summaryrefslogtreecommitdiff
path: root/hugo/setup/lib
diff options
context:
space:
mode:
authorTristan Zur <tzur@web.web.ccwn.org>2014-03-27 22:27:47 +0100
committerTristan Zur <tzur@web.web.ccwn.org>2014-03-27 22:27:47 +0100
commitb62676ca5d3d6f6ba3f019ea3f99722e165a98d8 (patch)
tree86722cb80f07d4569f90088eeaea2fc2f6e2ef94 /hugo/setup/lib
Initial commit of intern.ccwn.org contentsHEADmaster
Diffstat (limited to 'hugo/setup/lib')
-rw-r--r--hugo/setup/lib/ConfigGenerator.class.php154
-rw-r--r--hugo/setup/lib/common.inc.php56
-rw-r--r--hugo/setup/lib/form_processing.lib.php62
-rw-r--r--hugo/setup/lib/index.lib.php605
4 files changed, 877 insertions, 0 deletions
diff --git a/hugo/setup/lib/ConfigGenerator.class.php b/hugo/setup/lib/ConfigGenerator.class.php
new file mode 100644
index 0000000..8dc359b
--- /dev/null
+++ b/hugo/setup/lib/ConfigGenerator.class.php
@@ -0,0 +1,154 @@
+<?php
+/* vim: set expandtab sw=4 ts=4 sts=4: */
+/**
+ * Config file generator
+ *
+ * @package PhpMyAdmin-Setup
+ */
+
+/**
+ * Config file generation class
+ *
+ * @package PhpMyAdmin
+ */
+class ConfigGenerator
+{
+ /**
+ * Creates config file
+ *
+ * @return string
+ */
+ public static function getConfigFile()
+ {
+ $cf = ConfigFile::getInstance();
+
+ $crlf = (isset($_SESSION['eol']) && $_SESSION['eol'] == 'win') ? "\r\n" : "\n";
+ $c = $cf->getConfig();
+
+ // header
+ $ret = '<?php' . $crlf
+ . '/*' . $crlf
+ . ' * Generated configuration file' . $crlf
+ . ' * Generated by: phpMyAdmin '
+ . $GLOBALS['PMA_Config']->get('PMA_VERSION')
+ . ' setup script' . $crlf
+ . ' * Date: ' . date(DATE_RFC1123) . $crlf
+ . ' */' . $crlf . $crlf;
+
+ // servers
+ if ($cf->getServerCount() > 0) {
+ $ret .= "/* Servers configuration */$crlf\$i = 0;" . $crlf . $crlf;
+ foreach ($c['Servers'] as $id => $server) {
+ $ret .= '/* Server: ' . strtr($cf->getServerName($id) . " [$id] ", '*/', '-') . "*/" . $crlf
+ . '$i++;' . $crlf;
+ foreach ($server as $k => $v) {
+ $k = preg_replace('/[^A-Za-z0-9_]/', '_', $k);
+ $ret .= "\$cfg['Servers'][\$i]['$k'] = "
+ . (is_array($v) && self::_isZeroBasedArray($v)
+ ? self::_exportZeroBasedArray($v, $crlf)
+ : var_export($v, true))
+ . ';' . $crlf;
+ }
+ $ret .= $crlf;
+ }
+ $ret .= '/* End of servers configuration */' . $crlf . $crlf;
+ }
+ unset($c['Servers']);
+
+ // other settings
+ $persistKeys = $cf->getPersistKeysMap();
+
+ foreach ($c as $k => $v) {
+ $k = preg_replace('/[^A-Za-z0-9_]/', '_', $k);
+ $ret .= self::_getVarExport($k, $v, $crlf);
+ if (isset($persistKeys[$k])) {
+ unset($persistKeys[$k]);
+ }
+ }
+ // keep 1d array keys which are present in $persist_keys (config.values.php)
+ foreach (array_keys($persistKeys) as $k) {
+ if (strpos($k, '/') === false) {
+ $k = preg_replace('/[^A-Za-z0-9_]/', '_', $k);
+ $ret .= self::_getVarExport($k, $cf->getDefault($k), $crlf);
+ }
+ }
+ $ret .= '?>';
+
+ return $ret;
+ }
+
+ /**
+ * Returns exported configuration variable
+ *
+ * @param string $var_name
+ * @param mixed $var_value
+ * @param string $crlf
+ *
+ * @return string
+ */
+ private static function _getVarExport($var_name, $var_value, $crlf)
+ {
+ if (!is_array($var_value) || empty($var_value)) {
+ return "\$cfg['$var_name'] = " . var_export($var_value, true) . ';' . $crlf;
+ }
+ $ret = '';
+ if (self::_isZeroBasedArray($var_value)) {
+ $ret = "\$cfg['$var_name'] = " . self::_exportZeroBasedArray($var_value, $crlf)
+ . ';' . $crlf;
+ } else {
