blob: 97884d30923b6caf190e89edb93b92d749ad2ad2 [file] [log] [blame]
Andrey Andreevc5536aa2012-11-01 17:33:58 +02001<?php
Derek Allard2067d1a2008-11-13 22:59:24 +00002/**
3 * CodeIgniter
4 *
Andrey Andreevfe9309d2015-01-09 17:48:58 +02005 * An open source application development framework for PHP
Derek Allard2067d1a2008-11-13 22:59:24 +00006 *
Andrey Andreevbdb96ca2014-10-28 00:13:31 +02007 * This content is released under the MIT License (MIT)
Andrey Andreev64e98aa2012-01-07 20:29:10 +02008 *
Andrey Andreevfe9309d2015-01-09 17:48:58 +02009 * Copyright (c) 2014 - 2015, British Columbia Institute of Technology
Andrey Andreev64e98aa2012-01-07 20:29:10 +020010 *
Andrey Andreevbdb96ca2014-10-28 00:13:31 +020011 * Permission is hereby granted, free of charge, to any person obtaining a copy
12 * of this software and associated documentation files (the "Software"), to deal
13 * in the Software without restriction, including without limitation the rights
14 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
15 * copies of the Software, and to permit persons to whom the Software is
16 * furnished to do so, subject to the following conditions:
Derek Jonesf4a4bd82011-10-20 12:18:42 -050017 *
Andrey Andreevbdb96ca2014-10-28 00:13:31 +020018 * The above copyright notice and this permission notice shall be included in
19 * all copies or substantial portions of the Software.
20 *
21 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
22 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
23 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
24 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
25 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
26 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
27 * THE SOFTWARE.
28 *
29 * @package CodeIgniter
30 * @author EllisLab Dev Team
darwinel871754a2014-02-11 17:34:57 +010031 * @copyright Copyright (c) 2008 - 2014, EllisLab, Inc. (http://ellislab.com/)
Andrey Andreevfe9309d2015-01-09 17:48:58 +020032 * @copyright Copyright (c) 2014 - 2015, British Columbia Institute of Technology (http://bcit.ca/)
Andrey Andreevbdb96ca2014-10-28 00:13:31 +020033 * @license http://opensource.org/licenses/MIT MIT License
34 * @link http://codeigniter.com
35 * @since Version 1.0.0
Derek Allard2067d1a2008-11-13 22:59:24 +000036 * @filesource
37 */
Andrey Andreevc5536aa2012-11-01 17:33:58 +020038defined('BASEPATH') OR exit('No direct script access allowed');
Derek Allard2067d1a2008-11-13 22:59:24 +000039
Derek Allard2067d1a2008-11-13 22:59:24 +000040/**
41 * Input Class
42 *
43 * Pre-processes global input data for security
44 *
45 * @package CodeIgniter
46 * @subpackage Libraries
47 * @category Input
Derek Jonesf4a4bd82011-10-20 12:18:42 -050048 * @author EllisLab Dev Team
Derek Allard2067d1a2008-11-13 22:59:24 +000049 * @link http://codeigniter.com/user_guide/libraries/input.html
50 */
51class CI_Input {
Derek Allard2067d1a2008-11-13 22:59:24 +000052
David Behler9b5df592011-08-14 21:04:17 +020053 /**
54 * IP address of the current user
55 *
Andrey Andreev1887ec62012-10-27 16:22:07 +030056 * @var string
David Behler9b5df592011-08-14 21:04:17 +020057 */
Andrey Andreev1887ec62012-10-27 16:22:07 +030058 public $ip_address = FALSE;
Andrey Andreev92ebfb62012-05-17 12:49:24 +030059
David Behler9b5df592011-08-14 21:04:17 +020060 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +030061 * Allow GET array flag
David Behler9b5df592011-08-14 21:04:17 +020062 *
Andrey Andreev1887ec62012-10-27 16:22:07 +030063 * If set to FALSE, then $_GET will be set to an empty array.
David Behler9b5df592011-08-14 21:04:17 +020064 *
Andrey Andreev1887ec62012-10-27 16:22:07 +030065 * @var bool
David Behler9b5df592011-08-14 21:04:17 +020066 */
Andrey Andreev1887ec62012-10-27 16:22:07 +030067 protected $_allow_get_array = TRUE;
Andrey Andreev92ebfb62012-05-17 12:49:24 +030068
David Behler9b5df592011-08-14 21:04:17 +020069 /**
Andrey Andreevbfb635b2014-01-08 18:32:05 +020070 * Standardize new lines flag
David Behler9b5df592011-08-14 21:04:17 +020071 *
Andrey Andreev1887ec62012-10-27 16:22:07 +030072 * If set to TRUE, then newlines are standardized.
73 *
74 * @var bool
David Behler9b5df592011-08-14 21:04:17 +020075 */
Andrey Andreevefc08e92014-04-15 14:32:52 +030076 protected $_standardize_newlines;
Andrey Andreev92ebfb62012-05-17 12:49:24 +030077
David Behler9b5df592011-08-14 21:04:17 +020078 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +030079 * Enable XSS flag
80 *
81 * Determines whether the XSS filter is always active when
82 * GET, POST or COOKIE data is encountered.
83 * Set automatically based on config setting.
84 *
85 * @var bool
86 */
87 protected $_enable_xss = FALSE;
88
89 /**
90 * Enable CSRF flag
91 *
David Behler9b5df592011-08-14 21:04:17 +020092 * Enables a CSRF cookie token to be set.
Andrey Andreev1887ec62012-10-27 16:22:07 +030093 * Set automatically based on config setting.
