrConfig
|
|
|
|
* @return $config
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function ParseConfig($arrConfig)
|
|
|
|
{
|
|
|
|
$config = array();
|
|
|
|
foreach ($arrConfig as $line) {
|
|
|
|
$line = trim($line);
|
2019-09-07 17:42:31 +02:00
|
|
|
if ($line == "" || $line[0] == "#") {
|
|
|
|
continue;
|
|
|
|
}
|
2019-08-01 16:31:11 +02:00
|
|
|
|
|
|
|
list($option, $value) = array_map("trim", explode("=", $line, 2));
|
|
|
|
|
|
|
|
if (empty($config[$option])) {
|
|
|
|
$config[$option] = $value ?: true;
|
|
|
|
} else {
|
|
|
|
if (!is_array($config[$option])) {
|
|
|
|
$config[$option] = [ $config[$option] ];
|
|
|
|
}
|
|
|
|
$config[$option][] = $value;
|
2019-04-10 10:37:35 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return $config;
|
2015-02-25 14:08:14 +01:00
|
|
|
}
|
|
|
|
|
2020-12-01 19:38:57 +01:00
|
|
|
/**
|
|
|
|
* Fetches DHCP configuration for an interface, returned as JSON data
|
|
|
|
*
|
|
|
|
* @param string $interface
|
|
|
|
* @return json $jsonData
|
|
|
|
*/
|
|
|
|
function getNetConfig($interface)
|
|
|
|
{
|
|
|
|
$URI = $_SERVER['REQUEST_SCHEME'].'://'.$_SERVER['SERVER_NAME'] .'/ajax/networking/get_netcfg.php?iface='.$interface;
|
|
|
|
$jsonData = file_get_contents($URI);
|
|
|
|
return $jsonData;
|
|
|
|
}
|
|
|
|
|
2015-02-25 14:08:14 +01:00
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
*
|
|
|
|
* @param string $freq
|
|
|
|
* @return $channel
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function ConvertToChannel($freq)
|
|
|
|
{
|
|
|
|
if ($freq >= 2412 && $freq <= 2484) {
|
|
|
|
$channel = ($freq - 2407)/5;
|
|
|
|
} elseif ($freq >= 4915 && $freq <= 4980) {
|
|
|
|
$channel = ($freq - 4910)/5 + 182;
|
|
|
|
} elseif ($freq >= 5035 && $freq <= 5865) {
|
|
|
|
$channel = ($freq - 5030)/5 + 6;
|
|
|
|
} else {
|
|
|
|
$channel = -1;
|
|
|
|
}
|
|
|
|
if ($channel >= 1 && $channel <= 196) {
|
|
|
|
return $channel;
|
|
|
|
} else {
|
|
|
|
return 'Invalid Channel';
|
|
|
|
}
|
2015-02-25 14:08:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 18:57:46 +01:00
|
|
|
* Converts WPA security string to readable format
|
|
|
|
*
|
|
|
|
* @param string $security
|
|
|
|
* @return string
|
|
|
|
*/
|
2019-04-10 10:37:35 +02:00
|
|
|
function ConvertToSecurity($security)
|
|
|
|
{
|
|
|
|
$options = array();
|
|
|
|
preg_match_all('/\[([^\]]+)\]/s', $security, $matches);
|
|
|
|
foreach ($matches[1] as $match) {
|
|
|
|
if (preg_match('/^(WPA\d?)/', $match, $protocol_match)) {
|
|
|
|
$protocol = $protocol_match[1];
|
|
|
|
$matchArr = explode('-', $match);
|
|
|
|
if (count($matchArr) > 2) {
|
|
|
|
$options[] = htmlspecialchars($protocol . ' ('. $matchArr[2] .')', ENT_QUOTES);
|
|
|
|
} else {
|
|
|
|
$options[] = htmlspecialchars($protocol, ENT_QUOTES);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (count($options) === 0) {
|
|
|
|
// This could also be WEP but wpa_supplicant doesn't have a way to determine
|
|
|
|
// this.
|
|
|
|
// And you shouldn't be using WEP these days anyway.
