Merge remote-tracking branch 'origin/dev' into forwardinghosts
commit
7efc720d47
|
@ -9,16 +9,13 @@ if header :contains "X-Spam-Flag" "YES" {
|
|||
}
|
||||
|
||||
if allof (
|
||||
envelope :detail :matches "to" "*",
|
||||
header :contains "X-Moo-Tag" "YES",
|
||||
mailboxexists "INBOX/${s}"
|
||||
) {
|
||||
fileinto "INBOX/${s}";
|
||||
}
|
||||
elsif allof (
|
||||
envelope :detail :matches "to" "*",
|
||||
header :contains "X-Moo-Tag" "YES"
|
||||
) {
|
||||
set :lower "s" "${1}";
|
||||
fileinto :create "INBOX/${s}";
|
||||
set :lower :upperfirst "tag" "${1}";
|
||||
if mailboxexists "INBOX/${1}" {
|
||||
fileinto "INBOX/${1}";
|
||||
} else {
|
||||
fileinto :create "INBOX/${tag}";
|
||||
}
|
||||
}
|
||||
|
|
|
@ -7,9 +7,21 @@ $_SESSION['return_to'] = $_SERVER['REQUEST_URI'];
|
|||
$tfa_data = get_tfa();
|
||||
?>
|
||||
<div class="container">
|
||||
<h4><span class="glyphicon glyphicon-user" aria-hidden="true"></span> <?=$lang['admin']['access'];?></h4>
|
||||
|
||||
<div class="panel-group">
|
||||
<ul class="nav nav-tabs" role="tablist">
|
||||
<li role="presentation" class="active">
|
||||
<a href="#tab-access" aria-controls="tab-access" role="tab" data-toggle="tab"><?=$lang['admin']['access'];?></a>
|
||||
</li>
|
||||
<li role="presentation">
|
||||
<a href="#tab-config" aria-controls="tab-config" role="tab" data-toggle="tab"><?=$lang['admin']['configuration'];?></a>
|
||||
</li>
|
||||
<li role="presentation">
|
||||
<a href="#tab-logs" aria-controls="tab-logs" role="tab" data-toggle="tab"><?=$lang['admin']['logs'];?></a>
|
||||
</li>
|
||||
</ul>
|
||||
|
||||
<div class="tab-content" style="padding-top:20px">
|
||||
<div role="tabpanel" class="tab-pane active" id="tab-access">
|
||||
<div class="panel panel-danger">
|
||||
<div class="panel-heading"><?=$lang['admin']['admin_details'];?></div>
|
||||
<div class="panel-body">
|
||||
|
@ -138,214 +150,233 @@ $tfa_data = get_tfa();
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<h4><span class="glyphicon glyphicon-wrench" aria-hidden="true"></span> <?=$lang['admin']['configuration'];?></h4>
|
||||
|
||||
<div class="panel-group">
|
||||
|
||||
<div class="panel panel-default">
|
||||
<div class="panel-heading"><?=$lang['admin']['dkim_keys'];?></div>
|
||||
<div class="panel-body">
|
||||
<?php
|
||||
foreach(mailbox_get_domains() as $domain) {
|
||||
if (!empty($dkim = dkim_get_key_details($domain))) {
|
||||
?>
|
||||
<div class="row">
|
||||
<div class="col-xs-3">
|
||||
<p>Domain: <strong><?=htmlspecialchars($domain);?></strong><br />
|
||||
<span class="label label-success"><?=$lang['admin']['dkim_key_valid'];?></span>
|
||||
<span class="label label-primary">Selector '<?=$dkim['dkim_selector'];?>'</span>
|
||||
<span class="label label-info"><?=$dkim['length'];?> bit</span>
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-xs-8">
|
||||
<pre><?=$dkim['dkim_txt'];?></pre>
|
||||
</div>
|
||||
<div class="col-xs-1">
|
||||
<form class="form-inline" method="post">
|
||||
<input type="hidden" name="domain" value="<?=$domain;?>">
|
||||
<input type="hidden" name="dkim_delete_key" value="1">
|
||||
<a href="#" onclick="$(this).closest('form').submit()" data-toggle="tooltip" data-placement="top" title="<?=$lang['user']['delete_now'];?>"><span class="glyphicon glyphicon-remove"></span></a>
|
||||
</form>
|
||||
</div>
|
||||
</div>
|
||||
<?php
|
||||
}
|
||||
else {
|
||||
?>
|
||||
<div class="row">
|
||||
<div class="col-xs-3">
|
||||
<p>Domain: <strong><?=htmlspecialchars($domain);?></strong><br /><span class="label label-danger"><?=$lang['admin']['dkim_key_missing'];?></span></p>
|
||||
</div>
|
||||
<div class="col-xs-8"><pre>-</pre></div>
|
||||
<div class="col-xs-1"> </div>
|
||||
</div>
|
||||
<?php
|
||||
}
|
||||
foreach(mailbox_get_alias_domains($domain) as $alias_domain) {
|
||||
if (!empty($dkim = dkim_get_key_details($alias_domain))) {
|
||||
?>
|
||||
<div role="tabpanel" class="tab-pane" id="tab-config">
|
||||
<div class="panel panel-default">
|
||||
<div class="panel-heading"><?=$lang['admin']['dkim_keys'];?></div>
|
||||
<div class="panel-body">
|
||||
<?php
|
||||
foreach(mailbox_get_domains() as $domain) {
|
||||
if (!empty($dkim = dkim_get_key_details($domain))) {
|
||||
?>
|
||||
<div class="row">
|
||||
<div class="col-xs-3">
|
||||
<p>Domain: <strong><?=htmlspecialchars($domain);?></strong><br />
|
||||
<span class="label label-success"><?=$lang['admin']['dkim_key_valid'];?></span>
|
||||
<span class="label label-primary">Selector '<?=$dkim['dkim_selector'];?>'</span>
|
||||
<span class="label label-info"><?=$dkim['length'];?> bit</span>
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-xs-8">
|
||||
<pre><?=$dkim['dkim_txt'];?></pre>
|
||||
</div>
|
||||
<div class="col-xs-1">
|
||||
<form class="form-inline" method="post">
|
||||
<input type="hidden" name="domain" value="<?=$domain;?>">
|
||||
<input type="hidden" name="dkim_delete_key" value="1">
|
||||
<a href="#" onclick="$(this).closest('form').submit()" data-toggle="tooltip" data-placement="top" title="<?=$lang['user']['delete_now'];?>"><span class="glyphicon glyphicon-remove"></span></a>
|
||||
</form>
|
||||
</div>
|
||||
</div>
|
||||
<?php
|
||||
}
|
||||
else {
|
||||
?>
|
||||
<div class="row">
|
||||
<div class="col-xs-offset-1 col-xs-2">
|
||||
<p><small>↳ Alias-Domain: <strong><?=htmlspecialchars($alias_domain);?></strong><br /></small>
|
||||
<span class="label label-success"><?=$lang['admin']['dkim_key_valid'];?></span>
|
||||
<span class="label label-primary">Selector '<?=$dkim['dkim_selector'];?>'</span>
|
||||
<span class="label label-info"><?=$dkim['length'];?> bit</span>
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-xs-8">
|
||||
<pre><?=$dkim['dkim_txt'];?></pre>
|
||||
</div>
|
||||
<div class="col-xs-1">
|
||||
<form class="form-inline" method="post">
|
||||
<input type="hidden" name="domain" value="<?=$alias_domain;?>">
|
||||
<input type="hidden" name="dkim_delete_key" value="1">
|
||||
<a href="#" onclick="$(this).closest('form').submit()" data-toggle="tooltip" data-placement="top" title="<?=$lang['user']['delete_now'];?>"><span class="glyphicon glyphicon-remove"></span></a>
|
||||
</form>
|
||||
<div class="col-xs-3">
|
||||
<p>Domain: <strong><?=htmlspecialchars($domain);?></strong><br /><span class="label label-danger"><?=$lang['admin']['dkim_key_missing'];?></span></p>
|
||||
</div>
|
||||
<div class="col-xs-8"><pre>-</pre></div>
|
||||
<div class="col-xs-1"> </div>
|
||||
</div>
|
||||
<?php
|
||||
}
|
||||
else {
|
||||
?>
|
||||
<div class="row">
|
||||
<div class="col-xs-2 col-xs-offset-1">
|
||||
<p><small>↳ Alias-Domain: <strong><?=htmlspecialchars($alias_domain);?></strong><br /></small><span class="label label-danger"><?=$lang['admin']['dkim_key_missing'];?></span></p>
|
||||
</div>
|
||||
<div class="col-xs-8"><pre>-</pre></div>
|
||||
<div class="col-xs-1"> </div>
|
||||
</div>
|
||||
<?php
|
||||
}
|
||||
}
|
||||
}
|
||||
foreach(dkim_get_blind_keys() as $blind) {
|
||||
if (!empty($dkim = dkim_get_key_details($blind))) {
|
||||
?>
|
||||
<div class="row">
|
||||
<div class="col-xs-3">
|
||||
<p>Domain: <strong><?=htmlspecialchars($blind);?></strong><br />
|
||||
<span class="label label-warning"><?=$lang['admin']['dkim_key_unused'];?></span>
|
||||
<span class="label label-primary">Selector '<?=$dkim['dkim_selector'];?>'</span>
|
||||
<span class="label label-info"><?=$dkim['length'];?> bit</span>
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-xs-8">
|
||||
<pre><?=$dkim['dkim_txt'];?></pre>
|
||||
</div>
|
||||
<div class="col-xs-1">
|
||||
<form class="form-inline" method="post">
|
||||
<input type="hidden" name="domain" value="<?=$blind;?>">
|
||||
<input type="hidden" name="dkim_delete_key" value="1">
|
||||
<a href="#" onclick="$(this).closest('form').submit()" data-toggle="tooltip" data-placement="top" title="<?=$lang['user']['delete_now'];?>"><span class="glyphicon glyphicon-remove"></span></a>
|
||||
</form>
|
||||
</div>
|
||||
</div>
|
||||
<?php
|
||||
}
|
||||
}
|
||||
?>
|
||||
<legend style="margin-top:40px"><?=$lang['admin']['dkim_add_key'];?></legend>
|
||||
<form class="form-inline" role="form" method="post">
|
||||
<div class="form-group">
|
||||
<label for="domain">Domain</label>
|
||||
<input class="form-control" id="domain" name="domain" placeholder="example.org" required>
|
||||
</div>
|
||||
<div class="form-group">
|
||||
<label for="domain">Selector</label>
|
||||
<input class="form-control" id="dkim_selector" name="dkim_selector" value="dkim" required>
|
||||
</div>
|
||||
<div class="form-group">
|
||||
<select data-width="200px" class="form-control" id="key_size" name="key_size" title="<?=$lang['admin']['dkim_key_length'];?>" required>
|
||||
<option data-subtext="bits">1024</option>
|
||||
<option data-subtext="bits">2048</option>
|
||||
</select>
|
||||
</div>
|
||||
<button type="submit" name="dkim_add_key" class="btn btn-default"><span class="glyphicon glyphicon-plus"></span> <?=$lang['admin']['add'];?></button>
|
||||
</form>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="panel panel-default">
|
||||
<div class="panel-heading"><?=$lang['admin']['forwarding_hosts'];?></div>
|
||||
<div class="panel-body">
|
||||
<p style="margin-bottom:40px"><?=$lang['admin']['forwarding_hosts_hint'];?></p>
|
||||
<form method="post">
|
||||
<div class="table-responsive">
|
||||
<table class="table table-striped" id="forwardinghoststable">
|
||||
<thead>
|
||||
<tr>
|
||||
<th style="min-width: 100px;"><?=$lang['edit']['host'];?></th>
|
||||
<th style="min-width: 100px;"><?=$lang['edit']['source'];?></th>
|
||||
<th style="min-width: 100px;"><?=$lang['user']['spamfilter'];?></th>
|
||||
<th style="text-align: right; min-width: 200px;"><?=$lang['admin']['action'];?></th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<?php
|
||||
$forwarding_hosts = get_forwarding_hosts();
|
||||
if ($forwarding_hosts) {
|
||||
foreach ($forwarding_hosts as $host) {
|
||||
?>
|
||||
<tr id="data">
|
||||
<td><?=htmlspecialchars(strtolower($host->host));?></td>
|
||||
<td><?=htmlspecialchars(strtolower($host->source));?></td>
|
||||
<td><?=$host->filter_spam ? "✔" : "✘";?></td>
|
||||
<td style="text-align: right;">
|
||||
<div class="btn-group">
|
||||
<a href="delete.php?forwardinghost=<?=$host->host;?>" class="btn btn-xs btn-danger"><span class="glyphicon glyphicon-trash"></span> <?=$lang['admin']['remove'];?></a>
|
||||
</div>
|
||||
</td>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<?php
|
||||
}
|
||||
} else {
|
||||
<?php
|
||||
}
|
||||
foreach(mailbox_get_alias_domains($domain) as $alias_domain) {
|
||||
if (!empty($dkim = dkim_get_key_details($alias_domain))) {
|
||||
?>
|
||||
<tr id="no-data"><td colspan="4" style="text-align: center; font-style: italic;"><?=$lang['admin']['no_record'];?></td></tr>
|
||||
<div class="row">
|
||||
<div class="col-xs-offset-1 col-xs-2">
|
||||
<p><small>↳ Alias-Domain: <strong><?=htmlspecialchars($alias_domain);?></strong><br /></small>
|
||||
<span class="label label-success"><?=$lang['admin']['dkim_key_valid'];?></span>
|
||||
<span class="label label-primary">Selector '<?=$dkim['dkim_selector'];?>'</span>
|
||||
<span class="label label-info"><?=$dkim['length'];?> bit</span>
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-xs-8">
|
||||
<pre><?=$dkim['dkim_txt'];?></pre>
|
||||
</div>
|
||||
<div class="col-xs-1">
|
||||
<form class="form-inline" method="post">
|
||||
<input type="hidden" name="domain" value="<?=$alias_domain;?>">
|
||||
<input type="hidden" name="dkim_delete_key" value="1">
|
||||
<a href="#" onclick="$(this).closest('form').submit()" data-toggle="tooltip" data-placement="top" title="<?=$lang['user']['delete_now'];?>"><span class="glyphicon glyphicon-remove"></span></a>
|
||||
</form>
|
||||
</div>
|
||||
</div>
|
||||
<?php
|
||||
}
|
||||
else {
|
||||
?>
|
||||
</tbody>
|
||||
</table>
|
||||
</div>
|
||||
</form>
|
||||
<legend><?=$lang['admin']['add_forwarding_host'];?></legend>
|
||||
<p class="help-block"><?=$lang['admin']['forwarding_hosts_add_hint'];?></p>
|
||||
<form class="form-horizontal" role="form" method="post">
|
||||
<div class="form-group">
|
||||
<label class="control-label col-sm-2" for="hostname"><?=$lang['edit']['host'];?>:</label>
|
||||
<div class="col-sm-10">
|
||||
<input type="text" class="form-control" name="hostname" id="hostname" required>
|
||||
<div class="row">
|
||||
<div class="col-xs-2 col-xs-offset-1">
|
||||
<p><small>↳ Alias-Domain: <strong><?=htmlspecialchars($alias_domain);?></strong><br /></small><span class="label label-danger"><?=$lang['admin']['dkim_key_missing'];?></span></p>
|
||||
</div>
|
||||
<div class="col-xs-8"><pre>-</pre></div>
|
||||
<div class="col-xs-1"> </div>
|
||||
</div>
|
||||
<?php
|
||||
}
|
||||
}
|
||||
}
|
||||
foreach(dkim_get_blind_keys() as $blind) {
|
||||
if (!empty($dkim = dkim_get_key_details($blind))) {
|
||||
?>
|
||||
<div class="row">
|
||||
<div class="col-xs-3">
|
||||
<p>Domain: <strong><?=htmlspecialchars($blind);?></strong><br />
|
||||
<span class="label label-warning"><?=$lang['admin']['dkim_key_unused'];?></span>
|
||||
<span class="label label-primary">Selector '<?=$dkim['dkim_selector'];?>'</span>
|
||||
<span class="label label-info"><?=$dkim['length'];?> bit</span>
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-xs-8">
|
||||
<pre><?=$dkim['dkim_txt'];?></pre>
|
||||
</div>
|
||||
<div class="col-xs-1">
|
||||
<form class="form-inline" method="post">
|
||||
<input type="hidden" name="domain" value="<?=$blind;?>">
|
||||
<input type="hidden" name="dkim_delete_key" value="1">
|
||||
<a href="#" onclick="$(this).closest('form').submit()" data-toggle="tooltip" data-placement="top" title="<?=$lang['user']['delete_now'];?>"><span class="glyphicon glyphicon-remove"></span></a>
|
||||
</form>
|
||||
</div>
|
||||
</div>
|
||||
<?php
|
||||
}
|
||||
}
|
||||
?>
|
||||
<legend style="margin-top:40px"><?=$lang['admin']['dkim_add_key'];?></legend>
|
||||
<form class="form-inline" role="form" method="post">
|
||||
<div class="form-group">
|
||||
<label for="domain">Domain</label>
|
||||
<input class="form-control" id="domain" name="domain" placeholder="example.org" required>
|
||||
</div>
|
||||
</div>
|
||||
<div class="form-group">
|
||||
<div class="col-sm-offset-2 col-sm-10">
|
||||
<div class="checkbox">
|
||||
<label><input type="checkbox" name="filter_spam"> <?=$lang['user']['spamfilter'];?></label>
|
||||
<div class="form-group">
|
||||
<label for="domain">Selector</label>
|
||||
<input class="form-control" id="dkim_selector" name="dkim_selector" value="dkim" required>
|
||||
</div>
|
||||
<div class="form-group">
|
||||
<select data-width="200px" class="form-control" id="key_size" name="key_size" title="<?=$lang['admin']['dkim_key_length'];?>" required>
|
||||
<option data-subtext="bits">1024</option>
|
||||
<option data-subtext="bits">2048</option>
|
||||
</select>
|
||||
</div>
|
||||
<button type="submit" name="dkim_add_key" class="btn btn-default"><span class="glyphicon glyphicon-plus"></span> <?=$lang['admin']['add'];?></button>
|
||||
</form>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="panel panel-default">
|
||||
<div class="panel-heading"><?=$lang['admin']['forwarding_hosts'];?></div>
|
||||
<div class="panel-body">
|
||||
<p style="margin-bottom:40px"><?=$lang['admin']['forwarding_hosts_hint'];?></p>
|
||||
<form method="post">
|
||||
<div class="table-responsive">
|
||||
<table class="table table-striped" id="forwardinghoststable">
|
||||
<thead>
|
||||
<tr>
|
||||
<th style="min-width: 100px;"><?=$lang['edit']['host'];?></th>
|
||||
<th style="min-width: 100px;"><?=$lang['edit']['source'];?></th>
|
||||
<th style="min-width: 100px;"><?=$lang['user']['spamfilter'];?></th>
|
||||
<th style="text-align: right; min-width: 200px;"><?=$lang['admin']['action'];?></th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<?php
|
||||
$forwarding_hosts = get_forwarding_hosts();
|
||||
if ($forwarding_hosts) {
|
||||
foreach ($forwarding_hosts as $host) {
|
||||
?>
|
||||
<tr id="data">
|
||||
<td><?=htmlspecialchars(strtolower($host->host));?></td>
|
||||
<td><?=htmlspecialchars(strtolower($host->source));?></td>
|
||||
<td style="text-align: right;">
|
||||
<div class="btn-group">
|
||||
<a href="delete.php?forwardinghost=<?=$host->host;?>" class="btn btn-xs btn-danger"><span class="glyphicon glyphicon-trash"></span> <?=$lang['admin']['remove'];?></a>
|
||||
</div>
|
||||
</td>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<?php
|
||||
}
|
||||
} else {
|
||||
?>
|
||||
<tr id="no-data"><td colspan="4" style="text-align: center; font-style: italic;"><?=$lang['admin']['no_record'];?></td></tr>
|
||||
<?php
|
||||
}
|
||||
?>
|
||||
</tbody>
|
||||
</table>
|
||||
</div>
|
||||
</form>
|
||||
<legend><?=$lang['admin']['add_forwarding_host'];?></legend>
|
||||
<p class="help-block"><?=$lang['admin']['forwarding_hosts_add_hint'];?></p>
|
||||
<form class="form-horizontal" role="form" method="post">
|
||||
<div class="form-group">
|
||||
<label class="control-label col-sm-2" for="hostname"><?=$lang['edit']['host'];?>:</label>
|
||||
<div class="col-sm-10">
|
||||
<input type="text" class="form-control" name="hostname" id="hostname" required>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<div class="form-group">
|
||||
<div class="col-sm-offset-2 col-sm-10">
|
||||
<button type="submit" name="add_forwarding_host" class="btn btn-default"><?=$lang['admin']['add'];?></button>
|
||||
<div class="form-group">
|
||||
<label class="control-label col-sm-2" for="filter_spam"><?=$lang['user']['spamfilter'];?>:</label>
|
||||
<div class="col-sm-10">
|
||||
<input type="checkbox" class="form-control" name="filter_spam" id="filter_spam">
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</form>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<h4><span class="glyphicon glyphicon-book" aria-hidden="true"></span> Mail Logs</h4>
|
||||
<div class="panel-group">
|
||||
<div class="panel panel-default">
|
||||
<div class="panel-heading">Logs</div>
|
||||
<div class="panel-body">
|
||||
<div class="table-responsive">
|
||||
<table class="table table-striped" id="dovecot_log"></table>
|
||||
<div class="form-group">
|
||||
<div class="col-sm-offset-2 col-sm-10">
|
||||
<button type="submit" name="add_forwarding_host" class="btn btn-default"><?=$lang['admin']['add'];?></button>
|
||||
</div>
|
||||
</div>
|
||||
</form>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div role="tabpanel" class="tab-pane" id="tab-logs">
|
||||
<div class="panel panel-default">
|
||||
<div class="panel-heading">Dovecot
|
||||
<div class="btn-group pull-right">
|
||||
<a class="btn btn-xs btn-default dropdown-toggle" data-toggle="dropdown" href="#"><?=$lang['admin']['action'];?> <span class="caret"></span></a>
|
||||
<ul class="dropdown-menu">
|
||||
<li><a href="#" id="refresh_dovecot_log"><?=$lang['admin']['refresh'];?></a></li>
|
||||
</ul>
|
||||
</div>
|
||||
</div>
|
||||
<div class="panel-body">
|
||||
<div class="table-responsive">
|
||||
<table class="table table-striped" id="dovecot_log"></table>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<div class="panel panel-default">
|
||||
<div class="panel-heading">Postfix
|
||||
<div class="btn-group pull-right">
|
||||
<a class="btn btn-xs btn-default dropdown-toggle" data-toggle="dropdown" href="#"><?=$lang['admin']['action'];?> <span class="caret"></span></a>
|
||||
<ul class="dropdown-menu">
|
||||
<li><a href="#" id="refresh_postfix_log"><?=$lang['admin']['refresh'];?></a></li>
|
||||
</ul>
|
||||
</div>
|
||||
</div>
|
||||
<div class="panel-body">
|
||||
<div class="table-responsive">
|
||||
<table class="table table-striped" id="postfix_log"></table>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</div> <!-- /container -->
|
||||
<script type='text/javascript'>
|
||||
|
|
|
@ -10,4 +10,7 @@ table.footable>tbody>tr.footable-empty>td {
|
|||
}
|
||||
.table-responsive {
|
||||
overflow: visible !important;
|
||||
}
|
||||
}
|
||||
body {
|
||||
overflow-y:scroll;
|
||||
}
|
||||
|
|
|
@ -5208,7 +5208,10 @@ function get_logs($container, $lines = 100) {
|
|||
}
|
||||
if ($container == "postfix-mailcow") {
|
||||
if ($data = $redis->lRange('POSTFIX_MAILLOG', 1, $lines)) {
|
||||
return $data;
|
||||
foreach ($data as $json_line) {
|
||||
$data_array[] = json_decode($json_line, true);
|
||||
}
|
||||
return $data_array;
|
||||
}
|
||||
}
|
||||
return false;
|
||||
|
|
|
@ -1,6 +1,7 @@
|
|||
{
|
||||
"require": {
|
||||
"robthree/twofactorauth": "^1.6",
|
||||
"yubico/u2flib-server": "^1.0"
|
||||
"yubico/u2flib-server": "^1.0",
|
||||
"owasp/csrf-protector-php": "dev-master"
|
||||
}
|
||||
}
|
||||
|
|
|
@ -4,8 +4,44 @@
|
|||
"Read more about it at https://getcomposer.org/doc/01-basic-usage.md#composer-lock-the-lock-file",
|
||||
"This file is @generated automatically"
|
||||
],
|
||||
"content-hash": "5652a086b6d277d72d7ae0341e517b1e",
|
||||
"content-hash": "413fc63dc6c7815f0a175217bccb490a",
|
||||
"packages": [
|
||||
{
|
||||
"name": "owasp/csrf-protector-php",
|
||||
"version": "dev-master",
|
||||
"source": {
|
||||
"type": "git",
|
||||
"url": "https://github.com/mebjas/CSRF-Protector-PHP.git",
|
||||
"reference": "aec0d6966992363a7192b2ae9fb0a9643e8fa26b"
|
||||
},
|
||||
"dist": {
|
||||
"type": "zip",
|
||||
"url": "https://api.github.com/repos/mebjas/CSRF-Protector-PHP/zipball/aec0d6966992363a7192b2ae9fb0a9643e8fa26b",
|
||||
"reference": "aec0d6966992363a7192b2ae9fb0a9643e8fa26b",
|
||||
"shasum": ""
|
||||
},
|
||||
"require-dev": {
|
||||
"satooshi/php-coveralls": "~1.0"
|
||||
},
|
||||
"type": "library",
|
||||
"autoload": {
|
||||
"classmap": [
|
||||
"libs/csrf/"
|
||||
]
|
||||
},
|
||||
"notification-url": "https://packagist.org/downloads/",
|
||||
"license": [
|
||||
"APACHE"
|
||||
],
|
||||
"description": "CSRF protector php, a standalone php library for csrf mitigation in web applications. Easy to integrate in any php web app.",
|
||||
"homepage": "https://github.com/mebjas/CSRF-Protector-PHP",
|
||||
"keywords": [
|
||||
"csrf",
|
||||
"owasp",
|
||||
"security"
|
||||
],
|
||||
"time": "2017-04-12 05:47:07"
|
||||
},
|
||||
{
|
||||
"name": "robthree/twofactorauth",
|
||||
"version": "1.6",
|
||||
|
@ -92,7 +128,9 @@
|
|||
"packages-dev": [],
|
||||
"aliases": [],
|
||||
"minimum-stability": "stable",
|
||||
"stability-flags": [],
|
||||
"stability-flags": {
|
||||
"owasp/csrf-protector-php": 20
|
||||
},
|
||||
"prefer-stable": false,
|
||||
"prefer-lowest": false,
|
||||
"platform": [],
|
||||
|
|
|
@ -6,6 +6,14 @@ $vendorDir = dirname(dirname(__FILE__));
|
|||
$baseDir = dirname($vendorDir);
|
||||
|
||||
return array(
|
||||
'alreadyInitializedException' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'baseJSFileNotFoundExceptio' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'configFileNotFoundException' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'csrfProtector' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'incompleteConfigurationException' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'jsFileNotFoundException' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'logDirectoryNotFoundException' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'logFileWriteError' => $vendorDir . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'u2flib_server\\Error' => $vendorDir . '/yubico/u2flib-server/src/u2flib_server/U2F.php',