David Behler9b5df592011-08-14 21:04:17 +020094 *
Andrey Andreev1887ec62012-10-27 16:22:07 +030095 * @var bool
David Behler9b5df592011-08-14 21:04:17 +020096 */
Andrey Andreev1887ec62012-10-27 16:22:07 +030097 protected $_enable_csrf = FALSE;
Andrey Andreev92ebfb62012-05-17 12:49:24 +030098
David Behler9b5df592011-08-14 21:04:17 +020099 /**
100 * List of all HTTP request headers
101 *
102 * @var array
103 */
Andrey Andreev1887ec62012-10-27 16:22:07 +0300104 protected $headers = array();
David Behler9b5df592011-08-14 21:04:17 +0200105
Ignasimgf9fbf112015-02-06 09:21:07 +0100106 protected $_raw_input_stream = NULL;
107
108 /**
Ignasimg0b5569f2015-02-20 17:56:55 +0100109 * Input stream data
110 *
111 * Parsed from php://input at runtime
112 *
113 * @see CI_Input::input_stream()
114 * @var array
115 */
Ignasimga8c964c2015-02-19 01:26:06 +0100116 protected $_input_stream = NULL;
Andrey Andreev303eef02012-11-06 14:55:48 +0200117
118 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +0300119 * Class constructor
Greg Akera9263282010-11-10 15:26:43 -0600120 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300121 * Determines whether to globally enable the XSS processing
122 * and whether to allow the $_GET array.
Andrey Andreev92ebfb62012-05-17 12:49:24 +0300123 *
124 * @return void
Greg Akera9263282010-11-10 15:26:43 -0600125 */
126 public function __construct()
Derek Allard2067d1a2008-11-13 22:59:24 +0000127 {
Andrey Andreevbfb635b2014-01-08 18:32:05 +0200128 $this->_allow_get_array = (config_item('allow_get_array') === TRUE);
129 $this->_enable_xss = (config_item('global_xss_filtering') === TRUE);
130 $this->_enable_csrf = (config_item('csrf_protection') === TRUE);
fabianozenatti523cda32014-03-21 12:13:03 +0100131 $this->_standardize_newlines = (bool) config_item('standardize_newlines');
Derek Jones69fc4fc2010-03-02 13:36:31 -0600132
Andrey Andreevc26b9eb2014-02-24 11:31:36 +0200133 $this->security =& load_class('Security', 'core');
Derek Jones69fc4fc2010-03-02 13:36:31 -0600134
Pascal Krieteaaec1e42011-01-20 00:01:21 -0500135 // Do we need the UTF-8 class?
Derek Jones69fc4fc2010-03-02 13:36:31 -0600136 if (UTF8_ENABLED === TRUE)
137 {
Andrey Andreevc26b9eb2014-02-24 11:31:36 +0200138 $this->uni =& load_class('Utf8', 'core');
Derek Jones69fc4fc2010-03-02 13:36:31 -0600139 }
140
141 // Sanitize global arrays
Derek Allard2067d1a2008-11-13 22:59:24 +0000142 $this->_sanitize_globals();
Andrey Andreev90726b82015-01-20 12:39:22 +0200143
144 log_message('info', 'Input Class Initialized');
Derek Allard2067d1a2008-11-13 22:59:24 +0000145 }
146
147 // --------------------------------------------------------------------
148
149 /**
Greg Akera9263282010-11-10 15:26:43 -0600150 * Fetch from array
151 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300152 * Internal method used to retrieve values from global arrays.
Greg Akera9263282010-11-10 15:26:43 -0600153 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300154 * @param array &$array $_GET, $_POST, $_COOKIE, $_SERVER, etc.
Ahmad Anbarff89a4e2014-12-02 17:26:30 +0200155 * @param mixed $index Index for item to be fetched from $array
Andrey Andreev1887ec62012-10-27 16:22:07 +0300156 * @param bool $xss_clean Whether to apply XSS filtering
157 * @return mixed
Greg Akera9263282010-11-10 15:26:43 -0600158 */
Andrey Andreev7c60b122014-02-08 18:47:19 +0200159 protected function _fetch_from_array(&$array, $index = NULL, $xss_clean = NULL)
Derek Allard2067d1a2008-11-13 22:59:24 +0000160 {
Andrey Andreevef29f832014-12-02 18:03:47 +0200161 is_bool($xss_clean) OR $xss_clean = $this->_enable_xss;
162
Andrey Andreev7c60b122014-02-08 18:47:19 +0200163 // If $index is NULL, it means that the whole $array is requested
Andrey Andreevef29f832014-12-02 18:03:47 +0200164 isset($index) OR $index = array_keys($array);
165
166 // allow fetching multiple keys at once
167 if (is_array($index))
Andrey Andreev7c60b122014-02-08 18:47:19 +0200168 {
169 $output = array();
Andrey Andreev6b3bf4c2014-12-02 18:04:41 +0200170 foreach ($index as $key)
Andrey Andreev7c60b122014-02-08 18:47:19 +0200171 {
172 $output[$key] = $this->_fetch_from_array($array, $key, $xss_clean);
173 }
174
175 return $output;
176 }
177
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530178 if (isset($array[$index]))
Derek Allard2067d1a2008-11-13 22:59:24 +0000179 {
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530180 $value = $array[$index];
181 }
nisheeth-barthwal47ea5a82013-03-26 18:57:28 +0530182 elseif (($count = preg_match_all('/(?:^[^\[]+)|\[[^]]*\]/', $index, $matches)) > 1) // Does the index contain array notation
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530183 {
nisheeth-barthwal47ea5a82013-03-26 18:57:28 +0530184 $value = $array;
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530185 for ($i = 0; $i < $count; $i++)
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530186 {
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530187 $key = trim($matches[0][$i], '[]');
nisheeth-barthwal408cbb42013-03-26 19:06:40 +0530188 if ($key === '') // Empty notation will return the value as array
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530189 {
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530190 break;
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530191 }
nisheeth-barthwal47ea5a82013-03-26 18:57:28 +0530192
193 if (isset($value[$key]))
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530194 {
nisheeth-barthwal47ea5a82013-03-26 18:57:28 +0530195 $value = $value[$key];
