summaryrefslogtreecommitdiffstats
path: root/lib/class
diff options
context:
space:
mode:
authorPaul Arthur <paul.arthur@flowerysong.com>2013-01-29 12:30:31 -0500
committerPaul Arthur <paul.arthur@flowerysong.com>2013-01-29 12:30:31 -0500
commit963efd7afc0d005af34102f155aaa1b05e4f6d67 (patch)
treeb828c0a466f18359c66a7a236072aae1c2f8460e /lib/class
parent04347b9a5906c5545ffe1ec7dc539fcc94c12f67 (diff)
downloadampache-963efd7afc0d005af34102f155aaa1b05e4f6d67.tar.gz
ampache-963efd7afc0d005af34102f155aaa1b05e4f6d67.tar.bz2
ampache-963efd7afc0d005af34102f155aaa1b05e4f6d67.zip
Clean up Access; use parameterised queries
Diffstat (limited to 'lib/class')
-rw-r--r--lib/class/access.class.php365
1 files changed, 120 insertions, 245 deletions
diff --git a/lib/class/access.class.php b/lib/class/access.class.php
index 685759f4..6ddb3e00 100644
--- a/lib/class/access.class.php
+++ b/lib/class/access.class.php
@@ -24,64 +24,27 @@
* Access Class
*
* This class handles the access list mojo for Ampache, it is meant to restrict
- * access based on IP and maybe something else in the future
+ * access based on IP and maybe something else in the future.
*
*/
class Access {
// Variables from DB
-
- /**
- * User ID
- *
- * @var integer
- */
public $id;
-
- /**
- *
- */
public $name;
-
- /**
- *
- */
public $start;
-
- /**
- *
- */
public $end;
-
- /**
- *
- */
public $level;
-
- /**
- *
- */
public $user;
-
- /**
- *
- */
public $type;
-
- /**
- *
- */
public $enabled;
/**
* constructor
*
* Takes an ID of the access_id dealie :)
- *
- * @param integer $access_id ID of the access_id
- * @return boolean
*/
- public function __construct($access_id='') {
+ public function __construct($access_id = '') {
if (!$access_id) { return false; }
@@ -94,206 +57,169 @@ class Access {
}
return true;
-
- } // Constructor
+ }
/**
* _get_info
*
- * get's the vars for $this out of the database
- * Taken from the object
- *
- * @return resource
+ * Gets the vars for $this out of the database.
*/
private function _get_info() {
-
- /* Grab the basic information from the catalog and return it */
- $sql = "SELECT * FROM `access_list` WHERE `id`='" . Dba::escape($this->id) . "'";
- $db_results = Dba::read($sql);
+ $sql = 'SELECT * FROM `access_list` WHERE `id` = ?';
+ $db_results = Dba::read($sql, array($this->id));
$results = Dba::fetch_assoc($db_results);
return $results;
-
- } // _get_info
+ }
/**
* format
*
- * This makes the Access object a nice fuzzy human readable object, spiffy ain't it.
- *
- * @return void
+ * This makes the Access object a nice fuzzy human readable object, spiffy
+ * ain't it.
*/
public function format() {
-
$this->f_start = inet_ntop($this->start);
$this->f_end = inet_ntop($this->end);
$this->f_user = $this->get_user_name();
$this->f_level = $this->get_level_name();
$this->f_type = $this->get_type_name();
-
- } // format
+ }
/**
- * update
+ * _verify_range
*
- * This function takes a named array as a datasource and updates the current access list entry
- *
- * @param array $data xxx
- * @return boolean
+ * This outputs an error if the IP range is bad.
*/
- public function update($data) {
-
- /* We need to verify the incomming data a littlebit */
- $start = @inet_pton($data['start']);
- $end = @inet_pton($data['end']);
+ private function _verify_range($startp, $endp) {
+ $startn = @inet_pton($startp);
+ $endn = @inet_pton($endp);
- if (!$start AND $data['start'] != '0.0.0.0' AND $data['start'] != '::') {
+ if (!$startn && $startp != '0.0.0.0' && $startp != '::') {
Error::add('start', T_('Invalid IPv4 / IPv6 Address Entered'));
return false;
}
- if (!$end) {
+ if (!$endn) {
Error::add('end', T_('Invalid IPv4 / IPv6 Address Entered'));
- return false;
}
- if (strlen(bin2hex($start)) != strlen(bin2hex($end))) {
+ if (strlen(bin2hex($startn)) != strlen(bin2hex($endn))) {
Error::add('start', T_('IP Address Version Mismatch'));
Error::add('end', T_('IP Address Version Mismatch'));
return false;
}
- $name = Dba::escape($data['name']);
- $type = self::validate_type($data['type']);
- $start = Dba::escape(inet_pton($data['start']));
- $end = Dba::escape(inet_pton($data['end']));
- $level = Dba::escape($data['level']);
- $user = $data['user'] ? Dba::escape($data['user']) : '-1';
+ return true;
+ }
+
+ /**
+ * update
+ *
+ * This function takes a named array as a datasource and updates the current
+ * access list entry.
