2015-11-04 10:52:13 +00:00
|
|
|
<?php
|
2017-11-02 14:43:41 +00:00
|
|
|
/* Functions for Networking */
|
|
|
|
|
2021-01-21 11:54:10 +00:00
|
|
|
/**
|
|
|
|
* Get a human readable data size string from a number of bytes.
|
|
|
|
*
|
|
|
|
* @param long $numbytes The number of bytes.
|
|
|
|
* @param int $precision The number of numbers to round to after the dot/comma.
|
|
|
|
* @return string Data size in units: PB, TB, GB, MB or KB otherwise an empty string.
|
|
|
|
*/
|
|
|
|
function getHumanReadableDatasize($numbytes, $precision = 2)
|
|
|
|
{
|
|
|
|
$humanDatasize = '';
|
|
|
|
$kib = 1024;
|
|
|
|
$mib = $kib * 1024;
|
|
|
|
$gib = $mib * 1024;
|
|
|
|
$tib = $gib * 1024;
|
|
|
|
$pib = $tib * 1024;
|
|
|
|
if ($numbytes >= $pib) {
|
|
|
|
$humanDatasize = ' ('.round($numbytes / $pib, $precision).' PB)';
|
|
|
|
} elseif ($numbytes >= $tib) {
|
|
|
|
$humanDatasize = ' ('.round($numbytes / $tib, $precision).' TB)';
|
|
|
|
} elseif ($numbytes >= $gib) {
|
|
|
|
$humanDatasize = ' ('.round($numbytes / $gib, $precision).' GB)';
|
|
|
|
} elseif ($numbytes >= $mib) {
|
|
|
|
$humanDatasize = ' ('.round($numbytes / $mib, $precision).' MB)';
|
|
|
|
} elseif ($numbytes >= $kib) {
|
|
|
|
$humanDatasize = ' ('.round($numbytes / $kib, $precision).' KB)';
|
|
|
|
}
|
|
|
|
|
|
|
|
return $humanDatasize;
|
|
|
|
}
|
|
|
|
|
2020-11-30 12:09:56 +00:00
|
|
|
/**
|
|
|
|
* Converts a netmask to CIDR notation string
|
|
|
|
*
|
|
|
|
* @param string $mask
|
|
|
|
* @return string
|
|
|
|
*/
|
2019-04-10 08:37:35 +00:00
|
|
|
function mask2cidr($mask)
|
|
|
|
{
|
|
|
|
$long = ip2long($mask);
|
|
|
|
$base = ip2long('255.255.255.255');
|
|
|
|
return 32-log(($long ^ $base)+1, 2);
|
2017-11-02 14:43:41 +00:00
|
|
|
}
|
|
|
|
|
2020-11-30 12:09:56 +00:00
|
|
|
/**
|
|
|
|
* Converts a CIDR notation string to a netmask
|
|
|
|
*
|
|
|
|
* @param string $cidr
|
|
|
|
* @return string
|
2020-12-04 14:40:54 +00:00
|
|
|
*/
|
2020-11-30 12:09:56 +00:00
|
|
|
function cidr2mask($cidr)
|
|
|
|
{
|
2023-06-04 14:19:28 +00:00
|
|
|
$ipParts = explode('/', $cidr);
|
|
|
|
$ip = $ipParts[0];
|
|
|
|
$prefixLength = $ipParts[1];
|
|
|
|
|
|
|
|
$ipLong = ip2long($ip);
|
|
|
|
$netmaskLong = bindec(str_pad(str_repeat('1', $prefixLength), 32, '0'));
|
2023-09-03 07:47:51 +00:00
|
|
|
$netmask = long2ip(intval($netmaskLong));
|
2023-06-04 14:19:28 +00:00
|
|
|
|
|
|
|
return $netmask;
|
2020-11-30 12:09:56 +00:00
|
|
|
}
|
|
|
|
|
2020-12-04 14:40:54 +00:00
|
|
|
/**
|
|
|
|
* Removes a dhcp configuration block for the specified interface
|
|
|
|
*
|
|
|
|
* @param string $iface
|
|
|
|
* @param object $status
|
|
|
|
* @return boolean $result
|
|
|
|
*/
|
|
|
|
function removeDHCPConfig($iface,$status)
|
|
|
|
{
|
|
|
|
$dhcp_cfg = file_get_contents(RASPI_DHCPCD_CONFIG);
|
|
|
|
$dhcp_cfg = preg_replace('/^#\sRaspAP\s'.$iface.'\s.*?(?=\s*^\s*$)([\s]+)/ms', '', $dhcp_cfg, 1);
|
|
|
|
file_put_contents("/tmp/dhcpddata", $dhcp_cfg);
|
|
|
|
system('sudo cp /tmp/dhcpddata '.RASPI_DHCPCD_CONFIG, $result);
|
|
|
|
if ($result == 0) {
|
|
|
|
$status->addMessage('DHCP configuration for '.$iface.' removed.', 'success');
|
|
|
|
} else {
|
|
|
|
$status->addMessage('Failed to remove DHCP configuration for '.$iface.'.', 'danger');
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Removes a dhcp configuration block for the specified interface
|
|
|
|
*
|
|
|
|
* @param string $dhcp_cfg
|
|
|
|
* @param string $iface
|
|
|
|
* @return string $dhcp_cfg
|
|
|
|
*/
|
|
|
|
function removeDHCPIface($dhcp_cfg,$iface)
|
|
|
|
{
|
|
|
|
$dhcp_cfg = preg_replace('/^#\sRaspAP\s'.$iface.'\s.*?(?=\s*^\s*$)([\s]+)/ms', '', $dhcp_cfg, 1);
|
|
|
|
return $dhcp_cfg;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Removes a dnsmasq configuration block for the specified interface
