This repository has been archived on 2024-06-26. You can view files and clone it, but cannot push or open issues or pull requests.
sakura/_sakura/components/Main.php

678 lines
18 KiB
PHP
Raw Normal View History

2015-04-01 17:34:36 +00:00
<?php
/*
* Main Class
*/
namespace Sakura;
2015-06-04 12:41:55 +00:00
use Parsedown;
use PHPMailer;
2015-04-01 17:34:36 +00:00
class Main {
2015-04-30 23:01:01 +00:00
public static $_MD; // Markdown class container
public static $_MANAGE_MODE = false; // Management mode
2015-04-01 17:34:36 +00:00
2015-04-18 18:32:41 +00:00
// Constructor
public static function init($config) {
2015-04-01 17:34:36 +00:00
2015-04-18 18:32:41 +00:00
// Stop the execution if the PHP Version is older than 5.4.0
if(version_compare(phpversion(), '5.4.0', '<'))
2015-06-27 19:29:37 +00:00
trigger_error('Sakura requires at least PHP 5.4.0, please upgrade to a newer PHP version.');
2015-04-01 17:34:36 +00:00
2015-04-18 18:32:41 +00:00
// Configuration Management and local configuration
Configuration::init($config);
2015-04-01 17:34:36 +00:00
2015-04-18 18:32:41 +00:00
// Database
2015-05-29 19:27:45 +00:00
Database::init(Configuration::getLocalConfig('database', 'driver'));
2015-04-01 17:34:36 +00:00
// "Dynamic" Configuration
Configuration::initDB();
// Create new session
Session::init();
2015-04-30 23:01:01 +00:00
// Check if management mode was requested
self::$_MANAGE_MODE = defined('SAKURA_MANAGE');
2015-04-01 17:34:36 +00:00
// Templating engine
2015-04-30 23:01:01 +00:00
Templates::init(self::$_MANAGE_MODE ? Configuration::getConfig('manage_style') : Configuration::getConfig('site_style'));
2015-04-18 18:26:52 +00:00
// Assign servers file to whois class
2015-05-29 19:27:45 +00:00
Whois::setServers(ROOT .'_sakura/'. Configuration::getLocalConfig('data', 'whoisservers'));
2015-04-01 17:34:36 +00:00
// Markdown Parser
2015-04-02 13:41:05 +00:00
self::initMD();
2015-04-01 17:34:36 +00:00
2015-04-18 18:32:41 +00:00
}
2015-04-01 17:34:36 +00:00
// Initialise Parsedown
2015-04-02 13:41:05 +00:00
private static function initMD() {
2015-04-01 17:34:36 +00:00
2015-06-04 12:41:55 +00:00
self::$_MD = new Parsedown();
2015-04-01 17:34:36 +00:00
}
2015-04-01 17:45:05 +00:00
// Parse markdown
2015-04-01 17:46:02 +00:00
public static function mdParse($text) {
2015-04-01 17:45:05 +00:00
2015-04-02 13:30:05 +00:00
return self::$_MD->text($text);
2015-04-01 17:45:05 +00:00
}
2015-06-21 13:41:07 +00:00
// Parse bbcodes
public static function bbParse($text) {
// Get bbcode regex from the database
$bbcodes = Database::fetch('bbcodes');
// Split the regex
$regex = array_map(function($arr) {
return $arr['regex'];
}, $bbcodes);
// Split the replacement
$replace = array_map(function($arr) {
return $arr['replace'];
}, $bbcodes);
// Do the replacement
$text = preg_replace($regex, $replace, $text);
// Return the parsed text
return $text;
}
2015-04-01 17:34:36 +00:00
// Verify ReCAPTCHA
public static function verifyCaptcha($response) {
// Attempt to get the response
$resp = @file_get_contents('https://www.google.com/recaptcha/api/siteverify?secret='. Configuration::getConfig('recaptcha_private') .'&response='. $response);
// In the highly unlikely case that it failed to get anything forge a false
if(!$resp)
2015-06-04 12:41:55 +00:00
return false;
2015-04-01 17:34:36 +00:00
// Decode the response JSON from the servers
$resp = json_decode($resp, true);
// Return shit
return $resp;
}
2015-04-18 18:32:41 +00:00
// Error Handler
2015-04-30 23:01:01 +00:00
public static function errorHandler($errno, $errstr, $errfile, $errline) {
2015-04-01 17:34:36 +00:00
// Set some variables to work with including A HUGE fallback hackjob for the templates folder
