@@ -13,91 +13,91 @@ |
||
13 | 13 | |
14 | 14 | class TokenManager |
15 | 15 | { |
16 | - /** |
|
17 | - * Validates a CSRF token |
|
18 | - * |
|
19 | - * @param string $data The token data string itself |
|
20 | - * @param string|null $context Token context for extra validation |
|
21 | - * |
|
22 | - * @return bool |
|
23 | - */ |
|
24 | - public function validateToken($data, $context = null) |
|
25 | - { |
|
26 | - if (!is_string($data) || strlen($data) === 0) { |
|
27 | - // Nothing to validate |
|
28 | - return false; |
|
29 | - } |
|
30 | - |
|
31 | - $tokens = WebRequest::getSessionTokenData(); |
|
32 | - |
|
33 | - // if the token doesn't exist, then it's not valid |
|
34 | - if (!array_key_exists($data, $tokens)) { |
|
35 | - return false; |
|
36 | - } |
|
37 | - |
|
38 | - /** @var Token $token */ |
|
39 | - $token = unserialize($tokens[$data]); |
|
40 | - |
|
41 | - if ($token->getTokenData() !== $data) { |
|
42 | - return false; |
|
43 | - } |
|
44 | - |
|
45 | - if ($token->getContext() !== $context) { |
|
46 | - return false; |
|
47 | - } |
|
48 | - |
|
49 | - if ($token->isUsed()) { |
|
50 | - return false; |
|
51 | - } |
|
52 | - |
|
53 | - // mark the token as used, and save it back to the session |
|
54 | - $token->markAsUsed(); |
|
55 | - $this->storeToken($token); |
|
56 | - |
|
57 | - return true; |
|
58 | - } |
|
59 | - |
|
60 | - /** |
|
61 | - * @param string|null $context An optional context for extra validation |
|
62 | - * |
|
63 | - * @return Token |
|
64 | - */ |
|
65 | - public function getNewToken($context = null) |
|
66 | - { |
|
67 | - $token = new Token($this->generateTokenData(), $context); |
|
68 | - $this->storeToken($token); |
|
69 | - |
|
70 | - return $token; |
|
71 | - } |
|
72 | - |
|
73 | - /** |
|
74 | - * Stores a token in the session data |
|
75 | - * |
|
76 | - * @param Token $token |
|
77 | - */ |
|
78 | - private function storeToken(Token $token) |
|
79 | - { |
|
80 | - $tokens = WebRequest::getSessionTokenData(); |
|
81 | - $tokens[$token->getTokenData()] = serialize($token); |
|
82 | - WebRequest::setSessionTokenData($tokens); |
|
83 | - } |
|
84 | - |
|
85 | - /** |
|
86 | - * Generates a security token |
|
87 | - * |
|
88 | - * @return string |
|
89 | - * @throws Exception |
|
90 | - * |
|
91 | - * @category Security-Critical |
|
92 | - */ |
|
93 | - private function generateTokenData() |
|
94 | - { |
|
95 | - $genBytes = openssl_random_pseudo_bytes(33); |
|
96 | - |
|
97 | - if ($genBytes !== false) { |
|
98 | - return base64_encode($genBytes); |
|
99 | - } |
|
100 | - |
|
101 | - throw new Exception('Unable to generate secure token.'); |
|
102 | - } |
|
16 | + /** |
|
17 | + * Validates a CSRF token |
|
18 | + * |
|
19 | + * @param string $data The token data string itself |
|
20 | + * @param string|null $context Token context for extra validation |
|
21 | + * |
|
22 | + * @return bool |
|
23 | + */ |
|
24 | + public function validateToken($data, $context = null) |
|
25 | + { |
|
26 | + if (!is_string($data) || strlen($data) === 0) { |
|
27 | + // Nothing to validate |
|
28 | + return false; |
|
29 | + } |
|
30 | + |
|
31 | + $tokens = WebRequest::getSessionTokenData(); |
|
32 | + |
|
33 | + // if the token doesn't exist, then it's not valid |
|
34 | + if (!array_key_exists($data, $tokens)) { |
