mirror of
https://github.com/billz/raspap-webgui.git
synced 2025-12-27 15:34:28 +01:00
Compare commits
387 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
e95be333f6 | ||
|
|
ae106497f9 | ||
|
|
018561bdf7 | ||
|
|
5fadbc7ef4 | ||
|
|
ca6b445433 | ||
|
|
00f54d6d7e | ||
|
|
8bd98ed518 | ||
|
|
2e187d79d1 | ||
|
|
01caca9fad | ||
|
|
632f72a5a7 | ||
|
|
b4f9b3d5f4 | ||
|
|
e92329231f | ||
|
|
e7d18d3ad0 | ||
|
|
8cdbfe44fd | ||
|
|
bf822a239c | ||
|
|
dac7723441 | ||
|
|
3211735534 | ||
|
|
15a680934d | ||
|
|
83783ae056 | ||
|
|
1d2a22397e | ||
|
|
206e23213a | ||
|
|
23b964a172 | ||
|
|
c03f81719c | ||
|
|
0a3dbef531 | ||
|
|
3ab66d3e76 | ||
|
|
98b55ad10b | ||
|
|
a25e0f1956 | ||
|
|
ac8a6fe4a8 | ||
|
|
1dde68ff88 | ||
|
|
08d4443c02 | ||
|
|
d0b1b1c8f9 | ||
|
|
fc8508b260 | ||
|
|
8628c8d5b1 | ||
|
|
f0dbb6455b | ||
|
|
c29f45867c | ||
|
|
de9f7548d5 | ||
|
|
955add1b25 | ||
|
|
f34cb43882 | ||
|
|
c08095065e | ||
|
|
b21f9897e7 | ||
|
|
7cb3e62850 | ||
|
|
42a2a299c2 | ||
|
|
0f5768a7dd | ||
|
|
24fd53f8de | ||
|
|
c8047670a2 | ||
|
|
af74dc35f3 | ||
|
|
53e4019e08 | ||
|
|
1afb980ce5 | ||
|
|
1ca57260e1 | ||
|
|
a21ecbfc0e | ||
|
|
cca91dfeab | ||
|
|
681594b8d5 | ||
|
|
d226b70c92 | ||
|
|
a0a3a9ca52 | ||
|
|
f5ade0f444 | ||
|
|
9538bd3f95 | ||
|
|
93ef7c7430 | ||
|
|
94e197ddd7 | ||
|
|
8bf918ce28 | ||
|
|
0d9d1f3319 | ||
|
|
0a668475d8 | ||
|
|
346f774517 | ||
|
|
f9d115bbde | ||
|
|
789cc4f593 | ||
|
|
0938c3d9e9 | ||
|
|
2c63f84862 | ||
|
|
16e52c3b90 | ||
|
|
4c2138d419 | ||
|
|
302fc4f6dc | ||
|
|
bf86a6ef57 | ||
|
|
ce7032c99a | ||
|
|
d86ad11f0a | ||
|
|
2080b0d576 | ||
|
|
53af2ecc03 | ||
|
|
e81b74ab61 | ||
|
|
f547a35312 | ||
|
|
db9ca93bfb | ||
|
|
e120379602 | ||
|
|
4d8cf545af | ||
|
|
8310c26021 | ||
|
|
704b042082 | ||
|
|
79862e65c4 | ||
|
|
391f765beb | ||
|
|
a60ed2e9ba | ||
|
|
21f157778a | ||
|
|
7be38373d8 | ||
|
|
05371b3bb0 | ||
|
|
b76efe1ab7 | ||
|
|
d70158cbe3 | ||
|
|
60d58376f1 | ||
|
|
36e447cd4d | ||
|
|
ee776f2a2e | ||
|
|
49ee0751d0 | ||
|
|
963c533985 | ||
|
|
95229fd1b7 | ||
|
|
b451971c46 | ||
|
|
352008b966 | ||
|
|
efc2dbc136 | ||
|
|
e5c162ddcf | ||
|
|
de188cd8fc | ||
|
|
2e2438b045 | ||
|
|
836444105e | ||
|
|
c5fdff2413 | ||
|
|
e360211ae4 | ||
|
|
2c34fef61f | ||
|
|
4f0f4bb93c | ||
|
|
5b8ecff185 | ||
|
|
22c558a786 | ||
|
|
821aaf646c | ||
|
|
aecf8e6e94 | ||
|
|
cb7ece3d4c | ||
|
|
076c03311b | ||
|
|
4667ce53be | ||
|
|
e7df5691bd | ||
|
|
e1304c7dcb | ||
|
|
936cc15656 | ||
|
|
752d01c8ed | ||
|
|
34f3d59b2c | ||
|
|
a89d571c69 | ||
|
|
0c8e1a310c | ||
|
|
2b61f91ba5 | ||
|
|
3ae73a9728 | ||
|
|
4976d72683 | ||
|
|
58e27eff24 | ||
|
|
f0d5bde1e5 | ||
|
|
1522cfb7e7 | ||
|
|
3bbfcba539 | ||
|
|
504403a5c3 | ||
|
|
256277b85e | ||
|
|
b4de5fa8be | ||
|
|
3d31f7ec9b | ||
|
|
067d488617 | ||
|
|
f75d10bd0e | ||
|
|
9dd6bb8fd6 | ||
|
|
aae31f14ad | ||
|
|
6e4272f325 | ||
|
|
dcf1a8f8f4 | ||
|
|
6a9a2711e0 | ||
|
|
299981eac1 | ||
|
|
6ba5b9e7fd | ||
|
|
9fa2d5a9b1 | ||
|
|
2336d179ae | ||
|
|
9b1912b6d7 | ||
|
|
f6ce051076 | ||
|
|
28733668a2 | ||
|
|
066080643d | ||
|
|
7a2efb68cd | ||
|
|
07612999fa | ||
|
|
e1e7ae4f40 | ||
|
|
6a90070b0e | ||
|
|
de277e7588 | ||
|
|
ab3c4d90da | ||
|
|
d6bcbc7a3f | ||
|
|
988e75a564 | ||
|
|
abd4c1e962 | ||
|
|
78d0b1a958 | ||
|
|
2aafe2b61c | ||
|
|
079191b660 | ||
|
|
ca8485d80b | ||
|
|
beb40ec7b9 | ||
|
|
939c5d164c | ||
|
|
1e6bd6f516 | ||
|
|
5cdd174e29 | ||
|
|
b84d26447f | ||
|
|
b2f7cad0d9 | ||
|
|
3f47043bbc | ||
|
|
90981a9f21 | ||
|
|
03c48a1c42 | ||
|
|
6433d83967 | ||
|
|
c6a738097a | ||
|
|
276f6585e1 | ||
|
|
53581c813f | ||
|
|
b4d5e9033c | ||
|
|
9cf65a29cb | ||
|
|
c74b410e8c | ||
|
|
593acb93bd | ||
|
|
5fa691bca1 | ||
|
|
bc2679ac68 | ||
|
|
d5ac2f6881 | ||
|
|
3691489194 | ||
|
|
74bd81a92c | ||
|
|
74194205ec | ||
|
|
fb4571a191 | ||
|
|
b98c1fb912 | ||
|
|
fdfbc62e9b | ||
|
|
cc6771ba07 | ||
|
|
b654e6bb33 | ||
|
|
6093b8107f | ||
|
|
1b708bc947 | ||
|
|
6a61320ea0 | ||
|
|
321c98de24 | ||
|
|
b9e78faf30 | ||
|
|
e3991a476b | ||
|
|
0f9583e366 | ||
|
|
34dd95f341 | ||
|
|
a33cb4ad57 | ||
|
|
6148d39e1b | ||
|
|
589126a83c | ||
|
|
a844328da3 | ||
|
|
4b67191823 | ||
|
|
ccd4db70bc | ||
|
|
895b880d69 | ||
|
|
e0d0ec05e3 | ||
|
|
29be30479e | ||
|
|
ae09dda000 | ||
|
|
e3e9adb63e | ||
|
|
8bf4116b42 | ||
|
|
2c896bbc12 | ||
|
|
66c04ec353 | ||
|
|
594ec2eec6 | ||
|
|
6772709141 | ||
|
|
23f32f9830 | ||
|
|
417f803411 | ||
|
|
f1dc6b3078 | ||
|
|
0114325a18 | ||
|
|
9e911847c5 | ||
|
|
4bc18f93e7 | ||
|
|
e514178b33 | ||
|
|
87d317db52 | ||
|
|
3b2396ec41 | ||
|
|
f7ac3d0b9d | ||
|
|
d4da4032b2 | ||
|
|
dc7122532f | ||
|
|
66b0a42576 | ||
|
|
08cc452e3d | ||
|
|
3eaa5b7801 | ||
|
|
bd53ef9ecc | ||
|
|
8bb18b43f8 | ||
|
|
23103c8c4b | ||
|
|
93b5dc4dac | ||
|
|
f7058b048a | ||
|
|
159e82dbd3 | ||
|
|
31303727a4 | ||
|
|
931086aecb | ||
|
|
a295dae059 | ||
|
|
a5a6747ced | ||
|
|
a36e3c7b57 | ||
|
|
f7e4b95ee2 | ||
|
|
a2c5eec53a | ||
|
|
66e2397ca0 | ||
|
|
6dd80575f4 | ||
|
|
73985333b0 | ||
|
|
5319b9dbbd | ||
|
|
d9e00171b2 | ||
|
|
75577ecd1d | ||
|
|
c77fc254f6 | ||
|
|
d1c2e0d3ba | ||
|
|
7976d77ac1 | ||
|
|
c3cc4ff9db | ||
|
|
b1d776aa64 | ||
|
|
c7194e2e26 | ||
|
|
2514b0a569 | ||
|
|
b23084fe7b | ||
|
|
e39d35a395 | ||
|
|
cbc6221420 | ||
|
|
e855d12949 | ||
|
|
7f2eb6e88f | ||
|
|
63491b17d6 | ||
|
|
5fbc94c319 | ||
|
|
58e0867c1e | ||
|
|
3922832b53 | ||
|
|
dadc4e4fb4 | ||
|
|
3c1d4325f2 | ||
|
|
f30abc4bd7 | ||
|
|
a13e1b8804 | ||
|
|
b2b52c2c36 | ||
|
|
cfef857d34 | ||
|
|
1b9d522bd8 | ||
|
|
59e7a9d859 | ||
|
|
01a441c687 | ||
|
|
4f90c035ca | ||
|
|
f558d02e68 | ||
|
|
2967f5b692 | ||
|
|
a005ba30b9 | ||
|
|
bb76eb86a4 | ||
|
|
33476098c1 | ||
|
|
6e749dd2d6 | ||
|
|
522b204bb9 | ||
|
|
e0e236faa2 | ||
|
|
c19bd60241 | ||
|
|
7a7bdda708 | ||
|
|
7cc436fbaa | ||
|
|
87f55c8b1e | ||
|
|
98922434f2 | ||
|
|
83ab53dd87 | ||
|
|
1e2f77abcb | ||
|
|
8f19d759f2 | ||
|
|
ed1938d10b | ||
|
|
9df3baa5f1 | ||
|
|
cbc6ee74c3 | ||
|
|
cf32a4ba01 | ||
|
|
636e04fa78 | ||
|
|
5f4469ab32 | ||
|
|
5a57d542c5 | ||
|
|
3fe4990cfd | ||
|
|
92f9cf745e | ||
|
|
c5ff6912ea | ||
|
|
e12be86c8c | ||
|
|
5cd07a83a9 | ||
|
|
126f64a793 | ||
|
|
3b352b12d8 | ||
|
|
b9642371e0 | ||
|
|
9dc6209b47 | ||
|
|
9d03517896 | ||
|
|
fa38ac6153 | ||
|
|
dd3b300931 | ||
|
|
da6f469982 | ||
|
|
a91e441073 | ||
|
|
f1ced91811 | ||
|
|
3ad5a98798 | ||
|
|
094ebdb85f | ||
|
|
dea3e7c485 | ||
|
|
4e55f5a97f | ||
|
|
619bfdc04d | ||
|
|
2b2a76c512 | ||
|
|
b293355eac | ||
|
|
2f9a2dfa92 | ||
|
|
fcca855c44 | ||
|
|
cc4370151f | ||
|
|
2c4dbb87ba | ||
|
|
99b46ce086 | ||
|
|
ee8d32383b | ||
|
|
bad782deda | ||
|
|
e31ccd09e8 | ||
|
|
134f80ada8 | ||
|
|
5040507750 | ||
|
|
02b31a0254 | ||
|
|
807d903c8a | ||
|
|
478ba9973f | ||
|
|
83a3057e7f | ||
|
|
f29f0f2b53 | ||
|
|
1382cdda33 | ||
|
|
8f37b35088 | ||
|
|
b374befa8e | ||
|
|
378e04939e | ||
|
|
bd3ac1b611 | ||
|
|
349c5af574 | ||
|
|
918f7daa74 | ||
|
|
6f380299db | ||
|
|
c33522b015 | ||
|
|
e126f3f664 | ||
|
|
c0df273c36 | ||
|
|
7994fa3c33 | ||
|
|
7fceaf536c | ||
|
|
7a0b93a0e8 | ||
|
|
c21d5a1790 | ||
|
|
4f57e259dd | ||
|
|
5c979424f3 | ||
|
|
51d528fd42 | ||
|
|
698b8bf809 | ||
|
|
b5e79b9148 | ||
|
|
810218b67e | ||
|
|
80a5d97eee | ||
|
|
6ef5d10fe8 | ||
|
|
96aa833477 | ||
|
|
ee916dadac | ||
|
|
c4f29443c4 | ||
|
|
eee8575d3f | ||
|
|
99cab5a06e | ||
|
|
e4e8204660 | ||
|
|
7fc7b25479 | ||
|
|
697c622f76 | ||
|
|
780803b0ec | ||
|
|
ad22fb693b | ||
|
|
3152e8c288 | ||
|
|
7883514f40 | ||
|
|
345c331b10 | ||
|
|
ac9a39b5be | ||
|
|
6de96dad14 | ||
|
|
eb8d81e590 | ||
|
|
5822914890 | ||
|
|
bba2f67931 | ||
|
|
2a4f2f356c | ||
|
|
665520234a | ||
|
|
65be23a1db | ||
|
|
eb53c46c33 | ||
|
|
1eed833909 | ||
|
|
c222f9cd4f | ||
|
|
3b35f5a0c6 | ||
|
|
72d7028e25 | ||
|
|
f514f5a12e | ||
|
|
f802c825f6 | ||
|
|
c0f496cf07 | ||
|
|
116704c59b | ||
|
|
e9742a5252 | ||
|
|
2aaf1eca07 | ||
|
|
575876406c |
18
.github/ISSUE_TEMPLATE/issue_form.yml
vendored
18
.github/ISSUE_TEMPLATE/issue_form.yml
vendored
@@ -52,13 +52,17 @@ body:
|
||||
attributes:
|
||||
label: Operating System
|
||||
options:
|
||||
- Raspberry Pi OS (64-bit) Lite Bookworm
|
||||
- Raspberry Pi OS (32-bit) Lite Bookworm
|
||||
- Raspberry Pi OS (64-bit) Desktop Bookwom
|
||||
- Raspberry Pi OS (64-bit) Lite Bullseye
|
||||
- Raspberry Pi OS (32-bit) Lite Bullseye
|
||||
- Armbian 23.05 (Suni)
|
||||
- Debian Bookworm
|
||||
- Raspberry Pi OS Lite 64-bit Debian 13 (trixie)
|
||||
- Raspberry Pi OS Lite 32-bit Debian 13 (trixie)
|
||||
- Raspberry Pi OS Lite 64-bit Debian 12 (bookworm)
|
||||
- Raspberry Pi OS Lite 32-bit Debian 12 (bookworm)
|
||||
- Raspberry Pi OS Desktop 64-bit Debian 12 (bookworm)
|
||||
- Raspberry Pi OS Lite 64-bit Debian 11 (bullseye)
|
||||
- Raspberry Pi OS Lite 32-bit Debian 11 (bullseye)
|
||||
- Kali Linux 2025.3 64-bit
|
||||
- Kali Linux 2025.3 32-bit
|
||||
- Armbian 23.11 (jammy)
|
||||
- Debian 12 (bookworm)
|
||||
validations:
|
||||
required: true
|
||||
- type: dropdown
|
||||
|
||||
23
.github/workflows/release.yml
vendored
23
.github/workflows/release.yml
vendored
@@ -15,8 +15,10 @@ jobs:
|
||||
include:
|
||||
- arch: "32-bit"
|
||||
pi_gen_version: "master"
|
||||
release: "trixie"
|
||||
- arch: "64-bit"
|
||||
pi_gen_version: "arm64"
|
||||
release: "trixie"
|
||||
fail-fast: false
|
||||
steps:
|
||||
- name: Checkout repository
|
||||
@@ -27,20 +29,33 @@ jobs:
|
||||
|
||||
- name: Build RaspAP Image
|
||||
id: build
|
||||
uses: usimd/pi-gen-action@v1
|
||||
uses: usimd/pi-gen-action@v1.11.0
|
||||
with:
|
||||
image-name: "raspap-bookworm-${{ matrix.arch == '32-bit' && 'armhf' || 'arm64' }}-lite-${{ github.event.inputs.tag || github.ref_name }}"
|
||||
release: ${{ matrix.release }}
|
||||
image-name: "raspap-${{ matrix.release }}-${{ matrix.arch == '32-bit' && 'armhf' || 'arm64' }}-lite-${{ github.event.inputs.tag || github.ref_name }}"
|
||||
enable-ssh: 1
|
||||
stage-list: stage0 stage1 stage2 ./stage-raspap
|
||||
verbose-output: true
|
||||
pi-gen-version: ${{ matrix.pi_gen_version }}
|
||||
pi-gen-repository: RaspAP/pi-gen
|
||||
pi-gen-repository: billz/pi-gen
|
||||
|
||||
- name: Upload Artifact
|
||||
uses: svenstaro/upload-release-action@v2
|
||||
with:
|
||||
asset_name: "raspap-bookworm-${{ matrix.arch == '32-bit' && 'armhf' || 'arm64' }}-lite-${{ github.event.inputs.tag || github.ref_name }}.img.zip"
|
||||
asset_name: "raspap-${{ matrix.release }}-${{ matrix.arch == '32-bit' && 'armhf' || 'arm64' }}-lite-${{ github.event.inputs.tag || github.ref_name }}.img.zip"
|
||||
file: ${{ steps.build.outputs.image-path }}
|
||||
repo_token: ${{ secrets.GITHUB_TOKEN }}
|
||||
tag: ${{ github.event.inputs.tag || github.ref }}
|
||||
overwrite: true
|
||||
|
||||
torrent:
|
||||
needs: build-raspap-image
|
||||
runs-on: ubuntu-latest
|
||||
permissions:
|
||||
contents: write
|
||||
steps:
|
||||
- name: Generate torrents for release
|
||||
uses: devopsx/action-torrent@v1
|
||||
with:
|
||||
token: ${{ secrets.GITHUB_TOKEN }}
|
||||
local: false
|
||||
|
||||
59
.github/workflows/update-os-list.yml
vendored
Normal file
59
.github/workflows/update-os-list.yml
vendored
Normal file
@@ -0,0 +1,59 @@
|
||||
name: Update OS List for RPi Imager
|
||||
|
||||
on:
|
||||
workflow_dispatch:
|
||||
workflow_run:
|
||||
workflows: ["release.yaml"]
|
||||
types:
|
||||
- completed
|
||||
|
||||
jobs:
|
||||
update-os-list:
|
||||
runs-on: ubuntu-latest
|
||||
if: ${{ github.event_name == 'workflow_dispatch' || github.event.workflow_run.conclusion == 'success' }}
|
||||
permissions:
|
||||
contents: write
|
||||
|
||||
steps:
|
||||
- name: Checkout repository
|
||||
uses: actions/checkout@v4
|
||||
with:
|
||||
fetch-depth: 0
|
||||
|
||||
- name: Get release information
|
||||
id: release
|
||||
run: |
|
||||
# Fetch latest release info
|
||||
RESPONSE=$(curl -s "https://api.github.com/repos/${{ github.repository }}/releases/latest")
|
||||
VERSION=$(echo "$RESPONSE" | jq -r '.tag_name')
|
||||
RELEASE_DATE=$(echo "$RESPONSE" | jq -r '.published_at' | cut -d'T' -f1)
|
||||
echo "version=$VERSION" >> $GITHUB_OUTPUT
|
||||
echo "release_date=$RELEASE_DATE" >> $GITHUB_OUTPUT
|
||||
echo "Found release: $VERSION (published: $RELEASE_DATE)"
|
||||
|
||||
- name: Download release assets and generate OS list
|
||||
env:
|
||||
VERSION: ${{ steps.release.outputs.version }}
|
||||
RELEASE_DATE: ${{ steps.release.outputs.release_date }}
|
||||
GH_TOKEN: ${{ github.token }}
|
||||
run: |
|
||||
cd installers
|
||||
echo "Downloading release assets for $VERSION..."
|
||||
gh release download "$VERSION" \
|
||||
--pattern "raspap-trixie-armhf-lite-*.img.zip" \
|
||||
--pattern "raspap-trixie-arm64-lite-*.img.zip"
|
||||
chmod +x ./generate_os_list.sh
|
||||
./generate_os_list.sh
|
||||
|
||||
- name: Commit and push changes
|
||||
run: |
|
||||
git config user.name "github-actions[bot]"
|
||||
git config user.email "github-actions[bot]@users.noreply.github.com"
|
||||
git add installers/os-sublist-raspap.json
|
||||
if git diff --staged --quiet; then
|
||||
echo "No changes to commit"
|
||||
else
|
||||
git commit -m "Update OS list for RPi Imager (${{ steps.release.outputs.version }})"
|
||||
git push
|
||||
fi
|
||||
|
||||
2
.gitignore
vendored
2
.gitignore
vendored
@@ -4,7 +4,7 @@ yarn-error.log
|
||||
*.swp
|
||||
includes/config.php
|
||||
rootCA.pem
|
||||
vendor
|
||||
.env
|
||||
locale/**/*.mo
|
||||
app/net_activity
|
||||
app/js/plugins/
|
||||
|
||||
39
BACKERS.md
39
BACKERS.md
@@ -13,38 +13,47 @@ You can become a sponsor using your individual or organization's GitHub account.
|
||||
**Important**: If you're sponsoring [RaspAP](https://github.com/RaspAP/sponsors) through a GitHub organization, please send a short email to [sponsors@raspap.com](mailto:sponsors@raspap.com) with the name of your organization and the account that should be added as a collaborator.
|
||||
|
||||
## Exclusive features
|
||||
The following features are currently available exclusively to sponsors. A tangible side benefit of sponsorship is that Insiders are able to help steer future development of RaspAP. This is done through Insiders' access to discussions, feature requests, issues and pull requests in the private GitHub repository.
|
||||
The following features are currently available exclusively to sponsors. A tangible side benefit of sponsorship is that Insiders are able to help steer future development of RaspAP. This is done through your Insiders access to discussions, feature requests, issues and pull requests in the private GitHub repository.
|
||||
|
||||
✅ [Network device management](https://docs.raspap.com/net-devices/)
|
||||
✅ [Firewall settings](https://docs.raspap.com/firewall/)
|
||||
✅ [WPA3-Personal AP security](https://docs.raspap.com/ap-basics/#wpa3-personal)
|
||||
✅ [802.11w Protected Management Frames](https://docs.raspap.com/ap-basics/#80211w)
|
||||
✅ [Printable Wi-Fi signs](https://docs.raspap.com/ap-basics/#printable-signs)
|
||||
✅ [MAC address cloning](https://docs.raspap.com/net-devices/#changing-the-mac-address)
|
||||
✅ [Network diagnostics](https://docs.raspap.com/net-devices/#diagnostics)
|
||||
✅ [WireGuard VPN kill switch](https://docs.raspap.com/wireguard/#kill-switch)
|
||||
✅ [Dynamic DNS support](https://docs.raspap.com/dynamicdns/)
|
||||
✅ [Multiple WireGuard configs](https://docs.raspap.com/wireguard/#multiple-configs)
|
||||
✅ [Wireless LAN routing](https://docs.raspap.com/wlanrouting/)
|
||||
✅ [Custom user avatars](https://docs.raspap.com/authentication/#custom-user-avatars)
|
||||
✅ [WiFi repeater mode](https://docs.raspap.com/ap-basics/#wifi-repeater-mode)
|
||||
✅ [NTP Service](https://docs.raspap.com/ntp/)
|
||||
✅ [Limited privilege user role](https://docs.raspap.com/authentication/#limited-privilege-user-role)
|
||||
✅ [Tailscale VPN](https://docs.raspap.com/tailscale/)
|
||||
✅ [Inspect network adapters](https://docs.raspap.com/troubleshooting/#inspect-network-adapters)
|
||||
|
||||
Look for the list above to grow as we add more exclusive features. Be sure to visit this page from time to time to learn about what's new, check the [Insiders docs page](https://docs.raspap.com/insiders/) and follow [@RaspAP on Twitter](https://twitter.com/rasp_ap) to stay updated.
|
||||
Look for the list above to grow as we add more exlcusive features. Have an idea or suggestion for a future enhancement? Start or join an [Insiders discussion](https://github.com/RaspAP/raspap-insiders/discussions) and let us know!
|
||||
|
||||
## Funding targets
|
||||
Below is a list of funding targets. When a funding target is reached, the features that are tied to it are merged back into RaspAP and released to the public for general availability.
|
||||
|
||||
### $1000
|
||||
The second **Insiders Edition** includes the features listed above.
|
||||
### $1,500 - 3rd Insiders Edition
|
||||
The **3rd Insiders Edition** includes the exclusive features listed above.
|
||||
|
||||
### $500
|
||||
The [first Insiders Edition goal](https://docs.raspap.com/insiders/#500-1st-insiders-edition) was reached in December 2021. Thank you sponsors!
|
||||
### $500 - 1st Insiders Edition (completed)
|
||||
✅ Multiple OpenVPN client configs
|
||||
✅ OpenVPN certificate authentication
|
||||
✅ OpenVPN service logging
|
||||
✅ Night mode toggle
|
||||
✅ Restrict network to static clients
|
||||
✅ WireGuard support
|
||||
✅ Set AP transmit power
|
||||
|
||||
### $1,000 - 2nd Insiders Edition (completed)
|
||||
✅ Firewall settings
|
||||
✅ WPA3-Personal AP security
|
||||
✅ 802.11w Protected Management Frames
|
||||
✅ Printable Wi-Fi signs
|
||||
✅ Network diagnostics
|
||||
✅ Dynamic DNS
|
||||
✅ WireGuard kill switch
|
||||
✅ NTP Service
|
||||
|
||||
## Quarterly giving
|
||||
Beginning in 2022, each quarter 15% of all proceeds from Insiders will be donated directly to the [Raspberry Pi Foundation](https://www.raspberrypi.org/). The Raspberry Pi Foundation is a UK-based charity that works to put the power of computing and digital making into the hands of people all over the world.
|
||||
Each quarter, 15% of all proceeds from Insiders are [donated directly to the Raspberry Pi Foundation](https://docs.raspap.com/insiders/#quarterly-giving). The Raspberry Pi Foundation is a UK-based charity that works to put the power of computing and digital making into the hands of people all over the world.
|
||||
|
||||
[](https://www.youtube.com/watch?v=dEzg92g1LHw)
|
||||
|
||||
|
||||
@@ -16,7 +16,7 @@ RaspAP is made possible by a strong [community of developers](https://github.com
|
||||
|
||||
* [GitHub discussions](https://github.com/RaspAP/raspap-webgui/discussions)
|
||||
* [Discord chat](https://discord.gg/KVAsaAR)
|
||||
* [Twitter](https://twitter.com/rasp_ap)
|
||||
* [X](https://x.com/rasp_ap)
|
||||
* [Reddit](https://www.reddit.com/r/RaspAP/)
|
||||
|
||||
If you enjoy using RaspAP and would like to support our work financially, consider becoming an [Insider](https://github.com/sponsors/RaspAP).
|
||||
|
||||
80
README.md
80
README.md
@@ -1,9 +1,9 @@
|
||||

|
||||
[](https://github.com/raspap/raspap-webgui/releases) [](https://github.com/thibmaek/awesome-raspberry-pi) [](https://github.com/sponsors/RaspAP) [](https://app.travis-ci.com/RaspAP/raspap-webgui) [](https://crowdin.com/project/raspap) [](https://twitter.com/rasp_ap) [](https://reddit.com/r/RaspAP) [](https://discord.gg/KVAsaAR)
|
||||

|
||||
[](https://github.com/raspap/raspap-webgui/releases) [](https://github.com/thibmaek/awesome-raspberry-pi) [](https://github.com/sponsors/RaspAP) [](https://app.travis-ci.com/RaspAP/raspap-webgui) [](https://crowdin.com/project/raspap) [](https://twitter.com/rasp_ap) [](https://reddit.com/r/RaspAP) [](https://discord.gg/KVAsaAR)
|
||||
|
||||
RaspAP is feature-rich wireless router software that _just works_ on many popular [Debian-based devices](#supported-operating-systems), including the Raspberry Pi. Our [custom OS images](#pre-built-image), [Quick installer](#quick-installer) and [Docker container](#docker-support) create a known-good default configuration for all current Raspberry Pis with onboard wireless. A fully responsive, mobile-ready interface gives you control over the relevant services and networking options. Advanced DHCP settings, [WireGuard](https://docs.raspap.com/wireguard/), [Tailscale](https://docs.raspap.com/tailscale/) and [OpenVPN](https://docs.raspap.com/openvpn/) support, [SSL certificates](https://docs.raspap.com/ssl/), [ad blocking](#ad-blocking), security audits, [captive portal integration](https://docs.raspap.com/captive/), themes and [multilingual options](https://docs.raspap.com/translations/) are included.
|
||||
|
||||
RaspAP has been featured by [PC World](https://www.pcwelt.de/article/1789512/raspberry-pi-als-wlan-router.html), [Adafruit](https://blog.adafruit.com/2016/06/24/raspap-wifi-configuration-portal-piday-raspberrypi-raspberry_pi/), [Raspberry Pi Weekly](https://www.raspberrypi.org/weekly/commander/), and [Awesome Raspberry Pi](https://project-awesome.org/thibmaek/awesome-raspberry-pi) and implemented in [countless projects](https://github.com/RaspAP/raspap-awesome#projects).
|
||||
RaspAP has been featured by [PC World](https://www.pcwelt.de/article/1789512/raspberry-pi-als-wlan-router.html), [MSN](https://www.msn.com/en-us/news/technology/4-reasons-i-installed-raspap-on-my-raspberry-pi/ar-AA1GLHdE), [Adafruit](https://blog.adafruit.com/2016/06/24/raspap-wifi-configuration-portal-piday-raspberrypi-raspberry_pi/), [Raspberry Pi Weekly](https://www.raspberrypi.org/weekly/commander/), and [Awesome Raspberry Pi](https://project-awesome.org/thibmaek/awesome-raspberry-pi) and implemented in [countless projects](https://github.com/RaspAP/raspap-awesome#projects).
|
||||
|
||||
We hope you enjoy using RaspAP as much as we do creating it. Tell us how you use this with [your own projects](https://github.com/raspap/raspap-awesome).
|
||||
|
||||
@@ -41,10 +41,10 @@ RaspAP gives you two different ways to get up and running quickly. The simplest
|
||||
### Pre-built image
|
||||
Custom Raspberry Pi OS Lite images with the latest RaspAP are available for [direct download](https://github.com/RaspAP/raspap-webgui/releases/latest). This includes both 32- and 64-bit builds for ARM architectures.
|
||||
|
||||
| Operating system | Debian version | Kernel version | RaspAP version | Size |
|
||||
| ---------------------| ---------------|-----------------|----------------|-------|
|
||||
| Raspberry Pi OS (64-bit) Lite | 12 (bookworm) | 6.6 | Latest | 777 MB|
|
||||
| Raspberry Pi OS (32-bit) Lite | 12 (bookworm) | 6.6 | Latest | 805 MB|
|
||||
| Operating system | Debian version | Kernel version | RaspAP version | Size |
|
||||
| ------------ | -------------- | -------------- | -------------- | ---- |
|
||||
| Raspberry Pi OS (64-bit) Lite | 13 (trixie) | 6.12 | Latest | 826 MB |
|
||||
| Raspberry Pi OS (32-bit) Lite | 13 (trixie) | 6.12 | Latest | 799 MB |
|
||||
|
||||
These images are automatically generated with each release of RaspAP. You may choose between an `arm64` or `armhf` (32-bit) based build. Refer to [this resource](https://www.raspberrypi.com/software/operating-systems/) to ensure compatibility with your hardware.
|
||||
|
||||
@@ -72,19 +72,20 @@ The Quick installer will respond to several [command line arguments](https://doc
|
||||
### Initial settings
|
||||
After completing either of these setup options, the wireless AP network will be configured as follows:
|
||||
|
||||
* IP address: 10.3.141.1
|
||||
* Username: admin
|
||||
* Password: secret
|
||||
* DHCP range: 10.3.141.50 — 10.3.141.254
|
||||
* SSID: `raspi-webgui`
|
||||
* Password: ChangeMe
|
||||
* IP address: `10.3.141.1`
|
||||
* Username: `admin`
|
||||
* Password: `secret`
|
||||
* DHCP range: `10.3.141.50` — `10.3.141.254`
|
||||
* SSID: `RaspAP`
|
||||
* Password: `ChangeMe`
|
||||
|
||||
It's _strongly recommended_ that your first post-install action is to change the default admin [authentication](https://docs.raspap.com/authentication/) settings. Thereafter, your AP's [basic settings](https://docs.raspap.com/ap-basics/) and many [advanced options](https://docs.raspap.com/ap-basics#advanced-options) are now ready to be modified by RaspAP.
|
||||
|
||||
Please [read this](https://docs.raspap.com/issues/) before reporting an issue.
|
||||
|
||||
## Join Insiders
|
||||
[](https://github.com/sponsors/RaspAP/)
|
||||
|
||||
[<img src="https://github.com/user-attachments/assets/832f1f0d-517a-4d73-8b62-068cf1a2041d" width="320">](https://github.com/sponsors/RaspAP/)
|
||||
|
||||
RaspAP is free software, but powered by _your_ support. If you find RaspAP useful for your personal or commercial projects, [become an Insider](https://github.com/sponsors/RaspAP/) and get early access to [exclusive features](https://docs.raspap.com/insiders/#exclusive-features) in the [Insiders Edition](https://docs.raspap.com/insiders/).
|
||||
|
||||
@@ -92,19 +93,15 @@ A tangible side benefit of sponsorship is that **Insiders** are able to help _st
|
||||
|
||||
## WireGuard support
|
||||
|
||||

|
||||
|
||||
WireGuard® is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be considerably more performant than OpenVPN, and is generally regarded as the most secure, easiest to use, and simplest VPN solution for modern Linux distributions.
|
||||
|
||||
WireGuard may be optionally installed by the [Quick Installer](https://docs.raspap.com/quick/). Once this is done, you can manage local (server) settings, create a peer configuration and control the `wg-quick` service with RaspAP.
|
||||
WireGuard is included in the pre-built OS and may be optionally installed by the [Quick Installer](https://docs.raspap.com/quick/). Once this is done, you can manage local (server) settings, create a peer configuration and control the `wg-quick` service with RaspAP.
|
||||
|
||||
Details are [provided here](https://docs.raspap.com/wireguard/).
|
||||
|
||||
## OpenVPN support
|
||||
|
||||

|
||||
|
||||
OpenVPN may be optionally installed by the Quick Installer. Once this is done, you can [manage client configurations](https://docs.raspap.com/openvpn/) and the `openvpn-client` service with RaspAP.
|
||||
OpenVPN is included in the pre-built OS and may be optionally installed by the Quick Installer. Once this is done, you can [manage client configurations](https://docs.raspap.com/openvpn/) and the `openvpn-client` service with RaspAP.
|
||||
|
||||
To configure an OpenVPN client, upload a valid .ovpn file and, optionally, specify your login credentials. RaspAP will store your client configuration and add firewall rules to forward traffic from OpenVPN's `tun0` interface to your configured wireless interface.
|
||||
|
||||
@@ -117,37 +114,40 @@ Several popular VPN providers include a Linux Command Line Interface (CLI) for i
|
||||
See our [VPN provider documentation](https://docs.raspap.com/providers/) for more information.
|
||||
|
||||
## Ad Blocking
|
||||
This feature uses DNS blacklisting to block requests for ads, trackers and other undesirable hosts. To enable ad blocking, simply respond to the prompt during the installation. As a beta release, we encourage testing and feedback from users of RaspAP.
|
||||
This feature uses DNS blacklisting to block requests for ads, trackers and other undesirable hosts. Ad blocking is included in the pre-built OS and may be optionally installed by the [Quick Installer](https://docs.raspap.com/quick/). Thereafter, you may choose between several of the best available [blocklist sources](https://docs.raspap.com/features-core/adblock/#blocklist-sources) to suit your needs.
|
||||
|
||||
Details are [provided here](https://docs.raspap.com/adblock/).
|
||||
|
||||
## Bridged AP
|
||||
By default RaspAP configures a routed AP for your clients to connect to. A bridged AP configuration is also possible. Slide the **Bridged AP mode** toggle under the **Advanced** tab of **Configure hotspot**, then save and restart the hotspot.
|
||||
By default RaspAP configures a routed AP for your clients to connect to. A bridged AP configuration is also possible. Select the **Bridged AP mode** toggle under the **Advanced** tab of **Hotspot**, configure a static IP address for the bridge interface, then save and restart the AP.
|
||||
|
||||
**Note:** In bridged mode, all routing capabilities are handled by your upstream router. Because your router assigns IP addresses to your device's hotspot and its clients, you might not be able to reach the RaspAP web interface from the default `10.3.141.1` address. Instead use your RPi's hostname followed by `.local` to access the RaspAP web interface. With Raspbian default settings, this should look like `raspberrypi.local`. Alternate methods are [discussed here](https://www.raspberrypi.org/documentation/remote-access/ip-address.md).
|
||||
|
||||
More information on Bridged AP mode is provided [in our documentation](https://docs.raspap.com/bridged/).
|
||||
Details on Bridged AP mode are [provided here](https://docs.raspap.com/bridged/).
|
||||
|
||||
## Manual installation
|
||||
Detailed manual setup instructions are provided [on our documentation site](https://docs.raspap.com/manual/).
|
||||
Detailed manual setup instructions are [provided here](https://docs.raspap.com/manual/).
|
||||
|
||||
## 802.11ac 5GHz support
|
||||
RaspAP provides an 802.11ac wireless mode option for supported hardware (currently the RPi 3B+/4 and compatible Orange Pi models) and wireless regulatory domains. See [this](https://docs.raspap.com/ap-basics/#80211ac-5-ghz) for more information.
|
||||
RaspAP provides an 802.11ac wireless mode option for supported hardware (currently the RPi 3B+, 4, 5 and compatible Orange Pi models) and wireless regulatory domains. See [this](https://docs.raspap.com/ap-basics/#80211ac-5-ghz) for more information.
|
||||
|
||||
## Supported operating systems
|
||||
RaspAP was originally made for Raspbian, but now also installs on the following Debian-based distros.
|
||||
|
||||
| Distribution | Release | Architecture | Support |
|
||||
|---|:---:|:---:|:---:|
|
||||
| Raspberry Pi OS | (64-bit) Lite Bookworm | ARM | Official |
|
||||
| Raspberry Pi OS | (32-bit) Lite Bookworm | ARM | Official |
|
||||
| Raspberry Pi OS | (64-bit) Desktop Bookworm | ARM | Official |
|
||||
| Raspberry Pi OS | (64-bit) Lite Bullseye | ARM | Official |
|
||||
| Raspberry Pi OS | (32-bit) Lite Bullseye | ARM | Official |
|
||||
| Armbian | 23.11 (Jammy) | [ARM](https://docs.armbian.com/#supported-socs) | Beta |
|
||||
| Debian | Bookworm | ARM / x86_64 | Beta |
|
||||
| Distribution | Release | Architecture | Support |
|
||||
| ------------ | ------- | ------------ | ------- |
|
||||
| Raspberry Pi OS Lite | 64-bit Debian 13 (trixie) | ARM | Official |
|
||||
| Raspberry Pi OS Lite | 32-bit Debian 13 (trixie) | ARM | Official |
|
||||
| Raspberry Pi OS Lite | 64-bit Debian 12 (bookworm) | ARM | Official |
|
||||
| Raspberry Pi OS Lite | 32-bit Debian 12 (bookworm) | ARM | Official |
|
||||
| Raspberry Pi OS Desktop | 64-bit Debian 12 (bookworm) | ARM | Official |
|
||||
| Raspberry Pi OS Lite | 64-bit Debian 11 (bullseye) | ARM | Official |
|
||||
| Raspberry Pi OS Lite | 32-bit Debian 11 (bullseye) | ARM | Official |
|
||||
| Kali Linux | 2025.3 | [ARM 64-bit](https://www.kali.org/get-kali/#kali-arm) | Beta |
|
||||
| Kali Linux | 2025.3 | [ARM 32-bit](https://www.kali.org/get-kali/#kali-arm) | Beta |
|
||||
| Debian 13 | trixie | [ARM](https://raspi.debian.net/tested-images/) | Beta |
|
||||
| Debian 12 | bookworm | [ARM](https://raspi.debian.net/tested-images/) | Beta |
|
||||
| Armbian | 23.11 (jammy) | ARM | Beta |
|
||||
|
||||
<img src="https://i.imgur.com/XiAJNKb.png" style="width:480px;" />
|
||||
<img src="https://i.imgur.com/L27nH8f.png" style="width:540px;" />
|
||||
|
||||
You are also encouraged to use RaspAP's community-led [Docker container](#docker-support). Please note that "supported" is not a guarantee. If you are able to improve support for your preferred distro, we encourage you to [actively contribute](#how-to-contribute) to the project.
|
||||
|
||||
@@ -165,8 +165,6 @@ curl -sL https://install.raspap.com | bash -s -- --cert
|
||||
More information on SSL certificates and HTTPS support is available [in our documentation](https://docs.raspap.com/ssl/).
|
||||
|
||||
## Docker support
|
||||
<img src="https://github.com/RaspAP/raspap-webgui/assets/229399/dc40dfc4-e9b8-405f-8ffb-6c5f88482b8e" width="450">
|
||||
|
||||
As an alternative to the [Quick installer](#quick-installer), RaspAP may be run in an isolated, portable [Docker container](https://docs.raspap.com/docker/).
|
||||
|
||||
See the [RaspAP-docker repo](https://github.com/RaspAP/raspap-docker/) for more information.
|
||||
@@ -175,7 +173,9 @@ See the [RaspAP-docker repo](https://github.com/RaspAP/raspap-docker/) for more
|
||||
RaspAP's integrated `PluginManager` provides a framework for developers to create custom plugins. To facilitate this, a `SamplePlugin` [repository](https://github.com/RaspAP/SamplePlugin) is available to get developers started on the right track. If you'd like to develop your own plugin for RaspAP, see the [documentation](https://docs.raspap.com/custom-plugins/) or get started right away by forking the [SamplePlugin](https://github.com/RaspAP/SamplePlugin).
|
||||
|
||||
## Multilingual support
|
||||
RaspAP uses [GNU Gettext](https://www.gnu.org/software/gettext/) to manage multilingual messages. In order to use RaspAP with one of our supported translations, you must configure a corresponding language package on your RPi. To list languages currently installed on your system, use `locale -a` at the shell prompt. To generate new locales, run `sudo dpkg-reconfigure locales` and select any other desired locales. Details are provided on our [documentation site](https://docs.raspap.com/translations/).
|
||||
RaspAP uses [GNU Gettext](https://www.gnu.org/software/gettext/) to manage multilingual messages. Our pre-built OS includes the `locales-all` package, eliminating the need to manually generate locales.
|
||||
|
||||
If you're using the Quick Installer or Manual setup methods, you must configure a corresponding language package for your system. To list languages currently installed on your system, use `locale -a` at the shell prompt. To generate new locales, run `sudo dpkg-reconfigure locales` and select any other desired locales. Details are provided [here](https://docs.raspap.com/translations/).
|
||||
|
||||
See this list of [supported languages](https://docs.raspap.com/translations/#supported-languages) that are actively maintained by volunteer translators. If your language is not supported, why not [contribute a translation](https://docs.raspap.com/translations/#contributing-to-a-translation)? Contributors will receive credit as the original translators.
|
||||
|
||||
|
||||
@@ -5,50 +5,57 @@ require_once '../../includes/session.php';
|
||||
require_once '../../includes/config.php';
|
||||
require_once '../../includes/authenticate.php';
|
||||
|
||||
define('BLOCKLISTS_FILE', __DIR__ . '/../../config/blocklists.json');
|
||||
|
||||
if (isset($_POST['blocklist_id'])) {
|
||||
$blocklist_id = escapeshellcmd($_POST['blocklist_id']);
|
||||
$blocklist_id = $_POST['blocklist_id'];
|
||||
$json = file_get_contents(BLOCKLISTS_FILE);
|
||||
$allLists = json_decode($json, true);
|
||||
|
||||
switch ($blocklist_id) {
|
||||
case "StevenBlack/hosts \(default\)":
|
||||
$list_url = "https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts";
|
||||
$dest_file = "hostnames.txt";
|
||||
break;
|
||||
case "badmojr/1Hosts \(Mini\)":
|
||||
$list_url = "https://badmojr.github.io/1Hosts/mini/hosts.txt";
|
||||
$dest_file = "hostnames.txt";
|
||||
break;
|
||||
case "badmojr/1Hosts \(Lite\)":
|
||||
$list_url = "https://badmojr.github.io/1Hosts/Lite/hosts.txt";
|
||||
$dest_file = "hostnames.txt";
|
||||
break;
|
||||
case "badmojr/1Hosts \(Pro\)":
|
||||
$list_url = "https://badmojr.github.io/1Hosts/Pro/hosts.txt";
|
||||
$dest_file = "hostnames.txt";
|
||||
break;
|
||||
case "badmojr/1Hosts \(Xtra\)":
|
||||
$list_url = "https://badmojr.github.io/1Hosts/Xtra/hosts.txt";
|
||||
$dest_file = "hostnames.txt";
|
||||
break;
|
||||
case "oisd/big \(default\)":
|
||||
$list_url = "https://big.oisd.nl/dnsmasq";
|
||||
$dest_file = "domains.txt";
|
||||
break;
|
||||
case "oisd/small":
|
||||
$list_url = "https://small.oisd.nl/dnsmasq";
|
||||
$dest_file = "domains.txt";
|
||||
break;
|
||||
case "oisd/nsfw":
|
||||
$list_url = "https://nsfw.oisd.nl/dnsmasq";
|
||||
$dest_file = "domains.txt";
|
||||
break;
|
||||
if ($allLists === null) {
|
||||
echo json_encode([
|
||||
'return' => 3,
|
||||
'output' => ['Failed to parse blocklists.json']
|
||||
]);
|
||||
exit;
|
||||
}
|
||||
$blocklist = $list_url . $dest_file;
|
||||
$dest = substr($dest_file, 0, strrpos($dest_file, "."));
|
||||
$flatList = flattenList($allLists);
|
||||
|
||||
if (!isset($flatList[$blocklist_id])) {
|
||||
echo json_encode(['return' => 1, 'output' => ['Invalid blocklist ID']]);
|
||||
exit;
|
||||
}
|
||||
|
||||
$list_url = escapeshellcmd($flatList[$blocklist_id]['list_url']);
|
||||
$dest_file = escapeshellcmd($flatList[$blocklist_id]['dest_file']);
|
||||
$dest = pathinfo($dest_file, PATHINFO_FILENAME);
|
||||
$scriptPath = RASPI_CONFIG . '/adblock/update_blocklist.sh';
|
||||
|
||||
if (!file_exists($scriptPath)) {
|
||||
echo json_encode([
|
||||
'return' => 5,
|
||||
'output' => ["Update script not found: $scriptPath"]
|
||||
]);
|
||||
exit;
|
||||
}
|
||||
exec("sudo $scriptPath $list_url $dest_file " . RASPI_ADBLOCK_LISTPATH, $output, $return_var);
|
||||
echo json_encode([
|
||||
'return' => $return_var,
|
||||
'output' => $output,
|
||||
'list' => $dest
|
||||
]);
|
||||
|
||||
exec("sudo /etc/raspap/adblock/update_blocklist.sh $list_url $dest_file " .RASPI_ADBLOCK_LISTPATH, $return);
|
||||
$jsonData = ['return'=>$return,'list'=>$dest];
|
||||
echo json_encode($jsonData);
|
||||
} else {
|
||||
$jsonData = ['return'=>2,'output'=>['Error getting data']];
|
||||
echo json_encode($jsonData);
|
||||
echo json_encode(['return' => 2, 'output' => ['No blocklist ID provided']]);
|
||||
}
|
||||
|
||||
function flattenList(array $grouped): array {
|
||||
$flat = [];
|
||||
foreach ($grouped as $group) {
|
||||
foreach ($group as $name => $meta) {
|
||||
$flat[$name] = $meta;
|
||||
}
|
||||
}
|
||||
return $flat;
|
||||
}
|
||||
|
||||
|
||||
@@ -13,7 +13,9 @@ foreach ($hostapdconfig as $hostapdconfigline) {
|
||||
continue;
|
||||
}
|
||||
$arrLine = explode("=", $hostapdconfigline);
|
||||
$arrConfig[$arrLine[0]]=$arrLine[1];
|
||||
if (count($arrLine) >= 2) {
|
||||
$arrConfig[$arrLine[0]]=$arrLine[1];
|
||||
}
|
||||
};
|
||||
$channel = intval($arrConfig['channel']);
|
||||
echo json_encode($channel);
|
||||
|
||||
@@ -1,4 +1,7 @@
|
||||
<?php
|
||||
|
||||
use RaspAP\Networking\Hotspot\DhcpcdManager;
|
||||
|
||||
require_once '../../includes/autoload.php';
|
||||
require_once '../../includes/CSRF.php';
|
||||
require_once '../../includes/session.php';
|
||||
@@ -6,63 +9,11 @@ require_once '../../includes/config.php';
|
||||
require_once '../../includes/authenticate.php';
|
||||
require_once '../../includes/functions.php';
|
||||
|
||||
$dhcpcdManager = new DhcpcdManager();
|
||||
|
||||
$interface = $_POST['iface'];
|
||||
|
||||
if (isset($interface)) {
|
||||
// fetch dnsmasq.conf settings for interface
|
||||
exec('cat '. escapeshellarg(RASPI_DNSMASQ_PREFIX.$interface.'.conf'), $return);
|
||||
$conf = ParseConfig($return);
|
||||
|
||||
$dhcpdata['DHCPEnabled'] = empty($conf) ? false : true;
|
||||
if (is_string($conf['dhcp-range'])) {
|
||||
$arrRange = explode(",", $conf['dhcp-range']);
|
||||
} else {
|
||||
$arrRange = explode(",", $conf['dhcp-range'][0]);
|
||||
}
|
||||
$dhcpdata['RangeStart'] = $arrRange[0] ?? null;
|
||||
$dhcpdata['RangeEnd'] = $arrRange[1] ?? null;
|
||||
$dhcpdata['RangeMask'] = $arrRange[2] ?? null;
|
||||
$dhcpdata['leaseTime'] = $arrRange[3] ?? null;
|
||||
$dhcpHost = $conf["dhcp-host"] ?? null;
|
||||
$dhcpHost = empty($dhcpHost) ? [] : $dhcpHost;
|
||||
$dhcpdata['dhcpHost'] = is_array($dhcpHost) ? $dhcpHost : [ $dhcpHost ];
|
||||
$upstreamServers = is_array($conf['server'] ?? null) ? $conf['server'] : [ $conf['server'] ?? '' ];
|
||||
$dhcpdata['upstreamServersEnabled'] = empty($conf['server']) ? false: true;
|
||||
$dhcpdata['upstreamServers'] = array_filter($upstreamServers);
|
||||
preg_match('/([0-9]*)([a-z])/i', $dhcpdata['leaseTime'], $arrRangeLeaseTime);
|
||||
$dhcpdata['leaseTime'] = $arrRangeLeaseTime[1];
|
||||
$dhcpdata['leaseTimeInterval'] = $arrRangeLeaseTime[2];
|
||||
if (isset($conf['dhcp-option'])) {
|
||||
$arrDns = explode(",", $conf['dhcp-option']);
|
||||
if ($arrDns[0] == '6') {
|
||||
if (count($arrDns) > 1) {
|
||||
$dhcpdata['DNS1'] = $arrDns[1] ?? null;
|
||||
}
|
||||
if (count($arrDns) > 2) {
|
||||
$dhcpdata['DNS2'] = $arrDns[2] ?? null;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// fetch dhcpcd.conf settings for interface
|
||||
$conf = file_get_contents(RASPI_DHCPCD_CONFIG);
|
||||
preg_match('/^#\sRaspAP\s'.$interface.'\s.*?(?=\s*+$)/ms', $conf, $matched);
|
||||
preg_match('/metric\s(\d*)/', $matched[0], $metric);
|
||||
preg_match('/static\sip_address=(.*)/', $matched[0], $static_ip);
|
||||
preg_match('/static\srouters=(.*)/', $matched[0], $static_routers);
|
||||
preg_match('/static\sdomain_name_server=(.*)/', $matched[0], $static_dns);
|
||||
preg_match('/fallback\sstatic_'.$interface.'/', $matched[0], $fallback);
|
||||
preg_match('/(?:no)?gateway/', $matched[0], $gateway);
|
||||
preg_match('/nohook\swpa_supplicant/', $matched[0], $nohook_wpa_supplicant);
|
||||
$dhcpdata['Metric'] = $metric[1] ?? null;
|
||||
$dhcpdata['StaticIP'] = isset($static_ip[1]) && strpos($static_ip[1], '/') !== false
|
||||
? substr($static_ip[1], 0, strpos($static_ip[1], '/'))
|
||||
: ($static_ip[1] ?? '');
|
||||
$dhcpdata['SubnetMask'] = cidr2mask($static_ip[1] ?? '');
|
||||
$dhcpdata['StaticRouters'] = $static_routers[1] ?? null;
|
||||
$dhcpdata['StaticDNS'] = $static_dns[1] ?? null;
|
||||
$dhcpdata['FallbackEnabled'] = empty($fallback) ? false: true;
|
||||
$dhcpdata['DefaultRoute'] = $gateway[0] == "gateway";
|
||||
$dhcpdata['NoHookWPASupplicant'] = ($nohook_wpa_supplicant[0] ?? '') == "nohook wpa_supplicant";
|
||||
$dhcpdata = $dhcpcdManager->getInterfaceConfig($interface);
|
||||
echo json_encode($dhcpdata);
|
||||
}
|
||||
|
||||
@@ -5,7 +5,7 @@ require_once '../../includes/session.php';
|
||||
require_once '../../includes/config.php';
|
||||
require_once '../../includes/authenticate.php';
|
||||
|
||||
$entity = escapeshellcmd($_POST['entity']);
|
||||
$entity = escapeshellarg($_POST['entity']);
|
||||
|
||||
if (isset($entity)) {
|
||||
|
||||
|
||||
@@ -6,17 +6,21 @@ require_once '../../includes/config.php';
|
||||
require_once '../../includes/authenticate.php';
|
||||
require_once '../../includes/defaults.php';
|
||||
require_once '../../includes/functions.php';
|
||||
require_once '../../includes/wifi_functions.php';
|
||||
|
||||
use RaspAP\Networking\Hotspot\WiFiManager;
|
||||
|
||||
$wifi = new WiFiManager();
|
||||
|
||||
$networks = [];
|
||||
$network = null;
|
||||
$ssid = null;
|
||||
|
||||
knownWifiStations($networks);
|
||||
nearbyWifiStations($networks, !isset($_REQUEST["refresh"]));
|
||||
connectedWifiStations($networks);
|
||||
sortNetworksByRSSI($networks);
|
||||
foreach ($networks as $ssid => $network) $networks[$ssid]["ssidutf8"] = ssid2utf8( $ssid );
|
||||
$wifi->knownWifiStations($networks);
|
||||
$wifi->nearbyWifiStations($networks, !isset($_REQUEST["refresh"]));
|
||||
$wifi->connectedWifiStations($networks);
|
||||
$wifi->sortNetworksByRSSI($networks);
|
||||
|
||||
foreach ($networks as $ssid => $network) $networks[$ssid]["ssidutf8"] = $wifi->ssid2utf8( $ssid );
|
||||
|
||||
$connected = array_filter($networks, function($n) { return $n['connected']; } );
|
||||
$known = array_filter($networks, function($n) { return !$n['connected'] && $n['configured']; } );
|
||||
|
||||
@@ -48,8 +48,15 @@ th {
|
||||
}
|
||||
|
||||
.navbar-logo {
|
||||
margin-top: 0.5em;
|
||||
margin-left: 0.5em;
|
||||
margin-top: 0.2em;
|
||||
margin-left: 0.7em;
|
||||
}
|
||||
|
||||
.login-logo {
|
||||
width: 70px;
|
||||
height: 70px;
|
||||
margin-left: 1.2rem;
|
||||
margin-bottom: -0.5rem;
|
||||
}
|
||||
|
||||
.page-header {
|
||||
@@ -130,7 +137,7 @@ th {
|
||||
|
||||
.loading-spinner::before {
|
||||
position: absolute;
|
||||
top: 0;
|
||||
top: 120px;
|
||||
left: 0;
|
||||
width: 100%;
|
||||
height: calc(100vh / 4);
|
||||
@@ -138,10 +145,10 @@ th {
|
||||
justify-content: center;
|
||||
align-items: center;
|
||||
color: var(--raspap-text-muted);
|
||||
content: "\f1ce"; /* Unicode for the circle-notch icon */
|
||||
content: "\f1ce";
|
||||
font-family: "Font Awesome 5 Free";
|
||||
font-weight: 900; /* Adjust as needed */
|
||||
font-size: 54px; /* Adjust icon size as needed */
|
||||
font-weight: 900;
|
||||
font-size: 54px;
|
||||
animation: spin 1.2s linear infinite;
|
||||
width: 100%;
|
||||
}
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
<?php
|
||||
require_once '../../includes/functions.php';
|
||||
$color = getColorOpt();
|
||||
$allCss = 'all.css';
|
||||
?>
|
||||
/*
|
||||
Theme Name: RaspAP default
|
||||
@@ -11,12 +12,12 @@ Description: Default theme for RaspAP
|
||||
License: GNU General Public License v3.0
|
||||
*/
|
||||
|
||||
@import url('all.css');
|
||||
@import url('<?= $allCss ?>?v=<?= filemtime($allCss); ?>');
|
||||
|
||||
:root {
|
||||
--raspap-theme-color: <?php echo $color; ?>;
|
||||
--raspap-theme-lighter: <?php echo lightenColor($color, 20); ?>;
|
||||
--raspap-theme-darker: <?php echo darkenColor($color, 20); ?>;
|
||||
--raspap-theme-color: <?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;
|
||||
--raspap-theme-lighter: <?php echo htmlspecialchars(lightenColor($color, 20), ENT_QUOTES, 'UTF-8'); ?>;
|
||||
--raspap-theme-darker: <?php echo htmlspecialchars(darkenColor($color, 20), ENT_QUOTES, 'UTF-8'); ?>;
|
||||
}
|
||||
|
||||
body {
|
||||
|
||||
@@ -8,78 +8,78 @@ $color = getColorOpt();
|
||||
viewBox="0 0 291.5 203.2" style="enable-background:new 0 0 291.5 203.2;" xml:space="preserve">
|
||||
<style type="text/css">
|
||||
.st0{clip-path:url(#SVGID_2_);}
|
||||
.st1{clip-path:url(#SVGID_4_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st2{clip-path:url(#SVGID_6_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st3{clip-path:url(#SVGID_8_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st4{clip-path:url(#SVGID_10_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st5{clip-path:url(#SVGID_12_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st6{clip-path:url(#SVGID_14_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st7{clip-path:url(#SVGID_16_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st8{clip-path:url(#SVGID_18_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st9{clip-path:url(#SVGID_20_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st10{clip-path:url(#SVGID_22_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st11{clip-path:url(#SVGID_24_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st12{clip-path:url(#SVGID_26_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st13{clip-path:url(#SVGID_28_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st14{clip-path:url(#SVGID_30_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st15{clip-path:url(#SVGID_32_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st16{clip-path:url(#SVGID_34_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st17{clip-path:url(#SVGID_36_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st1{clip-path:url(#SVGID_4_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st2{clip-path:url(#SVGID_6_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st3{clip-path:url(#SVGID_8_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st4{clip-path:url(#SVGID_10_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st5{clip-path:url(#SVGID_12_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st6{clip-path:url(#SVGID_14_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st7{clip-path:url(#SVGID_16_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st8{clip-path:url(#SVGID_18_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st9{clip-path:url(#SVGID_20_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st10{clip-path:url(#SVGID_22_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st11{clip-path:url(#SVGID_24_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st12{clip-path:url(#SVGID_26_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st13{clip-path:url(#SVGID_28_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st14{clip-path:url(#SVGID_30_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st15{clip-path:url(#SVGID_32_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st16{clip-path:url(#SVGID_34_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st17{clip-path:url(#SVGID_36_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st18{clip-path:url(#SVGID_38_);}
|
||||
.st19{clip-path:url(#SVGID_40_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st20{clip-path:url(#SVGID_42_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st21{clip-path:url(#SVGID_44_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st22{clip-path:url(#SVGID_46_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st23{clip-path:url(#SVGID_48_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st24{clip-path:url(#SVGID_50_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st25{clip-path:url(#SVGID_52_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st26{clip-path:url(#SVGID_54_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st27{clip-path:url(#SVGID_56_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st28{clip-path:url(#SVGID_58_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st29{clip-path:url(#SVGID_60_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st30{clip-path:url(#SVGID_62_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st31{clip-path:url(#SVGID_64_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st32{clip-path:url(#SVGID_66_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st33{clip-path:url(#SVGID_68_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st34{clip-path:url(#SVGID_70_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st35{clip-path:url(#SVGID_72_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st36{clip-path:url(#SVGID_74_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st19{clip-path:url(#SVGID_40_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st20{clip-path:url(#SVGID_42_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st21{clip-path:url(#SVGID_44_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st22{clip-path:url(#SVGID_46_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st23{clip-path:url(#SVGID_48_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st24{clip-path:url(#SVGID_50_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st25{clip-path:url(#SVGID_52_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st26{clip-path:url(#SVGID_54_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st27{clip-path:url(#SVGID_56_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st28{clip-path:url(#SVGID_58_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st29{clip-path:url(#SVGID_60_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st30{clip-path:url(#SVGID_62_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st31{clip-path:url(#SVGID_64_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st32{clip-path:url(#SVGID_66_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st33{clip-path:url(#SVGID_68_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st34{clip-path:url(#SVGID_70_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st35{clip-path:url(#SVGID_72_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st36{clip-path:url(#SVGID_74_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st37{clip-path:url(#SVGID_76_);}
|
||||