|
|
|
|
*
|
|
|
|
* @param string $iface
|
|
|
|
* @param object $status
|
|
|
|
* @return boolean $result
|
|
|
|
*/
|
|
|
|
function removeDnsmasqConfig($iface,$status)
|
|
|
|
{
|
|
|
|
system('sudo rm '.RASPI_DNSMASQ_PREFIX.$iface.'.conf', $result);
|
|
|
|
if ($result == 0) {
|
|
|
|
$status->addMessage('Dnsmasq configuration for '.$iface.' removed.', 'success');
|
|
|
|
} else {
|
|
|
|
$status->addMessage('Failed to remove dnsmasq configuration for '.$iface.'.', 'danger');
|
|
|
|
}
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Scans dnsmasq configuration dir for the specified interface
|
|
|
|
* Non-matching configs are removed, optional adblock.conf is protected
|
|
|
|
*
|
|
|
|
* @param string $dir_conf
|
|
|
|
* @param string $interface
|
|
|
|
* @param object $status
|
|
|
|
*/
|
|
|
|
function scanConfigDir($dir_conf,$interface,$status)
|
|
|
|
{
|
|
|
|
$syscnf = preg_grep('~\.(conf)$~', scandir($dir_conf));
|
2020-12-04 21:41:10 +00:00
|
|
|
foreach ($syscnf as $cnf) {
|
|
|
|
if ($cnf !== '090_adblock.conf' && !preg_match('/.*_'.$interface.'.conf/', $cnf)) {
|
|
|
|
system('sudo rm /etc/dnsmasq.d/'.$cnf, $result);
|
2020-12-04 14:40:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return $status;
|
|
|
|
}
|
|
|
|
|
2020-12-05 09:12:47 +00:00
|
|
|
/**
|
|
|
|
* Returns a default (fallback) value for the selected service, interface & setting
|
|
|
|
* from /etc/raspap/networking/defaults.json
|
|
|
|
*
|
|
|
|
* @param string $svc
|
|
|
|
* @param string $iface
|
|
|
|
* @return string $value
|
|
|
|
*/
|
|
|
|
function getDefaultNetValue($svc,$iface,$key)
|
|
|
|
{
|
|
|
|
$json = json_decode(file_get_contents(RASPI_CONFIG_NETWORK), true);
|
|
|
|
if ($json === null) {
|
|
|
|
return false;
|
|
|
|
} else {
|
|
|
|
return $json[$svc][$iface][$key][0];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-24 12:29:52 +00:00
|
|
|
/**
|
|
|
|
* Returns default options for the specified service
|
|
|
|
*
|
|
|
|
* @param string $svc
|
2021-04-20 14:19:00 +00:00
|
|
|
* @param string $key
|
2020-12-24 12:29:52 +00:00
|
|
|
* @return object $json
|
|
|
|
*/
|
2021-04-20 14:19:00 +00:00
|
|
|
function getDefaultNetOpts($svc,$key)
|
2020-12-24 12:29:52 +00:00
|
|
|
{
|
|
|
|
$json = json_decode(file_get_contents(RASPI_CONFIG_NETWORK), true);
|
|
|
|
if ($json === null) {
|
|
|
|
return false;
|
|
|
|
} else {
|
2021-04-20 14:19:00 +00:00
|
|
|
return $json[$svc][$key];
|
2020-12-24 12:29:52 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-10-12 17:21:23 +00:00
|
|
|
/**
|
|
|
|
* Returns a value for the specified VPN provider
|
|
|
|
*
|
|
|
|
* @param numeric $id
|
|
|
|
* @param string $key
|
|
|
|
* @return object $json
|
|
|
|
*/
|
|
|
|
function getProviderValue($id,$key)
|
|
|
|
{
|
|
|
|
$obj = json_decode(file_get_contents(RASPI_CONFIG_PROVIDERS), true);
|
|
|
|
if ($obj === null) {
|
|
|
|
return false;
|
|
|
|
} else {
|
|
|
|
$id--;
|
|
|
|
return $obj['providers'][$id][$key];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-02 14:43:41 +00:00
|
|
|
/* Functions to write ini files */
|
|
|
|
|
2021-01-21 11:54:10 +00:00
|
|
|
/**
|
|
|
|
* Writes a configuration to an .ini file
|
|
|
|
*
|
|
|
|
* @param array $array
|
|
|
|
* @param string $file
|
|
|
|
* @return boolean
|
|
|
|
*/
|
2019-04-10 08:37:35 +00:00
|
|
|
function write_php_ini($array, $file)
|
|
|
|
{
|
2017-11-02 14:43:41 +00:00
|
|
|
$res = array();
|
2019-04-10 08:37:35 +00:00
|
|
|
foreach ($array as $key => $val) {
|
|
|
|
if (is_array($val)) {
|
2017-11-02 14:43:41 +00:00
|
|
|
$res[] = "[$key]";
|
2019-04-10 08:37:35 +00:00
|
|
|
foreach ($val as $skey => $sval) {
|
2019-04-30 22:57:12 +00:00
|
|
|
$res[] = "$skey = $sval";
|
2019-04-10 08:37:35 +00:00
|
|
|
}
|
|
|
|
} else {