+ */
+ public function update($data) {
+ if (!$this->_verify_range($data['start'], $data['end'])) {
+ return false;
+ }
+
+ $start = @inet_pton($data['start']);
+ $end = @inet_pton($data['end']);
+ $name = $data['name'];
+ $type = self::validate_type($data['type']);
+ $level = intval($data['level']);
+ $user = $data['user'] ?: '-1';
$enabled = make_bool($data['enabled']) ? 1 : 0;
- $sql = "UPDATE `access_list` " .
- "SET `start`='$start', `end`='$end', `level`='$level', `user`='$user', " .
- "`name`='$name', `type`='$type',`enabled`='$enabled' WHERE `id`='" . Dba::escape($this->id) . "'";
- $db_results = Dba::write($sql);
+ $sql = 'UPDATE `access_list` SET `start` = ?, `end` = ?, `level` = ?, ' .
+ '`user` = ?, `name` = ?, `type` = ?, `enabled` = ? WHERE `id` = ?';
+ $db_results = Dba::write($sql,
+ array($start, $end, $level, $user, $name, $type, $enabled, $this->id));
return true;
-
- } // update
+ }
/**
* create
*
- * This takes a key'd array of data and trys to insert it as a
+ * This takes a keyed array of data and trys to insert it as a
* new ACL entry
- *
- * @param array $data xxx
- * @return boolean
*/
public static function create($data) {
-
- /* We need to verify the incomming data a littlebit */
- $start = @inet_pton($data['start']);
- $end = @inet_pton($data['end']);
-
- if (!$start AND $data['start'] != '0.0.0.0' AND $data['start'] != '::') {
- Error::add('start', T_('Invalid IPv4 / IPv6 Address Entered'));
- return false;
- }
- if (!$end) {
- Error::add('end', T_('Invalid IPv4 / IPv6 Address Entered'));
+ if (!$this->_verify_range($data['start'], $data['end'])) {
return false;
}
- if (strlen(bin2hex($start)) != strlen(bin2hex($end))) {
- Error::add('start', T_('IP Address Version Mismatch'));
- Error::add('end', T_('IP Address Version Mismatch'));
- return false;
- }
-
- // Check existing ACL's to make sure we're not duplicating values here
+ // Check existing ACLs to make sure we're not duplicating values here
if (self::exists($data)) {
- debug_event('ACL Create','Error: An ACL equal to the created one does already exist. Not adding another one: ' . $data['start'] . ' - ' . $data['end'],'1');
+ debug_event('ACL Create', 'Error: An ACL equal to the created one already exists. Not adding another one: ' . $data['start'] . ' - ' . $data['end'], 1);
Error::add('general', T_('Duplicate ACL defined'));
return false;
}
- $start = Dba::escape($start);
- $end = Dba::escape($end);
- $name = Dba::escape($data['name']);
- $user = $data['user'] ? Dba::escape($data['user']) : '-1';
- $level = intval($data['level']);
- $type = self::validate_type($data['type']);
+ $start = @inet_pton($data['start']);
+ $end = @inet_pton($data['end']);
+ $name = $data['name'];
+ $user = $data['user'] ?: '-1';
+ $level = intval($data['level']);
+ $type = self::validate_type($data['type']);
$enabled = make_bool($data['enabled']) ? 1 : 0;
- $sql = "INSERT INTO `access_list` (`name`,`level`,`start`,`end`,`user`,`type`,`enabled`) " .
- "VALUES ('$name','$level','$start','$end','$user','$type','$enabled')";
- $db_results = Dba::write($sql);
+ $sql = 'INSERT INTO `access_list` (`name`, `level`, `start`, `end`, ' .