.st38{clip-path:url(#SVGID_78_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st39{clip-path:url(#SVGID_80_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st40{clip-path:url(#SVGID_82_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st41{clip-path:url(#SVGID_84_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st42{clip-path:url(#SVGID_86_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st43{clip-path:url(#SVGID_88_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st44{clip-path:url(#SVGID_90_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st45{clip-path:url(#SVGID_92_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st46{clip-path:url(#SVGID_94_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st47{clip-path:url(#SVGID_96_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st48{clip-path:url(#SVGID_98_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st49{clip-path:url(#SVGID_100_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st50{clip-path:url(#SVGID_102_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st51{clip-path:url(#SVGID_104_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st52{clip-path:url(#SVGID_106_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st53{clip-path:url(#SVGID_108_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st54{clip-path:url(#SVGID_110_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st55{clip-path:url(#SVGID_112_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st56{clip-path:url(#SVGID_114_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st57{clip-path:url(#SVGID_116_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st58{clip-path:url(#SVGID_118_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st59{clip-path:url(#SVGID_120_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st60{clip-path:url(#SVGID_122_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st61{clip-path:url(#SVGID_124_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st62{clip-path:url(#SVGID_126_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st63{clip-path:url(#SVGID_128_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st64{clip-path:url(#SVGID_130_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st65{clip-path:url(#SVGID_132_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st66{clip-path:url(#SVGID_134_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st67{clip-path:url(#SVGID_136_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st68{clip-path:url(#SVGID_138_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st69{clip-path:url(#SVGID_140_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st70{clip-path:url(#SVGID_142_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st71{clip-path:url(#SVGID_144_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st72{clip-path:url(#SVGID_146_);fill:none;stroke:<?php echo $color; ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st38{clip-path:url(#SVGID_78_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st39{clip-path:url(#SVGID_80_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st40{clip-path:url(#SVGID_82_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st41{clip-path:url(#SVGID_84_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st42{clip-path:url(#SVGID_86_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st43{clip-path:url(#SVGID_88_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st44{clip-path:url(#SVGID_90_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st45{clip-path:url(#SVGID_92_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st46{clip-path:url(#SVGID_94_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st47{clip-path:url(#SVGID_96_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st48{clip-path:url(#SVGID_98_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st49{clip-path:url(#SVGID_100_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st50{clip-path:url(#SVGID_102_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st51{clip-path:url(#SVGID_104_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st52{clip-path:url(#SVGID_106_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st53{clip-path:url(#SVGID_108_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st54{clip-path:url(#SVGID_110_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st55{clip-path:url(#SVGID_112_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st56{clip-path:url(#SVGID_114_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st57{clip-path:url(#SVGID_116_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st58{clip-path:url(#SVGID_118_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st59{clip-path:url(#SVGID_120_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st60{clip-path:url(#SVGID_122_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st61{clip-path:url(#SVGID_124_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st62{clip-path:url(#SVGID_126_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st63{clip-path:url(#SVGID_128_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st64{clip-path:url(#SVGID_130_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st65{clip-path:url(#SVGID_132_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st66{clip-path:url(#SVGID_134_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st67{clip-path:url(#SVGID_136_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st68{clip-path:url(#SVGID_138_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st69{clip-path:url(#SVGID_140_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st70{clip-path:url(#SVGID_142_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st71{clip-path:url(#SVGID_144_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
.st72{clip-path:url(#SVGID_146_);fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.75;stroke-miterlimit:10;}
|
||||
</style>
|
||||
<g>
|
||||
<g>
|
||||
|
||||
@@ -7,9 +7,9 @@ $color = getColorOpt();
|
||||
viewBox="0 0 431 321" style="enable-background:new 0 0 431 321;" xml:space="preserve">
|
||||
<style type="text/css">
|
||||
.st0{fill:none;enable-background:new;}
|
||||
.st1{fill:none;stroke:<?php echo $color; ?>;stroke-width:0.9453;stroke-linecap:round;stroke-linejoin:round;stroke-miterlimit:13.3333;}
|
||||
.st1{fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.9453;stroke-linecap:round;stroke-linejoin:round;stroke-miterlimit:13.3333;}
|
||||
|
||||
.st2{fill:none;stroke:<?php echo $color; ?>;stroke-width:0.9453;stroke-linecap:round;stroke-linejoin:round;stroke-miterlimit:13.3333;enable-background:new ;}
|
||||
.st2{fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.9453;stroke-linecap:round;stroke-linejoin:round;stroke-miterlimit:13.3333;enable-background:new ;}
|
||||
</style>
|
||||
<path class="st0" d="M0,0"/>
|
||||
<g id="g20028">
|
||||
|
||||
@@ -7,7 +7,7 @@ $color = getColorOpt();
|
||||
<svg version="1.1" id="Zero_BLANK" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px"
|
||||
viewBox="0 0 218.03 144.11" style="enable-background:new 0 0 218.03 144.11;" xml:space="preserve">
|
||||
<style type="text/css">
|
||||
.st0{fill:none;stroke:<?php echo $color; ?>;stroke-width:0.5;stroke-linecap:round;stroke-linejoin:round;stroke-miterlimit:10;}
|
||||
.st0{fill:none;stroke:<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>;stroke-width:0.5;stroke-linecap:round;stroke-linejoin:round;stroke-miterlimit:10;}
|
||||
</style>
|
||||
<g id="LINE_1238_">
|
||||
<line class="st0" x1="96.57" y1="105.12" x2="97.06" y2="105.29"/>
|
||||
|
||||
@@ -1,7 +1,10 @@
|
||||
<?php header("Content-Type: image/svg+xml; charset=utf-8"); ?>
|
||||
<?php
|
||||
require_once '../../includes/config.php';
|
||||
require_once '../../includes/functions.php';
|
||||
$color = getColorOpt();
|
||||
$static = (isset($_GET['static']) && $_GET['static'] == '1') ||
|
||||
(defined('RASPI_UI_STATIC_LOGO') && RASPI_UI_STATIC_LOGO === true);
|
||||
?>
|
||||
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
||||
<svg
|
||||
@@ -10,42 +13,41 @@ $color = getColorOpt();
|
||||
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
|
||||
xmlns:svg="http://www.w3.org/2000/svg"
|
||||
xmlns="http://www.w3.org/2000/svg"
|
||||
viewBox="0 0 490.66666 487.11066"
|
||||
height="487.11066"
|
||||
width="490.66666"
|
||||
viewBox="0 180 352 290"
|
||||
xml:space="preserve"
|
||||
id="svg2"
|
||||
version="1.1"><metadata
|
||||
id="metadata8"><rdf:RDF><cc:Work
|
||||
rdf:about=""><dc:format>image/svg+xml</dc:format><dc:type
|
||||
rdf:resource="http://purl.org/dc/dcmitype/StillImage" /></cc:Work></rdf:RDF></metadata><defs
|
||||
id="defs6"><clipPath
|
||||
id="clipPath18"
|
||||
clipPathUnits="userSpaceOnUse"><path
|
||||
id="path16"
|
||||
d="M 0,365.333 H 368 V 0 H 0 Z" /></clipPath></defs><g
|
||||
transform="matrix(1.3333333,0,0,-1.3333333,0,487.11067)"
|
||||
id="g10"><g
|
||||
id="g12"><g
|
||||
clip-path="url(#clipPath18)"
|
||||
id="g14"><g
|
||||
transform="translate(192.6768,123.4365)"
|
||||
id="g20"><path
|
||||
id="path22"
|
||||
style="fill:<?php echo $color; ?>;fill-opacity:1;fill-rule:nonzero;stroke:none"
|
||||
d="m 0,0 c 0,-37.169 -30.128,-67.3 -67.296,-67.3 -37.167,0 -67.294,30.131 -67.294,67.3 0,37.165 30.127,67.296 67.294,67.296 C -30.128,67.296 0,37.165 0,0" /></g><g
|
||||
transform="translate(125.3823,219.0791)"
|
||||
id="g24"><path
|
||||
id="path26"
|
||||
style="fill:<?php echo $color; ?>;fill-opacity:1;fill-rule:nonzero;stroke:none"
|
||||
d="m 0,0 c -52.737,0 -95.641,-42.905 -95.641,-95.643 0,-52.74 42.904,-95.647 95.641,-95.647 52.737,0 95.642,42.907 95.642,95.647 C 95.642,-42.905 52.737,0 0,0 m 0,-217.29 c -67.073,0 -121.641,54.571 -121.641,121.647 C -121.641,-28.569 -67.073,26 0,26 67.074,26 121.642,-28.569 121.642,-95.643 121.642,-162.719 67.074,-217.29 0,-217.29" /></g><g
|
||||
transform="translate(144.4277,271.9385)"
|
||||
id="g28"><path
|
||||
id="path30"
|
||||
style="fill:<?php echo $color; ?>;fill-opacity:1;fill-rule:nonzero;stroke:none"
|
||||
d="m 0,0 c 66.188,0 121.118,-49.055 130.392,-112.714 l 28.259,-1.874 C 150.044,-34.655 82.181,27.791 0,27.791 c -3.892,0 -7.75,-0.147 -11.571,-0.423 L -9.73,-0.397 C -6.513,-0.161 -3.275,0 0,0" /></g><g
|
||||
transform="translate(144.4883,334.7588)"
|
||||
id="g32"><path
|
||||
id="path34"
|
||||
style="fill:<?php echo $color; ?>;fill-opacity:1;fill-rule:nonzero;stroke:none"
|
||||
d="m 0,0 c 101.94,0 185.667,-79.438 192.56,-179.664 l 27.962,-1.857 C 214.513,-65.087 117.899,27.791 0,27.791 c -5.31,0 -10.576,-0.2 -15.792,-0.571 l 1.84,-27.728 C -9.343,-0.177 -4.691,0 0,0" /></g></g></g></g></svg>
|
||||
version="1.1">
|
||||
<style>
|
||||
<?php if (!$static): ?>
|
||||
.wave {
|
||||
opacity: 0.4;
|
||||
animation: pulse 1.8s infinite;
|
||||
}
|
||||
.wave1 { animation-delay: 0.3s; }
|
||||
.wave2 { animation-delay: 0.6s; }
|
||||
|
||||
@keyframes pulse {
|
||||
0% { opacity: 0.4; }
|
||||
20% { opacity: 1; }
|
||||
60% { opacity: 0.4; }
|
||||
100% { opacity: 0.4; }
|
||||
}
|
||||
<?php else: ?>
|
||||
.wave {
|
||||
opacity: 1.0;
|
||||
}
|
||||
<?php endif; ?>
|
||||
</style>
|
||||
|
||||
<!-- inner solid circle -->
|
||||
<circle cx="128" cy="384" r="60" fill="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>"/>
|
||||
|
||||
<!-- outer ring -->
|
||||
<circle cx="128" cy="384" r="100" fill="none" stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="25"/>
|
||||
|
||||
<!-- arcs -->
|
||||
<path class="wave wave1" d="M128 234 A 150 150 0 0 1 278 384" fill="none" stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="25"/>
|
||||
<path class="wave wave2" d="M128 184 A 200 200 0 0 1 328 384" fill="none" stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="25"/>
|
||||
|
||||
</svg>
|
||||
|
||||
|
||||
@@ -1,5 +1,8 @@
|
||||
<?php
|
||||
header("Content-Type: image/svg+xml");
|
||||
|
||||
require_once '../../includes/functions.php';
|
||||
$color = getColorOpt();
|
||||
$showDevice1 = isset($_GET['device-1']);
|
||||
$showOut = isset($_GET['out']);
|
||||
$showDevice2 = isset($_GET['device-2']);
|
||||
@@ -12,33 +15,33 @@ $showDevice2 = isset($_GET['device-2']);
|
||||
<?php if ($showDevice2): ?>
|
||||
<line id="joint-device-2" y1="-0.75" x2="154" y2="-0.75"
|
||||
transform="matrix(4.37114e-08 1 1 -4.37114e-08 114 297)"
|
||||
stroke="#008281" stroke-width="4"/>
|
||||
stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="4"/>
|
||||
<?php endif; ?>
|
||||
|
||||
<?php if ($showDevice1): ?>
|
||||
<line id="joint-device-1" style="display: inline;"
|
||||
y1="-0.75" x2="154" y2="-0.75"
|
||||
transform="matrix(4.37114e-08 1 1 -4.37114e-08 114 144)"
|
||||
stroke="#008281" stroke-width="4"/>
|
||||
stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="4"/>
|
||||
|
||||
<line id="device-1" style="display: inline;"
|
||||
y1="-0.75" x2="113.231" y2="-0.75"
|
||||
transform="matrix(1 8.74228e-08 8.74228e-08 -1 114 144)"
|
||||
stroke="#008281" stroke-width="4"/>
|
||||
stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="4"/>
|
||||
<?php endif; ?>
|
||||
|
||||
<?php if ($showOut): ?>
|
||||
<line id="out" style="display: inline;"
|
||||
y1="-0.75" x2="113.231" y2="-0.75"
|
||||
transform="matrix(1 8.74228e-08 8.74228e-08 -1 -0.000305176 297)"
|
||||
stroke="#008281" stroke-width="4"/>
|
||||
stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="4"/>
|
||||
<?php endif; ?>
|
||||
|
||||
<?php if ($showDevice2): ?>
|
||||
<line id="device-2" style="display: inline;"
|
||||
y1="-0.75" x2="113.231" y2="-0.75"
|
||||
transform="matrix(1 8.74228e-08 8.74228e-08 -1 113 450)"
|
||||
stroke="#008281" stroke-width="4"/>
|
||||
stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="4"/>
|
||||
<?php endif; ?>
|
||||
</g>
|
||||
</g>
|
||||
|
||||
@@ -42,24 +42,24 @@ if ($showJoint) {
|
||||
for ($i = 1; $i < count($activeYs); $i++) {
|
||||
$y1 = $activeYs[$i-1];
|
||||
$y2 = $activeYs[$i];
|
||||
echo "<line x1='112.75' y1='$y1' x2='112.75' y2='$y2' stroke='$color' stroke-width='4'/>";
|
||||
echo "<line x1='112.75' y1='$y1' x2='112.75' y2='$y2' stroke='" . htmlspecialchars($color, ENT_QUOTES, 'UTF-8') . "' stroke-width='4'/>";
|
||||
}
|
||||
}
|
||||
?>
|
||||
|
||||
<?php if ($showDevice1): ?>
|
||||
<line x1="113.231" y1="0.75" x2="7.69496e-06" y2="0.75001" stroke="<?php echo $color; ?>" stroke-width="6" id="device-1"/>
|
||||
<line x1="113.231" y1="0.75" x2="7.69496e-06" y2="0.75001" stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="6" id="device-1"/>
|
||||
<?php endif; ?>
|
||||
<?php if ($showOut): ?>
|
||||
<line x1="226.231" y1="297.75" x2="113" y2="297.75" stroke="<?php echo $color; ?>" stroke-width="4" id="out"/>
|
||||
<line x1="226.231" y1="297.75" x2="113" y2="297.75" stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="4" id="out"/>
|
||||
<?php endif; ?>
|
||||
<?php if ($showDevice2): ?>
|
||||
<line x1="113.231" y1="198.75" x2="7.69496e-06" y2="198.75" stroke="<?php echo $color; ?>" stroke-width="4" id="device-2"/>
|
||||
<line x1="113.231" y1="198.75" x2="7.69496e-06" y2="198.75" stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="4" id="device-2"/>
|
||||
<?php endif; ?>
|
||||
<?php if ($showDevice3): ?>
|
||||
<line x1="113.231" y1="397.058" x2="7.69496e-06" y2="397.058" stroke="<?php echo $color; ?>" stroke-width="4" id="device-3"/>
|
||||
<line x1="113.231" y1="397.058" x2="7.69496e-06" y2="397.058" stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="4" id="device-3"/>
|
||||
<?php endif; ?>
|
||||
<?php if ($showDevice4): ?>
|
||||
<line x1="113.231" y1="595.211" x2="7.69496e-06" y2="595.211" stroke="<?php echo $color; ?>" stroke-width="4" id="device-4"/>
|
||||
<line x1="113.231" y1="595.211" x2="7.69496e-06" y2="595.211" stroke="<?php echo htmlspecialchars($color, ENT_QUOTES, 'UTF-8'); ?>" stroke-width="4" id="device-4"/>
|
||||
<?php endif; ?>
|
||||
</svg>
|
||||
|
||||
@@ -12,6 +12,12 @@ if (!isset($_SERVER['HTTP_REFERER'])) {
|
||||
|
||||
$hostapd = parse_ini_file(RASPI_HOSTAPD_CONFIG, false, INI_SCANNER_RAW);
|
||||
|
||||
// handle parse failure
|
||||
if ($hostapd === false) {
|
||||
header('HTTP/1.0 500 Internal Server Error');
|
||||
exit('Error: Unable to parse hostapd configuration');
|
||||
}
|
||||
|
||||
// assume WPA encryption and get the passphrase
|
||||
$type = "WPA";
|
||||
$password = isset($hostapd['wpa_psk']) ? $hostapd['wpa_psk'] : $hostapd['wpa_passphrase'];
|
||||
|
||||
558
app/js/ajax/main.js
Normal file
558
app/js/ajax/main.js
Normal file
@@ -0,0 +1,558 @@
|
||||
|
||||
function loadSummary(strInterface) {
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
$.post('ajax/networking/get_ip_summary.php',{'interface': strInterface, 'csrf_token': csrfToken},function(data){
|
||||
jsonData = JSON.parse(data);
|
||||
if(jsonData['return'] == 0) {
|
||||
$('#'+strInterface+'-summary').html(jsonData['output'].join('<br />'));
|
||||
} else if(jsonData['return'] == 2) {
|
||||
$('#'+strInterface+'-summary').append('<div class="alert alert-danger alert-dismissible" role="alert"><button type="button" class="btn-close" data-bs-dismiss="alert" aria-label="Close"></button>'+jsonData['output'].join('<br />')+'</div>');
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
function getAllInterfaces() {
|
||||
$.get('ajax/networking/get_all_interfaces.php',function(data){
|
||||
jsonData = JSON.parse(data);
|
||||
$.each(jsonData,function(ind,value){
|
||||
loadSummary(value)
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
$(document).on("click", "#js-clearhostapd-log", function(e) {
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
$.post('ajax/logging/clearlog.php?',{'logfile':'/tmp/hostapd.log', 'csrf_token': csrfToken},function(data){
|
||||
jsonData = JSON.parse(data);
|
||||
$("#hostapd-log").val("");
|
||||
});
|
||||
});
|
||||
|
||||
$(document).on("click", "#js-cleardnsmasq-log", function(e) {
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
$.post('ajax/logging/clearlog.php?',{'logfile':'/var/log/dnsmasq.log', 'csrf_token': csrfToken},function(data){
|
||||
jsonData = JSON.parse(data);
|
||||
$("#dnsmasq-log").val("");
|
||||
});
|
||||
});
|
||||
|
||||
$(document).on("click", "#js-clearopenvpn-log", function(e) {
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
$.post('ajax/logging/clearlog.php?',{'logfile':'/tmp/openvpn.log', 'csrf_token': csrfToken},function(data){
|
||||
jsonData = JSON.parse(data);
|
||||
$("#openvpn-log").val("");
|
||||
});
|
||||
});
|
||||
|
||||
function loadWifiStations(refresh) {
|
||||
return function() {
|
||||
var complete = function() { $(this).removeClass('loading-spinner'); }
|
||||
var qs = refresh === true ? '?refresh' : '';
|
||||
$('.js-wifi-stations')
|
||||
.addClass('loading-spinner')
|
||||
.empty()
|
||||
.load('ajax/networking/wifi_stations.php'+qs, complete);
|
||||
};
|
||||
}
|
||||
$(".js-reload-wifi-stations").on("click", loadWifiStations(true));
|
||||
|
||||
/*
|
||||
Populates the DHCP server form fields
|
||||
Option toggles are set dynamically depending on the loaded configuration
|
||||
*/
|
||||
function loadInterfaceDHCPSelect() {
|
||||
var strInterface = $('#cbxdhcpiface').val();
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
$.post('ajax/networking/get_netcfg.php', {'iface' : strInterface, 'csrf_token': csrfToken}, function(data){
|
||||
jsonData = JSON.parse(data);
|
||||
$('#dhcp-iface')[0].checked = jsonData.DHCPEnabled;
|
||||
$('#txtipaddress').val(jsonData.StaticIP);
|
||||
$('#txtsubnetmask').val(jsonData.SubnetMask);
|
||||
$('#txtgateway').val(jsonData.StaticRouters);
|
||||
$('#chkfallback')[0].checked = jsonData.FallbackEnabled;
|
||||
$('#default-route').prop('checked', jsonData.DefaultRoute);
|
||||
if (strInterface.startsWith("wl")) {
|
||||
$('#nohook-wpa-supplicant').parent().parent().parent().show()
|
||||
$('#nohook-wpa-supplicant').prop('checked', jsonData.NoHookWPASupplicant);
|
||||
} else {
|
||||
$('#nohook-wpa-supplicant').parent().parent().parent().hide()
|
||||
}
|
||||
$('#txtrangestart').val(jsonData.RangeStart);
|
||||
$('#txtrangeend').val(jsonData.RangeEnd);
|
||||
$('#txtrangeleasetime').val(jsonData.leaseTime);
|
||||
$('#txtdns1').val(jsonData.DNS1);
|
||||
$('#txtdns2').val(jsonData.DNS2);
|
||||
$('#cbxrangeleasetimeunits').val(jsonData.leaseTimeInterval);
|
||||
$('#no-resolv')[0].checked = jsonData.upstreamServersEnabled;
|
||||
$('#cbxdhcpupstreamserver').val(jsonData.upstreamServers[0]);
|
||||
$('#txtmetric').val(jsonData.Metric);
|
||||
|
||||
if (jsonData.StaticIP !== null && jsonData.StaticIP !== '' && !jsonData.FallbackEnabled) {
|
||||
$('#chkstatic').prop('checked', true).closest('.btn').addClass('active');
|
||||
$('#chkdhcp').prop('checked', false).closest('.btn').removeClass('active');
|
||||
$('#chkfallback').prop('disabled', true);
|
||||
$('#dhcp-iface').removeAttr('disabled');
|
||||
} else {
|
||||
$('#chkdhcp').closest('.btn').addClass('active');
|
||||
$('#chkdhcp').closest('.btn').blur();
|
||||
}
|
||||
if (jsonData.FallbackEnabled || $('#chkdhcp').is(':checked')) {
|
||||
$('#dhcp-iface').prop('disabled', true);
|
||||
setDhcpFieldsDisabled();
|
||||
}
|
||||
|
||||
const leaseContainer = $('.js-dhcp-static-lease-container');
|
||||
leaseContainer.empty();
|
||||
|
||||
if (jsonData.dhcpHost && jsonData.dhcpHost.length > 0) {
|
||||
const leases = jsonData.dhcpHost || [];
|
||||
leases.forEach((entry, index) => {
|
||||
const [mainPart, commentPart] = entry.split('#');
|
||||
const comment = commentPart ? commentPart.trim() : '';
|
||||
const [mac, ip] = mainPart.split(',').map(part => part.trim());
|
||||
const row = `
|
||||
<div class="row dhcp-static-lease-row js-dhcp-static-lease-row">
|
||||
<div class="col-md-4 col-xs-3">
|
||||
<input type="text" name="static_leases[mac][]" value="${mac}" placeholder="MAC address" class="form-control">
|
||||
</div>
|
||||
<div class="col-md-3 col-xs-3">
|
||||
<input type="text" name="static_leases[ip][]" value="${ip}" placeholder="IP address" class="form-control">
|
||||
</div>
|
||||
<div class="col-md-3 col-xs-3">
|
||||
<input type="text" name="static_leases[comment][]" value="${comment || ''}" placeholder="Optional comment" class="form-control">
|
||||
</div>
|
||||
<div class="col-md-2 col-xs-3">
|
||||
<button type="button" class="btn btn-outline-danger js-remove-dhcp-static-lease"><i class="far fa-trash-alt"></i></button>
|
||||
</div>
|
||||
</div>`;
|
||||
leaseContainer.append(row);
|
||||
});
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
$('#debugModal').on('shown.bs.modal', function (e) {
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
$.post('ajax/system/sys_debug.php',{'csrf_token': csrfToken},function(data){
|
||||
window.location.replace('/ajax/system/sys_get_logfile.php');
|
||||
$('#debugModal').modal('hide');
|
||||
});
|
||||
});
|
||||
|
||||
$('#chkupdateModal').on('shown.bs.modal', function (e) {
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
$.post('ajax/system/sys_chk_update.php',{'csrf_token': csrfToken},function(data){
|
||||
var response = JSON.parse(data);
|
||||
var tag = response.tag;
|
||||
var update = response.update;
|
||||
var msg;
|
||||
var msgUpdate = $('#msgUpdate').data('message');
|
||||
var msgLatest = $('#msgLatest').data('message');
|
||||
var msgInstall = $('#msgInstall').data('message');
|
||||
var msgDismiss = $('#js-check-dismiss').data('message');
|
||||
var faCheck = '<i class="fas fa-check ms-2"></i><br />';
|
||||
$("#updateSync").removeClass("fa-spin");
|
||||
if (update === true) {
|
||||
msg = msgUpdate +' '+tag;
|
||||
$("#msg-check-update").html(msg);
|
||||
$("#msg-check-update").append(faCheck);
|
||||
$("#msg-check-update").append("<p>"+msgInstall+"</p>");
|
||||
$("#js-sys-check-update").removeClass("collapse");
|
||||
} else {
|
||||
msg = msgLatest;
|
||||
dismiss = $("#js-check-dismiss");
|
||||
$("#msg-check-update").html(msg);
|
||||
$("#msg-check-update").append(faCheck);
|
||||
$("#js-sys-check-update").remove();
|
||||
dismiss.text(msgDismiss);
|
||||
dismiss.removeClass("btn-outline-secondary");
|
||||
dismiss.addClass("btn-primary");
|
||||
}
|
||||
});
|
||||
});
|
||||
|
||||
$('#performUpdate').on('submit', function(event) {
|
||||
event.preventDefault();
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
$.post('ajax/system/sys_perform_update.php',{
|
||||
'csrf_token': csrfToken
|
||||
})
|
||||
$('#chkupdateModal').modal('hide');
|
||||
$('#performupdateModal').modal('show');
|
||||
});
|
||||
|
||||
function fetchUpdateResponse() {
|
||||
const complete = 6;
|
||||
const error = 7;
|
||||
let phpFile = 'ajax/system/sys_read_logfile.php';
|
||||
|
||||
$.ajax({
|
||||
url: phpFile,
|
||||
type: 'GET',
|
||||
success: function(response) {
|
||||
for (let i = 1; i <= 6; i++) {
|
||||
let divId = '#updateStep' + i;
|
||||
if (response.includes(i.toString())) {
|
||||
$(divId).removeClass('invisible');
|
||||
}
|
||||
}
|
||||
// check if the update is complete or if there's an error
|
||||
if (response.includes(complete)) {
|
||||
var successMsg = $('#successMsg').data('message');
|
||||
$('#updateMsg').after('<span class="small">' + successMsg + '</span>');
|
||||
$('#updateMsg').addClass('fa-check');
|
||||
$('#updateMsg').removeClass('invisible');
|
||||
$('#updateStep6').removeClass('invisible');
|
||||
$('#updateSync2').removeClass("fa-spin");
|
||||
$('#updateOk').removeAttr('disabled');
|
||||
} else if (response.includes(error)) {
|
||||
var errorMsg = $('#errorMsg').data('message');
|
||||
$('#updateMsg').after('<span class="small">' + errorMsg + '</span>');
|
||||
$('#updateMsg').addClass('fa-times');
|
||||
$('#updateMsg').removeClass('invisible');
|
||||
$('#updateSync2').removeClass("fa-spin");
|
||||
$('#updateOk').removeAttr('disabled');
|
||||
} else {
|
||||
setTimeout(fetchUpdateResponse, 500);
|
||||
}
|
||||
},
|
||||
error: function(xhr, status, error) {
|
||||
console.error("AJAX Error:", error);
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
$('#ovpn-confirm-delete').on('click', '.btn-delete', function (e) {
|
||||
var cfg_id = $(this).data('recordId');
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
$.post('ajax/openvpn/del_ovpncfg.php',{'cfg_id':cfg_id, 'csrf_token': csrfToken},function(data){
|
||||
jsonData = JSON.parse(data);
|
||||
$("#ovpn-confirm-delete").modal('hide');
|
||||
var row = $(document.getElementById("openvpn-client-row-" + cfg_id));
|
||||
row.fadeOut( "slow", function() {
|
||||
row.remove();
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
$('#ovpn-confirm-delete').on('show.bs.modal', function (e) {
|
||||
var data = $(e.relatedTarget).data();
|
||||
$('.btn-delete', this).data('recordId', data.recordId);
|
||||
});
|
||||
|
||||
$('#ovpn-confirm-activate').on('click', '.btn-activate', function (e) {
|
||||
var cfg_id = $(this).data('record-id');
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
$.post('ajax/openvpn/activate_ovpncfg.php',{'cfg_id':cfg_id, 'csrf_token': csrfToken},function(data){
|
||||
jsonData = JSON.parse(data);
|
||||
$("#ovpn-confirm-activate").modal('hide');
|
||||
setTimeout(function(){
|
||||
window.location.reload();
|
||||
},300);
|
||||
});
|
||||
});
|
||||
|
||||
$('#js-system-reset-confirm').on('click', function (e) {
|
||||
var progressText = $('#js-system-reset-confirm').attr('data-message');
|
||||
var successHtml = $('#system-reset-message').attr('data-message');
|
||||
var closeHtml = $('#js-system-reset-cancel').attr('data-message');
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
var progressHtml = $('<div>').text(progressText).html() + '<i class="fas fa-cog fa-spin ms-2"></i>';
|
||||
$('#system-reset-message').html(progressHtml);
|
||||
$.post('ajax/networking/do_sys_reset.php?',{'csrf_token':csrfToken},function(data){
|
||||
setTimeout(function(){
|
||||
jsonData = JSON.parse(data);
|
||||
if(jsonData['return'] == 0) {
|
||||
$('#system-reset-message').text(successHtml);
|
||||
} else {
|
||||
$('#system-reset-message').text('Error occured: '+ jsonData['return']);
|
||||
}
|
||||
$("#js-system-reset-confirm").hide();
|
||||
$("#js-system-reset-cancel").text(closeHtml);
|
||||
},750);
|
||||
});
|
||||
});
|
||||
|
||||
$('#js-sys-reboot, #js-sys-shutdown').on('click', function (e) {
|
||||
e.preventDefault();
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
var action = $(this).data('action');
|
||||
$.post('ajax/system/sys_actions.php?',{'a': action, 'csrf_token': csrfToken},function(data){
|
||||
var response = JSON.parse(data);
|
||||
});
|
||||
});
|
||||
|
||||
$('#js-install-plugin-confirm').on('click', function (e) {
|
||||
var button = $('#install-user-plugin').data('button');
|
||||
var manifestData = button.data('plugin-manifest');
|
||||
var installPath = manifestData.install_path;
|
||||
var pluginUri = manifestData.plugin_uri;
|
||||
var pluginVersion = manifestData.version;
|
||||
var pluginConfirm = $('#js-install-plugin-confirm').text();
|
||||
var progressText = $('#js-install-plugin-confirm').attr('data-message');
|
||||
var successHtml = $('#plugin-install-message').attr('data-message');
|
||||
var successText = $('<div>').text(successHtml).text();
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
|
||||
if (pluginConfirm === 'Install now') {
|
||||
$("#install-user-plugin").modal('hide');
|
||||
$("#install-plugin-progress").modal('show');
|
||||
$.post(
|
||||
'ajax/plugins/do_plugin_install.php',
|
||||
{
|
||||
'plugin_uri': pluginUri,
|
||||
'plugin_version': pluginVersion,
|
||||
'install_path': installPath,
|
||||
'csrf_token': csrfToken
|
||||
},
|
||||
function (data) {
|
||||
setTimeout(function () {
|
||||
response = JSON.parse(data);
|
||||
if (response === true) {
|
||||
$('#plugin-install-message').contents().first().text(successText);
|
||||
$('#plugin-install-message')
|
||||
.find('i')
|
||||
.removeClass('fas fa-cog fa-spin link-secondary')
|
||||
.addClass('fas fa-check');
|
||||
$('#js-install-plugin-ok').removeAttr("disabled");
|
||||
} else {
|
||||
const errorMessage = jsonData.error || 'An unknown error occurred.';
|
||||
var errorLog = '<textarea class="plugin-log text-secondary" readonly>' + errorMessage + '</textarea>';
|
||||
$('#plugin-install-message')
|
||||
.contents()
|
||||
.first()
|
||||
.replaceWith('An error occurred installing the plugin:');
|
||||
$('#plugin-install-message').append(errorLog);
|
||||
$('#plugin-install-message').find('i').removeClass('fas fa-cog fa-spin link-secondary');
|
||||
$('#js-install-plugin-ok').removeAttr("disabled");
|
||||
}
|
||||
}, 200);
|
||||
}
|
||||
).fail(function (xhr) {
|
||||
const jsonData = JSON.parse(xhr.responseText);
|
||||
const errorMessage = jsonData.error || 'An unknown error occurred.';
|
||||
$('#plugin-install-message')
|
||||
.contents()
|
||||
.first()
|
||||
.replaceWith('An error occurred installing the plugin:');
|
||||
var errorLog = '<textarea class="plugin-log text-secondary" readonly>' + errorMessage + '</textarea>';
|
||||
$('#plugin-install-message').append(errorLog);
|
||||
$('#plugin-install-message').find('i').removeClass('fas fa-cog fa-spin link-secondary');
|
||||
$('#js-install-plugin-ok').removeAttr("disabled");
|
||||
});
|
||||
} else if (pluginConfirm === 'Get Insiders') {
|
||||
window.open('https://docs.raspap.com/insiders/', '_blank');
|
||||
return;
|
||||
} else if (pluginConfirm === 'OK') {
|
||||
$("#install-user-plugin").modal('hide');
|
||||
}
|
||||
});
|
||||
|
||||
// Retrieves the 'channel' value specified in hostapd.conf
|
||||
function getChannel() {
|
||||
$.get('ajax/networking/get_channel.php',function(data){
|
||||
jsonData = JSON.parse(data);
|
||||
loadChannelSelect(jsonData);
|
||||
});
|
||||
}
|
||||
|
||||
/*
|
||||
Sets the wirelss channel select options based on frequencies reported by iw.
|
||||
|
||||
See: https://git.kernel.org/pub/scm/linux/kernel/git/sforshee/wireless-regdb.git
|
||||
Also: https://en.wikipedia.org/wiki/List_of_WLAN_channels
|
||||
*/
|
||||
function loadChannelSelect(selected) {
|
||||
var iface = $('#cbxinterface').val();
|
||||
var hwmodeText = '';
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
|
||||
// update hardware mode tooltip
|
||||
setHardwareModeTooltip();
|
||||
|
||||
$.post('ajax/networking/get_frequencies.php',{'interface': iface, 'csrf_token': csrfToken, 'selected': selected},function(response){
|
||||
var hw_mode = $('#cbxhwmode').val();
|
||||
var country_code = $('#cbxcountries').val();
|
||||
var channel_select = $('#cbxchannel');
|
||||
var btn_save = $('#btnSaveHostapd');
|
||||
var data = JSON.parse(response);
|
||||
var selectableChannels = [];
|
||||
|
||||
// Map selected hw_mode to available channels
|
||||
if (hw_mode === 'a') {
|
||||
selectableChannels = data.filter(item => item.MHz.toString().startsWith('5'));
|
||||
} else if (hw_mode === 'ac') {
|
||||
selectableChannels = data.filter(item => item.MHz.toString().startsWith('5'));
|
||||
} else if (hw_mode === 'ax') {
|
||||
selectableChannels = data.filter(item => item.MHz.toString().startsWith('5'));
|
||||
} else if (hw_mode === 'be') {
|
||||
selectableChannels = data.filter(item => item.MHz.toString().startsWith('5'));
|
||||
} else {
|
||||
// hw_mode 'b', 'g', or default to 2.4GHz
|
||||
selectableChannels = data.filter(item => item.MHz.toString().startsWith('24'));
|
||||
}
|
||||
|
||||
// If selected channel doeesn't exist in allowed channels, set default or null (unsupported)
|
||||
if (!selectableChannels.find(item => item.Channel === selected)) {
|
||||
if (selectableChannels.length === 0) {
|
||||
selectableChannels[0] = { Channel: null };
|
||||
} else {
|
||||
defaultChannel = selectableChannels[0].Channel;
|
||||
selected = defaultChannel
|
||||
}
|
||||
}
|
||||
|
||||
// Set channel select with available values
|
||||
channel_select.empty();
|
||||
if (selectableChannels[0].Channel === null) {
|
||||
channel_select.append($("<option></option>").attr("value", "").text("---"));
|
||||
channel_select.prop("disabled", true);
|
||||
btn_save.prop("disabled", true);
|
||||
} else {
|
||||
channel_select.prop("disabled", false);
|
||||
btn_save.prop("disabled", false);
|
||||
$.each(selectableChannels, function(key,value) {
|
||||
channel_select.append($("<option></option>").attr("value", value.Channel).text(value.Channel));
|
||||
});
|
||||
channel_select.val(selected);
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
/* Sets hardware mode tooltip text for selected interface
|
||||
* and calls loadChannelSelect()
|
||||
*/
|
||||
function setHardwareModeTooltip() {
|
||||
var iface = $('#cbxinterface').val();
|
||||
var hwmodeText = '';
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
// Explanatory text if 802.11ac is disabled
|
||||
if ($('#cbxhwmode').find('option[value="ac"]').prop('disabled') == true ) {
|
||||
var hwmodeText = $('#hwmode').attr('data-tooltip');
|
||||
}
|
||||
$.post('ajax/networking/get_nl80211_band.php?',{'interface': iface, 'csrf_token': csrfToken},function(data){
|
||||
var responseText = JSON.parse(data);
|
||||
$('#tiphwmode').attr('data-original-title', responseText + '\n' + hwmodeText );
|
||||
});
|
||||
}
|
||||
|
||||
/* Updates the selected blocklist
|
||||
* Request is passed to an ajax handler to download the associated list.
|
||||
* Interface elements are updated to indicate current progress, status.
|
||||
*/
|
||||
function updateBlocklist() {
|
||||
const opt = $('#cbxblocklist option:selected');
|
||||
const blocklist_id = opt.val();
|
||||
const csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
|
||||
if (blocklist_id === '') return;
|
||||
|
||||
const statusIcon = $('#cbxblocklist-status').find('i');
|
||||
const statusWrapper = $('#cbxblocklist-status');
|
||||
|
||||
statusIcon.removeClass('fa-check fa-exclamation-triangle').addClass('fa-cog fa-spin');
|
||||
statusWrapper.removeClass('check-hidden check-error check-updated').addClass('check-progress');
|
||||
|
||||
$.post('ajax/adblock/update_blocklist.php', {
|
||||
'blocklist_id': blocklist_id,
|
||||
'csrf_token': csrfToken
|
||||
}, function (data) {
|
||||
let jsonData;
|
||||
try {
|
||||
jsonData = JSON.parse(data);
|
||||
} catch (e) {
|
||||
showError("Unexpected server response.");
|
||||
return;
|
||||
}
|
||||
const resultCode = jsonData['return'];
|
||||
const output = jsonData['output']?.join('\n') || '';
|
||||
|
||||
switch (resultCode) {
|
||||
case 0:
|
||||
statusIcon.removeClass('fa-cog fa-spin').addClass('fa-check');
|
||||
statusWrapper.removeClass('check-progress').addClass('check-updated').delay(500).animate({ opacity: 1 }, 700);
|
||||
$('#blocklist-' + jsonData['list']).text("Just now");
|
||||
break;
|
||||
case 1:
|
||||
showError("Invalid blocklist.");
|
||||
break;
|
||||
case 2:
|
||||
showError("No blocklist provided.");
|
||||
break;
|
||||
case 3:
|
||||
showError("Could not parse blocklists.json.");
|
||||
break;
|
||||
case 4:
|
||||
showError("blocklists.json file not found.");
|
||||
break;
|
||||
case 5:
|
||||
showError("Update script not found.");
|
||||
break;
|
||||
default:
|
||||
showError("Unknown error occurred.");
|
||||
}
|
||||
}).fail(function (jqXHR, textStatus, errorThrown) {
|
||||
showError(`AJAX request failed: ${textStatus}`);
|
||||
});
|
||||
|
||||
function showError(message) {
|
||||
statusIcon.removeClass('fa-cog fa-spin').addClass('fa-exclamation-triangle');
|
||||
statusWrapper.removeClass('check-progress').addClass('check-error');
|
||||
alert("Blocklist update failed:\n\n" + message);
|
||||
}
|
||||
}
|
||||
|
||||
function clearBlocklistStatus() {
|
||||
$('#cbxblocklist-status').removeClass('check-updated').addClass('check-hidden');
|
||||
}
|
||||
|
||||
// Handler for the WireGuard generate key button
|
||||
$('.wg-keygen').click(function(){
|
||||
var parentGroup = $(this).closest('.input-group');
|
||||
var entity_pub = parentGroup.find('input[type="text"]');
|
||||
var updated = entity_pub.attr('name')+"-pubkey-status";
|
||||
var csrfToken = $('meta[name="csrf_token"]').attr('content');
|
||||
$.post('ajax/networking/get_wgkey.php',{'entity':entity_pub.attr('name'), 'csrf_token': csrfToken},function(data){
|
||||
var jsonData = JSON.parse(data);
|
||||
entity_pub.val(jsonData.pubkey);
|
||||
$('#' + updated).removeClass('check-hidden').addClass('check-updated').delay(500).animate({ opacity: 1 }, 700);
|
||||
});
|
||||
});
|
||||
|
||||
// Handler for wireguard client.conf download
|
||||
$('.wg-client-dl').click(function(){
|
||||
var req = new XMLHttpRequest();
|
||||
var url = 'ajax/networking/get_wgcfg.php';
|
||||
req.open('get', url, true);
|
||||
req.responseType = 'blob';
|
||||
req.setRequestHeader('Content-type', 'text/plain; charset=UTF-8');
|
||||
req.onreadystatechange = function (event) {
|
||||
if(req.readyState == 4 && req.status == 200) {
|
||||
var blob = req.response;
|
||||
var link=document.createElement('a');
|
||||
link.href=window.URL.createObjectURL(blob);
|
||||
link.download = 'client.conf';
|
||||
link.click();
|
||||
}
|
||||
}
|
||||
req.send();
|
||||
})
|
||||
|
||||
let sessionCheckInterval = setInterval(checkSession, 5000);
|
||||
|
||||
function checkSession() {
|
||||
// skip session check if on login page
|
||||
if (window.location.pathname === '/login') {
|
||||
return;
|
||||
}
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
$.post('ajax/session/do_check_session.php',{'csrf_token': csrfToken},function (data) {
|
||||
if (data.status === 'session_expired') {
|
||||
clearInterval(sessionCheckInterval);
|
||||
showSessionExpiredModal();
|
||||
}
|
||||
}).fail(function (jqXHR, status, err) {
|
||||
console.error("Error checking session status:", status, err);
|
||||
});
|
||||
}
|
||||
|
||||
7
app/js/bandwidthcharts.min.js
vendored
7
app/js/bandwidthcharts.min.js
vendored
@@ -1,7 +0,0 @@
|
||||
/*!
|
||||
* RaspAP - RaspAP WiFi Configuration Portal v1.6.1 (https://github.com/billz/raspap-webgui)
|
||||
* Copyright 2013-2019 RaspAP Developers
|
||||
* Licensed under MIT (https://github.com/raspap-webgui/raspap-webgui/blob/master/LICENSE)
|
||||
*/
|
||||
|
||||
!function(r,i){"use strict";function t(t){r("#divChartBandwidthhourly").empty(),r("#divChartBandwidthdaily").empty(),r("#divChartBandwidthmonthly").empty(),r("#divTableBandwidthhourly").empty(),r("#divTableBandwidthdaily").empty(),r("#divTableBandwidthmonthly").empty();var e=r("ul#tabbarBandwidth li.active a").attr("href").substr(1),a="ajax/bandwidth/get_bandwidth.php?";a+="inet=",a+=encodeURIComponent(r("#cbxInterface"+e+" option:selected").text()),a+="&tu=",a+=encodeURIComponent(e.substr(0,1));var d="mb";a+="&dsu="+encodeURIComponent(d);var n=function(t,e){return new Morris.Bar({element:t,xkey:"date",ykeys:["rx","tx"],labels:[i.receive+" "+e.toUpperCase(),i.send+" "+e.toUpperCase()]})}("divChartBandwidth"+e,d);!function(t,e){r("#"+t).append('<table id="tableBandwidth'+e+'" class="table table-responsive table-striped container-fluid"><thead><tr><th>date</th><th>rx</th><th>tx</th></tr></thead><tbody></tbody></table>')}("divTableBandwidth"+e,e);r.ajax({url:a,dataType:"json",beforeSend:function(){r("#divLoaderBandwidth"+e).removeClass("hidden")}}).done(function(t){r("#divLoaderBandwidth"+e).addClass("hidden"),n.setData(t),r("#tableBandwidth"+e).DataTable({searching:!1,paging:!1,data:t,order:[[0,"ASC"]],columns:[{data:"date"},{data:"rx",title:i.receive+" "+d.toUpperCase()},{data:"tx",title:i.send+" "+d.toUpperCase()}]})}).fail(function(t,e){window.console?console.error("server error"):alert("server error")})}r(document).ready(function(){r('#tabbarBandwidth a[data-toggle="tab"]').on("shown.bs.tab",t),r("#cbxInterfacehourly").on("change",t),r("#cbxInterfacedaily").on("change",t),r("#cbxInterfacemonthly").on("change",t),t()})}(jQuery,t);
|
||||
1064
app/js/custom.js
1064
app/js/custom.js
File diff suppressed because it is too large
Load Diff
7
app/js/custom.min.js
vendored
7
app/js/custom.min.js
vendored
@@ -1,7 +0,0 @@
|
||||
/*!
|
||||
* RaspAP - RaspAP WiFi Configuration Portal v1.6.1 (https://github.com/billz/raspap-webgui)
|
||||
* Copyright 2013-2019 RaspAP Developers
|
||||
* Licensed under MIT (https://github.com/raspap-webgui/raspap-webgui/blob/master/LICENSE)
|
||||
*/
|
||||
|
||||
function msgShow(t,a){if(0==t)var e="success";else if(2==t||1==t)e="danger";return'<div class="alert alert-'+e+' alert-dismissible" role="alert"><button type="button" class="close" data-dismiss="alert" aria-label="Close"><span aria-hidden="true">×</span></button>'+a+"</div>"}function createNetmaskAddr(t){var a=[];for(i=0;i<4;i++){var e=Math.min(t,8);a.push(256-Math.pow(2,8-e)),t-=e}return a.join(".")}function loadSummary(a){$.post("/ajax/networking/get_ip_summary.php",{interface:a},function(t){jsonData=JSON.parse(t),console.log(jsonData),0==jsonData.return?$("#"+a+"-summary").html(jsonData.output.join("<br />")):2==jsonData.return&&$("#"+a+"-summary").append('<div class="alert alert-danger alert-dismissible" role="alert"><button type="button" class="close" data-dismiss="alert" aria-label="Close"><span aria-hidden="true">×</span></button>'+jsonData.output.join("<br />")+"</div>")})}function getAllInterfaces(){$.get("/ajax/networking/get_all_interfaces.php",function(t){jsonData=JSON.parse(t),$.each(jsonData,function(t,a){loadSummary(a)})})}function setupTabs(){$('a[data-toggle="tab"]').on("shown.bs.tab",function(t){var a=$(t.target).attr("href");a.match("summary")||loadCurrentSettings(a.replace("#",""))})}function loadCurrentSettings(t){$.post("/ajax/networking/get_int_config.php",{interface:t},function(t){jsonData=JSON.parse(t),$.each(jsonData.output,function(t,a){var n=a.interface;$.each(a,function(t,a){switch(t){case"static":"true"==a?($("#"+n+"-static").click(),$("#"+n+"-nofailover").click()):$("#"+n+"-dhcp").click();break;case"failover":"true"===a?$("#"+n+"-failover").click():$("#"+n+"-nofailover").click();break;case"ip_address":var e=a.split("/");$("#"+n+"-ipaddress").val(e[0]),$("#"+n+"-netmask").val(createNetmaskAddr(e[1]));break;case"routers":$("#"+n+"-gateway").val(a);break;case"domain_name_server":svrsDNS=a.split(" "),$("#"+n+"-dnssvr").val(svrsDNS[0]),$("#"+n+"-dnssvralt").val(svrsDNS[1])}})})})}function saveNetworkSettings(t){var a=$("#frm-"+t).find(":input"),e={};$.each(a,function(t,a){"radio"==$(a).attr("type")?e[$(a).attr("id")]=$(a).prop("checked"):e[$(a).attr("id")]=$(a).val()}),e.interface=t,$.post("/ajax/networking/save_int_config.php",e,function(t){var a=JSON.parse(t);$("#msgNetworking").html(msgShow(a.return,a.output))})}function applyNetworkSettings(){$(this).data("int");arrFormData={generate:""},$.post("/ajax/networking/gen_int_config.php",arrFormData,function(t){console.log(t);var a=JSON.parse(t);$("#msgNetworking").html(msgShow(a.return,a.output))})}function setupBtns(){$("#btnSummaryRefresh").click(function(){getAllInterfaces()}),$(".intsave").click(function(){saveNetworkSettings($(this).data("int"))}),$(".intapply").click(function(){applyNetworkSettings()})}function setCSRFTokenHeader(t,a,e){var n=$("meta[name=csrf_token]").attr("content");/^(POST|PATCH|PUT|DELETE)$/i.test(e.type)&&a.setRequestHeader("X-CSRF-Token",n)}function contentLoaded(){switch(pageCurrent=window.location.href.split("?")[1].split("=")[1],pageCurrent=pageCurrent.replace("#",""),$("#side-menu").metisMenu(),pageCurrent){case"network_conf":getAllInterfaces(),setupTabs(),setupBtns()}}function loadWifiStations(a){return function(){var t=!0===a?"?refresh":"";$(".js-wifi-stations").addClass("loading-spinner").empty().load("/ajax/networking/wifi_stations.php"+t,function(){$(this).removeClass("loading-spinner")})}}$(document).on("click",".js-add-dhcp-static-lease",function(t){t.preventDefault();var a=$(".js-new-dhcp-static-lease"),e=$("input[name=mac]",a).val().trim(),n=$("input[name=ip]",a).val().trim();if(""!=e&&""!=n){var i=$("#js-dhcp-static-lease-row").html().replace("{{ mac }}",e).replace("{{ ip }}",n);$(".js-dhcp-static-lease-container").append(i),$("input[name=mac]",a).val(""),$("input[name=ip]",a).val("")}}),$(document).on("click",".js-remove-dhcp-static-lease",function(t){t.preventDefault(),$(this).parents(".js-dhcp-static-lease-row").remove()}),$(document).on("submit",".js-dhcp-settings-form",function(t){$(".js-add-dhcp-static-lease").trigger("click")}),$(".js-reload-wifi-stations").on("click",loadWifiStations(!0)),$(document).on("click",".js-toggle-password",function(t){var a=$(t.target),e=$(a.data("target"));e.is(":input")&&(t.preventDefault(),a.data("__toggle-with-initial")||a.data("__toggle-with-initial",a.text()),"password"===e.attr("type")?(a.text(a.data("toggle-with")),e.attr("type","text")):(a.text(a.data("__toggle-with-initial")),e.attr("type","password")))}),$(document).on("keyup",".js-validate-psk",function(t){var a=$(t.target),e=a.data("colors").split(","),n=$(a.data("target"));a.val().length<8||63<a.val().length?(a.css("backgroundColor",e[0]),n.attr("disabled",!0)):(a.css("backgroundColor",e[1]),n.attr("disabled",!1))}),$(document).ajaxSend(setCSRFTokenHeader).ready(contentLoaded).ready(loadWifiStations());
|
||||
@@ -1,88 +0,0 @@
|
||||
// Link quality gauge for ChartJS
|
||||
|
||||
// Support for dark theme
|
||||
theme = getCookie('theme');
|
||||
if (theme == 'lightsout.css') {
|
||||
var borderColor = 'rgba(37, 153, 63, 1)';
|
||||
var labelColor = 'rgba(37, 153, 63, 1)';
|
||||
} else if (theme == 'material-light.php') {
|
||||
var borderColor = '#f2f2fb';
|
||||
var labelColor = '#f2f2fb';
|
||||
} else if (theme == 'material-dark.php') {
|
||||
var borderColor = '#f2f2fb';
|
||||
var labelColor = '#f2f2fb';
|
||||
} else {
|
||||
var borderColor = 'rgba(147, 210, 162, 1)';
|
||||
var labelColor = 'rgba(130, 130, 130, 1)';
|
||||
}
|
||||
|
||||
let data1 = {
|
||||
datasets: [{
|
||||
data: [linkQ, 100-linkQ],
|
||||
backgroundColor: 'transparent',
|
||||
borderColor: borderColor,
|
||||
}],
|
||||
};
|
||||
|
||||
let config = {
|
||||
type: 'doughnut',
|
||||
data: data1,
|
||||
options: {
|
||||
aspectRatio: 2,
|
||||
responsive: true,
|
||||
maintainAspectRatio: false,
|
||||
tooltips: {enabled: false},
|
||||
hover: {mode: null},
|
||||
legend: {
|
||||
display: false,
|
||||
},
|
||||
rotation: (2/3)*Math.PI,//2+(1/3),
|
||||
circumference: (1+(2/3)) * Math.PI, // * Math.PI,
|
||||
cutoutPercentage: 80,
|
||||
animation: {
|
||||
animateScale: false,
|
||||
animateRotate: true
|
||||
},
|
||||
tooltips: {
|
||||
enabled: false
|
||||
}
|
||||
},
|
||||
centerText: {
|
||||
display: true,
|
||||
text: linkQ + "%"
|
||||
},
|
||||
plugins: [{
|
||||
beforeDraw: function(chart) {
|
||||
if (chart.config.centerText.display !== null &&
|
||||
typeof chart.config.centerText.display !== 'undefined' &&
|
||||
chart.config.centerText.display) {
|
||||
drawLinkQ(chart);
|
||||
}
|
||||
}
|
||||
}]
|
||||
};
|
||||
|
||||
function drawLinkQ(chart) {
|
||||
|
||||
let width = chart.chart.width;
|
||||
let height = chart.chart.height;
|
||||
let ctx = chart.chart.ctx;
|
||||
|
||||
ctx.restore();
|
||||
let fontSize = (height / 100).toFixed(2);
|
||||
ctx.font = fontSize + "em sans-serif";
|
||||
ctx.fillStyle = labelColor;
|
||||
ctx.textBaseline = "middle";
|
||||
|
||||
let text = chart.config.centerText.text;
|
||||
let textX = Math.round((width - ctx.measureText(text).width) * 0.5);
|
||||
let textY = height / 2;
|
||||
ctx.fillText(text, textX, textY);
|
||||
ctx.save();
|
||||
}
|
||||
|
||||
window.onload = function() {
|
||||
let ctx = document.getElementById("divChartLinkQ").getContext("2d");
|
||||
var chart = new Chart(ctx, config);
|
||||
};
|
||||
|
||||
656
app/js/ui/main.js
Normal file
656
app/js/ui/main.js
Normal file
@@ -0,0 +1,656 @@
|
||||
|
||||
function msgShow(retcode,msg) {
|
||||
if(retcode == 0) { var alertType = 'success';
|
||||
} else if(retcode == 2 || retcode == 1) {
|
||||
var alertType = 'danger';
|
||||
}
|
||||
var htmlMsg = '<div class="alert alert-'+alertType+' alert-dismissible" role="alert"><button type="button" class="btn-close" data-dismiss="alert" data-bs-dismiss="alert" aria-label="Close"></button>'+msg+'</div>';
|
||||
return htmlMsg;
|
||||
}
|
||||
|
||||
function createNetmaskAddr(bitCount) {
|
||||
var mask=[];
|
||||
for(i=0;i<4;i++) {
|
||||
var n = Math.min(bitCount, 8);
|
||||
mask.push(256 - Math.pow(2, 8-n));
|
||||
bitCount -= n;
|
||||
}
|
||||
return mask.join('.');
|
||||
}
|
||||
|
||||
function setupTabs() {
|
||||
$('a[data-bs-toggle="tab"]').on('shown.bs.tab',function(e){
|
||||
var target = $(e.target).attr('href');
|
||||
if(!target.match('summary')) {
|
||||
var int = target.replace("#","");
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
$(document).on("click", ".js-add-dhcp-static-lease", function(e) {
|
||||
e.preventDefault();
|
||||
var container = $(".js-new-dhcp-static-lease");
|
||||
var mac = $("input[name=mac]", container).val().trim();
|
||||
var ip = $("input[name=ip]", container).val().trim();
|
||||
var comment = $("input[name=comment]", container).val().trim();
|
||||
if (mac == "" || ip == "") {
|
||||
return;
|
||||
}
|
||||
var row = $("#js-dhcp-static-lease-row").html()
|
||||
.replace("{{ mac }}", mac)
|
||||
.replace("{{ ip }}", ip)
|
||||
.replace("{{ comment }}", comment);
|
||||
$(".js-dhcp-static-lease-container").append(row);
|
||||
|
||||
$("input[name=mac]", container).val("");
|
||||
$("input[name=ip]", container).val("");
|
||||
$("input[name=comment]", container).val("");
|
||||
});
|
||||
|
||||
$(document).on("click", ".js-remove-dhcp-static-lease", function(e) {
|
||||
e.preventDefault();
|
||||
$(this).parents(".js-dhcp-static-lease-row").remove();
|
||||
});
|
||||
|
||||
$(document).on("submit", ".js-dhcp-settings-form", function(e) {
|
||||
$(".js-add-dhcp-static-lease").trigger("click");
|
||||
});
|
||||
|
||||
$(document).on("click", ".js-add-dhcp-upstream-server", function(e) {
|
||||
e.preventDefault();
|
||||
|
||||
var field = $("#add-dhcp-upstream-server-field")
|
||||
var row = $("#dhcp-upstream-server").html().replace("{{ server }}", field.val())
|
||||
|
||||
if (field.val().trim() == "") { return }
|
||||
|
||||
$(".js-dhcp-upstream-servers").append(row)
|
||||
|
||||
field.val("")
|
||||
});
|
||||
|
||||
$(document).on("click", ".js-remove-dhcp-upstream-server", function(e) {
|
||||
e.preventDefault();
|
||||
$(this).parents(".js-dhcp-upstream-server").remove();
|
||||
});
|
||||
|
||||
$(document).on("submit", ".js-dhcp-settings-form", function(e) {
|
||||
$(".js-add-dhcp-upstream-server").trigger("click");
|
||||
});
|
||||
|
||||
document.addEventListener('DOMContentLoaded', function() {
|
||||
const bridgeCheckbox = document.getElementById('chxbridgedenable');
|
||||
const bridgeSection = document.getElementById('bridgeStaticIpSection');
|
||||
const staticIpInput = document.getElementById('bridgeStaticIp');
|
||||
const netmaskInput = document.getElementById('bridgeNetmask');
|
||||
const gatewayInput = document.getElementById('bridgeGateway');
|
||||
const dnsInput = document.getElementById('bridgeDNS');
|
||||
const previewIp = document.getElementById('previewStaticIp');
|
||||
|
||||
const bridgeInputs = [staticIpInput, netmaskInput, gatewayInput, dnsInput];
|
||||
|
||||
// toggle visibility and required fields
|
||||
bridgeCheckbox.addEventListener('change', function() {
|
||||
if (this.checked) {
|
||||
bridgeSection.style.display = 'block';
|
||||
bridgeInputs.forEach(input => input.setAttribute('required', 'required'));
|
||||
} else {
|
||||
bridgeSection.style.display = 'none';
|
||||
bridgeInputs.forEach(input => input.removeAttribute('required'));
|
||||
}
|
||||
});
|
||||
|
||||
// auto-populate DNS when gateway loses focus
|
||||
gatewayInput.addEventListener('blur', function() {
|
||||
const gatewayVal = this.value.trim();
|
||||
if (gatewayVal !== '' && dnsInput.value.trim() === '') {
|
||||
dnsInput.value = gatewayVal;
|
||||
}
|
||||
});
|
||||
|
||||
});
|
||||
|
||||
/**
|
||||
* mark a form field, e.g. a select box, with the class `.js-field-preset`
|
||||
* and give it an attribute `data-field-preset-target` with a text field's
|
||||
* css selector.
|
||||
*
|
||||
* now, if the element marked `.js-field-preset` receives a `change` event,
|
||||
* its value will be copied to all elements matching the selector in
|
||||
* data-field-preset-target.