+ // string keys: $cfg[key][subkey] = value
+ foreach ($var_value as $k => $v) {
+ $k = preg_replace('/[^A-Za-z0-9_]/', '_', $k);
+ $ret .= "\$cfg['$var_name']['$k'] = " . var_export($v, true) . ';' . $crlf;
+ }
+ }
+ return $ret;
+ }
+
+ /**
+ * Check whether $array is a continuous 0-based array
+ *
+ * @param array $array
+ *
+ * @return boolean
+ */
+ private static function _isZeroBasedArray(array $array)
+ {
+ for ($i = 0; $i < count($array); $i++) {
+ if (! isset($array[$i])) {
+ return false;
+ }
+ }
+ return true;
+ }
+
+ /**
+ * Exports continuous 0-based array
+ *
+ * @param array $array
+ * @param string $crlf
+ *
+ * @return string
+ */
+ private static function _exportZeroBasedArray(array $array, $crlf)
+ {
+ $retv = array();
+ foreach ($array as $v) {
+ $retv[] = var_export($v, true);
+ }
+ $ret = "array(";
+ if (count($retv) <= 4) {
+ // up to 4 values - one line
+ $ret .= implode(', ', $retv);
+ } else {
+ // more than 4 values - value per line
+ $imax = count($retv);
+ for ($i = 0; $i < $imax; $i++) {
+ $ret .= ($i > 0 ? ',' : '') . $crlf . ' ' . $retv[$i];
+ }
+ }
+ $ret .= ')';
+ return $ret;
+ }
+}
+?>
diff --git a/hugo/setup/lib/common.inc.php b/hugo/setup/lib/common.inc.php
new file mode 100644
index 0000000..4744321
--- /dev/null
+++ b/hugo/setup/lib/common.inc.php
@@ -0,0 +1,56 @@
+<?php
+/* vim: set expandtab sw=4 ts=4 sts=4: */
+/**
+ * Loads libraries/common.inc.php and preforms some additional actions
+ *
+ * @package PhpMyAdmin-Setup
+ */
+
+/**
+ * Do not include full common.
+ * @ignore
+ */
+define('PMA_MINIMUM_COMMON', true);
+define('PMA_SETUP', true);
+chdir('..');
+
+if (!file_exists('./libraries/common.inc.php')) {
+ PMA_fatalError('Bad invocation!');
+}
+
+require_once './libraries/common.inc.php';
+require_once './libraries/Util.class.php';
+require_once './libraries/config/config_functions.lib.php';
+require_once './libraries/config/messages.inc.php';
+require_once './libraries/config/ConfigFile.class.php';
+require_once './libraries/url_generating.lib.php';
+require_once './libraries/user_preferences.lib.php';
+
+// use default error handler
+restore_error_handler();
+
+// Save current language in a cookie, required since we use PMA_MINIMUM_COMMON
+$GLOBALS['PMA_Config']->setCookie('pma_lang', $GLOBALS['lang']);
+
+ConfigFile::getInstance()->setPersistKeys(
+ array(
+ 'DefaultLang',
+ 'ServerDefault',
+ 'UploadDir',
+ 'SaveDir',
+ 'Servers/1/verbose',
+ 'Servers/1/host',
+ 'Servers/1/port',
+ 'Servers/1/socket',
+ 'Servers/1/extension',
+ 'Servers/1/connect_type',
+ 'Servers/1/auth_type',
+ 'Servers/1/user',
+ 'Servers/1/password'
+ )
+);
+
+// allows for redirection even after sending some data
+ob_start();
+
+?>
diff --git a/hugo/setup/lib/form_processing.lib.php b/hugo/setup/lib/form_processing.lib.php
new file mode 100644
index 0000000..d9b6e6a
--- /dev/null
+++ b/hugo/setup/lib/form_processing.lib.php
@@ -0,0 +1,62 @@
+<?php
+/* vim: set expandtab sw=4 ts=4 sts=4: */
+/**
+ * Formset processing library
+ *
+ * @package PhpMyAdmin-Setup
+ */
+
+/**
+ * Processes forms registered in $form_display, handles error correction
+ *
+ * @param FormDisplay $form_display
+ *
+ * @return void
+ */
+function process_formset(FormDisplay $form_display)
+{
+ if (filter_input(INPUT_GET, 'mode') == 'revert') {
+ // revert erroneous fields to their default values
+ $form_display->fixErrors();
+ // drop post data