|
|
|
|
return 'Open';
|
|
|
|
} else {
|
2019-10-15 22:07:21 +02:00
|
|
|
return implode(' / ', $options);
|
2016-08-12 19:29:56 +02:00
|
|
|
}
|
2015-02-25 14:08:14 +01:00
|
|
|
}
|
|
|
|
|
2019-08-08 02:10:40 +02:00
|
|
|
/**
|
|
|
|
* Renders a simple PHP template
|
|
|
|
*/
|
2020-03-06 16:54:48 +01:00
|
|
|
function renderTemplate($name, $__template_data = [])
|
2019-08-08 02:10:40 +02:00
|
|
|
{
|
2019-08-19 00:22:43 +02:00
|
|
|
$file = realpath(dirname(__FILE__) . "/../templates/$name.php");
|
2019-08-08 02:10:40 +02:00
|
|
|
if (!file_exists($file)) {
|
|
|
|
return "template $name ($file) not found";
|
|
|
|
}
|
|
|
|
|
2020-03-06 16:54:48 +01:00
|
|
|
if (is_array($__template_data)) {
|
|
|
|
extract($__template_data);
|
2019-08-08 02:10:40 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
ob_start();
|
|
|
|
include $file;
|
|
|
|
return ob_get_clean();
|
|
|
|
}
|
|
|
|
|
|
|
|
function expandCacheKey($key)
|
|
|
|
{
|
|
|
|
return RASPI_CACHE_PATH . "/" . $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
function hasCache($key)
|
|
|
|
{
|
|
|
|
$cacheKey = expandCacheKey($key);
|
|
|
|
return file_exists($cacheKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
function readCache($key)
|
|
|
|
{
|
|
|
|
$cacheKey = expandCacheKey($key);
|
|
|
|
if (!file_exists($cacheKey)) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
return file_get_contents($cacheKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
function writeCache($key, $data)
|
|
|
|
{
|
2021-02-02 12:15:08 +01:00
|
|
|
if (!file_exists(RASPI_CACHE_PATH)) {
|
|
|
|
mkdir(RASPI_CACHE_PATH, 0777, true);
|
|
|
|
$cacheKey = expandCacheKey($key);
|
|
|
|
file_put_contents($cacheKey, $data);
|
|
|
|
}
|
2019-08-08 02:10:40 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
function deleteCache($key)
|
|
|
|
{
|
|
|
|
if (hasCache($key)) {
|
|
|
|
$cacheKey = expandCacheKey($key);
|
|
|
|
unlink($cacheKey);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function cache($key, $callback)
|
|
|
|
{
|
|
|
|
if (hasCache($key)) {
|
|
|
|
return readCache($key);
|
|
|
|
} else {
|
|
|
|
$data = $callback();
|
|
|
|
writeCache($key, $data);
|
|
|
|
return $data;
|
|
|
|
}
|
|
|
|
}
|
2020-02-28 00:52:35 +01:00
|
|
|
|
2021-05-08 19:24:15 +02:00
|
|
|
// insspired by
|
|
|
|
// http://markushedlund.com/dev/php-escapeshellarg-with-unicodeutf-8-support
|
|
|
|
function mb_escapeshellarg($arg)
|
|
|
|
{
|
|
|
|
$isWindows = strtolower(substr(PHP_OS, 0, 3)) === 'win';
|
|
|
|
if ($isWindows) {
|
|
|
|
return '"' . str_replace(array('"', '%'), '', $arg) . '"';
|
|
|
|
} else {
|
|
|
|
return "'" . str_replace("'", "'\\''", $arg) . "'";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-04 19:43:22 +01:00
|
|
|
function dnsServers()
|
|
|
|
{
|
|
|
|
$data = json_decode(file_get_contents("./config/dns-servers.json"));
|
|
|
|
return (array) $data;
|
|
|
|
}
|
|
|
|
|
2020-03-26 20:45:39 +01:00
|
|
|
function blocklistProviders()
|
|
|
|
{
|
|
|
|
$data = json_decode(file_get_contents("./config/blocklists.json"));
|
|
|
|
return (array) $data;
|
|
|
|
}
|
|
|
|
|
2020-03-04 19:43:22 +01:00
|
|
|
function optionsForSelect($options)
|
|
|
|
{
|
|
|
|
$html = "";
|
|
|
|
foreach ($options as $key => $value) {
|
|
|
|
// optgroup
|
|
|
|
if (is_array($value)) {
|
|
|
|
$html .= "<optgroup label=\"$key\">";
|
|
|
|
$html .= optionsForSelect($value);
|
|
|
|
$html .= "</optgroup>";
|
|
|
|
}
|
|
|
|
// option
|
|
|
|
else {
|
|
|
|
$key = is_int($key) ? $value : $key;
|
|
|
|