|
2019-04-30 22:36:35 +00:00
|
|
|
$res[] = "$key = $val";
|
2017-11-02 14:43:41 +00:00
|
|
|
}
|
|
|
|
}
|
2019-04-30 22:18:44 +00:00
|
|
|
if (safefilerewrite($file, implode(PHP_EOL, $res))) {
|
2017-11-02 14:43:41 +00:00
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-21 11:54:10 +00:00
|
|
|
/**
|
|
|
|
* Writes to a file without conflicts
|
|
|
|
*
|
|
|
|
* @param string $fileName
|
|
|
|
* @param string $dataToSave
|
|
|
|
* @return boolean
|
|
|
|
*/
|
2019-04-10 08:37:35 +00:00
|
|
|
function safefilerewrite($fileName, $dataToSave)
|
|
|
|
{
|
2017-11-02 14:43:41 +00:00
|
|
|
if ($fp = fopen($fileName, 'w')) {
|
2019-04-10 08:37:35 +00:00
|
|
|
$startTime = microtime(true);
|
2017-11-02 14:43:41 +00:00
|
|
|
do {
|
|
|
|
$canWrite = flock($fp, LOCK_EX);
|
|
|
|
// If lock not obtained sleep for 0 - 100 milliseconds, to avoid collision and CPU load
|
2019-04-10 08:37:35 +00:00
|
|
|
if (!$canWrite) {
|
|
|
|
usleep(round(rand(0, 100)*1000));
|
|
|
|
}
|
|
|
|
} while ((!$canWrite)and((microtime(true)-$startTime) < 5));
|
2017-11-02 14:43:41 +00:00
|
|
|
|
|
|
|
//file was locked so now we can store information
|
|
|
|
if ($canWrite) {
|
2019-04-30 22:57:12 +00:00
|
|
|
fwrite($fp, $dataToSave.PHP_EOL);
|
2017-11-02 14:43:41 +00:00
|
|
|
flock($fp, LOCK_UN);
|
|
|
|
}
|
|
|
|
fclose($fp);
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-06 11:03:30 +00:00
|
|
|
/**
|
|
|
|
* Prepends data to a file if not exists
|
|
|
|
*
|
|
|
|
* @param string $filename
|
|
|
|
* @param string $dataToSave
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
function file_prepend_data($filename, $dataToSave)
|
|
|
|
{
|
|
|
|
$context = stream_context_create();
|
|
|
|
$file = fopen($filename, 'r', 1, $context);
|
|
|
|
$file_data = readfile($file);
|
|
|
|
|
|
|
|
if (!preg_match('/^'.$dataToSave.'/', $file_data)) {
|
|
|
|
$tmp_file = tempnam(sys_get_temp_dir(), 'php_prepend_');
|
|
|
|
file_put_contents($tmp_file, $dataToSave);
|
|
|
|
file_put_contents($tmp_file, $file, FILE_APPEND);
|
|
|
|
fclose($file);
|
|
|
|
unlink($filename);
|
|
|
|
rename($tmp_file, $filename);
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-07 11:53:57 +00:00
|
|
|
/**
|
|
|
|
* Fetches a meta value from a file
|
|
|
|
*
|
|
|
|
* @param string $filename
|
|
|
|
* @param string $pattern
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
function file_get_meta($filename, $pattern)
|
|
|
|
{
|
|
|
|
if(file_exists($filename)) {
|
|
|
|
$context = stream_context_create();
|
|
|
|
$file_data = file_get_contents($filename, false, $context);
|
|
|
|
preg_match('/^'.$pattern.'/', $file_data, $matched);
|
|
|
|
return $matched[1];
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-06 11:03:30 +00:00
|
|
|
/**
|
|
|
|
* Callback function for array_filter
|
|
|
|
*
|
|
|
|
* @param string $var
|
|
|
|
* @return filtered value
|
|
|
|
*/
|
|
|
|
function filter_comments($var)
|
|
|
|
{
|
|
|
|
return $var[0] != '#';
|
|
|
|
}
|
|
|
|
|
2019-07-30 15:38:33 +00:00
|
|
|
/**
|
2020-02-15 17:57:46 +00:00
|
|
|
* Saves a CSRF token in the session
|
|
|
|
*/
|
2019-07-30 15:38:33 +00:00
|
|
|
function ensureCSRFSessionToken()
|
|
|
|
{
|
2019-08-19 02:12:37 +00:00
|
|
|
if (empty($_SESSION['csrf_token'])) {
|
|
|
|
$_SESSION['csrf_token'] = bin2hex(random_bytes(32));
|
|
|
|
}
|
2019-07-30 15:38:33 +00:00
|
|
|
}
|
|
|
|
|
2016-06-24 21:39:39 +00:00
|
|
|
/**
|
2020-02-15 17:57:46 +00:00
|
|
|
* Add CSRF Token to form
|
|
|
|
*/
|
2019-08-01 11:07:27 +00:00
|
|
|
function CSRFTokenFieldTag()
|
2019-04-10 08:37:35 +00:00
|
|
|
{
|
2019-08-01 11:01:03 +00:00
|
|
|
$token = htmlspecialchars($_SESSION['csrf_token']);
|
2019-08-01 11:11:07 +00:00
|
|
|
return '<input type="hidden" name="csrf_token" value="' . $token . '">';
|