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530196 }
197 else
198 {
199 return NULL;
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530200 }
201 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000202 }
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530203 else
Derek Allard2067d1a2008-11-13 22:59:24 +0000204 {
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530205 return NULL;
Derek Allard2067d1a2008-11-13 22:59:24 +0000206 }
207
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530208 return ($xss_clean === TRUE)
209 ? $this->security->xss_clean($value)
210 : $value;
Derek Allard2067d1a2008-11-13 22:59:24 +0000211 }
212
213 // --------------------------------------------------------------------
214
215 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400216 * Fetch an item from the GET array
217 *
Ahmad Anbarff89a4e2014-12-02 17:26:30 +0200218 * @param mixed $index Index for item to be fetched from $_GET
Andrey Andreev1887ec62012-10-27 16:22:07 +0300219 * @param bool $xss_clean Whether to apply XSS filtering
220 * @return mixed
Timothy Warren40403d22012-04-19 16:38:50 -0400221 */
Andrey Andreev80a16b12014-01-08 17:19:03 +0200222 public function get($index = NULL, $xss_clean = NULL)
Derek Allard2067d1a2008-11-13 22:59:24 +0000223 {
nisheeth-barthwala5bcfb12013-03-23 10:53:51 +0530224 return $this->_fetch_from_array($_GET, $index, $xss_clean);
Derek Allard2067d1a2008-11-13 22:59:24 +0000225 }
226
227 // --------------------------------------------------------------------
228
229 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400230 * Fetch an item from the POST array
231 *
Ahmad Anbarff89a4e2014-12-02 17:26:30 +0200232 * @param mixed $index Index for item to be fetched from $_POST
Andrey Andreev1887ec62012-10-27 16:22:07 +0300233 * @param bool $xss_clean Whether to apply XSS filtering
234 * @return mixed
Timothy Warren40403d22012-04-19 16:38:50 -0400235 */
Andrey Andreev80a16b12014-01-08 17:19:03 +0200236 public function post($index = NULL, $xss_clean = NULL)
Derek Allard2067d1a2008-11-13 22:59:24 +0000237 {
nisheeth-barthwala5bcfb12013-03-23 10:53:51 +0530238 return $this->_fetch_from_array($_POST, $index, $xss_clean);
Derek Allard2067d1a2008-11-13 22:59:24 +0000239 }
240
241 // --------------------------------------------------------------------
242
243 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +0300244 * Fetch an item from POST data with fallback to GET
Timothy Warren40403d22012-04-19 16:38:50 -0400245 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300246 * @param string $index Index for item to be fetched from $_POST or $_GET
247 * @param bool $xss_clean Whether to apply XSS filtering
248 * @return mixed
Timothy Warren40403d22012-04-19 16:38:50 -0400249 */
Andrey Andreev7c60b122014-02-08 18:47:19 +0200250 public function post_get($index, $xss_clean = NULL)
Derek Allard2067d1a2008-11-13 22:59:24 +0000251 {
Andrey Andreev9448afb2012-02-08 19:49:19 +0200252 return isset($_POST[$index])
nisheeth-barthwala5bcfb12013-03-23 10:53:51 +0530253 ? $this->post($index, $xss_clean)
254 : $this->get($index, $xss_clean);
Derek Allard2067d1a2008-11-13 22:59:24 +0000255 }
256
257 // --------------------------------------------------------------------
258
259 /**
vlakoff441fd262013-08-11 20:36:41 +0200260 * Fetch an item from GET data with fallback to POST
261 *
262 * @param string $index Index for item to be fetched from $_GET or $_POST
263 * @param bool $xss_clean Whether to apply XSS filtering
264 * @return mixed
265 */
Andrey Andreev7c60b122014-02-08 18:47:19 +0200266 public function get_post($index, $xss_clean = NULL)
vlakoff441fd262013-08-11 20:36:41 +0200267 {
268 return isset($_GET[$index])
269 ? $this->get($index, $xss_clean)
270 : $this->post($index, $xss_clean);
271 }
272
273 // --------------------------------------------------------------------
274
275 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400276 * Fetch an item from the COOKIE array
277 *
Ahmad Anbarff89a4e2014-12-02 17:26:30 +0200278 * @param mixed $index Index for item to be fetched from $_COOKIE
Andrey Andreev1887ec62012-10-27 16:22:07 +0300279 * @param bool $xss_clean Whether to apply XSS filtering
280 * @return mixed
Timothy Warren40403d22012-04-19 16:38:50 -0400281 */
Andrey Andreev7c60b122014-02-08 18:47:19 +0200282 public function cookie($index = NULL, $xss_clean = NULL)
Derek Allard2067d1a2008-11-13 22:59:24 +0000283 {
nisheeth-barthwala5bcfb12013-03-23 10:53:51 +0530284 return $this->_fetch_from_array($_COOKIE, $index, $xss_clean);
Derek Allard2067d1a2008-11-13 22:59:24 +0000285 }
286
Andrey Andreev1887ec62012-10-27 16:22:07 +0300287 // --------------------------------------------------------------------
288
289 /**
290 * Fetch an item from the SERVER array
291 *
Ahmad Anbarff89a4e2014-12-02 17:26:30 +0200292 * @param mixed $index Index for item to be fetched from $_SERVER
Andrey Andreev1887ec62012-10-27 16:22:07 +0300293 * @param bool $xss_clean Whether to apply XSS filtering
294 * @return mixed
295 */
Andrey Andreev7c60b122014-02-08 18:47:19 +0200296 public function server($index, $xss_clean = NULL)
Andrey Andreev1887ec62012-10-27 16:22:07 +0300297 {
298 return $this->_fetch_from_array($_SERVER, $index, $xss_clean);
299 }
300
Derek Jones69fc4fc2010-03-02 13:36:31 -0600301 // ------------------------------------------------------------------------
302
303 /**
Ignasimg0b5569f2015-02-20 17:56:55 +0100304 * Fetch an item from the php://input stream
305 *
306 * Useful when you need to access PUT, DELETE or PATCH request data.