|
35 | + return false; |
|
36 | + } |
|
37 | + |
|
38 | + /** @var Token $token */ |
|
39 | + $token = unserialize($tokens[$data]); |
|
40 | + |
|
41 | + if ($token->getTokenData() !== $data) { |
|
42 | + return false; |
|
43 | + } |
|
44 | + |
|
45 | + if ($token->getContext() !== $context) { |
|
46 | + return false; |
|
47 | + } |
|
48 | + |
|
49 | + if ($token->isUsed()) { |
|
50 | + return false; |
|
51 | + } |
|
52 | + |
|
53 | + // mark the token as used, and save it back to the session |
|
54 | + $token->markAsUsed(); |
|
55 | + $this->storeToken($token); |
|
56 | + |
|
57 | + return true; |
|
58 | + } |
|
59 | + |
|
60 | + /** |
|
61 | + * @param string|null $context An optional context for extra validation |
|
62 | + * |
|
63 | + * @return Token |
|
64 | + */ |
|
65 | + public function getNewToken($context = null) |
|
66 | + { |
|
67 | + $token = new Token($this->generateTokenData(), $context); |
|
68 | + $this->storeToken($token); |
|
69 | + |
|
70 | + return $token; |
|
71 | + } |
|
72 | + |
|
73 | + /** |
|
74 | + * Stores a token in the session data |
|
75 | + * |
|
76 | + * @param Token $token |
|
77 | + */ |
|
78 | + private function storeToken(Token $token) |
|
79 | + { |
|
80 | + $tokens = WebRequest::getSessionTokenData(); |
|
81 | + $tokens[$token->getTokenData()] = serialize($token); |
|
82 | + WebRequest::setSessionTokenData($tokens); |
|
83 | + } |
|
84 | + |
|
85 | + /** |
|
86 | + * Generates a security token |
|
87 | + * |
|
88 | + * @return string |
|
89 | + * @throws Exception |
|
90 | + * |
|
91 | + * @category Security-Critical |
|
92 | + */ |
|
93 | + private function generateTokenData() |
|
94 | + { |
|
95 | + $genBytes = openssl_random_pseudo_bytes(33); |
|
96 | + |
|
97 | + if ($genBytes !== false) { |
|
98 | + return base64_encode($genBytes); |
|
99 | + } |
|
100 | + |
|
101 | + throw new Exception('Unable to generate secure token.'); |
|
102 | + } |
|
103 | 103 | } |
104 | 104 | \ No newline at end of file |
@@ -17,9 +17,9 @@ |
||
17 | 17 | */ |
18 | 18 | class OAuthRequestRouter extends RequestRouter |
19 | 19 | { |
20 | - protected function getRouteFromPath($pathInfo) |
|
21 | - { |
|
22 | - // Hardcode the route for this entry point |
|
23 | - return array(PageOAuth::class, 'callback'); |
|
24 | - } |
|
20 | + protected function getRouteFromPath($pathInfo) |
|
21 | + { |
|
22 | + // Hardcode the route for this entry point |
|
23 | + return array(PageOAuth::class, 'callback'); |
|
24 | + } |
|
25 | 25 | } |
26 | 26 | \ No newline at end of file |
@@ -18,9 +18,9 @@ |
||
18 | 18 | */ |
19 | 19 | interface IRequestRouter |
20 | 20 | { |
21 | - /** |
|
22 | - * @return IRoutedTask |
|
23 | - * @throws Exception |
|
24 | - */ |
|
25 | - public function route(); |
|
21 | + /** |
|
22 | + * @return IRoutedTask |
|
23 | + * @throws Exception |
|
24 | + */ |
|
25 | + public function route(); |
|
26 | 26 | } |
27 | 27 | \ No newline at end of file |
@@ -13,36 +13,36 @@ |
||
13 | 13 | */ |
14 | 14 | class AutoLoader |
15 | 15 | { |
16 | - public static function load($class) |
|
17 | - { |
|
18 | - // handle namespaces sensibly |
|
19 | - if (strpos($class, "Waca") !== false) { |
|
20 | - // strip off the initial namespace |
|
21 | - $class = str_replace("Waca\\", "", $class); |
|
16 | + public static function load($class) |