|
||||
'u2flib_server\\RegisterRequest' => $vendorDir . '/yubico/u2flib-server/src/u2flib_server/U2F.php',
|
||||
'u2flib_server\\Registration' => $vendorDir . '/yubico/u2flib-server/src/u2flib_server/U2F.php',
|
||||
|
|
|
@ -21,6 +21,14 @@ class ComposerStaticInit873464e4bd965a3168f133248b1b218b
|
|||
);
|
||||
|
||||
public static $classMap = array (
|
||||
'alreadyInitializedException' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'baseJSFileNotFoundExceptio' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'configFileNotFoundException' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'csrfProtector' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'incompleteConfigurationException' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'jsFileNotFoundException' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'logDirectoryNotFoundException' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'logFileWriteError' => __DIR__ . '/..' . '/owasp/csrf-protector-php/libs/csrf/csrfprotector.php',
|
||||
'u2flib_server\\Error' => __DIR__ . '/..' . '/yubico/u2flib-server/src/u2flib_server/U2F.php',
|
||||
'u2flib_server\\RegisterRequest' => __DIR__ . '/..' . '/yubico/u2flib-server/src/u2flib_server/U2F.php',
|
||||
'u2flib_server\\Registration' => __DIR__ . '/..' . '/yubico/u2flib-server/src/u2flib_server/U2F.php',
|
||||
|
|
|
@ -84,5 +84,43 @@
|
|||
],
|
||||
"description": "Library for U2F implementation",
|
||||
"homepage": "https://developers.yubico.com/php-u2flib-server"
|
||||
},
|
||||
{
|
||||
"name": "owasp/csrf-protector-php",
|
||||
"version": "dev-master",
|
||||
"version_normalized": "9999999-dev",
|
||||
"source": {
|
||||
"type": "git",
|
||||
"url": "https://github.com/mebjas/CSRF-Protector-PHP.git",
|
||||
"reference": "aec0d6966992363a7192b2ae9fb0a9643e8fa26b"
|
||||
},
|
||||
"dist": {
|
||||
"type": "zip",
|
||||
"url": "https://api.github.com/repos/mebjas/CSRF-Protector-PHP/zipball/aec0d6966992363a7192b2ae9fb0a9643e8fa26b",
|
||||
"reference": "aec0d6966992363a7192b2ae9fb0a9643e8fa26b",
|
||||
"shasum": ""
|
||||
},
|
||||
"require-dev": {
|
||||
"satooshi/php-coveralls": "~1.0"
|
||||
},
|
||||
"time": "2017-04-12T05:47:07+00:00",
|
||||
"type": "library",
|
||||
"installation-source": "source",
|
||||
"autoload": {
|
||||
"classmap": [
|
||||
"libs/csrf/"
|
||||
]
|
||||
},
|
||||
"notification-url": "https://packagist.org/downloads/",
|
||||
"license": [
|
||||
"APACHE"
|
||||
],
|
||||
"description": "CSRF protector php, a standalone php library for csrf mitigation in web applications. Easy to integrate in any php web app.",
|
||||
"homepage": "https://github.com/mebjas/CSRF-Protector-PHP",
|
||||
"keywords": [
|
||||
"csrf",
|
||||
"owasp",
|
||||
"security"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
|
|
@ -0,0 +1,4 @@
|
|||
service_name: travis-ci
|
||||
src_dir: ./libs/
|
||||
coverage_clover: build/logs/clover.xml
|
||||
json_path: build/logs/coveralls-upload.json
|
|
@ -0,0 +1,46 @@
|
|||
language: php
|
||||
php:
|
||||
- "5.6"
|
||||
- "5.5"
|
||||
- "5.4"
|
||||
- "5.3"
|
||||
- "7.0"
|
||||
- "7.1"
|
||||
- hhvm
|
||||
- nightly
|
||||
|
||||
matrix:
|
||||
allow_failures:
|
||||
- php: nightly
|
||||
- php: hhvm
|
||||
|
||||
os:
|
||||
- linux
|
||||
|
||||
install:
|
||||
# Install composer packages, will also trigger dump-autoload
|
||||
- composer install --no-interaction
|
||||
# Install coveralls.phar
|
||||
- wget -c -nc --retry-connrefused --tries=0 https://github.com/satooshi/php-coveralls/releases/download/v1.0.1/coveralls.phar
|
||||
- chmod +x coveralls.phar
|
||||
- php coveralls.phar --version
|
||||
|
||||
before_script:
|
||||
- mkdir -p build/logs
|
||||
- ls -al
|
||||
|
||||
script:
|
||||
- mkdir -p build/logs
|
||||
- if [ $(phpenv version-name) = 'hhvm' ]; then echo 'xdebug.enable=1' >> /etc/hhvm/php.ini; fi
|
||||
- phpunit --stderr --coverage-clover build/logs/clover.xml
|
||||
|
||||
after_script:
|
||||
- php vendor/bin/coveralls -v
|
||||
|
||||
after_success:
|
||||
- travis_retry php coveralls.phar -v
|
||||
|
||||
cache:
|
||||
directories:
|
||||
- vendor
|
||||
- $HOME/.cache/composer
|
|
@ -0,0 +1,14 @@
|
|||
{
|
||||
"name": "owasp/csrf-protector-php",
|
||||
"type": "library",
|
||||
"description": "CSRF protector php, a standalone php library for csrf mitigation in web applications. Easy to integrate in any php web app.",
|
||||
"keywords": ["security","csrf", "owasp"],
|
||||
"homepage": "https://github.com/mebjas/CSRF-Protector-PHP",
|
||||
"license": "APACHE",
|
||||
"require-dev": {
|
||||
"satooshi/php-coveralls": "~1.0"
|
||||
},
|
||||
"autoload": {
|
||||
"classmap": ["libs/csrf/"]
|
||||
}
|
||||
}
|
File diff suppressed because one or more lines are too long
|
@ -0,0 +1 @@
|
|||
<html><head><meta http-equiv="Refresh" CONTENT="0; URL=files/libs/csrf/csrfprotector-php.html"></head></html>
|
|
@ -0,0 +1,33 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>File Index</title><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script><script language=JavaScript src="../javascript/searchdata.js"></script></head><body class="IndexPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=IPageTitle>File Index</div><div class=INavigationBar>$#! · 0-9 · A · B · <a href="#C">C</a> · D · E · F · G · H · I · J · K · L · M · N · O · P · Q · R · S · T · U · V · W · X · Y · Z</div><table border=0 cellspacing=0 cellpadding=0><tr><td class=IHeading id=IFirstHeading><a name="C"></a>C</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#csrfprotector.php" class=ISymbol>csrfprotector.php</a></td></tr></table>
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<!--END_ND_TOOLTIPS-->
|
||||
|
||||
</div><!--Index-->
|
||||
|
||||
|
||||
<div id=Footer><a href="http://www.naturaldocs.org">Generated by Natural Docs</a></div><!--Footer-->
|
||||
|
||||
|
||||
<div id=Menu><div class=MEntry><div class=MFile><a href="../files/libs/csrf/csrfprotector-php.html">csrfprotector.php</a></div></div><div class=MEntry><div class=MGroup><a href="javascript:ToggleMenu('MGroupContent1')">Index</a><div class=MGroupContent id=MGroupContent1><div class=MEntry><div class=MIndex><a href="General.html">Everything</a></div></div><div class=MEntry><div class=MIndex id=MSelected>Files</div></div><div class=MEntry><div class=MIndex><a href="Functions.html">Functions</a></div></div><div class=MEntry><div class=MIndex><a href="Variables.html">Variables</a></div></div></div></div></div><script type="text/javascript"><!--
|
||||
var searchPanel = new SearchPanel("searchPanel", "HTML", "../search");
|
||||
--></script><div id=MSearchPanel class=MSearchPanelInactive><input type=text id=MSearchField value=Search onFocus="searchPanel.OnSearchFieldFocus(true)" onBlur="searchPanel.OnSearchFieldFocus(false)" onKeyUp="searchPanel.OnSearchFieldChange()"><select id=MSearchType onFocus="searchPanel.OnSearchTypeFocus(true)" onBlur="searchPanel.OnSearchTypeFocus(false)" onChange="searchPanel.OnSearchTypeChange()"><option id=MSearchEverything selected value="General">Everything</option><option value="Files">Files</option><option value="Functions">Functions</option><option value="Variables">Variables</option></select></div></div><!--Menu-->
|
||||
|
||||
|
||||
<div id=MSearchResultsWindow><iframe src="" frameborder=0 name=MSearchResults id=MSearchResults></iframe><a href="javascript:searchPanel.CloseResultsWindow()" id=MSearchResultsWindowClose>Close</a></div>
|
||||
|
||||
|
||||
<script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,65 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>Function Index</title><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script><script language=JavaScript src="../javascript/searchdata.js"></script></head><body class="IndexPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=IPageTitle>Function Index</div><div class=INavigationBar>$#! · 0-9 · <a href="#A">A</a> · B · <a href="#C">C</a> · D · E · <a href="#F">F</a> · <a href="#G">G</a> · H · <a href="#I">I</a> · J · K · <a href="#L">L</a> · M · N · <a href="#O">O</a> · P · Q · <a href="#R">R</a> · S · T · <a href="#U">U</a> · V · W · X · Y · Z</div><table border=0 cellspacing=0 cellpadding=0><tr><td class=IHeading id=IFirstHeading><a name="A"></a>A</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#authorisePost" id=link1 onMouseOver="ShowTip(event, 'tt1', 'link1')" onMouseOut="HideTip('tt1')" class=ISymbol>authorisePost</a></td></tr><tr><td class=IHeading><a name="C"></a>C</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#createNewJsCache" id=link2 onMouseOver="ShowTip(event, 'tt2', 'link2')" onMouseOut="HideTip('tt2')" class=ISymbol>createNewJsCache</a></td></tr><tr><td class=IHeading><a name="F"></a>F</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#failedValidationAction" id=link3 onMouseOver="ShowTip(event, 'tt3', 'link3')" onMouseOut="HideTip('tt3')" class=ISymbol>failedValidationAction</a></td></tr><tr><td class=IHeading><a name="G"></a>G</td><td></td></tr><tr><td class=ISymbolPrefix id=IFirstSymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#generateAuthToken" id=link4 onMouseOver="ShowTip(event, 'tt4', 'link4')" onMouseOut="HideTip('tt4')" class=ISymbol>generateAuthToken</a></td></tr><tr><td class=ISymbolPrefix id=ILastSymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#getCurrentUrl" id=link5 onMouseOver="ShowTip(event, 'tt5', 'link5')" onMouseOut="HideTip('tt5')" class=ISymbol>getCurrentUrl</a></td></tr><tr><td class=IHeading><a name="I"></a>I</td><td></td></tr><tr><td class=ISymbolPrefix id=IFirstSymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#init" id=link6 onMouseOver="ShowTip(event, 'tt6', 'link6')" onMouseOut="HideTip('tt6')" class=ISymbol>init</a></td></tr><tr><td class=ISymbolPrefix id=ILastSymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#isURLallowed" id=link7 onMouseOver="ShowTip(event, 'tt7', 'link7')" onMouseOut="HideTip('tt7')" class=ISymbol>isURLallowed</a></td></tr><tr><td class=IHeading><a name="L"></a>L</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#logCSRFattack" id=link8 onMouseOver="ShowTip(event, 'tt8', 'link8')" onMouseOut="HideTip('tt8')" class=ISymbol>logCSRFattack</a></td></tr><tr><td class=IHeading><a name="O"></a>O</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#ob_handler" id=link9 onMouseOver="ShowTip(event, 'tt9', 'link9')" onMouseOut="HideTip('tt9')" class=ISymbol>ob_handler</a></td></tr><tr><td class=IHeading><a name="R"></a>R</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#refreshToken" id=link10 onMouseOver="ShowTip(event, 'tt10', 'link10')" onMouseOut="HideTip('tt10')" class=ISymbol>refreshToken</a></td></tr><tr><td class=IHeading><a name="U"></a>U</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix> </td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#useCachedVersion" id=link11 onMouseOver="ShowTip(event, 'tt11', 'link11')" onMouseOut="HideTip('tt11')" class=ISymbol>useCachedVersion</a></td></tr></table>
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<div class=CToolTip id="tt1"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static function authorisePost()</td></tr></table></blockquote>function to authorise incoming post requests</div></div><!--END_ND_TOOLTIPS-->
|
||||
|
||||
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<div class=CToolTip id="tt2"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static function createNewJsCache()</td></tr></table></blockquote>Function to create new cache version of js</div></div><!--END_ND_TOOLTIPS-->
|
||||
|
||||
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<div class=CToolTip id="tt3"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">private static function failedValidationAction()</td></tr></table></blockquote>function to be called in case of failed validation performs logging and take appropriate action</div></div><!--END_ND_TOOLTIPS-->
|
||||
|
||||
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<div class=CToolTip id="tt4"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static function generateAuthToken()</td></tr></table></blockquote>function to generate random hash of length as given in parameter max length = 128</div></div><div class=CToolTip id="tt5"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">private static function getCurrentUrl()</td></tr></table></blockquote>Function to return current url of executing page</div></div><!--END_ND_TOOLTIPS-->
|
||||
|
||||
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<div class=CToolTip id="tt6"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td><table border=0 cellspacing=0 cellpadding=0><tr><td class="PBeforeParameters prettyprint "nowrap>public static function init(</td><td class="PParameter prettyprint " nowrap>$length</td><td class="PDefaultValuePrefix prettyprint "> = </td><td class="PDefaultValue prettyprint " width=100%> null,</td></tr><tr><td></td><td class="PParameter prettyprint " nowrap>$action</td><td class="PDefaultValuePrefix prettyprint "> = </td><td class="PDefaultValue prettyprint " width=100%> null</td><td class="PAfterParameters prettyprint "nowrap>)</td></tr></table></td></tr></table></blockquote>function to initialise the csrfProtector work flow</div></div><div class=CToolTip id="tt7"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static function isURLallowed()</td></tr></table></blockquote>Function to check if a url mataches for any urls Listed in config file</div></div><!--END_ND_TOOLTIPS-->
|
||||
|
||||
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<div class=CToolTip id="tt8"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">private static function logCSRFattack()</td></tr></table></blockquote>Functio to log CSRF Attack</div></div><!--END_ND_TOOLTIPS-->
|
||||
|
||||
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<div class=CToolTip id="tt9"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td><table border=0 cellspacing=0 cellpadding=0><tr><td class="PBeforeParameters prettyprint "nowrap>public static function ob_handler(</td><td class="PParameter prettyprint " nowrap>$buffer,</td></tr><tr><td></td><td class="PParameter prettyprint " nowrap>$flags</td><td class="PAfterParameters prettyprint "nowrap>)</td></tr></table></td></tr></table></blockquote>Rewrites form on the fly to add CSRF tokens to them. </div></div><!--END_ND_TOOLTIPS-->
|
||||
|
||||
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<div class=CToolTip id="tt10"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static function refreshToken()</td></tr></table></blockquote>Function to set auth cookie</div></div><!--END_ND_TOOLTIPS-->
|
||||
|
||||
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<div class=CToolTip id="tt11"><div class=CFunction><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static function useCachedVersion()</td></tr></table></blockquote>function to check weather to use cached version of js file or not</div></div><!--END_ND_TOOLTIPS-->
|
||||
|
||||
</div><!--Index-->
|
||||
|
||||
|
||||
<div id=Footer><a href="http://www.naturaldocs.org">Generated by Natural Docs</a></div><!--Footer-->
|
||||
|
||||
|
||||
<div id=Menu><div class=MEntry><div class=MFile><a href="../files/libs/csrf/csrfprotector-php.html">csrfprotector.php</a></div></div><div class=MEntry><div class=MGroup><a href="javascript:ToggleMenu('MGroupContent1')">Index</a><div class=MGroupContent id=MGroupContent1><div class=MEntry><div class=MIndex><a href="General.html">Everything</a></div></div><div class=MEntry><div class=MIndex><a href="Files.html">Files</a></div></div><div class=MEntry><div class=MIndex id=MSelected>Functions</div></div><div class=MEntry><div class=MIndex><a href="Variables.html">Variables</a></div></div></div></div></div><script type="text/javascript"><!--
|
||||
var searchPanel = new SearchPanel("searchPanel", "HTML", "../search");
|
||||
--></script><div id=MSearchPanel class=MSearchPanelInactive><input type=text id=MSearchField value=Search onFocus="searchPanel.OnSearchFieldFocus(true)" onBlur="searchPanel.OnSearchFieldFocus(false)" onKeyUp="searchPanel.OnSearchFieldChange()"><select id=MSearchType onFocus="searchPanel.OnSearchTypeFocus(true)" onBlur="searchPanel.OnSearchTypeFocus(false)" onChange="searchPanel.OnSearchTypeChange()"><option id=MSearchEverything selected value="General">Everything</option><option value="Files">Files</option><option value="Functions">Functions</option><option value="Variables">Variables</option></select></div></div><!--Menu-->
|
||||
|
||||
|
||||
<div id=MSearchResultsWindow><iframe src="" frameborder=0 name=MSearchResults id=MSearchResults></iframe><a href="javascript:searchPanel.CloseResultsWindow()" id=MSearchResultsWindowClose>Close</a></div>
|
||||
|
||||
|
||||
<script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
File diff suppressed because one or more lines are too long
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>Variable Index</title><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script><script language=JavaScript src="../javascript/searchdata.js"></script></head><body class="IndexPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=IPageTitle>Variable Index</div><div class=INavigationBar>$#! · 0-9 · A · B · <a href="#C">C</a> · D · E · F · G · H · <a href="#I">I</a> · J · K · L · M · N · O · P · Q · <a href="#R">R</a> · S · T · U · V · W · X · Y · Z</div><table border=0 cellspacing=0 cellpadding=0><tr><td class=IHeading id=IFirstHeading><a name="C"></a>C</td><td></td></tr><tr><td class=ISymbolPrefix id=IFirstSymbolPrefix>$</td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#$config" id=link1 onMouseOver="ShowTip(event, 'tt1', 'link1')" onMouseOut="HideTip('tt1')" class=ISymbol>config</a></td></tr><tr><td class=ISymbolPrefix id=ILastSymbolPrefix>$</td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#$cookieExpiryTime" id=link2 onMouseOver="ShowTip(event, 'tt2', 'link2')" onMouseOut="HideTip('tt2')" class=ISymbol>cookieExpiryTime</a></td></tr><tr><td class=IHeading><a name="I"></a>I</td><td></td></tr><tr><td class=ISymbolPrefix id=IFirstSymbolPrefix>$</td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#$isSameOrigin" id=link3 onMouseOver="ShowTip(event, 'tt3', 'link3')" onMouseOut="HideTip('tt3')" class=ISymbol>isSameOrigin</a></td></tr><tr><td class=ISymbolPrefix id=ILastSymbolPrefix>$</td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#$isValidHTML" id=link4 onMouseOver="ShowTip(event, 'tt4', 'link4')" onMouseOut="HideTip('tt4')" class=ISymbol>isValidHTML</a></td></tr><tr><td class=IHeading><a name="R"></a>R</td><td></td></tr><tr><td class=ISymbolPrefix id=IOnlySymbolPrefix>$</td><td class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#$requestType" id=link5 onMouseOver="ShowTip(event, 'tt5', 'link5')" onMouseOut="HideTip('tt5')" class=ISymbol>requestType</a></td></tr></table>
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<div class=CToolTip id="tt1"><div class=CVariable><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static $config</td></tr></table></blockquote>config file for CSRFProtector @var int Array, length = 6 Property: #1: failedAuthAction (int) => action to be taken in case autherisation fails Property: #2: logDirectory (string) => directory in which log will be saved Property: #3: customErrorMessage (string) => custom error message to be sent in case of failed authentication Property: #4: jsFile (string) => location of the CSRFProtector js file Property: #5: tokenLength (int) => default length of hash Property: #6: disabledJavascriptMessage (string) => error message if client’s js is disabled</div></div><div class=CToolTip id="tt2"><div class=CVariable><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">public static $cookieExpiryTime</td></tr></table></blockquote>expiry time for cookie @var int</div></div><!--END_ND_TOOLTIPS-->
|
||||
|
||||
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<div class=CToolTip id="tt3"><div class=CVariable><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">private static $isSameOrigin</td></tr></table></blockquote>flag for cross origin/same origin request @var bool</div></div><div class=CToolTip id="tt4"><div class=CVariable><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">private static $isValidHTML</td></tr></table></blockquote>flag to check if output file is a valid HTML or not @var bool</div></div><!--END_ND_TOOLTIPS-->
|
||||
|
||||
|
||||
<!--START_ND_TOOLTIPS-->
|
||||
<div class=CToolTip id="tt5"><div class=CVariable><blockquote><table border=0 cellspacing=0 cellpadding=0 class="Prototype"><tr><td class="prettyprint">protected static $requestType</td></tr></table></blockquote>Varaible to store weather request type is post or get @var string</div></div><!--END_ND_TOOLTIPS-->
|
||||
|
||||
</div><!--Index-->
|
||||
|
||||
|
||||
<div id=Footer><a href="http://www.naturaldocs.org">Generated by Natural Docs</a></div><!--Footer-->
|
||||
|
||||
|
||||
<div id=Menu><div class=MEntry><div class=MFile><a href="../files/libs/csrf/csrfprotector-php.html">csrfprotector.php</a></div></div><div class=MEntry><div class=MGroup><a href="javascript:ToggleMenu('MGroupContent1')">Index</a><div class=MGroupContent id=MGroupContent1><div class=MEntry><div class=MIndex><a href="General.html">Everything</a></div></div><div class=MEntry><div class=MIndex><a href="Files.html">Files</a></div></div><div class=MEntry><div class=MIndex><a href="Functions.html">Functions</a></div></div><div class=MEntry><div class=MIndex id=MSelected>Variables</div></div></div></div></div><script type="text/javascript"><!--
|
||||
var searchPanel = new SearchPanel("searchPanel", "HTML", "../search");
|
||||
--></script><div id=MSearchPanel class=MSearchPanelInactive><input type=text id=MSearchField value=Search onFocus="searchPanel.OnSearchFieldFocus(true)" onBlur="searchPanel.OnSearchFieldFocus(false)" onKeyUp="searchPanel.OnSearchFieldChange()"><select id=MSearchType onFocus="searchPanel.OnSearchTypeFocus(true)" onBlur="searchPanel.OnSearchTypeFocus(false)" onChange="searchPanel.OnSearchTypeChange()"><option id=MSearchEverything selected value="General">Everything</option><option value="Files">Files</option><option value="Functions">Functions</option><option value="Variables">Variables</option></select></div></div><!--Menu-->
|
||||
|
||||
|
||||
<div id=MSearchResultsWindow><iframe src="" frameborder=0 name=MSearchResults id=MSearchResults></iframe><a href="javascript:searchPanel.CloseResultsWindow()" id=MSearchResultsWindowClose>Close</a></div>
|
||||
|
||||
|
||||
<script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,841 @@
|
|||
// This file is part of Natural Docs, which is Copyright © 2003-2010 Greg Valure
|
||||
// Natural Docs is licensed under version 3 of the GNU Affero General Public License (AGPL)
|
||||
// Refer to License.txt for the complete details
|
||||
|
||||
// This file may be distributed with documentation files generated by Natural Docs.
|
||||
// Such documentation is not covered by Natural Docs' copyright and licensing,
|
||||
// and may have its own copyright and distribution terms as decided by its author.
