2015-03-12 00:43:02 +01:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* Shaarli utilities
|
|
|
|
*/
|
|
|
|
|
2016-01-16 15:48:26 +01:00
|
|
|
/**
|
|
|
|
* Logs a message to a text file
|
|
|
|
*
|
2016-01-16 16:16:56 +01:00
|
|
|
* The log format is compatible with fail2ban.
|
|
|
|
*
|
2016-01-16 15:48:26 +01:00
|
|
|
* @param string $logFile where to write the logs
|
|
|
|
* @param string $clientIp the client's remote IPv4/IPv6 address
|
|
|
|
* @param string $message the message to log
|
|
|
|
*/
|
|
|
|
function logm($logFile, $clientIp, $message)
|
|
|
|
{
|
2016-01-16 16:16:56 +01:00
|
|
|
file_put_contents(
|
|
|
|
$logFile,
|
2016-01-18 00:24:36 +01:00
|
|
|
date('Y/m/d H:i:s').' - '.$clientIp.' - '.strval($message).PHP_EOL,
|
2016-01-16 16:16:56 +01:00
|
|
|
FILE_APPEND
|
|
|
|
);
|
2016-01-16 15:48:26 +01:00
|
|
|
}
|
|
|
|
|
2015-03-12 00:43:02 +01:00
|
|
|
/**
|
|
|
|
* Returns the small hash of a string, using RFC 4648 base64url format
|
|
|
|
*
|
|
|
|
* Small hashes:
|
|
|
|
* - are unique (well, as unique as crc32, at last)
|
|
|
|
* - are always 6 characters long.
|
|
|
|
* - only use the following characters: a-z A-Z 0-9 - _ @
|
|
|
|
* - are NOT cryptographically secure (they CAN be forged)
|
|
|
|
*
|
|
|
|
* In Shaarli, they are used as a tinyurl-like link to individual entries,
|
2016-11-28 18:24:15 +01:00
|
|
|
* built once with the combination of the date and item ID.
|
|
|
|
* e.g. smallHash('20111006_131924' . 142) --> eaWxtQ
|
|
|
|
*
|
|
|
|
* @warning before v0.8.1, smallhashes were built only with the date,
|
|
|
|
* and their value has been preserved.
|
2016-10-20 11:31:52 +02:00
|
|
|
*
|
|
|
|
* @param string $text Create a hash from this text.
|
|
|
|
*
|
|
|
|
* @return string generated small hash.
|
2015-03-12 00:43:02 +01:00
|
|
|
*/
|
|
|
|
function smallHash($text)
|
|
|
|
{
|
|
|
|
$t = rtrim(base64_encode(hash('crc32', $text, true)), '=');
|
|
|
|
return strtr($t, '+/', '-_');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Tells if a string start with a substring
|
2016-05-10 23:31:41 +02:00
|
|
|
*
|
|
|
|
* @param string $haystack Given string.
|
|
|
|
* @param string $needle String to search at the beginning of $haystack.
|
|
|
|
* @param bool $case Case sensitive.
|
|
|
|
*
|
|
|
|
* @return bool True if $haystack starts with $needle.
|
2015-03-12 00:43:02 +01:00
|
|
|
*/
|
2016-05-10 23:31:41 +02:00
|
|
|
function startsWith($haystack, $needle, $case = true)
|
2015-03-12 00:43:02 +01:00
|
|
|
{
|
|
|
|
if ($case) {
|
|
|
|
return (strcmp(substr($haystack, 0, strlen($needle)), $needle) === 0);
|
|
|
|
}
|
|
|
|
return (strcasecmp(substr($haystack, 0, strlen($needle)), $needle) === 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Tells if a string ends with a substring
|
2016-05-10 23:31:41 +02:00
|
|
|
*
|
|
|
|
* @param string $haystack Given string.
|
|
|
|
* @param string $needle String to search at the end of $haystack.
|
|
|
|
* @param bool $case Case sensitive.
|
|
|
|
*
|
|
|
|
* @return bool True if $haystack ends with $needle.
|
2015-03-12 00:43:02 +01:00
|
|
|
*/
|
2016-05-10 23:31:41 +02:00
|
|
|
function endsWith($haystack, $needle, $case = true)
|
2015-03-12 00:43:02 +01:00
|
|
|
{
|
|
|
|
if ($case) {
|
|
|
|
return (strcmp(substr($haystack, strlen($haystack) - strlen($needle)), $needle) === 0);
|
|
|
|
}
|
|
|
|
return (strcasecmp(substr($haystack, strlen($haystack) - strlen($needle)), $needle) === 0);
|
|
|
|
}
|
2015-06-24 01:04:50 +02:00
|
|
|
|
|
|
|
/**
|
2016-02-19 19:37:13 +01:00
|
|
|
* Htmlspecialchars wrapper
|
2016-03-20 14:14:38 +01:00
|
|
|
* Support multidimensional array of strings.
|
2016-02-19 19:37:13 +01:00
|
|
|
*
|
2016-03-20 14:14:38 +01:00
|
|
|
* @param mixed $input Data to escape: a single string or an array of strings.