|
17 | + { |
|
18 | + // handle namespaces sensibly |
|
19 | + if (strpos($class, "Waca") !== false) { |
|
20 | + // strip off the initial namespace |
|
21 | + $class = str_replace("Waca\\", "", $class); |
|
22 | 22 | |
23 | - // swap backslashes for forward slashes to map to directory names |
|
24 | - $class = str_replace("\\", "/", $class); |
|
25 | - } |
|
23 | + // swap backslashes for forward slashes to map to directory names |
|
24 | + $class = str_replace("\\", "/", $class); |
|
25 | + } |
|
26 | 26 | |
27 | - $paths = array( |
|
28 | - __DIR__ . '/' . $class . ".php", |
|
29 | - __DIR__ . '/DataObjects/' . $class . ".php", |
|
30 | - __DIR__ . '/Providers/' . $class . ".php", |
|
31 | - __DIR__ . '/Providers/Interfaces/' . $class . ".php", |
|
32 | - __DIR__ . '/Validation/' . $class . ".php", |
|
33 | - __DIR__ . '/Helpers/' . $class . ".php", |
|
34 | - __DIR__ . '/Helpers/Interfaces/' . $class . ".php", |
|
35 | - __DIR__ . '/' . $class . ".php", |
|
36 | - ); |
|
27 | + $paths = array( |
|
28 | + __DIR__ . '/' . $class . ".php", |
|
29 | + __DIR__ . '/DataObjects/' . $class . ".php", |
|
30 | + __DIR__ . '/Providers/' . $class . ".php", |
|
31 | + __DIR__ . '/Providers/Interfaces/' . $class . ".php", |
|
32 | + __DIR__ . '/Validation/' . $class . ".php", |
|
33 | + __DIR__ . '/Helpers/' . $class . ".php", |
|
34 | + __DIR__ . '/Helpers/Interfaces/' . $class . ".php", |
|
35 | + __DIR__ . '/' . $class . ".php", |
|
36 | + ); |
|
37 | 37 | |
38 | - foreach ($paths as $file) { |
|
39 | - if (file_exists($file)) { |
|
40 | - require_once($file); |
|
41 | - } |
|
38 | + foreach ($paths as $file) { |
|
39 | + if (file_exists($file)) { |
|
40 | + require_once($file); |
|
41 | + } |
|
42 | 42 | |
43 | - if (class_exists($class)) { |
|
44 | - return; |
|
45 | - } |
|
46 | - } |
|
47 | - } |
|
43 | + if (class_exists($class)) { |
|
44 | + return; |
|
45 | + } |
|
46 | + } |
|
47 | + } |
|
48 | 48 | } |
@@ -25,14 +25,14 @@ |
||
25 | 25 | } |
26 | 26 | |
27 | 27 | $paths = array( |
28 | - __DIR__ . '/' . $class . ".php", |
|
29 | - __DIR__ . '/DataObjects/' . $class . ".php", |
|
30 | - __DIR__ . '/Providers/' . $class . ".php", |
|
31 | - __DIR__ . '/Providers/Interfaces/' . $class . ".php", |
|
32 | - __DIR__ . '/Validation/' . $class . ".php", |
|
33 | - __DIR__ . '/Helpers/' . $class . ".php", |
|
34 | - __DIR__ . '/Helpers/Interfaces/' . $class . ".php", |
|
35 | - __DIR__ . '/' . $class . ".php", |
|
28 | + __DIR__.'/'.$class.".php", |
|
29 | + __DIR__.'/DataObjects/'.$class.".php", |
|
30 | + __DIR__.'/Providers/'.$class.".php", |
|
31 | + __DIR__.'/Providers/Interfaces/'.$class.".php", |
|
32 | + __DIR__.'/Validation/'.$class.".php", |
|
33 | + __DIR__.'/Helpers/'.$class.".php", |
|
34 | + __DIR__.'/Helpers/Interfaces/'.$class.".php", |
|
35 | + __DIR__.'/'.$class.".php", |
|
36 | 36 | ); |
37 | 37 | |
38 | 38 | foreach ($paths as $file) { |
@@ -10,77 +10,77 @@ |
||
10 | 10 | |
11 | 11 | class StringFunctions |
12 | 12 | { |
13 | - /** |
|
14 | - * Formats a string to be used as a username. |
|
15 | - * |
|
16 | - * @param $username |
|
17 | - * |
|
18 | - * @return string |
|
19 | - */ |
|
20 | - public function formatAsUsername($username) |
|
21 | - { |
|
22 | - // trim whitespace from the ends |
|
23 | - $uname = mb_ereg_replace("^[ \t]+|[ \t]+$", "", $username); |