|
||||
*/
|
||||
$(document).on("change", ".js-field-preset", function(e) {
|
||||
var selector = this.getAttribute("data-field-preset-target")
|
||||
var value = "" + this.value
|
||||
var syncValue = function(el) { el.value = value }
|
||||
|
||||
if (value.trim() === "") { return }
|
||||
|
||||
document.querySelectorAll(selector).forEach(syncValue)
|
||||
});
|
||||
|
||||
$(document).on("click", "#gen_wpa_passphrase", function(e) {
|
||||
$('#txtwpapassphrase').val(genPassword(63));
|
||||
});
|
||||
|
||||
$(document).on("click", "#gen_apikey", function(e) {
|
||||
$('#txtapikey').val(genPassword(32).toLowerCase());
|
||||
});
|
||||
|
||||
// Enable Bootstrap tooltips
|
||||
$(function () {
|
||||
$('[data-bs-toggle="tooltip"]').tooltip()
|
||||
})
|
||||
|
||||
function genPassword(pwdLen) {
|
||||
var pwdChars = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
|
||||
var rndPass = Array(pwdLen).fill(pwdChars).map(function(x) { return x[Math.floor(Math.random() * x.length)] }).join('');
|
||||
return rndPass;
|
||||
}
|
||||
|
||||
function setupBtns() {
|
||||
$('#btnSummaryRefresh').click(function(){getAllInterfaces();});
|
||||
$('.intsave').click(function(){
|
||||
var int = $(this).data('int');
|
||||
saveNetworkSettings(int);
|
||||
});
|
||||
$('.intapply').click(function(){
|
||||
applyNetworkSettings();
|
||||
});
|
||||
}
|
||||
|
||||
function setCSRFTokenHeader(event, xhr, settings) {
|
||||
var csrfToken = $('meta[name=csrf_token]').attr('content');
|
||||
if (/^(POST|PATCH|PUT|DELETE)$/i.test(settings.type)) {
|
||||
xhr.setRequestHeader("X-CSRF-Token", csrfToken);
|
||||
}
|
||||
}
|
||||
|
||||
function contentLoaded() {
|
||||
pageCurrent = window.location.href.split("/").pop();
|
||||
switch(pageCurrent) {
|
||||
case "network_conf":
|
||||
getAllInterfaces();
|
||||
setupTabs();
|
||||
setupBtns();
|
||||
break;
|
||||
case "hostapd_conf":
|
||||
getChannel();
|
||||
setHardwareModeTooltip();
|
||||
break;
|
||||
case "dhcpd_conf":
|
||||
loadInterfaceDHCPSelect();
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
function setDHCPToggles(state) {
|
||||
if ($('#chkfallback').is(':checked') && state) {
|
||||
$('#chkfallback').prop('checked', state);
|
||||
}
|
||||
if ($('#dhcp-iface').is(':checked') && !state) {
|
||||
$('#dhcp-iface').prop('checked', state);
|
||||
setDhcpFieldsDisabled();
|
||||
}
|
||||
$('#chkfallback').prop('disabled', state);
|
||||
$('#dhcp-iface').prop('disabled', !state);
|
||||
}
|
||||
|
||||
$('#chkfallback').change(function() {
|
||||
if ($('#chkfallback').is(':checked')) {
|
||||
setStaticFieldsEnabled();
|
||||
} else {
|
||||
setStaticFieldsDisabled();
|
||||
}
|
||||
});
|
||||
|
||||
$('#performupdateModal').on('shown.bs.modal', function (e) {
|
||||
fetchUpdateResponse();
|
||||
});
|
||||
|
||||
$('#hostapdModal').on('shown.bs.modal', function (e) {
|
||||
var seconds = 3;
|
||||
var pct = 0;
|
||||
var countDown = setInterval(function(){
|
||||
if(seconds <= 0){
|
||||
clearInterval(countDown);
|
||||
}
|
||||
document.getElementsByClassName('progress-bar').item(0).setAttribute('style','width:'+Number(pct)+'%');
|
||||
seconds --;
|
||||
pct = Math.floor(100-(seconds*100/4));
|
||||
}, 500);
|
||||
});
|
||||
|
||||
$('#configureClientModal').on('shown.bs.modal', function (e) {
|
||||
});
|
||||
|
||||
$('#ovpn-confirm-activate').on('shown.bs.modal', function (e) {
|
||||
var data = $(e.relatedTarget).data();
|
||||
$('.btn-activate', this).data('recordId', data.recordId);
|
||||
});
|
||||
|
||||
$('#ovpn-userpw,#ovpn-certs').on('click', function (e) {
|
||||
if (this.id == 'ovpn-userpw') {
|
||||
$('#PanelCerts').hide();
|
||||
$('#PanelUserPW').show();
|
||||
} else if (this.id == 'ovpn-certs') {
|
||||
$('#PanelUserPW').hide();
|
||||
$('#PanelCerts').show();
|
||||
}
|
||||
});
|
||||
|
||||
$('#install-user-plugin').on('shown.bs.modal', function (e) {
|
||||
var button = $(e.relatedTarget);
|
||||
$(this).data('button', button);
|
||||
var manifestData = button.data('plugin-manifest');
|
||||
var installed = button.data('plugin-installed') || false;
|
||||
var repoPublic = button.data('repo-public') || false;
|
||||
var installPath = manifestData.install_path;
|
||||
|
||||
if (!installed && repoPublic && installPath === 'plugins-available') {
|
||||
insidersHTML = 'Available with <i class="fas fa-heart heart me-1"></i><a href="https://docs.raspap.com/insiders" target="_blank" rel="noopener">Insiders</a>';
|
||||
$('#plugin-additional').html(insidersHTML);
|
||||
} else {
|
||||
$('#plugin-additional').empty();
|
||||
}
|
||||
if (manifestData) {
|
||||
$('#plugin-docs').html(manifestData.plugin_docs
|
||||
? `<a href="${manifestData.plugin_docs}" target="_blank">${manifestData.plugin_docs}</a>`
|
||||
: 'Unknown');
|
||||
$('#plugin-icon').attr('class', `${manifestData.icon || 'fas fa-plug'} link-secondary h5 me-2`);
|
||||
$('#plugin-name').text(manifestData.name || 'Unknown');
|
||||
$('#plugin-version').text(manifestData.version || 'Unknown');
|
||||
$('#plugin-description').text(manifestData.description || 'No description provided');
|
||||
$('#plugin-author').html(manifestData.author
|
||||
? manifestData.author + (manifestData.author_uri
|
||||
? ` (<a href="${manifestData.author_uri}" target="_blank">profile</a>)` : '') : 'Unknown');
|
||||
$('#plugin-license').text(manifestData.license || 'Unknown');
|
||||
$('#plugin-locale').text(manifestData.default_locale || 'Unknown');
|
||||
$('#plugin-configuration').html(formatProperty(manifestData.configuration || 'None'));
|
||||
$('#plugin-packages').html(formatProperty(manifestData.keys || 'None'));
|
||||
$('#plugin-dependencies').html(formatProperty(manifestData.dependencies || 'None'));
|
||||
$('#plugin-javascript').html(formatProperty(manifestData.javascript || 'None'));
|
||||
$('#plugin-sudoers').html(formatProperty(manifestData.sudoers || 'None'));
|
||||
$('#plugin-user-name').html((manifestData.user_nonprivileged && manifestData.user_nonprivileged.name) || 'None');
|
||||
}
|
||||
if (installed) {
|
||||
$('#js-install-plugin-confirm').html('OK');
|
||||
} else if (!installed && repoPublic && installPath == 'plugins-available') {
|
||||
$('#js-install-plugin-confirm').html('Get Insiders');
|
||||
} else {
|
||||
$('#js-install-plugin-confirm').html('Install now');
|
||||
}
|
||||
});
|
||||
|
||||
$('#js-install-plugin-ok').on('click', function (e) {
|
||||
$("#install-plugin-progress").modal('hide');
|
||||
window.location.reload();
|
||||
});
|
||||
|
||||
function formatProperty(prop) {
|
||||
if (Array.isArray(prop)) {
|
||||
if (typeof prop[0] === 'object') {
|
||||
return prop.map(item => {
|
||||
return Object.entries(item)
|
||||
.map(([key, value]) => `${key}: ${value}`)
|
||||
.join('<br/>');
|
||||
}).join('<br/>');
|
||||
}
|
||||
return prop.map(line => `${line}<br/>`).join('');
|
||||
}
|
||||
if (typeof prop === 'object') {
|
||||
return Object.entries(prop)
|
||||
.map(([key, value]) => `${key}: ${value}`)
|
||||
.join('<br/>');
|
||||
}
|
||||
return prop || 'None';
|
||||
}
|
||||
|
||||
$(document).ready(function(){
|
||||
$("#PanelManual").hide();
|
||||
$('.ip_address').mask('0ZZ.0ZZ.0ZZ.0ZZ', {
|
||||
translation: {
|
||||
'Z': {
|
||||
pattern: /[0-9]/, optional: true
|
||||
}
|
||||
},
|
||||
placeholder: "___.___.___.___"
|
||||
});
|
||||
$('.mac_address').mask('FF:FF:FF:FF:FF:FF', {
|
||||
translation: {
|
||||
'F': {
|
||||
pattern: /[0-9a-fA-F]/, optional: false
|
||||
}
|
||||
},
|
||||
placeholder: "__:__:__:__:__:__"
|
||||
});
|
||||
});
|
||||
|
||||
$(document).ready(function() {
|
||||
$('.cidr').mask('099.099.099.099/099', {
|
||||
translation: {
|
||||
'0': { pattern: /[0-9]/ }
|
||||
},
|
||||
placeholder: "___.___.___.___/___"
|
||||
});
|
||||
});
|
||||
|
||||
$('#wg-upload,#wg-manual').on('click', function (e) {
|
||||
if (this.id == 'wg-upload') {
|
||||
$('#PanelManual').hide();
|
||||
$('#PanelUpload').show();
|
||||
} else if (this.id == 'wg-manual') {
|
||||
$('#PanelUpload').hide();
|
||||
$('#PanelManual').show();
|
||||
}
|
||||
});
|
||||
|
||||
$(".custom-file-input").on("change", function() {
|
||||
var fileName = $(this).val().split("\\").pop();
|
||||
$(this).siblings(".custom-file-label").addClass("selected").html(fileName);
|
||||
});
|
||||
|
||||
// Event listener for Bootstrap's form validation
|
||||
window.addEventListener('load', function() {
|
||||
// Fetch all the forms we want to apply custom Bootstrap validation styles to
|
||||
var forms = document.getElementsByClassName('needs-validation');
|
||||
// Loop over them and prevent submission
|
||||
var validation = Array.prototype.filter.call(forms, function(form) {
|
||||
form.addEventListener('submit', function(event) {
|
||||
if (form.checkValidity() === false) {
|
||||
event.preventDefault();
|
||||
event.stopPropagation();
|
||||
}
|
||||
form.classList.add('was-validated');
|
||||
}, false);
|
||||
});
|
||||
}, false);
|
||||
|
||||
function showSessionExpiredModal() {
|
||||
$('#sessionTimeoutModal').modal('show');
|
||||
}
|
||||
|
||||
$(document).on("click", "#js-session-expired-login", function(e) {
|
||||
const loginModal = $('#modal-admin-login');
|
||||
const redirectUrl = window.location.pathname;
|
||||
window.location.href = `/login?action=${encodeURIComponent(redirectUrl)}`;
|
||||
});
|
||||
|
||||
// show modal login on page load
|
||||
$(document).ready(function () {
|
||||
const params = new URLSearchParams(window.location.search);
|
||||
const redirectUrl = $('#redirect-url').val() || params.get('action') || '/';
|
||||
$('#modal-admin-login').modal('show');
|
||||
$('#redirect-url').val(redirectUrl);
|
||||
$('#username').focus();
|
||||
$('#username').addClass("focusedInput");
|
||||
});
|
||||
|
||||
// DHCP or Static IP option group
|
||||
$('#chkstatic').on('change', function() {
|
||||
if (this.checked) {
|
||||
setStaticFieldsEnabled();
|
||||
}
|
||||
});
|
||||
|
||||
$('#chkdhcp').on('change', function() {
|
||||
this.checked ? setStaticFieldsDisabled() : null;
|
||||
});
|
||||
|
||||
|
||||
$('input[name="dhcp-iface"]').change(function() {
|
||||
if ($('input[name="dhcp-iface"]:checked').val() == '1') {
|
||||
setDhcpFieldsEnabled();
|
||||
} else {
|
||||
setDhcpFieldsDisabled();
|
||||
}
|
||||
});
|
||||
|
||||
|
||||
function setStaticFieldsEnabled() {
|
||||
$('#txtipaddress').prop('required', true);
|
||||
$('#txtsubnetmask').prop('required', true);
|
||||
$('#txtgateway').prop('required', true);
|
||||
|
||||
$('#txtipaddress').removeAttr('disabled');
|
||||
$('#txtsubnetmask').removeAttr('disabled');
|
||||
$('#txtgateway').removeAttr('disabled');
|
||||
}
|
||||
|
||||
function setStaticFieldsDisabled() {
|
||||
$('#txtipaddress').prop('disabled', true);
|
||||
$('#txtsubnetmask').prop('disabled', true);
|
||||
$('#txtgateway').prop('disabled', true);
|
||||
|
||||
$('#txtipaddress').removeAttr('required');
|
||||
$('#txtsubnetmask').removeAttr('required');
|
||||
$('#txtgateway').removeAttr('required');
|
||||
}
|
||||
|
||||
function setDhcpFieldsEnabled() {
|
||||
$('#txtrangestart').prop('required', true);
|
||||
$('#txtrangeend').prop('required', true);
|
||||
$('#txtrangeleasetime').prop('required', true);
|
||||
$('#cbxrangeleasetimeunits').prop('required', true);
|
||||
|
||||
$('#txtrangestart').removeAttr('disabled');
|
||||
$('#txtrangeend').removeAttr('disabled');
|
||||
$('#txtrangeleasetime').removeAttr('disabled');
|
||||
$('#cbxrangeleasetimeunits').removeAttr('disabled');
|
||||
$('#txtdns1').removeAttr('disabled');
|
||||
$('#txtdns2').removeAttr('disabled');
|
||||
$('#txtmetric').removeAttr('disabled');
|
||||
}
|
||||
|
||||
function setDhcpFieldsDisabled() {
|
||||
$('#txtrangestart').removeAttr('required');
|
||||
$('#txtrangeend').removeAttr('required');
|
||||
$('#txtrangeleasetime').removeAttr('required');
|
||||
$('#cbxrangeleasetimeunits').removeAttr('required');
|
||||
|
||||
$('#txtrangestart').prop('disabled', true);
|
||||
$('#txtrangeend').prop('disabled', true);
|
||||
$('#txtrangeleasetime').prop('disabled', true);
|
||||
$('#cbxrangeleasetimeunits').prop('disabled', true);
|
||||
$('#txtdns1').prop('disabled', true);
|
||||
$('#txtdns2').prop('disabled', true);
|
||||
$('#txtmetric').prop('disabled', true);
|
||||
}
|
||||
|
||||
document.addEventListener('DOMContentLoaded', function() {
|
||||
const dhcpCheckbox = document.getElementById('dhcp-iface');
|
||||
const rangeStart = document.getElementById('txtrangestart');
|
||||
const rangeEnd = document.getElementById('txtrangeend');
|
||||
const leaseTime = document.getElementById('txtrangeleasetime');
|
||||
|
||||
function updateRequiredFields() {
|
||||
const isChecked = dhcpCheckbox.checked === true;
|
||||
|
||||
if (isChecked) {
|
||||
rangeStart.setAttribute('required', 'required');
|
||||
rangeEnd.setAttribute('required', 'required');
|
||||
leaseTime.setAttribute('required', 'required');
|
||||
} else {
|
||||
rangeStart.removeAttribute('required');
|
||||
rangeEnd.removeAttribute('required');
|
||||
leaseTime.removeAttribute('required');
|
||||
|
||||
rangeStart.classList.remove('is-invalid', 'is-valid');
|
||||
rangeEnd.classList.remove('is-invalid', 'is-valid');
|
||||
leaseTime.classList.remove('is-invalid', 'is-valid');
|
||||
}
|
||||
}
|
||||
|
||||
// set initial state
|
||||
updateRequiredFields();
|
||||
setTimeout(updateRequiredFields, 100);
|
||||
dhcpCheckbox.addEventListener('change', updateRequiredFields);
|
||||
});
|
||||
|
||||
// Static Array method
|
||||
Array.range = (start, end) => Array.from({length: (end - start)}, (v, k) => k + start);
|
||||
|
||||
$(document).on("click", ".js-toggle-password", function(e) {
|
||||
var button = $(e.currentTarget);
|
||||
var field = $(button.data("bsTarget"));
|
||||
if (field.is(":input")) {
|
||||
e.preventDefault();
|
||||
|
||||
if (!button.data("__toggle-with-initial")) {
|
||||
$("i", button).removeClass("fas fa-eye").addClass(button.attr("data-toggle-with"));
|
||||
}
|
||||
|
||||
if (field.attr("type") === "password") {
|
||||
field.attr("type", "text");
|
||||
} else {
|
||||
$("i", button).removeClass("fas fa-eye-slash").addClass("fas fa-eye");
|
||||
field.attr("type", "password");
|
||||
}
|
||||
}
|
||||
});
|
||||
|
||||
$(function() {
|
||||
$('#theme-select').change(function() {
|
||||
var theme = themes[$( "#theme-select" ).val() ];
|
||||
|
||||
var hasDarkTheme = theme === 'custom.php';
|
||||
var nightModeChecked = $("#night-mode").prop("checked");
|
||||
|
||||
if (nightModeChecked && hasDarkTheme) {
|
||||
if (theme === "custom.php") {
|
||||
set_theme("dark.css");
|
||||
}
|
||||
} else {
|
||||
set_theme(theme);
|
||||
}
|
||||
});
|
||||
});
|
||||
|
||||
function set_theme(theme) {
|
||||
$('link[title="main"]').attr('href', 'app/css/' + theme);
|
||||
// persist selected theme in cookie
|
||||
setCookie('theme',theme,90);
|
||||
}
|
||||
|
||||
$(function() {
|
||||
var currentTheme = getCookie('theme');
|
||||
// Check if the current theme is a dark theme
|
||||
var isDarkTheme = currentTheme === 'dark.css';
|
||||
|
||||
$('#night-mode').prop('checked', isDarkTheme);
|
||||
$('#night-mode').change(function() {
|
||||
var state = $(this).is(':checked');
|
||||
var currentTheme = getCookie('theme');
|
||||
|
||||
if (state == true) {
|
||||
if (currentTheme == 'custom.php') {
|
||||
set_theme('dark.css');
|
||||
}
|
||||
} else {
|
||||
if (currentTheme == 'dark.css') {
|
||||
set_theme('custom.php');
|
||||
}
|
||||
}
|
||||
});
|
||||
});
|
||||
|
||||
function setCookie(cname, cvalue, exdays) {
|
||||
var d = new Date();
|
||||
d.setTime(d.getTime() + (exdays*24*60*60*1000));
|
||||
var expires = "expires="+ d.toUTCString();
|
||||
document.cookie = cname + "=" + cvalue + ";" + expires + ";path=/";
|
||||
}
|
||||
|
||||
function getCookie(cname) {
|
||||
var regx = new RegExp(cname + "=([^;]+)");
|
||||
var value = regx.exec(document.cookie);
|
||||
return (value != null) ? unescape(value[1]) : null;
|
||||
}
|
||||
|
||||
// Define themes
|
||||
var themes = {
|
||||
"default": "custom.php",
|
||||
"hackernews" : "hackernews.css"
|
||||
}
|
||||
|
||||
// Adds active class to current nav-item
|
||||
$(window).bind("load", function() {
|
||||
var url = window.location;
|
||||
$('.sb-nav-link-icon a').filter(function() {
|
||||
return this.href == url;
|
||||
}).parent().addClass('active');
|
||||
});
|
||||
|
||||
// Sets focus on a specified tab
|
||||
document.addEventListener("DOMContentLoaded", function () {
|
||||
const params = new URLSearchParams(window.location.search);
|
||||
const targetTab = params.get("tab");
|
||||
if (targetTab) {
|
||||
let tabElement = document.querySelector(`[data-bs-toggle="tab"][href="#${targetTab}"]`);
|
||||
if (tabElement) {
|
||||
let tab = new bootstrap.Tab(tabElement);
|
||||
tab.show();
|
||||
}
|
||||
}
|
||||
});
|
||||
|
||||
function disableValidation(form) {
|
||||
form.removeAttribute("novalidate");
|
||||
form.classList.remove("needs-validation");
|
||||
form.querySelectorAll("[required]").forEach(function (field) {
|
||||
field.removeAttribute("required");
|
||||
});
|
||||
}
|
||||
|
||||
function updateActivityLED() {
|
||||
const threshold_bytes = 300;
|
||||
fetch('app/net_activity')
|
||||
.then(res => res.text())
|
||||
.then(data => {
|
||||
const activity = parseInt(data.trim());
|
||||
const leds = document.querySelectorAll('.hostapd-led');
|
||||
|
||||
if (!isNaN(activity)) {
|
||||
leds.forEach(led => {
|
||||
if (activity > threshold_bytes) {
|
||||
led.classList.add('led-pulse');
|
||||
setTimeout(() => {
|
||||
led.classList.remove('led-pulse');
|
||||
}, 50);
|
||||
} else {
|
||||
led.classList.remove('led-pulse');
|
||||
}
|
||||
});
|
||||
}
|
||||
})
|
||||
.catch(() => { /* ignore fetch errors */ });
|
||||
}
|
||||
setInterval(updateActivityLED, 100);
|
||||
|
||||
$(document).ready(function() {
|
||||
const $htmlElement = $('html');
|
||||
const $modeswitch = $('#night-mode');
|
||||
$modeswitch.on('change', function() {
|
||||
const isChecked = $(this).is(':checked');
|
||||
const newTheme = isChecked ? 'dark' : 'light';
|
||||
$htmlElement.attr('data-bs-theme', newTheme);
|
||||
localStorage.setItem('bsTheme', newTheme);
|
||||
});
|
||||
});
|
||||
|
||||
$(document)
|
||||
.ajaxSend(setCSRFTokenHeader)
|
||||
.ready(contentLoaded)
|
||||
.ready(loadWifiStations());
|
||||
|
||||
// To auto-close Bootstrap alerts; time is in milliseconds
|
||||
const alertTimeout = parseInt(getCookie('alert_timeout'), 10);
|
||||
|
||||
if (!isNaN(alertTimeout) && alertTimeout > 0) {
|
||||
window.setTimeout(function() {
|
||||
$(".alert").fadeTo(500, 0).slideUp(500, function(){
|
||||
$(this).remove();
|
||||
});
|
||||
}, alertTimeout);
|
||||
}
|
||||
|
||||
189
app/js/vendor/speedtestUI.js
vendored
Normal file
189
app/js/vendor/speedtestUI.js
vendored
Normal file
@@ -0,0 +1,189 @@
|
||||
function I(i){return document.getElementById(i);}
|
||||
|
||||
const origin=window.location.origin;
|
||||
const host=window.location.host;
|
||||
var SPEEDTEST_SERVERS=[
|
||||
{
|
||||
"name":"RaspAP Speedtest server (US)",
|
||||
"server":"https://speedtest.raspap.com/",
|
||||
"dlURL":"backend/garbage.php",
|
||||
"ulURL":"backend/empty.php",
|
||||
"pingURL":"backend/empty.php",
|
||||
"getIpURL":"backend/getIP.php"
|
||||
},
|
||||
{
|
||||
"name":"RaspAP ("+host+")",
|
||||
"server":origin,
|
||||
"dlURL":"dist/speedtest/backend/garbage.php",
|
||||
"ulURL":"dist/speedtest/backend/empty.php",
|
||||
"pingURL":"dist/speedtest/backend/empty.php",
|
||||
"getIpURL":"dist/speedtest/backend/getIP.php"
|
||||
}
|
||||
];
|
||||
|
||||
//INITIALIZE SPEEDTEST
|
||||
var s=new Speedtest(); //create speedtest object
|
||||
s.setParameter("telemetry_level","basic"); //enable telemetry
|
||||
|
||||
//SERVER AUTO SELECTION
|
||||
function initServers(){
|
||||
var noServersAvailable=function(){
|
||||
I("message").innerHTML="No servers available";
|
||||
}
|
||||
var runServerSelect=function(){
|
||||
s.selectServer(function(server){
|
||||
if(server!=null){ //at least 1 server is available
|
||||
I("loading").className="hidden"; //hide loading message
|
||||
//populate server list for manual selection
|
||||
for(var i=0;i<SPEEDTEST_SERVERS.length;i++){
|
||||
//if(SPEEDTEST_SERVERS[i].pingT==-1) continue;
|
||||
var option=document.createElement("option");
|
||||
option.value=i;
|
||||
option.textContent=SPEEDTEST_SERVERS[i].name;
|
||||
if(SPEEDTEST_SERVERS[i]===server) option.selected=true;
|
||||
I("server").appendChild(option);
|
||||
}
|
||||
//show test UI
|
||||
I("testWrapper").className="visible";
|
||||
initUI();
|
||||
}else{ //no servers are available, the test cannot proceed
|
||||
noServersAvailable();
|
||||
}
|
||||
});
|
||||
}
|
||||
if(typeof SPEEDTEST_SERVERS === "string"){
|
||||
//need to fetch list of servers from specified URL
|
||||
s.loadServerList(SPEEDTEST_SERVERS,function(servers){
|
||||
if(servers==null){ //failed to load server list
|
||||
noServersAvailable();
|
||||
}else{ //server list loaded
|
||||
SPEEDTEST_SERVERS=servers;
|
||||
runServerSelect();
|
||||
}
|
||||
});
|
||||
}else{
|
||||
//hardcoded server list
|
||||
s.addTestPoints(SPEEDTEST_SERVERS);
|
||||
runServerSelect();
|
||||
}
|
||||
}
|
||||
|
||||
var meterBk=/Trident.*rv:(\d+\.\d+)/i.test(navigator.userAgent)?"#EAEAEA":"#80808040";
|
||||
var dlColor="#4BC0C0",
|
||||
ulColor="#616161";
|
||||
var progColor=meterBk;
|
||||
|
||||
//CODE FOR GAUGES
|
||||
function drawMeter(c,amount,bk,fg,progress,prog){
|
||||
var ctx=c.getContext("2d");
|
||||
var dp=window.devicePixelRatio||1;
|
||||
var cw=c.clientWidth*dp, ch=c.clientHeight*dp;
|
||||
var sizScale=ch*0.0055;
|
||||
if(c.width==cw&&c.height==ch){
|
||||
ctx.clearRect(0,0,cw,ch);
|
||||
}else{
|
||||
c.width=cw;
|
||||
c.height=ch;
|
||||
}
|
||||
ctx.beginPath();
|
||||
ctx.strokeStyle=bk;
|
||||
ctx.lineWidth=12*sizScale;
|
||||
ctx.arc(c.width/2,c.height-58*sizScale,c.height/1.8-ctx.lineWidth,-Math.PI*1.1,Math.PI*0.1);
|
||||
ctx.stroke();
|
||||
ctx.beginPath();
|
||||
ctx.strokeStyle=fg;
|
||||
ctx.lineWidth=12*sizScale;
|
||||
ctx.arc(c.width/2,c.height-58*sizScale,c.height/1.8-ctx.lineWidth,-Math.PI*1.1,amount*Math.PI*1.2-Math.PI*1.1);
|
||||
ctx.stroke();
|
||||
if(typeof progress !== "undefined"){
|
||||
ctx.fillStyle=prog;
|
||||
ctx.fillRect(c.width*0.3,c.height-16*sizScale,c.width*0.4*progress,4*sizScale);
|
||||
}
|
||||
}
|
||||
function mbpsToAmount(s){
|
||||
return 1-(1/(Math.pow(1.3,Math.sqrt(s))));
|
||||
}
|
||||
function format(d){
|
||||
d=Number(d);
|
||||
if(d<10) return d.toFixed(2);
|
||||
if(d<100) return d.toFixed(1);
|
||||
return d.toFixed(0);
|
||||
}
|
||||
|
||||
//UI CODE
|
||||
var uiData=null;
|
||||
function startStop(){
|
||||
if(s.getState()==3){
|
||||
//speedtest is running, abort
|
||||
s.abort();
|
||||
data=null;
|
||||
I("startStopBtn").className="btn btn-outline btn-primary";
|
||||
I("server").disabled=false;
|
||||
initUI();
|
||||
}else{
|
||||
//test is not running, begin
|
||||
I("startStopBtn").className="btn btn-outline btn-primary running";
|
||||
I("server").disabled=true;
|
||||
s.onupdate=function(data){
|
||||
uiData=data;
|
||||
};
|
||||
s.onend=function(aborted){
|
||||
I("startStopBtn").className="btn btn-outline btn-primary";
|
||||
I("server").disabled=false;
|
||||
updateUI(true);
|
||||
if(!aborted){
|
||||
//if testId is present, show sharing panel, otherwise do nothing
|
||||
try{
|
||||
var testId=uiData.testId;
|
||||
if(testId!=null){
|
||||
var shareURL=window.location.href.substring(0,window.location.href.lastIndexOf("/"))+"/results/?id="+testId;
|
||||
I("resultsImg").src=shareURL;
|
||||
I("resultsURL").value=shareURL;
|
||||
I("testId").innerHTML=testId;
|
||||
I("shareArea").style.display="";
|
||||
}
|
||||
}catch(e){}
|
||||
}
|
||||
};
|
||||
s.start();
|
||||
}
|
||||
}
|
||||
//this function reads the data sent back by the test and updates the UI
|
||||
function updateUI(forced){
|
||||
if(!forced&&s.getState()!=3) return;
|
||||
if(uiData==null) return;
|
||||
var status=uiData.testState;
|
||||
I("ip").textContent=uiData.clientIp;
|
||||
I("dlText").textContent=(status==1&&uiData.dlStatus==0)?"...":format(uiData.dlStatus);
|
||||
drawMeter(I("dlMeter"),mbpsToAmount(Number(uiData.dlStatus*(status==1?oscillate():1))),meterBk,dlColor,Number(uiData.dlProgress),progColor);
|
||||
I("ulText").textContent=(status==3&&uiData.ulStatus==0)?"...":format(uiData.ulStatus);
|
||||
drawMeter(I("ulMeter"),mbpsToAmount(Number(uiData.ulStatus*(status==3?oscillate():1))),meterBk,ulColor,Number(uiData.ulProgress),progColor);
|
||||
I("pingText").textContent=format(uiData.pingStatus);
|
||||
I("jitText").textContent=format(uiData.jitterStatus);
|
||||
}
|
||||
function oscillate(){
|
||||
return 1+0.02*Math.sin(Date.now()/100);
|
||||
}
|
||||
//update the UI every frame
|
||||
window.requestAnimationFrame=window.requestAnimationFrame||window.webkitRequestAnimationFrame||window.mozRequestAnimationFrame||window.msRequestAnimationFrame||(function(callback,element){setTimeout(callback,1000/60);});
|
||||
function frame(){
|
||||
requestAnimationFrame(frame);
|
||||
updateUI();
|
||||
}
|
||||
frame(); //start frame loop
|
||||
//function to (re)initialize UI
|
||||
function initUI(){
|
||||
drawMeter(I("dlMeter"),0,meterBk,dlColor,0);
|
||||
drawMeter(I("ulMeter"),0,meterBk,ulColor,0);
|
||||
I("dlText").textContent="";
|
||||
I("ulText").textContent="";
|
||||
I("pingText").textContent="";
|
||||
I("jitText").textContent="";
|
||||
I("ip").textContent="";
|
||||
}
|
||||
// add EventListener to diagnostic tab
|
||||
var e = document.querySelectorAll("a[href^='#diagnostic']");
|
||||
e[0].addEventListener("click", function(){
|
||||
initServers()
|
||||
});
|
||||
|
||||
78
app/lib/signprint.php
Normal file
78
app/lib/signprint.php
Normal file
@@ -0,0 +1,78 @@
|
||||
<?php
|
||||
|
||||
require_once '../../includes/config.php';
|
||||
require_once '../../includes/defaults.php';
|
||||
|
||||
// prevent direct file access
|
||||
if (!isset($_SERVER['HTTP_REFERER'])) {
|
||||
header('HTTP/1.0 403 Forbidden');
|
||||
exit;
|
||||
}
|
||||
|
||||
$hostapd = parse_ini_file(RASPI_HOSTAPD_CONFIG, false, INI_SCANNER_RAW);
|
||||
$ssid = $hostapd['ssid'];
|
||||
$password = isset($hostapd['wpa_psk']) ? $hostapd['wpa_psk'] : $hostapd['wpa_passphrase'];
|
||||
|
||||
?>
|
||||
|
||||
<html>
|
||||
<head>
|
||||
<title><?php echo _("Printable Wi-Fi sign"); ?></title>
|
||||
<!-- Bootstrap Core CSS -->
|
||||
<link href="../../dist/bootstrap/css/bootstrap.css" rel="stylesheet">
|
||||
|
||||
<!-- SB-Admin-2 CSS -->
|
||||
<link href="../../dist/sb-admin-2/css/sb-admin-2.min.css" rel="stylesheet">
|
||||
|
||||
<!-- Custom Fonts -->
|
||||
<link href="../../dist/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
|
||||
</head>
|
||||
<body id="page-top">
|
||||
<div id="wrapper">
|
||||
<div id="content-wrapper" class="d-flex flex-column">
|
||||
<div id="container">
|
||||
<div class="row text-center">
|
||||
<div class="col">
|
||||
<div class="mt-5 mb-5">
|
||||
<h2><i class="fas fa-wifi"></i> <?php echo _("Wi-Fi Connect"); ?></h2>
|
||||
</div>
|
||||
</div>
|
||||
</div><!-- /row -->
|
||||
|
||||
<div class="row">
|
||||
<div class="col"></div>
|
||||
<div class="col-5">
|
||||
<img src="../img/wifi-qr-code.php" class="figure-img img-fluid" alt="RaspAP Wifi QR code" style="width:100%;">
|
||||
</div>
|
||||
<div class="col"></div>
|
||||
</div><!-- /row -->
|
||||
|
||||
<div class="row text-center">
|
||||
<div class="col"></div>
|
||||
<div class="col-8">
|
||||
<div class="mt-4">
|
||||
<div><?php echo _("To connect with your phone or tablet, scan the QR code above with your camera app."); ?></div>
|
||||
<div><?php echo _("For other devices, use the login credentials below."); ?></div>
|
||||
</div>
|
||||
</div>
|
||||
<div class="col"></div>
|
||||
</div><!-- /row -->
|
||||
|
||||
<div class="row text-center">
|
||||
<div class="col"></div>
|
||||
<div class="col-8">
|
||||
<div class="mt-4">
|
||||
<?php echo _("Network"); ?>
|
||||
<h3 class="mb-3"><?php echo $ssid ?></h3>
|
||||
<?php echo _("Password"); ?>
|
||||
<h3 class="mb-5"><?php echo $password ?></h3>
|
||||
</div>
|
||||
</div>
|
||||
<div class="col"></div>
|
||||
</div><!-- /row -->
|
||||
|
||||
</div><!-- /content -->
|
||||
</div><!-- /content-wrapper -->
|
||||
</div><!-- /page wrapper -->
|
||||
</body>
|
||||
</html>
|
||||
@@ -2,7 +2,7 @@ server.modules += (
|
||||
"mod_rewrite",
|
||||
)
|
||||
|
||||
$HTTP["url"] =~ "^/REPLACE_ME/(?!(dist|app|ajax|config)).*" {
|
||||
$HTTP["url"] =~ "^/REPLACE_ME/(?!(dist|app|ajax|config|rootCA\.pem)).*" {
|
||||
url.rewrite-once = ( "^/REPLACE_ME/(.*?)(\?.+)?$"=>"/REPLACE_ME/index.php/$1$2" )
|
||||
server.error-handler-404 = "/REPLACE_ME/index.php"
|
||||
}
|
||||
|
||||
@@ -1,17 +1,45 @@
|
||||
{
|
||||
"StevenBlack/hosts": [
|
||||
"StevenBlack/hosts (default)"
|
||||
],
|
||||
"badmojr/hosts": [
|
||||
"badmojr/1Hosts (Mini)",
|
||||
"badmojr/1Hosts (Lite)",
|
||||
"badmojr/1Hosts (Pro)",
|
||||
"badmojr/1Hosts (Xtra)"
|
||||
],
|
||||
"OISD/domains": [
|
||||
"oisd/big (default)",
|
||||
"oisd/small",
|
||||
"oisd/nsfw"
|
||||
]
|
||||
"StevenBlack/hosts": {
|
||||
"StevenBlack/hosts (default)": {
|
||||
"list_url": "https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts",
|
||||
"dest_file": "hostnames.txt"
|
||||
}
|
||||
},
|
||||
"HaGeZi/hosts": {
|
||||
"hagezi/hosts (Light)": {
|
||||
"list_url": "https://raw.githubusercontent.com/hagezi/dns-blocklists/main/hosts/light.txt",
|
||||
"dest_file": "hostnames.txt"
|
||||
},
|
||||
"hagezi/hosts (Normal)": {
|
||||
"list_url": "https://raw.githubusercontent.com/hagezi/dns-blocklists/main/hosts/multi.txt",
|
||||
"dest_file": "hostnames.txt"
|
||||
},
|
||||
"hagezi/hosts (Pro)": {
|
||||
"list_url": "https://raw.githubusercontent.com/hagezi/dns-blocklists/main/hosts/pro.txt",
|
||||
"dest_file": "hostnames.txt"
|
||||
},
|
||||
"hagezi/hosts (Pro++)": {
|
||||
"list_url": "https://raw.githubusercontent.com/hagezi/dns-blocklists/main/hosts/pro.plus.txt",
|
||||
"dest_file": "hostnames.txt"
|
||||
},
|
||||
"hagezi/hosts (Ultimate)": {
|
||||
"list_url": "https://raw.githubusercontent.com/hagezi/dns-blocklists/main/hosts/ultimate.txt",
|
||||
"dest_file": "hostnames.txt"
|
||||
}
|
||||
},
|
||||
"OISD/domains": {
|
||||
"oisd/big (default)": {
|
||||
"list_url": "https://big.oisd.nl/dnsmasq",
|
||||
"dest_file": "domains.txt"
|
||||
},
|
||||
"oisd/small": {
|
||||
"list_url": "https://small.oisd.nl/dnsmasq",
|
||||
"dest_file": "domains.txt"
|
||||
},
|
||||
"oisd/nsfw": {
|
||||
"list_url": "https://nsfw.oisd.nl/dnsmasq",
|
||||
"dest_file": "domains.txt"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -23,7 +23,6 @@ define('RASPI_ADBLOCK_CONFIG', RASPI_DNSMASQ_PREFIX.'adblock.conf');
|
||||
define('RASPI_HOSTAPD_CONFIG', '/etc/hostapd/hostapd.conf');
|
||||
define('RASPI_DHCPCD_CONFIG', '/etc/dhcpcd.conf');
|
||||
define('RASPI_DHCPCD_LOG', '/var/log/dnsmasq.log');
|
||||
define('RASPI_HOSTAPD_LOG', '/tmp/hostapd.log');
|
||||
define('RASPI_WPA_SUPPLICANT_CONFIG', '/etc/wpa_supplicant/wpa_supplicant.conf');
|
||||
define('RASPI_HOSTAPD_CTRL_INTERFACE', '/var/run/hostapd');
|
||||
define('RASPI_WPA_CTRL_INTERFACE', '/var/run/wpa_supplicant');
|
||||
@@ -32,6 +31,7 @@ define('RASPI_OPENVPN_CLIENT_CONFIG', '/etc/openvpn/client/client.conf');
|
||||
define('RASPI_OPENVPN_CLIENT_LOGIN', '/etc/openvpn/client/login.conf');
|
||||
define('RASPI_WIREGUARD_PATH', '/etc/wireguard/');
|
||||
define('RASPI_WIREGUARD_CONFIG', RASPI_WIREGUARD_PATH.'wg0.conf');
|
||||
define('RASPI_IPTABLES_CONF', RASPI_CONFIG.'/networking/iptables_rules.json');
|
||||
define('RASPI_TORPROXY_CONFIG', '/etc/tor/torrc');
|
||||
define('RASPI_LIGHTTPD_CONFIG', '/etc/lighttpd/lighttpd.conf');
|
||||
define('RASPI_ACCESS_CHECK_IP', '1.1.1.1');
|
||||
@@ -40,6 +40,10 @@ define('RASPI_ACCESS_CHECK_DNS', 'one.one.one.one');
|
||||
// Constant for the GitHub API latest release endpoint
|
||||
define('RASPI_API_ENDPOINT', 'https://api.github.com/repos/RaspAP/raspap-webgui/releases/latest');
|
||||
|
||||
// Captive portal detection - returns 204 or 200 is successful
|
||||
define('RASPI_ACCESS_CHECK_URL', 'http://detectportal.firefox.com');
|
||||
define('RASPI_ACCESS_CHECK_URL_CODE', 200);
|
||||
|
||||
// Constant for the 5GHz wireless regulatory domain
|
||||
define("RASPI_5GHZ_CHANNEL_MIN", 100);
|
||||
define("RASPI_5GHZ_CHANNEL_MAX", 192);
|
||||
@@ -64,6 +68,7 @@ define('RASPI_SYSTEM_ENABLED', true);
|
||||
define('RASPI_MONITOR_ENABLED', false);
|
||||
define('RASPI_RESTAPI_ENABLED', false);
|
||||
define('RASPI_PLUGINS_ENABLED', true);
|
||||
define('RASPI_UI_STATIC_LOGO', false);
|
||||
|
||||
// Locale settings
|
||||
define('LOCALE_ROOT', 'locale');
|
||||
|
||||
@@ -1,23 +1,229 @@
|
||||
{
|
||||
"hostapd": {
|
||||
"modes": {
|
||||
"n": {
|
||||
"settings": [
|
||||
"hw_mode=g",
|
||||
"ieee80211n=1",
|
||||
"wmm_enabled=1"
|
||||
]
|
||||
},
|
||||
"ac": {
|
||||
"settings": [
|
||||
"hw_mode=a",
|
||||
"# N",
|
||||
"ieee80211n=1",
|
||||
"require_ht=1",
|
||||
"ht_capab=[MAX-AMSDU-3839][{HT40_DIR}][SHORT-GI-20][SHORT-GI-40][DSSS_CCK-40]",
|
||||
"# AC",
|
||||
"ieee80211ac=1",
|
||||
"require_vht=1",
|
||||
"ieee80211d=0",
|
||||
"ieee80211h=0",
|
||||
"vht_capab=[MAX-AMSDU-3839][SHORT-GI-80]",
|
||||
"vht_oper_chwidth=1",
|
||||
"vht_oper_centr_freq_seg0_idx={VHT_FREQ_IDX}"
|
||||
]
|
||||
},
|
||||
"ax": {
|
||||
"settings": [
|
||||
"# Basic settings",
|
||||
"hw_mode=a",
|
||||
"# Enable 802.11n/ac",
|
||||
"ieee80211d=1",
|
||||
"ieee80211n=1",
|
||||
"ieee80211ac=1",
|
||||
"# Enable 802.11ax",
|
||||
"ieee80211ax=1",
|
||||
"# HE 802.11ax capabilities",
|
||||
"he_su_beamformer=1",
|
||||
"he_su_beamformee=1",
|
||||
"he_mu_beamformer=1",
|
||||
"# BSS color for spatial reuse, value 1-63",
|
||||
"he_bss_color=1",
|
||||
"he_oper_chwidth=1",
|
||||
"# HE/VHT channel widths",
|
||||
"he_oper_chwidth=1",
|
||||
"vht_oper_chwidth=1",
|
||||
"he_oper_centr_freq_seg0_idx={HE_FREQ_IDX}",
|
||||
"vht_oper_centr_freq_seg0_idx={VHT_FREQ_IDX}",
|
||||
"# HT 802.11n capabilities",
|
||||
"ht_capab=[{HT40_DIR}][LDPC][SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1][MAX-AMSDU-7935]",
|
||||
"# VHT capabilities 802.11ac",
|
||||
"vht_capab=[RXLDPC][SHORT-GI-80][TX-STBC-2BY1][RX-STBC-1][MAX-MPDU-11454][MAX-A-MPDU-LEN-EXP7]",
|
||||
"# WMM/QoS",
|
||||
"wmm_enabled=1"
|
||||
]
|
||||
},
|
||||
"be": {
|
||||
"settings": [
|
||||
"# Basic settings",
|
||||
"hw_mode=a",
|
||||
"# Enable 802.11n/ac/ax",
|
||||
"ieee80211n=1",
|
||||
"ieee80211ac=1",
|
||||
"ieee80211ax=1",
|
||||
"# Maximum MPDU Length of HE 6 GHz band capabilities.",
|
||||
"# Indicates maximum MPDU length",
|
||||
"# 0 = 3895 octets",
|
||||
"# 1 = 7991 octets",
|
||||
"# 2 = 11454 octets",
|
||||
"he_6ghz_max_mpdu=2",
|
||||
"# Maximum A-MPDU Length Exponent of HE 6 GHz band capabilities. Indicates",
|
||||
"# the maximum length of A-MPDU pre-EOF padding that # the STA can receive.",
|
||||
"# This field is an integer in the range of 0 to 7. The length defined by",
|
||||
"# this field is equal to 2 pow -1",
|
||||
"# octets",
|
||||
"# 0 = AMPDU length of 8k",
|
||||
"# 1 = AMPDU length of 16k",
|
||||
"# 2 = AMPDU length of 32k",
|
||||
"# 3 = AMPDU length of 65k",
|
||||
"# 4 = AMPDU length of 131k",
|
||||
"# 5 = AMPDU length of 262kv",
|
||||
"# 6 = AMPDU length of 524k",
|
||||
"# 7 = AMPDU length of 1048k",
|
||||
"he_6ghz_max_ampdu_len_exp=7",
|
||||
"# 0 = Indoor AP",
|
||||
"# 1 = Standard power AP",
|
||||
"# 2 = Very low power AP",
|
||||
"# 3 = Indoor enabled AP",
|
||||
"# 4 = Indoor standard power AP",
|
||||
"he_6ghz_reg_pwr_type=0",
|
||||
"# HE beamforming capabilities",
|
||||
"he_su_beamformer=1",
|
||||
"he_su_beamformee=1",
|
||||
"he_mu_beamformer=1",
|
||||
"he_mu_edca_qos_info_param_count=0",
|
||||
"he_mu_edca_qos_info_q_ack=0",
|
||||
"he_mu_edca_qos_info_queue_request=0",
|
||||
"he_mu_edca_qos_info_txop_request=0",
|
||||
"he_mu_edca_ac_be_aifsn=8",
|
||||
"he_mu_edca_ac_be_aci=0",
|
||||
"he_mu_edca_ac_be_ecwmin=9",
|
||||
"he_mu_edca_ac_be_ecwmax=10",
|
||||
"he_mu_edca_ac_be_timer=255",
|
||||
"he_mu_edca_ac_bk_aifsn=15",
|
||||
"he_mu_edca_ac_bk_aci=1",
|
||||
"he_mu_edca_ac_bk_ecwmin=9",
|
||||
"he_mu_edca_ac_bk_ecwmax=10",
|
||||
"he_mu_edca_ac_bk_timer=255",
|
||||
"he_mu_edca_ac_vi_ecwmin=5",
|
||||
"he_mu_edca_ac_vi_ecwmax=7",
|
||||
"he_mu_edca_ac_vi_aifsn=5",
|
||||
"he_mu_edca_ac_vi_aci=2",
|
||||
"he_mu_edca_ac_vi_timer=255",
|
||||
"he_mu_edca_ac_vo_aifsn=5",
|
||||
"he_mu_edca_ac_vo_aci=3",
|
||||
"he_mu_edca_ac_vo_ecwmin=5",
|
||||
"he_mu_edca_ac_vo_ecwmax=7",
|
||||
"he_mu_edca_ac_vo_timer=255",
|
||||
"# EHT beamforming capabilities",
|
||||
"eht_su_beamformer=0",
|
||||
"eht_su_beamformee=0",
|
||||
"eht_mu_beamformer=0",
|
||||
"# used by clients to discern the source of interference",
|
||||
"# each AP in your area needs to use a different number",
|
||||
"# allowed: 1-63",
|
||||
"he_bss_color=37",
|
||||
"# 160 MHz for HE",
|
||||
"he_oper_chwidth=2",
|
||||
"he_oper_centr_freq_seg0_idx={HE_FREQ_IDX}",
|
||||
"# IEEE 802.11be WiFi 7 configuration",
|
||||
"ieee80211be=1",
|
||||
"# EHT configuration",
|
||||
"eht_su_beamformer=1",
|
||||
"eht_su_beamformee=1",
|
||||
"eht_mu_beamformer=1",
|
||||
"# EHT operating channel information; see matching he_* parameters for details.",
|
||||
"# The field eht_oper_centr_freq_seg0_idx field is used to indicate center",
|
||||
"# frequency of 40, 80, and 160 MHz bandwidth operation.",
|
||||
"# In the 6 GHz band, eht_oper_chwidth is ignored and the channel width is",
|
||||
"# derived from the configured operating class IEEE P802.11be/D1.5,",
|
||||
"# Annex E.1 - Country information and operating classes.",
|
||||
"# Channel width 0 = 40 MHz, 1 = 80 Mhz, 2 = 160 Mhz",
|
||||
"eht_oper_chwidth=2",
|
||||
"eht_oper_centr_freq_seg0_idx={VHT_FREQ_IDX}",
|
||||
"# VHT operation parameters",
|
||||
"vht_oper_chwidth=2",
|
||||
"vht_oper_centr_freq_seg0_idx={VHT_FREQ_IDX}",
|
||||
"vht_capab=[MAX-MPDU-11454][RXLDPC][SHORT-GI-80][SHORT-GI-160][TX-STBC-2BY1][RX-STBC-1][SU-BEAMFORMER][SU-BEAMFORMEE][MU-BEAMFORMER][MU-BEAMFORMEE]",
|
||||
"# WMM configuration",
|
||||
"wmm_enabled=1",
|
||||
"wmm_ac_bk_cwmin=4",
|
||||
"wmm_ac_bk_cwmax=10",
|
||||
"wmm_ac_bk_aifs=7",
|
||||
"wmm_ac_bk_txop_limit=0",
|
||||
"wmm_ac_be_aifs=3",
|
||||
"wmm_ac_be_cwmin=4",
|
||||
"wmm_ac_be_cwmax=10",
|
||||
"wmm_ac_be_txop_limit=0",
|
||||
"wmm_ac_vi_aifs=2",
|
||||
"wmm_ac_vi_cwmin=3",
|
||||
"wmm_ac_vi_cwmax=4",
|
||||
"wmm_ac_vi_txop_limit=94",
|
||||
"wmm_ac_vo_aifs=2",
|
||||
"wmm_ac_vo_cwmin=2",
|
||||
"wmm_ac_vo_cwmax=3",
|
||||
"wmm_ac_vo_txop_limit=47"
|
||||
]
|
||||
},
|
||||
"g": {
|
||||
"settings": [
|
||||
"hw_mode=g",
|
||||
"ieee80211n=0"
|
||||
]
|
||||
},
|
||||
"a": {
|
||||
"settings": [
|
||||
"hw_mode=a",
|
||||
"ieee80211n=0"
|
||||
]
|
||||
},
|
||||
"b": {
|
||||
"settings": [
|
||||
"hw_mode=b",
|
||||
"ieee80211n=0"
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"dhcp": {
|
||||
"wlan0": {
|
||||
"static ip_address": [ "10.3.141.1/24" ],
|
||||
"wlan0": {
|
||||
"static ip_address": [ "10.3.141.1" ],
|
||||
"static routers": [ "10.3.141.1" ],
|
||||
"static domain_name_server": [ "1.1.1.1 8.8.8.8" ],
|
||||
"subnetmask": [ "255.255.255.0" ]
|
||||
},
|
||||
"wlan1": {
|
||||
"static ip_address": [ "10.9.141.1/24" ],
|
||||
"static ip_address": [ "10.9.141.1" ],
|
||||
"static routers": [ "10.9.141.1" ],
|
||||
"static domain_name_server": [ "1.1.1.1 8.8.8.8" ],
|
||||
"subnetmask": [ "255.255.255.0" ]
|
||||
},
|
||||
"wlan2": {
|
||||
"static ip_address": [ "10.6.141.1" ],
|
||||
"static routers": [ "10.6.141.1" ],
|
||||
"static domain_name_server": [ "1.1.1.1 8.8.8.8" ],
|
||||
"subnetmask": [ "255.255.255.0" ]
|
||||
},
|
||||
"uap0": {
|
||||
"static ip_address": [ "192.168.50.1/24" ],
|
||||
"static ip_address": ["192.168.50.1" ],
|
||||
"static routers": [ "192.168.50.1" ],
|
||||
"static domain_name_server": [ "1.1.1.1 8.8.8.8" ],
|
||||
"subnetmask": [ "255.255.255.0" ]
|
||||
},
|
||||
"eth0": {
|
||||
"static ip_address": [ "192.168.55.1" ],
|
||||
"static routers": [ "192.168.55.1" ],
|
||||
"static domain_name_server": [ "1.1.1.1 8.8.8.8" ],
|
||||
"subnetmask": [ "255.255.255.0" ]
|
||||
},
|
||||
"enx": {
|
||||
"static ip_address": [ "192.168.60.1" ],
|
||||
"static routers": [ "192.168.60.1" ],
|
||||
"static domain_name_server": [ "1.1.1.1 8.8.8.8" ],
|
||||
"subnetmask": [ "255.255.255.0" ]
|
||||
},
|
||||
"options": {
|
||||
"# RaspAP default configuration": null,
|
||||
"hostname": null,
|
||||
@@ -39,8 +245,17 @@
|
||||
"wlan1": {
|
||||
"dhcp-range": [ "10.9.141.50,10.9.141.254,255.255.255.0,12h" ]
|
||||
},
|
||||
"wlan2": {
|
||||
"dhcp-range": [ "10.6.141.50,10.6.141.254,255.255.255.0,12h" ]
|
||||
},
|
||||
"uap0": {
|
||||
"dhcp-range": [ "192.168.50.50,192.168.50.150,12h" ]
|
||||
},
|
||||
"eth0": {
|
||||
"dhcp-range": [ "192.168.55.50,192.168.55.150,12h" ]
|
||||
},
|
||||
"enx": {
|
||||
"dhcp-range": [ "192.168.60.50,192.168.60.150,12h" ]
|
||||
}
|
||||
},
|
||||
"wireguard": {
|
||||
@@ -48,14 +263,16 @@
|
||||
"Address": [ "10.8.2.1/24" ],
|
||||
"ListenPort": [ "51820" ],
|
||||
"DNS": [ "9.9.9.9" ],
|
||||
"PostUp": [ "iptables -A FORWARD -i wlan0 -o wg0 -j ACCEPT; iptables -A FORWARD -i wg0 -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT; iptables -t nat -A POSTROUTING -o wg0 -j MASQUERADE" ],
|
||||
"PostDown": [ "iptables -D FORWARD -i wlan0 -o wg0 -j ACCEPT; iptables -D FORWARD -i wg0 -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT; iptables -t nat -D POSTROUTING -o wg0 -j MASQUERADE" ]
|
||||
"PostUp": [ "iptables -A FORWARD -i wlan0 -o %i -j ACCEPT; iptables -A FORWARD -i %i -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT; iptables -t nat -A POSTROUTING -o %i -j MASQUERADE" ],
|
||||
"PostDown": [ "iptables -D FORWARD -i wlan0 -o %i -j ACCEPT; iptables -D FORWARD -i %i -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT; iptables -t nat -D POSTROUTING -o %i -j MASQUERADE" ],
|
||||
"PostUpEx": [ "iptables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL ! -d %s -j REJECT" ],
|
||||
"PreDown": [ "iptables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL ! -d %s -j REJECT" ]
|
||||
},
|
||||
"peer": {
|
||||
"Address": [ "10.8.1.2/24" ],
|
||||
"Endpoint": [ "10.8.2.1:51820" ],
|
||||
"ListenPort": [ "21841" ],
|
||||
"AllowedIPs": ["10.8.2.0/24"],
|
||||
"AllowedIPs": [ "10.8.2.0/24" ],
|
||||
"PersistentKeepalive": [ "15" ]
|
||||
}
|
||||
},
|
||||
|
||||
@@ -1,3 +0,0 @@
|
||||
files:
|
||||
- source: /locale/en_US/LC_MESSAGES/messages.po
|
||||
translation: /locale/%locale_with_underscore%/LC_MESSAGES/%original_file_name%
|
||||
BIN
dist/raspap/css/fonts/RaspAP.eot
vendored
BIN
dist/raspap/css/fonts/RaspAP.eot
vendored
Binary file not shown.
1
dist/raspap/css/fonts/RaspAP.svg
vendored
1
dist/raspap/css/fonts/RaspAP.svg
vendored
@@ -11,4 +11,5 @@
|
||||
<glyph unicode="" glyph-name="raspap" horiz-adv-x="1031" d="M540.058 281.983c0-104.182-84.446-188.637-188.625-188.637-104.176 0-188.62 84.455-188.62 188.637 0 104.171 84.444 188.625 188.62 188.625 104.179 0 188.625-84.455 188.625-188.625zM351.437 550.062c-147.818 0-268.074-120.259-268.074-268.080 0-147.826 120.257-268.091 268.074-268.091s268.077 120.265 268.077 268.091c0 147.821-120.259 268.080-268.077 268.080zM351.437-58.985c-188 0-340.95 152.958-340.95 340.967 0 188.003 152.95 340.956 340.95 340.956 188.003 0 340.953-152.953 340.953-340.956 0-188.009-152.95-340.967-340.953-340.967zM404.82 698.222c185.52 0 339.484-137.497 365.479-315.929l79.208-5.253c-24.125 224.046-214.339 399.077-444.686 399.077-10.909 0-21.723-0.412-32.433-1.186l5.16-77.823c9.017 0.661 18.093 1.113 27.272 1.113zM404.989 874.303c285.73 0 520.41-222.659 539.731-503.584l78.375-5.205c-16.843 326.355-287.644 586.685-618.106 586.685-14.884 0-29.644-0.561-44.264-1.6l5.157-77.719c12.919 0.928 25.958 1.424 39.106 1.424z" />
|
||||
<glyph unicode="" glyph-name="tailscale" d="M131.2 323.8c70.6 0 127.8 57.2 127.8 127.8s-57.2 127.8-127.8 127.8-127.6-57.4-127.6-127.8 57.2-127.8 127.6-127.8zM514.4 323.8c70.6 0 127.8 57.2 127.8 127.8s-57.2 127.8-127.8 127.8c-70.6 0-127.8-57.2-127.8-127.8s57.2-127.8 127.8-127.8zM514.4-64c70.6 0 127.8 57.2 127.8 127.8s-57.2 127.8-127.8 127.8c-70.6 0-127.8-57.2-127.8-127.8s57.2-127.8 127.8-127.8zM892.8 323.8c70.6 0 127.8 57.2 127.8 127.8s-57.2 127.8-127.8 127.8c-70.6 0-127.8-57.2-127.8-127.8s57.2-127.8 127.8-127.8z" />
|
||||
<glyph unicode="" glyph-name="torproxy" d="M750.016 439.488c-32.512 29.504-73.504 53.344-115.328 77.152-19.008 10.496-77.344 56.16-57.152 120.992l-36.32 15.328c57.152 88.672 131.68 176.32 223.008 258.336-73.344-24.672-138.176-62.848-186.848-130.496 28.672 60 75.328 119.168 126.848 179.168-70.496-50.496-131.488-107.68-169.664-184l26.656 106.848c-38.176-68.672-64.832-138.336-75.328-207.84l-56.16 22.848-9.504-7.68c49.504-88.672 23.84-135.328-0.992-151.68-49.504-33.344-120.992-76.16-157.344-113.344-68.672-70.656-88.672-137.344-82.016-226.016 6.656-113.504 89.664-207.84 199.328-244.992 48.672-16.32 93.344-18.176 143.008-18.176 80 0 162.016 20.992 222.176 71.488 63.84 52.992 100.832 131.488 100.992 214.496 0.32 82.656-34.336 161.664-95.328 217.504zM598.336 60.832c-3.84-17.152-16.16-38.176-31.328-57.152 5.664 10.496 10.496 20.992 13.344 32.512 23.84 84.832 34.336 123.84 22.848 217.344-1.824 9.504-5.664 40-20 73.344-20 50.656-50.496 98.336-54.336 108.832-6.656 16.16-16.16 84.832-17.152 131.488 0.992-40 3.84-113.344 14.336-142.016 2.848-9.664 30.496-52.512 50.496-104.832 13.344-36.32 16.16-69.664 19.008-79.168 9.664-43.008-1.824-115.488-16.992-184-4.832-24.832-18.176-53.504-35.328-75.328 9.504 13.344 17.152 30.496 22.848 50.496 11.488 40 16.16 91.488 15.168 124-0.832 19.008-9.504 60-23.84 97.152-8.512 20-20.992 40.992-29.504 55.328-9.504 14.336-9.504 45.664-13.344 82.016 0.832-39.168-2.848-59.168 6.656-86.848 5.664-16.16 26.656-39.008 32.32-60.992 8.672-29.504 17.152-62.016 16.32-82.016 0-22.848-0.992-64.832-11.488-110.656-6.656-34.176-22.016-63.84-46.656-82.848 10.496 13.344 16.16 26.656 19.008 40 3.84 20 4.832 39.168 6.656 63.008 2.016 24.512 0.32 49.344-4.672 73.344-7.68 34.336-20 68.672-25.824 92.512 0.992-26.656 11.488-60 16.32-95.328 3.68-25.824 1.824-51.488 0.832-74.336-0.832-26.656-9.504-73.504-20.992-96.32-11.488 4.832-15.168 11.488-22.848 20.992-9.664 12.32-15.328 25.664-20.992 40.992-5.344 12.672-9.504 25.664-12.512 39.008-4.512 33.504 4.16 67.168 23.84 94.496 20 28.672 24 30.496 30.496 63.84-9.504-29.504-16.16-32.32-37.152-57.152-23.84-27.68-27.488-67.68-27.488-100.16 0-13.344 5.664-28.672 10.496-43.008 5.664-15.168 11.328-30.336 19.008-41.824 5.664-9.504 13.344-16.16 20-20.992-24.832 6.656-50.496 16.16-66.656 29.504-40 34.496-75.328 92.512-80.16 144-3.84 42.016 34.336 103.008 88.672 133.504 45.824 26.656 56.32 56.32 65.824 104.992-13.344-42.016-26.656-78.336-70.656-100.16-62.848-34.336-95.328-89.664-92.32-143.008 4.672-67.68 31.328-114.496 85.824-151.68 12.32-8.672 29.504-17.152 47.68-23.84-67.84 16.16-76.32 25.664-99.168 52.32 0 2.016-5.824 5.824-5.824 6.656-30.496 34.336-68.512 93.504-82.016 147.84-4.672 19.008-9.504 39.008-3.68 58.176 24.672 89.664 79.008 124 133.344 160.992 13.504 9.664 26.848 18.176 39.168 27.68 30.496 24 38.176 85.824 44.832 121.152-12.32-43.008-25.824-96.32-49.664-113.504-12.32-9.504-27.68-17.152-40-25.664-56.16-38.176-112.512-74.496-138.176-166.848-5.824-24-2.016-41.152 3.68-64 14.336-56.16 52.512-117.152 84.992-153.504l5.664-5.664c14.336-16.32 32.512-28.672 54.336-37.152-19.168 4.512-37.664 11.168-55.328 20-88.672 42.848-147.68 135.328-151.488 210.656-7.68 153.504 65.824 198.336 134.336 254.656 38.176 31.328 91.68 46.656 122.176 102.848 5.664 12.512 9.504 39.168 1.824 67.84-2.848 9.504-17.152 43.84-22.848 51.488l84.832-37.344c-1.824-40-2.848-72.32 4.672-102.016 8.672-32.32 50.656-79.008 67.84-133.504 33.344-102.848 24.832-237.152 0.832-342.176z" />
|
||||
<glyph unicode="" glyph-name="wireshark" d="M729.968 781.328c-214.016-3.36-335.76-129.28-399.568-251.616-55.952-106.816-67.744-198.88-70.688-224.032l-259.712-2.576v-42.208l277.376 2.56c10.861 0.224 19.694 8.612 20.618 19.265l0.006 0.079s10.8 113.6 69.696 227.36c54.976 106.24 151.2 209.504 324.8 225.696-107.008-213.44 10.8-460.832 10.8-460.832 3.38-7.112 10.427-11.983 18.631-12.176h0.025l302.048-2.528v42.208l-287.168 2.56c-13.76 32.208-105.040 261.040 10.8 443.84 2.048 3.197 3.265 7.097 3.265 11.281 0 11.597-9.347 21.011-20.919 21.119h-0.010z" />
|
||||
</font></defs></svg>
|
||||
|
Before Width: | Height: | Size: 8.9 KiB After Width: | Height: | Size: 9.4 KiB |
BIN
dist/raspap/css/fonts/RaspAP.ttf
vendored
BIN
dist/raspap/css/fonts/RaspAP.ttf
vendored
Binary file not shown.
BIN
dist/raspap/css/fonts/RaspAP.woff
vendored
BIN
dist/raspap/css/fonts/RaspAP.woff
vendored
Binary file not shown.