+ header('HTTP/1.1 303 See Other');
+ header('Location: index.php');
+ exit;
+ }
+ if (!$form_display->process(false)) {
+ // handle form view and failed POST
+ $form_display->display(true, true);
+ } else {
+ // check for form errors
+ if ($form_display->hasErrors()) {
+ // form has errors, show warning
+ $separator = PMA_get_arg_separator('html');
+ $page = filter_input(INPUT_GET, 'page');
+ $formset = filter_input(INPUT_GET, 'formset');
+ $formset = $formset ? "{$separator}formset=$formset" : '';
+ $id = filter_input(INPUT_GET, 'id', FILTER_VALIDATE_INT);
+ if ($id === null && $page == 'servers') {
+ // we've just added a new server, get it's id
+ $id = ConfigFile::getInstance()->getServerCount();
+ }
+ $id = $id ? "{$separator}id=$id" : '';
+ ?>
+ <div class="error">
+ <h4><?php echo __('Warning') ?></h4>
+ <?php echo __('Submitted form contains errors') ?><br />
+ <a href="?page=<?php echo $page . $formset . $id . $separator ?>mode=revert"><?php echo __('Try to revert erroneous fields to their default values') ?></a>
+ </div>
+ <?php $form_display->displayErrors() ?>
+ <a class="btn" href="index.php"><?php echo __('Ignore errors') ?></a>
+ &nbsp;
+ <a class="btn" href="?page=<?php echo $page . $formset . $id . $separator ?>mode=edit"><?php echo __('Show form') ?></a>
+ <?php
+ } else {
+ // drop post data
+ header('HTTP/1.1 303 See Other');
+ header('Location: index.php');
+ exit;
+ }
+ }
+}
+?>
diff --git a/hugo/setup/lib/index.lib.php b/hugo/setup/lib/index.lib.php
new file mode 100644
index 0000000..fe82b1e
--- /dev/null
+++ b/hugo/setup/lib/index.lib.php
@@ -0,0 +1,605 @@
+<?php
+/* vim: set expandtab sw=4 ts=4 sts=4: */
+/**
+ * Various checks and message functions used on index page.
+ *
+ * @package PhpMyAdmin-Setup
+ */
+
+if (!defined('PHPMYADMIN')) {
+ exit;
+}
+
+/**
+ * Initializes message list
+ *
+ * @return void
+ */
+function messages_begin()
+{
+ if (! isset($_SESSION['messages']) || !is_array($_SESSION['messages'])) {
+ $_SESSION['messages'] = array('error' => array(), 'notice' => array());
+ } else {
+ // reset message states
+ foreach ($_SESSION['messages'] as &$messages) {
+ foreach ($messages as &$msg) {
+ $msg['fresh'] = false;
+ $msg['active'] = false;
+ }
+ }
+ }
+}
+
+/**
+ * Adds a new message to message list
+ *
+ * @param string $type one of: notice, error
+ * @param string $id unique message identifier
+ * @param string $title language string id (in $str array)
+ * @param string $message message text
+ *
+ * @return void
+ */
+function messages_set($type, $id, $title, $message)
+{
+ $fresh = ! isset($_SESSION['messages'][$type][$id]);
+ $_SESSION['messages'][$type][$id] = array(
+ 'fresh' => $fresh,
+ 'active' => true,
+ 'title' => $title,
+ 'message' => $message);
+}
+
+/**
+ * Cleans up message list
+ *
+ * @return void
+ */
+function messages_end()
+{
+ foreach ($_SESSION['messages'] as &$messages) {
+ $remove_ids = array();
+ foreach ($messages as $id => &$msg) {
+ if ($msg['active'] == false) {
+ $remove_ids[] = $id;
+ }
+ }
+ foreach ($remove_ids as $id) {
+ unset($messages[$id]);
+ }
+ }
+}
+
+/**
+ * Prints message list, must be called after messages_end()
+ *
+ * @return void
+ */
+function messages_show_html()
+{
+ $old_ids = array();
+ foreach ($_SESSION['messages'] as $type => $messages) {
+ foreach ($messages as $id => $msg) {
+ echo '<div class="' . $type . '" id="' . $id . '">'
+ . '<h4>' . $msg['title'] . '</h4>'