307 *
308 * @param string $index Index for item to be fetched
309 * @param bool $xss_clean Whether to apply XSS filtering
310 * @return mixed
311 */
Andrey Andreev7c60b122014-02-08 18:47:19 +0200312 public function input_stream($index = NULL, $xss_clean = NULL)
Andrey Andreev303eef02012-11-06 14:55:48 +0200313 {
Ignasimg0b5569f2015-02-20 17:56:55 +0100314 // Prior to PHP 5.6, the input stream can only be read once,
315 // so we'll need to check if we have already done that first.
316 if ( ! is_array($this->_input_stream))
317 {
318 parse_str($this->raw_input_stream, $this->_input_stream);
319 is_array($this->_input_stream) OR $this->_input_stream = array();
320 }
Andrey Andreev303eef02012-11-06 14:55:48 +0200321 return $this->_fetch_from_array($this->_input_stream, $index, $xss_clean);
322 }
Ignasimg0b5569f2015-02-20 17:56:55 +0100323
Ignasimgf9fbf112015-02-06 09:21:07 +0100324 // ------------------------------------------------------------------------
325
Ignasimg0b5569f2015-02-20 17:56:55 +0100326 public function __get($name)
Ignasimgf9fbf112015-02-06 09:21:07 +0100327 {
Ignasimg0b5569f2015-02-20 17:56:55 +0100328 if ($name === 'raw_input_stream')
329 {
330 isset($this->_raw_input_stream) OR $this->_raw_input_stream = file_get_contents('php://input');
331 return $this->_raw_input_stream;
332 }
Ignasimgf9fbf112015-02-06 09:21:07 +0100333 }
Andrey Andreev303eef02012-11-06 14:55:48 +0200334
335 // ------------------------------------------------------------------------
336
337 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400338 * Set cookie
339 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300340 * Accepts an arbitrary number of parameters (up to 7) or an associative
Timothy Warren40403d22012-04-19 16:38:50 -0400341 * array in the first parameter containing all the values.
342 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300343 * @param string|mixed[] $name Cookie name or an array containing parameters
344 * @param string $value Cookie value
345 * @param int $expire Cookie expiration time in seconds
346 * @param string $domain Cookie domain (e.g.: '.yourdomain.com')
347 * @param string $path Cookie path (default: '/')
348 * @param string $prefix Cookie name prefix
349 * @param bool $secure Whether to only transfer cookies via SSL
350 * @param bool $httponly Whether to only makes the cookie accessible via HTTP (no javascript)
Timothy Warren40403d22012-04-19 16:38:50 -0400351 * @return void
352 */
Andrey Andreev8f5420b2014-01-06 10:34:23 +0200353 public function set_cookie($name, $value = '', $expire = '', $domain = '', $path = '/', $prefix = '', $secure = FALSE, $httponly = FALSE)
Derek Jones69fc4fc2010-03-02 13:36:31 -0600354 {
355 if (is_array($name))
356 {
tobiasbg9aa7dc92011-02-18 21:57:13 +0100357 // always leave 'name' in last place, as the loop will break otherwise, due to $$item
freewil4ad0fd82012-03-13 22:37:42 -0400358 foreach (array('value', 'expire', 'domain', 'path', 'prefix', 'secure', 'httponly', 'name') as $item)
Derek Jones69fc4fc2010-03-02 13:36:31 -0600359 {
360 if (isset($name[$item]))
361 {
362 $$item = $name[$item];
363 }
364 }
365 }
366
Alex Bilbieed944a32012-06-02 11:07:47 +0100367 if ($prefix === '' && config_item('cookie_prefix') !== '')
Derek Jones69fc4fc2010-03-02 13:36:31 -0600368 {
369 $prefix = config_item('cookie_prefix');
370 }
Andrey Andreev9ba661b2012-06-04 14:44:34 +0300371
372 if ($domain == '' && config_item('cookie_domain') != '')
Derek Jones69fc4fc2010-03-02 13:36:31 -0600373 {
374 $domain = config_item('cookie_domain');
375 }
Andrey Andreev9ba661b2012-06-04 14:44:34 +0300376
Alex Bilbieed944a32012-06-02 11:07:47 +0100377 if ($path === '/' && config_item('cookie_path') !== '/')
Derek Jones69fc4fc2010-03-02 13:36:31 -0600378 {
379 $path = config_item('cookie_path');
380 }
Andrey Andreev9ba661b2012-06-04 14:44:34 +0300381
Andrey Andreevd444d442014-10-06 00:00:08 +0300382 if ($secure === FALSE && config_item('cookie_secure') === TRUE)
tobiasbg9aa7dc92011-02-18 21:57:13 +0100383 {
384 $secure = config_item('cookie_secure');
385 }
Andrey Andreev9ba661b2012-06-04 14:44:34 +0300386
Alex Bilbieed944a32012-06-02 11:07:47 +0100387 if ($httponly === FALSE && config_item('cookie_httponly') !== FALSE)
freewil4ad0fd82012-03-13 22:37:42 -0400388 {
389 $httponly = config_item('cookie_httponly');
390 }
Derek Jones69fc4fc2010-03-02 13:36:31 -0600391
392 if ( ! is_numeric($expire))
393 {
394 $expire = time() - 86500;
395 }
396 else
397 {
Phil Sturgeonc8089152010-12-27 19:06:28 +0000398 $expire = ($expire > 0) ? time() + $expire : 0;
Derek Jones69fc4fc2010-03-02 13:36:31 -0600399 }
400
freewil4ad0fd82012-03-13 22:37:42 -0400401 setcookie($prefix.$name, $value, $expire, $path, $domain, $secure, $httponly);
Derek Jones69fc4fc2010-03-02 13:36:31 -0600402 }
403
Derek Allard2067d1a2008-11-13 22:59:24 +0000404 // --------------------------------------------------------------------
405
406 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400407 * Fetch the IP Address
408 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300409 * Determines and validates the visitor's IP address.