|
||||
|
||||
|
||||
//
|
||||
// Browser Styles
|
||||
// ____________________________________________________________________________
|
||||
|
||||
var agt=navigator.userAgent.toLowerCase();
|
||||
var browserType;
|
||||
var browserVer;
|
||||
|
||||
if (agt.indexOf("opera") != -1)
|
||||
{
|
||||
browserType = "Opera";
|
||||
|
||||
if (agt.indexOf("opera 7") != -1 || agt.indexOf("opera/7") != -1)
|
||||
{ browserVer = "Opera7"; }
|
||||
else if (agt.indexOf("opera 8") != -1 || agt.indexOf("opera/8") != -1)
|
||||
{ browserVer = "Opera8"; }
|
||||
else if (agt.indexOf("opera 9") != -1 || agt.indexOf("opera/9") != -1)
|
||||
{ browserVer = "Opera9"; }
|
||||
}
|
||||
|
||||
else if (agt.indexOf("applewebkit") != -1)
|
||||
{
|
||||
browserType = "Safari";
|
||||
|
||||
if (agt.indexOf("version/3") != -1)
|
||||
{ browserVer = "Safari3"; }
|
||||
else if (agt.indexOf("safari/4") != -1)
|
||||
{ browserVer = "Safari2"; }
|
||||
}
|
||||
|
||||
else if (agt.indexOf("khtml") != -1)
|
||||
{
|
||||
browserType = "Konqueror";
|
||||
}
|
||||
|
||||
else if (agt.indexOf("msie") != -1)
|
||||
{
|
||||
browserType = "IE";
|
||||
|
||||
if (agt.indexOf("msie 6") != -1)
|
||||
{ browserVer = "IE6"; }
|
||||
else if (agt.indexOf("msie 7") != -1)
|
||||
{ browserVer = "IE7"; }
|
||||
}
|
||||
|
||||
else if (agt.indexOf("gecko") != -1)
|
||||
{
|
||||
browserType = "Firefox";
|
||||
|
||||
if (agt.indexOf("rv:1.7") != -1)
|
||||
{ browserVer = "Firefox1"; }
|
||||
else if (agt.indexOf("rv:1.8)") != -1 || agt.indexOf("rv:1.8.0") != -1)
|
||||
{ browserVer = "Firefox15"; }
|
||||
else if (agt.indexOf("rv:1.8.1") != -1)
|
||||
{ browserVer = "Firefox2"; }
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Support Functions
|
||||
// ____________________________________________________________________________
|
||||
|
||||
|
||||
function GetXPosition(item)
|
||||
{
|
||||
var position = 0;
|
||||
|
||||
if (item.offsetWidth != null)
|
||||
{
|
||||
while (item != document.body && item != null)
|
||||
{
|
||||
position += item.offsetLeft;
|
||||
item = item.offsetParent;
|
||||
};
|
||||
};
|
||||
|
||||
return position;
|
||||
};
|
||||
|
||||
|
||||
function GetYPosition(item)
|
||||
{
|
||||
var position = 0;
|
||||
|
||||
if (item.offsetWidth != null)
|
||||
{
|
||||
while (item != document.body && item != null)
|
||||
{
|
||||
position += item.offsetTop;
|
||||
item = item.offsetParent;
|
||||
};
|
||||
};
|
||||
|
||||
return position;
|
||||
};
|
||||
|
||||
|
||||
function MoveToPosition(item, x, y)
|
||||
{
|
||||
// Opera 5 chokes on the px extension, so it can use the Microsoft one instead.
|
||||
|
||||
if (item.style.left != null)
|
||||
{
|
||||
item.style.left = x + "px";
|
||||
item.style.top = y + "px";
|
||||
}
|
||||
else if (item.style.pixelLeft != null)
|
||||
{
|
||||
item.style.pixelLeft = x;
|
||||
item.style.pixelTop = y;
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
//
|
||||
// Menu
|
||||
// ____________________________________________________________________________
|
||||
|
||||
|
||||
function ToggleMenu(id)
|
||||
{
|
||||
if (!window.document.getElementById)
|
||||
{ return; };
|
||||
|
||||
var display = window.document.getElementById(id).style.display;
|
||||
|
||||
if (display == "none")
|
||||
{ display = "block"; }
|
||||
else
|
||||
{ display = "none"; }
|
||||
|
||||
window.document.getElementById(id).style.display = display;
|
||||
}
|
||||
|
||||
function HideAllBut(ids, max)
|
||||
{
|
||||
if (document.getElementById)
|
||||
{
|
||||
ids.sort( function(a,b) { return a - b; } );
|
||||
var number = 1;
|
||||
|
||||
while (number < max)
|
||||
{
|
||||
if (ids.length > 0 && number == ids[0])
|
||||
{ ids.shift(); }
|
||||
else
|
||||
{
|
||||
document.getElementById("MGroupContent" + number).style.display = "none";
|
||||
};
|
||||
|
||||
number++;
|
||||
};
|
||||
};
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Tooltips
|
||||
// ____________________________________________________________________________
|
||||
|
||||
|
||||
var tooltipTimer = 0;
|
||||
|
||||
function ShowTip(event, tooltipID, linkID)
|
||||
{
|
||||
if (tooltipTimer)
|
||||
{ clearTimeout(tooltipTimer); };
|
||||
|
||||
var docX = event.clientX + window.pageXOffset;
|
||||
var docY = event.clientY + window.pageYOffset;
|
||||
|
||||
var showCommand = "ReallyShowTip('" + tooltipID + "', '" + linkID + "', " + docX + ", " + docY + ")";
|
||||
|
||||
tooltipTimer = setTimeout(showCommand, 1000);
|
||||
}
|
||||
|
||||
function ReallyShowTip(tooltipID, linkID, docX, docY)
|
||||
{
|
||||
tooltipTimer = 0;
|
||||
|
||||
var tooltip;
|
||||
var link;
|
||||
|
||||
if (document.getElementById)
|
||||
{
|
||||
tooltip = document.getElementById(tooltipID);
|
||||
link = document.getElementById(linkID);
|
||||
}
|
||||
/* else if (document.all)
|
||||
{
|
||||
tooltip = eval("document.all['" + tooltipID + "']");
|
||||
link = eval("document.all['" + linkID + "']");
|
||||
}
|
||||
*/
|
||||
if (tooltip)
|
||||
{
|
||||
var left = GetXPosition(link);
|
||||
var top = GetYPosition(link);
|
||||
top += link.offsetHeight;
|
||||
|
||||
|
||||
// The fallback method is to use the mouse X and Y relative to the document. We use a separate if and test if its a number
|
||||
// in case some browser snuck through the above if statement but didn't support everything.
|
||||
|
||||
if (!isFinite(top) || top == 0)
|
||||
{
|
||||
left = docX;
|
||||
top = docY;
|
||||
}
|
||||
|
||||
// Some spacing to get it out from under the cursor.
|
||||
|
||||
top += 10;
|
||||
|
||||
// Make sure the tooltip doesnt get smushed by being too close to the edge, or in some browsers, go off the edge of the
|
||||
// page. We do it here because Konqueror does get offsetWidth right even if it doesnt get the positioning right.
|
||||
|
||||
if (tooltip.offsetWidth != null)
|
||||
{
|
||||
var width = tooltip.offsetWidth;
|
||||
var docWidth = document.body.clientWidth;
|
||||
|
||||
if (left + width > docWidth)
|
||||
{ left = docWidth - width - 1; }
|
||||
|
||||
// If there's a horizontal scroll bar we could go past zero because it's using the page width, not the window width.
|
||||
if (left < 0)
|
||||
{ left = 0; };
|
||||
}
|
||||
|
||||
MoveToPosition(tooltip, left, top);
|
||||
tooltip.style.visibility = "visible";
|
||||
}
|
||||
}
|
||||
|
||||
function HideTip(tooltipID)
|
||||
{
|
||||
if (tooltipTimer)
|
||||
{
|
||||
clearTimeout(tooltipTimer);
|
||||
tooltipTimer = 0;
|
||||
}
|
||||
|
||||
var tooltip;
|
||||
|
||||
if (document.getElementById)
|
||||
{ tooltip = document.getElementById(tooltipID); }
|
||||
else if (document.all)
|
||||
{ tooltip = eval("document.all['" + tooltipID + "']"); }
|
||||
|
||||
if (tooltip)
|
||||
{ tooltip.style.visibility = "hidden"; }
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Blockquote fix for IE
|
||||
// ____________________________________________________________________________
|
||||
|
||||
|
||||
function NDOnLoad()
|
||||
{
|
||||
if (browserVer == "IE6")
|
||||
{
|
||||
var scrollboxes = document.getElementsByTagName('blockquote');
|
||||
|
||||
if (scrollboxes.item(0))
|
||||
{
|
||||
NDDoResize();
|
||||
window.onresize=NDOnResize;
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
var resizeTimer = 0;
|
||||
|
||||
function NDOnResize()
|
||||
{
|
||||
if (resizeTimer != 0)
|
||||
{ clearTimeout(resizeTimer); };
|
||||
|
||||
resizeTimer = setTimeout(NDDoResize, 250);
|
||||
};
|
||||
|
||||
|
||||
function NDDoResize()
|
||||
{
|
||||
var scrollboxes = document.getElementsByTagName('blockquote');
|
||||
|
||||
var i;
|
||||
var item;
|
||||
|
||||
i = 0;
|
||||
while (item = scrollboxes.item(i))
|
||||
{
|
||||
item.style.width = 100;
|
||||
i++;
|
||||
};
|
||||
|
||||
i = 0;
|
||||
while (item = scrollboxes.item(i))
|
||||
{
|
||||
item.style.width = item.parentNode.offsetWidth;
|
||||
i++;
|
||||
};
|
||||
|
||||
clearTimeout(resizeTimer);
|
||||
resizeTimer = 0;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* ________________________________________________________________________________________________________
|
||||
|
||||
Class: SearchPanel
|
||||
________________________________________________________________________________________________________
|
||||
|
||||
A class handling everything associated with the search panel.
|
||||
|
||||
Parameters:
|
||||
|
||||
name - The name of the global variable that will be storing this instance. Is needed to be able to set timeouts.
|
||||
mode - The mode the search is going to work in. Pass <NaturalDocs::Builder::Base->CommandLineOption()>, so the
|
||||
value will be something like "HTML" or "FramedHTML".
|
||||
|
||||
________________________________________________________________________________________________________
|
||||
*/
|
||||
|
||||
|
||||
function SearchPanel(name, mode, resultsPath)
|
||||
{
|
||||
if (!name || !mode || !resultsPath)
|
||||
{ alert("Incorrect parameters to SearchPanel."); };
|
||||
|
||||
|
||||
// Group: Variables
|
||||
// ________________________________________________________________________
|
||||
|
||||
/*
|
||||
var: name
|
||||
The name of the global variable that will be storing this instance of the class.
|
||||
*/
|
||||
this.name = name;
|
||||
|
||||
/*
|
||||
var: mode
|
||||
The mode the search is going to work in, such as "HTML" or "FramedHTML".
|
||||
*/
|
||||
this.mode = mode;
|
||||
|
||||
/*
|
||||
var: resultsPath
|
||||
The relative path from the current HTML page to the results page directory.
|
||||
*/
|
||||
this.resultsPath = resultsPath;
|
||||
|
||||
/*
|
||||
var: keyTimeout
|
||||
The timeout used between a keystroke and when a search is performed.
|
||||
*/
|
||||
this.keyTimeout = 0;
|
||||
|
||||
/*
|
||||
var: keyTimeoutLength
|
||||
The length of <keyTimeout> in thousandths of a second.
|
||||
*/
|
||||
this.keyTimeoutLength = 500;
|
||||
|
||||
/*
|
||||
var: lastSearchValue
|
||||
The last search string executed, or an empty string if none.
|
||||
*/
|
||||
this.lastSearchValue = "";
|
||||
|
||||
/*
|
||||
var: lastResultsPage
|
||||
The last results page. The value is only relevant if <lastSearchValue> is set.
|
||||
*/
|
||||
this.lastResultsPage = "";
|
||||
|
||||
/*
|
||||
var: deactivateTimeout
|
||||
|
||||
The timeout used between when a control is deactivated and when the entire panel is deactivated. Is necessary
|
||||
because a control may be deactivated in favor of another control in the same panel, in which case it should stay
|
||||
active.
|
||||
*/
|
||||
this.deactivateTimout = 0;
|
||||
|
||||
/*
|
||||
var: deactivateTimeoutLength
|
||||
The length of <deactivateTimeout> in thousandths of a second.
|
||||
*/
|
||||
this.deactivateTimeoutLength = 200;
|
||||
|
||||
|
||||
|
||||
|
||||
// Group: DOM Elements
|
||||
// ________________________________________________________________________
|
||||
|
||||
|
||||
// Function: DOMSearchField
|
||||
this.DOMSearchField = function()
|
||||
{ return document.getElementById("MSearchField"); };
|
||||
|
||||
// Function: DOMSearchType
|
||||
this.DOMSearchType = function()
|
||||
{ return document.getElementById("MSearchType"); };
|
||||
|
||||
// Function: DOMPopupSearchResults
|
||||
this.DOMPopupSearchResults = function()
|
||||
{ return document.getElementById("MSearchResults"); };
|
||||
|
||||
// Function: DOMPopupSearchResultsWindow
|
||||
this.DOMPopupSearchResultsWindow = function()
|
||||
{ return document.getElementById("MSearchResultsWindow"); };
|
||||
|
||||
// Function: DOMSearchPanel
|
||||
this.DOMSearchPanel = function()
|
||||
{ return document.getElementById("MSearchPanel"); };
|
||||
|
||||
|
||||
|
||||
|
||||
// Group: Event Handlers
|
||||
// ________________________________________________________________________
|
||||
|
||||
|
||||
/*
|
||||
Function: OnSearchFieldFocus
|
||||
Called when focus is added or removed from the search field.
|
||||
*/
|
||||
this.OnSearchFieldFocus = function(isActive)
|
||||
{
|
||||
this.Activate(isActive);
|
||||
};
|
||||
|
||||
|
||||
/*
|
||||
Function: OnSearchFieldChange
|
||||
Called when the content of the search field is changed.
|
||||
*/
|
||||
this.OnSearchFieldChange = function()
|
||||
{
|
||||
if (this.keyTimeout)
|
||||
{
|
||||
clearTimeout(this.keyTimeout);
|
||||
this.keyTimeout = 0;
|
||||
};
|
||||
|
||||
var searchValue = this.DOMSearchField().value.replace(/ +/g, "");
|
||||
|
||||
if (searchValue != this.lastSearchValue)
|
||||
{
|
||||
if (searchValue != "")
|
||||
{
|
||||
this.keyTimeout = setTimeout(this.name + ".Search()", this.keyTimeoutLength);
|
||||
}
|
||||
else
|
||||
{
|
||||
if (this.mode == "HTML")
|
||||
{ this.DOMPopupSearchResultsWindow().style.display = "none"; };
|
||||
this.lastSearchValue = "";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
/*
|
||||
Function: OnSearchTypeFocus
|
||||
Called when focus is added or removed from the search type.
|
||||
*/
|
||||
this.OnSearchTypeFocus = function(isActive)
|
||||
{
|
||||
this.Activate(isActive);
|
||||
};
|
||||
|
||||
|
||||
/*
|
||||
Function: OnSearchTypeChange
|
||||
Called when the search type is changed.
|
||||
*/
|
||||
this.OnSearchTypeChange = function()
|
||||
{
|
||||
var searchValue = this.DOMSearchField().value.replace(/ +/g, "");
|
||||
|
||||
if (searchValue != "")
|
||||
{
|
||||
this.Search();
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
|
||||
// Group: Action Functions
|
||||
// ________________________________________________________________________
|
||||
|
||||
|
||||
/*
|
||||
Function: CloseResultsWindow
|
||||
Closes the results window.
|
||||
*/
|
||||
this.CloseResultsWindow = function()
|
||||
{
|
||||
this.DOMPopupSearchResultsWindow().style.display = "none";
|
||||
this.Activate(false, true);
|
||||
};
|
||||
|
||||
|
||||
/*
|
||||
Function: Search
|
||||
Performs a search.
|
||||
*/
|
||||
this.Search = function()
|
||||
{
|
||||
this.keyTimeout = 0;
|
||||
|
||||
var searchValue = this.DOMSearchField().value.replace(/^ +/, "");
|
||||
var searchTopic = this.DOMSearchType().value;
|
||||
|
||||
var pageExtension = searchValue.substr(0,1);
|
||||
|
||||
if (pageExtension.match(/^[a-z]/i))
|
||||
{ pageExtension = pageExtension.toUpperCase(); }
|
||||
else if (pageExtension.match(/^[0-9]/))
|
||||
{ pageExtension = 'Numbers'; }
|
||||
else
|
||||
{ pageExtension = "Symbols"; };
|
||||
|
||||
var resultsPage;
|
||||
var resultsPageWithSearch;
|
||||
var hasResultsPage;
|
||||
|
||||
// indexSectionsWithContent is defined in searchdata.js
|
||||
if (indexSectionsWithContent[searchTopic][pageExtension] == true)
|
||||
{
|
||||
resultsPage = this.resultsPath + '/' + searchTopic + pageExtension + '.html';
|
||||
resultsPageWithSearch = resultsPage+'?'+escape(searchValue);
|
||||
hasResultsPage = true;
|
||||
}
|
||||
else
|
||||
{
|
||||
resultsPage = this.resultsPath + '/NoResults.html';
|
||||
resultsPageWithSearch = resultsPage;
|
||||
hasResultsPage = false;
|
||||
};
|
||||
|
||||
var resultsFrame;
|
||||
if (this.mode == "HTML")
|
||||
{ resultsFrame = window.frames.MSearchResults; }
|
||||
else if (this.mode == "FramedHTML")
|
||||
{ resultsFrame = window.top.frames['Content']; };
|
||||
|
||||
|
||||
if (resultsPage != this.lastResultsPage ||
|
||||
|
||||
// Bug in IE. If everything becomes hidden in a run, none of them will be able to be reshown in the next for some
|
||||
// reason. It counts the right number of results, and you can even read the display as "block" after setting it, but it
|
||||
// just doesn't work in IE 6 or IE 7. So if we're on the right page but the previous search had no results, reload the
|
||||
// page anyway to get around the bug.
|
||||
(browserType == "IE" && hasResultsPage &&
|
||||
(!resultsFrame.searchResults || resultsFrame.searchResults.lastMatchCount == 0)) )
|
||||
|
||||
{
|
||||
resultsFrame.location.href = resultsPageWithSearch;
|
||||
}
|
||||
|
||||
// So if the results page is right and there's no IE bug, reperform the search on the existing page. We have to check if there
|
||||
// are results because NoResults.html doesn't have any JavaScript, and it would be useless to do anything on that page even
|
||||
// if it did.
|
||||
else if (hasResultsPage)
|
||||
{
|
||||
// We need to check if this exists in case the frame is present but didn't finish loading.
|
||||
if (resultsFrame.searchResults)
|
||||
{ resultsFrame.searchResults.Search(searchValue); }
|
||||
|
||||
// Otherwise just reload instead of waiting.
|
||||
else
|
||||
{ resultsFrame.location.href = resultsPageWithSearch; };
|
||||
};
|
||||
|
||||
|
||||
var domPopupSearchResultsWindow = this.DOMPopupSearchResultsWindow();
|
||||
|
||||
if (this.mode == "HTML" && domPopupSearchResultsWindow.style.display != "block")
|
||||
{
|
||||
var domSearchType = this.DOMSearchType();
|
||||
|
||||
var left = GetXPosition(domSearchType);
|
||||
var top = GetYPosition(domSearchType) + domSearchType.offsetHeight;
|
||||
|
||||
MoveToPosition(domPopupSearchResultsWindow, left, top);
|
||||
domPopupSearchResultsWindow.style.display = 'block';
|
||||
};
|
||||
|
||||
|
||||
this.lastSearchValue = searchValue;
|
||||
this.lastResultsPage = resultsPage;
|
||||
};
|
||||
|
||||
|
||||
|
||||
// Group: Activation Functions
|
||||
// Functions that handle whether the entire panel is active or not.
|
||||
// ________________________________________________________________________
|
||||
|
||||
|
||||
/*
|
||||
Function: Activate
|
||||
|
||||
Activates or deactivates the search panel, resetting things to their default values if necessary. You can call this on every
|
||||
control's OnBlur() and it will handle not deactivating the entire panel when focus is just switching between them transparently.
|
||||
|
||||
Parameters:
|
||||
|
||||
isActive - Whether you're activating or deactivating the panel.
|
||||
ignoreDeactivateDelay - Set if you're positive the action will deactivate the panel and thus want to skip the delay.
|
||||
*/
|
||||
this.Activate = function(isActive, ignoreDeactivateDelay)
|
||||
{
|
||||
// We want to ignore isActive being false while the results window is open.
|
||||
if (isActive || (this.mode == "HTML" && this.DOMPopupSearchResultsWindow().style.display == "block"))
|
||||
{
|
||||
if (this.inactivateTimeout)
|
||||
{
|
||||
clearTimeout(this.inactivateTimeout);
|
||||
this.inactivateTimeout = 0;
|
||||
};
|
||||
|
||||
this.DOMSearchPanel().className = 'MSearchPanelActive';
|
||||
|
||||
var searchField = this.DOMSearchField();
|
||||
|
||||
if (searchField.value == 'Search')
|
||||
{ searchField.value = ""; }
|
||||
}
|
||||
else if (!ignoreDeactivateDelay)
|
||||
{
|
||||
this.inactivateTimeout = setTimeout(this.name + ".InactivateAfterTimeout()", this.inactivateTimeoutLength);
|
||||
}
|
||||
else
|
||||
{
|
||||
this.InactivateAfterTimeout();
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
/*
|
||||
Function: InactivateAfterTimeout
|
||||
|
||||
Called by <inactivateTimeout>, which is set by <Activate()>. Inactivation occurs on a timeout because a control may
|
||||
receive OnBlur() when focus is really transferring to another control in the search panel. In this case we don't want to
|
||||
actually deactivate the panel because not only would that cause a visible flicker but it could also reset the search value.
|
||||
So by doing it on a timeout instead, there's a short period where the second control's OnFocus() can cancel the deactivation.
|
||||
*/
|
||||
this.InactivateAfterTimeout = function()
|
||||
{
|
||||
this.inactivateTimeout = 0;
|
||||
|
||||
this.DOMSearchPanel().className = 'MSearchPanelInactive';
|
||||
this.DOMSearchField().value = "Search";
|
||||
|
||||
this.lastSearchValue = "";
|
||||
this.lastResultsPage = "";
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
|
||||
|
||||
/* ________________________________________________________________________________________________________
|
||||
|
||||
Class: SearchResults
|
||||
_________________________________________________________________________________________________________
|
||||
|
||||
The class that handles everything on the search results page.
|
||||
_________________________________________________________________________________________________________
|
||||
*/
|
||||
|
||||
|
||||
function SearchResults(name, mode)
|
||||
{
|
||||
/*
|
||||
var: mode
|
||||
The mode the search is going to work in, such as "HTML" or "FramedHTML".
|
||||
*/
|
||||
this.mode = mode;
|
||||
|
||||
/*
|
||||
var: lastMatchCount
|
||||
The number of matches from the last run of <Search()>.
|
||||
*/
|
||||
this.lastMatchCount = 0;
|
||||
|
||||
|
||||
/*
|
||||
Function: Toggle
|
||||
Toggles the visibility of the passed element ID.
|
||||
*/
|
||||
this.Toggle = function(id)
|
||||
{
|
||||
if (this.mode == "FramedHTML")
|
||||
{ return; };
|
||||
|
||||
var parentElement = document.getElementById(id);
|
||||
|
||||
var element = parentElement.firstChild;
|
||||
|
||||
while (element && element != parentElement)
|
||||
{
|
||||
if (element.nodeName == 'DIV' && element.className == 'ISubIndex')
|
||||
{
|
||||
if (element.style.display == 'block')
|
||||
{ element.style.display = "none"; }
|
||||
else
|
||||
{ element.style.display = 'block'; }
|
||||
};
|
||||
|
||||
if (element.nodeName == 'DIV' && element.hasChildNodes())
|
||||
{ element = element.firstChild; }
|
||||
else if (element.nextSibling)
|
||||
{ element = element.nextSibling; }
|
||||
else
|
||||
{
|
||||
do
|
||||
{
|
||||
element = element.parentNode;
|
||||
}
|
||||
while (element && element != parentElement && !element.nextSibling);
|
||||
|
||||
if (element && element != parentElement)
|
||||
{ element = element.nextSibling; };
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
/*
|
||||
Function: Search
|
||||
|
||||
Searches for the passed string. If there is no parameter, it takes it from the URL query.
|
||||
|
||||
Always returns true, since other documents may try to call it and that may or may not be possible.
|
||||
*/
|
||||
this.Search = function(search)
|
||||
{
|
||||
if (!search)
|
||||
{
|
||||
search = window.location.search;
|
||||
search = search.substring(1); // Remove the leading ?
|
||||
search = unescape(search);
|
||||
};
|
||||
|
||||
search = search.replace(/^ +/, "");
|
||||
search = search.replace(/ +$/, "");
|
||||
search = search.toLowerCase();
|
||||
|
||||
if (search.match(/[^a-z0-9]/)) // Just a little speedup so it doesn't have to go through the below unnecessarily.