|
13 | + /** |
|
14 | + * Formats a string to be used as a username. |
|
15 | + * |
|
16 | + * @param $username |
|
17 | + * |
|
18 | + * @return string |
|
19 | + */ |
|
20 | + public function formatAsUsername($username) |
|
21 | + { |
|
22 | + // trim whitespace from the ends |
|
23 | + $uname = mb_ereg_replace("^[ \t]+|[ \t]+$", "", $username); |
|
24 | 24 | |
25 | - // convert first char to uppercase |
|
26 | - $uname = $this->ucfirst($uname); |
|
25 | + // convert first char to uppercase |
|
26 | + $uname = $this->ucfirst($uname); |
|
27 | 27 | |
28 | - // replace spaces with underscores |
|
29 | - $uname = mb_ereg_replace("[ ]+", "_", $uname); |
|
28 | + // replace spaces with underscores |
|
29 | + $uname = mb_ereg_replace("[ ]+", "_", $uname); |
|
30 | 30 | |
31 | - // trim underscores from the end |
|
32 | - $uname = mb_ereg_replace("[_]+$", "", $uname); |
|
31 | + // trim underscores from the end |
|
32 | + $uname = mb_ereg_replace("[_]+$", "", $uname); |
|
33 | 33 | |
34 | - return $uname; |
|
35 | - } |
|
34 | + return $uname; |
|
35 | + } |
|
36 | 36 | |
37 | - /** |
|
38 | - * Formats a string to be used as an email (specifically strips whitespace |
|
39 | - * from the beginning/end of the Email, as well as immediately before/after |
|
40 | - * the @ in the Email). |
|
41 | - * |
|
42 | - * @param $email |
|
43 | - * |
|
44 | - * @return string |
|
45 | - */ |
|
46 | - public static function formatAsEmail($email) |
|
47 | - { |
|
48 | - // trim whitespace from the ends |
|
49 | - $newemail = mb_ereg_replace("^[ \t]+|[ \t]+$", "", $email); |
|
37 | + /** |
|
38 | + * Formats a string to be used as an email (specifically strips whitespace |
|
39 | + * from the beginning/end of the Email, as well as immediately before/after |
|
40 | + * the @ in the Email). |
|
41 | + * |
|
42 | + * @param $email |
|
43 | + * |
|
44 | + * @return string |
|
45 | + */ |
|
46 | + public static function formatAsEmail($email) |
|
47 | + { |
|
48 | + // trim whitespace from the ends |
|
49 | + $newemail = mb_ereg_replace("^[ \t]+|[ \t]+$", "", $email); |
|
50 | 50 | |
51 | - // trim whitespace from around the email address |
|
52 | - $newemail = mb_ereg_replace("[ \t]+@", "@", $newemail); |
|
53 | - $newemail = mb_ereg_replace("@[ \t]+", "@", $newemail); |
|
51 | + // trim whitespace from around the email address |
|
52 | + $newemail = mb_ereg_replace("[ \t]+@", "@", $newemail); |
|
53 | + $newemail = mb_ereg_replace("@[ \t]+", "@", $newemail); |
|
54 | 54 | |
55 | - return $newemail; |
|
56 | - } |
|
55 | + return $newemail; |
|
56 | + } |
|
57 | 57 | |
58 | - /** |
|
59 | - * Returns true if a string is a multibyte string |
|
60 | - * |
|
61 | - * @param string $string |
|
62 | - * |
|
63 | - * @return bool |
|
64 | - */ |
|
65 | - public function isMultibyte($string) |
|
66 | - { |
|
67 | - return strlen($string) !== mb_strlen($string); |
|
68 | - } |
|
58 | + /** |
|
59 | + * Returns true if a string is a multibyte string |
|
60 | + * |
|
61 | + * @param string $string |
|
62 | + * |
|
63 | + * @return bool |
|
64 | + */ |
|
65 | + public function isMultibyte($string) |
|
66 | + { |
|
67 | + return strlen($string) !== mb_strlen($string); |
|
68 | + } |
|
69 | 69 | |
70 | - /** |
|
71 | - * Make a string's first character uppercase |