410 *
411 * @return string IP address
Timothy Warren40403d22012-04-19 16:38:50 -0400412 */
Bo-Yi Wu4db872f2011-09-12 10:52:37 +0800413 public function ip_address()
Derek Allard2067d1a2008-11-13 22:59:24 +0000414 {
415 if ($this->ip_address !== FALSE)
416 {
417 return $this->ip_address;
418 }
Barry Mienydd671972010-10-04 16:33:58 +0200419
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300420 $proxy_ips = config_item('proxy_ips');
Andrey Andreevea7a8662012-10-09 13:36:31 +0300421 if ( ! empty($proxy_ips) && ! is_array($proxy_ips))
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300422 {
423 $proxy_ips = explode(',', str_replace(' ', '', $proxy_ips));
424 }
Andrey Andreev5b92ae12012-10-04 13:05:03 +0300425
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300426 $this->ip_address = $this->server('REMOTE_ADDR');
427
428 if ($proxy_ips)
429 {
430 foreach (array('HTTP_X_FORWARDED_FOR', 'HTTP_CLIENT_IP', 'HTTP_X_CLIENT_IP', 'HTTP_X_CLUSTER_CLIENT_IP') as $header)
Jordan Pittman8960acf2012-07-23 09:05:49 -0300431 {
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300432 if (($spoof = $this->server($header)) !== NULL)
Jordan Pittman8960acf2012-07-23 09:05:49 -0300433 {
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300434 // Some proxies typically list the whole chain of IP
435 // addresses through which the client has reached us.
436 // e.g. client_ip, proxy_ip1, proxy_ip2, etc.
Andrey Andreeve24eed72012-11-02 23:33:45 +0200437 sscanf($spoof, '%[^,]', $spoof);
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300438
439 if ( ! $this->valid_ip($spoof))
440 {
441 $spoof = NULL;
442 }
443 else
444 {
Jordan Pittmana5a71352012-07-20 19:36:43 -0300445 break;
446 }
447 }
Andrey Andreev5b92ae12012-10-04 13:05:03 +0300448 }
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300449
Andrey Andreeve45ad2b2012-10-09 13:11:15 +0300450 if ($spoof)
Andrey Andreev5b92ae12012-10-04 13:05:03 +0300451 {
Andrey Andreev9df35b42012-10-09 13:37:58 +0300452 for ($i = 0, $c = count($proxy_ips); $i < $c; $i++)
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300453 {
454 // Check if we have an IP address or a subnet
455 if (strpos($proxy_ips[$i], '/') === FALSE)
456 {
457 // An IP address (and not a subnet) is specified.
458 // We can compare right away.
459 if ($proxy_ips[$i] === $this->ip_address)
460 {
461 $this->ip_address = $spoof;
462 break;
463 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000464
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300465 continue;
466 }
467
468 // We have a subnet ... now the heavy lifting begins
469 isset($separator) OR $separator = $this->valid_ip($this->ip_address, 'ipv6') ? ':' : '.';
470
471 // If the proxy entry doesn't match the IP protocol - skip it
472 if (strpos($proxy_ips[$i], $separator) === FALSE)
473 {
474 continue;
475 }
476
477 // Convert the REMOTE_ADDR IP address to binary, if needed
Andrey Andreev82d2cf12012-10-13 12:38:42 +0300478 if ( ! isset($ip, $sprintf))
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300479 {
480 if ($separator === ':')
481 {
482 // Make sure we're have the "full" IPv6 format
Andrey Andreev82d2cf12012-10-13 12:38:42 +0300483 $ip = explode(':',
484 str_replace('::',
485 str_repeat(':', 9 - substr_count($this->ip_address, ':')),
486 $this->ip_address
487 )
488 );
489
490 for ($i = 0; $i < 8; $i++)
491 {
492 $ip[$i] = intval($ip[$i], 16);
493 }
494
495 $sprintf = '%016b%016b%016b%016b%016b%016b%016b%016b';
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300496 }
497 else
498 {
Andrey Andreev82d2cf12012-10-13 12:38:42 +0300499 $ip = explode('.', $this->ip_address);
500 $sprintf = '%08b%08b%08b%08b';
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300501 }
502
Andrey Andreev82d2cf12012-10-13 12:38:42 +0300503 $ip = vsprintf($sprintf, $ip);
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300504 }
505
506 // Split the netmask length off the network address
Andrey Andreeve24eed72012-11-02 23:33:45 +0200507 sscanf($proxy_ips[$i], '%[^/]/%d', $netaddr, $masklen);
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300508
509 // Again, an IPv6 address is most likely in a compressed form
510 if ($separator === ':')
511 {
Andrey Andreev82d2cf12012-10-13 12:38:42 +0300512 $netaddr = explode(':', str_replace('::', str_repeat(':', 9 - substr_count($netaddr, ':')), $netaddr));
513 for ($i = 0; $i < 8; $i++)
514 {
515 $netaddr[$i] = intval($netaddr[$i], 16);
516 }
517 }
518 else
519 {
520 $netaddr = explode('.', $netaddr);
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300521 }
522
Andrey Andreev82d2cf12012-10-13 12:38:42 +0300523 // Convert to binary and finally compare
524 if (strncmp($ip, vsprintf($sprintf, $netaddr), $masklen) === 0)
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300525 {
526 $this->ip_address = $spoof;
527 break;
528 }
529 }
530 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000531 }
532
Derek Allard2067d1a2008-11-13 22:59:24 +0000533 if ( ! $this->valid_ip($this->ip_address))
534 {
Andrey Andreev64e98aa2012-01-07 20:29:10 +0200535 return $this->ip_address = '0.0.0.0';
Derek Allard2067d1a2008-11-13 22:59:24 +0000536 }
537
538 return $this->ip_address;
539 }
540
541 // --------------------------------------------------------------------
542
543 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400544 * Validate IP Address
545 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300546 * @param string $ip IP address
547 * @param string $which IP protocol: 'ipv4' or 'ipv6'
Timothy Warren40403d22012-04-19 16:38:50 -0400548 * @return bool
549 */
Andrey Andreev5a257182012-06-10 06:18:14 +0300550 public function valid_ip($ip, $which = '')
