2022-05-31 17:12:14 +00:00
|
|
|
<?php
|
|
|
|
|
2022-10-07 11:29:47 +00:00
|
|
|
function output($code, $msg = '', $logs = ['']) {
|
2022-12-20 20:17:03 +00:00
|
|
|
http_response_code($code);
|
2022-09-15 17:17:48 +00:00
|
|
|
$shortCode = $code / 100 % 10;
|
2022-12-20 20:17:03 +00:00
|
|
|
if ($shortCode === 5)
|
|
|
|
error_log('Niver internal error: ' . strip_tags($msg) . implode(LF, $logs));
|
2022-09-15 17:17:48 +00:00
|
|
|
$final_message = match ($shortCode) {
|
2022-11-20 14:11:54 +00:00
|
|
|
2 => ($msg === '') ? '' : '<p><output><strong>Succès</strong> : <em>' . $msg . '</em></output></p>' . LF,
|
|
|
|
4 => '<p><output><strong>Erreur utilisataire</strong> : <em>' . $msg . '</em></output></p>' . LF,
|
|
|
|
5 => '<p><output><strong>Server error</strong>: The server encountered an error: <em>' . $msg . '</em></output></p>' . LF,
|
2022-09-15 17:17:48 +00:00
|
|
|
};
|
2022-12-20 20:17:03 +00:00
|
|
|
displayPage(['final_message' => $final_message]);
|
2022-05-31 17:12:14 +00:00
|
|
|
}
|
2022-06-11 21:42:48 +00:00
|
|
|
|
2022-09-14 15:19:17 +00:00
|
|
|
function insert($table, $values) {
|
2022-12-10 17:19:37 +00:00
|
|
|
$query = 'INSERT INTO "' . $table . '"(';
|
2022-09-14 15:19:17 +00:00
|
|
|
|
|
|
|
foreach ($values as $key => $val) {
|
|
|
|
if ($key === array_key_last($values))
|
|
|
|
$query .= "$key";
|
|
|
|
else
|
|
|
|
$query .= "$key, ";
|
|
|
|
}
|
|
|
|
|
2022-11-20 14:11:54 +00:00
|
|
|
$query .= ') VALUES(';
|
2022-09-14 15:19:17 +00:00
|
|
|
foreach ($values as $key => $val) {
|
|
|
|
if ($key === array_key_last($values))
|
|
|
|
$query .= ":$key";
|
|
|
|
else
|
|
|
|
$query .= ":$key, ";
|
|
|
|
}
|
2022-11-20 14:11:54 +00:00
|
|
|
$query .= ')';
|
2022-09-14 15:19:17 +00:00
|
|
|
|
2022-12-13 16:38:54 +00:00
|
|
|
DB->prepare($query)
|
|
|
|
->execute($values);
|
2022-09-14 15:19:17 +00:00
|
|
|
}
|
|
|
|
|
2022-06-11 21:42:48 +00:00
|
|
|
function query($action, $table, $conditions = [], $column = NULL) {
|
|
|
|
|
|
|
|
$query = match ($action) {
|
|
|
|
'select' => 'SELECT *',
|
|
|
|
'delete' => 'DELETE',
|
|
|
|
};
|
|
|
|
|
2022-12-10 17:19:37 +00:00
|
|
|
$query .= ' FROM "' . $table . '"';
|
2022-06-11 21:42:48 +00:00
|
|
|
|
|
|
|
foreach ($conditions as $key => $val) {
|
|
|
|
if ($key === array_key_first($conditions))
|
|
|
|
$query .= " WHERE $key = :$key";
|
|
|
|
else
|
|
|
|
$query .= " AND $key = :$key";
|
|
|
|
}
|
|
|
|
|
2022-12-10 17:19:37 +00:00
|
|
|
$stmt = DB->prepare($query);
|
2022-12-13 16:38:54 +00:00
|
|
|
$stmt->execute($conditions);
|
2022-06-11 21:42:48 +00:00
|
|
|
|
2022-12-13 16:38:54 +00:00
|
|
|
return array_column($stmt->fetchAll(PDO::FETCH_ASSOC), $column);
|
2022-06-11 21:42:48 +00:00
|
|
|
}
|
2022-06-14 16:21:09 +00:00
|
|
|
|
|
|
|
function displayIndex() { ?>
|
2022-08-11 14:39:31 +00:00
|
|
|
<nav>
|
|
|
|
<dl>
|
2022-09-15 19:23:49 +00:00
|
|
|
<?php foreach (PAGES[SERVICE] as $pageId => $page) {
|
2022-06-14 16:21:09 +00:00
|
|
|
if ($pageId === 'index') continue;
|
|
|
|
?>
|
2022-09-15 19:23:49 +00:00
|
|
|
<dt><a href="<?= $pageId ?>"><?= $page['title'] ?></a></dt>
|
2022-08-11 14:39:31 +00:00
|
|
|
<dd>
|
2022-09-15 19:23:49 +00:00
|
|
|
