2007-11-22 01:57:12 +01:00
|
|
|
<?php
|
|
|
|
/**
|
2007-12-05 03:27:49 +01:00
|
|
|
* eGgroupWare admin - remote admin command execution
|
2007-11-22 01:57:12 +01:00
|
|
|
*
|
|
|
|
* @link http://www.egroupware.org
|
|
|
|
* @author Ralf Becker <RalfBecker-AT-outdoor-training.de>
|
|
|
|
* @package admin
|
|
|
|
* @copyright (c) 2007 by Ralf Becker <RalfBecker-AT-outdoor-training.de>
|
|
|
|
* @license http://opensource.org/licenses/gpl-license.php GPL - GNU General Public License
|
|
|
|
* @version $Id$
|
|
|
|
*/
|
|
|
|
|
2007-12-05 03:27:49 +01:00
|
|
|
/**
|
|
|
|
* @var array
|
|
|
|
*/
|
2007-11-22 01:57:12 +01:00
|
|
|
$GLOBALS['egw_info'] = array(
|
|
|
|
'flags' => array(
|
|
|
|
'currentapp' => 'login',
|
|
|
|
'noheader' => true,
|
|
|
|
)
|
|
|
|
);
|
|
|
|
|
|
|
|
include('../header.inc.php');
|
|
|
|
|
2007-12-19 00:11:53 +01:00
|
|
|
// install an own exception handler to forward exceptions back to the remote side
|
|
|
|
function remote_exception_handler(Exception $e)
|
|
|
|
{
|
|
|
|
$msg = $e->getMessage();
|
|
|
|
if (is_object($GLOBALS['egw']->translation))
|
|
|
|
{
|
|
|
|
$msg = $GLOBALS['egw']->translation->convert($msg,$GLOBALS['egw']->translation->charset(),'utf-8');
|
|
|
|
}
|
|
|
|
header('HTTP/1.1 200 '.$msg);
|
|
|
|
echo $e->getCode().' '.$msg;
|
|
|
|
$GLOBALS['egw']->common->egw_exit();
|
|
|
|
}
|
|
|
|
set_exception_handler('remote_exception_handler');
|
|
|
|
|
2007-11-22 01:57:12 +01:00
|
|
|
$GLOBALS['egw']->applications->read_installed_apps(); // set $GLOBALS['egw_info']['apps'] (not set for login)
|
|
|
|
|
2007-12-05 03:27:49 +01:00
|
|
|
$instance = isset($_GET['domain']) ? $_GET['domain'] : $_REQUEST['domain']; // use GET before the rest
|
2007-11-22 01:57:12 +01:00
|
|
|
if (!isset($GLOBALS['egw_domain'][$instance]))
|
|
|
|
{
|
|
|
|
$instance = $GLOBALS['egw_info']['server']['default_domain'];
|
|
|
|
}
|
2007-12-19 00:11:53 +01:00
|
|
|
$config_passwd = $GLOBALS['egw_domain'][$instance]['config_passwd'];
|
|
|
|
unset($GLOBALS['egw_domain']);
|
2007-11-22 01:57:12 +01:00
|
|
|
|
|
|
|
require_once(EGW_INCLUDE_ROOT.'/admin/inc/class.admin_cmd.inc.php');
|
|
|
|
|
|
|
|
// check if uid belongs to an existing command --> return it's status
|
|
|
|
// this is also a security meassure, as a captured uid+secret can not be used to send new commands
|
|
|
|
$cmd = admin_cmd::read($_REQUEST['uid']);
|
|
|
|
if (is_object($cmd))
|
|
|
|
{
|
2007-12-19 00:11:53 +01:00
|
|
|
$cmd->check_remote_access($_REQUEST['secret'],$config_passwd);
|
|
|
|
|
|
|
|
$success_msg = 'Successful';
|
|
|
|
// if the comand object has a rerun method, call it
|
|
|
|
if (method_exists($cmd,'rerun'))
|
|
|
|
{
|
|
|
|
$success_msg = $cmd->rerun();
|
|
|
|
}
|
|
|
|