|
72 | - * |
|
73 | - * @param string $string |
|
74 | - * |
|
75 | - * @return string |
|
76 | - */ |
|
77 | - public function ucfirst($string) |
|
78 | - { |
|
79 | - if (ord($string) < 128) { |
|
80 | - return ucfirst($string); |
|
81 | - } |
|
82 | - else { |
|
83 | - return mb_strtoupper(mb_substr($string, 0, 1)) . mb_substr($string, 1); |
|
84 | - } |
|
85 | - } |
|
70 | + /** |
|
71 | + * Make a string's first character uppercase |
|
72 | + * |
|
73 | + * @param string $string |
|
74 | + * |
|
75 | + * @return string |
|
76 | + */ |
|
77 | + public function ucfirst($string) |
|
78 | + { |
|
79 | + if (ord($string) < 128) { |
|
80 | + return ucfirst($string); |
|
81 | + } |
|
82 | + else { |
|
83 | + return mb_strtoupper(mb_substr($string, 0, 1)) . mb_substr($string, 1); |
|
84 | + } |
|
85 | + } |
|
86 | 86 | } |
@@ -80,7 +80,7 @@ |
||
80 | 80 | return ucfirst($string); |
81 | 81 | } |
82 | 82 | else { |
83 | - return mb_strtoupper(mb_substr($string, 0, 1)) . mb_substr($string, 1); |
|
83 | + return mb_strtoupper(mb_substr($string, 0, 1)).mb_substr($string, 1); |
|
84 | 84 | } |
85 | 85 | } |
86 | 86 | } |
@@ -13,14 +13,14 @@ |
||
13 | 13 | |
14 | 14 | class UpdateTorExitTask extends ConsoleTaskBase |
15 | 15 | { |
16 | - /** |
|
17 | - * @return void |
|
18 | - */ |
|
19 | - public function execute() |
|
20 | - { |
|
21 | - TorExitProvider::regenerate( |
|
22 | - $this->getDatabase(), |
|
23 | - $this->getHttpHelper(), |
|
24 | - $this->getSiteConfiguration()->getTorExitPaths()); |
|
25 | - } |
|
16 | + /** |
|
17 | + * @return void |
|
18 | + */ |
|
19 | + public function execute() |
|
20 | + { |
|
21 | + TorExitProvider::regenerate( |
|
22 | + $this->getDatabase(), |
|
23 | + $this->getHttpHelper(), |
|
24 | + $this->getSiteConfiguration()->getTorExitPaths()); |
|
25 | + } |
|
26 | 26 | } |
27 | 27 | \ No newline at end of file |
@@ -12,14 +12,14 @@ discard block |
||
12 | 12 | |
13 | 13 | class ClearOAuthDataTask extends ConsoleTaskBase |
14 | 14 | { |
15 | - public function execute() |
|
16 | - { |
|
17 | - // @fixme this is unsafe. |
|
18 | - // What we should be doing is iterating over all OAuth users, fetching their username, and updating the onwiki |
|
19 | - // name for the user at the same time as blatting out the OAuth credentials, otherwise we risk losing all links |
|
20 | - // to the user's onwiki account. |
|
15 | + public function execute() |
|
16 | + { |
|
17 | + // @fixme this is unsafe. |
|
18 | + // What we should be doing is iterating over all OAuth users, fetching their username, and updating the onwiki |
|
19 | + // name for the user at the same time as blatting out the OAuth credentials, otherwise we risk losing all links |
|
20 | + // to the user's onwiki account. |
|
21 | 21 | |
22 | - $this->getDatabase()->exec(<<<SQL |
|
22 | + $this->getDatabase()->exec(<<<SQL |
|
23 | 23 | UPDATE user |
24 | 24 | SET |
25 | 25 | oauthrequesttoken = NULL, |
@@ -28,6 +28,6 @@ discard block |
||
28 | 28 | oauthaccesssecret = NULL, |
29 | 29 | oauthidentitycache = NULL; |
30 | 30 | SQL |
31 | - ); |
|
32 | - } |
|
31 | + ); |
|
32 | + } |
|
33 | 33 | } |
34 | 34 | \ No newline at end of file |
@@ -16,152 +16,152 @@ |
||
16 | 16 | |
17 | 17 | class RecreateTrustedIpTableTask extends ConsoleTaskBase |
18 | 18 | { |