Derek Allard2067d1a2008-11-13 22:59:24 +0000551 {
Andrey Andreev5a257182012-06-10 06:18:14 +0300552 switch (strtolower($which))
553 {
554 case 'ipv4':
555 $which = FILTER_FLAG_IPV4;
556 break;
557 case 'ipv6':
558 $which = FILTER_FLAG_IPV6;
559 break;
560 default:
561 $which = NULL;
562 break;
563 }
564
565 return (bool) filter_var($ip, FILTER_VALIDATE_IP, $which);
Derek Allard2067d1a2008-11-13 22:59:24 +0000566 }
567
568 // --------------------------------------------------------------------
569
570 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +0300571 * Fetch User Agent string
Timothy Warren40403d22012-04-19 16:38:50 -0400572 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300573 * @return string|null User Agent string or NULL if it doesn't exist
Timothy Warren40403d22012-04-19 16:38:50 -0400574 */
Andrey Andreev8850e372014-02-27 21:56:06 +0200575 public function user_agent($xss_clean = NULL)
Derek Allard2067d1a2008-11-13 22:59:24 +0000576 {
Andrey Andreev8850e372014-02-27 21:56:06 +0200577 return $this->_fetch_from_array($_SERVER, 'HTTP_USER_AGENT', $xss_clean);
Derek Allard2067d1a2008-11-13 22:59:24 +0000578 }
579
580 // --------------------------------------------------------------------
581
582 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400583 * Sanitize Globals
584 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300585 * Internal method serving for the following purposes:
Timothy Warren40403d22012-04-19 16:38:50 -0400586 *
Andrey Andreevb78a8c72014-04-15 17:21:16 +0300587 * - Unsets $_GET data, if query strings are not enabled
Andrey Andreev1887ec62012-10-27 16:22:07 +0300588 * - Cleans POST, COOKIE and SERVER data
589 * - Standardizes newline characters to PHP_EOL
Timothy Warren40403d22012-04-19 16:38:50 -0400590 *
591 * @return void
592 */
Andrey Andreev90cfe142012-01-08 04:46:42 +0200593 protected function _sanitize_globals()
Derek Allard2067d1a2008-11-13 22:59:24 +0000594 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600595 // Is $_GET data allowed? If not we'll set the $_GET to an empty array
Alex Bilbieed944a32012-06-02 11:07:47 +0100596 if ($this->_allow_get_array === FALSE)
Derek Allard2067d1a2008-11-13 22:59:24 +0000597 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600598 $_GET = array();
Derek Allard2067d1a2008-11-13 22:59:24 +0000599 }
Andrey Andreev9448afb2012-02-08 19:49:19 +0200600 elseif (is_array($_GET) && count($_GET) > 0)
Derek Allard2067d1a2008-11-13 22:59:24 +0000601 {
Andrey Andreev9448afb2012-02-08 19:49:19 +0200602 foreach ($_GET as $key => $val)
Derek Allard2067d1a2008-11-13 22:59:24 +0000603 {
Andrey Andreev9448afb2012-02-08 19:49:19 +0200604 $_GET[$this->_clean_input_keys($key)] = $this->_clean_input_data($val);
Derek Allard2067d1a2008-11-13 22:59:24 +0000605 }
606 }
607
Derek Jones69fc4fc2010-03-02 13:36:31 -0600608 // Clean $_POST Data
Andrey Andreev9448afb2012-02-08 19:49:19 +0200609 if (is_array($_POST) && count($_POST) > 0)
Derek Allard2067d1a2008-11-13 22:59:24 +0000610 {
Pascal Kriete5d5895f2011-02-14 13:27:07 -0500611 foreach ($_POST as $key => $val)
Derek Jones69fc4fc2010-03-02 13:36:31 -0600612 {
613 $_POST[$this->_clean_input_keys($key)] = $this->_clean_input_data($val);
614 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000615 }
616
Derek Jones69fc4fc2010-03-02 13:36:31 -0600617 // Clean $_COOKIE Data
Andrey Andreev9448afb2012-02-08 19:49:19 +0200618 if (is_array($_COOKIE) && count($_COOKIE) > 0)
Derek Allard2067d1a2008-11-13 22:59:24 +0000619 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600620 // Also get rid of specially treated cookies that might be set by a server
621 // or silly application, that are of no use to a CI application anyway
622 // but that when present will trip our 'Disallowed Key Characters' alarm
623 // http://www.ietf.org/rfc/rfc2109.txt
624 // note that the key names below are single quoted strings, and are not PHP variables
Andrey Andreev5ac428b2014-01-08 16:07:31 +0200625 unset(
626 $_COOKIE['$Version'],
627 $_COOKIE['$Path'],
628 $_COOKIE['$Domain']
629 );
Derek Jones69fc4fc2010-03-02 13:36:31 -0600630
Pascal Kriete5d5895f2011-02-14 13:27:07 -0500631 foreach ($_COOKIE as $key => $val)
Derek Jones69fc4fc2010-03-02 13:36:31 -0600632 {
Andrey Andreevfd0aabb2013-09-23 13:18:20 +0300633 if (($cookie_key = $this->_clean_input_keys($key)) !== FALSE)
634 {
635 $_COOKIE[$cookie_key] = $this->_clean_input_data($val);
636 }
637 else
638 {
639 unset($_COOKIE[$key]);
640 }
Derek Jones69fc4fc2010-03-02 13:36:31 -0600641 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000642 }
643
Derek Jones69fc4fc2010-03-02 13:36:31 -0600644 // Sanitize PHP_SELF
645 $_SERVER['PHP_SELF'] = strip_tags($_SERVER['PHP_SELF']);
646
Derek Jones69fc4fc2010-03-02 13:36:31 -0600647 // CSRF Protection check
Andrey Andreevf964b162013-11-12 17:04:55 +0200648 if ($this->_enable_csrf === TRUE && ! is_cli())
Derek Allard2067d1a2008-11-13 22:59:24 +0000649 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600650 $this->security->csrf_verify();
Derek Allard2067d1a2008-11-13 22:59:24 +0000651 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000652
Andrey Andreevfd0aabb2013-09-23 13:18:20 +0300653 log_message('debug', 'Global POST, GET and COOKIE data sanitized');
Derek Allard2067d1a2008-11-13 22:59:24 +0000654 }
655
656 // --------------------------------------------------------------------
657
658 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400659 * Clean Input Data
660 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300661 * Internal method that aids in escaping data and
662 * standardizing newline characters to PHP_EOL.
