aur.inc.php 14.2 KB
Newer Older
1
<?php
2
set_include_path(get_include_path() . PATH_SEPARATOR . '../lib' . PATH_SEPARATOR . '../template');
pjmattal's avatar
pjmattal committed
3
header('Content-Type: text/html; charset=utf-8');
simo's avatar
simo committed
4
5
6
header('Cache-Control: no-cache, must-revalidate');
header('Expires: Tue, 11 Oct 1988 22:00:00 GMT'); // quite a special day
header('Pragma: no-cache');
7

Dan McGee's avatar
Dan McGee committed
8
9
date_default_timezone_set('UTC');

10
include_once('translator.inc.php');
11
12
set_lang();

13
include_once("config.inc.php");
14
include_once("DB.class.php");
15
include_once("routing.inc.php");
16
17
include_once("version.inc.php");
include_once("acctfuncs.inc.php");
18
include_once("cachefuncs.inc.php");
elij's avatar
elij committed
19

20
21
22
23
24
25
26
27
28
29
30
31
/**
 * Check if a visitor is logged in
 *
 * Query "Sessions" table with supplied cookie. Determine if the cookie is valid
 * or not. Unset the cookie if invalid or session timeout reached. Update the
 * session timeout if it is still valid.
 *
 * @global array $_COOKIE User cookie values
 * @global string $LOGIN_TIMEOUT Time until session times out
 *
 * @return void
 */
32
function check_sid() {
eric's avatar
eric committed
33
	global $_COOKIE;
eric's avatar
eric committed
34
	global $LOGIN_TIMEOUT;
eric's avatar
eric committed
35

Loui Chang's avatar
Loui Chang committed
36
	if (isset($_COOKIE["AURSID"])) {
eric's avatar
eric committed
37
38
39
		$failed = 0;
		# the visitor is logged in, try and update the session
		#
40
		$dbh = DB::connect();
eric's avatar
eric committed
41
		$q = "SELECT LastUpdateTS, UNIX_TIMESTAMP() FROM Sessions ";
canyonknight's avatar
canyonknight committed
42
43
44
45
46
		$q.= "WHERE SessionID = " . $dbh->quote($_COOKIE["AURSID"]);
		$result = $dbh->query($q);
		$row = $result->fetch(PDO::FETCH_NUM);

		if (!$row[0]) {
eric's avatar
eric committed
47
48
			# Invalid SessionID - hacker alert!
			#
eric's avatar
eric committed
49
50
			$failed = 1;
		} else {
51
52
			$last_update = $row[0];
			if ($last_update + $LOGIN_TIMEOUT <= $row[1]) {
eric's avatar
eric committed
53
				$failed = 2;
eric's avatar
eric committed
54
55
			}
		}
56

eric's avatar
eric committed
57
58
		if ($failed == 1) {
			# clear out the hacker's cookie, and send them to a naughty page
59
			# why do you have to be so harsh on these people!?
eric's avatar
eric committed
60
			#
61
			setcookie("AURSID", "", 1, "/", null, !empty($_SERVER['HTTPS']), true);
62
			unset($_COOKIE['AURSID']);
eric's avatar
eric committed
63
		} elseif ($failed == 2) {
Dan McGee's avatar
Dan McGee committed
64
			# session id timeout was reached and they must login again.
eric's avatar
eric committed
65
			#
66
			delete_session_id($_COOKIE["AURSID"]);
eric's avatar
eric committed
67

68
			setcookie("AURSID", "", 1, "/", null, !empty($_SERVER['HTTPS']), true);
69
			unset($_COOKIE['AURSID']);
eric's avatar
eric committed
70
71
72
		} else {
			# still logged in and haven't reached the timeout, go ahead
			# and update the idle timestamp
73
74
75

			# Only update the timestamp if it is less than the
			# current time plus $LOGIN_TIMEOUT.
eric's avatar
eric committed
76
			#
77
78
79
80
			# This keeps 'remembered' sessions from being
			# overwritten.
			if ($last_update < time() + $LOGIN_TIMEOUT) {
				$q = "UPDATE Sessions SET LastUpdateTS = UNIX_TIMESTAMP() ";
canyonknight's avatar
canyonknight committed
81
82
				$q.= "WHERE SessionID = " . $dbh->quote($_COOKIE["AURSID"]);
				$dbh->exec($q);
83
			}
eric's avatar
eric committed
84
85
86
87
88
		}
	}
	return;
}