2016-06-24 21:39:39 +00:00
|
|
|
}
|
|
|
|
|
2019-07-30 15:22:03 +00:00
|
|
|
/**
|
2020-02-15 17:57:46 +00:00
|
|
|
* Retuns a CSRF meta tag (for use with xhr, for example)
|
|
|
|
*/
|
2019-07-30 15:22:03 +00:00
|
|
|
function CSRFMetaTag()
|
|
|
|
{
|
|
|
|
$token = htmlspecialchars($_SESSION['csrf_token']);
|
|
|
|
return '<meta name="csrf_token" content="' . $token . '">';
|
|
|
|
}
|
|
|
|
|
2016-06-24 21:39:39 +00:00
|
|
|
/**
|
2020-02-15 17:57:46 +00:00
|
|
|
* Validate CSRF Token
|
|
|
|
*/
|
2019-04-10 08:37:35 +00:00
|
|
|
function CSRFValidate()
|
|
|
|
{
|
2023-09-06 07:54:20 +00:00
|
|
|
if(isset($_POST['csrf_token'])) {
|
|
|
|
$post_token = $_POST['csrf_token'];
|
|
|
|
$header_token = $_SERVER['HTTP_X_CSRF_TOKEN'];
|
2019-07-30 15:28:03 +00:00
|
|
|
|
2023-09-06 07:54:20 +00:00
|
|
|
if (empty($post_token) && empty($header_token)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$request_token = $post_token;
|
|
|
|
if (empty($post_token)) {
|
|
|
|
$request_token = $header_token;
|
|
|
|
}
|
|
|
|
if (hash_equals($_SESSION['csrf_token'], $request_token)) {
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
error_log('CSRF violation');
|
|
|
|
return false;
|
|
|
|
}
|
2019-04-10 08:37:35 +00:00
|
|
|
}
|
2016-06-24 21:39:39 +00:00
|
|
|
}
|
|
|
|
|
2019-07-30 15:05:00 +00:00
|
|
|
/**
|
2020-02-15 17:57:46 +00:00
|
|
|
* Should the request be CSRF-validated?
|
|
|
|
*/
|
2019-07-30 15:05:00 +00:00
|
|
|
function csrfValidateRequest()
|
|
|
|
{
|
2019-09-07 15:42:31 +00:00
|
|
|
$request_method = strtolower($_SERVER['REQUEST_METHOD']);
|
|
|
|
return in_array($request_method, [ "post", "put", "patch", "delete" ]);
|
2019-07-30 15:05:00 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 17:57:46 +00:00
|
|
|
* Handle invalid CSRF
|
|
|
|
*/
|
2019-07-30 15:05:00 +00:00
|
|
|
function handleInvalidCSRFToken()
|
|
|
|
{
|
|
|
|
header('HTTP/1.1 500 Internal Server Error');
|
|
|
|
header('Content-Type: text/plain');
|
|
|
|
echo 'Invalid CSRF token';
|
|
|
|
exit;
|
|
|
|
}
|
|
|
|
|
2016-08-05 14:50:05 +00:00
|
|
|
/**
|
2020-02-15 17:57:46 +00:00
|
|
|
* Test whether array is associative
|
|
|
|
*/
|
2019-04-10 08:37:35 +00:00
|
|
|
function isAssoc($arr)
|
|
|
|
{
|
|
|
|
return array_keys($arr) !== range(0, count($arr) - 1);
|
2016-08-05 14:50:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 17:57:46 +00:00
|
|
|
* Display a selector field for a form. Arguments are:
|
|
|
|
*
|
|
|
|
* @param string $name: Field name
|
|
|
|
* @param array $options: Array of options
|
|
|
|
* @param string $selected: Selected option (optional)
|
|
|
|
* @param string $id: $options is an associative array this should be the key
|
|
|
|
* @param string $event: onChange event (optional)
|
|
|
|
* @param string $disabled (optional)
|
|
|
|
*/
|
2019-12-27 03:08:51 +00:00
|
|
|
function SelectorOptions($name, $options, $selected = null, $id = null, $event = null, $disabled = null)
|
2019-04-10 08:37:35 +00:00
|
|
|
{
|
|
|
|
echo '<select class="form-control" name="'.htmlspecialchars($name, ENT_QUOTES).'"';
|
|
|
|
if (isset($id)) {
|
|
|
|
echo ' id="' . htmlspecialchars($id, ENT_QUOTES) .'"';
|
2016-08-05 14:50:05 +00:00
|
|
|
}
|
2019-12-26 06:16:13 +00:00
|
|
|
if (isset($event)) {
|
|
|
|
echo ' onChange="' . htmlspecialchars($event, ENT_QUOTES).'()"';
|
|
|
|
}
|
2019-04-10 08:37:35 +00:00
|
|
|
echo '>' , PHP_EOL;
|
|
|
|
foreach ($options as $opt => $label) {
|
|
|
|
$select = '';
|
|
|
|
$key = isAssoc($options) ? $opt : $label;
|
|
|
|
if ($key == $selected) {
|
|
|
|
$select = ' selected="selected"';
|
|
|
|
}
|
2019-12-27 03:08:51 +00:00
|
|
|
if ($key == $disabled) {
|
|
|
|
$disabled = ' disabled';
|
|
|
|
}
|
|
|
|
echo '<option value="'.htmlspecialchars($key, ENT_QUOTES).'"'.$select.$disabled.'>'.