exit_with_status($cmd,$success_msg);
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// check if requests contains a reasonable looking admin command to be queued
|
|
|
|
if (!$_REQUEST['uid'] || // no uid
|
|
|
|
!$_REQUEST['type'] || // no command class name
|
2011-08-03 09:17:15 +02:00
|
|
|
!preg_match('/^[a-z0-9_]+$/i', $_REQUEST['type']) || // type is a (autoloadable) class name, prevent inclusion of arbitrary files
|
2007-11-22 01:57:12 +01:00
|
|
|
!$_REQUEST['creator_email']) // no creator email
|
|
|
|
{
|
2007-11-24 20:56:58 +01:00
|
|
|
header("HTTP/1.1 200 Bad format!");
|
2007-12-19 00:11:53 +01:00
|
|
|
echo '0 Bad format!';
|
2007-11-22 01:57:12 +01:00
|
|
|
$GLOBALS['egw']->common->egw_exit();
|
|
|
|
}
|
|
|
|
|
|
|
|
// create command from request data
|
|
|
|
$data = isset($_POST['uid']) ? $_POST : $_GET;
|
|
|
|
unset($data['secret']);
|
2007-11-23 21:04:26 +01:00
|
|
|
unset($data['id']); // we are remote
|
|
|
|
unset($data['remote_id']);
|
2007-11-22 01:57:12 +01:00
|
|
|
$data['creator'] = 0; // remote
|
|
|
|
if (isset($data['modifier'])) $data['modifier'] = 0;
|
|
|
|
if (isset($data['requested'])) $data['requested'] = 0;
|
|
|
|
|
2007-12-21 00:56:53 +01:00
|
|
|
if (get_magic_quotes_gpc())
|
|
|
|
{
|
|
|
|
$data = array_stripslashes($data);
|
|
|
|
}
|
|
|
|
|
2007-12-19 00:11:53 +01:00
|
|
|
$cmd = admin_cmd::instanciate($data);
|
|
|
|
|
|
|
|
$cmd->check_remote_access($_REQUEST['secret'],$config_passwd);
|
|
|
|
|
|
|
|
//_debug_array($cmd); exit;
|
|
|
|
$success_msg = $cmd->run();
|
|
|
|
|
|
|
|
$GLOBALS['egw']->translation->convert($success_msg,$GLOBALS['egw']->translation->charset(),'utf-8');
|
|
|
|
|
|
|
|
if (!is_string($success_msg))
|
|
|
|
{
|
|
|
|
$success_msg = serialize($success_msg);
|
2007-11-22 01:57:12 +01:00
|
|
|
}
|
|
|
|
exit_with_status($cmd,$success_msg);
|
|
|
|
|
|
|
|
function exit_with_status($cmd,$success_msg='Successful')
|
|
|
|
{
|
|
|
|
switch($cmd->status)
|
|
|
|
{
|
|
|
|
case admin_cmd::failed: // errors are returned as 400 HTTP status
|
2007-11-24 20:56:58 +01:00
|
|
|
header('HTTP/1.1 200 '.$cmd->error);
|
2007-11-22 01:57:12 +01:00
|
|
|
echo $cmd->errno.' '.$cmd->error;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default: // everything else is returned as 200 HTTP status
|
|
|
|
$success_msg = $cmd->stati[$cmd->status];
|
|
|
|
// fall through
|
2007-12-19 00:11:53 +01:00
|
|
|
case admin_cmd::pending:
|
2007-11-22 01:57:12 +01:00
|
|
|
case admin_cmd::successful:
|
|
|
|
header('HTTP/1.1 200 '.$cmd->stati[$cmd->status]);
|
2007-12-06 09:00:41 +01:00
|
|
|
header('Content-type: text/plain; charset=utf-8');
|
2007-11-22 01:57:12 +01:00
|
|
|
echo $success_msg;
|
|
|
|
}
|
|
|
|
$GLOBALS['egw']->common->egw_exit();
|
|
|
|
}
|