89
90
91
92
93
/**
 * Verify the supplied CSRF token matches expected token
 *
 * @return bool True if the CSRF token is the same as the cookie SID, otherwise false
 */
94
function check_token() {
95
	if (isset($_POST['token']) && isset($_COOKIE['AURSID'])) {
96
97
98
99
100
101
		return ($_POST['token'] == $_COOKIE['AURSID']);
	} else {
		return false;
	}
}

102
103
104
105
106
107
108
/**
 * Verify a user supplied e-mail against RFC 3696 and DNS records
 *
 * @param string $addy E-mail address being validated in foo@example.com format
 *
 * @return bool True if e-mail passes validity checks, otherwise false
 */
eric's avatar
eric committed
109
function valid_email($addy) {
110
111
112
113
114
115
116
117
118
119
120
121
	// check against RFC 3696
	if (filter_var($addy, FILTER_VALIDATE_EMAIL) === false) {
		return false;
	}

	// check dns for mx, a, aaaa records
	list($local, $domain) = explode('@', $addy);
	if (!(checkdnsrr($domain, 'MX') || checkdnsrr($domain, 'A') || checkdnsrr($domain, 'AAAA'))) {
		return false;
	}

	return true;
eric's avatar
eric committed
122
123
}

124
125
126
127
128
/**
 * Generate a unique session ID
 *
 * @return string MD5 hash of the concatenated user IP, random number, and current time
 */
eric's avatar
eric committed
129
function new_sid() {
130
	return md5($_SERVER['REMOTE_ADDR'] . uniqid(mt_rand(), true));
eric's avatar
eric committed
131
132
}

133
134
135
136
137
138
139
/**
 * Determine the user's username in the database using a user ID
 *
 * @param string $id User's ID
 *
 * @return string Username if it exists, otherwise "None"
 */
140
function username_from_id($id="") {
141
142
143
	if (!$id) {
		return "";
	}
144
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
145
146
	$q = "SELECT Username FROM Users WHERE ID = " . $dbh->quote($id);
	$result = $dbh->query($q);
147
148
149
	if (!$result) {
		return "None";
	}
canyonknight's avatar
canyonknight committed
150
	$row = $result->fetch(PDO::FETCH_NUM);
151
152
153
154

	return $row[0];
}

155
156
157
158
159
160
161
/**
 * Determine the user's username in the database using a session ID
 *
 * @param string $sid User's session ID
 *
 * @return string Username of the visitor
 */
162
function username_from_sid($sid="") {
eric's avatar
eric committed
163
164
165
	if (!$sid) {
		return "";
	}
166
	$dbh = DB::connect();
eric's avatar
eric committed
167
168
169
	$q = "SELECT Username ";
	$q.= "FROM Users, Sessions ";
	$q.= "WHERE Users.ID = Sessions.UsersID ";
canyonknight's avatar
canyonknight committed
170
171
	$q.= "AND Sessions.SessionID = " . $dbh->quote($sid);
	$result = $dbh->query($q);
eric's avatar
eric committed
172
173
174
	if (!$result) {
		return "";
	}
canyonknight's avatar
canyonknight committed
175
	$row = $result->fetch(PDO::FETCH_NUM);
eric's avatar
eric committed
176
177
178
179

	return $row[0];
}

180
181
182
183
184
185
186
/**
 * Determine the user's e-mail address in the database using a session ID
 *
 * @param string $sid User's session ID
 *
 * @return string User's e-mail address as given during registration
 */
187
function email_from_sid($sid="") {
eric's avatar
eric committed
188
189
190
	if (!$sid) {
		return "";
	}
191
	$dbh = DB::connect();
eric's avatar
eric committed
192
193
194
	$q = "SELECT Email ";
	$q.= "FROM Users, Sessions ";
	$q.= "WHERE Users.ID = Sessions.UsersID ";
canyonknight's avatar
canyonknight committed
195
196
	$q.= "AND Sessions.SessionID = " . $dbh->quote($sid);
	$result = $dbh->query($q);
eric's avatar
eric committed
197
198
199
	if (!$result) {
		return "";
	}
canyonknight's avatar
canyonknight committed
200
	$row = $result->fetch(PDO::FETCH_NUM);
eric's avatar
eric committed
201
202
203
204