+ '`user`,`type`,`enabled`) VALUES (?, ?, ?, ?, ?, ?, ?)';
+ $db_results = Dba::write($sql, array($name, $level, $start, $end, $user, $type, $enabled));
return true;
- } // create
+ }
/**
* exists
*
- * this sees if the ACL that we've specified already exists, prevent duplicates. This ignores the name
- *
- * @param array $data xxx
- * @return boolean
+ * This sees if the ACL that we've specified already exists in order to
+ * prevent duplicates. The name is ignored.
*/
public static function exists($data) {
-
- $start = Dba::escape(inet_pton($data['start']));
- $end = Dba::escape(inet_pton($data['end']));
+ $start = inet_pton($data['start']);
+ $end = inet_pton($data['end']);
$type = self::validate_type($data['type']);
- $user = $data['user'] ? Dba::escape($data['user']) : '-1';
+ $user = $data['user'] ?: '-1';
- $sql = "SELECT * FROM `access_list` WHERE `start`='$start' AND `end` = '$end' " .
- "AND `type`='$type' AND `user`='$user'";
- $db_results = Dba::read($sql);
+ $sql = 'SELECT * FROM `access_list` WHERE `start` = ? AND `end` = ? ' .
+ 'AND `type` = ? AND `user` = ?';
+ $db_results = Dba::read($sql, array($start, $end, $type, $user));
if (Dba::fetch_assoc($db_results)) {
return true;
}
return false;
-
- } // exists
+ }
/**
* delete
*
* deletes the specified access_list entry
- *
- * @param integer $access_id xxx
- * @return void
*/
- public static function delete($access_id) {
-
- $sql = "DELETE FROM `access_list` WHERE `id`='" . Dba::escape($access_id) . "'";
- $db_results = Dba::write($sql);
-
- } // delete
+ public static function delete($id) {
+ Dba::write('DELETE FROM `access_list` WHERE `id` = ?', array($id));
+ }
/**
* check_function
*
- * This checks if a specific functionality is enabled
- * it takes a type only
- *
- * @param string $type check type xxx
- * @return mixed boolean or config
+ * This checks if specific functionality is enabled.
*/
public static function check_function($type) {
-
switch ($type) {
case 'download':
return Config::get('download');
break ;
case 'batch_download':
if (!function_exists('gzcompress')) {
- debug_event('gzcompress','ZLIB Extensions not loaded, batch download disabled','3');
+ debug_event('access', 'ZLIB extension not loaded, batch download disabled', 3);
return false;
}
if (Config::get('allow_zip_download') AND $GLOBALS['user']->has_access('25')) {
@@ -303,22 +229,14 @@ class Access {
default:
return false;
break;
- } // end switch
-
- } // check_function
+ }
+ }
/**
* check_network
*
- * This takes a type, ip, user, level and key
- * and then returns true or false if they have access to this
- * the IP is passed as a dotted quad
- *
- * @param string $type Check type.
- * @param string $user User name.
- * @param integer $level Access level.
- * @param string $ip IP Address.
- * @return boolean
+ * This takes a type, ip, user, level and key and then returns whether they
+ * are allowed. The IP is passed as a dotted quad.
*/
public static function check_network($type, $user, $level, $ip=null) {
@@ -330,15 +248,12 @@ class Access {
break;
default:
return false;
- } // end switch
- } // end if access control is turned off
+ }
+ }
// Clean incoming variables
- $ip = $ip
- ? Dba::escape(inet_pton($ip))
- : Dba::escape(inet_pton($_SERVER['REMOTE_ADDR']));
- $user = Dba::escape($user);
- $level = Dba::escape($level);
+ $ip = $ip ?: $_SERVER['REMOTE_ADDR'];
+ $ip = inet_pton($ip);
switch ($type) {
case 'init-api':
@@ -358,17 +273,20 @@ class Access {
} // end switch on type
$sql = 'SELECT `id` FROM `access_list` ' .
- "WHERE `start` <= '$ip' AND `end` >= '$ip' " .
- "AND `level` >= '$level' AND `type` = '$type'";
+ 'WHERE `start` <= ? AND `end` >= ? ' .