+ . $msg['message'] . '</div>';
+ if (!$msg['fresh'] && $type != 'error') {
+ $old_ids[] = $id;
+ }
+ }
+ }
+
+ echo "\n" . '<script type="text/javascript">';
+ foreach ($old_ids as $id) {
+ echo "\nhiddenMessages.push('$id');";
+ }
+ echo "\n</script>\n";
+}
+
+/**
+ * Checks for newest phpMyAdmin version and sets result as a new notice
+ *
+ * @return void
+ */
+function PMA_version_check()
+{
+ // version check messages should always be visible so let's make
+ // a unique message id each time we run it
+ $message_id = uniqid('version_check');
+ // wait 3s at most for server response, it's enough to get information
+ // from a working server
+ $connection_timeout = 3;
+
+ $url = 'http://phpmyadmin.net/home_page/version.php';
+ $context = stream_context_create(
+ array(
+ 'http' => array('timeout' => $connection_timeout)
+ )
+ );
+ $data = @file_get_contents($url, null, $context);
+ if ($data === false) {
+ if (function_exists('curl_init')) {
+ $ch = curl_init($url);
+ curl_setopt($ch, CURLOPT_HEADER, false);
+ curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
+ curl_setopt($ch, CURLOPT_TIMEOUT, $connection_timeout);
+ $data = curl_exec($ch);
+ curl_close($ch);
+ } else {
+ messages_set(
+ 'error',
+ $message_id,
+ __('Version check'),
+ __('Neither URL wrapper nor CURL is available. Version check is not possible.')
+ );
+ return;
+ }
+ }
+
+ if (empty($data)) {
+ messages_set(
+ 'error',
+ $message_id,
+ __('Version check'),
+ __('Reading of version failed. Maybe you\'re offline or the upgrade server does not respond.')
+ );
+ return;
+ }
+
+ /* Format: version\ndate\n(download\n)* */
+ $data_list = explode("\n", $data);
+
+ if (count($data_list) > 1) {
+ $version = $data_list[0];
+ $date = $data_list[1];
+ } else {
+ $version = $date = '';
+ }
+
+ $version_upstream = version_to_int($version);
+ if ($version_upstream === false) {
+ messages_set(
+ 'error',
+ $message_id,
+ __('Version check'),
+ __('Got invalid version string from server')
+ );
+ return;
+ }
+
+ $version_local = version_to_int($GLOBALS['PMA_Config']->get('PMA_VERSION'));
+ if ($version_local === false) {
+ messages_set(
+ 'error',
+ $message_id,
+ __('Version check'),
+ __('Unparsable version string')
+ );
+ return;
+ }
+
+ if ($version_upstream > $version_local) {
+ $version = htmlspecialchars($version);
+ $date = htmlspecialchars($date);
+ messages_set(
+ 'notice',
+ $message_id,
+ __('Version check'),
+ sprintf(__('A newer version of phpMyAdmin is available and you should consider upgrading. The newest version is %s, released on %s.'), $version, $date)
+ );
+ } else {
+ if ($version_local % 100 == 0) {
+ messages_set(
+ 'notice',
+ $message_id,
+ __('Version check'),
+ PMA_sanitize(sprintf(__('You are using Git version, run [kbd]git pull[/kbd] :-)[br]The latest stable version is %s, released on %s.'), $version, $date))
+ );
+ } else {
+ messages_set(
+ 'notice',
+ $message_id,
+ __('Version check'),
+ __('No newer stable version is available')
+ );
+ }
+ }
+}
+
+/**
+ * Calculates numerical equivalent of phpMyAdmin version string
+ *
+ * @param string $version version
+ *
+ * @return mixed false on failure, integer on success
+ */
+function version_to_int($version)
+{
+ $matches = array();
+ if (!preg_match('/^(\d+)\.(\d+)\.(\d+)((\.|-(pl|rc|dev|beta|alpha))(\d+)?(-dev)?)?$/', $version, $matches)) {
+ return false;
+ }
+ if (!empty($matches[6])) {