2015-04-18 18:26:52 +00:00
$errstr = str_replace(ROOT, '', $errstr);
$errfile = str_replace(ROOT, '', $errfile);
$templates = ROOT .'_sakura/templates/';
2015-04-01 17:34:36 +00:00
2015-04-18 18:32:41 +00:00
switch ($errno) {
2015-04-01 17:34:36 +00:00
2015-04-18 18:32:41 +00:00
case E_ERROR:
case E_USER_ERROR:
$error = '<b>FATAL ERROR</b>: ' . $errstr . ' on line ' . $errline . ' in ' . $errfile;
2015-04-01 17:34:36 +00:00
break;
2015-04-18 18:32:41 +00:00
case E_WARNING:
case E_USER_WARNING:
$error = '<b>WARNING</b>: ' . $errstr . ' on line ' . $errline . ' in ' . $errfile;
2015-04-01 17:34:36 +00:00
break;
2015-04-18 18:32:41 +00:00
case E_NOTICE:
case E_USER_NOTICE:
$error = '<b>NOTICE</b>: ' . $errstr . ' on line ' . $errline . ' in ' . $errfile;
2015-04-01 17:34:36 +00:00
break;
2015-04-18 18:32:41 +00:00
default:
$error = '<b>Unknown error type</b> [' . $errno . ']: ' . $errstr . ' on line ' . $errline . ' in ' . $errfile;
2015-04-01 17:34:36 +00:00
2015-04-18 18:32:41 +00:00
}
2015-04-01 17:34:36 +00:00
// Use file_get_contents instead of Twig in case the problem is related to twig
$errorPage = file_get_contents($templates. 'errorPage.tpl');
// str_replace {{ error }} on the error page with the error data
$error = str_replace('{{ error }}', $error, $errorPage);
2015-04-18 18:32:41 +00:00
// Truncate all previous outputs
ob_clean();
2015-05-29 19:27:45 +00:00
ob_end_clean();
2015-04-01 17:34:36 +00:00
2015-04-18 18:32:41 +00:00
// Die and display error message
die($error);
2015-04-01 17:34:36 +00:00
2015-04-18 18:32:41 +00:00
}
2015-04-01 17:34:36 +00:00
2015-04-18 18:26:52 +00:00
// Send emails
public static function sendMail($to, $subject, $body) {
// Initialise PHPMailer
2015-06-04 12:41:55 +00:00
$mail = new PHPMailer();
2015-04-18 18:26:52 +00:00
// Set to SMTP
$mail->IsSMTP();
// Set the SMTP server host
$mail->Host = Configuration::getConfig('smtp_server');
// Do we require authentication?
$mail->SMTPAuth = Configuration::getConfig('smtp_auth');
// Do we encrypt as well?
$mail->SMTPSecure = Configuration::getConfig('smtp_secure');
// Set the port to the SMTP server
$mail->Port = Configuration::getConfig('smtp_port');
// If authentication is required log in as well
if(Configuration::getConfig('smtp_auth')) {
$mail->Username = Configuration::getConfig('smtp_username');
$mail->Password = base64_decode(Configuration::getConfig('smtp_password'));
}
// Add a reply-to header
$mail->AddReplyTo(Configuration::getConfig('smtp_replyto_mail'), Configuration::getConfig('smtp_replyto_name'));
// Set a from address as well
$mail->SetFrom(Configuration::getConfig('smtp_from_email'), Configuration::getConfig('smtp_from_name'));
// Set the addressee
foreach($to as $email => $name)
$mail->AddBCC($email, $name);
// Subject line
$mail->Subject = $subject;
// Set the mail type to HTML
$mail->isHTML(true);
// Set email contents
$htmlMail = file_get_contents(ROOT .'_sakura/templates/htmlEmail.tpl');
// Replace template tags
$htmlMail = str_replace('{{ sitename }}', Configuration::getConfig('sitename'), $htmlMail);
$htmlMail = str_replace('{{ siteurl }}', '//'. Configuration::getLocalConfig('urls', 'main'), $htmlMail);
$htmlMail = str_replace('{{ contents }}', self::mdParse($body), $htmlMail);
// Set HTML body
$mail->Body = $htmlMail;
// Set fallback body
$mail->AltBody = $body;
// Send the message
$send = $mail->Send();
// Clear the addressee list
$mail->ClearAddresses();
// If we got an error return the error
if(!$send)
return $mail->ErrorInfo;
// Else just return whatever
return $send;
}
2015-04-01 17:34:36 +00:00
// Legacy password hashing to be able to validate passwords from users on the old backend.