<?= $page['description'] ?>
|
2022-08-11 14:39:31 +00:00
|
|
|
</dd>
|
|
|
|
<?php } ?>
|
|
|
|
</dl>
|
|
|
|
</nav>
|
2022-06-14 16:21:09 +00:00
|
|
|
<?php
|
|
|
|
}
|
2022-06-15 10:42:30 +00:00
|
|
|
|
|
|
|
function redirUrl($pageId) {
|
2022-09-12 23:09:40 +00:00
|
|
|
return CONF['common']['prefix'] . '/' . $pageId . '?redir=' . PAGE_URL;
|
2022-06-15 10:42:30 +00:00
|
|
|
}
|
2022-06-17 13:45:52 +00:00
|
|
|
|
|
|
|
function redir() {
|
|
|
|
if (isset($_GET['redir'])) {
|
2022-11-20 17:17:03 +00:00
|
|
|
if (preg_match('/^[0-9a-z\/-]{0,128}$/D', $_GET['redir']) !== 1)
|
2022-09-15 17:17:48 +00:00
|
|
|
output(403, 'Wrong character in <code>redir</code>.');
|
2022-06-17 13:45:52 +00:00
|
|
|
header('Location: ' . CONF['common']['prefix'] . '/' . $_GET['redir']);
|
|
|
|
} else {
|
|
|
|
header('Location: ' . CONF['common']['prefix'] . '/');
|
|
|
|
}
|
2022-09-15 17:17:48 +00:00
|
|
|
exit();
|
2022-06-17 13:45:52 +00:00
|
|
|
}
|
2022-06-21 22:37:06 +00:00
|
|
|
|
|
|
|
// PHP rmdir() only works on empty directories
|
|
|
|
function removeDirectory($dir) {
|
|
|
|
$dirObj = new RecursiveDirectoryIterator($dir, RecursiveDirectoryIterator::SKIP_DOTS);
|
|
|
|
$files = new RecursiveIteratorIterator($dirObj, RecursiveIteratorIterator::CHILD_FIRST);
|
|
|
|
foreach ($files as $file)
|
|
|
|
$file->isDir() && !$file->isLink() ? rmdir($file->getPathname()) : unlink($file->getPathname());
|
|
|
|
if (rmdir($dir) !== true)
|
2022-09-15 17:17:48 +00:00
|
|
|
output(500, 'Unable to remove directory.');
|
2022-06-21 22:37:06 +00:00
|
|
|
}
|
2022-07-20 18:03:45 +00:00
|
|
|
|
2022-09-03 16:12:49 +00:00
|
|
|
function equalArrays($a, $b) {
|
|
|
|
return array_diff($a, $b) === [] AND array_diff($b, $a) === [];
|
|
|
|
}
|
|
|
|
|
2022-07-20 18:03:45 +00:00
|
|
|
function linkToDocs($ref, $title) {
|
|
|
|
return '<a rel="help" href="' . CONF['common']['docs_prefix'] . $ref . '.html">' . $title . '</a>';
|
|
|
|
}
|
2022-10-06 11:12:04 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
This token authenticates the user to the server through a public communication (the DNS).
|
|
|
|
It is therefore also designed to keep private:
|
|
|
|
- the user's id
|
|
|
|
- that a same user used a token multiple times (by using a unique salt for each token)
|
|
|
|
*/
|
|
|
|
define('SECRET_KEY_FILE', sys_get_temp_dir() . '/Niver.key');
|
|
|
|
if (!file_exists(SECRET_KEY_FILE)) {
|
|
|
|
$original_umask = umask(0077);
|
|
|
|
file_put_contents(SECRET_KEY_FILE, random_bytes(32));
|
|
|
|
umask($original_umask);
|
|
|
|
}
|
|
|
|
define('SECRET_KEY', file_get_contents(SECRET_KEY_FILE));
|
|
|
|
function getAuthToken() {
|
|
|
|
$salt = bin2hex(random_bytes(4));
|
2022-11-30 22:12:42 +00:00
|
|
|
$hash = hash_hmac('sha256', $salt . ($_SESSION['id'] ?? ''), SECRET_KEY);
|
2022-10-06 11:12:04 +00:00
|
|
|
return $salt . '-' . substr($hash, 0, 32);
|
|
|
|
}
|
|
|
|
function checkAuthToken($salt, $hash) {
|
2022-11-30 22:12:42 +00:00
|
|
|
$correctProof = substr(hash_hmac('sha256', $salt . $_SESSION['id'], SECRET_KEY), 0, 32);
|
2022-10-06 11:12:04 +00:00
|
|
|
if (hash_equals($correctProof, $hash) !== true)
|
|
|
|
output(403, 'Preuve incorrecte');
|
|
|
|
}
|