|
||||
{
|
||||
search = search.replace(/\_/g, "_und");
|
||||
search = search.replace(/\ +/gi, "_spc");
|
||||
search = search.replace(/\~/g, "_til");
|
||||
search = search.replace(/\!/g, "_exc");
|
||||
search = search.replace(/\@/g, "_att");
|
||||
search = search.replace(/\#/g, "_num");
|
||||
search = search.replace(/\$/g, "_dol");
|
||||
search = search.replace(/\%/g, "_pct");
|
||||
search = search.replace(/\^/g, "_car");
|
||||
search = search.replace(/\&/g, "_amp");
|
||||
search = search.replace(/\*/g, "_ast");
|
||||
search = search.replace(/\(/g, "_lpa");
|
||||
search = search.replace(/\)/g, "_rpa");
|
||||
search = search.replace(/\-/g, "_min");
|
||||
search = search.replace(/\+/g, "_plu");
|
||||
search = search.replace(/\=/g, "_equ");
|
||||
search = search.replace(/\{/g, "_lbc");
|
||||
search = search.replace(/\}/g, "_rbc");
|
||||
search = search.replace(/\[/g, "_lbk");
|
||||
search = search.replace(/\]/g, "_rbk");
|
||||
search = search.replace(/\:/g, "_col");
|
||||
search = search.replace(/\;/g, "_sco");
|
||||
search = search.replace(/\"/g, "_quo");
|
||||
search = search.replace(/\'/g, "_apo");
|
||||
search = search.replace(/\</g, "_lan");
|
||||
search = search.replace(/\>/g, "_ran");
|
||||
search = search.replace(/\,/g, "_com");
|
||||
search = search.replace(/\./g, "_per");
|
||||
search = search.replace(/\?/g, "_que");
|
||||
search = search.replace(/\//g, "_sla");
|
||||
search = search.replace(/[^a-z0-9\_]i/gi, "_zzz");
|
||||
};
|
||||
|
||||
var resultRows = document.getElementsByTagName("div");
|
||||
var matches = 0;
|
||||
|
||||
var i = 0;
|
||||
while (i < resultRows.length)
|
||||
{
|
||||
var row = resultRows.item(i);
|
||||
|
||||
if (row.className == "SRResult")
|
||||
{
|
||||
var rowMatchName = row.id.toLowerCase();
|
||||
rowMatchName = rowMatchName.replace(/^sr\d*_/, '');
|
||||
|
||||
if (search.length <= rowMatchName.length && rowMatchName.substr(0, search.length) == search)
|
||||
{
|
||||
row.style.display = "block";
|
||||
matches++;
|
||||
}
|
||||
else
|
||||
{ row.style.display = "none"; };
|
||||
};
|
||||
|
||||
i++;
|
||||
};
|
||||
|
||||
document.getElementById("Searching").style.display="none";
|
||||
|
||||
if (matches == 0)
|
||||
{ document.getElementById("NoMatches").style.display="block"; }
|
||||
else
|
||||
{ document.getElementById("NoMatches").style.display="none"; }
|
||||
|
||||
this.lastMatchCount = matches;
|
||||
|
||||
return true;
|
||||
};
|
||||
};
|
||||
|
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,122 @@
|
|||
var indexSectionsWithContent = {
|
||||
"General": {
|
||||
"Symbols": false,
|
||||
"Numbers": false,
|
||||
"A": true,
|
||||
"B": false,
|
||||
"C": true,
|
||||
"D": false,
|
||||
"E": false,
|
||||
"F": true,
|
||||
"G": true,
|
||||
"H": false,
|
||||
"I": true,
|
||||
"J": false,
|
||||
"K": false,
|
||||
"L": true,
|
||||
"M": false,
|
||||
"N": false,
|
||||
"O": true,
|
||||
"P": false,
|
||||
"Q": false,
|
||||
"R": true,
|
||||
"S": false,
|
||||
"T": false,
|
||||
"U": true,
|
||||
"V": true,
|
||||
"W": false,
|
||||
"X": false,
|
||||
"Y": false,
|
||||
"Z": false
|
||||
},
|
||||
"Variables": {
|
||||
"Symbols": false,
|
||||
"Numbers": false,
|
||||
"A": false,
|
||||
"B": false,
|
||||
"C": true,
|
||||
"D": false,
|
||||
"E": false,
|
||||
"F": false,
|
||||
"G": false,
|
||||
"H": false,
|
||||
"I": true,
|
||||
"J": false,
|
||||
"K": false,
|
||||
"L": false,
|
||||
"M": false,
|
||||
"N": false,
|
||||
"O": false,
|
||||
"P": false,
|
||||
"Q": false,
|
||||
"R": true,
|
||||
"S": false,
|
||||
"T": false,
|
||||
"U": false,
|
||||
"V": false,
|
||||
"W": false,
|
||||
"X": false,
|
||||
"Y": false,
|
||||
"Z": false
|
||||
},
|
||||
"Functions": {
|
||||
"Symbols": false,
|
||||
"Numbers": false,
|
||||
"A": true,
|
||||
"B": false,
|
||||
"C": true,
|
||||
"D": false,
|
||||
"E": false,
|
||||
"F": true,
|
||||
"G": true,
|
||||
"H": false,
|
||||
"I": true,
|
||||
"J": false,
|
||||
"K": false,
|
||||
"L": true,
|
||||
"M": false,
|
||||
"N": false,
|
||||
"O": true,
|
||||
"P": false,
|
||||
"Q": false,
|
||||
"R": true,
|
||||
"S": false,
|
||||
"T": false,
|
||||
"U": true,
|
||||
"V": false,
|
||||
"W": false,
|
||||
"X": false,
|
||||
"Y": false,
|
||||
"Z": false
|
||||
},
|
||||
"Files": {
|
||||
"Symbols": false,
|
||||
"Numbers": false,
|
||||
"A": false,
|
||||
"B": false,
|
||||
"C": true,
|
||||
"D": false,
|
||||
"E": false,
|
||||
"F": false,
|
||||
"G": false,
|
||||
"H": false,
|
||||
"I": false,
|
||||
"J": false,
|
||||
"K": false,
|
||||
"L": false,
|
||||
"M": false,
|
||||
"N": false,
|
||||
"O": false,
|
||||
"P": false,
|
||||
"Q": false,
|
||||
"R": false,
|
||||
"S": false,
|
||||
"T": false,
|
||||
"U": false,
|
||||
"V": false,
|
||||
"W": false,
|
||||
"X": false,
|
||||
"Y": false,
|
||||
"Z": false
|
||||
}
|
||||
}
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_csrfprotector_perphp><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#csrfprotector.php" target=_parent class=ISymbol>csrfprotector.php</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_authorisePost><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#authorisePost" target=_parent class=ISymbol>authorisePost</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_createNewJsCache><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#createNewJsCache" target=_parent class=ISymbol>createNewJsCache</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_failedValidationAction><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#failedValidationAction" target=_parent class=ISymbol>failedValidationAction</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_generateAuthToken><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#generateAuthToken" target=_parent class=ISymbol>generateAuthToken</a></div></div><div class=SRResult id=SR_getCurrentUrl><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#getCurrentUrl" target=_parent class=ISymbol>getCurrentUrl</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_init><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#init" target=_parent class=ISymbol>init</a></div></div><div class=SRResult id=SR_isURLallowed><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#isURLallowed" target=_parent class=ISymbol>isURLallowed</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_logCSRFattack><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#logCSRFattack" target=_parent class=ISymbol>logCSRFattack</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_ob_undhandler><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#ob_handler" target=_parent class=ISymbol>ob_handler</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_refreshToken><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#refreshToken" target=_parent class=ISymbol>refreshToken</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_useCachedVersion><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#useCachedVersion" target=_parent class=ISymbol>useCachedVersion</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_authorisePost><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#authorisePost" target=_parent class=ISymbol>authorisePost</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_config><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$config" target=_parent class=ISymbol>config</a></div></div><div class=SRResult id=SR_cookieExpiryTime><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$cookieExpiryTime" target=_parent class=ISymbol>cookieExpiryTime</a></div></div><div class=SRResult id=SR_createNewJsCache><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#createNewJsCache" target=_parent class=ISymbol>createNewJsCache</a></div></div><div class=SRResult id=SR_csrfprotector_perphp><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#csrfprotector.php" target=_parent class=ISymbol>csrfprotector.php</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_failedValidationAction><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#failedValidationAction" target=_parent class=ISymbol>failedValidationAction</a></div></div><div class=SRResult id=SR_Functions><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#Functions" target=_parent class=ISymbol>Functions</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_generateAuthToken><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#generateAuthToken" target=_parent class=ISymbol>generateAuthToken</a></div></div><div class=SRResult id=SR_getCurrentUrl><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#getCurrentUrl" target=_parent class=ISymbol>getCurrentUrl</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_init><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#init" target=_parent class=ISymbol>init</a></div></div><div class=SRResult id=SR_isSameOrigin><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$isSameOrigin" target=_parent class=ISymbol>isSameOrigin</a></div></div><div class=SRResult id=SR_isURLallowed><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#isURLallowed" target=_parent class=ISymbol>isURLallowed</a></div></div><div class=SRResult id=SR_isValidHTML><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$isValidHTML" target=_parent class=ISymbol>isValidHTML</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_logCSRFattack><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#logCSRFattack" target=_parent class=ISymbol>logCSRFattack</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_ob_undhandler><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#ob_handler" target=_parent class=ISymbol>ob_handler</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_refreshToken><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#refreshToken" target=_parent class=ISymbol>refreshToken</a></div></div><div class=SRResult id=SR_requestType><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$requestType" target=_parent class=ISymbol>requestType</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_useCachedVersion><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#useCachedVersion" target=_parent class=ISymbol>useCachedVersion</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_Variables><div class=IEntry><a href="../files/libs/csrf/csrfprotector-php.html#Variables" target=_parent class=ISymbol>Variables</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,15 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=NoMatches>No Matches</div></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_config><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$config" target=_parent class=ISymbol>config</a></div></div><div class=SRResult id=SR_cookieExpiryTime><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$cookieExpiryTime" target=_parent class=ISymbol>cookieExpiryTime</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_isSameOrigin><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$isSameOrigin" target=_parent class=ISymbol>isSameOrigin</a></div></div><div class=SRResult id=SR_isValidHTML><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$isValidHTML" target=_parent class=ISymbol>isValidHTML</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,20 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
|
||||
|
||||
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="../styles/main.css"><script language=JavaScript src="../javascript/main.js"></script></head><body class="PopupSearchResultsPage" onLoad="NDOnLoad()"><script language=JavaScript><!--
|
||||
if (browserType) {document.write("<div class=" + browserType + ">");if (browserVer) {document.write("<div class=" + browserVer + ">"); }}// --></script>
|
||||
|
||||
<!-- Generated by Natural Docs, version 1.52 -->
|
||||
<!-- http://www.naturaldocs.org -->
|
||||
|
||||
<!-- saved from url=(0026)http://www.naturaldocs.org -->
|
||||
|
||||
|
||||
|
||||
|
||||
<div id=Index><div class=SRStatus id=Loading>Loading...</div><table border=0 cellspacing=0 cellpadding=0><div class=SRResult id=SR_requestType><div class=IEntry><span class=ISymbolPrefix>$</span><a href="../files/libs/csrf/csrfprotector-php.html#$requestType" target=_parent class=ISymbol>requestType</a></div></div></table><div class=SRStatus id=Searching>Searching...</div><div class=SRStatus id=NoMatches>No Matches</div><script type="text/javascript"><!--
|
||||
document.getElementById("Loading").style.display="none";
|
||||
document.getElementById("NoMatches").style.display="none";
|
||||
var searchResults = new SearchResults("searchResults", "HTML");
|
||||
searchResults.Search();
|
||||
--></script></div><script language=JavaScript><!--
|
||||
if (browserType) {if (browserVer) {document.write("</div>"); }document.write("</div>");}// --></script></body></html>
|
|
@ -0,0 +1,824 @@
|
|||
/*
|
||||
IMPORTANT: If you're editing this file in the output directory of one of
|
||||
your projects, your changes will be overwritten the next time you run
|
||||
Natural Docs. Instead, copy this file to your project directory, make your
|
||||
changes, and you can use it with -s. Even better would be to make a CSS
|
||||
file in your project directory with only your changes, which you can then
|
||||
use with -s [original style] [your changes].
|
||||
|
||||
On the other hand, if you're editing this file in the Natural Docs styles
|
||||
directory, the changes will automatically be applied to all your projects
|
||||
that use this style the next time Natural Docs is run on them.
|
||||
|
||||
This file is part of Natural Docs, which is Copyright © 2003-2010 Greg Valure.
|
||||
Natural Docs is licensed under version 3 of the GNU Affero General Public
|
||||
License (AGPL). Refer to License.txt for the complete details.
|
||||
|
||||
This file may be distributed with documentation files generated by Natural Docs.
|
||||
Such documentation is not covered by Natural Docs' copyright and licensing,
|
||||
and may have its own copyright and distribution terms as decided by its author.
|
||||
*/
|
||||
|
||||
body {
|
||||
font: 8pt Verdana, Arial, sans-serif;
|
||||
color: #000000;
|
||||
margin: 0; padding: 0;
|
||||
}
|
||||
|
||||
.ContentPage,
|
||||
.IndexPage,
|
||||
.FramedMenuPage {
|
||||
background-color: #E8E8E8;
|
||||
}
|
||||
.FramedContentPage,
|
||||
.FramedIndexPage,
|
||||
.FramedSearchResultsPage,
|
||||
.PopupSearchResultsPage {
|
||||
background-color: #FFFFFF;
|
||||
}
|
||||
|
||||
|
||||
a:link,
|
||||
a:visited { color: #900000; text-decoration: none }
|
||||
a:hover { color: #900000; text-decoration: underline }
|
||||
a:active { color: #FF0000; text-decoration: underline }
|
||||
|
||||
td {
|
||||
vertical-align: top }
|
||||
|
||||
img { border: 0; }
|
||||
|
||||
|
||||
/*
|
||||
Comment out this line to use web-style paragraphs (blank line between
|
||||
paragraphs, no indent) instead of print-style paragraphs (no blank line,
|
||||
indented.)
|
||||
*/
|
||||
p {
|
||||
text-indent: 5ex; margin: 0 }
|
||||
|
||||
|
||||
/* Opera doesn't break with just wbr, but will if you add this. */
|
||||
.Opera wbr:after {
|
||||
content: "\00200B";
|
||||
}
|
||||
|
||||
/* Blockquotes are used as containers for things that may need to scroll. */
|
||||
blockquote {
|
||||
padding: 0;
|
||||
margin: 0;
|
||||
overflow: auto;
|
||||
}
|
||||
|
||||
|
||||
.Firefox1 blockquote {
|
||||
padding-bottom: .5em;
|
||||
}
|
||||
|
||||
/* Turn off scrolling when printing. */
|
||||
@media print {
|
||||
blockquote {
|
||||
overflow: visible;
|
||||
}
|
||||
.IE blockquote {
|
||||
width: auto;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
||||
#Menu {
|
||||
font-size: 8pt;
|
||||
padding: 10px 0 0 0;
|
||||
}
|
||||
.ContentPage #Menu,
|
||||
.IndexPage #Menu {
|
||||
position: absolute;
|
||||
top: 0;
|
||||
left: 0;
|
||||
width: 31ex;
|
||||
overflow: hidden;
|
||||
}
|
||||
.ContentPage .Firefox #Menu,
|
||||
.IndexPage .Firefox #Menu {
|
||||
width: 27ex;
|
||||
}
|
||||
|
||||
|
||||
.MTitle {
|
||||
font-size: 16pt; font-weight: bold; font-variant: small-caps;
|
||||
text-align: center;
|
||||
padding: 5px 10px 15px 10px;
|
||||
border-bottom: 1px dotted #000000;
|
||||
margin-bottom: 15px }
|
||||
|
||||
.MSubTitle {
|
||||
font-size: 9pt; font-weight: normal; font-variant: normal;
|
||||
margin-top: 1ex; margin-bottom: 5px }
|
||||
|
||||
|
||||
.MEntry a:link,
|
||||
.MEntry a:hover,
|
||||
.MEntry a:visited { color: #606060; margin-right: 0 }
|
||||
.MEntry a:active { color: #A00000; margin-right: 0 }
|
||||
|
||||
|
||||
.MGroup {
|
||||
font-variant: small-caps; font-weight: bold;
|
||||
margin: 1em 0 1em 10px;
|
||||
}
|
||||
|
||||
.MGroupContent {
|
||||
font-variant: normal; font-weight: normal }
|
||||
|
||||
.MGroup a:link,
|
||||
.MGroup a:hover,
|
||||
.MGroup a:visited { color: #545454; margin-right: 10px }
|
||||
.MGroup a:active { color: #A00000; margin-right: 10px }
|
||||
|
||||
|
||||
.MFile,
|
||||
.MText,
|
||||
.MLink,
|
||||
.MIndex {
|
||||
padding: 1px 17px 2px 10px;
|
||||
margin: .25em 0 .25em 0;
|
||||
}
|
||||
|
||||
.MText {
|
||||
font-size: 8pt; font-style: italic }
|
||||
|
||||
.MLink {
|
||||
font-style: italic }
|
||||
|
||||
#MSelected {
|
||||
color: #000000; background-color: #FFFFFF;
|
||||
/* Replace padding with border. */
|
||||
padding: 0 10px 0 10px;
|
||||
border-width: 1px 2px 2px 0; border-style: solid; border-color: #000000;
|
||||
margin-right: 5px;
|
||||
}
|
||||
|
||||
/* Close off the left side when its in a group. */
|
||||
.MGroup #MSelected {
|
||||
padding-left: 9px; border-left-width: 1px }
|
||||
|
||||
/* A treat for Mozilla users. Blatantly non-standard. Will be replaced with CSS 3 attributes when finalized/supported. */
|
||||
.Firefox #MSelected {
|
||||
-moz-border-radius-topright: 10px;
|
||||
-moz-border-radius-bottomright: 10px }
|
||||
.Firefox .MGroup #MSelected {
|
||||
-moz-border-radius-topleft: 10px;
|
||||
-moz-border-radius-bottomleft: 10px }
|
||||
|
||||
|
||||
#MSearchPanel {
|
||||
padding: 0px 6px;
|
||||
margin: .25em 0;
|
||||
}
|
||||
|
||||
|
||||
#MSearchField {
|
||||
font: italic 8pt Verdana, sans-serif;
|
||||
color: #606060;
|
||||
background-color: #E8E8E8;
|
||||
border: none;
|
||||
padding: 2px 4px;
|
||||
width: 100%;
|
||||
}
|
||||
/* Only Opera gets it right. */
|
||||
.Firefox #MSearchField,
|
||||
.IE #MSearchField,
|
||||
.Safari #MSearchField {
|
||||
width: 94%;
|
||||
}
|
||||
.Opera9 #MSearchField,
|
||||
.Konqueror #MSearchField {
|
||||
width: 97%;
|
||||
}
|
||||
.FramedMenuPage .Firefox #MSearchField,
|
||||
.FramedMenuPage .Safari #MSearchField,
|
||||
.FramedMenuPage .Konqueror #MSearchField {
|
||||
width: 98%;
|
||||
}
|
||||
|
||||
/* Firefox doesn't do this right in frames without #MSearchPanel added on.
|
||||
It's presence doesn't hurt anything other browsers. */
|
||||
#MSearchPanel.MSearchPanelInactive:hover #MSearchField {
|
||||
background-color: #FFFFFF;
|
||||
border: 1px solid #C0C0C0;
|
||||
padding: 1px 3px;
|
||||
}
|
||||
.MSearchPanelActive #MSearchField {
|
||||
background-color: #FFFFFF;
|
||||
border: 1px solid #C0C0C0;
|
||||
font-style: normal;
|
||||
padding: 1px 3px;
|
||||
}
|
||||
|
||||
#MSearchType {
|
||||
visibility: hidden;
|
||||
font: 8pt Verdana, sans-serif;
|
||||
width: 98%;
|
||||
padding: 0;
|
||||
border: 1px solid #C0C0C0;
|
||||
}
|
||||
.MSearchPanelActive #MSearchType,
|
||||
/* As mentioned above, Firefox doesn't do this right in frames without #MSearchPanel added on. */
|
||||
#MSearchPanel.MSearchPanelInactive:hover #MSearchType,
|
||||
#MSearchType:focus {
|
||||
visibility: visible;
|
||||
color: #606060;
|
||||
}
|
||||
#MSearchType option#MSearchEverything {
|
||||
font-weight: bold;
|
||||
}
|
||||
|
||||
.Opera8 .MSearchPanelInactive:hover,
|
||||
.Opera8 .MSearchPanelActive {
|
||||
margin-left: -1px;
|
||||
}
|
||||
|
||||
|
||||
iframe#MSearchResults {
|
||||
width: 60ex;
|
||||
height: 15em;
|
||||
}
|
||||
#MSearchResultsWindow {
|
||||
display: none;
|
||||
position: absolute;
|
||||
left: 0; top: 0;
|
||||
border: 1px solid #000000;
|
||||
background-color: #E8E8E8;
|
||||
}
|
||||
#MSearchResultsWindowClose {
|
||||
font-weight: bold;
|
||||
font-size: 8pt;
|
||||
display: block;
|
||||
padding: 2px 5px;
|
||||
}
|
||||
#MSearchResultsWindowClose:link,
|
||||
#MSearchResultsWindowClose:visited {
|
||||
color: #000000;
|
||||
text-decoration: none;
|
||||
}
|
||||
#MSearchResultsWindowClose:active,
|
||||
#MSearchResultsWindowClose:hover {
|
||||
color: #800000;
|
||||
text-decoration: none;
|
||||
background-color: #F4F4F4;
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
#Content {
|
||||
padding-bottom: 15px;
|
||||
}
|
||||
|
||||
.ContentPage #Content {
|
||||
border-width: 0 0 1px 1px;
|
||||
border-style: solid;
|
||||
border-color: #000000;
|
||||
background-color: #FFFFFF;
|
||||
font-size: 8pt; /* To make 31ex match the menu's 31ex. */
|
||||
margin-left: 31ex;
|
||||
}
|
||||
.ContentPage .Firefox #Content {
|
||||
margin-left: 27ex;
|
||||
}
|
||||
|
||||
|
||||
|
||||
.CTopic {
|
||||
font-size: 8pt;
|
||||
margin-bottom: 3em;
|
||||
}
|
||||
|
||||
|
||||
.CTitle {
|
||||
font-size: 11pt; font-weight: bold;
|
||||
border-width: 0 0 1px 0; border-style: solid; border-color: #A0A0A0;
|
||||
margin: 0 15px .5em 15px }
|
||||
|
||||
.CGroup .CTitle {
|
||||
font-size: 16pt; font-variant: small-caps;
|
||||
padding-left: 15px; padding-right: 15px;
|
||||
border-width: 0 0 2px 0; border-color: #000000;
|
||||
margin-left: 0; margin-right: 0 }
|
||||
|
||||
.CClass .CTitle,
|
||||
.CInterface .CTitle,
|
||||
.CDatabase .CTitle,
|
||||
.CDatabaseTable .CTitle,
|
||||
.CSection .CTitle {
|
||||
font-size: 18pt;
|
||||
color: #FFFFFF; background-color: #A0A0A0;
|
||||
padding: 10px 15px 10px 15px;
|
||||
border-width: 2px 0; border-color: #000000;
|
||||
margin-left: 0; margin-right: 0 }
|
||||
|
||||
#MainTopic .CTitle {
|
||||
font-size: 20pt;
|
||||
color: #FFFFFF; background-color: #7070C0;
|
||||
padding: 10px 15px 10px 15px;
|
||||
border-width: 0 0 3px 0; border-color: #000000;
|
||||
margin-left: 0; margin-right: 0 }
|
||||
|
||||
.CBody {
|
||||
margin-left: 15px; margin-right: 15px }
|
||||
|
||||
|
||||
.CToolTip {
|
||||
position: absolute; visibility: hidden;
|
||||
left: 0; top: 0;
|
||||
background-color: #FFFFE0;
|
||||
padding: 5px;
|
||||
border-width: 1px 2px 2px 1px; border-style: solid; border-color: #000000;
|
||||
font-size: 8pt;
|
||||
}
|
||||
|
||||
.Opera .CToolTip {
|
||||
max-width: 98%;
|
||||
}
|
||||
|
||||
/* Scrollbars would be useless. */
|
||||
.CToolTip blockquote {
|
||||
overflow: hidden;
|
||||
}
|
||||
.IE6 .CToolTip blockquote {
|
||||
overflow: visible;
|
||||
}
|
||||
|
||||
.CHeading {
|
||||
font-weight: bold; font-size: 9pt;
|
||||
margin: 1.5em 0 .5em 0;
|
||||
}
|
||||
|
||||
.CBody pre {
|
||||
font: 8pt "Courier New", Courier, monospace;
|
||||
background-color: #FCFCFC;
|
||||
margin: 1em 35px;
|
||||
padding: 10px 15px 10px 10px;
|
||||
border-color: #E0E0E0 #E0E0E0 #E0E0E0 #E4E4E4;
|
||||
border-width: 1px 1px 1px 6px;
|
||||
border-style: dashed dashed dashed solid;
|
||||
}
|
||||
|
||||
.CBody ul {
|
||||
/* I don't know why CBody's margin doesn't apply, but it's consistent across browsers so whatever.