+ switch ($matches[6]) {
+ case 'pl':
+ $added = 60;
+ break;
+ case 'rc':
+ $added = 30;
+ break;
+ case 'beta':
+ $added = 20;
+ break;
+ case 'alpha':
+ $added = 10;
+ break;
+ case 'dev':
+ $added = 0;
+ break;
+ default:
+ messages_set(
+ 'notice',
+ 'version_match',
+ __('Version check'),
+ 'Unknown version part: ' . htmlspecialchars($matches[6])
+ );
+ $added = 0;
+ break;
+ }
+ } else {
+ $added = 50; // for final
+ }
+ if (!empty($matches[7])) {
+ $added = $added + $matches[7];
+ }
+ return $matches[1] * 1000000 + $matches[2] * 10000 + $matches[3] * 100 + $added;
+}
+
+/**
+ * Checks whether config file is readable/writable
+ *
+ * @param bool &$is_readable
+ * @param bool &$is_writable
+ * @param bool &$file_exists
+ *
+ * @return void
+ */
+function check_config_rw(&$is_readable, &$is_writable, &$file_exists)
+{
+ $file_path = ConfigFile::getInstance()->getFilePath();
+ $file_dir = dirname($file_path);
+ $is_readable = true;
+ $is_writable = is_dir($file_dir);
+ if (SETUP_DIR_WRITABLE) {
+ $is_writable = $is_writable && is_writable($file_dir);
+ }
+ $file_exists = file_exists($file_path);
+ if ($file_exists) {
+ $is_readable = is_readable($file_path);
+ $is_writable = $is_writable && is_writable($file_path);
+ }
+}
+
+/**
+ * Performs various compatibility, security and consistency checks on current config
+ *
+ * Outputs results to message list, must be called between messages_begin()
+ * and messages_end()
+ *
+ * @return void
+ */
+function perform_config_checks()
+{
+ $cf = ConfigFile::getInstance();
+ $blowfish_secret = $cf->get('blowfish_secret');
+ $blowfish_secret_set = false;
+ $cookie_auth_used = false;
+
+ $strAllowArbitraryServerWarning = __('This %soption%s should be disabled as it allows attackers to bruteforce login to any MySQL server. If you feel this is necessary, use %strusted proxies list%s. However, IP-based protection may not be reliable if your IP belongs to an ISP where thousands of users, including you, are connected to.');
+ $strAllowArbitraryServerWarning = sprintf($strAllowArbitraryServerWarning, '[a@?page=form&amp;formset=Features#tab_Security]', '[/a]', '[a@?page=form&amp;formset=Features#tab_Security]', '[/a]');
+ $strBlowfishSecretMsg = __('You didn\'t have blowfish secret set and have enabled cookie authentication, so a key was automatically generated for you. It is used to encrypt cookies; you don\'t need to remember it.');
+ $strBZipDumpWarning = __('%sBzip2 compression and decompression%s requires functions (%s) which are unavailable on this system.');
+ $strBZipDumpWarning = sprintf($strBZipDumpWarning, '[a@?page=form&amp;formset=Features#tab_Import_export]', '[/a]', '%s');
+ $strDirectoryNotice = __('This value should be double checked to ensure that this directory is neither world accessible nor readable or writable by other users on your server.');
+ $strForceSSLNotice = __('This %soption%s should be enabled if your web server supports it.');
+ $strForceSSLNotice = sprintf($strForceSSLNotice, '[a@?page=form&amp;formset=Features#tab_Security]', '[/a]');
+ $strGZipDumpWarning = __('%sGZip compression and decompression%s requires functions (%s) which are unavailable on this system.');
+ $strGZipDumpWarning = sprintf($strGZipDumpWarning, '[a@?page=form&amp;formset=Features#tab_Import_export]', '[/a]', '%s');
+ $strLoginCookieValidityWarning = __('%sLogin cookie validity%s greater than 1440 seconds may cause random session invalidation if %ssession.gc_maxlifetime%s is lower than its value (currently %d).');
