/*
* Jirafeau, your web file repository
* Copyright (C) 2015 Jerome Jutteau <jerome@jutteau.fr>
+ * Copyright (C) 2023 Blackeye <blackeye@blackeyeprojects.de>
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as
/* If called from CLI, no password or graphical interface */
if (php_sapi_name() == "cli") {
if ($cfg['installation_done'] == false) {
- die("installation not completed yet\n");
+ die("Installation not completed yet.\n");
}
if ((count($argv)>1) && $argv[1]=="clean_expired") {
$total = jirafeau_admin_clean();
- echo "$total expired files deleted.";
+ echo "$total expired files deleted.\n";
} elseif ((count($argv)>1) && $argv[1]=="clean_async") {
$total = jirafeau_admin_clean_async();
- echo "$total old unfinished transfers deleted.";
+ echo "$total old unfinished transfers deleted.\n";
} else {
- die("No command found. Should be admin.php <clean_expired|clean_async>.");
+ die("No command found. Should be admin.php <clean_expired|clean_async>.\n");
}
-} else {
+// Second check: Challenge by IP
+} elseif (true === jirafeau_challenge_admin_ip($cfg, get_ip_address($cfg))) {
/* Disable admin interface if we have a empty admin password. */
if (empty($cfg['admin_password']) && empty($cfg['admin_http_auth_user'])) {
require(JIRAFEAU_ROOT . 'lib/template/header.php');
exit;
}
- /* Unlog if asked. */
+ /* Logout if requested. */
if (jirafeau_admin_session_logged() && isset($_POST['action']) && (strcmp($_POST['action'], 'logout') == 0)) {
- jirafeau_admin_session_end();
+ jirafeau_session_end();
}
if (!jirafeau_admin_session_logged()) {
- /* Test HTTP authentification. */
+ /* Test HTTP authentication. */
if (!empty($cfg['admin_http_auth_user']) &&
- $cfg['admin_http_auth_user'] == $_SERVER['PHP_AUTH_USER']) {
+ ((is_array($cfg['admin_http_auth_user']) && in_array($_SERVER['PHP_AUTH_USER'], $cfg['admin_http_auth_user'])) ||
+ (($cfg['admin_http_auth_user'] == $_SERVER['PHP_AUTH_USER'])))) {
jirafeau_admin_session_start();
}
- /* Test web password authentification. */
+ /* Test web password authentication. */
elseif (!empty($cfg['admin_password']) && isset($_POST['admin_password'])) {
if ($cfg['admin_password'] === hash('sha256', $_POST['admin_password'])) {
jirafeau_admin_session_start();
<tr>
<td class = "field"><input type = "password"
name = "admin_password" id = "admin_password"
- size = "40" />
+ size = "40" autocomplete = "current-password" />
</td>
</tr>
<tr class = "nav">
/* Show admin interface if not downloading a file. */
if (!(isset($_POST['action']) && strcmp($_POST['action'], 'download') == 0)) {
require(JIRAFEAU_ROOT . 'lib/template/header.php'); ?><h2><?php echo t('ADMIN_INTERFACE'); ?></h2><?php
- ?><h2>(version <?php echo JIRAFEAU_VERSION ?>)</h2><?php
+ ?><h2>(version <?php echo JIRAFEAU_VERSION ?>)</h2><?php
+
+ if ($cfg['enable_crypt'] && !(extension_loaded('sodium'))) {
+ echo '<div class="error"><p>'.t('SODIUM_UNAVAILABLE').'</p></div>';
+ }
- ?><div id = "admin">
+ ?><div id = "admin">
<fieldset><legend><?php echo t('ACTIONS'); ?></legend>
<table>
<form method="post">
</td>
</tr>
</form>
+ <form method="post">
+ <tr>
+ <input type = "hidden" name = "action" value = "bug_report_info"/>
+ <?php echo jirafeau_admin_csrf_field() ?>
+ <td class = "info">
+ <?php echo t('REPORTING_AN_ISSUE'); ?>
+ </td>
+ <td></td>
+ <td>
+ <input type = "submit" value = "<?php echo t('INFO'); ?>" />
+ </td>
+ </tr>
+ </form>
</table>
<form method="post">
<input type = "hidden" name = "action" value = "logout" />
fclose($r);
}
exit;
+ } elseif (strcmp($_POST['action'], 'bug_report_info') == 0) {
+ echo jirafeau_admin_bug_report($cfg);
}
}
require(JIRAFEAU_ROOT.'lib/template/footer.php');
+} else {
+ require(JIRAFEAU_ROOT . 'lib/template/header.php');
+ jirafeau_fatal_error(t('ACCESS_KO'), $cfg);
}
?>