|
2018-08-16 12:48:47 +00:00
|
|
|
htmlspecialchars($label, ENT_QUOTES).'</option>' , PHP_EOL;
|
2019-04-10 08:37:35 +00:00
|
|
|
}
|
2018-08-03 23:58:34 +00:00
|
|
|
|
2019-04-10 08:37:35 +00:00
|
|
|
echo '</select>' , PHP_EOL;
|
2016-08-05 14:50:05 +00:00
|
|
|
}
|
|
|
|
|
2015-02-25 13:08:14 +00:00
|
|
|
/**
|
2020-02-15 17:57:46 +00:00
|
|
|
*
|
|
|
|
* @param string $input
|
|
|
|
* @param string $string
|
|
|
|
* @param int $offset
|
|
|
|
* @param string $separator
|
|
|
|
* @return $string
|
|
|
|
*/
|
2019-04-10 08:37:35 +00:00
|
|
|
function GetDistString($input, $string, $offset, $separator)
|
|
|
|
{
|
|
|
|
$string = substr($input, strpos($input, $string)+$offset, strpos(substr($input, strpos($input, $string)+$offset), $separator));
|
|
|
|
return $string;
|
2015-02-25 13:08:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 17:57:46 +00:00
|
|
|
*
|
|
|
|
* @param array $arrConfig
|
|
|
|
* @return $config
|
|
|
|
*/
|
2019-04-10 08:37:35 +00:00
|
|
|
function ParseConfig($arrConfig)
|
|
|
|
{
|
|
|
|
$config = array();
|
|
|
|
foreach ($arrConfig as $line) {
|
|
|
|
$line = trim($line);
|
2019-09-07 15:42:31 +00:00
|
|
|
if ($line == "" || $line[0] == "#") {
|
2023-10-25 07:56:19 +00:00
|
|
|
$config[$option] = null;
|
2019-09-07 15:42:31 +00:00
|
|
|
continue;
|
|
|
|
}
|
2019-08-01 14:31:11 +00:00
|
|
|
|
2023-09-03 07:47:51 +00:00
|
|
|
if (strpos($line, "=") !== false) {
|
|
|
|
list($option, $value) = array_map("trim", explode("=", $line, 2));
|
|
|
|
}
|
2019-08-01 14:31:11 +00:00
|
|
|
if (empty($config[$option])) {
|
|
|
|
$config[$option] = $value ?: true;
|
|
|
|
} else {
|
|
|
|
if (!is_array($config[$option])) {
|
|
|
|
$config[$option] = [ $config[$option] ];
|
|
|
|
}
|
|
|
|
$config[$option][] = $value;
|
2019-04-10 08:37:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return $config;
|
2015-02-25 13:08:14 +00:00
|
|
|
}
|
|
|
|
|
2020-12-01 18:38:57 +00:00
|
|
|
/**
|
|
|
|
* Fetches DHCP configuration for an interface, returned as JSON data
|
|
|
|
*
|
|
|
|
* @param string $interface
|
|
|
|
* @return json $jsonData
|
|
|
|
*/
|
|
|
|
function getNetConfig($interface)
|
|
|
|
{
|
2023-02-05 12:52:42 +00:00
|
|
|
$URI = $_SERVER['REQUEST_SCHEME'].'://' .'localhost'. dirname($_SERVER['SCRIPT_NAME']) .'/ajax/networking/get_netcfg.php?iface='.$interface;
|
|
|
|
$jsonData = file_get_contents($URI, true);
|
2020-12-01 18:38:57 +00:00
|
|
|
return $jsonData;
|
|
|
|
}
|
|
|
|
|
2015-02-25 13:08:14 +00:00
|
|
|
/**
|
2020-02-15 17:57:46 +00:00
|
|
|
*
|
|
|
|
* @param string $freq
|
|
|
|
* @return $channel
|
|
|
|
*/
|
2019-04-10 08:37:35 +00:00
|
|
|
function ConvertToChannel($freq)
|
|
|
|
{
|
|
|
|
if ($freq >= 2412 && $freq <= 2484) {
|
|
|
|
$channel = ($freq - 2407)/5;
|
|
|
|
} elseif ($freq >= 4915 && $freq <= 4980) {
|
|
|
|
$channel = ($freq - 4910)/5 + 182;
|
|
|
|
} elseif ($freq >= 5035 && $freq <= 5865) {
|
|
|
|
$channel = ($freq - 5030)/5 + 6;
|
|
|
|
} else {
|
|
|
|
$channel = -1;
|
|
|
|
}
|
|
|
|
if ($channel >= 1 && $channel <= 196) {
|
|
|
|
return $channel;
|
|
|
|
} else {
|
|
|
|
return 'Invalid Channel';
|
|
|
|
}
|
2015-02-25 13:08:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-02-15 17:57:46 +00:00
|
|
|
* Converts WPA security string to readable format
|
|
|
|
*
|
|
|
|
* @param string $security
|
|
|
|
* @return string
|
|
|
|
*/
|
2019-04-10 08:37:35 +00:00
|
|
|
function ConvertToSecurity($security)
|
|
|
|
{
|
|
|
|
$options = array();
|
|
|
|
preg_match_all('/\[([^\]]+)\]/s', $security, $matches);
|
|
|
|
foreach ($matches[1] as $match) {
|
|
|
|
if (preg_match('/^(WPA\d?)/', $match, $protocol_match)) {
|
|
|
|
$protocol = $protocol_match[1];
|
|
|
|
$matchArr = explode('-', $match);
|
|
|
|
if (count($matchArr) > 2) {
|
|
|
|
$options[] = htmlspecialchars($protocol . ' ('. $matchArr[2] .')', ENT_QUOTES);
|
|
|
|
} else {
|
|
|
|
$options[] = htmlspecialchars($protocol, ENT_QUOTES);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (count($options) === 0) {
|
|
|
|
// This could also be WEP but wpa_supplicant doesn't have a way to determine
|
|
|
|
// this.