34
dist/raspap/css/style.css
vendored
34
dist/raspap/css/style.css
vendored
@@ -1,16 +1,15 @@
|
||||
@font-face {
|
||||
font-family: 'RaspAP';
|
||||
src: url('fonts/RaspAP.eot?3vjloy');
|
||||
src: url('fonts/RaspAP.eot?3vjloy#iefix') format('embedded-opentype'),
|
||||
url('fonts/RaspAP.ttf?3vjloy') format('truetype'),
|
||||
url('fonts/RaspAP.woff?3vjloy') format('woff'),
|
||||
url('fonts/RaspAP.svg?3vjloy#RaspAP') format('svg');
|
||||
src: url('fonts/RaspAP.eot?8h3d6d');
|
||||
src: url('fonts/RaspAP.eot?8h3d6d#iefix') format('embedded-opentype'),
|
||||
url('fonts/RaspAP.ttf?8h3d6d') format('truetype'),
|
||||
url('fonts/RaspAP.woff?8h3d6d') format('woff'),
|
||||
url('fonts/RaspAP.svg?8h3d6d#RaspAP') format('svg');
|
||||
font-weight: normal;
|
||||
font-style: normal;
|
||||
font-display: block;
|
||||
}
|
||||
|
||||
|
||||
[class^="ra-"], [class*=" ra-"] {
|
||||
/* use !important to prevent issues with browser extensions that change fonts */
|
||||
font-family: 'RaspAP' !important;
|
||||
@@ -26,10 +25,15 @@
|
||||
-moz-osx-font-smoothing: grayscale;
|
||||
}
|
||||
|
||||
.ra-wireshark:before {
|
||||
font-size: 1.3rem;
|
||||
font-weight: bold;
|
||||
content: "\e904";
|
||||
vertical-align: bottom;
|
||||
}
|
||||
.ra-wireguard:before {
|
||||
font-size: 1.1rem;
|
||||
content: "\e900";
|
||||
vertical-align: middle;
|
||||
}
|
||||
.ra-raspap:before {
|
||||
content: "\e901";
|
||||
@@ -46,19 +50,3 @@
|
||||
content: "\e903";
|
||||
vertical-align: top;
|
||||
}
|
||||
.card-header .ra-wireguard:before,
|
||||
.card-header .ra-tailscale:before,
|
||||
.card-header .ra-torproxy:before {
|
||||
color: #fff;
|
||||
}
|
||||
|
||||
.sidebar .nav-item.active .nav-link span.ra-wireguard:before,
|
||||
.sidebar .nav-item.active .nav-link span.ra-tailscale:before,
|
||||
.sidebar .nav-item.active .nav-link span.ra-torproxy:before {
|
||||
color: #6e707e;
|
||||
}
|
||||
|
||||
.sb-nav-link-icon .ra-tailscale {
|
||||
margin-bottom: 0.4rem;
|
||||
}
|
||||
|
||||
|
||||
6
dist/sb-admin/js/scripts.js
vendored
6
dist/sb-admin/js/scripts.js
vendored
@@ -13,9 +13,9 @@ window.addEventListener('DOMContentLoaded', event => {
|
||||
const sidebarToggle = document.body.querySelector('#sidebarToggle');
|
||||
if (sidebarToggle) {
|
||||
// Uncomment below to persist sidebar toggle between refreshes
|
||||
if (localStorage.getItem('sb|sidebar-toggle') === 'true') {
|
||||
document.body.classList.toggle('sb-sidenav-toggled');
|
||||
}
|
||||
// if (localStorage.getItem('sb|sidebar-toggle') === 'true') {
|
||||
// document.body.classList.toggle('sb-sidenav-toggled');
|
||||
// }
|
||||
sidebarToggle.addEventListener('click', event => {
|
||||
event.preventDefault();
|
||||
document.body.classList.toggle('sb-sidenav-toggled');
|
||||
|
||||
14
dist/speedtest/backend/empty.php
vendored
Executable file
14
dist/speedtest/backend/empty.php
vendored
Executable file
@@ -0,0 +1,14 @@
|
||||
<?php
|
||||
|
||||
header('HTTP/1.1 200 OK');
|
||||
|
||||
if (isset($_GET['cors'])) {
|
||||
header('Access-Control-Allow-Origin: *');
|
||||
header('Access-Control-Allow-Methods: GET, POST');
|
||||
header('Access-Control-Allow-Headers: Content-Encoding, Content-Type');
|
||||
}
|
||||
|
||||
header('Cache-Control: no-store, no-cache, must-revalidate, max-age=0, s-maxage=0');
|
||||
header('Cache-Control: post-check=0, pre-check=0', false);
|
||||
header('Pragma: no-cache');
|
||||
header('Connection: keep-alive');
|
||||
66
dist/speedtest/backend/garbage.php
vendored
Executable file
66
dist/speedtest/backend/garbage.php
vendored
Executable file
@@ -0,0 +1,66 @@
|
||||
<?php
|
||||
|
||||
// Disable Compression
|
||||
@ini_set('zlib.output_compression', 'Off');
|
||||
@ini_set('output_buffering', 'Off');
|
||||
@ini_set('output_handler', '');
|
||||
|
||||
/**
|
||||
* @return int
|
||||
*/
|
||||
function getChunkCount()
|
||||
{
|
||||
if (!array_key_exists('ckSize', $_GET)
|
||||
|| !ctype_digit($_GET['ckSize'])
|
||||
|| (int) $_GET['ckSize'] <= 0
|
||||
) {
|
||||
return 4;
|
||||
}
|
||||
|
||||
if ((int) $_GET['ckSize'] > 1024) {
|
||||
return 1024;
|
||||
}
|
||||
|
||||
return (int) $_GET['ckSize'];
|
||||
}
|
||||
|
||||
/**
|
||||
* @return void
|
||||
*/
|
||||
function sendHeaders()
|
||||
{
|
||||
header('HTTP/1.1 200 OK');
|
||||
|
||||
if (isset($_GET['cors'])) {
|
||||
header('Access-Control-Allow-Origin: *');
|
||||
header('Access-Control-Allow-Methods: GET, POST');
|
||||
}
|
||||
|
||||
// Indicate a file download
|
||||
header('Content-Description: File Transfer');
|
||||
header('Content-Type: application/octet-stream');
|
||||
header('Content-Disposition: attachment; filename=random.dat');
|
||||
header('Content-Transfer-Encoding: binary');
|
||||
|
||||
// Cache settings: never cache this request
|
||||
header('Cache-Control: no-store, no-cache, must-revalidate, max-age=0, s-maxage=0');
|
||||
header('Cache-Control: post-check=0, pre-check=0', false);
|
||||
header('Pragma: no-cache');
|
||||
}
|
||||
|
||||
// Determine how much data we should send
|
||||
$chunks = getChunkCount();
|
||||
|
||||
// Generate data
|
||||
if (function_exists('random_bytes')) {
|
||||
$data = random_bytes(1048576);
|
||||
} else {
|
||||
$data = openssl_random_pseudo_bytes(1048576);
|
||||
}
|
||||
|
||||
// Deliver chunks of 1048576 bytes
|
||||
sendHeaders();
|
||||
for ($i = 0; $i < $chunks; $i++) {
|
||||
echo $data;
|
||||
flush();
|
||||
}
|
||||
325
dist/speedtest/backend/getIP.php
vendored
Executable file
325
dist/speedtest/backend/getIP.php
vendored
Executable file
@@ -0,0 +1,325 @@
|
||||
<?php
|
||||
|
||||
/*
|
||||
* This script detects the client's IP address and fetches ISP info from ipinfo.io/
|
||||
* Output from this script is a JSON string composed of 2 objects: a string called processedString which contains the combined IP, ISP, Country and distance as it can be presented to the user; and an object called rawIspInfo which contains the raw data from ipinfo.io (will be empty if isp detection is disabled).
|
||||
* Client side, the output of this script can be treated as JSON or as regular text. If the output is regular text, it will be shown to the user as is.
|
||||
*/
|
||||
|
||||
error_reporting(0);
|
||||
|
||||
define('API_KEY_FILE', 'getIP_ipInfo_apikey.php');
|
||||
define('SERVER_LOCATION_CACHE_FILE', 'getIP_serverLocation.php');
|
||||
|
||||
require_once 'getIP_util.php';
|
||||
|
||||
/**
|
||||
* @param string $ip
|
||||
*
|
||||
* @return string|null
|
||||
*/
|
||||
function getLocalOrPrivateIpInfo($ip)
|
||||
{
|
||||
// ::1/128 is the only localhost ipv6 address. there are no others, no need to strpos this
|
||||
if ('::1' === $ip) {
|
||||
return 'localhost IPv6 access';
|
||||
}
|
||||
|
||||
// simplified IPv6 link-local address (should match fe80::/10)
|
||||
if (stripos($ip, 'fe80:') === 0) {
|
||||
return 'link-local IPv6 access';
|
||||
}
|
||||
|
||||
// anything within the 127/8 range is localhost ipv4, the ip must start with 127.0
|
||||
if (strpos($ip, '127.') === 0) {
|
||||
return 'localhost IPv4 access';
|
||||
}
|
||||
|
||||
// 10/8 private IPv4
|
||||
if (strpos($ip, '10.') === 0) {
|
||||
return 'private IPv4 access';
|
||||
}
|
||||
|
||||
// 172.16/12 private IPv4
|
||||
if (preg_match('/^172\.(1[6-9]|2\d|3[01])\./', $ip) === 1) {
|
||||
return 'private IPv4 access';
|
||||
}
|
||||
|
||||
// 192.168/16 private IPv4
|
||||
if (strpos($ip, '192.168.') === 0) {
|
||||
return 'private IPv4 access';
|
||||
}
|
||||
|
||||
// IPv4 link-local
|
||||
if (strpos($ip, '169.254.') === 0) {
|
||||
return 'link-local IPv4 access';
|
||||
}
|
||||
|
||||
return null;
|
||||
}
|
||||
|
||||
/**
|
||||
* @return string
|
||||
*/
|
||||
function getIpInfoTokenString()
|
||||
{
|
||||
if (!file_exists(API_KEY_FILE)
|
||||
|| !is_readable(API_KEY_FILE)
|
||||
) {
|
||||
return '';
|
||||
}
|
||||
|
||||
include API_KEY_FILE;
|
||||
|
||||
if (empty($IPINFO_APIKEY)) {
|
||||
return '';
|
||||
}
|
||||
|
||||
return '?token='.$IPINFO_APIKEY;
|
||||
}
|
||||
|
||||
/**
|
||||
* @param string $ip
|
||||
*
|
||||
* @return array|null
|
||||
*/
|
||||
function getIspInfo($ip)
|
||||
{
|
||||
$json = file_get_contents('https://ipinfo.io/'.$ip.'/json'.getIpInfoTokenString());
|
||||
if (!is_string($json)) {
|
||||
return null;
|
||||
}
|
||||
|
||||
$data = json_decode($json, true);
|
||||
if (!is_array($data)) {
|
||||
return null;
|
||||
}
|
||||
|
||||
return $data;
|
||||
}
|
||||
|
||||
/**
|
||||
* @param array|null $rawIspInfo
|
||||
*
|
||||
* @return string
|
||||
*/
|
||||
function getIsp($rawIspInfo)
|
||||
{
|
||||
if (!is_array($rawIspInfo)
|
||||
|| !array_key_exists('org', $rawIspInfo)
|
||||
|| !is_string($rawIspInfo['org'])
|
||||
|| empty($rawIspInfo['org'])
|
||||
) {
|
||||
return 'Unknown ISP';
|
||||
}
|
||||
|
||||
// Remove AS##### from ISP name, if present
|
||||
return preg_replace('/AS\\d+\\s/', '', $rawIspInfo['org']);
|
||||
}
|
||||
|
||||
/**
|
||||
* @return string|null
|
||||
*/
|
||||
function getServerLocation()
|
||||
{
|
||||
$serverLoc = null;
|
||||
if (file_exists(SERVER_LOCATION_CACHE_FILE)
|
||||
&& is_readable(SERVER_LOCATION_CACHE_FILE)
|
||||
) {
|
||||
include SERVER_LOCATION_CACHE_FILE;
|
||||
}
|
||||
if (is_string($serverLoc) && !empty($serverLoc)) {
|
||||
return $serverLoc;
|
||||
}
|
||||
|
||||
$json = file_get_contents('https://ipinfo.io/json'.getIpInfoTokenString());
|
||||
if (!is_string($json)) {
|
||||
return null;
|
||||
}
|
||||
|
||||
$details = json_decode($json, true);
|
||||
if (!is_array($details)
|
||||
|| !array_key_exists('loc', $details)
|
||||
|| !is_string($details['loc'])
|
||||
|| empty($details['loc'])
|
||||
) {
|
||||
return null;
|
||||
}
|
||||
|
||||
$serverLoc = $details['loc'];
|
||||
$cacheData = "<?php\n\n\$serverLoc = '".addslashes($serverLoc)."';\n";
|
||||
file_put_contents(SERVER_LOCATION_CACHE_FILE, $cacheData);
|
||||
|
||||
return $serverLoc;
|
||||
}
|
||||
|
||||
/**
|
||||
* Optimized algorithm from http://www.codexworld.com
|
||||
*
|
||||
* @param float $latitudeFrom
|
||||
* @param float $longitudeFrom
|
||||
* @param float $latitudeTo
|
||||
* @param float $longitudeTo
|
||||
*
|
||||
* @return float [km]
|
||||
*/
|
||||
function distance(
|
||||
$latitudeFrom,
|
||||
$longitudeFrom,
|
||||
$latitudeTo,
|
||||
$longitudeTo
|
||||
) {
|
||||
$rad = M_PI / 180;
|
||||
$theta = $longitudeFrom - $longitudeTo;
|
||||
$dist = sin($latitudeFrom * $rad)
|
||||
* sin($latitudeTo * $rad)
|
||||
+ cos($latitudeFrom * $rad)
|
||||
* cos($latitudeTo * $rad)
|
||||
* cos($theta * $rad);
|
||||
|
||||
return acos($dist) / $rad * 60 * 1.853;
|
||||
}
|
||||
|
||||
/**
|
||||
* @param array|null $rawIspInfo
|
||||
*
|
||||
* @return string|null
|
||||
*/
|
||||
function getDistance($rawIspInfo)
|
||||
{
|
||||
if (!is_array($rawIspInfo)
|
||||
|| !array_key_exists('loc', $rawIspInfo)
|
||||
|| !isset($_GET['distance'])
|
||||
|| !in_array($_GET['distance'], ['mi', 'km'], true)
|
||||
) {
|
||||
return null;
|
||||
}
|
||||
|
||||
$unit = $_GET['distance'];
|
||||
$clientLocation = $rawIspInfo['loc'];
|
||||
$serverLocation = getServerLocation();
|
||||
|
||||
if (!is_string($serverLocation)) {
|
||||
return null;
|
||||
}
|
||||
|
||||
return calculateDistance(
|
||||
$serverLocation,
|
||||
$clientLocation,
|
||||
$unit
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* @param string $clientLocation
|
||||
* @param string $serverLocation
|
||||
* @param string $unit
|
||||
*
|
||||
* @return string
|
||||
*/
|
||||
function calculateDistance($clientLocation, $serverLocation, $unit)
|
||||
{
|
||||
list($clientLatitude, $clientLongitude) = explode(',', $clientLocation);
|
||||
list($serverLatitude, $serverLongitude) = explode(',', $serverLocation);
|
||||
$dist = distance(
|
||||
$clientLatitude,
|
||||
$clientLongitude,
|
||||
$serverLatitude,
|
||||
$serverLongitude
|
||||
);
|
||||
|
||||
if ('mi' === $unit) {
|
||||
$dist /= 1.609344;
|
||||
$dist = round($dist, -1);
|
||||
if ($dist < 15) {
|
||||
$dist = '<15';
|
||||
}
|
||||
|
||||
return $dist.' mi';
|
||||
}
|
||||
|
||||
if ('km' === $unit) {
|
||||
$dist = round($dist, -1);
|
||||
if ($dist < 20) {
|
||||
$dist = '<20';
|
||||
}
|
||||
|
||||
return $dist.' km';
|
||||
}
|
||||
|
||||
return null;
|
||||
}
|
||||
|
||||
/**
|
||||
* @return void
|
||||
*/
|
||||
function sendHeaders()
|
||||
{
|
||||
header('Content-Type: application/json; charset=utf-8');
|
||||
|
||||
if (isset($_GET['cors'])) {
|
||||
header('Access-Control-Allow-Origin: *');
|
||||
header('Access-Control-Allow-Methods: GET, POST');
|
||||
}
|
||||
|
||||
header('Cache-Control: no-store, no-cache, must-revalidate, max-age=0, s-maxage=0');
|
||||
header('Cache-Control: post-check=0, pre-check=0', false);
|
||||
header('Pragma: no-cache');
|
||||
}
|
||||
|
||||
/**
|
||||
* @param string $ip
|
||||
* @param string|null $ipInfo
|
||||
* @param string|null $distance
|
||||
* @param array|null $rawIspInfo
|
||||
*
|
||||
* @return void
|
||||
*/
|
||||
function sendResponse(
|
||||
$ip,
|
||||
$ipInfo = null,
|
||||
$distance = null,
|
||||
$rawIspInfo = null
|
||||
) {
|
||||
$processedString = $ip;
|
||||
if (is_string($ipInfo)) {
|
||||
$processedString .= ' - '.$ipInfo;
|
||||
}
|
||||
|
||||
if (is_array($rawIspInfo)
|
||||
&& array_key_exists('country', $rawIspInfo)
|
||||
) {
|
||||
$processedString .= ', '.$rawIspInfo['country'];
|
||||
}
|
||||
if (is_string($distance)) {
|
||||
$processedString .= ' ('.$distance.')';
|
||||
}
|
||||
|
||||
sendHeaders();
|
||||
echo json_encode(
|
||||
[
|
||||
'processedString' => $processedString,
|
||||
'rawIspInfo' => $rawIspInfo ?: '',
|
||||
]
|
||||
);
|
||||
}
|
||||
|
||||
$ip = getClientIp();
|
||||
|
||||
$localIpInfo = getLocalOrPrivateIpInfo($ip);
|
||||
// local ip, no need to fetch further information
|
||||
if (is_string($localIpInfo)) {
|
||||
sendResponse($ip, $localIpInfo);
|
||||
exit;
|
||||
}
|
||||
|
||||
if (!isset($_GET['isp'])) {
|
||||
sendResponse($ip);
|
||||
exit;
|
||||
}
|
||||
|
||||
$rawIspInfo = getIspInfo($ip);
|
||||
$isp = getIsp($rawIspInfo);
|
||||
$distance = getDistance($rawIspInfo);
|
||||
|
||||
sendResponse($ip, $isp, $distance, $rawIspInfo);
|
||||
4
dist/speedtest/backend/getIP_ipInfo_apikey.php
vendored
Executable file
4
dist/speedtest/backend/getIP_ipInfo_apikey.php
vendored
Executable file
@@ -0,0 +1,4 @@
|
||||
<?php
|
||||
|
||||
// put your token between the quotes if you have one
|
||||
$IPINFO_APIKEY = '';
|
||||
3
dist/speedtest/backend/getIP_serverLocation.php
vendored
Normal file
3
dist/speedtest/backend/getIP_serverLocation.php
vendored
Normal file
@@ -0,0 +1,3 @@
|
||||
<?php
|
||||
|
||||
$serverLoc = '45.9237,6.8693';
|
||||
21
dist/speedtest/backend/getIP_util.php
vendored
Executable file
21
dist/speedtest/backend/getIP_util.php
vendored
Executable file
@@ -0,0 +1,21 @@
|
||||
<?php
|
||||
|
||||
/**
|
||||
* @return string
|
||||
*/
|
||||
function getClientIp()
|
||||
{
|
||||
if (!empty($_SERVER['HTTP_CLIENT_IP'])) {
|
||||
$ip = $_SERVER['HTTP_CLIENT_IP'];
|
||||
} elseif (!empty($_SERVER['HTTP_X_REAL_IP'])) {
|
||||
$ip = $_SERVER['HTTP_X_REAL_IP'];
|
||||
} elseif (!empty($_SERVER['HTTP_X_FORWARDED_FOR'])) {
|
||||
$ip = $_SERVER['HTTP_X_FORWARDED_FOR'];
|
||||
$ip = preg_replace('/,.*/', '', $ip); // hosts are comma-separated, client is first
|
||||
} else {
|
||||
$ip = $_SERVER['REMOTE_ADDR'];
|
||||
}
|
||||
|
||||
return preg_replace('/^::ffff:/', '', $ip);
|
||||
}
|
||||
|
||||
231
dist/speedtest/speedtest.css
vendored
Normal file
231
dist/speedtest/speedtest.css
vendored
Normal file
@@ -0,0 +1,231 @@
|
||||
#testWrapper {
|
||||
text-align: center;
|
||||
}
|
||||
|
||||
#loading {
|
||||
background-color: #FFFFFF;
|
||||
color: #404040;
|
||||
text-align: center;
|
||||
}
|
||||
|
||||
span.loadCircle {
|
||||
display: inline-block;
|
||||
width: 2em;
|
||||
height: 2em;
|
||||
vertical-align: middle;
|
||||
background: url('data:image/png;base64,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');
|
||||
background-size: 2em 2em;
|
||||
margin-right: 0.5em;
|
||||
animation: spin 0.6s linear infinite;
|
||||
}
|
||||
|
||||
@keyframes spin {
|
||||
0% {
|
||||
transform: rotate(0deg);
|
||||
}
|
||||
|
||||
100% {
|
||||
transform: rotate(359deg);
|
||||
}
|
||||
}
|
||||
|
||||
#startStopBtn {
|
||||
display: inline-block;
|
||||
margin: 0 auto;
|
||||
transition: all 0.3s;
|
||||
box-sizing: border-box;
|
||||
width: 8em;
|
||||
line-height: 2.5em;
|
||||
cursor: pointer;
|
||||
}
|
||||
|
||||
#startStopBtn.running {
|
||||
background-color: #FF3030;
|
||||
border-color: #FF3030;
|
||||
color: #FFFFFF;
|
||||
line-height: 2.5em;
|
||||
}
|
||||
|
||||
#startStopBtn:before {
|
||||
content: "Start";
|
||||
}
|
||||
|
||||
#startStopBtn.running:before {
|
||||
content: "Abort";
|
||||
}
|
||||
|
||||
#serverArea {
|
||||
margin-top: 1em;
|
||||
}
|
||||
|
||||
#server {
|
||||
font-size: 1em;
|
||||
padding: 0.2em;
|
||||
}
|
||||
|
||||
#test {
|
||||
margin-top: 2em;
|
||||
margin-bottom: 1em;
|
||||
}
|
||||
|
||||
div.testArea {
|
||||
display: inline-block;
|
||||
width: 16em;
|
||||
height: 12.5em;
|
||||
position: relative;
|
||||
box-sizing: border-box;
|
||||
}
|
||||
|
||||
div.testArea2 {
|
||||
display: inline-block;
|
||||
width: 14em;
|
||||
height: 7em;
|
||||
position: relative;
|
||||
box-sizing: border-box;
|
||||
text-align: center;
|
||||
}
|
||||
|
||||
div.testArea div.testName {
|
||||
position: absolute;
|
||||
top: -0.3em;
|
||||
left: 0;
|
||||
width: 100%;
|
||||
font-size: 1.4em;
|
||||
z-index: 9;
|
||||
}
|
||||
|
||||
div.testArea2 div.testName {
|
||||
display: block;
|
||||
text-align: center;
|
||||
font-size: 1.4em;
|
||||
}
|
||||
|
||||
div.testArea div.meterText {
|
||||
position: absolute;
|
||||
bottom: 1.55em;
|
||||
left: 0;
|
||||
width: 100%;
|
||||
font-size: 2.5em;
|
||||
z-index: 9;
|
||||
}
|
||||
|
||||
div.testArea2 div.meterText {
|
||||
display: inline-block;
|
||||
font-size: 2.5em;
|
||||
}
|
||||
|
||||
div.meterText:empty:before {
|
||||
content: "0.00";
|
||||
}
|
||||
|
||||
div.testArea div.unit {
|
||||
position: absolute;
|
||||
bottom: 2em;
|
||||
left: 0;
|
||||
width: 100%;
|
||||
z-index: 9;
|
||||
}
|
||||
|
||||
div.testArea2 div.unit {
|
||||
display: inline-block;
|
||||
}
|
||||
|
||||
div.testArea canvas {
|
||||
position: absolute;
|
||||
top: 0;
|
||||
left: 0;
|
||||
width: 100%;
|
||||
height: 100%;
|
||||
z-index: 1;
|
||||
}
|
||||
|
||||
div.testGroup {
|
||||
display: block;
|
||||
margin: 0 auto;
|
||||
}
|
||||
|
||||
#shareArea {
|
||||
width: 95%;
|
||||
max-width: 40em;
|
||||
margin: 0 auto;
|
||||
margin-top: 2em;
|
||||
}
|
||||
|
||||
#shareArea>* {
|
||||
display: block;
|
||||
width: 100%;
|
||||
height: auto;
|
||||
margin: 0.25em 0;
|
||||
}
|
||||
|
||||
#privacyPolicy {
|
||||
position: fixed;
|
||||
top: 2em;
|
||||
bottom: 2em;
|
||||
left: 2em;
|
||||
right: 2em;
|
||||
overflow-y: auto;
|
||||
margin: 0 auto;
|
||||
width: 50%;
|
||||
height: auto;
|
||||
box-shadow: 0 0 3em 1em #333;
|
||||
z-index: 999999;
|
||||
text-align: left;
|
||||
background-color: #FFFFFF;
|
||||
padding: 1em;
|
||||
border-radius: 0.3em;
|
||||
color: #858796;
|
||||
}
|
||||
|
||||
#privacyPolicy h4, h5 {
|
||||
color: #212529;
|
||||
}
|
||||
|
||||
a.privacy {
|
||||
text-align: center;
|
||||
font-size: 0.8em;
|
||||
color: #808080;
|
||||
display: block;
|
||||
}
|
||||
|
||||
@media all and (max-width:40em) {
|
||||
body {
|
||||
font-size: 0.8em;
|
||||
}
|
||||
}
|
||||
|
||||
div.visible {
|
||||
animation: fadeIn 0.4s;
|
||||
display: block;
|
||||
}
|
||||
|
||||
div.hidden {
|
||||
animation: fadeOut 0.4s;
|
||||
display: none;
|
||||
}
|
||||
|
||||
div.centered {
|
||||
margin: 0 auto;
|
||||
}
|
||||
|
||||
@keyframes fadeIn {
|
||||
0% {
|
||||
opacity: 0;
|
||||
}
|
||||
|
||||
100% {
|
||||
opacity: 1;
|
||||
}
|
||||
}
|
||||
|
||||
@keyframes fadeOut {
|
||||
0% {
|
||||
display: block;
|
||||
opacity: 1;
|
||||
}
|
||||
|
||||
100% {
|
||||
display: block;
|
||||
opacity: 0;
|
||||
}
|
||||
}
|
||||
327
dist/speedtest/speedtest.js
vendored
Executable file
327
dist/speedtest/speedtest.js
vendored
Executable file
@@ -0,0 +1,327 @@
|
||||
/*
|
||||
LibreSpeed - Main
|
||||
by Federico Dossena
|
||||
https://github.com/librespeed/speedtest/
|
||||
GNU LGPLv3 License
|
||||
*/
|
||||
|
||||
function Speedtest() {
|
||||
this._serverList = []; //when using multiple points of test, this is a list of test points
|
||||
this._selectedServer = null; //when using multiple points of test, this is the selected server
|
||||
this._settings = {}; //settings for the speedtest worker
|
||||
this._state = 0; //0=adding settings, 1=adding servers, 2=server selection done, 3=test running, 4=done
|
||||
}
|
||||
|
||||
Speedtest.prototype = {
|
||||
constructor: Speedtest,
|
||||
/**
|
||||
* Returns the state of the test: 0=adding settings, 1=adding servers, 2=server selection done, 3=test running, 4=done
|
||||
*/
|
||||
getState: function() {
|
||||
return this._state;
|
||||
},
|
||||
/**
|
||||
* Change one of the test settings from their defaults.
|
||||
* - parameter: string with the name of the parameter that you want to set
|
||||
* - value: new value for the parameter
|
||||
*
|
||||
* Invalid values or nonexistant parameters will be ignored by the speedtest worker.
|
||||
*/
|
||||
setParameter: function(parameter, value) {
|
||||
if (this._state == 3)
|
||||
throw "You cannot change the test settings while running the test";
|
||||
this._settings[parameter] = value;
|
||||
if(parameter === "telemetry_extra"){
|
||||
this._originalExtra=this._settings.telemetry_extra;
|
||||
}
|
||||
},
|
||||
/**
|
||||
* Used internally to check if a server object contains all the required elements.
|
||||
* Also fixes the server URL if needed.
|
||||
*/
|
||||
_checkServerDefinition: function(server) {
|
||||
try {
|
||||
if (typeof server.name !== "string")
|
||||
throw "Name string missing from server definition (name)";
|
||||
if (typeof server.server !== "string")
|
||||
throw "Server address string missing from server definition (server)";
|
||||
if (server.server.charAt(server.server.length - 1) != "/")
|
||||
server.server += "/";
|
||||
if (server.server.indexOf("//") == 0)
|
||||
server.server = location.protocol + server.server;
|
||||
if (typeof server.dlURL !== "string")
|
||||
throw "Download URL string missing from server definition (dlURL)";
|
||||
if (typeof server.ulURL !== "string")
|
||||
throw "Upload URL string missing from server definition (ulURL)";
|
||||
if (typeof server.pingURL !== "string")
|
||||
throw "Ping URL string missing from server definition (pingURL)";
|
||||
if (typeof server.getIpURL !== "string")
|
||||
throw "GetIP URL string missing from server definition (getIpURL)";
|
||||
} catch (e) {
|
||||
throw "Invalid server definition";
|
||||
}
|
||||
},
|
||||
/**
|
||||
* Add a test point (multiple points of test)
|
||||
* server: the server to be added as an object. Defined in app/js/speedtestUI.js
|
||||
*/
|
||||
addTestPoint: function(server) {
|
||||
this._checkServerDefinition(server);
|
||||
if (this._state == 0) this._state = 1;
|
||||
if (this._state != 1) throw "You can't add a server after server selection";
|
||||
this._settings.mpot = true;
|
||||
this._serverList.push(server);
|
||||
},
|
||||
/**
|
||||
* Same as addTestPoint, but you can pass an array of servers
|
||||
*/
|
||||
addTestPoints: function(list) {
|
||||
for (var i = 0; i < list.length; i++) this.addTestPoint(list[i]);
|
||||
},
|
||||
/**
|
||||
* Load a JSON server list from URL (multiple points of test)
|
||||
* url: the url where the server list can be fetched. Must be an array with objects containing the following elements:
|
||||
* result: callback to be called when the list is loaded correctly. An array with the loaded servers will be passed to this function, or null if it failed
|
||||
*/
|
||||
loadServerList: function(url,result) {
|
||||
if (this._state == 0) this._state = 1;
|
||||
if (this._state != 1) throw "You can't add a server after server selection";
|
||||
this._settings.mpot = true;
|
||||
var xhr = new XMLHttpRequest();
|
||||
xhr.onload = function(){
|
||||
try{
|
||||
var servers=JSON.parse(xhr.responseText);
|
||||
for(var i=0;i<servers.length;i++){
|
||||
this._checkServerDefinition(servers[i]);
|
||||
}
|
||||
this.addTestPoints(servers);
|
||||
result(servers);
|
||||
}catch(e){
|
||||
result(null);
|
||||
}
|
||||
}.bind(this);
|
||||
xhr.onerror = function(){result(null);}
|
||||
xhr.open("GET",url);
|
||||
xhr.send();
|
||||
},
|
||||
/**
|
||||
* Returns the selected server (multiple points of test)
|
||||
*/
|
||||
getSelectedServer: function() {
|
||||
if (this._state < 2 || this._selectedServer == null)
|
||||
throw "No server is selected";
|
||||
return this._selectedServer;
|
||||
},
|
||||
/**
|
||||
* Manually selects one of the test points (multiple points of test)
|
||||
*/
|
||||
setSelectedServer: function(server) {
|
||||
this._checkServerDefinition(server);
|
||||
if (this._state == 3)
|
||||
throw "You can't select a server while the test is running";
|
||||
this._selectedServer = server;
|
||||
this._state = 2;
|
||||
},
|
||||
/**
|
||||
* Automatically selects a server from the list of added test points. The server with the lowest ping will be chosen. (multiple points of test)
|
||||
* The process is asynchronous and the passed result callback function will be called when it's done, then the test can be started.
|
||||
*/
|
||||
selectServer: function(result) {
|
||||
if (this._state != 1) {
|
||||
if (this._state == 0) throw "No test points added";
|
||||
if (this._state == 2) throw "Server already selected";
|
||||
if (this._state >= 3)
|
||||
throw "You can't select a server while the test is running";
|
||||
}
|
||||
if (this._selectServerCalled) throw "selectServer already called"; else this._selectServerCalled=true;
|
||||
/*this function goes through a list of servers. For each server, the ping is measured, then the server with the function selected is called with the best server, or null if all the servers were down.
|
||||
*/
|
||||
var select = function(serverList, selected) {
|
||||
//pings the specified URL, then calls the function result. Result will receive a parameter which is either the time it took to ping the URL, or -1 if something went wrong.
|
||||
var PING_TIMEOUT = 2000;
|
||||
var USE_PING_TIMEOUT = true; //will be disabled on unsupported browsers
|
||||
if (/MSIE.(\d+\.\d+)/i.test(navigator.userAgent)) {
|
||||
//IE11 doesn't support XHR timeout
|
||||
USE_PING_TIMEOUT = false;
|
||||
}
|
||||
var ping = function(url, rtt) {
|
||||
url += (url.match(/\?/) ? "&" : "?") + "cors=true";
|
||||
var xhr = new XMLHttpRequest();
|
||||
var t = new Date().getTime();
|
||||
xhr.onload = function() {
|
||||
if (xhr.responseText.length == 0) {
|
||||
//we expect an empty response
|
||||
var instspd = new Date().getTime() - t; //rough timing estimate
|
||||
try {
|
||||
//try to get more accurate timing using performance API
|
||||
var p = performance.getEntriesByName(url);
|
||||
p = p[p.length - 1];
|
||||
var d = p.responseStart - p.requestStart;
|
||||
if (d <= 0) d = p.duration;
|
||||
if (d > 0 && d < instspd) instspd = d;
|
||||
} catch (e) {}
|
||||
rtt(instspd);
|
||||
} else rtt(-1);
|
||||
}.bind(this);
|
||||
xhr.onerror = function() {
|
||||
rtt(-1);
|
||||
}.bind(this);
|
||||
xhr.open("GET", url);
|
||||
if (USE_PING_TIMEOUT) {
|
||||
try {
|
||||
xhr.timeout = PING_TIMEOUT;
|
||||
xhr.ontimeout = xhr.onerror;
|
||||
} catch (e) {}
|
||||
}
|
||||
xhr.send();
|
||||
}.bind(this);
|
||||
|
||||
/**
|
||||
* This function repeatedly pings a server to get a good estimate of the ping. When it's done, it calls the done function without parameters.
|
||||
* At the end of the execution, the server will have a new parameter called pingT, which is either the best ping we got from the server or -1 if something went wrong.
|
||||
*/
|
||||
var PINGS = 3, //up to 3 pings are performed, unless the server is down...
|
||||
SLOW_THRESHOLD = 500; //...or one of the pings is above this threshold
|
||||
var checkServer = function(server, done) {
|
||||
var i = 0;
|
||||
server.pingT = -1;
|
||||
if (server.server.indexOf(location.protocol) == -1) done();
|
||||
else {
|
||||
var nextPing = function() {
|
||||
if (i++ == PINGS) {
|
||||
done();
|
||||
return;
|
||||
}
|
||||
ping(
|
||||
server.server + server.pingURL,
|
||||
function(t) {
|
||||
if (t >= 0) {
|
||||
if (t < server.pingT || server.pingT == -1) server.pingT = t;
|
||||
if (t < SLOW_THRESHOLD) nextPing();
|
||||
else done();
|
||||
} else done();
|
||||
}.bind(this)
|
||||
);
|
||||
}.bind(this);
|
||||
nextPing();
|
||||
}
|
||||
}.bind(this);
|
||||
//check servers in list, one by one
|
||||
var i = 0;
|
||||
var done = function() {
|
||||
var bestServer = null;
|
||||
for (var i = 0; i < serverList.length; i++) {
|
||||
if (
|
||||
serverList[i].pingT != -1 &&
|
||||
(bestServer == null || serverList[i].pingT < bestServer.pingT)
|
||||
)
|
||||
bestServer = serverList[i];
|
||||
}
|
||||
selected(bestServer);
|
||||
}.bind(this);
|
||||
var nextServer = function() {
|
||||
if (i == serverList.length) {
|
||||
done();
|
||||
return;
|
||||
}
|
||||
checkServer(serverList[i++], nextServer);
|
||||
}.bind(this);
|
||||
nextServer();
|
||||
}.bind(this);
|
||||
|
||||
//parallel server selection
|
||||
var CONCURRENCY = 6;
|
||||
var serverLists = [];
|
||||
for (var i = 0; i < CONCURRENCY; i++) {
|
||||
serverLists[i] = [];
|
||||
}
|
||||
for (var i = 0; i < this._serverList.length; i++) {
|
||||
serverLists[i % CONCURRENCY].push(this._serverList[i]);
|
||||
}
|
||||
var completed = 0;
|
||||
var bestServer = null;
|
||||
for (var i = 0; i < CONCURRENCY; i++) {
|
||||
select(
|
||||
serverLists[i],
|
||||
function(server) {
|
||||
if (server != null) {
|
||||
if (bestServer == null || server.pingT < bestServer.pingT)
|
||||
bestServer = server;
|
||||
}
|
||||
completed++;
|
||||
if (completed == CONCURRENCY) {
|
||||
this._selectedServer = bestServer;
|
||||
this._state = 2;
|
||||
if (result) result(bestServer);
|
||||
}
|
||||
}.bind(this)
|
||||
);
|
||||
}
|
||||
},
|
||||
/**
|
||||
* Starts the test.
|
||||
* During the test, the onupdate(data) callback function will be called periodically with data from the worker.
|
||||
* At the end of the test, the onend(aborted) function will be called with a boolean telling you if the test was aborted or if it ended normally.
|
||||
*/
|
||||
start: function() {
|
||||
if (this._state == 3) throw "Test already running";
|
||||
this.worker = new Worker("dist/speedtest/speedtest_worker.js?r=" + Math.random());
|
||||
this.worker.onmessage = function(e) {
|
||||
if (e.data === this._prevData) return;
|
||||
else this._prevData = e.data;
|
||||
var data = JSON.parse(e.data);
|
||||
try {
|
||||
if (this.onupdate) this.onupdate(data);
|
||||
} catch (e) {
|
||||
console.error("Speedtest onupdate event threw exception: " + e);
|
||||
}
|
||||
if (data.testState >= 4) {
|
||||
clearInterval(this.updater);
|
||||
this._state = 4;
|
||||
try {
|
||||
if (this.onend) this.onend(data.testState == 5);
|
||||
} catch (e) {
|
||||
console.error("Speedtest onend event threw exception: " + e);
|
||||
}
|
||||
}
|
||||
}.bind(this);
|
||||
this.updater = setInterval(
|
||||
function() {
|
||||
this.worker.postMessage("status");
|
||||
}.bind(this),
|
||||
200
|
||||
);
|
||||
|
||||
if (this._state == 1)
|
||||
throw "When using multiple points of test, you must call selectServer before starting the test";
|
||||
if (this._state == 2) {
|
||||
this._settings.url_dl =
|
||||
this._selectedServer.server + this._selectedServer.dlURL;
|
||||
this._settings.url_ul =
|
||||
this._selectedServer.server + this._selectedServer.ulURL;
|
||||
this._settings.url_ping =
|
||||
this._selectedServer.server + this._selectedServer.pingURL;
|
||||
this._settings.url_getIp =
|
||||
this._selectedServer.server + this._selectedServer.getIpURL;
|
||||
if (typeof this._originalExtra !== "undefined") {
|
||||
this._settings.telemetry_extra = JSON.stringify({
|
||||
server: this._selectedServer.name,
|
||||
extra: this._originalExtra
|
||||
});
|
||||
} else
|
||||
this._settings.telemetry_extra = JSON.stringify({
|
||||
server: this._selectedServer.name
|
||||
});
|
||||
}
|
||||
this._state = 3;
|
||||
this.worker.postMessage("start " + JSON.stringify(this._settings));
|
||||
},
|
||||
/**
|
||||
* Aborts the test while it's running.
|
||||
*/
|
||||
abort: function() {
|
||||
if (this._state < 3) throw "You cannot abort a test that's not started yet";
|
||||
if (this._state < 4) this.worker.postMessage("abort");
|
||||
}
|
||||
};
|
||||
|
||||
725
dist/speedtest/speedtest_worker.js
vendored
Executable file
725
dist/speedtest/speedtest_worker.js
vendored
Executable file
@@ -0,0 +1,725 @@
|
||||
/*
|
||||
LibreSpeed - Worker
|
||||
by Federico Dossena
|
||||
https://github.com/librespeed/speedtest/
|
||||
GNU LGPLv3 License
|
||||
*/
|
||||
|
||||
// data reported to main thread
|
||||
var testState = -1; // -1=not started, 0=starting, 1=download test, 2=ping+jitter test, 3=upload test, 4=finished, 5=abort
|
||||
var dlStatus = ""; // download speed in megabit/s with 2 decimal digits
|
||||
var ulStatus = ""; // upload speed in megabit/s with 2 decimal digits
|
||||
var pingStatus = ""; // ping in milliseconds with 2 decimal digits
|
||||
var jitterStatus = ""; // jitter in milliseconds with 2 decimal digits
|
||||
var clientIp = ""; // client's IP address as reported by getIP.php
|
||||
var dlProgress = 0; //progress of download test 0-1
|
||||
var ulProgress = 0; //progress of upload test 0-1
|
||||
var pingProgress = 0; //progress of ping+jitter test 0-1
|
||||
var testId = null; //test ID (sent back by telemetry if used, null otherwise)
|
||||
|
||||
var log = ""; //telemetry log
|
||||
function tlog(s) {
|
||||
if (settings.telemetry_level >= 2) {
|
||||
log += Date.now() + ": " + s + "\n";
|
||||
}
|
||||
}
|
||||
function tverb(s) {
|
||||
if (settings.telemetry_level >= 3) {
|
||||
log += Date.now() + ": " + s + "\n";
|
||||
}
|
||||
}
|
||||
function twarn(s) {
|
||||
if (settings.telemetry_level >= 2) {
|
||||
log += Date.now() + " WARN: " + s + "\n";
|
||||
}
|
||||
console.warn(s);
|
||||
}
|
||||
|
||||
// test settings. can be overridden by sending specific values with the start command
|
||||
var settings = {
|
||||
mpot: true, //set to true when in MPOT mode
|
||||
test_order: "IP_D_U", //order in which tests will be performed as a string. D=Download, U=Upload, P=Ping+Jitter, I=IP, _=1 second delay
|
||||
time_ul_max: 15, // max duration of upload test in seconds
|
||||
time_dl_max: 15, // max duration of download test in seconds
|
||||
time_auto: true, // if set to true, tests will take less time on faster connections
|
||||
time_ulGraceTime: 3, //time to wait in seconds before actually measuring ul speed (wait for buffers to fill)
|
||||
time_dlGraceTime: 1.5, //time to wait in seconds before actually measuring dl speed (wait for TCP window to increase)
|
||||
count_ping: 10, // number of pings to perform in ping test
|
||||
url_dl: "backend/garbage.php", // path to a large file or garbage.php, used for download test. must be relative to this js file
|
||||
url_ul: "backend/empty.php", // path to an empty file, used for upload test. must be relative to this js file
|
||||
url_ping: "backend/empty.php", // path to an empty file, used for ping test. must be relative to this js file
|
||||
url_getIp: "backend/getIP.php", // path to getIP.php relative to this js file, or a similar thing that outputs the client's ip
|
||||
getIp_ispInfo: true, //if set to true, the server will include ISP info with the IP address
|
||||
getIp_ispInfo_distance: "km", //km or mi=estimate distance from server in km/mi; set to false to disable distance estimation. getIp_ispInfo must be enabled in order for this to work
|
||||
xhr_dlMultistream: 6, // number of download streams to use (can be different if enable_quirks is active)
|
||||
xhr_ulMultistream: 3, // number of upload streams to use (can be different if enable_quirks is active)
|
||||
xhr_multistreamDelay: 300, //how much concurrent requests should be delayed
|
||||
xhr_ignoreErrors: 1, // 0=fail on errors, 1=attempt to restart a stream if it fails, 2=ignore all errors
|
||||
xhr_dlUseBlob: false, // if set to true, it reduces ram usage but uses the hard drive (useful with large garbagePhp_chunkSize and/or high xhr_dlMultistream)
|
||||
xhr_ul_blob_megabytes: 20, //size in megabytes of the upload blobs sent in the upload test (forced to 4 on chrome mobile)
|
||||
garbagePhp_chunkSize: 100, // size of chunks sent by garbage.php (can be different if enable_quirks is active)
|
||||
enable_quirks: true, // enable quirks for specific browsers. currently it overrides settings to optimize for specific browsers, unless they are already being overridden with the start command
|
||||
ping_allowPerformanceApi: true, // if enabled, the ping test will attempt to calculate the ping more precisely using the Performance API. Currently works perfectly in Chrome, badly in Edge, and not at all in Firefox. If Performance API is not supported or the result is obviously wrong, a fallback is provided.
|
||||
overheadCompensationFactor: 1.06, //can be changed to compensatie for transport overhead. (see doc.md for some other values)
|
||||
useMebibits: false, //if set to true, speed will be reported in mebibits/s instead of megabits/s
|
||||
telemetry_level: 1, // 0=disabled, 1=basic (results only), 2=full (results and timing) 3=debug (results+log)
|
||||
url_telemetry: "https://speedtest.raspap.com/results/telemetry.php", // path to the script that adds telemetry data to the database
|
||||
telemetry_extra: "", //extra data that can be passed to the telemetry through the settings
|
||||
forceIE11Workaround: false //when set to true, it will foce the IE11 upload test on all browsers. Debug only
|
||||
};
|
||||
|
||||
var xhr = null; // array of currently active xhr requests
|
||||
var interval = null; // timer used in tests
|
||||
var test_pointer = 0; //pointer to the next test to run inside settings.test_order
|
||||
|
||||
/*
|
||||
this function is used on URLs passed in the settings to determine whether we need a ? or an & as a separator
|
||||
*/
|
||||
function url_sep(url) {
|
||||
return url.match(/\?/) ? "&" : "?";
|
||||
}
|
||||
|
||||
/*
|
||||
listener for commands from main thread to this worker.
|
||||
commands:
|
||||
-status: returns the current status as a JSON string containing testState, dlStatus, ulStatus, pingStatus, clientIp, jitterStatus, dlProgress, ulProgress, pingProgress
|
||||
-abort: aborts the current test
|
||||
-start: starts the test. optionally, settings can be passed as JSON.
|
||||
example: start {"time_ul_max":"10", "time_dl_max":"10", "count_ping":"50"}
|
||||
*/
|
||||
this.addEventListener("message", function(e) {
|
||||
var params = e.data.split(" ");
|
||||
if (params[0] === "status") {
|
||||
// return status
|
||||
postMessage(
|
||||
JSON.stringify({
|
||||
testState: testState,
|
||||
dlStatus: dlStatus,
|
||||
ulStatus: ulStatus,
|
||||
pingStatus: pingStatus,
|
||||
clientIp: clientIp,
|
||||
jitterStatus: jitterStatus,
|
||||
dlProgress: dlProgress,
|
||||
ulProgress: ulProgress,
|
||||
pingProgress: pingProgress,
|
||||
testId: testId
|
||||
})
|
||||
);
|
||||
}
|
||||
if (params[0] === "start" && testState === -1) {
|
||||
// start new test
|
||||
testState = 0;
|
||||
try {
|
||||
// parse settings, if present
|
||||
var s = {};
|
||||
try {
|
||||
var ss = e.data.substring(5);
|
||||
if (ss) s = JSON.parse(ss);
|
||||
} catch (e) {
|
||||
twarn("Error parsing custom settings JSON. Please check your syntax");
|
||||
}
|
||||
//copy custom settings
|
||||
for (var key in s) {
|
||||
if (typeof settings[key] !== "undefined") settings[key] = s[key];
|
||||
else twarn("Unknown setting ignored: " + key);
|
||||
}
|
||||
var ua = navigator.userAgent;
|
||||
// quirks for specific browsers. apply only if not overridden. more may be added in future releases
|
||||
if (settings.enable_quirks || (typeof s.enable_quirks !== "undefined" && s.enable_quirks)) {
|
||||
if (/Firefox.(\d+\.\d+)/i.test(ua)) {
|
||||
if (typeof s.ping_allowPerformanceApi === "undefined") {
|
||||
// ff performance API sucks
|
||||
settings.ping_allowPerformanceApi = false;
|
||||
}
|
||||
}
|
||||
if (/Edge.(\d+\.\d+)/i.test(ua)) {
|
||||
if (typeof s.xhr_dlMultistream === "undefined") {
|
||||
// edge more precise with 3 download streams
|
||||
settings.xhr_dlMultistream = 3;
|
||||
}
|
||||
}
|
||||
if (/Chrome.(\d+)/i.test(ua) && !!self.fetch) {
|
||||
if (typeof s.xhr_dlMultistream === "undefined") {
|
||||
// chrome more precise with 5 streams
|
||||
settings.xhr_dlMultistream = 5;
|
||||
}
|
||||
}
|
||||
}
|
||||
if (/Edge.(\d+\.\d+)/i.test(ua)) {
|
||||
//Edge 15 introduced a bug that causes onprogress events to not get fired, we have to use the "small chunks" workaround that reduces accuracy
|
||||
settings.forceIE11Workaround = true;
|
||||
}
|
||||
if (/PlayStation 4.(\d+\.\d+)/i.test(ua)) {
|
||||
//PS4 browser has the same bug as IE11/Edge
|
||||
settings.forceIE11Workaround = true;
|
||||
}
|
||||
if (/Chrome.(\d+)/i.test(ua) && /Android|iPhone|iPad|iPod|Windows Phone/i.test(ua)) {
|
||||
//cheap af
|
||||
//Chrome mobile introduced a limitation somewhere around version 65, we have to limit XHR upload size to 4 megabytes
|
||||
settings.xhr_ul_blob_megabytes = 4;
|
||||
}
|
||||
if (/^((?!chrome|android|crios|fxios).)*safari/i.test(ua)) {
|
||||
//Safari also needs the IE11 workaround but only for the MPOT version
|
||||
settings.forceIE11Workaround = true;
|
||||
}
|
||||
//telemetry_level has to be parsed and not just copied
|
||||
if (typeof s.telemetry_level !== "undefined") settings.telemetry_level = s.telemetry_level === "basic" ? 1 : s.telemetry_level === "full" ? 2 : s.telemetry_level === "debug" ? 3 : 0; // telemetry level
|
||||
//transform test_order to uppercase, just in case
|
||||
settings.test_order = settings.test_order.toUpperCase();
|
||||
} catch (e) {
|
||||
twarn("Possible error in custom test settings. Some settings might not have been applied. Exception: " + e);
|
||||
}
|
||||
// run the tests
|
||||
tverb(JSON.stringify(settings));
|
||||
test_pointer = 0;
|
||||
var iRun = false,
|
||||
dRun = false,
|
||||
uRun = false,
|
||||
pRun = false;
|
||||
var runNextTest = function() {
|
||||
if (testState == 5) return;
|
||||
if (test_pointer >= settings.test_order.length) {
|
||||
//test is finished
|
||||
if (settings.telemetry_level > 0)
|
||||
sendTelemetry(function(id) {
|
||||
testState = 4;
|
||||
if (id != null) testId = id;
|
||||
});
|
||||
else testState = 4;
|
||||
return;
|
||||
}
|
||||
switch (settings.test_order.charAt(test_pointer)) {
|
||||
case "I":
|
||||
{
|
||||
test_pointer++;
|
||||
if (iRun) {
|
||||
runNextTest();
|
||||
return;
|
||||
} else iRun = true;
|
||||
getIp(runNextTest);
|
||||
}
|
||||
break;
|
||||
case "D":
|
||||
{
|
||||
test_pointer++;
|
||||
if (dRun) {
|
||||
runNextTest();
|
||||
return;
|
||||
} else dRun = true;
|
||||
testState = 1;
|
||||
dlTest(runNextTest);
|
||||
}
|
||||
break;
|
||||
case "U":
|
||||
{
|
||||
test_pointer++;
|
||||
if (uRun) {
|
||||
runNextTest();
|
||||
return;
|
||||
} else uRun = true;
|
||||
testState = 3;
|
||||
ulTest(runNextTest);
|
||||
}
|
||||
break;
|
||||
case "P":
|
||||
{
|
||||
test_pointer++;
|
||||
if (pRun) {
|
||||
runNextTest();
|
||||
return;
|
||||
} else pRun = true;
|
||||
testState = 2;
|
||||
pingTest(runNextTest);
|
||||
}
|
||||
break;
|
||||
case "_":
|
||||
{
|
||||
test_pointer++;
|
||||
setTimeout(runNextTest, 1000);
|
||||
}
|
||||
break;
|
||||
default:
|
||||
test_pointer++;
|
||||
}
|
||||
};
|
||||
runNextTest();
|
||||
}
|
||||
if (params[0] === "abort") {
|
||||
// abort command
|
||||
if (testState >= 4) return;
|
||||
tlog("manually aborted");
|
||||
clearRequests(); // stop all xhr activity
|
||||
runNextTest = null;
|
||||
if (interval) clearInterval(interval); // clear timer if present
|
||||
if (settings.telemetry_level > 1) sendTelemetry(function() {});
|
||||
testState = 5; //set test as aborted
|
||||
dlStatus = "";
|
||||
ulStatus = "";
|
||||
pingStatus = "";
|
||||
jitterStatus = "";
|
||||
clientIp = "";
|
||||
dlProgress = 0;
|
||||
ulProgress = 0;
|
||||
pingProgress = 0;
|
||||
}
|
||||
});
|
||||
// stops all XHR activity, aggressively
|
||||
function clearRequests() {
|
||||
tverb("stopping pending XHRs");
|
||||
if (xhr) {
|
||||
for (var i = 0; i < xhr.length; i++) {
|
||||
try {
|
||||
xhr[i].onprogress = null;
|
||||
xhr[i].onload = null;
|
||||
xhr[i].onerror = null;
|
||||
} catch (e) {}
|
||||
try {
|
||||
xhr[i].upload.onprogress = null;
|
||||
xhr[i].upload.onload = null;
|
||||
xhr[i].upload.onerror = null;
|
||||
} catch (e) {}
|
||||
try {
|
||||
xhr[i].abort();
|
||||
} catch (e) {}
|
||||
try {
|
||||
delete xhr[i];
|
||||
} catch (e) {}
|
||||
}
|
||||
xhr = null;
|
||||
}
|
||||
}
|
||||
// gets client's IP using url_getIp, then calls the done function
|
||||
var ipCalled = false; // used to prevent multiple accidental calls to getIp
|
||||
var ispInfo = ""; //used for telemetry
|
||||
function getIp(done) {
|
||||
tverb("getIp");
|
||||
if (ipCalled) return;
|
||||
else ipCalled = true; // getIp already called?
|
||||
var startT = new Date().getTime();
|
||||
xhr = new XMLHttpRequest();
|
||||
xhr.onload = function() {
|
||||
tlog("IP: " + xhr.responseText + ", took " + (new Date().getTime() - startT) + "ms");
|
||||
try {
|
||||
var data = JSON.parse(xhr.responseText);
|
||||
clientIp = data.processedString;
|
||||
ispInfo = data.rawIspInfo;
|
||||
} catch (e) {
|
||||
clientIp = xhr.responseText;
|
||||
ispInfo = "";
|
||||
}
|
||||
done();
|
||||
};
|
||||
xhr.onerror = function() {
|
||||
tlog("getIp failed, took " + (new Date().getTime() - startT) + "ms");
|
||||
done();
|
||||
};
|
||||
xhr.open("GET", settings.url_getIp + url_sep(settings.url_getIp) + (settings.mpot ? "cors=true&" : "") + (settings.getIp_ispInfo ? "isp=true" + (settings.getIp_ispInfo_distance ? "&distance=" + settings.getIp_ispInfo_distance + "&" : "&") : "&") + "r=" + Math.random(), true);
|
||||
xhr.send();
|
||||
}
|
||||
// download test, calls done function when it's over
|
||||
var dlCalled = false; // used to prevent multiple accidental calls to dlTest
|
||||
function dlTest(done) {
|
||||
tverb("dlTest");
|
||||
if (dlCalled) return;
|
||||
else dlCalled = true; // dlTest already called?
|
||||
var totLoaded = 0.0, // total number of loaded bytes
|
||||
startT = new Date().getTime(), // timestamp when test was started
|
||||
bonusT = 0, //how many milliseconds the test has been shortened by (higher on faster connections)
|
||||
graceTimeDone = false, //set to true after the grace time is past
|
||||
failed = false; // set to true if a stream fails
|
||||
xhr = [];
|
||||
// function to create a download stream. streams are slightly delayed so that they will not end at the same time
|
||||
var testStream = function(i, delay) {
|
||||
setTimeout(
|
||||
function() {
|
||||
if (testState !== 1) return; // delayed stream ended up starting after the end of the download test
|
||||
tverb("dl test stream started " + i + " " + delay);
|
||||
var prevLoaded = 0; // number of bytes loaded last time onprogress was called
|
||||
var x = new XMLHttpRequest();
|
||||
xhr[i] = x;
|
||||
xhr[i].onprogress = function(event) {
|
||||
tverb("dl stream progress event " + i + " " + event.loaded);
|
||||
if (testState !== 1) {
|
||||
try {
|
||||
x.abort();
|
||||
} catch (e) {}
|
||||
} // just in case this XHR is still running after the download test
|
||||
// progress event, add number of new loaded bytes to totLoaded
|
||||
var loadDiff = event.loaded <= 0 ? 0 : event.loaded - prevLoaded;
|
||||
if (isNaN(loadDiff) || !isFinite(loadDiff) || loadDiff < 0) return; // just in case
|
||||
totLoaded += loadDiff;
|
||||
prevLoaded = event.loaded;
|
||||
}.bind(this);
|
||||
xhr[i].onload = function() {
|
||||
// the large file has been loaded entirely, start again
|
||||
tverb("dl stream finished " + i);
|
||||
try {
|
||||
xhr[i].abort();
|
||||
} catch (e) {} // reset the stream data to empty ram
|
||||
testStream(i, 0);
|
||||
}.bind(this);
|
||||
xhr[i].onerror = function() {
|
||||
// error
|
||||
tverb("dl stream failed " + i);
|
||||
if (settings.xhr_ignoreErrors === 0) failed = true; //abort
|
||||
try {
|
||||
xhr[i].abort();
|
||||
} catch (e) {}
|
||||
delete xhr[i];
|
||||
if (settings.xhr_ignoreErrors === 1) testStream(i, 0); //restart stream
|
||||
}.bind(this);
|
||||
// send xhr
|
||||
try {
|
||||
if (settings.xhr_dlUseBlob) xhr[i].responseType = "blob";
|
||||
else xhr[i].responseType = "arraybuffer";
|
||||
} catch (e) {}
|
||||
xhr[i].open("GET", settings.url_dl + url_sep(settings.url_dl) + (settings.mpot ? "cors=true&" : "") + "r=" + Math.random() + "&ckSize=" + settings.garbagePhp_chunkSize, true); // random string to prevent caching
|
||||
xhr[i].send();
|
||||
}.bind(this),
|
||||
1 + delay
|
||||
);
|
||||
}.bind(this);
|
||||
// open streams
|
||||
for (var i = 0; i < settings.xhr_dlMultistream; i++) {
|
||||
testStream(i, settings.xhr_multistreamDelay * i);
|
||||
}
|
||||
// every 200ms, update dlStatus
|
||||
interval = setInterval(
|
||||
function() {
|
||||
tverb("DL: " + dlStatus + (graceTimeDone ? "" : " (in grace time)"));
|
||||
var t = new Date().getTime() - startT;
|
||||
if (graceTimeDone) dlProgress = (t + bonusT) / (settings.time_dl_max * 1000);
|
||||
if (t < 200) return;
|
||||
if (!graceTimeDone) {
|
||||
if (t > 1000 * settings.time_dlGraceTime) {
|
||||
if (totLoaded > 0) {
|
||||
// if the connection is so slow that we didn't get a single chunk yet, do not reset
|
||||
startT = new Date().getTime();
|
||||
bonusT = 0;
|
||||
totLoaded = 0.0;
|
||||
}
|
||||
graceTimeDone = true;
|
||||
}
|
||||
} else {
|
||||
var speed = totLoaded / (t / 1000.0);
|
||||
if (settings.time_auto) {
|
||||
//decide how much to shorten the test. Every 200ms, the test is shortened by the bonusT calculated here
|
||||
var bonus = (5.0 * speed) / 100000;
|
||||
bonusT += bonus > 400 ? 400 : bonus;
|
||||
}
|
||||
//update status
|
||||
dlStatus = ((speed * 8 * settings.overheadCompensationFactor) / (settings.useMebibits ? 1048576 : 1000000)).toFixed(2); // speed is multiplied by 8 to go from bytes to bits, overhead compensation is applied, then everything is divided by 1048576 or 1000000 to go to megabits/mebibits
|
||||
if ((t + bonusT) / 1000.0 > settings.time_dl_max || failed) {
|
||||
// test is over, stop streams and timer
|
||||
if (failed || isNaN(dlStatus)) dlStatus = "Fail";
|
||||
clearRequests();
|
||||
clearInterval(interval);
|
||||
dlProgress = 1;
|
||||
tlog("dlTest: " + dlStatus + ", took " + (new Date().getTime() - startT) + "ms");
|
||||
done();
|
||||
}
|
||||
}
|
||||
}.bind(this),
|
||||
200
|
||||
);
|
||||
}
|
||||
// upload test, calls done function whent it's over
|
||||
var ulCalled = false; // used to prevent multiple accidental calls to ulTest
|
||||
function ulTest(done) {
|
||||
tverb("ulTest");
|
||||
if (ulCalled) return;
|
||||
else ulCalled = true; // ulTest already called?
|
||||
// garbage data for upload test
|
||||
var r = new ArrayBuffer(1048576);
|
||||
var maxInt = Math.pow(2, 32) - 1;
|
||||
try {
|
||||
r = new Uint32Array(r);
|
||||
for (var i = 0; i < r.length; i++) r[i] = Math.random() * maxInt;
|
||||
} catch (e) {}
|
||||
var req = [];
|
||||
var reqsmall = [];
|
||||
for (var i = 0; i < settings.xhr_ul_blob_megabytes; i++) req.push(r);
|
||||
req = new Blob(req);
|
||||
r = new ArrayBuffer(262144);
|
||||
try {
|
||||
r = new Uint32Array(r);
|
||||
for (var i = 0; i < r.length; i++) r[i] = Math.random() * maxInt;
|
||||
} catch (e) {}
|
||||
reqsmall.push(r);
|
||||
reqsmall = new Blob(reqsmall);
|
||||
var testFunction = function() {
|
||||
var totLoaded = 0.0, // total number of transmitted bytes
|
||||
startT = new Date().getTime(), // timestamp when test was started
|
||||
bonusT = 0, //how many milliseconds the test has been shortened by (higher on faster connections)
|
||||
graceTimeDone = false, //set to true after the grace time is past
|
||||
failed = false; // set to true if a stream fails
|
||||
xhr = [];
|
||||
// function to create an upload stream. streams are slightly delayed so that they will not end at the same time
|
||||
var testStream = function(i, delay) {
|
||||
setTimeout(
|
||||
function() {
|
||||
if (testState !== 3) return; // delayed stream ended up starting after the end of the upload test
|
||||
tverb("ul test stream started " + i + " " + delay);
|
||||
var prevLoaded = 0; // number of bytes transmitted last time onprogress was called
|
||||
var x = new XMLHttpRequest();
|
||||
xhr[i] = x;
|
||||
var ie11workaround;
|
||||
if (settings.forceIE11Workaround) ie11workaround = true;
|
||||
else {
|
||||
try {
|
||||
xhr[i].upload.onprogress;
|
||||
ie11workaround = false;
|
||||
} catch (e) {
|
||||
ie11workaround = true;
|
||||
}
|
||||
}
|
||||
if (ie11workaround) {
|
||||
// IE11 workarond: xhr.upload does not work properly, therefore we send a bunch of small 256k requests and use the onload event as progress. This is not precise, especially on fast connections
|
||||
xhr[i].onload = xhr[i].onerror = function() {
|
||||
tverb("ul stream progress event (ie11wa)");
|
||||
totLoaded += reqsmall.size;
|
||||
testStream(i, 0);
|
||||
};
|
||||
xhr[i].open("POST", settings.url_ul + url_sep(settings.url_ul) + (settings.mpot ? "cors=true&" : "") + "r=" + Math.random(), true); // random string to prevent caching
|
||||
try {
|
||||
xhr[i].setRequestHeader("Content-Encoding", "identity"); // disable compression (some browsers may refuse it, but data is incompressible anyway)
|
||||
} catch (e) {}
|
||||
//No Content-Type header in MPOT branch because it triggers bugs in some browsers
|
||||
xhr[i].send(reqsmall);
|
||||
} else {
|
||||
// REGULAR version, no workaround
|
||||
xhr[i].upload.onprogress = function(event) {
|
||||
tverb("ul stream progress event " + i + " " + event.loaded);
|
||||
if (testState !== 3) {
|
||||
try {
|
||||
x.abort();
|
||||
} catch (e) {}
|
||||
} // just in case this XHR is still running after the upload test
|
||||
// progress event, add number of new loaded bytes to totLoaded
|
||||
var loadDiff = event.loaded <= 0 ? 0 : event.loaded - prevLoaded;
|
||||
if (isNaN(loadDiff) || !isFinite(loadDiff) || loadDiff < 0) return; // just in case
|
||||
totLoaded += loadDiff;
|
||||
prevLoaded = event.loaded;
|
||||
}.bind(this);
|
||||
xhr[i].upload.onload = function() {
|
||||
// this stream sent all the garbage data, start again
|
||||
tverb("ul stream finished " + i);
|
||||
testStream(i, 0);
|
||||
}.bind(this);
|
||||
xhr[i].upload.onerror = function() {
|
||||
tverb("ul stream failed " + i);
|
||||
if (settings.xhr_ignoreErrors === 0) failed = true; //abort
|
||||
try {
|
||||
xhr[i].abort();
|
||||
} catch (e) {}
|
||||
delete xhr[i];
|
||||
if (settings.xhr_ignoreErrors === 1) testStream(i, 0); //restart stream
|
||||
}.bind(this);
|
||||
// send xhr
|
||||
xhr[i].open("POST", settings.url_ul + url_sep(settings.url_ul) + (settings.mpot ? "cors=true&" : "") + "r=" + Math.random(), true); // random string to prevent caching
|
||||
try {
|
||||
xhr[i].setRequestHeader("Content-Encoding", "identity"); // disable compression (some browsers may refuse it, but data is incompressible anyway)
|
||||
} catch (e) {}
|
||||
//No Content-Type header in MPOT branch because it triggers bugs in some browsers
|
||||
xhr[i].send(req);
|
||||
}
|
||||
}.bind(this),
|
||||
delay
|
||||
);
|
||||
}.bind(this);
|
||||
// open streams
|
||||
for (var i = 0; i < settings.xhr_ulMultistream; i++) {
|
||||
testStream(i, settings.xhr_multistreamDelay * i);
|
||||
}
|
||||
// every 200ms, update ulStatus
|
||||
interval = setInterval(
|
||||
function() {
|
||||
tverb("UL: " + ulStatus + (graceTimeDone ? "" : " (in grace time)"));
|
||||
var t = new Date().getTime() - startT;
|
||||
if (graceTimeDone) ulProgress = (t + bonusT) / (settings.time_ul_max * 1000);
|
||||
if (t < 200) return;
|
||||
if (!graceTimeDone) {
|
||||
if (t > 1000 * settings.time_ulGraceTime) {
|
||||
if (totLoaded > 0) {
|
||||
// if the connection is so slow that we didn't get a single chunk yet, do not reset
|
||||
startT = new Date().getTime();
|
||||
bonusT = 0;
|
||||
totLoaded = 0.0;
|
||||
}
|
||||
graceTimeDone = true;
|
||||
}
|
||||
} else {
|
||||
var speed = totLoaded / (t / 1000.0);
|
||||
if (settings.time_auto) {
|
||||
//decide how much to shorten the test. Every 200ms, the test is shortened by the bonusT calculated here
|
||||
var bonus = (5.0 * speed) / 100000;
|
||||
bonusT += bonus > 400 ? 400 : bonus;
|
||||
}
|
||||
//update status
|
||||
ulStatus = ((speed * 8 * settings.overheadCompensationFactor) / (settings.useMebibits ? 1048576 : 1000000)).toFixed(2); // speed is multiplied by 8 to go from bytes to bits, overhead compensation is applied, then everything is divided by 1048576 or 1000000 to go to megabits/mebibits
|
||||
if ((t + bonusT) / 1000.0 > settings.time_ul_max || failed) {
|
||||
// test is over, stop streams and timer
|
||||
if (failed || isNaN(ulStatus)) ulStatus = "Fail";
|
||||
clearRequests();
|
||||
clearInterval(interval);
|
||||
ulProgress = 1;
|
||||
tlog("ulTest: " + ulStatus + ", took " + (new Date().getTime() - startT) + "ms");
|
||||
done();
|
||||
}
|
||||
}
|
||||
}.bind(this),
|
||||
200
|
||||
);
|
||||
}.bind(this);
|
||||
if (settings.mpot) {
|
||||
tverb("Sending POST request before performing upload test");
|
||||
xhr = [];
|
||||
xhr[0] = new XMLHttpRequest();
|
||||
xhr[0].onload = xhr[0].onerror = function() {
|
||||
tverb("POST request sent, starting upload test");
|
||||
testFunction();
|
||||
}.bind(this);
|
||||
xhr[0].open("POST", settings.url_ul) + (settings.mpot ? "cors=true&" : "");
|
||||
xhr[0].send();
|
||||
} else testFunction();
|
||||
}
|
||||
// ping+jitter test, function done is called when it's over
|
||||
var ptCalled = false; // used to prevent multiple accidental calls to pingTest
|
||||
function pingTest(done) {
|
||||
tverb("pingTest");
|
||||
if (ptCalled) return;
|
||||
else ptCalled = true; // pingTest already called?
|
||||
var startT = new Date().getTime(); //when the test was started
|
||||
var prevT = null; // last time a pong was received
|
||||
var ping = 0.0; // current ping value
|
||||
var jitter = 0.0; // current jitter value
|
||||
var i = 0; // counter of pongs received
|
||||
var prevInstspd = 0; // last ping time, used for jitter calculation
|
||||
xhr = [];
|
||||
// ping function
|
||||
var doPing = function() {
|
||||
tverb("ping");
|
||||
pingProgress = i / settings.count_ping;
|
||||
prevT = new Date().getTime();
|
||||
xhr[0] = new XMLHttpRequest();
|
||||
xhr[0].onload = function() {
|
||||
// pong
|
||||
tverb("pong");
|
||||
if (i === 0) {
|
||||
prevT = new Date().getTime(); // first pong
|
||||
} else {
|
||||
var instspd = new Date().getTime() - prevT;
|
||||
if (settings.ping_allowPerformanceApi) {
|
||||
try {
|
||||
//try to get accurate performance timing using performance api
|
||||
var p = performance.getEntries();
|
||||
p = p[p.length - 1];
|
||||
var d = p.responseStart - p.requestStart;
|
||||
if (d <= 0) d = p.duration;
|
||||
if (d > 0 && d < instspd) instspd = d;
|
||||
} catch (e) {
|
||||
//if not possible, keep the estimate
|
||||
tverb("Performance API not supported, using estimate");
|
||||
}
|
||||
}
|
||||
//noticed that some browsers randomly have 0ms ping
|
||||
if (instspd < 1) instspd = prevInstspd;
|
||||
if (instspd < 1) instspd = 1;
|
||||
var instjitter = Math.abs(instspd - prevInstspd);
|
||||
if (i === 1) ping = instspd;
|
||||
/* first ping, can't tell jitter yet*/ else {
|
||||
if (instspd < ping) ping = instspd; // update ping, if the instant ping is lower
|
||||
if (i === 2) jitter = instjitter;
|
||||
//discard the first jitter measurement because it might be much higher than it should be
|
||||
else jitter = instjitter > jitter ? jitter * 0.3 + instjitter * 0.7 : jitter * 0.8 + instjitter * 0.2; // update jitter, weighted average. spikes in ping values are given more weight.
|
||||
}
|
||||
prevInstspd = instspd;
|
||||
}
|
||||
pingStatus = ping.toFixed(2);
|
||||
jitterStatus = jitter.toFixed(2);
|
||||
i++;
|
||||
tverb("ping: " + pingStatus + " jitter: " + jitterStatus);
|
||||
if (i < settings.count_ping) doPing();
|
||||
else {
|
||||
// more pings to do?