+ $strLoginCookieValidityWarning = sprintf($strLoginCookieValidityWarning, '[a@?page=form&amp;formset=Features#tab_Security]', '[/a]', '[a@' . PMA_getPHPDocLink('session.configuration.php#ini.session.gc-maxlifetime') . ']', '[/a]', ini_get('session.gc_maxlifetime'));
+ $strLoginCookieValidityWarning2 = __('%sLogin cookie validity%s should be set to 1800 seconds (30 minutes) at most. Values larger than 1800 may pose a security risk such as impersonation.');
+ $strLoginCookieValidityWarning2 = sprintf($strLoginCookieValidityWarning2, '[a@?page=form&amp;formset=Features#tab_Security]', '[/a]');
+ $strLoginCookieValidityWarning3 = __('If using cookie authentication and %sLogin cookie store%s is not 0, %sLogin cookie validity%s must be set to a value less or equal to it.');
+ $strLoginCookieValidityWarning3 = sprintf($strLoginCookieValidityWarning3, '[a@?page=form&amp;formset=Features#tab_Security]', '[/a]', '[a@?page=form&amp;formset=Features#tab_Security]', '[/a]');
+ $strSecurityInfoMsg = __('If you feel this is necessary, use additional protection settings - %shost authentication%s settings and %strusted proxies list%s. However, IP-based protection may not be reliable if your IP belongs to an ISP where thousands of users, including you, are connected to.');
+ $strSecurityInfoMsg = sprintf($strSecurityInfoMsg, '[a@?page=servers&amp;mode=edit&amp;id=%1$d#tab_Server_config]', '[/a]', '[a@?page=form&amp;formset=Features#tab_Security]', '[/a]');
+ $strServerAuthConfigMsg = __('You set the [kbd]config[/kbd] authentication type and included username and password for auto-login, which is not a desirable option for live hosts. Anyone who knows or guesses your phpMyAdmin URL can directly access your phpMyAdmin panel. Set %sauthentication type%s to [kbd]cookie[/kbd] or [kbd]http[/kbd].');
+ $strServerAuthConfigMsg = sprintf($strServerAuthConfigMsg, '[a@?page=servers&amp;mode=edit&amp;id=%1$d#tab_Server]', '[/a]');
+ $strZipDumpExportWarning = __('%sZip compression%s requires functions (%s) which are unavailable on this system.');
+ $strZipDumpExportWarning = sprintf($strZipDumpExportWarning, '[a@?page=form&amp;formset=Features#tab_Import_export]', '[/a]', '%s');
+ $strZipDumpImportWarning = __('%sZip decompression%s requires functions (%s) which are unavailable on this system.');
+ $strZipDumpImportWarning = sprintf($strZipDumpImportWarning, '[a@?page=form&amp;formset=Features#tab_Import_export]', '[/a]', '%s');
+
+ for ($i = 1, $server_cnt = $cf->getServerCount(); $i <= $server_cnt; $i++) {
+ $cookie_auth_server = ($cf->getValue("Servers/$i/auth_type") == 'cookie');
+ $cookie_auth_used |= $cookie_auth_server;
+ $server_name = $cf->getServerName($i);
+ if ($server_name == 'localhost') {
+ $server_name .= " [$i]";
+ }
+ $server_name = htmlspecialchars($server_name);
+
+ if ($cookie_auth_server && $blowfish_secret === null) {
+ $blowfish_secret = uniqid('', true);
+ $blowfish_secret_set = true;
+ $cf->set('blowfish_secret', $blowfish_secret);
+ }
+
+ //
+ // $cfg['Servers'][$i]['ssl']
+ // should be enabled if possible
+ //
+ if (!$cf->getValue("Servers/$i/ssl")) {
+ $title = PMA_lang(PMA_lang_name('Servers/1/ssl')) . " ($server_name)";
+ messages_set(
+ 'notice',
+ "Servers/$i/ssl",
+ $title,
+ __('You should use SSL connections if your database server supports it.')