|
|
|
|
// And you shouldn't be using WEP these days anyway.
|
|
|
|
return 'Open';
|
|
|
|
} else {
|
2019-10-15 20:07:21 +00:00
|
|
|
return implode(' / ', $options);
|
2016-08-12 17:29:56 +00:00
|
|
|
}
|
2015-02-25 13:08:14 +00:00
|
|
|
}
|
|
|
|
|
2019-08-08 00:10:40 +00:00
|
|
|
/**
|
|
|
|
* Renders a simple PHP template
|
|
|
|
*/
|
2020-03-06 15:54:48 +00:00
|
|
|
function renderTemplate($name, $__template_data = [])
|
2019-08-08 00:10:40 +00:00
|
|
|
{
|
2019-08-18 22:22:43 +00:00
|
|
|
$file = realpath(dirname(__FILE__) . "/../templates/$name.php");
|
2019-08-08 00:10:40 +00:00
|
|
|
if (!file_exists($file)) {
|
|
|
|
return "template $name ($file) not found";
|
|
|
|
}
|
|
|
|
|
2020-03-06 15:54:48 +00:00
|
|
|
if (is_array($__template_data)) {
|
|
|
|
extract($__template_data);
|
2019-08-08 00:10:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ob_start();
|
|
|
|
include $file;
|
|
|
|
return ob_get_clean();
|
|
|
|
}
|
|
|
|
|
|
|
|
function expandCacheKey($key)
|
|
|
|
{
|
|
|
|
return RASPI_CACHE_PATH . "/" . $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
function hasCache($key)
|
|
|
|
{
|
|
|
|
$cacheKey = expandCacheKey($key);
|
|
|
|
return file_exists($cacheKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
function readCache($key)
|
|
|
|
{
|
|
|
|
$cacheKey = expandCacheKey($key);
|
|
|
|
if (!file_exists($cacheKey)) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
return file_get_contents($cacheKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
function writeCache($key, $data)
|
|
|
|
{
|
2021-02-02 11:15:08 +00:00
|
|
|
if (!file_exists(RASPI_CACHE_PATH)) {
|
|
|
|
mkdir(RASPI_CACHE_PATH, 0777, true);
|
|
|
|
$cacheKey = expandCacheKey($key);
|
|
|
|
file_put_contents($cacheKey, $data);
|
|
|
|
}
|
2019-08-08 00:10:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
function deleteCache($key)
|
|
|
|
{
|
|
|
|
if (hasCache($key)) {
|
|
|
|
$cacheKey = expandCacheKey($key);
|
|
|
|
unlink($cacheKey);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function cache($key, $callback)
|
|
|
|
{
|
|
|
|
if (hasCache($key)) {
|
|
|
|
return readCache($key);
|
|
|
|
} else {
|
|
|
|
$data = $callback();
|
|
|
|
writeCache($key, $data);
|
|
|
|
return $data;
|
|
|
|
}
|
|
|
|
}
|
2020-02-27 23:52:35 +00:00
|
|
|
|
|
|
|
// insspired by
|
|
|
|
// http://markushedlund.com/dev/php-escapeshellarg-with-unicodeutf-8-support
|
|
|
|
function mb_escapeshellarg($arg)
|
|
|
|
{
|
|
|
|
$isWindows = strtolower(substr(PHP_OS, 0, 3)) === 'win';
|
|
|
|
if ($isWindows) {
|
2021-05-08 17:24:15 +00:00
|
|
|
return '"' . str_replace(array('"', '%'), '', $arg) . '"';
|
2020-02-27 23:52:35 +00:00
|
|
|
} else {
|
2021-05-08 17:24:15 +00:00
|
|
|
return "'" . str_replace("'", "'\\''", $arg) . "'";
|
2020-02-27 23:52:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-04 18:43:22 +00:00
|
|
|
function dnsServers()
|
|
|
|
{
|
|
|
|
$data = json_decode(file_get_contents("./config/dns-servers.json"));
|
|
|
|
return (array) $data;
|
|
|
|
}
|
|
|
|
|
2020-03-26 19:45:39 +00:00
|
|
|
function blocklistProviders()
|
|
|
|
{
|
|
|
|
$data = json_decode(file_get_contents("./config/blocklists.json"));
|
|
|
|
return (array) $data;
|
|
|
|
}
|
|
|
|
|
2020-03-04 18:43:22 +00:00
|
|
|
function optionsForSelect($options)
|
|
|
|
{
|
|
|
|
$html = "";
|
|
|
|
foreach ($options as $key => $value) {
|
|
|
|
// optgroup
|
|
|
|
if (is_array($value)) {
|
|
|
|
$html .= "<optgroup label=\"$key\">";
|
|
|
|
$html .= optionsForSelect($value);
|
|
|
|
$html .= "</optgroup>";
|
|
|
|
}
|
|
|
|
// option
|
|
|
|
else {
|
|
|
|
$key = is_int($key) ? $value : $key;
|
|
|
|
$html .= "<option value=\"$value\">$key</option>";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $html;
|
|
|
|
}
|
2020-04-01 09:09:52 +00:00
|
|
|
|
|
|
|
function blocklistUpdated($file)
|
|
|
|
{
|
|
|
|
$blocklist = RASPI_CONFIG.'/adblock/'.$file;