|
||||
pingProgress = 1;
|
||||
tlog("ping: " + pingStatus + " jitter: " + jitterStatus + ", took " + (new Date().getTime() - startT) + "ms");
|
||||
done();
|
||||
}
|
||||
}.bind(this);
|
||||
xhr[0].onerror = function() {
|
||||
// a ping failed, cancel test
|
||||
tverb("ping failed");
|
||||
if (settings.xhr_ignoreErrors === 0) {
|
||||
//abort
|
||||
pingStatus = "Fail";
|
||||
jitterStatus = "Fail";
|
||||
clearRequests();
|
||||
tlog("ping test failed, took " + (new Date().getTime() - startT) + "ms");
|
||||
pingProgress = 1;
|
||||
done();
|
||||
}
|
||||
if (settings.xhr_ignoreErrors === 1) doPing(); //retry ping
|
||||
if (settings.xhr_ignoreErrors === 2) {
|
||||
//ignore failed ping
|
||||
i++;
|
||||
if (i < settings.count_ping) doPing();
|
||||
else {
|
||||
// more pings to do?
|
||||
pingProgress = 1;
|
||||
tlog("ping: " + pingStatus + " jitter: " + jitterStatus + ", took " + (new Date().getTime() - startT) + "ms");
|
||||
done();
|
||||
}
|
||||
}
|
||||
}.bind(this);
|
||||
// send xhr
|
||||
xhr[0].open("GET", settings.url_ping + url_sep(settings.url_ping) + (settings.mpot ? "cors=true&" : "") + "r=" + Math.random(), true); // random string to prevent caching
|
||||
xhr[0].send();
|
||||
}.bind(this);
|
||||
doPing(); // start first ping
|
||||
}
|
||||
// telemetry
|
||||
function sendTelemetry(done) {
|
||||
if (settings.telemetry_level < 1) return;
|
||||
xhr = new XMLHttpRequest();
|
||||
xhr.onload = function() {
|
||||
try {
|
||||
var parts = xhr.responseText.split(" ");
|
||||
if (parts[0] == "id") {
|
||||
try {
|
||||
var id = parts[1];
|
||||
done(id);
|
||||
} catch (e) {
|
||||
done(null);
|
||||
}
|
||||
} else done(null);
|
||||
} catch (e) {
|
||||
done(null);
|
||||
}
|
||||
};
|
||||
xhr.onerror = function() {
|
||||
console.log("TELEMETRY ERROR " + xhr.status);
|
||||
done(null);
|
||||
};
|
||||
xhr.open("POST", settings.url_telemetry + url_sep(settings.url_telemetry) + (settings.mpot ? "cors=true&" : "") + "r=" + Math.random(), true);
|
||||
var telemetryIspInfo = {
|
||||
processedString: clientIp,
|
||||
rawIspInfo: typeof ispInfo === "object" ? ispInfo : ""
|
||||
};
|
||||
try {
|
||||
var fd = new FormData();
|
||||
fd.append("ispinfo", JSON.stringify(telemetryIspInfo));
|
||||
fd.append("dl", dlStatus);
|
||||
fd.append("ul", ulStatus);
|
||||
fd.append("ping", pingStatus);
|
||||
fd.append("jitter", jitterStatus);
|
||||
fd.append("log", settings.telemetry_level > 1 ? log : "");
|
||||
fd.append("extra", settings.telemetry_extra);
|
||||
xhr.send(fd);
|
||||
} catch (ex) {
|
||||
var postData = "extra=" + encodeURIComponent(settings.telemetry_extra) + "&ispinfo=" + encodeURIComponent(JSON.stringify(telemetryIspInfo)) + "&dl=" + encodeURIComponent(dlStatus) + "&ul=" + encodeURIComponent(ulStatus) + "&ping=" + encodeURIComponent(pingStatus) + "&jitter=" + encodeURIComponent(jitterStatus) + "&log=" + encodeURIComponent(settings.telemetry_level > 1 ? log : "");
|
||||
xhr.setRequestHeader("Content-Type", "application/x-www-form-urlencoded");
|
||||
xhr.send(postData);
|
||||
}
|
||||
}
|
||||
|
||||
0
includes/CSRF.php
Normal file → Executable file
0
includes/CSRF.php
Normal file → Executable file
8
includes/bootstrap.php
Normal file
8
includes/bootstrap.php
Normal file
@@ -0,0 +1,8 @@
|
||||
<?php
|
||||
// cache-control headers
|
||||
if (!headers_sent()) {
|
||||
header("Cache-Control: no-store, no-cache, must-revalidate");
|
||||
header("Pragma: no-cache");
|
||||
header("Expires: 0");
|
||||
}
|
||||
|
||||
163
includes/configure_client.php
Executable file → Normal file
163
includes/configure_client.php
Executable file → Normal file
@@ -1,152 +1,83 @@
|
||||
<?php
|
||||
|
||||
require_once 'includes/wifi_functions.php';
|
||||
use RaspAP\Networking\Hotspot\WiFiManager;
|
||||
|
||||
/**
|
||||
*
|
||||
* WiFi client configuration page handler
|
||||
*
|
||||
*/
|
||||
function DisplayWPAConfig()
|
||||
{
|
||||
$wifi = new WiFiManager();
|
||||
$status = new \RaspAP\Messages\StatusMessage;
|
||||
$networks = [];
|
||||
|
||||
getWifiInterface();
|
||||
knownWifiStations($networks);
|
||||
setKnownStationsWPA($networks);
|
||||
$wifi->getWifiInterface();
|
||||
$wifi->knownWifiStations($networks);
|
||||
$wifi->setKnownStationsWPA($networks);
|
||||
|
||||
$iface = escapeshellarg($_SESSION['wifi_client_interface']);
|
||||
$clientInterface = $_SESSION['wifi_client_interface'];
|
||||
|
||||
if (isset($_POST['connect'])) {
|
||||
$netid = intval($_POST['connect']);
|
||||
$cmd = "sudo wpa_cli -i $iface select_network $netid";
|
||||
$return = shell_exec($cmd);
|
||||
sleep(2);
|
||||
if (trim($return) == "FAIL") {
|
||||
$status->addMessage('WPA command line client returned failure. Check your adapter.', 'danger');
|
||||
} else {
|
||||
|
||||
if ($wifi->connectToNetwork($clientInterface, $netid)) {
|
||||
$status->addMessage('New network selected', 'success');
|
||||
} else {
|
||||
$status->addMessage('WPA command line client returned failure. Check your adapter.', 'danger');
|
||||
}
|
||||
} elseif (isset($_POST['wpa_reinit'])) {
|
||||
$status->addMessage('Attempting to reinitialize wpa_supplicant', 'warning');
|
||||
$force_remove = true;
|
||||
$result = reinitializeWPA($force_remove);
|
||||
$result = $wifi->reinitializeWPA($force_remove);
|
||||
} elseif (isset($_POST['client_settings'])) {
|
||||
$tmp_networks = $networks;
|
||||
if ($wpa_file = fopen('/tmp/wifidata', 'w')) {
|
||||
fwrite($wpa_file, 'ctrl_interface=DIR=' . RASPI_WPA_CTRL_INTERFACE . ' GROUP=netdev' . PHP_EOL);
|
||||
fwrite($wpa_file, 'update_config=1' . PHP_EOL);
|
||||
|
||||
foreach (array_keys($_POST) as $post) {
|
||||
foreach (array_keys($_POST) as $post) {
|
||||
|
||||
if (preg_match('/delete(\d+)/', $post, $post_match)) {
|
||||
$network = $tmp_networks[$_POST['ssid' . $post_match[1]]];
|
||||
$netid = $network['index'];
|
||||
exec('sudo wpa_cli -i ' . $iface . ' disconnect ' . $netid);
|
||||
exec('sudo wpa_cli -i ' . $iface . ' remove_network ' . $netid);
|
||||
unset($tmp_networks[$_POST['ssid' . $post_match[1]]]);
|
||||
if (preg_match('/delete(\d+)/', $post, $post_match)) {
|
||||
$network = $tmp_networks[$_POST['ssid' . $post_match[1]]];
|
||||
$netid = $network['index'];
|
||||
$wifi->deleteNetwork($clientInterface, $netid);
|
||||
unset($tmp_networks[$_POST['ssid' . $post_match[1]]]);
|
||||
} elseif (preg_match('/disconnect(\d+)/', $post, $post_match)) {
|
||||
$network = $tmp_networks[$_POST['ssid' . $post_match[1]]];
|
||||
$netid = $network['index'];
|
||||
$wifi->disconnectNetwork($clientInterface, $netid);
|
||||
} elseif (preg_match('/update(\d+)/', $post, $post_match)) {
|
||||
// NB, multiple protocols are separated with a forward slash ('/')
|
||||
$protocol = $_POST['protocol' . $post_match[1]] === $wifi::SECURITY_OPEN ? $wifi::SECURITY_OPEN : 'WPA';
|
||||
$tmp_networks[$_POST['ssid' . $post_match[1]]] = array(
|
||||
'protocol' => $protocol,
|
||||
'passphrase' => $_POST['passphrase' . $post_match[1]] ?? '',
|
||||
'configured' => true
|
||||
);
|
||||
if (array_key_exists('priority' . $post_match[1], $_POST)) {
|
||||
$tmp_networks[$_POST['ssid' . $post_match[1]]]['priority'] = $_POST['priority' . $post_match[1]];
|
||||
}
|
||||
$network = $tmp_networks[$_POST['ssid' . $post_match[1]]];
|
||||
|
||||
} elseif (preg_match('/update(\d+)/', $post, $post_match)) {
|
||||
// NB, multiple protocols are separated with a forward slash ('/')
|
||||
$tmp_networks[$_POST['ssid' . $post_match[1]]] = array(
|
||||
'protocol' => ( $_POST['protocol' . $post_match[1]] === 'Open' ? 'Open' : 'WPA' ),
|
||||
'passphrase' => $_POST['passphrase' . $post_match[1]],
|
||||
'configured' => true
|
||||
);
|
||||
if (array_key_exists('priority' . $post_match[1], $_POST)) {
|
||||
$tmp_networks[$_POST['ssid' . $post_match[1]]]['priority'] = $_POST['priority' . $post_match[1]];
|
||||
}
|
||||
$network = $tmp_networks[$_POST['ssid' . $post_match[1]]];
|
||||
$ssid = escapeshellarg('"'.$_POST['ssid' . $post_match[1]].'"');
|
||||
$psk = escapeshellarg('"'.$_POST['passphrase' . $post_match[1]].'"');
|
||||
$netid = trim(shell_exec("sudo wpa_cli -i $iface add_network"));
|
||||
if (isset($netid)) {
|
||||
$commands = [
|
||||
"sudo wpa_cli -i $iface set_network $netid ssid $ssid",
|
||||
"sudo wpa_cli -i $iface set_network $netid psk $psk",
|
||||
"sudo wpa_cli -i $iface enable_network $netid"
|
||||
];
|
||||
foreach ($commands as $cmd) {
|
||||
exec($cmd);
|
||||
}
|
||||
} else {
|
||||
$status->addMessage('Unable to add network with WPA command line client', 'warning');
|
||||
}
|
||||
$ssid = $_POST['ssid' . $post_match[1]];
|
||||
$passphrase = $_POST['passphrase' . $post_match[1]] ?? '';
|
||||
|
||||
$netid = $wifi->updateNetwork($clientInterface, $ssid, $passphrase, $protocol);
|
||||
if ($netid === null) {
|
||||
$status->addMessage('Unable to add network with WPA command line client', 'warning');
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
$ok = true;
|
||||
foreach ($tmp_networks as $ssid => $network) {
|
||||
if ($network['protocol'] === 'Open') {
|
||||
fwrite($wpa_file, "network={".PHP_EOL);
|
||||
fwrite($wpa_file, "\tssid=\"".$ssid."\"".PHP_EOL);
|
||||
fwrite($wpa_file, "\tkey_mgmt=NONE".PHP_EOL);
|
||||
fwrite($wpa_file, "\tscan_ssid=1".PHP_EOL);
|
||||
if (array_key_exists('priority', $network)) {
|
||||
fwrite($wpa_file, "\tpriority=".$network['priority'].PHP_EOL);
|
||||
}
|
||||
fwrite($wpa_file, "}".PHP_EOL);
|
||||
} else {
|
||||
if (strlen($network['passphrase']) >=8 && strlen($network['passphrase']) <= 63) {
|
||||
unset($wpa_passphrase);
|
||||
unset($line);
|
||||
exec('wpa_passphrase '. ssid2utf8( escapeshellarg($ssid) ) . ' ' . escapeshellarg($network['passphrase']), $wpa_passphrase);
|
||||
foreach ($wpa_passphrase as $line) {
|
||||
if (preg_match('/^\s*}\s*$/', $line)) {
|
||||
if (array_key_exists('priority', $network)) {
|
||||
fwrite($wpa_file, "\tpriority=".$network['priority'].PHP_EOL);
|
||||
}
|
||||
fwrite($wpa_file, $line.PHP_EOL);
|
||||
} else {
|
||||
if ( preg_match('/\\\\x[0-9A-Fa-f]{2}/',$ssid) && strpos($line, "ssid=\"") !== false ) {
|
||||
fwrite($wpa_file, "\tssid=P\"".$ssid."\"".PHP_EOL);
|
||||
} else {
|
||||
fwrite($wpa_file, $line.PHP_EOL);
|
||||
}
|
||||
}
|
||||
}
|
||||
} elseif (strlen($network['passphrase']) == 0 && strlen($network['passkey']) == 64) {
|
||||
$line = "\tpsk=" . $network['passkey'];
|
||||
fwrite($wpa_file, "network={".PHP_EOL);
|
||||
fwrite($wpa_file, "\tssid=\"".$ssid."\"".PHP_EOL);
|
||||
fwrite($wpa_file, $line.PHP_EOL);
|
||||
if (array_key_exists('priority', $network)) {
|
||||
fwrite($wpa_file, "\tpriority=".$network['priority'].PHP_EOL);
|
||||
}
|
||||
fwrite($wpa_file, "}".PHP_EOL);
|
||||
} else {
|
||||
$status->addMessage('WPA passphrase must be between 8 and 63 characters', 'danger');
|
||||
$ok = false;
|
||||
}
|
||||
}
|
||||
}
|
||||
$result = $wifi->writeWpaSupplicant($tmp_networks, $clientInterface);
|
||||
|
||||
if ($ok) {
|
||||
system('sudo cp /tmp/wifidata ' . RASPI_WPA_SUPPLICANT_CONFIG, $returnval);
|
||||
if ($returnval == 0) {
|
||||
exec('sudo wpa_cli -i ' . $_SESSION['wifi_client_interface'] . ' reconfigure', $reconfigure_out, $reconfigure_return);
|
||||
if ($reconfigure_return == 0) {
|
||||
$status->addMessage('Wifi settings updated successfully', 'success');
|
||||
$networks = $tmp_networks;
|
||||
} else {
|
||||
$status->addMessage('Wifi settings updated but cannot restart (cannot execute "wpa_cli reconfigure")', 'danger');
|
||||
}
|
||||
} else {
|
||||
$status->addMessage('Wifi settings failed to be updated', 'danger');
|
||||
}
|
||||
}
|
||||
if ($result['success']) {
|
||||
$status->addMessage($result['message'], 'success');
|
||||
$networks = $tmp_networks;
|
||||
} else {
|
||||
$status->addMessage('Failed to update wifi settings', 'danger');
|
||||
$status->addMessage($result['message'], 'danger');
|
||||
}
|
||||
}
|
||||
|
||||
$clientInterface = $_SESSION['wifi_client_interface'];
|
||||
|
||||
exec('ip a show '.$clientInterface, $stdoutIp);
|
||||
$stdoutIpAllLinesGlued = implode(" ", $stdoutIp);
|
||||
$stdoutIpWRepeatedSpaces = preg_replace('/\s\s+/', ' ', $stdoutIpAllLinesGlued);
|
||||
preg_match('/state (UP|DOWN)/i', $stdoutIpWRepeatedSpaces, $matchesState) || $matchesState[1] = 'unknown';
|
||||
$ifaceStatus = strtolower($matchesState[1]) ? "up" : "down";
|
||||
$ifaceStatus = $wifi->getInterfaceStatus($clientInterface);
|
||||
|
||||
echo renderTemplate("configure_client", compact("status", "clientInterface", "ifaceStatus"));
|
||||
}
|
||||
|
||||
@@ -1,22 +1,28 @@
|
||||
<?php
|
||||
|
||||
require_once 'includes/config.php';
|
||||
require_once 'includes/wifi_functions.php';
|
||||
require_once 'includes/functions.php';
|
||||
|
||||
use RaspAP\System\Sysinfo;
|
||||
use RaspAP\UI\Dashboard;
|
||||
use RaspAP\Messages\StatusMessage;
|
||||
use RaspAP\Plugins\PluginManager;
|
||||
use RaspAP\Networking\Hotspot\WiFiManager;
|
||||
|
||||
/**
|
||||
* Displays the dashboard
|
||||
*/
|
||||
function DisplayDashboard(&$extraFooterScripts): void
|
||||
{
|
||||
// instantiate RaspAP objects
|
||||
$system = new \RaspAP\System\Sysinfo;
|
||||
$dashboard = new \RaspAP\UI\Dashboard;
|
||||
$status = new \RaspAP\Messages\StatusMessage;
|
||||
$pluginManager = \RaspAP\Plugins\PluginManager::getInstance();
|
||||
$system = new Sysinfo();
|
||||
$dashboard = new Dashboard();
|
||||
$status = new StatusMessage();
|
||||
$pluginManager = PluginManager::getInstance();
|
||||
$wifi = new WiFiManager();
|
||||
|
||||
// set AP and client interface session vars
|
||||
getWifiInterface();
|
||||
$wifi->getWifiInterface();
|
||||
|
||||
$interface = $_SESSION['ap_interface'] ?? 'wlan0';
|
||||
$clientInterface = $_SESSION['wifi_client_interface'];
|
||||
@@ -38,6 +44,12 @@ function DisplayDashboard(&$extraFooterScripts): void
|
||||
$plugins = $pluginManager->getInstalledPlugins();
|
||||
$bridgedEnable = getBridgedState();
|
||||
|
||||
if ($bridgedEnable) {
|
||||
$interface = 'br0';
|
||||
$details = $dashboard->getInterfaceDetails($interface);
|
||||
$connectionType = 'ethernet';
|
||||
}
|
||||
|
||||
// handle page actions
|
||||
if (!empty($_POST)) {
|
||||
$status = $dashboard->handlePageAction($state, $_POST, $status, $interface);
|
||||
@@ -76,12 +88,15 @@ function DisplayDashboard(&$extraFooterScripts): void
|
||||
$vpnStatus = $vpn ? "active" : "inactive";
|
||||
$vpnManaged = $vpn ? $dashboard->getVpnManaged($vpn) : null;
|
||||
$firewallManaged = $firewallStatus = "";
|
||||
$firewallInstalled = array_filter($plugins, fn($p) => str_ends_with($p, 'Firewall')) ? true : false;
|
||||
$firewallInstalled = (bool) array_filter($plugins, function($p) {
|
||||
return substr($p, -strlen('Firewall')) === 'Firewall';
|
||||
});
|
||||
if (!$firewallInstalled) {
|
||||
$firewallUnavailable = '<i class="fas fa-slash fa-stack-1x"></i>';
|
||||
} else {
|
||||
$firewallManaged = '<a href="/plugin__Firewall">';
|
||||
$firewallStatus = ($dashboard->firewallEnabled() == true) ? "active" : "";
|
||||
$firewallUnavailable = null;
|
||||
}
|
||||
|
||||
echo renderTemplate(
|
||||
@@ -123,7 +138,7 @@ function DisplayDashboard(&$extraFooterScripts): void
|
||||
"status"
|
||||
)
|
||||
);
|
||||
$extraFooterScripts[] = array('src'=>'app/js/dashboardchart.js', 'defer'=>false);
|
||||
$extraFooterScripts[] = array('src'=>'app/js/vendor/dashboardchart.js', 'defer'=>false);
|
||||
}
|
||||
|
||||
/**
|
||||
|
||||
@@ -9,5 +9,5 @@ function DisplayDataUsage(&$extraFooterScripts)
|
||||
echo renderTemplate("data_usage", [ "interfaces" => $interfacesWlo ]);
|
||||
|
||||
$extraFooterScripts[] = array('src'=>'dist/datatables/jquery.dataTables.min.js', 'defer'=>false);
|
||||
$extraFooterScripts[] = array('src'=>'app/js/bandwidthcharts.js', 'defer'=>false);
|
||||
$extraFooterScripts[] = array('src'=>'app/js/vendor/bandwidthcharts.js', 'defer'=>false);
|
||||
}
|
||||
|
||||
@@ -7,7 +7,7 @@ if (!defined('RASPI_CONFIG')) {
|
||||
$defaults = [
|
||||
'RASPI_BRAND_TEXT' => 'RaspAP',
|
||||
'RASPI_BRAND_TITLE' => RASPI_BRAND_TEXT.' Admin Panel',
|
||||
'RASPI_VERSION' => '3.3.5',
|
||||
'RASPI_VERSION' => '3.5.1',
|
||||
'RASPI_CONFIG_NETWORK' => RASPI_CONFIG.'/networking/defaults.json',
|
||||
'RASPI_CONFIG_PROVIDERS' => 'config/vpn-providers.json',
|
||||
'RASPI_CONFIG_API' => RASPI_CONFIG.'/api',
|
||||
@@ -28,7 +28,6 @@ $defaults = [
|
||||
'RASPI_HOSTAPD_CONFIG' => '/etc/hostapd/hostapd.conf',
|
||||
'RASPI_DHCPCD_CONFIG' => '/etc/dhcpcd.conf',
|
||||
'RASPI_DHCPCD_LOG' => '/var/log/dnsmasq.log',
|
||||
'RASPI_HOSTAPD_LOG' => '/tmp/hostapd.log',
|
||||
'RASPI_WPA_SUPPLICANT_CONFIG' => '/etc/wpa_supplicant/wpa_supplicant.conf',
|
||||
'RASPI_HOSTAPD_CTRL_INTERFACE' => '/var/run/hostapd',
|
||||
'RASPI_WPA_CTRL_INTERFACE' => '/var/run/wpa_supplicant',
|
||||
@@ -37,11 +36,17 @@ $defaults = [
|
||||
'RASPI_OPENVPN_CLIENT_LOGIN' => '/etc/openvpn/client/login.conf',
|
||||
'RASPI_WIREGUARD_PATH' => '/etc/wireguard/',
|
||||
'RASPI_WIREGUARD_CONFIG' => RASPI_WIREGUARD_PATH.'wg0.conf',
|
||||
'RASPI_IPTABLES_CONF' => RASPI_CONFIG.'/networking/iptables_rules.json',
|
||||
'RASPI_TORPROXY_ENABLED' => false,
|
||||
'RASPI_TORPROXY_CONFIG' => '/etc/tor/torrc',
|
||||
'RASPI_LIGHTTPD_CONFIG' => '/etc/lighttpd/lighttpd.conf',
|
||||
'RASPI_ACCESS_CHECK_IP' => '1.1.1.1',
|
||||
'RASPI_ACCESS_CHECK_DNS' => 'one.one.one.one',
|
||||
|
||||
// Captive portal detection - returns 204 or 200 is successful
|
||||
'RASPI_ACCESS_CHECK_URL' => 'http://detectportal.firefox.com',
|
||||
'RASPI_ACCESS_CHECK_URL_CODE' => 200,
|
||||
|
||||
// Constants for the 5GHz wireless regulatory domain
|
||||
'RASPI_5GHZ_CHANNEL_MIN' => 100,
|
||||
'RASPI_5GHZ_CHANNEL_MAX' => 192,
|
||||
@@ -58,7 +63,6 @@ $defaults = [
|
||||
'RASPI_OPENVPN_ENABLED' => false,
|
||||
'RASPI_VPN_PROVIDER_ENABLED' => false,
|
||||
'RASPI_WIREGUARD_ENABLED' => false,
|
||||
'RASPI_TORPROXY_ENABLED' => false,
|
||||
'RASPI_CONFAUTH_ENABLED' => true,
|
||||
'RASPI_CHANGETHEME_ENABLED' => true,
|
||||
'RASPI_VNSTAT_ENABLED' => true,
|
||||
|
||||
@@ -2,12 +2,20 @@
|
||||
|
||||
require_once 'config.php';
|
||||
|
||||
use RaspAP\Networking\Hotspot\DhcpcdManager;
|
||||
use RaspAP\Networking\Hotspot\DnsmasqManager;
|
||||
use RaspAP\Networking\Hotspot\WiFiManager;
|
||||
use RaspAP\Messages\StatusMessage;
|
||||
|
||||
/**
|
||||
* Manage DHCP configuration
|
||||
* Displays DHCP configuration
|
||||
*/
|
||||
function DisplayDHCPConfig()
|
||||
{
|
||||
$status = new \RaspAP\Messages\StatusMessage;
|
||||
$status = new StatusMessage();
|
||||
$wifi = new WiFiManager();
|
||||
$wifi->getWifiInterface();
|
||||
|
||||
if (!RASPI_MONITOR_ENABLED) {
|
||||
if (isset($_POST['savedhcpdsettings'])) {
|
||||
saveDHCPConfig($status);
|
||||
@@ -29,6 +37,18 @@ function DisplayDHCPConfig()
|
||||
$status->addMessage('Failed to start dnsmasq', 'danger');
|
||||
}
|
||||
}
|
||||
} elseif (isset($_POST['restartdhcpd'])) {
|
||||
if ($dnsmasq_state) {
|
||||
exec('sudo /bin/systemctl restart dnsmasq.service', $dnsmasq, $return);
|
||||
if ($return == 0) {
|
||||
$status->addMessage('Successfully restarted dnsmasq', 'success');
|
||||
$dnsmasq_state = false;
|
||||
} else {
|
||||
$status->addMessage('Failed to restart dnsmasq', 'danger');
|
||||
}
|
||||
} else {
|
||||
$status->addMessage('dnsmasq already stopped', 'info');
|
||||
}
|
||||
} elseif (isset($_POST['stopdhcpd'])) {
|
||||
if ($dnsmasq_state) {
|
||||
exec('sudo /bin/systemctl stop dnsmasq.service', $dnsmasq, $return);
|
||||
@@ -43,7 +63,6 @@ function DisplayDHCPConfig()
|
||||
}
|
||||
}
|
||||
}
|
||||
getWifiInterface();
|
||||
$ap_iface = $_SESSION['ap_interface'];
|
||||
$serviceStatus = $dnsmasq_state ? "up" : "down";
|
||||
exec('cat '. RASPI_DNSMASQ_PREFIX.'raspap.conf', $return);
|
||||
@@ -86,262 +105,41 @@ function DisplayDHCPConfig()
|
||||
*/
|
||||
function saveDHCPConfig($status)
|
||||
{
|
||||
$dhcpcd = new DhcpcdManager();
|
||||
$dnsmasq = new DnsmasqManager();
|
||||
$iface = $_POST['interface'];
|
||||
$return = 1;
|
||||
|
||||
// handle disable dhcp option
|
||||
// dhcp
|
||||
if (!isset($_POST['dhcp-iface']) && file_exists(RASPI_DNSMASQ_PREFIX.$iface.'.conf')) {
|
||||
// remove dhcp + dnsmasq configs for selected interface
|
||||
$return = removeDHCPConfig($iface,$status);
|
||||
$return = removeDnsmasqConfig($iface,$status);
|
||||
$return = $dhcpcd->remove($iface, $status);
|
||||
$return = $dnsmasq->remove($iface, $status);
|
||||
} else {
|
||||
$errors = validateDHCPInput();
|
||||
$errors = $dhcpcd->validate($_POST);
|
||||
if (empty($errors)) {
|
||||
$return = updateDHCPConfig($iface,$status);
|
||||
$dhcp_cfg = $dhcpcd->buildConfigEx($iface, $_POST, $status);
|
||||
$dhcpcd->saveConfig($dhcp_cfg, $iface, $status);
|
||||
} else {
|
||||
foreach ($errors as $error) {
|
||||
$status->addMessage($error, 'danger');
|
||||
}
|
||||
}
|
||||
if ($return == 1) {
|
||||
$status->addMessage('Dnsmasq configuration failed to be updated.', 'danger');
|
||||
return false;
|
||||
}
|
||||
|
||||
// dnsmasq
|
||||
if (($_POST['dhcp-iface'] == "1") || (isset($_POST['mac']))) {
|
||||
$errors = validateDnsmasqInput();
|
||||
$errors = $dnsmasq->validate($_POST);
|
||||
if (empty($errors)) {
|
||||
$return = updateDnsmasqConfig($iface,$status);
|
||||
$config = $dnsmasq->buildConfigEx($iface, $_POST);
|
||||
$return = $dnsmasq->saveConfig($config, $iface);
|
||||
$config = $dnsmasq->buildDefault($_POST);
|
||||
$return = $dnsmasq->saveConfigDefault($config);
|
||||
} else {
|
||||
foreach ($errors as $error) {
|
||||
$status->addMessage($error, 'danger');
|
||||
}
|
||||
$return = 1;
|
||||
}
|
||||
}
|
||||
|
||||
if ($return == 0) {
|
||||
$status->addMessage('Dnsmasq configuration updated successfully.', 'success');
|
||||
} else {
|
||||
$status->addMessage('Dnsmasq configuration failed to be updated.', 'danger');
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Validates DHCP user input from the $_POST object
|
||||
*
|
||||
* @return array $errors
|
||||
*/
|
||||
function validateDHCPInput()
|
||||
{
|
||||
$errors = [];
|
||||
define('IFNAMSIZ', 16);
|
||||
$iface = $_POST['interface'];
|
||||
if (!preg_match('/^[^\s\/\\0]+$/', $iface)
|
||||
|| strlen($iface) >= IFNAMSIZ
|
||||
) {
|
||||
$errors[] = _('Invalid interface name.');
|
||||
}
|
||||
if (!filter_var($_POST['StaticIP'], FILTER_VALIDATE_IP) && !empty($_POST['StaticIP'])) {
|
||||
$errors[] = _('Invalid static IP address.');
|
||||
}
|
||||
if (!filter_var($_POST['SubnetMask'], FILTER_VALIDATE_IP) && !empty($_POST['SubnetMask'])) {
|
||||
$errors[] = _('Invalid subnet mask.');
|
||||
}
|
||||
if (!filter_var($_POST['DefaultGateway'], FILTER_VALIDATE_IP) && !empty($_POST['DefaultGateway'])) {
|
||||
$errors[] = _('Invalid default gateway.');
|
||||
}
|
||||
if (($_POST['dhcp-iface'] == "1")) {
|
||||
if (!filter_var($_POST['RangeStart'], FILTER_VALIDATE_IP) && !empty($_POST['RangeStart'])) {
|
||||
$errors[] = _('Invalid DHCP range start.');
|
||||
}
|
||||
if (!filter_var($_POST['RangeEnd'], FILTER_VALIDATE_IP) && !empty($_POST['RangeEnd'])) {
|
||||
$errors[] = _('Invalid DHCP range end.');
|
||||
}
|
||||
if (!ctype_digit($_POST['RangeLeaseTime']) && $_POST['RangeLeaseTimeUnits'] !== 'i') {
|
||||
$errors[] = _('Invalid DHCP lease time, not a number.');
|
||||
}
|
||||
if (!in_array($_POST['RangeLeaseTimeUnits'], array('m', 'h', 'd', 'i'))) {
|
||||
$errors[] = _('Unknown DHCP lease time unit.');
|
||||
}
|
||||
if ($_POST['Metric'] !== '' && !ctype_digit($_POST['Metric'])) {
|
||||
$errors[] = _('Invalid metric value, not a number.');
|
||||
}
|
||||
}
|
||||
return $errors;
|
||||
}
|
||||
|
||||
/**
|
||||
* Compares to string IPs
|
||||
*
|
||||
* @param string $ip1
|
||||
* @param string $ip2
|
||||
* @return boolean $result
|
||||
*/
|
||||
function compareIPs($ip1, $ip2)
|
||||
{
|
||||
$ipu1 = sprintf('%u', ip2long($ip1["ip"])) + 0;
|
||||
$ipu2 = sprintf('%u', ip2long($ip2["ip"])) + 0;
|
||||
return $ipu1 > $ipu2;
|
||||
}
|
||||
|
||||
/**
|
||||
* Validates Dnsmasq user input from the $_POST object
|
||||
*
|
||||
* @return array $errors
|
||||
*/
|
||||
function validateDnsmasqInput()
|
||||
{
|
||||
$errors = [];
|
||||
$encounteredIPs = [];
|
||||
|
||||
if (isset($_POST["static_leases"]["mac"])) {
|
||||
for ($i=0; $i < count($_POST["static_leases"]["mac"]); $i++) {
|
||||
$mac = trim($_POST["static_leases"]["mac"][$i]);
|
||||
$ip = trim($_POST["static_leases"]["ip"][$i]);
|
||||
if (!validateMac($mac)) {
|
||||
$errors[] = _('Invalid MAC address: '.$mac);
|
||||
}
|
||||
if (in_array($ip, $encounteredIPs)) {
|
||||
$errors[] = _('Duplicate IP address entered: ' . $ip);
|
||||
} else {
|
||||
$encounteredIPs[] = $ip;
|
||||
}
|
||||
}
|
||||
}
|
||||
return $errors;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* Updates a dnsmasq configuration
|
||||
*
|
||||
* @param string $iface
|
||||
* @param object $status
|
||||
* @return boolean $result
|
||||
*/
|
||||
function updateDnsmasqConfig($iface,$status)
|
||||
{
|
||||
|
||||
$config = '# RaspAP '.$iface.' configuration'.PHP_EOL;
|
||||
$config .= 'interface='.$iface.PHP_EOL.'dhcp-range='.$_POST['RangeStart'].','.$_POST['RangeEnd'].','.$_POST['SubnetMask'].',';
|
||||
if ($_POST['RangeLeaseTimeUnits'] !== 'i') {
|
||||
$config .= $_POST['RangeLeaseTime'];
|
||||
$config .= $_POST['RangeLeaseTimeUnits'].PHP_EOL;
|
||||
} else {
|
||||
$config .= 'infinite'.PHP_EOL;
|
||||
}
|
||||
// Static leases
|
||||
$staticLeases = array();
|
||||
if (isset($_POST["static_leases"]["mac"])) {
|
||||
for ($i=0; $i < count($_POST["static_leases"]["mac"]); $i++) {
|
||||
$mac = trim($_POST["static_leases"]["mac"][$i]);
|
||||
$ip = trim($_POST["static_leases"]["ip"][$i]);
|
||||
$comment = trim($_POST["static_leases"]["comment"][$i]);
|
||||
if ($mac != "" && $ip != "") {
|
||||
$staticLeases[] = array('mac' => $mac, 'ip' => $ip, 'comment' => $comment);
|
||||
}
|
||||
}
|
||||
}
|
||||
// Sort ascending by IPs
|
||||
usort($staticLeases, "compareIPs");
|
||||
// Update config
|
||||
for ($i = 0; $i < count($staticLeases); $i++) {
|
||||
$mac = $staticLeases[$i]['mac'];
|
||||
$ip = $staticLeases[$i]['ip'];
|
||||
$comment = $staticLeases[$i]['comment'];
|
||||
$config .= "dhcp-host=$mac,$ip # $comment".PHP_EOL;
|
||||
}
|
||||
if ($_POST['no-resolv'] == "1") {
|
||||
$config .= "no-resolv".PHP_EOL;
|
||||
}
|
||||
foreach ($_POST['server'] as $server) {
|
||||
$config .= "server=$server".PHP_EOL;
|
||||
}
|
||||
if ($_POST['DNS1']) {
|
||||
$config .= "dhcp-option=6," . $_POST['DNS1'];
|
||||
if ($_POST['DNS2']) {
|
||||
$config .= ','.$_POST['DNS2'];
|
||||
}
|
||||
$config .= PHP_EOL;
|
||||
}
|
||||
if ($_POST['dhcp-ignore'] == "1") {
|
||||
$config .= 'dhcp-ignore=tag:!known'.PHP_EOL;
|
||||
}
|
||||
file_put_contents("/tmp/dnsmasqdata", $config);
|
||||
$msg = file_exists(RASPI_DNSMASQ_PREFIX.$iface.'.conf') ? 'updated' : 'added';
|
||||
system('sudo cp /tmp/dnsmasqdata '.RASPI_DNSMASQ_PREFIX.$iface.'.conf', $result);
|
||||
if ($result == 0) {
|
||||
$status->addMessage('Dnsmasq configuration for '.$iface.' '.$msg.'.', 'success');
|
||||
}
|
||||
|
||||
// write default 090_raspap.conf
|
||||
$config = '# RaspAP default config'.PHP_EOL;
|
||||
$config .='log-facility='.RASPI_DHCPCD_LOG.PHP_EOL;
|
||||
$config .='conf-dir=/etc/dnsmasq.d'.PHP_EOL;
|
||||
// handle log option
|
||||
if (($_POST['log-dhcp'] ?? '') == "1") {
|
||||
$config .= "log-dhcp".PHP_EOL;
|
||||
}
|
||||
if (($_POST['log-queries'] ?? '') == "1") {
|
||||
$config .= "log-queries".PHP_EOL;
|
||||
}
|
||||
$config .= PHP_EOL;
|
||||
file_put_contents("/tmp/dnsmasqdata", $config);
|
||||
system('sudo cp /tmp/dnsmasqdata '.RASPI_DNSMASQ_PREFIX.'raspap.conf', $result);
|
||||
|
||||
return $result;
|
||||
}
|
||||
|
||||
/**
|
||||
* Updates a dhcp configuration
|
||||
*
|
||||
* @param string $iface
|
||||
* @param object $status
|
||||
* @return boolean $result
|
||||
*/
|
||||
function updateDHCPConfig($iface,$status)
|
||||
{
|
||||
$cfg[] = '# RaspAP '.$iface.' configuration';
|
||||
$cfg[] = 'interface '.$iface;
|
||||
if (isset($_POST['StaticIP']) && $_POST['StaticIP'] !== '') {
|
||||
$mask = ($_POST['SubnetMask'] !== '' && $_POST['SubnetMask'] !== '0.0.0.0') ? '/'.mask2cidr($_POST['SubnetMask']) : null;
|
||||
$cfg[] = 'static ip_address='.$_POST['StaticIP'].$mask;
|
||||
}
|
||||
if (isset($_POST['DefaultGateway']) && $_POST['DefaultGateway'] !== '') {
|
||||
$cfg[] = 'static routers='.$_POST['DefaultGateway'];
|
||||
}
|
||||
if ($_POST['DNS1'] !== '' || $_POST['DNS2'] !== '') {
|
||||
$cfg[] = 'static domain_name_server='.$_POST['DNS1'].' '.$_POST['DNS2'];
|
||||
}
|
||||
if ($_POST['Metric'] !== '') {
|
||||
$cfg[] = 'metric '.$_POST['Metric'];
|
||||
}
|
||||
if (($_POST['Fallback'] ?? 0) == 1) {
|
||||
$cfg[] = 'profile static_'.$iface;
|
||||
$cfg[] = 'fallback static_'.$iface;
|
||||
}
|
||||
$cfg[] = ($_POST['DefaultRoute'] ?? '') == '1' ? 'gateway' : 'nogateway';
|
||||
if (substr($iface, 0, 2) === "wl" && ($_POST['NoHookWPASupplicant'] ?? '') == '1') {
|
||||
$cfg[] = 'nohook wpa_supplicant';
|
||||
}
|
||||
$dhcp_cfg = file_get_contents(RASPI_DHCPCD_CONFIG);
|
||||
if (!preg_match('/^interface\s'.$iface.'$/m', $dhcp_cfg)) {
|
||||
$cfg[] = PHP_EOL;
|
||||
$cfg = join(PHP_EOL, $cfg);
|
||||
$dhcp_cfg .= $cfg;
|
||||
$status->addMessage('DHCP configuration for '.$iface.' added.', 'success');
|
||||
} else {
|
||||
$cfg = join(PHP_EOL, $cfg);
|
||||
$dhcp_cfg = preg_replace('/^#\sRaspAP\s'.$iface.'\s.*?(?=\s*^\s*$)/ms', $cfg, $dhcp_cfg, 1);
|
||||
$status->addMessage('DHCP configuration for '.$iface.' updated.', 'success');
|
||||
}
|
||||
file_put_contents("/tmp/dhcpddata", $dhcp_cfg);
|
||||
system('sudo cp /tmp/dhcpddata '.RASPI_DHCPCD_CONFIG, $result);
|
||||
|
||||
return $result;
|
||||
}
|
||||
|
||||
|
||||
@@ -64,77 +64,6 @@ function cidr2mask($cidr)
|
||||
return $netmask;
|
||||
}
|
||||
|
||||
/**
|
||||
* Removes a dhcp configuration block for the specified interface
|
||||
*
|
||||
* @param string $iface
|
||||
* @param object $status
|
||||
* @return boolean $result
|
||||
*/
|
||||
function removeDHCPConfig($iface,$status)
|
||||
{
|
||||
$dhcp_cfg = file_get_contents(RASPI_DHCPCD_CONFIG);
|
||||
$dhcp_cfg = preg_replace('/^#\sRaspAP\s'.$iface.'\s.*?(?=\s*^\s*$)([\s]+)/ms', '', $dhcp_cfg, 1);
|
||||
file_put_contents("/tmp/dhcpddata", $dhcp_cfg);
|
||||
system('sudo cp /tmp/dhcpddata '.RASPI_DHCPCD_CONFIG, $result);
|
||||
if ($result == 0) {
|
||||
$status->addMessage('DHCP configuration for '.$iface.' removed.', 'success');
|
||||
} else {
|
||||
$status->addMessage('Failed to remove DHCP configuration for '.$iface.'.', 'danger');
|
||||
return $result;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Removes a dhcp configuration block for the specified interface
|
||||
*
|
||||
* @param string $dhcp_cfg
|
||||
* @param string $iface
|
||||
* @return string $dhcp_cfg
|
||||
*/
|
||||
function removeDHCPIface($dhcp_cfg,$iface)
|
||||
{
|
||||
$dhcp_cfg = preg_replace('/^#\sRaspAP\s'.$iface.'\s.*?(?=\s*^\s*$)([\s]+)/ms', '', $dhcp_cfg, 1);
|
||||
return $dhcp_cfg;
|
||||
}
|
||||
|
||||
/**
|
||||
* Removes a dnsmasq configuration block for the specified interface
|
||||
*
|
||||
* @param string $iface
|
||||
* @param object $status
|
||||
* @return boolean $result
|
||||
*/
|
||||
function removeDnsmasqConfig($iface,$status)
|
||||
{
|
||||
system('sudo rm '.RASPI_DNSMASQ_PREFIX.$iface.'.conf', $result);
|
||||
if ($result == 0) {
|
||||
$status->addMessage('Dnsmasq configuration for '.$iface.' removed.', 'success');
|
||||
} else {
|
||||
$status->addMessage('Failed to remove dnsmasq configuration for '.$iface.'.', 'danger');
|
||||
}
|
||||
return $result;
|
||||
}
|
||||
|
||||
/**
|
||||
* Scans dnsmasq configuration dir for the specified interface
|
||||
* Non-matching configs are removed, optional adblock.conf is protected
|
||||
*
|
||||
* @param string $dir_conf
|
||||
* @param string $interface
|
||||
* @param object $status
|
||||
*/
|
||||
function scanConfigDir($dir_conf,$interface,$status)
|
||||
{
|
||||
$syscnf = preg_grep('~\.(conf)$~', scandir($dir_conf));
|
||||
foreach ($syscnf as $cnf) {
|
||||
if ($cnf !== '090_adblock.conf' && !preg_match('/.*_'.$interface.'.conf/', $cnf)) {
|
||||
system('sudo rm /etc/dnsmasq.d/'.$cnf, $result);
|
||||
}
|
||||
}
|
||||
return $status;
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a default (fallback) value for the selected service, interface & setting
|
||||
* from /etc/raspap/networking/defaults.json
|
||||
@@ -183,6 +112,9 @@ function getProviderValue($id, $key)
|
||||
if (!isset($obj['providers']) || !is_array($obj['providers'])) {
|
||||
return false;
|
||||
}
|
||||
if ($id === null || !is_numeric($id)) {
|
||||
return false;
|
||||
}
|
||||
$id--;
|
||||
if (!isset($obj['providers'][$id]) || !is_array($obj['providers'][$id])) {
|
||||
return false;
|
||||
@@ -570,8 +502,13 @@ function dnsServers()
|
||||
|
||||
function blocklistProviders()
|
||||
{
|
||||
$data = json_decode(file_get_contents("./config/blocklists.json"));
|
||||
return (array) $data;
|
||||
$raw = json_decode(file_get_contents("./config/blocklists.json"), true);
|
||||
$result = [];
|
||||
|
||||
foreach ($raw as $group => $entries) {
|
||||
$result[$group] = array_keys($entries);
|
||||
}
|
||||
return $result;
|
||||
}
|
||||
|
||||
function optionsForSelect($options)
|
||||
@@ -659,6 +596,21 @@ function getColorOpt()
|
||||
} else {
|
||||
$color = $_COOKIE['color'];
|
||||
}
|
||||
|
||||
// Define the regex pattern for valid CSS color formats
|
||||
$colorPattern = "/^(" .
|
||||
"#([a-fA-F0-9]{3}|[a-fA-F0-9]{6})" . "|" . // Hex colors (#RGB or #RRGGBB)
|
||||
"rgb\(\s*(?:\d{1,3}\s*,\s*){2}\d{1,3}\s*\)" . "|" . // RGB format
|
||||
"rgba\(\s*(?:\d{1,3}\s*,\s*){3}\s*(0|0\.\d+|1)\s*\)" . "|" . // RGBA format
|
||||
"[a-zA-Z]+" . // Named colors
|
||||
")$/i";
|
||||
|
||||
// Validate the color
|
||||
if (!preg_match($colorPattern, $color)) {
|
||||
// Return a default color if validation fails
|
||||
$color = "#2b8080";
|
||||
}
|
||||
|
||||
return $color;
|
||||
}
|
||||
|
||||
@@ -966,10 +918,10 @@ function renderStatus($hostapd_led, $hostapd_status, $memused_led, $memused, $cp
|
||||
?>
|
||||
<div class="row g-0">
|
||||
<div class="col-4 ms-2 sidebar-brand-icon">
|
||||
<img src="app/img/raspAP-logo.php" class="navbar-logo" width="60" height="60">
|
||||
<img src="app/img/raspAP-logo.php?static=1" class="navbar-logo" width="70" height="70">
|
||||
</div>
|
||||
<div class="col ml-2">
|
||||
<div class="ml-1 sb-status">Status</div>
|
||||
<div class="ml-1 sb-status"><?php echo _("Status"); ?></div>
|
||||
<div class="info-item-xs"><span class="icon">
|
||||
<i class="fas fa-circle hostapd-led <?php echo ($hostapd_led); ?>"></i></span> <?php echo _("Hotspot").' '. _($hostapd_status); ?>
|
||||
</div>
|
||||
@@ -1005,4 +957,3 @@ function callbackTimeout(callable $callback, int $interval)
|
||||
|
||||
return $result;
|
||||
}
|
||||
|
||||
|
||||
@@ -1,307 +0,0 @@
|
||||
<?php
|
||||
|
||||
require_once 'includes/functions.php';
|
||||
require_once 'includes/wifi_functions.php';
|
||||
|
||||
function getClients($simple=true)
|
||||
{
|
||||
exec('ifconfig -a | grep -oP "^(?!lo)(\w*)"', $rawdevs); // all devices except loopback
|
||||
$path=RASPI_CLIENT_SCRIPT_PATH;
|
||||
$cl=array();
|
||||
if (!empty($rawdevs) && is_array($rawdevs)) {
|
||||
$cl["clients"]=count($rawdevs);
|
||||
// search for possibly not connected modem
|
||||
exec("find /sys/bus/usb/devices/usb*/ -name dev ", $devtty); // search for ttyUSB
|
||||
$devtty = preg_only_match("/(ttyUSB0)/", $devtty);
|
||||
if (empty(preg_only_match("/(ppp)[0-9]/", $rawdevs))) {
|
||||
if (!empty($devtty)) {
|
||||
$rawdevs[]="ppp0";
|
||||
exec("udevadm info --name='$devtty' 2> /dev/null");
|
||||
}
|
||||
}
|
||||
foreach ($rawdevs as $i => $dev) {
|
||||
$cl["device"][$i]["name"]=$dev;
|
||||
$nam = (preg_match("/^(\w+)[0-9]$/",$dev,$nam) === 1) ? $nam=$nam[1] : "";
|
||||
$cl["device"][$i]["type"]=$ty=getClientType($dev);
|
||||
unset($udevinfo);
|
||||
exec("udevadm info /sys/class/net/$dev 2> /dev/null", $udevinfo);
|
||||
if ($nam == "ppp" && isset($devtty)) {
|
||||
exec("udevadm info --name='$devtty' 2> /dev/null", $udevinfo);
|
||||
}
|
||||
if (!empty($udevinfo) && is_array($udevinfo)) {
|
||||
$model = preg_only_match("/ID_MODEL_ENC=(.*)$/", $udevinfo);
|
||||
if (empty($model) || preg_match("/^[0-9a-f]{4}$/", $model) === 1) {
|
||||
$model = preg_only_match("/ID_MODEL_FROM_DATABASE=(.*)$/", $udevinfo);
|
||||
}
|
||||
if (empty($model)) {
|
||||
$model = preg_only_match("/ID_OUI_FROM_DATABASE=(.*)$/", $udevinfo);
|
||||
}
|
||||
$vendor = preg_only_match("/ID_VENDOR_ENC=(.*)$/", $udevinfo);
|
||||
if (empty($vendor) || preg_match("/^[0-9a-f]{4}$/", $vendor) === 1) {
|
||||
$vendor = preg_only_match("/ID_VENDOR_FROM_DATABASE=(.*)$/", $udevinfo);
|
||||
}
|
||||
$driver = preg_only_match("/ID_NET_DRIVER=(.*)$/", $udevinfo);
|
||||
$vendorid = preg_only_match("/ID_VENDOR_ID=(.*)$/", $udevinfo);
|
||||
$productid = preg_only_match("/ID_MODEL_ID=(.*)$/", $udevinfo);
|
||||
}
|
||||
$cl["device"][$i]["model"] = preg_replace("/\\\\x20/", " ", $model);
|
||||
$cl["device"][$i]["vendor"] = preg_replace("/\\\\x20/", " ", $vendor);
|
||||
$cl["device"][$i]["vid"] = $vendorid;
|
||||
$cl["device"][$i]["pid"] = $productid;
|
||||
unset($mac);
|
||||
exec("cat /sys/class/net/$dev/address 2> /dev/null", $mac);
|
||||
$cl["device"][$i]["mac"] = empty($mac) ? "":$mac[0];
|
||||
unset($ip);
|
||||
exec("ifconfig $dev 2> /dev/null", $ip);
|
||||
$cl["device"][$i]["ipaddress"] = preg_only_match("/.*inet ([0-9\.]+) .*/", $ip);
|
||||
|
||||
switch($ty) {
|
||||
case "eth":
|
||||
unset($res);
|
||||
exec("ip link show $dev 2> /dev/null | grep -oP ' UP '", $res);
|
||||
if (empty($res) && empty($ipadd)) {
|
||||
$cl["device"][$i]["connected"] = "n";
|
||||
} else {
|
||||
$cl["device"][$i]["connected"] = "y";
|
||||
}
|
||||
break;
|
||||
case "wlan":
|
||||
unset($retiw);
|
||||
exec("iwconfig $dev 2> /dev/null | sed -rn 's/.*(mode:master).*/1/ip'", $retiw);
|
||||
$cl["device"][$i]["isAP"] = !empty($retiw);
|
||||
unset($retiw);
|
||||
exec("iw dev $dev link 2> /dev/null", $retiw);
|
||||
if (!$simple && !empty($ssid=preg_only_match("/.*SSID:\s*([^\"]*).*/", $retiw)) ) {
|
||||
$cl["device"][$i]["connected"] = "y";
|
||||
$cl["device"][$i]["ssid"] = $ssid;
|
||||
$cl["device"][$i]["ssidutf8"] = ssid2utf8($ssid);
|
||||
$cl["device"][$i]["ap-mac"] = preg_only_match("/^Connected to ([0-9a-f\:]*).*$/", $retiw);
|
||||
$sig = preg_only_match("/.*signal: (.*)$/", $retiw);
|
||||
$val = preg_only_match("/^([0-9\.-]*).*$/", $sig);
|
||||
if (!is_numeric($val)) {
|
||||
$val = -100;
|
||||
}
|
||||
if ($val >= -50 ) {
|
||||
$qual=100;
|
||||
} else if ($val < -100) {
|
||||
$qual=0;
|
||||
} else {
|
||||
$qual=round($val*2+200);
|
||||
}
|
||||
$cl["device"][$i]["signal"] = "$sig (".$qual."%)";
|
||||
$cl["device"][$i]["bitrate"] = preg_only_match("/.*bitrate: ([0-9\.]* \w*\/s).*$/", $retiw);
|
||||
$cl["device"][$i]["freq"] = preg_only_match("/.*freq: (.*)$/", $retiw);
|
||||
$cl["device"][$i]["ap-mac"] = preg_only_match("/^Connected to ([0-9a-f\:]*).*$/", $retiw);
|
||||
} else {
|
||||
$cl["device"][$i]["connected"] = "n";
|
||||
}
|
||||
break;
|
||||
case "ppp":
|
||||
unset($res);
|
||||
exec("ip link show $dev 2> /dev/null | grep -oP '( UP | UNKNOWN)'", $res);
|
||||
if ($simple) {
|
||||
if (empty($res)) {
|
||||
$cl["device"][$i]["connected"] = "n";
|
||||
$cl["device"][$i]["signal"] = "-100 dB (0%)";
|
||||
} else {
|
||||
$cl["device"][$i]["connected"] = "y";
|
||||
$cl["device"][$i]["signal"] = "-0 dB (0%)";
|
||||
}
|
||||
break;
|
||||
}
|
||||
if (empty($res) && empty($ipadd)) {
|
||||
$cl["device"][$i]["connected"] = "n";
|
||||
} else {
|
||||
$cl["device"][$i]["connected"] = "y";
|
||||
}
|
||||
unset($res);
|
||||
exec("$path/info_huawei.sh mode modem", $res);
|
||||
$cl["device"][$i]["mode"] = $res[0];
|
||||
unset($res);
|
||||
exec("$path/info_huawei.sh device modem", $res);
|
||||
if ($res[0] != "none" ) {
|
||||
$cl["device"][$i]["model"] = $res[0];
|
||||
}
|
||||
unset($res);
|
||||
exec("$path/info_huawei.sh signal modem", $res);
|
||||
$cl["device"][$i]["signal"] = $res[0];
|
||||
unset($res);
|
||||
exec("$path/info_huawei.sh operator modem", $res);
|
||||
$cl["device"][$i]["operator"] = $res[0];
|
||||
break;
|
||||
case "hilink":
|
||||
$pin=$user=$pw="";
|
||||
getMobileLogin($pin,$pw,$user);
|
||||
$opts=$pin.' '.$user.' '.$pw;
|
||||
unset($res);
|
||||
// exec("ip link show $dev 2> /dev/null | grep -oP ' UP '",$res);
|
||||
exec("ifconfig -a | grep -i $dev -A 1 | grep -oP '(?<=inet )([0-9]{1,3}\.){3}'", $apiadd);
|
||||
$apiadd = !empty($apiadd) ? $apiadd[0]."1" : "";
|
||||
unset($res);
|
||||
exec("$path/info_huawei.sh mode hilink $apiadd \"$opts\" ", $res);
|
||||
$cl["device"][$i]["mode"] = $res[0];
|
||||
unset($res);
|
||||
exec("$path/info_huawei.sh device hilink $apiadd \"$opts\" ", $res);
|
||||
if ($res[0] != "none" ) {
|
||||
$cl["device"][$i]["model"] = $res[0];
|
||||
}
|
||||
unset($res);
|
||||
exec("$path/info_huawei.sh signal hilink $apiadd \"$opts\" ", $res);
|
||||
$cl["device"][$i]["signal"] = $res[0];
|
||||
unset($ipadd);
|
||||
exec("$path/info_huawei.sh ipaddress hilink $apiadd \"$opts\" ", $ipadd);
|
||||
if (!empty($ipadd) && $ipadd[0] !== "none" ) {
|
||||
$cl["device"][$i]["connected"] = "y";
|
||||
$cl["device"][$i]["wan_ip"] = $ipadd[0];
|
||||
} else {
|
||||
$cl["device"][$i]["connected"] = "n";
|
||||
$cl["device"][$i]["wan_ip"] = "-";
|
||||
}
|
||||
unset($res);
|
||||
exec("$path/info_huawei.sh operator hilink $apiadd \"$opts\" ", $res);
|
||||
$cl["device"][$i]["operator"] = $res[0];
|
||||
break;
|
||||
case "phone":
|
||||
case "usb":
|
||||
$cl["device"][$i]["connected"] = "y";
|
||||
break;
|
||||
default:
|
||||
}
|
||||
if (!isset($cl["device"][$i]["signal"])) {
|
||||
$cl["device"][$i]["signal"]= $cl["device"][$i]["connected"] == "n" ? "-100 dB (0%)": "0 dB (100%)";;
|
||||
}
|
||||
if (!isset($cl["device"][$i]["isAP"])) {
|
||||
$cl["device"][$i]["isAP"]=false;
|
||||
}
|
||||
}
|
||||
}
|
||||
return $cl;
|
||||
}
|
||||
|
||||
function getClientType($dev) {
|
||||
loadClientConfig();
|
||||
// check if device type stored in DEVTYPE or raspapType (from UDEV rule) protperty of the device
|
||||
exec("udevadm info /sys/class/net/$dev 2> /dev/null", $udevadm);
|
||||
$type="none";
|
||||
if (!empty($udevadm)) {
|
||||
$type=preg_only_match("/raspapType=(\w*)/i",$udevadm);
|
||||
if (empty($type)) {
|
||||
$type=preg_only_match("/DEVTYPE=(\w*)/i",$udevadm);
|
||||
}
|
||||
}
|
||||
if (empty($type) || $type == "none" || array_search($type, $_SESSION["net-device-name-prefix"]) === false) {
|
||||
// no device type yet -> get device type from device name
|
||||
if (preg_match("/^(\w+)[0-9]$/",$dev,$nam) === 1) $nam=$nam[1];
|
||||
else $nam="none";
|
||||
if (($n = array_search($nam, $_SESSION["net-device-name-prefix"])) === false) $n = count($_SESSION["net-device-types"])-1;
|
||||
$type = $_SESSION["net-device-types"][$n];
|
||||
}
|
||||
return $type;
|
||||
}
|
||||
|
||||
function getMobileLogin(&$pin,&$pw,&$user) {
|
||||
if (file_exists(($f = RASPI_MOBILEDATA_CONFIG))) {
|
||||
$dat = parse_ini_file($f);
|
||||
$pin = (isset($dat["pin"]) && preg_match("/^[0-9]*$/", $dat["pin"])) ? "-p ".$dat["pin"] : "";
|
||||
$user = (isset($dat["router_user"]) && !empty($dat["router_user"]) ) ? "-u ".$dat["router_user"] : "";
|
||||
$pw = (isset($dat["router_pw"]) && !empty($dat["router_pw"]) ) ? "-P ".$dat["router_pw"] : "";
|
||||
}
|
||||
}
|
||||
|
||||
function loadClientConfig()
|
||||
{
|
||||
// load network device config file for UDEV rules into $_SESSION
|
||||
if (!isset($_SESSION["udevrules"])) {
|
||||
$_SESSION["net-device-types"]=array();
|
||||
$_SESSION["net-device-name-prefix"]=array();
|
||||
try {
|
||||
$udevrules = file_get_contents(RASPI_CLIENT_CONFIG_PATH);
|
||||
$_SESSION["udevrules"] = json_decode($udevrules, true);
|
||||
// get device types
|
||||
foreach ($_SESSION["udevrules"]["network_devices"] as $dev) {
|
||||
$_SESSION["net-device-name-prefix"][]=$dev["name_prefix"];
|
||||
$_SESSION["net-device-types"][]=$dev["type"];
|
||||
$_SESSION["net-device-types-info"][]=$dev["type_info"];
|
||||
}
|
||||
} catch (Exception $e) {
|
||||
$_SESSION["udevrules"]= null;
|
||||
}
|
||||
$_SESSION["net-device-types"][]="none";
|
||||
$_SESSION["net-device-types-info"][]="unknown";
|
||||
$_SESSION["net-device-name-prefix"][]="none";
|
||||
}
|
||||
}
|
||||
|
||||
function findCurrentClientIndex($clients)
|
||||
{
|
||||
$devid = -1;
|
||||
if (!empty($clients)) {
|
||||
$ncl=$clients["clients"];
|
||||
if ($ncl > 0) {
|
||||
$ty=-1;
|
||||
foreach ($clients["device"] as $i => $dev) {
|
||||
$id=array_search($dev["type"], $_SESSION["net-device-types"]);
|
||||
if ($id >=0 && $_SESSION["udevrules"]["network_devices"][$id]["clientid"] > $ty && !$dev["isAP"]) {
|
||||
$ty=$id;
|
||||
$devid=$i;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
return $devid;
|
||||
}
|
||||
|
||||
function waitClientConnected($dev, $timeout=10)
|
||||
{
|
||||
do {
|
||||
exec('ifconfig -a | grep -i '.$dev.' -A 1 | grep -oP "(?<=inet )([0-9]{1,3}\.){3}[0-9]{1,3}"', $res);
|
||||
$connected= !empty($res);
|
||||
if (!$connected) {
|
||||
sleep(1);
|
||||
}
|
||||
} while (!$connected && --$timeout > 0);
|
||||
return $connected;
|
||||
}
|
||||
|
||||
function setClientState($state)
|
||||
{
|
||||
$clients=getClients();
|
||||
if (($idx = findCurrentClientIndex($clients)) >= 0) {
|
||||
$dev = $clients["device"][$idx];
|
||||
exec('ifconfig -a | grep -i '.$dev["name"].' -A 1 | grep -oP "(?<=inet )([0-9]{1,3}\.){3}[0-9]{1,3}"', $res);
|
||||
if (!empty($res)) {
|
||||
$connected=$res[0];
|
||||
}
|
||||
switch($dev["type"]) {
|
||||
case "wlan":
|
||||
if ($state =="up") {
|
||||
exec('sudo ip link set '.$dev["name"].' up');
|
||||
}
|
||||
if (!empty($connected) && $state =="down") {
|
||||
exec('sudo ip link set '.$dev["name"].' down');
|
||||
}
|
||||
break;
|
||||
case "hilink":
|
||||
preg_match("/^([0-9]{1,3}\.){3}/", $connected, $ipadd);
|
||||
$ipadd = $ipadd[0].'1'; // ip address of the Hilink api
|
||||
$mode = ($state == "up") ? 1 : 0;
|
||||
$pin=$user=$pw="";
|
||||
getMobileLogin($pin,$pw,$user);
|
||||
exec('sudo '.RASPI_CLIENT_SCRIPT_PATH.'/onoff_huawei_hilink.sh -c '.$mode.' -h '.$ipadd.' '.$pin.' '.$user.' '.$pw);
|
||||
break;
|
||||
case "ppp":
|
||||
if ($state == "up") {
|
||||
exec('sudo ifup '.$dev["name"]);
|
||||
}
|
||||
if (!empty($connected) && $state == "down") {
|
||||
exec('sudo ifdown '.$dev["name"]);
|
||||
}
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
if ($state=="up") {
|
||||
waitClientConnected($dev["name"], 15);
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,9 +1,14 @@
|
||||
<?php
|
||||
|
||||
require_once 'includes/wifi_functions.php';
|
||||
require_once 'includes/config.php';
|
||||
use RaspAP\Networking\Hotspot\HostapdManager;
|
||||
use RaspAP\Networking\Hotspot\HotspotService;
|
||||
use RaspAP\Networking\Hotspot\WiFiManager;
|
||||
use RaspAP\Networking\Hotspot\DhcpcdManager;
|
||||
use RaspAP\Messages\StatusMessage;
|
||||
use RaspAP\System\Sysinfo;
|
||||
|
||||
getWifiInterface();
|
||||
$wifi = new WiFiManager();
|
||||
$wifi->getWifiInterface();
|
||||
|
||||
/**
|
||||
* Initialize hostapd values, display interface
|
||||
@@ -11,47 +16,39 @@ getWifiInterface();
|
||||
*/
|
||||
function DisplayHostAPDConfig()
|
||||
{
|
||||
$status = new \RaspAP\Messages\StatusMessage;
|
||||
$system = new \RaspAP\System\Sysinfo;
|
||||
$reg_domain = 'GB';
|
||||
$hostapd = new HostapdManager();
|
||||
$hotspot = new HotspotService();
|
||||
$status = new StatusMessage();
|
||||
$dhcpcd = new DhcpcdManager();
|
||||
$system = new Sysinfo();
|
||||
$operatingSystem = $system->operatingSystem();
|
||||
$arrConfig = array();
|
||||
$arr80211Standard = [
|
||||
'a' => '802.11a - 5 GHz',
|
||||
'b' => '802.11b - 2.4 GHz',
|
||||
'g' => '802.11g - 2.4 GHz',
|
||||
'n' => '802.11n - 2.4/5 GHz',
|
||||
'ac' => '802.11ac - 5 GHz'
|
||||
];
|
||||
|
||||
// set hostapd defaults
|
||||
$arr80211Standard = $hotspot->get80211Standards();
|
||||
$arrSecurity = $hotspot->getSecurityModes();
|
||||
$arrEncType = $hotspot->getEncTypes();
|
||||
$arr80211w = $hotspot->get80211wOptions();
|
||||
$languageCode = strtok($_SESSION['locale'], '_');
|
||||
$countryCodes = getCountryCodes($languageCode);
|
||||
|
||||
$arrSecurity = array(1 => 'WPA', 2 => 'WPA2', 3 => 'WPA+WPA2', 'none' => _("None"));
|
||||
$arrEncType = array('TKIP' => 'TKIP', 'CCMP' => 'CCMP', 'TKIP CCMP' => 'TKIP+CCMP');
|
||||
$interfaces = $hotspot->getInterfaces();
|
||||
$arrTxPower = getDefaultNetOpts('txpower','dbm');
|
||||
$managedModeEnabled = false;
|
||||
exec("ip -o link show | awk -F': ' '{print $2}'", $interfaces);
|
||||
sort($interfaces);
|
||||
|
||||
$reg_domain = shell_exec("iw reg get | grep -o 'country [A-Z]\{2\}' | awk 'NR==1{print $2}'");
|
||||
|
||||
$cmd = "iw dev ".escapeshellarg($_SESSION['ap_interface'])." info | awk '$1==\"txpower\" {print $2}'";
|
||||
exec($cmd, $txpower);
|
||||
$txpower = intval($txpower[0]);
|
||||
try {
|
||||
$reg_domain = $hotspot->getRegDomain();
|
||||
} catch (RuntimeException $e) {
|
||||
error_log('Failed to get regulatory domain: ' . $e->getMessage());
|
||||
}
|
||||
|
||||
if (isset($_POST['interface'])) {
|
||||
$interface = escapeshellarg($_POST['interface']);
|
||||
}
|
||||
if (!RASPI_MONITOR_ENABLED) {
|
||||
if (isset($_POST['SaveHostAPDSettings'])) {
|
||||
SaveHostAPDConfig($arrSecurity, $arrEncType, $arr80211Standard, $interfaces, $reg_domain, $status);
|
||||
}
|
||||
$interface = $_POST['interface'];
|
||||
} else {
|
||||
$interface = $_SESSION['ap_interface'];
|
||||
}
|
||||
|
||||
$arrHostapdConf = [];
|
||||
$hostapdIni = RASPI_CONFIG . '/hostapd.ini';
|
||||
if (file_exists($hostapdIni)) {
|
||||
$arrHostapdConf = parse_ini_file($hostapdIni);
|
||||
}
|
||||
$txpower = $hotspot->getTxPower($interface);
|
||||
$arrHostapdConf = $hotspot->getHostapdIni();
|
||||
$logOutput = [];
|
||||
|
||||
if (!RASPI_MONITOR_ENABLED) {
|
||||
if (isset($_POST['StartHotspot']) || isset($_POST['RestartHotspot'])) {
|
||||
@@ -61,7 +58,7 @@ function DisplayHostAPDConfig()
|
||||
} elseif ($arrHostapdConf['WifiAPEnable'] == 1) {
|
||||
exec('sudo '.RASPI_CONFIG.'/hostapd/servicestart.sh --interface uap0 --seconds 1', $return);
|
||||
} else {
|
||||
// systemctl expects a unit name like raspap-network-activity@wlan0.service, no extra quotes
|
||||
// systemctl expects a unit name like raspap-network-activity@wlan0.service
|
||||
$iface_nonescaped = $_POST['interface'];
|
||||
if (preg_match('/^[a-zA-Z0-9_-]+$/', $iface_nonescaped)) { // validate interface name
|
||||
exec('sudo '.RASPI_CONFIG.'/hostapd/servicestart.sh --interface ' .$iface_nonescaped. ' --seconds 1', $return);
|
||||
@@ -72,6 +69,20 @@ function DisplayHostAPDConfig()
|
||||
foreach ($return as $line) {
|
||||
$status->addMessage($line, 'info');
|
||||
}
|
||||
} elseif (isset($_POST['SaveHostAPDSettings'])) {
|
||||
$result = $hotspot->saveSettings(
|
||||
$_POST,
|
||||
$arrSecurity,
|
||||
$arrEncType,
|
||||
$arr80211Standard,
|
||||
$interfaces,
|
||||
$reg_domain,
|
||||
$status
|
||||
);
|
||||
|
||||
// reload hostapi.ini
|
||||
$arrHostapdConf = $hotspot->getHostapdIni();
|
||||
|
||||
} elseif (isset($_POST['StopHotspot'])) {
|
||||
$status->addMessage('Attempting to stop hotspot', 'info');
|
||||
exec('sudo /bin/systemctl stop hostapd.service', $return);
|
||||
@@ -81,78 +92,69 @@ function DisplayHostAPDConfig()
|
||||
}
|
||||
}
|
||||
}
|
||||
exec('cat '. RASPI_HOSTAPD_CONFIG, $hostapdconfig);
|
||||
if (isset($_SESSION['wifi_client_interface'])) {
|
||||
exec('iwgetid '.escapeshellarg($_SESSION['wifi_client_interface']). ' -r', $wifiNetworkID);
|
||||
if (!empty($wifiNetworkID[0])) {
|
||||
$managedModeEnabled = true;
|
||||
}
|
||||
}
|
||||
$hostapdstatus = $system->hostapdStatus();
|
||||
$serviceStatus = $hostapdstatus[0] == 0 ? "down" : "up";
|
||||
|
||||
foreach ($hostapdconfig as $hostapdconfigline) {
|
||||
if (strlen($hostapdconfigline) === 0) {
|
||||
continue;
|
||||
}
|
||||
if ($hostapdconfigline[0] != "#") {
|
||||
$arrLine = explode("=", $hostapdconfigline);
|
||||
$arrConfig[$arrLine[0]]=$arrLine[1];
|
||||
}
|
||||
};
|
||||
// assign beacon_int boolean if value is set
|
||||
if (isset($arrConfig['beacon_int'])) {
|
||||
$arrConfig['beacon_interval_bool'] = 1;
|
||||
}
|
||||
// assign disassoc_low_ack boolean if value is set
|
||||
if (isset($arrConfig['disassoc_low_ack'])) {
|
||||
$arrConfig['disassoc_low_ack_bool'] = 1;
|
||||
} else {
|
||||
$arrConfig['disassoc_low_ack_bool'] = 0;
|
||||
}
|
||||
|
||||
// assign country_code from iw reg if not set in config
|
||||
if (empty($arrConfig['country_code']) && isset($country_code[0])) {
|
||||
$arrConfig['country_code'] = $country_code[0];
|
||||
}
|
||||
|
||||
// set txpower with iw if value is non-default ('auto')
|
||||
// process txpower user input
|
||||
if (isset($_POST['txpower'])) {
|
||||
if ($_POST['txpower'] != 'auto') {
|
||||
$txpower = intval($_POST['txpower']);
|
||||
$sdBm = $txpower * 100;
|
||||
exec('sudo /sbin/iw dev '.$interface.' set txpower fixed '.$sdBm, $return);
|
||||
$status->addMessage('Setting transmit power to '.$_POST['txpower'].' dBm.', 'success');
|
||||
$txpower = $_POST['txpower'];
|
||||
$hotspot->maybeSetTxPower($interface, $txpower, $status);
|
||||
} elseif ($_POST['txpower'] == 'auto') {
|
||||
exec('sudo /sbin/iw dev '.$interface.' set txpower auto', $return);
|
||||
$status->addMessage('Setting transmit power to '.$_POST['txpower'].'.', 'success');
|
||||
$txpower = $_POST['txpower'];
|
||||
$hotspot->maybeSetTxPower($interface, 'auto', $status);
|
||||
}
|
||||
$txpower = $_POST['txpower'];
|
||||
}
|
||||
|
||||
// parse hostapd configuration
|
||||
try {
|
||||
$arrConfig = $hostapd->getConfig();
|
||||
} catch (\RuntimeException $e) {
|
||||
error_log('Error: ' . $e->getMessage());
|
||||
}
|
||||
|
||||
// bridge configuration
|
||||
if (!empty($arrHostapdConf['BridgedEnable']) && (int)$arrHostapdConf['BridgedEnable'] === 1) {
|
||||
$iface = 'br0';
|
||||
$bridgeConfig = $dhcpcd->getInterfaceConfig($iface);
|
||||
|
||||
if (is_array($bridgeConfig) && !empty($bridgeConfig)) {
|
||||
$arrConfig['bridgeStaticIP'] = !empty($bridgeConfig['StaticIP'])
|
||||
? $bridgeConfig['StaticIP']
|
||||
: '192.168.1.10';
|
||||
|
||||
$arrConfig['bridgeNetmask'] = !empty($bridgeConfig['SubnetMask'])
|
||||
? mask2cidr($bridgeConfig['SubnetMask'])
|
||||
: '24';
|
||||
|
||||
$arrConfig['bridgeGateway'] = !empty($bridgeConfig['StaticRouters'])
|
||||
? $bridgeConfig['StaticRouters']
|
||||
: '192.168.1.1';
|
||||
|
||||
$arrConfig['bridgeDNS'] = !empty($bridgeConfig['StaticDNS'])
|
||||
? $bridgeConfig['StaticDNS']
|
||||
: '192.168.1.1';
|
||||
}
|
||||
}
|
||||
|
||||
$selectedHwMode = $arrConfig['hw_mode'];
|
||||
if (isset($arrConfig['ieee80211n'])) {
|
||||
if (strval($arrConfig['ieee80211n']) === '1') {
|
||||
$selectedHwMode = 'n';
|
||||
}
|
||||
}
|
||||
if (isset($arrConfig['ieee80211ac'])) {
|
||||
if (strval($arrConfig['ieee80211ac']) === '1') {
|
||||
$selectedHwMode = 'ac';
|
||||
}
|
||||
}
|
||||
if (isset($arrConfig['ieee80211w'])) {
|
||||
if (strval($arrConfig['ieee80211w']) === '2') {
|
||||
$selectedHwMode = 'w';
|
||||
// fetch hostapd logs if enabled
|
||||
if ((string)$arrHostapdConf['LogEnable'] === "1") {
|
||||
$logResult = $hotspot->getHostapdLogs(5000);
|
||||
if ($logResult['success']) {
|
||||
$joined = implode("\n", $logResult['logs']);
|
||||
$limited = getLogLimited('', $joined);
|
||||
$logOutput = explode("\n", $limited);
|
||||
}
|
||||
}
|
||||
|
||||
$arrConfig['ignore_broadcast_ssid'] ??= 0;
|
||||
$arrConfig['max_num_sta'] ??= 0;
|
||||
$arrConfig['wep_default_key'] ??= 0;
|
||||
exec('sudo /bin/chmod o+r '.RASPI_HOSTAPD_LOG);
|
||||
$logdata = getLogLimited(RASPI_HOSTAPD_LOG);
|
||||
// assign disassoc_low_ack boolean if value is set
|
||||
$arrConfig['disassoc_low_ack_bool'] = isset($arrConfig['disassoc_low_ack']) ? 1 : 0;
|
||||
$hostapdstatus = $system->hostapdStatus();
|
||||
$serviceStatus = $hostapdstatus[0] == 0 ? "down" : "up";
|
||||
|
||||
echo renderTemplate(
|
||||
"hostapd", compact(
|
||||
@@ -163,469 +165,16 @@ function DisplayHostAPDConfig()
|
||||
"interfaces",
|
||||
"arrConfig",
|
||||
"arr80211Standard",
|
||||
"selectedHwMode",
|
||||
"arrSecurity",
|
||||
"arrEncType",
|
||||
"arr80211w",
|
||||
"arrTxPower",
|
||||
"txpower",
|
||||
"arrHostapdConf",
|
||||
"operatingSystem",
|
||||
"selectedHwMode",
|
||||
"countryCodes",
|
||||
"logdata"
|
||||
"logOutput"
|
||||
)
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* Validate user input, save configs for hostapd, dnsmasq & dhcp
|
||||
*
|
||||
* @param array $wpa_array
|
||||
* @param array $enc_types
|
||||
* @param array $modes
|
||||
* @param string $interface
|
||||
* @param string $reg_domain
|
||||
* @param object $status
|
||||
* @return boolean
|
||||
*/
|
||||
function SaveHostAPDConfig($wpa_array, $enc_types, $modes, $interfaces, $reg_domain, $status)
|
||||
{
|
||||
// It should not be possible to send bad data for these fields.