$html .= "<option value=\"$value\">$key</option>";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $html;
|
|
|
|
}
|
2020-04-01 11:09:52 +02:00
|
|
|
|
|
|
|
function blocklistUpdated($file)
|
|
|
|
{
|
|
|
|
$blocklist = RASPI_CONFIG.'/adblock/'.$file;
|
|
|
|
if (file_exists($blocklist)) {
|
|
|
|
$lastModified = date ("F d Y H:i:s.", filemtime($blocklist));
|
|
|
|
$lastModified = formatDateAgo($lastModified);
|
|
|
|
return $lastModified;
|
|
|
|
} else {
|
|
|
|
return 'Never';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function formatDateAgo($datetime, $full = false)
|
|
|
|
{
|
|
|
|
$now = new DateTime;
|
|
|
|
$ago = new DateTime($datetime);
|
|
|
|
$diff = $now->diff($ago);
|
|
|
|
|
|
|
|
$diff->w = floor($diff->d / 7);
|
|
|
|
$diff->d -= $diff->w * 7;
|
|
|
|
|
|
|
|
$string = array(
|
|
|
|
'y' => 'year',
|
|
|
|
'm' => 'month',
|
|
|
|
'w' => 'week',
|
|
|
|
'd' => 'day',
|
|
|
|
'h' => 'hour',
|
|
|
|
'i' => 'minute',
|
|
|
|
's' => 'second',
|
|
|
|
);
|
|
|
|
foreach ($string as $k => &$v) {
|
|
|
|
if ($diff->$k) {
|
|
|
|
$v = $diff->$k . ' ' . $v . ($diff->$k > 1 ? 's' : '');
|
|
|
|
} else {
|
|
|
|
unset($string[$k]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!$full) $string = array_slice($string, 0, 1);
|
|
|
|
return $string ? implode(', ', $string) . ' ago' : 'just now';
|
|
|
|
}
|
2020-06-30 17:53:52 +02:00
|
|
|
|
|
|
|
function getThemeOpt()
|
|
|
|
{
|
|
|
|
if (!isset($_COOKIE['theme'])) {
|
|
|
|
$theme = "custom.php";
|
|
|
|
} else {
|
|
|
|
$theme = $_COOKIE['theme'];
|
|
|
|
}
|
|
|
|
return 'app/css/'.htmlspecialchars($theme, ENT_QUOTES);
|
|
|
|
}
|
|
|
|
|
2020-07-01 00:35:46 +02:00
|
|
|
function getColorOpt()
|
|
|
|
{
|
|
|
|
if (!isset($_COOKIE['color'])) {
|
2021-11-25 09:05:38 +01:00
|
|
|
$color = "#2b8080";
|
2020-07-01 00:35:46 +02:00
|
|
|
} else {
|
|
|
|
$color = $_COOKIE['color'];
|
|
|
|
}
|
|
|
|
return $color;
|
|
|
|
}
|
|
|
|
function getSidebarState()
|
|
|
|
{
|
|
|
|
if ($_COOKIE['sidebarToggled'] == 'true' ) {
|
|
|
|
return"toggled";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Returns bridged AP mode status
|
|
|
|
function getBridgedState()
|
|
|
|
{
|
|
|
|
$arrHostapdConf = parse_ini_file(RASPI_CONFIG.'/hostapd.ini');
|
|
|
|
// defaults to false
|
|
|
|
return $arrHostapdConf['BridgedEnable'];
|
|
|
|
}
|
|
|
|
|
2020-09-19 23:24:15 +02:00
|
|
|
// Validates a host or FQDN
|
|
|
|
function validate_host($host) {
|
|
|
|
return preg_match('/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i', $host);
|
|
|
|
}
|
|
|
|
|
2021-05-30 22:49:05 +02:00
|
|
|
function evalHexSequence($string) {
|
|
|
|
$evaluator = function ($input) {
|
|
|
|
return hex2bin($input[1]);
|
|
|
|
};
|
|
|
|
return preg_replace_callback('/\\\x(..)/', $evaluator, $string);
|
|
|
|
}
|
|
|
|
|
2021-08-31 16:18:00 +02:00
|
|
|
function hexSequence2lower($string) {
|
|
|
|
return preg_replace_callback('/\\\\x([0-9A-F]{2})/', function($b){ return '\x'.strtolower($b[1]); }, $string);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* File upload callback object
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
class validation
|
|
|
|
{
|
|
|
|
public function check_name_length($object)
|
|
|
|
{
|
|
|
|
if (strlen($object->file['filename']) > 255) {
|
|
|
|
$object->set_error('File name is too long.');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Resolves public IP address
|
|
|
|
*
|
|
|
|
* @return string $public_ip
|
|
|
|
*/
|
|
|
|
function get_public_ip()
|
|
|
|
{
|
|
|
|
exec('wget https://ipinfo.io/ip -qO -', $public_ip);
|
|
|
|
return $public_ip[0];
|
|
|
|
}
|
|
|
|
|