+ );
+ }
+
+ //
+ // $cfg['Servers'][$i]['extension']
+ // warn about using 'mysql'
+ //
+ if ($cf->getValue("Servers/$i/extension") == 'mysql') {
+ $title = PMA_lang(PMA_lang_name('Servers/1/extension'))
+ . " ($server_name)";
+ messages_set(
+ 'notice',
+ "Servers/$i/extension",
+ $title,
+ __('You should use mysqli for performance reasons.')
+ );
+ }
+
+ //
+ // $cfg['Servers'][$i]['auth_type']
+ // warn about full user credentials if 'auth_type' is 'config'
+ //
+ if ($cf->getValue("Servers/$i/auth_type") == 'config'
+ && $cf->getValue("Servers/$i/user") != ''
+ && $cf->getValue("Servers/$i/password") != ''
+ ) {
+ $title = PMA_lang(PMA_lang_name('Servers/1/auth_type'))
+ . " ($server_name)";
+ messages_set(
+ 'notice',
+ "Servers/$i/auth_type",
+ $title,
+ PMA_lang($strServerAuthConfigMsg, $i) . ' '
+ . PMA_lang($strSecurityInfoMsg, $i)
+ );
+ }
+
+ //
+ // $cfg['Servers'][$i]['AllowRoot']
+ // $cfg['Servers'][$i]['AllowNoPassword']
+ // serious security flaw
+ //
+ if ($cf->getValue("Servers/$i/AllowRoot")
+ && $cf->getValue("Servers/$i/AllowNoPassword")
+ ) {
+ $title = PMA_lang(PMA_lang_name('Servers/1/AllowNoPassword'))
+ . " ($server_name)";
+ messages_set(
+ 'notice',
+ "Servers/$i/AllowNoPassword",
+ $title,
+ __('You allow for connecting to the server without a password.') . ' '
+ . PMA_lang($strSecurityInfoMsg, $i)
+ );
+ }
+ }
+
+ //
+ // $cfg['blowfish_secret']
+ // it's required for 'cookie' authentication
+ //
+ if ($cookie_auth_used) {
+ if ($blowfish_secret_set) {
+ // 'cookie' auth used, blowfish_secret was generated
+ messages_set(
+ 'notice',
+ 'blowfish_secret_created',
+ PMA_lang(PMA_lang_name('blowfish_secret')),
+ $strBlowfishSecretMsg
+ );
+ } else {
+ $blowfish_warnings = array();
+ // check length
+ if (strlen($blowfish_secret) < 8) {
+ // too short key
+ $blowfish_warnings[] = __('Key is too short, it should have at least 8 characters.');
+ }
+ // check used characters
+ $has_digits = (bool) preg_match('/\d/', $blowfish_secret);
+ $has_chars = (bool) preg_match('/\S/', $blowfish_secret);
+ $has_nonword = (bool) preg_match('/\W/', $blowfish_secret);
+ if (!$has_digits || !$has_chars || !$has_nonword) {
+ $blowfish_warnings[] = PMA_lang(__('Key should contain letters, numbers [em]and[/em] special characters.'));
+ }
+ if (!empty($blowfish_warnings)) {
+ messages_set(
+ 'error',
+ 'blowfish_warnings' . count($blowfish_warnings),
+ PMA_lang(PMA_lang_name('blowfish_secret')),
+ implode('<br />', $blowfish_warnings)
+ );
+ }
+ }
+ }
+
+ //
+ // $cfg['ForceSSL']
+ // should be enabled if possible
+ //
+ if (!$cf->getValue('ForceSSL')) {
+ messages_set(
+ 'notice',
+ 'ForceSSL',
+ PMA_lang(PMA_lang_name('ForceSSL')),
+ PMA_lang($strForceSSLNotice)
+ );
+ }
+
+ //
+ // $cfg['AllowArbitraryServer']
+ // should be disabled
+ //
+ if ($cf->getValue('AllowArbitraryServer')) {
+ messages_set(
+ 'notice',
+ 'AllowArbitraryServer',
+ PMA_lang(PMA_lang_name('AllowArbitraryServer')),
+ PMA_lang($strAllowArbitraryServerWarning)
+ );
+ }
+
+ //
+ // $cfg['LoginCookieValidity']