public static function legacyPasswordHash($data) {
return hash('sha512', strrev(hash('sha512', $data)));
}
// Cleaning strings
2015-04-27 00:41:59 +00:00
public static function cleanString($string, $lower = false, $nospecial = false) {
2015-04-01 17:34:36 +00:00
2015-04-27 00:41:59 +00:00
// Run common sanitisation function over string
2015-06-29 12:40:00 +00:00
$string = htmlentities($string, ENT_NOQUOTES | ENT_HTML401, Configuration::getConfig('charset'));
2015-04-18 18:32:41 +00:00
$string = stripslashes($string);
$string = strip_tags($string);
2015-04-27 00:41:59 +00:00
// If set also make the string lowercase
2015-04-01 17:34:36 +00:00
if($lower)
$string = strtolower($string);
2015-04-27 00:41:59 +00:00
// If set remove all characters that aren't a-z or 0-9
if($nospecial)
$string = preg_replace('/[^a-z0-9]/', '', $string);
// Return clean string
2015-04-18 18:32:41 +00:00
return $string;
2015-04-01 17:34:36 +00:00
}
// Getting news posts
2015-04-05 16:24:07 +00:00
public static function getNewsPosts($limit = null, $pid = false) {
2015-04-01 17:34:36 +00:00
// Get news posts
2015-04-05 16:24:07 +00:00
$newsPosts = Database::fetch('news', true, ($pid ? ['id' => [$limit, '=']] : null), ['id', true], ($limit && !$pid ? [$limit] : null));
2015-04-01 17:34:36 +00:00
// Get user data
foreach($newsPosts as $newsId => $newsPost) {
2015-04-25 20:08:44 +00:00
2015-04-02 13:27:21 +00:00
$newsPosts[$newsId]['parsed'] = self::mdParse($newsPost['content']);
$newsPosts[$newsId]['udata'] = Users::getUser($newsPost['uid']);
$newsPosts[$newsId]['rdata'] = Users::getRank($newsPosts[$newsId]['udata']['rank_main']);
2015-04-25 20:08:44 +00:00
// Check if a custom name colour is set and if so overwrite the rank colour
if($newsPosts[$newsId]['udata']['name_colour'] != null)
$newsPosts[$newsId]['rdata']['colour'] = $newsPosts[$newsId]['udata']['name_colour'];
2015-04-01 17:34:36 +00:00
}
// Return posts
return $newsPosts;
}
// Loading info pages
public static function loadInfoPage($id) {
// Get contents from the database
$infopage = Database::fetch('infopages', false, ['shorthand' => [$id, '=']]);
2015-04-01 17:45:05 +00:00
// Return the data if there is any else just return false
return count($infopage) ? $infopage : false;
2015-04-01 17:34:36 +00:00
}
2015-04-14 14:27:37 +00:00
// Validate MX records
public static function checkMXRecord($email) {
2015-04-19 13:00:32 +00:00
// Get the domain from the e-mail address
$domain = substr(strstr($email, '@'), 1);
2015-04-14 14:27:37 +00:00
// Check the MX record
$record = checkdnsrr($domain, 'MX');
// Return the record data
return $record;
}
// Check IP version
public static function ipVersion($ip) {
// Check if var is IP
if(filter_var($ip, FILTER_VALIDATE_IP)) {
// IPv4
if(filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4))
return 4;
// IPv6
if(filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV6))
return 6;
}
// Not an IP or unknown type
return 0;
}
// Convert inet_pton to string with bits
public static function inetToBits($inet) {
// Unpack string
$unpacked = unpack('A16', $inet);
// Split the string
$unpacked = str_split($unpacked[1]);
// Define variable
$binaryIP = null;
// "Build" binary IP
foreach($unpacked as $char)
$binaryIP .= str_pad(decbin(ord($char)), 8, '0', STR_PAD_LEFT);
// Return IP
return $binaryIP;
}
// Match IP subnets