|
||||
Reapply it here as padding. */
|
||||
padding-left: 15px; padding-right: 15px;
|
||||
margin: .5em 5ex .5em 5ex;
|
||||
}
|
||||
|
||||
.CDescriptionList {
|
||||
margin: .5em 5ex 0 5ex }
|
||||
|
||||
.CDLEntry {
|
||||
font: 8pt "Courier New", Courier, monospace; color: #808080;
|
||||
padding-bottom: .25em;
|
||||
white-space: nowrap }
|
||||
|
||||
.CDLDescription {
|
||||
font-size: 8pt; /* For browsers that don't inherit correctly, like Opera 5. */
|
||||
padding-bottom: .5em; padding-left: 5ex }
|
||||
|
||||
|
||||
.CTopic img {
|
||||
text-align: center;
|
||||
display: block;
|
||||
margin: 1em auto;
|
||||
}
|
||||
.CImageCaption {
|
||||
font-variant: small-caps;
|
||||
font-size: 8pt;
|
||||
color: #808080;
|
||||
text-align: center;
|
||||
position: relative;
|
||||
top: 1em;
|
||||
}
|
||||
|
||||
.CImageLink {
|
||||
color: #808080;
|
||||
font-style: italic;
|
||||
}
|
||||
a.CImageLink:link,
|
||||
a.CImageLink:visited,
|
||||
a.CImageLink:hover { color: #808080 }
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
.Prototype {
|
||||
font: 8pt "Courier New", Courier, monospace;
|
||||
padding: 5px 3ex;
|
||||
border-width: 1px; border-style: solid;
|
||||
margin: 0 5ex 1.5em 5ex;
|
||||
}
|
||||
|
||||
.Prototype td {
|
||||
font-size: 8pt;
|
||||
}
|
||||
|
||||
.PDefaultValue,
|
||||
.PDefaultValuePrefix,
|
||||
.PTypePrefix {
|
||||
color: #8F8F8F;
|
||||
}
|
||||
.PTypePrefix {
|
||||
text-align: right;
|
||||
}
|
||||
.PAfterParameters {
|
||||
vertical-align: bottom;
|
||||
}
|
||||
|
||||
.IE .Prototype table {
|
||||
padding: 0;
|
||||
}
|
||||
|
||||
.CFunction .Prototype {
|
||||
background-color: #F4F4F4; border-color: #D0D0D0 }
|
||||
.CProperty .Prototype {
|
||||
background-color: #F4F4FF; border-color: #C0C0E8 }
|
||||
.CVariable .Prototype {
|
||||
background-color: #FFFFF0; border-color: #E0E0A0 }
|
||||
|
||||
.CClass .Prototype {
|
||||
border-width: 1px 2px 2px 1px; border-style: solid; border-color: #A0A0A0;
|
||||
background-color: #F4F4F4;
|
||||
}
|
||||
.CInterface .Prototype {
|
||||
border-width: 1px 2px 2px 1px; border-style: solid; border-color: #A0A0D0;
|
||||
background-color: #F4F4FF;
|
||||
}
|
||||
|
||||
.CDatabaseIndex .Prototype,
|
||||
.CConstant .Prototype {
|
||||
background-color: #D0D0D0; border-color: #000000 }
|
||||
.CType .Prototype,
|
||||
.CEnumeration .Prototype {
|
||||
background-color: #FAF0F0; border-color: #E0B0B0;
|
||||
}
|
||||
.CDatabaseTrigger .Prototype,
|
||||
.CEvent .Prototype,
|
||||
.CDelegate .Prototype {
|
||||
background-color: #F0FCF0; border-color: #B8E4B8 }
|
||||
|
||||
.CToolTip .Prototype {
|
||||
margin: 0 0 .5em 0;
|
||||
white-space: nowrap;
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
.Summary {
|
||||
margin: 1.5em 5ex 0 5ex }
|
||||
|
||||
.STitle {
|
||||
font-size: 11pt; font-weight: bold;
|
||||
margin-bottom: .5em }
|
||||
|
||||
|
||||
.SBorder {
|
||||
background-color: #FFFFF0;
|
||||
padding: 15px;
|
||||
border: 1px solid #C0C060 }
|
||||
|
||||
/* In a frame IE 6 will make them too long unless you set the width to 100%. Without frames it will be correct without a width
|
||||
or slightly too long (but not enough to scroll) with a width. This arbitrary weirdness simply astounds me. IE 7 has the same
|
||||
problem with frames, haven't tested it without. */
|
||||
.FramedContentPage .IE .SBorder {
|
||||
width: 100% }
|
||||
|
||||
/* A treat for Mozilla users. Blatantly non-standard. Will be replaced with CSS 3 attributes when finalized/supported. */
|
||||
.Firefox .SBorder {
|
||||
-moz-border-radius: 20px }
|
||||
|
||||
|
||||
.STable {
|
||||
font-size: 8pt; width: 100% }
|
||||
|
||||
.SEntry {
|
||||
width: 30% }
|
||||
.SDescription {
|
||||
width: 70% }
|
||||
|
||||
|
||||
.SMarked {
|
||||
background-color: #F8F8D8 }
|
||||
|
||||
.SDescription { padding-left: 2ex }
|
||||
.SIndent1 .SEntry { padding-left: 1.5ex } .SIndent1 .SDescription { padding-left: 3.5ex }
|
||||
.SIndent2 .SEntry { padding-left: 3.0ex } .SIndent2 .SDescription { padding-left: 5.0ex }
|
||||
.SIndent3 .SEntry { padding-left: 4.5ex } .SIndent3 .SDescription { padding-left: 6.5ex }
|
||||
.SIndent4 .SEntry { padding-left: 6.0ex } .SIndent4 .SDescription { padding-left: 8.0ex }
|
||||
.SIndent5 .SEntry { padding-left: 7.5ex } .SIndent5 .SDescription { padding-left: 9.5ex }
|
||||
|
||||
.SDescription a { color: #800000}
|
||||
.SDescription a:active { color: #A00000 }
|
||||
|
||||
.SGroup td {
|
||||
padding-top: .5em; padding-bottom: .25em }
|
||||
|
||||
.SGroup .SEntry {
|
||||
font-weight: bold; font-variant: small-caps }
|
||||
|
||||
.SGroup .SEntry a { color: #800000 }
|
||||
.SGroup .SEntry a:active { color: #F00000 }
|
||||
|
||||
|
||||
.SMain td,
|
||||
.SClass td,
|
||||
.SDatabase td,
|
||||
.SDatabaseTable td,
|
||||
.SSection td {
|
||||
font-size: 10pt;
|
||||
padding-bottom: .25em }
|
||||
|
||||
.SClass td,
|
||||
.SDatabase td,
|
||||
.SDatabaseTable td,
|
||||
.SSection td {
|
||||
padding-top: 1em }
|
||||
|
||||
.SMain .SEntry,
|
||||
.SClass .SEntry,
|
||||
.SDatabase .SEntry,
|
||||
.SDatabaseTable .SEntry,
|
||||
.SSection .SEntry {
|
||||
font-weight: bold;
|
||||
}
|
||||
|
||||
.SMain .SEntry a,
|
||||
.SClass .SEntry a,
|
||||
.SDatabase .SEntry a,
|
||||
.SDatabaseTable .SEntry a,
|
||||
.SSection .SEntry a { color: #000000 }
|
||||
|
||||
.SMain .SEntry a:active,
|
||||
.SClass .SEntry a:active,
|
||||
.SDatabase .SEntry a:active,
|
||||
.SDatabaseTable .SEntry a:active,
|
||||
.SSection .SEntry a:active { color: #A00000 }
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
.ClassHierarchy {
|
||||
margin: 0 15px 1em 15px }
|
||||
|
||||
.CHEntry {
|
||||
border-width: 1px 2px 2px 1px; border-style: solid; border-color: #A0A0A0;
|
||||
margin-bottom: 3px;
|
||||
padding: 2px 2ex;
|
||||
font-size: 8pt;
|
||||
background-color: #F4F4F4; color: #606060;
|
||||
}
|
||||
|
||||
.Firefox .CHEntry {
|
||||
-moz-border-radius: 4px;
|
||||
}
|
||||
|
||||
.CHCurrent .CHEntry {
|
||||
font-weight: bold;
|
||||
border-color: #000000;
|
||||
color: #000000;
|
||||
}
|
||||
|
||||
.CHChildNote .CHEntry {
|
||||
font-style: italic;
|
||||
font-size: 8pt;
|
||||
}
|
||||
|
||||
.CHIndent {
|
||||
margin-left: 3ex;
|
||||
}
|
||||
|
||||
.CHEntry a:link,
|
||||
.CHEntry a:visited,
|
||||
.CHEntry a:hover {
|
||||
color: #606060;
|
||||
}
|
||||
.CHEntry a:active {
|
||||
color: #800000;
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#Index {
|
||||
background-color: #FFFFFF;
|
||||
}
|
||||
|
||||
/* As opposed to .PopupSearchResultsPage #Index */
|
||||
.IndexPage #Index,
|
||||
.FramedIndexPage #Index,
|
||||
.FramedSearchResultsPage #Index {
|
||||
padding: 15px;
|
||||
}
|
||||
|
||||
.IndexPage #Index {
|
||||
border-width: 0 0 1px 1px;
|
||||
border-style: solid;
|
||||
border-color: #000000;
|
||||
font-size: 8pt; /* To make 27ex match the menu's 27ex. */
|
||||
margin-left: 27ex;
|
||||
}
|
||||
|
||||
|
||||
.IPageTitle {
|
||||
font-size: 20pt; font-weight: bold;
|
||||
color: #FFFFFF; background-color: #7070C0;
|
||||
padding: 10px 15px 10px 15px;
|
||||
border-width: 0 0 3px 0; border-color: #000000; border-style: solid;
|
||||
margin: -15px -15px 0 -15px }
|
||||
|
||||
.FramedSearchResultsPage .IPageTitle {
|
||||
margin-bottom: 15px;
|
||||
}
|
||||
|
||||
.INavigationBar {
|
||||
text-align: center;
|
||||
background-color: #FFFFF0;
|
||||
padding: 5px;
|
||||
border-bottom: solid 1px black;
|
||||
margin: 0 -15px 15px -15px;
|
||||
}
|
||||
|
||||
.INavigationBar a {
|
||||
font-weight: bold }
|
||||
|
||||
.IHeading {
|
||||
font-size: 14pt; font-weight: bold;
|
||||
padding: 2.5em 0 .5em 0;
|
||||
text-align: center;
|
||||
width: 3.5ex;
|
||||
}
|
||||
#IFirstHeading {
|
||||
padding-top: 0;
|
||||
}
|
||||
|
||||
.IEntry {
|
||||
padding-left: 1ex;
|
||||
}
|
||||
.PopupSearchResultsPage .IEntry {
|
||||
font-size: 8pt;
|
||||
padding: 1px 5px;
|
||||
}
|
||||
.PopupSearchResultsPage .Opera9 .IEntry,
|
||||
.FramedSearchResultsPage .Opera9 .IEntry {
|
||||
text-align: left;
|
||||
}
|
||||
.FramedSearchResultsPage .IEntry {
|
||||
padding: 0;
|
||||
}
|
||||
|
||||
.ISubIndex {
|
||||
padding-left: 3ex; padding-bottom: .5em }
|
||||
.PopupSearchResultsPage .ISubIndex {
|
||||
display: none;
|
||||
}
|
||||
|
||||
/* While it may cause some entries to look like links when they aren't, I found it's much easier to read the
|
||||
index if everything's the same color. */
|
||||
.ISymbol {
|
||||
font-weight: bold; color: #900000 }
|
||||
|
||||
.IndexPage .ISymbolPrefix,
|
||||
.FramedIndexPage .ISymbolPrefix {
|
||||
text-align: right;
|
||||
color: #C47C7C;
|
||||
background-color: #F8F8F8;
|
||||
border-right: 3px solid #E0E0E0;
|
||||
border-left: 1px solid #E0E0E0;
|
||||
padding: 0 1px 0 2px;
|
||||
}
|
||||
.PopupSearchResultsPage .ISymbolPrefix,
|
||||
.FramedSearchResultsPage .ISymbolPrefix {
|
||||
color: #900000;
|
||||
}
|
||||
.PopupSearchResultsPage .ISymbolPrefix {
|
||||
font-size: 8pt;
|
||||
}
|
||||
|
||||
.IndexPage #IFirstSymbolPrefix,
|
||||
.FramedIndexPage #IFirstSymbolPrefix {
|
||||
border-top: 1px solid #E0E0E0;
|
||||
}
|
||||
.IndexPage #ILastSymbolPrefix,
|
||||
.FramedIndexPage #ILastSymbolPrefix {
|
||||
border-bottom: 1px solid #E0E0E0;
|
||||
}
|
||||
.IndexPage #IOnlySymbolPrefix,
|
||||
.FramedIndexPage #IOnlySymbolPrefix {
|
||||
border-top: 1px solid #E0E0E0;
|
||||
border-bottom: 1px solid #E0E0E0;
|
||||
}
|
||||
|
||||
a.IParent,
|
||||
a.IFile {
|
||||
display: block;
|
||||
}
|
||||
|
||||
.PopupSearchResultsPage .SRStatus {
|
||||
padding: 2px 5px;
|
||||
font-size: 8pt;
|
||||
font-style: italic;
|
||||
}
|
||||
.FramedSearchResultsPage .SRStatus {
|
||||
font-size: 8pt;
|
||||
font-style: italic;
|
||||
}
|
||||
|
||||
.SRResult {
|
||||
display: none;
|
||||
}
|
||||
|
||||
|
||||
|
||||
#Footer {
|
||||
font-size: 8pt;
|
||||
color: #989898;
|
||||
text-align: right;
|
||||
}
|
||||
|
||||
#Footer p {
|
||||
text-indent: 0;
|
||||
margin-bottom: .5em;
|
||||
}
|
||||
|
||||
.ContentPage #Footer,
|
||||
.IndexPage #Footer {
|
||||
text-align: right;
|
||||
margin: 2px;
|
||||
}
|
||||
|
||||
.FramedMenuPage #Footer {
|
||||
text-align: center;
|
||||
margin: 5em 10px 10px 10px;
|
||||
padding-top: 1em;
|
||||
border-top: 1px solid #C8C8C8;
|
||||
}
|
||||
|
||||
#Footer a:link,
|
||||
#Footer a:hover,
|
||||
#Footer a:visited { color: #989898 }
|
||||
#Footer a:active { color: #A00000 }
|
||||
|
||||
|
||||
|
||||
.prettyprint .kwd { color: #800000; } /* keywords */
|
||||
|
||||
.prettyprint.PDefaultValue .kwd,
|
||||
.prettyprint.PDefaultValuePrefix .kwd,
|
||||
.prettyprint.PTypePrefix .kwd {
|
||||
color: #C88F8F;
|
||||
}
|
||||
|
||||
.prettyprint .com { color: #008000; } /* comments */
|
||||
|
||||
.prettyprint.PDefaultValue .com,
|
||||
.prettyprint.PDefaultValuePrefix .com,
|
||||
.prettyprint.PTypePrefix .com {
|
||||
color: #8FC88F;
|
||||
}
|
||||
|
||||
.prettyprint .str { color: #0000B0; } /* strings */
|
||||
.prettyprint .lit { color: #0000B0; } /* literals */
|
||||
|
||||
.prettyprint.PDefaultValue .str,
|
||||
.prettyprint.PDefaultValuePrefix .str,
|
||||
.prettyprint.PTypePrefix .str,
|
||||
.prettyprint.PDefaultValue .lit,
|
||||
.prettyprint.PDefaultValuePrefix .lit,
|
||||
.prettyprint.PTypePrefix .lit {
|
||||
color: #8F8FC0;
|
||||
}
|
||||
|
||||
.prettyprint .typ { color: #000000; } /* types */
|
||||
.prettyprint .pun { color: #000000; } /* punctuation */
|
||||
.prettyprint .pln { color: #000000; } /* punctuation */
|
||||
|
||||
.prettyprint.PDefaultValue .typ,
|
||||
.prettyprint.PDefaultValuePrefix .typ,
|
||||
.prettyprint.PTypePrefix .typ,
|
||||
.prettyprint.PDefaultValue .pun,
|
||||
.prettyprint.PDefaultValuePrefix .pun,
|
||||
.prettyprint.PTypePrefix .pun,
|
||||
.prettyprint.PDefaultValue .pln,
|
||||
.prettyprint.PDefaultValuePrefix .pln,
|
||||
.prettyprint.PTypePrefix .pln {
|
||||
color: #8F8F8F;
|
||||
}
|
||||
|
||||
.prettyprint .tag { color: #008; }
|
||||
.prettyprint .atn { color: #606; }
|
||||
.prettyprint .atv { color: #080; }
|
||||
.prettyprint .dec { color: #606; }
|
||||
|
|
@ -0,0 +1,15 @@
|
|||
Compatiblity with different browsers
|
||||
===================================
|
||||
**OS: `windows`**<br>
|
||||
|
||||
|
||||
Cases | IE (Win) | Opera | Chrome | Mozilla | Safari
|
||||
------------------ | ------- | ----- | ------ | ------- | ------
|
||||
XHR wrapping | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png)
|
||||
HTML dom-0 wrapping | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png)
|
||||
HTML dom-2 wrapping | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png)
|
||||
URL rewriting | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) | ![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png) |![yes](https://cdn3.iconfinder.com/data/icons/fatcow/32/accept.png)
|
||||
|
||||
<pre>Note: Missing tick means, this has not yet been implemented or tested</pre>
|
||||
|
||||
|
|
@ -0,0 +1,366 @@
|
|||
/**
|
||||
* =================================================================
|
||||
* Javascript code for OWASP CSRF Protector
|
||||
* Task it does: Fetch csrftoken from cookie, and attach it to every
|
||||
* POST request
|
||||
* Allowed GET url
|
||||
* -- XHR
|
||||
* -- Static Forms
|
||||
* -- URLS (GET only)
|
||||
* -- dynamic forms
|
||||
* =================================================================
|
||||
*/
|
||||
|
||||
var CSRFP_FIELD_TOKEN_NAME = 'csrfp_hidden_data_token';
|
||||
var CSRFP_FIELD_URLS = 'csrfp_hidden_data_urls';
|
||||
|
||||
var CSRFP = {
|
||||
CSRFP_TOKEN: 'csrfp_token',
|
||||
/**
|
||||
* Array of patterns of url, for which csrftoken need to be added
|
||||
* In case of GET request also, provided from server
|
||||
*
|
||||
* @var string array
|
||||
*/
|
||||
checkForUrls: [],
|
||||
/**
|
||||
* Function to check if a certain url is allowed to perform the request
|
||||
* With or without csrf token
|
||||
*
|
||||
* @param: string, url
|
||||
*
|
||||
* @return: boolean, true if csrftoken is not needed
|
||||
* false if csrftoken is needed
|
||||
*/
|
||||
_isValidGetRequest: function(url) {
|
||||
for (var i = 0; i < CSRFP.checkForUrls.length; i++) {
|
||||
var match = CSRFP.checkForUrls[i].exec(url);
|
||||
if (match !== null && match.length > 0) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
return true;
|
||||
},
|
||||
/**
|
||||
* function to get Auth key from cookie Andreturn it to requesting function
|
||||
*
|
||||
* @param: void
|
||||
*
|
||||
* @return: string, csrftoken retrieved from cookie
|
||||
*/
|
||||
_getAuthKey: function() {
|
||||
var re = new RegExp(CSRFP.CSRFP_TOKEN +"=([^;]+)(;|$)");
|
||||
var RegExpArray = re.exec(document.cookie);
|
||||
|
||||
if (RegExpArray === null) {
|
||||
return false;
|
||||
}
|
||||
return RegExpArray[1];
|
||||
},
|
||||
/**
|
||||
* Function to get domain of any url
|
||||
*
|
||||
* @param: string, url
|
||||
*
|
||||
* @return: string, domain of url
|
||||
*/
|
||||
_getDomain: function(url) {
|
||||
if (url.indexOf("http://") !== 0
|
||||
&& url.indexOf("https://") !== 0)
|
||||
return document.domain;
|
||||
return /http(s)?:\/\/([^\/]+)/.exec(url)[2];
|
||||
},
|
||||
/**
|
||||
* Function to create and return a hidden input element
|
||||
* For stroing the CSRFP_TOKEN
|
||||
*
|
||||
* @param void
|
||||
*
|
||||
* @return input element
|
||||
*/
|
||||
_getInputElt: function() {
|
||||
var hiddenObj = document.createElement("input");
|
||||
hiddenObj.setAttribute('name', CSRFP.CSRFP_TOKEN);
|
||||
hiddenObj.setAttribute('class', CSRFP.CSRFP_TOKEN);
|
||||
hiddenObj.type = 'hidden';
|
||||
hiddenObj.value = CSRFP._getAuthKey();
|
||||
return hiddenObj;
|
||||
},
|
||||
/**
|
||||
* Returns absolute path for relative path
|
||||
*
|
||||
* @param base, base url
|
||||
* @param relative, relative url
|
||||
*
|
||||
* @return absolute path (string)
|
||||
*/
|
||||
_getAbsolutePath: function(base, relative) {
|
||||
var stack = base.split("/");
|
||||
var parts = relative.split("/");
|
||||
// remove current file name (or empty string)
|
||||
// (omit if "base" is the current folder without trailing slash)
|
||||
stack.pop();
|
||||
|
||||
for (var i = 0; i < parts.length; i++) {
|
||||
if (parts[i] == ".")
|
||||
continue;
|
||||
if (parts[i] == "..")
|
||||
stack.pop();
|
||||
else
|
||||
stack.push(parts[i]);
|
||||
}
|
||||
return stack.join("/");
|
||||
},
|
||||
/**
|
||||
* Remove jcsrfp-token run fun and then put them back
|
||||
*
|
||||
* @param function
|
||||
* @param reference form obj
|
||||
*
|
||||
* @retrun function
|
||||
*/
|
||||
_csrfpWrap: function(fun, obj) {
|
||||
return function(event) {
|
||||
// Remove CSRf token if exists
|
||||
if (typeof obj[CSRFP.CSRFP_TOKEN] !== 'undefined') {
|
||||
var target = obj[CSRFP.CSRFP_TOKEN];
|
||||
target.parentNode.removeChild(target);
|
||||
}
|
||||
|
||||
// Trigger the functions
|
||||
var result = fun.apply(this, [event]);
|
||||
|
||||
// Now append the csrfp_token back
|
||||
obj.appendChild(CSRFP._getInputElt());
|
||||
|
||||
return result;
|
||||
};
|
||||
},
|
||||
/**
|
||||
* Initialises the CSRFProtector js script
|
||||
*
|
||||
* @param void
|
||||
*
|
||||
* @return void
|
||||
*/
|
||||
_init: function() {
|
||||
CSRFP.CSRFP_TOKEN = document.getElementById(CSRFP_FIELD_TOKEN_NAME).value;
|
||||
try {
|
||||
CSRFP.checkForUrls = JSON.parse(document.getElementById(CSRFP_FIELD_URLS).value);
|
||||
} catch (err) {
|
||||
console.error(err);
|
||||
console.error('[ERROR] [CSRF Protector] unable to parse blacklisted url fields.');
|
||||
}
|
||||
|
||||
//convert these rules received from php lib to regex objects
|
||||
for (var i = 0; i < CSRFP.checkForUrls.length; i++) {
|
||||
CSRFP.checkForUrls[i] = CSRFP.checkForUrls[i].replace(/\*/g, '(.*)')
|
||||
.replace(/\//g, "\\/");
|
||||
CSRFP.checkForUrls[i] = new RegExp(CSRFP.checkForUrls[i]);
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
};
|
||||
|
||||
//==========================================================
|
||||
// Adding tokens, wrappers on window onload
|
||||
//==========================================================
|
||||
|
||||
function csrfprotector_init() {
|
||||
|
||||
// Call the init funcion
|
||||
CSRFP._init();
|
||||
|
||||
// definition of basic FORM submit event handler to intercept the form request
|
||||
// and attach a CSRFP TOKEN if it's not already available
|
||||
var BasicSubmitInterceptor = function(event) {
|
||||
if (typeof event.target[CSRFP.CSRFP_TOKEN] === 'undefined') {
|
||||
event.target.appendChild(CSRFP._getInputElt());
|
||||
} else {
|
||||
//modify token to latest value
|
||||
event.target[CSRFP.CSRFP_TOKEN].value = CSRFP._getAuthKey();
|
||||
}
|
||||
}
|
||||
|
||||
//==================================================================
|
||||
// Adding csrftoken to request resulting from <form> submissions
|
||||
// Add for each POST, while for mentioned GET request
|
||||
// TODO - check for method
|
||||
//==================================================================
|
||||
// run time binding
|
||||
document.querySelector('body').addEventListener('submit', function(event) {
|
||||
if (event.target.tagName.toLowerCase() === 'form') {
|
||||
BasicSubmitInterceptor(event);
|
||||
};
|
||||
});
|
||||
|
||||
// intial binding
|
||||
// for(var i = 0; i < document.forms.length; i++) {
|
||||
// document.forms[i].addEventListener("submit", BasicSubmitInterceptor);
|
||||
// }
|
||||
|
||||
//==================================================================
|
||||
// Adding csrftoken to request resulting from direct form.submit() call
|
||||
// Add for each POST, while for mentioned GET request
|
||||
// TODO - check for form method
|
||||
//==================================================================
|
||||
HTMLFormElement.prototype.submit_ = HTMLFormElement.prototype.submit;
|
||||
HTMLFormElement.prototype.submit = function() {
|
||||
// check if the FORM already contains the token element
|
||||
if (!this.getElementsByClassName(CSRFP.CSRFP_TOKEN).length)
|
||||
this.appendChild(CSRFP._getInputElt());
|
||||
this.submit_();
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* Add wrapper for HTMLFormElements addEventListener so that any further
|
||||
* addEventListens won't have trouble with CSRF token
|
||||
* todo - check for method
|
||||
*/
|
||||
HTMLFormElement.prototype.addEventListener_ = HTMLFormElement.prototype.addEventListener;
|
||||
HTMLFormElement.prototype.addEventListener = function(eventType, fun, bubble) {
|
||||
if (eventType === 'submit') {
|
||||
var wrapped = CSRFP._csrfpWrap(fun, this);
|
||||
this.addEventListener_(eventType, wrapped, bubble);
|
||||
} else {
|
||||
this.addEventListener_(eventType, fun, bubble);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Add wrapper for IE's attachEvent
|
||||
* todo - check for method
|
||||
* todo - typeof is now obselete for IE 11, use some other method.