+ // value greater than session.gc_maxlifetime will cause
+ // random session invalidation after that time
+ if ($cf->getValue('LoginCookieValidity') > 1440
+ || $cf->getValue('LoginCookieValidity') > ini_get('session.gc_maxlifetime')
+ ) {
+ $message_type = $cf->getValue('LoginCookieValidity') > ini_get('session.gc_maxlifetime')
+ ? 'error'
+ : 'notice';
+ messages_set(
+ $message_type,
+ 'LoginCookieValidity',
+ PMA_lang(PMA_lang_name('LoginCookieValidity')),
+ PMA_lang($strLoginCookieValidityWarning)
+ );
+ }
+
+ //
+ // $cfg['LoginCookieValidity']
+ // should be at most 1800 (30 min)
+ //
+ if ($cf->getValue('LoginCookieValidity') > 1800) {
+ messages_set(
+ 'notice',
+ 'LoginCookieValidity',
+ PMA_lang(PMA_lang_name('LoginCookieValidity')),
+ PMA_lang($strLoginCookieValidityWarning2)
+ );
+ }
+
+ //
+ // $cfg['LoginCookieValidity']
+ // $cfg['LoginCookieStore']
+ // LoginCookieValidity must be less or equal to LoginCookieStore
+ //
+ if ($cf->getValue('LoginCookieStore') != 0
+ && $cf->getValue('LoginCookieValidity') > $cf->getValue('LoginCookieStore')
+ ) {
+ messages_set(
+ 'error',
+ 'LoginCookieValidity',
+ PMA_lang(PMA_lang_name('LoginCookieValidity')),
+ PMA_lang($strLoginCookieValidityWarning3)
+ );
+ }
+
+ //
+ // $cfg['SaveDir']
+ // should not be world-accessible
+ //
+ if ($cf->getValue('SaveDir') != '') {
+ messages_set(
+ 'notice',
+ 'SaveDir',
+ PMA_lang(PMA_lang_name('SaveDir')),
+ PMA_lang($strDirectoryNotice)
+ );
+ }
+
+ //
+ // $cfg['TempDir']
+ // should not be world-accessible
+ //
+ if ($cf->getValue('TempDir') != '') {
+ messages_set(
+ 'notice',
+ 'TempDir',
+ PMA_lang(PMA_lang_name('TempDir')),
+ PMA_lang($strDirectoryNotice)
+ );
+ }
+
+ //
+ // $cfg['GZipDump']
+ // requires zlib functions
+ //
+ if ($cf->getValue('GZipDump')
+ && (@!function_exists('gzopen') || @!function_exists('gzencode'))
+ ) {
+ messages_set(
+ 'error',
+ 'GZipDump',
+ PMA_lang(PMA_lang_name('GZipDump')),
+ PMA_lang($strGZipDumpWarning, 'gzencode')
+ );
+ }
+
+ //
+ // $cfg['BZipDump']
+ // requires bzip2 functions
+ //
+ if ($cf->getValue('BZipDump')
+ && (!@function_exists('bzopen') || !@function_exists('bzcompress'))
+ ) {
+ $functions = @function_exists('bzopen')
+ ? '' :
+ 'bzopen';
+ $functions .= @function_exists('bzcompress')
+ ? ''
+ : ($functions ? ', ' : '') . 'bzcompress';
+ messages_set(
+ 'error',
+ 'BZipDump',
+ PMA_lang(PMA_lang_name('BZipDump')),
+ PMA_lang($strBZipDumpWarning, $functions)
+ );
+ }
+
+ //
+ // $cfg['ZipDump']
+ // requires zip_open in import
+ //
+ if ($cf->getValue('ZipDump') && !@function_exists('zip_open')) {
+ messages_set(
+ 'error',
+ 'ZipDump_import',
+ PMA_lang(PMA_lang_name('ZipDump')),
+ PMA_lang($strZipDumpImportWarning, 'zip_open')
+ );
+ }
+
+ //
+ // $cfg['ZipDump']
+ // requires gzcompress in export
+ //
+ if ($cf->getValue('ZipDump') && !@function_exists('gzcompress')) {
+ messages_set(
+ 'error',
+ 'ZipDump_export',
+ PMA_lang(PMA_lang_name('ZipDump')),
+ PMA_lang($strZipDumpExportWarning, 'gzcompress')
+ );
+ }
+}
+?>