	return $row[0];
}

205
206
207
208
209
210
211
/**
 * Determine the user's account type in the database using a session ID
 *
 * @param string $sid User's session ID
 *
 * @return string Account type of user ("User", "Trusted User", or "Developer")
 */
212
function account_from_sid($sid="") {
eric's avatar
eric committed
213
214
215
	if (!$sid) {
		return "";
	}
216
	$dbh = DB::connect();
eric's avatar
eric committed
217
218
219
	$q = "SELECT AccountType ";
	$q.= "FROM Users, AccountTypes, Sessions ";
	$q.= "WHERE Users.ID = Sessions.UsersID ";
220
	$q.= "AND AccountTypes.ID = Users.AccountTypeID ";
canyonknight's avatar
canyonknight committed
221
222
	$q.= "AND Sessions.SessionID = " . $dbh->quote($sid);
	$result = $dbh->query($q);
eric's avatar
eric committed
223
224
225
	if (!$result) {
		return "";
	}
canyonknight's avatar
canyonknight committed
226
	$row = $result->fetch(PDO::FETCH_NUM);
eric's avatar
eric committed
227
228
229

	return $row[0];
}
230

231
232
233
234
235
236
237
/**
 * Determine the user's ID in the database using a session ID
 *
 * @param string $sid User's session ID
 *
 * @return string|int The user's name, 0 on query failure
 */
238
function uid_from_sid($sid="") {
239
240
241
	if (!$sid) {
		return "";
	}
242
	$dbh = DB::connect();
243
244
245
	$q = "SELECT Users.ID ";
	$q.= "FROM Users, Sessions ";
	$q.= "WHERE Users.ID = Sessions.UsersID ";
canyonknight's avatar
canyonknight committed
246
247
	$q.= "AND Sessions.SessionID = " . $dbh->quote($sid);
	$result = $dbh->query($q);
248
249
250
	if (!$result) {
		return 0;
	}
canyonknight's avatar
canyonknight committed
251
	$row = $result->fetch(PDO::FETCH_NUM);
252
253
254
255

	return $row[0];
}

256
257
258
259
260
261
262
263
264
/**
 * Common AUR header displayed on all pages
 *
 * @global string $LANG Language selected by the visitor
 * @global array $SUPPORTED_LANGS Languages that are supported by the AUR
 * @param string $title Name of the AUR page to be displayed on browser
 *
 * @return void
 */
265
function html_header($title="", $details=array()) {
266
267
	global $AUR_LOCATION;
	global $DISABLE_HTTP_LOGIN;
268
	global $LANG;
269
	global $SUPPORTED_LANGS;
270

271
272
	include('header.php');
	return;
273
274
}

275
276
277
278
279
280
281
/**
 * Common AUR footer displayed on all pages
 *
 * @param string $ver The AUR version
 *
 * @return void
 */
282
function html_footer($ver="") {
283
	include('footer.php');
284
285
286
	return;
}

287
288
289
290
291
292
293
294
/**
 * Determine if a user has permission to submit a package
 *
 * @param string $name Name of the package to be submitted
 * @param string $sid User's session ID
 *
 * @return int 0 if the user can't submit, 1 if the user can submit
 */
295
function can_submit_pkgbase($name="", $sid="") {
eric's avatar
eric committed
296
	if (!$name || !$sid) {return 0;}
297
	$dbh = DB::connect();
Dan McGee's avatar
Dan McGee committed
298
	$q = "SELECT MaintainerUID ";
299
	$q.= "FROM PackageBases WHERE Name = " . $dbh->quote($name);
canyonknight's avatar
canyonknight committed
300
301
302
303
304
305
	$result = $dbh->query($q);
	$row = $result->fetch(PDO::FETCH_NUM);

	if (!$row[0]) {
		return 1;
	}
306
	$my_uid = uid_from_sid($sid);
eric's avatar
eric committed
307

308
	if ($row[0] === NULL || $row[0] == $my_uid) {
309
310
		return 1;
	}
eric's avatar
eric committed
311
312
313
314

	return 0;
}

315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
/**
 * Determine if a package can be overwritten by some package base
 *
 * @param string $name Name of the package to be submitted
 * @param int $base_id The ID of the package base
 *
 * @return bool True if the package can be overwritten, false if not
 */
function can_submit_pkg($name, $base_id) {
	$dbh = DB::connect();
	$q = "SELECT COUNT(*) FROM Packages WHERE ";
	$q.= "Name = " . $dbh->quote($name) . " AND ";
	$q.= "PackageBaseID <> " . intval($base_id);
	$result = $dbh->query($q);