19 | - public function execute() |
|
20 | - { |
|
21 | - |
|
22 | - echo "Fetching file...\n"; |
|
23 | - |
|
24 | - $htmlfile = file($this->getSiteConfiguration()->getXffTrustedHostsFile(), |
|
25 | - FILE_IGNORE_NEW_LINES | FILE_SKIP_EMPTY_LINES); |
|
26 | - |
|
27 | - $ip = array(); |
|
28 | - $iprange = array(); |
|
29 | - $dnsdomain = array(); |
|
30 | - |
|
31 | - echo "Sorting file...\n"; |
|
32 | - $this->readFile($htmlfile, $iprange, $ip, $dnsdomain); |
|
33 | - |
|
34 | - echo "Exploding CIDRs...\n"; |
|
35 | - $this->explodeCidrs($iprange, $ip); |
|
36 | - |
|
37 | - echo "Resolving DNS...\n"; |
|
38 | - $this->resolveDns($dnsdomain, $ip); |
|
39 | - |
|
40 | - echo "Uniq-ing array...\n"; |
|
41 | - |
|
42 | - $ip = array_unique($ip); |
|
43 | - |
|
44 | - $database = $this->getDatabase(); |
|
45 | - |
|
46 | - $database->exec('DELETE FROM xfftrustcache;'); |
|
47 | - |
|
48 | - $insert = $database->prepare('INSERT INTO xfftrustcache (ip) VALUES (:ip);'); |
|
49 | - |
|
50 | - $this->doInserts($ip, $insert); |
|
51 | - } |
|
52 | - |
|
53 | - /** |
|
54 | - * @param string[] $dnsDomains the DNS domains to resolve |
|
55 | - * @param string[] $ipAddresses existing array of IPs to add to |
|
56 | - */ |
|
57 | - protected function resolveDns($dnsDomains, &$ipAddresses) |
|
58 | - { |
|
59 | - foreach ($dnsDomains as $domain) { |
|
60 | - $ipList = gethostbynamel($domain); |
|
61 | - |
|
62 | - if ($ipList === false) { |
|
63 | - echo "Invalid DNS name $domain\n"; |
|
64 | - continue; |
|
65 | - } |
|
66 | - |
|
67 | - foreach ($ipList as $ipAddress) { |
|
68 | - $ipAddresses[] = $ipAddress; |
|
69 | - } |
|
70 | - |
|
71 | - // don't DoS |
|
72 | - usleep(10000); |
|
73 | - } |
|
74 | - } |
|
75 | - |
|
76 | - /** |
|
77 | - * @param $iprange |
|
78 | - * @param $ip |
|
79 | - */ |
|
80 | - protected function explodeCidrs($iprange, &$ip) |
|
81 | - { |
|
82 | - foreach ($iprange as $r) { |
|
83 | - $ips = $this->getXffTrustProvider()->explodeCidr($r); |
|
84 | - |
|
85 | - foreach ($ips as $i) { |
|
86 | - $ip[] = $i; |
|
87 | - } |
|
88 | - } |
|
89 | - } |
|
90 | - |
|
91 | - /** |
|
92 | - * @param $htmlfile |
|
93 | - * @param $iprange |
|
94 | - * @param $ip |
|
95 | - * @param $dnsdomain |
|
96 | - */ |
|
97 | - protected function readFile($htmlfile, &$iprange, &$ip, &$dnsdomain) |
|
98 | - { |
|
99 | - foreach ($htmlfile as $line_num => $rawline) { |
|
100 | - // remove the comments |
|
101 | - $hashPos = strpos($rawline, '#'); |
|
102 | - if ($hashPos !== false) { |
|
103 | - $line = substr($rawline, 0, $hashPos); |
|
104 | - } |
|
105 | - else { |
|
106 | - $line = $rawline; |
|
107 | - } |
|
108 | - |
|
109 | - $line = trim($line); |
|
110 | - |
|
111 | - // this was a comment or empty line... |
|
112 | - if ($line == "") { |
|
113 | - continue; |
|
114 | - } |
|
115 | - |
|
116 | - // match a regex of an CIDR range: |
|
117 | - $ipcidr = '@' . RegexConstants::IPV4 . RegexConstants::IPV4_CIDR . '@'; |
|
118 | - if (preg_match($ipcidr, $line) === 1) { |
|
119 | - $iprange[] = $line; |
|
120 | - continue; |
|
121 | - } |
|
122 | - |
|
123 | - $ipnoncidr = '@' . RegexConstants::IPV4 . '@'; |
|
124 | - if (preg_match($ipnoncidr, $line) === 1) { |
|
125 | - $ip[] = $line; |
|
126 | - continue; |
|
127 | - } |
|
128 | - |
|