|
||||
*/
|
||||
if (typeof HTMLFormElement.prototype.attachEvent !== 'undefined') {
|
||||
HTMLFormElement.prototype.attachEvent_ = HTMLFormElement.prototype.attachEvent;
|
||||
HTMLFormElement.prototype.attachEvent = function(eventType, fun) {
|
||||
if (eventType === 'onsubmit') {
|
||||
var wrapped = CSRFP._csrfpWrap(fun, this);
|
||||
this.attachEvent_(eventType, wrapped);
|
||||
} else {
|
||||
this.attachEvent_(eventType, fun);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
//==================================================================
|
||||
// Wrapper for XMLHttpRequest & ActiveXObject (for IE 6 & below)
|
||||
// Set X-No-CSRF to true before sending if request method is
|
||||
//==================================================================
|
||||
|
||||
/**
|
||||
* Wrapper to XHR open method
|
||||
* Add a property method to XMLHttpRequst class
|
||||
* @param: all parameters to XHR open method
|
||||
* @return: object returned by default, XHR open method
|
||||
*/
|
||||
function new_open(method, url, async, username, password) {
|
||||
this.method = method;
|
||||
var isAbsolute = (url.indexOf("./") === -1) ? true : false;
|
||||
if (!isAbsolute) {
|
||||
var base = location.protocol +'//' +location.host
|
||||
+ location.pathname;
|
||||
url = CSRFP._getAbsolutePath(base, url);
|
||||
}
|
||||
if (method.toLowerCase() === 'get'
|
||||
&& !CSRFP._isValidGetRequest(url)) {
|
||||
//modify the url
|
||||
if (url.indexOf('?') === -1) {
|
||||
url += "?" +CSRFP.CSRFP_TOKEN +"=" +CSRFP._getAuthKey();
|
||||
} else {
|
||||
url += "&" +CSRFP.CSRFP_TOKEN +"=" +CSRFP._getAuthKey();
|
||||
}
|
||||
}
|
||||
|
||||
return this.old_open(method, url, async, username, password);
|
||||
}
|
||||
|
||||
/**
|
||||
* Wrapper to XHR send method
|
||||
* Add query paramter to XHR object
|
||||
*
|
||||
* @param: all parameters to XHR send method
|
||||
*
|
||||
* @return: object returned by default, XHR send method
|
||||
*/
|
||||
function new_send(data) {
|
||||
if (this.method.toLowerCase() === 'post') {
|
||||
if (data !== null && typeof data === 'object') {
|
||||
data.append(CSRFP.CSRFP_TOKEN, CSRFP._getAuthKey());
|
||||
} else {
|
||||
if (typeof data != "undefined") {
|
||||
data += "&";
|
||||
} else {
|
||||
data = "";
|
||||
}
|
||||
data += CSRFP.CSRFP_TOKEN +"=" +CSRFP._getAuthKey();
|
||||
}
|
||||
}
|
||||
return this.old_send(data);
|
||||
}
|
||||
|
||||
if (window.XMLHttpRequest) {
|
||||
// Wrapping
|
||||
XMLHttpRequest.prototype.old_send = XMLHttpRequest.prototype.send;
|
||||
XMLHttpRequest.prototype.old_open = XMLHttpRequest.prototype.open;
|
||||
XMLHttpRequest.prototype.open = new_open;
|
||||
XMLHttpRequest.prototype.send = new_send;
|
||||
}
|
||||
if (typeof ActiveXObject !== 'undefined') {
|
||||
ActiveXObject.prototype.old_send = ActiveXObject.prototype.send;
|
||||
ActiveXObject.prototype.old_open = ActiveXObject.prototype.open;
|
||||
ActiveXObject.prototype.open = new_open;
|
||||
ActiveXObject.prototype.send = new_send;
|
||||
}
|
||||
//==================================================================
|
||||
// Rewrite existing urls ( Attach CSRF token )
|
||||
// Rules:
|
||||
// Rewrite those urls which matches the regex sent by Server
|
||||
// Ignore cross origin urls & internal links (one with hashtags)
|
||||
// Append the token to those url already containig GET query parameter(s)
|
||||
// Add the token to those which does not contain GET query parameter(s)
|
||||
//==================================================================
|
||||
|
||||
for (var i = 0; i < document.links.length; i++) {
|
||||
document.links[i].addEventListener("mousedown", function(event) {
|
||||
var href = event.target.href;
|
||||
if(typeof href === "string")
|
||||
{
|
||||
var urlDisect = href.split('#');
|
||||
var url = urlDisect[0];
|
||||
var hash = urlDisect[1];
|
||||
|
||||
if(CSRFP._getDomain(url).indexOf(document.domain) === -1
|
||||
|| CSRFP._isValidGetRequest(url)) {
|
||||
//cross origin or not to be protected by rules -- ignore
|
||||
return;
|
||||
}
|
||||
|
||||
if (url.indexOf('?') !== -1) {
|
||||
if(url.indexOf(CSRFP.CSRFP_TOKEN) === -1) {
|
||||
url += "&" +CSRFP.CSRFP_TOKEN +"=" +CSRFP._getAuthKey();
|
||||
} else {
|
||||
url = url.replace(new RegExp(CSRFP.CSRFP_TOKEN +"=.*?(&|$)", 'g'),
|
||||
CSRFP.CSRFP_TOKEN +"=" +CSRFP._getAuthKey() + "$1");
|
||||
}
|
||||
} else {
|
||||
url += "?" +CSRFP.CSRFP_TOKEN +"=" +CSRFP._getAuthKey();
|
||||
}
|
||||
|
||||
event.target.href = url;
|
||||
if (typeof hash !== 'undefined') {
|
||||
event.target.href += '#' +hash;
|
||||
}
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
window.addEventListener("DOMContentLoaded", function() {
|
||||
csrfprotector_init();
|
||||
}, false);
|
|
@ -0,0 +1,7 @@
|
|||
<?php
|
||||
/**
|
||||
* OWASP CSRF Protector Project
|
||||
* Code to redirect the user to previosus directory
|
||||
* In case a user try to access this directory directly
|
||||
*/
|
||||
header('location: ../index.php');
|
|
@ -0,0 +1,21 @@
|
|||
CSRFProtector configuration
|
||||
==========================================
|
||||
|
||||
- `CSRFP_TOKEN`: name of the csrf nonce, used for cookie or posting as argument. default: `csrfp_token` (if left blank)
|
||||
- `logDirectory`: location of the directory at which log files will be saved **relative** to `config.php` file. This is required for file based logging (default), Not needed, in case you override logging function to implement your logging logic. (View [Overriding logging function](https://github.com/mebjas/CSRF-Protector-PHP/wiki/Overriding-logging-function))
|
||||
<br>**Default value:** `../log/`
|
||||
- `failedAuthAction`: Action code (integer) for action to be taken in case of failed validation. Has two different values for bot `GET` and `POST`. Different action codes are specified as follows, (<br>**Default:** `0` for both `GET` & `POST`):
|
||||
* `0` Send **403, Forbidden** Header
|
||||
* `1` **Strip the POST/GET query** and forward the request! unset($_POST)
|
||||
* `2` **Redirect to custom error page** mentioned in `errorRedirectionPage`
|
||||
* `3` **Show custom error message** to user, mentioned in `customErrorMessage`
|
||||
* `4` Send **500, Internal Server Error** header
|
||||
|
||||
- `errorRedirectionPage`: **Absolute url** of the file to which user should be redirected. <br>**Default: null**
|
||||
- `customErrorMessage`: **Error Message** to be shown to user. Only this text will be shown!<br>**Default: null**
|
||||
- `jsPath`: location of the js file **relative** to `config.php`. <br>**Default:** `../js/csrfprotector.js`
|
||||
- `jsUrl`: **Absolute url** of the js file. (See [Setting up](https://github.com/mebjas/CSRF-Protector-PHP/wiki/Setting-up-CSRF-Protector-PHP-in-your-web-application) for more information)
|
||||
- `tokenLength`: length of csrfp token, Default `10`
|
||||
- `secureCookie`: sets the "secure" HTTPS flag on the cookie. <br>**Default: `false`**
|
||||
- `disabledJavascriptMessage`: messaged to be shown if js is disabled (string)
|
||||
- `verifyGetFor`: regex rules for those urls for which csrfp validation should be enabled for `GET` requests also. (View [verifyGetFor rules](https://github.com/mebjas/CSRF-Protector-PHP/wiki/verifyGetFor-rules) for more information)
|
|
@ -0,0 +1,49 @@
|
|||
<?php
|
||||
/**
|
||||
* Configuration file for CSRF Protector
|
||||
* Necessary configurations are (library would throw exception otherwise)
|
||||
* ---- logDirectory
|
||||
* ---- failedAuthAction
|
||||
* ---- jsPath
|
||||
* ---- jsUrl
|
||||
* ---- tokenLength
|
||||
*/
|
||||
|
||||
function get_trusted_hostname() {
|
||||
$js_path = "/inc/lib/vendor/owasp/csrf-protector-php/js/csrfprotector.js";
|
||||
if ((isset($_SERVER['HTTP_X_FORWARDED_PROTO']) && strtolower($_SERVER['HTTP_X_FORWARDED_PROTO']) == "https") || isset($_SERVER['HTTPS'])) {
|
||||
$is_scheme = "https://";
|
||||
}
|
||||
else {
|
||||
$is_scheme = "http://";
|
||||
}
|
||||
if (isset(explode(':', $_SERVER['HTTP_HOST'])[1])) {
|
||||
$is_port = intval(explode(':', $_SERVER['HTTP_HOST'])[1]);
|
||||
if (filter_var($is_port, FILTER_VALIDATE_INT, array("options" => array("min_range" =>1, "max_range" => 65535))) === false) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
if (!isset($is_port) || $is_port == 0) {
|
||||
$is_port = ($is_scheme == "https://") ? 443 : 80;
|
||||
}
|
||||
return $is_scheme . $GLOBALS['mailcow_hostname'] . ':' . $is_port . $js_path;
|
||||
}
|
||||
|
||||
return array(
|
||||
"CSRFP_TOKEN" => "MAILCOW_CSRF",
|
||||
"logDirectory" => "../log",
|
||||
"failedAuthAction" => array(
|
||||
"GET" => 1,
|
||||
"POST" => 1),
|
||||
"errorRedirectionPage" => "",
|
||||
"customErrorMessage" => "",
|
||||
"jsPath" => "../js/csrfprotector.js",
|
||||
// Fetching IS_HTTPS from sessions handler
|
||||
"jsUrl" => get_trusted_hostname(),
|
||||
"tokenLength" => 10,
|
||||
"secureCookie" => false,
|
||||
"disabledJavascriptMessage" => "This site attempts to protect users against <a href=\"https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29\">
|
||||
Cross-Site Request Forgeries </a> attacks. In order to do so, you must have JavaScript enabled in your web browser otherwise this site will fail to work correctly for you.
|
||||
See details of your web browser for how to enable JavaScript.",
|
||||
"verifyGetFor" => array()
|
||||
);
|
|
@ -0,0 +1,6 @@
|
|||
Placeholder for **CSRF Protector - php library**
|
||||
=====================================================
|
||||
|
||||
**Dependency:** `None`<br>
|
||||
**Configuration-File:** `../config.php`<br>
|
||||
**Configuration-Format:** `PHP ARRAY`<br>
|
|
@ -0,0 +1,536 @@
|
|||
<?php
|
||||
|
||||
if (!defined('__CSRF_PROTECTOR__')) {
|
||||
define('__CSRF_PROTECTOR__', true); // to avoid multiple declaration errors
|
||||
|
||||
// name of HTTP POST variable for authentication
|
||||
define("CSRFP_TOKEN","csrfp_token");
|
||||
|
||||
// We insert token name and list of url patterns for which
|
||||
// GET requests are validated against CSRF as hidden input fields
|
||||
// these are the names of the input fields
|
||||
define("CSRFP_FIELD_TOKEN_NAME", "csrfp_hidden_data_token");
|
||||
define("CSRFP_FIELD_URLS", "csrfp_hidden_data_urls");
|
||||
|
||||
/**
|
||||
* child exception classes
|
||||
*/
|
||||
class configFileNotFoundException extends \exception {};
|
||||
class logDirectoryNotFoundException extends \exception {};
|
||||
class jsFileNotFoundException extends \exception {};
|
||||
class logFileWriteError extends \exception {};
|
||||
class baseJSFileNotFoundExceptio extends \exception {};
|
||||
class incompleteConfigurationException extends \exception {};
|
||||
class alreadyInitializedException extends \exception {};
|
||||
|
||||
class csrfProtector
|
||||
{
|
||||
/*
|
||||
* Variable: $cookieExpiryTime
|
||||
* expiry time for cookie
|
||||
* @var int
|
||||
*/
|
||||
public static $cookieExpiryTime = 1800; //30 minutes
|
||||
|
||||
/*
|
||||
* Variable: $isSameOrigin
|
||||
* flag for cross origin/same origin request
|
||||
* @var bool
|
||||
*/
|
||||
private static $isSameOrigin = true;
|
||||
|
||||
/*
|
||||
* Variable: $isValidHTML
|
||||
* flag to check if output file is a valid HTML or not
|
||||
* @var bool
|
||||
*/
|
||||
private static $isValidHTML = false;
|
||||
|
||||
/*
|
||||
* Variable: $requestType
|
||||
* Varaible to store weather request type is post or get
|
||||
* @var string
|
||||
*/
|
||||
protected static $requestType = "GET";
|
||||
|
||||
/*
|
||||
* Variable: $config
|
||||
* config file for CSRFProtector
|
||||
* @var int Array, length = 6
|
||||
* Property: #1: failedAuthAction (int) => action to be taken in case autherisation fails
|
||||
* Property: #2: logDirectory (string) => directory in which log will be saved
|
||||
* Property: #3: customErrorMessage (string) => custom error message to be sent in case
|
||||
* of failed authentication
|
||||
* Property: #4: jsFile (string) => location of the CSRFProtector js file
|
||||
* Property: #5: tokenLength (int) => default length of hash
|
||||
* Property: #6: disabledJavascriptMessage (string) => error message if client's js is disabled
|
||||
*/
|
||||
public static $config = array();
|
||||
|
||||
/*
|
||||
* Variable: $requiredConfigurations
|
||||
* Contains list of those parameters that are required to be there
|
||||
* in config file for csrfp to work
|
||||
*/
|
||||
public static $requiredConfigurations = array('logDirectory', 'failedAuthAction', 'jsPath', 'jsUrl', 'tokenLength');
|
||||
|
||||
/*
|
||||
* Function: init
|
||||
*
|
||||
* function to initialise the csrfProtector work flow
|
||||
*
|
||||
* Parameters:
|
||||
* $length - length of CSRF_AUTH_TOKEN to be generated
|
||||
* $action - int array, for different actions to be taken in case of failed validation
|
||||
*
|
||||
* Returns:
|
||||
* void
|
||||
*
|
||||
* Throws:
|
||||
* configFileNotFoundException - when configuration file is not found
|
||||
* incompleteConfigurationException - when all required fields in config
|
||||
* file are not available
|
||||
*
|
||||
*/
|
||||
public static function init($length = null, $action = null)
|
||||
{
|
||||
/*
|
||||
* Check if init has already been called.
|
||||
*/
|
||||
if (count(self::$config) > 0) {
|
||||
throw new alreadyInitializedException("OWASP CSRFProtector: library was already initialized.");
|
||||
}
|
||||
|
||||
/*
|
||||
* if mod_csrfp already enabled, no verification, no filtering
|
||||
* Already done by mod_csrfp
|
||||
*/
|
||||
if (getenv('mod_csrfp_enabled'))
|
||||
return;
|
||||
|
||||
//start session in case its not
|
||||
if (session_id() == '')
|
||||
session_start();
|
||||
|
||||
/*
|
||||
* load configuration file and properties
|
||||
* Check locally for a config.php then check for
|
||||
* a config/csrf_config.php file in the root folder
|
||||
* for composer installations
|
||||
*/
|
||||
$standard_config_location = __DIR__ ."/../config.php";
|
||||
$composer_config_location = __DIR__ ."/../../../../../config/csrf_config.php";
|
||||
|
||||
if (file_exists($standard_config_location)) {
|
||||
self::$config = include($standard_config_location);
|
||||
} elseif(file_exists($composer_config_location)) {
|
||||
self::$config = include($composer_config_location);
|
||||
} else {
|
||||
throw new configFileNotFoundException("OWASP CSRFProtector: configuration file not found for CSRFProtector!");
|
||||
}
|
||||
|
||||
//overriding length property if passed in parameters
|
||||
if ($length != null)
|
||||
self::$config['tokenLength'] = intval($length);
|
||||
|
||||
//action that is needed to be taken in case of failed authorisation
|
||||
if ($action != null)
|
||||
self::$config['failedAuthAction'] = $action;
|
||||
|
||||
if (self::$config['CSRFP_TOKEN'] == '')
|
||||
self::$config['CSRFP_TOKEN'] = CSRFP_TOKEN;
|
||||
|
||||
// Validate the config if everythings filled out
|
||||
// TODO: collect all missing values and throw exception together
|
||||
foreach (self::$requiredConfigurations as $value) {
|
||||
if (!isset(self::$config[$value]) || self::$config[$value] == '') {
|
||||
throw new incompleteConfigurationException(
|
||||
sprintf(
|
||||
"OWASP CSRFProtector: Incomplete configuration file, Value: %s missing ",
|
||||
$value
|
||||
)
|
||||
);
|
||||
exit;
|
||||
}
|
||||
}
|
||||
|
||||
// Authorise the incoming request
|
||||
self::authorizePost();
|
||||
|
||||
// Initialize output buffering handler
|
||||
if (!defined('__TESTING_CSRFP__'))
|
||||
ob_start('csrfProtector::ob_handler');
|
||||
|
||||
if (!isset($_COOKIE[self::$config['CSRFP_TOKEN']])
|
||||
|| !isset($_SESSION[self::$config['CSRFP_TOKEN']])
|
||||
|| !is_array($_SESSION[self::$config['CSRFP_TOKEN']])
|
||||
|| !in_array($_COOKIE[self::$config['CSRFP_TOKEN']],
|
||||
$_SESSION[self::$config['CSRFP_TOKEN']]))
|
||||
self::refreshToken();
|
||||
|
||||
// Set protected by CSRF Protector header
|
||||
header('X-CSRF-Protection: OWASP CSRFP 1.0.0');
|
||||
}
|
||||
|
||||
/*
|
||||
* Function: authorizePost
|
||||
* function to authorise incoming post requests
|
||||
*
|
||||
* Parameters:
|
||||
* void
|
||||
*
|
||||
* Returns:
|
||||
* void
|
||||
*
|
||||
* Throws:
|
||||
* logDirectoryNotFoundException - if log directory is not found
|
||||
*/
|
||||
public static function authorizePost()
|
||||
{
|
||||
//#todo this method is valid for same origin request only,
|
||||
//enable it for cross origin also sometime
|
||||
//for cross origin the functionality is different
|
||||
if ($_SERVER['REQUEST_METHOD'] === 'POST') {
|
||||
|
||||
//set request type to POST
|
||||
self::$requestType = "POST";
|
||||
|
||||
//currently for same origin only
|
||||
if (!(isset($_POST[self::$config['CSRFP_TOKEN']])
|
||||
&& isset($_SESSION[self::$config['CSRFP_TOKEN']])
|
||||
&& (self::isValidToken($_POST[self::$config['CSRFP_TOKEN']]))
|
||||
)) {
|
||||
|
||||
//action in case of failed validation
|
||||
self::failedValidationAction();
|
||||
} else {
|
||||
self::refreshToken(); //refresh token for successfull validation
|
||||
}
|
||||
} else if (!static::isURLallowed()) {
|
||||
|
||||
//currently for same origin only
|
||||
if (!(isset($_GET[self::$config['CSRFP_TOKEN']])
|
||||
&& isset($_SESSION[self::$config['CSRFP_TOKEN']])
|
||||
&& (self::isValidToken($_GET[self::$config['CSRFP_TOKEN']]))
|
||||
)) {
|
||||
|
||||
//action in case of failed validation
|
||||
self::failedValidationAction();
|
||||
} else {
|
||||
self::refreshToken(); //refresh token for successfull validation
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
* Function: isValidToken
|
||||
* function to check the validity of token in session array
|
||||
* Function also clears all tokens older than latest one
|
||||
*
|
||||
* Parameters:
|
||||
* $token - the token sent with GET or POST payload
|
||||
*
|
||||
* Returns:
|
||||
* bool - true if its valid else false
|
||||
*/
|
||||
private static function isValidToken($token) {
|
||||
if (!isset($_SESSION[self::$config['CSRFP_TOKEN']])) return false;
|
||||
if (!is_array($_SESSION[self::$config['CSRFP_TOKEN']])) return false;
|
||||
foreach ($_SESSION[self::$config['CSRFP_TOKEN']] as $key => $value) {
|
||||
if ($value == $token) {
|
||||
|
||||
// Clear all older tokens assuming they have been consumed
|
||||
foreach ($_SESSION[self::$config['CSRFP_TOKEN']] as $_key => $_value) {
|
||||
if ($_value == $token) break;
|
||||
array_shift($_SESSION[self::$config['CSRFP_TOKEN']]);
|
||||
}
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
/*
|
||||
* Function: failedValidationAction
|
||||
* function to be called in case of failed validation
|
||||
* performs logging and take appropriate action
|
||||
*
|
||||
* Parameters:
|
||||
* void
|
||||
*
|
||||
* Returns:
|
||||
* void
|
||||
*/
|
||||
private static function failedValidationAction()
|
||||
{
|
||||
if (!file_exists(__DIR__ ."/../" .self::$config['logDirectory']))
|
||||
throw new logDirectoryNotFoundException("OWASP CSRFProtector: Log Directory Not Found!");
|
||||
|
||||
//call the logging function
|
||||
static::logCSRFattack();
|
||||
|
||||
//#todo: ask mentors if $failedAuthAction is better as an int or string
|
||||
//default case is case 0
|
||||
switch (self::$config['failedAuthAction'][self::$requestType]) {
|
||||
case 0:
|
||||
//send 403 header
|
||||
header('HTTP/1.0 403 Forbidden');
|
||||
exit("<h2>403 Access Forbidden by CSRFProtector!</h2>");
|
||||
break;
|
||||
case 1:
|
||||
//unset the query parameters and forward
|
||||
if (self::$requestType === 'GET') {
|
||||
$_GET = array();
|
||||
} else {
|
||||
$_POST = array();
|
||||
}
|
||||
break;
|
||||
case 2:
|
||||
//redirect to custom error page
|
||||
$location = self::$config['errorRedirectionPage'];
|
||||
header("location: $location");
|
||||
case 3:
|
||||
//send custom error message
|
||||
exit(self::$config['customErrorMessage']);
|
||||
break;
|
||||
case 4:
|
||||
//send 500 header -- internal server error
|
||||
header($_SERVER['SERVER_PROTOCOL'] . ' 500 Internal Server Error', true, 500);
|
||||
exit("<h2>500 Internal Server Error!</h2>");
|
||||
break;
|
||||
default:
|
||||
//unset the query parameters and forward
|
||||
if (self::$requestType === 'GET') {
|
||||
$_GET = array();
|
||||
} else {
|
||||
$_POST = array();
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
* Function: refreshToken
|
||||
* Function to set auth cookie
|
||||
*
|
||||
* Parameters:
|
||||
* void
|
||||
*
|
||||
* Returns:
|
||||
* void
|
||||
*/
|
||||
public static function refreshToken()
|
||||
{
|
||||
$token = self::generateAuthToken();
|
||||
|
||||
if (!isset($_SESSION[self::$config['CSRFP_TOKEN']])
|
||||
|| !is_array($_SESSION[self::$config['CSRFP_TOKEN']]))
|
||||
$_SESSION[self::$config['CSRFP_TOKEN']] = array();
|
||||
|
||||
//set token to session for server side validation
|
||||
array_push($_SESSION[self::$config['CSRFP_TOKEN']], $token);
|
||||
|
||||
//set token to cookie for client side processing
|
||||
setcookie(self::$config['CSRFP_TOKEN'],
|
||||
$token,
|
||||
time() + self::$cookieExpiryTime,
|
||||
'',
|
||||
'',
|
||||
(array_key_exists('secureCookie', self::$config) ? (bool)self::$config['secureCookie'] : false));
|
||||
}
|
||||
|
||||
/*
|
||||
* Function: generateAuthToken
|
||||
* function to generate random hash of length as given in parameter
|
||||
* max length = 128
|
||||
*
|
||||
* Parameters:
|
||||
* length to hash required, int
|
||||
*
|
||||
* Returns:
|
||||
* string, token
|
||||
*/
|
||||
public static function generateAuthToken()
|
||||
{
|
||||
// todo - make this a member method / configurable
|
||||
$randLength = 64;
|
||||
|
||||
//if config tokenLength value is 0 or some non int
|
||||
if (intval(self::$config['tokenLength']) == 0) {
|
||||
self::$config['tokenLength'] = 32; //set as default
|
||||
}
|
||||
|
||||
//#todo - if $length > 128 throw exception
|
||||
|
||||
if (function_exists("random_bytes")) {
|
||||
$token = bin2hex(random_bytes($randLength));
|
||||
} elseif (function_exists("openssl_random_pseudo_bytes")) {
|
||||
$token = bin2hex(openssl_random_pseudo_bytes($randLength));
|
||||
} else {
|
||||
$token = '';
|
||||
for ($i = 0; $i < 128; ++$i) {
|
||||
$r = mt_rand (0, 35);
|
||||
if ($r < 26) {
|
||||
$c = chr(ord('a') + $r);
|
||||
} else {
|
||||
$c = chr(ord('0') + $r - 26);
|
||||
}
|
||||
$token .= $c;
|
||||
}
|
||||
}
|
||||
return substr($token, 0, self::$config['tokenLength']);
|
||||
}
|
||||
|
||||
/*
|
||||
* Function: ob_handler
|
||||
* Rewrites <form> on the fly to add CSRF tokens to them. This can also
|
||||
* inject our JavaScript library.