+ 'AND `level` >= ? AND `type` = ?';
+
+ $params = array($ip, $ip, $level, $type);
if (strlen($user) && $user != '-1') {
- $sql .= " AND `user` IN('$user', '-1')";
+ $sql .= " AND `user` IN(?, '-1')";
+ $params[] = $user;
}
else {
$sql .= " AND `user` = '-1'";
}
- $db_results = Dba::read($sql);
+ $db_results = Dba::read($sql, $params);
if (Dba::fetch_row($db_results)) {
// Yah they have access they can use the mojo
@@ -376,19 +294,25 @@ class Access {
}
return false;
- } // check_network
+ }
/**
* check_access
- * This is the global 'has_access' function it can check for any 'type'
+ *
+ * This is the global 'has_access' function.(t can check for any 'type'
* of object.
+ *
* Everything uses the global 0,5,25,50,75,100 stuff. GLOBALS['user'] is
* always used.
*/
- public static function check($type,$level) {
+ public static function check($type, $level) {
- if (Config::get('demo_mode')) { return true; }
- if (defined('INSTALL')) { return true; }
+ if (Config::get('demo_mode')) {
+ return true;
+ }
+ if (defined('INSTALL')) {
+ return true;
+ }
$level = intval($level);
@@ -396,7 +320,8 @@ class Access {
switch ($type) {
case 'localplay':
// Check their localplay_level
- if (Config::get('localplay_level') >= $level OR $GLOBALS['user']->access >= '100') {
+ if (Config::get('localplay_level') >= $level
+ || $GLOBALS['user']->access >= 100) {
return true;
}
else {
@@ -415,19 +340,18 @@ class Access {
default:
return false;
break;
- } // end switch on type
+ }
- // Default false
return false;
-
- } // check
+ }
/**
* validate_type
- * This cleans up and validates the specified type
+ *
+ * This validates the specified type; it will always return a valid type,
+ * even if you pass in an invalid one.
*/
public static function validate_type($type) {
-
switch($type) {
case 'rpc':
case 'interface':
@@ -437,37 +361,33 @@ class Access {
default:
return 'stream';
break;
- } // end switch
-
- } // validate_type
+ }
+ }
/**
* get_access_lists
* returns a full listing of all access rules on this server
*/
public static function get_access_lists() {
-
- $sql = "SELECT `id` FROM `access_list`";
+ $sql = 'SELECT `id` FROM `access_list`';
$db_results = Dba::read($sql);
$results = array();
- // Man this is the wrong way to do it...
while ($row = Dba::fetch_assoc($db_results)) {
$results[] = $row['id'];
- } // end while access list mojo
+ }
return $results;
-
- } // get_access_lists
+ }
/**
* get_level_name
+ *
* take the int level and return a named level
*/
public function get_level_name() {
-
if ($this->level >= '75') {
return T_('All');
}
@@ -480,28 +400,26 @@ class Access {
if ($this->level == '50') {
return T_('Read/Write');
}
-
- } // get_level_name
+ }
/**
- * get_user_name
- * Take a user and return their full name
+ * get_user_name
+ *
+ * Return a name for the users covered by this ACL.
*/
public function get_user_name() {
-
if ($this->user == '-1') { return T_('All'); }
$user = new User($this->user);
return $user->fullname . " (" . $user->username . ")";
-
- } // get_user_name
+ }
/**
* get_type_name
- * This function returns the pretty name for our current type
+ *
+ * This function returns the pretty name for our current type.
*/
public function get_type_name() {
-
switch ($this->type) {
case 'rpc':
return T_('API/RPC');
@@ -516,50 +434,7 @@ class Access {
default:
return T_('Stream Access');
break;
- } // end switch
-
- } // get_type_name
-
- /**
- * session_exists
- * This checks to see if the specified session of the specified type
- * exists, it also provides an array of key'd data that may be required
- * based on the type
- */
- public static function session_exists($data,$key,$type) {
-
- // Switch on the type they pass
- switch ($type) {
- case 'api':
- $key = Dba::escape($key);
- $time = time();
- $sql = "SELECT * FROM `session_api` WHERE `id`='$key' AND `expire` > '$time'";
- $db_results = Dba::read($sql);
-
- if (Dba::num_rows($db_results)) {
- $time = $time + 3600;
- $sql = "UPDATE `session_api` WHERE `id`='$key' SET `expire`='$time'";
- $db_results = Dba::write($sql);
- return true;
- }
-
- return false;
-
- break;
- case 'stream':
-
- break;
- case 'interface':
-
- break;
- default:
- return false;
- break;
- } // type
-
-
- } // session_exists
-
-} //end of access class
-
+ }
+ }
+}
?>