Timothy Warren40403d22012-04-19 16:38:50 -0400663 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300664 * @param string|string[] $str Input string(s)
Timothy Warren40403d22012-04-19 16:38:50 -0400665 * @return string
666 */
Andrey Andreev90cfe142012-01-08 04:46:42 +0200667 protected function _clean_input_data($str)
Derek Allard2067d1a2008-11-13 22:59:24 +0000668 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600669 if (is_array($str))
Derek Allard2067d1a2008-11-13 22:59:24 +0000670 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600671 $new_array = array();
Andrey Andreev1887ec62012-10-27 16:22:07 +0300672 foreach (array_keys($str) as $key)
Derek Jones69fc4fc2010-03-02 13:36:31 -0600673 {
Andrey Andreev1887ec62012-10-27 16:22:07 +0300674 $new_array[$this->_clean_input_keys($key)] = $this->_clean_input_data($str[$key]);
Derek Jones69fc4fc2010-03-02 13:36:31 -0600675 }
676 return $new_array;
Derek Allard2067d1a2008-11-13 22:59:24 +0000677 }
678
Andrey Andreevaf728622011-10-20 10:11:59 +0300679 /* We strip slashes if magic quotes is on to keep things consistent
680
681 NOTE: In PHP 5.4 get_magic_quotes_gpc() will always return 0 and
682 it will probably not exist in future versions at all.
683 */
684 if ( ! is_php('5.4') && get_magic_quotes_gpc())
Derek Allard2067d1a2008-11-13 22:59:24 +0000685 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600686 $str = stripslashes($str);
687 }
688
689 // Clean UTF-8 if supported
690 if (UTF8_ENABLED === TRUE)
691 {
692 $str = $this->uni->clean_string($str);
693 }
David Behler9b5df592011-08-14 21:04:17 +0200694
Pascal Kriete14a0ac62011-04-05 14:55:56 -0400695 // Remove control characters
Andrey Andreev5ac428b2014-01-08 16:07:31 +0200696 $str = remove_invisible_characters($str, FALSE);
Derek Jones69fc4fc2010-03-02 13:36:31 -0600697
Derek Jones69fc4fc2010-03-02 13:36:31 -0600698 // Standardize newlines if needed
Eric Robertsb75e13d2013-01-27 20:10:09 -0600699 if ($this->_standardize_newlines === TRUE)
Derek Jones69fc4fc2010-03-02 13:36:31 -0600700 {
Eric Robertsb75e13d2013-01-27 20:10:09 -0600701 return preg_replace('/(?:\r\n|[\r\n])/', PHP_EOL, $str);
Derek Allard2067d1a2008-11-13 22:59:24 +0000702 }
703
704 return $str;
705 }
706
707 // --------------------------------------------------------------------
708
709 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400710 * Clean Keys
711 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300712 * Internal method that helps to prevent malicious users
Timothy Warren40403d22012-04-19 16:38:50 -0400713 * from trying to exploit keys we make sure that keys are
714 * only named with alpha-numeric text and a few other items.
715 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300716 * @param string $str Input string
Andrey Andreevfd0aabb2013-09-23 13:18:20 +0300717 * @param string $fatal Whether to terminate script exection
718 * or to return FALSE if an invalid
719 * key is encountered
720 * @return string|bool
Timothy Warren40403d22012-04-19 16:38:50 -0400721 */
Andrey Andreevfd0aabb2013-09-23 13:18:20 +0300722 protected function _clean_input_keys($str, $fatal = TRUE)
Derek Allard2067d1a2008-11-13 22:59:24 +0000723 {
bigCat3c0846b2012-08-21 00:20:20 +0800724 if ( ! preg_match('/^[a-z0-9:_\/|-]+$/i', $str))
Derek Allard2067d1a2008-11-13 22:59:24 +0000725 {
Andrey Andreevfd0aabb2013-09-23 13:18:20 +0300726 if ($fatal === TRUE)
727 {
728 return FALSE;
729 }
730 else
731 {
732 set_status_header(503);
733 echo 'Disallowed Key Characters.';
Andrey Andreev7cf682a2014-03-13 14:55:45 +0200734 exit(7); // EXIT_USER_INPUT
Andrey Andreevfd0aabb2013-09-23 13:18:20 +0300735 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000736 }
737
Derek Jones69fc4fc2010-03-02 13:36:31 -0600738 // Clean UTF-8 if supported
739 if (UTF8_ENABLED === TRUE)
740 {
Andrey Andreev64e98aa2012-01-07 20:29:10 +0200741 return $this->uni->clean_string($str);
Derek Jones69fc4fc2010-03-02 13:36:31 -0600742 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000743
Derek Jones69fc4fc2010-03-02 13:36:31 -0600744 return $str;
745 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000746
Greg Akerec2f5712010-11-15 16:22:12 -0600747 // --------------------------------------------------------------------
748
749 /**
750 * Request Headers
751 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300752 * @param bool $xss_clean Whether to apply XSS filtering
Andrey Andreev64e98aa2012-01-07 20:29:10 +0200753 * @return array
Greg Akerec2f5712010-11-15 16:22:12 -0600754 */
755 public function request_headers($xss_clean = FALSE)
756 {
CJ71cff1d2013-04-16 21:50:55 +0800757 // If header is already defined, return it immediately
758 if ( ! empty($this->headers))
759 {
760 return $this->headers;
761 }
762
Andrey Andreev1887ec62012-10-27 16:22:07 +0300763 // In Apache, you can simply call apache_request_headers()
Greg Akerec2f5712010-11-15 16:22:12 -0600764 if (function_exists('apache_request_headers'))