|
|
|
|
if (file_exists($blocklist)) {
|
|
|
|
$lastModified = date ("F d Y H:i:s.", filemtime($blocklist));
|
|
|
|
$lastModified = formatDateAgo($lastModified);
|
|
|
|
return $lastModified;
|
|
|
|
} else {
|
|
|
|
return 'Never';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function formatDateAgo($datetime, $full = false)
|
|
|
|
{
|
|
|
|
$now = new DateTime;
|
|
|
|
$ago = new DateTime($datetime);
|
|
|
|
$diff = $now->diff($ago);
|
|
|
|
|
|
|
|
$diff->w = floor($diff->d / 7);
|
|
|
|
$diff->d -= $diff->w * 7;
|
|
|
|
|
|
|
|
$string = array(
|
|
|
|
'y' => 'year',
|
|
|
|
'm' => 'month',
|
|
|
|
'w' => 'week',
|
|
|
|
'd' => 'day',
|
|
|
|
'h' => 'hour',
|
|
|
|
'i' => 'minute',
|
|
|
|
's' => 'second',
|
|
|
|
);
|
|
|
|
foreach ($string as $k => &$v) {
|
|
|
|
if ($diff->$k) {
|
|
|
|
$v = $diff->$k . ' ' . $v . ($diff->$k > 1 ? 's' : '');
|
|
|
|
} else {
|
|
|
|
unset($string[$k]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!$full) $string = array_slice($string, 0, 1);
|
|
|
|
return $string ? implode(', ', $string) . ' ago' : 'just now';
|
|
|
|
}
|
2020-06-30 15:53:52 +00:00
|
|
|
|
2023-09-14 13:14:02 +00:00
|
|
|
function initializeApp()
|
|
|
|
{
|
|
|
|
$_SESSION["theme_url"] = getThemeOpt();
|
|
|
|
$_SESSION["toggleState"] = getSidebarState();
|
|
|
|
$_SESSION["bridgedEnabled"] = getBridgedState();
|
2023-10-12 17:21:23 +00:00
|
|
|
$_SESSION["providerID"] = getProviderID();
|
2023-09-14 13:14:02 +00:00
|
|
|
}
|
|
|
|
|
2020-06-30 15:53:52 +00:00
|
|
|
function getThemeOpt()
|
|
|
|
{
|
|
|
|
if (!isset($_COOKIE['theme'])) {
|
|
|
|
$theme = "custom.php";
|
2023-09-13 19:26:19 +00:00
|
|
|
setcookie('theme', $theme);
|
2020-06-30 15:53:52 +00:00
|
|
|
} else {
|
|
|
|
$theme = $_COOKIE['theme'];
|
|
|
|
}
|
|
|
|
return 'app/css/'.htmlspecialchars($theme, ENT_QUOTES);
|
|
|
|
}
|
|
|
|
|
2020-06-30 22:35:46 +00:00
|
|
|
function getColorOpt()
|
|
|
|
{
|
|
|
|
if (!isset($_COOKIE['color'])) {
|
2021-11-25 08:06:17 +00:00
|
|
|
$color = "#2b8080";
|
2020-06-30 22:35:46 +00:00
|
|
|
} else {
|
|
|
|
$color = $_COOKIE['color'];
|
2023-09-13 19:26:19 +00:00
|
|
|
setcookie('color', $color);
|
2020-06-30 22:35:46 +00:00
|
|
|
}
|
|
|
|
return $color;
|
|
|
|
}
|
|
|
|
function getSidebarState()
|
|
|
|
{
|
2023-09-06 07:54:20 +00:00
|
|
|
if(isset($_COOKIE['sidebarToggled'])) {
|
|
|
|
if ($_COOKIE['sidebarToggled'] == 'true' ) {
|
|
|
|
return "toggled";
|
|
|
|
}
|
2020-06-30 22:35:46 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Returns bridged AP mode status
|
|
|
|
function getBridgedState()
|
|
|
|
{
|
|
|
|
$arrHostapdConf = parse_ini_file(RASPI_CONFIG.'/hostapd.ini');
|
|
|
|
// defaults to false
|
|
|
|
return $arrHostapdConf['BridgedEnable'];
|
|
|
|
}
|
|
|
|
|
2023-10-12 17:21:23 +00:00
|
|
|
// Returns VPN provider ID, if defined
|
|
|
|
function getProviderID()
|
|
|
|
{
|
|
|
|
if (RASPI_VPN_PROVIDER_ENABLED) {
|
|
|
|
$arrProvider = parse_ini_file(RASPI_CONFIG.'/provider.ini');
|
|
|
|
if (isset($arrProvider['providerID'])) {
|
|
|
|
return $arrProvider['providerID'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-28 22:40:46 +00:00
|
|
|
/**
|
|
|
|
* Validates the format of a CIDR notation string
|
|
|
|
*
|
|
|
|
* @param string $cidr
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
function validateCidr($cidr)
|
|
|
|
{
|
|
|
|
$parts = explode('/', $cidr);
|
|
|
|
if(count($parts) != 2) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$ip = $parts[0];
|
|
|
|
$netmask = intval($parts[1]);
|
|
|
|
|
|
|
|
if($netmask < 0) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if(filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4)) {
|
|
|
|
return $netmask <= 32;
|
|
|
|
}
|
|
|
|
if(filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV6)) {
|
|
|
|
return $netmask <= 128;
|
|
|
|
}
|
|
|
|
return false;
|
2020-09-23 08:10:44 +00:00