	if (!$result) return false;
	return ($result->fetchColumn() == 0);
}

334
335
336
337
338
339
340
/**
 * Recursively delete a directory
 *
 * @param string $dirname Name of the directory to be removed
 *
 * @return void
 */
341
342
343
344
345
346
347
348
349
350
351
352
353
function rm_tree($dirname) {
	if (empty($dirname) || !is_dir($dirname)) return;

	foreach (scandir($dirname) as $item) {
		if ($item != '.' && $item != '..') {
			$path = $dirname . '/' . $item;
			if (is_file($path) || is_link($path)) {
				unlink($path);
			}
			else {
				rm_tree($path);
			}
		}
eric's avatar
eric committed
354
	}
Loui Chang's avatar
Loui Chang committed
355

356
357
	rmdir($dirname);

eric's avatar
eric committed
358
359
360
	return;
}

361
362
363
364
365
366
367
 /**
 * Determine the user's ID in the database using a username
 *
 * @param string $username The username of an account
 *
 * @return string Return user ID if exists for username, otherwise "None"
 */
368
function uid_from_username($username="") {
simo's avatar
simo committed
369
370
371
	if (!$username) {
		return "";
	}
372
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
373
374
	$q = "SELECT ID FROM Users WHERE Username = " . $dbh->quote($username);
	$result = $dbh->query($q);
simo's avatar
simo committed
375
376
377
	if (!$result) {
		return "None";
	}
canyonknight's avatar
canyonknight committed
378
	$row = $result->fetch(PDO::FETCH_NUM);
379
380
381
382

	return $row[0];
}

383
384
385
386
387
388
389
/**
 * Determine the user's ID in the database using an e-mail address
 *
 * @param string $email An e-mail address in foo@example.com format
 *
 * @return string The user's ID
 */
390
function uid_from_email($email="") {
391
392
393
	if (!$email) {
		return "";
	}
394
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
395
396
	$q = "SELECT ID FROM Users WHERE Email = " . $dbh->quote($email);
	$result = $dbh->query($q);
397
398
399
	if (!$result) {
		return "None";
	}
canyonknight's avatar
canyonknight committed
400
	$row = $result->fetch(PDO::FETCH_NUM);
401

simo's avatar
simo committed
402
403
404
	return $row[0];
}

405
406
407
408
409
/**
 * Determine if a user has TU or Developer privileges
 *
 * @return bool Return true if the user is a TU or developer, otherwise false
 */
410
function check_user_privileges() {
411
412
413
414
	$type = account_from_sid($_COOKIE['AURSID']);
	return ($type == 'Trusted User' || $type == 'Developer');
}

415
416
417
418
419
420
/**
 * Generate clean url with edited/added user values
 *
 * Makes a clean string of variables for use in URLs based on current $_GET and
 * list of values to edit/add to that. Any empty variables are discarded.
 *
421
 * @example print "http://example.com/test.php?" . mkurl("foo=bar&bar=baz")
422
423
 *
 * @param string $append string of variables and values formatted as in URLs
424
 *
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
 * @return string clean string of variables to append to URL, urlencoded
 */
function mkurl($append) {
	$get = $_GET;
	$append = explode('&', $append);
	$uservars = array();
	$out = '';

	foreach ($append as $i) {
		$ex = explode('=', $i);
		$uservars[$ex[0]] = $ex[1];
	}

	foreach ($uservars as $k => $v) { $get[$k] = $v; }

	foreach ($get as $k => $v) {
		if ($v !== '') {
			$out .= '&amp;' . urlencode($k) . '=' . urlencode($v);
		}
	}

	return substr($out, 5);
}
Denis's avatar
Denis committed
448

449
450
451
452
453
454
455
/**
 * Determine a user's salt from the database
 *
 * @param string $user_id The user ID of the user trying to log in
 *
 * @return string|void Return the salt for the requested user, otherwise void
 */
456
function get_salt($user_id) {
457
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
458
459
	$q = "SELECT Salt FROM Users WHERE ID = " . $user_id;
	$result = $dbh->query($q);
elij's avatar
elij committed
460
	if ($result) {
canyonknight's avatar
canyonknight committed
461
462
		$row = $result->fetch(PDO::FETCH_NUM);
		return $row[0];
elij's avatar
elij committed
463
464
	}
	return;
Denis's avatar
Denis committed
465
466
}

