source: www/mysql/libraries/ip_allow_deny.lib.php@ 1

Last change on this file since 1 was 1, checked in by george, 17 years ago

Prvotní import všeho

File size: 5.1 KB
Line 
1<?php
2/* $Id: ip_allow_deny.lib.php 10089 2007-03-14 12:47:37Z cybot_tm $ */
3// vim: expandtab sw=4 ts=4 sts=4:
4
5/**
6 * This library is used with the server IP allow/deny host authentication
7 * feature
8 */
9
10
11/**
12 * Gets the "true" IP address of the current user
13 *
14 * @return string the ip of the user
15 *
16 * @access private
17 */
18function PMA_getIp()
19{
20 /* Get the address of user */
21 if (!empty($_SERVER['REMOTE_ADDR'])) {
22 $direct_ip = $_SERVER['REMOTE_ADDR'];
23 } else {
24 /* We do not know remote IP */
25 return false;
26 }
27
28 /* Do we trust this IP as a proxy? If yes we will use it's header. */
29 if (isset($GLOBALS['cfg']['TrustedProxies'][$direct_ip])) {
30 $proxy_ip = PMA_getenv($GLOBALS['cfg']['TrustedProxies'][$direct_ip]);
31 // the $ checks that the header contains only one IP address
32 $is_ip = preg_match('|^([0-9]{1,3}\.){3,3}[0-9]{1,3}$|', $proxy_ip, $regs);
33 if ($is_ip && (count($regs) > 0)) {
34 // True IP behind a proxy
35 return $regs[0];
36 }
37 }
38
39 /* Return true IP */
40 return $direct_ip;
41} // end of the 'PMA_getIp()' function
42
43
44/**
45 * Based on IP Pattern Matcher
46 * Originally by J.Adams <jna@retina.net>
47 * Found on <http://www.php.net/manual/en/function.ip2long.php>
48 * Modified by Robbat2 <robbat2@users.sourceforge.net>
49 *
50 * Matches:
51 * xxx.xxx.xxx.xxx (exact)
52 * xxx.xxx.xxx.[yyy-zzz] (range)
53 * xxx.xxx.xxx.xxx/nn (CIDR)
54 *
55 * Does not match:
56 * xxx.xxx.xxx.xx[yyy-zzz] (range, partial octets not supported)
57 *
58 * @param string string of IP range to match
59 * @param string string of IP to test against range
60 *
61 * @return boolean always true
62 *
63 * @access public
64 */
65function PMA_ipMaskTest($testRange, $ipToTest)
66{
67 $result = true;
68
69 if (preg_match('|([0-9]+)\.([0-9]+)\.([0-9]+)\.([0-9]+)/([0-9]+)|', $testRange, $regs)) {
70 // performs a mask match
71 $ipl = ip2long($ipToTest);
72 $rangel = ip2long($regs[1] . '.' . $regs[2] . '.' . $regs[3] . '.' . $regs[4]);
73
74 $maskl = 0;
75
76 for ($i = 0; $i < 31; $i++) {
77 if ($i < $regs[5] - 1) {
78 $maskl = $maskl + PMA_pow(2, (30 - $i));
79 } // end if
80 } // end for
81
82 if (($maskl & $rangel) == ($maskl & $ipl)) {
83 return true;
84 } else {
85 return false;
86 }
87 } else {
88 // range based
89 $maskocts = explode('.', $testRange);
90 $ipocts = explode('.', $ipToTest);
91
92 // perform a range match
93 for ($i = 0; $i < 4; $i++) {
94 if (preg_match('|\[([0-9]+)\-([0-9]+)\]|', $maskocts[$i], $regs)) {
95 if (($ipocts[$i] > $regs[2])
96 || ($ipocts[$i] < $regs[1])) {
97 $result = false;
98 } // end if
99 } else {
100 if ($maskocts[$i] <> $ipocts[$i]) {
101 $result = false;
102 } // end if
103 } // end if/else
104 } //end for
105 } //end if/else
106
107 return $result;
108} // end of the "PMA_IPMaskTest()" function
109
110
111/**
112 * Runs through IP Allow/Deny rules the use of it below for more information
113 *
114 * @param string 'allow' | 'deny' type of rule to match
115 *
116 * @return bool Matched a rule ?
117 *
118 * @access public
119 *
120 * @see PMA_getIp()
121 */
122function PMA_allowDeny($type)
123{
124 global $cfg;
125
126 // Grabs true IP of the user and returns if it can't be found
127 $remote_ip = PMA_getIp();
128 if (empty($remote_ip)) {
129 return false;
130 }
131
132 // copy username
133 $username = $cfg['Server']['user'];
134
135 // copy rule database
136 $rules = $cfg['Server']['AllowDeny']['rules'];
137
138 // lookup table for some name shortcuts
139 $shortcuts = array(
140 'all' => '0.0.0.0/0',
141 'localhost' => '127.0.0.1/8'
142 );
143
144 // Provide some useful shortcuts if server gives us address:
145 if (PMA_getenv('SERVER_ADDR')) {
146 $shortcuts['localnetA'] = PMA_getenv('SERVER_ADDR') . '/8';
147 $shortcuts['localnetB'] = PMA_getenv('SERVER_ADDR') . '/16';
148 $shortcuts['localnetC'] = PMA_getenv('SERVER_ADDR') . '/24';
149 }
150
151 foreach ($rules as $rule) {
152 // extract rule data
153 $rule_data = explode(' ', $rule);
154
155 // check for rule type
156 if ($rule_data[0] != $type) {
157 continue;
158 }
159
160 // check for username
161 if (($rule_data[1] != '%') //wildcarded first
162 && ($rule_data[1] != $username)) {
163 continue;
164 }
165
166 // check if the config file has the full string with an extra
167 // 'from' in it and if it does, just discard it
168 if ($rule_data[2] == 'from') {
169 $rule_data[2] = $rule_data[3];
170 }
171
172 // Handle shortcuts with above array
173 // DON'T use "array_key_exists" as it's only PHP 4.1 and newer.
174 if (isset($shortcuts[$rule_data[2]])) {
175 $rule_data[2] = $shortcuts[$rule_data[2]];
176 }
177
178 // Add code for host lookups here
179 // Excluded for the moment
180
181 // Do the actual matching now
182 if (PMA_ipMaskTest($rule_data[2], $remote_ip)) {
183 return true;
184 }
185 } // end while
186
187 return false;
188} // end of the "PMA_AllowDeny()" function
189
190?>
Note: See TracBrowser for help on using the repository browser.