|
2016-02-19 19:37:13 +01:00
|
|
|
*
|
|
|
|
* @return string escaped.
|
2015-06-24 01:04:50 +02:00
|
|
|
*/
|
2016-03-20 14:14:38 +01:00
|
|
|
function escape($input)
|
2015-06-24 01:04:50 +02:00
|
|
|
{
|
2016-03-20 14:14:38 +01:00
|
|
|
if (is_array($input)) {
|
|
|
|
$out = array();
|
|
|
|
foreach($input as $key => $value) {
|
|
|
|
$out[$key] = escape($value);
|
|
|
|
}
|
|
|
|
return $out;
|
|
|
|
}
|
|
|
|
return htmlspecialchars($input, ENT_COMPAT, 'UTF-8', false);
|
2015-06-24 01:04:50 +02:00
|
|
|
}
|
|
|
|
|
2016-02-19 19:37:13 +01:00
|
|
|
/**
|
|
|
|
* Reverse the escape function.
|
|
|
|
*
|
|
|
|
* @param string $str the string to unescape.
|
|
|
|
*
|
|
|
|
* @return string unescaped string.
|
|
|
|
*/
|
|
|
|
function unescape($str)
|
|
|
|
{
|
|
|
|
return htmlspecialchars_decode($str);
|
|
|
|
}
|
|
|
|
|
2015-06-24 01:04:50 +02:00
|
|
|
/**
|
2016-10-20 11:31:52 +02:00
|
|
|
* Sanitize link before rendering.
|
|
|
|
*
|
|
|
|
* @param array $link Link to escape.
|
2015-06-24 01:04:50 +02:00
|
|
|
*/
|
|
|
|
function sanitizeLink(&$link)
|
|
|
|
{
|
|
|
|
$link['url'] = escape($link['url']); // useful?
|
|
|
|
$link['title'] = escape($link['title']);
|
|
|
|
$link['description'] = escape($link['description']);
|
|
|
|
$link['tags'] = escape($link['tags']);
|
|
|
|
}
|
2015-06-27 14:57:44 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Checks if a string represents a valid date
|
2015-12-27 10:08:20 +01:00
|
|
|
|
|
|
|
* @param string $format The expected DateTime format of the string
|
|
|
|
* @param string $string A string-formatted date
|
|
|
|
*
|
|
|
|
* @return bool whether the string is a valid date
|
2015-06-27 14:57:44 +02:00
|
|
|
*
|
2015-12-27 10:08:20 +01:00
|
|
|
* @see http://php.net/manual/en/class.datetime.php
|
|
|
|
* @see http://php.net/manual/en/datetime.createfromformat.php
|
2015-06-27 14:57:44 +02:00
|
|
|
*/
|
|
|
|
function checkDateFormat($format, $string)
|
|
|
|
{
|
|
|
|
$date = DateTime::createFromFormat($format, $string);
|
|
|
|
return $date && $date->format($string) == $string;
|
|
|
|
}
|
2015-07-06 10:22:00 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Generate a header location from HTTP_REFERER.
|
|
|
|
* Make sure the referer is Shaarli itself and prevent redirection loop.
|
|
|
|
*
|
|
|
|
* @param string $referer - HTTP_REFERER.
|
|
|
|
* @param string $host - Server HOST.
|
|
|
|
* @param array $loopTerms - Contains list of term to prevent redirection loop.
|
|
|
|
*
|
|
|
|
* @return string $referer - final referer.
|
|
|
|
*/
|
|
|
|
function generateLocation($referer, $host, $loopTerms = array())
|
|
|
|
{
|
2015-11-04 19:53:59 +01:00
|
|
|
$finalReferer = '?';
|
2015-07-06 10:22:00 +02:00
|
|
|
|
|
|
|
// No referer if it contains any value in $loopCriteria.
|
|
|
|
foreach ($loopTerms as $value) {
|
|
|
|
if (strpos($referer, $value) !== false) {
|
2015-11-04 19:53:59 +01:00
|
|
|
return $finalReferer;
|
2015-07-06 10:22:00 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove port from HTTP_HOST
|
|
|
|
if ($pos = strpos($host, ':')) {
|
|
|
|
$host = substr($host, 0, $pos);
|
|
|
|
}
|
|
|
|
|
2015-11-04 19:53:59 +01:00
|
|
|
$refererHost = parse_url($referer, PHP_URL_HOST);
|
|
|
|
if (!empty($referer) && (strpos($refererHost, $host) !== false || startsWith('?', $refererHost))) {
|
|
|
|
$finalReferer = $referer;
|
2015-07-06 10:22:00 +02:00
|
|
|
}
|
|
|
|
|
2015-11-04 19:53:59 +01:00
|
|
|
return $finalReferer;
|
2015-07-06 10:22:00 +02:00
|
|
|
}
|
2015-07-11 01:29:12 +02:00
|
|
|
|
2015-07-25 13:15:47 +02:00
|
|
|
/**
|
|
|
|
* Validate session ID to prevent Full Path Disclosure.
|
2015-09-03 23:12:58 +02:00
|
|
|
*
|
2015-07-25 13:15:47 +02:00
|
|
|
* See #298.