|
||||
// If wpa fields are absent, return false and log securely.
|
||||
if (!(array_key_exists($_POST['wpa'], $wpa_array)
|
||||
&& array_key_exists($_POST['wpa_pairwise'], $enc_types)
|
||||
&& array_key_exists($_POST['hw_mode'], $modes))
|
||||
) {
|
||||
$err = "Attempting to set hostapd config with wpa='".escapeshellarg($_POST['wpa']);
|
||||
$err .= "', wpa_pairwise='".$escapeshellarg(_POST['wpa_pairwise']);
|
||||
$err .= "and hw_mode='".$escapeshellarg(_POST['hw_mode'])."'";
|
||||
error_log($err);
|
||||
return false;
|
||||
}
|
||||
// Validate input
|
||||
$good_input = true;
|
||||
|
||||
if (!filter_var($_POST['channel'], FILTER_VALIDATE_INT)) {
|
||||
$status->addMessage('Attempting to set channel to invalid number.', 'danger');
|
||||
$good_input = false;
|
||||
}
|
||||
if (intval($_POST['channel']) < 1 || intval($_POST['channel']) > RASPI_5GHZ_CHANNEL_MAX) {
|
||||
$status->addMessage('Attempting to set channel outside of permitted range', 'danger');
|
||||
$good_input = false;
|
||||
}
|
||||
$arrHostapdConf = parse_ini_file('/etc/raspap/hostapd.ini');
|
||||
|
||||
// Check for Bridged AP mode checkbox
|
||||
$bridgedEnable = 0;
|
||||
if ($arrHostapdConf['BridgedEnable'] == 0) {
|
||||
if (isset($_POST['bridgedEnable'])) {
|
||||
$bridgedEnable = 1;
|
||||
}
|
||||
} else {
|
||||
if (isset($_POST['bridgedEnable'])) {
|
||||
$bridgedEnable = 1;
|
||||
}
|
||||
}
|
||||
// Check for WiFi client AP mode checkbox
|
||||
$wifiAPEnable = 0;
|
||||
if ($bridgedEnable == 0) { // enable client mode actions when not bridged
|
||||
if ($arrHostapdConf['WifiAPEnable'] == 0) {
|
||||
if (isset($_POST['wifiAPEnable'])) {
|
||||
$wifiAPEnable = 1;
|
||||
}
|
||||
} else {
|
||||
if (isset($_POST['wifiAPEnable'])) {
|
||||
$wifiAPEnable = 1;
|
||||
}
|
||||
}
|
||||
}
|
||||
// Check for Logfile output checkbox
|
||||
$logEnable = 0;
|
||||
if ($arrHostapdConf['LogEnable'] == 0) {
|
||||
if (isset($_POST['logEnable'])) {
|
||||
$logEnable = 1;
|
||||
exec('sudo '.RASPI_CONFIG.'/hostapd/enablelog.sh');
|
||||
} else {
|
||||
exec('sudo '.RASPI_CONFIG.'/hostapd/disablelog.sh');
|
||||
}
|
||||
} else {
|
||||
if (isset($_POST['logEnable'])) {
|
||||
$logEnable = 1;
|
||||
exec('sudo '.RASPI_CONFIG.'/hostapd/enablelog.sh');
|
||||
} else {
|
||||
exec('sudo '.RASPI_CONFIG.'/hostapd/disablelog.sh');
|
||||
}
|
||||
}
|
||||
|
||||
// set AP interface default, override for ap-sta & bridged options
|
||||
$iface = validateInterface($_POST['interface']) ? $_POST['interface'] : RASPI_WIFI_AP_INTERFACE;
|
||||
|
||||
$ap_iface = $iface; // the hostap AP interface
|
||||
$cli_iface = $iface; // the wifi client interface
|
||||
$session_iface = $iface; // the interface that the UI needs to monitor for data usage etc.
|
||||
if ($wifiAPEnable) { // for AP-STA we monitor the uap0 interface, which is always the ap interface.
|
||||
$ap_iface = $session_iface = 'uap0';
|
||||
}
|
||||
if ($bridgedEnable) { // for bridged mode we monitor the bridge, but keep the selected interface as AP.
|
||||
$cli_iface = $session_iface = 'br0';
|
||||
}
|
||||
|
||||
// persist user options to /etc/raspap
|
||||
$cfg = [];
|
||||
$cfg['WifiInterface'] = $ap_iface;
|
||||
$cfg['LogEnable'] = $logEnable;
|
||||
// Save previous Client mode status when Bridged
|
||||
$cfg['WifiAPEnable'] = ($bridgedEnable == 1 ? $arrHostapdConf['WifiAPEnable'] : $wifiAPEnable);
|
||||
$cfg['BridgedEnable'] = $bridgedEnable;
|
||||
$cfg['WifiManaged'] = $cli_iface;
|
||||
write_php_ini($cfg, RASPI_CONFIG.'/hostapd.ini');
|
||||
$_SESSION['ap_interface'] = $session_iface;
|
||||
|
||||
// Verify input
|
||||
if (empty($_POST['ssid']) || strlen($_POST['ssid']) > 32) {
|
||||
$status->addMessage('SSID must be between 1 and 32 characters', 'danger');
|
||||
$good_input = false;
|
||||
}
|
||||
|
||||
# NB: A pass-phrase is a sequence of between 8 and 63 ASCII-encoded characters (IEEE Std. 802.11i-2004)
|
||||
# Each character in the pass-phrase must have an encoding in the range of 32 to 126 (decimal). (IEEE Std. 802.11i-2004, Annex H.4.1)
|
||||
if ($_POST['wpa'] !== 'none' && (strlen($_POST['wpa_passphrase']) < 8 || strlen($_POST['wpa_passphrase']) > 63)) {
|
||||
$status->addMessage('WPA passphrase must be between 8 and 63 characters', 'danger');
|
||||
$good_input = false;
|
||||
} elseif (!ctype_print($_POST['wpa_passphrase'])) {
|
||||
$status->addMessage('WPA passphrase must be comprised of printable ASCII characters', 'danger');
|
||||
$good_input = false;
|
||||
}
|
||||
|
||||
$ignore_broadcast_ssid = $_POST['hiddenSSID'] ?? '0';
|
||||
if (!ctype_digit($ignore_broadcast_ssid)) {
|
||||
$status->addMessage('Parameter hiddenSSID not a number.', 'danger');
|
||||
$good_input = false;
|
||||
} elseif ((int)$ignore_broadcast_ssid < 0 || (int)$ignore_broadcast_ssid >= 3) {
|
||||
$status->addMessage('Parameter hiddenSSID contains an invalid configuration value.', 'danger');
|
||||
$good_input = false;
|
||||
}
|
||||
|
||||
if (! in_array($_POST['interface'], $interfaces)) {
|
||||
$status->addMessage('Unknown interface '.htmlspecialchars($_POST['interface'], ENT_QUOTES), 'danger');
|
||||
$good_input = false;
|
||||
}
|
||||
if (strlen($_POST['country_code']) !== 0 && strlen($_POST['country_code']) != 2) {
|
||||
$status->addMessage('Country code must be blank or two characters', 'danger');
|
||||
$good_input = false;
|
||||
} else {
|
||||
$country_code = $_POST['country_code'];
|
||||
}
|
||||
if (isset($_POST['beaconintervalEnable'])) {
|
||||
if (!is_numeric($_POST['beacon_interval'])) {
|
||||
$status->addMessage('Beacon interval must be a numeric value', 'danger');
|
||||
$good_input = false;
|
||||
} elseif ($_POST['beacon_interval'] < 15 || $_POST['beacon_interval'] > 65535) {
|
||||
$status->addMessage('Beacon interval must be between 15 and 65535', 'danger');
|
||||
$good_input = false;
|
||||
}
|
||||
}
|
||||
$_POST['max_num_sta'] = (int) $_POST['max_num_sta'];
|
||||
$_POST['max_num_sta'] = $_POST['max_num_sta'] > 2007 ? 2007 : $_POST['max_num_sta'];
|
||||
$_POST['max_num_sta'] = $_POST['max_num_sta'] < 1 ? null : $_POST['max_num_sta'];
|
||||
|
||||
if ($good_input) {
|
||||
$return = updateHostapdConfig($ignore_broadcast_ssid,$wifiAPEnable,$bridgedEnable);
|
||||
|
||||
if (trim($country_code) != trim($reg_domain)) {
|
||||
$return = iwRegSet($country_code, $status);
|
||||
}
|
||||
|
||||
// Fetch dhcp-range, lease time from system config
|
||||
$syscfg = parse_ini_file(RASPI_DNSMASQ_PREFIX.$ap_iface.'.conf', false, INI_SCANNER_RAW);
|
||||
|
||||
if ($wifiAPEnable == 1) {
|
||||
// Enable uap0 configuration for ap-sta mode
|
||||
// Set dhcp-range from system config, fallback to default if undefined
|
||||
$dhcp_range = ($syscfg['dhcp-range'] == '') ? getDefaultNetValue('dnsmasq','uap0','dhcp-range') : $syscfg['dhcp-range'];
|
||||
$config = [ '# RaspAP uap0 configuration' ];
|
||||
$config[] = 'interface=lo,uap0 # Enable uap0 interface for wireless client AP mode';
|
||||
$config[] = 'bind-dynamic # Hybrid between --bind-interfaces and default';
|
||||
$config[] = 'server=8.8.8.8 # Forward DNS requests to Google DNS';
|
||||
$config[] = 'domain-needed # Don\'t forward short names';
|
||||
$config[] = 'bogus-priv # Never forward addresses in the non-routed address spaces';
|
||||
$config[] = 'dhcp-range='.$dhcp_range;
|
||||
if (!empty($syscfg['dhcp-option'])) {
|
||||
$config[] = 'dhcp-option='.$syscfg['dhcp-option'];
|
||||
}
|
||||
$config[] = PHP_EOL;
|
||||
scanConfigDir('/etc/dnsmasq.d/','uap0',$status);
|
||||
$config = join(PHP_EOL, $config);
|
||||
file_put_contents("/tmp/dnsmasqdata", $config);
|
||||
system('sudo cp /tmp/dnsmasqdata '.RASPI_DNSMASQ_PREFIX.$ap_iface.'.conf', $return);
|
||||
} elseif ($bridgedEnable !==1) {
|
||||
$dhcp_range = ($syscfg['dhcp-range'] =='') ? getDefaultNetValue('dnsmasq',$ap_iface,'dhcp-range') : $syscfg['dhcp-range'];
|
||||
$config = [ '# RaspAP '.$_POST['interface'].' configuration' ];
|
||||
$config[] = 'interface='.$_POST['interface'];
|
||||
$config[] = 'domain-needed';
|
||||
$config[] = 'dhcp-range='.$dhcp_range;
|
||||
if (!empty($syscfg['dhcp-option'])) {
|
||||
$config[] = 'dhcp-option='.$syscfg['dhcp-option'];
|
||||
}
|
||||
$config[] = PHP_EOL;
|
||||
$config = join(PHP_EOL, $config);
|
||||
file_put_contents("/tmp/dnsmasqdata", $config);
|
||||
system('sudo cp /tmp/dnsmasqdata '.RASPI_DNSMASQ_PREFIX.$ap_iface.'.conf', $return);
|
||||
}
|
||||
|
||||
// Set dhcp values from system config, fallback to default if undefined
|
||||
$jsonData = json_decode(getNetConfig($ap_iface), true);
|
||||
$ip_address = empty($jsonData['StaticIP'])
|
||||
? getDefaultNetValue('dhcp', $ap_iface, 'static ip_address') : $jsonData['StaticIP'];
|
||||
$domain_name_server = empty($jsonData['StaticDNS'])
|
||||
? getDefaultNetValue('dhcp', $ap_iface, 'static domain_name_server') : $jsonData['StaticDNS'];
|
||||
$routers = empty($jsonData['StaticRouters'])
|
||||
? getDefaultNetValue('dhcp', $ap_iface, 'static routers') : $jsonData['StaticRouters'];
|
||||
$netmask = (empty($jsonData['SubnetMask']) || $jsonData['SubnetMask'] === '0.0.0.0')
|
||||
? getDefaultNetValue('dhcp', $ap_iface, 'subnetmask') : $jsonData['SubnetMask'];
|
||||
if (isset($ip_address) && !preg_match('/.*\/\d+/', $ip_address)) {
|
||||
$ip_address.='/'.mask2cidr($netmask);
|
||||
}
|
||||
if ($bridgedEnable == 1) {
|
||||
$config = array_keys(getDefaultNetOpts('dhcp','options'));
|
||||
$config[] = PHP_EOL.'# RaspAP br0 configuration';
|
||||
$config[] = 'denyinterfaces eth0 wlan0';
|
||||
$config[] = 'interface br0';
|
||||
$config[] = PHP_EOL;
|
||||
} elseif ($wifiAPEnable == 1) {
|
||||
$config = array_keys(getDefaultNetOpts('dhcp','options'));
|
||||
$config[] = PHP_EOL.'# RaspAP uap0 configuration';
|
||||
$config[] = 'interface uap0';
|
||||
$config[] = 'static ip_address='.$ip_address;
|
||||
$config[] = 'nohook wpa_supplicant';
|
||||
$config[] = PHP_EOL;
|
||||
|
||||
} else {
|
||||
$config = updateDhcpcdConfig($ap_iface, $jsonData, $ip_address, $routers, $domain_name_server);
|
||||
}
|
||||
|
||||
$dhcp_cfg = file_get_contents(RASPI_DHCPCD_CONFIG);
|
||||
|
||||
$skip_dhcp = false;
|
||||
if (preg_match('/wlan[2-9]\d*|wlan[1-9]\d+/', $ap_iface)) {
|
||||
$skip_dhcp = true;
|
||||
} elseif ($bridgedEnable == 1 || $wifiAPEnable == 1) {
|
||||
$dhcp_cfg = join(PHP_EOL, $config);
|
||||
$status->addMessage(sprintf(_('DHCP configuration for %s enabled.'), $ap_iface), 'success');
|
||||
} elseif (!preg_match('/^interface\s'.$ap_iface.'$/m', $dhcp_cfg)) {
|
||||
$config[] = PHP_EOL;
|
||||
$config= join(PHP_EOL, $config);
|
||||
$dhcp_cfg = removeDHCPIface($dhcp_cfg,'br0');
|
||||
$dhcp_cfg = removeDHCPIface($dhcp_cfg,'uap0');
|
||||
$dhcp_cfg .= $config;
|
||||
$status->addMessage(sprintf(_('DHCP configuration for %s added.'), $ap_iface), 'success');
|
||||
} else {
|
||||
$config = join(PHP_EOL, $config);
|
||||
$dhcp_cfg = removeDHCPIface($dhcp_cfg,'br0');
|
||||
$dhcp_cfg = removeDHCPIface($dhcp_cfg,'uap0');
|
||||
$dhcp_cfg = preg_replace('/^#\sRaspAP\s'.$ap_iface.'\s.*?(?=\s*^\s*$)/ms', $config, $dhcp_cfg, 1);
|
||||
$status->addMessage(sprintf(_('DHCP configuration for %s updated.'), $ap_iface), 'success');
|
||||
}
|
||||
if (!$skip_dhcp) {
|
||||
file_put_contents("/tmp/dhcpddata", $dhcp_cfg);
|
||||
system('sudo cp /tmp/dhcpddata '.RASPI_DHCPCD_CONFIG, $return);
|
||||
if ($return == 0) {
|
||||
$status->addMessage('Wifi Hotspot settings saved', 'success');
|
||||
} else {
|
||||
$status->addMessage('Unable to save wifi hotspot settings', 'danger');
|
||||
}
|
||||
} else {
|
||||
$status->addMessage(sprintf(_('Interface %s has no default settings.'), $ap_iface), 'warning');
|
||||
$status->addMessage(('Configure settings in <strong>DHCP Server</strong> before starting AP.'), 'warning');
|
||||
$status->addMessage('Wifi Hotspot settings saved', 'success');
|
||||
}
|
||||
} else {
|
||||
$status->addMessage('Unable to save wifi hotspot settings', 'danger');
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
/**
|
||||
* Updates a hostapd configuration
|
||||
*
|
||||
* @return boolean $result
|
||||
*/
|
||||
function updateHostapdConfig($ignore_broadcast_ssid,$wifiAPEnable,$bridgedEnable)
|
||||
{
|
||||
// Fixed values
|
||||
$country_code = $_POST['country_code'];
|
||||
$config = 'driver=nl80211'.PHP_EOL;
|
||||
$config.= 'ctrl_interface='.RASPI_HOSTAPD_CTRL_INTERFACE.PHP_EOL;
|
||||
$config.= 'ctrl_interface_group=0'.PHP_EOL;
|
||||
$config.= 'auth_algs=1'.PHP_EOL;
|
||||
$config.= 'wpa_key_mgmt=WPA-PSK'.PHP_EOL;
|
||||
if (isset($_POST['beaconintervalEnable'])) {
|
||||
$config.= 'beacon_int='.$_POST['beacon_interval'].PHP_EOL;
|
||||
}
|
||||
if (isset($_POST['disassoc_low_ackEnable'])) {
|
||||
$config.= 'disassoc_low_ack=0'.PHP_EOL;
|
||||
}
|
||||
$config.= 'ssid='.$_POST['ssid'].PHP_EOL;
|
||||
$config.= 'channel='.$_POST['channel'].PHP_EOL;
|
||||
|
||||
// Set VHT center frequency segment value
|
||||
if ((int)$_POST['channel'] < RASPI_5GHZ_CHANNEL_MIN) {
|
||||
$vht_freq_idx = 42;
|
||||
} else {
|
||||
$vht_freq_idx = 155;
|
||||
}
|
||||
|
||||
if ($_POST['hw_mode'] === 'n') {
|
||||
$config.= 'hw_mode=g'.PHP_EOL;
|
||||
$config.= 'ieee80211n=1'.PHP_EOL;
|
||||
// Enable basic Quality of service
|
||||
$config.= 'wmm_enabled=1'.PHP_EOL;
|
||||
} elseif ($_POST['hw_mode'] === 'ac') {
|
||||
$config.= 'hw_mode=a'.PHP_EOL.PHP_EOL;
|
||||
$config.= '# N'.PHP_EOL;
|
||||
$config.= 'ieee80211n=1'.PHP_EOL;
|
||||
$config.= 'require_ht=1'.PHP_EOL;
|
||||
$config.= 'ht_capab=[MAX-AMSDU-3839][HT40+][SHORT-GI-20][SHORT-GI-40][DSSS_CCK-40]'.PHP_EOL.PHP_EOL;
|
||||
$config.= '# AC'.PHP_EOL;
|
||||
$config.= 'ieee80211ac=1'.PHP_EOL;
|
||||
$config.= 'require_vht=1'.PHP_EOL;
|
||||
$config.= 'ieee80211d=0'.PHP_EOL;
|
||||
$config.= 'ieee80211h=0'.PHP_EOL;
|
||||
$config.= 'vht_capab=[MAX-AMSDU-3839][SHORT-GI-80]'.PHP_EOL;
|
||||
$config.= 'vht_oper_chwidth=1'.PHP_EOL;
|
||||
$config.= 'vht_oper_centr_freq_seg0_idx='.$vht_freq_idx.PHP_EOL.PHP_EOL;
|
||||
} elseif ($_POST['hw_mode'] === 'w') {
|
||||
$config.= 'ieee80211w=2'.PHP_EOL;
|
||||
$config.= 'wpa_key_mgmt=WPA-EAP-SHA256'.PHP_EOL;
|
||||
} else {
|
||||
$config.= 'hw_mode='.$_POST['hw_mode'].PHP_EOL;
|
||||
$config.= 'ieee80211n=0'.PHP_EOL;
|
||||
}
|
||||
if ($_POST['wpa'] !== 'none') {
|
||||
$config.= 'wpa_passphrase='.$_POST['wpa_passphrase'].PHP_EOL;
|
||||
}
|
||||
if ($wifiAPEnable == 1) {
|
||||
$config.= 'interface=uap0'.PHP_EOL;
|
||||
} elseif ($bridgedEnable == 1) {
|
||||
$config.='interface='.$_POST['interface'].PHP_EOL;
|
||||
$config.= 'bridge=br0'.PHP_EOL;
|
||||
} else {
|
||||
$config.= 'interface='.$_SESSION['ap_interface'].PHP_EOL;
|
||||
}
|
||||
$config.= 'wpa='.$_POST['wpa'].PHP_EOL;
|
||||
$config.= 'wpa_pairwise='.$_POST['wpa_pairwise'].PHP_EOL;
|
||||
$config.= 'country_code='.$_POST['country_code'].PHP_EOL;
|
||||
$config.= 'ignore_broadcast_ssid='.$ignore_broadcast_ssid.PHP_EOL;
|
||||
if (isset($_POST['max_num_sta'])) {
|
||||
$config.= 'max_num_sta='.$_POST['max_num_sta'].PHP_EOL;
|
||||
}
|
||||
|
||||
$config.= parseUserHostapdCfg();
|
||||
|
||||
file_put_contents("/tmp/hostapddata", $config);
|
||||
system("sudo cp /tmp/hostapddata " . RASPI_HOSTAPD_CONFIG, $result);
|
||||
return $result;
|
||||
}
|
||||
|
||||
/**
|
||||
* Updates the dhcpcd configuration for a given interface, preserving existing settings
|
||||
*
|
||||
* @param string $ap_iface
|
||||
* @param array $jsonData
|
||||
* @param string $ip_address
|
||||
* @param string $routers
|
||||
* @param string $domain_name_server
|
||||
* @return array updated configuration
|
||||
*/
|
||||
function updateDhcpcdConfig($ap_iface, $jsonData, $ip_address, $routers, $domain_name_server) {
|
||||
$dhcp_cfg = file_get_contents(RASPI_DHCPCD_CONFIG);
|
||||
$existing_config = [];
|
||||
$section_regex = '/^#\sRaspAP\s'.preg_quote($ap_iface, '/').'\s.*?(?=\s*^\s*$)/ms';
|
||||
|
||||
// extract existing interface configuration
|
||||
if (preg_match($section_regex, $dhcp_cfg, $matches)) {
|
||||
$lines = explode(PHP_EOL, $matches[0]);
|
||||
foreach ($lines as $line) {
|
||||
$line = trim($line);
|
||||
if (preg_match('/^(interface|static|metric|nogateway|nohook)/', $line)) {
|
||||
$existing_config[] = $line;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// initialize with comment
|
||||
$config = [ '# RaspAP '.$ap_iface.' configuration' ];
|
||||
$config[] = 'interface '.$ap_iface;
|
||||
$static_settings = [
|
||||
'static ip_address' => $ip_address,
|
||||
'static routers' => $routers,
|
||||
'static domain_name_server' => $domain_name_server
|
||||
];
|
||||
|
||||
// merge existing settings with updates
|
||||
foreach ($existing_config as $line) {
|
||||
$matched = false;
|
||||
foreach ($static_settings as $key => $value) {
|
||||
if (strpos($line, $key) === 0) {
|
||||
$config[] = "$key=$value";
|
||||
$matched = true;
|
||||
unset($static_settings[$key]);
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (!$matched && !preg_match('/^interface/', $line)) {
|
||||
$config[] = $line;
|
||||
}
|
||||
}
|
||||
|
||||
// add any new static settings
|
||||
foreach ($static_settings as $key => $value) {
|
||||
$config[] = "$key=$value";
|
||||
}
|
||||
|
||||
// add metric if provided
|
||||
if (!empty($jsonData['Metric']) && !in_array('metric '.$jsonData['Metric'], $config)) {
|
||||
$config[] = 'metric '.$jsonData['Metric'];
|
||||
}
|
||||
|
||||
return $config;
|
||||
}
|
||||
|
||||
/**
|
||||
* Executes iw to set the specified ISO 2-letter country code
|
||||
*
|
||||
* @param string $country_code
|
||||
* @param object $status
|
||||
* @return boolean $result
|
||||
*/
|
||||
function iwRegSet(string $country_code, $status)
|
||||
{
|
||||
$country_code = escapeshellarg($country_code);
|
||||
$result = shell_exec("sudo iw reg set $country_code");
|
||||
$status->addMessage(sprintf(_('Setting wireless regulatory domain to %s'), $country_code, 'success'));
|
||||
return $result;
|
||||
}
|
||||
|
||||
/**
|
||||
* Parses optional /etc/hostapd/hostapd.conf.users file
|
||||
*
|
||||
* @return string $tmp
|
||||
*/
|
||||
function parseUserHostapdCfg()
|
||||
{
|
||||
if (file_exists(RASPI_HOSTAPD_CONFIG . '.users')) {
|
||||
exec('cat '. RASPI_HOSTAPD_CONFIG . '.users', $hostapdconfigusers);
|
||||
foreach ($hostapdconfigusers as $hostapdconfigusersline) {
|
||||
if (strlen($hostapdconfigusersline) === 0) {
|
||||
continue;
|
||||
}
|
||||
if ($hostapdconfigusersline[0] != "#") {
|
||||
$arrLine = explode("=", $hostapdconfigusersline);
|
||||
$tmp.= $arrLine[0]."=".$arrLine[1].PHP_EOL;;
|
||||
}
|
||||
}
|
||||
return $tmp;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -1,5 +1,4 @@
|
||||
<?php
|
||||
|
||||
/*
|
||||
* Fetches details of the kernel routing table
|
||||
*
|
||||
@@ -32,14 +31,19 @@ function getRouteInfo($checkAccess)
|
||||
if (!empty($routes)) {
|
||||
foreach ($routes as $i => $route) {
|
||||
$prop = explode(' ', $route);
|
||||
$rInfo[$i]["interface"] = $prop[0];
|
||||
$rInfo[$i]["interface"] = $dev = $prop[0];
|
||||
$rInfo[$i]["ip-address"] = $prop[1];
|
||||
$rInfo[$i]["gateway"] = $prop[2];
|
||||
// resolve the name of the gateway (if possible)
|
||||
unset($host);
|
||||
exec('host ' . $prop[2] . ' | sed -rn "s/.*domain name pointer (.*)\./\1/p" | head -n 1', $host);
|
||||
$rInfo[$i]["gw-name"] = empty($host) ? "*" : $host[0];
|
||||
if (isset($checkAccess) && $checkAccess) {
|
||||
// check if AP
|
||||
unset($isAP);
|
||||
exec("iwconfig $dev 2> /dev/null | sed -rn 's/.*(mode:master).*/1/ip'", $isAP);
|
||||
$isAP = !empty($isAP);
|
||||
$rInfo[$i]["isAP"] = $isAP;
|
||||
if (isset($checkAccess) && $checkAccess && !$isAP) {
|
||||
// check internet connectivity w/ and w/o DNS resolution
|
||||
unset($okip);
|
||||
exec('ping -W1 -c 1 -I ' . $prop[0] . ' ' . RASPI_ACCESS_CHECK_IP . ' | sed -rn "s/.*icmp_seq=1.*time=.*/OK/p"', $okip);
|
||||
@@ -47,6 +51,7 @@ function getRouteInfo($checkAccess)
|
||||
unset($okdns);
|
||||
exec('ping -W1 -c 1 -I ' . $prop[0] . ' ' . RASPI_ACCESS_CHECK_DNS . ' | sed -rn "s/.*icmp_seq=1.*time=.*/OK/p"', $okdns);
|
||||
$rInfo[$i]["access-dns"] = empty($okdns) ? false : true;
|
||||
$rInfo[$i]["access-url"] = preg_match('/OK.*/',checkHTTPAccess($prop[0]));
|
||||
}
|
||||
}
|
||||
} else {
|
||||
@@ -55,6 +60,70 @@ function getRouteInfo($checkAccess)
|
||||
return $rInfo;
|
||||
}
|
||||
|
||||
function detectCaptivePortal($iface) {
|
||||
$result=checkHTTPAccess($iface, true);
|
||||
$checkConnect=array( "state"=>"FAILED", "URL"=>"", "interface"=> $iface, "url" => "" );
|
||||
if ( !empty($result) && !preg_match('/FAILED/i',$result) ) {
|
||||
$checkConnect["state"]=preg_match('/(PORTAL|OK)/i',$result);
|
||||
if ( preg_match('/PORTAL (.*)/i',$result ,$url) && !empty($url) ) {
|
||||
$checkConnect["URL"]=$url[1];
|
||||
}
|
||||
}
|
||||
return $checkConnect;
|
||||
}
|
||||
|
||||
function checkHTTPAccess($iface, $detectPortal=false) {
|
||||
|
||||
$ret="FAILED no HTTP access";
|
||||
exec('timeout 5 curl -is ' . RASPI_ACCESS_CHECK_URL . ' --interface ' . $iface, $rcurl);
|
||||
if ( !empty($rcurl) && preg_match("/^HTTP\/[0-9\.]+ ([0-9]+)/m",$rcurl=implode("\n",$rcurl),$code) ) {
|
||||
$code = $code[1];
|
||||
if ( $code == 200 ) {
|
||||
if ( preg_match("/<meta\s*http-equiv=\"refresh\".*content=\".*url=([^\s]+)\".*>/", $rcurl, $url) ) {
|
||||
$code = 302;
|
||||
$rcurl = "Location: " . $url[1];
|
||||
unset($url);
|
||||
}
|
||||
}
|
||||
switch($code) {
|
||||
case 302:
|
||||
case 307:
|
||||
if ( $detectPortal ) {
|
||||
if ( preg_match("/^Location:\s*(https?:\/\/[^?[:space:]]+)/m", $rcurl, $url) ) {
|
||||
$url=$url[1];
|
||||
if ( preg_match('/^https?:\/\/([^:\/]*).*/i', $url, $srv) && isset($srv[1]) ) {
|
||||
$srv=$srv[1];
|
||||
if ( preg_match('/^(([0-9]{1,3}\.){3}[0-9]{1,3}).*/', $srv, $ip) && isset($ip[1]) ) {
|
||||
$ret="PORTAL " . $url;
|
||||
}
|
||||
else {
|
||||
exec('timeout 7 sudo nmap --script=broadcast-dhcp-discover -e ' . $iface . ' 2> /dev/null | sed -rn "s/.*Domain Name Server:\s*(([0-9]{1,3}\.){3}[0-9]{1,3}).*/\1/pi"', $nameserver);
|
||||
if ( !empty($nameserver) ) {
|
||||
$nameserver=$nameserver[0];
|
||||
exec('host ' . $srv . ' ' . $nameserver . ' | sed -rn "s/.*has address ((([0-9]{1,3}\.){3}[0-9]{1,3})).*/\1/p"', $ip2);
|
||||
if ( !empty($ip2) ) {
|
||||
$ip2=$ip2[0];
|
||||
$url=preg_replace("/" . $srv . "/",$ip2,$url);
|
||||
$ret="PORTAL " . $url;
|
||||
}
|
||||
else $ret="FAILED name " . $srv . " could not be resolved";
|
||||
}
|
||||
else $ret="FAILED no name server";
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
break;
|
||||
case RASPI_ACCESS_CHECK_URL_CODE:
|
||||
$ret="OK internet access";
|
||||
break;
|
||||
default:
|
||||
$ret="FAILED unexpected response " . $code[0];
|
||||
break;
|
||||
}
|
||||
}
|
||||
return $ret;
|
||||
}
|
||||
/*
|
||||
* Fetches raw output of ip route
|
||||
*
|
||||
@@ -65,4 +134,3 @@ function getRouteInfoRaw()
|
||||
exec('ip route list', $routes);
|
||||
return $routes;
|
||||
}
|
||||
|
||||
|
||||
@@ -1,130 +1,41 @@
|
||||
<?php
|
||||
/**
|
||||
* Sets locale information for i18n support
|
||||
* Sets locale information for i18n support, with validation
|
||||
*
|
||||
* @see RaspAP\Localization\LocaleManager
|
||||
*/
|
||||
|
||||
use RaspAP\Localization\LocaleManager;
|
||||
|
||||
// Initialize locale manager
|
||||
$localeManager = new LocaleManager();
|
||||
$localeManager->initializeAndApply();
|
||||
|
||||
/**
|
||||
* Rudimentary language detection via the browser.
|
||||
* Accept-Language returns a list of weighted values with a quality (or 'q') parameter.
|
||||
* A better method would parse the list of preferred languages and match this with
|
||||
* the languages supported by our platform.
|
||||
* Get all available locales
|
||||
*
|
||||
* Refer to: https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.4
|
||||
* @return array Associative array of locale codes to language names
|
||||
*/
|
||||
if (empty($_SESSION['locale']) && !empty($_SERVER['HTTP_ACCEPT_LANGUAGE']) && strlen($_SERVER['HTTP_ACCEPT_LANGUAGE']) >= 2) {
|
||||
$lang = substr($_SERVER['HTTP_ACCEPT_LANGUAGE'], 0, 2);
|
||||
switch ($lang) {
|
||||
case "de":
|
||||
$locale = "de_DE.UTF-8";
|
||||
break;
|
||||
case "fr":
|
||||
$locale = "fr_FR.UTF-8";
|
||||
break;
|
||||
case "it":
|
||||
$locale = "it_IT.UTF-8";
|
||||
break;
|
||||
case "pt":
|
||||
$locale = "pt_BR.UTF-8";
|
||||
break;
|
||||
case "sv":
|
||||
$locale = "sv_SE.UTF-8";
|
||||
break;
|
||||
case "nl":
|
||||
$locale = "nl_NL.UTF-8";
|
||||
break;
|
||||
case "zh":
|
||||
if ($_SERVER['HTTP_ACCEPT_LANGUAGE'] == 'zh_TW') {
|
||||
$locale = "zh_TW.UTF-8";
|
||||
} else {
|
||||
$locale = "zh_CN.UTF-8";
|
||||
}
|
||||
break;
|
||||
case "cs":
|
||||
$locale = "cs_CZ.UTF-8";
|
||||
break;
|
||||
case "ru":
|
||||
$locale = "ru_RU.UTF-8";
|
||||
break;
|
||||
case "es":
|
||||
$locale = "es_MX.UTF-8";
|
||||
break;
|
||||
case "fi":
|
||||
$locale = "fi_FI.UTF-8";
|
||||
break;
|
||||
case "da":
|
||||
$locale = "da_DK.UTF-8";
|
||||
break;
|
||||
case "tr":
|
||||
$locale = "tr_TR.UTF-8";
|
||||
break;
|
||||
case "id":
|
||||
$locale = "id_ID.UTF-8";
|
||||
break;
|
||||
case "ko":
|
||||
$locale = "ko_KR.UTF-8";
|
||||
break;
|
||||
case "ja":
|
||||
$locale = "ja_JP.UTF-8";
|
||||
break;
|
||||
case "vi":
|
||||
$locale = "vi_VN.UTF-8";
|
||||
break;
|
||||
case "el":
|
||||
$locale = "el_GR.UTF-8";
|
||||
break;
|
||||
case "pl":
|
||||
$locale = "pl_PL.UTF-8";
|
||||
break;
|
||||
case "sk":
|
||||
$locale = "sk_SK.UTF-8";
|
||||
break;
|
||||
default:
|
||||
$locale = "en_GB.UTF-8";
|
||||
break;
|
||||
}
|
||||
|
||||
$_SESSION['locale'] = $locale;
|
||||
}
|
||||
|
||||
// Note: the associated locale must be installed on the RPi
|
||||
// Use: 'sudo raspi-configure' and select 'Localisation Options'
|
||||
|
||||
// activate the locale setting
|
||||
if (!empty($_SESSION['locale'])) {
|
||||
putenv("LANG=" . $_SESSION['locale']);
|
||||
setlocale(LC_ALL, $_SESSION['locale']);
|
||||
}
|
||||
bindtextdomain(LOCALE_DOMAIN, LOCALE_ROOT);
|
||||
bind_textdomain_codeset(LOCALE_DOMAIN, 'UTF-8');
|
||||
|
||||
textdomain(LOCALE_DOMAIN);
|
||||
|
||||
function getLocales()
|
||||
function getLocales(): array
|
||||
{
|
||||
$arrLocales = array(
|
||||
'en_GB.UTF-8' => 'English',
|
||||
'cs_CZ.UTF-8' => 'Čeština',
|
||||
'zh_TW.UTF-8' => '正體中文 (Chinese traditional)',
|
||||
'zh_CN.UTF-8' => '简体中文 (Chinese simplified)',
|
||||
'da_DK.UTF-8' => 'Dansk',
|
||||
'de_DE.UTF-8' => 'Deutsch',
|
||||
'es_MX.UTF-8' => 'Español',
|
||||
'fi_FI.UTF-8' => 'Finnish',
|
||||
'fr_FR.UTF-8' => 'Français',
|
||||
'el_GR.UTF-8' => 'Ελληνικά',
|
||||
'id_ID.UTF-8' => 'Indonesian',
|
||||
'it_IT.UTF-8' => 'Italiano',
|
||||
'ja_JP.UTF-8' => '日本語 (Japanese)',
|
||||
'ko_KR.UTF-8' => '한국어 (Korean)',
|
||||
'nl_NL.UTF-8' => 'Nederlands',
|
||||
'pl_PL.UTF-8' => 'Polskie',
|
||||
'pt_BR.UTF-8' => 'Português',
|
||||
'ru_RU.UTF-8' => 'Русский',
|
||||
'ro_RO.UTF-8' => 'Română',
|
||||
'sk_SK.UTF-8' => 'Slovenčina',
|
||||
'sv_SE.UTF-8' => 'Svenska',
|
||||
'tr_TR.UTF-8' => 'Türkçe',
|
||||
'vi_VN.UTF-8' => 'Tiếng Việt (Vietnamese)'
|
||||
);
|
||||
return $arrLocales;
|
||||
static $localeManager = null;
|
||||
if ($localeManager === null) {
|
||||
$localeManager = new LocaleManager();
|
||||
}
|
||||
return $localeManager->getLocales();
|
||||
}
|
||||
|
||||
/**
|
||||
* Detect browser locale from Accept-Language header
|
||||
*
|
||||
* @return string Detected locale code
|
||||
*/
|
||||
function detectBrowserLocale(): string
|
||||
{
|
||||
static $localeManager = null;
|
||||
if ($localeManager === null) {
|
||||
$localeManager = new LocaleManager();
|
||||
}
|
||||
return $localeManager->detectBrowserLocale();
|
||||
}
|
||||
|
||||
|
||||
@@ -1,12 +1,12 @@
|
||||
<?php
|
||||
|
||||
require_once 'includes/internetRoute.php';
|
||||
require_once 'includes/functions.php';
|
||||
|
||||
/**
|
||||
*
|
||||
*
|
||||
* Displays a networking summary and network diagnostic tools
|
||||
*/
|
||||
function DisplayNetworkingConfig()
|
||||
function DisplayNetworkingConfig(&$extraFooterScripts)
|
||||
{
|
||||
$status = new \RaspAP\Messages\StatusMessage;
|
||||
|
||||
@@ -23,4 +23,5 @@ function DisplayNetworkingConfig()
|
||||
"routeInfoRaw",
|
||||
"bridgedEnabled")
|
||||
);
|
||||
$extraFooterScripts[] = array('src'=>'app/js/vendor/speedtestUI.js', 'defer'=>false);
|
||||
}
|
||||
|
||||
@@ -1,9 +1,10 @@
|
||||
<?php
|
||||
|
||||
require_once 'includes/config.php';
|
||||
require_once 'includes/wifi_functions.php';
|
||||
|
||||
getWifiInterface();
|
||||
use RaspAP\Networking\Hotspot\WiFiManager;
|
||||
$wifi = new WiFiManager();
|
||||
$wifi->getWifiInterface();
|
||||
|
||||
/**
|
||||
* Manage OpenVPN configuration
|
||||
|
||||
@@ -4,7 +4,7 @@ $pluginManager = \RaspAP\Plugins\PluginManager::getInstance();
|
||||
|
||||
// Get the requested page
|
||||
$extraFooterScripts = array();
|
||||
$page = $_SERVER['PATH_INFO'];
|
||||
$page = $_SERVER['PATH_INFO'] ?? '';
|
||||
|
||||
// Check if any plugin wants to handle the request
|
||||
if (!$pluginManager->handlePageAction($page)) {
|
||||
@@ -32,7 +32,7 @@ function handleCorePageAction(string $page, array &$extraFooterScripts): void
|
||||
DisplayWPAConfig();
|
||||
break;
|
||||
case "/network_conf":
|
||||
DisplayNetworkingConfig();
|
||||
DisplayNetworkingConfig($extraFooterScripts);
|
||||
break;
|
||||
case "/hostapd_conf":
|
||||
DisplayHostAPDConfig();
|
||||
|
||||
@@ -12,6 +12,23 @@ function DisplaySystem(&$extraFooterScripts)
|
||||
$dashboard = new \RaspAP\UI\Dashboard;
|
||||
$pluginInstaller = \RaspAP\Plugins\PluginInstaller::getInstance();
|
||||
|
||||
// set defaults
|
||||
$optAutoclose = true;
|
||||
$alertTimeout = 5000;
|
||||
$good_input = true;
|
||||
$config_port = false;
|
||||
|
||||
// set alert_timeout from cookie if valid
|
||||
if (isset($_COOKIE['alert_timeout']) && is_numeric($_COOKIE['alert_timeout'])) {
|
||||
$cookieTimeout = (int) $_COOKIE['alert_timeout'];
|
||||
|
||||
if ($cookieTimeout > 0) {
|
||||
$alertTimeout = $cookieTimeout;
|
||||
} else {
|
||||
// A value of 0 means auto-close is disabled
|
||||
$optAutoclose = false;
|
||||
}
|
||||
}
|
||||
if (isset($_POST['SaveLanguage'])) {
|
||||
if (isset($_POST['locale'])) {
|
||||
$_SESSION['locale'] = $_POST['locale'];
|
||||
@@ -21,7 +38,6 @@ function DisplaySystem(&$extraFooterScripts)
|
||||
|
||||
if (!RASPI_MONITOR_ENABLED) {
|
||||
if (isset($_POST['SaveServerSettings'])) {
|
||||
$good_input = true;
|
||||
// Validate server port
|
||||
if (isset($_POST['serverPort'])) {
|
||||
if (strlen($_POST['serverPort']) > 4 || !is_numeric($_POST['serverPort'])) {
|
||||
@@ -32,13 +48,13 @@ function DisplaySystem(&$extraFooterScripts)
|
||||
}
|
||||
}
|
||||
// Validate server bind address
|
||||
$serverBind = escapeshellarg('');
|
||||
if ($_POST['serverBind'] && $_POST['serverBind'] !== null ) {
|
||||
if (!filter_var($_POST['serverBind'], FILTER_VALIDATE_IP)) {
|
||||
if (isset($_POST['serverBind']) && $_POST['serverBind'] !== '') {
|
||||
$inputBind = trim($_POST['serverBind']);
|
||||
if (!filter_var($inputBind, FILTER_VALIDATE_IP)) {
|
||||
$status->addMessage('Invalid value for bind address', 'danger');
|
||||
$good_input = false;
|
||||
} else {
|
||||
$serverBind = escapeshellarg($_POST['serverBind']);
|
||||
$serverBind = escapeshellarg($inputBind);
|
||||
}
|
||||
}
|
||||
// Validate log limit
|
||||
@@ -58,6 +74,21 @@ function DisplaySystem(&$extraFooterScripts)
|
||||
$status->addMessage($line, 'info');
|
||||
}
|
||||
}
|
||||
} elseif (isset($_POST['savethemeSettings'])) {
|
||||
// Validate alert timout
|
||||
if (isset($_POST['autoClose'])) {
|
||||
$alertTimeout = trim($_POST['alertTimeout'] ?? '');
|
||||
if (strlen($alertTimeout) > 7 || !is_numeric($alertTimeout)) {
|
||||
$status->addMessage('Invalid value for alert close timeout', 'danger');
|
||||
$good_input = false;
|
||||
} else {
|
||||
setcookie('alert_timeout', (int) $alertTimeout);
|
||||
$status->addMessage(sprintf(_('Changing alert close timeout to %s ms'), $alertTimeout), 'info');
|
||||
}
|
||||
} else {
|
||||
setcookie('alert_timeout', '', time() - 3600, '/');
|
||||
$optAutoclose = false;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -91,10 +122,16 @@ function DisplaySystem(&$extraFooterScripts)
|
||||
|
||||
// memory use
|
||||
$memused = $system->usedMemory();
|
||||
$memStatus = getMemStatus($memused);
|
||||
$memStatus = getResourceStatus($memused);
|
||||
$memused_status = $memStatus['status'];
|
||||
$memused_led = $memStatus['led'];
|
||||
|
||||
// disk storage use
|
||||
$diskused = $system->usedDisk();
|
||||
$diskStatus = getResourceStatus($diskused);
|
||||
$diskused_status = $diskStatus['status'];
|
||||
$diskused_led = $diskStatus['led'];
|
||||
|
||||
// cpu load
|
||||
$cpuload = $system->systemLoadPercentage();
|
||||
$cpuload_status = getCPULoadStatus($cpuload);
|
||||
@@ -116,7 +153,7 @@ function DisplaySystem(&$extraFooterScripts)
|
||||
];
|
||||
$selectedTheme = array_search($_COOKIE['theme'], $themeFiles);
|
||||
$extraFooterScripts[] = array('src'=>'dist/huebee/huebee.pkgd.min.js', 'defer'=>false);
|
||||
$extraFooterScripts[] = array('src'=>'app/js/huebee.js', 'defer'=>false);
|
||||
$extraFooterScripts[] = array('src'=>'app/js/vendor/huebee.js', 'defer'=>false);
|
||||
$logLimit = isset($_SESSION['log_limit']) ? $_SESSION['log_limit'] : RASPI_LOG_SIZE_LIMIT;
|
||||
|
||||
$plugins = $pluginInstaller->getUserPlugins();
|
||||
@@ -138,6 +175,9 @@ function DisplaySystem(&$extraFooterScripts)
|
||||
"memused",
|
||||
"memused_status",
|
||||
"memused_led",
|
||||
"diskused",
|
||||
"diskused_status",
|
||||
"diskused_led",
|
||||
"cpuload",
|
||||
"cpuload_status",
|
||||
"cputemp",
|
||||
@@ -146,29 +186,31 @@ function DisplaySystem(&$extraFooterScripts)
|
||||
"themes",
|
||||
"selectedTheme",
|
||||
"logLimit",
|
||||
"pluginsTable"
|
||||
"pluginsTable",
|
||||
"optAutoclose",
|
||||
"alertTimeout"
|
||||
));
|
||||
}
|
||||
|
||||
function getMemStatus($memused): array
|
||||
function getResourceStatus($used): array
|
||||
{
|
||||
$memused_status = "primary";
|
||||
$memused_led = "";
|
||||
$used_status = "primary";
|
||||
$used_led = "";
|
||||
|
||||
if ($memused > 90) {
|
||||
$memused_status = "danger";
|
||||
$memused_led = "service-status-down";
|
||||
} elseif ($memused > 75) {
|
||||
$memused_status = "warning";
|
||||
$memused_led = "service-status-warn";
|
||||
} elseif ($memused > 0) {
|
||||
$memused_status = "success";
|
||||
$memused_led = "service-status-up";
|
||||
if ($used > 90) {
|
||||
$used_status = "danger";
|
||||
$used_led = "service-status-down";
|
||||
} elseif ($used > 75) {
|
||||
$used_status = "warning";
|
||||
$used_led = "service-status-warn";
|
||||
} elseif ($used > 0) {
|
||||
$used_status = "success";
|
||||
$used_led = "service-status-up";
|
||||
}
|
||||
|
||||
return [
|
||||
'status' => $memused_status,
|
||||
'led' => $memused_led
|
||||
'status' => $used_status,
|
||||
'led' => $used_led
|
||||
];
|
||||
}
|
||||
|
||||
|
||||
@@ -1,328 +0,0 @@
|
||||
<?php
|
||||
|
||||
require_once 'functions.php';
|
||||
|
||||
const MIN_RSSI = -100;
|
||||
const MAX_RSSI = -55;
|
||||
|
||||
function knownWifiStations(&$networks)
|
||||
{
|
||||
// Find currently configured networks
|
||||
exec(' sudo cat ' . RASPI_WPA_SUPPLICANT_CONFIG, $known_return);
|
||||
//$index = 0;
|
||||
foreach ($known_return as $line) {
|
||||
if (preg_match('/network\s*=/', $line)) {
|
||||
$network = array('visible' => false, 'configured' => true, 'connected' => false, 'index' => null);
|
||||
++$index;
|
||||
} elseif (isset($network) && $network !== null) {
|
||||
if (preg_match('/^\s*}\s*$/', $line)) {
|
||||
$networks[$ssid] = $network;
|
||||
$network = null;
|
||||
$ssid = null;
|
||||
} elseif ($lineArr = preg_split('/\s*=\s*/', trim($line), 2)) {
|
||||
switch (strtolower($lineArr[0])) {
|
||||
case 'ssid':
|
||||
$ssid = trim($lineArr[1], '"');
|
||||
$ssid = str_replace('P"','',$ssid);
|
||||
$network['ssid'] = $ssid;
|
||||
$index = getNetworkIdBySSID($ssid);
|
||||
$network['index'] = $index;
|
||||
break;
|
||||
case 'psk':
|
||||
$network['passkey'] = trim($lineArr[1]);
|
||||
$network['protocol'] = 'WPA';
|
||||
break;
|
||||
case '#psk':
|
||||
$network['protocol'] = 'WPA';
|
||||
case 'wep_key0': // Untested
|
||||
$network['passphrase'] = trim($lineArr[1], '"');
|
||||
break;
|
||||
case 'key_mgmt':
|
||||
if (! array_key_exists('passphrase', $network) && $lineArr[1] === 'NONE') {
|
||||
$network['protocol'] = 'Open';
|
||||
}
|
||||
break;
|
||||
case 'priority':
|
||||
$network['priority'] = trim($lineArr[1], '"');
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
function nearbyWifiStations(&$networks, $cached = true)
|
||||
{
|
||||
$cacheTime = filemtime(RASPI_WPA_SUPPLICANT_CONFIG);
|
||||
$cacheKey = "nearby_wifi_stations_$cacheTime";
|
||||
|
||||
if ($cached == false) {
|
||||
deleteCache($cacheKey);
|
||||
}
|
||||
|
||||
$scan_results = cache(
|
||||
$cacheKey, function () {
|
||||
exec('sudo wpa_cli -i ' .$_SESSION['wifi_client_interface']. ' scan');
|
||||
sleep(3);
|
||||
$stdout = shell_exec('sudo wpa_cli -i ' .$_SESSION['wifi_client_interface']. ' scan_results');
|
||||
return preg_split("/\n/", $stdout);
|
||||
}
|
||||
);
|
||||
// get the name of the AP. Should be excluded from nearby networks
|
||||
exec('cat '.RASPI_HOSTAPD_CONFIG.' | sed -rn "s/ssid=(.*)\s*$/\1/p" ', $ap_ssid);
|
||||
$ap_ssid = $ap_ssid[0];
|
||||
|
||||
$index = 0;
|
||||
if ( !empty($networks) ) {
|
||||
$lastnet = end($networks);
|
||||
if ( isset($lastnet['index']) ) $index = $lastnet['index'] + 1;
|
||||
}
|
||||
|
||||
if (is_array($scan_results)) {
|
||||
array_shift($scan_results);
|
||||
foreach ($scan_results as $network) {
|
||||
$arrNetwork = preg_split("/[\t]+/", $network); // split result into array
|
||||
$ssid = $arrNetwork[4];
|
||||
|
||||
// exclude raspap ssid
|
||||
if (empty($ssid) || $ssid == $ap_ssid) {
|
||||
continue;
|
||||
}
|
||||
|
||||
// filter SSID string: unprintable 7bit ASCII control codes, delete or quotes -> ignore network
|
||||
if (preg_match('[\x00-\x1f\x7f\'\`\´\"]', $ssid)) {
|
||||
continue;
|
||||
}
|
||||
|
||||
// If network is saved
|
||||
if (array_key_exists($ssid, $networks)) {
|
||||
$networks[$ssid]['visible'] = true;
|
||||
$networks[$ssid]['channel'] = ConvertToChannel($arrNetwork[1]);
|
||||
// TODO What if the security has changed?