129 | - // it's probably a DNS name. |
|
130 | - $dnsdomain[] = $line; |
|
131 | - } |
|
132 | - } |
|
133 | - |
|
134 | - /** |
|
135 | - * @param array $ip |
|
136 | - * @param PDOStatement $insert |
|
137 | - * |
|
138 | - * @throws Exception |
|
139 | - */ |
|
140 | - protected function doInserts($ip, PDOStatement $insert) |
|
141 | - { |
|
142 | - $successful = true; |
|
143 | - |
|
144 | - foreach ($ip as $i) { |
|
145 | - if (count($i) > 15) { |
|
146 | - echo "Rejected $i\n"; |
|
147 | - $successful = false; |
|
148 | - |
|
149 | - continue; |
|
150 | - } |
|
151 | - |
|
152 | - try { |
|
153 | - $insert->execute(array(':ip' => $i)); |
|
154 | - } |
|
155 | - catch (PDOException $ex) { |
|
156 | - echo "Exception on $i :\n"; |
|
157 | - echo $ex->getMessage(); |
|
158 | - $successful = false; |
|
159 | - break; |
|
160 | - } |
|
161 | - } |
|
162 | - |
|
163 | - if (!$successful) { |
|
164 | - throw new Exception('Encountered errors during transaction processing'); |
|
165 | - } |
|
166 | - } |
|
19 | + public function execute() |
|
20 | + { |
|
21 | + |
|
22 | + echo "Fetching file...\n"; |
|
23 | + |
|
24 | + $htmlfile = file($this->getSiteConfiguration()->getXffTrustedHostsFile(), |
|
25 | + FILE_IGNORE_NEW_LINES | FILE_SKIP_EMPTY_LINES); |
|
26 | + |
|
27 | + $ip = array(); |
|
28 | + $iprange = array(); |
|
29 | + $dnsdomain = array(); |
|
30 | + |
|
31 | + echo "Sorting file...\n"; |
|
32 | + $this->readFile($htmlfile, $iprange, $ip, $dnsdomain); |
|
33 | + |
|
34 | + echo "Exploding CIDRs...\n"; |
|
35 | + $this->explodeCidrs($iprange, $ip); |
|
36 | + |
|
37 | + echo "Resolving DNS...\n"; |
|
38 | + $this->resolveDns($dnsdomain, $ip); |
|
39 | + |
|
40 | + echo "Uniq-ing array...\n"; |
|
41 | + |
|
42 | + $ip = array_unique($ip); |
|
43 | + |
|
44 | + $database = $this->getDatabase(); |
|
45 | + |
|
46 | + $database->exec('DELETE FROM xfftrustcache;'); |
|
47 | + |
|
48 | + $insert = $database->prepare('INSERT INTO xfftrustcache (ip) VALUES (:ip);'); |
|
49 | + |
|
50 | + $this->doInserts($ip, $insert); |
|
51 | + } |
|
52 | + |
|
53 | + /** |
|
54 | + * @param string[] $dnsDomains the DNS domains to resolve |
|
55 | + * @param string[] $ipAddresses existing array of IPs to add to |
|
56 | + */ |
|
57 | + protected function resolveDns($dnsDomains, &$ipAddresses) |
|
58 | + { |
|
59 | + foreach ($dnsDomains as $domain) { |
|
60 | + $ipList = gethostbynamel($domain); |
|
61 | + |
|
62 | + if ($ipList === false) { |
|
63 | + echo "Invalid DNS name $domain\n"; |
|
64 | + continue; |
|
65 | + } |
|
66 | + |
|
67 | + foreach ($ipList as $ipAddress) { |
|
68 | + $ipAddresses[] = $ipAddress; |
|
69 | + } |
|
70 | + |
|
71 | + // don't DoS |
|
72 | + usleep(10000); |
|
73 | + } |
|
74 | + } |
|
75 | + |
|
76 | + /** |
|
77 | + * @param $iprange |
|
78 | + * @param $ip |
|
79 | + */ |
|
80 | + protected function explodeCidrs($iprange, &$ip) |
|
81 | + { |
|
82 | + foreach ($iprange as $r) { |
|
83 | + $ips = $this->getXffTrustProvider()->explodeCidr($r); |
|
84 | + |
|
85 | + foreach ($ips as $i) { |
|
86 | + $ip[] = $i; |
|
87 | + } |
|
88 | + } |
|
89 | + } |
|
90 | + |
|
91 | + /** |
|
92 | + * @param $htmlfile |
|
93 | + * @param $iprange |
|
94 | + * @param $ip |
|
95 | + * @param $dnsdomain |
|
96 | + */ |
|
97 | + protected function readFile($htmlfile, &$iprange, &$ip, &$dnsdomain) |