|
2015-09-03 23:12:58 +02:00
|
|
|
* The session ID's format depends on the hash algorithm set in PHP settings
|
2015-07-25 13:15:47 +02:00
|
|
|
*
|
|
|
|
* @param string $sessionId Session ID
|
|
|
|
*
|
|
|
|
* @return true if valid, false otherwise.
|
2015-09-03 23:12:58 +02:00
|
|
|
*
|
|
|
|
* @see http://php.net/manual/en/function.hash-algos.php
|
|
|
|
* @see http://php.net/manual/en/session.configuration.php
|
2015-07-25 13:15:47 +02:00
|
|
|
*/
|
|
|
|
function is_session_id_valid($sessionId)
|
|
|
|
{
|
|
|
|
if (empty($sessionId)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!$sessionId) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-09-03 23:12:58 +02:00
|
|
|
if (!preg_match('/^[a-zA-Z0-9,-]{2,128}$/', $sessionId)) {
|
2015-07-25 13:15:47 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
2015-09-18 13:26:36 +02:00
|
|
|
|
2016-02-19 20:14:06 +01:00
|
|
|
/**
|
|
|
|
* Sniff browser language to set the locale automatically.
|
|
|
|
* Note that is may not work on your server if the corresponding locale is not installed.
|
|
|
|
*
|
|
|
|
* @param string $headerLocale Locale send in HTTP headers (e.g. "fr,fr-fr;q=0.8,en;q=0.5,en-us;q=0.3").
|
|
|
|
**/
|
|
|
|
function autoLocale($headerLocale)
|
|
|
|
{
|
|
|
|
// Default if browser does not send HTTP_ACCEPT_LANGUAGE
|
|
|
|
$attempts = array('en_US');
|
|
|
|
if (isset($headerLocale)) {
|
|
|
|
// (It's a bit crude, but it works very well. Preferred language is always presented first.)
|
|
|
|
if (preg_match('/([a-z]{2})-?([a-z]{2})?/i', $headerLocale, $matches)) {
|
|
|
|
$loc = $matches[1] . (!empty($matches[2]) ? '_' . strtoupper($matches[2]) : '');
|
|
|
|
$attempts = array(
|
|
|
|
$loc.'.UTF-8', $loc, str_replace('_', '-', $loc).'.UTF-8', str_replace('_', '-', $loc),
|
|
|
|
$loc . '_' . strtoupper($loc).'.UTF-8', $loc . '_' . strtoupper($loc),
|
|
|
|
$loc . '_' . $loc.'.UTF-8', $loc . '_' . $loc, $loc . '-' . strtoupper($loc).'.UTF-8',
|
|
|
|
$loc . '-' . strtoupper($loc), $loc . '-' . $loc.'.UTF-8', $loc . '-' . $loc
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
setlocale(LC_ALL, $attempts);
|
2016-05-10 23:18:04 +02:00
|
|
|
}
|
2016-07-31 10:46:17 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Generates a default API secret.
|
|
|
|
*
|
|
|
|
* Note that the random-ish methods used in this function are predictable,
|
|
|
|
* which makes them NOT suitable for crypto.
|
|
|
|
* BUT the random string is salted with the salt and hashed with the username.
|
|
|
|
* It makes the generated API secret secured enough for Shaarli.
|
|
|
|
*
|
|
|
|
* PHP 7 provides random_int(), designed for cryptography.
|
|
|
|
* More info: http://stackoverflow.com/questions/4356289/php-random-string-generator
|
|
|
|
|
|
|
|
* @param string $username Shaarli login username
|
|
|
|
* @param string $salt Shaarli password hash salt
|
|
|
|
*
|
|
|
|
* @return string|bool Generated API secret, 12 char length.
|
|
|
|
* Or false if invalid parameters are provided (which will make the API unusable).
|
|
|
|
*/
|
|
|
|
function generate_api_secret($username, $salt)
|
|
|
|
{
|
|
|
|
if (empty($username) || empty($salt)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return str_shuffle(substr(hash_hmac('sha512', uniqid($salt), $username), 10, 12));
|
|
|
|
}
|
2016-12-20 11:06:22 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Trim string, replace sequences of whitespaces by a single space.
|
|
|
|
* PHP equivalent to `normalize-space` XSLT function.
|
|
|
|
*
|
|
|
|
* @param string $string Input string.
|
|
|
|
*
|
|
|
|
* @return mixed Normalized string.
|
|
|
|
*/
|
|
|
|
function normalize_spaces($string)
|
|
|
|
{
|
|
|
|
return preg_replace('/\s{2,}/', ' ', trim($string));
|
|
|
|
}
|
2016-12-07 11:58:25 +01:00
|
|
|
|
|
|
|
function getAllTheme($raintpl_tpl)
|
|
|
|
{
|
|
|
|
$allTheme = glob($raintpl_tpl.'/*', GLOB_ONLYDIR);
|
|
|
|
foreach ($allTheme as $value) {
|
|
|
|
$themes[] = str_replace($raintpl_tpl.'/', '', $value);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $themes;
|
|
|
|
}
|