|
||||
} else {
|
||||
$networks[$ssid] = array(
|
||||
'ssid' => $ssid,
|
||||
'configured' => false,
|
||||
'protocol' => ConvertToSecurity($arrNetwork[3]),
|
||||
'channel' => ConvertToChannel($arrNetwork[1]),
|
||||
'passphrase' => '',
|
||||
'visible' => true,
|
||||
'connected' => false,
|
||||
'index' => $index
|
||||
);
|
||||
++$index;
|
||||
}
|
||||
|
||||
// Save RSSI, if the current value is larger than the already stored
|
||||
if (array_key_exists(4, $arrNetwork) && array_key_exists($arrNetwork[4], $networks)) {
|
||||
if (! array_key_exists('RSSI', $networks[$arrNetwork[4]]) || $networks[$ssid]['RSSI'] < $arrNetwork[2]) {
|
||||
$networks[$ssid]['RSSI'] = $arrNetwork[2];
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
function connectedWifiStations(&$networks)
|
||||
{
|
||||
exec('iwconfig ' .$_SESSION['wifi_client_interface'], $iwconfig_return);
|
||||
foreach ($iwconfig_return as $line) {
|
||||
if (preg_match('/ESSID:\"([^"]+)\"/i', $line, $iwconfig_ssid)) {
|
||||
$networks[hexSequence2lower($iwconfig_ssid[1])]['connected'] = true;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
function sortNetworksByRSSI(&$networks)
|
||||
{
|
||||
$valRSSI = array();
|
||||
foreach ($networks as $SSID => $net) {
|
||||
if (!array_key_exists('RSSI', $net)) {
|
||||
$net['RSSI'] = -1000;
|
||||
}
|
||||
$valRSSI[$SSID] = $net['RSSI'];
|
||||
}
|
||||
$nets = $networks;
|
||||
arsort($valRSSI);
|
||||
$networks = array();
|
||||
foreach ($valRSSI as $SSID => $RSSI) {
|
||||
$networks[$SSID] = $nets[$SSID];
|
||||
$networks[$SSID]['RSSI'] = $RSSI;
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
* Determines the configured wireless AP interface
|
||||
*
|
||||
* If not saved in /etc/raspap/hostapd.ini, check for a second
|
||||
* wireless interface with iw dev. Fallback to the constant
|
||||
* value defined in config.php
|
||||
*/
|
||||
function getWifiInterface()
|
||||
{
|
||||
$hostapdIni = RASPI_CONFIG . '/hostapd.ini';
|
||||
$arrHostapdConf = file_exists($hostapdIni) ? parse_ini_file($hostapdIni) : [];
|
||||
|
||||
$iface = $_SESSION['ap_interface'] = $arrHostapdConf['WifiInterface'] ?? RASPI_WIFI_AP_INTERFACE;
|
||||
|
||||
if (!validateInterface($iface)) {
|
||||
$iface = RASPI_WIFI_AP_INTERFACE;
|
||||
}
|
||||
|
||||
// check for 2nd wifi interface -> wifi client on different interface
|
||||
exec("iw dev | awk '$1==\"Interface\" && $2!=\"$iface\" {print $2}'", $iface2);
|
||||
$client_iface = $_SESSION['wifi_client_interface'] = empty($iface2) ? $iface : trim($iface2[0]);
|
||||
|
||||
// handle special case for RPi Zero W in AP-STA mode
|
||||
if ($client_iface === "uap0" && ($arrHostapdConf['WifiAPEnable'] ?? 0)) {
|
||||
$_SESSION['wifi_client_interface'] = $iface;
|
||||
$_SESSION['ap_interface'] = $client_iface;
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
* Reinitializes wpa_supplicant for the wireless client interface
|
||||
* The 'force' parameter deletes the socket in /var/run/wpa_supplicant/
|
||||
*
|
||||
* @param boolean $force
|
||||
*/
|
||||
function reinitializeWPA($force)
|
||||
{
|
||||
$iface = escapeshellarg($_SESSION['wifi_client_interface']);
|
||||
if ($force == true) {
|
||||
$cmd = "sudo /bin/rm /var/run/wpa_supplicant/$iface";
|
||||
$result = shell_exec($cmd);
|
||||
}
|
||||
$cmd = "sudo wpa_supplicant -B -Dnl80211 -c/etc/wpa_supplicant/wpa_supplicant.conf -i$iface";
|
||||
$result = shell_exec($cmd);
|
||||
sleep(1);
|
||||
return $result;
|
||||
}
|
||||
|
||||
/*
|
||||
* Replace escaped bytes (hex) by binary - assume UTF8 encoding
|
||||
*
|
||||
* @param string $ssid
|
||||
*/
|
||||
function ssid2utf8($ssid)
|
||||
{
|
||||
return evalHexSequence($ssid);
|
||||
}
|
||||
|
||||
/*
|
||||
* Returns a signal strength indicator based on RSSI value
|
||||
*
|
||||
* @param string $rssi
|
||||
*/
|
||||
function getSignalBars($rssi)
|
||||
{
|
||||
// assign css class based on RSSI value
|
||||
if ($rssi >= MAX_RSSI) {
|
||||
$class = 'strong';
|
||||
} elseif ($rssi >= -56) {
|
||||
$class = 'medium';
|
||||
} elseif ($rssi >= -67) {
|
||||
$class = 'weak';
|
||||
} elseif ($rssi >= -89) {
|
||||
$class = '';
|
||||
}
|
||||
|
||||
// calculate percent strength
|
||||
if ($rssi >= -50) {
|
||||
$pct = 100;
|
||||
} elseif ($rssi <= MIN_RSSI) {
|
||||
$pct = 0;
|
||||
} else {
|
||||
$pct = 2*($rssi + 100);
|
||||
}
|
||||
$elem = '<div data-toggle="tooltip" title="' . _("Signal strength"). ': ' .$pct. '%" class="signal-icon ' .$class. '">'.PHP_EOL;
|
||||
for ($n = 0; $n < 3; $n++ ) {
|
||||
$elem .= '<div class="signal-bar"></div>'.PHP_EOL;
|
||||
}
|
||||
$elem .= '</div>'.PHP_EOL;
|
||||
return $elem;
|
||||
}
|
||||
|
||||
/*
|
||||
* Parses output of wpa_cli list_networks, compares with known networks
|
||||
* from wpa_supplicant, and adds with wpa_cli if not found
|
||||
*
|
||||
* @param array $networks
|
||||
*/
|
||||
function setKnownStationsWPA($networks)
|
||||
{
|
||||
$iface = escapeshellarg($_SESSION['wifi_client_interface']);
|
||||
$output = shell_exec("sudo wpa_cli -i $iface list_networks");
|
||||
$lines = explode("\n", $output);
|
||||
array_shift($lines);
|
||||
$wpaCliNetworks = [];
|
||||
|
||||
foreach ($lines as $line) {
|
||||
$data = explode("\t", trim($line));
|
||||
if (!empty($data) && count($data) >= 2) {
|
||||
$id = $data[0];
|
||||
$ssid = $data[1];
|
||||
$item = [
|
||||
'id' => $id,
|
||||
'ssid' => $ssid
|
||||
];
|
||||
$wpaCliNetworks[] = $item;
|
||||
}
|
||||
}
|
||||
foreach ($networks as $network) {
|
||||
$ssid = $network['ssid'];
|
||||
if (!networkExists($ssid, $wpaCliNetworks)) {
|
||||
$ssid = escapeshellarg('"'.$network['ssid'].'"');
|
||||
$psk = escapeshellarg('"'.$network['passphrase'].'"');
|
||||
$protocol = $network['protocol'];
|
||||
$netid = trim(shell_exec("sudo wpa_cli -i $iface add_network"));
|
||||
if (isset($netid) && !isset($known[$netid])) {
|
||||
$commands = [
|
||||
"sudo wpa_cli -i $iface set_network $netid ssid $ssid",
|
||||
"sudo wpa_cli -i $iface set_network $netid psk $psk",
|
||||
"sudo wpa_cli -i $iface enable_network $netid"
|
||||
];
|
||||
if ($protocol === 'Open') {
|
||||
$commands[1] = "sudo wpa_cli -i $iface set_network $netid key_mgmt NONE";
|
||||
}
|
||||
foreach ($commands as $cmd) {
|
||||
exec($cmd);
|
||||
usleep(1000);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
* Parses wpa_cli list_networks output and returns the id
|
||||
* of a corresponding network SSID
|
||||
*
|
||||
* @param string $ssid
|
||||
* @return integer id
|
||||
*/
|
||||
function getNetworkIdBySSID($ssid) {
|
||||
$iface = escapeshellarg($_SESSION['wifi_client_interface']);
|
||||
$cmd = "sudo wpa_cli -i $iface list_networks";
|
||||
$output = [];
|
||||
exec($cmd, $output);
|
||||
array_shift($output);
|
||||
foreach ($output as $line) {
|
||||
$columns = preg_split('/\t/', $line);
|
||||
if (count($columns) >= 4 && trim($columns[1]) === trim($ssid)) {
|
||||
return $columns[0]; // return network ID
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
function networkExists($ssid, $collection)
|
||||
{
|
||||
foreach ($collection as $network) {
|
||||
if ($network['ssid'] === $ssid) {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
@@ -1,28 +1,35 @@
|
||||
<?php
|
||||
|
||||
require_once 'config.php';
|
||||
require_once 'includes/config.php';
|
||||
|
||||
use RaspAP\Networking\Hotspot\WiFiManager;
|
||||
|
||||
$wifi = new WiFiManager();
|
||||
$wifi->getWifiInterface();
|
||||
|
||||
/**
|
||||
* Displays wireguard server & peer configuration
|
||||
*/
|
||||
function DisplayWireGuardConfig()
|
||||
{
|
||||
$status = new \RaspAP\Messages\StatusMessage;
|
||||
$parseFlag = true;
|
||||
$status = new \RaspAP\Messages\StatusMessage;
|
||||
if (!RASPI_MONITOR_ENABLED) {
|
||||
$optRules = isset($_POST['wgRules']) ? $_POST['wgRules'] : null;
|
||||
$optInterface = isset($_POST['wgInterface']) ? $_POST['wgInterface'] : null;
|
||||
$optConf = isset($_POST['wgCnfOpt']) ? $_POST['wgCnfOpt'] : null;
|
||||
$optSrvEnable = isset($_POST['wgSrvEnable']) ? $_POST['wgSrvEnable'] : null;
|
||||
$optLogEnable = isset($_POST['wgLogEnable']) ? $_POST['wgLogEnable'] : null;
|
||||
$optKSwitch = isset($_POST['wgKSwitch']) ? $_POST['wgKSwitch'] : null;
|
||||
if (isset($_POST['savewgsettings']) && $optConf == 'manual' && $optSrvEnable == 1 ) {
|
||||
SaveWireGuardConfig($status);
|
||||
} elseif (isset($_POST['savewgsettings']) && $optConf == 'upload' && is_uploaded_file($_FILES["wgFile"]["tmp_name"])) {
|
||||
SaveWireGuardUpload($status, $_FILES['wgFile'], $optRules, $optInterface);
|
||||
SaveWireGuardUpload($status, $_FILES['wgFile'], $optRules, $optKSwitch, $optInterface);
|
||||
} elseif (isset($_POST['savewgsettings']) && isset($_POST['wg_penabled']) ) {
|
||||
SaveWireGuardConfig($status);
|
||||
} elseif (isset($_POST['startwg'])) {
|
||||
$status->addMessage('Attempting to start WireGuard', 'info');
|
||||
exec('sudo /bin/systemctl enable wg-quick@wg0', $return);
|
||||
exec('sudo /bin/systemctl start wg-quick@wg0', $return);
|
||||
foreach ($return as $line) {
|
||||
$status->addMessage($line, 'info');
|
||||
@@ -30,6 +37,7 @@ function DisplayWireGuardConfig()
|
||||
} elseif (isset($_POST['stopwg'])) {
|
||||
$status->addMessage('Attempting to stop WireGuard', 'info');
|
||||
exec('sudo /bin/systemctl stop wg-quick@wg0', $return);
|
||||
exec('sudo /bin/systemctl disable wg-quick@wg0', $return);
|
||||
foreach ($return as $line) {
|
||||
$status->addMessage($line, 'info');
|
||||
}
|
||||
@@ -41,7 +49,9 @@ function DisplayWireGuardConfig()
|
||||
exec('sudo cat '. RASPI_WIREGUARD_CONFIG, $return);
|
||||
$conf = ParseConfig($return, $parseFlag);
|
||||
$wg_srvpubkey = exec('sudo cat '. RASPI_WIREGUARD_PATH .'wg-server-public.key', $return);
|
||||
$wg_srvport = ($conf['ListenPort'] == '') ? getDefaultNetValue('wireguard','server','ListenPort') : $conf['ListenPort'];
|
||||
$wg_srvport = ($conf['ListenPort'] ?? '') === ''
|
||||
? getDefaultNetValue('wireguard','server','ListenPort')
|
||||
: $conf['ListenPort'];
|
||||
$wg_srvipaddress = ($conf['Address'] == '') ? getDefaultNetValue('wireguard','server','Address') : $conf['Address'];
|
||||
$wg_srvdns = ($conf['DNS'] == '') ? getDefaultNetValue('wireguard','server','DNS') : $conf['DNS'];
|
||||
if (is_array($wg_srvdns)) {
|
||||
@@ -70,11 +80,18 @@ function DisplayWireGuardConfig()
|
||||
$wg_state = ($wgstatus[0] == 'active' ? true : false );
|
||||
$public_ip = get_public_ip();
|
||||
|
||||
// retrieve wg log
|
||||
$wg_log = "";
|
||||
// fetch uploaded file configs
|
||||
exec("sudo ls ".RASPI_WIREGUARD_PATH, $clist);
|
||||
$configs = preg_grep('/^((?!wg0).)*\.conf/', $clist);
|
||||
exec("sudo readlink ".RASPI_WIREGUARD_CONFIG." | xargs basename", $ret);
|
||||
$conf_default = empty($ret) ? "none" : $ret[0];
|
||||
|
||||
// fetch wg log
|
||||
exec('sudo chmod o+r /tmp/wireguard.log');
|
||||
if (file_exists('/tmp/wireguard.log')) {
|
||||
exec('sudo chmod o+r /tmp/wireguard.log');
|
||||
$wg_log = file_get_contents('/tmp/wireguard.log');
|
||||
$log = file_get_contents('/tmp/wireguard.log');
|
||||
} else {
|
||||
$log = '';
|
||||
}
|
||||
$peer_id = $peer_id ?? "1";
|
||||
|
||||
@@ -90,6 +107,7 @@ function DisplayWireGuardConfig()
|
||||
"public_ip",
|
||||
"interfaces",
|
||||
"optRules",
|
||||
"optKSwitch",
|
||||
"optLogEnable",
|
||||
"peer_id",
|
||||
"wg_srvpubkey",
|
||||
@@ -104,7 +122,9 @@ function DisplayWireGuardConfig()
|
||||
"wg_pendpoint",
|
||||
"wg_pallowedips",
|
||||
"wg_pkeepalive",
|
||||
"wg_log"
|
||||
"configs",
|
||||
"conf_default",
|
||||
"log"
|
||||
)
|
||||
);
|
||||
}
|
||||
@@ -116,10 +136,11 @@ function DisplayWireGuardConfig()
|
||||
* @param object $status
|
||||
* @param object $file
|
||||
* @param boolean $optRules
|
||||
* @param boolean $optKSwitch
|
||||
* @param string $optInterface
|
||||
* @return object $status
|
||||
*/
|
||||
function SaveWireGuardUpload($status, $file, $optRules, $optInterface)
|
||||
function SaveWireGuardUpload($status, $file, $optRules, $optKSwitch, $optInterface)
|
||||
{
|
||||
define('KB', 1024);
|
||||
$tmp_destdir = '/tmp/';
|
||||
@@ -148,19 +169,56 @@ function SaveWireGuardUpload($status, $file, $optRules, $optInterface)
|
||||
$tmp_wgconfig = $results['full_path'];
|
||||
$tmp_contents = file_get_contents($tmp_wgconfig);
|
||||
|
||||
// Set iptables rules
|
||||
if (isset($optRules) && !preg_match('/PostUp|PostDown/m',$tmp_contents)) {
|
||||
$rules[] = 'PostUp = '.getDefaultNetValue('wireguard','server','PostUp');
|
||||
$rules[] = 'PostDown = '.getDefaultNetValue('wireguard','server','PostDown');
|
||||
$rules[] = '';
|
||||
$rules = join(PHP_EOL, $rules);
|
||||
$rules = preg_replace('/wlan0/m', $optInterface, $rules);
|
||||
$tmp_contents = preg_replace('/^\s*$/ms', $rules, $tmp_contents, 1);
|
||||
file_put_contents($tmp_wgconfig, $tmp_contents);
|
||||
// Check for existing iptables rules
|
||||
if ((isset($optRules) || isset($optKSwitch)) && preg_match('/PostUp|PostDown|PreDown/m',$tmp_contents)) {
|
||||
$status->addMessage('Existing iptables rules found in WireGuard configuration - not added', 'info');
|
||||
} else {
|
||||
// Set rules from default config
|
||||
if (isset($optRules)) {
|
||||
$rules[] = 'PostUp = '.getDefaultNetValue('wireguard','server','PostUp');
|
||||
$rules[] = 'PostDown = '.getDefaultNetValue('wireguard','server','PostDown');
|
||||
$rules = preg_replace('/wlan0/m', $optInterface, $rules);
|
||||
}
|
||||
if (isset($optKSwitch)) {
|
||||
// Get ap static ip_addr from system config, fallback to default if undefined
|
||||
$jsonData = json_decode(getNetConfig($optInterface), true);
|
||||
$ip_addr = ($jsonData['StaticIP'] == '') ? getDefaultNetValue('dhcp', $optInterface, 'static ip_address') : $jsonData['StaticIP'];
|
||||
$mask = ($jsonData['SubnetMask'] == '') ? getDefaultNetValue('dhcp', $optInterface, 'subnetmask') : $jsonData['SubnetMask'];
|
||||
|
||||
// if empty, try to detect IP/mask from system
|
||||
if (empty($ip_addr) || empty($mask)) {
|
||||
$ipDetails = shell_exec("ip -4 -o addr show dev " . escapeshellarg($optInterface));
|
||||
if (preg_match('/inet (\d+\.\d+\.\d+\.\d+)\/(\d+)/', $ipDetails, $matches)) {
|
||||
$ip_addr = $matches[1];
|
||||
$cidr = $matches[2];
|
||||
} else {
|
||||
$ip_addr = '0.0.0.0';
|
||||
$cidr = '24';
|
||||
}
|
||||
} else {
|
||||
$cidr = mask2cidr($mask);
|
||||
}
|
||||
$cidr_ip = strpos($ip_addr, '/') === false ? "$ip_addr/$cidr" : $ip_addr;
|
||||
|
||||
$rules[] = 'PostUp = '.getDefaultNetValue('wireguard','server','PostUpEx');
|
||||
$rules[] = 'PreDown = '.getDefaultNetValue('wireguard','server','PreDown');
|
||||
$rules = preg_replace('/%s/m', $cidr_ip, $rules);
|
||||
}
|
||||
if ((isset($rules) && count($rules) > 0)) {
|
||||
$rules[] = '';
|
||||
$rules = join(PHP_EOL, $rules);
|
||||
$tmp_contents = preg_replace('/^\s*$/ms', $rules, $tmp_contents, 1);
|
||||
file_put_contents($tmp_wgconfig, $tmp_contents);
|
||||
$status->addMessage('iptables rules added to WireGuard configuration', 'info');
|
||||
}
|
||||
}
|
||||
|
||||
// Move processed file from tmp to destination
|
||||
system("sudo mv $tmp_wgconfig ". RASPI_WIREGUARD_CONFIG, $return);
|
||||
// Move processed file from /tmp and create symlink
|
||||
$client_wg = RASPI_WIREGUARD_PATH.pathinfo($file['name'], PATHINFO_FILENAME).'.conf';
|
||||
chmod($tmp_wgconfig, 0644);
|
||||
system("sudo mv $tmp_wgconfig $client_wg", $return);
|
||||
system("sudo rm ".RASPI_WIREGUARD_CONFIG, $return);
|
||||
system("sudo ln -s $client_wg ".RASPI_WIREGUARD_CONFIG, $return);
|
||||
|
||||
if ($return ==0) {
|
||||
$status->addMessage('WireGuard configuration uploaded successfully', 'info');
|
||||
@@ -225,7 +283,7 @@ function SaveWireGuardConfig($status)
|
||||
$wg_pendpoint_seg = substr($_POST['wg_pendpoint'],0,strpos($_POST['wg_pendpoint'],':'));
|
||||
$host_port = explode(':', $wg_pendpoint_seg);
|
||||
$hostname = $host_port[0];
|
||||
if (!filter_var($hostname, FILTER_VALIDATE_IP) &&
|
||||
if (!filter_var($hostname, FILTER_VALIDATE_IP) &&
|
||||
!filter_var($hostname, FILTER_VALIDATE_DOMAIN, FILTER_FLAG_HOSTNAME)) {
|
||||
$status->addMessage('Invalid value for endpoint address', 'danger');
|
||||
$good_input = false;
|
||||
@@ -295,11 +353,10 @@ function SaveWireGuardConfig($status)
|
||||
}
|
||||
$config[] = '';
|
||||
$config = join(PHP_EOL, $config);
|
||||
|
||||
file_put_contents("/tmp/wgdata", $config);
|
||||
system('sudo cp /tmp/wgdata '.RASPI_WIREGUARD_PATH.'client.conf', $return);
|
||||
} else {
|
||||
# remove selected conf + keys
|
||||
# remove selected conf + keys
|
||||
system('sudo rm '. RASPI_WIREGUARD_PATH .'wg-peer-private.key', $return);
|
||||
system('sudo rm '. RASPI_WIREGUARD_PATH .'wg-peer-public.key', $return);
|
||||
system('sudo rm '. RASPI_WIREGUARD_PATH.'client.conf', $return);
|
||||
|
||||
40
index.php
40
index.php
@@ -7,14 +7,14 @@
|
||||
* Enables use of simple web interface rather than SSH to control WiFi and related services on the Raspberry Pi.
|
||||
* Recommended distribution is Raspberry Pi OS (64-bit) Lite. Specific instructions to install the supported software are
|
||||
* in the README and original post by @SirLagz. For a quick run through, the packages required for the WebGUI are:
|
||||
* lighttpd (version 1.4.69 installed via apt)
|
||||
* php-cgi (version 8.2.28 installed via apt)
|
||||
* lighttpd (version 1.4.79 installed via apt)
|
||||
* php-fpm (version 8.4.11 installed via apt)
|
||||
* along with their supporting packages, php8.2 will also need to be enabled.
|
||||
*
|
||||
* @author Lawrence Yau <sirlagz@gmail.com>
|
||||
* @author Bill Zimmerman <billzimmerman@gmail.com>
|
||||
* @license GNU General Public License, version 3 (GPL-3.0)
|
||||
* @version 3.3.5
|
||||
* @version 3.5.1
|
||||
* @link https://github.com/RaspAP/raspap-webgui/
|
||||
* @link https://raspap.com/
|
||||
* @see http://sirlagz.net/2013/02/08/raspap-webgui/
|
||||
@@ -23,6 +23,7 @@
|
||||
* as you leave these references intact in the header comments of your source files.
|
||||
*/
|
||||
|
||||
require_once 'includes/bootstrap.php';
|
||||
require_once 'includes/config.php';
|
||||
require_once 'includes/autoload.php';
|
||||
$handler = new RaspAP\Exceptions\ExceptionHandler;
|
||||
@@ -67,19 +68,22 @@ initializeApp();
|
||||
<title><?php echo RASPI_BRAND_TITLE; ?></title>
|
||||
|
||||
<!-- Bootstrap Core CSS -->
|
||||
<link href="dist/bootstrap/css/bootstrap.min.css" rel="stylesheet">
|
||||
<link href="dist/bootstrap/css/bootstrap.min.css?v=<?= filemtime('dist/bootstrap/css/bootstrap.min.css'); ?>" rel="stylesheet">
|
||||
|
||||
<!-- SB-Admin CSS -->
|
||||
<link href="dist/sb-admin/css/styles.css" rel="stylesheet">
|
||||
<link href="dist/sb-admin/css/styles.css?v=<?= filemtime('dist/sb-admin/css/styles.css'); ?>" rel="stylesheet">
|
||||
|
||||
<!-- Huebee CSS -->
|
||||
<link href="dist/huebee/huebee.min.css" rel="stylesheet">
|
||||
<link href="dist/huebee/huebee.min.css?v=<?= filemtime('dist/huebee/huebee.min.css'); ?>" rel="stylesheet">
|
||||
|
||||
<!-- Font Awesome -->
|
||||
<link href="dist/font-awesome/css/all.min.css" rel="stylesheet" type="text/css">
|
||||
<link href="dist/font-awesome/css/all.min.css?v=<?= filemtime('dist/font-awesome/css/all.min.css'); ?>" rel="stylesheet" type="text/css">
|
||||
|
||||
<!-- Librespeed CSS -->
|
||||
<link href="dist/speedtest/speedtest.css?v=<?= filemtime('dist/speedtest/speedtest.css'); ?>" rel="stylesheet" />
|
||||
|
||||
<!-- RaspAP Fonts -->
|
||||
<link href="dist/raspap/css/style.css" rel="stylesheet" type="text/css">
|
||||
<link href="dist/raspap/css/style.css?v=<?= filemtime('dist/raspap/css/style.css'); ?>" rel="stylesheet" type="text/css">
|
||||
|
||||
<!-- Custom CSS -->
|
||||
<link href="<?php echo $_SESSION["theme_url"]; ?>" title="main" rel="stylesheet">
|
||||
@@ -123,25 +127,29 @@ initializeApp();
|
||||
</div>
|
||||
<?php ob_end_flush(); ?>
|
||||
<!-- jQuery -->
|
||||
<script src="dist/jquery/jquery.min.js"></script>
|
||||
<script src="dist/jquery/jquery.min.js?v=<?= filemtime('dist/jquery/jquery.min.js'); ?>"></script>
|
||||
|
||||
<!-- Bootstrap Core JavaScript -->
|
||||
<script src="dist/bootstrap/js/bootstrap.bundle.min.js"></script>
|
||||
<script src="dist/bootstrap/js/bootstrap.bundle.min.js?v=<?= filemtime('dist/bootstrap/js/bootstrap.bundle.min.js'); ?>"></script>
|
||||
|
||||
<!-- Core plugin JavaScript -->
|
||||
<script src="dist/jquery-easing/jquery.easing.min.js"></script>
|
||||
<script src="dist/jquery-easing/jquery.easing.min.js?v=<?= filemtime('dist/jquery-easing/jquery.easing.min.js'); ?>"></script>
|
||||
|
||||
<!-- Chart.js JavaScript -->
|
||||
<script src="dist/chart.js/Chart.min.js"></script>
|
||||
<script src="dist/chart.js/Chart.min.js?v=<?= filemtime('dist/chart.js/Chart.min.js'); ?>"></script>
|
||||
|
||||
<!-- SB-Admin JavaScript -->
|
||||
<script src="dist/sb-admin/js/scripts.js"></script>
|
||||
<script src="dist/sb-admin/js/scripts.js?v=<?= filemtime('dist/sb-admin/js/scripts.js'); ?>"></script>
|
||||
|
||||
<!-- jQuery Mask plugin -->
|
||||
<script src="dist/jquery-mask/jquery.mask.min.js"></script>
|
||||
<script src="dist/jquery-mask/jquery.mask.min.js?v=<?= filemtime('dist/jquery-mask/jquery.mask.min.js'); ?>"></script>
|
||||
|
||||
<!-- Custom RaspAP JS -->
|
||||
<script src="app/js/custom.js"></script>
|
||||
<!-- Librespeed JavaScript -->
|
||||
<script src="dist/speedtest/speedtest.js?v=<?= filemtime('dist/speedtest/speedtest.js'); ?>"></script>
|
||||
|
||||
<!-- RaspAP JavaScript -->
|
||||
<script src="app/js/ajax/main.js?v=<?= filemtime('app/js/ajax/main.js'); ?>"></script>
|
||||
<script src="app/js/ui/main.js?v=<?= filemtime('app/js/ui/main.js'); ?>"></script>
|
||||
|
||||
<?php loadFooterScripts($extraFooterScripts); ?>
|
||||
</body>
|
||||
|
||||
170
installers/common.sh
Executable file → Normal file
170
installers/common.sh
Executable file → Normal file
@@ -34,7 +34,16 @@ if [ "$insiders" == 1 ]; then
|
||||
repo="RaspAP/raspap-insiders"
|
||||
branch=${RASPAP_INSIDERS_LATEST}
|
||||
fi
|
||||
git_source_url="https://github.com/$repo"
|
||||
|
||||
#Use ssh IF $ssh is set AND $username and $acctoken IS NOT set
|
||||
if [ -n "$username" ] && [ -n "$acctoken" ]; then
|
||||
git_source_url="https://${username}:${acctoken}@github.com/$repo"
|
||||
ssh=0
|
||||
elif [ "$ssh" == 1 ]; then
|
||||
git_source_url="git@github.com:$repo"
|
||||
else
|
||||
git_source_url="https://github.com/$repo"
|
||||
fi
|
||||
webroot_dir="/var/www/html"
|
||||
|
||||
# NOTE: all the below functions are overloadable for system-specific installs
|
||||
@@ -51,6 +60,7 @@ function _install_raspap() {
|
||||
_download_latest_files
|
||||
_change_file_ownership
|
||||
_create_hostapd_scripts
|
||||
_install_raspap_hostapd
|
||||
_create_plugin_scripts
|
||||
_create_lighttpd_scripts
|
||||
_install_lighttpd_configs
|
||||
@@ -148,21 +158,24 @@ function _get_linux_distro() {
|
||||
# Sets php package option based on Linux version, abort if unsupported distro
|
||||
function _set_php_package() {
|
||||
case $RELEASE in
|
||||
13|2025.*) # Debian 13 trixie, Kali Linux 2025
|
||||
php_package="php8.4-fpm"
|
||||
phpiniconf="/etc/php/8.4/fpm/php.ini" ;;
|
||||
23.05|12*) # Debian 12 & Armbian 23.05
|
||||
php_package="php8.2-cgi"
|
||||
phpcgiconf="/etc/php/8.2/cgi/php.ini" ;;
|
||||
phpiniconf="/etc/php/8.2/cgi/php.ini" ;;
|
||||
23.04) # Ubuntu Server 23.04
|
||||
php_package="php8.1-cgi"
|
||||
phpcgiconf="/etc/php/8.1/cgi/php.ini" ;;
|
||||
phpiniconf="/etc/php/8.1/cgi/php.ini" ;;
|
||||
22.04|20.04|18.04|19.10|11*) # Previous Ubuntu Server, Debian & Armbian distros
|
||||
php_package="php7.4-cgi"
|
||||
phpcgiconf="/etc/php/7.4/cgi/php.ini" ;;
|
||||
phpiniconf="/etc/php/7.4/cgi/php.ini" ;;
|
||||
10*|11*)
|
||||
php_package="php7.3-cgi"
|
||||
phpcgiconf="/etc/php/7.3/cgi/php.ini" ;;
|
||||
phpiniconf="/etc/php/7.3/cgi/php.ini" ;;
|
||||
9*)
|
||||
php_package="php7.0-cgi"
|
||||
phpcgiconf="/etc/php/7.0/cgi/php.ini" ;;
|
||||
phpiniconf="/etc/php/7.0/cgi/php.ini" ;;
|
||||
8)
|
||||
_install_status 1 "${DESC} and php5 are not supported. Please upgrade."
|
||||
exit 1 ;;
|
||||
@@ -233,7 +246,7 @@ function _install_dependencies() {
|
||||
else
|
||||
echo "${php_package} will be installed from the main deb sources list"
|
||||
fi
|
||||
if [ ${OS,,} = "debian" ] || [ ${OS,,} = "ubuntu" ]; then
|
||||
if [ ${OS,,} = "debian" ] || [ ${OS,,} = "ubuntu" ] || [ ${OS,,} = "kali" ]; then
|
||||
dhcpcd_package="dhcpcd5"
|
||||
iw_package="iw"
|
||||
rsync_package="rsync"
|
||||
@@ -271,6 +284,13 @@ function _install_dependencies() {
|
||||
echo iptables-persistent iptables-persistent/autosave_v4 boolean true | sudo debconf-set-selections
|
||||
echo iptables-persistent iptables-persistent/autosave_v6 boolean true | sudo debconf-set-selections
|
||||
sudo apt-get install -y lighttpd git hostapd dnsmasq iptables-persistent $php_package $dhcpcd_package $iw_package $rsync_package $network_tools $ifconfig_package vnstat qrencode jq isoquery || _install_status 1 "Unable to install dependencies"
|
||||
|
||||
if [[ "$php_package" == *"-fpm" ]]; then
|
||||
_install_log "Enabling lighttpd fastcgi-php-fpm module for $php_package"
|
||||
sudo lighty-enable-mod fastcgi-php-fpm 2>&1 | grep -qE "already enabled" || \
|
||||
_install_status 1 "Unable to enable fastcgi-php-fpm module"
|
||||
sudo systemctl restart $php_package.service || _install_status 1 "Unable to restart $php_package.service"
|
||||
fi
|
||||
_install_status 0
|
||||
}
|
||||
|
||||
@@ -305,9 +325,6 @@ function _create_hostapd_scripts() {
|
||||
_install_log "Creating hostapd logging & control scripts"
|
||||
sudo mkdir $raspap_dir/hostapd || _install_status 1 "Unable to create directory '$raspap_dir/hostapd'"
|
||||
|
||||
# Copy logging shell scripts
|
||||
sudo cp "$webroot_dir/installers/"enablelog.sh "$raspap_dir/hostapd" || _install_status 1 "Unable to move logging scripts"
|
||||
sudo cp "$webroot_dir/installers/"disablelog.sh "$raspap_dir/hostapd" || _install_status 1 "Unable to move logging scripts"
|
||||
# Copy service control shell scripts
|
||||
sudo cp "$webroot_dir/installers/"servicestart.sh "$raspap_dir/hostapd" || _install_status 1 "Unable to move service control scripts"
|
||||
# Change ownership and permissions of hostapd control scripts
|
||||
@@ -407,7 +424,28 @@ function _prompt_install_feature() {
|
||||
else
|
||||
$function
|
||||
fi
|
||||
elif [ "$opt" == "pv_option" ]; then
|
||||
local opt_value=${!opt:-0}
|
||||
if [ "$opt_value" == 0 ]; then
|
||||
echo "(Skipped)"
|
||||
else
|
||||
local valid_ids=($(jq -r '.providers[].id' "$webroot_dir/config/vpn-providers.json"))
|
||||
local found=0
|
||||
for id in "${valid_ids[@]}"; do
|
||||
if [ "$id" == "$opt_value" ]; then
|
||||
found=1
|
||||
break
|
||||
fi
|
||||
done
|
||||
if [ $found == 1 ]; then
|
||||
echo -e
|
||||
$function
|
||||
else
|
||||
_install_status 1 "Invalid VPN provider ID $opt_value - (Skipped)"
|
||||
fi
|
||||
fi
|
||||
elif [ "${!opt}" == 1 ]; then
|
||||
echo -e
|
||||
$function
|
||||
else
|
||||
echo "(Skipped)"
|
||||
@@ -488,6 +526,7 @@ function _install_provider() {
|
||||
|
||||
if [ "$answer" != "${answer#[0]}" ]; then
|
||||
_install_status 0 "(Skipped)"
|
||||
skip=true
|
||||
break
|
||||
elif [[ "$answer" =~ ^[0-9]+$ ]] && [[ -n ${options[$answer]+abc} ]]; then
|
||||
break
|
||||
@@ -496,25 +535,25 @@ function _install_provider() {
|
||||
fi
|
||||
done
|
||||
fi
|
||||
if ! [ "$skip" ]; then
|
||||
selected="${options[$answer]}"
|
||||
echo "Configuring support for ${selected%%|*}"
|
||||
bin_path=${selected#*|}
|
||||
if ! grep -q "$bin_path" "$webroot_dir/installers/raspap.sudoers"; then
|
||||
echo "Adding $bin_path to raspap.sudoers"
|
||||
echo "www-data ALL=(ALL) NOPASSWD:$bin_path *" | sudo tee -a "$webroot_dir/installers/raspap.sudoers" > /dev/null || _install_status 1 "Unable to modify raspap.sudoers"
|
||||
fi
|
||||
echo "Enabling administration option for ${selected%%|*}"
|
||||
sudo sed -i "s/\('RASPI_VPN_PROVIDER_ENABLED', \)false/\1true/g" "$webroot_dir/includes/config.php" || _install_status 1 "Unable to modify config.php"
|
||||
|
||||
selected="${options[$answer]}"
|
||||
echo "Configuring support for ${selected%%|*}"
|
||||
bin_path=${selected#*|}
|
||||
if ! grep -q "$bin_path" "$webroot_dir/installers/raspap.sudoers"; then
|
||||
echo "Adding $bin_path to raspap.sudoers"
|
||||
echo "www-data ALL=(ALL) NOPASSWD:$bin_path *" | sudo tee -a "$webroot_dir/installers/raspap.sudoers" > /dev/null || _install_status 1 "Unable to modify raspap.sudoers"
|
||||
fi
|
||||
echo "Enabling administration option for ${selected%%|*}"
|
||||
sudo sed -i "s/\('RASPI_VPN_PROVIDER_ENABLED', \)false/\1true/g" "$webroot_dir/includes/config.php" || _install_status 1 "Unable to modify config.php"
|
||||
|
||||
echo "Adding VPN provider to $raspap_dir/provider.ini"
|
||||
if [ ! -f "$raspap_dir/provider.ini" ]; then
|
||||
sudo touch "$raspap_dir/provider.ini"
|
||||
echo "providerID = $answer" | sudo tee "$raspap_dir/provider.ini" > /dev/null || _install_status 1 "Unable to create $raspap_dir/provider.ini"
|
||||
elif ! grep -q "providerID = $answer" "$raspap_dir/provider.ini"; then
|
||||
echo "providerID = $answer" | sudo tee "$raspap_dir/provider.ini" > /dev/null || _install_status 1 "Unable to write to $raspap_dir/provider.ini"
|
||||
fi
|
||||
|
||||
echo "Adding VPN provider to $raspap_dir/provider.ini"
|
||||
if [ ! -f "$raspap_dir/provider.ini" ]; then
|
||||
sudo touch "$raspap_dir/provider.ini"
|
||||
echo "providerID = $answer" | sudo tee "$raspap_dir/provider.ini" > /dev/null || _install_status 1 "Unable to create $raspap_dir/provider.ini"
|
||||
elif ! grep -q "providerID = $answer" "$raspap_dir/provider.ini"; then
|
||||
echo "providerID = $answer" | sudo tee "$raspap_dir/provider.ini" > /dev/null || _install_status 1 "Unable to write to $raspap_dir/provider.ini"
|
||||
fi
|
||||
fi
|
||||
_install_status 0
|
||||
}
|
||||
|
||||
@@ -527,6 +566,13 @@ function _install_wireguard() {
|
||||
fi
|
||||
echo "Installing wireguard from apt"
|
||||
sudo apt-get install -y wireguard $wg_dep || _install_status 1 "Unable to install wireguard"
|
||||
|
||||
# create shim for resolvconf under debian 13
|
||||
if { ! command -v resolvconf >/dev/null || [ "$RELEASE" == 13 ]; } then
|
||||
echo "Applying resolvconf shim to prevent DNS conflicts"
|
||||
sudo ln -sf /usr/bin/true /usr/local/bin/resolvconf || _install_status 1 "Failed to apply resolvconf shim"
|
||||
fi
|
||||
|
||||
echo "Enabling wg-quick@wg0"
|
||||
sudo systemctl enable wg-quick@wg0 || _install_status 1 "Failed to enable wg-quick service"
|
||||
echo "Enabling WireGuard management option"
|
||||
@@ -595,22 +641,16 @@ function _download_latest_files() {
|
||||
source_dir="/tmp/raspap-webgui"
|
||||
if [ -d "$source_dir" ]; then
|
||||
echo "Temporary download destination $source_dir exists. Removing..."
|
||||
rm -r "$source_dir"
|
||||
rm -rf "$source_dir"
|
||||
fi
|
||||
if [ "$repo" == "RaspAP/raspap-insiders" ]; then
|
||||
if [ -n "$username" ] && [ -n "$acctoken" ]; then
|
||||
insiders_source_url="https://${username}:${acctoken}@github.com/$repo"
|
||||
git clone --branch $branch --depth 1 --recurse-submodules -c advice.detachedHead=false $insiders_source_url $source_dir || clone=false
|
||||
git -C $source_dir submodule update --remote plugins || clone=false
|
||||
else
|
||||
_install_status 3
|
||||
echo "Insiders please read this: https://docs.raspap.com/insiders/#authentication"
|
||||
fi
|
||||
fi
|
||||
if [ -z "$insiders_source_url" ]; then
|
||||
git clone --branch $branch --depth 1 --recurse-submodules -c advice.detachedHead=false $git_source_url $source_dir || clone=false
|
||||
git -C $source_dir submodule update --remote plugins || clone=false
|
||||
if [ "$insiders" == 1 ] && [ "$ssh" != 1 ] && [[ -z "$username" || -z "$acctoken" ]]; then
|
||||
_install_status 3
|
||||
_install_status 0 "Insiders please read this: https://docs.raspap.com/insiders/#authentication"
|
||||
fi
|
||||
|
||||
git clone --branch $branch --depth 1 --recurse-submodules -c advice.detachedHead=false $git_source_url $source_dir || clone=false
|
||||
git -C $source_dir submodule update --remote plugins || clone=false
|
||||
|
||||
if [ "$clone" = false ]; then
|
||||
_install_status 1 "Unable to download files from GitHub"
|
||||
echo "The installer cannot continue." >&2
|
||||
@@ -620,18 +660,36 @@ function _download_latest_files() {
|
||||
if [ -d "$webroot_dir" ] && [ "$update" == 0 ]; then
|
||||
sudo mv $webroot_dir "$webroot_dir.`date +%F-%R`" || _install_status 1 "Unable to move existing webroot directory"
|
||||
elif [ "$upgrade" == 1 ] || [ "$update" == 1 ]; then
|
||||
exclude='--exclude=ajax/system/sys_read_logfile.php'
|
||||
shopt -s extglob
|
||||
sudo find "$webroot_dir" ! -path "${webroot_dir}/ajax/system/sys_read_logfile.php" -delete 2>/dev/null
|
||||
# Preserve user plugins temporarily
|
||||
if [ -d "$webroot_dir/plugins" ]; then
|
||||
sudo cp -r "$webroot_dir/plugins" "/tmp/raspap-user-plugins"
|
||||
fi
|
||||
|
||||
sudo find "$webroot_dir" -mindepth 1 \
|
||||
! -path "${webroot_dir}/ajax/system/sys_read_logfile.php" \
|
||||
! -path "${webroot_dir}/plugins" \
|
||||
! -path "${webroot_dir}/plugins/*" \
|
||||
-delete 2>/dev/null
|
||||
|
||||
# Remove plugins to permit clean rsync
|
||||
sudo rm -rf "$webroot_dir/plugins"
|
||||
fi
|
||||
|
||||
_install_log "Installing application to $webroot_dir"
|
||||
sudo rsync -av $exclude "$source_dir"/ "$webroot_dir"/ >/dev/null 2>&1 || _install_status 1 "Unable to install files to $webroot_dir"
|
||||
|
||||
# Restore user plugins after rsync
|
||||
if [ "$upgrade" == 1 ] || [ "$update" == 1 ]; then
|
||||
if [ -d "/tmp/raspap-user-plugins" ]; then
|
||||
sudo find /tmp/raspap-user-plugins -mindepth 1 -maxdepth 1 -type d -exec cp -r {} "$webroot_dir/plugins/" \; 2>/dev/null
|
||||
sudo rm -rf "/tmp/raspap-user-plugins"
|
||||
fi
|
||||
fi
|
||||
|
||||
if [ "$update" == 1 ]; then
|
||||
_install_log "Applying existing configuration to ${webroot_dir}/includes"
|
||||
sudo mv /tmp/config.php $webroot_dir/includes || _install_status 1 "Unable to move config.php to ${webroot_dir}/includes"
|
||||
|
||||
|
||||
if [ -f /tmp/raspap.auth ]; then
|
||||
_install_log "Applying existing authentication file to ${raspap_dir}"
|
||||
sudo mv /tmp/raspap.auth $raspap_dir || _install_status 1 "Unable to restore authentification credentials file to ${raspap_dir}"
|
||||
@@ -777,6 +835,14 @@ function _enable_raspap_daemon() {
|
||||
sudo systemctl enable raspapd.service || _install_status 1 "Failed to enable raspap.service"
|
||||
}
|
||||
|
||||
# Install hostapd@.service
|
||||
function _install_raspap_hostapd() {
|
||||
_install_log "Installing RaspAP hostapd@.service"
|
||||
sudo cp $webroot_dir/installers/hostapd@.service /etc/systemd/system/ || _install_status 1 "Unable to copy hostapd@.service file"
|
||||
sudo systemctl daemon-reload
|
||||
_install_status 0
|
||||
}
|
||||
|
||||
# Configure IP forwarding, set IP tables rules, prompt to install RaspAP daemon
|
||||
function _configure_networking() {
|
||||
_install_log "Configuring networking"
|
||||
@@ -791,8 +857,8 @@ function _configure_networking() {
|
||||
"-A POSTROUTING -s 192.168.50.0/24 ! -d 192.168.50.0/24 -j MASQUERADE"
|
||||
)
|
||||
for rule in "${rules[@]}"; do
|
||||
if grep -- "$rule" $rulesv4 > /dev/null; then
|
||||
echo "Rule already exits: ${rule}"
|
||||
if sudo grep -- "$rule" $rulesv4 > /dev/null; then
|
||||
echo "Rule already exists: ${rule}"
|
||||
else
|
||||
rule=$(sed -e 's/^\(-A POSTROUTING\)/-t nat \1/' <<< $rule)
|
||||
echo "Adding rule: ${rule}"
|
||||
@@ -947,14 +1013,14 @@ function _patch_system_files() {
|
||||
function _optimize_php() {
|
||||
if [ "$upgrade" == 0 ]; then
|
||||
_install_log "Optimize PHP configuration"
|
||||
if [ ! -f "$phpcgiconf" ]; then
|
||||
if [ ! -f "$phpiniconf" ]; then
|
||||
_install_status 2 "PHP configuration could not be found."
|
||||
return
|
||||
fi
|
||||
|
||||
# Backup php.ini and create symlink for restoring.
|
||||
datetimephpconf=$(date +%F-%R)
|
||||
sudo cp "$phpcgiconf" "$raspap_dir/backups/php.ini.$datetimephpconf"
|
||||
sudo cp "$phpiniconf" "$raspap_dir/backups/php.ini.$datetimephpconf"
|
||||
sudo ln -sf "$raspap_dir/backups/php.ini.$datetimephpconf" "$raspap_dir/backups/php.ini"
|
||||
|
||||
echo -n "Enable HttpOnly for session cookies (Recommended)? [Y/n]: "
|
||||
@@ -969,7 +1035,7 @@ function _optimize_php() {
|
||||
|
||||
if [ "$assume_yes" == 1 ] || [ "$php_session_cookie" == 1 ]; then
|
||||
echo "Php-cgi enabling session.cookie_httponly."
|
||||
sudo sed -i -E 's/^session\.cookie_httponly\s*=\s*(0|([O|o]ff)|([F|f]alse)|([N|n]o))\s*$/session.cookie_httponly = 1/' "$phpcgiconf"
|
||||
sudo sed -i -E 's/^session\.cookie_httponly\s*=\s*(0|([O|o]ff)|([F|f]alse)|([N|n]o))\s*$/session.cookie_httponly = 1/' "$phpiniconf"
|
||||
fi
|
||||
|
||||
if [ "$php_package" = "php7.1-cgi" ]; then
|
||||
@@ -985,7 +1051,7 @@ function _optimize_php() {
|
||||
|
||||
if [ "$assume_yes" == 1 ] || [ "$phpopcache" == 1 ]; then
|
||||
echo -e "Php-cgi enabling opcache.enable."
|
||||
sudo sed -i -E 's/^;?opcache\.enable\s*=\s*(0|([O|o]ff)|([F|f]alse)|([N|n]o))\s*$/opcache.enable = 1/' "$phpcgiconf"
|
||||
sudo sed -i -E 's/^;?opcache\.enable\s*=\s*(0|([O|o]ff)|([F|f]alse)|([N|n]o))\s*$/opcache.enable = 1/' "$phpiniconf"
|
||||
# Make sure opcache extension is turned on.
|
||||
if [ -f "/usr/sbin/phpenmod" ]; then
|
||||
sudo phpenmod opcache
|
||||
|
||||
@@ -1,3 +0,0 @@
|
||||
#!/bin/bash
|
||||
/bin/sed -i 's|DAEMON_OPTS=" -f /tmp/hostapd.log"|#DAEMON_OPTS=""|' /etc/default/hostapd
|
||||
|
||||
@@ -1,3 +0,0 @@
|
||||
#!/bin/bash
|
||||
/bin/sed -i 's|#DAEMON_OPTS=""|DAEMON_OPTS=" -f /tmp/hostapd.log"|' /etc/default/hostapd
|
||||
touch /tmp/hostapd.log
|
||||
173
installers/generate_os_list.sh
Executable file
173
installers/generate_os_list.sh
Executable file
@@ -0,0 +1,173 @@
|
||||
#!/bin/bash
|
||||
#
|
||||
# RaspAP OS Subitem Generator for RPi Imager 2.x
|
||||
# Author: @billz <billzimmerman@gmail.com>
|
||||
# Author URI: https://github.com/billz
|
||||
# Project URI: https://github.com/RaspAP/
|
||||
# License: GNU General Public License v3.0
|
||||
# License URI: https://github.com/RaspAP/raspap-webgui/blob/master/LICENSE
|
||||
|
||||
# Exit on error
|
||||
set -o errexit
|
||||
|
||||
# Exit on error inside functions
|
||||
set -o errtrace
|
||||
|
||||
# Set defaults
|
||||
NAME="RaspAP"
|
||||
WEBSITE="https://raspap.com/"
|
||||
ICON="https://raspap.com/assets/images/raspAP-logo.svg"
|
||||
DESCRIPTION="The easiest, full-featured wireless router for Debian-based devices."
|
||||
REPO="RaspAP/raspap-webgui"
|
||||
|
||||
# Fetch latest release from GitHub (adapted from RaspAP installer)
|
||||
_get_release() {
|
||||
local response
|
||||
local host="api.github.com"
|
||||
|
||||
echo "Fetching latest release from GitHub..." >&2
|
||||
response=$(curl -s "https://$host/repos/$REPO/releases/latest")
|
||||
|
||||
if echo "$response" | grep -q 'API rate limit exceeded'; then
|
||||
echo "Error: GitHub API rate limit exceeded. Try again later or use a GitHub token." >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
VERSION=$(echo "$response" | grep -o '"tag_name": *"[^"]*"' | sed 's/"tag_name": *"\(.*\)"/\1/')
|
||||
|
||||
if [ -z "$VERSION" ]; then
|
||||
echo "Error: Failed to fetch latest release. Check network connectivity." >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
local published_at=$(echo "$response" | grep -o '"published_at": *"[^"]*"' | sed 's/"published_at": *"\(.*\)"/\1/')
|
||||
RELEASE_DATE=$(echo "$published_at" | cut -d'T' -f1)
|
||||
|
||||
echo "Found release: $VERSION (published: $RELEASE_DATE)" >&2
|
||||
}
|
||||
|
||||
# Fetch latest release info (if not provided via environment variables)
|
||||
if [ -z "$VERSION" ] || [ -z "$RELEASE_DATE" ]; then
|
||||
_get_release
|
||||
else
|
||||
echo "Using VERSION=$VERSION and RELEASE_DATE=$RELEASE_DATE from environment" >&2
|
||||
fi
|
||||
|
||||
BASE_URL="https://github.com/RaspAP/raspap-webgui/releases/download/${VERSION}"
|
||||
|
||||
_get_size() {
|
||||
if [ -f "$1" ]; then
|
||||
if [[ "$OSTYPE" == "darwin"* ]]; then
|
||||
stat -f %z "$1" 2>/dev/null
|
||||
else
|
||||
stat -c %s "$1" 2>/dev/null
|
||||
fi
|
||||
else
|
||||
echo "0"
|
||||
fi
|
||||
}
|
||||
|
||||
_get_sha256() {
|
||||
if [ -f "$1" ]; then
|
||||
if command -v sha256sum &> /dev/null; then
|
||||
sha256sum "$1" | awk '{print $1}'
|
||||
else
|
||||
shasum -a 256 "$1" | awk '{print $1}'
|
||||
fi
|
||||
else
|
||||
echo ""
|
||||
fi
|
||||
}
|
||||
|
||||
# Process armhf (32-bit)
|
||||
ARMHF_ZIP="raspap-trixie-armhf-lite-${VERSION}.img.zip"
|
||||
|
||||
if [ -f "$ARMHF_ZIP" ]; then
|
||||
ARMHF_IMG=$(ls *-raspap-trixie-armhf-lite-${VERSION}.img 2>/dev/null | head -1)
|
||||
|
||||
if [ -z "$ARMHF_IMG" ]; then
|
||||
echo "Extracting $ARMHF_ZIP..."
|
||||
unzip -o "$ARMHF_ZIP"
|
||||
ARMHF_IMG=$(ls *-raspap-trixie-armhf-lite-${VERSION}.img 2>/dev/null | head -1)
|
||||
fi
|
||||
else
|
||||
ARMHF_IMG=""
|
||||
fi
|
||||
|
||||
ARMHF_EXTRACT_SIZE=$(_get_size "$ARMHF_IMG")
|
||||
ARMHF_EXTRACT_SHA=$(_get_sha256 "$ARMHF_IMG")
|
||||
ARMHF_DOWNLOAD_SIZE=$(_get_size "$ARMHF_ZIP")
|
||||
ARMHF_DOWNLOAD_SHA=$(_get_sha256 "$ARMHF_ZIP")
|
||||
|
||||
# Process arm64 (64-bit)
|
||||
ARM64_ZIP="raspap-trixie-arm64-lite-${VERSION}.img.zip"
|
||||
|
||||
if [ -f "$ARM64_ZIP" ]; then
|
||||
ARM64_IMG=$(ls *-raspap-trixie-arm64-lite-${VERSION}.img 2>/dev/null | head -1)
|
||||
|
||||
if [ -z "$ARM64_IMG" ]; then
|
||||
echo "Extracting $ARM64_ZIP..."
|
||||
unzip -o "$ARM64_ZIP"
|
||||
ARM64_IMG=$(ls *-raspap-trixie-arm64-lite-${VERSION}.img 2>/dev/null | head -1)
|
||||
fi
|
||||
else
|
||||
ARM64_IMG=""
|
||||
fi
|
||||
|
||||
ARM64_EXTRACT_SIZE=$(_get_size "$ARM64_IMG")
|
||||
ARM64_EXTRACT_SHA=$(_get_sha256 "$ARM64_IMG")
|
||||
ARM64_DOWNLOAD_SIZE=$(_get_size "$ARM64_ZIP")
|
||||
ARM64_DOWNLOAD_SHA=$(_get_sha256 "$ARM64_ZIP")
|
||||
|
||||
# Generate JSON
|
||||
cat > os-sublist-raspap.json << EOF
|
||||
{
|
||||
"name": "${NAME}",
|
||||
"description": "${DESCRIPTION}",
|
||||
"icon": "${ICON}",
|
||||
"random": false,
|
||||
"subitems": [
|
||||
{
|
||||
"name": "${NAME} 32-bit (armhf)",
|
||||
"description": "${DESCRIPTION}",
|
||||
"icon": "${ICON}",
|
||||
"url": "${BASE_URL}/${ARMHF_ZIP}",
|
||||
"extract_size": ${ARMHF_EXTRACT_SIZE},
|
||||
"extract_sha256": "${ARMHF_EXTRACT_SHA}",
|
||||
"image_download_size": ${ARMHF_DOWNLOAD_SIZE},
|
||||
"image_download_sha256": "${ARMHF_DOWNLOAD_SHA}",
|
||||
"release_date": "${RELEASE_DATE}",
|
||||
"init_format": "systemd",
|
||||
"devices": [
|
||||
"pi5-32bit",
|
||||
"pi4-32bit",
|
||||
"pi3-32bit",
|
||||
"pi2-32bit"
|
||||
],
|
||||
"capabilities": []
|
||||
},
|
||||
{
|
||||
"name": "${NAME} 64-bit (arm64)",
|
||||
"description": "${DESCRIPTION}",
|
||||
"icon": "${ICON}",
|
||||
"url": "${BASE_URL}/${ARM64_ZIP}",
|
||||
"extract_size": ${ARM64_EXTRACT_SIZE},
|
||||
"extract_sha256": "${ARM64_EXTRACT_SHA}",
|
||||
"image_download_size": ${ARM64_DOWNLOAD_SIZE},
|
||||
"image_download_sha256": "${ARM64_DOWNLOAD_SHA}",
|
||||
"release_date": "${RELEASE_DATE}",
|
||||
"init_format": "systemd",
|
||||
"devices": [
|
||||
"pi5-64bit",
|
||||
"pi4-64bit",
|
||||
"pi3-64bit"
|
||||
],
|
||||
"capabilities": []
|
||||
}
|
||||
]
|
||||
}
|
||||
EOF
|
||||
|
||||
echo "Generated os-sublist-raspap.json"
|
||||
cat os-sublist-raspap.json
|
||||
|
||||
12
installers/hostapd@.service
Normal file
12
installers/hostapd@.service
Normal file
@@ -0,0 +1,12 @@
|
||||
[Unit]
|
||||
Description=Hostapd access point for %i
|
||||
After=network.target
|
||||
|
||||
[Service]
|
||||
ExecStart=/usr/sbin/hostapd -P /run/hostapd_%i.pid /etc/hostapd/hostapd-%i.conf
|
||||
ExecReload=/bin/kill -HUP $MAINPID
|
||||
Restart=on-failure
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
|
||||
45
installers/os-sublist-raspap.json
Normal file
45
installers/os-sublist-raspap.json
Normal file
@@ -0,0 +1,45 @@
|
||||
{
|
||||
"name": "RaspAP",
|
||||
"description": "The easiest, full-featured wireless router for Debian-based devices.",
|
||||
"icon": "https://raspap.com/assets/images/raspAP-logo.svg",
|
||||
"random": false,
|
||||
"subitems": [
|
||||
{
|
||||
"name": "RaspAP 32-bit (armhf)",
|
||||
"description": "The easiest, full-featured wireless router for Debian-based devices.",
|
||||
"icon": "https://raspap.com/assets/images/raspAP-logo.svg",
|
||||
"url": "https://github.com/RaspAP/raspap-webgui/releases/download/3.5.1-test/raspap-trixie-armhf-lite-3.5.1-test.img.zip",
|
||||
"extract_size": 3145728000,
|
||||
"extract_sha256": "c992ce2d375b36c0477e24e6d68004683341dd4e217eb4a074c45bd9984131f9",
|
||||
"image_download_size": 901948510,
|
||||
"image_download_sha256": "801c73645edae571a6e130f935e506d761f02aaaa39a5001cb0c49a88aba0713",
|
||||
"release_date": "2025-12-26",
|
||||
"init_format": "systemd",
|
||||
"devices": [
|
||||
"pi5-32bit",
|
||||
"pi4-32bit",
|
||||
"pi3-32bit",
|
||||
"pi2-32bit"
|
||||
],
|
||||
"capabilities": []
|
||||
},
|
||||
{
|
||||
"name": "RaspAP 64-bit (arm64)",
|
||||
"description": "The easiest, full-featured wireless router for Debian-based devices.",
|
||||
"icon": "https://raspap.com/assets/images/raspAP-logo.svg",
|
||||
"url": "https://github.com/RaspAP/raspap-webgui/releases/download/3.5.1-test/raspap-trixie-arm64-lite-3.5.1-test.img.zip",
|
||||
"extract_size": 3481272320,
|
||||
"extract_sha256": "8bdc5aca58ba93294ddf252b92d606551f2ebc0bc6202856c4671bf15fb09d13",
|
||||
"image_download_size": 932458500,
|
||||
"image_download_sha256": "488627448ac4f6a67b9040547f00f28e0e23808a7a1ad56d9c85719c044fec88",
|
||||
"release_date": "2025-12-26",
|
||||
"init_format": "systemd",
|
||||
"devices": [
|
||||
"pi5-64bit",
|
||||
"pi4-64bit",
|
||||
"pi3-64bit"
|
||||
],
|
||||
"capabilities": []
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -41,6 +41,21 @@ case "$action" in
|
||||
echo "OK"
|
||||
;;
|
||||
|
||||
"deb")
|
||||
[ $# -lt 1 ] && { echo "Usage: $0 deb <deb_file>"; exit 1; }
|
||||
deb_file="$1"
|
||||
|
||||
if [ ! -f "$deb_file" ]; then
|
||||
echo "Error: File not found: $deb_file"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
echo "Installing .deb package: $deb_file"
|
||||
dpkg -i "$deb_file"
|
||||
|
||||
echo "OK"
|
||||
;;
|
||||
|
||||
"user")
|
||||
[ $# -lt 2 ] && { echo "Usage: $0 user <username> <password>."; exit 1; }
|
||||
|
||||
|
||||
@@ -5,23 +5,27 @@ www-data ALL=(ALL) NOPASSWD:/bin/cat /etc/wpa_supplicant/wpa_supplicant-[a-zA-Z0
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/cp /tmp/wifidata /etc/wpa_supplicant/wpa_supplicant.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/cp /tmp/wifidata /etc/wpa_supplicant/wpa_supplicant-wl*.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_supplicant -B -Dnl80211 -c/etc/wpa_supplicant/wpa_supplicant.conf -i[a-zA-Z0-9]*
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_supplicant -i [a-zA-Z0-9]* -c /etc/wpa_supplicant/wpa_supplicant.conf -B
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/rm /var/run/wpa_supplicant/[a-zA-Z0-9]*
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i [a-zA-Z0-9]* scan_results
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i [a-zA-Z0-9]* scan
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i [a-zA-Z0-9]* status
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i [a-zA-Z0-9]* reconfigure
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i [a-zA-Z0-9]* add_network
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i [a-zA-Z0-9]* list_networks
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i enable_network [0-9]
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i disconnect [0-9]
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i [a-zA-Z0-9]* enable_network [0-9]
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i [a-zA-Z0-9]* disconnect [0-9]
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i [a-zA-Z0-9]* select_network [0-9]
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i [a-zA-Z0-9]* set_network [0-9] *
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/wpa_cli -i [a-zA-Z0-9]* remove_network [0-9]
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/rm -f /var/run/wpa_supplicant/wlan[0-9]
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/cp /tmp/hostapddata /etc/hostapd/hostapd.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/systemctl start hostapd.service
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/systemctl stop hostapd.service
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/systemctl start dnsmasq.service
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/systemctl stop dnsmasq.service
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/systemctl restart dnsmasq.service
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/systemctl reload dnsmasq.service
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/systemctl start openvpn-client@client
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/systemctl enable openvpn-client@client
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/systemctl stop openvpn-client@client
|
||||
@@ -44,7 +48,8 @@ www-data ALL=(ALL) NOPASSWD:/sbin/ip link set wl* up
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/ip -s a f label wl*
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/ifup *
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/ifdown *
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/iw
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/iw dev*
|
||||
www-data ALL=(ALL) NOPASSWD:/sbin/iw reg set*
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/cp /etc/raspap/networking/dhcpcd.conf /etc/dhcpcd.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/etc/raspap/hostapd/enablelog.sh
|
||||
www-data ALL=(ALL) NOPASSWD:/etc/raspap/hostapd/disablelog.sh
|
||||
@@ -59,10 +64,13 @@ www-data ALL=(ALL) NOPASSWD:/bin/chmod o+r /var/log/dnsmasq.log
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/chmod o+r /tmp/wireguard.log
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/cp /tmp/dnsmasqdata /etc/dnsmasq.d/090_adblock.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/cp /tmp/dnsmasq_custom /etc/raspap/adblock/custom.txt
|
||||
www-data ALL=(ALL) NOPASSWD:/etc/raspap/adblock/update_blocklist.sh
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/cp /tmp/wgdata /etc/wireguard/*.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/mv /tmp/wg-*.key /etc/wireguard/wg-*.key
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/mv /tmp/wg/* /etc/wireguard/*.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/etc/raspap/adblock/update_blocklist.sh
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/rm /etc/wireguard/wg0.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/usr/bin/ls /etc/wireguard/
|
||||
www-data ALL=(ALL) NOPASSWD:/usr/bin/ln -s /etc/wireguard/*.conf /etc/wireguard/*.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/usr/bin/socat - /dev/ttyUSB[0-9]
|
||||
www-data ALL=(ALL) NOPASSWD:/usr/local/sbin/onoff_huawei_hilink.sh *
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/sed -i * /etc/wvdial.conf
|
||||
@@ -75,10 +83,14 @@ www-data ALL=(ALL) NOPASSWD:/bin/cat /etc/wireguard/*.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/cat /etc/wireguard/wg-*.key
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/rm /etc/wireguard/*.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/rm /etc/wireguard/wg-*.key
|
||||
www-data ALL=(ALL) NOPASSWD:/usr/bin/readlink /etc/wireguard/*.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/usr/sbin/netplan
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/truncate -s 0 /tmp/*.log,/bin/truncate -s 0 /var/log/dnsmasq.log
|
||||
www-data ALL=(ALL) NOPASSWD:/usr/bin/nmap --script=broadcast-dhcp-discover -e [a-zA-Z0-9]*
|
||||
www-data ALL=(ALL) NOPASSWD:/usr/bin/vnstat *
|
||||
www-data ALL=(ALL) NOPASSWD:/usr/sbin/visudo -cf *
|
||||
www-data ALL=(ALL) NOPASSWD:/etc/raspap/plugins/plugin_helper.sh
|
||||
www-data ALL=(ALL) NOPASSWD: /bin/systemctl start raspap-network-activity@*.service
|
||||
www-data ALL=(ALL) NOPASSWD: /bin/systemctl stop raspap-network-activity@*.service
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/systemctl start raspap-network-activity@*.service
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/systemctl stop raspap-network-activity@*.service
|
||||
www-data ALL=(ALL) NOPASSWD:/bin/cp /tmp/wpa_conf_* /etc/wpa_supplicant/wpa_supplicant.conf
|
||||
www-data ALL=(ALL) NOPASSWD:/usr/bin/journalctl -u hostapd.service *
|
||||
|
||||
@@ -49,6 +49,7 @@ OPTIONS:
|
||||
-b, --branch <name> Overrides the default git branch (latest release)
|
||||
-t, --token <accesstoken> Specify a GitHub token to access a private repository
|
||||
-n, --name <username> Specify a GitHub username to access a private repository
|
||||
-x, --use-ssh Use ssh instead of https for git
|
||||
-u, --upgrade Upgrades an existing installation to the latest release version
|
||||
-d, --update Updates an existing installation to the latest release version
|
||||
-p, --path <path> Used with -d, --update, sets the existing install path
|
||||
@@ -56,7 +57,7 @@ OPTIONS:
|
||||
-m, --minwrite Configures a microSD card for minimum write operation
|
||||
-k, --check <flag> Sets the connectivity check flag (default is 1=perform check)
|
||||
-v, --version Outputs release info and exits
|
||||
-n, --uninstall Loads and executes the uninstaller
|
||||
-z, --uninstall Loads and executes the uninstaller
|
||||
-h, --help Outputs usage notes and exits
|
||||
|
||||
Examples:
|
||||
@@ -105,7 +106,9 @@ function _parse_params() {
|
||||
restapi_option=1
|
||||
adblock_option=1
|
||||
wg_option=1
|
||||
pv_option=0
|
||||
insiders=0
|
||||
ssh=0
|
||||
minwrite=0
|
||||
acctoken=""
|
||||
path=""
|
||||
@@ -165,6 +168,9 @@ function _parse_params() {
|
||||
-m|--minwrite)
|
||||
minwrite=1
|
||||
;;
|
||||
-x|--use-ssh)
|
||||
ssh=1
|
||||
;;
|
||||
-t|--token)
|
||||
acctoken="$2"
|
||||
shift
|
||||
@@ -187,7 +193,7 @@ function _parse_params() {
|
||||
-v|--version)
|
||||
_version
|
||||
;;
|
||||
-n|--uninstall)
|
||||
-z|--uninstall)
|
||||
uninstall=1
|
||||
;;
|
||||
-*|--*)
|
||||
@@ -308,7 +314,10 @@ function _check_internet() {
|
||||
tput civis # hide cursor
|
||||
|
||||
# run check in background
|
||||
( curl -Is --connect-timeout 3 --max-time 15 https://github.com | head -n 1 | grep "HTTP/2 200" >/dev/null ) &
|
||||
(
|
||||
curl -Is --connect-timeout 3 --max-time 15 https://github.com \
|
||||
| grep -q "^HTTP/2 200"
|
||||
) &
|
||||
local pid=$!
|
||||
|
||||
# display spinner while curl runs
|
||||
@@ -318,8 +327,9 @@ function _check_internet() {
|
||||
done
|
||||
printf "\r"
|
||||
|
||||
# check exit status of curl
|
||||
wait $pid || exit_code=$?
|
||||
# capture exit status
|
||||
wait "$pid"
|
||||
exit_code=$?
|
||||
|
||||
tput cnorm # restore cursor
|
||||
|
||||
|
||||
@@ -48,21 +48,24 @@ function _get_linux_distro() {
|
||||
# Sets php package option based on Linux version, abort if unsupported distro
|
||||
function _set_php_package() {
|
||||
case $RELEASE in
|
||||
13) # Debian 13 trixie
|
||||
php_package="php8.4-fpm"
|
||||
phpiniconf="/etc/php/8.4/fpm/php.ini" ;;
|
||||
23.05|12*) # Debian 12 & Armbian 23.05
|
||||
php_package="php8.2-cgi"
|
||||
phpcgiconf="/etc/php/8.2/cgi/php.ini" ;;
|
||||
phpiniconf="/etc/php/8.2/cgi/php.ini" ;;
|
||||
23.04) # Ubuntu Server 23.04
|
||||
php_package="php8.1-cgi"
|
||||
phpcgiconf="/etc/php/8.1/cgi/php.ini" ;;
|
||||
phpiniconf="/etc/php/8.1/cgi/php.ini" ;;
|
||||
22.04|20.04|18.04|19.10|11*) # Previous Ubuntu Server, Debian & Armbian distros
|
||||
php_package="php7.4-cgi"
|
||||
phpcgiconf="/etc/php/7.4/cgi/php.ini" ;;
|
||||
phpiniconf="/etc/php/7.4/cgi/php.ini" ;;
|
||||
10*|11*)
|
||||
php_package="php7.3-cgi"
|
||||
phpcgiconf="/etc/php/7.3/cgi/php.ini" ;;
|
||||
phpiniconf="/etc/php/7.3/cgi/php.ini" ;;
|
||||
9*)
|
||||
php_package="php7.0-cgi"
|
||||
phpcgiconf="/etc/php/7.0/cgi/php.ini" ;;
|
||||
phpiniconf="/etc/php/7.0/cgi/php.ini" ;;
|
||||
8)
|
||||
_install_error "${DESC} and php5 are unsupported."
|
||||
exit 1 ;;
|
||||
@@ -127,11 +130,11 @@ function _check_for_backups() {
|
||||
sudo cp "$raspap_dir/backups/dhcpcd.conf" /etc/dhcpcd.conf
|
||||
fi
|
||||
fi
|
||||
if [ -f "$raspap_dir/backups/php.ini" ] && [ -f "$phpcgiconf" ]; then
|
||||
if [ -f "$raspap_dir/backups/php.ini" ] && [ -f "$phpiniconf" ]; then
|
||||
echo -n "Restore the last php.ini file? [y/N]: "
|
||||
read answer
|
||||
if [[ $answer -eq 'y' ]]; then
|
||||
sudo cp "$raspap_dir/backups/php.ini" "$phpcgiconf"
|
||||
sudo cp "$raspap_dir/backups/php.ini" "$phpiniconf"
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
|
||||
Binary file not shown.