467
468
469
470
471
472
/**
 * Save a user's salted password in the database
 *
 * @param string $user_id The user ID of the user who is salting their password
 * @param string $passwd The password of the user logging in
 */
473
function save_salt($user_id, $passwd) {
474
	$dbh = DB::connect();
Denis's avatar
Denis committed
475
476
	$salt = generate_salt();
	$hash = salted_hash($passwd, $salt);
canyonknight's avatar
canyonknight committed
477
478
479
	$q = "UPDATE Users SET Salt = " . $dbh->quote($salt) . ", ";
	$q.= "Passwd = " . $dbh->quote($hash) . " WHERE ID = " . $user_id;
	$result = $dbh->exec($q);
Denis's avatar
Denis committed
480
481
}

482
483
484
485
486
/**
 * Generate a string to be used for salting passwords
 *
 * @return string MD5 hash of concatenated random number and current time
 */
487
function generate_salt() {
488
	return md5(uniqid(mt_rand(), true));
Denis's avatar
Denis committed
489
490
}

491
492
493
494
495
496
497
498
/**
 * Combine salt and password to form a hash
 *
 * @param string $passwd User plaintext password
 * @param string $salt MD5 hash to be used as user salt
 *
 * @return string The MD5 hash of the concatenated salt and user password
 */
499
function salted_hash($passwd, $salt) {
Denis's avatar
Denis committed
500
501
502
503
504
	if (strlen($salt) != 32) {
		trigger_error('Salt does not look like an md5 hash', E_USER_WARNING);
	}
	return md5($salt . $passwd);
}
505

506
507
508
509
510
511
512
/**
 * Process submitted comments so any links can be followed
 *
 * @param string $comment Raw user submitted package comment
 *
 * @return string User comment with links printed in HTML
 */
513
function parse_comment($comment) {
514
515
516
517
518
519
520
521
522
523
524
	$url_pattern = '/(\b(?:https?|ftp):\/\/[\w\/\#~:.?+=&%@!\-;,]+?' .
		'(?=[.:?\-;,]*(?:[^\w\/\#~:.?+=&%@!\-;,]|$)))/iS';

	$matches = preg_split($url_pattern, $comment, -1,
		PREG_SPLIT_DELIM_CAPTURE);

	$html = '';
	for ($i = 0; $i < count($matches); $i++) {
		if ($i % 2) {
			# convert links
			$html .= '<a href="' . htmlspecialchars($matches[$i]) .
elij's avatar
elij committed
525
				'">' .	htmlspecialchars($matches[$i]) . '</a>';
526
527
528
529
530
531
532
533
534
		}
		else {
			# convert everything else
			$html .= nl2br(htmlspecialchars($matches[$i]));
		}
	}

	return $html;
}
canyonknight's avatar
canyonknight committed
535

536
537
538
/**
 * Wrapper for beginning a database transaction
 */
539
function begin_atomic_commit() {
540
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
541
	$dbh->beginTransaction();
canyonknight's avatar
canyonknight committed
542
543
}

544
545
546
/**
 * Wrapper for committing a database transaction
 */
547
function end_atomic_commit() {
548
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
549
	$dbh->commit();
canyonknight's avatar
canyonknight committed
550
551
}

552
553
554
555
/**
 * Merge pkgbase and package options
 *
 * Merges entries of the first and the second array. If any key appears in both
556
557
558
559
560
561
 * arrays and the corresponding value in the second array is either a non-array
 * type or a non-empty array, the value from the second array replaces the
 * value from the first array. If the value from the second array is an array
 * containing a single empty string, the value in the resulting array becomes
 * an empty array instead. If the value in the second array is empty, the
 * resulting array contains the value from the first array.
562
563
564
565
566
567
568
569
570
571
 *
 * @param array $pkgbase_info Options from the pkgbase section
 * @param array $section_info Options from the package section
 *
 * @return array Merged information from both sections
 */
function array_pkgbuild_merge($pkgbase_info, $section_info) {
	$pi = $pkgbase_info;
	foreach ($section_info as $opt_key => $opt_val) {
		if (is_array($opt_val)) {
572
573
574
575
576
			if ($opt_val == array('')) {
				$pi[$opt_key] = array();
			} elseif (count($opt_val) > 0) {
				$pi[$opt_key] = $opt_val;
			}
577
578
579
580
581
582
		} else {
			$pi[$opt_key] = $opt_val;
		}
	}
	return $pi;
}