|
||||
*
|
||||
* Parameters:
|
||||
* $buffer - output buffer to which all output are stored
|
||||
* $flag - INT
|
||||
*
|
||||
* Return:
|
||||
* string, complete output buffer
|
||||
*/
|
||||
public static function ob_handler($buffer, $flags)
|
||||
{
|
||||
// Even though the user told us to rewrite, we should do a quick heuristic
|
||||
// to check if the page is *actually* HTML. We don't begin rewriting until
|
||||
// we hit the first <html tag.
|
||||
if (!self::$isValidHTML) {
|
||||
// not HTML until proven otherwise
|
||||
if (stripos($buffer, '<html') !== false) {
|
||||
self::$isValidHTML = true;
|
||||
} else {
|
||||
return $buffer;
|
||||
}
|
||||
}
|
||||
|
||||
// TODO: statically rewrite all forms as well so that if a form is submitted
|
||||
// before the js has worked on, it will still have token to send
|
||||
// @priority: medium @labels: important @assign: mebjas
|
||||
// @deadline: 1 week
|
||||
|
||||
//add a <noscript> message to outgoing HTML output,
|
||||
//informing the user to enable js for CSRFProtector to work
|
||||
//best section to add, after <body> tag
|
||||
$buffer = preg_replace("/<body[^>]*>/", "$0 <noscript>" .self::$config['disabledJavascriptMessage'] .
|
||||
"</noscript>", $buffer);
|
||||
|
||||
$hiddenInput = '<input type="hidden" id="' . CSRFP_FIELD_TOKEN_NAME.'" value="'
|
||||
.self::$config['CSRFP_TOKEN'] .'">' .PHP_EOL;
|
||||
|
||||
$hiddenInput .= '<input type="hidden" id="' .CSRFP_FIELD_URLS .'" value=\''
|
||||
.json_encode(self::$config['verifyGetFor']) .'\'>';
|
||||
|
||||
//implant hidden fields with check url information for reading in javascript
|
||||
$buffer = str_ireplace('</body>', $hiddenInput . '</body>', $buffer);
|
||||
|
||||
//implant the CSRFGuard js file to outgoing script
|
||||
$script = '<script type="text/javascript" src="' . self::$config['jsUrl'] . '"></script>' . PHP_EOL;
|
||||
$buffer = str_ireplace('</body>', $script . '</body>', $buffer, $count);
|
||||
|
||||
if (!$count)
|
||||
$buffer .= $script;
|
||||
|
||||
return $buffer;
|
||||
}
|
||||
|
||||
/*
|
||||
* Function: logCSRFattack
|
||||
* Function to log CSRF Attack
|
||||
*
|
||||
* Parameters:
|
||||
* void
|
||||
*
|
||||
* Retruns:
|
||||
* void
|
||||
*
|
||||
* Throws:
|
||||
* logFileWriteError - if unable to log an attack
|
||||
*/
|
||||
protected static function logCSRFattack()
|
||||
{
|
||||
//if file doesnot exist for, create it
|
||||
$logFile = fopen(__DIR__ ."/../" .self::$config['logDirectory']
|
||||
."/" .date("m-20y") .".log", "a+");
|
||||
|
||||
//throw exception if above fopen fails
|
||||
if (!$logFile)
|
||||
throw new logFileWriteError("OWASP CSRFProtector: Unable to write to the log file");
|
||||
|
||||
//miniature version of the log
|
||||
$log = array();
|
||||
$log['timestamp'] = time();
|
||||
$log['HOST'] = $_SERVER['HTTP_HOST'];
|
||||
$log['REQUEST_URI'] = $_SERVER['REQUEST_URI'];
|
||||
$log['requestType'] = self::$requestType;
|
||||
|
||||
if (self::$requestType === "GET")
|
||||
$log['query'] = $_GET;
|
||||
else
|
||||
$log['query'] = $_POST;
|
||||
|
||||
$log['cookie'] = $_COOKIE;
|
||||
|
||||
//convert log array to JSON format to be logged
|
||||
$log = json_encode($log) .PHP_EOL;
|
||||
|
||||
//append log to the file
|
||||
fwrite($logFile, $log);
|
||||
|
||||
//close the file handler
|
||||
fclose($logFile);
|
||||
}
|
||||
|
||||
/*
|
||||
* Function: getCurrentUrl
|
||||
* Function to return current url of executing page
|
||||
*
|
||||
* Parameters:
|
||||
* void
|
||||
*
|
||||
* Returns:
|
||||
* string - current url
|
||||
*/
|
||||
private static function getCurrentUrl()
|
||||
{
|
||||
$request_scheme = 'https';
|
||||
|
||||
if (isset($_SERVER['REQUEST_SCHEME'])) {
|
||||
$request_scheme = $_SERVER['REQUEST_SCHEME'];
|
||||
} else {
|
||||
if (isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] === 'on') {
|
||||
$request_scheme = 'https';
|
||||
} else {
|
||||
$request_scheme = 'http';
|
||||
}
|
||||
}
|
||||
|
||||
return $request_scheme . '://' . $_SERVER['HTTP_HOST'] . $_SERVER['PHP_SELF'];
|
||||
}
|
||||
|
||||
/*
|
||||
* Function: isURLallowed
|
||||
* Function to check if a url mataches for any urls
|
||||
* Listed in config file
|
||||
*
|
||||
* Parameters:
|
||||
* void
|
||||
*
|
||||
* Returns:
|
||||
* boolean - true is url need no validation, false if validation needed
|
||||
*/
|
||||
public static function isURLallowed() {
|
||||
foreach (self::$config['verifyGetFor'] as $key => $value) {
|
||||
$value = str_replace(array('/','*'), array('\/','(.*)'), $value);
|
||||
preg_match('/' .$value .'/', self::getCurrentUrl(), $output);
|
||||
if (count($output) > 0)
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
};
|
||||
}
|
|
@ -0,0 +1,7 @@
|
|||
<?php
|
||||
/**
|
||||
* OWASP CSRF Protector Project
|
||||
* Code to redirect the user to previosus directory
|
||||
* In case a user try to access this directory directly
|
||||
*/
|
||||
header('location: ../index.php');
|
|
@ -0,0 +1,7 @@
|
|||
<?php
|
||||
/**
|
||||
* OWASP CSRF Protector Project
|
||||
* Code to redirect the user to previosus directory
|
||||
* In case a user try to access this directory directly
|
||||
*/
|
||||
header('location: ../index.php');
|
|
@ -0,0 +1,13 @@
|
|||
Copyright 2014 OWASP Foundation
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
|
@ -0,0 +1 @@
|
|||
deny from all
|
|
@ -0,0 +1,7 @@
|
|||
<?php
|
||||
/**
|
||||
* OWASP CSRF Protector Project
|
||||
* Code to redirect the user to previosus directory
|
||||
* In case a user try to access this directory directly
|
||||
*/
|
||||
header('location: ../index.php');
|
|
@ -0,0 +1,15 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<phpunit verbose="true">
|
||||
<php>
|
||||
<ini name="memory_limit" value="1024M" />
|
||||
<ini name="error_reporting" value="E_ALL"/>
|
||||
</php>
|
||||
<testsuite name="OWASP CSRF Protector php">
|
||||
<directory>./test/csrfprotector_test.php</directory>
|
||||
</testsuite>
|
||||
<filter>
|
||||
<whitelist processUncoveredFilesFromWhitelist="true">
|
||||
<file>libs/csrf/csrfprotector.php</file>
|
||||
</whitelist>
|
||||
</filter>
|
||||
</phpunit>
|
|
@ -0,0 +1,65 @@
|
|||
CSRF Protector
|
||||
==========================
|
||||
[![Todo Status](http://todofy.org/b/mebjas/CSRF-Protector-PHP)](http://todofy.org/r/mebjas/CSRF-Protector-PHP) [![Build Status](https://travis-ci.org/mebjas/CSRF-Protector-PHP.svg?branch=master)](https://travis-ci.org/mebjas/CSRF-Protector-PHP) [![codecov](https://codecov.io/gh/mebjas/CSRF-Protector-PHP/branch/master/graph/badge.svg)](https://codecov.io/gh/mebjas/CSRF-Protector-PHP)
|
||||
<br>CSRF protector php, a standalone php library for csrf mitigation in web applications. Easy to integrate in any php web app.
|
||||
|
||||
Add to your project using packagist
|
||||
==========
|
||||
Add a `composer.json` file to your project directory
|
||||
```json
|
||||
{
|
||||
"require": {
|
||||
"owasp/csrf-protector-php": "dev-master"
|
||||
}
|
||||
}
|
||||
```
|
||||
Then open terminal (or command prompt), move to project directory and run
|
||||
```shell
|
||||
composer install
|
||||
```
|
||||
OR
|
||||
```
|
||||
php composer.phar install
|
||||
```
|
||||
This will add CSRFP (library will be downloaded at ./vendor/owasp/csrf-protector-php) to your project directory. View [packagist.org](https://packagist.org/) for more help with composer!
|
||||
|
||||
Configuration
|
||||
==========
|
||||
For composer installations: Copy the config.sample.php file into your root folder at config/csrf_config.php
|
||||
For non-composer installations: Copy the libs/csrf/config.sample.php file into libs/csrc/config.php
|
||||
Edit config accordingly. See Detailed Information link below.
|
||||
|
||||
How to use
|
||||
==========
|
||||
```php
|
||||
<?php
|
||||
include_once __DIR__ .'/vendor/owasp/csrf-protector-php/libs/csrf/csrfprotector.php';
|
||||
|
||||
//Initialise CSRFGuard library
|
||||
csrfProtector::init();
|
||||
```
|
||||
simply include the library and call the `init()` function!
|
||||
|
||||
### Detailed information @[Project wiki on github](https://github.com/mebjas/CSRF-Protector-PHP/wiki)
|
||||
|
||||
### More information @[OWASP wiki](https://www.owasp.org/index.php/CSRFProtector_Project)
|
||||
|
||||
### Contribute
|
||||
|
||||
* Fork the repo
|
||||
* Create your branch
|
||||
* Commit your changes
|
||||
* Create a pull request
|
||||
|
||||
### Note
|
||||
This version (`master`) requires the clients to have Javascript enabled. However if your application can work without javascript & you require a nojs version of this library, check our [nojs version](https://github.com/mebjas/CSRF-Protector-PHP/tree/nojs-support)
|
||||
|
||||
## Discussion
|
||||
Join Discussions on the [mailing list](https://lists.owasp.org/mailman/listinfo/owasp-csrfprotector)
|
||||
|
||||
For any other queries contact me at: **minhaz@owasp.org**
|
||||
|
||||
### FAQ:
|
||||
1. What happens if token expires? - https://github.com/mebjas/CSRF-Protector-PHP/wiki/what-if-token-expires
|
||||
2. Secure flag in cookie? - https://github.com/mebjas/CSRF-Protector-PHP/issues/54
|
||||
3. NoJS support? - https://github.com/mebjas/CSRF-Protector-PHP/tree/nojs-support
|
|
@ -0,0 +1,27 @@
|
|||
<?php
|
||||
/**
|
||||
* Configuration file for CSRF Protector
|
||||
* Necessary configurations are (library would throw exception otherwise)
|
||||
* ---- logDirectory
|
||||
* ---- failedAuthAction
|
||||
* ---- jsPath
|
||||
* ---- jsUrl
|
||||
* ---- tokenLength
|
||||
*/
|
||||
return array(
|
||||
"CSRFP_TOKEN" => "csrfp_token",
|
||||
"logDirectory" => "../log",
|
||||
"failedAuthAction" => array(
|
||||
"GET" => 0,
|
||||
"POST" => 0),
|
||||
"errorRedirectionPage" => "",
|
||||
"customErrorMessage" => "",
|
||||
"jsPath" => "../js/csrfprotector.js",
|
||||
"jsUrl" => "http://localhost/csrfp/js/csrfprotector.js",
|
||||
"tokenLength" => 10,
|
||||
"secureCookie" => false,
|
||||
"disabledJavascriptMessage" => "This site attempts to protect users against <a href=\"https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29\">
|
||||
Cross-Site Request Forgeries </a> attacks. In order to do so, you must have JavaScript enabled in your web browser otherwise this site will fail to work correctly for you.
|
||||
See details of your web browser for how to enable JavaScript.",
|
||||
"verifyGetFor" => array()
|
||||
);
|
|
@ -0,0 +1,534 @@
|
|||
<?php
|
||||
date_default_timezone_set('UTC');
|
||||
require_once __DIR__ .'/../libs/csrf/csrfprotector.php';
|
||||
|
||||
if (intval(phpversion('tidy')) >= 7 && !class_exists('\PHPUnit_Framework_TestCase', true)) {
|
||||
class_alias('\PHPUnit\Framework\TestCase', '\PHPUnit_Framework_TestCase');
|
||||
}
|
||||
|
||||
/**
|
||||
* Wrapper class for testing purpose
|
||||
*/
|
||||
class csrfp_wrapper extends csrfprotector
|
||||
{
|
||||
/**
|
||||
* Function to provide wrapper methode to set the protected var, requestType
|
||||
*/
|
||||
public static function changeRequestType($type)
|
||||
{
|
||||
self::$requestType = $type;
|
||||
}
|
||||
|
||||
/**
|
||||
* Function to check for a string value anywhere within HTTP response headers
|
||||
* Returns true on first match of $needle in header names or values
|
||||
*/
|
||||
public static function checkHeader($needle)
|
||||
{
|
||||
$haystack = xdebug_get_headers();
|
||||
foreach ($haystack as $key => $value) {
|
||||
if (strpos($value, $needle) !== false)
|
||||
return true;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
/**
|
||||
* Function to return the string value of the last response header
|
||||
* identified by name $needle
|
||||
*/
|
||||
public static function getHeaderValue($needle)
|
||||
{
|
||||
$haystack = xdebug_get_headers();
|
||||
foreach ($haystack as $key => $value) {
|
||||
if (strpos($value, $needle) === 0) {
|
||||
// Deliberately overwrite to accept the last rather than first match
|
||||
// as xdebug_get_headers() will accumulate all set headers
|
||||
list(,$hvalue) = explode(':', $value, 2);
|
||||
}
|
||||
}
|
||||
return $hvalue;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* helper methods
|
||||
*/
|
||||
class Helper {
|
||||
/**
|
||||
* Function to recusively delete a dir
|
||||
*/
|
||||
public static function delTree($dir) {
|
||||
$files = array_diff(scandir($dir), array('.','..'));
|
||||
foreach ($files as $file) {
|
||||
(is_dir("$dir/$file")) ? delTree("$dir/$file") : unlink("$dir/$file");
|
||||
}
|
||||
return rmdir($dir);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* main test class
|
||||
*/
|
||||
class csrfp_test extends PHPUnit_Framework_TestCase
|
||||
{
|
||||
/**
|
||||
* @var to hold current configurations
|
||||
*/
|
||||
protected $config = array();
|
||||
|
||||
/**
|
||||
* @var log directory for testing
|
||||
*/
|
||||
private $logDir;
|
||||
|
||||
/**
|
||||
* Function to be run before every test*() functions.
|
||||
*/
|
||||
public function setUp()
|
||||
{
|
||||
$this->logDir = __DIR__ .'/logs';
|
||||
|
||||
csrfprotector::$config['jsPath'] = '../js/csrfprotector.js';
|
||||
csrfprotector::$config['CSRFP_TOKEN'] = 'csrfp_token';
|
||||
csrfprotector::$config['secureCookie'] = false;
|
||||
csrfprotector::$config['logDirectory'] = '../test/logs';
|
||||
|
||||
$_SERVER['REQUEST_URI'] = 'temp'; // For logging
|
||||
$_SERVER['REQUEST_SCHEME'] = 'http'; // For authorizePost
|
||||
$_SERVER['HTTP_HOST'] = 'test'; // For isUrlAllowed
|
||||
$_SERVER['PHP_SELF'] = '/index.php'; // For authorizePost
|
||||
$_POST[csrfprotector::$config['CSRFP_TOKEN']]
|
||||
= $_GET[csrfprotector::$config['CSRFP_TOKEN']] = '123';
|
||||
|
||||
//token mismatch - leading to failed validation
|
||||
$_SESSION[csrfprotector::$config['CSRFP_TOKEN']] = array('abc');
|
||||
$_SERVER['SERVER_PROTOCOL'] = 'HTTP/1.1';
|
||||
$_SERVER['HTTPS'] = null;
|
||||
|
||||
$this->config = include(__DIR__ .'/config.test.php');
|
||||
|
||||
// Create an instance of config file -- for testing
|
||||
$data = file_get_contents(__DIR__ .'/config.test.php');
|
||||
file_put_contents(__DIR__ .'/../libs/config.php', $data);
|
||||
|
||||
if (!defined('__TESTING_CSRFP__')) define('__TESTING_CSRFP__', true);
|
||||
}
|
||||
|
||||
/**
|
||||
* tearDown()
|
||||
*/
|
||||
public function tearDown()
|
||||
{
|
||||
unlink(__DIR__ .'/../libs/config.php');
|
||||
if (is_dir(__DIR__ .'/logs'))
|
||||
Helper::delTree(__DIR__ .'/logs');
|
||||
}
|
||||
|
||||
/**
|
||||
* Function to check refreshToken() functionality
|
||||
*/
|
||||
public function testRefreshToken()
|
||||
{
|
||||
$val = $_COOKIE[csrfprotector::$config['CSRFP_TOKEN']] = '123abcd';
|
||||
$_SESSION[csrfprotector::$config['CSRFP_TOKEN']] = array('123abcd');
|
||||
csrfProtector::$config['tokenLength'] = 20;
|
||||
csrfProtector::refreshToken();
|
||||
|
||||
$this->assertTrue(strcmp($val, $_SESSION[csrfprotector::$config['CSRFP_TOKEN']][1]) != 0);
|
||||
|
||||
$this->assertTrue(csrfP_wrapper::checkHeader('Set-Cookie'));
|
||||
$this->assertTrue(csrfP_wrapper::checkHeader('csrfp_token'));
|
||||
$this->assertTrue(csrfp_wrapper::checkHeader($_SESSION[csrfprotector::$config['CSRFP_TOKEN']][1]));
|
||||
}
|
||||
|
||||
/**
|
||||
* test secure flag is set in the token cookie when requested
|
||||
*/
|
||||
public function testSecureCookie()
|
||||
{
|
||||
$_SERVER['REQUEST_METHOD'] = 'POST';
|
||||
$_SESSION[csrfprotector::$config['CSRFP_TOKEN']] = array('123abcd');
|
||||
|
||||
csrfprotector::$config['secureCookie'] = false;
|
||||
csrfprotector::refreshToken();
|
||||
$this->assertNotRegExp('/; secure/', csrfp_wrapper::getHeaderValue('Set-Cookie'));
|
||||
|
||||
csrfprotector::$config['secureCookie'] = true;
|
||||
csrfprotector::refreshToken();
|
||||
$this->assertRegExp('/; secure/', csrfp_wrapper::getHeaderValue('Set-Cookie'));
|
||||
}
|
||||
|
||||
/**
|
||||
* test authorise post -> log directory exception
|
||||
*/
|
||||
public function testAuthorisePost_logdirException()
|
||||
{
|
||||
$_SERVER['REQUEST_METHOD'] = 'POST';
|
||||
csrfprotector::$config['logDirectory'] = 'unknown_location';
|
||||
|
||||
try {
|
||||
csrfprotector::authorizePost();
|
||||
} catch (logDirectoryNotFoundException $ex) {
|
||||
$this->assertTrue(true);
|
||||
return;;
|
||||
}
|
||||
$this->fail('logDirectoryNotFoundException has not been raised.');
|
||||
}
|
||||
|
||||
/**
|
||||
* test authorise post -> action = 403, forbidden
|
||||
*/
|
||||
public function testAuthorisePost_failedAction_1()
|
||||
{
|
||||
$_SERVER['REQUEST_METHOD'] = 'POST';
|
||||
csrfprotector::$config['verifyGetFor'] = array('http://test/index*');
|
||||
csrfprotector::$config['logDirectory'] = '../log';
|
||||
csrfprotector::$config['failedAuthAction']['POST'] = 0;
|
||||
csrfprotector::$config['failedAuthAction']['GET'] = 0;
|
||||
|
||||
//csrfprotector::authorizePost();
|
||||
$this->markTestSkipped('Cannot add tests as code exit here');
|
||||
|
||||
$_SERVER['REQUEST_METHOD'] = 'GET';
|
||||
csrfp_wrapper::changeRequestType('GET');
|
||||
//csrfprotector::authorizePost();
|
||||
|
||||
$this->markTestSkipped('Cannot add tests as code exit here');
|
||||
}
|
||||
|
||||
/**
|
||||
* test authorise post -> strip $_GET, $_POST
|
||||
*/
|
||||
public function testAuthorisePost_failedAction_2()
|
||||
{
|
||||
$_SERVER['REQUEST_METHOD'] = 'POST';
|
||||
|
||||
csrfprotector::$config['logDirectory'] = '../log';
|
||||
csrfprotector::$config['verifyGetFor'] = array('http://test/index*');
|
||||
csrfprotector::$config['failedAuthAction']['POST'] = 1;
|
||||
csrfprotector::$config['failedAuthAction']['GET'] = 1;
|
||||
|
||||
$_POST = array('param1' => 1, 'param2' => 2);
|
||||
csrfprotector::authorizePost();
|
||||
$this->assertEmpty($_POST);
|
||||
|
||||
$_SERVER['REQUEST_METHOD'] = 'GET';
|
||||
csrfp_wrapper::changeRequestType('GET');
|
||||
$_GET = array('param1' => 1, 'param2' => 2);
|
||||
|
||||
csrfprotector::authorizePost();
|
||||
$this->assertEmpty($_GET);
|
||||
}
|
||||
|
||||
/**
|
||||
* test authorise post -> redirect
|
||||
*/
|
||||
public function testAuthorisePost_failedAction_3()
|
||||
{
|
||||
$_SERVER['REQUEST_METHOD'] = 'POST';
|
||||
|
||||
csrfprotector::$config['logDirectory'] = '../log';
|
||||
csrfprotector::$config['verifyGetFor'] = array('http://test/index*');
|
||||
csrfprotector::$config['errorRedirectionPage'] = 'http://test';
|
||||
csrfprotector::$config['failedAuthAction']['POST'] = 2;
|
||||
csrfprotector::$config['failedAuthAction']['GET'] = 2;
|
||||
|
||||
//csrfprotector::authorizePost();
|
||||
$this->markTestSkipped('Cannot add tests as code exit here');
|
||||
|
||||
$_SERVER['REQUEST_METHOD'] = 'GET';
|
||||
csrfp_wrapper::changeRequestType('GET');
|
||||
//csrfprotector::authorizePost();
|
||||
$this->markTestSkipped('Cannot add tests as code exit here');
|
||||
}
|
||||
|
||||
/**
|
||||
* test authorise post -> error message & exit
|
||||
*/
|
||||
public function testAuthorisePost_failedAction_4()
|
||||
{
|
||||
$_SERVER['REQUEST_METHOD'] = 'POST';
|
||||
|
||||
csrfprotector::$config['logDirectory'] = '../log';
|
||||
csrfprotector::$config['verifyGetFor'] = array('http://test/index*');
|
||||
csrfprotector::$config['customErrorMessage'] = 'custom error message';
|
||||
csrfprotector::$config['failedAuthAction']['POST'] = 3;
|
||||
csrfprotector::$config['failedAuthAction']['POST'] = 3;
|
||||
|
||||
//csrfprotector::authorizePost();
|
||||
$this->markTestSkipped('Cannot add tests as code exit here');
|
||||
|
||||
$_SERVER['REQUEST_METHOD'] = 'GET';
|
||||
csrfp_wrapper::changeRequestType('GET');
|
||||
//csrfprotector::authorizePost();
|
||||
$this->markTestSkipped('Cannot add tests as code exit here');
|
||||
}
|
||||
|
||||
/**
|
||||
* test authorise post -> 500 internal server error
|
||||
*/
|
||||
public function testAuthorisePost_failedAction_5()
|
||||
{
|
||||
$_SERVER['REQUEST_METHOD'] = 'POST';
|
||||
|
||||
csrfprotector::$config['logDirectory'] = '../log';
|
||||
csrfprotector::$config['verifyGetFor'] = array('http://test/index*');
|
||||
csrfprotector::$config['failedAuthAction']['POST'] = 4;
|
||||
csrfprotector::$config['failedAuthAction']['GET'] = 4;
|
||||
|
||||
//csrfprotector::authorizePost();
|
||||
//$this->markTestSkipped('Cannot add tests as code exit here');
|
||||
|
||||
$_SERVER['REQUEST_METHOD'] = 'GET';
|
||||
csrfp_wrapper::changeRequestType('GET');
|
||||
//csrfprotector::authorizePost();
|
||||
//csrfp_wrapper::checkHeader('500');
|
||||
//$this->markTestSkipped('Cannot add tests as code exit here');
|
||||
}
|
||||
|
||||
/**
|
||||
* test authorise post -> default action: strip $_GET, $_POST