File diff suppressed because it is too large
Load Diff
Binary file not shown.
@@ -10,7 +10,7 @@ msgstr ""
|
||||
"Project-Id-Version: 1.2.1\n"
|
||||
"Report-Msgid-Bugs-To: Bill Zimmerman <billzimmerman@gmail.com>\n"
|
||||
"POT-Creation-Date: 2017-10-19 08:56+0000\n"
|
||||
"PO-Revision-Date: 2022-01-05 20:35+0000\n"
|
||||
"PO-Revision-Date: 2025-10-25 08:35+0000\n"
|
||||
"Last-Translator: Bill Zimmerman <billzimmerman@gmail.com>\n"
|
||||
"Language-Team: \n"
|
||||
"Language: en_US\n"
|
||||
@@ -34,9 +34,15 @@ msgstr "Dashboard"
|
||||
msgid "WiFi client"
|
||||
msgstr "WiFi client"
|
||||
|
||||
msgid "Status"
|
||||
msgstr "Status"
|
||||
|
||||
msgid "Hotspot"
|
||||
msgstr "Hotspot"
|
||||
|
||||
msgid "Logging"
|
||||
msgstr "Logging"
|
||||
|
||||
msgid "Mem Use"
|
||||
msgstr "Mem Use"
|
||||
|
||||
@@ -58,9 +64,6 @@ msgstr "TOR proxy"
|
||||
msgid "Authentication"
|
||||
msgstr "Authentication"
|
||||
|
||||
msgid "Change Theme"
|
||||
msgstr "Change Theme"
|
||||
|
||||
msgid "System"
|
||||
msgstr "System"
|
||||
|
||||
@@ -417,9 +420,6 @@ msgstr "Signal quality"
|
||||
msgid "WAN IP"
|
||||
msgstr "WAN IP"
|
||||
|
||||
msgid "Web-GUI"
|
||||
msgstr "Web-GUI"
|
||||
|
||||
msgid "Signal strength"
|
||||
msgstr "Signal strength"
|
||||
|
||||
@@ -446,6 +446,24 @@ msgstr "Thanks for being an Insider"
|
||||
msgid "DHCP server settings"
|
||||
msgstr "DHCP server settings"
|
||||
|
||||
msgid "Default gateway"
|
||||
msgstr "Default gateway"
|
||||
|
||||
msgid "Install a default route for this interface"
|
||||
msgstr "Install a default route for this interface"
|
||||
|
||||
msgid "Static IP options"
|
||||
msgstr "Static IP options"
|
||||
|
||||
msgid "DHCP options"
|
||||
msgstr "DHCP options"
|
||||
|
||||
msgid "Enable this option if you want RaspAP to assign IP addresses to clients on the selected interface. A static IP address is required for this option."
|
||||
msgstr "Enable this option if you want RaspAP to assign IP addresses to clients on the selected interface. A static IP address is required for this option."
|
||||
|
||||
msgid "Enable this only if you want your device to use this interface as its primary route to the internet."
|
||||
msgstr "Enable this only if you want your device to use this interface as its primary route to the internet."
|
||||
|
||||
msgid "Client list"
|
||||
msgstr "Client list"
|
||||
|
||||
@@ -581,11 +599,11 @@ msgstr "Clients with a particular hardware MAC address can always be allocated t
|
||||
msgid "This option adds <code>dhcp-host</code> entries to the dnsmasq configuration."
|
||||
msgstr "This option adds <code>dhcp-host</code> entries to the dnsmasq configuration."
|
||||
|
||||
msgid "This toggles the <code>gateway</code>/<code>nogateway</code> option for this interface in the DHCPCD configuration."
|
||||
msgstr "This toggles the <code>gateway</code>/<code>nogateway</code> option for this interface in the DHCPCD configuration."
|
||||
msgid "This toggles the <code>gateway</code>/<code>nogateway</code> option for this interface in the dhcpcd.conf file."
|
||||
msgstr "This toggles the <code>gateway</code>/<code>nogateway</code> option for this interface in the dhcpcd.conf file."
|
||||
|
||||
msgid "This toggles the <code>nohook wpa_supplicant</code> option for this interface in the DHCPCD configuration."
|
||||
msgstr "This toggles the <code>nohook wpa_supplicant</code> option for this interface in the DHCPCD configuration."
|
||||
msgid "This toggles the <code>nohook wpa_supplicant</code> option for this interface in the dhcpcd.conf file."
|
||||
msgstr "This toggles the <code>nohook wpa_supplicant</code> option for this interface in the dhcpcd.conf file."
|
||||
|
||||
msgid "Disable wpa_supplicant dhcp hook for this interface"
|
||||
msgstr "Disable wpa_supplicant dhcp hook for this interface"
|
||||
@@ -726,6 +744,27 @@ msgstr "Enable logging"
|
||||
msgid "Logfile output"
|
||||
msgstr "Logfile output"
|
||||
|
||||
msgid "Log level"
|
||||
msgstr "Log level"
|
||||
|
||||
msgid "Higher levels reduce log verbosity. Informational is recommended."
|
||||
msgstr "Higher levels reduce log verbosity. Informational is recommended."
|
||||
|
||||
msgid "Verbose debugging"
|
||||
msgstr "Verbose debugging"
|
||||
|
||||
msgid "Debugging"
|
||||
msgstr "Debugging"
|
||||
|
||||
msgid "Informational"
|
||||
msgstr "Informational"
|
||||
|
||||
msgid "Notification"
|
||||
msgstr "Notification"
|
||||
|
||||
msgid "Warning"
|
||||
msgstr "Warning"
|
||||
|
||||
msgid "WiFi client AP mode"
|
||||
msgstr "WiFi client AP mode"
|
||||
|
||||
@@ -735,6 +774,9 @@ msgstr "Bridged AP mode"
|
||||
msgid "WiFi repeater mode"
|
||||
msgstr "WiFi repeater mode"
|
||||
|
||||
msgid "Dual band AP mode"
|
||||
msgstr "Dual band AP mode"
|
||||
|
||||
msgid "Hide SSID in broadcast"
|
||||
msgstr "Hide SSID in broadcast"
|
||||
|
||||
@@ -837,6 +879,75 @@ msgstr "Parameter hiddenSSID contains invalid configuration value."
|
||||
msgid "Parameter hiddenSSID is not a number."
|
||||
msgstr "Parameter hiddenSSID is not a number."
|
||||
|
||||
msgid "Bridge interface configuration"
|
||||
msgstr "Bridge interface configuration"
|
||||
|
||||
msgid "Configure a static IP address for the <code>br0</code> interface to maintain connectivity during bridge mode activation."
|
||||
msgstr "Configure a static IP address for the <code>br0</code> interface to maintain connectivity during bridge mode activation."
|
||||
|
||||
msgid "Static IP Address"
|
||||
msgstr "Static IP Address"
|
||||
|
||||
msgid "Netmask / CIDR"
|
||||
msgstr "Netmask / CIDR"
|
||||
|
||||
msgid "Example: 192.168.1.100"
|
||||
msgstr "Example: 192.168.1.100"
|
||||
|
||||
msgid "CIDR notation (e.g., 24 for 255.255.255.0)"
|
||||
msgstr "CIDR notation (e.g., 24 for 255.255.255.0)"
|
||||
|
||||
msgid "Gateway"
|
||||
msgstr "Gateway"
|
||||
|
||||
msgid "Your router's IP address"
|
||||
msgstr "Your router's IP address"
|
||||
|
||||
msgid "Usually same as gateway"
|
||||
msgstr "Usually same as gateway"
|
||||
|
||||
msgid "Bridge static IP address must be a valid IPv4 address"
|
||||
msgstr "Bridge static IP address must be a valid IPv4 address"
|
||||
|
||||
msgid "Bridge netmask must be a number between 1 and 32"
|
||||
msgstr "Bridge netmask must be a number between 1 and 32"
|
||||
|
||||
msgid "Bridge netmask is required when using static IP"
|
||||
msgstr "Bridge netmask is required when using static IP"
|
||||
|
||||
msgid "Bridge gateway must be a valid IPv4 address"
|
||||
msgstr "Bridge gateway must be a valid IPv4 address"
|
||||
|
||||
msgid "Bridge gateway is required when using static IP"
|
||||
msgstr "Bridge gateway is required when using static IP"
|
||||
|
||||
msgid "Bridge DNS server must be a valid IPv4 address"
|
||||
msgstr "Bridge DNS server must be a valid IPv4 address"
|
||||
|
||||
msgid "Bridge DNS server is required when using static IP"
|
||||
msgstr "Bridge DNS server is required when using static IP"
|
||||
|
||||
msgid "Bridge static IP and gateway must be in the same subnet"
|
||||
msgstr "Bridge static IP and gateway must be in the same subnet"
|
||||
|
||||
msgid "Please enter a valid IPv4 address"
|
||||
msgstr "Please enter a valid IPv4 address"
|
||||
|
||||
msgid "Please enter a valid netmask"
|
||||
msgstr "Please enter a valid netmask"
|
||||
|
||||
msgid "DHCP configuration for br0 enabled"
|
||||
msgstr "DHCP configuration for br0 enabled"
|
||||
|
||||
msgid "Unable to save WiFi hotspot settings due to validation errors"
|
||||
msgstr "Unable to save WiFi hotspot settings due to validation errors"
|
||||
|
||||
msgid "Enable AP isolation"
|
||||
msgstr "Enable AP isolation"
|
||||
|
||||
msgid "Blocks wireless clients from seeing or connecting to each other. Recommended for guest networks and public access points."
|
||||
msgstr "Blocks wireless clients from seeing or connecting to each other. Recommended for guest networks and public access points."
|
||||
|
||||
#: includes/networking.php
|
||||
msgid "Summary"
|
||||
msgstr "Summary"
|
||||
@@ -856,8 +967,11 @@ msgstr "Alternate DNS Server"
|
||||
msgid "Adapter IP Address Settings"
|
||||
msgstr "Adapter IP Address Settings"
|
||||
|
||||
msgid "Enable Fallback to Static Option"
|
||||
msgstr "Enable Fallback to Static Option"
|
||||
msgid "Enable fallback to static option"
|
||||
msgstr "Enable fallback to static option"
|
||||
|
||||
msgid "Enable this option to configure a static profile and fall back to it when DHCP lease fails."
|
||||
msgstr "Enable this option to configure a static profile and fall back to it when DHCP lease fails."
|
||||
|
||||
msgid "Static IP"
|
||||
msgstr "Static IP"
|
||||
@@ -886,14 +1000,14 @@ msgstr "Devices"
|
||||
msgid "Diagnostics"
|
||||
msgstr "Diagnostics"
|
||||
|
||||
msgid "Properties of network devices"
|
||||
msgstr "Properties of network devices"
|
||||
msgid "Network devices"
|
||||
msgstr "Network devices"
|
||||
|
||||
msgid "Device"
|
||||
msgstr "Device"
|
||||
|
||||
msgid "MAC"
|
||||
msgstr "MAC"
|
||||
msgid "MAC address"
|
||||
msgstr "MAC address"
|
||||
|
||||
msgid "USB vid/pid"
|
||||
msgstr "USB vid/pid"
|
||||
@@ -907,11 +1021,11 @@ msgstr "Fixed name"
|
||||
msgid "Change"
|
||||
msgstr "Change"
|
||||
|
||||
msgid "Settings for Mobile Data Devices"
|
||||
msgstr "Settings for Mobile Data Devices"
|
||||
msgid "Mobile data settings"
|
||||
msgstr "Mobile data settings"
|
||||
|
||||
msgid "PIN of SIM card"
|
||||
msgstr "PIN of SIM card"
|
||||
msgid "SIM card PIN number"
|
||||
msgstr "SIM card PIN number"
|
||||
|
||||
msgid "APN Settings (Modem device ppp0)"
|
||||
msgstr "APN Settings (Modem device ppp0)"
|
||||
@@ -1064,9 +1178,15 @@ msgstr "System Time"
|
||||
msgid "Memory Used"
|
||||
msgstr "Memory Used"
|
||||
|
||||
msgid "Storage Used"
|
||||
msgstr "Storage Used"
|
||||
|
||||
msgid "CPU Load"
|
||||
msgstr "CPU Load"
|
||||
|
||||
msgid "CPU Temp"
|
||||
msgstr "CPU Temp"
|
||||
|
||||
msgid "Reboot"
|
||||
msgstr "Reboot"
|
||||
|
||||
@@ -1250,6 +1370,36 @@ msgstr "Details"
|
||||
msgid "Installed"
|
||||
msgstr "Installed"
|
||||
|
||||
msgid "Alert messages"
|
||||
msgstr "Alert messages"
|
||||
|
||||
msgid "Alert close timeout (milliseconds)"
|
||||
msgstr "Alert close timeout (milliseconds)"
|
||||
|
||||
msgid "Automatically close alerts after a specified timeout"
|
||||
msgstr "Automatically close alerts after a specified timeout"
|
||||
|
||||
msgid "To <a href=\"%s\" target=\"_blank\">inspect adapters</a> attached to this device, click or tap the button below."
|
||||
msgstr "To <a href=\"%s\" target=\"_blank\">inspect adapters</a> attached to this device, click or tap the button below."
|
||||
|
||||
msgid "The adapter inspection tool returns details about external WLAN devices including drivers, supported modes and so on."
|
||||
msgstr "The adapter inspection tool returns details about external WLAN devices including drivers, supported modes and so on."
|
||||
|
||||
msgid "Choose a network interface to inspect"
|
||||
msgstr "Choose a network interface to inspect"
|
||||
|
||||
msgid "Select an interface..."
|
||||
msgstr "Select an interface..."
|
||||
|
||||
msgid "Adapter health check"
|
||||
msgstr "Adapter health check"
|
||||
|
||||
msgid "Inspect adapters"
|
||||
msgstr "Inspect adapters"
|
||||
|
||||
msgid "Theme"
|
||||
msgstr "Theme"
|
||||
|
||||
#: includes/data_usage.php
|
||||
msgid "Data usage"
|
||||
msgstr "Data usage"
|
||||
@@ -1957,6 +2107,27 @@ msgstr "Update complete"
|
||||
msgid "An error occurred. Check the log at <code>/tmp/raspap_install.log</code>"
|
||||
msgstr "An error occurred. Check the log at <code>/tmp/raspap_install.log</code>"
|
||||
|
||||
msgid "RaspAP is a co-creation of %1$s and %2$s with the contributions of our %3$s and %4$s. Learn more about joining the project as a %5$s, %6$s or %7$s with immediate access to %8$s available to %9$s."
|
||||
msgstr "RaspAP is a co-creation of %1$s and %2$s with the contributions of our %3$s and %4$s. Learn more about joining the project as a %5$s, %6$s or %7$s with immediate access to %8$s available to %9$s."
|
||||
|
||||
msgid "developer community"
|
||||
msgstr "developer community"
|
||||
|
||||
msgid "language translators"
|
||||
msgstr "language translators"
|
||||
|
||||
msgid "code contributor"
|
||||
msgstr "code contributor"
|
||||
|
||||
msgid "translator"
|
||||
msgstr "translator"
|
||||
|
||||
msgid "financial sponsor"
|
||||
msgstr "financial sponsor"
|
||||
|
||||
msgid "exclusive features"
|
||||
msgstr "exclusive features"
|
||||
|
||||
#: includes/exceptions.php
|
||||
|
||||
msgid "RaspAP Exception"
|
||||
@@ -2186,12 +2357,30 @@ msgstr "Configure exit node"
|
||||
msgid "The device <code>%s</code> is connected to your tailnet with the address <code>%s</code>."
|
||||
msgstr "The device <code>%s</code> is connected to your tailnet with the address <code>%s</code>."
|
||||
|
||||
msgid "By default, Tailscale only routes traffic between the devices on which it's been installed. By configuring <code>%s</code> as an <strong>exit node</strong>, your public internet traffic will be routed through this device"
|
||||
msgstr "By default, Tailscale only routes traffic between the devices on which it's been installed. By configuring <code>%s</code> as an <strong>exit node</strong>, your public internet traffic will be routed through this device"
|
||||
msgid "By default, Tailscale only routes traffic between the devices on which it's been installed. You can also route all your public internet traffic by configuring a device on your network as a <strong>exit node</strong>"
|
||||
msgstr "By default, Tailscale only routes traffic between the devices on which it's been installed. You can also route all your public internet traffic by configuring a device on your network as a <strong>exit node</strong>"
|
||||
|
||||
msgid "When you route all traffic through an exit node, you're effectively using default routes (0.0.0.0/0, ::/0), similar to how you would if you were using a typical VPN."
|
||||
msgstr "When you route all traffic through an exit node, you're effectively using default routes (0.0.0.0/0, ::/0), similar to how you would if you were using a typical VPN."
|
||||
|
||||
msgid "You have the option of configuring this device as an exit node, or using another exit node in your tailnet."
|
||||
msgstr "You have the option of configuring this device as an exit node, or using another exit node in your tailnet."
|
||||
|
||||
msgid "Select an existing exit node on your tailnet"
|
||||
msgstr "Select an existing exit node on your tailnet"
|
||||
|
||||
msgid "This is a typical configuration if you're using this device as a VPN travel router, for example."
|
||||
msgstr "This is a typical configuration if you're using this device as a VPN travel router, for example."
|
||||
|
||||
msgid "Configure this device as a new exit node"
|
||||
msgstr "Configure this device as a new exit node"
|
||||
|
||||
msgid "By configuring this device as an exit node, public internet traffic from devices connected in your tailnet will be routed through it."
|
||||
msgstr "By configuring this device as an exit node, public internet traffic from devices connected in your tailnet will be routed through it."
|
||||
|
||||
msgid "For security reasons, you must opt in to enable exit node functionality. The first step is to advertise <code>%s</code> as an exit node in your tailnet. In the next step, you'll allow this device to be an exit node."
|
||||
msgstr "For security reasons, you must opt in to enable exit node functionality. The first step is to advertise <code>%s</code> as an exit node in your tailnet. In the next step, you'll allow this device to be an exit node."
|
||||
|
||||
msgid "Advertise <code>%s</code> as an exit node"
|
||||
msgstr "Advertise <code>%s</code> as an exit node"
|
||||
|
||||
@@ -2207,12 +2396,370 @@ msgstr "Recommended for Tailscale exit nodes with Linux 6.2 or later kernels, th
|
||||
msgid "This option enables transport layer offloads for better performance."
|
||||
msgstr "This option enables transport layer offloads for better performance."
|
||||
|
||||
msgid "Select an exit node"
|
||||
msgstr "Select an exit node"
|
||||
|
||||
msgid "To use <code>%s</code> as a VPN gateway, configure Tailscale to use an exit node. Tailscale's suggested node is indicated with a star."
|
||||
msgstr "To use <code>%s</code> as a VPN gateway, configure Tailscale to use an exit node. Tailscale's suggested node is indicated with a star."
|
||||
|
||||
msgid "Advertise a <strong>subnet route</strong> for the active <code>%s</code> AP interface"
|
||||
msgstr "Advertise a <strong>subnet route</strong> for the active <code>%s</code> AP interface"
|
||||
|
||||
msgid "Subnet routes let you extend your Tailscale network (known as a tailnet) to include devices that don't or can't run the Tailscale client."
|
||||
msgstr "Subnet routes let you extend your Tailscale network (known as a tailnet) to include devices that don't or can't run the Tailscale client."
|
||||
|
||||
msgid "A subnet route acts as a gateway between your tailnet and a physical subnet. The subnet of the active AP interface is preconfigured below; edit if necessary."
|
||||
msgstr "A subnet route acts as a gateway between your tailnet and a physical subnet. The subnet of the active AP interface is preconfigured below; edit if necessary."
|
||||
|
||||
msgid "Route LAN traffic through the exit node."
|
||||
msgstr "Route LAN traffic through the exit node."
|
||||
|
||||
msgid "This will direct all LAN traffic to go through your exit node only."
|
||||
msgstr "This will direct all LAN traffic to go through your exit node only."
|
||||
|
||||
msgid "Choose <strong>Next</strong> to configure <code>%s</code> to use the selected exit node with these options."
|
||||
msgstr "Choose <strong>Next</strong> to configure <code>%s</code> to use the selected exit node with these options."
|
||||
|
||||
msgid "No exit nodes found on your tailnet. Choose <strong>Back</strong> to continue."
|
||||
msgstr "No exit nodes found on your tailnet. Choose <strong>Back</strong> to continue."
|
||||
|
||||
msgid "Using exit node"
|
||||
msgstr "Using exit node"
|
||||
|
||||
msgid "The device <code>%s</code> is configured to use exit node <code>%s</code>. It has the Tailscale MagicDNS address <code>%s</code>."
|
||||
msgstr "The device <code>%s</code> is configured to use exit node <code>%s</code>. It has the Tailscale MagicDNS address <code>%s</code>."
|
||||
|
||||
msgid "Choose <strong>Save settings</strong> to continue."
|
||||
msgstr "Choose <strong>Save settings</strong> to continue."
|
||||
|
||||
msgid "Choose <strong>Next</strong> to continue."
|
||||
msgstr "Choose <strong>Next</strong> to continue."
|
||||
|
||||
msgid "Tailnet status"
|
||||
msgstr "Tailnet status"
|
||||
|
||||
msgid "Current <code>tailnet</code> status is displayed below."
|
||||
msgstr "Current <code>tailnet</code> status is displayed below."
|
||||
|
||||
msgid "Use Tailscale DNS settings (default)."
|
||||
msgstr "Use Tailscale DNS settings (default)."
|
||||
|
||||
msgid "Uncheck to use local DNS. This sets <code>--accept-dns=false</code>."
|
||||
msgstr "Uncheck to use local DNS. This sets <code>--accept-dns=false</code>."
|
||||
|
||||
msgid "Do not use Tailscale subnets (default on Linux)."
|
||||
msgstr "Do not use Tailscale subnets (default on Linux)."
|
||||
|
||||
msgid "If subnet routes exist for your tailnet, you can route your device's traffic to a subnet router. Enabling this sets <code>--accept-routes=true</code>."
|
||||
msgstr "If subnet routes exist for your tailnet, you can route your device's traffic to a subnet router. Enabling this sets <code>--accept-routes=true</code>."
|
||||
|
||||
msgid "If keys expire for a device, connections to/from the given endpoint will stop working."
|
||||
msgstr "If keys expire for a device, connections to/from the given endpoint will stop working."
|
||||
|
||||
msgid "This option uses <code>--force-reauth</code> to renew the keys for this device."
|
||||
msgstr "This option uses <code>--force-reauth</code> to renew the keys for this device."
|
||||
|
||||
#: wireshark plugin
|
||||
|
||||
msgid "Start capture"
|
||||
msgstr "Start capture"
|
||||
|
||||
msgid "Stop capture"
|
||||
msgstr "Stop capture"
|
||||
|
||||
msgid "Capture files"
|
||||
msgstr "Capture files"
|
||||
|
||||
msgid "Capture interface"
|
||||
msgstr "Capture interface"
|
||||
|
||||
msgid "Output file"
|
||||
msgstr "Output file"
|
||||
|
||||
msgid "Path where capture file will be saved (.pcap format)"
|
||||
msgstr "Path where capture file will be saved (.pcap format)"
|
||||
|
||||
msgid "File will be saved with .pcap extension"
|
||||
msgstr "File will be saved with .pcap extension"
|
||||
|
||||
msgid "Capture filter (BPF syntax)"
|
||||
msgstr "Capture filter (BPF syntax)"
|
||||
|
||||
msgid "Berkeley Packet Filter syntax. Leave empty to capture all traffic."
|
||||
msgstr "Berkeley Packet Filter syntax. Leave empty to capture all traffic."
|
||||
|
||||
msgid "Examples: <code>port 80</code>, <code>host 192.168.1.1</code>, <code>tcp and not port 22</code>"
|
||||
msgstr "Examples: <code>port 80</code>, <code>host 192.168.1.1</code>, <code>tcp and not port 22</code>"
|
||||
|
||||
msgid "Capture limits"
|
||||
msgstr "Capture limits"
|
||||
|
||||
msgid "Packet count limit"
|
||||
msgstr "Packet count limit"
|
||||
|
||||
msgid "Stop capture after this many packets. Leave empty for unlimited."
|
||||
msgstr "Stop capture after this many packets. Leave empty for unlimited."
|
||||
|
||||
msgid "Duration limit (seconds)"
|
||||
msgstr "Duration limit (seconds)"
|
||||
|
||||
msgid "Stop capture after this many seconds. Leave empty for unlimited."
|
||||
msgstr "Stop capture after this many seconds. Leave empty for unlimited."
|
||||
|
||||
msgid "Ring buffer settings"
|
||||
msgstr "Ring buffer settings"
|
||||
|
||||
msgid "File size (KB)"
|
||||
msgstr "File size (KB)"
|
||||
|
||||
msgid "Create new file when this size is reached. Leave empty to disable."
|
||||
msgstr "Create new file when this size is reached. Leave empty to disable."
|
||||
|
||||
msgid "10000 = 10 MB per file"
|
||||
msgstr "10000 = 10 MB per file"
|
||||
|
||||
msgid "Number of files"
|
||||
msgstr "Number of files"
|
||||
|
||||
msgid "Maximum number of ring buffer files to keep. Oldest files are deleted."
|
||||
msgstr "Maximum number of ring buffer files to keep. Oldest files are deleted."
|
||||
|
||||
msgid "Advanced options"
|
||||
msgstr "Advanced options"
|
||||
|
||||
msgid "Snapshot length (bytes)"
|
||||
msgstr "Snapshot length (bytes)"
|
||||
|
||||
msgid "Limit the amount of data captured per packet. Leave empty for full packets."
|
||||
msgstr "Limit the amount of data captured per packet. Leave empty for full packets."
|
||||
|
||||
msgid "96 bytes captures headers only, reduces file size"
|
||||
msgstr "96 bytes captures headers only, reduces file size"
|
||||
|
||||
msgid "Promiscuous mode"
|
||||
msgstr "Promiscuous mode"
|
||||
|
||||
msgid "Capture all packets on the network segment, not just those destined for this interface"
|
||||
msgstr "Capture all packets on the network segment, not just those destined for this interface"
|
||||
|
||||
msgid "Quick filter presets"
|
||||
msgstr "Quick filter presets"
|
||||
|
||||
msgid "Capture files generated by <code>tshark</code> are displayed below."
|
||||
msgstr "Capture files generated by <code>tshark</code> are displayed below."
|
||||
|
||||
msgid "No capture files found in /tmp directory"
|
||||
msgstr "No capture files found in /tmp directory"
|
||||
|
||||
msgid "Filename"
|
||||
msgstr "Filename"
|
||||
|
||||
msgid "Size"
|
||||
msgstr "Size"
|
||||
|
||||
msgid "Modified"
|
||||
msgstr "Modified"
|
||||
|
||||
msgid "Actions"
|
||||
msgstr "Actions"
|
||||
|
||||
msgid "Download file"
|
||||
msgstr "Download file"
|
||||
|
||||
msgid "Delete file"
|
||||
msgstr "Delete file"
|
||||
|
||||
msgid "Confirm deletion"
|
||||
msgstr "Confirm deletion"
|
||||
|
||||
msgid "Are you sure you want to delete this file?"
|
||||
msgstr "Are you sure you want to delete this file?"
|
||||
|
||||
msgid "All Traffic"
|
||||
msgstr "All Traffic"
|
||||
|
||||
msgid "HTTP/HTTPS"
|
||||
msgstr "HTTP/HTTPS"
|
||||
|
||||
msgid "ICMP (Ping)"
|
||||
msgstr "ICMP (Ping)"
|
||||
|
||||
msgid "SSH"
|
||||
msgstr "SSH"
|
||||
|
||||
msgid "Exclude SSH"
|
||||
msgstr "Exclude SSH"
|
||||
|
||||
msgid "A Wireshark (TShark) CLI packet capture for RaspAP"
|
||||
msgstr "A Wireshark (TShark) CLI packet capture for RaspAP"
|
||||
|
||||
msgid "Information provided by tshark"
|
||||
msgstr "Information provided by tshark"
|
||||
|
||||
msgid "Total: %d file(s), %s"
|
||||
msgstr "Total: %d file(s), %s"
|
||||
|
||||
#: captive portal plugin
|
||||
|
||||
msgid "Captive portal"
|
||||
msgstr "Captive portal"
|
||||
|
||||
msgid "Gateway interface"
|
||||
msgstr "Gateway interface"
|
||||
|
||||
msgid "Gateway name"
|
||||
msgstr "Gateway name"
|
||||
|
||||
msgid "Gateway address"
|
||||
msgstr "Gateway address"
|
||||
|
||||
msgid "Gateway port"
|
||||
msgstr "Gateway port"
|
||||
|
||||
msgid "Defaults to the active AP interface, typically <code>wlan0</code>"
|
||||
msgstr "Defaults to the active AP interface, typically <code>wlan0</code>"
|
||||
|
||||
msgid "Auto-detected from gateway interface if not specified"
|
||||
msgstr "Auto-detected from gateway interface if not specified"
|
||||
|
||||
msgid "Start portal"
|
||||
msgstr "Start portal"
|
||||
|
||||
msgid "Stop portal"
|
||||
msgstr "Stop portal"
|
||||
|
||||
msgid "Information provided by nodogsplash"
|
||||
msgstr "Information provided by nodogsplash"
|
||||
|
||||
msgid "Stop portal service"
|
||||
msgstr "Stop portal service"
|
||||
|
||||
msgid "Start portal service"
|
||||
msgstr "Start portal service"
|
||||
|
||||
msgid "Changing the portal service will momentarily disrupt client traffic. Choose <strong>Proceed</strong> to continue."
|
||||
msgstr "Changing the portal service will momentarily disrupt client traffic. Choose <strong>Proceed</strong> to continue."
|
||||
|
||||
msgid "Interface to be managed by the portal"
|
||||
msgstr "Interface to be managed by the portal"
|
||||
|
||||
msgid "Name of your gateway (available as \\$gatewayname variable)"
|
||||
msgstr "Name of your gateway (available as \\$gatewayname variable)"
|
||||
|
||||
msgid "IP address of the router. Leave empty for auto-detection"
|
||||
msgstr "IP address of the router. Leave empty for auto-detection"
|
||||
|
||||
msgid "Port for Nodogsplash HTTP server"
|
||||
msgstr "Port for Nodogsplash HTTP server"
|
||||
|
||||
msgid "Maximum clients"
|
||||
msgstr "Maximum clients"
|
||||
|
||||
msgid "Session timeout (minutes)"
|
||||
msgstr "Session timeout (minutes)"
|
||||
|
||||
msgid "Pre-auth idle timeout (minutes)"
|
||||
msgstr "Pre-auth idle timeout (minutes)"
|
||||
|
||||
msgid "Does not include users on the trusted MAC list"
|
||||
msgstr "Does not include users on the trusted MAC list"
|
||||
|
||||
msgid "Auth idle timeout (minutes)"
|
||||
msgstr "Auth idle timeout (minutes)"
|
||||
|
||||
msgid "Check interval (seconds)"
|
||||
msgstr "Check interval (seconds)"
|
||||
|
||||
msgid "MAC address control"
|
||||
msgstr "MAC address control"
|
||||
|
||||
msgid "MAC mechanism"
|
||||
msgstr "MAC mechanism"
|
||||
|
||||
msgid "Blocked MAC list"
|
||||
msgstr "Blocked MAC list"
|
||||
|
||||
msgid "Trusted MAC list"
|
||||
msgstr "Trusted MAC list"
|
||||
|
||||
msgid "These devices are not subject to authentication or firewall rules"
|
||||
msgstr "These devices are not subject to authentication or firewall rules"
|
||||
|
||||
msgid "Maximum number of concurrent authenticated users"
|
||||
msgstr "Maximum number of concurrent authenticated users"
|
||||
|
||||
msgid "Default session length in minutes. 0 = unlimited"
|
||||
msgstr "Default session length in minutes. 0 = unlimited"
|
||||
|
||||
msgid "Time before unauthenticated idle users are removed"
|
||||
msgstr "Time before unauthenticated idle users are removed"
|
||||
|
||||
msgid "Time before authenticated idle users are deauthenticated"
|
||||
msgstr "Time before authenticated idle users are deauthenticated"
|
||||
|
||||
msgid "How often to check client timeouts"
|
||||
msgstr "How often to check client timeouts"
|
||||
|
||||
msgid "Block: blocklisted MACs are blocked. Allow: only allowlisted MACs are allowed"
|
||||
msgstr "Block: blocklisted MACs are blocked. Allow: only allowlisted MACs are allowed"
|
||||
|
||||
msgid "Example: <code>00:11:22:33:44:55,AA:BB:CC:DD:EE:FF</code>"
|
||||
msgstr "Example: <code>00:11:22:33:44:55,AA:BB:CC:DD:EE:FF</code>"
|
||||
|
||||
msgid "Comma-separated MAC addresses that bypass authentication entirely"
|
||||
msgstr "Comma-separated MAC addresses that bypass authentication entirely"
|
||||
|
||||
msgid "Block (blocklist mode)"
|
||||
msgstr "Block (blocklist mode)"
|
||||
|
||||
msgid "Allow (allowlist mode)"
|
||||
msgstr "Allow (allowlist mode)"
|
||||
|
||||
msgid "Gateway IP range"
|
||||
msgstr "Gateway IP range"
|
||||
|
||||
msgid "Default: 0.0.0.0/0 (all addresses)"
|
||||
msgstr "Default: 0.0.0.0/0 (all addresses)"
|
||||
|
||||
msgid "Debug level"
|
||||
msgstr "Debug level"
|
||||
|
||||
msgid "Firewall settings"
|
||||
msgstr "Firewall settings"
|
||||
|
||||
msgid "Allow all traffic for authenticated users"
|
||||
msgstr "Allow all traffic for authenticated users"
|
||||
|
||||
msgid "Allow DNS for pre-authenticated users"
|
||||
msgstr "Allow DNS for pre-authenticated users"
|
||||
|
||||
msgid "IP range to manage in CIDR notation. Leave empty for all addresses"
|
||||
msgstr "IP range to manage in CIDR notation. Leave empty for all addresses"
|
||||
|
||||
msgid "Amount of logging detail reported by the nodogsplash.service"
|
||||
msgstr "Amount of logging detail reported by the nodogsplash.service"
|
||||
|
||||
msgid "0 - Errors only"
|
||||
msgstr "0 - Errors only"
|
||||
|
||||
msgid "1 - Errors, warnings, infos"
|
||||
msgstr "1 - Errors, warnings, infos"
|
||||
|
||||
msgid "2 - Errors, warnings, infos, verbose"
|
||||
msgstr "2 - Errors, warnings, infos, verbose"
|
||||
|
||||
msgid "3 - Errors, warnings, infos, verbose, debug"
|
||||
msgstr "3 - Errors, warnings, infos, verbose, debug"
|
||||
|
||||
msgid "When enabled, authenticated users have unrestricted access"
|
||||
msgstr "When enabled, authenticated users have unrestricted access"
|
||||
|
||||
msgid "Required for clients to resolve domain names before authentication"
|
||||
msgstr "Required for clients to resolve domain names before authentication"
|
||||
|
||||
msgid "Portal status"
|
||||
msgstr "Portal status"
|
||||
|
||||
msgid "Current <code>nodogsplash</code> status is displayed below."
|
||||
msgstr "Current <code>nodogsplash</code> status is displayed below."
|
||||
|
||||
|
||||
Binary file not shown.
File diff suppressed because it is too large
Load Diff
Binary file not shown.
File diff suppressed because it is too large
Load Diff
Binary file not shown.
File diff suppressed because it is too large
Load Diff
Binary file not shown.
File diff suppressed because it is too large
Load Diff
Binary file not shown.
@@ -3,7 +3,7 @@ msgstr ""
|
||||
"Project-Id-Version: raspap\n"
|
||||
"Report-Msgid-Bugs-To: Bill Zimmerman <billzimmerman@gmail.com>\n"
|
||||
"POT-Creation-Date: 2017-10-19 08:56+0000\n"
|
||||
"PO-Revision-Date: 2024-11-14 10:23\n"
|
||||
"PO-Revision-Date: 2025-07-03 05:44\n"
|
||||
"Last-Translator: Bill Zimmerman <billzimmerman@gmail.com>\n"
|
||||
"Language-Team: Korean\n"
|
||||
"Language: ko_KR\n"
|
||||
@@ -24,8 +24,8 @@ msgstr "RaspAP WiFi 환경설정 포탈"
|
||||
msgid "Toggle navigation"
|
||||
msgstr "토글 내비게이션"
|
||||
|
||||
msgid "RaspAP Wifi Portal"
|
||||
msgstr "RaspAP WiFi 포탈"
|
||||
msgid "RaspAP Admin Panel"
|
||||
msgstr "RaspAP 관리자 패널"
|
||||
|
||||
msgid "Dashboard"
|
||||
msgstr "대시보드 "
|
||||
@@ -294,8 +294,8 @@ msgstr "주파수 "
|
||||
msgid "Link Quality"
|
||||
msgstr "링크 품질 "
|
||||
|
||||
msgid "Information provided by ip and iw and from system"
|
||||
msgstr "ip 및 iw, 시스템에서 제공한 정보"
|
||||
msgid "Information provided by raspap.system"
|
||||
msgstr "raspap.system에서 제공한 정보"
|
||||
|
||||
msgid "No MAC Address Found"
|
||||
msgstr "MAC 주소를 찾을 수 없습니다"
|
||||
@@ -333,6 +333,9 @@ msgstr "연결된 디바이스 "
|
||||
msgid "Client: Ethernet cable"
|
||||
msgstr "클라이언트: 이더넷 케이블"
|
||||
|
||||
msgid "Current status"
|
||||
msgstr "현재 상태"
|
||||
|
||||
msgid "Ethernet"
|
||||
msgstr "이더넷"
|
||||
|
||||
@@ -345,6 +348,43 @@ msgstr "스마트폰"
|
||||
msgid "WiFi"
|
||||
msgstr "WiFi"
|
||||
|
||||
msgid "Repeater"
|
||||
msgstr "리피터"
|
||||
|
||||
msgid "Tethering"
|
||||
msgstr "테더링"
|
||||
|
||||
msgid "Cellular"
|
||||
msgstr "셀룰러"
|
||||
|
||||
msgid "AP"
|
||||
msgstr "AP(Access Point)"
|
||||
|
||||
msgid "Bridged"
|
||||
msgstr "브릿지"
|
||||
|
||||
msgid "Adblock"
|
||||
msgstr "광고차단(adblock)"
|
||||
|
||||
msgid "VPN"
|
||||
msgstr "VPN"
|
||||
|
||||
msgid "Netmask"
|
||||
msgstr "넷마스크"
|
||||
|
||||
msgid "5G"
|
||||
msgstr "5G"
|
||||
|
||||
msgid "2.4G"
|
||||
msgstr "2.4G"
|
||||
|
||||
msgid "%d WLAN %s"
|
||||
msgstr "%d WLAN %s"
|
||||
|
||||
msgid "client"
|
||||
msgid_plural "clients"
|
||||
msgstr[0] "클라이언트"
|
||||
|
||||
msgid "Mobile Data Client"
|
||||
msgstr "모바일 데이터 클라이언트"
|
||||
|
||||
@@ -387,6 +427,19 @@ msgstr "클라이언트 장치가 없거나 아직 구성되지 않았습니다.
|
||||
msgid "No Client device found"
|
||||
msgstr "클라이언트 장치가 발견되지 않았습니다."
|
||||
|
||||
#: includes/footer.php
|
||||
msgid "Created by the <a href=\"%s\" target=\"_blank\" rel=\"noopener\">%s</a>"
|
||||
msgstr "<a href=\"%s\" target=\"_blank\" rel=\"noopener\">%s</a>에 의해 생성됨"
|
||||
|
||||
msgid "RaspAP Team"
|
||||
msgstr "RaspAP 팀"
|
||||
|
||||
msgid "Get Insiders"
|
||||
msgstr "인사이더 받기"
|
||||
|
||||
msgid "Thanks for being an Insider"
|
||||
msgstr "인사이더가 되어 주셔서 감사합니다"
|
||||
|
||||
#: includes/dhcp.php
|
||||
msgid "DHCP server settings"
|
||||
msgstr "DHCP 서버 설정 "
|
||||
@@ -1120,6 +1173,81 @@ msgstr "로그 크기 제한을 %s KB로 변경 중입니다."
|
||||
msgid "Information provided by raspap.sysinfo"
|
||||
msgstr "raspap.sysinfo에서 제공된 정보"
|
||||
|
||||
msgid "The following user plugins are available to extend RaspAP's functionality."
|
||||
msgstr "다음 사용자 플러그인을 통해 RaspAP의 기능을 확장할 수 있습니다."
|
||||
|
||||
msgid "Choose <strong>Details</strong> for more information and to install a plugin."
|
||||
msgstr "자세한 정보 확인 및 플러그인 설치를 위해 <strong>자세히</strong>를 선택하세요."
|
||||
|
||||
msgid "Network error"
|
||||
msgstr "네트워크 오류"
|
||||
|
||||
msgid "Unable to load plugins"
|
||||
msgstr "플러그인을 불러올 수 없습니다"
|
||||
|
||||
msgid "Reload"
|
||||
msgstr "새로고침"
|
||||
|
||||
msgid "and try again"
|
||||
msgstr "다시 시도하세요"
|
||||
|
||||
msgid "Plugins"
|
||||
msgstr "플러그인"
|
||||
|
||||
msgid "Plugin details"
|
||||
msgstr "플러그인 세부정보"
|
||||
|
||||
msgid "Name"
|
||||
msgstr "이름"
|
||||
|
||||
msgid "Version"
|
||||
msgstr "버전"
|
||||
|
||||
msgid "Description"
|
||||
msgstr "설명"
|
||||
|
||||
msgid "Plugin source"
|
||||
msgstr "플러그인 소스"
|
||||
|
||||
msgid "Author"
|
||||
msgstr "작성자"
|
||||
|
||||
msgid "License"
|
||||
msgstr "라이선스"
|
||||
|
||||
msgid "Language locale"
|
||||
msgstr "언어 로케일"
|
||||
|
||||
msgid "Configuration files"
|
||||
msgstr "구성 파일"
|
||||
|
||||
msgid "Dependencies"
|
||||
msgstr "종속성"
|
||||
|
||||
msgid "Permissions"
|
||||
msgstr "권한"
|
||||
|
||||
msgid "Non-privileged users"
|
||||
msgstr "비권한 사용자"
|
||||
|
||||
msgid "Install now"
|
||||
msgstr "지금 설치하기"
|
||||
|
||||
msgid "Installing plugin"
|
||||
msgstr "플러그인 설치 중"
|
||||
|
||||
msgid "Plugin installation in progress..."
|
||||
msgstr "플러그인 설치 진행 중..."
|
||||
|
||||
msgid "Plugin install completed."
|
||||
msgstr "플러그인 설치가 완료되었습니다."
|
||||
|
||||
msgid "Details"
|
||||
msgstr "자세히"
|
||||
|
||||
msgid "Installed"
|
||||
msgstr "설치됨"
|
||||
|
||||
#: includes/data_usage.php
|
||||
msgid "Data usage"
|
||||
msgstr "데이터 사용량 "
|
||||
@@ -1422,14 +1550,14 @@ msgstr "WireGuard 구성(config) 업로드"
|
||||
msgid "This option uploads and installs an existing WireGuard <code>.conf</code> file on this device."
|
||||
msgstr "이 옵션은 이 장치에 기존 WireGuard <code>.conf</code> 파일을 업로드하고 설치합니다"
|
||||
|
||||
msgid "Apply iptables rules for AP interface"
|
||||
msgstr "AP 인터페이스에 iptables 규칙 적용"
|
||||
msgid "Apply iptables rules to the selected interface"
|
||||
msgstr "선택한 인터페이스에 iptables 규칙 적용"
|
||||
|
||||
msgid "Recommended if you wish to forward network traffic from the wg0 interface to clients connected on the AP interface."
|
||||
msgstr "wg0 인터페이스에서 AP 인터페이스에 연결된 클라이언트로 네트워크 트래픽을 전달하려는 경우에 권장됩니다."
|
||||
msgid "Recommended if you wish to forward network traffic from the wg0 interface to clients connected on a desired interface. The active AP interface is the default."
|
||||
msgstr "wg0 인터페이스에서 원하는 인터페이스에 연결된 클라이언트로 네트워크 트래픽을 포워딩하려는 경우에 권장됩니다. 기본값은 활성화된 AP 인터페이스입니다."
|
||||
|
||||
msgid "This option adds <strong>iptables</strong> <code>Postup</code> and <code>PostDown</code> rules for the configured AP interface (%s)."
|
||||
msgstr "이 옵션은 구성된 AP 인터페이스(%s) 에 대한 <strong>iptables</strong> <code>Postup</code> 및 <code>PostDown</code> 규칙을 추가합니다."
|
||||
msgid "This option adds <strong>iptables</strong> <code>Postup</code> and <code>PostDown</code> rules for the interface selected below."
|
||||
msgstr "이 옵션은 아래에서 선택한 인터페이스에 대해 <strong>iptables</strong> <code>Postup</code> 및 <code>PostDown</code> 규칙을 추가합니다."
|
||||
|
||||
msgid "Select WireGuard configuration file (.conf)"
|
||||
msgstr "WireGuard 구성 파일(.conf) 선택"
|
||||
@@ -1521,8 +1649,8 @@ msgstr "WireGuard 구성을 업데이트하지 못했습니다."
|
||||
msgid "Enable kill switch"
|
||||
msgstr "킬 스위치 활성화"
|
||||
|
||||
msgid "This option adds <strong>iptables</strong> <code>PostUp</code> and <code>PreDown</code> rules for the configured AP interface (%s)."
|
||||
msgstr "이 옵션은 구성된 AP 인터페이스(%s) 에 대해 <strong>iptables</strong> <code>PostUp</code> 및 <code>PreDown</code> 규칙을 추가합니다."
|
||||
msgid "This option adds <strong>iptables</strong> <code>PostUp</code> and <code>PreDown</code> rules for the configured interface."
|
||||
msgstr "이 옵션은 구성된 인터페이스에 대해 <strong>iptables</strong> <code>PostUp</code> 및 <code>PreDown</code> 규칙을 추가합니다."
|
||||
|
||||
msgid "Recommended if you wish to prevent the flow of unencrypted packets through non-WireGuard interfaces."
|
||||
msgstr "WireGuard 인터페이스가 아닌 다른 인터페이스를 통한 암호화되지 않은 패킷 흐름을 방지하려는 경우 권장됩니다."
|
||||
@@ -1605,6 +1733,12 @@ msgstr "방화벽 비활성화"
|
||||
msgid "Enable Firewall"
|
||||
msgstr "방화벽 활성화"
|
||||
|
||||
msgid "Changing the firewall status may disrupt or allow incoming traffic. Choose <strong>Proceed</strong> to continue."
|
||||
msgstr "방화벽 상태를 변경하면 수신 트래픽이 차단되거나 허용될 수 있습니다. 계속하려면 <strong>계속</strong>을 선택하세요."
|
||||
|
||||
msgid "Proceed"
|
||||
msgstr "진행"
|
||||
|
||||
msgid "Apply changes"
|
||||
msgstr "변경 사항을 적용합니다"
|
||||
|
||||
@@ -1848,6 +1982,24 @@ msgstr "restapi.service를 재시작하는 중입니다."
|
||||
msgid "Information provided by restapi.service"
|
||||
msgstr "restapi.service에서 제공한 정보"
|
||||
|
||||
msgid "Session Expired"
|
||||
msgstr "세션 만료됨"
|
||||
|
||||
msgid "Your session has expired. Please login to continue."
|
||||
msgstr "세션이 만료되었습니다. 계속하려면 로그인해 주세요."
|
||||
|
||||
msgid "Login"
|
||||
msgstr "로그인"
|
||||
|
||||
msgid "Administrator login"
|
||||
msgstr "관리자 로그인"
|
||||
|
||||
msgid "Forgot password"
|
||||
msgstr "비밀번호 찾기"
|
||||
|
||||
msgid "Login failed"
|
||||
msgstr "로그인 실패"
|
||||
|
||||
msgid "NTP Server"
|
||||
msgstr "NTP 서버"
|
||||
|
||||
@@ -1911,3 +2063,186 @@ msgstr "NTP 구성을 %s에서 찾을 수 없습니다."
|
||||
msgid "NTP configuration updated"
|
||||
msgstr "NTP 구성이 업데이트되었습니다."
|
||||
|
||||
msgid "Advertising device as a Tailscale exit node"
|
||||
msgstr "Tailscale 종료 노드로 디바이스 광고 중"
|
||||
|
||||
msgid "Attempting to optimize UDP throughput"
|
||||
msgstr "UDP 처리량 최적화를 시도하는 중"
|
||||
|
||||
msgid "Kernel transport layer offloads enabled for UDP"
|
||||
msgstr "UDP에 대해 커널 전송 계층 오프로딩이 활성화됨"
|
||||
|
||||
msgid "Failed to enable kernel transport layer offloads for UDP"
|
||||
msgstr "UDP에 대한 커널 전송 계층 오프로딩을 활성화하지 못했습니다"
|
||||
|
||||
msgid "Attempting to set tailscale up"
|
||||
msgstr "Tailscale 설정을 시도하는 중"
|
||||
|
||||
msgid "Attempting to set tailscale down"
|
||||
msgstr "Tailscale 비활성화를 시도하는 중"
|
||||
|
||||
msgid "Attempting to disconnect from tailscale"
|
||||
msgstr "Tailscale 연결 해제를 시도하는 중"
|
||||
|
||||
msgid "Disconnected from tailscale and expired node key"
|
||||
msgstr "Tailscale에서 연결이 해제되었으며 노드 키가 만료되었습니다"
|
||||
|
||||
msgid "Unable to disconnect from tailscale"
|
||||
msgstr "Tailscale에서 연결을 해제할 수 없습니다"
|
||||
|
||||
msgid "Expected tailscale binary not found at: %"
|
||||
msgstr "예상된 Tailscale 바이너리가 다음 위치에 없습니다: %"
|
||||
|
||||
msgid "A Tailscale VPN exit node extension for RaspAP"
|
||||
msgstr "RaspAP용 Tailscale VPN 종료 노드 확장 프로그램"
|
||||
|
||||
msgid "Unable to retrieve Tailscale login. Choose <strong>%s</strong> to continue."
|
||||
msgstr "Tailscale 로그인 정보를 가져올 수 없습니다. 계속하려면 <strong>%s</strong>을 선택하세요."
|
||||
|
||||
msgid "Start Tailscale"
|
||||
msgstr "Tailscale 시작"
|
||||
|
||||
msgid "Stop Tailscale"
|
||||
msgstr "Tailscale 중지"
|
||||
|
||||
msgid "Next"
|
||||
msgstr "다음"
|
||||
|
||||
msgid "Device approved and activated as a Tailscale exit node"
|
||||
msgstr "디바이스가 승인되어 Tailscale 종료 노드로 활성화되었습니다"
|
||||
|
||||
msgid "Not connected: Login required."
|
||||
msgstr "연결되지 않음: 로그인 필요."
|
||||
|
||||
msgid "Tailscale VPN"
|
||||
msgstr "Tailscale VPN"
|
||||
|
||||
msgid "Exit node activated"
|
||||
msgstr "출구 노드가 활성화되었습니다"
|
||||
|
||||
msgid "The device <code>%s</code> is connected with the address <code>%s</code> and offers an <strong>exit node</strong>."
|
||||
msgstr "디바이스 <code>%s</code>는 주소 <code>%s</code>로 연결되어 있으며 <strong>출구 노드</strong>를 제공합니다."
|
||||
|
||||
msgid "See the %s on how to use this exit node with your devices."
|
||||
msgstr "이 출구 노드를 디바이스와 함께 사용하는 방법은 %s를 참조하세요."
|
||||
|
||||
msgid "Allow exit node"
|
||||
msgstr "출구 노드 허용"
|
||||
|
||||
msgid "The device <code>%s</code> is pending approval as an exit node."
|
||||
msgstr "디바이스 <code>%s</code>는 출구 노드로 승인 대기 중입니다."
|
||||
|
||||
msgid "Locate the <code>%s</code> <strong>Exit Node</strong> badge in the machines list."
|
||||
msgstr "머신 목록에서 <code>%s</code> <strong>출구 노드</strong> 배지(badge)를 찾으세요."
|
||||
|
||||
msgid "Open Tailscale Machines"
|
||||
msgstr "Tailscale 머신 열기"
|
||||
|
||||
msgid "To allow this device as an exit node, choose <strong>Open Tailscale Machines</strong>."
|
||||
msgstr "이 디바이스를 출구 노드로 허용하려면 <strong>Tailscale 머신 열기</strong>를 선택하세요."
|
||||
|
||||
msgid "From the %s icon menu of the exit node, open the %s panel."
|
||||
msgstr "출구 노드의 %s 아이콘 메뉴에서 %s 패널을 여세요."
|
||||
|
||||
msgid "Edit route settings"
|
||||
msgstr "라우팅 설정 편집"
|
||||
|
||||
msgid "Login to Tailscale"
|
||||
msgstr "Tailscale에 로그인"
|
||||
|
||||
msgid "To connect device %s to your tailnet, choose %s."
|
||||
msgstr "디바이스 %s를 tailnet에 연결하려면 %s를 선택하세요."
|
||||
|
||||
msgid "After logging in, choose <strong>Next</strong> to continue."
|
||||
msgstr "로그인 후, 계속하려면 <strong>다음</strong>을 선택하세요."
|
||||
|
||||
msgid "Configure exit node"
|
||||
msgstr "출구 노드 구성"
|
||||
|
||||
msgid "The device <code>%s</code> is connected to your tailnet with the address <code>%s</code>."
|
||||
msgstr "디바이스 <code>%s</code>는 주소 <code>%s</code>로 tailnet에 연결되어 있습니다."
|
||||
|
||||
msgid "By default, Tailscale only routes traffic between the devices on which it's been installed. You can also route all your public internet traffic by configuring a device on your network as a <strong>exit node</strong>"
|
||||
msgstr "기본적으로 Tailscale은 설치된 디바이스 간의 트래픽만 라우팅합니다. 네트워크의 디바이스를 <strong>출구 노드</strong>로 구성하면 모든 공용 인터넷 트래픽도 라우팅할 수 있습니다"
|
||||
|
||||
msgid "When you route all traffic through an exit node, you're effectively using default routes (0.0.0.0/0, ::/0), similar to how you would if you were using a typical VPN."
|
||||
msgstr "모든 트래픽을 출구 노드를 통해 라우팅하면, 일반적인 VPN을 사용할 때처럼 기본 경로(0.0.0.0/0, ::/0)를 사용하는 것과 동일한 방식으로 동작하게 됩니다."
|
||||
|
||||
msgid "You have the option of configuring this device as an exit node, or using another exit node in your tailnet."
|
||||
msgstr "이 디바이스를 출구 노드로 구성하거나, tailnet 내의 다른 출구 노드를 사용할 수 있습니다."
|
||||
|
||||
msgid "Select an existing exit node on your tailnet"
|
||||
msgstr "tailnet에서 기존 출구 노드를 선택하세요"
|
||||
|
||||
msgid "This is a typical configuration if you're using this device as a VPN travel router, for example."
|
||||
msgstr "예를 들어 이 디바이스를 VPN 여행 라우터로 사용할 경우, 이는 일반적인 구성입니다."
|
||||
|
||||
msgid "Configure this device as a new exit node"
|
||||
msgstr "이 디바이스를 새로운 출구 노드로 구성하세요"
|
||||
|
||||
msgid "By configuring this device as an exit node, public internet traffic from devices connected in your tailnet will be routed through it."
|
||||
msgstr "이 디바이스를 출구 노드로 구성하면, tailnet에 연결된 디바이스의 공용 인터넷 트래픽이 이 디바이스를 통해 라우팅됩니다."
|
||||
|
||||
msgid "For security reasons, you must opt in to enable exit node functionality. The first step is to advertise <code>%s</code> as an exit node in your tailnet. In the next step, you'll allow this device to be an exit node."
|
||||
msgstr "보안상의 이유로 출구 노드 기능을 활성화하려면 사용자가 직접 동의해야 합니다. 첫 번째 단계는 <code>%s</code>를 tailnet에서 출구 노드로 광고하는 것입니다. 다음 단계에서는 이 디바이스를 출구 노드로 허용하게 됩니다."
|
||||
|
||||
msgid "Advertise <code>%s</code> as an exit node"
|
||||
msgstr "<code>%s</code>를 출구 노드로 광고"
|
||||
|
||||
msgid "This effectively configures Tailscale as a VPN to mask your real location, access region-restricted content, or enhance privacy when connecting from untrusted networks."
|
||||
msgstr "이는 Tailscale을 VPN으로 구성하여 실제 위치를 숨기거나, 지역 제한 콘텐츠에 접근하거나, 신뢰되지 않은 네트워크에서 연결할 때 프라이버시를 강화하는 데 효과적입니다."
|
||||
|
||||
msgid "This option lets Tailscale know your device is ready to route traffic."
|
||||
msgstr "이 옵션은 Tailscale에 디바이스가 트래픽을 라우팅할 준비가 되었음을 알립니다."
|
||||
|
||||
msgid "Recommended for Tailscale exit nodes with Linux 6.2 or later kernels, this uses UDP generic receive offload (GRO) forwarding to reduce CPU overhead."
|
||||
msgstr "Linux 6.2 이상 커널을 사용하는 Tailscale 출구 노드에 권장되며, UDP 일반 수신 오프로딩(GRO) 포워딩을 사용하여 CPU 부하를 줄입니다."
|
||||
|
||||
msgid "This option enables transport layer offloads for better performance."
|
||||
msgstr "이 옵션은 더 나은 성능을 위해 전송 계층 오프로딩을 활성화합니다."
|
||||
|
||||
msgid "Select an exit node"
|
||||
msgstr "출구 노드를 선택하세요"
|
||||
|
||||
msgid "To use <code>%s</code> as a VPN gateway, configure Tailscale to use an exit node. Tailscale's suggested node is indicated with a star."
|
||||
msgstr "<code>%s</code>를 VPN 게이트웨이로 사용하려면, Tailscale에서 출구 노드를 사용하도록 구성하세요. Tailscale이 추천하는 노드는 별표로 표시됩니다."
|
||||
|
||||
msgid "Advertise a <strong>subnet route</strong> for the active <code>%s</code> AP interface"
|
||||
msgstr "활성화된 <code>%s</code> AP 인터페이스에 대해 <strong>서브넷 라우트</strong>를 광고하세요"
|
||||
|
||||
msgid "Subnet routes let you extend your Tailscale network (known as a tailnet) to include devices that don't or can't run the Tailscale client."
|
||||
msgstr "서브넷 라우트를 사용하면 Tailscale 네트워크(즉, tailnet)를 Tailscale 클라이언트를 실행할 수 없거나 실행하지 않는 디바이스까지 확장할 수 있습니다."
|
||||
|
||||
msgid "A subnet route acts as a gateway between your tailnet and a physical subnet. The subnet of the active AP interface is preconfigured below; edit if necessary."
|
||||
msgstr "서브넷 라우트는 tailnet과 물리적 서브넷 간의 게이트웨이 역할을 합니다. 활성화된 AP 인터페이스의 서브넷이 아래에 미리 구성되어 있으며, 필요에 따라 수정할 수 있습니다."
|
||||
|
||||
msgid "Route LAN traffic through the exit node."
|
||||
msgstr "LAN 트래픽을 출구 노드를 통해 라우팅하세요."
|
||||
|
||||
msgid "This will direct all LAN traffic to go through your exit node only."
|
||||
msgstr "이 설정은 모든 LAN 트래픽을 출구 노드를 통해서만 전달하도록 합니다."
|
||||
|
||||
msgid "Choose <strong>Next</strong> to configure <code>%s</code> to use the selected exit node."
|
||||
msgstr "선택한 출구 노드를 사용하도록 <code>%s</code>를 구성하려면 <strong>다음</strong>을 선택하세요."
|
||||
|
||||
msgid "No exit nodes found on your tailnet. Choose <strong>Back</strong> to continue."
|
||||
msgstr "tailnet에서 출구 노드를 찾을 수 없습니다. 계속하려면 <strong>뒤로</strong>를 선택하세요."
|
||||
|
||||
msgid "Using exit node"
|
||||
msgstr "출구 노드 사용 중"
|
||||
|
||||
msgid "The device <code>%s</code> is configured to use exit node <code>%s</code>. It has the Tailscale MagicDNS address <code>%s</code>."
|
||||
msgstr "디바이스 <code>%s</code>는 출구 노드 <code>%s</code>를 사용하도록 구성되어 있습니다. Tailscale MagicDNS 주소는 <code>%s</code>입니다."
|
||||
|
||||
msgid "Choose <strong>Save settings</strong> to continue."
|
||||
msgstr "계속하려면 <strong>설정 저장</strong>을 선택하세요."
|
||||
|
||||
msgid "Choose <strong>Next</strong> to continue."
|
||||
msgstr "계속하려면 <strong>다음</strong>을 선택하세요."
|
||||
|
||||
msgid "Tailnet status"
|
||||
msgstr "Tailnet 상태"
|
||||
|
||||
msgid "Current <code>tailnet</code> status is displayed below."
|
||||
msgstr "현재 <code>tailnet</code> 상태가 아래에 표시됩니다."
|
||||
|
||||
|
||||
Binary file not shown.
File diff suppressed because it is too large
Load Diff
Binary file not shown.
File diff suppressed because it is too large
Load Diff
Binary file not shown.
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user