public static function matchSubnet($ip, $range) {
// Use the proper IP type
switch(self::ipVersion($ip)) {
case 4:
// Break the range up in parts
list($subnet, $bits) = explode('/', $range);
// Convert IP and Subnet to long
$ip = ip2long($ip);
$subnet = ip2long($subnet);
$mask = -1 << (32 - $bits);
// In case the supplied subnet wasn't correctly aligned
$subnet &= $mask;
// Return true if IP is in subnet
return ($ip & $mask) == $subnet;
case 6:
// Break the range up in parts
list($subnet, $bits) = explode('/', $range);
// Convert subnet to packed address and convert it to binary
$subnet = inet_pton($subnet);
$binarySubnet = self::inetToBits($subnet);
// Convert IPv6 to packed address and convert it to binary as well
$ip = inet_pton($ip);
$binaryIP = self::inetToBits($ip);
// Return bits of the strings according to the bits
$ipBits = substr($binaryIP, 0, $bits);
$subnetBits = substr($binarySubnet, 0, $bits);
return ($ipBits === $subnetBits);
default:
return 0;
}
}
// Check if IP is a CloudFlare IP
public static function checkCFIP($ip) {
// Get CloudFlare Subnet list
2015-05-29 19:27:45 +00:00
$cfhosts = file_get_contents(ROOT .'_sakura/'. Configuration::getLocalConfig('data', 'cfipv'. (self::ipVersion($ip))));
2015-04-14 14:27:37 +00:00
// Replace \r\n with \n
$cfhosts = str_replace("\r\n", "\n", $cfhosts);
// Explode the file into an array
$cfhosts = explode("\n", $cfhosts);
// Check if IP is in a CloudFlare subnet
foreach($cfhosts as $subnet) {
// Return true if found
if(self::matchSubnet($ip, $subnet))
return true;
}
// Return false if fails
return false;
}
// Gets IP of current visitor
public static function getRemoteIP() {
// Assign REMOTE_ADDR to a variables
$ip = $_SERVER['REMOTE_ADDR'];
// Check if the IP is a CloudFlare IP
if(self::checkCFIP($ip)) {
// If it is check if the CloudFlare IP header is set and if it is assign it to the ip variable
if(isset($_SERVER['HTTP_CF_CONNECTING_IP']))
$ip = $_SERVER['HTTP_CF_CONNECTING_IP'];
}
// Return the correct IP
return $ip;
}
2015-04-18 18:26:52 +00:00
// Get country code from CloudFlare header (which just returns EU if not found)
public static function getCountryCode() {
2015-04-27 17:04:27 +00:00
// Check if the required header is set and return it
if(isset($_SERVER['HTTP_CF_IPCOUNTRY']))
return $_SERVER['HTTP_CF_IPCOUNTRY'];
2015-04-18 18:26:52 +00:00
// Return EU as a fallback
return 'EU';
}
2015-04-19 13:00:32 +00:00
// Create a new action code
public static function newActionCode($action, $userid, $instruct) {
// Make sure the user we're working with exists
if(Users::getUser($userid)['id'] == 0)
return false;
// Convert the instruction array to a JSON
$instruct = json_encode($instruct);
// Generate a key
$key = sha1(date("r") . time() . $userid . $action . rand(0, 9999));
// Insert the key into the database
Database::insert('actioncodes', [
'action' => $action,
'userid' => $userid,
'actkey' => $key,
'instruction' => $instruct
]);
// Return the key
return $key;
}
// Use an action code
public static function useActionCode($action, $key, $uid = 0) {
// Retrieve the row from the database
$keyRow = Database::fetch('actioncodes', false, [
'actkey' => [$key, '='],
'action' => [$action, '=']
]);
// Check if the code exists
if(count($keyRow) <= 1)
return [0, 'INVALID_CODE'];
// Check if the code was intended for the user that's using this code