|
||||
*/
|
||||
public function testAuthorisePost_failedAction_6()
|
||||
{
|
||||
$_SERVER['REQUEST_METHOD'] = 'POST';
|
||||
|
||||
csrfprotector::$config['logDirectory'] = '../log';
|
||||
csrfprotector::$config['verifyGetFor'] = array('http://test/index*');
|
||||
csrfprotector::$config['failedAuthAction']['POST'] = 10;
|
||||
csrfprotector::$config['failedAuthAction']['GET'] = 10;
|
||||
|
||||
$_POST = array('param1' => 1, 'param2' => 2);
|
||||
csrfprotector::authorizePost();
|
||||
$this->assertEmpty($_POST);
|
||||
|
||||
$_SERVER['REQUEST_METHOD'] = 'GET';
|
||||
csrfp_wrapper::changeRequestType('GET');
|
||||
$_GET = array('param1' => 1, 'param2' => 2);
|
||||
|
||||
csrfprotector::authorizePost();
|
||||
$this->assertEmpty($_GET);
|
||||
}
|
||||
|
||||
/**
|
||||
* test authorise success
|
||||
*/
|
||||
public function testAuthorisePost_success()
|
||||
{
|
||||
|
||||
$_SERVER['REQUEST_METHOD'] = 'POST';
|
||||
$_POST[csrfprotector::$config['CSRFP_TOKEN']]
|
||||
= $_GET[csrfprotector::$config['CSRFP_TOKEN']]
|
||||
= $_SESSION[csrfprotector::$config['CSRFP_TOKEN']][0];
|
||||
$temp = $_SESSION[csrfprotector::$config['CSRFP_TOKEN']];
|
||||
|
||||
csrfprotector::authorizePost(); //will create new session and cookies
|
||||
$this->assertFalse($temp == $_SESSION[csrfprotector::$config['CSRFP_TOKEN']][0]);
|
||||
$this->assertTrue(csrfp_wrapper::checkHeader('Set-Cookie'));
|
||||
$this->assertTrue(csrfp_wrapper::checkHeader('csrfp_token'));
|
||||
// $this->assertTrue(csrfp_wrapper::checkHeader($_SESSION[csrfprotector::$config['CSRFP_TOKEN']][0])); // Combine these 3 later
|
||||
|
||||
// For get method
|
||||
$_SERVER['REQUEST_METHOD'] = 'GET';
|
||||
csrfp_wrapper::changeRequestType('GET');
|
||||
$_POST[csrfprotector::$config['CSRFP_TOKEN']]
|
||||
= $_GET[csrfprotector::$config['CSRFP_TOKEN']]
|
||||
= $_SESSION[csrfprotector::$config['CSRFP_TOKEN']][0];
|
||||
$temp = $_SESSION[csrfprotector::$config['CSRFP_TOKEN']];
|
||||
|
||||
csrfprotector::authorizePost(); //will create new session and cookies
|
||||
$this->assertFalse($temp == $_SESSION[csrfprotector::$config['CSRFP_TOKEN']]);
|
||||
$this->assertTrue(csrfp_wrapper::checkHeader('Set-Cookie'));
|
||||
$this->assertTrue(csrfp_wrapper::checkHeader('csrfp_token'));
|
||||
// $this->assertTrue(csrfp_wrapper::checkHeader($_SESSION[csrfprotector::$config['CSRFP_TOKEN']][0])); // Combine these 3 later
|
||||
}
|
||||
|
||||
/**
|
||||
* test for generateAuthToken()
|
||||
*/
|
||||
public function testGenerateAuthToken()
|
||||
{
|
||||
csrfprotector::$config['tokenLength'] = 20;
|
||||
$token1 = csrfprotector::generateAuthToken();
|
||||
$token2 = csrfprotector::generateAuthToken();
|
||||
|
||||
$this->assertFalse($token1 == $token2);
|
||||
$this->assertEquals(strlen($token1), 20);
|
||||
$this->assertRegExp('/^[a-z0-9]{20}$/', $token1);
|
||||
|
||||
csrfprotector::$config['tokenLength'] = 128;
|
||||
$token = csrfprotector::generateAuthToken();
|
||||
$this->assertEquals(strlen($token), 128);
|
||||
$this->assertRegExp('/^[a-z0-9]{128}$/', $token);
|
||||
}
|
||||
|
||||
/**
|
||||
* test ob_handler_function
|
||||
*/
|
||||
public function testob_handler()
|
||||
{
|
||||
csrfprotector::$config['disabledJavascriptMessage'] = 'test message';
|
||||
csrfprotector::$config['jsUrl'] = 'http://localhost/test/csrf/js/csrfprotector.js';
|
||||
|
||||
$testHTML = '<html>';
|
||||
$testHTML .= '<head><title>1</title>';
|
||||
$testHTML .= '<body onload="test()">';
|
||||
$testHTML .= '-- some static content --';
|
||||
$testHTML .= '-- some static content --';
|
||||
$testHTML .= '</body>';
|
||||
$testHTML .= '</head></html>';
|
||||
|
||||
$modifiedHTML = csrfprotector::ob_handler($testHTML, 0);
|
||||
$inpLength = strlen($testHTML);
|
||||
$outLength = strlen($modifiedHTML);
|
||||
|
||||
//Check if file has been modified
|
||||
$this->assertFalse($outLength == $inpLength);
|
||||
$this->assertTrue(strpos($modifiedHTML, '<noscript>') !== false);
|
||||
$this->assertTrue(strpos($modifiedHTML, '<script') !== false);
|
||||
|
||||
}
|
||||
|
||||
/**
|
||||
* test ob_handler_function for output filter
|
||||
*/
|
||||
public function testob_handler_positioning()
|
||||
{
|
||||
csrfprotector::$config['disabledJavascriptMessage'] = 'test message';
|
||||
csrfprotector::$config['jsUrl'] = 'http://localhost/test/csrf/js/csrfprotector.js';
|
||||
|
||||
$testHTML = '<html>';
|
||||
$testHTML .= '<head><title>1</title>';
|
||||
$testHTML .= '<body onload="test()">';
|
||||
$testHTML .= '-- some static content --';
|
||||
$testHTML .= '-- some static content --';
|
||||
$testHTML .= '</body>';
|
||||
$testHTML .= '</head></html>';
|
||||
|
||||
$modifiedHTML = csrfprotector::ob_handler($testHTML, 0);
|
||||
|
||||
$this->assertEquals(strpos($modifiedHTML, '<body') + 23, strpos($modifiedHTML, '<noscript'));
|
||||
// Check if content before </body> is </script> #todo
|
||||
//$this->markTestSkipped('todo, add appropriate test here');
|
||||
}
|
||||
|
||||
/**
|
||||
* testing exception in logging function
|
||||
*/
|
||||
public function testgetCurrentUrl()
|
||||
{
|
||||
$stub = new ReflectionClass('csrfprotector');
|
||||
$method = $stub->getMethod('getCurrentUrl');
|
||||
$method->setAccessible(true);
|
||||
$this->assertEquals($method->invoke(null, array()), "http://test/index.php");
|
||||
|
||||
$tmp_request_scheme = $_SERVER['REQUEST_SCHEME'];
|
||||
unset($_SERVER['REQUEST_SCHEME']);
|
||||
|
||||
// server-https is not set
|
||||
$this->assertEquals($method->invoke(null, array()), "http://test/index.php");
|
||||
|
||||
$_SERVER['HTTPS'] = 'on';
|
||||
$this->assertEquals($method->invoke(null, array()), "https://test/index.php");
|
||||
unset($_SERVER['HTTPS']);
|
||||
|
||||
$_SERVER['REQUEST_SCHEME'] = "https";
|
||||
$this->assertEquals($method->invoke(null, array()), "https://test/index.php");
|
||||
|
||||
$_SERVER['REQUEST_SCHEME'] = $tmp_request_scheme;
|
||||
}
|
||||
|
||||
/**
|
||||
* testing exception in logging function
|
||||
*/
|
||||
public function testLoggingException()
|
||||
{
|
||||
$stub = new ReflectionClass('csrfprotector');
|
||||
$method = $stub->getMethod('logCSRFattack');
|
||||
$method->setAccessible(true);
|
||||
|
||||
try {
|
||||
$method->invoke(null, array());
|
||||
$this->fail("logFileWriteError was not caught");
|
||||
} catch (Exception $ex) {
|
||||
// pass
|
||||
$this->assertTrue(true);
|
||||
}
|
||||
|
||||
if (!is_dir($this->logDir))
|
||||
mkdir($this->logDir);
|
||||
$method->invoke(null, array());
|
||||
$this->assertTrue(file_exists($this->logDir ."/" .date("m-20y") .".log"));
|
||||
}
|
||||
|
||||
/**
|
||||
* Tests isUrlAllowed() function for various urls and configuration
|
||||
*/
|
||||
public function testisURLallowed()
|
||||
{
|
||||
csrfprotector::$config['verifyGetFor'] = array('http://test/delete*', 'https://test/*');
|
||||
|
||||
$_SERVER['PHP_SELF'] = '/nodelete.php';
|
||||
$this->assertTrue(csrfprotector::isURLallowed());
|
||||
|
||||
$_SERVER['PHP_SELF'] = '/index.php';
|
||||
$this->assertTrue(csrfprotector::isURLallowed('http://test/index.php'));
|
||||
|
||||
$_SERVER['PHP_SELF'] = '/delete.php';
|
||||
$this->assertFalse(csrfprotector::isURLallowed('http://test/delete.php'));
|
||||
|
||||
$_SERVER['PHP_SELF'] = '/delete_user.php';
|
||||
$this->assertFalse(csrfprotector::isURLallowed('http://test/delete_users.php'));
|
||||
|
||||
$_SERVER['REQUEST_SCHEME'] = 'https';
|
||||
$_SERVER['PHP_SELF'] = '/index.php';
|
||||
$this->assertFalse(csrfprotector::isURLallowed('https://test/index.php'));
|
||||
|
||||
$_SERVER['PHP_SELF'] = '/delete_user.php';
|
||||
$this->assertFalse(csrfprotector::isURLallowed('https://test/delete_users.php'));
|
||||
}
|
||||
|
||||
/**
|
||||
* Test for exception thrown when env variable is set by mod_csrfprotector
|
||||
*/
|
||||
public function testModCSRFPEnabledException()
|
||||
{
|
||||
putenv('mod_csrfp_enabled=true');
|
||||
$temp = $_COOKIE[csrfprotector::$config['CSRFP_TOKEN']] = 'abc';
|
||||
$_SESSION[csrfprotector::$config['CSRFP_TOKEN']] = array('abc');
|
||||
|
||||
csrfProtector::$config = array();
|
||||
csrfProtector::init();
|
||||
|
||||
// Assuming no config was added
|
||||
$this->assertTrue(count(csrfProtector::$config) == 0);
|
||||
|
||||
// unset the env variable
|
||||
putenv('mod_csrfp_enabled');
|
||||
}
|
||||
|
||||
/**
|
||||
* Test for exception thrown when init() method is called multiple times
|
||||
*/
|
||||
public function testMultipleInitializeException()
|
||||
{
|
||||
csrfProtector::$config = array();
|
||||
$this->assertTrue(count(csrfProtector::$config) == 0);
|
||||
|
||||
$_SERVER['REQUEST_METHOD'] = 'GET';
|
||||
csrfProtector::init();
|
||||
|
||||
$this->assertTrue(count(csrfProtector::$config) == 11);
|
||||
try {
|
||||
csrfProtector::init();
|
||||
$this->fail("alreadyInitializedException not raised");
|
||||
} catch (alreadyInitializedException $ex) {
|
||||
// pass
|
||||
$this->assertTrue(true);
|
||||
} catch (Exception $ex) {
|
||||
$this->fail("exception other than alreadyInitializedException failed");
|
||||
}
|
||||
}
|
||||
}
|
|
@ -1,20 +1,5 @@
|
|||
<?php
|
||||
//ini_set("session.cookie_secure", 1);
|
||||
//ini_set("session.cookie_httponly", 1);
|
||||
session_start();
|
||||
if (isset($_POST["logout"])) {
|
||||
if (isset($_SESSION["dual-login"])) {
|
||||
$_SESSION["mailcow_cc_username"] = $_SESSION["dual-login"]["username"];
|
||||
$_SESSION["mailcow_cc_role"] = $_SESSION["dual-login"]["role"];
|
||||
unset($_SESSION["dual-login"]);
|
||||
}
|
||||
else {
|
||||
session_unset();
|
||||
session_destroy();
|
||||
session_write_close();
|
||||
setcookie(session_name(),'',0,'/');
|
||||
}
|
||||
}
|
||||
require_once 'inc/sessions.inc.php';
|
||||
|
||||
require_once 'inc/vars.inc.php';
|
||||
if (file_exists('./inc/vars.local.inc.php')) {
|
||||
|
@ -24,11 +9,25 @@ if (file_exists('./inc/vars.local.inc.php')) {
|
|||
// Yubi OTP API
|
||||
require_once 'inc/lib/Yubico.php';
|
||||
|
||||
// U2F API + T/HOTP API
|
||||
// Autoload composer
|
||||
require_once 'inc/lib/vendor/autoload.php';
|
||||
$u2f = new u2flib_server\U2F('https://' . $_SERVER['SERVER_NAME']);
|
||||
|
||||
// U2F API + T/HOTP API
|
||||
$u2f = new u2flib_server\U2F('https://' . $_SERVER['HTTP_HOST']);
|
||||
$tfa = new RobThree\Auth\TwoFactorAuth('mailcow UI');
|
||||
|
||||
// OWASP CSRF Protector
|
||||
$csrfProtector = new csrfProtector;
|
||||
class mailcowCsrfProtector extends csrfprotector {
|
||||
public static function logCSRFattack() {
|
||||
$_SESSION['return'] = array(
|
||||
'type' => 'warning',
|
||||
'msg' => 'CSRF violation, please try again.'
|
||||
);
|
||||
}
|
||||
}
|
||||
mailcowCsrfProtector::init();
|
||||
|
||||
// Redis
|
||||
$redis = new Redis();
|
||||
$redis->connect('redis-mailcow', 6379);
|
||||
|
|
|
@ -0,0 +1,58 @@
|
|||
<?php
|
||||
// Start session
|
||||
ini_set("session.cookie_httponly", 1);
|
||||
if (isset($_SERVER['HTTP_X_FORWARDED_PROTO']) &&
|
||||
strtolower($_SERVER['HTTP_X_FORWARDED_PROTO']) == "https") {
|
||||
ini_set("session.cookie_secure", 1);
|
||||
$IS_HTTPS = true;
|
||||
}
|
||||
elseif (isset($_SERVER['HTTPS'])) {
|
||||
ini_set("session.cookie_secure", 1);
|
||||
$IS_HTTPS = true;
|
||||
}
|
||||
else {
|
||||
$IS_HTTPS = false;
|
||||
}
|
||||
session_set_cookie_params($GLOBALS['SESSION_LIFETIME'], '/', $_SERVER['SERVER_NAME'], $IS_HTTPS, true);
|
||||
session_start();
|
||||
|
||||
// Handle logouts
|
||||
if (isset($_POST["logout"])) {
|
||||
if (isset($_SESSION["dual-login"])) {
|
||||
$_SESSION["mailcow_cc_username"] = $_SESSION["dual-login"]["username"];
|
||||
$_SESSION["mailcow_cc_role"] = $_SESSION["dual-login"]["role"];
|
||||
unset($_SESSION["dual-login"]);
|
||||
}
|
||||
else {
|
||||
session_regenerate_id(true);
|
||||
session_unset();
|
||||
session_destroy();
|
||||
session_write_close();
|
||||
header("Location: /");
|
||||
}
|
||||
}
|
||||
|
||||
// Set session IP and UA
|
||||
if (!isset($_SESSION['SESS_REMOTE_IP'])) {
|
||||
$_SESSION['SESS_REMOTE_IP'] = $_SERVER['REMOTE_ADDR'];
|
||||
}
|
||||
if (!isset($_SESSION['SESS_REMOTE_UA'])) {
|
||||
$_SESSION['SESS_REMOTE_UA'] = $_SERVER['HTTP_USER_AGENT'];
|
||||
}
|
||||
|
||||
// Check session
|
||||
function session_check() {
|
||||
if (!isset($_SESSION['SESS_REMOTE_IP']) || !isset($_SESSION['SESS_REMOTE_UA'])) {
|
||||
return false;
|
||||
}
|
||||
if ($_SESSION['SESS_REMOTE_IP'] != $_SERVER['REMOTE_ADDR']) {
|
||||
return false;
|
||||
}
|
||||
if ($_SESSION['SESS_REMOTE_UA'] != $_SERVER['HTTP_USER_AGENT']) {
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
if (isset($_SESSION['mailcow_cc_role']) && session_check() === false) {
|
||||
exit("Invalid session");
|
||||
}
|
|
@ -53,5 +53,7 @@ $MAILCOW_APPS = array(
|
|||
// Rows until pagination begins
|
||||
$PAGINATION_SIZE = 10;
|
||||
|
||||
// Session lifetime in seconds
|
||||
$SESSION_LIFETIME = 3600;
|
||||
|
||||
?>
|
||||
|
|
|
@ -39,37 +39,118 @@ $(document).ready(function() {
|
|||
});
|
||||
}
|
||||
});
|
||||
$.ajax({
|
||||
dataType: 'json',
|
||||
url: '/api/v1/get/logs/dovecot/all',
|
||||
jsonp: false,
|
||||
error: function () {
|
||||
alert('Cannot draw dovecot log table');
|
||||
},
|
||||
success: function (data) {
|
||||
$('#dovecot_log').footable({
|
||||
"columns": [
|
||||
{"name":"time","title":"time"},
|
||||
{"name":"program","title":"program"},
|
||||
{"name":"priority","title":"priority"},
|
||||
{"name":"message","title":"message"},
|
||||
],
|
||||
"rows": data,
|
||||
"empty": lang.empty,
|
||||
"paging": {
|
||||
"enabled": true,
|
||||
"limit": 5,
|
||||
"size": pagination_size
|
||||
$("#refresh_dovecot_log").on('click', function(e) {
|
||||
function unix_time_format(tm) {
|
||||
var date = new Date(tm ? tm * 1000 : 0);
|
||||
return date.toLocaleString();
|
||||
}
|
||||
e.preventDefault();
|
||||
if (typeof ft_dovecot_logs != 'undefined') {
|
||||
ft_dovecot_logs.destroy();
|
||||
}
|
||||
$.ajax({
|
||||
dataType: 'json',
|
||||
url: '/api/v1/get/logs/dovecot/1000',
|
||||
jsonp: false,
|
||||
error: function () {
|
||||
alert('Cannot draw dovecot log table');
|
||||
},
|
||||
"filtering": {
|
||||
"enabled": true,
|
||||
"position": "left",
|
||||
"placeholder": lang.filter_table
|
||||
},
|
||||
"sorting": {
|
||||
"enabled": true
|
||||
success: function (data) {
|
||||
$.each(data, function (i, item) {
|
||||
var danger_class = ["emerg", "alert", "crit"];
|
||||
var warning_class = ["warning"];
|
||||
var info_class = ["notice", "info", "debug"];
|
||||
if (jQuery.inArray(item.priority, danger_class) !== -1) {
|
||||
item.priority = '<span class="label label-danger">' + item.priority + '</span>';
|
||||
}
|
||||
else if (jQuery.inArray(item.priority, warning_class) !== -1) {
|
||||
item.priority = '<span class="label label-warning">' + item.priority + '</span>';
|
||||
}
|
||||
else if (jQuery.inArray(item.priority, info_class) !== -1) {
|
||||
item.priority = '<span class="label label-info">' + item.priority + '</span>';
|
||||
}
|
||||
});
|
||||
ft_dovecot_logs = FooTable.init("#dovecot_log", {
|
||||
"columns": [
|
||||
{"name":"time","formatter":function unix_time_format(tm) {var date = new Date(tm ? tm * 1000 : 0); return date.toLocaleString();},"title":lang.time,"style":{"width":"170px"}},
|
||||
{"name":"priority","title":lang.priority,"style":{"width":"80px"}},
|
||||
{"name":"message","title":lang.message},
|
||||
],
|
||||
"rows": data,
|
||||
"empty": lang.empty,
|
||||
"paging": {
|
||||
"enabled": true,
|
||||
"limit": 5,
|
||||
"size": pagination_size
|
||||
},
|
||||
"filtering": {
|
||||
"enabled": true,
|
||||
"position": "left",
|
||||
"placeholder": lang.filter_table
|
||||
},
|
||||
"sorting": {
|
||||
"enabled": true
|
||||
}
|
||||
});
|
||||
}
|
||||
});
|
||||
}
|
||||
});
|
||||
$("#refresh_postfix_log").on('click', function(e) {
|
||||
function unix_time_format(tm) {
|
||||
var date = new Date(tm ? tm * 1000 : 0);
|
||||
return date.toLocaleString();
|
||||
}
|
||||
e.preventDefault();
|
||||
if (typeof ft_postfix_logs != 'undefined') {
|
||||
ft_postfix_logs.destroy();
|
||||
}
|
||||
$.ajax({
|
||||
dataType: 'json',
|
||||
url: '/api/v1/get/logs/postfix/1000',
|
||||
jsonp: false,
|
||||
error: function () {
|
||||
alert('Cannot draw postfix log table');
|
||||
},
|
||||
success: function (data) {
|
||||
$.each(data, function (i, item) {
|
||||
var danger_class = ["emerg", "alert", "crit"];
|
||||
var warning_class = ["warning"];
|
||||
var info_class = ["notice", "info", "debug"];
|
||||
if (jQuery.inArray(item.priority, danger_class) !== -1) {
|
||||
item.priority = '<span class="label label-danger">' + item.priority + '</span>';
|
||||
}
|
||||
else if (jQuery.inArray(item.priority, warning_class) !== -1) {
|
||||
item.priority = '<span class="label label-warning">' + item.priority + '</span>';
|
||||
}
|
||||
else if (jQuery.inArray(item.priority, info_class) !== -1) {
|
||||
item.priority = '<span class="label label-info">' + item.priority + '</span>';
|
||||
}
|
||||
});
|
||||
ft_postfix_logs = FooTable.init("#postfix_log", {
|
||||
"columns": [
|
||||
{"name":"time","formatter":function unix_time_format(tm) {var date = new Date(tm ? tm * 1000 : 0); return date.toLocaleString();},"title":lang.time,"style":{"width":"170px"}},
|
||||
{"name":"priority","title":lang.priority,"style":{"width":"80px"}},
|
||||
{"name":"message","title":lang.message},
|
||||
],
|
||||
"rows": data,
|
||||
"empty": lang.empty,
|
||||
"paging": {
|
||||
"enabled": true,
|
||||
"limit": 5,
|
||||
"size": pagination_size
|
||||
},
|
||||
"filtering": {
|
||||
"enabled": true,
|
||||
"position": "left",
|
||||
"placeholder": lang.filter_table
|
||||
},
|
||||
"sorting": {
|
||||
"enabled": true
|
||||
}
|
||||
});
|
||||
}
|
||||
});
|
||||
});
|
||||
$("#refresh_dovecot_log").trigger('click');
|
||||
$("#refresh_postfix_log").trigger('click');
|
||||
});
|
|
@ -471,6 +471,11 @@ $lang['admin']['set_rr_failed'] = 'Kann Postfix Restriktionen nicht setzen';
|
|||
$lang['admin']['no_record'] = 'Kein Eintrag';
|
||||
$lang['admin']['filter_table'] = 'Tabelle Filtern';
|
||||
$lang['admin']['empty'] = 'Keine Einträge vorhanden';
|
||||
$lang['admin']['time'] = 'Zeit';
|
||||
$lang['admin']['priority'] = 'Gewichtung';
|
||||
$lang['admin']['refresh'] = 'Neu laden';
|
||||
$lang['admin']['logs'] = 'Logs';
|
||||
$lang['admin']['message'] = 'Nachricht';
|
||||
$lang['admin']['forwarding_hosts'] = 'Weiterleitungs-Hosts';
|
||||
$lang['admin']['forwarding_hosts_hint'] = 'Eingehende Nachrichten werden von den hier gelisteten Hosts bedingungslos akzeptiert. Diese Hosts werden dann nicht mit DNSBLs abgeglichen oder Greylisting unterworfen. Von ihnen empfangener Spam wird nie abgelehnt, optional kann er aber in den Spam-Ordner einsortiert werden. Die übliche Verwendung für diese Funktion ist, um Mailserver anzugeben, auf denen eine Weiterleitung zu Ihrem Mailcow-Server eingerichtet wurde.';
|
||||
$lang['admin']['forwarding_hosts_add_hint'] = 'Sie können entweder IPv4/IPv6-Adressen, Netzwerke in CIDR-Notation, Hostnamen (die zu IP-Adressen aufgelöst werden), oder Domainnamen (die zu IP-Adressen aufgelöst werden, indem ihr SPF-Record abgefragt wird oder, in dessen Abwesenheit, ihre MX-Records) angeben.';
|
||||
|
|
|
@ -483,6 +483,11 @@ $lang['admin']['set_rr_failed'] = 'Cannot set Postfix restrictions';
|
|||
$lang['admin']['no_record'] = 'No record';
|
||||
$lang['admin']['filter_table'] = 'Filter table';
|
||||
$lang['admin']['empty'] = 'No results';
|
||||
$lang['admin']['time'] = 'Time';
|
||||
$lang['admin']['priority'] = 'Priority';
|
||||
$lang['admin']['message'] = 'Message';
|
||||
$lang['admin']['refresh'] = 'Refresh';
|
||||
$lang['admin']['logs'] = 'Logs';
|
||||
$lang['admin']['forwarding_hosts'] = 'Forwarding Hosts';
|
||||
$lang['admin']['forwarding_hosts_hint'] = 'Incoming messages are unconditionally accepted from any hosts listed here. These hosts are then not checked against DNSBLs or subjected to greylisting. Spam received from them is never rejected, but optionally it can be filed into the Junk folder. The most common use for this is to specify mail servers on which you have set up a rule that forwards incoming emails to your Mailcow server.';
|
||||
$lang['admin']['forwarding_hosts_add_hint'] = 'You can either specify IPv4/IPv6 addresses, networks in CIDR notation, host names (which will be resolved to IP addresses), or domain names (which will be resolved to IP addresses by querying SPF records or, in their absence, MX records).';
|
||||
|
|
Loading…
Reference in New Issue