|
98 | + { |
|
99 | + foreach ($htmlfile as $line_num => $rawline) { |
|
100 | + // remove the comments |
|
101 | + $hashPos = strpos($rawline, '#'); |
|
102 | + if ($hashPos !== false) { |
|
103 | + $line = substr($rawline, 0, $hashPos); |
|
104 | + } |
|
105 | + else { |
|
106 | + $line = $rawline; |
|
107 | + } |
|
108 | + |
|
109 | + $line = trim($line); |
|
110 | + |
|
111 | + // this was a comment or empty line... |
|
112 | + if ($line == "") { |
|
113 | + continue; |
|
114 | + } |
|
115 | + |
|
116 | + // match a regex of an CIDR range: |
|
117 | + $ipcidr = '@' . RegexConstants::IPV4 . RegexConstants::IPV4_CIDR . '@'; |
|
118 | + if (preg_match($ipcidr, $line) === 1) { |
|
119 | + $iprange[] = $line; |
|
120 | + continue; |
|
121 | + } |
|
122 | + |
|
123 | + $ipnoncidr = '@' . RegexConstants::IPV4 . '@'; |
|
124 | + if (preg_match($ipnoncidr, $line) === 1) { |
|
125 | + $ip[] = $line; |
|
126 | + continue; |
|
127 | + } |
|
128 | + |
|
129 | + // it's probably a DNS name. |
|
130 | + $dnsdomain[] = $line; |
|
131 | + } |
|
132 | + } |
|
133 | + |
|
134 | + /** |
|
135 | + * @param array $ip |
|
136 | + * @param PDOStatement $insert |
|
137 | + * |
|
138 | + * @throws Exception |
|
139 | + */ |
|
140 | + protected function doInserts($ip, PDOStatement $insert) |
|
141 | + { |
|
142 | + $successful = true; |
|
143 | + |
|
144 | + foreach ($ip as $i) { |
|
145 | + if (count($i) > 15) { |
|
146 | + echo "Rejected $i\n"; |
|
147 | + $successful = false; |
|
148 | + |
|
149 | + continue; |
|
150 | + } |
|
151 | + |
|
152 | + try { |
|
153 | + $insert->execute(array(':ip' => $i)); |
|
154 | + } |
|
155 | + catch (PDOException $ex) { |
|
156 | + echo "Exception on $i :\n"; |
|
157 | + echo $ex->getMessage(); |
|
158 | + $successful = false; |
|
159 | + break; |
|
160 | + } |
|
161 | + } |
|
162 | + |
|
163 | + if (!$successful) { |
|
164 | + throw new Exception('Encountered errors during transaction processing'); |
|
165 | + } |
|
166 | + } |
|
167 | 167 | } |
168 | 168 | \ No newline at end of file |
@@ -114,13 +114,13 @@ |
||
114 | 114 | } |
115 | 115 | |
116 | 116 | // match a regex of an CIDR range: |
117 | - $ipcidr = '@' . RegexConstants::IPV4 . RegexConstants::IPV4_CIDR . '@'; |
|
117 | + $ipcidr = '@'.RegexConstants::IPV4.RegexConstants::IPV4_CIDR.'@'; |
|
118 | 118 | if (preg_match($ipcidr, $line) === 1) { |
119 | 119 | $iprange[] = $line; |
120 | 120 | continue; |
121 | 121 | } |
122 | 122 | |
123 | - $ipnoncidr = '@' . RegexConstants::IPV4 . '@'; |
|
123 | + $ipnoncidr = '@'.RegexConstants::IPV4.'@'; |
|
124 | 124 | if (preg_match($ipnoncidr, $line) === 1) { |
125 | 125 | $ip[] = $line; |
126 | 126 | continue; |
@@ -13,11 +13,11 @@ |
||
13 | 13 | |
14 | 14 | class ClearExpiredIdentificationData extends ConsoleTaskBase |
15 | 15 | { |
16 | - /** |
|
17 | - * @return void |
|
18 | - */ |
|
19 | - public function execute() |
|
20 | - { |
|
21 | - IdentificationVerifier::clearExpiredCacheEntries($this->getSiteConfiguration(), $this->getDatabase()); |
|
22 | - } |
|
16 | + /** |
|
17 | + * @return void |
|
18 | + */ |
|
19 | + public function execute() |
|
20 | + { |
|
21 | + IdentificationVerifier::clearExpiredCacheEntries($this->getSiteConfiguration(), $this->getDatabase()); |
|
22 | + } |
|
23 | 23 | } |