if($keyRow['userid'] != 0) {
if($keyRow['userid'] != $uid)
return [0, 'INVALID_USER'];
}
// Remove the key from the database
Database::delete('actioncodes', [
'id' => [$keyRow['id'], '=']
]);
// Return success
return [1, 'SUCCESS', $keyRow['instruction']];
}
2015-04-24 17:48:56 +00:00
// Calculate password entropy
public static function pwdEntropy($pw) {
// Decode utf-8 chars
$pw = utf8_decode($pw);
// Count the amount of unique characters in the password string and calculate the entropy
return count(count_chars($pw, 1)) * log(256, 2);
}
2015-04-27 00:41:59 +00:00
// Get country name from ISO 3166 code
public static function getCountryName($code) {
// Parse JSON file
2015-05-29 19:27:45 +00:00
$iso3166 = json_decode(file_get_contents(ROOT .'_sakura/'. Configuration::getLocalConfig('data', 'iso3166')), true);
2015-04-27 00:41:59 +00:00
// Check if key exists
if(array_key_exists($code, $iso3166))
return $iso3166[$code]; // If entry found return the full name
else
return 'Unknown'; // Else return unknown
}
2015-04-30 14:12:49 +00:00
// Get FAQ data
public static function getFaqData() {
// Do database call
$faq = Database::fetch('faq', true, null, ['id']);
// Return FAQ data
return $faq;
}
2015-05-23 03:31:42 +00:00
// Get log type string
public static function getLogStringFromType($type) {
// Query the database
$return = Database::fetch('logtypes', false, ['id' => [$type, '=']]);
// Check if type exists and else return a unformattable string
if(count($return) < 2)
return 'Unknown action.';
// Return the string
return $return['string'];
}
// Get formatted logs
public static function getUserLogs($uid = 0) {
// Check if a user is specified
$conditions = ($uid ? ['uid' => [$uid, '=']] : null);
// Get data from database
$logsDB = Database::fetch('logs', true, $conditions, ['id', true]);
// Storage array
$logs = array();
// Iterate over entries
foreach($logsDB as $log) {
// Store usable data
$logs[$log['id']] = [
'user' => $_USER = Users::getUser($log['uid']),
'rank' => Users::getRank($_USER['rank_main']),
'string' => vsprintf(self::getLogStringFromType($log['action']), json_decode($log['attribs'], true))
];
}
// Return new logs
return $logs;
}
2015-06-04 12:41:55 +00:00
// Indent JSON
public static function jsonIndent($json) {
// Defines
$tab = ' ';
$out = '';
$lvl = 0;
$str = false;
$obj = json_decode($json);
// Validate the object
if($obj === false)
return false;
// Re-encode the json and get the length
$json = json_encode($obj);
$len = strlen($json);
// Go over the entries
for($c = 0; $c < $len; $c++) {
// Get the current character
$char = $json[$c];
switch($char) {
case '[':
case '{':
if($str) {
$out .= $char;
} else {
$out .= $char ."\r\n". str_repeat($tab, $lvl + 1);
$lvl++;
}
break;
case ']':
case '}':
if($str) {
$out .= $char;
2015-05-24 22:06:53 +00:00
2015-06-04 12:41:55 +00:00
} else {
2015-05-24 22:06:53 +00:00
2015-06-04 12:41:55 +00:00
$lvl--;
$out .= "\r\n". str_repeat($tab, $lvl) . $char;
}
break;
case ',':
if($str) {
$out .= $char;
} else {
$out .= ",\r\n". str_repeat($tab, $lvl);
}
break;
case ':':
if($str) {
$out .= $char;
} else {
$out .= ": ";
}
break;
default:
$out .= $char;
break;
}
}
2015-05-24 22:06:53 +00:00
2015-06-04 12:41:55 +00:00
// Return the indented JSON
return $out;
2015-05-24 22:06:53 +00:00
}
2015-04-01 17:34:36 +00:00
}