|
|
|
}
|
|
|
|
|
2020-09-19 21:24:15 +00:00
|
|
|
// Validates a host or FQDN
|
2021-07-06 22:10:10 +00:00
|
|
|
function validate_host($host)
|
|
|
|
{
|
2020-09-19 21:24:15 +00:00
|
|
|
return preg_match('/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i', $host);
|
|
|
|
}
|
|
|
|
|
2021-02-15 19:02:13 +00:00
|
|
|
// Gets night mode toggle value
|
|
|
|
// @return boolean
|
2021-07-06 22:10:10 +00:00
|
|
|
function getNightmode()
|
|
|
|
{
|
2023-09-13 19:26:19 +00:00
|
|
|
if (isset($_COOKIE['theme']) && $_COOKIE['theme'] == 'lightsout.css') {
|
2021-02-15 19:02:13 +00:00
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
2021-03-10 22:45:04 +00:00
|
|
|
}
|
|
|
|
|
2021-03-07 17:36:48 +00:00
|
|
|
// search array for matching string and return only first matching group
|
2021-07-06 22:10:10 +00:00
|
|
|
function preg_only_match($pat,$haystack)
|
|
|
|
{
|
2021-03-07 17:36:48 +00:00
|
|
|
$match = "";
|
|
|
|
if(!empty($haystack) && !empty($pat)) {
|
|
|
|
if(!is_array($haystack)) $haystack = array($haystack);
|
|
|
|
$str = preg_grep($pat,$haystack);
|
|
|
|
if (!empty($str) && preg_match($pat,array_shift($str),$match) === 1 ) $match = $match[1];
|
|
|
|
}
|
|
|
|
return $match;
|
|
|
|
}
|
2021-02-15 19:02:13 +00:00
|
|
|
|
2021-03-02 23:15:47 +00:00
|
|
|
// Sanitizes a string for QR encoding
|
|
|
|
// @param string $str
|
|
|
|
// @return string
|
|
|
|
function qr_encode($str)
|
|
|
|
{
|
|
|
|
return preg_replace('/(?<!\\\)([\":;,])/', '\\\\\1', $str);
|
2021-04-20 14:19:00 +00:00
|
|
|
}
|
2021-06-05 11:02:26 +00:00
|
|
|
|
2023-02-05 12:52:42 +00:00
|
|
|
function evalHexSequence($string)
|
|
|
|
{
|
2021-05-30 20:49:05 +00:00
|
|
|
$evaluator = function ($input) {
|
|
|
|
return hex2bin($input[1]);
|
|
|
|
};
|
|
|
|
return preg_replace_callback('/\\\x(..)/', $evaluator, $string);
|
|
|
|
}
|
|
|
|
|
2021-08-31 14:18:00 +00:00
|
|
|
function hexSequence2lower($string) {
|
|
|
|
return preg_replace_callback('/\\\\x([0-9A-F]{2})/', function($b){ return '\x'.strtolower($b[1]); }, $string);
|
|
|
|
}
|
|
|
|
|
2021-07-06 22:10:10 +00:00
|
|
|
/* File upload callback object
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
class validation
|
|
|
|
{
|
|
|
|
public function check_name_length($object)
|
|
|
|
{
|
|
|
|
if (strlen($object->file['filename']) > 255) {
|
|
|
|
$object->set_error('File name is too long.');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-07 22:24:49 +00:00
|
|
|
/* Resolves public IP address
|
|
|
|
*
|
|
|
|
* @return string $public_ip
|
|
|
|
*/
|
|
|
|
function get_public_ip()
|
|
|
|
{
|
2022-06-22 13:04:53 +00:00
|
|
|
exec('wget --timeout=5 --tries=1 https://ipinfo.io/ip -qO -', $public_ip);
|
2021-07-07 22:24:49 +00:00
|
|
|
return $public_ip[0];
|
|
|
|
}
|
|
|
|
|
2023-03-19 15:44:18 +00:00
|
|
|
/* Returns a standardized tooltip
|
|
|
|
*
|
|
|
|
* @return string $tooltip
|
|
|
|
*/
|
2023-03-20 18:14:24 +00:00
|
|
|
function getTooltip($msg, $id, $visible = true, $data_html = false)
|
2023-03-19 15:44:18 +00:00
|
|
|
{
|
2023-03-20 18:14:24 +00:00
|
|
|
($visible) ? $opt1 = 'visible' : $opt1 = 'invisible';
|
|
|
|
($data_html) ? $opt2 = 'data-html="true"' : $opt2 = 'data-html="false"';
|
2023-03-20 19:14:01 +00:00
|
|
|
echo '<i class="fas fa-question-circle text-muted ' .$opt1.'" id="' .$id. '" data-toggle="tooltip" ' .$opt2. ' data-placement="auto" title="' . _($msg). '"></i>';
|
2023-03-19 15:44:18 +00:00
|
|
|
}
|
|
|
|
|
2023-09-15 18:02:37 +00:00
|
|
|
// Load non default JS/ECMAScript in footer
|
|
|
|
function loadFooterScripts($extraFooterScripts)
|
|
|
|
{
|
|
|
|
foreach ($extraFooterScripts as $script) {
|
|
|
|
echo '<script type="text/javascript" src="' , $script['src'] , '"';
|
|
|
|
if ($script['defer']) {
|
|
|
|
echo ' defer="defer"';
|
|
|
|
}
|
|
|
|
echo '></script>' , PHP_EOL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|