765 {
CJ71cff1d2013-04-16 21:50:55 +0800766 return $this->headers = apache_request_headers();
Greg Akerec2f5712010-11-15 16:22:12 -0600767 }
CJd195f222013-04-17 01:04:13 +0800768
CJ8347f912013-04-17 21:45:22 +0800769 $this->headers['Content-Type'] = isset($_SERVER['CONTENT_TYPE']) ? $_SERVER['CONTENT_TYPE'] : @getenv('CONTENT_TYPE');
CJd195f222013-04-17 01:04:13 +0800770
771 foreach ($_SERVER as $key => $val)
Greg Akerec2f5712010-11-15 16:22:12 -0600772 {
CJd195f222013-04-17 01:04:13 +0800773 if (sscanf($key, 'HTTP_%s', $header) === 1)
Greg Akerec2f5712010-11-15 16:22:12 -0600774 {
CJd195f222013-04-17 01:04:13 +0800775 // take SOME_HEADER and turn it into Some-Header
776 $header = str_replace('_', ' ', strtolower($header));
777 $header = str_replace(' ', '-', ucwords($header));
Greg Akerec2f5712010-11-15 16:22:12 -0600778
CJd195f222013-04-17 01:04:13 +0800779 $this->headers[$header] = $this->_fetch_from_array($_SERVER, $key, $xss_clean);
CJ826990f2013-04-16 14:17:53 +0800780 }
Greg Akerec2f5712010-11-15 16:22:12 -0600781 }
David Behler9b5df592011-08-14 21:04:17 +0200782
Greg Akerec2f5712010-11-15 16:22:12 -0600783 return $this->headers;
784 }
785
786 // --------------------------------------------------------------------
787
788 /**
789 * Get Request Header
790 *
791 * Returns the value of a single member of the headers class member
792 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300793 * @param string $index Header name
794 * @param bool $xss_clean Whether to apply XSS filtering
Adriano Rosaf112e4a2014-10-03 13:15:46 -0300795 * @return string|null The requested header on success or NULL on failure
Greg Akerec2f5712010-11-15 16:22:12 -0600796 */
797 public function get_request_header($index, $xss_clean = FALSE)
798 {
799 if (empty($this->headers))
800 {
801 $this->request_headers();
802 }
David Behler9b5df592011-08-14 21:04:17 +0200803
Greg Akerec2f5712010-11-15 16:22:12 -0600804 if ( ! isset($this->headers[$index]))
805 {
Phil Sturgeon55a6ddb2012-05-23 18:37:24 +0100806 return NULL;
Greg Akerec2f5712010-11-15 16:22:12 -0600807 }
808
Andrey Andreev9448afb2012-02-08 19:49:19 +0200809 return ($xss_clean === TRUE)
810 ? $this->security->xss_clean($this->headers[$index])
811 : $this->headers[$index];
Greg Akerec2f5712010-11-15 16:22:12 -0600812 }
813
Greg Aker081ac9d2010-11-22 14:42:53 -0600814 // --------------------------------------------------------------------
Phil Sturgeonc3828712011-01-19 12:31:47 +0000815
Greg Aker081ac9d2010-11-22 14:42:53 -0600816 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +0300817 * Is AJAX request?
Greg Aker081ac9d2010-11-22 14:42:53 -0600818 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300819 * Test to see if a request contains the HTTP_X_REQUESTED_WITH header.
Greg Aker081ac9d2010-11-22 14:42:53 -0600820 *
Andrey Andreev9448afb2012-02-08 19:49:19 +0200821 * @return bool
Greg Aker081ac9d2010-11-22 14:42:53 -0600822 */
823 public function is_ajax_request()
824 {
Andrey Andreev9448afb2012-02-08 19:49:19 +0200825 return ( ! empty($_SERVER['HTTP_X_REQUESTED_WITH']) && strtolower($_SERVER['HTTP_X_REQUESTED_WITH']) === 'xmlhttprequest');
Greg Aker081ac9d2010-11-22 14:42:53 -0600826 }
827
Phil Sturgeonc3828712011-01-19 12:31:47 +0000828 // --------------------------------------------------------------------
829
830 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +0300831 * Is CLI request?
Phil Sturgeonc3828712011-01-19 12:31:47 +0000832 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300833 * Test to see if a request was made from the command line.
Phil Sturgeonc3828712011-01-19 12:31:47 +0000834 *
Andrey Andreevf964b162013-11-12 17:04:55 +0200835 * @deprecated 3.0.0 Use is_cli() instead
836 * @return bool
Phil Sturgeonc3828712011-01-19 12:31:47 +0000837 */
838 public function is_cli_request()
839 {
Andrey Andreevf964b162013-11-12 17:04:55 +0200840 return is_cli();
Phil Sturgeonc3828712011-01-19 12:31:47 +0000841 }
842
Michiel Vugteveenbe0ca262012-03-07 19:09:51 +0100843 // --------------------------------------------------------------------
844
845 /**
846 * Get Request Method
847 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300848 * Return the request method
Michiel Vugteveenbe0ca262012-03-07 19:09:51 +0100849 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300850 * @param bool $upper Whether to return in upper or lower case
851 * (default: FALSE)
852 * @return string
Michiel Vugteveenbe0ca262012-03-07 19:09:51 +0100853 */
Michiel Vugteveen704fb162012-03-07 20:42:33 +0100854 public function method($upper = FALSE)
Michiel Vugteveenbe0ca262012-03-07 19:09:51 +0100855 {
Michiel Vugteveendc900df2012-03-07 20:41:37 +0100856 return ($upper)
857 ? strtoupper($this->server('REQUEST_METHOD'))
858 : strtolower($this->server('REQUEST_METHOD'));
Michiel Vugteveenbe0ca262012-03-07 19:09:51 +0100859 }
860
Derek Allard2067d1a2008-11-13 22:59:24 +0000861}